| Mike Frysinger | 8155d08 | 2012-04-06 15:23:18 -0400 | [diff] [blame] | 1 | // Copyright (c) 2012 The Chromium OS Authors. All rights reserved. | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 2 | // Use of this source code is governed by a BSD-style license that can be | 
 | 3 | // found in the LICENSE file. | 
 | 4 |  | 
 | 5 | #include "update_engine/utils.h" | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 6 |  | 
| Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 7 | #include <stdint.h> | 
 | 8 |  | 
| David Zeuthen | 910ec5b | 2013-09-26 12:10:58 -0700 | [diff] [blame] | 9 | #include <attr/xattr.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 10 | #include <dirent.h> | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 11 | #include <elf.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 12 | #include <errno.h> | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 13 | #include <fcntl.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 14 | #include <stdio.h> | 
 | 15 | #include <stdlib.h> | 
 | 16 | #include <string.h> | 
| Alex Deymo | c4acdf4 | 2014-05-28 21:07:10 -0700 | [diff] [blame] | 17 | #include <sys/mount.h> | 
 | 18 | #include <sys/resource.h> | 
 | 19 | #include <sys/stat.h> | 
 | 20 | #include <sys/types.h> | 
 | 21 | #include <sys/wait.h> | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 22 | #include <unistd.h> | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 23 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 24 | #include <algorithm> | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 25 | #include <utility> | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 26 | #include <vector> | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 27 |  | 
| Alex Vakulenko | 4906c1c | 2014-08-21 13:17:44 -0700 | [diff] [blame] | 28 | #include <base/callback.h> | 
| Ben Chan | 06c76a4 | 2014-09-05 08:21:06 -0700 | [diff] [blame] | 29 | #include <base/files/file_util.h> | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 30 | #include <base/files/file_path.h> | 
 | 31 | #include <base/files/scoped_file.h> | 
| Mike Frysinger | 8155d08 | 2012-04-06 15:23:18 -0400 | [diff] [blame] | 32 | #include <base/logging.h> | 
| Chris Sosa | fc661a1 | 2013-02-26 14:43:21 -0800 | [diff] [blame] | 33 | #include <base/posix/eintr_wrapper.h> | 
| Will Drewry | 8f71da8 | 2010-08-30 14:07:11 -0500 | [diff] [blame] | 34 | #include <base/rand_util.h> | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 35 | #include <base/strings/string_number_conversions.h> | 
 | 36 | #include <base/strings/string_split.h> | 
 | 37 | #include <base/strings/string_util.h> | 
 | 38 | #include <base/strings/stringprintf.h> | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 39 | #include <glib.h> | 
| Will Drewry | 8f71da8 | 2010-08-30 14:07:11 -0500 | [diff] [blame] | 40 |  | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 41 | #include "update_engine/clock_interface.h" | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 42 | #include "update_engine/constants.h" | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 43 | #include "update_engine/file_writer.h" | 
| Darin Petkov | 33d3064 | 2010-08-04 10:18:57 -0700 | [diff] [blame] | 44 | #include "update_engine/omaha_request_params.h" | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 45 | #include "update_engine/prefs_interface.h" | 
| Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 46 | #include "update_engine/subprocess.h" | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 47 | #include "update_engine/system_state.h" | 
 | 48 | #include "update_engine/update_attempter.h" | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 49 |  | 
| Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 50 | using base::Time; | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 51 | using base::TimeDelta; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 52 | using std::min; | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 53 | using std::pair; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 54 | using std::string; | 
 | 55 | using std::vector; | 
 | 56 |  | 
 | 57 | namespace chromeos_update_engine { | 
 | 58 |  | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 59 | namespace { | 
 | 60 |  | 
 | 61 | // The following constants control how UnmountFilesystem should retry if | 
 | 62 | // umount() fails with an errno EBUSY, i.e. retry 5 times over the course of | 
 | 63 | // one second. | 
 | 64 | const int kUnmountMaxNumOfRetries = 5; | 
 | 65 | const int kUnmountRetryIntervalInMicroseconds = 200 * 1000;  // 200 ms | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 66 |  | 
 | 67 | // Number of bytes to read from a file to attempt to detect its contents. Used | 
 | 68 | // in GetFileFormat. | 
 | 69 | const int kGetFileFormatMaxHeaderSize = 32; | 
 | 70 |  | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 71 | }  // namespace | 
 | 72 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 73 | namespace utils { | 
 | 74 |  | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 75 | // Cgroup container is created in update-engine's upstart script located at | 
 | 76 | // /etc/init/update-engine.conf. | 
 | 77 | static const char kCGroupDir[] = "/sys/fs/cgroup/cpu/update-engine"; | 
 | 78 |  | 
| J. Richard Barnette | 63137e5 | 2013-10-28 10:57:29 -0700 | [diff] [blame] | 79 | string ParseECVersion(string input_line) { | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 80 |   base::TrimWhitespaceASCII(input_line, base::TRIM_ALL, &input_line); | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 81 |  | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 82 |   // At this point we want to convert the format key=value pair from mosys to | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 83 |   // a vector of key value pairs. | 
| Ben Chan | f9cb98c | 2014-09-21 18:31:30 -0700 | [diff] [blame] | 84 |   vector<pair<string, string>> kv_pairs; | 
| J. Richard Barnette | 63137e5 | 2013-10-28 10:57:29 -0700 | [diff] [blame] | 85 |   if (base::SplitStringIntoKeyValuePairs(input_line, '=', ' ', &kv_pairs)) { | 
| Ben Chan | f9cb98c | 2014-09-21 18:31:30 -0700 | [diff] [blame] | 86 |     for (vector<pair<string, string>>::iterator it = kv_pairs.begin(); | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 87 |          it != kv_pairs.end(); ++it) { | 
 | 88 |       // Finally match against the fw_verion which may have quotes. | 
 | 89 |       if (it->first == "fw_version") { | 
 | 90 |         string output; | 
 | 91 |         // Trim any quotes. | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 92 |         base::TrimString(it->second, "\"", &output); | 
| Chris Sosa | c197248 | 2013-04-30 22:31:10 -0700 | [diff] [blame] | 93 |         return output; | 
 | 94 |       } | 
 | 95 |     } | 
 | 96 |   } | 
 | 97 |   LOG(ERROR) << "Unable to parse fwid from ec info."; | 
 | 98 |   return ""; | 
 | 99 | } | 
 | 100 |  | 
 | 101 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 102 | const string KernelDeviceOfBootDevice(const string& boot_device) { | 
 | 103 |   string kernel_partition_name; | 
| J. Richard Barnette | 3084293 | 2013-10-28 15:04:23 -0700 | [diff] [blame] | 104 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 105 |   string disk_name; | 
 | 106 |   int partition_num; | 
 | 107 |   if (SplitPartitionName(boot_device, &disk_name, &partition_num)) { | 
 | 108 |     if (disk_name == "/dev/ubiblock") { | 
 | 109 |       // Special case for NAND devices. | 
 | 110 |       // eg: /dev/ubiblock3_0 becomes /dev/mtdblock2 | 
 | 111 |       disk_name = "/dev/mtdblock"; | 
 | 112 |     } | 
 | 113 |     // Currently this assumes the partition number of the boot device is | 
 | 114 |     // 3, 5, or 7, and changes it to 2, 4, or 6, respectively, to | 
 | 115 |     // get the kernel device. | 
 | 116 |     if (partition_num == 3 || partition_num == 5 || partition_num == 7) { | 
 | 117 |       kernel_partition_name = MakePartitionName(disk_name, partition_num - 1); | 
 | 118 |     } | 
| J. Richard Barnette | 3084293 | 2013-10-28 15:04:23 -0700 | [diff] [blame] | 119 |   } | 
 | 120 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 121 |   return kernel_partition_name; | 
| J. Richard Barnette | 3084293 | 2013-10-28 15:04:23 -0700 | [diff] [blame] | 122 | } | 
 | 123 |  | 
 | 124 |  | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 125 | bool WriteFile(const char* path, const char* data, int data_len) { | 
 | 126 |   DirectFileWriter writer; | 
 | 127 |   TEST_AND_RETURN_FALSE_ERRNO(0 == writer.Open(path, | 
 | 128 |                                                O_WRONLY | O_CREAT | O_TRUNC, | 
| Chris Masone | 4dc2ada | 2010-09-23 12:43:03 -0700 | [diff] [blame] | 129 |                                                0600)); | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 130 |   ScopedFileWriterCloser closer(&writer); | 
| Don Garrett | e410e0f | 2011-11-10 15:39:01 -0800 | [diff] [blame] | 131 |   TEST_AND_RETURN_FALSE_ERRNO(writer.Write(data, data_len)); | 
| Andrew de los Reyes | 970bb28 | 2009-12-09 16:34:04 -0800 | [diff] [blame] | 132 |   return true; | 
 | 133 | } | 
 | 134 |  | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 135 | bool WriteAll(int fd, const void* buf, size_t count) { | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 136 |   const char* c_buf = static_cast<const char*>(buf); | 
 | 137 |   ssize_t bytes_written = 0; | 
 | 138 |   while (bytes_written < static_cast<ssize_t>(count)) { | 
 | 139 |     ssize_t rc = write(fd, c_buf + bytes_written, count - bytes_written); | 
 | 140 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 141 |     bytes_written += rc; | 
 | 142 |   } | 
 | 143 |   return true; | 
 | 144 | } | 
 | 145 |  | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 146 | bool PWriteAll(int fd, const void* buf, size_t count, off_t offset) { | 
 | 147 |   const char* c_buf = static_cast<const char*>(buf); | 
| Gilad Arnold | 780db21 | 2012-07-11 13:12:49 -0700 | [diff] [blame] | 148 |   size_t bytes_written = 0; | 
 | 149 |   int num_attempts = 0; | 
 | 150 |   while (bytes_written < count) { | 
 | 151 |     num_attempts++; | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 152 |     ssize_t rc = pwrite(fd, c_buf + bytes_written, count - bytes_written, | 
 | 153 |                         offset + bytes_written); | 
| Gilad Arnold | 780db21 | 2012-07-11 13:12:49 -0700 | [diff] [blame] | 154 |     // TODO(garnold) for debugging failure in chromium-os:31077; to be removed. | 
 | 155 |     if (rc < 0) { | 
 | 156 |       PLOG(ERROR) << "pwrite error; num_attempts=" << num_attempts | 
 | 157 |                   << " bytes_written=" << bytes_written | 
 | 158 |                   << " count=" << count << " offset=" << offset; | 
 | 159 |     } | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 160 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 161 |     bytes_written += rc; | 
 | 162 |   } | 
 | 163 |   return true; | 
 | 164 | } | 
 | 165 |  | 
 | 166 | bool PReadAll(int fd, void* buf, size_t count, off_t offset, | 
 | 167 |               ssize_t* out_bytes_read) { | 
 | 168 |   char* c_buf = static_cast<char*>(buf); | 
 | 169 |   ssize_t bytes_read = 0; | 
 | 170 |   while (bytes_read < static_cast<ssize_t>(count)) { | 
 | 171 |     ssize_t rc = pread(fd, c_buf + bytes_read, count - bytes_read, | 
 | 172 |                        offset + bytes_read); | 
 | 173 |     TEST_AND_RETURN_FALSE_ERRNO(rc >= 0); | 
 | 174 |     if (rc == 0) { | 
 | 175 |       break; | 
 | 176 |     } | 
 | 177 |     bytes_read += rc; | 
 | 178 |   } | 
 | 179 |   *out_bytes_read = bytes_read; | 
 | 180 |   return true; | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 181 | } | 
 | 182 |  | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 183 | // Append |nbytes| of content from |buf| to the vector pointed to by either | 
 | 184 | // |vec_p| or |str_p|. | 
 | 185 | static void AppendBytes(const char* buf, size_t nbytes, | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 186 |                         vector<char>* vec_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 187 |   CHECK(buf); | 
