Tom Rini | 897a1d9 | 2018-06-19 11:21:44 -0400 | [diff] [blame] | 1 | /* SPDX-License-Identifier: MIT */ |
Igor Opaniuk | d8f9d2a | 2018-06-03 21:56:36 +0300 | [diff] [blame] | 2 | /* |
| 3 | * Copyright (C) 2016 The Android Open Source Project |
Igor Opaniuk | d8f9d2a | 2018-06-03 21:56:36 +0300 | [diff] [blame] | 4 | */ |
| 5 | |
| 6 | #if !defined(AVB_INSIDE_LIBAVB_H) && !defined(AVB_COMPILATION) |
| 7 | #error "Never include this file directly, include libavb.h instead." |
| 8 | #endif |
| 9 | |
| 10 | #ifndef AVB_SLOT_VERIFY_H_ |
| 11 | #define AVB_SLOT_VERIFY_H_ |
| 12 | |
| 13 | #include "avb_ops.h" |
| 14 | #include "avb_vbmeta_image.h" |
| 15 | |
| 16 | #ifdef __cplusplus |
| 17 | extern "C" { |
| 18 | #endif |
| 19 | |
| 20 | /* Return codes used in avb_slot_verify(), see that function for |
| 21 | * documentation for each field. |
| 22 | * |
| 23 | * Use avb_slot_verify_result_to_string() to get a textual |
| 24 | * representation usable for error/debug output. |
| 25 | */ |
| 26 | typedef enum { |
| 27 | AVB_SLOT_VERIFY_RESULT_OK, |
| 28 | AVB_SLOT_VERIFY_RESULT_ERROR_OOM, |
| 29 | AVB_SLOT_VERIFY_RESULT_ERROR_IO, |
| 30 | AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION, |
| 31 | AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX, |
| 32 | AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED, |
| 33 | AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_METADATA, |
| 34 | AVB_SLOT_VERIFY_RESULT_ERROR_UNSUPPORTED_VERSION, |
| 35 | AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_ARGUMENT |
| 36 | } AvbSlotVerifyResult; |
| 37 | |
| 38 | /* Various error handling modes for when verification fails using a |
| 39 | * hashtree at runtime inside the HLOS. |
| 40 | * |
| 41 | * AVB_HASHTREE_ERROR_MODE_RESTART_AND_INVALIDATE means that the OS |
| 42 | * will invalidate the current slot and restart. |
| 43 | * |
| 44 | * AVB_HASHTREE_ERROR_MODE_RESTART means that the OS will restart. |
| 45 | * |
| 46 | * AVB_HASHTREE_ERROR_MODE_EIO means that an EIO error will be |
| 47 | * returned to applications. |
| 48 | * |
| 49 | * AVB_HASHTREE_ERROR_MODE_LOGGING means that errors will be logged |
| 50 | * and corrupt data may be returned to applications. This mode should |
| 51 | * be used ONLY for diagnostics and debugging. It cannot be used |
| 52 | * unless AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR is also |
| 53 | * used. |
| 54 | */ |
| 55 | typedef enum { |
| 56 | AVB_HASHTREE_ERROR_MODE_RESTART_AND_INVALIDATE, |
| 57 | AVB_HASHTREE_ERROR_MODE_RESTART, |
| 58 | AVB_HASHTREE_ERROR_MODE_EIO, |
| 59 | AVB_HASHTREE_ERROR_MODE_LOGGING |
| 60 | } AvbHashtreeErrorMode; |
| 61 | |
| 62 | /* Flags that influence how avb_slot_verify() works. |
| 63 | * |
| 64 | * If AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR is NOT set then |
| 65 | * avb_slot_verify() will bail out as soon as an error is encountered |
| 66 | * and |out_data| is set only if AVB_SLOT_VERIFY_RESULT_OK is |
| 67 | * returned. |
| 68 | * |
| 69 | * Otherwise if AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR is set |
| 70 | * avb_slot_verify() will continue verification efforts and |out_data| |
| 71 | * is also set if AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED, |
| 72 | * AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION, or |
| 73 | * AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX is returned. It is |
| 74 | * undefined which error is returned if more than one distinct error |
| 75 | * is encountered. It is guaranteed that AVB_SLOT_VERIFY_RESULT_OK is |
