| /* |
| * Copyright (C) 2017 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "CheckEncryption.h" |
| #include "FileDeviceUtils.h" |
| #include "Utils.h" |
| #include "VolumeManager.h" |
| |
| #include <android-base/file.h> |
| #include <android-base/logging.h> |
| #include <android-base/unique_fd.h> |
| #include <cutils/iosched_policy.h> |
| #include <private/android_filesystem_config.h> |
| |
| #include <sstream> |
| |
| #include <sys/resource.h> |
| #include <sys/time.h> |
| #include <unistd.h> |
| |
| #include <assert.h> |
| #include <fcntl.h> |
| #include <linux/fs.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| |
| #include <fcntl.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| |
| using android::base::unique_fd; |
| |
| using android::base::ReadFileToString; |
| using android::base::WriteStringToFile; |
| |
| namespace android { |
| namespace vold { |
| |
| constexpr uint32_t max_extents = 32; |
| constexpr size_t bytecount = 8; |
| constexpr int repeats = 256; |
| |
| bool check_file(const std::string& needle) { |
| LOG(DEBUG) << "checkEncryption check_file: " << needle; |
| auto haystack = android::vold::BlockDeviceForPath(needle); |
| if (haystack.empty()) { |
| LOG(ERROR) << "Failed to find device for path: " << needle; |
| return false; |
| } |
| |
| std::string randombytes; |
| if (ReadRandomBytes(bytecount, randombytes) != 0) { |
| LOG(ERROR) << "Failed to read random bytes"; |
| return false; |
| } |
| std::string randomhex; |
| StrToHex(randombytes, randomhex); |
| std::ostringstream os; |
| for (int i = 0; i < repeats; i++) os << randomhex; |
| auto towrite = os.str(); |
| |
| if (access(needle.c_str(), F_OK) == 0) { |
| if (unlink(needle.c_str()) != 0) { |
| PLOG(ERROR) << "Failed to unlink " << needle; |
| return false; |
| } |
| } |
| LOG(DEBUG) << "Writing to " << needle; |
| if (!WriteStringToFile(towrite, needle)) { |
| PLOG(ERROR) << "Failed to write " << needle; |
| return false; |
| } |
| sync(); |
| |
| unique_fd haystack_fd(open(haystack.c_str(), O_RDONLY | O_CLOEXEC)); |
| if (haystack_fd.get() == -1) { |
| PLOG(ERROR) << "Failed to open " << haystack; |
| return false; |
| } |
| |
| auto fiemap = PathFiemap(needle, max_extents); |
| |
| std::string area; |
| for (uint32_t i = 0; i < fiemap->fm_mapped_extents; i++) { |
| auto xt = &(fiemap->fm_extents[i]); |
| LOG(DEBUG) << "Extent " << i << " at " << xt->fe_physical << " length " << xt->fe_length; |
| if (lseek64(haystack_fd.get(), xt->fe_physical, SEEK_SET) == -1) { |
| PLOG(ERROR) << "Failed lseek"; |
| return false; |
| } |
| auto toread = xt->fe_length; |
| while (toread > 0) { |
| char buf[BUFSIZ]; |
| size_t wlen = |
| static_cast<size_t>(std::min(static_cast<typeof(toread)>(sizeof(buf)), toread)); |
| auto l = read(haystack_fd.get(), buf, wlen); |
| if (l < 1) { |
| PLOG(ERROR) << "Failed read"; |
| if (errno != EINTR) { |
| return false; |
| } |
| } |
| area.append(buf, l); |
| toread -= l; |
| } |
| } |
| |
| LOG(DEBUG) << "Searching " << area.size() << " bytes of " << needle; |
| LOG(DEBUG) << "First position of blob: " << area.find(randomhex); |
| return true; |
| } |
| |
| int CheckEncryption(const std::string& path) { |
| auto deNeedle(path); |
| deNeedle += "/misc"; |
| if (android::vold::PrepareDir(deNeedle, 01771, AID_SYSTEM, AID_MISC)) { |
| return -1; |
| } |
| deNeedle += "/vold"; |
| if (android::vold::PrepareDir(deNeedle, 0700, AID_ROOT, AID_ROOT)) { |
| return -1; |
| } |
| deNeedle += "/checkEncryption"; |
| |
| auto neNeedle(path); |
| neNeedle += "/unencrypted/checkEncryption"; |
| |
| check_file(deNeedle); |
| check_file(neNeedle); |
| |
| return 0; |
| } |
| |
| } // namespace vold |
| } // namespace android |