 | 188 |   CHECK(vec_p); | 
 | 189 |   vec_p->insert(vec_p->end(), buf, buf + nbytes); | 
 | 190 | } | 
 | 191 | static void AppendBytes(const char* buf, size_t nbytes, | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 192 |                         string* str_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 193 |   CHECK(buf); | 
 | 194 |   CHECK(str_p); | 
 | 195 |   str_p->append(buf, nbytes); | 
 | 196 | } | 
 | 197 |  | 
 | 198 | // Reads from an open file |fp|, appending the read content to the container | 
 | 199 | // pointer to by |out_p|.  Returns true upon successful reading all of the | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 200 | // file's content, false otherwise. If |size| is not -1, reads up to |size| | 
 | 201 | // bytes. | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 202 | template <class T> | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 203 | static bool Read(FILE* fp, off_t size, T* out_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 204 |   CHECK(fp); | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 205 |   CHECK(size == -1 || size >= 0); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 206 |   char buf[1024]; | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 207 |   while (size == -1 || size > 0) { | 
 | 208 |     off_t bytes_to_read = sizeof(buf); | 
 | 209 |     if (size > 0 && bytes_to_read > size) { | 
 | 210 |       bytes_to_read = size; | 
 | 211 |     } | 
 | 212 |     size_t nbytes = fread(buf, 1, bytes_to_read, fp); | 
 | 213 |     if (!nbytes) { | 
 | 214 |       break; | 
 | 215 |     } | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 216 |     AppendBytes(buf, nbytes, out_p); | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 217 |     if (size != -1) { | 
 | 218 |       CHECK(size >= static_cast<off_t>(nbytes)); | 
 | 219 |       size -= nbytes; | 
 | 220 |     } | 
 | 221 |   } | 
 | 222 |   if (ferror(fp)) { | 
 | 223 |     return false; | 
 | 224 |   } | 
 | 225 |   return size == 0 || feof(fp); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 226 | } | 
 | 227 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 228 | // Opens a file |path| for reading and appends its the contents to a container | 
 | 229 | // |out_p|. Starts reading the file from |offset|. If |offset| is beyond the end | 
 | 230 | // of the file, returns success. If |size| is not -1, reads up to |size| bytes. | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 231 | template <class T> | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 232 | static bool ReadFileChunkAndAppend(const string& path, | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 233 |                                    off_t offset, | 
 | 234 |                                    off_t size, | 
 | 235 |                                    T* out_p) { | 
 | 236 |   CHECK_GE(offset, 0); | 
 | 237 |   CHECK(size == -1 || size >= 0); | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 238 |   base::ScopedFILE fp(fopen(path.c_str(), "r")); | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 239 |   if (!fp.get()) | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 240 |     return false; | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 241 |   if (offset) { | 
 | 242 |     // Return success without appending any data if a chunk beyond the end of | 
 | 243 |     // the file is requested. | 
 | 244 |     if (offset >= FileSize(path)) { | 
 | 245 |       return true; | 
 | 246 |     } | 
 | 247 |     TEST_AND_RETURN_FALSE_ERRNO(fseek(fp.get(), offset, SEEK_SET) == 0); | 
 | 248 |   } | 
 | 249 |   return Read(fp.get(), size, out_p); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 250 | } | 
 | 251 |  | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 252 | // Invokes a pipe |cmd|, then uses |append_func| to append its stdout to a | 
 | 253 | // container |out_p|. | 
 | 254 | template <class T> | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 255 | static bool ReadPipeAndAppend(const string& cmd, T* out_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 256 |   FILE* fp = popen(cmd.c_str(), "r"); | 
 | 257 |   if (!fp) | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 258 |     return false; | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 259 |   bool success = Read(fp, -1, out_p); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 260 |   return (success && pclose(fp) >= 0); | 
 | 261 | } | 
 | 262 |  | 
 | 263 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 264 | bool ReadFile(const string& path, vector<char>* out_p) { | 
 | 265 |   return ReadFileChunkAndAppend(path, 0, -1, out_p); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 266 | } | 
 | 267 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 268 | bool ReadFile(const string& path, string* out_p) { | 
 | 269 |   return ReadFileChunkAndAppend(path, 0, -1, out_p); | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 270 | } | 
 | 271 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 272 | bool ReadFileChunk(const string& path, off_t offset, off_t size, | 
 | 273 |                    vector<char>* out_p) { | 
 | 274 |   return ReadFileChunkAndAppend(path, offset, size, out_p); | 
 | 275 | } | 
 | 276 |  | 
 | 277 | bool ReadPipe(const string& cmd, vector<char>* out_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 278 |   return ReadPipeAndAppend(cmd, out_p); | 
 | 279 | } | 
 | 280 |  | 
| Darin Petkov | 8e447e0 | 2013-04-16 16:23:50 +0200 | [diff] [blame] | 281 | bool ReadPipe(const string& cmd, string* out_p) { | 
| Gilad Arnold | 19a45f0 | 2012-07-19 12:36:10 -0700 | [diff] [blame] | 282 |   return ReadPipeAndAppend(cmd, out_p); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 283 | } | 
 | 284 |  | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 285 | off_t BlockDevSize(int fd) { | 
 | 286 |   uint64_t dev_size; | 
 | 287 |   int rc = ioctl(fd, BLKGETSIZE64, &dev_size); | 
 | 288 |   if (rc == -1) { | 
 | 289 |     dev_size = -1; | 
 | 290 |     PLOG(ERROR) << "Error running ioctl(BLKGETSIZE64) on " << fd; | 
 | 291 |   } | 
 | 292 |   return dev_size; | 
 | 293 | } | 
 | 294 |  | 
 | 295 | off_t BlockDevSize(const string& path) { | 
 | 296 |   int fd = open(path.c_str(), O_RDONLY | O_CLOEXEC); | 
 | 297 |   if (fd == -1) { | 
 | 298 |     PLOG(ERROR) << "Error opening " << path; | 
 | 299 |     return fd; | 
 | 300 |   } | 
 | 301 |  | 
 | 302 |   off_t dev_size = BlockDevSize(fd); | 
 | 303 |   if (dev_size == -1) | 
 | 304 |     PLOG(ERROR) << "Error getting block device size on " << path; | 
 | 305 |  | 
 | 306 |   close(fd); | 
 | 307 |   return dev_size; | 
 | 308 | } | 
 | 309 |  | 
 | 310 | off_t FileSize(int fd) { | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 311 |   struct stat stbuf; | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 312 |   int rc = fstat(fd, &stbuf); | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 313 |   CHECK_EQ(rc, 0); | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 314 |   if (rc < 0) { | 
 | 315 |     PLOG(ERROR) << "Error stat-ing " << fd; | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 316 |     return rc; | 
| Gabe Black | b92cd2e | 2014-09-08 02:47:41 -0700 | [diff] [blame] | 317 |   } | 
 | 318 |   if (S_ISREG(stbuf.st_mode)) | 
 | 319 |     return stbuf.st_size; | 
 | 320 |   if (S_ISBLK(stbuf.st_mode)) | 
 | 321 |     return BlockDevSize(fd); | 
 | 322 |   LOG(ERROR) << "Couldn't determine the type of " << fd; | 
 | 323 |   return -1; | 
 | 324 | } | 
 | 325 |  | 
 | 326 | off_t FileSize(const string& path) { | 
 | 327 |   int fd = open(path.c_str(), O_RDONLY | O_CLOEXEC); | 
 | 328 |   if (fd == -1) { | 
 | 329 |     PLOG(ERROR) << "Error opening " << path; | 
 | 330 |     return fd; | 
 | 331 |   } | 
 | 332 |   off_t size = FileSize(fd); | 
 | 333 |   if (size == -1) | 
 | 334 |     PLOG(ERROR) << "Error getting file size of " << path; | 
 | 335 |   close(fd); | 
 | 336 |   return size; | 
| Andrew de los Reyes | f4c7ef1 | 2010-04-30 10:37:00 -0700 | [diff] [blame] | 337 | } | 
 | 338 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 339 | void HexDumpArray(const unsigned char* const arr, const size_t length) { | 
 | 340 |   const unsigned char* const char_arr = | 
 | 341 |       reinterpret_cast<const unsigned char* const>(arr); | 
 | 342 |   LOG(INFO) << "Logging array of length: " << length; | 
 | 343 |   const unsigned int bytes_per_line = 16; | 
| Andrew de los Reyes | 08c4e27 | 2010-04-15 14:02:17 -0700 | [diff] [blame] | 344 |   for (uint32_t i = 0; i < length; i += bytes_per_line) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 345 |     const unsigned int bytes_remaining = length - i; | 
 | 346 |     const unsigned int bytes_per_this_line = min(bytes_per_line, | 
 | 347 |                                                  bytes_remaining); | 
 | 348 |     char header[100]; | 
 | 349 |     int r = snprintf(header, sizeof(header), "0x%08x : ", i); | 
 | 350 |     TEST_AND_RETURN(r == 13); | 
 | 351 |     string line = header; | 
 | 352 |     for (unsigned int j = 0; j < bytes_per_this_line; j++) { | 
 | 353 |       char buf[20]; | 
 | 354 |       unsigned char c = char_arr[i + j]; | 
 | 355 |       r = snprintf(buf, sizeof(buf), "%02x ", static_cast<unsigned int>(c)); | 
 | 356 |       TEST_AND_RETURN(r == 3); | 
 | 357 |       line += buf; | 
 | 358 |     } | 
 | 359 |     LOG(INFO) << line; | 
 | 360 |   } | 
 | 361 | } | 
 | 362 |  | 
 | 363 | namespace { | 
 | 364 | class ScopedDirCloser { | 
 | 365 |  public: | 
 | 366 |   explicit ScopedDirCloser(DIR** dir) : dir_(dir) {} | 
 | 367 |   ~ScopedDirCloser() { | 
 | 368 |     if (dir_ && *dir_) { | 
 | 369 |       int r = closedir(*dir_); | 
 | 370 |       TEST_AND_RETURN_ERRNO(r == 0); | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 371 |       *dir_ = nullptr; | 
 | 372 |       dir_ = nullptr; | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 373 |     } | 
 | 374 |   } | 
 | 375 |  private: | 
 | 376 |   DIR** dir_; | 
 | 377 | }; | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 378 | }  // namespace | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 379 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 380 | bool RecursiveUnlinkDir(const string& path) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 381 |   struct stat stbuf; | 
 | 382 |   int r = lstat(path.c_str(), &stbuf); | 
 | 383 |   TEST_AND_RETURN_FALSE_ERRNO((r == 0) || (errno == ENOENT)); | 
 | 384 |   if ((r < 0) && (errno == ENOENT)) | 
 | 385 |     // path request is missing. that's fine. | 
 | 386 |     return true; | 
 | 387 |   if (!S_ISDIR(stbuf.st_mode)) { | 
 | 388 |     TEST_AND_RETURN_FALSE_ERRNO((unlink(path.c_str()) == 0) || | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 389 |                                 (errno == ENOENT)); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 390 |     // success or path disappeared before we could unlink. | 
 | 391 |     return true; | 
 | 392 |   } | 
 | 393 |   { | 
 | 394 |     // We have a dir, unlink all children, then delete dir | 
 | 395 |     DIR *dir = opendir(path.c_str()); | 
 | 396 |     TEST_AND_RETURN_FALSE_ERRNO(dir); | 
 | 397 |     ScopedDirCloser dir_closer(&dir); | 
 | 398 |     struct dirent dir_entry; | 
 | 399 |     struct dirent *dir_entry_p; | 
 | 400 |     int err = 0; | 
 | 401 |     while ((err = readdir_r(dir, &dir_entry, &dir_entry_p)) == 0) { | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 402 |       if (dir_entry_p == nullptr) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 403 |         // end of stream reached | 
 | 404 |         break; | 
 | 405 |       } | 
 | 406 |       // Skip . and .. | 
 | 407 |       if (!strcmp(dir_entry_p->d_name, ".") || | 
 | 408 |           !strcmp(dir_entry_p->d_name, "..")) | 
 | 409 |         continue; | 
 | 410 |       TEST_AND_RETURN_FALSE(RecursiveUnlinkDir(path + "/" + | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 411 |                                                dir_entry_p->d_name)); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 412 |     } | 
 | 413 |     TEST_AND_RETURN_FALSE(err == 0); | 
 | 414 |   } | 
