xref: /aosp_15_r20/system/update_engine/payload_consumer/postinstall_runner_action.cc (revision 5a9231315b4521097b8dc3750bc806fcafe0c72f)
1 //
2 // Copyright (C) 2011 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 //      http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16 
17 #include "update_engine/payload_consumer/postinstall_runner_action.h"
18 
19 #include <fcntl.h>
20 #include <signal.h>
21 #include <stdlib.h>
22 #include <sys/mount.h>
23 #include <sys/types.h>
24 #include <unistd.h>
25 
26 #include <cmath>
27 #include <fstream>
28 #include <string>
29 
30 #include <base/files/file_path.h>
31 #include <base/files/file_util.h>
32 #include <base/logging.h>
33 #include <base/strings/string_split.h>
34 
35 #include "update_engine/common/action_processor.h"
36 #include "update_engine/common/boot_control_interface.h"
37 #include "update_engine/common/error_code_utils.h"
38 #include "update_engine/common/platform_constants.h"
39 #include "update_engine/common/subprocess.h"
40 #include "update_engine/common/utils.h"
41 
42 namespace {
43 
44 // The file descriptor number from the postinstall program's perspective where
45 // it can report status updates. This can be any number greater than 2 (stderr),
46 // but must be kept in sync with the "bin/postinst_progress" defined in the
47 // sample_images.sh file.
48 const int kPostinstallStatusFd = 3;
49 
Contains(std::string_view haystack,std::string_view needle)50 static constexpr bool Contains(std::string_view haystack,
51                                std::string_view needle) {
52   return haystack.find(needle) != std::string::npos;
53 }
54 
LogBuildInfoForPartition(std::string_view mount_point)55 static void LogBuildInfoForPartition(std::string_view mount_point) {
56   static constexpr std::array<std::string_view, 3> kBuildPropFiles{
57       "build.prop", "etc/build.prop", "system/build.prop"};
58   for (const auto& file : kBuildPropFiles) {
59     auto path = std::string(mount_point);
60     if (path.back() != '/') {
61       path.push_back('/');
62     }
63     path += file;
64     LOG(INFO) << "Trying to read " << path;
65     std::ifstream infile(path);
66     std::string line;
67     while (std::getline(infile, line)) {
68       if (Contains(line, "ro.build")) {
69         LOG(INFO) << line;
70       }
71     }
72   }
73 }
74 
75 }  // namespace
76 
77 namespace chromeos_update_engine {
78 
79 using std::string;
80 using std::vector;
81 
PostinstallRunnerAction(BootControlInterface * boot_control,HardwareInterface * hardware)82 PostinstallRunnerAction::PostinstallRunnerAction(
83     BootControlInterface* boot_control, HardwareInterface* hardware)
84     : boot_control_(boot_control), hardware_(hardware) {
85 #ifdef __ANDROID__
86   fs_mount_dir_ = "/postinstall";
87 #else   // __ANDROID__
88   base::FilePath temp_dir;
89   TEST_AND_RETURN(base::CreateNewTempDirectory("au_postint_mount", &temp_dir));
90   fs_mount_dir_ = temp_dir.value();
91 #endif  // __ANDROID__
92   CHECK(!fs_mount_dir_.empty());
93   EnsureUnmounted();
94   LOG(INFO) << "postinstall mount point: " << fs_mount_dir_;
95 }
96 
EnsureUnmounted()97 void PostinstallRunnerAction::EnsureUnmounted() {
98   if (utils::IsMountpoint(fs_mount_dir_)) {
99     LOG(INFO) << "Found previously mounted filesystem at " << fs_mount_dir_;
100     utils::UnmountFilesystem(fs_mount_dir_);
101   }
102 }
103 
PerformAction()104 void PostinstallRunnerAction::PerformAction() {
105   CHECK(HasInputObject());
106   CHECK(boot_control_);
107   install_plan_ = GetInputObject();
108 
109   auto dynamic_control = boot_control_->GetDynamicPartitionControl();
110   CHECK(dynamic_control);
111 
112   // Mount snapshot partitions for Virtual AB Compression Compression.
