blob: 48c935a73cadc3ed72a11cdaad1c317dd1093162 [file] [log] [blame]
Hridya Valsarajudea91b42018-07-17 11:14:01 -07001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "commands.h"
18
19#include <sys/socket.h>
20#include <sys/un.h>
21
22#include <android-base/logging.h>
23#include <android-base/parseint.h>
24#include <android-base/properties.h>
25#include <android-base/stringprintf.h>
26#include <android-base/strings.h>
27#include <android-base/unique_fd.h>
28#include <cutils/android_reboot.h>
David Anderson12211d12018-07-24 15:21:20 -070029#include <ext4_utils/wipe.h>
David Anderson0d4277d2018-07-31 13:27:37 -070030#include <liblp/builder.h>
31#include <liblp/liblp.h>
32#include <uuid/uuid.h>
Hridya Valsarajudea91b42018-07-17 11:14:01 -070033
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070034#include "constants.h"
Hridya Valsarajudea91b42018-07-17 11:14:01 -070035#include "fastboot_device.h"
David Anderson12211d12018-07-24 15:21:20 -070036#include "flashing.h"
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070037#include "utility.h"
38
39using ::android::hardware::hidl_string;
40using ::android::hardware::boot::V1_0::BoolResult;
41using ::android::hardware::boot::V1_0::CommandResult;
42using ::android::hardware::boot::V1_0::Slot;
Hridya Valsarajua15fe312018-09-14 13:58:21 -070043using ::android::hardware::fastboot::V1_0::Result;
44using ::android::hardware::fastboot::V1_0::Status;
45
David Anderson0d4277d2018-07-31 13:27:37 -070046using namespace android::fs_mgr;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070047
David Anderson0f626632018-08-31 16:44:25 -070048struct VariableHandlers {
49 // Callback to retrieve the value of a single variable.
50 std::function<bool(FastbootDevice*, const std::vector<std::string>&, std::string*)> get;
51 // Callback to retrieve all possible argument combinations, for getvar all.
52 std::function<std::vector<std::vector<std::string>>(FastbootDevice*)> get_all_args;
53};
54
55static void GetAllVars(FastbootDevice* device, const std::string& name,
56 const VariableHandlers& handlers) {
57 if (!handlers.get_all_args) {
58 std::string message;
59 if (!handlers.get(device, std::vector<std::string>(), &message)) {
60 return;
61 }
62 device->WriteInfo(android::base::StringPrintf("%s:%s", name.c_str(), message.c_str()));
63 return;
64 }
65
66 auto all_args = handlers.get_all_args(device);
67 for (const auto& args : all_args) {
68 std::string message;
69 if (!handlers.get(device, args, &message)) {
70 continue;
71 }
72 std::string arg_string = android::base::Join(args, ":");
73 device->WriteInfo(android::base::StringPrintf("%s:%s:%s", name.c_str(), arg_string.c_str(),
74 message.c_str()));
75 }
76}
77
Hridya Valsaraju31d2c262018-07-20 13:35:50 -070078bool GetVarHandler(FastbootDevice* device, const std::vector<std::string>& args) {
David Anderson0f626632018-08-31 16:44:25 -070079 const std::unordered_map<std::string, VariableHandlers> kVariableMap = {
80 {FB_VAR_VERSION, {GetVersion, nullptr}},
81 {FB_VAR_VERSION_BOOTLOADER, {GetBootloaderVersion, nullptr}},
82 {FB_VAR_VERSION_BASEBAND, {GetBasebandVersion, nullptr}},
83 {FB_VAR_PRODUCT, {GetProduct, nullptr}},
84 {FB_VAR_SERIALNO, {GetSerial, nullptr}},
85 {FB_VAR_SECURE, {GetSecure, nullptr}},
86 {FB_VAR_UNLOCKED, {GetUnlocked, nullptr}},
87 {FB_VAR_MAX_DOWNLOAD_SIZE, {GetMaxDownloadSize, nullptr}},
88 {FB_VAR_CURRENT_SLOT, {::GetCurrentSlot, nullptr}},
89 {FB_VAR_SLOT_COUNT, {GetSlotCount, nullptr}},
90 {FB_VAR_HAS_SLOT, {GetHasSlot, GetAllPartitionArgsNoSlot}},
91 {FB_VAR_SLOT_SUCCESSFUL, {GetSlotSuccessful, nullptr}},
92 {FB_VAR_SLOT_UNBOOTABLE, {GetSlotUnbootable, nullptr}},
93 {FB_VAR_PARTITION_SIZE, {GetPartitionSize, GetAllPartitionArgsWithSlot}},
Hridya Valsarajubf9f8d12018-09-05 16:57:24 -070094 {FB_VAR_PARTITION_TYPE, {GetPartitionType, GetAllPartitionArgsWithSlot}},
David Anderson0f626632018-08-31 16:44:25 -070095 {FB_VAR_IS_LOGICAL, {GetPartitionIsLogical, GetAllPartitionArgsWithSlot}},
David Andersonc091c172018-09-04 18:11:03 -070096 {FB_VAR_IS_USERSPACE, {GetIsUserspace, nullptr}},
97 {FB_VAR_HW_REVISION, {GetHardwareRevision, nullptr}}};
David Anderson0f626632018-08-31 16:44:25 -070098
99 if (args.size() < 2) {
100 return device->WriteFail("Missing argument");
101 }
102
103 // Special case: return all variables that we can.
