blob: f8befd3b8e95edb959f8e449a3bbd573e9d2a6c3 [file] [log] [blame]
Hridya Valsarajudea91b42018-07-17 11:14:01 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "commands.h"
18
Yifan Honga4eb4752021-02-16 19:37:21 -080019#include <inttypes.h>
Hridya Valsarajudea91b42018-07-17 11:14:01 -070020#include <sys/socket.h>
21#include <sys/un.h>
22
David Anderson220ddb12019-10-31 18:02:41 -070023#include <unordered_set>
24
Hridya Valsarajudea91b42018-07-17 11:14:01 -070025#include <android-base/logging.h>
26#include <android-base/parseint.h>
27#include <android-base/properties.h>
28#include <android-base/stringprintf.h>
29#include <android-base/strings.h>
30#include <android-base/unique_fd.h>
David Andersonab8f4662019-10-21 16:45:59 -070031#include <android/hardware/boot/1.1/IBootControl.h>
Hridya Valsarajudea91b42018-07-17 11:14:01 -070032#include <cutils/android_reboot.h>
David Anderson12211d12018-07-24 15:21:20 -070033#include <ext4_utils/wipe.h>
David Anderson5cbd2e42018-09-27 10:53:04 -070034#include <fs_mgr.h>
David Anderson2ffc31b2020-03-23 23:43:45 -070035#include <fs_mgr/roots.h>
David Anderson1d504e32019-01-15 14:38:20 -080036#include <libgsi/libgsi.h>
David Anderson0d4277d2018-07-31 13:27:37 -070037#include <liblp/builder.h>
38#include <liblp/liblp.h>
David Anderson220ddb12019-10-31 18:02:41 -070039#include <libsnapshot/snapshot.h>
Yifan Honga4eb4752021-02-16 19:37:21 -080040#include <storage_literals/storage_literals.h>
David Anderson0d4277d2018-07-31 13:27:37 -070041#include <uuid/uuid.h>
Hridya Valsarajudea91b42018-07-17 11:14:01 -070042
Florian Mayer4c3c5262022-09-14 16:02:11 -070043#include <bootloader_message/bootloader_message.h>
44
Kelvin Zhang6befe782022-06-21 14:20:54 -070045#include "BootControlClient.h"
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070046#include "constants.h"
Hridya Valsarajudea91b42018-07-17 11:14:01 -070047#include "fastboot_device.h"
David Anderson12211d12018-07-24 15:21:20 -070048#include "flashing.h"
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070049#include "utility.h"
50
Yifan Honga4eb4752021-02-16 19:37:21 -080051#ifdef FB_ENABLE_FETCH
52static constexpr bool kEnableFetch = true;
53#else
54static constexpr bool kEnableFetch = false;
55#endif
56
David Anderson27475322019-06-11 14:00:08 -070057using android::fs_mgr::MetadataBuilder;
Kelvin Zhang6befe782022-06-21 14:20:54 -070058using android::hal::CommandResult;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070059using ::android::hardware::hidl_string;
David Anderson220ddb12019-10-31 18:02:41 -070060using android::snapshot::SnapshotManager;
Kelvin Zhang6befe782022-06-21 14:20:54 -070061using MergeStatus = android::hal::BootControlClient::MergeStatus;
Hridya Valsarajua15fe312018-09-14 13:58:21 -070062
Yifan Honga4eb4752021-02-16 19:37:21 -080063using namespace android::storage_literals;
64
David Anderson0f626632018-08-31 16:44:25 -070065struct VariableHandlers {
66 // Callback to retrieve the value of a single variable.
67 std::function<bool(FastbootDevice*, const std::vector<std::string>&, std::string*)> get;
68 // Callback to retrieve all possible argument combinations, for getvar all.
69 std::function<std::vector<std::vector<std::string>>(FastbootDevice*)> get_all_args;
70};
71
David Anderson220ddb12019-10-31 18:02:41 -070072static bool IsSnapshotUpdateInProgress(FastbootDevice* device) {
73 auto hal = device->boot1_1();
74 if (!hal) {
75 return false;
76 }
77 auto merge_status = hal->getSnapshotMergeStatus();
78 return merge_status == MergeStatus::SNAPSHOTTED || merge_status == MergeStatus::MERGING;
79}
80
81static bool IsProtectedPartitionDuringMerge(FastbootDevice* device, const std::string& name) {
82 static const std::unordered_set<std::string> ProtectedPartitionsDuringMerge = {
83 "userdata", "metadata", "misc"};
84 if (ProtectedPartitionsDuringMerge.count(name) == 0) {
85 return false;
86 }
87 return IsSnapshotUpdateInProgress(device);
88}
89
David Anderson0f626632018-08-31 16:44:25 -070090static void GetAllVars(FastbootDevice* device, const std::string& name,
91 const VariableHandlers& handlers) {
92 if (!handlers.get_all_args) {
93 std::string message;
