blob: f9a00f8871c0c13c7b35a9ff6e6f0999cfddfa7e [file] [log] [blame]
Igor Opaniuk3af30e42018-06-03 21:56:38 +03001/*
2 * (C) Copyright 2018, Linaro Limited
3 *
4 * SPDX-License-Identifier: GPL-2.0+
5 */
6
7#include <avb_verify.h>
8#include <fastboot.h>
9#include <image.h>
10#include <malloc.h>
11#include <part.h>
12
13const unsigned char avb_root_pub[1032] = {
14 0x0, 0x0, 0x10, 0x0, 0x55, 0xd9, 0x4, 0xad, 0xd8, 0x4,
15 0xaf, 0xe3, 0xd3, 0x84, 0x6c, 0x7e, 0xd, 0x89, 0x3d, 0xc2,
16 0x8c, 0xd3, 0x12, 0x55, 0xe9, 0x62, 0xc9, 0xf1, 0xf, 0x5e,
17 0xcc, 0x16, 0x72, 0xab, 0x44, 0x7c, 0x2c, 0x65, 0x4a, 0x94,
18 0xb5, 0x16, 0x2b, 0x0, 0xbb, 0x6, 0xef, 0x13, 0x7, 0x53,
19 0x4c, 0xf9, 0x64, 0xb9, 0x28, 0x7a, 0x1b, 0x84, 0x98, 0x88,
20 0xd8, 0x67, 0xa4, 0x23, 0xf9, 0xa7, 0x4b, 0xdc, 0x4a, 0xf,
21 0xf7, 0x3a, 0x18, 0xae, 0x54, 0xa8, 0x15, 0xfe, 0xb0, 0xad,
22 0xac, 0x35, 0xda, 0x3b, 0xad, 0x27, 0xbc, 0xaf, 0xe8, 0xd3,
23 0x2f, 0x37, 0x34, 0xd6, 0x51, 0x2b, 0x6c, 0x5a, 0x27, 0xd7,
24 0x96, 0x6, 0xaf, 0x6b, 0xb8, 0x80, 0xca, 0xfa, 0x30, 0xb4,
25 0xb1, 0x85, 0xb3, 0x4d, 0xaa, 0xaa, 0xc3, 0x16, 0x34, 0x1a,
26 0xb8, 0xe7, 0xc7, 0xfa, 0xf9, 0x9, 0x77, 0xab, 0x97, 0x93,
27 0xeb, 0x44, 0xae, 0xcf, 0x20, 0xbc, 0xf0, 0x80, 0x11, 0xdb,
28 0x23, 0xc, 0x47, 0x71, 0xb9, 0x6d, 0xd6, 0x7b, 0x60, 0x47,
29 0x87, 0x16, 0x56, 0x93, 0xb7, 0xc2, 0x2a, 0x9a, 0xb0, 0x4c,
30 0x1, 0xc, 0x30, 0xd8, 0x93, 0x87, 0xf0, 0xed, 0x6e, 0x8b,
31 0xbe, 0x30, 0x5b, 0xf6, 0xa6, 0xaf, 0xdd, 0x80, 0x7c, 0x45,
32 0x5e, 0x8f, 0x91, 0x93, 0x5e, 0x44, 0xfe, 0xb8, 0x82, 0x7,
33 0xee, 0x79, 0xca, 0xbf, 0x31, 0x73, 0x62, 0x58, 0xe3, 0xcd,
34 0xc4, 0xbc, 0xc2, 0x11, 0x1d, 0xa1, 0x4a, 0xbf, 0xfe, 0x27,
35 0x7d, 0xa1, 0xf6, 0x35, 0xa3, 0x5e, 0xca, 0xdc, 0x57, 0x2f,
36 0x3e, 0xf0, 0xc9, 0x5d, 0x86, 0x6a, 0xf8, 0xaf, 0x66, 0xa7,
37 0xed, 0xcd, 0xb8, 0xed, 0xa1, 0x5f, 0xba, 0x9b, 0x85, 0x1a,
38 0xd5, 0x9, 0xae, 0x94, 0x4e, 0x3b, 0xcf, 0xcb, 0x5c, 0xc9,
39 0x79, 0x80, 0xf7, 0xcc, 0xa6, 0x4a, 0xa8, 0x6a, 0xd8, 0xd3,
40 0x31, 0x11, 0xf9, 0xf6, 0x2, 0x63, 0x2a, 0x1a, 0x2d, 0xd1,
41 0x1a, 0x66, 0x1b, 0x16, 0x41, 0xbd, 0xbd, 0xf7, 0x4d, 0xc0,
42 0x4a, 0xe5, 0x27, 0x49, 0x5f, 0x7f, 0x58, 0xe3, 0x27, 0x2d,
43 0xe5, 0xc9, 0x66, 0xe, 0x52, 0x38, 0x16, 0x38, 0xfb, 0x16,
44 0xeb, 0x53, 0x3f, 0xe6, 0xfd, 0xe9, 0xa2, 0x5e, 0x25, 0x59,
45 0xd8, 0x79, 0x45, 0xff, 0x3, 0x4c, 0x26, 0xa2, 0x0, 0x5a,
46 0x8e, 0xc2, 0x51, 0xa1, 0x15, 0xf9, 0x7b, 0xf4, 0x5c, 0x81,
47 0x9b, 0x18, 0x47, 0x35, 0xd8, 0x2d, 0x5, 0xe9, 0xad, 0xf,
48 0x35, 0x74, 0x15, 0xa3, 0x8e, 0x8b, 0xcc, 0x27, 0xda, 0x7c,
49 0x5d, 0xe4, 0xfa, 0x4, 0xd3, 0x5, 0xb, 0xba, 0x3a, 0xb2,
50 0x49, 0x45, 0x2f, 0x47, 0xc7, 0xd, 0x41, 0x3f, 0x97, 0x80,
51 0x4d, 0x3f, 0xc1, 0xb5, 0xbb, 0x70, 0x5f, 0xa7, 0x37, 0xaf,
52 0x48, 0x22, 0x12, 0x45, 0x2e, 0xf5, 0xf, 0x87, 0x92, 0xe2,
53 0x84, 0x1, 0xf9, 0x12, 0xf, 0x14, 0x15, 0x24, 0xce, 0x89,
54 0x99, 0xee, 0xb9, 0xc4, 0x17, 0x70, 0x70, 0x15, 0xea, 0xbe,
