blob: 26330cebbd697a65d965d7bc6e8993a7a5e753b4 [file] [log] [blame]
// Copyright 2017 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "test-device.h"
#include <dirent.h>
#include <errno.h>
#include <fcntl.h>
#include <fuchsia/device/c/fidl.h>
#include <fuchsia/device/llcpp/fidl.h>
#include <fuchsia/hardware/ramdisk/c/fidl.h>
#include <inttypes.h>
#include <lib/fdio/unsafe.h>
#include <lib/fdio/watcher.h>
#include <lib/fzl/fdio.h>
#include <lib/zircon-internal/debug.h>
#include <lib/zx/clock.h>
#include <lib/zx/fifo.h>
#include <lib/zx/vmo.h>
#include <stddef.h>
#include <stdint.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <threads.h>
#include <unistd.h>
#include <zircon/assert.h>
#include <zircon/types.h>
#include <memory>
#include <fbl/algorithm.h>
#include <fbl/auto_call.h>
#include <fbl/auto_lock.h>
#include <fbl/string.h>
#include <fbl/string_piece.h> // for constexpr_strlen
#include <fbl/unique_fd.h>
#include <fs-management/fvm.h>
#include <fs-management/mount.h>
#include <fvm/format.h>
#include <ramdevice-client/ramdisk.h>
#include <unittest/unittest.h>
#include <zxcrypt/fdio-volume.h>
#include <zxcrypt/volume.h>
#define ZXDEBUG 0
namespace zxcrypt {
namespace testing {
namespace {
// No test step should take longer than this
const zx::duration kTimeout = zx::sec(3);
// FVM driver library
const char* kFvmDriver = "/boot/driver/fvm.so";
// Translates |result| into a zx_status_t.
zx_status_t ToStatus(ssize_t result) {
return result < 0 ? static_cast<zx_status_t>(result) : ZX_OK;
}
// Helper function to build error messages
char* Error(const char* fmt, ...) {
static char err[256];
va_list ap;
va_start(ap, fmt);
vsnprintf(err, sizeof(err), fmt, ap);
va_end(ap);
return err;
}
} // namespace
TestDevice::TestDevice()
: ramdisk_(nullptr),
block_count_(0),
block_size_(0),
client_(nullptr),
tid_(0),
need_join_(false),
wake_after_(0),
wake_deadline_(0) {
memset(fvm_part_path_, 0, sizeof(fvm_part_path_));
memset(&req_, 0, sizeof(req_));
}
TestDevice::~TestDevice() {
Disconnect();
DestroyRamdisk();
if (need_join_) {
int res;
thrd_join(tid_, &res);
}
}
bool TestDevice::SetupDevmgr() {
BEGIN_HELPER;
devmgr_launcher::Args args;
// Assume we're using the zxcrypt.so and ramdisk driver from /boot. It's
// not quite hermetic the way we might like, but it's good enough in
// practice -- zxcrypt is part of the bootfs anyway, so on any system you'd
// be able to install and use zxcrypt, you'd have the same lib in /boot.
args.driver_search_paths.push_back("/boot/driver");
// Preload the sysdev driver.
args.load_drivers.push_back(devmgr_integration_test::IsolatedDevmgr::kSysdevDriver);
// And make sure it's the test sysdev driver.
args.sys_device_driver = devmgr_integration_test::IsolatedDevmgr::kSysdevDriver;
// We explicitly bind drivers ourselves, and don't want the block watcher
// racing with us to call Bind.
args.disable_block_watcher = true;
// We have no need for the netsvc.
args.disable_netsvc = true;
ASSERT_EQ(devmgr_integration_test::IsolatedDevmgr::Create(std::move(args), &devmgr_), ZX_OK);
fbl::unique_fd ctl;
ASSERT_EQ(
devmgr_integration_test::RecursiveWaitForFile(devmgr_.devfs_root(), "misc/ramctl", &ctl),
ZX_OK);
END_HELPER;
}
bool TestDevice::Create(size_t device_size, size_t block_size, bool fvm) {
BEGIN_HELPER;
ASSERT_LT(device_size, SSIZE_MAX);
if (fvm) {
ASSERT_TRUE(CreateFvmPart(device_size, block_size));
} else {
ASSERT_TRUE(CreateRamdisk(device_size, block_size));
}
// TODO(aarongreen): See ZX-1130. The code below should be enabled when that bug is fixed.
