CommandListener.cpp revision 10d34887b3e00e603604e0301487f9b8222c66f4
1f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat/*
2f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * Copyright (C) 2008 The Android Open Source Project
3f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat *
4f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * Licensed under the Apache License, Version 2.0 (the "License");
5f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * you may not use this file except in compliance with the License.
6f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * You may obtain a copy of the License at
7f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat *
8f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat *      http://www.apache.org/licenses/LICENSE-2.0
9f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat *
10f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * Unless required by applicable law or agreed to in writing, software
11f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * distributed under the License is distributed on an "AS IS" BASIS,
12f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * See the License for the specific language governing permissions and
14f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat * limitations under the License.
15f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat */
16f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
17f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include <stdlib.h>
188575a350ff725842f076500eab161b39e8720938Daichi Hirono#include <sys/mount.h>
19f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include <sys/socket.h>
208575a350ff725842f076500eab161b39e8720938Daichi Hirono#include <sys/stat.h>
21a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat#include <sys/types.h>
2210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono#include <sys/wait.h>
23f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include <netinet/in.h>
24f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include <arpa/inet.h>
25a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat#include <dirent.h>
26f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include <errno.h>
272350c44ff39b4cb2940893964a05f778fc80a436San Mehat#include <fcntl.h>
287929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash#include <fs_mgr.h>
29d1104f75a736210a95ba890473d78e8dfc8b8915Yabin Cui#include <stdio.h>
3037dcda68d334f70e1f7f69a9817def65fe3ee717Olivier Bailly#include <string.h>
315a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey#include <stdint.h>
325a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey#include <inttypes.h>
3347ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono#include <ctype.h>
34f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
35d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat#define LOG_TAG "VoldCmdListener"
365a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey
3710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono#include <android-base/logging.h>
387e128fbe212c64492afa98bfd6d7fab6f1956831Elliott Hughes#include <android-base/stringprintf.h>
395a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey#include <cutils/fs.h>
40f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
41f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include <sysutils/SocketClient.h>
423ad9072a5d6f6bda32123b367545649364e3c11dKen Sumrall#include <private/android_filesystem_config.h>
43f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
44f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include "CommandListener.h"
45f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat#include "VolumeManager.h"
4636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey#include "VolumeBase.h"
47a2677e4ad01f250b0765f04adf0acfa6627efc98San Mehat#include "ResponseCode.h"
48586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat#include "Process.h"
49d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat#include "Loop.h"
50d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat#include "Devmapper.h"
511d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey#include "MoveTask.h"
52c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey#include "TrimTask.h"
53f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
543fd60b428202a0f5f324fccc67c0c0402b9131baDianne Hackborn#define DUMP_ARGS 0
553fd60b428202a0f5f324fccc67c0c0402b9131baDianne Hackborn
56f1b736bc5605e92e917ab27f5abf3ba839be2270San MehatCommandListener::CommandListener() :
57149aa3eb65a8cb878781206b1476aae110e0e1fdRobert Greenwalt                 FrameworkListener("vold", true) {
58d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    registerCmd(new DumpCmd());
59eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    registerCmd(new VolumeCmd());
60eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    registerCmd(new AsecCmd());
61508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root    registerCmd(new ObbCmd());
62586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    registerCmd(new StorageCmd());
63b87937cdea689594a293979b30b13054e7455deeKen Sumrall    registerCmd(new FstrimCmd());
648575a350ff725842f076500eab161b39e8720938Daichi Hirono    registerCmd(new AppFuseCmd());
65f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat}
66f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
673fd60b428202a0f5f324fccc67c0c0402b9131baDianne Hackborn#if DUMP_ARGS
683e971277db0d87652af5622c989233e7159ab909Mark Salyzynvoid CommandListener::dumpArgs(int argc, char **argv, int argObscure) {
69d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    char buffer[4096];
70d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    char *p = buffer;
71d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
72d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    memset(buffer, 0, sizeof(buffer));
73d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    int i;
74d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    for (i = 0; i < argc; i++) {
758f869aa1bc685b505c58e97b4e11a9c7491a16f9Ken Sumrall        unsigned int len = strlen(argv[i]) + 1; // Account for space
76d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        if (i == argObscure) {
77d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            len += 2; // Account for {}
78d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        }
79d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        if (((p - buffer) + len) < (sizeof(buffer)-1)) {
80d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            if (i == argObscure) {
81d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat                *p++ = '{';
82d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat                *p++ = '}';
83d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat                *p++ = ' ';
84d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat                continue;
85d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            }
86d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            strcpy(p, argv[i]);
87d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            p+= strlen(argv[i]);
88d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            if (i != (argc -1)) {
89d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat                *p++ = ' ';
90d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat            }
91d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        }
92d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    }
9397ac40e4e6f3ed0bd5d6878d7d8d4a54fcaecb76San Mehat    SLOGD("%s", buffer);
94d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat}
953e971277db0d87652af5622c989233e7159ab909Mark Salyzyn#else
963e971277db0d87652af5622c989233e7159ab909Mark Salyzynvoid CommandListener::dumpArgs(int /*argc*/, char ** /*argv*/, int /*argObscure*/) { }
973e971277db0d87652af5622c989233e7159ab909Mark Salyzyn#endif
98d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
9936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkeyint CommandListener::sendGenericOkFail(SocketClient *cli, int cond) {
10036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    if (!cond) {
10136801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        return cli->sendMsg(ResponseCode::CommandOkay, "Command succeeded", false);
10236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    } else {
10336801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        return cli->sendMsg(ResponseCode::OperationFailed, "Command failed", false);
10436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    }
10536801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey}
10636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
107d9a4e358614a0c5f60cc76c0636ee4bb02004a32San MehatCommandListener::DumpCmd::DumpCmd() :
108d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat                 VoldCommand("dump") {
109d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat}
110d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
111d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehatint CommandListener::DumpCmd::runCommand(SocketClient *cli,
1123e971277db0d87652af5622c989233e7159ab909Mark Salyzyn                                         int /*argc*/, char ** /*argv*/) {
113d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    cli->sendMsg(0, "Dumping loop status", false);
