2008-10-21 22:00:00 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <linux/kd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <linux/if.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <sys/mount.h>
|
|
|
|
#include <sys/resource.h>
|
2015-01-30 13:31:23 +08:00
|
|
|
#include <sys/time.h>
|
2012-04-18 08:20:16 +08:00
|
|
|
#include <sys/wait.h>
|
2008-11-20 11:37:30 +08:00
|
|
|
#include <linux/loop.h>
|
2011-05-27 11:01:39 +08:00
|
|
|
#include <cutils/partition_utils.h>
|
2013-04-19 03:20:02 +08:00
|
|
|
#include <cutils/android_reboot.h>
|
2012-04-18 08:20:16 +08:00
|
|
|
#include <fs_mgr.h>
|
2008-10-21 22:00:00 +08:00
|
|
|
|
2012-01-13 21:48:47 +08:00
|
|
|
#include <selinux/selinux.h>
|
|
|
|
#include <selinux/label.h>
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
#include "init.h"
|
|
|
|
#include "keywords.h"
|
|
|
|
#include "property_service.h"
|
|
|
|
#include "devices.h"
|
2010-04-21 05:29:05 +08:00
|
|
|
#include "init_parser.h"
|
2010-04-14 11:35:46 +08:00
|
|
|
#include "util.h"
|
2010-04-20 08:05:34 +08:00
|
|
|
#include "log.h"
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
#include <private/android_filesystem_config.h>
|
|
|
|
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
#define chmod DO_NOT_USE_CHMOD_USE_FCHMODAT_SYMLINK_NOFOLLOW
|
|
|
|
|
2014-05-16 18:36:36 +08:00
|
|
|
int add_environment(const char *name, const char *value);
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
extern int init_module(void *, unsigned long, const char *);
|
|
|
|
|
|
|
|
static int write_file(const char *path, const char *value)
|
|
|
|
{
|
|
|
|
int fd, ret, len;
|
|
|
|
|
2015-02-03 06:37:22 +08:00
|
|
|
fd = open(path, O_WRONLY|O_CREAT|O_NOFOLLOW|O_CLOEXEC, 0600);
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
if (fd < 0)
|
2009-06-30 11:30:55 +08:00
|
|
|
return -errno;
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
len = strlen(value);
|
|
|
|
|
|
|
|
do {
|
|
|
|
ret = write(fd, value, len);
|
|
|
|
} while (ret < 0 && errno == EINTR);
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
if (ret < 0) {
|
2009-06-30 11:30:55 +08:00
|
|
|
return -errno;
|
2008-10-21 22:00:00 +08:00
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-12-18 10:08:08 +08:00
|
|
|
static int insmod(const char *filename, char *options)
|
2008-10-21 22:00:00 +08:00
|
|
|
{
|
|
|
|
void *module;
|
|
|
|
unsigned size;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
module = read_file(filename, &size);
|
|
|
|
if (!module)
|
|
|
|
return -1;
|
|
|
|
|
2008-12-18 10:08:08 +08:00
|
|
|
ret = init_module(module, size, options);
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
free(module);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int setkey(struct kbentry *kbe)
|
|
|
|
{
|
|
|
|
int fd, ret;
|
|
|
|
|
2015-02-03 06:37:22 +08:00
|
|
|
fd = open("/dev/tty0", O_RDWR | O_SYNC | O_CLOEXEC);
|
2008-10-21 22:00:00 +08:00
|
|
|
if (fd < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ret = ioctl(fd, KDSKBENT, kbe);
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __ifupdown(const char *interface, int up)
|
|
|
|
{
|
|
|
|
struct ifreq ifr;
|
|
|
|
int s, ret;
|
|
|
|
|
|
|
|
strlcpy(ifr.ifr_name, interface, IFNAMSIZ);
|
|
|
|
|
|
|
|
s = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (s < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ret = ioctl(s, SIOCGIFFLAGS, &ifr);
|
|
|
|
if (ret < 0) {
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (up)
|
|
|
|
ifr.ifr_flags |= IFF_UP;
|
|
|
|
else
|
|
|
|
ifr.ifr_flags &= ~IFF_UP;
|
|
|
|
|
|
|
|
ret = ioctl(s, SIOCSIFFLAGS, &ifr);
|
|
|
|
|
|
|
|
done:
|
|
|
|
close(s);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void service_start_if_not_disabled(struct service *svc)
|
|
|
|
{
|
|
|
|
if (!(svc->flags & SVC_DISABLED)) {
|
2009-05-20 04:30:46 +08:00
|
|
|
service_start(svc, NULL);
|
2014-05-03 12:14:29 +08:00
|
|
|
} else {
|
|
|
|
svc->flags |= SVC_DISABLED_START;
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-11-17 14:41:10 +08:00
|
|
|
int do_chdir(int nargs, char **args)
|
|
|
|
{
|
|
|
|
chdir(args[1]);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_chroot(int nargs, char **args)
|
|
|
|
{
|
|
|
|
chroot(args[1]);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_class_start(int nargs, char **args)
|
|
|
|
{
|
|
|
|
/* Starting a class does not start services
|
|
|
|
* which are explicitly disabled. They must
|
|
|
|
* be started individually.
