4 * Copyright (c) 2012 Samsung Electronics Co., Ltd. All rights reserved.
6 * Contact: Garima Shrivastava<garima.s@samsung.com>
7 * Jyotsna Dhumale <jyotsna.a@samsung.com>
8 * Venkatesha Sarpangala <sarpangala.v@samsung.com>
10 * Licensed under the Apache License, Version 2.0 (the "License");
11 * you may not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
14 * http://www.apache.org/licenses/LICENSE-2.0
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS,
18 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
28 #include "app2sd_internals.h"
30 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
31 #define DMCRYPT_ITER_TIME 50
32 #define DMCRYPT_KEY_LEN 128
35 static int _app2sd_make_directory(const char *path, uid_t uid)
39 mode_t mode = DIR_PERMS;
41 struct passwd *pwd_result;
42 char buf[1024] = { 0, };
44 ret = _app2sd_delete_directory(path);
46 _E("unable to delete (%s), errno(%d)", path, errno);
47 return APP2EXT_ERROR_DELETE_DIRECTORY;
50 ret = getpwuid_r(uid, &pwd, buf, sizeof(buf), &pwd_result);
51 if (ret != 0 || pwd_result == NULL) {
52 _E("get uid failed(%d)", ret);
53 return APP2EXT_ERROR_ACCESS_FILE;
55 _D("uid(%d), gid(%d)", uid, pwd.pw_gid);
57 /* create directory */
58 ret = mkdir(path, mode);
60 if (errno != EEXIST) {
61 _E("create directory failed," \
62 " error no is (%d)", errno);
63 return APP2EXT_ERROR_CREATE_DIRECTORY;
67 fd = open(path, O_RDONLY|O_DIRECTORY);
69 _E("can't open path(%s)", path);
70 return APP2EXT_ERROR_OPEN_DIR;
73 ret = fchmod(fd, 0755);
75 _E("change file permission error");
77 return APP2EXT_ERROR_ACCESS_FILE;
80 ret = fchown(fd, uid, pwd.pw_gid);
82 _E("change file owner error");
84 return APP2EXT_ERROR_ACCESS_FILE;
89 return APP2EXT_SUCCESS;
92 char *_app2sd_find_associated_device_node(const char *loopback_device)
94 char *ret_result = NULL;
97 char dev[FILENAME_MAX] = { 0, };
100 result = (char *)_app2sd_find_associated_device(loopback_device);
101 if (result == NULL) {
102 _D("there is no the associated file (%s)", loopback_device);
106 /* process the string*/
107 snprintf(dev, FILENAME_MAX - 1, "%s", result);
109 if (strstr(dev, "dev") == NULL) {
110 _E("unable to find the associated file");
114 char *saveptr = NULL;
115 ret_result = strtok_r(dev, delims, &saveptr);
117 devnode = strdup(ret_result);
125 char *_app2sd_create_loopdevice_node(void)
127 char *ret_result = NULL;
128 mode_t mode = DIR_PERMS;
130 int ret = APP2EXT_SUCCESS;
134 result = (char *)_app2sd_find_free_device();
135 _D("find_free_device(%s)", result);
137 /* validate the result */
138 if (result == NULL || strstr(result, "/dev") == NULL) {
139 _D("no device found, creating device node");
146 char dev_path[BUF_SIZE] = { 0, };
147 snprintf(dev_path, BUF_SIZE, "/dev/loop%d", count);
148 while ((fp = fopen(dev_path, "r+")) != NULL) {
150 snprintf(dev_path, BUF_SIZE, "/dev/loop%d", count);
151 _D("next dev path for checking is (%s)",
155 _D("device node candidate is (%s)", dev_path);
157 dev_node = makedev(DEV_MAJOR, count);
158 ret = mknod(dev_path, S_IFBLK | mode, dev_node);
160 _E("error while creating the device node: errno is (%d)",
164 ret_result = (char *)malloc(strlen(dev_path) + 1);
165 if (ret_result == NULL) {
166 _E("unable to allocate memory");
169 memset(ret_result, '\0', strlen(dev_path) + 1);
170 memcpy(ret_result, dev_path, strlen(dev_path));
172 ret_result = (char *)malloc(strlen(result) + 1);
173 if (ret_result == NULL) {
179 memset(ret_result, '\0', strlen(result) + 1);
180 if (strlen(result) > 0)
181 memcpy(ret_result, result, strlen(result) - 1);
190 char *_app2sd_do_loopback_encryption_setup(const char *pkgid,
191 const char *loopback_device, uid_t uid)
193 int ret = APP2EXT_SUCCESS;
196 char *device_node = NULL;
199 _E("invalid argument");
203 /* get password for loopback encryption */
204 ret = _app2sd_initialize_db();
206 _E("app2sd db initialize failed");
210 if ((passwd = _app2sd_get_password_from_db(pkgid, uid)) == NULL) {
211 passwd = (char *)_app2sd_generate_password(pkgid);
212 if (NULL == passwd) {
213 _E("unable to generate password");
216 if ((ret = _app2sd_set_info_in_db(pkgid,
217 passwd, loopback_device, uid)) < 0) {
218 _E("unable to save info");
226 /* get free device node*/
227 device_node = _app2sd_create_loopdevice_node();
228 if (NULL == device_node) {
231 _E("unable to find free loopback node");
235 _D("device_node (%s)", device_node);
237 result = (char *)_app2sd_encrypt_device(device_node,
238 loopback_device, passwd);
239 if (result == NULL) {
240 _E("encryption failed");
245 _D("result (%s)", result);
254 char *_app2sd_do_loopback_duplicate_encryption_setup(const char *pkgid,
255 const char *temp_pkgid, const char *temp_loopback_device,
256 char *passwd, uid_t uid)
259 char *device_node = NULL;
261 if (pkgid == NULL || temp_pkgid == NULL ||
262 temp_loopback_device == NULL || passwd == NULL) {
263 _E("invalid argument");
267 /* get free device node*/
268 device_node = _app2sd_create_loopdevice_node();
269 if (NULL == device_node) {
270 _E("unable to find free loopback node");
273 result = (char *)_app2sd_encrypt_device(device_node,
