New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 621854 link

Starred by 5 users

Issue metadata

Status: Verified
Owner:
Last visit > 30 days ago
Closed: Jun 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug



Sign in to add a comment

Panther Cfm cannot update to latest M51

Project Member Reported by kotah@chromium.org, Jun 21 2016

Issue description

Chrome version: 50.0.2661.103 Stable
Platform version: 7978.74.0
Model: Asus Chromebox CN60

Panther Cfm devices stays at version 50.0.2661.103 and cannot update to latest 51.0.2704.103.
chrome://policy shows DeviceAutoUpdateDisabled = True, and chrome://chrome shows "Updates are disabled by your administrator" in guest mode, but no update restriction policies are configured in Admin Console.

Customer initially reported issue on Jun 9, and I can reproduce the same error with my test Panther device.

update_engine log shows:
[0621/174020:ERROR:common_service.cc(162)] SetChannel(...): Domain=update_engine, Code=org.chromium.UpdateEngine.Error.Failed, Message=Cannot set target channel explicitly when channel policy/settings is not delegated
[0621/174020:ERROR:common_service.cc(58)] Sending Update Engine Failure: SetChannel@../../../../../../../tmp/portage/chromeos-base/update_engine-0.0.3-r1890/work/update_engine-0.0.3/aosp/system/update_engine/common_service.cc:162: Cannot set target channel explicitly when channel policy/settings is not delegated

Other details:
- "network_diag --hosts" command in guest mode crosh shows PASS to all Google hosts
- Affected devices can still start/join video Hangouts with no issue
- Wipe & re-enroll did not solve issue
- Issue did not repro with my Guado (Asus Chromebox CN62) Cfm device enrolled to the same domain

Screenshots and logs captured from my test device are here: https://drive.google.com/a/google.com/folderview?id=0B3B7SKCSXU4ScXEwT3FTQXhVczQ&usp=sharing
 

Comment 1 by kotah@chromium.org, Jun 21 2016

Update: Panther updated to M51 as soon as I wiped and re-enrolled the device as a ChromeOS device (https://support.google.com/chrome/a/answer/1360534), so the issue seems to be unique to Cfm mode.

Comment 2 by dchan@google.com, Jun 21 2016

Cc: harpreet@chromium.org
Components: UI>Shell>Kiosk

Comment 3 by dchan@google.com, Jun 21 2016

Cc: sduraisamy@chromium.org
Cc: -sduraisamy@chromium.org bkemler@chromium.org
Labels: Proj-Hotrod
I dont see why DeviceAutoUpdateDisabled would be True if auto updates are set to "Allow auto-updates" in admin console. Could you confirm that this is the case?

Also, is there only 1 organization or do you have multiple OU's in admin console? If more than 1, you need to make sure the given device and the user used for enrolling are in the same OU and the policies are appropriately set for the given OU.

I am not able to repro this with our test accounts.
Owner: kotah@chromium.org

Comment 6 by kotah@chromium.org, Jun 22 2016

Owner: harpreet@chromium.org
Yes, Panther device and the user account I used for enrollment both belong to the same OU, which has:

- Auto Update = Allow auto-updates
- Restrict Google Chrome version to at most = No restriction
- Randomly scatter auto-updates over = None
- Release Channel = Move to Stable Channel

in Admin Console > Device management > Chrome devices for meetings > Settings and Policies. This OU has auto updates enabled with no restriction in Device management > Chrome management > Device settings too.

Here is the test username and device serial# in case you want to check backend status: https://drive.google.com/a/google.com/file/d/0B3B7SKCSXU4SS0N0SURIQkxMcWc/view?usp=sharing
FYI my Panther was already updated to M51 when I enrolled it as a ChromeOS device for testing. It was then wiped and re-enrolled as Cfm again, and now DeviceAutoUpdateDisabled is back to True.

Let me know if you need additional information, I can work with customer.

Comment 8 by edoan@chromium.org, Jun 22 2016

This seems related to  issue 616620 ? Check further into the update_engine.log and see if there's a firmware update error that's blocking the AU.

Comment 9 by kotah@chromium.org, Jun 22 2016

Thanks, but I couldn't find any firmware update errors in update_engine.log like https://code.google.com/p/chrome-os-partner/issues/detail?id=54472 (which was dup'ed to  crbug.com/616620 ) so I think this is a different issue.

From update_engine.log in #c1: 
[0621/164646:INFO:subprocess.cc(158)] Subprocess output:
Starting Google_Panther firmware updater v4 (bootok)...
Firmware update (bootok) completed.
Cc: mnilsson@chromium.org dtosic@chromium.org abodenha@chromium.org
Cc: xiy...@chromium.org de...@chromium.org
+xiyuan@ and deymo@ for ideas.

xiyuan@ could this be related to the version pinning logic you've been working on?
Version pinning code should be in M53. M51 should not be affected. And the code should not be changing the device policy.

It seems that somehow the device received a policy to disable AU:

[0621/164558:INFO:update_manager-inl.h(52)] ChromeOSPolicy::UpdateCheckAllowed: START
[0621/164558:INFO:chromeos_policy.cc(219)] Updates disabled by policy, blocking update checks.
[0621/164558:INFO:update_manager-inl.h(74)] ChromeOSPolicy::UpdateCheckAllowed: END

Comment 13 by de...@chromium.org, Jun 22 2016

Update disabled != version pinning.

Updates disabled in that version means that the device policy has the updates disabled. The device policy is fetched by chrome and stored on disk. To recover such device you need a new policy that pins the device from the device policy or otherwise allows it to go to the latest version.
Yeah. We've agreed it has nothing to do with pinning.

The question is why these devices think they have a policy preventing updates while admin console thinks they don't.
Owner: abodenha@chromium.org
Albert, please help find an owner.
Owner: xiy...@chromium.org
Status: Assigned (was: Untriaged)
xiyuan@ I know you're knee-deep in other stuff, but could I get you to dig deeper into this one?
Cc: sduraisamy@chromium.org jinzhang@chromium.org
This looks like caused by AU disabled by policy.

#4, #6 says the AU is not disabled in admin console.

My vague memory says Cfm devices have a separate server UI for policy config (other than cpanel). Are we looking at the right place?
This is due to bug where enforcing "stable channel" -> "auto-update disabled" is not feature protected in Device management server. Hence, as long as the release channel is "stable", even though UI shows auto update is enabled, the device actually gets auto update disabled.

This bug is fixed last week, and the binary containing the fix will be pushed to prod this Wed. After the fix, reboot the device, or reload the policy in chrome://policy page should fix the issue.
Owner: jinzhang@chromium.org
Is there a bug number we can dupe this against?
Have a tracking bug in Bugnizer: https://buganizer.corp.google.com/u/0/issues/28848532#comment4
Status: ExternalDependency (was: Assigned)
Status: Fixed (was: ExternalDependency)
The prod push completed just now, and I verified the fix worked by reloading a device's chrome://policy page.
Labels: VerifyIn-53
Status: Verified (was: Fixed)
1) Recovered a panther with 7978.74.0 and enrolled in croste.tv domain.
2) This OU in the cpanel is set to Stable Channel with automatic updates enabled.
3) Verified the device policy details, the flag values are  DeviceAutoUpdateDisabled= "False", Channel = "Stable"
4) After 45 mins, the device upgraded automatically to 8172.60.0.

Hence marking it verified.


Sign in to add a comment