VolumeManager.cpp revision 8b8f71b1d760411279f3b07a5c97709f052c689e
1/* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#include <stdio.h> 18#include <stdlib.h> 19#include <string.h> 20#include <errno.h> 21#include <fcntl.h> 22#include <sys/stat.h> 23#include <sys/types.h> 24#include <sys/mount.h> 25 26#include <linux/kdev_t.h> 27 28#define LOG_TAG "Vold" 29 30#include <cutils/log.h> 31 32#include <sysutils/NetlinkEvent.h> 33 34#include "VolumeManager.h" 35#include "DirectVolume.h" 36#include "ResponseCode.h" 37#include "Loop.h" 38#include "Fat.h" 39#include "Devmapper.h" 40 41extern "C" void KillProcessesWithOpenFiles(const char *, int, int, int); 42 43VolumeManager *VolumeManager::sInstance = NULL; 44 45VolumeManager *VolumeManager::Instance() { 46 if (!sInstance) 47 sInstance = new VolumeManager(); 48 return sInstance; 49} 50 51VolumeManager::VolumeManager() { 52 mBlockDevices = new BlockDeviceCollection(); 53 mVolumes = new VolumeCollection(); 54 mBroadcaster = NULL; 55 mUsbMassStorageConnected = false; 56} 57 58VolumeManager::~VolumeManager() { 59 delete mBlockDevices; 60} 61 62int VolumeManager::start() { 63 return 0; 64} 65 66int VolumeManager::stop() { 67 return 0; 68} 69 70int VolumeManager::addVolume(Volume *v) { 71 mVolumes->push_back(v); 72 return 0; 73} 74 75void VolumeManager::notifyUmsConnected(bool connected) { 76 char msg[255]; 77 78 if (connected) { 79 mUsbMassStorageConnected = true; 80 } else { 81 mUsbMassStorageConnected = false; 82 } 83 snprintf(msg, sizeof(msg), "Share method ums now %s", 84 (connected ? "available" : "unavailable")); 85 86 getBroadcaster()->sendBroadcast(ResponseCode::ShareAvailabilityChange, 87 msg, false); 88} 89 90void VolumeManager::handleSwitchEvent(NetlinkEvent *evt) { 91 const char *devpath = evt->findParam("DEVPATH"); 92 const char *name = evt->findParam("SWITCH_NAME"); 93 const char *state = evt->findParam("SWITCH_STATE"); 94 95 if (!name || !state) { 96 LOGW("Switch %s event missing name/state info", devpath); 97 return; 98 } 99 100 if (!strcmp(name, "usb_mass_storage")) { 101 102 if (!strcmp(state, "online")) { 103 notifyUmsConnected(true); 104 } else { 105 notifyUmsConnected(false); 106 } 107 } else { 108 LOGW("Ignoring unknown switch '%s'", name); 109 } 110} 111 112void VolumeManager::handleBlockEvent(NetlinkEvent *evt) { 113 const char *devpath = evt->findParam("DEVPATH"); 114 115 /* Lookup a volume to handle this device */ 116 VolumeCollection::iterator it; 117 bool hit = false; 118 for (it = mVolumes->begin(); it != mVolumes->end(); ++it) { 119 if (!(*it)->handleBlockEvent(evt)) { 120#ifdef NETLINK_DEBUG 121 LOGD("Device '%s' event handled by volume %s\n", devpath, (*it)->getLabel()); 122#endif 123 hit = true; 124 break; 125 } 126 } 127 128 if (!hit) { 129#ifdef NETLINK_DEBUG 130 LOGW("No volumes handled block event for '%s'", devpath); 131#endif 132 } 133} 134 135int VolumeManager::listVolumes(SocketClient *cli) { 136 VolumeCollection::iterator i; 137 138 for (i = mVolumes->begin(); i != mVolumes->end(); ++i) { 139 char *buffer; 140 asprintf(&buffer, "%s %s %d", 141 (*i)->getLabel(), (*i)->getMountpoint(), 