| Alex Deymo | aea4c1c | 2015-08-19 20:24:43 -0700 | [diff] [blame] | 1 | // | 
 | 2 | // Copyright (C) 2012 The Android Open Source Project | 
 | 3 | // | 
 | 4 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | 5 | // you may not use this file except in compliance with the License. | 
 | 6 | // You may obtain a copy of the License at | 
 | 7 | // | 
 | 8 | //      http://www.apache.org/licenses/LICENSE-2.0 | 
 | 9 | // | 
 | 10 | // Unless required by applicable law or agreed to in writing, software | 
 | 11 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | 13 | // See the License for the specific language governing permissions and | 
 | 14 | // limitations under the License. | 
 | 15 | // | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 16 |  | 
| Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 17 | #include "update_engine/common/utils.h" | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 18 |  | 
| Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 19 | #include <stdint.h> | 
 | 20 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 21 | #include <dirent.h> | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 22 | #include <elf.h> | 
| Alex Deymo | 6f20dd4 | 2015-08-18 16:42:46 -0700 | [diff] [blame] | 23 | #include <endian.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 24 | #include <errno.h> | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 25 | #include <ext2fs/ext2fs.h> | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 26 | #include <fcntl.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 27 | #include <stdio.h> | 
 | 28 | #include <stdlib.h> | 
 | 29 | #include <string.h> | 
| Alex Deymo | c4acdf4 | 2014-05-28 21:07:10 -0700 | [diff] [blame] | 30 | #include <sys/mount.h> | 
 | 31 | #include <sys/resource.h> | 
 | 32 | #include <sys/stat.h> | 
 | 33 | #include <sys/types.h> | 
 | 34 | #include <sys/wait.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 35 | #include <unistd.h> | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 36 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 37 | #include <algorithm> | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 38 | #include <utility> | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 39 | #include <vector> | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 40 |  | 
| Alex Vakulenko | 4906c1c | 2014-08-21 13:17:44 -0700 | [diff] [blame] | 41 | #include <base/callback.h> | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 42 | #include <base/files/file_path.h> | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 43 | #include <base/files/file_util.h> | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 44 | #include <base/files/scoped_file.h> | 
| Alex Deymo | c00c98a | 2015-03-17 17:38:00 -0700 | [diff] [blame] | 45 | #include <base/format_macros.h> | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 46 | #include <base/location.h> | 
| Mike Frysinger | 8155d08 | 2012-04-06 15:23:18 -0400 | [diff] [blame] | 47 | #include <base/logging.h> | 
| Chris Sosa | fc661a1 | 2013-02-26 14:43:21 -0800 | [diff] [blame] | 48 | #include <base/posix/eintr_wrapper.h> | 
| Will Drewry | 8f71da8 | 2010-08-30 14:07:11 -0500 | [diff] [blame] | 49 | #include <base/rand_util.h> | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 50 | #include <base/strings/string_number_conversions.h> | 
 | 51 | #include <base/strings/string_split.h> | 
 | 52 | #include <base/strings/string_util.h> | 
 | 53 | #include <base/strings/stringprintf.h> | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 54 | #include <brillo/data_encoding.h> | 
 | 55 | #include <brillo/message_loops/message_loop.h> | 
| Will Drewry | 8f71da8 | 2010-08-30 14:07:11 -0500 | [diff] [blame] | 56 |  | 
| Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 57 | #include "update_engine/common/clock_interface.h" | 
 | 58 | #include "update_engine/common/constants.h" | 
| Sen Jiang | 9c12346 | 2015-11-19 13:16:23 -0800 | [diff] [blame] | 59 | #include "update_engine/common/platform_constants.h" | 
| Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 60 | #include "update_engine/common/prefs_interface.h" | 
 | 61 | #include "update_engine/common/subprocess.h" | 
| Alex Deymo | 39910dc | 2015-11-09 17:04:30 -0800 | [diff] [blame] | 62 | #include "update_engine/payload_consumer/file_descriptor.h" | 
 | 63 | #include "update_engine/payload_consumer/file_writer.h" | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 64 |  | 
| Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 65 | using base::Time; | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 66 | using base::TimeDelta; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 67 | using std::min; | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 68 | using std::pair; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 69 | using std::string; | 
 | 70 | using std::vector; | 
 | 71 |  | 
 | 72 | namespace chromeos_update_engine { | 
 | 73 |  | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 74 | namespace { | 
 | 75 |  | 
 | 76 | // The following constants control how UnmountFilesystem should retry if | 
 | 77 | // umount() fails with an errno EBUSY, i.e. retry 5 times over the course of | 
 | 78 | // one second. | 
 | 79 | const int kUnmountMaxNumOfRetries = 5; | 
 | 80 | const int kUnmountRetryIntervalInMicroseconds = 200 * 1000;  // 200 ms | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 81 |  | 
 | 82 | // Number of bytes to read from a file to attempt to detect its contents. Used | 
 | 83 | // in GetFileFormat. | 
 | 84 | const int kGetFileFormatMaxHeaderSize = 32; | 
 | 85 |  | 
| Alex Deymo | dd132f3 | 2015-09-14 19:12:07 -0700 | [diff] [blame] | 86 | // The path to the kernel's boot_id. | 
 | 87 | const char kBootIdPath[] = "/proc/sys/kernel/random/boot_id"; | 
 | 88 |  | 
| Nam T. Nguyen | a78b28c | 2015-03-06 22:30:12 -0800 | [diff] [blame] | 89 | // Return true if |disk_name| is an MTD or a UBI device. Note that this test is | 
 | 90 | // simply based on the name of the device. | 
 | 91 | bool IsMtdDeviceName(const string& disk_name) { | 
| Alex Vakulenko | a3cf75a | 2016-01-20 07:56:15 -0800 | [diff] [blame^] | 92 |   return base::StartsWith(disk_name, "/dev/ubi", | 
 | 93 |                           base::CompareCase::SENSITIVE) || | 
 | 94 |          base::StartsWith(disk_name, "/dev/mtd", base::CompareCase::SENSITIVE); | 
| Nam T. Nguyen | a78b28c | 2015-03-06 22:30:12 -0800 | [diff] [blame] | 95 | } | 
 | 96 |  | 
 | 97 | // Return the device name for the corresponding partition on a NAND device. | 
 | 98 | // WARNING: This function returns device names that are not mountable. | 
 | 99 | string MakeNandPartitionName(int partition_num) { | 
 | 100 |   switch (partition_num) { | 
 | 101 |     case 2: | 
 | 102 |     case 4: | 
 | 103 |     case 6: { | 
 | 104 |       return base::StringPrintf("/dev/mtd%d", partition_num); | 
 | 105 |     } | 
 | 106 |     default: { | 
 | 107 |       return base::StringPrintf("/dev/ubi%d_0", partition_num); | 
 | 108 |     } | 
 | 109 |   } | 
 | 110 | } | 
 | 111 |  | 
 | 112 | // Return the device name for the corresponding partition on a NAND device that | 
 | 113 | // may be mountable (but may not be writable). | 
 | 114 | string MakeNandPartitionNameForMount(int partition_num) { | 
 | 115 |   switch (partition_num) { | 
 | 116 |     case 2: | 
 | 117 |     case 4: | 
 | 118 |     case 6: { | 
 | 119 |       return base::StringPrintf("/dev/mtd%d", partition_num); | 
 | 120 |     } | 
 | 121 |     case 3: | 
 | 122 |     case 5: | 
 | 123 |     case 7: { | 
 | 124 |       return base::StringPrintf("/dev/ubiblock%d_0", partition_num); | 
 | 125 |     } | 
 | 126 |     default: { | 
 | 127 |       return base::StringPrintf("/dev/ubi%d_0", partition_num); | 
 | 128 |     } | 
 | 129 |   } | 
 | 130 | } | 
 | 131 |  | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 132 | // If |path| is absolute, or explicit relative to the current working directory, | 
 | 133 | // leaves it as is. Otherwise, uses the system's temp directory, as defined by | 
 | 134 | // base::GetTempDir() and prepends it to |path|. On success stores the full | 
 | 135 | // temporary path in |template_path| and returns true. | 
 | 136 | bool GetTempName(const string& path, base::FilePath* template_path) { | 
| Alex Vakulenko | a3cf75a | 2016-01-20 07:56:15 -0800 | [diff] [blame^] | 137 |   if (path[0] == '/' || | 
 | 138 |       base::StartsWith(path, "./", base::CompareCase::SENSITIVE) || | 
 | 139 |       base::StartsWith(path, "../", base::CompareCase::SENSITIVE)) { | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 140 |     *template_path = base::FilePath(path); | 
 | 141 |     return true; | 
 | 142 |   } | 
 | 143 |  | 
 | 144 |   base::FilePath temp_dir; | 
| Sen Jiang | 9c12346 | 2015-11-19 13:16:23 -0800 | [diff] [blame] | 145 | #ifdef __ANDROID__ | 
 | 146 |   temp_dir = base::FilePath(constants::kNonVolatileDirectory).Append("tmp"); | 
 | 147 |   if (!base::PathExists(temp_dir)) | 
 | 148 |     TEST_AND_RETURN_FALSE(base::CreateDirectory(temp_dir)); | 
 | 149 | #else | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 150 |   TEST_AND_RETURN_FALSE(base::GetTempDir(&temp_dir)); | 
| Sen Jiang | 9c12346 | 2015-11-19 13:16:23 -0800 | [diff] [blame] | 151 | #endif  // __ANDROID__ | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 152 |   *template_path = temp_dir.Append(path); | 
 | 153 |   return true; | 
 | 154 | } | 
 | 155 |  | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 156 | }  // namespace | 
 | 157 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 158 | namespace utils { | 
 | 159 |  | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 160 | // Cgroup container is created in update-engine's upstart script located at | 
 | 161 | // /etc/init/update-engine.conf. | 
 | 162 | static const char kCGroupDir[] = "/sys/fs/cgroup/cpu/update-engine"; | 
 | 163 |  | 
