blob: dd147f603fbe5765b02b8c67560910edb04f19b7 [file] [log] [blame]
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <sys/types.h>
18#include <sys/stat.h>
19#include <fcntl.h>
20#include <unistd.h>
21#include <string.h>
22#include <stdio.h>
23#include <linux/kd.h>
24#include <errno.h>
25#include <sys/socket.h>
26#include <netinet/in.h>
27#include <linux/if.h>
28#include <arpa/inet.h>
29#include <stdlib.h>
30#include <sys/mount.h>
31#include <sys/resource.h>
Ken Sumrall0e9dd902012-04-17 17:20:16 -070032#include <sys/wait.h>
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +000033#include <linux/loop.h>
Ken Sumrall7bc6e9e2011-05-26 20:01:39 -070034#include <cutils/partition_utils.h>
Nick Kralevichca8e66a2013-04-18 12:20:02 -070035#include <cutils/android_reboot.h>
Ken Sumrall0e9dd902012-04-17 17:20:16 -070036#include <fs_mgr.h>
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070037
Stephen Smalleye46f9d52012-01-13 08:48:47 -050038#include <selinux/selinux.h>
39#include <selinux/label.h>
Stephen Smalleye46f9d52012-01-13 08:48:47 -050040
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070041#include "init.h"
42#include "keywords.h"
43#include "property_service.h"
44#include "devices.h"
Colin Cross6310a822010-04-20 14:29:05 -070045#include "init_parser.h"
Colin Cross3899e9f2010-04-13 20:35:46 -070046#include "util.h"
Colin Crossed8a7d82010-04-19 17:05:34 -070047#include "log.h"
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070048
49#include <private/android_filesystem_config.h>
50
51void add_environment(const char *name, const char *value);
52
53extern int init_module(void *, unsigned long, const char *);
54
55static int write_file(const char *path, const char *value)
56{
57 int fd, ret, len;
58
Nick Kralevich5535b052013-09-17 14:43:12 -070059 fd = open(path, O_WRONLY|O_CREAT|O_NOFOLLOW, 0600);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070060
61 if (fd < 0)
Mike Chan008abac2009-06-29 20:30:55 -070062 return -errno;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070063
64 len = strlen(value);
65
66 do {
67 ret = write(fd, value, len);
68 } while (ret < 0 && errno == EINTR);
69
70 close(fd);
71 if (ret < 0) {
Mike Chan008abac2009-06-29 20:30:55 -070072 return -errno;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070073 } else {
74 return 0;
75 }
76}
77
Benoit Goby58903012012-03-28 18:15:56 -070078static int _open(const char *path)
79{
80 int fd;
81
82 fd = open(path, O_RDONLY | O_NOFOLLOW);
83 if (fd < 0)
84 fd = open(path, O_WRONLY | O_NOFOLLOW);
85
86 return fd;
87}
88
Geremy Condra9ed1fe72012-03-20 12:49:55 -070089static int _chown(const char *path, unsigned int uid, unsigned int gid)
90{
91 int fd;
92 int ret;
93
Benoit Goby58903012012-03-28 18:15:56 -070094 fd = _open(path);
Geremy Condra9ed1fe72012-03-20 12:49:55 -070095 if (fd < 0) {
96 return -1;
97 }
98
99 ret = fchown(fd, uid, gid);
100 if (ret < 0) {
101 int errno_copy = errno;
102 close(fd);
103 errno = errno_copy;
104 return -1;
105 }
106
107 close(fd);
108
109 return 0;
110}
111
112static int _chmod(const char *path, mode_t mode)
113{
114 int fd;
115 int ret;
116
Benoit Goby58903012012-03-28 18:15:56 -0700117 fd = _open(path);
Geremy Condra9ed1fe72012-03-20 12:49:55 -0700118 if (fd < 0) {
119 return -1;
120 }
121
122 ret = fchmod(fd, mode);
123 if (ret < 0) {
124 int errno_copy = errno;
125 close(fd);
126 errno = errno_copy;
127 return -1;
128 }
129
130 close(fd);
131
132 return 0;
133}
134
The Android Open Source Project35237d12008-12-17 18:08:08 -0800135static int insmod(const char *filename, char *options)
