blob: 28bf5d98e8bfa028e05a6a0eae2640196a132875 [file] [log] [blame]
Victor Hsieh272aa242021-02-01 14:19:20 -08001/*
2 * Copyright (C) 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Victor Hsieh51789de2021-08-06 16:50:49 -070017//! compsvc is a service to run compilation tasks in a PVM upon request. It is able to set up
Victor Hsiehebb1d902021-08-06 13:00:18 -070018//! file descriptors backed by authfs (via authfs_service) and pass the file descriptors to the
Victor Hsieh51789de2021-08-06 16:50:49 -070019//! actual compiler.
Victor Hsieh272aa242021-02-01 14:19:20 -080020
Alan Stokes126fd512021-12-16 15:00:01 +000021use anyhow::{Context, Result};
Alan Stokes3189af02021-09-30 17:51:19 +010022use binder_common::new_binder_exception;
Alan Stokes126fd512021-12-16 15:00:01 +000023use compos_common::binder::to_binder_result;
Victor Hsieh9ed27182021-08-25 15:52:42 -070024use log::warn;
25use std::default::Default;
Victor Hsieh51789de2021-08-06 16:50:49 -070026use std::path::PathBuf;
Alan Stokes183d7d32021-12-08 16:10:45 +000027use std::sync::RwLock;
Victor Hsieh272aa242021-02-01 14:19:20 -080028
Alan Stokes46a1dff2021-12-14 10:56:05 +000029use crate::compilation::{compile_cmd, odrefresh, CompilerOutput, OdrefreshContext};
30use crate::compos_key_service::{CompOsKeyService, Signer};
Alan Stokes71cc11e2022-01-17 10:39:05 +000031use crate::dice::Dice;
Victor Hsieh9ed27182021-08-25 15:52:42 -070032use crate::fsverity;
Victor Hsieh51789de2021-08-06 16:50:49 -070033use authfs_aidl_interface::aidl::com::android::virt::fs::IAuthFsService::IAuthFsService;
Victor Hsieh23f73592021-08-06 18:08:24 -070034use compos_aidl_interface::aidl::com::android::compos::{
35 CompOsKeyData::CompOsKeyData,
Victor Hsieh9ed27182021-08-25 15:52:42 -070036 CompilationResult::CompilationResult,
Victor Hsieh13333e82021-09-03 15:17:32 -070037 FdAnnotation::FdAnnotation,
Victor Hsieh23f73592021-08-06 18:08:24 -070038 ICompOsService::{BnCompOsService, ICompOsService},
Victor Hsieh272aa242021-02-01 14:19:20 -080039};
Victor Hsieh272aa242021-02-01 14:19:20 -080040use compos_aidl_interface::binder::{
Alan Stokes3189af02021-09-30 17:51:19 +010041 BinderFeatures, ExceptionCode, Interface, Result as BinderResult, Strong,
Victor Hsieh272aa242021-02-01 14:19:20 -080042};
Alan Stokes46a1dff2021-12-14 10:56:05 +000043use compos_common::odrefresh::ODREFRESH_PATH;
Victor Hsieh272aa242021-02-01 14:19:20 -080044
Victor Hsiehebb1d902021-08-06 13:00:18 -070045const AUTHFS_SERVICE_NAME: &str = "authfs_service";
Victor Hsieh51789de2021-08-06 16:50:49 -070046const DEX2OAT_PATH: &str = "/apex/com.android.art/bin/dex2oat64";
Alan Stokes9e2c5d52021-07-21 11:29:10 +010047
Victor Hsieha64194b2021-08-06 17:43:36 -070048/// Constructs a binder object that implements ICompOsService.
