| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 1 | // | 
|  | 2 | // Copyright (C) 2018 The Android Open Source Project | 
|  | 3 | // | 
|  | 4 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | 5 | // you may not use this file except in compliance with the License. | 
|  | 6 | // You may obtain a copy of the License at | 
|  | 7 | // | 
|  | 8 | //      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 9 | // | 
|  | 10 | // Unless required by applicable law or agreed to in writing, software | 
|  | 11 | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 13 | // See the License for the specific language governing permissions and | 
|  | 14 | // limitations under the License. | 
|  | 15 | // | 
|  | 16 |  | 
|  | 17 | #include "update_engine/payload_consumer/verity_writer_android.h" | 
|  | 18 |  | 
|  | 19 | #include <fcntl.h> | 
|  | 20 |  | 
|  | 21 | #include <algorithm> | 
|  | 22 | #include <memory> | 
|  | 23 |  | 
|  | 24 | #include <base/logging.h> | 
|  | 25 | #include <base/posix/eintr_wrapper.h> | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 26 | #include <fec/ecc.h> | 
|  | 27 | extern "C" { | 
|  | 28 | #include <fec.h> | 
|  | 29 | } | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 30 |  | 
|  | 31 | #include "update_engine/common/utils.h" | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 32 | #include "update_engine/payload_consumer/cached_file_descriptor.h" | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 33 | #include "update_engine/payload_consumer/file_descriptor.h" | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 34 |  | 
|  | 35 | namespace chromeos_update_engine { | 
|  | 36 |  | 
|  | 37 | namespace verity_writer { | 
|  | 38 | std::unique_ptr<VerityWriterInterface> CreateVerityWriter() { | 
|  | 39 | return std::make_unique<VerityWriterAndroid>(); | 
|  | 40 | } | 
|  | 41 | }  // namespace verity_writer | 
|  | 42 |  | 
|  | 43 | bool VerityWriterAndroid::Init(const InstallPlan::Partition& partition) { | 
|  | 44 | partition_ = &partition; | 
|  | 45 |  | 
|  | 46 | if (partition_->hash_tree_size != 0) { | 
|  | 47 | auto hash_function = | 
|  | 48 | HashTreeBuilder::HashFunction(partition_->hash_tree_algorithm); | 
|  | 49 | if (hash_function == nullptr) { | 
|  | 50 | LOG(ERROR) << "Verity hash algorithm not supported: " | 
|  | 51 | << partition_->hash_tree_algorithm; | 
|  | 52 | return false; | 
|  | 53 | } | 
|  | 54 | hash_tree_builder_ = std::make_unique<HashTreeBuilder>( | 
|  | 55 | partition_->block_size, hash_function); | 
|  | 56 | TEST_AND_RETURN_FALSE(hash_tree_builder_->Initialize( | 
|  | 57 | partition_->hash_tree_data_size, partition_->hash_tree_salt)); | 
|  | 58 | if (hash_tree_builder_->CalculateSize(partition_->hash_tree_data_size) != | 
|  | 59 | partition_->hash_tree_size) { | 
|  | 60 | LOG(ERROR) << "Verity hash tree size does not match, stored: " | 
|  | 61 | << partition_->hash_tree_size << ", calculated: " | 
|  | 62 | << hash_tree_builder_->CalculateSize( | 
|  | 63 | partition_->hash_tree_data_size); | 
|  | 64 | return false; | 
|  | 65 | } | 
|  | 66 | } | 
| Kelvin Zhang | eeec381 | 2021-03-16 14:01:47 -0400 | [diff] [blame] | 67 | total_offset_ = 0; | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 68 | return true; | 
|  | 69 | } | 
|  | 70 |  | 
