1 /* 2 * Copyright (C) 2007 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #ifndef _INIT_DEVICES_H 18 #define _INIT_DEVICES_H 19 20 #include <sys/stat.h> 21 #include <sys/types.h> 22 23 #include <algorithm> 24 #include <set> 25 #include <string> 26 #include <vector> 27 28 #include <android-base/file.h> 29 #include <selinux/label.h> 30 31 #include "uevent.h" 32 #include "uevent_handler.h" 33 34 namespace android { 35 namespace init { 36 37 class Permissions { 38 public: 39 friend void TestPermissions(const Permissions& expected, const Permissions& test); 40 41 Permissions(const std::string& name, mode_t perm, uid_t uid, gid_t gid, bool no_fnm_pathname); 42 43 bool Match(const std::string& path) const; 44 perm()45 mode_t perm() const { return perm_; } uid()46 uid_t uid() const { return uid_; } gid()47 gid_t gid() const { return gid_; } 48 49 protected: name()50 const std::string& name() const { return name_; } 51 52 private: 53 std::string name_; 54 mode_t perm_; 55 uid_t uid_; 56 gid_t gid_; 57 bool prefix_; 58 bool wildcard_; 59 bool no_fnm_pathname_; 60 }; 61 62 class SysfsPermissions : public Permissions { 63 public: 64 friend void TestSysfsPermissions(const SysfsPermissions& expected, const SysfsPermissions& test); 65 SysfsPermissions(const std::string & name,const std::string & attribute,mode_t perm,uid_t uid,gid_t gid,bool no_fnm_pathname)66 SysfsPermissions(const std::string& name, const std::string& attribute, mode_t perm, uid_t uid, 67 gid_t gid, bool no_fnm_pathname) 68 : Permissions(name, perm, uid, gid, no_fnm_pathname), attribute_(attribute) {} 69 70 bool MatchWithSubsystem(const std::string& path, const std::string& subsystem) const; 71 void SetPermissions(const std::string& path) const; 72 73 private: 74 const std::string attribute_; 75 }; 76 77 class Subsystem { 78 public: 79 friend class SubsystemParser; 80 friend void TestSubsystems(const Subsystem& expected, const Subsystem& test); 81 82 enum DevnameSource { 83 DEVNAME_UEVENT_DEVNAME, 84 DEVNAME_UEVENT_DEVPATH, 85 }; 86 Subsystem()87 Subsystem() {} Subsystem(std::string name)88 Subsystem(std::string name) : name_(std::move(name)) {} Subsystem(std::string name,DevnameSource source,std::string dir_name)89 Subsystem(std::string name, DevnameSource source, std::string dir_name) 90 : name_(std::move(name)), devname_source_(source), dir_name_(std::move(dir_name)) {} 91 92 // Returns the full path for a uevent of a device that is a member of this subsystem, 93 // according to the rules parsed from ueventd.rc ParseDevPath(const Uevent & uevent)94 std::string ParseDevPath(const Uevent& uevent) const { 95 std::string devname = devname_source_ == DEVNAME_UEVENT_DEVNAME 96 ? uevent.device_name 97 : android::base::Basename(uevent.path); 98 99 return dir_name_ + "/" + devname; 100 } 101 102 bool operator==(const std::string& string_name) const { return name_ == string_name; } 103 104 private: 105 std::string name_; 106 DevnameSource devname_source_ = DEVNAME_UEVENT_DEVNAME; 107 std::string dir_name_ = "/dev"; 108 }; 109 110 class DeviceHandler : public UeventHandler { 111 public: 112 friend class DeviceHandlerTester; 113 114 DeviceHandler(); 115 DeviceHandler(std::vector<Permissions> dev_permissions, 116 std::vector<SysfsPermissions> sysfs_permissions, std::vector<Subsystem> subsystems, 117 std::set<std::string> boot_devices, bool skip_restorecon); 118 virtual ~DeviceHandler() = default; 119 120 void HandleUevent(const Uevent& uevent) override; 121 void ColdbootDone() override; 122 123 std::vector<std::string> GetBlockDeviceSymlinks(const Uevent& uevent) const; 124 125 // `androidboot.partition_map` allows associating a partition name for a raw block device 126 // through a comma separated and semicolon deliminated list. For example, 127 // `androidboot.partition_map=vdb,metadata;vdc,userdata` maps `vdb` to `metadata` and `vdc` to 128 // `userdata`. 129 static std::string GetPartitionNameForDevice(const std::string& device); 130 131 private: 132 bool FindPlatformDevice(std::string path, std::string* platform_device_path) const; 133 std::tuple<mode_t, uid_t, gid_t> GetDevicePermissions( 134 const std::string& path, const std::vector<std::string>& links) const; 135 void MakeDevice(const std::string& path, bool block, int major, int minor, 136 const std::vector<std::string>& links) const; 137 void HandleDevice(const std::string& action, const std::string& devpath, bool block, int major, 138 int minor, const std::vector<std::string>& links) const; 139 void FixupSysPermissions(const std::string& upath, const std::string& subsystem) const; 140 void HandleAshmemUevent(const Uevent& uevent); 141 142 std::vector<Permissions> dev_permissions_; 143 std::vector<SysfsPermissions> sysfs_permissions_; 144 std::vector<Subsystem> subsystems_; 145 std::set<std::string> boot_devices_; 146 bool skip_restorecon_; 147 std::string sysfs_mount_point_; 148 }; 149 150 // Exposed for testing 151 void SanitizePartitionName(std::string* string); 152 153 } // namespace init 154 } // namespace android 155 156 #endif 157