| /* |
| * Copyright (C) 2018 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "host/commands/assemble_cvd/boot_config.h" |
| |
| #include <fstream> |
| #include <sstream> |
| #include <string> |
| |
| #include <sys/stat.h> |
| |
| #include <android-base/logging.h> |
| #include <android-base/strings.h> |
| #include <gflags/gflags.h> |
| |
| #include "common/libs/utils/environment.h" |
| #include "common/libs/utils/files.h" |
| #include "common/libs/utils/size_utils.h" |
| #include "common/libs/utils/subprocess.h" |
| #include "host/libs/config/bootconfig_args.h" |
| #include "host/libs/config/cuttlefish_config.h" |
| #include "host/libs/config/kernel_args.h" |
| #include "host/libs/vm_manager/crosvm_manager.h" |
| #include "host/libs/vm_manager/vm_manager.h" |
| |
| using cuttlefish::vm_manager::CrosvmManager; |
| |
| DECLARE_string(vm_manager); |
| |
| // Taken from external/avb/avbtool.py; this define is not in the headers |
| #define MAX_AVB_METADATA_SIZE 69632ul |
| |
| namespace cuttlefish { |
| namespace { |
| |
| // The ordering of tap devices we're passing to crosvm / qemu is important |
| // Ethernet tap device is the second one (eth1) we're passing ATM |
| static constexpr char kUbootPrimaryEth[] = "eth1"; |
| |
| void WritePausedEntrypoint(std::ostream& env, const char* entrypoint, |
| const CuttlefishConfig::InstanceSpecific& instance) { |
| if (instance.pause_in_bootloader()) { |
| env << "if test $paused -ne 1; then paused=1; else " << entrypoint << "; fi"; |
| } else { |
| env << entrypoint; |
| } |
| |
| env << '\0'; |
| } |
| |
| void WriteAndroidEnvironment( |
| std::ostream& env, |
| const CuttlefishConfig::InstanceSpecific& instance) { |
| WritePausedEntrypoint(env, "run bootcmd_android", instance); |
| |
| if (!instance.boot_slot().empty()) { |
| env << "android_slot_suffix=_" << instance.boot_slot() << '\0'; |
| } |
| env << '\0'; |
| } |
| |
| void WriteEFIEnvironment( |
| std::ostream& env, const CuttlefishConfig::InstanceSpecific& instance) { |
| // TODO(b/256602611): get rid of loadddr hardcode. make sure loadddr |
| // env setup in the bootloader. |
| WritePausedEntrypoint(env, |
| "load virtio 0:${devplist} 0x80200000 efi/boot/bootaa64.efi " |
| "&& bootefi 0x80200000 ${fdtcontroladdr}; " |
| "load virtio 0:${devplist} 0x02400000 efi/boot/bootia32.efi && " |
| "bootefi 0x02400000 ${fdtcontroladdr}", instance |
| ); |
| } |
| |
| size_t WriteEnvironment(const CuttlefishConfig::InstanceSpecific& instance, |
| const CuttlefishConfig::InstanceSpecific::BootFlow& flow, |
| const std::string& kernel_args, |
| const std::string& env_path) { |
| std::ostringstream env; |
| |
| env << "ethprime=" << kUbootPrimaryEth << '\0'; |
| if (!kernel_args.empty()) { |
| env << "uenvcmd=setenv bootargs \"$cbootargs " << kernel_args << "\" && "; |
| } else { |
| env << "uenvcmd=setenv bootargs \"$cbootargs\" && "; |
| } |
| |
| switch (flow) { |
| case CuttlefishConfig::InstanceSpecific::BootFlow::Android: |
| WriteAndroidEnvironment(env, instance); |
| break; |
| case CuttlefishConfig::InstanceSpecific::BootFlow::Linux: |
| case CuttlefishConfig::InstanceSpecific::BootFlow::Fuchsia: |
| WriteEFIEnvironment(env, instance); |
| break; |
