Home | History | Annotate | Download | only in component
      1 /*
      2  * Copyright (C) 2016 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 #include <string>
     18 #include <string_view>
     19 #include <vector>
     20 
     21 #include <android-base/file.h>
     22 #include <android-base/strings.h>
     23 #include <bootloader_message/bootloader_message.h>
     24 #include <gtest/gtest.h>
     25 
     26 using namespace std::string_literals;
     27 
     28 extern void SetMiscBlockDeviceForTest(std::string_view misc_device);
     29 
     30 TEST(BootloaderMessageTest, read_and_write_bootloader_message) {
     31   TemporaryFile temp_misc;
     32 
     33   // Write the BCB.
     34   bootloader_message boot = {};
     35   strlcpy(boot.command, "command", sizeof(boot.command));
     36   strlcpy(boot.recovery, "message1\nmessage2\n", sizeof(boot.recovery));
     37   strlcpy(boot.status, "status1", sizeof(boot.status));
     38 
     39   std::string err;
     40   ASSERT_TRUE(write_bootloader_message_to(boot, temp_misc.path, &err))
     41       << "Failed to write BCB: " << err;
     42 
     43   // Read and verify.
     44   bootloader_message boot_verify;
     45   ASSERT_TRUE(read_bootloader_message_from(&boot_verify, temp_misc.path, &err))
     46       << "Failed to read BCB: " << err;
     47 
     48   ASSERT_EQ(std::string(reinterpret_cast<const char*>(&boot), sizeof(boot)),
     49             std::string(reinterpret_cast<const char*>(&boot_verify), sizeof(boot_verify)));
     50 }
     51 
     52 TEST(BootloaderMessageTest, update_bootloader_message_in_struct) {
     53   // Write the options to BCB.
     54   std::vector<std::string> options = { "option1", "option2" };
     55 
     56   bootloader_message boot = {};
     57   // Inject some bytes into boot.
     58   strlcpy(boot.recovery, "random message", sizeof(boot.recovery));
     59   strlcpy(boot.status, "status bytes", sizeof(boot.status));
     60   strlcpy(boot.stage, "stage bytes", sizeof(boot.stage));
     61   strlcpy(boot.reserved, "reserved bytes", sizeof(boot.reserved));
     62 
     63   ASSERT_TRUE(update_bootloader_message_in_struct(&boot, options));
     64 
     65   // Verify that command and recovery fields should be set.
     66   ASSERT_EQ("boot-recovery", std::string(boot.command));
     67   std::string expected = "recovery\n" + android::base::Join(options, "\n") + "\n";
     68   ASSERT_EQ(expected, std::string(boot.recovery));
     69 
     70   // The rest should be intact.
     71   ASSERT_EQ("status bytes", std::string(boot.status));
     72   ASSERT_EQ("stage bytes", std::string(boot.stage));
     73   ASSERT_EQ("reserved bytes", std::string(boot.reserved));
     74 }
     75 
     76 TEST(BootloaderMessageTest, update_bootloader_message_recovery_options_empty) {
     77   // Write empty vector.
     78   std::vector<std::string> options;
     79 
     80   // Read and verify.
     81   bootloader_message boot = {};
     82   ASSERT_TRUE(update_bootloader_message_in_struct(&boot, options));
     83 
     84   // command and recovery fields should be set.
     85   ASSERT_EQ("boot-recovery", std::string(boot.command));
     86   ASSERT_EQ("recovery\n", std::string(boot.recovery));
     87 
     88   // The rest should be empty.
     89   ASSERT_EQ(std::string(sizeof(boot.status), '\0'), std::string(boot.status, sizeof(boot.status)));
     90   ASSERT_EQ(std::string(sizeof(boot.stage), '\0'), std::string(boot.stage, sizeof(boot.stage)));
     91   ASSERT_EQ(std::string(sizeof(boot.reserved), '\0'),
     92             std::string(boot.reserved, sizeof(boot.reserved)));
     93 }
     94 
     95 TEST(BootloaderMessageTest, update_bootloader_message_recovery_options_long) {
     96   // Write super long message.
     97   std::vector<std::string> options;
     98   for (int i = 0; i < 100; i++) {
     99     options.push_back("option: " + std::to_string(i));
    100   }
    101 
    102   // Read and verify.
    103   bootloader_message boot = {};
    104   ASSERT_TRUE(update_bootloader_message_in_struct(&boot, options));
    105 
    106   // Make sure it's long enough.
    107   std::string expected = "recovery\n" + android::base::Join(options, "\n") + "\n";
    108   ASSERT_GE(expected.size(), sizeof(boot.recovery));
    109 
    110   // command and recovery fields should be set.
    111   ASSERT_EQ("boot-recovery", std::string(boot.command));
    112   ASSERT_EQ(expected.substr(0, sizeof(boot.recovery) - 1), std::string(boot.recovery));
    113   ASSERT_EQ('\0', boot.recovery[sizeof(boot.recovery) - 1]);
    114 
    115   // The rest should be empty.
    116   ASSERT_EQ(std::string(sizeof(boot.status), '\0'), std::string(boot.status, sizeof(boot.status)));
    117   ASSERT_EQ(std::string(sizeof(boot.stage), '\0'), std::string(boot.stage, sizeof(boot.stage)));
    118   ASSERT_EQ(std::string(sizeof(boot.reserved), '\0'),
    119             std::string(boot.reserved, sizeof(boot.reserved)));
    120 }
    121 
    122 TEST(BootloaderMessageTest, WriteMiscPartitionVendorSpace) {
    123   TemporaryFile temp_misc;
    124   ASSERT_TRUE(android::base::WriteStringToFile(std::string(4096, '\x00'), temp_misc.path));
    125   SetMiscBlockDeviceForTest(temp_misc.path);
    126 
    127   constexpr std::string_view kTestMessage = "kTestMessage";
    128   std::string err;
    129   ASSERT_TRUE(WriteMiscPartitionVendorSpace(kTestMessage.data(), kTestMessage.size(), 0, &err));
    130 
    131   std::string message;
    132   message.resize(kTestMessage.size());
    133   ASSERT_TRUE(ReadMiscPartitionVendorSpace(message.data(), message.size(), 0, &err));
    134   ASSERT_EQ(kTestMessage, message);
    135 
    136   // Write with an offset.
    137   ASSERT_TRUE(WriteMiscPartitionVendorSpace("\x00\x00", 2, 5, &err));
    138   ASSERT_TRUE(ReadMiscPartitionVendorSpace(message.data(), message.size(), 0, &err));
    139   ASSERT_EQ("kTest\x00\x00ssage"s, message);
    140 
    141   // Write with the right size.
    142   auto start_offset =
    143       WIPE_PACKAGE_OFFSET_IN_MISC - VENDOR_SPACE_OFFSET_IN_MISC - kTestMessage.size();
    144   ASSERT_TRUE(
    145       WriteMiscPartitionVendorSpace(kTestMessage.data(), kTestMessage.size(), start_offset, &err));
    146 
    147   // Out-of-bound write.
    148   ASSERT_FALSE(WriteMiscPartitionVendorSpace(kTestMessage.data(), kTestMessage.size(),
    149                                              start_offset + 1, &err));
    150 
    151   // Message won't fit.
    152   std::string long_message(WIPE_PACKAGE_OFFSET_IN_MISC - VENDOR_SPACE_OFFSET_IN_MISC + 1, 'a');
    153   ASSERT_FALSE(WriteMiscPartitionVendorSpace(long_message.data(), long_message.size(), 0, &err));
    154 }
    155