1*f40fafd4SAndroid Build Coastguard Worker /*
2*f40fafd4SAndroid Build Coastguard Worker * Copyright (C) 2015 The Android Open Source Project
3*f40fafd4SAndroid Build Coastguard Worker *
4*f40fafd4SAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*f40fafd4SAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*f40fafd4SAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*f40fafd4SAndroid Build Coastguard Worker *
8*f40fafd4SAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*f40fafd4SAndroid Build Coastguard Worker *
10*f40fafd4SAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*f40fafd4SAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*f40fafd4SAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*f40fafd4SAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*f40fafd4SAndroid Build Coastguard Worker * limitations under the License.
15*f40fafd4SAndroid Build Coastguard Worker */
16*f40fafd4SAndroid Build Coastguard Worker
17*f40fafd4SAndroid Build Coastguard Worker #include <memory>
18*f40fafd4SAndroid Build Coastguard Worker #include <string>
19*f40fafd4SAndroid Build Coastguard Worker #include <vector>
20*f40fafd4SAndroid Build Coastguard Worker
21*f40fafd4SAndroid Build Coastguard Worker #include <errno.h>
22*f40fafd4SAndroid Build Coastguard Worker #include <fcntl.h>
23*f40fafd4SAndroid Build Coastguard Worker #include <linux/fiemap.h>
24*f40fafd4SAndroid Build Coastguard Worker #include <linux/fs.h>
25*f40fafd4SAndroid Build Coastguard Worker #include <mntent.h>
26*f40fafd4SAndroid Build Coastguard Worker #include <stdio.h>
27*f40fafd4SAndroid Build Coastguard Worker #include <stdlib.h>
28*f40fafd4SAndroid Build Coastguard Worker #include <sys/stat.h>
29*f40fafd4SAndroid Build Coastguard Worker #include <sys/types.h>
30*f40fafd4SAndroid Build Coastguard Worker
31*f40fafd4SAndroid Build Coastguard Worker #include <android-base/logging.h>
32*f40fafd4SAndroid Build Coastguard Worker #include <android-base/unique_fd.h>
33*f40fafd4SAndroid Build Coastguard Worker
34*f40fafd4SAndroid Build Coastguard Worker #include "FileDeviceUtils.h"
35*f40fafd4SAndroid Build Coastguard Worker
36*f40fafd4SAndroid Build Coastguard Worker namespace {
37*f40fafd4SAndroid Build Coastguard Worker
38*f40fafd4SAndroid Build Coastguard Worker struct Options {
39*f40fafd4SAndroid Build Coastguard Worker std::vector<std::string> targets;
40*f40fafd4SAndroid Build Coastguard Worker bool unlink{true};
41*f40fafd4SAndroid Build Coastguard Worker };
42*f40fafd4SAndroid Build Coastguard Worker
43*f40fafd4SAndroid Build Coastguard Worker constexpr uint32_t max_extents = 32;
44*f40fafd4SAndroid Build Coastguard Worker
45*f40fafd4SAndroid Build Coastguard Worker bool read_command_line(int argc, const char* const argv[], Options& options);
46*f40fafd4SAndroid Build Coastguard Worker void usage(const char* progname);
47*f40fafd4SAndroid Build Coastguard Worker bool secdiscard_path(const std::string& path);
48*f40fafd4SAndroid Build Coastguard Worker bool check_fiemap(const struct fiemap& fiemap, const std::string& path);
49*f40fafd4SAndroid Build Coastguard Worker bool overwrite_with_zeros(int fd, off64_t start, off64_t length);
50*f40fafd4SAndroid Build Coastguard Worker
51*f40fafd4SAndroid Build Coastguard Worker } // namespace
52*f40fafd4SAndroid Build Coastguard Worker
53*f40fafd4SAndroid Build Coastguard Worker #ifndef F2FS_IOCTL_MAGIC
54*f40fafd4SAndroid Build Coastguard Worker #define F2FS_IOCTL_MAGIC 0xf5
55*f40fafd4SAndroid Build Coastguard Worker #endif
56*f40fafd4SAndroid Build Coastguard Worker
57*f40fafd4SAndroid Build Coastguard Worker // F2FS-specific ioctl
58*f40fafd4SAndroid Build Coastguard Worker // It requires the below kernel commit merged in v5.9-rc1.