| } |
| |
| std::string env_str = env.str(); |
| std::ofstream file_out(env_path.c_str(), std::ios::binary); |
| file_out << env_str; |
| |
| if (!file_out.good()) { |
| return 0; |
| } |
| |
| return env_str.length(); |
| } |
| |
| } // namespace |
| |
| class InitBootloaderEnvPartitionImpl : public InitBootloaderEnvPartition { |
| public: |
| INJECT(InitBootloaderEnvPartitionImpl( |
| const CuttlefishConfig& config, |
| const CuttlefishConfig::InstanceSpecific& instance)) |
| : config_(config), instance_(instance) {} |
| |
| // SetupFeature |
| std::string Name() const override { return "InitBootloaderEnvPartitionImpl"; } |
| bool Enabled() const override { return !instance_.protected_vm(); } |
| |
| private: |
| std::unordered_set<SetupFeature*> Dependencies() const override { return {}; } |
| bool Setup() override { |
| if (instance_.ap_boot_flow() == CuttlefishConfig::InstanceSpecific::APBootFlow::Grub) { |
| if (!PrepareBootEnvImage(instance_.ap_uboot_env_image_path(), |
| CuttlefishConfig::InstanceSpecific::BootFlow::Linux)) { |
| return false; |
| } |
| } |
| if (!PrepareBootEnvImage(instance_.uboot_env_image_path(), instance_.boot_flow())) { |
| return false; |
| } |
| |
| return true; |
| } |
| |
| std::unordered_map<std::string, std::string> ReplaceKernelBootArgs( |
| const std::unordered_map<std::string, std::string>& args) { |
| std::unordered_map<std::string, std::string> ret; |
| std::transform(std::begin(args), std::end(args), |
| std::inserter(ret, ret.end()), [](const auto& kv) { |
| const auto& k = kv.first; |
| const auto& v = kv.second; |
| return std::make_pair( |
| android::base::StringReplace(k, " kernel.", " ", true), |
| v); |
| }); |
| return ret; |
| } |
| |
| bool PrepareBootEnvImage(const std::string& image_path, |
| const CuttlefishConfig::InstanceSpecific::BootFlow& flow) { |
| auto tmp_boot_env_image_path = image_path + ".tmp"; |
| auto uboot_env_path = instance_.PerInstancePath("mkenvimg_input"); |
| auto kernel_cmdline = android::base::Join( |
| KernelCommandLineFromConfig(config_, instance_), " "); |
| // If the bootconfig isn't supported in the guest kernel, the bootconfig |
| // args need to be passed in via the uboot env. This won't be an issue for |
| // protect kvm which is running a kernel with bootconfig support. |
| if (!instance_.bootconfig_supported()) { |
| auto bootconfig_args_result = |
| BootconfigArgsFromConfig(config_, instance_); |
| if (!bootconfig_args_result.ok()) { |
| LOG(ERROR) << "Unable to get bootconfig args from config: " |
| << bootconfig_args_result.error().Message(); |
| return false; |
| } |
| auto bootconfig_args = std::move(bootconfig_args_result.value()); |
| |
| // "androidboot.hardware" kernel parameter has changed to "hardware" in |
| // bootconfig and needs to be replaced before being used in the kernel |
| // cmdline. |
| auto bootconfig_hardware_it = bootconfig_args.find("hardware"); |
| if (bootconfig_hardware_it != bootconfig_args.end()) { |
| bootconfig_args["androidboot.hardware"] = |
| bootconfig_hardware_it->second; |
| bootconfig_args.erase(bootconfig_hardware_it); |
| } |
| |
| // TODO(b/182417593): Until we pass the module parameters through |
