Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2012 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 16 | |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 17 | #ifndef UPDATE_ENGINE_PAYLOAD_CONSUMER_FILESYSTEM_VERIFIER_ACTION_H_ |
| 18 | #define UPDATE_ENGINE_PAYLOAD_CONSUMER_FILESYSTEM_VERIFIER_ACTION_H_ |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 19 | |
| 20 | #include <sys/stat.h> |
| 21 | #include <sys/types.h> |
| 22 | |
Amin Hassani | abe4a77 | 2018-07-26 11:19:10 -0700 | [diff] [blame] | 23 | #include <memory> |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 24 | #include <string> |
| 25 | #include <vector> |
| 26 | |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 27 | #include <brillo/message_loops/message_loop.h> |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 28 | |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 29 | #include "update_engine/common/action.h" |
| 30 | #include "update_engine/common/hash_calculator.h" |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 31 | #include "update_engine/payload_consumer/file_descriptor.h" |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 32 | #include "update_engine/payload_consumer/install_plan.h" |
Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 33 | #include "update_engine/payload_consumer/verity_writer_interface.h" |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 34 | |
Sen Jiang | fef85fd | 2016-03-25 15:32:49 -0700 | [diff] [blame] | 35 | // This action will hash all the partitions of the target slot involved in the |
| 36 | // update. The hashes are then verified against the ones in the InstallPlan. |
| 37 | // If the target hash does not match, the action will fail. In case of failure, |
| 38 | // the error code will depend on whether the source slot hashes are provided and |
| 39 | // match. |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 40 | |
| 41 | namespace chromeos_update_engine { |
| 42 | |
Sen Jiang | fef85fd | 2016-03-25 15:32:49 -0700 | [diff] [blame] | 43 | // The step FilesystemVerifier is on. On kVerifyTargetHash it computes the hash |
| 44 | // on the target partitions based on the already populated size and verifies it |
| 45 | // matches the one in the target_hash in the InstallPlan. |
| 46 | // If the hash matches, then we skip the kVerifySourceHash step, otherwise we |
| 47 | // need to check if the source is the root cause of the mismatch. |
| 48 | enum class VerifierStep { |
Alex Deymo | e5e5fe9 | 2015-10-05 09:28:19 -0700 | [diff] [blame] | 49 | kVerifyTargetHash, |
Sen Jiang | 1ad42ad | 2015-11-17 15:04:02 -0800 | [diff] [blame] | 50 | kVerifySourceHash, |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 51 | }; |
| 52 | |
Kelvin Zhang | 70eef23 | 2020-06-12 20:32:40 +0000 | [diff] [blame] | 53 | class FilesystemVerifyDelegate { |
| 54 | public: |
| 55 | virtual ~FilesystemVerifyDelegate() = default; |
| 56 | virtual void OnVerifyProgressUpdate(double progress) = 0; |
| 57 | }; |
| 58 | |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 59 | class FilesystemVerifierAction : public InstallPlanAction { |
| 60 | public: |
Tianjie | 24f9609 | 2020-06-30 12:26:25 -0700 | [diff] [blame] | 61 | explicit FilesystemVerifierAction( |
| 62 | DynamicPartitionControlInterface* dynamic_control) |
| 63 | : verity_writer_(verity_writer::CreateVerityWriter()), |
| 64 | dynamic_control_(dynamic_control) { |
| 65 | CHECK(dynamic_control_); |
| 66 | } |
| 67 | |
Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 68 | ~FilesystemVerifierAction() override = default; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 69 | |
| 70 | void PerformAction() override; |
| 71 | void TerminateProcessing() override; |
| 72 | |
Kelvin Zhang | 70eef23 | 2020-06-12 20:32:40 +0000 | [diff] [blame] | 73 | // Used for listening to progress updates |
| 74 | void set_delegate(FilesystemVerifyDelegate* delegate) { |
| 75 | this->delegate_ = delegate; |
| 76 | } |
| 77 | [[nodiscard]] FilesystemVerifyDelegate* get_delegate() const { |
| 78 | return this->delegate_; |
| 79 | } |
| 80 | |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 81 | // Debugging/logging |
| 82 | static std::string StaticType() { return "FilesystemVerifierAction"; } |
| 83 | std::string Type() const override { return StaticType(); } |
| 84 | |
| 85 | private: |
Amin Hassani | abe4a77 | 2018-07-26 11:19:10 -0700 | [diff] [blame] | 86 | friend class FilesystemVerifierActionTestDelegate; |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 87 | |
| 88 | // Return true if we need to write verity bytes. |
| 89 | bool ShouldWriteVerity(); |
Alex Deymo | e5e5fe9 | 2015-10-05 09:28:19 -0700 | [diff] [blame] | 90 | // Starts the hashing of the current partition. If there aren't any partitions |
Sen Jiang | fef85fd | 2016-03-25 15:32:49 -0700 | [diff] [blame] | 91 | // remaining to be hashed, it finishes the action. |
Alex Deymo | e5e5fe9 | 2015-10-05 09:28:19 -0700 | [diff] [blame] | 92 | void StartPartitionHashing(); |
| 93 | |
Kelvin Zhang | e012f65 | 2021-05-10 16:00:31 -0400 | [diff] [blame^] | 94 | const std::string& GetPartitionPath() const; |
| 95 | |
| 96 | bool IsVABC(const InstallPlan::Partition& partition) const; |
| 97 | |
| 98 | size_t GetPartitionSize() const; |
| 99 | |
Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 100 | // Schedules the asynchronous read of the filesystem part of this |
