1 /* 2 * Copyright (C) 2016 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #include <arpa/inet.h> 18 #include <sys/socket.h> 19 #include <sys/types.h> 20 #include <sys/un.h> 21 #include <unistd.h> 22 23 #include <algorithm> 24 #include <string> 25 26 #include <android-base/file.h> 27 #include <android-base/logging.h> 28 #include <android-base/properties.h> 29 #include <android-base/test_utils.h> 30 #include <android-base/unique_fd.h> 31 #include <bootloader_message/bootloader_message.h> 32 #include <gtest/gtest.h> 33 34 using namespace std::string_literals; 35 36 static const std::string UNCRYPT_SOCKET = "/dev/socket/uncrypt"; 37 static const std::string INIT_SVC_SETUP_BCB = "init.svc.setup-bcb"; 38 static const std::string INIT_SVC_CLEAR_BCB = "init.svc.clear-bcb"; 39 static const std::string INIT_SVC_UNCRYPT = "init.svc.uncrypt"; 40 static constexpr int SOCKET_CONNECTION_MAX_RETRY = 30; 41 42 static void StopService() { 43 ASSERT_TRUE(android::base::SetProperty("ctl.stop", "setup-bcb")); 44 ASSERT_TRUE(android::base::SetProperty("ctl.stop", "clear-bcb")); 45 ASSERT_TRUE(android::base::SetProperty("ctl.stop", "uncrypt")); 46 47 bool success = false; 48 for (int retry = 0; retry < SOCKET_CONNECTION_MAX_RETRY; retry++) { 49 std::string setup_bcb = android::base::GetProperty(INIT_SVC_SETUP_BCB, ""); 50 std::string clear_bcb = android::base::GetProperty(INIT_SVC_CLEAR_BCB, ""); 51 std::string uncrypt = android::base::GetProperty(INIT_SVC_UNCRYPT, ""); 52 GTEST_LOG_(INFO) << "setup-bcb: [" << setup_bcb << "] clear-bcb: [" << clear_bcb 53 << "] uncrypt: [" << uncrypt << "]"; 54 if (setup_bcb != "running" && clear_bcb != "running" && uncrypt != "running") { 55 success = true; 56 break; 57 } 58 sleep(1); 59 } 60 61 ASSERT_TRUE(success) << "uncrypt service is not available."; 62 } 63 64 class UncryptTest : public ::testing::Test { 65 protected: 66 UncryptTest() : has_misc(true) {} 67 68 void SetUp() override { 69 std::string err; 70 has_misc = !get_bootloader_message_blk_device(&err).empty(); 71 } 72 73 void TearDown() override { 74 // Clear the BCB. 75 if (has_misc) { 76 std::string err; 77 ASSERT_TRUE(clear_bootloader_message(&err)) << "Failed to clear BCB: " << err; 78 } 79 } 80 81 void SetupOrClearBcb(bool isSetup, const std::string& message, 82 const std::string& message_in_bcb) const { 83 // Restart the setup-bcb service. 84 StopService(); 85 ASSERT_TRUE(android::base::SetProperty("ctl.start", isSetup ? "setup-bcb" : "clear-bcb")); 86 87 // Test tends to be flaky if proceeding immediately ("Transport endpoint is not connected"). 88 sleep(1); 89 90 sockaddr_un un = {}; 91 un.sun_family = AF_UNIX; 92 strlcpy(un.sun_path, UNCRYPT_SOCKET.c_str(), sizeof(un.sun_path)); 93 94 int sockfd = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0); 95 ASSERT_NE(-1, sockfd); 96 97 // Connect to the uncrypt socket. 98 bool success = false; 99 for (int retry = 0; retry < SOCKET_CONNECTION_MAX_RETRY; retry++) { 100 if (connect(sockfd, reinterpret_cast<sockaddr*>(&un), sizeof(sockaddr_un)) != 0) { 101 success = true; 102 break; 103 } 104 sleep(1); 105 } 106 ASSERT_TRUE(success); 107 108 if (isSetup) { 109 // Send out the BCB message. 110 int length = static_cast<int>(message.size()); 111 int length_out = htonl(length); 112 ASSERT_TRUE(android::base::WriteFully(sockfd, &length_out, sizeof(int))) 113 << "Failed to write length: " << strerror(errno); 114 ASSERT_TRUE(android::base::WriteFully(sockfd, message.data(), length)) 115 << "Failed to write message: " << strerror(errno); 116 } 117 118 // Check the status code from uncrypt. 