274 temp_loopback_device, passwd);
275 if (result == NULL) {
276 _E("encryption failed");
279 if (strlen(result) == 0) {
284 _E("error is (%s)", result);
294 int _app2sd_remove_loopback_encryption_setup(const char *loopback_device)
296 int ret = APP2EXT_SUCCESS;
298 char *dev_node = NULL;
300 if ((dev_node = _app2sd_find_associated_device_node(loopback_device))
302 _E("Unable to find the association");
303 ret = APP2EXT_ERROR_FIND_ASSOCIATED_DEVICE_NODE;
306 result = (char *)_app2sd_detach_loop_device(dev_node);
307 if (result == NULL) {
308 _E("error in detaching");
309 ret = APP2EXT_ERROR_DETACH_LOOPBACK_DEVICE;
323 int _app2sd_remove_all_loopback_encryption_setups(const char *loopback_device)
325 int ret = APP2EXT_SUCCESS;
327 char *dev_node = NULL;
330 _app2sd_find_associated_device_node(loopback_device))
332 _E("finish to find the association");
333 ret = APP2EXT_SUCCESS;
337 _D("find node (%s)", dev_node);
339 result = (char *)_app2sd_detach_loop_device(dev_node);
340 if (result == NULL) {
341 _E("error in detaching");
342 ret = APP2EXT_ERROR_DETACH_LOOPBACK_DEVICE;
357 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
358 int _app2sd_dmcrypt_setup_device(const char *pkgid,
359 const char *loopback_device, bool is_dup, uid_t uid)
361 int ret = APP2EXT_SUCCESS;
363 char dmcrypt_setup_cmd[BUF_SIZE] = { 0, };
364 char err_buf[BUF_SIZE] = { 0, };
366 if (pkgid == NULL || loopback_device == NULL) {
367 _E("invalid argument");
368 return APP2EXT_ERROR_INVALID_ARGUMENTS;
371 /* get password for dmcrypt encryption */
372 ret = _app2sd_initialize_db();
374 _E("app2sd db initialize failed");
375 return APP2EXT_ERROR_DB_INITIALIZE;
378 passwd = _app2sd_get_password_from_db(pkgid, uid);
379 if (passwd == NULL) {
381 _E("no password found for (%s)", pkgid);
382 return APP2EXT_ERROR_SQLITE_REGISTRY;
384 passwd = (char *)_app2sd_generate_password(pkgid);
385 if (NULL == passwd) {
386 _E("unable to generate password\n");
387 return APP2EXT_ERROR_PASSWD_GENERATION;
389 if ((ret = _app2sd_set_info_in_db(pkgid, passwd,
390 loopback_device, uid)) < 0) {
391 _E("unable to save password");
394 return APP2EXT_ERROR_SQLITE_REGISTRY;
399 snprintf(dmcrypt_setup_cmd, BUF_SIZE, "/bin/echo '%s' | /sbin/cryptsetup -q -i %d " \
400 "-c aes-cbc-lmk -s %d --align-payload=8 luksFormat %s",
401 passwd, DMCRYPT_ITER_TIME, DMCRYPT_KEY_LEN, loopback_device);
403 ret = system(dmcrypt_setup_cmd);
405 strerror_r(errno, err_buf, sizeof(err_buf));
406 _E("Error setting up dmcrypt on app2sd file, " \
407 "error(%s), ret(%d)", err_buf, ret);
412 return APP2EXT_ERROR_SETUP_DMCRYPT_DEVICE;
423 int _app2sd_dmcrypt_open_device(const char *pkgid, const char *loopback_device,
424 bool is_dup, uid_t uid, char **dev_node)
426 int ret = APP2EXT_SUCCESS;
428 char dmcrypt_open_cmd[BUF_SIZE] = { 0, };
429 char dev_name[BUF_SIZE] = { 0, };
430 char buf[BUF_SIZE] = { 0, };
433 if (pkgid == NULL || loopback_device == NULL) {
434 _E("invalid argument");
435 return APP2EXT_ERROR_INVALID_ARGUMENTS;
439 snprintf(dev_name, BUF_SIZE, "%s.new_%d", pkgid, uid);
441 snprintf(dev_name, BUF_SIZE, "%s_%d", pkgid, uid);
443 /* get password for dmcrypt encryption */
444 ret = _app2sd_initialize_db();
446 _E("app2sd db initialize failed");
447 return APP2EXT_ERROR_DB_INITIALIZE;
449 if ((passwd = _app2sd_get_password_from_db(pkgid, uid)) == NULL) {
450 _E("no password found for [%s]", pkgid);
451 return APP2EXT_ERROR_SQLITE_REGISTRY;
454 snprintf(dmcrypt_open_cmd, BUF_SIZE, "/bin/echo '%s' | /sbin/cryptsetup -q luksOpen %s %s",
455 passwd, loopback_device, dev_name);
457 ret = system(dmcrypt_open_cmd);
459 strerror_r(errno, buf, sizeof(buf));
460 _E("error opening dmcrypt device, error: [%s]", buf);
461 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
464 snprintf(buf, BUF_SIZE, "/dev/mapper/%s", dev_name);
466 *dev_node = (char *)calloc(len + 1, sizeof(char));
467 if (*dev_node == NULL) {
468 _E("memory alloc failed");
469 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
471 snprintf(*dev_node, len + 1, "%s", buf);
476 int _app2sd_dmcrypt_close_device(const char *pkgid, uid_t uid)
478 int ret = APP2EXT_SUCCESS;
479 char dev_node[BUF_SIZE] = { '\0' };
480 char dmcrypt_close_cmd[BUF_SIZE] = { '\0' };
481 char err_buf[BUF_SIZE] = { '\0' };
482 char *t_dev_node = NULL;
485 _E("invalid argument\n");
486 return APP2EXT_ERROR_INVALID_ARGUMENTS;
489 t_dev_node = _app2sd_find_associated_dmcrypt_device_node(pkgid, uid);
491 _E("no associated device node(%s_%d) found", pkgid, uid);
492 return APP2EXT_ERROR_DMCRYPT_DEVICE_UNAVAILABLE;
498 snprintf(dev_node, BUF_SIZE, "/dev/mapper/%s_%d", pkgid, uid);
499 snprintf(dmcrypt_close_cmd, BUF_SIZE, "/sbin/cryptsetup -q luksClose %s", dev_node);
500 ret = system(dmcrypt_close_cmd);
502 strerror_r(errno, err_buf, sizeof(err_buf));
503 _E("error closing dmcrypt on app2sd file,"\
504 " error: [%s]", err_buf);
505 return APP2EXT_ERROR_CLOSE_DMCRYPT_DEVICE;
511 char *_app2sd_find_associated_dmcrypt_device_node(const char *pkgid, uid_t uid)
513 char *dev_node = NULL;
514 char buf[BUF_SIZE] = { 0, };
