/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved. * Use of this source code is governed by a BSD-style license that can be * found in the LICENSE file. * * Tests for vboot_api_kernel, part 3 - software sync */ #include "2common.h" #include "2misc.h" #include "2nvstorage.h" #include "2secdata.h" #include "2sysincludes.h" #include "host_common.h" #include "load_kernel_fw.h" #include "test_common.h" #include "vboot_struct.h" /* Mock data */ static int ec_ro_updated; static int ec_rw_updated; static int ec_ro_protected; static int ec_rw_protected; static int ec_run_image; /* 0 = RO, 1 = RW */ static vb2_error_t in_rw_retval; static int protect_retval; static int jump_retval; static int update_retval; static int get_expected_retval; static int shutdown_request_calls_left; static vb2_error_t ec_vboot_done_retval; static int ec_vboot_done_calls; static int mock_display_available; static uint8_t mock_ec_ro_hash[32]; static uint8_t mock_ec_rw_hash[32]; static uint8_t hmir[32]; static int mock_ec_ro_hash_size; static int mock_ec_rw_hash_size; static uint8_t hexp[32]; static uint8_t update_hash; static int hexp_size; static uint8_t workbuf[VB2_KERNEL_WORKBUF_RECOMMENDED_SIZE] __attribute__((aligned(VB2_WORKBUF_ALIGN))); static struct vb2_context *ctx; static struct vb2_shared_data *sd; static struct vb2_gbb_header gbb; /* Reset mock data (for use before each test) */ static void ResetMocks(void) { TEST_SUCC(vb2api_init(workbuf, sizeof(workbuf), &ctx), "vb2api_init passed"); ctx->flags = VB2_CONTEXT_EC_SYNC_SUPPORTED; vb2_nv_init(ctx); sd = vb2_get_sd(ctx); memset(&gbb, 0, sizeof(gbb)); mock_display_available = 1; ec_ro_updated = 0; ec_rw_updated = 0; ec_ro_protected = 0; ec_rw_protected = 0; ec_run_image = 0; in_rw_retval = VB2_SUCCESS; protect_retval = VB2_SUCCESS; update_retval = VB2_SUCCESS; jump_retval = VB2_SUCCESS; get_expected_retval = VB2_SUCCESS; shutdown_request_calls_left = -1; ec_vboot_done_retval = VB2_SUCCESS; ec_vboot_done_calls = 0; memset(mock_ec_ro_hash, 0, sizeof(mock_ec_ro_hash)); mock_ec_ro_hash[0] = 42; mock_ec_ro_hash_size = sizeof(mock_ec_ro_hash); memset(mock_ec_rw_hash, 0, sizeof(mock_ec_rw_hash)); mock_ec_rw_hash[0] = 42; mock_ec_rw_hash_size = sizeof(mock_ec_rw_hash); memset(hexp, 0, sizeof(hexp)); hexp[0] = 42; hexp_size = sizeof(hexp); update_hash = 42; vb2api_secdata_kernel_create(ctx); vb2_secdata_kernel_init(ctx); memset(hmir, 0, sizeof(hmir)); hmir[0] = 42; vb2_secdata_kernel_set_ec_hash(ctx, hmir); /* * This flag should not involve in the steps deciding whether EC is * running RW. The only concern here is we need to clear this flag after * attempting a jump to RW. */ ctx->flags |= VB2_CONTEXT_EC_TRUSTED; } /* Mock functions */ struct vb2_gbb_header *vb2_get_gbb(struct vb2_context *c) { return &gbb; } vb2_error_t vb2ex_ec_running_rw(int *in_rw) { *in_rw = ec_run_image; return in_rw_retval; } vb2_error_t vb2ex_ec_protect(enum vb2_firmware_selection select) { if (protect_retval) return protect_retval; if (select == VB_SELECT_FIRMWARE_READONLY) ec_ro_protected = 1; else ec_rw_protected = 1; return VB2_SUCCESS; } vb2_error_t vb2ex_ec_disable_jump(void) { return VB2_SUCCESS; } vb2_error_t vb2ex_ec_jump_to_rw(void) { if (jump_retval == VB2_SUCCESS) ec_run_image = 1; return jump_retval; } vb2_error_t vb2ex_ec_hash_image(enum vb2_firmware_selection select, const uint8_t **hash, int *hash_size) { *hash = select == VB_SELECT_FIRMWARE_READONLY ? mock_ec_ro_hash : mock_ec_rw_hash; *hash_size = select == VB_SELECT_FIRMWARE_READONLY ? mock_ec_ro_hash_size : mock_ec_rw_hash_size; return *hash_size ? VB2_SUCCESS : VB2_ERROR_MOCK; } vb2_error_t vb2ex_ec_get_expected_image_hash(enum vb2_firmware_selection select, const uint8_t **hash, int *hash_size) { *hash = hexp; *hash_size = hexp_size; return hexp_size ? VB2_SUCCESS : VB2_ERROR_MOCK; } vb2_error_t vb2ex_ec_update_image(enum vb2_firmware_selection select) { if (update_retval) return update_retval; if (!mock_display_available) return VB2_REQUEST_REBOOT; if (select == VB_SELECT_FIRMWARE_READONLY) { ec_ro_updated = 1; mock_ec_ro_hash[0] = update_hash; } else { ec_rw_updated = 1; mock_ec_rw_hash[0] = update_hash; } return VB2_SUCCESS; } vb2_error_t vb2ex_ec_vboot_done(struct vb2_context *c) { ec_vboot_done_calls++; return ec_vboot_done_retval; } static void test_ssync(vb2_error_t retval, int recovery_reason, const char *desc) { TEST_EQ(vb2api_ec_sync(ctx), retval, desc); TEST_EQ(vb2_nv_get(ctx, VB2_NV_RECOVERY_REQUEST), recovery_reason, " recovery reason"); struct vb2_secdata_kernel_v1 *sec = (void *)ctx->secdata_kernel; if (sec->struct_version >= VB2_SECDATA_KERNEL_VERSION_V10) { const uint8_t *hash = vb2_secdata_kernel_get_ec_hash(ctx); TEST_EQ(memcmp(hash, hexp, sizeof(hexp)), 0, "Hmir synced"); } } /* Tests */ static void VbSoftwareSyncTest(void) { /* Check flag toggling */ ResetMocks(); test_ssync(VB2_SUCCESS, 0, "Normal (no) sync"); TEST_NEQ(sd->status & VB2_SD_STATUS_EC_SYNC_COMPLETE, 0, " EC sync complete"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); TEST_EQ(ec_vboot_done_calls, 1, "ec_vboot_done calls"); /* Sync again to check ec_vboot_done */ test_ssync(VB2_SUCCESS, 0, "Normal sync"); TEST_EQ(ec_vboot_done_calls, 1, "ec_vboot_done calls"); ResetMocks(); sd->status |= VB2_SD_STATUS_EC_SYNC_COMPLETE; test_ssync(VB2_SUCCESS, 0, "EC sync already complete"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); TEST_EQ(ec_vboot_done_calls, 0, "ec_vboot_done calls"); ResetMocks(); ctx->flags &= ~VB2_CONTEXT_EC_SYNC_SUPPORTED; test_ssync(VB2_SUCCESS, 0, "EC sync not supported"); TEST_NEQ(sd->status & VB2_SD_STATUS_EC_SYNC_COMPLETE, 0, " EC sync complete"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); TEST_EQ(ec_vboot_done_calls, 1, "ec_vboot_done calls"); ResetMocks(); gbb.flags |= VB2_GBB_FLAG_DISABLE_EC_SOFTWARE_SYNC; test_ssync(VB2_SUCCESS, 0, "EC sync disabled by GBB"); TEST_NEQ(sd->status & VB2_SD_STATUS_EC_SYNC_COMPLETE, 0, " EC sync complete"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); TEST_EQ(ec_vboot_done_calls, 1, "ec_vboot_done calls"); /* AP-RO cases */ ResetMocks(); in_rw_retval = VB2_ERROR_MOCK; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_UNKNOWN_IMAGE, "Unknown EC image"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); /* Calculate hashes */ ResetMocks(); mock_ec_rw_hash_size = 0; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_HASH_FAILED, "Bad EC hash"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); mock_ec_rw_hash_size = 16; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_HASH_SIZE, "Bad EC hash size"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); hexp_size = 0; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_EXPECTED_HASH, "Bad precalculated hash"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); hexp_size = 16; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_HASH_SIZE, "Hash size mismatch"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); hexp_size = 4; mock_ec_rw_hash_size = 4; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_HASH_SIZE, "Custom