You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1439 lines
52 KiB
1439 lines
52 KiB
//
|
|
// Copyright (C) 2012 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
//
|
|
|
|
#include "update_engine/cros/payload_state.h"
|
|
|
|
#include <algorithm>
|
|
#include <string>
|
|
|
|
#include <base/logging.h>
|
|
#include <base/strings/string_util.h>
|
|
#include <base/strings/stringprintf.h>
|
|
#include <metrics/metrics_library.h>
|
|
#include <policy/device_policy.h>
|
|
|
|
#include "update_engine/common/clock.h"
|
|
#include "update_engine/common/constants.h"
|
|
#include "update_engine/common/error_code_utils.h"
|
|
#include "update_engine/common/hardware_interface.h"
|
|
#include "update_engine/common/metrics_reporter_interface.h"
|
|
#include "update_engine/common/prefs.h"
|
|
#include "update_engine/common/system_state.h"
|
|
#include "update_engine/common/utils.h"
|
|
#include "update_engine/cros/connection_manager_interface.h"
|
|
#include "update_engine/cros/omaha_request_params.h"
|
|
#include "update_engine/cros/update_attempter.h"
|
|
#include "update_engine/metrics_utils.h"
|
|
#include "update_engine/payload_consumer/install_plan.h"
|
|
|
|
using base::Time;
|
|
using base::TimeDelta;
|
|
using std::min;
|
|
using std::string;
|
|
|
|
namespace chromeos_update_engine {
|
|
|
|
using metrics_utils::GetPersistedValue;
|
|
|
|
const TimeDelta PayloadState::kDurationSlack = TimeDelta::FromSeconds(600);
|
|
|
|
// We want to upperbound backoffs to 16 days
|
|
static const int kMaxBackoffDays = 16;
|
|
|
|
// We want to randomize retry attempts after the backoff by +/- 6 hours.
|
|
static const uint32_t kMaxBackoffFuzzMinutes = 12 * 60;
|
|
|
|
// Limit persisting current update duration uptime to once per second
|
|
static const uint64_t kUptimeResolution = 1;
|
|
|
|
PayloadState::PayloadState()
|
|
: prefs_(nullptr),
|
|
powerwash_safe_prefs_(nullptr),
|
|
excluder_(nullptr),
|
|
using_p2p_for_downloading_(false),
|
|
p2p_num_attempts_(0),
|
|
payload_attempt_number_(0),
|
|
full_payload_attempt_number_(0),
|
|
url_index_(0),
|
|
url_failure_count_(0),
|
|
url_switch_count_(0),
|
|
rollback_happened_(false),
|
|
attempt_num_bytes_downloaded_(0),
|
|
attempt_connection_type_(metrics::ConnectionType::kUnknown),
|
|
attempt_type_(AttemptType::kUpdate) {
|
|
for (int i = 0; i <= kNumDownloadSources; i++)
|
|
total_bytes_downloaded_[i] = current_bytes_downloaded_[i] = 0;
|
|
}
|
|
|
|
bool PayloadState::Initialize() {
|
|
prefs_ = SystemState::Get()->prefs();
|
|
powerwash_safe_prefs_ = SystemState::Get()->powerwash_safe_prefs();
|
|
excluder_ = SystemState::Get()->update_attempter()->GetExcluder();
|
|
LoadResponseSignature();
|
|
LoadPayloadAttemptNumber();
|
|
LoadFullPayloadAttemptNumber();
|
|
LoadUrlIndex();
|
|
LoadUrlFailureCount();
|
|
LoadUrlSwitchCount();
|
|
LoadBackoffExpiryTime();
|
|
LoadUpdateTimestampStart();
|
|
// The LoadUpdateDurationUptime() method relies on LoadUpdateTimestampStart()
|
|
// being called before it. Don't reorder.
|
|
LoadUpdateDurationUptime();
|
|
for (int i = 0; i < kNumDownloadSources; i++) {
|
|
DownloadSource source = static_cast<DownloadSource>(i);
|
|
LoadCurrentBytesDownloaded(source);
|
|
LoadTotalBytesDownloaded(source);
|
|
}
|
|
LoadNumReboots();
|
|
LoadNumResponsesSeen();
|
|
LoadRollbackHappened();
|
|
LoadRollbackVersion();
|
|
LoadP2PFirstAttemptTimestamp();
|
|
LoadP2PNumAttempts();
|
|
return true;
|
|
}
|
|
|
|
void PayloadState::SetResponse(const OmahaResponse& omaha_response) {
|
|
// Always store the latest response.
|
|
response_ = omaha_response;
|
|
|
|
// Compute the candidate URLs first as they are used to calculate the
|
|
// response signature so that a change in enterprise policy for
|
|
// HTTP downloads being enabled or not could be honored as soon as the
|
|
// next update check happens.
|
|
ComputeCandidateUrls();
|
|
|
|
// Check if the "signature" of this response (i.e. the fields we care about)
|
|
// has changed.
|
|
string new_response_signature = CalculateResponseSignature();
|
|
bool has_response_changed = (response_signature_ != new_response_signature);
|
|
|
|
// If the response has changed, we should persist the new signature and
|
|
// clear away all the existing state.
|
|
if (has_response_changed) {
|
|
LOG(INFO) << "Resetting all persisted state as this is a new response";
|
|
SetNumResponsesSeen(num_responses_seen_ + 1);
|
|
SetResponseSignature(new_response_signature);
|
|
ResetPersistedState();
|
|
return;
|
|
}
|
|
|
|
// Always start from payload index 0, even for resume, to download partition
|
|
// info from previous payloads.
|
|
payload_index_ = 0;
|
|
|
|
// This is the earliest point at which we can validate whether the URL index
|
|
// we loaded from the persisted state is a valid value. If the response
|
|
// hasn't changed but the URL index is invalid, it's indicative of some
|
|
// tampering of the persisted state.
|
|
if (payload_index_ >= candidate_urls_.size() ||
|
|
url_index_ >= candidate_urls_[payload_index_].size()) {
|
|
LOG(INFO) << "Resetting all payload state as the url index seems to have "
|
|
"been tampered with";
|
|
ResetPersistedState();
|
|
return;
|
|
}
|
|
|
|
// Update the current download source which depends on the latest value of
|
|
// the response.
|
|
UpdateCurrentDownloadSource();
|
|
}
|
|
|
|
void PayloadState::SetUsingP2PForDownloading(bool value) {
|
|
using_p2p_for_downloading_ = value;
|
|
// Update the current download source which depends on whether we are
|
|
// using p2p or not.
|
|
UpdateCurrentDownloadSource();
|
|
}
|
|
|
|
void PayloadState::DownloadComplete() {
|
|
LOG(INFO) << "Payload downloaded successfully";
|
|
IncrementPayloadAttemptNumber();
|
|
IncrementFullPayloadAttemptNumber();
|
|
}
|
|
|
|
void PayloadState::DownloadProgress(size_t count) {
|
|
if (count == 0)
|
|
return;
|
|
|
|
CalculateUpdateDurationUptime();
|
|
UpdateBytesDownloaded(count);
|
|
|
|
// We've received non-zero bytes from a recent download operation. Since our
|
|
// URL failure count is meant to penalize a URL only for consecutive
|
|
// failures, downloading bytes successfully means we should reset the failure
|
|
// count (as we know at least that the URL is working). In future, we can
|
|
// design this to be more sophisticated to check for more intelligent failure
|
|
// patterns, but right now, even 1 byte downloaded will mark the URL to be
|
|
// good unless it hits 10 (or configured number of) consecutive failures
|
|
// again.
|
|
|
|
if (GetUrlFailureCount() == 0)
|
|
return;
|
|
|
|
LOG(INFO) << "Resetting failure count of Url" << GetUrlIndex()
|
|
<< " to 0 as we received " << count << " bytes successfully";
|
|
SetUrlFailureCount(0);
|
|
}
|
|
|
|
void PayloadState::AttemptStarted(AttemptType attempt_type) {
|
|
// Flush previous state from abnormal attempt failure, if any.
