VolumeManager.cpp revision 12f4b89046b54de1bdc188b7057ba77d7566e573
1/* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#include <stdio.h> 18#include <stdlib.h> 19#include <string.h> 20#include <errno.h> 21#include <fcntl.h> 22#include <sys/stat.h> 23#include <sys/types.h> 24#include <sys/mount.h> 25 26#include <linux/kdev_t.h> 27 28#define LOG_TAG "Vold" 29 30#include <cutils/log.h> 31 32#include <sysutils/NetlinkEvent.h> 33 34#include "VolumeManager.h" 35#include "DirectVolume.h" 36#include "ResponseCode.h" 37#include "Loop.h" 38#include "Fat.h" 39#include "Devmapper.h" 40#include "Process.h" 41 42VolumeManager *VolumeManager::sInstance = NULL; 43 44VolumeManager *VolumeManager::Instance() { 45 if (!sInstance) 46 sInstance = new VolumeManager(); 47 return sInstance; 48} 49 50VolumeManager::VolumeManager() { 51 mBlockDevices = new BlockDeviceCollection(); 52 mVolumes = new VolumeCollection(); 53 mActiveContainers = new AsecIdCollection(); 54 mBroadcaster = NULL; 55 mUsbMassStorageConnected = false; 56} 57 58VolumeManager::~VolumeManager() { 59 delete mBlockDevices; 60 delete mVolumes; 61 delete mActiveContainers; 62} 63 64int VolumeManager::start() { 65 return 0; 66} 67 68int VolumeManager::stop() { 69 return 0; 70} 71 72int VolumeManager::addVolume(Volume *v) { 73 mVolumes->push_back(v); 74 return 0; 75} 76 77void VolumeManager::notifyUmsConnected(bool connected) { 78 char msg[255]; 79 80 if (connected) { 81 mUsbMassStorageConnected = true; 82 } else { 83 mUsbMassStorageConnected = false; 84 } 85 snprintf(msg, sizeof(msg), "Share method ums now %s", 86 (connected ? "available" : "unavailable")); 87 88 getBroadcaster()->sendBroadcast(ResponseCode::ShareAvailabilityChange, 89 msg, false); 90} 91 92void VolumeManager::handleSwitchEvent(NetlinkEvent *evt) { 93 const char *devpath = evt->findParam("DEVPATH"); 94 const char *name = evt->findParam("SWITCH_NAME"); 95 const char *state = evt->findParam("SWITCH_STATE"); 96 97 if (!name || !state) { 98 LOGW("Switch %s event missing name/state info", devpath); 99 return; 100 } 101 102 if (!strcmp(name, "usb_mass_storage")) { 103 104 if (!strcmp(state, "online")) { 105 notifyUmsConnected(true); 106 } else { 107 notifyUmsConnected(false); 108 } 109 } else { 110 LOGW("Ignoring unknown switch '%s'", name); 111 } 112} 113 114void VolumeManager::handleBlockEvent(NetlinkEvent *evt) { 115 const char *devpath = evt->findParam("DEVPATH"); 116 117 /* Lookup a volume to handle this device */ 118 VolumeCollection::iterator it; 119 bool hit = false; 120 for (it = mVolumes->begin(); it != mVolumes->end(); ++it) { 121 if (!(*it)->handleBlockEvent(evt)) { 122#ifdef NETLINK_DEBUG 123 LOGD("Device '%s' event handled by volume %s\n", devpath, (*it)->getLabel()); 124#endif 125 hit = true; 126 break; 127 } 128 } 129 130 if (!hit) { 131#ifdef NETLINK_DEBUG 132 LOGW("No volumes handled block event for '%s'", devpath); 133#endif 134 } 135} 136 137int VolumeManager::listVolumes(SocketClient *cli) { 138 VolumeCollection::iterator i; 139 140 for (i = mVolumes->begin(); i != mVolumes->end(); ++i) { 141 char *buffer; 142 asprintf(&buffer, "%s %s %d", 143 (*i)->getLabel(), (*i)->getMountpoint(), 144 (*i)->getState()); 145 cli->sendMsg(ResponseCode::VolumeListResult, buffer, false); 146 free(buffer); 147 } 148 cli->sendMsg(ResponseCode::CommandOkay, "Volumes listed.", false); 149 return 0; 150} 151 152int VolumeManager::formatVolume(const char *label) { 153 Volume *v = lookupVolume(label); 154 155 if (!v) { 156 errno = ENOENT; 157 return -1; 158 } 159 160 return v->formatVol(); 161} 162 163int VolumeManager::getAsecMountPath(const char *id, char *buffer, int maxlen) { 164 165 snprintf(buffer, maxlen, "%s/%s", Volume::ASECDIR, id); 166 return 0; 167} 168 169int VolumeManager::createAsec(const char *id, unsigned int numSectors, 170 const char *fstype, const char *key, int ownerUid) { 171 172 if (numSectors < ((1024*1024)/512)) { 173 LOGE("Invalid container size specified (%d sectors)", numSectors); 174 errno = EINVAL; 175 return -1; 176 } 177 178 if (lookupVolume(id)) { 179 LOGE("ASEC id '%s' currently exists", id); 180 errno = EADDRINUSE; 181 return -1; 182 } 183 184 char asecFileName[255]; 185 snprintf(asecFileName, sizeof(asecFileName), "%s/%s.asec", Volume::SEC_ASECDIR, id); 186 187 if (!access(asecFileName, F_OK)) { 188 LOGE("ASEC file '%s' currently exists - destroy it first! (%s)", 189 asecFileName, strerror(errno)); 190 errno = EADDRINUSE; 191 return -1; 192 } 193 194 if (Loop::createImageFile(asecFileName, numSectors)) { 195 LOGE("ASEC image file creation failed (%s)", strerror(errno)); 196 return -1; 197 } 198 199 char loopDevice[255]; 200 if (Loop::create(asecFileName, loopDevice, sizeof(loopDevice))) { 201 LOGE("ASEC loop device creation failed (%s)", strerror(errno)); 202 unlink(asecFileName); 203 return -1; 204 } 205 206 char dmDevice[255]; 207 bool cleanupDm = false; 208 209 if (strcmp(key, "none")) { 210 if (Devmapper::create(id, loopDevice, key, numSectors, dmDevice, 211 sizeof(dmDevice))) { 212 LOGE("ASEC device mapping failed (%s)", strerror(errno)); 213 Loop::destroyByDevice(loopDevice); 214 unlink(asecFileName); 215 return -1; 216 } 217 cleanupDm = true; 218 } else { 219 strcpy(dmDevice, loopDevice); 220 } 221 222 if (Fat::format(dmDevice)) { 223 LOGE("ASEC FAT format failed (%s)", strerror(errno)); 224 if (cleanupDm) { 225 Devmapper::destroy(id); 226 } 227 Loop::destroyByDevice(loopDevice); 228 unlink(asecFileName); 229 return -1; 230 } 231 232 char mountPoint[255]; 233 234 snprintf(mountPoint, sizeof(mountPoint), "%s/%s", Volume::ASECDIR, id); 235 if (mkdir(mountPoint, 0777)) { 236 if (errno != EEXIST) { 237 LOGE("Mountpoint creation failed (%s)", strerror(errno)); 238 if (cleanupDm) { 239 Devmapper::destroy(id); 240 } 241 Loop::destroyByDevice(loopDevice); 242 unlink(asecFileName); 243 return -1; 244 } 245 } 246 247 if (Fat::doMount(dmDevice, mountPoint, false, false, ownerUid, 248 0, 0000, false)) { 249// 0, 0007, false)) { 250 LOGE("ASEC FAT mount failed (%s)", strerror(errno)); 251 if (cleanupDm) { 252 Devmapper::destroy(id); 253 } 254 Loop::destroyByDevice(loopDevice); 255 unlink(asecFileName); 256 return -1; 257 } 258 259 mActiveContainers->push_back(strdup(id)); 260 return 0; 261} 262 263int