blob: 056a63526c3b9c57846fb6d843906a202d1424a5 [file] [log] [blame]
Jeff Sharkeydeb24052015-03-02 21:01:40 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ANDROID_VOLD_UTILS_H
18#define ANDROID_VOLD_UTILS_H
19
Pavel Grafove2e2d302017-08-01 17:15:53 +010020#include "KeyBuffer.h"
21
Jeff Sharkey814e9d32017-09-13 11:49:44 -060022#include <android-base/macros.h>
Nandana Dutta914cc72019-08-29 15:22:42 +010023#include <android-base/unique_fd.h>
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -080024#include <cutils/multiuser.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070025#include <selinux/selinux.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070026#include <utils/Errors.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080027
Paul Crowley298fa322018-10-30 15:59:24 -070028#include <chrono>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080029#include <string>
Paul Crowley14c8c072018-09-18 13:30:21 -070030#include <vector>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080031
Daichi Hirono10d34882016-01-29 14:33:51 +090032struct DIR;
33
Jeff Sharkeydeb24052015-03-02 21:01:40 -080034namespace android {
35namespace vold {
36
Abhijeet Kaur01fa0e02019-12-13 10:26:32 +000037static const char* kPropFuse = "persist.sys.fuse";
Zim3623a212019-07-19 16:46:53 +010038
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070039/* SELinux contexts used depending on the block device type */
40extern security_context_t sBlkidContext;
41extern security_context_t sBlkidUntrustedContext;
42extern security_context_t sFsckContext;
43extern security_context_t sFsckUntrustedContext;
44
Paul Crowley56292ef2017-10-20 08:07:53 -070045// TODO remove this with better solution, b/64143519
46extern bool sSleepOnUnmount;
47
Jeff Sharkeydeb24052015-03-02 21:01:40 -080048status_t CreateDeviceNode(const std::string& path, dev_t dev);
49status_t DestroyDeviceNode(const std::string& path);
50
Martijn Coenen13ff6682019-12-24 12:57:16 +010051/*
52 * Recursively calls fs_prepare_dir() on all components in 'path', starting at 'root'.
53 * 'path' must start with 'root'
54 */
55int PrepareDirsFromRoot(std::string path, std::string root, mode_t mode, uid_t uid, gid_t gid);
56
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070057/* fs_prepare_dir wrapper that creates with SELinux context */
58status_t PrepareDir(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
59
Jeff Sharkeydeb24052015-03-02 21:01:40 -080060/* Really unmounts the path, killing active processes along the way */
61status_t ForceUnmount(const std::string& path);
62
Jeff Sharkey89f74fb2015-10-21 12:16:12 -070063/* Kills any processes using given path */
64status_t KillProcessesUsingPath(const std::string& path);
65
Jeff Sharkey36801cc2015-03-13 16:09:20 -070066/* Creates bind mount from source to target */
67status_t BindMount(const std::string& source, const std::string& target);
68
Sudheer Shanka023b5392019-02-06 12:39:19 -080069/** Creates a symbolic link to target */
70status_t Symlink(const std::string& target, const std::string& linkpath);
71
72/** Calls unlink(2) at linkpath */
73status_t Unlink(const std::string& linkpath);
74
Sudheer Shankaf9b38a52019-02-14 19:09:51 +000075/** Creates the given directory if it is not already available */
76status_t CreateDir(const std::string& dir, mode_t mode);
77
Jeff Sharkey3472e522017-10-06 18:02:53 -060078bool FindValue(const std::string& raw, const std::string& key, std::string* value);
79
Jeff Sharkey9c484982015-03-31 10:35:33 -070080/* Reads filesystem metadata from device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070081status_t ReadMetadata(const std::string& path, std::string* fsType, std::string* fsUuid,
82 std::string* fsLabel);
Jeff Sharkey9c484982015-03-31 10:35:33 -070083
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070084/* Reads filesystem metadata from untrusted device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070085status_t ReadMetadataUntrusted(const std::string& path, std::string* fsType, std::string* fsUuid,
86 std::string* fsLabel);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070087
Jeff Sharkeyce6a9132015-04-08 21:07:21 -070088/* Returns either WEXITSTATUS() status, or a negative errno */
Paul Crowleyde2d6202018-11-30 11:43:47 -080089status_t ForkExecvp(const std::vector<std::string>& args, std::vector<std::string>* output = nullptr,
90 security_context_t context = nullptr);
Jeff Sharkey9c484982015-03-31 10:35:33 -070091
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -070092pid_t ForkExecvpAsync(const std::vector<std::string>& args);
93
Oleksiy Avramchenko625dc782018-05-23 10:50:46 +020094/* Gets block device size in bytes */
95status_t GetBlockDevSize(int fd, uint64_t* size);
96status_t GetBlockDevSize(const std::string& path, uint64_t* size);
97/* Gets block device size in 512 byte sectors */
98status_t GetBlockDev512Sectors(const std::string& path, uint64_t* nr_sec);