55 0xc6, 0x6c, 0x1f, 0x62, 0xb3, 0xf4, 0x2d, 0x16, 0x87, 0xfb,
56 0x56, 0x1e, 0x45, 0xab, 0xae, 0x32, 0xe4, 0x5e, 0x91, 0xed,
57 0x53, 0x66, 0x5e, 0xbd, 0xed, 0xad, 0xe6, 0x12, 0x39, 0xd,
58 0x83, 0xc9, 0xe8, 0x6b, 0x6c, 0x2d, 0xa5, 0xee, 0xc4, 0x5a,
59 0x66, 0xae, 0x8c, 0x97, 0xd7, 0xd, 0x6c, 0x49, 0xc7, 0xf5,
60 0xc4, 0x92, 0x31, 0x8b, 0x9, 0xee, 0x33, 0xda, 0xa9, 0x37,
61 0xb6, 0x49, 0x18, 0xf8, 0xe, 0x60, 0x45, 0xc8, 0x33, 0x91,
62 0xef, 0x20, 0x57, 0x10, 0xbe, 0x78, 0x2d, 0x83, 0x26, 0xd6,
63 0xca, 0x61, 0xf9, 0x2f, 0xe0, 0xbf, 0x5, 0x30, 0x52, 0x5a,
64 0x12, 0x1c, 0x0, 0xa7, 0x5d, 0xcc, 0x7c, 0x2e, 0xc5, 0x95,
65 0x8b, 0xa3, 0x3b, 0xf0, 0x43, 0x2e, 0x5e, 0xdd, 0x0, 0xdb,
66 0xd, 0xb3, 0x37, 0x99, 0xa9, 0xcd, 0x9c, 0xb7, 0x43, 0xf7,
67 0x35, 0x44, 0x21, 0xc2, 0x82, 0x71, 0xab, 0x8d, 0xaa, 0xb4,
68 0x41, 0x11, 0xec, 0x1e, 0x8d, 0xfc, 0x14, 0x82, 0x92, 0x4e,
69 0x83, 0x6a, 0xa, 0x6b, 0x35, 0x5e, 0x5d, 0xe9, 0x5c, 0xcc,
70 0x8c, 0xde, 0x39, 0xd1, 0x4a, 0x5b, 0x5f, 0x63, 0xa9, 0x64,
71 0xe0, 0xa, 0xcb, 0xb, 0xb8, 0x5a, 0x7c, 0xc3, 0xb, 0xe6,
72 0xbe, 0xfe, 0x8b, 0xf, 0x7d, 0x34, 0x8e, 0x2, 0x66, 0x74,
73 0x1, 0x6c, 0xca, 0x76, 0xac, 0x7c, 0x67, 0x8, 0x2f, 0x3f,
74 0x1a, 0xa6, 0x2c, 0x60, 0xb3, 0xff, 0xda, 0x8d, 0xb8, 0x12,
75 0xc, 0x0, 0x7f, 0xcc, 0x50, 0xa1, 0x5c, 0x64, 0xa1, 0xe2,
76 0x5f, 0x32, 0x65, 0xc9, 0x9c, 0xbe, 0xd6, 0xa, 0x13, 0x87,
77 0x3c, 0x2a, 0x45, 0x47, 0xc, 0xca, 0x42, 0x82, 0xfa, 0x89,
78 0x65, 0xe7, 0x89, 0xb4, 0x8f, 0xf7, 0x1e, 0xe6, 0x23, 0xa5,
79 0xd0, 0x59, 0x37, 0x79, 0x92, 0xd7, 0xce, 0x3d, 0xfd, 0xe3,
80 0xa1, 0xb, 0xcf, 0x6c, 0x85, 0xa0, 0x65, 0xf3, 0x5c, 0xc6,
81 0x4a, 0x63, 0x5f, 0x6e, 0x3a, 0x3a, 0x2a, 0x8b, 0x6a, 0xb6,
82 0x2f, 0xbb, 0xf8, 0xb2, 0x4b, 0x62, 0xbc, 0x1a, 0x91, 0x25,
83 0x66, 0xe3, 0x69, 0xca, 0x60, 0x49, 0xb, 0xf6, 0x8a, 0xbe,
84 0x3e, 0x76, 0x53, 0xc2, 0x7a, 0xa8, 0x4, 0x17, 0x75, 0xf1,
85 0xf3, 0x3, 0x62, 0x1b, 0x85, 0xb2, 0xb0, 0xef, 0x80, 0x15,
86 0xb6, 0xd4, 0x4e, 0xdf, 0x71, 0xac, 0xdb, 0x2a, 0x4, 0xd4,
87 0xb4, 0x21, 0xba, 0x65, 0x56, 0x57, 0xe8, 0xfa, 0x84, 0xa2,
88 0x7d, 0x13, 0xe, 0xaf, 0xd7, 0x9a, 0x58, 0x2a, 0xa3, 0x81,
89 0x84, 0x8d, 0x9, 0xa0, 0x6a, 0xc1, 0xbb, 0xd9, 0xf5, 0x86,
90 0xac, 0xbd, 0x75, 0x61, 0x9, 0xe6, 0x8c, 0x3d, 0x77, 0xb2,
91 0xed, 0x30, 0x20, 0xe4, 0x0, 0x1d, 0x97, 0xe8, 0xbf, 0xc7,
92 0x0, 0x1b, 0x21, 0xb1, 0x16, 0xe7, 0x41, 0x67, 0x2e, 0xec,
93 0x38, 0xbc, 0xe5, 0x1b, 0xb4, 0x6, 0x23, 0x31, 0x71, 0x1c,
94 0x49, 0xcd, 0x76, 0x4a, 0x76, 0x36, 0x8d, 0xa3, 0x89, 0x8b,
95 0x4a, 0x7a, 0xf4, 0x87, 0xc8, 0x15, 0xf, 0x37, 0x39, 0xf6,
96 0x6d, 0x80, 0x19, 0xef, 0x5c, 0xa8, 0x66, 0xce, 0x1b, 0x16,
97 0x79, 0x21, 0xdf, 0xd7, 0x31, 0x30, 0xc4, 0x21, 0xdd, 0x34,
98 0x5b, 0xd2, 0x1a, 0x2b, 0x3e, 0x5d, 0xf7, 0xea, 0xca, 0x5,
99 0x8e, 0xb7, 0xcb, 0x49, 0x2e, 0xa0, 0xe3, 0xf4, 0xa7, 0x48,
100 0x19, 0x10, 0x9c, 0x4, 0xa7, 0xf4, 0x28, 0x74, 0xc8, 0x6f,
101 0x63, 0x20, 0x2b, 0x46, 0x24, 0x26, 0x19, 0x1d, 0xd1, 0x2c,
