Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2021 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 16 | |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 17 | #include <aidl/com/android/microdroid/testservice/BnTestService.h> |
Alan Stokes | 63fa37b | 2023-02-22 14:56:57 +0000 | [diff] [blame] | 18 | #include <aidl/com/android/microdroid/testservice/BnVmCallback.h> |
| 19 | #include <aidl/com/android/microdroid/testservice/IAppCallback.h> |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 20 | #include <android-base/file.h> |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 21 | #include <android-base/properties.h> |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 22 | #include <android-base/result.h> |
Nikita Ioffe | 3452ee2 | 2022-12-15 00:31:56 +0000 | [diff] [blame] | 23 | #include <android-base/scopeguard.h> |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 24 | #include <android/log.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 25 | #include <fcntl.h> |
Nikita Ioffe | 29e15c8 | 2023-02-25 02:31:51 +0000 | [diff] [blame] | 26 | #include <fstab/fstab.h> |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 27 | #include <fsverity_digests.pb.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 28 | #include <linux/vm_sockets.h> |
| 29 | #include <stdint.h> |
Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 30 | #include <stdio.h> |
Nikita Ioffe | 3452ee2 | 2022-12-15 00:31:56 +0000 | [diff] [blame] | 31 | #include <sys/capability.h> |
Shraddha Basantwani | a9a9c4f | 2025-02-25 09:51:48 -0800 | [diff] [blame] | 32 | #include <sys/statvfs.h> |
Jiyong Park | 2393439 | 2021-06-16 01:59:10 +0900 | [diff] [blame] | 33 | #include <sys/system_properties.h> |
Nikita Ioffe | aa9f603 | 2025-01-21 18:06:46 +0000 | [diff] [blame] | 34 | #ifdef __MICRODROID_TEST_PAYLOAD_USES_LIBICU__ |
| 35 | #include <unicode/uchar.h> |
| 36 | #endif |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 37 | #include <unistd.h> |
Alan Stokes | 52d3c72 | 2022-10-04 17:27:13 +0100 | [diff] [blame] | 38 | #include <vm_main.h> |
Alan Stokes | d4ea5a8 | 2022-11-10 12:17:42 +0000 | [diff] [blame] | 39 | #include <vm_payload_restricted.h> |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 40 | |
Nikita Ioffe | d5846dc | 2024-11-01 18:44:45 +0000 | [diff] [blame] | 41 | #include <cstdint> |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 42 | #include <string> |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 43 | #include <thread> |
Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 44 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 45 | using android::base::borrowed_fd; |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 46 | using android::base::ErrnoError; |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 47 | using android::base::Error; |
Nikita Ioffe | 3452ee2 | 2022-12-15 00:31:56 +0000 | [diff] [blame] | 48 | using android::base::make_scope_guard; |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 49 | using android::base::Result; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 50 | using android::base::unique_fd; |
Nikita Ioffe | 29e15c8 | 2023-02-25 02:31:51 +0000 | [diff] [blame] | 51 | using android::fs_mgr::Fstab; |
| 52 | using android::fs_mgr::FstabEntry; |
| 53 | using android::fs_mgr::GetEntryForMountPoint; |
| 54 | using android::fs_mgr::ReadFstabFromFile; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 55 | |
| 56 | using aidl::com::android::microdroid::testservice::BnTestService; |
