xref: /aosp_15_r20/bootable/recovery/install/install.cpp (revision e7c364b630b241adcb6c7726a21055250b91fdac)
1*e7c364b6SAndroid Build Coastguard Worker /*
2*e7c364b6SAndroid Build Coastguard Worker  * Copyright (C) 2007 The Android Open Source Project
3*e7c364b6SAndroid Build Coastguard Worker  *
4*e7c364b6SAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*e7c364b6SAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*e7c364b6SAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*e7c364b6SAndroid Build Coastguard Worker  *
8*e7c364b6SAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*e7c364b6SAndroid Build Coastguard Worker  *
10*e7c364b6SAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*e7c364b6SAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*e7c364b6SAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*e7c364b6SAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*e7c364b6SAndroid Build Coastguard Worker  * limitations under the License.
15*e7c364b6SAndroid Build Coastguard Worker  */
16*e7c364b6SAndroid Build Coastguard Worker 
17*e7c364b6SAndroid Build Coastguard Worker #include "install/install.h"
18*e7c364b6SAndroid Build Coastguard Worker 
19*e7c364b6SAndroid Build Coastguard Worker #include <ctype.h>
20*e7c364b6SAndroid Build Coastguard Worker #include <errno.h>
21*e7c364b6SAndroid Build Coastguard Worker #include <fcntl.h>
22*e7c364b6SAndroid Build Coastguard Worker #include <inttypes.h>
23*e7c364b6SAndroid Build Coastguard Worker #include <limits.h>
24*e7c364b6SAndroid Build Coastguard Worker #include <string.h>
25*e7c364b6SAndroid Build Coastguard Worker #include <sys/stat.h>
26*e7c364b6SAndroid Build Coastguard Worker #include <sys/wait.h>
27*e7c364b6SAndroid Build Coastguard Worker #include <unistd.h>
28*e7c364b6SAndroid Build Coastguard Worker 
29*e7c364b6SAndroid Build Coastguard Worker #include <algorithm>
30*e7c364b6SAndroid Build Coastguard Worker #include <atomic>
31*e7c364b6SAndroid Build Coastguard Worker #include <chrono>
32*e7c364b6SAndroid Build Coastguard Worker #include <condition_variable>
33*e7c364b6SAndroid Build Coastguard Worker #include <filesystem>
34*e7c364b6SAndroid Build Coastguard Worker #include <functional>
35*e7c364b6SAndroid Build Coastguard Worker #include <limits>
36*e7c364b6SAndroid Build Coastguard Worker #include <mutex>
37*e7c364b6SAndroid Build Coastguard Worker #include <thread>
38*e7c364b6SAndroid Build Coastguard Worker #include <vector>
39*e7c364b6SAndroid Build Coastguard Worker 
40*e7c364b6SAndroid Build Coastguard Worker #include <android-base/file.h>
41*e7c364b6SAndroid Build Coastguard Worker #include <android-base/logging.h>
42*e7c364b6SAndroid Build Coastguard Worker #include <android-base/parsedouble.h>
43*e7c364b6SAndroid Build Coastguard Worker #include <android-base/parseint.h>
44*e7c364b6SAndroid Build Coastguard Worker #include <android-base/properties.h>
45*e7c364b6SAndroid Build Coastguard Worker #include <android-base/stringprintf.h>
46*e7c364b6SAndroid Build Coastguard Worker #include <android-base/strings.h>
47*e7c364b6SAndroid Build Coastguard Worker #include <android-base/unique_fd.h>
48*e7c364b6SAndroid Build Coastguard Worker 
49*e7c364b6SAndroid Build Coastguard Worker #include "install/spl_check.h"
50*e7c364b6SAndroid Build Coastguard Worker #include "install/wipe_data.h"
51*e7c364b6SAndroid Build Coastguard Worker #include "install/wipe_device.h"
52*e7c364b6SAndroid Build Coastguard Worker #include "otautil/error_code.h"
53*e7c364b6SAndroid Build Coastguard Worker #include "otautil/package.h"
54*e7c364b6SAndroid Build Coastguard Worker #include "otautil/paths.h"
55*e7c364b6SAndroid Build Coastguard Worker #include "otautil/sysutil.h"
56*e7c364b6SAndroid Build Coastguard Worker #include "otautil/verifier.h"
57*e7c364b6SAndroid Build Coastguard Worker #include "private/setup_commands.h"
58*e7c364b6SAndroid Build Coastguard Worker #include "recovery_ui/ui.h"
59*e7c364b6SAndroid Build Coastguard Worker #include "recovery_utils/roots.h"
60*e7c364b6SAndroid Build Coastguard Worker #include "recovery_utils/thermalutil.h"
61*e7c364b6SAndroid Build Coastguard Worker 
62*e7c364b6SAndroid Build Coastguard Worker using namespace std::chrono_literals;
63*e7c364b6SAndroid Build Coastguard Worker 
64*e7c364b6SAndroid Build Coastguard Worker static constexpr int kRecoveryApiVersion = 3;
65*e7c364b6SAndroid Build Coastguard Worker // We define RECOVERY_API_VERSION in Android.mk, which will be picked up by build system and packed
66*e7c364b6SAndroid Build Coastguard Worker // into target_files.zip. Assert the version defined in code and in Android.mk are consistent.
67*e7c364b6SAndroid Build Coastguard Worker static_assert(kRecoveryApiVersion == RECOVERY_API_VERSION, "Mismatching recovery API versions.");
68*e7c364b6SAndroid Build Coastguard Worker 
69*e7c364b6SAndroid Build Coastguard Worker // Default allocation of progress bar segments to operations
70*e7c364b6SAndroid Build Coastguard Worker static constexpr int VERIFICATION_PROGRESS_TIME = 60;
71*e7c364b6SAndroid Build Coastguard Worker static constexpr float VERIFICATION_PROGRESS_FRACTION = 0.25;
72*e7c364b6SAndroid Build Coastguard Worker // The charater used to separate dynamic fingerprints. e.x. sargo|aosp-sargo
73*e7c364b6SAndroid Build Coastguard Worker static const char* FINGERPRING_SEPARATOR = "|";
74*e7c364b6SAndroid Build Coastguard Worker static constexpr auto&& RELEASE_KEYS_TAG = "release-keys";
75*e7c364b6SAndroid Build Coastguard Worker // If brick packages are smaller than |MEMORY_PACKAGE_LIMIT|, read the entire package into memory
76*e7c364b6SAndroid Build Coastguard Worker static constexpr size_t MEMORY_PACKAGE_LIMIT = 1024 * 1024;
77*e7c364b6SAndroid Build Coastguard Worker 
78*e7c364b6SAndroid Build Coastguard Worker static std::condition_variable finish_log_temperature;
79*e7c364b6SAndroid Build Coastguard Worker static bool isInStringList(const std::string& target_token, const std::string& str_list,
80*e7c364b6SAndroid Build Coastguard Worker                            const std::string& deliminator);
81*e7c364b6SAndroid Build Coastguard Worker 
ReadMetadataFromPackage(ZipArchiveHandle zip,std::map<std::string,std::string> * metadata)82*e7c364b6SAndroid Build Coastguard Worker bool ReadMetadataFromPackage(ZipArchiveHandle zip, std::map<std::string, std::string>* metadata) {
83*e7c364b6SAndroid Build Coastguard Worker   CHECK(metadata != nullptr);
84*e7c364b6SAndroid Build Coastguard Worker 
85*e7c364b6SAndroid Build Coastguard Worker   static constexpr const char* METADATA_PATH = "META-INF/com/android/metadata";
86*e7c364b6SAndroid Build Coastguard Worker   ZipEntry64 entry;
87*e7c364b6SAndroid Build Coastguard Worker   if (FindEntry(zip, METADATA_PATH, &entry) != 0) {
88*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to find " << METADATA_PATH;
89*e7c364b6SAndroid Build Coastguard Worker     return false;
90*e7c364b6SAndroid Build Coastguard Worker   }
91*e7c364b6SAndroid Build Coastguard Worker 
92*e7c364b6SAndroid Build Coastguard Worker   uint32_t length = entry.uncompressed_length;
93*e7c364b6SAndroid Build Coastguard Worker   std::string metadata_string(length, '\0');
94*e7c364b6SAndroid Build Coastguard Worker   int32_t err =
95*e7c364b6SAndroid Build Coastguard Worker       ExtractToMemory(zip, &entry, reinterpret_cast<uint8_t*>(&metadata_string[0]), length);
96*e7c364b6SAndroid Build Coastguard Worker   if (err != 0) {
97*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to extract " << METADATA_PATH << ": " << ErrorCodeString(err);
98*e7c364b6SAndroid Build Coastguard Worker     return false;
99*e7c364b6SAndroid Build Coastguard Worker   }
100*e7c364b6SAndroid Build Coastguard Worker 
101*e7c364b6SAndroid Build Coastguard Worker   for (const std::string& line : android::base::Split(metadata_string, "\n")) {
102*e7c364b6SAndroid Build Coastguard Worker     size_t eq = line.find('=');
103*e7c364b6SAndroid Build Coastguard Worker     if (eq != std::string::npos) {
104*e7c364b6SAndroid Build Coastguard Worker       metadata->emplace(android::base::Trim(line.substr(0, eq)),
105*e7c364b6SAndroid Build Coastguard Worker                         android::base::Trim(line.substr(eq + 1)));
106*e7c364b6SAndroid Build Coastguard Worker     }
107*e7c364b6SAndroid Build Coastguard Worker   }
108*e7c364b6SAndroid Build Coastguard Worker 
109*e7c364b6SAndroid Build Coastguard Worker   return true;
110*e7c364b6SAndroid Build Coastguard Worker }
111*e7c364b6SAndroid Build Coastguard Worker 
112*e7c364b6SAndroid Build Coastguard Worker // Gets the value for the given key in |metadata|. Returns an emtpy string if the key isn't
113*e7c364b6SAndroid Build Coastguard Worker // present.
