blob: f29a7fd3c390d1473bf16a8d4f6287f20370d835 [file] [log] [blame]
San Mehatf1b736b2009-10-10 17:22:08 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Jeff Sharkey36801cc2015-03-13 16:09:20 -070017#ifndef ANDROID_VOLD_VOLUME_MANAGER_H
18#define ANDROID_VOLD_VOLUME_MANAGER_H
San Mehatf1b736b2009-10-10 17:22:08 -070019
20#include <pthread.h>
Jeff Sharkey36801cc2015-03-13 16:09:20 -070021#include <fnmatch.h>
22#include <stdlib.h>
San Mehatf1b736b2009-10-10 17:22:08 -070023
Ken Sumrall29d8da82011-05-18 17:20:07 -070024#ifdef __cplusplus
Jeff Sharkey36801cc2015-03-13 16:09:20 -070025
Jeff Sharkey36801cc2015-03-13 16:09:20 -070026#include <list>
Jeff Sharkeyc8e04c52015-04-21 12:14:17 -070027#include <mutex>
28#include <string>
Jeff Sharkey36801cc2015-03-13 16:09:20 -070029
30#include <cutils/multiuser.h>
San Mehatf1b736b2009-10-10 17:22:08 -070031#include <utils/List.h>
Jeff Sharkey5a6bfca2015-05-14 20:33:55 -070032#include <utils/Timers.h>
San Mehatf1b736b2009-10-10 17:22:08 -070033#include <sysutils/SocketListener.h>
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070034#include <sysutils/NetlinkEvent.h>
San Mehatf1b736b2009-10-10 17:22:08 -070035
Jeff Sharkey36801cc2015-03-13 16:09:20 -070036#include "Disk.h"
Jeff Sharkey36801cc2015-03-13 16:09:20 -070037#include "VolumeBase.h"
San Mehatf1b736b2009-10-10 17:22:08 -070038
Kenny Rootacc9e7d2010-06-18 19:06:50 -070039/* The length of an MD5 hash when encoded into ASCII hex characters */
40#define MD5_ASCII_LENGTH_PLUS_NULL ((MD5_DIGEST_LENGTH*2)+1)
41
Kenny Rootcbacf782010-09-24 15:11:48 -070042typedef enum { ASEC, OBB } container_type_t;
43
44class ContainerData {
45public:
46 ContainerData(char* _id, container_type_t _type)
47 : id(_id)
48 , type(_type)
49 {}
50
51 ~ContainerData() {
52 if (id != NULL) {
53 free(id);
54 id = NULL;
55 }
56 }
57
58 char *id;
59 container_type_t type;
60};
61
62typedef android::List<ContainerData*> AsecIdCollection;
San Mehat88705162010-01-15 09:26:28 -080063
San Mehatf1b736b2009-10-10 17:22:08 -070064class VolumeManager {
Jeff Sharkey9f18fe72015-04-01 23:32:18 -070065public:
66 static const char *SEC_ASECDIR_EXT;
67 static const char *SEC_ASECDIR_INT;
68 static const char *ASECDIR;
69 static const char *LOOPDIR;
70
San Mehatf1b736b2009-10-10 17:22:08 -070071private:
72 static VolumeManager *sInstance;
73
San Mehatf1b736b2009-10-10 17:22:08 -070074 SocketListener *mBroadcaster;
San Mehatf1b736b2009-10-10 17:22:08 -070075
San Mehat88705162010-01-15 09:26:28 -080076 AsecIdCollection *mActiveContainers;
San Mehatd9a4e352010-03-12 13:32:47 -080077 bool mDebug;
San Mehatf1b736b2009-10-10 17:22:08 -070078
Mike Lockwooda28056b2010-10-28 15:21:24 -040079 // for adjusting /proc/sys/vm/dirty_ratio when UMS is active
80 int mUmsSharingCount;
81 int mSavedDirtyRatio;
82 int mUmsDirtyRatio;
83
San Mehatf1b736b2009-10-10 17:22:08 -070084public:
85 virtual ~VolumeManager();