Alan Stokes | 63fa37b | 2023-02-22 14:56:57 +0000 | [diff] [blame] | 57 | using aidl::com::android::microdroid::testservice::BnVmCallback; |
| 58 | using aidl::com::android::microdroid::testservice::IAppCallback; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 59 | using ndk::ScopedAStatus; |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 60 | |
Jiyong Park | fe5b28e | 2021-06-24 00:19:02 +0900 | [diff] [blame] | 61 | extern void testlib_sub(); |
| 62 | |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 63 | namespace { |
| 64 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 65 | constexpr char TAG[] = "testbinary"; |
| 66 | |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 67 | template <typename T> |
Andrew Scull | edbe75e | 2021-07-06 10:44:31 +0000 | [diff] [blame] | 68 | Result<T> report_test(std::string name, Result<T> result) { |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 69 | auto property = "debug.microdroid.test." + name; |
| 70 | std::stringstream outcome; |
| 71 | if (result.ok()) { |
| 72 | outcome << "PASS"; |
| 73 | } else { |
| 74 | outcome << "FAIL: " << result.error(); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 75 | // Log the error in case the property is truncated. |
| 76 | std::string message = name + ": " + outcome.str(); |
| 77 | __android_log_write(ANDROID_LOG_WARN, TAG, message.c_str()); |
Andrew Scull | 11cf090 | 2021-06-22 12:08:10 +0000 | [diff] [blame] | 78 | } |
| 79 | __system_property_set(property.c_str(), outcome.str().c_str()); |
Andrew Scull | edbe75e | 2021-07-06 10:44:31 +0000 | [diff] [blame] | 80 | return result; |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 81 | } |
| 82 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 83 | Result<void> run_echo_reverse_server(borrowed_fd listening_fd) { |
| 84 | struct sockaddr_vm client_sa = {}; |
| 85 | socklen_t client_sa_len = sizeof(client_sa); |
| 86 | unique_fd connect_fd{accept4(listening_fd.get(), (struct sockaddr*)&client_sa, &client_sa_len, |
| 87 | SOCK_CLOEXEC)}; |
| 88 | if (!connect_fd.ok()) { |
| 89 | return ErrnoError() << "Failed to accept vsock connection"; |
| 90 | } |
| 91 | |
| 92 | unique_fd input_fd{fcntl(connect_fd, F_DUPFD_CLOEXEC, 0)}; |
| 93 | if (!input_fd.ok()) { |
| 94 | return ErrnoError() << "Failed to dup"; |
| 95 | } |
| 96 | FILE* input = fdopen(input_fd.release(), "r"); |
| 97 | if (!input) { |
| 98 | return ErrnoError() << "Failed to fdopen"; |
| 99 | } |
| 100 | |
David Brazdil | bcce351 | 2023-02-23 15:32:55 +0000 | [diff] [blame] | 101 | // Run forever, reverse one line at a time. |
| 102 | while (true) { |
| 103 | char* line = nullptr; |
| 104 | size_t size = 0; |
| 105 | if (getline(&line, &size, input) < 0) { |
Jiyong Park | 2ff0788 | 2024-12-17 11:30:28 +0900 | [diff] [blame] | 106 | if (errno == 0) { |
| 107 | return {}; // the input was closed |
| 108 | } |
David Brazdil | bcce351 | 2023-02-23 15:32:55 +0000 | [diff] [blame] | 109 | return ErrnoError() << "Failed to read"; |
| 110 | } |
| 111 | |
| 112 | std::string_view original = line; |
| 113 | if (!original.empty() && original.back() == '\n') { |
| 114 | original = original.substr(0, original.size() - 1); |
| 115 | } |
| 116 | |
| 117 | std::string reversed(original.rbegin(), original.rend()); |
| 118 | reversed += "\n"; |
| 119 | |
| 120 | if (write(connect_fd, reversed.data(), reversed.size()) < 0) { |
| 121 | return ErrnoError() << "Failed to write"; |
