1 /* 2 * Copyright (C) 2015 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #include "Disk.h" 18 #include "PublicVolume.h" 19 #include "PrivateVolume.h" 20 #include "Utils.h" 21 #include "VolumeBase.h" 22 #include "VolumeManager.h" 23 #include "ResponseCode.h" 24 #include "Ext4Crypt.h" 25 26 #include <android-base/file.h> 27 #include <android-base/stringprintf.h> 28 #include <android-base/logging.h> 29 #include <diskconfig/diskconfig.h> 30 31 #include <vector> 32 #include <fcntl.h> 33 #include <inttypes.h> 34 #include <stdio.h> 35 #include <stdlib.h> 36 #include <sys/types.h> 37 #include <sys/stat.h> 38 #include <sys/mount.h> 39 40 using android::base::ReadFileToString; 41 using android::base::WriteStringToFile; 42 using android::base::StringPrintf; 43 44 namespace android { 45 namespace vold { 46 47 static const char* kSgdiskPath = "/system/bin/sgdisk"; 48 static const char* kSgdiskToken = " \t\n"; 49 50 static const char* kSysfsLoopMaxMinors = "/sys/module/loop/parameters/max_part"; 51 static const char* kSysfsMmcMaxMinors = "/sys/module/mmcblk/parameters/perdev_minors"; 52 53 static const unsigned int kMajorBlockLoop = 7; 54 static const unsigned int kMajorBlockScsiA = 8; 55 static const unsigned int kMajorBlockScsiB = 65; 56 static const unsigned int kMajorBlockScsiC = 66; 57 static const unsigned int kMajorBlockScsiD = 67; 58 static const unsigned int kMajorBlockScsiE = 68; 59 static const unsigned int kMajorBlockScsiF = 69; 60 static const unsigned int kMajorBlockScsiG = 70; 61 static const unsigned int kMajorBlockScsiH = 71; 62 static const unsigned int kMajorBlockScsiI = 128; 63 static const unsigned int kMajorBlockScsiJ = 129; 64 static const unsigned int kMajorBlockScsiK = 130; 65 static const unsigned int kMajorBlockScsiL = 131; 66 static const unsigned int kMajorBlockScsiM = 132; 67 static const unsigned int kMajorBlockScsiN = 133; 68 static const unsigned int kMajorBlockScsiO = 134; 69 static const unsigned int kMajorBlockScsiP = 135; 70 static const unsigned int kMajorBlockMmc = 179; 71 static const unsigned int kMajorBlockExperimentalMin = 240; 72 static const unsigned int kMajorBlockExperimentalMax = 254; 73 74 static const char* kGptBasicData = "EBD0A0A2-B9E5-4433-87C0-68B6B72699C7"; 75 static const char* kGptAndroidMeta = "19A710A2-B3CA-11E4-B026-10604B889DCF"; 76 static const char* kGptAndroidExpand = "193D1EA4-B3CA-11E4-B075-10604B889DCF"; 77 78 enum class Table { 79 kUnknown, 80 kMbr, 81 kGpt, 82 }; 83 84 static bool isVirtioBlkDevice(unsigned int major) { 85 /* 86 * The new emulator's "ranchu" virtual board no longer includes a goldfish 87 * MMC-based SD card device; instead, it emulates SD cards with virtio-blk, 88 * which has been supported by upstream kernel and QEMU for quite a while. 89 * Unfortunately, the virtio-blk block device driver does not use a fixed 90 * major number, but relies on the kernel to assign one from a specific 91 * range of block majors, which are allocated for "LOCAL/EXPERIMENAL USE" 92 * per Documentation/devices.txt. This is true even for the latest Linux 93 * kernel (4.4; see init() in drivers/block/virtio_blk.c). 94 * 95 * This makes it difficult for vold to detect a virtio-blk based SD card. 96 * The current solution checks two conditions (both must be met): 97 * 98 * a) If the running environment is the emulator; 99 * b) If the major number is an experimental block device major number (for 100 * x86/x86_64 3.10 ranchu kernels, virtio-blk always gets major number 101 * 253, but it is safer to match the range than just one value). 