4 * Copyright (c) 2012 Samsung Electronics Co., Ltd. All rights reserved.
6 * Contact: Garima Shrivastava<garima.s@samsung.com>
7 * Jyotsna Dhumale <jyotsna.a@samsung.com>
8 * Venkatesha Sarpangala <sarpangala.v@samsung.com>
10 * Licensed under the Apache License, Version 2.0 (the "License");
11 * you may not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
14 * http://www.apache.org/licenses/LICENSE-2.0
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS,
18 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
28 #include "app2sd_internals.h"
30 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
31 #define DMCRYPT_ITER_TIME 50
32 #define DMCRYPT_KEY_LEN 128
35 static int _app2sd_make_directory(const char *path, uid_t uid)
39 mode_t mode = DIR_PERMS;
41 struct passwd *pwd_result;
42 char buf[1024] = { 0, };
44 ret = _app2sd_delete_directory(path);
46 _E("unable to delete (%s), errno(%d)", path, errno);
47 return APP2EXT_ERROR_DELETE_DIRECTORY;
50 ret = getpwuid_r(uid, &pwd, buf, sizeof(buf), &pwd_result);
51 if (ret != 0 || pwd_result == NULL) {
52 _E("get uid failed(%d)", ret);
53 return APP2EXT_ERROR_ACCESS_FILE;
55 _D("uid(%d), gid(%d)", uid, pwd.pw_gid);
57 /* create directory */
58 ret = mkdir(path, mode);
60 if (errno != EEXIST) {
61 _E("create directory failed," \
62 " error no is (%d)", errno);
63 return APP2EXT_ERROR_CREATE_DIRECTORY;
67 fd = open(path, O_RDONLY|O_DIRECTORY);
69 _E("can't open path(%s)", path);
70 return APP2EXT_ERROR_OPEN_DIR;
73 ret = fchmod(fd, 0755);
75 _E("change file permission error");
77 return APP2EXT_ERROR_ACCESS_FILE;
80 ret = fchown(fd, uid, pwd.pw_gid);
82 _E("change file owner error");
84 return APP2EXT_ERROR_ACCESS_FILE;
89 return APP2EXT_SUCCESS;
92 char *_app2sd_find_associated_device_node(const char *loopback_device)
94 char *ret_result = NULL;
97 char dev[FILENAME_MAX] = { 0, };
100 result = (char *)_app2sd_find_associated_device(loopback_device);
101 if (result == NULL) {
102 _D("there is no the associated file (%s)", loopback_device);
106 /* process the string*/
107 snprintf(dev, FILENAME_MAX - 1, "%s", result);
109 if (strstr(dev, "dev") == NULL) {
110 _E("unable to find the associated file");
114 char *saveptr = NULL;
115 ret_result = strtok_r(dev, delims, &saveptr);
117 devnode = strdup(ret_result);
125 char *_app2sd_create_loopdevice_node(void)
127 char *ret_result = NULL;
128 mode_t mode = DIR_PERMS;
130 int ret = APP2EXT_SUCCESS;
134 result = (char *)_app2sd_find_free_device();
135 _D("find_free_device(%s)", result);
137 /* validate the result */
138 if (result == NULL || strstr(result, "/dev") == NULL) {
139 _D("no device found, creating device node");
146 char dev_path[BUF_SIZE] = { 0, };
147 snprintf(dev_path, BUF_SIZE, "/dev/loop%d", count);
148 while ((fp = fopen(dev_path, "r+")) != NULL) {
150 snprintf(dev_path, BUF_SIZE, "/dev/loop%d", count);
151 _D("next dev path for checking is (%s)",
155 _D("device node candidate is (%s)", dev_path);
157 dev_node = makedev(DEV_MAJOR, count);
158 ret = mknod(dev_path, S_IFBLK | mode, dev_node);
160 _E("error while creating the device node: errno is (%d)",
164 ret_result = (char *)malloc(strlen(dev_path) + 1);
165 if (ret_result == NULL) {
166 _E("unable to allocate memory");
169 memset(ret_result, '\0', strlen(dev_path) + 1);
170 memcpy(ret_result, dev_path, strlen(dev_path));
172 ret_result = (char *)malloc(strlen(result) + 1);
173 if (ret_result == NULL) {
179 memset(ret_result, '\0', strlen(result) + 1);
180 if (strlen(result) > 0)
181 memcpy(ret_result, result, strlen(result) - 1);
190 char *_app2sd_do_loopback_encryption_setup(const char *pkgid,
191 const char *loopback_device, uid_t uid)
193 int ret = APP2EXT_SUCCESS;
196 char *device_node = NULL;
199 _E("invalid argument");
203 /* get password for loopback encryption */
204 ret = _app2sd_initialize_db();
206 _E("app2sd db initialize failed");
210 if ((passwd = _app2sd_get_password_from_db(pkgid, uid)) == NULL) {
211 passwd = (char *)_app2sd_generate_password(pkgid);
212 if (NULL == passwd) {
213 _E("unable to generate password");
216 if ((ret = _app2sd_set_info_in_db(pkgid,
217 passwd, loopback_device, uid)) < 0) {
218 _E("unable to save info");
226 /* get free device node*/
227 device_node = _app2sd_create_loopdevice_node();
228 if (NULL == device_node) {
231 _E("unable to find free loopback node");
235 _D("device_node (%s)", device_node);
237 result = (char *)_app2sd_encrypt_device(device_node,
238 loopback_device, passwd);
239 if (result == NULL) {
240 _E("encryption failed");
245 _D("result (%s)", result);
254 char *_app2sd_do_loopback_duplicate_encryption_setup(const char *pkgid,
255 const char *temp_pkgid, const char *temp_loopback_device,
256 char *passwd, uid_t uid)
259 char *device_node = NULL;
261 if (pkgid == NULL || temp_pkgid == NULL ||
262 temp_loopback_device == NULL || passwd == NULL) {
263 _E("invalid argument");
267 /* get free device node*/
268 device_node = _app2sd_create_loopdevice_node();
269 if (NULL == device_node) {
270 _E("unable to find free loopback node");
273 result = (char *)_app2sd_encrypt_device(device_node,