|
|
ReportAndClearPersistedAttemptMetrics();
|
|
|
|
attempt_type_ = attempt_type;
|
|
|
|
const auto* clock = SystemState::Get()->clock();
|
|
attempt_start_time_boot_ = clock->GetBootTime();
|
|
attempt_start_time_monotonic_ = clock->GetMonotonicTime();
|
|
attempt_num_bytes_downloaded_ = 0;
|
|
|
|
metrics::ConnectionType type;
|
|
ConnectionType network_connection_type;
|
|
ConnectionTethering tethering;
|
|
ConnectionManagerInterface* connection_manager =
|
|
SystemState::Get()->connection_manager();
|
|
if (!connection_manager->GetConnectionProperties(&network_connection_type,
|
|
&tethering)) {
|
|
LOG(ERROR) << "Failed to determine connection type.";
|
|
type = metrics::ConnectionType::kUnknown;
|
|
} else {
|
|
type = metrics_utils::GetConnectionType(network_connection_type, tethering);
|
|
}
|
|
attempt_connection_type_ = type;
|
|
|
|
if (attempt_type == AttemptType::kUpdate)
|
|
PersistAttemptMetrics();
|
|
}
|
|
|
|
void PayloadState::UpdateResumed() {
|
|
LOG(INFO) << "Resuming an update that was previously started.";
|
|
UpdateNumReboots();
|
|
AttemptStarted(AttemptType::kUpdate);
|
|
}
|
|
|
|
void PayloadState::UpdateRestarted() {
|
|
LOG(INFO) << "Starting a new update";
|
|
ResetDownloadSourcesOnNewUpdate();
|
|
SetNumReboots(0);
|
|
AttemptStarted(AttemptType::kUpdate);
|
|
}
|
|
|
|
void PayloadState::UpdateSucceeded() {
|
|
// Send the relevant metrics that are tracked in this class to UMA.
|
|
CalculateUpdateDurationUptime();
|
|
SetUpdateTimestampEnd(SystemState::Get()->clock()->GetWallclockTime());
|
|
|
|
switch (attempt_type_) {
|
|
case AttemptType::kUpdate:
|
|
CollectAndReportAttemptMetrics(ErrorCode::kSuccess);
|
|
CollectAndReportSuccessfulUpdateMetrics();
|
|
ClearPersistedAttemptMetrics();
|
|
break;
|
|
|
|
case AttemptType::kRollback:
|
|
SystemState::Get()->metrics_reporter()->ReportRollbackMetrics(
|
|
metrics::RollbackResult::kSuccess);
|
|
break;
|
|
}
|
|
|
|
// Reset the number of responses seen since it counts from the last
|
|
// successful update, e.g. now.
|
|
SetNumResponsesSeen(0);
|
|
SetPayloadIndex(0);
|
|
|
|
metrics_utils::SetSystemUpdatedMarker(SystemState::Get()->clock(), prefs_);
|
|
}
|
|
|
|
void PayloadState::UpdateFailed(ErrorCode error) {
|
|
ErrorCode base_error = utils::GetBaseErrorCode(error);
|
|
LOG(INFO) << "Updating payload state for error code: " << base_error << " ("
|
|
<< utils::ErrorCodeToString(base_error) << ")";
|
|
|
|
if (candidate_urls_.size() == 0) {
|
|
// This means we got this error even before we got a valid Omaha response
|
|
// or don't have any valid candidates in the Omaha response.
|
|
// So we should not advance the url_index_ in such cases.
|
|
LOG(INFO) << "Ignoring failures until we get a valid Omaha response.";
|
|
return;
|
|
}
|
|
|
|
switch (attempt_type_) {
|
|
case AttemptType::kUpdate:
|
|
CollectAndReportAttemptMetrics(base_error);
|
|
ClearPersistedAttemptMetrics();
|
|
break;
|
|
|
|
case AttemptType::kRollback:
|
|
SystemState::Get()->metrics_reporter()->ReportRollbackMetrics(
|
|
metrics::RollbackResult::kFailed);
|
|
break;
|
|
}
|
|
|
|
switch (base_error) {
|
|
// Errors which are good indicators of a problem with a particular URL or
|
|
// the protocol used in the URL or entities in the communication channel
|
|
// (e.g. proxies). We should try the next available URL in the next update
|
|
// check to quickly recover from these errors.
|
|
case ErrorCode::kPayloadHashMismatchError:
|
|
case ErrorCode::kPayloadSizeMismatchError:
|
|
case ErrorCode::kDownloadPayloadVerificationError:
|
|
case ErrorCode::kDownloadPayloadPubKeyVerificationError:
|
|
case ErrorCode::kSignedDeltaPayloadExpectedError:
|
|
case ErrorCode::kDownloadInvalidMetadataMagicString:
|
|
case ErrorCode::kDownloadSignatureMissingInManifest:
|
|
case ErrorCode::kDownloadManifestParseError:
|
|
case ErrorCode::kDownloadMetadataSignatureError:
|
|
case ErrorCode::kDownloadMetadataSignatureVerificationError:
|
|
case ErrorCode::kDownloadMetadataSignatureMismatch:
|
|
case ErrorCode::kDownloadOperationHashVerificationError:
|
|
case ErrorCode::kDownloadOperationExecutionError:
|
|
case ErrorCode::kDownloadOperationHashMismatch:
|
|
case ErrorCode::kDownloadInvalidMetadataSize:
|
|
case ErrorCode::kDownloadInvalidMetadataSignature:
|
|
case ErrorCode::kDownloadOperationHashMissingError:
|
|
case ErrorCode::kDownloadMetadataSignatureMissingError:
|
|
case ErrorCode::kPayloadMismatchedType:
|
|
case ErrorCode::kUnsupportedMajorPayloadVersion:
|
|
case ErrorCode::kUnsupportedMinorPayloadVersion:
|
|
case ErrorCode::kPayloadTimestampError:
|
|
case ErrorCode::kVerityCalculationError:
|
|
ExcludeCurrentPayload();
|
|
IncrementUrlIndex();
|
|
break;
|
|
|
|
// Errors which seem to be just transient network/communication related
|
|
// failures and do not indicate any inherent problem with the URL itself.
|
|
// So, we should keep the current URL but just increment the
|
|
// failure count to give it more chances. This way, while we maximize our
|
|
// chances of downloading from the URLs that appear earlier in the
|
|
// response (because download from a local server URL that appears earlier
|
|
// in a response is preferable than downloading from the next URL which
|
|
// could be a internet URL and thus could be more expensive).
|
|
|
|
case ErrorCode::kError:
|
|
case ErrorCode::kDownloadTransferError:
|
|
case ErrorCode::kDownloadWriteError:
|
|
case ErrorCode::kDownloadStateInitializationError:
|
|
case ErrorCode::kOmahaErrorInHTTPResponse: // Aggregate for HTTP errors.
|
|
IncrementFailureCount();
|
|
break;
|
|
|
|
// Errors which are not specific to a URL and hence shouldn't result in
|
|
// the URL being penalized. This can happen in two cases:
|
|
// 1. We haven't started downloading anything: These errors don't cost us
|
|
// anything in terms of actual payload bytes, so we should just do the
|
|
// regular retries at the next update check.
|
|
// 2. We have successfully downloaded the payload: In this case, the
|
|
// payload attempt number would have been incremented and would take care
|
|
// of the backoff at the next update check.
|
|
// In either case, there's no need to update URL index or failure count.
|
|
case ErrorCode::kOmahaRequestError:
|
|
case ErrorCode::kOmahaResponseHandlerError:
|
|
case ErrorCode::kPostinstallRunnerError:
|
|
case ErrorCode::kFilesystemCopierError:
|
|
case ErrorCode::kInstallDeviceOpenError:
|
|
case ErrorCode::kKernelDeviceOpenError:
|
|
case ErrorCode::kDownloadNewPartitionInfoError:
|
|
case ErrorCode::kNewRootfsVerificationError:
|
|
case ErrorCode::kNewKernelVerificationError:
|
|
case ErrorCode::kPostinstallBootedFromFirmwareB:
|
|
case ErrorCode::kPostinstallFirmwareRONotUpdatable:
|
|
case ErrorCode::kOmahaRequestEmptyResponseError:
|
|
case ErrorCode::kOmahaRequestXMLParseError:
|
|
case ErrorCode::kOmahaResponseInvalid:
|
|
case ErrorCode::kOmahaUpdateIgnoredPerPolicy:
|
|
case ErrorCode::kOmahaUpdateDeferredPerPolicy:
|
|
case ErrorCode::kNonCriticalUpdateInOOBE:
|
|
case ErrorCode::kOmahaUpdateDeferredForBackoff:
|
|
case ErrorCode::kPostinstallPowerwashError:
|
|
case ErrorCode::kUpdateCanceledByChannelChange:
|
|
case ErrorCode::kOmahaRequestXMLHasEntityDecl:
|
|
case ErrorCode::kFilesystemVerifierError:
|
|
case ErrorCode::kUserCanceled:
|
|
case ErrorCode::kOmahaUpdateIgnoredOverCellular:
|
|
case ErrorCode::kUpdatedButNotActive:
|
|
case ErrorCode::kNoUpdate:
|
|
case ErrorCode::kRollbackNotPossible:
|
|
case ErrorCode::kFirstActiveOmahaPingSentPersistenceError:
|
|
case ErrorCode::kInternalLibCurlError:
|
|
case ErrorCode::kUnresolvedHostError:
|
|
case ErrorCode::kUnresolvedHostRecovered:
|
|
case ErrorCode::kNotEnoughSpace:
|
|
case ErrorCode::kDeviceCorrupted:
|
|
case ErrorCode::kPackageExcludedFromUpdate:
|
|
LOG(INFO) << "Not incrementing URL index or failure count for this error";
|
|
break;
|
|
|
|
case ErrorCode::kSuccess: // success code
|
|
case ErrorCode::kUmaReportedMax: // not an error code
|
|
case ErrorCode::kOmahaRequestHTTPResponseBase: // aggregated already
|
|
case ErrorCode::kDevModeFlag: // not an error code
|
|
case ErrorCode::kResumedFlag: // not an error code
|
|
case ErrorCode::kTestImageFlag: // not an error code
|
|
case ErrorCode::kTestOmahaUrlFlag: // not an error code
|
|
case ErrorCode::kSpecialFlags: // not an error code
|
|
// These shouldn't happen. Enumerating these explicitly here so that we
|
|
// can let the compiler warn about new error codes that are added to
|
|
// action_processor.h but not added here.