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700136{
137 void *module;
138 unsigned size;
139 int ret;
140
141 module = read_file(filename, &size);
142 if (!module)
143 return -1;
144
The Android Open Source Project35237d12008-12-17 18:08:08 -0800145 ret = init_module(module, size, options);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700146
147 free(module);
148
149 return ret;
150}
151
152static int setkey(struct kbentry *kbe)
153{
154 int fd, ret;
155
156 fd = open("/dev/tty0", O_RDWR | O_SYNC);
157 if (fd < 0)
158 return -1;
159
160 ret = ioctl(fd, KDSKBENT, kbe);
161
162 close(fd);
163 return ret;
164}
165
166static int __ifupdown(const char *interface, int up)
167{
168 struct ifreq ifr;
169 int s, ret;
170
171 strlcpy(ifr.ifr_name, interface, IFNAMSIZ);
172
173 s = socket(AF_INET, SOCK_DGRAM, 0);
174 if (s < 0)
175 return -1;
176
177 ret = ioctl(s, SIOCGIFFLAGS, &ifr);
178 if (ret < 0) {
179 goto done;
180 }
181
182 if (up)
183 ifr.ifr_flags |= IFF_UP;
184 else
185 ifr.ifr_flags &= ~IFF_UP;
186
187 ret = ioctl(s, SIOCSIFFLAGS, &ifr);
188
189done:
190 close(s);
191 return ret;
192}
193
194static void service_start_if_not_disabled(struct service *svc)
195{
196 if (!(svc->flags & SVC_DISABLED)) {
San Mehatf24e2522009-05-19 13:30:46 -0700197 service_start(svc, NULL);
JP Abgrall3beec7e2014-05-02 21:14:29 -0700198 } else {
199 svc->flags |= SVC_DISABLED_START;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700200 }
201}
202
Jay Freeman (saurik)e7cb1372008-11-17 06:41:10 +0000203int do_chdir(int nargs, char **args)
204{
205 chdir(args[1]);
206 return 0;
207}
208
209int do_chroot(int nargs, char **args)
210{
211 chroot(args[1]);
212 return 0;
213}
214
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700215int do_class_start(int nargs, char **args)
216{
217 /* Starting a class does not start services
218 * which are explicitly disabled. They must
219 * be started individually.
220 */
221 service_for_each_class(args[1], service_start_if_not_disabled);
222 return 0;
223}
224
225int do_class_stop(int nargs, char **args)
226{
227 service_for_each_class(args[1], service_stop);
228 return 0;
229}
230
Ken Sumrall752923c2010-12-03 16:33:31 -0800231int do_class_reset(int nargs, char **args)
232{
233 service_for_each_class(args[1], service_reset);
234 return 0;
235}
236
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700237int do_domainname(int nargs, char **args)
238{
239 return write_file("/proc/sys/kernel/domainname", args[1]);
240}
241
JP Abgrall3beec7e2014-05-02 21:14:29 -0700242int do_enable(int nargs, char **args)
243{
244 struct service *svc;
245 svc = service_find_by_name(args[1]);
246 if (svc) {
247 svc->flags &= ~(SVC_DISABLED | SVC_RC_DISABLED);
248 if (svc->flags & SVC_DISABLED_START) {
249 service_start(svc, NULL);
250 }
251 } else {
252 return -1;
253 }
254 return 0;
255}
256
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700257int do_exec(int nargs, char **args)
258{
259 return -1;
260}
261
262int do_export(int nargs, char **args)
263{
264 add_environment(args[1], args[2]);
265 return 0;
266}
267
268int do_hostname(int nargs, char **args)
269{
270 return write_file("/proc/sys/kernel/hostname", args[1]);
271}
272
273int do_ifup(int nargs, char **args)
274{
275 return __ifupdown(args[1], 1);
276}
277
The Android Open Source Project35237d12008-12-17 18:08:08 -0800278
279static int do_insmod_inner(int nargs, char **args, int opt_len)
280{
281 char options[opt_len + 1];
282 int i;
283
284 options[0] = '\0';
285 if (nargs > 2) {