VolumeManager::finalizeAsec(const char *id) { 264 char asecFileName[255]; 265 char loopDevice[255]; 266 char mountPoint[255]; 267 268 snprintf(asecFileName, sizeof(asecFileName), "%s/%s.asec", Volume::SEC_ASECDIR, id); 269 270 if (Loop::lookupActive(asecFileName, loopDevice, sizeof(loopDevice))) { 271 LOGE("Unable to finalize %s (%s)", id, strerror(errno)); 272 return -1; 273 } 274 275 snprintf(mountPoint, sizeof(mountPoint), "%s/%s", Volume::ASECDIR, id); 276 // XXX: 277 if (Fat::doMount(loopDevice, mountPoint, true, true, 0, 0, 0227, false)) { 278 LOGE("ASEC finalize mount failed (%s)", strerror(errno)); 279 return -1; 280 } 281 282 LOGD("ASEC %s finalized", id); 283 return 0; 284} 285 286int VolumeManager::renameAsec(const char *id1, const char *id2) { 287 char *asecFilename1; 288 char *asecFilename2; 289 char mountPoint[255]; 290 291 asprintf(&asecFilename1, "%s/%s.asec", Volume::SEC_ASECDIR, id1); 292 asprintf(&asecFilename2, "%s/%s.asec", Volume::SEC_ASECDIR, id2); 293 294 snprintf(mountPoint, sizeof(mountPoint), "%s/%s", Volume::ASECDIR, id1); 295 if (isMountpointMounted(mountPoint)) { 296 LOGW("Rename attempt when src mounted"); 297 errno = EBUSY; 298 goto out_err; 299 } 300 301 snprintf(mountPoint, sizeof(mountPoint), "%s/%s", Volume::ASECDIR, id2); 302 if (isMountpointMounted(mountPoint)) { 303 LOGW("Rename attempt when dst mounted"); 304 errno = EBUSY; 305 goto out_err; 306 } 307 308 if (!access(asecFilename2, F_OK)) { 309 LOGE("Rename attempt when dst exists"); 310 errno = EADDRINUSE; 311 goto out_err; 312 } 313 314 if (rename(asecFilename1, asecFilename2)) { 315 LOGE("Rename of '%s' to '%s' failed (%s)", asecFilename1, asecFilename2, strerror(errno)); 316 goto out_err; 317 } 318 319 free(asecFilename1); 320 free(asecFilename2); 321 return 0; 322 323out_err: 324 free(asecFilename1); 325 free(asecFilename2); 326 return -1; 327} 328 329#define ASEC_UNMOUNT_RETRIES 5 330int VolumeManager::unmountAsec(const char *id, bool force) { 331 char asecFileName[255]; 332 char mountPoint[255]; 333 334 snprintf(asecFileName, sizeof(asecFileName), "%s/%s.asec", Volume::SEC_ASECDIR, id); 335 snprintf(mountPoint, sizeof(mountPoint), "%s/%s", Volume::ASECDIR, id); 336 337 if (!isMountpointMounted(mountPoint)) { 338 LOGE("Unmount request for ASEC %s when not mounted", id); 339 errno = EINVAL; 340 return -1; 341 } 342 343 int i, rc; 344 for (i = 1; i <= ASEC_UNMOUNT_RETRIES; i++) { 345 rc = umount(mountPoint); 346 if (!rc) { 347 break; 348 } 349 if (rc && (errno == EINVAL || errno == ENOENT)) { 350 LOGI("Secure container %s unmounted OK", id); 351 rc = 0; 352 break; 353 } 354 LOGW("ASEC %s unmount attempt %d failed (%s)", 355 id, i, strerror(errno)); 356 357 int action = 0; // default is to just complain 358 359 if (force) { 360 if (i > (ASEC_UNMOUNT_RETRIES - 2)) 361 action = 2; // SIGKILL 362 else if (i > (ASEC_UNMOUNT_RETRIES - 3)) 363 action = 1; // SIGHUP 364 } 365 366 Process::killProcessesWithOpenFiles(mountPoint, action); 367 usleep(1000 * 1000); 368 } 369 370 if (rc) { 371 errno = EBUSY; 372 LOGE("Failed to unmount container %s (%s)", id, strerror(errno)); 373 return -1; 374 } 375 