blob: 2c9dec9fc2b158dbd6a3876a6fb7c2b107f42552 [file] [log] [blame]
Hridya Valsarajudea91b42018-07-17 11:14:01 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "commands.h"
18
19#include <sys/socket.h>
20#include <sys/un.h>
21
David Anderson220ddb12019-10-31 18:02:41 -070022#include <unordered_set>
23
Hridya Valsarajudea91b42018-07-17 11:14:01 -070024#include <android-base/logging.h>
25#include <android-base/parseint.h>
26#include <android-base/properties.h>
27#include <android-base/stringprintf.h>
28#include <android-base/strings.h>
29#include <android-base/unique_fd.h>
David Andersonab8f4662019-10-21 16:45:59 -070030#include <android/hardware/boot/1.1/IBootControl.h>
Hridya Valsarajudea91b42018-07-17 11:14:01 -070031#include <cutils/android_reboot.h>
David Anderson12211d12018-07-24 15:21:20 -070032#include <ext4_utils/wipe.h>
David Anderson5cbd2e42018-09-27 10:53:04 -070033#include <fs_mgr.h>
David Anderson1d504e32019-01-15 14:38:20 -080034#include <libgsi/libgsi.h>
David Anderson0d4277d2018-07-31 13:27:37 -070035#include <liblp/builder.h>
36#include <liblp/liblp.h>
David Anderson220ddb12019-10-31 18:02:41 -070037#include <libsnapshot/snapshot.h>
David Anderson0d4277d2018-07-31 13:27:37 -070038#include <uuid/uuid.h>
Hridya Valsarajudea91b42018-07-17 11:14:01 -070039
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070040#include "constants.h"
Hridya Valsarajudea91b42018-07-17 11:14:01 -070041#include "fastboot_device.h"
David Anderson12211d12018-07-24 15:21:20 -070042#include "flashing.h"
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070043#include "utility.h"
44
David Anderson27475322019-06-11 14:00:08 -070045using android::fs_mgr::MetadataBuilder;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070046using ::android::hardware::hidl_string;
47using ::android::hardware::boot::V1_0::BoolResult;
48using ::android::hardware::boot::V1_0::CommandResult;
49using ::android::hardware::boot::V1_0::Slot;
David Andersonab8f4662019-10-21 16:45:59 -070050using ::android::hardware::boot::V1_1::MergeStatus;
Hridya Valsarajua15fe312018-09-14 13:58:21 -070051using ::android::hardware::fastboot::V1_0::Result;
52using ::android::hardware::fastboot::V1_0::Status;
David Anderson220ddb12019-10-31 18:02:41 -070053using android::snapshot::SnapshotManager;
David Andersonab8f4662019-10-21 16:45:59 -070054using IBootControl1_1 = ::android::hardware::boot::V1_1::IBootControl;
Hridya Valsarajua15fe312018-09-14 13:58:21 -070055
David Anderson0f626632018-08-31 16:44:25 -070056struct VariableHandlers {
57 // Callback to retrieve the value of a single variable.
58 std::function<bool(FastbootDevice*, const std::vector<std::string>&, std::string*)> get;
59 // Callback to retrieve all possible argument combinations, for getvar all.
