blob: 04267a3352946ba45d079ce6a169eba034fea2a8 [file] [log] [blame]
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001/*
2 * Copyright (C) 2007 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17package com.android.server;
18
Kenny Roota02b8b02010-08-05 16:14:17 -070019import com.android.internal.app.IMediaContainerService;
Mike Lockwood2f6a3882011-05-09 19:08:06 -070020import com.android.internal.util.XmlUtils;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -080021import com.android.server.am.ActivityManagerService;
Kenny Rootcf0b38c2011-03-22 14:17:59 -070022import com.android.server.pm.PackageManagerService;
Jeff Sharkeydd519fa2011-12-02 14:11:21 -080023import com.android.server.NativeDaemonConnector.Command;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -080024
Jason parks8888c592011-01-20 22:46:41 -060025import android.Manifest;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080026import android.content.BroadcastReceiver;
Kenny Roota02b8b02010-08-05 16:14:17 -070027import android.content.ComponentName;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080028import android.content.Context;
29import android.content.Intent;
30import android.content.IntentFilter;
Kenny Roota02b8b02010-08-05 16:14:17 -070031import android.content.ServiceConnection;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080032import android.content.pm.PackageManager;
Kenny Root02c87302010-07-01 08:10:18 -070033import android.content.res.ObbInfo;
Mike Lockwood2f6a3882011-05-09 19:08:06 -070034import android.content.res.Resources;
35import android.content.res.TypedArray;
36import android.content.res.XmlResourceParser;
Mike Lockwoodecedfdc2011-06-08 15:11:59 -070037import android.hardware.usb.UsbManager;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080038import android.net.Uri;
Kenny Root02c87302010-07-01 08:10:18 -070039import android.os.Binder;
Kenny Roota02b8b02010-08-05 16:14:17 -070040import android.os.Environment;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -080041import android.os.Handler;
Daniel Sandler5f27ef42010-03-16 15:42:02 -040042import android.os.HandlerThread;
Kenny Roota02b8b02010-08-05 16:14:17 -070043import android.os.IBinder;
Daniel Sandler5f27ef42010-03-16 15:42:02 -040044import android.os.Looper;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -080045import android.os.Message;
Mike Lockwood2f6a3882011-05-09 19:08:06 -070046import android.os.Parcelable;
San Mehat4270e1e2010-01-29 05:32:19 -080047import android.os.RemoteException;
Suchi Amalapurapufd3530f2010-01-18 00:15:59 -080048import android.os.ServiceManager;
San Mehat207e5382010-02-04 20:46:54 -080049import android.os.SystemClock;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080050import android.os.SystemProperties;
Amith Yamasani483f3b02012-03-13 16:08:00 -070051import android.os.UserId;
Kenny Roota02b8b02010-08-05 16:14:17 -070052import android.os.storage.IMountService;
53import android.os.storage.IMountServiceListener;
54import android.os.storage.IMountShutdownObserver;
55import android.os.storage.IObbActionListener;
Kenny Rootaf9d6672010-10-08 09:21:39 -070056import android.os.storage.OnObbStateChangeListener;
Kenny Roota02b8b02010-08-05 16:14:17 -070057import android.os.storage.StorageResultCode;
Mike Lockwood2f6a3882011-05-09 19:08:06 -070058import android.os.storage.StorageVolume;
Jason parksf7b3cd42011-01-27 09:28:25 -060059import android.text.TextUtils;
Mike Lockwood2f6a3882011-05-09 19:08:06 -070060import android.util.AttributeSet;
San Mehata5078592010-03-25 09:36:54 -070061import android.util.Slog;
Mike Lockwood2f6a3882011-05-09 19:08:06 -070062import android.util.Xml;
63
64import org.xmlpull.v1.XmlPullParser;
65import org.xmlpull.v1.XmlPullParserException;
Kenny Roota02b8b02010-08-05 16:14:17 -070066
Kenny Root38cf8862010-09-26 14:18:51 -070067import java.io.FileDescriptor;
Kenny Root05105f72010-09-22 17:29:43 -070068import java.io.IOException;
Kenny Root38cf8862010-09-26 14:18:51 -070069import java.io.PrintWriter;
Kenny Root3b1abba2010-10-13 15:00:07 -070070import java.math.BigInteger;
Kenny Root735de3b2010-09-30 14:11:39 -070071import java.security.NoSuchAlgorithmException;
Kenny Root3b1abba2010-10-13 15:00:07 -070072import java.security.spec.InvalidKeySpecException;
73import java.security.spec.KeySpec;
San Mehat22dd86e2010-01-12 12:21:18 -080074import java.util.ArrayList;
Kenny Roota02b8b02010-08-05 16:14:17 -070075import java.util.HashMap;
San Mehat6cdd9c02010-02-09 14:45:20 -080076import java.util.HashSet;
Kenny Root38cf8862010-09-26 14:18:51 -070077import java.util.Iterator;
Kenny Roota02b8b02010-08-05 16:14:17 -070078import java.util.LinkedList;
79import java.util.List;
80import java.util.Map;
Kenny Root38cf8862010-09-26 14:18:51 -070081import java.util.Map.Entry;
Kenny Root51a573c2012-05-17 13:30:28 -070082import java.util.concurrent.CountDownLatch;
83import java.util.concurrent.TimeUnit;
Mike Lockwood8fa5f802011-03-24 08:12:30 -070084import java.util.Set;
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080085
Kenny Root3b1abba2010-10-13 15:00:07 -070086import javax.crypto.SecretKey;
87import javax.crypto.SecretKeyFactory;
88import javax.crypto.spec.PBEKeySpec;
89
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080090/**
San Mehatb1043402010-02-05 08:26:50 -080091 * MountService implements back-end services for platform storage
92 * management.
93 * @hide - Applications should use android.os.storage.StorageManager
94 * to access the MountService.
The Android Open Source Project9066cfe2009-03-03 19:31:44 -080095 */
Jeff Sharkeyfa23c5a2011-08-09 21:44:24 -070096class MountService extends IMountService.Stub
97 implements INativeDaemonConnectorCallbacks, Watchdog.Monitor {
Jason parks5af0b912010-11-29 09:05:25 -060098
San Mehatb1043402010-02-05 08:26:50 -080099 private static final boolean LOCAL_LOGD = false;
Suchi Amalapurapu8a9ab242010-03-11 16:49:16 -0800100 private static final boolean DEBUG_UNMOUNT = false;
101 private static final boolean DEBUG_EVENTS = false;
Kenny Rootb7db2722011-01-25 16:39:35 -0800102 private static final boolean DEBUG_OBB = false;
Kenny Root02c87302010-07-01 08:10:18 -0700103
Kenny Root07714d42011-08-17 17:49:28 -0700104 // Disable this since it messes up long-running cryptfs operations.
105 private static final boolean WATCHDOG_ENABLE = false;
106
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800107 private static final String TAG = "MountService";
108
Kenny Root305bcbf2010-09-03 07:56:38 -0700109 private static final String VOLD_TAG = "VoldConnector";
110
Kenny Rootcf0b38c2011-03-22 14:17:59 -0700111 /** Maximum number of ASEC containers allowed to be mounted. */
112 private static final int MAX_CONTAINERS = 250;
113
San Mehat4270e1e2010-01-29 05:32:19 -0800114 /*
115 * Internal vold volume state constants
116 */
San Mehat7fd0fee2009-12-17 07:12:23 -0800117 class VolumeState {
118 public static final int Init = -1;
119 public static final int NoMedia = 0;
120 public static final int Idle = 1;
121 public static final int Pending = 2;
122 public static final int Checking = 3;
123 public static final int Mounted = 4;
124 public static final int Unmounting = 5;
125 public static final int Formatting = 6;
126 public static final int Shared = 7;
127 public static final int SharedMnt = 8;
128 }
129
San Mehat4270e1e2010-01-29 05:32:19 -0800130 /*
131 * Internal vold response code constants
132 */
San Mehat22dd86e2010-01-12 12:21:18 -0800133 class VoldResponseCode {
San Mehat4270e1e2010-01-29 05:32:19 -0800134 /*
135 * 100 series - Requestion action was initiated; expect another reply
136 * before proceeding with a new command.
137 */
San Mehat22dd86e2010-01-12 12:21:18 -0800138 public static final int VolumeListResult = 110;
139 public static final int AsecListResult = 111;
San Mehatc1b4ce92010-02-16 17:13:03 -0800140 public static final int StorageUsersListResult = 112;
San Mehat22dd86e2010-01-12 12:21:18 -0800141
San Mehat4270e1e2010-01-29 05:32:19 -0800142 /*
143 * 200 series - Requestion action has been successfully completed.
144 */
145 public static final int ShareStatusResult = 210;
San Mehat22dd86e2010-01-12 12:21:18 -0800146 public static final int AsecPathResult = 211;
San Mehat4270e1e2010-01-29 05:32:19 -0800147 public static final int ShareEnabledResult = 212;
San Mehat22dd86e2010-01-12 12:21:18 -0800148
San Mehat4270e1e2010-01-29 05:32:19 -0800149 /*
150 * 400 series - Command was accepted, but the requested action
151 * did not take place.
152 */
153 public static final int OpFailedNoMedia = 401;
154 public static final int OpFailedMediaBlank = 402;
155 public static final int OpFailedMediaCorrupt = 403;
156 public static final int OpFailedVolNotMounted = 404;
San Mehatd9709982010-02-18 11:43:03 -0800157 public static final int OpFailedStorageBusy = 405;
San Mehat2d66cef2010-03-23 11:12:52 -0700158 public static final int OpFailedStorageNotFound = 406;
San Mehat4270e1e2010-01-29 05:32:19 -0800159
160 /*
161 * 600 series - Unsolicited broadcasts.
162 */
San Mehat22dd86e2010-01-12 12:21:18 -0800163 public static final int VolumeStateChange = 605;
San Mehat22dd86e2010-01-12 12:21:18 -0800164 public static final int VolumeDiskInserted = 630;
165 public static final int VolumeDiskRemoved = 631;
166 public static final int VolumeBadRemoval = 632;
167 }
168
San Mehat4270e1e2010-01-29 05:32:19 -0800169 private Context mContext;
170 private NativeDaemonConnector mConnector;
Mike Lockwood2f6a3882011-05-09 19:08:06 -0700171 private final ArrayList<StorageVolume> mVolumes = new ArrayList<StorageVolume>();
172 private StorageVolume mPrimaryVolume;
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400173 private final HashMap<String, String> mVolumeStates = new HashMap<String, String>();
Mike Lockwooda5250c92011-05-23 13:44:04 -0400174 private final HashMap<String, StorageVolume> mVolumeMap = new HashMap<String, StorageVolume>();
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400175 private String mExternalStoragePath;
San Mehat4270e1e2010-01-29 05:32:19 -0800176 private PackageManagerService mPms;
177 private boolean mUmsEnabling;
Mike Lockwoodecedfdc2011-06-08 15:11:59 -0700178 private boolean mUmsAvailable = false;
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800179 // Used as a lock for methods that register/unregister listeners.
180 final private ArrayList<MountServiceBinderListener> mListeners =
181 new ArrayList<MountServiceBinderListener>();
San Mehat6a965af22010-02-24 17:47:30 -0800182 private boolean mBooted = false;
Kenny Root51a573c2012-05-17 13:30:28 -0700183 private CountDownLatch mConnectedSignal = new CountDownLatch(1);
184 private CountDownLatch mAsecsScanned = new CountDownLatch(1);
San Mehat6a965af22010-02-24 17:47:30 -0800185 private boolean mSendUmsConnectedOnBoot = false;
Mike Lockwood03559752010-07-19 18:25:03 -0400186 // true if we should fake MEDIA_MOUNTED state for external storage
187 private boolean mEmulateExternalStorage = false;
Suchi Amalapurapufd3530f2010-01-18 00:15:59 -0800188
San Mehat6cdd9c02010-02-09 14:45:20 -0800189 /**
190 * Private hash of currently mounted secure containers.
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800191 * Used as a lock in methods to manipulate secure containers.
San Mehat6cdd9c02010-02-09 14:45:20 -0800192 */
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800193 final private HashSet<String> mAsecMountSet = new HashSet<String>();
San Mehat6cdd9c02010-02-09 14:45:20 -0800194
Kenny Root02c87302010-07-01 08:10:18 -0700195 /**
Kenny Root3b1abba2010-10-13 15:00:07 -0700196 * The size of the crypto algorithm key in bits for OBB files. Currently
197 * Twofish is used which takes 128-bit keys.
198 */
199 private static final int CRYPTO_ALGORITHM_KEY_SIZE = 128;
200
201 /**
202 * The number of times to run SHA1 in the PBKDF2 function for OBB files.
203 * 1024 is reasonably secure and not too slow.
204 */
205 private static final int PBKDF2_HASH_ROUNDS = 1024;
206
207 /**
Kenny Roota02b8b02010-08-05 16:14:17 -0700208 * Mounted OBB tracking information. Used to track the current state of all
209 * OBBs.
Kenny Root02c87302010-07-01 08:10:18 -0700210 */
Kenny Root735de3b2010-09-30 14:11:39 -0700211 final private Map<IBinder, List<ObbState>> mObbMounts = new HashMap<IBinder, List<ObbState>>();
Kenny Roota02b8b02010-08-05 16:14:17 -0700212 final private Map<String, ObbState> mObbPathToStateMap = new HashMap<String, ObbState>();
213
214 class ObbState implements IBinder.DeathRecipient {
Kenny Rootaf9d6672010-10-08 09:21:39 -0700215 public ObbState(String filename, int callerUid, IObbActionListener token, int nonce)
Kenny Root735de3b2010-09-30 14:11:39 -0700216 throws RemoteException {
Kenny Roota02b8b02010-08-05 16:14:17 -0700217 this.filename = filename;
Kenny Roota02b8b02010-08-05 16:14:17 -0700218 this.callerUid = callerUid;
Kenny Rootaf9d6672010-10-08 09:21:39 -0700219 this.token = token;
220 this.nonce = nonce;
Kenny Roota02b8b02010-08-05 16:14:17 -0700221 }
222
223 // OBB source filename
Kenny Rootaf9d6672010-10-08 09:21:39 -0700224 String filename;
Kenny Roota02b8b02010-08-05 16:14:17 -0700225
226 // Binder.callingUid()
Kenny Root05105f72010-09-22 17:29:43 -0700227 final public int callerUid;
Kenny Roota02b8b02010-08-05 16:14:17 -0700228
Kenny Rootaf9d6672010-10-08 09:21:39 -0700229 // Token of remote Binder caller
230 final IObbActionListener token;
231
232 // Identifier to pass back to the token
233 final int nonce;
Kenny Roota02b8b02010-08-05 16:14:17 -0700234
Kenny Root735de3b2010-09-30 14:11:39 -0700235 public IBinder getBinder() {
236 return token.asBinder();
237 }
238
Kenny Roota02b8b02010-08-05 16:14:17 -0700239 @Override
240 public void binderDied() {
241 ObbAction action = new UnmountObbAction(this, true);
242 mObbActionHandler.sendMessage(mObbActionHandler.obtainMessage(OBB_RUN_ACTION, action));
Kenny Root735de3b2010-09-30 14:11:39 -0700243 }
Kenny Roota02b8b02010-08-05 16:14:17 -0700244
Kenny Root5919ac62010-10-05 09:49:40 -0700245 public void link() throws RemoteException {
246 getBinder().linkToDeath(this, 0);
247 }
248
249 public void unlink() {
Kenny Root735de3b2010-09-30 14:11:39 -0700250 getBinder().unlinkToDeath(this, 0);
Kenny Roota02b8b02010-08-05 16:14:17 -0700251 }
Kenny Root38cf8862010-09-26 14:18:51 -0700252
253 @Override
254 public String toString() {
255 StringBuilder sb = new StringBuilder("ObbState{");
256 sb.append("filename=");
257 sb.append(filename);
258 sb.append(",token=");
259 sb.append(token.toString());
260 sb.append(",callerUid=");
261 sb.append(callerUid);
Kenny Root38cf8862010-09-26 14:18:51 -0700262 sb.append('}');
263 return sb.toString();
264 }
Kenny Roota02b8b02010-08-05 16:14:17 -0700265 }
266
267 // OBB Action Handler
268 final private ObbActionHandler mObbActionHandler;
269
270 // OBB action handler messages
271 private static final int OBB_RUN_ACTION = 1;
272 private static final int OBB_MCS_BOUND = 2;
273 private static final int OBB_MCS_UNBIND = 3;
274 private static final int OBB_MCS_RECONNECT = 4;
Kenny Rootaf9d6672010-10-08 09:21:39 -0700275 private static final int OBB_FLUSH_MOUNT_STATE = 5;
Kenny Roota02b8b02010-08-05 16:14:17 -0700276
277 /*
278 * Default Container Service information
279 */
280 static final ComponentName DEFAULT_CONTAINER_COMPONENT = new ComponentName(
281 "com.android.defcontainer", "com.android.defcontainer.DefaultContainerService");
282
283 final private DefaultContainerConnection mDefContainerConn = new DefaultContainerConnection();
284
285 class DefaultContainerConnection implements ServiceConnection {
286 public void onServiceConnected(ComponentName name, IBinder service) {
287 if (DEBUG_OBB)
288 Slog.i(TAG, "onServiceConnected");
289 IMediaContainerService imcs = IMediaContainerService.Stub.asInterface(service);
290 mObbActionHandler.sendMessage(mObbActionHandler.obtainMessage(OBB_MCS_BOUND, imcs));
291 }
292
293 public void onServiceDisconnected(ComponentName name) {
294 if (DEBUG_OBB)
295 Slog.i(TAG, "onServiceDisconnected");
296 }
297 };
298
299 // Used in the ObbActionHandler
300 private IMediaContainerService mContainerService = null;
Kenny Root02c87302010-07-01 08:10:18 -0700301
302 // Handler messages
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800303 private static final int H_UNMOUNT_PM_UPDATE = 1;
304 private static final int H_UNMOUNT_PM_DONE = 2;
305 private static final int H_UNMOUNT_MS = 3;
306 private static final int RETRY_UNMOUNT_DELAY = 30; // in ms
307 private static final int MAX_UNMOUNT_RETRIES = 4;
308
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800309 class UnmountCallBack {
Kenny Root05105f72010-09-22 17:29:43 -0700310 final String path;
311 final boolean force;
Ben Komalo13c71972011-09-07 16:35:56 -0700312 final boolean removeEncryption;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800313 int retries;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800314
Ben Komalo13c71972011-09-07 16:35:56 -0700315 UnmountCallBack(String path, boolean force, boolean removeEncryption) {
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800316 retries = 0;
317 this.path = path;
318 this.force = force;
Ben Komalo13c71972011-09-07 16:35:56 -0700319 this.removeEncryption = removeEncryption;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800320 }
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800321
322 void handleFinished() {
San Mehata5078592010-03-25 09:36:54 -0700323 if (DEBUG_UNMOUNT) Slog.i(TAG, "Unmounting " + path);
Ben Komalo13c71972011-09-07 16:35:56 -0700324 doUnmountVolume(path, true, removeEncryption);
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800325 }
326 }
327
328 class UmsEnableCallBack extends UnmountCallBack {
Kenny Root05105f72010-09-22 17:29:43 -0700329 final String method;
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800330
331 UmsEnableCallBack(String path, String method, boolean force) {
Ben Komalo13c71972011-09-07 16:35:56 -0700332 super(path, force, false);
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800333 this.method = method;
334 }
335
336 @Override
337 void handleFinished() {
338 super.handleFinished();
339 doShareUnshareVolume(path, method, true);
340 }
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800341 }
342
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800343 class ShutdownCallBack extends UnmountCallBack {
344 IMountShutdownObserver observer;
345 ShutdownCallBack(String path, IMountShutdownObserver observer) {
Ben Komalo13c71972011-09-07 16:35:56 -0700346 super(path, true, false);
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800347 this.observer = observer;
348 }
349
350 @Override
351 void handleFinished() {
Ben Komalo13c71972011-09-07 16:35:56 -0700352 int ret = doUnmountVolume(path, true, removeEncryption);
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800353 if (observer != null) {
354 try {
355 observer.onShutDownComplete(ret);
356 } catch (RemoteException e) {
San Mehata5078592010-03-25 09:36:54 -0700357 Slog.w(TAG, "RemoteException when shutting down");
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800358 }
359 }
360 }
361 }
362
Daniel Sandler5f27ef42010-03-16 15:42:02 -0400363 class MountServiceHandler extends Handler {
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800364 ArrayList<UnmountCallBack> mForceUnmounts = new ArrayList<UnmountCallBack>();
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -0700365 boolean mUpdatingStatus = false;
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800366
Daniel Sandler5f27ef42010-03-16 15:42:02 -0400367 MountServiceHandler(Looper l) {
368 super(l);
369 }
370
Jason parks5af0b912010-11-29 09:05:25 -0600371 @Override
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800372 public void handleMessage(Message msg) {
373 switch (msg.what) {
374 case H_UNMOUNT_PM_UPDATE: {
San Mehata5078592010-03-25 09:36:54 -0700375 if (DEBUG_UNMOUNT) Slog.i(TAG, "H_UNMOUNT_PM_UPDATE");
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800376 UnmountCallBack ucb = (UnmountCallBack) msg.obj;
377 mForceUnmounts.add(ucb);
San Mehata5078592010-03-25 09:36:54 -0700378 if (DEBUG_UNMOUNT) Slog.i(TAG, " registered = " + mUpdatingStatus);
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800379 // Register only if needed.
