platform_system_core/fs_mgr
David Anderson 0e5ad5a093 snapuserd: Allow connecting to the first-stage daemon.
Currently there is no socket for daemon instances launched during the
selinux phase of init. We don't create any sockets due to the complexity
of the required sepolicy.

This workaround will allow us to create the socket with very minimal
sepolicy changes. init will launch a one-off instance of snapuserd in
"proxy" mode, and then the following steps will occur:

1. The proxy daemon will be given two sockets, the "normal" socket that
snapuserd clients would connect to, and a "proxy" socket.
2. The proxy daemon will listen on the proxy socket.
3. The first-stage daemon will wake up and connect to the proxy daemon
as a client.
4. The proxy will send the normal socket via SCM_RIGHTS, then exit.
5. The first-stage daemon can now listen and accept on the normal
socket.

Ordering of these events is achieved through a snapuserd.proxy_ready
property.

Some special-casing was needed in init to make this work. The snapuserd
socket owned by snapuserd_proxy is placed into a "persist" mode so it
doesn't get deleted when snapuserd_proxy exits. There's also a special
case method to create a Service object around a previously existing pid.

Finally, first-stage init is technically on a different updateable
partition than snapuserd. Thus, we add a way to query snapuserd to see
if it supports socket handoff. If it does, we communicate this
information through an environment variable to second-stage init.

Bug: 193833730
Test: manual test
Change-Id: I1950b31028980f0138bc03578cd455eb60ea4a58
2021-07-27 19:35:29 -07:00
..
include snapuserd: Allow connecting to the first-stage daemon. 2021-07-27 19:35:29 -07:00
include_fstab/fstab OverlayFS support for fstab 2021-05-05 09:30:18 -07:00
libdm Deflake libdm#CreateEmptyDevice test 2021-07-15 15:33:17 +01:00
libfiemap Merge changes from topic "fs_mgr-vendor-ramdisk" 2021-07-26 20:54:04 +00:00
libfs_avb Make libfs_mgr and its dependencies vendor_ramdisk_available. 2021-07-23 16:50:06 -07:00
liblp Make libfs_mgr and its dependencies vendor_ramdisk_available. 2021-07-23 16:50:06 -07:00
libsnapshot snapuserd: Allow connecting to the first-stage daemon. 2021-07-27 19:35:29 -07:00
libstorage_literals Make libfs_mgr and its dependencies vendor_ramdisk_available. 2021-07-23 16:50:06 -07:00
libvbmeta [LSC] Add LOCAL_LICENSE_KINDS to system/core 2021-02-19 12:59:05 -08:00
tests Revert "Handle "hardware" bootconfig parameter as "androidboot.hardware"" 2021-06-22 09:54:57 -07:00
tools follows the advice of -Wsign-compare 2021-02-25 02:20:17 +00:00
.clang-format
Android.bp Make libfs_mgr and its dependencies vendor_ramdisk_available. 2021-07-23 16:50:06 -07:00
clean_scratch_files.cpp remount: Use /data for backing scratch storage. 2020-01-28 12:04:38 -08:00
clean_scratch_files.rc fs_mgr: Fix executable path in clean_scratch_files. 2020-04-15 21:27:56 +00:00
file_wait.cpp snapuserd: Allow connecting to the first-stage daemon. 2021-07-27 19:35:29 -07:00
fs_mgr.cpp fs_mgr: fix space instead of tab in code 2021-06-24 13:41:08 +09:00
fs_mgr_boot_config.cpp Revert "Handle "hardware" bootconfig parameter as "androidboot.hardware"" 2021-06-22 09:54:57 -07:00
fs_mgr_dm_linear.cpp libsnapshot_test: Fix running on DSUs. 2020-05-19 18:48:10 +00:00
fs_mgr_format.cpp Rename external storage properties. 2020-04-16 10:13:28 +02:00
fs_mgr_fstab.cpp fs_mgr_fstab: Parse overlayfs options from fs flags 2021-05-27 16:37:53 +08:00
fs_mgr_overlayfs.cpp Remove deprecated fs_mgr_overlayfs_required_devices() 2021-05-28 08:30:55 +00:00
fs_mgr_priv.h
fs_mgr_priv_boot_config.h Support bootconfig in first stage init and fs_mgr 2021-02-23 07:42:06 -08:00
fs_mgr_remount.cpp remount: Fix failure for system-as-root 2021-06-04 22:30:28 +08:00
fs_mgr_roots.cpp Add erofs to supported fs type 2020-12-04 13:39:34 +00:00
fs_mgr_slotselect.cpp
fs_mgr_vendor_overlay.cpp fs_mgr_vendor_overlay: Mount vendor overlay with noatime 2021-05-18 17:26:57 +08:00
fs_mgr_verity.cpp
NOTICE fs_mgr: License boilerplate 2021-07-09 06:24:04 +00:00
OWNERS Add new owners to various sub-projects. 2020-12-11 12:45:45 -08:00
README.overlayfs.md LRAP->DAP 2020-12-17 10:56:09 -08:00
TEST_MAPPING Add cow_api_test to presubmit. 2021-05-05 15:29:35 -07:00

Android OverlayFS Integration with adb Remount

Introduction

Users working with userdebug or eng builds expect to be able to remount the system partition as read-write and then add or modify any number of files without reflashing the system image, which is efficient for a development cycle.