102 0x31, 0x6d, 0x5a, 0x29, 0xa2, 0x6, 0xa6, 0xb2, 0x41, 0xcc,
103 0xa, 0x27, 0x96, 0x9, 0x96, 0xac, 0x47, 0x65, 0x78, 0x68,
104 0x51, 0x98, 0xd6, 0xd8, 0xa6, 0x2d, 0xa0, 0xcf, 0xec, 0xe2,
105 0x74, 0xf2, 0x82, 0xe3, 0x97, 0xd9, 0x7e, 0xd4, 0xf8, 0xb,
106 0x70, 0x43, 0x3d, 0xb1, 0x7b, 0x97, 0x80, 0xd6, 0xcb, 0xd7,
107 0x19, 0xbc, 0x63, 0xb, 0xfd, 0x4d, 0x88, 0xfe, 0x67, 0xac,
108 0xb8, 0xcc, 0x50, 0xb7, 0x68, 0xb3, 0x5b, 0xd6, 0x1e, 0x25,
109 0xfc, 0x5f, 0x3c, 0x8d, 0xb1, 0x33, 0x7c, 0xb3, 0x49, 0x1,
110 0x3f, 0x71, 0x55, 0xe, 0x51, 0xba, 0x61, 0x26, 0xfa, 0xea,
111 0xe5, 0xb5, 0xe8, 0xaa, 0xcf, 0xcd, 0x96, 0x9f, 0xd6, 0xc1,
112 0x5f, 0x53, 0x91, 0xad, 0x5, 0xde, 0x20, 0xe7, 0x51, 0xda,
113 0x5b, 0x95, 0x67, 0xed, 0xf4, 0xee, 0x42, 0x65, 0x70, 0x13,
114 0xb, 0x70, 0x14, 0x1c, 0xc9, 0xe0, 0x19, 0xca, 0x5f, 0xf5,
115 0x1d, 0x70, 0x4b, 0x6c, 0x6, 0x74, 0xec, 0xb5, 0x2e, 0x77,
116 0xe1, 0x74, 0xa1, 0xa3, 0x99, 0xa0, 0x85, 0x9e, 0xf1, 0xac,
117 0xd8, 0x7e,
118};
119
120/**
121 * ============================================================================
Igor Opaniuk5d4fd872018-06-03 21:56:40 +0300122 * Boot states support (GREEN, YELLOW, ORANGE, RED) and dm_verity
123 * ============================================================================
124 */
125char *avb_set_state(AvbOps *ops, enum avb_boot_state boot_state)
126{
127 struct AvbOpsData *data;
128 char *cmdline = NULL;
129
130 if (!ops)
131 return NULL;
132
133 data = (struct AvbOpsData *)ops->user_data;
134 if (!data)
135 return NULL;
136
137 data->boot_state = boot_state;
138 switch (boot_state) {
139 case AVB_GREEN:
140 cmdline = "androidboot.verifiedbootstate=green";
141 break;
142 case AVB_YELLOW:
143 cmdline = "androidboot.verifiedbootstate=yellow";
144 break;
145 case AVB_ORANGE:
146 cmdline = "androidboot.verifiedbootstate=orange";
147 case AVB_RED:
148 break;
149 }
150
151 return cmdline;
152}
153
154char *append_cmd_line(char *cmdline_orig, char *cmdline_new)
155{
156 char *cmd_line;
157
158 if (!cmdline_new)
159 return cmdline_orig;
160
161 if (cmdline_orig)
162 cmd_line = cmdline_orig;
163 else
164 cmd_line = " ";
165
166 cmd_line = avb_strdupv(cmd_line, " ", cmdline_new, NULL);
167
168 return cmd_line;
169}
170
171static int avb_find_dm_args(char **args, char *str)
172{
173 int i;
174
175 if (!str)
176 return -1;
177
178 for (i = 0; i < AVB_MAX_ARGS, args[i]; ++i) {
179 if (strstr(args[i], str))
180 return i;
181 }
182
183 return -1;
184}
185
186static char *avb_set_enforce_option(const char *cmdline, const char *option)
187{
188 char *cmdarg[AVB_MAX_ARGS];
189 char *newargs = NULL;
190 int i = 0;
191 int total_args;
192
193 memset(cmdarg, 0, sizeof(cmdarg));
194 cmdarg[i++] = strtok((char *)cmdline, " ");
195
196 do {
197 cmdarg[i] = strtok(NULL, " ");
198 if (!cmdarg[i])
199 break;
200
201 if (++i >= AVB_MAX_ARGS) {
202 printf("%s: Can't handle more then %d args\n",
203 __func__, i);
204 return NULL;
205 }