286 strcpy(options, args[2]);
287 for (i = 3; i < nargs; ++i) {
288 strcat(options, " ");
289 strcat(options, args[i]);
290 }
291 }
292
293 return insmod(args[1], options);
294}
295
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700296int do_insmod(int nargs, char **args)
297{
The Android Open Source Project35237d12008-12-17 18:08:08 -0800298 int i;
299 int size = 0;
300
301 if (nargs > 2) {
302 for (i = 2; i < nargs; ++i)
303 size += strlen(args[i]) + 1;
304 }
305
306 return do_insmod_inner(nargs, args, size);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700307}
308
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700309int do_mkdir(int nargs, char **args)
310{
311 mode_t mode = 0755;
Chia-chi Yeh27164dc2011-07-08 12:57:36 -0700312 int ret;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700313
314 /* mkdir <path> [mode] [owner] [group] */
315
316 if (nargs >= 3) {
317 mode = strtoul(args[2], 0, 8);
318 }
319
Stephen Smalleye096e362012-06-11 13:37:39 -0400320 ret = make_dir(args[1], mode);
Chia-chi Yeh27164dc2011-07-08 12:57:36 -0700321 /* chmod in case the directory already exists */
322 if (ret == -1 && errno == EEXIST) {
Geremy Condra9ed1fe72012-03-20 12:49:55 -0700323 ret = _chmod(args[1], mode);
Chia-chi Yeh27164dc2011-07-08 12:57:36 -0700324 }
325 if (ret == -1) {
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700326 return -errno;
327 }
328
329 if (nargs >= 4) {
330 uid_t uid = decode_uid(args[3]);
331 gid_t gid = -1;
332
333 if (nargs == 5) {
334 gid = decode_uid(args[4]);
335 }
336
Geremy Condra9ed1fe72012-03-20 12:49:55 -0700337 if (_chown(args[1], uid, gid) < 0) {
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700338 return -errno;
339 }
Benoit Goby5c8574b2012-08-14 15:43:46 -0700340
341 /* chown may have cleared S_ISUID and S_ISGID, chmod again */
342 if (mode & (S_ISUID | S_ISGID)) {
343 ret = _chmod(args[1], mode);
344 if (ret == -1) {
345 return -errno;
346 }
347 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700348 }
349
350 return 0;
351}
352
353static struct {
354 const char *name;
355 unsigned flag;
356} mount_flags[] = {
357 { "noatime", MS_NOATIME },
Lars Svenssonb6ee25e2011-07-14 13:39:09 +0200358 { "noexec", MS_NOEXEC },
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700359 { "nosuid", MS_NOSUID },
360 { "nodev", MS_NODEV },
361 { "nodiratime", MS_NODIRATIME },
362 { "ro", MS_RDONLY },
363 { "rw", 0 },
364 { "remount", MS_REMOUNT },
Jeff Sharkeye50ac5f2012-08-14 11:34:34 -0700365 { "bind", MS_BIND },
366 { "rec", MS_REC },
367 { "unbindable", MS_UNBINDABLE },
368 { "private", MS_PRIVATE },
369 { "slave", MS_SLAVE },
370 { "shared", MS_SHARED },
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700371 { "defaults", 0 },
372 { 0, 0 },
373};
374
Ken Sumrall752923c2010-12-03 16:33:31 -0800375#define DATA_MNT_POINT "/data"
376
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700377/* mount <type> <device> <path> <flags ...> <options> */
378int do_mount(int nargs, char **args)
379{
380 char tmp[64];
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000381 char *source, *target, *system;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700382 char *options = NULL;
383 unsigned flags = 0;
384 int n, i;
Colin Crosscd0f1732010-04-19 17:10:24 -0700385 int wait = 0;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700386
387 for (n = 4; n < nargs; n++) {
388 for (i = 0; mount_flags[i].name; i++) {
389 if (!strcmp(args[n], mount_flags[i].name)) {
390 flags |= mount_flags[i].flag;
391 break;
392 }
393 }
