blob: 6c4d9c49fb6b16d4056f2e8a50fc149b22cf036c [file] [log] [blame]
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <sys/types.h>
18#include <sys/stat.h>
19#include <fcntl.h>
20#include <unistd.h>
21#include <string.h>
22#include <stdio.h>
23#include <linux/kd.h>
24#include <errno.h>
25#include <sys/socket.h>
26#include <netinet/in.h>
27#include <linux/if.h>
28#include <arpa/inet.h>
29#include <stdlib.h>
30#include <sys/mount.h>
31#include <sys/resource.h>
Elliott Hughes3d74d7a2015-01-29 21:31:23 -080032#include <sys/time.h>
Ken Sumrall0e9dd902012-04-17 17:20:16 -070033#include <sys/wait.h>
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +000034#include <linux/loop.h>
Ken Sumrall7bc6e9e2011-05-26 20:01:39 -070035#include <cutils/partition_utils.h>
Nick Kralevichca8e66a2013-04-18 12:20:02 -070036#include <cutils/android_reboot.h>
Ken Sumrall0e9dd902012-04-17 17:20:16 -070037#include <fs_mgr.h>
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070038
Stephen Smalleye46f9d52012-01-13 08:48:47 -050039#include <selinux/selinux.h>
40#include <selinux/label.h>
Stephen Smalleye46f9d52012-01-13 08:48:47 -050041
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070042#include "init.h"
43#include "keywords.h"
44#include "property_service.h"
45#include "devices.h"
Colin Cross6310a822010-04-20 14:29:05 -070046#include "init_parser.h"
Colin Cross3899e9f2010-04-13 20:35:46 -070047#include "util.h"
Colin Crossed8a7d82010-04-19 17:05:34 -070048#include "log.h"
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070049
50#include <private/android_filesystem_config.h>
51
Nick Kralevichbc609542015-01-31 21:39:46 -080052#define chmod DO_NOT_USE_CHMOD_USE_FCHMODAT_SYMLINK_NOFOLLOW
53
James Morrissey381341f2014-05-16 11:36:36 +010054int add_environment(const char *name, const char *value);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070055
Elliott Hughesf3cf4382015-02-03 17:12:07 -080056// System call provided by bionic but not in any header file.
57extern "C" int init_module(void *, unsigned long, const char *);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070058
59static int write_file(const char *path, const char *value)
60{
61 int fd, ret, len;
62
Nick Kralevich45a884f2015-02-02 14:37:22 -080063 fd = open(path, O_WRONLY|O_CREAT|O_NOFOLLOW|O_CLOEXEC, 0600);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070064
65 if (fd < 0)
Mike Chan008abac2009-06-29 20:30:55 -070066 return -errno;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070067
68 len = strlen(value);
69
70 do {
71 ret = write(fd, value, len);
72 } while (ret < 0 && errno == EINTR);
73
74 close(fd);
75 if (ret < 0) {
Mike Chan008abac2009-06-29 20:30:55 -070076 return -errno;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070077 } else {
78 return 0;
79 }
80}
81
The Android Open Source Project35237d12008-12-17 18:08:08 -080082static int insmod(const char *filename, char *options)
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070083{
84 void *module;
85 unsigned size;
86 int ret;
87
88 module = read_file(filename, &size);
89 if (!module)
90 return -1;
91
The Android Open Source Project35237d12008-12-17 18:08:08 -080092 ret = init_module(module, size, options);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070093
94 free(module);
95
96 return ret;
97}
98
99static int setkey(struct kbentry *kbe)
100{
101 int fd, ret;
102
Nick Kralevich45a884f2015-02-02 14:37:22 -0800103 fd = open("/dev/tty0", O_RDWR | O_SYNC | O_CLOEXEC);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700104 if (fd < 0)
105 return -1;
106
107 ret = ioctl(fd, KDSKBENT, kbe);
108
109 close(fd);
110 return ret;
111}
112
113static int __ifupdown(const char *interface, int up)
114{
115 struct ifreq ifr;
116 int s, ret;
117
118 strlcpy(ifr.ifr_name, interface, IFNAMSIZ);
119
120 s = socket(AF_INET, SOCK_DGRAM, 0);
121 if (s < 0)
122 return -1;
123
124 ret = ioctl(s, SIOCGIFFLAGS, &ifr);
125 if (ret < 0) {
126 goto done;
127 }
128
129 if (up)
130 ifr.ifr_flags |= IFF_UP;
131 else
132 ifr.ifr_flags &= ~IFF_UP;
133
134 ret = ioctl(s, SIOCSIFFLAGS, &ifr);
135
136done:
137 close(s);
138 return ret;
139}
140
141static void service_start_if_not_disabled(struct service *svc)
142{
143 if (!(svc->flags & SVC_DISABLED)) {
San Mehatf24e2522009-05-19 13:30:46 -0700144 service_start(svc, NULL);
JP Abgrall3beec7e2014-05-02 21:14:29 -0700145 } else {
146 svc->flags |= SVC_DISABLED_START;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700147 }
148}
149
Jay Freeman (saurik)e7cb1372008-11-17 06:41:10 +0000150int do_chdir(int nargs, char **args)
151{
152 chdir(args[1]);
153 return 0;
154}
155
156int do_chroot(int nargs, char **args)
157{
158 chroot(args[1]);
159 return 0;
160}
161
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700162int do_class_start(int nargs, char **args)
163{
164 /* Starting a class does not start services
165 * which are explicitly disabled. They must
166 * be started individually.
