Skip to content

Commit 19661b4

Browse files
author
Steve Kondik
committed
Merge tag 'android-7.1.0_r4' of https://android.googlesource.com/platform/system/extras into 71
Android 7.1.0 release 4
2 parents 1653edc + 614a6c7 commit 19661b4

File tree

19 files changed

+586
-48
lines changed

19 files changed

+586
-48
lines changed

ANRdaemon/ANRdaemon.cpp

+7-16
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,8 @@ static const int min_buffer_size = 16;
6767
static const int max_buffer_size = 2048;
6868
static const char *min_buffer_size_str = "16";
6969
static const char *max_buffer_size_str = "2048";
70+
static const int time_buf_size = 20;
71+
static const int path_buf_size = 60;
7072

7173
typedef struct cpu_stat {
7274
unsigned long utime, ntime, stime, itime;
@@ -337,28 +339,17 @@ static void dump_trace()
337339
}
338340

339341
/*
340-
* Create /sdcard/ANRdaemon/ if it doesn't exist
341-
*/
342-
struct stat st;
343-
if (stat("/sdcard/ANRdaemon", &st) == -1) {
344-
ALOGI("Creating /sdcard/ANRdaemon/");
345-
int err = mkdir("/sdcard/ANRdaemon", 0700);
346-
if (err != 0)
347-
ALOGI("Creating /sdcard/ANRdaemon/ failed with %s", strerror(err));
348-
}
349-
350-
/*
351-
* Create a dump file "dump_of_anrdaemon.<current_time>" under /sdcard/ANRdaemon/
342+
* Create a dump file "dump_of_anrdaemon.<current_time>" under /data/misc/anrd
352343
*/
353344
time_t now = time(0);
354345
struct tm tstruct;
355-
char time_buf[80];
356-
char path_buf[200];
346+
char time_buf[time_buf_size];
347+
char path_buf[path_buf_size];
357348
const char* header = " done\nTRACE:\n";
358349
ssize_t header_len = strlen(header);
359350
tstruct = *localtime(&now);
360-
strftime(time_buf, sizeof(time_buf), "%Y-%m-%d.%X", &tstruct);
361-
sprintf(path_buf, "/sdcard/ANRdaemon/dump_of_anrdaemon.%s", time_buf);
351+
strftime(time_buf, time_buf_size, "%Y-%m-%d.%X", &tstruct);
352+
snprintf(path_buf, path_buf_size, "/data/misc/anrd/dump_of_anrdaemon.%s", time_buf);
362353
int output_fd = creat(path_buf, S_IRWXU);
363354
if (output_fd == -1) {
364355
ALOGE("Failed to create %s. Dump aborted.", path_buf);

ANRdaemon/ANRdaemon_get_trace.sh

+4-2
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
#!/bin/bash
22

3-
TRACE_DIR=/sdcard/ANRdaemon
3+
TRACE_DIR=/data/misc/anrd
4+
TRACE_FILE_PATTEN=dump_of_anrdaemon
45

56
if [ $# -eq 1 ]; then
67
DEVICE=$(echo "-s $1")
@@ -18,7 +19,8 @@ fi
1819
PID=$(echo "$PID" | awk '{ print $2 }')
1920
adb $DEVICE shell "kill -s SIGUSR1 $PID"
2021

21-
TRACE_FILE=$(adb $DEVICE shell "ls $TRACE_DIR | tail -n1" | tr -d '\r')
22+
TRACE_FILE=$(adb $DEVICE shell "ls $TRACE_DIR \
23+
grep $TRACE_FILE_PATTEN | tail -n1" | tr -d '\r')
2224

2325
# Wiat the trace file generation to complete
2426
adb $DEVICE shell "lsof $PID" | grep $TRACE_FILE > /dev/null

