blob: 0133e17ab02dcc2f99f36138afc99db4f6b5a004 [file] [log] [blame]
San Mehatf1b736b2009-10-10 17:22:08 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <stdlib.h>
18#include <sys/socket.h>
San Mehata19b2502010-01-06 10:33:53 -080019#include <sys/types.h>
San Mehatf1b736b2009-10-10 17:22:08 -070020#include <netinet/in.h>
21#include <arpa/inet.h>
San Mehata19b2502010-01-06 10:33:53 -080022#include <dirent.h>
San Mehatf1b736b2009-10-10 17:22:08 -070023#include <errno.h>
San Mehat2350c442010-03-02 13:16:50 -080024#include <fcntl.h>
Mohamad Ayyash7929aa72014-03-10 15:55:33 -070025#include <fs_mgr.h>
Yabin Cuid1104f72015-01-02 13:28:28 -080026#include <stdio.h>
Olivier Bailly37dcda62010-11-16 10:41:53 -080027#include <string.h>
Jeff Sharkey5a6bfca2015-05-14 20:33:55 -070028#include <stdint.h>
29#include <inttypes.h>
San Mehatf1b736b2009-10-10 17:22:08 -070030
San Mehatd9a4e352010-03-12 13:32:47 -080031#define LOG_TAG "VoldCmdListener"
Jeff Sharkey5a6bfca2015-05-14 20:33:55 -070032
33#include <base/stringprintf.h>
34#include <cutils/fs.h>
San Mehatf1b736b2009-10-10 17:22:08 -070035#include <cutils/log.h>
36
37#include <sysutils/SocketClient.h>
Ken Sumrall3ad90722011-10-04 20:38:29 -070038#include <private/android_filesystem_config.h>
San Mehatf1b736b2009-10-10 17:22:08 -070039
40#include "CommandListener.h"
41#include "VolumeManager.h"
Jeff Sharkey36801cc2015-03-13 16:09:20 -070042#include "VolumeBase.h"
San Mehata2677e42009-12-13 10:40:18 -080043#include "ResponseCode.h"
San Mehat586536c2010-02-16 17:12:00 -080044#include "Process.h"
San Mehatd9a4e352010-03-12 13:32:47 -080045#include "Loop.h"
46#include "Devmapper.h"
Ken Sumrall8f869aa2010-12-03 03:47:09 -080047#include "cryptfs.h"
Ken Sumrallb87937c2013-03-19 21:46:39 -070048#include "fstrim.h"
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -070049#include "MoveTask.h"
San Mehatf1b736b2009-10-10 17:22:08 -070050
Dianne Hackborn3fd60b42012-11-27 16:00:04 -080051#define DUMP_ARGS 0
52
San Mehatf1b736b2009-10-10 17:22:08 -070053CommandListener::CommandListener() :
Robert Greenwalt149aa3e2012-02-16 14:43:03 -080054 FrameworkListener("vold", true) {
San Mehatd9a4e352010-03-12 13:32:47 -080055 registerCmd(new DumpCmd());
San Mehateba65e92010-01-29 05:15:16 -080056 registerCmd(new VolumeCmd());
57 registerCmd(new AsecCmd());
Kenny Root508c0e12010-07-12 09:59:49 -070058 registerCmd(new ObbCmd());
San Mehat586536c2010-02-16 17:12:00 -080059 registerCmd(new StorageCmd());
Ken Sumrall8f869aa2010-12-03 03:47:09 -080060 registerCmd(new CryptfsCmd());
Ken Sumrallb87937c2013-03-19 21:46:39 -070061 registerCmd(new FstrimCmd());
San Mehatf1b736b2009-10-10 17:22:08 -070062}
63
Dianne Hackborn3fd60b42012-11-27 16:00:04 -080064#if DUMP_ARGS
Mark Salyzyn3e971272014-01-21 13:27:04 -080065void CommandListener::dumpArgs(int argc, char **argv, int argObscure) {
San Mehatd9a4e352010-03-12 13:32:47 -080066 char buffer[4096];
67 char *p = buffer;
68
69 memset(buffer, 0, sizeof(buffer));
70 int i;
71 for (i = 0; i < argc; i++) {
Ken Sumrall8f869aa2010-12-03 03:47:09 -080072 unsigned int len = strlen(argv[i]) + 1; // Account for space
San Mehatd9a4e352010-03-12 13:32:47 -080073 if (i == argObscure) {
74 len += 2; // Account for {}
75 }
76 if (((p - buffer) + len) < (sizeof(buffer)-1)) {
77 if (i == argObscure) {
78 *p++ = '{';
79 *p++ = '}';
80 *p++ = ' ';
81 continue;
82 }
83 strcpy(p, argv[i]);
84 p+= strlen(argv[i]);
85 if (i != (argc -1)) {
86 *p++ = ' ';
87 }
88 }
89 }
San Mehat97ac40e2010-03-24 10:24:19 -070090 SLOGD("%s", buffer);
San Mehatd9a4e352010-03-12 13:32:47 -080091}
Mark Salyzyn3e971272014-01-21 13:27:04 -080092#else
93void CommandListener::dumpArgs(int /*argc*/, char ** /*argv*/, int /*argObscure*/) { }
94#endif
San Mehatd9a4e352010-03-12 13:32:47 -080095
Jeff Sharkey36801cc2015-03-13 16:09:20 -070096int CommandListener::sendGenericOkFail(SocketClient *cli, int cond) {
97 if (!cond) {
98 return cli->sendMsg(ResponseCode::CommandOkay, "Command succeeded", false);
99 } else {
100 return cli->sendMsg(ResponseCode::OperationFailed, "Command failed", false);
101 }
102}
103
San Mehatd9a4e352010-03-12 13:32:47 -0800104CommandListener::DumpCmd::DumpCmd() :
105 VoldCommand("dump") {
106}
107
108int CommandListener::DumpCmd::runCommand(SocketClient *cli,
Mark Salyzyn3e971272014-01-21 13:27:04 -0800109 int /*argc*/, char ** /*argv*/) {
San Mehatd9a4e352010-03-12 13:32:47 -0800110 cli->sendMsg(0, "Dumping loop status", false);
111 if (Loop::dumpState(cli)) {
112 cli->sendMsg(ResponseCode::CommandOkay, "Loop dump failed", true);
113 }
114 cli->sendMsg(0, "Dumping DM status", false);
115 if (Devmapper::dumpState(cli)) {
