You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
276 lines
8.4 KiB
276 lines
8.4 KiB
/*
|
|
* Copyright (C) 2012 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <dirent.h>
|
|
#include <errno.h>
|
|
#include <fcntl.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include <sys/mman.h>
|
|
#include <sys/mount.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <sys/wait.h>
|
|
|
|
#include <linux/kdev_t.h>
|
|
|
|
#include <android-base/logging.h>
|
|
#include <android-base/properties.h>
|
|
#include <android-base/stringprintf.h>
|
|
#include <cutils/properties.h>
|
|
#include <fscrypt/fscrypt.h>
|
|
#include <logwrap/logwrap.h>
|
|
#include <selinux/selinux.h>
|
|
|
|
#include "Ext4.h"
|
|
#include "FsCrypt.h"
|
|
#include "Utils.h"
|
|
#include "VoldUtil.h"
|
|
|
|
// HUANGLONG add begin
|
|
#include <sstream>
|
|
// HUANGLONG add end
|
|
|
|
using android::base::StringPrintf;
|
|
|
|
namespace android {
|
|
namespace vold {
|
|
namespace ext4 {
|
|
|
|
static const char* kResizefsPath = "/system/bin/resize2fs";
|
|
static const char* kMkfsPath = "/system/bin/mke2fs";
|
|
static const char* kFsckPath = "/system/bin/e2fsck";
|
|
|
|
bool IsSupported() {
|
|
return access(kMkfsPath, X_OK) == 0 && access(kFsckPath, X_OK) == 0 &&
|
|
IsFilesystemSupported("ext4");
|
|
}
|
|
|
|
status_t Check(const std::string& source, const std::string& target) {
|
|
// The following is shamelessly borrowed from fs_mgr.c, so it should be
|
|
// kept in sync with any changes over there.
|
|
|
|
const char* c_source = source.c_str();
|
|
const char* c_target = target.c_str();
|
|
|
|
int status;
|
|
int ret;
|
|
long tmpmnt_flags = MS_NOATIME | MS_NOEXEC | MS_NOSUID;
|
|
char* tmpmnt_opts = (char*)"nomblk_io_submit,errors=remount-ro";
|
|
|
|
/*
|
|
* First try to mount and unmount the filesystem. We do this because
|
|
* the kernel is more efficient than e2fsck in running the journal and
|
|
* processing orphaned inodes, and on at least one device with a
|
|
* performance issue in the emmc firmware, it can take e2fsck 2.5 minutes
|
|
* to do what the kernel does in about a second.
|
|
*
|
|
* After mounting and unmounting the filesystem, run e2fsck, and if an
|
|
* error is recorded in the filesystem superblock, e2fsck will do a full
|
|
* check. Otherwise, it does nothing. If the kernel cannot mount the
|
|
* filesytsem due to an error, e2fsck is still run to do a full check
|
|
* fix the filesystem.
|
|
*/
|
|
ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts);
|
|
if (!ret) {
|
|
int i;
|
|
for (i = 0; i < 5; i++) {
|
|
// Try to umount 5 times before continuing on.
|
|
// Should we try rebooting if all attempts fail?
|
|
int result = umount(c_target);
|
|
if (result == 0) {
|
|
break;
|
|
}
|
|
LOG(WARNING) << __func__ << "(): umount(" << c_target << ")=" << result << ": "
|
|
<< strerror(errno);
|
|
sleep(1);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Some system images do not have e2fsck for licensing reasons
|
|
* (e.g. recent SDK system images). Detect these and skip the check.
