blob: 42789c9d7ecf38a3332e82fab343f1e3d8080cbc [file] [log] [blame]
San Mehatf1b736b2009-10-10 17:22:08 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Jeff Sharkey67b8c492017-09-21 17:08:43 -060017#define ATRACE_TAG ATRACE_TAG_PACKAGE_MANAGER
18
David Anderson156d9d22021-09-21 17:21:57 -070019#include "MetadataCrypt.h"
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070020#include "NetlinkManager.h"
Jeff Sharkey068c6be2017-09-06 13:47:40 -060021#include "VoldNativeService.h"
Paul Crowleye2ee1522017-09-26 14:05:26 -070022#include "VoldUtil.h"
Paul Crowley14c8c072018-09-18 13:30:21 -070023#include "VolumeManager.h"
Paul Crowley14c8c072018-09-18 13:30:21 -070024#include "model/Disk.h"
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070025#include "sehandle.h"
26
Elliott Hughes7e128fb2015-12-04 15:50:53 -080027#include <android-base/logging.h>
Jeff Sharkey3472e522017-10-06 18:02:53 -060028#include <android-base/properties.h>
Elliott Hughes7e128fb2015-12-04 15:50:53 -080029#include <android-base/stringprintf.h>
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070030#include <cutils/klog.h>
Yifan Hong024a1242018-08-10 13:50:46 -070031#include <hidl/HidlTransportSupport.h>
Jeff Sharkey67b8c492017-09-21 17:08:43 -060032#include <utils/Trace.h>
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070033
Paul Crowley14c8c072018-09-18 13:30:21 -070034#include <dirent.h>
35#include <errno.h>
36#include <fcntl.h>
37#include <fs_mgr.h>
38#include <getopt.h>
San Mehatf1b736b2009-10-10 17:22:08 -070039#include <stdio.h>
40#include <stdlib.h>
San Mehatf1b736b2009-10-10 17:22:08 -070041#include <string.h>
San Mehat3578c412009-10-12 14:51:52 -070042#include <sys/stat.h>
43#include <sys/types.h>
San Mehatf1b736b2009-10-10 17:22:08 -070044
Jaegeuk Kimc52f6722020-04-06 15:58:41 -070045typedef struct vold_configs {
46 bool has_adoptable : 1;
47 bool has_quota : 1;
48 bool has_reserved : 1;
49 bool has_compress : 1;
50} VoldConfigs;
51
52static int process_config(VolumeManager* vm, VoldConfigs* configs);
Paul Crowley14c8c072018-09-18 13:30:21 -070053static void coldboot(const char* path);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070054static void parse_args(int argc, char** argv);
David Anderson52de78e2021-11-05 19:26:56 -070055static void VoldLogger(android::base::LogId log_buffer_id, android::base::LogSeverity severity,
56 const char* tag, const char* file, unsigned int line, const char* message);
San Mehatf1b736b2009-10-10 17:22:08 -070057
Paul Crowley14c8c072018-09-18 13:30:21 -070058struct selabel_handle* sehandle;
David Anderson52de78e2021-11-05 19:26:56 -070059android::base::LogdLogger logd_logger(android::base::SYSTEM);
Stephen Smalley684e6622014-09-30 10:29:24 -040060
Jeff Sharkey36801cc2015-03-13 16:09:20 -070061using android::base::StringPrintf;
Tom Cherry4c5bde22019-01-29 14:34:01 -080062using android::fs_mgr::ReadDefaultFstab;
Jeff Sharkey36801cc2015-03-13 16:09:20 -070063
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070064int main(int argc, char** argv) {
Paul Crowley0fd26262018-01-30 09:48:19 -080065 atrace_set_tracing_enabled(false);
Sudheer Shanka40ab6742018-09-18 13:07:45 -070066 setenv("ANDROID_LOG_TAGS", "*:d", 1); // Do not submit with verbose logs enabled
David Anderson52de78e2021-11-05 19:26:56 -070067 android::base::InitLogging(argv, &VoldLogger);
San Mehatf1b736b2009-10-10 17:22:08 -070068
