123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409 |
- /* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
- * Use of this source code is governed by a BSD-style license that can be
- * found in the LICENSE file.
- *
- * Tests for vboot_api_kernel, part 3 - software sync
- */
- #include <stdint.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include "2sysincludes.h"
- #include "2common.h"
- #include "2misc.h"
- #include "2nvstorage.h"
- #include "ec_sync.h"
- #include "gbb_header.h"
- #include "host_common.h"
- #include "load_kernel_fw.h"
- #include "rollback_index.h"
- #include "test_common.h"
- #include "vboot_audio.h"
- #include "vboot_common.h"
- #include "vboot_display.h"
- #include "vboot_kernel.h"
- #include "vboot_nvstorage.h"
- #include "vboot_struct.h"
- /* Mock data */
- static VbCommonParams cparams;
- static uint8_t shared_data[VB_SHARED_DATA_MIN_SIZE];
- static VbSharedDataHeader *shared = (VbSharedDataHeader *)shared_data;
- static GoogleBinaryBlockHeader gbb;
- static int trust_ec;
- static int mock_in_rw;
- static VbError_t in_rw_retval;
- static int protect_retval;
- static int ec_ro_protected;
- static int ec_rw_protected;
- static int run_retval;
- static int ec_run_image;
- static int update_retval;
- static int ec_ro_updated;
- static int ec_rw_updated;
- static int get_expected_retval;
- static int shutdown_request_calls_left;
- static uint8_t mock_ec_ro_hash[32];
- static uint8_t mock_ec_rw_hash[32];
- static int mock_ec_ro_hash_size;
- static int mock_ec_rw_hash_size;
- static uint8_t want_ec_hash[32];
- static uint8_t update_hash;
- static int want_ec_hash_size;
- static struct vb2_context ctx;
- static uint8_t workbuf[VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE];
- static struct vb2_shared_data *sd;
- static uint32_t screens_displayed[8];
- static uint32_t screens_count = 0;
- /* Reset mock data (for use before each test) */
- static void ResetMocks(void)
- {
- memset(&cparams, 0, sizeof(cparams));
- cparams.shared_data_size = sizeof(shared_data);
- cparams.shared_data_blob = shared_data;
- cparams.gbb_data = &gbb;
- memset(&gbb, 0, sizeof(gbb));
- gbb.major_version = GBB_MAJOR_VER;
- gbb.minor_version = GBB_MINOR_VER;
- gbb.flags = GBB_FLAG_DISABLE_PD_SOFTWARE_SYNC;
- cparams.gbb = &gbb;
- memset(&ctx, 0, sizeof(ctx));
- ctx.workbuf = workbuf;
- ctx.workbuf_size = sizeof(workbuf);
- vb2_init_context(&ctx);
- vb2_nv_init(&ctx);
- sd = vb2_get_sd(&ctx);
- memset(&shared_data, 0, sizeof(shared_data));
- VbSharedDataInit(shared, sizeof(shared_data));
- shared->flags = VBSD_EC_SOFTWARE_SYNC;
- trust_ec = 0;
- mock_in_rw = 0;
- ec_ro_protected = 0;
- ec_rw_protected = 0;
- ec_run_image = 0; /* 0 = RO, 1 = RW */
- ec_ro_updated = 0;
- ec_rw_updated = 0;
- in_rw_retval = VBERROR_SUCCESS;
- protect_retval = VBERROR_SUCCESS;
- update_retval = VBERROR_SUCCESS;
- run_retval = VBERROR_SUCCESS;
- get_expected_retval = VBERROR_SUCCESS;
- shutdown_request_calls_left = -1;
- memset(mock_ec_ro_hash, 0, sizeof(mock_ec_ro_hash));
- mock_ec_ro_hash[0] = 42;
- mock_ec_ro_hash_size = sizeof(mock_ec_ro_hash);
- memset(mock_ec_rw_hash, 0, sizeof(mock_ec_rw_hash));
- mock_ec_rw_hash[0] = 42;
- mock_ec_rw_hash_size = sizeof(mock_ec_rw_hash);
- memset(want_ec_hash, 0, sizeof(want_ec_hash));
- want_ec_hash[0] = 42;
- want_ec_hash_size = sizeof(want_ec_hash);
- update_hash = 42;
- // TODO: ensure these are actually needed
- memset(screens_displayed, 0, sizeof(screens_displayed));
- screens_count = 0;
- }
- /* Mock functions */
- uint32_t VbExIsShutdownRequested(void)
- {
- if (shutdown_request_calls_left == 0)
- return 1;
- else if (shutdown_request_calls_left > 0)
- shutdown_request_calls_left--;
- return 0;
- }
- int VbExTrustEC(int devidx)
- {
- return trust_ec;
- }
- VbError_t VbExEcRunningRW(int devidx, int *in_rw)
- {
- *in_rw = mock_in_rw;
- return in_rw_retval;
- }
- VbError_t VbExEcProtect(int devidx, enum VbSelectFirmware_t select)
- {
- if (select == VB_SELECT_FIRMWARE_READONLY)
- ec_ro_protected = 1;
- else
- ec_rw_protected = 1;
- return protect_retval;
- }
- VbError_t VbExEcDisableJump(int devidx)
- {
- return run_retval;
- }
- VbError_t VbExEcJumpToRW(int devidx)
- {
- ec_run_image = 1;
- mock_in_rw = 1;
- return run_retval;
- }
- VbError_t VbExEcHashImage(int devidx, enum VbSelectFirmware_t select,
- const uint8_t **hash, int *hash_size)
- {
- *hash = select == VB_SELECT_FIRMWARE_READONLY ?