116 cli->sendMsg(ResponseCode::CommandOkay, "Devmapper dump failed", true);
117 }
San Mehat96597e82010-03-17 09:50:54 -0700118 cli->sendMsg(0, "Dumping mounted filesystems", false);
119 FILE *fp = fopen("/proc/mounts", "r");
120 if (fp) {
121 char line[1024];
122 while (fgets(line, sizeof(line), fp)) {
123 line[strlen(line)-1] = '\0';
124 cli->sendMsg(0, line, false);;
125 }
126 fclose(fp);
127 }
San Mehatd9a4e352010-03-12 13:32:47 -0800128
129 cli->sendMsg(ResponseCode::CommandOkay, "dump complete", false);
130 return 0;
131}
132
San Mehateba65e92010-01-29 05:15:16 -0800133CommandListener::VolumeCmd::VolumeCmd() :
134 VoldCommand("volume") {
San Mehatf1b736b2009-10-10 17:22:08 -0700135}
136
San Mehateba65e92010-01-29 05:15:16 -0800137int CommandListener::VolumeCmd::runCommand(SocketClient *cli,
Mohamad Ayyash7929aa72014-03-10 15:55:33 -0700138 int argc, char **argv) {
San Mehatd9a4e352010-03-12 13:32:47 -0800139 dumpArgs(argc, argv, -1);
140
San Mehateba65e92010-01-29 05:15:16 -0800141 if (argc < 2) {
142 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
143 return 0;
San Mehat49e2bce2009-10-12 16:29:01 -0700144 }
145
San Mehateba65e92010-01-29 05:15:16 -0800146 VolumeManager *vm = VolumeManager::Instance();
Jeff Sharkeyc8e04c52015-04-21 12:14:17 -0700147 std::lock_guard<std::mutex> lock(vm->getLock());
San Mehatf1b736b2009-10-10 17:22:08 -0700148
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700149 // TODO: tease out methods not directly related to volumes
150
151 std::string cmd(argv[1]);
152 if (cmd == "reset") {
153 return sendGenericOkFail(cli, vm->reset());
154
155 } else if (cmd == "shutdown") {
156 return sendGenericOkFail(cli, vm->shutdown());
157
Jeff Sharkeyf1b996d2015-04-17 17:35:20 -0700158 } else if (cmd == "debug") {
159 return sendGenericOkFail(cli, vm->setDebug(true));
160
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700161 } else if (cmd == "partition" && argc > 3) {
162 // partition [diskId] [public|private|mixed] [ratio]
163 std::string id(argv[2]);
164 auto disk = vm->findDisk(id);
165 if (disk == nullptr) {
166 return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown disk", false);
San Mehat57df7bf2010-03-14 13:41:27 -0700167 }
168
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700169 std::string type(argv[3]);
170 if (type == "public") {
171 return sendGenericOkFail(cli, disk->partitionPublic());
172 } else if (type == "private") {
173 return sendGenericOkFail(cli, disk->partitionPrivate());
174 } else if (type == "mixed") {
175 if (argc < 4) {
176 return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
177 }
178 int frac = atoi(argv[4]);
179 return sendGenericOkFail(cli, disk->partitionMixed(frac));
San Mehateba65e92010-01-29 05:15:16 -0800180 } else {
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700181 return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
San Mehateba65e92010-01-29 05:15:16 -0800182 }
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700183
184 } else if (cmd == "mkdirs" && argc > 2) {
185 // mkdirs [path]
186 return sendGenericOkFail(cli, vm->mkdirs(argv[2]));
187
188 } else if (cmd == "start_user" && argc > 2) {
189 // start_user [user]
190 return sendGenericOkFail(cli, vm->startUser(atoi(argv[2])));
191
192 } else if (cmd == "cleanup_user" && argc > 2) {
193 // cleanup_user [user]
194 return sendGenericOkFail(cli, vm->cleanupUser(atoi(argv[2])));
195
196 } else if (cmd == "mount" && argc > 2) {
197 // mount [volId] [flags] [user]
198 std::string id(argv[2]);
199 auto vol = vm->findVolume(id);
200 if (vol == nullptr) {
201 return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
Jeff Sharkey71ebe152013-09-17 17:24:38 -0700202 }
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700203
Jeff Sharkeyf1b996d2015-04-17 17:35:20 -0700204 int mountFlags = (argc > 3) ? atoi(argv[3]) : 0;
205 userid_t mountUserId = (argc > 4) ? atoi(argv[4]) : -1;
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700206
Jeff Sharkeyf1b996d2015-04-17 17:35:20 -0700207 vol->setMountFlags(mountFlags);
208 vol->setMountUserId(mountUserId);
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700209
Jeff Sharkey1bfb3752015-04-29 15:22:23 -0700210 int res = vol->mount();
211 if (mountFlags & android::vold::VolumeBase::MountFlags::kPrimary) {
212 vm->setPrimary(vol);
213 }
214 return sendGenericOkFail(cli, res);
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700215
216 } else if (cmd == "unmount" && argc > 2) {
217 // unmount [volId]
218 std::string id(argv[2]);
219 auto vol = vm->findVolume(id);
220 if (vol == nullptr) {
221 return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
