CommandListener.cpp revision 6947904a76b69a1db20a3ddd30c0bcd281922fde
1/* 2 * Copyright (C) 2008 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#include <stdlib.h> 18#include <sys/socket.h> 19#include <sys/types.h> 20#include <netinet/in.h> 21#include <arpa/inet.h> 22#include <dirent.h> 23#include <errno.h> 24#include <fcntl.h> 25#include <string.h> 26 27#define LOG_TAG "VoldCmdListener" 28#include <cutils/log.h> 29 30#include <sysutils/SocketClient.h> 31#include <private/android_filesystem_config.h> 32 33#include "CommandListener.h" 34#include "VolumeManager.h" 35#include "ResponseCode.h" 36#include "Process.h" 37#include "Xwarp.h" 38#include "Loop.h" 39#include "Devmapper.h" 40#include "cryptfs.h" 41 42CommandListener::CommandListener() : 43 FrameworkListener("vold", true) { 44 registerCmd(new DumpCmd()); 45 registerCmd(new VolumeCmd()); 46 registerCmd(new AsecCmd()); 47 registerCmd(new ObbCmd()); 48 registerCmd(new StorageCmd()); 49 registerCmd(new XwarpCmd()); 50 registerCmd(new CryptfsCmd()); 51} 52 53void CommandListener::dumpArgs(int argc, char **argv, int argObscure) { 54 char buffer[4096]; 55 char *p = buffer; 56 57 memset(buffer, 0, sizeof(buffer)); 58 int i; 59 for (i = 0; i < argc; i++) { 60 unsigned int len = strlen(argv[i]) + 1; // Account for space 61 if (i == argObscure) { 62 len += 2; // Account for {} 63 } 64 if (((p - buffer) + len) < (sizeof(buffer)-1)) { 65 if (i == argObscure) { 66 *p++ = '{'; 67 *p++ = '}'; 68 *p++ = ' '; 69 continue; 70 } 71 strcpy(p, argv[i]); 72 p+= strlen(argv[i]); 73 if (i != (argc -1)) { 74 *p++ = ' '; 75 } 76 } 77 } 78 SLOGD("%s", buffer); 79} 80 81CommandListener::DumpCmd::DumpCmd() : 82 VoldCommand("dump") { 83} 84 85int CommandListener::DumpCmd::runCommand(SocketClient *cli, 86 int argc, char **argv) { 87 cli->sendMsg(0, "Dumping loop status", false); 88 if (Loop::dumpState(cli)) { 89 cli->sendMsg(ResponseCode::CommandOkay, "Loop dump failed", true); 90 } 91 cli->sendMsg(0, "Dumping DM status", false); 92 if (Devmapper::dumpState(cli)) { 93 cli->sendMsg(ResponseCode::CommandOkay, "Devmapper dump failed", true); 94 } 95 cli->sendMsg(0, "Dumping mounted filesystems", false); 96 FILE *fp = fopen("/proc/mounts", "r"); 97 if (fp) { 98 char line[1024]; 99 while (fgets(line, sizeof(line), fp)) { 100 line[strlen(line)-1] = '\0'; 101 cli->sendMsg(0, line, false);; 102 } 103 fclose(fp); 104 } 105 106 cli->sendMsg(ResponseCode::CommandOkay, "dump complete", false); 107 return 0; 108} 109 110 111CommandListener::VolumeCmd::VolumeCmd() : 112 VoldCommand("volume") { 113} 114 115int CommandListener::VolumeCmd::runCommand(SocketClient *cli, 116 int argc, char **argv) { 117 dumpArgs(argc, argv, -1); 118 119 if (argc < 2) { 120 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false); 121 return 0; 122 } 123 124 VolumeManager *vm = VolumeManager::Instance(); 125 int rc = 0; 126 127 if (!strcmp(argv[1], "list")) { 128 return vm->listVolumes(cli); 129 } else if (!strcmp(argv[1], "debug")) { 130 if (argc != 3 || (argc == 3 && (strcmp(argv[2], "off") && strcmp(argv[2], "on")))) { 131 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: volume debug <off/on>", false); 132 return 0; 133 } 134 vm->setDebug(!strcmp(argv[2], "on") ? true : false); 135 } else if (!strcmp(argv[1], "mount")) { 136 if (argc != 3) { 137 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: volume mount <path>", false); 138 return 0; 139 } 140 rc = vm->mountVolume(argv[2]); 141 } else if (!strcmp(argv[1], "unmount")) { 142 if (argc < 3 || argc > 4 || 143 ((argc == 4 && strcmp(argv[3], "force")) && 