blob: eac3cf45fc6897b26fd23862584489692d8cd090 [file] [log] [blame]
Jeff Sharkeydeb24052015-03-02 21:01:40 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ANDROID_VOLD_UTILS_H
18#define ANDROID_VOLD_UTILS_H
19
Pavel Grafove2e2d302017-08-01 17:15:53 +010020#include "KeyBuffer.h"
21
Jeff Sharkey814e9d32017-09-13 11:49:44 -060022#include <android-base/macros.h>
Nandana Dutta914cc72019-08-29 15:22:42 +010023#include <android-base/unique_fd.h>
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -080024#include <cutils/multiuser.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070025#include <selinux/selinux.h>
Paul Crowley14c8c072018-09-18 13:30:21 -070026#include <utils/Errors.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080027
Paul Crowley298fa322018-10-30 15:59:24 -070028#include <chrono>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080029#include <string>
Paul Crowley14c8c072018-09-18 13:30:21 -070030#include <vector>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080031
Daichi Hirono10d34882016-01-29 14:33:51 +090032struct DIR;
33
Jeff Sharkeydeb24052015-03-02 21:01:40 -080034namespace android {
35namespace vold {
36
Abhijeet Kaur01fa0e02019-12-13 10:26:32 +000037static const char* kPropFuse = "persist.sys.fuse";
Ricky Wai07e64a42020-02-11 14:31:24 +000038static const char* kVoldAppDataIsolationEnabled = "persist.sys.vold_app_data_isolation_enabled";
Daniel Rosenbergf36bddd2020-05-11 22:58:42 -070039static const char* kExternalStorageSdcardfs = "external_storage.sdcardfs.enabled";
Zim3623a212019-07-19 16:46:53 +010040
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070041/* SELinux contexts used depending on the block device type */
42extern security_context_t sBlkidContext;
43extern security_context_t sBlkidUntrustedContext;
44extern security_context_t sFsckContext;
45extern security_context_t sFsckUntrustedContext;
46
Paul Crowley56292ef2017-10-20 08:07:53 -070047// TODO remove this with better solution, b/64143519
48extern bool sSleepOnUnmount;
49
Jeff Sharkeydeb24052015-03-02 21:01:40 -080050status_t CreateDeviceNode(const std::string& path, dev_t dev);
51status_t DestroyDeviceNode(const std::string& path);
52
Martijn Coenen5fe1b162020-02-06 18:57:47 +010053int SetQuotaInherit(const std::string& path);
54int SetQuotaProjectId(const std::string& path, long projectId);
Martijn Coenen13ff6682019-12-24 12:57:16 +010055/*
Martijn Coenen04bb17f2020-02-10 23:48:11 +010056 * Creates and sets up an application-specific path on external
57 * storage with the correct ACL and project ID (if needed).
Martijn Coenenba9868b2020-01-31 15:49:24 +010058 *
Martijn Coenen62a4b272020-01-31 15:23:09 +010059 * ONLY for use with app-specific data directories on external storage!
60 * (eg, /Android/data/com.foo, /Android/obb/com.foo, etc.)
