blob: cd65a3bb4789004b8230f283744eb09045ce0748 [file] [log] [blame]
// Copyright 2021 The ChromiumOS Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "minios/utils.h"
#include <cstdint>
#include <cstdio>
#include <istream>
#include <memory>
#include <optional>
#include <string>
#include <tuple>
#include <vector>
#include <base/files/file_path.h>
#include <base/files/file_util.h>
#include <base/logging.h>
#include <base/strings/string_number_conversions.h>
#include <base/strings/string_split.h>
#include <brillo/kernel_config_utils.h>
#include "minios/minios.h"
#include "minios/process_manager.h"
namespace {
constexpr char kLogConsole[] = "/run/frecon/vt1";
const char kMountStatefulCommand[] = "/usr/bin/stateful_partition_for_recovery";
const char kMountFlag[] = "--mount";
const char kStatefulPath[] = "/stateful";
const char kTarCommand[] = "/usr/bin/tar";
// Compress and archive. Also resolve symlinks.
// Using `gzip` as it's the only installed compress utility on MiniOS.
const char kTarCompressFlags[] = "-czhf";
const std::vector<std::string> kFilesToCompress{
"/var/log/update_engine.log", "/var/log/upstart.log", "/var/log/messages"};
// NOLINTNEXTLINE
const std::string kFutilityShowCmd[]{"/usr/bin/futility", "show", "-P"};
const char kKeyblockSizePrefix[] = "kernel::keyblock::size::";
const char kKernelPreambleSizePrefix[] = "kernel::preamble::size::";
const char kKernelBodySizePrefix[] = "kernel::body::size::";
const char kMiniOsVersionKey[] = "cros_minios_version";
} // namespace
namespace minios {
const char kCategoryInit[] = "init";
const char kCategoryReboot[] = "reboot";
const char kCategoryUpdate[] = "update";
const char kLogFilePath[] = "/var/log/minios.log";
const base::FilePath kDefaultArchivePath{"/tmp/logs.tar"};
std::tuple<bool, std::string> ReadFileContentWithinRange(
const base::FilePath& file_path,
int64_t start_offset,
int64_t end_offset,
int max_columns) {
base::File f(file_path, base::File::FLAG_OPEN | base::File::FLAG_READ);
if (!f.IsValid()) {
PLOG(ERROR) << "Failed to open file " << file_path.value();
return {false, {}};
}
if (f.Seek(base::File::Whence::FROM_BEGIN, start_offset) != start_offset) {
PLOG(ERROR) << "Failed to seek file " << file_path.value() << " at offset "
<< start_offset;
return {false, {}};
}
int64_t bytes_to_read = end_offset - start_offset;
std::string content;
content.reserve(bytes_to_read);
int current_col = 0;
while (bytes_to_read-- > 0) {
char c;
switch (f.ReadAtCurrentPos(&c, 1)) {
case -1:
PLOG(ERROR) << "Failed to read file " << file_path.value();
return {false, {}};
case 0:
// Equivalent of EOF.
return {true, content};
default:
break;
}
if (c == '\n') {
if (content.empty() || content.back() != '\n')
content.push_back(c);
current_col = 0;
continue;
}
if (current_col < max_columns) {
content.push_back(c);
if (++current_col >= max_columns) {
content.push_back('\n');
current_col = 0;
}
}
}
return {true, content};
}
std::tuple<bool, std::string, int64_t> ReadFileContent(
const base::FilePath& file_path,
int64_t offset,
int num_lines,
int num_cols) {
base::File f(file_path, base::File::FLAG_OPEN | base::File::FLAG_READ);
if (!f.IsValid())
return {false, {}, 0};
if (f.Seek(base::File::Whence::FROM_BEGIN, offset) == -1)
return {false, {}, 0};
char c;
std::string content;
content.reserve(num_lines * num_cols);
int64_t bytes_read = 0;
int current_col = 0, read_buffer_lines = 0;
while (f.ReadAtCurrentPos(&c, 1) > 0 && read_buffer_lines < num_lines) {
++bytes_read;
if (c == '\n') {
// Skip double newlining.
if (content.back() != '\n') {
content.push_back(c);
++read_buffer_lines;
}
current_col = 0;
continue;
}
if (current_col < num_cols) {
content.push_back(c);
if (++current_col >= num_cols) {
content.push_back('\n');
current_col = 0;
++read_buffer_lines;
}
}
}
return {true, content, bytes_read};
}
bool GetCrosRegionData(ProcessManagerInterface* process_manager,
std::string key,
std::string* value) {
int exit_code = 0;
std::string error, xkb_keyboard;
// Get the first item in the keyboard list for a given region.
if (!process_manager->RunCommandWithOutput(
{"/usr/bin/cros_region_data", "-s", key}, &exit_code, value,
&error) ||
exit_code) {
LOG(ERROR) << "Could not get " << key << " region data. Exit code "
<< exit_code << " with error " << error;
*value = "";
return false;
}
return true;
}
bool TriggerShutdown() {
ProcessManager process_manager;
base::FilePath console = GetLogConsole();
if (process_manager.RunCommand({"/sbin/poweroff", "-f"},
ProcessManager::IORedirection{
.input = console.value(),
.output = console.value(),
})) {
LOG(ERROR) << "Could not trigger shutdown";
return false;
}
LOG(INFO) << "Shutdown requested.";
return true;
}
std::string GetKeyboardLayout(ProcessManagerInterface* process_manager) {
std::string keyboard_layout;
if (!GetCrosRegionData(process_manager, "keyboards", &keyboard_layout)) {
LOG(WARNING) << "Could not get region data. Defaulting to 'us'.";
return "us";
}
// Get the country code from the full keyboard string (i.e xkb:us::eng).
