8c1659e271
When generating a CE key, don't persist it immediately with kEmptyAuthentication. Instead, cache it in memory and persist it later when the secret to protect it with is given. This is needed to make it so that the CE key is always encrypted by the user's synthetic password while it is stored on-disk. See the corresponding system_server changes for more information about this design change and its motivation. As part of this, simplify vold's Binder interface by replacing the three methods addUserKeyAuth(), clearUserKeyAuth(), and fixateNewestUserKeyAuth() with a single method setUserKeyProtection(). setUserKeyProtection() handles persisting the key for a new user or re-encrypting the default-encrypted key for an existing unsecured user. Bug: 232452368 Ignore-AOSP-First: This depends on frameworks/base changes that can only be submitted to internal master, due to conflicts. Test: see Ia753ea21bbaca8ef7a90c03fe73b66c896b1536e Change-Id: Id36ba8ee343ccb6de7ec892c3f600abd636f6ce5
168 lines
8.2 KiB
C++
168 lines
8.2 KiB
C++
/*
|
|
* Copyright (C) 2017 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#ifndef _VOLD_NATIVE_SERVICE_H_
|
|
#define _VOLD_NATIVE_SERVICE_H_
|
|
|
|
#include <android-base/unique_fd.h>
|
|
#include <binder/BinderService.h>
|
|
|
|
#include "android/os/BnVold.h"
|
|
|
|
namespace android {
|
|
namespace vold {
|
|
|
|
class VoldNativeService : public BinderService<VoldNativeService>, public os::BnVold {
|
|
public:
|
|
static status_t start();
|
|
static char const* getServiceName() { return "vold"; }
|
|
virtual status_t dump(int fd, const Vector<String16>& args) override;
|
|
|
|
binder::Status setListener(const android::sp<android::os::IVoldListener>& listener);
|
|
|
|
binder::Status monitor();
|
|
binder::Status reset();
|
|
binder::Status shutdown();
|
|
binder::Status abortFuse();
|
|
|
|
binder::Status onUserAdded(int32_t userId, int32_t userSerial);
|
|
binder::Status onUserRemoved(int32_t userId);
|
|
binder::Status onUserStarted(int32_t userId);
|
|
binder::Status onUserStopped(int32_t userId);
|
|
|
|
binder::Status addAppIds(const std::vector<std::string>& packageNames,
|
|
const std::vector<int32_t>& appIds);
|
|
binder::Status addSandboxIds(const std::vector<int32_t>& appIds,
|
|
const std::vector<std::string>& sandboxIds);
|
|
|
|
binder::Status onSecureKeyguardStateChanged(bool isShowing);
|
|
|
|
binder::Status partition(const std::string& diskId, int32_t partitionType, int32_t ratio);
|
|
binder::Status forgetPartition(const std::string& partGuid, const std::string& fsUuid);
|
|
|
|
binder::Status mount(const std::string& volId, int32_t mountFlags, int32_t mountUserId,
|
|
const android::sp<android::os::IVoldMountCallback>& callback);
|
|
binder::Status unmount(const std::string& volId);
|
|
binder::Status format(const std::string& volId, const std::string& fsType);
|
|
binder::Status benchmark(const std::string& volId,
|
|
const android::sp<android::os::IVoldTaskListener>& listener);
|
|
|
|
binder::Status moveStorage(const std::string& fromVolId, const std::string& toVolId,
|
|
const android::sp<android::os::IVoldTaskListener>& listener);
|
|
|
|
binder::Status remountUid(int32_t uid, int32_t remountMode);
|
|
binder::Status remountAppStorageDirs(int uid, int pid,
|
|
const std::vector<std::string>& packageNames);
|
|
binder::Status unmountAppStorageDirs(int uid, int pid,
|
|
const std::vector<std::string>& packageNames);
|
|
|
|
binder::Status ensureAppDirsCreated(const std::vector<std::string>& paths, int32_t appUid);
|
|
binder::Status setupAppDir(const std::string& path, int32_t appUid);
|
|
binder::Status fixupAppDir(const std::string& path, int32_t appUid);
|
|
|
|
binder::Status createObb(const std::string& sourcePath, int32_t ownerGid,
|
|
std::string* _aidl_return);
|
|
binder::Status destroyObb(const std::string& volId);
|
|
|
|
binder::Status createStubVolume(const std::string& sourcePath, const std::string& mountPath,
|
|
const std::string& fsType, const std::string& fsUuid,
|
|
const std::string& fsLabel, int32_t flags,
|
|
std::string* _aidl_return);
|
|
binder::Status destroyStubVolume(const std::string& volId);