|
|
LOG(WARNING) << "Unexpected error code for UpdateFailed";
|
|
break;
|
|
|
|
// Note: Not adding a default here so as to let the compiler warn us of
|
|
// any new enums that were added in the .h but not listed in this switch.
|
|
}
|
|
}
|
|
|
|
bool PayloadState::ShouldBackoffDownload() {
|
|
if (response_.disable_payload_backoff) {
|
|
LOG(INFO) << "Payload backoff logic is disabled. "
|
|
"Can proceed with the download";
|
|
return false;
|
|
}
|
|
if (GetUsingP2PForDownloading() && !GetP2PUrl().empty()) {
|
|
LOG(INFO) << "Payload backoff logic is disabled because download "
|
|
<< "will happen from local peer (via p2p).";
|
|
return false;
|
|
}
|
|
if (SystemState::Get()->request_params()->interactive()) {
|
|
LOG(INFO) << "Payload backoff disabled for interactive update checks.";
|
|
return false;
|
|
}
|
|
for (const auto& package : response_.packages) {
|
|
if (package.is_delta) {
|
|
// If delta payloads fail, we want to fallback quickly to full payloads as
|
|
// they are more likely to succeed. Exponential backoffs would greatly
|
|
// slow down the fallback to full payloads. So we don't backoff for delta
|
|
// payloads.
|
|
LOG(INFO) << "No backoffs for delta payloads. "
|
|
<< "Can proceed with the download";
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (!SystemState::Get()->hardware()->IsOfficialBuild() &&
|
|
!prefs_->Exists(kPrefsNoIgnoreBackoff)) {
|
|
// Backoffs are needed only for official builds. We do not want any delays
|
|
// or update failures due to backoffs during testing or development. Unless
|
|
// the |kPrefsNoIgnoreBackoff| is manually set.
|
|
LOG(INFO) << "No backoffs for test/dev images. "
|
|
<< "Can proceed with the download";
|
|
return false;
|
|
}
|
|
|
|
if (backoff_expiry_time_.is_null()) {
|
|
LOG(INFO) << "No backoff expiry time has been set. "
|
|
<< "Can proceed with the download";
|
|
return false;
|
|
}
|
|
|
|
if (backoff_expiry_time_ < Time::Now()) {
|
|
LOG(INFO) << "The backoff expiry time ("
|
|
<< utils::ToString(backoff_expiry_time_)
|
|
<< ") has elapsed. Can proceed with the download";
|
|
return false;
|
|
}
|
|
|
|
LOG(INFO) << "Cannot proceed with downloads as we need to backoff until "
|
|
<< utils::ToString(backoff_expiry_time_);
|
|
return true;
|
|
}
|
|
|
|
void PayloadState::Rollback() {
|
|
SetRollbackVersion(SystemState::Get()->request_params()->app_version());
|
|
AttemptStarted(AttemptType::kRollback);
|
|
}
|
|
|
|
void PayloadState::IncrementPayloadAttemptNumber() {
|
|
// Update the payload attempt number for both payload types: full and delta.
|
|
SetPayloadAttemptNumber(GetPayloadAttemptNumber() + 1);
|
|
}
|
|
|
|
void PayloadState::IncrementFullPayloadAttemptNumber() {
|
|
DCHECK(payload_index_ < response_.packages.size());
|
|
// Update the payload attempt number for full payloads and the backoff time.
|
|
if (response_.packages[payload_index_].is_delta) {
|
|
LOG(INFO) << "Not incrementing payload attempt number for delta payloads";
|
|
return;
|
|
}
|
|
|
|
LOG(INFO) << "Incrementing the full payload attempt number";
|
|
SetFullPayloadAttemptNumber(GetFullPayloadAttemptNumber() + 1);
|
|
UpdateBackoffExpiryTime();
|
|
}
|
|
|
|
void PayloadState::IncrementUrlIndex() {
|
|
DCHECK(payload_index_ < candidate_urls_.size());
|
|
size_t next_url_index = url_index_ + 1;
|
|
size_t max_url_size = candidate_urls_[payload_index_].size();
|
|
if (next_url_index < max_url_size) {
|
|
LOG(INFO) << "Incrementing the URL index for next attempt";
|
|
SetUrlIndex(next_url_index);
|
|
} else {
|
|
LOG(INFO) << "Resetting the current URL index (" << url_index_ << ") to "
|
|
<< "0 as we only have " << max_url_size << " candidate URL(s)";
|
|
SetUrlIndex(0);
|
|
IncrementPayloadAttemptNumber();
|
|
IncrementFullPayloadAttemptNumber();
|
|
}
|
|
|
|
// If we have multiple URLs, record that we just switched to another one
|
|
if (max_url_size > 1)
|
|
SetUrlSwitchCount(url_switch_count_ + 1);
|
|
|
|
// Whenever we update the URL index, we should also clear the URL failure
|
|
// count so we can start over fresh for the new URL.
|
|
SetUrlFailureCount(0);
|
|
}
|
|
|
|
void PayloadState::IncrementFailureCount() {
|
|
uint32_t next_url_failure_count = GetUrlFailureCount() + 1;
|
|
if (next_url_failure_count < response_.max_failure_count_per_url) {
|
|
LOG(INFO) << "Incrementing the URL failure count";
|
|
SetUrlFailureCount(next_url_failure_count);
|
|
} else {
|
|
LOG(INFO) << "Reached max number of failures for Url" << GetUrlIndex()
|
|
<< ". Trying next available URL";
|
|
ExcludeCurrentPayload();
|
|
IncrementUrlIndex();
|
|
}
|
|
}
|
|
|
|
void PayloadState::ExcludeCurrentPayload() {
|
|
if (payload_index_ >= response_.packages.size()) {
|
|
LOG(INFO) << "Skipping exclusion of the current payload.";
|
|
return;
|
|
}
|
|
const auto& package = response_.packages[payload_index_];
|
|
if (!package.can_exclude) {
|
|
LOG(INFO) << "Not excluding as marked non-excludable for package hash="
|
|
<< package.hash;
|
|
return;
|
|
}
|
|
auto exclusion_name = utils::GetExclusionName(GetCurrentUrl());
|
|
if (!excluder_->Exclude(exclusion_name))
|
|
LOG(WARNING) << "Failed to exclude "
|
|
<< " Package Hash=" << package.hash
|
|
<< " CurrentUrl=" << GetCurrentUrl();
|
|
else
|
|
LOG(INFO) << "Excluded "
|
|
<< " Package Hash=" << package.hash
|
|
<< " CurrentUrl=" << GetCurrentUrl();
|
|
}
|
|
|
|
void PayloadState::UpdateBackoffExpiryTime() {
|
|
if (response_.disable_payload_backoff) {
|
|
LOG(INFO) << "Resetting backoff expiry time as payload backoff is disabled";
|
|
SetBackoffExpiryTime(Time());
|
|
return;
|
|
}
|
|
|
|
if (GetFullPayloadAttemptNumber() == 0) {
|
|
SetBackoffExpiryTime(Time());
|
|
return;
|
|
}
|
|
|
|
// Since we're doing left-shift below, make sure we don't shift more
|
|
// than this. E.g. if int is 4-bytes, don't left-shift more than 30 bits,
|
|
// since we don't expect value of kMaxBackoffDays to be more than 100 anyway.