517 snprintf(buf, BUF_SIZE, "/dev/mapper/%s_%d", pkgid, uid);
519 dev_node = (char *)calloc(len + 1, sizeof(char));
520 if (dev_node == NULL) {
521 _E("memory alloc failed");
524 snprintf(dev_node, len + 1, "%s", buf);
526 if (access(dev_node, F_OK) == 0) {
527 _D("device_node: (%s)", dev_node);
537 char *_app2sd_dmcrypt_duplicate_encryption_setup(const char *pkgid,
538 const char *temp_loopback_device, uid_t uid)
540 int ret = APP2EXT_SUCCESS;
541 char *device_node = NULL;
543 if (pkgid == NULL || temp_loopback_device == NULL) {
544 _E("invalid argument\n");
548 ret = _app2sd_dmcrypt_setup_device(pkgid, temp_loopback_device, true, uid);
550 _E("dmcrypt setup device error(%d)", ret);
554 ret = _app2sd_dmcrypt_open_device(pkgid, temp_loopback_device, true,
557 _E("dmcrypt open device error");
565 int _app2sd_create_loopback_device(const char *pkgid,
566 const char *loopback_device, int size)
568 int ret = APP2EXT_SUCCESS;
569 char command[FILENAME_MAX] = { 0, };
570 char buff[BUF_SIZE] = { 0, };
573 if (NULL == pkgid || size <= 0) {
574 _E("invalid argument");
575 return APP2EXT_ERROR_INVALID_ARGUMENTS;
577 snprintf(command, FILENAME_MAX - 1, "of=%s", loopback_device);
578 snprintf(buff, BUF_SIZE - 1, "count=%d", size);
580 const char *argv1[] = { "/bin/dd", "if=/dev/zero",
581 command, "bs=1M", buff, NULL };
583 if ((fp = fopen(loopback_device, "r+")) != NULL) {
584 _W("encrypted file already exists (%s)",
587 return APP2EXT_ERROR_PKG_EXISTS;
590 ret = _xsystem(argv1);
592 _E("command (%s) failed, ret(%d), errno(%d)", command, ret, errno);
597 int _app2sd_delete_loopback_device(const char *loopback_device)
599 int ret = APP2EXT_SUCCESS;
601 ret = unlink(loopback_device);
603 if (errno == ENOENT) {
604 _W("unable to access file (%s)", loopback_device);
606 _E("unable to delete (%s)", loopback_device);
607 return APP2EXT_ERROR_DELETE_LOOPBACK_DEVICE;
611 return APP2EXT_SUCCESS;
614 int _app2sd_create_file_system(const char *device_path)
616 int ret = APP2EXT_SUCCESS;
618 char err_buf[1024] = {0,};
620 if (device_path == NULL) {
622 return APP2EXT_ERROR_INVALID_ARGUMENTS;
625 /* Format the filesystem [create a filesystem]*/
626 const char *argv[] = { "/sbin/mkfs.ext4", device_path, NULL };
627 fp = fopen(device_path, "r+");
629 strerror_r(errno, err_buf, sizeof(err_buf));
630 _E("unable to access (%s) error is (%d, %s)",
631 device_path, errno, err_buf);
632 return APP2EXT_ERROR_ACCESS_FILE;
636 ret = _xsystem(argv);
638 strerror_r(errno, err_buf, sizeof(err_buf));
639 _E("creating file system failed, error is (%s)",
641 return APP2EXT_ERROR_CREATE_FS;
646 static int _app2sd_create_dir_with_link(const char *application_path,
647 const char *pkgid, const char *dir_name, uid_t uid)
649 int ret = APP2EXT_SUCCESS;
650 char application_dir_mmc_path[FILENAME_MAX] = { 0, };
651 char application_dir_path[FILENAME_MAX] = { 0, };
653 snprintf(application_dir_mmc_path, FILENAME_MAX - 1, "%s/.mmc/%s",
654 application_path, dir_name);
655 snprintf(application_dir_path, FILENAME_MAX, "%s/%s",
656 application_path, dir_name);
658 ret = _app2sd_make_directory(application_dir_mmc_path, uid);
660 _E("create directory failed");
661 return APP2EXT_ERROR_CREATE_DIRECTORY;
664 if ((ret = symlink(application_dir_mmc_path,
665 application_dir_path)) < 0) {
666 if (errno == EEXIST) {
667 _D("file with symlink name present (%s)",
668 application_dir_path);
670 _E("symbolic link creation "
671 "failed, error no is (%d)", errno);
672 return APP2EXT_ERROR_CREATE_SYMLINK;
676 return APP2EXT_SUCCESS;
679 static int _app2sd_create_directory_entry(const char *application_path,
680 const char *pkgid, GList *dir_list, uid_t uid)
682 int ret = APP2EXT_SUCCESS;
684 app2ext_dir_details *dir_detail = NULL;
686 list = g_list_first(dir_list);
688 dir_detail = (app2ext_dir_details *)list->data;
689 if (dir_detail && dir_detail->name
690 && dir_detail->type == APP2EXT_DIR_RO) {
691 ret = _app2sd_create_dir_with_link(application_path,
692 pkgid, dir_detail->name, uid);
696 list = g_list_next(list);
698 return APP2EXT_SUCCESS;
701 int _app2sd_mount_app_content(const char *application_path, const char *pkgid,
702 const char *dev, int mount_type, GList *dir_list,
703 app2sd_cmd cmd, uid_t uid)
705 int ret = APP2EXT_SUCCESS;
707 char application_mmc_path[FILENAME_MAX] = { 0, };
708 char temp_path[FILENAME_MAX] = { 0, };
709 char err_buf[1024] = {0,};
710 struct timespec time = {
712 .tv_nsec = 1000 * 1000 * 200
716 _E("input param is NULL (%s)",
718 return APP2EXT_ERROR_INVALID_ARGUMENTS;
721 /* check directory existence */
722 fd = open(application_path, O_RDONLY|O_DIRECTORY);
724 _E("path(%s) error(%d)", application_path, errno);
725 return APP2EXT_ERROR_OPEN_DIR;
729 snprintf(application_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
731 fd = open(application_mmc_path, O_RDONLY|O_DIRECTORY);
733 _E("path(%s) error(%d)", application_mmc_path, errno);
734 return APP2EXT_ERROR_OPEN_DIR;
738 nanosleep(&time, NULL); /* 200ms sleep */
739 _D("give a delay for mount");
741 switch (mount_type) {
743 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