114d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    if (Loop::dumpState(cli)) {
115d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        cli->sendMsg(ResponseCode::CommandOkay, "Loop dump failed", true);
116d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    }
117d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    cli->sendMsg(0, "Dumping DM status", false);
118d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    if (Devmapper::dumpState(cli)) {
119d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        cli->sendMsg(ResponseCode::CommandOkay, "Devmapper dump failed", true);
120d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    }
12196597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat    cli->sendMsg(0, "Dumping mounted filesystems", false);
12296597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat    FILE *fp = fopen("/proc/mounts", "r");
12396597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat    if (fp) {
12496597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat        char line[1024];
12596597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat        while (fgets(line, sizeof(line), fp)) {
12696597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat            line[strlen(line)-1] = '\0';
12796597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat            cli->sendMsg(0, line, false);;
12896597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat        }
12996597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat        fclose(fp);
13096597e8b840ef671fe5279f8bd64fb09a8b38d4cSan Mehat    }
131d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
132d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    cli->sendMsg(ResponseCode::CommandOkay, "dump complete", false);
133d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    return 0;
134d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat}
135d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
136eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan MehatCommandListener::VolumeCmd::VolumeCmd() :
137eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat                 VoldCommand("volume") {
138f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat}
139f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
140eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehatint CommandListener::VolumeCmd::runCommand(SocketClient *cli,
1417929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash                                           int argc, char **argv) {
142d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    dumpArgs(argc, argv, -1);
143d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
144eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    if (argc < 2) {
145eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
146eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        return 0;
147eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    }
148f1b736bc5605e92e917ab27f5abf3ba839be2270San Mehat
149eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    VolumeManager *vm = VolumeManager::Instance();
150c8e04c5a8285de07d2c84bfbda8eda2c14a9457dJeff Sharkey    std::lock_guard<std::mutex> lock(vm->getLock());
151eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat
15236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    // TODO: tease out methods not directly related to volumes
15357df7bf33968d65c23f3d0dc9f30a8ce2625b1d0San Mehat
15436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    std::string cmd(argv[1]);
15536801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    if (cmd == "reset") {
15636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        return sendGenericOkFail(cli, vm->reset());
15736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
15836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    } else if (cmd == "shutdown") {
15936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        return sendGenericOkFail(cli, vm->shutdown());
16036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
161f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey    } else if (cmd == "debug") {
162f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey        return sendGenericOkFail(cli, vm->setDebug(true));
163f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey
16436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    } else if (cmd == "partition" && argc > 3) {
16536801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        // partition [diskId] [public|private|mixed] [ratio]
16636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        std::string id(argv[2]);
16736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        auto disk = vm->findDisk(id);
16836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        if (disk == nullptr) {
16936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown disk", false);
1709caab76c6b5aefdeeb1715a3695491ca793b8c18Ken Sumrall        }
17136801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
17236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        std::string type(argv[3]);
17336801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        if (type == "public") {
17436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return sendGenericOkFail(cli, disk->partitionPublic());
17536801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        } else if (type == "private") {
17636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return sendGenericOkFail(cli, disk->partitionPrivate());
17736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        } else if (type == "mixed") {
17836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            if (argc < 4) {
17936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey                return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
18036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            }
18136801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            int frac = atoi(argv[4]);
18236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return sendGenericOkFail(cli, disk->partitionMixed(frac));
18336801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        } else {
18436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
18557df7bf33968d65c23f3d0dc9f30a8ce2625b1d0San Mehat        }
18636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
18736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    } else if (cmd == "mkdirs" && argc > 2) {
18836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        // mkdirs [path]
18936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        return sendGenericOkFail(cli, vm->mkdirs(argv[2]));
19036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
191bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey    } else if (cmd == "user_added" && argc > 3) {
192bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        // user_added [user] [serial]
193bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        return sendGenericOkFail(cli, vm->onUserAdded(atoi(argv[2]), atoi(argv[3])));
19436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
195bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey    } else if (cmd == "user_removed" && argc > 2) {
196bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        // user_removed [user]
197bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        return sendGenericOkFail(cli, vm->onUserRemoved(atoi(argv[2])));
198bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey
199bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey    } else if (cmd == "user_started" && argc > 2) {
200bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        // user_started [user]
201bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        return sendGenericOkFail(cli, vm->onUserStarted(atoi(argv[2])));
202bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey
203bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey    } else if (cmd == "user_stopped" && argc > 2) {
204bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        // user_stopped [user]
205bd3038df74ace540d46c530a11e3145f922e1b42Jeff Sharkey        return sendGenericOkFail(cli, vm->onUserStopped(atoi(argv[2])));
20636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
20736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    } else if (cmd == "mount" && argc > 2) {
20836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        // mount [volId] [flags] [user]
20936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        std::string id(argv[2]);
21036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        auto vol = vm->findVolume(id);
21136801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        if (vol == nullptr) {
21236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
21357df7bf33968d65c23f3d0dc9f30a8ce2625b1d0San Mehat        }
21436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
215f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey        int mountFlags = (argc > 3) ? atoi(argv[3]) : 0;
216f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey        userid_t mountUserId = (argc > 4) ? atoi(argv[4]) : -1;
21736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
218f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey        vol->setMountFlags(mountFlags);
219f1b996df6f8283aac6953b22bd9e2496d8c30c86Jeff Sharkey        vol->setMountUserId(mountUserId);