376 int retries = 10; 377 378 while(retries--) { 379 if (!rmdir(mountPoint)) { 380 break; 381 } 382 383 LOGW("Failed to rmdir %s (%s)", mountPoint, strerror(errno)); 384 usleep(1000 * 1000); 385 } 386 387 if (!retries) { 388 LOGE("Timed out trying to rmdir %s (%s)", mountPoint, strerror(errno)); 389 } 390 391 if (Devmapper::destroy(id) && errno != ENXIO) { 392 LOGE("Failed to destroy devmapper instance (%s)", strerror(errno)); 393 } 394 395 char loopDevice[255]; 396 if (!Loop::lookupActive(asecFileName, loopDevice, sizeof(loopDevice))) { 397 Loop::destroyByDevice(loopDevice); 398 } 399 400 AsecIdCollection::iterator it; 401 for (it = mActiveContainers->begin(); it != mActiveContainers->end(); ++it) { 402 if (!strcmp(*it, id)) { 403 free(*it); 404 mActiveContainers->erase(it); 405 break; 406 } 407 } 408 if (it == mActiveContainers->end()) { 409 LOGW("mActiveContainers is inconsistent!"); 410 } 411 return 0; 412} 413 414int VolumeManager::destroyAsec(const char *id, bool force) { 415 char asecFileName[255]; 416 char mountPoint[255]; 417 418 snprintf(asecFileName, sizeof(asecFileName), "%s/%s.asec", Volume::SEC_ASECDIR, id); 419 420 if (isMountpointMounted(mountPoint)) { 421 LOGD("Unmounting container before destroy"); 422 if (unmountAsec(id, force)) { 423 LOGE("Failed to unmount asec %s for destroy (%s)", id, strerror(errno)); 424 return -1; 425 } 426 } 427 428 if (unlink(asecFileName)) { 429 LOGE("Failed to unlink asec '%s' (%s)", asecFileName, strerror(errno)); 430 return -1; 431 } 432 433 LOGD("ASEC %s destroyed", id); 434 return 0; 435} 436 437int VolumeManager::mountAsec(const char *id, const char *key, int ownerUid) { 438 char asecFileName[255]; 439 char mountPoint[255]; 440 441 snprintf(asecFileName, sizeof(asecFileName), "%s/%s.asec", Volume::SEC_ASECDIR, id); 442 snprintf(mountPoint, sizeof(mountPoint), "%s/%s", Volume::ASECDIR, id); 443 444 if (isMountpointMounted(mountPoint)) { 445 LOGE("ASEC %s already mounted", id); 446 errno = EBUSY; 447 return -1; 448 } 449 450 char loopDevice[255]; 451 if (Loop::lookupActive(asecFileName, loopDevice, sizeof(loopDevice))) { 452 if (Loop::create(asecFileName, loopDevice, sizeof(loopDevice))) { 453 LOGE("ASEC loop device creation failed (%s)", strerror(errno)); 454 return -1; 455 } 456 LOGD("New loop device created at %s", loopDevice); 457 } else { 458 LOGD("Found active loopback for %s at %s", asecFileName, loopDevice); 459 } 460 461 char dmDevice[255]; 462 bool cleanupDm = false; 463 if (strcmp(key, "none")) { 464 if (Devmapper::lookupActive(id, dmDevice, sizeof(dmDevice))) { 465 unsigned int nr_sec = 0; 466 int fd; 467 468 if ((fd = open(loopDevice, O_RDWR)) < 0) { 469 LOGE("Failed to open loopdevice (%s)", strerror(errno)); 470 Loop::destroyByDevice(loopDevice); 471 return -1; 472 } 473 474 if (ioctl(fd, BLKGETSIZE, &nr_sec)) { 475 LOGE("Failed to get loop size (%s)", strerror(errno)); 476 Loop::destroyByDevice(loopDevice); 477 close(fd); 478 return -1; 479 } 480 close(fd); 481 if (Devmapper::create(id, loopDevice, key, nr_sec, 482 dmDevice, sizeof(dmDevice))) { 483 LOGE("ASEC device mapping failed (%s)", strerror(errno)); 