From 8a4dea44acd361d2fc795cd1c542429d05f7497a Mon Sep 17 00:00:00 2001 From: yuanruibin Date: Tue, 29 Apr 2025 11:12:26 +0800 Subject: [PATCH 1/4] sync cme lib config --- aosp/vendor/common/products/product_prebuilts.mk | 8 -------- 1 file changed, 8 deletions(-) diff --git a/aosp/vendor/common/products/product_prebuilts.mk b/aosp/vendor/common/products/product_prebuilts.mk index e5c1c0a30..a2d93b214 100644 --- a/aosp/vendor/common/products/product_prebuilts.mk +++ b/aosp/vendor/common/products/product_prebuilts.mk @@ -4,30 +4,23 @@ # PRODUCT_PACKAGES += \ - libVmiStream \ libCPHMediaEngine \ libCPHVideoEngine \ libCPHTurboVideoEngine \ libCPHMediaServer \ libCaptureEngine \ libVmiOperation \ - libCPHIVmiAudio \ - libCPHVmiAudioRecord \ - libvmiservice \ libVmiCJSON \ libVmiMediaCommon \ libEncodeEngine \ libVmiDevice \ audio.primary.default \ - sipcserver \ - libSipc \ libavcodec \ libavformat \ libavutil \ libswresample \ libd310encode \ libRemoteEncoder \ - libVmiShareMem \ libxcoder \ libevent \ libLLVM13 \ @@ -70,5 +63,4 @@ PRODUCT_COPY_FILES += \ vendor/common/android/prebuilts/system/vendor/bin/CloudAppEngine:system/vendor/bin/CloudAppEngine \ vendor/common/android/prebuilts/system/vendor/lib64/libcurl.so:system/vendor/lib64/libcurl.so \ vendor/common/android/prebuilts/system/etc/init/media-engine.rc:system/etc/init/media-engine.rc \ - vendor/common/android/prebuilts/system/vendor/etc/init/sipcserver.rc:system/vendor/etc/init/sipcserver.rc \ vendor/common/android/prebuilts/system/usr/keylayout/Vendor_0001_Product_0001.kl:system/usr/keylayout/Vendor_0001_Product_0001.kl \ -- Gitee From 93a5ae8367eeb26ebc31a2a5c20b57fe4aba8da1 Mon Sep 17 00:00:00 2001 From: liuyijia Date: Wed, 21 May 2025 11:23:48 +0800 Subject: [PATCH 2/4] =?UTF-8?q?=E5=BC=80=E6=BA=90sdcard?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- aosp/system/core/sdcard/Android.bp | 19 + aosp/system/core/sdcard/OWNERS | 1 + aosp/system/core/sdcard/sdcard.cpp | 335 ++ aosp/system/core/sdcard/sdcard_fuse.cpp | 2056 ++++++++ aosp/system/core/sdcard/sdcard_wrapper.h | 4 + aosp/system/vold/.clang-format | 13 + aosp/system/vold/Android.bp | 286 ++ aosp/system/vold/AppFuseUtil.cpp | 167 + aosp/system/vold/AppFuseUtil.h | 36 + aosp/system/vold/Benchmark.cpp | 196 + aosp/system/vold/Benchmark.h | 35 + aosp/system/vold/BenchmarkGen.h | 4473 +++++++++++++++++ aosp/system/vold/CheckEncryption.cpp | 149 + aosp/system/vold/CheckEncryption.h | 31 + aosp/system/vold/Checkpoint.cpp | 748 +++ aosp/system/vold/Checkpoint.h | 54 + aosp/system/vold/CleanSpec.mk | 49 + aosp/system/vold/CryptoType.cpp | 43 + aosp/system/vold/CryptoType.h | 103 + aosp/system/vold/Devmapper.cpp | 102 + aosp/system/vold/Devmapper.h | 31 + aosp/system/vold/EncryptInplace.cpp | 637 +++ aosp/system/vold/EncryptInplace.h | 36 + aosp/system/vold/FileDeviceUtils.cpp | 108 + aosp/system/vold/FileDeviceUtils.h | 35 + aosp/system/vold/FsCrypt.cpp | 991 ++++ aosp/system/vold/FsCrypt.h | 40 + aosp/system/vold/IdleMaint.cpp | 430 ++ aosp/system/vold/IdleMaint.h | 32 + aosp/system/vold/KeyBuffer.cpp | 36 + aosp/system/vold/KeyBuffer.h | 60 + aosp/system/vold/KeyStorage.cpp | 628 +++ aosp/system/vold/KeyStorage.h | 91 + aosp/system/vold/KeyUtil.cpp | 442 ++ aosp/system/vold/KeyUtil.h | 90 + aosp/system/vold/Keymaster.cpp | 384 ++ aosp/system/vold/Keymaster.h | 177 + aosp/system/vold/Loop.cpp | 247 + aosp/system/vold/Loop.h | 37 + aosp/system/vold/MetadataCrypt.cpp | 371 ++ aosp/system/vold/MetadataCrypt.h | 39 + aosp/system/vold/MoveStorage.cpp | 271 + aosp/system/vold/MoveStorage.h | 32 + aosp/system/vold/NetlinkHandler.cpp | 52 + aosp/system/vold/NetlinkHandler.h | 33 + aosp/system/vold/NetlinkManager.cpp | 108 + aosp/system/vold/NetlinkManager.h | 48 + aosp/system/vold/OWNERS | 6 + aosp/system/vold/PREUPLOAD.cfg | 8 + aosp/system/vold/Process.cpp | 180 + aosp/system/vold/Process.h | 29 + aosp/system/vold/ScryptParameters.cpp | 51 + aosp/system/vold/ScryptParameters.h | 28 + aosp/system/vold/TEST_MAPPING | 10 + aosp/system/vold/Utils.cpp | 1688 +++++++ aosp/system/vold/Utils.h | 194 + aosp/system/vold/VoldNativeService.cpp | 991 ++++ aosp/system/vold/VoldNativeService.h | 170 + .../vold/VoldNativeServiceValidation.cpp | 108 + .../system/vold/VoldNativeServiceValidation.h | 37 + aosp/system/vold/VoldUtil.cpp | 19 + aosp/system/vold/VoldUtil.h | 23 + aosp/system/vold/VolumeManager.cpp | 1399 ++++++ aosp/system/vold/VolumeManager.h | 243 + aosp/system/vold/bench/benchgen.py | 356 ++ aosp/system/vold/binder/android/os/IVold.aidl | 197 + .../vold/binder/android/os/IVoldListener.aidl | 37 + .../binder/android/os/IVoldMountCallback.aidl | 23 + .../binder/android/os/IVoldTaskListener.aidl | 25 + aosp/system/vold/cryptfs.cpp | 2899 +++++++++++ aosp/system/vold/cryptfs.h | 79 + aosp/system/vold/fs/Exfat.cpp | 98 + aosp/system/vold/fs/Exfat.h | 39 + aosp/system/vold/fs/Ext4.cpp | 216 + aosp/system/vold/fs/Ext4.h | 40 + aosp/system/vold/fs/F2fs.cpp | 112 + aosp/system/vold/fs/F2fs.h | 38 + aosp/system/vold/fs/Vfat.cpp | 189 + aosp/system/vold/fs/Vfat.h | 39 + aosp/system/vold/fscrypt_uapi.h | 27 + aosp/system/vold/main.cpp | 268 + aosp/system/vold/model/Disk.cpp | 621 +++ aosp/system/vold/model/Disk.h | 131 + aosp/system/vold/model/EmulatedVolume.cpp | 479 ++ aosp/system/vold/model/EmulatedVolume.h | 79 + aosp/system/vold/model/ObbVolume.cpp | 121 + aosp/system/vold/model/ObbVolume.h | 56 + aosp/system/vold/model/PrivateVolume.cpp | 248 + aosp/system/vold/model/PrivateVolume.h | 84 + aosp/system/vold/model/PublicVolume.cpp | 364 ++ aosp/system/vold/model/PublicVolume.h | 87 + aosp/system/vold/model/StubVolume.cpp | 69 + aosp/system/vold/model/StubVolume.h | 58 + aosp/system/vold/model/VolumeBase.cpp | 293 ++ aosp/system/vold/model/VolumeBase.h | 170 + aosp/system/vold/model/VolumeEncryption.cpp | 94 + aosp/system/vold/model/VolumeEncryption.h | 32 + aosp/system/vold/secdiscard.cpp | 193 + aosp/system/vold/sehandle.h | 24 + aosp/system/vold/tests/Android.bp | 15 + aosp/system/vold/tests/Utils_test.cpp | 47 + .../VoldNativeServiceValidation_test.cpp | 51 + aosp/system/vold/tests/cryptfs_test.cpp | 52 + aosp/system/vold/vdc.cpp | 178 + aosp/system/vold/vdc.rc | 12 + aosp/system/vold/vold.rc | 8 + aosp/system/vold/vold_prepare_subdirs.cpp | 241 + aosp/system/vold/wait_for_keymaster.cpp | 33 + aosp/system/vold/wait_for_keymaster.rc | 5 + 109 files changed, 28097 insertions(+) create mode 100644 aosp/system/core/sdcard/Android.bp create mode 100644 aosp/system/core/sdcard/OWNERS create mode 100644 aosp/system/core/sdcard/sdcard.cpp create mode 100644 aosp/system/core/sdcard/sdcard_fuse.cpp create mode 100644 aosp/system/core/sdcard/sdcard_wrapper.h create mode 100644 aosp/system/vold/.clang-format create mode 100644 aosp/system/vold/Android.bp create mode 100644 aosp/system/vold/AppFuseUtil.cpp create mode 100644 aosp/system/vold/AppFuseUtil.h create mode 100644 aosp/system/vold/Benchmark.cpp create mode 100644 aosp/system/vold/Benchmark.h create