94 if (!handlers.get(device, std::vector<std::string>(), &message)) {
95 return;
96 }
97 device->WriteInfo(android::base::StringPrintf("%s:%s", name.c_str(), message.c_str()));
98 return;
99 }
100
101 auto all_args = handlers.get_all_args(device);
102 for (const auto& args : all_args) {
103 std::string message;
104 if (!handlers.get(device, args, &message)) {
105 continue;
106 }
107 std::string arg_string = android::base::Join(args, ":");
108 device->WriteInfo(android::base::StringPrintf("%s:%s:%s", name.c_str(), arg_string.c_str(),
109 message.c_str()));
110 }
111}
112
David Andersonebc8fe12022-06-17 19:17:43 -0700113const std::unordered_map<std::string, VariableHandlers> kVariableMap = {
114 {FB_VAR_VERSION, {GetVersion, nullptr}},
115 {FB_VAR_VERSION_BOOTLOADER, {GetBootloaderVersion, nullptr}},
116 {FB_VAR_VERSION_BASEBAND, {GetBasebandVersion, nullptr}},
117 {FB_VAR_VERSION_OS, {GetOsVersion, nullptr}},
118 {FB_VAR_VERSION_VNDK, {GetVndkVersion, nullptr}},
119 {FB_VAR_PRODUCT, {GetProduct, nullptr}},
120 {FB_VAR_SERIALNO, {GetSerial, nullptr}},
121 {FB_VAR_VARIANT, {GetVariant, nullptr}},
122 {FB_VAR_SECURE, {GetSecure, nullptr}},
123 {FB_VAR_UNLOCKED, {GetUnlocked, nullptr}},
124 {FB_VAR_MAX_DOWNLOAD_SIZE, {GetMaxDownloadSize, nullptr}},
125 {FB_VAR_CURRENT_SLOT, {::GetCurrentSlot, nullptr}},
126 {FB_VAR_SLOT_COUNT, {GetSlotCount, nullptr}},
127 {FB_VAR_HAS_SLOT, {GetHasSlot, GetAllPartitionArgsNoSlot}},
128 {FB_VAR_SLOT_SUCCESSFUL, {GetSlotSuccessful, nullptr}},
129 {FB_VAR_SLOT_UNBOOTABLE, {GetSlotUnbootable, nullptr}},
130 {FB_VAR_PARTITION_SIZE, {GetPartitionSize, GetAllPartitionArgsWithSlot}},
131 {FB_VAR_PARTITION_TYPE, {GetPartitionType, GetAllPartitionArgsWithSlot}},
132 {FB_VAR_IS_LOGICAL, {GetPartitionIsLogical, GetAllPartitionArgsWithSlot}},
133 {FB_VAR_IS_USERSPACE, {GetIsUserspace, nullptr}},
134 {FB_VAR_OFF_MODE_CHARGE_STATE, {GetOffModeChargeState, nullptr}},
135 {FB_VAR_BATTERY_VOLTAGE, {GetBatteryVoltage, nullptr}},
136 {FB_VAR_BATTERY_SOC_OK, {GetBatterySoCOk, nullptr}},
137 {FB_VAR_HW_REVISION, {GetHardwareRevision, nullptr}},
138 {FB_VAR_SUPER_PARTITION_NAME, {GetSuperPartitionName, nullptr}},
139 {FB_VAR_SNAPSHOT_UPDATE_STATUS, {GetSnapshotUpdateStatus, nullptr}},
140 {FB_VAR_CPU_ABI, {GetCpuAbi, nullptr}},
141 {FB_VAR_SYSTEM_FINGERPRINT, {GetSystemFingerprint, nullptr}},
142 {FB_VAR_VENDOR_FINGERPRINT, {GetVendorFingerprint, nullptr}},
143 {FB_VAR_DYNAMIC_PARTITION, {GetDynamicPartition, nullptr}},
144 {FB_VAR_FIRST_API_LEVEL, {GetFirstApiLevel, nullptr}},
145 {FB_VAR_SECURITY_PATCH_LEVEL, {GetSecurityPatchLevel, nullptr}},
146 {FB_VAR_TREBLE_ENABLED, {GetTrebleEnabled, nullptr}},
147 {FB_VAR_MAX_FETCH_SIZE, {GetMaxFetchSize, nullptr}},
148};
David Anderson0f626632018-08-31 16:44:25 -0700149
David Andersonebc8fe12022-06-17 19:17:43 -0700150static bool GetVarAll(FastbootDevice* device) {
151 for (const auto& [name, handlers] : kVariableMap) {
152 GetAllVars(device, name, handlers);
153 }
154 return true;
155}
156
Florian Mayer4c3c5262022-09-14 16:02:11 -0700157static void PostWipeData() {
158 std::string err;
159 // Reset mte state of device.
160 if (!WriteMiscMemtagMessage({}, &err)) {
161 LOG(ERROR) << "Failed to reset MTE state: " << err;
162 }
163}
164
David Andersonebc8fe12022-06-17 19:17:43 -0700165const std::unordered_map<std::string, std::function<bool(FastbootDevice*)>> kSpecialVars = {
166 {"all", GetVarAll},
167 {"dmesg", GetDmesg},
168};
169
170bool GetVarHandler(FastbootDevice* device, const std::vector<std::string>& args) {
David Anderson0f626632018-08-31 16:44:25 -0700171 if (args.size() < 2) {
172 return device->WriteFail("Missing argument");
173 }
174
David Andersonebc8fe12022-06-17 19:17:43 -0700175 // "all" and "dmesg" are multiline and handled specially.
176 auto found_special = kSpecialVars.find(args[1]);
177 if (found_special != kSpecialVars.end()) {
178 if (!found_special->second(device)) {
179 return false;
David Anderson0f626632018-08-31 16:44:25 -0700180 }
181 return device->WriteOkay("");
182 }
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700183
184 // args[0] is command name, args[1] is variable.
