2019-11-29 14:23:45 -08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2019 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define LOG_TAG "IncrementalService"
|
|
|
|
|
|
|
|
#include "IncrementalService.h"
|
|
|
|
|
|
|
|
#include <android-base/file.h>
|
|
|
|
#include <android-base/logging.h>
|
2020-04-09 23:08:31 -07:00
|
|
|
#include <android-base/no_destructor.h>
|
2019-11-29 14:23:45 -08:00
|
|
|
#include <android-base/properties.h>
|
|
|
|
#include <android-base/stringprintf.h>
|
|
|
|
#include <android-base/strings.h>
|
|
|
|
#include <android/content/pm/IDataLoaderStatusListener.h>
|
|
|
|
#include <android/os/IVold.h>
|
|
|
|
#include <binder/BinderService.h>
|
2020-03-07 21:47:09 +09:00
|
|
|
#include <binder/Nullable.h>
|
2019-11-29 14:23:45 -08:00
|
|
|
#include <binder/ParcelFileDescriptor.h>
|
|
|
|
#include <binder/Status.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <uuid/uuid.h>
|
|
|
|
|
2020-04-03 13:12:51 -07:00
|
|
|
#include <charconv>
|
2020-02-03 20:06:00 -08:00
|
|
|
#include <ctime>
|
2020-02-10 12:49:41 -08:00
|
|
|
#include <filesystem>
|
2019-11-29 14:23:45 -08:00
|
|
|
#include <iterator>
|
|
|
|
#include <span>
|
|
|
|
#include <type_traits>
|
|
|
|
|
|
|
|
#include "Metadata.pb.h"
|
|
|
|
|
|
|
|
using namespace std::literals;
|
|
|
|
using namespace android::content::pm;
|
2020-02-10 12:49:41 -08:00
|
|
|
namespace fs = std::filesystem;
|
2019-11-29 14:23:45 -08:00
|
|
|
|
2020-04-02 20:03:47 -07:00
|
|
|
constexpr const char* kDataUsageStats = "android.permission.LOADER_USAGE_STATS";
|
2020-04-08 16:15:35 -07:00
|
|
|
constexpr const char* kOpUsage = "android:loader_usage_stats";
|
2020-04-02 20:03:47 -07:00
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
namespace android::incremental {
|
|
|
|
|
|
|
|
namespace {
|
|
|
|
|
|
|
|
using IncrementalFileSystemControlParcel =
|
|
|
|
::android::os::incremental::IncrementalFileSystemControlParcel;
|
|
|
|
|
|
|
|
struct Constants {
|
|
|
|
static constexpr auto backing = "backing_store"sv;
|
|
|
|
static constexpr auto mount = "mount"sv;
|
2020-02-10 12:49:41 -08:00
|
|
|
static constexpr auto mountKeyPrefix = "MT_"sv;
|
2019-11-29 14:23:45 -08:00
|
|
|
static constexpr auto storagePrefix = "st"sv;
|
|
|
|
static constexpr auto mountpointMdPrefix = ".mountpoint."sv;
|
|
|
|
static constexpr auto infoMdName = ".info"sv;
|
2020-02-05 17:41:25 -08:00
|
|
|
static constexpr auto libDir = "lib"sv;
|
|
|
|
static constexpr auto libSuffix = ".so"sv;
|
|
|
|
static constexpr auto blockSize = 4096;
|
2019-11-29 14:23:45 -08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const Constants& constants() {
|
2020-04-06 23:10:28 -07:00
|
|
|
static constexpr Constants c;
|
2019-11-29 14:23:45 -08:00
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
|
|
|
template <base::LogSeverity level = base::ERROR>
|
|
|
|
bool mkdirOrLog(std::string_view name, int mode = 0770, bool allowExisting = true) {
|
|
|
|
auto cstr = path::c_str(name);
|
|
|
|
if (::mkdir(cstr, mode)) {
|
2020-01-10 11:53:24 -08:00
|
|
|
if (!allowExisting || errno != EEXIST) {
|
2019-11-29 14:23:45 -08:00
|
|
|
PLOG(level) << "Can't create directory '" << name << '\'';
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
struct stat st;
|
|
|
|
if (::stat(cstr, &st) || !S_ISDIR(st.st_mode)) {
|
|
|
|
PLOG(level) << "Path exists but is not a directory: '" << name << '\'';
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
2020-01-10 11:53:24 -08:00
|
|
|
if (::chmod(cstr, mode)) {
|
|
|
|
PLOG(level) << "Changing permission failed for '" << name << '\'';
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static std::string toMountKey(std::string_view path) {
|
|
|
|
if (path.empty()) {
|
|
|
|
return "@none";
|
|
|
|
}
|
|
|
|
if (path == "/"sv) {
|
|
|
|
return "@root";
|
|
|
|
}
|
|
|
|
if (path::isAbsolute(path)) {
|
|
|
|
path.remove_prefix(1);
|
|
|
|
}
|
|
|
|
std::string res(path);
|
|
|
|
std::replace(res.begin(), res.end(), '/', '_');
|
|
|
|
std::replace(res.begin(), res.end(), '@', '_');
|
2020-02-10 12:49:41 -08:00
|
|
|
return std::string(constants().mountKeyPrefix) + res;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
static std::pair<std::string, std::string> makeMountDir(std::string_view incrementalDir,
|
|
|
|
std::string_view path) {
|
|
|
|
auto mountKey = toMountKey(path);
|
|
|
|
const auto prefixSize = mountKey.size();
|
|
|
|
for (int counter = 0; counter < 1000;
|
|
|
|
mountKey.resize(prefixSize), base::StringAppendF(&mountKey, "%d", counter++)) {
|
|
|
|
auto mountRoot = path::join(incrementalDir, mountKey);
|
2020-01-10 11:53:24 -08:00
|
|
|
if (mkdirOrLog(mountRoot, 0777, false)) {
|
2019-11-29 14:23:45 -08:00
|
|
|
return {mountKey, mountRoot};
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class ProtoMessage, class Control>
|
|
|
|
static ProtoMessage parseFromIncfs(const IncFsWrapper* incfs, Control&& control,
|
|
|
|
std::string_view path) {
|
2020-01-10 11:53:24 -08:00
|
|
|
auto md = incfs->getMetadata(control, path);
|
2019-11-29 14:23:45 -08:00
|
|
|
ProtoMessage message;
|
|
|
|
return message.ParseFromArray(md.data(), md.size()) ? message : ProtoMessage{};
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool isValidMountTarget(std::string_view path) {
|
|
|
|
return path::isAbsolute(path) && path::isEmptyDir(path).value_or(true);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string makeBindMdName() {
|
|
|
|
static constexpr auto uuidStringSize = 36;
|
|
|
|
|
|
|
|
uuid_t guid;
|
|
|
|
uuid_generate(guid);
|
|
|
|
|
|
|
|
std::string name;
|
|
|
|
const auto prefixSize = constants().mountpointMdPrefix.size();
|
|
|
|
name.reserve(prefixSize + uuidStringSize);
|
|
|
|
|
|
|
|
name = constants().mountpointMdPrefix;
|
|
|
|
name.resize(prefixSize + uuidStringSize);
|
|
|
|
uuid_unparse(guid, name.data() + prefixSize);
|
|
|
|
|
|
|
|
return name;
|
|
|
|
}
|
|
|
|
} // namespace
|
|
|
|
|
2020-04-06 23:10:28 -07:00
|
|
|
const bool IncrementalService::sEnablePerfLogging =
|
|
|
|
android::base::GetBoolProperty("incremental.perflogging", false);
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
IncrementalService::IncFsMount::~IncFsMount() {
|
2020-04-09 17:25:42 -07:00
|
|
|
if (dataLoaderStub) {
|
|
|
|
dataLoaderStub->destroy();
|
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(INFO) << "Unmounting and cleaning up mount " << mountId << " with root '" << root << '\'';
|
|
|
|
for (auto&& [target, _] : bindPoints) {
|
|
|
|
LOG(INFO) << "\tbind: " << target;
|
|
|
|
incrementalService.mVold->unmountIncFs(target);
|
|
|
|
}
|
|
|
|
LOG(INFO) << "\troot: " << root;
|
|
|
|
incrementalService.mVold->unmountIncFs(path::join(root, constants().mount));
|
|
|
|
cleanupFilesystem(root);
|
|
|
|
}
|
|
|
|
|
|
|
|
auto IncrementalService::IncFsMount::makeStorage(StorageId id) -> StorageMap::iterator {
|
|
|
|
std::string name;
|
|
|
|
for (int no = nextStorageDirNo.fetch_add(1, std::memory_order_relaxed), i = 0;
|
|
|
|
i < 1024 && no >= 0; no = nextStorageDirNo.fetch_add(1, std::memory_order_relaxed), ++i) {
|
|
|
|
name.clear();
|
2020-01-10 11:53:24 -08:00
|
|
|
base::StringAppendF(&name, "%.*s_%d_%d", int(constants().storagePrefix.size()),
|
|
|
|
constants().storagePrefix.data(), id, no);
|
|
|
|
auto fullName = path::join(root, constants().mount, name);
|
2020-02-03 19:20:58 -08:00
|
|
|
if (auto err = incrementalService.mIncFs->makeDir(control, fullName, 0755); !err) {
|
2019-11-29 14:23:45 -08:00
|
|
|
std::lock_guard l(lock);
|
2020-01-10 11:53:24 -08:00
|
|
|
return storages.insert_or_assign(id, Storage{std::move(fullName)}).first;
|
|
|
|
} else if (err != EEXIST) {
|
|
|
|
LOG(ERROR) << __func__ << "(): failed to create dir |" << fullName << "| " << err;
|
|
|
|
break;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
nextStorageDirNo = 0;
|
|
|
|
return storages.end();
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
static std::unique_ptr<DIR, decltype(&::closedir)> openDir(const char* path) {
|
|
|
|
return {::opendir(path), ::closedir};
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rmDirContent(const char* path) {
|
|
|
|
auto dir = openDir(path);
|
|
|
|
if (!dir) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
while (auto entry = ::readdir(dir.get())) {
|
|
|
|
if (entry->d_name == "."sv || entry->d_name == ".."sv) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
auto fullPath = android::base::StringPrintf("%s/%s", path, entry->d_name);
|
|
|
|
if (entry->d_type == DT_DIR) {
|
|
|
|
if (const auto err = rmDirContent(fullPath.c_str()); err != 0) {
|
|
|
|
PLOG(WARNING) << "Failed to delete " << fullPath << " content";
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (const auto err = ::rmdir(fullPath.c_str()); err != 0) {
|
|
|
|
