|  | /* | 
|  | * Copyright (C) 2017 The Android Open Source Project | 
|  | * | 
|  | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | * you may not use this file except in compliance with the License. | 
|  | * You may obtain a copy of the License at | 
|  | * | 
|  | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | * Unless required by applicable law or agreed to in writing, software | 
|  | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | * See the License for the specific language governing permissions and | 
|  | * limitations under the License. | 
|  | */ | 
|  |  | 
|  | #include "firmware_handler.h" | 
|  |  | 
|  | #include <fcntl.h> | 
|  | #include <fnmatch.h> | 
|  | #include <glob.h> | 
|  | #include <grp.h> | 
|  | #include <pwd.h> | 
|  | #include <signal.h> | 
|  | #include <stdlib.h> | 
|  | #include <string.h> | 
|  | #include <sys/sendfile.h> | 
|  | #include <sys/wait.h> | 
|  | #include <unistd.h> | 
|  |  | 
|  | #include <thread> | 
|  |  | 
|  | #include <android-base/chrono_utils.h> | 
|  | #include <android-base/file.h> | 
|  | #include <android-base/logging.h> | 
|  | #include <android-base/properties.h> | 
|  | #include <android-base/scopeguard.h> | 
|  | #include <android-base/strings.h> | 
|  | #include <android-base/unique_fd.h> | 
|  |  | 
|  | using android::base::ReadFdToString; | 
|  | using android::base::Socketpair; | 
|  | using android::base::Split; | 
|  | using android::base::Timer; | 
|  | using android::base::Trim; | 
|  | using android::base::unique_fd; | 
|  | using android::base::WaitForProperty; | 
|  | using android::base::WriteFully; | 
|  |  | 
|  | namespace android { | 
|  | namespace init { | 
|  |  | 
|  | namespace { | 
|  | bool PrefixMatch(const std::string& pattern, const std::string& path) { | 
|  | return android::base::StartsWith(path, pattern); | 
|  | } | 
|  |  | 
|  | bool FnMatch(const std::string& pattern, const std::string& path) { | 
|  | return fnmatch(pattern.c_str(), path.c_str(), 0) == 0; | 
|  | } | 
|  |  | 
|  | bool EqualMatch(const std::string& pattern, const std::string& path) { | 
|  | return pattern == path; | 
|  | } | 
|  | }  // namespace | 
|  |  | 
|  | static void LoadFirmware(const std::string& firmware, const std::string& root, int fw_fd, | 
|  | size_t fw_size, int loading_fd, int data_fd) { | 
|  | // Start transfer. | 
|  | WriteFully(loading_fd, "1", 1); | 
|  |  | 
|  | // Copy the firmware. | 
|  | int rc = sendfile(data_fd, fw_fd, nullptr, fw_size); | 
|  | if (rc == -1) { | 
|  | PLOG(ERROR) << "firmware: sendfile failed { '" << root << "', '" << firmware << "' }"; | 
|  | } | 
|  |  | 
|  | // Tell the firmware whether to abort or commit. | 
|  | const char* response = (rc != -1) ? "0" : "-1"; | 
|  | WriteFully(loading_fd, response, strlen(response)); | 
|  | } | 
|  |  | 
|  | static bool IsBooting() { | 
|  | return access("/dev/.booting", F_OK) == 0; | 
|  | } | 
|  |  | 
|  | static bool IsApexActivated() { | 
|  | static bool apex_activated = []() { | 
|  | // Wait for com.android.runtime.apex activation | 
|  | // Property name and value must be kept in sync with system/apexd/apex/apex_constants.h | 
|  | // 60s is the default firmware sysfs fallback timeout. (/sys/class/firmware/timeout) | 
|  | if (!WaitForProperty("apexd.status", "activated", 60s)) { | 
|  | LOG(ERROR) << "Apexd activation wait timeout"; | 
|  | return false; | 
|  | } | 
|  | return true; | 
|  | }(); | 