Victor Hsieh9ebf7ee2021-09-03 16:14:14 -070049pub fn new_binder() -> Result<Strong<dyn ICompOsService>> {
Victor Hsieh23f73592021-08-06 18:08:24 -070050 let service = CompOsService {
51 dex2oat_path: PathBuf::from(DEX2OAT_PATH),
Victor Hsiehf9968692021-11-18 11:34:39 -080052 odrefresh_path: PathBuf::from(ODREFRESH_PATH),
Victor Hsieh9ebf7ee2021-09-03 16:14:14 -070053 key_service: CompOsKeyService::new()?,
Alan Stokes183d7d32021-12-08 16:10:45 +000054 key_blob: RwLock::new(Vec::new()),
Victor Hsieh23f73592021-08-06 18:08:24 -070055 };
Victor Hsieha64194b2021-08-06 17:43:36 -070056 Ok(BnCompOsService::new_binder(service, BinderFeatures::default()))
Alan Stokes9e2c5d52021-07-21 11:29:10 +010057}
58
Victor Hsieha64194b2021-08-06 17:43:36 -070059struct CompOsService {
Victor Hsieh51789de2021-08-06 16:50:49 -070060 dex2oat_path: PathBuf,
Victor Hsiehf9968692021-11-18 11:34:39 -080061 odrefresh_path: PathBuf,
Victor Hsieha64194b2021-08-06 17:43:36 -070062 key_service: CompOsKeyService,
Alan Stokes183d7d32021-12-08 16:10:45 +000063 key_blob: RwLock<Vec<u8>>,
Victor Hsieh272aa242021-02-01 14:19:20 -080064}
65
Victor Hsieh9ed27182021-08-25 15:52:42 -070066impl CompOsService {
67 fn generate_raw_fsverity_signature(
68 &self,
Victor Hsieh9ed27182021-08-25 15:52:42 -070069 fsverity_digest: &fsverity::Sha256Digest,
Alan Stokes46a1dff2021-12-14 10:56:05 +000070 ) -> BinderResult<Vec<u8>> {
Victor Hsieh9ed27182021-08-25 15:52:42 -070071 let formatted_digest = fsverity::to_formatted_digest(fsverity_digest);
Alan Stokes126fd512021-12-16 15:00:01 +000072 to_binder_result(self.new_signer()?.sign(&formatted_digest[..]))
Alan Stokes46a1dff2021-12-14 10:56:05 +000073 }
74
75 fn new_signer(&self) -> BinderResult<Signer> {
76 let key = &*self.key_blob.read().unwrap();
77 if key.is_empty() {
78 Err(new_binder_exception(ExceptionCode::ILLEGAL_STATE, "Key is not initialized"))
79 } else {
80 Ok(self.key_service.new_signer(key))
81 }
Victor Hsieh9ed27182021-08-25 15:52:42 -070082 }
Alan Stokes71cc11e2022-01-17 10:39:05 +000083
84 fn get_boot_certificate_chain(&self) -> Result<Vec<u8>> {
85 let dice = Dice::new()?;
86 dice.get_boot_certificate_chain()
87 }
Victor Hsieh9ed27182021-08-25 15:52:42 -070088}
89
Victor Hsieha64194b2021-08-06 17:43:36 -070090impl Interface for CompOsService {}
Victor Hsieh272aa242021-02-01 14:19:20 -080091
Victor Hsieha64194b2021-08-06 17:43:36 -070092impl ICompOsService for CompOsService {
Victor Hsieh8fd03f02021-08-24 17:23:01 -070093 fn initializeSigningKey(&self, key_blob: &[u8]) -> BinderResult<()> {
94 let mut w = self.key_blob.write().unwrap();
95 if w.is_empty() {
96 *w = Vec::from(key_blob);
97 Ok(())
98 } else {
99 Err(new_binder_exception(ExceptionCode::ILLEGAL_STATE, "Cannot re-initialize the key"))
100 }
101 }
102
Victor Hsiehf9968692021-11-18 11:34:39 -0800103 fn odrefresh(
104 &self,
105 system_dir_fd: i32,
106 output_dir_fd: i32,
Alan Stokes9646db92021-12-14 13:22:33 +0000107 staging_dir_fd: i32,
108 target_dir_name: &str,
Victor Hsiehf9968692021-11-18 11:34:39 -0800109 zygote_arch: &str,
Victor Hsieh9bfbc5f2021-12-16 11:45:10 -0800110 system_server_compiler_filter: &str,
Alan Stokes9646db92021-12-14 13:22:33 +0000111 ) -> BinderResult<i8> {
Alan Stokes126fd512021-12-16 15:00:01 +0000112 let context = to_binder_result(OdrefreshContext::new(
Victor Hsiehf9968692021-11-18 11:34:39 -0800113 system_dir_fd,
114 output_dir_fd,
Alan Stokes9646db92021-12-14 13:22:33 +0000115 staging_dir_fd,
Alan Stokes46a1dff2021-12-14 10:56:05 +0000116 target_dir_name,
Victor Hsiehf9968692021-11-18 11:34:39 -0800117 zygote_arch,
Victor Hsieh9bfbc5f2021-12-16 11:45:10 -0800118 system_server_compiler_filter,
Alan Stokes126fd512021-12-16 15:00:01 +0000119 ))?;
Alan Stokes46a1dff2021-12-14 10:56:05 +0000120
121 let authfs_service = get_authfs_service()?;
Alan Stokes126fd512021-12-16 15:00:01 +0000122 let exit_code = to_binder_result(
123 odrefresh(&self.odrefresh_path, context, authfs_service, self.new_signer()?)
