|  | // | 
|  | // Copyright (C) 2013 The Android Open Source Project | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  | // | 
|  |  | 
|  | #include "update_engine/cros/hardware_chromeos.h" | 
|  |  | 
|  | #include <utility> | 
|  |  | 
|  | #include <base/files/file_path.h> | 
|  | #include <base/files/file_util.h> | 
|  | #include <base/logging.h> | 
|  | #include <base/strings/string_number_conversions.h> | 
|  | #include <base/strings/string_util.h> | 
|  | #include <brillo/key_value_store.h> | 
|  | #include <debugd/dbus-constants.h> | 
|  | #include <vboot/crossystem.h> | 
|  |  | 
|  | extern "C" { | 
|  | #include "vboot/vboot_host.h" | 
|  | } | 
|  |  | 
|  | #include "update_engine/common/constants.h" | 
|  | #include "update_engine/common/hardware.h" | 
|  | #include "update_engine/common/hwid_override.h" | 
|  | #include "update_engine/common/platform_constants.h" | 
|  | #include "update_engine/common/subprocess.h" | 
|  | #include "update_engine/common/utils.h" | 
|  | #include "update_engine/cros/dbus_connection.h" | 
|  | #if USE_CFM | 
|  | #include "update_engine/cros/requisition_util.h" | 
|  | #endif | 
|  |  | 
|  | using std::string; | 
|  | using std::vector; | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | const char kOOBECompletedMarker[] = "/home/chronos/.oobe_completed"; | 
|  |  | 
|  | // The stateful directory used by update_engine to store powerwash-safe files. | 
|  | // The files stored here must be added to the powerwash script allowlist. | 
|  | const char kPowerwashSafeDirectory[] = | 
|  | "/mnt/stateful_partition/unencrypted/preserve"; | 
|  |  | 
|  | // The powerwash_count marker file contains the number of times the device was | 
|  | // powerwashed. This value is incremented by the clobber-state script when | 
|  | // a powerwash is performed. | 
|  | const char kPowerwashCountMarker[] = "powerwash_count"; | 
|  |  | 
|  | // The name of the marker file used to trigger powerwash when post-install | 
|  | // completes successfully so that the device is powerwashed on next reboot. | 
|  | const char kPowerwashMarkerFile[] = | 
|  | "/mnt/stateful_partition/factory_install_reset"; | 
|  |  | 
|  | // The name of the marker file used to trigger a save of rollback data | 
|  | // during the next shutdown. | 
|  | const char kRollbackSaveMarkerFile[] = | 
|  | "/mnt/stateful_partition/.save_rollback_data"; | 
|  |  | 
|  | // The contents of the powerwash marker file for the non-rollback case. | 
|  | const char kPowerwashCommand[] = "safe fast keepimg reason=update_engine\n"; | 
|  |  | 
|  | // The contents of the powerwas marker file for the rollback case. | 
|  | const char kRollbackPowerwashCommand[] = | 
|  | "safe fast keepimg rollback reason=update_engine\n"; | 
|  |  | 
|  | // UpdateManager config path. | 
|  | const char* kConfigFilePath = "/etc/update_manager.conf"; | 
|  |  | 
|  | // UpdateManager config options: | 
|  | const char* kConfigOptsIsOOBEEnabled = "is_oobe_enabled"; | 
|  |  | 
|  | const char* kActivePingKey = "first_active_omaha_ping_sent"; | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | namespace chromeos_update_engine { | 
|  |  | 
|  | namespace hardware { | 
|  |  | 
|  | // Factory defined in hardware.h. | 
|  | std::unique_ptr<HardwareInterface> CreateHardware() { | 
|  | std::unique_ptr<HardwareChromeOS> hardware(new HardwareChromeOS()); | 
|  | hardware->Init(); | 
|  | return std::move(hardware); | 