274 temp_loopback_device, passwd);
275 if (result == NULL) {
276 _E("encryption failed");
279 if (strlen(result) == 0) {
284 _E("error is (%s)", result);
294 int _app2sd_remove_loopback_encryption_setup(const char *loopback_device)
296 int ret = APP2EXT_SUCCESS;
298 char *dev_node = NULL;
300 if ((dev_node = _app2sd_find_associated_device_node(loopback_device))
302 _E("Unable to find the association");
303 ret = APP2EXT_ERROR_FIND_ASSOCIATED_DEVICE_NODE;
306 result = (char *)_app2sd_detach_loop_device(dev_node);
307 if (result == NULL) {
308 _E("error in detaching");
309 ret = APP2EXT_ERROR_DETACH_LOOPBACK_DEVICE;
323 int _app2sd_remove_all_loopback_encryption_setups(const char *loopback_device)
325 int ret = APP2EXT_SUCCESS;
327 char *dev_node = NULL;
330 _app2sd_find_associated_device_node(loopback_device))
332 _E("finish to find the association");
333 ret = APP2EXT_SUCCESS;
337 _D("find node (%s)", dev_node);
339 result = (char *)_app2sd_detach_loop_device(dev_node);
340 if (result == NULL) {
341 _E("error in detaching");
342 ret = APP2EXT_ERROR_DETACH_LOOPBACK_DEVICE;
357 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
358 int _app2sd_dmcrypt_setup_device(const char *pkgid,
359 const char *loopback_device, bool is_dup, uid_t uid)
361 int ret = APP2EXT_SUCCESS;
363 char dmcrypt_setup_cmd[BUF_SIZE] = { 0, };
364 char err_buf[BUF_SIZE] = { 0, };
366 if (pkgid == NULL || loopback_device == NULL) {
367 _E("invalid argument");
368 return APP2EXT_ERROR_INVALID_ARGUMENTS;
371 /* get password for dmcrypt encryption */
372 ret = _app2sd_initialize_db();
374 _E("app2sd db initialize failed");
375 return APP2EXT_ERROR_DB_INITIALIZE;
378 passwd = _app2sd_get_password_from_db(pkgid, uid);
379 if (passwd == NULL) {
381 _E("no password found for (%s)", pkgid);
382 return APP2EXT_ERROR_SQLITE_REGISTRY;
384 passwd = (char *)_app2sd_generate_password(pkgid);
385 if (NULL == passwd) {
386 _E("unable to generate password\n");
387 return APP2EXT_ERROR_PASSWD_GENERATION;
389 if ((ret = _app2sd_set_info_in_db(pkgid, passwd,
390 loopback_device, uid)) < 0) {
391 _E("unable to save password");
394 return APP2EXT_ERROR_SQLITE_REGISTRY;
399 snprintf(dmcrypt_setup_cmd, BUF_SIZE, "/bin/echo '%s' | /sbin/cryptsetup -q -i %d " \
400 "-c aes-cbc-lmk -s %d --align-payload=8 luksFormat %s",
401 passwd, DMCRYPT_ITER_TIME, DMCRYPT_KEY_LEN, loopback_device);
403 ret = system(dmcrypt_setup_cmd);
405 strerror_r(errno, err_buf, sizeof(err_buf));
406 _E("Error setting up dmcrypt on app2sd file, " \
407 "error(%s), ret(%d)", err_buf, ret);
412 return APP2EXT_ERROR_SETUP_DMCRYPT_DEVICE;
423 int _app2sd_dmcrypt_open_device(const char *pkgid, const char *loopback_device,
424 bool is_dup, uid_t uid, char **dev_node)
426 int ret = APP2EXT_SUCCESS;
428 char dmcrypt_open_cmd[BUF_SIZE] = { 0, };
429 char dev_name[BUF_SIZE] = { 0, };
430 char buf[BUF_SIZE] = { 0, };
433 if (pkgid == NULL || loopback_device == NULL) {
434 _E("invalid argument");
435 return APP2EXT_ERROR_INVALID_ARGUMENTS;
439 snprintf(dev_name, BUF_SIZE, "%s.new_%d", pkgid, uid);
441 snprintf(dev_name, BUF_SIZE, "%s_%d", pkgid, uid);
443 /* get password for dmcrypt encryption */
444 ret = _app2sd_initialize_db();
446 _E("app2sd db initialize failed");
447 return APP2EXT_ERROR_DB_INITIALIZE;
450 passwd = _app2sd_get_password_from_db(pkgid, uid);
451 if (passwd == NULL) {
452 _E("no password found for [%s]", pkgid);
453 return APP2EXT_ERROR_SQLITE_REGISTRY;
456 snprintf(dmcrypt_open_cmd, BUF_SIZE, "/bin/echo '%s' | /sbin/cryptsetup -q luksOpen %s %s",
457 passwd, loopback_device, dev_name);
460 ret = system(dmcrypt_open_cmd);
462 strerror_r(errno, buf, sizeof(buf));
463 _E("error opening dmcrypt device, error: [%s]", buf);
464 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
467 snprintf(buf, BUF_SIZE, "/dev/mapper/%s", dev_name);
469 *dev_node = (char *)calloc(len + 1, sizeof(char));
470 if (*dev_node == NULL) {
471 _E("memory alloc failed");
472 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
474 snprintf(*dev_node, len + 1, "%s", buf);
479 int _app2sd_dmcrypt_close_device(const char *pkgid, uid_t uid)
481 int ret = APP2EXT_SUCCESS;
482 char dev_node[BUF_SIZE] = { '\0' };
483 char dmcrypt_close_cmd[BUF_SIZE] = { '\0' };
484 char err_buf[BUF_SIZE] = { '\0' };
485 char *t_dev_node = NULL;
488 _E("invalid argument\n");
489 return APP2EXT_ERROR_INVALID_ARGUMENTS;
492 t_dev_node = _app2sd_find_associated_dmcrypt_device_node(pkgid, uid);
494 _E("no associated device node(%s_%d) found", pkgid, uid);
495 return APP2EXT_ERROR_DMCRYPT_DEVICE_UNAVAILABLE;
501 snprintf(dev_node, BUF_SIZE, "/dev/mapper/%s_%d", pkgid, uid);
502 snprintf(dmcrypt_close_cmd, BUF_SIZE, "/sbin/cryptsetup -q luksClose %s", dev_node);
503 ret = system(dmcrypt_close_cmd);
505 strerror_r(errno, err_buf, sizeof(err_buf));
506 _E("error closing dmcrypt on app2sd file,"\
507 " error: [%s]", err_buf);
508 return APP2EXT_ERROR_CLOSE_DMCRYPT_DEVICE;
514 char *_app2sd_find_associated_dmcrypt_device_node(const char *pkgid, uid_t uid)
516 char *dev_node = NULL;
517 char buf[BUF_SIZE] = { 0, };