| 76 | * returned if, and only if, there are no errors. This mode is needed |
| 77 | * to boot valid but unverified slots when the device is unlocked. |
| 78 | * |
| 79 | * Also, if AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR is set the |
| 80 | * contents loaded from |requested_partition| will be the contents of |
| 81 | * the entire partition instead of just the size specified in the hash |
| 82 | * descriptor. |
| 83 | */ |
| 84 | typedef enum { |
| 85 | AVB_SLOT_VERIFY_FLAGS_NONE = 0, |
| 86 | AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR = (1 << 0) |
| 87 | } AvbSlotVerifyFlags; |
| 88 | |
| 89 | /* Get a textual representation of |result|. */ |
| 90 | const char* avb_slot_verify_result_to_string(AvbSlotVerifyResult result); |
| 91 | |
| 92 | /* Maximum number of rollback index locations supported. */ |
| 93 | #define AVB_MAX_NUMBER_OF_ROLLBACK_INDEX_LOCATIONS 32 |
| 94 | |
| 95 | /* AvbPartitionData contains data loaded from partitions when using |
| 96 | * avb_slot_verify(). The |partition_name| field contains the name of |
| 97 | * the partition (without A/B suffix), |data| points to the loaded |
| 98 | * data which is |data_size| bytes long. If |preloaded| is set to true, |
| 99 | * this structure dose not own |data|. The caller of |avb_slot_verify| |
| 100 | * needs to make sure that the preloaded data outlives this |
| 101 | * |AvbPartitionData| structure. |
| 102 | * |
| 103 | * Note that this is strictly less than the partition size - it's only |
| 104 | * the image stored there, not the entire partition nor any of the |
| 105 | * metadata. |
| 106 | */ |
| 107 | typedef struct { |
| 108 | char* partition_name; |
| 109 | uint8_t* data; |
| 110 | size_t data_size; |
| 111 | bool preloaded; |
| 112 | } AvbPartitionData; |
| 113 | |
| 114 | /* AvbVBMetaData contains a vbmeta struct loaded from a partition when |
| 115 | * using avb_slot_verify(). The |partition_name| field contains the |
| 116 | * name of the partition (without A/B suffix), |vbmeta_data| points to |
| 117 | * the loaded data which is |vbmeta_size| bytes long. |
| 118 | * |
| 119 | * The |verify_result| field contains the result of |
| 120 | * avb_vbmeta_image_verify() on the data. This is guaranteed to be |
| 121 | * AVB_VBMETA_VERIFY_RESULT_OK for all vbmeta images if |
| 122 | * avb_slot_verify() returns AVB_SLOT_VERIFY_RESULT_OK. |
| 123 | * |
| 124 | * You can use avb_descriptor_get_all(), avb_descriptor_foreach(), and |
| 125 | * avb_vbmeta_image_header_to_host_byte_order() with this data. |
| 126 | */ |
| 127 | typedef struct { |
| 128 | char* partition_name; |
| 129 | uint8_t* vbmeta_data; |
| 130 | size_t vbmeta_size; |
| 131 | AvbVBMetaVerifyResult verify_result; |
| 132 | } AvbVBMetaData; |
| 133 | |
| 134 | /* AvbSlotVerifyData contains data needed to boot a particular slot |
| 135 | * and is returned by avb_slot_verify() if partitions in a slot are |
| 136 | * successfully verified. |
| 137 | * |
| 138 | * All data pointed to by this struct - including data in each item in |
| 139 | * the |partitions| array - will be freed when the |
| 140 | * avb_slot_verify_data_free() function is called. |
| 141 | * |
| 142 | * The |ab_suffix| field is the copy of the of |ab_suffix| field |
| 143 | * passed to avb_slot_verify(). It is the A/B suffix of the slot. This |
| 144 | * value includes the leading underscore - typical values are "" (if |
| 145 | * no slots are in use), "_a" (for the first slot), and "_b" (for the |
| 146 | * second slot). |