142 (*i)->getState()); 143 cli->sendMsg(ResponseCode::VolumeListResult, buffer, false); 144 free(buffer); 145 } 146 cli->sendMsg(ResponseCode::CommandOkay, "Volumes listed.", false); 147 return 0; 148} 149 150int VolumeManager::formatVolume(const char *label) { 151 Volume *v = lookupVolume(label); 152 153 if (!v) { 154 errno = ENOENT; 155 return -1; 156 } 157 158 return v->formatVol(); 159} 160 161int VolumeManager::getAsecMountPath(const char *id, char *buffer, int maxlen) { 162 char mountPoint[255]; 163 164 snprintf(mountPoint, sizeof(mountPoint), "/asec/%s", id); 165 166 if (!isMountpointMounted(mountPoint)) { 167 errno = ENOENT; 168 return -1; 169 } 170 snprintf(buffer, maxlen, "/asec/%s", id); 171 return 0; 172} 173 174int VolumeManager::createAsec(const char *id, unsigned int numSectors, 175 const char *fstype, const char *key, int ownerUid) { 176 177 mkdir("/sdcard/android_secure", 0777); 178 179 if (lookupVolume(id)) { 180 LOGE("ASEC volume '%s' currently exists", id); 181 errno = EADDRINUSE; 182 return -1; 183 } 184 185 char asecFileName[255]; 186 snprintf(asecFileName, sizeof(asecFileName), 187 "/sdcard/android_secure/%s.asec", id); 188 189 if (!access(asecFileName, F_OK)) { 190 LOGE("ASEC file '%s' currently exists - destroy it first! (%s)", 191 asecFileName, strerror(errno)); 192 errno = EADDRINUSE; 193 return -1; 194 } 195 196 if (Loop::createImageFile(asecFileName, numSectors)) { 197 LOGE("ASEC image file creation failed (%s)", strerror(errno)); 198 return -1; 199 } 200 201 char loopDevice[255]; 202 if (Loop::create(asecFileName, loopDevice, sizeof(loopDevice))) { 203 LOGE("ASEC loop device creation failed (%s)", strerror(errno)); 204 unlink(asecFileName); 205 return -1; 206 } 207 208 char dmDevice[255]; 209 bool cleanupDm = false; 210 211 if (strcmp(key, "none")) { 212 if (Devmapper::create(id, loopDevice, key, numSectors, dmDevice, 213 sizeof(dmDevice))) { 214 LOGE("ASEC device mapping failed (%s)", strerror(errno)); 215 Loop::destroyByDevice(loopDevice); 216 unlink(asecFileName); 217 return -1; 218 } 219 cleanupDm = true; 220 } else { 221 strcpy(dmDevice, loopDevice); 222 } 223 224 if (Fat::format(dmDevice)) { 225 LOGE("ASEC FAT format failed (%s)", strerror(errno)); 226 if (cleanupDm) { 227 Devmapper::destroy(id); 228 } 229 Loop::destroyByDevice(loopDevice); 230 unlink(asecFileName); 231 return -1; 232 } 233 234 char mountPoint[255]; 235 236 snprintf(mountPoint, sizeof(mountPoint), "/asec/%s", id); 237 if (mkdir(mountPoint, 0777)) { 238 if (errno != EEXIST) { 239 LOGE("Mountpoint creation failed (%s)", strerror(errno)); 240 if (cleanupDm) { 241 Devmapper::destroy(id); 242 } 243 Loop::destroyByDevice(loopDevice); 244 unlink(asecFileName); 245 return -1; 246 } 247 } 248 249 if (Fat::doMount(dmDevice, mountPoint, false, false, ownerUid, 250 0, 0000, false)) { 251// 0, 0007, false)) { 252 LOGE("ASEC FAT mount failed (%s)", strerror(errno)); 253 if (cleanupDm) { 254 Devmapper::destroy(id); 255 } 256 Loop::destroyByDevice(loopDevice); 257 unlink(asecFileName); 258 return -1; 259 } 260 261 return 0; 262} 263 264int