| J. Richard Barnette | 63137e5 | 2013-10-28 10:57:29 -0700 | [diff] [blame] | 164 | string ParseECVersion(string input_line) { | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 165 |   base::TrimWhitespaceASCII(input_line, base::TRIM_ALL, &input_line); | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 166 |  | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 167 |   // At this point we want to convert the format key=value pair from mosys to | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 168 |   // a vector of key value pairs. | 
| Ben Chan | f9cb98c | 2014-09-21 18:31:30 -0700 | [diff] [blame] | 169 |   vector<pair<string, string>> kv_pairs; | 
| J. Richard Barnette | 63137e5 | 2013-10-28 10:57:29 -0700 | [diff] [blame] | 170 |   if (base::SplitStringIntoKeyValuePairs(input_line, '=', ' ', &kv_pairs)) { | 
| Alex Deymo | 020600d | 2014-11-05 21:05:55 -0800 | [diff] [blame] | 171 |     for (const pair<string, string>& kv_pair : kv_pairs) { | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 172 |       // Finally match against the fw_verion which may have quotes. | 
| Alex Deymo | 020600d | 2014-11-05 21:05:55 -0800 | [diff] [blame] | 173 |       if (kv_pair.first == "fw_version") { | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 174 |         string output; | 
 | 175 |         // Trim any quotes. | 
| Alex Deymo | 020600d | 2014-11-05 21:05:55 -0800 | [diff] [blame] | 176 |         base::TrimString(kv_pair.second, "\"", &output); | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 177 |         return output; | 
 | 178 |       } | 
 | 179 |     } | 
 | 180 |   } | 
 | 181 |   LOG(ERROR) << "Unable to parse fwid from ec info."; | 
 | 182 |   return ""; | 
 | 183 | } | 
 | 184 |  | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 185 | bool WriteFile(const char* path, const void* data, int data_len) { | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 186 |   DirectFileWriter writer; | 
 | 187 |   TEST_AND_RETURN_FALSE_ERRNO(0 == writer.Open(path, | 
 | 188 |                                                O_WRONLY | O_CREAT | O_TRUNC, | 
| Chris Masone | 4dc2ada | 2010-09-23 12:43:03 -0700 | [diff] [blame] | 189 |                                                0600)); | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 190 |   ScopedFileWriterCloser closer(&writer); | 
| Don Garrett | e410e0f | 2011-11-10 15:39:01 -0800 | [diff] [blame] | 191 |   TEST_AND_RETURN_FALSE_ERRNO(writer.Write(data, data_len)); | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 192 |   return true; | 
 | 193 | } | 
 | 194 |  | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 195 | bool WriteAll(int fd, const void* buf, size_t count) { | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 196 |   const char* c_buf = static_cast<const char*>(buf); | 
 | 197 |   ssize_t bytes_written = 0; | 
 | 198 |   while (bytes_written < static_cast<ssize_t>(count)) { | 
 | 199 |     ssize_t rc = write(fd, c_buf + bytes_written, count - bytes_written); | 
 | 200 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 201 |     bytes_written += rc; | 
 | 202 |   } | 
 | 203 |   return true; | 
 | 204 | } | 
 | 205 |  | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 206 | bool PWriteAll(int fd, const void* buf, size_t count, off_t offset) { | 
 | 207 |   const char* c_buf = static_cast<const char*>(buf); | 
| Gilad Arnold | 780db21 | 2012-07-11 13:12:49 -0700 | [diff] [blame] | 208 |   size_t bytes_written = 0; | 
 | 209 |   int num_attempts = 0; | 
 | 210 |   while (bytes_written < count) { | 
 | 211 |     num_attempts++; | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 212 |     ssize_t rc = pwrite(fd, c_buf + bytes_written, count - bytes_written, | 
 | 213 |                         offset + bytes_written); | 
| Gilad Arnold | 780db21 | 2012-07-11 13:12:49 -0700 | [diff] [blame] | 214 |     // TODO(garnold) for debugging failure in chromium-os:31077; to be removed. | 
 | 215 |     if (rc < 0) { | 
 | 216 |       PLOG(ERROR) << "pwrite error; num_attempts=" << num_attempts | 
 | 217 |                   << " bytes_written=" << bytes_written | 
 | 218 |                   << " count=" << count << " offset=" << offset; | 
 | 219 |     } | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 220 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 221 |     bytes_written += rc; | 
 | 222 |   } | 
 | 223 |   return true; | 
 | 224 | } | 
 | 225 |  | 
| Nam T. Nguyen | f1d582e | 2014-12-08 15:07:17 -0800 | [diff] [blame] | 226 | bool WriteAll(FileDescriptorPtr fd, const void* buf, size_t count) { | 
 | 227 |   const char* c_buf = static_cast<const char*>(buf); | 
 | 228 |   ssize_t bytes_written = 0; | 
 | 229 |   while (bytes_written < static_cast<ssize_t>(count)) { | 
 | 230 |     ssize_t rc = fd->Write(c_buf + bytes_written, count - bytes_written); | 
 | 231 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 232 |     bytes_written += rc; | 
 | 233 |   } | 
 | 234 |   return true; | 
 | 235 | } | 
 | 236 |  | 
 | 237 | bool PWriteAll(FileDescriptorPtr fd, | 
 | 238 |                const void* buf, | 
 | 239 |                size_t count, | 
 | 240 |                off_t offset) { | 
| Allie Wood | 0c8cf7e | 2015-04-23 19:24:49 -0700 | [diff] [blame] | 241 |   TEST_AND_RETURN_FALSE_ERRNO(fd->Seek(offset, SEEK_SET) != | 
 | 242 |                               static_cast<off_t>(-1)); | 
| Nam T. Nguyen | f1d582e | 2014-12-08 15:07:17 -0800 | [diff] [blame] | 243 |   return WriteAll(fd, buf, count); | 
 | 244 | } | 
 | 245 |  | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 246 | bool PReadAll(int fd, void* buf, size_t count, off_t offset, | 
 | 247 |               ssize_t* out_bytes_read) { | 
 | 248 |   char* c_buf = static_cast<char*>(buf); | 
 | 249 |   ssize_t bytes_read = 0; | 
 | 250 |   while (bytes_read < static_cast<ssize_t>(count)) { | 
 | 251 |     ssize_t rc = pread(fd, c_buf + bytes_read, count - bytes_read, | 
 | 252 |                        offset + bytes_read); | 
 | 253 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 254 |     if (rc == 0) { | 
 | 255 |       break; | 
 | 256 |     } | 
 | 257 |     bytes_read += rc; | 
 | 258 |   } | 
 | 259 |   *out_bytes_read = bytes_read; | 
 | 260 |   return true; | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 261 | } | 
 | 262 |  | 
| Nam T. Nguyen | f1d582e | 2014-12-08 15:07:17 -0800 | [diff] [blame] | 263 | bool PReadAll(FileDescriptorPtr fd, void* buf, size_t count, off_t offset, | 
 | 264 |               ssize_t* out_bytes_read) { | 
| Allie Wood | 0c8cf7e | 2015-04-23 19:24:49 -0700 | [diff] [blame] | 265 |   TEST_AND_RETURN_FALSE_ERRNO(fd->Seek(offset, SEEK_SET) != | 
 | 266 |                               static_cast<off_t>(-1)); | 
| Nam T. Nguyen | f1d582e | 2014-12-08 15:07:17 -0800 | [diff] [blame] | 267 |   char* c_buf = static_cast<char*>(buf); | 
 | 268 |   ssize_t bytes_read = 0; | 
 | 269 |   while (bytes_read < static_cast<ssize_t>(count)) { | 
 | 270 |     ssize_t rc = fd->Read(c_buf + bytes_read, count - bytes_read); | 
 | 271 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 272 |     if (rc == 0) { | 
 | 273 |       break; | 
 | 274 |     } | 
 | 275 |     bytes_read += rc; | 
 | 276 |   } | 
 | 277 |   *out_bytes_read = bytes_read; | 
 | 278 |   return true; | 
 | 279 | } | 
 | 280 |  | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 281 | // Append |nbytes| of content from |buf| to the vector pointed to by either | 
 | 282 | // |vec_p| or |str_p|. | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 283 | static void AppendBytes(const uint8_t* buf, size_t nbytes, | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 284 |                         brillo::Blob* vec_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 285 |   CHECK(buf); | 
 | 286 |   CHECK(vec_p); | 
 | 287 |   vec_p->insert(vec_p->end(), buf, buf + nbytes); | 
 | 288 | } | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 289 | static void AppendBytes(const uint8_t* buf, size_t nbytes, | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 290 |                         string* str_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 291 |   CHECK(buf); | 
 | 292 |   CHECK(str_p); | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 293 |   str_p->append(buf, buf + nbytes); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 294 | } | 
 | 295 |  | 
 | 296 | // Reads from an open file |fp|, appending the read content to the container | 
 | 297 | // pointer to by |out_p|.  Returns true upon successful reading all of the | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 298 | // file's content, false otherwise. If |size| is not -1, reads up to |size| | 
 | 299 | // bytes. | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 300 | template <class T> | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 301 | static bool Read(FILE* fp, off_t size, T* out_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 302 |   CHECK(fp); | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 303 |   CHECK(size == -1 || size >= 0); | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 304 |   uint8_t buf[1024]; | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 305 |   while (size == -1 || size > 0) { | 
 | 306 |     off_t bytes_to_read = sizeof(buf); | 
 | 307 |     if (size > 0 && bytes_to_read > size) { | 
 | 308 |       bytes_to_read = size; | 
 | 309 |     } | 
 | 310 |     size_t nbytes = fread(buf, 1, bytes_to_read, fp); | 
 | 311 |     if (!nbytes) { | 
 | 312 |       break; | 
 | 313 |     } | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 314 |     AppendBytes(buf, nbytes, out_p); | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 315 |     if (size != -1) { | 
 | 316 |       CHECK(size >= static_cast<off_t>(nbytes)); | 
 | 317 |       size -= nbytes; | 
 | 318 |     } | 
 | 319 |   } | 
 | 320 |   if (ferror(fp)) { | 
 | 321 |     return false; | 
 | 322 |   } | 
 | 323 |   return size == 0 || feof(fp); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 324 | } | 
 | 325 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 326 | // Opens a file |path| for reading and appends its the contents to a container | 