185 auto found_variable = kVariableMap.find(args[1]);
186 if (found_variable == kVariableMap.end()) {
David Anderson1fb3fd72018-08-31 14:40:22 -0700187 return device->WriteFail("Unknown variable");
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700188 }
189
David Anderson1fb3fd72018-08-31 14:40:22 -0700190 std::string message;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700191 std::vector<std::string> getvar_args(args.begin() + 2, args.end());
David Anderson0f626632018-08-31 16:44:25 -0700192 if (!found_variable->second.get(device, getvar_args, &message)) {
David Anderson1fb3fd72018-08-31 14:40:22 -0700193 return device->WriteFail(message);
194 }
195 return device->WriteOkay(message);
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700196}
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700197
josephjang29069752020-09-23 16:28:03 +0800198bool OemPostWipeData(FastbootDevice* device) {
199 auto fastboot_hal = device->fastboot_hal();
200 if (!fastboot_hal) {
201 return false;
202 }
203
Sandeep Dhavale2534d482022-11-08 22:30:05 +0000204 auto status = fastboot_hal->doOemSpecificErase();
205 if (status.isOk()) {
josephjang29069752020-09-23 16:28:03 +0800206 device->WriteStatus(FastbootResult::OKAY, "Erasing succeeded");
Sandeep Dhavale2534d482022-11-08 22:30:05 +0000207 return true;
josephjang29069752020-09-23 16:28:03 +0800208 }
Sandeep Dhavale2534d482022-11-08 22:30:05 +0000209 switch (status.getExceptionCode()) {
210 case EX_UNSUPPORTED_OPERATION:
211 return false;
212 case EX_SERVICE_SPECIFIC:
213 device->WriteStatus(FastbootResult::FAIL, status.getDescription());
214 return false;
215 default:
216 LOG(ERROR) << "Erase operation failed" << status.getDescription();
217 return false;
218 }
josephjang29069752020-09-23 16:28:03 +0800219}
220
David Anderson12211d12018-07-24 15:21:20 -0700221bool EraseHandler(FastbootDevice* device, const std::vector<std::string>& args) {
222 if (args.size() < 2) {
223 return device->WriteStatus(FastbootResult::FAIL, "Invalid arguments");
224 }
Hridya Valsarajud1e62312018-10-08 09:13:17 -0700225
226 if (GetDeviceLockStatus()) {
227 return device->WriteStatus(FastbootResult::FAIL, "Erase is not allowed on locked devices");
228 }
229
David Anderson220ddb12019-10-31 18:02:41 -0700230 const auto& partition_name = args[1];
231 if (IsProtectedPartitionDuringMerge(device, partition_name)) {
232 auto message = "Cannot erase " + partition_name + " while a snapshot update is in progress";
233 return device->WriteFail(message);
234 }
235
David Anderson12211d12018-07-24 15:21:20 -0700236 PartitionHandle handle;
David Anderson220ddb12019-10-31 18:02:41 -0700237 if (!OpenPartition(device, partition_name, &handle)) {
David Anderson12211d12018-07-24 15:21:20 -0700238 return device->WriteStatus(FastbootResult::FAIL, "Partition doesn't exist");
239 }
240 if (wipe_block_device(handle.fd(), get_block_device_size(handle.fd())) == 0) {
josephjang29069752020-09-23 16:28:03 +0800241 //Perform oem PostWipeData if Android userdata partition has been erased
242 bool support_oem_postwipedata = false;
243 if (partition_name == "userdata") {
Florian Mayer4c3c5262022-09-14 16:02:11 -0700244 PostWipeData();
josephjang29069752020-09-23 16:28:03 +0800245 support_oem_postwipedata = OemPostWipeData(device);
246 }
247
248 if (!support_oem_postwipedata) {
249 return device->WriteStatus(FastbootResult::OKAY, "Erasing succeeded");
250 } else {
251 //Write device status in OemPostWipeData(), so just return true
252 return true;
253 }
David Anderson12211d12018-07-24 15:21:20 -0700254 }
255 return device->WriteStatus(FastbootResult::FAIL, "Erasing failed");
256}
257
Hridya Valsarajua15fe312018-09-14 13:58:21 -0700258bool OemCmdHandler(FastbootDevice* device, const std::vector<std::string>& args) {
259 auto fastboot_hal = device->fastboot_hal();
260 if (!fastboot_hal) {
261 return device->WriteStatus(FastbootResult::FAIL, "Unable to open fastboot HAL");
262 }
263
josephjangad90b452020-09-16 16:27:42 +0800264 //Disable "oem postwipedata userdata" to prevent user wipe oem userdata only.
