commands.c revision 4662a114a416e636de805fbd875f8b90fc5965b9
1/* 2 * Copyright (c) 2009-2013, Google Inc. 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * * Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * * Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in 12 * the documentation and/or other materials provided with the 13 * distribution. 14 * * Neither the name of Google, Inc. nor the names of its contributors 15 * may be used to endorse or promote products derived from this 16 * software without specific prior written permission. 17 * 18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 19 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 20 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 21 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 22 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 24 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS 25 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 26 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 27 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 28 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 29 * SUCH DAMAGE. 30 */ 31 32#include <stdlib.h> 33#include <unistd.h> 34#include <sys/types.h> 35#include <sys/mman.h> 36#include <sys/stat.h> 37#include <unistd.h> 38#include <sys/reboot.h> 39#include <fcntl.h> 40 41#include "bootimg.h" 42#include "commands/boot.h" 43#include "commands/flash.h" 44#include "commands/partitions.h" 45#include "commands/virtual_partitions.h" 46#include "debug.h" 47#include "protocol.h" 48#include "trigger.h" 49#include "utils.h" 50 51#define ATAGS_LOCATION "/proc/atags" 52 53static void cmd_boot(struct protocol_handle *phandle, const char *arg) 54{ 55 int sz, atags_sz, new_atags_sz; 56 int rv; 57 unsigned kernel_actual; 58 unsigned ramdisk_actual; 59 unsigned second_actual; 60 void *kernel_ptr; 61 void *ramdisk_ptr; 62 void *second_ptr; 63 struct boot_img_hdr *hdr; 64 char *ptr = NULL; 65 char *atags_ptr = NULL; 66 char *new_atags = NULL; 67 int data_fd = 0; 68 69 D(DEBUG, "cmd_boot %s\n", arg); 70 71 if (phandle->download_fd < 0) { 72 fastboot_fail(phandle, "no kernel file"); 73 return; 74 } 75 76 atags_ptr = read_atags(ATAGS_LOCATION, &atags_sz); 77 if (atags_ptr == NULL) { 78 fastboot_fail(phandle, "atags read error"); 79 goto error; 80 } 81 82 // TODO: With cms we can also verify partition name included as 83 // cms signed attribute 84 if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { 85 fastboot_fail(phandle, "Access forbiden you need the certificate"); 86 return; 87 } 88 89 sz = get_file_size(data_fd); 90 91 ptr = (char *) mmap(NULL, sz, PROT_READ, 92 MAP_POPULATE | MAP_PRIVATE, data_fd, 0); 93 94 hdr = (struct boot_img_hdr *) ptr; 95 96 if (ptr == MAP_FAILED) { 97 fastboot_fail(phandle, "internal fastbootd error"); 98 goto error; 99 } 100 101 if ((size_t) sz < sizeof(*hdr)) { 102 fastboot_fail(phandle, "invalid bootimage header"); 103 goto error; 104 } 105 106 kernel_actual = ROUND_TO_PAGE(hdr->kernel_size, hdr->page_size); 107 ramdisk_actual = ROUND_TO_PAGE(hdr->ramdisk_size, hdr->page_size); 108 second_actual = ROUND_TO_PAGE(hdr->second_size, hdr->page_size); 109 110 new_atags = (char *) create_atags((unsigned *) atags_ptr, atags_sz, hdr, &new_atags_sz); 111 112 if (new_atags == NULL) { 113 fastboot_fail(phandle, "atags generate error"); 114 goto error; 115 } 116 if (new_atags_sz > 0x4000) { 117 fastboot_fail(phandle, "atags file to large"); 118 goto error; 119 } 120 121 if ((int) (hdr->page_size + kernel_actual + ramdisk_actual) < sz) { 122 fastboot_fail(phandle, "incomplete bootimage"); 123 goto error; 124 } 125 126 kernel_ptr = (void *)((unsigned) ptr + hdr->page_size); 127 ramdisk_ptr = (void *)((unsigned) kernel_ptr + kernel_actual); 128 second_ptr = (void *)((unsigned) ramdisk_ptr + ramdisk_actual); 129 130 D(INFO, "preparing to boot"); 131 // Prepares boot physical addresses from header are ignored 132 rv = prepare_boot_linux(hdr->kernel_addr, kernel_ptr, kernel_actual, 133 hdr->ramdisk_addr, ramdisk_ptr, ramdisk_actual, 134 hdr->second_addr, second_ptr, second_actual, 135 hdr->tags_addr, new_atags, ROUND_TO_PAGE(new_atags_sz, hdr->page_size)); 136 if (rv < 0) { 137 fastboot_fail(phandle, "kexec prepare failed"); 138 goto error; 139 } 140 141 fastboot_okay(phandle, ""); 142 143 free(atags_ptr); 144 munmap(ptr, sz); 145 free(new_atags); 146 close(data_fd); 147 148 D(INFO, "Kexec going to reboot"); 149 reboot(LINUX_REBOOT_CMD_KEXEC); 150 151 fastboot_fail(phandle, "reboot error"); 152 153 return; 154 155error: 156 157 if (atags_ptr != NULL) 158 free(atags_ptr); 159 if (ptr != NULL) 160 munmap(ptr, sz); 161 162} 163 164static void cmd_erase(struct protocol_handle *phandle, const char *arg) 165{ 166 int partition_fd; 167 char path[PATH_MAX]; 168 D(DEBUG, "cmd_erase %s\n", arg); 169 170 if (flash_find_entry(arg, path, PATH_MAX)) { 171 fastboot_fail(phandle, "partition table doesn't exist"); 172 return; 173 } 174 175 if (path == NULL) { 176 fastboot_fail(phandle, "Couldn't find partition"); 177 return; 178 } 179 180 partition_fd = flash_get_partiton(path); 181 if (partition_fd < 0) { 182 fastboot_fail(phandle, "partiton file does not exists"); 183 } 184 185 if (flash_erase(partition_fd)) { 186 fastboot_fail(phandle, "failed to erase partition"); 187 flash_close(partition_fd); 188 return; 189 } 190 191 if (flash_close(partition_fd) < 0) { 192 D(ERR, "could not close device %s", strerror(errno)); 193 fastboot_fail(phandle, "failed to erase partition"); 194 return; 195 } 196 fastboot_okay(phandle, ""); 197} 198 199static int GPT_header_location() { 200 const char *location_str = fastboot_getvar("gpt_sector"); 201 char *str; 202 int location; 203 204 if (!strcmp("", location_str)) { 205 D(INFO, "GPT location not specified using second sector"); 206 return 1; 207 } 208 else { 209 location = strtoul(location_str, &str, 10); 210 D(INFO, "GPT location specified as %d", location); 211 212 if (*str != '\0') 213 return -1; 214 215 return location - 1; 216 } 217} 218 219static void cmd_gpt_layout(struct protocol_handle *phandle, const char *arg) { 220 struct GPT_entry_table *oldtable; 221 int location; 222 struct GPT_content content; 223 const char *device; 224 device = fastboot_getvar("blockdev"); 225 226 if (!strcmp(device, "")) { 227 fastboot_fail(phandle, "blockdev not defined in config file"); 228 return; 229 } 230 231 if (phandle->download_fd < 0) { 232 fastboot_fail(phandle, "no layout file"); 233 return; 234 } 235 236 location = GPT_header_location(); 237 oldtable = GPT_get_device(device, location); 238 239 GPT_default_content(&content, oldtable); 240 if (oldtable == NULL) 241 D(WARN, "Could not get old gpt table"); 242 else 243 GPT_release_device(oldtable); 244 245 if (!GPT_parse_file(phandle->download_fd, &content)) { 246 fastboot_fail(phandle, "Could not parse partition config file"); 247 return; 248 } 249 250 if (trigger_gpt_layout(&content)) { 251 fastboot_fail(phandle, "Vendor forbids this opperation"); 252 GPT_release_content(&content); 253 return; 254 } 255 256 if (!GPT_write_content(device, &content)) { 257 fastboot_fail(phandle, "Unable to write gpt file"); 258 GPT_release_content(&content); 259 return; 260 } 261 262 GPT_release_content(&content); 263 fastboot_okay(phandle, ""); 264} 265 266static void cmd_flash(struct protocol_handle *phandle, const char *arg) 267{ 268 int partition; 269 uint64_t sz; 270 char