22036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
2211bfb375f77c093a8e16bef4ddeab2681ca126d56Jeff Sharkey        int res = vol->mount();
2221bfb375f77c093a8e16bef4ddeab2681ca126d56Jeff Sharkey        if (mountFlags & android::vold::VolumeBase::MountFlags::kPrimary) {
2231bfb375f77c093a8e16bef4ddeab2681ca126d56Jeff Sharkey            vm->setPrimary(vol);
2241bfb375f77c093a8e16bef4ddeab2681ca126d56Jeff Sharkey        }
2251bfb375f77c093a8e16bef4ddeab2681ca126d56Jeff Sharkey        return sendGenericOkFail(cli, res);
22636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
22736801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    } else if (cmd == "unmount" && argc > 2) {
22836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        // unmount [volId]
22936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        std::string id(argv[2]);
23036801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        auto vol = vm->findVolume(id);
23136801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        if (vol == nullptr) {
23236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
233eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
23436801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
23536801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        return sendGenericOkFail(cli, vol->unmount());
23636801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey
237d0640f6358041f7e2657167560b357078db73526Jeff Sharkey    } else if (cmd == "format" && argc > 3) {
238d0640f6358041f7e2657167560b357078db73526Jeff Sharkey        // format [volId] [fsType|auto]
23936801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        std::string id(argv[2]);
240d0640f6358041f7e2657167560b357078db73526Jeff Sharkey        std::string fsType(argv[3]);
24136801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        auto vol = vm->findVolume(id);
24236801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey        if (vol == nullptr) {
24336801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey            return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
24471ebe154a5fbbb4b394a439ff0b6b9c84fbd04f5Jeff Sharkey        }
24549e2bce5b74129c26a35e25d4693cbfe98c4688eSan Mehat
246d0640f6358041f7e2657167560b357078db73526Jeff Sharkey        return sendGenericOkFail(cli, vol->format(fsType));
2471d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey
2481d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey    } else if (cmd == "move_storage" && argc > 3) {
2491d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        // move_storage [fromVolId] [toVolId]
2501d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        auto fromVol = vm->findVolume(std::string(argv[2]));
2511d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        auto toVol = vm->findVolume(std::string(argv[3]));
2521d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        if (fromVol == nullptr || toVol == nullptr) {
2531d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey            return cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown volume", false);
2541d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        }
2551d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey
2561d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        (new android::vold::MoveTask(fromVol, toVol))->start();
2571d6fbcc389ecb9f418076e8ab5f4c93a5d911de9Jeff Sharkey        return sendGenericOkFail(cli, 0);
2585a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey
2595a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey    } else if (cmd == "benchmark" && argc > 2) {
2605a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey        // benchmark [volId]
2615a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey        std::string id(argv[2]);
262c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey        nsecs_t res = vm->benchmarkPrivate(id);
2635a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey        return cli->sendMsg(ResponseCode::CommandOkay,
2645a6bfca1638760b87cf64c5ffb48ff3557cc0563Jeff Sharkey                android::base::StringPrintf("%" PRId64, res).c_str(), false);
265bc40cc8f07f69e0e26fc41516e2a83f0a8becbe0Jeff Sharkey
266bc40cc8f07f69e0e26fc41516e2a83f0a8becbe0Jeff Sharkey    } else if (cmd == "forget_partition" && argc > 2) {
267bc40cc8f07f69e0e26fc41516e2a83f0a8becbe0Jeff Sharkey        // forget_partition [partGuid]
268bc40cc8f07f69e0e26fc41516e2a83f0a8becbe0Jeff Sharkey        std::string partGuid(argv[2]);
269bc40cc8f07f69e0e26fc41516e2a83f0a8becbe0Jeff Sharkey        return sendGenericOkFail(cli, vm->forgetPartition(partGuid));
27066270a21df1058434e4d63691221f11ff5387a0fJeff Sharkey
27166270a21df1058434e4d63691221f11ff5387a0fJeff Sharkey    } else if (cmd == "remount_uid" && argc > 3) {
27266270a21df1058434e4d63691221f11ff5387a0fJeff Sharkey        // remount_uid [uid] [none|default|read|write]
27366270a21df1058434e4d63691221f11ff5387a0fJeff Sharkey        uid_t uid = atoi(argv[2]);
27466270a21df1058434e4d63691221f11ff5387a0fJeff Sharkey        std::string mode(argv[3]);
27566270a21df1058434e4d63691221f11ff5387a0fJeff Sharkey        return sendGenericOkFail(cli, vm->remountUid(uid, mode));
276a2677e4ad01f250b0765f04adf0acfa6627efc98San Mehat    }
277a2677e4ad01f250b0765f04adf0acfa6627efc98San Mehat
27836801cccf27152c9eca5aab6ba3527221525110fJeff Sharkey    return cli->sendMsg(ResponseCode::CommandSyntaxError, nullptr, false);
279a2677e4ad01f250b0765f04adf0acfa6627efc98San Mehat}
280a2677e4ad01f250b0765f04adf0acfa6627efc98San Mehat
281586536c60b773e3517531ad8a6cb0de6722c67fcSan MehatCommandListener::StorageCmd::StorageCmd() :
282586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                 VoldCommand("storage") {
283586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat}
284586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
285586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehatint CommandListener::StorageCmd::runCommand(SocketClient *cli,
286586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                                                      int argc, char **argv) {
2877929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash    /* Guarantied to be initialized by vold's main() before the CommandListener is active */
2887929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash    extern struct fstab *fstab;
2897929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash
290d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat    dumpArgs(argc, argv, -1);
291d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat
292586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    if (argc < 2) {
293586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
294586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        return 0;
295586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    }
296586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
2977929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash    if (!strcmp(argv[1], "mountall")) {
2987929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash        if (argc != 2) {
2997929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: mountall", false);
3007929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash            return 0;
3017929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash        }
3027929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash        fs_mgr_mount_all(fstab);
3037929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash        cli->sendMsg(ResponseCode::CommandOkay, "Mountall ran successfully", false);
3047929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash        return 0;
3057929aa73d0c1fa75e8e0fcd4272361ad0ea9b0e6Mohamad Ayyash    }
306586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    if (!strcmp(argv[1], "users")) {
307586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        DIR *dir;
308586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        struct dirent *de;
309586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
310edf7adf21e1c210e5954b1128efb61b62f6da274JP Abgrall        if (argc < 3) {
311edf7adf21e1c210e5954b1128efb61b62f6da274JP Abgrall            cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument: user <mountpoint>", false);
312edf7adf21e1c210e5954b1128efb61b62f6da274JP Abgrall            return 0;
313edf7adf21e1c210e5954b1128efb61b62f6da274JP Abgrall        }
314586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        if (!(dir = opendir("/proc"))) {
315586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            cli->sendMsg(ResponseCode::OperationFailed, "Failed to open /proc", true);
316586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            return 0;
317586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        }
318586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
319586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        while ((de = readdir(dir))) {
320586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            int pid = Process::getPid(de->d_name);
321586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
322586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            if (pid < 0) {
323586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                continue;
324586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            }
