blob: 41afd73e9107637b9db93e41108a7201acd1f2b1 [file] [log] [blame]
// Copyright 2020 The Fuchsia Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
use {
crate::{builtin::capability::BuiltinCapability, capability::*},
anyhow::Error,
async_trait::async_trait,
cm_rust::CapabilityName,
fidl_fuchsia_boot as fboot,
fuchsia_zircon::{self as zx, DebugLog, DebugLogOpts, HandleBased, Resource},
futures::prelude::*,
lazy_static::lazy_static,
std::sync::Arc,
};
lazy_static! {
static ref READ_ONLY_LOG_CAPABILITY_NAME: CapabilityName = "fuchsia.boot.ReadOnlyLog".into();
static ref WRITE_ONLY_LOG_CAPABILITY_NAME: CapabilityName = "fuchsia.boot.WriteOnlyLog".into();
}
/// An implementation of the `fuchsia.boot.ReadOnlyLog` protocol.
pub struct ReadOnlyLog {
resource: Resource,
}
impl ReadOnlyLog {
/// Create a service to provide a read-only version of the kernel log.
/// Note that the root resource is passed in here, rather than a read-only log handle to be
/// duplicated, because a fresh debuglog (LogDispatcher) object needs to be returned for each call.
/// This is because LogDispatcher holds the implicit read location for reading from the log, so if a
/// handle to the same object was duplicated, this would mistakenly share read location amongst all
/// retrievals.
pub fn new(resource: Resource) -> Arc<Self> {
Arc::new(Self { resource })
}
}
#[async_trait]
impl BuiltinCapability for ReadOnlyLog {
const NAME: &'static str = "ReadOnlyLog";
type Marker = fboot::ReadOnlyLogMarker;
async fn serve(
self: Arc<Self>,
mut stream: fboot::ReadOnlyLogRequestStream,
) -> Result<(), Error> {
while let Some(fboot::ReadOnlyLogRequest::Get { responder }) = stream.try_next().await? {
let debuglog = DebugLog::create(&self.resource, DebugLogOpts::READABLE)?;
// If `READABLE` is set, then the rights for the debuglog include `READ`. However, we
// must remove the `WRITE` right, as we want to provide a read-only debuglog.
let readonly = debuglog
.replace_handle(zx::Rights::BASIC | zx::Rights::READ | zx::Rights::SIGNAL)?;
responder.send(readonly)?;
}
Ok(())
}
fn matches_routed_capability(&self, capability: &InternalCapability) -> bool {
capability.matches_protocol(&READ_ONLY_LOG_CAPABILITY_NAME)
}
}
/// An implementation of the `fuchsia.boot.WriteOnlyLog` protocol.
pub struct WriteOnlyLog {
debuglog: DebugLog,
}
impl WriteOnlyLog {
pub fn new(debuglog: DebugLog) -> Arc<Self> {
Arc::new(Self { debuglog })
}
}
#[async_trait]
impl BuiltinCapability for WriteOnlyLog {
const NAME: &'static str = "WriteOnlyLog";
type Marker = fboot::WriteOnlyLogMarker;
async fn serve(
self: Arc<Self>,
mut stream: fboot::WriteOnlyLogRequestStream,
) -> Result<(), Error> {
while let Some(fboot::WriteOnlyLogRequest::Get { responder }) = stream.try_next().await? {
responder.send(self.debuglog.duplicate_handle(zx::Rights::SAME_RIGHTS)?)?;
}
Ok(())
}
fn matches_routed_capability(&self, capability: &InternalCapability) -> bool {
capability.matches_protocol(&WRITE_ONLY_LOG_CAPABILITY_NAME)
}
}
#[cfg(test)]
mod tests {
use {
super::*,
crate::model::hooks::{Event, EventPayload, Hooks},
fidl::endpoints::ClientEnd,
fuchsia_async as fasync,
fuchsia_zircon::AsHandleRef,
fuchsia_zircon_sys as sys,
futures::lock::Mutex,
moniker::AbsoluteMoniker,
std::path::PathBuf,
};
#[fasync::run_singlethreaded(test)]
async fn has_correct_rights_for_read_only() -> Result<(), Error> {
// The kernel does not currently require a valid `Resource` to be
// provided when creating a `Debuglog`. This will change in the future.