 | 415 |   // unlink dir | 
 | 416 |   TEST_AND_RETURN_FALSE_ERRNO((rmdir(path.c_str()) == 0) || (errno == ENOENT)); | 
 | 417 |   return true; | 
 | 418 | } | 
 | 419 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 420 | string GetDiskName(const string& partition_name) { | 
 | 421 |   string disk_name; | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 422 |   return SplitPartitionName(partition_name, &disk_name, nullptr) ? | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 423 |       disk_name : string(); | 
| Andrew de los Reyes | f971443 | 2010-05-04 10:21:23 -0700 | [diff] [blame] | 424 | } | 
 | 425 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 426 | int GetPartitionNumber(const string& partition_name) { | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 427 |   int partition_num = 0; | 
 | 428 |   return SplitPartitionName(partition_name, nullptr, &partition_num) ? | 
 | 429 |       partition_num : 0; | 
 | 430 | } | 
 | 431 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 432 | bool SplitPartitionName(const string& partition_name, | 
 | 433 |                         string* out_disk_name, | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 434 |                         int* out_partition_num) { | 
 | 435 |   if (!StringHasPrefix(partition_name, "/dev/")) { | 
 | 436 |     LOG(ERROR) << "Invalid partition device name: " << partition_name; | 
 | 437 |     return false; | 
| Andrew de los Reyes | f971443 | 2010-05-04 10:21:23 -0700 | [diff] [blame] | 438 |   } | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 439 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 440 |   size_t last_nondigit_pos = partition_name.find_last_not_of("0123456789"); | 
 | 441 |   if (last_nondigit_pos == string::npos || | 
 | 442 |       (last_nondigit_pos + 1) == partition_name.size()) { | 
 | 443 |     LOG(ERROR) << "Unable to parse partition device name: " << partition_name; | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 444 |     return false; | 
 | 445 |   } | 
 | 446 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 447 |   size_t partition_name_len = string::npos; | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 448 |   if (partition_name[last_nondigit_pos] == '_') { | 
 | 449 |     // NAND block devices have weird naming which could be something | 
 | 450 |     // like "/dev/ubiblock2_0". We discard "_0" in such a case. | 
 | 451 |     size_t prev_nondigit_pos = | 
 | 452 |         partition_name.find_last_not_of("0123456789", last_nondigit_pos - 1); | 
 | 453 |     if (prev_nondigit_pos == string::npos || | 
 | 454 |         (prev_nondigit_pos + 1) == last_nondigit_pos) { | 
 | 455 |       LOG(ERROR) << "Unable to parse partition device name: " << partition_name; | 
 | 456 |       return false; | 
 | 457 |     } | 
 | 458 |  | 
 | 459 |     partition_name_len = last_nondigit_pos - prev_nondigit_pos; | 
 | 460 |     last_nondigit_pos = prev_nondigit_pos; | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 461 |   } | 
 | 462 |  | 
 | 463 |   if (out_disk_name) { | 
 | 464 |     // Special case for MMC devices which have the following naming scheme: | 
 | 465 |     // mmcblk0p2 | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 466 |     size_t disk_name_len = last_nondigit_pos; | 
 | 467 |     if (partition_name[last_nondigit_pos] != 'p' || | 
 | 468 |         last_nondigit_pos == 0 || | 
 | 469 |         !isdigit(partition_name[last_nondigit_pos - 1])) { | 
 | 470 |       disk_name_len++; | 
 | 471 |     } | 
 | 472 |     *out_disk_name = partition_name.substr(0, disk_name_len); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 473 |   } | 
 | 474 |  | 
 | 475 |   if (out_partition_num) { | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 476 |     string partition_str = partition_name.substr(last_nondigit_pos + 1, | 
 | 477 |                                                  partition_name_len); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 478 |     *out_partition_num = atoi(partition_str.c_str()); | 
 | 479 |   } | 
 | 480 |   return true; | 
 | 481 | } | 
 | 482 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 483 | string MakePartitionName(const string& disk_name, int partition_num) { | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 484 |   if (!StringHasPrefix(disk_name, "/dev/")) { | 
 | 485 |     LOG(ERROR) << "Invalid disk name: " << disk_name; | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 486 |     return string(); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 487 |   } | 
 | 488 |  | 
 | 489 |   if (partition_num < 1) { | 
 | 490 |     LOG(ERROR) << "Invalid partition number: " << partition_num; | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 491 |     return string(); | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 492 |   } | 
 | 493 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 494 |   string partition_name = disk_name; | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 495 |   if (isdigit(partition_name.back())) { | 
 | 496 |     // Special case for devices with names ending with a digit. | 
 | 497 |     // Add "p" to separate the disk name from partition number, | 
 | 498 |     // e.g. "/dev/loop0p2" | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 499 |     partition_name += 'p'; | 
 | 500 |   } | 
 | 501 |  | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 502 |   partition_name += std::to_string(partition_num); | 
 | 503 |  | 
 | 504 |   if (StringHasPrefix(partition_name, "/dev/ubiblock")) { | 
 | 505 |     // Special case for UBI block devieces that have "_0" suffix. | 
 | 506 |     partition_name += "_0"; | 
 | 507 |   } | 
| Alex Vakulenko | 4f5b144 | 2014-02-21 12:19:44 -0800 | [diff] [blame] | 508 |   return partition_name; | 
| Andrew de los Reyes | f971443 | 2010-05-04 10:21:23 -0700 | [diff] [blame] | 509 | } | 
 | 510 |  | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 511 | string SysfsBlockDevice(const string& device) { | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 512 |   base::FilePath device_path(device); | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 513 |   if (device_path.DirName().value() != "/dev") { | 
 | 514 |     return ""; | 
 | 515 |   } | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 516 |   return base::FilePath("/sys/block").Append(device_path.BaseName()).value(); | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 517 | } | 
 | 518 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 519 | bool IsRemovableDevice(const string& device) { | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 520 |   string sysfs_block = SysfsBlockDevice(device); | 
 | 521 |   string removable; | 
 | 522 |   if (sysfs_block.empty() || | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 523 |       !base::ReadFileToString(base::FilePath(sysfs_block).Append("removable"), | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 524 |                               &removable)) { | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 525 |     return false; | 
 | 526 |   } | 
| Ben Chan | 736fcb5 | 2014-05-21 18:28:22 -0700 | [diff] [blame] | 527 |   base::TrimWhitespaceASCII(removable, base::TRIM_ALL, &removable); | 
| Darin Petkov | f74eb65 | 2010-08-04 12:08:38 -0700 | [diff] [blame] | 528 |   return removable == "1"; | 
 | 529 | } | 
 | 530 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 531 | string ErrnoNumberAsString(int err) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 532 |   char buf[100]; | 
 | 533 |   buf[0] = '\0'; | 
 | 534 |   return strerror_r(err, buf, sizeof(buf)); | 
 | 535 | } | 
 | 536 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 537 | string NormalizePath(const string& path, bool strip_trailing_slash) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 538 |   string ret; | 
 | 539 |   bool last_insert_was_slash = false; | 
 | 540 |   for (string::const_iterator it = path.begin(); it != path.end(); ++it) { | 
 | 541 |     if (*it == '/') { | 
 | 542 |       if (last_insert_was_slash) | 
 | 543 |         continue; | 
 | 544 |       last_insert_was_slash = true; | 
 | 545 |     } else { | 
 | 546 |       last_insert_was_slash = false; | 
 | 547 |     } | 
 | 548 |     ret.push_back(*it); | 
 | 549 |   } | 
 | 550 |   if (strip_trailing_slash && last_insert_was_slash) { | 
 | 551 |     string::size_type last_non_slash = ret.find_last_not_of('/'); | 
 | 552 |     if (last_non_slash != string::npos) { | 
 | 553 |       ret.resize(last_non_slash + 1); | 
 | 554 |     } else { | 
 | 555 |       ret = ""; | 
 | 556 |     } | 
 | 557 |   } | 
 | 558 |   return ret; | 
 | 559 | } | 
 | 560 |  | 
 | 561 | bool FileExists(const char* path) { | 
 | 562 |   struct stat stbuf; | 
 | 563 |   return 0 == lstat(path, &stbuf); | 
 | 564 | } | 
 | 565 |  | 
| Darin Petkov | 30291ed | 2010-11-12 10:23:06 -0800 | [diff] [blame] | 566 | bool IsSymlink(const char* path) { | 
 | 567 |   struct stat stbuf; | 
 | 568 |   return lstat(path, &stbuf) == 0 && S_ISLNK(stbuf.st_mode) != 0; | 
 | 569 | } | 
 | 570 |  | 
| Alex Deymo | 7dc4c50 | 2014-05-20 20:09:58 -0700 | [diff] [blame] | 571 | bool IsDir(const char* path) { | 
 | 572 |   struct stat stbuf; | 
 | 573 |   TEST_AND_RETURN_FALSE_ERRNO(lstat(path, &stbuf) == 0); | 
 | 574 |   return S_ISDIR(stbuf.st_mode); | 
 | 575 | } | 
 | 576 |  | 
| Gilad Arnold | d04f8e2 | 2014-01-09 13:13:40 -0800 | [diff] [blame] | 577 | // If |path| is absolute, or explicit relative to the current working directory, | 
 | 578 | // leaves it as is. Otherwise, if TMPDIR is defined in the environment and is | 
 | 579 | // non-empty, prepends it to |path|. Otherwise, prepends /tmp.  Returns the | 
 | 580 | // resulting path. | 
 | 581 | static const string PrependTmpdir(const string& path) { | 
 | 582 |   if (path[0] == '/' || StartsWithASCII(path, "./", true) || | 
 | 583 |       StartsWithASCII(path, "../", true)) | 
 | 584 |     return path; | 
 | 585 |  | 
 | 586 |   const char *tmpdir = getenv("TMPDIR"); | 
 | 587 |   const string prefix = (tmpdir && *tmpdir ? tmpdir : "/tmp"); | 
 | 588 |   return prefix + "/" + path; | 
 | 589 | } | 
 | 590 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 591 | bool MakeTempFile(const string& base_filename_template, | 
 | 592 |                   string* filename, | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 593 |                   int* fd) { | 
| Gilad Arnold | d04f8e2 | 2014-01-09 13:13:40 -0800 | [diff] [blame] | 594 |   const string filename_template = PrependTmpdir(base_filename_template); | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 595 |   DCHECK(filename || fd); | 
 | 596 |   vector<char> buf(filename_template.size() + 1); | 
 | 597 |   memcpy(&buf[0], filename_template.data(), filename_template.size()); | 
 | 598 |   buf[filename_template.size()] = '\0'; | 
| Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 599 |  | 
| Andrew de los Reyes | b10320d | 2010-03-31 16:44:44 -0700 | [diff] [blame] | 600 |   int mkstemp_fd = mkstemp(&buf[0]); | 
 | 601 |   TEST_AND_RETURN_FALSE_ERRNO(mkstemp_fd >= 0); | 
 | 602 |   if (filename) { | 
 | 603 |     *filename = &buf[0]; | 
 | 604 |   } | 
 | 605 |   if (fd) { | 
 | 606 |     *fd = mkstemp_fd; | 
 | 607 |   } else { | 
 | 608 |     close(mkstemp_fd); | 
 | 609 |   } | 
 | 610 |   return true; | 
 | 611 | } | 
 | 612 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 613 | bool MakeTempDirectory(const string& base_dirname_template, | 
 | 614 |                        string* dirname) { | 
| Gilad Arnold | d04f8e2 | 2014-01-09 13:13:40 -0800 | [diff] [blame] | 615 |   const string dirname_template = PrependTmpdir(base_dirname_template); | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 616 |   DCHECK(dirname); | 
 | 617 |   vector<char> buf(dirname_template.size() + 1); | 
 | 618 |   memcpy(&buf[0], dirname_template.data(), dirname_template.size()); | 
 | 619 |   buf[dirname_template.size()] = '\0'; | 
| Darin Petkov | 296889c | 2010-07-23 16:20:54 -0700 | [diff] [blame] | 620 |  | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 621 |   char* return_code = mkdtemp(&buf[0]); | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 622 |   TEST_AND_RETURN_FALSE_ERRNO(return_code != nullptr); | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 623 |   *dirname = &buf[0]; | 