167 */
168 service_for_each_class(args[1], service_start_if_not_disabled);
169 return 0;
170}
171
172int do_class_stop(int nargs, char **args)
173{
174 service_for_each_class(args[1], service_stop);
175 return 0;
176}
177
Ken Sumrall752923c2010-12-03 16:33:31 -0800178int do_class_reset(int nargs, char **args)
179{
180 service_for_each_class(args[1], service_reset);
181 return 0;
182}
183
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700184int do_domainname(int nargs, char **args)
185{
186 return write_file("/proc/sys/kernel/domainname", args[1]);
187}
188
JP Abgrall3beec7e2014-05-02 21:14:29 -0700189int do_enable(int nargs, char **args)
190{
191 struct service *svc;
192 svc = service_find_by_name(args[1]);
193 if (svc) {
194 svc->flags &= ~(SVC_DISABLED | SVC_RC_DISABLED);
195 if (svc->flags & SVC_DISABLED_START) {
196 service_start(svc, NULL);
197 }
198 } else {
199 return -1;
200 }
201 return 0;
202}
203
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700204int do_exec(int nargs, char **args)
205{
206 return -1;
207}
208
San Mehat429721c2014-09-23 07:48:47 -0700209int do_execonce(int nargs, char **args)
210{
211 pid_t child;
212 int child_status = 0;
213 static int already_done;
214
215 if (already_done) {
216 return -1;
217 }
218 already_done = 1;
219 if (!(child = fork())) {
220 /*
221 * Child process.
222 */
223 zap_stdio();
224 char *exec_args[100];
Elliott Hughesd3e37d12015-02-02 16:43:32 -0800225 size_t num_process_args = nargs;
San Mehat429721c2014-09-23 07:48:47 -0700226
227 memset(exec_args, 0, sizeof(exec_args));
228 if (num_process_args > ARRAY_SIZE(exec_args) - 1) {
Elliott Hughesd3e37d12015-02-02 16:43:32 -0800229 ERROR("exec called with %zu args, limit is %zu", num_process_args,
San Mehat429721c2014-09-23 07:48:47 -0700230 ARRAY_SIZE(exec_args) - 1);
231 _exit(1);
232 }
Elliott Hughesd3e37d12015-02-02 16:43:32 -0800233 for (size_t i = 1; i < num_process_args; i++)
San Mehat429721c2014-09-23 07:48:47 -0700234 exec_args[i - 1] = args[i];
235
236 if (execv(exec_args[0], exec_args) == -1) {
237 ERROR("Failed to execv '%s' (%s)", exec_args[0], strerror(errno));
238 _exit(1);
239 }
240 ERROR("Returned from execv()!");
241 _exit(1);
242 }
243
244 /*
245 * Parent process.
