• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2008 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <stdlib.h>
18 #include <sys/mount.h>
19 #include <sys/socket.h>
20 #include <sys/stat.h>
21 #include <sys/types.h>
22 #include <sys/wait.h>
23 #include <netinet/in.h>
24 #include <arpa/inet.h>
25 #include <dirent.h>
26 #include <errno.h>
27 #include <fcntl.h>
28 #include <fs_mgr.h>
29 #include <stdio.h>
30 #include <string.h>
31 #include <stdint.h>
32 #include <inttypes.h>
33 #include <ctype.h>
34 
35 #define LOG_TAG "VoldCmdListener"
36 
37 #include <android-base/logging.h>
38 #include <android-base/stringprintf.h>
39 #include <cutils/fs.h>
40 
41 #include <sysutils/SocketClient.h>
42 #include <private/android_filesystem_config.h>
43 
44 #include "CommandListener.h"
45 #include "VolumeManager.h"
46 #include "VolumeBase.h"
47 #include "ResponseCode.h"
48 #include "Process.h"
49 #include "Loop.h"
50 #include "Devmapper.h"
51 #include "MoveTask.h"
52 #include "TrimTask.h"
53 
54 #define DUMP_ARGS 0
55 #define DEBUG_APPFUSE 0
56 
CommandListener()57 CommandListener::CommandListener() :
58                  FrameworkListener("vold", true) {
59     registerCmd(new DumpCmd());
60     registerCmd(new VolumeCmd());
61     registerCmd(new AsecCmd());
62     registerCmd(new ObbCmd());
63     registerCmd(new StorageCmd());
64     registerCmd(new FstrimCmd());
65     registerCmd(new AppFuseCmd());
66 }
67 
68 #if DUMP_ARGS
dumpArgs(int argc,char ** argv,int argObscure)69 void CommandListener::dumpArgs(int argc, char **argv, int argObscure) {
70     char buffer[4096];
71     char *p = buffer;
72 
73     memset(buffer, 0, sizeof(buffer));
74     int i;
75     for (i = 0; i < argc; i++) {
76         unsigned int len = strlen(argv[i]) + 1; // Account for space
77         if (i == argObscure) {
78             len += 2; // Account for {}
79         }
80         if (((p - buffer) + len) < (sizeof(buffer)-1)) {
81             if (i == argObscure) {
82                 *p++ = '{';
83                 *p++ = '}';
84                 *p++ = ' ';
85                 continue;
86             }
87             strcpy(p, argv[i]);
88             p+= strlen(argv[i]);
89             if (i != (argc -1)) {
90                 *p++ = ' ';
91             }
92         }
93     }
94     SLOGD("%s", buffer);
95 }
96 #else
dumpArgs(int,char **,int)97 void CommandListener::dumpArgs(int /*argc*/, char ** /*argv*/, int /*argObscure*/) { }
98 #endif
99 
sendGenericOkFail(SocketClient * cli,int cond)100 int CommandListener::sendGenericOkFail(SocketClient *cli, int cond) {
101     if (!cond) {
102         return cli->sendMsg(ResponseCode::CommandOkay, "Command succeeded", false);
103     } else {
104         return cli->sendMsg(ResponseCode::OperationFailed, "Command failed", false);
105     }
106 }
107 
DumpCmd()108 CommandListener::DumpCmd::DumpCmd() :
109                  VoldCommand("dump") {
110 }
111 
runCommand(SocketClient * cli,int,char **)112 int CommandListener::DumpCmd::runCommand(SocketClient *cli,
113                                          int /*argc*/, char ** /*argv*/) {
114     cli->sendMsg(0, "Dumping loop status", false);
115     if (Loop::dumpState(cli)) {
116         cli->sendMsg(ResponseCode::CommandOkay, "Loop dump failed", true);
117     }
118     cli->sendMsg(0, "Dumping DM status", false);
119     if (Devmapper::dumpState(cli)) {
120         cli->sendMsg(ResponseCode::CommandOkay, "Devmapper dump failed", true);
121     }
122     cli->sendMsg(0, "Dumping mounted filesystems", false);
123     FILE *fp = fopen("/proc/mounts", "r");
124     if (fp) {
125         char line[1024];
126         while (fgets(line, sizeof(line), fp)) {
127             line[strlen(line)-1] = '\0';
128             cli->sendMsg(0, line, false);;
129         }
130         fclose(fp);
131     }
132 
133     cli->sendMsg(ResponseCode::CommandOkay, "dump complete", false);
134     return 0;
135 }
136 
VolumeCmd()137 CommandListener::VolumeCmd::VolumeCmd() :
138                  VoldCommand("volume") {
139 }
140 
runCommand(SocketClient * cli,int argc,char ** argv)141 int CommandListener::VolumeCmd::runCommand(SocketClient *cli,
142                                            int argc, char **argv) {
143     dumpArgs(argc, argv, -1);
144 
145     if (argc < 2) {
146         cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
147         return 0;
148     }
149 