| 122 | } |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 123 | } |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 124 | } |
| 125 | |
| 126 | Result<void> start_echo_reverse_server() { |
| 127 | unique_fd server_fd{TEMP_FAILURE_RETRY(socket(AF_VSOCK, SOCK_STREAM | SOCK_CLOEXEC, 0))}; |
| 128 | if (!server_fd.ok()) { |
| 129 | return ErrnoError() << "Failed to create vsock socket"; |
| 130 | } |
| 131 | struct sockaddr_vm server_sa = (struct sockaddr_vm){ |
| 132 | .svm_family = AF_VSOCK, |
Alan Stokes | 10c4767 | 2022-12-13 17:17:08 +0000 | [diff] [blame] | 133 | .svm_port = static_cast<uint32_t>(BnTestService::ECHO_REVERSE_PORT), |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 134 | .svm_cid = VMADDR_CID_ANY, |
| 135 | }; |
| 136 | int ret = TEMP_FAILURE_RETRY(bind(server_fd, (struct sockaddr*)&server_sa, sizeof(server_sa))); |
| 137 | if (ret < 0) { |
| 138 | return ErrnoError() << "Failed to bind vsock socket"; |
| 139 | } |
| 140 | ret = TEMP_FAILURE_RETRY(listen(server_fd, /*backlog=*/1)); |
| 141 | if (ret < 0) { |
| 142 | return ErrnoError() << "Failed to listen"; |
| 143 | } |
| 144 | |
| 145 | std::thread accept_thread{[listening_fd = std::move(server_fd)] { |
Jiyong Park | 2ff0788 | 2024-12-17 11:30:28 +0900 | [diff] [blame] | 146 | Result<void> result; |
| 147 | while ((result = run_echo_reverse_server(listening_fd)).ok()) { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 148 | } |
Jiyong Park | 2ff0788 | 2024-12-17 11:30:28 +0900 | [diff] [blame] | 149 | __android_log_write(ANDROID_LOG_ERROR, TAG, result.error().message().c_str()); |
| 150 | // Make sure the VM exits so the test will fail solidly |
| 151 | exit(1); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 152 | }}; |
| 153 | accept_thread.detach(); |
| 154 | |
| 155 | return {}; |
| 156 | } |
| 157 | |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 158 | Result<void> start_test_service() { |
Alan Stokes | 63fa37b | 2023-02-22 14:56:57 +0000 | [diff] [blame] | 159 | class VmCallbackImpl : public BnVmCallback { |
| 160 | private: |
| 161 | std::shared_ptr<IAppCallback> mAppCallback; |
| 162 | |
| 163 | public: |
| 164 | explicit VmCallbackImpl(const std::shared_ptr<IAppCallback>& appCallback) |
| 165 | : mAppCallback(appCallback) {} |
| 166 | |
| 167 | ScopedAStatus echoMessage(const std::string& message) override { |
| 168 | std::thread callback_thread{[=, appCallback = mAppCallback] { |
| 169 | appCallback->onEchoRequestReceived("Received: " + message); |
| 170 | }}; |
| 171 | callback_thread.detach(); |
| 172 | return ScopedAStatus::ok(); |
| 173 | } |
| 174 | }; |
| 175 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 176 | class TestService : public BnTestService { |
Alan Stokes | 63fa37b | 2023-02-22 14:56:57 +0000 | [diff] [blame] | 177 | public: |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 178 | ScopedAStatus addInteger(int32_t a, int32_t b, int32_t* out) override { |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 179 | *out = a + b; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 180 | return ScopedAStatus::ok(); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 181 | } |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 182 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 183 | ScopedAStatus readProperty(const std::string& prop, std::string* out) override { |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 184 | *out = android::base::GetProperty(prop, ""); |
| 185 | if (out->empty()) { |