144 (argc == 4 && strcmp(argv[3], "force_and_revert")))) { 145 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: volume unmount <path> [force|force_and_revert]", false); 146 return 0; 147 } 148 149 bool force = false; 150 bool revert = false; 151 if (argc >= 4 && !strcmp(argv[3], "force")) { 152 force = true; 153 } else if (argc >= 4 && !strcmp(argv[3], "force_and_revert")) { 154 force = true; 155 revert = true; 156 } 157 rc = vm->unmountVolume(argv[2], force, revert); 158 } else if (!strcmp(argv[1], "format")) { 159 if (argc != 3) { 160 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: volume format <path>", false); 161 return 0; 162 } 163 rc = vm->formatVolume(argv[2]); 164 } else if (!strcmp(argv[1], "share")) { 165 if (argc != 4) { 166 cli->sendMsg(ResponseCode::CommandSyntaxError, 167 "Usage: volume share <path> <method>", false); 168 return 0; 169 } 170 rc = vm->shareVolume(argv[2], argv[3]); 171 } else if (!strcmp(argv[1], "unshare")) { 172 if (argc != 4) { 173 cli->sendMsg(ResponseCode::CommandSyntaxError, 174 "Usage: volume unshare <path> <method>", false); 175 return 0; 176 } 177 rc = vm->unshareVolume(argv[2], argv[3]); 178 } else if (!strcmp(argv[1], "shared")) { 179 bool enabled = false; 180 if (argc != 4) { 181 cli->sendMsg(ResponseCode::CommandSyntaxError, 182 "Usage: volume shared <path> <method>", false); 183 return 0; 184 } 185 186 if (vm->shareEnabled(argv[2], argv[3], &enabled)) { 187 cli->sendMsg( 188 ResponseCode::OperationFailed, "Failed to determine share enable state", true); 189 } else { 190 cli->sendMsg(ResponseCode::ShareEnabledResult, 191 (enabled ? "Share enabled" : "Share disabled"), false); 192 } 193 return 0; 194 } else { 195 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume cmd", false); 196 } 197 198 if (!rc) { 199 cli->sendMsg(ResponseCode::CommandOkay, "volume operation succeeded", false); 200 } else { 201 int erno = errno; 202 rc = ResponseCode::convertFromErrno(); 203 cli->sendMsg(rc, "volume operation failed", true); 204 } 205 206 return 0; 207} 208 209CommandListener::StorageCmd::StorageCmd() : 210 VoldCommand("storage") { 211} 212 213int CommandListener::StorageCmd::runCommand(SocketClient *cli, 214 int argc, char **argv) { 215 dumpArgs(argc, argv, -1); 216 217 if (argc < 2) { 218 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false); 219 return 0; 220 } 221 222 if (!strcmp(argv[1], "users")) { 223 DIR *dir; 224 struct dirent *de; 225 226 if (!(dir = opendir("/proc"))) { 227 cli->sendMsg(ResponseCode::OperationFailed, "Failed to open /proc", true); 228 return 0; 229 } 230 231 while ((de = readdir(dir))) { 232 int pid = Process::getPid(de->d_name); 233 234 if (pid < 0) { 235 continue; 236 } 237 238 char processName[255]; 239 Process::getProcessName(pid, processName, sizeof(processName)); 240 241 if (Process::checkFileDescriptorSymLinks(pid, argv[2]) || 242 Process::checkFileMaps(pid, argv[2]) || 243 Process::checkSymLink(pid, argv[2], "cwd") || 244 Process::checkSymLink(pid, argv[2], "root") || 245 Process::checkSymLink(pid, argv[2], "exe")) { 246 247 char msg[1024]; 248 snprintf(msg, sizeof(msg), "%d %s", pid, processName); 249 cli->sendMsg(ResponseCode::StorageUsersListResult, msg, false); 250 } 251 } 252 closedir(dir); 253 cli->sendMsg(ResponseCode::CommandOkay, "Storage user list complete", false); 254 } else { 255 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown storage cmd", false); 256 } 257 return 0; 258} 259 260CommandListener::AsecCmd::AsecCmd() : 261 VoldCommand("asec") { 262} 263 264void