394
Colin Crosscd0f1732010-04-19 17:10:24 -0700395 if (!mount_flags[i].name) {
396 if (!strcmp(args[n], "wait"))
397 wait = 1;
398 /* if our last argument isn't a flag, wolf it up as an option string */
399 else if (n + 1 == nargs)
400 options = args[n];
401 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700402 }
403
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000404 system = args[1];
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700405 source = args[2];
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000406 target = args[3];
407
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700408 if (!strncmp(source, "mtd@", 4)) {
409 n = mtd_name_to_number(source + 4);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000410 if (n < 0) {
411 return -1;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700412 }
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000413
414 sprintf(tmp, "/dev/block/mtdblock%d", n);
415
Colin Crosscd0f1732010-04-19 17:10:24 -0700416 if (wait)
417 wait_for_file(tmp, COMMAND_RETRY_TIMEOUT);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000418 if (mount(tmp, target, system, flags, options) < 0) {
419 return -1;
420 }
421
Ken Sumralldd4d7862011-02-17 18:09:47 -0800422 goto exit_success;
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000423 } else if (!strncmp(source, "loop@", 5)) {
424 int mode, loop, fd;
425 struct loop_info info;
426
427 mode = (flags & MS_RDONLY) ? O_RDONLY : O_RDWR;
428 fd = open(source + 5, mode);
429 if (fd < 0) {
430 return -1;
431 }
432
433 for (n = 0; ; n++) {
434 sprintf(tmp, "/dev/block/loop%d", n);
435 loop = open(tmp, mode);
436 if (loop < 0) {
437 return -1;
438 }
439
440 /* if it is a blank loop device */
441 if (ioctl(loop, LOOP_GET_STATUS, &info) < 0 && errno == ENXIO) {
442 /* if it becomes our loop device */
443 if (ioctl(loop, LOOP_SET_FD, fd) >= 0) {
444 close(fd);
445
446 if (mount(tmp, target, system, flags, options) < 0) {
447 ioctl(loop, LOOP_CLR_FD, 0);
448 close(loop);
449 return -1;
450 }
451
452 close(loop);
Ken Sumralldd4d7862011-02-17 18:09:47 -0800453 goto exit_success;
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000454 }
455 }
456
457 close(loop);
458 }
459
460 close(fd);
461 ERROR("out of loopback devices");
462 return -1;
463 } else {
Colin Crosscd0f1732010-04-19 17:10:24 -0700464 if (wait)
465 wait_for_file(source, COMMAND_RETRY_TIMEOUT);
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000466 if (mount(source, target, system, flags, options) < 0) {
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700467 return -1;
Jay Freeman (saurik)e520d032008-11-20 03:37:30 +0000468 }
469
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700470 }
Ken Sumralldd4d7862011-02-17 18:09:47 -0800471
472exit_success:
Ken Sumralldd4d7862011-02-17 18:09:47 -0800473 return 0;
474
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700475}
476
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700477int do_mount_all(int nargs, char **args)
478{
479 pid_t pid;
480 int ret = -1;
481 int child_ret = -1;
482 int status;
483 const char *prop;
Ken Sumrallab6b8522013-02-13 12:58:40 -0800484 struct fstab *fstab;
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700485
486 if (nargs != 2) {
487 return -1;
488 }
489
490 /*
491 * Call fs_mgr_mount_all() to mount all filesystems. We fork(2) and
492 * do the call in the child to provide protection to the main init
493 * process if anything goes wrong (crash or memory leak), and wait for
494 * the child to finish in the parent.
