/* * Copyright (c) 2009-2013, Google Inc. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * Neither the name of Google, Inc. nor the names of its contributors * may be used to endorse or promote products derived from this * software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include #include #include #include #include #include #include #include #include "bootimg.h" #include "commands/boot.h" #include "commands/flash.h" #include "commands/partitions.h" #include "commands/virtual_partitions.h" #include "debug.h" #include "protocol.h" #include "trigger.h" #include "utils.h" #define ATAGS_LOCATION "/proc/atags" static void cmd_boot(struct protocol_handle *phandle, const char *arg) { int sz, atags_sz, new_atags_sz; int rv; unsigned kernel_actual; unsigned ramdisk_actual; unsigned second_actual; void *kernel_ptr; void *ramdisk_ptr; void *second_ptr; struct boot_img_hdr *hdr; char *ptr = NULL; char *atags_ptr = NULL; char *new_atags = NULL; int data_fd = 0; D(DEBUG, "cmd_boot %s\n", arg); if (phandle->download_fd < 0) { fastboot_fail(phandle, "no kernel file"); return; } atags_ptr = read_atags(ATAGS_LOCATION, &atags_sz); if (atags_ptr == NULL) { fastboot_fail(phandle, "atags read error"); goto error; } // TODO: With cms we can also verify partition name included as // cms signed attribute if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { fastboot_fail(phandle, "Access forbiden you need the certificate"); return; } sz = get_file_size(data_fd); ptr = (char *) mmap(NULL, sz, PROT_READ, MAP_POPULATE | MAP_PRIVATE, data_fd, 0); hdr = (struct boot_img_hdr *) ptr; if (ptr == MAP_FAILED) { fastboot_fail(phandle, "internal fastbootd error"); goto error; } if ((size_t) sz < sizeof(*hdr)) { fastboot_fail(phandle, "invalid bootimage header"); goto error; } kernel_actual = ROUND_TO_PAGE(hdr->kernel_size, hdr->page_size); ramdisk_actual = ROUND_TO_PAGE(hdr->ramdisk_size, hdr->page_size); second_actual = ROUND_TO_PAGE(hdr->second_size, hdr->page_size); new_atags = (char *) create_atags((unsigned *) atags_ptr, atags_sz, hdr, &new_atags_sz); if (new_atags == NULL) { fastboot_fail(phandle, "atags generate error"); goto error; } if (new_atags_sz > 0x4000) { fastboot_fail(phandle, "atags file to large"); goto error; } if ((int) (hdr->page_size + kernel_actual + ramdisk_actual) < sz) { fastboot_fail(phandle, "incomplete bootimage"); goto error; } kernel_ptr = (void *)((unsigned) ptr + hdr->page_size); ramdisk_ptr = (void *)((unsigned) kernel_ptr + kernel_actual); second_ptr = (void *)((unsigned) ramdisk_ptr + ramdisk_actual); D(INFO, "preparing to boot"); // Prepares boot physical address. Addresses from header are ignored rv = prepare_boot_linux(hdr->kernel_addr, kernel_ptr, kernel_actual, hdr->ramdisk_addr, ramdisk_ptr, ramdisk_actual, hdr->second_addr, second_ptr, second_actual, hdr->tags_addr, new_atags, ROUND_TO_PAGE(new_atags_sz, hdr->page_size)); if (rv < 0) { fastboot_fail(phandle, "kexec prepare failed"); goto error; } fastboot_okay(phandle, ""); free(atags_ptr); munmap(ptr, sz); free(new_atags); close(data_fd); D(INFO, "Kexec going to reboot"); reboot(LINUX_REBOOT_CMD_KEXEC); fastboot_fail(phandle, "reboot error"); return; error: if (atags_ptr != NULL) free(atags_ptr); if (ptr != NULL) munmap(ptr, sz); } static void cmd_erase(struct protocol_handle *phandle, const char *arg) { int partition_fd; char path[PATH_MAX]; D(DEBUG, "cmd_erase %s\n", arg); if (flash_find_entry(arg, path, PATH_MAX)) { fastboot_fail(phandle, "partition table doesn't exist"); return; } if (path == NULL) { fastboot_fail(phandle, "Couldn't find partition"); return; } partition_fd = flash_get_partiton(path); if (partition_fd < 0) { fastboot_fail(phandle, "partiton file does not exists"); } if (flash_erase(partition_fd)) { fastboot_fail(phandle, "failed to erase partition"); flash_close(partition_fd); return; } if (flash_close(partition_fd) < 0) { D(ERR, "could not close device %s", strerror(errno)); fastboot_fail(phandle, "failed to erase partition"); return; } fastboot_okay(phandle, ""); } static int GPT_header_location() { const char *location_str = fastboot_getvar("gpt_sector"); char *str; int location; if (!strcmp("", location_str)) { D(INFO, "GPT location not specified using second sector"); return 1; } else { location = strtoul(location_str, &str, 10); D(INFO, "GPT location specified as %d", location); if (*str != '\0') return -1; return