blob: 5351450a1c62d9fdc0dbf2986ddff8ca22a9e302 [file] [log] [blame]
Jeff Sharkeydeb24052015-03-02 21:01:40 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ANDROID_VOLD_UTILS_H
18#define ANDROID_VOLD_UTILS_H
19
Pavel Grafove2e2d302017-08-01 17:15:53 +010020#include "KeyBuffer.h"
21
Jeff Sharkey814e9d32017-09-13 11:49:44 -060022#include <android-base/macros.h>
Nandana Dutta914cc72019-08-29 15:22:42 +010023#include <android-base/unique_fd.h>
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -080024#include <cutils/multiuser.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070025#include <selinux/selinux.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070026#include <utils/Errors.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080027
Paul Crowley298fa322018-10-30 15:59:24 -070028#include <chrono>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080029#include <string>
Paul Crowley14c8c072018-09-18 13:30:21 -070030#include <vector>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080031
Daichi Hirono10d34882016-01-29 14:33:51 +090032struct DIR;
33
Jeff Sharkeydeb24052015-03-02 21:01:40 -080034namespace android {
35namespace vold {
36
Abhijeet Kaur01fa0e02019-12-13 10:26:32 +000037static const char* kPropFuse = "persist.sys.fuse";
Ricky Wai07e64a42020-02-11 14:31:24 +000038static const char* kVoldAppDataIsolationEnabled = "persist.sys.vold_app_data_isolation_enabled";
Daniel Rosenbergf36bddd2020-05-11 22:58:42 -070039static const char* kExternalStorageSdcardfs = "external_storage.sdcardfs.enabled";
Zim3623a212019-07-19 16:46:53 +010040
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070041/* SELinux contexts used depending on the block device type */
42extern security_context_t sBlkidContext;
43extern security_context_t sBlkidUntrustedContext;
44extern security_context_t sFsckContext;
45extern security_context_t sFsckUntrustedContext;
46
Paul Crowley56292ef2017-10-20 08:07:53 -070047// TODO remove this with better solution, b/64143519
48extern bool sSleepOnUnmount;
49
Nikita Ioffedcee5c12020-06-12 12:59:45 +010050std::string GetFuseMountPathForUser(userid_t user_id, const std::string& relative_upper_path);
51
Jeff Sharkeydeb24052015-03-02 21:01:40 -080052status_t CreateDeviceNode(const std::string& path, dev_t dev);
53status_t DestroyDeviceNode(const std::string& path);
54
Martijn Coenen23c04452020-04-29 07:49:41 +020055status_t AbortFuseConnections();
56
Martijn Coenen5fe1b162020-02-06 18:57:47 +010057int SetQuotaInherit(const std::string& path);
58int SetQuotaProjectId(const std::string& path, long projectId);
Martijn Coenen13ff6682019-12-24 12:57:16 +010059/*
Martijn Coenen04bb17f2020-02-10 23:48:11 +010060 * Creates and sets up an application-specific path on external
61 * storage with the correct ACL and project ID (if needed).
Martijn Coenenba9868b2020-01-31 15:49:24 +010062 *
Martijn Coenen62a4b272020-01-31 15:23:09 +010063 * ONLY for use with app-specific data directories on external storage!
64 * (eg, /Android/data/com.foo, /Android/obb/com.foo, etc.)