|  |  | 
|  | return apex_activated; | 
|  | } | 
|  |  | 
|  | static bool NeedsRerunExternalHandler() { | 
|  | static bool first = true; | 
|  |  | 
|  | // Rerun external handler only on the first try and when apex is activated | 
|  | if (first) { | 
|  | first = false; | 
|  | return IsApexActivated(); | 
|  | } | 
|  |  | 
|  | return first; | 
|  | } | 
|  |  | 
|  | ExternalFirmwareHandler::ExternalFirmwareHandler(std::string devpath, uid_t uid, gid_t gid, | 
|  | std::string handler_path) | 
|  | : devpath(std::move(devpath)), uid(uid), gid(gid), handler_path(std::move(handler_path)) { | 
|  | auto wildcard_position = this->devpath.find('*'); | 
|  | if (wildcard_position != std::string::npos) { | 
|  | if (wildcard_position == this->devpath.length() - 1) { | 
|  | this->devpath.pop_back(); | 
|  | match = std::bind(PrefixMatch, this->devpath, std::placeholders::_1); | 
|  | } else { | 
|  | match = std::bind(FnMatch, this->devpath, std::placeholders::_1); | 
|  | } | 
|  | } else { | 
|  | match = std::bind(EqualMatch, this->devpath, std::placeholders::_1); | 
|  | } | 
|  | } | 
|  |  | 
|  | ExternalFirmwareHandler::ExternalFirmwareHandler(std::string devpath, uid_t uid, | 
|  | std::string handler_path) | 
|  | : ExternalFirmwareHandler(devpath, uid, 0, handler_path) {} | 
|  |  | 
|  | FirmwareHandler::FirmwareHandler(std::vector<std::string> firmware_directories, | 
|  | std::vector<ExternalFirmwareHandler> external_firmware_handlers) | 
|  | : firmware_directories_(std::move(firmware_directories)), | 
|  | external_firmware_handlers_(std::move(external_firmware_handlers)) {} | 
|  |  | 
|  | Result<std::string> FirmwareHandler::RunExternalHandler(const std::string& handler, uid_t uid, | 
|  | gid_t gid, const Uevent& uevent) const { | 
|  | unique_fd child_stdout; | 
|  | unique_fd parent_stdout; | 
|  | if (!Socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0, &child_stdout, &parent_stdout)) { | 
|  | return ErrnoError() << "Socketpair() for stdout failed"; | 
|  | } | 
|  |  | 
|  | unique_fd child_stderr; | 
|  | unique_fd parent_stderr; | 
|  | if (!Socketpair(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0, &child_stderr, &parent_stderr)) { | 
|  | return ErrnoError() << "Socketpair() for stderr failed"; | 
|  | } | 
|  |  | 
|  | signal(SIGCHLD, SIG_DFL); | 
|  |  | 
|  | auto pid = fork(); | 
|  | if (pid < 0) { | 
|  | return ErrnoError() << "fork() failed"; | 
|  | } | 
|  |  | 
|  | if (pid == 0) { | 
|  | setenv("FIRMWARE", uevent.firmware.c_str(), 1); | 
|  | setenv("DEVPATH", uevent.path.c_str(), 1); | 
|  | parent_stdout.reset(); | 
|  | parent_stderr.reset(); | 
|  | close(STDOUT_FILENO); | 
|  | close(STDERR_FILENO); | 
|  | dup2(child_stdout.get(), STDOUT_FILENO); | 
|  | dup2(child_stderr.get(), STDERR_FILENO); | 
|  |  | 
|  | auto args = Split(handler, " "); | 
|  | std::vector<char*> c_args; | 
|  | for (auto& arg : args) { | 
|  | c_args.emplace_back(arg.data()); | 
|  | } | 
|  | c_args.emplace_back(nullptr); | 
|  |  | 
|  | if (gid != 0) { | 
|  | if (setgid(gid) != 0) { | 
|  | fprintf(stderr, "setgid() failed: %s", strerror(errno)); | 
|  | _exit(EXIT_FAILURE); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (setuid(uid) != 0) { | 
|  | fprintf(stderr, "setuid() failed: %s", strerror(errno)); | 
|  | _exit(EXIT_FAILURE); | 
|  | } | 
|  |  | 
|  | execv(c_args[0], c_args.data()); | 
|  | fprintf(stderr, "exec() failed: %s", strerror(errno)); | 