60 std::function<std::vector<std::vector<std::string>>(FastbootDevice*)> get_all_args;
61};
62
David Anderson220ddb12019-10-31 18:02:41 -070063static bool IsSnapshotUpdateInProgress(FastbootDevice* device) {
64 auto hal = device->boot1_1();
65 if (!hal) {
66 return false;
67 }
68 auto merge_status = hal->getSnapshotMergeStatus();
69 return merge_status == MergeStatus::SNAPSHOTTED || merge_status == MergeStatus::MERGING;
70}
71
72static bool IsProtectedPartitionDuringMerge(FastbootDevice* device, const std::string& name) {
73 static const std::unordered_set<std::string> ProtectedPartitionsDuringMerge = {
74 "userdata", "metadata", "misc"};
75 if (ProtectedPartitionsDuringMerge.count(name) == 0) {
76 return false;
77 }
78 return IsSnapshotUpdateInProgress(device);
79}
80
David Anderson0f626632018-08-31 16:44:25 -070081static void GetAllVars(FastbootDevice* device, const std::string& name,
82 const VariableHandlers& handlers) {
83 if (!handlers.get_all_args) {
84 std::string message;
85 if (!handlers.get(device, std::vector<std::string>(), &message)) {
86 return;
87 }
88 device->WriteInfo(android::base::StringPrintf("%s:%s", name.c_str(), message.c_str()));
89 return;
90 }
91
92 auto all_args = handlers.get_all_args(device);
93 for (const auto& args : all_args) {
94 std::string message;
95 if (!handlers.get(device, args, &message)) {
96 continue;
97 }
98 std::string arg_string = android::base::Join(args, ":");
99 device->WriteInfo(android::base::StringPrintf("%s:%s:%s", name.c_str(), arg_string.c_str(),
100 message.c_str()));
101 }
102}
103
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700104bool GetVarHandler(FastbootDevice* device, const std::vector<std::string>& args) {
David Anderson0f626632018-08-31 16:44:25 -0700105 const std::unordered_map<std::string, VariableHandlers> kVariableMap = {
106 {FB_VAR_VERSION, {GetVersion, nullptr}},
107 {FB_VAR_VERSION_BOOTLOADER, {GetBootloaderVersion, nullptr}},
108 {FB_VAR_VERSION_BASEBAND, {GetBasebandVersion, nullptr}},
Bowgo Tsai99f9a382020-01-21 18:31:23 +0800109 {FB_VAR_VERSION_OS, {GetOsVersion, nullptr}},
110 {FB_VAR_VERSION_VNDK, {GetVndkVersion, nullptr}},
David Anderson0f626632018-08-31 16:44:25 -0700111 {FB_VAR_PRODUCT, {GetProduct, nullptr}},
112 {FB_VAR_SERIALNO, {GetSerial, nullptr}},
Hridya Valsaraju4af80902018-09-26 13:08:16 -0700113 {FB_VAR_VARIANT, {GetVariant, nullptr}},
David Anderson0f626632018-08-31 16:44:25 -0700114 {FB_VAR_SECURE, {GetSecure, nullptr}},
115 {FB_VAR_UNLOCKED, {GetUnlocked, nullptr}},
116 {FB_VAR_MAX_DOWNLOAD_SIZE, {GetMaxDownloadSize, nullptr}},
117 {FB_VAR_CURRENT_SLOT, {::GetCurrentSlot, nullptr}},
118 {FB_VAR_SLOT_COUNT, {GetSlotCount, nullptr}},
119 {FB_VAR_HAS_SLOT, {GetHasSlot, GetAllPartitionArgsNoSlot}},
120 {FB_VAR_SLOT_SUCCESSFUL, {GetSlotSuccessful, nullptr}},
121 {FB_VAR_SLOT_UNBOOTABLE, {GetSlotUnbootable, nullptr}},
David Anderson27475322019-06-11 14:00:08 -0700122 {FB_VAR_PARTITION_SIZE, {GetPartitionSize, GetAllPartitionArgsWithSlot}},
Hridya Valsarajubf9f8d12018-09-05 16:57:24 -0700123 {FB_VAR_PARTITION_TYPE, {GetPartitionType, GetAllPartitionArgsWithSlot}},
David Anderson0f626632018-08-31 16:44:25 -0700124 {FB_VAR_IS_LOGICAL, {GetPartitionIsLogical, GetAllPartitionArgsWithSlot}},
David Andersonc091c172018-09-04 18:11:03 -0700125 {FB_VAR_IS_USERSPACE, {GetIsUserspace, nullptr}},
Hridya Valsaraju7c9bbe92018-09-27 10:41:01 -0700126 {FB_VAR_OFF_MODE_CHARGE_STATE, {GetOffModeChargeState, nullptr}},
Hridya Valsaraju47658ca2018-09-28 11:41:22 -0700127 {FB_VAR_BATTERY_VOLTAGE, {GetBatteryVoltage, nullptr}},