246 */
247 if (child == -1) {
248 ERROR("Fork failed\n");
249 return -1;
250 }
251
252 if (TEMP_FAILURE_RETRY(waitpid(child, &child_status, 0)) == -1) {
253 ERROR("waitpid(): failed (%s)\n", strerror(errno));
254 return -1;
255 }
256
257 if (WIFSIGNALED(child_status)) {
258 INFO("Child exited due to signal %d\n", WTERMSIG(child_status));
259 return -1;
260 } else if (WIFEXITED(child_status)) {
261 INFO("Child exited normally (exit code %d)\n", WEXITSTATUS(child_status));
262 return WEXITSTATUS(child_status);
263 }
264
265 ERROR("Abnormal child process exit\n");
266
267 return -1;
268}
269
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700270int do_export(int nargs, char **args)
271{
James Morrissey381341f2014-05-16 11:36:36 +0100272 return add_environment(args[1], args[2]);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700273}
274
275int do_hostname(int nargs, char **args)
276{
277 return write_file("/proc/sys/kernel/hostname", args[1]);
278}
279
280int do_ifup(int nargs, char **args)
281{
282 return __ifupdown(args[1], 1);
283}
284
The Android Open Source Project35237d12008-12-17 18:08:08 -0800285
286static int do_insmod_inner(int nargs, char **args, int opt_len)
287{
288 char options[opt_len + 1];
289 int i;
290
291 options[0] = '\0';
292 if (nargs > 2) {
293 strcpy(options, args[2]);
294 for (i = 3; i < nargs; ++i) {
295 strcat(options, " ");
296 strcat(options, args[i]);
297 }
298 }
299
300 return insmod(args[1], options);
301}
302
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700303int do_insmod(int nargs, char **args)
304{
The Android Open Source Project35237d12008-12-17 18:08:08 -0800305 int i;
306 int size = 0;
307
308 if (nargs > 2) {
309 for (i = 2; i < nargs; ++i)
310 size += strlen(args[i]) + 1;
311 }
312
313 return do_insmod_inner(nargs, args, size);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700314}
315
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700316int do_mkdir(int nargs, char **args)
317{
318 mode_t mode = 0755;
Chia-chi Yeh27164dc2011-07-08 12:57:36 -0700319 int ret;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700320
321 /* mkdir <path> [mode] [owner] [group] */
322
323 if (nargs >= 3) {
324 mode = strtoul(args[2], 0, 8);
325 }
326
Stephen Smalleye096e362012-06-11 13:37:39 -0400327 ret = make_dir(args[1], mode);
Chia-chi Yeh27164dc2011-07-08 12:57:36 -0700328 /* chmod in case the directory already exists */
329 if (ret == -1 && errno == EEXIST) {
Nick Kralevichbc609542015-01-31 21:39:46 -0800330 ret = fchmodat(AT_FDCWD, args[1], mode, AT_SYMLINK_NOFOLLOW);
Chia-chi Yeh27164dc2011-07-08 12:57:36 -0700331 }
332 if (ret == -1) {
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700333 return -errno;
334 }
335
336 if (nargs >= 4) {
337 uid_t uid = decode_uid(args[3]);
338 gid_t gid = -1;
339
340 if (nargs == 5) {
341 gid = decode_uid(args[4]);
342 }
343
Nick Kralevichbc609542015-01-31 21:39:46 -0800344 if (lchown(args[1], uid, gid) == -1) {
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700345 return -errno;
346 }
Benoit Goby5c8574b2012-08-14 15:43:46 -0700347
348 /* chown may have cleared S_ISUID and S_ISGID, chmod again */
349 if (mode & (S_ISUID | S_ISGID)) {
Nick Kralevichbc609542015-01-31 21:39:46 -0800350 ret = fchmodat(AT_FDCWD, args[1], mode, AT_SYMLINK_NOFOLLOW);
Benoit Goby5c8574b2012-08-14 15:43:46 -0700351 if (ret == -1) {
352 return -errno;
353 }
354 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700355 }
356
357 return 0;
358}
359
360static struct {
361 const char *name;
362 unsigned flag;
363} mount_flags[] = {
364 { "noatime", MS_NOATIME },
Lars Svenssonb6ee25e2011-07-14 13:39:09 +0200365 { "noexec", MS_NOEXEC },
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700366 { "nosuid", MS_NOSUID },
367 { "nodev", MS_NODEV },
368 { "nodiratime", MS_NODIRATIME },
369 { "ro", MS_RDONLY },
370 { "rw", 0 },
371 { "remount", MS_REMOUNT },
Jeff Sharkeye50ac5f2012-08-14 11:34:34 -0700372 { "bind", MS_BIND },
373 { "rec", MS_REC },
374 { "unbindable", MS_UNBINDABLE },
375 { "private", MS_PRIVATE },
376 { "slave", MS_SLAVE },
377 { "shared", MS_SHARED },
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700378 { "defaults", 0 },
379 { 0, 0 },
380};
381
Ken Sumrall752923c2010-12-03 16:33:31 -0800382#define DATA_MNT_POINT "/data"
383
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700384/* mount <type> <device> <path> <flags ...> <options> */
385int do_mount(int nargs, char **args)
386{
387 char tmp[64];