cppreopts/Android.mk

+27
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Copyright 2016 The Android Open Source Project
2+
#
3+
# Licensed under the Apache License, Version 2.0 (the "License");
4+
# you may not use this file except in compliance with the License.
5+
# You may obtain a copy of the License at
6+
#
7+
# http://www.apache.org/licenses/LICENSE-2.0
8+
#
9+
# Unless required by applicable law or agreed to in writing, software
10+
# distributed under the License is distributed on an "AS IS" BASIS,
11+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12+
# See the License for the specific language governing permissions and
13+
# limitations under the License.
14+
15+
LOCAL_PATH:= $(call my-dir)
16+
17+
# Create the cppreopts that does the copy
18+
include $(CLEAR_VARS)
19+
20+
LOCAL_MODULE:= cppreopts.sh
21+
LOCAL_MODULE_CLASS := EXECUTABLES
22+
LOCAL_INIT_RC := cppreopts.rc
23+
LOCAL_SRC_FILES := cppreopts.sh
24+
25+
LOCAL_REQUIRED_MODULES := preopt2cachename
26+
27+
include $(BUILD_PREBUILT)

cppreopts/cppreopts.rc

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# Copyright 2016 The Android Open Source Project
2+
#
3+
# Licensed under the Apache License, Version 2.0 (the "License");
4+
# you may not use this file except in compliance with the License.
5+
# You may obtain a copy of the License at
6+
#
7+
# http://www.apache.org/licenses/LICENSE-2.0
8+
#
9+
# Unless required by applicable law or agreed to in writing, software
10+
# distributed under the License is distributed on an "AS IS" BASIS,
11+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12+
# See the License for the specific language governing permissions and
13+
# limitations under the License.
14+
15+
on property:sys.cppreopt=requested && property:ro.boot.slot_suffix=_a
16+
mount ext4 /dev/block/bootdevice/by-name/system_b /postinstall ro nosuid nodev noexec
17+
exec - root -- /system/bin/cppreopts.sh /postinstall
18+
# Optional script to copy additional preloaded content to data directory
19+
exec - system system -- /system/bin/preloads_copy.sh /postinstall
20+
umount /postinstall
21+
setprop sys.cppreopt finished
22+
23+
on property:sys.cppreopt=requested && property:ro.boot.slot_suffix=_b
24+
mount ext4 /dev/block/bootdevice/by-name/system_a /postinstall ro nosuid nodev noexec
25+
exec - root -- /system/bin/cppreopts.sh /postinstall
26+
# Optional script to copy additional preloaded content to data directory
27+
exec - system system -- /system/bin/preloads_copy.sh /postinstall
28+
umount /postinstall
29+
setprop sys.cppreopt finished

cppreopts/cppreopts.sh

+69
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
#!/system/bin/sh
2+
#
3+
# Copyright (C) 2016 The Android Open Source Project
4+
#
5+
# Licensed under the Apache License, Version 2.0 (the "License");
6+
# you may not use this file except in compliance with the License.
7+
# You may obtain a copy of the License at
8+
#
9+
# http://www.apache.org/licenses/LICENSE-2.0
10+
#
11+
# Unless required by applicable law or agreed to in writing, software
12+
# distributed under the License is distributed on an "AS IS" BASIS,
13+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14+
# See the License for the specific language governing permissions and
15+
# limitations under the License.
16+
17+
# create files with 644 (global read) permissions.
18+
umask 022
19+
20+
# Helper function to copy files
21+
function do_copy() {
22+
odex_file=$1
23+
dest_name=$2
24+
# Move to a temporary file so we can do a rename and have the preopted file
25+
# appear atomically in the filesystem.
26+
temp_dest_name=${dest_name}.tmp
27+
if ! cp ${odex_file} ${temp_dest_name} ; then
28+
log -p w -t cppreopts "Unable to copy odex file ${odex_file} to ${temp_dest_name}!"
29+
else
30+
log -p i -t cppreopts "Copied odex file from ${odex_file} to ${temp_dest_name}"
31+
sync
32+
if ! mv ${temp_dest_name} ${dest_name} ; then
33+
log -p w -t cppreopts "Unable to rename temporary odex file from ${temp_dest_name} to ${dest_name}"
34+
else
35+
log -p i -t cppreopts "Renamed temporary odex file from ${temp_dest_name} to ${dest_name}"
36+
fi
37+
fi
38+
}
39+
40+
if [ $# -eq 1 ]; then
41+
# Where the system_b is mounted that contains the preopt'd files
42+
mountpoint=$1
43+
44+
if ! test -f ${mountpoint}/system-other-odex-marker ; then
45+
log -p i -t cppreopts "system_other partition does not appear have been built to contain preopted files."
46+
exit 1
47+
fi
48+
49+
log -p i -t cppreopts "cppreopts from ${mountpoint}"
50+
# For each odex file do the copy task
51+
# NOTE: this implementation will break in any path with spaces to favor
52+
# background copy tasks
53+
for odex_file in $(find ${mountpoint} -type f -name "*.odex"); do
54+
real_odex_name=${odex_file/${mountpoint}/\/system}
55+
dest_name=$(preopt2cachename ${real_odex_name})
56+
if ! test $? -eq 0 ; then
57+
log -p i -t cppreopts "Unable to figure out destination for ${odex_file}"
58+
continue
59+
fi
60+
# Copy files in background to speed things up
61+
do_copy ${odex_file} ${dest_name} &
62+
done
63+
# Wait for jobs to finish
64+
wait
65+
exit 0
66+
else
67+
log -p e -t cppreopts "Usage: cppreopts <preopts-mount-point>"
68+
exit 1
69+
fi