Hridya Valsarajua534a5a2018-10-03 15:53:22 -0700128 {FB_VAR_BATTERY_SOC_OK, {GetBatterySoCOk, nullptr}},
David Anderson90fe0a42018-11-05 18:01:32 -0800129 {FB_VAR_HW_REVISION, {GetHardwareRevision, nullptr}},
David Andersonab8f4662019-10-21 16:45:59 -0700130 {FB_VAR_SUPER_PARTITION_NAME, {GetSuperPartitionName, nullptr}},
Bowgo Tsai33da5c92019-11-13 17:13:49 +0800131 {FB_VAR_SNAPSHOT_UPDATE_STATUS, {GetSnapshotUpdateStatus, nullptr}},
Bowgo Tsai99f9a382020-01-21 18:31:23 +0800132 {FB_VAR_CPU_ABI, {GetCpuAbi, nullptr}},
133 {FB_VAR_SYSTEM_FINGERPRINT, {GetSystemFingerprint, nullptr}},
134 {FB_VAR_VENDOR_FINGERPRINT, {GetVendorFingerprint, nullptr}},
135 {FB_VAR_DYNAMIC_PARTITION, {GetDynamicPartition, nullptr}},
136 {FB_VAR_FIRST_API_LEVEL, {GetFirstApiLevel, nullptr}},
137 {FB_VAR_SECURITY_PATCH_LEVEL, {GetSecurityPatchLevel, nullptr}},
138 {FB_VAR_TREBLE_ENABLED, {GetTrebleEnabled, nullptr}}};
David Anderson0f626632018-08-31 16:44:25 -0700139
140 if (args.size() < 2) {
141 return device->WriteFail("Missing argument");
142 }
143
144 // Special case: return all variables that we can.
145 if (args[1] == "all") {
146 for (const auto& [name, handlers] : kVariableMap) {
147 GetAllVars(device, name, handlers);
148 }
149 return device->WriteOkay("");
150 }
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700151
152 // args[0] is command name, args[1] is variable.
153 auto found_variable = kVariableMap.find(args[1]);
154 if (found_variable == kVariableMap.end()) {
David Anderson1fb3fd72018-08-31 14:40:22 -0700155 return device->WriteFail("Unknown variable");
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700156 }
157
David Anderson1fb3fd72018-08-31 14:40:22 -0700158 std::string message;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700159 std::vector<std::string> getvar_args(args.begin() + 2, args.end());
David Anderson0f626632018-08-31 16:44:25 -0700160 if (!found_variable->second.get(device, getvar_args, &message)) {
David Anderson1fb3fd72018-08-31 14:40:22 -0700161 return device->WriteFail(message);
162 }
163 return device->WriteOkay(message);
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700164}
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700165
David Anderson12211d12018-07-24 15:21:20 -0700166bool EraseHandler(FastbootDevice* device, const std::vector<std::string>& args) {
167 if (args.size() < 2) {
168 return device->WriteStatus(FastbootResult::FAIL, "Invalid arguments");
169 }
Hridya Valsarajud1e62312018-10-08 09:13:17 -0700170
171 if (GetDeviceLockStatus()) {
172 return device->WriteStatus(FastbootResult::FAIL, "Erase is not allowed on locked devices");
173 }
174
David Anderson220ddb12019-10-31 18:02:41 -0700175 const auto& partition_name = args[1];
176 if (IsProtectedPartitionDuringMerge(device, partition_name)) {
177 auto message = "Cannot erase " + partition_name + " while a snapshot update is in progress";
178 return device->WriteFail(message);
179 }
180
David Anderson12211d12018-07-24 15:21:20 -0700181 PartitionHandle handle;
David Anderson220ddb12019-10-31 18:02:41 -0700182 if (!OpenPartition(device, partition_name, &handle)) {
David Anderson12211d12018-07-24 15:21:20 -0700183 return device->WriteStatus(FastbootResult::FAIL, "Partition doesn't exist");
184 }
185 if (wipe_block_device(handle.fd(), get_block_device_size(handle.fd())) == 0) {
186 return device->WriteStatus(FastbootResult::OKAY, "Erasing succeeded");
187 }
188 return device->WriteStatus(FastbootResult::FAIL, "Erasing failed");
189}
190
Hridya Valsarajua15fe312018-09-14 13:58:21 -0700191bool OemCmdHandler(FastbootDevice* device, const std::vector<std::string>& args) {