495 */
496 pid = fork();
497 if (pid > 0) {
498 /* Parent. Wait for the child to return */
499 waitpid(pid, &status, 0);
500 if (WIFEXITED(status)) {
501 ret = WEXITSTATUS(status);
502 } else {
503 ret = -1;
504 }
505 } else if (pid == 0) {
506 /* child, call fs_mgr_mount_all() */
507 klog_set_level(6); /* So we can see what fs_mgr_mount_all() does */
Ken Sumrallab6b8522013-02-13 12:58:40 -0800508 fstab = fs_mgr_read_fstab(args[1]);
509 child_ret = fs_mgr_mount_all(fstab);
510 fs_mgr_free_fstab(fstab);
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700511 if (child_ret == -1) {
512 ERROR("fs_mgr_mount_all returned an error\n");
513 }
JP Abgrallf22b7452014-07-02 13:16:04 -0700514 _exit(child_ret);
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700515 } else {
516 /* fork failed, return an error */
517 return -1;
518 }
519
JP Abgrallf22b7452014-07-02 13:16:04 -0700520 if (ret == FS_MGR_MNTALL_DEV_NEEDS_ENCRYPTION) {
Paul Lawrence166fa3d2014-02-03 13:27:49 -0800521 property_set("ro.crypto.state", "unencrypted");
522 property_set("vold.decrypt", "trigger_encryption");
JP Abgrallf22b7452014-07-02 13:16:04 -0700523 } else if (ret == FS_MGR_MNTALL_DEV_MIGHT_BE_ENCRYPTED) {
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700524 property_set("ro.crypto.state", "encrypted");
Paul Lawrence13d5bb42014-01-30 10:43:52 -0800525 property_set("vold.decrypt", "trigger_default_encryption");
JP Abgrallf22b7452014-07-02 13:16:04 -0700526 } else if (ret == FS_MGR_MNTALL_DEV_NOT_ENCRYPTED) {
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700527 property_set("ro.crypto.state", "unencrypted");
528 /* If fs_mgr determined this is an unencrypted device, then trigger
529 * that action.
530 */
531 action_for_each_trigger("nonencrypted", action_add_queue_tail);
532 }
JP Abgrallf22b7452014-07-02 13:16:04 -0700533 /* else ... < 0: error */
Ken Sumrall0e9dd902012-04-17 17:20:16 -0700534
535 return ret;
536}
537
Ken Sumralla76baaa2013-07-09 18:42:09 -0700538int do_swapon_all(int nargs, char **args)
539{
540 struct fstab *fstab;
541 int ret;
542
543 fstab = fs_mgr_read_fstab(args[1]);
544 ret = fs_mgr_swapon_all(fstab);
545 fs_mgr_free_fstab(fstab);
546
547 return ret;
548}
549
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500550int do_setcon(int nargs, char **args) {
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500551 if (is_selinux_enabled() <= 0)
552 return 0;
553 if (setcon(args[1]) < 0) {
554 return -errno;
555 }
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500556 return 0;
557}
558
559int do_setenforce(int nargs, char **args) {
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500560 if (is_selinux_enabled() <= 0)
561 return 0;
562 if (security_setenforce(atoi(args[1])) < 0) {
563 return -errno;
564 }
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500565 return 0;
566}
567
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700568int do_setkey(int nargs, char **args)
569{
570 struct kbentry kbe;
571 kbe.kb_table = strtoul(args[1], 0, 0);
572 kbe.kb_index = strtoul(args[2], 0, 0);
573 kbe.kb_value = strtoul(args[3], 0, 0);
574 return setkey(&kbe);
575}
576
577int do_setprop(int nargs, char **args)
578{
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700579 const char *name = args[1];
580 const char *value = args[2];