hash size secdata_kernel v1"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); vb2api_secdata_kernel_create_v0(ctx); vb2_secdata_kernel_init(ctx); hexp_size = 4; mock_ec_rw_hash_size = 4; test_ssync(0, 0, "Custom hash size secdata_kernel v0"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); /* Updates required */ ResetMocks(); ec_run_image = 1; mock_ec_rw_hash[0]++; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Pending update needs reboot"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); /* Hexp != Hmir == Heff */ ResetMocks(); hmir[0] = 43; vb2_secdata_kernel_set_ec_hash(ctx, hmir); ec_run_image = 1; mock_ec_rw_hash[0] = 43; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Reboot after synching Hmir"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); /* Hexp == Hmir != Heff */ ResetMocks(); ec_run_image = 0; ctx->flags |= VB2_CONTEXT_NO_BOOT; mock_ec_rw_hash[0] = 43; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Reboot after synching Heff"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 1, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); /* Hexp != Hmir != Heff */ ResetMocks(); hmir[0] = 44; vb2_secdata_kernel_set_ec_hash(ctx, hmir); ec_run_image = 0; ctx->flags |= VB2_CONTEXT_NO_BOOT; mock_ec_rw_hash[0] = 43; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Reboot after synching Hmir and Heff"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 1, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); /* Hexp == Heff != Hmir */ ResetMocks(); hmir[0] = 44; vb2_secdata_kernel_set_ec_hash(ctx, hmir); ec_run_image = 0; ctx->flags |= VB2_CONTEXT_NO_BOOT; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Reboot after synching Hmir"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); mock_ec_rw_hash[0]++; vb2_nv_set(ctx, VB2_NV_TRY_RO_SYNC, 1); test_ssync(0, 0, "Update rw without reboot"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 1, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); ResetMocks(); mock_ec_rw_hash[0]++; mock_ec_ro_hash[0]++; vb2_nv_set(ctx, VB2_NV_TRY_RO_SYNC, 1); test_ssync(0, 0, "Update rw and ro images without reboot"); TEST_EQ(ec_ro_updated, 1, " ec ro updated"); TEST_EQ(ec_rw_updated, 1, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); ResetMocks(); vb2_nv_set(ctx, VB2_NV_TRY_RO_SYNC, 1); mock_ec_ro_hash[0]++; vb2_nv_set(ctx, VB2_NV_DISPLAY_REQUEST, 1); test_ssync(0, 0, "rw update not needed"); TEST_EQ(ec_ro_updated, 1, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); TEST_EQ(vb2_nv_get(ctx, VB2_NV_DISPLAY_REQUEST), 1, " DISPLAY_REQUEST left untouched"); ResetMocks(); mock_ec_rw_hash[0]++; mock_ec_ro_hash[0]++; test_ssync(0, 0, "ro update not requested"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 1, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); ResetMocks(); mock_ec_rw_hash[0]++; update_hash++; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, VB2_RECOVERY_EC_UPDATE, "Updated hash mismatch"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 1, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); mock_ec_rw_hash[0]++; update_retval = VB2_REQUEST_REBOOT_EC_TO_RO; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Reboot for rw update"); TEST_EQ(ec_ro_updated, 0, " ec rw updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); ResetMocks(); mock_ec_rw_hash[0]++; update_retval = VB2_ERROR_MOCK; test_ssync(VB2_ERROR_MOCK, VB2_RECOVERY_EC_UPDATE, "Update failed"); TEST_EQ(ec_ro_updated, 0, " ec rw updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); /* Display not available - RW */ ResetMocks(); mock_ec_rw_hash[0]++; mock_display_available = 0; test_ssync(VB2_REQUEST_REBOOT, 0, "Reboot for display - ec rw"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); /* Display not available - RO */ ResetMocks(); vb2_nv_set(ctx, VB2_NV_TRY_RO_SYNC, 1); mock_ec_ro_hash[0]++; mock_display_available = 0; test_ssync(VB2_REQUEST_REBOOT, 0, "Reboot for display - ec ro"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); /* RW cases, no update */ ResetMocks(); ec_run_image = 1; test_ssync(0, 0, "AP-RW, EC-RW"); TEST_EQ(ec_ro_updated, 0, "ec ro updated"); TEST_EQ(ec_rw_updated, 0, "ec rw updated"); TEST_EQ(ec_ro_protected, 1, "ec ro protected"); TEST_EQ(ec_rw_protected, 1, "ec rw protected"); TEST_EQ(ec_run_image, 1, "ec run image"); TEST_FALSE(ctx->flags & VB2_CONTEXT_EC_TRUSTED, " VB2_CONTEXT_EC_TRUSTED is cleared"); ResetMocks(); test_ssync(0, 0, "AP-RW, EC-RO -> EC-RW"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 1, " ec ro protected"); TEST_EQ(ec_rw_protected, 1, " ec rw protected"); TEST_EQ(ec_run_image, 1, " ec run image"); TEST_FALSE(ctx->flags & VB2_CONTEXT_EC_TRUSTED, " VB2_CONTEXT_EC_TRUSTED is cleared"); ResetMocks(); jump_retval = VB2_ERROR_MOCK; test_ssync(VB2_ERROR_MOCK, VB2_RECOVERY_EC_JUMP_RW, "Jump to RW fail"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); TEST_FALSE(ctx->flags & VB2_CONTEXT_EC_TRUSTED, " VB2_CONTEXT_EC_TRUSTED is cleared"); ResetMocks(); jump_retval = VB2_REQUEST_REBOOT_EC_TO_RO; test_ssync(VB2_REQUEST_REBOOT_EC_TO_RO, 0, "Jump to RW fail because locked"); TEST_EQ(ec_ro_updated, 0, " ec ro updated"); TEST_EQ(ec_rw_updated, 0, " ec rw updated"); TEST_EQ(ec_ro_protected, 0, " ec ro protected"); TEST_EQ(ec_rw_protected, 0, " ec rw protected"); TEST_EQ(ec_run_image, 0, " ec run image"); TEST_FALSE(ctx->flags & VB2_CONTEXT_EC_TRUSTED, " VB2_CONTEXT_EC_TRUSTED is cleared"); ResetMocks(); protect_retval = VB2_ERROR_MOCK; test_ssync(VB2_ERROR_MOCK, VB2_RECOVERY_EC_PROTECT, "Protect error"); TEST_EQ(ec_ro_updated, 0, "ec ro updated"); TEST_EQ(ec_rw_updated, 0, "ec rw updated"); TEST_EQ(ec_ro_protected, 0, "ec ro protected"); TEST_EQ(ec_rw_protected, 0, "ec rw protected"); TEST_EQ(ec_run_image, 1, "ec run image"); TEST_FALSE(ctx->flags & VB2_CONTEXT_EC_TRUSTED, " VB2_CONTEXT_EC_TRUSTED is cleared"); /* No longer check for shutdown requested */ ResetMocks(); shutdown_request_calls_left = 0; test_ssync(0, 0, "AP-RW, EC-RO -> EC-RW shutdown requested"); TEST_EQ(ec_ro_updated, 0, "ec ro updated"); TEST_EQ(ec_rw_updated, 0, "ec rw updated"); TEST_EQ(ec_ro_protected, 1, "ec ro protected"); TEST_EQ(ec_rw_protected, 1, "ec rw protected"); TEST_EQ(ec_run_image, 1, "ec run image"); ResetMocks(); ec_run_image = 1; shutdown_request_calls_left = 0; test_ssync(0, 0, "AP-RW shutdown requested"); TEST_EQ(ec_ro_updated, 0, "ec ro updated"); TEST_EQ(ec_rw_updated, 0, "ec rw updated"); TEST_EQ(ec_ro_protected, 1, "ec ro protected"); TEST_EQ(ec_rw_protected, 1, "ec rw protected"); TEST_EQ(ec_run_image, 1, "ec run image"); /* EC sync not allowed in recovery mode */ ResetMocks(); ctx->flags |= VB2_CONTEXT_RECOVERY_MODE; test_ssync(0, 0, "No sync in recovery mode"); TEST_EQ(ec_ro_updated, 0, "ec ro updated"); TEST_EQ(ec_rw_updated, 0, "ec rw updated"); TEST_EQ(ec_ro_protected, 0, "ec ro protected"); TEST_EQ(ec_rw_protected, 0, "ec rw protected"); TEST_EQ(ec_run_image, 0, "ec run image"); } int main(void) { VbSoftwareSyncTest(); return gTestSuccess ? 0 : 255; }