 | 327 | // |out_p|. Starts reading the file from |offset|. If |offset| is beyond the end | 
 | 328 | // of the file, returns success. If |size| is not -1, reads up to |size| bytes. | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 329 | template <class T> | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 330 | static bool ReadFileChunkAndAppend(const string& path, | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 331 |                                    off_t offset, | 
 | 332 |                                    off_t size, | 
 | 333 |                                    T* out_p) { | 
 | 334 |   CHECK_GE(offset, 0); | 
 | 335 |   CHECK(size == -1 || size >= 0); | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 336 |   base::ScopedFILE fp(fopen(path.c_str(), "r")); | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 337 |   if (!fp.get()) | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 338 |     return false; | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 339 |   if (offset) { | 
 | 340 |     // Return success without appending any data if a chunk beyond the end of | 
 | 341 |     // the file is requested. | 
 | 342 |     if (offset >= FileSize(path)) { | 
 | 343 |       return true; | 
 | 344 |     } | 
 | 345 |     TEST_AND_RETURN_FALSE_ERRNO(fseek(fp.get(), offset, SEEK_SET) == 0); | 
 | 346 |   } | 
 | 347 |   return Read(fp.get(), size, out_p); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 348 | } | 
 | 349 |  | 
| Alex Deymo | 10875d9 | 2014-11-10 21:52:57 -0800 | [diff] [blame] | 350 | // TODO(deymo): This is only used in unittest, but requires the private | 
 | 351 | // Read<string>() defined here. Expose Read<string>() or move to base/ version. | 
 | 352 | bool ReadPipe(const string& cmd, string* out_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 353 |   FILE* fp = popen(cmd.c_str(), "r"); | 
 | 354 |   if (!fp) | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 355 |     return false; | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 356 |   bool success = Read(fp, -1, out_p); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 357 |   return (success && pclose(fp) >= 0); | 
 | 358 | } | 
 | 359 |  | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 360 | bool ReadFile(const string& path, brillo::Blob* out_p) { | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 361 |   return ReadFileChunkAndAppend(path, 0, -1, out_p); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 362 | } | 
 | 363 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 364 | bool ReadFile(const string& path, string* out_p) { | 
 | 365 |   return ReadFileChunkAndAppend(path, 0, -1, out_p); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 366 | } | 
 | 367 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 368 | bool ReadFileChunk(const string& path, off_t offset, off_t size, | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 369 |                    brillo::Blob* out_p) { | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 370 |   return ReadFileChunkAndAppend(path, offset, size, out_p); | 
 | 371 | } | 
 | 372 |  | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 373 | off_t BlockDevSize(int fd) { | 
 | 374 |   uint64_t dev_size; | 
 | 375 |   int rc = ioctl(fd, BLKGETSIZE64, &dev_size); | 
 | 376 |   if (rc == -1) { | 
 | 377 |     dev_size = -1; | 
 | 378 |     PLOG(ERROR) << "Error running ioctl(BLKGETSIZE64) on " << fd; | 
 | 379 |   } | 
 | 380 |   return dev_size; | 
 | 381 | } | 
 | 382 |  | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 383 | off_t FileSize(int fd) { | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 384 |   struct stat stbuf; | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 385 |   int rc = fstat(fd, &stbuf); | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 386 |   CHECK_EQ(rc, 0); | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 387 |   if (rc < 0) { | 
 | 388 |     PLOG(ERROR) << "Error stat-ing " << fd; | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 389 |     return rc; | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 390 |   } | 
 | 391 |   if (S_ISREG(stbuf.st_mode)) | 
 | 392 |     return stbuf.st_size; | 
 | 393 |   if (S_ISBLK(stbuf.st_mode)) | 
 | 394 |     return BlockDevSize(fd); | 
 | 395 |   LOG(ERROR) << "Couldn't determine the type of " << fd; | 
 | 396 |   return -1; | 
 | 397 | } | 
 | 398 |  | 
 | 399 | off_t FileSize(const string& path) { | 
 | 400 |   int fd = open(path.c_str(), O_RDONLY | O_CLOEXEC); | 
 | 401 |   if (fd == -1) { | 
 | 402 |     PLOG(ERROR) << "Error opening " << path; | 
 | 403 |     return fd; | 
 | 404 |   } | 
 | 405 |   off_t size = FileSize(fd); | 
 | 406 |   if (size == -1) | 
 | 407 |     PLOG(ERROR) << "Error getting file size of " << path; | 
 | 408 |   close(fd); | 
 | 409 |   return size; | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 410 | } | 
 | 411 |  | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 412 | void HexDumpArray(const uint8_t* const arr, const size_t length) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 413 |   LOG(INFO) << "Logging array of length: " << length; | 
 | 414 |   const unsigned int bytes_per_line = 16; | 
| Andrew de los Reyes | 08c4e27 | 2010-04-15 14:02:17 -0700 | [diff] [blame] | 415 |   for (uint32_t i = 0; i < length; i += bytes_per_line) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 416 |     const unsigned int bytes_remaining = length - i; | 
 | 417 |     const unsigned int bytes_per_this_line = min(bytes_per_line, | 
 | 418 |                                                  bytes_remaining); | 
 | 419 |     char header[100]; | 
 | 420 |     int r = snprintf(header, sizeof(header), "0x%08x : ", i); | 
 | 421 |     TEST_AND_RETURN(r == 13); | 
 | 422 |     string line = header; | 
 | 423 |     for (unsigned int j = 0; j < bytes_per_this_line; j++) { | 
 | 424 |       char buf[20]; | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 425 |       uint8_t c = arr[i + j]; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 426 |       r = snprintf(buf, sizeof(buf), "%02x ", static_cast<unsigned int>(c)); | 
 | 427 |       TEST_AND_RETURN(r == 3); | 
 | 428 |       line += buf; | 
 | 429 |     } | 
 | 430 |     LOG(INFO) << line; | 
 | 431 |   } | 
 | 432 | } | 
 | 433 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 434 | bool SplitPartitionName(const string& partition_name, | 
 | 435 |                         string* out_disk_name, | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 436 |                         int* out_partition_num) { | 
| Alex Vakulenko | a3cf75a | 2016-01-20 07:56:15 -0800 | [diff] [blame^] | 437 |   if (!base::StartsWith(partition_name, "/dev/", | 
 | 438 |                         base::CompareCase::SENSITIVE)) { | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 439 |     LOG(ERROR) << "Invalid partition device name: " << partition_name; | 
 | 440 |     return false; | 
| Andrew de los Reyes | f971443 | 2010-05-04 10:21:23 -0700 | [diff] [blame] | 441 |   } | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 442 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 443 |   size_t last_nondigit_pos = partition_name.find_last_not_of("0123456789"); | 
 | 444 |   if (last_nondigit_pos == string::npos || | 
 | 445 |       (last_nondigit_pos + 1) == partition_name.size()) { | 
 | 446 |     LOG(ERROR) << "Unable to parse partition device name: " << partition_name; | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 447 |     return false; | 
 | 448 |   } | 
 | 449 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 450 |   size_t partition_name_len = string::npos; | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 451 |   if (partition_name[last_nondigit_pos] == '_') { | 
 | 452 |     // NAND block devices have weird naming which could be something | 
 | 453 |     // like "/dev/ubiblock2_0". We discard "_0" in such a case. | 
 | 454 |     size_t prev_nondigit_pos = | 
 | 455 |         partition_name.find_last_not_of("0123456789", last_nondigit_pos - 1); | 
 | 456 |     if (prev_nondigit_pos == string::npos || | 
 | 457 |         (prev_nondigit_pos + 1) == last_nondigit_pos) { | 
 | 458 |       LOG(ERROR) << "Unable to parse partition device name: " << partition_name; | 
 | 459 |       return false; | 
 | 460 |     } | 
 | 461 |  | 
 | 462 |     partition_name_len = last_nondigit_pos - prev_nondigit_pos; | 
 | 463 |     last_nondigit_pos = prev_nondigit_pos; | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 464 |   } | 
 | 465 |  | 
 | 466 |   if (out_disk_name) { | 
 | 467 |     // Special case for MMC devices which have the following naming scheme: | 
 | 468 |     // mmcblk0p2 | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 469 |     size_t disk_name_len = last_nondigit_pos; | 
 | 470 |     if (partition_name[last_nondigit_pos] != 'p' || | 
 | 471 |         last_nondigit_pos == 0 || | 
 | 472 |         !isdigit(partition_name[last_nondigit_pos - 1])) { | 
 | 473 |       disk_name_len++; | 
 | 474 |     } | 
 | 475 |     *out_disk_name = partition_name.substr(0, disk_name_len); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 476 |   } | 
 | 477 |  | 
 | 478 |   if (out_partition_num) { | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 479 |     string partition_str = partition_name.substr(last_nondigit_pos + 1, | 
 | 480 |                                                  partition_name_len); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 481 |     *out_partition_num = atoi(partition_str.c_str()); | 
 | 482 |   } | 
 | 483 |   return true; | 
 | 484 | } | 
 | 485 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 486 | string MakePartitionName(const string& disk_name, int partition_num) { | 
| Nam T. Nguyen | a78b28c | 2015-03-06 22:30:12 -0800 | [diff] [blame] | 487 |   if (partition_num < 1) { | 
 | 488 |     LOG(ERROR) << "Invalid partition number: " << partition_num; | 
 | 489 |     return string(); | 
 | 490 |   } | 
 | 491 |  | 
