mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-12-24 00:37:25 +00:00
At present reading data from storage in Vboot is a little fragmented. For the firmware image, we expect the boot loader to handle this. For the disk we have a block-level API. For the GBB (which also sits in the firmware image) we expect the entire thing to be read before Vboot is called. Add the concept of a region, and an API to read from a region. At present, and most pressing, is reading from a GBB region. In the future this could be extended to other parts of the firmware or even the disk. Move all access to the GBB into this API so that the boot loader can provide either a GBB region in one large contiguous chunk, or a function to deal with read requests from vboot. The call to VbExRegionRead() is behind a flag since not all boot loaders support it yet. The main change for boot loaders which don't support this new API is that vboot will do more behind the scenes. For example, it will allocate memory for chunks of data that it reads from the GBB, rather than just accessing it directly. This approach is considerably simpler than trying to pass char ** everywhere and have vboot decide whether something needs to be allocated or not. The tests are updated, mainly to include setting up a GBB structure accessible from VbCommonParams, which is now required by the firmware and kernel functions. In normal operation this is set up at the start of VbLoadFIrmware() and VbSelectAndLoadKernel() but for tests which call children of these functions directly, the GBB structure must be set up manually by the test. BUG=chrome-os-partner:21115 BRANCH=none TEST=manual FEATURES=test sudo -E emerge vboot_reference Change-Id: I2c19e9dc2ed602d0642bbf4f7d27f79fe9fad873 Signed-off-by: Simon Glass <sjg@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/63336 Reviewed-by: Randall Spangler <rspangler@chromium.org>
257 lines
8.4 KiB
C
257 lines
8.4 KiB
C
/* Copyright (c) 2011 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Tests for vboot_api_firmware
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#include "gbb_header.h"
|
|
#include "host_common.h"
|
|
#include "rollback_index.h"
|
|
#include "test_common.h"
|
|
#include "vboot_common.h"
|
|
#include "vboot_nvstorage.h"
|
|
#include "vboot_struct.h"
|
|
|
|
/* Flags for mock_*_got_flags variables */
|
|
#define MOCK_DEV_FLAG 0x01 /* Developer parameter non-zero */
|
|
#define MOCK_REC_FLAG 0x02 /* Recovery parameter non-zero */
|
|
|
|
/* Mock data */
|
|
static VbCommonParams cparams;
|
|
static VbSelectFirmwareParams fparams;
|
|
static GoogleBinaryBlockHeader gbb;
|
|
static VbNvContext vnc;
|
|
static uint8_t shared_data[VB_SHARED_DATA_MIN_SIZE];
|
|
static VbSharedDataHeader* shared = (VbSharedDataHeader*)shared_data;
|
|
static uint64_t mock_timer;
|
|
static int nv_write_called;
|
|
/* Mock TPM versions */
|
|
static uint32_t mock_tpm_version;
|
|
static uint32_t mock_lf_tpm_version; /* TPM version set by LoadFirmware() */
|
|
/* Variables for tracking params passed to mock functions */
|
|
static uint32_t mock_stbms_got_flags;
|
|
static uint64_t mock_stbms_got_fw_flags;
|
|
static int mock_rfl_called;
|
|
/* Mock return values, so we can simulate errors */
|
|
static VbError_t mock_rfw_retval;
|
|
static VbError_t mock_rfl_retval;
|
|
static VbError_t mock_lf_retval;
|
|
static VbError_t mock_stbms_retval;
|
|
|
|
/* Reset mock data (for use before each test) */
|
|
static void ResetMocks(void) {
|
|
Memset(&cparams, 0, sizeof(cparams));
|
|
cparams.shared_data_size = sizeof(shared_data);
|
|
cparams.shared_data_blob = shared_data;
|
|
|
|