192 auto fastboot_hal = device->fastboot_hal();
193 if (!fastboot_hal) {
194 return device->WriteStatus(FastbootResult::FAIL, "Unable to open fastboot HAL");
195 }
196
197 Result ret;
198 auto ret_val = fastboot_hal->doOemCommand(args[0], [&](Result result) { ret = result; });
199 if (!ret_val.isOk()) {
200 return device->WriteStatus(FastbootResult::FAIL, "Unable to do OEM command");
201 }
202 if (ret.status != Status::SUCCESS) {
203 return device->WriteStatus(FastbootResult::FAIL, ret.message);
204 }
205
206 return device->WriteStatus(FastbootResult::OKAY, ret.message);
207}
208
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700209bool DownloadHandler(FastbootDevice* device, const std::vector<std::string>& args) {
210 if (args.size() < 2) {
211 return device->WriteStatus(FastbootResult::FAIL, "size argument unspecified");
212 }
Hridya Valsarajud1e62312018-10-08 09:13:17 -0700213
214 if (GetDeviceLockStatus()) {
215 return device->WriteStatus(FastbootResult::FAIL,
216 "Download is not allowed on locked devices");
217 }
218
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700219 // arg[0] is the command name, arg[1] contains size of data to be downloaded
220 unsigned int size;
Hridya Valsarajuaae84e82018-10-08 13:10:25 -0700221 if (!android::base::ParseUint("0x" + args[1], &size, kMaxDownloadSizeDefault)) {
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700222 return device->WriteStatus(FastbootResult::FAIL, "Invalid size");
223 }
David Anderson12211d12018-07-24 15:21:20 -0700224 device->download_data().resize(size);
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700225 if (!device->WriteStatus(FastbootResult::DATA, android::base::StringPrintf("%08x", size))) {
226 return false;
227 }
228
David Anderson12211d12018-07-24 15:21:20 -0700229 if (device->HandleData(true, &device->download_data())) {
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700230 return device->WriteStatus(FastbootResult::OKAY, "");
231 }
232
233 PLOG(ERROR) << "Couldn't download data";
234 return device->WriteStatus(FastbootResult::FAIL, "Couldn't download data");
235}
236
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700237bool SetActiveHandler(FastbootDevice* device, const std::vector<std::string>& args) {
238 if (args.size() < 2) {
239 return device->WriteStatus(FastbootResult::FAIL, "Missing slot argument");
240 }
241
Hridya Valsarajud1e62312018-10-08 09:13:17 -0700242 if (GetDeviceLockStatus()) {
243 return device->WriteStatus(FastbootResult::FAIL,
244 "set_active command is not allowed on locked devices");
245 }
246
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700247 Slot slot;
248 if (!GetSlotNumber(args[1], &slot)) {
David Anderson220ddb12019-10-31 18:02:41 -0700249 // Slot suffix needs to be between 'a' and 'z'.
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700250 return device->WriteStatus(FastbootResult::FAIL, "Bad slot suffix");
251 }
252
253 // Non-A/B devices will not have a boot control HAL.
254 auto boot_control_hal = device->boot_control_hal();
255 if (!boot_control_hal) {
256 return device->WriteStatus(FastbootResult::FAIL,
257 "Cannot set slot: boot control HAL absent");
258 }
259 if (slot >= boot_control_hal->getNumberSlots()) {
260 return device->WriteStatus(FastbootResult::FAIL, "Slot out of range");
261 }
David Anderson220ddb12019-10-31 18:02:41 -0700262
263 // If the slot is not changing, do nothing.
264 if (slot == boot_control_hal->getCurrentSlot()) {
265 return device->WriteOkay("");
266 }
267
268 // Check how to handle the current snapshot state.
