You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

449 lines
15 KiB

//
// Copyright (C) 2011 The Android Open Source Project
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
#include "update_engine/payload_consumer/postinstall_runner_action.h"
#include <fcntl.h>
#include <signal.h>
#include <stdlib.h>
#include <sys/mount.h>
#include <sys/types.h>
#include <unistd.h>
#include <cmath>
#include <base/files/file_path.h>
#include <base/files/file_util.h>
#include <base/logging.h>
#include <base/stl_util.h>
#include <base/strings/string_split.h>
#include <base/strings/string_util.h>
#include "update_engine/common/action_processor.h"
#include "update_engine/common/boot_control_interface.h"
#include "update_engine/common/platform_constants.h"
#include "update_engine/common/subprocess.h"
#include "update_engine/common/utils.h"
namespace {
// The file descriptor number from the postinstall program's perspective where
// it can report status updates. This can be any number greater than 2 (stderr),
// but must be kept in sync with the "bin/postinst_progress" defined in the
// sample_images.sh file.
const int kPostinstallStatusFd = 3;
} // namespace
namespace chromeos_update_engine {
using std::string;
using std::vector;
PostinstallRunnerAction::PostinstallRunnerAction(
BootControlInterface* boot_control, HardwareInterface* hardware)
: boot_control_(boot_control), hardware_(hardware) {
#ifdef __ANDROID__
fs_mount_dir_ = "/postinstall";
#else // __ANDROID__
base::FilePath temp_dir;
TEST_AND_RETURN(base::CreateNewTempDirectory("au_postint_mount", &temp_dir));
fs_mount_dir_ = temp_dir.value();
#endif // __ANDROID__
CHECK(!fs_mount_dir_.empty());
LOG(INFO) << "postinstall mount point: " << fs_mount_dir_;
}
void PostinstallRunnerAction::PerformAction() {
CHECK(HasInputObject());
CHECK(boot_control_);
install_plan_ = GetInputObject();
auto dynamic_control = boot_control_->GetDynamicPartitionControl();
CHECK(dynamic_control);
// Mount snapshot partitions for Virtual AB Compression Compression.
if (dynamic_control->UpdateUsesSnapshotCompression()) {
// Before calling MapAllPartitions to map snapshot devices, all CowWriters
// must be closed, and MapAllPartitions() should be called.
dynamic_control->UnmapAllPartitions();
if (!dynamic_control->MapAllPartitions()) {
return CompletePostinstall(ErrorCode::kPostInstallMountError);
}
}
// We always powerwash when rolling back, however policy can determine
// if this is a full/normal powerwash, or a special rollback powerwash
// that retains a small amount of system state such as enrollment and
// network configuration. In both cases all user accounts are deleted.
if (install_plan_.powerwash_required || install_plan_.is_rollback) {
if (hardware_->SchedulePowerwash(
install_plan_.rollback_data_save_requested)) {
powerwash_scheduled_ = true;
} else {
return CompletePostinstall(ErrorCode::kPostinstallPowerwashError);
}
}
// Initialize all the partition weights.
partition_weight_.resize(install_plan_.partitions.size());
total_weight_ = 0;
for (size_t i = 0; i < install_plan_.partitions.size(); ++i) {
auto& partition = install_plan_.partitions[i];
if (!install_plan_.run_post_install && partition.postinstall_optional) {
partition.run_postinstall = false;
LOG(INFO) << "Skipping optional post-install for partition "
<< partition.name << " according to install plan.";
}
// TODO(deymo): This code sets the weight to all the postinstall commands,
// but we could remember how long they took in the past and use those
// values.
partition_weight_[i] = partition.run_postinstall;
total_weight_ += partition_weight_[i];
}
accumulated_weight_ = 0;
ReportProgress(0);
PerformPartitionPostinstall();
}
void PostinstallRunnerAction::PerformPartitionPostinstall() {
if (install_plan_.download_url.empty()) {
LOG(INFO) << "Skipping post-install during rollback";
return CompletePostinstall(ErrorCode::kSuccess);
}
// Skip all the partitions that don't have a post-install step.
while (current_partition_ < install_plan_.partitions.size() &&
!install_plan_.partitions[current_partition_].run_postinstall) {
VLOG(1) << "Skipping post-install on partition "
<< install_plan_.partitions[current_partition_].name;
current_partition_++;
}
if (current_partition_ == install_plan_.partitions.size())
return CompletePostinstall(ErrorCode::kSuccess);
const InstallPlan::Partition& partition =
install_plan_.partitions[current_partition_];
const string mountable_device = partition.readonly_target_path;
if (mountable_device.empty()) {
LOG(ERROR) << "Cannot make mountable device from " << partition.target_path;
return CompletePostinstall(ErrorCode::kPostinstallRunnerError);
}
// Perform post-install for the current_partition_ partition. At this point we
// need to call CompletePartitionPostinstall to complete the operation and
// cleanup.