#if 0
crypto::digest::Algorithm digest;
switch (version) {
case Volume::kAES256_XTS_SHA256:
digest = crypto::digest::kSHA256;
break;
default:
digest = crypto::digest::kUninitialized;
break;
}
size_t digest_len;
key_.Reset();
if ((rc = crypto::digest::GetDigestLen(digest, &digest_len)) != ZX_OK ||
(rc = key_.Randomize(digest_len)) != ZX_OK) {
return rc;
}
#else
uint8_t* buf;
ASSERT_OK(key_.Allocate(kZx1130KeyLen, &buf));
memset(buf, 0, key_.len());
#endif
END_HELPER;
}
bool TestDevice::Bind(Volume::Version version, bool fvm) {
BEGIN_HELPER;
ASSERT_TRUE(Create(kDeviceSize, kBlockSize, fvm));
ASSERT_OK(FdioVolume::Create(parent(), devfs_root(), key_));
ASSERT_TRUE(Connect());
END_HELPER;
}
bool TestDevice::BindFvmDriver() {
BEGIN_HELPER;
// Binds the FVM driver to the active ramdisk_.
fdio_t* io = fdio_unsafe_fd_to_io(ramdisk_get_block_fd(ramdisk_));
ASSERT_NONNULL(io);
auto resp = ::llcpp::fuchsia::device::Controller::Call::Bind(
zx::unowned_channel(fdio_unsafe_borrow_channel(io)),
::fidl::StringView(kFvmDriver, strlen(kFvmDriver)));
zx_status_t status = resp.status();
fdio_unsafe_release(io);
ASSERT_EQ(status, ZX_OK);
ASSERT_TRUE(resp->result.is_response());
END_HELPER;
}
bool TestDevice::Rebind() {
BEGIN_HELPER;
const char* sep = strrchr(ramdisk_get_path(ramdisk_), '/');
ASSERT_NONNULL(sep);
Disconnect();
zxcrypt_.reset();
fvm_part_.reset();
if (strlen(fvm_part_path_) != 0) {
// We need to explicitly rebind FVM here, since now that we're not
// relying on the system-wide block-watcher, the driver won't rebind by
// itself.
fdio_t* io = fdio_unsafe_fd_to_io(ramdisk_get_block_fd(ramdisk_));
ASSERT_NONNULL(io);
zx_status_t call_status = ZX_OK;;
auto resp = ::llcpp::fuchsia::device::Controller::Call::Rebind(
zx::unowned_channel(fdio_unsafe_borrow_channel(io)),
::fidl::StringView(kFvmDriver, strlen(kFvmDriver)));
zx_status_t status = resp.status();
if (resp->result.is_err()) {
call_status = resp->result.err();
}
fdio_unsafe_release(io);
ASSERT_OK(status);
ASSERT_OK(call_status);
fbl::unique_fd dev_root = devfs_root();
ASSERT_EQ(devmgr_integration_test::RecursiveWaitForFile(dev_root, fvm_part_path_, &fvm_part_),
ZX_OK);
parent_caller_.reset(fvm_part_.get());
} else {
ASSERT_EQ(ramdisk_rebind(ramdisk_), ZX_OK);
parent_caller_.reset(ramdisk_get_block_fd(ramdisk_));
}
ASSERT_TRUE(Connect());
END_HELPER;
}
bool TestDevice::SleepUntil(uint64_t num, bool deferred) {
BEGIN_HELPER;
fbl::AutoLock lock(&lock_);
ASSERT_EQ(wake_after_, 0);
ASSERT_NE(num, 0);
wake_after_ = num;
wake_deadline_ = zx::deadline_after(kTimeout);
ASSERT_EQ(thrd_create(&tid_, TestDevice::WakeThread, this), thrd_success);
need_join_ = true;
if (deferred) {
uint32_t flags = fuchsia_hardware_ramdisk_RAMDISK_FLAG_RESUME_ON_WAKE;
