1 /* 2 * Copyright (C) 2015 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #include <stdio.h> 18 #include <unistd.h> 19 #include <sys/types.h> 20 #include <sys/stat.h> 21 #include <fcntl.h> 22 #include <sys/wait.h> 23 #include <errno.h> 24 #include <cutils/partition_utils.h> 25 #include <sys/mount.h> 26 27 #include <android-base/properties.h> 28 #include <android-base/unique_fd.h> 29 #include <ext4_utils/ext4.h> 30 #include <ext4_utils/ext4_utils.h> 31 #include <logwrap/logwrap.h> 32 #include <selinux/android.h> 33 #include <selinux/label.h> 34 #include <selinux/selinux.h> 35 36 #include "fs_mgr_priv.h" 37 #include "cryptfs.h" 38 39 using android::base::unique_fd; 40 41 // Realistically, this file should be part of the android::fs_mgr namespace; 42 using namespace android::fs_mgr; 43 44 static int get_dev_sz(const std::string& fs_blkdev, uint64_t* dev_sz) { 45 unique_fd fd(TEMP_FAILURE_RETRY(open(fs_blkdev.c_str(), O_RDONLY | O_CLOEXEC))); 46 47 if (fd < 0) { 48 PERROR << "Cannot open block device"; 49 return -1; 50 } 51 52 if ((ioctl(fd, BLKGETSIZE64, dev_sz)) == -1) { 53 PERROR << "Cannot get block device size"; 54 return -1; 55 } 56 57 return 0; 58 } 59 60 static int format_ext4(const std::string& fs_blkdev, const std::string& fs_mnt_point, 61 bool crypt_footer, bool needs_projid, bool needs_metadata_csum) { 62 uint64_t dev_sz; 63 int rc = 0; 64 65 rc = get_dev_sz(fs_blkdev, &dev_sz); 66 if (rc) { 67 return rc; 68 } 69 70 /* Format the partition using the calculated length */ 71 if (crypt_footer) { 72 dev_sz -= CRYPT_FOOTER_OFFSET; 73 } 74 75 std::string size_str = std::to_string(dev_sz / 4096); 76 77 std::vector<const char*> mke2fs_args = {"/system/bin/mke2fs", "-t", "ext4", "-b", "4096"}; 78 79 // Project ID's require wider inodes. The Quotas themselves are enabled by tune2fs during boot. 80 if (needs_projid) { 81 mke2fs_args.push_back("-I"); 82 mke2fs_args.push_back("512"); 83 } 84 // casefolding is enabled via tune2fs during boot. 85 86 if (needs_metadata_csum) { 87 mke2fs_args.push_back("-O"); 88 mke2fs_args.push_back("metadata_csum"); 89 // tune2fs recommends to enable 64bit and extent: 90 // Extents are not enabled. The file extent tree can be checksummed, 91 // whereas block maps cannot. Not enabling extents reduces the coverage 92 // of metadata checksumming. Re-run with -O extent to rectify. 93 // 64-bit filesystem support is not enabled. The larger fields afforded 94 // by this feature enable full-strength checksumming. Run resize2fs -b to rectify. 95 mke2fs_args.push_back("-O"); 96 mke2fs_args.push_back("64bit"); 97 mke2fs_args.push_back("-O"); 98 mke2fs_args.push_back("extent"); 99 } 100 101 mke2fs_args.push_back(fs_blkdev.c_str()); 102 mke2fs_args.push_back(size_str.c_str()); 103 104 rc = logwrap_fork_execvp(mke2fs_args.size(), mke2fs_args.data(), nullptr, false, LOG_KLOG, 105 false, nullptr); 106 if (rc) { 107 LERROR << "mke2fs returned " << rc; 108 return rc; 109 } 110 111 const char* const e2fsdroid_args[] = { 112 "/system/bin/e2fsdroid", "-e", "-a", fs_mnt_point.c_str(), fs_blkdev.c_str(), nullptr}; 113 114 rc = logwrap_fork_execvp(arraysize(e2fsdroid_args), e2fsdroid_args, nullptr, false, LOG_KLOG, 115 false, nullptr); 116 if (rc) { 117 LERROR << "e2fsdroid returned " << rc; 118 } 119 120 return rc; 121 } 122 123 static int format_f2fs(const std::string& fs_blkdev, uint64_t dev_sz, bool crypt_footer, 124 bool needs_projid, bool needs_casefold, bool fs_compress) { 125 if (!dev_sz) { 126 int rc = get_dev_sz(fs_blkdev, &dev_sz); 127 if (rc) { 128 return rc; 129 } 130 } 131 132 /* Format the partition using the calculated length */ 133 if (crypt_footer) { 134 dev_sz -= CRYPT_FOOTER_OFFSET; 135 } 136 137 std::string size_str = std::to_string(dev_sz / 4096); 138 139 std::vector<const char*> args = {"/system/bin/make_f2fs", "-g", "android"}; 140 if (needs_projid) { 141 args.push_back("-O"); 142 args.push_back("project_quota,extra_attr"); 143 } 144 if (needs_casefold) { 145 args.push_back("-O"); 146 args.push_back("casefold"); 147 args.push_back("-C"); 148 args.push_back("utf8"); 149 } 150 if (fs_compress) { 151 args.push_back("-O"); 152 args.push_back("compression"); 153 args.push_back("-O"); 154 args.push_back("extra_attr"); 155 } 156 args.push_back(fs_blkdev.c_str()); 157 args.push_back(size_str.c_str()); 158 159 return logwrap_fork_execvp(args.size(), args.data(), nullptr, false, LOG_KLOG, false, nullptr); 160 } 161 162 int fs_mgr_do_format(const FstabEntry& entry, bool crypt_footer) { 163 LERROR << __FUNCTION__ << ": Format " << entry.blk_device << " as '" << entry.fs_type << "'"; 164 165 bool needs_casefold = false; 166 bool needs_projid = false; 167 168 if (entry.mount_point == "/data") { 169 needs_casefold = android::base::GetBoolProperty("external_storage.casefold.enabled", false); 170 needs_projid = android::base::GetBoolProperty("external_storage.projid.enabled", false); 171 } 172 173 if (entry.fs_type == "f2fs") { 174 return format_f2fs(entry.blk_device, entry.length, crypt_footer, needs_projid, 175 needs_casefold, entry.fs_mgr_flags.fs_compress); 176 } else if (entry.fs_type == "ext4") { 177 return format_ext4(entry.blk_device, entry.mount_point, crypt_footer, needs_projid, 178 entry.fs_mgr_flags.ext_meta_csum); 179 } else { 180 LERROR << "File system type '" << entry.fs_type << "' is not supported"; 181 return -EINVAL; 182 } 183 } 184