Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2018 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 17 | #include "apex_file.h" |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 18 | |
| 19 | #include <fcntl.h> |
| 20 | #include <sys/stat.h> |
| 21 | #include <sys/types.h> |
| 22 | #include <unistd.h> |
| 23 | |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 24 | #include <filesystem> |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 25 | #include <fstream> |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 26 | |
Jiyong Park | d02c88c | 2018-11-13 19:23:32 +0900 | [diff] [blame] | 27 | #include <android-base/file.h> |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 28 | #include <android-base/logging.h> |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 29 | #include <android-base/scopeguard.h> |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 30 | #include <android-base/strings.h> |
| 31 | #include <android-base/unique_fd.h> |
Martijn Coenen | 329f112 | 2019-02-28 16:10:08 +0100 | [diff] [blame] | 32 | #include <google/protobuf/util/message_differencer.h> |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 33 | #include <libavb/libavb.h> |
| 34 | |
Nikita Ioffe | 264c421 | 2019-09-13 16:30:17 +0100 | [diff] [blame] | 35 | #include "apex_constants.h" |
Dario Freni | 9d57624 | 2019-10-13 10:09:32 +0100 | [diff] [blame] | 36 | #include "apex_preinstalled_data.h" |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 37 | #include "apexd_utils.h" |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 38 | #include "string_log.h" |
| 39 | |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 40 | using android::base::EndsWith; |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 41 | using android::base::Error; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 42 | using android::base::ReadFullyAtOffset; |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 43 | using android::base::Result; |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 44 | using android::base::StartsWith; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 45 | using android::base::unique_fd; |
Martijn Coenen | 329f112 | 2019-02-28 16:10:08 +0100 | [diff] [blame] | 46 | using google::protobuf::util::MessageDifferencer; |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 47 | |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 48 | namespace android { |
| 49 | namespace apex { |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 50 | namespace { |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 51 | |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 52 | constexpr const char* kImageFilename = "apex_payload.img"; |
Jiyong Park | 9181a2d | 2018-12-27 15:14:45 +0900 | [diff] [blame] | 53 | constexpr const char* kBundledPublicKeyFilename = "apex_pubkey"; |
Andreas Gampe | 2efadc0 | 2018-11-19 16:39:45 -0800 | [diff] [blame] | 54 | |
Jooyung Han | 7dca50c | 2019-04-12 04:52:42 +0900 | [diff] [blame] | 55 | } // namespace |
| 56 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 57 | Result<ApexFile> ApexFile::Open(const std::string& path) { |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 58 | int32_t image_offset; |
| 59 | size_t image_size; |
| 60 | std::string manifest_content; |
Jiyong Park | 9181a2d | 2018-12-27 15:14:45 +0900 | [diff] [blame] | 61 | std::string pubkey; |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 62 | |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 63 | ZipArchiveHandle handle; |
| 64 | auto handle_guard = |
| 65 | android::base::make_scope_guard([&handle] { CloseArchive(handle); }); |
| 66 | int ret = OpenArchive(path.c_str(), &handle); |
| 67 | if (ret < 0) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 68 | return Error() << "Failed to open package " << path << ": " |
| 69 | << ErrorCodeString(ret); |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 70 | } |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 71 | |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 72 | // Locate the mountable image within the zipfile and store offset and size. |
| 73 | ZipEntry entry; |
| 74 | ret = FindEntry(handle, kImageFilename, &entry); |
| 75 | if (ret < 0) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 76 | return Error() << "Could not find entry \"" << kImageFilename |
| 77 | << "\" in package " << path << ": " << ErrorCodeString(ret); |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 78 | } |
| 79 | image_offset = entry.offset; |
| 80 | image_size = entry.uncompressed_length; |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 81 | |
Dario Freni | a277bdf | 2019-11-05 22:37:49 +0000 | [diff] [blame] | 82 | ret = FindEntry(handle, kManifestFilenamePb, &entry); |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 83 | if (ret < 0) { |