113   if (dynamic_control->UpdateUsesSnapshotCompression()) {
114     // If we are switching slots, then we are required to MapAllPartitions,
115     // as FinishUpdate() requires all partitions to be mapped.
116     // And switching slots requires FinishUpdate() to be called first
117     if (!install_plan_.partitions.empty() ||
118         install_plan_.switch_slot_on_reboot) {
119       if (!dynamic_control->MapAllPartitions()) {
120         return CompletePostinstall(ErrorCode::kPostInstallMountError);
121       }
122     }
123   }
124 
125   // We always powerwash when rolling back, however policy can determine
126   // if this is a full/normal powerwash, or a special rollback powerwash
127   // that retains a small amount of system state such as enrollment and
128   // network configuration. In both cases all user accounts are deleted.
129   if (install_plan_.powerwash_required) {
130     if (hardware_->SchedulePowerwash()) {
131       powerwash_scheduled_ = true;
132     } else {
133       return CompletePostinstall(ErrorCode::kPostinstallPowerwashError);
134     }
135   }
136 
137   // Initialize all the partition weights.
138   partition_weight_.resize(install_plan_.partitions.size());
139   total_weight_ = 0;
140   for (size_t i = 0; i < install_plan_.partitions.size(); ++i) {
141     auto& partition = install_plan_.partitions[i];
142     if (!install_plan_.run_post_install && partition.postinstall_optional) {
143       partition.run_postinstall = false;
144       LOG(INFO) << "Skipping optional post-install for partition "
145                 << partition.name << " according to install plan.";
146     }
147 
148     // TODO(deymo): This code sets the weight to all the postinstall commands,
149     // but we could remember how long they took in the past and use those
150     // values.
151     partition_weight_[i] = partition.run_postinstall;
152     total_weight_ += partition_weight_[i];
153   }
154   accumulated_weight_ = 0;
155   ReportProgress(0);
156 
157   PerformPartitionPostinstall();
158 }
159 
MountPartition(const InstallPlan::Partition & partition)160 bool PostinstallRunnerAction::MountPartition(
161     const InstallPlan::Partition& partition) noexcept {
162   // Perform post-install for the current_partition_ partition. At this point we
163   // need to call CompletePartitionPostinstall to complete the operation and
164   // cleanup.
165   const auto mountable_device = partition.readonly_target_path;
166   if (!utils::FileExists(mountable_device.c_str())) {
167     LOG(ERROR) << "Mountable device " << mountable_device << " for partition "
168                << partition.name << " does not exist";
169     return false;
170   }
171 
172   if (!utils::FileExists(fs_mount_dir_.c_str())) {
173     LOG(ERROR) << "Mount point " << fs_mount_dir_
174                << " does not exist, mount call will fail";
175     return false;
176   }
177   // Double check that the fs_mount_dir is not busy with a previous mounted
178   // filesystem from a previous crashed postinstall step.
179   EnsureUnmounted();
180 
181 #ifdef __ANDROID__
182   // In Chromium OS, the postinstall step is allowed to write to the block
183   // device on the target image, so we don't mark it as read-only and should
184   // be read-write since we just wrote to it during the update.
185 
186   // Mark the block device as read-only before mounting for post-install.
187   if (!utils::SetBlockDeviceReadOnly(mountable_device, true)) {
188     return false;
189   }
190 #endif  // __ANDROID__
191 
192   if (!utils::MountFilesystem(
193           mountable_device,
194           fs_mount_dir_,
195           MS_RDONLY,
196           partition.filesystem_type,
197           hardware_->GetPartitionMountOptions(partition.name))) {
198     return false;
199   }
200   return true;
201 }
202 
PerformPartitionPostinstall()203 void PostinstallRunnerAction::PerformPartitionPostinstall() {
204   if (install_plan_.download_url.empty()) {
205     LOG(INFO) << "Skipping post-install";
206     return CompletePostinstall(ErrorCode::kSuccess);
207   }
208 
209   // Skip all the partitions that don't have a post-install step.