222 }
223
224 return sendGenericOkFail(cli, vol->unmount());
225
226 } else if (cmd == "format" && argc > 2) {
227 // format [volId]
228 std::string id(argv[2]);
229 auto vol = vm->findVolume(id);
230 if (vol == nullptr) {
231 return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
232 }
233
234 return sendGenericOkFail(cli, vol->format());
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700235
236 } else if (cmd == "move_storage" && argc > 3) {
237 // move_storage [fromVolId] [toVolId]
238 auto fromVol = vm->findVolume(std::string(argv[2]));
239 auto toVol = vm->findVolume(std::string(argv[3]));
240 if (fromVol == nullptr || toVol == nullptr) {
241 return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
242 }
243
244 (new android::vold::MoveTask(fromVol, toVol))->start();
245 return sendGenericOkFail(cli, 0);
Jeff Sharkey5a6bfca2015-05-14 20:33:55 -0700246
247 } else if (cmd == "benchmark" && argc > 2) {
248 // benchmark [volId]
249 std::string id(argv[2]);
250 nsecs_t res = vm->benchmarkVolume(id);
251 return cli->sendMsg(ResponseCode::CommandOkay,
252 android::base::StringPrintf("%" PRId64, res).c_str(), false);
San Mehateba65e92010-01-29 05:15:16 -0800253 }
254
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700255 return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
San Mehatf1b736b2009-10-10 17:22:08 -0700256}
257
San Mehat586536c2010-02-16 17:12:00 -0800258CommandListener::StorageCmd::StorageCmd() :
259 VoldCommand("storage") {
260}
261
262int CommandListener::StorageCmd::runCommand(SocketClient *cli,
263 int argc, char **argv) {
Mohamad Ayyash7929aa72014-03-10 15:55:33 -0700264 /* Guarantied to be initialized by vold's main() before the CommandListener is active */
265 extern struct fstab *fstab;
266
San Mehatd9a4e352010-03-12 13:32:47 -0800267 dumpArgs(argc, argv, -1);
268
San Mehat586536c2010-02-16 17:12:00 -0800269 if (argc < 2) {
270 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
271 return 0;
272 }
273
Mohamad Ayyash7929aa72014-03-10 15:55:33 -0700274 if (!strcmp(argv[1], "mountall")) {
275 if (argc != 2) {
276 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: mountall", false);
277 return 0;
278 }
279 fs_mgr_mount_all(fstab);
280 cli->sendMsg(ResponseCode::CommandOkay, "Mountall ran successfully", false);
281 return 0;
282 }
San Mehat586536c2010-02-16 17:12:00 -0800283 if (!strcmp(argv[1], "users")) {
284 DIR *dir;
285 struct dirent *de;
286
JP Abgralledf7adf2014-03-12 10:41:05 -0700287 if (argc < 3) {
288 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument: user <mountpoint>", false);
289 return 0;
290 }
San Mehat586536c2010-02-16 17:12:00 -0800291 if (!(dir = opendir("/proc"))) {
292 cli->sendMsg(ResponseCode::OperationFailed, "Failed to open /proc", true);
293 return 0;
294 }
295
296 while ((de = readdir(dir))) {
297 int pid = Process::getPid(de->d_name);
298
299 if (pid < 0) {
300 continue;
301 }
302
303 char processName[255];
304 Process::getProcessName(pid, processName, sizeof(processName));
305
306 if (Process::checkFileDescriptorSymLinks(pid, argv[2]) ||
307 Process::checkFileMaps(pid, argv[2]) ||
308 Process::checkSymLink(pid, argv[2], "cwd") ||
309 Process::checkSymLink(pid, argv[2], "root") ||
310 Process::checkSymLink(pid, argv[2], "exe")) {
311
312 char msg[1024];
313 snprintf(msg, sizeof(msg), "%d %s", pid, processName);
314 cli->sendMsg(ResponseCode::StorageUsersListResult, msg, false);
315 }
316 }
317 closedir(dir);
318 cli->sendMsg(ResponseCode::CommandOkay, "Storage user list complete", false);
319 } else {
320 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown storage cmd", false);
321 }
322 return 0;
323}
324
San Mehateba65e92010-01-29 05:15:16 -0800325CommandListener::AsecCmd::AsecCmd() :
326 VoldCommand("asec") {
San Mehata19b2502010-01-06 10:33:53 -0800327}
328
Kenny Root344ca102012-04-03 17:23:01 -0700329void CommandListener::AsecCmd::listAsecsInDirectory(SocketClient *cli, const char *directory) {
330 DIR *d = opendir(directory);
331
332 if (!d) {
333 cli->sendMsg(ResponseCode::OperationFailed, "Failed to open asec dir", true);
334 return;
335 }
336
337 size_t dirent_len = offsetof(struct dirent, d_name) +
Elliott Hughes8c480f72012-10-26 16:57:19 -0700338 fpathconf(dirfd(d), _PC_NAME_MAX) + 1;
Kenny Root344ca102012-04-03 17:23:01 -0700339
340 struct dirent *dent = (struct dirent *) malloc(dirent_len);
341 if (dent == NULL) {
342 cli->sendMsg(ResponseCode::OperationFailed, "Failed to allocate memory", true);
343 return;
344 }
345
346 struct dirent *result;
347
348 while (!readdir_r(d, dent, &result) && result != NULL) {
349 if (dent->d_name[0] == '.')