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -0700380 if (!mUpdatingStatus) {
San Mehata5078592010-03-25 09:36:54 -0700381 if (DEBUG_UNMOUNT) Slog.i(TAG, "Updating external media status on PackageManager");
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -0700382 mUpdatingStatus = true;
383 mPms.updateExternalMediaStatus(false, true);
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800384 }
385 break;
386 }
387 case H_UNMOUNT_PM_DONE: {
San Mehata5078592010-03-25 09:36:54 -0700388 if (DEBUG_UNMOUNT) Slog.i(TAG, "H_UNMOUNT_PM_DONE");
San Mehata5078592010-03-25 09:36:54 -0700389 if (DEBUG_UNMOUNT) Slog.i(TAG, "Updated status. Processing requests");
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -0700390 mUpdatingStatus = false;
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800391 int size = mForceUnmounts.size();
392 int sizeArr[] = new int[size];
393 int sizeArrN = 0;
Suchi Amalapurapu7af074a2010-04-05 16:46:32 -0700394 // Kill processes holding references first
395 ActivityManagerService ams = (ActivityManagerService)
396 ServiceManager.getService("activity");
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800397 for (int i = 0; i < size; i++) {
398 UnmountCallBack ucb = mForceUnmounts.get(i);
399 String path = ucb.path;
400 boolean done = false;
401 if (!ucb.force) {
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800402 done = true;
403 } else {
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800404 int pids[] = getStorageUsers(path);
405 if (pids == null || pids.length == 0) {
406 done = true;
407 } else {
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800408 // Eliminate system process here?
Dianne Hackborn64825172011-03-02 21:32:58 -0800409 ams.killPids(pids, "unmount media", true);
Suchi Amalapurapu7af074a2010-04-05 16:46:32 -0700410 // Confirm if file references have been freed.
411 pids = getStorageUsers(path);
412 if (pids == null || pids.length == 0) {
413 done = true;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800414 }
415 }
416 }
Suchi Amalapurapu7af074a2010-04-05 16:46:32 -0700417 if (!done && (ucb.retries < MAX_UNMOUNT_RETRIES)) {
418 // Retry again
419 Slog.i(TAG, "Retrying to kill storage users again");
420 mHandler.sendMessageDelayed(
421 mHandler.obtainMessage(H_UNMOUNT_PM_DONE,
422 ucb.retries++),
423 RETRY_UNMOUNT_DELAY);
424 } else {
425 if (ucb.retries >= MAX_UNMOUNT_RETRIES) {
426 Slog.i(TAG, "Failed to unmount media inspite of " +
427 MAX_UNMOUNT_RETRIES + " retries. Forcibly killing processes now");
428 }
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800429 sizeArr[sizeArrN++] = i;
430 mHandler.sendMessage(mHandler.obtainMessage(H_UNMOUNT_MS,
431 ucb));
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800432 }
433 }
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -0800434 // Remove already processed elements from list.
435 for (int i = (sizeArrN-1); i >= 0; i--) {
436 mForceUnmounts.remove(sizeArr[i]);
437 }
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800438 break;
439 }
440 case H_UNMOUNT_MS : {
San Mehata5078592010-03-25 09:36:54 -0700441 if (DEBUG_UNMOUNT) Slog.i(TAG, "H_UNMOUNT_MS");
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800442 UnmountCallBack ucb = (UnmountCallBack) msg.obj;
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800443 ucb.handleFinished();
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800444 break;
445 }
446 }
447 }
448 };
Daniel Sandler5f27ef42010-03-16 15:42:02 -0400449 final private HandlerThread mHandlerThread;
450 final private Handler mHandler;
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800451
Kenny Root51a573c2012-05-17 13:30:28 -0700452 void waitForAsecScan() {
453 waitForLatch(mAsecsScanned);
454 }
455
San Mehat207e5382010-02-04 20:46:54 -0800456 private void waitForReady() {
Kenny Root51a573c2012-05-17 13:30:28 -0700457 waitForLatch(mConnectedSignal);
458 }
459
460 private void waitForLatch(CountDownLatch latch) {
461 if (latch == null) {
462 return;
463 }
464
465 for (;;) {
466 try {
467 if (latch.await(5000, TimeUnit.MILLISECONDS)) {
San Mehat207e5382010-02-04 20:46:54 -0800468 return;
Kenny Root51a573c2012-05-17 13:30:28 -0700469 } else {
470 Slog.w(TAG, "Thread " + Thread.currentThread().getName()
471 + " still waiting for MountService ready...");
San Mehat207e5382010-02-04 20:46:54 -0800472 }
Kenny Root51a573c2012-05-17 13:30:28 -0700473 } catch (InterruptedException e) {
474 Slog.w(TAG, "Interrupt while waiting for MountService to be ready.");
San Mehat207e5382010-02-04 20:46:54 -0800475 }
San Mehat207e5382010-02-04 20:46:54 -0800476 }
San Mehat1f6301e2010-01-07 22:40:27 -0800477 }
Kenny Root02c87302010-07-01 08:10:18 -0700478
Ben Komalo444eca22011-09-01 15:17:44 -0700479 private final BroadcastReceiver mBroadcastReceiver = new BroadcastReceiver() {
Jason parks5af0b912010-11-29 09:05:25 -0600480 @Override
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800481 public void onReceive(Context context, Intent intent) {
San Mehat91c77612010-01-07 10:39:41 -0800482 String action = intent.getAction();
483
484 if (action.equals(Intent.ACTION_BOOT_COMPLETED)) {
San Mehat207e5382010-02-04 20:46:54 -0800485 mBooted = true;
San Mehat22dd86e2010-01-12 12:21:18 -0800486
Marco Nelissenc34ebce2010-02-18 13:39:41 -0800487 /*
488 * In the simulator, we need to broadcast a volume mounted event
489 * to make the media scanner run.
490 */
491 if ("simulator".equals(SystemProperties.get("ro.product.device"))) {
Mike Lockwood84338c42011-04-05 10:05:47 -0400492 notifyVolumeStateChange(null, "/sdcard", VolumeState.NoMedia,
493 VolumeState.Mounted);
Marco Nelissenc34ebce2010-02-18 13:39:41 -0800494 return;
495 }
San Mehatfafb0412010-02-18 19:40:04 -0800496 new Thread() {
Jason parks5af0b912010-11-29 09:05:25 -0600497 @Override
San Mehatfafb0412010-02-18 19:40:04 -0800498 public void run() {
499 try {
Mike Lockwood84338c42011-04-05 10:05:47 -0400500 // it is not safe to call vold with mVolumeStates locked
501 // so we make a copy of the paths and states and process them
502 // outside the lock
Jeff Sharkeyfa23c5a2011-08-09 21:44:24 -0700503 String[] paths;
504 String[] states;
Mike Lockwood84338c42011-04-05 10:05:47 -0400505 int count;
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400506 synchronized (mVolumeStates) {
Mike Lockwood84338c42011-04-05 10:05:47 -0400507 Set<String> keys = mVolumeStates.keySet();
508 count = keys.size();
Ben Komalo444eca22011-09-01 15:17:44 -0700509 paths = keys.toArray(new String[count]);
Mike Lockwood84338c42011-04-05 10:05:47 -0400510 states = new String[count];
511 for (int i = 0; i < count; i++) {
512 states[i] = mVolumeStates.get(paths[i]);
513 }
514 }
San Mehat6a254402010-03-22 10:21:00 -0700515
Mike Lockwood84338c42011-04-05 10:05:47 -0400516 for (int i = 0; i < count; i++) {
517 String path = paths[i];
518 String state = states[i];
519
520 if (state.equals(Environment.MEDIA_UNMOUNTED)) {
521 int rc = doMountVolume(path);
522 if (rc != StorageResultCode.OperationSucceeded) {
523 Slog.e(TAG, String.format("Boot-time mount failed (%d)",
524 rc));
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400525 }
Mike Lockwood84338c42011-04-05 10:05:47 -0400526 } else if (state.equals(Environment.MEDIA_SHARED)) {
527 /*
528 * Bootstrap UMS enabled state since vold indicates
529 * the volume is shared (runtime restart while ums enabled)
530 */
531 notifyVolumeStateChange(null, path, VolumeState.NoMedia,
532 VolumeState.Shared);
San Mehatfafb0412010-02-18 19:40:04 -0800533 }
534 }
San Mehat6a254402010-03-22 10:21:00 -0700535
Mike Lockwood80e0a412011-04-05 10:21:51 -0400536 /* notify external storage has mounted to trigger media scanner */
537 if (mEmulateExternalStorage) {
538 notifyVolumeStateChange(null,
539 Environment.getExternalStorageDirectory().getPath(),
540 VolumeState.NoMedia, VolumeState.Mounted);
541 }
542
San Mehat6a965af22010-02-24 17:47:30 -0800543 /*
San Mehat6a254402010-03-22 10:21:00 -0700544 * If UMS was connected on boot, send the connected event
San Mehat6a965af22010-02-24 17:47:30 -0800545 * now that we're up.
546 */
547 if (mSendUmsConnectedOnBoot) {
548 sendUmsIntent(true);
549 mSendUmsConnectedOnBoot = false;
550 }
San Mehatfafb0412010-02-18 19:40:04 -0800551 } catch (Exception ex) {
San Mehata5078592010-03-25 09:36:54 -0700552 Slog.e(TAG, "Boot-time mount exception", ex);
San Mehatfafb0412010-02-18 19:40:04 -0800553 }
San Mehat207e5382010-02-04 20:46:54 -0800554 }
San Mehatfafb0412010-02-18 19:40:04 -0800555 }.start();
Mike Lockwoodecedfdc2011-06-08 15:11:59 -0700556 } else if (action.equals(UsbManager.ACTION_USB_STATE)) {
557 boolean available = (intent.getBooleanExtra(UsbManager.USB_CONNECTED, false) &&
558 intent.getBooleanExtra(UsbManager.USB_FUNCTION_MASS_STORAGE, false));
559 notifyShareAvailabilityChange(available);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -0800560 }
561 }
562 };
San Mehat4270e1e2010-01-29 05:32:19 -0800563 private final class MountServiceBinderListener implements IBinder.DeathRecipient {
564 final IMountServiceListener mListener;
565
566 MountServiceBinderListener(IMountServiceListener listener) {
567 mListener = listener;
Kenny Root02c87302010-07-01 08:10:18 -0700568
San Mehat91c77612010-01-07 10:39:41 -0800569 }
570
San Mehat4270e1e2010-01-29 05:32:19 -0800571 public void binderDied() {
San Mehata5078592010-03-25 09:36:54 -0700572 if (LOCAL_LOGD) Slog.d(TAG, "An IMountServiceListener has died!");
Kenny Roota02b8b02010-08-05 16:14:17 -0700573 synchronized (mListeners) {
San Mehat4270e1e2010-01-29 05:32:19 -0800574 mListeners.remove(this);
575 mListener.asBinder().unlinkToDeath(this, 0);
576 }
577 }
578 }
579
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800580 private void doShareUnshareVolume(String path, String method, boolean enable) {
San Mehat4270e1e2010-01-29 05:32:19 -0800581 // TODO: Add support for multiple share methods
582 if (!method.equals("ums")) {
583 throw new IllegalArgumentException(String.format("Method %s not supported", method));
584 }
585
San Mehat4270e1e2010-01-29 05:32:19 -0800586 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800587 mConnector.execute("volume", enable ? "share" : "unshare", path, method);
San Mehat4270e1e2010-01-29 05:32:19 -0800588 } catch (NativeDaemonConnectorException e) {
San Mehata5078592010-03-25 09:36:54 -0700589 Slog.e(TAG, "Failed to share/unshare", e);
San Mehat4270e1e2010-01-29 05:32:19 -0800590 }
San Mehat4270e1e2010-01-29 05:32:19 -0800591 }
592
San Mehat207e5382010-02-04 20:46:54 -0800593 private void updatePublicVolumeState(String path, String state) {
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400594 String oldState;
595 synchronized(mVolumeStates) {
596 oldState = mVolumeStates.put(path, state);
597 }
598 if (state.equals(oldState)) {
599 Slog.w(TAG, String.format("Duplicate state transition (%s -> %s) for %s",
600 state, state, path));
San Mehat4270e1e2010-01-29 05:32:19 -0800601 return;
602 }
San Mehatb1043402010-02-05 08:26:50 -0800603
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400604 Slog.d(TAG, "volume state changed for " + path + " (" + oldState + " -> " + state + ")");
Kenny Rootaf9d6672010-10-08 09:21:39 -0700605
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400606 if (path.equals(mExternalStoragePath)) {
607 // Update state on PackageManager, but only of real events
608 if (!mEmulateExternalStorage) {
609 if (Environment.MEDIA_UNMOUNTED.equals(state)) {
610 mPms.updateExternalMediaStatus(false, false);
611
612 /*
613 * Some OBBs might have been unmounted when this volume was
614 * unmounted, so send a message to the handler to let it know to
615 * remove those from the list of mounted OBBS.
