blob: ce22b5eda3c4d1f5927d6a0fd833dbf3b5cb6bb0 [file] [log] [blame] [edit]
/*
* Copyright (C) 2018 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "host/commands/assemble_cvd/boot_config.h"
#include <fstream>
#include <sstream>
#include <string>
#include <sys/stat.h>
#include <android-base/logging.h>
#include <android-base/strings.h>
#include <gflags/gflags.h>
#include "common/libs/utils/environment.h"
#include "common/libs/utils/files.h"
#include "common/libs/utils/size_utils.h"
#include "common/libs/utils/subprocess.h"
#include "host/libs/config/bootconfig_args.h"
#include "host/libs/config/cuttlefish_config.h"
#include "host/libs/config/kernel_args.h"
#include "host/libs/vm_manager/crosvm_manager.h"
#include "host/libs/vm_manager/vm_manager.h"
using cuttlefish::vm_manager::CrosvmManager;
DECLARE_string(vm_manager);
// Taken from external/avb/avbtool.py; this define is not in the headers
#define MAX_AVB_METADATA_SIZE 69632ul
namespace cuttlefish {
namespace {
// The ordering of tap devices we're passing to crosvm / qemu is important
// Ethernet tap device is the second one (eth1) we're passing ATM
static constexpr char kUbootPrimaryEth[] = "eth1";
void WritePausedEntrypoint(std::ostream& env, const char* entrypoint,
const CuttlefishConfig::InstanceSpecific& instance) {
if (instance.pause_in_bootloader()) {
env << "if test $paused -ne 1; then paused=1; else " << entrypoint << "; fi";
} else {
env << entrypoint;
}
env << '\0';
}
void WriteAndroidEnvironment(
std::ostream& env,
const CuttlefishConfig::InstanceSpecific& instance) {
WritePausedEntrypoint(env, "run bootcmd_android", instance);
if (!instance.boot_slot().empty()) {
env << "android_slot_suffix=_" << instance.boot_slot() << '\0';
}
env << '\0';
}
void WriteEFIEnvironment(
std::ostream& env, const CuttlefishConfig::InstanceSpecific& instance) {
// TODO(b/256602611): get rid of loadddr hardcode. make sure loadddr
// env setup in the bootloader.
WritePausedEntrypoint(env,
"load virtio 0:${devplist} 0x80200000 efi/boot/bootaa64.efi "
"&& bootefi 0x80200000 ${fdtcontroladdr}; "
"load virtio 0:${devplist} 0x02400000 efi/boot/bootia32.efi && "
"bootefi 0x02400000 ${fdtcontroladdr}", instance
);
}
size_t WriteEnvironment(const CuttlefishConfig::InstanceSpecific& instance,
const CuttlefishConfig::InstanceSpecific::BootFlow& flow,
const std::string& kernel_args,
const std::string& env_path) {
std::ostringstream env;
env << "ethprime=" << kUbootPrimaryEth << '\0';
if (!kernel_args.empty()) {
env << "uenvcmd=setenv bootargs \"$cbootargs " << kernel_args << "\" && ";
} else {
env << "uenvcmd=setenv bootargs \"$cbootargs\" && ";
}
switch (flow) {
case CuttlefishConfig::InstanceSpecific::BootFlow::Android:
WriteAndroidEnvironment(env, instance);
break;
case CuttlefishConfig::InstanceSpecific::BootFlow::Linux:
case CuttlefishConfig::InstanceSpecific::BootFlow::Fuchsia:
WriteEFIEnvironment(env, instance);
break;
}
std::string env_str = env.str();
std::ofstream file_out(env_path.c_str(), std::ios::binary);
file_out << env_str;
if (!file_out.good()) {
return 0;
}
return env_str.length();
}
} // namespace
class InitBootloaderEnvPartitionImpl : public InitBootloaderEnvPartition {
public:
INJECT(InitBootloaderEnvPartitionImpl(
const CuttlefishConfig& config,
const CuttlefishConfig::InstanceSpecific& instance))
: config_(config), instance_(instance) {}
// SetupFeature
std::string Name() const override { return "InitBootloaderEnvPartitionImpl"; }
bool Enabled() const override { return !instance_.protected_vm(); }
private:
std::unordered_set<SetupFeature*> Dependencies() const override { return {}; }
bool Setup() override {
if (instance_.ap_boot_flow() == CuttlefishConfig::InstanceSpecific::APBootFlow::Grub) {
if (!PrepareBootEnvImage(instance_.ap_uboot_env_image_path(),
CuttlefishConfig::InstanceSpecific::BootFlow::Linux)) {
return false;
}
}
if (!PrepareBootEnvImage(instance_.uboot_env_image_path(), instance_.boot_flow())) {
return false;
}
return true;
}
std::unordered_map<std::string, std::string> ReplaceKernelBootArgs(
const std::unordered_map<std::string, std::string>& args) {
std::unordered_map<std::string, std::string> ret;
std::transform(std::begin(args), std::end(args),
std::inserter(ret, ret.end()), [](const auto& kv) {
const auto& k = kv.first;
const auto& v = kv.second;
return std::make_pair(
android::base::StringReplace(k, " kernel.", " ", true),
v);
});
return ret;
}
bool PrepareBootEnvImage(const std::string& image_path,
const CuttlefishConfig::InstanceSpecific::BootFlow& flow) {
auto tmp_boot_env_image_path = image_path + ".tmp";
auto uboot_env_path = instance_.PerInstancePath("mkenvimg_input");
auto kernel_cmdline = android::base::Join(
KernelCommandLineFromConfig(config_, instance_), " ");
// If the bootconfig isn't supported in the guest kernel, the bootconfig
// args need to be passed in via the uboot env. This won't be an issue for
// protect kvm which is running a kernel with bootconfig support.