124 .context("odrefresh failed"),
125 )?;
Alan Stokes46a1dff2021-12-14 10:56:05 +0000126 Ok(exit_code as i8)
Victor Hsiehf9968692021-11-18 11:34:39 -0800127 }
128
Victor Hsieh3c044c42021-10-01 17:17:10 -0700129 fn compile_cmd(
Victor Hsieh13333e82021-09-03 15:17:32 -0700130 &self,
131 args: &[String],
132 fd_annotation: &FdAnnotation,
133 ) -> BinderResult<CompilationResult> {
Victor Hsieh51789de2021-08-06 16:50:49 -0700134 let authfs_service = get_authfs_service()?;
Alan Stokes126fd512021-12-16 15:00:01 +0000135 let output = to_binder_result(
136 compile_cmd(&self.dex2oat_path, args, authfs_service, fd_annotation)
137 .context("Compilation failed"),
138 )?;
Victor Hsieh6e340382021-08-13 12:18:02 -0700139 match output {
140 CompilerOutput::Digests { oat, vdex, image } => {
Alan Stokes46a1dff2021-12-14 10:56:05 +0000141 let oat_signature = self.generate_raw_fsverity_signature(&oat)?;
142 let vdex_signature = self.generate_raw_fsverity_signature(&vdex)?;
143 let image_signature = self.generate_raw_fsverity_signature(&image)?;
144 Ok(CompilationResult {
145 exitCode: 0,
146 oatSignature: oat_signature,
147 vdexSignature: vdex_signature,
148 imageSignature: image_signature,
149 })
Victor Hsieh6e340382021-08-13 12:18:02 -0700150 }
Victor Hsieh9ed27182021-08-25 15:52:42 -0700151 CompilerOutput::ExitCode(exit_code) => {
152 Ok(CompilationResult { exitCode: exit_code, ..Default::default() })
153 }
Victor Hsieh6e340382021-08-13 12:18:02 -0700154 }
Victor Hsieh272aa242021-02-01 14:19:20 -0800155 }
Victor Hsieh23f73592021-08-06 18:08:24 -0700156
Victor Hsieh3c044c42021-10-01 17:17:10 -0700157 fn compile(&self, _marshaled: &[u8], _fd_annotation: &FdAnnotation) -> BinderResult<i8> {
158 Err(new_binder_exception(ExceptionCode::UNSUPPORTED_OPERATION, "Not yet implemented"))
159 }
160
Victor Hsieh23f73592021-08-06 18:08:24 -0700161 fn generateSigningKey(&self) -> BinderResult<CompOsKeyData> {
Alan Stokes126fd512021-12-16 15:00:01 +0000162 to_binder_result(self.key_service.generate())
Victor Hsieh23f73592021-08-06 18:08:24 -0700163 }
164
165 fn verifySigningKey(&self, key_blob: &[u8], public_key: &[u8]) -> BinderResult<bool> {
Alan Stokes183d7d32021-12-08 16:10:45 +0000166 Ok(if let Err(e) = self.key_service.verify(key_blob, public_key) {
Alan Stokes126fd512021-12-16 15:00:01 +0000167 warn!("Signing key verification failed: {:?}", e);
Victor Hsieh23f73592021-08-06 18:08:24 -0700168 false
169 } else {
170 true
171 })
172 }
Alan Stokes71cc11e2022-01-17 10:39:05 +0000173
174 fn getBootCertificateChain(&self) -> BinderResult<Vec<u8>> {
175 to_binder_result(self.get_boot_certificate_chain())
176 }
Victor Hsieh272aa242021-02-01 14:19:20 -0800177}
Victor Hsiehebb1d902021-08-06 13:00:18 -0700178
179fn get_authfs_service() -> BinderResult<Strong<dyn IAuthFsService>> {
180 Ok(authfs_aidl_interface::binder::get_interface(AUTHFS_SERVICE_NAME)?)
181}