PLOG(WARNING) << "Failed to rmdir " << fullPath;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (const auto err = ::unlink(fullPath.c_str()); err != 0) {
|
|
|
|
PLOG(WARNING) << "Failed to delete " << fullPath;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
void IncrementalService::IncFsMount::cleanupFilesystem(std::string_view root) {
|
2020-01-10 11:53:24 -08:00
|
|
|
rmDirContent(path::join(root, constants().backing).c_str());
|
2019-11-29 14:23:45 -08:00
|
|
|
::rmdir(path::join(root, constants().backing).c_str());
|
|
|
|
::rmdir(path::join(root, constants().mount).c_str());
|
|
|
|
::rmdir(path::c_str(root));
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
IncrementalService::IncrementalService(ServiceManagerWrapper&& sm, std::string_view rootDir)
|
2019-11-29 14:23:45 -08:00
|
|
|
: mVold(sm.getVoldService()),
|
2020-02-27 15:57:35 -08:00
|
|
|
mDataLoaderManager(sm.getDataLoaderManager()),
|
2019-11-29 14:23:45 -08:00
|
|
|
mIncFs(sm.getIncFs()),
|
2020-04-02 20:03:47 -07:00
|
|
|
mAppOpsManager(sm.getAppOpsManager()),
|
2020-04-09 19:22:30 -07:00
|
|
|
mJni(sm.getJni()),
|
2019-11-29 14:23:45 -08:00
|
|
|
mIncrementalDir(rootDir) {
|
|
|
|
if (!mVold) {
|
|
|
|
LOG(FATAL) << "Vold service is unavailable";
|
|
|
|
}
|
2020-02-27 15:57:35 -08:00
|
|
|
if (!mDataLoaderManager) {
|
|
|
|
LOG(FATAL) << "DataLoaderManagerService is unavailable";
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
2020-04-02 20:03:47 -07:00
|
|
|
if (!mAppOpsManager) {
|
|
|
|
LOG(FATAL) << "AppOpsManager is unavailable";
|
|
|
|
}
|
2020-04-07 15:35:21 -07:00
|
|
|
|
|
|
|
mJobQueue.reserve(16);
|
2020-04-09 19:22:30 -07:00
|
|
|
mJobProcessor = std::thread([this]() {
|
|
|
|
mJni->initializeForCurrentThread();
|
|
|
|
runJobProcessing();
|
|
|
|
});
|
2020-04-07 15:35:21 -07:00
|
|
|
|
2020-02-10 12:49:41 -08:00
|
|
|
mountExistingImages();
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
IncrementalService::~IncrementalService() {
|
|
|
|
{
|
|
|
|
std::lock_guard lock(mJobMutex);
|
|
|
|
mRunning = false;
|
|
|
|
}
|
|
|
|
mJobCondition.notify_all();
|
|
|
|
mJobProcessor.join();
|
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
|
2020-02-03 20:06:00 -08:00
|
|
|
inline const char* toString(TimePoint t) {
|
|
|
|
using SystemClock = std::chrono::system_clock;
|
2020-02-05 17:41:25 -08:00
|
|
|
time_t time = SystemClock::to_time_t(
|
|
|
|
SystemClock::now() +
|
|
|
|
std::chrono::duration_cast<SystemClock::duration>(t - Clock::now()));
|
2020-02-03 20:06:00 -08:00
|
|
|
return std::ctime(&time);
|
|
|
|
}
|
|
|
|
|
|
|
|
inline const char* toString(IncrementalService::BindKind kind) {
|
|
|
|
switch (kind) {
|
2020-02-05 17:41:25 -08:00
|
|
|
case IncrementalService::BindKind::Temporary:
|
|
|
|
return "Temporary";
|
|
|
|
case IncrementalService::BindKind::Permanent:
|
|
|
|
return "Permanent";
|
2020-02-03 20:06:00 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::onDump(int fd) {
|
|
|
|
dprintf(fd, "Incremental is %s\n", incfs::enabled() ? "ENABLED" : "DISABLED");
|
|
|
|
dprintf(fd, "Incremental dir: %s\n", mIncrementalDir.c_str());
|
|
|
|
|
|
|
|
std::unique_lock l(mLock);
|
|
|
|
|
|
|
|
dprintf(fd, "Mounts (%d):\n", int(mMounts.size()));
|
|
|
|
for (auto&& [id, ifs] : mMounts) {
|
|
|
|
const IncFsMount& mnt = *ifs.get();
|
|
|
|
dprintf(fd, "\t[%d]:\n", id);
|
|
|
|
dprintf(fd, "\t\tmountId: %d\n", mnt.mountId);
|
2020-04-03 13:12:51 -07:00
|
|
|
dprintf(fd, "\t\troot: %s\n", mnt.root.c_str());
|
2020-02-03 20:06:00 -08:00
|
|
|
dprintf(fd, "\t\tnextStorageDirNo: %d\n", mnt.nextStorageDirNo.load());
|
2020-04-09 17:25:42 -07:00
|
|
|
if (mnt.dataLoaderStub) {
|
|
|
|
const auto& dataLoaderStub = *mnt.dataLoaderStub;
|
|
|
|
dprintf(fd, "\t\tdataLoaderStatus: %d\n", dataLoaderStub.status());
|
|
|
|
dprintf(fd, "\t\tdataLoaderStartRequested: %s\n",
|
|
|
|
dataLoaderStub.startRequested() ? "true" : "false");
|
|
|
|
const auto& params = dataLoaderStub.params();
|
2020-04-02 20:03:47 -07:00
|
|
|
dprintf(fd, "\t\tdataLoaderParams:\n");
|
2020-02-03 20:06:00 -08:00
|
|
|
dprintf(fd, "\t\t\ttype: %s\n", toString(params.type).c_str());
|
|
|
|
dprintf(fd, "\t\t\tpackageName: %s\n", params.packageName.c_str());
|
|
|
|
dprintf(fd, "\t\t\tclassName: %s\n", params.className.c_str());
|
|
|
|
dprintf(fd, "\t\t\targuments: %s\n", params.arguments.c_str());
|
|
|
|
}
|
|
|
|
dprintf(fd, "\t\tstorages (%d):\n", int(mnt.storages.size()));
|
|
|
|
for (auto&& [storageId, storage] : mnt.storages) {
|
|
|
|
dprintf(fd, "\t\t\t[%d] -> [%s]\n", storageId, storage.name.c_str());
|
|
|
|
}
|
|
|
|
|
|
|
|
dprintf(fd, "\t\tbindPoints (%d):\n", int(mnt.bindPoints.size()));
|
|
|
|
for (auto&& [target, bind] : mnt.bindPoints) {
|
|
|
|
dprintf(fd, "\t\t\t[%s]->[%d]:\n", target.c_str(), bind.storage);
|
|
|
|
dprintf(fd, "\t\t\t\tsavedFilename: %s\n", bind.savedFilename.c_str());
|
|
|
|
dprintf(fd, "\t\t\t\tsourceDir: %s\n", bind.sourceDir.c_str());
|
|
|
|
dprintf(fd, "\t\t\t\tkind: %s\n", toString(bind.kind));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
dprintf(fd, "Sorted binds (%d):\n", int(mBindsByPath.size()));
|
|
|
|
for (auto&& [target, mountPairIt] : mBindsByPath) {
|
|
|
|
const auto& bind = mountPairIt->second;
|
|
|
|
dprintf(fd, "\t\t[%s]->[%d]:\n", target.c_str(), bind.storage);
|
|
|
|
dprintf(fd, "\t\t\tsavedFilename: %s\n", bind.savedFilename.c_str());
|
|
|
|
dprintf(fd, "\t\t\tsourceDir: %s\n", bind.sourceDir.c_str());
|
|
|
|
dprintf(fd, "\t\t\tkind: %s\n", toString(bind.kind));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-09 17:25:42 -07:00
|
|
|
void IncrementalService::onSystemReady() {
|
2019-11-29 14:23:45 -08:00
|
|
|
if (mSystemReady.exchange(true)) {
|
2020-04-09 17:25:42 -07:00
|
|
|
return;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<IfsMountPtr> mounts;
|
|
|
|
{
|
|
|
|
std::lock_guard l(mLock);
|
|
|
|
mounts.reserve(mMounts.size());
|
|
|
|
for (auto&& [id, ifs] : mMounts) {
|
|
|
|
if (ifs->mountId == id) {
|
|
|
|
mounts.push_back(ifs);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-11 21:40:37 -07:00
|
|
|
if (mounts.empty()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
std::thread([this, mounts = std::move(mounts)]() {
|
2020-04-11 21:40:37 -07:00
|
|
|
mJni->initializeForCurrentThread();
|
2019-11-29 14:23:45 -08:00
|
|
|
for (auto&& ifs : mounts) {
|
2020-04-11 21:40:37 -07:00
|
|
|
if (ifs->dataLoaderStub->create()) {
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(INFO) << "Successfully started data loader for mount " << ifs->mountId;
|
|
|
|
} else {
|
2020-02-10 12:49:41 -08:00
|
|
|
// TODO(b/133435829): handle data loader start failures
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(WARNING) << "Failed to start data loader for mount " << ifs->mountId;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}).detach();
|
|
|
|
}
|
|
|
|
|
|
|
|
auto IncrementalService::getStorageSlotLocked() -> MountMap::iterator {
|
|
|
|
for (;;) {
|
|
|
|
if (mNextId == kMaxStorageId) {
|
|
|
|
mNextId = 0;
|
|
|
|
}
|
|
|
|
auto id = ++mNextId;
|
|
|
|
auto [it, inserted] = mMounts.try_emplace(id, nullptr);
|
|
|
|
if (inserted) {
|
|
|
|
return it;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-10 12:49:41 -08:00
|
|
|
StorageId IncrementalService::createStorage(
|
|
|
|
std::string_view mountPoint, DataLoaderParamsParcel&& dataLoaderParams,
|
|
|
|
const DataLoaderStatusListener& dataLoaderStatusListener, CreateOptions options) {
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(INFO) << "createStorage: " << mountPoint << " | " << int(options);
|
|
|
|
if (!path::isAbsolute(mountPoint)) {
|
|
|
|
LOG(ERROR) << "path is not absolute: " << mountPoint;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto mountNorm = path::normalize(mountPoint);
|
|
|
|
{
|
|
|
|
const auto id = findStorageId(mountNorm);
|
|
|
|
if (id != kInvalidStorageId) {
|
|
|
|
if (options & CreateOptions::OpenExisting) {
|
|
|
|
LOG(INFO) << "Opened existing storage " << id;
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
LOG(ERROR) << "Directory " << mountPoint << " is already mounted at storage " << id;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(options & CreateOptions::CreateNew)) {
|
|
|
|
LOG(ERROR) << "not requirested create new storage, and it doesn't exist: " << mountPoint;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!path::isEmptyDir(mountNorm)) {
|
|
|
|
LOG(ERROR) << "Mounting over existing non-empty directory is not supported: " << mountNorm;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
auto [mountKey, mountRoot] = makeMountDir(mIncrementalDir, mountNorm);
|
|
|
|
if (mountRoot.empty()) {
|
|
|
|
LOG(ERROR) << "Bad mount point";
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
// Make sure the code removes all crap it may create while still failing.