210   while (current_partition_ < install_plan_.partitions.size() &&
211          !install_plan_.partitions[current_partition_].run_postinstall) {
212     VLOG(1) << "Skipping post-install on partition "
213             << install_plan_.partitions[current_partition_].name;
214     // Attempt to mount a device if it has postinstall script configured, even
215     // if we want to skip running postinstall script.
216     // This is because we've seen bugs like b/198787355 which is only triggered
217     // when you attempt to mount a device. If device fails to mount, it will
218     // likely fail to mount during boot anyway, so it's better to catch any
219     // issues earlier.
220     // It's possible that some of the partitions aren't mountable, but these
221     // partitions shouldn't have postinstall configured. Therefore we guard this
222     // logic with |postinstall_path.empty()|.
223     const auto& partition = install_plan_.partitions[current_partition_];
224     if (!partition.postinstall_path.empty()) {
225       const auto mountable_device = partition.readonly_target_path;
226       if (!MountPartition(partition)) {
227         return CompletePostinstall(ErrorCode::kPostInstallMountError);
228       }
229       LogBuildInfoForPartition(fs_mount_dir_);
230       if (!utils::UnmountFilesystem(fs_mount_dir_)) {
231         return CompletePartitionPostinstall(
232             1, "Error unmounting the device " + mountable_device);
233       }
234     }
235     current_partition_++;
236   }
237   if (current_partition_ == install_plan_.partitions.size())
238     return CompletePostinstall(ErrorCode::kSuccess);
239 
240   const InstallPlan::Partition& partition =
241       install_plan_.partitions[current_partition_];
242 
243   const string mountable_device = partition.readonly_target_path;
244   // Perform post-install for the current_partition_ partition. At this point we
245   // need to call CompletePartitionPostinstall to complete the operation and
246   // cleanup.
247 
248   if (!MountPartition(partition)) {
249     CompletePostinstall(ErrorCode::kPostInstallMountError);
250     return;
251   }
252   LogBuildInfoForPartition(fs_mount_dir_);
253   base::FilePath postinstall_path(partition.postinstall_path);
254   if (postinstall_path.IsAbsolute()) {
255     LOG(ERROR) << "Invalid absolute path passed to postinstall, use a relative"
256                   "path instead: "
257                << partition.postinstall_path;
258     return CompletePostinstall(ErrorCode::kPostinstallRunnerError);
259   }
260 
261   string abs_path =
262       base::FilePath(fs_mount_dir_).Append(postinstall_path).value();
263   if (!base::StartsWith(
264           abs_path, fs_mount_dir_, base::CompareCase::SENSITIVE)) {
265     LOG(ERROR) << "Invalid relative postinstall path: "
266                << partition.postinstall_path;
267     return CompletePostinstall(ErrorCode::kPostinstallRunnerError);
268   }
269 
270   LOG(INFO) << "Performing postinst (" << partition.postinstall_path << " at "
271             << abs_path << ") installed on mountable device "
272             << mountable_device;
273 
274   // Logs the file format of the postinstall script we are about to run. This
275   // will help debug when the postinstall script doesn't match the architecture
276   // of our build.
277   LOG(INFO) << "Format file for new " << partition.postinstall_path
278             << " is: " << utils::GetFileFormat(abs_path);
279 
280   // Runs the postinstall script asynchronously to free up the main loop while
281   // it's running.
282   vector<string> command = {abs_path};
283 #ifdef __ANDROID__
284   // In Brillo and Android, we pass the slot number and status fd.
285   command.push_back(std::to_string(install_plan_.target_slot));
286   command.push_back(std::to_string(kPostinstallStatusFd));
287 #else
288   // Chrome OS postinstall expects the target rootfs as the first parameter.
289   command.push_back(partition.target_path);
290 #endif  // __ANDROID__
291 
292   current_command_ = Subprocess::Get().ExecFlags(
293       command,
294       Subprocess::kRedirectStderrToStdout,
295       {kPostinstallStatusFd},
296       base::Bind(&PostinstallRunnerAction::CompletePartitionPostinstall,
297                  base::Unretained(this)));
298   // Subprocess::Exec should never return a negative process id.