if (!utils::FileExists(fs_mount_dir_.c_str())) {
LOG(ERROR) << "Mount point " << fs_mount_dir_
<< " does not exist, mount call will fail";
return CompletePostinstall(ErrorCode::kPostinstallRunnerError);
}
// Double check that the fs_mount_dir is not busy with a previous mounted
// filesystem from a previous crashed postinstall step.
if (utils::IsMountpoint(fs_mount_dir_)) {
LOG(INFO) << "Found previously mounted filesystem at " << fs_mount_dir_;
utils::UnmountFilesystem(fs_mount_dir_);
}
base::FilePath postinstall_path(partition.postinstall_path);
if (postinstall_path.IsAbsolute()) {
LOG(ERROR) << "Invalid absolute path passed to postinstall, use a relative"
"path instead: "
<< partition.postinstall_path;
return CompletePostinstall(ErrorCode::kPostinstallRunnerError);
}
string abs_path =
base::FilePath(fs_mount_dir_).Append(postinstall_path).value();
if (!base::StartsWith(
abs_path, fs_mount_dir_, base::CompareCase::SENSITIVE)) {
LOG(ERROR) << "Invalid relative postinstall path: "
<< partition.postinstall_path;
return CompletePostinstall(ErrorCode::kPostinstallRunnerError);
}
#ifdef __ANDROID__
// In Chromium OS, the postinstall step is allowed to write to the block
// device on the target image, so we don't mark it as read-only and should
// be read-write since we just wrote to it during the update.
// Mark the block device as read-only before mounting for post-install.
if (!utils::SetBlockDeviceReadOnly(mountable_device, true)) {
return CompletePartitionPostinstall(
1, "Error marking the device " + mountable_device + " read only.");
}
#endif // __ANDROID__
if (!utils::MountFilesystem(
mountable_device,
fs_mount_dir_,
MS_RDONLY,
partition.filesystem_type,
hardware_->GetPartitionMountOptions(partition.name))) {
return CompletePartitionPostinstall(
1, "Error mounting the device " + mountable_device);
}
LOG(INFO) << "Performing postinst (" << partition.postinstall_path << " at "
<< abs_path << ") installed on device " << partition.target_path
<< " and mountable device " << mountable_device;
// Logs the file format of the postinstall script we are about to run. This
// will help debug when the postinstall script doesn't match the architecture
// of our build.
LOG(INFO) << "Format file for new " << partition.postinstall_path
<< " is: " << utils::GetFileFormat(abs_path);
// Runs the postinstall script asynchronously to free up the main loop while
// it's running.
vector<string> command = {abs_path};
#ifdef __ANDROID__
// In Brillo and Android, we pass the slot number and status fd.
command.push_back(std::to_string(install_plan_.target_slot));
command.push_back(std::to_string(kPostinstallStatusFd));
#else
// Chrome OS postinstall expects the target rootfs as the first parameter.
command.push_back(partition.target_path);
#endif // __ANDROID__
current_command_ = Subprocess::Get().ExecFlags(
command,
Subprocess::kRedirectStderrToStdout,
{kPostinstallStatusFd},
base::Bind(&PostinstallRunnerAction::CompletePartitionPostinstall,
base::Unretained(this)));
// Subprocess::Exec should never return a negative process id.
CHECK_GE(current_command_, 0);
if (!current_command_) {
CompletePartitionPostinstall(1, "Postinstall didn't launch");
return;
}
// Monitor the status file descriptor.
progress_fd_ =
Subprocess::Get().GetPipeFd(current_command_, kPostinstallStatusFd);
int fd_flags = fcntl(progress_fd_, F_GETFL, 0) | O_NONBLOCK;
if (HANDLE_EINTR(fcntl(progress_fd_, F_SETFL, fd_flags)) < 0) {
PLOG(ERROR) << "Unable to set non-blocking I/O mode on fd " << progress_fd_;
}
progress_controller_ = base::FileDescriptorWatcher::WatchReadable(
progress_fd_,
base::BindRepeating(&PostinstallRunnerAction::OnProgressFdReady,
base::Unretained(this)));
}
void PostinstallRunnerAction::OnProgressFdReady() {
char buf[1024];
size_t bytes_read;
do {
bytes_read = 0;
bool eof;
bool ok =
utils::ReadAll(progress_fd_, buf, base::size(buf), &bytes_read, &eof);
progress_buffer_.append(buf, bytes_read);
// Process every line.
vector<string> lines = base::SplitString(
progress_buffer_, "\n", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
if (!lines.empty()) {
progress_buffer_ = lines.back();
lines.pop_back();
for (const auto& line : lines) {
ProcessProgressLine(line);
}
}
if (!ok || eof) {
// There was either an error or an EOF condition, so we are done watching
// the file descriptor.