744 MS_MGC_VAL | MS_RDONLY | MS_NOSUID, NULL)) < 0) {
745 _E("read only mount failed, " \
747 "dev is (%s) path is (%s)",
748 errno, dev, application_mmc_path);
749 ret = APP2EXT_ERROR_MOUNT;
753 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
754 MS_MGC_VAL | MS_NOSUID, NULL)) < 0) {
755 _E("read write mount failed, " \
756 "errono is (%d)", errno);
757 ret = APP2EXT_ERROR_MOUNT;
760 case MOUNT_TYPE_RW_NOEXEC:
761 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
762 MS_MGC_VAL | MS_NOEXEC | MS_NOSUID, NULL)) < 0) {
763 _E("rwnx mount failed " \
764 "errono is (%d)", errno);
765 ret = APP2EXT_ERROR_MOUNT;
768 case MOUNT_TYPE_RD_REMOUNT:
769 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
770 MS_MGC_VAL | MS_RDONLY | MS_REMOUNT | MS_NOSUID,
772 _E("read remount failed "
773 "errono is (%d)", errno);
774 ret = APP2EXT_ERROR_MOUNT;
777 case MOUNT_TYPE_RW_REMOUNT:
778 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
779 MS_MGC_VAL | MS_REMOUNT | MS_NOSUID, NULL)) < 0) {
780 _E("read write remount failed "
781 "errono(%d), errstr(%s)", errno,
782 strerror_r(errno, err_buf, sizeof(err_buf)));
783 ret = APP2EXT_ERROR_MOUNT;
787 _E("invalid mount type");
791 if (cmd == APP2SD_PRE_INSTALL || cmd == APP2SD_MOVE_APP_TO_MMC ||
792 cmd == APP2SD_PRE_UPGRADE) {
793 ret = _app2sd_create_directory_entry(application_path,
794 pkgid, dir_list, uid);
797 if (mount_type != MOUNT_TYPE_RD &&
798 mount_type != MOUNT_TYPE_RD_REMOUNT) {
799 /* change lost+found permission */
800 snprintf(temp_path, FILENAME_MAX - 1, "%s/lost+found",
801 application_mmc_path);
802 ret = _app2sd_make_directory(temp_path, uid);
804 _E("create directory(%s) failed", temp_path);
805 return APP2EXT_ERROR_CREATE_DIRECTORY;
812 int _app2sd_unmount_app_content(const char *application_path)
814 int ret = APP2EXT_SUCCESS;
815 char application_dir_mmc_path[FILENAME_MAX] = { 0, };
816 char err_buf[1024] = {0,};
818 snprintf(application_dir_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
820 if ((ret = umount(application_dir_mmc_path)) < 0) {
821 strerror_r(errno, err_buf, sizeof(err_buf));
822 _E("unable to umount the dir, ret(%d) error(%d, %s)",
823 ret, errno, err_buf);
829 static int _app2sd_move_to_archive(const char *src_path, const char *arch_path)
831 int ret = APP2EXT_SUCCESS;
833 ret = _app2sd_copy_dir(src_path, arch_path);
834 if (ret && ret != APP2EXT_ERROR_ACCESS_FILE) {
835 char err_buf[1024] = {0,};
836 strerror_r(errno, err_buf, sizeof(err_buf));
837 _E("unable to copy from (%s) to (%s), err is (%s)",
838 src_path, arch_path, err_buf);
839 return APP2EXT_ERROR_MOVE;
842 ret = _app2sd_delete_directory((char *)src_path);
844 _E("unable to delete (%s)", src_path);
845 return APP2EXT_ERROR_DELETE_DIRECTORY;
851 static int _app2sd_move_app_to_external(const char *pkgid, GList *dir_list,
852 uid_t uid, char *mmc_path)
854 int ret = APP2EXT_SUCCESS;
855 mode_t mode = DIR_PERMS;
856 char temp_dir_path[FILENAME_MAX] = { 0, };
857 char application_mmc_path[FILENAME_MAX] = { 0, };
858 char application_archive_path[FILENAME_MAX] = { 0, };
859 char application_path[FILENAME_MAX] = { 0, };
860 char loopback_device[FILENAME_MAX] = { 0, };
861 unsigned long long total_size = 0;
863 int reqd_disk_size = 0;
864 char *device_node = NULL;
865 #if !defined(TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION)
868 int free_mmc_mem = 0;
871 app2ext_dir_details *dir_detail = NULL;
872 char err_buf[1024] = { 0,};
873 char *encoded_id = NULL;
875 encoded_id = _app2sd_get_encoded_name(pkgid, uid);
876 if (encoded_id == NULL)
877 return APP2EXT_ERROR_MEMORY_ALLOC_FAILED;
879 snprintf(loopback_device, FILENAME_MAX - 1, "%s/%s/%s",
880 mmc_path, EXTIMG_DIR, encoded_id);
882 if (_is_global(uid)) {
883 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
884 tzplatform_getenv(TZ_SYS_RW_APP), pkgid);
886 tzplatform_set_user(uid);
887 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
888 tzplatform_getenv(TZ_USER_APP), pkgid);
889 tzplatform_reset_user();
892 /* check whether application is in external memory or not */
893 fp = fopen(loopback_device, "r+");
895 _W("Already %s entry is present in the SD Card, " \
896 "delete entry and go on without return", pkgid);
898 _app2sd_force_clean(pkgid, application_path, loopback_device, uid);
901 snprintf(application_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
903 snprintf(application_archive_path, FILENAME_MAX - 1, "%s/.archive",
906 ret = mkdir(application_mmc_path, mode);
908 if (errno != EEXIST) {
909 _E("unable to create directory for archiving," \
910 " error(%d)", errno);
911 return APP2EXT_ERROR_CREATE_DIRECTORY;
915 ret = mkdir(application_archive_path, mode);
917 if (errno != EEXIST) {
918 _E("unable to create directory for archiving," \
919 " error(%d)", errno);
920 return APP2EXT_ERROR_CREATE_DIRECTORY;
924 list = g_list_first(dir_list);
926 dir_detail = (app2ext_dir_details *)list->data;
927 if (dir_detail && dir_detail->name
928 && dir_detail->type == APP2EXT_DIR_RO) {
929 memset(temp_dir_path, '\0', FILENAME_MAX);
930 snprintf(temp_dir_path, FILENAME_MAX,
931 "%s/%s", application_path,