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000388 char *source, *target, *system;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700389 char *options = NULL;
390 unsigned flags = 0;
391 int n, i;
Colin Crosscd0f1732010-04-19 17:10:24 -0700392 int wait = 0;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700393
394 for (n = 4; n < nargs; n++) {
395 for (i = 0; mount_flags[i].name; i++) {
396 if (!strcmp(args[n], mount_flags[i].name)) {
397 flags |= mount_flags[i].flag;
398 break;
399 }
400 }
401
Colin Crosscd0f1732010-04-19 17:10:24 -0700402 if (!mount_flags[i].name) {
403 if (!strcmp(args[n], "wait"))
404 wait = 1;
405 /* if our last argument isn't a flag, wolf it up as an option string */
406 else if (n + 1 == nargs)
407 options = args[n];
408 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700409 }
410
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000411 system = args[1];
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700412 source = args[2];
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000413 target = args[3];
414
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700415 if (!strncmp(source, "mtd@", 4)) {
416 n = mtd_name_to_number(source + 4);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000417 if (n < 0) {
418 return -1;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700419 }
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000420
421 sprintf(tmp, "/dev/block/mtdblock%d", n);
422
Colin Crosscd0f1732010-04-19 17:10:24 -0700423 if (wait)
424 wait_for_file(tmp, COMMAND_RETRY_TIMEOUT);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000425 if (mount(tmp, target, system, flags, options) < 0) {
426 return -1;
427 }
428
Ken Sumralldd4d7862011-02-17 18:09:47 -0800429 goto exit_success;
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000430 } else if (!strncmp(source, "loop@", 5)) {
431 int mode, loop, fd;
432 struct loop_info info;
433
434 mode = (flags & MS_RDONLY) ? O_RDONLY : O_RDWR;
Nick Kralevich45a884f2015-02-02 14:37:22 -0800435 fd = open(source + 5, mode | O_CLOEXEC);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000436 if (fd < 0) {
437 return -1;
438 }
439
440 for (n = 0; ; n++) {
441 sprintf(tmp, "/dev/block/loop%d", n);
Nick Kralevich45a884f2015-02-02 14:37:22 -0800442 loop = open(tmp, mode | O_CLOEXEC);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000443 if (loop < 0) {
Tomasz Kondelbfdcc402014-02-06 08:57:27 +0100444 close(fd);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000445 return -1;
446 }
447
448 /* if it is a blank loop device */
449 if (ioctl(loop, LOOP_GET_STATUS, &info) < 0 && errno == ENXIO) {
450 /* if it becomes our loop device */
451 if (ioctl(loop, LOOP_SET_FD, fd) >= 0) {
452 close(fd);
453
454 if (mount(tmp, target, system, flags, options) < 0) {
455 ioctl(loop, LOOP_CLR_FD, 0);
456 close(loop);
457 return -1;
458 }
459
460 close(loop);
Ken Sumralldd4d7862011-02-17 18:09:47 -0800461 goto exit_success;
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000462 }
463 }
464
465 close(loop);
466 }
467
468 close(fd);
469 ERROR("out of loopback devices");
470 return -1;
471 } else {
Colin Crosscd0f1732010-04-19 17:10:24 -0700472 if (wait)
473 wait_for_file(source, COMMAND_RETRY_TIMEOUT);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000474 if (mount(source, target, system, flags, options) < 0) {
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700475 return -1;
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000476 }
477
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700478 }
Ken Sumralldd4d7862011-02-17 18:09:47 -0800479
480exit_success:
Ken Sumralldd4d7862011-02-17 18:09:47 -0800481 return 0;
482
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700483}
484
JP Abgrallcee20682014-07-02 14:26:54 -0700485static int wipe_data_via_recovery()
486{
487 mkdir("/cache/recovery", 0700);
Nick Kralevich45a884f2015-02-02 14:37:22 -0800488 int fd = open("/cache/recovery/command", O_RDWR|O_CREAT|O_TRUNC|O_CLOEXEC, 0600);
JP Abgrallcee20682014-07-02 14:26:54 -0700489 if (fd >= 0) {
Jeff Sharkeyd26135b2014-09-24 11:46:36 -0700490 write(fd, "--wipe_data\n", strlen("--wipe_data\n") + 1);
491 write(fd, "--reason=wipe_data_via_recovery\n", strlen("--reason=wipe_data_via_recovery\n") + 1);
JP Abgrallcee20682014-07-02 14:26:54 -0700492 close(fd);
493 } else {
494 ERROR("could not open /cache/recovery/command\n");
495 return -1;
496 }
497 android_reboot(ANDROID_RB_RESTART2, 0, "recovery");
498 while (1) { pause(); } // never reached
499}
500
501
502/*
503 * This function might request a reboot, in which case it will
504 * not return.
