blob: 52f6772bee8645d57c696a95ea3b9c21132c4b79 [file] [log] [blame]
Kenny Root344ca102012-04-03 17:23:01 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Kenny Root344ca102012-04-03 17:23:01 -070017#include <dirent.h>
18#include <errno.h>
19#include <fcntl.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070020#include <stdio.h>
21#include <stdlib.h>
22#include <string.h>
23#include <unistd.h>
Jeff Sharkey9c484982015-03-31 10:35:33 -070024#include <string>
Paul Crowley14c8c072018-09-18 13:30:21 -070025#include <vector>
Kenny Root344ca102012-04-03 17:23:01 -070026
Kenny Root344ca102012-04-03 17:23:01 -070027#include <sys/mman.h>
28#include <sys/mount.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070029#include <sys/stat.h>
30#include <sys/types.h>
Rom Lemarchand2ba45aa2013-01-16 12:29:28 -080031#include <sys/wait.h>
Kenny Root344ca102012-04-03 17:23:01 -070032
33#include <linux/kdev_t.h>
Kenny Root344ca102012-04-03 17:23:01 -070034
Elliott Hughes7e128fb2015-12-04 15:50:53 -080035#include <android-base/logging.h>
Jeff Sharkey95a92f92017-07-17 13:57:18 -060036#include <android-base/properties.h>
Elliott Hughes7e128fb2015-12-04 15:50:53 -080037#include <android-base/stringprintf.h>
Kenny Root344ca102012-04-03 17:23:01 -070038#include <cutils/properties.h>
Eric Biggersa701c452018-10-23 13:06:55 -070039#include <fscrypt/fscrypt.h>
Rom Lemarchand2ba45aa2013-01-16 12:29:28 -080040#include <logwrap/logwrap.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070041#include <selinux/selinux.h>
Rom Lemarchand2ba45aa2013-01-16 12:29:28 -080042
Kenny Root344ca102012-04-03 17:23:01 -070043#include "Ext4.h"
Eric Biggersa701c452018-10-23 13:06:55 -070044#include "FsCrypt.h"
Jeff Sharkey9c484982015-03-31 10:35:33 -070045#include "Utils.h"
Rom Lemarchand5593c852012-12-21 12:41:43 -080046#include "VoldUtil.h"
Kenny Root344ca102012-04-03 17:23:01 -070047
Jeff Sharkey9c484982015-03-31 10:35:33 -070048using android::base::StringPrintf;
49
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070050namespace android {
51namespace vold {
52namespace ext4 {
53
Jeff Sharkeyce6a9132015-04-08 21:07:21 -070054static const char* kResizefsPath = "/system/bin/resize2fs";
Adrien Schildknechte0f409c2016-11-21 15:14:37 -080055static const char* kMkfsPath = "/system/bin/mke2fs";
Jeff Sharkey9c484982015-03-31 10:35:33 -070056static const char* kFsckPath = "/system/bin/e2fsck";
Jeff Sharkey9c484982015-03-31 10:35:33 -070057
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070058bool IsSupported() {
Paul Crowley14c8c072018-09-18 13:30:21 -070059 return access(kMkfsPath, X_OK) == 0 && access(kFsckPath, X_OK) == 0 &&
60 IsFilesystemSupported("ext4");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070061}
62
Alexander Martinz72268882023-09-28 14:43:16 +020063status_t Check(const std::string& source, const std::string& target) {
Jeff Sharkey9c484982015-03-31 10:35:33 -070064 // The following is shamelessly borrowed from fs_mgr.c, so it should be
65 // kept in sync with any changes over there.