616 */
617 mObbActionHandler.sendMessage(mObbActionHandler.obtainMessage(
618 OBB_FLUSH_MOUNT_STATE, path));
619 } else if (Environment.MEDIA_MOUNTED.equals(state)) {
620 mPms.updateExternalMediaStatus(true, false);
621 }
Mike Lockwood03559752010-07-19 18:25:03 -0400622 }
Suchi Amalapurapu8a9ab242010-03-11 16:49:16 -0800623 }
San Mehat4270e1e2010-01-29 05:32:19 -0800624 synchronized (mListeners) {
625 for (int i = mListeners.size() -1; i >= 0; i--) {
626 MountServiceBinderListener bl = mListeners.get(i);
627 try {
San Mehatb1043402010-02-05 08:26:50 -0800628 bl.mListener.onStorageStateChanged(path, oldState, state);
San Mehat4270e1e2010-01-29 05:32:19 -0800629 } catch (RemoteException rex) {
San Mehata5078592010-03-25 09:36:54 -0700630 Slog.e(TAG, "Listener dead");
San Mehat4270e1e2010-01-29 05:32:19 -0800631 mListeners.remove(i);
632 } catch (Exception ex) {
San Mehata5078592010-03-25 09:36:54 -0700633 Slog.e(TAG, "Listener failed", ex);
San Mehat4270e1e2010-01-29 05:32:19 -0800634 }
635 }
636 }
637 }
638
639 /**
640 *
641 * Callback from NativeDaemonConnector
642 */
643 public void onDaemonConnected() {
644 /*
645 * Since we'll be calling back into the NativeDaemonConnector,
646 * we need to do our work in a new thread.
647 */
Kenny Root51a573c2012-05-17 13:30:28 -0700648 new Thread("MountService#onDaemonConnected") {
Jason parks5af0b912010-11-29 09:05:25 -0600649 @Override
San Mehat4270e1e2010-01-29 05:32:19 -0800650 public void run() {
651 /**
652 * Determine media state and UMS detection status
653 */
San Mehat4270e1e2010-01-29 05:32:19 -0800654 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800655 final String[] vols = NativeDaemonEvent.filterMessageList(
656 mConnector.executeForList("volume", "list"),
657 VoldResponseCode.VolumeListResult);
San Mehat4270e1e2010-01-29 05:32:19 -0800658 for (String volstr : vols) {
659 String[] tok = volstr.split(" ");
660 // FMT: <label> <mountpoint> <state>
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400661 String path = tok[1];
662 String state = Environment.MEDIA_REMOVED;
663
San Mehat4270e1e2010-01-29 05:32:19 -0800664 int st = Integer.parseInt(tok[2]);
665 if (st == VolumeState.NoMedia) {
666 state = Environment.MEDIA_REMOVED;
667 } else if (st == VolumeState.Idle) {
San Mehat207e5382010-02-04 20:46:54 -0800668 state = Environment.MEDIA_UNMOUNTED;
San Mehat4270e1e2010-01-29 05:32:19 -0800669 } else if (st == VolumeState.Mounted) {
670 state = Environment.MEDIA_MOUNTED;
San Mehata5078592010-03-25 09:36:54 -0700671 Slog.i(TAG, "Media already mounted on daemon connection");
San Mehat4270e1e2010-01-29 05:32:19 -0800672 } else if (st == VolumeState.Shared) {
673 state = Environment.MEDIA_SHARED;
San Mehata5078592010-03-25 09:36:54 -0700674 Slog.i(TAG, "Media shared on daemon connection");
San Mehat4270e1e2010-01-29 05:32:19 -0800675 } else {
676 throw new Exception(String.format("Unexpected state %d", st));
677 }
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400678
679 if (state != null) {
680 if (DEBUG_EVENTS) Slog.i(TAG, "Updating valid state " + state);
681 updatePublicVolumeState(path, state);
682 }
San Mehat4270e1e2010-01-29 05:32:19 -0800683 }
684 } catch (Exception e) {
San Mehata5078592010-03-25 09:36:54 -0700685 Slog.e(TAG, "Error processing initial volume state", e);
Mike Lockwood7fa24aa2011-03-23 14:52:34 -0400686 updatePublicVolumeState(mExternalStoragePath, Environment.MEDIA_REMOVED);
San Mehat4270e1e2010-01-29 05:32:19 -0800687 }
688
San Mehat207e5382010-02-04 20:46:54 -0800689 /*
Jason parks9ed98bc2011-01-17 09:58:35 -0600690 * Now that we've done our initialization, release
San Mehat207e5382010-02-04 20:46:54 -0800691 * the hounds!
692 */
Kenny Root51a573c2012-05-17 13:30:28 -0700693 mConnectedSignal.countDown();
694 mConnectedSignal = null;
695
696 // Let package manager load internal ASECs.
697 mPms.scanAvailableAsecs();
698
699 // Notify people waiting for ASECs to be scanned that it's done.
700 mAsecsScanned.countDown();
701 mAsecsScanned = null;
San Mehat4270e1e2010-01-29 05:32:19 -0800702 }
703 }.start();
704 }
705
706 /**
San Mehat4270e1e2010-01-29 05:32:19 -0800707 * Callback from NativeDaemonConnector
708 */
709 public boolean onEvent(int code, String raw, String[] cooked) {
Suchi Amalapurapu8a9ab242010-03-11 16:49:16 -0800710 if (DEBUG_EVENTS) {
711 StringBuilder builder = new StringBuilder();
712 builder.append("onEvent::");
713 builder.append(" raw= " + raw);
714 if (cooked != null) {
715 builder.append(" cooked = " );
716 for (String str : cooked) {
717 builder.append(" " + str);
718 }
719 }
San Mehata5078592010-03-25 09:36:54 -0700720 Slog.i(TAG, builder.toString());
Suchi Amalapurapu8a9ab242010-03-11 16:49:16 -0800721 }
San Mehat4270e1e2010-01-29 05:32:19 -0800722 if (code == VoldResponseCode.VolumeStateChange) {
723 /*
724 * One of the volumes we're managing has changed state.
725 * Format: "NNN Volume <label> <path> state changed
726 * from <old_#> (<old_str>) to <new_#> (<new_str>)"
727 */
728 notifyVolumeStateChange(
729 cooked[2], cooked[3], Integer.parseInt(cooked[7]),
730 Integer.parseInt(cooked[10]));
San Mehat4270e1e2010-01-29 05:32:19 -0800731 } else if ((code == VoldResponseCode.VolumeDiskInserted) ||
732 (code == VoldResponseCode.VolumeDiskRemoved) ||
733 (code == VoldResponseCode.VolumeBadRemoval)) {
734 // FMT: NNN Volume <label> <mountpoint> disk inserted (<major>:<minor>)
735 // FMT: NNN Volume <label> <mountpoint> disk removed (<major>:<minor>)
736 // FMT: NNN Volume <label> <mountpoint> bad removal (<major>:<minor>)
Mike Lockwooda5250c92011-05-23 13:44:04 -0400737 String action = null;
San Mehat4270e1e2010-01-29 05:32:19 -0800738 final String label = cooked[2];
739 final String path = cooked[3];
740 int major = -1;
741 int minor = -1;
742
743 try {
744 String devComp = cooked[6].substring(1, cooked[6].length() -1);
745 String[] devTok = devComp.split(":");
746 major = Integer.parseInt(devTok[0]);
747 minor = Integer.parseInt(devTok[1]);
748 } catch (Exception ex) {
San Mehata5078592010-03-25 09:36:54 -0700749 Slog.e(TAG, "Failed to parse major/minor", ex);
San Mehat4270e1e2010-01-29 05:32:19 -0800750 }
751
San Mehat4270e1e2010-01-29 05:32:19 -0800752 if (code == VoldResponseCode.VolumeDiskInserted) {
753 new Thread() {
Jason parks5af0b912010-11-29 09:05:25 -0600754 @Override
San Mehat4270e1e2010-01-29 05:32:19 -0800755 public void run() {
756 try {
757 int rc;
San Mehatb1043402010-02-05 08:26:50 -0800758 if ((rc = doMountVolume(path)) != StorageResultCode.OperationSucceeded) {
San Mehata5078592010-03-25 09:36:54 -0700759 Slog.w(TAG, String.format("Insertion mount failed (%d)", rc));
San Mehat4270e1e2010-01-29 05:32:19 -0800760 }
761 } catch (Exception ex) {
San Mehata5078592010-03-25 09:36:54 -0700762 Slog.w(TAG, "Failed to mount media on insertion", ex);
San Mehat4270e1e2010-01-29 05:32:19 -0800763 }
764 }
765 }.start();
766 } else if (code == VoldResponseCode.VolumeDiskRemoved) {
767 /*
768 * This event gets trumped if we're already in BAD_REMOVAL state
769 */
770 if (getVolumeState(path).equals(Environment.MEDIA_BAD_REMOVAL)) {
771 return true;
772 }
773 /* Send the media unmounted event first */
San Mehata5078592010-03-25 09:36:54 -0700774 if (DEBUG_EVENTS) Slog.i(TAG, "Sending unmounted event first");
San Mehat4270e1e2010-01-29 05:32:19 -0800775 updatePublicVolumeState(path, Environment.MEDIA_UNMOUNTED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400776 sendStorageIntent(Environment.MEDIA_UNMOUNTED, path);
San Mehat4270e1e2010-01-29 05:32:19 -0800777
San Mehata5078592010-03-25 09:36:54 -0700778 if (DEBUG_EVENTS) Slog.i(TAG, "Sending media removed");
San Mehat4270e1e2010-01-29 05:32:19 -0800779 updatePublicVolumeState(path, Environment.MEDIA_REMOVED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400780 action = Intent.ACTION_MEDIA_REMOVED;
San Mehat4270e1e2010-01-29 05:32:19 -0800781 } else if (code == VoldResponseCode.VolumeBadRemoval) {
San Mehata5078592010-03-25 09:36:54 -0700782 if (DEBUG_EVENTS) Slog.i(TAG, "Sending unmounted event first");
San Mehat4270e1e2010-01-29 05:32:19 -0800783 /* Send the media unmounted event first */
784 updatePublicVolumeState(path, Environment.MEDIA_UNMOUNTED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400785 action = Intent.ACTION_MEDIA_UNMOUNTED;
San Mehat4270e1e2010-01-29 05:32:19 -0800786
San Mehata5078592010-03-25 09:36:54 -0700787 if (DEBUG_EVENTS) Slog.i(TAG, "Sending media bad removal");
San Mehat4270e1e2010-01-29 05:32:19 -0800788 updatePublicVolumeState(path, Environment.MEDIA_BAD_REMOVAL);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400789 action = Intent.ACTION_MEDIA_BAD_REMOVAL;
San Mehat4270e1e2010-01-29 05:32:19 -0800790 } else {
San Mehata5078592010-03-25 09:36:54 -0700791 Slog.e(TAG, String.format("Unknown code {%d}", code));
San Mehat4270e1e2010-01-29 05:32:19 -0800792 }
Mike Lockwooda5250c92011-05-23 13:44:04 -0400793
794 if (action != null) {
795 sendStorageIntent(action, path);
796 }
San Mehat4270e1e2010-01-29 05:32:19 -0800797 } else {
798 return false;
799 }
800
Daniel Sandler5f27ef42010-03-16 15:42:02 -0400801 return true;
San Mehat4270e1e2010-01-29 05:32:19 -0800802 }
803
San Mehat207e5382010-02-04 20:46:54 -0800804 private void notifyVolumeStateChange(String label, String path, int oldState, int newState) {
San Mehat4270e1e2010-01-29 05:32:19 -0800805 String vs = getVolumeState(path);
San Mehata5078592010-03-25 09:36:54 -0700806 if (DEBUG_EVENTS) Slog.i(TAG, "notifyVolumeStateChanged::" + vs);
San Mehat4270e1e2010-01-29 05:32:19 -0800807
Mike Lockwooda5250c92011-05-23 13:44:04 -0400808 String action = null;
San Mehat4270e1e2010-01-29 05:32:19 -0800809
Mike Lockwoodbf2dd442010-03-03 06:16:52 -0500810 if (oldState == VolumeState.Shared && newState != oldState) {
San Mehata5078592010-03-25 09:36:54 -0700811 if (LOCAL_LOGD) Slog.d(TAG, "Sending ACTION_MEDIA_UNSHARED intent");
Mike Lockwooda5250c92011-05-23 13:44:04 -0400812 sendStorageIntent(Intent.ACTION_MEDIA_UNSHARED, path);
Mike Lockwoodbf2dd442010-03-03 06:16:52 -0500813 }
814
San Mehat4270e1e2010-01-29 05:32:19 -0800815 if (newState == VolumeState.Init) {
816 } else if (newState == VolumeState.NoMedia) {
817 // NoMedia is handled via Disk Remove events
818 } else if (newState == VolumeState.Idle) {
819 /*
820 * Don't notify if we're in BAD_REMOVAL, NOFS, UNMOUNTABLE, or
821 * if we're in the process of enabling UMS
822 */
823 if (!vs.equals(
824 Environment.MEDIA_BAD_REMOVAL) && !vs.equals(
825 Environment.MEDIA_NOFS) && !vs.equals(
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -0800826 Environment.MEDIA_UNMOUNTABLE) && !getUmsEnabling()) {
San Mehata5078592010-03-25 09:36:54 -0700827 if (DEBUG_EVENTS) Slog.i(TAG, "updating volume state for media bad removal nofs and unmountable");
San Mehat4270e1e2010-01-29 05:32:19 -0800828 updatePublicVolumeState(path, Environment.MEDIA_UNMOUNTED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400829 action = Intent.ACTION_MEDIA_UNMOUNTED;
San Mehat4270e1e2010-01-29 05:32:19 -0800830 }
831 } else if (newState == VolumeState.Pending) {
832 } else if (newState == VolumeState.Checking) {
San Mehata5078592010-03-25 09:36:54 -0700833 if (DEBUG_EVENTS) Slog.i(TAG, "updating volume state checking");
San Mehat4270e1e2010-01-29 05:32:19 -0800834 updatePublicVolumeState(path, Environment.MEDIA_CHECKING);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400835 action = Intent.ACTION_MEDIA_CHECKING;
San Mehat4270e1e2010-01-29 05:32:19 -0800836 } else if (newState == VolumeState.Mounted) {
San Mehata5078592010-03-25 09:36:54 -0700837 if (DEBUG_EVENTS) Slog.i(TAG, "updating volume state mounted");
San Mehat4270e1e2010-01-29 05:32:19 -0800838 updatePublicVolumeState(path, Environment.MEDIA_MOUNTED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400839 action = Intent.ACTION_MEDIA_MOUNTED;
San Mehat4270e1e2010-01-29 05:32:19 -0800840 } else if (newState == VolumeState.Unmounting) {
Mike Lockwooda5250c92011-05-23 13:44:04 -0400841 action = Intent.ACTION_MEDIA_EJECT;
San Mehat4270e1e2010-01-29 05:32:19 -0800842 } else if (newState == VolumeState.Formatting) {
843 } else if (newState == VolumeState.Shared) {
San Mehata5078592010-03-25 09:36:54 -0700844 if (DEBUG_EVENTS) Slog.i(TAG, "Updating volume state media mounted");
San Mehat4270e1e2010-01-29 05:32:19 -0800845 /* Send the media unmounted event first */
846 updatePublicVolumeState(path, Environment.MEDIA_UNMOUNTED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400847 sendStorageIntent(Intent.ACTION_MEDIA_UNMOUNTED, path);
San Mehat4270e1e2010-01-29 05:32:19 -0800848
San Mehata5078592010-03-25 09:36:54 -0700849 if (DEBUG_EVENTS) Slog.i(TAG, "Updating media shared");
San Mehat4270e1e2010-01-29 05:32:19 -0800850 updatePublicVolumeState(path, Environment.MEDIA_SHARED);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400851 action = Intent.ACTION_MEDIA_SHARED;
San Mehata5078592010-03-25 09:36:54 -0700852 if (LOCAL_LOGD) Slog.d(TAG, "Sending ACTION_MEDIA_SHARED intent");
San Mehat4270e1e2010-01-29 05:32:19 -0800853 } else if (newState == VolumeState.SharedMnt) {
San Mehata5078592010-03-25 09:36:54 -0700854 Slog.e(TAG, "Live shared mounts not supported yet!");
San Mehat4270e1e2010-01-29 05:32:19 -0800855 return;
856 } else {
San Mehata5078592010-03-25 09:36:54 -0700857 Slog.e(TAG, "Unhandled VolumeState {" + newState + "}");
San Mehat4270e1e2010-01-29 05:32:19 -0800858 }
859
Mike Lockwooda5250c92011-05-23 13:44:04 -0400860 if (action != null) {
861 sendStorageIntent(action, path);
San Mehat4270e1e2010-01-29 05:32:19 -0800862 }
863 }
864
San Mehat207e5382010-02-04 20:46:54 -0800865 private int doMountVolume(String path) {
San Mehatb1043402010-02-05 08:26:50 -0800866 int rc = StorageResultCode.OperationSucceeded;
San Mehat207e5382010-02-04 20:46:54 -0800867
San Mehata5078592010-03-25 09:36:54 -0700868 if (DEBUG_EVENTS) Slog.i(TAG, "doMountVolume: Mouting " + path);
San Mehat207e5382010-02-04 20:46:54 -0800869 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800870 mConnector.execute("volume", "mount", path);
San Mehat207e5382010-02-04 20:46:54 -0800871 } catch (NativeDaemonConnectorException e) {
872 /*
873 * Mount failed for some reason
874 */
Mike Lockwooda5250c92011-05-23 13:44:04 -0400875 String action = null;
San Mehat207e5382010-02-04 20:46:54 -0800876 int code = e.getCode();
877 if (code == VoldResponseCode.OpFailedNoMedia) {
878 /*
879 * Attempt to mount but no media inserted
880 */
San Mehatb1043402010-02-05 08:26:50 -0800881 rc = StorageResultCode.OperationFailedNoMedia;
San Mehat207e5382010-02-04 20:46:54 -0800882 } else if (code == VoldResponseCode.OpFailedMediaBlank) {
San Mehata5078592010-03-25 09:36:54 -0700883 if (DEBUG_EVENTS) Slog.i(TAG, " updating volume state :: media nofs");
San Mehat207e5382010-02-04 20:46:54 -0800884 /*
885 * Media is blank or does not contain a supported filesystem
886 */
887 updatePublicVolumeState(path, Environment.MEDIA_NOFS);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400888 action = Intent.ACTION_MEDIA_NOFS;
San Mehatb1043402010-02-05 08:26:50 -0800889 rc = StorageResultCode.OperationFailedMediaBlank;
San Mehat207e5382010-02-04 20:46:54 -0800890 } else if (code == VoldResponseCode.OpFailedMediaCorrupt) {
San Mehata5078592010-03-25 09:36:54 -0700891 if (DEBUG_EVENTS) Slog.i(TAG, "updating volume state media corrupt");
San Mehat207e5382010-02-04 20:46:54 -0800892 /*
893 * Volume consistency check failed
894 */
895 updatePublicVolumeState(path, Environment.MEDIA_UNMOUNTABLE);
Mike Lockwooda5250c92011-05-23 13:44:04 -0400896 action = Intent.ACTION_MEDIA_UNMOUNTABLE;
San Mehatb1043402010-02-05 08:26:50 -0800897 rc = StorageResultCode.OperationFailedMediaCorrupt;
San Mehat207e5382010-02-04 20:46:54 -0800898 } else {
San Mehatb1043402010-02-05 08:26:50 -0800899 rc = StorageResultCode.OperationFailedInternalError;
San Mehat207e5382010-02-04 20:46:54 -0800900 }
901
902 /*
903 * Send broadcast intent (if required for the failure)
904 */
Mike Lockwooda5250c92011-05-23 13:44:04 -0400905 if (action != null) {
906 sendStorageIntent(action, path);
San Mehat207e5382010-02-04 20:46:54 -0800907 }
908 }
909
910 return rc;
911 }
912
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800913 /*
914 * If force is not set, we do not unmount if there are
915 * processes holding references to the volume about to be unmounted.