mode 100644 aosp/system/vold/BenchmarkGen.h create mode 100644 aosp/system/vold/CheckEncryption.cpp create mode 100644 aosp/system/vold/CheckEncryption.h create mode 100644 aosp/system/vold/Checkpoint.cpp create mode 100644 aosp/system/vold/Checkpoint.h create mode 100644 aosp/system/vold/CleanSpec.mk create mode 100644 aosp/system/vold/CryptoType.cpp create mode 100644 aosp/system/vold/CryptoType.h create mode 100644 aosp/system/vold/Devmapper.cpp create mode 100644 aosp/system/vold/Devmapper.h create mode 100644 aosp/system/vold/EncryptInplace.cpp create mode 100644 aosp/system/vold/EncryptInplace.h create mode 100644 aosp/system/vold/FileDeviceUtils.cpp create mode 100644 aosp/system/vold/FileDeviceUtils.h create mode 100644 aosp/system/vold/FsCrypt.cpp create mode 100644 aosp/system/vold/FsCrypt.h create mode 100644 aosp/system/vold/IdleMaint.cpp create mode 100644 aosp/system/vold/IdleMaint.h create mode 100644 aosp/system/vold/KeyBuffer.cpp create mode 100644 aosp/system/vold/KeyBuffer.h create mode 100644 aosp/system/vold/KeyStorage.cpp create mode 100644 aosp/system/vold/KeyStorage.h create mode 100644 aosp/system/vold/KeyUtil.cpp create mode 100644 aosp/system/vold/KeyUtil.h create mode 100644 aosp/system/vold/Keymaster.cpp create mode 100644 aosp/system/vold/Keymaster.h create mode 100644 aosp/system/vold/Loop.cpp create mode 100644 aosp/system/vold/Loop.h create mode 100644 aosp/system/vold/MetadataCrypt.cpp create mode 100644 aosp/system/vold/MetadataCrypt.h create mode 100644 aosp/system/vold/MoveStorage.cpp create mode 100644 aosp/system/vold/MoveStorage.h create mode 100644 aosp/system/vold/NetlinkHandler.cpp create mode 100644 aosp/system/vold/NetlinkHandler.h create mode 100644 aosp/system/vold/NetlinkManager.cpp create mode 100644 aosp/system/vold/NetlinkManager.h create mode 100644 aosp/system/vold/OWNERS create mode 100644 aosp/system/vold/PREUPLOAD.cfg create mode 100644 aosp/system/vold/Process.cpp create mode 100644 aosp/system/vold/Process.h create mode 100644 aosp/system/vold/ScryptParameters.cpp create mode 100644 aosp/system/vold/ScryptParameters.h create mode 100644 aosp/system/vold/TEST_MAPPING create mode 100644 aosp/system/vold/Utils.cpp create mode 100644 aosp/system/vold/Utils.h create mode 100644 aosp/system/vold/VoldNativeService.cpp create mode 100644 aosp/system/vold/VoldNativeService.h create mode 100644 aosp/system/vold/VoldNativeServiceValidation.cpp create mode 100644 aosp/system/vold/VoldNativeServiceValidation.h create mode 100644 aosp/system/vold/VoldUtil.cpp create mode 100644 aosp/system/vold/VoldUtil.h create mode 100644 aosp/system/vold/VolumeManager.cpp create mode 100644 aosp/system/vold/VolumeManager.h create mode 100644 aosp/system/vold/bench/benchgen.py create mode 100644 aosp/system/vold/binder/android/os/IVold.aidl create mode 100644 aosp/system/vold/binder/android/os/IVoldListener.aidl create mode 100644 aosp/system/vold/binder/android/os/IVoldMountCallback.aidl create mode 100644 aosp/system/vold/binder/android/os/IVoldTaskListener.aidl create mode 100644 aosp/system/vold/cryptfs.cpp create mode 100644 aosp/system/vold/cryptfs.h create mode 100644 aosp/system/vold/fs/Exfat.cpp create mode 100644 aosp/system/vold/fs/Exfat.h create mode 100644 aosp/system/vold/fs/Ext4.cpp create mode 100644 aosp/system/vold/fs/Ext4.h create mode 100644 aosp/system/vold/fs/F2fs.cpp create mode 100644 aosp/system/vold/fs/F2fs.h create mode 100644 aosp/system/vold/fs/Vfat.cpp create mode 100644 