|
|
int num_days = 1; // the value to be shifted.
|
|
const int kMaxShifts = (sizeof(num_days) * 8) - 2;
|
|
|
|
// Normal backoff days is 2 raised to (payload_attempt_number - 1).
|
|
// E.g. if payload_attempt_number is over 30, limit power to 30.
|
|
int power = min(GetFullPayloadAttemptNumber() - 1, kMaxShifts);
|
|
|
|
// The number of days is the minimum of 2 raised to (payload_attempt_number
|
|
// - 1) or kMaxBackoffDays.
|
|
num_days = min(num_days << power, kMaxBackoffDays);
|
|
|
|
// We don't want all retries to happen exactly at the same time when
|
|
// retrying after backoff. So add some random minutes to fuzz.
|
|
int fuzz_minutes = utils::FuzzInt(0, kMaxBackoffFuzzMinutes);
|
|
TimeDelta next_backoff_interval =
|
|
TimeDelta::FromDays(num_days) + TimeDelta::FromMinutes(fuzz_minutes);
|
|
LOG(INFO) << "Incrementing the backoff expiry time by "
|
|
<< utils::FormatTimeDelta(next_backoff_interval);
|
|
SetBackoffExpiryTime(Time::Now() + next_backoff_interval);
|
|
}
|
|
|
|
void PayloadState::UpdateCurrentDownloadSource() {
|
|
current_download_source_ = kNumDownloadSources;
|
|
|
|
if (using_p2p_for_downloading_) {
|
|
current_download_source_ = kDownloadSourceHttpPeer;
|
|
} else if (payload_index_ < candidate_urls_.size() &&
|
|
candidate_urls_[payload_index_].size() != 0) {
|
|
const string& current_url = candidate_urls_[payload_index_][GetUrlIndex()];
|
|
if (base::StartsWith(
|
|
current_url, "https://", base::CompareCase::INSENSITIVE_ASCII)) {
|
|
current_download_source_ = kDownloadSourceHttpsServer;
|
|
} else if (base::StartsWith(current_url,
|
|
"http://",
|
|
base::CompareCase::INSENSITIVE_ASCII)) {
|
|
current_download_source_ = kDownloadSourceHttpServer;
|
|
}
|
|
}
|
|
|
|
LOG(INFO) << "Current download source: "
|
|
<< utils::ToString(current_download_source_);
|
|
}
|
|
|
|
void PayloadState::UpdateBytesDownloaded(size_t count) {
|
|
SetCurrentBytesDownloaded(
|
|
current_download_source_,
|
|
GetCurrentBytesDownloaded(current_download_source_) + count,
|
|
false);
|
|
SetTotalBytesDownloaded(
|
|
current_download_source_,
|
|
GetTotalBytesDownloaded(current_download_source_) + count,
|
|
false);
|
|
|
|
attempt_num_bytes_downloaded_ += count;
|
|
}
|
|
|
|
PayloadType PayloadState::CalculatePayloadType() {
|
|
for (const auto& package : response_.packages) {
|
|
if (package.is_delta) {
|
|
return kPayloadTypeDelta;
|
|
}
|
|
}
|
|
OmahaRequestParams* params = SystemState::Get()->request_params();
|
|
if (params->delta_okay()) {
|
|
return kPayloadTypeFull;
|
|
}
|
|
// Full payload, delta was not allowed by request.
|
|
return kPayloadTypeForcedFull;
|
|
}
|
|
|
|
void PayloadState::CollectAndReportAttemptMetrics(ErrorCode code) {
|
|
int attempt_number = GetPayloadAttemptNumber();
|
|
|
|
PayloadType payload_type = CalculatePayloadType();
|
|
|
|
int64_t payload_size = GetPayloadSize();
|
|
|
|
int64_t payload_bytes_downloaded = attempt_num_bytes_downloaded_;
|
|
|
|
const auto* clock = SystemState::Get()->clock();
|
|
TimeDelta duration = clock->GetBootTime() - attempt_start_time_boot_;
|
|
TimeDelta duration_uptime =
|
|
clock->GetMonotonicTime() - attempt_start_time_monotonic_;
|
|
|
|
int64_t payload_download_speed_bps = 0;
|
|
int64_t usec = duration_uptime.InMicroseconds();
|
|
if (usec > 0) {
|
|
double sec = static_cast<double>(usec) / Time::kMicrosecondsPerSecond;
|
|
double bps = static_cast<double>(payload_bytes_downloaded) / sec;
|
|
payload_download_speed_bps = static_cast<int64_t>(bps);
|
|
}
|
|
|
|
DownloadSource download_source = current_download_source_;
|
|
|
|
metrics::DownloadErrorCode payload_download_error_code =
|
|
metrics::DownloadErrorCode::kUnset;
|
|
ErrorCode internal_error_code = ErrorCode::kSuccess;
|
|
metrics::AttemptResult attempt_result = metrics_utils::GetAttemptResult(code);
|
|
|
|
// Add additional detail to AttemptResult
|
|
switch (attempt_result) {
|
|
case metrics::AttemptResult::kPayloadDownloadError:
|
|
payload_download_error_code = metrics_utils::GetDownloadErrorCode(code);
|
|
break;
|
|
|
|
case metrics::AttemptResult::kInternalError:
|
|
internal_error_code = code;
|
|
break;
|
|
|
|
// Explicit fall-through for cases where we do not have additional
|
|
// detail. We avoid the default keyword to force people adding new
|
|
// AttemptResult values to visit this code and examine whether
|
|
// additional detail is needed.
|
|
case metrics::AttemptResult::kUpdateSucceeded:
|
|
case metrics::AttemptResult::kMetadataMalformed:
|
|
case metrics::AttemptResult::kOperationMalformed:
|
|
case metrics::AttemptResult::kOperationExecutionError:
|
|
case metrics::AttemptResult::kMetadataVerificationFailed:
|
|
case metrics::AttemptResult::kPayloadVerificationFailed:
|
|
case metrics::AttemptResult::kVerificationFailed:
|
|
case metrics::AttemptResult::kPostInstallFailed:
|
|
case metrics::AttemptResult::kAbnormalTermination:
|
|
case metrics::AttemptResult::kUpdateCanceled:
|
|
case metrics::AttemptResult::kUpdateSucceededNotActive:
|
|
case metrics::AttemptResult::kUpdateSkipped:
|
|
case metrics::AttemptResult::kNumConstants:
|
|
case metrics::AttemptResult::kUnset:
|
|
break;
|
|
}
|
|
|
|
SystemState::Get()->metrics_reporter()->ReportUpdateAttemptMetrics(
|
|
attempt_number,
|
|
payload_type,
|
|
duration,
|
|
duration_uptime,
|
|
payload_size,
|
|
attempt_result,
|
|
internal_error_code);
|
|
|
|
SystemState::Get()->metrics_reporter()->ReportUpdateAttemptDownloadMetrics(
|
|
payload_bytes_downloaded,
|
|
payload_download_speed_bps,
|
|
download_source,
|
|
payload_download_error_code,
|
|
attempt_connection_type_);
|
|
}
|
|
|
|
void PayloadState::PersistAttemptMetrics() {
|
|
// TODO(zeuthen): For now we only persist whether an attempt was in
|
|
// progress and not values/metrics related to the attempt. This
|
|
// means that when this happens, of all the UpdateEngine.Attempt.*
|
|
// metrics, only UpdateEngine.Attempt.Result is reported (with the
|
|
// value |kAbnormalTermination|). In the future we might want to
|
|
// persist more data so we can report other metrics in the
|
|
// UpdateEngine.Attempt.* namespace when this happens.
|
|
prefs_->SetBoolean(kPrefsAttemptInProgress, true);
|
|
}
|
|
|
|
void PayloadState::ClearPersistedAttemptMetrics() {
|
|
prefs_->Delete(kPrefsAttemptInProgress);
|
|
}
|
|
|
|
void PayloadState::ReportAndClearPersistedAttemptMetrics() {
|
|
bool attempt_in_progress = false;
|
|
if (!prefs_->GetBoolean(kPrefsAttemptInProgress, &attempt_in_progress))
|
|
return;
|
|
if (!attempt_in_progress)
|
|
return;
|
|
|
|
SystemState::Get()
|
|
->metrics_reporter()
|
|
->ReportAbnormallyTerminatedUpdateAttemptMetrics();
|
|
|
|
ClearPersistedAttemptMetrics();
|
|
}
|
|
|
|
void PayloadState::CollectAndReportSuccessfulUpdateMetrics() {
|
|
string metric;
|
|
|
|
// Report metrics collected from all known download sources to UMA.