if (!instance_.bootconfig_supported()) {
auto bootconfig_args_result =
BootconfigArgsFromConfig(config_, instance_);
if (!bootconfig_args_result.ok()) {
LOG(ERROR) << "Unable to get bootconfig args from config: "
<< bootconfig_args_result.error().Message();
return false;
}
auto bootconfig_args = std::move(bootconfig_args_result.value());
// "androidboot.hardware" kernel parameter has changed to "hardware" in
// bootconfig and needs to be replaced before being used in the kernel
// cmdline.
auto bootconfig_hardware_it = bootconfig_args.find("hardware");
if (bootconfig_hardware_it != bootconfig_args.end()) {
bootconfig_args["androidboot.hardware"] =
bootconfig_hardware_it->second;
bootconfig_args.erase(bootconfig_hardware_it);
}
// TODO(b/182417593): Until we pass the module parameters through
// modules.options, we pass them through bootconfig using
// 'kernel.<key>=<value>' But if we don't support bootconfig, we need to
// rename them back to the old cmdline version
bootconfig_args = ReplaceKernelBootArgs(bootconfig_args);
auto bootconfig_result =
BootconfigArgsString(bootconfig_args, " ");
if (!bootconfig_result.ok()) {
LOG(ERROR) << "Unable to get bootconfig args string from config: "
<< bootconfig_result.error().Message();
return false;
}
kernel_cmdline += " ";
kernel_cmdline += bootconfig_result.value();
}
if (!WriteEnvironment(instance_, flow, kernel_cmdline, uboot_env_path)) {
LOG(ERROR) << "Unable to write out plaintext env '" << uboot_env_path
<< ".'";
return false;
}
auto mkimage_path = HostBinaryPath("mkenvimage_slim");
Command cmd(mkimage_path);
cmd.AddParameter("-output_path");
cmd.AddParameter(tmp_boot_env_image_path);
cmd.AddParameter("-input_path");
cmd.AddParameter(uboot_env_path);
int success = cmd.Start().Wait();
if (success != 0) {
LOG(ERROR) << "Unable to run mkenvimage_slim. Exited with status "
<< success;
return false;
}
const off_t boot_env_size_bytes = AlignToPowerOf2(
MAX_AVB_METADATA_SIZE + 4096, PARTITION_SIZE_SHIFT);
auto avbtool_path = HostBinaryPath("avbtool");
Command boot_env_hash_footer_cmd(avbtool_path);
boot_env_hash_footer_cmd.AddParameter("add_hash_footer");
boot_env_hash_footer_cmd.AddParameter("--image");
boot_env_hash_footer_cmd.AddParameter(tmp_boot_env_image_path);
boot_env_hash_footer_cmd.AddParameter("--partition_size");
boot_env_hash_footer_cmd.AddParameter(boot_env_size_bytes);
boot_env_hash_footer_cmd.AddParameter("--partition_name");
boot_env_hash_footer_cmd.AddParameter("uboot_env");
boot_env_hash_footer_cmd.AddParameter("--key");
boot_env_hash_footer_cmd.AddParameter(
DefaultHostArtifactsPath("etc/cvd_avb_testkey.pem"));
boot_env_hash_footer_cmd.AddParameter("--algorithm");
boot_env_hash_footer_cmd.AddParameter("SHA256_RSA4096");
success = boot_env_hash_footer_cmd.Start().Wait();
if (success != 0) {
LOG(ERROR) << "Unable to run append hash footer. Exited with status "
<< success;
return false;
}
if (!FileExists(image_path) ||
ReadFile(image_path) != ReadFile(tmp_boot_env_image_path)) {
if (!RenameFile(tmp_boot_env_image_path, image_path).ok()) {
LOG(ERROR) << "Unable to delete the old env image.";
return false;
}
LOG(DEBUG) << "Updated bootloader environment image.";
} else {
RemoveFile(tmp_boot_env_image_path);
}
return true;
}
const CuttlefishConfig& config_;
const CuttlefishConfig::InstanceSpecific& instance_;
};
fruit::Component<fruit::Required<const CuttlefishConfig,
const CuttlefishConfig::InstanceSpecific>,
InitBootloaderEnvPartition>
InitBootloaderEnvPartitionComponent() {
return fruit::createComponent()
.bind<InitBootloaderEnvPartition, InitBootloaderEnvPartitionImpl>()
.addMultibinding<SetupFeature, InitBootloaderEnvPartition>();
}
} // namespace cuttlefish