blob: 21abc4ded0b77a980f82fd49f58d9427610bd88e [file] [log] [blame]
Jeff Sharkeydeb24052015-03-02 21:01:40 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ANDROID_VOLD_UTILS_H
18#define ANDROID_VOLD_UTILS_H
19
Pavel Grafove2e2d302017-08-01 17:15:53 +010020#include "KeyBuffer.h"
21
Jeff Sharkey814e9d32017-09-13 11:49:44 -060022#include <android-base/macros.h>
Nandana Dutta914cc72019-08-29 15:22:42 +010023#include <android-base/unique_fd.h>
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -080024#include <cutils/multiuser.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070025#include <selinux/selinux.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070026#include <utils/Errors.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080027
Paul Crowley298fa322018-10-30 15:59:24 -070028#include <chrono>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080029#include <string>
Paul Crowley14c8c072018-09-18 13:30:21 -070030#include <vector>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080031
Daichi Hirono10d34882016-01-29 14:33:51 +090032struct DIR;
33
Jeff Sharkeydeb24052015-03-02 21:01:40 -080034namespace android {
35namespace vold {
36
Abhijeet Kaur01fa0e02019-12-13 10:26:32 +000037static const char* kPropFuse = "persist.sys.fuse";
Zim3623a212019-07-19 16:46:53 +010038
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070039/* SELinux contexts used depending on the block device type */
40extern security_context_t sBlkidContext;
41extern security_context_t sBlkidUntrustedContext;
42extern security_context_t sFsckContext;
43extern security_context_t sFsckUntrustedContext;
44
Paul Crowley56292ef2017-10-20 08:07:53 -070045// TODO remove this with better solution, b/64143519
46extern bool sSleepOnUnmount;
47
Jeff Sharkeydeb24052015-03-02 21:01:40 -080048status_t CreateDeviceNode(const std::string& path, dev_t dev);
49status_t DestroyDeviceNode(const std::string& path);
50
Martijn Coenen5fe1b162020-02-06 18:57:47 +010051int SetQuotaInherit(const std::string& path);
52int SetQuotaProjectId(const std::string& path, long projectId);
Martijn Coenen13ff6682019-12-24 12:57:16 +010053/*
Martijn Coenen04bb17f2020-02-10 23:48:11 +010054 * Creates and sets up an application-specific path on external
55 * storage with the correct ACL and project ID (if needed).
Martijn Coenenba9868b2020-01-31 15:49:24 +010056 *
Martijn Coenen62a4b272020-01-31 15:23:09 +010057 * ONLY for use with app-specific data directories on external storage!
58 * (eg, /Android/data/com.foo, /Android/obb/com.foo, etc.)
Martijn Coenen13ff6682019-12-24 12:57:16 +010059 */
Martijn Coenen816f4d92020-02-18 15:06:37 +010060int PrepareAppDirFromRoot(const std::string& path, const std::string& root, int appUid,
61 bool fixupExisting);
Martijn Coenen13ff6682019-12-24 12:57:16 +010062
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070063/* fs_prepare_dir wrapper that creates with SELinux context */
64status_t PrepareDir(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
65
Jeff Sharkeydeb24052015-03-02 21:01:40 -080066/* Really unmounts the path, killing active processes along the way */
67status_t ForceUnmount(const std::string& path);
68
Jeff Sharkey89f74fb2015-10-21 12:16:12 -070069/* Kills any processes using given path */
70status_t KillProcessesUsingPath(const std::string& path);
71
Jeff Sharkey36801cc2015-03-13 16:09:20 -070072/* Creates bind mount from source to target */
73status_t BindMount(const std::string& source, const std::string& target);
74
Sudheer Shanka023b5392019-02-06 12:39:19 -080075/** Creates a symbolic link to target */
76status_t Symlink(const std::string& target, const std::string& linkpath);
77
78/** Calls unlink(2) at linkpath */
79status_t Unlink(const std::string& linkpath);
80
Sudheer Shankaf9b38a52019-02-14 19:09:51 +000081/** Creates the given directory if it is not already available */
82status_t CreateDir(const std::string& dir, mode_t mode);
83
Jeff Sharkey3472e522017-10-06 18:02:53 -060084bool FindValue(const std::string& raw, const std::string& key, std::string* value);
85
Jeff Sharkey9c484982015-03-31 10:35:33 -070086/* Reads filesystem metadata from device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070087status_t ReadMetadata(const std::string& path, std::string* fsType, std::string* fsUuid,
88 std::string* fsLabel);
Jeff Sharkey9c484982015-03-31 10:35:33 -070089
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070090/* Reads filesystem metadata from untrusted device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070091status_t ReadMetadataUntrusted(const std::string& path, std::string* fsType, std::string* fsUuid,
92 std::string* fsLabel);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070093
Jeff Sharkeyce6a9132015-04-08 21:07:21 -070094/* Returns either WEXITSTATUS() status, or a negative errno */
Paul Crowleyde2d6202018-11-30 11:43:47 -080095status_t ForkExecvp(const std::vector<std::string>& args, std::vector<std::string>* output = nullptr,
96 security_context_t context = nullptr);
Jeff Sharkey9c484982015-03-31 10:35:33 -070097
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -070098pid_t ForkExecvpAsync(const std::vector<std::string>& args);
99
Oleksiy Avramchenko625dc782018-05-23 10:50:46 +0200100/* Gets block device size in bytes */