933 _D("cal size of app dirs, temp_dir_path(%s)",
936 _app2sd_calculate_dir_size(temp_dir_path);
938 list = g_list_next(list);
941 reqd_size = ((total_size) / (1024 * 1024)) + 2;
942 reqd_disk_size = reqd_size + ceil(reqd_size * 0.2);
944 /* find avialable free memory in the MMC card */
945 ret = _app2sd_get_available_free_memory(mmc_path, &free_mmc_mem);
947 _E("unable to get available free memory in MMC (%d)", ret);
948 return APP2EXT_ERROR_MMC_STATUS;
950 /* if avaialalbe free memory in MMC is less than
951 * required size + 5MB, return error
953 if (reqd_disk_size > free_mmc_mem) {
954 _E("insufficient memory in MMC for application installation (%d)",
956 return APP2EXT_ERROR_MMC_INSUFFICIENT_MEMORY;
958 /* create a loopback device */
959 ret = _app2sd_create_loopback_device(pkgid, loopback_device,
960 (reqd_disk_size + PKG_BUF_SIZE));
962 _E("loopback node creation failed");
966 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
967 ret = _app2sd_dmcrypt_setup_device(pkgid, loopback_device, false, uid);
969 _E("dmcrypt setup device error(%d)", ret);
970 return APP2EXT_ERROR_SETUP_DMCRYPT_DEVICE;
973 ret = _app2sd_dmcrypt_open_device(pkgid, loopback_device, false,
976 _E("dmcrypt open device error");
977 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
980 /* perform loopback encryption setup */
981 device_node = _app2sd_do_loopback_encryption_setup(pkgid,
982 loopback_device, uid);
984 _E("loopback encryption setup failed");
985 return APP2EXT_ERROR_DO_LOSETUP;
987 _D("device_node (%s)", device_node);
988 /* check whether loopback device is associated with device node or not */
989 devi = _app2sd_find_associated_device_node(loopback_device);
991 _E("finding associated device node failed");
992 ret = APP2EXT_ERROR_DO_LOSETUP;
999 /* format the loopback file system */
1000 ret = _app2sd_create_file_system(device_node);
1002 _E("create ext4 filesystem failed");
1003 ret = APP2EXT_ERROR_CREATE_FS;
1007 list = g_list_first(dir_list);
1009 dir_detail = (app2ext_dir_details *)list->data;
1010 if (dir_detail && dir_detail->name
1011 && dir_detail->type == APP2EXT_DIR_RO) {
1012 memset(temp_dir_path, '\0', FILENAME_MAX);
1013 snprintf(temp_dir_path, FILENAME_MAX,
1014 "%s/%s", application_path,
1016 _D("app2archive, temp_dir_path(%s)",
1018 ret = _app2sd_move_to_archive(temp_dir_path,
1019 application_archive_path);
1021 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1022 _E("unable to access (%s)",
1025 _E("unable to copy from (%s) to (%s)",
1027 application_archive_path);
1032 list = g_list_next(list);
1035 /* mount the loopback encrypted pseudo device on application installation path
1036 * as with Read Write permission
1038 ret = _app2sd_mount_app_content(application_path, pkgid, device_node,
1039 MOUNT_TYPE_RW, dir_list, APP2SD_MOVE_APP_TO_MMC, uid);
1045 list = g_list_first(dir_list);
1047 dir_detail = (app2ext_dir_details *)list->data;
1048 if (dir_detail && dir_detail->name
1049 && dir_detail->type == APP2EXT_DIR_RO) {
1050 memset(temp_dir_path, '\0', FILENAME_MAX);
1051 snprintf(temp_dir_path, FILENAME_MAX,
1052 "%s/%s", application_archive_path,
1054 _D("archive2mmc, temp_dir_path(%s)",
1056 ret = _app2sd_copy_dir(temp_dir_path,
1057 application_mmc_path);
1059 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1060 _E("unable to access (%s)",
1064 err_buf, sizeof(err_buf));
1065 _E("unable to copy from (%s) to (%s)," \
1068 application_mmc_path, err_buf);
1072 ret = _app2sd_delete_directory(temp_dir_path);
1074 _E("unable to delete (%s)", temp_dir_path);
1078 list = g_list_next(list);
1081 ret = _app2sd_delete_directory(application_archive_path);
1083 _E("unable to delete (%s)", application_archive_path);
1084 ret = APP2EXT_ERROR_DELETE_DIRECTORY;
1088 return APP2EXT_SUCCESS;
1099 static int _app2sd_move_app_to_internal(const char *pkgid, GList *dir_list,
1100 uid_t uid, char *mmc_path)
1102 int ret = APP2EXT_SUCCESS;
1103 mode_t mode = DIR_PERMS;
1104 char temp_dir_path[FILENAME_MAX] = { 0, };
1105 char application_mmc_path[FILENAME_MAX] = { 0, };
1106 char application_archive_path[FILENAME_MAX] = { 0, };
1107 char application_path[FILENAME_MAX] = { 0, };
1108 char loopback_device[FILENAME_MAX] = { 0, };
1109 char *device_node = NULL;
1112 app2ext_dir_details *dir_detail = NULL;
1114 int free_internal_mem = 0;
1115 struct statvfs buf = {0,};
1116 unsigned long long temp = 0;
1117 char err_buf[1024] = {0,};
1118 char *encoded_id = NULL;
1120 encoded_id = _app2sd_get_encoded_name(pkgid, uid);
1121 if (encoded_id == NULL)
1122 return APP2EXT_ERROR_MEMORY_ALLOC_FAILED;
1124 snprintf(loopback_device, FILENAME_MAX - 1, "%s/%s/%s",
1125 mmc_path, EXTIMG_DIR, encoded_id);
1127 if (_is_global(uid)) {
1128 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
1129 tzplatform_getenv(TZ_SYS_RW_APP), pkgid);
1131 tzplatform_set_user(uid);
1132 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
1133 tzplatform_getenv(TZ_USER_APP), pkgid);
1134 tzplatform_reset_user();
1137 /* check whether application is in external memory or not */
1138 fp = fopen(loopback_device, "r+");