269 if (auto hal11 = device->boot1_1()) {
270 auto merge_status = hal11->getSnapshotMergeStatus();
271 if (merge_status == MergeStatus::MERGING) {
272 return device->WriteFail("Cannot change slots while a snapshot update is in progress");
273 }
274 // Note: we allow the slot change if the state is SNAPSHOTTED. First-
275 // stage init does not have access to the HAL, and uses the slot number
276 // and /metadata OTA state to determine whether a slot change occurred.
277 // Booting into the old slot would erase the OTA, and switching A->B->A
278 // would simply resume it if no boots occur in between. Re-flashing
279 // partitions implicitly cancels the OTA, so leaving the state as-is is
280 // safe.
281 if (merge_status == MergeStatus::SNAPSHOTTED) {
282 device->WriteInfo(
283 "Changing the active slot with a snapshot applied may cancel the"
284 " update.");
285 }
286 }
287
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700288 CommandResult ret;
289 auto cb = [&ret](CommandResult result) { ret = result; };
290 auto result = boot_control_hal->setActiveBootSlot(slot, cb);
Hridya Valsaraju20bdf892018-10-10 11:02:19 -0700291 if (result.isOk() && ret.success) {
292 // Save as slot suffix to match the suffix format as returned from
293 // the boot control HAL.
294 auto current_slot = "_" + args[1];
295 device->set_active_slot(current_slot);
296 return device->WriteStatus(FastbootResult::OKAY, "");
297 }
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700298 return device->WriteStatus(FastbootResult::FAIL, "Unable to set slot");
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700299}
300
301bool ShutDownHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
302 auto result = device->WriteStatus(FastbootResult::OKAY, "Shutting down");
303 android::base::SetProperty(ANDROID_RB_PROPERTY, "shutdown,fastboot");
304 device->CloseDevice();
305 TEMP_FAILURE_RETRY(pause());
306 return result;
307}
308
309bool RebootHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
310 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting");
311 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,from_fastboot");
312 device->CloseDevice();
313 TEMP_FAILURE_RETRY(pause());
314 return result;
315}
316
317bool RebootBootloaderHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
318 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting bootloader");
319 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,bootloader");
320 device->CloseDevice();
321 TEMP_FAILURE_RETRY(pause());
322 return result;
323}
324
325bool RebootFastbootHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
326 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting fastboot");
327 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,fastboot");
328 device->CloseDevice();
329 TEMP_FAILURE_RETRY(pause());
330 return result;
331}
332
333static bool EnterRecovery() {
334 const char msg_switch_to_recovery = 'r';
335
336 android::base::unique_fd sock(socket(AF_UNIX, SOCK_STREAM, 0));
337 if (sock < 0) {
338 PLOG(ERROR) << "Couldn't create sock";
339 return false;
340 }
341
342 struct sockaddr_un addr = {.sun_family = AF_UNIX};
343 strncpy(addr.sun_path, "/dev/socket/recovery", sizeof(addr.sun_path) - 1);
344 if (connect(sock, (struct sockaddr*)&addr, sizeof(addr)) < 0) {
345 PLOG(ERROR) << "Couldn't connect to recovery";
346 return false;
347 }
348 // Switch to recovery will not update the boot reason since it does not
349 // require a reboot.
350 auto ret = write(sock, &msg_switch_to_recovery, sizeof(msg_switch_to_recovery));
351 if (ret != sizeof(msg_switch_to_recovery)) {
352 PLOG(ERROR) << "Couldn't write message to switch to recovery";
353 return false;
354 }
355
356 return true;
357}
358
359bool RebootRecoveryHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
360 auto status = true;
361 if (EnterRecovery()) {
362 status = device->WriteStatus(FastbootResult::OKAY, "Rebooting to recovery");
363 } else {
364 status = device->WriteStatus(FastbootResult::FAIL, "Unable to reboot to recovery");
365 }
366 device->CloseDevice();
367 TEMP_FAILURE_RETRY(pause());
368 return status;
369}
David Anderson0d4277d2018-07-31 13:27:37 -0700370
371// Helper class for opening a handle to a MetadataBuilder and writing the new
372// partition table to the same place it was read.