Jooyung Han | 499de89 | 2020-05-12 12:01:05 +0900 | [diff] [blame] | 84 | return Error() << "Could not find entry \"" << kManifestFilenamePb |
| 85 | << "\" in package " << path << ": " << ErrorCodeString(ret); |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 86 | } |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 87 | |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 88 | uint32_t length = entry.uncompressed_length; |
| 89 | manifest_content.resize(length, '\0'); |
| 90 | ret = ExtractToMemory(handle, &entry, |
| 91 | reinterpret_cast<uint8_t*>(&(manifest_content)[0]), |
| 92 | length); |
| 93 | if (ret != 0) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 94 | return Error() << "Failed to extract manifest from package " << path << ": " |
| 95 | << ErrorCodeString(ret); |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 96 | } |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 97 | |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 98 | ret = FindEntry(handle, kBundledPublicKeyFilename, &entry); |
| 99 | if (ret >= 0) { |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 100 | length = entry.uncompressed_length; |
| 101 | pubkey.resize(length, '\0'); |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 102 | ret = ExtractToMemory(handle, &entry, |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 103 | reinterpret_cast<uint8_t*>(&(pubkey)[0]), length); |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 104 | if (ret != 0) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 105 | return Error() << "Failed to extract public key from package " << path |
| 106 | << ": " << ErrorCodeString(ret); |
Jiyong Park | 69c0f11 | 2018-11-22 20:38:05 +0900 | [diff] [blame] | 107 | } |
Jiyong Park | d02c88c | 2018-11-13 19:23:32 +0900 | [diff] [blame] | 108 | } |
| 109 | |
Jooyung Han | 499de89 | 2020-05-12 12:01:05 +0900 | [diff] [blame] | 110 | Result<ApexManifest> manifest = ParseManifest(manifest_content); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 111 | if (!manifest.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 112 | return manifest.error(); |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 113 | } |
| 114 | |
Jooyung Han | 499de89 | 2020-05-12 12:01:05 +0900 | [diff] [blame] | 115 | return ApexFile(path, image_offset, image_size, std::move(*manifest), pubkey, |
| 116 | isPathForBuiltinApexes(path)); |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 117 | } |
| 118 | |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 119 | // AVB-related code. |
| 120 | |
| 121 | namespace { |
| 122 | |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 123 | static constexpr int kVbMetaMaxSize = 64 * 1024; |
| 124 | |
| 125 | std::string bytes_to_hex(const uint8_t* bytes, size_t bytes_len) { |
| 126 | std::ostringstream s; |
| 127 | |
| 128 | s << std::hex << std::setfill('0'); |
| 129 | for (size_t i = 0; i < bytes_len; i++) { |
| 130 | s << std::setw(2) << static_cast<int>(bytes[i]); |
| 131 | } |
| 132 | return s.str(); |
| 133 | } |
| 134 | |
| 135 | std::string getSalt(const AvbHashtreeDescriptor& desc, |
| 136 | const uint8_t* trailingData) { |
| 137 | const uint8_t* desc_salt = trailingData + desc.partition_name_len; |
| 138 | |
| 139 | return bytes_to_hex(desc_salt, desc.salt_len); |
| 140 | } |
| 141 | |
| 142 | std::string getDigest(const AvbHashtreeDescriptor& desc, |
| 143 | const uint8_t* trailingData) { |
| 144 | const uint8_t* desc_digest = |
| 145 | trailingData + desc.partition_name_len + desc.salt_len; |
| 146 | |
| 147 | return bytes_to_hex(desc_digest, desc.root_digest_len); |
| 148 | } |
| 149 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 150 | Result<std::unique_ptr<AvbFooter>> getAvbFooter(const ApexFile& apex, |
| 151 | const unique_fd& fd) { |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 152 | std::array<uint8_t, AVB_FOOTER_SIZE> footer_data; |
| 153 | auto footer = std::make_unique<AvbFooter>(); |
| 154 | |
| 155 | // The AVB footer is located in the last part of the image |
| 156 | off_t offset = apex.GetImageSize() + apex.GetImageOffset() - AVB_FOOTER_SIZE; |
| 157 | int ret = lseek(fd, offset, SEEK_SET); |
| 158 | if (ret == -1) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 159 | return ErrnoError() << "Couldn't seek to AVB footer"; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 160 | } |
| 161 | |
| 162 | ret = read(fd, footer_data.data(), AVB_FOOTER_SIZE); |
| 163 | if (ret != AVB_FOOTER_SIZE) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 164 | return ErrnoError() << "Couldn't read AVB footer"; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 165 | } |
| 166 | |
| 167 | if (!avb_footer_validate_and_byteswap((const AvbFooter*)footer_data.data(), |