|
|
int64_t total_bytes_by_source[kNumDownloadSources];
|
|
int64_t successful_bytes = 0;
|
|
int64_t total_bytes = 0;
|
|
int64_t successful_mbs = 0;
|
|
int64_t total_mbs = 0;
|
|
|
|
for (int i = 0; i < kNumDownloadSources; i++) {
|
|
DownloadSource source = static_cast<DownloadSource>(i);
|
|
int64_t bytes;
|
|
|
|
// Only consider this download source (and send byte counts) as
|
|
// having been used if we downloaded a non-trivial amount of bytes
|
|
// (e.g. at least 1 MiB) that contributed to the final success of
|
|
// the update. Otherwise we're going to end up with a lot of
|
|
// zero-byte events in the histogram.
|
|
|
|
bytes = GetCurrentBytesDownloaded(source);
|
|
successful_bytes += bytes;
|
|
successful_mbs += bytes / kNumBytesInOneMiB;
|
|
SetCurrentBytesDownloaded(source, 0, true);
|
|
|
|
bytes = GetTotalBytesDownloaded(source);
|
|
total_bytes_by_source[i] = bytes;
|
|
total_bytes += bytes;
|
|
total_mbs += bytes / kNumBytesInOneMiB;
|
|
SetTotalBytesDownloaded(source, 0, true);
|
|
}
|
|
|
|
int download_overhead_percentage = 0;
|
|
if (successful_bytes > 0) {
|
|
download_overhead_percentage =
|
|
(total_bytes - successful_bytes) * 100ULL / successful_bytes;
|
|
}
|
|
|
|
int url_switch_count = static_cast<int>(url_switch_count_);
|
|
|
|
int reboot_count = GetNumReboots();
|
|
|
|
SetNumReboots(0);
|
|
|
|
TimeDelta duration = GetUpdateDuration();
|
|
TimeDelta duration_uptime = GetUpdateDurationUptime();
|
|
|
|
prefs_->Delete(kPrefsUpdateTimestampStart);
|
|
prefs_->Delete(kPrefsUpdateDurationUptime);
|
|
|
|
PayloadType payload_type = CalculatePayloadType();
|
|
|
|
int64_t payload_size = GetPayloadSize();
|
|
|
|
int attempt_count = GetPayloadAttemptNumber();
|
|
|
|
int updates_abandoned_count = num_responses_seen_ - 1;
|
|
|
|
SystemState::Get()->metrics_reporter()->ReportSuccessfulUpdateMetrics(
|
|
attempt_count,
|
|
updates_abandoned_count,
|
|
payload_type,
|
|
payload_size,
|
|
total_bytes_by_source,
|
|
download_overhead_percentage,
|
|
duration,
|
|
duration_uptime,
|
|
reboot_count,
|
|
url_switch_count);
|
|
}
|
|
|
|
void PayloadState::UpdateNumReboots() {
|
|
// We only update the reboot count when the system has been detected to have
|
|
// been rebooted.
|
|
if (!SystemState::Get()->system_rebooted()) {
|
|
return;
|
|
}
|
|
|
|
SetNumReboots(GetNumReboots() + 1);
|
|
}
|
|
|
|
void PayloadState::SetNumReboots(uint32_t num_reboots) {
|
|
num_reboots_ = num_reboots;
|
|
metrics_utils::SetNumReboots(num_reboots, prefs_);
|
|
}
|
|
|
|
void PayloadState::ResetPersistedState() {
|
|
SetPayloadAttemptNumber(0);
|
|
SetFullPayloadAttemptNumber(0);
|
|
SetPayloadIndex(0);
|
|
SetUrlIndex(0);
|
|
SetUrlFailureCount(0);
|
|
SetUrlSwitchCount(0);
|
|
UpdateBackoffExpiryTime(); // This will reset the backoff expiry time.
|
|
SetUpdateTimestampStart(SystemState::Get()->clock()->GetWallclockTime());
|
|
SetUpdateTimestampEnd(Time()); // Set to null time
|
|
SetUpdateDurationUptime(TimeDelta::FromSeconds(0));
|
|
ResetDownloadSourcesOnNewUpdate();
|
|
ResetRollbackVersion();
|
|
SetP2PNumAttempts(0);
|
|
SetP2PFirstAttemptTimestamp(Time()); // Set to null time
|
|
SetScatteringWaitPeriod(TimeDelta());
|
|
SetStagingWaitPeriod(TimeDelta());
|
|
}
|
|
|
|
void PayloadState::ResetRollbackVersion() {
|
|
rollback_version_ = "";
|
|
powerwash_safe_prefs_->Delete(kPrefsRollbackVersion);
|
|
}
|
|
|
|
void PayloadState::ResetDownloadSourcesOnNewUpdate() {
|
|
for (int i = 0; i < kNumDownloadSources; i++) {
|
|
DownloadSource source = static_cast<DownloadSource>(i);
|
|
SetCurrentBytesDownloaded(source, 0, true);
|
|
// Note: Not resetting the TotalBytesDownloaded as we want that metric
|
|
// to count the bytes downloaded across various update attempts until
|
|
// we have successfully applied the update.
|
|
}
|
|
}
|
|
|
|
string PayloadState::CalculateResponseSignature() {
|
|
string response_sign;
|
|
for (size_t i = 0; i < response_.packages.size(); i++) {
|
|
const auto& package = response_.packages[i];
|
|
response_sign += base::StringPrintf(
|
|
"Payload %zu:\n"
|
|
" Size = %ju\n"
|
|
" Sha256 Hash = %s\n"
|
|
" Metadata Size = %ju\n"
|
|
" Metadata Signature = %s\n"
|
|
" Is Delta = %d\n"
|
|
" NumURLs = %zu\n",
|
|
i,
|
|
static_cast<uintmax_t>(package.size),
|
|
package.hash.c_str(),
|
|
static_cast<uintmax_t>(package.metadata_size),
|
|
package.metadata_signature.c_str(),
|
|
package.is_delta,
|
|
candidate_urls_[i].size());
|
|
|
|
for (size_t j = 0; j < candidate_urls_[i].size(); j++)
|
|
response_sign += base::StringPrintf(
|
|
" Candidate Url%zu = %s\n", j, candidate_urls_[i][j].c_str());
|
|
}
|
|
|
|
response_sign += base::StringPrintf(
|
|
"Max Failure Count Per Url = %d\n"
|
|
"Disable Payload Backoff = %d\n",
|
|
response_.max_failure_count_per_url,
|
|
response_.disable_payload_backoff);
|
|
return response_sign;
|
|
}
|
|
|
|
void PayloadState::LoadResponseSignature() {
|
|
string stored_value;
|
|
if (prefs_->Exists(kPrefsCurrentResponseSignature) &&
|
|
prefs_->GetString(kPrefsCurrentResponseSignature, &stored_value)) {
|
|
SetResponseSignature(stored_value);
|
|
}
|
|
}
|
|
|
|
void PayloadState::SetResponseSignature(const string& response_signature) {
|
|
response_signature_ = response_signature;
|
|
LOG(INFO) << "Current Response Signature = \n" << response_signature_;
|
|
prefs_->SetString(kPrefsCurrentResponseSignature, response_signature_);
|
|
}
|
|
|
|
void PayloadState::LoadPayloadAttemptNumber() {
|
|
SetPayloadAttemptNumber(
|
|
GetPersistedValue(kPrefsPayloadAttemptNumber, prefs_));
|
|
}
|
|
|
|
void PayloadState::LoadFullPayloadAttemptNumber() {
|
|
SetFullPayloadAttemptNumber(
|
|
GetPersistedValue(kPrefsFullPayloadAttemptNumber, prefs_));
|
|
}
|
|
|
|
void PayloadState::SetPayloadAttemptNumber(int payload_attempt_number) {
|
|
payload_attempt_number_ = payload_attempt_number;
|
|
metrics_utils::SetPayloadAttemptNumber(payload_attempt_number, prefs_);
|
|
}
|
|
|
|
void PayloadState::SetFullPayloadAttemptNumber(
|
|
int full_payload_attempt_number) {
|
|
full_payload_attempt_number_ = full_payload_attempt_number;
|
|
LOG(INFO) << "Full Payload Attempt Number = " << full_payload_attempt_number_;
|
|
prefs_->SetInt64(kPrefsFullPayloadAttemptNumber,
|
|
full_payload_attempt_number_);
|
|
}
|
|
|
|
void PayloadState::SetPayloadIndex(size_t payload_index) {
|
|
payload_index_ = payload_index;
|
|
LOG(INFO) << "Payload Index = " << payload_index_;
|
|
prefs_->SetInt64(kPrefsUpdateStatePayloadIndex, payload_index_);
|
|
}
|
|
|
|
bool PayloadState::NextPayload() {
|
|
if (payload_index_ >= candidate_urls_.size())
|
|
return false;
|
|
SetPayloadIndex(payload_index_ + 1);
|
|
if (payload_index_ >= candidate_urls_.size())
|
|
return false;
|
|
SetUrlIndex(0);
|
|
return true;
|
|
}
|
|
|
|
void PayloadState::LoadUrlIndex() {
|
|
SetUrlIndex(GetPersistedValue(kPrefsCurrentUrlIndex, prefs_));
|
|
}
|
|
|
|
void PayloadState::SetUrlIndex(uint32_t url_index) {
|
|
url_index_ = url_index;
|
|
LOG(INFO) << "Current URL Index = " << url_index_;
|
|
prefs_->SetInt64(kPrefsCurrentUrlIndex, url_index_);
|
|
|
|
// Also update the download source, which is purely dependent on the
|
|
// current URL index alone.