| 147 | * |
| 148 | * The VBMeta images that were checked are available in the |
| 149 | * |vbmeta_images| field. The field |num_vbmeta_images| contains the |
| 150 | * number of elements in this array. The first element - |
| 151 | * vbmeta_images[0] - is guaranteed to be from the partition with the |
| 152 | * top-level vbmeta struct. This is usually the "vbmeta" partition in |
| 153 | * the requested slot but if there is no "vbmeta" partition it can |
| 154 | * also be the "boot" partition. |
| 155 | * |
| 156 | * The partitions loaded and verified from from the slot are |
| 157 | * accessible in the |loaded_partitions| array. The field |
| 158 | * |num_loaded_partitions| contains the number of elements in this |
| 159 | * array. The order of partitions in this array may not necessarily be |
| 160 | * the same order as in the passed-in |requested_partitions| array. |
| 161 | * |
| 162 | * Rollback indexes for the verified slot are stored in the |
| 163 | * |rollback_indexes| field. Note that avb_slot_verify() will NEVER |
| 164 | * modify stored_rollback_index[n] locations e.g. it will never use |
| 165 | * the write_rollback_index() AvbOps operation. Instead it is the job |
| 166 | * of the caller of avb_slot_verify() to do this based on e.g. A/B |
| 167 | * policy and other factors. See libavb_ab/avb_ab_flow.c for an |
| 168 | * example of how to do this. |
| 169 | * |
| 170 | * The |cmdline| field is a NUL-terminated string in UTF-8 resulting |
| 171 | * from concatenating all |AvbKernelCmdlineDescriptor| and then |
| 172 | * performing proper substitution of the variables |
| 173 | * $(ANDROID_SYSTEM_PARTUUID), $(ANDROID_BOOT_PARTUUID), and |
| 174 | * $(ANDROID_VBMETA_PARTUUID) using the |
| 175 | * get_unique_guid_for_partition() operation in |AvbOps|. Additionally |
| 176 | * $(ANDROID_VERITY_MODE) will be replaced with the proper dm-verity |
| 177 | * option depending on the value of |hashtree_error_mode|. |
| 178 | * |
| 179 | * Additionally, the |cmdline| field will have the following kernel |
| 180 | * command-line options set (unless verification is disabled, see |
| 181 | * below): |
| 182 | * |
| 183 | * androidboot.veritymode: This is set to 'disabled' if the |
| 184 | * AVB_VBMETA_IMAGE_FLAGS_HASHTREE_DISABLED flag is set in top-level |
| 185 | * vbmeta struct. Otherwise it is set to 'enforcing' if the |
| 186 | * passed-in hashtree error mode is AVB_HASHTREE_ERROR_MODE_RESTART |
| 187 | * or AVB_HASHTREE_ERROR_MODE_RESTART_AND_INVALIDATE, 'eio' if it's |
| 188 | * set to AVB_HASHTREE_ERROR_MODE_EIO, and 'logging' if it's set to |
| 189 | * AVB_HASHTREE_ERROR_MODE_LOGGING. |
| 190 | * |
| 191 | * androidboot.vbmeta.invalidate_on_error: This is set to 'yes' only |
| 192 | * if hashtree validation isn't disabled and the passed-in hashtree |
| 193 | * error mode is AVB_HASHTREE_ERROR_MODE_RESTART_AND_INVALIDATE. |
| 194 | * |
| 195 | * androidboot.vbmeta.device_state: set to "locked" or "unlocked" |
| 196 | * depending on the result of the result of AvbOps's |
| 197 | * read_is_unlocked() function. |
| 198 | * |
| 199 | * androidboot.vbmeta.{hash_alg, size, digest}: Will be set to |
| 200 | * the digest of all images in |vbmeta_images|. |
| 201 | * |
| 202 | * androidboot.vbmeta.device: This is set to the value |
| 203 | * PARTUUID=$(ANDROID_VBMETA_PARTUUID) before substitution so it |
| 204 | * will end up pointing to the vbmeta partition for the verified |
| 205 | * slot. If there is no vbmeta partition it will point to the boot |