99
Jeff Sharkey9c484982015-03-31 10:35:33 -0700100status_t ReadRandomBytes(size_t bytes, std::string& out);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100101status_t ReadRandomBytes(size_t bytes, char* buffer);
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600102status_t GenerateRandomUuid(std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700103
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700104/* Converts hex string to raw bytes, ignoring [ :-] */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700105status_t HexToStr(const std::string& hex, std::string& str);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700106/* Converts raw bytes to hex string */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700107status_t StrToHex(const std::string& str, std::string& hex);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100108/* Converts raw key bytes to hex string */
109status_t StrToHex(const KeyBuffer& str, KeyBuffer& hex);
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700110/* Normalize given hex string into consistent format */
111status_t NormalizeHex(const std::string& in, std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700112
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700113uint64_t GetFreeBytes(const std::string& path);
114uint64_t GetTreeBytes(const std::string& path);
115
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700116bool IsFilesystemSupported(const std::string& fsType);
117
118/* Wipes contents of block device at given path */
119status_t WipeBlockDevice(const std::string& path);
120
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700121std::string BuildKeyPath(const std::string& partGuid);
122
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600123std::string BuildDataSystemLegacyPath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800124std::string BuildDataSystemCePath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700125std::string BuildDataSystemDePath(userid_t userid);
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600126std::string BuildDataMiscLegacyPath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700127std::string BuildDataMiscCePath(userid_t userid);
128std::string BuildDataMiscDePath(userid_t userid);
Calin Juravle79f55a42016-02-17 20:14:46 +0000129std::string BuildDataProfilesDePath(userid_t userid);
Andreas Huber71cd43f2018-01-22 11:25:29 -0800130std::string BuildDataVendorCePath(userid_t userid);
131std::string BuildDataVendorDePath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800132
Paul Crowley3b71fc52017-10-09 10:55:21 -0700133std::string BuildDataPath(const std::string& volumeUuid);
134std::string BuildDataMediaCePath(const std::string& volumeUuid, userid_t userid);
135std::string BuildDataUserCePath(const std::string& volumeUuid, userid_t userid);
136std::string BuildDataUserDePath(const std::string& volumeUuid, userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800137
Jeff Sharkey66270a22015-06-24 11:49:24 -0700138dev_t GetDevice(const std::string& path);
139
Jeff Sharkeyd24aeda2016-07-15 16:20:22 -0600140status_t RestoreconRecursive(const std::string& path);
141
Jeff Sharkey3472e522017-10-06 18:02:53 -0600142// TODO: promote to android::base
143bool Readlinkat(int dirfd, const std::string& path, std::string* result);
Daichi Hirono10d34882016-01-29 14:33:51 +0900144
Yu Ning942d4e82016-01-08 17:36:47 +0800145/* Checks if Android is running in QEMU */
146bool IsRunningInEmulator();
147
Sudheer Shanka295fb242019-01-16 23:04:07 -0800148status_t UnmountTreeWithPrefix(const std::string& prefix);
149status_t UnmountTree(const std::string& mountPoint);
Sudheer Shanka89ddf992018-09-25 14:22:07 -0700150
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700151status_t DeleteDirContentsAndDir(const std::string& pathname);
Sudheer Shanka30df1c62019-02-22 17:03:02 -0800152status_t DeleteDirContents(const std::string& pathname);
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700153
Paul Crowley298fa322018-10-30 15:59:24 -0700154status_t WaitForFile(const char* filename, std::chrono::nanoseconds timeout);
155
Paul Crowley621d9b92018-12-07 15:36:09 -0800156bool FsyncDirectory(const std::string& dirname);
157
Tommy Chiu0bd2d112019-03-26 17:18:09 +0800158bool writeStringToFile(const std::string& payload, const std::string& filename);
Zim3623a212019-07-19 16:46:53 +0100159
Zima438b242019-09-25 14:37:38 +0100160status_t MountUserFuse(userid_t user_id, const std::string& absolute_lower_path,
161 const std::string& relative_upper_path, android::base::unique_fd* fuse_fd);
162
Martijn Coenen6f5802e2019-11-28 11:53:53 +0100163status_t UnmountUserFuse(userid_t userId, const std::string& absolute_lower_path,
164 const std::string& relative_upper_path);
Zim3623a212019-07-19 16:46:53 +0100165
Jeff Sharkeydeb24052015-03-02 21:01:40 -0800166} // namespace vold
167} // namespace android
168
169#endif