| 168 | footer.get())) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 169 | return Error() << "AVB footer verification failed."; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 170 | } |
| 171 | |
| 172 | LOG(VERBOSE) << "AVB footer verification successful."; |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 173 | return footer; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 174 | } |
| 175 | |
Nikita Ioffe | a78f8ef | 2019-11-08 13:36:38 +0000 | [diff] [blame] | 176 | bool CompareKeys(const uint8_t* key, size_t length, |
| 177 | const std::string& public_key_content) { |
| 178 | return public_key_content.length() == length && |
| 179 | memcmp(&public_key_content[0], key, length) == 0; |
Jiyong Park | 9181a2d | 2018-12-27 15:14:45 +0900 | [diff] [blame] | 180 | } |
| 181 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 182 | Result<void> verifyVbMetaSignature(const ApexFile& apex, const uint8_t* data, |
| 183 | size_t length) { |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 184 | const uint8_t* pk; |
| 185 | size_t pk_len; |
| 186 | AvbVBMetaVerifyResult res; |
| 187 | |
| 188 | res = avb_vbmeta_image_verify(data, length, &pk, &pk_len); |
| 189 | switch (res) { |
| 190 | case AVB_VBMETA_VERIFY_RESULT_OK: |
| 191 | break; |
| 192 | case AVB_VBMETA_VERIFY_RESULT_OK_NOT_SIGNED: |
| 193 | case AVB_VBMETA_VERIFY_RESULT_HASH_MISMATCH: |
| 194 | case AVB_VBMETA_VERIFY_RESULT_SIGNATURE_MISMATCH: |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 195 | return Error() << "Error verifying " << apex.GetPath() << ": " |
| 196 | << avb_vbmeta_verify_result_to_string(res); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 197 | case AVB_VBMETA_VERIFY_RESULT_INVALID_VBMETA_HEADER: |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 198 | return Error() << "Error verifying " << apex.GetPath() << ": " |
| 199 | << "invalid vbmeta header"; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 200 | case AVB_VBMETA_VERIFY_RESULT_UNSUPPORTED_VERSION: |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 201 | return Error() << "Error verifying " << apex.GetPath() << ": " |
| 202 | << "unsupported version"; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 203 | default: |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 204 | return Errorf("Unknown vmbeta_image_verify return value"); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 205 | } |
| 206 | |
Nikita Ioffe | af157ab | 2020-04-15 22:14:11 +0100 | [diff] [blame] | 207 | Result<const std::string> public_key = getApexKey(apex.GetManifest().name()); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 208 | if (public_key.ok()) { |
Jiyong Park | 9181a2d | 2018-12-27 15:14:45 +0900 | [diff] [blame] | 209 | // TODO(b/115718846) |
| 210 | // We need to decide whether we need rollback protection, and whether |
| 211 | // we can use the rollback protection provided by libavb. |
Nikita Ioffe | a78f8ef | 2019-11-08 13:36:38 +0000 | [diff] [blame] | 212 | if (!CompareKeys(pk, pk_len, *public_key)) { |
| 213 | return Error() << "Error verifying " << apex.GetPath() << ": " |
| 214 | << "public key doesn't match the pre-installed one"; |
| 215 | } |
Jiyong Park | 9181a2d | 2018-12-27 15:14:45 +0900 | [diff] [blame] | 216 | } else { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 217 | return public_key.error(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 218 | } |
Nikita Ioffe | a78f8ef | 2019-11-08 13:36:38 +0000 | [diff] [blame] | 219 | LOG(VERBOSE) << apex.GetPath() << ": public key matches."; |
| 220 | return {}; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 221 | } |
| 222 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 223 | Result<std::unique_ptr<uint8_t[]>> verifyVbMeta(const ApexFile& apex, |
| 224 | const unique_fd& fd, |
| 225 | const AvbFooter& footer) { |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 226 | if (footer.vbmeta_size > kVbMetaMaxSize) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 227 | return Errorf("VbMeta size in footer exceeds kVbMetaMaxSize."); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 228 | } |
| 229 | |
| 230 | off_t offset = apex.GetImageOffset() + footer.vbmeta_offset; |
| 231 | std::unique_ptr<uint8_t[]> vbmeta_buf(new uint8_t[footer.vbmeta_size]); |
| 232 | |
| 233 | if (!ReadFullyAtOffset(fd, vbmeta_buf.get(), footer.vbmeta_size, offset)) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 234 | return ErrnoError() << "Couldn't read AVB meta-data"; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 235 | } |
| 236 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 237 | Result<void> st = |
| 238 | verifyVbMetaSignature(apex, vbmeta_buf.get(), footer.vbmeta_size); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 239 | if (!st.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 240 | return st.error(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 241 | } |
