blob: 1f527c923490cdee4b52d826b38321de408b0ee2 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2012 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
Allie Woodeb9e6d82015-04-17 13:55:30 -070016
Alex Deymo39910dc2015-11-09 17:04:30 -080017#ifndef UPDATE_ENGINE_PAYLOAD_CONSUMER_FILESYSTEM_VERIFIER_ACTION_H_
18#define UPDATE_ENGINE_PAYLOAD_CONSUMER_FILESYSTEM_VERIFIER_ACTION_H_
Allie Woodeb9e6d82015-04-17 13:55:30 -070019
20#include <sys/stat.h>
21#include <sys/types.h>
22
Amin Hassaniabe4a772018-07-26 11:19:10 -070023#include <memory>
Allie Woodeb9e6d82015-04-17 13:55:30 -070024#include <string>
25#include <vector>
26
Kelvin Zhangec205cf2020-09-28 13:23:40 -040027#include <brillo/message_loops/message_loop.h>
Allie Woodeb9e6d82015-04-17 13:55:30 -070028
Alex Deymo39910dc2015-11-09 17:04:30 -080029#include "update_engine/common/action.h"
30#include "update_engine/common/hash_calculator.h"
Kelvin Zhangec205cf2020-09-28 13:23:40 -040031#include "update_engine/payload_consumer/file_descriptor.h"
Alex Deymo39910dc2015-11-09 17:04:30 -080032#include "update_engine/payload_consumer/install_plan.h"
Sen Jiang57f91802017-11-14 17:42:13 -080033#include "update_engine/payload_consumer/verity_writer_interface.h"
Allie Woodeb9e6d82015-04-17 13:55:30 -070034
Sen Jiangfef85fd2016-03-25 15:32:49 -070035// This action will hash all the partitions of the target slot involved in the
36// update. The hashes are then verified against the ones in the InstallPlan.
37// If the target hash does not match, the action will fail. In case of failure,
38// the error code will depend on whether the source slot hashes are provided and
39// match.
Allie Woodeb9e6d82015-04-17 13:55:30 -070040
41namespace chromeos_update_engine {
42
Sen Jiangfef85fd2016-03-25 15:32:49 -070043// The step FilesystemVerifier is on. On kVerifyTargetHash it computes the hash
44// on the target partitions based on the already populated size and verifies it
45// matches the one in the target_hash in the InstallPlan.
46// If the hash matches, then we skip the kVerifySourceHash step, otherwise we
47// need to check if the source is the root cause of the mismatch.
48enum class VerifierStep {
Alex Deymoe5e5fe92015-10-05 09:28:19 -070049 kVerifyTargetHash,
Sen Jiang1ad42ad2015-11-17 15:04:02 -080050 kVerifySourceHash,
Allie Woodeb9e6d82015-04-17 13:55:30 -070051};
52
Kelvin Zhang70eef232020-06-12 20:32:40 +000053class FilesystemVerifyDelegate {
54 public:
55 virtual ~FilesystemVerifyDelegate() = default;
56 virtual void OnVerifyProgressUpdate(double progress) = 0;
57};
58
Allie Woodeb9e6d82015-04-17 13:55:30 -070059class FilesystemVerifierAction : public InstallPlanAction {
60 public:
Tianjie24f96092020-06-30 12:26:25 -070061 explicit FilesystemVerifierAction(
62 DynamicPartitionControlInterface* dynamic_control)
63 : verity_writer_(verity_writer::CreateVerityWriter()),
64 dynamic_control_(dynamic_control) {
65 CHECK(dynamic_control_);
66 }
67
Sen Jiang57f91802017-11-14 17:42:13 -080068 ~FilesystemVerifierAction() override = default;
Allie Woodeb9e6d82015-04-17 13:55:30 -070069
70 void PerformAction() override;
71 void TerminateProcessing() override;
72
Kelvin Zhang70eef232020-06-12 20:32:40 +000073 // Used for listening to progress updates
74 void set_delegate(FilesystemVerifyDelegate* delegate) {
75 this->delegate_ = delegate;
76 }
77 [[nodiscard]] FilesystemVerifyDelegate* get_delegate() const {
78 return this->delegate_;
79 }
80
Allie Woodeb9e6d82015-04-17 13:55:30 -070081 // Debugging/logging
82 static std::string StaticType() { return "FilesystemVerifierAction"; }
83 std::string Type() const override { return StaticType(); }
84
85 private:
Amin Hassaniabe4a772018-07-26 11:19:10 -070086 friend class FilesystemVerifierActionTestDelegate;
Kelvin Zhangec205cf2020-09-28 13:23:40 -040087
88 // Return true if we need to write verity bytes.
89 bool ShouldWriteVerity();
Alex Deymoe5e5fe92015-10-05 09:28:19 -070090 // Starts the hashing of the current partition. If there aren't any partitions
Sen Jiangfef85fd2016-03-25 15:32:49 -070091 // remaining to be hashed, it finishes the action.
Alex Deymoe5e5fe92015-10-05 09:28:19 -070092 void StartPartitionHashing();
93
Kelvin Zhang7f925672021-03-15 13:37:40 -040094 // Schedules the asynchronous read of the filesystem part of this
95 // partition(not including hashtree/verity).