66
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070067 const char* c_source = source.c_str();
68 const char* c_target = target.c_str();
Jeff Sharkey9c484982015-03-31 10:35:33 -070069 int ret;
70 long tmpmnt_flags = MS_NOATIME | MS_NOEXEC | MS_NOSUID;
Paul Crowley14c8c072018-09-18 13:30:21 -070071 char* tmpmnt_opts = (char*)"nomblk_io_submit,errors=remount-ro";
Jeff Sharkey9c484982015-03-31 10:35:33 -070072
73 /*
74 * First try to mount and unmount the filesystem. We do this because
75 * the kernel is more efficient than e2fsck in running the journal and
76 * processing orphaned inodes, and on at least one device with a
77 * performance issue in the emmc firmware, it can take e2fsck 2.5 minutes
78 * to do what the kernel does in about a second.
79 *
80 * After mounting and unmounting the filesystem, run e2fsck, and if an
81 * error is recorded in the filesystem superblock, e2fsck will do a full
82 * check. Otherwise, it does nothing. If the kernel cannot mount the
83 * filesytsem due to an error, e2fsck is still run to do a full check
84 * fix the filesystem.
85 */
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070086 ret = mount(c_source, c_target, "ext4", tmpmnt_flags, tmpmnt_opts);
Jeff Sharkey9c484982015-03-31 10:35:33 -070087 if (!ret) {
88 int i;
89 for (i = 0; i < 5; i++) {
90 // Try to umount 5 times before continuing on.
91 // Should we try rebooting if all attempts fail?
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070092 int result = umount(c_target);
Jeff Sharkey9c484982015-03-31 10:35:33 -070093 if (result == 0) {
94 break;
95 }
Logan Chien188b0ab2018-04-23 13:37:39 +080096 LOG(WARNING) << __func__ << "(): umount(" << c_target << ")=" << result << ": "
97 << strerror(errno);
Jeff Sharkey9c484982015-03-31 10:35:33 -070098 sleep(1);
99 }
100 }
101
102 /*
103 * Some system images do not have e2fsck for licensing reasons
104 * (e.g. recent SDK system images). Detect these and skip the check.
105 */
106 if (access(kFsckPath, X_OK)) {
Logan Chien188b0ab2018-04-23 13:37:39 +0800107 LOG(DEBUG) << "Not running " << kFsckPath << " on " << c_source
108 << " (executable not in system image)";
Jeff Sharkey9c484982015-03-31 10:35:33 -0700109 } else {
Logan Chien188b0ab2018-04-23 13:37:39 +0800110 LOG(DEBUG) << "Running " << kFsckPath << " on " << c_source;
Jeff Sharkey9c484982015-03-31 10:35:33 -0700111
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700112 std::vector<std::string> cmd;
113 cmd.push_back(kFsckPath);
114 cmd.push_back("-y");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700115 cmd.push_back(c_source);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700116
Alexander Martinz72268882023-09-28 14:43:16 +0200117 // ext4 devices are currently always trusted
118 return ForkExecvp(cmd, nullptr, sFsckContext);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700119 }
120
121 return 0;
122}
123
Paul Crowley14c8c072018-09-18 13:30:21 -0700124status_t Mount(const std::string& source, const std::string& target, bool ro, bool remount,
Alexander Martinz72268882023-09-28 14:43:16 +0200125 bool executable) {
Kenny Root344ca102012-04-03 17:23:01 -0700126 int rc;
127 unsigned long flags;
128
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700129 const char* c_source = source.c_str();
130 const char* c_target = target.c_str();
131
Alexander Martinz72268882023-09-28 14:43:16 +0200132 flags = MS_NOATIME | MS_NODEV | MS_NOSUID | MS_DIRSYNC;
Kenny Root344ca102012-04-03 17:23:01 -0700133
134 flags |= (executable ? 0 : MS_NOEXEC);
135 flags |= (ro ? MS_RDONLY : 0);
136 flags |= (remount ? MS_REMOUNT : 0);
137
Alexander Martinz72268882023-09-28 14:43:16 +0200138 rc = mount(c_source, c_target, "ext4", flags, NULL);
Kenny Root344ca102012-04-03 17:23:01 -0700139