|  | } | 
|  |  | 
|  | }  // namespace hardware | 
|  |  | 
|  | void HardwareChromeOS::Init() { | 
|  | LoadConfig("" /* root_prefix */, IsNormalBootMode()); | 
|  | debugd_proxy_.reset( | 
|  | new org::chromium::debugdProxy(DBusConnection::Get()->GetDBus())); | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::IsOfficialBuild() const { | 
|  | return VbGetSystemPropertyInt("debug_build") == 0; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::IsNormalBootMode() const { | 
|  | bool dev_mode = VbGetSystemPropertyInt("devsw_boot") != 0; | 
|  | return !dev_mode; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::AreDevFeaturesEnabled() const { | 
|  | // Even though the debugd tools are also gated on devmode, checking here can | 
|  | // save us a D-Bus call so it's worth doing explicitly. | 
|  | if (IsNormalBootMode()) | 
|  | return false; | 
|  |  | 
|  | int32_t dev_features = debugd::DEV_FEATURES_DISABLED; | 
|  | brillo::ErrorPtr error; | 
|  | // Some boards may not include debugd so it's expected that this may fail, | 
|  | // in which case we treat it as disabled. | 
|  | if (debugd_proxy_ && debugd_proxy_->QueryDevFeatures(&dev_features, &error) && | 
|  | !(dev_features & debugd::DEV_FEATURES_DISABLED)) { | 
|  | LOG(INFO) << "Debugd dev tools enabled."; | 
|  | return true; | 
|  | } | 
|  | return false; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::IsOOBEEnabled() const { | 
|  | return is_oobe_enabled_; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::IsOOBEComplete(base::Time* out_time_of_oobe) const { | 
|  | if (!is_oobe_enabled_) { | 
|  | LOG(WARNING) << "OOBE is not enabled but IsOOBEComplete() was called"; | 
|  | } | 
|  | struct stat statbuf; | 
|  | if (stat(kOOBECompletedMarker, &statbuf) != 0) { | 
|  | if (errno != ENOENT) { | 
|  | PLOG(ERROR) << "Error getting information about " << kOOBECompletedMarker; | 
|  | } | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (out_time_of_oobe != nullptr) | 
|  | *out_time_of_oobe = base::Time::FromTimeT(statbuf.st_mtime); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | static string ReadValueFromCrosSystem(const string& key) { | 
|  | char value_buffer[VB_MAX_STRING_PROPERTY]; | 
|  |  | 
|  | const char* rv = VbGetSystemPropertyString( | 
|  | key.c_str(), value_buffer, sizeof(value_buffer)); | 
|  | if (rv != nullptr) { | 
|  | string return_value(value_buffer); | 
|  | base::TrimWhitespaceASCII(return_value, base::TRIM_ALL, &return_value); | 
|  | return return_value; | 
|  | } | 
|  |  | 
|  | LOG(ERROR) << "Unable to read crossystem key " << key; | 
|  | return ""; | 
|  | } | 
|  |  | 
|  | string HardwareChromeOS::GetHardwareClass() const { | 
|  | if (USE_HWID_OVERRIDE) { | 
|  | return HwidOverride::Read(base::FilePath("/")); | 
|  | } | 
|  | return ReadValueFromCrosSystem("hwid"); | 
|  | } | 
|  |  | 
|  | string HardwareChromeOS::GetDeviceRequisition() const { | 
|  | #if USE_CFM | 
|  | const char* kLocalStatePath = "/home/chronos/Local State"; | 
|  | return ReadDeviceRequisition(base::FilePath(kLocalStatePath)); | 
|  | #else | 
|  | return ""; | 
|  | #endif | 
|  | } | 
|  |  | 
|  | int HardwareChromeOS::GetMinKernelKeyVersion() const { | 
|  | return VbGetSystemPropertyInt("tpm_kernver"); | 
|  | } | 
|  |  | 
|  | int HardwareChromeOS::GetMaxFirmwareKeyRollforward() const { | 