520 snprintf(buf, BUF_SIZE, "/dev/mapper/%s_%d", pkgid, uid);
522 dev_node = (char *)calloc(len + 1, sizeof(char));
523 if (dev_node == NULL) {
524 _E("memory alloc failed");
527 snprintf(dev_node, len + 1, "%s", buf);
529 if (access(dev_node, F_OK) == 0) {
530 _D("device_node: (%s)", dev_node);
540 char *_app2sd_dmcrypt_duplicate_encryption_setup(const char *pkgid,
541 const char *temp_loopback_device, uid_t uid)
543 int ret = APP2EXT_SUCCESS;
544 char *device_node = NULL;
546 if (pkgid == NULL || temp_loopback_device == NULL) {
547 _E("invalid argument\n");
551 ret = _app2sd_dmcrypt_setup_device(pkgid, temp_loopback_device, true, uid);
553 _E("dmcrypt setup device error(%d)", ret);
557 ret = _app2sd_dmcrypt_open_device(pkgid, temp_loopback_device, true,
560 _E("dmcrypt open device error");
568 int _app2sd_create_loopback_device(const char *pkgid,
569 const char *loopback_device, int size)
571 int ret = APP2EXT_SUCCESS;
572 char command[FILENAME_MAX] = { 0, };
573 char buff[BUF_SIZE] = { 0, };
576 if (NULL == pkgid || size <= 0) {
577 _E("invalid argument");
578 return APP2EXT_ERROR_INVALID_ARGUMENTS;
580 snprintf(command, FILENAME_MAX - 1, "of=%s", loopback_device);
581 snprintf(buff, BUF_SIZE - 1, "count=%d", size);
583 const char *argv1[] = { "/bin/dd", "if=/dev/zero",
584 command, "bs=1M", buff, NULL };
586 if ((fp = fopen(loopback_device, "r+")) != NULL) {
587 _W("encrypted file already exists (%s)",
590 return APP2EXT_ERROR_PKG_EXISTS;
593 ret = _xsystem(argv1);
595 _E("command (%s) failed, ret(%d), errno(%d)", command, ret, errno);
600 int _app2sd_delete_loopback_device(const char *loopback_device)
602 int ret = APP2EXT_SUCCESS;
604 ret = unlink(loopback_device);
606 if (errno == ENOENT) {
607 _W("unable to access file (%s)", loopback_device);
609 _E("unable to delete (%s)", loopback_device);
610 return APP2EXT_ERROR_DELETE_LOOPBACK_DEVICE;
614 return APP2EXT_SUCCESS;
617 int _app2sd_create_file_system(const char *device_path)
619 int ret = APP2EXT_SUCCESS;
621 char err_buf[1024] = {0,};
623 if (device_path == NULL) {
625 return APP2EXT_ERROR_INVALID_ARGUMENTS;
628 /* Format the filesystem [create a filesystem]*/
629 const char *argv[] = { "/sbin/mkfs.ext4", device_path, NULL };
630 fp = fopen(device_path, "r+");
632 strerror_r(errno, err_buf, sizeof(err_buf));
633 _E("unable to access (%s) error is (%d, %s)",
634 device_path, errno, err_buf);
635 return APP2EXT_ERROR_ACCESS_FILE;
639 ret = _xsystem(argv);
641 strerror_r(errno, err_buf, sizeof(err_buf));
642 _E("creating file system failed, error is (%s)",
644 return APP2EXT_ERROR_CREATE_FS;
649 static int _app2sd_create_dir_with_link(const char *application_path,
650 const char *pkgid, const char *dir_name, uid_t uid)
652 int ret = APP2EXT_SUCCESS;
653 char application_dir_mmc_path[FILENAME_MAX] = { 0, };
654 char application_dir_path[FILENAME_MAX] = { 0, };
656 snprintf(application_dir_mmc_path, FILENAME_MAX - 1, "%s/.mmc/%s",
657 application_path, dir_name);
658 snprintf(application_dir_path, FILENAME_MAX, "%s/%s",
659 application_path, dir_name);
661 ret = _app2sd_make_directory(application_dir_mmc_path, uid);
663 _E("create directory failed");
664 return APP2EXT_ERROR_CREATE_DIRECTORY;
667 if ((ret = symlink(application_dir_mmc_path,
668 application_dir_path)) < 0) {
669 if (errno == EEXIST) {
670 _D("file with symlink name present (%s)",
671 application_dir_path);
673 _E("symbolic link creation "
674 "failed, error no is (%d)", errno);
675 return APP2EXT_ERROR_CREATE_SYMLINK;
679 return APP2EXT_SUCCESS;
682 static int _app2sd_create_directory_entry(const char *application_path,
683 const char *pkgid, GList *dir_list, uid_t uid)
685 int ret = APP2EXT_SUCCESS;
687 app2ext_dir_details *dir_detail = NULL;
689 list = g_list_first(dir_list);
691 dir_detail = (app2ext_dir_details *)list->data;
692 if (dir_detail && dir_detail->name
693 && dir_detail->type == APP2EXT_DIR_RO) {
694 ret = _app2sd_create_dir_with_link(application_path,
695 pkgid, dir_detail->name, uid);
699 list = g_list_next(list);
701 return APP2EXT_SUCCESS;
704 int _app2sd_mount_app_content(const char *application_path, const char *pkgid,
705 const char *dev, int mount_type, GList *dir_list,
706 app2sd_cmd cmd, uid_t uid)
708 int ret = APP2EXT_SUCCESS;
710 char application_mmc_path[FILENAME_MAX] = { 0, };
711 char temp_path[FILENAME_MAX] = { 0, };
712 char err_buf[1024] = {0,};
713 struct timespec time = {
715 .tv_nsec = 1000 * 1000 * 200
719 _E("input param is NULL (%s)",
721 return APP2EXT_ERROR_INVALID_ARGUMENTS;
724 /* check directory existence */
725 fd = open(application_path, O_RDONLY|O_DIRECTORY);
727 _E("path(%s) error(%d)", application_path, errno);
728 return APP2EXT_ERROR_OPEN_DIR;
732 snprintf(application_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
734 fd = open(application_mmc_path, O_RDONLY|O_DIRECTORY);
736 _E("path(%s) error(%d)", application_mmc_path, errno);
737 return APP2EXT_ERROR_OPEN_DIR;
741 nanosleep(&time, NULL); /* 200ms sleep */
742 _D("give a delay for mount");
744 switch (mount_type) {
746 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
