blob: f9db33bc79aa67b2a0246c4cbba0d14348ebb88a [file] [log] [blame]
# -*- coding: utf-8 -*-
# Copyright 2015 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Utilities for setting up and cleaning up the chroot environment."""
from __future__ import print_function
import collections
import os
import re
import sys
import time
from chromite.lib import constants
from chromite.lib import cros_build_lib
from chromite.lib import cros_logging as logging
from chromite.lib import osutils
from chromite.lib import path_util
from chromite.lib import timeout_util
assert sys.version_info >= (3, 6), 'This module requires Python 3.6+'
# Version file location inside chroot.
CHROOT_VERSION_FILE = '/etc/cros_chroot_version'
# Version hooks directory.
# Name of the LV that contains the active chroot inside the chroot.img file.
CHROOT_LV_NAME = 'chroot'
# Name of the thin pool used for the chroot and snapshots inside chroot.img.
# Max times to recheck the result of an lvm command that doesn't finish quickly.
class Error(Exception):
"""Base cros sdk error class."""
class ChrootDeprecatedError(Error):
"""Raised when the chroot is too old to update."""
def __init__(self, *args, **kwargs):
# Message defined here because it's long and gives specific instructions.
msg = ('Upgrade hook missing for your chroot version.\n'
'Your chroot is so old that some updates have been deprecated and'
'it will need to be recreated. A fresh chroot can be built with:\n'
' cros_sdk --replace\n')
super(ChrootDeprecatedError, self).__init__(msg, *args, **kwargs)
class ChrootUpdateError(Error):
"""Error encountered when updating the chroot."""
class InvalidChrootVersionError(Error):
"""Chroot version is not a valid version."""
class UninitializedChrootError(Error):
"""Chroot has not been initialized."""
class VersionHasMultipleHooksError(Error):
"""When it is found that a single version has multiple hooks."""
def GetChrootVersion(chroot):
"""Extract the version of the chroot.
chroot: Full path to the chroot to examine.
The version of the chroot dir, or None if the version is missing/invalid.
if chroot:
ver_path = os.path.join(chroot, CHROOT_VERSION_FILE.lstrip(os.sep))
updater = ChrootUpdater(version_file=ver_path)
return updater.GetVersion()
except (IOError, Error) as e:
return None
def IsChrootVersionValid(chroot_path, hooks_dir=None):
"""Check if the chroot version exists and is a valid version."""
version = GetChrootVersion(chroot_path)
return version and version <= LatestChrootVersion(hooks_dir)
def LatestChrootVersion(hooks_dir=None):
"""Get the most recent update hook version."""
hook_files = os.listdir(hooks_dir or _CHROOT_VERSION_HOOKS_DIR)
# Hook file names must follow the "version_short_description" convention.
# Pull out just the version number and find the max.
return max(int(hook.split('_', 1)[0]) for hook in hook_files)
def EarliestChrootVersion(hooks_dir=None):
"""Get the oldest update hook version."""
hook_files = os.listdir(hooks_dir or _CHROOT_VERSION_HOOKS_DIR)
# Hook file names must follow the "version_short_description" convention.
# Pull out just the version number and find the max.
return min(int(hook.split('_', 1)[0]) for hook in hook_files)
def IsChrootDirValid(chroot_path):
"""Check the permissions and owner on a chroot directory.
chroot_path: The path to a chroot.
bool - False iff there are incorrect values on an existing directory.
if not os.path.exists(chroot_path):
# No directory == no incorrect values.
return True
return (IsChrootOwnerValid(chroot_path) and
def IsChrootOwnerValid(chroot_path):
"""Check if the chroot owner is root."""
chroot_stat = os.stat(chroot_path)
return not chroot_stat.st_uid and not chroot_stat.st_gid
def IsChrootPermissionsValid(chroot_path):
"""Check if the permissions on the directory are correct."""
chroot_stat = os.stat(chroot_path)
return chroot_stat.st_mode & 0o7777 == 0o755
def IsChrootReady(chroot):
"""Checks if the chroot is mounted and set up.
/etc/cros_chroot_version is set to the current version of the chroot at the
end of the setup process. If this file exists and contains a non-zero value,
the chroot is ready for use.
chroot: Full path to the chroot to examine.
True iff the chroot contains a valid version.
version = GetChrootVersion(chroot)
return version is not None and version > 0
def FindVolumeGroupForDevice(chroot_path, chroot_dev):
"""Find a usable VG name for a given path and device.