|
|
UpdateCurrentDownloadSource();
|
|
}
|
|
|
|
void PayloadState::LoadScatteringWaitPeriod() {
|
|
SetScatteringWaitPeriod(TimeDelta::FromSeconds(
|
|
GetPersistedValue(kPrefsWallClockScatteringWaitPeriod, prefs_)));
|
|
}
|
|
|
|
void PayloadState::SetScatteringWaitPeriod(TimeDelta wait_period) {
|
|
scattering_wait_period_ = wait_period;
|
|
LOG(INFO) << "Scattering Wait Period (seconds) = "
|
|
<< scattering_wait_period_.InSeconds();
|
|
if (scattering_wait_period_.InSeconds() > 0) {
|
|
prefs_->SetInt64(kPrefsWallClockScatteringWaitPeriod,
|
|
scattering_wait_period_.InSeconds());
|
|
} else {
|
|
prefs_->Delete(kPrefsWallClockScatteringWaitPeriod);
|
|
}
|
|
}
|
|
|
|
void PayloadState::LoadStagingWaitPeriod() {
|
|
SetStagingWaitPeriod(TimeDelta::FromSeconds(
|
|
GetPersistedValue(kPrefsWallClockStagingWaitPeriod, prefs_)));
|
|
}
|
|
|
|
void PayloadState::SetStagingWaitPeriod(TimeDelta wait_period) {
|
|
staging_wait_period_ = wait_period;
|
|
LOG(INFO) << "Staging Wait Period (days) =" << staging_wait_period_.InDays();
|
|
if (staging_wait_period_.InSeconds() > 0) {
|
|
prefs_->SetInt64(kPrefsWallClockStagingWaitPeriod,
|
|
staging_wait_period_.InSeconds());
|
|
} else {
|
|
prefs_->Delete(kPrefsWallClockStagingWaitPeriod);
|
|
}
|
|
}
|
|
|
|
void PayloadState::LoadUrlSwitchCount() {
|
|
SetUrlSwitchCount(GetPersistedValue(kPrefsUrlSwitchCount, prefs_));
|
|
}
|
|
|
|
void PayloadState::SetUrlSwitchCount(uint32_t url_switch_count) {
|
|
url_switch_count_ = url_switch_count;
|
|
LOG(INFO) << "URL Switch Count = " << url_switch_count_;
|
|
prefs_->SetInt64(kPrefsUrlSwitchCount, url_switch_count_);
|
|
}
|
|
|
|
void PayloadState::LoadUrlFailureCount() {
|
|
SetUrlFailureCount(GetPersistedValue(kPrefsCurrentUrlFailureCount, prefs_));
|
|
}
|
|
|
|
void PayloadState::SetUrlFailureCount(uint32_t url_failure_count) {
|
|
url_failure_count_ = url_failure_count;
|
|
LOG(INFO) << "Current URL (Url" << GetUrlIndex()
|
|
<< ")'s Failure Count = " << url_failure_count_;
|
|
prefs_->SetInt64(kPrefsCurrentUrlFailureCount, url_failure_count_);
|
|
}
|
|
|
|
void PayloadState::LoadBackoffExpiryTime() {
|
|
int64_t stored_value;
|
|
if (!prefs_->Exists(kPrefsBackoffExpiryTime))
|
|
return;
|
|
|
|
if (!prefs_->GetInt64(kPrefsBackoffExpiryTime, &stored_value))
|
|
return;
|
|
|
|
Time stored_time = Time::FromInternalValue(stored_value);
|
|
if (stored_time > Time::Now() + TimeDelta::FromDays(kMaxBackoffDays)) {
|
|
LOG(ERROR) << "Invalid backoff expiry time ("
|
|
<< utils::ToString(stored_time)
|
|
<< ") in persisted state. Resetting.";
|
|
stored_time = Time();
|
|
}
|
|
SetBackoffExpiryTime(stored_time);
|
|
}
|
|
|
|
void PayloadState::SetBackoffExpiryTime(const Time& new_time) {
|
|
backoff_expiry_time_ = new_time;
|
|
LOG(INFO) << "Backoff Expiry Time = "
|
|
<< utils::ToString(backoff_expiry_time_);
|
|
prefs_->SetInt64(kPrefsBackoffExpiryTime,
|
|
backoff_expiry_time_.ToInternalValue());
|
|
}
|
|
|
|
TimeDelta PayloadState::GetUpdateDuration() {
|
|
Time end_time = update_timestamp_end_.is_null()
|
|
? SystemState::Get()->clock()->GetWallclockTime()
|
|
: update_timestamp_end_;
|
|
return end_time - update_timestamp_start_;
|
|
}
|
|
|
|
void PayloadState::LoadUpdateTimestampStart() {
|
|
int64_t stored_value;
|
|
Time stored_time;
|
|
Time now = SystemState::Get()->clock()->GetWallclockTime();
|
|
|
|
if (!prefs_->Exists(kPrefsUpdateTimestampStart)) {
|
|
// The preference missing is not unexpected - in that case, just
|
|
// use the current time as start time
|
|
stored_time = now;
|
|
} else if (!prefs_->GetInt64(kPrefsUpdateTimestampStart, &stored_value)) {
|
|
LOG(ERROR) << "Invalid UpdateTimestampStart value. Resetting.";
|
|
stored_time = now;
|
|
} else {
|
|
stored_time = Time::FromInternalValue(stored_value);
|
|
}
|
|
|
|
// Validation check: If the time read from disk is in the future
|
|
// (modulo some slack to account for possible NTP drift
|
|
// adjustments), something is fishy and we should report and
|
|
// reset.
|
|
TimeDelta duration_according_to_stored_time = now - stored_time;
|
|
if (duration_according_to_stored_time < -kDurationSlack) {
|
|
LOG(ERROR) << "The UpdateTimestampStart value ("
|
|
<< utils::ToString(stored_time) << ") in persisted state is "
|
|
<< utils::FormatTimeDelta(duration_according_to_stored_time)
|
|
<< " in the future. Resetting.";
|
|
stored_time = now;
|
|
}
|
|
|
|
SetUpdateTimestampStart(stored_time);
|
|
}
|
|
|
|
void PayloadState::SetUpdateTimestampStart(const Time& value) {
|
|
update_timestamp_start_ = value;
|
|
metrics_utils::SetUpdateTimestampStart(value, prefs_);
|
|
}
|
|
|
|
void PayloadState::SetUpdateTimestampEnd(const Time& value) {
|
|
update_timestamp_end_ = value;
|
|
LOG(INFO) << "Update Timestamp End = "
|
|
<< utils::ToString(update_timestamp_end_);
|
|
}
|
|
|
|
TimeDelta PayloadState::GetUpdateDurationUptime() {
|
|
return update_duration_uptime_;
|
|
}
|
|
|
|
void PayloadState::LoadUpdateDurationUptime() {
|
|
int64_t stored_value;
|
|
TimeDelta stored_delta;
|
|
|
|
if (!prefs_->Exists(kPrefsUpdateDurationUptime)) {
|
|
// The preference missing is not unexpected - in that case, just
|
|
// we'll use zero as the delta
|
|
} else if (!prefs_->GetInt64(kPrefsUpdateDurationUptime, &stored_value)) {
|
|
LOG(ERROR) << "Invalid UpdateDurationUptime value. Resetting.";
|
|
stored_delta = TimeDelta::FromSeconds(0);
|
|
} else {
|
|
stored_delta = TimeDelta::FromInternalValue(stored_value);
|
|
}
|
|
|
|
// Validation check: Uptime can never be greater than the wall-clock
|
|
// difference (modulo some slack). If it is, report and reset
|
|
// to the wall-clock difference.