Limited memory systems use read-only types of file systems or dynamic Android partitions (DAPs). These file systems land system partition images right-sized, and have been deduped at the block level to compress the content. This means that a remount either isnt possible, or isn't useful because of space limitations or support logistics.

OverlayFS resolves these debug scenarios with the adb disable-verity and adb remount commands, which set up backing storage for a writable file system as an upper reference, and mount the lower reference on top.

Performing a remount

Use the following sequence to perform the remount.

$ adb root
$ adb disable-verity
$ adb reboot
$ adb wait-for-device
$ adb root
$ adb remount

Then enter one of the following sequences:

$ adb shell stop
$ adb sync
$ adb shell start
$ adb reboot

or

$ adb push <source> <destination>
$ adb reboot

Note that you can replace these two lines in the above sequence:

$ adb disable-verity
$ adb reboot

with this line:

$ adb remount -R

Note: adb remount -R wont reboot if the device is already in the adb remount state.

None of this changes if OverlayFS needs to be engaged. The decisions whether to use traditional direct file-system remount, or one wrapped by OverlayFS is automatically determined based on a probe of the file-system types and space remaining.

Backing Storage

When OverlayFS logic is feasible, it uses either the /cache/overlay/ directory for non-A/B devices, or the /mnt/scratch/overlay directory for A/B devices that have access to LRAP. It is also possible for an A/B device to use the system_ partition for backing storage. eg: if booting off system_a+vendor_a, use system_b. The backing store is used as soon as possible in the boot process and can occur at first stage init, or when the mount_all commands are run in init RC scripts.

By attaching OverlayFS early, SEpolicy or init can be pushed and used after the exec phases of each stage.

Caveats

  • Backing storage requires more space than immutable storage, as backing is done file by file. Be mindful of wasted space. For example, defining BOARD_IMAGE_PARTITION_RESERVED_SIZE has a negative impact on the right-sizing of images and requires more free dynamic partition space.
  • The kernel requires CONFIG_OVERLAY_FS=y. If the kernel version is higher than 4.4, it requires source to be in line with android-common kernels.  The patch series is available on the upstream mailing list and the latest as of Sep 5 2019 is https://www.spinics.net/lists/linux-mtd/msg08331.html This patch adds an override_creds mount option to OverlayFS that permits legacy behavior for systems that do not have overlapping sepolicy rules, principals of least privilege, which is how Android behaves. For 4.19 and higher a rework of the xattr handling to deal with recursion is required. https://patchwork.kernel.org/patch/11117145/ is a start of that adjustment.
  • adb enable-verity frees up OverlayFS and reverts the device to the state prior to content updates. The update engine performs a full OTA.
  • adb remount overrides are incompatible with OTA resources, so the update engine may not run if fs_mgr_overlayfs_is_setup() returns true.
  • If a dynamic partition runs out of space, making a logical partition larger may fail because of the scratch partition. If this happens, clear the scratch storage by running either either fastboot flashall or adb enable-verity. Then reinstate the overrides and continue.
  • For implementation simplicity on retrofit dynamic partition devices, take the whole alternate super (eg: if "a" slot, then the whole of "system_b"). Since landing a filesystem on the alternate super physical device without differentiating if it is setup to support logical or physical, the alternate slot metadata and previous content will be lost.
  • There are other subtle caveats requiring complex logic to solve. Have evaluated them as too complex or not worth the trouble, please File a bug if a use case needs to be covered.
    • The backing storage is treated fragile, if anything else has issue with the space taken, the backing storage will be cleared out and we reserve the right to not inform, if the layering does not prevent any messaging.
    • Space remaining threshold is hard coded. If 1% or more space still remains, OverlayFS will not be used, yet that amount of space remaining is problematic.
    • Flashing a partition via bootloader fastboot, as opposed to user space fastbootd, is not detected, thus a partition may have override content remaining. adb enable-verity to wipe.
    • Space is limited, there is near unlimited space on userdata, we have made an architectural decision to not utilize /data/overlay/ at this time. Acquiring space to use for backing remains an ongoing battle.
    • First stage init, or ramdisk, can not be overriden.
    • Backing storage will be discarded or ignored on errors, leading to confusion. When debugging using adb remount it is currently advised to confirm update is present after a reboot to develop confidence.
  • File bugs or submit fixes for review.