350 continue;
351 if (dent->d_type != DT_REG)
352 continue;
353 size_t name_len = strlen(dent->d_name);
354 if (name_len > 5 && name_len < 260 &&
355 !strcmp(&dent->d_name[name_len - 5], ".asec")) {
356 char id[255];
357 memset(id, 0, sizeof(id));
Kenny Root7b0bc852012-04-27 15:33:58 -0700358 strlcpy(id, dent->d_name, name_len - 4);
Kenny Root344ca102012-04-03 17:23:01 -0700359 cli->sendMsg(ResponseCode::AsecListResult, id, false);
360 }
361 }
362 closedir(d);
363
364 free(dent);
365}
366
San Mehateba65e92010-01-29 05:15:16 -0800367int CommandListener::AsecCmd::runCommand(SocketClient *cli,
368 int argc, char **argv) {
369 if (argc < 2) {
370 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
San Mehata19b2502010-01-06 10:33:53 -0800371 return 0;
372 }
373
San Mehateba65e92010-01-29 05:15:16 -0800374 VolumeManager *vm = VolumeManager::Instance();
375 int rc = 0;
San Mehata19b2502010-01-06 10:33:53 -0800376
San Mehateba65e92010-01-29 05:15:16 -0800377 if (!strcmp(argv[1], "list")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800378 dumpArgs(argc, argv, -1);
San Mehateba65e92010-01-29 05:15:16 -0800379
Jeff Sharkey9f18fe72015-04-01 23:32:18 -0700380 listAsecsInDirectory(cli, VolumeManager::SEC_ASECDIR_EXT);
381 listAsecsInDirectory(cli, VolumeManager::SEC_ASECDIR_INT);
San Mehateba65e92010-01-29 05:15:16 -0800382 } else if (!strcmp(argv[1], "create")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800383 dumpArgs(argc, argv, 5);
Kenny Root344ca102012-04-03 17:23:01 -0700384 if (argc != 8) {
San Mehateba65e92010-01-29 05:15:16 -0800385 cli->sendMsg(ResponseCode::CommandSyntaxError,
Kenny Root344ca102012-04-03 17:23:01 -0700386 "Usage: asec create <container-id> <size_mb> <fstype> <key> <ownerUid> "
387 "<isExternal>", false);
San Mehateba65e92010-01-29 05:15:16 -0800388 return 0;
389 }
390
391 unsigned int numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512;
Kenny Root344ca102012-04-03 17:23:01 -0700392 const bool isExternal = (atoi(argv[7]) == 1);
393 rc = vm->createAsec(argv[2], numSectors, argv[4], argv[5], atoi(argv[6]), isExternal);
Daniel Rosenbergfcd34a02014-05-22 11:23:56 -0700394 } else if (!strcmp(argv[1], "resize")) {
395 dumpArgs(argc, argv, -1);
396 if (argc != 5) {
397 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec resize <container-id> <size_mb> <key>", false);
398 return 0;
399 }
400 unsigned int numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512;
401 rc = vm->resizeAsec(argv[2], numSectors, argv[4]);
San Mehateba65e92010-01-29 05:15:16 -0800402 } else if (!strcmp(argv[1], "finalize")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800403 dumpArgs(argc, argv, -1);
San Mehateba65e92010-01-29 05:15:16 -0800404 if (argc != 3) {
405 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec finalize <container-id>", false);
406 return 0;
407 }
San Mehat8f2875b2010-02-18 11:40:49 -0800408 rc = vm->finalizeAsec(argv[2]);
Kenny Root344ca102012-04-03 17:23:01 -0700409 } else if (!strcmp(argv[1], "fixperms")) {
410 dumpArgs(argc, argv, -1);
411 if (argc != 5) {
412 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
413 return 0;
414 }
415
416 char *endptr;
417 gid_t gid = (gid_t) strtoul(argv[3], &endptr, 10);
418 if (*endptr != '\0') {
419 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
420 return 0;
421 }
422
423 rc = vm->fixupAsecPermissions(argv[2], gid, argv[4]);
San Mehateba65e92010-01-29 05:15:16 -0800424 } else if (!strcmp(argv[1], "destroy")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800425 dumpArgs(argc, argv, -1);
San Mehat4ba89482010-02-18 09:00:18 -0800426 if (argc < 3) {
427 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec destroy <container-id> [force]", false);
San Mehateba65e92010-01-29 05:15:16 -0800428 return 0;
429 }
San Mehat4ba89482010-02-18 09:00:18 -0800430 bool force = false;
431 if (argc > 3 && !strcmp(argv[3], "force")) {
432 force = true;
433 }
