Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2021 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Victor Hsieh | 51789de | 2021-08-06 16:50:49 -0700 | [diff] [blame] | 17 | //! compsvc is a service to run compilation tasks in a PVM upon request. It is able to set up |
Victor Hsieh | ebb1d90 | 2021-08-06 13:00:18 -0700 | [diff] [blame] | 18 | //! file descriptors backed by authfs (via authfs_service) and pass the file descriptors to the |
Victor Hsieh | 51789de | 2021-08-06 16:50:49 -0700 | [diff] [blame] | 19 | //! actual compiler. |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 20 | |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 21 | use anyhow::{Context, Result}; |
Alan Stokes | 3189af0 | 2021-09-30 17:51:19 +0100 | [diff] [blame] | 22 | use binder_common::new_binder_exception; |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 23 | use compos_common::binder::to_binder_result; |
Victor Hsieh | 9ed2718 | 2021-08-25 15:52:42 -0700 | [diff] [blame] | 24 | use log::warn; |
| 25 | use std::default::Default; |
Victor Hsieh | 51789de | 2021-08-06 16:50:49 -0700 | [diff] [blame] | 26 | use std::path::PathBuf; |
Alan Stokes | 183d7d3 | 2021-12-08 16:10:45 +0000 | [diff] [blame] | 27 | use std::sync::RwLock; |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 28 | |
Victor Hsieh | 616f822 | 2022-01-14 13:06:32 -0800 | [diff] [blame] | 29 | use crate::compilation::{odrefresh, OdrefreshContext}; |
Alan Stokes | 46a1dff | 2021-12-14 10:56:05 +0000 | [diff] [blame] | 30 | use crate::compos_key_service::{CompOsKeyService, Signer}; |
Alan Stokes | 71cc11e | 2022-01-17 10:39:05 +0000 | [diff] [blame] | 31 | use crate::dice::Dice; |
Victor Hsieh | 51789de | 2021-08-06 16:50:49 -0700 | [diff] [blame] | 32 | use authfs_aidl_interface::aidl::com::android::virt::fs::IAuthFsService::IAuthFsService; |
Victor Hsieh | 23f7359 | 2021-08-06 18:08:24 -0700 | [diff] [blame] | 33 | use compos_aidl_interface::aidl::com::android::compos::{ |
| 34 | CompOsKeyData::CompOsKeyData, |
| 35 | ICompOsService::{BnCompOsService, ICompOsService}, |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 36 | }; |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 37 | use compos_aidl_interface::binder::{ |
Alan Stokes | 3189af0 | 2021-09-30 17:51:19 +0100 | [diff] [blame] | 38 | BinderFeatures, ExceptionCode, Interface, Result as BinderResult, Strong, |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 39 | }; |
Alan Stokes | 46a1dff | 2021-12-14 10:56:05 +0000 | [diff] [blame] | 40 | use compos_common::odrefresh::ODREFRESH_PATH; |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 41 | |
Victor Hsieh | ebb1d90 | 2021-08-06 13:00:18 -0700 | [diff] [blame] | 42 | const AUTHFS_SERVICE_NAME: &str = "authfs_service"; |
Alan Stokes | 9e2c5d5 | 2021-07-21 11:29:10 +0100 | [diff] [blame] | 43 | |
Victor Hsieh | a64194b | 2021-08-06 17:43:36 -0700 | [diff] [blame] | 44 | /// Constructs a binder object that implements ICompOsService. |
Victor Hsieh | 9ebf7ee | 2021-09-03 16:14:14 -0700 | [diff] [blame] | 45 | pub fn new_binder() -> Result<Strong<dyn ICompOsService>> { |