505 */
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700506int do_mount_all(int nargs, char **args)
507{
508 pid_t pid;
509 int ret = -1;
510 int child_ret = -1;
511 int status;
Ken Sumrallab6b8522013-02-13 12:58:40 -0800512 struct fstab *fstab;
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700513
514 if (nargs != 2) {
515 return -1;
516 }
517
518 /*
519 * Call fs_mgr_mount_all() to mount all filesystems. We fork(2) and
520 * do the call in the child to provide protection to the main init
521 * process if anything goes wrong (crash or memory leak), and wait for
522 * the child to finish in the parent.
523 */
524 pid = fork();
525 if (pid > 0) {
526 /* Parent. Wait for the child to return */
Paul Lawrence40af0922014-09-16 14:31:23 -0700527 int wp_ret = TEMP_FAILURE_RETRY(waitpid(pid, &status, 0));
528 if (wp_ret < 0) {
529 /* Unexpected error code. We will continue anyway. */
530 NOTICE("waitpid failed rc=%d, errno=%d\n", wp_ret, errno);
531 }
532
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700533 if (WIFEXITED(status)) {
534 ret = WEXITSTATUS(status);
535 } else {
536 ret = -1;
537 }
538 } else if (pid == 0) {
539 /* child, call fs_mgr_mount_all() */
540 klog_set_level(6); /* So we can see what fs_mgr_mount_all() does */
Ken Sumrallab6b8522013-02-13 12:58:40 -0800541 fstab = fs_mgr_read_fstab(args[1]);
542 child_ret = fs_mgr_mount_all(fstab);
543 fs_mgr_free_fstab(fstab);
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700544 if (child_ret == -1) {
545 ERROR("fs_mgr_mount_all returned an error\n");
546 }
JP Abgrallf22b7452014-07-02 13:16:04 -0700547 _exit(child_ret);
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700548 } else {
549 /* fork failed, return an error */
550 return -1;
551 }
552
JP Abgrallf22b7452014-07-02 13:16:04 -0700553 if (ret == FS_MGR_MNTALL_DEV_NEEDS_ENCRYPTION) {
Paul Lawrence166fa3d2014-02-03 13:27:49 -0800554 property_set("vold.decrypt", "trigger_encryption");
JP Abgrallf22b7452014-07-02 13:16:04 -0700555 } else if (ret == FS_MGR_MNTALL_DEV_MIGHT_BE_ENCRYPTED) {
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700556 property_set("ro.crypto.state", "encrypted");
Paul Lawrence13d5bb42014-01-30 10:43:52 -0800557 property_set("vold.decrypt", "trigger_default_encryption");
JP Abgrallf22b7452014-07-02 13:16:04 -0700558 } else if (ret == FS_MGR_MNTALL_DEV_NOT_ENCRYPTED) {
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700559 property_set("ro.crypto.state", "unencrypted");
560 /* If fs_mgr determined this is an unencrypted device, then trigger
561 * that action.
