Update vold to prepare package sandboxes for primary volume.
Vold is updated to create package specific sandboxes for primary volume and mount them at "/mnt/user/<user-id>/package/<package-name>/<primary-label>". This will later be mounted at /storage when a new process starts. Bug: 111890351 Test: Manually verified that a package has access to "/sdcard" and "/storage/emulated/0", both of which are just the package specific sandboxes and the package doesn't have access to other sandboxes and can't see other package names. Change-Id: I72dc8ae9eb2260a298159c5de18387dad2f9de48
This commit is contained in:
parent
62bbb2b1d2
commit
53947a3662
6 changed files with 222 additions and 17 deletions
|
@ -64,14 +64,19 @@
|
||||||
#include "model/EmulatedVolume.h"
|
#include "model/EmulatedVolume.h"
|
||||||
#include "model/ObbVolume.h"
|
#include "model/ObbVolume.h"
|
||||||
|
|
||||||
|
using android::base::GetBoolProperty;
|
||||||
|
using android::base::StringAppendF;
|
||||||
using android::base::StringPrintf;
|
using android::base::StringPrintf;
|
||||||
using android::base::unique_fd;
|
using android::base::unique_fd;
|
||||||
|
|
||||||
static const char* kPathUserMount = "/mnt/user";
|
static const char* kPathUserMount = "/mnt/user";
|
||||||
static const char* kPathVirtualDisk = "/data/misc/vold/virtual_disk";
|
static const char* kPathVirtualDisk = "/data/misc/vold/virtual_disk";
|
||||||
|
|
||||||
|
static const char* kIsolatedStorage = "persist.sys.isolated_storage";
|
||||||
static const char* kPropVirtualDisk = "persist.sys.virtual_disk";
|
static const char* kPropVirtualDisk = "persist.sys.virtual_disk";
|
||||||
|
|
||||||
|
static const std::string kEmptyString("");
|
||||||
|
|
||||||
/* 512MiB is large enough for testing purposes */
|
/* 512MiB is large enough for testing purposes */
|
||||||
static const unsigned int kSizeVirtualDisk = 536870912;
|
static const unsigned int kSizeVirtualDisk = 536870912;
|
||||||
|
|
||||||
|
@ -341,27 +346,189 @@ int VolumeManager::forgetPartition(const std::string& partGuid, const std::strin
|
||||||
return success ? 0 : -1;
|
return success ? 0 : -1;
|
||||||
}
|
}
|
||||||
|
|
||||||
int VolumeManager::linkPrimary(userid_t userId) {
|
int VolumeManager::linkPrimary(userid_t userId, const std::vector<std::string>& packageNames) {
|
||||||
std::string source(mPrimary->getPath());
|
if (GetBoolProperty(kIsolatedStorage, false)) {
|
||||||
if (mPrimary->getType() == android::vold::VolumeBase::Type::kEmulated) {
|
std::string source(StringPrintf("/mnt/runtime/write/%s", mPrimary->getLabel().c_str()));
|
||||||
source = StringPrintf("%s/%d", source.c_str(), userId);
|
bool isPrimaryEmulated =
|
||||||
fs_prepare_dir(source.c_str(), 0755, AID_ROOT, AID_ROOT);
|
(mPrimary->getType() == android::vold::VolumeBase::Type::kEmulated);
|
||||||
}
|
if (isPrimaryEmulated) {
|
||||||
|
StringAppendF(&source, "/%d", userId);
|
||||||
|
if (fs_prepare_dir(source.c_str(), 0755, AID_ROOT, AID_ROOT) != 0) {
|
||||||
|
PLOG(ERROR) << "fs_prepare_dir failed on " << source;
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return mountSandboxesForPrimaryVol(source, userId, packageNames, isPrimaryEmulated);
|
||||||
|
} else {
|
||||||
|
std::string source(mPrimary->getPath());
|
||||||
|
if (mPrimary->getType() == android::vold::VolumeBase::Type::kEmulated) {
|
||||||
|
source = StringPrintf("%s/%d", source.c_str(), userId);
|
||||||
|
fs_prepare_dir(source.c_str(), 0755, AID_ROOT, AID_ROOT);
|
||||||
|
}
|
||||||
|
|
||||||
std::string target(StringPrintf("/mnt/user/%d/primary", userId));
|
std::string target(StringPrintf("/mnt/user/%d/primary", userId));
|
||||||
if (TEMP_FAILURE_RETRY(unlink(target.c_str()))) {
|
if (TEMP_FAILURE_RETRY(unlink(target.c_str()))) {
|
||||||
if (errno != ENOENT) {
|
if (errno != ENOENT) {