747 MS_MGC_VAL | MS_RDONLY | MS_NOSUID, NULL)) < 0) {
748 _E("read only mount failed, " \
750 "dev is (%s) path is (%s)",
751 errno, dev, application_mmc_path);
752 ret = APP2EXT_ERROR_MOUNT;
756 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
757 MS_MGC_VAL | MS_NOSUID, NULL)) < 0) {
758 _E("read write mount failed, " \
759 "errono is (%d)", errno);
760 ret = APP2EXT_ERROR_MOUNT;
763 case MOUNT_TYPE_RW_NOEXEC:
764 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
765 MS_MGC_VAL | MS_NOEXEC | MS_NOSUID, NULL)) < 0) {
766 _E("rwnx mount failed " \
767 "errono is (%d)", errno);
768 ret = APP2EXT_ERROR_MOUNT;
771 case MOUNT_TYPE_RD_REMOUNT:
772 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
773 MS_MGC_VAL | MS_RDONLY | MS_REMOUNT | MS_NOSUID,
775 _E("read remount failed "
776 "errono is (%d)", errno);
777 ret = APP2EXT_ERROR_MOUNT;
780 case MOUNT_TYPE_RW_REMOUNT:
781 if ((ret = mount(dev, application_mmc_path, FS_TYPE,
782 MS_MGC_VAL | MS_REMOUNT | MS_NOSUID, NULL)) < 0) {
783 _E("read write remount failed "
784 "errono(%d), errstr(%s)", errno,
785 strerror_r(errno, err_buf, sizeof(err_buf)));
786 ret = APP2EXT_ERROR_MOUNT;
790 _E("invalid mount type");
794 if (cmd == APP2SD_PRE_INSTALL || cmd == APP2SD_MOVE_APP_TO_MMC ||
795 cmd == APP2SD_PRE_UPGRADE) {
796 ret = _app2sd_create_directory_entry(application_path,
797 pkgid, dir_list, uid);
800 if (mount_type != MOUNT_TYPE_RD &&
801 mount_type != MOUNT_TYPE_RD_REMOUNT) {
802 /* change lost+found permission */
803 snprintf(temp_path, FILENAME_MAX - 1, "%s/lost+found",
804 application_mmc_path);
805 ret = _app2sd_make_directory(temp_path, uid);
807 _E("create directory(%s) failed", temp_path);
808 return APP2EXT_ERROR_CREATE_DIRECTORY;
815 int _app2sd_unmount_app_content(const char *application_path)
817 int ret = APP2EXT_SUCCESS;
818 char application_dir_mmc_path[FILENAME_MAX] = { 0, };
819 char err_buf[1024] = {0,};
821 snprintf(application_dir_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
823 if ((ret = umount(application_dir_mmc_path)) < 0) {
824 strerror_r(errno, err_buf, sizeof(err_buf));
825 _E("unable to umount the dir, ret(%d) error(%d, %s)",
826 ret, errno, err_buf);
832 static int _app2sd_move_to_archive(const char *src_path, const char *arch_path)
834 int ret = APP2EXT_SUCCESS;
836 ret = _app2sd_copy_dir(src_path, arch_path);
837 if (ret && ret != APP2EXT_ERROR_ACCESS_FILE) {
838 char err_buf[1024] = {0,};
839 strerror_r(errno, err_buf, sizeof(err_buf));
840 _E("unable to copy from (%s) to (%s), err is (%s)",
841 src_path, arch_path, err_buf);
842 return APP2EXT_ERROR_MOVE;
845 ret = _app2sd_delete_directory((char *)src_path);
847 _E("unable to delete (%s)", src_path);
848 return APP2EXT_ERROR_DELETE_DIRECTORY;
854 static int _app2sd_move_app_to_external(const char *pkgid, GList *dir_list,
855 uid_t uid, char *mmc_path)
857 int ret = APP2EXT_SUCCESS;
858 mode_t mode = DIR_PERMS;
859 char temp_dir_path[FILENAME_MAX] = { 0, };
860 char application_mmc_path[FILENAME_MAX] = { 0, };
861 char application_archive_path[FILENAME_MAX] = { 0, };
862 char application_path[FILENAME_MAX] = { 0, };
863 char loopback_device[FILENAME_MAX] = { 0, };
864 unsigned long long total_size = 0;
866 int reqd_disk_size = 0;
867 char *device_node = NULL;
868 #if !defined(TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION)
871 int free_mmc_mem = 0;
874 app2ext_dir_details *dir_detail = NULL;
875 char err_buf[1024] = { 0,};
876 char *encoded_id = NULL;
878 encoded_id = _app2sd_get_encoded_name(pkgid, uid);
879 if (encoded_id == NULL)
880 return APP2EXT_ERROR_MEMORY_ALLOC_FAILED;
882 snprintf(loopback_device, FILENAME_MAX - 1, "%s/%s/%s",
883 mmc_path, EXTIMG_DIR, encoded_id);
885 if (_is_global(uid)) {
886 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
887 tzplatform_getenv(TZ_SYS_RW_APP), pkgid);
889 tzplatform_set_user(uid);
890 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
891 tzplatform_getenv(TZ_USER_APP), pkgid);
892 tzplatform_reset_user();
895 /* check whether application is in external memory or not */
896 fp = fopen(loopback_device, "r+");
898 _W("Already %s entry is present in the SD Card, " \
899 "delete entry and go on without return", pkgid);
901 _app2sd_force_clean(pkgid, application_path, loopback_device, uid);
904 snprintf(application_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
906 snprintf(application_archive_path, FILENAME_MAX - 1, "%s/.archive",
909 ret = mkdir(application_mmc_path, mode);
911 if (errno != EEXIST) {
912 _E("unable to create directory for archiving," \
913 " error(%d)", errno);
914 return APP2EXT_ERROR_CREATE_DIRECTORY;
918 ret = mkdir(application_archive_path, mode);
920 if (errno != EEXIST) {
921 _E("unable to create directory for archiving," \
922 " error(%d)", errno);
923 return APP2EXT_ERROR_CREATE_DIRECTORY;
927 list = g_list_first(dir_list);
929 dir_detail = (app2ext_dir_details *)list->data;
930 if (dir_detail && dir_detail->name
931 && dir_detail->type == APP2EXT_DIR_RO) {
932 memset(temp_dir_path, '\0', FILENAME_MAX);
933 snprintf(temp_dir_path, FILENAME_MAX,