|
|
|
|
auto firstCleanup = [](const std::string* ptr) { IncFsMount::cleanupFilesystem(*ptr); };
|
|
|
|
auto firstCleanupOnFailure =
|
|
|
|
std::unique_ptr<std::string, decltype(firstCleanup)>(&mountRoot, firstCleanup);
|
|
|
|
|
|
|
|
auto mountTarget = path::join(mountRoot, constants().mount);
|
2020-01-10 11:53:24 -08:00
|
|
|
const auto backing = path::join(mountRoot, constants().backing);
|
|
|
|
if (!mkdirOrLog(backing, 0777) || !mkdirOrLog(mountTarget)) {
|
2019-11-29 14:23:45 -08:00
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
IncFsMount::Control control;
|
|
|
|
{
|
|
|
|
std::lock_guard l(mMountOperationLock);
|
|
|
|
IncrementalFileSystemControlParcel controlParcel;
|
2020-01-10 11:53:24 -08:00
|
|
|
|
|
|
|
if (auto err = rmDirContent(backing.c_str())) {
|
|
|
|
LOG(ERROR) << "Coudn't clean the backing directory " << backing << ": " << err;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
if (!mkdirOrLog(path::join(backing, ".index"), 0777)) {
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
auto status = mVold->mountIncFs(backing, mountTarget, 0, &controlParcel);
|
2019-11-29 14:23:45 -08:00
|
|
|
if (!status.isOk()) {
|
|
|
|
LOG(ERROR) << "Vold::mountIncFs() failed: " << status.toString8();
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
2020-01-10 11:53:24 -08:00
|
|
|
if (controlParcel.cmd.get() < 0 || controlParcel.pendingReads.get() < 0 ||
|
|
|
|
controlParcel.log.get() < 0) {
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(ERROR) << "Vold::mountIncFs() returned invalid control parcel.";
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
2020-03-03 09:47:15 -08:00
|
|
|
int cmd = controlParcel.cmd.release().release();
|
|
|
|
int pendingReads = controlParcel.pendingReads.release().release();
|
|
|
|
int logs = controlParcel.log.release().release();
|
|
|
|
control = mIncFs->createControl(cmd, pendingReads, logs);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_lock l(mLock);
|
|
|
|
const auto mountIt = getStorageSlotLocked();
|
|
|
|
const auto mountId = mountIt->first;
|
|
|
|
l.unlock();
|
|
|
|
|
|
|
|
auto ifs =
|
|
|
|
std::make_shared<IncFsMount>(std::move(mountRoot), mountId, std::move(control), *this);
|
|
|
|
// Now it's the |ifs|'s responsibility to clean up after itself, and the only cleanup we need
|
|
|
|
// is the removal of the |ifs|.
|
|
|
|
firstCleanupOnFailure.release();
|
|
|
|
|
|
|
|
auto secondCleanup = [this, &l](auto itPtr) {
|
|
|
|
if (!l.owns_lock()) {
|
|
|
|
l.lock();
|
|
|
|
}
|
|
|
|
mMounts.erase(*itPtr);
|
|
|
|
};
|
|
|
|
auto secondCleanupOnFailure =
|
|
|
|
std::unique_ptr<decltype(mountIt), decltype(secondCleanup)>(&mountIt, secondCleanup);
|
|
|
|
|
|
|
|
const auto storageIt = ifs->makeStorage(ifs->mountId);
|
|
|
|
if (storageIt == ifs->storages.end()) {
|
2020-01-10 11:53:24 -08:00
|
|
|
LOG(ERROR) << "Can't create a default storage directory";
|
2019-11-29 14:23:45 -08:00
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
metadata::Mount m;
|
|
|
|
m.mutable_storage()->set_id(ifs->mountId);
|
2020-04-09 17:25:42 -07:00
|
|
|
m.mutable_loader()->set_type((int)dataLoaderParams.type);
|
|
|
|
m.mutable_loader()->set_package_name(dataLoaderParams.packageName);
|
|
|
|
m.mutable_loader()->set_class_name(dataLoaderParams.className);
|
|
|
|
m.mutable_loader()->set_arguments(dataLoaderParams.arguments);
|
2019-11-29 14:23:45 -08:00
|
|
|
const auto metadata = m.SerializeAsString();
|
|
|
|
m.mutable_loader()->release_arguments();
|
2019-12-17 12:10:41 -08:00
|
|
|
m.mutable_loader()->release_class_name();
|
2019-11-29 14:23:45 -08:00
|
|
|
m.mutable_loader()->release_package_name();
|
2020-01-10 11:53:24 -08:00
|
|
|
if (auto err =
|
|
|
|
mIncFs->makeFile(ifs->control,
|
|
|
|
path::join(ifs->root, constants().mount,
|
|
|
|
constants().infoMdName),
|
|
|
|
0777, idFromMetadata(metadata),
|
|
|
|
{.metadata = {metadata.data(), (IncFsSize)metadata.size()}})) {
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(ERROR) << "Saving mount metadata failed: " << -err;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
const auto bk =
|
|
|
|
(options & CreateOptions::PermanentBind) ? BindKind::Permanent : BindKind::Temporary;
|
2020-01-10 11:53:24 -08:00
|
|
|
if (auto err = addBindMount(*ifs, storageIt->first, storageIt->second.name,
|
|
|
|
std::string(storageIt->second.name), std::move(mountNorm), bk, l);
|
2019-11-29 14:23:45 -08:00
|
|
|
err < 0) {
|
|
|
|
LOG(ERROR) << "adding bind mount failed: " << -err;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Done here as well, all data structures are in good state.
|
|
|
|
secondCleanupOnFailure.release();
|
|
|
|
|
2020-04-09 17:25:42 -07:00
|
|
|
auto dataLoaderStub =
|
|
|
|
prepareDataLoader(*ifs, std::move(dataLoaderParams), &dataLoaderStatusListener);
|
|
|
|
CHECK(dataLoaderStub);
|
2019-11-29 14:23:45 -08:00
|
|
|
|
|
|
|
mountIt->second = std::move(ifs);
|
|
|
|
l.unlock();
|
2020-04-09 17:25:42 -07:00
|
|
|
|
|
|
|
if (mSystemReady.load(std::memory_order_relaxed) && !dataLoaderStub->create()) {
|
|
|
|
// failed to create data loader
|
|
|
|
LOG(ERROR) << "initializeDataLoader() failed";
|
|
|
|
deleteStorage(dataLoaderStub->id());
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(INFO) << "created storage " << mountId;
|
|
|
|
return mountId;
|
|
|
|
}
|
|
|
|
|
|
|
|
StorageId IncrementalService::createLinkedStorage(std::string_view mountPoint,
|
|
|
|
StorageId linkedStorage,
|
|
|
|
IncrementalService::CreateOptions options) {
|
|
|
|
if (!isValidMountTarget(mountPoint)) {
|
|
|
|
LOG(ERROR) << "Mount point is invalid or missing";
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_lock l(mLock);
|
|
|
|
const auto& ifs = getIfsLocked(linkedStorage);
|
|
|
|
if (!ifs) {
|
|
|
|
LOG(ERROR) << "Ifs unavailable";
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
const auto mountIt = getStorageSlotLocked();
|
|
|
|
const auto storageId = mountIt->first;
|
|
|
|
const auto storageIt = ifs->makeStorage(storageId);
|
|
|
|
if (storageIt == ifs->storages.end()) {
|
|
|
|
LOG(ERROR) << "Can't create a new storage";
|
|
|
|
mMounts.erase(mountIt);
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
l.unlock();
|
|
|
|
|
|
|
|
const auto bk =
|
|
|
|
(options & CreateOptions::PermanentBind) ? BindKind::Permanent : BindKind::Temporary;
|
2020-01-10 11:53:24 -08:00
|
|
|
if (auto err = addBindMount(*ifs, storageIt->first, storageIt->second.name,
|
|
|
|
std::string(storageIt->second.name), path::normalize(mountPoint),
|
|
|
|
bk, l);
|
2019-11-29 14:23:45 -08:00
|
|
|
err < 0) {
|
|
|
|
LOG(ERROR) << "bindMount failed with error: " << err;
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
mountIt->second = ifs;
|
|
|
|
return storageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
IncrementalService::BindPathMap::const_iterator IncrementalService::findStorageLocked(
|
|
|
|
std::string_view path) const {
|
|
|
|
auto bindPointIt = mBindsByPath.upper_bound(path);
|
|
|
|
if (bindPointIt == mBindsByPath.begin()) {
|
|
|
|
return mBindsByPath.end();
|
|
|
|
}
|
|
|
|
--bindPointIt;
|
|
|
|
if (!path::startsWith(path, bindPointIt->first)) {
|
|
|
|
return mBindsByPath.end();
|
|
|
|
}
|
|
|
|
return bindPointIt;
|
|
|
|
}
|
|
|
|
|
|
|
|
StorageId IncrementalService::findStorageId(std::string_view path) const {
|
|
|
|
std::lock_guard l(mLock);
|
|
|
|
auto it = findStorageLocked(path);
|
|
|
|
if (it == mBindsByPath.end()) {
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
return it->second->second.storage;
|
|
|
|
}
|
|
|
|
|
2020-03-31 15:30:21 -07:00
|
|
|
int IncrementalService::setStorageParams(StorageId storageId, bool enableReadLogs) {
|
|
|
|
const auto ifs = getIfs(storageId);
|
|
|
|
if (!ifs) {
|
2020-04-07 21:13:41 -07:00
|
|
|
LOG(ERROR) << "setStorageParams failed, invalid storageId: " << storageId;
|
2020-03-31 15:30:21 -07:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-04-09 17:25:42 -07:00
|
|
|
const auto& params = ifs->dataLoaderStub->params();
|
2020-04-02 20:03:47 -07:00
|
|
|
if (enableReadLogs) {
|
2020-04-09 17:25:42 -07:00
|
|
|
if (auto status = mAppOpsManager->checkPermission(kDataUsageStats, kOpUsage,
|
|
|
|
params.packageName.c_str());
|
2020-04-03 23:00:19 -07:00
|
|
|
!status.isOk()) {
|
|
|
|
LOG(ERROR) << "checkPermission failed: " << status.toString8();
|
|
|
|
return fromBinderStatus(status);
|
|
|
|
}
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
|
2020-04-03 23:00:19 -07:00
|
|
|
if (auto status = applyStorageParams(*ifs, enableReadLogs); !status.isOk()) {
|
|
|
|
LOG(ERROR) << "applyStorageParams failed: " << status.toString8();
|
|
|
|
return fromBinderStatus(status);
|
|
|
|
}
|
2020-04-02 20:03:47 -07:00
|
|
|
|
|
|
|
if (enableReadLogs) {
|
2020-04-09 17:25:42 -07:00
|
|
|
registerAppOpsCallback(params.packageName);
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
|
2020-04-03 23:00:19 -07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
binder::Status IncrementalService::applyStorageParams(IncFsMount& ifs, bool enableReadLogs) {
|
2020-03-31 15:30:21 -07:00
|
|
|
using unique_fd = ::android::base::unique_fd;
|
|
|
|
::android::os::incremental::IncrementalFileSystemControlParcel control;
|
2020-04-02 20:03:47 -07:00
|
|
|
control.cmd.reset(unique_fd(dup(ifs.control.cmd())));
|
|
|
|
control.pendingReads.reset(unique_fd(dup(ifs.control.pendingReads())));
|
|
|
|
auto logsFd = ifs.control.logs();
|
2020-03-31 15:30:21 -07:00
|
|
|
if (logsFd >= 0) {
|
|
|
|
control.log.reset(unique_fd(dup(logsFd)));
|
|
|
|
}
|
|
|
|
|
|
|
|
std::lock_guard l(mMountOperationLock);
|
2020-04-03 23:00:19 -07:00
|
|
|
return mVold->setIncFsMountOptions(control, enableReadLogs);
|
2020-03-31 15:30:21 -07:00
|
|
|
}
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
void IncrementalService::deleteStorage(StorageId storageId) {
|
|
|
|
const auto ifs = getIfs(storageId);
|
|
|
|
if (!ifs) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
deleteStorage(*ifs);
|
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::deleteStorage(IncrementalService::IncFsMount& ifs) {
|
|
|
|
std::unique_lock l(ifs.lock);
|
|
|
|
deleteStorageLocked(ifs, std::move(l));
|
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::deleteStorageLocked(IncrementalService::IncFsMount& ifs,
|
|
|
|
std::unique_lock<std::mutex>&& ifsLock) {
|
|
|
|
const auto storages = std::move(ifs.storages);
|
|
|
|
// Don't move the bind points out: Ifs's dtor will use them to unmount everything.
