95a92f9203
Otherwise we might end up creating ext4 partitions that the device can't mount. Bug: 63763609 Test: builds, boots Exempt-From-Owner-Approval: Bug 63673347 Change-Id: I5f6cf73f23a55bc0dea9480523f19049313c3dd1
202 lines
5.7 KiB
C++
202 lines
5.7 KiB
C++
/*
|
|
* Copyright (C) 2012 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <vector>
|
|
#include <string>
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/wait.h>
|
|
|
|
#include <linux/kdev_t.h>
|
|
|
|
#define LOG_TAG "Vold"
|
|
|
|
#include <android-base/logging.h>
|
|
#include <android-base/properties.h>
|
|
#include <android-base/stringprintf.h>
|
|
#include <cutils/log.h>
|
|
#include <cutils/properties.h>
|
|
#include <logwrap/logwrap.h>
|
|
#include <selinux/selinux.h>
|
|
|
|
#include "Ext4.h"
|
|
#include "Ext4Crypt.h"
|
|
#include "Utils.h"
|
|
#include "VoldUtil.h"
|
|
|
|
using android::base::StringPrintf;
|
|
|
|
namespace android {
|
|
namespace vold {
|
|
namespace ext4 {
|
|
|
|
static const char* kResizefsPath = "/system/bin/resize2fs";
|
|
static const char* kMkfsPath = "/system/bin/mke2fs";
|
|
static const char* kFsckPath = "/system/bin/e2fsck";
|
|
|
|
bool IsSupported() {
|
|
return access(kMkfsPath, X_OK) == 0
|
|
&& access(kFsckPath, X_OK) == 0
|
|
&& IsFilesystemSupported("ext4");
|
|
}
|
|
|
|
status_t Check(const std::string& source, const std::string& target) {
|
|
// The following is shamelessly borrowed from fs_mgr.c, so it should be
|
|
// kept in sync with any changes over there.
|
|
|
|
const char* c_source = source.c_str();
|
|
const char* c_target = target.c_str();
|
|
|
|
int status;
|
|
int ret;
|
|
long tmpmnt_flags = MS_NOATIME | MS_NOEXEC | MS_NOSUID;
|
|
char *tmpmnt_opts = (char*) "nomblk_io_submit,errors=remount-ro";
|
|
|
|
/*
|
|
* First try to mount and unmount the filesystem. We do this because
|
|
* the kernel is more efficient than e2fsck in running the journal and
|
|
* processing orphaned inodes, and on at least one device with a
|
|
* performance issue in the emmc firmware, it can take e2fsck 2.5 minutes
|
|
* to do what the kernel does in about a second.
|
|
*
|
|
* After mounting and unmounting the filesystem, run e2fsck, and if an
|
|
* error is recorded in the filesystem superblock, e2fsck will do a full
|
|
* check. Otherwise, it does nothing. If the kernel cannot mount the
|
|
* filesytsem due to an error, e2fsck is still run to do a full check
|
|
* fix the filesystem.
|
|
*/
|
|
ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts);
|
|
if (!ret) {
|
|
int i;
|
|
for (i = 0; i < 5; i++) {
|
|
// Try to umount 5 times before continuing on.
|
|
// Should we try rebooting if all attempts fail?
|
|
int result = umount(c_target);
|
|
if (result == 0) {
|
|
break;
|
|
}
|
|
ALOGW("%s(): umount(%s)=%d: %s\n", __func__, c_target, result, strerror(errno));
|
|
sleep(1);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Some system images do not have e2fsck for licensing reasons
|
|
* (e.g. recent SDK system images). Detect these and skip the check.
|
|
*/
|
|
if (access(kFsckPath, X_OK)) {
|
|
ALOGD("Not running %s on %s (executable not in system image)\n",
|
|
kFsckPath, c_source);
|
|
} else {
|
|
ALOGD("Running %s on %s\n", kFsckPath, c_source);
|
|
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kFsckPath);
|
|
cmd.push_back("-y");
|
|
cmd.push_back(c_source);
|
|
|
|
// ext4 devices are currently always trusted
|
|
return ForkExecvp(cmd, sFsckContext);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
status_t Mount(const std::string& source, const std::string& target, bool ro,
|
|
bool remount, bool executable) {
|
|
int rc;
|
|
unsigned long flags;
|
|
|
|
const char* c_source = source.c_str();
|
|
const char* c_target = target.c_str();
|
|
|
|
flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC;
|
|
|
|
flags |= (executable ? 0 : MS_NOEXEC);
|
|
flags |= (ro ? MS_RDONLY : 0);
|
|
flags |= (remount ? MS_REMOUNT : 0);
|
|
|
|
rc = mount(c_source, c_target, "ext4", flags, NULL);
|
|
|
|
if (rc && errno == EROFS) {
|
|
SLOGE("%s appears to be a read only filesystem - retrying mount RO", c_source);
|
|
flags |= MS_RDONLY;
|
|
rc = mount(c_source, c_target, "ext4", flags, NULL);
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
status_t Resize(const std::string& source, unsigned long numSectors) {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kResizefsPath);
|
|
cmd.push_back("-f");
|
|
cmd.push_back(source);
|
|
cmd.push_back(StringPrintf("%lu", numSectors));
|
|
|
|
return ForkExecvp(cmd);
|
|
}
|
|
|
|
status_t Format(const std::string& source, unsigned long numSectors,
|
|
const std::string& target) {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kMkfsPath);
|
|
|
|
cmd.push_back("-b");
|
|
cmd.push_back("4096");
|
|
|
|
cmd.push_back("-t");
|
|
cmd.push_back("ext4");
|
|
|
|
cmd.push_back("-M");
|
|
cmd.push_back(target);
|
|
|
|
std::string options("has_journal");
|
|
if (android::base::GetBoolProperty("vold.has_quota", false)) {
|
|
options += ",quota";
|
|
}
|
|
if (e4crypt_is_native()) {
|
|
options += ",encrypt";
|
|
}
|
|
|
|
cmd.push_back("-O");
|
|
cmd.push_back(options);
|
|
|
|
cmd.push_back(source);
|
|
|
|
if (numSectors) {
|
|
cmd.push_back(StringPrintf("%lu", numSectors * (4096 / 512)));
|
|
}
|
|
|
|
return ForkExecvp(cmd);
|
|
}
|
|
|
|
} // namespace ext4
|
|
} // namespace vold
|
|
} // namespace android
|