|
||||||
PLOG(WARNING) << "Failed to unlink " << target;
|
PLOG(WARNING) << "Failed to unlink " << target;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
LOG(DEBUG) << "Linking " << source << " to " << target;
|
||||||
|
if (TEMP_FAILURE_RETRY(symlink(source.c_str(), target.c_str()))) {
|
||||||
|
PLOG(WARNING) << "Failed to link";
|
||||||
|
return -errno;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
LOG(DEBUG) << "Linking " << source << " to " << target;
|
return 0;
|
||||||
if (TEMP_FAILURE_RETRY(symlink(source.c_str(), target.c_str()))) {
|
}
|
||||||
PLOG(WARNING) << "Failed to link";
|
|
||||||
|
int VolumeManager::mountSandboxesForPrimaryVol(const std::string& primaryRoot, userid_t userId,
|
||||||
|
const std::vector<std::string>& packageNames, bool isPrimaryEmulated) {
|
||||||
|
|
||||||
|
std::string sandboxRoot = prepareSubDirs(primaryRoot, "Android/sandbox/",
|
||||||
|
0700, AID_ROOT, AID_ROOT);
|
||||||
|
if (sandboxRoot.empty()) {
|
||||||
return -errno;
|
return -errno;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::string dataRoot = prepareSubDirs(primaryRoot, "Android/data/",
|
||||||
|
0700, AID_ROOT, AID_ROOT);
|
||||||
|
if (dataRoot.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string segment = StringPrintf("%d/package/", userId);
|
||||||
|
std::string mntTargetRoot = prepareSubDirs("/mnt/user", segment.c_str(),
|
||||||
|
0700, AID_ROOT, AID_ROOT);
|
||||||
|
if (mntTargetRoot.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
|
||||||
|
for (auto& packageName : packageNames) {
|
||||||
|
const auto& it = mAppIds.find(packageName);
|
||||||
|
if (it == mAppIds.end()) {
|
||||||
|
PLOG(ERROR) << "appId is not available for " << packageName;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
appid_t appId = it->second;
|
||||||
|
std::string sandboxId = mSandboxIds[appId];
|
||||||
|
uid_t uid = multiuser_get_uid(userId, appId);
|
||||||
|
|
||||||
|
// Create [1] /mnt/runtime/write/emulated/0/Android/sandbox/<sandboxId>
|
||||||
|
// Create [2] /mnt/user/0/package/<packageName>/emulated/0
|
||||||
|
// Mount [1] at [2]
|
||||||
|
std::string pkgSandboxSourceDir = prepareSandboxSource(uid, sandboxId, sandboxRoot);
|
||||||
|
if (pkgSandboxSourceDir.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
std::string pkgSandboxTargetDir = prepareSandboxTarget(packageName, uid,
|
||||||
|
mPrimary->getLabel(), mntTargetRoot, isPrimaryEmulated);
|
||||||
|
if (pkgSandboxTargetDir.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
if (TEMP_FAILURE_RETRY(mount(pkgSandboxSourceDir.c_str(), pkgSandboxTargetDir.c_str(),
|
||||||
|
nullptr, MS_BIND | MS_REC | MS_SLAVE, nullptr)) == -1) {
|
||||||
|
PLOG(ERROR) << "Failed to mount " << pkgSandboxSourceDir << " at "
|
||||||
|
<< pkgSandboxTargetDir;
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create [1] /mnt/runtime/write/emulated/0/Android/data/<packageName>
|
||||||
|
// Create [2] /mnt/user/0/package/<packageName>/emulated/0/Android/data/<packageName>
|
||||||
|
// Mount [1] at [2]
|
||||||
|
std::string pkgDataSourceDir = preparePkgDataSource(packageName, uid, dataRoot);
|
||||||
|
if (pkgDataSourceDir.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
std::string pkgDataTargetDir = preparePkgDataTarget(packageName, uid,
|
||||||
|
pkgSandboxTargetDir);
|
||||||
|
if (pkgDataTargetDir.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
if (TEMP_FAILURE_RETRY(mount(pkgDataSourceDir.c_str(), pkgDataTargetDir.c_str(),
|
||||||
|
nullptr, MS_BIND | MS_REC | MS_SLAVE, nullptr)) == -1) {
|
||||||
|
PLOG(ERROR) << "Failed to mount " << pkgDataSourceDir << " at "
|
||||||
|
<< pkgDataTargetDir;
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Create [1] /mnt/user/0/package/<packageName>/self/primary
|
||||||
|