299   CHECK_GE(current_command_, 0);
300 
301   if (!current_command_) {
302     CompletePartitionPostinstall(1, "Postinstall didn't launch");
303     return;
304   }
305 
306   // Monitor the status file descriptor.
307   progress_fd_ =
308       Subprocess::Get().GetPipeFd(current_command_, kPostinstallStatusFd);
309   int fd_flags = fcntl(progress_fd_, F_GETFL, 0) | O_NONBLOCK;
310   if (HANDLE_EINTR(fcntl(progress_fd_, F_SETFL, fd_flags)) < 0) {
311     PLOG(ERROR) << "Unable to set non-blocking I/O mode on fd " << progress_fd_;
312   }
313 
314   progress_controller_ = base::FileDescriptorWatcher::WatchReadable(
315       progress_fd_,
316       base::BindRepeating(&PostinstallRunnerAction::OnProgressFdReady,
317                           base::Unretained(this)));
318 }
319 
OnProgressFdReady()320 void PostinstallRunnerAction::OnProgressFdReady() {
321   char buf[1024];
322   size_t bytes_read;
323   do {
324     bytes_read = 0;
325     bool eof;
326     bool ok =
327         utils::ReadAll(progress_fd_, buf, std::size(buf), &bytes_read, &eof);
328     progress_buffer_.append(buf, bytes_read);
329     // Process every line.
330     vector<string> lines = base::SplitString(
331         progress_buffer_, "\n", base::KEEP_WHITESPACE, base::SPLIT_WANT_ALL);
332     if (!lines.empty()) {
333       progress_buffer_ = lines.back();
334       lines.pop_back();
335       for (const auto& line : lines) {
336         ProcessProgressLine(line);
337       }
338     }
339     if (!ok || eof) {
340       // There was either an error or an EOF condition, so we are done watching
341       // the file descriptor.
342       progress_controller_.reset();
343       return;
344     }
345   } while (bytes_read);
346 }
347 
ProcessProgressLine(const string & line)348 bool PostinstallRunnerAction::ProcessProgressLine(const string& line) {
349   double frac = 0;
350   if (sscanf(line.c_str(), "global_progress %lf", &frac) == 1 &&
351       !std::isnan(frac)) {
352     ReportProgress(frac);
353     return true;
354   }
355 
356   return false;
357 }
358 
ReportProgress(double frac)359 void PostinstallRunnerAction::ReportProgress(double frac) {
360   if (!delegate_)
361     return;
362   if (current_partition_ >= partition_weight_.size() || total_weight_ == 0) {
363     delegate_->ProgressUpdate(1.);
364     return;
365   }
366   if (!std::isfinite(frac) || frac < 0)
367     frac = 0;
368   if (frac > 1)
369     frac = 1;
370   double postinst_action_progress =
371       (accumulated_weight_ + partition_weight_[current_partition_] * frac) /
372       total_weight_;
373   delegate_->ProgressUpdate(postinst_action_progress);
374 }
375 
Cleanup()376 void PostinstallRunnerAction::Cleanup() {
377   utils::UnmountFilesystem(fs_mount_dir_);
378 #ifndef __ANDROID__
379 #if BASE_VER < 800000
380   if (!base::DeleteFile(base::FilePath(fs_mount_dir_), true)) {
381 #else
382   if (!base::DeleteFile(base::FilePath(fs_mount_dir_))) {
383 #endif
384     PLOG(WARNING) << "Not removing temporary mountpoint " << fs_mount_dir_;
385   }
386 #endif
387 
388   progress_fd_ = -1;
389   progress_controller_.reset();
390 
391   progress_buffer_.clear();
392 }
393 
394 void PostinstallRunnerAction::CompletePartitionPostinstall(
395     int return_code, const string& output) {
396   current_command_ = 0;
397   Cleanup();
398 
399   if (return_code != 0) {
400     LOG(ERROR) << "Postinst command failed with code: " << return_code;
401     ErrorCode error_code = ErrorCode::kPostinstallRunnerError;
402 
403     if (return_code == 3) {
404       // This special return code means that we tried to update firmware,
405       // but couldn't because we booted from FW B, and we need to reboot
406       // to get back to FW A.