916 * If force is set, all the processes holding references need to be
917 * killed via the ActivityManager before actually unmounting the volume.
918 * This might even take a while and might be retried after timed delays
919 * to make sure we dont end up in an instable state and kill some core
920 * processes.
Ben Komalo13c71972011-09-07 16:35:56 -0700921 * If removeEncryption is set, force is implied, and the system will remove any encryption
922 * mapping set on the volume when unmounting.
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800923 */
Ben Komalo13c71972011-09-07 16:35:56 -0700924 private int doUnmountVolume(String path, boolean force, boolean removeEncryption) {
San Mehat59443a62010-02-09 13:28:45 -0800925 if (!getVolumeState(path).equals(Environment.MEDIA_MOUNTED)) {
San Mehat207e5382010-02-04 20:46:54 -0800926 return VoldResponseCode.OpFailedVolNotMounted;
927 }
Kenny Rootaa485402010-09-14 14:49:41 -0700928
929 /*
930 * Force a GC to make sure AssetManagers in other threads of the
931 * system_server are cleaned up. We have to do this since AssetManager
932 * instances are kept as a WeakReference and it's possible we have files
933 * open on the external storage.
934 */
935 Runtime.getRuntime().gc();
936
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -0800937 // Redundant probably. But no harm in updating state again.
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -0700938 mPms.updateExternalMediaStatus(false, false);
San Mehat207e5382010-02-04 20:46:54 -0800939 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800940 final Command cmd = new Command("volume", "unmount", path);
941 if (removeEncryption) {
942 cmd.appendArg("force_and_revert");
943 } else if (force) {
944 cmd.appendArg("force");
945 }
946 mConnector.execute(cmd);
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -0700947 // We unmounted the volume. None of the asec containers are available now.
948 synchronized (mAsecMountSet) {
949 mAsecMountSet.clear();
950 }
San Mehatb1043402010-02-05 08:26:50 -0800951 return StorageResultCode.OperationSucceeded;
San Mehat207e5382010-02-04 20:46:54 -0800952 } catch (NativeDaemonConnectorException e) {
953 // Don't worry about mismatch in PackageManager since the
954 // call back will handle the status changes any way.
955 int code = e.getCode();
956 if (code == VoldResponseCode.OpFailedVolNotMounted) {
San Mehata181b212010-02-11 06:50:20 -0800957 return StorageResultCode.OperationFailedStorageNotMounted;
San Mehatd9709982010-02-18 11:43:03 -0800958 } else if (code == VoldResponseCode.OpFailedStorageBusy) {
959 return StorageResultCode.OperationFailedStorageBusy;
San Mehat207e5382010-02-04 20:46:54 -0800960 } else {
San Mehatb1043402010-02-05 08:26:50 -0800961 return StorageResultCode.OperationFailedInternalError;
San Mehat207e5382010-02-04 20:46:54 -0800962 }
963 }
964 }
965
966 private int doFormatVolume(String path) {
967 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800968 mConnector.execute("volume", "format", path);
San Mehatb1043402010-02-05 08:26:50 -0800969 return StorageResultCode.OperationSucceeded;
San Mehat207e5382010-02-04 20:46:54 -0800970 } catch (NativeDaemonConnectorException e) {
971 int code = e.getCode();
972 if (code == VoldResponseCode.OpFailedNoMedia) {
San Mehatb1043402010-02-05 08:26:50 -0800973 return StorageResultCode.OperationFailedNoMedia;
San Mehat207e5382010-02-04 20:46:54 -0800974 } else if (code == VoldResponseCode.OpFailedMediaCorrupt) {
San Mehatb1043402010-02-05 08:26:50 -0800975 return StorageResultCode.OperationFailedMediaCorrupt;
San Mehat207e5382010-02-04 20:46:54 -0800976 } else {
San Mehatb1043402010-02-05 08:26:50 -0800977 return StorageResultCode.OperationFailedInternalError;
San Mehat207e5382010-02-04 20:46:54 -0800978 }
979 }
980 }
981
San Mehatb1043402010-02-05 08:26:50 -0800982 private boolean doGetVolumeShared(String path, String method) {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800983 final NativeDaemonEvent event;
Kenny Roota80ce062010-06-01 13:23:53 -0700984 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800985 event = mConnector.execute("volume", "shared", path, method);
Kenny Roota80ce062010-06-01 13:23:53 -0700986 } catch (NativeDaemonConnectorException ex) {
987 Slog.e(TAG, "Failed to read response to volume shared " + path + " " + method);
988 return false;
989 }
San Mehatb1043402010-02-05 08:26:50 -0800990
Jeff Sharkeydd519fa2011-12-02 14:11:21 -0800991 if (event.getCode() == VoldResponseCode.ShareEnabledResult) {
992 return event.getMessage().endsWith("enabled");
993 } else {
994 return false;
San Mehatb1043402010-02-05 08:26:50 -0800995 }
San Mehatb1043402010-02-05 08:26:50 -0800996 }
997
Mike Lockwoodecedfdc2011-06-08 15:11:59 -0700998 private void notifyShareAvailabilityChange(final boolean avail) {
San Mehat4270e1e2010-01-29 05:32:19 -0800999 synchronized (mListeners) {
Mike Lockwoodecedfdc2011-06-08 15:11:59 -07001000 mUmsAvailable = avail;
San Mehat4270e1e2010-01-29 05:32:19 -08001001 for (int i = mListeners.size() -1; i >= 0; i--) {
1002 MountServiceBinderListener bl = mListeners.get(i);
1003 try {
San Mehatb1043402010-02-05 08:26:50 -08001004 bl.mListener.onUsbMassStorageConnectionChanged(avail);
San Mehat4270e1e2010-01-29 05:32:19 -08001005 } catch (RemoteException rex) {
San Mehata5078592010-03-25 09:36:54 -07001006 Slog.e(TAG, "Listener dead");
San Mehat4270e1e2010-01-29 05:32:19 -08001007 mListeners.remove(i);
1008 } catch (Exception ex) {
San Mehata5078592010-03-25 09:36:54 -07001009 Slog.e(TAG, "Listener failed", ex);
San Mehat4270e1e2010-01-29 05:32:19 -08001010 }
1011 }
1012 }
1013
San Mehat207e5382010-02-04 20:46:54 -08001014 if (mBooted == true) {
San Mehat6a965af22010-02-24 17:47:30 -08001015 sendUmsIntent(avail);
1016 } else {
1017 mSendUmsConnectedOnBoot = avail;
San Mehat4270e1e2010-01-29 05:32:19 -08001018 }
San Mehat2fe718a2010-03-11 12:01:49 -08001019
1020 final String path = Environment.getExternalStorageDirectory().getPath();
1021 if (avail == false && getVolumeState(path).equals(Environment.MEDIA_SHARED)) {
1022 /*
1023 * USB mass storage disconnected while enabled
1024 */
1025 new Thread() {
Jason parks5af0b912010-11-29 09:05:25 -06001026 @Override
San Mehat2fe718a2010-03-11 12:01:49 -08001027 public void run() {
1028 try {
1029 int rc;
San Mehata5078592010-03-25 09:36:54 -07001030 Slog.w(TAG, "Disabling UMS after cable disconnect");
San Mehat2fe718a2010-03-11 12:01:49 -08001031 doShareUnshareVolume(path, "ums", false);
1032 if ((rc = doMountVolume(path)) != StorageResultCode.OperationSucceeded) {
San Mehata5078592010-03-25 09:36:54 -07001033 Slog.e(TAG, String.format(
San Mehat2fe718a2010-03-11 12:01:49 -08001034 "Failed to remount {%s} on UMS enabled-disconnect (%d)",
1035 path, rc));
1036 }
1037 } catch (Exception ex) {
San Mehata5078592010-03-25 09:36:54 -07001038 Slog.w(TAG, "Failed to mount media on UMS enabled-disconnect", ex);
San Mehat2fe718a2010-03-11 12:01:49 -08001039 }
1040 }
1041 }.start();
1042 }
San Mehat4270e1e2010-01-29 05:32:19 -08001043 }
1044
Mike Lockwooda5250c92011-05-23 13:44:04 -04001045 private void sendStorageIntent(String action, String path) {
1046 Intent intent = new Intent(action, Uri.parse("file://" + path));
1047 // add StorageVolume extra
1048 intent.putExtra(StorageVolume.EXTRA_STORAGE_VOLUME, mVolumeMap.get(path));
1049 Slog.d(TAG, "sendStorageIntent " + intent);
1050 mContext.sendBroadcast(intent);
1051 }
1052
San Mehat6a965af22010-02-24 17:47:30 -08001053 private void sendUmsIntent(boolean c) {
1054 mContext.sendBroadcast(
1055 new Intent((c ? Intent.ACTION_UMS_CONNECTED : Intent.ACTION_UMS_DISCONNECTED)));
1056 }
1057
San Mehat207e5382010-02-04 20:46:54 -08001058 private void validatePermission(String perm) {
San Mehat4270e1e2010-01-29 05:32:19 -08001059 if (mContext.checkCallingOrSelfPermission(perm) != PackageManager.PERMISSION_GRANTED) {
1060 throw new SecurityException(String.format("Requires %s permission", perm));
1061 }
1062 }
1063
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001064 // Storage list XML tags
1065 private static final String TAG_STORAGE_LIST = "StorageList";
1066 private static final String TAG_STORAGE = "storage";
1067
Fabrice Di Meglio13fe2a52012-05-18 18:08:58 -07001068 private void readStorageList() {
1069 Resources resources = mContext.getResources();
1070
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001071 int id = com.android.internal.R.xml.storage_list;
1072 XmlResourceParser parser = resources.getXml(id);
1073 AttributeSet attrs = Xml.asAttributeSet(parser);
1074
1075 try {
1076 XmlUtils.beginDocument(parser, TAG_STORAGE_LIST);
1077 while (true) {
1078 XmlUtils.nextElement(parser);
1079
1080 String element = parser.getName();
1081 if (element == null) break;
1082
1083 if (TAG_STORAGE.equals(element)) {
1084 TypedArray a = resources.obtainAttributes(attrs,
1085 com.android.internal.R.styleable.Storage);
1086
1087 CharSequence path = a.getText(
1088 com.android.internal.R.styleable.Storage_mountPoint);
Fabrice Di Meglio13fe2a52012-05-18 18:08:58 -07001089 int descriptionId = a.getResourceId(
1090 com.android.internal.R.styleable.Storage_storageDescription, -1);
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001091 CharSequence description = a.getText(
1092 com.android.internal.R.styleable.Storage_storageDescription);
1093 boolean primary = a.getBoolean(
1094 com.android.internal.R.styleable.Storage_primary, false);
1095 boolean removable = a.getBoolean(
1096 com.android.internal.R.styleable.Storage_removable, false);
1097 boolean emulated = a.getBoolean(
1098 com.android.internal.R.styleable.Storage_emulated, false);
1099 int mtpReserve = a.getInt(
1100 com.android.internal.R.styleable.Storage_mtpReserve, 0);
Mike Lockwood8e8b2802011-06-07 08:03:33 -07001101 boolean allowMassStorage = a.getBoolean(
1102 com.android.internal.R.styleable.Storage_allowMassStorage, false);
Mike Lockwood7a59dd22011-07-11 09:18:03 -04001103 // resource parser does not support longs, so XML value is in megabytes
1104 long maxFileSize = a.getInt(
1105 com.android.internal.R.styleable.Storage_maxFileSize, 0) * 1024L * 1024L;
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001106
1107 Slog.d(TAG, "got storage path: " + path + " description: " + description +
1108 " primary: " + primary + " removable: " + removable +
Mike Lockwood8e8b2802011-06-07 08:03:33 -07001109 " emulated: " + emulated + " mtpReserve: " + mtpReserve +
Mike Lockwood7a59dd22011-07-11 09:18:03 -04001110 " allowMassStorage: " + allowMassStorage +
1111 " maxFileSize: " + maxFileSize);
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001112 if (path == null || description == null) {
1113 Slog.e(TAG, "path or description is null in readStorageList");
1114 } else {
Mike Lockwooda5250c92011-05-23 13:44:04 -04001115 String pathString = path.toString();
1116 StorageVolume volume = new StorageVolume(pathString,
Fabrice Di Meglio13fe2a52012-05-18 18:08:58 -07001117 descriptionId, removable, emulated,
Mike Lockwood7a59dd22011-07-11 09:18:03 -04001118 mtpReserve, allowMassStorage, maxFileSize);
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001119 if (primary) {
1120 if (mPrimaryVolume == null) {
1121 mPrimaryVolume = volume;
1122 } else {
1123 Slog.e(TAG, "multiple primary volumes in storage list");
1124 }
1125 }
1126 if (mPrimaryVolume == volume) {
1127 // primay volume must be first
1128 mVolumes.add(0, volume);
1129 } else {
1130 mVolumes.add(volume);
1131 }
Mike Lockwooda5250c92011-05-23 13:44:04 -04001132 mVolumeMap.put(pathString, volume);
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001133 }
1134 a.recycle();
1135 }
1136 }
1137 } catch (XmlPullParserException e) {
1138 throw new RuntimeException(e);
1139 } catch (IOException e) {
1140 throw new RuntimeException(e);
1141 } finally {
Mike Lockwoodfbfe5552011-05-17 17:19:37 -04001142 // compute storage ID for each volume
1143 int length = mVolumes.size();
1144 for (int i = 0; i < length; i++) {
1145 mVolumes.get(i).setStorageId(i);
1146 }
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001147 parser.close();
1148 }
1149 }
1150
San Mehat4270e1e2010-01-29 05:32:19 -08001151 /**
San Mehat207e5382010-02-04 20:46:54 -08001152 * Constructs a new MountService instance
1153 *
1154 * @param context Binder context for this service
1155 */
1156 public MountService(Context context) {
1157 mContext = context;
Fabrice Di Meglio13fe2a52012-05-18 18:08:58 -07001158 readStorageList();
San Mehat207e5382010-02-04 20:46:54 -08001159
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001160 if (mPrimaryVolume != null) {
1161 mExternalStoragePath = mPrimaryVolume.getPath();
1162 mEmulateExternalStorage = mPrimaryVolume.isEmulated();
1163 if (mEmulateExternalStorage) {
1164 Slog.d(TAG, "using emulated external storage");
1165 mVolumeStates.put(mExternalStoragePath, Environment.MEDIA_MOUNTED);
1166 }
Mike Lockwood03559752010-07-19 18:25:03 -04001167 }
1168
San Mehat207e5382010-02-04 20:46:54 -08001169 // XXX: This will go away soon in favor of IMountServiceObserver
1170 mPms = (PackageManagerService) ServiceManager.getService("package");
1171
Mike Lockwoodecedfdc2011-06-08 15:11:59 -07001172 IntentFilter filter = new IntentFilter();
1173 filter.addAction(Intent.ACTION_BOOT_COMPLETED);
1174 // don't bother monitoring USB if mass storage is not supported on our primary volume
1175 if (mPrimaryVolume != null && mPrimaryVolume.allowMassStorage()) {
1176 filter.addAction(UsbManager.ACTION_USB_STATE);
1177 }
1178 mContext.registerReceiver(mBroadcastReceiver, filter, null, null);
San Mehat207e5382010-02-04 20:46:54 -08001179
Daniel Sandler5f27ef42010-03-16 15:42:02 -04001180 mHandlerThread = new HandlerThread("MountService");
1181 mHandlerThread.start();
1182 mHandler = new MountServiceHandler(mHandlerThread.getLooper());
1183
Kenny Roota02b8b02010-08-05 16:14:17 -07001184 // Add OBB Action Handler to MountService thread.