| 101 | // partition(not including hashtree/verity). |
| 102 | void ScheduleFileSystemRead(); |
| 103 | |
| 104 | // Read the verity part of this partition.(hash tree and FEC) |
| 105 | void ReadVerityAndFooter(); |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 106 | |
Alex Deymo | b9e8e26 | 2015-08-03 20:23:03 -0700 | [diff] [blame] | 107 | // Called from the main loop when a single read from |src_stream_| succeeds or |
| 108 | // fails, calling OnReadDoneCallback() and OnReadErrorCallback() respectively. |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 109 | void OnReadDone(size_t bytes_read); |
Alex Deymo | b9e8e26 | 2015-08-03 20:23:03 -0700 | [diff] [blame] | 110 | |
Alex Deymo | e5e5fe9 | 2015-10-05 09:28:19 -0700 | [diff] [blame] | 111 | // When the read is done, finalize the hash checking of the current partition |
| 112 | // and continue checking the next one. |
| 113 | void FinishPartitionHashing(); |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 114 | |
| 115 | // Cleans up all the variables we use for async operations and tells the |
| 116 | // ActionProcessor we're done w/ |code| as passed in. |cancelled_| should be |
| 117 | // true if TerminateProcessing() was called. |
| 118 | void Cleanup(ErrorCode code); |
| 119 | |
Kelvin Zhang | 70eef23 | 2020-06-12 20:32:40 +0000 | [diff] [blame] | 120 | // Invoke delegate callback to report progress, if delegate is not null |
| 121 | void UpdateProgress(double progress); |
| 122 | |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 123 | // Initialize read_fd_ and write_fd_ |
| 124 | bool InitializeFd(const std::string& part_path); |
| 125 | bool InitializeFdVABC(); |
| 126 | |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 127 | // The type of the partition that we are verifying. |
Sen Jiang | fef85fd | 2016-03-25 15:32:49 -0700 | [diff] [blame] | 128 | VerifierStep verifier_step_ = VerifierStep::kVerifyTargetHash; |
Alex Deymo | e5e5fe9 | 2015-10-05 09:28:19 -0700 | [diff] [blame] | 129 | |
Alex Deymo | e5e5fe9 | 2015-10-05 09:28:19 -0700 | [diff] [blame] | 130 | // The index in the install_plan_.partitions vector of the partition currently |
| 131 | // being hashed. |
| 132 | size_t partition_index_{0}; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 133 | |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 134 | // If not null, the FileDescriptor used to read from the device. |
Kelvin Zhang | 4f28a6c | 2021-01-14 14:04:57 -0500 | [diff] [blame] | 135 | // verity writer might attempt to write to this fd, if verity is enabled. |
| 136 | FileDescriptorPtr partition_fd_; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 137 | |
| 138 | // Buffer for storing data we read. |
Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 139 | brillo::Blob buffer_; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 140 | |
Alex Deymo | 20c9920 | 2015-07-09 16:14:16 -0700 | [diff] [blame] | 141 | bool cancelled_{false}; // true if the action has been cancelled. |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 142 | |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 143 | // Calculates the hash of the data. |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 144 | std::unique_ptr<HashCalculator> hasher_; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 145 | |
Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 146 | // Write verity data of the current partition. |
| 147 | std::unique_ptr<VerityWriterInterface> verity_writer_; |
| 148 | |
Tianjie | 24f9609 | 2020-06-30 12:26:25 -0700 | [diff] [blame] | 149 | // Verifies the untouched dynamic partitions for partial updates. |
| 150 | DynamicPartitionControlInterface* dynamic_control_{nullptr}; |
| 151 | |
Sen Jiang | 57f9180 | 2017-11-14 17:42:13 -0800 | [diff] [blame] | 152 | // Reads and hashes this many bytes from the head of the input stream. When |
| 153 | // the partition starts to be hashed, this field is initialized from the |
| 154 | // corresponding InstallPlan::Partition size which is the total size |
| 155 | // update_engine is expected to write, and may be smaller than the size of the |
| 156 | // partition in gpt. |
| 157 | uint64_t partition_size_{0}; |
| 158 | |
| 159 | // The byte offset that we are reading in the current partition. |
| 160 | uint64_t offset_{0}; |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 161 | |
Kelvin Zhang | 7f92567 | 2021-03-15 13:37:40 -0400 | [diff] [blame] | 162 | // The end offset of filesystem data, first byte position of hashtree. |
| 163 | uint64_t filesystem_data_end_{0}; |
| 164 | |
Kelvin Zhang | 70eef23 | 2020-06-12 20:32:40 +0000 | [diff] [blame] | 165 | // An observer that observes progress updates of this action. |
| 166 | FilesystemVerifyDelegate* delegate_{}; |
| 167 | |
Kelvin Zhang | ec205cf | 2020-09-28 13:23:40 -0400 | [diff] [blame] | 168 | // Callback that should be cancelled on |TerminateProcessing|. Usually this |
| 169 | // points to pending read callbacks from async stream. |
| 170 | brillo::MessageLoop::TaskId pending_task_id_{ |
| 171 | brillo::MessageLoop::kTaskIdNull}; |
| 172 | |
Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 173 | DISALLOW_COPY_AND_ASSIGN(FilesystemVerifierAction); |
| 174 | }; |
| 175 | |
| 176 | } // namespace chromeos_update_engine |
| 177 | |
Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 178 | #endif // UPDATE_ENGINE_PAYLOAD_CONSUMER_FILESYSTEM_VERIFIER_ACTION_H_ |