|
|
|
|
*/
|
|
|
|
service_for_each_class(args[1], service_start_if_not_disabled);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_class_stop(int nargs, char **args)
|
|
|
|
{
|
|
|
|
service_for_each_class(args[1], service_stop);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-12-04 08:33:31 +08:00
|
|
|
int do_class_reset(int nargs, char **args)
|
|
|
|
{
|
|
|
|
service_for_each_class(args[1], service_reset);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_domainname(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return write_file("/proc/sys/kernel/domainname", args[1]);
|
|
|
|
}
|
|
|
|
|
2014-05-03 12:14:29 +08:00
|
|
|
int do_enable(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct service *svc;
|
|
|
|
svc = service_find_by_name(args[1]);
|
|
|
|
if (svc) {
|
|
|
|
svc->flags &= ~(SVC_DISABLED | SVC_RC_DISABLED);
|
|
|
|
if (svc->flags & SVC_DISABLED_START) {
|
|
|
|
service_start(svc, NULL);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_exec(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-09-23 22:48:47 +08:00
|
|
|
int do_execonce(int nargs, char **args)
|
|
|
|
{
|
|
|
|
pid_t child;
|
|
|
|
int child_status = 0;
|
|
|
|
static int already_done;
|
|
|
|
|
|
|
|
if (already_done) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
already_done = 1;
|
|
|
|
if (!(child = fork())) {
|
|
|
|
/*
|
|
|
|
* Child process.
|
|
|
|
*/
|
|
|
|
zap_stdio();
|
|
|
|
char *exec_args[100];
|
2015-02-03 08:43:32 +08:00
|
|
|
size_t num_process_args = nargs;
|
2014-09-23 22:48:47 +08:00
|
|
|
|
|
|
|
memset(exec_args, 0, sizeof(exec_args));
|
|
|
|
if (num_process_args > ARRAY_SIZE(exec_args) - 1) {
|
2015-02-03 08:43:32 +08:00
|
|
|
ERROR("exec called with %zu args, limit is %zu", num_process_args,
|
2014-09-23 22:48:47 +08:00
|
|
|
ARRAY_SIZE(exec_args) - 1);
|
|
|
|
_exit(1);
|
|
|
|
}
|
2015-02-03 08:43:32 +08:00
|
|
|
for (size_t i = 1; i < num_process_args; i++)
|
2014-09-23 22:48:47 +08:00
|
|
|
exec_args[i - 1] = args[i];
|
|
|
|
|
|
|
|
if (execv(exec_args[0], exec_args) == -1) {
|
|
|
|
ERROR("Failed to execv '%s' (%s)", exec_args[0], strerror(errno));
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
ERROR("Returned from execv()!");
|
|
|
|
_exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Parent process.
|
|
|
|
*/
|
|
|
|
if (child == -1) {
|
|
|
|
ERROR("Fork failed\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (TEMP_FAILURE_RETRY(waitpid(child, &child_status, 0)) == -1) {
|
|
|
|
ERROR("waitpid(): failed (%s)\n", strerror(errno));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (WIFSIGNALED(child_status)) {
|
|
|
|
INFO("Child exited due to signal %d\n", WTERMSIG(child_status));
|
|
|
|
return -1;
|
|
|
|
} else if (WIFEXITED(child_status)) {
|
|
|
|
INFO("Child exited normally (exit code %d)\n", WEXITSTATUS(child_status));
|
|
|
|
return WEXITSTATUS(child_status);
|
|
|
|
}
|
|
|
|
|
|
|
|
ERROR("Abnormal child process exit\n");
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_export(int nargs, char **args)
|
|
|
|
{
|
2014-05-16 18:36:36 +08:00
|
|
|
return add_environment(args[1], args[2]);
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int do_hostname(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return write_file("/proc/sys/kernel/hostname", args[1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_ifup(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return __ifupdown(args[1], 1);
|
|
|
|
}
|
|
|
|
|
2008-12-18 10:08:08 +08:00
|
|
|
|
|
|
|
static int do_insmod_inner(int nargs, char **args, int opt_len)
|
|
|
|
{
|
|
|
|
char options[opt_len + 1];
|
|
|
|
int i;
|
|
|
|
|
|
|
|
options[0] = '\0';
|
|
|
|
if (nargs > 2) {
|
|
|
|
strcpy(options, args[2]);
|
|
|
|
for (i = 3; i < nargs; ++i) {
|
|
|
|
strcat(options, " ");
|
|
|
|
strcat(options, args[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return insmod(args[1], options);
