1 /*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #define ATRACE_TAG ATRACE_TAG_PACKAGE_MANAGER
18
19 #include "FsCrypt.h"
20 #include "MetadataCrypt.h"
21 #include "NetlinkManager.h"
22 #include "VoldNativeService.h"
23 #include "VoldUtil.h"
24 #include "VolumeManager.h"
25 #include "model/Disk.h"
26 #include "sehandle.h"
27
28 #include <android-base/logging.h>
29 #include <android-base/properties.h>
30 #include <android-base/stringprintf.h>
31 #include <cutils/klog.h>
32 #include <hidl/HidlTransportSupport.h>
33 #include <utils/Trace.h>
34
35 #include <dirent.h>
36 #include <errno.h>
37 #include <fcntl.h>
38 #include <fs_mgr.h>
39 #include <getopt.h>
40 #include <stdio.h>
41 #include <stdlib.h>
42 #include <string.h>
43 #include <sys/stat.h>
44 #include <sys/types.h>
45
46 typedef struct vold_configs {
47 bool has_adoptable : 1;
48 bool has_quota : 1;
49 bool has_reserved : 1;
50 bool has_compress : 1;
51 } VoldConfigs;
52
53 static int process_config(VolumeManager* vm, VoldConfigs* configs);
54 static void coldboot(const char* path);
55 static void parse_args(int argc, char** argv);
56 static void VoldLogger(android::base::LogId log_buffer_id, android::base::LogSeverity severity,
57 const char* tag, const char* file, unsigned int line, const char* message);
58
59 struct selabel_handle* sehandle;
60 android::base::LogdLogger logd_logger(android::base::SYSTEM);
61
62 using android::base::StringPrintf;
63 using android::fs_mgr::ReadDefaultFstab;
64
main(int argc,char ** argv)65 int main(int argc, char** argv) {
66 atrace_set_tracing_enabled(false);
67 setenv("ANDROID_LOG_TAGS", "*:d", 1); // Do not submit with verbose logs enabled
68 android::base::InitLogging(argv, &VoldLogger);
69
70 LOG(INFO) << "Vold 3.0 (the awakening) firing up";
71
72 ATRACE_BEGIN("main");
73
74 LOG(DEBUG) << "Detected support for:"
75 << (android::vold::IsFilesystemSupported("ext4") ? " ext4" : "")
76 << (android::vold::IsFilesystemSupported("f2fs") ? " f2fs" : "")
77 << (android::vold::IsFilesystemSupported("vfat") ? " vfat" : "");
78
79 VolumeManager* vm;
80 NetlinkManager* nm;
81
82 parse_args(argc, argv);
83
84 sehandle = selinux_android_file_context_handle();
85 if (sehandle) {
86 selinux_android_set_sehandle(sehandle);
87 }
88
89 mkdir("/dev/block/vold", 0755);
90
91 /* For when cryptfs checks and mounts an encrypted filesystem */
92 klog_set_level(6);
93
94 /* Create our singleton managers */
95 if (!(vm = VolumeManager::Instance())) {
96 LOG(ERROR) << "Unable to create VolumeManager";
97 exit(1);
98 }
99
100 if (!(nm = NetlinkManager::Instance())) {
101 LOG(ERROR) << "Unable to create NetlinkManager";
102 exit(1);
103 }
104
105 if (android::base::GetBoolProperty("vold.debug", false)) {
106 vm->setDebug(true);
107 }
108
109 if (vm->start()) {
110 PLOG(ERROR) << "Unable to start VolumeManager";
111 exit(1);
112 }
113
114 VoldConfigs configs = {};
115 if (process_config(vm, &configs)) {
116 PLOG(ERROR) << "Error reading configuration... continuing anyways";
117 }
118
119 android::hardware::configureRpcThreadpool(1, false /* callerWillJoin */);
120
121 ATRACE_BEGIN("VoldNativeService::start");
122 if (android::vold::VoldNativeService::start() != android::OK) {
123 LOG(ERROR) << "Unable to start VoldNativeService";
124 exit(1);
125 }
126 ATRACE_END();
127
128 LOG(DEBUG) << "VoldNativeService::start() completed OK";
129
130 ATRACE_BEGIN("NetlinkManager::start");
131 if (nm->start()) {
132 PLOG(ERROR) << "Unable to start NetlinkManager";
133 exit(1);
134 }
135 ATRACE_END();
136
137 // This call should go after listeners are started to avoid
138 // a deadlock between vold and init (see b/34278978 for details)
139 android::base::SetProperty("vold.has_adoptable", configs.has_adoptable ? "1" : "0");
140 android::base::SetProperty("vold.has_quota", configs.has_quota ? "1" : "0");
141 android::base::SetProperty("vold.has_reserved", configs.has_reserved ? "1" : "0");
142 android::base::SetProperty("vold.has_compress", configs.has_compress ? "1" : "0");
143
144 // Do coldboot here so it won't block booting,
145 // also the cold boot is needed in case we have flash drive
146 // connected before Vold launched
147 coldboot("/sys/block");
148
149 ATRACE_END();
150
151 android::IPCThreadState::self()->joinThreadPool();
152 LOG(INFO) << "vold shutting down";
153
154 exit(0);
155 }
156
parse_args(int argc,char ** argv)157 static void parse_args(int argc, char** argv) {
158 static struct option opts[] = {
159 {"blkid_context", required_argument, 0, 'b'},
160 {"blkid_untrusted_context", required_argument, 0, 'B'},
161 {"fsck_context", required_argument, 0, 'f'},
162 {"fsck_untrusted_context", required_argument, 0, 'F'},
163 {nullptr, 0, nullptr, 0},
164 };
165
166 int c;
167 while ((c = getopt_long(argc, argv, "", opts, nullptr)) != -1) {
