|  | /* | 
|  | * Copyright (c) 2009-2013, Google Inc. | 
|  | * All rights reserved. | 
|  | * | 
|  | * Redistribution and use in source and binary forms, with or without | 
|  | * modification, are permitted provided that the following conditions | 
|  | * are met: | 
|  | *  * Redistributions of source code must retain the above copyright | 
|  | *    notice, this list of conditions and the following disclaimer. | 
|  | *  * Redistributions in binary form must reproduce the above copyright | 
|  | *    notice, this list of conditions and the following disclaimer in | 
|  | *    the documentation and/or other materials provided with the | 
|  | *    distribution. | 
|  | *  * Neither the name of Google, Inc. nor the names of its contributors | 
|  | *    may be used to endorse or promote products derived from this | 
|  | *    software without specific prior written permission. | 
|  | * | 
|  | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | 
|  | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | 
|  | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS | 
|  | * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE | 
|  | * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, | 
|  | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, | 
|  | * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS | 
|  | * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED | 
|  | * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | 
|  | * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | 
|  | * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
|  | * SUCH DAMAGE. | 
|  | */ | 
|  |  | 
|  | #include <inttypes.h> | 
|  | #include <stdlib.h> | 
|  | #include <unistd.h> | 
|  | #include <sys/types.h> | 
|  | #include <sys/mman.h> | 
|  | #include <sys/stat.h> | 
|  | #include <unistd.h> | 
|  | #include <sys/reboot.h> | 
|  | #include <fcntl.h> | 
|  |  | 
|  | #include "bootimg.h" | 
|  | #include "commands/boot.h" | 
|  | #include "commands/flash.h" | 
|  | #include "commands/partitions.h" | 
|  | #include "commands/virtual_partitions.h" | 
|  | #include "debug.h" | 
|  | #include "protocol.h" | 
|  | #include "trigger.h" | 
|  | #include "utils.h" | 
|  |  | 
|  | #define ATAGS_LOCATION "/proc/atags" | 
|  |  | 
|  | static void cmd_boot(struct protocol_handle *phandle, const char *arg) | 
|  | { | 
|  | int sz, atags_sz, new_atags_sz; | 
|  | int rv; | 
|  | unsigned kernel_actual; | 
|  | unsigned ramdisk_actual; | 
|  | unsigned second_actual; | 
|  | void *kernel_ptr; | 
|  | void *ramdisk_ptr; | 
|  | void *second_ptr; | 
|  | struct boot_img_hdr *hdr; | 
|  | char *ptr = NULL; | 
|  | char *atags_ptr = NULL; | 
|  | char *new_atags = NULL; | 
|  | int data_fd = 0; | 
|  |  | 
|  | D(DEBUG, "cmd_boot %s\n", arg); | 
|  |  | 
|  | if (phandle->download_fd < 0) { | 
|  | fastboot_fail(phandle, "no kernel file"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | atags_ptr = read_atags(ATAGS_LOCATION, &atags_sz); | 
|  | if (atags_ptr == NULL) { | 
|  | fastboot_fail(phandle, "atags read error"); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | // TODO: With cms we can also verify partition name included as | 
|  | // cms signed attribute | 
|  | if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { | 
|  | fastboot_fail(phandle, "Access forbiden you need the certificate"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | sz = get_file_size(data_fd); | 
|  |  | 
|  | ptr = (char *) mmap(NULL, sz, PROT_READ, | 
|  | MAP_POPULATE | MAP_PRIVATE, data_fd, 0); | 
|  |  | 
|  | hdr = (struct boot_img_hdr *) ptr; | 
|  |  | 
|  | if (ptr == MAP_FAILED) { | 
|  | fastboot_fail(phandle, "internal fastbootd error"); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | if ((size_t) sz < sizeof(*hdr)) { | 
|  | fastboot_fail(phandle, "invalid bootimage header"); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | kernel_actual = ROUND_TO_PAGE(hdr->kernel_size, hdr->page_size); | 
|  | ramdisk_actual = ROUND_TO_PAGE(hdr->ramdisk_size, hdr->page_size); | 
|  | second_actual = ROUND_TO_PAGE(hdr->second_size, hdr->page_size); | 
|  |  | 
|  | new_atags = (char *) create_atags((unsigned *) atags_ptr, atags_sz, hdr, &new_atags_sz); | 
|  |  | 
|  | if (new_atags == NULL) { | 
|  | fastboot_fail(phandle, "atags generate error"); | 
|  | goto error; | 
|  | } | 
|  | if (new_atags_sz > 0x4000) { | 