373class PartitionBuilder {
374 public:
David Andersond25f1c32018-11-09 20:41:33 -0800375 explicit PartitionBuilder(FastbootDevice* device, const std::string& partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700376
377 bool Write();
378 bool Valid() const { return !!builder_; }
379 MetadataBuilder* operator->() const { return builder_.get(); }
380
381 private:
David Anderson4d307b02018-12-17 17:07:34 -0800382 FastbootDevice* device_;
David Anderson0d4277d2018-07-31 13:27:37 -0700383 std::string super_device_;
David Andersond25f1c32018-11-09 20:41:33 -0800384 uint32_t slot_number_;
David Anderson0d4277d2018-07-31 13:27:37 -0700385 std::unique_ptr<MetadataBuilder> builder_;
386};
387
David Anderson4d307b02018-12-17 17:07:34 -0800388PartitionBuilder::PartitionBuilder(FastbootDevice* device, const std::string& partition_name)
389 : device_(device) {
David Andersond25f1c32018-11-09 20:41:33 -0800390 std::string slot_suffix = GetSuperSlotSuffix(device, partition_name);
David Anderson27475322019-06-11 14:00:08 -0700391 slot_number_ = android::fs_mgr::SlotNumberForSlotSuffix(slot_suffix);
David Andersond25f1c32018-11-09 20:41:33 -0800392 auto super_device = FindPhysicalPartition(fs_mgr_get_super_partition_name(slot_number_));
David Anderson0d4277d2018-07-31 13:27:37 -0700393 if (!super_device) {
394 return;
395 }
396 super_device_ = *super_device;
David Andersond25f1c32018-11-09 20:41:33 -0800397 builder_ = MetadataBuilder::New(super_device_, slot_number_);
David Anderson0d4277d2018-07-31 13:27:37 -0700398}
399
400bool PartitionBuilder::Write() {
David Anderson27475322019-06-11 14:00:08 -0700401 auto metadata = builder_->Export();
David Anderson0d4277d2018-07-31 13:27:37 -0700402 if (!metadata) {
403 return false;
404 }
David Anderson4d307b02018-12-17 17:07:34 -0800405 return UpdateAllPartitionMetadata(device_, super_device_, *metadata.get());
David Anderson0d4277d2018-07-31 13:27:37 -0700406}
407
408bool CreatePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
409 if (args.size() < 3) {
410 return device->WriteFail("Invalid partition name and size");
411 }
412
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700413 if (GetDeviceLockStatus()) {
414 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
415 }
416
David Anderson0d4277d2018-07-31 13:27:37 -0700417 uint64_t partition_size;
418 std::string partition_name = args[1];
419 if (!android::base::ParseUint(args[2].c_str(), &partition_size)) {
420 return device->WriteFail("Invalid partition size");
421 }
422
David Andersond25f1c32018-11-09 20:41:33 -0800423 PartitionBuilder builder(device, partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700424 if (!builder.Valid()) {
425 return device->WriteFail("Could not open super partition");
426 }
427 // TODO(112433293) Disallow if the name is in the physical table as well.