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_insmod(int nargs, char **args)
|
|
|
|
{
|
2008-12-18 10:08:08 +08:00
|
|
|
int i;
|
|
|
|
int size = 0;
|
|
|
|
|
|
|
|
if (nargs > 2) {
|
|
|
|
for (i = 2; i < nargs; ++i)
|
|
|
|
size += strlen(args[i]) + 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return do_insmod_inner(nargs, args, size);
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int do_mkdir(int nargs, char **args)
|
|
|
|
{
|
|
|
|
mode_t mode = 0755;
|
2011-07-09 03:57:36 +08:00
|
|
|
int ret;
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
/* mkdir <path> [mode] [owner] [group] */
|
|
|
|
|
|
|
|
if (nargs >= 3) {
|
|
|
|
mode = strtoul(args[2], 0, 8);
|
|
|
|
}
|
|
|
|
|
2012-06-12 01:37:39 +08:00
|
|
|
ret = make_dir(args[1], mode);
|
2011-07-09 03:57:36 +08:00
|
|
|
/* chmod in case the directory already exists */
|
|
|
|
if (ret == -1 && errno == EEXIST) {
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
ret = fchmodat(AT_FDCWD, args[1], mode, AT_SYMLINK_NOFOLLOW);
|
2011-07-09 03:57:36 +08:00
|
|
|
}
|
|
|
|
if (ret == -1) {
|
2008-10-21 22:00:00 +08:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nargs >= 4) {
|
|
|
|
uid_t uid = decode_uid(args[3]);
|
|
|
|
gid_t gid = -1;
|
|
|
|
|
|
|
|
if (nargs == 5) {
|
|
|
|
gid = decode_uid(args[4]);
|
|
|
|
}
|
|
|
|
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
if (lchown(args[1], uid, gid) == -1) {
|
2008-10-21 22:00:00 +08:00
|
|
|
return -errno;
|
|
|
|
}
|
2012-08-15 06:43:46 +08:00
|
|
|
|
|
|
|
/* chown may have cleared S_ISUID and S_ISGID, chmod again */
|
|
|
|
if (mode & (S_ISUID | S_ISGID)) {
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
ret = fchmodat(AT_FDCWD, args[1], mode, AT_SYMLINK_NOFOLLOW);
|
2012-08-15 06:43:46 +08:00
|
|
|
if (ret == -1) {
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
}
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct {
|
|
|
|
const char *name;
|
|
|
|
unsigned flag;
|
|
|
|
} mount_flags[] = {
|
|
|
|
{ "noatime", MS_NOATIME },
|
2011-07-14 19:39:09 +08:00
|
|
|
{ "noexec", MS_NOEXEC },
|
2008-10-21 22:00:00 +08:00
|
|
|
{ "nosuid", MS_NOSUID },
|
|
|
|
{ "nodev", MS_NODEV },
|
|
|
|
{ "nodiratime", MS_NODIRATIME },
|
|
|
|
{ "ro", MS_RDONLY },
|
|
|
|
{ "rw", 0 },
|
|
|
|
{ "remount", MS_REMOUNT },
|
2012-08-15 02:34:34 +08:00
|
|
|
{ "bind", MS_BIND },
|
|
|
|
{ "rec", MS_REC },
|
|
|
|
{ "unbindable", MS_UNBINDABLE },
|
|
|
|
{ "private", MS_PRIVATE },
|
|
|
|
{ "slave", MS_SLAVE },
|
|
|
|
{ "shared", MS_SHARED },
|
2008-10-21 22:00:00 +08:00
|
|
|
{ "defaults", 0 },
|
|
|
|
{ 0, 0 },
|
|
|
|
};
|
|
|
|
|
2010-12-04 08:33:31 +08:00
|
|
|
#define DATA_MNT_POINT "/data"
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
/* mount <type> <device> <path> <flags ...> <options> */
|
|
|
|
int do_mount(int nargs, char **args)
|
|
|
|
{
|
|
|
|
char tmp[64];
|
2008-11-20 11:37:30 +08:00
|
|
|
char *source, *target, *system;
|
2008-10-21 22:00:00 +08:00
|
|
|
char *options = NULL;
|
|
|
|
unsigned flags = 0;
|
|
|
|
int n, i;
|
2010-04-20 08:10:24 +08:00
|
|
|
int wait = 0;
|
2008-10-21 22:00:00 +08:00
|
|
|
|
|
|
|
for (n = 4; n < nargs; n++) {
|
|
|
|
for (i = 0; mount_flags[i].name; i++) {
|
|
|
|
if (!strcmp(args[n], mount_flags[i].name)) {
|
|
|
|
flags |= mount_flags[i].flag;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-04-20 08:10:24 +08:00
|
|
|
if (!mount_flags[i].name) {
|
|
|
|
if (!strcmp(args[n], "wait"))
|
|
|
|
wait = 1;
|
|
|
|
/* if our last argument isn't a flag, wolf it up as an option string */
|
|
|
|
else if (n + 1 == nargs)
|
|
|
|
options = args[n];
|
|
|
|
}
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
2008-11-20 11:37:30 +08:00
|
|
|
system = args[1];
|
2008-10-21 22:00:00 +08:00
|
|
|
source = args[2];
|
2008-11-20 11:37:30 +08:00
|
|
|
target = args[3];
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
if (!strncmp(source, "mtd@", 4)) {
