/* * Copyright (C) 2020 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define LOG_TAG "TrustyAppLoader" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "apploader_ipc.h" using android::base::unique_fd; using std::string; constexpr const char kTrustyDefaultDeviceName[] = "/dev/trusty-ipc-dev0"; static const char* dev_name = kTrustyDefaultDeviceName; static const char* _sopts = "hD:"; static const struct option _lopts[] = { {"help", no_argument, 0, 'h'}, {"dev", required_argument, 0, 'D'}, {0, 0, 0, 0}, }; static const char* usage = "Usage: %s [options] package-file\n" "\n" "options:\n" " -h, --help prints this message and exit\n" " -D, --dev name Trusty device name\n" "\n"; static void print_usage_and_exit(const char* prog, int code) { fprintf(stderr, usage, prog); exit(code); } static void parse_options(int argc, char** argv) { int c; int oidx = 0; while (1) { c = getopt_long(argc, argv, _sopts, _lopts, &oidx); if (c == -1) { break; /* done */ } switch (c) { case 'h': print_usage_and_exit(argv[0], EXIT_SUCCESS); break; case 'D': dev_name = strdup(optarg); break; default: print_usage_and_exit(argv[0], EXIT_FAILURE); } } } static unique_fd read_file(const char* file_name, off64_t* out_file_size) { int rc; long page_size = sysconf(_SC_PAGESIZE); off64_t file_size, file_page_offset, file_page_size; struct stat64 st; unique_fd file_fd(TEMP_FAILURE_RETRY(open(file_name, O_RDONLY))); if (!file_fd.ok()) { PLOG(ERROR) << "Error opening file " << file_name; return {}; } rc = fstat64(file_fd, &st); if (rc < 0) { PLOG(ERROR) << "Error calling stat on file '" << file_name << "'"; return {}; } if (st.st_size == 0) { LOG(ERROR) << "Zero length file '" << file_name << "'"; return {}; } file_size = st.st_size; /* The dmabuf size needs to be a multiple of the page size */ file_page_offset = file_size & (page_size - 1); if (file_page_offset) { file_page_offset = page_size - file_page_offset; } if (__builtin_add_overflow(file_size, file_page_offset, &file_page_size)) { LOG(ERROR) << "Failed to page-align file size"; return {}; } BufferAllocator alloc; unique_fd dmabuf_fd(alloc.Alloc(kDmabufSystemHeapName, file_page_size)); if (!dmabuf_fd.ok()) { LOG(ERROR) << "Error creating dmabuf for " << file_page_size << " bytes: " << dmabuf_fd.get(); return dmabuf_fd; } void* shm = mmap(0, file_page_size, PROT_READ | PROT_WRITE, MAP_SHARED, dmabuf_fd, 0); if (shm == MAP_FAILED) { return {}; } off64_t file_offset = 0; while (file_offset < file_size) { ssize_t num_read = TEMP_FAILURE_RETRY( pread(file_fd, (char*)shm + file_offset, file_size - file_offset, file_offset)); if (num_read < 0) { PLOG(ERROR) << "Error reading package file '" << file_name << "'"; break; } if (num_read == 0) { LOG(ERROR) << "Unexpected end of file '" << file_name << "'"; break; } file_offset += (off64_t)num_read; } munmap(shm, file_page_size); if (file_offset < file_size) { return {}; } assert(file_offset == file_size); if (out_file_size) { *out_file_size = file_size; } return dmabuf_fd; } static ssize_t send_load_message(int tipc_fd, int package_fd, off64_t package_size) { struct apploader_header hdr = { .cmd = APPLOADER_CMD_LOAD_APPLICATION, }; struct apploader_load_app_req req = { .package_size = static_cast(package_size), }; struct iovec tx[2] = {{&hdr, sizeof(hdr)}, {&req, sizeof(req)}}; struct trusty_shm shm = { .fd = package_fd, .transfer = TRUSTY_SHARE, }; return tipc_send(tipc_fd, tx, 2, &shm, 1); } static ssize_t read_response(int tipc_fd) { struct apploader_resp resp; ssize_t rc = read(tipc_fd, &resp, sizeof(resp)); if (rc < 0) { PLOG(ERROR) << "Failed to read response"; return rc; } if (rc < sizeof(resp)) { LOG(ERROR) << "Not enough data in response: " << rc; return -EIO; } if (resp.hdr.cmd != (APPLOADER_CMD_LOAD_APPLICATION | APPLOADER_RESP_BIT)) { LOG(ERROR) << "Invalid command in response: " << resp.hdr.cmd; return -EINVAL; } switch (resp.error) { case APPLOADER_NO_ERROR: break; case APPLOADER_ERR_UNKNOWN_CMD: LOG(ERROR) << "Error: unknown command"; break; case APPLOADER_ERR_INVALID_CMD: LOG(ERROR) << "Error: invalid command arguments"; break; case APPLOADER_ERR_NO_MEMORY: LOG(ERROR) << "Error: out of Trusty memory"; break; case APPLOADER_ERR_VERIFICATION_FAILED: LOG(ERROR) << "Error: failed to verify the package"; break; case APPLOADER_ERR_LOADING_FAILED: LOG(ERROR) << "Error: failed to load the package"; break; case APPLOADER_ERR_ALREADY_EXISTS: LOG(ERROR) << "Error: application already exists"; break; case APPLOADER_ERR_INTERNAL: LOG(ERROR) << "Error: internal apploader error"; break; case APPLOADER_ERR_INVALID_VERSION: LOG(ERROR) << "Error: invalid application version"; break; case APPLOADER_ERR_POLICY_VIOLATION: LOG(ERROR) << "Error: loading denied by policy engine"; break; case APPLOADER_ERR_NOT_ENCRYPTED: LOG(ERROR) << "Error: unmet application encryption requirement"; break; default: LOG(ERROR) << "Unrecognized error: " << resp.error; break; } return static_cast(resp.error); } static ssize_t send_app_package(const char* package_file_name) { ssize_t rc = 0; int tipc_fd = -1; off64_t package_size; unique_fd package_fd = read_file(package_file_name, &package_size); if (!package_fd.ok()) { rc = -1; goto err_read_file; } tipc_fd = tipc_connect(dev_name, APPLOADER_PORT); if (tipc_fd < 0) { LOG(ERROR) << "Failed to connect to Trusty app loader: " << strerror(-tipc_fd); // print this to stderr too to avoid silently exiting when run as non-root fprintf(stderr, "Failed to connect to Trusty app loader: %s\n", strerror(-tipc_fd)); rc = tipc_fd; goto err_tipc_connect; } rc = send_load_message(tipc_fd, package_fd, package_size); if (rc < 0) { LOG(ERROR) << "Failed to send package: " << rc; goto err_send; } rc = read_response(tipc_fd); err_send: tipc_close(tipc_fd); err_tipc_connect: err_read_file: return rc; } int main(int argc, char** argv) { parse_options(argc, argv); if (optind + 1 != argc) { print_usage_and_exit(argv[0], EXIT_FAILURE); } int rc = send_app_package(argv[optind]); return rc == 0 ? EXIT_SUCCESS : EXIT_FAILURE; }