| 186 | std::string msg = "cannot find property " + prop; |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 187 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 188 | msg.c_str()); |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 189 | } |
| 190 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 191 | return ScopedAStatus::ok(); |
Inseob Kim | 691df6a | 2022-01-20 12:54:30 +0900 | [diff] [blame] | 192 | } |
Andrew Scull | 2e6ab79 | 2022-01-30 16:04:08 +0000 | [diff] [blame] | 193 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 194 | ScopedAStatus insecurelyExposeVmInstanceSecret(std::vector<uint8_t>* out) override { |
Andrew Scull | 102067a | 2022-10-07 00:34:40 +0000 | [diff] [blame] | 195 | const uint8_t identifier[] = {1, 2, 3, 4}; |
Andrew Scull | 655e98e | 2022-10-10 22:24:58 +0000 | [diff] [blame] | 196 | out->resize(32); |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 197 | AVmPayload_getVmInstanceSecret(identifier, sizeof(identifier), out->data(), |
| 198 | out->size()); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 199 | return ScopedAStatus::ok(); |
Andrew Scull | 2e6ab79 | 2022-01-30 16:04:08 +0000 | [diff] [blame] | 200 | } |
Andrew Scull | 1f6ca35 | 2022-02-20 22:51:12 +0000 | [diff] [blame] | 201 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 202 | ScopedAStatus insecurelyExposeAttestationCdi(std::vector<uint8_t>* out) override { |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 203 | size_t cdi_size = AVmPayload_getDiceAttestationCdi(nullptr, 0); |
Andrew Scull | 655e98e | 2022-10-10 22:24:58 +0000 | [diff] [blame] | 204 | out->resize(cdi_size); |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 205 | AVmPayload_getDiceAttestationCdi(out->data(), out->size()); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 206 | return ScopedAStatus::ok(); |
Andrew Scull | 1f6ca35 | 2022-02-20 22:51:12 +0000 | [diff] [blame] | 207 | } |
Andrew Scull | 6189208 | 2022-02-21 00:07:25 +0000 | [diff] [blame] | 208 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 209 | ScopedAStatus getBcc(std::vector<uint8_t>* out) override { |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 210 | size_t bcc_size = AVmPayload_getDiceAttestationChain(nullptr, 0); |
Andrew Scull | 655e98e | 2022-10-10 22:24:58 +0000 | [diff] [blame] | 211 | out->resize(bcc_size); |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 212 | AVmPayload_getDiceAttestationChain(out->data(), out->size()); |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 213 | return ScopedAStatus::ok(); |
Andrew Scull | 6189208 | 2022-02-21 00:07:25 +0000 | [diff] [blame] | 214 | } |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 215 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 216 | ScopedAStatus getApkContentsPath(std::string* out) override { |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 217 | const char* path_c = AVmPayload_getApkContentsPath(); |
| 218 | if (path_c == nullptr) { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 219 | return ScopedAStatus:: |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 220 | fromServiceSpecificErrorWithMessage(0, "Failed to get APK contents path"); |
| 221 | } |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 222 | *out = path_c; |
| 223 | return ScopedAStatus::ok(); |
Alice Wang | 6bbb6da | 2022-10-26 12:44:06 +0000 | [diff] [blame] | 224 | } |
