San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2008 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 17 | #include "Disk.h" |
| 18 | #include "VolumeManager.h" |
| 19 | #include "CommandListener.h" |
Paul Lawrence | d0b4295 | 2015-06-03 14:19:51 -0700 | [diff] [blame] | 20 | #include "CryptCommandListener.h" |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 21 | #include "NetlinkManager.h" |
| 22 | #include "cryptfs.h" |
| 23 | #include "sehandle.h" |
| 24 | |
Elliott Hughes | 7e128fb | 2015-12-04 15:50:53 -0800 | [diff] [blame] | 25 | #include <android-base/logging.h> |
| 26 | #include <android-base/stringprintf.h> |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 27 | #include <cutils/klog.h> |
| 28 | #include <cutils/properties.h> |
| 29 | #include <cutils/sockets.h> |
| 30 | |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 31 | #include <stdio.h> |
| 32 | #include <stdlib.h> |
| 33 | #include <errno.h> |
| 34 | #include <string.h> |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 35 | #include <sys/stat.h> |
| 36 | #include <sys/types.h> |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 37 | #include <getopt.h> |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 38 | #include <fcntl.h> |
| 39 | #include <dirent.h> |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 40 | #include <fs_mgr.h> |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 41 | |
Dimitry Ivanov | e74c3ea | 2017-01-19 12:48:27 -0800 | [diff] [blame] | 42 | static int process_config(VolumeManager *vm, bool* has_adoptable); |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 43 | static void coldboot(const char *path); |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 44 | static void parse_args(int argc, char** argv); |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 45 | |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 46 | struct fstab *fstab; |
| 47 | |
Stephen Smalley | 684e662 | 2014-09-30 10:29:24 -0400 | [diff] [blame] | 48 | struct selabel_handle *sehandle; |
| 49 | |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 50 | using android::base::StringPrintf; |
| 51 | |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 52 | int main(int argc, char** argv) { |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 53 | setenv("ANDROID_LOG_TAGS", "*:v", 1); |
Jeff Sharkey | 5bad378 | 2015-04-18 16:15:10 -0700 | [diff] [blame] | 54 | android::base::InitLogging(argv, android::base::LogdLogger(android::base::SYSTEM)); |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 55 | |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 56 | LOG(INFO) << "Vold 3.0 (the awakening) firing up"; |
| 57 | |
Jeff Sharkey | d0640f6 | 2015-05-21 22:35:42 -0700 | [diff] [blame] | 58 | LOG(VERBOSE) << "Detected support for:" |
| 59 | << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "") |
| 60 | << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "") |
| 61 | << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : ""); |
| 62 | |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 63 | VolumeManager *vm; |
| 64 | CommandListener *cl; |
Paul Lawrence | d0b4295 | 2015-06-03 14:19:51 -0700 | [diff] [blame] | 65 | CryptCommandListener *ccl; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 66 | NetlinkManager *nm; |
| 67 | |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 68 | parse_args(argc, argv); |
San Mehat | a2677e4 | 2009-12-13 10:40:18 -0800 | [diff] [blame] | 69 | |
Stephen Smalley | 684e662 | 2014-09-30 10:29:24 -0400 | [diff] [blame] | 70 | sehandle = selinux_android_file_context_handle(); |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 71 | if (sehandle) { |
Stephen Smalley | 684e662 | 2014-09-30 10:29:24 -0400 | [diff] [blame] | 72 | selinux_android_set_sehandle(sehandle); |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 73 | } |
Stephen Smalley | 684e662 | 2014-09-30 10:29:24 -0400 | [diff] [blame] | 74 | |
Jeff Sharkey | f7e86ea | 2015-04-01 23:07:19 -0700 | [diff] [blame] | 75 | // Quickly throw a CLOEXEC on the socket we just inherited from init |
| 76 | fcntl(android_get_control_socket("vold"), F_SETFD, FD_CLOEXEC); |
Paul Lawrence | d0b4295 | 2015-06-03 14:19:51 -0700 | [diff] [blame] | 77 | fcntl(android_get_control_socket("cryptd"), F_SETFD, FD_CLOEXEC); |
Jeff Sharkey | f7e86ea | 2015-04-01 23:07:19 -0700 | [diff] [blame] | 78 | |
San Mehat | a2677e4 | 2009-12-13 10:40:18 -0800 | [diff] [blame] | 79 | mkdir("/dev/block/vold", 0755); |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 80 | |
