Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2021 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 16 | |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 17 | #include <aidl/com/android/microdroid/testservice/BnTestService.h> |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 18 | #include <android-base/file.h> |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 19 | #include <android-base/properties.h> |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 20 | #include <android-base/result.h> |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 21 | #include <android/log.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 22 | #include <fcntl.h> |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 23 | #include <fsverity_digests.pb.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 24 | #include <linux/vm_sockets.h> |
| 25 | #include <stdint.h> |
Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 26 | #include <stdio.h> |
Jiyong Park | 2393439 | 2021-06-16 01:59:10 +0900 | [diff] [blame] | 27 | #include <sys/system_properties.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 28 | #include <unistd.h> |
Alan Stokes | 52d3c72 | 2022-10-04 17:27:13 +0100 | [diff] [blame] | 29 | #include <vm_main.h> |
Alan Stokes | d4ea5a8 | 2022-11-10 12:17:42 +0000 | [diff] [blame] | 30 | #include <vm_payload_restricted.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 31 | |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 32 | #include <string> |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 33 | #include <thread> |
Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 34 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 35 | using android::base::borrowed_fd; |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 36 | using android::base::ErrnoError; |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 37 | using android::base::Error; |
| 38 | using android::base::Result; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 39 | using android::base::unique_fd; |
| 40 | |
| 41 | using aidl::com::android::microdroid::testservice::BnTestService; |
| 42 | using ndk::ScopedAStatus; |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 43 | |
Jiyong Park | fe5b28e | 2021-06-24 00:19:02 +0900 | [diff] [blame] | 44 | extern void testlib_sub(); |
| 45 | |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 46 | namespace { |
| 47 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 48 | constexpr char TAG[] = "testbinary"; |
| 49 | |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 50 | template <typename T> |
Andrew Scull | edbe75e | 2021-07-06 10:44:31 +0000 | [diff] [blame] | 51 | Result<T> report_test(std::string name, Result<T> result) { |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 52 | auto property = "debug.microdroid.test." + name; |
| 53 | std::stringstream outcome; |
| 54 | if (result.ok()) { |
| 55 | outcome << "PASS"; |
| 56 | } else { |
| 57 | outcome << "FAIL: " << result.error(); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 58 | // Log the error in case the property is truncated. |
| 59 | std::string message = name + ": " + outcome.str(); |
| 60 | __android_log_write(ANDROID_LOG_WARN, TAG, message.c_str()); |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 61 | } |
| 62 | __system_property_set(property.c_str(), outcome.str().c_str()); |
Andrew Scull | edbe75e | 2021-07-06 10:44:31 +0000 | [diff] [blame] | 63 | return result; |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 64 | } |
| 65 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 66 | Result<void> run_echo_reverse_server(borrowed_fd listening_fd) { |
| 67 | struct sockaddr_vm client_sa = {}; |
| 68 | socklen_t client_sa_len = sizeof(client_sa); |
| 69 | unique_fd connect_fd{accept4(listening_fd.get(), (struct sockaddr*)&client_sa, &client_sa_len, |
| 70 | SOCK_CLOEXEC)}; |
| 71 | if (!connect_fd.ok()) { |
| 72 | return ErrnoError() << "Failed to accept vsock connection"; |
| 73 | } |
| 74 | |
| 75 | unique_fd input_fd{fcntl(connect_fd, F_DUPFD_CLOEXEC, 0)}; |
| 76 | if (!input_fd.ok()) { |
| 77 | return ErrnoError() << "Failed to dup"; |
| 78 | } |
| 79 | FILE* input = fdopen(input_fd.release(), "r"); |
| 80 | if (!input) { |
| 81 | return ErrnoError() << "Failed to fdopen"; |
| 82 | } |
| 83 | |
| 84 | char* line = nullptr; |
| 85 | size_t size = 0; |
| 86 | if (getline(&line, &size, input) < 0) { |
| 87 | return ErrnoError() << "Failed to read"; |
| 88 | } |
| 89 | |
| 90 | if (fclose(input) != 0) { |
| 91 | return ErrnoError() << "Failed to fclose"; |
| 92 | } |
| 93 | |
| 94 | std::string_view original = line; |
| 95 | if (!original.empty() && original.back() == '\n') { |
| 96 | original = original.substr(0, original.size() - 1); |
| 97 | } |