|  | fastboot_fail(phandle, "atags file to large"); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | if ((int) (hdr->page_size + kernel_actual + ramdisk_actual) < sz) { | 
|  | fastboot_fail(phandle, "incomplete bootimage"); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | kernel_ptr = (void *)((uintptr_t) ptr + hdr->page_size); | 
|  | ramdisk_ptr = (void *)((uintptr_t) kernel_ptr + kernel_actual); | 
|  | second_ptr = (void *)((uintptr_t) ramdisk_ptr + ramdisk_actual); | 
|  |  | 
|  | D(INFO, "preparing to boot"); | 
|  | // Prepares boot physical address. Addresses from header are ignored | 
|  | rv = prepare_boot_linux(hdr->kernel_addr, kernel_ptr, kernel_actual, | 
|  | hdr->ramdisk_addr, ramdisk_ptr, ramdisk_actual, | 
|  | hdr->second_addr, second_ptr, second_actual, | 
|  | hdr->tags_addr, new_atags, ROUND_TO_PAGE(new_atags_sz, hdr->page_size)); | 
|  | if (rv < 0) { | 
|  | fastboot_fail(phandle, "kexec prepare failed"); | 
|  | goto error; | 
|  | } | 
|  |  | 
|  | fastboot_okay(phandle, ""); | 
|  |  | 
|  | free(atags_ptr); | 
|  | munmap(ptr, sz); | 
|  | free(new_atags); | 
|  | close(data_fd); | 
|  |  | 
|  | D(INFO, "Kexec going to reboot"); | 
|  | reboot(LINUX_REBOOT_CMD_KEXEC); | 
|  |  | 
|  | fastboot_fail(phandle, "reboot error"); | 
|  |  | 
|  | return; | 
|  |  | 
|  | error: | 
|  |  | 
|  | if (atags_ptr != NULL) | 
|  | free(atags_ptr); | 
|  | if (ptr != NULL) | 
|  | munmap(ptr, sz); | 
|  |  | 
|  | } | 
|  |  | 
|  | static void cmd_erase(struct protocol_handle *phandle, const char *arg) | 
|  | { | 
|  | int partition_fd; | 
|  | char path[PATH_MAX]; | 
|  | D(DEBUG, "cmd_erase %s\n", arg); | 
|  |  | 
|  | if (flash_find_entry(arg, path, PATH_MAX)) { | 
|  | fastboot_fail(phandle, "partition table doesn't exist"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (path == NULL) { | 
|  | fastboot_fail(phandle, "Couldn't find partition"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | partition_fd = flash_get_partiton(path); | 
|  | if (partition_fd < 0) { | 
|  | fastboot_fail(phandle, "partiton file does not exists"); | 
|  | } | 
|  |  | 
|  | if (flash_erase(partition_fd)) { | 
|  | fastboot_fail(phandle, "failed to erase partition"); | 
|  | flash_close(partition_fd); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (flash_close(partition_fd) < 0) { | 
|  | D(ERR, "could not close device %s", strerror(errno)); | 
|  | fastboot_fail(phandle, "failed to erase partition"); | 
|  | return; | 
|  | } | 
|  | fastboot_okay(phandle, ""); | 
|  | } | 
|  |  | 
|  | static int GPT_header_location() { | 
|  | const char *location_str = fastboot_getvar("gpt_sector"); | 
|  | char *str; | 
|  | int location; | 
|  |  | 
|  | if (!strcmp("", location_str)) { | 
|  | D(INFO, "GPT location not specified using second sector"); | 
|  | return 1; | 
|  | } | 
|  | else { | 
|  | location = strtoul(location_str, &str, 10); | 
|  | D(INFO, "GPT location specified as %d", location); | 
|  |  | 
|  | if (*str != '\0') | 
|  | return -1; | 
|  |  | 
|  | return location - 1; | 
|  | } | 
|  | } | 
|  |  | 
|  | static void cmd_gpt_layout(struct protocol_handle *phandle, const char *arg) { | 
|  | struct GPT_entry_table *oldtable; | 
|  | int location; | 
|  | struct GPT_content content; | 
|  | const char *device; | 
|  | device = fastboot_getvar("blockdev"); | 
|  |  | 
|  | if (!strcmp(device, "")) { | 
|  | fastboot_fail(phandle, "blockdev not defined in config file"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | //TODO: add same verification as in cmd_flash | 
|  | if (phandle->download_fd < 0) { | 
|  | fastboot_fail(phandle, "no layout file"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | location = GPT_header_location(); | 
|  | oldtable = GPT_get_device(device, location); | 
|  |  | 
|  | GPT_default_content(&content, oldtable); | 
|  | if (oldtable == NULL) | 
|  | D(WARN, "Could not get old gpt table"); | 
|  | else | 
|  | GPT_release_device(oldtable); | 
|  |  | 
|  | if (!GPT_parse_file(phandle->download_fd, &content)) { | 
|  | fastboot_fail(phandle, "Could not parse partition config file"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (trigger_gpt_layout(&content)) { | 
|  | fastboot_fail(phandle, "Vendor forbids this opperation"); | 
|  | GPT_release_content(&content); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (!GPT_write_content(device, &content)) { | 
|  | fastboot_fail(phandle, "Unable to write gpt file"); | 
|  | GPT_release_content(&content); | 
|  | return; | 
|  | } | 
|  |  | 
|  | GPT_release_content(&content); | 
