blob: 25a0826f569a37057cd647ebe864cb4307159eb3 [file] [log] [blame]
Paul Crowley53af81c2015-05-19 17:31:39 +01001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Paul Crowley28c4df42015-07-07 17:13:17 +010017#include <memory>
Paul Crowley53af81c2015-05-19 17:31:39 +010018#include <string>
Paul Crowley5ab73e92015-07-03 16:17:23 +010019#include <vector>
Paul Crowley53af81c2015-05-19 17:31:39 +010020
21#include <stdio.h>
22#include <stdlib.h>
Paul Crowley53af81c2015-05-19 17:31:39 +010023#include <errno.h>
24#include <sys/types.h>
25#include <sys/stat.h>
26#include <fcntl.h>
27#include <linux/fs.h>
28#include <linux/fiemap.h>
Paul Crowley4432e732015-07-01 13:33:47 +010029#include <mntent.h>
Paul Crowley53af81c2015-05-19 17:31:39 +010030
Paul Crowley8bb8fcf2016-01-11 12:26:44 +000031#include <android-base/logging.h>
Paul Crowleye4c93da2017-06-16 09:21:18 -070032#include <android-base/unique_fd.h>
Paul Crowley4432e732015-07-01 13:33:47 +010033
Paul Crowley03f89d32017-06-16 09:37:31 -070034#include "FileDeviceUtils.h"
35
Paul Crowley4432e732015-07-01 13:33:47 +010036namespace {
Paul Crowley5ab73e92015-07-03 16:17:23 +010037
38struct Options {
39 std::vector<std::string> targets;
40 bool unlink{true};
41};
42
Paul Crowley28c4df42015-07-07 17:13:17 +010043constexpr uint32_t max_extents = 32;
Paul Crowley53af81c2015-05-19 17:31:39 +010044
Paul Crowley5ab73e92015-07-03 16:17:23 +010045bool read_command_line(int argc, const char * const argv[], Options &options);
Paul Crowley4432e732015-07-01 13:33:47 +010046void usage(const char *progname);
Paul Crowley2143ee82016-06-28 14:24:07 -070047bool secdiscard_path(const std::string &path);
Paul Crowley28c4df42015-07-07 17:13:17 +010048bool check_fiemap(const struct fiemap &fiemap, const std::string &path);
Paul Crowley2143ee82016-06-28 14:24:07 -070049bool overwrite_with_zeros(int fd, off64_t start, off64_t length);
Paul Crowley5ab73e92015-07-03 16:17:23 +010050
Paul Crowley4432e732015-07-01 13:33:47 +010051}
Paul Crowley53af81c2015-05-19 17:31:39 +010052
Paul Crowley4432e732015-07-01 13:33:47 +010053int main(int argc, const char * const argv[]) {
Paul Crowley8bb8fcf2016-01-11 12:26:44 +000054 android::base::InitLogging(const_cast<char **>(argv));
Paul Crowley5ab73e92015-07-03 16:17:23 +010055 Options options;
56 if (!read_command_line(argc, argv, options)) {
Paul Crowley53af81c2015-05-19 17:31:39 +010057 usage(argv[0]);
58 return -1;
59 }
Jaegeuk Kimab515b22018-08-02 12:41:45 -070060
Paul Crowley2143ee82016-06-28 14:24:07 -070061 for (auto const &target: options.targets) {
Jaegeuk Kimab515b22018-08-02 12:41:45 -070062// F2FS-specific ioctl
63// It requires the below kernel commit merged in v4.16-rc1.