const auto& keyboard_parts = base::SplitString(
keyboard_layout, ":", base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY);
if (keyboard_parts.size() < 2 || keyboard_parts[1].size() < 2) {
LOG(WARNING) << "Could not get country code from " << keyboard_layout
<< " Defaulting to 'us'.";
return "us";
}
return keyboard_parts[1];
}
base::FilePath GetLogConsole() {
static base::FilePath target;
if (target.empty()) {
base::FilePath log_console(kLogConsole);
if (!base::ReadSymbolicLink(log_console, &target)) {
target = log_console;
}
}
return target;
}
bool MountStatefulPartition(ProcessManagerInterface* process_manager) {
if (base::PathExists(base::FilePath{kStatefulPath})) {
LOG(INFO) << "Stateful already mounted";
return true;
}
if (!process_manager) {
PLOG(WARNING) << "Invalid process manager";
return false;
}
base::FilePath console = GetLogConsole();
if (process_manager->RunCommand({kMountStatefulCommand, kMountFlag},
ProcessManager::IORedirection{
.input = console.value(),
.output = console.value(),
}) != 0) {
PLOG(WARNING) << "Failed to mount stateful partition";
return false;
}
return true;
}
int CompressLogs(std::unique_ptr<ProcessManagerInterface> process_manager,
const base::FilePath& archive_path) {
// Note: These are the explicit set of logs that are approved by privacy team.
// Adding files to this list would require clearance from Privacy team.
std::vector<std::string> compress_command = {kTarCommand, kTarCompressFlags,
archive_path.value()};
compress_command.insert(compress_command.end(), kFilesToCompress.begin(),
kFilesToCompress.end());
base::FilePath console = GetLogConsole();
return process_manager->RunCommand(compress_command,
ProcessManager::IORedirection{
.input = console.value(),
.output = console.value(),
});
}
// Helper function to step through futility output and return integer values.
std::optional<uint64_t> ParseFutilityOutputInt(
const std::string& futility_output, const std::string& key) {
std::string line;
std::istringstream ft_output(futility_output);
// Tokenize the key.
auto key_tok = base::SplitStringUsingSubstr(key, "::", base::TRIM_WHITESPACE,
base::SPLIT_WANT_NONEMPTY);
// Step through the provided output one line at a time.
while (std::getline(ft_output, line)) {
// Tokenize the line.
auto line_tok = base::SplitStringUsingSubstr(
line, "::", base::TRIM_WHITESPACE, base::SPLIT_WANT_NONEMPTY);
// The line will only have 1 more element than the key (the value).
if (line_tok.size() == key_tok.size() + 1 &&
std::equal(line_tok.begin(), line_tok.end() - 1, key_tok.begin())) {
uint64_t val;
if (!base::StringToUint64(line_tok.back(), &val)) {
LOG(ERROR) << "Parsed value was not a number " << line_tok.back();
return std::nullopt;
}
return val;
}
}
LOG(ERROR) << "No Match found for key " << key;
return std::nullopt;
}
// Kernel sizes are calculated by parsing out and adding together keyblock
// size, kernel preamble size and kernel body size. Failure to find any of
// them, or if any are set to 0 returns a nullopt, otherwise returns the sum
// of those numbers.
std::optional<uint64_t> KernelSize(
std::unique_ptr<ProcessManagerInterface> process_manager,
const base::FilePath& device) {
std::vector<std::string> futility_show_command{begin(kFutilityShowCmd),
end(kFutilityShowCmd)};
futility_show_command.push_back(device.value().c_str());
int return_code = 0;
std::string std_out, std_err;
// Run futility command for a given path to begin parsing output.
if (!process_manager->RunCommandWithOutput(
futility_show_command, &return_code, &std_out, &std_err) ||
return_code != 0) {
LOG(ERROR) << "Failed to run futility command, code: " << return_code;
return std::nullopt;
}
const auto keyblock_size =
ParseFutilityOutputInt(std_out, kKeyblockSizePrefix);
if (!keyblock_size.has_value() || keyblock_size.value() == 0) {
LOG(ERROR) << "Keyblock size not found, or invalid";
return std::nullopt;
}
auto kernel_preamble_size =
ParseFutilityOutputInt(std_out, kKernelPreambleSizePrefix);
if (!kernel_preamble_size.has_value() || kernel_preamble_size.value() == 0) {
LOG(ERROR) << "Kernel preamble size not found, or invalid";
return std::nullopt;
}
auto kernel_body_size =
ParseFutilityOutputInt(std_out, kKernelBodySizePrefix);
if (!kernel_body_size.has_value() || kernel_body_size.value() == 0) {
LOG(ERROR) << "Kernel body size not found, or invalid";
return std::nullopt;
}
return keyblock_size.value() + kernel_preamble_size.value() +
kernel_body_size.value();
}
std::optional<std::string> GetMiniOSVersion() {
auto kernel_config = brillo::GetCurrentKernelConfig();
if (!kernel_config) {
LOG(ERROR) << "Failed to read kernel config.";
return std::nullopt;
}
auto version = brillo::ExtractKernelArgValue(kernel_config.value(),
std::string{kMiniOsVersionKey});
if (!version) {
LOG(ERROR) << "Failed to extract version value with key: "
<< kMiniOsVersionKey;
}
return version;
}
} // namespace minios