206 } while (true);
207
208 total_args = i;
209 i = avb_find_dm_args(&cmdarg[0], VERITY_TABLE_OPT_LOGGING);
210 if (i >= 0) {
211 cmdarg[i] = (char *)option;
212 } else {
213 i = avb_find_dm_args(&cmdarg[0], VERITY_TABLE_OPT_RESTART);
214 if (i < 0) {
215 printf("%s: No verity options found\n", __func__);
216 return NULL;
217 }
218
219 cmdarg[i] = (char *)option;
220 }
221
222 for (i = 0; i <= total_args; i++)
223 newargs = append_cmd_line(newargs, cmdarg[i]);
224
225 return newargs;
226}
227
228char *avb_set_ignore_corruption(const char *cmdline)
229{
230 char *newargs = NULL;
231
232 newargs = avb_set_enforce_option(cmdline, VERITY_TABLE_OPT_LOGGING);
233 if (newargs)
234 newargs = append_cmd_line(newargs,
235 "androidboot.veritymode=eio");
236
237 return newargs;
238}
239
240char *avb_set_enforce_verity(const char *cmdline)
241{
242 char *newargs;
243
244 newargs = avb_set_enforce_option(cmdline, VERITY_TABLE_OPT_RESTART);
245 if (newargs)
246 newargs = append_cmd_line(newargs,
247 "androidboot.veritymode=enforcing");
248 return newargs;
249}
250
251/**
252 * ============================================================================
Igor Opaniuk3af30e42018-06-03 21:56:38 +0300253 * IO(mmc) auxiliary functions
254 * ============================================================================
255 */
256static unsigned long mmc_read_and_flush(struct mmc_part *part,
257 lbaint_t start,
258 lbaint_t sectors,
259 void *buffer)
260{
261 unsigned long blks;
262 void *tmp_buf;
263 size_t buf_size;
264 bool unaligned = is_buf_unaligned(buffer);
265
266 if (start < part->info.start) {
267 printf("%s: partition start out of bounds\n", __func__);
268 return 0;
269 }
270 if ((start + sectors) > (part->info.start + part->info.size)) {
271 sectors = part->info.start + part->info.size - start;
272 printf("%s: read sector aligned to partition bounds (%ld)\n",
273 __func__, sectors);
274 }
275
276 /*
277 * Reading fails on unaligned buffers, so we have to
278 * use aligned temporary buffer and then copy to destination
279 */
280
281 if (unaligned) {
282 printf("Handling unaligned read buffer..\n");
283 tmp_buf = get_sector_buf();
284 buf_size = get_sector_buf_size();
285 if (sectors > buf_size / part->info.blksz)
286 sectors = buf_size / part->info.blksz;
287 } else {
288 tmp_buf = buffer;
289 }
290
291 blks = part->mmc->block_dev.block_read(part->mmc_blk,
292 start, sectors, tmp_buf);
293 /* flush cache after read */
294 flush_cache((ulong)tmp_buf, sectors * part->info.blksz);
295
296 if (unaligned)
297 memcpy(buffer, tmp_buf, sectors * part->info.blksz);
298
299 return blks;
300}
301
302static unsigned long mmc_write(struct mmc_part *part, lbaint_t start,
303 lbaint_t sectors, void *buffer)
304{
305 void *tmp_buf;
306 size_t buf_size;
307 bool unaligned = is_buf_unaligned(buffer);
308
309 if (start < part->info.start) {
310 printf("%s: partition start out of bounds\n", __func__);