|
|
|
|
n = mtd_name_to_number(source + 4);
|
2008-11-20 11:37:30 +08:00
|
|
|
if (n < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
sprintf(tmp, "/dev/block/mtdblock%d", n);
|
|
|
|
|
2010-04-20 08:10:24 +08:00
|
|
|
if (wait)
|
|
|
|
wait_for_file(tmp, COMMAND_RETRY_TIMEOUT);
|
2008-11-20 11:37:30 +08:00
|
|
|
if (mount(tmp, target, system, flags, options) < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-02-18 10:09:47 +08:00
|
|
|
goto exit_success;
|
2008-11-20 11:37:30 +08:00
|
|
|
} else if (!strncmp(source, "loop@", 5)) {
|
|
|
|
int mode, loop, fd;
|
|
|
|
struct loop_info info;
|
|
|
|
|
|
|
|
mode = (flags & MS_RDONLY) ? O_RDONLY : O_RDWR;
|
2015-02-03 06:37:22 +08:00
|
|
|
fd = open(source + 5, mode | O_CLOEXEC);
|
2008-11-20 11:37:30 +08:00
|
|
|
if (fd < 0) {
|
|
|
|
return -1;
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
2008-11-20 11:37:30 +08:00
|
|
|
|
|
|
|
for (n = 0; ; n++) {
|
|
|
|
sprintf(tmp, "/dev/block/loop%d", n);
|
2015-02-03 06:37:22 +08:00
|
|
|
loop = open(tmp, mode | O_CLOEXEC);
|
2008-11-20 11:37:30 +08:00
|
|
|
if (loop < 0) {
|
2014-02-06 15:57:27 +08:00
|
|
|
close(fd);
|
2008-11-20 11:37:30 +08:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* if it is a blank loop device */
|
|
|
|
if (ioctl(loop, LOOP_GET_STATUS, &info) < 0 && errno == ENXIO) {
|
|
|
|
/* if it becomes our loop device */
|
|
|
|
if (ioctl(loop, LOOP_SET_FD, fd) >= 0) {
|
|
|
|
close(fd);
|
|
|
|
|
|
|
|
if (mount(tmp, target, system, flags, options) < 0) {
|
|
|
|
ioctl(loop, LOOP_CLR_FD, 0);
|
|
|
|
close(loop);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(loop);
|
2011-02-18 10:09:47 +08:00
|
|
|
goto exit_success;
|
2008-11-20 11:37:30 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
close(loop);
|
|
|
|
}
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
ERROR("out of loopback devices");
|
|
|
|
return -1;
|
|
|
|
} else {
|
2010-04-20 08:10:24 +08:00
|
|
|
if (wait)
|
|
|
|
wait_for_file(source, COMMAND_RETRY_TIMEOUT);
|
2008-11-20 11:37:30 +08:00
|
|
|
if (mount(source, target, system, flags, options) < 0) {
|
2012-04-18 08:20:16 +08:00
|
|
|
return -1;
|
2008-11-20 11:37:30 +08:00
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
2011-02-18 10:09:47 +08:00
|
|
|
|
|
|
|
exit_success:
|
2012-04-18 08:20:16 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
}
|
2011-03-09 09:01:29 +08:00
|
|
|
|
2014-07-03 05:26:54 +08:00
|
|
|
static int wipe_data_via_recovery()
|
|
|
|
{
|
|
|
|
mkdir("/cache/recovery", 0700);
|
2015-02-03 06:37:22 +08:00
|
|
|
int fd = open("/cache/recovery/command", O_RDWR|O_CREAT|O_TRUNC|O_CLOEXEC, 0600);
|
2014-07-03 05:26:54 +08:00
|
|
|
if (fd >= 0) {
|
2014-09-25 02:46:36 +08:00
|
|
|
write(fd, "--wipe_data\n", strlen("--wipe_data\n") + 1);
|
|
|
|
write(fd, "--reason=wipe_data_via_recovery\n", strlen("--reason=wipe_data_via_recovery\n") + 1);
|
2014-07-03 05:26:54 +08:00
|
|
|
close(fd);
|
|
|
|
} else {
|
|
|
|
ERROR("could not open /cache/recovery/command\n");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
android_reboot(ANDROID_RB_RESTART2, 0, "recovery");
|
|
|
|
while (1) { pause(); } // never reached
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function might request a reboot, in which case it will
|
|
|
|
* not return.
|
|
|
|
*/
|
2012-04-18 08:20:16 +08:00
|
|
|
int do_mount_all(int nargs, char **args)
|
|
|
|
{
|
|
|
|
pid_t pid;
|
|
|
|
int ret = -1;
|
|
|
|
int child_ret = -1;
|
|
|
|
int status;
|
2013-02-14 04:58:40 +08:00
|
|
|
struct fstab *fstab;
|
2012-04-18 08:20:16 +08:00
|
|
|
|
|
|
|
if (nargs != 2) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Call fs_mgr_mount_all() to mount all filesystems. We fork(2) and
|
|
|
|
* do the call in the child to provide protection to the main init
|
|
|
|
* process if anything goes wrong (crash or memory leak), and wait for
|
|
|
|
* the child to finish in the parent.