Martijn Coenen13ff6682019-12-24 12:57:16 +010065 */
Martijn Coenen816f4d92020-02-18 15:06:37 +010066int PrepareAppDirFromRoot(const std::string& path, const std::string& root, int appUid,
67 bool fixupExisting);
Martijn Coenen13ff6682019-12-24 12:57:16 +010068
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070069/* fs_prepare_dir wrapper that creates with SELinux context */
Daniel Rosenbergcc874802020-08-12 18:31:43 -070070status_t PrepareDir(const std::string& path, mode_t mode, uid_t uid, gid_t gid,
71 unsigned int attrs = 0);
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070072
Jeff Sharkeydeb24052015-03-02 21:01:40 -080073/* Really unmounts the path, killing active processes along the way */
74status_t ForceUnmount(const std::string& path);
75
Jeff Sharkey89f74fb2015-10-21 12:16:12 -070076/* Kills any processes using given path */
77status_t KillProcessesUsingPath(const std::string& path);
78
Ricky Wai07e64a42020-02-11 14:31:24 +000079/* Kills any processes using given mount prifix */
80status_t KillProcessesWithMountPrefix(const std::string& path);
81
Jeff Sharkey36801cc2015-03-13 16:09:20 -070082/* Creates bind mount from source to target */
83status_t BindMount(const std::string& source, const std::string& target);
84
Sudheer Shanka023b5392019-02-06 12:39:19 -080085/** Creates a symbolic link to target */
86status_t Symlink(const std::string& target, const std::string& linkpath);
87
88/** Calls unlink(2) at linkpath */
89status_t Unlink(const std::string& linkpath);
90
Sudheer Shankaf9b38a52019-02-14 19:09:51 +000091/** Creates the given directory if it is not already available */
92status_t CreateDir(const std::string& dir, mode_t mode);
93
Jeff Sharkey3472e522017-10-06 18:02:53 -060094bool FindValue(const std::string& raw, const std::string& key, std::string* value);
95
Jeff Sharkey9c484982015-03-31 10:35:33 -070096/* Reads filesystem metadata from device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070097status_t ReadMetadata(const std::string& path, std::string* fsType, std::string* fsUuid,
98 std::string* fsLabel);
Jeff Sharkey9c484982015-03-31 10:35:33 -070099
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700100/* Reads filesystem metadata from untrusted device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -0700101status_t ReadMetadataUntrusted(const std::string& path, std::string* fsType, std::string* fsUuid,
102 std::string* fsLabel);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700103
Jeff Sharkeyce6a9132015-04-08 21:07:21 -0700104/* Returns either WEXITSTATUS() status, or a negative errno */
Paul Crowleyde2d6202018-11-30 11:43:47 -0800105status_t ForkExecvp(const std::vector<std::string>& args, std::vector<std::string>* output = nullptr,
106 security_context_t context = nullptr);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700107
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700108pid_t ForkExecvpAsync(const std::vector<std::string>& args);
109
Oleksiy Avramchenko625dc782018-05-23 10:50:46 +0200110/* Gets block device size in bytes */
111status_t GetBlockDevSize(int fd, uint64_t* size);
112status_t GetBlockDevSize(const std::string& path, uint64_t* size);
113/* Gets block device size in 512 byte sectors */
114status_t GetBlockDev512Sectors(const std::string& path, uint64_t* nr_sec);
115
Jeff Sharkey9c484982015-03-31 10:35:33 -0700116status_t ReadRandomBytes(size_t bytes, std::string& out);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100117status_t ReadRandomBytes(size_t bytes, char* buffer);
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600118status_t GenerateRandomUuid(std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700119
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700120/* Converts hex string to raw bytes, ignoring [ :-] */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700121status_t HexToStr(const std::string& hex, std::string& str);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700122/* Converts raw bytes to hex string */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700123status_t StrToHex(const std::string& str, std::string& hex);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100124/* Converts raw key bytes to hex string */
125status_t StrToHex(const KeyBuffer& str, KeyBuffer& hex);
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700126/* Normalize given hex string into consistent format */
127status_t NormalizeHex(const std::string& in, std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700128
