/* * Copyright (C) 2008 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define LOG_TAG "Vold" #include #include #include #include #include #include #include "Vfat.h" #include "Utils.h" #include "VoldUtil.h" using android::base::StringPrintf; namespace android { namespace vold { namespace vfat { static const char* kMkfsPath = "/system/bin/newfs_msdos"; static const char* kFsckPath = "/system/bin/fsck_msdos"; bool IsSupported() { return access(kMkfsPath, X_OK) == 0 && access(kFsckPath, X_OK) == 0 && IsFilesystemSupported("vfat"); } status_t Check(const std::string& source) { if (access(kFsckPath, X_OK)) { SLOGW("Skipping fs checks\n"); return 0; } int pass = 1; int rc = 0; do { std::vector cmd; cmd.push_back(kFsckPath); cmd.push_back("-p"); cmd.push_back("-f"); cmd.push_back(source); // Fat devices are currently always untrusted rc = ForkExecvp(cmd, sFsckUntrustedContext); if (rc < 0) { SLOGE("Filesystem check failed due to logwrap error"); errno = EIO; return -1; } switch(rc) { case 0: SLOGI("Filesystem check completed OK"); return 0; case 2: SLOGE("Filesystem check failed (not a FAT filesystem)"); errno = ENODATA; return -1; case 4: if (pass++ <= 3) { SLOGW("Filesystem modified - rechecking (pass %d)", pass); continue; } SLOGE("Failing check after too many rechecks"); errno = EIO; return -1; default: SLOGE("Filesystem check failed (unknown exit code %d)", rc); errno = EIO; return -1; } } while (0); return 0; } status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount, bool executable, int ownerUid, int ownerGid, int permMask, bool createLost) { int rc; unsigned long flags; char mountData[255]; const char* c_source = source.c_str(); const char* c_target = target.c_str(); flags = MS_NODEV | MS_NOSUID | MS_DIRSYNC; flags |= (executable ? 0 : MS_NOEXEC); flags |= (ro ? MS_RDONLY : 0); flags |= (remount ? MS_REMOUNT : 0); sprintf(mountData, "utf8,uid=%d,gid=%d,fmask=%o,dmask=%o,shortname=mixed", ownerUid, ownerGid, permMask, permMask); rc = mount(c_source, c_target, "vfat", flags, mountData); if (rc && errno == EROFS) { SLOGE("%s appears to be a read only filesystem - retrying mount RO", c_source); flags |= MS_RDONLY; rc = mount(c_source, c_target, "vfat", flags, mountData); } if (rc == 0 && createLost) { char *lost_path; asprintf(&lost_path, "%s/LOST.DIR", c_target); if (access(lost_path, F_OK)) { /* * Create a LOST.DIR in the root so we have somewhere to put * lost cluster chains (fsck_msdos doesn't currently do this) */ if (mkdir(lost_path, 0755)) { SLOGE("Unable to create LOST.DIR (%s)", strerror(errno)); } } free(lost_path); } return rc; } status_t Format(const std::string& source, unsigned int numSectors) { std::vector cmd; cmd.push_back(kMkfsPath); cmd.push_back("-F"); cmd.push_back("32"); cmd.push_back("-O"); cmd.push_back("android"); cmd.push_back("-c"); cmd.push_back("64"); cmd.push_back("-A"); if (numSectors) { cmd.push_back("-s"); cmd.push_back(StringPrintf("%u", numSectors)); } cmd.push_back(source); int rc = ForkExecvp(cmd); if (rc < 0) { SLOGE("Filesystem format failed due to logwrap error"); errno = EIO; return -1; } if (rc == 0) { SLOGI("Filesystem formatted OK"); return 0; } else { SLOGE("Format failed (unknown exit code %d)", rc); errno = EIO; return -1; } return 0; } } // namespace vfat } // namespace vold } // namespace android