get_value(const std::map<std::string,std::string> & metadata,const std::string & key)114*e7c364b6SAndroid Build Coastguard Worker static std::string get_value(const std::map<std::string, std::string>& metadata,
115*e7c364b6SAndroid Build Coastguard Worker                              const std::string& key) {
116*e7c364b6SAndroid Build Coastguard Worker   const auto& it = metadata.find(key);
117*e7c364b6SAndroid Build Coastguard Worker   return (it == metadata.end()) ? "" : it->second;
118*e7c364b6SAndroid Build Coastguard Worker }
119*e7c364b6SAndroid Build Coastguard Worker 
OtaTypeToString(OtaType type)120*e7c364b6SAndroid Build Coastguard Worker static std::string OtaTypeToString(OtaType type) {
121*e7c364b6SAndroid Build Coastguard Worker   switch (type) {
122*e7c364b6SAndroid Build Coastguard Worker     case OtaType::AB:
123*e7c364b6SAndroid Build Coastguard Worker       return "AB";
124*e7c364b6SAndroid Build Coastguard Worker     case OtaType::BLOCK:
125*e7c364b6SAndroid Build Coastguard Worker       return "BLOCK";
126*e7c364b6SAndroid Build Coastguard Worker     case OtaType::BRICK:
127*e7c364b6SAndroid Build Coastguard Worker       return "BRICK";
128*e7c364b6SAndroid Build Coastguard Worker   }
129*e7c364b6SAndroid Build Coastguard Worker }
130*e7c364b6SAndroid Build Coastguard Worker 
131*e7c364b6SAndroid Build Coastguard Worker // Read the build.version.incremental of src/tgt from the metadata and log it to last_install.
ReadSourceTargetBuild(const std::map<std::string,std::string> & metadata,std::vector<std::string> * log_buffer)132*e7c364b6SAndroid Build Coastguard Worker static void ReadSourceTargetBuild(const std::map<std::string, std::string>& metadata,
133*e7c364b6SAndroid Build Coastguard Worker                                   std::vector<std::string>* log_buffer) {
134*e7c364b6SAndroid Build Coastguard Worker   // Examples of the pre-build and post-build strings in metadata:
135*e7c364b6SAndroid Build Coastguard Worker   //   pre-build-incremental=2943039
136*e7c364b6SAndroid Build Coastguard Worker   //   post-build-incremental=2951741
137*e7c364b6SAndroid Build Coastguard Worker   auto source_build = get_value(metadata, "pre-build-incremental");
138*e7c364b6SAndroid Build Coastguard Worker   if (!source_build.empty()) {
139*e7c364b6SAndroid Build Coastguard Worker     log_buffer->push_back("source_build: " + source_build);
140*e7c364b6SAndroid Build Coastguard Worker   }
141*e7c364b6SAndroid Build Coastguard Worker 
142*e7c364b6SAndroid Build Coastguard Worker   auto target_build = get_value(metadata, "post-build-incremental");
143*e7c364b6SAndroid Build Coastguard Worker   if (!target_build.empty()) {
144*e7c364b6SAndroid Build Coastguard Worker     log_buffer->push_back("target_build: " + target_build);
145*e7c364b6SAndroid Build Coastguard Worker   }
146*e7c364b6SAndroid Build Coastguard Worker }
147*e7c364b6SAndroid Build Coastguard Worker 
148*e7c364b6SAndroid Build Coastguard Worker // Checks the build version, fingerprint and timestamp in the metadata of the A/B package.
149*e7c364b6SAndroid Build Coastguard Worker // Downgrading is not allowed unless explicitly enabled in the package and only for
150*e7c364b6SAndroid Build Coastguard Worker // incremental packages.
CheckAbSpecificMetadata(const std::map<std::string,std::string> & metadata)151*e7c364b6SAndroid Build Coastguard Worker static bool CheckAbSpecificMetadata(const std::map<std::string, std::string>& metadata) {
152*e7c364b6SAndroid Build Coastguard Worker   // Incremental updates should match the current build.
153*e7c364b6SAndroid Build Coastguard Worker   auto device_pre_build = android::base::GetProperty("ro.build.version.incremental", "");
154*e7c364b6SAndroid Build Coastguard Worker   auto pkg_pre_build = get_value(metadata, "pre-build-incremental");
155*e7c364b6SAndroid Build Coastguard Worker   if (!pkg_pre_build.empty() && pkg_pre_build != device_pre_build) {
156*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Package is for source build " << pkg_pre_build << " but expected "
157*e7c364b6SAndroid Build Coastguard Worker                << device_pre_build;
158*e7c364b6SAndroid Build Coastguard Worker     return false;
159*e7c364b6SAndroid Build Coastguard Worker   }
160*e7c364b6SAndroid Build Coastguard Worker 
161*e7c364b6SAndroid Build Coastguard Worker   auto device_fingerprint = android::base::GetProperty("ro.build.fingerprint", "");
162*e7c364b6SAndroid Build Coastguard Worker   auto pkg_pre_build_fingerprint = get_value(metadata, "pre-build");
163*e7c364b6SAndroid Build Coastguard Worker   if (!pkg_pre_build_fingerprint.empty() &&
164*e7c364b6SAndroid Build Coastguard Worker       !isInStringList(device_fingerprint, pkg_pre_build_fingerprint, FINGERPRING_SEPARATOR)) {
165*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Package is for source build " << pkg_pre_build_fingerprint << " but expected "
166*e7c364b6SAndroid Build Coastguard Worker                << device_fingerprint;
167*e7c364b6SAndroid Build Coastguard Worker     return false;
168*e7c364b6SAndroid Build Coastguard Worker   }
169*e7c364b6SAndroid Build Coastguard Worker 
170*e7c364b6SAndroid Build Coastguard Worker   // Check for downgrade version.
171*e7c364b6SAndroid Build Coastguard Worker   int64_t build_timestamp =
172*e7c364b6SAndroid Build Coastguard Worker       android::base::GetIntProperty("ro.build.date.utc", std::numeric_limits<int64_t>::max());
173*e7c364b6SAndroid Build Coastguard Worker   int64_t pkg_post_timestamp = 0;
174*e7c364b6SAndroid Build Coastguard Worker   // We allow to full update to the same version we are running, in case there
175*e7c364b6SAndroid Build Coastguard Worker   // is a problem with the current copy of that version.
176*e7c364b6SAndroid Build Coastguard Worker   auto pkg_post_timestamp_string = get_value(metadata, "post-timestamp");
177*e7c364b6SAndroid Build Coastguard Worker   if (pkg_post_timestamp_string.empty() ||
178*e7c364b6SAndroid Build Coastguard Worker       !android::base::ParseInt(pkg_post_timestamp_string, &pkg_post_timestamp) ||
179*e7c364b6SAndroid Build Coastguard Worker       pkg_post_timestamp < build_timestamp) {
180*e7c364b6SAndroid Build Coastguard Worker     if (get_value(metadata, "ota-downgrade") != "yes") {
181*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Update package is older than the current build, expected a build "
182*e7c364b6SAndroid Build Coastguard Worker                     "newer than timestamp "
183*e7c364b6SAndroid Build Coastguard Worker                  << build_timestamp << " but package has timestamp " << pkg_post_timestamp
184*e7c364b6SAndroid Build Coastguard Worker                  << " and downgrade not allowed.";
185*e7c364b6SAndroid Build Coastguard Worker       return false;
186*e7c364b6SAndroid Build Coastguard Worker     }
187*e7c364b6SAndroid Build Coastguard Worker     if (pkg_pre_build_fingerprint.empty()) {
188*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Downgrade package must have a pre-build version set, not allowed.";
189*e7c364b6SAndroid Build Coastguard Worker       return false;
190*e7c364b6SAndroid Build Coastguard Worker     }
191*e7c364b6SAndroid Build Coastguard Worker   }
192*e7c364b6SAndroid Build Coastguard Worker   const auto post_build = get_value(metadata, "post-build");
193*e7c364b6SAndroid Build Coastguard Worker   const auto build_fingerprint = android::base::Tokenize(post_build, "/");
194*e7c364b6SAndroid Build Coastguard Worker   if (!build_fingerprint.empty()) {
195*e7c364b6SAndroid Build Coastguard Worker     const auto& post_build_tag = build_fingerprint.back();
196*e7c364b6SAndroid Build Coastguard Worker     const auto build_tag = android::base::GetProperty("ro.build.tags", "");
197*e7c364b6SAndroid Build Coastguard Worker     if (build_tag != post_build_tag) {
198*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Post build-tag " << post_build_tag << " does not match device build tag "
199*e7c364b6SAndroid Build Coastguard Worker                  << build_tag;
200*e7c364b6SAndroid Build Coastguard Worker       return false;
201*e7c364b6SAndroid Build Coastguard Worker     }
202*e7c364b6SAndroid Build Coastguard Worker   }
203*e7c364b6SAndroid Build Coastguard Worker 
204*e7c364b6SAndroid Build Coastguard Worker   return true;
205*e7c364b6SAndroid Build Coastguard Worker }
206*e7c364b6SAndroid Build Coastguard Worker 
CheckPackageMetadata(const std::map<std::string,std::string> & metadata,OtaType ota_type)207*e7c364b6SAndroid Build Coastguard Worker bool CheckPackageMetadata(const std::map<std::string, std::string>& metadata, OtaType ota_type) {
208*e7c364b6SAndroid Build Coastguard Worker   auto package_ota_type = get_value(metadata, "ota-type");
209*e7c364b6SAndroid Build Coastguard Worker   auto expected_ota_type = OtaTypeToString(ota_type);
210*e7c364b6SAndroid Build Coastguard Worker   if (ota_type != OtaType::AB && ota_type != OtaType::BRICK) {
211*e7c364b6SAndroid Build Coastguard Worker     LOG(INFO) << "Skip package metadata check for ota type " << expected_ota_type;
212*e7c364b6SAndroid Build Coastguard Worker     return true;
213*e7c364b6SAndroid Build Coastguard Worker   }
214*e7c364b6SAndroid Build Coastguard Worker 
215*e7c364b6SAndroid Build Coastguard Worker   if (package_ota_type != expected_ota_type) {
216*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Unexpected ota package type, expects " << expected_ota_type << ", actual "
217*e7c364b6SAndroid Build Coastguard Worker                << package_ota_type;
218*e7c364b6SAndroid Build Coastguard Worker     return false;
219*e7c364b6SAndroid Build Coastguard Worker   }
220*e7c364b6SAndroid Build Coastguard Worker 
221*e7c364b6SAndroid Build Coastguard Worker   auto device = android::base::GetProperty("ro.product.device", "");
222*e7c364b6SAndroid Build Coastguard Worker   auto pkg_device = get_value(metadata, "pre-device");
223*e7c364b6SAndroid Build Coastguard Worker   // device name can be a | separated list, so need to check
224*e7c364b6SAndroid Build Coastguard Worker   if (pkg_device.empty() || !isInStringList(device, pkg_device, FINGERPRING_SEPARATOR)) {
225*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Package is for product " << pkg_device << " but expected " << device;
226*e7c364b6SAndroid Build Coastguard Worker     return false;
227*e7c364b6SAndroid Build Coastguard Worker   }
228*e7c364b6SAndroid Build Coastguard Worker 
229*e7c364b6SAndroid Build Coastguard Worker   // We allow the package to not have any serialno; and we also allow it to carry multiple serial
230*e7c364b6SAndroid Build Coastguard Worker   // numbers split by "|"; e.g. serialno=serialno1|serialno2|serialno3 ... We will fail the
231*e7c364b6SAndroid Build Coastguard Worker   // verification if the device's serialno doesn't match any of these carried numbers.