| Alex Vakulenko | a3cf75a | 2016-01-20 07:56:15 -0800 | [diff] [blame^] | 492 |   if (!base::StartsWith(disk_name, "/dev/", base::CompareCase::SENSITIVE)) { | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 493 |     LOG(ERROR) << "Invalid disk name: " << disk_name; | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 494 |     return string(); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 495 |   } | 
 | 496 |  | 
| Nam T. Nguyen | a78b28c | 2015-03-06 22:30:12 -0800 | [diff] [blame] | 497 |   if (IsMtdDeviceName(disk_name)) { | 
 | 498 |     // Special case for UBI block devices. | 
 | 499 |     //   1. ubiblock is not writable, we need to use plain "ubi". | 
 | 500 |     //   2. There is a "_0" suffix. | 
 | 501 |     return MakeNandPartitionName(partition_num); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 502 |   } | 
 | 503 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 504 |   string partition_name = disk_name; | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 505 |   if (isdigit(partition_name.back())) { | 
 | 506 |     // Special case for devices with names ending with a digit. | 
 | 507 |     // Add "p" to separate the disk name from partition number, | 
 | 508 |     // e.g. "/dev/loop0p2" | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 509 |     partition_name += 'p'; | 
 | 510 |   } | 
 | 511 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 512 |   partition_name += std::to_string(partition_num); | 
 | 513 |  | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 514 |   return partition_name; | 
| Andrew de los Reyes | f971443 | 2010-05-04 10:21:23 -0700 | [diff] [blame] | 515 | } | 
 | 516 |  | 
| Nam T. Nguyen | a78b28c | 2015-03-06 22:30:12 -0800 | [diff] [blame] | 517 | string MakePartitionNameForMount(const string& part_name) { | 
 | 518 |   if (IsMtdDeviceName(part_name)) { | 
 | 519 |     int partition_num; | 
 | 520 |     if (!SplitPartitionName(part_name, nullptr, &partition_num)) { | 
 | 521 |       return ""; | 
 | 522 |     } | 
 | 523 |     return MakeNandPartitionNameForMount(partition_num); | 
 | 524 |   } | 
 | 525 |   return part_name; | 
 | 526 | } | 
 | 527 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 528 | string ErrnoNumberAsString(int err) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 529 |   char buf[100]; | 
 | 530 |   buf[0] = '\0'; | 
 | 531 |   return strerror_r(err, buf, sizeof(buf)); | 
 | 532 | } | 
 | 533 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 534 | bool FileExists(const char* path) { | 
 | 535 |   struct stat stbuf; | 
 | 536 |   return 0 == lstat(path, &stbuf); | 
 | 537 | } | 
 | 538 |  | 
| Darin Petkov | 30291ed | 2010-11-12 10:23:06 -0800 | [diff] [blame] | 539 | bool IsSymlink(const char* path) { | 
 | 540 |   struct stat stbuf; | 
 | 541 |   return lstat(path, &stbuf) == 0 && S_ISLNK(stbuf.st_mode) != 0; | 
 | 542 | } | 
 | 543 |  | 
| Nam T. Nguyen | a78b28c | 2015-03-06 22:30:12 -0800 | [diff] [blame] | 544 | bool TryAttachingUbiVolume(int volume_num, int timeout) { | 
 | 545 |   const string volume_path = base::StringPrintf("/dev/ubi%d_0", volume_num); | 
 | 546 |   if (FileExists(volume_path.c_str())) { | 
 | 547 |     return true; | 
 | 548 |   } | 
 | 549 |  | 
 | 550 |   int exit_code; | 
 | 551 |   vector<string> cmd = { | 
 | 552 |       "ubiattach", | 
 | 553 |       "-m", | 
 | 554 |       base::StringPrintf("%d", volume_num), | 
 | 555 |       "-d", | 
 | 556 |       base::StringPrintf("%d", volume_num) | 
 | 557 |   }; | 
 | 558 |   TEST_AND_RETURN_FALSE(Subprocess::SynchronousExec(cmd, &exit_code, nullptr)); | 
 | 559 |   TEST_AND_RETURN_FALSE(exit_code == 0); | 
 | 560 |  | 
 | 561 |   cmd = { | 
 | 562 |       "ubiblock", | 
 | 563 |       "--create", | 
 | 564 |       volume_path | 
 | 565 |   }; | 
 | 566 |   TEST_AND_RETURN_FALSE(Subprocess::SynchronousExec(cmd, &exit_code, nullptr)); | 
 | 567 |   TEST_AND_RETURN_FALSE(exit_code == 0); | 
 | 568 |  | 
 | 569 |   while (timeout > 0 && !FileExists(volume_path.c_str())) { | 
 | 570 |     sleep(1); | 
 | 571 |     timeout--; | 
 | 572 |   } | 
 | 573 |  | 
 | 574 |   return FileExists(volume_path.c_str()); | 
 | 575 | } | 
 | 576 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 577 | bool MakeTempFile(const string& base_filename_template, | 
 | 578 |                   string* filename, | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 579 |                   int* fd) { | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 580 |   base::FilePath filename_template; | 
 | 581 |   TEST_AND_RETURN_FALSE( | 
 | 582 |       GetTempName(base_filename_template, &filename_template)); | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 583 |   DCHECK(filename || fd); | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 584 |   vector<char> buf(filename_template.value().size() + 1); | 
 | 585 |   memcpy(buf.data(), filename_template.value().data(), | 
 | 586 |          filename_template.value().size()); | 
 | 587 |   buf[filename_template.value().size()] = '\0'; | 
| Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 588 |  | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 589 |   int mkstemp_fd = mkstemp(buf.data()); | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 590 |   TEST_AND_RETURN_FALSE_ERRNO(mkstemp_fd >= 0); | 
 | 591 |   if (filename) { | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 592 |     *filename = buf.data(); | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 593 |   } | 
 | 594 |   if (fd) { | 
 | 595 |     *fd = mkstemp_fd; | 
 | 596 |   } else { | 
 | 597 |     close(mkstemp_fd); | 
 | 598 |   } | 
 | 599 |   return true; | 
 | 600 | } | 
 | 601 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 602 | bool MakeTempDirectory(const string& base_dirname_template, | 
 | 603 |                        string* dirname) { | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 604 |   base::FilePath dirname_template; | 
 | 605 |   TEST_AND_RETURN_FALSE(GetTempName(base_dirname_template, &dirname_template)); | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 606 |   DCHECK(dirname); | 
| Alex Deymo | 5aa1c54 | 2015-09-18 01:02:33 -0700 | [diff] [blame] | 607 |   vector<char> buf(dirname_template.value().size() + 1); | 
 | 608 |   memcpy(buf.data(), dirname_template.value().data(), | 
 | 609 |          dirname_template.value().size()); | 
 | 610 |   buf[dirname_template.value().size()] = '\0'; | 
| Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 611 |  | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 612 |   char* return_code = mkdtemp(buf.data()); | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 613 |   TEST_AND_RETURN_FALSE_ERRNO(return_code != nullptr); | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 614 |   *dirname = buf.data(); | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 615 |   return true; | 
 | 616 | } | 
 | 617 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 618 | bool MountFilesystem(const string& device, | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 619 |                      const string& mountpoint, | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 620 |                      unsigned long mountflags) {  // NOLINT(runtime/int) | 
| Alex Deymo | 4c82df3 | 2014-11-10 22:25:57 -0800 | [diff] [blame] | 621 |   // TODO(sosa): Remove "ext3" once crbug.com/208022 is resolved. | 
| Alex Deymo | 5fc5e10 | 2015-09-18 10:36:21 -0700 | [diff] [blame] | 622 |   const vector<const char*> fstypes{"ext2", "ext3", "ext4", "squashfs"}; | 
| Alex Deymo | 4c82df3 | 2014-11-10 22:25:57 -0800 | [diff] [blame] | 623 |   for (const char* fstype : fstypes) { | 
 | 624 |     int rc = mount(device.c_str(), mountpoint.c_str(), fstype, mountflags, | 
 | 625 |                    nullptr); | 
 | 626 |     if (rc == 0) | 
 | 627 |       return true; | 
 | 628 |  | 
 | 629 |     PLOG(WARNING) << "Unable to mount destination device " << device | 
 | 630 |                   << " on " << mountpoint << " as " << fstype; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 631 |   } | 
| Alex Deymo | 4c82df3 | 2014-11-10 22:25:57 -0800 | [diff] [blame] | 632 |   LOG(ERROR) << "Unable to mount " << device << " with any supported type"; | 
 | 633 |   return false; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 634 | } | 
 | 635 |  | 
 | 636 | bool UnmountFilesystem(const string& mountpoint) { | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 637 |   for (int num_retries = 0; ; ++num_retries) { | 
 | 638 |     if (umount(mountpoint.c_str()) == 0) | 
 | 639 |       break; | 
 | 640 |  | 
 | 641 |     TEST_AND_RETURN_FALSE_ERRNO(errno == EBUSY && | 
 | 642 |                                 num_retries < kUnmountMaxNumOfRetries); | 
| Alex Deymo | 8d2bbe3 | 2015-06-23 16:28:59 -0700 | [diff] [blame] | 643 |     usleep(kUnmountRetryIntervalInMicroseconds); | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 644 |   } | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 645 |   return true; | 
 | 646 | } | 
 | 647 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 648 | bool GetFilesystemSize(const string& device, | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 649 |                        int* out_block_count, | 
 | 650 |                        int* out_block_size) { | 
 | 651 |   int fd = HANDLE_EINTR(open(device.c_str(), O_RDONLY)); | 
| Alex Deymo | e7141c6 | 2014-10-17 14:03:01 -0700 | [diff] [blame] | 652 |   TEST_AND_RETURN_FALSE_ERRNO(fd >= 0); | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 653 |   ScopedFdCloser fd_closer(&fd); | 
 | 654 |   return GetFilesystemSizeFromFD(fd, out_block_count, out_block_size); | 
 | 655 | } | 
 | 656 |  | 
 | 657 | bool GetFilesystemSizeFromFD(int fd, | 
 | 658 |                              int* out_block_count, | 
 | 659 |                              int* out_block_size) { | 
 | 660 |   TEST_AND_RETURN_FALSE(fd >= 0); | 
 | 661 |  | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 662 |   // Determine the filesystem size by directly reading the block count and | 