Memset(&fparams, 0, sizeof(fparams));
|
|
|
|
Memset(&gbb, 0, sizeof(gbb));
|
|
cparams.gbb_data = &gbb;
|
|
cparams.gbb_size = sizeof(gbb);
|
|
cparams.gbb = &gbb;
|
|
|
|
Memset(&vnc, 0, sizeof(vnc));
|
|
VbNvSetup(&vnc);
|
|
VbNvTeardown(&vnc); /* So CRC gets generated */
|
|
|
|
Memset(&shared_data, 0, sizeof(shared_data));
|
|
VbSharedDataInit(shared, sizeof(shared_data));
|
|
shared->fw_keyblock_flags = 0xABCDE0;
|
|
|
|
mock_timer = 10;
|
|
nv_write_called = mock_rfl_called = 0;
|
|
|
|
mock_stbms_got_flags = 0;
|
|
mock_stbms_got_fw_flags = 0;
|
|
|
|
mock_tpm_version = mock_lf_tpm_version = 0x20004;
|
|
shared->fw_version_tpm_start = mock_tpm_version;
|
|
mock_rfw_retval = mock_rfl_retval = 0;
|
|
mock_lf_retval = mock_stbms_retval = 0;
|
|
}
|
|
|
|
/****************************************************************************/
|
|
/* Mocked verification functions */
|
|
|
|
VbError_t VbExNvStorageRead(uint8_t* buf) {
|
|
Memcpy(buf, vnc.raw, sizeof(vnc.raw));
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExNvStorageWrite(const uint8_t* buf) {
|
|
nv_write_called = 1;
|
|
Memcpy(vnc.raw, buf, sizeof(vnc.raw));
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
uint64_t VbExGetTimer(void) {
|
|
/* Exponential-ish rather than linear time, so that subtracting any
|
|
* two mock values will yield a unique result. */
|
|
uint64_t new_timer = mock_timer * 2 + 1;
|
|
VbAssert(new_timer > mock_timer); /* Make sure we don't overflow */
|
|
mock_timer = new_timer;
|
|
return mock_timer;
|
|
}
|
|
|
|
uint32_t RollbackFirmwareWrite(uint32_t version) {
|
|
mock_tpm_version = version;
|
|
return mock_rfw_retval;
|
|
}
|
|
|
|
uint32_t RollbackFirmwareLock(void) {
|
|
mock_rfl_called = 1;
|
|
return mock_rfl_retval;
|
|
}
|
|
|
|
uint32_t SetTPMBootModeState(int developer_mode, int recovery_mode,
|
|
uint64_t fw_keyblock_flags) {
|
|
if (recovery_mode)
|
|
mock_stbms_got_flags |= MOCK_REC_FLAG;
|
|
if (developer_mode)
|
|
mock_stbms_got_flags |= MOCK_DEV_FLAG;
|
|
|
|
mock_stbms_got_fw_flags = fw_keyblock_flags;
|
|
|
|
return mock_stbms_retval;
|
|
}
|
|
|
|
int LoadFirmware(VbCommonParams* cparams, VbSelectFirmwareParams* fparams,
|
|
VbNvContext* vnc) {
|
|
shared->fw_version_tpm = mock_lf_tpm_version;
|
|
return mock_lf_retval;
|
|
}
|
|
|
|
|
|
/****************************************************************************/
|
|
/* Test VbSelectFirmware() and check expected return value and
|
|
* recovery reason */
|
|
static void TestVbSf(VbError_t expected_retval,
|
|
uint8_t expected_recovery, const char* desc) {
|
|
uint32_t rr = 256;
|
|
|
|
TEST_EQ(VbSelectFirmware(&cparams, &fparams), expected_retval, desc);
|
|
VbNvGet(&vnc, VBNV_RECOVERY_REQUEST, &rr);
|
|
TEST_EQ(rr, expected_recovery, " recovery request");
|
|
}
|
|
|
|
/****************************************************************************/
|
|
|
|
static void VbSelectFirmwareTest(void) {
|
|
/* Normal call */
|
|
ResetMocks();
|
|
TestVbSf(0, 0, "Normal call");
|
|
TEST_EQ(shared->timer_vb_select_firmware_enter, 21, " time enter");
|
|
TEST_EQ(shared->timer_vb_select_firmware_exit, 43, " time exit");
|
|
TEST_EQ(nv_write_called, 0, " NV write not called since nothing changed");
|
|
TEST_EQ(mock_stbms_got_flags, 0, " SetTPMBootModeState() flags");
|
|
TEST_EQ(mock_stbms_got_fw_flags, 0xABCDE0, " fw keyblock flags");
|
|
TEST_EQ(mock_rfl_called, 1, " RollbackFirmwareLock() called");
|
|
|
|
/* Developer mode call */
|
|
ResetMocks();
|
|
shared->flags |= VBSD_BOOT_DEV_SWITCH_ON;
|
|
TestVbSf(0, 0, "Developer mode");
|
|
TEST_EQ(mock_stbms_got_flags, MOCK_DEV_FLAG, " SetTPMBootModeState() flags");
|
|