ASSERT_OK(ramdisk_set_flags(ramdisk_, flags));
}
uint64_t sleep_after = 0;
ASSERT_OK(ramdisk_sleep_after(ramdisk_, sleep_after));
END_HELPER;
}
bool TestDevice::WakeUp() {
BEGIN_HELPER;
if (need_join_) {
fbl::AutoLock lock(&lock_);
ASSERT_NE(wake_after_, 0);
int res;
ASSERT_EQ(thrd_join(tid_, &res), thrd_success);
need_join_ = false;
wake_after_ = 0;
EXPECT_EQ(res, 0);
}
END_HELPER;
}
int TestDevice::WakeThread(void* arg) {
TestDevice* device = static_cast<TestDevice*>(arg);
fbl::AutoLock lock(&device->lock_);
// Always send a wake-up call; even if we failed to go to sleep.
auto cleanup = fbl::MakeAutoCall([&] { ramdisk_wake(device->ramdisk_); });
// Loop until timeout, |wake_after_| txns received, or error getting counts
ramdisk_block_write_counts_t counts;
do {
zx::nanosleep(zx::deadline_after(zx::msec(100)));
if (device->wake_deadline_ < zx::clock::get_monotonic()) {
printf("Received %lu of %lu transactions before timing out.\n", counts.received,
device->wake_after_);
return ZX_ERR_TIMED_OUT;
}
zx_status_t status = ramdisk_get_block_counts(device->ramdisk_, &counts);
if (status != ZX_OK) {
return status;
}
} while (counts.received < device->wake_after_);
return ZX_OK;
}
bool TestDevice::ReadFd(zx_off_t off, size_t len) {
BEGIN_HELPER;
ASSERT_OK(ToStatus(lseek(off)));
ASSERT_OK(ToStatus(read(off, len)));
ASSERT_EQ(memcmp(as_read_.get() + off, to_write_.get() + off, len), 0);
END_HELPER;
}
bool TestDevice::WriteFd(zx_off_t off, size_t len) {
BEGIN_HELPER;
ASSERT_OK(ToStatus(lseek(off)));
ASSERT_OK(ToStatus(write(off, len)));
END_HELPER;
}
bool TestDevice::ReadVmo(zx_off_t off, size_t len) {
BEGIN_HELPER;
ASSERT_OK(block_fifo_txn(BLOCKIO_READ, off, len));
off *= block_size_;
len *= block_size_;
ASSERT_OK(vmo_read(off, len));
ASSERT_EQ(memcmp(as_read_.get() + off, to_write_.get() + off, len), 0);
END_HELPER;
}
bool TestDevice::WriteVmo(zx_off_t off, size_t len) {
BEGIN_HELPER;
ASSERT_OK(vmo_write(off * block_size_, len * block_size_));
ASSERT_OK(block_fifo_txn(BLOCKIO_WRITE, off, len));
END_HELPER;
}
bool TestDevice::Corrupt(uint64_t blkno, key_slot_t slot) {
BEGIN_HELPER;
uint8_t block[block_size_];
fbl::unique_fd fd = parent();
ASSERT_OK(ToStatus(::lseek(fd.get(), blkno * block_size_, SEEK_SET)));
ASSERT_OK(ToStatus(::read(fd.get(), block, block_size_)));
std::unique_ptr<FdioVolume> volume;
ASSERT_OK(FdioVolume::Unlock(parent(), devfs_root(), key_, 0, &volume));
zx_off_t off;
ASSERT_OK(volume->GetSlotOffset(slot, &off));
int flip = 1U << (rand() % 8);
block[off] ^= static_cast<uint8_t>(flip);
ASSERT_OK(ToStatus(::lseek(fd.get(), blkno * block_size_, SEEK_SET)));
ASSERT_OK(ToStatus(::write(fd.get(), block, block_size_)));
END_HELPER;
}