59*f40fafd4SAndroid Build Coastguard Worker // 9af846486d78 ("f2fs: add F2FS_IOC_SEC_TRIM_FILE ioctl")
60*f40fafd4SAndroid Build Coastguard Worker // In android12-5.4,
61*f40fafd4SAndroid Build Coastguard Worker // 7fc27297c44d ("Merge remote-tracking branch 'aosp/upstream-f2fs-stable-linux-5.4.y'
62*f40fafd4SAndroid Build Coastguard Worker // into android12-5.4")
63*f40fafd4SAndroid Build Coastguard Worker #ifndef F2FS_IOC_SEC_TRIM_FILE
64*f40fafd4SAndroid Build Coastguard Worker struct f2fs_sectrim_range {
65*f40fafd4SAndroid Build Coastguard Worker __u64 start;
66*f40fafd4SAndroid Build Coastguard Worker __u64 len;
67*f40fafd4SAndroid Build Coastguard Worker __u64 flags;
68*f40fafd4SAndroid Build Coastguard Worker };
69*f40fafd4SAndroid Build Coastguard Worker #define F2FS_IOC_SEC_TRIM_FILE _IOW(F2FS_IOCTL_MAGIC, 20, struct f2fs_sectrim_range)
70*f40fafd4SAndroid Build Coastguard Worker #define F2FS_TRIM_FILE_DISCARD 0x1
71*f40fafd4SAndroid Build Coastguard Worker #define F2FS_TRIM_FILE_ZEROOUT 0x2
72*f40fafd4SAndroid Build Coastguard Worker #endif
73*f40fafd4SAndroid Build Coastguard Worker
main(int argc,const char * const argv[])74*f40fafd4SAndroid Build Coastguard Worker int main(int argc, const char* const argv[]) {
75*f40fafd4SAndroid Build Coastguard Worker android::base::InitLogging(const_cast<char**>(argv));
76*f40fafd4SAndroid Build Coastguard Worker Options options;
77*f40fafd4SAndroid Build Coastguard Worker if (!read_command_line(argc, argv, options)) {
78*f40fafd4SAndroid Build Coastguard Worker usage(argv[0]);
79*f40fafd4SAndroid Build Coastguard Worker return -1;
80*f40fafd4SAndroid Build Coastguard Worker }
81*f40fafd4SAndroid Build Coastguard Worker
82*f40fafd4SAndroid Build Coastguard Worker for (auto const& target : options.targets) {
83*f40fafd4SAndroid Build Coastguard Worker // F2FS-specific ioctl
84*f40fafd4SAndroid Build Coastguard Worker // It requires the below kernel commit merged in v4.16-rc1.
85*f40fafd4SAndroid Build Coastguard Worker // 1ad71a27124c ("f2fs: add an ioctl to disable GC for specific file")
86*f40fafd4SAndroid Build Coastguard Worker // In android-4.4,
87*f40fafd4SAndroid Build Coastguard Worker // 56ee1e817908 ("f2fs: updates on v4.16-rc1")
88*f40fafd4SAndroid Build Coastguard Worker // In android-4.9,
89*f40fafd4SAndroid Build Coastguard Worker // 2f17e34672a8 ("f2fs: updates on v4.16-rc1")
90*f40fafd4SAndroid Build Coastguard Worker // In android-4.14,
91*f40fafd4SAndroid Build Coastguard Worker // ce767d9a55bc ("f2fs: updates on v4.16-rc1")
92*f40fafd4SAndroid Build Coastguard Worker #ifndef F2FS_IOC_SET_PIN_FILE
93*f40fafd4SAndroid Build Coastguard Worker #define F2FS_IOC_SET_PIN_FILE _IOW(F2FS_IOCTL_MAGIC, 13, __u32)
94*f40fafd4SAndroid Build Coastguard Worker #define F2FS_IOC_GET_PIN_FILE _IOR(F2FS_IOCTL_MAGIC, 14, __u32)
95*f40fafd4SAndroid Build Coastguard Worker #endif
96*f40fafd4SAndroid Build Coastguard Worker android::base::unique_fd fd(
97*f40fafd4SAndroid Build Coastguard Worker TEMP_FAILURE_RETRY(open(target.c_str(), O_WRONLY | O_CLOEXEC, 0)));
98*f40fafd4SAndroid Build Coastguard Worker if (fd == -1) {
99*f40fafd4SAndroid Build Coastguard Worker LOG(ERROR) << "Secure discard open failed for: " << target;
100*f40fafd4SAndroid Build Coastguard Worker continue;
101*f40fafd4SAndroid Build Coastguard Worker }
102*f40fafd4SAndroid Build Coastguard Worker __u32 set = 1;
103*f40fafd4SAndroid Build Coastguard Worker ioctl(fd, F2FS_IOC_SET_PIN_FILE, &set);
104*f40fafd4SAndroid Build Coastguard Worker
105*f40fafd4SAndroid Build Coastguard Worker LOG(DEBUG) << "Securely discarding '" << target << "' unlink=" << options.unlink;
106*f40fafd4SAndroid Build Coastguard Worker struct f2fs_sectrim_range secRange;
107*f40fafd4SAndroid Build Coastguard Worker secRange.start = 0;
108*f40fafd4SAndroid Build Coastguard Worker secRange.len = -1; // until end of file
109*f40fafd4SAndroid Build Coastguard Worker secRange.flags = F2FS_TRIM_FILE_DISCARD | F2FS_TRIM_FILE_ZEROOUT;
110*f40fafd4SAndroid Build Coastguard Worker /*
111*f40fafd4SAndroid Build Coastguard Worker * F2FS_IOC_SEC_TRIM_FILE is only supported by F2FS.