265 if (args[0] == "oem postwipedata userdata") {
266 return device->WriteStatus(FastbootResult::FAIL, "Unable to do oem postwipedata userdata");
267 }
Sandeep Dhavale2534d482022-11-08 22:30:05 +0000268 std::string message;
269 auto status = fastboot_hal->doOemCommand(args[0], &message);
270 if (!status.isOk()) {
271 LOG(ERROR) << "Unable to do OEM command " << args[0].c_str() << status.getDescription();
272 return device->WriteStatus(FastbootResult::FAIL,
273 "Unable to do OEM command " + status.getDescription());
Hridya Valsarajua15fe312018-09-14 13:58:21 -0700274 }
275
Sandeep Dhavale2534d482022-11-08 22:30:05 +0000276 device->WriteInfo(message);
277 return device->WriteStatus(FastbootResult::OKAY, message);
Hridya Valsarajua15fe312018-09-14 13:58:21 -0700278}
279
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700280bool DownloadHandler(FastbootDevice* device, const std::vector<std::string>& args) {
281 if (args.size() < 2) {
282 return device->WriteStatus(FastbootResult::FAIL, "size argument unspecified");
283 }
Hridya Valsarajud1e62312018-10-08 09:13:17 -0700284
285 if (GetDeviceLockStatus()) {
286 return device->WriteStatus(FastbootResult::FAIL,
287 "Download is not allowed on locked devices");
288 }
289
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700290 // arg[0] is the command name, arg[1] contains size of data to be downloaded
Keith Mok3724bbc2021-12-30 20:08:04 +0000291 // which should always be 8 bytes
292 if (args[1].length() != 8) {
293 return device->WriteStatus(FastbootResult::FAIL,
294 "Invalid size (length of size != 8)");
295 }
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700296 unsigned int size;
Hridya Valsarajuaae84e82018-10-08 13:10:25 -0700297 if (!android::base::ParseUint("0x" + args[1], &size, kMaxDownloadSizeDefault)) {
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700298 return device->WriteStatus(FastbootResult::FAIL, "Invalid size");
299 }
Keith Mok3724bbc2021-12-30 20:08:04 +0000300 if (size == 0) {
301 return device->WriteStatus(FastbootResult::FAIL, "Invalid size (0)");
302 }
David Anderson12211d12018-07-24 15:21:20 -0700303 device->download_data().resize(size);
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700304 if (!device->WriteStatus(FastbootResult::DATA, android::base::StringPrintf("%08x", size))) {
305 return false;
306 }
307
David Anderson12211d12018-07-24 15:21:20 -0700308 if (device->HandleData(true, &device->download_data())) {
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700309 return device->WriteStatus(FastbootResult::OKAY, "");
310 }
311
312 PLOG(ERROR) << "Couldn't download data";
313 return device->WriteStatus(FastbootResult::FAIL, "Couldn't download data");
314}
315
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700316bool SetActiveHandler(FastbootDevice* device, const std::vector<std::string>& args) {
317 if (args.size() < 2) {
318 return device->WriteStatus(FastbootResult::FAIL, "Missing slot argument");
319 }
320
Hridya Valsarajud1e62312018-10-08 09:13:17 -0700321 if (GetDeviceLockStatus()) {
322 return device->WriteStatus(FastbootResult::FAIL,
323 "set_active command is not allowed on locked devices");
324 }
325
Kelvin Zhang6befe782022-06-21 14:20:54 -0700326 int32_t slot = 0;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700327 if (!GetSlotNumber(args[1], &slot)) {
David Anderson220ddb12019-10-31 18:02:41 -0700328 // Slot suffix needs to be between 'a' and 'z'.
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700329 return device->WriteStatus(FastbootResult::FAIL, "Bad slot suffix");
330 }
331
332 // Non-A/B devices will not have a boot control HAL.
333 auto boot_control_hal = device->boot_control_hal();
334 if (!boot_control_hal) {
335 return device->WriteStatus(FastbootResult::FAIL,
336 "Cannot set slot: boot control HAL absent");
337 }
Kelvin Zhang6befe782022-06-21 14:20:54 -0700338 if (slot >= boot_control_hal->GetNumSlots()) {
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700339 return device->WriteStatus(FastbootResult::FAIL, "Slot out of range");
340 }
David Anderson220ddb12019-10-31 18:02:41 -0700341
342 // If the slot is not changing, do nothing.
Hridya Valsaraju45719a82020-03-02 13:03:47 -0800343 if (args[1] == device->GetCurrentSlot()) {
David Anderson220ddb12019-10-31 18:02:41 -0700344 return device->WriteOkay("");
345 }
346
347 // Check how to handle the current snapshot state.
348 if (auto hal11 = device->boot1_1()) {
349 auto merge_status = hal11->getSnapshotMergeStatus();
350 if (merge_status == MergeStatus::MERGING) {
351 return device->WriteFail("Cannot change slots while a snapshot update is in progress");
352 }
353 // Note: we allow the slot change if the state is SNAPSHOTTED. First-
354 // stage init does not have access to the HAL, and uses the slot number
355 // and /metadata OTA state to determine whether a slot change occurred.
356 // Booting into the old slot would erase the OTA, and switching A->B->A
357 // would simply resume it if no boots occur in between. Re-flashing
358 // partitions implicitly cancels the OTA, so leaving the state as-is is
359 // safe.
360 if (merge_status == MergeStatus::SNAPSHOTTED) {
361 device->WriteInfo(
362 "Changing the active slot with a snapshot applied may cancel the"
363 " update.");
364 }
365 }
366
Kelvin Zhang6befe782022-06-21 14:20:54 -0700367 CommandResult ret = boot_control_hal->SetActiveBootSlot(slot);
368 if (ret.success) {
Hridya Valsaraju20bdf892018-10-10 11:02:19 -0700369 // Save as slot suffix to match the suffix format as returned from
370 // the boot control HAL.
371 auto current_slot = "_" + args[1];
372 device->set_active_slot(current_slot);
373 return device->WriteStatus(FastbootResult::OKAY, "");
374 }
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700375 return device->WriteStatus(FastbootResult::FAIL, "Unable to set slot");
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700376}
377
378bool ShutDownHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
379 auto result = device->WriteStatus(FastbootResult::OKAY, "Shutting down");
380 android::base::SetProperty(ANDROID_RB_PROPERTY, "shutdown,fastboot");
381 device->CloseDevice();
382 TEMP_FAILURE_RETRY(pause());
383 return result;
384}
385
386bool RebootHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
387 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting");
388 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,from_fastboot");
389 device->CloseDevice();
390 TEMP_FAILURE_RETRY(pause());
391 return result;
392}
393
394bool RebootBootloaderHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
395 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting bootloader");
396 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,bootloader");
397 device->CloseDevice();
398 TEMP_FAILURE_RETRY(pause());
399 return result;
400}
401
402bool RebootFastbootHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
403 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting fastboot");
404 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,fastboot");
405 device->CloseDevice();
406 TEMP_FAILURE_RETRY(pause());
407 return result;
408}
409
410static bool EnterRecovery() {
411 const char msg_switch_to_recovery = 'r';
412
413 android::base::unique_fd sock(socket(AF_UNIX, SOCK_STREAM, 0));
414 if (sock < 0) {
415 PLOG(ERROR) << "Couldn't create sock";
416 return false;
417 }
418
419 struct sockaddr_un addr = {.sun_family = AF_UNIX};
420 strncpy(addr.sun_path, "/dev/socket/recovery", sizeof(addr.sun_path) - 1);
Yifan Hong07e947f2021-03-22 19:21:34 -0700421 if (connect(sock.get(), (struct sockaddr*)&addr, sizeof(addr)) < 0) {
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700422 PLOG(ERROR) << "Couldn't connect to recovery";
423 return false;
424 }
425 // Switch to recovery will not update the boot reason since it does not
426 // require a reboot.