484 Loop::destroyByDevice(loopDevice); 485 return -1; 486 } 487 LOGD("New devmapper instance created at %s", dmDevice); 488 } else { 489 LOGD("Found active devmapper for %s at %s", asecFileName, dmDevice); 490 } 491 cleanupDm = true; 492 } else { 493 strcpy(dmDevice, loopDevice); 494 } 495 496 if (mkdir(mountPoint, 0777)) { 497 if (errno != EEXIST) { 498 LOGE("Mountpoint creation failed (%s)", strerror(errno)); 499 if (cleanupDm) { 500 Devmapper::destroy(id); 501 } 502 Loop::destroyByDevice(loopDevice); 503 return -1; 504 } 505 } 506 507 if (Fat::doMount(dmDevice, mountPoint, true, false, ownerUid, 0, 508 0222, false)) { 509// 0227, false)) { 510 LOGE("ASEC mount failed (%s)", strerror(errno)); 511 if (cleanupDm) { 512 Devmapper::destroy(id); 513 } 514 Loop::destroyByDevice(loopDevice); 515 return -1; 516 } 517 518 mActiveContainers->push_back(strdup(id)); 519 LOGD("ASEC %s mounted", id); 520 return 0; 521} 522 523int VolumeManager::mountVolume(const char *label) { 524 Volume *v = lookupVolume(label); 525 526 if (!v) { 527 errno = ENOENT; 528 return -1; 529 } 530 531 return v->mountVol(); 532} 533 534int VolumeManager::shareAvailable(const char *method, bool *avail) { 535 536 if (strcmp(method, "ums")) { 537 errno = ENOSYS; 538 return -1; 539 } 540 541 if (mUsbMassStorageConnected) 542 *avail = true; 543 else 544 *avail = false; 545 return 0; 546} 547 548int VolumeManager::shareEnabled(const char *label, const char *method, bool *enabled) { 549 Volume *v = lookupVolume(label); 550 551 if (!v) { 552 errno = ENOENT; 553 return -1; 554 } 555 556 if (strcmp(method, "ums")) { 557 errno = ENOSYS; 558 return -1; 559 } 560 561 if (v->getState() != Volume::State_Shared) { 562 *enabled = false; 563 } else { 564 *enabled = true; 565 } 566 return 0; 567} 568 569int VolumeManager::simulate(const char *cmd, const char *arg) { 570 571 if (!strcmp(cmd, "ums")) { 572 if (!strcmp(arg, "connect")) { 573 notifyUmsConnected(true); 574 } else if (!strcmp(arg, "disconnect")) { 575 notifyUmsConnected(false); 576 } else { 577 errno = EINVAL; 578 return -1; 579 } 580 } else { 581 errno = EINVAL; 582 return -1; 583 } 584 return 0; 585} 586 587int VolumeManager::shareVolume(const char *label, const char *method) { 588 Volume *v = lookupVolume(label); 589 590 if (!v) { 591 errno = ENOENT; 592 return -1; 593 } 594 595 /* 596 * Eventually, we'll want to support additional share back-ends, 597 * some of which may work while the media is mounted. For now, 598 * we just support UMS 599 */ 600 if (strcmp(method, "ums")) { 601 errno = ENOSYS; 602 return -1; 603 } 604 605 if (v->getState() == Volume::State_NoMedia) { 606 errno = ENODEV; 607 return -1; 608 } 609 610 if (v->getState() != Volume::State_Idle) { 611 // You need to unmount manually befoe sharing 612 errno = EBUSY; 613 return -1; 614 } 615 616 dev_t d = v->getDiskDevice(); 617 if ((MAJOR(d) == 0) && (MINOR(d) == 0)) { 618 // This volume does not support raw disk access 619 errno = EINVAL; 620 return -1; 621 } 622 623 int fd; 624 char nodepath[255]; 625 snprintf(nodepath, 626 sizeof(nodepath), "/dev/block/vold/%d:%d", 627 MAJOR(d), MINOR(d)); 628 629 