1185 mObbActionHandler = new ObbActionHandler(mHandlerThread.getLooper());
1186
Marco Nelissenc34ebce2010-02-18 13:39:41 -08001187 /*
Kenny Root305bcbf2010-09-03 07:56:38 -07001188 * Create the connection to vold with a maximum queue of twice the
1189 * amount of containers we'd ever expect to have. This keeps an
1190 * "asec list" from blocking a thread repeatedly.
1191 */
Robert Greenwalt470fd722012-01-18 12:51:15 -08001192 mConnector = new NativeDaemonConnector(this, "vold", MAX_CONTAINERS * 2, VOLD_TAG, 25);
Kenny Root51a573c2012-05-17 13:30:28 -07001193
Kenny Root305bcbf2010-09-03 07:56:38 -07001194 Thread thread = new Thread(mConnector, VOLD_TAG);
San Mehat207e5382010-02-04 20:46:54 -08001195 thread.start();
Jeff Sharkeyfa23c5a2011-08-09 21:44:24 -07001196
Kenny Root07714d42011-08-17 17:49:28 -07001197 // Add ourself to the Watchdog monitors if enabled.
1198 if (WATCHDOG_ENABLE) {
1199 Watchdog.getInstance().addMonitor(this);
1200 }
San Mehat207e5382010-02-04 20:46:54 -08001201 }
1202
1203 /**
San Mehat4270e1e2010-01-29 05:32:19 -08001204 * Exposed API calls below here
1205 */
1206
1207 public void registerListener(IMountServiceListener listener) {
1208 synchronized (mListeners) {
1209 MountServiceBinderListener bl = new MountServiceBinderListener(listener);
1210 try {
1211 listener.asBinder().linkToDeath(bl, 0);
1212 mListeners.add(bl);
1213 } catch (RemoteException rex) {
San Mehata5078592010-03-25 09:36:54 -07001214 Slog.e(TAG, "Failed to link to listener death");
San Mehat4270e1e2010-01-29 05:32:19 -08001215 }
1216 }
1217 }
1218
1219 public void unregisterListener(IMountServiceListener listener) {
1220 synchronized (mListeners) {
1221 for(MountServiceBinderListener bl : mListeners) {
1222 if (bl.mListener == listener) {
1223 mListeners.remove(mListeners.indexOf(bl));
Vairavan Srinivasan5c25a2d2012-01-24 08:22:14 -08001224 listener.asBinder().unlinkToDeath(bl, 0);
San Mehat4270e1e2010-01-29 05:32:19 -08001225 return;
1226 }
1227 }
1228 }
1229 }
1230
Suchi Amalapurapu6ffce2e2010-03-08 14:48:40 -08001231 public void shutdown(final IMountShutdownObserver observer) {
San Mehat4270e1e2010-01-29 05:32:19 -08001232 validatePermission(android.Manifest.permission.SHUTDOWN);
1233
San Mehata5078592010-03-25 09:36:54 -07001234 Slog.i(TAG, "Shutting down");
Mike Lockwood7fa24aa2011-03-23 14:52:34 -04001235 synchronized (mVolumeStates) {
1236 for (String path : mVolumeStates.keySet()) {
1237 String state = mVolumeStates.get(path);
San Mehat4270e1e2010-01-29 05:32:19 -08001238
Mike Lockwood7fa24aa2011-03-23 14:52:34 -04001239 if (state.equals(Environment.MEDIA_SHARED)) {
1240 /*
1241 * If the media is currently shared, unshare it.
1242 * XXX: This is still dangerous!. We should not
1243 * be rebooting at *all* if UMS is enabled, since
1244 * the UMS host could have dirty FAT cache entries
1245 * yet to flush.
1246 */
1247 setUsbMassStorageEnabled(false);
1248 } else if (state.equals(Environment.MEDIA_CHECKING)) {
1249 /*
1250 * If the media is being checked, then we need to wait for
1251 * it to complete before being able to proceed.
1252 */
1253 // XXX: @hackbod - Should we disable the ANR timer here?
1254 int retries = 30;
1255 while (state.equals(Environment.MEDIA_CHECKING) && (retries-- >=0)) {
1256 try {
1257 Thread.sleep(1000);
1258 } catch (InterruptedException iex) {
1259 Slog.e(TAG, "Interrupted while waiting for media", iex);
1260 break;
1261 }
1262 state = Environment.getExternalStorageState();
1263 }
1264 if (retries == 0) {
1265 Slog.e(TAG, "Timed out waiting for media to check");
1266 }
San Mehat91c77612010-01-07 10:39:41 -08001267 }
San Mehat91c77612010-01-07 10:39:41 -08001268
Mike Lockwood7fa24aa2011-03-23 14:52:34 -04001269 if (state.equals(Environment.MEDIA_MOUNTED)) {
1270 // Post a unmount message.
1271 ShutdownCallBack ucb = new ShutdownCallBack(path, observer);
1272 mHandler.sendMessage(mHandler.obtainMessage(H_UNMOUNT_PM_UPDATE, ucb));
1273 } else if (observer != null) {
1274 /*
1275 * Observer is waiting for onShutDownComplete when we are done.
1276 * Since nothing will be done send notification directly so shutdown
1277 * sequence can continue.
1278 */
1279 try {
1280 observer.onShutDownComplete(StorageResultCode.OperationSucceeded);
1281 } catch (RemoteException e) {
1282 Slog.w(TAG, "RemoteException when shutting down");
1283 }
1284 }
Johan Alfven5d0db4d2010-11-09 10:32:25 +01001285 }
San Mehat4270e1e2010-01-29 05:32:19 -08001286 }
1287 }
1288
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001289 private boolean getUmsEnabling() {
1290 synchronized (mListeners) {
1291 return mUmsEnabling;
1292 }
1293 }
1294
1295 private void setUmsEnabling(boolean enable) {
1296 synchronized (mListeners) {
Tony Wufc711252010-08-09 16:49:19 +08001297 mUmsEnabling = enable;
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001298 }
1299 }
1300
San Mehatb1043402010-02-05 08:26:50 -08001301 public boolean isUsbMassStorageConnected() {
San Mehat207e5382010-02-04 20:46:54 -08001302 waitForReady();
San Mehat91c77612010-01-07 10:39:41 -08001303
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001304 if (getUmsEnabling()) {
San Mehatb1043402010-02-05 08:26:50 -08001305 return true;
San Mehat7fd0fee2009-12-17 07:12:23 -08001306 }
Mike Lockwoodecedfdc2011-06-08 15:11:59 -07001307 synchronized (mListeners) {
1308 return mUmsAvailable;
1309 }
San Mehatb1043402010-02-05 08:26:50 -08001310 }
1311
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001312 public void setUsbMassStorageEnabled(boolean enable) {
San Mehatb1043402010-02-05 08:26:50 -08001313 waitForReady();
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001314 validatePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
San Mehatb1043402010-02-05 08:26:50 -08001315
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001316 // TODO: Add support for multiple share methods
1317
1318 /*
1319 * If the volume is mounted and we're enabling then unmount it
1320 */
1321 String path = Environment.getExternalStorageDirectory().getPath();
1322 String vs = getVolumeState(path);
1323 String method = "ums";
1324 if (enable && vs.equals(Environment.MEDIA_MOUNTED)) {
1325 // Override for isUsbMassStorageEnabled()
1326 setUmsEnabling(enable);
1327 UmsEnableCallBack umscb = new UmsEnableCallBack(path, method, true);
1328 mHandler.sendMessage(mHandler.obtainMessage(H_UNMOUNT_PM_UPDATE, umscb));
1329 // Clear override
1330 setUmsEnabling(false);
1331 }
1332 /*
1333 * If we disabled UMS then mount the volume
1334 */
1335 if (!enable) {
1336 doShareUnshareVolume(path, method, enable);
1337 if (doMountVolume(path) != StorageResultCode.OperationSucceeded) {
San Mehata5078592010-03-25 09:36:54 -07001338 Slog.e(TAG, "Failed to remount " + path +
Suchi Amalapurapu0eec21d2010-02-25 17:07:14 -08001339 " after disabling share method " + method);
1340 /*
1341 * Even though the mount failed, the unshare didn't so don't indicate an error.
1342 * The mountVolume() call will have set the storage state and sent the necessary
1343 * broadcasts.
1344 */
1345 }
1346 }
San Mehatb1043402010-02-05 08:26:50 -08001347 }
1348
1349 public boolean isUsbMassStorageEnabled() {
1350 waitForReady();
1351 return doGetVolumeShared(Environment.getExternalStorageDirectory().getPath(), "ums");
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001352 }
Jason parks9ed98bc2011-01-17 09:58:35 -06001353
San Mehat7fd0fee2009-12-17 07:12:23 -08001354 /**
1355 * @return state of the volume at the specified mount point
1356 */
San Mehat4270e1e2010-01-29 05:32:19 -08001357 public String getVolumeState(String mountPoint) {
Mike Lockwood7fa24aa2011-03-23 14:52:34 -04001358 synchronized (mVolumeStates) {
1359 String state = mVolumeStates.get(mountPoint);
1360 if (state == null) {
1361 Slog.w(TAG, "getVolumeState(" + mountPoint + "): Unknown volume");
Ken Sumrall18db5c52011-07-14 11:35:06 -07001362 if (SystemProperties.get("vold.encrypt_progress").length() != 0) {
1363 state = Environment.MEDIA_REMOVED;
1364 } else {
1365 throw new IllegalArgumentException();
1366 }
Mike Lockwood7fa24aa2011-03-23 14:52:34 -04001367 }
San Mehat7fd0fee2009-12-17 07:12:23 -08001368
Mike Lockwood7fa24aa2011-03-23 14:52:34 -04001369 return state;
1370 }
San Mehat7fd0fee2009-12-17 07:12:23 -08001371 }
1372
Kenny Roote1ff2142010-10-12 11:20:01 -07001373 public boolean isExternalStorageEmulated() {
1374 return mEmulateExternalStorage;
1375 }
1376
San Mehat4270e1e2010-01-29 05:32:19 -08001377 public int mountVolume(String path) {
1378 validatePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
San Mehat4270e1e2010-01-29 05:32:19 -08001379
San Mehat207e5382010-02-04 20:46:54 -08001380 waitForReady();
1381 return doMountVolume(path);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001382 }
1383
Ben Komalo13c71972011-09-07 16:35:56 -07001384 public void unmountVolume(String path, boolean force, boolean removeEncryption) {
San Mehat4270e1e2010-01-29 05:32:19 -08001385 validatePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
San Mehat207e5382010-02-04 20:46:54 -08001386 waitForReady();
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001387
Suchi Amalapurapu8a9ab242010-03-11 16:49:16 -08001388 String volState = getVolumeState(path);
Ben Komalo13c71972011-09-07 16:35:56 -07001389 if (DEBUG_UNMOUNT) {
1390 Slog.i(TAG, "Unmounting " + path
1391 + " force = " + force
1392 + " removeEncryption = " + removeEncryption);
1393 }
Suchi Amalapurapu8a9ab242010-03-11 16:49:16 -08001394 if (Environment.MEDIA_UNMOUNTED.equals(volState) ||
1395 Environment.MEDIA_REMOVED.equals(volState) ||
1396 Environment.MEDIA_SHARED.equals(volState) ||
1397 Environment.MEDIA_UNMOUNTABLE.equals(volState)) {
1398 // Media already unmounted or cannot be unmounted.
1399 // TODO return valid return code when adding observer call back.
1400 return;
1401 }
Ben Komalo13c71972011-09-07 16:35:56 -07001402 UnmountCallBack ucb = new UnmountCallBack(path, force, removeEncryption);
Suchi Amalapurapuc42e29e2010-02-22 16:03:53 -08001403 mHandler.sendMessage(mHandler.obtainMessage(H_UNMOUNT_PM_UPDATE, ucb));
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001404 }
1405
San Mehat4270e1e2010-01-29 05:32:19 -08001406 public int formatVolume(String path) {
1407 validatePermission(android.Manifest.permission.MOUNT_FORMAT_FILESYSTEMS);
San Mehat207e5382010-02-04 20:46:54 -08001408 waitForReady();
San Mehat5b77dab2010-01-26 13:28:50 -08001409
San Mehat207e5382010-02-04 20:46:54 -08001410 return doFormatVolume(path);
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001411 }
1412
Mike Lockwoodecedfdc2011-06-08 15:11:59 -07001413 public int[] getStorageUsers(String path) {
San Mehatc1b4ce92010-02-16 17:13:03 -08001414 validatePermission(android.Manifest.permission.MOUNT_UNMOUNT_FILESYSTEMS);
1415 waitForReady();
1416 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001417 final String[] r = NativeDaemonEvent.filterMessageList(
1418 mConnector.executeForList("storage", "users", path),
1419 VoldResponseCode.StorageUsersListResult);
1420
San Mehatc1b4ce92010-02-16 17:13:03 -08001421 // FMT: <pid> <process name>
1422 int[] data = new int[r.length];
1423 for (int i = 0; i < r.length; i++) {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001424 String[] tok = r[i].split(" ");
San Mehatc1b4ce92010-02-16 17:13:03 -08001425 try {
1426 data[i] = Integer.parseInt(tok[0]);
1427 } catch (NumberFormatException nfe) {
San Mehata5078592010-03-25 09:36:54 -07001428 Slog.e(TAG, String.format("Error parsing pid %s", tok[0]));
San Mehatc1b4ce92010-02-16 17:13:03 -08001429 return new int[0];
1430 }
1431 }
1432 return data;
1433 } catch (NativeDaemonConnectorException e) {
San Mehata5078592010-03-25 09:36:54 -07001434 Slog.e(TAG, "Failed to retrieve storage users list", e);
San Mehatc1b4ce92010-02-16 17:13:03 -08001435 return new int[0];
1436 }
1437 }
1438
San Mehatb1043402010-02-05 08:26:50 -08001439 private void warnOnNotMounted() {
1440 if (!Environment.getExternalStorageState().equals(Environment.MEDIA_MOUNTED)) {
San Mehata5078592010-03-25 09:36:54 -07001441 Slog.w(TAG, "getSecureContainerList() called when storage not mounted");
San Mehatb1043402010-02-05 08:26:50 -08001442 }
1443 }
1444
San Mehat4270e1e2010-01-29 05:32:19 -08001445 public String[] getSecureContainerList() {
1446 validatePermission(android.Manifest.permission.ASEC_ACCESS);
San Mehat207e5382010-02-04 20:46:54 -08001447 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001448 warnOnNotMounted();
San Mehatf919cd022010-02-04 15:10:38 -08001449
San Mehat4270e1e2010-01-29 05:32:19 -08001450 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001451 return NativeDaemonEvent.filterMessageList(
1452 mConnector.executeForList("asec", "list"), VoldResponseCode.AsecListResult);
San Mehat4270e1e2010-01-29 05:32:19 -08001453 } catch (NativeDaemonConnectorException e) {
1454 return new String[0];
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08001455 }
1456 }
San Mehat36972292010-01-06 11:06:32 -08001457
Kenny Root6dceb882012-04-12 14:23:49 -07001458 public int createSecureContainer(String id, int sizeMb, String fstype, String key,
1459 int ownerUid, boolean external) {
San Mehat4270e1e2010-01-29 05:32:19 -08001460 validatePermission(android.Manifest.permission.ASEC_CREATE);
San Mehat207e5382010-02-04 20:46:54 -08001461 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001462 warnOnNotMounted();
San Mehat4270e1e2010-01-29 05:32:19 -08001463
San Mehatb1043402010-02-05 08:26:50 -08001464 int rc = StorageResultCode.OperationSucceeded;
San Mehat4270e1e2010-01-29 05:32:19 -08001465 try {
Kenny Root6dceb882012-04-12 14:23:49 -07001466 mConnector.execute("asec", "create", id, sizeMb, fstype, key, ownerUid,
1467 external ? "1" : "0");
San Mehat4270e1e2010-01-29 05:32:19 -08001468 } catch (NativeDaemonConnectorException e) {
San Mehatb1043402010-02-05 08:26:50 -08001469 rc = StorageResultCode.OperationFailedInternalError;
San Mehat02735bc2010-01-26 15:18:08 -08001470 }
San Mehata181b212010-02-11 06:50:20 -08001471
1472 if (rc == StorageResultCode.OperationSucceeded) {
1473 synchronized (mAsecMountSet) {
1474 mAsecMountSet.add(id);
1475 }
1476 }
San Mehat4270e1e2010-01-29 05:32:19 -08001477 return rc;
San Mehat36972292010-01-06 11:06:32 -08001478 }
1479
San Mehat4270e1e2010-01-29 05:32:19 -08001480 public int finalizeSecureContainer(String id) {
1481 validatePermission(android.Manifest.permission.ASEC_CREATE);
San Mehatb1043402010-02-05 08:26:50 -08001482 warnOnNotMounted();
San Mehat4270e1e2010-01-29 05:32:19 -08001483
San Mehatb1043402010-02-05 08:26:50 -08001484 int rc = StorageResultCode.OperationSucceeded;
San Mehat4270e1e2010-01-29 05:32:19 -08001485 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001486 mConnector.execute("asec", "finalize", id);
San Mehata181b212010-02-11 06:50:20 -08001487 /*
1488 * Finalization does a remount, so no need
1489 * to update mAsecMountSet
1490 */
San Mehat4270e1e2010-01-29 05:32:19 -08001491 } catch (NativeDaemonConnectorException e) {
San Mehatb1043402010-02-05 08:26:50 -08001492 rc = StorageResultCode.OperationFailedInternalError;
San Mehat02735bc2010-01-26 15:18:08 -08001493 }
San Mehat4270e1e2010-01-29 05:32:19 -08001494 return rc;
San Mehat36972292010-01-06 11:06:32 -08001495 }
1496
Kenny Root6dceb882012-04-12 14:23:49 -07001497 public int fixPermissionsSecureContainer(String id, int gid, String filename) {
1498 validatePermission(android.Manifest.permission.ASEC_CREATE);
1499 warnOnNotMounted();
1500
1501 int rc = StorageResultCode.OperationSucceeded;
1502 try {
1503 mConnector.execute("asec", "fixperms", id, gid, filename);
1504 /*
1505 * Fix permissions does a remount, so no need to update
1506 * mAsecMountSet
1507 */
1508 } catch (NativeDaemonConnectorException e) {
1509 rc = StorageResultCode.OperationFailedInternalError;
1510 }
1511 return rc;
1512 }
1513
San Mehatd9709982010-02-18 11:43:03 -08001514 public int destroySecureContainer(String id, boolean force) {
San Mehat4270e1e2010-01-29 05:32:19 -08001515 validatePermission(android.Manifest.permission.ASEC_DESTROY);
San Mehat207e5382010-02-04 20:46:54 -08001516 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001517 warnOnNotMounted();
San Mehatf919cd022010-02-04 15:10:38 -08001518
Kenny Rootaa485402010-09-14 14:49:41 -07001519 /*
1520 * Force a GC to make sure AssetManagers in other threads of the
1521 * system_server are cleaned up. We have to do this since AssetManager
1522 * instances are kept as a WeakReference and it's possible we have files
1523 * open on the external storage.