232*e7c364b6SAndroid Build Coastguard Worker 
233*e7c364b6SAndroid Build Coastguard Worker   auto pkg_serial_no = get_value(metadata, "serialno");
234*e7c364b6SAndroid Build Coastguard Worker   if (!pkg_serial_no.empty()) {
235*e7c364b6SAndroid Build Coastguard Worker     auto device_serial_no = android::base::GetProperty("ro.serialno", "");
236*e7c364b6SAndroid Build Coastguard Worker     bool serial_number_match = false;
237*e7c364b6SAndroid Build Coastguard Worker     for (const auto& number : android::base::Split(pkg_serial_no, "|")) {
238*e7c364b6SAndroid Build Coastguard Worker       if (device_serial_no == android::base::Trim(number)) {
239*e7c364b6SAndroid Build Coastguard Worker         serial_number_match = true;
240*e7c364b6SAndroid Build Coastguard Worker       }
241*e7c364b6SAndroid Build Coastguard Worker     }
242*e7c364b6SAndroid Build Coastguard Worker     if (!serial_number_match) {
243*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Package is for serial " << pkg_serial_no;
244*e7c364b6SAndroid Build Coastguard Worker       return false;
245*e7c364b6SAndroid Build Coastguard Worker     }
246*e7c364b6SAndroid Build Coastguard Worker   } else if (ota_type == OtaType::BRICK) {
247*e7c364b6SAndroid Build Coastguard Worker     const auto device_build_tag = android::base::GetProperty("ro.build.tags", "");
248*e7c364b6SAndroid Build Coastguard Worker     if (device_build_tag.empty()) {
249*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Unable to determine device build tags, serial number is missing from package. "
250*e7c364b6SAndroid Build Coastguard Worker                     "Rejecting the brick OTA package.";
251*e7c364b6SAndroid Build Coastguard Worker       return false;
252*e7c364b6SAndroid Build Coastguard Worker     }
253*e7c364b6SAndroid Build Coastguard Worker     if (device_build_tag == RELEASE_KEYS_TAG) {
254*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Device is release key build, serial number is missing from package. "
255*e7c364b6SAndroid Build Coastguard Worker                     "Rejecting the brick OTA package.";
256*e7c364b6SAndroid Build Coastguard Worker       return false;
257*e7c364b6SAndroid Build Coastguard Worker     }
258*e7c364b6SAndroid Build Coastguard Worker     LOG(INFO)
259*e7c364b6SAndroid Build Coastguard Worker         << "Serial number is missing from brick OTA package, permitting anyway because device is "
260*e7c364b6SAndroid Build Coastguard Worker         << device_build_tag;
261*e7c364b6SAndroid Build Coastguard Worker   }
262*e7c364b6SAndroid Build Coastguard Worker 
263*e7c364b6SAndroid Build Coastguard Worker   if (ota_type == OtaType::AB) {
264*e7c364b6SAndroid Build Coastguard Worker     return CheckAbSpecificMetadata(metadata);
265*e7c364b6SAndroid Build Coastguard Worker   }
266*e7c364b6SAndroid Build Coastguard Worker 
267*e7c364b6SAndroid Build Coastguard Worker   return true;
268*e7c364b6SAndroid Build Coastguard Worker }
269*e7c364b6SAndroid Build Coastguard Worker 
ExtractPayloadProperties(ZipArchiveHandle zip)270*e7c364b6SAndroid Build Coastguard Worker static std::string ExtractPayloadProperties(ZipArchiveHandle zip) {
271*e7c364b6SAndroid Build Coastguard Worker   // For A/B updates we extract the payload properties to a buffer and obtain the RAW payload offset
272*e7c364b6SAndroid Build Coastguard Worker   // in the zip file.
273*e7c364b6SAndroid Build Coastguard Worker   static constexpr const char* AB_OTA_PAYLOAD_PROPERTIES = "payload_properties.txt";
274*e7c364b6SAndroid Build Coastguard Worker   ZipEntry64 properties_entry;
275*e7c364b6SAndroid Build Coastguard Worker   if (FindEntry(zip, AB_OTA_PAYLOAD_PROPERTIES, &properties_entry) != 0) {
276*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to find " << AB_OTA_PAYLOAD_PROPERTIES;
277*e7c364b6SAndroid Build Coastguard Worker     return {};
278*e7c364b6SAndroid Build Coastguard Worker   }
279*e7c364b6SAndroid Build Coastguard Worker   auto properties_entry_length = properties_entry.uncompressed_length;
280*e7c364b6SAndroid Build Coastguard Worker   if (properties_entry_length > std::numeric_limits<size_t>::max()) {
281*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to extract " << AB_OTA_PAYLOAD_PROPERTIES
282*e7c364b6SAndroid Build Coastguard Worker                << " because's uncompressed size exceeds size of address space. "
283*e7c364b6SAndroid Build Coastguard Worker                << properties_entry_length;
284*e7c364b6SAndroid Build Coastguard Worker     return {};
285*e7c364b6SAndroid Build Coastguard Worker   }
286*e7c364b6SAndroid Build Coastguard Worker   std::string payload_properties(properties_entry_length, '\0');
287*e7c364b6SAndroid Build Coastguard Worker   int32_t err =
288*e7c364b6SAndroid Build Coastguard Worker       ExtractToMemory(zip, &properties_entry, reinterpret_cast<uint8_t*>(payload_properties.data()),
289*e7c364b6SAndroid Build Coastguard Worker                       properties_entry_length);
290*e7c364b6SAndroid Build Coastguard Worker   if (err != 0) {
291*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to extract " << AB_OTA_PAYLOAD_PROPERTIES << ": " << ErrorCodeString(err);
292*e7c364b6SAndroid Build Coastguard Worker     return {};
293*e7c364b6SAndroid Build Coastguard Worker   }
294*e7c364b6SAndroid Build Coastguard Worker   return payload_properties;
295*e7c364b6SAndroid Build Coastguard Worker }
296*e7c364b6SAndroid Build Coastguard Worker 
SetUpAbUpdateCommands(const std::string & package,ZipArchiveHandle zip,int status_fd,std::vector<std::string> * cmd)297*e7c364b6SAndroid Build Coastguard Worker bool SetUpAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int status_fd,
298*e7c364b6SAndroid Build Coastguard Worker                            std::vector<std::string>* cmd) {
299*e7c364b6SAndroid Build Coastguard Worker   CHECK(cmd != nullptr);
300*e7c364b6SAndroid Build Coastguard Worker 
301*e7c364b6SAndroid Build Coastguard Worker   // For A/B updates we extract the payload properties to a buffer and obtain the RAW payload offset
302*e7c364b6SAndroid Build Coastguard Worker   // in the zip file.
