blob: 9163006aef5ee96adbafacb616d4a0a6b7ad253a [file] [log] [blame]
Jeff Sharkeydeb24052015-03-02 21:01:40 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ANDROID_VOLD_UTILS_H
18#define ANDROID_VOLD_UTILS_H
19
Pavel Grafove2e2d302017-08-01 17:15:53 +010020#include "KeyBuffer.h"
21
Jeff Sharkey814e9d32017-09-13 11:49:44 -060022#include <android-base/macros.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080023#include <utils/Errors.h>
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -080024#include <cutils/multiuser.h>
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070025#include <selinux/selinux.h>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080026
Jeff Sharkey9c484982015-03-31 10:35:33 -070027#include <vector>
Jeff Sharkeydeb24052015-03-02 21:01:40 -080028#include <string>
29
Daichi Hirono10d34882016-01-29 14:33:51 +090030struct DIR;
31
Jeff Sharkeydeb24052015-03-02 21:01:40 -080032namespace android {
33namespace vold {
34
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070035/* SELinux contexts used depending on the block device type */
36extern security_context_t sBlkidContext;
37extern security_context_t sBlkidUntrustedContext;
38extern security_context_t sFsckContext;
39extern security_context_t sFsckUntrustedContext;
40
Jeff Sharkeydeb24052015-03-02 21:01:40 -080041status_t CreateDeviceNode(const std::string& path, dev_t dev);
42status_t DestroyDeviceNode(const std::string& path);
43
Jeff Sharkeyf0121c52015-04-06 14:08:45 -070044/* fs_prepare_dir wrapper that creates with SELinux context */
45status_t PrepareDir(const std::string& path, mode_t mode, uid_t uid, gid_t gid);
46
Jeff Sharkeydeb24052015-03-02 21:01:40 -080047/* Really unmounts the path, killing active processes along the way */
48status_t ForceUnmount(const std::string& path);
49
Jeff Sharkey89f74fb2015-10-21 12:16:12 -070050/* Kills any processes using given path */
51status_t KillProcessesUsingPath(const std::string& path);
52
Jeff Sharkey36801cc2015-03-13 16:09:20 -070053/* Creates bind mount from source to target */
54status_t BindMount(const std::string& source, const std::string& target);
55
Jeff Sharkey3472e522017-10-06 18:02:53 -060056bool FindValue(const std::string& raw, const std::string& key, std::string* value);
57
Jeff Sharkey9c484982015-03-31 10:35:33 -070058/* Reads filesystem metadata from device at path */
Jeff Sharkey3472e522017-10-06 18:02:53 -060059status_t ReadMetadata(const std::string& path, std::string* fsType,
60 std::string* fsUuid, std::string* fsLabel);
Jeff Sharkey9c484982015-03-31 10:35:33 -070061
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070062/* Reads filesystem metadata from untrusted device at path */
Jeff Sharkey3472e522017-10-06 18:02:53 -060063status_t ReadMetadataUntrusted(const std::string& path, std::string* fsType,
64 std::string* fsUuid, std::string* fsLabel);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070065
Jeff Sharkeyce6a9132015-04-08 21:07:21 -070066/* Returns either WEXITSTATUS() status, or a negative errno */
67status_t ForkExecvp(const std::vector<std::string>& args);
68status_t ForkExecvp(const std::vector<std::string>& args, security_context_t context);
69
70status_t ForkExecvp(const std::vector<std::string>& args,
71 std::vector<std::string>& output);
72status_t ForkExecvp(const std::vector<std::string>& args,
73 std::vector<std::string>& output, security_context_t context);
Jeff Sharkey9c484982015-03-31 10:35:33 -070074
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -070075pid_t ForkExecvpAsync(const std::vector<std::string>& args);
76
Jeff Sharkey9c484982015-03-31 10:35:33 -070077status_t ReadRandomBytes(size_t bytes, std::string& out);
Pavel Grafove2e2d302017-08-01 17:15:53 +010078status_t ReadRandomBytes(size_t bytes, char* buffer);
Jeff Sharkey46bb69f2017-06-21 13:52:23 -060079status_t GenerateRandomUuid(std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -070080
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070081/* Converts hex string to raw bytes, ignoring [ :-] */
Jeff Sharkey9c484982015-03-31 10:35:33 -070082status_t HexToStr(const std::string& hex, std::string& str);
Jeff Sharkey95c87cc2015-04-01 11:54:32 -070083/* Converts raw bytes to hex string */
Jeff Sharkey9c484982015-03-31 10:35:33 -070084status_t StrToHex(const std::string& str, std::string& hex);
Pavel Grafove2e2d302017-08-01 17:15:53 +010085/* Converts raw key bytes to hex string */
86status_t StrToHex(const KeyBuffer& str, KeyBuffer& hex);
Jeff Sharkeybc40cc82015-06-18 14:25:08 -070087/* Normalize given hex string into consistent format */
88status_t NormalizeHex(const std::string& in, std::string& out);
Jeff Sharkey9c484982015-03-31 10:35:33 -070089
Jeff Sharkey1d6fbcc2015-04-24 16:00:03 -070090uint64_t GetFreeBytes(const std::string& path);
91uint64_t GetTreeBytes(const std::string& path);
92
Jeff Sharkeyd0640f62015-05-21 22:35:42 -070093bool IsFilesystemSupported(const std::string& fsType);
94
95/* Wipes contents of block device at given path */
96status_t WipeBlockDevice(const std::string& path);
97
Jeff Sharkeybc40cc82015-06-18 14:25:08 -070098std::string BuildKeyPath(const std::string& partGuid);
99
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600100std::string BuildDataSystemLegacyPath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800101std::string BuildDataSystemCePath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700102std::string BuildDataSystemDePath(userid_t userid);
Jeff Sharkeybe70c9a2016-04-14 20:45:16 -0600103std::string BuildDataMiscLegacyPath(userid_t userid);
Jeff Sharkey47695b22016-02-01 17:02:29 -0700104std::string BuildDataMiscCePath(userid_t userid);
105std::string BuildDataMiscDePath(userid_t userid);
Calin Juravle79f55a42016-02-17 20:14:46 +0000106std::string BuildDataProfilesDePath(userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800107
Paul Crowley3b71fc52017-10-09 10:55:21 -0700108std::string BuildDataPath(const std::string& volumeUuid);
109std::string BuildDataMediaCePath(const std::string& volumeUuid, userid_t userid);
110std::string BuildDataUserCePath(const std::string& volumeUuid, userid_t userid);
111std::string BuildDataUserDePath(const std::string& volumeUuid, userid_t userid);
Jeff Sharkeyd2c96e72015-11-08 17:56:23 -0800112
Jeff Sharkey66270a22015-06-24 11:49:24 -0700113dev_t GetDevice(const std::string& path);
114
Jeff Sharkeyd24aeda2016-07-15 16:20:22 -0600115status_t RestoreconRecursive(const std::string& path);
116
Jeff Sharkey3472e522017-10-06 18:02:53 -0600117// TODO: promote to android::base
118bool Readlinkat(int dirfd, const std::string& path, std::string* result);
Daichi Hirono10d34882016-01-29 14:33:51 +0900119
Yu Ning942d4e82016-01-08 17:36:47 +0800120/* Checks if Android is running in QEMU */
121bool IsRunningInEmulator();
122
Jeff Sharkeydeb24052015-03-02 21:01:40 -0800123} // namespace vold
124} // namespace android
125
126#endif