325586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
326586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            char processName[255];
327586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            Process::getProcessName(pid, processName, sizeof(processName));
328586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
329586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            if (Process::checkFileDescriptorSymLinks(pid, argv[2]) ||
330586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                Process::checkFileMaps(pid, argv[2]) ||
331586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                Process::checkSymLink(pid, argv[2], "cwd") ||
332586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                Process::checkSymLink(pid, argv[2], "root") ||
333586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                Process::checkSymLink(pid, argv[2], "exe")) {
334586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
335586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                char msg[1024];
336586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                snprintf(msg, sizeof(msg), "%d %s", pid, processName);
337586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat                cli->sendMsg(ResponseCode::StorageUsersListResult, msg, false);
338586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat            }
339586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        }
340586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        closedir(dir);
341586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        cli->sendMsg(ResponseCode::CommandOkay, "Storage user list complete", false);
342586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    } else {
343586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat        cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown storage cmd", false);
344586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    }
345586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat    return 0;
346586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat}
347586536c60b773e3517531ad8a6cb0de6722c67fcSan Mehat
348eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan MehatCommandListener::AsecCmd::AsecCmd() :
349eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat                 VoldCommand("asec") {
350048b0801fcd6fcfbb8fa812284c751181e4821b8San Mehat}
351048b0801fcd6fcfbb8fa812284c751181e4821b8San Mehat
352344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Rootvoid CommandListener::AsecCmd::listAsecsInDirectory(SocketClient *cli, const char *directory) {
353344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    DIR *d = opendir(directory);
354344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
355344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    if (!d) {
356344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        cli->sendMsg(ResponseCode::OperationFailed, "Failed to open asec dir", true);
357344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        return;
358344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    }
359344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
360344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    size_t dirent_len = offsetof(struct dirent, d_name) +
3618c480f73eed963eeca9b7df3e4c4543c6e43b0d7Elliott Hughes            fpathconf(dirfd(d), _PC_NAME_MAX) + 1;
362344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
363344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    struct dirent *dent = (struct dirent *) malloc(dirent_len);
364344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    if (dent == NULL) {
365344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        cli->sendMsg(ResponseCode::OperationFailed, "Failed to allocate memory", true);
366344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        return;
367344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    }
368344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
369344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    struct dirent *result;
370344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
371344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    while (!readdir_r(d, dent, &result) && result != NULL) {
372344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        if (dent->d_name[0] == '.')
373344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            continue;
374344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        if (dent->d_type != DT_REG)
375344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            continue;
376344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        size_t name_len = strlen(dent->d_name);
377344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        if (name_len > 5 && name_len < 260 &&
378344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root                !strcmp(&dent->d_name[name_len - 5], ".asec")) {
379344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            char id[255];
380344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            memset(id, 0, sizeof(id));
3817b0bc8571465666d6cba79bda60b72a97f852c05Kenny Root            strlcpy(id, dent->d_name, name_len - 4);
382344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            cli->sendMsg(ResponseCode::AsecListResult, id, false);
383344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        }
384344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    }
385344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    closedir(d);
386344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
387344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    free(dent);
388344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root}
389344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
390eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehatint CommandListener::AsecCmd::runCommand(SocketClient *cli,
391eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat                                                      int argc, char **argv) {
392eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    if (argc < 2) {
393eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
394048b0801fcd6fcfbb8fa812284c751181e4821b8San Mehat        return 0;
395048b0801fcd6fcfbb8fa812284c751181e4821b8San Mehat    }
396048b0801fcd6fcfbb8fa812284c751181e4821b8San Mehat
397eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    VolumeManager *vm = VolumeManager::Instance();
398eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    int rc = 0;
399a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat
400eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    if (!strcmp(argv[1], "list")) {
401d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
402a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat
4039f18fe7807a4e4089778243dbbd08d154ec15540Jeff Sharkey        listAsecsInDirectory(cli, VolumeManager::SEC_ASECDIR_EXT);
4049f18fe7807a4e4089778243dbbd08d154ec15540Jeff Sharkey        listAsecsInDirectory(cli, VolumeManager::SEC_ASECDIR_INT);
405eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "create")) {
406d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, 5);
407344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        if (argc != 8) {
408eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError,
409344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root                    "Usage: asec create <container-id> <size_mb> <fstype> <key> <ownerUid> "
410344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root                    "<isExternal>", false);
411eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
412a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat        }
413a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat
414a4f48d0f44d09b6a9a3b16f6c0121ffd5123eef3Mateusz Nowak        unsigned long numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512;
415344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        const bool isExternal = (atoi(argv[7]) == 1);
416344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        rc = vm->createAsec(argv[2], numSectors, argv[4], argv[5], atoi(argv[6]), isExternal);
417fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg    } else if (!strcmp(argv[1], "resize")) {
418fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg        dumpArgs(argc, argv, -1);
419fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg        if (argc != 5) {
420fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec resize <container-id> <size_mb> <key>", false);
421fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg            return 0;
422fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg        }
423a4f48d0f44d09b6a9a3b16f6c0121ffd5123eef3Mateusz Nowak        unsigned long numSectors = (atoi(argv[3]) * (1024 * 1024)) / 512;
424fcd34a0ddd45db83b7bc71ff47cba9b789089fddDaniel Rosenberg        rc = vm->resizeAsec(argv[2], numSectors, argv[4]);
425eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "finalize")) {
426d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
427eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        if (argc != 3) {
428eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec finalize <container-id>", false);
429eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
430eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
4318f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        rc = vm->finalizeAsec(argv[2]);
432344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root    } else if (!strcmp(argv[1], "fixperms")) {
433344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        dumpArgs(argc, argv, -1);
434344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        if  (argc != 5) {
435344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
436344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            return 0;
437344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        }
438344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
439344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        char *endptr;
440344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        gid_t gid = (gid_t) strtoul(argv[3], &endptr, 10);
441344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        if (*endptr != '\0') {
442344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fixperms <container-id> <gid> <filename>", false);
443344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root            return 0;
444344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        }
445344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root
446344ca10856f3d3087a3288ce8f91ad83665d93fbKenny Root        rc = vm->fixupAsecPermissions(argv[2], gid, argv[4]);
447eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "destroy")) {
448d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
4494ba8948dc16463053e21cda5744f519a555080d0San Mehat        if (argc < 3) {
4504ba8948dc16463053e21cda5744f519a555080d0San Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec destroy <container-id> [force]", false);
451eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
452eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
4534ba8948dc16463053e21cda5744f519a555080d0San Mehat        bool force = false;
4544ba8948dc16463053e21cda5744f519a555080d0San Mehat        if (argc > 3 && !strcmp(argv[3], "force")) {
4554ba8948dc16463053e21cda5744f519a555080d0San Mehat            force = true;
4564ba8948dc16463053e21cda5744f519a555080d0San Mehat        }
4578f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        rc = vm->destroyAsec(argv[2], force);
458eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "mount")) {
459d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, 3);
46043ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey        if (argc != 6) {
461eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError,
46243ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey                    "Usage: asec mount <namespace-id> <key> <ownerUid> <ro|rw>", false);
463eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
464eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
46543ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey        bool readOnly = true;
46643ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey        if (!strcmp(argv[5], "rw")) {
46743ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey            readOnly = false;
46843ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey        }
46943ed123d3fc1a3edf3660cd0e2528e971abc399eJeff Sharkey        rc = vm->mountAsec(argv[2], argv[3], atoi(argv[4]), readOnly);
470eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "unmount")) {
471d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
4724ba8948dc16463053e21cda5744f519a555080d0San Mehat        if (argc < 3) {
4734ba8948dc16463053e21cda5744f519a555080d0San Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec unmount <container-id> [force]", false);
474eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
475eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
4764ba8948dc16463053e21cda5744f519a555080d0San Mehat        bool force = false;
4774ba8948dc16463053e21cda5744f519a555080d0San Mehat        if (argc > 3 && !strcmp(argv[3], "force")) {
4784ba8948dc16463053e21cda5744f519a555080d0San Mehat            force = true;
4794ba8948dc16463053e21cda5744f519a555080d0San Mehat        }
4808f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        rc = vm->unmountAsec(argv[2], force);
481eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "rename")) {
482d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
483eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        if (argc != 4) {
484eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError,
485eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat                    "Usage: asec rename <old_id> <new_id>", false);
486eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
487eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
4888f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        rc = vm->renameAsec(argv[2], argv[3]);
489eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat    } else if (!strcmp(argv[1], "path")) {
490d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
491eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        if (argc != 3) {
492eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec path <container-id>", false);
493eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            return 0;
494eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
495eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        char path[255];
496a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat
49788ac2c06539485942bf414efda2d39647fa1a415San Mehat        if (!(rc = vm->getAsecMountPath(argv[2], path, sizeof(path)))) {
498eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat            cli->sendMsg(ResponseCode::AsecPathResult, path, false);
49988ac2c06539485942bf414efda2d39647fa1a415San Mehat            return 0;
500eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        }
501736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn    } else if (!strcmp(argv[1], "fspath")) {
502736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn        dumpArgs(argc, argv, -1);
503736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn        if (argc != 3) {
504736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: asec fspath <container-id>", false);
505736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn            return 0;
506736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn        }
507736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn        char path[255];
508736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn
509736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn        if (!(rc = vm->getAsecFilesystemPath(argv[2], path, sizeof(path)))) {
510736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn            cli->sendMsg(ResponseCode::AsecPathResult, path, false);
511736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn            return 0;
512736910ca99a40b9add4353bf619e778c40938948Dianne Hackborn        }
513a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat    } else {
514d9a4e358614a0c5f60cc76c0636ee4bb02004a32San Mehat        dumpArgs(argc, argv, -1);
515eba65e9d438a05f1c5dfd0f8d31bc463a5d08eeeSan Mehat        cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown asec cmd", false);
516a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat    }
517a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat
5188f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat    if (!rc) {
5198f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        cli->sendMsg(ResponseCode::CommandOkay, "asec operation succeeded", false);
5208f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat    } else {
5218f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        rc = ResponseCode::convertFromErrno();
5228f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat        cli->sendMsg(rc, "asec operation failed", true);
5238f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat    }
5248f2875b29780312f4edda3d831cc8a99e1648dd5San Mehat
525a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat    return 0;
526a19b250bd273455933ca3502cf2c2e0a803aff77San Mehat}
5272350c44ff39b4cb2940893964a05f778fc80a436San Mehat
528508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny RootCommandListener::ObbCmd::ObbCmd() :
529508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root                 VoldCommand("obb") {
530fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root}
531fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root
532508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Rootint CommandListener::ObbCmd::runCommand(SocketClient *cli,
533fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root                                                      int argc, char **argv) {
534fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    if (argc < 2) {
535fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
536fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        return 0;
537fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    }
538fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root
539fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    VolumeManager *vm = VolumeManager::Instance();
540fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    int rc = 0;
541fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root
542508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root    if (!strcmp(argv[1], "list")) {