aosp/system/vold/fs/Vfat.h create mode 100644 aosp/system/vold/fscrypt_uapi.h create mode 100644 aosp/system/vold/main.cpp create mode 100644 aosp/system/vold/model/Disk.cpp create mode 100644 aosp/system/vold/model/Disk.h create mode 100644 aosp/system/vold/model/EmulatedVolume.cpp create mode 100644 aosp/system/vold/model/EmulatedVolume.h create mode 100644 aosp/system/vold/model/ObbVolume.cpp create mode 100644 aosp/system/vold/model/ObbVolume.h create mode 100644 aosp/system/vold/model/PrivateVolume.cpp create mode 100644 aosp/system/vold/model/PrivateVolume.h create mode 100644 aosp/system/vold/model/PublicVolume.cpp create mode 100644 aosp/system/vold/model/PublicVolume.h create mode 100644 aosp/system/vold/model/StubVolume.cpp create mode 100644 aosp/system/vold/model/StubVolume.h create mode 100644 aosp/system/vold/model/VolumeBase.cpp create mode 100644 aosp/system/vold/model/VolumeBase.h create mode 100644 aosp/system/vold/model/VolumeEncryption.cpp create mode 100644 aosp/system/vold/model/VolumeEncryption.h create mode 100644 aosp/system/vold/secdiscard.cpp create mode 100644 aosp/system/vold/sehandle.h create mode 100644 aosp/system/vold/tests/Android.bp create mode 100644 aosp/system/vold/tests/Utils_test.cpp create mode 100644 aosp/system/vold/tests/VoldNativeServiceValidation_test.cpp create mode 100644 aosp/system/vold/tests/cryptfs_test.cpp create mode 100644 aosp/system/vold/vdc.cpp create mode 100644 aosp/system/vold/vdc.rc create mode 100644 aosp/system/vold/vold.rc create mode 100644 aosp/system/vold/vold_prepare_subdirs.cpp create mode 100644 aosp/system/vold/wait_for_keymaster.cpp create mode 100644 aosp/system/vold/wait_for_keymaster.rc diff --git a/aosp/system/core/sdcard/Android.bp b/aosp/system/core/sdcard/Android.bp new file mode 100644 index 000000000..84188b5bc --- /dev/null +++ b/aosp/system/core/sdcard/Android.bp @@ -0,0 +1,19 @@ +cc_binary { + srcs: ["sdcard_fuse.cpp","sdcard.cpp"], + name: "sdcard", + cflags: [ + "-Wall", + "-Wno-unused-parameter", + "-Werror", + "-DSDCARD_FUSE=1", + ], + shared_libs: [ + "libbase", + "libcutils", + "libminijail", + "libpackagelistparser", + ], + sanitize: { + misc_undefined: ["integer"], + }, +} diff --git a/aosp/system/core/sdcard/OWNERS b/aosp/system/core/sdcard/OWNERS new file mode 100644 index 000000000..199a0f885 --- /dev/null +++ b/aosp/system/core/sdcard/OWNERS @@ -0,0 +1 @@ +drosen@google.com diff --git a/aosp/system/core/sdcard/sdcard.cpp b/aosp/system/core/sdcard/sdcard.cpp new file mode 100644 index 000000000..75ee8bafe --- /dev/null +++ b/aosp/system/core/sdcard/sdcard.cpp @@ -0,0 +1,335 @@ +// Copyright (C) 2016 The Android Open Source Project +// +// Licensed under the Apache License, Version 2.0 (the "License"); +// you may not use this file except in compliance with the License. +// You may obtain a copy of the License at +// +// http://www.apache.org/licenses/LICENSE-2.0 +// +// Unless required by applicable law or agreed to in writing, software +// distributed under the License is distributed on an "AS IS" BASIS, +// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +// See the License for the specific language governing permissions and +// limitations under the License. + +#define LOG_TAG "sdcard" + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include +#include +#include +#include + +#include +#include +#include + +#include +#include + +#include +#include "sdcard_wrapper.h" + +#define PROP_SDCARDFS_DEVICE "ro.sys.sdcardfs" +#define