1140 _E("application (%s) is not installed on SD Card",
1142 return APP2EXT_ERROR_FILE_ABSENT;
1148 memset((void *)&buf, '\0', sizeof(struct statvfs));
1149 ret = statvfs(INTERNAL_STORAGE_PATH, &buf);
1151 temp = (buf.f_bsize * buf.f_bavail) / (1024 * 1024);
1152 free_internal_mem = (int)temp;
1154 _E("unable to get internal storage size");
1155 return APP2EXT_ERROR_MMC_INSUFFICIENT_MEMORY;
1158 fp = fopen(loopback_device, "r+");
1160 _E("app entry is not present in SD card");
1161 return APP2EXT_ERROR_INVALID_PACKAGE;
1165 /* get installed app size*/
1166 temp = _app2sd_calculate_file_size(loopback_device);
1167 reqd_size = (int)((temp) / (1024 * 1024));
1168 _D("reqd size is (%d)", reqd_size);
1170 if (reqd_size == 0) {
1171 _E("app entry is not present in SD Card");
1172 return APP2EXT_ERROR_LOOPBACK_DEVICE_UNAVAILABLE;
1175 _D("reqd size: (%d)MB, free internal mem: (%d)MB",
1176 reqd_size, free_internal_mem);
1178 /* if avaialalbe free memory in internal storage is
1179 * less than required size, return error
1181 if (reqd_size > free_internal_mem) {
1182 _E("innsufficient memory in internal storage" \
1183 " for application installation (%d)", ret);
1184 return APP2EXT_ERROR_MMC_INSUFFICIENT_MEMORY;
1187 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1189 _app2sd_find_associated_dmcrypt_device_node(pkgid, uid);
1191 device_node = _app2sd_find_associated_device_node(loopback_device);
1193 if (NULL == device_node) {
1194 /* do loopback setup */
1195 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1196 ret = _app2sd_dmcrypt_open_device(pkgid, loopback_device,
1197 false, uid, &device_node);
1199 _E("dmcrypt open device error(%d)", ret);
1200 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
1203 device_node = _app2sd_do_loopback_encryption_setup(pkgid,
1204 loopback_device, uid);
1205 if (device_node == NULL) {
1206 _E("loopback encryption setup failed");
1207 return APP2EXT_ERROR_DO_LOSETUP;
1211 ret = _app2sd_mount_app_content(application_path,
1212 pkgid, device_node, MOUNT_TYPE_RW,
1213 dir_list, APP2SD_MOVE_APP_TO_PHONE, uid);
1216 ret = APP2EXT_ERROR_MOUNT_PATH;
1220 /* do re-mounting */
1221 ret = _app2sd_mount_app_content(application_path,
1222 pkgid, device_node, MOUNT_TYPE_RW_REMOUNT,
1223 dir_list, APP2SD_MOVE_APP_TO_PHONE, uid);
1225 _E("re-mount failed");
1226 ret = APP2EXT_ERROR_MOUNT_PATH;
1231 snprintf(application_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
1233 snprintf(application_archive_path, FILENAME_MAX - 1, "%s/.archive",
1236 ret = mkdir(application_archive_path, mode);
1238 if (errno != EEXIST) {
1239 _E("unable to create directory for archiving," \
1240 " error(%d)", errno);
1241 ret = APP2EXT_ERROR_CREATE_DIRECTORY;
1246 list = g_list_first(dir_list);
1248 dir_detail = (app2ext_dir_details *)list->data;
1249 if (dir_detail && dir_detail->name
1250 && dir_detail->type == APP2EXT_DIR_RO) {
1251 /* archiving code */
1252 memset(temp_dir_path, '\0', FILENAME_MAX);
1253 snprintf(temp_dir_path, FILENAME_MAX,
1254 "%s/%s", application_mmc_path,
1256 _D("mmc2archive, temp_dir_path(%s)", temp_dir_path);
1257 ret = _app2sd_copy_dir(temp_dir_path,
1258 application_archive_path);
1260 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1261 _E("unable to access (%s)",
1265 err_buf, sizeof(err_buf));
1266 _E("unable to copy from (%s) to (%s),"
1269 application_archive_path, err_buf);
1274 /* delete the symbolic link files [bin, lib, res]*/
1275 memset(temp_dir_path, '\0', FILENAME_MAX);
1276 snprintf(temp_dir_path, FILENAME_MAX,
1277 "%s/%s", application_path,
1279 _D("unlink, temp_dir_path(%s)", temp_dir_path);
1280 ret = unlink(temp_dir_path);
1282 if (errno == ENOENT) {
1283 _W("directory (%s) does not exist",
1286 _E("unable to remove the symbolic link file (%s)," \
1287 " it is already unlinked",
1293 /* Copy content to destination */
1294 memset(temp_dir_path, '\0', FILENAME_MAX);
1295 snprintf(temp_dir_path, FILENAME_MAX,
1296 "%s/%s", application_archive_path,
1298 _D("archive2app, temp_dir_path(%s)", temp_dir_path);
1299 ret = _app2sd_copy_dir(temp_dir_path, application_path);
1301 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1302 _E("unable to access (%s)",
1306 err_buf, sizeof(err_buf));
1307 _E("unable to copy from (%s) to (%s) " \
1310 application_path, err_buf);
1315 list = g_list_next(list);
1318 _D("copying file completed");
1319 ret = _app2sd_unmount_app_content(application_path);
1321 _E("unable to unmount SD directory for app (%s)",
1324 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1325 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1327 _E("close dmcrypt device error(%d)", ret);
1329 ret = _app2sd_remove_loopback_encryption_setup(loopback_device);
1331 _E("unable to detach loopback setup for (%s)",
1335 ret = _app2sd_delete_loopback_device(loopback_device);
1337 _E("unable to delete the loopback device for (%s)",
1340 ret = _app2sd_delete_directory(application_mmc_path);
1342 _E("unable to delete (%s)", application_mmc_path);
1344 ret = _app2sd_delete_directory(application_archive_path);
1346 _E("unable to delete (%s)", application_archive_path);