Paul Crowley0fd26262018-01-30 09:48:19 -080069 LOG(INFO) << "Vold 3.0 (the awakening) firing up";
70
Jeff Sharkey67b8c492017-09-21 17:08:43 -060071 ATRACE_BEGIN("main");
72
Sudheer Shanka4b6ca4e2018-09-21 10:54:54 -070073 LOG(DEBUG) << "Detected support for:"
74 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "")
75 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "")
76 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : "");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070077
Paul Crowley14c8c072018-09-18 13:30:21 -070078 VolumeManager* vm;
79 NetlinkManager* nm;
San Mehatf1b736b2009-10-10 17:22:08 -070080
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070081 parse_args(argc, argv);
San Mehata2677e42009-12-13 10:40:18 -080082
Stephen Smalley684e6622014-09-30 10:29:24 -040083 sehandle = selinux_android_file_context_handle();
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070084 if (sehandle) {
Stephen Smalley684e6622014-09-30 10:29:24 -040085 selinux_android_set_sehandle(sehandle);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070086 }
Stephen Smalley684e6622014-09-30 10:29:24 -040087
San Mehata2677e42009-12-13 10:40:18 -080088 mkdir("/dev/block/vold", 0755);
San Mehatf1b736b2009-10-10 17:22:08 -070089
Ken Sumrallb9738ea2013-03-19 19:42:30 -070090 /* For when cryptfs checks and mounts an encrypted filesystem */
91 klog_set_level(6);
92
San Mehatf1b736b2009-10-10 17:22:08 -070093 /* Create our singleton managers */
94 if (!(vm = VolumeManager::Instance())) {
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070095 LOG(ERROR) << "Unable to create VolumeManager";
San Mehatf1b736b2009-10-10 17:22:08 -070096 exit(1);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070097 }
San Mehatf1b736b2009-10-10 17:22:08 -070098
99 if (!(nm = NetlinkManager::Instance())) {
Jeff Sharkey9f18fe72015-04-01 23:32:18 -0700100 LOG(ERROR) << "Unable to create NetlinkManager";
San Mehatf1b736b2009-10-10 17:22:08 -0700101 exit(1);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700102 }
San Mehata2677e42009-12-13 10:40:18 -0800103
Jeff Sharkey3472e522017-10-06 18:02:53 -0600104 if (android::base::GetBoolProperty("vold.debug", false)) {
Jeff Sharkeyb0667872015-04-29 08:57:18 -0700105 vm->setDebug(true);
106 }
107
San Mehatf1b736b2009-10-10 17:22:08 -0700108 if (vm->start()) {
Jeff Sharkey9f18fe72015-04-01 23:32:18 -0700109 PLOG(ERROR) << "Unable to start VolumeManager";
San Mehatf1b736b2009-10-10 17:22:08 -0700110 exit(1);
111 }
112
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700113 VoldConfigs configs = {};
114 if (process_config(vm, &configs)) {
Jeff Sharkey9f18fe72015-04-01 23:32:18 -0700115 PLOG(ERROR) << "Error reading configuration... continuing anyways";
San Mehatf1b736b2009-10-10 17:22:08 -0700116 }
117
Yifan Hong024a1242018-08-10 13:50:46 -0700118 android::hardware::configureRpcThreadpool(1, false /* callerWillJoin */);
119
Paul Crowley31888052017-09-27 10:56:54 -0700120 ATRACE_BEGIN("VoldNativeService::start");
121 if (android::vold::VoldNativeService::start() != android::OK) {
122 LOG(ERROR) << "Unable to start VoldNativeService";
123 exit(1);
124 }
125 ATRACE_END();
126
Paul Crowley0fd26262018-01-30 09:48:19 -0800127 LOG(DEBUG) << "VoldNativeService::start() completed OK";
128
Jeff Sharkey67b8c492017-09-21 17:08:43 -0600129 ATRACE_BEGIN("NetlinkManager::start");