Yifan Hong07e947f2021-03-22 19:21:34 -0700427 auto ret = write(sock.get(), &msg_switch_to_recovery, sizeof(msg_switch_to_recovery));
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700428 if (ret != sizeof(msg_switch_to_recovery)) {
429 PLOG(ERROR) << "Couldn't write message to switch to recovery";
430 return false;
431 }
432
433 return true;
434}
435
436bool RebootRecoveryHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
437 auto status = true;
438 if (EnterRecovery()) {
439 status = device->WriteStatus(FastbootResult::OKAY, "Rebooting to recovery");
440 } else {
441 status = device->WriteStatus(FastbootResult::FAIL, "Unable to reboot to recovery");
442 }
443 device->CloseDevice();
444 TEMP_FAILURE_RETRY(pause());
445 return status;
446}
David Anderson0d4277d2018-07-31 13:27:37 -0700447
448// Helper class for opening a handle to a MetadataBuilder and writing the new
449// partition table to the same place it was read.
450class PartitionBuilder {
451 public:
David Andersond25f1c32018-11-09 20:41:33 -0800452 explicit PartitionBuilder(FastbootDevice* device, const std::string& partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700453
454 bool Write();
455 bool Valid() const { return !!builder_; }
456 MetadataBuilder* operator->() const { return builder_.get(); }
457
458 private:
David Anderson4d307b02018-12-17 17:07:34 -0800459 FastbootDevice* device_;
David Anderson0d4277d2018-07-31 13:27:37 -0700460 std::string super_device_;
David Andersond25f1c32018-11-09 20:41:33 -0800461 uint32_t slot_number_;
David Anderson0d4277d2018-07-31 13:27:37 -0700462 std::unique_ptr<MetadataBuilder> builder_;
463};
464
David Anderson4d307b02018-12-17 17:07:34 -0800465PartitionBuilder::PartitionBuilder(FastbootDevice* device, const std::string& partition_name)
466 : device_(device) {
David Andersond25f1c32018-11-09 20:41:33 -0800467 std::string slot_suffix = GetSuperSlotSuffix(device, partition_name);
David Anderson27475322019-06-11 14:00:08 -0700468 slot_number_ = android::fs_mgr::SlotNumberForSlotSuffix(slot_suffix);
David Andersond25f1c32018-11-09 20:41:33 -0800469 auto super_device = FindPhysicalPartition(fs_mgr_get_super_partition_name(slot_number_));
David Anderson0d4277d2018-07-31 13:27:37 -0700470 if (!super_device) {
471 return;
472 }
473 super_device_ = *super_device;
David Andersond25f1c32018-11-09 20:41:33 -0800474 builder_ = MetadataBuilder::New(super_device_, slot_number_);
David Anderson0d4277d2018-07-31 13:27:37 -0700475}
476
477bool PartitionBuilder::Write() {
David Anderson27475322019-06-11 14:00:08 -0700478 auto metadata = builder_->Export();
David Anderson0d4277d2018-07-31 13:27:37 -0700479 if (!metadata) {
480 return false;
481 }
David Anderson4d307b02018-12-17 17:07:34 -0800482 return UpdateAllPartitionMetadata(device_, super_device_, *metadata.get());
David Anderson0d4277d2018-07-31 13:27:37 -0700483}
484
485bool CreatePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
486 if (args.size() < 3) {
487 return device->WriteFail("Invalid partition name and size");
488 }
489
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700490 if (GetDeviceLockStatus()) {
491 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
492 }
493
David Anderson0d4277d2018-07-31 13:27:37 -0700494 uint64_t partition_size;
495 std::string partition_name = args[1];
496 if (!android::base::ParseUint(args[2].c_str(), &partition_size)) {
497 return device->WriteFail("Invalid partition size");
498 }
499
David Andersond25f1c32018-11-09 20:41:33 -0800500 PartitionBuilder builder(device, partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700501 if (!builder.Valid()) {
502 return device->WriteFail("Could not open super partition");
503 }
504 // TODO(112433293) Disallow if the name is in the physical table as well.