104 if (args[1] == "all") {
105 for (const auto& [name, handlers] : kVariableMap) {
106 GetAllVars(device, name, handlers);
107 }
108 return device->WriteOkay("");
109 }
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700110
111 // args[0] is command name, args[1] is variable.
112 auto found_variable = kVariableMap.find(args[1]);
113 if (found_variable == kVariableMap.end()) {
David Anderson1fb3fd72018-08-31 14:40:22 -0700114 return device->WriteFail("Unknown variable");
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700115 }
116
David Anderson1fb3fd72018-08-31 14:40:22 -0700117 std::string message;
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700118 std::vector<std::string> getvar_args(args.begin() + 2, args.end());
David Anderson0f626632018-08-31 16:44:25 -0700119 if (!found_variable->second.get(device, getvar_args, &message)) {
David Anderson1fb3fd72018-08-31 14:40:22 -0700120 return device->WriteFail(message);
121 }
122 return device->WriteOkay(message);
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700123}
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700124
David Anderson12211d12018-07-24 15:21:20 -0700125bool EraseHandler(FastbootDevice* device, const std::vector<std::string>& args) {
126 if (args.size() < 2) {
127 return device->WriteStatus(FastbootResult::FAIL, "Invalid arguments");
128 }
129 PartitionHandle handle;
130 if (!OpenPartition(device, args[1], &handle)) {
131 return device->WriteStatus(FastbootResult::FAIL, "Partition doesn't exist");
132 }
133 if (wipe_block_device(handle.fd(), get_block_device_size(handle.fd())) == 0) {
134 return device->WriteStatus(FastbootResult::OKAY, "Erasing succeeded");
135 }
136 return device->WriteStatus(FastbootResult::FAIL, "Erasing failed");
137}
138
Hridya Valsarajua15fe312018-09-14 13:58:21 -0700139bool OemCmdHandler(FastbootDevice* device, const std::vector<std::string>& args) {
140 auto fastboot_hal = device->fastboot_hal();
141 if (!fastboot_hal) {
142 return device->WriteStatus(FastbootResult::FAIL, "Unable to open fastboot HAL");
143 }
144
145 Result ret;
146 auto ret_val = fastboot_hal->doOemCommand(args[0], [&](Result result) { ret = result; });
147 if (!ret_val.isOk()) {
148 return device->WriteStatus(FastbootResult::FAIL, "Unable to do OEM command");
149 }
150 if (ret.status != Status::SUCCESS) {
151 return device->WriteStatus(FastbootResult::FAIL, ret.message);
152 }
153
154 return device->WriteStatus(FastbootResult::OKAY, ret.message);
155}
156
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700157bool DownloadHandler(FastbootDevice* device, const std::vector<std::string>& args) {
158 if (args.size() < 2) {
159 return device->WriteStatus(FastbootResult::FAIL, "size argument unspecified");
160 }
161 // arg[0] is the command name, arg[1] contains size of data to be downloaded
162 unsigned int size;
163 if (!android::base::ParseUint("0x" + args[1], &size, UINT_MAX)) {
164 return device->WriteStatus(FastbootResult::FAIL, "Invalid size");
165 }
David Anderson12211d12018-07-24 15:21:20 -0700166 device->download_data().resize(size);
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700167 if (!device->WriteStatus(FastbootResult::DATA, android::base::StringPrintf("%08x", size))) {
168 return false;
169 }
170
David Anderson12211d12018-07-24 15:21:20 -0700171 if (device->HandleData(true, &device->download_data())) {
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700172 return device->WriteStatus(FastbootResult::OKAY, "");
173 }
174
175 PLOG(ERROR) << "Couldn't download data";
176 return device->WriteStatus(FastbootResult::FAIL, "Couldn't download data");
177}
178
David Anderson12211d12018-07-24 15:21:20 -0700179bool FlashHandler(FastbootDevice* device, const std::vector<std::string>& args) {
180 if (args.size() < 2) {
181 return device->WriteStatus(FastbootResult::FAIL, "Invalid arguments");
182 }
183 int ret = Flash(device, args[1]);
184 if (ret < 0) {
185 return device->WriteStatus(FastbootResult::FAIL, strerror(-ret));
186 }
187 return device->WriteStatus(FastbootResult::OKAY, "Flashing succeeded");
188}
189
Hridya Valsaraju31d2c262018-07-20 13:35:50 -0700190bool SetActiveHandler(FastbootDevice* device, const std::vector<std::string>& args) {
191 if (args.size() < 2) {
192 return device->WriteStatus(FastbootResult::FAIL, "Missing slot argument");
193 }
194
195 // Slot suffix needs to be between 'a' and 'z'.