101status_t GetBlockDevSize(int fd, uint64_t* size);
102status_t GetBlockDevSize(const std::string& path, uint64_t* size);
103/* Gets block device size in 512 byte sectors */
104status_t GetBlockDev512Sectors(const std::string& path, uint64_t* nr_sec);
105
Jeff Sharkey9c484982015-03-31 10:35:33 -0700106status_t ReadRandomBytes(size_t bytes, std::string& out);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100107status_t ReadRandomBytes(size_t bytes, char* buffer);
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600108status_t GenerateRandomUuid(std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700109
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700110/* Converts hex string to raw bytes, ignoring [ :-] */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700111status_t HexToStr(const std::string& hex, std::string& str);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700112/* Converts raw bytes to hex string */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700113status_t StrToHex(const std::string& str, std::string& hex);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100114/* Converts raw key bytes to hex string */
115status_t StrToHex(const KeyBuffer& str, KeyBuffer& hex);
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700116/* Normalize given hex string into consistent format */
117status_t NormalizeHex(const std::string& in, std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700118
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700119uint64_t GetFreeBytes(const std::string& path);
120uint64_t GetTreeBytes(const std::string& path);
121
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700122bool IsFilesystemSupported(const std::string& fsType);
123
124/* Wipes contents of block device at given path */
125status_t WipeBlockDevice(const std::string& path);
126
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700127std::string BuildKeyPath(const std::string& partGuid);
128
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600129std::string BuildDataSystemLegacyPath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800130std::string BuildDataSystemCePath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700131std::string BuildDataSystemDePath(userid_t userid);
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600132std::string BuildDataMiscLegacyPath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700133std::string BuildDataMiscCePath(userid_t userid);
134std::string BuildDataMiscDePath(userid_t userid);
Calin Juravle79f55a42016-02-17 20:14:46 +0000135std::string BuildDataProfilesDePath(userid_t userid);
Andreas Huber71cd43f2018-01-22 11:25:29 -0800136std::string BuildDataVendorCePath(userid_t userid);
137std::string BuildDataVendorDePath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800138
Paul Crowley3b71fc52017-10-09 10:55:21 -0700139std::string BuildDataPath(const std::string& volumeUuid);
140std::string BuildDataMediaCePath(const std::string& volumeUuid, userid_t userid);
141std::string BuildDataUserCePath(const std::string& volumeUuid, userid_t userid);
142std::string BuildDataUserDePath(const std::string& volumeUuid, userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800143
Jeff Sharkey66270a22015-06-24 11:49:24 -0700144dev_t GetDevice(const std::string& path);
145
Jeff Sharkeyd24aeda2016-07-15 16:20:22 -0600146status_t RestoreconRecursive(const std::string& path);
147
Jeff Sharkey3472e522017-10-06 18:02:53 -0600148// TODO: promote to android::base
149bool Readlinkat(int dirfd, const std::string& path, std::string* result);
Daichi Hirono10d34882016-01-29 14:33:51 +0900150
Yu Ning942d4e82016-01-08 17:36:47 +0800151/* Checks if Android is running in QEMU */
152bool IsRunningInEmulator();
153
Sudheer Shanka295fb242019-01-16 23:04:07 -0800154status_t UnmountTreeWithPrefix(const std::string& prefix);
155status_t UnmountTree(const std::string& mountPoint);
Sudheer Shanka89ddf992018-09-25 14:22:07 -0700156
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700157status_t DeleteDirContentsAndDir(const std::string& pathname);
Sudheer Shanka30df1c62019-02-22 17:03:02 -0800158status_t DeleteDirContents(const std::string& pathname);
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700159
Paul Crowley298fa322018-10-30 15:59:24 -0700160status_t WaitForFile(const char* filename, std::chrono::nanoseconds timeout);
161
Paul Crowley621d9b92018-12-07 15:36:09 -0800162bool FsyncDirectory(const std::string& dirname);
163
Tommy Chiu0bd2d112019-03-26 17:18:09 +0800164bool writeStringToFile(const std::string& payload, const std::string& filename);
Zim3623a212019-07-19 16:46:53 +0100165
Zima438b242019-09-25 14:37:38 +0100166status_t MountUserFuse(userid_t user_id, const std::string& absolute_lower_path,
167 const std::string& relative_upper_path, android::base::unique_fd* fuse_fd);
168
Martijn Coenen6f5802e2019-11-28 11:53:53 +0100169status_t UnmountUserFuse(userid_t userId, const std::string& absolute_lower_path,
170 const std::string& relative_upper_path);
Zim3623a212019-07-19 16:46:53 +0100171
Martijn Coenen62a4b272020-01-31 15:23:09 +0100172status_t PrepareAndroidDirs(const std::string& volumeRoot);
Jeff Sharkeydeb24052015-03-02 21:01:40 -0800173} // namespace vold
174} // namespace android
175
176#endif