Alan Stokes | 78d2470 | 2022-11-21 15:28:31 +0000 | [diff] [blame] | 225 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 226 | ScopedAStatus getEncryptedStoragePath(std::string* out) override { |
Alan Stokes | 78d2470 | 2022-11-21 15:28:31 +0000 | [diff] [blame] | 227 | const char* path_c = AVmPayload_getEncryptedStoragePath(); |
| 228 | if (path_c == nullptr) { |
| 229 | out->clear(); |
| 230 | } else { |
| 231 | *out = path_c; |
| 232 | } |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 233 | return ScopedAStatus::ok(); |
| 234 | } |
| 235 | |
Shraddha Basantwani | a9a9c4f | 2025-02-25 09:51:48 -0800 | [diff] [blame] | 236 | ScopedAStatus getEncryptedStorageSize(int64_t *out) override { |
| 237 | const char* path_c = AVmPayload_getEncryptedStoragePath(); |
| 238 | if (path_c == nullptr) { |
| 239 | *out = 0; |
| 240 | return ScopedAStatus::ok(); |
| 241 | } |
| 242 | struct statvfs buffer; |
| 243 | if (statvfs(path_c, &buffer) != 0) { |
| 244 | std::string msg = "statvfs " + std::string(path_c) + " failed : " + |
| 245 | std::strerror(errno); |
| 246 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 247 | msg.c_str()); |
| 248 | } |
| 249 | *out= buffer.f_blocks * buffer.f_frsize; |
| 250 | return ScopedAStatus::ok(); |
| 251 | } |
| 252 | |
Nikita Ioffe | 3452ee2 | 2022-12-15 00:31:56 +0000 | [diff] [blame] | 253 | ScopedAStatus getEffectiveCapabilities(std::vector<std::string>* out) override { |
| 254 | if (out == nullptr) { |
| 255 | return ScopedAStatus::ok(); |
| 256 | } |
| 257 | cap_t cap = cap_get_proc(); |
| 258 | auto guard = make_scope_guard([&cap]() { cap_free(cap); }); |
| 259 | for (cap_value_t cap_id = 0; cap_id < CAP_LAST_CAP + 1; cap_id++) { |
| 260 | cap_flag_value_t value; |
| 261 | if (cap_get_flag(cap, cap_id, CAP_EFFECTIVE, &value) != 0) { |
| 262 | return ScopedAStatus:: |
| 263 | fromServiceSpecificErrorWithMessage(0, "cap_get_flag failed"); |
| 264 | } |
| 265 | if (value == CAP_SET) { |
| 266 | // Ideally we would just send back the cap_ids, but I wasn't able to find java |
| 267 | // APIs for linux capabilities, hence we transform to the human readable name |
| 268 | // here. |
| 269 | char* name = cap_to_name(cap_id); |
| 270 | out->push_back(std::string(name) + "(" + std::to_string(cap_id) + ")"); |
| 271 | } |
| 272 | } |
| 273 | return ScopedAStatus::ok(); |
| 274 | } |
| 275 | |
Alan Stokes | 1294f94 | 2023-08-21 14:34:12 +0100 | [diff] [blame] | 276 | ScopedAStatus getUid(int* out) override { |
| 277 | *out = getuid(); |
| 278 | return ScopedAStatus::ok(); |
| 279 | } |
| 280 | |
Alan Stokes | 63fa37b | 2023-02-22 14:56:57 +0000 | [diff] [blame] | 281 | ScopedAStatus runEchoReverseServer() override { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 282 | auto result = start_echo_reverse_server(); |
| 283 | if (result.ok()) { |
| 284 | return ScopedAStatus::ok(); |
| 285 | } else { |
| 286 | std::string message = result.error().message(); |
| 287 | return ScopedAStatus::fromServiceSpecificErrorWithMessage(-1, message.c_str()); |
| 288 | } |
Alan Stokes | 78d2470 | 2022-11-21 15:28:31 +0000 | [diff] [blame] | 289 | } |
Shikha Panwar | dc11b7e | 2022-12-15 12:24:11 +0000 | [diff] [blame] | 290 | |
| 291 | ScopedAStatus writeToFile(const std::string& content, const std::string& path) override { |
| 292 | if (!android::base::WriteStringToFile(content, path)) { |
| 293 | std::string msg = "Failed to write " + content + " to file " + path + |
| 294 | ". Errono: " + std::to_string(errno); |
| 295 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 296 | msg.c_str()); |