303*e7c364b6SAndroid Build Coastguard Worker   const auto payload_properties = ExtractPayloadProperties(zip);
304*e7c364b6SAndroid Build Coastguard Worker   if (payload_properties.empty()) {
305*e7c364b6SAndroid Build Coastguard Worker     return false;
306*e7c364b6SAndroid Build Coastguard Worker   }
307*e7c364b6SAndroid Build Coastguard Worker 
308*e7c364b6SAndroid Build Coastguard Worker   static constexpr const char* AB_OTA_PAYLOAD = "payload.bin";
309*e7c364b6SAndroid Build Coastguard Worker   ZipEntry64 payload_entry;
310*e7c364b6SAndroid Build Coastguard Worker   if (FindEntry(zip, AB_OTA_PAYLOAD, &payload_entry) != 0) {
311*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to find " << AB_OTA_PAYLOAD;
312*e7c364b6SAndroid Build Coastguard Worker     return false;
313*e7c364b6SAndroid Build Coastguard Worker   }
314*e7c364b6SAndroid Build Coastguard Worker   long payload_offset = payload_entry.offset;
315*e7c364b6SAndroid Build Coastguard Worker   *cmd = {
316*e7c364b6SAndroid Build Coastguard Worker     "/system/bin/update_engine_sideload",
317*e7c364b6SAndroid Build Coastguard Worker     "--payload=file://" + package,
318*e7c364b6SAndroid Build Coastguard Worker     android::base::StringPrintf("--offset=%ld", payload_offset),
319*e7c364b6SAndroid Build Coastguard Worker     "--headers=" + std::string(payload_properties.begin(), payload_properties.end()),
320*e7c364b6SAndroid Build Coastguard Worker     android::base::StringPrintf("--status_fd=%d", status_fd),
321*e7c364b6SAndroid Build Coastguard Worker   };
322*e7c364b6SAndroid Build Coastguard Worker   return true;
323*e7c364b6SAndroid Build Coastguard Worker }
324*e7c364b6SAndroid Build Coastguard Worker 
SetUpNonAbUpdateCommands(const std::string & package,ZipArchiveHandle zip,int retry_count,int status_fd,std::vector<std::string> * cmd)325*e7c364b6SAndroid Build Coastguard Worker bool SetUpNonAbUpdateCommands(const std::string& package, ZipArchiveHandle zip, int retry_count,
326*e7c364b6SAndroid Build Coastguard Worker                               int status_fd, std::vector<std::string>* cmd) {
327*e7c364b6SAndroid Build Coastguard Worker   CHECK(cmd != nullptr);
328*e7c364b6SAndroid Build Coastguard Worker 
329*e7c364b6SAndroid Build Coastguard Worker   // In non-A/B updates we extract the update binary from the package.
330*e7c364b6SAndroid Build Coastguard Worker   static constexpr const char* UPDATE_BINARY_NAME = "META-INF/com/google/android/update-binary";
331*e7c364b6SAndroid Build Coastguard Worker   ZipEntry64 binary_entry;
332*e7c364b6SAndroid Build Coastguard Worker   if (FindEntry(zip, UPDATE_BINARY_NAME, &binary_entry) != 0) {
333*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to find update binary " << UPDATE_BINARY_NAME;
334*e7c364b6SAndroid Build Coastguard Worker     return false;
335*e7c364b6SAndroid Build Coastguard Worker   }
336*e7c364b6SAndroid Build Coastguard Worker 
337*e7c364b6SAndroid Build Coastguard Worker   const std::string binary_path = Paths::Get().temporary_update_binary();
338*e7c364b6SAndroid Build Coastguard Worker   unlink(binary_path.c_str());
339*e7c364b6SAndroid Build Coastguard Worker   android::base::unique_fd fd(
340*e7c364b6SAndroid Build Coastguard Worker       open(binary_path.c_str(), O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, 0755));
341*e7c364b6SAndroid Build Coastguard Worker   if (fd == -1) {
342*e7c364b6SAndroid Build Coastguard Worker     PLOG(ERROR) << "Failed to create " << binary_path;
343*e7c364b6SAndroid Build Coastguard Worker     return false;
344*e7c364b6SAndroid Build Coastguard Worker   }
345*e7c364b6SAndroid Build Coastguard Worker 
346*e7c364b6SAndroid Build Coastguard Worker   if (auto error = ExtractEntryToFile(zip, &binary_entry, fd); error != 0) {
347*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to extract " << UPDATE_BINARY_NAME << ": " << ErrorCodeString(error);
348*e7c364b6SAndroid Build Coastguard Worker     return false;
349*e7c364b6SAndroid Build Coastguard Worker   }
350*e7c364b6SAndroid Build Coastguard Worker 
351*e7c364b6SAndroid Build Coastguard Worker   // When executing the update binary contained in the package, the arguments passed are:
352*e7c364b6SAndroid Build Coastguard Worker   //   - the version number for this interface
353*e7c364b6SAndroid Build Coastguard Worker   //   - an FD to which the program can write in order to update the progress bar.
354*e7c364b6SAndroid Build Coastguard Worker   //   - the name of the package zip file.
355*e7c364b6SAndroid Build Coastguard Worker   //   - an optional argument "retry" if this update is a retry of a failed update attempt.
356*e7c364b6SAndroid Build Coastguard Worker   *cmd = {
357*e7c364b6SAndroid Build Coastguard Worker     binary_path,
358*e7c364b6SAndroid Build Coastguard Worker     std::to_string(kRecoveryApiVersion),
359*e7c364b6SAndroid Build Coastguard Worker     std::to_string(status_fd),
360*e7c364b6SAndroid Build Coastguard Worker     package,
361*e7c364b6SAndroid Build Coastguard Worker   };
362*e7c364b6SAndroid Build Coastguard Worker   if (retry_count > 0) {
363*e7c364b6SAndroid Build Coastguard Worker     cmd->push_back("retry");
364*e7c364b6SAndroid Build Coastguard Worker   }
365*e7c364b6SAndroid Build Coastguard Worker   return true;
366*e7c364b6SAndroid Build Coastguard Worker }
367*e7c364b6SAndroid Build Coastguard Worker 
log_max_temperature(int * max_temperature,const std::atomic<bool> & logger_finished)368*e7c364b6SAndroid Build Coastguard Worker static void log_max_temperature(int* max_temperature, const std::atomic<bool>& logger_finished) {
369*e7c364b6SAndroid Build Coastguard Worker   CHECK(max_temperature != nullptr);
370*e7c364b6SAndroid Build Coastguard Worker   std::mutex mtx;
371*e7c364b6SAndroid Build Coastguard Worker   std::unique_lock<std::mutex> lck(mtx);
372*e7c364b6SAndroid Build Coastguard Worker   while (!logger_finished.load() &&
373*e7c364b6SAndroid Build Coastguard Worker          finish_log_temperature.wait_for(lck, 20s) == std::cv_status::timeout) {
374*e7c364b6SAndroid Build Coastguard Worker     *max_temperature = std::max(*max_temperature, GetMaxValueFromThermalZone());
375*e7c364b6SAndroid Build Coastguard Worker   }
376*e7c364b6SAndroid Build Coastguard Worker }
377*e7c364b6SAndroid Build Coastguard Worker 
PerformPowerwashIfRequired(ZipArchiveHandle zip,Device * device)378*e7c364b6SAndroid Build Coastguard Worker static bool PerformPowerwashIfRequired(ZipArchiveHandle zip, Device *device) {
379*e7c364b6SAndroid Build Coastguard Worker   const auto payload_properties = ExtractPayloadProperties(zip);
380*e7c364b6SAndroid Build Coastguard Worker   if (payload_properties.find("POWERWASH=1") != std::string::npos) {
381*e7c364b6SAndroid Build Coastguard Worker     LOG(INFO) << "Payload properties has POWERWASH=1, wiping userdata...";
382*e7c364b6SAndroid Build Coastguard Worker     return WipeData(device);
383*e7c364b6SAndroid Build Coastguard Worker   }
384*e7c364b6SAndroid Build Coastguard Worker   return true;
385*e7c364b6SAndroid Build Coastguard Worker }
386*e7c364b6SAndroid Build Coastguard Worker 
387*e7c364b6SAndroid Build Coastguard Worker // If the package contains an update binary, extract it and run it.