San Mehat8f2875b2010-02-18 11:40:49 -0800434 rc = vm->destroyAsec(argv[2], force);
San Mehateba65e92010-01-29 05:15:16 -0800435 } else if (!strcmp(argv[1], "mount")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800436 dumpArgs(argc, argv, 3);
Jeff Sharkey43ed1232014-08-22 12:29:05 -0700437 if (argc != 6) {
San Mehateba65e92010-01-29 05:15:16 -0800438 cli->sendMsg(ResponseCode::CommandSyntaxError,
Jeff Sharkey43ed1232014-08-22 12:29:05 -0700439 "Usage: asec mount <namespace-id> <key> <ownerUid> <ro|rw>", false);
San Mehateba65e92010-01-29 05:15:16 -0800440 return 0;
441 }
Jeff Sharkey43ed1232014-08-22 12:29:05 -0700442 bool readOnly = true;
443 if (!strcmp(argv[5], "rw")) {
444 readOnly = false;
445 }
446 rc = vm->mountAsec(argv[2], argv[3], atoi(argv[4]), readOnly);
San Mehateba65e92010-01-29 05:15:16 -0800447 } else if (!strcmp(argv[1], "unmount")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800448 dumpArgs(argc, argv, -1);
San Mehat4ba89482010-02-18 09:00:18 -0800449 if (argc < 3) {
450 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec unmount <container-id> [force]", false);
San Mehateba65e92010-01-29 05:15:16 -0800451 return 0;
452 }
San Mehat4ba89482010-02-18 09:00:18 -0800453 bool force = false;
454 if (argc > 3 && !strcmp(argv[3], "force")) {
455 force = true;
456 }
San Mehat8f2875b2010-02-18 11:40:49 -0800457 rc = vm->unmountAsec(argv[2], force);
San Mehateba65e92010-01-29 05:15:16 -0800458 } else if (!strcmp(argv[1], "rename")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800459 dumpArgs(argc, argv, -1);
San Mehateba65e92010-01-29 05:15:16 -0800460 if (argc != 4) {
461 cli->sendMsg(ResponseCode::CommandSyntaxError,
462 "Usage: asec rename <old_id> <new_id>", false);
463 return 0;
464 }
San Mehat8f2875b2010-02-18 11:40:49 -0800465 rc = vm->renameAsec(argv[2], argv[3]);
San Mehateba65e92010-01-29 05:15:16 -0800466 } else if (!strcmp(argv[1], "path")) {
San Mehatd9a4e352010-03-12 13:32:47 -0800467 dumpArgs(argc, argv, -1);
San Mehateba65e92010-01-29 05:15:16 -0800468 if (argc != 3) {
469 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec path <container-id>", false);
470 return 0;
471 }
472 char path[255];
473
San Mehat88ac2c02010-03-23 11:15:58 -0700474 if (!(rc = vm->getAsecMountPath(argv[2], path, sizeof(path)))) {
San Mehateba65e92010-01-29 05:15:16 -0800475 cli->sendMsg(ResponseCode::AsecPathResult, path, false);
San Mehat88ac2c02010-03-23 11:15:58 -0700476 return 0;
San Mehateba65e92010-01-29 05:15:16 -0800477 }
Dianne Hackborn736910c2011-06-27 13:37:07 -0700478 } else if (!strcmp(argv[1], "fspath")) {
479 dumpArgs(argc, argv, -1);
480 if (argc != 3) {
481 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fspath <container-id>", false);
482 return 0;
483 }
484 char path[255];
485
486 if (!(rc = vm->getAsecFilesystemPath(argv[2], path, sizeof(path)))) {
487 cli->sendMsg(ResponseCode::AsecPathResult, path, false);
488 return 0;
489 }
San Mehata19b2502010-01-06 10:33:53 -0800490 } else {
San Mehatd9a4e352010-03-12 13:32:47 -0800491 dumpArgs(argc, argv, -1);
San Mehateba65e92010-01-29 05:15:16 -0800492 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown asec cmd", false);
San Mehata19b2502010-01-06 10:33:53 -0800493 }
494
San Mehat8f2875b2010-02-18 11:40:49 -0800495 if (!rc) {
496 cli->sendMsg(ResponseCode::CommandOkay, "asec operation succeeded", false);
497 } else {
498 rc = ResponseCode::convertFromErrno();
499 cli->sendMsg(rc, "asec operation failed", true);
500 }
501
San Mehata19b2502010-01-06 10:33:53 -0800502 return 0;
503}
San Mehat2350c442010-03-02 13:16:50 -0800504
Kenny Root508c0e12010-07-12 09:59:49 -0700505CommandListener::ObbCmd::ObbCmd() :
506 VoldCommand("obb") {
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700507}
508
Kenny Root508c0e12010-07-12 09:59:49 -0700509int CommandListener::ObbCmd::runCommand(SocketClient *cli,
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700510 int argc, char **argv) {