| 297 | } |
Shikha Panwar | dc11b7e | 2022-12-15 12:24:11 +0000 | [diff] [blame] | 298 | return ScopedAStatus::ok(); |
| 299 | } |
| 300 | |
| 301 | ScopedAStatus readFromFile(const std::string& path, std::string* out) override { |
| 302 | if (!android::base::ReadFileToString(path, out)) { |
| 303 | std::string msg = |
| 304 | "Failed to read " + path + " to string. Errono: " + std::to_string(errno); |
| 305 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 306 | msg.c_str()); |
| 307 | } |
| 308 | return ScopedAStatus::ok(); |
| 309 | } |
Shikha Panwar | def7ef9 | 2023-01-06 08:35:48 +0000 | [diff] [blame] | 310 | |
Nikita Ioffe | a7cb367 | 2023-02-24 23:10:34 +0000 | [diff] [blame] | 311 | ScopedAStatus getFilePermissions(const std::string& path, int32_t* out) override { |
| 312 | struct stat sb; |
| 313 | if (stat(path.c_str(), &sb) != -1) { |
| 314 | *out = sb.st_mode; |
| 315 | } else { |
| 316 | std::string msg = "stat " + path + " failed : " + std::strerror(errno); |
| 317 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 318 | msg.c_str()); |
| 319 | } |
| 320 | return ScopedAStatus::ok(); |
| 321 | } |
| 322 | |
Nikita Ioffe | 29e15c8 | 2023-02-25 02:31:51 +0000 | [diff] [blame] | 323 | ScopedAStatus getMountFlags(const std::string& mount_point, int32_t* out) override { |
| 324 | Fstab fstab; |
| 325 | if (!ReadFstabFromFile("/proc/mounts", &fstab)) { |
| 326 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 327 | "Failed to read /proc/mounts"); |
| 328 | } |
| 329 | FstabEntry* entry = GetEntryForMountPoint(&fstab, mount_point); |
| 330 | if (entry == nullptr) { |
| 331 | std::string msg = mount_point + " not found in /proc/mounts"; |
| 332 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 333 | msg.c_str()); |
| 334 | } |
| 335 | *out = entry->flags; |
| 336 | return ScopedAStatus::ok(); |
| 337 | } |
| 338 | |
Nikita Ioffe | d5846dc | 2024-11-01 18:44:45 +0000 | [diff] [blame] | 339 | ScopedAStatus getPageSize(int32_t* out) override { |
| 340 | *out = getpagesize(); |
| 341 | return ScopedAStatus::ok(); |
| 342 | } |
| 343 | |
Alan Stokes | 63fa37b | 2023-02-22 14:56:57 +0000 | [diff] [blame] | 344 | ScopedAStatus requestCallback(const std::shared_ptr<IAppCallback>& appCallback) { |
| 345 | auto vmCallback = ndk::SharedRefBase::make<VmCallbackImpl>(appCallback); |
| 346 | std::thread callback_thread{[=] { appCallback->setVmCallback(vmCallback); }}; |
| 347 | callback_thread.detach(); |
| 348 | return ScopedAStatus::ok(); |
| 349 | } |
| 350 | |
Jiyong Park | 92e3472 | 2023-06-27 00:43:39 +0900 | [diff] [blame] | 351 | ScopedAStatus readLineFromConsole(std::string* out) { |
| 352 | FILE* f = fopen("/dev/console", "r"); |
| 353 | if (f == nullptr) { |
| 354 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 355 | "failed to open /dev/console"); |
| 356 | } |
| 357 | char* line = nullptr; |
| 358 | size_t len = 0; |
| 359 | ssize_t nread = getline(&line, &len, f); |
| 360 | |
| 361 | if (nread == -1) { |
| 362 | free(line); |
| 363 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 364 | "failed to read /dev/console"); |
| 365 | } |
| 366 | out->append(line, nread); |
| 367 | free(line); |
| 368 | return ScopedAStatus::ok(); |
| 369 | } |
| 370 | |
Shikha Panwar | 0c3a2fa | 2024-12-06 18:38:06 +0000 | [diff] [blame] | 371 | ScopedAStatus insecurelyReadPayloadRpData(std::array<uint8_t, 32>* out) override { |
Nikita Ioffe | 3e3fdf0 | 2025-01-15 14:20:27 +0000 | [diff] [blame] | 372 | if (__builtin_available(android 36, *)) { |