86
Jeff Sharkeyc8e04c52015-04-21 12:14:17 -070087 // TODO: pipe all requests through VM to avoid exposing this lock
88 std::mutex& getLock() { return mLock; }
89
San Mehatf1b736b2009-10-10 17:22:08 -070090 int start();
91 int stop();
92
San Mehatfd7f5872009-10-12 11:32:47 -070093 void handleBlockEvent(NetlinkEvent *evt);
San Mehatf1b736b2009-10-10 17:22:08 -070094
Jeff Sharkey36801cc2015-03-13 16:09:20 -070095 class DiskSource {
96 public:
97 DiskSource(const std::string& sysPattern, const std::string& nickname, int flags) :
98 mSysPattern(sysPattern), mNickname(nickname), mFlags(flags) {
99 }
100
101 bool matches(const std::string& sysPath) {
102 return !fnmatch(mSysPattern.c_str(), sysPath.c_str(), 0);
103 }
104
105 const std::string& getNickname() { return mNickname; }
106 int getFlags() { return mFlags; }
107
108 private:
109 std::string mSysPattern;
110 std::string mNickname;
111 int mFlags;
112 };
113
114 void addDiskSource(const std::shared_ptr<DiskSource>& diskSource);
115
116 std::shared_ptr<android::vold::Disk> findDisk(const std::string& id);
117 std::shared_ptr<android::vold::VolumeBase> findVolume(const std::string& id);
118
Jeff Sharkey5a6bfca2015-05-14 20:33:55 -0700119 nsecs_t benchmarkVolume(const std::string& id);
120
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700121 int startUser(userid_t userId);
122 int cleanupUser(userid_t userId);
123
124 int setPrimary(const std::shared_ptr<android::vold::VolumeBase>& vol);
125
126 /* Reset all internal state, typically during framework boot */
127 int reset();
128 /* Prepare for device shutdown, safely unmounting all devices */
129 int shutdown();
Jeff Sharkey9c484982015-03-31 10:35:33 -0700130 /* Unmount all volumes, usually for encryption */
131 int unmountAll();
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700132
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700133 /* ASEC */
Kenny Root344ca102012-04-03 17:23:01 -0700134 int findAsec(const char *id, char *asecPath = NULL, size_t asecPathLen = 0,
135 const char **directory = NULL) const;
San Mehat8b8f71b2010-01-11 09:17:25 -0800136 int createAsec(const char *id, unsigned numSectors, const char *fstype,
Kenny Root344ca102012-04-03 17:23:01 -0700137 const char *key, const int ownerUid, bool isExternal);
Daniel Rosenbergfcd34a02014-05-22 11:23:56 -0700138 int resizeAsec(const char *id, unsigned numSectors, const char *key);
San Mehata19b2502010-01-06 10:33:53 -0800139 int finalizeAsec(const char *id);
Kenny Root344ca102012-04-03 17:23:01 -0700140
141 /**
142 * Fixes ASEC permissions on a filesystem that has owners and permissions.
143 * This currently means EXT4-based ASEC containers.
144 *
145 * There is a single file that can be marked as "private" and will not have
146 * world-readable permission. The group for that file will be set to the gid
147 * supplied.
148 *
149 * Returns 0 on success.