150     VolumeManager *vm = VolumeManager::Instance();
151     std::lock_guard<std::mutex> lock(vm->getLock());
152 
153     // TODO: tease out methods not directly related to volumes
154 
155     std::string cmd(argv[1]);
156     if (cmd == "reset") {
157         return sendGenericOkFail(cli, vm->reset());
158 
159     } else if (cmd == "shutdown") {
160         return sendGenericOkFail(cli, vm->shutdown());
161 
162     } else if (cmd == "debug") {
163         return sendGenericOkFail(cli, vm->setDebug(true));
164 
165     } else if (cmd == "partition" && argc > 3) {
166         // partition [diskId] [public|private|mixed] [ratio]
167         std::string id(argv[2]);
168         auto disk = vm->findDisk(id);
169         if (disk == nullptr) {
170             return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown disk", false);
171         }
172 
173         std::string type(argv[3]);
174         if (type == "public") {
175             return sendGenericOkFail(cli, disk->partitionPublic());
176         } else if (type == "private") {
177             return sendGenericOkFail(cli, disk->partitionPrivate());
178         } else if (type == "mixed") {
179             if (argc < 4) {
180                 return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
181             }
182             int frac = atoi(argv[4]);
183             return sendGenericOkFail(cli, disk->partitionMixed(frac));
184         } else {
185             return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
186         }
187 
188     } else if (cmd == "mkdirs" && argc > 2) {
189         // mkdirs [path]
190         return sendGenericOkFail(cli, vm->mkdirs(argv[2]));
191 
192     } else if (cmd == "user_added" && argc > 3) {
193         // user_added [user] [serial]
194         return sendGenericOkFail(cli, vm->onUserAdded(atoi(argv[2]), atoi(argv[3])));
195 
196     } else if (cmd == "user_removed" && argc > 2) {
197         // user_removed [user]
198         return sendGenericOkFail(cli, vm->onUserRemoved(atoi(argv[2])));
199 
200     } else if (cmd == "user_started" && argc > 2) {
201         // user_started [user]
202         return sendGenericOkFail(cli, vm->onUserStarted(atoi(argv[2])));
203 
204     } else if (cmd == "user_stopped" && argc > 2) {
205         // user_stopped [user]
206         return sendGenericOkFail(cli, vm->onUserStopped(atoi(argv[2])));
207 
208     } else if (cmd == "mount" && argc > 2) {
209         // mount [volId] [flags] [user]
210         std::string id(argv[2]);
211         auto vol = vm->findVolume(id);
212         if (vol == nullptr) {
213             return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
214         }
215 
216         int mountFlags = (argc > 3) ? atoi(argv[3]) : 0;
217         userid_t mountUserId = (argc > 4) ? atoi(argv[4]) : -1;
218 
219         vol->setMountFlags(mountFlags);
220         vol->setMountUserId(mountUserId);
221 
222         int res = vol->mount();
223         if (mountFlags & android::vold::VolumeBase::MountFlags::kPrimary) {
224             vm->setPrimary(vol);
225         }
226         return sendGenericOkFail(cli, res);
227 
228     } else if (cmd == "unmount" && argc > 2) {
229         // unmount [volId]
230         std::string id(argv[2]);
231         auto vol = vm->findVolume(id);
232         if (vol == nullptr) {
233             return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
234         }
235 
236         return sendGenericOkFail(cli, vol->unmount());
237 
238     } else if (cmd == "format" && argc > 3) {
239         // format [volId] [fsType|auto]
240         std::string id(argv[2]);
241         std::string fsType(argv[3]);
242         auto vol = vm->findVolume(id);
243         if (vol == nullptr) {
244             return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
245         }
246 
247         return sendGenericOkFail(cli, vol->format(fsType));
248 
249     } else if (cmd == "move_storage" && argc > 3) {
250         // move_storage [fromVolId] [toVolId]
251         auto fromVol = vm->findVolume(std::string(argv[2]));
252         auto toVol = vm->findVolume(std::string(argv[3]));
253         if (fromVol == nullptr || toVol == nullptr) {
254             return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
255         }
256 
257         (new android::vold::MoveTask(fromVol, toVol))->start();
258         return sendGenericOkFail(cli, 0);
259 
