/* * Copyright (C) 2012 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "Ext4.h" #include "FsCrypt.h" #include "Utils.h" #include "VoldUtil.h" // HUANGLONG add begin #include // HUANGLONG add end using android::base::StringPrintf; namespace android { namespace vold { namespace ext4 { static const char* kResizefsPath = "/system/bin/resize2fs"; static const char* kMkfsPath = "/system/bin/mke2fs"; static const char* kFsckPath = "/system/bin/e2fsck"; bool IsSupported() { return access(kMkfsPath, X_OK) == 0 && access(kFsckPath, X_OK) == 0 && IsFilesystemSupported("ext4"); } status_t Check(const std::string& source, const std::string& target) { // The following is shamelessly borrowed from fs_mgr.c, so it should be // kept in sync with any changes over there. const char* c_source = source.c_str(); const char* c_target = target.c_str(); int status; int ret; long tmpmnt_flags = MS_NOATIME | MS_NOEXEC | MS_NOSUID; char* tmpmnt_opts = (char*)"nomblk_io_submit,errors=remount-ro"; /* * First try to mount and unmount the filesystem. We do this because * the kernel is more efficient than e2fsck in running the journal and * processing orphaned inodes, and on at least one device with a * performance issue in the emmc firmware, it can take e2fsck 2.5 minutes * to do what the kernel does in about a second. * * After mounting and unmounting the filesystem, run e2fsck, and if an * error is recorded in the filesystem superblock, e2fsck will do a full * check. Otherwise, it does nothing. If the kernel cannot mount the * filesytsem due to an error, e2fsck is still run to do a full check * fix the filesystem. */ ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts); if (!ret) { int i; for (i = 0; i < 5; i++) { // Try to umount 5 times before continuing on. // Should we try rebooting if all attempts fail? int result = umount(c_target); if (result == 0) { break; } LOG(WARNING) << __func__ << "(): umount(" << c_target << ")=" << result << ": " << strerror(errno); sleep(1); } } /* * Some system images do not have e2fsck for licensing reasons * (e.g. recent SDK system images). Detect these and skip the check. */ if (access(kFsckPath, X_OK)) { LOG(DEBUG) << "Not running " << kFsckPath << " on " << c_source << " (executable not in system image)"; } else { LOG(DEBUG) << "Running " << kFsckPath << " on " << c_source; std::vector cmd; cmd.push_back(kFsckPath); cmd.push_back("-y"); cmd.push_back(c_source); // ext4 devices are currently always trusted return ForkExecvp(cmd, nullptr, sFsckContext); } return 0; } status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount, bool executable) { int rc; unsigned long flags; const char* c_source = source.c_str(); const char* c_target = target.c_str(); flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC; flags |= (executable ? 0 : MS_NOEXEC); flags |= (ro ? MS_RDONLY : 0); flags |= (remount ? MS_REMOUNT : 0); rc = mount(c_source, c_target, "ext4", flags, NULL); if (rc && errno == EROFS) { LOG(ERROR) << source << " appears to be a read only filesystem - retrying mount RO"; flags |= MS_RDONLY; rc = mount(c_source, c_target, "ext4", flags, NULL); } return rc; } // HUANGLONG add begin status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount, bool executable, bool isAsec, int permMask, int ownerUid, int ownerGid) { int rc; int len; unsigned long flags; const char* c_source = source.c_str(); const char* c_target = target.c_str(); std::string mountData; std::string umaskData; flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC; flags |= (executable ? 0 : MS_NOEXEC); flags |= (ro ? MS_RDONLY : 0); flags |= (remount ? MS_REMOUNT : 0); if (permMask) { // ",umask=%o", permMask umaskData = ",umask=" + ((std::ostringstream() << std::oct << permMask).str()); } // ",gid=%d,uid=%d,%s,context=u:object_r:ext4_sdcard:s0", ownerGid, ownerUid, umaskData mountData = "gid=" + ((std::ostringstream() << std::dec << ownerGid).str()) + ",uid=" + ((std::ostringstream() << std::dec << ownerUid).str()) + umaskData; LOG(INFO) << "mountData: " << mountData; // If an expand partition is mounted, do not specify the 'ext4_sdcard' context. // Otherwise, third-party applications cannot be installed in the expand partition. const char* expandMountPoint = "/mnt/expand"; rc = mount(c_source, c_target, "ext4", flags, strstr(c_target, expandMountPoint) ? nullptr : mountData.c_str()); if (rc && errno == EROFS) { LOG(ERROR) << source << " appears to be a read only filesystem - retrying mount RO"; flags |= MS_RDONLY; rc = mount(c_source, c_target, "ext4", flags, nullptr); } if (rc < 0) { LOG(ERROR) << c_source << " appears to be some filesystem error - use mount command retry again"; std::vector cmd; cmd.push_back("mount"); cmd.push_back("-t"); cmd.push_back("ext4"); cmd.push_back(c_source); cmd.push_back(c_target); rc = ForkExecvp(cmd); LOG(INFO) << "exec mount cmd status : " << rc; } return rc; } // HUANGLONG add end status_t Resize(const std::string& source, unsigned long numSectors) { std::vector cmd; cmd.push_back(kResizefsPath); cmd.push_back("-f"); cmd.push_back(source); cmd.push_back(StringPrintf("%lu", numSectors)); return ForkExecvp(cmd); } status_t Format(const std::string& source, unsigned long numSectors, const std::string& target) { std::vector cmd; cmd.push_back(kMkfsPath); cmd.push_back("-b"); cmd.push_back("4096"); cmd.push_back("-t"); cmd.push_back("ext4"); cmd.push_back("-M"); cmd.push_back(target); bool needs_casefold = android::base::GetBoolProperty("external_storage.casefold.enabled", false); bool needs_projid = android::base::GetBoolProperty("external_storage.projid.enabled", false); if (needs_projid) { cmd.push_back("-I"); cmd.push_back("512"); } std::string options("has_journal"); if (android::base::GetBoolProperty("vold.has_quota", false)) { options += ",quota"; } if (fscrypt_is_native()) { options += ",encrypt"; } if (needs_casefold) { options += ",casefold"; } cmd.push_back("-O"); cmd.push_back(options); if (needs_casefold || needs_projid) { cmd.push_back("-E"); std::string extopts = ""; if (needs_casefold) extopts += "encoding=utf8,"; if (needs_projid) extopts += "quotatype=prjquota,"; cmd.push_back(extopts); } cmd.push_back(source); if (numSectors) { cmd.push_back(StringPrintf("%lu", numSectors * (4096 / 512))); } return ForkExecvp(cmd); } } // namespace ext4 } // namespace vold } // namespace android