|
|
TimeDelta diff = GetUpdateDuration() - stored_delta;
|
|
if (diff < -kDurationSlack) {
|
|
LOG(ERROR) << "The UpdateDurationUptime value ("
|
|
<< utils::FormatTimeDelta(stored_delta)
|
|
<< ") in persisted state is " << utils::FormatTimeDelta(diff)
|
|
<< " larger than the wall-clock delta. Resetting.";
|
|
stored_delta = update_duration_current_;
|
|
}
|
|
|
|
SetUpdateDurationUptime(stored_delta);
|
|
}
|
|
|
|
void PayloadState::LoadNumReboots() {
|
|
SetNumReboots(GetPersistedValue(kPrefsNumReboots, prefs_));
|
|
}
|
|
|
|
void PayloadState::LoadRollbackHappened() {
|
|
bool rollback_happened = false;
|
|
powerwash_safe_prefs_->GetBoolean(kPrefsRollbackHappened, &rollback_happened);
|
|
SetRollbackHappened(rollback_happened);
|
|
}
|
|
|
|
void PayloadState::SetRollbackHappened(bool rollback_happened) {
|
|
LOG(INFO) << "Setting rollback-happened to " << rollback_happened << ".";
|
|
rollback_happened_ = rollback_happened;
|
|
if (rollback_happened) {
|
|
powerwash_safe_prefs_->SetBoolean(kPrefsRollbackHappened,
|
|
rollback_happened);
|
|
} else {
|
|
powerwash_safe_prefs_->Delete(kPrefsRollbackHappened);
|
|
}
|
|
}
|
|
|
|
void PayloadState::LoadRollbackVersion() {
|
|
string rollback_version;
|
|
if (powerwash_safe_prefs_->GetString(kPrefsRollbackVersion,
|
|
&rollback_version)) {
|
|
SetRollbackVersion(rollback_version);
|
|
}
|
|
}
|
|
|
|
void PayloadState::SetRollbackVersion(const string& rollback_version) {
|
|
LOG(INFO) << "Excluding version " << rollback_version;
|
|
rollback_version_ = rollback_version;
|
|
powerwash_safe_prefs_->SetString(kPrefsRollbackVersion, rollback_version);
|
|
}
|
|
|
|
void PayloadState::SetUpdateDurationUptimeExtended(const TimeDelta& value,
|
|
const Time& timestamp,
|
|
bool use_logging) {
|
|
update_duration_uptime_ = value;
|
|
update_duration_uptime_timestamp_ = timestamp;
|
|
prefs_->SetInt64(kPrefsUpdateDurationUptime,
|
|
update_duration_uptime_.ToInternalValue());
|
|
if (use_logging) {
|
|
LOG(INFO) << "Update Duration Uptime = "
|
|
<< utils::FormatTimeDelta(update_duration_uptime_);
|
|
}
|
|
}
|
|
|
|
void PayloadState::SetUpdateDurationUptime(const TimeDelta& value) {
|
|
Time now = SystemState::Get()->clock()->GetMonotonicTime();
|
|
SetUpdateDurationUptimeExtended(value, now, true);
|
|
}
|
|
|
|
void PayloadState::CalculateUpdateDurationUptime() {
|
|
Time now = SystemState::Get()->clock()->GetMonotonicTime();
|
|
TimeDelta uptime_since_last_update = now - update_duration_uptime_timestamp_;
|
|
|
|
if (uptime_since_last_update > TimeDelta::FromSeconds(kUptimeResolution)) {
|
|
TimeDelta new_uptime = update_duration_uptime_ + uptime_since_last_update;
|
|
// We're frequently called so avoid logging this write
|
|
SetUpdateDurationUptimeExtended(new_uptime, now, false);
|
|
}
|
|
}
|
|
|
|
string PayloadState::GetPrefsKey(const string& prefix, DownloadSource source) {
|
|
return prefix + "-from-" + utils::ToString(source);
|
|
}
|
|
|
|
void PayloadState::LoadCurrentBytesDownloaded(DownloadSource source) {
|
|
string key = GetPrefsKey(kPrefsCurrentBytesDownloaded, source);
|
|
SetCurrentBytesDownloaded(source, GetPersistedValue(key, prefs_), true);
|
|
}
|
|
|
|
void PayloadState::SetCurrentBytesDownloaded(DownloadSource source,
|
|
uint64_t current_bytes_downloaded,
|
|
bool log) {
|
|
if (source >= kNumDownloadSources)
|
|
return;
|
|
|
|
// Update the in-memory value.
|
|
current_bytes_downloaded_[source] = current_bytes_downloaded;
|
|
|
|
string prefs_key = GetPrefsKey(kPrefsCurrentBytesDownloaded, source);
|
|
prefs_->SetInt64(prefs_key, current_bytes_downloaded);
|
|
LOG_IF(INFO, log) << "Current bytes downloaded for "
|
|
<< utils::ToString(source) << " = "
|
|
<< GetCurrentBytesDownloaded(source);
|
|
}
|
|
|
|
void PayloadState::LoadTotalBytesDownloaded(DownloadSource source) {
|
|
string key = GetPrefsKey(kPrefsTotalBytesDownloaded, source);
|
|
SetTotalBytesDownloaded(source, GetPersistedValue(key, prefs_), true);
|
|
}
|
|
|
|
void PayloadState::SetTotalBytesDownloaded(DownloadSource source,
|
|
uint64_t total_bytes_downloaded,
|
|
bool log) {
|
|
if (source >= kNumDownloadSources)
|
|
return;
|
|
|
|
// Update the in-memory value.
|
|
total_bytes_downloaded_[source] = total_bytes_downloaded;
|
|
|
|
// Persist.
|
|
string prefs_key = GetPrefsKey(kPrefsTotalBytesDownloaded, source);
|
|
prefs_->SetInt64(prefs_key, total_bytes_downloaded);
|
|
LOG_IF(INFO, log) << "Total bytes downloaded for " << utils::ToString(source)
|
|
<< " = " << GetTotalBytesDownloaded(source);
|
|
}
|
|
|
|
void PayloadState::LoadNumResponsesSeen() {
|
|
SetNumResponsesSeen(GetPersistedValue(kPrefsNumResponsesSeen, prefs_));
|
|
}
|
|
|
|
void PayloadState::SetNumResponsesSeen(int num_responses_seen) {
|
|
num_responses_seen_ = num_responses_seen;
|
|
LOG(INFO) << "Num Responses Seen = " << num_responses_seen_;
|
|
prefs_->SetInt64(kPrefsNumResponsesSeen, num_responses_seen_);
|
|
}
|
|
|
|
void PayloadState::ComputeCandidateUrls() {
|
|
bool http_url_ok = true;
|
|
|
|
if (SystemState::Get()->hardware()->IsOfficialBuild()) {
|
|
const policy::DevicePolicy* policy = SystemState::Get()->device_policy();
|
|
if (policy && policy->GetHttpDownloadsEnabled(&http_url_ok) && !http_url_ok)
|
|
LOG(INFO) << "Downloads via HTTP Url are not enabled by device policy";
|
|
} else {
|
|
LOG(INFO) << "Allowing HTTP downloads for unofficial builds";
|
|
http_url_ok = true;
|
|
}
|
|
|
|
candidate_urls_.clear();
|
|
for (const auto& package : response_.packages) {
|
|
candidate_urls_.emplace_back();
|
|
for (const string& candidate_url : package.payload_urls) {
|
|
if (base::StartsWith(
|
|
candidate_url, "http://", base::CompareCase::INSENSITIVE_ASCII) &&
|
|
!http_url_ok) {
|
|
continue;
|
|
}
|
|
candidate_urls_.back().push_back(candidate_url);
|
|
LOG(INFO) << "Candidate Url" << (candidate_urls_.back().size() - 1)
|
|
<< ": " << candidate_url;
|
|
}
|
|
LOG(INFO) << "Found " << candidate_urls_.back().size() << " candidate URLs "
|
|
<< "out of " << package.payload_urls.size()
|
|
<< " URLs supplied in package " << candidate_urls_.size() - 1;
|
|
}
|
|
}
|
|
|
|
void PayloadState::UpdateEngineStarted() {
|
|
// Flush previous state from abnormal attempt failure, if any.