543508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        dumpArgs(argc, argv, -1);
544508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root
545508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        rc = vm->listMountedObbs(cli);
546508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root    } else if (!strcmp(argv[1], "mount")) {
547fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root            dumpArgs(argc, argv, 3);
548fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root            if (argc != 5) {
549fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root                cli->sendMsg(ResponseCode::CommandSyntaxError,
5506947904a76b69a1db20a3ddd30c0bcd281922fdeJeff Sharkey                        "Usage: obb mount <filename> <key> <ownerGid>", false);
551fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root                return 0;
552fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root            }
553508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root            rc = vm->mountObb(argv[2], argv[3], atoi(argv[4]));
554fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    } else if (!strcmp(argv[1], "unmount")) {
555fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        dumpArgs(argc, argv, -1);
556fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        if (argc < 3) {
557508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb unmount <source file> [force]", false);
558fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root            return 0;
559fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        }
560fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        bool force = false;
561fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        if (argc > 3 && !strcmp(argv[3], "force")) {
562fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root            force = true;
563fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        }
564508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        rc = vm->unmountObb(argv[2], force);
565508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root    } else if (!strcmp(argv[1], "path")) {
566508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        dumpArgs(argc, argv, -1);
567508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        if (argc != 3) {
568508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root            cli->sendMsg(ResponseCode::CommandSyntaxError, "Usage: obb path <source file>", false);
569508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root            return 0;
570508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        }
571508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        char path[255];
572508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root
573508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        if (!(rc = vm->getObbMountPath(argv[2], path, sizeof(path)))) {
574508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root            cli->sendMsg(ResponseCode::AsecPathResult, path, false);
575508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root            return 0;
576508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        }
577fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    } else {
578fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        dumpArgs(argc, argv, -1);
579508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        cli->sendMsg(ResponseCode::CommandSyntaxError, "Unknown obb cmd", false);
580fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    }
581fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root
582fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    if (!rc) {
583508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        cli->sendMsg(ResponseCode::CommandOkay, "obb operation succeeded", false);
584fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    } else {
585fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root        rc = ResponseCode::convertFromErrno();
586508c0e1605b795bbb51cb47d955b89f3df26ca94Kenny Root        cli->sendMsg(rc, "obb operation failed", true);
587fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    }
588fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root
589fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root    return 0;
590fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root}
591fb7c4d5a8a1031cf0e493ff182dcf458e5fe8c77Kenny Root
592b87937cdea689594a293979b30b13054e7455deeKen SumrallCommandListener::FstrimCmd::FstrimCmd() :
593b87937cdea689594a293979b30b13054e7455deeKen Sumrall                 VoldCommand("fstrim") {
594b87937cdea689594a293979b30b13054e7455deeKen Sumrall}
595b87937cdea689594a293979b30b13054e7455deeKen Sumrallint CommandListener::FstrimCmd::runCommand(SocketClient *cli,
596b87937cdea689594a293979b30b13054e7455deeKen Sumrall                                                      int argc, char **argv) {
597b87937cdea689594a293979b30b13054e7455deeKen Sumrall    if ((cli->getUid() != 0) && (cli->getUid() != AID_SYSTEM)) {
598b87937cdea689594a293979b30b13054e7455deeKen Sumrall        cli->sendMsg(ResponseCode::CommandNoPermission, "No permission to run fstrim commands", false);
599b87937cdea689594a293979b30b13054e7455deeKen Sumrall        return 0;
600b87937cdea689594a293979b30b13054e7455deeKen Sumrall    }
601b87937cdea689594a293979b30b13054e7455deeKen Sumrall
602b87937cdea689594a293979b30b13054e7455deeKen Sumrall    if (argc < 2) {
603b87937cdea689594a293979b30b13054e7455deeKen Sumrall        cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing Argument", false);
604b87937cdea689594a293979b30b13054e7455deeKen Sumrall        return 0;
605b87937cdea689594a293979b30b13054e7455deeKen Sumrall    }
606b87937cdea689594a293979b30b13054e7455deeKen Sumrall
607c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    VolumeManager *vm = VolumeManager::Instance();
608c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    std::lock_guard<std::mutex> lock(vm->getLock());
609b87937cdea689594a293979b30b13054e7455deeKen Sumrall
610c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    int flags = 0;
611b87937cdea689594a293979b30b13054e7455deeKen Sumrall
612c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    std::string cmd(argv[1]);
613c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    if (cmd == "dotrim") {
614c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey        flags = 0;
615c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    } else if (cmd == "dotrimbench") {
616c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey        flags = android::vold::TrimTask::Flags::kBenchmarkAfter;
617c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    } else if (cmd == "dodtrim") {
618c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey        flags = android::vold::TrimTask::Flags::kDeepTrim;
619c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    } else if (cmd == "dodtrimbench") {
620c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey        flags = android::vold::TrimTask::Flags::kDeepTrim
621c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey                | android::vold::TrimTask::Flags::kBenchmarkAfter;
622c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    }
623b87937cdea689594a293979b30b13054e7455deeKen Sumrall
624c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    (new android::vold::TrimTask(flags))->start();
625c86ab6f538bec63638c168d6c843fe7cf73add3bJeff Sharkey    return sendGenericOkFail(cli, 0);
626b87937cdea689594a293979b30b13054e7455deeKen Sumrall}
6278575a350ff725842f076500eab161b39e8720938Daichi Hirono
62847ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hironostatic size_t kAppFuseMaxMountPointName = 32;
62947ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono
63010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hironostatic android::status_t getMountPath(uid_t uid, const std::string& name, std::string* path) {
63178b524ec463da25d6512dc791112c1335efd497bDaichi Hirono    if (name.size() > kAppFuseMaxMountPointName) {
63210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        LOG(ERROR) << "AppFuse mount name is too long.";
63310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -EINVAL;
63478b524ec463da25d6512dc791112c1335efd497bDaichi Hirono    }
63578b524ec463da25d6512dc791112c1335efd497bDaichi Hirono    for (size_t i = 0; i < name.size(); i++) {
63678b524ec463da25d6512dc791112c1335efd497bDaichi Hirono        if (!isalnum(name[i])) {
63710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            LOG(ERROR) << "AppFuse mount name contains invalid character.";
63810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return -EINVAL;
63978b524ec463da25d6512dc791112c1335efd497bDaichi Hirono        }
64078b524ec463da25d6512dc791112c1335efd497bDaichi Hirono    }
64110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    *path = android::base::StringPrintf("/mnt/appfuse/%d_%s", uid, name.c_str());
64210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    return android::OK;
64310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono}
64410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
64510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hironostatic android::status_t mountInNamespace(uid_t uid, int device_fd, const std::string& path) {
64610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    // Remove existing mount.