112*f40fafd4SAndroid Build Coastguard Worker * 1. If device supports secure discard, it sends secure discard command on the file.
113*f40fafd4SAndroid Build Coastguard Worker * 2. Otherwise, it sends discard command on the file.
114*f40fafd4SAndroid Build Coastguard Worker * 3. Lastly, it overwrites zero data on it.
115*f40fafd4SAndroid Build Coastguard Worker */
116*f40fafd4SAndroid Build Coastguard Worker int ret = ioctl(fd, F2FS_IOC_SEC_TRIM_FILE, &secRange);
117*f40fafd4SAndroid Build Coastguard Worker if (ret != 0) {
118*f40fafd4SAndroid Build Coastguard Worker if (errno == EOPNOTSUPP) {
119*f40fafd4SAndroid Build Coastguard Worker // If device doesn't support any type of discard, just overwrite zero data.
120*f40fafd4SAndroid Build Coastguard Worker secRange.flags = F2FS_TRIM_FILE_ZEROOUT;
121*f40fafd4SAndroid Build Coastguard Worker ret = ioctl(fd, F2FS_IOC_SEC_TRIM_FILE, &secRange);
122*f40fafd4SAndroid Build Coastguard Worker }
123*f40fafd4SAndroid Build Coastguard Worker if (ret != 0 && errno != ENOTTY) {
124*f40fafd4SAndroid Build Coastguard Worker PLOG(WARNING) << "F2FS_IOC_SEC_TRIM_FILE failed on " << target;
125*f40fafd4SAndroid Build Coastguard Worker }
126*f40fafd4SAndroid Build Coastguard Worker }
127*f40fafd4SAndroid Build Coastguard Worker if (ret != 0) {
128*f40fafd4SAndroid Build Coastguard Worker if (!secdiscard_path(target)) {
129*f40fafd4SAndroid Build Coastguard Worker LOG(ERROR) << "Secure discard failed for: " << target;
130*f40fafd4SAndroid Build Coastguard Worker }
131*f40fafd4SAndroid Build Coastguard Worker }
132*f40fafd4SAndroid Build Coastguard Worker if (options.unlink) {
133*f40fafd4SAndroid Build Coastguard Worker if (unlink(target.c_str()) != 0 && errno != ENOENT) {
134*f40fafd4SAndroid Build Coastguard Worker PLOG(ERROR) << "Unable to unlink: " << target;
135*f40fafd4SAndroid Build Coastguard Worker }
136*f40fafd4SAndroid Build Coastguard Worker }
137*f40fafd4SAndroid Build Coastguard Worker set = 0;
138*f40fafd4SAndroid Build Coastguard Worker ioctl(fd, F2FS_IOC_SET_PIN_FILE, &set);
139*f40fafd4SAndroid Build Coastguard Worker }
140*f40fafd4SAndroid Build Coastguard Worker return 0;
141*f40fafd4SAndroid Build Coastguard Worker }
142*f40fafd4SAndroid Build Coastguard Worker
143*f40fafd4SAndroid Build Coastguard Worker namespace {
144*f40fafd4SAndroid Build Coastguard Worker
read_command_line(int argc,const char * const argv[],Options & options)145*f40fafd4SAndroid Build Coastguard Worker bool read_command_line(int argc, const char* const argv[], Options& options) {
146*f40fafd4SAndroid Build Coastguard Worker for (int i = 1; i < argc; i++) {
147*f40fafd4SAndroid Build Coastguard Worker if (!strcmp("--no-unlink", argv[i])) {
148*f40fafd4SAndroid Build Coastguard Worker options.unlink = false;
149*f40fafd4SAndroid Build Coastguard Worker } else if (!strcmp("--", argv[i])) {
150*f40fafd4SAndroid Build Coastguard Worker for (int j = i + 1; j < argc; j++) {
151*f40fafd4SAndroid Build Coastguard Worker if (argv[j][0] != '/') return false; // Must be absolute path
152*f40fafd4SAndroid Build Coastguard Worker options.targets.emplace_back(argv[j]);
153*f40fafd4SAndroid Build Coastguard Worker }
