1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155
|
/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
* Use of this source code is governed by a BSD-style license that can be
* found in the LICENSE file.
*
* Tests for checking kernel rollback-prevention logic.
*/
#include <stdio.h>
#include <stdlib.h>
#include "cryptolib.h"
#include "file_keys.h"
#include "kernel_image.h"
#include "rollback_index.h"
#include "test_common.h"
#include "utility.h"
const char* kFirmwareKeyPublicFile = "testkeys/key_rsa1024.keyb";
/* Tests that check for correctness of the VerifyFirmwareDriver_f() logic
* and rollback prevention. */
void VerifyKernelDriverTest(void) {
uint64_t len;
uint8_t* firmware_key_pub = BufferFromFile(kFirmwareKeyPublicFile, &len);
/* TODO(gauravsh): Rebase this to use LoadKernel() (maybe by making
* it a part of load_kernel_test.c */
#if 0
/* Initialize kernel blobs, including their associated parition
* table attributed. */
kernel_entry valid_kernelA = {
GenerateRollbackTestKernelBlob(1, 1, 0),
15, /* Highest Priority. */
5, /* Enough for tests. */
0 /* Assume we haven't boot off it yet. */
};
kernel_entry corrupt_kernelA = {
GenerateRollbackTestKernelBlob(1, 1, 1),
15, /* Highest Priority. */
5, /* Enough for tests. */
0 /* Assume we haven't boot off it yet. */
};
kernel_entry valid_kernelB = {
GenerateRollbackTestKernelBlob(1, 1, 0),
1, /* Lower Priority. */
5, /* Enough for tests. */
0 /* Assume we haven't boot off it yet. */
};
kernel_entry corrupt_kernelB = {
GenerateRollbackTestKernelBlob(1, 1, 1),
1, /* Lower Priority. */
5, /* Enough for tests. */
0 /* Assume we haven't boot off it yet. */
};
/* Initialize rollback index state. */
g_kernel_key_version = 1;
g_kernel_version = 1;
/* Note: This test just checks the rollback prevention mechanism and not
* the full blown kernel boot logic. Updates to the kernel attributes
* in the paritition table are not tested.
*/
VBDEBUG(("Kernel A boot priority(15) > Kernel B boot priority(1)\n"));
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&valid_kernelA, &valid_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_A_CONTINUE,
"(Valid Kernel A (current version)\n"
" Valid Kernel B (current version) runs A):");
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&corrupt_kernelA, &valid_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_B_CONTINUE,
"(Corrupt Kernel A (current version)\n"
" Valid Kernel B (current version) runs B):");
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&valid_kernelA, &corrupt_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_A_CONTINUE,
"(Valid Kernel A (current version)\n"
" Corrupt Kernel B (current version) runs A):");
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&corrupt_kernelA, &corrupt_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_RECOVERY_CONTINUE,
"(Corrupt Kernel A (current version)\n"
" Corrupt Kernel B (current version) runs Recovery):");
VBDEBUG(("\nSwapping boot priorities...\n"
"Kernel B boot priority(15) > Kernel A boot priority(1)\n"));
valid_kernelA.boot_priority = corrupt_kernelA.boot_priority = 1;
valid_kernelB.boot_priority = corrupt_kernelB.boot_priority = 15;
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&valid_kernelA, &valid_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_B_CONTINUE,
"(Valid Kernel A (current version)\n"
" Valid Kernel B (current version) runs B):");
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&corrupt_kernelA, &valid_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_B_CONTINUE,
"(Corrupt Kernel A (current version)\n"
" Valid Kernel B (current version) runs B):");
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&valid_kernelA, &corrupt_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_A_CONTINUE,
"(Valid Kernel A (current version)\n"
" Corrupt Kernel B (current version) runs A):");
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&corrupt_kernelA, &corrupt_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_RECOVERY_CONTINUE,
"(Corrupt Kernel A (current version)\n"
" Corrupt Kernel B (current version) runs Recovery):");
VBDEBUG(("\nUpdating stored version information. Obsoleting "
"exiting kernel images.\n"));
g_kernel_key_version = 2;
g_kernel_version = 2;
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&valid_kernelA, &valid_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_RECOVERY_CONTINUE,
"(Valid Kernel A (old version)\n"
" Valid Kernel B (old version) runs Recovery):");
VBDEBUG(("\nGenerating updated Kernel A blob with "
"new version.\n"));
Free(valid_kernelA.kernel_blob);
valid_kernelA.kernel_blob = GenerateRollbackTestKernelBlob(3, 3, 0);
TEST_EQ(VerifyKernelDriver_f(firmware_key_pub,
&valid_kernelA, &valid_kernelB,
DEV_MODE_DISABLED),
BOOT_KERNEL_A_CONTINUE,
"(Valid Kernel A (new version)\n"
" Valid Kernel B (old version) runs A):");
Free(valid_kernelA.kernel_blob);
Free(valid_kernelB.kernel_blob);
Free(corrupt_kernelA.kernel_blob);
Free(corrupt_kernelB.kernel_blob);
#endif
Free(firmware_key_pub);
}
int main(int argc, char* argv[]) {
int error_code = 0;
VerifyKernelDriverTest();
if (!gTestSuccess)
error_code = 255;
return error_code;
}
|