505 if (builder->FindPartition(partition_name)) {
506 return device->WriteFail("Partition already exists");
507 }
508
David Anderson27475322019-06-11 14:00:08 -0700509 auto partition = builder->AddPartition(partition_name, 0);
David Anderson0d4277d2018-07-31 13:27:37 -0700510 if (!partition) {
511 return device->WriteFail("Failed to add partition");
512 }
513 if (!builder->ResizePartition(partition, partition_size)) {
514 builder->RemovePartition(partition_name);
515 return device->WriteFail("Not enough space for partition");
516 }
517 if (!builder.Write()) {
518 return device->WriteFail("Failed to write partition table");
519 }
520 return device->WriteOkay("Partition created");
521}
522
523bool DeletePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
524 if (args.size() < 2) {
525 return device->WriteFail("Invalid partition name and size");
526 }
527
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700528 if (GetDeviceLockStatus()) {
529 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
530 }
531
David Andersond25f1c32018-11-09 20:41:33 -0800532 std::string partition_name = args[1];
533
534 PartitionBuilder builder(device, partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700535 if (!builder.Valid()) {
536 return device->WriteFail("Could not open super partition");
537 }
David Andersond25f1c32018-11-09 20:41:33 -0800538 builder->RemovePartition(partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700539 if (!builder.Write()) {
540 return device->WriteFail("Failed to write partition table");
541 }
542 return device->WriteOkay("Partition deleted");
543}
544
545bool ResizePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
546 if (args.size() < 3) {
547 return device->WriteFail("Invalid partition name and size");
548 }
549
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700550 if (GetDeviceLockStatus()) {
551 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
552 }
553
David Anderson0d4277d2018-07-31 13:27:37 -0700554 uint64_t partition_size;
555 std::string partition_name = args[1];
556 if (!android::base::ParseUint(args[2].c_str(), &partition_size)) {
557 return device->WriteFail("Invalid partition size");
558 }
559
David Andersond25f1c32018-11-09 20:41:33 -0800560 PartitionBuilder builder(device, partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700561 if (!builder.Valid()) {
562 return device->WriteFail("Could not open super partition");
563 }
564
David Anderson27475322019-06-11 14:00:08 -0700565 auto partition = builder->FindPartition(partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700566 if (!partition) {
567 return device->WriteFail("Partition does not exist");
568 }
David Andersonad970fc2019-08-27 14:01:16 -0700569
570 // Remove the updated flag to cancel any snapshots.
571 uint32_t attrs = partition->attributes();
572 partition->set_attributes(attrs & ~LP_PARTITION_ATTR_UPDATED);
573
David Anderson0d4277d2018-07-31 13:27:37 -0700574 if (!builder->ResizePartition(partition, partition_size)) {
575 return device->WriteFail("Not enough space to resize partition");
576 }
577 if (!builder.Write()) {
578 return device->WriteFail("Failed to write partition table");
579 }
580 return device->WriteOkay("Partition resized");
581}
David Anderson38b3c7a2018-08-15 16:27:42 -0700582
David Andersonad970fc2019-08-27 14:01:16 -0700583void CancelPartitionSnapshot(FastbootDevice* device, const std::string& partition_name) {
584 PartitionBuilder builder(device, partition_name);
585 if (!builder.Valid()) return;
586
587 auto partition = builder->FindPartition(partition_name);
588 if (!partition) return;
589
590 // Remove the updated flag to cancel any snapshots.
591 uint32_t attrs = partition->attributes();
592 partition->set_attributes(attrs & ~LP_PARTITION_ATTR_UPDATED);
593
594 builder.Write();
595}
596
597bool FlashHandler(FastbootDevice* device, const std::vector<std::string>& args) {
598 if (args.size() < 2) {
599 return device->WriteStatus(FastbootResult::FAIL, "Invalid arguments");
600 }
601
602 if (GetDeviceLockStatus()) {
603 return device->WriteStatus(FastbootResult::FAIL,
604 "Flashing is not allowed on locked devices");
605 }
606
607 const auto& partition_name = args[1];
David Anderson220ddb12019-10-31 18:02:41 -0700608 if (IsProtectedPartitionDuringMerge(device, partition_name)) {
609 auto message = "Cannot flash " + partition_name + " while a snapshot update is in progress";
610 return device->WriteFail(message);
611 }
612
David Andersonad970fc2019-08-27 14:01:16 -0700613 if (LogicalPartitionExists(device, partition_name)) {
614 CancelPartitionSnapshot(device, partition_name);
615 }
616
617 int ret = Flash(device, partition_name);
618 if (ret < 0) {
619 return device->WriteStatus(FastbootResult::FAIL, strerror(-ret));
620 }
Florian Mayer4c3c5262022-09-14 16:02:11 -0700621 if (partition_name == "userdata") {
622 PostWipeData();
623 }
624
David Andersonad970fc2019-08-27 14:01:16 -0700625 return device->WriteStatus(FastbootResult::OKAY, "Flashing succeeded");
626}
627
David Anderson38b3c7a2018-08-15 16:27:42 -0700628bool UpdateSuperHandler(FastbootDevice* device, const std::vector<std::string>& args) {
629 if (args.size() < 2) {
630 return device->WriteFail("Invalid arguments");
631 }
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700632
633 if (GetDeviceLockStatus()) {
634 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
635 }
636
David Anderson38b3c7a2018-08-15 16:27:42 -0700637 bool wipe = (args.size() >= 3 && args[2] == "wipe");
638 return UpdateSuper(device, args[1], wipe);
639}
David Anderson1d504e32019-01-15 14:38:20 -0800640
David Anderson3d782d52019-01-29 13:09:49 -0800641bool GsiHandler(FastbootDevice* device, const std::vector<std::string>& args) {
David Anderson1d504e32019-01-15 14:38:20 -0800642 if (args.size() != 2) {
643 return device->WriteFail("Invalid arguments");
644 }
David Anderson3d782d52019-01-29 13:09:49 -0800645
646 AutoMountMetadata mount_metadata;
647 if (!mount_metadata) {
648 return device->WriteFail("Could not find GSI install");
649 }
650
651 if (!android::gsi::IsGsiInstalled()) {
652 return device->WriteStatus(FastbootResult::FAIL, "No GSI is installed");
653 }
654
David Anderson1d504e32019-01-15 14:38:20 -0800655 if (args[1] == "wipe") {
656 if (!android::gsi::UninstallGsi()) {
657 return device->WriteStatus(FastbootResult::FAIL, strerror(errno));
658 }
659 } else if (args[1] == "disable") {
660 if (!android::gsi::DisableGsi()) {
661 return device->WriteStatus(FastbootResult::FAIL, strerror(errno));
662 }
663 }
664 return device->WriteStatus(FastbootResult::OKAY, "Success");
665}
David Andersonab8f4662019-10-21 16:45:59 -0700666
667bool SnapshotUpdateHandler(FastbootDevice* device, const std::vector<std::string>& args) {
668 // Note that we use the HAL rather than mounting /metadata, since we want
669 // our results to match the bootloader.