Victor Hsieh | 23f7359 | 2021-08-06 18:08:24 -0700 | [diff] [blame] | 46 | let service = CompOsService { |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 47 | odrefresh_path: PathBuf::from(ODREFRESH_PATH), |
Victor Hsieh | 9ebf7ee | 2021-09-03 16:14:14 -0700 | [diff] [blame] | 48 | key_service: CompOsKeyService::new()?, |
Alan Stokes | c33d292 | 2022-01-18 14:17:00 +0000 | [diff] [blame^] | 49 | dice: Dice::new()?, |
Alan Stokes | 183d7d3 | 2021-12-08 16:10:45 +0000 | [diff] [blame] | 50 | key_blob: RwLock::new(Vec::new()), |
Victor Hsieh | 23f7359 | 2021-08-06 18:08:24 -0700 | [diff] [blame] | 51 | }; |
Victor Hsieh | a64194b | 2021-08-06 17:43:36 -0700 | [diff] [blame] | 52 | Ok(BnCompOsService::new_binder(service, BinderFeatures::default())) |
Alan Stokes | 9e2c5d5 | 2021-07-21 11:29:10 +0100 | [diff] [blame] | 53 | } |
| 54 | |
Victor Hsieh | a64194b | 2021-08-06 17:43:36 -0700 | [diff] [blame] | 55 | struct CompOsService { |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 56 | odrefresh_path: PathBuf, |
Victor Hsieh | a64194b | 2021-08-06 17:43:36 -0700 | [diff] [blame] | 57 | key_service: CompOsKeyService, |
Alan Stokes | c33d292 | 2022-01-18 14:17:00 +0000 | [diff] [blame^] | 58 | dice: Dice, |
Alan Stokes | 183d7d3 | 2021-12-08 16:10:45 +0000 | [diff] [blame] | 59 | key_blob: RwLock<Vec<u8>>, |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 60 | } |
| 61 | |
Victor Hsieh | 9ed2718 | 2021-08-25 15:52:42 -0700 | [diff] [blame] | 62 | impl CompOsService { |
Alan Stokes | 46a1dff | 2021-12-14 10:56:05 +0000 | [diff] [blame] | 63 | fn new_signer(&self) -> BinderResult<Signer> { |
| 64 | let key = &*self.key_blob.read().unwrap(); |
| 65 | if key.is_empty() { |
| 66 | Err(new_binder_exception(ExceptionCode::ILLEGAL_STATE, "Key is not initialized")) |
| 67 | } else { |
| 68 | Ok(self.key_service.new_signer(key)) |
| 69 | } |
Victor Hsieh | 9ed2718 | 2021-08-25 15:52:42 -0700 | [diff] [blame] | 70 | } |
Alan Stokes | 71cc11e | 2022-01-17 10:39:05 +0000 | [diff] [blame] | 71 | |
| 72 | fn get_boot_certificate_chain(&self) -> Result<Vec<u8>> { |
Alan Stokes | c33d292 | 2022-01-18 14:17:00 +0000 | [diff] [blame^] | 73 | self.dice.get_boot_certificate_chain() |
Alan Stokes | 71cc11e | 2022-01-17 10:39:05 +0000 | [diff] [blame] | 74 | } |
Victor Hsieh | 9ed2718 | 2021-08-25 15:52:42 -0700 | [diff] [blame] | 75 | } |
| 76 | |
Victor Hsieh | a64194b | 2021-08-06 17:43:36 -0700 | [diff] [blame] | 77 | impl Interface for CompOsService {} |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 78 | |
Victor Hsieh | a64194b | 2021-08-06 17:43:36 -0700 | [diff] [blame] | 79 | impl ICompOsService for CompOsService { |
Victor Hsieh | 8fd03f0 | 2021-08-24 17:23:01 -0700 | [diff] [blame] | 80 | fn initializeSigningKey(&self, key_blob: &[u8]) -> BinderResult<()> { |
| 81 | let mut w = self.key_blob.write().unwrap(); |
| 82 | if w.is_empty() { |
| 83 | *w = Vec::from(key_blob); |
| 84 | Ok(()) |
| 85 | } else { |
| 86 | Err(new_binder_exception(ExceptionCode::ILLEGAL_STATE, "Cannot re-initialize the key")) |
| 87 | } |
| 88 | } |
| 89 | |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 90 | fn odrefresh( |
