blob: 52119f3cd4c1dfe27b875049a874c2e51c771cbb [file] [log] [blame]
/*
* Copyright (C) 2022 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
mod utils;
use anyhow::Result;
use avb_bindgen::{AvbFooter, AvbVBMetaImageHeader};
use pvmfw_avb::{AvbSlotVerifyError, DebugLevel};
use std::{fs, mem::size_of, ptr};
use utils::*;
const TEST_IMG_WITH_ONE_HASHDESC_PATH: &str = "test_image_with_one_hashdesc.img";
const TEST_IMG_WITH_PROP_DESC_PATH: &str = "test_image_with_prop_desc.img";
const TEST_IMG_WITH_NON_INITRD_HASHDESC_PATH: &str = "test_image_with_non_initrd_hashdesc.img";
const UNSIGNED_TEST_IMG_PATH: &str = "unsigned_test.img";
const RANDOM_FOOTER_POS: usize = 30;
/// This test uses the Microdroid payload compiled on the fly to check that
/// the latest payload can be verified successfully.
#[test]
fn latest_normal_payload_passes_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Ok(DebugLevel::None),
)
}
#[test]
fn latest_debug_payload_passes_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
&load_latest_initrd_debug()?,
&load_trusted_public_key()?,
Ok(DebugLevel::Full),
)
}
#[test]
fn payload_expecting_no_initrd_passes_verification_with_no_initrd() -> Result<()> {
assert_payload_verification_eq(
&fs::read(TEST_IMG_WITH_ONE_HASHDESC_PATH)?,
/*initrd=*/ None,
&load_trusted_public_key()?,
Ok(DebugLevel::None),
)
}
#[test]
fn payload_with_non_initrd_descriptor_passes_verification_with_no_initrd() -> Result<()> {
assert_payload_verification_eq(
&fs::read(TEST_IMG_WITH_NON_INITRD_HASHDESC_PATH)?,
/*initrd=*/ None,
&load_trusted_public_key()?,
Ok(DebugLevel::None),
)
}
#[test]
fn payload_with_prop_descriptor_fails_verification_with_no_initrd() -> Result<()> {
assert_payload_verification_eq(
&fs::read(TEST_IMG_WITH_PROP_DESC_PATH)?,
/*initrd=*/ None,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::InvalidMetadata),
)
}
#[test]
fn payload_expecting_initrd_fails_verification_with_no_initrd() -> Result<()> {
assert_payload_verification_eq(
&load_latest_signed_kernel()?,
/*initrd=*/ None,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::InvalidMetadata),
)
}
#[test]
fn payload_with_empty_public_key_fails_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
&load_latest_initrd_normal()?,
/*trusted_public_key=*/ &[0u8; 0],
Err(AvbSlotVerifyError::PublicKeyRejected),
)
}
#[test]
fn payload_with_an_invalid_public_key_fails_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
&load_latest_initrd_normal()?,
/*trusted_public_key=*/ &[0u8; 512],
Err(AvbSlotVerifyError::PublicKeyRejected),
)
}
#[test]
fn payload_with_a_different_valid_public_key_fails_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
&load_latest_initrd_normal()?,
&fs::read(PUBLIC_KEY_RSA2048_PATH)?,
Err(AvbSlotVerifyError::PublicKeyRejected),
)
}
#[test]
fn payload_with_an_invalid_initrd_fails_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
/*initrd=*/ &fs::read(UNSIGNED_TEST_IMG_PATH)?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Verification),
)
}
#[test]
fn unsigned_kernel_fails_verification() -> Result<()> {
assert_payload_verification_with_initrd_eq(
&fs::read(UNSIGNED_TEST_IMG_PATH)?,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Io),
)
}
#[test]
fn tampered_kernel_fails_verification() -> Result<()> {
let mut kernel = load_latest_signed_kernel()?;
kernel[1] = !kernel[1]; // Flip the bits
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Verification),
)
}
#[test]
fn kernel_footer_with_vbmeta_offset_overwritten_fails_verification() -> Result<()> {
// Arrange.
let mut kernel = load_latest_signed_kernel()?;
let total_len = kernel.len() as u64;
let footer = extract_avb_footer(&kernel)?;
assert!(footer.vbmeta_offset < total_len);
let vbmeta_offset_addr = ptr::addr_of!(footer.vbmeta_offset) as *const u8;
// SAFETY: It is safe as both raw pointers `vbmeta_offset_addr` and `footer` are not null.