1524 */
1525 Runtime.getRuntime().gc();
1526
San Mehatb1043402010-02-05 08:26:50 -08001527 int rc = StorageResultCode.OperationSucceeded;
San Mehat4270e1e2010-01-29 05:32:19 -08001528 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001529 final Command cmd = new Command("asec", "destroy", id);
1530 if (force) {
1531 cmd.appendArg("force");
1532 }
1533 mConnector.execute(cmd);
San Mehat4270e1e2010-01-29 05:32:19 -08001534 } catch (NativeDaemonConnectorException e) {
San Mehatd9709982010-02-18 11:43:03 -08001535 int code = e.getCode();
1536 if (code == VoldResponseCode.OpFailedStorageBusy) {
1537 rc = StorageResultCode.OperationFailedStorageBusy;
1538 } else {
1539 rc = StorageResultCode.OperationFailedInternalError;
1540 }
San Mehat02735bc2010-01-26 15:18:08 -08001541 }
San Mehata181b212010-02-11 06:50:20 -08001542
1543 if (rc == StorageResultCode.OperationSucceeded) {
1544 synchronized (mAsecMountSet) {
1545 if (mAsecMountSet.contains(id)) {
1546 mAsecMountSet.remove(id);
1547 }
1548 }
1549 }
1550
San Mehat4270e1e2010-01-29 05:32:19 -08001551 return rc;
San Mehat36972292010-01-06 11:06:32 -08001552 }
Jason parks9ed98bc2011-01-17 09:58:35 -06001553
San Mehat4270e1e2010-01-29 05:32:19 -08001554 public int mountSecureContainer(String id, String key, int ownerUid) {
1555 validatePermission(android.Manifest.permission.ASEC_MOUNT_UNMOUNT);
San Mehat207e5382010-02-04 20:46:54 -08001556 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001557 warnOnNotMounted();
San Mehat4270e1e2010-01-29 05:32:19 -08001558
San Mehata181b212010-02-11 06:50:20 -08001559 synchronized (mAsecMountSet) {
1560 if (mAsecMountSet.contains(id)) {
1561 return StorageResultCode.OperationFailedStorageMounted;
1562 }
1563 }
1564
San Mehatb1043402010-02-05 08:26:50 -08001565 int rc = StorageResultCode.OperationSucceeded;
San Mehat4270e1e2010-01-29 05:32:19 -08001566 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001567 mConnector.execute("asec", "mount", id, key, ownerUid);
San Mehat4270e1e2010-01-29 05:32:19 -08001568 } catch (NativeDaemonConnectorException e) {
Kenny Rootf0304622010-03-19 19:20:42 -07001569 int code = e.getCode();
1570 if (code != VoldResponseCode.OpFailedStorageBusy) {
1571 rc = StorageResultCode.OperationFailedInternalError;
1572 }
San Mehat02735bc2010-01-26 15:18:08 -08001573 }
San Mehat6cdd9c02010-02-09 14:45:20 -08001574
1575 if (rc == StorageResultCode.OperationSucceeded) {
1576 synchronized (mAsecMountSet) {
1577 mAsecMountSet.add(id);
1578 }
1579 }
San Mehat4270e1e2010-01-29 05:32:19 -08001580 return rc;
San Mehat36972292010-01-06 11:06:32 -08001581 }
1582
San Mehatd9709982010-02-18 11:43:03 -08001583 public int unmountSecureContainer(String id, boolean force) {
San Mehat4270e1e2010-01-29 05:32:19 -08001584 validatePermission(android.Manifest.permission.ASEC_MOUNT_UNMOUNT);
San Mehat207e5382010-02-04 20:46:54 -08001585 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001586 warnOnNotMounted();
San Mehat4270e1e2010-01-29 05:32:19 -08001587
San Mehat6cdd9c02010-02-09 14:45:20 -08001588 synchronized (mAsecMountSet) {
1589 if (!mAsecMountSet.contains(id)) {
San Mehata181b212010-02-11 06:50:20 -08001590 return StorageResultCode.OperationFailedStorageNotMounted;
San Mehat6cdd9c02010-02-09 14:45:20 -08001591 }
1592 }
1593
Kenny Rootaa485402010-09-14 14:49:41 -07001594 /*
1595 * Force a GC to make sure AssetManagers in other threads of the
1596 * system_server are cleaned up. We have to do this since AssetManager
1597 * instances are kept as a WeakReference and it's possible we have files
1598 * open on the external storage.
1599 */
1600 Runtime.getRuntime().gc();
1601
San Mehatb1043402010-02-05 08:26:50 -08001602 int rc = StorageResultCode.OperationSucceeded;
San Mehat4270e1e2010-01-29 05:32:19 -08001603 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001604 final Command cmd = new Command("asec", "unmount", id);
1605 if (force) {
1606 cmd.appendArg("force");
1607 }
1608 mConnector.execute(cmd);
San Mehat4270e1e2010-01-29 05:32:19 -08001609 } catch (NativeDaemonConnectorException e) {
San Mehatd9709982010-02-18 11:43:03 -08001610 int code = e.getCode();
1611 if (code == VoldResponseCode.OpFailedStorageBusy) {
1612 rc = StorageResultCode.OperationFailedStorageBusy;
1613 } else {
1614 rc = StorageResultCode.OperationFailedInternalError;
1615 }
San Mehat02735bc2010-01-26 15:18:08 -08001616 }
San Mehat6cdd9c02010-02-09 14:45:20 -08001617
1618 if (rc == StorageResultCode.OperationSucceeded) {
1619 synchronized (mAsecMountSet) {
1620 mAsecMountSet.remove(id);
1621 }
1622 }
San Mehat4270e1e2010-01-29 05:32:19 -08001623 return rc;
San Mehat9dba7092010-01-18 06:47:41 -08001624 }
1625
San Mehat6cdd9c02010-02-09 14:45:20 -08001626 public boolean isSecureContainerMounted(String id) {
1627 validatePermission(android.Manifest.permission.ASEC_ACCESS);
1628 waitForReady();
1629 warnOnNotMounted();
1630
1631 synchronized (mAsecMountSet) {
1632 return mAsecMountSet.contains(id);
1633 }
1634 }
1635
San Mehat4270e1e2010-01-29 05:32:19 -08001636 public int renameSecureContainer(String oldId, String newId) {
1637 validatePermission(android.Manifest.permission.ASEC_RENAME);
San Mehat207e5382010-02-04 20:46:54 -08001638 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001639 warnOnNotMounted();
San Mehat4270e1e2010-01-29 05:32:19 -08001640
San Mehata181b212010-02-11 06:50:20 -08001641 synchronized (mAsecMountSet) {
San Mehat85451ee2010-02-24 08:54:18 -08001642 /*
Jason parks9ed98bc2011-01-17 09:58:35 -06001643 * Because a mounted container has active internal state which cannot be
San Mehat85451ee2010-02-24 08:54:18 -08001644 * changed while active, we must ensure both ids are not currently mounted.
1645 */
1646 if (mAsecMountSet.contains(oldId) || mAsecMountSet.contains(newId)) {
San Mehata181b212010-02-11 06:50:20 -08001647 return StorageResultCode.OperationFailedStorageMounted;
1648 }
1649 }
1650
San Mehatb1043402010-02-05 08:26:50 -08001651 int rc = StorageResultCode.OperationSucceeded;
San Mehat4270e1e2010-01-29 05:32:19 -08001652 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001653 mConnector.execute("asec", "rename", oldId, newId);
San Mehat4270e1e2010-01-29 05:32:19 -08001654 } catch (NativeDaemonConnectorException e) {
San Mehatb1043402010-02-05 08:26:50 -08001655 rc = StorageResultCode.OperationFailedInternalError;
San Mehat02735bc2010-01-26 15:18:08 -08001656 }
San Mehata181b212010-02-11 06:50:20 -08001657
San Mehat4270e1e2010-01-29 05:32:19 -08001658 return rc;
San Mehat45f61042010-01-23 08:12:43 -08001659 }
1660
San Mehat4270e1e2010-01-29 05:32:19 -08001661 public String getSecureContainerPath(String id) {
1662 validatePermission(android.Manifest.permission.ASEC_ACCESS);
San Mehat207e5382010-02-04 20:46:54 -08001663 waitForReady();
San Mehatb1043402010-02-05 08:26:50 -08001664 warnOnNotMounted();
San Mehatf919cd022010-02-04 15:10:38 -08001665
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001666 final NativeDaemonEvent event;
San Mehat2d66cef2010-03-23 11:12:52 -07001667 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001668 event = mConnector.execute("asec", "path", id);
1669 event.checkCode(VoldResponseCode.AsecPathResult);
1670 return event.getMessage();
San Mehat2d66cef2010-03-23 11:12:52 -07001671 } catch (NativeDaemonConnectorException e) {
1672 int code = e.getCode();
1673 if (code == VoldResponseCode.OpFailedStorageNotFound) {
Fredrik Helmera20c8ef2011-02-09 16:16:10 +01001674 Slog.i(TAG, String.format("Container '%s' not found", id));
1675 return null;
San Mehat22dd86e2010-01-12 12:21:18 -08001676 } else {
San Mehat2d66cef2010-03-23 11:12:52 -07001677 throw new IllegalStateException(String.format("Unexpected response code %d", code));
San Mehat22dd86e2010-01-12 12:21:18 -08001678 }
1679 }
San Mehat22dd86e2010-01-12 12:21:18 -08001680 }
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -07001681
Dianne Hackborn292f8bc2011-06-27 16:27:41 -07001682 public String getSecureContainerFilesystemPath(String id) {
1683 validatePermission(android.Manifest.permission.ASEC_ACCESS);
1684 waitForReady();
1685 warnOnNotMounted();
1686
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001687 final NativeDaemonEvent event;
Dianne Hackborn292f8bc2011-06-27 16:27:41 -07001688 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001689 event = mConnector.execute("asec", "fspath", id);
1690 event.checkCode(VoldResponseCode.AsecPathResult);
1691 return event.getMessage();
Dianne Hackborn292f8bc2011-06-27 16:27:41 -07001692 } catch (NativeDaemonConnectorException e) {
1693 int code = e.getCode();
1694 if (code == VoldResponseCode.OpFailedStorageNotFound) {
1695 Slog.i(TAG, String.format("Container '%s' not found", id));
1696 return null;
1697 } else {
1698 throw new IllegalStateException(String.format("Unexpected response code %d", code));
1699 }
1700 }
1701 }
1702
Suchi Amalapurapue99bb5f2010-03-19 14:36:49 -07001703 public void finishMediaUpdate() {
1704 mHandler.sendEmptyMessage(H_UNMOUNT_PM_DONE);
1705 }
Kenny Root02c87302010-07-01 08:10:18 -07001706
Kenny Roota02b8b02010-08-05 16:14:17 -07001707 private boolean isUidOwnerOfPackageOrSystem(String packageName, int callerUid) {
1708 if (callerUid == android.os.Process.SYSTEM_UID) {
1709 return true;
1710 }
1711
Kenny Root02c87302010-07-01 08:10:18 -07001712 if (packageName == null) {
1713 return false;
1714 }
1715
Amith Yamasani483f3b02012-03-13 16:08:00 -07001716 final int packageUid = mPms.getPackageUid(packageName, UserId.getUserId(callerUid));
Kenny Root02c87302010-07-01 08:10:18 -07001717
1718 if (DEBUG_OBB) {
1719 Slog.d(TAG, "packageName = " + packageName + ", packageUid = " +
1720 packageUid + ", callerUid = " + callerUid);
1721 }
1722
1723 return callerUid == packageUid;
1724 }
1725
1726 public String getMountedObbPath(String filename) {
Kenny Rootaf9d6672010-10-08 09:21:39 -07001727 if (filename == null) {
1728 throw new IllegalArgumentException("filename cannot be null");
1729 }
1730
Kenny Root02c87302010-07-01 08:10:18 -07001731 waitForReady();
1732 warnOnNotMounted();
1733
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001734 final NativeDaemonEvent event;
Kenny Root02c87302010-07-01 08:10:18 -07001735 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001736 event = mConnector.execute("obb", "path", filename);
1737 event.checkCode(VoldResponseCode.AsecPathResult);
1738 return event.getMessage();
Kenny Root02c87302010-07-01 08:10:18 -07001739 } catch (NativeDaemonConnectorException e) {
1740 int code = e.getCode();
1741 if (code == VoldResponseCode.OpFailedStorageNotFound) {
Kenny Roota02b8b02010-08-05 16:14:17 -07001742 return null;
Kenny Root02c87302010-07-01 08:10:18 -07001743 } else {
1744 throw new IllegalStateException(String.format("Unexpected response code %d", code));
1745 }
1746 }
1747 }
1748
1749 public boolean isObbMounted(String filename) {
Kenny Rootaf9d6672010-10-08 09:21:39 -07001750 if (filename == null) {
1751 throw new IllegalArgumentException("filename cannot be null");
Kenny Root02c87302010-07-01 08:10:18 -07001752 }
Kenny Rootaf9d6672010-10-08 09:21:39 -07001753
1754 synchronized (mObbMounts) {
1755 return mObbPathToStateMap.containsKey(filename);
1756 }
Kenny Root02c87302010-07-01 08:10:18 -07001757 }
1758
Kenny Rootaf9d6672010-10-08 09:21:39 -07001759 public void mountObb(String filename, String key, IObbActionListener token, int nonce)
Kenny Root735de3b2010-09-30 14:11:39 -07001760 throws RemoteException {
Kenny Rootf1121dc2010-09-29 07:30:53 -07001761 if (filename == null) {
1762 throw new IllegalArgumentException("filename cannot be null");
Kenny Rootaf9d6672010-10-08 09:21:39 -07001763 }
1764
1765 if (token == null) {
Kenny Rootf1121dc2010-09-29 07:30:53 -07001766 throw new IllegalArgumentException("token cannot be null");
1767 }
1768
Kenny Rootaf9d6672010-10-08 09:21:39 -07001769 final int callerUid = Binder.getCallingUid();
1770 final ObbState obbState = new ObbState(filename, callerUid, token, nonce);
1771 final ObbAction action = new MountObbAction(obbState, key);
Kenny Roota02b8b02010-08-05 16:14:17 -07001772 mObbActionHandler.sendMessage(mObbActionHandler.obtainMessage(OBB_RUN_ACTION, action));
1773
1774 if (DEBUG_OBB)
1775 Slog.i(TAG, "Send to OBB handler: " + action.toString());
Kenny Root02c87302010-07-01 08:10:18 -07001776 }
1777
Kenny Rootaf9d6672010-10-08 09:21:39 -07001778 public void unmountObb(String filename, boolean force, IObbActionListener token, int nonce)
1779 throws RemoteException {
Kenny Rootf1121dc2010-09-29 07:30:53 -07001780 if (filename == null) {
1781 throw new IllegalArgumentException("filename cannot be null");
Kenny Rootf1121dc2010-09-29 07:30:53 -07001782 }
1783
Kenny Rootaf9d6672010-10-08 09:21:39 -07001784 final int callerUid = Binder.getCallingUid();
1785 final ObbState obbState = new ObbState(filename, callerUid, token, nonce);
1786 final ObbAction action = new UnmountObbAction(obbState, force);
Kenny Roota02b8b02010-08-05 16:14:17 -07001787 mObbActionHandler.sendMessage(mObbActionHandler.obtainMessage(OBB_RUN_ACTION, action));
Kenny Root02c87302010-07-01 08:10:18 -07001788
Kenny Roota02b8b02010-08-05 16:14:17 -07001789 if (DEBUG_OBB)
1790 Slog.i(TAG, "Send to OBB handler: " + action.toString());
1791 }
1792
Ben Komalo444eca22011-09-01 15:17:44 -07001793 @Override
1794 public int getEncryptionState() {
1795 mContext.enforceCallingOrSelfPermission(Manifest.permission.CRYPT_KEEPER,
1796 "no permission to access the crypt keeper");
1797
1798 waitForReady();
1799
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001800 final NativeDaemonEvent event;
Ben Komalo444eca22011-09-01 15:17:44 -07001801 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001802 event = mConnector.execute("cryptfs", "cryptocomplete");
1803 return Integer.parseInt(event.getMessage());
Ben Komalo444eca22011-09-01 15:17:44 -07001804 } catch (NumberFormatException e) {
1805 // Bad result - unexpected.