- mock_ec_ro_hash : mock_ec_rw_hash;
- *hash_size = select == VB_SELECT_FIRMWARE_READONLY ?
- mock_ec_ro_hash_size : mock_ec_rw_hash_size;
- return *hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED;
- }
- VbError_t VbExEcGetExpectedImage(int devidx, enum VbSelectFirmware_t select,
- const uint8_t **image, int *image_size)
- {
- static uint8_t fake_image[64] = {5, 6, 7, 8};
- *image = fake_image;
- *image_size = sizeof(fake_image);
- return get_expected_retval;
- }
- VbError_t VbExEcGetExpectedImageHash(int devidx, enum VbSelectFirmware_t select,
- const uint8_t **hash, int *hash_size)
- {
- *hash = want_ec_hash;
- *hash_size = want_ec_hash_size;
- return want_ec_hash_size ? VBERROR_SUCCESS : VBERROR_SIMULATED;
- }
- VbError_t VbExEcUpdateImage(int devidx, enum VbSelectFirmware_t select,
- const uint8_t *image, int image_size)
- {
- if (select == VB_SELECT_FIRMWARE_READONLY) {
- ec_ro_updated = 1;
- mock_ec_ro_hash[0] = update_hash;
- } else {
- ec_rw_updated = 1;
- mock_ec_rw_hash[0] = update_hash;
- }
- return update_retval;
- }
- VbError_t VbDisplayScreen(struct vb2_context *ctx, VbCommonParams *cparams,
- uint32_t screen, int force)
- {
- if (screens_count < ARRAY_SIZE(screens_displayed))
- screens_displayed[screens_count++] = screen;
- return VBERROR_SUCCESS;
- }
- static void test_ssync(VbError_t retval, int recovery_reason, const char *desc)
- {
- TEST_EQ(ec_sync_all(&ctx, &cparams), retval, desc);
- TEST_EQ(vb2_nv_get(&ctx, VB2_NV_RECOVERY_REQUEST),
- recovery_reason, " recovery reason");
- }
- /* Tests */
- static void VbSoftwareSyncTest(void)
- {
- /* Recovery cases */
- ResetMocks();
- sd->recovery_reason = 123;
- test_ssync(0, 0, "In recovery, EC-RO");
- TEST_EQ(ec_rw_protected, 0, " ec rw protected");
- ResetMocks();
- sd->recovery_reason = 123;
- mock_in_rw = 1;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- 123, "Recovery needs EC-RO");
- /* AP-RO cases */
- ResetMocks();
- in_rw_retval = VBERROR_SIMULATED;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_UNKNOWN_IMAGE, "Unknown EC image");
- /* Calculate hashes */
- ResetMocks();
- mock_ec_rw_hash_size = 0;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_HASH_FAILED, "Bad EC hash");
- ResetMocks();
- mock_ec_rw_hash_size = 16;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_HASH_SIZE, "Bad EC hash size");
- ResetMocks();
- want_ec_hash_size = 0;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_EXPECTED_HASH, "Bad precalculated hash");
- ResetMocks();
- want_ec_hash_size = 16;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_HASH_SIZE,
- "Hash size mismatch");
- ResetMocks();
- want_ec_hash_size = 4;
- mock_ec_rw_hash_size = 4;
- test_ssync(0, 0, "Custom hash size");
- /* Updates required */
- ResetMocks();
- mock_in_rw = 1;
- mock_ec_rw_hash[0]++;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- 0, "Pending update needs reboot");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- vb2_nv_set(&ctx, VB2_NV_TRY_RO_SYNC, 1);
- test_ssync(0, 0, "Update rw without reboot");
- TEST_EQ(ec_rw_protected, 1, " ec rw protected");
- TEST_EQ(ec_run_image, 1, " ec run image");
- TEST_EQ(ec_rw_updated, 1, " ec rw updated");
- TEST_EQ(ec_ro_protected, 1, " ec ro protected");
- TEST_EQ(ec_ro_updated, 0, " ec ro updated");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- mock_ec_ro_hash[0]++;
- vb2_nv_set(&ctx, VB2_NV_TRY_RO_SYNC, 1);
- test_ssync(0, 0, "Update rw and ro images without reboot");
- TEST_EQ(ec_rw_protected, 1, " ec rw protected");
- TEST_EQ(ec_run_image, 1, " ec run image");