// Private methods
bool TestDevice::CreateRamdisk(size_t device_size, size_t block_size) {
BEGIN_HELPER;
fbl::AllocChecker ac;
size_t count = fbl::round_up(device_size, block_size) / block_size;
to_write_.reset(new (&ac) uint8_t[device_size]);
ASSERT_TRUE(ac.check());
for (size_t i = 0; i < device_size; ++i) {
to_write_[i] = static_cast<uint8_t>(rand());
}
as_read_.reset(new (&ac) uint8_t[device_size]);
ASSERT_TRUE(ac.check());
memset(as_read_.get(), 0, block_size);
fbl::unique_fd devfs_root_fd = devfs_root();
ASSERT_EQ(ramdisk_create_at(devfs_root_fd.get(), block_size, count, &ramdisk_), ZX_OK);
fbl::unique_fd ramdisk_ignored;
devmgr_integration_test::RecursiveWaitForFile(devfs_root_fd, ramdisk_get_path(ramdisk_),
&ramdisk_ignored);
parent_caller_.reset(ramdisk_get_block_fd(ramdisk_));
block_size_ = block_size;
block_count_ = count;
END_HELPER;
}
void TestDevice::DestroyRamdisk() {
if (ramdisk_ != nullptr) {
ramdisk_destroy(ramdisk_);
ramdisk_ = nullptr;
}
}
// Creates a ramdisk, formats it, and binds to it.
bool TestDevice::CreateFvmPart(size_t device_size, size_t block_size) {
BEGIN_HELPER;
// Calculate total size of data + metadata.
device_size = fbl::round_up(device_size, fvm::kBlockSize);
size_t old_meta = fvm::MetadataSize(device_size, fvm::kBlockSize);
size_t new_meta = fvm::MetadataSize(old_meta + device_size, fvm::kBlockSize);
while (old_meta != new_meta) {
old_meta = new_meta;
new_meta = fvm::MetadataSize(old_meta + device_size, fvm::kBlockSize);
}
ASSERT_TRUE(CreateRamdisk(device_size + (new_meta * 2), block_size));
// Format the ramdisk as FVM
ASSERT_OK(fvm_init(ramdisk_get_block_fd(ramdisk_), fvm::kBlockSize));
// Bind the FVM driver to the now-formatted disk
ASSERT_TRUE(BindFvmDriver());
// Wait for the FVM driver to expose a block device, then open it
char path[PATH_MAX];
snprintf(path, sizeof(path), "%s/fvm", ramdisk_get_path(ramdisk_));
fbl::unique_fd dev_root = devfs_root();
fbl::unique_fd fvm_fd;
ASSERT_EQ(devmgr_integration_test::RecursiveWaitForFile(dev_root, path, &fvm_fd), ZX_OK);
// Allocate a FVM partition with the last slice unallocated.
alloc_req_t req;
memset(&req, 0, sizeof(alloc_req_t));
req.slice_count = (kDeviceSize / fvm::kBlockSize) - 1;
memcpy(req.type, zxcrypt_magic, sizeof(zxcrypt_magic));
for (uint8_t i = 0; i < BLOCK_GUID_LEN; ++i) {
req.guid[i] = i;
}
snprintf(req.name, BLOCK_NAME_LEN, "data");
fvm_part_.reset(fvm_allocate_partition_with_devfs(dev_root.get(), fvm_fd.get(), &req));
ASSERT_TRUE(fvm_part_);
parent_caller_.reset(fvm_part_.get());
// Save the topological path for rebinding. The topological path will be
// consistent after rebinding the ramdisk, whereas the
// /dev/class/block/[NNN] will issue a new number.