140 if (rc && errno == EROFS) {
Jeff Sharkey3472e522017-10-06 18:02:53 -0600141 LOG(ERROR) << source << " appears to be a read only filesystem - retrying mount RO";
Kenny Root344ca102012-04-03 17:23:01 -0700142 flags |= MS_RDONLY;
Alexander Martinz72268882023-09-28 14:43:16 +0200143 rc = mount(c_source, c_target, "ext4", flags, NULL);
Kenny Root344ca102012-04-03 17:23:01 -0700144 }
145
146 return rc;
147}
148
Mateusz Nowaka4f48d02015-08-03 18:06:39 +0200149status_t Resize(const std::string& source, unsigned long numSectors) {
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700150 std::vector<std::string> cmd;
151 cmd.push_back(kResizefsPath);
152 cmd.push_back("-f");
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700153 cmd.push_back(source);
Mateusz Nowaka4f48d02015-08-03 18:06:39 +0200154 cmd.push_back(StringPrintf("%lu", numSectors));
Daniel Rosenbergfcd34a02014-05-22 11:23:56 -0700155
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700156 return ForkExecvp(cmd);
Daniel Rosenbergfcd34a02014-05-22 11:23:56 -0700157}
158
Paul Crowley14c8c072018-09-18 13:30:21 -0700159status_t Format(const std::string& source, unsigned long numSectors, const std::string& target) {
Jeff Sharkey9c484982015-03-31 10:35:33 -0700160 std::vector<std::string> cmd;
161 cmd.push_back(kMkfsPath);
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800162
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800163 cmd.push_back("-b");
164 cmd.push_back("4096");
165
166 cmd.push_back("-t");
167 cmd.push_back("ext4");
168
169 cmd.push_back("-M");
170 cmd.push_back(target);
171
Martijn Coenen97ff0842020-04-15 11:42:47 +0200172 bool needs_casefold =
173 android::base::GetBoolProperty("external_storage.casefold.enabled", false);
Shikha Malhotraf7bc4952022-02-02 09:01:47 +0000174 bool needs_projid = true;
Daniel Rosenberg477f3e52019-11-19 20:30:46 -0800175
176 if (needs_projid) {
177 cmd.push_back("-I");
178 cmd.push_back("512");
179 }
180
Jeff Sharkey95a92f92017-07-17 13:57:18 -0600181 std::string options("has_journal");
182 if (android::base::GetBoolProperty("vold.has_quota", false)) {
183 options += ",quota";
184 }
Eric Biggersa701c452018-10-23 13:06:55 -0700185 if (fscrypt_is_native()) {
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600186 options += ",encrypt";
187 }
Daniel Rosenberg477f3e52019-11-19 20:30:46 -0800188 if (needs_casefold) {
189 options += ",casefold";
190 }
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600191
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800192 cmd.push_back("-O");
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600193 cmd.push_back(options);
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800194
Daniel Rosenberg477f3e52019-11-19 20:30:46 -0800195 if (needs_casefold || needs_projid) {
196 cmd.push_back("-E");
197 std::string extopts = "";
198 if (needs_casefold) extopts += "encoding=utf8,";
lin.gui3101ac02021-09-13 16:37:01 +0800199 if (needs_projid) extopts += "quotatype=usrquota:grpquota:prjquota,";
Daniel Rosenberg477f3e52019-11-19 20:30:46 -0800200 cmd.push_back(extopts);
201 }
202
Adrien Schildknechte0f409c2016-11-21 15:14:37 -0800203 cmd.push_back(source);
204
Daniel Rosenberg6a74dca2014-05-23 13:47:00 -0700205 if (numSectors) {
Jeff Sharkeyd7945262017-06-26 16:09:11 -0600206 cmd.push_back(StringPrintf("%lu", numSectors * (4096 / 512)));
Daniel Rosenberg6a74dca2014-05-23 13:47:00 -0700207 }
Jeff Sharkey9c484982015-03-31 10:35:33 -0700208
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700209 return ForkExecvp(cmd);
Kenny Root344ca102012-04-03 17:23:01 -0700210}
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700211
212} // namespace ext4
213} // namespace vold
214} // namespace android