2016-07-12 21:13:05 +02:00
|
|
|
// Copyright (C) 2016 The Android Open Source Project
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
#define LOG_TAG "sdcard"
|
|
|
|
|
|
|
|
#include <dirent.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <linux/fuse.h>
|
|
|
|
#include <pthread.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/inotify.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/resource.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2016-08-27 01:54:46 +02:00
|
|
|
#include <android-base/file.h>
|
2016-07-12 23:05:32 +02:00
|
|
|
#include <android-base/logging.h>
|
2016-07-18 19:46:42 +02:00
|
|
|
#include <android-base/macros.h>
|
2016-08-27 01:54:46 +02:00
|
|
|
#include <android-base/stringprintf.h>
|
|
|
|
#include <android-base/strings.h>
|
2016-07-12 23:05:32 +02:00
|
|
|
|
2016-07-12 21:13:05 +02:00
|
|
|
#include <cutils/fs.h>
|
|
|
|
#include <cutils/multiuser.h>
|
2016-08-27 01:54:46 +02:00
|
|
|
#include <cutils/properties.h>
|
|
|
|
|
2016-07-14 20:50:14 +02:00
|
|
|
#include <libminijail.h>
|
|
|
|
#include <scoped_minijail.h>
|
|
|
|
|
2016-07-12 21:13:05 +02:00
|
|
|
#include <private/android_filesystem_config.h>
|
|
|
|
|
2018-01-18 03:11:20 +01:00
|
|
|
#define PROP_SDCARDFS_DEVICE "ro.sys.sdcardfs"
|
|
|
|
#define PROP_SDCARDFS_USER "persist.sys.sdcardfs"
|
|
|
|
|
|
|
|
static bool supports_esdfs(void) {
|
|
|
|
std::string filesystems;
|
|
|
|
if (!android::base::ReadFileToString("/proc/filesystems", &filesystems)) {
|
|
|
|
PLOG(ERROR) << "Could not read /proc/filesystems";
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
for (const auto& fs : android::base::Split(filesystems, "\n")) {
|
|
|
|
if (fs.find("esdfs") != std::string::npos) return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool should_use_sdcardfs(void) {
|
|
|
|
char property[PROPERTY_VALUE_MAX];
|
|
|
|
|
|
|
|
// Allow user to have a strong opinion about state
|
|
|
|
property_get(PROP_SDCARDFS_USER, property, "");
|
|
|
|
if (!strcmp(property, "force_on")) {
|
|
|
|
LOG(WARNING) << "User explicitly enabled sdcardfs";
|
|
|
|
return true;
|
|
|
|
} else if (!strcmp(property, "force_off")) {
|
|
|
|
LOG(WARNING) << "User explicitly disabled sdcardfs";
|
|
|
|
return !supports_esdfs();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Fall back to device opinion about state
|
|
|
|
if (property_get_bool(PROP_SDCARDFS_DEVICE, true)) {
|
|
|
|
LOG(WARNING) << "Device explicitly enabled sdcardfs";
|
|
|
|
return true;
|
|
|
|
} else {
|
|
|
|
LOG(WARNING) << "Device explicitly disabled sdcardfs";
|
|
|
|
return !supports_esdfs();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-08 19:22:38 +01:00
|
|
|
// NOTE: This is a vestigial program that simply exists to mount the in-kernel
|
|
|
|
// sdcardfs filesystem. The older FUSE-based design that used to live here has
|
|
|
|
// been completely removed to avoid confusion.
|
2016-08-27 01:54:46 +02:00
|
|
|
|
2016-07-12 21:13:05 +02:00
|
|
|
/* Supplementary groups to execute with. */
|
|
|
|
static const gid_t kGroups[1] = { AID_PACKAGE_INFO };
|
|
|
|
|
2016-07-14 20:50:14 +02:00
|
|
|
static void drop_privs(uid_t uid, gid_t gid) {
|
|
|
|
ScopedMinijail j(minijail_new());
|
2016-07-18 19:46:42 +02:00
|
|
|
minijail_set_supplementary_gids(j.get(), arraysize(kGroups), kGroups);
|
2016-07-14 20:50:14 +02:00
|
|
|
minijail_change_gid(j.get(), gid);
|
|
|
|
minijail_change_uid(j.get(), uid);
|
|
|
|
/* minijail_enter() will abort if priv-dropping fails. */
|
|
|
|
minijail_enter(j.get());
|
|
|
|
}
|
|
|
|
|
2017-09-15 20:47:50 +02:00
|
|
|
static bool sdcardfs_setup(const std::string& source_path, const std::string& dest_path,
|
|
|
|
uid_t fsuid, gid_t fsgid, bool multi_user, userid_t userid, gid_t gid,
|
2018-01-18 03:11:20 +01:00
|
|
|
mode_t mask, bool derive_gid, bool default_normal, bool use_esdfs) {
|
2018-01-08 19:43:46 +01:00
|
|
|
// Try several attempts, each time with one less option, to gracefully
|
|
|
|
// handle older kernels that aren't updated yet.