|
|
|
|
const auto bindPoints = ifs.bindPoints;
|
|
|
|
ifsLock.unlock();
|
|
|
|
|
|
|
|
std::lock_guard l(mLock);
|
|
|
|
for (auto&& [id, _] : storages) {
|
|
|
|
if (id != ifs.mountId) {
|
|
|
|
mMounts.erase(id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (auto&& [path, _] : bindPoints) {
|
|
|
|
mBindsByPath.erase(path);
|
|
|
|
}
|
|
|
|
mMounts.erase(ifs.mountId);
|
|
|
|
}
|
|
|
|
|
|
|
|
StorageId IncrementalService::openStorage(std::string_view pathInMount) {
|
|
|
|
if (!path::isAbsolute(pathInMount)) {
|
|
|
|
return kInvalidStorageId;
|
|
|
|
}
|
|
|
|
|
|
|
|
return findStorageId(path::normalize(pathInMount));
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
FileId IncrementalService::nodeFor(StorageId storage, std::string_view subpath) const {
|
2019-11-29 14:23:45 -08:00
|
|
|
const auto ifs = getIfs(storage);
|
|
|
|
if (!ifs) {
|
2020-01-10 11:53:24 -08:00
|
|
|
return kIncFsInvalidFileId;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
std::unique_lock l(ifs->lock);
|
|
|
|
auto storageIt = ifs->storages.find(storage);
|
|
|
|
if (storageIt == ifs->storages.end()) {
|
2020-01-10 11:53:24 -08:00
|
|
|
return kIncFsInvalidFileId;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
if (subpath.empty() || subpath == "."sv) {
|
2020-01-10 11:53:24 -08:00
|
|
|
return kIncFsInvalidFileId;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
auto path = path::join(ifs->root, constants().mount, storageIt->second.name, subpath);
|
|
|
|
l.unlock();
|
2020-01-10 11:53:24 -08:00
|
|
|
return mIncFs->getFileId(ifs->control, path);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
std::pair<FileId, std::string_view> IncrementalService::parentAndNameFor(
|
2019-11-29 14:23:45 -08:00
|
|
|
StorageId storage, std::string_view subpath) const {
|
|
|
|
auto name = path::basename(subpath);
|
|
|
|
if (name.empty()) {
|
2020-01-10 11:53:24 -08:00
|
|
|
return {kIncFsInvalidFileId, {}};
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
auto dir = path::dirname(subpath);
|
|
|
|
if (dir.empty() || dir == "/"sv) {
|
2020-01-10 11:53:24 -08:00
|
|
|
return {kIncFsInvalidFileId, {}};
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
2020-01-10 11:53:24 -08:00
|
|
|
auto id = nodeFor(storage, dir);
|
|
|
|
return {id, name};
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
IncrementalService::IfsMountPtr IncrementalService::getIfs(StorageId storage) const {
|
|
|
|
std::lock_guard l(mLock);
|
|
|
|
return getIfsLocked(storage);
|
|
|
|
}
|
|
|
|
|
|
|
|
const IncrementalService::IfsMountPtr& IncrementalService::getIfsLocked(StorageId storage) const {
|
|
|
|
auto it = mMounts.find(storage);
|
|
|
|
if (it == mMounts.end()) {
|
2020-04-09 23:08:31 -07:00
|
|
|
static const android::base::NoDestructor<IfsMountPtr> kEmpty{};
|
|
|
|
return *kEmpty;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
return it->second;
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::bind(StorageId storage, std::string_view source, std::string_view target,
|
|
|
|
BindKind kind) {
|
2019-11-29 14:23:45 -08:00
|
|
|
if (!isValidMountTarget(target)) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
const auto ifs = getIfs(storage);
|
|
|
|
if (!ifs) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2020-01-10 11:53:24 -08:00
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
std::unique_lock l(ifs->lock);
|
|
|
|
const auto storageInfo = ifs->storages.find(storage);
|
|
|
|
if (storageInfo == ifs->storages.end()) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2020-04-06 23:10:28 -07:00
|
|
|
std::string normSource = normalizePathToStorageLocked(storageInfo, source);
|
|
|
|
if (normSource.empty()) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
l.unlock();
|
|
|
|
std::unique_lock l2(mLock, std::defer_lock);
|
2020-01-10 11:53:24 -08:00
|
|
|
return addBindMount(*ifs, storage, storageInfo->second.name, std::move(normSource),
|
|
|
|
path::normalize(target), kind, l2);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
int IncrementalService::unbind(StorageId storage, std::string_view target) {
|
|
|
|
if (!path::isAbsolute(target)) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG(INFO) << "Removing bind point " << target;
|
|
|
|
|
|
|
|
// Here we should only look up by the exact target, not by a subdirectory of any existing mount,
|
|
|
|
// otherwise there's a chance to unmount something completely unrelated
|
|
|
|
const auto norm = path::normalize(target);
|
|
|
|
std::unique_lock l(mLock);
|
|
|
|
const auto storageIt = mBindsByPath.find(norm);
|
|
|
|
if (storageIt == mBindsByPath.end() || storageIt->second->second.storage != storage) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
const auto bindIt = storageIt->second;
|
|
|
|
const auto storageId = bindIt->second.storage;
|
|
|
|
const auto ifs = getIfsLocked(storageId);
|
|
|
|
if (!ifs) {
|
|
|
|
LOG(ERROR) << "Internal error: storageId " << storageId << " for bound path " << target
|
|
|
|
<< " is missing";
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
mBindsByPath.erase(storageIt);
|
|
|
|
l.unlock();
|
|
|
|
|
|
|
|
mVold->unmountIncFs(bindIt->first);
|
|
|
|
std::unique_lock l2(ifs->lock);
|
|
|
|
if (ifs->bindPoints.size() <= 1) {
|
|
|
|
ifs->bindPoints.clear();
|
|
|
|
deleteStorageLocked(*ifs, std::move(l2));
|
|
|
|
} else {
|
|
|
|
const std::string savedFile = std::move(bindIt->second.savedFilename);
|
|
|
|
ifs->bindPoints.erase(bindIt);
|
|
|
|
l2.unlock();
|
|
|
|
if (!savedFile.empty()) {
|
2020-01-10 11:53:24 -08:00
|
|
|
mIncFs->unlink(ifs->control, path::join(ifs->root, constants().mount, savedFile));
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-04-06 23:10:28 -07:00
|
|
|
std::string IncrementalService::normalizePathToStorageLocked(
|
|
|
|
IncFsMount::StorageMap::iterator storageIt, std::string_view path) {
|
2020-02-03 17:32:32 -08:00
|
|
|
std::string normPath;
|
|
|
|
if (path::isAbsolute(path)) {
|
|
|
|
normPath = path::normalize(path);
|
2020-04-06 23:10:28 -07:00
|
|
|
if (!path::startsWith(normPath, storageIt->second.name)) {
|
|
|
|
return {};
|
|
|
|
}
|
2020-02-03 17:32:32 -08:00
|
|
|
} else {
|
2020-04-06 23:10:28 -07:00
|
|
|
normPath = path::normalize(path::join(storageIt->second.name, path));
|
2020-02-03 17:32:32 -08:00
|
|
|
}
|
2020-04-06 23:10:28 -07:00
|
|
|
return normPath;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string IncrementalService::normalizePathToStorage(const IncrementalService::IfsMountPtr& ifs,
|
|
|
|
StorageId storage, std::string_view path) {
|
|
|
|
std::unique_lock l(ifs->lock);
|
|
|
|
const auto storageInfo = ifs->storages.find(storage);
|
|
|
|
if (storageInfo == ifs->storages.end()) {
|
2020-02-03 17:32:32 -08:00
|
|
|
return {};
|
|
|
|
}
|
2020-04-06 23:10:28 -07:00
|
|
|
return normalizePathToStorageLocked(storageInfo, path);
|
2020-02-03 17:32:32 -08:00
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::makeFile(StorageId storage, std::string_view path, int mode, FileId id,
|
|
|
|
incfs::NewFileParams params) {
|
|
|
|
if (auto ifs = getIfs(storage)) {
|
2020-02-03 17:32:32 -08:00
|
|
|
std::string normPath = normalizePathToStorage(ifs, storage, path);
|
|
|
|
if (normPath.empty()) {
|
2020-04-06 23:10:28 -07:00
|
|
|
LOG(ERROR) << "Internal error: storageId " << storage
|
|
|
|
<< " failed to normalize: " << path;
|
2020-01-31 16:52:41 -08:00
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
auto err = mIncFs->makeFile(ifs->control, normPath, mode, id, params);
|
2020-01-10 11:53:24 -08:00
|
|
|
if (err) {
|
2020-03-31 15:30:21 -07:00
|
|
|
LOG(ERROR) << "Internal error: storageId " << storage << " failed to makeFile: " << err;
|
2020-01-10 11:53:24 -08:00
|
|
|
return err;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
2020-01-10 11:53:24 -08:00
|
|
|
return 0;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::makeDir(StorageId storageId, std::string_view path, int mode) {
|
2019-11-29 14:23:45 -08:00
|
|
|
if (auto ifs = getIfs(storageId)) {
|
2020-02-03 17:32:32 -08:00
|
|
|
std::string normPath = normalizePathToStorage(ifs, storageId, path);
|
|
|
|
if (normPath.empty()) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