|
|
|
|
*/
|
|
|
|
pid = fork();
|
|
|
|
if (pid > 0) {
|
|
|
|
/* Parent. Wait for the child to return */
|
2014-09-17 05:31:23 +08:00
|
|
|
int wp_ret = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
|
|
|
|
if (wp_ret < 0) {
|
|
|
|
/* Unexpected error code. We will continue anyway. */
|
|
|
|
NOTICE("waitpid failed rc=%d, errno=%d\n", wp_ret, errno);
|
|
|
|
}
|
|
|
|
|
2012-04-18 08:20:16 +08:00
|
|
|
if (WIFEXITED(status)) {
|
|
|
|
ret = WEXITSTATUS(status);
|
|
|
|
} else {
|
|
|
|
ret = -1;
|
2011-02-18 10:09:47 +08:00
|
|
|
}
|
2012-04-18 08:20:16 +08:00
|
|
|
} else if (pid == 0) {
|
|
|
|
/* child, call fs_mgr_mount_all() */
|
|
|
|
klog_set_level(6); /* So we can see what fs_mgr_mount_all() does */
|
2013-02-14 04:58:40 +08:00
|
|
|
fstab = fs_mgr_read_fstab(args[1]);
|
|
|
|
child_ret = fs_mgr_mount_all(fstab);
|
|
|
|
fs_mgr_free_fstab(fstab);
|
2012-04-18 08:20:16 +08:00
|
|
|
if (child_ret == -1) {
|
|
|
|
ERROR("fs_mgr_mount_all returned an error\n");
|
2011-02-18 10:09:47 +08:00
|
|
|
}
|
2014-07-03 04:16:04 +08:00
|
|
|
_exit(child_ret);
|
2012-04-18 08:20:16 +08:00
|
|
|
} else {
|
|
|
|
/* fork failed, return an error */
|
|
|
|
return -1;
|
2011-02-18 10:09:47 +08:00
|
|
|
}
|
|
|
|
|
2014-07-03 04:16:04 +08:00
|
|
|
if (ret == FS_MGR_MNTALL_DEV_NEEDS_ENCRYPTION) {
|
2014-02-04 05:27:49 +08:00
|
|
|
property_set("vold.decrypt", "trigger_encryption");
|
2014-07-03 04:16:04 +08:00
|
|
|
} else if (ret == FS_MGR_MNTALL_DEV_MIGHT_BE_ENCRYPTED) {
|
2012-04-18 08:20:16 +08:00
|
|
|
property_set("ro.crypto.state", "encrypted");
|
2014-01-31 02:43:52 +08:00
|
|
|
property_set("vold.decrypt", "trigger_default_encryption");
|
2014-07-03 04:16:04 +08:00
|
|
|
} else if (ret == FS_MGR_MNTALL_DEV_NOT_ENCRYPTED) {
|
2012-04-18 08:20:16 +08:00
|
|
|
property_set("ro.crypto.state", "unencrypted");
|
|
|
|
/* If fs_mgr determined this is an unencrypted device, then trigger
|
|
|
|
* that action.
|
|
|
|
*/
|
|
|
|
action_for_each_trigger("nonencrypted", action_add_queue_tail);
|
2014-07-03 05:26:54 +08:00
|
|
|
} else if (ret == FS_MGR_MNTALL_DEV_NEEDS_RECOVERY) {
|
|
|
|
/* Setup a wipe via recovery, and reboot into recovery */
|
|
|
|
ERROR("fs_mgr_mount_all suggested recovery, so wiping data via recovery.\n");
|
|
|
|
ret = wipe_data_via_recovery();
|
|
|
|
/* If reboot worked, there is no return. */
|
|
|
|
} else if (ret > 0) {
|
|
|
|
ERROR("fs_mgr_mount_all returned unexpected error %d\n", ret);
|
2012-04-18 08:20:16 +08:00
|
|
|
}
|
2014-07-03 04:16:04 +08:00
|
|
|
/* else ... < 0: error */
|
2011-02-18 10:09:47 +08:00
|
|
|
|
2012-04-18 08:20:16 +08:00
|
|
|
return ret;
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
2013-07-10 09:42:09 +08:00
|
|
|
int do_swapon_all(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct fstab *fstab;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
fstab = fs_mgr_read_fstab(args[1]);
|
|
|
|
ret = fs_mgr_swapon_all(fstab);
|
|
|
|
fs_mgr_free_fstab(fstab);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-01-13 21:48:47 +08:00
|
|
|
int do_setcon(int nargs, char **args) {
|
|
|
|
if (is_selinux_enabled() <= 0)
|
|
|
|
return 0;
|
|
|
|
if (setcon(args[1]) < 0) {
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_setenforce(int nargs, char **args) {
|
|
|
|
if (is_selinux_enabled() <= 0)
|
|
|
|
return 0;
|
|
|
|
if (security_setenforce(atoi(args[1])) < 0) {
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_setkey(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct kbentry kbe;
|
|
|
|
kbe.kb_table = strtoul(args[1], 0, 0);
|
|
|
|
kbe.kb_index = strtoul(args[2], 0, 0);
|
|
|
|
kbe.kb_value = strtoul(args[3], 0, 0);
|
|
|
|
return setkey(&kbe);
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_setprop(int nargs, char **args)
|
|
|
|
{
|
2011-06-09 08:31:27 +08:00
|
|
|
const char *name = args[1];
|
|
|
|
const char *value = args[2];
|
2011-12-21 05:44:41 +08:00
|
|
|