150 */
151 int fixupAsecPermissions(const char *id, gid_t gid, const char* privateFilename);
San Mehat4ba89482010-02-18 09:00:18 -0800152 int destroyAsec(const char *id, bool force);
Jeff Sharkey43ed1232014-08-22 12:29:05 -0700153 int mountAsec(const char *id, const char *key, int ownerUid, bool readOnly);
San Mehat4ba89482010-02-18 09:00:18 -0800154 int unmountAsec(const char *id, bool force);
San Mehat048b0802010-01-23 08:17:06 -0800155 int renameAsec(const char *id1, const char *id2);
San Mehata19b2502010-01-06 10:33:53 -0800156 int getAsecMountPath(const char *id, char *buffer, int maxlen);
Dianne Hackborn736910c2011-06-27 13:37:07 -0700157 int getAsecFilesystemPath(const char *id, char *buffer, int maxlen);
San Mehatf1b736b2009-10-10 17:22:08 -0700158
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700159 /* Loopback images */
Kenny Root508c0e12010-07-12 09:59:49 -0700160 int listMountedObbs(SocketClient* cli);
161 int mountObb(const char *fileName, const char *key, int ownerUid);
162 int unmountObb(const char *fileName, bool force);
163 int getObbMountPath(const char *id, char *buffer, int maxlen);
Kenny Rootfb7c4d52010-06-30 18:48:41 -0700164
165 /* Shared between ASEC and Loopback images */
166 int unmountLoopImage(const char *containerId, const char *loopId,
167 const char *fileName, const char *mountPoint, bool force);
168
Jeff Sharkeyf1b996d2015-04-17 17:35:20 -0700169 int setDebug(bool enable);
San Mehatd9a4e352010-03-12 13:32:47 -0800170
San Mehatf1b736b2009-10-10 17:22:08 -0700171 void setBroadcaster(SocketListener *sl) { mBroadcaster = sl; }
172 SocketListener *getBroadcaster() { return mBroadcaster; }
173
174 static VolumeManager *Instance();
175
San Mehatd9a4e352010-03-12 13:32:47 -0800176 static char *asecHash(const char *id, char *buffer, size_t len);
San Mehat1a06eda2010-04-15 12:58:50 -0700177
Jeff Sharkey71ebe152013-09-17 17:24:38 -0700178 /*
179 * Ensure that all directories along given path exist, creating parent
180 * directories as needed. Validates that given path is absolute and that
181 * it contains no relative "." or ".." paths or symlinks. Last path segment
182 * is treated as filename and ignored, unless the path ends with "/". Also
183 * ensures that path belongs to a volume managed by vold.
184 */
185 int mkdirs(char* path);
186
San Mehatf1b736b2009-10-10 17:22:08 -0700187private:
188 VolumeManager();
Mike Lockwood99635f62010-06-25 23:04:04 -0400189 void readInitialState();
San Mehata19b2502010-01-06 10:33:53 -0800190 bool isMountpointMounted(const char *mp);
Kenny Root344ca102012-04-03 17:23:01 -0700191 bool isAsecInDirectory(const char *dir, const char *asec) const;
Nick Kralevich66962602014-01-27 14:58:06 -0800192 bool isLegalAsecId(const char *id) const;
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700193
194 int linkPrimary(userid_t userId);
195
Jeff Sharkeyc8e04c52015-04-21 12:14:17 -0700196 std::mutex mLock;
197
Jeff Sharkey36801cc2015-03-13 16:09:20 -0700198 std::list<std::shared_ptr<DiskSource>> mDiskSources;
199 std::list<std::shared_ptr<android::vold::Disk>> mDisks;
200
201 std::list<userid_t> mUsers;
202
203 std::shared_ptr<android::vold::VolumeBase> mInternalEmulated;
204 std::shared_ptr<android::vold::VolumeBase> mPrimary;
San Mehatf1b736b2009-10-10 17:22:08 -0700205};
Ken Sumrall29d8da82011-05-18 17:20:07 -0700206
207extern "C" {
208#endif /* __cplusplus */
Ken Sumrall319b1042011-06-14 14:01:55 -0700209#define UNMOUNT_NOT_MOUNTED_ERR -2
Jeff Sharkey9c484982015-03-31 10:35:33 -0700210 int vold_unmountAll(void);
Ken Sumrall29d8da82011-05-18 17:20:07 -0700211#ifdef __cplusplus
212}
213#endif
214
San Mehatf1b736b2009-10-10 17:22:08 -0700215#endif