Ken Sumrall | b9738ea | 2013-03-19 19:42:30 -0700 | [diff] [blame] | 81 | /* For when cryptfs checks and mounts an encrypted filesystem */ |
| 82 | klog_set_level(6); |
| 83 | |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 84 | /* Create our singleton managers */ |
| 85 | if (!(vm = VolumeManager::Instance())) { |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 86 | LOG(ERROR) << "Unable to create VolumeManager"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 87 | exit(1); |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 88 | } |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 89 | |
| 90 | if (!(nm = NetlinkManager::Instance())) { |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 91 | LOG(ERROR) << "Unable to create NetlinkManager"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 92 | exit(1); |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 93 | } |
San Mehat | a2677e4 | 2009-12-13 10:40:18 -0800 | [diff] [blame] | 94 | |
Jeff Sharkey | b066787 | 2015-04-29 08:57:18 -0700 | [diff] [blame] | 95 | if (property_get_bool("vold.debug", false)) { |
| 96 | vm->setDebug(true); |
| 97 | } |
| 98 | |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 99 | cl = new CommandListener(); |
Paul Lawrence | d0b4295 | 2015-06-03 14:19:51 -0700 | [diff] [blame] | 100 | ccl = new CryptCommandListener(); |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 101 | vm->setBroadcaster((SocketListener *) cl); |
| 102 | nm->setBroadcaster((SocketListener *) cl); |
| 103 | |
| 104 | if (vm->start()) { |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 105 | PLOG(ERROR) << "Unable to start VolumeManager"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 106 | exit(1); |
| 107 | } |
| 108 | |
Dimitry Ivanov | e74c3ea | 2017-01-19 12:48:27 -0800 | [diff] [blame] | 109 | bool has_adoptable; |
| 110 | |
| 111 | if (process_config(vm, &has_adoptable)) { |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 112 | PLOG(ERROR) << "Error reading configuration... continuing anyways"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 113 | } |
| 114 | |
| 115 | if (nm->start()) { |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 116 | PLOG(ERROR) << "Unable to start NetlinkManager"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 117 | exit(1); |
| 118 | } |
| 119 | |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 120 | coldboot("/sys/block"); |
San Mehat | 0cde53c | 2009-12-22 08:32:33 -0800 | [diff] [blame] | 121 | // coldboot("/sys/class/switch"); |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 122 | |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 123 | /* |
| 124 | * Now that we're up, we can respond to commands |
| 125 | */ |
| 126 | if (cl->startListener()) { |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 127 | PLOG(ERROR) << "Unable to start CommandListener"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 128 | exit(1); |
| 129 | } |
| 130 | |
Paul Lawrence | d0b4295 | 2015-06-03 14:19:51 -0700 | [diff] [blame] | 131 | if (ccl->startListener()) { |
| 132 | PLOG(ERROR) << "Unable to start CryptCommandListener"; |
| 133 | exit(1); |
| 134 | } |
| 135 | |
Dimitry Ivanov | e74c3ea | 2017-01-19 12:48:27 -0800 | [diff] [blame] | 136 | // This call should go after listeners are started to avoid |
| 137 | // a deadlock between vold and init (see b/34278978 for details) |
| 138 | property_set("vold.has_adoptable", has_adoptable ? "1" : "0"); |
| 139 | |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 140 | // Eventually we'll become the monitoring thread |
| 141 | while(1) { |
| 142 | sleep(1000); |
| 143 | } |
| 144 | |
Jeff Sharkey | 9f18fe7 | 2015-04-01 23:32:18 -0700 | [diff] [blame] | 145 | LOG(ERROR) << "Vold exiting"; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 146 | exit(0); |
| 147 | } |
| 148 | |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 149 | static void parse_args(int argc, char** argv) { |
| 150 | static struct option opts[] = { |
| 151 | {"blkid_context", required_argument, 0, 'b' }, |
| 152 | {"blkid_untrusted_context", required_argument, 0, 'B' }, |
| 153 | {"fsck_context", required_argument, 0, 'f' }, |
| 154 | {"fsck_untrusted_context", required_argument, 0, 'F' }, |
| 155 | }; |
| 156 | |
| 157 | int c; |
| 158 | while ((c = getopt_long(argc, argv, "", opts, nullptr)) != -1) { |
| 159 | switch (c) { |
| 160 | case 'b': android::vold::sBlkidContext = optarg; break; |
| 161 | case 'B': android::vold::sBlkidUntrustedContext = optarg; break; |
| 162 | case 'f': android::vold::sFsckContext = optarg; break; |