|
|
ReportAndClearPersistedAttemptMetrics();
|
|
|
|
// Avoid the UpdateEngineStarted actions if this is not the first time we
|
|
// run the update engine since reboot.
|
|
if (!SystemState::Get()->system_rebooted())
|
|
return;
|
|
|
|
// Report time_to_reboot if we booted into a new update.
|
|
metrics_utils::LoadAndReportTimeToReboot(
|
|
SystemState::Get()->metrics_reporter(),
|
|
prefs_,
|
|
SystemState::Get()->clock());
|
|
prefs_->Delete(kPrefsSystemUpdatedMarker);
|
|
|
|
// Check if it is needed to send metrics about a failed reboot into a new
|
|
// version.
|
|
ReportFailedBootIfNeeded();
|
|
}
|
|
|
|
void PayloadState::ReportFailedBootIfNeeded() {
|
|
// If the kPrefsTargetVersionInstalledFrom is present, a successfully applied
|
|
// payload was marked as ready immediately before the last reboot, and we
|
|
// need to check if such payload successfully rebooted or not.
|
|
if (prefs_->Exists(kPrefsTargetVersionInstalledFrom)) {
|
|
int64_t installed_from = 0;
|
|
if (!prefs_->GetInt64(kPrefsTargetVersionInstalledFrom, &installed_from)) {
|
|
LOG(ERROR) << "Error reading TargetVersionInstalledFrom on reboot.";
|
|
return;
|
|
}
|
|
// Old Chrome OS devices will write 2 or 4 in this setting, with the
|
|
// partition number. We are now using slot numbers (0 or 1) instead, so
|
|
// the following comparison will not match if we are comparing an old
|
|
// partition number against a new slot number, which is the correct outcome
|
|
// since we successfully booted the new update in that case. If the boot
|
|
// failed, we will read this value from the same version, so it will always
|
|
// be compatible.
|
|
if (installed_from ==
|
|
SystemState::Get()->boot_control()->GetCurrentSlot()) {
|
|
// A reboot was pending, but the chromebook is again in the same
|
|
// BootDevice where the update was installed from.
|
|
int64_t target_attempt;
|
|
if (!prefs_->GetInt64(kPrefsTargetVersionAttempt, &target_attempt)) {
|
|
LOG(ERROR) << "Error reading TargetVersionAttempt when "
|
|
"TargetVersionInstalledFrom was present.";
|
|
target_attempt = 1;
|
|
}
|
|
|
|
// Report the UMA metric of the current boot failure.
|
|
SystemState::Get()->metrics_reporter()->ReportFailedUpdateCount(
|
|
target_attempt);
|
|
} else {
|
|
prefs_->Delete(kPrefsTargetVersionAttempt);
|
|
prefs_->Delete(kPrefsTargetVersionUniqueId);
|
|
}
|
|
prefs_->Delete(kPrefsTargetVersionInstalledFrom);
|
|
}
|
|
}
|
|
|
|
void PayloadState::ExpectRebootInNewVersion(const string& target_version_uid) {
|
|
// Expect to boot into the new partition in the next reboot setting the
|
|
// TargetVersion* flags in the Prefs.
|
|
string stored_target_version_uid;
|
|
string target_version_id;
|
|
string target_partition;
|
|
int64_t target_attempt;
|
|
|
|
if (prefs_->Exists(kPrefsTargetVersionUniqueId) &&
|
|
prefs_->GetString(kPrefsTargetVersionUniqueId,
|
|
&stored_target_version_uid) &&
|
|
stored_target_version_uid == target_version_uid) {
|
|
if (!prefs_->GetInt64(kPrefsTargetVersionAttempt, &target_attempt))
|
|
target_attempt = 0;
|
|
} else {
|
|
prefs_->SetString(kPrefsTargetVersionUniqueId, target_version_uid);
|
|
target_attempt = 0;
|
|
}
|
|
prefs_->SetInt64(kPrefsTargetVersionAttempt, target_attempt + 1);
|
|
|
|
prefs_->SetInt64(kPrefsTargetVersionInstalledFrom,
|
|
SystemState::Get()->boot_control()->GetCurrentSlot());
|
|
}
|
|
|
|
void PayloadState::ResetUpdateStatus() {
|
|
// Remove the TargetVersionInstalledFrom pref so that if the machine is
|
|
// rebooted the next boot is not flagged as failed to rebooted into the
|
|
// new applied payload.
|
|
prefs_->Delete(kPrefsTargetVersionInstalledFrom);
|
|
|
|
// Also decrement the attempt number if it exists.
|
|
int64_t target_attempt;
|
|
if (prefs_->GetInt64(kPrefsTargetVersionAttempt, &target_attempt))
|
|
prefs_->SetInt64(kPrefsTargetVersionAttempt, target_attempt - 1);
|
|
}
|
|
|
|
int PayloadState::GetP2PNumAttempts() {
|
|
return p2p_num_attempts_;
|
|
}
|
|
|
|
void PayloadState::SetP2PNumAttempts(int value) {
|
|
p2p_num_attempts_ = value;
|
|
LOG(INFO) << "p2p Num Attempts = " << p2p_num_attempts_;
|
|
prefs_->SetInt64(kPrefsP2PNumAttempts, value);
|
|
}
|
|
|
|
void PayloadState::LoadP2PNumAttempts() {
|
|
SetP2PNumAttempts(GetPersistedValue(kPrefsP2PNumAttempts, prefs_));
|
|
}
|
|
|
|
Time PayloadState::GetP2PFirstAttemptTimestamp() {
|
|
return p2p_first_attempt_timestamp_;
|
|
}
|
|
|
|
void PayloadState::SetP2PFirstAttemptTimestamp(const Time& time) {
|
|
p2p_first_attempt_timestamp_ = time;
|
|
LOG(INFO) << "p2p First Attempt Timestamp = "
|
|
<< utils::ToString(p2p_first_attempt_timestamp_);
|
|
int64_t stored_value = time.ToInternalValue();
|
|
prefs_->SetInt64(kPrefsP2PFirstAttemptTimestamp, stored_value);
|
|
}
|
|
|
|
void PayloadState::LoadP2PFirstAttemptTimestamp() {
|
|
int64_t stored_value =
|
|
GetPersistedValue(kPrefsP2PFirstAttemptTimestamp, prefs_);
|
|
Time stored_time = Time::FromInternalValue(stored_value);
|
|
SetP2PFirstAttemptTimestamp(stored_time);
|
|
}
|
|
|
|
void PayloadState::P2PNewAttempt() {
|
|
// Set timestamp, if it hasn't been set already
|
|
if (p2p_first_attempt_timestamp_.is_null()) {
|
|
SetP2PFirstAttemptTimestamp(
|
|
SystemState::Get()->clock()->GetWallclockTime());
|
|
}
|
|
// Increase number of attempts
|
|
SetP2PNumAttempts(GetP2PNumAttempts() + 1);
|
|
}
|
|
|
|
bool PayloadState::P2PAttemptAllowed() {
|
|
if (p2p_num_attempts_ > kMaxP2PAttempts) {
|
|
LOG(INFO) << "Number of p2p attempts is " << p2p_num_attempts_
|
|
<< " which is greater than " << kMaxP2PAttempts
|
|
<< " - disallowing p2p.";
|
|
return false;
|
|
}
|
|
|
|
if (!p2p_first_attempt_timestamp_.is_null()) {
|
|
Time now = SystemState::Get()->clock()->GetWallclockTime();
|
|
TimeDelta time_spent_attempting_p2p = now - p2p_first_attempt_timestamp_;
|
|
if (time_spent_attempting_p2p.InSeconds() < 0) {
|
|
LOG(ERROR) << "Time spent attempting p2p is negative"
|
|
<< " - disallowing p2p.";
|
|
return false;
|
|
}
|
|
if (time_spent_attempting_p2p.InSeconds() > kMaxP2PAttemptTimeSeconds) {
|
|
LOG(INFO) << "Time spent attempting p2p is "
|
|
<< utils::FormatTimeDelta(time_spent_attempting_p2p)
|
|
<< " which is greater than "
|
|
<< utils::FormatTimeDelta(
|
|
TimeDelta::FromSeconds(kMaxP2PAttemptTimeSeconds))
|
|
<< " - disallowing p2p.";
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
int64_t PayloadState::GetPayloadSize() {
|
|
int64_t payload_size = 0;
|
|
for (const auto& package : response_.packages)
|
|
payload_size += package.size;
|
|
return payload_size;
|
|
}
|
|
|
|
} // namespace chromeos_update_engine
|