4cc6baf616
testNoAtime is new cts testcase, which verifies all writable block filesystems are mounted "noatime" toavoid unnecessary flash churn. So add noatime for vfat. Bug: 64137815 Test: run cts -m m CtsOsTestCases -t android.os.cts.EnvironmentTest#testNoAtime Change-Id: I4f42b54ed0d66e09964351da26d0d3bf38d573d6
210 lines
5.4 KiB
C++
210 lines
5.4 KiB
C++
/*
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/wait.h>
|
|
#include <linux/fs.h>
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <linux/kdev_t.h>
|
|
|
|
#define LOG_TAG "Vold"
|
|
|
|
#include <android-base/logging.h>
|
|
#include <android-base/stringprintf.h>
|
|
#include <cutils/log.h>
|
|
#include <cutils/properties.h>
|
|
#include <selinux/selinux.h>
|
|
|
|
#include <logwrap/logwrap.h>
|
|
|
|
#include "Vfat.h"
|
|
#include "Utils.h"
|
|
#include "VoldUtil.h"
|
|
|
|
using android::base::StringPrintf;
|
|
|
|
namespace android {
|
|
namespace vold {
|
|
namespace vfat {
|
|
|
|
static const char* kMkfsPath = "/system/bin/newfs_msdos";
|
|
static const char* kFsckPath = "/system/bin/fsck_msdos";
|
|
|
|
bool IsSupported() {
|
|
return access(kMkfsPath, X_OK) == 0
|
|
&& access(kFsckPath, X_OK) == 0
|
|
&& IsFilesystemSupported("vfat");
|
|
}
|
|
|
|
status_t Check(const std::string& source) {
|
|
if (access(kFsckPath, X_OK)) {
|
|
SLOGW("Skipping fs checks\n");
|
|
return 0;
|
|
}
|
|
|
|
int pass = 1;
|
|
int rc = 0;
|
|
do {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kFsckPath);
|
|
cmd.push_back("-p");
|
|
cmd.push_back("-f");
|
|
cmd.push_back(source);
|
|
|
|
// Fat devices are currently always untrusted
|
|
rc = ForkExecvp(cmd, sFsckUntrustedContext);
|
|
|
|
if (rc < 0) {
|
|
SLOGE("Filesystem check failed due to logwrap error");
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
|
|
switch(rc) {
|
|
case 0:
|
|
SLOGI("Filesystem check completed OK");
|
|
return 0;
|
|
|
|
case 2:
|
|
SLOGE("Filesystem check failed (not a FAT filesystem)");
|
|
errno = ENODATA;
|
|
return -1;
|
|
|
|
case 4:
|
|
if (pass++ <= 3) {
|
|
SLOGW("Filesystem modified - rechecking (pass %d)",
|
|
pass);
|
|
continue;
|
|
}
|
|
SLOGE("Failing check after too many rechecks");
|
|
errno = EIO;
|
|
return -1;
|
|
|
|
case 8:
|
|
SLOGE("Filesystem check failed (no filesystem)");
|
|
errno = ENODATA;
|
|
return -1;
|
|
|
|
default:
|
|
SLOGE("Filesystem check failed (unknown exit code %d)", rc);
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
} while (0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
status_t Mount(const std::string& source, const std::string& target, bool ro,
|
|
bool remount, bool executable, int ownerUid, int ownerGid, int permMask,
|
|
bool createLost) {
|
|
int rc;
|
|
unsigned long flags;
|
|
char mountData[255];
|
|
|
|
const char* c_source = source.c_str();
|
|
const char* c_target = target.c_str();
|
|
|
|
flags = MS_NODEV | MS_NOSUID | MS_DIRSYNC | MS_NOATIME;
|
|
|
|
flags |= (executable ? 0 : MS_NOEXEC);
|
|
flags |= (ro ? MS_RDONLY : 0);
|
|
flags |= (remount ? MS_REMOUNT : 0);
|
|
|
|
snprintf(mountData, sizeof(mountData),
|
|
"utf8,uid=%d,gid=%d,fmask=%o,dmask=%o,shortname=mixed",
|
|
ownerUid, ownerGid, permMask, permMask);
|
|
|
|
rc = mount(c_source, c_target, "vfat", flags, mountData);
|
|
|
|
if (rc && errno == EROFS) {
|
|
SLOGE("%s appears to be a read only filesystem - retrying mount RO", c_source);
|
|
flags |= MS_RDONLY;
|
|
rc = mount(c_source, c_target, "vfat", flags, mountData);
|
|
}
|
|
|
|
if (rc == 0 && createLost) {
|
|
char *lost_path;
|
|
asprintf(&lost_path, "%s/LOST.DIR", c_target);
|
|
if (access(lost_path, F_OK)) {
|
|
/*
|
|
* Create a LOST.DIR in the root so we have somewhere to put
|
|
* lost cluster chains (fsck_msdos doesn't currently do this)
|
|
*/
|
|
if (mkdir(lost_path, 0755)) {
|
|
SLOGE("Unable to create LOST.DIR (%s)", strerror(errno));
|
|
}
|
|
}
|
|
free(lost_path);
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
status_t Format(const std::string& source, unsigned long numSectors) {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kMkfsPath);
|
|
cmd.push_back("-F");
|
|
cmd.push_back("32");
|
|
cmd.push_back("-O");
|
|
cmd.push_back("android");
|
|
cmd.push_back("-c");
|
|
cmd.push_back("64");
|
|
cmd.push_back("-A");
|
|
|
|
if (numSectors) {
|
|
cmd.push_back("-s");
|
|
cmd.push_back(StringPrintf("%lu", numSectors));
|
|
}
|
|
|
|
cmd.push_back(source);
|
|
|
|
int rc = ForkExecvp(cmd);
|
|
if (rc < 0) {
|
|
SLOGE("Filesystem format failed due to logwrap error");
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
|
|
if (rc == 0) {
|
|
SLOGI("Filesystem formatted OK");
|
|
return 0;
|
|
} else {
|
|
SLOGE("Format failed (unknown exit code %d)", rc);
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
} // namespace vfat
|
|
} // namespace vold
|
|
} // namespace android
|