San Mehatf1b736b2009-10-10 17:22:08 -0700130 if (nm->start()) {
Jeff Sharkey9f18fe72015-04-01 23:32:18 -0700131 PLOG(ERROR) << "Unable to start NetlinkManager";
San Mehatf1b736b2009-10-10 17:22:08 -0700132 exit(1);
133 }
Jeff Sharkey67b8c492017-09-21 17:08:43 -0600134 ATRACE_END();
San Mehatf1b736b2009-10-10 17:22:08 -0700135
Dimitry Ivanovc976e732017-01-19 12:48:27 -0800136 // This call should go after listeners are started to avoid
137 // a deadlock between vold and init (see b/34278978 for details)
Jaegeuk Kim4ea573a2020-04-23 13:43:12 -0700138 android::base::SetProperty("vold.has_adoptable", configs.has_adoptable ? "1" : "0");
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700139 android::base::SetProperty("vold.has_quota", configs.has_quota ? "1" : "0");
140 android::base::SetProperty("vold.has_reserved", configs.has_reserved ? "1" : "0");
141 android::base::SetProperty("vold.has_compress", configs.has_compress ? "1" : "0");
Dimitry Ivanovc976e732017-01-19 12:48:27 -0800142
Wei Wang2edbe282017-03-06 17:27:05 -0800143 // Do coldboot here so it won't block booting,
144 // also the cold boot is needed in case we have flash drive
145 // connected before Vold launched
146 coldboot("/sys/block");
Jeff Sharkey67b8c492017-09-21 17:08:43 -0600147
148 ATRACE_END();
149
Jeff Sharkey93396c12017-10-18 16:52:48 -0600150 android::IPCThreadState::self()->joinThreadPool();
151 LOG(INFO) << "vold shutting down";
San Mehatf1b736b2009-10-10 17:22:08 -0700152
San Mehatf1b736b2009-10-10 17:22:08 -0700153 exit(0);
154}
155
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700156static void parse_args(int argc, char** argv) {
157 static struct option opts[] = {
Paul Crowley14c8c072018-09-18 13:30:21 -0700158 {"blkid_context", required_argument, 0, 'b'},
159 {"blkid_untrusted_context", required_argument, 0, 'B'},
160 {"fsck_context", required_argument, 0, 'f'},
161 {"fsck_untrusted_context", required_argument, 0, 'F'},
Eric Biggersf5ef40d2019-04-03 16:32:24 -0700162 {nullptr, 0, nullptr, 0},
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700163 };
164
165 int c;
166 while ((c = getopt_long(argc, argv, "", opts, nullptr)) != -1) {
167 switch (c) {
Paul Crowley14c8c072018-09-18 13:30:21 -0700168 // clang-format off
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700169 case 'b': android::vold::sBlkidContext = optarg; break;
170 case 'B': android::vold::sBlkidUntrustedContext = optarg; break;
171 case 'f': android::vold::sFsckContext = optarg; break;
172 case 'F': android::vold::sFsckUntrustedContext = optarg; break;
Paul Crowley14c8c072018-09-18 13:30:21 -0700173 // clang-format on
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700174 }
175 }
176
177 CHECK(android::vold::sBlkidContext != nullptr);
178 CHECK(android::vold::sBlkidUntrustedContext != nullptr);
179 CHECK(android::vold::sFsckContext != nullptr);
180 CHECK(android::vold::sFsckUntrustedContext != nullptr);
181}
182
Paul Crowley14c8c072018-09-18 13:30:21 -0700183static void do_coldboot(DIR* d, int lvl) {
184 struct dirent* de;
Wei Wang2edbe282017-03-06 17:27:05 -0800185 int dfd, fd;
186
187 dfd = dirfd(d);
188
189 fd = openat(dfd, "uevent", O_WRONLY | O_CLOEXEC);
Paul Crowley14c8c072018-09-18 13:30:21 -0700190 if (fd >= 0) {
Wei Wang2edbe282017-03-06 17:27:05 -0800191 write(fd, "add\n", 4);
192 close(fd);
193 }
194