| 206 | * partition of the verified slot. |
| 207 | * |
| 208 | * androidboot.vbmeta.avb_version: This is set to the decimal value |
| 209 | * of AVB_VERSION_MAJOR followed by a dot followed by the decimal |
| 210 | * value of AVB_VERSION_MINOR, for example "1.0" or "1.4". This |
| 211 | * version number represents the vbmeta file format version |
| 212 | * supported by libavb copy used in the boot loader. This is not |
| 213 | * necessarily the same version number of the on-disk metadata for |
| 214 | * the slot that was verified. |
| 215 | * |
| 216 | * Note that androidboot.slot_suffix is not set in the |cmdline| field |
| 217 | * in |AvbSlotVerifyData| - you will have to set this yourself. |
| 218 | * |
| 219 | * If the |AVB_VBMETA_IMAGE_FLAGS_VERIFICATION_DISABLED| flag is set |
| 220 | * in the top-level vbmeta struct then only the top-level vbmeta |
| 221 | * struct is verified and descriptors will not processed. The return |
| 222 | * value will be set accordingly (if this flag is set via 'avbctl |
| 223 | * disable-verification' then the return value will be |
| 224 | * |AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION|) and |
| 225 | * |AvbSlotVerifyData| is returned. Additionally all partitions in the |
| 226 | * |requested_partitions| are loaded and the |cmdline| field is set to |
| 227 | * "root=PARTUUID=$(ANDROID_SYSTEM_PARTUUID)" and the GUID for the |
| 228 | * appropriate system partition is substituted in. Note that none of |
| 229 | * the androidboot.* options mentioned above will be set. |
| 230 | * |
| 231 | * This struct may grow in the future without it being considered an |
| 232 | * ABI break. |
| 233 | */ |
| 234 | typedef struct { |
| 235 | char* ab_suffix; |
| 236 | AvbVBMetaData* vbmeta_images; |
| 237 | size_t num_vbmeta_images; |
| 238 | AvbPartitionData* loaded_partitions; |
| 239 | size_t num_loaded_partitions; |
| 240 | char* cmdline; |
| 241 | uint64_t rollback_indexes[AVB_MAX_NUMBER_OF_ROLLBACK_INDEX_LOCATIONS]; |
| 242 | } AvbSlotVerifyData; |
| 243 | |
| 244 | /* Calculates a digest of all vbmeta images in |data| using |
| 245 | * the digest indicated by |digest_type|. Stores the result |
| 246 | * in |out_digest| which must be large enough to hold a digest |
| 247 | * of the requested type. |
| 248 | */ |
| 249 | void avb_slot_verify_data_calculate_vbmeta_digest(AvbSlotVerifyData* data, |
| 250 | AvbDigestType digest_type, |
| 251 | uint8_t* out_digest); |
| 252 | |
| 253 | /* Frees a |AvbSlotVerifyData| including all data it points to. */ |
| 254 | void avb_slot_verify_data_free(AvbSlotVerifyData* data); |
| 255 | |
| 256 | /* Performs a full verification of the slot identified by |ab_suffix| |
| 257 | * and load and verify the contents of the partitions whose name is in |
| 258 | * the NULL-terminated string array |requested_partitions| (each |
| 259 | * partition must use hash verification). If not using A/B, pass an |
| 260 | * empty string (e.g. "", not NULL) for |ab_suffix|. This parameter |
| 261 | * must include the leading underscore, for example "_a" should be |
| 262 | * used to refer to the first slot. |
| 263 | * |
| 264 | * Typically the |requested_partitions| array only contains a single |
| 265 | * item for the boot partition, 'boot'. |
| 266 | * |
| 267 | * Verification includes loading and verifying data from the 'vbmeta', |
| 268 | * the requested hash partitions, and possibly other partitions (with |
| 269 | * |ab_suffix| appended), inspecting rollback indexes, and checking if |
| 270 | * the public key used to sign the data is acceptable. The functions |