428 if (builder->FindPartition(partition_name)) {
429 return device->WriteFail("Partition already exists");
430 }
431
David Anderson27475322019-06-11 14:00:08 -0700432 auto partition = builder->AddPartition(partition_name, 0);
David Anderson0d4277d2018-07-31 13:27:37 -0700433 if (!partition) {
434 return device->WriteFail("Failed to add partition");
435 }
436 if (!builder->ResizePartition(partition, partition_size)) {
437 builder->RemovePartition(partition_name);
438 return device->WriteFail("Not enough space for partition");
439 }
440 if (!builder.Write()) {
441 return device->WriteFail("Failed to write partition table");
442 }
443 return device->WriteOkay("Partition created");
444}
445
446bool DeletePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
447 if (args.size() < 2) {
448 return device->WriteFail("Invalid partition name and size");
449 }
450
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700451 if (GetDeviceLockStatus()) {
452 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
453 }
454
David Andersond25f1c32018-11-09 20:41:33 -0800455 std::string partition_name = args[1];
456
457 PartitionBuilder builder(device, partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700458 if (!builder.Valid()) {
459 return device->WriteFail("Could not open super partition");
460 }
David Andersond25f1c32018-11-09 20:41:33 -0800461 builder->RemovePartition(partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700462 if (!builder.Write()) {
463 return device->WriteFail("Failed to write partition table");
464 }
465 return device->WriteOkay("Partition deleted");
466}
467
468bool ResizePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
469 if (args.size() < 3) {
470 return device->WriteFail("Invalid partition name and size");
471 }
472
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700473 if (GetDeviceLockStatus()) {
474 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
475 }
476
David Anderson0d4277d2018-07-31 13:27:37 -0700477 uint64_t partition_size;
478 std::string partition_name = args[1];
479 if (!android::base::ParseUint(args[2].c_str(), &partition_size)) {
480 return device->WriteFail("Invalid partition size");
481 }
482
David Andersond25f1c32018-11-09 20:41:33 -0800483 PartitionBuilder builder(device, partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700484 if (!builder.Valid()) {
485 return device->WriteFail("Could not open super partition");
486 }
487
David Anderson27475322019-06-11 14:00:08 -0700488 auto partition = builder->FindPartition(partition_name);
David Anderson0d4277d2018-07-31 13:27:37 -0700489 if (!partition) {
490 return device->WriteFail("Partition does not exist");
491 }
David Andersonad970fc2019-08-27 14:01:16 -0700492
493 // Remove the updated flag to cancel any snapshots.
494 uint32_t attrs = partition->attributes();
495 partition->set_attributes(attrs & ~LP_PARTITION_ATTR_UPDATED);
496
David Anderson0d4277d2018-07-31 13:27:37 -0700497 if (!builder->ResizePartition(partition, partition_size)) {
498 return device->WriteFail("Not enough space to resize partition");
499 }
500 if (!builder.Write()) {
501 return device->WriteFail("Failed to write partition table");
502 }
503 return device->WriteOkay("Partition resized");
504}
David Anderson38b3c7a2018-08-15 16:27:42 -0700505
David Andersonad970fc2019-08-27 14:01:16 -0700506void CancelPartitionSnapshot(FastbootDevice* device, const std::string& partition_name) {
507 PartitionBuilder builder(device, partition_name);
508 if (!builder.Valid()) return;
509
510 auto partition = builder->FindPartition(partition_name);
511 if (!partition) return;
512
513 // Remove the updated flag to cancel any snapshots.
514 uint32_t attrs = partition->attributes();
515 partition->set_attributes(attrs & ~LP_PARTITION_ATTR_UPDATED);
516
517 builder.Write();
518}
519
520bool FlashHandler(FastbootDevice* device, const std::vector<std::string>& args) {
521 if (args.size() < 2) {
522 return device->WriteStatus(FastbootResult::FAIL, "Invalid arguments");
523 }
524
525 if (GetDeviceLockStatus()) {
526 return device->WriteStatus(FastbootResult::FAIL,
527 "Flashing is not allowed on locked devices");
528 }
529
530 const auto& partition_name = args[1];
David Anderson220ddb12019-10-31 18:02:41 -0700531 if (IsProtectedPartitionDuringMerge(device, partition_name)) {