407       error_code = ErrorCode::kPostinstallBootedFromFirmwareB;
408     }
409 
410     if (return_code == 4) {
411       // This special return code means that we tried to update firmware,
412       // but couldn't because we booted from FW B, and we need to reboot
413       // to get back to FW A.
414       error_code = ErrorCode::kPostinstallFirmwareRONotUpdatable;
415     }
416 
417     // If postinstall script for this partition is optional we can ignore the
418     // result.
419     if (install_plan_.partitions[current_partition_].postinstall_optional) {
420       LOG(INFO) << "Ignoring postinstall failure since it is optional";
421     } else {
422       return CompletePostinstall(error_code);
423     }
424   }
425   accumulated_weight_ += partition_weight_[current_partition_];
426   current_partition_++;
427   ReportProgress(0);
428 
429   PerformPartitionPostinstall();
430 }
431 
432 PostinstallRunnerAction::~PostinstallRunnerAction() {
433   if (!install_plan_.partitions.empty()) {
434     auto dynamic_control = boot_control_->GetDynamicPartitionControl();
435     CHECK(dynamic_control);
436     dynamic_control->UnmapAllPartitions();
437     LOG(INFO) << "Unmapped all partitions.";
438   }
439 }
440 
441 void PostinstallRunnerAction::CompletePostinstall(ErrorCode error_code) {
442   // We only attempt to mark the new slot as active if all the postinstall
443   // steps succeeded.
444   DEFER {
445     if (error_code != ErrorCode::kSuccess &&
446         error_code != ErrorCode::kUpdatedButNotActive) {
447       LOG(ERROR) << "Postinstall action failed. "
448                  << utils::ErrorCodeToString(error_code);
449 
450       // Undo any changes done to trigger Powerwash.
451       if (powerwash_scheduled_)
452         hardware_->CancelPowerwash();
453     }
454     processor_->ActionComplete(this, error_code);
455   };
456   if (error_code == ErrorCode::kSuccess) {
457     if (install_plan_.switch_slot_on_reboot) {
458       if (!boot_control_->GetDynamicPartitionControl()->FinishUpdate(
459               install_plan_.powerwash_required) ||
460           !boot_control_->SetActiveBootSlot(install_plan_.target_slot)) {
461         error_code = ErrorCode::kPostinstallRunnerError;
462       } else {
463         // Schedules warm reset on next reboot, ignores the error.
464         hardware_->SetWarmReset(true);
465         // Sets the vbmeta digest for the other slot to boot into.
466         hardware_->SetVbmetaDigestForInactiveSlot(false);
467       }
468     } else {
469       error_code = ErrorCode::kUpdatedButNotActive;
470     }
471   }
472 
473   LOG(INFO) << "All post-install commands succeeded";
474   if (HasOutputPipe()) {
475     SetOutputObject(install_plan_);
476   }
477 }
478 
479 void PostinstallRunnerAction::SuspendAction() {
480   if (!current_command_)
481     return;
482   if (kill(current_command_, SIGSTOP) != 0) {
483     PLOG(ERROR) << "Couldn't pause child process " << current_command_;
484   } else {
485     is_current_command_suspended_ = true;
486   }
487 }
488 
489 void PostinstallRunnerAction::ResumeAction() {
490   if (!current_command_)
491     return;
492   if (kill(current_command_, SIGCONT) != 0) {
493     PLOG(ERROR) << "Couldn't resume child process " << current_command_;
494   } else {
495     is_current_command_suspended_ = false;
496   }
497 }
498 
499 void PostinstallRunnerAction::TerminateProcessing() {
500   if (!current_command_)
501     return;
502   // Calling KillExec() will discard the callback we registered and therefore
503   // the unretained reference to this object.
504   Subprocess::Get().KillExec(current_command_);
505 
506   // If the command has been suspended, resume it after KillExec() so that the
507   // process can process the SIGTERM sent by KillExec().
508   if (is_current_command_suspended_) {
509     ResumeAction();
510   }
511 
512   current_command_ = 0;
513   Cleanup();
514 }
515 
516 }  // namespace chromeos_update_engine
517