96 void ScheduleFileSystemRead();
97
98 // Read the verity part of this partition.(hash tree and FEC)
99 void ReadVerityAndFooter();
Allie Woodeb9e6d82015-04-17 13:55:30 -0700100
Alex Deymob9e8e262015-08-03 20:23:03 -0700101 // Called from the main loop when a single read from |src_stream_| succeeds or
102 // fails, calling OnReadDoneCallback() and OnReadErrorCallback() respectively.
Kelvin Zhangec205cf2020-09-28 13:23:40 -0400103 void OnReadDone(size_t bytes_read);
Alex Deymob9e8e262015-08-03 20:23:03 -0700104
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700105 // When the read is done, finalize the hash checking of the current partition
106 // and continue checking the next one.
107 void FinishPartitionHashing();
Allie Woodeb9e6d82015-04-17 13:55:30 -0700108
109 // Cleans up all the variables we use for async operations and tells the
110 // ActionProcessor we're done w/ |code| as passed in. |cancelled_| should be
111 // true if TerminateProcessing() was called.
112 void Cleanup(ErrorCode code);
113
Kelvin Zhang70eef232020-06-12 20:32:40 +0000114 // Invoke delegate callback to report progress, if delegate is not null
115 void UpdateProgress(double progress);
116
Kelvin Zhangec205cf2020-09-28 13:23:40 -0400117 // Initialize read_fd_ and write_fd_
118 bool InitializeFd(const std::string& part_path);
119 bool InitializeFdVABC();
120
Allie Woodeb9e6d82015-04-17 13:55:30 -0700121 // The type of the partition that we are verifying.
Sen Jiangfef85fd2016-03-25 15:32:49 -0700122 VerifierStep verifier_step_ = VerifierStep::kVerifyTargetHash;
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700123
Alex Deymoe5e5fe92015-10-05 09:28:19 -0700124 // The index in the install_plan_.partitions vector of the partition currently
125 // being hashed.
126 size_t partition_index_{0};
Allie Woodeb9e6d82015-04-17 13:55:30 -0700127
Kelvin Zhangec205cf2020-09-28 13:23:40 -0400128 // If not null, the FileDescriptor used to read from the device.
129 // |read_fd_| and |write_fd_| will be initialized when we begin hashing a
130 // partition. They will be deallocated once we encounter an error or
131 // successfully finished hashing.
132 FileDescriptorPtr read_fd_;
133 // If not null, the FileDescriptor used to write to the device.
134 // For VABC, this will be different from |read_fd_|. For other cases
135 // this can be the same as |read_fd_|.
136 FileDescriptorPtr write_fd_;
Allie Woodeb9e6d82015-04-17 13:55:30 -0700137
138 // Buffer for storing data we read.
Alex Vakulenko3f39d5c2015-10-13 09:27:13 -0700139 brillo::Blob buffer_;
Allie Woodeb9e6d82015-04-17 13:55:30 -0700140
Alex Deymo20c99202015-07-09 16:14:16 -0700141 bool cancelled_{false}; // true if the action has been cancelled.
Allie Woodeb9e6d82015-04-17 13:55:30 -0700142
Allie Woodeb9e6d82015-04-17 13:55:30 -0700143 // Calculates the hash of the data.
Alex Deymo39910dc2015-11-09 17:04:30 -0800144 std::unique_ptr<HashCalculator> hasher_;
Allie Woodeb9e6d82015-04-17 13:55:30 -0700145
Sen Jiang57f91802017-11-14 17:42:13 -0800146 // Write verity data of the current partition.
147 std::unique_ptr<VerityWriterInterface> verity_writer_;
148
Tianjie24f96092020-06-30 12:26:25 -0700149 // Verifies the untouched dynamic partitions for partial updates.
150 DynamicPartitionControlInterface* dynamic_control_{nullptr};
151
Sen Jiang57f91802017-11-14 17:42:13 -0800152 // Reads and hashes this many bytes from the head of the input stream. When
153 // the partition starts to be hashed, this field is initialized from the
154 // corresponding InstallPlan::Partition size which is the total size
155 // update_engine is expected to write, and may be smaller than the size of the
156 // partition in gpt.
157 uint64_t partition_size_{0};
158
159 // The byte offset that we are reading in the current partition.
160 uint64_t offset_{0};
Allie Woodeb9e6d82015-04-17 13:55:30 -0700161
Kelvin Zhang7f925672021-03-15 13:37:40 -0400162 // The end offset of filesystem data, first byte position of hashtree.
163 uint64_t filesystem_data_end_{0};
164
Kelvin Zhang70eef232020-06-12 20:32:40 +0000165 // An observer that observes progress updates of this action.
166 FilesystemVerifyDelegate* delegate_{};
167
Kelvin Zhangec205cf2020-09-28 13:23:40 -0400168 // Callback that should be cancelled on |TerminateProcessing|. Usually this
169 // points to pending read callbacks from async stream.
170 brillo::MessageLoop::TaskId pending_task_id_{
171 brillo::MessageLoop::kTaskIdNull};
172
Allie Woodeb9e6d82015-04-17 13:55:30 -0700173 DISALLOW_COPY_AND_ASSIGN(FilesystemVerifierAction);
174};
175
176} // namespace chromeos_update_engine
177
Alex Deymo39910dc2015-11-09 17:04:30 -0800178#endif // UPDATE_ENGINE_PAYLOAD_CONSUMER_FILESYSTEM_VERIFIER_ACTION_H_