VolumeManager::finalizeAsec(const char *id) { 265 char asecFileName[255]; 266 char loopDevice[255]; 267 char mountPoint[255]; 268 269 snprintf(asecFileName, sizeof(asecFileName), 270 "/sdcard/android_secure/%s.asec", id); 271 272 if (Loop::lookupActive(asecFileName, loopDevice, sizeof(loopDevice))) { 273 LOGE("Unable to finalize %s (%s)", id, strerror(errno)); 274 return -1; 275 } 276 277 snprintf(mountPoint, sizeof(mountPoint), "/asec/%s", id); 278 // XXX: 279 if (Fat::doMount(loopDevice, mountPoint, true, true, 0, 0, 0227, false)) { 280 LOGE("ASEC finalize mount failed (%s)", strerror(errno)); 281 return -1; 282 } 283 284 LOGD("ASEC %s finalized", id); 285 return 0; 286} 287 288int VolumeManager::unmountAsec(const char *id) { 289 char asecFileName[255]; 290 char mountPoint[255]; 291 292 snprintf(asecFileName, sizeof(asecFileName), 293 "/sdcard/android_secure/%s.asec", id); 294 snprintf(mountPoint, sizeof(mountPoint), "/asec/%s", id); 295 296 if (isMountpointMounted(mountPoint)) { 297 LOGE("Unmount request for ASEC %s when not mounted", id); 298 errno = EINVAL; 299 return -1; 300 } 301 302 int i, rc; 303 for (i = 0; i < 10; i++) { 304 rc = umount(mountPoint); 305 if (!rc) { 306 break; 307 } 308 if (rc && (errno == EINVAL || errno == ENOENT)) { 309 rc = 0; 310 break; 311 } 312 LOGW("ASEC %s unmount attempt %d failed (%s)", 313 id, i +1, strerror(errno)); 314 315 if (i >= 5) { 316 KillProcessesWithOpenFiles(mountPoint, (i < 7 ? 0 : 1), 317 NULL, 0); 318 } 319 usleep(1000 * 250); 320 } 321 322 if (rc) { 323 LOGE("Failed to unmount ASEC %s", id); 324 return -1; 325 } 326 327 if (Devmapper::destroy(id) && errno != ENXIO) { 328 LOGE("Failed to destroy devmapper instance (%s)", strerror(errno)); 329 } 330 331 char loopDevice[255]; 332 if (!Loop::lookupActive(asecFileName, loopDevice, sizeof(loopDevice))) { 333 Loop::destroyByDevice(loopDevice); 334 } 335 return 0; 336} 337 338int VolumeManager::destroyAsec(const char *id) { 339 char asecFileName[255]; 340 char mountPoint[255]; 341 342 snprintf(asecFileName, sizeof(asecFileName), 343 "/sdcard/android_secure/%s.asec", id); 344 snprintf(mountPoint, sizeof(mountPoint), "/asec/%s", id); 345 346 if (unmountAsec(id)) 347 return -1; 348 349 unlink(asecFileName); 350 351 LOGD("ASEC %s destroyed", id); 352 return 0; 353} 354 355int VolumeManager::mountAsec(const char *id, const char *key, int ownerUid) { 356 char asecFileName[255]; 357 char mountPoint[255]; 358 359 snprintf(asecFileName, sizeof(asecFileName), 360 "/sdcard/android_secure/%s.asec", id); 361 snprintf(mountPoint, sizeof(mountPoint), "/asec/%s", id); 362 363 if (isMountpointMounted(mountPoint)) { 364 LOGE("ASEC %s already mounted", id); 365 errno = EBUSY; 366 return -1; 367 } 368 369 char loopDevice[255]; 370 if (Loop::lookupActive(asecFileName, loopDevice, sizeof(loopDevice))) { 371 if (Loop::create(asecFileName, loopDevice, sizeof(loopDevice))) { 372 LOGE("ASEC loop device creation failed (%s)", strerror(errno)); 373 return -1; 374 } 375 LOGD("New loop device created at %s", loopDevice); 376 } else { 377 LOGD("Found active loopback for %s at %s", asecFileName, loopDevice); 