ext4_utils/ext4_crypt.cpp

+28-9
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@
2727
#include <sys/stat.h>
2828
#include <sys/types.h>
2929

30+
#include <android-base/file.h>
3031
#include <android-base/logging.h>
3132
#include <cutils/properties.h>
3233

@@ -48,6 +49,7 @@ struct ext4_encryption_policy {
4849

4950
#define EXT4_ENCRYPTION_MODE_AES_256_XTS 1
5051
#define EXT4_ENCRYPTION_MODE_AES_256_CTS 4
52+
#define EXT4_ENCRYPTION_MODE_PRIVATE 127
5153

5254
// ext4enc:TODO Get value from somewhere sensible
5355
#define EXT4_IOC_SET_ENCRYPTION_POLICY _IOR('f', 19, struct ext4_encryption_policy)
@@ -99,7 +101,8 @@ static bool is_dir_empty(const char *dirname, bool *is_empty)
99101
return true;
100102
}
101103

102-
static bool e4crypt_policy_set(const char *directory, const char *policy, size_t policy_length) {
104+
static bool e4crypt_policy_set(const char *directory, const char *policy,
105+
size_t policy_length, int contents_encryption_mode) {
103106
if (policy_length != EXT4_KEY_DESCRIPTOR_SIZE) {
104107
LOG(ERROR) << "Policy wrong length: " << policy_length;
105108
return false;
@@ -112,7 +115,7 @@ static bool e4crypt_policy_set(const char *directory, const char *policy, size_t
112115

113116
ext4_encryption_policy eep;
114117
eep.version = 0;
115-
eep.contents_encryption_mode = EXT4_ENCRYPTION_MODE_AES_256_XTS;
118+
eep.contents_encryption_mode = contents_encryption_mode;
116119
eep.filenames_encryption_mode = EXT4_ENCRYPTION_MODE_AES_256_CTS;
117120
eep.flags = 0;
118121
memcpy(eep.master_key_descriptor, policy, EXT4_KEY_DESCRIPTOR_SIZE);
@@ -129,7 +132,8 @@ static bool e4crypt_policy_set(const char *directory, const char *policy, size_t
129132
return true;
130133
}
131134

132-
static bool e4crypt_policy_get(const char *directory, char *policy, size_t policy_length) {
135+
static bool e4crypt_policy_get(const char *directory, char *policy,
136+
size_t policy_length, int contents_encryption_mode) {
133137
if (policy_length != EXT4_KEY_DESCRIPTOR_SIZE) {
134138
LOG(ERROR) << "Policy wrong length: " << policy_length;
135139
return false;
@@ -151,7 +155,7 @@ static bool e4crypt_policy_get(const char *directory, char *policy, size_t polic
151155
close(fd);
152156

153157
if ((eep.version != 0)
154-
|| (eep.contents_encryption_mode != EXT4_ENCRYPTION_MODE_AES_256_XTS)
158+
|| (eep.contents_encryption_mode != contents_encryption_mode)
155159
|| (eep.filenames_encryption_mode != EXT4_ENCRYPTION_MODE_AES_256_CTS)
156160
|| (eep.flags != 0)) {
157161
LOG(ERROR) << "Failed to find matching encryption policy for " << directory;
@@ -162,13 +166,15 @@ static bool e4crypt_policy_get(const char *directory, char *policy, size_t polic
162166
return true;
163167
}
164168