311 return 0;
312 }
313 if ((start + sectors) > (part->info.start + part->info.size)) {
314 sectors = part->info.start + part->info.size - start;
315 printf("%s: sector aligned to partition bounds (%ld)\n",
316 __func__, sectors);
317 }
318 if (unaligned) {
319 tmp_buf = get_sector_buf();
320 buf_size = get_sector_buf_size();
321 printf("Handling unaligned wrire buffer..\n");
322 if (sectors > buf_size / part->info.blksz)
323 sectors = buf_size / part->info.blksz;
324
325 memcpy(tmp_buf, buffer, sectors * part->info.blksz);
326 } else {
327 tmp_buf = buffer;
328 }
329
330 return part->mmc->block_dev.block_write(part->mmc_blk,
331 start, sectors, tmp_buf);
332}
333
334static struct mmc_part *get_partition(AvbOps *ops, const char *partition)
335{
336 int ret;
337 u8 dev_num;
338 int part_num = 0;
339 struct mmc_part *part;
340 struct blk_desc *mmc_blk;
341
342 part = malloc(sizeof(struct mmc_part));
343 if (!part)
344 return NULL;
345
346 dev_num = get_boot_device(ops);
347 part->mmc = find_mmc_device(dev_num);
348 if (!part->mmc) {
349 printf("No MMC device at slot %x\n", dev_num);
350 return NULL;
351 }
352
353 if (mmc_init(part->mmc)) {
354 printf("MMC initialization failed\n");
355 return NULL;
356 }
357
358 ret = mmc_switch_part(part->mmc, part_num);
359 if (ret)
360 return NULL;
361
362 mmc_blk = mmc_get_blk_desc(part->mmc);
363 if (!mmc_blk) {
364 printf("Error - failed to obtain block descriptor\n");
365 return NULL;
366 }
367
368 ret = part_get_info_by_name(mmc_blk, partition, &part->info);
369 if (!ret) {
370 printf("Can't find partition '%s'\n", partition);
371 return NULL;
372 }
373
374 part->dev_num = dev_num;
375 part->mmc_blk = mmc_blk;
376
377 return part;
378}
379
380static AvbIOResult mmc_byte_io(AvbOps *ops,
381 const char *partition,
382 s64 offset,
383 size_t num_bytes,
384 void *buffer,
385 size_t *out_num_read,
386 enum mmc_io_type io_type)
387{
388 ulong ret;
389 struct mmc_part *part;
390 u64 start_offset, start_sector, sectors, residue;
391 u8 *tmp_buf;
392 size_t io_cnt = 0;
393
394 if (!partition || !buffer || io_type > IO_WRITE)
395 return AVB_IO_RESULT_ERROR_IO;
396
397 part = get_partition(ops, partition);
398 if (!part)
399 return AVB_IO_RESULT_ERROR_NO_SUCH_PARTITION;
400
401 start_offset = calc_offset(part, offset);
402 while (num_bytes) {
403 start_sector = start_offset / part->info.blksz;
404 sectors = num_bytes / part->info.blksz;
405 /* handle non block-aligned reads */
406 if (start_offset % part->info.blksz ||
407 num_bytes < part->info.blksz) {
408 tmp_buf = get_sector_buf();
409 if (start_offset % part->info.blksz) {
410 residue = part->info.blksz -
411 (start_offset % part->info.blksz);
412 if (residue > num_bytes)
413 residue = num_bytes;
414 } else {
415 residue = num_bytes;
416 }
417
418 if (io_type == IO_READ) {
419 ret = mmc_read_and_flush(part,
420 part->info.start +
421 start_sector,
422 1, tmp_buf);
423
424 if (ret != 1) {