If there is an existing VG associated with the device, it will be returned
even if the path doesn't match. If not, find an unused name in the format
cros_<safe_path>_NNN, where safe_path is an escaped version of the last 90
characters of the path and NNN is a counter. Example:
/home/user/cros/chroot/ -> cros_home+user+cros+chroot_000.
If no unused name with this pattern can be found, return None.
A VG with the returned name will not necessarily exist. The caller should
call vgs or otherwise check the name before attempting to use it.
chroot_path: Path where the chroot will be mounted.
chroot_dev: Device that should hold the VG, e.g. /dev/loop0.
A VG name that can be used for the chroot/device pair, or None if no name
can be found.
safe_path = re.sub(r'[^A-Za-z0-9_+.-]', '+', chroot_path.strip('/'))[-90:]
vg_prefix = 'cros_%s_' % safe_path
cmd = ['pvs', '-q', '--noheadings', '-o', 'vg_name,pv_name', '--unbuffered',
'--separator', '\t']
result = cros_build_lib.sudo_run(
cmd, capture_output=True, print_cmd=False, encoding='utf-8')
existing_vgs = set()
for line in result.output.strip().splitlines():
# Typical lines are ' vg_name\tpv_name\n'. Match with a regex
# instead of split because the first field can be empty or missing when
# a VG isn't completely set up.
match = re.match(r'([^\t]+)\t(.*)$', line.strip(' '))
if not match:
vg_name, pv_name =,
if chroot_dev == pv_name:
return vg_name
elif vg_name.startswith(vg_prefix):
for i in range(1000):
vg_name = '%s%03d' % (vg_prefix, i)
if vg_name not in existing_vgs:
return vg_name
logging.error('Unable to find an unused VG with prefix %s', vg_prefix)
return None
def _DeviceFromFile(chroot_image):
"""Finds the loopback device associated with |chroot_image|.
The path to a loopback device (e.g. /dev/loop0) attached to |chroot_image|
if one is found, or None if no device is found.
chroot_dev = None
cmd = ['losetup', '-j', chroot_image]
result = cros_build_lib.sudo_run(
cmd, capture_output=True, check=False, print_cmd=False,
if result.returncode == 0:
match = re.match(r'/dev/loop\d+', result.output)
if match:
chroot_dev =
return chroot_dev
def _AttachDeviceToFile(chroot_image):
"""Attaches a new loopback device to |chroot_image|.
The path to the new loopback device.
RunCommandError: The losetup command failed to attach a new device.
cmd = ['losetup', '--show', '-f', chroot_image]
# Result should be '/dev/loopN\n' for whatever loop device is chosen.
result = cros_build_lib.sudo_run(
cmd, capture_output=True, print_cmd=False, encoding='utf-8')
chroot_dev = result.output.strip()
# Force rescanning the new device in case lvmetad doesn't pick it up.
return chroot_dev
def MountChroot(chroot=None, buildroot=None, create=True,
"""Mount a chroot image on |chroot| if it doesn't already contain a chroot.
This function does not populate the chroot. If there is an existing .img
file, it will be mounted on |chroot|. Otherwise a new empty filesystem will
be mounted. This function is a no-op if |chroot| already appears to contain
a populated chroot.
chroot: Full path to the chroot to examine, or None to find it relative
to |buildroot|.
buildroot: Ignored if |chroot| is set. If |chroot| is None, find the chroot
relative to |buildroot|.
create: Create a new image file if needed. If False, only mount an
existing image.
proc_mounts: Full path to a file containing a list of mounted filesystems.
Intended for testing only.
True if the chroot is mounted, or False if not.
RunCommandError: An external command failed.
if chroot is None and buildroot is None:
raise ValueError('need either |chroot| or |buildroot| to search')
if chroot is None:
chroot = os.path.join(buildroot, constants.DEFAULT_CHROOT_DIR)
# If there's a version file, this chroot is already set up.
ver_path = os.path.join(chroot, 'etc', 'cros_chroot_version')
if os.path.exists(ver_path):
return True
# Even if there isn't a version file in the chroot, there might already
# be an image mounted on it.
chroot_vg, chroot_lv = FindChrootMountSource(chroot, proc_mounts=proc_mounts)
if chroot_vg and chroot_lv:
return True
# Make sure nothing else is mounted on the chroot. We could mount over the
# top, but this seems likely to be an error, so we'll bail out instead.
chroot_mounts = [m.source
for m in osutils.IterateMountPoints(proc_file=proc_mounts)
if m.destination == chroot]
if chroot_mounts:
logging.error('Found %s mounted on %s. Not mounting a chroot over the top',
','.join(chroot_mounts), chroot)
return False
# Create a sparse 500GB file to hold the chroot image. If we create an
# image, immediately attach to a loopback device to skip one call to losetup.
chroot_image = chroot + '.img'
chroot_dev = None
if not os.path.exists(chroot_image):
if not create:
return False
logging.debug('Creating image %s', chroot_image)
with open(chroot_image, 'w') as f: * 2**30) # 500GB sparse image.