934 "%s/%s", application_path,
936 _D("cal size of app dirs, temp_dir_path(%s)",
939 _app2sd_calculate_dir_size(temp_dir_path);
941 list = g_list_next(list);
944 reqd_size = ((total_size) / (1024 * 1024)) + 2;
945 reqd_disk_size = reqd_size + ceil(reqd_size * 0.2);
947 /* find avialable free memory in the MMC card */
948 ret = _app2sd_get_available_free_memory(mmc_path, &free_mmc_mem);
950 _E("unable to get available free memory in MMC (%d)", ret);
951 return APP2EXT_ERROR_MMC_STATUS;
953 /* if avaialalbe free memory in MMC is less than
954 * required size + 5MB, return error
956 if (reqd_disk_size > free_mmc_mem) {
957 _E("insufficient memory in MMC for application installation (%d)",
959 return APP2EXT_ERROR_MMC_INSUFFICIENT_MEMORY;
961 /* create a loopback device */
962 ret = _app2sd_create_loopback_device(pkgid, loopback_device,
963 (reqd_disk_size + PKG_BUF_SIZE));
965 _E("loopback node creation failed");
969 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
970 ret = _app2sd_dmcrypt_setup_device(pkgid, loopback_device, false, uid);
972 _E("dmcrypt setup device error(%d)", ret);
973 return APP2EXT_ERROR_SETUP_DMCRYPT_DEVICE;
976 ret = _app2sd_dmcrypt_open_device(pkgid, loopback_device, false,
979 _E("dmcrypt open device error");
980 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
983 /* perform loopback encryption setup */
984 device_node = _app2sd_do_loopback_encryption_setup(pkgid,
985 loopback_device, uid);
987 _E("loopback encryption setup failed");
988 return APP2EXT_ERROR_DO_LOSETUP;
990 _D("device_node (%s)", device_node);
991 /* check whether loopback device is associated with device node or not */
992 devi = _app2sd_find_associated_device_node(loopback_device);
994 _E("finding associated device node failed");
995 ret = APP2EXT_ERROR_DO_LOSETUP;
1002 /* format the loopback file system */
1003 ret = _app2sd_create_file_system(device_node);
1005 _E("create ext4 filesystem failed");
1006 ret = APP2EXT_ERROR_CREATE_FS;
1010 list = g_list_first(dir_list);
1012 dir_detail = (app2ext_dir_details *)list->data;
1013 if (dir_detail && dir_detail->name
1014 && dir_detail->type == APP2EXT_DIR_RO) {
1015 memset(temp_dir_path, '\0', FILENAME_MAX);
1016 snprintf(temp_dir_path, FILENAME_MAX,
1017 "%s/%s", application_path,
1019 _D("app2archive, temp_dir_path(%s)",
1021 ret = _app2sd_move_to_archive(temp_dir_path,
1022 application_archive_path);
1024 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1025 _E("unable to access (%s)",
1028 _E("unable to copy from (%s) to (%s)",
1030 application_archive_path);
1035 list = g_list_next(list);
1038 /* mount the loopback encrypted pseudo device on application installation path
1039 * as with Read Write permission
1041 ret = _app2sd_mount_app_content(application_path, pkgid, device_node,
1042 MOUNT_TYPE_RW, dir_list, APP2SD_MOVE_APP_TO_MMC, uid);
1048 list = g_list_first(dir_list);
1050 dir_detail = (app2ext_dir_details *)list->data;
1051 if (dir_detail && dir_detail->name
1052 && dir_detail->type == APP2EXT_DIR_RO) {
1053 memset(temp_dir_path, '\0', FILENAME_MAX);
1054 snprintf(temp_dir_path, FILENAME_MAX,
1055 "%s/%s", application_archive_path,
1057 _D("archive2mmc, temp_dir_path(%s)",
1059 ret = _app2sd_copy_dir(temp_dir_path,
1060 application_mmc_path);
1062 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1063 _E("unable to access (%s)",
1067 err_buf, sizeof(err_buf));
1068 _E("unable to copy from (%s) to (%s)," \
1071 application_mmc_path, err_buf);
1075 ret = _app2sd_delete_directory(temp_dir_path);
1077 _E("unable to delete (%s)", temp_dir_path);
1081 list = g_list_next(list);
1084 ret = _app2sd_delete_directory(application_archive_path);
1086 _E("unable to delete (%s)", application_archive_path);
1087 ret = APP2EXT_ERROR_DELETE_DIRECTORY;
1091 return APP2EXT_SUCCESS;
1102 static int _app2sd_move_app_to_internal(const char *pkgid, GList *dir_list,
1103 uid_t uid, char *mmc_path)
1105 int ret = APP2EXT_SUCCESS;
1106 mode_t mode = DIR_PERMS;
1107 char temp_dir_path[FILENAME_MAX] = { 0, };
1108 char application_mmc_path[FILENAME_MAX] = { 0, };
1109 char application_archive_path[FILENAME_MAX] = { 0, };
1110 char application_path[FILENAME_MAX] = { 0, };
1111 char loopback_device[FILENAME_MAX] = { 0, };
1112 char *device_node = NULL;
1115 app2ext_dir_details *dir_detail = NULL;
1117 int free_internal_mem = 0;
1118 struct statvfs buf = {0,};
1119 unsigned long long temp = 0;
1120 char err_buf[1024] = {0,};
1121 char *encoded_id = NULL;
1123 encoded_id = _app2sd_get_encoded_name(pkgid, uid);
1124 if (encoded_id == NULL)
1125 return APP2EXT_ERROR_MEMORY_ALLOC_FAILED;
1127 snprintf(loopback_device, FILENAME_MAX - 1, "%s/%s/%s",
1128 mmc_path, EXTIMG_DIR, encoded_id);
1130 if (_is_global(uid)) {
1131 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
1132 tzplatform_getenv(TZ_SYS_RW_APP), pkgid);
1134 tzplatform_set_user(uid);
1135 snprintf(application_path, FILENAME_MAX - 1, "%s/%s",
1136 tzplatform_getenv(TZ_USER_APP), pkgid);
1137 tzplatform_reset_user();
1140 /* check whether application is in external memory or not */
1141 fp = fopen(loopback_device, "r+");