425 printf("%s: read error (%ld, %lld)\n",
426 __func__, ret, start_sector);
427 return AVB_IO_RESULT_ERROR_IO;
428 }
429 /*
430 * if this is not aligned at sector start,
431 * we have to adjust the tmp buffer
432 */
433 tmp_buf += (start_offset % part->info.blksz);
434 memcpy(buffer, (void *)tmp_buf, residue);
435 } else {
436 ret = mmc_read_and_flush(part,
437 part->info.start +
438 start_sector,
439 1, tmp_buf);
440
441 if (ret != 1) {
442 printf("%s: read error (%ld, %lld)\n",
443 __func__, ret, start_sector);
444 return AVB_IO_RESULT_ERROR_IO;
445 }
446 memcpy((void *)tmp_buf +
447 start_offset % part->info.blksz,
448 buffer, residue);
449
450 ret = mmc_write(part, part->info.start +
451 start_sector, 1, tmp_buf);
452 if (ret != 1) {
453 printf("%s: write error (%ld, %lld)\n",
454 __func__, ret, start_sector);
455 return AVB_IO_RESULT_ERROR_IO;
456 }
457 }
458
459 io_cnt += residue;
460 buffer += residue;
461 start_offset += residue;
462 num_bytes -= residue;
463 continue;
464 }
465
466 if (sectors) {
467 if (io_type == IO_READ) {
468 ret = mmc_read_and_flush(part,
469 part->info.start +
470 start_sector,
471 sectors, buffer);
472 } else {
473 ret = mmc_write(part,
474 part->info.start +
475 start_sector,
476 sectors, buffer);
477 }
478
479 if (!ret) {
480 printf("%s: sector read error\n", __func__);
481 return AVB_IO_RESULT_ERROR_IO;
482 }
483
484 io_cnt += ret * part->info.blksz;
485 buffer += ret * part->info.blksz;
486 start_offset += ret * part->info.blksz;
487 num_bytes -= ret * part->info.blksz;
488 }
489 }
490
491 /* Set counter for read operation */
492 if (io_type == IO_READ && out_num_read)
493 *out_num_read = io_cnt;
494
495 return AVB_IO_RESULT_OK;
496}
497
498/**
499 * ============================================================================
500 * AVB 2.0 operations
501 * ============================================================================
502 */
503
504/**
505 * read_from_partition() - reads @num_bytes from @offset from partition
506 * identified by a string name
507 *
508 * @ops: contains AVB ops handlers
509 * @partition_name: partition name, NUL-terminated UTF-8 string
510 * @offset: offset from the beginning of partition
511 * @num_bytes: amount of bytes to read
512 * @buffer: destination buffer to store data
513 * @out_num_read:
514 *
515 * @return:
516 * AVB_IO_RESULT_OK, if partition was found and read operation succeed
517 * AVB_IO_RESULT_ERROR_IO, if i/o error occurred from the underlying i/o
518 * subsystem
519 * AVB_IO_RESULT_ERROR_NO_SUCH_PARTITION, if there is no partition with
520 * the given name
521 */
522static AvbIOResult read_from_partition(AvbOps *ops,
523 const char *partition_name,
524 s64 offset_from_partition,
525 size_t num_bytes,
526 void *buffer,
527 size_t *out_num_read)
528{
529 return mmc_byte_io(ops, partition_name, offset_from_partition,
530 num_bytes, buffer, out_num_read, IO_READ);
531}
532
533/**