| 242 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 243 | return vbmeta_buf; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 244 | } |
| 245 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 246 | Result<const AvbHashtreeDescriptor*> findDescriptor(uint8_t* vbmeta_data, |
| 247 | size_t vbmeta_size) { |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 248 | const AvbDescriptor** descriptors; |
| 249 | size_t num_descriptors; |
| 250 | |
| 251 | descriptors = |
| 252 | avb_descriptor_get_all(vbmeta_data, vbmeta_size, &num_descriptors); |
| 253 | |
Jooyung Han | df858e8 | 2019-04-01 18:06:39 +0900 | [diff] [blame] | 254 | // avb_descriptor_get_all() returns an internally allocated array |
| 255 | // of pointers and it needs to be avb_free()ed after using it. |
| 256 | auto guard = android::base::ScopeGuard(std::bind(avb_free, descriptors)); |
| 257 | |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 258 | for (size_t i = 0; i < num_descriptors; i++) { |
| 259 | AvbDescriptor desc; |
| 260 | if (!avb_descriptor_validate_and_byteswap(descriptors[i], &desc)) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 261 | return Errorf("Couldn't validate AvbDescriptor."); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 262 | } |
| 263 | |
| 264 | if (desc.tag != AVB_DESCRIPTOR_TAG_HASHTREE) { |
| 265 | // Ignore other descriptors |
| 266 | continue; |
| 267 | } |
| 268 | |
Nikita Ioffe | d71ce1d | 2020-04-30 01:19:41 +0100 | [diff] [blame] | 269 | // Check that hashtree descriptor actually fits into memory. |
| 270 | const uint8_t* vbmeta_end = vbmeta_data + vbmeta_size; |
| 271 | if ((uint8_t*)descriptors[i] + sizeof(AvbHashtreeDescriptor) > vbmeta_end) { |
| 272 | return Errorf("Invalid length for AvbHashtreeDescriptor"); |
| 273 | } |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 274 | return (const AvbHashtreeDescriptor*)descriptors[i]; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 275 | } |
| 276 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 277 | return Errorf("Couldn't find any AVB hashtree descriptors."); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 278 | } |
| 279 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 280 | Result<std::unique_ptr<AvbHashtreeDescriptor>> verifyDescriptor( |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 281 | const AvbHashtreeDescriptor* desc) { |
| 282 | auto verifiedDesc = std::make_unique<AvbHashtreeDescriptor>(); |
| 283 | |
| 284 | if (!avb_hashtree_descriptor_validate_and_byteswap(desc, |
| 285 | verifiedDesc.get())) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 286 | return Errorf("Couldn't validate AvbDescriptor."); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 287 | } |
| 288 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 289 | return verifiedDesc; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 290 | } |
| 291 | |
| 292 | } // namespace |
| 293 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 294 | Result<ApexVerityData> ApexFile::VerifyApexVerity() const { |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 295 | ApexVerityData verityData; |
| 296 | |
| 297 | unique_fd fd(open(GetPath().c_str(), O_RDONLY | O_CLOEXEC)); |
| 298 | if (fd.get() == -1) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 299 | return ErrnoError() << "Failed to open " << GetPath(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 300 | } |
| 301 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 302 | Result<std::unique_ptr<AvbFooter>> footer = getAvbFooter(*this, fd); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 303 | if (!footer.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 304 | return footer.error(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 305 | } |
| 306 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 307 | Result<std::unique_ptr<uint8_t[]>> vbmeta_data = |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 308 | verifyVbMeta(*this, fd, **footer); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 309 | if (!vbmeta_data.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 310 | return vbmeta_data.error(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 311 | } |
| 312 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 313 | Result<const AvbHashtreeDescriptor*> descriptor = |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 314 | findDescriptor(vbmeta_data->get(), (*footer)->vbmeta_size); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 315 | if (!descriptor.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 316 | return descriptor.error(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 317 | } |