TryUpdateBinary(Package * package,bool * wipe_cache,std::vector<std::string> * log_buffer,int retry_count,int * max_temperature,Device * device)388*e7c364b6SAndroid Build Coastguard Worker static InstallResult TryUpdateBinary(Package* package, bool* wipe_cache,
389*e7c364b6SAndroid Build Coastguard Worker                                      std::vector<std::string>* log_buffer, int retry_count,
390*e7c364b6SAndroid Build Coastguard Worker                                      int* max_temperature, Device* device) {
391*e7c364b6SAndroid Build Coastguard Worker   auto ui = device->GetUI();
392*e7c364b6SAndroid Build Coastguard Worker   std::map<std::string, std::string> metadata;
393*e7c364b6SAndroid Build Coastguard Worker   auto zip = package->GetZipArchiveHandle();
394*e7c364b6SAndroid Build Coastguard Worker   if (!ReadMetadataFromPackage(zip, &metadata)) {
395*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to parse metadata in the zip file";
396*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_CORRUPT;
397*e7c364b6SAndroid Build Coastguard Worker   }
398*e7c364b6SAndroid Build Coastguard Worker 
399*e7c364b6SAndroid Build Coastguard Worker   const bool package_is_ab = get_value(metadata, "ota-type") == OtaTypeToString(OtaType::AB);
400*e7c364b6SAndroid Build Coastguard Worker   const bool package_is_brick = get_value(metadata, "ota-type") == OtaTypeToString(OtaType::BRICK);
401*e7c364b6SAndroid Build Coastguard Worker   if (package_is_brick) {
402*e7c364b6SAndroid Build Coastguard Worker     LOG(INFO) << "Installing a brick package";
403*e7c364b6SAndroid Build Coastguard Worker     if (package->GetType() == PackageType::kFile &&
404*e7c364b6SAndroid Build Coastguard Worker         package->GetPackageSize() < MEMORY_PACKAGE_LIMIT) {
405*e7c364b6SAndroid Build Coastguard Worker       std::vector<uint8_t> content(package->GetPackageSize());
406*e7c364b6SAndroid Build Coastguard Worker       if (package->ReadFullyAtOffset(content.data(), content.size(), 0)) {
407*e7c364b6SAndroid Build Coastguard Worker         auto memory_package = Package::CreateMemoryPackage(std::move(content), {});
408*e7c364b6SAndroid Build Coastguard Worker         return WipeAbDevice(device, memory_package.get()) ? INSTALL_SUCCESS : INSTALL_ERROR;
409*e7c364b6SAndroid Build Coastguard Worker       }
410*e7c364b6SAndroid Build Coastguard Worker     }
411*e7c364b6SAndroid Build Coastguard Worker     return WipeAbDevice(device, package) ? INSTALL_SUCCESS : INSTALL_ERROR;
412*e7c364b6SAndroid Build Coastguard Worker   }
413*e7c364b6SAndroid Build Coastguard Worker   bool device_supports_ab = android::base::GetBoolProperty("ro.build.ab_update", false);
414*e7c364b6SAndroid Build Coastguard Worker   bool ab_device_supports_nonab =
415*e7c364b6SAndroid Build Coastguard Worker       android::base::GetBoolProperty("ro.virtual_ab.allow_non_ab", false);
416*e7c364b6SAndroid Build Coastguard Worker   bool device_only_supports_ab = device_supports_ab && !ab_device_supports_nonab;
417*e7c364b6SAndroid Build Coastguard Worker 
418*e7c364b6SAndroid Build Coastguard Worker   const auto current_spl = android::base::GetProperty("ro.build.version.security_patch", "");
419*e7c364b6SAndroid Build Coastguard Worker   if (ViolatesSPLDowngrade(zip, current_spl)) {
420*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Denying OTA because it's SPL downgrade";
421*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_ERROR;
422*e7c364b6SAndroid Build Coastguard Worker   }
423*e7c364b6SAndroid Build Coastguard Worker 
424*e7c364b6SAndroid Build Coastguard Worker   if (package_is_ab) {
425*e7c364b6SAndroid Build Coastguard Worker     CHECK(package->GetType() == PackageType::kFile);
426*e7c364b6SAndroid Build Coastguard Worker   }
427*e7c364b6SAndroid Build Coastguard Worker 
428*e7c364b6SAndroid Build Coastguard Worker   // Verify against the metadata in the package first. Expects A/B metadata if:
429*e7c364b6SAndroid Build Coastguard Worker   // Package declares itself as an A/B package
430*e7c364b6SAndroid Build Coastguard Worker   // Package does not declare itself as an A/B package, but device only supports A/B;
431*e7c364b6SAndroid Build Coastguard Worker   //   still calls CheckPackageMetadata to get a meaningful error message.
432*e7c364b6SAndroid Build Coastguard Worker   if (package_is_ab || device_only_supports_ab) {
433*e7c364b6SAndroid Build Coastguard Worker     if (!CheckPackageMetadata(metadata, OtaType::AB)) {
434*e7c364b6SAndroid Build Coastguard Worker       log_buffer->push_back(android::base::StringPrintf("error: %d", kUpdateBinaryCommandFailure));
435*e7c364b6SAndroid Build Coastguard Worker       return INSTALL_ERROR;
436*e7c364b6SAndroid Build Coastguard Worker     }
437*e7c364b6SAndroid Build Coastguard Worker   }
438*e7c364b6SAndroid Build Coastguard Worker 
439*e7c364b6SAndroid Build Coastguard Worker   ReadSourceTargetBuild(metadata, log_buffer);
440*e7c364b6SAndroid Build Coastguard Worker 
441*e7c364b6SAndroid Build Coastguard Worker   // The updater in child process writes to the pipe to communicate with recovery.
442*e7c364b6SAndroid Build Coastguard Worker   android::base::unique_fd pipe_read, pipe_write;
443*e7c364b6SAndroid Build Coastguard Worker   // Explicitly disable O_CLOEXEC using 0 as the flags (last) parameter to Pipe
444*e7c364b6SAndroid Build Coastguard Worker   // so that the child updater process will recieve a non-closed fd.
445*e7c364b6SAndroid Build Coastguard Worker   if (!android::base::Pipe(&pipe_read, &pipe_write, 0)) {
446*e7c364b6SAndroid Build Coastguard Worker     PLOG(ERROR) << "Failed to create pipe for updater-recovery communication";
447*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_CORRUPT;
448*e7c364b6SAndroid Build Coastguard Worker   }
449*e7c364b6SAndroid Build Coastguard Worker 
450*e7c364b6SAndroid Build Coastguard Worker   // The updater-recovery communication protocol.
451*e7c364b6SAndroid Build Coastguard Worker   //
452*e7c364b6SAndroid Build Coastguard Worker   //   progress <frac> <secs>
453*e7c364b6SAndroid Build Coastguard Worker   //       fill up the next <frac> part of of the progress bar over <secs> seconds. If <secs> is
454*e7c364b6SAndroid Build Coastguard Worker   //       zero, use `set_progress` commands to manually control the progress of this segment of the
455*e7c364b6SAndroid Build Coastguard Worker   //       bar.
456*e7c364b6SAndroid Build Coastguard Worker   //
457*e7c364b6SAndroid Build Coastguard Worker   //   set_progress <frac>
458*e7c364b6SAndroid Build Coastguard Worker   //       <frac> should be between 0.0 and 1.0; sets the progress bar within the segment defined by
459*e7c364b6SAndroid Build Coastguard Worker   //       the most recent progress command.
460*e7c364b6SAndroid Build Coastguard Worker   //
461*e7c364b6SAndroid Build Coastguard Worker   //   ui_print <string>
462*e7c364b6SAndroid Build Coastguard Worker   //       display <string> on the screen.
463*e7c364b6SAndroid Build Coastguard Worker   //
464*e7c364b6SAndroid Build Coastguard Worker   //   wipe_cache
465*e7c364b6SAndroid Build Coastguard Worker   //       a wipe of cache will be performed following a successful installation.
466*e7c364b6SAndroid Build Coastguard Worker   //
467*e7c364b6SAndroid Build Coastguard Worker   //   clear_display
468*e7c364b6SAndroid Build Coastguard Worker   //       turn off the text display.
469*e7c364b6SAndroid Build Coastguard Worker   //
470*e7c364b6SAndroid Build Coastguard Worker   //   enable_reboot
471*e7c364b6SAndroid Build Coastguard Worker   //       packages can explicitly request that they want the user to be able to reboot during
472*e7c364b6SAndroid Build Coastguard Worker   //       installation (useful for debugging packages that don't exit).
473*e7c364b6SAndroid Build Coastguard Worker   //
474*e7c364b6SAndroid Build Coastguard Worker   //   retry_update
475*e7c364b6SAndroid Build Coastguard Worker   //       updater encounters some issue during the update. It requests a reboot to retry the same
476*e7c364b6SAndroid Build Coastguard Worker   //       package automatically.
477*e7c364b6SAndroid Build Coastguard Worker   //
478*e7c364b6SAndroid Build Coastguard Worker   //   log <string>
479*e7c364b6SAndroid Build Coastguard Worker   //       updater requests logging the string (e.g. cause of the failure).
480*e7c364b6SAndroid Build Coastguard Worker   //
481*e7c364b6SAndroid Build Coastguard Worker 
482*e7c364b6SAndroid Build Coastguard Worker   std::string package_path = package->GetPath();
483*e7c364b6SAndroid Build Coastguard Worker 
484*e7c364b6SAndroid Build Coastguard Worker   std::vector<std::string> args;
485*e7c364b6SAndroid Build Coastguard Worker   if (auto setup_result =
486*e7c364b6SAndroid Build Coastguard Worker           package_is_ab
487*e7c364b6SAndroid Build Coastguard Worker               ? SetUpAbUpdateCommands(package_path, zip, pipe_write.get(), &args)
488*e7c364b6SAndroid Build Coastguard Worker               : SetUpNonAbUpdateCommands(package_path, zip, retry_count, pipe_write.get(), &args);
489*e7c364b6SAndroid Build Coastguard Worker       !setup_result) {
490*e7c364b6SAndroid Build Coastguard Worker     log_buffer->push_back(android::base::StringPrintf("error: %d", kUpdateBinaryCommandFailure));
491*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_CORRUPT;
492*e7c364b6SAndroid Build Coastguard Worker   }
493*e7c364b6SAndroid Build Coastguard Worker 
494*e7c364b6SAndroid Build Coastguard Worker   pid_t pid = fork();
495*e7c364b6SAndroid Build Coastguard Worker   if (pid == -1) {
496*e7c364b6SAndroid Build Coastguard Worker     PLOG(ERROR) << "Failed to fork update binary";
497*e7c364b6SAndroid Build Coastguard Worker     log_buffer->push_back(android::base::StringPrintf("error: %d", kForkUpdateBinaryFailure));
498*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_ERROR;
499*e7c364b6SAndroid Build Coastguard Worker   }
500*e7c364b6SAndroid Build Coastguard Worker 
501*e7c364b6SAndroid Build Coastguard Worker   if (pid == 0) {
502*e7c364b6SAndroid Build Coastguard Worker     umask(022);
503*e7c364b6SAndroid Build Coastguard Worker     pipe_read.reset();
504*e7c364b6SAndroid Build Coastguard Worker 
505*e7c364b6SAndroid Build Coastguard Worker     // Convert the std::string vector to a NULL-terminated char* vector suitable for execv.