char prop_val[PROP_VALUE_MAX];
|
|
|
|
int ret;
|
2011-06-09 08:31:27 +08:00
|
|
|
|
2011-12-21 05:44:41 +08:00
|
|
|
ret = expand_props(prop_val, value, sizeof(prop_val));
|
|
|
|
if (ret) {
|
|
|
|
ERROR("cannot expand '%s' while assigning to '%s'\n", value, name);
|
|
|
|
return -EINVAL;
|
2011-06-09 08:31:27 +08:00
|
|
|
}
|
2011-12-21 05:44:41 +08:00
|
|
|
property_set(name, prop_val);
|
2008-10-21 22:00:00 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_setrlimit(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct rlimit limit;
|
|
|
|
int resource;
|
|
|
|
resource = atoi(args[1]);
|
|
|
|
limit.rlim_cur = atoi(args[2]);
|
|
|
|
limit.rlim_max = atoi(args[3]);
|
|
|
|
return setrlimit(resource, &limit);
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_start(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct service *svc;
|
|
|
|
svc = service_find_by_name(args[1]);
|
|
|
|
if (svc) {
|
2009-05-20 04:30:46 +08:00
|
|
|
service_start(svc, NULL);
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_stop(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct service *svc;
|
|
|
|
svc = service_find_by_name(args[1]);
|
|
|
|
if (svc) {
|
|
|
|
service_stop(svc);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_restart(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct service *svc;
|
|
|
|
svc = service_find_by_name(args[1]);
|
|
|
|
if (svc) {
|
2012-01-26 12:48:46 +08:00
|
|
|
service_restart(svc);
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-04-19 03:20:02 +08:00
|
|
|
int do_powerctl(int nargs, char **args)
|
|
|
|
{
|
|
|
|
char command[PROP_VALUE_MAX];
|
|
|
|
int res;
|
|
|
|
int len = 0;
|
|
|
|
int cmd = 0;
|
|
|
|
char *reboot_target;
|
|
|
|
|
|
|
|
res = expand_props(command, args[1], sizeof(command));
|
|
|
|
if (res) {
|
|
|
|
ERROR("powerctl: cannot expand '%s'\n", args[1]);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (strncmp(command, "shutdown", 8) == 0) {
|
|
|
|
cmd = ANDROID_RB_POWEROFF;
|
|
|
|
len = 8;
|
|
|
|
} else if (strncmp(command, "reboot", 6) == 0) {
|
|
|
|
cmd = ANDROID_RB_RESTART2;
|
|
|
|
len = 6;
|
|
|
|
} else {
|
|
|
|
ERROR("powerctl: unrecognized command '%s'\n", command);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (command[len] == ',') {
|
|
|
|
reboot_target = &command[len + 1];
|
|
|
|
} else if (command[len] == '\0') {
|
|
|
|
reboot_target = "";
|
|
|
|
} else {
|
|
|
|
ERROR("powerctl: unrecognized reboot target '%s'\n", &command[len]);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return android_reboot(cmd, 0, reboot_target);
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_trigger(int nargs, char **args)
|
|
|
|
{
|
2008-11-17 14:35:08 +08:00
|
|
|
action_for_each_trigger(args[1], action_add_queue_tail);
|
2008-10-21 22:00:00 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_symlink(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return symlink(args[1], args[2]);
|
|
|
|
}
|
|
|
|
|
2011-01-19 09:37:41 +08:00
|
|
|
int do_rm(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return unlink(args[1]);
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_rmdir(int nargs, char **args)
|
|
|
|
{
|
|
|
|
return rmdir(args[1]);
|
|
|
|
}
|
|
|
|
|
2008-12-18 10:08:08 +08:00
|
|
|
int do_sysclktz(int nargs, char **args)
|
|
|
|
{
|
|
|
|
struct timezone tz;
|
|
|
|
|
|
|
|
if (nargs != 2)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
memset(&tz, 0, sizeof(tz));
|
|
|
|
tz.tz_minuteswest = atoi(args[1]);
|
|
|
|
if (settimeofday(NULL, &tz))
|
|
|
|
return -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_write(int nargs, char **args)
|
|
|
|
{
|
2011-06-09 08:31:27 +08:00
|
|
|
const char *path = args[1];
|
|
|
|
const char *value = args[2];
|
2011-12-21 05:44:41 +08:00
|
|
|
char prop_val[PROP_VALUE_MAX];
|
|
|
|
int ret;
|
2011-06-08 08:30:11 +08:00
|
|
|
|
2011-12-21 05:44:41 +08:00
|
|
|
ret = expand_props(prop_val, value, sizeof(prop_val));
|