Martijn Coenen13ff6682019-12-24 12:57:16 +010061 */
Martijn Coenen816f4d92020-02-18 15:06:37 +010062int PrepareAppDirFromRoot(const std::string& path, const std::string& root, int appUid,
63 bool fixupExisting);
Martijn Coenen13ff6682019-12-24 12:57:16 +010064
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070065/* fs_prepare_dir wrapper that creates with SELinux context */
66status_t PrepareDir(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
67
Jeff Sharkeydeb24052015-03-02 21:01:40 -080068/* Really unmounts the path, killing active processes along the way */
69status_t ForceUnmount(const std::string& path);
70
Jeff Sharkey89f74fb2015-10-21 12:16:12 -070071/* Kills any processes using given path */
72status_t KillProcessesUsingPath(const std::string& path);
73
Ricky Wai07e64a42020-02-11 14:31:24 +000074/* Kills any processes using given mount prifix */
75status_t KillProcessesWithMountPrefix(const std::string& path);
76
Jeff Sharkey36801cc2015-03-13 16:09:20 -070077/* Creates bind mount from source to target */
78status_t BindMount(const std::string& source, const std::string& target);
79
Sudheer Shanka023b5392019-02-06 12:39:19 -080080/** Creates a symbolic link to target */
81status_t Symlink(const std::string& target, const std::string& linkpath);
82
83/** Calls unlink(2) at linkpath */
84status_t Unlink(const std::string& linkpath);
85
Sudheer Shankaf9b38a52019-02-14 19:09:51 +000086/** Creates the given directory if it is not already available */
87status_t CreateDir(const std::string& dir, mode_t mode);
88
Jeff Sharkey3472e522017-10-06 18:02:53 -060089bool FindValue(const std::string& raw, const std::string& key, std::string* value);
90
Jeff Sharkey9c484982015-03-31 10:35:33 -070091/* Reads filesystem metadata from device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070092status_t ReadMetadata(const std::string& path, std::string* fsType, std::string* fsUuid,
93 std::string* fsLabel);
Jeff Sharkey9c484982015-03-31 10:35:33 -070094
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070095/* Reads filesystem metadata from untrusted device at path */
Paul Crowley14c8c072018-09-18 13:30:21 -070096status_t ReadMetadataUntrusted(const std::string& path, std::string* fsType, std::string* fsUuid,
97 std::string* fsLabel);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070098
Jeff Sharkeyce6a9132015-04-08 21:07:21 -070099/* Returns either WEXITSTATUS() status, or a negative errno */
Paul Crowleyde2d6202018-11-30 11:43:47 -0800100status_t ForkExecvp(const std::vector<std::string>& args, std::vector<std::string>* output = nullptr,
101 security_context_t context = nullptr);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700102
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700103pid_t ForkExecvpAsync(const std::vector<std::string>& args);
104
Oleksiy Avramchenko625dc782018-05-23 10:50:46 +0200105/* Gets block device size in bytes */
106status_t GetBlockDevSize(int fd, uint64_t* size);
107status_t GetBlockDevSize(const std::string& path, uint64_t* size);
108/* Gets block device size in 512 byte sectors */
109status_t GetBlockDev512Sectors(const std::string& path, uint64_t* nr_sec);
110
Jeff Sharkey9c484982015-03-31 10:35:33 -0700111status_t ReadRandomBytes(size_t bytes, std::string& out);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100112status_t ReadRandomBytes(size_t bytes, char* buffer);
Jeff Sharkey46bb69f2017-06-21 13:52:23 -0600113status_t GenerateRandomUuid(std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700114
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700115/* Converts hex string to raw bytes, ignoring [ :-] */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700116status_t HexToStr(const std::string& hex, std::string& str);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -0700117/* Converts raw bytes to hex string */
Jeff Sharkey9c484982015-03-31 10:35:33 -0700118status_t StrToHex(const std::string& str, std::string& hex);
Pavel Grafove2e2d302017-08-01 17:15:53 +0100119/* Converts raw key bytes to hex string */
120status_t StrToHex(const KeyBuffer& str, KeyBuffer& hex);
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700121/* Normalize given hex string into consistent format */
