blob: 8120db775a76f314c5ef4efcde0da193737048fc [file] [log] [blame]
Jeff Sharkeydeb24052015-03-02 21:01:40 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ANDROID_VOLD_UTILS_H
18#define ANDROID_VOLD_UTILS_H
19
Pavel Grafove2e2d302017-08-01 17:15:53 +010020#include "KeyBuffer.h"
21
Jeff Sharkey814e9d32017-09-13 11:49:44 -060022#include <android-base/macros.h>
Nandana Dutta914cc72019-08-29 15:22:42 +010023#include <android-base/unique_fd.h>
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -080024#include <cutils/multiuser.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070025#include <selinux/selinux.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070026#include <utils/Errors.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080027
Paul Crowley298fa322018-10-30 15:59:24 -070028#include <chrono>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080029#include <string>
Yurii Zubrytskyi090ae072021-10-18 22:33:15 -070030#include <string_view>
Paul Crowley14c8c072018-09-18 13:30:21 -070031#include <vector>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080032
Daichi Hirono10d34882016-01-29 14:33:51 +090033struct DIR;
34
Jeff Sharkeydeb24052015-03-02 21:01:40 -080035namespace android {
36namespace vold {
37
Ricky Wai07e64a42020-02-11 14:31:24 +000038static const char* kVoldAppDataIsolationEnabled = "persist.sys.vold_app_data_isolation_enabled";
Daniel Rosenbergf36bddd2020-05-11 22:58:42 -070039static const char* kExternalStorageSdcardfs = "external_storage.sdcardfs.enabled";
Zim3623a212019-07-19 16:46:53 +010040
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070041/* SELinux contexts used depending on the block device type */
ThiƩbaud Weksteenae8550f2021-09-10 10:51:08 +020042extern char* sBlkidContext;
43extern char* sBlkidUntrustedContext;
44extern char* sFsckContext;
45extern char* sFsckUntrustedContext;
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070046
Paul Crowley56292ef2017-10-20 08:07:53 -070047// TODO remove this with better solution, b/64143519
48extern bool sSleepOnUnmount;
49
Nikita Ioffedcee5c12020-06-12 12:59:45 +010050std::string GetFuseMountPathForUser(userid_t user_id, const std::string& relative_upper_path);
51
Jeff Sharkeydeb24052015-03-02 21:01:40 -080052status_t CreateDeviceNode(const std::string& path, dev_t dev);
53status_t DestroyDeviceNode(const std::string& path);
54
Martijn Coenen5adf92a2021-02-01 07:57:02 +000055status_t SetDefaultAcl(const std::string& path, mode_t mode, uid_t uid, gid_t gid,
56 std::vector<gid_t> additionalGids);
57
Martijn Coenen23c04452020-04-29 07:49:41 +020058status_t AbortFuseConnections();
59
Martijn Coenen5fe1b162020-02-06 18:57:47 +010060int SetQuotaInherit(const std::string& path);
61int SetQuotaProjectId(const std::string& path, long projectId);
Martijn Coenen13ff6682019-12-24 12:57:16 +010062/*
Martijn Coenen04bb17f2020-02-10 23:48:11 +010063 * Creates and sets up an application-specific path on external
64 * storage with the correct ACL and project ID (if needed).
Martijn Coenenba9868b2020-01-31 15:49:24 +010065 *
Martijn Coenen62a4b272020-01-31 15:23:09 +010066 * ONLY for use with app-specific data directories on external storage!
67 * (eg, /Android/data/com.foo, /Android/obb/com.foo, etc.)