// Already created [2] /mnt/user/0/package/<packageName>/emulated/0
|
||||||
|
// Mount [2] at [1]
|
||||||
|
std::string pkgPrimaryTargetDir = prepareSubDirs(
|
||||||
|
StringPrintf("%s/%s", mntTargetRoot.c_str(), packageName.c_str()),
|
||||||
|
"self/primary/", 0755, uid, uid);
|
||||||
|
if (pkgPrimaryTargetDir.empty()) {
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
if (TEMP_FAILURE_RETRY(mount(pkgSandboxTargetDir.c_str(), pkgPrimaryTargetDir.c_str(),
|
||||||
|
nullptr, MS_BIND | MS_REC | MS_SLAVE, nullptr)) == -1) {
|
||||||
|
PLOG(ERROR) << "Failed to mount " << pkgSandboxTargetDir << " at "
|
||||||
|
<< pkgPrimaryTargetDir;
|
||||||
|
return -errno;
|
||||||
|
}
|
||||||
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
std::string VolumeManager::prepareSubDirs(const std::string& pathPrefix,
|
||||||
|
const std::string& subDirs, mode_t mode, uid_t uid, gid_t gid) {
|
||||||
|
std::string path(pathPrefix);
|
||||||
|
std::vector<std::string> subDirList = android::base::Split(subDirs, "/");
|
||||||
|
for (size_t i = 0; i < subDirList.size(); ++i) {
|
||||||
|
std::string subDir = subDirList[i];
|
||||||
|
if (subDir.empty()) {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
StringAppendF(&path, "/%s", subDir.c_str());
|
||||||
|
if (fs_prepare_dir(path.c_str(), mode, uid, gid) != 0) {
|
||||||
|
PLOG(ERROR) << "fs_prepare_dir failed on " << path;
|
||||||
|
return kEmptyString;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return path;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string VolumeManager::prepareSandboxSource(uid_t uid, const std::string& sandboxId,
|
||||||
|
const std::string& sandboxRootDir) {
|
||||||
|
std::string sandboxSourceDir = StringPrintf("%s/%s",
|
||||||
|
sandboxRootDir.c_str(), sandboxId.c_str());
|
||||||
|
if (fs_prepare_dir(sandboxSourceDir.c_str(), 0755, uid, uid) != 0) {
|
||||||
|
PLOG(ERROR) << "fs_prepare_dir failed on " << sandboxSourceDir;
|
||||||
|
return kEmptyString;
|
||||||
|
}
|
||||||
|
return sandboxSourceDir;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string VolumeManager::prepareSandboxTarget(const std::string& packageName, uid_t uid,
|
||||||
|
const std::string& volumeLabel, const std::string& mntTargetRootDir,
|
||||||
|
bool isUserDependent) {
|
||||||
|
std::string segment;
|
||||||
|
if (isUserDependent) {
|
||||||
|
segment = StringPrintf("%s/%s/%d/",
|
||||||
|
packageName.c_str(), volumeLabel.c_str(), multiuser_get_user_id(uid));
|
||||||
|
} else {
|
||||||
|
segment = StringPrintf("%s/%s/",
|
||||||
|
packageName.c_str(), volumeLabel.c_str());
|
||||||
|
}
|
||||||
|
return prepareSubDirs(mntTargetRootDir, segment.c_str(), 0755, uid, uid);
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string VolumeManager::preparePkgDataSource(const std::string& packageName, uid_t uid,
|
||||||
|
const std::string& dataRootDir) {
|
||||||
|
std::string dataSourceDir = StringPrintf("%s/%s", dataRootDir.c_str(), packageName.c_str());
|
||||||
|
if (fs_prepare_dir(dataSourceDir.c_str(), 0755, uid, uid) != 0) {
|
||||||
|
PLOG(ERROR) << "fs_prepare_dir failed on " << dataSourceDir;
|
||||||
|
return kEmptyString;
|
||||||
|
}
|
||||||
|
return dataSourceDir;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::string VolumeManager::preparePkgDataTarget(const std::string& packageName, uid_t uid,
|
||||||
|
const std::string& pkgSandboxDir) {
|
||||||
|
std::string segment = StringPrintf("Android/data/%s/", packageName.c_str());
|
||||||
|
return prepareSubDirs(pkgSandboxDir, segment.c_str(), 0755, uid, uid);
|
||||||
|
}
|
||||||
|
|
||||||
int VolumeManager::onUserAdded(userid_t userId, int userSerialNumber) {
|
int VolumeManager::onUserAdded(userid_t userId, int userSerialNumber) {
|
||||||
mAddedUsers[userId] = userSerialNumber;
|