| Kelvin Zhang | eeec381 | 2021-03-16 14:01:47 -0400 | [diff] [blame] | 71 | bool VerityWriterAndroid::Update(const uint64_t offset, | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 72 | const uint8_t* buffer, | 
|  | 73 | size_t size) { | 
| Kelvin Zhang | eeec381 | 2021-03-16 14:01:47 -0400 | [diff] [blame] | 74 | if (offset != total_offset_) { | 
|  | 75 | LOG(ERROR) << "Sequential read expected, expected to read at: " | 
|  | 76 | << total_offset_ << " actual read occurs at: " << offset; | 
|  | 77 | return false; | 
|  | 78 | } | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 79 | if (partition_->hash_tree_size != 0) { | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 80 | const uint64_t hash_tree_data_end = | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 81 | partition_->hash_tree_data_offset + partition_->hash_tree_data_size; | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 82 | const uint64_t start_offset = | 
|  | 83 | std::max(offset, partition_->hash_tree_data_offset); | 
|  | 84 | if (offset + size > hash_tree_data_end) { | 
|  | 85 | LOG(WARNING) | 
|  | 86 | << "Reading past hash_tree_data_end, something is probably " | 
|  | 87 | "wrong, might cause incorrect hash of partitions. offset: " | 
|  | 88 | << offset << " size: " << size | 
|  | 89 | << " hash_tree_data_end: " << hash_tree_data_end; | 
|  | 90 | } | 
|  | 91 | const uint64_t end_offset = std::min(offset + size, hash_tree_data_end); | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 92 | if (start_offset < end_offset) { | 
|  | 93 | TEST_AND_RETURN_FALSE(hash_tree_builder_->Update( | 
|  | 94 | buffer + start_offset - offset, end_offset - start_offset)); | 
|  | 95 |  | 
|  | 96 | if (end_offset == hash_tree_data_end) { | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 97 | LOG(INFO) | 
|  | 98 | << "Read everything before hash tree. Ready to write hash tree."; | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 99 | } | 
|  | 100 | } | 
|  | 101 | } | 
| Kelvin Zhang | eeec381 | 2021-03-16 14:01:47 -0400 | [diff] [blame] | 102 | total_offset_ += size; | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 103 |  | 
|  | 104 | return true; | 
|  | 105 | } | 
|  | 106 |  | 
| Kelvin Zhang | 1a0ed71 | 2022-01-26 16:09:05 -0800 | [diff] [blame] | 107 | bool VerityWriterAndroid::Finalize(FileDescriptor* read_fd, | 
|  | 108 | FileDescriptor* write_fd) { | 
| Kelvin Zhang | eeec381 | 2021-03-16 14:01:47 -0400 | [diff] [blame] | 109 | const auto hash_tree_data_end = | 
|  | 110 | partition_->hash_tree_data_offset + partition_->hash_tree_data_size; | 
|  | 111 | if (total_offset_ < hash_tree_data_end) { | 
|  | 112 | LOG(ERROR) << "Read up to " << total_offset_ | 
|  | 113 | << " when we are expecting to read everything " | 
|  | 114 | "before " | 
|  | 115 | << hash_tree_data_end; | 
|  | 116 | return false; | 
|  | 117 | } | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 118 | // All hash tree data blocks has been hashed, write hash tree to disk. | 
|  | 119 | LOG(INFO) << "Writing verity hash tree to " << partition_->target_path; | 
| Kelvin Zhang | e4bffe6 | 2022-03-07 09:08:38 -0800 | [diff] [blame] | 120 | if (hash_tree_builder_) { | 
|  | 121 | TEST_AND_RETURN_FALSE(hash_tree_builder_->BuildHashTree()); | 
|  | 122 | TEST_AND_RETURN_FALSE_ERRNO( | 
|  | 123 | write_fd->Seek(partition_->hash_tree_offset, SEEK_SET)); | 
|  | 124 | auto success = | 