chroot_dev = _AttachDeviceToFile(chroot_image)
# Attach the image to a loopback device.
if not chroot_dev:
chroot_dev = _DeviceFromFile(chroot_image)
if chroot_dev:
logging.debug('Used existing device %s for %s', chroot_dev, chroot_image)
chroot_dev = _AttachDeviceToFile(chroot_image)
logging.debug('Loopback device is %s', chroot_dev)
# Make sure there is a VG on the loopback device.
chroot_vg = FindVolumeGroupForDevice(chroot, chroot_dev)
if not chroot_vg:
logging.error('Unable to find a VG for %s on %s', chroot, chroot_dev)
return False
cmd = ['vgs', chroot_vg]
result = cros_build_lib.sudo_run(
cmd, capture_output=True, check=False, print_cmd=False,
if result.returncode == 0:
logging.debug('Activating existing VG %s', chroot_vg)
cmd = ['vgchange', '-q', '-ay', chroot_vg]
# Sometimes LVM's internal thin volume check won't finish quickly enough
# and this command will fail. When this is the case, it will succeed if
# we retry. If it fails three times in a row, assume there's a real error
# and re-raise the exception.
try_count = list(range(1, 4))
for i in try_count:
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
except cros_build_lib.RunCommandError:
logging.warning('Failed to activate VG on try %d.', i)
if i == len(try_count):
cmd = ['vgcreate', '-q', chroot_vg, chroot_dev]
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
# Make sure there is an LV containing a filesystem in our VG.
chroot_lv = '%s/chroot' % chroot_vg
chroot_dev_path = '/dev/%s' % chroot_lv
cmd = ['lvs', chroot_lv]
result = cros_build_lib.sudo_run(
cmd, capture_output=True, check=False, print_cmd=False,
if result.returncode != 0:
cmd = ['lvcreate', '-q', '-L499G', '-T',
'%s/%s' % (chroot_vg, CHROOT_THINPOOL_NAME), '-V500G',
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
cmd = ['mke2fs', '-q', '-m', '0', '-t', 'ext4', chroot_dev_path]
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
# Sometimes lvchange can take a few seconds to run. Try to wait for the
# device to appear before mounting it.
count = 0
while not os.path.exists(chroot_dev_path):
if count > _MAX_LVM_RETRIES:
logging.error('Device %s still does not exist. Expect mounting the '
'filesystem to fail.', chroot_dev_path)
count += 1
logging.warning('Device file %s does not exist yet on try %d.',
chroot_dev_path, count)
cmd = ['mount', '-text4', '-onoatime', chroot_dev_path, chroot]
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
return True
def FindChrootMountSource(chroot_path, proc_mounts='/proc/mounts'):
"""Find the VG and LV mounted on |chroot_path|.
chroot_path: The full path to a mounted chroot.
proc_mounts: The path to a list of mounts to read (intended for testing).
A tuple containing the VG and LV names, or (None, None) if an appropriately
named device mounted on |chroot_path| isn't found.
mount = [m for m in osutils.IterateMountPoints(proc_file=proc_mounts)
if m.destination == chroot_path]
if not mount:
return (None, None)
# Take the last mount entry because it's the one currently visible.
# Expected VG/LV source path is /dev/mapper/cros_XX_NNN-LV.
# See FindVolumeGroupForDevice for details.
mount_source = mount[-1].source
match = re.match(r'/dev.*/(cros[^-]+)-(.+)', mount_source)
if not match:
return (None, None)
return (,
FileSystemDebugInfo = collections.namedtuple('FileSystemDebugInfo',
('fuser', 'lsof', 'ps'))
def GetFileSystemDebug(path: str, run_ps: bool = True) -> FileSystemDebugInfo:
"""Collect filesystem debugging information.
Dump some information to help find processes that may still be sing
files. Running ps auxf can also be done to see what processes are
still running.
path: Full path for directory we want information on.
run_ps: When true, show processes running.