|  | _exit(EXIT_FAILURE); | 
|  | } | 
|  |  | 
|  | child_stdout.reset(); | 
|  | child_stderr.reset(); | 
|  |  | 
|  | int status; | 
|  | pid_t waited_pid = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0)); | 
|  | if (waited_pid == -1) { | 
|  | return ErrnoError() << "waitpid() failed"; | 
|  | } | 
|  |  | 
|  | std::string stdout_content; | 
|  | if (!ReadFdToString(parent_stdout.get(), &stdout_content)) { | 
|  | return ErrnoError() << "ReadFdToString() for stdout failed"; | 
|  | } | 
|  |  | 
|  | std::string stderr_content; | 
|  | if (ReadFdToString(parent_stderr.get(), &stderr_content)) { | 
|  | auto messages = Split(stderr_content, "\n"); | 
|  | for (const auto& message : messages) { | 
|  | if (!message.empty()) { | 
|  | LOG(ERROR) << "External Firmware Handler: " << message; | 
|  | } | 
|  | } | 
|  | } else { | 
|  | LOG(ERROR) << "ReadFdToString() for stderr failed"; | 
|  | } | 
|  |  | 
|  | if (WIFEXITED(status)) { | 
|  | if (WEXITSTATUS(status) == EXIT_SUCCESS) { | 
|  | return Trim(stdout_content); | 
|  | } else { | 
|  | return Error() << "exited with status " << WEXITSTATUS(status); | 
|  | } | 
|  | } else if (WIFSIGNALED(status)) { | 
|  | return Error() << "killed by signal " << WTERMSIG(status); | 
|  | } | 
|  |  | 
|  | return Error() << "unexpected exit status " << status; | 
|  | } | 
|  |  | 
|  | std::string FirmwareHandler::GetFirmwarePath(const Uevent& uevent) const { | 
|  | for (const auto& external_handler : external_firmware_handlers_) { | 
|  | if (external_handler.match(uevent.path)) { | 
|  | LOG(INFO) << "Launching external firmware handler '" << external_handler.handler_path | 
|  | << "' for devpath: '" << uevent.path << "' firmware: '" << uevent.firmware | 
|  | << "'"; | 
|  |  | 
|  | auto result = RunExternalHandler(external_handler.handler_path, external_handler.uid, | 
|  | external_handler.gid, uevent); | 
|  | if (!result.ok() && NeedsRerunExternalHandler()) { | 
|  | auto res = RunExternalHandler(external_handler.handler_path, external_handler.uid, | 
|  | external_handler.gid, uevent); | 
|  | result = std::move(res); | 
|  | } | 
|  | if (!result.ok()) { | 
|  | LOG(ERROR) << "Using default firmware; External firmware handler failed: " | 
|  | << result.error(); | 
|  | return uevent.firmware; | 
|  | } | 
|  | if (result->find("..") != std::string::npos) { | 
|  | LOG(ERROR) << "Using default firmware; External firmware handler provided an " | 
|  | "invalid path, '" | 
|  | << *result << "'"; | 
|  | return uevent.firmware; | 
|  | } | 
|  | LOG(INFO) << "Loading firmware '" << *result << "' in place of '" << uevent.firmware | 
|  | << "'"; | 
|  | return *result; | 
|  | } | 
|  | } | 
|  | LOG(INFO) << "firmware: loading '" << uevent.firmware << "' for '" << uevent.path << "'"; | 
|  | return uevent.firmware; | 
|  | } | 
|  |  | 
|  | void FirmwareHandler::ProcessFirmwareEvent(const std::string& root, | 
|  | const std::string& firmware) const { | 
|  | std::string loading = root + "/loading"; | 
|  | std::string data = root + "/data"; | 
|  |  | 
|  | unique_fd loading_fd(open(loading.c_str(), O_WRONLY | O_CLOEXEC)); | 
|  | if (loading_fd == -1) { | 
|  | PLOG(ERROR) << "couldn't open firmware loading fd for " << firmware; | 
|  | return; | 
|  | } | 
|  |  | 
|  | unique_fd data_fd(open(data.c_str(), O_WRONLY | O_CLOEXEC)); | 
|  | if (data_fd == -1) { | 
|  | PLOG(ERROR) << "couldn't open firmware data fd for " << firmware; | 