|
|
*/
|
|
if (access(kFsckPath, X_OK)) {
|
|
LOG(DEBUG) << "Not running " << kFsckPath << " on " << c_source
|
|
<< " (executable not in system image)";
|
|
} else {
|
|
LOG(DEBUG) << "Running " << kFsckPath << " on " << c_source;
|
|
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kFsckPath);
|
|
cmd.push_back("-y");
|
|
cmd.push_back(c_source);
|
|
|
|
// ext4 devices are currently always trusted
|
|
return ForkExecvp(cmd, nullptr, sFsckContext);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount,
|
|
bool executable) {
|
|
int rc;
|
|
unsigned long flags;
|
|
|
|
const char* c_source = source.c_str();
|
|
const char* c_target = target.c_str();
|
|
|
|
flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC;
|
|
|
|
flags |= (executable ? 0 : MS_NOEXEC);
|
|
flags |= (ro ? MS_RDONLY : 0);
|
|
flags |= (remount ? MS_REMOUNT : 0);
|
|
|
|
rc = mount(c_source, c_target, "ext4", flags, NULL);
|
|
|
|
if (rc && errno == EROFS) {
|
|
LOG(ERROR) << source << " appears to be a read only filesystem - retrying mount RO";
|
|
flags |= MS_RDONLY;
|
|
rc = mount(c_source, c_target, "ext4", flags, NULL);
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
// HUANGLONG add begin
|
|
status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount,
|
|
bool executable, bool isAsec, int permMask, int ownerUid, int ownerGid)
|
|
{
|
|
int rc;
|
|
int len;
|
|
unsigned long flags;
|
|
|
|
const char* c_source = source.c_str();
|
|
const char* c_target = target.c_str();
|
|
|
|
std::string mountData;
|
|
std::string umaskData;
|
|
|
|
flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC;
|
|
|
|
flags |= (executable ? 0 : MS_NOEXEC);
|
|
flags |= (ro ? MS_RDONLY : 0);
|
|
flags |= (remount ? MS_REMOUNT : 0);
|
|
|
|
if (permMask) {
|
|
// ",umask=%o", permMask
|
|
umaskData = ",umask=" + ((std::ostringstream() << std::oct << permMask).str());
|
|
}
|
|
// ",gid=%d,uid=%d,%s,context=u:object_r:ext4_sdcard:s0", ownerGid, ownerUid, umaskData
|
|
mountData = "gid=" + ((std::ostringstream() << std::dec << ownerGid).str())
|
|
+ ",uid=" + ((std::ostringstream() << std::dec << ownerUid).str()) + umaskData;
|
|
LOG(INFO) << "mountData: " << mountData;
|
|
// If an expand partition is mounted, do not specify the 'ext4_sdcard' context.
|
|
// Otherwise, third-party applications cannot be installed in the expand partition.
|
|
const char* expandMountPoint = "/mnt/expand";
|
|
rc = mount(c_source, c_target, "ext4", flags,
|
|
strstr(c_target, expandMountPoint) ? nullptr : mountData.c_str());
|
|
if (rc && errno == EROFS) {
|
|
LOG(ERROR) << source << " appears to be a read only filesystem - retrying mount RO";
|
|
flags |= MS_RDONLY;
|
|
rc = mount(c_source, c_target, "ext4", flags, nullptr);
|
|
}
|
|
|
|
if (rc < 0) {
|
|
LOG(ERROR) << c_source
|
|
<< " appears to be some filesystem error - use mount command retry again";
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back("mount");
|
|
cmd.push_back("-t");
|
|
cmd.push_back("ext4");
|
|
cmd.push_back(c_source);
|
|
cmd.push_back(c_target);
|
|
rc = ForkExecvp(cmd);
|
|
LOG(INFO) << "exec mount cmd status : " << rc;
|
|
}
|
|
return rc;
|
|
}
|
|
// HUANGLONG add end
|
|
|
|
status_t Resize(const std::string& source, unsigned long numSectors) {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kResizefsPath);
|
|
cmd.push_back("-f");
|
|
cmd.push_back(source);
|
|
cmd.push_back(StringPrintf("%lu", numSectors));
|
|
|
|
return ForkExecvp(cmd);
|
|
}
|
|
|
|
status_t Format(const std::string& source, unsigned long numSectors, const std::string& target) {
|
|
std::vector<std::string> cmd;
|
|
cmd.push_back(kMkfsPath);
|
|
|
|
cmd.push_back("-b");
|
|
cmd.push_back("4096");
|
|
|
|
cmd.push_back("-t");
|
|
cmd.push_back("ext4");
|
|
|
|
cmd.push_back("-M");
|
|
cmd.push_back(target);
|
|
|
|
bool needs_casefold =
|
|
android::base::GetBoolProperty("external_storage.casefold.enabled", false);
|
|
bool needs_projid = android::base::GetBoolProperty("external_storage.projid.enabled", false);
|
|
|
|
if (needs_projid) {
|
|
cmd.push_back("-I");
|
|
cmd.push_back("512");
|
|
}
|
|
|
|
std::string options("has_journal");
|
|
if (android::base::GetBoolProperty("vold.has_quota", false)) {
|
|
options += ",quota";
|
|
}
|
|
if (fscrypt_is_native()) {
|
|
options += ",encrypt";
|
|
}
|
|
if (needs_casefold) {
|
|
options += ",casefold";
|
|
}
|
|
|
|
cmd.push_back("-O");
|
|
cmd.push_back(options);
|
|
|
|
if (needs_casefold || needs_projid) {
|
|
cmd.push_back("-E");
|
|
std::string extopts = "";
|
|
if (needs_casefold) extopts += "encoding=utf8,";
|
|
if (needs_projid) extopts += "quotatype=prjquota,";
|
|
cmd.push_back(extopts);
|
|
}
|
|
|
|
cmd.push_back(source);
|
|
|
|
if (numSectors) {
|
|
cmd.push_back(StringPrintf("%lu", numSectors * (4096 / 512)));
|
|
}
|
|
|
|
return ForkExecvp(cmd);
|
|
}
|
|
|
|
} // namespace ext4
|
|
} // namespace vold
|
|
} // namespace android
|