FileSystemDebugInfo with debug info.
cmd_kwargs = {
'check': False,
'capture_output': True,
'encoding': 'utf-8',
'errors': 'replace'
fuser = cros_build_lib.sudo_run(['fuser', path], **cmd_kwargs)
lsof = cros_build_lib.sudo_run(['lsof', path], **cmd_kwargs)
if run_ps:
ps =['ps', 'auxf'], **cmd_kwargs)
ps_stdout = ps.stdout
ps_stdout = None
return FileSystemDebugInfo(fuser.stdout, lsof.stdout, ps_stdout)
# Raise an exception if cleanup takes more than 10 minutes.
def CleanupChrootMount(chroot=None, buildroot=None, delete=False,
"""Unmounts a chroot and cleans up attached devices.
This function attempts to perform all of the cleanup steps even if the chroot
directory and/or image isn't present. This ensures that a partially destroyed
chroot can still be cleaned up. This function does not remove the actual
chroot directory (or its content for non-loopback chroots).
chroot: Full path to the chroot to examine, or None to find it relative
to |buildroot|.
buildroot: Ignored if |chroot| is set. If |chroot| is None, find the chroot
relative to |buildroot|.
delete: Delete chroot contents and the .img file after cleaning up. If
|delete| is False, the chroot contents will still be present and
can be immediately re-mounted without recreating a fresh chroot.
proc_mounts: The path to a list of mounts to read (intended for testing).
if chroot is None and buildroot is None:
raise ValueError('need either |chroot| or |buildroot| to search')
if chroot is None:
chroot = os.path.join(buildroot, constants.DEFAULT_CHROOT_DIR)
chroot_img = chroot + '.img'
# Try to find the VG that might already be mounted on the chroot before we
# unmount it.
vg_name, _ = FindChrootMountSource(chroot, proc_mounts=proc_mounts)
except cros_build_lib.RunCommandError as e:
# TODO(lamontjones): Dump some information to help find the process still
# inside the chroot, causing In the end, this is likely
# to become fuser -k.
fs_debug = GetFileSystemDebug(chroot, run_ps=True)
raise Error(
'Umount failed: %s.\nfuser output=%s\nlsof output=%s\nps output=%s\n' %
(e.result.error, fs_debug.fuser, fs_debug.lsof,
# Find the loopback device by either matching the VG or the image.
chroot_dev = None
if vg_name:
cmd = ['vgs', '-q', '--noheadings', '-o', 'pv_name', '--unbuffered',
result = cros_build_lib.sudo_run(
cmd, capture_output=True, check=False, print_cmd=False,
if result.returncode == 0:
chroot_dev = result.output.strip()
vg_name = None
if not chroot_dev:
chroot_dev = _DeviceFromFile(chroot_img)
# If we didn't find a mounted VG before but we did find a loopback device,
# re-check for a VG attached to the loopback.
if not vg_name:
vg_name = FindVolumeGroupForDevice(chroot, chroot_dev)
if vg_name:
cmd = ['vgs', vg_name]
result = cros_build_lib.sudo_run(
cmd, capture_output=True, check=False, print_cmd=False,
if result.returncode != 0:
vg_name = None
# Clean up all the pieces we found above.
if vg_name:
cmd = ['vgchange', '-an', vg_name]
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
if chroot_dev:
cmd = ['losetup', '-d', chroot_dev]
cros_build_lib.sudo_run(cmd, capture_output=True, print_cmd=False)
if delete:
osutils.RmDir(chroot, ignore_missing=True, sudo=True)
if chroot_dev:
# Force a rescan after everything is gone to make sure lvmetad is updated.
def _RescanDeviceLvmMetadata(chroot_dev):
"""Forces lvmetad to rescan a device.
After attaching or detaching a loopback device, lvmetad is supposed to
automatically scan it. This doesn't always happen reliably, so this function
lets you force an LVM rescan. This is intended for cases where the whole
device will be used as an LVM PV, not for cases where you want to rescan a
device's partition table. For manipulating loopback device partitions, see
the image_lib.LoopbackPartitions class.
chroot_dev: Full path to the device that should be rescanned.