return mIncFs->makeDir(ifs->control, normPath, mode);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::makeDirs(StorageId storageId, std::string_view path, int mode) {
|
2019-11-29 14:23:45 -08:00
|
|
|
const auto ifs = getIfs(storageId);
|
|
|
|
if (!ifs) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2020-02-03 17:32:32 -08:00
|
|
|
std::string normPath = normalizePathToStorage(ifs, storageId, path);
|
|
|
|
if (normPath.empty()) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
auto err = mIncFs->makeDir(ifs->control, normPath, mode);
|
2020-01-10 11:53:24 -08:00
|
|
|
if (err == -EEXIST) {
|
|
|
|
return 0;
|
|
|
|
} else if (err != -ENOENT) {
|
|
|
|
return err;
|
|
|
|
}
|
2020-02-03 17:32:32 -08:00
|
|
|
if (auto err = makeDirs(storageId, path::dirname(normPath), mode)) {
|
2020-01-10 11:53:24 -08:00
|
|
|
return err;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
2020-02-03 17:32:32 -08:00
|
|
|
return mIncFs->makeDir(ifs->control, normPath, mode);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::link(StorageId sourceStorageId, std::string_view oldPath,
|
|
|
|
StorageId destStorageId, std::string_view newPath) {
|
2020-04-06 23:10:28 -07:00
|
|
|
auto ifsSrc = getIfs(sourceStorageId);
|
|
|
|
auto ifsDest = sourceStorageId == destStorageId ? ifsSrc : getIfs(destStorageId);
|
|
|
|
if (ifsSrc && ifsSrc == ifsDest) {
|
2020-02-03 17:32:32 -08:00
|
|
|
std::string normOldPath = normalizePathToStorage(ifsSrc, sourceStorageId, oldPath);
|
|
|
|
std::string normNewPath = normalizePathToStorage(ifsDest, destStorageId, newPath);
|
|
|
|
if (normOldPath.empty() || normNewPath.empty()) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
return mIncFs->link(ifsSrc->control, normOldPath, normNewPath);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::unlink(StorageId storage, std::string_view path) {
|
2019-11-29 14:23:45 -08:00
|
|
|
if (auto ifs = getIfs(storage)) {
|
2020-02-03 17:32:32 -08:00
|
|
|
std::string normOldPath = normalizePathToStorage(ifs, storage, path);
|
|
|
|
return mIncFs->unlink(ifs->control, normOldPath);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
int IncrementalService::addBindMount(IncFsMount& ifs, StorageId storage,
|
|
|
|
std::string_view storageRoot, std::string&& source,
|
2019-11-29 14:23:45 -08:00
|
|
|
std::string&& target, BindKind kind,
|
|
|
|
std::unique_lock<std::mutex>& mainLock) {
|
|
|
|
if (!isValidMountTarget(target)) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string mdFileName;
|
|
|
|
if (kind != BindKind::Temporary) {
|
|
|
|
metadata::BindPoint bp;
|
|
|
|
bp.set_storage_id(storage);
|
|
|
|
bp.set_allocated_dest_path(&target);
|
2020-02-10 12:49:41 -08:00
|
|
|
bp.set_allocated_source_subdir(&source);
|
2019-11-29 14:23:45 -08:00
|
|
|
const auto metadata = bp.SerializeAsString();
|
|
|
|
bp.release_dest_path();
|
2020-02-10 12:49:41 -08:00
|
|
|
bp.release_source_subdir();
|
2019-11-29 14:23:45 -08:00
|
|
|
mdFileName = makeBindMdName();
|
2020-01-10 11:53:24 -08:00
|
|
|
auto node =
|
|
|
|
mIncFs->makeFile(ifs.control, path::join(ifs.root, constants().mount, mdFileName),
|
|
|
|
0444, idFromMetadata(metadata),
|
|
|
|
{.metadata = {metadata.data(), (IncFsSize)metadata.size()}});
|
|
|
|
if (node) {
|
2019-11-29 14:23:45 -08:00
|
|
|
return int(node);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
return addBindMountWithMd(ifs, storage, std::move(mdFileName), std::move(source),
|
2019-11-29 14:23:45 -08:00
|
|
|
std::move(target), kind, mainLock);
|
|
|
|
}
|
|
|
|
|
|
|
|
int IncrementalService::addBindMountWithMd(IncrementalService::IncFsMount& ifs, StorageId storage,
|
2020-01-10 11:53:24 -08:00
|
|
|
std::string&& metadataName, std::string&& source,
|
2019-11-29 14:23:45 -08:00
|
|
|
std::string&& target, BindKind kind,
|
|
|
|
std::unique_lock<std::mutex>& mainLock) {
|
|
|
|
{
|
|
|
|
std::lock_guard l(mMountOperationLock);
|
2020-01-10 11:53:24 -08:00
|
|
|
const auto status = mVold->bindMount(source, target);
|
2019-11-29 14:23:45 -08:00
|
|
|
if (!status.isOk()) {
|
|
|
|
LOG(ERROR) << "Calling Vold::bindMount() failed: " << status.toString8();
|
|
|
|
return status.exceptionCode() == binder::Status::EX_SERVICE_SPECIFIC
|
|
|
|
? status.serviceSpecificErrorCode() > 0 ? -status.serviceSpecificErrorCode()
|
|
|
|
: status.serviceSpecificErrorCode() == 0
|
|
|
|
? -EFAULT
|
|
|
|
: status.serviceSpecificErrorCode()
|
|
|
|
: -EIO;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mainLock.owns_lock()) {
|
|
|
|
mainLock.lock();
|
|
|
|
}
|
|
|
|
std::lock_guard l(ifs.lock);
|
|
|
|
const auto [it, _] =
|
|
|
|
ifs.bindPoints.insert_or_assign(target,
|
|
|
|
IncFsMount::Bind{storage, std::move(metadataName),
|
2020-01-10 11:53:24 -08:00
|
|
|
std::move(source), kind});
|
2019-11-29 14:23:45 -08:00
|
|
|
mBindsByPath[std::move(target)] = it;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-01-10 11:53:24 -08:00
|
|
|
RawMetadata IncrementalService::getMetadata(StorageId storage, FileId node) const {
|
2019-11-29 14:23:45 -08:00
|
|
|
const auto ifs = getIfs(storage);
|
|
|
|
if (!ifs) {
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
return mIncFs->getMetadata(ifs->control, node);
|
|
|
|
}
|
|
|
|
|
|
|
|
std::vector<std::string> IncrementalService::listFiles(StorageId storage) const {
|
|
|
|
const auto ifs = getIfs(storage);
|
|
|
|
if (!ifs) {
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
|
|
|
|
std::unique_lock l(ifs->lock);
|
|
|
|
auto subdirIt = ifs->storages.find(storage);
|
|
|
|
if (subdirIt == ifs->storages.end()) {
|
|
|
|
return {};
|
|
|
|
}
|
|
|
|
auto dir = path::join(ifs->root, constants().mount, subdirIt->second.name);
|
|
|
|
l.unlock();
|
|
|
|
|
|
|
|
const auto prefixSize = dir.size() + 1;
|
|
|
|
std::vector<std::string> todoDirs{std::move(dir)};
|
|
|
|
std::vector<std::string> result;
|
|
|
|
do {
|
|
|
|
auto currDir = std::move(todoDirs.back());
|
|
|
|
todoDirs.pop_back();
|
|
|
|
|
|
|
|
auto d =
|
|
|
|
std::unique_ptr<DIR, decltype(&::closedir)>(::opendir(currDir.c_str()), ::closedir);
|
|
|
|
while (auto e = ::readdir(d.get())) {
|
|
|
|
if (e->d_type == DT_REG) {
|
|
|
|
result.emplace_back(
|
|
|
|
path::join(std::string_view(currDir).substr(prefixSize), e->d_name));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (e->d_type == DT_DIR) {
|
|
|
|
if (e->d_name == "."sv || e->d_name == ".."sv) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
todoDirs.emplace_back(path::join(currDir, e->d_name));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} while (!todoDirs.empty());
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IncrementalService::startLoading(StorageId storage) const {
|
2020-04-09 17:25:42 -07:00
|
|
|
DataLoaderStubPtr dataLoaderStub;
|
2020-03-10 15:49:29 -07:00
|
|
|
{
|
|
|
|
std::unique_lock l(mLock);
|
|
|
|
const auto& ifs = getIfsLocked(storage);
|
|
|
|
if (!ifs) {
|
2019-11-29 14:23:45 -08:00
|
|
|
return false;
|
|
|
|
}
|
2020-04-09 17:25:42 -07:00
|
|
|
dataLoaderStub = ifs->dataLoaderStub;
|
|
|
|
if (!dataLoaderStub) {
|
|
|
|
return false;
|
2020-03-10 15:49:29 -07:00
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
2020-04-13 09:53:04 -07:00
|
|
|
return dataLoaderStub->requestStart();
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::mountExistingImages() {
|
2020-02-10 12:49:41 -08:00
|
|
|
for (const auto& entry : fs::directory_iterator(mIncrementalDir)) {
|
|
|
|
const auto path = entry.path().u8string();
|
|
|
|
const auto name = entry.path().filename().u8string();
|
|
|
|
if (!base::StartsWith(name, constants().mountKeyPrefix)) {
|
2019-11-29 14:23:45 -08:00
|
|
|
continue;
|
|
|
|
}
|
2020-02-10 12:49:41 -08:00
|
|
|
const auto root = path::join(mIncrementalDir, name);
|
2020-04-03 13:12:51 -07:00
|
|
|
if (!mountExistingImage(root)) {
|
2020-02-10 12:49:41 -08:00
|
|
|
IncFsMount::cleanupFilesystem(path);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-03 13:12:51 -07:00
|
|
|
bool IncrementalService::mountExistingImage(std::string_view root) {
|
2019-11-29 14:23:45 -08:00
|
|
|
auto mountTarget = path::join(root, constants().mount);
|
2020-01-10 11:53:24 -08:00
