summaryrefslogtreecommitdiffstats
path: root/update_verifier/include/update_verifier/update_verifier.h
blob: b00890e82f5c1092807a3d1c7070bfb1cd83c816 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
/*
 * Copyright (C) 2017 The Android Open Source Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

#pragma once

#include <functional>
#include <map>
#include <string>
#include <vector>

#include "otautil/rangeset.h"

// The update verifier performs verification upon the first boot to a new slot on A/B devices.
// During the verification, it reads all the blocks in the care_map. And if a failure happens,
// it rejects the current boot and triggers a fallback.

// Note that update_verifier should be backward compatible to not reject care_map.txt from old
// releases, which could otherwise fail to boot into the new release. For example, we've changed
// the care_map format between N and O. An O update_verifier would fail to work with N care_map.txt.
// This could be a result of sideloading an O OTA while the device having a pending N update.
int update_verifier(int argc, char** argv);

// The UpdateVerifier parses the content in the care map, and continues to verify the
// partitions by reading the cared blocks if there's no format error in the file. Otherwise,
// it should skip the verification to avoid bricking the device.
class UpdateVerifier {
 public:
  UpdateVerifier();

  // This function tries to process the care_map.pb as protobuf message; and falls back to use
  // care_map.txt if the pb format file doesn't exist. If the parsing succeeds, put the result
  // of the pair <partition_name, ranges> into the |partition_map_|.
  bool ParseCareMap();

  // Verifies the new boot by reading all the cared blocks for partitions in |partition_map_|.
  bool VerifyPartitions();

 private:
  friend class UpdateVerifierTest;
  // Parses the legacy care_map.txt in plain text format.
  bool ParseCareMapPlainText(const std::string& content);

  // Finds all the dm-enabled partitions, and returns a map of <partition_name, block_device>.
  std::map<std::string, std::string> FindDmPartitions();

  // Returns true if we successfully read the blocks in |ranges| of the |dm_block_device|.
  bool ReadBlocks(const std::string partition_name, const std::string& dm_block_device,
                  const RangeSet& ranges);

  // Functions to override the care_map_prefix_ and property_reader_, used in test only.
  void set_care_map_prefix(const std::string& prefix);
  void set_property_reader(const std::function<std::string(const std::string&)>& property_reader);

  std::map<std::string, RangeSet> partition_map_;
  // The path to the care_map excluding the filename extension; default value:
  // "/data/ota_package/care_map"
  std::string care_map_prefix_;

  // The function to read the device property; default value: android::base::GetProperty()
  std::function<std::string(const std::string&)> property_reader_;
};