506*e7c364b6SAndroid Build Coastguard Worker     auto chr_args = StringVectorToNullTerminatedArray(args);
507*e7c364b6SAndroid Build Coastguard Worker     execv(chr_args[0], chr_args.data());
508*e7c364b6SAndroid Build Coastguard Worker     // We shouldn't use LOG/PLOG in the forked process, since they may cause the child process to
509*e7c364b6SAndroid Build Coastguard Worker     // hang. This deadlock results from an improperly copied mutex in the ui functions.
510*e7c364b6SAndroid Build Coastguard Worker     // (Bug: 34769056)
511*e7c364b6SAndroid Build Coastguard Worker     fprintf(stdout, "E:Can't run %s (%s)\n", chr_args[0], strerror(errno));
512*e7c364b6SAndroid Build Coastguard Worker     _exit(EXIT_FAILURE);
513*e7c364b6SAndroid Build Coastguard Worker   }
514*e7c364b6SAndroid Build Coastguard Worker   pipe_write.reset();
515*e7c364b6SAndroid Build Coastguard Worker 
516*e7c364b6SAndroid Build Coastguard Worker   std::atomic<bool> logger_finished(false);
517*e7c364b6SAndroid Build Coastguard Worker   std::thread temperature_logger(log_max_temperature, max_temperature, std::ref(logger_finished));
518*e7c364b6SAndroid Build Coastguard Worker 
519*e7c364b6SAndroid Build Coastguard Worker   *wipe_cache = false;
520*e7c364b6SAndroid Build Coastguard Worker   bool retry_update = false;
521*e7c364b6SAndroid Build Coastguard Worker 
522*e7c364b6SAndroid Build Coastguard Worker   char buffer[1024];
523*e7c364b6SAndroid Build Coastguard Worker   FILE* from_child = android::base::Fdopen(std::move(pipe_read), "r");
524*e7c364b6SAndroid Build Coastguard Worker   while (fgets(buffer, sizeof(buffer), from_child) != nullptr) {
525*e7c364b6SAndroid Build Coastguard Worker     std::string line(buffer);
526*e7c364b6SAndroid Build Coastguard Worker     size_t space = line.find_first_of(" \n");
527*e7c364b6SAndroid Build Coastguard Worker     std::string command(line.substr(0, space));
528*e7c364b6SAndroid Build Coastguard Worker     if (command.empty()) continue;
529*e7c364b6SAndroid Build Coastguard Worker 
530*e7c364b6SAndroid Build Coastguard Worker     // Get rid of the leading and trailing space and/or newline.
531*e7c364b6SAndroid Build Coastguard Worker     std::string args = space == std::string::npos ? "" : android::base::Trim(line.substr(space));
532*e7c364b6SAndroid Build Coastguard Worker 
533*e7c364b6SAndroid Build Coastguard Worker     if (command == "progress") {
534*e7c364b6SAndroid Build Coastguard Worker       std::vector<std::string> tokens = android::base::Split(args, " ");
535*e7c364b6SAndroid Build Coastguard Worker       double fraction;
536*e7c364b6SAndroid Build Coastguard Worker       int seconds;
537*e7c364b6SAndroid Build Coastguard Worker       if (tokens.size() == 2 && android::base::ParseDouble(tokens[0].c_str(), &fraction) &&
538*e7c364b6SAndroid Build Coastguard Worker           android::base::ParseInt(tokens[1], &seconds)) {
539*e7c364b6SAndroid Build Coastguard Worker         ui->ShowProgress(fraction * (1 - VERIFICATION_PROGRESS_FRACTION), seconds);
540*e7c364b6SAndroid Build Coastguard Worker       } else {
541*e7c364b6SAndroid Build Coastguard Worker         LOG(ERROR) << "invalid \"progress\" parameters: " << line;
542*e7c364b6SAndroid Build Coastguard Worker       }
543*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "set_progress") {
544*e7c364b6SAndroid Build Coastguard Worker       std::vector<std::string> tokens = android::base::Split(args, " ");
545*e7c364b6SAndroid Build Coastguard Worker       double fraction;
546*e7c364b6SAndroid Build Coastguard Worker       if (tokens.size() == 1 && android::base::ParseDouble(tokens[0].c_str(), &fraction)) {
547*e7c364b6SAndroid Build Coastguard Worker         ui->SetProgress(fraction);
548*e7c364b6SAndroid Build Coastguard Worker       } else {
549*e7c364b6SAndroid Build Coastguard Worker         LOG(ERROR) << "invalid \"set_progress\" parameters: " << line;
550*e7c364b6SAndroid Build Coastguard Worker       }
551*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "ui_print") {
552*e7c364b6SAndroid Build Coastguard Worker       ui->PrintOnScreenOnly("%s\n", args.c_str());
553*e7c364b6SAndroid Build Coastguard Worker       fflush(stdout);
554*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "wipe_cache") {
555*e7c364b6SAndroid Build Coastguard Worker       *wipe_cache = true;
556*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "clear_display") {
557*e7c364b6SAndroid Build Coastguard Worker       ui->SetBackground(RecoveryUI::NONE);
558*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "enable_reboot") {
559*e7c364b6SAndroid Build Coastguard Worker       // packages can explicitly request that they want the user
560*e7c364b6SAndroid Build Coastguard Worker       // to be able to reboot during installation (useful for
561*e7c364b6SAndroid Build Coastguard Worker       // debugging packages that don't exit).
562*e7c364b6SAndroid Build Coastguard Worker       ui->SetEnableReboot(true);
563*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "retry_update") {
564*e7c364b6SAndroid Build Coastguard Worker       retry_update = true;
565*e7c364b6SAndroid Build Coastguard Worker     } else if (command == "log") {
566*e7c364b6SAndroid Build Coastguard Worker       if (!args.empty()) {
567*e7c364b6SAndroid Build Coastguard Worker         // Save the logging request from updater and write to last_install later.
568*e7c364b6SAndroid Build Coastguard Worker         log_buffer->push_back(args);
569*e7c364b6SAndroid Build Coastguard Worker       } else {
570*e7c364b6SAndroid Build Coastguard Worker         LOG(ERROR) << "invalid \"log\" parameters: " << line;
571*e7c364b6SAndroid Build Coastguard Worker       }
572*e7c364b6SAndroid Build Coastguard Worker     } else {
573*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "unknown command [" << command << "]";
574*e7c364b6SAndroid Build Coastguard Worker     }
575*e7c364b6SAndroid Build Coastguard Worker   }
576*e7c364b6SAndroid Build Coastguard Worker   fclose(from_child);
577*e7c364b6SAndroid Build Coastguard Worker 
578*e7c364b6SAndroid Build Coastguard Worker   int status;
579*e7c364b6SAndroid Build Coastguard Worker   waitpid(pid, &status, 0);
580*e7c364b6SAndroid Build Coastguard Worker 
581*e7c364b6SAndroid Build Coastguard Worker   logger_finished.store(true);
582*e7c364b6SAndroid Build Coastguard Worker   finish_log_temperature.notify_one();
583*e7c364b6SAndroid Build Coastguard Worker   temperature_logger.join();
584*e7c364b6SAndroid Build Coastguard Worker 
585*e7c364b6SAndroid Build Coastguard Worker   if (retry_update) {
586*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_RETRY;
587*e7c364b6SAndroid Build Coastguard Worker   }
588*e7c364b6SAndroid Build Coastguard Worker   if (WIFEXITED(status)) {
589*e7c364b6SAndroid Build Coastguard Worker     if (WEXITSTATUS(status) != EXIT_SUCCESS) {
590*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Error in " << package_path << " (status " << WEXITSTATUS(status) << ")";
591*e7c364b6SAndroid Build Coastguard Worker       return INSTALL_ERROR;
592*e7c364b6SAndroid Build Coastguard Worker     }
593*e7c364b6SAndroid Build Coastguard Worker   } else if (WIFSIGNALED(status)) {
594*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Error in " << package_path << " (killed by signal " << WTERMSIG(status) << ")";
595*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_ERROR;
596*e7c364b6SAndroid Build Coastguard Worker   } else {
597*e7c364b6SAndroid Build Coastguard Worker     LOG(FATAL) << "Invalid status code " << status;
598*e7c364b6SAndroid Build Coastguard Worker   }
599*e7c364b6SAndroid Build Coastguard Worker   if (package_is_ab) {
600*e7c364b6SAndroid Build Coastguard Worker     PerformPowerwashIfRequired(zip, device);
601*e7c364b6SAndroid Build Coastguard Worker   }
602*e7c364b6SAndroid Build Coastguard Worker 
603*e7c364b6SAndroid Build Coastguard Worker   return INSTALL_SUCCESS;
604*e7c364b6SAndroid Build Coastguard Worker }
605*e7c364b6SAndroid Build Coastguard Worker 
VerifyAndInstallPackage(Package * package,bool * wipe_cache,std::vector<std::string> * log_buffer,int retry_count,int * max_temperature,Device * device)606*e7c364b6SAndroid Build Coastguard Worker static InstallResult VerifyAndInstallPackage(Package* package, bool* wipe_cache,
607*e7c364b6SAndroid Build Coastguard Worker                                              std::vector<std::string>* log_buffer, int retry_count,
608*e7c364b6SAndroid Build Coastguard Worker                                              int* max_temperature, Device* device) {
609*e7c364b6SAndroid Build Coastguard Worker   auto ui = device->GetUI();
610*e7c364b6SAndroid Build Coastguard Worker   ui->SetBackground(RecoveryUI::INSTALLING_UPDATE);
611*e7c364b6SAndroid Build Coastguard Worker   // Give verification half the progress bar...