|  | fastboot_okay(phandle, ""); | 
|  | } | 
|  |  | 
|  | static void cmd_flash(struct protocol_handle *phandle, const char *arg) | 
|  | { | 
|  | int partition; | 
|  | uint64_t sz; | 
|  | char data[BOOT_MAGIC_SIZE]; | 
|  | char path[PATH_MAX]; | 
|  | ssize_t header_sz = 0; | 
|  | int data_fd = 0; | 
|  |  | 
|  | D(DEBUG, "cmd_flash %s\n", arg); | 
|  |  | 
|  | if (try_handle_virtual_partition(phandle, arg)) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (phandle->download_fd < 0) { | 
|  | fastboot_fail(phandle, "no kernel file"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (flash_find_entry(arg, path, PATH_MAX)) { | 
|  | fastboot_fail(phandle, "partition table doesn't exist"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { | 
|  | fastboot_fail(phandle, "Access forbiden you need certificate"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | // TODO: Maybe its goot idea to check whether the partition is bootable | 
|  | if (!strcmp(arg, "boot") || !strcmp(arg, "recovery")) { | 
|  | if (read_data_once(data_fd, data, BOOT_MAGIC_SIZE) < BOOT_MAGIC_SIZE) { | 
|  | fastboot_fail(phandle, "incoming data read error, cannot read boot header"); | 
|  | return; | 
|  | } | 
|  | if (memcmp((void *)data, BOOT_MAGIC, BOOT_MAGIC_SIZE)) { | 
|  | fastboot_fail(phandle, "image is not a boot image"); | 
|  | return; | 
|  | } | 
|  | } | 
|  |  | 
|  | partition = flash_get_partiton(path); | 
|  |  | 
|  | sz = get_file_size64(data_fd); | 
|  |  | 
|  | sz -= header_sz; | 
|  |  | 
|  | if (sz > get_file_size64(partition)) { | 
|  | flash_close(partition); | 
|  | D(WARN, "size of file too large"); | 
|  | fastboot_fail(phandle, "size of file too large"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | D(INFO, "writing %"PRId64" bytes to '%s'\n", sz, arg); | 
|  |  | 
|  | if (flash_write(partition, phandle->download_fd, sz, header_sz)) { | 
|  | fastboot_fail(phandle, "flash write failure"); | 
|  | return; | 
|  | } | 
|  | D(INFO, "partition '%s' updated\n", arg); | 
|  |  | 
|  | flash_close(partition); | 
|  | close(data_fd); | 
|  |  | 
|  | fastboot_okay(phandle, ""); | 
|  | } | 
|  |  | 
|  | static void cmd_continue(struct protocol_handle *phandle, const char *arg) | 
|  | { | 
|  | fastboot_okay(phandle, ""); | 
|  | #if 0 | 
|  | udc_stop(); | 
|  |  | 
|  | boot_linux_from_flash(); | 
|  | #endif | 
|  | } | 
|  |  | 
|  | static void cmd_getvar(struct protocol_handle *phandle, const char *arg) | 
|  | { | 
|  | const char *value; | 
|  | D(DEBUG, "cmd_getvar %s\n", arg); | 
|  |  | 
|  | value = fastboot_getvar(arg); | 
|  |  | 
|  | fastboot_okay(phandle, value); | 
|  | } | 
|  |  | 
|  | static void cmd_download(struct protocol_handle *phandle, const char *arg) | 
|  | { | 
|  | unsigned len = strtoul(arg, NULL, 16); | 
|  | int old_fd; | 
|  |  | 
|  | if (len > 256 * 1024 * 1024) { | 
|  | fastboot_fail(phandle, "data too large"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | fastboot_data(phandle, len); | 
|  |  | 
|  | old_fd = protocol_get_download(phandle); | 
|  | if (old_fd >= 0) { | 
|  | off_t len = lseek(old_fd, 0, SEEK_END); | 
|  | D(INFO, "disposing of unused fd %d, size %ld", old_fd, len); | 
|  | close(old_fd); | 
|  | } | 
|  |  | 
|  | phandle->download_fd = protocol_handle_download(phandle, len); | 
|  | if (phandle->download_fd < 0) { | 
|  | fastboot_fail(phandle, "download failed"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | fastboot_okay(phandle, ""); | 
|  | } | 
|  |  | 
|  | static void cmd_oem(struct protocol_handle *phandle, const char *arg) { | 
|  | const char *response = ""; | 
|  |  | 
|  | //TODO: Maybe it should get download descriptor also | 
|  | if (trigger_oem_cmd(arg, &response)) | 
|  | fastboot_fail(phandle, response); | 
|  | else | 
|  | fastboot_okay(phandle, response); | 
|  | } | 
|  |  | 
|  | void commands_init() | 
|  | { | 
|  | virtual_partition_register("partition-table", cmd_gpt_layout); | 
|  |  | 
|  | fastboot_register("boot", cmd_boot); | 
|  | fastboot_register("erase:", cmd_erase); | 
|  | fastboot_register("flash:", cmd_flash); | 
|  | fastboot_register("continue", cmd_continue); | 
|  | fastboot_register("getvar:", cmd_getvar); | 
|  | fastboot_register("download:", cmd_download); | 
|  | fastboot_register("oem", cmd_oem); | 
|  | //fastboot_publish("version", "0.5"); | 
|  | //fastboot_publish("product", "swordfish"); | 
|  | //fastboot_publish("kernel", "lk"); | 
|  | } |