size_t out_len;
zx_status_t status;
zx_status_t call_status;
auto resp = ::llcpp::fuchsia::device::Controller::Call::GetTopologicalPath(
zx::unowned_channel(parent_channel()->get()));
status = resp.status();
if (resp->result.is_err()) {
call_status = resp->result.err();
} else {
call_status = ZX_OK;
auto r = resp->result.response();
out_len = r.path.size();
memcpy(fvm_part_path_, r.path.data(), r.path.size());
}
ASSERT_EQ(status, ZX_OK);
ASSERT_EQ(call_status, ZX_OK);
// Strip off the leading /dev/; because we use an isolated devmgr, we need
// relative paths, but ControllerGetTopologicalPath returns an absolute path
// with the assumption that devfs is rooted at /dev.
size_t header_len = fbl::constexpr_strlen("/dev/");
ASSERT_TRUE(out_len > header_len);
ASSERT_TRUE(strncmp(fvm_part_path_, "/dev/", header_len) == 0);
memmove(fvm_part_path_, fvm_part_path_ + header_len, out_len - header_len);
fvm_part_path_[out_len - header_len] = 0;
END_HELPER;
}
bool TestDevice::Connect() {
BEGIN_HELPER;
ZX_DEBUG_ASSERT(!zxcrypt_);
ASSERT_OK(FdioVolume::Unlock(parent(), devfs_root(), key_, 0, &volume_));
zx::channel zxc_manager_chan;
ASSERT_OK(volume_->OpenManager(kTimeout, zxc_manager_chan.reset_and_get_address()));
FdioVolumeManager volume_manager(std::move(zxc_manager_chan));
zx_status_t rc;
// Unseal may fail because the volume is already unsealed, so we also allow
// ZX_ERR_INVALID_STATE here. If we fail to unseal the volume, the
// volume_->Open() call below will fail, so this is safe to ignore.
rc = volume_manager.Unseal(key_.get(), key_.len(), 0);
ASSERT_TRUE(rc == ZX_OK || rc == ZX_ERR_BAD_STATE);
ASSERT_OK(volume_->Open(kTimeout, &zxcrypt_));
zxcrypt_caller_.reset(zxcrypt_.get());
fuchsia_hardware_block_BlockInfo block_info;
zx_status_t status;
ASSERT_OK(fuchsia_hardware_block_BlockGetInfo(zxcrypt_channel()->get(), &status, &block_info));
ASSERT_OK(status);
block_size_ = block_info.block_size;
block_count_ = block_info.block_count;
zx::fifo fifo;
ASSERT_OK(fuchsia_hardware_block_BlockGetFifo(zxcrypt_channel()->get(), &status,
fifo.reset_and_get_address()));
ASSERT_OK(status);
req_.group = 0;
ASSERT_OK(block_fifo_create_client(fifo.release(), &client_));
// Create the vmo and get a transferable handle to give to the block server
ASSERT_OK(zx::vmo::create(size(), 0, &vmo_));
zx::vmo xfer_vmo;
ASSERT_EQ(vmo_.duplicate(ZX_RIGHT_SAME_RIGHTS, &xfer_vmo), ZX_OK);
fuchsia_hardware_block_VmoID vmoid;
ASSERT_OK(fuchsia_hardware_block_BlockAttachVmo(zxcrypt_channel()->get(), xfer_vmo.release(),
&status, &vmoid));
ASSERT_OK(status);
req_.vmoid = vmoid.id;
END_HELPER;
}
void TestDevice::Disconnect() {
if (volume_) {
zx::channel zxc_manager_chan;
volume_->OpenManager(kTimeout, zxc_manager_chan.reset_and_get_address());
if (zxc_manager_chan) {
FdioVolumeManager volume_manager(std::move(zxc_manager_chan));
volume_manager.Seal();
}
}
if (client_) {
memset(&req_, 0, sizeof(req_));
block_fifo_release_client(client_);
client_ = nullptr;
}
zxcrypt_.reset();
volume_.reset();
block_size_ = 0;
block_count_ = 0;
vmo_.reset();
}
} // namespace testing
} // namespace zxcrypt