blob: 4330bbfb6f9336155baa3d97108adf69c2dd2d6a [file] [log] [blame]
Victor Hsieh272aa242021-02-01 14:19:20 -08001/*
2 * Copyright (C) 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Victor Hsieh51789de2021-08-06 16:50:49 -070017//! compsvc is a service to run compilation tasks in a PVM upon request. It is able to set up
Victor Hsiehebb1d902021-08-06 13:00:18 -070018//! file descriptors backed by authfs (via authfs_service) and pass the file descriptors to the
Victor Hsieh51789de2021-08-06 16:50:49 -070019//! actual compiler.
Victor Hsieh272aa242021-02-01 14:19:20 -080020
Victor Hsiehec38ae22022-02-10 00:06:26 +000021use anyhow::{bail, Context, Result};
Alan Stokes0fc6ce52022-08-02 17:01:48 +010022use log::{error, info};
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070023use rustutils::system_properties;
Victor Hsieh9ed27182021-08-25 15:52:42 -070024use std::default::Default;
Victor Hsiehec38ae22022-02-10 00:06:26 +000025use std::fs::read_dir;
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070026use std::iter::zip;
Victor Hsiehec38ae22022-02-10 00:06:26 +000027use std::path::{Path, PathBuf};
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070028use std::sync::RwLock;
Victor Hsieh272aa242021-02-01 14:19:20 -080029
Victor Hsiehec38ae22022-02-10 00:06:26 +000030use crate::artifact_signer::ArtifactSigner;
Victor Hsiehe7698672022-09-23 16:22:28 -070031use crate::compilation::odrefresh;
Alan Stokes16fb8552022-02-10 15:07:27 +000032use crate::compos_key;
Alan Stokes0e82b502022-08-08 14:44:48 +010033use binder::{BinderFeatures, ExceptionCode, Interface, Result as BinderResult, Status, Strong};
Alan Stokes6542fdd2022-02-17 15:21:46 +000034use compos_aidl_interface::aidl::com::android::compos::ICompOsService::{
Victor Hsiehe7698672022-09-23 16:22:28 -070035 BnCompOsService, ICompOsService, OdrefreshArgs::OdrefreshArgs,
Victor Hsieh272aa242021-02-01 14:19:20 -080036};
Alan Stokes6542fdd2022-02-17 15:21:46 +000037use compos_common::binder::to_binder_result;
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070038use compos_common::odrefresh::{is_system_property_interesting, ODREFRESH_PATH};
Victor Hsieh272aa242021-02-01 14:19:20 -080039
Victor Hsiehebb1d902021-08-06 13:00:18 -070040const AUTHFS_SERVICE_NAME: &str = "authfs_service";
Alan Stokes9e2c5d52021-07-21 11:29:10 +010041
Victor Hsieha64194b2021-08-06 17:43:36 -070042/// Constructs a binder object that implements ICompOsService.
Victor Hsieh9ebf7ee2021-09-03 16:14:14 -070043pub fn new_binder() -> Result<Strong<dyn ICompOsService>> {
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070044 let service = CompOsService {
45 odrefresh_path: PathBuf::from(ODREFRESH_PATH),
46 initialized: RwLock::new(None),
47 };
Victor Hsieha64194b2021-08-06 17:43:36 -070048 Ok(BnCompOsService::new_binder(service, BinderFeatures::default()))
Alan Stokes9e2c5d52021-07-21 11:29:10 +010049}
50
Victor Hsieha64194b2021-08-06 17:43:36 -070051struct CompOsService {
Victor Hsiehf9968692021-11-18 11:34:39 -080052 odrefresh_path: PathBuf,
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070053
54 /// A locked protected tri-state.