location - 1; } } static void cmd_gpt_layout(struct protocol_handle *phandle, const char *arg) { struct GPT_entry_table *oldtable; int location; struct GPT_content content; const char *device; device = fastboot_getvar("blockdev"); if (!strcmp(device, "")) { fastboot_fail(phandle, "blockdev not defined in config file"); return; } //TODO: add same verification as in cmd_flash if (phandle->download_fd < 0) { fastboot_fail(phandle, "no layout file"); return; } location = GPT_header_location(); oldtable = GPT_get_device(device, location); GPT_default_content(&content, oldtable); if (oldtable == NULL) D(WARN, "Could not get old gpt table"); else GPT_release_device(oldtable); if (!GPT_parse_file(phandle->download_fd, &content)) { fastboot_fail(phandle, "Could not parse partition config file"); return; } if (trigger_gpt_layout(&content)) { fastboot_fail(phandle, "Vendor forbids this opperation"); GPT_release_content(&content); return; } if (!GPT_write_content(device, &content)) { fastboot_fail(phandle, "Unable to write gpt file"); GPT_release_content(&content); return; } GPT_release_content(&content); fastboot_okay(phandle, ""); } static void cmd_flash(struct protocol_handle *phandle, const char *arg) { int partition; uint64_t sz; char data[BOOT_MAGIC_SIZE]; char path[PATH_MAX]; ssize_t header_sz = 0; int data_fd = 0; D(DEBUG, "cmd_flash %s\n", arg); if (try_handle_virtual_partition(phandle, arg)) { return; } if (phandle->download_fd < 0) { fastboot_fail(phandle, "no kernel file"); return; } if (flash_find_entry(arg, path, PATH_MAX)) { fastboot_fail(phandle, "partition table doesn't exist"); return; } if (flash_validate_certificate(phandle->download_fd, &data_fd) != 1) { fastboot_fail(phandle, "Access forbiden you need certificate"); return; } // TODO: Maybe its goot idea to check whether the partition is bootable if (!strcmp(arg, "boot") || !strcmp(arg, "recovery")) { if (read_data_once(data_fd, data, BOOT_MAGIC_SIZE) < BOOT_MAGIC_SIZE) { fastboot_fail(phandle, "incoming data read error, cannot read boot header"); return; } if (memcmp((void *)data, BOOT_MAGIC, BOOT_MAGIC_SIZE)) { fastboot_fail(phandle, "image is not a boot image"); return; } } partition = flash_get_partiton(path); sz = get_file_size64(data_fd); sz -= header_sz; if (sz > get_file_size64(partition)) { flash_close(partition); D(WARN, "size of file too large"); fastboot_fail(phandle, "size of file too large"); return; } D(INFO, "writing %lld bytes to '%s'\n", sz, arg); if (flash_write(partition, phandle->download_fd, sz, header_sz)) { fastboot_fail(phandle, "flash write failure"); return; } D(INFO, "partition '%s' updated\n", arg); flash_close(partition); close(data_fd); fastboot_okay(phandle, ""); } static void cmd_continue(struct protocol_handle *phandle, const char *arg) { fastboot_okay(phandle, ""); #if 0 udc_stop(); boot_linux_from_flash(); #endif } static void cmd_getvar(struct protocol_handle *phandle, const char *arg) { const char *value; D(DEBUG, "cmd_getvar %s\n", arg); value = fastboot_getvar(arg); fastboot_okay(phandle, value); } static void cmd_download(struct protocol_handle *phandle, const char *arg) { unsigned len = strtoul(arg, NULL, 16); int old_fd; if (len > 256 * 1024 * 1024) { fastboot_fail(phandle, "data too large"); return; } fastboot_data(phandle, len); old_fd = protocol_get_download(phandle); if (old_fd >= 0) { off_t len = lseek(old_fd, 0, SEEK_END); D(INFO, "disposing of unused fd %d, size %ld", old_fd, len); close(old_fd); } phandle->download_fd = protocol_handle_download(phandle, len); if (phandle->download_fd < 0) { fastboot_fail(phandle, "download failed"); return; } fastboot_okay(phandle, ""); } static void cmd_oem(struct protocol_handle *phandle, const char *arg) { const char *response = ""; //TODO: Maybe it should get download descriptor also if (trigger_oem_cmd(arg, &response)) fastboot_fail(phandle, response); else fastboot_okay(phandle, response); } void commands_init() { virtual_partition_register("partition-table", cmd_gpt_layout); fastboot_register("boot", cmd_boot); fastboot_register("erase:", cmd_erase); fastboot_register("flash:", cmd_flash); fastboot_register("continue", cmd_continue); fastboot_register("getvar:", cmd_getvar); fastboot_register("download:", cmd_download); fastboot_register("oem", cmd_oem); //fastboot_publish("version", "0.5"); //fastboot_publish("product", "swordfish"); //fastboot_publish("kernel", "lk"); }