260     } else if (cmd == "benchmark" && argc > 2) {
261         // benchmark [volId]
262         std::string id(argv[2]);
263         nsecs_t res = vm->benchmarkPrivate(id);
264         return cli->sendMsg(ResponseCode::CommandOkay,
265                 android::base::StringPrintf("%" PRId64, res).c_str(), false);
266 
267     } else if (cmd == "forget_partition" && argc > 2) {
268         // forget_partition [partGuid]
269         std::string partGuid(argv[2]);
270         return sendGenericOkFail(cli, vm->forgetPartition(partGuid));
271 
272     } else if (cmd == "remount_uid" && argc > 3) {
273         // remount_uid [uid] [none|default|read|write]
274         uid_t uid = atoi(argv[2]);
275         std::string mode(argv[3]);
276         return sendGenericOkFail(cli, vm->remountUid(uid, mode));
277     }
278 
279     return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
280 }
281 
StorageCmd()282 CommandListener::StorageCmd::StorageCmd() :
283                  VoldCommand("storage") {
284 }
285 
runCommand(SocketClient * cli,int argc,char ** argv)286 int CommandListener::StorageCmd::runCommand(SocketClient *cli,
287                                                       int argc, char **argv) {
288     /* Guarantied to be initialized by vold's main() before the CommandListener is active */
289     extern struct fstab *fstab;
290 
291     dumpArgs(argc, argv, -1);
292 
293     if (argc < 2) {
294         cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
295         return 0;
296     }
297 
298     if (!strcmp(argv[1], "mountall")) {
299         if (argc != 2) {
300             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: mountall", false);
301             return 0;
302         }
303         fs_mgr_mount_all(fstab);
304         cli->sendMsg(ResponseCode::CommandOkay, "Mountall ran successfully", false);
305         return 0;
306     }
307     if (!strcmp(argv[1], "users")) {
308         DIR *dir;
309         struct dirent *de;
310 
311         if (argc < 3) {
312             cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument: user <mountpoint>", false);
313             return 0;
314         }
315         if (!(dir = opendir("/proc"))) {
316             cli->sendMsg(ResponseCode::OperationFailed, "Failed to open /proc", true);
317             return 0;
318         }
319 
320         while ((de = readdir(dir))) {
321             int pid = Process::getPid(de->d_name);
322 
323             if (pid < 0) {
324                 continue;
325             }
326 
327             char processName[255];
328             Process::getProcessName(pid, processName, sizeof(processName));
329 
330             if (Process::checkFileDescriptorSymLinks(pid, argv[2]) ||
331                 Process::checkFileMaps(pid, argv[2]) ||
332                 Process::checkSymLink(pid, argv[2], "cwd") ||
333                 Process::checkSymLink(pid, argv[2], "root") ||
334                 Process::checkSymLink(pid, argv[2], "exe")) {
335 
336                 char msg[1024];
337                 snprintf(msg, sizeof(msg), "%d %s", pid, processName);
338                 cli->sendMsg(ResponseCode::StorageUsersListResult, msg, false);
339             }
340         }
341         closedir(dir);
342         cli->sendMsg(ResponseCode::CommandOkay, "Storage user list complete", false);
343     } else {
344         cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown storage cmd", false);
345     }
346     return 0;
347 }
348 
AsecCmd()349 CommandListener::AsecCmd::AsecCmd() :
350                  VoldCommand("asec") {
351 }
352 
listAsecsInDirectory(SocketClient * cli,const char * directory)353 void CommandListener::AsecCmd::listAsecsInDirectory(SocketClient *cli, const char *directory) {
354     DIR *d = opendir(directory);
355 
356     if (!d) {
357         cli->sendMsg(ResponseCode::OperationFailed, "Failed to open asec dir", true);
358         return;
359     }
360 
361     size_t dirent_len = offsetof(struct dirent, d_name) +
362             fpathconf(dirfd(d), _PC_NAME_MAX) + 1;
363 
364     struct dirent *dent = (struct dirent *) malloc(dirent_len);
365     if (dent == NULL) {
366         cli->sendMsg(ResponseCode::OperationFailed, "Failed to allocate memory", true);
367         return;
368     }
369 
370     struct dirent *result;
371 
372     while (!readdir_r(d, dent, &result) && result != NULL) {
373         if (dent->d_name[0] == '.')