1806 Slog.w(TAG, "Unable to parse result from cryptfs cryptocomplete");
1807 return ENCRYPTION_STATE_ERROR_UNKNOWN;
1808 } catch (NativeDaemonConnectorException e) {
1809 // Something bad happened.
1810 Slog.w(TAG, "Error in communicating with cryptfs in validating");
1811 return ENCRYPTION_STATE_ERROR_UNKNOWN;
1812 }
1813 }
1814
1815 @Override
Jason parks5af0b912010-11-29 09:05:25 -06001816 public int decryptStorage(String password) {
Jason parksf7b3cd42011-01-27 09:28:25 -06001817 if (TextUtils.isEmpty(password)) {
1818 throw new IllegalArgumentException("password cannot be empty");
Jason parks5af0b912010-11-29 09:05:25 -06001819 }
1820
Jason parks8888c592011-01-20 22:46:41 -06001821 mContext.enforceCallingOrSelfPermission(Manifest.permission.CRYPT_KEEPER,
1822 "no permission to access the crypt keeper");
Jason parks5af0b912010-11-29 09:05:25 -06001823
1824 waitForReady();
1825
1826 if (DEBUG_EVENTS) {
1827 Slog.i(TAG, "decrypting storage...");
1828 }
1829
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001830 final NativeDaemonEvent event;
Jason parks5af0b912010-11-29 09:05:25 -06001831 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001832 event = mConnector.execute("cryptfs", "checkpw", password);
Jason parks9ed98bc2011-01-17 09:58:35 -06001833
Fredrik Roubertda6aedf2011-12-20 17:34:43 +01001834 final int code = Integer.parseInt(event.getMessage());
Jason parks9ed98bc2011-01-17 09:58:35 -06001835 if (code == 0) {
1836 // Decrypt was successful. Post a delayed message before restarting in order
1837 // to let the UI to clear itself
1838 mHandler.postDelayed(new Runnable() {
1839 public void run() {
Jeff Sharkey31c6e482011-11-18 17:09:01 -08001840 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001841 mConnector.execute("cryptfs", "restart");
Jeff Sharkey31c6e482011-11-18 17:09:01 -08001842 } catch (NativeDaemonConnectorException e) {
1843 Slog.e(TAG, "problem executing in background", e);
1844 }
Jason parks9ed98bc2011-01-17 09:58:35 -06001845 }
Jason parksf7b3cd42011-01-27 09:28:25 -06001846 }, 1000); // 1 second
Jason parks9ed98bc2011-01-17 09:58:35 -06001847 }
1848
1849 return code;
Jason parks5af0b912010-11-29 09:05:25 -06001850 } catch (NativeDaemonConnectorException e) {
1851 // Decryption failed
1852 return e.getCode();
1853 }
Jason parks5af0b912010-11-29 09:05:25 -06001854 }
1855
Jason parks56aa5322011-01-07 09:01:15 -06001856 public int encryptStorage(String password) {
Jason parksf7b3cd42011-01-27 09:28:25 -06001857 if (TextUtils.isEmpty(password)) {
1858 throw new IllegalArgumentException("password cannot be empty");
Jason parks56aa5322011-01-07 09:01:15 -06001859 }
1860
Jason parks8888c592011-01-20 22:46:41 -06001861 mContext.enforceCallingOrSelfPermission(Manifest.permission.CRYPT_KEEPER,
1862 "no permission to access the crypt keeper");
Jason parks56aa5322011-01-07 09:01:15 -06001863
1864 waitForReady();
1865
1866 if (DEBUG_EVENTS) {
Jason parks8888c592011-01-20 22:46:41 -06001867 Slog.i(TAG, "encrypting storage...");
Jason parks56aa5322011-01-07 09:01:15 -06001868 }
1869
1870 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001871 mConnector.execute("cryptfs", "enablecrypto", "inplace", password);
Jason parks56aa5322011-01-07 09:01:15 -06001872 } catch (NativeDaemonConnectorException e) {
1873 // Encryption failed
1874 return e.getCode();
1875 }
1876
1877 return 0;
1878 }
1879
Jason parksf7b3cd42011-01-27 09:28:25 -06001880 public int changeEncryptionPassword(String password) {
1881 if (TextUtils.isEmpty(password)) {
1882 throw new IllegalArgumentException("password cannot be empty");
1883 }
1884
1885 mContext.enforceCallingOrSelfPermission(Manifest.permission.CRYPT_KEEPER,
1886 "no permission to access the crypt keeper");
1887
1888 waitForReady();
1889
1890 if (DEBUG_EVENTS) {
1891 Slog.i(TAG, "changing encryption password...");
1892 }
1893
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001894 final NativeDaemonEvent event;
Jason parksf7b3cd42011-01-27 09:28:25 -06001895 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001896 event = mConnector.execute("cryptfs", "changepw", password);
1897 return Integer.parseInt(event.getMessage());
Jason parksf7b3cd42011-01-27 09:28:25 -06001898 } catch (NativeDaemonConnectorException e) {
1899 // Encryption failed
1900 return e.getCode();
1901 }
1902 }
1903
Christopher Tate32418be2011-10-10 13:51:12 -07001904 /**
1905 * Validate a user-supplied password string with cryptfs
1906 */
1907 @Override
1908 public int verifyEncryptionPassword(String password) throws RemoteException {
1909 // Only the system process is permitted to validate passwords
1910 if (Binder.getCallingUid() != android.os.Process.SYSTEM_UID) {
1911 throw new SecurityException("no permission to access the crypt keeper");
1912 }
1913
1914 mContext.enforceCallingOrSelfPermission(Manifest.permission.CRYPT_KEEPER,
1915 "no permission to access the crypt keeper");
1916
1917 if (TextUtils.isEmpty(password)) {
1918 throw new IllegalArgumentException("password cannot be empty");
1919 }
1920
1921 waitForReady();
1922
1923 if (DEBUG_EVENTS) {
1924 Slog.i(TAG, "validating encryption password...");
1925 }
1926
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001927 final NativeDaemonEvent event;
Christopher Tate32418be2011-10-10 13:51:12 -07001928 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08001929 event = mConnector.execute("cryptfs", "verifypw", password);
1930 Slog.i(TAG, "cryptfs verifypw => " + event.getMessage());
1931 return Integer.parseInt(event.getMessage());
Christopher Tate32418be2011-10-10 13:51:12 -07001932 } catch (NativeDaemonConnectorException e) {
1933 // Encryption failed
1934 return e.getCode();
1935 }
1936 }
1937
Mike Lockwood2f6a3882011-05-09 19:08:06 -07001938 public Parcelable[] getVolumeList() {
1939 synchronized(mVolumes) {
1940 int size = mVolumes.size();
1941 Parcelable[] result = new Parcelable[size];
1942 for (int i = 0; i < size; i++) {
1943 result[i] = mVolumes.get(i);
Mike Lockwood8fa5f802011-03-24 08:12:30 -07001944 }
1945 return result;
1946 }
1947 }
1948
Kenny Rootaf9d6672010-10-08 09:21:39 -07001949 private void addObbStateLocked(ObbState obbState) throws RemoteException {
1950 final IBinder binder = obbState.getBinder();
1951 List<ObbState> obbStates = mObbMounts.get(binder);
Kenny Root5919ac62010-10-05 09:49:40 -07001952
Kenny Rootaf9d6672010-10-08 09:21:39 -07001953 if (obbStates == null) {
1954 obbStates = new ArrayList<ObbState>();
1955 mObbMounts.put(binder, obbStates);
1956 } else {
1957 for (final ObbState o : obbStates) {
1958 if (o.filename.equals(obbState.filename)) {
1959 throw new IllegalStateException("Attempt to add ObbState twice. "
1960 + "This indicates an error in the MountService logic.");
Kenny Root5919ac62010-10-05 09:49:40 -07001961 }
1962 }
Kenny Roota02b8b02010-08-05 16:14:17 -07001963 }
Kenny Rootaf9d6672010-10-08 09:21:39 -07001964
1965 obbStates.add(obbState);
1966 try {
1967 obbState.link();
1968 } catch (RemoteException e) {
1969 /*
1970 * The binder died before we could link it, so clean up our state
1971 * and return failure.
1972 */
1973 obbStates.remove(obbState);
1974 if (obbStates.isEmpty()) {
1975 mObbMounts.remove(binder);
1976 }
1977
1978 // Rethrow the error so mountObb can get it
1979 throw e;
1980 }
1981
1982 mObbPathToStateMap.put(obbState.filename, obbState);
Kenny Roota02b8b02010-08-05 16:14:17 -07001983 }
1984
Kenny Rootaf9d6672010-10-08 09:21:39 -07001985 private void removeObbStateLocked(ObbState obbState) {
1986 final IBinder binder = obbState.getBinder();
1987 final List<ObbState> obbStates = mObbMounts.get(binder);
1988 if (obbStates != null) {
1989 if (obbStates.remove(obbState)) {
1990 obbState.unlink();
Kenny Root05105f72010-09-22 17:29:43 -07001991 }
Kenny Rootaf9d6672010-10-08 09:21:39 -07001992 if (obbStates.isEmpty()) {
1993 mObbMounts.remove(binder);
1994 }
Kenny Roota02b8b02010-08-05 16:14:17 -07001995 }
Kenny Roota02b8b02010-08-05 16:14:17 -07001996
Kenny Rootaf9d6672010-10-08 09:21:39 -07001997 mObbPathToStateMap.remove(obbState.filename);
Kenny Root38cf8862010-09-26 14:18:51 -07001998 }
1999
Kenny Roota02b8b02010-08-05 16:14:17 -07002000 private class ObbActionHandler extends Handler {
2001 private boolean mBound = false;
Kenny Root480afe72010-10-07 10:17:50 -07002002 private final List<ObbAction> mActions = new LinkedList<ObbAction>();
Kenny Roota02b8b02010-08-05 16:14:17 -07002003
2004 ObbActionHandler(Looper l) {
2005 super(l);
2006 }
2007
2008 @Override
2009 public void handleMessage(Message msg) {
2010 switch (msg.what) {
2011 case OBB_RUN_ACTION: {
Kenny Root480afe72010-10-07 10:17:50 -07002012 final ObbAction action = (ObbAction) msg.obj;
Kenny Roota02b8b02010-08-05 16:14:17 -07002013
2014 if (DEBUG_OBB)
2015 Slog.i(TAG, "OBB_RUN_ACTION: " + action.toString());
2016
2017 // If a bind was already initiated we don't really
2018 // need to do anything. The pending install
2019 // will be processed later on.
2020 if (!mBound) {
2021 // If this is the only one pending we might
2022 // have to bind to the service again.
2023 if (!connectToService()) {
2024 Slog.e(TAG, "Failed to bind to media container service");
2025 action.handleError();
2026 return;
Kenny Roota02b8b02010-08-05 16:14:17 -07002027 }
Kenny Roota02b8b02010-08-05 16:14:17 -07002028 }
Kenny Root735de3b2010-09-30 14:11:39 -07002029
Kenny Root735de3b2010-09-30 14:11:39 -07002030 mActions.add(action);
Kenny Roota02b8b02010-08-05 16:14:17 -07002031 break;
2032 }
2033 case OBB_MCS_BOUND: {
2034 if (DEBUG_OBB)
2035 Slog.i(TAG, "OBB_MCS_BOUND");
2036 if (msg.obj != null) {
2037 mContainerService = (IMediaContainerService) msg.obj;
2038 }
2039 if (mContainerService == null) {
2040 // Something seriously wrong. Bail out
2041 Slog.e(TAG, "Cannot bind to media container service");
2042 for (ObbAction action : mActions) {
2043 // Indicate service bind error
2044 action.handleError();
2045 }
2046 mActions.clear();
2047 } else if (mActions.size() > 0) {
Kenny Root480afe72010-10-07 10:17:50 -07002048 final ObbAction action = mActions.get(0);
Kenny Roota02b8b02010-08-05 16:14:17 -07002049 if (action != null) {
2050 action.execute(this);
2051 }
2052 } else {
2053 // Should never happen ideally.
2054 Slog.w(TAG, "Empty queue");
2055 }
2056 break;
2057 }
2058 case OBB_MCS_RECONNECT: {
2059 if (DEBUG_OBB)
2060 Slog.i(TAG, "OBB_MCS_RECONNECT");
2061 if (mActions.size() > 0) {
2062 if (mBound) {
2063 disconnectService();
2064 }
2065 if (!connectToService()) {
2066 Slog.e(TAG, "Failed to bind to media container service");
2067 for (ObbAction action : mActions) {
2068 // Indicate service bind error
2069 action.handleError();
2070 }
2071 mActions.clear();
2072 }
2073 }
2074 break;
2075 }
2076 case OBB_MCS_UNBIND: {
2077 if (DEBUG_OBB)
2078 Slog.i(TAG, "OBB_MCS_UNBIND");
2079
2080 // Delete pending install
2081 if (mActions.size() > 0) {
2082 mActions.remove(0);
2083 }
2084 if (mActions.size() == 0) {
2085 if (mBound) {
2086 disconnectService();
2087 }
2088 } else {
2089 // There are more pending requests in queue.
2090 // Just post MCS_BOUND message to trigger processing
2091 // of next pending install.
2092 mObbActionHandler.sendEmptyMessage(OBB_MCS_BOUND);
2093 }
2094 break;
2095 }
Kenny Rootaf9d6672010-10-08 09:21:39 -07002096 case OBB_FLUSH_MOUNT_STATE: {
2097 final String path = (String) msg.obj;
2098
2099 if (DEBUG_OBB)
2100 Slog.i(TAG, "Flushing all OBB state for path " + path);
2101
2102 synchronized (mObbMounts) {
2103 final List<ObbState> obbStatesToRemove = new LinkedList<ObbState>();
2104
2105 final Iterator<Entry<String, ObbState>> i =
2106 mObbPathToStateMap.entrySet().iterator();
2107 while (i.hasNext()) {
2108 final Entry<String, ObbState> obbEntry = i.next();
2109
2110 /*
2111 * If this entry's source file is in the volume path
2112 * that got unmounted, remove it because it's no
2113 * longer valid.