1143 _E("application (%s) is not installed on SD Card",
1145 return APP2EXT_ERROR_FILE_ABSENT;
1151 memset((void *)&buf, '\0', sizeof(struct statvfs));
1152 ret = statvfs(INTERNAL_STORAGE_PATH, &buf);
1154 temp = (buf.f_bsize * buf.f_bavail) / (1024 * 1024);
1155 free_internal_mem = (int)temp;
1157 _E("unable to get internal storage size");
1158 return APP2EXT_ERROR_MMC_INSUFFICIENT_MEMORY;
1161 fp = fopen(loopback_device, "r+");
1163 _E("app entry is not present in SD card");
1164 return APP2EXT_ERROR_INVALID_PACKAGE;
1168 /* get installed app size*/
1169 temp = _app2sd_calculate_file_size(loopback_device);
1170 reqd_size = (int)((temp) / (1024 * 1024));
1171 _D("reqd size is (%d)", reqd_size);
1173 if (reqd_size == 0) {
1174 _E("app entry is not present in SD Card");
1175 return APP2EXT_ERROR_LOOPBACK_DEVICE_UNAVAILABLE;
1178 _D("reqd size: (%d)MB, free internal mem: (%d)MB",
1179 reqd_size, free_internal_mem);
1181 /* if avaialalbe free memory in internal storage is
1182 * less than required size, return error
1184 if (reqd_size > free_internal_mem) {
1185 _E("innsufficient memory in internal storage" \
1186 " for application installation (%d)", ret);
1187 return APP2EXT_ERROR_MMC_INSUFFICIENT_MEMORY;
1190 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1192 _app2sd_find_associated_dmcrypt_device_node(pkgid, uid);
1194 device_node = _app2sd_find_associated_device_node(loopback_device);
1196 if (NULL == device_node) {
1197 /* do loopback setup */
1198 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1199 ret = _app2sd_dmcrypt_open_device(pkgid, loopback_device,
1200 false, uid, &device_node);
1202 _E("dmcrypt open device error(%d)", ret);
1203 return APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
1206 device_node = _app2sd_do_loopback_encryption_setup(pkgid,
1207 loopback_device, uid);
1208 if (device_node == NULL) {
1209 _E("loopback encryption setup failed");
1210 return APP2EXT_ERROR_DO_LOSETUP;
1214 ret = _app2sd_mount_app_content(application_path,
1215 pkgid, device_node, MOUNT_TYPE_RW,
1216 dir_list, APP2SD_MOVE_APP_TO_PHONE, uid);
1219 ret = APP2EXT_ERROR_MOUNT_PATH;
1223 /* do re-mounting */
1224 ret = _app2sd_mount_app_content(application_path,
1225 pkgid, device_node, MOUNT_TYPE_RW_REMOUNT,
1226 dir_list, APP2SD_MOVE_APP_TO_PHONE, uid);
1228 _E("re-mount failed");
1229 ret = APP2EXT_ERROR_MOUNT_PATH;
1234 snprintf(application_mmc_path, FILENAME_MAX - 1, "%s/.mmc",
1236 snprintf(application_archive_path, FILENAME_MAX - 1, "%s/.archive",
1239 ret = mkdir(application_archive_path, mode);
1241 if (errno != EEXIST) {
1242 _E("unable to create directory for archiving," \
1243 " error(%d)", errno);
1244 ret = APP2EXT_ERROR_CREATE_DIRECTORY;
1249 list = g_list_first(dir_list);
1251 dir_detail = (app2ext_dir_details *)list->data;
1252 if (dir_detail && dir_detail->name
1253 && dir_detail->type == APP2EXT_DIR_RO) {
1254 /* archiving code */
1255 memset(temp_dir_path, '\0', FILENAME_MAX);
1256 snprintf(temp_dir_path, FILENAME_MAX,
1257 "%s/%s", application_mmc_path,
1259 _D("mmc2archive, temp_dir_path(%s)", temp_dir_path);
1260 ret = _app2sd_copy_dir(temp_dir_path,
1261 application_archive_path);
1263 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1264 _E("unable to access (%s)",
1268 err_buf, sizeof(err_buf));
1269 _E("unable to copy from (%s) to (%s),"
1272 application_archive_path, err_buf);
1277 /* delete the symbolic link files [bin, lib, res]*/
1278 memset(temp_dir_path, '\0', FILENAME_MAX);
1279 snprintf(temp_dir_path, FILENAME_MAX,
1280 "%s/%s", application_path,
1282 _D("unlink, temp_dir_path(%s)", temp_dir_path);
1283 ret = unlink(temp_dir_path);
1285 if (errno == ENOENT) {
1286 _W("directory (%s) does not exist",
1289 _E("unable to remove the symbolic link file (%s)," \
1290 " it is already unlinked",
1296 /* Copy content to destination */
1297 memset(temp_dir_path, '\0', FILENAME_MAX);
1298 snprintf(temp_dir_path, FILENAME_MAX,
1299 "%s/%s", application_archive_path,
1301 _D("archive2app, temp_dir_path(%s)", temp_dir_path);
1302 ret = _app2sd_copy_dir(temp_dir_path, application_path);
1304 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1305 _E("unable to access (%s)",
1309 err_buf, sizeof(err_buf));
1310 _E("unable to copy from (%s) to (%s) " \
1313 application_path, err_buf);
1318 list = g_list_next(list);
1321 _D("copying file completed");
1322 ret = _app2sd_unmount_app_content(application_path);
1324 _E("unable to unmount SD directory for app (%s)",
1327 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1328 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1330 _E("close dmcrypt device error(%d)", ret);
1332 ret = _app2sd_remove_loopback_encryption_setup(loopback_device);
1334 _E("unable to detach loopback setup for (%s)",
1338 ret = _app2sd_delete_loopback_device(loopback_device);
1340 _E("unable to delete the loopback device for (%s)",
1343 ret = _app2sd_delete_directory(application_mmc_path);
1345 _E("unable to delete (%s)", application_mmc_path);
1347 ret = _app2sd_delete_directory(application_archive_path);