612*e7c364b6SAndroid Build Coastguard Worker   ui->SetProgressType(RecoveryUI::DETERMINATE);
613*e7c364b6SAndroid Build Coastguard Worker   ui->ShowProgress(VERIFICATION_PROGRESS_FRACTION, VERIFICATION_PROGRESS_TIME);
614*e7c364b6SAndroid Build Coastguard Worker 
615*e7c364b6SAndroid Build Coastguard Worker   // Verify package.
616*e7c364b6SAndroid Build Coastguard Worker   if (!verify_package(package, ui)) {
617*e7c364b6SAndroid Build Coastguard Worker     log_buffer->push_back(android::base::StringPrintf("error: %d", kZipVerificationFailure));
618*e7c364b6SAndroid Build Coastguard Worker     return INSTALL_CORRUPT;
619*e7c364b6SAndroid Build Coastguard Worker   }
620*e7c364b6SAndroid Build Coastguard Worker 
621*e7c364b6SAndroid Build Coastguard Worker   // Verify and install the contents of the package.
622*e7c364b6SAndroid Build Coastguard Worker   ui->Print("Installing update...\n");
623*e7c364b6SAndroid Build Coastguard Worker   if (retry_count > 0) {
624*e7c364b6SAndroid Build Coastguard Worker     ui->Print("Retry attempt: %d\n", retry_count);
625*e7c364b6SAndroid Build Coastguard Worker   }
626*e7c364b6SAndroid Build Coastguard Worker   ui->SetEnableReboot(false);
627*e7c364b6SAndroid Build Coastguard Worker   auto result =
628*e7c364b6SAndroid Build Coastguard Worker       TryUpdateBinary(package, wipe_cache, log_buffer, retry_count, max_temperature, device);
629*e7c364b6SAndroid Build Coastguard Worker   ui->SetEnableReboot(true);
630*e7c364b6SAndroid Build Coastguard Worker   ui->Print("\n");
631*e7c364b6SAndroid Build Coastguard Worker 
632*e7c364b6SAndroid Build Coastguard Worker   return result;
633*e7c364b6SAndroid Build Coastguard Worker }
634*e7c364b6SAndroid Build Coastguard Worker 
InstallPackage(Package * package,const std::string_view package_id,bool should_wipe_cache,int retry_count,Device * device)635*e7c364b6SAndroid Build Coastguard Worker InstallResult InstallPackage(Package* package, const std::string_view package_id,
636*e7c364b6SAndroid Build Coastguard Worker                              bool should_wipe_cache, int retry_count, Device* device) {
637*e7c364b6SAndroid Build Coastguard Worker   auto ui = device->GetUI();
638*e7c364b6SAndroid Build Coastguard Worker   auto start = std::chrono::system_clock::now();
639*e7c364b6SAndroid Build Coastguard Worker 
640*e7c364b6SAndroid Build Coastguard Worker   int start_temperature = GetMaxValueFromThermalZone();
641*e7c364b6SAndroid Build Coastguard Worker   int max_temperature = start_temperature;
642*e7c364b6SAndroid Build Coastguard Worker 
643*e7c364b6SAndroid Build Coastguard Worker   InstallResult result;
644*e7c364b6SAndroid Build Coastguard Worker   std::vector<std::string> log_buffer;
645*e7c364b6SAndroid Build Coastguard Worker 
646*e7c364b6SAndroid Build Coastguard Worker   ui->Print("Supported API: %d\n", kRecoveryApiVersion);
647*e7c364b6SAndroid Build Coastguard Worker 
648*e7c364b6SAndroid Build Coastguard Worker   ui->Print("Finding update package...\n");
649*e7c364b6SAndroid Build Coastguard Worker   LOG(INFO) << "Update package id: " << package_id;
650*e7c364b6SAndroid Build Coastguard Worker   if (!package) {
651*e7c364b6SAndroid Build Coastguard Worker     log_buffer.push_back(android::base::StringPrintf("error: %d", kMapFileFailure));
652*e7c364b6SAndroid Build Coastguard Worker     result = INSTALL_CORRUPT;
653*e7c364b6SAndroid Build Coastguard Worker   } else if (setup_install_mounts() != 0) {
654*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "failed to set up expected mounts for install; aborting";
655*e7c364b6SAndroid Build Coastguard Worker     result = INSTALL_ERROR;
656*e7c364b6SAndroid Build Coastguard Worker   } else {
657*e7c364b6SAndroid Build Coastguard Worker     bool updater_wipe_cache = false;
658*e7c364b6SAndroid Build Coastguard Worker     result = VerifyAndInstallPackage(package, &updater_wipe_cache, &log_buffer, retry_count,
659*e7c364b6SAndroid Build Coastguard Worker                                      &max_temperature, device);
660*e7c364b6SAndroid Build Coastguard Worker     should_wipe_cache = should_wipe_cache || updater_wipe_cache;
661*e7c364b6SAndroid Build Coastguard Worker   }
662*e7c364b6SAndroid Build Coastguard Worker 
663*e7c364b6SAndroid Build Coastguard Worker   // Measure the time spent to apply OTA update in seconds.
664*e7c364b6SAndroid Build Coastguard Worker   std::chrono::duration<double> duration = std::chrono::system_clock::now() - start;
665*e7c364b6SAndroid Build Coastguard Worker   int time_total = static_cast<int>(duration.count());
666*e7c364b6SAndroid Build Coastguard Worker 
667*e7c364b6SAndroid Build Coastguard Worker   bool has_cache = volume_for_mount_point("/cache") != nullptr;
668*e7c364b6SAndroid Build Coastguard Worker   // Skip logging the uncrypt_status on devices without /cache.
669*e7c364b6SAndroid Build Coastguard Worker   if (has_cache) {
670*e7c364b6SAndroid Build Coastguard Worker     static constexpr const char* UNCRYPT_STATUS = "/cache/recovery/uncrypt_status";
671*e7c364b6SAndroid Build Coastguard Worker     if (ensure_path_mounted(UNCRYPT_STATUS) != 0) {
672*e7c364b6SAndroid Build Coastguard Worker       LOG(WARNING) << "Can't mount " << UNCRYPT_STATUS;
673*e7c364b6SAndroid Build Coastguard Worker     } else {
674*e7c364b6SAndroid Build Coastguard Worker       std::string uncrypt_status;
675*e7c364b6SAndroid Build Coastguard Worker       if (!android::base::ReadFileToString(UNCRYPT_STATUS, &uncrypt_status)) {
676*e7c364b6SAndroid Build Coastguard Worker         PLOG(WARNING) << "failed to read uncrypt status";
677*e7c364b6SAndroid Build Coastguard Worker       } else if (!android::base::StartsWith(uncrypt_status, "uncrypt_")) {
678*e7c364b6SAndroid Build Coastguard Worker         LOG(WARNING) << "corrupted uncrypt_status: " << uncrypt_status;
679*e7c364b6SAndroid Build Coastguard Worker       } else {
680*e7c364b6SAndroid Build Coastguard Worker         log_buffer.push_back(android::base::Trim(uncrypt_status));
681*e7c364b6SAndroid Build Coastguard Worker       }
682*e7c364b6SAndroid Build Coastguard Worker     }
683*e7c364b6SAndroid Build Coastguard Worker   }
684*e7c364b6SAndroid Build Coastguard Worker 
685*e7c364b6SAndroid Build Coastguard Worker   // The first two lines need to be the package name and install result.
686*e7c364b6SAndroid Build Coastguard Worker   std::vector<std::string> log_header = {
687*e7c364b6SAndroid Build Coastguard Worker     std::string(package_id),
688*e7c364b6SAndroid Build Coastguard Worker     result == INSTALL_SUCCESS ? "1" : "0",
689*e7c364b6SAndroid Build Coastguard Worker     "time_total: " + std::to_string(time_total),
690*e7c364b6SAndroid Build Coastguard Worker     "retry: " + std::to_string(retry_count),
691*e7c364b6SAndroid Build Coastguard Worker   };
692*e7c364b6SAndroid Build Coastguard Worker 
693*e7c364b6SAndroid Build Coastguard Worker   int end_temperature = GetMaxValueFromThermalZone();
694*e7c364b6SAndroid Build Coastguard Worker   max_temperature = std::max(end_temperature, max_temperature);
695*e7c364b6SAndroid Build Coastguard Worker   if (start_temperature > 0) {
696*e7c364b6SAndroid Build Coastguard Worker     log_buffer.push_back("temperature_start: " + std::to_string(start_temperature));
697*e7c364b6SAndroid Build Coastguard Worker   }
698*e7c364b6SAndroid Build Coastguard Worker   if (end_temperature > 0) {
699*e7c364b6SAndroid Build Coastguard Worker     log_buffer.push_back("temperature_end: " + std::to_string(end_temperature));
700*e7c364b6SAndroid Build Coastguard Worker   }
701*e7c364b6SAndroid Build Coastguard Worker   if (max_temperature > 0) {
702*e7c364b6SAndroid Build Coastguard Worker     log_buffer.push_back("temperature_max: " + std::to_string(max_temperature));
703*e7c364b6SAndroid Build Coastguard Worker   }
704*e7c364b6SAndroid Build Coastguard Worker 
705*e7c364b6SAndroid Build Coastguard Worker   std::string log_content =
706*e7c364b6SAndroid Build Coastguard Worker       android::base::Join(log_header, "\n") + "\n" + android::base::Join(log_buffer, "\n") + "\n";
707*e7c364b6SAndroid Build Coastguard Worker   const std::string& install_file = Paths::Get().temporary_install_file();
708*e7c364b6SAndroid Build Coastguard Worker   if (!android::base::WriteStringToFile(log_content, install_file)) {
709*e7c364b6SAndroid Build Coastguard Worker     PLOG(ERROR) << "failed to write " << install_file;
710*e7c364b6SAndroid Build Coastguard Worker   }
711*e7c364b6SAndroid Build Coastguard Worker 
712*e7c364b6SAndroid Build Coastguard Worker   // Write a copy into last_log.
