blob: 05d31691ec2c276c57cd17dfd469fb4e534f4fb7 [file] [log] [blame]
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Paul Lawrence34637552014-10-27 10:37:59 -070017#include "sysdeps.h"
18
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080019#include <errno.h>
Mark Salyzyn60299df2014-04-30 09:10:31 -070020#include <fcntl.h>
21#include <stdio.h>
22#include <stdlib.h>
23#include <string.h>
24#include <sys/mount.h>
25#include <unistd.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080026
Paul Lawrence34637552014-10-27 10:37:59 -070027#include "cutils/properties.h"
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080028
29#define TRACE_TAG TRACE_ADB
30#include "adb.h"
31
32
33static int system_ro = 1;
Daniel Rosenberg686bce62014-06-30 20:29:40 -070034static int vendor_ro = 1;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080035
Colin Crossc880ee02010-05-06 17:06:18 -070036/* Returns the device used to mount a directory in /proc/mounts */
37static char *find_mount(const char *dir)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080038{
39 int fd;
40 int res;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080041 char *token = NULL;
42 const char delims[] = "\n";
Colin Crossc880ee02010-05-06 17:06:18 -070043 char buf[4096];
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080044
Nick Kralevichfe8d7f42014-07-18 20:57:35 -070045 fd = unix_open("/proc/mounts", O_RDONLY | O_CLOEXEC);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080046 if (fd < 0)
Colin Crossc880ee02010-05-06 17:06:18 -070047 return NULL;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080048
49 buf[sizeof(buf) - 1] = '\0';
Mark Salyzyn60299df2014-04-30 09:10:31 -070050 adb_read(fd, buf, sizeof(buf) - 1);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080051 adb_close(fd);
52
53 token = strtok(buf, delims);
54
55 while (token) {
Colin Crossc880ee02010-05-06 17:06:18 -070056 char mount_dev[256];
57 char mount_dir[256];
58 int mount_freq;
59 int mount_passno;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080060
Colin Crossc880ee02010-05-06 17:06:18 -070061 res = sscanf(token, "%255s %255s %*s %*s %d %d\n",
62 mount_dev, mount_dir, &mount_freq, &mount_passno);
63 mount_dev[255] = 0;
64 mount_dir[255] = 0;
65 if (res == 4 && (strcmp(dir, mount_dir) == 0))
66 return strdup(mount_dev);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080067
68 token = strtok(NULL, delims);
69 }
Colin Crossc880ee02010-05-06 17:06:18 -070070 return NULL;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080071}
72
Daniel Rosenberg686bce62014-06-30 20:29:40 -070073static int hasVendorPartition()
74{
75 struct stat info;
76 if (!lstat("/vendor", &info))
77 if ((info.st_mode & S_IFMT) == S_IFDIR)
78 return true;
79 return false;
80}
81
Paul Lawrence982089d2014-12-03 15:31:57 -080082static int make_block_device_writable(const char* dir)
83{
84 char *dev = 0;
85 int fd = -1;
86 int OFF = 0;
87 int rc = -1;
88
89 dev = find_mount(dir);
90 if (!dev)
91 goto errout;
92
93 fd = unix_open(dev, O_RDONLY | O_CLOEXEC);
94 if (fd < 0)
95 goto errout;
96
97 if (ioctl(fd, BLKROSET, &OFF)) {
98 goto errout;
99 }
100
101 rc = 0;
102
103errout:
104 if (fd >= 0) {
105 adb_close(fd);
106 }
107
108 if (dev) {
109 free(dev);
110 }
111 return rc;
112}
113
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800114/* Init mounts /system as read only, remount to enable writes. */
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700115static int remount(const char* dir, int* dir_ro)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800116{
Colin Crossc880ee02010-05-06 17:06:18 -0700117 char *dev;
Nick Kraleviche18c0d52013-04-16 16:41:32 -0700118 int OFF = 0;
Colin Crossc880ee02010-05-06 17:06:18 -0700119
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700120 if (dir_ro == 0) {
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800121 return 0;
122 }
Colin Crossc880ee02010-05-06 17:06:18 -0700123
Paul Lawrence982089d2014-12-03 15:31:57 -0800124 if (make_block_device_writable(dir)) {
125 return -1;
126 }
127
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700128 dev = find_mount(dir);
Colin Crossc880ee02010-05-06 17:06:18 -0700129
130 if (!dev)
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800131 return -1;
132
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700133 *dir_ro = mount(dev, dir, "none", MS_REMOUNT, NULL);
Colin Crossc880ee02010-05-06 17:06:18 -0700134
135 free(dev);
136
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700137 return *dir_ro;
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800138}
139
140static void write_string(int fd, const char* str)
141{
142 writex(fd, str, strlen(str));
143}
144
Paul Lawrence982089d2014-12-03 15:31:57 -0800145int make_system_and_vendor_block_devices_writable(int fd)
146{
147 char buffer[200];
148 if (make_block_device_writable("/system")) {
149 snprintf(buffer, sizeof(buffer),
150 "Failed to make system block device writable %s\n",
151 strerror(errno));
152 write_string(fd, buffer);
153 return -1;
154 }
155
156 if (hasVendorPartition() && make_block_device_writable("/vendor")) {
157 snprintf(buffer, sizeof(buffer),
158 "Failed to make vendor block device writable: %s\n",
159 strerror(errno));
160 write_string(fd, buffer);
161 return -1;
162 }
163
164 return 0;
165}
166
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800167void remount_service(int fd, void *cookie)
168{
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700169 char buffer[200];
Paul Lawrence34637552014-10-27 10:37:59 -0700170 char prop_buf[PROPERTY_VALUE_MAX];
171
172 bool system_verified = false, vendor_verified = false;
173 property_get("partition.system.verified", prop_buf, "0");
174 if (!strcmp(prop_buf, "1")) {
175 system_verified = true;
176 }
177
178 property_get("partition.vendor.verified", prop_buf, "0");
179 if (!strcmp(prop_buf, "1")) {
180 vendor_verified = true;
181 }
182
183 if (system_verified || vendor_verified) {
184 // Allow remount but warn of likely bad effects
185 bool both = system_verified && vendor_verified;
186 snprintf(buffer, sizeof(buffer),
187 "dm_verity is enabled on the %s%s%s partition%s.\n",
188 system_verified ? "system" : "",
189 both ? " and " : "",
190 vendor_verified ? "vendor" : "",
191 both ? "s" : "");
192 write_string(fd, buffer);
193 snprintf(buffer, sizeof(buffer),
194 "Use \"adb disable-verity\" to disable verity.\n"
195 "If you do not, remount may succeed, however, you will still "
196 "not be able to write to these volumes.\n");
197 write_string(fd, buffer);
198 }
199
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700200 if (remount("/system", &system_ro)) {
201 snprintf(buffer, sizeof(buffer), "remount of system failed: %s\n",strerror(errno));
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800202 write_string(fd, buffer);
203 }
204
Daniel Rosenberg686bce62014-06-30 20:29:40 -0700205 if (hasVendorPartition()) {
206 if (remount("/vendor", &vendor_ro)) {
207 snprintf(buffer, sizeof(buffer), "remount of vendor failed: %s\n",strerror(errno));
208 write_string(fd, buffer);
209 }
210 }
211
212 if (!system_ro && (!vendor_ro || !hasVendorPartition()))
213 write_string(fd, "remount succeeded\n");
214 else {
215 write_string(fd, "remount failed\n");
216 }
217
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800218 adb_close(fd);
219}