|
|
|
const auto backing = path::join(root, constants().backing);
|
2019-11-29 14:23:45 -08:00
|
|
|
|
|
|
|
IncrementalFileSystemControlParcel controlParcel;
|
2020-01-10 11:53:24 -08:00
|
|
|
auto status = mVold->mountIncFs(backing, mountTarget, 0, &controlParcel);
|
2019-11-29 14:23:45 -08:00
|
|
|
if (!status.isOk()) {
|
|
|
|
LOG(ERROR) << "Vold::mountIncFs() failed: " << status.toString8();
|
|
|
|
return false;
|
|
|
|
}
|
2020-03-03 09:47:15 -08:00
|
|
|
|
|
|
|
int cmd = controlParcel.cmd.release().release();
|
|
|
|
int pendingReads = controlParcel.pendingReads.release().release();
|
|
|
|
int logs = controlParcel.log.release().release();
|
|
|
|
IncFsMount::Control control = mIncFs->createControl(cmd, pendingReads, logs);
|
2019-11-29 14:23:45 -08:00
|
|
|
|
|
|
|
auto ifs = std::make_shared<IncFsMount>(std::string(root), -1, std::move(control), *this);
|
|
|
|
|
2020-04-02 20:03:47 -07:00
|
|
|
auto mount = parseFromIncfs<metadata::Mount>(mIncFs.get(), ifs->control,
|
|
|
|
path::join(mountTarget, constants().infoMdName));
|
|
|
|
if (!mount.has_loader() || !mount.has_storage()) {
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(ERROR) << "Bad mount metadata in mount at " << root;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-04-02 20:03:47 -07:00
|
|
|
ifs->mountId = mount.storage().id();
|
2019-11-29 14:23:45 -08:00
|
|
|
mNextId = std::max(mNextId, ifs->mountId + 1);
|
|
|
|
|
2020-04-02 20:03:47 -07:00
|
|
|
// DataLoader params
|
2020-04-09 17:25:42 -07:00
|
|
|
DataLoaderParamsParcel dataLoaderParams;
|
2020-04-02 20:03:47 -07:00
|
|
|
{
|
|
|
|
const auto& loader = mount.loader();
|
2020-04-09 17:25:42 -07:00
|
|
|
dataLoaderParams.type = (android::content::pm::DataLoaderType)loader.type();
|
|
|
|
dataLoaderParams.packageName = loader.package_name();
|
|
|
|
dataLoaderParams.className = loader.class_name();
|
|
|
|
dataLoaderParams.arguments = loader.arguments();
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
|
2020-04-11 21:40:37 -07:00
|
|
|
prepareDataLoader(*ifs, std::move(dataLoaderParams), nullptr);
|
|
|
|
CHECK(ifs->dataLoaderStub);
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
std::vector<std::pair<std::string, metadata::BindPoint>> bindPoints;
|
2020-01-10 11:53:24 -08:00
|
|
|
auto d = openDir(path::c_str(mountTarget));
|
2019-11-29 14:23:45 -08:00
|
|
|
while (auto e = ::readdir(d.get())) {
|
|
|
|
if (e->d_type == DT_REG) {
|
|
|
|
auto name = std::string_view(e->d_name);
|
|
|
|
if (name.starts_with(constants().mountpointMdPrefix)) {
|
|
|
|
bindPoints.emplace_back(name,
|
|
|
|
parseFromIncfs<metadata::BindPoint>(mIncFs.get(),
|
|
|
|
ifs->control,
|
|
|
|
path::join(mountTarget,
|
|
|
|
name)));
|
|
|
|
if (bindPoints.back().second.dest_path().empty() ||
|
|
|
|
bindPoints.back().second.source_subdir().empty()) {
|
|
|
|
bindPoints.pop_back();
|
2020-01-10 11:53:24 -08:00
|
|
|
mIncFs->unlink(ifs->control, path::join(ifs->root, constants().mount, name));
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if (e->d_type == DT_DIR) {
|
|
|
|
if (e->d_name == "."sv || e->d_name == ".."sv) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
auto name = std::string_view(e->d_name);
|
|
|
|
if (name.starts_with(constants().storagePrefix)) {
|
2020-04-03 13:12:51 -07:00
|
|
|
int storageId;
|
|
|
|
const auto res = std::from_chars(name.data() + constants().storagePrefix.size() + 1,
|
|
|
|
name.data() + name.size(), storageId);
|
|
|
|
if (res.ec != std::errc{} || *res.ptr != '_') {
|
|
|
|
LOG(WARNING) << "Ignoring storage with invalid name '" << name << "' for mount "
|
|
|
|
<< root;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
auto [_, inserted] = mMounts.try_emplace(storageId, ifs);
|
2019-11-29 14:23:45 -08:00
|
|
|
if (!inserted) {
|
2020-04-03 13:12:51 -07:00
|
|
|
LOG(WARNING) << "Ignoring storage with duplicate id " << storageId
|
2019-11-29 14:23:45 -08:00
|
|
|
<< " for mount " << root;
|
|
|
|
continue;
|
|
|
|
}
|
2020-04-03 13:12:51 -07:00
|
|
|
ifs->storages.insert_or_assign(storageId,
|
|
|
|
IncFsMount::Storage{
|
|
|
|
path::join(root, constants().mount, name)});
|
|
|
|
mNextId = std::max(mNextId, storageId + 1);
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ifs->storages.empty()) {
|
|
|
|
LOG(WARNING) << "No valid storages in mount " << root;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
int bindCount = 0;
|
|
|
|
for (auto&& bp : bindPoints) {
|
|
|
|
std::unique_lock l(mLock, std::defer_lock);
|
|
|
|
bindCount += !addBindMountWithMd(*ifs, bp.second.storage_id(), std::move(bp.first),
|
|
|
|
std::move(*bp.second.mutable_source_subdir()),
|
|
|
|
std::move(*bp.second.mutable_dest_path()),
|
|
|
|
BindKind::Permanent, l);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bindCount == 0) {
|
|
|
|
LOG(WARNING) << "No valid bind points for mount " << root;
|
|
|
|
deleteStorage(*ifs);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
mMounts[ifs->mountId] = std::move(ifs);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-04-09 17:25:42 -07:00
|
|
|
IncrementalService::DataLoaderStubPtr IncrementalService::prepareDataLoader(
|
|
|
|
IncrementalService::IncFsMount& ifs, DataLoaderParamsParcel&& params,
|
|
|
|
const DataLoaderStatusListener* externalListener) {
|
2019-11-29 14:23:45 -08:00
|
|
|
std::unique_lock l(ifs.lock);
|
2020-04-09 17:25:42 -07:00
|
|
|
if (ifs.dataLoaderStub) {
|
2019-11-29 14:23:45 -08:00
|
|
|
LOG(INFO) << "Skipped data loader preparation because it already exists";
|
2020-04-09 17:25:42 -07:00
|
|
|
return ifs.dataLoaderStub;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
FileSystemControlParcel fsControlParcel;
|
2020-03-07 21:47:09 +09:00
|
|
|
fsControlParcel.incremental = aidl::make_nullable<IncrementalFileSystemControlParcel>();
|
2020-03-03 09:47:15 -08:00
|
|
|
fsControlParcel.incremental->cmd.reset(base::unique_fd(::dup(ifs.control.cmd())));
|
2020-01-10 11:53:24 -08:00
|
|
|
fsControlParcel.incremental->pendingReads.reset(
|
2020-03-03 09:47:15 -08:00
|
|
|
base::unique_fd(::dup(ifs.control.pendingReads())));
|
|
|
|
fsControlParcel.incremental->log.reset(base::unique_fd(::dup(ifs.control.logs())));
|
2020-04-07 14:26:55 -07:00
|
|
|
fsControlParcel.service = new IncrementalServiceConnector(*this, ifs.mountId);
|
2020-04-09 17:25:42 -07:00
|
|
|
|
|
|
|
ifs.dataLoaderStub = new DataLoaderStub(*this, ifs.mountId, std::move(params),
|
|
|
|
std::move(fsControlParcel), externalListener);
|
|
|
|
return ifs.dataLoaderStub;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
|
|
|
|
2020-04-06 23:10:28 -07:00
|
|
|
template <class Duration>
|
|
|
|
static long elapsedMcs(Duration start, Duration end) {
|
|
|
|
return std::chrono::duration_cast<std::chrono::microseconds>(end - start).count();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Extract lib files from zip, create new files in incfs and write data to them
|
2020-02-05 17:41:25 -08:00
|
|
|
bool IncrementalService::configureNativeBinaries(StorageId storage, std::string_view apkFullPath,
|
|
|
|
std::string_view libDirRelativePath,
|
|
|
|
std::string_view abi) {
|
2020-04-06 23:10:28 -07:00
|
|
|
auto start = Clock::now();
|
|
|
|
|
2020-02-05 17:41:25 -08:00
|
|
|
const auto ifs = getIfs(storage);
|
2020-04-06 23:10:28 -07:00
|
|
|
if (!ifs) {
|
|
|
|
LOG(ERROR) << "Invalid storage " << storage;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-02-05 17:41:25 -08:00
|
|
|
// First prepare target directories if they don't exist yet
|
|
|
|
if (auto res = makeDirs(storage, libDirRelativePath, 0755)) {
|
|
|
|
LOG(ERROR) << "Failed to prepare target lib directory " << libDirRelativePath
|
|
|
|
<< " errno: " << res;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-04-06 23:10:28 -07:00
|
|
|
auto mkDirsTs = Clock::now();
|
2020-04-07 15:35:21 -07:00
|
|
|
ZipArchiveHandle zipFileHandle;
|
|
|
|
if (OpenArchive(path::c_str(apkFullPath), &zipFileHandle)) {
|
2020-02-05 17:41:25 -08:00
|
|
|
LOG(ERROR) << "Failed to open zip file at " << apkFullPath;
|
|
|
|
return false;
|
|
|
|
}
|
2020-04-07 15:35:21 -07:00
|
|
|
|
|
|
|
// Need a shared pointer: will be passing it into all unpacking jobs.