|  | 125 | hash_tree_builder_->WriteHashTree([write_fd](auto data, auto size) { | 
|  | 126 | return utils::WriteAll(write_fd, data, size); | 
|  | 127 | }); | 
|  | 128 | // hashtree builder already prints error messages. | 
|  | 129 | TEST_AND_RETURN_FALSE(success); | 
|  | 130 | hash_tree_builder_.reset(); | 
|  | 131 | } | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 132 | if (partition_->fec_size != 0) { | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 133 | LOG(INFO) << "Writing verity FEC to " << partition_->target_path; | 
|  | 134 | TEST_AND_RETURN_FALSE(EncodeFEC(read_fd, | 
|  | 135 | write_fd, | 
|  | 136 | partition_->fec_data_offset, | 
|  | 137 | partition_->fec_data_size, | 
|  | 138 | partition_->fec_offset, | 
|  | 139 | partition_->fec_size, | 
|  | 140 | partition_->fec_roots, | 
|  | 141 | partition_->block_size, | 
|  | 142 | false /* verify_mode */)); | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 143 | } | 
|  | 144 | return true; | 
|  | 145 | } | 
|  | 146 |  | 
| Kelvin Zhang | 1a0ed71 | 2022-01-26 16:09:05 -0800 | [diff] [blame] | 147 | bool VerityWriterAndroid::EncodeFEC(FileDescriptor* read_fd, | 
|  | 148 | FileDescriptor* write_fd, | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 149 | uint64_t data_offset, | 
|  | 150 | uint64_t data_size, | 
|  | 151 | uint64_t fec_offset, | 
|  | 152 | uint64_t fec_size, | 
|  | 153 | uint32_t fec_roots, | 
|  | 154 | uint32_t block_size, | 
|  | 155 | bool verify_mode) { | 
|  | 156 | TEST_AND_RETURN_FALSE(data_size % block_size == 0); | 
|  | 157 | TEST_AND_RETURN_FALSE(fec_roots >= 0 && fec_roots < FEC_RSM); | 
|  | 158 | // This is the N in RS(M, N), which is the number of bytes for each rs block. | 
|  | 159 | size_t rs_n = FEC_RSM - fec_roots; | 
|  | 160 | uint64_t rounds = utils::DivRoundUp(data_size / block_size, rs_n); | 
|  | 161 | TEST_AND_RETURN_FALSE(rounds * fec_roots * block_size == fec_size); | 
|  | 162 |  | 
|  | 163 | std::unique_ptr<void, decltype(&free_rs_char)> rs_char( | 
|  | 164 | init_rs_char(FEC_PARAMS(fec_roots)), &free_rs_char); | 
|  | 165 | TEST_AND_RETURN_FALSE(rs_char != nullptr); | 
| Kelvin Zhang | 9792f08 | 2022-01-26 16:48:24 -0800 | [diff] [blame] | 166 | // Cache at most 1MB of fec data, in VABC, we need to re-open fd if we | 
|  | 167 | // perform a read() operation after write(). So reduce the number of writes | 
|  | 168 | // can save unnecessary re-opens. | 
|  | 169 | UnownedCachedFileDescriptor cache_fd(write_fd, 1 * (1 << 20)); | 
|  | 170 | write_fd = &cache_fd; | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 171 |  | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 172 | for (size_t i = 0; i < rounds; i++) { | 
|  | 173 | // Encodes |block_size| number of rs blocks each round so that we can read | 
|  | 174 | // one block each time instead of 1 byte to increase random read | 
|  | 175 | // performance. This uses about 1 MiB memory for 4K block size. | 
|  | 176 | brillo::Blob rs_blocks(block_size * rs_n); | 
|  | 177 | for (size_t j = 0; j < rs_n; j++) { | 
|  | 178 | brillo::Blob buffer(block_size, 0); | 
|  | 179 | uint64_t offset = | 
|  | 180 | fec_ecc_interleave(i * rs_n * block_size + j, rs_n, rounds); | 
|  | 181 | // Don't read past |data_size|, treat them as 0. | 
|  | 182 | if (offset < data_size) { | 