|  | return; | 
|  | } | 
|  |  | 
|  | std::vector<std::string> attempted_paths_and_errors; | 
|  | auto TryLoadFirmware = [&](const std::string& firmware_directory) { | 
|  | std::string file = firmware_directory + firmware; | 
|  | unique_fd fw_fd(open(file.c_str(), O_RDONLY | O_CLOEXEC)); | 
|  | if (fw_fd == -1) { | 
|  | attempted_paths_and_errors.emplace_back("firmware: attempted " + file + | 
|  | ", open failed: " + strerror(errno)); | 
|  | return false; | 
|  | } | 
|  | struct stat sb; | 
|  | if (fstat(fw_fd.get(), &sb) == -1) { | 
|  | attempted_paths_and_errors.emplace_back("firmware: attempted " + file + | 
|  | ", fstat failed: " + strerror(errno)); | 
|  | return false; | 
|  | } | 
|  | LoadFirmware(firmware, root, fw_fd.get(), sb.st_size, loading_fd.get(), data_fd.get()); | 
|  | return true; | 
|  | }; | 
|  |  | 
|  | int booting = IsBooting(); | 
|  | try_loading_again: | 
|  | attempted_paths_and_errors.clear(); | 
|  | if (ForEachFirmwareDirectory(TryLoadFirmware)) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (booting) { | 
|  | // If we're not fully booted, we may be missing | 
|  | // filesystems needed for firmware, wait and retry. | 
|  | std::this_thread::sleep_for(100ms); | 
|  | booting = IsBooting(); | 
|  | goto try_loading_again; | 
|  | } | 
|  |  | 
|  | LOG(ERROR) << "firmware: could not find firmware for " << firmware; | 
|  | for (const auto& message : attempted_paths_and_errors) { | 
|  | LOG(ERROR) << message; | 
|  | } | 
|  |  | 
|  | // Write "-1" as our response to the kernel's firmware request, since we have nothing for it. | 
|  | write(loading_fd.get(), "-1", 2); | 
|  | } | 
|  |  | 
|  | bool FirmwareHandler::ForEachFirmwareDirectory( | 
|  | std::function<bool(const std::string&)> handler) const { | 
|  | for (const std::string& firmware_directory : firmware_directories_) { | 
|  | if (std::invoke(handler, firmware_directory)) { | 
|  | return true; | 
|  | } | 
|  | } | 
|  |  | 
|  | glob_t glob_result; | 
|  | glob("/apex/*/etc/firmware/", GLOB_MARK, nullptr, &glob_result); | 
|  | auto free_glob = android::base::make_scope_guard(std::bind(&globfree, &glob_result)); | 
|  | for (size_t i = 0; i < glob_result.gl_pathc; i++) { | 
|  | char* apex_firmware_directory = glob_result.gl_pathv[i]; | 
|  | // Filter-out /apex/<name>@<ver> paths. The paths are bind-mounted to | 
|  | // /apex/<name> paths, so unless we filter them out, we will look into the | 
|  | // same apex twice. | 
|  | if (strchr(apex_firmware_directory, '@')) { | 
|  | continue; | 
|  | } | 
|  | if (std::invoke(handler, apex_firmware_directory)) { | 
|  | return true; | 
|  | } | 
|  | } | 
|  |  | 
|  | return false; | 
|  | } | 
|  |  | 
|  | void FirmwareHandler::HandleUevent(const Uevent& uevent) { | 
|  | if (uevent.subsystem != "firmware" || uevent.action != "add") return; | 
|  |  | 
|  | // Loading the firmware in a child means we can do that in parallel... | 
|  | auto pid = fork(); | 
|  | if (pid == -1) { | 
|  | PLOG(ERROR) << "could not fork to process firmware event for " << uevent.firmware; | 
|  | } | 
|  | if (pid == 0) { | 
|  | Timer t; | 
|  | auto firmware = GetFirmwarePath(uevent); | 
|  | ProcessFirmwareEvent("/sys" + uevent.path, firmware); | 
|  | LOG(INFO) << "loading " << uevent.path << " took " << t; | 
|  | _exit(EXIT_SUCCESS); | 
|  | } | 
|  | } | 
|  |  | 
|  | }  // namespace init | 
|  | }  // namespace android |