| 163 | case 'F': android::vold::sFsckUntrustedContext = optarg; break; |
| 164 | } |
| 165 | } |
| 166 | |
| 167 | CHECK(android::vold::sBlkidContext != nullptr); |
| 168 | CHECK(android::vold::sBlkidUntrustedContext != nullptr); |
| 169 | CHECK(android::vold::sFsckContext != nullptr); |
| 170 | CHECK(android::vold::sFsckUntrustedContext != nullptr); |
| 171 | } |
| 172 | |
| 173 | static void do_coldboot(DIR *d, int lvl) { |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 174 | struct dirent *de; |
| 175 | int dfd, fd; |
| 176 | |
| 177 | dfd = dirfd(d); |
| 178 | |
Jeff Sharkey | f7e86ea | 2015-04-01 23:07:19 -0700 | [diff] [blame] | 179 | fd = openat(dfd, "uevent", O_WRONLY | O_CLOEXEC); |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 180 | if(fd >= 0) { |
| 181 | write(fd, "add\n", 4); |
| 182 | close(fd); |
| 183 | } |
| 184 | |
| 185 | while((de = readdir(d))) { |
| 186 | DIR *d2; |
| 187 | |
| 188 | if (de->d_name[0] == '.') |
| 189 | continue; |
| 190 | |
| 191 | if (de->d_type != DT_DIR && lvl > 0) |
| 192 | continue; |
| 193 | |
| 194 | fd = openat(dfd, de->d_name, O_RDONLY | O_DIRECTORY); |
| 195 | if(fd < 0) |
| 196 | continue; |
| 197 | |
| 198 | d2 = fdopendir(fd); |
| 199 | if(d2 == 0) |
| 200 | close(fd); |
| 201 | else { |
| 202 | do_coldboot(d2, lvl + 1); |
| 203 | closedir(d2); |
| 204 | } |
| 205 | } |
| 206 | } |
| 207 | |
Jeff Sharkey | 95c87cc | 2015-04-01 11:54:32 -0700 | [diff] [blame] | 208 | static void coldboot(const char *path) { |
San Mehat | 3578c41 | 2009-10-12 14:51:52 -0700 | [diff] [blame] | 209 | DIR *d = opendir(path); |
| 210 | if(d) { |
| 211 | do_coldboot(d, 0); |
| 212 | closedir(d); |
| 213 | } |
| 214 | } |
| 215 | |
Dimitry Ivanov | e74c3ea | 2017-01-19 12:48:27 -0800 | [diff] [blame] | 216 | static int process_config(VolumeManager *vm, bool* has_adoptable) { |
Jeff Sharkey | c86ab6f | 2015-06-26 14:02:09 -0700 | [diff] [blame] | 217 | std::string path(android::vold::DefaultFstabPath()); |
| 218 | fstab = fs_mgr_read_fstab(path.c_str()); |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 219 | if (!fstab) { |
Jeff Sharkey | c86ab6f | 2015-06-26 14:02:09 -0700 | [diff] [blame] | 220 | PLOG(ERROR) << "Failed to open default fstab " << path; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 221 | return -1; |
| 222 | } |
| 223 | |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 224 | /* Loop through entries looking for ones that vold manages */ |
Dimitry Ivanov | e74c3ea | 2017-01-19 12:48:27 -0800 | [diff] [blame] | 225 | *has_adoptable = false; |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 226 | for (int i = 0; i < fstab->num_entries; i++) { |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 227 | if (fs_mgr_is_voldmanaged(&fstab->recs[i])) { |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 228 | if (fs_mgr_is_nonremovable(&fstab->recs[i])) { |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 229 | LOG(WARNING) << "nonremovable no longer supported; ignoring volume"; |
| 230 | continue; |
San Mehat | a2677e4 | 2009-12-13 10:40:18 -0800 | [diff] [blame] | 231 | } |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 232 | |
| 233 | std::string sysPattern(fstab->recs[i].blk_device); |
| 234 | std::string nickname(fstab->recs[i].label); |
| 235 | int flags = 0; |
| 236 | |
Ken Sumrall | 56ad03c | 2013-02-13 13:00:19 -0800 | [diff] [blame] | 237 | if (fs_mgr_is_encryptable(&fstab->recs[i])) { |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 238 | flags |= android::vold::Disk::Flags::kAdoptable; |
Dimitry Ivanov | e74c3ea | 2017-01-19 12:48:27 -0800 | [diff] [blame] | 239 | *has_adoptable = true; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 240 | } |
Jeff Sharkey | 65427f1 | 2015-05-19 15:54:15 -0700 | [diff] [blame] | 241 | if (fs_mgr_is_noemulatedsd(&fstab->recs[i]) |
| 242 | || property_get_bool("vold.debug.default_primary", false)) { |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 243 | flags |= android::vold::Disk::Flags::kDefaultPrimary; |
Jeff Sharkey | ba6ae8d | 2013-07-15 18:14:25 -0700 | [diff] [blame] | 244 | } |
Ken Sumrall | 29d8da8 | 2011-05-18 17:20:07 -0700 | [diff] [blame] | 245 | |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 246 | vm->addDiskSource(std::shared_ptr<VolumeManager::DiskSource>( |
| 247 | new VolumeManager::DiskSource(sysPattern, nickname, flags))); |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 248 | } |
| 249 | } |
Jeff Sharkey | 36801cc | 2015-03-13 16:09:20 -0700 | [diff] [blame] | 250 | return 0; |
San Mehat | f1b736b | 2009-10-10 17:22:08 -0700 | [diff] [blame] | 251 | } |