374             continue;
375         if (dent->d_type != DT_REG)
376             continue;
377         size_t name_len = strlen(dent->d_name);
378         if (name_len > 5 && name_len < 260 &&
379                 !strcmp(&dent->d_name[name_len - 5], ".asec")) {
380             char id[255];
381             memset(id, 0, sizeof(id));
382             strlcpy(id, dent->d_name, name_len - 4);
383             cli->sendMsg(ResponseCode::AsecListResult, id, false);
384         }
385     }
386     closedir(d);
387 
388     free(dent);
389 }
390 
runCommand(SocketClient * cli,int argc,char ** argv)391 int CommandListener::AsecCmd::runCommand(SocketClient *cli,
392                                                       int argc, char **argv) {
393     if (argc < 2) {
394         cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
395         return 0;
396     }
397 
398     VolumeManager *vm = VolumeManager::Instance();
399     int rc = 0;
400 
401     if (!strcmp(argv[1], "list")) {
402         dumpArgs(argc, argv, -1);
403 
404         listAsecsInDirectory(cli, VolumeManager::SEC_ASECDIR_EXT);
405         listAsecsInDirectory(cli, VolumeManager::SEC_ASECDIR_INT);
406     } else if (!strcmp(argv[1], "create")) {
407         dumpArgs(argc, argv, 5);
408         if (argc != 8) {
409             cli->sendMsg(ResponseCode::CommandSyntaxError,
410                     "Usage: asec create <container-id> <size_mb> <fstype> <key> <ownerUid> "
411                     "<isExternal>", false);
412             return 0;
413         }
414 
415         unsigned long numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512;
416         const bool isExternal = (atoi(argv[7]) == 1);
417         rc = vm->createAsec(argv[2], numSectors, argv[4], argv[5], atoi(argv[6]), isExternal);
418     } else if (!strcmp(argv[1], "resize")) {
419         dumpArgs(argc, argv, -1);
420         if (argc != 5) {
421             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec resize <container-id> <size_mb> <key>", false);
422             return 0;
423         }
424         unsigned long numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512;
425         rc = vm->resizeAsec(argv[2], numSectors, argv[4]);
426     } else if (!strcmp(argv[1], "finalize")) {
427         dumpArgs(argc, argv, -1);
428         if (argc != 3) {
429             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec finalize <container-id>", false);
430             return 0;
431         }
432         rc = vm->finalizeAsec(argv[2]);
433     } else if (!strcmp(argv[1], "fixperms")) {
434         dumpArgs(argc, argv, -1);
435         if  (argc != 5) {
436             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
437             return 0;
438         }
439 
440         char *endptr;
441         gid_t gid = (gid_t) strtoul(argv[3], &endptr, 10);
442         if (*endptr != '\0') {
443             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
444             return 0;
445         }
446 
447         rc = vm->fixupAsecPermissions(argv[2], gid, argv[4]);
448     } else if (!strcmp(argv[1], "destroy")) {
449         dumpArgs(argc, argv, -1);
450         if (argc < 3) {
451             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec destroy <container-id> [force]", false);
452             return 0;
453         }
454         bool force = false;
455         if (argc > 3 && !strcmp(argv[3], "force")) {
456             force = true;
457         }
458         rc = vm->destroyAsec(argv[2], force);
459     } else if (!strcmp(argv[1], "mount")) {
460         dumpArgs(argc, argv, 3);
461         if (argc != 6) {