534 * write_to_partition() - writes N bytes to a partition identified by a string
535 * name
536 *
537 * @ops: AvbOps, contains AVB ops handlers
538 * @partition_name: partition name
539 * @offset_from_partition: offset from the beginning of partition
540 * @num_bytes: amount of bytes to write
541 * @buf: data to write
542 * @out_num_read:
543 *
544 * @return:
545 * AVB_IO_RESULT_OK, if partition was found and read operation succeed
546 * AVB_IO_RESULT_ERROR_IO, if input/output error occurred
547 * AVB_IO_RESULT_ERROR_NO_SUCH_PARTITION, if partition, specified in
548 * @partition_name was not found
549 */
550static AvbIOResult write_to_partition(AvbOps *ops,
551 const char *partition_name,
552 s64 offset_from_partition,
553 size_t num_bytes,
554 const void *buffer)
555{
556 return mmc_byte_io(ops, partition_name, offset_from_partition,
557 num_bytes, (void *)buffer, NULL, IO_WRITE);
558}
559
560/**
561 * validate_vmbeta_public_key() - checks if the given public key used to sign
562 * the vbmeta partition is trusted
563 *
564 * @ops: AvbOps, contains AVB ops handlers
565 * @public_key_data: public key for verifying vbmeta partition signature
566 * @public_key_length: length of public key
567 * @public_key_metadata:
568 * @public_key_metadata_length:
569 * @out_key_is_trusted:
570 *
571 * @return:
572 * AVB_IO_RESULT_OK, if partition was found and read operation succeed
573 */
574static AvbIOResult validate_vbmeta_public_key(AvbOps *ops,
575 const u8 *public_key_data,
576 size_t public_key_length,
577 const u8
578 *public_key_metadata,
579 size_t
580 public_key_metadata_length,
581 bool *out_key_is_trusted)
582{
583 if (!public_key_length || !public_key_data || !out_key_is_trusted)
584 return AVB_IO_RESULT_ERROR_IO;
585
586 *out_key_is_trusted = false;
587 if (public_key_length != sizeof(avb_root_pub))
588 return AVB_IO_RESULT_ERROR_IO;
589
590 if (memcmp(avb_root_pub, public_key_data, public_key_length) == 0)
591 *out_key_is_trusted = true;
592
593 return AVB_IO_RESULT_OK;
594}
595
596/**
597 * read_rollback_index() - gets the rollback index corresponding to the
598 * location of given by @out_rollback_index.
599 *
600 * @ops: contains AvbOps handlers
601 * @rollback_index_slot:
602 * @out_rollback_index: used to write a retrieved rollback index.
603 *
604 * @return
605 * AVB_IO_RESULT_OK, if the roolback index was retrieved
606 */
607static AvbIOResult read_rollback_index(AvbOps *ops,
608 size_t rollback_index_slot,
609 u64 *out_rollback_index)
610{
611 /* For now we always return 0 as the stored rollback index. */
Igor Opaniuk5d4fd872018-06-03 21:56:40 +0300612 printf("%s not supported yet\n", __func__);
Igor Opaniuk3af30e42018-06-03 21:56:38 +0300613
614 if (out_rollback_index)
615 *out_rollback_index = 0;
616
617 return AVB_IO_RESULT_OK;
618}
619
620/**
621 * write_rollback_index() - sets the rollback index corresponding to the
622 * location of given by @out_rollback_index.