 | 663 |   // block size information from the superblock. Supported FS are ext3 and | 
 | 664 |   // squashfs. | 
 | 665 |  | 
 | 666 |   // Read from the fd only once and detect in memory. The first 2 KiB is enough | 
 | 667 |   // to read the ext2 superblock (located at offset 1024) and the squashfs | 
 | 668 |   // superblock (located at offset 0). | 
 | 669 |   const ssize_t kBufferSize = 2048; | 
 | 670 |  | 
 | 671 |   uint8_t buffer[kBufferSize]; | 
 | 672 |   if (HANDLE_EINTR(pread(fd, buffer, kBufferSize, 0)) != kBufferSize) { | 
 | 673 |     PLOG(ERROR) << "Unable to read the file system header:"; | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 674 |     return false; | 
 | 675 |   } | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 676 |  | 
 | 677 |   if (GetSquashfs4Size(buffer, kBufferSize, out_block_count, out_block_size)) | 
 | 678 |     return true; | 
 | 679 |   if (GetExt3Size(buffer, kBufferSize, out_block_count, out_block_size)) | 
 | 680 |     return true; | 
 | 681 |  | 
 | 682 |   LOG(ERROR) << "Unable to determine file system type."; | 
 | 683 |   return false; | 
 | 684 | } | 
 | 685 |  | 
 | 686 | bool GetExt3Size(const uint8_t* buffer, size_t buffer_size, | 
 | 687 |                  int* out_block_count, | 
 | 688 |                  int* out_block_size) { | 
 | 689 |   // See include/linux/ext2_fs.h for more details on the structure. We obtain | 
 | 690 |   // ext2 constants from ext2fs/ext2fs.h header but we don't link with the | 
 | 691 |   // library. | 
 | 692 |   if (buffer_size < SUPERBLOCK_OFFSET + SUPERBLOCK_SIZE) | 
 | 693 |     return false; | 
 | 694 |  | 
 | 695 |   const uint8_t* superblock = buffer + SUPERBLOCK_OFFSET; | 
 | 696 |  | 
 | 697 |   // ext3_fs.h: ext3_super_block.s_blocks_count | 
 | 698 |   uint32_t block_count = | 
 | 699 |       *reinterpret_cast<const uint32_t*>(superblock + 1 * sizeof(int32_t)); | 
 | 700 |  | 
 | 701 |   // ext3_fs.h: ext3_super_block.s_log_block_size | 
 | 702 |   uint32_t log_block_size = | 
 | 703 |       *reinterpret_cast<const uint32_t*>(superblock + 6 * sizeof(int32_t)); | 
 | 704 |  | 
 | 705 |   // ext3_fs.h: ext3_super_block.s_magic | 
 | 706 |   uint16_t magic = | 
 | 707 |       *reinterpret_cast<const uint16_t*>(superblock + 14 * sizeof(int32_t)); | 
 | 708 |  | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 709 |   block_count = le32toh(block_count); | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 710 |   log_block_size = le32toh(log_block_size) + EXT2_MIN_BLOCK_LOG_SIZE; | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 711 |   magic = le16toh(magic); | 
 | 712 |  | 
 | 713 |   // Sanity check the parameters. | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 714 |   TEST_AND_RETURN_FALSE(magic == EXT2_SUPER_MAGIC); | 
 | 715 |   TEST_AND_RETURN_FALSE(log_block_size >= EXT2_MIN_BLOCK_LOG_SIZE && | 
 | 716 |                         log_block_size <= EXT2_MAX_BLOCK_LOG_SIZE); | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 717 |   TEST_AND_RETURN_FALSE(block_count > 0); | 
 | 718 |  | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 719 |   if (out_block_count) | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 720 |     *out_block_count = block_count; | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 721 |   if (out_block_size) | 
 | 722 |     *out_block_size = 1 << log_block_size; | 
 | 723 |   return true; | 
 | 724 | } | 
 | 725 |  | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 726 | bool GetSquashfs4Size(const uint8_t* buffer, size_t buffer_size, | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 727 |                       int* out_block_count, | 
 | 728 |                       int* out_block_size) { | 
 | 729 |   // See fs/squashfs/squashfs_fs.h for format details. We only support | 
 | 730 |   // Squashfs 4.x little endian. | 
 | 731 |  | 
 | 732 |   // sizeof(struct squashfs_super_block) | 
 | 733 |   const size_t kSquashfsSuperBlockSize = 96; | 
 | 734 |   if (buffer_size < kSquashfsSuperBlockSize) | 
 | 735 |     return false; | 
 | 736 |  | 
 | 737 |   // Check magic, squashfs_fs.h: SQUASHFS_MAGIC | 
 | 738 |   if (memcmp(buffer, "hsqs", 4) != 0) | 
 | 739 |     return false;  // Only little endian is supported. | 
 | 740 |  | 
 | 741 |   // squashfs_fs.h: struct squashfs_super_block.s_major | 
 | 742 |   uint16_t s_major = *reinterpret_cast<const uint16_t*>( | 
 | 743 |       buffer + 5 * sizeof(uint32_t) + 4 * sizeof(uint16_t)); | 
 | 744 |  | 
 | 745 |   if (s_major != 4) { | 
 | 746 |     LOG(ERROR) << "Found unsupported squashfs major version " << s_major; | 
 | 747 |     return false; | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 748 |   } | 
| Alex Deymo | 192393b | 2014-11-10 15:58:38 -0800 | [diff] [blame] | 749 |  | 
 | 750 |   // squashfs_fs.h: struct squashfs_super_block.bytes_used | 
 | 751 |   uint64_t bytes_used = *reinterpret_cast<const int64_t*>( | 
 | 752 |       buffer + 5 * sizeof(uint32_t) + 6 * sizeof(uint16_t) + sizeof(uint64_t)); | 
 | 753 |  | 
 | 754 |   const int block_size = 4096; | 
 | 755 |  | 
 | 756 |   // The squashfs' bytes_used doesn't need to be aligned with the block boundary | 
 | 757 |   // so we round up to the nearest blocksize. | 
 | 758 |   if (out_block_count) | 
 | 759 |     *out_block_count = (bytes_used + block_size - 1) / block_size; | 
 | 760 |   if (out_block_size) | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 761 |     *out_block_size = block_size; | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 762 |   return true; | 
 | 763 | } | 
 | 764 |  | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 765 | bool IsExtFilesystem(const string& device) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 766 |   brillo::Blob header; | 
| Alex Deymo | de942f3 | 2015-03-13 11:57:15 -0700 | [diff] [blame] | 767 |   // The first 2 KiB is enough to read the ext2 superblock (located at offset | 
 | 768 |   // 1024). | 
 | 769 |   if (!ReadFileChunk(device, 0, 2048, &header)) | 
 | 770 |     return false; | 
 | 771 |   return GetExt3Size(header.data(), header.size(), nullptr, nullptr); | 
 | 772 | } | 
 | 773 |  | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 774 | bool IsSquashfsFilesystem(const string& device) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 775 |   brillo::Blob header; | 
| Alex Deymo | de942f3 | 2015-03-13 11:57:15 -0700 | [diff] [blame] | 776 |   // The first 96 is enough to read the squashfs superblock. | 
 | 777 |   const ssize_t kSquashfsSuperBlockSize = 96; | 
 | 778 |   if (!ReadFileChunk(device, 0, kSquashfsSuperBlockSize, &header)) | 
 | 779 |     return false; | 
 | 780 |   return GetSquashfs4Size(header.data(), header.size(), nullptr, nullptr); | 
 | 781 | } | 
 | 782 |  | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 783 | // Tries to parse the header of an ELF file to obtain a human-readable | 
 | 784 | // description of it on the |output| string. | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 785 | static bool GetFileFormatELF(const uint8_t* buffer, size_t size, | 
 | 786 |                              string* output) { | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 787 |   // 0x00: EI_MAG - ELF magic header, 4 bytes. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 788 |   if (size < SELFMAG || memcmp(buffer, ELFMAG, SELFMAG) != 0) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 789 |     return false; | 
 | 790 |   *output = "ELF"; | 
 | 791 |  | 
 | 792 |   // 0x04: EI_CLASS, 1 byte. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 793 |   if (size < EI_CLASS + 1) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 794 |     return true; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 795 |   switch (buffer[EI_CLASS]) { | 
 | 796 |     case ELFCLASS32: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 797 |       *output += " 32-bit"; | 
 | 798 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 799 |     case ELFCLASS64: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 800 |       *output += " 64-bit"; | 
 | 801 |       break; | 
 | 802 |     default: | 
 | 803 |       *output += " ?-bit"; | 
 | 804 |   } | 
 | 805 |  | 
 | 806 |   // 0x05: EI_DATA, endianness, 1 byte. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 807 |   if (size < EI_DATA + 1) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 808 |     return true; | 
| Alex Vakulenko | f68bbbc | 2015-02-09 12:53:18 -0800 | [diff] [blame] | 809 |   uint8_t ei_data = buffer[EI_DATA]; | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 810 |   switch (ei_data) { | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 811 |     case ELFDATA2LSB: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 812 |       *output += " little-endian"; | 
 | 813 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 814 |     case ELFDATA2MSB: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 815 |       *output += " big-endian"; | 
 | 816 |       break; | 
 | 817 |     default: | 
 | 818 |       *output += " ?-endian"; | 
 | 819 |       // Don't parse anything after the 0x10 offset if endianness is unknown. | 
 | 820 |       return true; | 
 | 821 |   } | 
 | 822 |  | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 823 |   const Elf32_Ehdr* hdr = reinterpret_cast<const Elf32_Ehdr*>(buffer); | 
 | 824 |   // 0x12: e_machine, 2 byte endianness based on ei_data. The position (0x12) | 
 | 825 |   // and size is the same for both 32 and 64 bits. | 
 | 826 |   if (size < offsetof(Elf32_Ehdr, e_machine) + sizeof(hdr->e_machine)) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 827 |     return true; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 828 |   uint16_t e_machine; | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 829 |   // Fix endianess regardless of the host endianess. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 830 |   if (ei_data == ELFDATA2LSB) | 