 | 624 |   return true; | 
 | 625 | } | 
 | 626 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 627 | bool StringHasSuffix(const string& str, const string& suffix) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 628 |   if (suffix.size() > str.size()) | 
 | 629 |     return false; | 
 | 630 |   return 0 == str.compare(str.size() - suffix.size(), suffix.size(), suffix); | 
 | 631 | } | 
 | 632 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 633 | bool StringHasPrefix(const string& str, const string& prefix) { | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 634 |   if (prefix.size() > str.size()) | 
 | 635 |     return false; | 
 | 636 |   return 0 == str.compare(0, prefix.size(), prefix); | 
 | 637 | } | 
 | 638 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 639 | bool MountFilesystem(const string& device, | 
| Andrew de los Reyes | 09e56d6 | 2010-04-23 13:45:53 -0700 | [diff] [blame] | 640 |                      const string& mountpoint, | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 641 |                      unsigned long mountflags) {  // NOLINT(runtime/int) | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 642 |   int rc = mount(device.c_str(), mountpoint.c_str(), "ext3", mountflags, | 
 | 643 |                  nullptr); | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 644 |   if (rc < 0) { | 
 | 645 |     string msg = ErrnoNumberAsString(errno); | 
 | 646 |     LOG(ERROR) << "Unable to mount destination device: " << msg << ". " | 
 | 647 |                << device << " on " << mountpoint; | 
 | 648 |     return false; | 
 | 649 |   } | 
 | 650 |   return true; | 
 | 651 | } | 
 | 652 |  | 
 | 653 | bool UnmountFilesystem(const string& mountpoint) { | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 654 |   for (int num_retries = 0; ; ++num_retries) { | 
 | 655 |     if (umount(mountpoint.c_str()) == 0) | 
 | 656 |       break; | 
 | 657 |  | 
 | 658 |     TEST_AND_RETURN_FALSE_ERRNO(errno == EBUSY && | 
 | 659 |                                 num_retries < kUnmountMaxNumOfRetries); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 660 |     g_usleep(kUnmountRetryIntervalInMicroseconds); | 
| Ben Chan | 77a1eba | 2012-10-07 22:54:55 -0700 | [diff] [blame] | 661 |   } | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 662 |   return true; | 
 | 663 | } | 
 | 664 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 665 | bool GetFilesystemSize(const string& device, | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 666 |                        int* out_block_count, | 
 | 667 |                        int* out_block_size) { | 
 | 668 |   int fd = HANDLE_EINTR(open(device.c_str(), O_RDONLY)); | 
| Alex Deymo | e7141c6 | 2014-10-17 14:03:01 -0700 | [diff] [blame] | 669 |   TEST_AND_RETURN_FALSE_ERRNO(fd >= 0); | 
| Darin Petkov | d3f8c89 | 2010-10-12 21:38:45 -0700 | [diff] [blame] | 670 |   ScopedFdCloser fd_closer(&fd); | 
 | 671 |   return GetFilesystemSizeFromFD(fd, out_block_count, out_block_size); | 
 | 672 | } | 
 | 673 |  | 
 | 674 | bool GetFilesystemSizeFromFD(int fd, | 
 | 675 |                              int* out_block_count, | 
 | 676 |                              int* out_block_size) { | 
 | 677 |   TEST_AND_RETURN_FALSE(fd >= 0); | 
 | 678 |  | 
 | 679 |   // Determine the ext3 filesystem size by directly reading the block count and | 
 | 680 |   // block size information from the superblock. See include/linux/ext3_fs.h for | 
 | 681 |   // more details on the structure. | 
 | 682 |   ssize_t kBufferSize = 16 * sizeof(uint32_t); | 
 | 683 |   char buffer[kBufferSize]; | 
 | 684 |   const int kSuperblockOffset = 1024; | 
 | 685 |   if (HANDLE_EINTR(pread(fd, buffer, kBufferSize, kSuperblockOffset)) != | 
 | 686 |       kBufferSize) { | 
 | 687 |     PLOG(ERROR) << "Unable to determine file system size:"; | 
 | 688 |     return false; | 
 | 689 |   } | 
 | 690 |   uint32_t block_count;  // ext3_fs.h: ext3_super_block.s_blocks_count | 
 | 691 |   uint32_t log_block_size;  // ext3_fs.h: ext3_super_block.s_log_block_size | 
 | 692 |   uint16_t magic;  // ext3_fs.h: ext3_super_block.s_magic | 
 | 693 |   memcpy(&block_count, &buffer[1 * sizeof(int32_t)], sizeof(block_count)); | 
 | 694 |   memcpy(&log_block_size, &buffer[6 * sizeof(int32_t)], sizeof(log_block_size)); | 
 | 695 |   memcpy(&magic, &buffer[14 * sizeof(int32_t)], sizeof(magic)); | 
 | 696 |   block_count = le32toh(block_count); | 
 | 697 |   const int kExt3MinBlockLogSize = 10;  // ext3_fs.h: EXT3_MIN_BLOCK_LOG_SIZE | 
 | 698 |   log_block_size = le32toh(log_block_size) + kExt3MinBlockLogSize; | 
 | 699 |   magic = le16toh(magic); | 
 | 700 |  | 
 | 701 |   // Sanity check the parameters. | 
 | 702 |   const uint16_t kExt3SuperMagic = 0xef53;  // ext3_fs.h: EXT3_SUPER_MAGIC | 
 | 703 |   TEST_AND_RETURN_FALSE(magic == kExt3SuperMagic); | 
 | 704 |   const int kExt3MinBlockSize = 1024;  // ext3_fs.h: EXT3_MIN_BLOCK_SIZE | 
 | 705 |   const int kExt3MaxBlockSize = 4096;  // ext3_fs.h: EXT3_MAX_BLOCK_SIZE | 
 | 706 |   int block_size = 1 << log_block_size; | 
 | 707 |   TEST_AND_RETURN_FALSE(block_size >= kExt3MinBlockSize && | 
 | 708 |                         block_size <= kExt3MaxBlockSize); | 
 | 709 |   TEST_AND_RETURN_FALSE(block_count > 0); | 
 | 710 |  | 
 | 711 |   if (out_block_count) { | 
 | 712 |     *out_block_count = block_count; | 
 | 713 |   } | 
 | 714 |   if (out_block_size) { | 
 | 715 |     *out_block_size = block_size; | 
 | 716 |   } | 
 | 717 |   return true; | 
 | 718 | } | 
 | 719 |  | 
| Alex Deymo | 719bfff | 2014-07-11 12:12:32 -0700 | [diff] [blame] | 720 | string GetPathOnBoard(const string& command) { | 
 | 721 |   int return_code = 0; | 
 | 722 |   string command_path; | 
 | 723 |   // TODO(deymo): prepend SYSROOT to each PATH instead of the result. | 
 | 724 |   if (!Subprocess::SynchronousExec( | 
 | 725 |       {"which", command}, &return_code, &command_path)) { | 
 | 726 |     return command; | 
 | 727 |   } | 
 | 728 |   if (return_code != 0) | 
 | 729 |     return command; | 
 | 730 |  | 
 | 731 |   base::TrimWhitespaceASCII(command_path, base::TRIM_ALL, &command_path); | 
 | 732 |   const char* env_sysroot = getenv("SYSROOT"); | 
 | 733 |   if (env_sysroot) { | 
 | 734 |     string sysroot_command_path = env_sysroot + command_path; | 
 | 735 |     if (utils::FileExists(sysroot_command_path.c_str())) | 
 | 736 |       return sysroot_command_path; | 
 | 737 |   } | 
 | 738 |   return command_path; | 
 | 739 | } | 
 | 740 |  | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 741 | // Tries to parse the header of an ELF file to obtain a human-readable | 
 | 742 | // description of it on the |output| string. | 
 | 743 | static bool GetFileFormatELF(const char* buffer, size_t size, string* output) { | 
 | 744 |   // 0x00: EI_MAG - ELF magic header, 4 bytes. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 745 |   if (size < SELFMAG || memcmp(buffer, ELFMAG, SELFMAG) != 0) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 746 |     return false; | 
 | 747 |   *output = "ELF"; | 
 | 748 |  | 
 | 749 |   // 0x04: EI_CLASS, 1 byte. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 750 |   if (size < EI_CLASS + 1) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 751 |     return true; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 752 |   switch (buffer[EI_CLASS]) { | 
 | 753 |     case ELFCLASS32: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 754 |       *output += " 32-bit"; | 
 | 755 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 756 |     case ELFCLASS64: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 757 |       *output += " 64-bit"; | 
 | 758 |       break; | 
 | 759 |     default: | 
 | 760 |       *output += " ?-bit"; | 
 | 761 |   } | 
 | 762 |  | 
 | 763 |   // 0x05: EI_DATA, endianness, 1 byte. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 764 |   if (size < EI_DATA + 1) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 765 |     return true; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 766 |   char ei_data = buffer[EI_DATA]; | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 767 |   switch (ei_data) { | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 768 |     case ELFDATA2LSB: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 769 |       *output += " little-endian"; | 
 | 770 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 771 |     case ELFDATA2MSB: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 772 |       *output += " big-endian"; | 
 | 773 |       break; | 
 | 774 |     default: | 
 | 775 |       *output += " ?-endian"; | 
 | 776 |       // Don't parse anything after the 0x10 offset if endianness is unknown. | 
 | 777 |       return true; | 
 | 778 |   } | 
 | 779 |  | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 780 |   const Elf32_Ehdr* hdr = reinterpret_cast<const Elf32_Ehdr*>(buffer); | 
 | 781 |   // 0x12: e_machine, 2 byte endianness based on ei_data. The position (0x12) | 
 | 782 |   // and size is the same for both 32 and 64 bits. | 
 | 783 |   if (size < offsetof(Elf32_Ehdr, e_machine) + sizeof(hdr->e_machine)) | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 784 |     return true; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 785 |   uint16_t e_machine; | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 786 |   // Fix endianess regardless of the host endianess. | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 787 |   if (ei_data == ELFDATA2LSB) | 
 | 788 |     e_machine = le16toh(hdr->e_machine); | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 789 |   else | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 790 |     e_machine = be16toh(hdr->e_machine); | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 791 |  | 
 | 792 |   switch (e_machine) { | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 793 |     case EM_386: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 794 |       *output += " x86"; | 
 | 795 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 796 |     case EM_MIPS: | 
 | 797 |       *output += " mips"; | 
 | 798 |       break; | 
 | 799 |     case EM_ARM: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 800 |       *output += " arm"; | 
 | 801 |       break; | 
| Alex Deymo | c1711e2 | 2014-08-08 13:16:23 -0700 | [diff] [blame] | 802 |     case EM_X86_64: | 
| Alex Deymo | 032e772 | 2014-03-25 17:53:56 -0700 | [diff] [blame] | 803 |       *output += " x86-64"; | 
 | 804 |       break; | 
 | 805 |     default: | 
 | 806 |       *output += " unknown-arch"; | 
 | 807 |   } | 
 | 808 |   return true; | 
 | 809 | } | 
 | 810 |  | 
 | 811 | string GetFileFormat(const string& path) { | 
 | 812 |   vector<char> buffer; | 
 | 813 |   if (!ReadFileChunkAndAppend(path, 0, kGetFileFormatMaxHeaderSize, &buffer)) | 
 | 814 |     return "File not found."; | 
 | 815 |  | 
 | 816 |   string result; | 
 | 817 |   if (GetFileFormatELF(buffer.data(), buffer.size(), &result)) | 
 | 818 |     return result; | 
 | 819 |  | 
 | 820 |   return "data"; | 
 | 821 | } | 
 | 822 |  | 
| Andrew de los Reyes | f971443 | 2010-05-04 10:21:23 -0700 | [diff] [blame] | 823 | bool GetBootloader(BootLoader* out_bootloader) { | 
 | 824 |   // For now, hardcode to syslinux. | 
 | 825 |   *out_bootloader = BootLoader_SYSLINUX; | 
 | 826 |   return true; | 
 | 827 | } | 
 | 828 |  | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 829 | namespace { | 
 | 830 | // Do the actual trigger. We do it as a main-loop callback to (try to) get a | 
 | 831 | // consistent stack trace. | 
 | 832 | gboolean TriggerCrashReporterUpload(void* unused) { | 
 | 833 |   pid_t pid = fork(); | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 834 |   CHECK_GE(pid, 0) << "fork failed";  // fork() failed. Something is very wrong. | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 835 |   if (pid == 0) { | 
 | 836 |     // We are the child. Crash. | 
 | 837 |     abort();  // never returns | 
 | 838 |   } | 