| 98 | |
| 99 | std::string reversed(original.rbegin(), original.rend()); |
| 100 | |
| 101 | if (write(connect_fd, reversed.data(), reversed.size()) < 0) { |
| 102 | return ErrnoError() << "Failed to write"; |
| 103 | } |
| 104 | |
| 105 | return {}; |
| 106 | } |
| 107 | |
| 108 | Result<void> start_echo_reverse_server() { |
| 109 | unique_fd server_fd{TEMP_FAILURE_RETRY(socket(AF_VSOCK, SOCK_STREAM | SOCK_CLOEXEC, 0))}; |
| 110 | if (!server_fd.ok()) { |
| 111 | return ErrnoError() << "Failed to create vsock socket"; |
| 112 | } |
| 113 | struct sockaddr_vm server_sa = (struct sockaddr_vm){ |
| 114 | .svm_family = AF_VSOCK, |
Alan Stokes | 10c4767 | 2022-12-13 17:17:08 +0000 | [diff] [blame^] | 115 | .svm_port = static_cast<uint32_t>(BnTestService::ECHO_REVERSE_PORT), |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 116 | .svm_cid = VMADDR_CID_ANY, |
| 117 | }; |
| 118 | int ret = TEMP_FAILURE_RETRY(bind(server_fd, (struct sockaddr*)&server_sa, sizeof(server_sa))); |
| 119 | if (ret < 0) { |
| 120 | return ErrnoError() << "Failed to bind vsock socket"; |
| 121 | } |
| 122 | ret = TEMP_FAILURE_RETRY(listen(server_fd, /*backlog=*/1)); |
| 123 | if (ret < 0) { |
| 124 | return ErrnoError() << "Failed to listen"; |
| 125 | } |
| 126 | |
| 127 | std::thread accept_thread{[listening_fd = std::move(server_fd)] { |
| 128 | auto result = run_echo_reverse_server(listening_fd); |
| 129 | if (!result.ok()) { |
| 130 | __android_log_write(ANDROID_LOG_ERROR, TAG, result.error().message().c_str()); |
| 131 | // Make sure the VM exits so the test will fail solidly |
| 132 | exit(1); |
| 133 | } |
| 134 | }}; |
| 135 | accept_thread.detach(); |
| 136 | |
| 137 | return {}; |
| 138 | } |
| 139 | |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 140 | Result<void> start_test_service() { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 141 | class TestService : public BnTestService { |
| 142 | ScopedAStatus addInteger(int32_t a, int32_t b, int32_t* out) override { |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 143 | *out = a + b; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 144 | return ScopedAStatus::ok(); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 145 | } |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 146 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 147 | ScopedAStatus readProperty(const std::string& prop, std::string* out) override { |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 148 | *out = android::base::GetProperty(prop, ""); |
| 149 | if (out->empty()) { |
| 150 | std::string msg = "cannot find property " + prop; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 151 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 152 | msg.c_str()); |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 153 | } |
| 154 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 155 | return ScopedAStatus::ok(); |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 156 | } |
Andrew Scull | 2e6ab79 | 2022-01-30 16:04:08 +0000 | [diff] [blame] | 157 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 158 | ScopedAStatus insecurelyExposeVmInstanceSecret(std::vector<uint8_t>* out) override { |
Andrew Scull | 102067a | 2022-10-07 00:34:40 +0000 | [diff] [blame] | 159 | const uint8_t identifier[] = {1, 2, 3, 4}; |
Andrew Scull | 655e98e | 2022-10-10 22:24:58 +0000 | [diff] [blame] | 160 | out->resize(32); |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 161 | AVmPayload_getVmInstanceSecret(identifier, sizeof(identifier), out->data(), |
| 162 | out->size()); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 163 | return ScopedAStatus::ok(); |
Andrew Scull | 2e6ab79 | 2022-01-30 16:04:08 +0000 | [diff] [blame] | 164 | } |
Andrew Scull | 1f6ca35 | 2022-02-20 22:51:12 +0000 | [diff] [blame] | 165 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 166 | ScopedAStatus insecurelyExposeAttestationCdi(std::vector<uint8_t>* out) override { |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 167 | size_t cdi_size = AVmPayload_getDiceAttestationCdi(nullptr, 0); |
Andrew Scull | 655e98e | 2022-10-10 22:24:58 +0000 | [diff] [blame] | 168 | out->resize(cdi_size); |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 169 | AVmPayload_getDiceAttestationCdi(out->data(), out->size()); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 170 | return ScopedAStatus::ok(); |
Andrew Scull | 1f6ca35 | 2022-02-20 22:51:12 +0000 | [diff] [blame] | 171 | } |
Andrew Scull | 6189208 | 2022-02-21 00:07:25 +0000 | [diff] [blame] | 172 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 173 | ScopedAStatus getBcc(std::vector<uint8_t>* out) override { |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 174 | size_t bcc_size = AVmPayload_getDiceAttestationChain(nullptr, 0); |