| 318 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 319 | Result<std::unique_ptr<AvbHashtreeDescriptor>> verifiedDescriptor = |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 320 | verifyDescriptor(*descriptor); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 321 | if (!verifiedDescriptor.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 322 | return verifiedDescriptor.error(); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 323 | } |
| 324 | verityData.desc = std::move(*verifiedDescriptor); |
| 325 | |
| 326 | // This area is now safe to access, because we just verified it |
| 327 | const uint8_t* trailingData = |
| 328 | (const uint8_t*)*descriptor + sizeof(AvbHashtreeDescriptor); |
Jooyung Han | f7c8d03 | 2019-04-11 15:12:09 +0900 | [diff] [blame] | 329 | verityData.hash_algorithm = |
| 330 | reinterpret_cast<const char*>((*descriptor)->hash_algorithm); |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 331 | verityData.salt = getSalt(*verityData.desc, trailingData); |
| 332 | verityData.root_digest = getDigest(*verityData.desc, trailingData); |
| 333 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 334 | return verityData; |
Andreas Gampe | 356e40c | 2018-12-26 10:59:57 -0800 | [diff] [blame] | 335 | } |
| 336 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 337 | Result<void> ApexFile::VerifyManifestMatches( |
| 338 | const std::string& mount_path) const { |
Dario Freni | a277bdf | 2019-11-05 22:37:49 +0000 | [diff] [blame] | 339 | Result<ApexManifest> verifiedManifest = |
| 340 | ReadManifest(mount_path + "/" + kManifestFilenamePb); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 341 | if (!verifiedManifest.ok()) { |
Jooyung Han | 499de89 | 2020-05-12 12:01:05 +0900 | [diff] [blame] | 342 | return verifiedManifest.error(); |
Martijn Coenen | 329f112 | 2019-02-28 16:10:08 +0100 | [diff] [blame] | 343 | } |
| 344 | |
| 345 | if (!MessageDifferencer::Equals(manifest_, *verifiedManifest)) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 346 | return Errorf( |
Martijn Coenen | 329f112 | 2019-02-28 16:10:08 +0100 | [diff] [blame] | 347 | "Manifest inside filesystem does not match manifest outside it"); |
| 348 | } |
| 349 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 350 | return {}; |
Martijn Coenen | 329f112 | 2019-02-28 16:10:08 +0100 | [diff] [blame] | 351 | } |
| 352 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 353 | Result<std::vector<std::string>> FindApexes( |
Jooyung Han | 65a2508 | 2019-04-05 15:34:13 +0900 | [diff] [blame] | 354 | const std::vector<std::string>& paths) { |
Jooyung Han | 65a2508 | 2019-04-05 15:34:13 +0900 | [diff] [blame] | 355 | std::vector<std::string> result; |
| 356 | for (const auto& path : paths) { |
| 357 | auto exist = PathExists(path); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 358 | if (!exist.ok()) { |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 359 | return exist.error(); |
Jooyung Han | 65a2508 | 2019-04-05 15:34:13 +0900 | [diff] [blame] | 360 | } |
| 361 | if (!*exist) continue; |
| 362 | |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 363 | const auto& apexes = FindApexFilesByName(path); |
Bernie Innocenti | d04d5d0 | 2020-02-06 22:01:51 +0900 | [diff] [blame] | 364 | if (!apexes.ok()) { |
Jooyung Han | 65a2508 | 2019-04-05 15:34:13 +0900 | [diff] [blame] | 365 | return apexes; |
| 366 | } |
| 367 | |
| 368 | result.insert(result.end(), apexes->begin(), apexes->end()); |
| 369 | } |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 370 | return result; |
Jooyung Han | 65a2508 | 2019-04-05 15:34:13 +0900 | [diff] [blame] | 371 | } |
| 372 | |
Mohammad Samiul Islam | bd6ab0f | 2019-06-20 15:55:27 +0100 | [diff] [blame] | 373 | Result<std::vector<std::string>> FindApexFilesByName(const std::string& path) { |
Jiyong Park | 8f55a21 | 2019-06-03 20:48:15 +0900 | [diff] [blame] | 374 | auto filter_fn = [](const std::filesystem::directory_entry& entry) { |
| 375 | std::error_code ec; |
| 376 | if (entry.is_regular_file(ec) && |
| 377 | EndsWith(entry.path().filename().string(), kApexPackageSuffix)) { |
| 378 | return true; // APEX file, take. |
| 379 | } |
| 380 | return false; |
| 381 | }; |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 382 | return ReadDir(path, filter_fn); |
| 383 | } |
| 384 | |
| 385 | bool isPathForBuiltinApexes(const std::string& path) { |
Jiyong Park | 67d661f | 2019-04-15 15:43:01 +0900 | [diff] [blame] | 386 | for (const auto& dir : kApexPackageBuiltinDirs) { |
| 387 | if (StartsWith(path, dir)) { |
| 388 | return true; |
| 389 | } |
| 390 | } |
| 391 | return false; |
Jiyong Park | 5e81023 | 2019-04-01 15:24:26 +0900 | [diff] [blame] | 392 | } |
| 393 | |
Dario Freni | 5a25929 | 2018-08-14 17:49:00 +0100 | [diff] [blame] | 394 | } // namespace apex |
| 395 | } // namespace android |