| 373 | int32_t ret = AVmPayload_readRollbackProtectedSecret(out->data(), 32); |
| 374 | if (ret != 32) { |
| 375 | return ScopedAStatus::fromServiceSpecificError(ret); |
| 376 | } |
| 377 | return ScopedAStatus::ok(); |
| 378 | } else { |
| 379 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 380 | "not available before SDK 36"); |
Shikha Panwar | 0c3a2fa | 2024-12-06 18:38:06 +0000 | [diff] [blame] | 381 | } |
Shikha Panwar | 0c3a2fa | 2024-12-06 18:38:06 +0000 | [diff] [blame] | 382 | } |
| 383 | |
| 384 | ScopedAStatus insecurelyWritePayloadRpData( |
| 385 | const std::array<uint8_t, 32>& inputData) override { |
Nikita Ioffe | 3e3fdf0 | 2025-01-15 14:20:27 +0000 | [diff] [blame] | 386 | if (__builtin_available(android 36, *)) { |
| 387 | int32_t ret = AVmPayload_writeRollbackProtectedSecret(inputData.data(), 32); |
| 388 | if (ret != 32) { |
| 389 | return ScopedAStatus::fromServiceSpecificError(ret); |
| 390 | } |
| 391 | return ScopedAStatus::ok(); |
| 392 | } else { |
| 393 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 394 | "not available before SDK 36"); |
Shikha Panwar | 0c3a2fa | 2024-12-06 18:38:06 +0000 | [diff] [blame] | 395 | } |
Shikha Panwar | 0c3a2fa | 2024-12-06 18:38:06 +0000 | [diff] [blame] | 396 | } |
| 397 | |
Shikha Panwar | 5b7b494 | 2024-12-18 15:32:49 +0000 | [diff] [blame] | 398 | ScopedAStatus isNewInstance(bool* is_new_instance_out) override { |
Nikita Ioffe | 3e3fdf0 | 2025-01-15 14:20:27 +0000 | [diff] [blame] | 399 | if (__builtin_available(android 36, *)) { |
| 400 | *is_new_instance_out = AVmPayload_isNewInstance(); |
| 401 | return ScopedAStatus::ok(); |
| 402 | } else { |
| 403 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 404 | "not available before SDK 36"); |
| 405 | } |
Shikha Panwar | 5b7b494 | 2024-12-18 15:32:49 +0000 | [diff] [blame] | 406 | } |
| 407 | |
Nikita Ioffe | 901083f | 2025-01-20 01:54:28 +0000 | [diff] [blame] | 408 | ScopedAStatus checkLibIcuIsAccessible() override { |
Nikita Ioffe | aa9f603 | 2025-01-21 18:06:46 +0000 | [diff] [blame] | 409 | #ifdef __MICRODROID_TEST_PAYLOAD_USES_LIBICU__ |
Nikita Ioffe | 901083f | 2025-01-20 01:54:28 +0000 | [diff] [blame] | 410 | static constexpr const char* kLibIcuPath = "/apex/com.android.i18n/lib64/libicu.so"; |
| 411 | if (access(kLibIcuPath, R_OK) == 0) { |
Nikita Ioffe | aa9f603 | 2025-01-21 18:06:46 +0000 | [diff] [blame] | 412 | if (!u_hasBinaryProperty(U'❤' /* Emoji heart U+2764 */, UCHAR_EMOJI)) { |
| 413 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 414 | "libicu broken!"); |
| 415 | } |
Nikita Ioffe | 901083f | 2025-01-20 01:54:28 +0000 | [diff] [blame] | 416 | return ScopedAStatus::ok(); |
| 417 | } else { |
| 418 | std::string msg = "failed to access " + std::string(kLibIcuPath) + "(" + |
| 419 | std::to_string(errno) + ")"; |
| 420 | return ScopedAStatus::fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 421 | msg.c_str()); |
| 422 | } |
Nikita Ioffe | aa9f603 | 2025-01-21 18:06:46 +0000 | [diff] [blame] | 423 | #else |
| 424 | return ScopedAStatus:: |
| 425 | fromExceptionCodeWithMessage(EX_SERVICE_SPECIFIC, |
| 426 | "should be only used together with " |
| 427 | "MicrodroidTestNativeLibWithLibIcu.so payload"); |
| 428 | #endif |
Nikita Ioffe | 901083f | 2025-01-20 01:54:28 +0000 | [diff] [blame] | 429 | } |
| 430 | |
Shikha Panwar | def7ef9 | 2023-01-06 08:35:48 +0000 | [diff] [blame] | 431 | ScopedAStatus quit() override { exit(0); } |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 432 | }; |
