ce6a913aea
Sadly setexeccon() is process global, so we need to carefully ensure that all exec() are mutually exclusive to avoid transitioning into unwanted domains. Also, because we have several threads floating around, we need to guard all our FDs with O_CLOEXEC. Format all newly created volumes immediately after partitioning, but silence all events emitted from those volumes to prevent the framework from getting all excited. Unify all notify events under a single codepath to make them easy to silence. Sent SIGINT before escalating to SIGTERM when unmounting. Bug: 19993667 Change-Id: Idc6c806afc7919a004a93e2240b42884f6b52d6b
240 lines
6.4 KiB
C++
240 lines
6.4 KiB
C++
/*
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/wait.h>
|
|
#include <linux/fs.h>
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <linux/kdev_t.h>
|
|
|
|
#define LOG_TAG "Vold"
|
|
|
|
#include <base/logging.h>
|
|
#include <base/stringprintf.h>
|
|
#include <cutils/log.h>
|
|
#include <cutils/properties.h>
|
|
#include <selinux/selinux.h>
|
|
|
|
#include <logwrap/logwrap.h>
|
|
|
|
#include "Fat.h"
|
|
#include "Utils.h"
|
|
#include "VoldUtil.h"
|
|
|
|
using android::base::StringPrintf;
|
|
|
|
static const char* kMkfsPath = "/system/bin/newfs_msdos";
|
|
static const char* kFsckPath = "/system/bin/fsck_msdos";
|
|
|
|
int Fat::check(const char *fsPath) {
|
|
if (access(kFsckPath, X_OK)) {
|
|
SLOGW("Skipping fs checks\n");
|
|
return 0;
|
|
}
|
|
|
|
int pass = 1;
|
|
int rc = 0;
|
|
do {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kFsckPath);
|
|
cmd.push_back("-p");
|
|
cmd.push_back("-f");
|
|
cmd.push_back(fsPath);
|
|
|
|
// Fat devices are currently always untrusted
|
|
rc = android::vold::ForkExecvp(cmd, android::vold::sFsckUntrustedContext);
|
|
|
|
if (rc < 0) {
|
|
SLOGE("Filesystem check failed due to logwrap error");
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
|
|
switch(rc) {
|
|
case 0:
|
|
SLOGI("Filesystem check completed OK");
|
|
return 0;
|
|
|
|
case 2:
|
|
SLOGE("Filesystem check failed (not a FAT filesystem)");
|
|
errno = ENODATA;
|
|
return -1;
|
|
|
|
case 4:
|
|
if (pass++ <= 3) {
|
|
SLOGW("Filesystem modified - rechecking (pass %d)",
|
|
pass);
|
|
continue;
|
|
}
|
|
SLOGE("Failing check after too many rechecks");
|
|
errno = EIO;
|
|
return -1;
|
|
|
|
default:
|
|
SLOGE("Filesystem check failed (unknown exit code %d)", rc);
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
} while (0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int Fat::doMount(const char *fsPath, const char *mountPoint,
|
|
bool ro, bool remount, bool executable,
|
|
int ownerUid, int ownerGid, int permMask, bool createLost) {
|
|
int rc;
|
|
unsigned long flags;
|
|
char mountData[255];
|
|
|
|
flags = MS_NODEV | MS_NOSUID | MS_DIRSYNC;
|
|
|
|
flags |= (executable ? 0 : MS_NOEXEC);
|
|
flags |= (ro ? MS_RDONLY : 0);
|
|
flags |= (remount ? MS_REMOUNT : 0);
|
|
|
|
/*
|
|
* Note: This is a temporary hack. If the sampling profiler is enabled,
|
|
* we make the SD card world-writable so any process can write snapshots.
|
|
*
|
|
* TODO: Remove this code once we have a drop box in system_server.