|
|
|
|
std::shared_ptr<ZipArchive> zipFile(zipFileHandle, [](ZipArchiveHandle h) { CloseArchive(h); });
|
2020-02-05 17:41:25 -08:00
|
|
|
void* cookie = nullptr;
|
|
|
|
const auto libFilePrefix = path::join(constants().libDir, abi);
|
2020-04-07 15:35:21 -07:00
|
|
|
if (StartIteration(zipFile.get(), &cookie, libFilePrefix, constants().libSuffix)) {
|
2020-02-05 17:41:25 -08:00
|
|
|
LOG(ERROR) << "Failed to start zip iteration for " << apkFullPath;
|
|
|
|
return false;
|
|
|
|
}
|
2020-04-07 15:35:21 -07:00
|
|
|
auto endIteration = [](void* cookie) { EndIteration(cookie); };
|
2020-04-06 23:10:28 -07:00
|
|
|
auto iterationCleaner = std::unique_ptr<void, decltype(endIteration)>(cookie, endIteration);
|
|
|
|
|
|
|
|
auto openZipTs = Clock::now();
|
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
std::vector<Job> jobQueue;
|
|
|
|
ZipEntry entry;
|
|
|
|
std::string_view fileName;
|
|
|
|
while (!Next(cookie, &entry, &fileName)) {
|
|
|
|
if (fileName.empty()) {
|
2020-02-05 17:41:25 -08:00
|
|
|
continue;
|
|
|
|
}
|
2020-04-07 15:35:21 -07:00
|
|
|
|
|
|
|
auto startFileTs = Clock::now();
|
|
|
|
|
2020-02-05 17:41:25 -08:00
|
|
|
const auto libName = path::basename(fileName);
|
|
|
|
const auto targetLibPath = path::join(libDirRelativePath, libName);
|
|
|
|
const auto targetLibPathAbsolute = normalizePathToStorage(ifs, storage, targetLibPath);
|
|
|
|
// If the extract file already exists, skip
|
2020-04-06 23:10:28 -07:00
|
|
|
if (access(targetLibPathAbsolute.c_str(), F_OK) == 0) {
|
|
|
|
if (sEnablePerfLogging) {
|
|
|
|
LOG(INFO) << "incfs: Native lib file already exists: " << targetLibPath
|
|
|
|
<< "; skipping extraction, spent "
|
|
|
|
<< elapsedMcs(startFileTs, Clock::now()) << "mcs";
|
|
|
|
}
|
2020-02-05 17:41:25 -08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create new lib file without signature info
|
2020-04-06 23:10:28 -07:00
|
|
|
incfs::NewFileParams libFileParams = {
|
2020-04-07 15:35:21 -07:00
|
|
|
.size = entry.uncompressed_length,
|
2020-04-06 23:10:28 -07:00
|
|
|
.signature = {},
|
|
|
|
// Metadata of the new lib file is its relative path
|
|
|
|
.metadata = {targetLibPath.c_str(), (IncFsSize)targetLibPath.size()},
|
|
|
|
};
|
2020-02-05 17:41:25 -08:00
|
|
|
incfs::FileId libFileId = idFromMetadata(targetLibPath);
|
2020-04-06 23:10:28 -07:00
|
|
|
if (auto res = mIncFs->makeFile(ifs->control, targetLibPathAbsolute, 0777, libFileId,
|
|
|
|
libFileParams)) {
|
2020-02-05 17:41:25 -08:00
|
|
|
LOG(ERROR) << "Failed to make file for: " << targetLibPath << " errno: " << res;
|
|
|
|
// If one lib file fails to be created, abort others as well
|
2020-04-06 23:10:28 -07:00
|
|
|
return false;
|
2020-02-05 17:41:25 -08:00
|
|
|
}
|
2020-04-06 23:10:28 -07:00
|
|
|
|
|
|
|
auto makeFileTs = Clock::now();
|
|
|
|
|
2020-03-18 14:12:20 -07:00
|
|
|
// If it is a zero-byte file, skip data writing
|
2020-04-07 15:35:21 -07:00
|
|
|
if (entry.uncompressed_length == 0) {
|
2020-04-06 23:10:28 -07:00
|
|
|
if (sEnablePerfLogging) {
|
2020-04-07 15:35:21 -07:00
|
|
|
LOG(INFO) << "incfs: Extracted " << libName
|
|
|
|
<< "(0 bytes): " << elapsedMcs(startFileTs, makeFileTs) << "mcs";
|
2020-04-06 23:10:28 -07:00
|
|
|
}
|
2020-03-18 14:12:20 -07:00
|
|
|
continue;
|
|
|
|
}
|
2020-02-05 17:41:25 -08:00
|
|
|
|
2020-04-09 19:22:30 -07:00
|
|
|
jobQueue.emplace_back([this, zipFile, entry, ifs = std::weak_ptr<IncFsMount>(ifs),
|
|
|
|
libFileId, libPath = std::move(targetLibPath),
|
|
|
|
makeFileTs]() mutable {
|
|
|
|
extractZipFile(ifs.lock(), zipFile.get(), entry, libFileId, libPath, makeFileTs);
|
2020-04-07 15:35:21 -07:00
|
|
|
});
|
2020-04-06 23:10:28 -07:00
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
if (sEnablePerfLogging) {
|
|
|
|
auto prepareJobTs = Clock::now();
|
|
|
|
LOG(INFO) << "incfs: Processed " << libName << ": "
|
|
|
|
<< elapsedMcs(startFileTs, prepareJobTs)
|
|
|
|
<< "mcs, make file: " << elapsedMcs(startFileTs, makeFileTs)
|
|
|
|
<< " prepare job: " << elapsedMcs(makeFileTs, prepareJobTs);
|
2020-02-05 17:41:25 -08:00
|
|
|
}
|
2020-04-07 15:35:21 -07:00
|
|
|
}
|
2020-04-06 23:10:28 -07:00
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
auto processedTs = Clock::now();
|
2020-04-06 23:10:28 -07:00
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
if (!jobQueue.empty()) {
|
|
|
|
{
|
|
|
|
std::lock_guard lock(mJobMutex);
|
|
|
|
if (mRunning) {
|
2020-04-13 11:34:32 -07:00
|
|
|
auto& existingJobs = mJobQueue[ifs->mountId];
|
2020-04-07 15:35:21 -07:00
|
|
|
if (existingJobs.empty()) {
|
|
|
|
existingJobs = std::move(jobQueue);
|
|
|
|
} else {
|
|
|
|
existingJobs.insert(existingJobs.end(), std::move_iterator(jobQueue.begin()),
|
|
|
|
std::move_iterator(jobQueue.end()));
|
|
|
|
}
|
|
|
|
}
|
2020-02-05 17:41:25 -08:00
|
|
|
}
|
2020-04-07 15:35:21 -07:00
|
|
|
mJobCondition.notify_all();
|
2020-02-05 17:41:25 -08:00
|
|
|
}
|
2020-04-06 23:10:28 -07:00
|
|
|
|
|
|
|
if (sEnablePerfLogging) {
|
|
|
|
auto end = Clock::now();
|
|
|
|
LOG(INFO) << "incfs: configureNativeBinaries complete in " << elapsedMcs(start, end)
|
|
|
|
<< "mcs, make dirs: " << elapsedMcs(start, mkDirsTs)
|
|
|
|
<< " open zip: " << elapsedMcs(mkDirsTs, openZipTs)
|
2020-04-07 15:35:21 -07:00
|
|
|
<< " make files: " << elapsedMcs(openZipTs, processedTs)
|
|
|
|
<< " schedule jobs: " << elapsedMcs(processedTs, end);
|
2020-04-06 23:10:28 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
2020-02-05 17:41:25 -08:00
|
|
|
}
|
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
void IncrementalService::extractZipFile(const IfsMountPtr& ifs, ZipArchiveHandle zipFile,
|
|
|
|
ZipEntry& entry, const incfs::FileId& libFileId,
|
|
|
|
std::string_view targetLibPath,
|
|
|
|
Clock::time_point scheduledTs) {
|
2020-04-09 19:22:30 -07:00
|
|
|
if (!ifs) {
|
|
|
|
LOG(INFO) << "Skipping zip file " << targetLibPath << " extraction for an expired mount";
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
auto libName = path::basename(targetLibPath);
|
|
|
|
auto startedTs = Clock::now();
|
|
|
|
|
|
|
|
// Write extracted data to new file
|
|
|
|
// NOTE: don't zero-initialize memory, it may take a while for nothing
|
|
|
|
auto libData = std::unique_ptr<uint8_t[]>(new uint8_t[entry.uncompressed_length]);
|
|
|
|
if (ExtractToMemory(zipFile, &entry, libData.get(), entry.uncompressed_length)) {
|
|
|
|
LOG(ERROR) << "Failed to extract native lib zip entry: " << libName;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto extractFileTs = Clock::now();
|
|
|
|
|
|
|
|
const auto writeFd = mIncFs->openForSpecialOps(ifs->control, libFileId);
|
|
|
|
if (!writeFd.ok()) {
|
|
|
|
LOG(ERROR) << "Failed to open write fd for: " << targetLibPath << " errno: " << writeFd;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto openFileTs = Clock::now();
|
|
|
|
const int numBlocks =
|
|
|
|
(entry.uncompressed_length + constants().blockSize - 1) / constants().blockSize;
|
|
|
|
std::vector<IncFsDataBlock> instructions(numBlocks);
|
|
|
|
auto remainingData = std::span(libData.get(), entry.uncompressed_length);
|
|
|
|
for (int i = 0; i < numBlocks; i++) {
|
|
|
|
const auto blockSize = std::min<uint16_t>(constants().blockSize, remainingData.size());
|
|
|
|
instructions[i] = IncFsDataBlock{
|
|
|
|
.fileFd = writeFd.get(),
|
|
|
|
.pageIndex = static_cast<IncFsBlockIndex>(i),
|
|
|
|
.compression = INCFS_COMPRESSION_KIND_NONE,
|
|
|
|
.kind = INCFS_BLOCK_KIND_DATA,
|
|
|
|
.dataSize = blockSize,
|
|
|
|
.data = reinterpret_cast<const char*>(remainingData.data()),
|
|
|
|
};
|
|
|
|
remainingData = remainingData.subspan(blockSize);
|
|
|
|
}
|
|
|
|
auto prepareInstsTs = Clock::now();
|
|
|
|
|
|
|
|
size_t res = mIncFs->writeBlocks(instructions);
|
|
|
|
if (res != instructions.size()) {
|
|
|
|
LOG(ERROR) << "Failed to write data into: " << targetLibPath;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sEnablePerfLogging) {
|
|
|
|
auto endFileTs = Clock::now();
|
|
|
|
LOG(INFO) << "incfs: Extracted " << libName << "(" << entry.compressed_length << " -> "
|
|
|
|
<< entry.uncompressed_length << " bytes): " << elapsedMcs(startedTs, endFileTs)
|
|
|
|
<< "mcs, scheduling delay: " << elapsedMcs(scheduledTs, startedTs)
|
|
|
|
<< " extract: " << elapsedMcs(startedTs, extractFileTs)
|
|
|
|
<< " open: " << elapsedMcs(extractFileTs, openFileTs)
|
|
|
|
<< " prepare: " << elapsedMcs(openFileTs, prepareInstsTs)
|
|
|
|
<< " write: " << elapsedMcs(prepareInstsTs, endFileTs);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IncrementalService::waitForNativeBinariesExtraction(StorageId storage) {
|
2020-04-13 11:34:32 -07:00
|
|
|
struct WaitPrinter {
|
|
|
|
const Clock::time_point startTs = Clock::now();
|
|
|
|
~WaitPrinter() noexcept {
|
|
|
|
if (sEnablePerfLogging) {
|
|
|
|
const auto endTs = Clock::now();
|
|
|
|
LOG(INFO) << "incfs: waitForNativeBinariesExtraction() complete in "
|
|
|
|
<< elapsedMcs(startTs, endTs) << "mcs";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} waitPrinter;
|
|
|
|
|
|
|
|
MountId mount;
|
|
|
|
{
|
|
|
|
auto ifs = getIfs(storage);
|
|
|
|
if (!ifs) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