|  | 183 | ssize_t bytes_read = 0; | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 184 | TEST_AND_RETURN_FALSE(utils::PReadAll(read_fd, | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 185 | buffer.data(), | 
|  | 186 | buffer.size(), | 
|  | 187 | data_offset + offset, | 
|  | 188 | &bytes_read)); | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 189 | TEST_AND_RETURN_FALSE(bytes_read >= 0); | 
|  | 190 | TEST_AND_RETURN_FALSE(static_cast<size_t>(bytes_read) == buffer.size()); | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 191 | } | 
|  | 192 | for (size_t k = 0; k < buffer.size(); k++) { | 
|  | 193 | rs_blocks[k * rs_n + j] = buffer[k]; | 
|  | 194 | } | 
|  | 195 | } | 
|  | 196 | brillo::Blob fec(block_size * fec_roots); | 
|  | 197 | for (size_t j = 0; j < block_size; j++) { | 
|  | 198 | // Encode [j * rs_n : (j + 1) * rs_n) in |rs_blocks| and write |fec_roots| | 
|  | 199 | // number of parity bytes to |j * fec_roots| in |fec|. | 
|  | 200 | encode_rs_char(rs_char.get(), | 
|  | 201 | rs_blocks.data() + j * rs_n, | 
|  | 202 | fec.data() + j * fec_roots); | 
|  | 203 | } | 
|  | 204 |  | 
|  | 205 | if (verify_mode) { | 
|  | 206 | brillo::Blob fec_read(fec.size()); | 
|  | 207 | ssize_t bytes_read = 0; | 
|  | 208 | TEST_AND_RETURN_FALSE(utils::PReadAll( | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 209 | read_fd, fec_read.data(), fec_read.size(), fec_offset, &bytes_read)); | 
|  | 210 | TEST_AND_RETURN_FALSE(bytes_read >= 0); | 
|  | 211 | TEST_AND_RETURN_FALSE(static_cast<size_t>(bytes_read) == fec_read.size()); | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 212 | TEST_AND_RETURN_FALSE(fec == fec_read); | 
|  | 213 | } else { | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 214 | CHECK(write_fd); | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 215 | write_fd->Seek(fec_offset, SEEK_SET); | 
|  | 216 | if (!utils::WriteAll(write_fd, fec.data(), fec.size())) { | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 217 | PLOG(ERROR) << "EncodeFEC write() failed"; | 
|  | 218 | return false; | 
|  | 219 | } | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 220 | } | 
|  | 221 | fec_offset += fec.size(); | 
|  | 222 | } | 
| Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 223 | write_fd->Flush(); | 
| Sen Jiang | a778e5b | 2018-09-13 11:42:56 -0700 | [diff] [blame] | 224 | return true; | 
|  | 225 | } | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 226 |  | 
|  | 227 | bool VerityWriterAndroid::EncodeFEC(const std::string& path, | 
|  | 228 | uint64_t data_offset, | 
|  | 229 | uint64_t data_size, | 
|  | 230 | uint64_t fec_offset, | 
|  | 231 | uint64_t fec_size, | 
|  | 232 | uint32_t fec_roots, | 
|  | 233 | uint32_t block_size, | 
|  | 234 | bool verify_mode) { | 
| Kelvin Zhang | 1a0ed71 | 2022-01-26 16:09:05 -0800 | [diff] [blame] | 235 | EintrSafeFileDescriptor fd; | 
|  | 236 | TEST_AND_RETURN_FALSE(fd.Open(path.c_str(), verify_mode ? O_RDONLY : O_RDWR)); | 
|  | 237 | return EncodeFEC(&fd, | 
|  | 238 | &fd, | 
| Kelvin Zhang | b138ab5 | 2020-11-06 15:56:41 -0500 | [diff] [blame] | 239 | data_offset, | 
|  | 240 | data_size, | 
|  | 241 | fec_offset, | 
|  | 242 | fec_size, | 
|  | 243 | fec_roots, | 
|  | 244 | block_size, | 
|  | 245 | verify_mode); | 
|  | 246 | } | 
| Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 247 | }  // namespace chromeos_update_engine |