165-
static bool e4crypt_policy_check(const char *directory, const char *policy, size_t policy_length) {
169+
static bool e4crypt_policy_check(const char *directory, const char *policy,
170+
size_t policy_length, int contents_encryption_mode) {
166171
if (policy_length != EXT4_KEY_DESCRIPTOR_SIZE) {
167172
LOG(ERROR) << "Policy wrong length: " << policy_length;
168173
return false;
169174
}
170175
char existing_policy[EXT4_KEY_DESCRIPTOR_SIZE];
171-
if (!e4crypt_policy_get(directory, existing_policy, EXT4_KEY_DESCRIPTOR_SIZE)) return false;
176+
if (!e4crypt_policy_get(directory, existing_policy, EXT4_KEY_DESCRIPTOR_SIZE,
177+
contents_encryption_mode)) return false;
172178
char existing_policy_hex[EXT4_KEY_DESCRIPTOR_SIZE_HEX];
173179

174180
policy_to_hex(existing_policy, existing_policy_hex);
@@ -185,13 +191,26 @@ static bool e4crypt_policy_check(const char *directory, const char *policy, size
185191
return true;
186192
}
187193

188-
int e4crypt_policy_ensure(const char *directory, const char *policy, size_t policy_length) {
194+
int e4crypt_policy_ensure(const char *directory, const char *policy,
195+
size_t policy_length, const char* contents_encryption_mode) {
196+
int mode = 0;
197+
if (!strcmp(contents_encryption_mode, "software")) {
198+
mode = EXT4_ENCRYPTION_MODE_AES_256_XTS;
199+
} else if (!strcmp(contents_encryption_mode, "ice")) {
200+
mode = EXT4_ENCRYPTION_MODE_PRIVATE;
201+
} else {
202+
LOG(ERROR) << "Invalid encryption mode";
203+
return -1;
204+
}
205+
189206
bool is_empty;
190207
if (!is_dir_empty(directory, &is_empty)) return -1;
191208
if (is_empty) {
192-
if (!e4crypt_policy_set(directory, policy, policy_length)) return -1;
209+
if (!e4crypt_policy_set(directory, policy, policy_length,
210+
mode)) return -1;
193211
} else {
194-
if (!e4crypt_policy_check(directory, policy, policy_length)) return -1;
212+
if (!e4crypt_policy_check(directory, policy, policy_length,
213+
mode)) return -1;
195214
}
196215
return 0;
197216
}

ext4_utils/ext4_crypt.h

+4-1
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,12 @@ __BEGIN_DECLS
2222

2323
bool e4crypt_is_native();
2424

25-
int e4crypt_policy_ensure(const char *directory, const char* policy, size_t policy_length);
25+
int e4crypt_policy_ensure(const char *directory,
26+
const char* policy, size_t policy_length,
27+
const char* contents_encryption_mode);
2628

2729
static const char* e4crypt_unencrypted_folder = "/unencrypted";
2830
static const char* e4crypt_key_ref = "/unencrypted/ref";
31+
static const char* e4crypt_key_mode = "/unencrypted/mode";
2932

3033
__END_DECLS

ext4_utils/ext4_crypt_init_extensions.cpp

+9-1
Original file line numberDiff line numberDiff line change
@@ -141,8 +141,16 @@ int e4crypt_set_directory_policy(const char* dir)
141141
KLOG_ERROR(TAG, "Unable to read system policy to set on %s\n", dir);
142142
return -1;
143143
}
144+
145+
auto type_filename = std::string("/data") + e4crypt_key_mode;
146+
std::string contents_encryption_mode;
147+
if (!android::base::ReadFileToString(type_filename, &contents_encryption_mode)) {
148+
LOG(ERROR) << "Cannot read mode";
149+
}
150+
144151
KLOG_INFO(TAG, "Setting policy on %s\n", dir);
145-
int result = e4crypt_policy_ensure(dir, policy.c_str(), policy.size());
152+
int result = e4crypt_policy_ensure(dir, policy.c_str(), policy.length(),
153+
contents_encryption_mode.c_str());
146154
if (result) {
147155
KLOG_ERROR(TAG, "Setting %02x%02x%02x%02x policy on %s failed!\n",
148156
policy[0], policy[1], policy[2], policy[3], dir);

libfec/include/fec/io.h

+1-1
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ struct fec_header {
5050
uint32_t fec_size;
5151
uint64_t inp_size;
5252
uint8_t hash[SHA256_DIGEST_LENGTH];
53-
};
53+
} __attribute__ ((packed));
5454