Dima Zavin84bf9af2011-12-20 13:44:41 -0800581 char prop_val[PROP_VALUE_MAX];
582 int ret;
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700583
Dima Zavin84bf9af2011-12-20 13:44:41 -0800584 ret = expand_props(prop_val, value, sizeof(prop_val));
585 if (ret) {
586 ERROR("cannot expand '%s' while assigning to '%s'\n", value, name);
587 return -EINVAL;
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700588 }
Dima Zavin84bf9af2011-12-20 13:44:41 -0800589 property_set(name, prop_val);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700590 return 0;
591}
592
593int do_setrlimit(int nargs, char **args)
594{
595 struct rlimit limit;
596 int resource;
597 resource = atoi(args[1]);
598 limit.rlim_cur = atoi(args[2]);
599 limit.rlim_max = atoi(args[3]);
600 return setrlimit(resource, &limit);
601}
602
603int do_start(int nargs, char **args)
604{
605 struct service *svc;
606 svc = service_find_by_name(args[1]);
607 if (svc) {
San Mehatf24e2522009-05-19 13:30:46 -0700608 service_start(svc, NULL);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700609 }
610 return 0;
611}
612
613int do_stop(int nargs, char **args)
614{
615 struct service *svc;
616 svc = service_find_by_name(args[1]);
617 if (svc) {
618 service_stop(svc);
619 }
620 return 0;
621}
622
623int do_restart(int nargs, char **args)
624{
625 struct service *svc;
626 svc = service_find_by_name(args[1]);
627 if (svc) {
Mike Kasickb54f39f2012-01-25 23:48:46 -0500628 service_restart(svc);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700629 }
630 return 0;
631}
632
Nick Kralevichca8e66a2013-04-18 12:20:02 -0700633int do_powerctl(int nargs, char **args)
634{
635 char command[PROP_VALUE_MAX];
636 int res;
637 int len = 0;
638 int cmd = 0;
639 char *reboot_target;
640
641 res = expand_props(command, args[1], sizeof(command));
642 if (res) {
643 ERROR("powerctl: cannot expand '%s'\n", args[1]);
644 return -EINVAL;
645 }
646
647 if (strncmp(command, "shutdown", 8) == 0) {
648 cmd = ANDROID_RB_POWEROFF;
649 len = 8;
650 } else if (strncmp(command, "reboot", 6) == 0) {
651 cmd = ANDROID_RB_RESTART2;
652 len = 6;
653 } else {
654 ERROR("powerctl: unrecognized command '%s'\n", command);
655 return -EINVAL;
656 }
657
658 if (command[len] == ',') {
659 reboot_target = &command[len + 1];
660 } else if (command[len] == '\0') {
661 reboot_target = "";
662 } else {
663 ERROR("powerctl: unrecognized reboot target '%s'\n", &command[len]);
664 return -EINVAL;
665 }
666
667 return android_reboot(cmd, 0, reboot_target);
668}
669
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700670int do_trigger(int nargs, char **args)
671{
Jay Freeman (saurik)11e1c422008-11-17 06:35:08 +0000672 action_for_each_trigger(args[1], action_add_queue_tail);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700673 return 0;
674}
675
676int do_symlink(int nargs, char **args)
677{
678 return symlink(args[1], args[2]);
679}
680
Ken Sumrall203bad52011-01-18 17:37:41 -0800681int do_rm(int nargs, char **args)
682{
683 return unlink(args[1]);
684}
685
686int do_rmdir(int nargs, char **args)
687{
688 return rmdir(args[1]);
689}
690
The Android Open Source Project35237d12008-12-17 18:08:08 -0800691int do_sysclktz(int nargs, char **args)
692{
693 struct timezone tz;
694
695 if (nargs != 2)
696 return -1;
697
698 memset(&tz, 0, sizeof(tz));