Martijn Coenen13ff6682019-12-24 12:57:16 +010068 */
Martijn Coenen816f4d92020-02-18 15:06:37 +010069int PrepareAppDirFromRoot(const std::string& path, const std::string& root, int appUid,
70 bool fixupExisting);
Martijn Coenen13ff6682019-12-24 12:57:16 +010071
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070072/* fs_prepare_dir wrapper that creates with SELinux context */
Daniel Rosenbergcc874802020-08-12 18:31:43 -070073status_t PrepareDir(const std::string& path, mode_t mode, uid_t uid, gid_t gid,
74 unsigned int attrs = 0);
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070075
Jeff Sharkeydeb24052015-03-02 21:01:40 -080076/* Really unmounts the path, killing active processes along the way */
77status_t ForceUnmount(const std::string& path);
78
Jeff Sharkey89f74fb2015-10-21 12:16:12 -070079/* Kills any processes using given path */
80status_t KillProcessesUsingPath(const std::string& path);
81
Ricky Wai23356372021-04-30 09:53:07 +010082/* Kills any processes using given tmpfs mount prifix */
83status_t KillProcessesWithTmpfsMountPrefix(const std::string& path);
Ricky Wai07e64a42020-02-11 14:31:24 +000084
Jeff Sharkey36801cc2015-03-13 16:09:20 -070085/* Creates bind mount from source to target */
86status_t BindMount(const std::string& source, const std::string& target);
87
Sudheer Shanka023b5392019-02-06 12:39:19 -080088/** Creates a symbolic link to target */
89status_t Symlink(const std::string& target, const std::string& linkpath);
90
91/** Calls unlink(2) at linkpath */
92status_t Unlink(const std::string& linkpath);
93
Sudheer Shankaf9b38a52019-02-14 19:09:51 +000094/** Creates the given directory if it is not already available */
95status_t CreateDir(const std::string& dir, mode_t mode);
96
Jeff Sharkey3472e522017-10-06 18:02:53 -060097bool FindValue(const std::string& raw, const std::string& key, std::string* value);
98
Jeff Sharkey9c484982015-03-31 10:35:33 -070099/* Reads filesystem metadata from device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -0700100status_t ReadMetadata(const std::string& path, std::string* fsType, std::string* fsUuid,
101 std::string* fsLabel);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700102
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700103/* Reads filesystem metadata from untrusted device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -0700104status_t ReadMetadataUntrusted(const std::string& path, std::string* fsType, std::string* fsUuid,
105 std::string* fsLabel);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700106
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700107/* Returns either WEXITSTATUS() status, or a negative errno */
ThiƩbaud Weksteenae8550f2021-09-10 10:51:08 +0200108status_t ForkExecvp(const std::vector<std::string>& args,
109 std::vector<std::string>* output = nullptr, char* context = nullptr);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700110
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700111pid_t ForkExecvpAsync(const std::vector<std::string>& args);
112
Oleksiy Avramchenko625dc782018-05-23 10:50:46 +0200113/* Gets block device size in bytes */
114status_t GetBlockDevSize(int fd, uint64_t* size);
115status_t GetBlockDevSize(const std::string& path, uint64_t* size);
116/* Gets block device size in 512 byte sectors */
117status_t GetBlockDev512Sectors(const std::string& path, uint64_t* nr_sec);
118
Jeff Sharkey9c484982015-03-31 10:35:33 -0700119status_t ReadRandomBytes(size_t bytes, std::string& out);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100120status_t ReadRandomBytes(size_t bytes, char* buffer);
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600121status_t GenerateRandomUuid(std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700122
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700123/* Converts hex string to raw bytes, ignoring [ :-] */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700124status_t HexToStr(const std::string& hex, std::string& str);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700125/* Converts raw bytes to hex string */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700126status_t StrToHex(const std::string& str, std::string& hex);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100127/* Converts raw key bytes to hex string */
128status_t StrToHex(const KeyBuffer& str, KeyBuffer& hex);
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700129/* Normalize given hex string into consistent format */
130status_t NormalizeHex(const std::string& in, std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700131
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700132uint64_t GetFreeBytes(const std::string& path);
133uint64_t GetTreeBytes(const std::string& path);
134
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700135bool IsFilesystemSupported(const std::string& fsType);
Daniel Rosenbergf36bddd2020-05-11 22:58:42 -0700136bool IsSdcardfsUsed();
Ricky Wai07e64a42020-02-11 14:31:24 +0000137bool IsFuseDaemon(const pid_t pid);
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700138
139/* Wipes contents of block device at given path */
140status_t WipeBlockDevice(const std::string& path);
141