511 if (argc < 2) {
512 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
513 return 0;
514 }
515
516 VolumeManager *vm = VolumeManager::Instance();
517 int rc = 0;
518
Kenny Root508c0e12010-07-12 09:59:49 -0700519 if (!strcmp(argv[1], "list")) {
520 dumpArgs(argc, argv, -1);
521
522 rc = vm->listMountedObbs(cli);
523 } else if (!strcmp(argv[1], "mount")) {
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700524 dumpArgs(argc, argv, 3);
525 if (argc != 5) {
526 cli->sendMsg(ResponseCode::CommandSyntaxError,
Jeff Sharkey69479042012-09-25 16:14:57 -0700527 "Usage: obb mount <filename> <key> <ownerGid>", false);
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700528 return 0;
529 }
Kenny Root508c0e12010-07-12 09:59:49 -0700530 rc = vm->mountObb(argv[2], argv[3], atoi(argv[4]));
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700531 } else if (!strcmp(argv[1], "unmount")) {
532 dumpArgs(argc, argv, -1);
533 if (argc < 3) {
Kenny Root508c0e12010-07-12 09:59:49 -0700534 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb unmount <source file> [force]", false);
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700535 return 0;
536 }
537 bool force = false;
538 if (argc > 3 && !strcmp(argv[3], "force")) {
539 force = true;
540 }
Kenny Root508c0e12010-07-12 09:59:49 -0700541 rc = vm->unmountObb(argv[2], force);
542 } else if (!strcmp(argv[1], "path")) {
543 dumpArgs(argc, argv, -1);
544 if (argc != 3) {
545 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb path <source file>", false);
546 return 0;
547 }
548 char path[255];
549
550 if (!(rc = vm->getObbMountPath(argv[2], path, sizeof(path)))) {
551 cli->sendMsg(ResponseCode::AsecPathResult, path, false);
552 return 0;
553 }
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700554 } else {
555 dumpArgs(argc, argv, -1);
Kenny Root508c0e12010-07-12 09:59:49 -0700556 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown obb cmd", false);
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700557 }
558
559 if (!rc) {
Kenny Root508c0e12010-07-12 09:59:49 -0700560 cli->sendMsg(ResponseCode::CommandOkay, "obb operation succeeded", false);
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700561 } else {
562 rc = ResponseCode::convertFromErrno();
Kenny Root508c0e12010-07-12 09:59:49 -0700563 cli->sendMsg(rc, "obb operation failed", true);
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700564 }
565
566 return 0;
567}
568
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800569CommandListener::CryptfsCmd::CryptfsCmd() :
570 VoldCommand("cryptfs") {
571}
572
Paul Lawrence45f10532014-04-04 18:11:56 +0000573static int getType(const char* type)
574{
575 if (!strcmp(type, "default")) {
576 return CRYPT_TYPE_DEFAULT;
577 } else if (!strcmp(type, "password")) {
578 return CRYPT_TYPE_PASSWORD;
579 } else if (!strcmp(type, "pin")) {
580 return CRYPT_TYPE_PIN;
581 } else if (!strcmp(type, "pattern")) {
582 return CRYPT_TYPE_PATTERN;
583 } else {
584 return -1;
585 }
586}
587
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800588int CommandListener::CryptfsCmd::runCommand(SocketClient *cli,
589 int argc, char **argv) {
Ken Sumrall3ad90722011-10-04 20:38:29 -0700590 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) {
591 cli->sendMsg(ResponseCode::CommandNoPermission, "No permission to run cryptfs commands", false);
592 return 0;
593 }
594
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800595 if (argc < 2) {
596 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
597 return 0;
598 }
599
600 int rc = 0;
601
602 if (!strcmp(argv[1], "checkpw")) {
603 if (argc != 3) {
604 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs checkpw <passwd>", false);
605 return 0;
606 }
Ken Sumrall8ddbe402011-01-17 15:26:29 -0800607 dumpArgs(argc, argv, 2);
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800608 rc = cryptfs_check_passwd(argv[2]);