|  | return VbGetSystemPropertyInt("firmware_max_rollforward"); | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::SetMaxFirmwareKeyRollforward( | 
|  | int firmware_max_rollforward) { | 
|  | // Not all devices have this field yet. So first try to read | 
|  | // it and if there is an error just fail. | 
|  | if (GetMaxFirmwareKeyRollforward() == -1) | 
|  | return false; | 
|  |  | 
|  | return VbSetSystemPropertyInt("firmware_max_rollforward", | 
|  | firmware_max_rollforward) == 0; | 
|  | } | 
|  |  | 
|  | int HardwareChromeOS::GetMinFirmwareKeyVersion() const { | 
|  | return VbGetSystemPropertyInt("tpm_fwver"); | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::SetMaxKernelKeyRollforward(int kernel_max_rollforward) { | 
|  | return VbSetSystemPropertyInt("kernel_max_rollforward", | 
|  | kernel_max_rollforward) == 0; | 
|  | } | 
|  |  | 
|  | int HardwareChromeOS::GetPowerwashCount() const { | 
|  | int powerwash_count; | 
|  | base::FilePath marker_path = | 
|  | base::FilePath(kPowerwashSafeDirectory).Append(kPowerwashCountMarker); | 
|  | string contents; | 
|  | if (!utils::ReadFile(marker_path.value(), &contents)) | 
|  | return -1; | 
|  | base::TrimWhitespaceASCII(contents, base::TRIM_TRAILING, &contents); | 
|  | if (!base::StringToInt(contents, &powerwash_count)) | 
|  | return -1; | 
|  | return powerwash_count; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::SchedulePowerwash(bool save_rollback_data) { | 
|  | if (save_rollback_data) { | 
|  | if (!utils::WriteFile(kRollbackSaveMarkerFile, nullptr, 0)) { | 
|  | PLOG(ERROR) << "Error in creating rollback save marker file: " | 
|  | << kRollbackSaveMarkerFile << ". Rollback will not" | 
|  | << " preserve any data."; | 
|  | } else { | 
|  | LOG(INFO) << "Rollback data save has been scheduled on next shutdown."; | 
|  | } | 
|  | } | 
|  |  | 
|  | const char* powerwash_command = | 
|  | save_rollback_data ? kRollbackPowerwashCommand : kPowerwashCommand; | 
|  | bool result = utils::WriteFile( | 
|  | kPowerwashMarkerFile, powerwash_command, strlen(powerwash_command)); | 
|  | if (result) { | 
|  | LOG(INFO) << "Created " << kPowerwashMarkerFile | 
|  | << " to powerwash on next reboot (" | 
|  | << "save_rollback_data=" << save_rollback_data << ")"; | 
|  | } else { | 
|  | PLOG(ERROR) << "Error in creating powerwash marker file: " | 
|  | << kPowerwashMarkerFile; | 
|  | } | 
|  |  | 
|  | return result; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::CancelPowerwash() { | 
|  | bool result = base::DeleteFile(base::FilePath(kPowerwashMarkerFile)); | 
|  |  | 
|  | if (result) { | 
|  | LOG(INFO) << "Successfully deleted the powerwash marker file : " | 
|  | << kPowerwashMarkerFile; | 
|  | } else { | 
|  | PLOG(ERROR) << "Could not delete the powerwash marker file : " | 
|  | << kPowerwashMarkerFile; | 
|  | } | 
|  |  | 
|  | // Delete the rollback save marker file if it existed. | 
|  | if (!base::DeleteFile(base::FilePath(kRollbackSaveMarkerFile))) { | 
|  | PLOG(ERROR) << "Could not remove rollback save marker"; | 
|  | } | 
|  |  | 
|  | return result; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::GetNonVolatileDirectory(base::FilePath* path) const { | 
|  | *path = base::FilePath(constants::kNonVolatileDirectory); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::GetPowerwashSafeDirectory(base::FilePath* path) const { | 
|  | *path = base::FilePath(kPowerwashSafeDirectory); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | int64_t HardwareChromeOS::GetBuildTimestamp() const { | 