55 /// * None: uninitialized
56 /// * Some(true): initialized successfully
57 /// * Some(false): failed to initialize
58 initialized: RwLock<Option<bool>>,
Victor Hsieh272aa242021-02-01 14:19:20 -080059}
60
Victor Hsieha64194b2021-08-06 17:43:36 -070061impl Interface for CompOsService {}
Victor Hsieh272aa242021-02-01 14:19:20 -080062
Victor Hsieha64194b2021-08-06 17:43:36 -070063impl ICompOsService for CompOsService {
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070064 fn initializeSystemProperties(&self, names: &[String], values: &[String]) -> BinderResult<()> {
65 let mut initialized = self.initialized.write().unwrap();
66 if initialized.is_some() {
Andrew Walbrandcf9d582022-08-03 11:25:24 +000067 return Err(Status::new_exception_str(
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070068 ExceptionCode::ILLEGAL_STATE,
Andrew Walbrandcf9d582022-08-03 11:25:24 +000069 Some(format!("Already initialized: {:?}", initialized)),
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070070 ));
71 }
72 *initialized = Some(false);
73
74 if names.len() != values.len() {
Andrew Walbrandcf9d582022-08-03 11:25:24 +000075 return Err(Status::new_exception_str(
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070076 ExceptionCode::ILLEGAL_ARGUMENT,
Andrew Walbrandcf9d582022-08-03 11:25:24 +000077 Some(format!(
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070078 "Received inconsistent number of keys ({}) and values ({})",
79 names.len(),
80 values.len()
Andrew Walbrandcf9d582022-08-03 11:25:24 +000081 )),
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070082 ));
83 }
84 for (name, value) in zip(names, values) {
85 if !is_system_property_interesting(name) {
Andrew Walbrandcf9d582022-08-03 11:25:24 +000086 return Err(Status::new_exception_str(
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070087 ExceptionCode::ILLEGAL_ARGUMENT,
Andrew Walbrandcf9d582022-08-03 11:25:24 +000088 Some(format!("Received invalid system property {}", &name)),
Victor Hsiehcb6d66b2022-05-10 16:12:06 -070089 ));
90 }
91 let result = system_properties::write(name, value);
92 if result.is_err() {
93 error!("Failed to setprop {}", &name);
94 return to_binder_result(result);
95 }
96 }
97 *initialized = Some(true);
98 Ok(())
99 }
100
Victor Hsiehe7698672022-09-23 16:22:28 -0700101 fn odrefresh(&self, args: &OdrefreshArgs) -> BinderResult<i8> {
Victor Hsiehcb6d66b2022-05-10 16:12:06 -0700102 let initialized = *self.initialized.read().unwrap();
103 if !initialized.unwrap_or(false) {
Andrew Walbrandcf9d582022-08-03 11:25:24 +0000104 return Err(Status::new_exception_str(
Victor Hsiehcb6d66b2022-05-10 16:12:06 -0700105 ExceptionCode::ILLEGAL_STATE,
Andrew Walbrandcf9d582022-08-03 11:25:24 +0000106 Some("Service has not been initialized"),
Victor Hsiehcb6d66b2022-05-10 16:12:06 -0700107 ));
108 }
109
Victor Hsiehe7698672022-09-23 16:22:28 -0700110 to_binder_result(self.do_odrefresh(args))
Victor Hsiehf9968692021-11-18 11:34:39 -0800111 }
112
Alan Stokes16fb8552022-02-10 15:07:27 +0000113 fn getPublicKey(&self) -> BinderResult<Vec<u8>> {
114 to_binder_result(compos_key::get_public_key())
115 }
Alan Stokes5430eca2022-03-21 14:02:09 +0000116
117 fn getAttestationChain(&self) -> BinderResult<Vec<u8>> {
118 to_binder_result(compos_key::get_attestation_chain())
119 }
Alan Stokes71403772022-06-21 14:56:28 +0100120
121 fn quit(&self) -> BinderResult<()> {
Alan Stokes71403772022-06-21 14:56:28 +0100122 // When our process exits, Microdroid will shut down the VM.
Alan Stokes0fc6ce52022-08-02 17:01:48 +0100123 info!("Received quit request, exiting");
Alan Stokes71403772022-06-21 14:56:28 +0100124 std::process::exit(0);
125 }
Victor Hsieh272aa242021-02-01 14:19:20 -0800126}
Victor Hsiehebb1d902021-08-06 13:00:18 -0700127
Alan Stokes01b3ef02022-09-22 17:43:24 +0100128impl CompOsService {
Victor Hsiehe7698672022-09-23 16:22:28 -0700129 fn do_odrefresh(&self, args: &OdrefreshArgs) -> Result<i8> {
Alan Stokes01b3ef02022-09-22 17:43:24 +0100130 let authfs_service = binder::get_interface(AUTHFS_SERVICE_NAME)
131 .context("Unable to connect to AuthFS service")?;
Victor Hsiehe7698672022-09-23 16:22:28 -0700132 let exit_code = odrefresh(&self.odrefresh_path, args, authfs_service, |output_dir| {
Alan Stokes01b3ef02022-09-22 17:43:24 +0100133 // authfs only shows us the files we created, so it's ok to just sign everything
134 // under the output directory.
135 let mut artifact_signer = ArtifactSigner::new(&output_dir);
136 add_artifacts(&output_dir, &mut artifact_signer)?;
137
138 artifact_signer.write_info_and_signature(&output_dir.join("compos.info"))
139 })
140 .context("odrefresh failed")?;
141 Ok(exit_code as i8)
142 }
143}
144
Victor Hsiehec38ae22022-02-10 00:06:26 +0000145fn add_artifacts(target_dir: &Path, artifact_signer: &mut ArtifactSigner) -> Result<()> {
146 for entry in
147 read_dir(&target_dir).with_context(|| format!("Traversing {}", target_dir.display()))?
148 {
149 let entry = entry?;
150 let file_type = entry.file_type()?;
151 if file_type.is_dir() {
152 add_artifacts(&entry.path(), artifact_signer)?;
153 } else if file_type.is_file() {
154 artifact_signer.add_artifact(&entry.path())?;
155 } else {
156 // authfs shouldn't create anything else, but just in case
157 bail!("Unexpected file type in artifacts: {:?}", entry);
158 }
159 }
160 Ok(())
161}