| 433 | auto testService = ndk::SharedRefBase::make<TestService>(); |
| 434 | |
Alan Stokes | 65bbb91 | 2022-11-23 09:39:34 +0000 | [diff] [blame] | 435 | auto callback = []([[maybe_unused]] void* param) { AVmPayload_notifyPayloadReady(); }; |
Devin Moore | caf7b95 | 2023-04-24 20:14:35 +0000 | [diff] [blame] | 436 | AVmPayload_runVsockRpcServer(testService->asBinder().get(), testService->PORT, callback, |
Alan Stokes | e0945ad | 2022-11-24 13:29:57 +0000 | [diff] [blame] | 437 | nullptr); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 438 | |
| 439 | return {}; |
| 440 | } |
| 441 | |
Alan Stokes | 4b31a48 | 2024-02-01 17:56:06 +0000 | [diff] [blame] | 442 | Result<void> verify_build_manifest() { |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 443 | const char* path = "/mnt/extra-apk/0/assets/build_manifest.pb"; |
| 444 | |
| 445 | std::string str; |
| 446 | if (!android::base::ReadFileToString(path, &str)) { |
| 447 | return ErrnoError() << "failed to read build_manifest.pb"; |
| 448 | } |
| 449 | |
| 450 | if (!android::security::fsverity::FSVerityDigests().ParseFromString(str)) { |
| 451 | return Error() << "invalid build_manifest.pb"; |
| 452 | } |
| 453 | |
| 454 | return {}; |
| 455 | } |
| 456 | |
Alan Stokes | 4b31a48 | 2024-02-01 17:56:06 +0000 | [diff] [blame] | 457 | Result<void> verify_vm_share() { |
| 458 | const char* path = "/mnt/extra-apk/0/assets/vmshareapp.txt"; |
| 459 | |
| 460 | std::string str; |
| 461 | if (!android::base::ReadFileToString(path, &str)) { |
| 462 | return ErrnoError() << "failed to read vmshareapp.txt"; |
| 463 | } |
| 464 | |
| 465 | return {}; |
| 466 | } |
| 467 | |
Andrew Scull | 6661661 | 2021-06-17 16:41:03 +0000 | [diff] [blame] | 468 | } // Anonymous namespace |
| 469 | |
Alan Stokes | 52d3c72 | 2022-10-04 17:27:13 +0100 | [diff] [blame] | 470 | extern "C" int AVmPayload_main() { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 471 | __android_log_write(ANDROID_LOG_INFO, TAG, "Hello Microdroid"); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 472 | |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 473 | // Make sure we can call into other shared libraries. |
Jiyong Park | fe5b28e | 2021-06-24 00:19:02 +0900 | [diff] [blame] | 474 | testlib_sub(); |
Jiyong Park | 2393439 | 2021-06-16 01:59:10 +0900 | [diff] [blame] | 475 | |
Alan Stokes | 4b31a48 | 2024-02-01 17:56:06 +0000 | [diff] [blame] | 476 | // Report various things that aren't always fatal - these are checked in MicrodroidTests as |
| 477 | // appropriate. |
| 478 | report_test("extra_apk_build_manifest", verify_build_manifest()); |
| 479 | report_test("extra_apk_vm_share", verify_vm_share()); |
Inseob Kim | db31970 | 2022-01-20 13:12:43 +0900 | [diff] [blame] | 480 | |
Jiyong Park | 2393439 | 2021-06-16 01:59:10 +0900 | [diff] [blame] | 481 | __system_property_set("debug.microdroid.app.run", "true"); |
Andrew Scull | edbe75e | 2021-07-06 10:44:31 +0000 | [diff] [blame] | 482 | |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 483 | if (auto res = start_test_service(); res.ok()) { |
| 484 | return 0; |
| 485 | } else { |
Alan Stokes | d1a30dd | 2022-11-30 09:39:54 +0000 | [diff] [blame] | 486 | __android_log_write(ANDROID_LOG_ERROR, TAG, res.error().message().c_str()); |
Inseob Kim | 06a64d6 | 2021-09-07 21:21:45 +0900 | [diff] [blame] | 487 | return 1; |
| 488 | } |
Jiyong Park | a7266ac | 2021-05-17 21:57:24 +0900 | [diff] [blame] | 489 | } |