if ((fd = open("/sys/devices/platform/usb_mass_storage/lun0/file", 630 O_WRONLY)) < 0) { 631 LOGE("Unable to open ums lunfile (%s)", strerror(errno)); 632 return -1; 633 } 634 635 if (write(fd, nodepath, strlen(nodepath)) < 0) { 636 LOGE("Unable to write to ums lunfile (%s)", strerror(errno)); 637 close(fd); 638 return -1; 639 } 640 641 close(fd); 642 v->handleVolumeShared(); 643 return 0; 644} 645 646int VolumeManager::unshareVolume(const char *label, const char *method) { 647 Volume *v = lookupVolume(label); 648 649 if (!v) { 650 errno = ENOENT; 651 return -1; 652 } 653 654 if (strcmp(method, "ums")) { 655 errno = ENOSYS; 656 return -1; 657 } 658 659 if (v->getState() != Volume::State_Shared) { 660 errno = EINVAL; 661 return -1; 662 } 663 664 dev_t d = v->getDiskDevice(); 665 666 int fd; 667 char nodepath[255]; 668 snprintf(nodepath, 669 sizeof(nodepath), "/dev/block/vold/%d:%d", 670 MAJOR(d), MINOR(d)); 671 672 if ((fd = open("/sys/devices/platform/usb_mass_storage/lun0/file", O_WRONLY)) < 0) { 673 LOGE("Unable to open ums lunfile (%s)", strerror(errno)); 674 return -1; 675 } 676 677 char ch = 0; 678 if (write(fd, &ch, 1) < 0) { 679 LOGE("Unable to write to ums lunfile (%s)", strerror(errno)); 680 close(fd); 681 return -1; 682 } 683 684 close(fd); 685 v->handleVolumeUnshared(); 686 return 0; 687} 688 689int VolumeManager::unmountVolume(const char *label, bool force) { 690 Volume *v = lookupVolume(label); 691 692 if (!v) { 693 errno = ENOENT; 694 return -1; 695 } 696 697 if (v->getState() == Volume::State_NoMedia) { 698 errno = ENODEV; 699 return -1; 700 } 701 702 if (v->getState() != Volume::State_Mounted) { 703 LOGW("Attempt to unmount volume which isn't mounted (%d)\n", 704 v->getState()); 705 errno = EBUSY; 706 return -1; 707 } 708 709 while(mActiveContainers->size()) { 710 AsecIdCollection::iterator it = mActiveContainers->begin(); 711 LOGI("Unmounting ASEC %s (dependant on %s)", *it, v->getMountpoint()); 712 if (unmountAsec(*it, force)) { 713 LOGE("Failed to unmount ASEC %s (%s)", *it, strerror(errno)); 714 return -1; 715 } 716 } 717 718 return v->unmountVol(force); 719} 720 721/* 722 * Looks up a volume by it's label or mount-point 723 */ 724Volume *VolumeManager::lookupVolume(const char *label) { 725 VolumeCollection::iterator i; 726 727 for (i = mVolumes->begin(); i != mVolumes->end(); ++i) { 728 if (label[0] == '/') { 729 if (!strcmp(label, (*i)->getMountpoint())) 730 return (*i); 731 } else { 732 if (!strcmp(label, (*i)->getLabel())) 733 return (*i); 734 } 735 } 736 return NULL; 737} 738 739bool VolumeManager::isMountpointMounted(const char *mp) 740{ 741 char device[256]; 742 char mount_path[256]; 743 char rest[256]; 744 FILE *fp; 745 char line[1024]; 746 747 if (!(fp = fopen("/proc/mounts", "r"))) { 748 LOGE("Error opening /proc/mounts (%s)", strerror(errno)); 749 return false; 750 } 751 752 while(fgets(line, sizeof(line), fp)) { 753 line[strlen(line)-1] = '\0'; 754 sscanf(line, "%255s %255s %255s\n", device, mount_path, rest); 755 if (!strcmp(mount_path, mp)) { 756 fclose(fp); 757 return true; 758 } 759 760 } 761 762 fclose(fp); 763 return false; 764} 765 766