/* * Copyright (C) 2017 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "CheckEncryption.h" #include "FileDeviceUtils.h" #include "Utils.h" #include "VolumeManager.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include using android::base::unique_fd; using android::base::ReadFileToString; using android::base::WriteStringToFile; namespace android { namespace vold { constexpr uint32_t max_extents = 32; constexpr size_t bytecount = 8; constexpr int repeats = 256; bool check_file(const std::string& needle) { LOG(DEBUG) << "checkEncryption check_file: " << needle; auto haystack = android::vold::BlockDeviceForPath(needle); if (haystack.empty()) { LOG(ERROR) << "Failed to find device for path: " << needle; return false; } std::string randombytes; if (ReadRandomBytes(bytecount, randombytes) != 0) { LOG(ERROR) << "Failed to read random bytes"; return false; } std::string randomhex; StrToHex(randombytes, randomhex); std::ostringstream os; for (int i = 0; i < repeats; i++) os << randomhex; auto towrite = os.str(); if (access(needle.c_str(), F_OK) == 0) { if (unlink(needle.c_str()) != 0) { PLOG(ERROR) << "Failed to unlink " << needle; return false; } } LOG(DEBUG) << "Writing to " << needle; if (!WriteStringToFile(towrite, needle)) { PLOG(ERROR) << "Failed to write " << needle; return false; } sync(); unique_fd haystack_fd(open(haystack.c_str(), O_RDONLY | O_CLOEXEC)); if (haystack_fd.get() == -1) { PLOG(ERROR) << "Failed to open " << haystack; return false; } auto fiemap = PathFiemap(needle, max_extents); std::string area; for (uint32_t i = 0; i < fiemap->fm_mapped_extents; i++) { auto xt = &(fiemap->fm_extents[i]); LOG(DEBUG) << "Extent " << i << " at " << xt->fe_physical << " length " << xt->fe_length; if (lseek64(haystack_fd.get(), xt->fe_physical, SEEK_SET) == -1) { PLOG(ERROR) << "Failed lseek"; return false; } auto toread = xt->fe_length; while (toread > 0) { char buf[BUFSIZ]; size_t wlen = static_cast(std::min(static_cast(sizeof(buf)), toread)); auto l = read(haystack_fd.get(), buf, wlen); if (l < 1) { PLOG(ERROR) << "Failed read"; if (errno != EINTR) { return false; } } area.append(buf, l); toread -= l; } } LOG(DEBUG) << "Searching " << area.size() << " bytes of " << needle; LOG(DEBUG) << "First position of blob: " << area.find(randomhex); return true; } int CheckEncryption(const std::string& path) { auto deNeedle(path); deNeedle += "/misc"; if (android::vold::PrepareDir(deNeedle, 01771, AID_SYSTEM, AID_MISC)) { return -1; } deNeedle += "/vold"; if (android::vold::PrepareDir(deNeedle, 0700, AID_ROOT, AID_ROOT)) { return -1; } deNeedle += "/checkEncryption"; auto neNeedle(path); neNeedle += "/unencrypted/checkEncryption"; check_file(deNeedle); check_file(neNeedle); return 0; } } // namespace vold } // namespace android