blob: 041ce903da49160939e9bec3ff5cb285f7cda1e8 [file] [log] [blame]
Kenny Root344ca102012-04-03 17:23:01 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <stdio.h>
18#include <stdlib.h>
19#include <fcntl.h>
20#include <unistd.h>
21#include <errno.h>
22#include <string.h>
23#include <dirent.h>
24#include <errno.h>
25#include <fcntl.h>
Jeff Sharkey9c484982015-03-31 10:35:33 -070026#include <vector>
27#include <string>
Kenny Root344ca102012-04-03 17:23:01 -070028
29#include <sys/types.h>
30#include <sys/stat.h>
31#include <sys/types.h>
32#include <sys/mman.h>
33#include <sys/mount.h>
Rom Lemarchand2ba45aa2013-01-16 12:29:28 -080034#include <sys/wait.h>
Kenny Root344ca102012-04-03 17:23:01 -070035
36#include <linux/kdev_t.h>
Kenny Root344ca102012-04-03 17:23:01 -070037
38#define LOG_TAG "Vold"
39
Elliott Hughes7e128fb2015-12-04 15:50:53 -080040#include <android-base/logging.h>
41#include <android-base/stringprintf.h>
Kenny Root344ca102012-04-03 17:23:01 -070042#include <cutils/log.h>
43#include <cutils/properties.h>
Rom Lemarchand2ba45aa2013-01-16 12:29:28 -080044#include <logwrap/logwrap.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070045#include <selinux/selinux.h>
Rom Lemarchand2ba45aa2013-01-16 12:29:28 -080046
Kenny Root344ca102012-04-03 17:23:01 -070047#include "Ext4.h"
Jeff Sharkey46bb69f2017-06-21 13:52:23 -060048#include "Ext4Crypt.h"
Jeff Sharkey9c484982015-03-31 10:35:33 -070049#include "Utils.h"
Rom Lemarchand5593c852012-12-21 12:41:43 -080050#include "VoldUtil.h"
Kenny Root344ca102012-04-03 17:23:01 -070051
Jeff Sharkey9c484982015-03-31 10:35:33 -070052using android::base::StringPrintf;
53
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070054namespace android {
55namespace vold {
56namespace ext4 {
57
Jeff Sharkeyce6a9132015-04-08 21:07:21 -070058static const char* kResizefsPath = "/system/bin/resize2fs";
Adrien Schildknechte0f409c2016-11-21 15:14:37 -080059#ifdef TARGET_USES_MKE2FS
60static const char* kMkfsPath = "/system/bin/mke2fs";
61#else
Jeff Sharkey9c484982015-03-31 10:35:33 -070062static const char* kMkfsPath = "/system/bin/make_ext4fs";
Adrien Schildknechte0f409c2016-11-21 15:14:37 -080063#endif
Jeff Sharkey9c484982015-03-31 10:35:33 -070064static const char* kFsckPath = "/system/bin/e2fsck";
Jeff Sharkey9c484982015-03-31 10:35:33 -070065
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070066bool IsSupported() {
67 return access(kMkfsPath, X_OK) == 0
68 && access(kFsckPath, X_OK) == 0
69 && IsFilesystemSupported("ext4");
70}
71
72status_t Check(const std::string& source, const std::string& target) {
Jeff Sharkey9c484982015-03-31 10:35:33 -070073 // The following is shamelessly borrowed from fs_mgr.c, so it should be
74 // kept in sync with any changes over there.
75
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070076 const char* c_source = source.c_str();
77 const char* c_target = target.c_str();
Jeff Sharkey9c484982015-03-31 10:35:33 -070078
79 int status;
80 int ret;
81 long tmpmnt_flags = MS_NOATIME | MS_NOEXEC | MS_NOSUID;
82 char *tmpmnt_opts = (char*) "nomblk_io_submit,errors=remount-ro";
Jeff Sharkey9c484982015-03-31 10:35:33 -070083
84 /*
85 * First try to mount and unmount the filesystem. We do this because
86 * the kernel is more efficient than e2fsck in running the journal and
87 * processing orphaned inodes, and on at least one device with a
88 * performance issue in the emmc firmware, it can take e2fsck 2.5 minutes
89 * to do what the kernel does in about a second.
90 *
91 * After mounting and unmounting the filesystem, run e2fsck, and if an
92 * error is recorded in the filesystem superblock, e2fsck will do a full
93 * check. Otherwise, it does nothing. If the kernel cannot mount the
94 * filesytsem due to an error, e2fsck is still run to do a full check
95 * fix the filesystem.
96 */
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070097 ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts);
Jeff Sharkey9c484982015-03-31 10:35:33 -070098 if (!ret) {
99 int i;
100 for (i = 0; i < 5; i++) {
101 // Try to umount 5 times before continuing on.
102 // Should we try rebooting if all attempts fail?