562 */
563 action_for_each_trigger("nonencrypted", action_add_queue_tail);
JP Abgrallcee20682014-07-02 14:26:54 -0700564 } else if (ret == FS_MGR_MNTALL_DEV_NEEDS_RECOVERY) {
565 /* Setup a wipe via recovery, and reboot into recovery */
566 ERROR("fs_mgr_mount_all suggested recovery, so wiping data via recovery.\n");
567 ret = wipe_data_via_recovery();
568 /* If reboot worked, there is no return. */
569 } else if (ret > 0) {
570 ERROR("fs_mgr_mount_all returned unexpected error %d\n", ret);
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700571 }
JP Abgrallf22b7452014-07-02 13:16:04 -0700572 /* else ... < 0: error */
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700573
574 return ret;
575}
576
Ken Sumralla76baaa2013-07-09 18:42:09 -0700577int do_swapon_all(int nargs, char **args)
578{
579 struct fstab *fstab;
580 int ret;
581
582 fstab = fs_mgr_read_fstab(args[1]);
583 ret = fs_mgr_swapon_all(fstab);
584 fs_mgr_free_fstab(fstab);
585
586 return ret;
587}
588
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500589int do_setcon(int nargs, char **args) {
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500590 if (is_selinux_enabled() <= 0)
591 return 0;
592 if (setcon(args[1]) < 0) {
593 return -errno;
594 }
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500595 return 0;
596}
597
598int do_setenforce(int nargs, char **args) {
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500599 if (is_selinux_enabled() <= 0)
600 return 0;
601 if (security_setenforce(atoi(args[1])) < 0) {
602 return -errno;
603 }
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500604 return 0;
605}
606
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700607int do_setkey(int nargs, char **args)
608{
609 struct kbentry kbe;
610 kbe.kb_table = strtoul(args[1], 0, 0);
611 kbe.kb_index = strtoul(args[2], 0, 0);
612 kbe.kb_value = strtoul(args[3], 0, 0);
613 return setkey(&kbe);
614}
615
616int do_setprop(int nargs, char **args)
617{
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700618 const char *name = args[1];
619 const char *value = args[2];
Dima Zavin84bf9af2011-12-20 13:44:41 -0800620 char prop_val[PROP_VALUE_MAX];
621 int ret;
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700622
Dima Zavin84bf9af2011-12-20 13:44:41 -0800623 ret = expand_props(prop_val, value, sizeof(prop_val));
624 if (ret) {
625 ERROR("cannot expand '%s' while assigning to '%s'\n", value, name);
626 return -EINVAL;
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700627 }
Dima Zavin84bf9af2011-12-20 13:44:41 -0800628 property_set(name, prop_val);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700629 return 0;
630}
631
632int do_setrlimit(int nargs, char **args)
633{
634 struct rlimit limit;
635 int resource;
636 resource = atoi(args[1]);
637 limit.rlim_cur = atoi(args[2]);
638 limit.rlim_max = atoi(args[3]);
639 return setrlimit(resource, &limit);
640}
641
642int do_start(int nargs, char **args)
643{
644 struct service *svc;
645 svc = service_find_by_name(args[1]);
646 if (svc) {
San Mehatf24e2522009-05-19 13:30:46 -0700647 service_start(svc, NULL);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700648 }
649 return 0;
650}
651
652int do_stop(int nargs, char **args)
653{
654 struct service *svc;
655 svc = service_find_by_name(args[1]);
656 if (svc) {
657 service_stop(svc);
658 }
659 return 0;
660}
661
662int do_restart(int nargs, char **args)
663{
664 struct service *svc;
665 svc = service_find_by_name(args[1]);
666 if (svc) {
Mike Kasickb54f39f2012-01-25 23:48:46 -0500667 service_restart(svc);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700668 }
669 return 0;
670}
671
Nick Kralevichca8e66a2013-04-18 12:20:02 -0700672int do_powerctl(int nargs, char **args)
673{
674 char command[PROP_VALUE_MAX];
675 int res;
676 int len = 0;
677 int cmd = 0;
Elliott Hughesf3cf4382015-02-03 17:12:07 -0800678 const char *reboot_target;
Nick Kralevichca8e66a2013-04-18 12:20:02 -0700679
680 res = expand_props(command, args[1], sizeof(command));
681 if (res) {
682 ERROR("powerctl: cannot expand '%s'\n", args[1]);
683 return -EINVAL;
684 }
685
686 if (strncmp(command, "shutdown", 8) == 0) {