532 auto message = "Cannot flash " + partition_name + " while a snapshot update is in progress";
533 return device->WriteFail(message);
534 }
535
David Andersonad970fc2019-08-27 14:01:16 -0700536 if (LogicalPartitionExists(device, partition_name)) {
537 CancelPartitionSnapshot(device, partition_name);
538 }
539
540 int ret = Flash(device, partition_name);
541 if (ret < 0) {
542 return device->WriteStatus(FastbootResult::FAIL, strerror(-ret));
543 }
544 return device->WriteStatus(FastbootResult::OKAY, "Flashing succeeded");
545}
546
David Anderson38b3c7a2018-08-15 16:27:42 -0700547bool UpdateSuperHandler(FastbootDevice* device, const std::vector<std::string>& args) {
548 if (args.size() < 2) {
549 return device->WriteFail("Invalid arguments");
550 }
Hridya Valsarajudca328d2018-09-24 16:01:35 -0700551
552 if (GetDeviceLockStatus()) {
553 return device->WriteStatus(FastbootResult::FAIL, "Command not available on locked devices");
554 }
555
David Anderson38b3c7a2018-08-15 16:27:42 -0700556 bool wipe = (args.size() >= 3 && args[2] == "wipe");
557 return UpdateSuper(device, args[1], wipe);
558}
David Anderson1d504e32019-01-15 14:38:20 -0800559
David Anderson3d782d52019-01-29 13:09:49 -0800560bool GsiHandler(FastbootDevice* device, const std::vector<std::string>& args) {
David Anderson1d504e32019-01-15 14:38:20 -0800561 if (args.size() != 2) {
562 return device->WriteFail("Invalid arguments");
563 }
David Anderson3d782d52019-01-29 13:09:49 -0800564
565 AutoMountMetadata mount_metadata;
566 if (!mount_metadata) {
567 return device->WriteFail("Could not find GSI install");
568 }
569
570 if (!android::gsi::IsGsiInstalled()) {
571 return device->WriteStatus(FastbootResult::FAIL, "No GSI is installed");
572 }
573
David Anderson1d504e32019-01-15 14:38:20 -0800574 if (args[1] == "wipe") {
575 if (!android::gsi::UninstallGsi()) {
576 return device->WriteStatus(FastbootResult::FAIL, strerror(errno));
577 }
578 } else if (args[1] == "disable") {
579 if (!android::gsi::DisableGsi()) {
580 return device->WriteStatus(FastbootResult::FAIL, strerror(errno));
581 }
582 }
583 return device->WriteStatus(FastbootResult::OKAY, "Success");
584}
David Andersonab8f4662019-10-21 16:45:59 -0700585
586bool SnapshotUpdateHandler(FastbootDevice* device, const std::vector<std::string>& args) {
587 // Note that we use the HAL rather than mounting /metadata, since we want
588 // our results to match the bootloader.
David Anderson220ddb12019-10-31 18:02:41 -0700589 auto hal = device->boot1_1();
David Andersonab8f4662019-10-21 16:45:59 -0700590 if (!hal) return device->WriteFail("Not supported");
591
David Andersonab8f4662019-10-21 16:45:59 -0700592 // If no arguments, return the same thing as a getvar. Note that we get the
593 // HAL first so we can return "not supported" before we return the less
594 // specific error message below.
595 if (args.size() < 2 || args[1].empty()) {
596 std::string message;
597 if (!GetSnapshotUpdateStatus(device, {}, &message)) {
598 return device->WriteFail("Could not determine update status");
599 }
600 device->WriteInfo(message);
601 return device->WriteOkay("");
602 }
603
David Anderson220ddb12019-10-31 18:02:41 -0700604 MergeStatus status = hal->getSnapshotMergeStatus();
605
606 if (args.size() != 2) {
David Andersonab8f4662019-10-21 16:45:59 -0700607 return device->WriteFail("Invalid arguments");
608 }
David Anderson220ddb12019-10-31 18:02:41 -0700609 if (args[1] == "cancel") {
610 switch (status) {
611 case MergeStatus::SNAPSHOTTED:
612 case MergeStatus::MERGING:
613 hal->setSnapshotMergeStatus(MergeStatus::CANCELLED);
614 break;
615 default:
616 break;
617 }
618 } else if (args[1] == "merge") {
619 if (status != MergeStatus::MERGING) {
620 return device->WriteFail("No snapshot merge is in progress");
621 }
David Andersonab8f4662019-10-21 16:45:59 -0700622
David Anderson220ddb12019-10-31 18:02:41 -0700623 auto sm = SnapshotManager::NewForFirstStageMount();
624 if (!sm) {
625 return device->WriteFail("Unable to create SnapshotManager");
626 }
627 if (!sm->HandleImminentDataWipe()) {
628 return device->WriteFail("Unable to finish snapshot merge");
629 }
630 } else {
631 return device->WriteFail("Invalid parameter to snapshot-update");
David Andersonab8f4662019-10-21 16:45:59 -0700632 }
633 return device->WriteStatus(FastbootResult::OKAY, "Success");
634}