 | 839 |   // We are the parent. Wait for child to terminate. | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 840 |   pid_t result = waitpid(pid, nullptr, 0); | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 841 |   LOG_IF(ERROR, result < 0) << "waitpid() failed"; | 
 | 842 |   return FALSE;  // Don't call this callback again | 
 | 843 | } | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 844 | }  // namespace | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 845 |  | 
 | 846 | void ScheduleCrashReporterUpload() { | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 847 |   g_idle_add(&TriggerCrashReporterUpload, nullptr); | 
| Andrew de los Reyes | 712b3ac | 2011-01-07 13:47:52 -0800 | [diff] [blame] | 848 | } | 
 | 849 |  | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 850 | bool SetCpuShares(CpuShares shares) { | 
 | 851 |   string string_shares = base::IntToString(static_cast<int>(shares)); | 
 | 852 |   string cpu_shares_file = string(utils::kCGroupDir) + "/cpu.shares"; | 
 | 853 |   LOG(INFO) << "Setting cgroup cpu shares to  " << string_shares; | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 854 |   if (utils::WriteFile(cpu_shares_file.c_str(), string_shares.c_str(), | 
 | 855 |                        string_shares.size())) { | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 856 |     return true; | 
 | 857 |   } else { | 
 | 858 |     LOG(ERROR) << "Failed to change cgroup cpu shares to "<< string_shares | 
 | 859 |                << " using " << cpu_shares_file; | 
 | 860 |     return false; | 
 | 861 |   } | 
| Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 862 | } | 
 | 863 |  | 
| Chris Sosa | 4f8ee27 | 2012-11-30 13:01:54 -0800 | [diff] [blame] | 864 | int CompareCpuShares(CpuShares shares_lhs, | 
 | 865 |                      CpuShares shares_rhs) { | 
 | 866 |   return static_cast<int>(shares_lhs) - static_cast<int>(shares_rhs); | 
| Darin Petkov | c6c135c | 2010-08-11 13:36:18 -0700 | [diff] [blame] | 867 | } | 
 | 868 |  | 
| Darin Petkov | 5c0a8af | 2010-08-24 13:39:13 -0700 | [diff] [blame] | 869 | int FuzzInt(int value, unsigned int range) { | 
 | 870 |   int min = value - range / 2; | 
 | 871 |   int max = value + range - range / 2; | 
 | 872 |   return base::RandInt(min, max); | 
 | 873 | } | 
 | 874 |  | 
| Andrew de los Reyes | f3ed8e7 | 2011-02-16 10:35:46 -0800 | [diff] [blame] | 875 | gboolean GlibRunClosure(gpointer data) { | 
| Alex Vakulenko | 4906c1c | 2014-08-21 13:17:44 -0700 | [diff] [blame] | 876 |   base::Closure* callback = reinterpret_cast<base::Closure*>(data); | 
| Andrew de los Reyes | f3ed8e7 | 2011-02-16 10:35:46 -0800 | [diff] [blame] | 877 |   callback->Run(); | 
 | 878 |   return FALSE; | 
 | 879 | } | 
 | 880 |  | 
| Alex Deymo | c4acdf4 | 2014-05-28 21:07:10 -0700 | [diff] [blame] | 881 | void GlibDestroyClosure(gpointer data) { | 
| Alex Vakulenko | 4906c1c | 2014-08-21 13:17:44 -0700 | [diff] [blame] | 882 |   delete reinterpret_cast<base::Closure*>(data); | 
| Alex Deymo | c4acdf4 | 2014-05-28 21:07:10 -0700 | [diff] [blame] | 883 | } | 
 | 884 |  | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 885 | string FormatSecs(unsigned secs) { | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 886 |   return FormatTimeDelta(TimeDelta::FromSeconds(secs)); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 887 | } | 
 | 888 |  | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 889 | string FormatTimeDelta(TimeDelta delta) { | 
| David Zeuthen | 973449e | 2014-08-18 16:18:23 -0400 | [diff] [blame] | 890 |   string str; | 
 | 891 |  | 
 | 892 |   // Handle negative durations by prefixing with a minus. | 
 | 893 |   if (delta.ToInternalValue() < 0) { | 
 | 894 |     delta *= -1; | 
 | 895 |     str = "-"; | 
 | 896 |   } | 
 | 897 |  | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 898 |   // Canonicalize into days, hours, minutes, seconds and microseconds. | 
 | 899 |   unsigned days = delta.InDays(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 900 |   delta -= TimeDelta::FromDays(days); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 901 |   unsigned hours = delta.InHours(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 902 |   delta -= TimeDelta::FromHours(hours); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 903 |   unsigned mins = delta.InMinutes(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 904 |   delta -= TimeDelta::FromMinutes(mins); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 905 |   unsigned secs = delta.InSeconds(); | 
| Gilad Arnold | 8e3f126 | 2013-01-08 14:59:54 -0800 | [diff] [blame] | 906 |   delta -= TimeDelta::FromSeconds(secs); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 907 |   unsigned usecs = delta.InMicroseconds(); | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 908 |  | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 909 |   if (days) | 
 | 910 |     base::StringAppendF(&str, "%ud", days); | 
 | 911 |   if (days || hours) | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 912 |     base::StringAppendF(&str, "%uh", hours); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 913 |   if (days || hours || mins) | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 914 |     base::StringAppendF(&str, "%um", mins); | 
| Gilad Arnold | d7b513d | 2012-05-10 14:25:27 -0700 | [diff] [blame] | 915 |   base::StringAppendF(&str, "%u", secs); | 
 | 916 |   if (usecs) { | 
 | 917 |     int width = 6; | 
 | 918 |     while ((usecs / 10) * 10 == usecs) { | 
 | 919 |       usecs /= 10; | 
 | 920 |       width--; | 
 | 921 |     } | 
 | 922 |     base::StringAppendF(&str, ".%0*u", width, usecs); | 
 | 923 |   } | 
 | 924 |   base::StringAppendF(&str, "s"); | 
| Gilad Arnold | 1ebd813 | 2012-03-05 10:19:29 -0800 | [diff] [blame] | 925 |   return str; | 
 | 926 | } | 
 | 927 |  | 
| Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 928 | string ToString(const Time utc_time) { | 
 | 929 |   Time::Exploded exp_time; | 
 | 930 |   utc_time.UTCExplode(&exp_time); | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 931 |   return base::StringPrintf("%d/%d/%d %d:%02d:%02d GMT", | 
| Jay Srinivasan | 480ddfa | 2012-06-01 19:15:26 -0700 | [diff] [blame] | 932 |                       exp_time.month, | 
 | 933 |                       exp_time.day_of_month, | 
 | 934 |                       exp_time.year, | 
 | 935 |                       exp_time.hour, | 
 | 936 |                       exp_time.minute, | 
 | 937 |                       exp_time.second); | 
 | 938 | } | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 939 |  | 
| Jay Srinivasan | ae4697c | 2013-03-18 17:08:08 -0700 | [diff] [blame] | 940 | string ToString(bool b) { | 
 | 941 |   return (b ? "true" : "false"); | 
 | 942 | } | 
 | 943 |  | 
| Alex Deymo | 1c656c4 | 2013-06-28 11:02:14 -0700 | [diff] [blame] | 944 | string ToString(DownloadSource source) { | 
| Jay Srinivasan | 19409b7 | 2013-04-12 19:23:36 -0700 | [diff] [blame] | 945 |   switch (source) { | 
 | 946 |     case kDownloadSourceHttpsServer: return "HttpsServer"; | 
 | 947 |     case kDownloadSourceHttpServer:  return "HttpServer"; | 
| David Zeuthen | bb8bdc7 | 2013-09-03 13:43:48 -0700 | [diff] [blame] | 948 |     case kDownloadSourceHttpPeer:    return "HttpPeer"; | 
| Jay Srinivasan | 19409b7 | 2013-04-12 19:23:36 -0700 | [diff] [blame] | 949 |     case kNumDownloadSources:        return "Unknown"; | 
 | 950 |     // Don't add a default case to let the compiler warn about newly added | 
 | 951 |     // download sources which should be added here. | 
 | 952 |   } | 
 | 953 |  | 
 | 954 |   return "Unknown"; | 
 | 955 | } | 
 | 956 |  | 
| Alex Deymo | 1c656c4 | 2013-06-28 11:02:14 -0700 | [diff] [blame] | 957 | string ToString(PayloadType payload_type) { | 
 | 958 |   switch (payload_type) { | 
 | 959 |     case kPayloadTypeDelta:      return "Delta"; | 
 | 960 |     case kPayloadTypeFull:       return "Full"; | 
 | 961 |     case kPayloadTypeForcedFull: return "ForcedFull"; | 
 | 962 |     case kNumPayloadTypes:       return "Unknown"; | 
 | 963 |     // Don't add a default case to let the compiler warn about newly added | 
 | 964 |     // payload types which should be added here. | 
 | 965 |   } | 
 | 966 |  | 
 | 967 |   return "Unknown"; | 
 | 968 | } | 
 | 969 |  | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 970 | ErrorCode GetBaseErrorCode(ErrorCode code) { | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 971 |   // Ignore the higher order bits in the code by applying the mask as | 
 | 972 |   // we want the enumerations to be in the small contiguous range | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 973 |   // with values less than ErrorCode::kUmaReportedMax. | 
 | 974 |   ErrorCode base_code = static_cast<ErrorCode>( | 
 | 975 |       static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags)); | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 976 |  | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 977 |   // Make additional adjustments required for UMA and error classification. | 
 | 978 |   // TODO(jaysri): Move this logic to UeErrorCode.cc when we fix | 
 | 979 |   // chromium-os:34369. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 980 |   if (base_code >= ErrorCode::kOmahaRequestHTTPResponseBase) { | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 981 |     // Since we want to keep the enums to a small value, aggregate all HTTP | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 982 |     // errors into this one bucket for UMA and error classification purposes. | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 983 |     LOG(INFO) << "Converting error code " << base_code | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 984 |               << " to ErrorCode::kOmahaErrorInHTTPResponse"; | 
 | 985 |     base_code = ErrorCode::kOmahaErrorInHTTPResponse; | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 986 |   } | 
 | 987 |  | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 988 |   return base_code; | 
 | 989 | } | 
 | 990 |  | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 991 | metrics::AttemptResult GetAttemptResult(ErrorCode code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 992 |   ErrorCode base_code = static_cast<ErrorCode>( | 
 | 993 |       static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags)); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 994 |  | 
 | 995 |   switch (base_code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 996 |     case ErrorCode::kSuccess: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 997 |       return metrics::AttemptResult::kUpdateSucceeded; | 
 | 998 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 999 |     case ErrorCode::kDownloadTransferError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1000 |       return metrics::AttemptResult::kPayloadDownloadError; | 
 | 1001 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1002 |     case ErrorCode::kDownloadInvalidMetadataSize: | 
 | 1003 |     case ErrorCode::kDownloadInvalidMetadataMagicString: | 
 | 1004 |     case ErrorCode::kDownloadMetadataSignatureError: | 
 | 1005 |     case ErrorCode::kDownloadMetadataSignatureVerificationError: | 
 | 1006 |     case ErrorCode::kPayloadMismatchedType: | 
 | 1007 |     case ErrorCode::kUnsupportedMajorPayloadVersion: | 
 | 1008 |     case ErrorCode::kUnsupportedMinorPayloadVersion: | 
 | 1009 |     case ErrorCode::kDownloadNewPartitionInfoError: | 
 | 1010 |     case ErrorCode::kDownloadSignatureMissingInManifest: | 
 | 1011 |     case ErrorCode::kDownloadManifestParseError: | 
 | 1012 |     case ErrorCode::kDownloadOperationHashMissingError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1013 |       return metrics::AttemptResult::kMetadataMalformed; | 
 | 1014 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1015 |     case ErrorCode::kDownloadOperationHashMismatch: | 
 | 1016 |     case ErrorCode::kDownloadOperationHashVerificationError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1017 |       return metrics::AttemptResult::kOperationMalformed; | 
 | 1018 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1019 |     case ErrorCode::kDownloadOperationExecutionError: | 