102 * 103 * Other conditions could be used, too, e.g. the hardware name should be 104 * "ranchu", the device's sysfs path should end with "/block/vd[d-z]", etc. 105 * But just having a) and b) is enough for now. 106 */ 107 return IsRunningInEmulator() && major >= kMajorBlockExperimentalMin 108 && major <= kMajorBlockExperimentalMax; 109 } 110 111 Disk::Disk(const std::string& eventPath, dev_t device, 112 const std::string& nickname, int flags) : 113 mDevice(device), mSize(-1), mNickname(nickname), mFlags(flags), mCreated( 114 false), mJustPartitioned(false) { 115 mId = StringPrintf("disk:%u,%u", major(device), minor(device)); 116 mEventPath = eventPath; 117 mSysPath = StringPrintf("/sys/%s", eventPath.c_str()); 118 mDevPath = StringPrintf("/dev/block/vold/%s", mId.c_str()); 119 CreateDeviceNode(mDevPath, mDevice); 120 } 121 122 Disk::~Disk() { 123 CHECK(!mCreated); 124 DestroyDeviceNode(mDevPath); 125 } 126 127 std::shared_ptr<VolumeBase> Disk::findVolume(const std::string& id) { 128 for (auto vol : mVolumes) { 129 if (vol->getId() == id) { 130 return vol; 131 } 132 auto stackedVol = vol->findVolume(id); 133 if (stackedVol != nullptr) { 134 return stackedVol; 135 } 136 } 137 return nullptr; 138 } 139 140 void Disk::listVolumes(VolumeBase::Type type, std::list<std::string>& list) { 141 for (const auto& vol : mVolumes) { 142 if (vol->getType() == type) { 143 list.push_back(vol->getId()); 144 } 145 // TODO: consider looking at stacked volumes 146 } 147 } 148 149 status_t Disk::create() { 150 CHECK(!mCreated); 151 mCreated = true; 152 notifyEvent(ResponseCode::DiskCreated, StringPrintf("%d", mFlags)); 153 readMetadata(); 154 readPartitions(); 155 return OK; 156 } 157 158 status_t Disk::destroy() { 159 CHECK(mCreated); 160 destroyAllVolumes(); 161 mCreated = false; 162 notifyEvent(ResponseCode::DiskDestroyed); 163 return OK; 164 } 165 166 void Disk::createPublicVolume(dev_t device) { 167 auto vol = std::shared_ptr<VolumeBase>(new PublicVolume(device)); 168 if (mJustPartitioned) { 169 LOG(DEBUG) << "Device just partitioned; silently formatting"; 170 vol->setSilent(true); 171 vol->create(); 172 vol->format("auto"); 173 vol->destroy(); 174 vol->setSilent(false); 175 } 176 177 mVolumes.push_back(vol); 178 vol->setDiskId(getId()); 179 vol->create(); 180 } 181 182 void Disk::createPrivateVolume(dev_t device, const std::string& partGuid) { 183 std::string normalizedGuid; 184 if (NormalizeHex(partGuid, normalizedGuid)) { 185 LOG(WARNING) << "Invalid GUID " << partGuid; 186 return; 187 } 188 189 std::string keyRaw; 190 if (!ReadFileToString(BuildKeyPath(normalizedGuid), &keyRaw)) { 191 PLOG(ERROR) << "Failed to load key for GUID " << normalizedGuid; 192 return; 193 } 194 195 LOG(DEBUG) << "Found key for GUID " << normalizedGuid; 196 197 auto vol = std::shared_ptr<VolumeBase>(new PrivateVolume(device, keyRaw)); 198 if (mJustPartitioned) { 199 LOG(DEBUG) << "Device just partitioned; silently formatting"; 200 vol->setSilent(true); 201 vol->create(); 202 vol->format("auto"); 203 vol->destroy(); 204 vol->setSilent(false); 205 } 206 207 mVolumes.push_back(vol); 208 vol->setDiskId(getId()); 209 vol->setPartGuid(partGuid); 210 vol->create(); 211 } 212 213 void Disk::destroyAllVolumes() { 214 for (const auto& vol : mVolumes) { 215 vol->destroy(); 216 } 217 mVolumes.clear(); 218 } 219 220 status_t Disk::readMetadata() { 221 mSize = -1; 222 mLabel.clear(); 223 224 int fd = open(mDevPath.c_str(), O_RDONLY | O_CLOEXEC); 225 if (fd != -1) { 226 if (ioctl(fd, BLKGETSIZE64, &mSize)) { 227 mSize = -1; 228 } 229 close(fd); 230 } 231 232 unsigned int majorId = major(mDevice); 233 switch (majorId) { 234 case kMajorBlockLoop: { 235 mLabel = "Virtual"; 236 break; 237 } 238 case kMajorBlockScsiA: case kMajorBlockScsiB: case kMajorBlockScsiC: case kMajorBlockScsiD: 239 case kMajorBlockScsiE: case kMajorBlockScsiF: case kMajorBlockScsiG: case kMajorBlockScsiH: 240 case kMajorBlockScsiI: case kMajorBlockScsiJ: case kMajorBlockScsiK: case kMajorBlockScsiL: 241 case kMajorBlockScsiM: case kMajorBlockScsiN: case kMajorBlockScsiO: case kMajorBlockScsiP: { 242 std::string path(mSysPath + "/device/vendor"); 243 std::string tmp; 244 if (!ReadFileToString(path, &tmp)) { 245 PLOG(WARNING) << "Failed to read vendor from " << path; 246 return -errno; 247 } 248 mLabel = tmp; 249 break; 250 } 251 case kMajorBlockMmc: { 252 std::string path(mSysPath + "/device/manfid"); 253 std::string tmp; 254 if (!ReadFileToString(path, &tmp)) { 255 PLOG(WARNING) << "Failed to read manufacturer from " << path; 256 return -errno; 257 } 258 uint64_t manfid = strtoll(tmp.c_str(), nullptr, 16); 259 // Our goal here is to give the user a meaningful label, ideally 260 // matching whatever is silk-screened on the card. To reduce 261 // user confusion, this list doesn't contain white-label manfid. 262 switch (manfid) { 263 case 0x000003: mLabel = "SanDisk"; break; 264 case 0x00001b: mLabel = "Samsung"; break; 265 case 0x000028: mLabel = "Lexar"; break; 266 case 0x000074: mLabel = "Transcend"; break; 267 } 268 break; 269 } 270 default: { 271 if (isVirtioBlkDevice(majorId)) { 272 LOG(DEBUG) << "Recognized experimental block major ID " << majorId 273 << " as virtio-blk (emulator's virtual SD card device)"; 274 mLabel = "Virtual"; 275 break; 276 } 277 LOG(WARNING) << "Unsupported block major type " << majorId; 278 return -ENOTSUP; 279 } 280 } 281 282 notifyEvent(ResponseCode::DiskSizeChanged, StringPrintf("%" PRIu64, mSize)); 283 notifyEvent(ResponseCode::DiskLabelChanged, mLabel); 284 notifyEvent(ResponseCode::DiskSysPathChanged, mSysPath); 285 return OK; 286 } 287 288 status_t Disk::readPartitions() { 289 int8_t maxMinors = getMaxMinors(); 290 if (maxMinors < 0) { 291 return -ENOTSUP; 292 } 293 294 destroyAllVolumes(); 295 296 // Parse partition table 297 298 std::vector<std::string> cmd; 299 cmd.push_back(kSgdiskPath); 300 cmd.push_back("--android-dump"); 301 cmd.push_back(mDevPath); 302 303 std::vector<std::string> output; 304 status_t res = ForkExecvp(cmd, output); 305 if (res != OK) { 306 LOG(WARNING) << "sgdisk failed to scan " << mDevPath; 307 notifyEvent(ResponseCode::DiskScanned); 308 mJustPartitioned = false; 309 return res; 310 } 311 312 Table table = Table::kUnknown; 313 bool foundParts = false; 314 for (const auto& line : output) { 315 char* cline = (char*) line.c_str(); 316 char* token = strtok(cline, kSgdiskToken); 317 if (token == nullptr) continue; 318 319 if (!strcmp(token, "DISK")) { 320 const char* type = strtok(nullptr, kSgdiskToken); 321 if (!strcmp(type, "mbr")) { 322 table = Table::kMbr; 323 } else if (!strcmp(type, "gpt")) { 324 table = Table::kGpt; 325 } 326 } else if (!strcmp(token, "PART")) { 327 foundParts = true; 328 int i = strtol(strtok(nullptr, kSgdiskToken), nullptr, 10); 329 if (i <= 0 || i > maxMinors) { 330 LOG(WARNING) << mId << " is ignoring partition " << i 331 << " beyond max supported devices"; 332 continue; 333 } 334 dev_t partDevice = makedev(major(mDevice), minor(mDevice) + i); 335 336 if (table == Table::kMbr) { 337 const char* type = strtok(nullptr, kSgdiskToken); 338 339 switch (strtol(type, nullptr, 16)) { 340 case 0x06: // FAT16 341 case 0x0b: // W95 FAT32 (LBA) 342 case 0x0c: // W95 FAT32 (LBA) 343 case 0x0e: // W95 FAT16 (LBA) 344 createPublicVolume(partDevice); 