687 cmd = ANDROID_RB_POWEROFF;
688 len = 8;
689 } else if (strncmp(command, "reboot", 6) == 0) {
690 cmd = ANDROID_RB_RESTART2;
691 len = 6;
692 } else {
693 ERROR("powerctl: unrecognized command '%s'\n", command);
694 return -EINVAL;
695 }
696
697 if (command[len] == ',') {
698 reboot_target = &command[len + 1];
699 } else if (command[len] == '\0') {
700 reboot_target = "";
701 } else {
702 ERROR("powerctl: unrecognized reboot target '%s'\n", &command[len]);
703 return -EINVAL;
704 }
705
706 return android_reboot(cmd, 0, reboot_target);
707}
708
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700709int do_trigger(int nargs, char **args)
710{
Jay Freeman (saurik)11e1c422008-11-17 06:35:08 +0000711 action_for_each_trigger(args[1], action_add_queue_tail);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700712 return 0;
713}
714
715int do_symlink(int nargs, char **args)
716{
717 return symlink(args[1], args[2]);
718}
719
Ken Sumrall203bad52011-01-18 17:37:41 -0800720int do_rm(int nargs, char **args)
721{
722 return unlink(args[1]);
723}
724
725int do_rmdir(int nargs, char **args)
726{
727 return rmdir(args[1]);
728}
729
The Android Open Source Project35237d12008-12-17 18:08:08 -0800730int do_sysclktz(int nargs, char **args)
731{
732 struct timezone tz;
733
734 if (nargs != 2)
735 return -1;
736
737 memset(&tz, 0, sizeof(tz));
738 tz.tz_minuteswest = atoi(args[1]);
739 if (settimeofday(NULL, &tz))
740 return -1;
741 return 0;
742}
743
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700744int do_write(int nargs, char **args)
745{
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700746 const char *path = args[1];
747 const char *value = args[2];
Dima Zavin84bf9af2011-12-20 13:44:41 -0800748 char prop_val[PROP_VALUE_MAX];
749 int ret;
Mike Lockwood2c4d5dc2011-06-07 17:30:11 -0700750
Dima Zavin84bf9af2011-12-20 13:44:41 -0800751 ret = expand_props(prop_val, value, sizeof(prop_val));
752 if (ret) {
753 ERROR("cannot expand '%s' while writing to '%s'\n", value, path);
754 return -EINVAL;
755 }
756 return write_file(path, prop_val);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700757}
758
San Mehat7c44fe52009-08-26 16:39:25 -0700759int do_copy(int nargs, char **args)
760{
761 char *buffer = NULL;
762 int rc = 0;
763 int fd1 = -1, fd2 = -1;
764 struct stat info;
765 int brtw, brtr;
766 char *p;
767
768 if (nargs != 3)
769 return -1;
770
771 if (stat(args[1], &info) < 0)
772 return -1;
773
Nick Kralevich45a884f2015-02-02 14:37:22 -0800774 if ((fd1 = open(args[1], O_RDONLY|O_CLOEXEC)) < 0)
San Mehat7c44fe52009-08-26 16:39:25 -0700775 goto out_err;
776
Nick Kralevich45a884f2015-02-02 14:37:22 -0800777 if ((fd2 = open(args[2], O_WRONLY|O_CREAT|O_TRUNC|O_CLOEXEC, 0660)) < 0)
San Mehat7c44fe52009-08-26 16:39:25 -0700778 goto out_err;
779
Elliott Hughesf3cf4382015-02-03 17:12:07 -0800780 if (!(buffer = (char*) malloc(info.st_size)))
San Mehat7c44fe52009-08-26 16:39:25 -0700781 goto out_err;
782
783 p = buffer;
784 brtr = info.st_size;
785 while(brtr) {
786 rc = read(fd1, p, brtr);
787 if (rc < 0)
788 goto out_err;
789 if (rc == 0)
790 break;
791 p += rc;
792 brtr -= rc;
793 }
794
795 p = buffer;
796 brtw = info.st_size;
797 while(brtw) {
798 rc = write(fd2, p, brtw);
799 if (rc < 0)
800 goto out_err;
801 if (rc == 0)
802 break;
803 p += rc;
804 brtw -= rc;
805 }
806
807 rc = 0;
808 goto out;
809out_err:
810 rc = -1;
811out:
812 if (buffer)
813 free(buffer);
814 if (fd1 >= 0)
815 close(fd1);
816 if (fd2 >= 0)
817 close(fd2);
818 return rc;
819}
820
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700821int do_chown(int nargs, char **args) {
822 /* GID is optional. */
823 if (nargs == 3) {
Nick Kralevichbc609542015-01-31 21:39:46 -0800824 if (lchown(args[2], decode_uid(args[1]), -1) == -1)
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700825 return -errno;
826 } else if (nargs == 4) {
Nick Kralevichbc609542015-01-31 21:39:46 -0800827 if (lchown(args[3], decode_uid(args[1]), decode_uid(args[2])) == -1)
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700828 return -errno;
829 } else {
830 return -1;
831 }
