summaryrefslogtreecommitdiffstats
path: root/trust/UsbRestrict.cpp
blob: cb22aedbfc4eba0dc6e7fc9c3434beb517caf58b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
/*
 * Copyright (C) 2019 The LineageOS Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
#include <fstream>

#include "UsbRestrict.h"

#include <android-base/logging.h>

namespace vendor {
namespace lineage {
namespace trust {
namespace V1_0 {
namespace implementation {

static constexpr const char* kControlPath = "/proc/sys/kernel/deny_new_usb";

// Methods from ::vendor::lineage::trust::V1_0::IUsbRestrict follow.
Return<bool> UsbRestrict::isEnabled() {
    std::ifstream file(kControlPath);
    std::string content;
    file >> content;
    file.close();
    return !file.fail() && std::stoi(content);
}

Return<void> UsbRestrict::setEnabled(bool enabled) {
    std::ofstream file(kControlPath);
    if (file.is_open()) {
        file << (enabled ? "1" : "0");
        file.close();
    } else {
        LOG(ERROR) << "Failed to open " << kControlPath << ", error=" << errno
                   << " (" << strerror(errno) << ")";
    }
    return Void();
}

}  // namespace implementation
}  // namespace V1_0
}  // namespace trust
}  // namespace lineage
}  // namespace vendor