345 break; 346 } 347 } else if (table == Table::kGpt) { 348 const char* typeGuid = strtok(nullptr, kSgdiskToken); 349 const char* partGuid = strtok(nullptr, kSgdiskToken); 350 351 if (!strcasecmp(typeGuid, kGptBasicData)) { 352 createPublicVolume(partDevice); 353 } else if (!strcasecmp(typeGuid, kGptAndroidExpand)) { 354 createPrivateVolume(partDevice, partGuid); 355 } 356 } 357 } 358 } 359 360 // Ugly last ditch effort, treat entire disk as partition 361 if (table == Table::kUnknown || !foundParts) { 362 LOG(WARNING) << mId << " has unknown partition table; trying entire device"; 363 364 std::string fsType; 365 std::string unused; 366 if (ReadMetadataUntrusted(mDevPath, fsType, unused, unused) == OK) { 367 createPublicVolume(mDevice); 368 } else { 369 LOG(WARNING) << mId << " failed to identify, giving up"; 370 } 371 } 372 373 notifyEvent(ResponseCode::DiskScanned); 374 mJustPartitioned = false; 375 return OK; 376 } 377 378 status_t Disk::unmountAll() { 379 for (const auto& vol : mVolumes) { 380 vol->unmount(); 381 } 382 return OK; 383 } 384 385 status_t Disk::partitionPublic() { 386 int res; 387 388 // TODO: improve this code 389 destroyAllVolumes(); 390 mJustPartitioned = true; 391 392 // First nuke any existing partition table 393 std::vector<std::string> cmd; 394 cmd.push_back(kSgdiskPath); 395 cmd.push_back("--zap-all"); 396 cmd.push_back(mDevPath); 397 398 // Zap sometimes returns an error when it actually succeeded, so 399 // just log as warning and keep rolling forward. 400 if ((res = ForkExecvp(cmd)) != 0) { 401 LOG(WARNING) << "Failed to zap; status " << res; 402 } 403 404 struct disk_info dinfo; 405 memset(&dinfo, 0, sizeof(dinfo)); 406 407 if (!(dinfo.part_lst = (struct part_info *) malloc( 408 MAX_NUM_PARTS * sizeof(struct part_info)))) { 409 return -1; 410 } 411 412 memset(dinfo.part_lst, 0, MAX_NUM_PARTS * sizeof(struct part_info)); 413 dinfo.device = strdup(mDevPath.c_str()); 414 dinfo.scheme = PART_SCHEME_MBR; 415 dinfo.sect_size = 512; 416 dinfo.skip_lba = 2048; 417 dinfo.num_lba = 0; 418 dinfo.num_parts = 1; 419 420 struct part_info *pinfo = &dinfo.part_lst[0]; 421 422 pinfo->name = strdup("android_sdcard"); 423 pinfo->flags |= PART_ACTIVE_FLAG; 424 pinfo->type = PC_PART_TYPE_FAT32; 425 pinfo->len_kb = -1; 426 427 int rc = apply_disk_config(&dinfo, 0); 428 if (rc) { 429 LOG(ERROR) << "Failed to apply disk configuration: " << rc; 430 goto out; 431 } 432 433 out: 434 free(pinfo->name); 435 free(dinfo.device); 436 free(dinfo.part_lst); 437 438 return rc; 439 } 440 441 status_t Disk::partitionPrivate() { 442 return partitionMixed(0); 443 } 444 445 status_t Disk::partitionMixed(int8_t ratio) { 446 int res; 447 448 if (e4crypt_is_native()) { 449 LOG(ERROR) << "Private volumes not yet supported on FBE devices"; 450 return -EINVAL; 451 } 452 453 destroyAllVolumes(); 454 mJustPartitioned = true; 455 456 // First nuke any existing partition table 457 std::vector<std::string> cmd; 458 cmd.push_back(kSgdiskPath); 459 cmd.push_back("--zap-all"); 460 cmd.push_back(mDevPath); 461 462 // Zap sometimes returns an error when it actually succeeded, so 463 // just log as warning and keep rolling forward. 464 if ((res = ForkExecvp(cmd)) != 0) { 465 LOG(WARNING) << "Failed to zap; status " << res; 466 } 467 468 // We've had some success above, so generate both the private partition 469 // GUID and encryption key and persist them. 470 std::string partGuidRaw; 471 std::string keyRaw; 472 if (ReadRandomBytes(16, partGuidRaw) || ReadRandomBytes(16, keyRaw)) { 473 LOG(ERROR) << "Failed to generate GUID or key"; 474 return -EIO; 475 } 476 477 std::string partGuid; 478 StrToHex(partGuidRaw, partGuid); 479 480 if (!WriteStringToFile(keyRaw, BuildKeyPath(partGuid))) { 481 LOG(ERROR) << "Failed to persist key"; 482 return -EIO; 483 } else { 484 LOG(DEBUG) << "Persisted key for GUID " << partGuid; 485 } 486 487 // Now let's build the new GPT table. We heavily rely on sgdisk to 488 // force optimal alignment on the created partitions. 