PROP_SDCARDFS_USER "persist.sys.sdcardfs" + +static bool supports_esdfs(void) { + std::string filesystems; + if (!android::base::ReadFileToString("/proc/filesystems", &filesystems)) { + PLOG(ERROR) << "Could not read /proc/filesystems"; + return false; + } + for (const auto& fs : android::base::Split(filesystems, "\n")) { + if (fs.find("esdfs") != std::string::npos) return true; + } + return false; +} + +static bool should_use_sdcardfs(void) { + char property[PROPERTY_VALUE_MAX]; + + // Allow user to have a strong opinion about state + property_get(PROP_SDCARDFS_USER, property, ""); + if (!strcmp(property, "force_on")) { + LOG(WARNING) << "User explicitly enabled sdcardfs"; + return true; + } else if (!strcmp(property, "force_off")) { + LOG(WARNING) << "User explicitly disabled sdcardfs"; + return !supports_esdfs(); + } + + // Fall back to device opinion about state + if (property_get_bool(PROP_SDCARDFS_DEVICE, true)) { + LOG(WARNING) << "Device explicitly enabled sdcardfs"; + return true; + } else { + LOG(WARNING) << "Device explicitly disabled sdcardfs"; + return !supports_esdfs(); + } +} + +// NOTE: This is a vestigial program that simply exists to mount the in-kernel +// sdcardfs filesystem. The older FUSE-based design that used to live here has +// been completely removed to avoid confusion. + +/* Supplementary groups to execute with. */ +static const gid_t kGroups[1] = { AID_PACKAGE_INFO }; + +static void drop_privs(uid_t uid, gid_t gid) { + ScopedMinijail j(minijail_new()); + minijail_set_supplementary_gids(j.get(), arraysize(kGroups), kGroups); + minijail_change_gid(j.get(), gid); + minijail_change_uid(j.get(), uid); + /* minijail_enter() will abort if priv-dropping fails. */ + minijail_enter(j.get()); +} + +static bool sdcardfs_setup(const std::string& source_path, const std::string& dest_path, + uid_t fsuid, gid_t fsgid, bool multi_user, userid_t userid, gid_t gid, + mode_t mask, bool derive_gid, bool default_normal, bool unshared_obb, + bool use_esdfs) { + // Add new options at the end of the vector. + std::vector new_opts_list; + if (multi_user) new_opts_list.push_back("multiuser,"); + if (derive_gid) new_opts_list.push_back("derive_gid,"); + if (default_normal) new_opts_list.push_back("default_normal,"); + if (unshared_obb) new_opts_list.push_back("unshared_obb,"); + // Try several attempts, each time with one less option, to gracefully + // handle older kernels that aren't updated yet. + for (int i = 0; i <= new_opts_list.size(); ++i) { + std::string new_opts; + for (int j = 0; j < new_opts_list.size() - i; ++j) { + new_opts += new_opts_list[j]; + } + + auto opts = android::base::StringPrintf("fsuid=%d,fsgid=%d,%smask=%d,userid=%d,gid=%d", + fsuid, fsgid, new_opts.c_str(), mask, userid, gid); + if (mount(source_path.c_str(), dest_path.c_str(), use_esdfs ? "esdfs" : "sdcardfs", + MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_NOATIME, opts.c_str()) == -1) { + PLOG(WARNING) << "Failed to mount sdcardfs with options " << opts; + } else { + return true; + } + } + + return false; +} + +static bool sdcardfs_setup_bind_remount(const std::string& source_path, const std::string& dest_path, + gid_t gid, mode_t mask) { + std::string opts = android::base::StringPrintf("mask=%d,gid=%d", mask, gid); + + if (mount(source_path.c_str(), dest_path.c_str(), nullptr, + MS_BIND, nullptr) != 0) { + PLOG(ERROR) << "failed to bind mount sdcardfs filesystem"; + return false; + } + + if (mount(source_path.c_str(), dest_path.c_str(), "none", + MS_REMOUNT | MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_NOATIME, opts.c_str()) != 0) { + PLOG(ERROR) << "failed to mount sdcardfs filesystem"; + if (umount2(dest_path.c_str(), MNT_DETACH)) + PLOG(WARNING) << "Failed to unmount bind"; + return false; + } + + return true; +} + +static bool sdcardfs_setup_secondary(const std::string& default_path, + const std::string& source_path, const std::string& dest_path, + uid_t fsuid, gid_t fsgid, bool multi_user, userid_t userid, + gid_t gid, mode_t mask, bool derive_gid, bool default_normal, + bool unshared_obb, bool use_esdfs) { + if (use_esdfs) { + return sdcardfs_setup(source_path, dest_path, fsuid, fsgid, multi_user, userid, gid, mask, + derive_gid, default_normal, unshared_obb, use_esdfs); + } else { + return sdcardfs_setup_bind_remount(default_path, dest_path, gid, mask); + } +} + +static void run_sdcardfs(const std::string& source_path, const std::string& label, uid_t uid, + gid_t gid, userid_t userid, bool multi_user, bool full_write, + bool derive_gid, bool default_normal, bool unshared_obb, bool use_esdfs) { + std::string dest_path_default = "/mnt/runtime/default/" + label; + std::string dest_path_read = "/mnt/runtime/read/" + label; + std::string dest_path_write = "/mnt/runtime/write/" + label; + std::string dest_path_full = "/mnt/runtime/full/" + label; + + umask(0); + if (multi_user) { + // Multi-user storage is fully isolated per user, so "other" + // permissions are completely masked off. + if (!sdcardfs_setup(source_path, dest_path_default, uid, gid, multi_user, userid, + AID_SDCARD_RW, 0006, derive_gid, default_normal, unshared_obb, + use_esdfs) || + !sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_read, uid, gid, + multi_user, userid, AID_EVERYBODY, 0027, derive_gid, + default_normal, unshared_obb, use_esdfs) || + !sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_write, uid, gid, + multi_user, userid, AID_EVERYBODY, full_write ? 0007 : 0027, + derive_gid, default_normal, unshared_obb, use_esdfs) || + !sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_full, uid, gid, + multi_user, userid, AID_EVERYBODY, 0007, derive_gid, + default_normal, unshared_obb, use_esdfs)) { + LOG(FATAL) << "failed to sdcardfs_setup"; + } + } else { + // Physical storage is readable by all users on device, but + // the Android directories are masked off to a single user + // deep inside attr_from_stat(). + if (!sdcardfs_setup(source_path, dest_path_default, uid, gid, multi_user, userid, + AID_SDCARD_RW, 0006, derive_gid, default_normal, unshared_obb, + use_esdfs) || + !sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_read, uid, gid, + multi_user, userid, AID_EVERYBODY, full_write ? 0027 : 0022, + derive_gid, default_normal, unshared_obb, use_esdfs) || + !sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_write, uid, gid, + multi_user, userid, AID_EVERYBODY, full_write ? 0007 : 0022, + derive_gid, default_normal, unshared_obb, use_esdfs) || + !sdcardfs_setup_secondary(dest_path_default, source_path, dest_path_full, uid, gid, + multi_user, userid, AID_EVERYBODY, 0007, derive_gid, + default_normal, unshared_obb, use_esdfs)) { + LOG(FATAL) << "failed to sdcardfs_setup"; + } + } + + // Will abort if priv-dropping fails. + drop_privs(uid, gid); + + if (multi_user) { + std::string obb_path = source_path + "/obb"; + fs_prepare_dir(obb_path.c_str(), 0775, uid, gid); + } + + exit(0); +} + +static int usage() { + LOG(ERROR) << "usage: sdcard [OPTIONS]