462             cli->sendMsg(ResponseCode::CommandSyntaxError,
463                     "Usage: asec mount <namespace-id> <key> <ownerUid> <ro|rw>", false);
464             return 0;
465         }
466         bool readOnly = true;
467         if (!strcmp(argv[5], "rw")) {
468             readOnly = false;
469         }
470         rc = vm->mountAsec(argv[2], argv[3], atoi(argv[4]), readOnly);
471     } else if (!strcmp(argv[1], "unmount")) {
472         dumpArgs(argc, argv, -1);
473         if (argc < 3) {
474             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec unmount <container-id> [force]", false);
475             return 0;
476         }
477         bool force = false;
478         if (argc > 3 && !strcmp(argv[3], "force")) {
479             force = true;
480         }
481         rc = vm->unmountAsec(argv[2], force);
482     } else if (!strcmp(argv[1], "rename")) {
483         dumpArgs(argc, argv, -1);
484         if (argc != 4) {
485             cli->sendMsg(ResponseCode::CommandSyntaxError,
486                     "Usage: asec rename <old_id> <new_id>", false);
487             return 0;
488         }
489         rc = vm->renameAsec(argv[2], argv[3]);
490     } else if (!strcmp(argv[1], "path")) {
491         dumpArgs(argc, argv, -1);
492         if (argc != 3) {
493             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec path <container-id>", false);
494             return 0;
495         }
496         char path[255];
497 
498         if (!(rc = vm->getAsecMountPath(argv[2], path, sizeof(path)))) {
499             cli->sendMsg(ResponseCode::AsecPathResult, path, false);
500             return 0;
501         }
502     } else if (!strcmp(argv[1], "fspath")) {
503         dumpArgs(argc, argv, -1);
504         if (argc != 3) {
505             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fspath <container-id>", false);
506             return 0;
507         }
508         char path[255];
509 
510         if (!(rc = vm->getAsecFilesystemPath(argv[2], path, sizeof(path)))) {
511             cli->sendMsg(ResponseCode::AsecPathResult, path, false);
512             return 0;
513         }
514     } else {
515         dumpArgs(argc, argv, -1);
516         cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown asec cmd", false);
517     }
518 
519     if (!rc) {
520         cli->sendMsg(ResponseCode::CommandOkay, "asec operation succeeded", false);
521     } else {
522         rc = ResponseCode::convertFromErrno();
523         cli->sendMsg(rc, "asec operation failed", true);
524     }
525 
526     return 0;
527 }
528 
ObbCmd()529 CommandListener::ObbCmd::ObbCmd() :
530                  VoldCommand("obb") {
531 }
532 
runCommand(SocketClient * cli,int argc,char ** argv)533 int CommandListener::ObbCmd::runCommand(SocketClient *cli,
534                                                       int argc, char **argv) {
535     if (argc < 2) {
536         cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
537         return 0;
538     }
539 
540     VolumeManager *vm = VolumeManager::Instance();
541     int rc = 0;
542 
543     if (!strcmp(argv[1], "list")) {
544         dumpArgs(argc, argv, -1);
545 
546         rc = vm->listMountedObbs(cli);
547     } else if (!strcmp(argv[1], "mount")) {
548             dumpArgs(argc, argv, 3);
549             if (argc != 5) {
550                 cli->sendMsg(ResponseCode::CommandSyntaxError,
551                         "Usage: obb mount <filename> <key> <ownerGid>", false);
552                 return 0;
553             }
554             rc = vm->mountObb(argv[2], argv[3], atoi(argv[4]));
555     } else if (!strcmp(argv[1], "unmount")) {