489 cmd.clear(); 490 cmd.push_back(kSgdiskPath); 491 492 // If requested, create a public partition first. Mixed-mode partitioning 493 // like this is an experimental feature. 494 if (ratio > 0) { 495 if (ratio < 10 || ratio > 90) { 496 LOG(ERROR) << "Mixed partition ratio must be between 10-90%"; 497 return -EINVAL; 498 } 499 500 uint64_t splitMb = ((mSize / 100) * ratio) / 1024 / 1024; 501 cmd.push_back(StringPrintf("--new=0:0:+%" PRId64 "M", splitMb)); 502 cmd.push_back(StringPrintf("--typecode=0:%s", kGptBasicData)); 503 cmd.push_back("--change-name=0:shared"); 504 } 505 506 // Define a metadata partition which is designed for future use; there 507 // should only be one of these per physical device, even if there are 508 // multiple private volumes. 509 cmd.push_back("--new=0:0:+16M"); 510 cmd.push_back(StringPrintf("--typecode=0:%s", kGptAndroidMeta)); 511 cmd.push_back("--change-name=0:android_meta"); 512 513 // Define a single private partition filling the rest of disk. 514 cmd.push_back("--new=0:0:-0"); 515 cmd.push_back(StringPrintf("--typecode=0:%s", kGptAndroidExpand)); 516 cmd.push_back(StringPrintf("--partition-guid=0:%s", partGuid.c_str())); 517 cmd.push_back("--change-name=0:android_expand"); 518 519 cmd.push_back(mDevPath); 520 521 if ((res = ForkExecvp(cmd)) != 0) { 522 LOG(ERROR) << "Failed to partition; status " << res; 523 return res; 524 } 525 526 return OK; 527 } 528 529 void Disk::notifyEvent(int event) { 530 VolumeManager::Instance()->getBroadcaster()->sendBroadcast(event, 531 getId().c_str(), false); 532 } 533 534 void Disk::notifyEvent(int event, const std::string& value) { 535 VolumeManager::Instance()->getBroadcaster()->sendBroadcast(event, 536 StringPrintf("%s %s", getId().c_str(), value.c_str()).c_str(), false); 537 } 538 539 int Disk::getMaxMinors() { 540 // Figure out maximum partition devices supported 541 unsigned int majorId = major(mDevice); 542 switch (majorId) { 543 case kMajorBlockLoop: { 544 std::string tmp; 545 if (!ReadFileToString(kSysfsLoopMaxMinors, &tmp)) { 546 LOG(ERROR) << "Failed to read max minors"; 547 return -errno; 548 } 549 return atoi(tmp.c_str()); 550 } 551 case kMajorBlockScsiA: case kMajorBlockScsiB: case kMajorBlockScsiC: case kMajorBlockScsiD: 552 case kMajorBlockScsiE: case kMajorBlockScsiF: case kMajorBlockScsiG: case kMajorBlockScsiH: 553 case kMajorBlockScsiI: case kMajorBlockScsiJ: case kMajorBlockScsiK: case kMajorBlockScsiL: 554 case kMajorBlockScsiM: case kMajorBlockScsiN: case kMajorBlockScsiO: case kMajorBlockScsiP: { 555 // Per Documentation/devices.txt this is static 556 return 15; 557 } 558 case kMajorBlockMmc: { 559 // Per Documentation/devices.txt this is dynamic 560 std::string tmp; 561 if (!ReadFileToString(kSysfsMmcMaxMinors, &tmp)) { 562 LOG(ERROR) << "Failed to read max minors"; 563 return -errno; 564 } 565 return atoi(tmp.c_str()); 566 } 567 default: { 568 if (isVirtioBlkDevice(majorId)) { 569 // drivers/block/virtio_blk.c has "#define PART_BITS 4", so max is 570 // 2^4 - 1 = 15 571 return 15; 572 } 573 } 574 } 575 576 LOG(ERROR) << "Unsupported block major type " << majorId; 577 return -ENOTSUP; 578 } 579 580 } // namespace vold 581 } // namespace android 582