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700129uint64_t GetFreeBytes(const std::string& path);
130uint64_t GetTreeBytes(const std::string& path);
131
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700132bool IsFilesystemSupported(const std::string& fsType);
Daniel Rosenbergf36bddd2020-05-11 22:58:42 -0700133bool IsSdcardfsUsed();
Ricky Wai07e64a42020-02-11 14:31:24 +0000134bool IsFuseDaemon(const pid_t pid);
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700135
136/* Wipes contents of block device at given path */
137status_t WipeBlockDevice(const std::string& path);
138
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700139std::string BuildKeyPath(const std::string& partGuid);
140
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600141std::string BuildDataSystemLegacyPath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800142std::string BuildDataSystemCePath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700143std::string BuildDataSystemDePath(userid_t userid);
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600144std::string BuildDataMiscLegacyPath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700145std::string BuildDataMiscCePath(userid_t userid);
146std::string BuildDataMiscDePath(userid_t userid);
Calin Juravle79f55a42016-02-17 20:14:46 +0000147std::string BuildDataProfilesDePath(userid_t userid);
Andreas Huber71cd43f2018-01-22 11:25:29 -0800148std::string BuildDataVendorCePath(userid_t userid);
149std::string BuildDataVendorDePath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800150
Paul Crowley3b71fc52017-10-09 10:55:21 -0700151std::string BuildDataPath(const std::string& volumeUuid);
152std::string BuildDataMediaCePath(const std::string& volumeUuid, userid_t userid);
153std::string BuildDataUserCePath(const std::string& volumeUuid, userid_t userid);
154std::string BuildDataUserDePath(const std::string& volumeUuid, userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800155
Jeff Sharkey66270a22015-06-24 11:49:24 -0700156dev_t GetDevice(const std::string& path);
157
Ricky Wai07e64a42020-02-11 14:31:24 +0000158status_t EnsureDirExists(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
159
Jeff Sharkeyd24aeda2016-07-15 16:20:22 -0600160status_t RestoreconRecursive(const std::string& path);
161
Jeff Sharkey3472e522017-10-06 18:02:53 -0600162// TODO: promote to android::base
163bool Readlinkat(int dirfd, const std::string& path, std::string* result);
Daichi Hirono10d34882016-01-29 14:33:51 +0900164
Alistair Delvaff1fc9b2020-05-14 16:35:03 -0700165// Handles dynamic major assignment for virtio-block
166bool IsVirtioBlkDevice(unsigned int major);
Yu Ning942d4e82016-01-08 17:36:47 +0800167
Sudheer Shanka295fb242019-01-16 23:04:07 -0800168status_t UnmountTreeWithPrefix(const std::string& prefix);
169status_t UnmountTree(const std::string& mountPoint);
Sudheer Shanka89ddf992018-09-25 14:22:07 -0700170
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700171status_t DeleteDirContentsAndDir(const std::string& pathname);
Sudheer Shanka30df1c62019-02-22 17:03:02 -0800172status_t DeleteDirContents(const std::string& pathname);
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700173
Paul Crowley298fa322018-10-30 15:59:24 -0700174status_t WaitForFile(const char* filename, std::chrono::nanoseconds timeout);
175
Paul Crowley621d9b92018-12-07 15:36:09 -0800176bool FsyncDirectory(const std::string& dirname);
177
Tommy Chiu0bd2d112019-03-26 17:18:09 +0800178bool writeStringToFile(const std::string& payload, const std::string& filename);
Zim3623a212019-07-19 16:46:53 +0100179
Martijn Coenena4850062020-06-29 11:53:34 +0200180void ConfigureMaxDirtyRatioForFuse(const std::string& fuse_mount, unsigned int max_ratio);
181
Nikita Ioffedcee5c12020-06-12 12:59:45 +0100182void ConfigureReadAheadForFuse(const std::string& fuse_mount, size_t read_ahead_kb);
183
Zima438b242019-09-25 14:37:38 +0100184status_t MountUserFuse(userid_t user_id, const std::string& absolute_lower_path,
185 const std::string& relative_upper_path, android::base::unique_fd* fuse_fd);
186
Martijn Coenen6f5802e2019-11-28 11:53:53 +0100187status_t UnmountUserFuse(userid_t userId, const std::string& absolute_lower_path,
188 const std::string& relative_upper_path);
Zim3623a212019-07-19 16:46:53 +0100189
Martijn Coenen62a4b272020-01-31 15:23:09 +0100190status_t PrepareAndroidDirs(const std::string& volumeRoot);
Jeff Sharkeydeb24052015-03-02 21:01:40 -0800191} // namespace vold
192} // namespace android
193
194#endif