832 return 0;
833}
834
835static mode_t get_mode(const char *s) {
836 mode_t mode = 0;
837 while (*s) {
838 if (*s >= '0' && *s <= '7') {
839 mode = (mode<<3) | (*s-'0');
840 } else {
841 return -1;
842 }
843 s++;
844 }
845 return mode;
846}
847
848int do_chmod(int nargs, char **args) {
849 mode_t mode = get_mode(args[1]);
Nick Kralevichbc609542015-01-31 21:39:46 -0800850 if (fchmodat(AT_FDCWD, args[2], mode, AT_SYMLINK_NOFOLLOW) < 0) {
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700851 return -errno;
852 }
853 return 0;
854}
855
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500856int do_restorecon(int nargs, char **args) {
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500857 int i;
Stephen Smalley726e8f72013-10-09 16:02:09 -0400858 int ret = 0;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500859
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500860 for (i = 1; i < nargs; i++) {
Stephen Smalleye096e362012-06-11 13:37:39 -0400861 if (restorecon(args[i]) < 0)
Stephen Smalley726e8f72013-10-09 16:02:09 -0400862 ret = -errno;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500863 }
Stephen Smalley726e8f72013-10-09 16:02:09 -0400864 return ret;
865}
866
867int do_restorecon_recursive(int nargs, char **args) {
868 int i;
869 int ret = 0;
870
871 for (i = 1; i < nargs; i++) {
872 if (restorecon_recursive(args[i]) < 0)
873 ret = -errno;
874 }
875 return ret;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500876}
877
878int do_setsebool(int nargs, char **args) {
Stephen Smalley0e23fee2012-11-28 13:52:12 -0500879 const char *name = args[1];
880 const char *value = args[2];
881 SELboolean b;
882 int ret;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500883
884 if (is_selinux_enabled() <= 0)
885 return 0;
886
Stephen Smalley0e23fee2012-11-28 13:52:12 -0500887 b.name = name;
888 if (!strcmp(value, "1") || !strcasecmp(value, "true") || !strcasecmp(value, "on"))
889 b.value = 1;
890 else if (!strcmp(value, "0") || !strcasecmp(value, "false") || !strcasecmp(value, "off"))
891 b.value = 0;
892 else {
893 ERROR("setsebool: invalid value %s\n", value);
894 return -EINVAL;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500895 }
896
Stephen Smalley0e23fee2012-11-28 13:52:12 -0500897 if (security_set_boolean_list(1, &b, 0) < 0) {
898 ret = -errno;
899 ERROR("setsebool: could not set %s to %s\n", name, value);
900 return ret;
901 }
Kenny Rootb5982bf2012-10-16 23:07:05 -0700902
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500903 return 0;
904}
905
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700906int do_loglevel(int nargs, char **args) {
Riley Andrews1bbef882014-06-26 13:55:03 -0700907 int log_level;
908 char log_level_str[PROP_VALUE_MAX] = "";
909 if (nargs != 2) {
910 ERROR("loglevel: missing argument\n");
911 return -EINVAL;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700912 }
Riley Andrews1bbef882014-06-26 13:55:03 -0700913
914 if (expand_props(log_level_str, args[1], sizeof(log_level_str))) {
915 ERROR("loglevel: cannot expand '%s'\n", args[1]);
916 return -EINVAL;
917 }
918 log_level = atoi(log_level_str);
919 if (log_level < KLOG_ERROR_LEVEL || log_level > KLOG_DEBUG_LEVEL) {
920 ERROR("loglevel: invalid log level'%d'\n", log_level);
921 return -EINVAL;
922 }
923 klog_set_level(log_level);
924 return 0;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700925}
926
Ken Sumrallc5c51032011-03-08 17:01:29 -0800927int do_load_persist_props(int nargs, char **args) {
928 if (nargs == 1) {
929 load_persist_props();
930 return 0;
931 }
932 return -1;
933}
934
Riley Andrewse4b7b292014-06-16 15:06:21 -0700935int do_load_all_props(int nargs, char **args) {
936 if (nargs == 1) {
937 load_all_props();
938 return 0;
939 }
940 return -1;
941}
942
Colin Crosscd0f1732010-04-19 17:10:24 -0700943int do_wait(int nargs, char **args)
944{
945 if (nargs == 2) {
946 return wait_for_file(args[1], COMMAND_RETRY_TIMEOUT);
Patrick McCormick96d0a4d2011-02-04 10:51:39 -0800947 } else if (nargs == 3) {
948 return wait_for_file(args[1], atoi(args[2]));
949 } else
950 return -1;
Colin Crosscd0f1732010-04-19 17:10:24 -0700951}