1349 _E("unable to delete (%s)", application_archive_path);
1351 /* remove passwrd from DB */
1352 ret = _app2sd_initialize_db();
1354 _E("app2sd db initialize failed");
1356 ret = _app2sd_remove_info_from_db(pkgid, uid);
1358 _E("cannot remove info from db");
1360 return APP2EXT_SUCCESS;
1371 int _app2sd_usr_move_app(const char *pkgid, app2ext_move_type move_type,
1372 GList *dir_list, uid_t uid, char *mmc_path)
1374 int ret = APP2EXT_SUCCESS;
1376 switch (move_type) {
1377 case APP2EXT_MOVE_TO_EXT:
1378 ret = _app2sd_move_app_to_external(pkgid, dir_list,
1381 _E("move app to external memory failed(%d)", ret);
1385 case APP2EXT_MOVE_TO_PHONE:
1386 ret = _app2sd_move_app_to_internal(pkgid, dir_list,
1389 _E("move app to internal memory failed(%d)", ret);
1394 _E("invalid argument");
1395 return APP2EXT_ERROR_INVALID_ARGUMENTS;
1401 int _app2sd_copy_ro_content(const char *src, const char *dest, GList *dir_list)
1403 char path[FILENAME_MAX] = { 0, };
1404 int ret = APP2EXT_SUCCESS;
1406 app2ext_dir_details *dir_detail = NULL;
1408 list = g_list_first(dir_list);
1410 dir_detail = (app2ext_dir_details *)list->data;
1411 if (dir_detail && dir_detail->name
1412 && dir_detail->type == APP2EXT_DIR_RO) {
1413 memset((void *)&path, '\0', FILENAME_MAX);
1414 snprintf(path, FILENAME_MAX - 1, "%s/%s", src,
1416 ret = _app2sd_copy_dir(path, dest);
1418 if (ret == APP2EXT_ERROR_ACCESS_FILE) {
1419 _E("unable to access (%s)", path);
1421 _E("unable to copy from (%s) " \
1422 "to (%s), errno is (%d)",
1424 return APP2EXT_ERROR_MOVE;
1428 list = g_list_next(list);
1431 return APP2EXT_SUCCESS;
1434 int _app2sd_duplicate_device(const char *pkgid,
1435 const char *loopback_device,
1436 const char *temp_pkgid,
1437 const char *temp_application_path,
1438 const char *temp_loopback_device,
1439 GList *dir_list, char *dev_node, int size,
1444 #if !defined(TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION)
1446 char *result = NULL;
1447 char *passwd = NULL;
1450 /* create a new loopback device */
1451 ret = _app2sd_create_loopback_device(temp_pkgid,
1452 temp_loopback_device, (size + PKG_BUF_SIZE));
1454 _E("package already present");
1458 /* perform loopback encryption setup */
1459 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1460 dev_node = _app2sd_dmcrypt_duplicate_encryption_setup(pkgid,
1461 temp_loopback_device, uid);
1463 _E("dmcrypt duplicate encryption setup failed");
1464 _app2sd_delete_loopback_device(temp_loopback_device);
1465 return APP2EXT_ERROR_SETUP_DMCRYPT_DEVICE;
1468 /* get password for loopback encryption */
1469 ret = _app2sd_initialize_db();
1471 _E("app2sd db initialize failed");
1472 return APP2EXT_ERROR_DB_INITIALIZE;
1475 if ((passwd = _app2sd_get_password_from_db(pkgid, uid)) == NULL) {
1476 passwd = (char *)_app2sd_generate_password(pkgid);
1477 if (NULL == passwd) {
1478 _E("unable to generate password");
1479 return APP2EXT_ERROR_PASSWD_GENERATION;
1481 if ((ret = _app2sd_set_info_in_db(pkgid,
1482 passwd, loopback_device, uid)) < 0) {
1483 _E("unable to save info");
1486 return APP2EXT_ERROR_SQLITE_REGISTRY;
1491 dev_node = _app2sd_do_loopback_duplicate_encryption_setup(pkgid,
1492 temp_pkgid, temp_loopback_device, passwd, uid);
1494 _E("losetup failed, device node is (%s)", dev_node);
1495 _app2sd_delete_loopback_device(temp_loopback_device);
1498 return APP2EXT_ERROR_DO_LOSETUP;
1502 _D("duplicate setup SUCCESS");
1504 /* check whether loopback device is associated with
1505 * device node or not
1507 devi = _app2sd_find_associated_device_node(temp_loopback_device);
1509 _E("finding associated device node failed");
1510 err_res = APP2EXT_ERROR_DO_LOSETUP;
1513 _D("losetup SUCCESS");
1516 /* format the loopback file system */
1517 ret = _app2sd_create_file_system(dev_node);
1519 _E("creating fs failed");
1520 err_res = APP2EXT_ERROR_CREATE_FS;
1523 _D("create filesystem SUCCESS");
1525 /* do mounting for new dev*/
1526 ret = _app2sd_mount_app_content(temp_application_path, pkgid,
1527 dev_node, MOUNT_TYPE_RW, dir_list,
1528 APP2SD_PRE_UPGRADE, uid);
1530 _E("remount failed");
1531 err_res = APP2EXT_ERROR_MOUNT_PATH;
1535 #if !defined(TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION)
1542 return APP2EXT_SUCCESS;
1546 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1547 ret = _app2sd_dmcrypt_close_device(temp_pkgid, uid);
1549 _E("close dmcrypt device error(%d)", ret);
1551 result = _app2sd_detach_loop_device(dev_node);
1557 _app2sd_delete_loopback_device(temp_loopback_device);
1565 int _app2sd_update_loopback_device_size(const char *pkgid,
1566 const char *loopback_device,
1567 const char *application_path,
1568 const char *temp_pkgid,
1569 const char *temp_loopback_device,
1570 const char *temp_application_path,
1571 int size, GList *dir_list,
1575 char *device_node = NULL;
1576 char *old_device_node = NULL;
1578 char application_mmc_path[FILENAME_MAX] = { 0, };
1579 char temp_application_mmc_path[FILENAME_MAX] = { 0, };
1581 ret = _app2sd_duplicate_device(pkgid, loopback_device,
1582 temp_pkgid, temp_application_path, temp_loopback_device,
1583 dir_list, device_node, size, uid);