623 *
624 * @ops: contains AvbOps handlers
625 * @rollback_index_slot:
626 * @rollback_index: rollback index to write.
627 *
628 * @return
629 * AVB_IO_RESULT_OK, if the roolback index was retrieved
630 */
631static AvbIOResult write_rollback_index(AvbOps *ops,
632 size_t rollback_index_slot,
633 u64 rollback_index)
634{
635 /* For now this is a no-op. */
Igor Opaniuk5d4fd872018-06-03 21:56:40 +0300636 printf("%s not supported yet\n", __func__);
Igor Opaniuk3af30e42018-06-03 21:56:38 +0300637
638 return AVB_IO_RESULT_OK;
639}
640
641/**
642 * read_is_device_unlocked() - gets whether the device is unlocked
643 *
644 * @ops: contains AVB ops handlers
645 * @out_is_unlocked: device unlock state is stored here, true if unlocked,
646 * false otherwise
647 *
648 * @return:
649 * AVB_IO_RESULT_OK: state is retrieved successfully
650 * AVB_IO_RESULT_ERROR_IO: an error occurred
651 */
652static AvbIOResult read_is_device_unlocked(AvbOps *ops, bool *out_is_unlocked)
653{
654 /* For now we always return that the device is unlocked. */
655
Igor Opaniuk5d4fd872018-06-03 21:56:40 +0300656 printf("%s not supported yet\n", __func__);
Igor Opaniuk3af30e42018-06-03 21:56:38 +0300657
658 *out_is_unlocked = true;
659
660 return AVB_IO_RESULT_OK;
661}
662
663/**
664 * get_unique_guid_for_partition() - gets the GUID for a partition identified
665 * by a string name
666 *
667 * @ops: contains AVB ops handlers
668 * @partition: partition name (NUL-terminated UTF-8 string)
669 * @guid_buf: buf, used to copy in GUID string. Example of value:
670 * 527c1c6d-6361-4593-8842-3c78fcd39219
671 * @guid_buf_size: @guid_buf buffer size
672 *
673 * @return:
674 * AVB_IO_RESULT_OK, on success (GUID found)
675 * AVB_IO_RESULT_ERROR_IO, if incorrect buffer size (@guid_buf_size) was
676 * provided
677 * AVB_IO_RESULT_ERROR_NO_SUCH_PARTITION, if partition was not found
678 */
679static AvbIOResult get_unique_guid_for_partition(AvbOps *ops,
680 const char *partition,
681 char *guid_buf,
682 size_t guid_buf_size)
683{
684 struct mmc_part *part;
685 size_t uuid_size;
686
687 part = get_partition(ops, partition);
688 if (!part)
689 return AVB_IO_RESULT_ERROR_NO_SUCH_PARTITION;
690
691 uuid_size = sizeof(part->info.uuid);
692 if (uuid_size > guid_buf_size)
693 return AVB_IO_RESULT_ERROR_IO;
694
695 memcpy(guid_buf, part->info.uuid, uuid_size);
696 guid_buf[uuid_size - 1] = 0;
697
698 return AVB_IO_RESULT_OK;
699}
700
701/**
702 * ============================================================================
703 * AVB2.0 AvbOps alloc/initialisation/free
704 * ============================================================================
705 */
706AvbOps *avb_ops_alloc(int boot_device)
707{
708 struct AvbOpsData *ops_data;
709
710 ops_data = avb_calloc(sizeof(struct AvbOpsData));
711 if (!ops_data)
712 return NULL;
713
714 ops_data->ops.user_data = ops_data;
715
716 ops_data->ops.read_from_partition = read_from_partition;
717 ops_data->ops.write_to_partition = write_to_partition;
718 ops_data->ops.validate_vbmeta_public_key = validate_vbmeta_public_key;
719 ops_data->ops.read_rollback_index = read_rollback_index;
720 ops_data->ops.write_rollback_index = write_rollback_index;
721 ops_data->ops.read_is_device_unlocked = read_is_device_unlocked;
722 ops_data->ops.get_unique_guid_for_partition =
723 get_unique_guid_for_partition;
724
725 ops_data->mmc_dev = boot_device;
726
727 return &ops_data->ops;
728}
729
730void avb_ops_free(AvbOps *ops)
731{
732 struct AvbOpsData *ops_data;
733
734 if (ops)
735 return;
736
737 ops_data = ops->user_data;
738
739 if (ops_data)
740 avb_free(ops_data);
741}