5555
struct fec_status {
5656
int flags;

libpagemap/pm_memusage.c

+6-6
Original file line numberDiff line numberDiff line change
@@ -89,15 +89,15 @@ void pm_memusage_pswap_add_offset(pm_memusage_t *mu, unsigned int offset) {
8989
if (mu->p_swap == NULL)
9090
return;
9191

92-
if (offset > mu->p_swap->array_size) {
92+
if (offset >= mu->p_swap->array_size) {
9393
fprintf(stderr, "SWAP offset %d is out of swap bounds.\n", offset);
9494
return;
95+
}
96+
97+
if (mu->p_swap->offset_array[offset] == USHRT_MAX) {
98+
fprintf(stderr, "SWAP offset %d ref. count if overflowing ushort type.\n", offset);
9599
} else {
96-
if (mu->p_swap->offset_array[offset] == USHRT_MAX) {
97-
fprintf(stderr, "SWAP offset %d ref. count if overflowing ushort type.\n", offset);
98-
} else {
99-
mu->p_swap->offset_array[offset]++;
100-
}
100+
mu->p_swap->offset_array[offset]++;
101101
}
102102

103103
soff = malloc(sizeof(pm_swap_offset_t));

perfprofd/Android.mk

+3-3
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ perfprofd_cppflags := \
1212
#
1313
include $(CLEAR_VARS)
1414
LOCAL_CLANG := true
15-
LOCAL_CPP_EXTENSION := cc
15+
LOCAL_CPP_EXTENSION := .cc
1616
LOCAL_MODULE := libperfprofdcore
1717
LOCAL_MODULE_CLASS := STATIC_LIBRARIES
1818
LOCAL_MODULE_PATH := $(TARGET_OUT_OPTIONAL_EXECUTABLES)
@@ -41,7 +41,7 @@ include $(BUILD_STATIC_LIBRARY)
4141
#
4242
include $(CLEAR_VARS)
4343
LOCAL_CLANG := true
44-
LOCAL_CPP_EXTENSION := cc
44+
LOCAL_CPP_EXTENSION := .cc
4545
LOCAL_CXX_STL := libc++
4646
LOCAL_MODULE := libperfprofdutils
4747
LOCAL_MODULE_PATH := $(TARGET_OUT_OPTIONAL_EXECUTABLES)
@@ -55,7 +55,7 @@ include $(BUILD_STATIC_LIBRARY)
5555
#
5656
include $(CLEAR_VARS)
5757
LOCAL_CLANG := true
58-
LOCAL_CPP_EXTENSION := cc
58+
LOCAL_CPP_EXTENSION := .cc
5959
LOCAL_CXX_STL := libc++
6060
LOCAL_SRC_FILES := perfprofdmain.cc
6161
LOCAL_STATIC_LIBRARIES := libperfprofdcore libperfprofdutils

perfprofd/tests/Android.mk

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ perfprofd_test_cppflags := -Wall -Wno-sign-compare -Wno-unused-parameter -Werror
88
#
99
include $(CLEAR_VARS)
1010
LOCAL_CLANG := true
11-
LOCAL_CPP_EXTENSION := cc
11+
LOCAL_CPP_EXTENSION := .cc
1212
LOCAL_CXX_STL := libc++
1313
LOCAL_C_INCLUDES += system/extras/perfprofd
1414
LOCAL_MODULE := libperfprofdmockutils
@@ -32,7 +32,7 @@ include $(BUILD_PREBUILT)
3232
#
3333
include $(CLEAR_VARS)
3434
LOCAL_CLANG := true
35-
LOCAL_CPP_EXTENSION := cc
35+
LOCAL_CPP_EXTENSION := .cc
3636
LOCAL_CXX_STL := libc++
3737
LOCAL_STATIC_LIBRARIES := libperfprofdcore libperfprofdmockutils libgtest libbase
3838
LOCAL_SHARED_LIBRARIES := libprotobuf-cpp-lite

0 commit comments

Comments
 (0)