2114 */
2115 if (obbEntry.getKey().startsWith(path)) {
2116 obbStatesToRemove.add(obbEntry.getValue());
2117 }
2118 }
2119
2120 for (final ObbState obbState : obbStatesToRemove) {
2121 if (DEBUG_OBB)
2122 Slog.i(TAG, "Removing state for " + obbState.filename);
2123
2124 removeObbStateLocked(obbState);
2125
2126 try {
2127 obbState.token.onObbResult(obbState.filename, obbState.nonce,
2128 OnObbStateChangeListener.UNMOUNTED);
2129 } catch (RemoteException e) {
2130 Slog.i(TAG, "Couldn't send unmount notification for OBB: "
2131 + obbState.filename);
2132 }
2133 }
2134 }
2135 break;
2136 }
Kenny Roota02b8b02010-08-05 16:14:17 -07002137 }
2138 }
2139
2140 private boolean connectToService() {
2141 if (DEBUG_OBB)
2142 Slog.i(TAG, "Trying to bind to DefaultContainerService");
2143
2144 Intent service = new Intent().setComponent(DEFAULT_CONTAINER_COMPONENT);
2145 if (mContext.bindService(service, mDefContainerConn, Context.BIND_AUTO_CREATE)) {
2146 mBound = true;
2147 return true;
2148 }
2149 return false;
2150 }
2151
2152 private void disconnectService() {
2153 mContainerService = null;
2154 mBound = false;
2155 mContext.unbindService(mDefContainerConn);
2156 }
2157 }
2158
2159 abstract class ObbAction {
2160 private static final int MAX_RETRIES = 3;
2161 private int mRetries;
2162
2163 ObbState mObbState;
2164
2165 ObbAction(ObbState obbState) {
2166 mObbState = obbState;
2167 }
2168
2169 public void execute(ObbActionHandler handler) {
2170 try {
2171 if (DEBUG_OBB)
Ben Komalo444eca22011-09-01 15:17:44 -07002172 Slog.i(TAG, "Starting to execute action: " + toString());
Kenny Roota02b8b02010-08-05 16:14:17 -07002173 mRetries++;
2174 if (mRetries > MAX_RETRIES) {
2175 Slog.w(TAG, "Failed to invoke remote methods on default container service. Giving up");
Kenny Root480afe72010-10-07 10:17:50 -07002176 mObbActionHandler.sendEmptyMessage(OBB_MCS_UNBIND);
Kenny Roota02b8b02010-08-05 16:14:17 -07002177 handleError();
2178 return;
2179 } else {
2180 handleExecute();
2181 if (DEBUG_OBB)
2182 Slog.i(TAG, "Posting install MCS_UNBIND");
2183 mObbActionHandler.sendEmptyMessage(OBB_MCS_UNBIND);
2184 }
2185 } catch (RemoteException e) {
2186 if (DEBUG_OBB)
2187 Slog.i(TAG, "Posting install MCS_RECONNECT");
2188 mObbActionHandler.sendEmptyMessage(OBB_MCS_RECONNECT);
2189 } catch (Exception e) {
2190 if (DEBUG_OBB)
2191 Slog.d(TAG, "Error handling OBB action", e);
2192 handleError();
Kenny Root17eb6fb2010-10-06 15:02:52 -07002193 mObbActionHandler.sendEmptyMessage(OBB_MCS_UNBIND);
Kenny Roota02b8b02010-08-05 16:14:17 -07002194 }
2195 }
2196
Kenny Root05105f72010-09-22 17:29:43 -07002197 abstract void handleExecute() throws RemoteException, IOException;
Kenny Roota02b8b02010-08-05 16:14:17 -07002198 abstract void handleError();
Kenny Root38cf8862010-09-26 14:18:51 -07002199
2200 protected ObbInfo getObbInfo() throws IOException {
2201 ObbInfo obbInfo;
2202 try {
2203 obbInfo = mContainerService.getObbInfo(mObbState.filename);
2204 } catch (RemoteException e) {
2205 Slog.d(TAG, "Couldn't call DefaultContainerService to fetch OBB info for "
2206 + mObbState.filename);
2207 obbInfo = null;
2208 }
2209 if (obbInfo == null) {
2210 throw new IOException("Couldn't read OBB file: " + mObbState.filename);
2211 }
2212 return obbInfo;
2213 }
2214
Kenny Rootaf9d6672010-10-08 09:21:39 -07002215 protected void sendNewStatusOrIgnore(int status) {
2216 if (mObbState == null || mObbState.token == null) {
2217 return;
2218 }
2219
Kenny Root38cf8862010-09-26 14:18:51 -07002220 try {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002221 mObbState.token.onObbResult(mObbState.filename, mObbState.nonce, status);
Kenny Root38cf8862010-09-26 14:18:51 -07002222 } catch (RemoteException e) {
2223 Slog.w(TAG, "MountServiceListener went away while calling onObbStateChanged");
2224 }
2225 }
Kenny Roota02b8b02010-08-05 16:14:17 -07002226 }
2227
2228 class MountObbAction extends ObbAction {
Ben Komalo444eca22011-09-01 15:17:44 -07002229 private final String mKey;
Kenny Roota02b8b02010-08-05 16:14:17 -07002230
2231 MountObbAction(ObbState obbState, String key) {
2232 super(obbState);
2233 mKey = key;
2234 }
2235
Jason parks5af0b912010-11-29 09:05:25 -06002236 @Override
Kenny Root735de3b2010-09-30 14:11:39 -07002237 public void handleExecute() throws IOException, RemoteException {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002238 waitForReady();
2239 warnOnNotMounted();
2240
Kenny Root38cf8862010-09-26 14:18:51 -07002241 final ObbInfo obbInfo = getObbInfo();
2242
Kenny Roota02b8b02010-08-05 16:14:17 -07002243 if (!isUidOwnerOfPackageOrSystem(obbInfo.packageName, mObbState.callerUid)) {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002244 Slog.w(TAG, "Denied attempt to mount OBB " + obbInfo.filename
2245 + " which is owned by " + obbInfo.packageName);
2246 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_PERMISSION_DENIED);
2247 return;
Kenny Roota02b8b02010-08-05 16:14:17 -07002248 }
2249
Kenny Rootaf9d6672010-10-08 09:21:39 -07002250 final boolean isMounted;
2251 synchronized (mObbMounts) {
2252 isMounted = mObbPathToStateMap.containsKey(obbInfo.filename);
2253 }
2254 if (isMounted) {
2255 Slog.w(TAG, "Attempt to mount OBB which is already mounted: " + obbInfo.filename);
2256 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_ALREADY_MOUNTED);
2257 return;
2258 }
2259
2260 /*
2261 * The filename passed in might not be the canonical name, so just
2262 * set the filename to the canonicalized version.
2263 */
2264 mObbState.filename = obbInfo.filename;
2265
2266 final String hashedKey;
2267 if (mKey == null) {
2268 hashedKey = "none";
2269 } else {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002270 try {
Kenny Root3b1abba2010-10-13 15:00:07 -07002271 SecretKeyFactory factory = SecretKeyFactory.getInstance("PBKDF2WithHmacSHA1");
2272
2273 KeySpec ks = new PBEKeySpec(mKey.toCharArray(), obbInfo.salt,
2274 PBKDF2_HASH_ROUNDS, CRYPTO_ALGORITHM_KEY_SIZE);
2275 SecretKey key = factory.generateSecret(ks);
2276 BigInteger bi = new BigInteger(key.getEncoded());
2277 hashedKey = bi.toString(16);
Kenny Rootaf9d6672010-10-08 09:21:39 -07002278 } catch (NoSuchAlgorithmException e) {
Kenny Root3b1abba2010-10-13 15:00:07 -07002279 Slog.e(TAG, "Could not load PBKDF2 algorithm", e);
2280 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_INTERNAL);
2281 return;
2282 } catch (InvalidKeySpecException e) {
2283 Slog.e(TAG, "Invalid key spec when loading PBKDF2 algorithm", e);
2284 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_INTERNAL);
Kenny Root38cf8862010-09-26 14:18:51 -07002285 return;
2286 }
Kenny Rootaf9d6672010-10-08 09:21:39 -07002287 }
Kenny Root38cf8862010-09-26 14:18:51 -07002288
Kenny Rootaf9d6672010-10-08 09:21:39 -07002289 int rc = StorageResultCode.OperationSucceeded;
Kenny Rootaf9d6672010-10-08 09:21:39 -07002290 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08002291 mConnector.execute(
2292 "obb", "mount", mObbState.filename, hashedKey, mObbState.callerUid);
Kenny Rootaf9d6672010-10-08 09:21:39 -07002293 } catch (NativeDaemonConnectorException e) {
2294 int code = e.getCode();
2295 if (code != VoldResponseCode.OpFailedStorageBusy) {
2296 rc = StorageResultCode.OperationFailedInternalError;
Kenny Roota02b8b02010-08-05 16:14:17 -07002297 }
2298 }
2299
Kenny Rootaf9d6672010-10-08 09:21:39 -07002300 if (rc == StorageResultCode.OperationSucceeded) {
2301 if (DEBUG_OBB)
2302 Slog.d(TAG, "Successfully mounted OBB " + mObbState.filename);
2303
2304 synchronized (mObbMounts) {
2305 addObbStateLocked(mObbState);
2306 }
2307
2308 sendNewStatusOrIgnore(OnObbStateChangeListener.MOUNTED);
Kenny Root02c87302010-07-01 08:10:18 -07002309 } else {
Kenny Root05105f72010-09-22 17:29:43 -07002310 Slog.e(TAG, "Couldn't mount OBB file: " + rc);
Kenny Roota02b8b02010-08-05 16:14:17 -07002311
Kenny Rootaf9d6672010-10-08 09:21:39 -07002312 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_COULD_NOT_MOUNT);
Kenny Root02c87302010-07-01 08:10:18 -07002313 }
2314 }
2315
Jason parks5af0b912010-11-29 09:05:25 -06002316 @Override
Kenny Roota02b8b02010-08-05 16:14:17 -07002317 public void handleError() {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002318 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_INTERNAL);
Kenny Root02c87302010-07-01 08:10:18 -07002319 }
Kenny Roota02b8b02010-08-05 16:14:17 -07002320
2321 @Override
2322 public String toString() {
2323 StringBuilder sb = new StringBuilder();
2324 sb.append("MountObbAction{");
2325 sb.append("filename=");
2326 sb.append(mObbState.filename);
2327 sb.append(",callerUid=");
2328 sb.append(mObbState.callerUid);
2329 sb.append(",token=");
2330 sb.append(mObbState.token != null ? mObbState.token.toString() : "NULL");
Kenny Rootaf9d6672010-10-08 09:21:39 -07002331 sb.append(",binder=");
2332 sb.append(mObbState.token != null ? mObbState.getBinder().toString() : "null");
Kenny Roota02b8b02010-08-05 16:14:17 -07002333 sb.append('}');
2334 return sb.toString();
2335 }
2336 }
2337
2338 class UnmountObbAction extends ObbAction {
Ben Komalo444eca22011-09-01 15:17:44 -07002339 private final boolean mForceUnmount;
Kenny Roota02b8b02010-08-05 16:14:17 -07002340
2341 UnmountObbAction(ObbState obbState, boolean force) {
2342 super(obbState);
2343 mForceUnmount = force;
2344 }
2345
Jason parks5af0b912010-11-29 09:05:25 -06002346 @Override
Kenny Root38cf8862010-09-26 14:18:51 -07002347 public void handleExecute() throws IOException {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002348 waitForReady();
2349 warnOnNotMounted();
2350
Kenny Root38cf8862010-09-26 14:18:51 -07002351 final ObbInfo obbInfo = getObbInfo();
Kenny Roota02b8b02010-08-05 16:14:17 -07002352
Kenny Rootaf9d6672010-10-08 09:21:39 -07002353 final ObbState obbState;
Kenny Root38cf8862010-09-26 14:18:51 -07002354 synchronized (mObbMounts) {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002355 obbState = mObbPathToStateMap.get(obbInfo.filename);
2356 }
Kenny Root38cf8862010-09-26 14:18:51 -07002357
Kenny Rootaf9d6672010-10-08 09:21:39 -07002358 if (obbState == null) {
2359 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_NOT_MOUNTED);
2360 return;
2361 }
2362
2363 if (obbState.callerUid != mObbState.callerUid) {
2364 Slog.w(TAG, "Permission denied attempting to unmount OBB " + obbInfo.filename
2365 + " (owned by " + obbInfo.packageName + ")");
2366 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_PERMISSION_DENIED);
2367 return;
2368 }
2369
2370 mObbState.filename = obbInfo.filename;
2371
2372 int rc = StorageResultCode.OperationSucceeded;
Kenny Rootaf9d6672010-10-08 09:21:39 -07002373 try {
Jeff Sharkeydd519fa2011-12-02 14:11:21 -08002374 final Command cmd = new Command("obb", "unmount", mObbState.filename);
2375 if (mForceUnmount) {
2376 cmd.appendArg("force");
2377 }
2378 mConnector.execute(cmd);
Kenny Rootaf9d6672010-10-08 09:21:39 -07002379 } catch (NativeDaemonConnectorException e) {
2380 int code = e.getCode();
2381 if (code == VoldResponseCode.OpFailedStorageBusy) {
2382 rc = StorageResultCode.OperationFailedStorageBusy;
2383 } else if (code == VoldResponseCode.OpFailedStorageNotFound) {
2384 // If it's not mounted then we've already won.
2385 rc = StorageResultCode.OperationSucceeded;
2386 } else {
2387 rc = StorageResultCode.OperationFailedInternalError;
Kenny Roota02b8b02010-08-05 16:14:17 -07002388 }
2389 }
2390
Kenny Rootaf9d6672010-10-08 09:21:39 -07002391 if (rc == StorageResultCode.OperationSucceeded) {
2392 synchronized (mObbMounts) {
2393 removeObbStateLocked(obbState);
Kenny Root38cf8862010-09-26 14:18:51 -07002394 }
2395
Kenny Rootaf9d6672010-10-08 09:21:39 -07002396 sendNewStatusOrIgnore(OnObbStateChangeListener.UNMOUNTED);
Kenny Roota02b8b02010-08-05 16:14:17 -07002397 } else {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002398 Slog.w(TAG, "Could not mount OBB: " + mObbState.filename);
2399 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_COULD_NOT_UNMOUNT);
Kenny Roota02b8b02010-08-05 16:14:17 -07002400 }
2401 }
2402
Jason parks5af0b912010-11-29 09:05:25 -06002403 @Override
Kenny Roota02b8b02010-08-05 16:14:17 -07002404 public void handleError() {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002405 sendNewStatusOrIgnore(OnObbStateChangeListener.ERROR_INTERNAL);
Kenny Roota02b8b02010-08-05 16:14:17 -07002406 }
2407
2408 @Override
2409 public String toString() {
2410 StringBuilder sb = new StringBuilder();
2411 sb.append("UnmountObbAction{");
2412 sb.append("filename=");
2413 sb.append(mObbState.filename != null ? mObbState.filename : "null");
2414 sb.append(",force=");
2415 sb.append(mForceUnmount);
2416 sb.append(",callerUid=");
2417 sb.append(mObbState.callerUid);
2418 sb.append(",token=");
2419 sb.append(mObbState.token != null ? mObbState.token.toString() : "null");
Kenny Root735de3b2010-09-30 14:11:39 -07002420 sb.append(",binder=");
Kenny Rootaf9d6672010-10-08 09:21:39 -07002421 sb.append(mObbState.token != null ? mObbState.getBinder().toString() : "null");
Kenny Roota02b8b02010-08-05 16:14:17 -07002422 sb.append('}');
2423 return sb.toString();
2424 }
Kenny Root02c87302010-07-01 08:10:18 -07002425 }
Kenny Root38cf8862010-09-26 14:18:51 -07002426
2427 @Override
2428 protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) {
2429 if (mContext.checkCallingOrSelfPermission(android.Manifest.permission.DUMP) != PackageManager.PERMISSION_GRANTED) {
2430 pw.println("Permission Denial: can't dump ActivityManager from from pid="
2431 + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid()
2432 + " without permission " + android.Manifest.permission.DUMP);
2433 return;
2434 }
2435
Kenny Root38cf8862010-09-26 14:18:51 -07002436 synchronized (mObbMounts) {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002437 pw.println(" mObbMounts:");
Kenny Root38cf8862010-09-26 14:18:51 -07002438
Kenny Rootaf9d6672010-10-08 09:21:39 -07002439 final Iterator<Entry<IBinder, List<ObbState>>> binders = mObbMounts.entrySet().iterator();
2440 while (binders.hasNext()) {
2441 Entry<IBinder, List<ObbState>> e = binders.next();
2442 pw.print(" Key="); pw.println(e.getKey().toString());
2443 final List<ObbState> obbStates = e.getValue();
Kenny Root38cf8862010-09-26 14:18:51 -07002444 for (final ObbState obbState : obbStates) {
Kenny Rootaf9d6672010-10-08 09:21:39 -07002445 pw.print(" "); pw.println(obbState.toString());
Kenny Root38cf8862010-09-26 14:18:51 -07002446 }
2447 }
Kenny Rootaf9d6672010-10-08 09:21:39 -07002448
2449 pw.println("");
2450 pw.println(" mObbPathToStateMap:");
2451 final Iterator<Entry<String, ObbState>> maps = mObbPathToStateMap.entrySet().iterator();
2452 while (maps.hasNext()) {
2453 final Entry<String, ObbState> e = maps.next();
2454 pw.print(" "); pw.print(e.getKey());
2455 pw.print(" -> "); pw.println(e.getValue().toString());
2456 }
Kenny Root38cf8862010-09-26 14:18:51 -07002457 }
Kenny Root4161f9b2011-07-13 09:48:33 -07002458
2459 pw.println("");
2460
2461 synchronized (mVolumes) {
2462 pw.println(" mVolumes:");
2463
2464 final int N = mVolumes.size();
2465 for (int i = 0; i < N; i++) {
2466 final StorageVolume v = mVolumes.get(i);
2467 pw.print(" ");
2468 pw.println(v.toString());
2469 }
2470 }
Robert Greenwalt470fd722012-01-18 12:51:15 -08002471
2472 pw.println();
2473 pw.println(" mConnection:");
2474 mConnector.dump(fd, pw, args);
Kenny Root38cf8862010-09-26 14:18:51 -07002475 }
The Android Open Source Project9066cfe2009-03-03 19:31:44 -08002476
Jeff Sharkeyfa23c5a2011-08-09 21:44:24 -07002477 /** {@inheritDoc} */
2478 public void monitor() {
2479 if (mConnector != null) {
2480 mConnector.monitor();
2481 }
2482 }
2483}