progress_controller_.reset();
return;
}
} while (bytes_read);
}
bool PostinstallRunnerAction::ProcessProgressLine(const string& line) {
double frac = 0;
if (sscanf(line.c_str(), "global_progress %lf", &frac) == 1 &&
!std::isnan(frac)) {
ReportProgress(frac);
return true;
}
return false;
}
void PostinstallRunnerAction::ReportProgress(double frac) {
if (!delegate_)
return;
if (current_partition_ >= partition_weight_.size() || total_weight_ == 0) {
delegate_->ProgressUpdate(1.);
return;
}
if (!std::isfinite(frac) || frac < 0)
frac = 0;
if (frac > 1)
frac = 1;
double postinst_action_progress =
(accumulated_weight_ + partition_weight_[current_partition_] * frac) /
total_weight_;
delegate_->ProgressUpdate(postinst_action_progress);
}
void PostinstallRunnerAction::Cleanup() {
utils::UnmountFilesystem(fs_mount_dir_);
#ifndef __ANDROID__
#if BASE_VER < 800000
if (!base::DeleteFile(base::FilePath(fs_mount_dir_), true)) {
#else
if (!base::DeleteFile(base::FilePath(fs_mount_dir_))) {
#endif
PLOG(WARNING) << "Not removing temporary mountpoint " << fs_mount_dir_;
}
#endif
progress_fd_ = -1;
progress_controller_.reset();
progress_buffer_.clear();
}
void PostinstallRunnerAction::CompletePartitionPostinstall(
int return_code, const string& output) {
current_command_ = 0;
Cleanup();
if (return_code != 0) {
LOG(ERROR) << "Postinst command failed with code: " << return_code;
ErrorCode error_code = ErrorCode::kPostinstallRunnerError;
if (return_code == 3) {
// This special return code means that we tried to update firmware,
// but couldn't because we booted from FW B, and we need to reboot
// to get back to FW A.
error_code = ErrorCode::kPostinstallBootedFromFirmwareB;
}
if (return_code == 4) {
// This special return code means that we tried to update firmware,
// but couldn't because we booted from FW B, and we need to reboot
// to get back to FW A.
error_code = ErrorCode::kPostinstallFirmwareRONotUpdatable;
}
// If postinstall script for this partition is optional we can ignore the
// result.
if (install_plan_.partitions[current_partition_].postinstall_optional) {
LOG(INFO) << "Ignoring postinstall failure since it is optional";
} else {
return CompletePostinstall(error_code);
}
}
accumulated_weight_ += partition_weight_[current_partition_];
current_partition_++;
ReportProgress(0);
PerformPartitionPostinstall();
}
void PostinstallRunnerAction::CompletePostinstall(ErrorCode error_code) {
// We only attempt to mark the new slot as active if all the postinstall
// steps succeeded.
if (error_code == ErrorCode::kSuccess) {
if (install_plan_.switch_slot_on_reboot) {
if (!boot_control_->GetDynamicPartitionControl()->FinishUpdate(
install_plan_.powerwash_required) ||
!boot_control_->SetActiveBootSlot(install_plan_.target_slot)) {
error_code = ErrorCode::kPostinstallRunnerError;
} else {
// Schedules warm reset on next reboot, ignores the error.
hardware_->SetWarmReset(true);
// Sets the vbmeta digest for the other slot to boot into.
hardware_->SetVbmetaDigestForInactiveSlot(false);
}
} else {
error_code = ErrorCode::kUpdatedButNotActive;
}
}
auto dynamic_control = boot_control_->GetDynamicPartitionControl();
CHECK(dynamic_control);
dynamic_control->UnmapAllPartitions();
LOG(INFO) << "Unmapped all partitions.";
ScopedActionCompleter completer(processor_, this);
completer.set_code(error_code);
if (error_code != ErrorCode::kSuccess &&
error_code != ErrorCode::kUpdatedButNotActive) {
LOG(ERROR) << "Postinstall action failed.";
// Undo any changes done to trigger Powerwash.
if (powerwash_scheduled_)
hardware_->CancelPowerwash();
return;
}
LOG(INFO) << "All post-install commands succeeded";
if (HasOutputPipe()) {
SetOutputObject(install_plan_);
}
}
void PostinstallRunnerAction::SuspendAction() {
if (!current_command_)
return;
if (kill(current_command_, SIGSTOP) != 0) {
PLOG(ERROR) << "Couldn't pause child process " << current_command_;
} else {
is_current_command_suspended_ = true;
}
}
void PostinstallRunnerAction::ResumeAction() {
if (!current_command_)
return;
if (kill(current_command_, SIGCONT) != 0) {
PLOG(ERROR) << "Couldn't resume child process " << current_command_;
} else {
is_current_command_suspended_ = false;
}
}
void PostinstallRunnerAction::TerminateProcessing() {
if (!current_command_)
return;
// Calling KillExec() will discard the callback we registered and therefore
// the unretained reference to this object.
Subprocess::Get().KillExec(current_command_);
// If the command has been suspended, resume it after KillExec() so that the
// process can process the SIGTERM sent by KillExec().
if (is_current_command_suspended_) {
ResumeAction();
}
current_command_ = 0;
Cleanup();
}
} // namespace chromeos_update_engine