| 271 | * in |ops| will be used to do this. |
| 272 | * |
| 273 | * If |out_data| is not NULL, it will be set to a newly allocated |
| 274 | * |AvbSlotVerifyData| struct containing all the data needed to |
| 275 | * actually boot the slot. This data structure should be freed with |
| 276 | * avb_slot_verify_data_free() when you are done with it. See below |
| 277 | * for when this is returned. |
| 278 | * |
| 279 | * The |flags| parameter is used to influence the semantics of |
| 280 | * avb_slot_verify() - for example the |
| 281 | * AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR flag can be used to |
| 282 | * ignore verification errors which is something needed in the |
| 283 | * UNLOCKED state. See the AvbSlotVerifyFlags enumeration for details. |
| 284 | * |
| 285 | * The |hashtree_error_mode| parameter should be set to the desired |
| 286 | * error handling mode when hashtree validation fails inside the |
| 287 | * HLOS. This value isn't used by libavb per se - it is forwarded to |
| 288 | * the HLOS through the androidboot.veritymode and |
| 289 | * androidboot.vbmeta.invalidate_on_error cmdline parameters. See the |
| 290 | * AvbHashtreeErrorMode enumeration for details. |
| 291 | * |
| 292 | * Also note that |out_data| is never set if |
| 293 | * AVB_SLOT_VERIFY_RESULT_ERROR_OOM, AVB_SLOT_VERIFY_RESULT_ERROR_IO, |
| 294 | * or AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_METADATA is returned. |
| 295 | * |
| 296 | * AVB_SLOT_VERIFY_RESULT_OK is returned if everything is verified |
| 297 | * correctly and all public keys are accepted. |
| 298 | * |
| 299 | * AVB_SLOT_VERIFY_RESULT_ERROR_PUBLIC_KEY_REJECTED is returned if |
| 300 | * everything is verified correctly out but one or more public keys |
| 301 | * are not accepted. This includes the case where integrity data is |
| 302 | * not signed. |
| 303 | * |
| 304 | * AVB_SLOT_VERIFY_RESULT_ERROR_OOM is returned if unable to |
| 305 | * allocate memory. |
| 306 | * |
| 307 | * AVB_SLOT_VERIFY_RESULT_ERROR_IO is returned if an I/O error |
| 308 | * occurred while trying to load data or get a rollback index. |
| 309 | * |
| 310 | * AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION is returned if the data |
| 311 | * did not verify, e.g. the digest didn't match or signature checks |
| 312 | * failed. |
| 313 | * |
| 314 | * AVB_SLOT_VERIFY_RESULT_ERROR_ROLLBACK_INDEX is returned if a |
| 315 | * rollback index was less than its stored value. |
| 316 | * |
| 317 | * AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_METADATA is returned if some |
| 318 | * of the metadata is invalid or inconsistent. |
| 319 | * |
| 320 | * AVB_SLOT_VERIFY_RESULT_ERROR_UNSUPPORTED_VERSION is returned if |
| 321 | * some of the metadata requires a newer version of libavb than what |
| 322 | * is in use. |
| 323 | * |
| 324 | * AVB_SLOT_VERIFY_RESULT_ERROR_INVALID_ARGUMENT is returned if the |
| 325 | * caller passed invalid parameters, for example trying to use |
| 326 | * AVB_HASHTREE_ERROR_MODE_LOGGING without |
| 327 | * AVB_SLOT_VERIFY_FLAGS_ALLOW_VERIFICATION_ERROR. |
| 328 | */ |
| 329 | AvbSlotVerifyResult avb_slot_verify(AvbOps* ops, |
| 330 | const char* const* requested_partitions, |
| 331 | const char* ab_suffix, |
| 332 | AvbSlotVerifyFlags flags, |
| 333 | AvbHashtreeErrorMode hashtree_error_mode, |
| 334 | AvbSlotVerifyData** out_data); |
| 335 | |
| 336 | #ifdef __cplusplus |
| 337 | } |
| 338 | #endif |
| 339 | |
| 340 | #endif /* AVB_SLOT_VERIFY_H_ */ |