119 int status; 120 ASSERT_TRUE(android::base::ReadFully(sockfd, &status, sizeof(int))); 121 ASSERT_EQ(100U, ntohl(status)); 122 123 // Ack having received the status code. 124 int code = 0; 125 ASSERT_TRUE(android::base::WriteFully(sockfd, &code, sizeof(int))); 126 127 ASSERT_EQ(0, close(sockfd)); 128 129 ASSERT_TRUE(android::base::SetProperty("ctl.stop", isSetup ? "setup-bcb" : "clear-bcb")); 130 131 // Verify the message by reading from BCB directly. 132 bootloader_message boot; 133 std::string err; 134 ASSERT_TRUE(read_bootloader_message(&boot, &err)) << "Failed to read BCB: " << err; 135 136 if (isSetup) { 137 ASSERT_EQ("boot-recovery", std::string(boot.command)); 138 ASSERT_EQ(message_in_bcb, std::string(boot.recovery)); 139 140 // The rest of the boot.recovery message should be zero'd out. 141 ASSERT_LE(message_in_bcb.size(), sizeof(boot.recovery)); 142 size_t left = sizeof(boot.recovery) - message_in_bcb.size(); 143 ASSERT_EQ(std::string(left, '\0'), std::string(&boot.recovery[message_in_bcb.size()], left)); 144 145 // Clear the BCB. 146 ASSERT_TRUE(clear_bootloader_message(&err)) << "Failed to clear BCB: " << err; 147 } else { 148 // All the bytes should be cleared. 149 ASSERT_EQ(std::string(sizeof(boot), '\0'), 150 std::string(reinterpret_cast<const char*>(&boot), sizeof(boot))); 151 } 152 } 153 154 void VerifyBootloaderMessage(const std::string& expected) { 155 std::string err; 156 bootloader_message boot; 157 ASSERT_TRUE(read_bootloader_message(&boot, &err)) << "Failed to read BCB: " << err; 158 159 // Check that we have all the expected bytes. 160 ASSERT_EQ(expected, std::string(reinterpret_cast<const char*>(&boot), sizeof(boot))); 161 } 162 163 bool has_misc; 164 }; 165 166 TEST_F(UncryptTest, setup_bcb) { 167 if (!has_misc) { 168 GTEST_LOG_(INFO) << "Test skipped due to no /misc partition found on the device."; 169 return; 170 } 171 172 std::string random_data; 173 random_data.reserve(sizeof(bootloader_message)); 174 generate_n(back_inserter(random_data), sizeof(bootloader_message), []() { return rand() % 128; }); 175 176 bootloader_message boot; 177 memcpy(&boot, random_data.c_str(), random_data.size()); 178 179 std::string err; 180 ASSERT_TRUE(write_bootloader_message(boot, &err)) << "Failed to write BCB: " << err; 181 VerifyBootloaderMessage(random_data); 182 183 ASSERT_TRUE(clear_bootloader_message(&err)) << "Failed to clear BCB: " << err; 184 VerifyBootloaderMessage(std::string(sizeof(bootloader_message), '\0')); 185 186 std::string message = "--update_message=abc value"; 187 std::string message_in_bcb = "recovery\n--update_message=abc value\n"; 188 SetupOrClearBcb(true, message, message_in_bcb); 189 190 SetupOrClearBcb(false, "", ""); 191 192 TemporaryFile wipe_package; 193 ASSERT_TRUE(android::base::WriteStringToFile(std::string(345, 'a'), wipe_package.path)); 194 195 // It's expected to store a wipe package in /misc, with the package size passed to recovery. 196 message = "--wipe_ab\n--wipe_package="s + wipe_package.path + "\n--reason=wipePackage"s; 197 message_in_bcb = "recovery\n--wipe_ab\n--wipe_package_size=345\n--reason=wipePackage\n"; 198 SetupOrClearBcb(true, message, message_in_bcb); 199 } 200