713*e7c364b6SAndroid Build Coastguard Worker   LOG(INFO) << log_content;
714*e7c364b6SAndroid Build Coastguard Worker 
715*e7c364b6SAndroid Build Coastguard Worker   if (result == INSTALL_SUCCESS && should_wipe_cache) {
716*e7c364b6SAndroid Build Coastguard Worker     if (!WipeCache(ui, nullptr)) {
717*e7c364b6SAndroid Build Coastguard Worker       result = INSTALL_ERROR;
718*e7c364b6SAndroid Build Coastguard Worker     }
719*e7c364b6SAndroid Build Coastguard Worker   }
720*e7c364b6SAndroid Build Coastguard Worker 
721*e7c364b6SAndroid Build Coastguard Worker   return result;
722*e7c364b6SAndroid Build Coastguard Worker }
723*e7c364b6SAndroid Build Coastguard Worker 
verify_package(Package * package,RecoveryUI * ui)724*e7c364b6SAndroid Build Coastguard Worker bool verify_package(Package* package, RecoveryUI* ui) {
725*e7c364b6SAndroid Build Coastguard Worker   static constexpr const char* CERTIFICATE_ZIP_FILE = "/system/etc/security/otacerts.zip";
726*e7c364b6SAndroid Build Coastguard Worker   std::vector<Certificate> loaded_keys = LoadKeysFromZipfile(CERTIFICATE_ZIP_FILE);
727*e7c364b6SAndroid Build Coastguard Worker   if (loaded_keys.empty()) {
728*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to load keys";
729*e7c364b6SAndroid Build Coastguard Worker     return false;
730*e7c364b6SAndroid Build Coastguard Worker   }
731*e7c364b6SAndroid Build Coastguard Worker   LOG(INFO) << loaded_keys.size() << " key(s) loaded from " << CERTIFICATE_ZIP_FILE;
732*e7c364b6SAndroid Build Coastguard Worker 
733*e7c364b6SAndroid Build Coastguard Worker   // Verify package.
734*e7c364b6SAndroid Build Coastguard Worker   ui->Print("Verifying update package...\n");
735*e7c364b6SAndroid Build Coastguard Worker   auto t0 = std::chrono::system_clock::now();
736*e7c364b6SAndroid Build Coastguard Worker   int err = verify_file(package, loaded_keys);
737*e7c364b6SAndroid Build Coastguard Worker   std::chrono::duration<double> duration = std::chrono::system_clock::now() - t0;
738*e7c364b6SAndroid Build Coastguard Worker   ui->Print("Update package verification took %.1f s (result %d).\n", duration.count(), err);
739*e7c364b6SAndroid Build Coastguard Worker   if (err != VERIFY_SUCCESS) {
740*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Signature verification failed";
741*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "error: " << kZipVerificationFailure;
742*e7c364b6SAndroid Build Coastguard Worker     return false;
743*e7c364b6SAndroid Build Coastguard Worker   }
744*e7c364b6SAndroid Build Coastguard Worker   return true;
745*e7c364b6SAndroid Build Coastguard Worker }
746*e7c364b6SAndroid Build Coastguard Worker 
SetupPackageMount(const std::string & package_path,bool * should_use_fuse)747*e7c364b6SAndroid Build Coastguard Worker bool SetupPackageMount(const std::string& package_path, bool* should_use_fuse) {
748*e7c364b6SAndroid Build Coastguard Worker   CHECK(should_use_fuse != nullptr);
749*e7c364b6SAndroid Build Coastguard Worker 
750*e7c364b6SAndroid Build Coastguard Worker   if (package_path.empty()) {
751*e7c364b6SAndroid Build Coastguard Worker     return false;
752*e7c364b6SAndroid Build Coastguard Worker   }
753*e7c364b6SAndroid Build Coastguard Worker 
754*e7c364b6SAndroid Build Coastguard Worker   *should_use_fuse = true;
755*e7c364b6SAndroid Build Coastguard Worker   if (package_path[0] == '@') {
756*e7c364b6SAndroid Build Coastguard Worker     auto block_map_path = package_path.substr(1);
757*e7c364b6SAndroid Build Coastguard Worker     if (ensure_path_mounted(block_map_path) != 0) {
758*e7c364b6SAndroid Build Coastguard Worker       LOG(ERROR) << "Failed to mount " << block_map_path;
759*e7c364b6SAndroid Build Coastguard Worker       return false;
760*e7c364b6SAndroid Build Coastguard Worker     }
761*e7c364b6SAndroid Build Coastguard Worker     // uncrypt only produces block map only if the package stays on /data.
762*e7c364b6SAndroid Build Coastguard Worker     *should_use_fuse = false;
763*e7c364b6SAndroid Build Coastguard Worker     return true;
764*e7c364b6SAndroid Build Coastguard Worker   }
765*e7c364b6SAndroid Build Coastguard Worker 
766*e7c364b6SAndroid Build Coastguard Worker   // Package is not a block map file.
767*e7c364b6SAndroid Build Coastguard Worker   if (ensure_path_mounted(package_path) != 0) {
768*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to mount " << package_path;
769*e7c364b6SAndroid Build Coastguard Worker     return false;
770*e7c364b6SAndroid Build Coastguard Worker   }
771*e7c364b6SAndroid Build Coastguard Worker 
772*e7c364b6SAndroid Build Coastguard Worker   // Reject the package if the input path doesn't equal the canonicalized path.
773*e7c364b6SAndroid Build Coastguard Worker   // e.g. /cache/../sdcard/update_package.
774*e7c364b6SAndroid Build Coastguard Worker   std::error_code ec;
775*e7c364b6SAndroid Build Coastguard Worker   auto canonical_path = std::filesystem::canonical(package_path, ec);
776*e7c364b6SAndroid Build Coastguard Worker   if (ec) {
777*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Failed to get canonical of " << package_path << ", " << ec.message();
778*e7c364b6SAndroid Build Coastguard Worker     return false;
779*e7c364b6SAndroid Build Coastguard Worker   }
780*e7c364b6SAndroid Build Coastguard Worker   if (canonical_path.string() != package_path) {
781*e7c364b6SAndroid Build Coastguard Worker     LOG(ERROR) << "Installation aborts. The canonical path " << canonical_path.string()
782*e7c364b6SAndroid Build Coastguard Worker                << " doesn't equal the original path " << package_path;
783*e7c364b6SAndroid Build Coastguard Worker     return false;
784*e7c364b6SAndroid Build Coastguard Worker   }
785*e7c364b6SAndroid Build Coastguard Worker 
786*e7c364b6SAndroid Build Coastguard Worker   constexpr const char* CACHE_ROOT = "/cache";
787*e7c364b6SAndroid Build Coastguard Worker   if (android::base::StartsWith(package_path, CACHE_ROOT)) {
788*e7c364b6SAndroid Build Coastguard Worker     *should_use_fuse = false;
789*e7c364b6SAndroid Build Coastguard Worker   }
790*e7c364b6SAndroid Build Coastguard Worker   return true;
791*e7c364b6SAndroid Build Coastguard Worker }
792*e7c364b6SAndroid Build Coastguard Worker 
793*e7c364b6SAndroid Build Coastguard Worker // Check if `target_token` is in string `str_list`, where `str_list` is expected to be a
794*e7c364b6SAndroid Build Coastguard Worker // list delimited by `deliminator`
795*e7c364b6SAndroid Build Coastguard Worker // E.X. isInStringList("a", "a|b|c|d", "|") => true
796*e7c364b6SAndroid Build Coastguard Worker // E.X. isInStringList("abc", "abc", "|") => true
isInStringList(const std::string & target_token,const std::string & str_list,const std::string & deliminator)797*e7c364b6SAndroid Build Coastguard Worker static bool isInStringList(const std::string& target_token, const std::string& str_list,
798*e7c364b6SAndroid Build Coastguard Worker                            const std::string& deliminator) {
799*e7c364b6SAndroid Build Coastguard Worker   if (target_token.length() > str_list.length()) {
800*e7c364b6SAndroid Build Coastguard Worker     return false;
801*e7c364b6SAndroid Build Coastguard Worker   } else if (target_token.length() == str_list.length() || deliminator.length() == 0) {
802*e7c364b6SAndroid Build Coastguard Worker     return target_token == str_list;
803*e7c364b6SAndroid Build Coastguard Worker   }
804*e7c364b6SAndroid Build Coastguard Worker   auto&& list = android::base::Split(str_list, deliminator);
805*e7c364b6SAndroid Build Coastguard Worker   return std::find(list.begin(), list.end(), target_token) != list.end();
806*e7c364b6SAndroid Build Coastguard Worker }
807