Paul Crowley14c8c072018-09-18 13:30:21 -0700195 while ((de = readdir(d))) {
196 DIR* d2;
Wei Wang2edbe282017-03-06 17:27:05 -0800197
Paul Crowley14c8c072018-09-18 13:30:21 -0700198 if (de->d_name[0] == '.') continue;
Wei Wang2edbe282017-03-06 17:27:05 -0800199
Paul Crowley14c8c072018-09-18 13:30:21 -0700200 if (de->d_type != DT_DIR && lvl > 0) continue;
Wei Wang2edbe282017-03-06 17:27:05 -0800201
Jeff Sharkeyfd3dc3c2017-03-27 10:49:21 -0600202 fd = openat(dfd, de->d_name, O_RDONLY | O_DIRECTORY | O_CLOEXEC);
Paul Crowley14c8c072018-09-18 13:30:21 -0700203 if (fd < 0) continue;
Wei Wang2edbe282017-03-06 17:27:05 -0800204
205 d2 = fdopendir(fd);
Paul Crowley14c8c072018-09-18 13:30:21 -0700206 if (d2 == 0)
Wei Wang2edbe282017-03-06 17:27:05 -0800207 close(fd);
208 else {
209 do_coldboot(d2, lvl + 1);
210 closedir(d2);
211 }
212 }
213}
214
Paul Crowley14c8c072018-09-18 13:30:21 -0700215static void coldboot(const char* path) {
Jeff Sharkey67b8c492017-09-21 17:08:43 -0600216 ATRACE_NAME("coldboot");
Paul Crowley14c8c072018-09-18 13:30:21 -0700217 DIR* d = opendir(path);
218 if (d) {
Wei Wang2edbe282017-03-06 17:27:05 -0800219 do_coldboot(d, 0);
220 closedir(d);
221 }
222}
223
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700224static int process_config(VolumeManager* vm, VoldConfigs* configs) {
Jeff Sharkey67b8c492017-09-21 17:08:43 -0600225 ATRACE_NAME("process_config");
226
Tom Cherry4c5bde22019-01-29 14:34:01 -0800227 if (!ReadDefaultFstab(&fstab_default)) {
Bowgo Tsaie8fb6c32017-03-09 23:11:33 +0800228 PLOG(ERROR) << "Failed to open default fstab";
San Mehatf1b736b2009-10-10 17:22:08 -0700229 return -1;
230 }
231
Ken Sumrall56ad03c2013-02-13 13:00:19 -0800232 /* Loop through entries looking for ones that vold manages */
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700233 configs->has_adoptable = false;
234 configs->has_quota = false;
235 configs->has_reserved = false;
236 configs->has_compress = false;
David Anderson0d71c4b2019-02-05 17:32:05 -0800237 for (auto& entry : fstab_default) {
Tom Cherry4c5bde22019-01-29 14:34:01 -0800238 if (entry.fs_mgr_flags.quota) {
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700239 configs->has_quota = true;
Jeff Sharkey95a92f92017-07-17 13:57:18 -0600240 }
Tom Cherry4c5bde22019-01-29 14:34:01 -0800241 if (entry.reserved_size > 0) {
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700242 configs->has_reserved = true;
Jeff Sharkey53d5d7c2018-01-08 10:43:00 -0700243 }
Jaegeuk Kimf64d30a2020-01-14 11:22:26 -0800244 if (entry.fs_mgr_flags.fs_compress) {
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700245 configs->has_compress = true;
Jaegeuk Kimf64d30a2020-01-14 11:22:26 -0800246 }
Jeff Sharkey95a92f92017-07-17 13:57:18 -0600247
David Anderson0d71c4b2019-02-05 17:32:05 -0800248 /* Make sure logical partitions have an updated blk_device. */
P.Adarsh Reddy167c2a62020-04-16 21:46:08 +0530249 if (entry.fs_mgr_flags.logical && !fs_mgr_update_logical_partition(&entry) &&
250 !entry.fs_mgr_flags.no_fail) {
David Anderson0d71c4b2019-02-05 17:32:05 -0800251 PLOG(FATAL) << "could not find logical partition " << entry.blk_device;
252 }
253
Eric Biggersf14f8622022-03-17 23:06:45 +0000254 if (entry.mount_point == "/data" && !entry.metadata_key_dir.empty()) {
David Anderson156d9d22021-09-21 17:21:57 -0700255 // Pre-populate userdata dm-devices since the uevents are asynchronous (b/198405417).