Andrew Scull | 655e98e | 2022-10-10 22:24:58 +0000 | [diff] [blame] | 175 | out->resize(bcc_size); |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 176 | AVmPayload_getDiceAttestationChain(out->data(), out->size()); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 177 | return ScopedAStatus::ok(); |
Andrew Scull | 6189208 | 2022-02-21 00:07:25 +0000 | [diff] [blame] | 178 | } |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 179 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 180 | ScopedAStatus getApkContentsPath(std::string* out) override { |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 181 | const char* path_c = AVmPayload_getApkContentsPath(); |
| 182 | if (path_c == nullptr) { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 183 | return ScopedAStatus:: |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 184 | fromServiceSpecificErrorWithMessage(0, "Failed to get APK contents path"); |
| 185 | } |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 186 | *out = path_c; |
| 187 | return ScopedAStatus::ok(); |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 188 | } |
Alan Stokes | 78d2470 | 2022-11-21 15:28:31 +0000 | [diff] [blame] | 189 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 190 | ScopedAStatus getEncryptedStoragePath(std::string* out) override { |
Alan Stokes | 78d2470 | 2022-11-21 15:28:31 +0000 | [diff] [blame] | 191 | const char* path_c = AVmPayload_getEncryptedStoragePath(); |
| 192 | if (path_c == nullptr) { |
| 193 | out->clear(); |
| 194 | } else { |
| 195 | *out = path_c; |
| 196 | } |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 197 | return ScopedAStatus::ok(); |
| 198 | } |
| 199 | |
| 200 | virtual ::ScopedAStatus runEchoReverseServer() override { |
| 201 | auto result = start_echo_reverse_server(); |
| 202 | if (result.ok()) { |
| 203 | return ScopedAStatus::ok(); |
| 204 | } else { |
| 205 | std::string message = result.error().message(); |
| 206 | return ScopedAStatus::fromServiceSpecificErrorWithMessage(-1, message.c_str()); |
| 207 | } |
Alan Stokes | 78d2470 | 2022-11-21 15:28:31 +0000 | [diff] [blame] | 208 | } |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 209 | }; |
| 210 | auto testService = ndk::SharedRefBase::make<TestService>(); |
| 211 | |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 212 | auto callback = []([[maybe_unused]] void* param) { AVmPayload_notifyPayloadReady(); }; |
Alan Stokes | e0945ad | 2022-11-24 13:29:57 +0000 | [diff] [blame] | 213 | AVmPayload_runVsockRpcServer(testService->asBinder().get(), testService->SERVICE_PORT, callback, |
| 214 | nullptr); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 215 | |
| 216 | return {}; |
| 217 | } |
| 218 | |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 219 | Result<void> verify_apk() { |
| 220 | const char* path = "/mnt/extra-apk/0/assets/build_manifest.pb"; |
| 221 | |
| 222 | std::string str; |
| 223 | if (!android::base::ReadFileToString(path, &str)) { |
| 224 | return ErrnoError() << "failed to read build_manifest.pb"; |
| 225 | } |
| 226 | |
| 227 | if (!android::security::fsverity::FSVerityDigests().ParseFromString(str)) { |
| 228 | return Error() << "invalid build_manifest.pb"; |
| 229 | } |
| 230 | |
| 231 | return {}; |
| 232 | } |
| 233 | |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 234 | } // Anonymous namespace |
| 235 | |
Alan Stokes | 52d3c72 | 2022-10-04 17:27:13 +0100 | [diff] [blame] | 236 | extern "C" int AVmPayload_main() { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 237 | __android_log_write(ANDROID_LOG_INFO, TAG, "Hello Microdroid"); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 238 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 239 | // Make sure we can call into other shared libraries. |
Jiyong Park | fe5b28e | 2021-06-24 00:19:02 +0900 | [diff] [blame] | 240 | testlib_sub(); |
Jiyong Park | 2393439 | 2021-06-16 01:59:10 +0900 | [diff] [blame] | 241 | |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 242 | // Extra apks may be missing; this is not a fatal error |
| 243 | report_test("extra_apk", verify_apk()); |
| 244 | |
Jiyong Park | 2393439 | 2021-06-16 01:59:10 +0900 | [diff] [blame] | 245 | __system_property_set("debug.microdroid.app.run", "true"); |
Andrew Scull | edbe75e | 2021-07-06 10:44:31 +0000 | [diff] [blame] | 246 | |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 247 | if (auto res = start_test_service(); res.ok()) { |
| 248 | return 0; |
| 249 | } else { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 250 | __android_log_write(ANDROID_LOG_ERROR, TAG, res.error().message().c_str()); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 251 | return 1; |
| 252 | } |
Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 253 | } |