 | 831 |     e_machine = le16toh(hdr->e_machine); | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 832 |   else | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 833 |     e_machine = be16toh(hdr->e_machine); | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 834 |  | 
 | 835 |   switch (e_machine) { | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 836 |     case EM_386: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 837 |       *output += " x86"; | 
 | 838 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 839 |     case EM_MIPS: | 
 | 840 |       *output += " mips"; | 
 | 841 |       break; | 
 | 842 |     case EM_ARM: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 843 |       *output += " arm"; | 
 | 844 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 845 |     case EM_X86_64: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 846 |       *output += " x86-64"; | 
 | 847 |       break; | 
 | 848 |     default: | 
 | 849 |       *output += " unknown-arch"; | 
 | 850 |   } | 
 | 851 |   return true; | 
 | 852 | } | 
 | 853 |  | 
 | 854 | string GetFileFormat(const string& path) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 855 |   brillo::Blob buffer; | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 856 |   if (!ReadFileChunkAndAppend(path, 0, kGetFileFormatMaxHeaderSize, &buffer)) | 
 | 857 |     return "File not found."; | 
 | 858 |  | 
 | 859 |   string result; | 
 | 860 |   if (GetFileFormatELF(buffer.data(), buffer.size(), &result)) | 
 | 861 |     return result; | 
 | 862 |  | 
 | 863 |   return "data"; | 
 | 864 | } | 
 | 865 |  | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 866 | namespace { | 
 | 867 | // Do the actual trigger. We do it as a main-loop callback to (try to) get a | 
 | 868 | // consistent stack trace. | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 869 | void TriggerCrashReporterUpload() { | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 870 |   pid_t pid = fork(); | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 871 |   CHECK_GE(pid, 0) << "fork failed";  // fork() failed. Something is very wrong. | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 872 |   if (pid == 0) { | 
 | 873 |     // We are the child. Crash. | 
 | 874 |     abort();  // never returns | 
 | 875 |   } | 
 | 876 |   // We are the parent. Wait for child to terminate. | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 877 |   pid_t result = waitpid(pid, nullptr, 0); | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 878 |   LOG_IF(ERROR, result < 0) << "waitpid() failed"; | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 879 | } | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 880 | }  // namespace | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 881 |  | 
 | 882 | void ScheduleCrashReporterUpload() { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 883 |   brillo::MessageLoop::current()->PostTask( | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 884 |       FROM_HERE, | 
 | 885 |       base::Bind(&TriggerCrashReporterUpload)); | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 886 | } | 
 | 887 |  | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 888 | bool SetCpuShares(CpuShares shares) { | 
 | 889 |   string string_shares = base::IntToString(static_cast<int>(shares)); | 
 | 890 |   string cpu_shares_file = string(utils::kCGroupDir) + "/cpu.shares"; | 
 | 891 |   LOG(INFO) << "Setting cgroup cpu shares to  " << string_shares; | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 892 |   if (utils::WriteFile(cpu_shares_file.c_str(), string_shares.c_str(), | 
 | 893 |                        string_shares.size())) { | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 894 |     return true; | 
 | 895 |   } else { | 
 | 896 |     LOG(ERROR) << "Failed to change cgroup cpu shares to "<< string_shares | 
 | 897 |                << " using " << cpu_shares_file; | 
 | 898 |     return false; | 
 | 899 |   } | 
| Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 900 | } | 
 | 901 |  | 
| Darin Petkov | 5c0a8af | 2010-08-24 13:39:13 -0700 | [diff] [blame] | 902 | int FuzzInt(int value, unsigned int range) { | 
 | 903 |   int min = value - range / 2; | 
 | 904 |   int max = value + range - range / 2; | 
 | 905 |   return base::RandInt(min, max); | 
 | 906 | } | 
 | 907 |  | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 908 | string FormatSecs(unsigned secs) { | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 909 |   return FormatTimeDelta(TimeDelta::FromSeconds(secs)); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 910 | } | 
 | 911 |  | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 912 | string FormatTimeDelta(TimeDelta delta) { | 
| David Zeuthen | 973449e | 2014-08-18 16:18:23 -0400 | [diff] [blame] | 913 |   string str; | 
 | 914 |  | 
 | 915 |   // Handle negative durations by prefixing with a minus. | 
 | 916 |   if (delta.ToInternalValue() < 0) { | 
 | 917 |     delta *= -1; | 
 | 918 |     str = "-"; | 
 | 919 |   } | 
 | 920 |  | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 921 |   // Canonicalize into days, hours, minutes, seconds and microseconds. | 
 | 922 |   unsigned days = delta.InDays(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 923 |   delta -= TimeDelta::FromDays(days); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 924 |   unsigned hours = delta.InHours(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 925 |   delta -= TimeDelta::FromHours(hours); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 926 |   unsigned mins = delta.InMinutes(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 927 |   delta -= TimeDelta::FromMinutes(mins); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 928 |   unsigned secs = delta.InSeconds(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 929 |   delta -= TimeDelta::FromSeconds(secs); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 930 |   unsigned usecs = delta.InMicroseconds(); | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 931 |  | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 932 |   if (days) | 
 | 933 |     base::StringAppendF(&str, "%ud", days); | 
 | 934 |   if (days || hours) | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 935 |     base::StringAppendF(&str, "%uh", hours); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 936 |   if (days || hours || mins) | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 937 |     base::StringAppendF(&str, "%um", mins); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 938 |   base::StringAppendF(&str, "%u", secs); | 
 | 939 |   if (usecs) { | 
 | 940 |     int width = 6; | 
 | 941 |     while ((usecs / 10) * 10 == usecs) { | 
 | 942 |       usecs /= 10; | 
 | 943 |       width--; | 
 | 944 |     } | 
 | 945 |     base::StringAppendF(&str, ".%0*u", width, usecs); | 
 | 946 |   } | 
 | 947 |   base::StringAppendF(&str, "s"); | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 948 |   return str; | 
 | 949 | } | 
 | 950 |  | 
| Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 951 | string ToString(const Time utc_time) { | 
 | 952 |   Time::Exploded exp_time; | 
 | 953 |   utc_time.UTCExplode(&exp_time); | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 954 |   return base::StringPrintf("%d/%d/%d %d:%02d:%02d GMT", | 
| Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 955 |                       exp_time.month, | 
 | 956 |                       exp_time.day_of_month, | 
 | 957 |                       exp_time.year, | 
 | 958 |                       exp_time.hour, | 
 | 959 |                       exp_time.minute, | 
 | 960 |                       exp_time.second); | 
 | 961 | } | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 962 |  | 
| Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 963 | string ToString(bool b) { | 
 | 964 |   return (b ? "true" : "false"); | 
 | 965 | } | 
 | 966 |  | 
| Alex Deymo | 1c656c4 | 2013-06-28 11:02:14 -0700 | [diff] [blame] | 967 | string ToString(DownloadSource source) { | 
| Jay Srinivasan | 19409b7 | 2013-04-12 19:23:36 -0700 | [diff] [blame] | 968 |   switch (source) { | 
 | 969 |     case kDownloadSourceHttpsServer: return "HttpsServer"; | 
 | 970 |     case kDownloadSourceHttpServer:  return "HttpServer"; | 
| David Zeuthen | bb8bdc7 | 2013-09-03 13:43:48 -0700 | [diff] [blame] | 971 |     case kDownloadSourceHttpPeer:    return "HttpPeer"; | 
| Jay Srinivasan | 19409b7 | 2013-04-12 19:23:36 -0700 | [diff] [blame] | 972 |     case kNumDownloadSources:        return "Unknown"; | 
 | 973 |     // Don't add a default case to let the compiler warn about newly added | 
 | 974 |     // download sources which should be added here. | 
 | 975 |   } | 
 | 976 |  | 
 | 977 |   return "Unknown"; | 
 | 978 | } | 
 | 979 |  | 
| Alex Deymo | 1c656c4 | 2013-06-28 11:02:14 -0700 | [diff] [blame] | 980 | string ToString(PayloadType payload_type) { | 
 | 981 |   switch (payload_type) { | 
 | 982 |     case kPayloadTypeDelta:      return "Delta"; | 
 | 983 |     case kPayloadTypeFull:       return "Full"; | 
 | 984 |     case kPayloadTypeForcedFull: return "ForcedFull"; | 
 | 985 |     case kNumPayloadTypes:       return "Unknown"; | 
 | 986 |     // Don't add a default case to let the compiler warn about newly added | 
 | 987 |     // payload types which should be added here. | 
 | 988 |   } | 
 | 989 |  | 
 | 990 |   return "Unknown"; | 
 | 991 | } | 
 | 992 |  | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 993 | ErrorCode GetBaseErrorCode(ErrorCode code) { | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 994 |   // Ignore the higher order bits in the code by applying the mask as | 
 | 995 |   // we want the enumerations to be in the small contiguous range | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 996 |   // with values less than ErrorCode::kUmaReportedMax. | 
 | 997 |   ErrorCode base_code = static_cast<ErrorCode>( | 
 | 998 |       static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags)); | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 999 |  | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 1000 |   // Make additional adjustments required for UMA and error classification. | 