mount = ifs->mountId;
|
|
|
|
}
|
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
std::unique_lock lock(mJobMutex);
|
2020-04-13 11:34:32 -07:00
|
|
|
mJobCondition.wait(lock, [this, mount] {
|
2020-04-07 15:35:21 -07:00
|
|
|
return !mRunning ||
|
2020-04-13 11:34:32 -07:00
|
|
|
(mPendingJobsMount != mount && mJobQueue.find(mount) == mJobQueue.end());
|
2020-04-07 15:35:21 -07:00
|
|
|
});
|
2020-04-13 11:34:32 -07:00
|
|
|
return mRunning;
|
2020-04-07 15:35:21 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::runJobProcessing() {
|
|
|
|
for (;;) {
|
|
|
|
std::unique_lock lock(mJobMutex);
|
|
|
|
mJobCondition.wait(lock, [this]() { return !mRunning || !mJobQueue.empty(); });
|
|
|
|
if (!mRunning) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
auto it = mJobQueue.begin();
|
2020-04-13 11:34:32 -07:00
|
|
|
mPendingJobsMount = it->first;
|
2020-04-07 15:35:21 -07:00
|
|
|
auto queue = std::move(it->second);
|
|
|
|
mJobQueue.erase(it);
|
|
|
|
lock.unlock();
|
|
|
|
|
|
|
|
for (auto&& job : queue) {
|
|
|
|
job();
|
|
|
|
}
|
|
|
|
|
|
|
|
lock.lock();
|
2020-04-13 11:34:32 -07:00
|
|
|
mPendingJobsMount = kInvalidStorageId;
|
2020-04-07 15:35:21 -07:00
|
|
|
lock.unlock();
|
|
|
|
mJobCondition.notify_all();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-02 20:03:47 -07:00
|
|
|
void IncrementalService::registerAppOpsCallback(const std::string& packageName) {
|
2020-04-03 23:00:19 -07:00
|
|
|
sp<IAppOpsCallback> listener;
|
2020-04-02 20:03:47 -07:00
|
|
|
{
|
|
|
|
std::unique_lock lock{mCallbacksLock};
|
2020-04-03 23:00:19 -07:00
|
|
|
auto& cb = mCallbackRegistered[packageName];
|
|
|
|
if (cb) {
|
2020-04-02 20:03:47 -07:00
|
|
|
return;
|
|
|
|
}
|
2020-04-03 23:00:19 -07:00
|
|
|
cb = new AppOpsListener(*this, packageName);
|
|
|
|
listener = cb;
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
|
2020-04-07 15:35:21 -07:00
|
|
|
mAppOpsManager->startWatchingMode(AppOpsManager::OP_GET_USAGE_STATS,
|
|
|
|
String16(packageName.c_str()), listener);
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
|
2020-04-03 23:00:19 -07:00
|
|
|
bool IncrementalService::unregisterAppOpsCallback(const std::string& packageName) {
|
|
|
|
sp<IAppOpsCallback> listener;
|
|
|
|
{
|
|
|
|
std::unique_lock lock{mCallbacksLock};
|
|
|
|
auto found = mCallbackRegistered.find(packageName);
|
|
|
|
if (found == mCallbackRegistered.end()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
listener = found->second;
|
|
|
|
mCallbackRegistered.erase(found);
|
|
|
|
}
|
|
|
|
|
|
|
|
mAppOpsManager->stopWatchingMode(listener);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::onAppOpChanged(const std::string& packageName) {
|
|
|
|
if (!unregisterAppOpsCallback(packageName)) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-04-02 20:03:47 -07:00
|
|
|
std::vector<IfsMountPtr> affected;
|
|
|
|
{
|
|
|
|
std::lock_guard l(mLock);
|
|
|
|
affected.reserve(mMounts.size());
|
|
|
|
for (auto&& [id, ifs] : mMounts) {
|
2020-04-09 17:25:42 -07:00
|
|
|
if (ifs->mountId == id && ifs->dataLoaderStub->params().packageName == packageName) {
|
2020-04-02 20:03:47 -07:00
|
|
|
affected.push_back(ifs);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (auto&& ifs : affected) {
|
2020-04-03 23:00:19 -07:00
|
|
|
applyStorageParams(*ifs, false);
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-09 17:25:42 -07:00
|
|
|
IncrementalService::DataLoaderStub::~DataLoaderStub() {
|
2020-04-13 09:53:04 -07:00
|
|
|
waitForDestroy();
|
2020-04-09 17:25:42 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool IncrementalService::DataLoaderStub::create() {
|
2020-04-13 09:53:04 -07:00
|
|
|
{
|
|
|
|
std::unique_lock lock(mStatusMutex);
|
|
|
|
mStartRequested = false;
|
|
|
|
mDestroyRequested = false;
|
|
|
|
}
|
2020-04-09 17:25:42 -07:00
|
|
|
bool created = false;
|
|
|
|
auto status = mService.mDataLoaderManager->initializeDataLoader(mId, mParams, mControl, this,
|
|
|
|
&created);
|
|
|
|
if (!status.isOk() || !created) {
|
|
|
|
LOG(ERROR) << "Failed to create a data loader for mount " << mId;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-04-13 09:53:04 -07:00
|
|
|
bool IncrementalService::DataLoaderStub::requestStart() {
|
|
|
|
{
|
|
|
|
std::unique_lock lock(mStatusMutex);
|
2020-04-09 17:25:42 -07:00
|
|
|
mStartRequested = true;
|
2020-04-13 09:53:04 -07:00
|
|
|
if (mStatus != IDataLoaderStatusListener::DATA_LOADER_CREATED) {
|
|
|
|
return true;
|
|
|
|
}
|
2020-04-09 17:25:42 -07:00
|
|
|
}
|
2020-04-13 09:53:04 -07:00
|
|
|
return start();
|
|
|
|
}
|
2020-04-09 17:25:42 -07:00
|
|
|
|
2020-04-13 09:53:04 -07:00
|
|
|
bool IncrementalService::DataLoaderStub::start() {
|
2020-04-09 17:25:42 -07:00
|
|
|
sp<IDataLoader> dataloader;
|
|
|
|
auto status = mService.mDataLoaderManager->getDataLoader(mId, &dataloader);
|
|
|
|
if (!status.isOk()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (!dataloader) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
status = dataloader->start(mId);
|
|
|
|
if (!status.isOk()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void IncrementalService::DataLoaderStub::destroy() {
|
2020-04-13 09:53:04 -07:00
|
|
|
{
|
|
|
|
std::unique_lock lock(mStatusMutex);
|
|
|
|
mDestroyRequested = true;
|
|
|
|
}
|
2020-04-09 17:25:42 -07:00
|
|
|
mService.mDataLoaderManager->destroyDataLoader(mId);
|
2020-04-13 09:53:04 -07:00
|
|
|
|
|
|
|
waitForDestroy();
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IncrementalService::DataLoaderStub::waitForDestroy() {
|
|
|
|
auto now = std::chrono::steady_clock::now();
|
|
|
|
std::unique_lock lock(mStatusMutex);
|
|
|
|
return mStatusCondition.wait_until(lock, now + 60s, [this] {
|
|
|
|
return mStatus == IDataLoaderStatusListener::DATA_LOADER_DESTROYED;
|
|
|
|
});
|
2020-04-09 17:25:42 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
binder::Status IncrementalService::DataLoaderStub::onStatusChanged(MountId mountId, int newStatus) {
|
|
|
|
if (mStatus == newStatus) {
|
|
|
|
return binder::Status::ok();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mListener) {
|
|
|
|
mListener->onStatusChanged(mountId, newStatus);
|
2020-02-10 08:34:18 -08:00
|
|
|
}
|
|
|
|
|
2020-04-13 09:53:04 -07:00
|
|
|
bool startRequested;
|
|
|
|
bool destroyRequested;
|
2020-03-10 15:49:29 -07:00
|
|
|
{
|
2020-04-13 09:53:04 -07:00
|
|
|
std::unique_lock lock(mStatusMutex);
|
|
|
|
if (mStatus == newStatus) {
|
2020-03-10 15:49:29 -07:00
|
|
|
return binder::Status::ok();
|
|
|
|
}
|
|
|
|
|
2020-04-13 09:53:04 -07:00
|
|
|
startRequested = mStartRequested;
|
|
|
|
destroyRequested = mDestroyRequested;
|
|
|
|
|
|
|
|
mStatus = newStatus;
|
2019-11-29 14:23:45 -08:00
|
|
|
}
|
2020-03-10 15:49:29 -07:00
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
switch (newStatus) {
|
2019-12-17 12:10:41 -08:00
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_CREATED: {
|
2020-04-13 09:53:04 -07:00
|
|
|
if (startRequested) {
|
|
|
|
LOG(WARNING) << "Start was requested, triggering, for mount: " << mountId;
|
2020-04-09 17:25:42 -07:00
|
|
|
start();
|
2020-03-10 15:49:29 -07:00
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
break;
|
|
|
|
}
|
2019-12-17 12:10:41 -08:00
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_DESTROYED: {
|
2020-04-13 09:53:04 -07:00
|
|
|
if (!destroyRequested) {
|
|
|
|
LOG(WARNING) << "DataLoader destroyed, reconnecting, for mount: " << mountId;
|
|
|
|
create();
|
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
break;
|
|
|
|
}
|
2019-12-17 12:10:41 -08:00
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_STARTED: {
|
2019-11-29 14:23:45 -08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_STOPPED: {
|
|
|
|
break;
|
|
|
|
}
|
2020-02-10 08:34:18 -08:00
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_IMAGE_READY: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_IMAGE_NOT_READY: {
|
|
|
|
break;
|
|
|
|
}
|
2020-03-17 09:33:45 -07:00
|
|
|
case IDataLoaderStatusListener::DATA_LOADER_UNRECOVERABLE: {
|
|
|
|
// Nothing for now. Rely on externalListener to handle this.
|
|
|
|
break;
|
|
|
|
}
|
2019-11-29 14:23:45 -08:00
|
|
|
default: {
|
|
|
|
LOG(WARNING) << "Unknown data loader status: " << newStatus
|
|
|
|
<< " for mount: " << mountId;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return binder::Status::ok();
|
|
|
|
}
|
|
|
|
|
2020-04-03 23:00:19 -07:00
|
|
|
void IncrementalService::AppOpsListener::opChanged(int32_t, const String16&) {
|
|
|
|
incrementalService.onAppOpChanged(packageName);
|
2020-04-02 20:03:47 -07:00
|
|
|
}
|
|
|
|
|
2020-04-07 14:26:55 -07:00
|
|
|
binder::Status IncrementalService::IncrementalServiceConnector::setStorageParams(
|
|
|
|
bool enableReadLogs, int32_t* _aidl_return) {
|
|
|
|
*_aidl_return = incrementalService.setStorageParams(storage, enableReadLogs);
|
|
|
|
return binder::Status::ok();
|
|
|
|
}
|
|
|
|
|
2020-04-13 09:53:04 -07:00
|
|
|
FileId IncrementalService::idFromMetadata(std::span<const uint8_t> metadata) {
|
|
|
|
return IncFs_FileIdFromMetadata({(const char*)metadata.data(), metadata.size()});
|
|
|
|
}
|
|
|
|
|
2019-11-29 14:23:45 -08:00
|
|
|
} // namespace android::incremental
|