- TEST_EQ(ec_rw_updated, 1, " ec rw updated");
- TEST_EQ(ec_ro_protected, 1, " ec ro protected");
- TEST_EQ(ec_ro_updated, 1, " ec ro updated");
- ResetMocks();
- shared->flags |= VBSD_BOOT_FIRMWARE_WP_ENABLED;
- vb2_nv_set(&ctx, VB2_NV_TRY_RO_SYNC, 1);
- mock_ec_rw_hash[0]++;
- mock_ec_ro_hash[0]++;
- test_ssync(0, 0, "WP enabled");
- TEST_EQ(ec_rw_protected, 1, " ec rw protected");
- TEST_EQ(ec_run_image, 1, " ec run image");
- TEST_EQ(ec_rw_updated, 1, " ec rw updated");
- TEST_EQ(ec_ro_protected, 1, " ec ro protected");
- TEST_EQ(ec_ro_updated, 0, " ec ro updated");
- ResetMocks();
- vb2_nv_set(&ctx, VB2_NV_TRY_RO_SYNC, 1);
- mock_ec_ro_hash[0]++;
- test_ssync(0, 0, "rw update not needed");
- TEST_EQ(ec_rw_protected, 1, " ec rw protected");
- TEST_EQ(ec_run_image, 1, " ec run image");
- TEST_EQ(ec_rw_updated, 0, " ec rw not updated");
- TEST_EQ(ec_ro_protected, 1, " ec ro protected");
- TEST_EQ(ec_ro_updated, 1, " ec ro updated");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- mock_ec_ro_hash[0]++;
- test_ssync(0, 0, "ro update not requested");
- TEST_EQ(ec_rw_protected, 1, " ec rw protected");
- TEST_EQ(ec_run_image, 1, " ec run image");
- TEST_EQ(ec_rw_updated, 1, " ec rw updated");
- TEST_EQ(ec_ro_protected, 1, " ec ro protected");
- TEST_EQ(ec_ro_updated, 0, " ec ro updated");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- update_hash++;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_UPDATE, "updated hash mismatch");
- TEST_EQ(ec_rw_protected, 0, " ec rw protected");
- TEST_EQ(ec_run_image, 0, " ec run image");
- TEST_EQ(ec_rw_updated, 1, " ec rw updated");
- TEST_EQ(ec_ro_protected, 0, " ec ro protected");
- TEST_EQ(ec_ro_updated, 0, " ec ro updated");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- update_retval = VBERROR_EC_REBOOT_TO_RO_REQUIRED;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- 0, "Reboot after rw update");
- TEST_EQ(ec_rw_updated, 1, " ec rw updated");
- TEST_EQ(ec_ro_updated, 0, " ec rw updated");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- update_retval = VBERROR_SIMULATED;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_UPDATE, "Update failed");
- ResetMocks();
- mock_ec_rw_hash[0]++;
- shared->flags |= VBSD_EC_SLOW_UPDATE;
- test_ssync(0, 0, "Slow update");
- TEST_EQ(screens_displayed[0], VB_SCREEN_WAIT, " wait screen");
- /* RW cases, no update */
- ResetMocks();
- mock_in_rw = 1;
- test_ssync(0, 0, "AP-RW, EC-RW");
- ResetMocks();
- test_ssync(0, 0, "AP-RW, EC-RO -> EC-RW");
- TEST_EQ(ec_rw_protected, 1, " ec rw protected");
- TEST_EQ(ec_run_image, 1, " ec run image");
- TEST_EQ(ec_rw_updated, 0, " ec rw updated");
- TEST_EQ(ec_ro_protected, 1, " ec ro protected");
- TEST_EQ(ec_ro_updated, 0, " ec ro updated");
- ResetMocks();
- run_retval = VBERROR_SIMULATED;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- VBNV_RECOVERY_EC_JUMP_RW, "Jump to RW fail");
- ResetMocks();
- run_retval = VBERROR_EC_REBOOT_TO_RO_REQUIRED;
- test_ssync(VBERROR_EC_REBOOT_TO_RO_REQUIRED,
- 0, "Jump to RW fail because locked");
- ResetMocks();
- protect_retval = VBERROR_SIMULATED;
- test_ssync(VBERROR_SIMULATED,
- VBNV_RECOVERY_EC_PROTECT, "Protect error");
- /* No longer check for shutdown requested */
- ResetMocks();
- shutdown_request_calls_left = 0;
- test_ssync(0, 0,
- "AP-RW, EC-RO -> EC-RW shutdown requested");
- ResetMocks();
- mock_in_rw = 1;
- shutdown_request_calls_left = 0;
- test_ssync(0, 0, "AP-RW shutdown requested");
- }
- int main(void)
- {
- VbSoftwareSyncTest();
- return gTestSuccess ? 0 : 255;
- }
|