556         dumpArgs(argc, argv, -1);
557         if (argc < 3) {
558             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb unmount <source file> [force]", false);
559             return 0;
560         }
561         bool force = false;
562         if (argc > 3 && !strcmp(argv[3], "force")) {
563             force = true;
564         }
565         rc = vm->unmountObb(argv[2], force);
566     } else if (!strcmp(argv[1], "path")) {
567         dumpArgs(argc, argv, -1);
568         if (argc != 3) {
569             cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb path <source file>", false);
570             return 0;
571         }
572         char path[255];
573 
574         if (!(rc = vm->getObbMountPath(argv[2], path, sizeof(path)))) {
575             cli->sendMsg(ResponseCode::AsecPathResult, path, false);
576             return 0;
577         }
578     } else {
579         dumpArgs(argc, argv, -1);
580         cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown obb cmd", false);
581     }
582 
583     if (!rc) {
584         cli->sendMsg(ResponseCode::CommandOkay, "obb operation succeeded", false);
585     } else {
586         rc = ResponseCode::convertFromErrno();
587         cli->sendMsg(rc, "obb operation failed", true);
588     }
589 
590     return 0;
591 }
592 
FstrimCmd()593 CommandListener::FstrimCmd::FstrimCmd() :
594                  VoldCommand("fstrim") {
595 }
runCommand(SocketClient * cli,int argc,char ** argv)596 int CommandListener::FstrimCmd::runCommand(SocketClient *cli,
597                                                       int argc, char **argv) {
598     if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) {
599         cli->sendMsg(ResponseCode::CommandNoPermission, "No permission to run fstrim commands", false);
600         return 0;
601     }
602 
603     if (argc < 2) {
604         cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
605         return 0;
606     }
607 
608     VolumeManager *vm = VolumeManager::Instance();
609     std::lock_guard<std::mutex> lock(vm->getLock());
610 
611     int flags = 0;
612 
613     std::string cmd(argv[1]);
614     if (cmd == "dotrim") {
615         flags = 0;
616     } else if (cmd == "dotrimbench") {
617         flags = android::vold::TrimTask::Flags::kBenchmarkAfter;
618     } else if (cmd == "dodtrim") {
619         flags = android::vold::TrimTask::Flags::kDeepTrim;
620     } else if (cmd == "dodtrimbench") {
621         flags = android::vold::TrimTask::Flags::kDeepTrim
622                 | android::vold::TrimTask::Flags::kBenchmarkAfter;
623     }
624 
625     (new android::vold::TrimTask(flags))->start();
626     return sendGenericOkFail(cli, 0);
627 }
628 
629 static size_t kAppFuseMaxMountPointName = 32;
630 
getMountPath(uid_t uid,const std::string & name,std::string * path)631 static android::status_t getMountPath(uid_t uid, const std::string& name, std::string* path) {
632     if (name.size() > kAppFuseMaxMountPointName) {
633         LOG(ERROR) << "AppFuse mount name is too long.";
634         return -EINVAL;
635     }
636     for (size_t i = 0; i < name.size(); i++) {
637         if (!isalnum(name[i])) {
638             LOG(ERROR) << "AppFuse mount name contains invalid character.";
639             return -EINVAL;
640         }
641     }
642     *path = android::base::StringPrintf("/mnt/appfuse/%d_%s", uid, name.c_str());
643     return android::OK;
644 }
645 
mountInNamespace(uid_t uid,int device_fd,const std::string & path)646 static android::status_t mountInNamespace(uid_t uid, int device_fd, const std::string& path) {
647     // Remove existing mount.