64710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    android::vold::ForceUnmount(path);
64810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
64910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    const auto opts = android::base::StringPrintf(
65010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            "fd=%i,"
65110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            "rootmode=40000,"
65210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            "default_permissions,"
65310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            "allow_other,"
65410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            "user_id=%d,group_id=%d",
65510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            device_fd,
65610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            uid,
65710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            uid);
65810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
65910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    const int result = TEMP_FAILURE_RETRY(mount(
66010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            "/dev/fuse", path.c_str(), "fuse",
66110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_NOATIME, opts.c_str()));
66210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (result != 0) {
66310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        PLOG(ERROR) << "Failed to mount " << path;
66410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -errno;
66510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
66610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
66710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    return android::OK;
66810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono}
66910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
67010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hironostatic android::status_t runCommandInNamespace(const std::string& command,
67110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                               uid_t uid,
67210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                               pid_t pid,
67310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                               const std::string& path,
67410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                               int device_fd) {
67510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    LOG(DEBUG) << "Run app fuse command " << command << " for the path " << path << " in namespace "
67610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono               << uid;
67710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
67810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    const android::vold::ScopedDir dir(opendir("/proc"));
67910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (dir.get() == nullptr) {
68010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        PLOG(ERROR) << "Failed to open /proc";
68110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -errno;
68210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
68310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
68410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    // Obtains process file descriptor.
68510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    const std::string pid_str = android::base::StringPrintf("%d", pid);
68610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    const android::vold::ScopedFd pid_fd(
68710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            openat(dirfd(dir.get()), pid_str.c_str(), O_RDONLY | O_DIRECTORY | O_CLOEXEC));
68810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (pid_fd.get() == -1) {
68910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        PLOG(ERROR) << "Failed to open /proc/" << pid;
69010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -errno;
69110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
69210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
69310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    // Check UID of process.
69410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    {
69510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        struct stat sb;
69610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const int result = fstat(pid_fd.get(), &sb);
69710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (result == -1) {
69810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            PLOG(ERROR) << "Failed to stat /proc/" << pid;
69910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return -errno;
70010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
70110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (sb.st_uid != uid) {
70210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            LOG(ERROR) << "Mismatch UID expected=" << uid << ", actual=" << sb.st_uid;
70310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return -EPERM;
70410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
70510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
70610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
70710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    // Matches so far, but refuse to touch if in root namespace
70810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    {
70910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        char rootName[PATH_MAX];
71010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        char pidName[PATH_MAX];
71110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const int root_result =
71210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                android::vold::SaneReadLinkAt(dirfd(dir.get()), "1/ns/mnt", rootName, PATH_MAX);
71310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const int pid_result =
71410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                android::vold::SaneReadLinkAt(pid_fd.get(), "ns/mnt", pidName, PATH_MAX);
71510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (root_result == -1) {
71610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            LOG(ERROR) << "Failed to readlink for /proc/1/ns/mnt";
71710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return -EPERM;
71810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
71910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (pid_result == -1) {
72010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            LOG(ERROR) << "Failed to readlink for /proc/" << pid << "/ns/mnt";
72110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return -EPERM;
72210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
72310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (!strcmp(rootName, pidName)) {
72410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            LOG(ERROR) << "Don't mount appfuse in root namespace";
72510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return -EPERM;
72610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
72710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
72810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
72910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    // We purposefully leave the namespace open across the fork
73010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    android::vold::ScopedFd ns_fd(openat(pid_fd.get(), "ns/mnt", O_RDONLY));
73110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (ns_fd.get() < 0) {
73210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        PLOG(ERROR) << "Failed to open namespace for /proc/" << pid << "/ns/mnt";
73310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -errno;
73410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
73510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
73610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    int child = fork();
73710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (child == 0) {
73810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (setns(ns_fd.get(), CLONE_NEWNS) != 0) {
73910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            PLOG(ERROR) << "Failed to setns";
74010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            _exit(-errno);
74110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
74210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
74310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (command == "mount") {
74410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            _exit(mountInNamespace(uid, device_fd, path));
74510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        } else if (command == "unmount") {
74610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            android::vold::ForceUnmount(path);
74710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            _exit(android::OK);
74810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        } else {
74910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            LOG(ERROR) << "Unknown appfuse command " << command;
75010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            _exit(-EPERM);
75110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        }
75210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
75310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
75410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (child == -1) {
75510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        PLOG(ERROR) << "Failed to folk child process";
75610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -errno;
75710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
75810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
75910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    android::status_t status;
76010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    TEMP_FAILURE_RETRY(waitpid(child, &status, 0));
76110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
76210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    return status;
76378b524ec463da25d6512dc791112c1335efd497bDaichi Hirono}
76478b524ec463da25d6512dc791112c1335efd497bDaichi Hirono
7658575a350ff725842f076500eab161b39e8720938Daichi HironoCommandListener::AppFuseCmd::AppFuseCmd() : VoldCommand("appfuse") {}
7668575a350ff725842f076500eab161b39e8720938Daichi Hirono
76710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hironoint CommandListener::AppFuseCmd::runCommand(SocketClient *cli, int argc, char **argv) {
7688575a350ff725842f076500eab161b39e8720938Daichi Hirono    if (argc < 2) {
76910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        cli->sendMsg(ResponseCode::CommandSyntaxError, "Missing argument", false);
7708575a350ff725842f076500eab161b39e8720938Daichi Hirono        return 0;
7718575a350ff725842f076500eab161b39e8720938Daichi Hirono    }
7728575a350ff725842f076500eab161b39e8720938Daichi Hirono
7738575a350ff725842f076500eab161b39e8720938Daichi Hirono    const std::string command(argv[1]);
7748575a350ff725842f076500eab161b39e8720938Daichi Hirono
77510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (command == "mount" && argc == 5) {
7768575a350ff725842f076500eab161b39e8720938Daichi Hirono        const uid_t uid = atoi(argv[2]);
77710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const pid_t pid = atoi(argv[3]);
77810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const std::string name(argv[4]);
77947ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono
78047ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        // Check mount point name.
78110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        std::string path;
78210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (getMountPath(uid, name, &path) != android::OK) {
78310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return cli->sendMsg(ResponseCode::CommandParameterError,
78410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                "Invalid mount point name.",
78510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                false);
78647ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        }
78747ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono
78847ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        // Create directories.
78947ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        {
79010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            const android::status_t result = android::vold::PrepareDir(path, 0700, 0, 0);
79110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            if (result != android::OK) {
79210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                PLOG(ERROR) << "Failed to prepare directory " << path;
79347ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono                return sendGenericOkFail(cli, result);
79447ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono            }
79547ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        }
79647ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono
79747ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        // Open device FD.