mAddedUsers[userId] = userSerialNumber;
|
||||||
return 0;
|
return 0;
|
||||||
|
@ -382,7 +549,7 @@ int VolumeManager::onUserStarted(userid_t userId, const std::vector<std::string>
|
||||||
mStartedUsers.insert(userId);
|
mStartedUsers.insert(userId);
|
||||||
mUserPackages[userId] = packageNames;
|
mUserPackages[userId] = packageNames;
|
||||||
if (mPrimary) {
|
if (mPrimary) {
|
||||||
linkPrimary(userId);
|
linkPrimary(userId, packageNames);
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@ -425,7 +592,7 @@ int VolumeManager::onSecureKeyguardStateChanged(bool isShowing) {
|
||||||
int VolumeManager::setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol) {
|
int VolumeManager::setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol) {
|
||||||
mPrimary = vol;
|
mPrimary = vol;
|
||||||
for (userid_t userId : mStartedUsers) {
|
for (userid_t userId : mStartedUsers) {
|
||||||
linkPrimary(userId);
|
linkPrimary(userId, mUserPackages[userId]);
|
||||||
}
|
}
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
@ -458,6 +625,11 @@ static int unmount_tree(const std::string& prefix) {
|
||||||
}
|
}
|
||||||
|
|
||||||
int VolumeManager::remountUid(uid_t uid, const std::string& mode) {
|
int VolumeManager::remountUid(uid_t uid, const std::string& mode) {
|
||||||
|
// If the isolated storage is enabled, return -1 since in the isolated storage world, there
|
||||||
|
// are no longer any runtime storage permissions, so this shouldn't be called anymore.
|
||||||
|
if (GetBoolProperty(kIsolatedStorage, false)) {
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
LOG(DEBUG) << "Remounting " << uid << " as mode " << mode;
|
LOG(DEBUG) << "Remounting " << uid << " as mode " << mode;
|
||||||
|
|
||||||
DIR* dir;
|
DIR* dir;
|
||||||
|
|
|
@ -136,7 +136,20 @@ private:
|
||||||
VolumeManager();
|
VolumeManager();
|
||||||
void readInitialState();
|
void readInitialState();
|
||||||
|
|
||||||
int linkPrimary(userid_t userId);
|
int linkPrimary(userid_t userId, const std::vector<std::string>& packageNames);
|
||||||
|
|
||||||
|
std::string prepareSandboxSource(uid_t uid, const std::string& sandboxId,
|
||||||
|
const std::string& sandboxRootDir);
|
||||||
|
std::string prepareSandboxTarget(const std::string& packageName, uid_t uid,
|
||||||
|
const std::string& volumeLabel, const std::string& mntTargetRootDir, bool isUserDependent);
|
||||||
|
std::string preparePkgDataSource(const std::string& packageName, uid_t uid,
|
||||||
|
const std::string& dataRootDir);
|
||||||
|
std::string preparePkgDataTarget(const std::string& packageName, uid_t uid,
|
||||||
|
const std::string& pkgSandboxDir);
|
||||||
|
int mountSandboxesForPrimaryVol(const std::string& primaryRoot, userid_t userId,
|
||||||
|
const std::vector<std::string>& packageNames, bool isPrimaryEmulated);
|
||||||
|
std::string prepareSubDirs(const std::string& pathPrefix, const std::string& subDirs,
|
||||||
|
mode_t mode, uid_t uid, gid_t gid);
|
||||||
|
|
||||||
void handleDiskAdded(const std::shared_ptr<android::vold::Disk>& disk);
|
void handleDiskAdded(const std::shared_ptr<android::vold::Disk>& disk);
|
||||||
void handleDiskChanged(dev_t device);
|
void handleDiskChanged(dev_t device);
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
#include "EmulatedVolume.h"
|
#include "EmulatedVolume.h"
|
||||||
#include "Utils.h"
|
#include "Utils.h"
|
||||||
|
|
||||||
#include <android-base/stringprintf.h>
|
|
||||||
#include <android-base/logging.h>
|
#include <android-base/logging.h>
|
||||||
|
#include <android-base/stringprintf.h>
|
||||||
#include <cutils/fs.h>
|
#include <cutils/fs.h>
|
||||||
#include <private/android_filesystem_config.h>
|
#include <private/android_filesystem_config.h>
|
||||||
#include <utils/Timers.h>
|
#include <utils/Timers.h>
|
||||||
|