648     android::vold::ForceUnmount(path);
649 
650     const auto opts = android::base::StringPrintf(
651             "fd=%i,"
652             "rootmode=40000,"
653             "default_permissions,"
654             "allow_other,"
655             "user_id=%d,group_id=%d,"
656             "context=\"u:object_r:app_fuse_file:s0\","
657             "fscontext=u:object_r:app_fusefs:s0",
658             device_fd,
659             uid,
660             uid);
661 
662     const int result = TEMP_FAILURE_RETRY(mount(
663             "/dev/fuse", path.c_str(), "fuse",
664             MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_NOATIME, opts.c_str()));
665     if (result != 0) {
666         PLOG(ERROR) << "Failed to mount " << path;
667         return -errno;
668     }
669 
670     return android::OK;
671 }
672 
runCommandInNamespace(const std::string & command,uid_t uid,pid_t pid,const std::string & path,int device_fd)673 static android::status_t runCommandInNamespace(const std::string& command,
674                                                uid_t uid,
675                                                pid_t pid,
676                                                const std::string& path,
677                                                int device_fd) {
678     if (DEBUG_APPFUSE) {
679         LOG(DEBUG) << "Run app fuse command " << command << " for the path " << path
680                    << " in namespace " << uid;
681     }
682 
683     const android::vold::ScopedDir dir(opendir("/proc"));
684     if (dir.get() == nullptr) {
685         PLOG(ERROR) << "Failed to open /proc";
686         return -errno;
687     }
688 
689     // Obtains process file descriptor.
690     const std::string pid_str = android::base::StringPrintf("%d", pid);
691     const android::vold::ScopedFd pid_fd(
692             openat(dirfd(dir.get()), pid_str.c_str(), O_RDONLY | O_DIRECTORY | O_CLOEXEC));
693     if (pid_fd.get() == -1) {
694         PLOG(ERROR) << "Failed to open /proc/" << pid;
695         return -errno;
696     }
697 
698     // Check UID of process.
699     {
700         struct stat sb;
701         const int result = fstat(pid_fd.get(), &sb);
702         if (result == -1) {
703             PLOG(ERROR) << "Failed to stat /proc/" << pid;
704             return -errno;
705         }
706         if (sb.st_uid != uid) {
707             LOG(ERROR) << "Mismatch UID expected=" << uid << ", actual=" << sb.st_uid;
708             return -EPERM;
709         }
710     }
711 
712     // Matches so far, but refuse to touch if in root namespace
713     {
714         char rootName[PATH_MAX];
715         char pidName[PATH_MAX];
716         const int root_result =
717                 android::vold::SaneReadLinkAt(dirfd(dir.get()), "1/ns/mnt", rootName, PATH_MAX);
718         const int pid_result =
719                 android::vold::SaneReadLinkAt(pid_fd.get(), "ns/mnt", pidName, PATH_MAX);
720         if (root_result == -1) {
721             LOG(ERROR) << "Failed to readlink for /proc/1/ns/mnt";
722             return -EPERM;
723         }
724         if (pid_result == -1) {
725             LOG(ERROR) << "Failed to readlink for /proc/" << pid << "/ns/mnt";
726             return -EPERM;
727         }
728         if (!strcmp(rootName, pidName)) {
729             LOG(ERROR) << "Don't mount appfuse in root namespace";
730             return -EPERM;
731         }
732     }
733 
734     // We purposefully leave the namespace open across the fork
735     android::vold::ScopedFd ns_fd(openat(pid_fd.get(), "ns/mnt", O_RDONLY));
736     if (ns_fd.get() < 0) {
737         PLOG(ERROR) << "Failed to open namespace for /proc/" << pid << "/ns/mnt";
738         return -errno;
739     }
740 
741     int child = fork();
742     if (child == 0) {
743         if (setns(ns_fd.get(), CLONE_NEWNS) != 0) {
744             PLOG(ERROR) << "Failed to setns";
745             _exit(-errno);
746         }
747 
748         if (command == "mount") {
749             _exit(mountInNamespace(uid, device_fd, path));
750         } else if (command == "unmount") {
751             android::vold::ForceUnmount(path);
752             _exit(android::OK);
753         } else {
754             LOG(ERROR) << "Unknown appfuse command " << command;
755             _exit(-EPERM);
756         }
757     }
758 
759     if (child == -1) {
760         PLOG(ERROR) << "Failed to folk child process";
761         return -errno;
762     }
763 
764     android::status_t status;
765     TEMP_FAILURE_RETRY(waitpid(child, &status, 0));
766 
767     return status;
768 }
769 
AppFuseCmd()770 CommandListener::AppFuseCmd::AppFuseCmd() : VoldCommand("appfuse") {}
771 
runCommand(SocketClient * cli,int argc,char ** argv)772 int CommandListener::AppFuseCmd::runCommand(SocketClient *cli, int argc, char **argv) {
773     if (argc < 2) {
774         cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing argument", false);
775         return 0;
776     }
777 
778     const std::string command(argv[1]);
779 
780     if (command == "mount" && argc == 5) {
781         const uid_t uid = atoi(argv[2]);
782         const pid_t pid = atoi(argv[3]);
783         const std::string name(argv[4]);
784 
785         // Check mount point name.