699 tz.tz_minuteswest = atoi(args[1]);
700 if (settimeofday(NULL, &tz))
701 return -1;
702 return 0;
703}
704
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700705int do_write(int nargs, char **args)
706{
Mike Lockwood1f0bd322011-06-08 17:31:27 -0700707 const char *path = args[1];
708 const char *value = args[2];
Dima Zavin84bf9af2011-12-20 13:44:41 -0800709 char prop_val[PROP_VALUE_MAX];
710 int ret;
Mike Lockwood2c4d5dc2011-06-07 17:30:11 -0700711
Dima Zavin84bf9af2011-12-20 13:44:41 -0800712 ret = expand_props(prop_val, value, sizeof(prop_val));
713 if (ret) {
714 ERROR("cannot expand '%s' while writing to '%s'\n", value, path);
715 return -EINVAL;
716 }
717 return write_file(path, prop_val);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700718}
719
San Mehat7c44fe52009-08-26 16:39:25 -0700720int do_copy(int nargs, char **args)
721{
722 char *buffer = NULL;
723 int rc = 0;
724 int fd1 = -1, fd2 = -1;
725 struct stat info;
726 int brtw, brtr;
727 char *p;
728
729 if (nargs != 3)
730 return -1;
731
732 if (stat(args[1], &info) < 0)
733 return -1;
734
735 if ((fd1 = open(args[1], O_RDONLY)) < 0)
736 goto out_err;
737
Tom Zhu4833d9f2009-09-28 19:53:12 -0500738 if ((fd2 = open(args[2], O_WRONLY|O_CREAT|O_TRUNC, 0660)) < 0)
San Mehat7c44fe52009-08-26 16:39:25 -0700739 goto out_err;
740
741 if (!(buffer = malloc(info.st_size)))
742 goto out_err;
743
744 p = buffer;
745 brtr = info.st_size;
746 while(brtr) {
747 rc = read(fd1, p, brtr);
748 if (rc < 0)
749 goto out_err;
750 if (rc == 0)
751 break;
752 p += rc;
753 brtr -= rc;
754 }
755
756 p = buffer;
757 brtw = info.st_size;
758 while(brtw) {
759 rc = write(fd2, p, brtw);
760 if (rc < 0)
761 goto out_err;
762 if (rc == 0)
763 break;
764 p += rc;
765 brtw -= rc;
766 }
767
768 rc = 0;
769 goto out;
770out_err:
771 rc = -1;
772out:
773 if (buffer)
774 free(buffer);
775 if (fd1 >= 0)
776 close(fd1);
777 if (fd2 >= 0)
778 close(fd2);
779 return rc;
780}
781
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700782int do_chown(int nargs, char **args) {
783 /* GID is optional. */
784 if (nargs == 3) {
Geremy Condra9ed1fe72012-03-20 12:49:55 -0700785 if (_chown(args[2], decode_uid(args[1]), -1) < 0)
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700786 return -errno;
787 } else if (nargs == 4) {
Geremy Condra9ed1fe72012-03-20 12:49:55 -0700788 if (_chown(args[3], decode_uid(args[1]), decode_uid(args[2])) < 0)
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700789 return -errno;
790 } else {
791 return -1;
792 }
793 return 0;
794}
795
796static mode_t get_mode(const char *s) {
797 mode_t mode = 0;
798 while (*s) {
799 if (*s >= '0' && *s <= '7') {
800 mode = (mode<<3) | (*s-'0');
801 } else {
802 return -1;
803 }
804 s++;
805 }
806 return mode;
807}
808
809int do_chmod(int nargs, char **args) {
810 mode_t mode = get_mode(args[1]);
Geremy Condra9ed1fe72012-03-20 12:49:55 -0700811 if (_chmod(args[2], mode) < 0) {
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700812 return -errno;
813 }
814 return 0;
815}
816
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500817int do_restorecon(int nargs, char **args) {
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500818 int i;
Stephen Smalley726e8f72013-10-09 16:02:09 -0400819 int ret = 0;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500820