David Anderson220ddb12019-10-31 18:02:41 -0700670 auto hal = device->boot1_1();
David Andersonab8f4662019-10-21 16:45:59 -0700671 if (!hal) return device->WriteFail("Not supported");
672
David Andersonab8f4662019-10-21 16:45:59 -0700673 // If no arguments, return the same thing as a getvar. Note that we get the
674 // HAL first so we can return "not supported" before we return the less
675 // specific error message below.
676 if (args.size() < 2 || args[1].empty()) {
677 std::string message;
678 if (!GetSnapshotUpdateStatus(device, {}, &message)) {
679 return device->WriteFail("Could not determine update status");
680 }
681 device->WriteInfo(message);
682 return device->WriteOkay("");
683 }
684
David Anderson220ddb12019-10-31 18:02:41 -0700685 MergeStatus status = hal->getSnapshotMergeStatus();
686
687 if (args.size() != 2) {
David Andersonab8f4662019-10-21 16:45:59 -0700688 return device->WriteFail("Invalid arguments");
689 }
David Anderson220ddb12019-10-31 18:02:41 -0700690 if (args[1] == "cancel") {
691 switch (status) {
692 case MergeStatus::SNAPSHOTTED:
Kelvin Zhang6befe782022-06-21 14:20:54 -0700693 case MergeStatus::MERGING: {
694 const auto ret = hal->SetSnapshotMergeStatus(MergeStatus::CANCELLED);
695 if (!ret.success) {
696 device->WriteFail("Failed to SetSnapshotMergeStatus(MergeStatus::CANCELLED) " +
697 ret.errMsg);
698 }
David Anderson220ddb12019-10-31 18:02:41 -0700699 break;
Kelvin Zhang6befe782022-06-21 14:20:54 -0700700 }
David Anderson220ddb12019-10-31 18:02:41 -0700701 default:
702 break;
703 }
704 } else if (args[1] == "merge") {
705 if (status != MergeStatus::MERGING) {
706 return device->WriteFail("No snapshot merge is in progress");
707 }
David Andersonab8f4662019-10-21 16:45:59 -0700708
David Anderson565577f2021-02-04 20:14:18 -0800709 auto sm = SnapshotManager::New();
David Anderson220ddb12019-10-31 18:02:41 -0700710 if (!sm) {
711 return device->WriteFail("Unable to create SnapshotManager");
712 }
David Anderson5a0177d2020-04-30 18:53:23 -0700713 if (!sm->FinishMergeInRecovery()) {
David Anderson220ddb12019-10-31 18:02:41 -0700714 return device->WriteFail("Unable to finish snapshot merge");
715 }
716 } else {
717 return device->WriteFail("Invalid parameter to snapshot-update");
David Andersonab8f4662019-10-21 16:45:59 -0700718 }
719 return device->WriteStatus(FastbootResult::OKAY, "Success");
720}
Yifan Honga4eb4752021-02-16 19:37:21 -0800721
722namespace {
723// Helper of FetchHandler.
724class PartitionFetcher {
725 public:
726 static bool Fetch(FastbootDevice* device, const std::vector<std::string>& args) {
727 if constexpr (!kEnableFetch) {
728 return device->WriteFail("Fetch is not allowed on user build");
729 }
730
731 if (GetDeviceLockStatus()) {
732 return device->WriteFail("Fetch is not allowed on locked devices");
733 }
734
735 PartitionFetcher fetcher(device, args);
736 if (fetcher.Open()) {
737 fetcher.Fetch();
738 }
739 CHECK(fetcher.ret_.has_value());
740 return *fetcher.ret_;
741 }
742
743 private:
744 PartitionFetcher(FastbootDevice* device, const std::vector<std::string>& args)
745 : device_(device), args_(&args) {}
746 // Return whether the partition is successfully opened.
747 // If successfully opened, ret_ is left untouched. Otherwise, ret_ is set to the value
748 // that FetchHandler should return.