|
|
|
if (ret) {
|
|
|
|
ERROR("cannot expand '%s' while writing to '%s'\n", value, path);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
return write_file(path, prop_val);
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
2009-08-27 07:39:25 +08:00
|
|
|
int do_copy(int nargs, char **args)
|
|
|
|
{
|
|
|
|
char *buffer = NULL;
|
|
|
|
int rc = 0;
|
|
|
|
int fd1 = -1, fd2 = -1;
|
|
|
|
struct stat info;
|
|
|
|
int brtw, brtr;
|
|
|
|
char *p;
|
|
|
|
|
|
|
|
if (nargs != 3)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (stat(args[1], &info) < 0)
|
|
|
|
return -1;
|
|
|
|
|
2015-02-03 06:37:22 +08:00
|
|
|
if ((fd1 = open(args[1], O_RDONLY|O_CLOEXEC)) < 0)
|
2009-08-27 07:39:25 +08:00
|
|
|
goto out_err;
|
|
|
|
|
2015-02-03 06:37:22 +08:00
|
|
|
if ((fd2 = open(args[2], O_WRONLY|O_CREAT|O_TRUNC|O_CLOEXEC, 0660)) < 0)
|
2009-08-27 07:39:25 +08:00
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
if (!(buffer = malloc(info.st_size)))
|
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
p = buffer;
|
|
|
|
brtr = info.st_size;
|
|
|
|
while(brtr) {
|
|
|
|
rc = read(fd1, p, brtr);
|
|
|
|
if (rc < 0)
|
|
|
|
goto out_err;
|
|
|
|
if (rc == 0)
|
|
|
|
break;
|
|
|
|
p += rc;
|
|
|
|
brtr -= rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = buffer;
|
|
|
|
brtw = info.st_size;
|
|
|
|
while(brtw) {
|
|
|
|
rc = write(fd2, p, brtw);
|
|
|
|
if (rc < 0)
|
|
|
|
goto out_err;
|
|
|
|
if (rc == 0)
|
|
|
|
break;
|
|
|
|
p += rc;
|
|
|
|
brtw -= rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = 0;
|
|
|
|
goto out;
|
|
|
|
out_err:
|
|
|
|
rc = -1;
|
|
|
|
out:
|
|
|
|
if (buffer)
|
|
|
|
free(buffer);
|
|
|
|
if (fd1 >= 0)
|
|
|
|
close(fd1);
|
|
|
|
if (fd2 >= 0)
|
|
|
|
close(fd2);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_chown(int nargs, char **args) {
|
|
|
|
/* GID is optional. */
|
|
|
|
if (nargs == 3) {
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
if (lchown(args[2], decode_uid(args[1]), -1) == -1)
|
2008-10-21 22:00:00 +08:00
|
|
|
return -errno;
|
|
|
|
} else if (nargs == 4) {
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
if (lchown(args[3], decode_uid(args[1]), decode_uid(args[2])) == -1)
|
2008-10-21 22:00:00 +08:00
|
|
|
return -errno;
|
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static mode_t get_mode(const char *s) {
|
|
|
|
mode_t mode = 0;
|
|
|
|
while (*s) {
|
|
|
|
if (*s >= '0' && *s <= '7') {
|
|
|
|
mode = (mode<<3) | (*s-'0');
|
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
s++;
|
|
|
|
}
|
|
|
|
return mode;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_chmod(int nargs, char **args) {
|
|
|
|
mode_t mode = get_mode(args[1]);
|
builtins.c: Don't require file open() for chmod/chown
42a9349dc4e98019d27d7f8d19bc6c431695d7e1 modified init's
builtin chmod, chown, and mkdir calls to avoid following
symlinks. This addressed a number of attacks we were seeing
at the time where poorly written init scripts were following
attacker supplied symlinks resulting in rooting vulnerabilities.
To avoid race conditions, the previous implementation only ran
fchown / fchmod on file descriptors opened with open(O_NOFOLLOW).
Unfortunately, unlike the normal "chown" or "chmod" calls, this
requires read or write access to the underlying file. This
isn't ideal, as opening some files may have side effects, or
init may not have permission to open certain files (such as when
SELinux is enabled).
Instead of using open(O_NOFOLLOW) + fchown(), use lchown() instead.
As before, the target of the symlink won't be modified by chown.
This also supports setting the ownership of symlinks.
Instead of using open(O_NOFOLLOW) + fchmod(), use
fchmodat(AT_SYMLINK_NOFOLLOW) instead. As before, the target of the
symlink won't be modified by chmod.
This change will continue to ensure that chown/chmod/mkdir doesn't
follow symlinks, without requiring init to open every file in
read-only or read-write mode.