1348 /* remove passwrd from DB */
1349 ret = _app2sd_initialize_db();
1351 _E("app2sd db initialize failed");
1353 ret = _app2sd_remove_info_from_db(pkgid, uid);
1355 _E("cannot remove info from db");
1357 return APP2EXT_SUCCESS;
1368 int _app2sd_usr_move_app(const char *pkgid, app2ext_move_type move_type,
1369 GList *dir_list, uid_t uid, char *mmc_path)
1371 int ret = APP2EXT_SUCCESS;
1373 switch (move_type) {
1374 case APP2EXT_MOVE_TO_EXT:
1375 ret = _app2sd_move_app_to_external(pkgid, dir_list,
1378 _E("move app to external memory failed(%d)", ret);
1382 case APP2EXT_MOVE_TO_PHONE:
1383 ret = _app2sd_move_app_to_internal(pkgid, dir_list,
1386 _E("move app to internal memory failed(%d)", ret);
1391 _E("invalid argument");
1392 return APP2EXT_ERROR_INVALID_ARGUMENTS;
1398 int _app2sd_copy_ro_content(const char *src, const char *dest, GList *dir_list)
1400 char path[FILENAME_MAX] = { 0, };
1401 int ret = APP2EXT_SUCCESS;
1403 app2ext_dir_details *dir_detail = NULL;
1405 list = g_list_first(dir_list);
1407 dir_detail = (app2ext_dir_details *)list->data;
1408 if (dir_detail && dir_detail->name
1409 && dir_detail->type == APP2EXT_DIR_RO) {
1410 memset((void *)&path, '\0', FILENAME_MAX);
1411 snprintf(path, FILENAME_MAX - 1, "%s/%s", src,
1413 ret = _app2sd_copy_dir(path, dest);
1415 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1416 _E("unable to access (%s)", path);
1418 _E("unable to copy from (%s) " \
1419 "to (%s), errno is (%d)",
1421 return APP2EXT_ERROR_MOVE;
1425 list = g_list_next(list);
1428 return APP2EXT_SUCCESS;
1431 int _app2sd_duplicate_device(const char *pkgid,
1432 const char *loopback_device,
1433 const char *temp_pkgid,
1434 const char *temp_application_path,
1435 const char *temp_loopback_device,
1436 GList *dir_list, char *dev_node, int size,
1441 #if !defined(TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION)
1443 char *result = NULL;
1444 char *passwd = NULL;
1447 /* create a new loopback device */
1448 ret = _app2sd_create_loopback_device(temp_pkgid,
1449 temp_loopback_device, (size + PKG_BUF_SIZE));
1451 _E("package already present");
1455 /* perform loopback encryption setup */
1456 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1457 dev_node = _app2sd_dmcrypt_duplicate_encryption_setup(pkgid,
1458 temp_loopback_device, uid);
1460 _E("dmcrypt duplicate encryption setup failed");
1461 _app2sd_delete_loopback_device(temp_loopback_device);
1462 return APP2EXT_ERROR_SETUP_DMCRYPT_DEVICE;
1465 /* get password for loopback encryption */
1466 ret = _app2sd_initialize_db();
1468 _E("app2sd db initialize failed");
1469 return APP2EXT_ERROR_DB_INITIALIZE;
1472 if ((passwd = _app2sd_get_password_from_db(pkgid, uid)) == NULL) {
1473 passwd = (char *)_app2sd_generate_password(pkgid);
1474 if (NULL == passwd) {
1475 _E("unable to generate password");
1476 return APP2EXT_ERROR_PASSWD_GENERATION;
1478 if ((ret = _app2sd_set_info_in_db(pkgid,
1479 passwd, loopback_device, uid)) < 0) {
1480 _E("unable to save info");
1483 return APP2EXT_ERROR_SQLITE_REGISTRY;
1488 dev_node = _app2sd_do_loopback_duplicate_encryption_setup(pkgid,
1489 temp_pkgid, temp_loopback_device, passwd, uid);
1491 _E("losetup failed, device node is (%s)", dev_node);
1492 _app2sd_delete_loopback_device(temp_loopback_device);
1495 return APP2EXT_ERROR_DO_LOSETUP;
1499 _D("duplicate setup SUCCESS");
1501 /* check whether loopback device is associated with
1502 * device node or not
1504 devi = _app2sd_find_associated_device_node(temp_loopback_device);
1506 _E("finding associated device node failed");
1507 err_res = APP2EXT_ERROR_DO_LOSETUP;
1510 _D("losetup SUCCESS");
1513 /* format the loopback file system */
1514 ret = _app2sd_create_file_system(dev_node);
1516 _E("creating fs failed");
1517 err_res = APP2EXT_ERROR_CREATE_FS;
1520 _D("create filesystem SUCCESS");
1522 /* do mounting for new dev*/
1523 ret = _app2sd_mount_app_content(temp_application_path, pkgid,
1524 dev_node, MOUNT_TYPE_RW, dir_list,
1525 APP2SD_PRE_UPGRADE, uid);
1527 _E("remount failed");
1528 err_res = APP2EXT_ERROR_MOUNT_PATH;
1532 #if !defined(TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION)
1539 return APP2EXT_SUCCESS;
1543 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1544 ret = _app2sd_dmcrypt_close_device(temp_pkgid, uid);
1546 _E("close dmcrypt device error(%d)", ret);
1548 result = _app2sd_detach_loop_device(dev_node);
1554 _app2sd_delete_loopback_device(temp_loopback_device);
1562 int _app2sd_update_loopback_device_size(const char *pkgid,
1563 const char *loopback_device,
1564 const char *application_path,
1565 const char *temp_pkgid,
1566 const char *temp_loopback_device,
1567 const char *temp_application_path,
1568 int size, GList *dir_list,
1572 char *device_node = NULL;
1573 char *old_device_node = NULL;
1575 char application_mmc_path[FILENAME_MAX] = { 0, };
1576 char temp_application_mmc_path[FILENAME_MAX] = { 0, };
1578 ret = _app2sd_duplicate_device(pkgid, loopback_device,
1579 temp_pkgid, temp_application_path, temp_loopback_device,
1580 dir_list, device_node, size, uid);
1582 _E("creating duplicate device failed");