64// 1ad71a27124c ("f2fs: add an ioctl to disable GC for specific file")
65// In android-4.4,
66// 56ee1e817908 ("f2fs: updates on v4.16-rc1")
67// In android-4.9,
68// 2f17e34672a8 ("f2fs: updates on v4.16-rc1")
69// In android-4.14,
70// ce767d9a55bc ("f2fs: updates on v4.16-rc1")
71#ifndef F2FS_IOC_SET_PIN_FILE
72#ifndef F2FS_IOCTL_MAGIC
73#define F2FS_IOCTL_MAGIC 0xf5
74#endif
75#define F2FS_IOC_SET_PIN_FILE _IOW(F2FS_IOCTL_MAGIC, 13, __u32)
Jaegeuk Kim1dcfbe22018-09-12 10:10:51 -070076#define F2FS_IOC_GET_PIN_FILE _IOR(F2FS_IOCTL_MAGIC, 14, __u32)
Jaegeuk Kimab515b22018-08-02 12:41:45 -070077#endif
78 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(
79 target.c_str(), O_WRONLY, 0)));
80 if (fd == -1) {
81 LOG(ERROR) << "Secure discard open failed for: " << target;
82 return 0;
83 }
84 __u32 set = 1;
85 ioctl(fd, F2FS_IOC_SET_PIN_FILE, &set);
86
Paul Crowley8bb8fcf2016-01-11 12:26:44 +000087 LOG(DEBUG) << "Securely discarding '" << target << "' unlink=" << options.unlink;
Paul Crowley2143ee82016-06-28 14:24:07 -070088 if (!secdiscard_path(target)) {
89 LOG(ERROR) << "Secure discard failed for: " << target;
90 }
Paul Crowley5ab73e92015-07-03 16:17:23 +010091 if (options.unlink) {
92 if (unlink(target.c_str()) != 0 && errno != ENOENT) {
Paul Crowley8bb8fcf2016-01-11 12:26:44 +000093 PLOG(ERROR) << "Unable to unlink: " << target;
Paul Crowley5ab73e92015-07-03 16:17:23 +010094 }
95 }
Jaegeuk Kimab515b22018-08-02 12:41:45 -070096 set = 0;
97 ioctl(fd, F2FS_IOC_SET_PIN_FILE, &set);
Paul Crowley8bb8fcf2016-01-11 12:26:44 +000098 LOG(DEBUG) << "Discarded: " << target;
Paul Crowley53af81c2015-05-19 17:31:39 +010099 }
100 return 0;
101}
102
Paul Crowley4432e732015-07-01 13:33:47 +0100103namespace {
104
Paul Crowley5ab73e92015-07-03 16:17:23 +0100105bool read_command_line(int argc, const char * const argv[], Options &options) {
106 for (int i = 1; i < argc; i++) {
107 if (!strcmp("--no-unlink", argv[i])) {
108 options.unlink = false;
109 } else if (!strcmp("--", argv[i])) {
110 for (int j = i+1; j < argc; j++) {
111 if (argv[j][0] != '/') return false; // Must be absolute path
112 options.targets.emplace_back(argv[j]);
113 }
114 return options.targets.size() > 0;
115 } else {
116 return false; // Unknown option
117 }
118 }
119 return false; // "--" not found
120}
121
Paul Crowley4432e732015-07-01 13:33:47 +0100122void usage(const char *progname) {
Paul Crowley5ab73e92015-07-03 16:17:23 +0100123 fprintf(stderr, "Usage: %s [--no-unlink] -- <absolute path> ...\n", progname);
Paul Crowley53af81c2015-05-19 17:31:39 +0100124}
125
126// BLKSECDISCARD all content in "path", if it's small enough.