196 Slot slot;
197 if (!GetSlotNumber(args[1], &slot)) {
198 return device->WriteStatus(FastbootResult::FAIL, "Bad slot suffix");
199 }
200
201 // Non-A/B devices will not have a boot control HAL.
202 auto boot_control_hal = device->boot_control_hal();
203 if (!boot_control_hal) {
204 return device->WriteStatus(FastbootResult::FAIL,
205 "Cannot set slot: boot control HAL absent");
206 }
207 if (slot >= boot_control_hal->getNumberSlots()) {
208 return device->WriteStatus(FastbootResult::FAIL, "Slot out of range");
209 }
210 CommandResult ret;
211 auto cb = [&ret](CommandResult result) { ret = result; };
212 auto result = boot_control_hal->setActiveBootSlot(slot, cb);
213 if (result.isOk() && ret.success) return device->WriteStatus(FastbootResult::OKAY, "");
214 return device->WriteStatus(FastbootResult::FAIL, "Unable to set slot");
Hridya Valsarajudea91b42018-07-17 11:14:01 -0700215}
216
217bool ShutDownHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
218 auto result = device->WriteStatus(FastbootResult::OKAY, "Shutting down");
219 android::base::SetProperty(ANDROID_RB_PROPERTY, "shutdown,fastboot");
220 device->CloseDevice();
221 TEMP_FAILURE_RETRY(pause());
222 return result;
223}
224
225bool RebootHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
226 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting");
227 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,from_fastboot");
228 device->CloseDevice();
229 TEMP_FAILURE_RETRY(pause());
230 return result;
231}
232
233bool RebootBootloaderHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
234 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting bootloader");
235 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,bootloader");
236 device->CloseDevice();
237 TEMP_FAILURE_RETRY(pause());
238 return result;
239}
240
241bool RebootFastbootHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
242 auto result = device->WriteStatus(FastbootResult::OKAY, "Rebooting fastboot");
243 android::base::SetProperty(ANDROID_RB_PROPERTY, "reboot,fastboot");
244 device->CloseDevice();
245 TEMP_FAILURE_RETRY(pause());
246 return result;
247}
248
249static bool EnterRecovery() {
250 const char msg_switch_to_recovery = 'r';
251
252 android::base::unique_fd sock(socket(AF_UNIX, SOCK_STREAM, 0));
253 if (sock < 0) {
254 PLOG(ERROR) << "Couldn't create sock";
255 return false;
256 }
257
258 struct sockaddr_un addr = {.sun_family = AF_UNIX};
259 strncpy(addr.sun_path, "/dev/socket/recovery", sizeof(addr.sun_path) - 1);
260 if (connect(sock, (struct sockaddr*)&addr, sizeof(addr)) < 0) {
261 PLOG(ERROR) << "Couldn't connect to recovery";
262 return false;
263 }
264 // Switch to recovery will not update the boot reason since it does not
265 // require a reboot.
266 auto ret = write(sock, &msg_switch_to_recovery, sizeof(msg_switch_to_recovery));
267 if (ret != sizeof(msg_switch_to_recovery)) {
268 PLOG(ERROR) << "Couldn't write message to switch to recovery";
269 return false;
270 }
271
272 return true;
273}
274
275bool RebootRecoveryHandler(FastbootDevice* device, const std::vector<std::string>& /* args */) {
276 auto status = true;
277 if (EnterRecovery()) {
278 status = device->WriteStatus(FastbootResult::OKAY, "Rebooting to recovery");
279 } else {
280 status = device->WriteStatus(FastbootResult::FAIL, "Unable to reboot to recovery");
281 }
282 device->CloseDevice();
283 TEMP_FAILURE_RETRY(pause());
284 return status;
285}
David Anderson0d4277d2018-07-31 13:27:37 -0700286
287// Helper class for opening a handle to a MetadataBuilder and writing the new
288// partition table to the same place it was read.