| // modules.options, we pass them through bootconfig using |
| // 'kernel.<key>=<value>' But if we don't support bootconfig, we need to |
| // rename them back to the old cmdline version |
| bootconfig_args = ReplaceKernelBootArgs(bootconfig_args); |
| |
| auto bootconfig_result = |
| BootconfigArgsString(bootconfig_args, " "); |
| if (!bootconfig_result.ok()) { |
| LOG(ERROR) << "Unable to get bootconfig args string from config: " |
| << bootconfig_result.error().Message(); |
| return false; |
| } |
| |
| kernel_cmdline += " "; |
| kernel_cmdline += bootconfig_result.value(); |
| } |
| |
| if (!WriteEnvironment(instance_, flow, kernel_cmdline, uboot_env_path)) { |
| LOG(ERROR) << "Unable to write out plaintext env '" << uboot_env_path |
| << ".'"; |
| return false; |
| } |
| |
| auto mkimage_path = HostBinaryPath("mkenvimage_slim"); |
| Command cmd(mkimage_path); |
| cmd.AddParameter("-output_path"); |
| cmd.AddParameter(tmp_boot_env_image_path); |
| cmd.AddParameter("-input_path"); |
| cmd.AddParameter(uboot_env_path); |
| int success = cmd.Start().Wait(); |
| if (success != 0) { |
| LOG(ERROR) << "Unable to run mkenvimage_slim. Exited with status " |
| << success; |
| return false; |
| } |
| |
| const off_t boot_env_size_bytes = AlignToPowerOf2( |
| MAX_AVB_METADATA_SIZE + 4096, PARTITION_SIZE_SHIFT); |
| |
| auto avbtool_path = HostBinaryPath("avbtool"); |
| Command boot_env_hash_footer_cmd(avbtool_path); |
| boot_env_hash_footer_cmd.AddParameter("add_hash_footer"); |
| boot_env_hash_footer_cmd.AddParameter("--image"); |
| boot_env_hash_footer_cmd.AddParameter(tmp_boot_env_image_path); |
| boot_env_hash_footer_cmd.AddParameter("--partition_size"); |
| boot_env_hash_footer_cmd.AddParameter(boot_env_size_bytes); |
| boot_env_hash_footer_cmd.AddParameter("--partition_name"); |
| boot_env_hash_footer_cmd.AddParameter("uboot_env"); |
| boot_env_hash_footer_cmd.AddParameter("--key"); |
| boot_env_hash_footer_cmd.AddParameter( |
| DefaultHostArtifactsPath("etc/cvd_avb_testkey.pem")); |
| boot_env_hash_footer_cmd.AddParameter("--algorithm"); |
| boot_env_hash_footer_cmd.AddParameter("SHA256_RSA4096"); |
| success = boot_env_hash_footer_cmd.Start().Wait(); |
| if (success != 0) { |
| LOG(ERROR) << "Unable to run append hash footer. Exited with status " |
| << success; |
| return false; |
| } |
| |
| if (!FileExists(image_path) || |
| ReadFile(image_path) != ReadFile(tmp_boot_env_image_path)) { |
| if (!RenameFile(tmp_boot_env_image_path, image_path).ok()) { |
| LOG(ERROR) << "Unable to delete the old env image."; |
| return false; |
| } |
| LOG(DEBUG) << "Updated bootloader environment image."; |
| } else { |
| RemoveFile(tmp_boot_env_image_path); |
| } |
| |
| return true; |
| } |
| |
| const CuttlefishConfig& config_; |
| const CuttlefishConfig::InstanceSpecific& instance_; |
| }; |
| |
| fruit::Component<fruit::Required<const CuttlefishConfig, |
| const CuttlefishConfig::InstanceSpecific>, |
| InitBootloaderEnvPartition> |
| InitBootloaderEnvPartitionComponent() { |
| return fruit::createComponent() |
| .bind<InitBootloaderEnvPartition, InitBootloaderEnvPartitionImpl>() |
| .addMultibinding<SetupFeature, InitBootloaderEnvPartition>(); |
| } |
| |
| } // namespace cuttlefish |