1586 /* get the associated device node for SD card applicatione */
1587 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1589 _app2sd_find_associated_dmcrypt_device_node(pkgid, uid);
1591 old_device_node = _app2sd_find_associated_device_node(loopback_device);
1593 if (NULL == old_device_node) {
1594 /* do loopback setup */
1595 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1596 ret = _app2sd_dmcrypt_open_device(pkgid, loopback_device,
1597 false, uid, &old_device_node);
1599 _E("dmcrypt open device error");
1600 err_res = APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
1604 old_device_node = _app2sd_do_loopback_encryption_setup(pkgid,
1605 loopback_device, uid);
1606 if (old_device_node == NULL) {
1607 _E("loopback encryption setup failed");
1608 err_res = APP2EXT_ERROR_DO_LOSETUP;
1613 ret = _app2sd_mount_app_content(application_path, pkgid,
1614 old_device_node, MOUNT_TYPE_RW, dir_list,
1615 APP2SD_PRE_UPGRADE, uid);
1617 _E("remount failed");
1618 err_res = APP2EXT_ERROR_MOUNT_PATH;
1621 /* do re-mounting */
1622 ret = _app2sd_mount_app_content(application_path, pkgid,
1623 old_device_node, MOUNT_TYPE_RW_REMOUNT, dir_list,
1624 APP2SD_PRE_UPGRADE, uid);
1626 _E("remount failed");
1627 err_res = APP2EXT_ERROR_MOUNT_PATH;
1631 snprintf(application_mmc_path, FILENAME_MAX - 1,
1632 "%s/.mmc", application_path);
1633 snprintf(temp_application_mmc_path, FILENAME_MAX - 1,
1634 "%s/.mmc", temp_application_path);
1636 ret = _app2sd_copy_ro_content(application_mmc_path,
1637 temp_application_mmc_path, dir_list);
1639 _E("copy ro content failed");
1643 ret = _app2sd_unmount_app_content(application_path);
1645 _E("unable to unmount the SD application");
1646 err_res = APP2EXT_ERROR_UNMOUNT;
1649 ret = _app2sd_unmount_app_content(temp_application_path);
1651 _E("unable to unmount the SD application");
1652 err_res = APP2EXT_ERROR_UNMOUNT;
1656 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1657 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1659 _E("close dmcrypt device error(%d)", ret);
1660 err_res = APP2EXT_ERROR_CLOSE_DMCRYPT_DEVICE;
1664 ret = _app2sd_dmcrypt_close_device(temp_pkgid, uid);
1666 _E("close dmcrypt device error(%d)", ret);
1667 err_res = APP2EXT_ERROR_CLOSE_DMCRYPT_DEVICE;
1671 ret = _app2sd_remove_loopback_encryption_setup(loopback_device);
1673 _E("unable to remove loopback setup");
1674 err_res = APP2EXT_ERROR_DELETE_LOOPBACK_DEVICE;
1677 ret = _app2sd_remove_loopback_encryption_setup(temp_loopback_device);
1679 _E("unable to remove loopback setup");
1680 err_res = APP2EXT_ERROR_DELETE_LOOPBACK_DEVICE;
1685 ret = _app2sd_delete_directory(loopback_device);
1687 _E("unable to delete (%s)", loopback_device);
1688 err_res = APP2EXT_ERROR_DELETE_DIRECTORY;
1692 ret = _app2sd_rename_dir(temp_loopback_device, loopback_device);
1694 _E("unable to rename (%s)", temp_loopback_device);
1695 err_res = APP2EXT_ERROR_MOVE;
1699 ret = _app2sd_delete_directory(temp_application_path);
1701 _E("unable to delete (%s)", temp_application_path);
1702 err_res = APP2EXT_ERROR_DELETE_DIRECTORY;
1706 return APP2EXT_SUCCESS;
1709 if (old_device_node) {
1710 free(old_device_node);
1711 old_device_node = NULL;
1714 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1715 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1717 _E("close dmcrypt device error(%d)", ret);
1719 ret = _app2sd_dmcrypt_close_device(temp_pkgid, uid);
1722 _E("close dmcrypt device error(%d)", ret);
1724 ret = _app2sd_remove_loopback_encryption_setup(loopback_device);
1726 _E("unable to remove loopback setup");
1728 ret = _app2sd_remove_loopback_encryption_setup(temp_loopback_device);
1730 _E("unable to remove loopback setup");
1733 _app2sd_delete_loopback_device(temp_loopback_device);
1735 ret = _app2sd_delete_directory(temp_application_path);
1737 _E("unable to delete (%s)", temp_application_path);
1742 int _app2sd_force_clean(const char *pkgid, const char *application_path,
1743 const char *loopback_device, uid_t uid)
1745 int ret = APP2EXT_SUCCESS;
1747 /* unmount the loopback encrypted pseudo device from the application installation path */
1748 ret = _app2sd_unmount_app_content(application_path);
1750 _E("unable to unmount the app content (%d)", ret);
1752 /* detach the loopback encryption setup for the application */
1753 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1754 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1756 _E("close dmcrypt device error (%d)", ret);
1758 ret = _app2sd_remove_all_loopback_encryption_setups(loopback_device);
1760 _E("unable to detach the loopback encryption setup for the application");
1763 /* delete the loopback device from the SD card */
1764 ret = _app2sd_delete_loopback_device(loopback_device);
1766 _E("unable to detach the loopback encryption setup for the application");
1768 /* delete symlink */
1769 _app2sd_delete_symlink(application_path);
1771 /* remove passwrd from DB */
1772 ret = _app2sd_initialize_db();
1774 _E("app2sd db initialize failed");
1776 ret = _app2sd_remove_info_from_db(pkgid, uid);
1778 _E("cannot remove info from db");