Ken Sumrall6864b7e2011-01-14 15:20:02 -0800609 } else if (!strcmp(argv[1], "restart")) {
610 if (argc != 2) {
611 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs restart", false);
612 return 0;
613 }
Ken Sumrall8ddbe402011-01-17 15:26:29 -0800614 dumpArgs(argc, argv, -1);
Ken Sumrall6864b7e2011-01-14 15:20:02 -0800615 rc = cryptfs_restart();
Ken Sumrall7f7dbaa2011-02-01 15:46:41 -0800616 } else if (!strcmp(argv[1], "cryptocomplete")) {
617 if (argc != 2) {
618 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs cryptocomplete", false);
619 return 0;
620 }
621 dumpArgs(argc, argv, -1);
622 rc = cryptfs_crypto_complete();
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800623 } else if (!strcmp(argv[1], "enablecrypto")) {
Paul Lawrence45f10532014-04-04 18:11:56 +0000624 const char* syntax = "Usage: cryptfs enablecrypto <wipe|inplace> "
625 "default|password|pin|pattern [passwd]";
626 if ( (argc != 4 && argc != 5)
Paul Lawrence13486032014-02-03 13:28:11 -0800627 || (strcmp(argv[2], "wipe") && strcmp(argv[2], "inplace")) ) {
Paul Lawrence45f10532014-04-04 18:11:56 +0000628 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax, false);
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800629 return 0;
630 }
Paul Lawrence45f10532014-04-04 18:11:56 +0000631 dumpArgs(argc, argv, 4);
JP Abgrall502dc742013-11-01 13:06:20 -0700632
Paul Lawrence13486032014-02-03 13:28:11 -0800633 int tries;
634 for (tries = 0; tries < 2; ++tries) {
Paul Lawrence45f10532014-04-04 18:11:56 +0000635 int type = getType(argv[3]);
636 if (type == -1) {
637 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax,
638 false);
639 return 0;
640 } else if (type == CRYPT_TYPE_DEFAULT) {
641 rc = cryptfs_enable_default(argv[2], /*allow_reboot*/false);
642 } else {
643 rc = cryptfs_enable(argv[2], type, argv[4],
644 /*allow_reboot*/false);
645 }
Paul Lawrence13486032014-02-03 13:28:11 -0800646
647 if (rc == 0) {
648 break;
649 } else if (tries == 0) {
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700650 Process::killProcessesWithOpenFiles(DATA_MNT_POINT, SIGKILL);
Paul Lawrence13486032014-02-03 13:28:11 -0800651 }
652 }
Ken Sumrall8ddbe402011-01-17 15:26:29 -0800653 } else if (!strcmp(argv[1], "changepw")) {
Paul Lawrencef4faa572014-01-29 13:31:03 -0800654 const char* syntax = "Usage: cryptfs changepw "
655 "default|password|pin|pattern [newpasswd]";
Paul Lawrence13486032014-02-03 13:28:11 -0800656 const char* password;
Paul Lawrencef4faa572014-01-29 13:31:03 -0800657 if (argc == 3) {
658 password = "";
659 } else if (argc == 4) {
660 password = argv[3];
661 } else {
662 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax, false);
Ken Sumrall8ddbe402011-01-17 15:26:29 -0800663 return 0;
Paul Lawrencef4faa572014-01-29 13:31:03 -0800664 }
Paul Lawrence45f10532014-04-04 18:11:56 +0000665 int type = getType(argv[2]);
666 if (type == -1) {
Paul Lawrencef4faa572014-01-29 13:31:03 -0800667 cli->sendMsg(ResponseCode::CommandSyntaxError, syntax, false);
668 return 0;
669 }
670 SLOGD("cryptfs changepw %s {}", argv[2]);
671 rc = cryptfs_changepw(type, password);
Ken Sumrall3ad90722011-10-04 20:38:29 -0700672 } else if (!strcmp(argv[1], "verifypw")) {
673 if (argc != 3) {
674 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs verifypw <passwd>", false);
675 return 0;
676 }
677 SLOGD("cryptfs verifypw {}");
678 rc = cryptfs_verify_passwd(argv[2]);
Ken Sumrall160b4d62013-04-22 12:15:39 -0700679 } else if (!strcmp(argv[1], "getfield")) {
Rubin Xu85c01f92014-10-13 12:49:54 +0100680 char *valbuf;
681 int valbuf_len = PROPERTY_VALUE_MAX;
Ken Sumrall160b4d62013-04-22 12:15:39 -0700682
683 if (argc != 3) {
684 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs getfield <fieldname>", false);
685 return 0;
686 }
687 dumpArgs(argc, argv, -1);
Rubin Xu85c01f92014-10-13 12:49:54 +0100688
689 // Increase the buffer size until it is big enough for the field value stored.