CommandListener::AsecCmd::listAsecsInDirectory(SocketClient *cli, const char *directory) { 265 DIR *d = opendir(directory); 266 267 if (!d) { 268 cli->sendMsg(ResponseCode::OperationFailed, "Failed to open asec dir", true); 269 return; 270 } 271 272 size_t dirent_len = offsetof(struct dirent, d_name) + 273 pathconf(directory, _PC_NAME_MAX) + 1; 274 275 struct dirent *dent = (struct dirent *) malloc(dirent_len); 276 if (dent == NULL) { 277 cli->sendMsg(ResponseCode::OperationFailed, "Failed to allocate memory", true); 278 return; 279 } 280 281 struct dirent *result; 282 283 while (!readdir_r(d, dent, &result) && result != NULL) { 284 if (dent->d_name[0] == '.') 285 continue; 286 if (dent->d_type != DT_REG) 287 continue; 288 size_t name_len = strlen(dent->d_name); 289 if (name_len > 5 && name_len < 260 && 290 !strcmp(&dent->d_name[name_len - 5], ".asec")) { 291 char id[255]; 292 memset(id, 0, sizeof(id)); 293 strlcpy(id, dent->d_name, name_len - 4); 294 cli->sendMsg(ResponseCode::AsecListResult, id, false); 295 } 296 } 297 closedir(d); 298 299 free(dent); 300} 301 302int CommandListener::AsecCmd::runCommand(SocketClient *cli, 303 int argc, char **argv) { 304 if (argc < 2) { 305 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false); 306 return 0; 307 } 308 309 VolumeManager *vm = VolumeManager::Instance(); 310 int rc = 0; 311 312 if (!strcmp(argv[1], "list")) { 313 dumpArgs(argc, argv, -1); 314 315 listAsecsInDirectory(cli, Volume::SEC_ASECDIR_EXT); 316 listAsecsInDirectory(cli, Volume::SEC_ASECDIR_INT); 317 } else if (!strcmp(argv[1], "create")) { 318 dumpArgs(argc, argv, 5); 319 if (argc != 8) { 320 cli->sendMsg(ResponseCode::CommandSyntaxError, 321 "Usage: asec create <container-id> <size_mb> <fstype> <key> <ownerUid> " 322 "<isExternal>", false); 323 return 0; 324 } 325 326 unsigned int numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512; 327 const bool isExternal = (atoi(argv[7]) == 1); 328 rc = vm->createAsec(argv[2], numSectors, argv[4], argv[5], atoi(argv[6]), isExternal); 329 } else if (!strcmp(argv[1], "finalize")) { 330 dumpArgs(argc, argv, -1); 331 if (argc != 3) { 332 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec finalize <container-id>", false); 333 return 0; 334 } 335 rc = vm->finalizeAsec(argv[2]); 336 } else if (!strcmp(argv[1], "fixperms")) { 337 dumpArgs(argc, argv, -1); 338 if (argc != 5) { 339 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false); 340 return 0; 341 } 342 343 char *endptr; 344 gid_t gid = (gid_t) strtoul(argv[3], &endptr, 10); 345 if (*endptr != '\0') { 346 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false); 347 return 0; 348 } 349 350 rc = vm->fixupAsecPermissions(argv[2], gid, argv[4]); 351 } else if (!strcmp(argv[1], "destroy")) { 352 dumpArgs(argc, argv, -1); 353 if (argc < 3) { 354 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec destroy <container-id> [force]", false); 355 return 0; 356 } 357 bool force = false; 358 if (argc > 3 && !strcmp(argv[3], "force")) { 359 force = true; 360 } 361 rc = vm->destroyAsec(argv[2], force); 362 } else if (!strcmp(argv[1], "mount")) { 363 dumpArgs(argc, argv, 3); 364 if (argc != 5) { 365 cli->sendMsg(ResponseCode::CommandSyntaxError, 366 "Usage: asec mount <namespace-id> <key> <ownerUid>", false); 367 return 0; 368 } 369 rc = vm->mountAsec(argv[2], argv[3], atoi(argv[4])); 370 } else if (!strcmp(argv[1], "unmount")) { 371 dumpArgs(argc, argv, -1); 372 if (argc < 3) { 373 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec unmount <container-id> [force]", false); 374 return 0; 375 } 376 bool force = false; 377 if (argc > 3 && !strcmp(argv[3], "force")) { 378 force = true; 379 } 380 rc = vm->unmountAsec(argv[2], force); 381 } else if (!strcmp(argv[1], "rename")) { 382 dumpArgs(argc, argv, -1); 383 if (argc != 4) { 384 cli->sendMsg(ResponseCode::CommandSyntaxError, 385 "Usage: asec rename <old_id> <new_id>", false); 386 return 0; 387 } 388 rc = vm->renameAsec(argv[2], argv[3]); 389 } else if (!strcmp(argv[1], "path")) { 390 dumpArgs(argc, argv, -1); 391 if (argc != 3) { 392 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec path <container-id>", false); 393 return 0; 394 } 395 char path[255]; 396 397 if (!(rc = vm->getAsecMountPath(argv[2], path, sizeof(path)))) { 398 cli->sendMsg(ResponseCode::AsecPathResult, path, false); 399 return 0; 400 } 401 } else if (!strcmp(argv[1], "fspath")) { 402 dumpArgs(argc, argv, -1); 403 if (argc != 3) { 404 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fspath <container-id>", false); 405 return 0; 406 } 407 char path[255]; 408 409 if (!(rc = vm->getAsecFilesystemPath(argv[2], path, sizeof(path)))) { 410 cli->sendMsg(ResponseCode::AsecPathResult, path, false); 411 return 0; 412 } 413 } else { 414 dumpArgs(argc, argv, -1); 415 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown asec cmd", false); 416 } 417 418 if (!rc) { 419 cli->sendMsg(ResponseCode::CommandOkay, "asec operation succeeded", false); 420 } else { 421 rc = ResponseCode::convertFromErrno(); 422 cli->sendMsg(rc, "asec operation failed", true); 423 } 424 425 return 0; 426} 427 428CommandListener::ObbCmd::ObbCmd() : 429 VoldCommand("obb") { 430} 431 432int CommandListener::ObbCmd::runCommand(SocketClient *cli, 433 int argc, char **argv) { 434 if (argc < 2) { 435 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false); 436 return 0; 437 } 438 439 VolumeManager *vm = VolumeManager::Instance(); 440 int rc = 0; 441 442 if (!strcmp(argv[1], "list")) { 443 dumpArgs(argc, argv, -1); 444 445 rc = vm->listMountedObbs(cli); 446 } else if (!strcmp(argv[1], "mount")) { 447 dumpArgs(argc, argv, 3); 448 if (argc != 5) { 449 cli->sendMsg(ResponseCode::CommandSyntaxError, 450 "Usage: obb mount <filename> <key> <ownerGid>", false); 451 return 0; 452 } 453 rc = vm->mountObb(argv[2], argv[3], atoi(argv[4])); 454 } else if (!strcmp(argv[1], "unmount")) { 455 dumpArgs(argc, argv, -1); 456 if (argc < 3) { 457 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb unmount <source file> [force]", false); 458 return 0; 459 } 460 bool force = false; 461 if (argc > 3 && !strcmp(argv[3], "force")) { 462 force = true; 463 } 464 rc = vm->unmountObb(argv[2], force); 465 } else if (!strcmp(argv[1], "path")) { 466 dumpArgs(argc, argv, -1); 467 if (argc != 3) { 468 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb path <source file>", false); 469 return 0; 470 } 471 char path[255]; 472 473 if (!(rc = vm->getObbMountPath(argv[2], path, sizeof(path)))) { 474 cli->sendMsg(ResponseCode::AsecPathResult, path, false); 475 return 0; 476 } 477 } else { 478 dumpArgs(argc, argv, -1); 479 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown obb cmd", false); 480 } 481 482 if (!rc) { 483 cli->sendMsg(ResponseCode::CommandOkay, "obb operation succeeded", false); 484 } else { 485 rc = ResponseCode::convertFromErrno(); 486 cli->sendMsg(rc, "obb operation failed", true); 487 } 488 489 return 0; 490} 491 492CommandListener::XwarpCmd::XwarpCmd() : 493 VoldCommand("xwarp") { 494} 495 496int CommandListener::XwarpCmd::runCommand(SocketClient *cli, 497 int argc, char **argv) { 498 if (argc < 2) { 499 