|  | // TODO(senj): implement this in Chrome OS. | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | void HardwareChromeOS::LoadConfig(const string& root_prefix, bool normal_mode) { | 
|  | brillo::KeyValueStore store; | 
|  |  | 
|  | if (normal_mode) { | 
|  | store.Load(base::FilePath(root_prefix + kConfigFilePath)); | 
|  | } else { | 
|  | if (store.Load(base::FilePath(root_prefix + kStatefulPartition + | 
|  | kConfigFilePath))) { | 
|  | LOG(INFO) << "UpdateManager Config loaded from stateful partition."; | 
|  | } else { | 
|  | store.Load(base::FilePath(root_prefix + kConfigFilePath)); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (!store.GetBoolean(kConfigOptsIsOOBEEnabled, &is_oobe_enabled_)) | 
|  | is_oobe_enabled_ = true;  // Default value. | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::GetFirstActiveOmahaPingSent() const { | 
|  | string active_ping_str; | 
|  | if (!utils::GetVpdValue(kActivePingKey, &active_ping_str)) { | 
|  | return false; | 
|  | } | 
|  |  | 
|  | int active_ping; | 
|  | if (active_ping_str.empty() || | 
|  | !base::StringToInt(active_ping_str, &active_ping)) { | 
|  | LOG(INFO) << "Failed to parse active_ping value: " << active_ping_str; | 
|  | return false; | 
|  | } | 
|  | return static_cast<bool>(active_ping); | 
|  | } | 
|  |  | 
|  | bool HardwareChromeOS::SetFirstActiveOmahaPingSent() { | 
|  | int exit_code = 0; | 
|  | string output, error; | 
|  | vector<string> vpd_set_cmd = { | 
|  | "vpd", "-i", "RW_VPD", "-s", string(kActivePingKey) + "=1"}; | 
|  | if (!Subprocess::SynchronousExec(vpd_set_cmd, &exit_code, &output, &error) || | 
|  | exit_code) { | 
|  | LOG(ERROR) << "Failed to set vpd key for " << kActivePingKey | 
|  | << " with exit code: " << exit_code << " with output: " << output | 
|  | << " and error: " << error; | 
|  | return false; | 
|  | } else if (!error.empty()) { | 
|  | LOG(INFO) << "vpd succeeded but with error logs: " << error; | 
|  | } | 
|  |  | 
|  | vector<string> vpd_dump_cmd = {"dump_vpd_log", "--force"}; | 
|  | if (!Subprocess::SynchronousExec(vpd_dump_cmd, &exit_code, &output, &error) || | 
|  | exit_code) { | 
|  | LOG(ERROR) << "Failed to cache " << kActivePingKey << " using dump_vpd_log" | 
|  | << " with exit code: " << exit_code << " with output: " << output | 
|  | << " and error: " << error; | 
|  | return false; | 
|  | } else if (!error.empty()) { | 
|  | LOG(INFO) << "dump_vpd_log succeeded but with error logs: " << error; | 
|  | } | 
|  | return true; | 
|  | } | 
|  |  | 
|  | void HardwareChromeOS::SetWarmReset(bool warm_reset) {} | 
|  |  | 
|  | void HardwareChromeOS::SetVbmetaDigestForInactiveSlot(bool reset) {} | 
|  |  | 
|  | std::string HardwareChromeOS::GetVersionForLogging( | 
|  | const std::string& partition_name) const { | 
|  | // TODO(zhangkelvin) Implement per-partition timestamp for Chrome OS. | 
|  | return ""; | 
|  | } | 
|  |  | 
|  | ErrorCode HardwareChromeOS::IsPartitionUpdateValid( | 
|  | const std::string& partition_name, const std::string& new_version) const { | 
|  | // TODO(zhangkelvin) Implement per-partition timestamp for Chrome OS. | 
|  | return ErrorCode::kSuccess; | 
|  | } | 
|  |  | 
|  | const char* HardwareChromeOS::GetPartitionMountOptions( | 
|  | const std::string& partition_name) const { | 
|  | return ""; | 
|  | } | 
|  |  | 
|  | }  // namespace chromeos_update_engine |