|
|
|
|
for (int i = 0; i < 4; i++) {
|
|
|
|
std::string new_opts;
|
|
|
|
if (multi_user && i < 3) new_opts += "multiuser,";
|
|
|
|
if (derive_gid && i < 2) new_opts += "derive_gid,";
|
|
|
|
if (default_normal && i < 1) new_opts += "default_normal,";
|
|
|
|
|
|
|
|
auto opts = android::base::StringPrintf("fsuid=%d,fsgid=%d,%smask=%d,userid=%d,gid=%d",
|
|
|
|
fsuid, fsgid, new_opts.c_str(), mask, userid, gid);
|
2018-01-18 03:11:20 +01:00
|
|
|
if (mount(source_path.c_str(), dest_path.c_str(), use_esdfs ? "esdfs" : "sdcardfs",
|
2018-01-08 19:43:46 +01:00
|
|
|
MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_NOATIME, opts.c_str()) == -1) {
|
|
|
|
PLOG(WARNING) << "Failed to mount sdcardfs with options " << opts;
|
2017-09-15 20:47:50 +02:00
|
|
|
} else {
|
2018-01-08 19:43:46 +01:00
|
|
|
return true;
|
2017-09-15 20:47:50 +02:00
|
|
|
}
|
2016-08-27 01:54:46 +02:00
|
|
|
}
|
2018-01-08 19:43:46 +01:00
|
|
|
|
|
|
|
return false;
|
2016-08-27 01:54:46 +02:00
|
|
|
}
|
|
|
|
|
2016-10-28 02:43:37 +02:00
|
|
|
static bool sdcardfs_setup_bind_remount(const std::string& source_path, const std::string& dest_path,
|
|
|
|
gid_t gid, mode_t mask) {
|
|
|
|
std::string opts = android::base::StringPrintf("mask=%d,gid=%d", mask, gid);
|
|
|
|
|
|
|
|
if (mount(source_path.c_str(), dest_path.c_str(), nullptr,
|
|
|
|
MS_BIND, nullptr) != 0) {
|
|
|
|
PLOG(ERROR) << "failed to bind mount sdcardfs filesystem";
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mount(source_path.c_str(), dest_path.c_str(), "none",
|
|
|
|
MS_REMOUNT | MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_NOATIME, opts.c_str()) != 0) {
|
|
|
|
PLOG(ERROR) << "failed to mount sdcardfs filesystem";
|
|
|
|
if (umount2(dest_path.c_str(), MNT_DETACH))
|
|
|
|
PLOG(WARNING) << "Failed to unmount bind";
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-01-18 03:11:20 +01:00
|
|
|
static bool sdcardfs_setup_secondary(const std::string& default_path, const std::string& source_path,
|
|
|
|
const std::string& dest_path, uid_t fsuid, gid_t fsgid,
|
|
|
|
bool multi_user, userid_t userid, gid_t gid, mode_t mask,
|
|
|
|
bool derive_gid, bool default_normal, bool use_esdfs) {
|
|
|
|
if (use_esdfs) {
|
|
|
|
return sdcardfs_setup(source_path, dest_path, fsuid, fsgid, multi_user, userid, gid, mask,
|
|
|
|
derive_gid, default_normal, use_esdfs);
|
|
|
|
} else {
|
|
|
|
return sdcardfs_setup_bind_remount(default_path, dest_path, gid, mask);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-27 01:54:46 +02:00
|
|
|
static void run_sdcardfs(const std::string& source_path, const std::string& label, uid_t uid,
|
2017-09-15 20:47:50 +02:00
|
|
|
gid_t gid, userid_t userid, bool multi_user, bool full_write,
|
2018-01-18 03:11:20 +01:00
|
|
|
bool derive_gid, bool default_normal, bool use_esdfs) {
|
2016-08-27 01:54:46 +02:00
|
|
|
std::string dest_path_default = "/mnt/runtime/default/" + label;
|
|
|
|
std::string dest_path_read = "/mnt/runtime/read/" + label;
|
|
|
|
std::string dest_path_write = "/mnt/runtime/write/" + label;
|
2019-01-17 08:25:28 +01:00
|
|
|
std::string dest_path_full = "/mnt/runtime/full/" + label;
|
2016-08-27 01:54:46 +02:00
|
|
|
|
|
|
|
umask(0);
|
|
|
|
if (multi_user) {
|
|
|
|
// Multi-user storage is fully isolated per user, so "other"
|
|
|
|
// permissions are completely masked off.