154*f40fafd4SAndroid Build Coastguard Worker return options.targets.size() > 0;
155*f40fafd4SAndroid Build Coastguard Worker } else {
156*f40fafd4SAndroid Build Coastguard Worker return false; // Unknown option
157*f40fafd4SAndroid Build Coastguard Worker }
158*f40fafd4SAndroid Build Coastguard Worker }
159*f40fafd4SAndroid Build Coastguard Worker return false; // "--" not found
160*f40fafd4SAndroid Build Coastguard Worker }
161*f40fafd4SAndroid Build Coastguard Worker
usage(const char * progname)162*f40fafd4SAndroid Build Coastguard Worker void usage(const char* progname) {
163*f40fafd4SAndroid Build Coastguard Worker fprintf(stderr, "Usage: %s [--no-unlink] -- <absolute path> ...\n", progname);
164*f40fafd4SAndroid Build Coastguard Worker }
165*f40fafd4SAndroid Build Coastguard Worker
166*f40fafd4SAndroid Build Coastguard Worker // BLKSECDISCARD all content in "path", if it's small enough.
secdiscard_path(const std::string & path)167*f40fafd4SAndroid Build Coastguard Worker bool secdiscard_path(const std::string& path) {
168*f40fafd4SAndroid Build Coastguard Worker auto fiemap = android::vold::PathFiemap(path, max_extents);
169*f40fafd4SAndroid Build Coastguard Worker if (!fiemap || !check_fiemap(*fiemap, path)) {
170*f40fafd4SAndroid Build Coastguard Worker return false;
171*f40fafd4SAndroid Build Coastguard Worker }
172*f40fafd4SAndroid Build Coastguard Worker auto block_device = android::vold::BlockDeviceForPath(path);
173*f40fafd4SAndroid Build Coastguard Worker if (block_device.empty()) {
174*f40fafd4SAndroid Build Coastguard Worker return false;
175*f40fafd4SAndroid Build Coastguard Worker }
176*f40fafd4SAndroid Build Coastguard Worker android::base::unique_fd fs_fd(
177*f40fafd4SAndroid Build Coastguard Worker TEMP_FAILURE_RETRY(open(block_device.c_str(), O_RDWR | O_LARGEFILE | O_CLOEXEC, 0)));
178*f40fafd4SAndroid Build Coastguard Worker if (fs_fd == -1) {
179*f40fafd4SAndroid Build Coastguard Worker PLOG(ERROR) << "Failed to open device " << block_device;
180*f40fafd4SAndroid Build Coastguard Worker return false;
181*f40fafd4SAndroid Build Coastguard Worker }
182*f40fafd4SAndroid Build Coastguard Worker for (uint32_t i = 0; i < fiemap->fm_mapped_extents; i++) {
183*f40fafd4SAndroid Build Coastguard Worker uint64_t range[2];
184*f40fafd4SAndroid Build Coastguard Worker range[0] = fiemap->fm_extents[i].fe_physical;
185*f40fafd4SAndroid Build Coastguard Worker range[1] = fiemap->fm_extents[i].fe_length;
186*f40fafd4SAndroid Build Coastguard Worker if (ioctl(fs_fd.get(), BLKSECDISCARD, range) == -1) {
187*f40fafd4SAndroid Build Coastguard Worker // Use zero overwrite as a fallback for BLKSECDISCARD
188*f40fafd4SAndroid Build Coastguard Worker if (!overwrite_with_zeros(fs_fd.get(), range[0], range[1])) return false;
189*f40fafd4SAndroid Build Coastguard Worker }
190*f40fafd4SAndroid Build Coastguard Worker }
191*f40fafd4SAndroid Build Coastguard Worker // Should wait for overwrites completion. Otherwise after unlink(),
192*f40fafd4SAndroid Build Coastguard Worker // filesystem can allocate these blocks and IO can be reordered, resulting
193*f40fafd4SAndroid Build Coastguard Worker // in making zero blocks to filesystem blocks.