 | 1001 |   // TODO(jaysri): Move this logic to UeErrorCode.cc when we fix | 
 | 1002 |   // chromium-os:34369. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1003 |   if (base_code >= ErrorCode::kOmahaRequestHTTPResponseBase) { | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 1004 |     // Since we want to keep the enums to a small value, aggregate all HTTP | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 1005 |     // errors into this one bucket for UMA and error classification purposes. | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1006 |     LOG(INFO) << "Converting error code " << base_code | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1007 |               << " to ErrorCode::kOmahaErrorInHTTPResponse"; | 
 | 1008 |     base_code = ErrorCode::kOmahaErrorInHTTPResponse; | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 1009 |   } | 
 | 1010 |  | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 1011 |   return base_code; | 
 | 1012 | } | 
 | 1013 |  | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1014 | string CodeToString(ErrorCode code) { | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1015 |   // If the given code has both parts (i.e. the error code part and the flags | 
 | 1016 |   // part) then strip off the flags part since the switch statement below | 
 | 1017 |   // has case statements only for the base error code or a single flag but | 
 | 1018 |   // doesn't support any combinations of those. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1019 |   if ((static_cast<int>(code) & static_cast<int>(ErrorCode::kSpecialFlags)) && | 
 | 1020 |       (static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags))) | 
 | 1021 |     code = static_cast<ErrorCode>( | 
 | 1022 |         static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags)); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1023 |   switch (code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1024 |     case ErrorCode::kSuccess: return "ErrorCode::kSuccess"; | 
 | 1025 |     case ErrorCode::kError: return "ErrorCode::kError"; | 
 | 1026 |     case ErrorCode::kOmahaRequestError: return "ErrorCode::kOmahaRequestError"; | 
 | 1027 |     case ErrorCode::kOmahaResponseHandlerError: | 
 | 1028 |       return "ErrorCode::kOmahaResponseHandlerError"; | 
 | 1029 |     case ErrorCode::kFilesystemCopierError: | 
 | 1030 |       return "ErrorCode::kFilesystemCopierError"; | 
 | 1031 |     case ErrorCode::kPostinstallRunnerError: | 
 | 1032 |       return "ErrorCode::kPostinstallRunnerError"; | 
 | 1033 |     case ErrorCode::kPayloadMismatchedType: | 
 | 1034 |       return "ErrorCode::kPayloadMismatchedType"; | 
 | 1035 |     case ErrorCode::kInstallDeviceOpenError: | 
 | 1036 |       return "ErrorCode::kInstallDeviceOpenError"; | 
 | 1037 |     case ErrorCode::kKernelDeviceOpenError: | 
 | 1038 |       return "ErrorCode::kKernelDeviceOpenError"; | 
 | 1039 |     case ErrorCode::kDownloadTransferError: | 
 | 1040 |       return "ErrorCode::kDownloadTransferError"; | 
 | 1041 |     case ErrorCode::kPayloadHashMismatchError: | 
 | 1042 |       return "ErrorCode::kPayloadHashMismatchError"; | 
 | 1043 |     case ErrorCode::kPayloadSizeMismatchError: | 
 | 1044 |       return "ErrorCode::kPayloadSizeMismatchError"; | 
 | 1045 |     case ErrorCode::kDownloadPayloadVerificationError: | 
 | 1046 |       return "ErrorCode::kDownloadPayloadVerificationError"; | 
 | 1047 |     case ErrorCode::kDownloadNewPartitionInfoError: | 
 | 1048 |       return "ErrorCode::kDownloadNewPartitionInfoError"; | 
 | 1049 |     case ErrorCode::kDownloadWriteError: | 
 | 1050 |       return "ErrorCode::kDownloadWriteError"; | 
 | 1051 |     case ErrorCode::kNewRootfsVerificationError: | 
 | 1052 |       return "ErrorCode::kNewRootfsVerificationError"; | 
 | 1053 |     case ErrorCode::kNewKernelVerificationError: | 
 | 1054 |       return "ErrorCode::kNewKernelVerificationError"; | 
 | 1055 |     case ErrorCode::kSignedDeltaPayloadExpectedError: | 
 | 1056 |       return "ErrorCode::kSignedDeltaPayloadExpectedError"; | 
 | 1057 |     case ErrorCode::kDownloadPayloadPubKeyVerificationError: | 
 | 1058 |       return "ErrorCode::kDownloadPayloadPubKeyVerificationError"; | 
 | 1059 |     case ErrorCode::kPostinstallBootedFromFirmwareB: | 
 | 1060 |       return "ErrorCode::kPostinstallBootedFromFirmwareB"; | 
 | 1061 |     case ErrorCode::kDownloadStateInitializationError: | 
 | 1062 |       return "ErrorCode::kDownloadStateInitializationError"; | 
 | 1063 |     case ErrorCode::kDownloadInvalidMetadataMagicString: | 
 | 1064 |       return "ErrorCode::kDownloadInvalidMetadataMagicString"; | 
 | 1065 |     case ErrorCode::kDownloadSignatureMissingInManifest: | 
 | 1066 |       return "ErrorCode::kDownloadSignatureMissingInManifest"; | 
 | 1067 |     case ErrorCode::kDownloadManifestParseError: | 
 | 1068 |       return "ErrorCode::kDownloadManifestParseError"; | 
 | 1069 |     case ErrorCode::kDownloadMetadataSignatureError: | 
 | 1070 |       return "ErrorCode::kDownloadMetadataSignatureError"; | 
 | 1071 |     case ErrorCode::kDownloadMetadataSignatureVerificationError: | 
 | 1072 |       return "ErrorCode::kDownloadMetadataSignatureVerificationError"; | 
 | 1073 |     case ErrorCode::kDownloadMetadataSignatureMismatch: | 
 | 1074 |       return "ErrorCode::kDownloadMetadataSignatureMismatch"; | 
 | 1075 |     case ErrorCode::kDownloadOperationHashVerificationError: | 
 | 1076 |       return "ErrorCode::kDownloadOperationHashVerificationError"; | 
 | 1077 |     case ErrorCode::kDownloadOperationExecutionError: | 
 | 1078 |       return "ErrorCode::kDownloadOperationExecutionError"; | 
 | 1079 |     case ErrorCode::kDownloadOperationHashMismatch: | 
 | 1080 |       return "ErrorCode::kDownloadOperationHashMismatch"; | 
 | 1081 |     case ErrorCode::kOmahaRequestEmptyResponseError: | 
 | 1082 |       return "ErrorCode::kOmahaRequestEmptyResponseError"; | 
 | 1083 |     case ErrorCode::kOmahaRequestXMLParseError: | 
 | 1084 |       return "ErrorCode::kOmahaRequestXMLParseError"; | 
 | 1085 |     case ErrorCode::kDownloadInvalidMetadataSize: | 
 | 1086 |       return "ErrorCode::kDownloadInvalidMetadataSize"; | 
 | 1087 |     case ErrorCode::kDownloadInvalidMetadataSignature: | 
 | 1088 |       return "ErrorCode::kDownloadInvalidMetadataSignature"; | 
 | 1089 |     case ErrorCode::kOmahaResponseInvalid: | 
 | 1090 |       return "ErrorCode::kOmahaResponseInvalid"; | 
 | 1091 |     case ErrorCode::kOmahaUpdateIgnoredPerPolicy: | 
 | 1092 |       return "ErrorCode::kOmahaUpdateIgnoredPerPolicy"; | 
 | 1093 |     case ErrorCode::kOmahaUpdateDeferredPerPolicy: | 
 | 1094 |       return "ErrorCode::kOmahaUpdateDeferredPerPolicy"; | 
 | 1095 |     case ErrorCode::kOmahaErrorInHTTPResponse: | 
 | 1096 |       return "ErrorCode::kOmahaErrorInHTTPResponse"; | 
 | 1097 |     case ErrorCode::kDownloadOperationHashMissingError: | 
 | 1098 |       return "ErrorCode::kDownloadOperationHashMissingError"; | 
 | 1099 |     case ErrorCode::kDownloadMetadataSignatureMissingError: | 
 | 1100 |       return "ErrorCode::kDownloadMetadataSignatureMissingError"; | 
 | 1101 |     case ErrorCode::kOmahaUpdateDeferredForBackoff: | 
 | 1102 |       return "ErrorCode::kOmahaUpdateDeferredForBackoff"; | 
 | 1103 |     case ErrorCode::kPostinstallPowerwashError: | 
 | 1104 |       return "ErrorCode::kPostinstallPowerwashError"; | 
 | 1105 |     case ErrorCode::kUpdateCanceledByChannelChange: | 
 | 1106 |       return "ErrorCode::kUpdateCanceledByChannelChange"; | 
 | 1107 |     case ErrorCode::kUmaReportedMax: | 
 | 1108 |       return "ErrorCode::kUmaReportedMax"; | 
 | 1109 |     case ErrorCode::kOmahaRequestHTTPResponseBase: | 
 | 1110 |       return "ErrorCode::kOmahaRequestHTTPResponseBase"; | 
 | 1111 |     case ErrorCode::kResumedFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1112 |       return "Resumed"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1113 |     case ErrorCode::kDevModeFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1114 |       return "DevMode"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1115 |     case ErrorCode::kTestImageFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1116 |       return "TestImage"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1117 |     case ErrorCode::kTestOmahaUrlFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1118 |       return "TestOmahaUrl"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1119 |     case ErrorCode::kSpecialFlags: | 
 | 1120 |       return "ErrorCode::kSpecialFlags"; | 
 | 1121 |     case ErrorCode::kPostinstallFirmwareRONotUpdatable: | 
 | 1122 |       return "ErrorCode::kPostinstallFirmwareRONotUpdatable"; | 
 | 1123 |     case ErrorCode::kUnsupportedMajorPayloadVersion: | 
 | 1124 |       return "ErrorCode::kUnsupportedMajorPayloadVersion"; | 
 | 1125 |     case ErrorCode::kUnsupportedMinorPayloadVersion: | 
 | 1126 |       return "ErrorCode::kUnsupportedMinorPayloadVersion"; | 
| David Zeuthen | f3e2801 | 2014-08-26 18:23:52 -0400 | [diff] [blame] | 1127 |     case ErrorCode::kOmahaRequestXMLHasEntityDecl: | 
 | 1128 |       return "ErrorCode::kOmahaRequestXMLHasEntityDecl"; | 
| Allie Wood | eb9e6d8 | 2015-04-17 13:55:30 -0700 | [diff] [blame] | 1129 |     case ErrorCode::kFilesystemVerifierError: | 
 | 1130 |       return "ErrorCode::kFilesystemVerifierError"; | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1131 |     // Don't add a default case to let the compiler warn about newly added | 
 | 1132 |     // error codes which should be added here. | 
 | 1133 |   } | 
 | 1134 |  | 
 | 1135 |   return "Unknown error: " + base::UintToString(static_cast<unsigned>(code)); | 
 | 1136 | } | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 1137 |  | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1138 | bool CreatePowerwashMarkerFile(const char* file_path) { | 
 | 1139 |   const char* marker_file = file_path ? file_path : kPowerwashMarkerFile; | 