690 while (1) {
691 valbuf = (char*)malloc(valbuf_len);
692 if (valbuf == NULL) {
693 cli->sendMsg(ResponseCode::OperationFailed, "Failed to allocate memory", false);
694 return 0;
695 }
696 rc = cryptfs_getfield(argv[2], valbuf, valbuf_len);
697 if (rc != CRYPTO_GETFIELD_ERROR_BUF_TOO_SMALL) {
698 break;
699 }
700 free(valbuf);
701 valbuf_len *= 2;
702 }
703 if (rc == CRYPTO_GETFIELD_OK) {
Ken Sumrall160b4d62013-04-22 12:15:39 -0700704 cli->sendMsg(ResponseCode::CryptfsGetfieldResult, valbuf, false);
705 }
Rubin Xu85c01f92014-10-13 12:49:54 +0100706 free(valbuf);
Ken Sumrall160b4d62013-04-22 12:15:39 -0700707 } else if (!strcmp(argv[1], "setfield")) {
708 if (argc != 4) {
709 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: cryptfs setfield <fieldname> <value>", false);
710 return 0;
711 }
712 dumpArgs(argc, argv, -1);
713 rc = cryptfs_setfield(argv[2], argv[3]);
Paul Lawrencef4faa572014-01-29 13:31:03 -0800714 } else if (!strcmp(argv[1], "mountdefaultencrypted")) {
715 SLOGD("cryptfs mountdefaultencrypted");
716 dumpArgs(argc, argv, -1);
717 rc = cryptfs_mount_default_encrypted();
718 } else if (!strcmp(argv[1], "getpwtype")) {
719 SLOGD("cryptfs getpwtype");
720 dumpArgs(argc, argv, -1);
721 switch(cryptfs_get_password_type()) {
722 case CRYPT_TYPE_PASSWORD:
723 cli->sendMsg(ResponseCode::PasswordTypeResult, "password", false);
724 return 0;
725 case CRYPT_TYPE_PATTERN:
726 cli->sendMsg(ResponseCode::PasswordTypeResult, "pattern", false);
727 return 0;
728 case CRYPT_TYPE_PIN:
729 cli->sendMsg(ResponseCode::PasswordTypeResult, "pin", false);
730 return 0;
731 case CRYPT_TYPE_DEFAULT:
732 cli->sendMsg(ResponseCode::PasswordTypeResult, "default", false);
733 return 0;
734 default:
735 /** @TODO better error and make sure handled by callers */
736 cli->sendMsg(ResponseCode::OpFailedStorageNotFound, "Error", false);
737 return 0;
738 }
Paul Lawrence399317e2014-03-10 13:20:50 -0700739 } else if (!strcmp(argv[1], "getpw")) {
740 SLOGD("cryptfs getpw");
Paul Lawrence684dbdf2014-02-07 12:07:22 -0800741 dumpArgs(argc, argv, -1);
Paul Lawrence05335c32015-03-05 09:46:23 -0800742 const char* password = cryptfs_get_password();
Paul Lawrence399317e2014-03-10 13:20:50 -0700743 if (password) {
Paul Lawrenceb25302e2014-11-11 12:26:09 -0800744 char* message = 0;
745 int size = asprintf(&message, "{{sensitive}} %s", password);
746 if (size != -1) {
747 cli->sendMsg(ResponseCode::CommandOkay, message, false);
748 memset(message, 0, size);
749 free (message);
750 return 0;
751 }
Paul Lawrence399317e2014-03-10 13:20:50 -0700752 }
753 rc = -1;
754 } else if (!strcmp(argv[1], "clearpw")) {
755 SLOGD("cryptfs clearpw");
756 dumpArgs(argc, argv, -1);
757 cryptfs_clear_password();
758 rc = 0;
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800759 } else {
Ken Sumrall8ddbe402011-01-17 15:26:29 -0800760 dumpArgs(argc, argv, -1);
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800761 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown cryptfs cmd", false);
Paul Lawrencef4faa572014-01-29 13:31:03 -0800762 return 0;
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800763 }
764
Jason parks0167cb12011-01-20 18:30:39 -0600765 // Always report that the command succeeded and return the error code.
766 // The caller will check the return value to see what the error was.
767 char msg[255];
768 snprintf(msg, sizeof(msg), "%d", rc);
769 cli->sendMsg(ResponseCode::CommandOkay, msg, false);
Ken Sumrall8f869aa2010-12-03 03:47:09 -0800770
771 return 0;
772}
Ken Sumrallb87937c2013-03-19 21:46:39 -0700773
774CommandListener::FstrimCmd::FstrimCmd() :
775 VoldCommand("fstrim") {
776}
777int CommandListener::FstrimCmd::runCommand(SocketClient *cli,
778 int argc, char **argv) {
779 if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) {
780 cli->sendMsg(ResponseCode::CommandNoPermission, "No permission to run fstrim commands", false);
781 return 0;
782 }
783
784 if (argc < 2) {
785 cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
786 return 0;
787 }
788
789 int rc = 0;
790
791 if (!strcmp(argv[1], "dotrim")) {
792 if (argc != 2) {
793 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: fstrim dotrim", false);
794 return 0;
795 }
796 dumpArgs(argc, argv, -1);
JP Abgrall422bdb72014-07-29 13:24:56 -0700797 rc = fstrim_filesystems(0);
798 } else if (!strcmp(argv[1], "dodtrim")) {
799 if (argc != 2) {
800 cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: fstrim dodtrim", false);
801 return 0;
802 }
803 dumpArgs(argc, argv, -1);
804 rc = fstrim_filesystems(1); /* Do Deep Discard trim */
Ken Sumrallb87937c2013-03-19 21:46:39 -0700805 } else {
806 dumpArgs(argc, argv, -1);
807 cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown fstrim cmd", false);
808 }
809
810 // Always report that the command succeeded and return the error code.
811 // The caller will check the return value to see what the error was.
812 char msg[255];
813 snprintf(msg, sizeof(msg), "%d", rc);
814 cli->sendMsg(ResponseCode::CommandOkay, msg, false);
815
816 return 0;
817}