let read_only_log = ReadOnlyLog::new(Resource::from(zx::Handle::invalid()));
let (proxy, stream) =
fidl::endpoints::create_proxy_and_stream::<fboot::ReadOnlyLogMarker>()?;
fasync::Task::local(
read_only_log
.serve(stream)
.unwrap_or_else(|err| panic!("Error serving read-only log: {}", err)),
)
.detach();
let read_only_log = proxy.get().await?;
let info = zx::Handle::from(read_only_log).basic_info()?;
assert_eq!(info.rights, zx::Rights::BASIC | zx::Rights::READ | zx::Rights::SIGNAL);
Ok(())
}
#[fasync::run_singlethreaded(test)]
async fn can_connect_to_read_only() -> Result<(), Error> {
// The kernel does not currently require a valid `Resource` to be
// provided when creating a `Debuglog`. This will change in the future.
let read_only_log = ReadOnlyLog::new(Resource::from(zx::Handle::invalid()));
let hooks = Hooks::new(None);
hooks.install(read_only_log.hooks()).await;
let provider = Arc::new(Mutex::new(None));
let source = CapabilitySource::Builtin {
capability: InternalCapability::Protocol(READ_ONLY_LOG_CAPABILITY_NAME.clone()),
};
let event = Event::new_for_test(
AbsoluteMoniker::root(),
"fuchsia-pkg://root",
Ok(EventPayload::CapabilityRouted { source, capability_provider: provider.clone() }),
);
hooks.dispatch(&event).await?;
let (client, mut server) = zx::Channel::create()?;
if let Some(provider) = provider.lock().await.take() {
provider.open(0, 0, PathBuf::new(), &mut server).await?;
}
let client = ClientEnd::<fboot::ReadOnlyLogMarker>::new(client)
.into_proxy()
.expect("Failed to create proxy");
let handle = client.get().await?;
assert_ne!(handle.raw_handle(), sys::ZX_HANDLE_INVALID);
let mut record = Vec::new();
handle.read(&mut record)?;
let message: [u8; 0] = [];
assert!(handle.write(&message).is_err());
Ok(())
}
#[fasync::run_singlethreaded(test)]
async fn has_correct_rights_for_write_only() -> Result<(), Error> {
// The kernel does not currently require a valid `Resource` to be
// provided when creating a `Debuglog`. This will change in the future.
let resource = Resource::from(zx::Handle::invalid());
let write_only_log =
WriteOnlyLog::new(zx::DebugLog::create(&resource, zx::DebugLogOpts::empty()).unwrap());
let (proxy, stream) =
fidl::endpoints::create_proxy_and_stream::<fboot::WriteOnlyLogMarker>()?;
fasync::Task::local(
write_only_log
.serve(stream)
.unwrap_or_else(|err| panic!("Error serving write-only log: {}", err)),
)
.detach();
let write_only_log = proxy.get().await?;
let info = zx::Handle::from(write_only_log).basic_info()?;
assert_eq!(info.rights, zx::Rights::BASIC | zx::Rights::WRITE | zx::Rights::SIGNAL);
Ok(())
}
#[fasync::run_singlethreaded(test)]
async fn can_connect_to_write_only() -> Result<(), Error> {
// The kernel does not currently require a valid `Resource` to be
// provided when creating a `Debuglog`. This will change in the future.
let resource = Resource::from(zx::Handle::invalid());
let write_only_log =
WriteOnlyLog::new(zx::DebugLog::create(&resource, zx::DebugLogOpts::empty()).unwrap());
let hooks = Hooks::new(None);
hooks.install(write_only_log.hooks()).await;
let provider = Arc::new(Mutex::new(None));
let source = CapabilitySource::Builtin {
capability: InternalCapability::Protocol(WRITE_ONLY_LOG_CAPABILITY_NAME.clone()),
};
let event = Event::new_for_test(
AbsoluteMoniker::root(),
"fuchsia-pkg://root",
Ok(EventPayload::CapabilityRouted { source, capability_provider: provider.clone() }),
);
hooks.dispatch(&event).await?;
let (client, mut server) = zx::Channel::create()?;
if let Some(provider) = provider.lock().await.take() {
provider.open(0, 0, PathBuf::new(), &mut server).await?;
}
let client = ClientEnd::<fboot::WriteOnlyLogMarker>::new(client)
.into_proxy()
.expect("Failed to create proxy");
let handle = client.get().await?;
assert_ne!(handle.raw_handle(), sys::ZX_HANDLE_INVALID);
let mut record = Vec::new();
assert!(handle.read(&mut record).is_err());
let message: [u8; 0] = [];
handle.write(&message)?;
Ok(())
}
}