| 91 | &self, |
| 92 | system_dir_fd: i32, |
| 93 | output_dir_fd: i32, |
Alan Stokes | 9646db9 | 2021-12-14 13:22:33 +0000 | [diff] [blame] | 94 | staging_dir_fd: i32, |
| 95 | target_dir_name: &str, |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 96 | zygote_arch: &str, |
Victor Hsieh | 9bfbc5f | 2021-12-16 11:45:10 -0800 | [diff] [blame] | 97 | system_server_compiler_filter: &str, |
Alan Stokes | 9646db9 | 2021-12-14 13:22:33 +0000 | [diff] [blame] | 98 | ) -> BinderResult<i8> { |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 99 | let context = to_binder_result(OdrefreshContext::new( |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 100 | system_dir_fd, |
| 101 | output_dir_fd, |
Alan Stokes | 9646db9 | 2021-12-14 13:22:33 +0000 | [diff] [blame] | 102 | staging_dir_fd, |
Alan Stokes | 46a1dff | 2021-12-14 10:56:05 +0000 | [diff] [blame] | 103 | target_dir_name, |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 104 | zygote_arch, |
Victor Hsieh | 9bfbc5f | 2021-12-16 11:45:10 -0800 | [diff] [blame] | 105 | system_server_compiler_filter, |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 106 | ))?; |
Alan Stokes | 46a1dff | 2021-12-14 10:56:05 +0000 | [diff] [blame] | 107 | |
| 108 | let authfs_service = get_authfs_service()?; |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 109 | let exit_code = to_binder_result( |
| 110 | odrefresh(&self.odrefresh_path, context, authfs_service, self.new_signer()?) |
| 111 | .context("odrefresh failed"), |
| 112 | )?; |
Alan Stokes | 46a1dff | 2021-12-14 10:56:05 +0000 | [diff] [blame] | 113 | Ok(exit_code as i8) |
Victor Hsieh | f996869 | 2021-11-18 11:34:39 -0800 | [diff] [blame] | 114 | } |
| 115 | |
Victor Hsieh | 23f7359 | 2021-08-06 18:08:24 -0700 | [diff] [blame] | 116 | fn generateSigningKey(&self) -> BinderResult<CompOsKeyData> { |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 117 | to_binder_result(self.key_service.generate()) |
Victor Hsieh | 23f7359 | 2021-08-06 18:08:24 -0700 | [diff] [blame] | 118 | } |
| 119 | |
| 120 | fn verifySigningKey(&self, key_blob: &[u8], public_key: &[u8]) -> BinderResult<bool> { |
Alan Stokes | 183d7d3 | 2021-12-08 16:10:45 +0000 | [diff] [blame] | 121 | Ok(if let Err(e) = self.key_service.verify(key_blob, public_key) { |
Alan Stokes | 126fd51 | 2021-12-16 15:00:01 +0000 | [diff] [blame] | 122 | warn!("Signing key verification failed: {:?}", e); |
Victor Hsieh | 23f7359 | 2021-08-06 18:08:24 -0700 | [diff] [blame] | 123 | false |
| 124 | } else { |
| 125 | true |
| 126 | }) |
| 127 | } |
Alan Stokes | 71cc11e | 2022-01-17 10:39:05 +0000 | [diff] [blame] | 128 | |
| 129 | fn getBootCertificateChain(&self) -> BinderResult<Vec<u8>> { |
| 130 | to_binder_result(self.get_boot_certificate_chain()) |
| 131 | } |
Victor Hsieh | 272aa24 | 2021-02-01 14:19:20 -0800 | [diff] [blame] | 132 | } |
Victor Hsieh | ebb1d90 | 2021-08-06 13:00:18 -0700 | [diff] [blame] | 133 | |
| 134 | fn get_authfs_service() -> BinderResult<Strong<dyn IAuthFsService>> { |
| 135 | Ok(authfs_aidl_interface::binder::get_interface(AUTHFS_SERVICE_NAME)?) |
| 136 | } |