data[BOOT_MAGIC_SIZE]; 271 char path[PATH_MAX]; 272 ssize_t header_sz = 0; 273 int data_fd = 0; 274 275 D(DEBUG, "cmd_flash %s\n", arg); 276 277 if (try_handle_virtual_partition(phandle, arg)) { 278 return; 279 } 280 281 if (phandle->download_fd < 0) { 282 fastboot_fail(phandle, "no kernel file"); 283 return; 284 } 285 286 if (flash_find_entry(arg, path, PATH_MAX)) { 287 fastboot_fail(phandle, "partition table doesn't exist"); 288 return; 289 } 290 291 if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { 292 fastboot_fail(phandle, "Access forbiden you need certificate"); 293 return; 294 } 295 296 // TODO: Maybe its goot idea to check whether the partition is just bootable partition 297 if (!strcmp(arg, "boot") || !strcmp(arg, "recovery")) { 298 if (read_data_once(data_fd, data, BOOT_MAGIC_SIZE) < BOOT_MAGIC_SIZE) { 299 fastboot_fail(phandle, "incoming data read error, cannot read boot header"); 300 return; 301 } 302 if (memcmp((void *)data, BOOT_MAGIC, BOOT_MAGIC_SIZE)) { 303 fastboot_fail(phandle, "image is not a boot image"); 304 return; 305 } 306 } 307 308 partition = flash_get_partiton(path); 309 310 sz = get_file_size64(data_fd); 311 312 sz -= header_sz; 313 314 if (sz > get_file_size64(partition)) { 315 flash_close(partition); 316 D(WARN, "size of file too large"); 317 fastboot_fail(phandle, "size of file too large"); 318 return; 319 } 320 321 D(INFO, "writing %lld bytes to '%s'\n", sz, arg); 322 323 if (flash_write(partition, phandle->download_fd, sz, header_sz)) { 324 fastboot_fail(phandle, "flash write failure"); 325 return; 326 } 327 D(INFO, "partition '%s' updated\n", arg); 328 329 flash_close(partition); 330 close(data_fd); 331 //TODO: check who is closing phandle->download_fd 332 333 fastboot_okay(phandle, ""); 334} 335 336static void cmd_continue(struct protocol_handle *phandle, const char *arg) 337{ 338 fastboot_okay(phandle, ""); 339#if 0 340 udc_stop(); 341 342 boot_linux_from_flash(); 343#endif 344} 345 346static void cmd_getvar(struct protocol_handle *phandle, const char *arg) 347{ 348 const char *value; 349 D(DEBUG, "cmd_getvar %s\n", arg); 350 351 value = fastboot_getvar(arg); 352 353 fastboot_okay(phandle, value); 354} 355 356static void cmd_download(struct protocol_handle *phandle, const char *arg) 357{ 358 unsigned len = strtoul(arg, NULL, 16); 359 int old_fd; 360 361 if (len > 256 * 1024 * 1024) { 362 fastboot_fail(phandle, "data too large"); 363 return; 364 } 365 366 fastboot_data(phandle, len); 367 368 old_fd = protocol_get_download(phandle); 369 if (old_fd >= 0) { 370 off_t len = lseek(old_fd, 0, SEEK_END); 371 D(INFO, "disposing of unused fd %d, size %ld", old_fd, len); 372 close(old_fd); 373 } 374 375 phandle->download_fd = protocol_handle_download(phandle, len); 376 if (phandle->download_fd < 0) { 377 //handle->state = STATE_ERROR; 378 fastboot_fail(phandle, "download failed"); 379 return; 380 } 381 382 fastboot_okay(phandle, ""); 383} 384 385static void cmd_oem(struct protocol_handle *phandle, const char *arg) { 386 const char *response = ""; 387 388 if (trigger_oem_cmd(arg, &response)) 389 fastboot_fail(phandle, response); 390 else 391 fastboot_okay(phandle, response); 392} 393 394void commands_init() 395{ 396 virtual_partition_register("partition-table", cmd_gpt_layout); 397 398 fastboot_register("boot", cmd_boot); 399 fastboot_register("erase:", cmd_erase); 400 fastboot_register("flash:", cmd_flash); 401 fastboot_register("continue", cmd_continue); 402 fastboot_register("getvar:", cmd_getvar); 403 fastboot_register("download:", cmd_download); 404 fastboot_register("oem", cmd_oem); 405 //fastboot_publish("version", "0.5"); 406 //fastboot_publish("product", "swordfish"); 407 //fastboot_publish("kernel", "lk"); 408} 409