Paul Crowley2143ee82016-06-28 14:24:07 -0700127bool secdiscard_path(const std::string &path) {
Paul Crowley03f89d32017-06-16 09:37:31 -0700128 auto fiemap = android::vold::PathFiemap(path, max_extents);
Paul Crowley28c4df42015-07-07 17:13:17 +0100129 if (!fiemap || !check_fiemap(*fiemap, path)) {
Paul Crowley2143ee82016-06-28 14:24:07 -0700130 return false;
Paul Crowley53af81c2015-05-19 17:31:39 +0100131 }
Paul Crowley03f89d32017-06-16 09:37:31 -0700132 auto block_device = android::vold::BlockDeviceForPath(path);
Paul Crowley4432e732015-07-01 13:33:47 +0100133 if (block_device.empty()) {
Paul Crowley2143ee82016-06-28 14:24:07 -0700134 return false;
Paul Crowley53af81c2015-05-19 17:31:39 +0100135 }
Paul Crowleye4c93da2017-06-16 09:21:18 -0700136 android::base::unique_fd fs_fd(TEMP_FAILURE_RETRY(open(
137 block_device.c_str(), O_RDWR | O_LARGEFILE | O_CLOEXEC, 0)));
138 if (fs_fd == -1) {
Paul Crowley8bb8fcf2016-01-11 12:26:44 +0000139 PLOG(ERROR) << "Failed to open device " << block_device;
Paul Crowley2143ee82016-06-28 14:24:07 -0700140 return false;
Paul Crowley4432e732015-07-01 13:33:47 +0100141 }
Paul Crowley28c4df42015-07-07 17:13:17 +0100142 for (uint32_t i = 0; i < fiemap->fm_mapped_extents; i++) {
143 uint64_t range[2];
144 range[0] = fiemap->fm_extents[i].fe_physical;
145 range[1] = fiemap->fm_extents[i].fe_length;
146 if (ioctl(fs_fd.get(), BLKSECDISCARD, range) == -1) {
Paul Crowley8bb8fcf2016-01-11 12:26:44 +0000147 PLOG(ERROR) << "Unable to BLKSECDISCARD " << path;
Paul Crowley2143ee82016-06-28 14:24:07 -0700148 if (!overwrite_with_zeros(fs_fd.get(), range[0], range[1])) return false;
149 LOG(DEBUG) << "Used zero overwrite";
Paul Crowley28c4df42015-07-07 17:13:17 +0100150 }
Paul Crowley53af81c2015-05-19 17:31:39 +0100151 }
Paul Crowley2143ee82016-06-28 14:24:07 -0700152 return true;
Paul Crowley53af81c2015-05-19 17:31:39 +0100153}
154
Paul Crowley28c4df42015-07-07 17:13:17 +0100155// Ensure that the FIEMAP covers the file and is OK to discard
156bool check_fiemap(const struct fiemap &fiemap, const std::string &path) {
157 auto mapped = fiemap.fm_mapped_extents;
158 if (!(fiemap.fm_extents[mapped - 1].fe_flags & FIEMAP_EXTENT_LAST)) {
Paul Crowley8bb8fcf2016-01-11 12:26:44 +0000159 LOG(ERROR) << "Extent " << mapped -1 << " was not the last in " << path;
Paul Crowley28c4df42015-07-07 17:13:17 +0100160 return false;
Paul Crowley53af81c2015-05-19 17:31:39 +0100161 }
Paul Crowley28c4df42015-07-07 17:13:17 +0100162 for (uint32_t i = 0; i < mapped; i++) {
163 auto flags = fiemap.fm_extents[i].fe_flags;
164 if (flags & (FIEMAP_EXTENT_UNKNOWN | FIEMAP_EXTENT_DELALLOC | FIEMAP_EXTENT_NOT_ALIGNED)) {
Paul Crowley8bb8fcf2016-01-11 12:26:44 +0000165 LOG(ERROR) << "Extent " << i << " has unexpected flags " << flags << ": " << path;
Paul Crowley28c4df42015-07-07 17:13:17 +0100166 return false;
167 }
Paul Crowley53af81c2015-05-19 17:31:39 +0100168 }
Paul Crowley28c4df42015-07-07 17:13:17 +0100169 return true;
170}
171
Paul Crowley2143ee82016-06-28 14:24:07 -0700172bool overwrite_with_zeros(int fd, off64_t start, off64_t length) {
173 if (lseek64(fd, start, SEEK_SET) != start) {
174 PLOG(ERROR) << "Seek failed for zero overwrite";
175 return false;
176 }
177 char buf[BUFSIZ];
178 memset(buf, 0, sizeof(buf));
179 while (length > 0) {
180 size_t wlen = static_cast<size_t>(std::min(static_cast<off64_t>(sizeof(buf)), length));
181 auto written = write(fd, buf, wlen);
182 if (written < 1) {
183 PLOG(ERROR) << "Write of zeroes failed";
184 return false;
185 }
186 length -= written;
187 }
188 return true;
189}
190
Paul Crowley53af81c2015-05-19 17:31:39 +0100191}