This change depends on bionic commit I1eba0cdb2c509d9193ceecf28f13118188a3cfa7
Addresses the following mako/occam SELinux denial:
audit(1422770408.951:6): avc: denied { write } for pid=1 comm="init" name="smd7" dev="tmpfs" ino=7207 scontext=u:r:init:s0 tcontext=u:object_r:radio_device:s0 tclass=chr_file
Change-Id: I14fde956784d65c44e7aa91dd7eea9a004df3081
2015-02-01 13:39:46 +08:00
|
|
|
if (fchmodat(AT_FDCWD, args[2], mode, AT_SYMLINK_NOFOLLOW) < 0) {
|
2008-10-21 22:00:00 +08:00
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-01-13 21:48:47 +08:00
|
|
|
int do_restorecon(int nargs, char **args) {
|
|
|
|
int i;
|
2013-10-10 04:02:09 +08:00
|
|
|
int ret = 0;
|
2012-01-13 21:48:47 +08:00
|
|
|
|
|
|
|
for (i = 1; i < nargs; i++) {
|
2012-06-12 01:37:39 +08:00
|
|
|
if (restorecon(args[i]) < 0)
|
2013-10-10 04:02:09 +08:00
|
|
|
ret = -errno;
|
2012-01-13 21:48:47 +08:00
|
|
|
}
|
2013-10-10 04:02:09 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int do_restorecon_recursive(int nargs, char **args) {
|
|
|
|
int i;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
for (i = 1; i < nargs; i++) {
|
|
|
|
if (restorecon_recursive(args[i]) < 0)
|
|
|
|
ret = -errno;
|
|
|
|
}
|
|
|
|
return ret;
|
2012-01-13 21:48:47 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int do_setsebool(int nargs, char **args) {
|
2012-11-29 02:52:12 +08:00
|
|
|
const char *name = args[1];
|
|
|
|
const char *value = args[2];
|
|
|
|
SELboolean b;
|
|
|
|
int ret;
|
2012-01-13 21:48:47 +08:00
|
|
|
|
|
|
|
if (is_selinux_enabled() <= 0)
|
|
|
|
return 0;
|
|
|
|
|
2012-11-29 02:52:12 +08:00
|
|
|
b.name = name;
|
|
|
|
if (!strcmp(value, "1") || !strcasecmp(value, "true") || !strcasecmp(value, "on"))
|
|
|
|
b.value = 1;
|
|
|
|
else if (!strcmp(value, "0") || !strcasecmp(value, "false") || !strcasecmp(value, "off"))
|
|
|
|
b.value = 0;
|
|
|
|
else {
|
|
|
|
ERROR("setsebool: invalid value %s\n", value);
|
|
|
|
return -EINVAL;
|
2012-01-13 21:48:47 +08:00
|
|
|
}
|
|
|
|
|
2012-11-29 02:52:12 +08:00
|
|
|
if (security_set_boolean_list(1, &b, 0) < 0) {
|
|
|
|
ret = -errno;
|
|
|
|
ERROR("setsebool: could not set %s to %s\n", name, value);
|
|
|
|
return ret;
|
|
|
|
}
|
2012-10-17 14:07:05 +08:00
|
|
|
|
2012-01-13 21:48:47 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-10-21 22:00:00 +08:00
|
|
|
int do_loglevel(int nargs, char **args) {
|
2014-06-27 04:55:03 +08:00
|
|
|
int log_level;
|
|
|
|
char log_level_str[PROP_VALUE_MAX] = "";
|
|
|
|
if (nargs != 2) {
|
|
|
|
ERROR("loglevel: missing argument\n");
|
|
|
|
return -EINVAL;
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
2014-06-27 04:55:03 +08:00
|
|
|
|
|
|
|
if (expand_props(log_level_str, args[1], sizeof(log_level_str))) {
|
|
|
|
ERROR("loglevel: cannot expand '%s'\n", args[1]);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
log_level = atoi(log_level_str);
|
|
|
|
if (log_level < KLOG_ERROR_LEVEL || log_level > KLOG_DEBUG_LEVEL) {
|
|
|
|
ERROR("loglevel: invalid log level'%d'\n", log_level);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
klog_set_level(log_level);
|
|
|
|
return 0;
|
2008-10-21 22:00:00 +08:00
|
|
|
}
|
|
|
|
|
2011-03-09 09:01:29 +08:00
|
|
|
int do_load_persist_props(int nargs, char **args) {
|
|
|
|
if (nargs == 1) {
|
|
|
|
load_persist_props();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2014-06-17 06:06:21 +08:00
|
|
|
int do_load_all_props(int nargs, char **args) {
|
|
|
|
if (nargs == 1) {
|
|
|
|
load_all_props();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-04-20 08:10:24 +08:00
|
|
|
int do_wait(int nargs, char **args)
|
|
|
|
{
|
|
|
|
if (nargs == 2) {
|
|
|
|
return wait_for_file(args[1], COMMAND_RETRY_TIMEOUT);
|
2011-02-05 02:51:39 +08:00
|
|
|
} else if (nargs == 3) {
|
|
|
|
return wait_for_file(args[1], atoi(args[2]));
|
|
|
|
} else
|
|
|
|
return -1;
|
2010-04-20 08:10:24 +08:00
|
|
|
}
|