@ -69,6 +69,7 @@ status_t EmulatedVolume::doMount() {
|
||||||
|
|
||||||
setInternalPath(mRawPath);
|
setInternalPath(mRawPath);
|
||||||
setPath(StringPrintf("/storage/%s", label.c_str()));
|
setPath(StringPrintf("/storage/%s", label.c_str()));
|
||||||
|
setLabel(label);
|
||||||
|
|
||||||
if (fs_prepare_dir(mFuseDefault.c_str(), 0700, AID_ROOT, AID_ROOT) ||
|
if (fs_prepare_dir(mFuseDefault.c_str(), 0700, AID_ROOT, AID_ROOT) ||
|
||||||
fs_prepare_dir(mFuseRead.c_str(), 0700, AID_ROOT, AID_ROOT) ||
|
fs_prepare_dir(mFuseRead.c_str(), 0700, AID_ROOT, AID_ROOT) ||
|
||||||
|
|
|
@ -129,6 +129,7 @@ status_t PublicVolume::doMount() {
|
||||||
} else {
|
} else {
|
||||||
setPath(mRawPath);
|
setPath(mRawPath);
|
||||||
}
|
}
|
||||||
|
setLabel(stableName);
|
||||||
|
|
||||||
if (fs_prepare_dir(mRawPath.c_str(), 0700, AID_ROOT, AID_ROOT)) {
|
if (fs_prepare_dir(mRawPath.c_str(), 0700, AID_ROOT, AID_ROOT)) {
|
||||||
PLOG(ERROR) << getId() << " failed to create mount points";
|
PLOG(ERROR) << getId() << " failed to create mount points";
|
||||||
|
|
|
@ -136,6 +136,16 @@ status_t VolumeBase::setInternalPath(const std::string& internalPath) {
|
||||||
return OK;
|
return OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
status_t VolumeBase::setLabel(const std::string& label) {
|
||||||
|
if (mState != State::kChecking) {
|
||||||
|
LOG(WARNING) << getId() << " label change requires state checking";
|
||||||
|
return -EBUSY;
|
||||||
|
}
|
||||||
|
|
||||||
|
mLabel = label;
|
||||||
|
return OK;
|
||||||
|
}
|
||||||
|
|
||||||
android::sp<android::os::IVoldListener> VolumeBase::getListener() {
|
android::sp<android::os::IVoldListener> VolumeBase::getListener() {
|
||||||
if (mSilent) {
|
if (mSilent) {
|
||||||
return nullptr;
|
return nullptr;
|
||||||
|
|
|
@ -84,6 +84,7 @@ public:
|
||||||
State getState() { return mState; }
|
State getState() { return mState; }
|
||||||
const std::string& getPath() { return mPath; }
|
const std::string& getPath() { return mPath; }
|
||||||
const std::string& getInternalPath() { return mInternalPath; }
|
const std::string& getInternalPath() { return mInternalPath; }
|
||||||
|
const std::string& getLabel() { return mLabel; }
|
||||||
|
|
||||||
status_t setDiskId(const std::string& diskId);
|
status_t setDiskId(const std::string& diskId);
|
||||||
status_t setPartGuid(const std::string& partGuid);
|
status_t setPartGuid(const std::string& partGuid);
|
||||||
|
@ -114,6 +115,7 @@ protected:
|
||||||
status_t setId(const std::string& id);
|
status_t setId(const std::string& id);
|
||||||
status_t setPath(const std::string& path);
|
status_t setPath(const std::string& path);
|
||||||
status_t setInternalPath(const std::string& internalPath);
|
status_t setInternalPath(const std::string& internalPath);
|
||||||
|
status_t setLabel(const std::string& label);
|
||||||
|
|
||||||
android::sp<android::os::IVoldListener> getListener();
|
android::sp<android::os::IVoldListener> getListener();
|
||||||
|
|
||||||
|
@ -140,6 +142,12 @@ private:
|
||||||
std::string mInternalPath;
|
std::string mInternalPath;
|
||||||
/* Flag indicating that volume should emit no events */
|
/* Flag indicating that volume should emit no events */
|
||||||
bool mSilent;
|
bool mSilent;
|
||||||
|
/**
|
||||||
|
* Label used for representing the package sandboxes on external storage volumes.
|
||||||
|
* For emulated volume, this would be "emulated" and for public volumes, UUID if available,
|
||||||
|
* otherwise some other unique id.
|
||||||
|
*/
|
||||||
|
std::string mLabel;
|
||||||
|
|
||||||
/* Volumes stacked on top of this volume */
|
/* Volumes stacked on top of this volume */
|
||||||
std::list<std::shared_ptr<VolumeBase>> mVolumes;
|
std::list<std::shared_ptr<VolumeBase>> mVolumes;
|
||||||
|
|
Loading…
Reference in a new issue