 | 1140 |   bool result = utils::WriteFile(marker_file, | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1141 |                                  kPowerwashCommand, | 
 | 1142 |                                  strlen(kPowerwashCommand)); | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1143 |   if (result) { | 
 | 1144 |     LOG(INFO) << "Created " << marker_file << " to powerwash on next reboot"; | 
 | 1145 |   } else { | 
 | 1146 |     PLOG(ERROR) << "Error in creating powerwash marker file: " << marker_file; | 
 | 1147 |   } | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1148 |  | 
 | 1149 |   return result; | 
 | 1150 | } | 
 | 1151 |  | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1152 | bool DeletePowerwashMarkerFile(const char* file_path) { | 
 | 1153 |   const char* marker_file = file_path ? file_path : kPowerwashMarkerFile; | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 1154 |   const base::FilePath kPowerwashMarkerPath(marker_file); | 
 | 1155 |   bool result = base::DeleteFile(kPowerwashMarkerPath, false); | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1156 |  | 
 | 1157 |   if (result) | 
 | 1158 |     LOG(INFO) << "Successfully deleted the powerwash marker file : " | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1159 |               << marker_file; | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1160 |   else | 
 | 1161 |     PLOG(ERROR) << "Could not delete the powerwash marker file : " | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1162 |                 << marker_file; | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1163 |  | 
 | 1164 |   return result; | 
 | 1165 | } | 
 | 1166 |  | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1167 | Time TimeFromStructTimespec(struct timespec *ts) { | 
| Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1168 |   int64_t us = static_cast<int64_t>(ts->tv_sec) * Time::kMicrosecondsPerSecond + | 
 | 1169 |       static_cast<int64_t>(ts->tv_nsec) / Time::kNanosecondsPerMicrosecond; | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1170 |   return Time::UnixEpoch() + TimeDelta::FromMicroseconds(us); | 
 | 1171 | } | 
 | 1172 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 1173 | string StringVectorToString(const vector<string> &vec_str) { | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1174 |   string str = "["; | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 1175 |   for (vector<string>::const_iterator i = vec_str.begin(); | 
 | 1176 |        i != vec_str.end(); ++i) { | 
 | 1177 |     if (i != vec_str.begin()) | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1178 |       str += ", "; | 
 | 1179 |     str += '"'; | 
 | 1180 |     str += *i; | 
 | 1181 |     str += '"'; | 
 | 1182 |   } | 
 | 1183 |   str += "]"; | 
 | 1184 |   return str; | 
 | 1185 | } | 
 | 1186 |  | 
| David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1187 | string CalculateP2PFileId(const string& payload_hash, size_t payload_size) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 1188 |   string encoded_hash = brillo::data_encoding::Base64Encode(payload_hash); | 
| Alex Deymo | c00c98a | 2015-03-17 17:38:00 -0700 | [diff] [blame] | 1189 |   return base::StringPrintf("cros_update_size_%" PRIuS "_hash_%s", | 
| Alex Vakulenko | 981a9fb | 2015-02-09 12:51:24 -0800 | [diff] [blame] | 1190 |                             payload_size, | 
 | 1191 |                             encoded_hash.c_str()); | 
| David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1192 | } | 
 | 1193 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 1194 | bool DecodeAndStoreBase64String(const string& base64_encoded, | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1195 |                                 base::FilePath *out_path) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 1196 |   brillo::Blob contents; | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1197 |  | 
 | 1198 |   out_path->clear(); | 
 | 1199 |  | 
 | 1200 |   if (base64_encoded.size() == 0) { | 
 | 1201 |     LOG(ERROR) << "Can't decode empty string."; | 
 | 1202 |     return false; | 
 | 1203 |   } | 
 | 1204 |  | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 1205 |   if (!brillo::data_encoding::Base64Decode(base64_encoded, &contents) || | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1206 |       contents.size() == 0) { | 
 | 1207 |     LOG(ERROR) << "Error decoding base64."; | 
 | 1208 |     return false; | 
 | 1209 |   } | 
 | 1210 |  | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 1211 |   FILE *file = base::CreateAndOpenTemporaryFile(out_path); | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1212 |   if (file == nullptr) { | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1213 |     LOG(ERROR) << "Error creating temporary file."; | 
 | 1214 |     return false; | 
 | 1215 |   } | 
 | 1216 |  | 
| Alex Vakulenko | 981a9fb | 2015-02-09 12:51:24 -0800 | [diff] [blame] | 1217 |   if (fwrite(contents.data(), 1, contents.size(), file) != contents.size()) { | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1218 |     PLOG(ERROR) << "Error writing to temporary file."; | 
 | 1219 |     if (fclose(file) != 0) | 
 | 1220 |       PLOG(ERROR) << "Error closing temporary file."; | 
 | 1221 |     if (unlink(out_path->value().c_str()) != 0) | 
 | 1222 |       PLOG(ERROR) << "Error unlinking temporary file."; | 
 | 1223 |     out_path->clear(); | 
 | 1224 |     return false; | 
 | 1225 |   } | 
 | 1226 |  | 
 | 1227 |   if (fclose(file) != 0) { | 
 | 1228 |     PLOG(ERROR) << "Error closing temporary file."; | 
 | 1229 |     out_path->clear(); | 
 | 1230 |     return false; | 
 | 1231 |   } | 
 | 1232 |  | 
 | 1233 |   return true; | 
 | 1234 | } | 
 | 1235 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame] | 1236 | bool ConvertToOmahaInstallDate(Time time, int *out_num_days) { | 
| David Zeuthen | 639aa36 | 2014-02-03 16:23:44 -0800 | [diff] [blame] | 1237 |   time_t unix_time = time.ToTimeT(); | 
 | 1238 |   // Output of: date +"%s" --date="Jan 1, 2007 0:00 PST". | 
 | 1239 |   const time_t kOmahaEpoch = 1167638400; | 
 | 1240 |   const int64_t kNumSecondsPerWeek = 7*24*3600; | 
 | 1241 |   const int64_t kNumDaysPerWeek = 7; | 
 | 1242 |  | 
 | 1243 |   time_t omaha_time = unix_time - kOmahaEpoch; | 
 | 1244 |  | 
 | 1245 |   if (omaha_time < 0) | 
 | 1246 |     return false; | 
 | 1247 |  | 
 | 1248 |   // Note, as per the comment in utils.h we are deliberately not | 
 | 1249 |   // handling DST correctly. | 
 | 1250 |  | 
 | 1251 |   int64_t num_weeks_since_omaha_epoch = omaha_time / kNumSecondsPerWeek; | 
 | 1252 |   *out_num_days = num_weeks_since_omaha_epoch * kNumDaysPerWeek; | 
 | 1253 |  | 
 | 1254 |   return true; | 
 | 1255 | } | 
 | 1256 |  | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 1257 | bool GetMinorVersion(const brillo::KeyValueStore& store, | 
| Alex Deymo | b42b98d | 2015-07-06 17:42:38 -0700 | [diff] [blame] | 1258 |                      uint32_t* minor_version) { | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1259 |   string result; | 
| Alex Deymo | b42b98d | 2015-07-06 17:42:38 -0700 | [diff] [blame] | 1260 |   if (store.GetString("PAYLOAD_MINOR_VERSION", &result)) { | 
| Allie Wood | 425aa97 | 2015-02-17 14:47:17 -0800 | [diff] [blame] | 1261 |     if (!base::StringToUint(result, minor_version)) { | 
 | 1262 |       LOG(ERROR) << "StringToUint failed when parsing delta minor version."; | 
 | 1263 |       return false; | 
 | 1264 |     } | 
| Allie Wood | 78750a4 | 2015-02-11 15:42:11 -0800 | [diff] [blame] | 1265 |     return true; | 
 | 1266 |   } | 
 | 1267 |   return false; | 
 | 1268 | } | 
 | 1269 |  | 
| Alex Deymo | 60ca1a7 | 2015-06-18 18:19:15 -0700 | [diff] [blame] | 1270 | bool ReadExtents(const string& path, const vector<Extent>& extents, | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 1271 |                  brillo::Blob* out_data, ssize_t out_data_size, | 
| Allie Wood | 5687345 | 2015-03-27 17:48:40 -0700 | [diff] [blame] | 1272 |                  size_t block_size) { | 
| Alex Vakulenko | 3f39d5c | 2015-10-13 09:27:13 -0700 | [diff] [blame] | 1273 |   brillo::Blob data(out_data_size); | 
| Allie Wood | 5687345 | 2015-03-27 17:48:40 -0700 | [diff] [blame] | 1274 |   ssize_t bytes_read = 0; | 
 | 1275 |   int fd = open(path.c_str(), O_RDONLY); | 
 | 1276 |   TEST_AND_RETURN_FALSE_ERRNO(fd >= 0); | 
 | 1277 |   ScopedFdCloser fd_closer(&fd); | 
 | 1278 |  | 
| Gilad Arnold | 41e3474 | 2015-05-11 11:31:50 -0700 | [diff] [blame] | 1279 |   for (const Extent& extent : extents) { | 
| Allie Wood | 5687345 | 2015-03-27 17:48:40 -0700 | [diff] [blame] | 1280 |     ssize_t bytes_read_this_iteration = 0; | 
 | 1281 |     ssize_t bytes = extent.num_blocks() * block_size; | 
 | 1282 |     TEST_AND_RETURN_FALSE(bytes_read + bytes <= out_data_size); | 
 | 1283 |     TEST_AND_RETURN_FALSE(utils::PReadAll(fd, | 
 | 1284 |                                           &data[bytes_read], | 
 | 1285 |                                           bytes, | 
 | 1286 |                                           extent.start_block() * block_size, | 
 | 1287 |                                           &bytes_read_this_iteration)); | 
 | 1288 |     TEST_AND_RETURN_FALSE(bytes_read_this_iteration == bytes); | 
 | 1289 |     bytes_read += bytes_read_this_iteration; | 
 | 1290 |   } | 
 | 1291 |   TEST_AND_RETURN_FALSE(out_data_size == bytes_read); | 
 | 1292 |   *out_data = data; | 
 | 1293 |   return true; | 
 | 1294 | } | 
 | 1295 |  | 
| Alex Deymo | dd132f3 | 2015-09-14 19:12:07 -0700 | [diff] [blame] | 1296 | bool GetBootId(string* boot_id) { | 
 | 1297 |   TEST_AND_RETURN_FALSE( | 
 | 1298 |       base::ReadFileToString(base::FilePath(kBootIdPath), boot_id)); | 
 | 1299 |   base::TrimWhitespaceASCII(*boot_id, base::TRIM_TRAILING, boot_id); | 
 | 1300 |   return true; | 
 | 1301 | } | 
 | 1302 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 1303 | }  // namespace utils | 
 | 1304 |  | 
 | 1305 | }  // namespace chromeos_update_engine |