 | 1020 |     case ErrorCode::kInstallDeviceOpenError: | 
 | 1021 |     case ErrorCode::kKernelDeviceOpenError: | 
 | 1022 |     case ErrorCode::kDownloadWriteError: | 
 | 1023 |     case ErrorCode::kFilesystemCopierError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1024 |       return metrics::AttemptResult::kOperationExecutionError; | 
 | 1025 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1026 |     case ErrorCode::kDownloadMetadataSignatureMismatch: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1027 |       return metrics::AttemptResult::kMetadataVerificationFailed; | 
 | 1028 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1029 |     case ErrorCode::kPayloadSizeMismatchError: | 
 | 1030 |     case ErrorCode::kPayloadHashMismatchError: | 
 | 1031 |     case ErrorCode::kDownloadPayloadVerificationError: | 
 | 1032 |     case ErrorCode::kSignedDeltaPayloadExpectedError: | 
 | 1033 |     case ErrorCode::kDownloadPayloadPubKeyVerificationError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1034 |       return metrics::AttemptResult::kPayloadVerificationFailed; | 
 | 1035 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1036 |     case ErrorCode::kNewRootfsVerificationError: | 
 | 1037 |     case ErrorCode::kNewKernelVerificationError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1038 |       return metrics::AttemptResult::kVerificationFailed; | 
 | 1039 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1040 |     case ErrorCode::kPostinstallRunnerError: | 
 | 1041 |     case ErrorCode::kPostinstallBootedFromFirmwareB: | 
 | 1042 |     case ErrorCode::kPostinstallFirmwareRONotUpdatable: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1043 |       return metrics::AttemptResult::kPostInstallFailed; | 
 | 1044 |  | 
 | 1045 |     // We should never get these errors in the update-attempt stage so | 
 | 1046 |     // return internal error if this happens. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1047 |     case ErrorCode::kError: | 
 | 1048 |     case ErrorCode::kOmahaRequestXMLParseError: | 
 | 1049 |     case ErrorCode::kOmahaRequestError: | 
 | 1050 |     case ErrorCode::kOmahaResponseHandlerError: | 
 | 1051 |     case ErrorCode::kDownloadStateInitializationError: | 
 | 1052 |     case ErrorCode::kOmahaRequestEmptyResponseError: | 
 | 1053 |     case ErrorCode::kDownloadInvalidMetadataSignature: | 
 | 1054 |     case ErrorCode::kOmahaResponseInvalid: | 
 | 1055 |     case ErrorCode::kOmahaUpdateIgnoredPerPolicy: | 
 | 1056 |     case ErrorCode::kOmahaUpdateDeferredPerPolicy: | 
 | 1057 |     case ErrorCode::kOmahaErrorInHTTPResponse: | 
 | 1058 |     case ErrorCode::kDownloadMetadataSignatureMissingError: | 
 | 1059 |     case ErrorCode::kOmahaUpdateDeferredForBackoff: | 
 | 1060 |     case ErrorCode::kPostinstallPowerwashError: | 
 | 1061 |     case ErrorCode::kUpdateCanceledByChannelChange: | 
| David Zeuthen | f3e2801 | 2014-08-26 18:23:52 -0400 | [diff] [blame] | 1062 |     case ErrorCode::kOmahaRequestXMLHasEntityDecl: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1063 |       return metrics::AttemptResult::kInternalError; | 
 | 1064 |  | 
 | 1065 |     // Special flags. These can't happen (we mask them out above) but | 
 | 1066 |     // the compiler doesn't know that. Just break out so we can warn and | 
 | 1067 |     // return |kInternalError|. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1068 |     case ErrorCode::kUmaReportedMax: | 
 | 1069 |     case ErrorCode::kOmahaRequestHTTPResponseBase: | 
 | 1070 |     case ErrorCode::kDevModeFlag: | 
 | 1071 |     case ErrorCode::kResumedFlag: | 
 | 1072 |     case ErrorCode::kTestImageFlag: | 
 | 1073 |     case ErrorCode::kTestOmahaUrlFlag: | 
 | 1074 |     case ErrorCode::kSpecialFlags: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1075 |       break; | 
 | 1076 |   } | 
 | 1077 |  | 
 | 1078 |   LOG(ERROR) << "Unexpected error code " << base_code; | 
 | 1079 |   return metrics::AttemptResult::kInternalError; | 
 | 1080 | } | 
 | 1081 |  | 
 | 1082 |  | 
 | 1083 | metrics::DownloadErrorCode GetDownloadErrorCode(ErrorCode code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1084 |   ErrorCode base_code = static_cast<ErrorCode>( | 
 | 1085 |       static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags)); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1086 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1087 |   if (base_code >= ErrorCode::kOmahaRequestHTTPResponseBase) { | 
 | 1088 |     int http_status = | 
 | 1089 |         static_cast<int>(base_code) - | 
 | 1090 |         static_cast<int>(ErrorCode::kOmahaRequestHTTPResponseBase); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1091 |     if (http_status >= 200 && http_status <= 599) { | 
 | 1092 |       return static_cast<metrics::DownloadErrorCode>( | 
 | 1093 |           static_cast<int>(metrics::DownloadErrorCode::kHttpStatus200) + | 
 | 1094 |           http_status - 200); | 
 | 1095 |     } else if (http_status == 0) { | 
 | 1096 |       // The code is using HTTP Status 0 for "Unable to get http | 
 | 1097 |       // response code." | 
 | 1098 |       return metrics::DownloadErrorCode::kDownloadError; | 
 | 1099 |     } | 
 | 1100 |     LOG(WARNING) << "Unexpected HTTP status code " << http_status; | 
 | 1101 |     return metrics::DownloadErrorCode::kHttpStatusOther; | 
 | 1102 |   } | 
 | 1103 |  | 
 | 1104 |   switch (base_code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1105 |     // Unfortunately, ErrorCode::kDownloadTransferError is returned for a wide | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1106 |     // variety of errors (proxy errors, host not reachable, timeouts etc.). | 
 | 1107 |     // | 
 | 1108 |     // For now just map that to kDownloading. See http://crbug.com/355745 | 
 | 1109 |     // for how we plan to add more detail in the future. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1110 |     case ErrorCode::kDownloadTransferError: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1111 |       return metrics::DownloadErrorCode::kDownloadError; | 
 | 1112 |  | 
 | 1113 |     // All of these error codes are not related to downloading so break | 
 | 1114 |     // out so we can warn and return InputMalformed. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1115 |     case ErrorCode::kSuccess: | 
 | 1116 |     case ErrorCode::kError: | 
 | 1117 |     case ErrorCode::kOmahaRequestError: | 
 | 1118 |     case ErrorCode::kOmahaResponseHandlerError: | 
 | 1119 |     case ErrorCode::kFilesystemCopierError: | 
 | 1120 |     case ErrorCode::kPostinstallRunnerError: | 
 | 1121 |     case ErrorCode::kPayloadMismatchedType: | 
 | 1122 |     case ErrorCode::kInstallDeviceOpenError: | 
 | 1123 |     case ErrorCode::kKernelDeviceOpenError: | 
 | 1124 |     case ErrorCode::kPayloadHashMismatchError: | 
 | 1125 |     case ErrorCode::kPayloadSizeMismatchError: | 
 | 1126 |     case ErrorCode::kDownloadPayloadVerificationError: | 
 | 1127 |     case ErrorCode::kDownloadNewPartitionInfoError: | 
 | 1128 |     case ErrorCode::kDownloadWriteError: | 
 | 1129 |     case ErrorCode::kNewRootfsVerificationError: | 
 | 1130 |     case ErrorCode::kNewKernelVerificationError: | 
 | 1131 |     case ErrorCode::kSignedDeltaPayloadExpectedError: | 
 | 1132 |     case ErrorCode::kDownloadPayloadPubKeyVerificationError: | 
 | 1133 |     case ErrorCode::kPostinstallBootedFromFirmwareB: | 
 | 1134 |     case ErrorCode::kDownloadStateInitializationError: | 
 | 1135 |     case ErrorCode::kDownloadInvalidMetadataMagicString: | 
 | 1136 |     case ErrorCode::kDownloadSignatureMissingInManifest: | 
 | 1137 |     case ErrorCode::kDownloadManifestParseError: | 
 | 1138 |     case ErrorCode::kDownloadMetadataSignatureError: | 
 | 1139 |     case ErrorCode::kDownloadMetadataSignatureVerificationError: | 
 | 1140 |     case ErrorCode::kDownloadMetadataSignatureMismatch: | 
 | 1141 |     case ErrorCode::kDownloadOperationHashVerificationError: | 
 | 1142 |     case ErrorCode::kDownloadOperationExecutionError: | 
 | 1143 |     case ErrorCode::kDownloadOperationHashMismatch: | 
 | 1144 |     case ErrorCode::kOmahaRequestEmptyResponseError: | 
 | 1145 |     case ErrorCode::kOmahaRequestXMLParseError: | 
 | 1146 |     case ErrorCode::kDownloadInvalidMetadataSize: | 
 | 1147 |     case ErrorCode::kDownloadInvalidMetadataSignature: | 
 | 1148 |     case ErrorCode::kOmahaResponseInvalid: | 
 | 1149 |     case ErrorCode::kOmahaUpdateIgnoredPerPolicy: | 
 | 1150 |     case ErrorCode::kOmahaUpdateDeferredPerPolicy: | 
 | 1151 |     case ErrorCode::kOmahaErrorInHTTPResponse: | 
 | 1152 |     case ErrorCode::kDownloadOperationHashMissingError: | 
 | 1153 |     case ErrorCode::kDownloadMetadataSignatureMissingError: | 
 | 1154 |     case ErrorCode::kOmahaUpdateDeferredForBackoff: | 
 | 1155 |     case ErrorCode::kPostinstallPowerwashError: | 
 | 1156 |     case ErrorCode::kUpdateCanceledByChannelChange: | 
 | 1157 |     case ErrorCode::kPostinstallFirmwareRONotUpdatable: | 
 | 1158 |     case ErrorCode::kUnsupportedMajorPayloadVersion: | 
 | 1159 |     case ErrorCode::kUnsupportedMinorPayloadVersion: | 
| David Zeuthen | f3e2801 | 2014-08-26 18:23:52 -0400 | [diff] [blame] | 1160 |     case ErrorCode::kOmahaRequestXMLHasEntityDecl: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1161 |       break; | 
 | 1162 |  | 
 | 1163 |     // Special flags. These can't happen (we mask them out above) but | 
 | 1164 |     // the compiler doesn't know that. Just break out so we can warn and | 
 | 1165 |     // return |kInputMalformed|. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1166 |     case ErrorCode::kUmaReportedMax: | 
 | 1167 |     case ErrorCode::kOmahaRequestHTTPResponseBase: | 
 | 1168 |     case ErrorCode::kDevModeFlag: | 
 | 1169 |     case ErrorCode::kResumedFlag: | 
 | 1170 |     case ErrorCode::kTestImageFlag: | 
 | 1171 |     case ErrorCode::kTestOmahaUrlFlag: | 
 | 1172 |     case ErrorCode::kSpecialFlags: | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1173 |       LOG(ERROR) << "Unexpected error code " << base_code; | 
 | 1174 |       break; | 
 | 1175 |   } | 
 | 1176 |  | 
 | 1177 |   return metrics::DownloadErrorCode::kInputMalformed; | 
 | 1178 | } | 
 | 1179 |  | 
| David Zeuthen | b281f07 | 2014-04-02 10:20:19 -0700 | [diff] [blame] | 1180 | metrics::ConnectionType GetConnectionType( | 
 | 1181 |     NetworkConnectionType type, | 
 | 1182 |     NetworkTethering tethering) { | 
 | 1183 |   switch (type) { | 
 | 1184 |     case kNetUnknown: | 
 | 1185 |       return metrics::ConnectionType::kUnknown; | 
 | 1186 |  | 
 | 1187 |     case kNetEthernet: | 
 | 1188 |       if (tethering == NetworkTethering::kConfirmed) | 
 | 1189 |         return metrics::ConnectionType::kTetheredEthernet; | 
 | 1190 |       else | 
 | 1191 |         return metrics::ConnectionType::kEthernet; | 
 | 1192 |  | 
 | 1193 |     case kNetWifi: | 
 | 1194 |       if (tethering == NetworkTethering::kConfirmed) | 
 | 1195 |         return metrics::ConnectionType::kTetheredWifi; | 
 | 1196 |       else | 
 | 1197 |         return metrics::ConnectionType::kWifi; | 
 | 1198 |  | 
 | 1199 |     case kNetWimax: | 
 | 1200 |       return metrics::ConnectionType::kWimax; | 
 | 1201 |  | 
 | 1202 |     case kNetBluetooth: | 
 | 1203 |       return metrics::ConnectionType::kBluetooth; | 
 | 1204 |  | 
 | 1205 |     case kNetCellular: | 
 | 1206 |       return metrics::ConnectionType::kCellular; | 
 | 1207 |   } | 
 | 1208 |  | 
 | 1209 |   LOG(ERROR) << "Unexpected network connection type: type=" << type | 
 | 1210 |              << ", tethering=" << static_cast<int>(tethering); | 
 | 1211 |  | 
 | 1212 |   return metrics::ConnectionType::kUnknown; | 
 | 1213 | } | 
 | 1214 |  | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1215 | // Returns a printable version of the various flags denoted in the higher order | 
 | 1216 | // bits of the given code. Returns an empty string if none of those bits are | 
 | 1217 | // set. | 
 | 1218 | string GetFlagNames(uint32_t code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1219 |   uint32_t flags = (static_cast<uint32_t>(code) & | 