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500821 for (i = 1; i < nargs; i++) {
Stephen Smalleye096e362012-06-11 13:37:39 -0400822 if (restorecon(args[i]) < 0)
Stephen Smalley726e8f72013-10-09 16:02:09 -0400823 ret = -errno;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500824 }
Stephen Smalley726e8f72013-10-09 16:02:09 -0400825 return ret;
826}
827
828int do_restorecon_recursive(int nargs, char **args) {
829 int i;
830 int ret = 0;
831
832 for (i = 1; i < nargs; i++) {
833 if (restorecon_recursive(args[i]) < 0)
834 ret = -errno;
835 }
836 return ret;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500837}
838
839int do_setsebool(int nargs, char **args) {
Stephen Smalley0e23fee2012-11-28 13:52:12 -0500840 const char *name = args[1];
841 const char *value = args[2];
842 SELboolean b;
843 int ret;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500844
845 if (is_selinux_enabled() <= 0)
846 return 0;
847
Stephen Smalley0e23fee2012-11-28 13:52:12 -0500848 b.name = name;
849 if (!strcmp(value, "1") || !strcasecmp(value, "true") || !strcasecmp(value, "on"))
850 b.value = 1;
851 else if (!strcmp(value, "0") || !strcasecmp(value, "false") || !strcasecmp(value, "off"))
852 b.value = 0;
853 else {
854 ERROR("setsebool: invalid value %s\n", value);
855 return -EINVAL;
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500856 }
857
Stephen Smalley0e23fee2012-11-28 13:52:12 -0500858 if (security_set_boolean_list(1, &b, 0) < 0) {
859 ret = -errno;
860 ERROR("setsebool: could not set %s to %s\n", name, value);
861 return ret;
862 }
Kenny Rootb5982bf2012-10-16 23:07:05 -0700863
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500864 return 0;
865}
866
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700867int do_loglevel(int nargs, char **args) {
Riley Andrews1bbef882014-06-26 13:55:03 -0700868 int log_level;
869 char log_level_str[PROP_VALUE_MAX] = "";
870 if (nargs != 2) {
871 ERROR("loglevel: missing argument\n");
872 return -EINVAL;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700873 }
Riley Andrews1bbef882014-06-26 13:55:03 -0700874
875 if (expand_props(log_level_str, args[1], sizeof(log_level_str))) {
876 ERROR("loglevel: cannot expand '%s'\n", args[1]);
877 return -EINVAL;
878 }
879 log_level = atoi(log_level_str);
880 if (log_level < KLOG_ERROR_LEVEL || log_level > KLOG_DEBUG_LEVEL) {
881 ERROR("loglevel: invalid log level'%d'\n", log_level);
882 return -EINVAL;
883 }
884 klog_set_level(log_level);
885 return 0;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700886}
887
Ken Sumrallc5c51032011-03-08 17:01:29 -0800888int do_load_persist_props(int nargs, char **args) {
889 if (nargs == 1) {
890 load_persist_props();
891 return 0;
892 }
893 return -1;
894}
895
Riley Andrewse4b7b292014-06-16 15:06:21 -0700896int do_load_all_props(int nargs, char **args) {
897 if (nargs == 1) {
898 load_all_props();
899 return 0;
900 }
901 return -1;
902}
903
Colin Crosscd0f1732010-04-19 17:10:24 -0700904int do_wait(int nargs, char **args)
905{
906 if (nargs == 2) {
907 return wait_for_file(args[1], COMMAND_RETRY_TIMEOUT);
Patrick McCormick96d0a4d2011-02-04 10:51:39 -0800908 } else if (nargs == 3) {
909 return wait_for_file(args[1], atoi(args[2]));
910 } else
911 return -1;
Colin Crosscd0f1732010-04-19 17:10:24 -0700912}