1 // 2 // Copyright (C) 2013 The Android Open Source Project 3 // 4 // Licensed under the Apache License, Version 2.0 (the "License"); 5 // you may not use this file except in compliance with the License. 6 // You may obtain a copy of the License at 7 // 8 // http://www.apache.org/licenses/LICENSE-2.0 9 // 10 // Unless required by applicable law or agreed to in writing, software 11 // distributed under the License is distributed on an "AS IS" BASIS, 12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 // See the License for the specific language governing permissions and 14 // limitations under the License. 15 // 16 17 #ifndef UPDATE_ENGINE_COMMON_HARDWARE_INTERFACE_H_ 18 #define UPDATE_ENGINE_COMMON_HARDWARE_INTERFACE_H_ 19 20 #include <stdint.h> 21 22 #include <string> 23 #include <vector> 24 25 #include <base/files/file_path.h> 26 #include <base/time/time.h> 27 28 #include "update_engine/common/error_code.h" 29 30 namespace chromeos_update_engine { 31 32 // The hardware interface allows access to the crossystem exposed properties, 33 // such as the firmware version, hwid, verified boot mode. 34 // These stateless functions are tied together in this interface to facilitate 35 // unit testing. 36 class HardwareInterface { 37 public: ~HardwareInterface()38 virtual ~HardwareInterface() {} 39 40 // Returns whether this is an official build. Official build means that the 41 // server maintains and updates the build, so update_engine should run and 42 // periodically check for updates. 43 virtual bool IsOfficialBuild() const = 0; 44 45 // Returns true if the boot mode is normal or if it's unable to 46 // determine the boot mode. Returns false if the boot mode is 47 // developer. A dev-mode boot will allow the user to access developer-only 48 // features. 49 virtual bool IsNormalBootMode() const = 0; 50 51 // Returns whether the developer features are enabled. 52 virtual bool AreDevFeaturesEnabled() const = 0; 53 54 // Returns whether the device has an OOBE flow that the user must go through 55 // before getting non-critical updates. Use IsOOBEComplete() to determine if 56 // that flow is complete. 57 virtual bool IsOOBEEnabled() const = 0; 58 59 // Returns true if the OOBE process has been completed and EULA accepted, 60 // False otherwise. If True is returned, and |out_time_of_oobe| isn't null, 61 // the time-stamp of when OOBE happened is stored at |out_time_of_oobe|. 62 virtual bool IsOOBEComplete(base::Time* out_time_of_oobe) const = 0; 63 64 // Returns the HWID or an empty string on error. 65 virtual std::string GetHardwareClass() const = 0; 66 67 // Returns the OEM device requisition or an empty string if the system does 68 // not have a requisition, or if not running Chrome OS. 69 virtual std::string GetDeviceRequisition() const = 0; 70 71 // Returns the minimum kernel key version that verified boot on Chrome OS 72 // will allow to boot. This is the value of crossystem tpm_kernver. Returns 73 // -1 on error, or if not running on Chrome OS. 74 virtual int GetMinKernelKeyVersion() const = 0; 75 76 // Returns the minimum firmware key version that verified boot on Chrome OS 77 // will allow to boot. This is the value of crossystem tpm_fwver. Returns 78 // -1 on error, or if not running on Chrome OS. 79 virtual int GetMinFirmwareKeyVersion() const = 0; 80 81 // Returns the maximum firmware key version that verified boot should roll 82 // forward to. This is the value of crossystem firmware_max_rollforward. 83 // Returns -1 on error, if this board does not yet support this value, or 84 // if not running on Chrome OS. 85 virtual int GetMaxFirmwareKeyRollforward() const = 0; 86 87 // Sets the maximum firmware key version that verified boot should roll 88 // forward to. This is the value of crossystem firmware_max_rollforward. 89 // This value is not available on all Chrome OS devices. 90 virtual bool SetMaxFirmwareKeyRollforward(int firmware_max_rollforward) = 0; 91 92 // Sets the maximum kernel key version that verified boot should roll 93 // forward to. This is the value of crossystem kernel_max_rollforward. 94 // Returns false if the value cannot be set, or if not running on Chrome OS. 95 virtual bool SetMaxKernelKeyRollforward(int kernel_max_rollforward) = 0; 96 97 // Returns the powerwash_count from the stateful. If the file is not found 98 // or is invalid, returns -1. Brand new machines out of the factory or after 99 // recovery don't have this value set. 100 virtual int GetPowerwashCount() const = 0; 101 102 // Signals that a powerwash (stateful partition wipe) should be performed 103 // after reboot. If |save_rollback_data| is true additional state is 104 // preserved during shutdown that can be restored after the powerwash. 105 virtual bool SchedulePowerwash(bool save_rollback_data) = 0; 106 107 // Cancel the powerwash operation scheduled to be performed on next boot. 108 virtual bool CancelPowerwash() = 0; 109 110 // Store in |path| the path to a non-volatile directory (persisted across 111 // reboots) available for this daemon. In case of an error, such as no 112 // directory available, returns false. 113 virtual bool GetNonVolatileDirectory(base::FilePath* path) const = 0; 114 115 // Store in |path| the path to a non-volatile directory persisted across 116 // powerwash cycles. In case of an error, such as no directory available, 117 // returns false. 118 virtual bool GetPowerwashSafeDirectory(base::FilePath* path) const = 0; 119 120 // Returns the timestamp of the current OS build. 121 virtual int64_t GetBuildTimestamp() const = 0; 122 123 // Returns true if the current OS build allows installing the payload with an 124 // older timestamp. 125 virtual bool AllowDowngrade() const = 0; 126 127 // Returns whether the first active ping was sent to Omaha at some point, and 128 // that the value is persisted across recovery (and powerwash) once set with 129 // |SetFirstActiveOmahaPingSent()|. 130 virtual bool GetFirstActiveOmahaPingSent() const = 0; 131 132 // Persist the fact that first active ping was sent to omaha and returns false 133 // if failed to persist it. 134 virtual bool SetFirstActiveOmahaPingSent() = 0; 135 136 // If |warm_reset| is true, sets the warm reset to indicate a warm reset is 137 // needed on the next reboot. Otherwise, clears the flag. 138 virtual void SetWarmReset(bool warm_reset) = 0; 139 140 // If not reset, sets the vbmeta digest of the inactive slot as a sysprop. 141 // Otherwise, clears the sysprop. 142 virtual void SetVbmetaDigestForInactiveSlot(bool reset) = 0; 143 144 // Return the version/timestamp for partition `partition_name`. 145 // Don't make any assumption about the formatting of returned string. 146 // Only used for logging/debugging purposes. 147 virtual std::string GetVersionForLogging( 148 const std::string& partition_name) const = 0; 149 150 // Return true if and only if `new_version` is "newer" than the 151 // version number of partition `partition_name`. The notion of 152 // "newer" is defined by this function. Caller should not make 153 // any assumption about the underlying logic. 154 // Return: 155 // - kSuccess if update is valid. 156 // - kPayloadTimestampError if downgrade is detected 157 // - kDownloadManifestParseError if |new_version| has an incorrect format 158 // - Other error values if the source of error is known, or kError for 159 // a generic error on the device. 160 virtual ErrorCode IsPartitionUpdateValid( 161 const std::string& partition_name, 162 const std::string& new_version) const = 0; 163 164 virtual const char* GetPartitionMountOptions( 165 const std::string& partition_name) const = 0; 166 }; 167 168 } // namespace chromeos_update_engine 169 170 #endif // UPDATE_ENGINE_COMMON_HARDWARE_INTERFACE_H_ 171