|
|
|
|
if (!sdcardfs_setup(source_path, dest_path_default, uid, gid, multi_user, userid,
|
2018-01-18 03:11:20 +01:00
|
|
|
AID_SDCARD_RW, 0006, derive_gid, default_normal, use_esdfs) ||
|
|
|
|
!sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_read, uid, gid,
|
|
|
|
multi_user, userid, AID_EVERYBODY, 0027, derive_gid,
|
|
|
|
default_normal, use_esdfs) ||
|
|
|
|
!sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_write, uid, gid,
|
|
|
|
multi_user, userid, AID_EVERYBODY, full_write ? 0007 : 0027,
|
2019-01-17 08:25:28 +01:00
|
|
|
derive_gid, default_normal, use_esdfs) ||
|
|
|
|
!sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_full, uid, gid,
|
|
|
|
multi_user, userid, AID_EVERYBODY, 0007, derive_gid,
|
|
|
|
default_normal, use_esdfs)) {
|
2016-08-27 01:54:46 +02:00
|
|
|
LOG(FATAL) << "failed to sdcardfs_setup";
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Physical storage is readable by all users on device, but
|
|
|
|
// the Android directories are masked off to a single user
|
|
|
|
// deep inside attr_from_stat().
|
|
|
|
if (!sdcardfs_setup(source_path, dest_path_default, uid, gid, multi_user, userid,
|
2018-01-18 03:11:20 +01:00
|
|
|
AID_SDCARD_RW, 0006, derive_gid, default_normal, use_esdfs) ||
|
|
|
|
!sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_read, uid, gid,
|
|
|
|
multi_user, userid, AID_EVERYBODY, full_write ? 0027 : 0022,
|
|
|
|
derive_gid, default_normal, use_esdfs) ||
|
|
|
|
!sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_write, uid, gid,
|
|
|
|
multi_user, userid, AID_EVERYBODY, full_write ? 0007 : 0022,
|
2019-01-17 08:25:28 +01:00
|
|
|
derive_gid, default_normal, use_esdfs) ||
|
|
|
|
!sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_full, uid, gid,
|
|
|
|
multi_user, userid, AID_EVERYBODY, 0007, derive_gid,
|
|
|
|
default_normal, use_esdfs)) {
|
2016-08-27 01:54:46 +02:00
|
|
|
LOG(FATAL) << "failed to sdcardfs_setup";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Will abort if priv-dropping fails.
|
|
|
|
drop_privs(uid, gid);
|
|
|
|
|
|
|
|
if (multi_user) {
|
|
|
|
std::string obb_path = source_path + "/obb";
|
|
|
|
fs_prepare_dir(obb_path.c_str(), 0775, uid, gid);
|
|
|
|
}
|
|
|
|
|
|
|
|
exit(0);
|
|
|
|
}
|
|
|
|
|
2016-07-12 21:13:05 +02:00
|
|
|
static int usage() {
|
2016-07-12 23:05:32 +02:00
|
|
|
LOG(ERROR) << "usage: sdcard [OPTIONS] <source_path> <label>"
|
|
|
|
<< " -u: specify UID to run as"
|
|
|
|
<< " -g: specify GID to run as"
|
|
|
|
<< " -U: specify user ID that owns device"
|
|
|
|
<< " -m: source_path is multi-user"
|
2017-09-15 20:47:50 +02:00
|
|
|
<< " -w: runtime write mount has full write access"
|
|
|
|
<< " -P preserve owners on the lower file system";
|
2016-07-12 21:13:05 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv) {
|
|
|
|
const char *source_path = NULL;
|
|
|
|
const char *label = NULL;
|
|
|
|
uid_t uid = 0;
|
|
|
|
gid_t gid = 0;
|
|
|
|
userid_t userid = 0;
|