378 } 379 380 char dmDevice[255]; 381 bool cleanupDm = false; 382 if (strcmp(key, "none")) { 383 if (Devmapper::lookupActive(id, dmDevice, sizeof(dmDevice))) { 384 unsigned int nr_sec = 0; 385 int fd; 386 387 if ((fd = open(loopDevice, O_RDWR)) < 0) { 388 LOGE("Failed to open loopdevice (%s)", strerror(errno)); 389 Loop::destroyByDevice(loopDevice); 390 return -1; 391 } 392 393 if (ioctl(fd, BLKGETSIZE, &nr_sec)) { 394 LOGE("Failed to get loop size (%s)", strerror(errno)); 395 Loop::destroyByDevice(loopDevice); 396 close(fd); 397 return -1; 398 } 399 close(fd); 400 if (Devmapper::create(id, loopDevice, key, nr_sec, 401 dmDevice, sizeof(dmDevice))) { 402 LOGE("ASEC device mapping failed (%s)", strerror(errno)); 403 Loop::destroyByDevice(loopDevice); 404 return -1; 405 } 406 LOGD("New devmapper instance created at %s", dmDevice); 407 } else { 408 LOGD("Found active devmapper for %s at %s", asecFileName, dmDevice); 409 } 410 cleanupDm = true; 411 } else { 412 strcpy(dmDevice, loopDevice); 413 } 414 415 if (mkdir(mountPoint, 0777)) { 416 if (errno != EEXIST) { 417 LOGE("Mountpoint creation failed (%s)", strerror(errno)); 418 if (cleanupDm) { 419 Devmapper::destroy(id); 420 } 421 Loop::destroyByDevice(loopDevice); 422 return -1; 423 } 424 } 425 426 if (Fat::doMount(dmDevice, mountPoint, true, false, ownerUid, 0, 427 0222, false)) { 428// 0227, false)) { 429 LOGE("ASEC mount failed (%s)", strerror(errno)); 430 if (cleanupDm) { 431 Devmapper::destroy(id); 432 } 433 Loop::destroyByDevice(loopDevice); 434 return -1; 435 } 436 437 LOGD("ASEC %s mounted", id); 438 return 0; 439} 440 441int VolumeManager::mountVolume(const char *label) { 442 Volume *v = lookupVolume(label); 443 444 if (!v) { 445 errno = ENOENT; 446 return -1; 447 } 448 449 return v->mountVol(); 450} 451 452int VolumeManager::shareAvailable(const char *method, bool *avail) { 453 454 if (strcmp(method, "ums")) { 455 errno = ENOSYS; 456 return -1; 457 } 458 459 if (mUsbMassStorageConnected) 460 *avail = true; 461 else 462 *avail = false; 463 return 0; 464} 465 466int VolumeManager::simulate(const char *cmd, const char *arg) { 467 468 if (!strcmp(cmd, "ums")) { 469 if (!strcmp(arg, "connect")) { 470 notifyUmsConnected(true); 471 } else if (!strcmp(arg, "disconnect")) { 472 notifyUmsConnected(false); 473 } else { 474 errno = EINVAL; 475 return -1; 476 } 477 } else { 478 errno = EINVAL; 479 return -1; 480 } 481 return 0; 482} 483 484int VolumeManager::shareVolume(const char *label, const char *method) { 485 Volume *v = lookupVolume(label); 486 487 if (!v) { 488 errno = ENOENT; 489 return -1; 490 } 491 492 /* 493 * Eventually, we'll want to support additional share back-ends, 494 * some of which may work while the media is mounted. For now, 495 * we just support UMS 496 */ 497 if (strcmp(method, "ums")) { 498 errno = ENOSYS; 499 return -1; 500 } 501 502 if (v->getState() == Volume::State_NoMedia) { 503 errno = ENODEV; 504 return -1; 505 } 506 507 if (v->getState() != Volume::State_Idle) { 508 // You need to unmount manually befoe sharing 509 errno = EBUSY; 510 return -1; 511 } 512 513 dev_t d = v->getDiskDevice(); 514 if ((MAJOR(d) == 0) && (MINOR(d) == 0)) { 515 // This volume does not support raw disk access 516 errno = EINVAL; 517 return -1; 518 } 519 520 int fd; 521 char nodepath[255]; 522 snprintf(nodepath, 523 sizeof(nodepath), "/dev/block/vold/%d:%d", 524 MAJOR(d), MINOR(d)); 525 526 if ((fd = open("/sys/devices/platform/usb_mass_storage/lun0/file", 527 O_WRONLY)) < 0) { 528 LOGE("Unable to open ums lunfile (%s)", strerror(errno)); 529 return -1; 530 } 531 532 if (write(fd, nodepath, strlen(nodepath)) < 0) { 533 LOGE("Unable to write to ums lunfile (%s)", strerror(errno)); 534 close(fd); 535 return -1; 536 } 537 538 close(fd); 539 v->handleVolumeShared(); 540 return 0; 541} 542 543int VolumeManager::unshareVolume(const char *label, const char *method) { 544 Volume *v = lookupVolume(label); 545 546 if (!v) { 547 errno = ENOENT; 548 return -1; 549 } 550 551 if (strcmp(method, "ums")) { 552 errno = ENOSYS; 553 return -1; 554 } 555 556 if (v->getState() != Volume::State_Shared) { 557 errno = EINVAL; 558 return -1; 559 } 560 561 dev_t d = v->getDiskDevice(); 562 563 int fd; 564 char nodepath[255]; 565 snprintf(nodepath, 566 sizeof(nodepath), "/dev/block/vold/%d:%d", 567 MAJOR(d), MINOR(d)); 568 569 if ((fd = open("/sys/devices/platform/usb_mass_storage/lun0/file", O_WRONLY)) < 0) { 570 LOGE("Unable to open ums lunfile (%s)", strerror(errno)); 571 return -1; 572 } 573 574 char ch = 0; 575 if (write(fd, &ch, 1) < 0) { 576 LOGE("Unable to write to ums lunfile (%s)", strerror(errno)); 577 close(fd); 578 return -1; 579 } 580 581 close(fd); 582 v->handleVolumeUnshared(); 583 return 0; 584} 585 586int VolumeManager::unmountVolume(const char *label) { 587 Volume *v = lookupVolume(label); 588 589 if (!v) { 590 errno = ENOENT; 591 return -1; 592 } 593 594 if (v->getState() == Volume::State_NoMedia) { 595 errno = ENODEV; 596 return -1; 597 } 598 599 if (v->getState() != Volume::State_Mounted) { 600 LOGW("Attempt to unmount volume which isn't mounted (%d)\n", 601 v->getState()); 602 errno = EBUSY; 603 return -1; 604 } 605 606 return v->unmountVol(); 607} 608 609/* 610 * Looks up a volume by it's label or mount-point 611 */ 612Volume *VolumeManager::lookupVolume(const char *label) { 613 VolumeCollection::iterator i; 614 615 for (i = mVolumes->begin(); i != mVolumes->end(); ++i) { 616 if (label[0] == '/') { 617 if (!strcmp(label, (*i)->getMountpoint())) 618 return (*i); 619 } else { 620 if (!strcmp(label, (*i)->getLabel())) 621 return (*i); 622 } 623 } 624 return NULL; 625} 626 627bool VolumeManager::isMountpointMounted(const char *mp) 628{ 629 char device[256]; 630 char mount_path[256]; 631 char rest[256]; 632 FILE *fp; 633 char line[1024]; 634 635 if (!(fp = fopen("/proc/mounts", "r"))) { 636 LOGE("Error opening /proc/mounts (%s)", strerror(errno)); 637 return false; 638 } 639 640 while(fgets(line, sizeof(line), fp)) { 641 line[strlen(line)-1] = '\0'; 642 sscanf(line, "%255s %255s %255s\n", device, mount_path, rest); 643 if (!strcmp(mount_path, mp)) { 644 fclose(fp); 645 return true; 646 } 647 648 } 649 650 fclose(fp); 651 return false; 652} 653 654