|
|
*/
|
|
char value[PROPERTY_VALUE_MAX];
|
|
property_get("persist.sampling_profiler", value, "");
|
|
if (value[0] == '1') {
|
|
SLOGW("The SD card is world-writable because the"
|
|
" 'persist.sampling_profiler' system property is set to '1'.");
|
|
permMask = 0;
|
|
}
|
|
|
|
sprintf(mountData,
|
|
"utf8,uid=%d,gid=%d,fmask=%o,dmask=%o,shortname=mixed",
|
|
ownerUid, ownerGid, permMask, permMask);
|
|
|
|
rc = mount(fsPath, mountPoint, "vfat", flags, mountData);
|
|
|
|
if (rc && errno == EROFS) {
|
|
SLOGE("%s appears to be a read only filesystem - retrying mount RO", fsPath);
|
|
flags |= MS_RDONLY;
|
|
rc = mount(fsPath, mountPoint, "vfat", flags, mountData);
|
|
}
|
|
|
|
if (rc == 0 && createLost) {
|
|
char *lost_path;
|
|
asprintf(&lost_path, "%s/LOST.DIR", mountPoint);
|
|
if (access(lost_path, F_OK)) {
|
|
/*
|
|
* Create a LOST.DIR in the root so we have somewhere to put
|
|
* lost cluster chains (fsck_msdos doesn't currently do this)
|
|
*/
|
|
if (mkdir(lost_path, 0755)) {
|
|
SLOGE("Unable to create LOST.DIR (%s)", strerror(errno));
|
|
}
|
|
}
|
|
free(lost_path);
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
int Fat::format(const char *fsPath, unsigned int numSectors, bool wipe) {
|
|
if (wipe) {
|
|
Fat::wipe(fsPath, numSectors);
|
|
}
|
|
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kMkfsPath);
|
|
cmd.push_back("-F");
|
|
cmd.push_back("32");
|
|
cmd.push_back("-O");
|
|
cmd.push_back("android");
|
|
cmd.push_back("-c");
|
|
cmd.push_back("64");
|
|
cmd.push_back("-A");
|
|
|
|
if (numSectors) {
|
|
cmd.push_back("-s");
|
|
cmd.push_back(StringPrintf("%u", numSectors));
|
|
}
|
|
|
|
cmd.push_back(fsPath);
|
|
|
|
int rc = android::vold::ForkExecvp(cmd);
|
|
if (rc < 0) {
|
|
SLOGE("Filesystem format failed due to logwrap error");
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
|
|
if (rc == 0) {
|
|
SLOGI("Filesystem formatted OK");
|
|
return 0;
|
|
} else {
|
|
SLOGE("Format failed (unknown exit code %d)", rc);
|
|
errno = EIO;
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void Fat::wipe(const char *fsPath, unsigned int numSectors) {
|
|
unsigned long long range[2];
|
|
|
|
int fd = open(fsPath, O_RDWR | O_CLOEXEC);
|
|
if (fd == -1) {
|
|
SLOGE("Fat wipe failed to open device %s", fsPath);
|
|
return;
|
|
}
|
|
|
|
if (numSectors == 0) {
|
|
unsigned long nr_sec;
|
|
get_blkdev_size(fd, &nr_sec);
|
|
if (nr_sec > UINT32_MAX) {
|
|
SLOGE("Too many sectors for FAT: %ld", nr_sec);
|
|
close(fd);
|
|
return;
|
|
}
|
|
numSectors = nr_sec;
|
|
}
|
|
if (numSectors == 0) {
|
|
SLOGE("Fat wipe failed to determine size of %s", fsPath);
|
|
close(fd);
|
|
return;
|
|
}
|
|
range[0] = 0;
|
|
range[1] = (unsigned long long)numSectors * 512;
|
|
if (ioctl(fd, BLKDISCARD, &range) < 0) {
|
|
SLOGE("Fat wipe failed to discard blocks on %s", fsPath);
|
|
} else {
|
|
SLOGI("Fat wipe %d sectors on %s succeeded", numSectors, fsPath);
|
|
}
|
|
close(fd);
|
|
}
|