|
|
|
bool multi_user = false;
|
|
|
|
bool full_write = false;
|
2017-09-15 20:47:50 +02:00
|
|
|
bool derive_gid = false;
|
2018-01-08 19:43:46 +01:00
|
|
|
bool default_normal = false;
|
2016-07-12 21:13:05 +02:00
|
|
|
int i;
|
|
|
|
struct rlimit rlim;
|
|
|
|
int fs_version;
|
|
|
|
|
2018-01-08 19:43:46 +01:00
|
|
|
setenv("ANDROID_LOG_TAGS", "*:v", 1);
|
|
|
|
android::base::InitLogging(argv, android::base::LogdLogger(android::base::SYSTEM));
|
|
|
|
|
2016-07-12 21:13:05 +02:00
|
|
|
int opt;
|
2018-01-08 19:43:46 +01:00
|
|
|
while ((opt = getopt(argc, argv, "u:g:U:mwGi")) != -1) {
|
2016-07-12 21:13:05 +02:00
|
|
|
switch (opt) {
|
|
|
|
case 'u':
|
|
|
|
uid = strtoul(optarg, NULL, 10);
|
|
|
|
break;
|
|
|
|
case 'g':
|
|
|
|
gid = strtoul(optarg, NULL, 10);
|
|
|
|
break;
|
|
|
|
case 'U':
|
|
|
|
userid = strtoul(optarg, NULL, 10);
|
|
|
|
break;
|
|
|
|
case 'm':
|
|
|
|
multi_user = true;
|
|
|
|
break;
|
|
|
|
case 'w':
|
|
|
|
full_write = true;
|
|
|
|
break;
|
2017-09-15 20:47:50 +02:00
|
|
|
case 'G':
|
|
|
|
derive_gid = true;
|
|
|
|
break;
|
2018-01-08 19:43:46 +01:00
|
|
|
case 'i':
|
|
|
|
default_normal = true;
|
|
|
|
break;
|
2016-07-12 21:13:05 +02:00
|
|
|
case '?':
|
|
|
|
default:
|
|
|
|
return usage();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = optind; i < argc; i++) {
|
|
|
|
char* arg = argv[i];
|
|
|
|
if (!source_path) {
|
|
|
|
source_path = arg;
|
|
|
|
} else if (!label) {
|
|
|
|
label = arg;
|
|
|
|
} else {
|
2016-07-12 23:05:32 +02:00
|
|
|
LOG(ERROR) << "too many arguments";
|
2016-07-12 21:13:05 +02:00
|
|
|
return usage();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!source_path) {
|
2016-07-12 23:05:32 +02:00
|
|
|
LOG(ERROR) << "no source path specified";
|
2016-07-12 21:13:05 +02:00
|
|
|
return usage();
|
|
|
|
}
|
|
|
|
if (!label) {
|
2016-07-12 23:05:32 +02:00
|
|
|
LOG(ERROR) << "no label specified";
|
2016-07-12 21:13:05 +02:00
|
|
|
return usage();
|
|
|
|
}
|
|
|
|
if (!uid || !gid) {
|
2016-07-12 23:05:32 +02:00
|
|
|
LOG(ERROR) << "uid and gid must be nonzero";
|
2016-07-12 21:13:05 +02:00
|
|
|
return usage();
|
|
|
|
}
|
|
|
|
|
|
|
|
rlim.rlim_cur = 8192;
|
|
|
|
rlim.rlim_max = 8192;
|
2016-10-06 21:51:20 +02:00
|
|
|
if (setrlimit(RLIMIT_NOFILE, &rlim) == -1) {
|
2016-07-12 23:05:32 +02:00
|
|
|
PLOG(ERROR) << "setting RLIMIT_NOFILE failed";
|
2016-07-12 21:13:05 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
while ((fs_read_atomic_int("/data/.layout_version", &fs_version) == -1) || (fs_version < 3)) {
|
2016-07-12 23:05:32 +02:00
|
|
|
LOG(ERROR) << "installd fs upgrade not yet complete; waiting...";
|
2016-07-12 21:13:05 +02:00
|
|
|
sleep(1);
|
|
|
|
}
|
|
|
|
|
2018-01-08 19:22:38 +01:00
|
|
|
run_sdcardfs(source_path, label, uid, gid, userid, multi_user, full_write, derive_gid,
|
2018-01-18 03:11:20 +01:00
|
|
|
default_normal, !should_use_sdcardfs());
|
2016-07-12 21:13:05 +02:00
|
|
|
return 1;
|
|
|
|
}
|