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700103 int result = umount(c_target);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700104 if (result == 0) {
105 break;
106 }
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700107 ALOGW("%s(): umount(%s)=%d: %s\n", __func__, c_target, result, strerror(errno));
Jeff Sharkey9c484982015-03-31 10:35:33 -0700108 sleep(1);
109 }
110 }
111
112 /*
113 * Some system images do not have e2fsck for licensing reasons
114 * (e.g. recent SDK system images). Detect these and skip the check.
115 */
116 if (access(kFsckPath, X_OK)) {
117 ALOGD("Not running %s on %s (executable not in system image)\n",
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700118 kFsckPath, c_source);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700119 } else {
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700120 ALOGD("Running %s on %s\n", kFsckPath, c_source);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700121
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700122 std::vector<std::string> cmd;
123 cmd.push_back(kFsckPath);
124 cmd.push_back("-y");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700125 cmd.push_back(c_source);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700126
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700127 // ext4 devices are currently always trusted
128 return ForkExecvp(cmd, sFsckContext);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700129 }
130
131 return 0;
132}
133
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700134status_t Mount(const std::string& source, const std::string& target, bool ro,
135 bool remount, bool executable) {
Kenny Root344ca102012-04-03 17:23:01 -0700136 int rc;
137 unsigned long flags;
138
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700139 const char* c_source = source.c_str();
140 const char* c_target = target.c_str();
141
Kenny Root344ca102012-04-03 17:23:01 -0700142 flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC;
143
144 flags |= (executable ? 0 : MS_NOEXEC);
145 flags |= (ro ? MS_RDONLY : 0);
146 flags |= (remount ? MS_REMOUNT : 0);
147
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700148 rc = mount(c_source, c_target, "ext4", flags, NULL);
Kenny Root344ca102012-04-03 17:23:01 -0700149
150 if (rc && errno == EROFS) {
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700151 SLOGE("%s appears to be a read only filesystem - retrying mount RO", c_source);
Kenny Root344ca102012-04-03 17:23:01 -0700152 flags |= MS_RDONLY;
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700153 rc = mount(c_source, c_target, "ext4", flags, NULL);
Kenny Root344ca102012-04-03 17:23:01 -0700154 }
155
156 return rc;
157}
158
Mateusz Nowaka4f48d02015-08-03 18:06:39 +0200159status_t Resize(const std::string& source, unsigned long numSectors) {
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700160 std::vector<std::string> cmd;
161 cmd.push_back(kResizefsPath);
162 cmd.push_back("-f");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700163 cmd.push_back(source);
Mateusz Nowaka4f48d02015-08-03 18:06:39 +0200164 cmd.push_back(StringPrintf("%lu", numSectors));
Daniel Rosenbergfcd34a02014-05-22 11:23:56 -0700165
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700166 return ForkExecvp(cmd);
Daniel Rosenbergfcd34a02014-05-22 11:23:56 -0700167}
168
Mateusz Nowaka4f48d02015-08-03 18:06:39 +0200169status_t Format(const std::string& source, unsigned long numSectors,
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700170 const std::string& target) {
Jeff Sharkey9c484982015-03-31 10:35:33 -0700171 std::vector<std::string> cmd;
172 cmd.push_back(kMkfsPath);
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800173
174#ifdef TARGET_USES_MKE2FS
175 cmd.push_back("-b");
176 cmd.push_back("4096");
177
178 cmd.push_back("-t");
179 cmd.push_back("ext4");
180
181 cmd.push_back("-M");
182 cmd.push_back(target);
183
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600184 std::string options("has_journal,quota");
185 if (e4crypt_is_native()) {
186 options += ",encrypt";
187 }
188
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800189 cmd.push_back("-O");
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600190 cmd.push_back(options);
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800191
192 cmd.push_back(source);
193
194 if (numSectors)
195 cmd.push_back(StringPrintf("%lu", numSectors * (4096 / 512)));
196#else
Jeff Sharkey9c484982015-03-31 10:35:33 -0700197 cmd.push_back("-J");
198
199 cmd.push_back("-a");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700200 cmd.push_back(target);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700201
Daniel Rosenberg6a74dca2014-05-23 13:47:00 -0700202 if (numSectors) {
Jeff Sharkey9c484982015-03-31 10:35:33 -0700203 cmd.push_back("-l");
Mateusz Nowaka4f48d02015-08-03 18:06:39 +0200204 cmd.push_back(StringPrintf("%lu", numSectors * 512));
Daniel Rosenberg6a74dca2014-05-23 13:47:00 -0700205 }
Jeff Sharkey9c484982015-03-31 10:35:33 -0700206
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700207 // Always generate a real UUID
208 cmd.push_back("-u");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700209 cmd.push_back(source);
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800210#endif
Jeff Sharkey9c484982015-03-31 10:35:33 -0700211
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700212 return ForkExecvp(cmd);
Kenny Root344ca102012-04-03 17:23:01 -0700213}
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700214
215} // namespace ext4
216} // namespace vold
217} // namespace android