 | 1220 |                     static_cast<uint32_t>(ErrorCode::kSpecialFlags)); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1221 |   string flag_names; | 
 | 1222 |   string separator = ""; | 
| Alex Vakulenko | d2779df | 2014-06-16 13:19:00 -0700 | [diff] [blame] | 1223 |   for (size_t i = 0; i < sizeof(flags) * 8; i++) { | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1224 |     uint32_t flag = flags & (1 << i); | 
 | 1225 |     if (flag) { | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1226 |       flag_names += separator + CodeToString(static_cast<ErrorCode>(flag)); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1227 |       separator = ", "; | 
 | 1228 |     } | 
 | 1229 |   } | 
| Jay Srinivasan | 2b5a0f0 | 2012-12-19 17:25:56 -0800 | [diff] [blame] | 1230 |  | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1231 |   return flag_names; | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 1232 | } | 
 | 1233 |  | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1234 | void SendErrorCodeToUma(SystemState* system_state, ErrorCode code) { | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1235 |   if (!system_state) | 
 | 1236 |     return; | 
 | 1237 |  | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1238 |   ErrorCode uma_error_code = GetBaseErrorCode(code); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1239 |  | 
 | 1240 |   // If the code doesn't have flags computed already, compute them now based on | 
 | 1241 |   // the state of the current update attempt. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1242 |   uint32_t flags = | 
 | 1243 |       static_cast<int>(code) & static_cast<int>(ErrorCode::kSpecialFlags); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1244 |   if (!flags) | 
 | 1245 |     flags = system_state->update_attempter()->GetErrorCodeFlags(); | 
 | 1246 |  | 
 | 1247 |   // Determine the UMA bucket depending on the flags. But, ignore the resumed | 
 | 1248 |   // flag, as it's perfectly normal for production devices to resume their | 
 | 1249 |   // downloads and so we want to record those cases also in NormalErrorCodes | 
 | 1250 |   // bucket. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1251 |   string metric = | 
 | 1252 |       flags & ~static_cast<uint32_t>(ErrorCode::kResumedFlag) ? | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1253 |       "Installer.DevModeErrorCodes" : "Installer.NormalErrorCodes"; | 
 | 1254 |  | 
 | 1255 |   LOG(INFO) << "Sending error code " << uma_error_code | 
 | 1256 |             << " (" << CodeToString(uma_error_code) << ")" | 
 | 1257 |             << " to UMA metric: " << metric | 
 | 1258 |             << ". Flags = " << (flags ? GetFlagNames(flags) : "None"); | 
 | 1259 |  | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1260 |   system_state->metrics_lib()->SendEnumToUMA( | 
 | 1261 |       metric, static_cast<int>(uma_error_code), | 
 | 1262 |       static_cast<int>(ErrorCode::kUmaReportedMax)); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1263 | } | 
 | 1264 |  | 
| David Zeuthen | a99981f | 2013-04-29 13:42:47 -0700 | [diff] [blame] | 1265 | string CodeToString(ErrorCode code) { | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1266 |   // If the given code has both parts (i.e. the error code part and the flags | 
 | 1267 |   // part) then strip off the flags part since the switch statement below | 
 | 1268 |   // has case statements only for the base error code or a single flag but | 
 | 1269 |   // doesn't support any combinations of those. | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1270 |   if ((static_cast<int>(code) & static_cast<int>(ErrorCode::kSpecialFlags)) && | 
 | 1271 |       (static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags))) | 
 | 1272 |     code = static_cast<ErrorCode>( | 
 | 1273 |         static_cast<int>(code) & ~static_cast<int>(ErrorCode::kSpecialFlags)); | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1274 |   switch (code) { | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1275 |     case ErrorCode::kSuccess: return "ErrorCode::kSuccess"; | 
 | 1276 |     case ErrorCode::kError: return "ErrorCode::kError"; | 
 | 1277 |     case ErrorCode::kOmahaRequestError: return "ErrorCode::kOmahaRequestError"; | 
 | 1278 |     case ErrorCode::kOmahaResponseHandlerError: | 
 | 1279 |       return "ErrorCode::kOmahaResponseHandlerError"; | 
 | 1280 |     case ErrorCode::kFilesystemCopierError: | 
 | 1281 |       return "ErrorCode::kFilesystemCopierError"; | 
 | 1282 |     case ErrorCode::kPostinstallRunnerError: | 
 | 1283 |       return "ErrorCode::kPostinstallRunnerError"; | 
 | 1284 |     case ErrorCode::kPayloadMismatchedType: | 
 | 1285 |       return "ErrorCode::kPayloadMismatchedType"; | 
 | 1286 |     case ErrorCode::kInstallDeviceOpenError: | 
 | 1287 |       return "ErrorCode::kInstallDeviceOpenError"; | 
 | 1288 |     case ErrorCode::kKernelDeviceOpenError: | 
 | 1289 |       return "ErrorCode::kKernelDeviceOpenError"; | 
 | 1290 |     case ErrorCode::kDownloadTransferError: | 
 | 1291 |       return "ErrorCode::kDownloadTransferError"; | 
 | 1292 |     case ErrorCode::kPayloadHashMismatchError: | 
 | 1293 |       return "ErrorCode::kPayloadHashMismatchError"; | 
 | 1294 |     case ErrorCode::kPayloadSizeMismatchError: | 
 | 1295 |       return "ErrorCode::kPayloadSizeMismatchError"; | 
 | 1296 |     case ErrorCode::kDownloadPayloadVerificationError: | 
 | 1297 |       return "ErrorCode::kDownloadPayloadVerificationError"; | 
 | 1298 |     case ErrorCode::kDownloadNewPartitionInfoError: | 
 | 1299 |       return "ErrorCode::kDownloadNewPartitionInfoError"; | 
 | 1300 |     case ErrorCode::kDownloadWriteError: | 
 | 1301 |       return "ErrorCode::kDownloadWriteError"; | 
 | 1302 |     case ErrorCode::kNewRootfsVerificationError: | 
 | 1303 |       return "ErrorCode::kNewRootfsVerificationError"; | 
 | 1304 |     case ErrorCode::kNewKernelVerificationError: | 
 | 1305 |       return "ErrorCode::kNewKernelVerificationError"; | 
 | 1306 |     case ErrorCode::kSignedDeltaPayloadExpectedError: | 
 | 1307 |       return "ErrorCode::kSignedDeltaPayloadExpectedError"; | 
 | 1308 |     case ErrorCode::kDownloadPayloadPubKeyVerificationError: | 
 | 1309 |       return "ErrorCode::kDownloadPayloadPubKeyVerificationError"; | 
 | 1310 |     case ErrorCode::kPostinstallBootedFromFirmwareB: | 
 | 1311 |       return "ErrorCode::kPostinstallBootedFromFirmwareB"; | 
 | 1312 |     case ErrorCode::kDownloadStateInitializationError: | 
 | 1313 |       return "ErrorCode::kDownloadStateInitializationError"; | 
 | 1314 |     case ErrorCode::kDownloadInvalidMetadataMagicString: | 
 | 1315 |       return "ErrorCode::kDownloadInvalidMetadataMagicString"; | 
 | 1316 |     case ErrorCode::kDownloadSignatureMissingInManifest: | 
 | 1317 |       return "ErrorCode::kDownloadSignatureMissingInManifest"; | 
 | 1318 |     case ErrorCode::kDownloadManifestParseError: | 
 | 1319 |       return "ErrorCode::kDownloadManifestParseError"; | 
 | 1320 |     case ErrorCode::kDownloadMetadataSignatureError: | 
 | 1321 |       return "ErrorCode::kDownloadMetadataSignatureError"; | 
 | 1322 |     case ErrorCode::kDownloadMetadataSignatureVerificationError: | 
 | 1323 |       return "ErrorCode::kDownloadMetadataSignatureVerificationError"; | 
 | 1324 |     case ErrorCode::kDownloadMetadataSignatureMismatch: | 
 | 1325 |       return "ErrorCode::kDownloadMetadataSignatureMismatch"; | 
 | 1326 |     case ErrorCode::kDownloadOperationHashVerificationError: | 
 | 1327 |       return "ErrorCode::kDownloadOperationHashVerificationError"; | 
 | 1328 |     case ErrorCode::kDownloadOperationExecutionError: | 
 | 1329 |       return "ErrorCode::kDownloadOperationExecutionError"; | 
 | 1330 |     case ErrorCode::kDownloadOperationHashMismatch: | 
 | 1331 |       return "ErrorCode::kDownloadOperationHashMismatch"; | 
 | 1332 |     case ErrorCode::kOmahaRequestEmptyResponseError: | 
 | 1333 |       return "ErrorCode::kOmahaRequestEmptyResponseError"; | 
 | 1334 |     case ErrorCode::kOmahaRequestXMLParseError: | 
 | 1335 |       return "ErrorCode::kOmahaRequestXMLParseError"; | 
 | 1336 |     case ErrorCode::kDownloadInvalidMetadataSize: | 
 | 1337 |       return "ErrorCode::kDownloadInvalidMetadataSize"; | 
 | 1338 |     case ErrorCode::kDownloadInvalidMetadataSignature: | 
 | 1339 |       return "ErrorCode::kDownloadInvalidMetadataSignature"; | 
 | 1340 |     case ErrorCode::kOmahaResponseInvalid: | 
 | 1341 |       return "ErrorCode::kOmahaResponseInvalid"; | 
 | 1342 |     case ErrorCode::kOmahaUpdateIgnoredPerPolicy: | 
 | 1343 |       return "ErrorCode::kOmahaUpdateIgnoredPerPolicy"; | 
 | 1344 |     case ErrorCode::kOmahaUpdateDeferredPerPolicy: | 
 | 1345 |       return "ErrorCode::kOmahaUpdateDeferredPerPolicy"; | 
 | 1346 |     case ErrorCode::kOmahaErrorInHTTPResponse: | 
 | 1347 |       return "ErrorCode::kOmahaErrorInHTTPResponse"; | 
 | 1348 |     case ErrorCode::kDownloadOperationHashMissingError: | 
 | 1349 |       return "ErrorCode::kDownloadOperationHashMissingError"; | 
 | 1350 |     case ErrorCode::kDownloadMetadataSignatureMissingError: | 
 | 1351 |       return "ErrorCode::kDownloadMetadataSignatureMissingError"; | 
 | 1352 |     case ErrorCode::kOmahaUpdateDeferredForBackoff: | 
 | 1353 |       return "ErrorCode::kOmahaUpdateDeferredForBackoff"; | 
 | 1354 |     case ErrorCode::kPostinstallPowerwashError: | 
 | 1355 |       return "ErrorCode::kPostinstallPowerwashError"; | 
 | 1356 |     case ErrorCode::kUpdateCanceledByChannelChange: | 
 | 1357 |       return "ErrorCode::kUpdateCanceledByChannelChange"; | 
 | 1358 |     case ErrorCode::kUmaReportedMax: | 
 | 1359 |       return "ErrorCode::kUmaReportedMax"; | 
 | 1360 |     case ErrorCode::kOmahaRequestHTTPResponseBase: | 
 | 1361 |       return "ErrorCode::kOmahaRequestHTTPResponseBase"; | 
 | 1362 |     case ErrorCode::kResumedFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1363 |       return "Resumed"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1364 |     case ErrorCode::kDevModeFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1365 |       return "DevMode"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1366 |     case ErrorCode::kTestImageFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1367 |       return "TestImage"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1368 |     case ErrorCode::kTestOmahaUrlFlag: | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1369 |       return "TestOmahaUrl"; | 
| Gilad Arnold | d1c4d2d | 2014-06-05 14:07:53 -0700 | [diff] [blame] | 1370 |     case ErrorCode::kSpecialFlags: | 
 | 1371 |       return "ErrorCode::kSpecialFlags"; | 
 | 1372 |     case ErrorCode::kPostinstallFirmwareRONotUpdatable: | 
 | 1373 |       return "ErrorCode::kPostinstallFirmwareRONotUpdatable"; | 
 | 1374 |     case ErrorCode::kUnsupportedMajorPayloadVersion: | 
 | 1375 |       return "ErrorCode::kUnsupportedMajorPayloadVersion"; | 
 | 1376 |     case ErrorCode::kUnsupportedMinorPayloadVersion: | 
 | 1377 |       return "ErrorCode::kUnsupportedMinorPayloadVersion"; | 
| David Zeuthen | f3e2801 | 2014-08-26 18:23:52 -0400 | [diff] [blame] | 1378 |     case ErrorCode::kOmahaRequestXMLHasEntityDecl: | 
 | 1379 |       return "ErrorCode::kOmahaRequestXMLHasEntityDecl"; | 
| Jay Srinivasan | 55f50c2 | 2013-01-10 19:24:35 -0800 | [diff] [blame] | 1380 |     // Don't add a default case to let the compiler warn about newly added | 
 | 1381 |     // error codes which should be added here. | 
 | 1382 |   } | 
 | 1383 |  | 
 | 1384 |   return "Unknown error: " + base::UintToString(static_cast<unsigned>(code)); | 
 | 1385 | } | 
| Jay Srinivasan | f057205 | 2012-10-23 18:12:56 -0700 | [diff] [blame] | 1386 |  | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1387 | bool CreatePowerwashMarkerFile(const char* file_path) { | 
 | 1388 |   const char* marker_file = file_path ? file_path : kPowerwashMarkerFile; | 
 | 1389 |   bool result = utils::WriteFile(marker_file, | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1390 |                                  kPowerwashCommand, | 