let vbmeta_offset_start =
unsafe { vbmeta_offset_addr.offset_from(ptr::addr_of!(footer) as *const u8) };
let footer_start = kernel.len() - size_of::<AvbFooter>();
let vbmeta_offset_start = footer_start + usize::try_from(vbmeta_offset_start)?;
let wrong_offsets = [total_len, u64::MAX];
for &wrong_offset in wrong_offsets.iter() {
// Act.
kernel[vbmeta_offset_start..(vbmeta_offset_start + size_of::<u64>())]
.copy_from_slice(&wrong_offset.to_be_bytes());
// Assert.
let _footer = extract_avb_footer(&kernel)?;
//assert_eq!(wrong_offset, footer.vbmeta_offset);
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Io),
)?;
}
Ok(())
}
#[test]
fn tampered_kernel_footer_fails_verification() -> Result<()> {
let mut kernel = load_latest_signed_kernel()?;
let avb_footer_index = kernel.len() - size_of::<AvbFooter>() + RANDOM_FOOTER_POS;
kernel[avb_footer_index] = !kernel[avb_footer_index];
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::InvalidMetadata),
)
}
#[test]
fn extended_initrd_fails_verification() -> Result<()> {
let mut initrd = load_latest_initrd_normal()?;
initrd.extend(b"androidboot.vbmeta.digest=1111");
assert_payload_verification_with_initrd_eq(
&load_latest_signed_kernel()?,
&initrd,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Verification),
)
}
#[test]
fn tampered_vbmeta_fails_verification() -> Result<()> {
let mut kernel = load_latest_signed_kernel()?;
let footer = extract_avb_footer(&kernel)?;
let vbmeta_index: usize = (footer.vbmeta_offset + 1).try_into()?;
kernel[vbmeta_index] = !kernel[vbmeta_index]; // Flip the bits
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::InvalidMetadata),
)
}
#[test]
fn vbmeta_with_public_key_overwritten_fails_verification() -> Result<()> {
let mut kernel = load_latest_signed_kernel()?;
let footer = extract_avb_footer(&kernel)?;
let vbmeta_header = extract_vbmeta_header(&kernel, &footer)?;
let public_key_offset = footer.vbmeta_offset as usize
+ size_of::<AvbVBMetaImageHeader>()
+ vbmeta_header.authentication_data_block_size as usize
+ vbmeta_header.public_key_offset as usize;
let public_key_size: usize = vbmeta_header.public_key_size.try_into()?;
let empty_public_key = vec![0u8; public_key_size];
kernel[public_key_offset..(public_key_offset + public_key_size)]
.copy_from_slice(&empty_public_key);
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&empty_public_key,
Err(AvbSlotVerifyError::Verification),
)?;
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Verification),
)
}
#[test]
fn vbmeta_with_verification_flag_disabled_fails_verification() -> Result<()> {
// From external/avb/libavb/avb_vbmeta_image.h
const AVB_VBMETA_IMAGE_FLAGS_VERIFICATION_DISABLED: u32 = 2;
// Arrange.
let mut kernel = load_latest_signed_kernel()?;
let footer = extract_avb_footer(&kernel)?;
let vbmeta_header = extract_vbmeta_header(&kernel, &footer)?;
//assert_eq!(
// 0, vbmeta_header.flags,
// "The disable flag should not be set in the latest kernel."
//);
let flags_addr = ptr::addr_of!(vbmeta_header.flags) as *const u8;
// SAFETY: It is safe as both raw pointers `flags_addr` and `vbmeta_header` are not null.
let flags_offset = unsafe { flags_addr.offset_from(ptr::addr_of!(vbmeta_header) as *const u8) };
let flags_offset = usize::try_from(footer.vbmeta_offset)? + usize::try_from(flags_offset)?;
// Act.
kernel[flags_offset..(flags_offset + size_of::<u32>())]
.copy_from_slice(&AVB_VBMETA_IMAGE_FLAGS_VERIFICATION_DISABLED.to_be_bytes());
// Assert.
let _vbmeta_header = extract_vbmeta_header(&kernel, &footer)?;
//assert_eq!(
// AVB_VBMETA_IMAGE_FLAGS_VERIFICATION_DISABLED, vbmeta_header.flags,
// "VBMeta verification flag should be disabled now."
//);
assert_payload_verification_with_initrd_eq(
&kernel,
&load_latest_initrd_normal()?,
&load_trusted_public_key()?,
Err(AvbSlotVerifyError::Verification),
)
}