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false); 500 return 0; 501 } 502 503 if (!strcmp(argv[1], "enable")) { 504 if (Xwarp::enable()) { 505 cli->sendMsg(ResponseCode::OperationFailed, "Failed to enable xwarp", true); 506 return 0; 507 } 508 509 cli->sendMsg(ResponseCode::CommandOkay, "Xwarp mirroring started", false); 510 } else if (!strcmp(argv[1], "disable")) { 511 if (Xwarp::disable()) { 512 cli->sendMsg(ResponseCode::OperationFailed, "Failed to disable xwarp", true); 513 return 0; 514 } 515 516 cli->sendMsg(ResponseCode::CommandOkay, "Xwarp disabled", false); 517 } else if (!strcmp(argv[1], "status")) { 518 char msg[255]; 519 bool r; 520 unsigned mirrorPos, maxSize; 521 522 if (Xwarp::status(&r, &mirrorPos, &maxSize)) { 523 cli->sendMsg(ResponseCode::OperationFailed, "Failed to get xwarp status", true); 524 return 0; 525 } 526 snprintf(msg, sizeof(msg), "%s %u %u", (r ? "ready" : "not-ready"), mirrorPos, maxSize); 527 cli->sendMsg(ResponseCode::XwarpStatusResult, msg, false); 528 } else { 529 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown storage cmd", false); 530 } 531 532 return 0; 533} 534 535CommandListener::CryptfsCmd::CryptfsCmd() : 536 VoldCommand("cryptfs") { 537} 538 539int CommandListener::CryptfsCmd::runCommand(SocketClient *cli, 540 int argc, char **argv) { 541 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) { 542 cli->sendMsg(ResponseCode::CommandNoPermission, "No permission to run cryptfs commands", false); 543 return 0; 544 } 545 546 if (argc < 2) { 547 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false); 548 return 0; 549 } 550 551 int rc = 0; 552 553 if (!strcmp(argv[1], "checkpw")) { 554 if (argc != 3) { 555 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs checkpw <passwd>", false); 556 return 0; 557 } 558 dumpArgs(argc, argv, 2); 559 rc = cryptfs_check_passwd(argv[2]); 560 } else if (!strcmp(argv[1], "restart")) { 561 if (argc != 2) { 562 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs restart", false); 563 return 0; 564 } 565 dumpArgs(argc, argv, -1); 566 rc = cryptfs_restart(); 567 } else if (!strcmp(argv[1], "cryptocomplete")) { 568 if (argc != 2) { 569 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs cryptocomplete", false); 570 return 0; 571 } 572 dumpArgs(argc, argv, -1); 573 rc = cryptfs_crypto_complete(); 574 } else if (!strcmp(argv[1], "enablecrypto")) { 575 if ( (argc != 4) || (strcmp(argv[2], "wipe") && strcmp(argv[2], "inplace")) ) { 576 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs enablecrypto <wipe|inplace> <passwd>", false); 577 return 0; 578 } 579 dumpArgs(argc, argv, 3); 580 rc = cryptfs_enable(argv[2], argv[3]); 581 } else if (!strcmp(argv[1], "changepw")) { 582 if (argc != 3) { 583 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs changepw <newpasswd>", false); 584 return 0; 585 } 586 SLOGD("cryptfs changepw {}"); 587 rc = cryptfs_changepw(argv[2]); 588 } else if (!strcmp(argv[1], "verifypw")) { 589 if (argc != 3) { 590 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs verifypw <passwd>", false); 591 return 0; 592 } 593 SLOGD("cryptfs verifypw {}"); 594 rc = cryptfs_verify_passwd(argv[2]); 595 } else { 596 dumpArgs(argc, argv, -1); 597 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown cryptfs cmd", false); 598 } 599 600 // Always report that the command succeeded and return the error code. 601 // The caller will check the return value to see what the error was. 602 char msg[255]; 603 snprintf(msg, sizeof(msg), "%d", rc); 604 cli->sendMsg(ResponseCode::CommandOkay, msg, false); 605 606 return 0; 607} 608