749 bool Open() {
Yifan Hongbcd27702021-02-16 19:37:32 -0800750 if (args_->size() < 2) {
751 ret_ = device_->WriteFail("Missing partition arg");
Yifan Honga4eb4752021-02-16 19:37:21 -0800752 return false;
753 }
754
Yifan Hongbcd27702021-02-16 19:37:32 -0800755 partition_name_ = args_->at(1);
756 if (std::find(kAllowedPartitions.begin(), kAllowedPartitions.end(), partition_name_) ==
757 kAllowedPartitions.end()) {
758 ret_ = device_->WriteFail("Fetch is only allowed on [" +
759 android::base::Join(kAllowedPartitions, ", ") + "]");
760 return false;
761 }
762
Konstantin Vyshetsky81cc1192021-11-04 10:27:06 -0700763 if (!OpenPartition(device_, partition_name_, &handle_, O_RDONLY)) {
Yifan Honga4eb4752021-02-16 19:37:21 -0800764 ret_ = device_->WriteFail(
765 android::base::StringPrintf("Cannot open %s", partition_name_.c_str()));
766 return false;
767 }
768
769 partition_size_ = get_block_device_size(handle_.fd());
770 if (partition_size_ == 0) {
771 ret_ = device_->WriteOkay(android::base::StringPrintf("Partition %s has size 0",
772 partition_name_.c_str()));
773 return false;
774 }
775
776 start_offset_ = 0;
777 if (args_->size() >= 3) {
778 if (!android::base::ParseUint(args_->at(2), &start_offset_)) {
779 ret_ = device_->WriteFail("Invalid offset, must be integer");
780 return false;
781 }
782 if (start_offset_ > std::numeric_limits<off64_t>::max()) {
783 ret_ = device_->WriteFail(
784 android::base::StringPrintf("Offset overflows: %" PRIx64, start_offset_));
785 return false;
786 }
787 }
788 if (start_offset_ > partition_size_) {
789 ret_ = device_->WriteFail(android::base::StringPrintf(
790 "Invalid offset 0x%" PRIx64 ", partition %s has size 0x%" PRIx64, start_offset_,
791 partition_name_.c_str(), partition_size_));
792 return false;
793 }
794 uint64_t maximum_total_size_to_read = partition_size_ - start_offset_;
795 total_size_to_read_ = maximum_total_size_to_read;
796 if (args_->size() >= 4) {
797 if (!android::base::ParseUint(args_->at(3), &total_size_to_read_)) {
798 ret_ = device_->WriteStatus(FastbootResult::FAIL, "Invalid size, must be integer");
799 return false;
800 }
801 }
802 if (total_size_to_read_ == 0) {
803 ret_ = device_->WriteOkay("Read 0 bytes");
804 return false;
805 }
806 if (total_size_to_read_ > maximum_total_size_to_read) {
807 ret_ = device_->WriteFail(android::base::StringPrintf(
808 "Invalid size to read 0x%" PRIx64 ", partition %s has size 0x%" PRIx64
809 " and fetching from offset 0x%" PRIx64,
810 total_size_to_read_, partition_name_.c_str(), partition_size_, start_offset_));
811 return false;
812 }
813
814 if (total_size_to_read_ > kMaxFetchSizeDefault) {
815 ret_ = device_->WriteFail(android::base::StringPrintf(
816 "Cannot fetch 0x%" PRIx64
817 " bytes because it exceeds maximum transport size 0x%x",
818 partition_size_, kMaxDownloadSizeDefault));
819 return false;
820 }
821
822 return true;
823 }
824
825 // Assume Open() returns true.
826 // After execution, ret_ is set to the value that FetchHandler should return.
827 void Fetch() {
828 CHECK(start_offset_ <= std::numeric_limits<off64_t>::max());
829 if (lseek64(handle_.fd(), start_offset_, SEEK_SET) != static_cast<off64_t>(start_offset_)) {
830 ret_ = device_->WriteFail(android::base::StringPrintf(
831 "On partition %s, unable to lseek(0x%" PRIx64 ": %s", partition_name_.c_str(),
832 start_offset_, strerror(errno)));
833 return;
834 }
835
836 if (!device_->WriteStatus(FastbootResult::DATA,
837 android::base::StringPrintf(
838 "%08x", static_cast<uint32_t>(total_size_to_read_)))) {
839 ret_ = false;
840 return;
841 }
842 uint64_t end_offset = start_offset_ + total_size_to_read_;
843 std::vector<char> buf(1_MiB);
844 uint64_t current_offset = start_offset_;
845 while (current_offset < end_offset) {
846 // On any error, exit. We can't return a status message to the driver because
847 // we are in the middle of writing data, so just let the driver guess what's wrong
848 // by ending the data stream prematurely.
849 uint64_t remaining = end_offset - current_offset;
850 uint64_t chunk_size = std::min<uint64_t>(buf.size(), remaining);
851 if (!android::base::ReadFully(handle_.fd(), buf.data(), chunk_size)) {
852 PLOG(ERROR) << std::hex << "Unable to read 0x" << chunk_size << " bytes from "
853 << partition_name_ << " @ offset 0x" << current_offset;
854 ret_ = false;
855 return;
856 }
857 if (!device_->HandleData(false /* is read */, buf.data(), chunk_size)) {
858 PLOG(ERROR) << std::hex << "Unable to send 0x" << chunk_size << " bytes of "
859 << partition_name_ << " @ offset 0x" << current_offset;
860 ret_ = false;
861 return;
862 }
863 current_offset += chunk_size;
864 }
865
866 ret_ = device_->WriteOkay(android::base::StringPrintf(
867 "Fetched %s (offset=0x%" PRIx64 ", size=0x%" PRIx64, partition_name_.c_str(),
868 start_offset_, total_size_to_read_));
869 }
870
Yifan Hongbcd27702021-02-16 19:37:32 -0800871 static constexpr std::array<const char*, 3> kAllowedPartitions{
872 "vendor_boot",
873 "vendor_boot_a",
874 "vendor_boot_b",
875 };
876
Yifan Honga4eb4752021-02-16 19:37:21 -0800877 FastbootDevice* device_;
878 const std::vector<std::string>* args_ = nullptr;
879 std::string partition_name_;
880 PartitionHandle handle_;
881 uint64_t partition_size_ = 0;
882 uint64_t start_offset_ = 0;
883 uint64_t total_size_to_read_ = 0;
884
885 // What FetchHandler should return.
886 std::optional<bool> ret_ = std::nullopt;
887};
888} // namespace
889
890bool FetchHandler(FastbootDevice* device, const std::vector<std::string>& args) {
891 return PartitionFetcher::Fetch(device, args);
892}