|
|
|
|
binder::Status fstrim(int32_t fstrimFlags,
|
|
const android::sp<android::os::IVoldTaskListener>& listener);
|
|
binder::Status runIdleMaint(bool needGC,
|
|
const android::sp<android::os::IVoldTaskListener>& listener);
|
|
binder::Status abortIdleMaint(const android::sp<android::os::IVoldTaskListener>& listener);
|
|
binder::Status getStorageLifeTime(int32_t* _aidl_return);
|
|
binder::Status setGCUrgentPace(int32_t neededSegments, int32_t minSegmentThreshold,
|
|
float dirtyReclaimRate, float reclaimWeight, int32_t gcPeriod,
|
|
int32_t minGCSleepTime, int32_t targetDirtyRatio);
|
|
binder::Status refreshLatestWrite();
|
|
binder::Status getWriteAmount(int32_t* _aidl_return);
|
|
|
|
binder::Status mountAppFuse(int32_t uid, int32_t mountId,
|
|
android::base::unique_fd* _aidl_return);
|
|
binder::Status unmountAppFuse(int32_t uid, int32_t mountId);
|
|
binder::Status openAppFuseFile(int32_t uid, int32_t mountId, int32_t fileId, int32_t flags,
|
|
android::base::unique_fd* _aidl_return);
|
|
|
|
binder::Status fbeEnable();
|
|
|
|
binder::Status initUser0();
|
|
binder::Status mountFstab(const std::string& blkDevice, const std::string& mountPoint,
|
|
const std::string& zonedDevice);
|
|
binder::Status encryptFstab(const std::string& blkDevice, const std::string& mountPoint,
|
|
bool shouldFormat, const std::string& fsType,
|
|
const std::string& zonedDevice);
|
|
|
|
binder::Status setStorageBindingSeed(const std::vector<uint8_t>& seed);
|
|
|
|
binder::Status createUserKey(int32_t userId, int32_t userSerial, bool ephemeral);
|
|
binder::Status destroyUserKey(int32_t userId);
|
|
|
|
binder::Status setUserKeyProtection(int32_t userId, const std::string& secret);
|
|
|
|
binder::Status getUnlockedUsers(std::vector<int>* _aidl_return);
|
|
binder::Status unlockUserKey(int32_t userId, int32_t userSerial, const std::string& secret);
|
|
binder::Status lockUserKey(int32_t userId);
|
|
|
|
binder::Status prepareUserStorage(const std::optional<std::string>& uuid, int32_t userId,
|
|
int32_t userSerial, int32_t flags);
|
|
binder::Status destroyUserStorage(const std::optional<std::string>& uuid, int32_t userId,
|
|
int32_t flags);
|
|
|
|
binder::Status prepareSandboxForApp(const std::string& packageName, int32_t appId,
|
|
const std::string& sandboxId, int32_t userId);
|
|
binder::Status destroySandboxForApp(const std::string& packageName,
|
|
const std::string& sandboxId, int32_t userId);
|
|
|
|
binder::Status startCheckpoint(int32_t retry);
|
|
binder::Status needsCheckpoint(bool* _aidl_return);
|
|
binder::Status needsRollback(bool* _aidl_return);
|
|
binder::Status isCheckpointing(bool* _aidl_return);
|
|
binder::Status commitChanges();
|
|
binder::Status prepareCheckpoint();
|
|
binder::Status restoreCheckpoint(const std::string& mountPoint);
|
|
binder::Status restoreCheckpointPart(const std::string& mountPoint, int count);
|
|
binder::Status markBootAttempt();
|
|
binder::Status abortChanges(const std::string& message, bool retry);
|
|
binder::Status supportsCheckpoint(bool* _aidl_return);
|
|
binder::Status supportsBlockCheckpoint(bool* _aidl_return);
|
|
binder::Status supportsFileCheckpoint(bool* _aidl_return);
|
|
binder::Status resetCheckpoint();
|
|
|
|
binder::Status earlyBootEnded();
|
|
|
|
binder::Status incFsEnabled(bool* _aidl_return) override;
|
|
binder::Status mountIncFs(
|
|
const std::string& backingPath, const std::string& targetDir, int32_t flags,
|
|
const std::string& sysfsName,
|
|
::android::os::incremental::IncrementalFileSystemControlParcel* _aidl_return) override;
|
|
binder::Status unmountIncFs(const std::string& dir) override;
|
|
binder::Status setIncFsMountOptions(
|
|
const ::android::os::incremental::IncrementalFileSystemControlParcel& control,
|
|
bool enableReadLogs, bool enableReadTimeouts, const std::string& sysfsName) override;
|
|
binder::Status bindMount(const std::string& sourceDir, const std::string& targetDir) override;
|
|
|
|
binder::Status destroyDsuMetadataKey(const std::string& dsuSlot) override;
|
|
};
|
|
|
|
} // namespace vold
|
|
} // namespace android
|
|
|
|
#endif // _VOLD_NATIVE_SERVICE_H_
|