 | 1391 |                                  strlen(kPowerwashCommand)); | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1392 |   if (result) { | 
 | 1393 |     LOG(INFO) << "Created " << marker_file << " to powerwash on next reboot"; | 
 | 1394 |   } else { | 
 | 1395 |     PLOG(ERROR) << "Error in creating powerwash marker file: " << marker_file; | 
 | 1396 |   } | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1397 |  | 
 | 1398 |   return result; | 
 | 1399 | } | 
 | 1400 |  | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1401 | bool DeletePowerwashMarkerFile(const char* file_path) { | 
 | 1402 |   const char* marker_file = file_path ? file_path : kPowerwashMarkerFile; | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 1403 |   const base::FilePath kPowerwashMarkerPath(marker_file); | 
 | 1404 |   bool result = base::DeleteFile(kPowerwashMarkerPath, false); | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1405 |  | 
 | 1406 |   if (result) | 
 | 1407 |     LOG(INFO) << "Successfully deleted the powerwash marker file : " | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1408 |               << marker_file; | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1409 |   else | 
 | 1410 |     PLOG(ERROR) << "Could not delete the powerwash marker file : " | 
| Gilad Arnold | 30dedd8 | 2013-07-03 06:19:09 -0700 | [diff] [blame] | 1411 |                 << marker_file; | 
| Jay Srinivasan | 1c0fe79 | 2013-03-28 16:45:25 -0700 | [diff] [blame] | 1412 |  | 
 | 1413 |   return result; | 
 | 1414 | } | 
 | 1415 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1416 | bool GetInstallDev(const string& boot_dev, string* install_dev) { | 
 | 1417 |   string disk_name; | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 1418 |   int partition_num; | 
 | 1419 |   if (!SplitPartitionName(boot_dev, &disk_name, &partition_num)) | 
 | 1420 |     return false; | 
| Liam McLoughlin | 049d165 | 2013-07-31 18:47:46 -0700 | [diff] [blame] | 1421 |  | 
| Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1422 |   // Right now, we just switch '3' and '5' partition numbers. | 
| Alex Vakulenko | f3f85bb | 2014-03-26 16:36:35 -0700 | [diff] [blame] | 1423 |   if (partition_num == 3) { | 
 | 1424 |     partition_num = 5; | 
 | 1425 |   } else if (partition_num == 5) { | 
 | 1426 |     partition_num = 3; | 
 | 1427 |   } else { | 
 | 1428 |     return false; | 
 | 1429 |   } | 
 | 1430 |  | 
 | 1431 |   if (install_dev) | 
 | 1432 |     *install_dev = MakePartitionName(disk_name, partition_num); | 
| Liam McLoughlin | 049d165 | 2013-07-31 18:47:46 -0700 | [diff] [blame] | 1433 |  | 
| Chris Sosa | d317e40 | 2013-06-12 13:47:09 -0700 | [diff] [blame] | 1434 |   return true; | 
 | 1435 | } | 
 | 1436 |  | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1437 | Time TimeFromStructTimespec(struct timespec *ts) { | 
| Ben Chan | 9abb763 | 2014-08-07 00:10:53 -0700 | [diff] [blame] | 1438 |   int64_t us = static_cast<int64_t>(ts->tv_sec) * Time::kMicrosecondsPerSecond + | 
 | 1439 |       static_cast<int64_t>(ts->tv_nsec) / Time::kNanosecondsPerMicrosecond; | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1440 |   return Time::UnixEpoch() + TimeDelta::FromMicroseconds(us); | 
 | 1441 | } | 
 | 1442 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1443 | gchar** StringVectorToGStrv(const vector<string> &vec_str) { | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1444 |   GPtrArray *p = g_ptr_array_new(); | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1445 |   for (vector<string>::const_iterator i = vec_str.begin(); | 
 | 1446 |        i != vec_str.end(); ++i) { | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1447 |     g_ptr_array_add(p, g_strdup(i->c_str())); | 
 | 1448 |   } | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1449 |   g_ptr_array_add(p, nullptr); | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1450 |   return reinterpret_cast<gchar**>(g_ptr_array_free(p, FALSE)); | 
 | 1451 | } | 
 | 1452 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1453 | string StringVectorToString(const vector<string> &vec_str) { | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1454 |   string str = "["; | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1455 |   for (vector<string>::const_iterator i = vec_str.begin(); | 
 | 1456 |        i != vec_str.end(); ++i) { | 
 | 1457 |     if (i != vec_str.begin()) | 
| David Zeuthen | 27a48bc | 2013-08-06 12:06:29 -0700 | [diff] [blame] | 1458 |       str += ", "; | 
 | 1459 |     str += '"'; | 
 | 1460 |     str += *i; | 
 | 1461 |     str += '"'; | 
 | 1462 |   } | 
 | 1463 |   str += "]"; | 
 | 1464 |   return str; | 
 | 1465 | } | 
 | 1466 |  | 
| David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1467 | string CalculateP2PFileId(const string& payload_hash, size_t payload_size) { | 
 | 1468 |   string encoded_hash; | 
 | 1469 |   OmahaHashCalculator::Base64Encode(payload_hash.c_str(), | 
 | 1470 |                                     payload_hash.size(), | 
 | 1471 |                                     &encoded_hash); | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 1472 |   return base::StringPrintf("cros_update_size_%zu_hash_%s", | 
| David Zeuthen | 8f191b2 | 2013-08-06 12:27:50 -0700 | [diff] [blame] | 1473 |                       payload_size, | 
 | 1474 |                       encoded_hash.c_str()); | 
 | 1475 | } | 
 | 1476 |  | 
| David Zeuthen | 910ec5b | 2013-09-26 12:10:58 -0700 | [diff] [blame] | 1477 | bool IsXAttrSupported(const base::FilePath& dir_path) { | 
 | 1478 |   char *path = strdup(dir_path.Append("xattr_test_XXXXXX").value().c_str()); | 
 | 1479 |  | 
 | 1480 |   int fd = mkstemp(path); | 
 | 1481 |   if (fd == -1) { | 
 | 1482 |     PLOG(ERROR) << "Error creating temporary file in " << dir_path.value(); | 
 | 1483 |     free(path); | 
 | 1484 |     return false; | 
 | 1485 |   } | 
 | 1486 |  | 
 | 1487 |   if (unlink(path) != 0) { | 
 | 1488 |     PLOG(ERROR) << "Error unlinking temporary file " << path; | 
 | 1489 |     close(fd); | 
 | 1490 |     free(path); | 
 | 1491 |     return false; | 
 | 1492 |   } | 
 | 1493 |  | 
 | 1494 |   int xattr_res = fsetxattr(fd, "user.xattr-test", "value", strlen("value"), 0); | 
 | 1495 |   if (xattr_res != 0) { | 
 | 1496 |     if (errno == ENOTSUP) { | 
 | 1497 |       // Leave it to call-sites to warn about non-support. | 
 | 1498 |     } else { | 
 | 1499 |       PLOG(ERROR) << "Error setting xattr on " << path; | 
 | 1500 |     } | 
 | 1501 |   } | 
 | 1502 |   close(fd); | 
 | 1503 |   free(path); | 
 | 1504 |   return xattr_res == 0; | 
 | 1505 | } | 
 | 1506 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1507 | bool DecodeAndStoreBase64String(const string& base64_encoded, | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1508 |                                 base::FilePath *out_path) { | 
 | 1509 |   vector<char> contents; | 
 | 1510 |  | 
 | 1511 |   out_path->clear(); | 
 | 1512 |  | 
 | 1513 |   if (base64_encoded.size() == 0) { | 
 | 1514 |     LOG(ERROR) << "Can't decode empty string."; | 
 | 1515 |     return false; | 
 | 1516 |   } | 
 | 1517 |  | 
 | 1518 |   if (!OmahaHashCalculator::Base64Decode(base64_encoded, &contents) || | 
 | 1519 |       contents.size() == 0) { | 
 | 1520 |     LOG(ERROR) << "Error decoding base64."; | 
 | 1521 |     return false; | 
 | 1522 |   } | 
 | 1523 |  | 
| Alex Vakulenko | 75039d7 | 2014-03-25 12:36:28 -0700 | [diff] [blame] | 1524 |   FILE *file = base::CreateAndOpenTemporaryFile(out_path); | 
| Alex Vakulenko | 88b591f | 2014-08-28 16:48:57 -0700 | [diff] [blame] | 1525 |   if (file == nullptr) { | 
| David Zeuthen | e7f8917 | 2013-10-31 10:21:04 -0700 | [diff] [blame] | 1526 |     LOG(ERROR) << "Error creating temporary file."; | 
 | 1527 |     return false; | 
 | 1528 |   } | 
 | 1529 |  | 
 | 1530 |   if (fwrite(&contents[0], 1, contents.size(), file) != contents.size()) { | 
 | 1531 |     PLOG(ERROR) << "Error writing to temporary file."; | 
 | 1532 |     if (fclose(file) != 0) | 
 | 1533 |       PLOG(ERROR) << "Error closing temporary file."; | 
 | 1534 |     if (unlink(out_path->value().c_str()) != 0) | 
 | 1535 |       PLOG(ERROR) << "Error unlinking temporary file."; | 
 | 1536 |     out_path->clear(); | 
 | 1537 |     return false; | 
 | 1538 |   } | 
 | 1539 |  | 
 | 1540 |   if (fclose(file) != 0) { | 
 | 1541 |     PLOG(ERROR) << "Error closing temporary file."; | 
 | 1542 |     out_path->clear(); | 
 | 1543 |     return false; | 
 | 1544 |   } | 
 | 1545 |  | 
 | 1546 |   return true; | 
 | 1547 | } | 
 | 1548 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1549 | bool ConvertToOmahaInstallDate(Time time, int *out_num_days) { | 
| David Zeuthen | 639aa36 | 2014-02-03 16:23:44 -0800 | [diff] [blame] | 1550 |   time_t unix_time = time.ToTimeT(); | 
 | 1551 |   // Output of: date +"%s" --date="Jan 1, 2007 0:00 PST". | 
 | 1552 |   const time_t kOmahaEpoch = 1167638400; | 
 | 1553 |   const int64_t kNumSecondsPerWeek = 7*24*3600; | 
 | 1554 |   const int64_t kNumDaysPerWeek = 7; | 
 | 1555 |  | 
 | 1556 |   time_t omaha_time = unix_time - kOmahaEpoch; | 
 | 1557 |  | 
 | 1558 |   if (omaha_time < 0) | 
 | 1559 |     return false; | 
 | 1560 |  | 
 | 1561 |   // Note, as per the comment in utils.h we are deliberately not | 
 | 1562 |   // handling DST correctly. | 
 | 1563 |  | 
 | 1564 |   int64_t num_weeks_since_omaha_epoch = omaha_time / kNumSecondsPerWeek; | 
 | 1565 |   *out_num_days = num_weeks_since_omaha_epoch * kNumDaysPerWeek; | 
 | 1566 |  | 
 | 1567 |   return true; | 
 | 1568 | } | 
 | 1569 |  | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1570 | bool WallclockDurationHelper(SystemState* system_state, | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1571 |                              const string& state_variable_key, | 
 | 1572 |                              TimeDelta* out_duration) { | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1573 |   bool ret = false; | 
 | 1574 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1575 |   Time now = system_state->clock()->GetWallclockTime(); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1576 |   int64_t stored_value; | 
 | 1577 |   if (system_state->prefs()->GetInt64(state_variable_key, &stored_value)) { | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1578 |     Time stored_time = Time::FromInternalValue(stored_value); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1579 |     if (stored_time > now) { | 
 | 1580 |       LOG(ERROR) << "Stored time-stamp used for " << state_variable_key | 
 | 1581 |                  << " is in the future."; | 
 | 1582 |     } else { | 
 | 1583 |       *out_duration = now - stored_time; | 
 | 1584 |       ret = true; | 
 | 1585 |     } | 
 | 1586 |   } | 
 | 1587 |  | 
 | 1588 |   if (!system_state->prefs()->SetInt64(state_variable_key, | 
 | 1589 |                                        now.ToInternalValue())) { | 
 | 1590 |     LOG(ERROR) << "Error storing time-stamp in " << state_variable_key; | 
 | 1591 |   } | 
 | 1592 |  | 
 | 1593 |   return ret; | 
 | 1594 | } | 
 | 1595 |  | 
 | 1596 | bool MonotonicDurationHelper(SystemState* system_state, | 
 | 1597 |                              int64_t* storage, | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1598 |                              TimeDelta* out_duration) { | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1599 |   bool ret = false; | 
 | 1600 |  | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1601 |   Time now = system_state->clock()->GetMonotonicTime(); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1602 |   if (*storage != 0) { | 
| Alex Deymo | f329b93 | 2014-10-30 01:37:48 -0700 | [diff] [blame^] | 1603 |     Time stored_time = Time::FromInternalValue(*storage); | 
| David Zeuthen | 33bae49 | 2014-02-25 16:16:18 -0800 | [diff] [blame] | 1604 |     *out_duration = now - stored_time; | 
 | 1605 |     ret = true; | 
 | 1606 |   } | 
 | 1607 |   *storage = now.ToInternalValue(); | 
 | 1608 |  | 
 | 1609 |   return ret; | 
 | 1610 | } | 
 | 1611 |  | 
| adlr@google.com | 3defe6a | 2009-12-04 20:57:17 +0000 | [diff] [blame] | 1612 | }  // namespace utils | 
 | 1613 |  | 
 | 1614 | }  // namespace chromeos_update_engine |