79810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        android::vold::ScopedFd device_fd(open("/dev/fuse", O_RDWR));
79910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (device_fd.get() == -1) {
80010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            PLOG(ERROR) << "Failed to open /dev/fuse";
80110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return sendGenericOkFail(cli, -errno);
8028575a350ff725842f076500eab161b39e8720938Daichi Hirono        }
8038575a350ff725842f076500eab161b39e8720938Daichi Hirono
80447ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        // Mount.
80547ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        {
80610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            const android::status_t result =
80710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                    runCommandInNamespace(command, uid, pid, path, device_fd.get());
80810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            if (result != android::OK) {
80910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                return sendGenericOkFail(cli, result);
81047ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono            }
81147ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono        }
81247ef9bcad2399df05df0cef516bacb2cda6431f4Daichi Hirono
81310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return sendFd(cli, device_fd.get());
81410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    } else if (command == "unmount" && argc == 5) {
81578b524ec463da25d6512dc791112c1335efd497bDaichi Hirono        const uid_t uid = atoi(argv[2]);
81610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const uid_t pid = atoi(argv[3]);
81710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const std::string name(argv[4]);
81878b524ec463da25d6512dc791112c1335efd497bDaichi Hirono
81978b524ec463da25d6512dc791112c1335efd497bDaichi Hirono        // Check mount point name.
82010d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        std::string path;
82110d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        if (getMountPath(uid, name, &path) != android::OK) {
82210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono            return cli->sendMsg(ResponseCode::CommandParameterError,
82310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                "Invalid mount point name.",
82410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                                false);
82578b524ec463da25d6512dc791112c1335efd497bDaichi Hirono        }
82678b524ec463da25d6512dc791112c1335efd497bDaichi Hirono
82710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        const android::status_t result =
82810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono                runCommandInNamespace(command, uid, pid, path, -1 /* device_fd */);
82910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return sendGenericOkFail(cli, result);
8308575a350ff725842f076500eab161b39e8720938Daichi Hirono    }
8318575a350ff725842f076500eab161b39e8720938Daichi Hirono
83210d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    return cli->sendMsg(ResponseCode::CommandSyntaxError,  "Unknown appfuse cmd", false);
8338575a350ff725842f076500eab161b39e8720938Daichi Hirono}
8348575a350ff725842f076500eab161b39e8720938Daichi Hirono
83510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hironoandroid::status_t CommandListener::AppFuseCmd::sendFd(SocketClient *cli, int fd) {
8368575a350ff725842f076500eab161b39e8720938Daichi Hirono    struct iovec data;
8378575a350ff725842f076500eab161b39e8720938Daichi Hirono    char dataBuffer[128];
8388575a350ff725842f076500eab161b39e8720938Daichi Hirono    char controlBuffer[CMSG_SPACE(sizeof(int))];
8398575a350ff725842f076500eab161b39e8720938Daichi Hirono    struct msghdr message;
8408575a350ff725842f076500eab161b39e8720938Daichi Hirono
8418575a350ff725842f076500eab161b39e8720938Daichi Hirono    // Message.
8428575a350ff725842f076500eab161b39e8720938Daichi Hirono    memset(&message, 0, sizeof(struct msghdr));
8438575a350ff725842f076500eab161b39e8720938Daichi Hirono    message.msg_iov = &data;
8448575a350ff725842f076500eab161b39e8720938Daichi Hirono    message.msg_iovlen = 1;
8458575a350ff725842f076500eab161b39e8720938Daichi Hirono    message.msg_control = controlBuffer;
8468575a350ff725842f076500eab161b39e8720938Daichi Hirono    message.msg_controllen = CMSG_SPACE(sizeof(int));
8478575a350ff725842f076500eab161b39e8720938Daichi Hirono
8488575a350ff725842f076500eab161b39e8720938Daichi Hirono    // Data.
8498575a350ff725842f076500eab161b39e8720938Daichi Hirono    data.iov_base = dataBuffer;
8508575a350ff725842f076500eab161b39e8720938Daichi Hirono    data.iov_len = snprintf(dataBuffer,
8518575a350ff725842f076500eab161b39e8720938Daichi Hirono                            sizeof(dataBuffer),
8528575a350ff725842f076500eab161b39e8720938Daichi Hirono                            "200 %d AppFuse command succeeded",
8538575a350ff725842f076500eab161b39e8720938Daichi Hirono                            cli->getCmdNum()) + 1;
8548575a350ff725842f076500eab161b39e8720938Daichi Hirono
8558575a350ff725842f076500eab161b39e8720938Daichi Hirono    // Control.
8568575a350ff725842f076500eab161b39e8720938Daichi Hirono    struct cmsghdr* const controlMessage = CMSG_FIRSTHDR(&message);
8578575a350ff725842f076500eab161b39e8720938Daichi Hirono    memset(controlBuffer, 0, CMSG_SPACE(sizeof(int)));
8588575a350ff725842f076500eab161b39e8720938Daichi Hirono    controlMessage->cmsg_level = SOL_SOCKET;
8598575a350ff725842f076500eab161b39e8720938Daichi Hirono    controlMessage->cmsg_type = SCM_RIGHTS;
8608575a350ff725842f076500eab161b39e8720938Daichi Hirono    controlMessage->cmsg_len = CMSG_LEN(sizeof(int));
8618575a350ff725842f076500eab161b39e8720938Daichi Hirono    *((int *) CMSG_DATA(controlMessage)) = fd;
8628575a350ff725842f076500eab161b39e8720938Daichi Hirono
86310d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    const int result = TEMP_FAILURE_RETRY(sendmsg(cli->getSocket(), &message, 0));
86410d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    if (result == -1) {
86510d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        PLOG(ERROR) << "Failed to send FD from vold";
86610d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono        return -errno;
86710d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    }
86810d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono
86910d34887b3e00e603604e0301487f9b8222c66f4Daichi Hirono    return android::OK;
8708575a350ff725842f076500eab161b39e8720938Daichi Hirono}
871