194*f40fafd4SAndroid Build Coastguard Worker fsync(fs_fd.get());
195*f40fafd4SAndroid Build Coastguard Worker return true;
196*f40fafd4SAndroid Build Coastguard Worker }
197*f40fafd4SAndroid Build Coastguard Worker
198*f40fafd4SAndroid Build Coastguard Worker // Ensure that the FIEMAP covers the file and is OK to discard
check_fiemap(const struct fiemap & fiemap,const std::string & path)199*f40fafd4SAndroid Build Coastguard Worker bool check_fiemap(const struct fiemap& fiemap, const std::string& path) {
200*f40fafd4SAndroid Build Coastguard Worker auto mapped = fiemap.fm_mapped_extents;
201*f40fafd4SAndroid Build Coastguard Worker if (!(fiemap.fm_extents[mapped - 1].fe_flags & FIEMAP_EXTENT_LAST)) {
202*f40fafd4SAndroid Build Coastguard Worker LOG(ERROR) << "Extent " << mapped - 1 << " was not the last in " << path;
203*f40fafd4SAndroid Build Coastguard Worker return false;
204*f40fafd4SAndroid Build Coastguard Worker }
205*f40fafd4SAndroid Build Coastguard Worker for (uint32_t i = 0; i < mapped; i++) {
206*f40fafd4SAndroid Build Coastguard Worker auto flags = fiemap.fm_extents[i].fe_flags;
207*f40fafd4SAndroid Build Coastguard Worker if (flags & (FIEMAP_EXTENT_UNKNOWN | FIEMAP_EXTENT_DELALLOC | FIEMAP_EXTENT_NOT_ALIGNED)) {
208*f40fafd4SAndroid Build Coastguard Worker LOG(ERROR) << "Extent " << i << " has unexpected flags " << flags << ": " << path;
209*f40fafd4SAndroid Build Coastguard Worker return false;
210*f40fafd4SAndroid Build Coastguard Worker }
211*f40fafd4SAndroid Build Coastguard Worker }
212*f40fafd4SAndroid Build Coastguard Worker return true;
213*f40fafd4SAndroid Build Coastguard Worker }
214*f40fafd4SAndroid Build Coastguard Worker
overwrite_with_zeros(int fd,off64_t start,off64_t length)215*f40fafd4SAndroid Build Coastguard Worker bool overwrite_with_zeros(int fd, off64_t start, off64_t length) {
216*f40fafd4SAndroid Build Coastguard Worker if (lseek64(fd, start, SEEK_SET) != start) {
217*f40fafd4SAndroid Build Coastguard Worker PLOG(ERROR) << "Seek failed for zero overwrite";
218*f40fafd4SAndroid Build Coastguard Worker return false;
219*f40fafd4SAndroid Build Coastguard Worker }
220*f40fafd4SAndroid Build Coastguard Worker char buf[BUFSIZ];
221*f40fafd4SAndroid Build Coastguard Worker memset(buf, 0, sizeof(buf));
222*f40fafd4SAndroid Build Coastguard Worker while (length > 0) {
223*f40fafd4SAndroid Build Coastguard Worker size_t wlen = static_cast<size_t>(std::min(static_cast<off64_t>(sizeof(buf)), length));
224*f40fafd4SAndroid Build Coastguard Worker auto written = write(fd, buf, wlen);
225*f40fafd4SAndroid Build Coastguard Worker if (written < 1) {
226*f40fafd4SAndroid Build Coastguard Worker PLOG(ERROR) << "Write of zeroes failed";
227*f40fafd4SAndroid Build Coastguard Worker return false;
228*f40fafd4SAndroid Build Coastguard Worker }
229*f40fafd4SAndroid Build Coastguard Worker length -= written;
230*f40fafd4SAndroid Build Coastguard Worker }
231*f40fafd4SAndroid Build Coastguard Worker return true;
232*f40fafd4SAndroid Build Coastguard Worker }
233*f40fafd4SAndroid Build Coastguard Worker
234*f40fafd4SAndroid Build Coastguard Worker } // namespace
235