168 switch (c) {
169 // clang-format off
170 case 'b': android::vold::sBlkidContext = optarg; break;
171 case 'B': android::vold::sBlkidUntrustedContext = optarg; break;
172 case 'f': android::vold::sFsckContext = optarg; break;
173 case 'F': android::vold::sFsckUntrustedContext = optarg; break;
174 // clang-format on
175 }
176 }
177
178 CHECK(android::vold::sBlkidContext != nullptr);
179 CHECK(android::vold::sBlkidUntrustedContext != nullptr);
180 CHECK(android::vold::sFsckContext != nullptr);
181 CHECK(android::vold::sFsckUntrustedContext != nullptr);
182 }
183
do_coldboot(DIR * d,int lvl)184 static void do_coldboot(DIR* d, int lvl) {
185 struct dirent* de;
186 int dfd, fd;
187
188 dfd = dirfd(d);
189
190 fd = openat(dfd, "uevent", O_WRONLY | O_CLOEXEC);
191 if (fd >= 0) {
192 write(fd, "add\n", 4);
193 close(fd);
194 }
195
196 while ((de = readdir(d))) {
197 DIR* d2;
198
199 if (de->d_name[0] == '.') continue;
200
201 if (de->d_type != DT_DIR && lvl > 0) continue;
202
203 fd = openat(dfd, de->d_name, O_RDONLY | O_DIRECTORY | O_CLOEXEC);
204 if (fd < 0) continue;
205
206 d2 = fdopendir(fd);
207 if (d2 == 0)
208 close(fd);
209 else {
210 do_coldboot(d2, lvl + 1);
211 closedir(d2);
212 }
213 }
214 }
215
coldboot(const char * path)216 static void coldboot(const char* path) {
217 ATRACE_NAME("coldboot");
218 DIR* d = opendir(path);
219 if (d) {
220 do_coldboot(d, 0);
221 closedir(d);
222 }
223 }
224
process_config(VolumeManager * vm,VoldConfigs * configs)225 static int process_config(VolumeManager* vm, VoldConfigs* configs) {
226 ATRACE_NAME("process_config");
227
228 if (!ReadDefaultFstab(&fstab_default)) {
229 PLOG(ERROR) << "Failed to open default fstab";
230 return -1;
231 }
232
233 /* Loop through entries looking for ones that vold manages */
234 configs->has_adoptable = false;
235 configs->has_quota = false;
236 configs->has_reserved = false;
237 configs->has_compress = false;
238 for (auto& entry : fstab_default) {
239 if (entry.fs_mgr_flags.quota) {
240 configs->has_quota = true;
241 }
242 if (entry.reserved_size > 0) {
243 configs->has_reserved = true;
244 }
245 if (entry.fs_mgr_flags.fs_compress) {
246 configs->has_compress = true;
247 }
248
249 /* Make sure logical partitions have an updated blk_device. */
250 if (entry.fs_mgr_flags.logical && !fs_mgr_update_logical_partition(&entry) &&
251 !entry.fs_mgr_flags.no_fail) {
252 PLOG(FATAL) << "could not find logical partition " << entry.blk_device;
253 }
254
255 if (entry.mount_point == "/data" && !entry.metadata_key_dir.empty()) {
256 // Pre-populate userdata dm-devices since the uevents are asynchronous (b/198405417).
257 android::vold::defaultkey_precreate_dm_device();
258 }
259
260 if (entry.fs_mgr_flags.vold_managed) {
261 if (entry.fs_mgr_flags.nonremovable) {
262 LOG(WARNING) << "nonremovable no longer supported; ignoring volume";
263 continue;
264 }
265
266 std::string sysPattern(entry.blk_device);
267 std::string nickname(entry.label);
268 int flags = 0;
269
270 if (entry.is_encryptable()) {
271 flags |= android::vold::Disk::Flags::kAdoptable;
272 configs->has_adoptable = true;
273 }
274 if (entry.fs_mgr_flags.no_emulated_sd ||
275 android::base::GetBoolProperty("vold.debug.default_primary", false)) {
276 flags |= android::vold::Disk::Flags::kDefaultPrimary;
277 }
278
279 vm->addDiskSource(std::shared_ptr<VolumeManager::DiskSource>(
280 new VolumeManager::DiskSource(sysPattern, nickname, flags)));
281 }
282 }
283 return 0;
284 }
285
VoldLogger(android::base::LogId log_buffer_id,android::base::LogSeverity severity,const char * tag,const char * file,unsigned int line,const char * message)286 static void VoldLogger(android::base::LogId log_buffer_id, android::base::LogSeverity severity,
287 const char* tag, const char* file, unsigned int line, const char* message) {
288 logd_logger(log_buffer_id, severity, tag, file, line, message);
289
290 if (severity >= android::base::WARNING) {
291 static bool early_boot_done = false;
292
293 // If metadata encryption setup (fscrypt_mount_metadata_encrypted) or
294 // basic FBE setup (fscrypt_init_user0) fails, then the boot will fail
295 // before adb can be started, so logcat won't be available. To allow
296 // debugging these early boot failures, log early errors and warnings to
297 // the kernel log. This allows diagnosing failures via the serial log,
298 // or via last dmesg/"fastboot oem dmesg" on devices that support it.
299 //
300 // As a very quick-and-dirty test for whether /data has been mounted,
301 // check whether /data/misc/vold exists.
302 if (!early_boot_done) {
303 if (access("/data/misc/vold", F_OK) == 0 && fscrypt_init_user0_done) {
304 early_boot_done = true;
305 return;
306 }
307 android::base::KernelLogger(log_buffer_id, severity, tag, file, line, message);
308 }
309 }
310 }
311