TEST_EQ(mock_rfl_called, 1, " RollbackFirmwareLock() called");
|
|
|
|
/* Recovery mode doesn't call LoadFirmware(),
|
|
* RollbackFirmwareWrite(), or RollbackFirmwareLock(). */
|
|
ResetMocks();
|
|
shared->recovery_reason = VBNV_RECOVERY_US_TEST;
|
|
mock_lf_retval = VBERROR_UNKNOWN;
|
|
mock_rfw_retval = mock_rfl_retval = TPM_E_IOERROR;
|
|
TestVbSf(0, 0, "Recovery mode");
|
|
TEST_EQ(fparams.selected_firmware, VB_SELECT_FIRMWARE_RECOVERY,
|
|
" select recovery");
|
|
TEST_EQ(mock_stbms_got_flags, MOCK_REC_FLAG, " SetTPMBootModeState() flags");
|
|
TEST_EQ(mock_rfl_called, 0, " RollbackFirmwareLock() not called");
|
|
|
|
/* Dev + recovery */
|
|
ResetMocks();
|
|
shared->recovery_reason = VBNV_RECOVERY_US_TEST;
|
|
shared->flags |= VBSD_BOOT_DEV_SWITCH_ON;
|
|
TestVbSf(0, 0, "Recovery+developer mode");
|
|
TEST_EQ(fparams.selected_firmware, VB_SELECT_FIRMWARE_RECOVERY,
|
|
" select recovery");
|
|
TEST_EQ(mock_stbms_got_flags, MOCK_DEV_FLAG|MOCK_REC_FLAG,
|
|
" SetTPMBootModeState() flags");
|
|
TEST_EQ(mock_rfl_called, 0, " RollbackFirmwareLock() not called");
|
|
|
|
/* LoadFirmware() error code passed through */
|
|
ResetMocks();
|
|
mock_lf_retval = 0x12345;
|
|
TestVbSf(0x12345, 0, "LoadFirmware() error");
|
|
|
|
/* Select different firmware paths based on LoadFirmware() result */
|
|
ResetMocks();
|
|
shared->flags |= VBSD_LF_USE_RO_NORMAL;
|
|
TestVbSf(0, 0, "LoadFirmware() RO-normal");
|
|
TEST_EQ(fparams.selected_firmware, VB_SELECT_FIRMWARE_READONLY,
|
|
" select RO normal");
|
|
ResetMocks();
|
|
shared->firmware_index = 0;
|
|
TestVbSf(0, 0, "LoadFirmware() A");
|
|
TEST_EQ(fparams.selected_firmware, VB_SELECT_FIRMWARE_A, " select A");
|
|
ResetMocks();
|
|
shared->firmware_index = 1;
|
|
TestVbSf(0, 0, "LoadFirmware() B");
|
|
TEST_EQ(fparams.selected_firmware, VB_SELECT_FIRMWARE_B, " select B");
|
|
|
|
/* Handle TPM version updates */
|
|
ResetMocks();
|
|
mock_lf_tpm_version = 0x30005;
|
|
TestVbSf(0, 0, "TPM version update");
|
|
TEST_EQ(shared->fw_version_tpm_start, 0x20004, " TPM version start");
|
|
TEST_EQ(shared->fw_version_tpm, 0x30005, " TPM version");
|
|
TEST_EQ(mock_tpm_version, 0x30005, " TPM version written back");
|
|
|
|
/* Check error writing TPM version */
|
|
ResetMocks();
|
|
mock_lf_tpm_version = 0x30005;
|
|
mock_rfw_retval = TPM_E_IOERROR;
|
|
TestVbSf(VBERROR_TPM_WRITE_FIRMWARE, VBNV_RECOVERY_RO_TPM_W_ERROR,
|
|
"TPM version update failure");
|
|
|
|
/* If no change to TPM version, RollbackFirmwareWrite() not called */
|
|
ResetMocks();
|
|
mock_rfw_retval = TPM_E_IOERROR;
|
|
TestVbSf(0, 0, "LoadFirmware() TPM version not updated");
|
|
TEST_EQ(shared->fw_version_tpm_start, 0x20004, " TPM version start");
|
|
TEST_EQ(shared->fw_version_tpm, 0x20004, " TPM version");
|
|
TEST_EQ(mock_tpm_version, 0x20004, " TPM version (not) written back");
|
|
|
|
/* Check errors from SetTPMBootModeState() */
|
|
ResetMocks();
|
|
mock_stbms_retval = TPM_E_IOERROR;
|
|
TestVbSf(VBERROR_TPM_SET_BOOT_MODE_STATE, VBNV_RECOVERY_RO_TPM_U_ERROR,
|
|
"TPM set boot mode state failure");
|
|
ResetMocks();
|
|
mock_stbms_retval = TPM_E_IOERROR;
|
|
shared->recovery_reason = VBNV_RECOVERY_US_TEST;
|
|
TestVbSf(0, 0, "TPM set boot mode state failure ignored in recovery");
|
|
|
|
/* Handle RollbackFirmwareLock() errors */
|
|
ResetMocks();
|
|
mock_rfl_retval = TPM_E_IOERROR;
|
|
TestVbSf(VBERROR_TPM_LOCK_FIRMWARE, VBNV_RECOVERY_RO_TPM_L_ERROR,
|
|
"TPM lock firmware failure");
|
|
}
|
|
|
|
|
|
int main(int argc, char* argv[]) {
|
|
int error_code = 0;
|
|
|
|
VbSelectFirmwareTest();
|
|
|
|
if (!gTestSuccess)
|
|
error_code = 255;
|
|
|
|
return error_code;
|
|
}
|