1585 _E("creating duplicate device failed");
1589 /* get the associated device node for SD card applicatione */
1590 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1592 _app2sd_find_associated_dmcrypt_device_node(pkgid, uid);
1594 old_device_node = _app2sd_find_associated_device_node(loopback_device);
1596 if (NULL == old_device_node) {
1597 /* do loopback setup */
1598 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1599 ret = _app2sd_dmcrypt_open_device(pkgid, loopback_device,
1600 false, uid, &old_device_node);
1602 _E("dmcrypt open device error");
1603 err_res = APP2EXT_ERROR_OPEN_DMCRYPT_DEVICE;
1607 old_device_node = _app2sd_do_loopback_encryption_setup(pkgid,
1608 loopback_device, uid);
1609 if (old_device_node == NULL) {
1610 _E("loopback encryption setup failed");
1611 err_res = APP2EXT_ERROR_DO_LOSETUP;
1616 ret = _app2sd_mount_app_content(application_path, pkgid,
1617 old_device_node, MOUNT_TYPE_RW, dir_list,
1618 APP2SD_PRE_UPGRADE, uid);
1620 _E("remount failed");
1621 err_res = APP2EXT_ERROR_MOUNT_PATH;
1624 /* do re-mounting */
1625 ret = _app2sd_mount_app_content(application_path, pkgid,
1626 old_device_node, MOUNT_TYPE_RW_REMOUNT, dir_list,
1627 APP2SD_PRE_UPGRADE, uid);
1629 _E("remount failed");
1630 err_res = APP2EXT_ERROR_MOUNT_PATH;
1634 snprintf(application_mmc_path, FILENAME_MAX - 1,
1635 "%s/.mmc", application_path);
1636 snprintf(temp_application_mmc_path, FILENAME_MAX - 1,
1637 "%s/.mmc", temp_application_path);
1639 ret = _app2sd_copy_ro_content(application_mmc_path,
1640 temp_application_mmc_path, dir_list);
1642 _E("copy ro content failed");
1646 ret = _app2sd_unmount_app_content(application_path);
1648 _E("unable to unmount the SD application");
1649 err_res = APP2EXT_ERROR_UNMOUNT;
1652 ret = _app2sd_unmount_app_content(temp_application_path);
1654 _E("unable to unmount the SD application");
1655 err_res = APP2EXT_ERROR_UNMOUNT;
1659 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1660 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1662 _E("close dmcrypt device error(%d)", ret);
1663 err_res = APP2EXT_ERROR_CLOSE_DMCRYPT_DEVICE;
1667 ret = _app2sd_dmcrypt_close_device(temp_pkgid, uid);
1669 _E("close dmcrypt device error(%d)", ret);
1670 err_res = APP2EXT_ERROR_CLOSE_DMCRYPT_DEVICE;
1674 ret = _app2sd_remove_loopback_encryption_setup(loopback_device);
1676 _E("unable to remove loopback setup");
1677 err_res = APP2EXT_ERROR_DELETE_LOOPBACK_DEVICE;
1680 ret = _app2sd_remove_loopback_encryption_setup(temp_loopback_device);
1682 _E("unable to remove loopback setup");
1683 err_res = APP2EXT_ERROR_DELETE_LOOPBACK_DEVICE;
1688 ret = _app2sd_delete_directory(loopback_device);
1690 _E("unable to delete (%s)", loopback_device);
1691 err_res = APP2EXT_ERROR_DELETE_DIRECTORY;
1695 ret = _app2sd_rename_dir(temp_loopback_device, loopback_device);
1697 _E("unable to rename (%s)", temp_loopback_device);
1698 err_res = APP2EXT_ERROR_MOVE;
1702 ret = _app2sd_delete_directory(temp_application_path);
1704 _E("unable to delete (%s)", temp_application_path);
1705 err_res = APP2EXT_ERROR_DELETE_DIRECTORY;
1709 return APP2EXT_SUCCESS;
1712 if (old_device_node) {
1713 free(old_device_node);
1714 old_device_node = NULL;
1717 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1718 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1720 _E("close dmcrypt device error(%d)", ret);
1722 ret = _app2sd_dmcrypt_close_device(temp_pkgid, uid);
1725 _E("close dmcrypt device error(%d)", ret);
1727 ret = _app2sd_remove_loopback_encryption_setup(loopback_device);
1729 _E("unable to remove loopback setup");
1731 ret = _app2sd_remove_loopback_encryption_setup(temp_loopback_device);
1733 _E("unable to remove loopback setup");
1736 _app2sd_delete_loopback_device(temp_loopback_device);
1738 ret = _app2sd_delete_directory(temp_application_path);
1740 _E("unable to delete (%s)", temp_application_path);
1745 int _app2sd_force_clean(const char *pkgid, const char *application_path,
1746 const char *loopback_device, uid_t uid)
1748 int ret = APP2EXT_SUCCESS;
1750 /* unmount the loopback encrypted pseudo device from the application installation path */
1751 ret = _app2sd_unmount_app_content(application_path);
1753 _E("unable to unmount the app content (%d)", ret);
1755 /* detach the loopback encryption setup for the application */
1756 #ifdef TIZEN_FEATURE_APP2SD_DMCRYPT_ENCRYPTION
1757 ret = _app2sd_dmcrypt_close_device(pkgid, uid);
1759 _E("close dmcrypt device error (%d)", ret);
1761 ret = _app2sd_remove_all_loopback_encryption_setups(loopback_device);
1763 _E("unable to detach the loopback encryption setup for the application");
1766 /* delete the loopback device from the SD card */
1767 ret = _app2sd_delete_loopback_device(loopback_device);
1769 _E("unable to detach the loopback encryption setup for the application");
1771 /* delete symlink */
1772 _app2sd_delete_symlink(application_path);
1774 /* remove passwrd from DB */
1775 ret = _app2sd_initialize_db();
1777 _E("app2sd db initialize failed");
1779 ret = _app2sd_remove_info_from_db(pkgid, uid);
1781 _E("cannot remove info from db");