# This may fail if lvmetad isn't in use, but it's faster to ignore the
# exit code than to check if we should actually run the command.
cmd = ['pvscan', '--cache', chroot_dev]
cmd, capture_output=True, print_cmd=False, check=False)
def RunChrootVersionHooks(version_file=None, hooks_dir=None):
"""Run the chroot version hooks to bring the chroot up to date."""
if not cros_build_lib.IsInsideChroot():
command = ['run_chroot_version_hooks'], enter_chroot=True)
chroot = ChrootUpdater(version_file=version_file, hooks_dir=hooks_dir)
def InitLatestVersion(version_file=None, hooks_dir=None):
"""Initialize the chroot version to the latest version."""
if not cros_build_lib.IsInsideChroot():
# Run the command in the chroot.
command = ['run_chroot_version_hooks', '--init-latest'], enter_chroot=True)
# Initialize the version.
chroot = ChrootUpdater(version_file=version_file, hooks_dir=hooks_dir)
if chroot.IsInitialized():'Chroot is already initialized to %s.', chroot.GetVersion())
else:'Initializing chroot to version %s.', chroot.latest_version)
class ChrootUpdater(object):
"""Chroot version and update related functionality."""
def __init__(self, version_file=None, hooks_dir=None):
if version_file:
# We have one. Just here to skip the logic below since we don't need it.
default_version_file = None
elif cros_build_lib.IsInsideChroot():
# Use the absolute path since we're inside the chroot.
default_version_file = CHROOT_VERSION_FILE
# Otherwise convert to the path outside the chroot.
default_version_file = path_util.FromChrootPath(CHROOT_VERSION_FILE)
self._version_file = version_file or default_version_file
self._hooks_dir = hooks_dir or _CHROOT_VERSION_HOOKS_DIR
self._version = None
self._latest_version = None
self._hook_files = None
def latest_version(self):
"""Get the highest available version for the chroot."""
if self._latest_version is None:
self._latest_version = LatestChrootVersion(self._hooks_dir)
return self._latest_version
def GetVersion(self):
"""Get the chroot version.
InvalidChrootVersionError when the file contents are not a valid version.
IOError when the file cannot be read.
UninitializedChrootError when the version file does not exist.
if self._version is None:
# Check for existence so IOErrors from osutils.ReadFile are limited to
# permissions problems.
if not os.path.exists(self._version_file):
raise UninitializedChrootError(
'Version file does not exist: %s' % self._version_file)
version = osutils.ReadFile(self._version_file)
self._version = int(version)
except ValueError:
raise InvalidChrootVersionError(
'Invalid chroot version in %s: %s' % (self._version_file, version))
return self._version
def SetVersion(self, version):
"""Set and store the chroot version."""
self._version = version
osutils.WriteFile(self._version_file, str(version), sudo=True)
# TODO(saklein) Verify if this chown is necessary. The version file
# is in /etc, so it's reasonable to expect root would own it, but the bash
# version had the chown for many years before the conversion.
def IsInitialized(self):
"""Initialized Check."""
return self.GetVersion() > 0
except (Error, IOError):
return False
def ApplyUpdates(self):
"""Apply all necessary updates to the chroot."""
if self.GetVersion() > self.latest_version:
raise InvalidChrootVersionError(
'Missing upgrade hook for version %s.\n'
'Chroot is too new. Consider running:\n'
' cros_sdk --replace' % self.GetVersion())
for hook, version in self.GetChrootUpdates():
result =['bash', hook],
enter_chroot=True, check=False)
if not result.returncode:
raise ChrootUpdateError('Error running chroot version hook: %s' % hook)
def GetChrootUpdates(self):
"""Get all (update file, version) pairs that have not been run.
list of (/path/to/hook/file, version) pairs in order.
ChrootDeprecatedError when one or more required update files have been
hooks = self._GetHookFilesByVersion()
# Create the relevant ChrootUpdates.
updates = []
# Current version has already been run and we need to run the latest, so +1
# for each end of the version range.
for version in range(self.GetVersion() + 1, self.latest_version + 1):
# Deprecation check: Deprecation is done by removing old scripts. Updates
# must form a continuous sequence. If the sequence is broken between the
# chroot's current version and the most recent, then the chroot must be
# recreated.
if version not in hooks:
raise ChrootDeprecatedError()
updates.append((hooks[version], version))
return updates
def _GetHookFilesByVersion(self):
"""Find and store the hooks by their version number.
dict - {version: /path/to/hook/file} mapping.
VersionHasMultipleHooksError when multiple hooks exist for a version.
if self._hook_files:
return self._hook_files
hook_files = {}
for hook in os.listdir(self._hooks_dir):
version = int(hook.split('_', 1)[0])
# Sanity check: Each version may only have a single script. Multiple CLs
# landed at the same time and no one noticed the version overlap.
if version in hook_files:
raise VersionHasMultipleHooksError(
'Version %s has multiple hooks.' % version)
hook_files[version] = os.path.join(self._hooks_dir, hook)
self._hook_files = hook_files
return self._hook_files