Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(976)

Unified Diff: utility/load_kernel2_test.c

Issue 2800007: Add load_kernel2_test (Closed) Base URL: ssh://gitrw.chromium.org/vboot_reference.git
Patch Set: Created 10 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « utility/Makefile ('k') | vboot_firmware/include/load_kernel_fw.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: utility/load_kernel2_test.c
diff --git a/utility/load_kernel2_test.c b/utility/load_kernel2_test.c
new file mode 100644
index 0000000000000000000000000000000000000000..3d50211b4308f175b824ea9ada9be362a2fc1700
--- /dev/null
+++ b/utility/load_kernel2_test.c
@@ -0,0 +1,145 @@
+/* Copyright (c) 2010 The Chromium OS Authors. All rights reserved.
+ * Use of this source code is governed by a BSD-style license that can be
+ * found in the LICENSE file.
+ */
+
+/* Routines for verifying a file's signature. Useful in testing the core
+ * RSA verification implementation.
+ */
+
+#include <inttypes.h> /* For PRIu64 macro */
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <sys/types.h>
+
+#include "load_kernel_fw.h"
+#include "boot_device.h"
+#include "host_common.h"
+#include "rollback_index.h"
+#include "utility.h"
+#include "vboot_kernel.h"
+
+/* ANSI Color coding sequences. */
+#define COL_GREEN "\e[1;32m"
+#define COL_RED "\e[0;31m"
+#define COL_STOP "\e[m"
+
+
+#define LBA_BYTES 512
+#define KERNEL_BUFFER_SIZE 0x600000
+
+/* Global variables for stub functions */
+static LoadKernelParams lkp;
+static FILE *image_file = NULL;
+
+
+/* Boot device stub implementations to read from the image file */
+int BootDeviceReadLBA(uint64_t lba_start, uint64_t lba_count, void *buffer) {
+ printf("Read(%" PRIu64 ", %" PRIu64 ")\n", lba_start, lba_count);
+
+ if (lba_start > lkp.ending_lba ||
+ lba_start + lba_count - 1 > lkp.ending_lba) {
+ fprintf(stderr, "Read overrun: %" PRIu64 " + %" PRIu64 " > %" PRIu64 "\n",
+ lba_start, lba_count, lkp.ending_lba);
+ return 1;
+ }
+
+ fseek(image_file, lba_start * lkp.bytes_per_lba, SEEK_SET);
+ if (1 != fread(buffer, lba_count * lkp.bytes_per_lba, 1, image_file)) {
+ fprintf(stderr, "Read error.");
+ return 1;
+ }
+ return 0;
+}
+
+
+int BootDeviceWriteLBA(uint64_t lba_start, uint64_t lba_count,
+ const void *buffer) {
+ printf("Write(%" PRIu64 ", %" PRIu64 ")\n", lba_start, lba_count);
+
+ if (lba_start > lkp.ending_lba ||
+ lba_start + lba_count - 1 > lkp.ending_lba) {
+ fprintf(stderr, "Read overrun: %" PRIu64 " + %" PRIu64 " > %" PRIu64 "\n",
+ lba_start, lba_count, lkp.ending_lba);
+ return 1;
+ }
+
+ /* TODO: enable writes, once we're sure it won't trash our example file */
+ return 0;
+
+ fseek(image_file, lba_start * lkp.bytes_per_lba, SEEK_SET);
+ if (1 != fwrite(buffer, lba_count * lkp.bytes_per_lba, 1, image_file)) {
+ fprintf(stderr, "Read error.");
+ return 1;
+ }
+ return 0;
+}
+
+
+/* Main routine */
+int main(int argc, char* argv[]) {
+
+ const char* image_name;
+ const char* keyfile_name;
+ int rv;
+
+ Memset(&lkp, 0, sizeof(LoadKernelParams));
+ lkp.bytes_per_lba = LBA_BYTES;
+
+ /* Read command line parameters */
+ if (3 > argc) {
+ fprintf(stderr, "usage: %s <drive_image> <sign_key>\n", argv[0]);
+ return 1;
+ }
+ image_name = argv[1];
+ keyfile_name = argv[2];
+
+ /* Read header signing key blob */
+ {
+ uint64_t key_size;
+ lkp.header_sign_key_blob = ReadFile(keyfile_name, &key_size);
+ if (!lkp.header_sign_key_blob) {
+ fprintf(stderr, "Unable to read key file %s\n", keyfile_name);
+ return 1;
+ }
+ }
+
+ /* Get image size */
+ printf("Reading from image: %s\n", image_name);
+ image_file = fopen(image_name, "rb");
+ if (!image_file) {
+ fprintf(stderr, "Unable to open image file %s\n", image_name);
+ return 1;
+ }
+ fseek(image_file, 0, SEEK_END);
+ lkp.ending_lba = (ftell(image_file) / LBA_BYTES) - 1;
+ rewind(image_file);
+ printf("Ending LBA: %" PRIu64 "\n", lkp.ending_lba);
+
+ /* Allocate a buffer for the kernel */
+ lkp.kernel_buffer = Malloc(KERNEL_BUFFER_SIZE);
+ if(!lkp.kernel_buffer) {
+ fprintf(stderr, "Unable to allocate kernel buffer.\n");
+ return 1;
+ }
+
+ /* TODO: Option for boot mode - developer, recovery */
+ /* Need to skip the address check, since we're putting it somewhere on the
+ * heap instead of its actual target address in the firmware. */
+ lkp.boot_flags = BOOT_FLAG_SKIP_ADDR_CHECK;
+
+ /* Call LoadKernel() */
+ rv = LoadKernel2(&lkp);
+ printf("LoadKernel() returned %d\n", rv);
+
+ if (LOAD_KERNEL_SUCCESS == rv) {
+ printf("Partition number: %" PRIu64 "\n", lkp.partition_number);
+ printf("Bootloader address: %" PRIu64 "\n", lkp.bootloader_address);
+ printf("Bootloader size: %" PRIu64 "\n", lkp.bootloader_size);
+ }
+
+ fclose(image_file);
+ Free(lkp.kernel_buffer);
+ return 0;
+}
« no previous file with comments | « utility/Makefile ('k') | vboot_firmware/include/load_kernel_fw.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698