122status_t NormalizeHex(const std::string& in, std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -0700123
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -0700124uint64_t GetFreeBytes(const std::string& path);
125uint64_t GetTreeBytes(const std::string& path);
126
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700127bool IsFilesystemSupported(const std::string& fsType);
Daniel Rosenbergf36bddd2020-05-11 22:58:42 -0700128bool IsSdcardfsUsed();
Ricky Wai07e64a42020-02-11 14:31:24 +0000129bool IsFuseDaemon(const pid_t pid);
Jeff Sharkeyd0640f62015-05-21 22:35:42 -0700130
131/* Wipes contents of block device at given path */
132status_t WipeBlockDevice(const std::string& path);
133
Jeff Sharkeybc40cc82015-06-18 14:25:08 -0700134std::string BuildKeyPath(const std::string& partGuid);
135
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600136std::string BuildDataSystemLegacyPath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800137std::string BuildDataSystemCePath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700138std::string BuildDataSystemDePath(userid_t userid);
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600139std::string BuildDataMiscLegacyPath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700140std::string BuildDataMiscCePath(userid_t userid);
141std::string BuildDataMiscDePath(userid_t userid);
Calin Juravle79f55a42016-02-17 20:14:46 +0000142std::string BuildDataProfilesDePath(userid_t userid);
Andreas Huber71cd43f2018-01-22 11:25:29 -0800143std::string BuildDataVendorCePath(userid_t userid);
144std::string BuildDataVendorDePath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800145
Paul Crowley3b71fc52017-10-09 10:55:21 -0700146std::string BuildDataPath(const std::string& volumeUuid);
147std::string BuildDataMediaCePath(const std::string& volumeUuid, userid_t userid);
148std::string BuildDataUserCePath(const std::string& volumeUuid, userid_t userid);
149std::string BuildDataUserDePath(const std::string& volumeUuid, userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800150
Jeff Sharkey66270a22015-06-24 11:49:24 -0700151dev_t GetDevice(const std::string& path);
152
Ricky Wai07e64a42020-02-11 14:31:24 +0000153status_t EnsureDirExists(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
154
Jeff Sharkeyd24aeda2016-07-15 16:20:22 -0600155status_t RestoreconRecursive(const std::string& path);
156
Jeff Sharkey3472e522017-10-06 18:02:53 -0600157// TODO: promote to android::base
158bool Readlinkat(int dirfd, const std::string& path, std::string* result);
Daichi Hirono10d34882016-01-29 14:33:51 +0900159
Alistair Delvaff1fc9b2020-05-14 16:35:03 -0700160// Handles dynamic major assignment for virtio-block
161bool IsVirtioBlkDevice(unsigned int major);
Yu Ning942d4e82016-01-08 17:36:47 +0800162
Sudheer Shanka295fb242019-01-16 23:04:07 -0800163status_t UnmountTreeWithPrefix(const std::string& prefix);
164status_t UnmountTree(const std::string& mountPoint);
Sudheer Shanka89ddf992018-09-25 14:22:07 -0700165
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700166status_t DeleteDirContentsAndDir(const std::string& pathname);
Sudheer Shanka30df1c62019-02-22 17:03:02 -0800167status_t DeleteDirContents(const std::string& pathname);
Sudheer Shanka40ab6742018-09-18 13:07:45 -0700168
Paul Crowley298fa322018-10-30 15:59:24 -0700169status_t WaitForFile(const char* filename, std::chrono::nanoseconds timeout);
170
Paul Crowley621d9b92018-12-07 15:36:09 -0800171bool FsyncDirectory(const std::string& dirname);
172
Tommy Chiu0bd2d112019-03-26 17:18:09 +0800173bool writeStringToFile(const std::string& payload, const std::string& filename);
Zim3623a212019-07-19 16:46:53 +0100174
Zima438b242019-09-25 14:37:38 +0100175status_t MountUserFuse(userid_t user_id, const std::string& absolute_lower_path,
176 const std::string& relative_upper_path, android::base::unique_fd* fuse_fd);
177
Martijn Coenen6f5802e2019-11-28 11:53:53 +0100178status_t UnmountUserFuse(userid_t userId, const std::string& absolute_lower_path,
179 const std::string& relative_upper_path);
Zim3623a212019-07-19 16:46:53 +0100180
Martijn Coenen62a4b272020-01-31 15:23:09 +0100181status_t PrepareAndroidDirs(const std::string& volumeRoot);
Jeff Sharkeydeb24052015-03-02 21:01:40 -0800182} // namespace vold
183} // namespace android
184
185#endif