256 android::vold::defaultkey_precreate_dm_device();
257 }
258
Tom Cherry4c5bde22019-01-29 14:34:01 -0800259 if (entry.fs_mgr_flags.vold_managed) {
260 if (entry.fs_mgr_flags.nonremovable) {
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700261 LOG(WARNING) << "nonremovable no longer supported; ignoring volume";
262 continue;
San Mehata2677e42009-12-13 10:40:18 -0800263 }
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700264
Tom Cherry4c5bde22019-01-29 14:34:01 -0800265 std::string sysPattern(entry.blk_device);
266 std::string nickname(entry.label);
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700267 int flags = 0;
268
Tom Cherry4c5bde22019-01-29 14:34:01 -0800269 if (entry.is_encryptable()) {
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700270 flags |= android::vold::Disk::Flags::kAdoptable;
Jaegeuk Kimc52f6722020-04-06 15:58:41 -0700271 configs->has_adoptable = true;
San Mehatf1b736b2009-10-10 17:22:08 -0700272 }
Tom Cherry4c5bde22019-01-29 14:34:01 -0800273 if (entry.fs_mgr_flags.no_emulated_sd ||
Paul Crowley14c8c072018-09-18 13:30:21 -0700274 android::base::GetBoolProperty("vold.debug.default_primary", false)) {
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700275 flags |= android::vold::Disk::Flags::kDefaultPrimary;
Jeff Sharkeyba6ae8d2013-07-15 18:14:25 -0700276 }
Ken Sumrall29d8da82011-05-18 17:20:07 -0700277
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700278 vm->addDiskSource(std::shared_ptr<VolumeManager::DiskSource>(
Paul Crowley14c8c072018-09-18 13:30:21 -0700279 new VolumeManager::DiskSource(sysPattern, nickname, flags)));
San Mehatf1b736b2009-10-10 17:22:08 -0700280 }
281 }
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700282 return 0;
San Mehatf1b736b2009-10-10 17:22:08 -0700283}
David Anderson52de78e2021-11-05 19:26:56 -0700284
285static void VoldLogger(android::base::LogId log_buffer_id, android::base::LogSeverity severity,
286 const char* tag, const char* file, unsigned int line, const char* message) {
287 logd_logger(log_buffer_id, severity, tag, file, line, message);
288
289 if (severity >= android::base::ERROR) {
290 static bool is_data_mounted = false;
291
292 // When /data fails to mount, we don't have adb to get logcat. So until /data is
293 // mounted we log errors to the kernel. This allows us to get failures via serial logs
294 // and via last dmesg/"fastboot oem dmesg" on devices that support it.
295 //
296 // As a very quick-and-dirty test for /data, we check whether /data/misc/vold exists.
297 if (is_data_mounted || access("/data/misc/vold", F_OK) == 0) {
298 is_data_mounted = true;
299 return;
300 }
301 android::base::KernelLogger(log_buffer_id, severity, tag, file, line, message);
302 }
303}