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700142std::string BuildKeyPath(const std::string& partGuid);
143
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600144std::string BuildDataSystemLegacyPath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800145std::string BuildDataSystemCePath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700146std::string BuildDataSystemDePath(userid_t userid);
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600147std::string BuildDataMiscLegacyPath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700148std::string BuildDataMiscCePath(userid_t userid);
149std::string BuildDataMiscDePath(userid_t userid);
Calin Juravle79f55a42016-02-17 20:14:46 +0000150std::string BuildDataProfilesDePath(userid_t userid);
Andreas Huber71cd43f2018-01-22 11:25:29 -0800151std::string BuildDataVendorCePath(userid_t userid);
152std::string BuildDataVendorDePath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800153
Paul Crowley3b71fc52017-10-09 10:55:21 -0700154std::string BuildDataPath(const std::string& volumeUuid);
155std::string BuildDataMediaCePath(const std::string& volumeUuid, userid_t userid);
156std::string BuildDataUserCePath(const std::string& volumeUuid, userid_t userid);
157std::string BuildDataUserDePath(const std::string& volumeUuid, userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800158
Jeff Sharkey66270a22015-06-24 11:49:24 -0700159dev_t GetDevice(const std::string& path);
160
Eric Biggersf74373b2020-11-05 19:58:26 -0800161bool IsSameFile(const std::string& path1, const std::string& path2);
162
Ricky Wai07e64a42020-02-11 14:31:24 +0000163status_t EnsureDirExists(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
164
Jeff Sharkeyd24aeda2016-07-15 16:20:22 -0600165status_t RestoreconRecursive(const std::string& path);
166
Jeff Sharkey3472e522017-10-06 18:02:53 -0600167// TODO: promote to android::base
168bool Readlinkat(int dirfd, const std::string& path, std::string* result);
Daichi Hirono10d34882016-01-29 14:33:51 +0900169
Alistair Delvaff1fc9b2020-05-14 16:35:03 -0700170// Handles dynamic major assignment for virtio-block
171bool IsVirtioBlkDevice(unsigned int major);
Yu Ning942d4e82016-01-08 17:36:47 +0800172
Sudheer Shanka295fb242019-01-16 23:04:07 -0800173status_t UnmountTreeWithPrefix(const std::string& prefix);
174status_t UnmountTree(const std::string& mountPoint);
Sudheer Shanka89ddf992018-09-25 14:22:07 -0700175
Eric Biggers7bcf4272020-11-02 15:31:56 -0800176bool IsDotOrDotDot(const struct dirent& ent);
177
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700178status_t DeleteDirContentsAndDir(const std::string& pathname);
Sudheer Shanka30df1c62019-02-22 17:03:02 -0800179status_t DeleteDirContents(const std::string& pathname);
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700180
Paul Crowley298fa322018-10-30 15:59:24 -0700181status_t WaitForFile(const char* filename, std::chrono::nanoseconds timeout);
182
Eric Biggersbd138dd2021-02-16 15:59:17 -0800183bool pathExists(const std::string& path);
184
Paul Crowley621d9b92018-12-07 15:36:09 -0800185bool FsyncDirectory(const std::string& dirname);
186
Eric Biggers3345a2a2021-02-16 15:59:17 -0800187bool FsyncParentDirectory(const std::string& path);
188
Eric Biggersfec0c0e2021-02-16 15:59:17 -0800189bool MkdirsSync(const std::string& path, mode_t mode);
190
Tommy Chiu0bd2d112019-03-26 17:18:09 +0800191bool writeStringToFile(const std::string& payload, const std::string& filename);
Zim3623a212019-07-19 16:46:53 +0100192
Martijn Coenena4850062020-06-29 11:53:34 +0200193void ConfigureMaxDirtyRatioForFuse(const std::string& fuse_mount, unsigned int max_ratio);
194
Nikita Ioffedcee5c12020-06-12 12:59:45 +0100195void ConfigureReadAheadForFuse(const std::string& fuse_mount, size_t read_ahead_kb);
196
Zima438b242019-09-25 14:37:38 +0100197status_t MountUserFuse(userid_t user_id, const std::string& absolute_lower_path,
198 const std::string& relative_upper_path, android::base::unique_fd* fuse_fd);
199
Martijn Coenen6f5802e2019-11-28 11:53:53 +0100200status_t UnmountUserFuse(userid_t userId, const std::string& absolute_lower_path,
201 const std::string& relative_upper_path);
Zim3623a212019-07-19 16:46:53 +0100202
Martijn Coenen62a4b272020-01-31 15:23:09 +0100203status_t PrepareAndroidDirs(const std::string& volumeRoot);
Yurii Zubrytskyi090ae072021-10-18 22:33:15 -0700204
205// Open a given directory as an FD, and return that and the corresponding procfs virtual
206// symlink path that can be used in any API that accepts a path string. Path stays valid until
207// the directory FD is closed.
208//
209// This may be useful when an API wants to restrict a path passed from an untrusted process,
210// and do it without any TOCTOU attacks possible (e.g. where an attacker replaces one of
211// the components with a symlink after the check passed). In that case opening a path through
212// this function guarantees that the target directory stays the same, and that it can be
213// referenced inside the current process via the virtual procfs symlink returned here.
214std::pair<android::base::unique_fd, std::string> OpenDirInProcfs(std::string_view path);
215
Jeff Sharkeydeb24052015-03-02 21:01:40 -0800216} // namespace vold
217} // namespace android
218
219#endif