289class PartitionBuilder {
290 public:
291 explicit PartitionBuilder(FastbootDevice* device);
292
293 bool Write();
294 bool Valid() const { return !!builder_; }
295 MetadataBuilder* operator->() const { return builder_.get(); }
296
297 private:
298 std::string super_device_;
299 uint32_t slot_number_;
300 std::unique_ptr<MetadataBuilder> builder_;
301};
302
303PartitionBuilder::PartitionBuilder(FastbootDevice* device) {
304 auto super_device = FindPhysicalPartition(LP_METADATA_PARTITION_NAME);
305 if (!super_device) {
306 return;
307 }
308 super_device_ = *super_device;
309
310 std::string slot = device->GetCurrentSlot();
311 slot_number_ = SlotNumberForSlotSuffix(slot);
312 builder_ = MetadataBuilder::New(super_device_, slot_number_);
313}
314
315bool PartitionBuilder::Write() {
316 std::unique_ptr<LpMetadata> metadata = builder_->Export();
317 if (!metadata) {
318 return false;
319 }
320 return UpdatePartitionTable(super_device_, *metadata.get(), slot_number_);
321}
322
323bool CreatePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
324 if (args.size() < 3) {
325 return device->WriteFail("Invalid partition name and size");
326 }
327
328 uint64_t partition_size;
329 std::string partition_name = args[1];
330 if (!android::base::ParseUint(args[2].c_str(), &partition_size)) {
331 return device->WriteFail("Invalid partition size");
332 }
333
334 PartitionBuilder builder(device);
335 if (!builder.Valid()) {
336 return device->WriteFail("Could not open super partition");
337 }
338 // TODO(112433293) Disallow if the name is in the physical table as well.
339 if (builder->FindPartition(partition_name)) {
340 return device->WriteFail("Partition already exists");
341 }
342
343 // Make a random UUID, since they're not currently used.
344 uuid_t uuid;
345 char uuid_str[37];
346 uuid_generate_random(uuid);
347 uuid_unparse(uuid, uuid_str);
348
349 Partition* partition = builder->AddPartition(partition_name, uuid_str, 0);
350 if (!partition) {
351 return device->WriteFail("Failed to add partition");
352 }
353 if (!builder->ResizePartition(partition, partition_size)) {
354 builder->RemovePartition(partition_name);
355 return device->WriteFail("Not enough space for partition");
356 }
357 if (!builder.Write()) {
358 return device->WriteFail("Failed to write partition table");
359 }
360 return device->WriteOkay("Partition created");
361}
362
363bool DeletePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
364 if (args.size() < 2) {
365 return device->WriteFail("Invalid partition name and size");
366 }
367
368 PartitionBuilder builder(device);
369 if (!builder.Valid()) {
370 return device->WriteFail("Could not open super partition");
371 }
372 builder->RemovePartition(args[1]);
373 if (!builder.Write()) {
374 return device->WriteFail("Failed to write partition table");
375 }
376 return device->WriteOkay("Partition deleted");
377}
378
379bool ResizePartitionHandler(FastbootDevice* device, const std::vector<std::string>& args) {
380 if (args.size() < 3) {
381 return device->WriteFail("Invalid partition name and size");
382 }
383
384 uint64_t partition_size;
385 std::string partition_name = args[1];
386 if (!android::base::ParseUint(args[2].c_str(), &partition_size)) {
387 return device->WriteFail("Invalid partition size");
388 }
389
390 PartitionBuilder builder(device);
391 if (!builder.Valid()) {
392 return device->WriteFail("Could not open super partition");
393 }
394
395 Partition* partition = builder->FindPartition(partition_name);
396 if (!partition) {
397 return device->WriteFail("Partition does not exist");
398 }
399 if (!builder->ResizePartition(partition, partition_size)) {
400 return device->WriteFail("Not enough space to resize partition");
401 }
402 if (!builder.Write()) {
403 return device->WriteFail("Failed to write partition table");
404 }
405 return device->WriteOkay("Partition resized");
406}
David Anderson38b3c7a2018-08-15 16:27:42 -0700407
408bool UpdateSuperHandler(FastbootDevice* device, const std::vector<std::string>& args) {
409 if (args.size() < 2) {
410 return device->WriteFail("Invalid arguments");
411 }
412 bool wipe = (args.size() >= 3 && args[2] == "wipe");
413 return UpdateSuper(device, args[1], wipe);
414}