786         std::string path;
787         if (getMountPath(uid, name, &path) != android::OK) {
788             return cli->sendMsg(ResponseCode::CommandParameterError,
789                                 "Invalid mount point name.",
790                                 false);
791         }
792 
793         // Create directories.
794         {
795             const android::status_t result = android::vold::PrepareDir(path, 0700, 0, 0);
796             if (result != android::OK) {
797                 PLOG(ERROR) << "Failed to prepare directory " << path;
798                 return sendGenericOkFail(cli, result);
799             }
800         }
801 
802         // Open device FD.
803         android::vold::ScopedFd device_fd(open("/dev/fuse", O_RDWR));
804         if (device_fd.get() == -1) {
805             PLOG(ERROR) << "Failed to open /dev/fuse";
806             return sendGenericOkFail(cli, -errno);
807         }
808 
809         // Mount.
810         {
811             const android::status_t result =
812                     runCommandInNamespace(command, uid, pid, path, device_fd.get());
813             if (result != android::OK) {
814                 return sendGenericOkFail(cli, result);
815             }
816         }
817 
818         return sendFd(cli, device_fd.get());
819     } else if (command == "unmount" && argc == 5) {
820         const uid_t uid = atoi(argv[2]);
821         const uid_t pid = atoi(argv[3]);
822         const std::string name(argv[4]);
823 
824         // Check mount point name.
825         std::string path;
826         if (getMountPath(uid, name, &path) != android::OK) {
827             return cli->sendMsg(ResponseCode::CommandParameterError,
828                                 "Invalid mount point name.",
829                                 false);
830         }
831 
832         const android::status_t result =
833                 runCommandInNamespace(command, uid, pid, path, -1 /* device_fd */);
834         return sendGenericOkFail(cli, result);
835     }
836 
837     return cli->sendMsg(ResponseCode::CommandSyntaxError,  "Unknown appfuse cmd", false);
838 }
839 
sendFd(SocketClient * cli,int fd)840 android::status_t CommandListener::AppFuseCmd::sendFd(SocketClient *cli, int fd) {
841     struct iovec data;
842     char dataBuffer[128];
843     char controlBuffer[CMSG_SPACE(sizeof(int))];
844     struct msghdr message;
845 
846     // Message.
847     memset(&message, 0, sizeof(struct msghdr));
848     message.msg_iov = &data;
849     message.msg_iovlen = 1;
850     message.msg_control = controlBuffer;
851     message.msg_controllen = CMSG_SPACE(sizeof(int));
852 
853     // Data.
854     data.iov_base = dataBuffer;
855     data.iov_len = snprintf(dataBuffer,
856                             sizeof(dataBuffer),
857                             "200 %d AppFuse command succeeded",
858                             cli->getCmdNum()) + 1;
859 
860     // Control.
861     struct cmsghdr* const controlMessage = CMSG_FIRSTHDR(&message);
862     memset(controlBuffer, 0, CMSG_SPACE(sizeof(int)));
863     controlMessage->cmsg_level = SOL_SOCKET;
864     controlMessage->cmsg_type = SCM_RIGHTS;
865     controlMessage->cmsg_len = CMSG_LEN(sizeof(int));
866     *((int *) CMSG_DATA(controlMessage)) = fd;
867 
868     const int result = TEMP_FAILURE_RETRY(sendmsg(cli->getSocket(), &message, 0));
869     if (result == -1) {
870         PLOG(ERROR) << "Failed to send FD from vold";
871         return -errno;
872     }
873 
874     return android::OK;
875 }
876