1 /*
2 * Copyright (c) 2022 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #include "param_manager.h"
17
18 #include <ctype.h>
19 #include <inttypes.h>
20 #include <limits.h>
21
22 #include "init_cmds.h"
23 #include "init_hook.h"
24 #include "param_base.h"
25 #include "param_trie.h"
26 #include "param_utils.h"
27 #include "securec.h"
28 static DUMP_PRINTF g_printf = printf;
29
30 static int ReadParamName(ParamHandle handle, char *name, uint32_t length);
31
SystemCheckMatchParamWait(const char * name,const char * value)32 ParamNode *SystemCheckMatchParamWait(const char *name, const char *value)
33 {
34 ParamWorkSpace *paramSpace = GetParamWorkSpace();
35 PARAM_CHECK(paramSpace != NULL, return NULL, "Invalid paramSpace");
36 PARAM_WORKSPACE_CHECK(paramSpace, return NULL, "Invalid space");
37
38 WorkSpace *workspace = GetWorkSpaceByName(name);
39 PARAM_CHECK(workspace != NULL, return NULL, "Failed to get workspace %s", name);
40 PARAM_LOGV("SystemCheckMatchParamWait name %s", name);
41 uint32_t nameLength = strlen(name);
42 ParamTrieNode *node = FindTrieNode(workspace, name, nameLength, NULL);
43 if (node == NULL || node->dataIndex == 0) {
44 return NULL;
45 }
46 ParamNode *param = (ParamNode *)GetTrieNode(workspace, node->dataIndex);
47 if (param == NULL) {
48 return NULL;
49 }
50 if ((param->keyLength != nameLength) || (strncmp(param->data, name, nameLength) != 0)) { // compare name
51 return NULL;
52 }
53 ATOMIC_SYNC_OR_AND_FETCH(¶m->commitId, PARAM_FLAGS_WAITED, MEMORY_ORDER_RELEASE);
54 if ((strncmp(value, "*", 1) == 0) || (strcmp(param->data + nameLength + 1, value) == 0)) { // compare value
55 return param;
56 }
57 char *tmp = strstr(value, "*");
58 if (tmp != NULL && (strncmp(param->data + nameLength + 1, value, tmp - value) == 0)) {
59 return param;
60 }
61 return NULL;
62 }
63
ProcessParamTraversal(const WorkSpace * workSpace,const ParamTrieNode * node,const void * cookie)64 static int ProcessParamTraversal(const WorkSpace *workSpace, const ParamTrieNode *node, const void *cookie)
65 {
66 ParamTraversalContext *context = (ParamTraversalContext *)cookie;
67 ParamTrieNode *current = (ParamTrieNode *)node;
68 if (current == NULL) {
69 return 0;
70 }
71 if (current->dataIndex == 0) {
72 return 0;
73 }
74 ParamNode *entry = (ParamNode *)GetTrieNode(workSpace, current->dataIndex);
75 if (entry == NULL) {
76 return 0;
77 }
78 if ((strcmp("#", context->prefix) != 0) && (strncmp(entry->data, context->prefix, strlen(context->prefix)) != 0)) {
79 return 0;
80 }
81 uint32_t index = PARAM_HANDLE(workSpace, current->dataIndex);
82 context->traversalParamPtr(index, context->context);
83 return 0;
84 }
85
SystemTraversalParameter(const char * prefix,TraversalParamPtr traversalParameter,void * cookie)86 int SystemTraversalParameter(const char *prefix, TraversalParamPtr traversalParameter, void *cookie)
87 {
88 ParamWorkSpace *paramSpace = GetParamWorkSpace();
89 PARAM_CHECK(paramSpace != NULL, return -1, "Invalid paramSpace");
90 PARAM_WORKSPACE_CHECK(paramSpace, return -1, "Invalid space");
91 PARAM_CHECK(traversalParameter != NULL, return -1, "The param is null");
92
93 #ifdef PARAM_SUPPORT_SELINUX // load security label
94 ParamSecurityOps *ops = GetParamSecurityOps(PARAM_SECURITY_SELINUX);
95 if (ops != NULL && ops->securityGetLabel != NULL) {
96 ops->securityGetLabel("open");
97 }
98 #endif
99 ParamTraversalContext context = {traversalParameter, cookie, "#"};
100 if (!(prefix == NULL || strlen(prefix) == 0)) {
101 int ret = CheckParamPermission(GetParamSecurityLabel(), prefix, DAC_READ);
102 PARAM_CHECK(ret == 0, return ret, "Forbid to traversal parameters %s", prefix);
103 context.prefix = (char *)prefix;
104 }
105
106 WorkSpace *workSpace = GetNextWorkSpace(NULL);
107 if (workSpace != NULL && strcmp(workSpace->fileName, WORKSPACE_NAME_DAC) == 0) {
108 workSpace = GetNextWorkSpace(workSpace);
109 }
110 while (workSpace != NULL) {
111 WorkSpace *next = GetNextWorkSpace(workSpace);
112 ParamTrieNode *root = NULL;
113 if (prefix != NULL && strlen(prefix) != 0) {
114 root = FindTrieNode(workSpace, prefix, strlen(prefix), NULL);
115 }
116 PARAMSPACE_AREA_RD_LOCK(workSpace);
117 TraversalTrieNode(workSpace, root, ProcessParamTraversal, (const void *)&context);
118 PARAMSPACE_AREA_RW_UNLOCK(workSpace);
119 workSpace = next;
120 }
121 return 0;
122 }
123
DumpTrieDataNodeTraversal(const WorkSpace * workSpace,const ParamTrieNode * node,const void * cookie)124 static int DumpTrieDataNodeTraversal(const WorkSpace *workSpace, const ParamTrieNode *node, const void *cookie)
125 {
126 int verbose = *(int *)cookie;
127 ParamTrieNode *current = (ParamTrieNode *)node;
128 if (current == NULL) {
129 return 0;
130 }
131 if (verbose) {
132 PARAM_DUMP("\tTrie node info [%u,%u,%u] data: %u label: %u key length:%u \n\t key: %s \n",
133 current->left, current->right, current->child,
134 current->dataIndex, current->labelIndex, current->length, current->key);
135 }
136 if (current->dataIndex != 0) {
137 ParamNode *entry = (ParamNode *)GetTrieNode(workSpace, current->dataIndex);
138 if (entry != NULL) {
139 PARAM_DUMP("\tparameter length info [%d] [%u, %u] \n\t param: %s \n",
140 entry->commitId, entry->keyLength, entry->valueLength, entry->data);
141 }
142 }
143 if (current->labelIndex == 0) {
144 return 0;
145 }
146 ParamSecurityNode *label = (ParamSecurityNode *)GetTrieNode(workSpace, current->labelIndex);
147 if (label == NULL) {
148 return 0;
149 }
150 PARAM_DUMP("\tparameter label dac %u %u 0%o \n", label->uid, label->gid, label->mode);
151 PARAM_DUMP("\tparameter label dac member [%u] ", label->memberNum);
152 for (uint32_t i = 0; i < label->memberNum; i++) {
153 PARAM_DUMP(" %u", label->members[i]);
154 }
155 if (label->memberNum > 0) {
156 PARAM_DUMP("\n");
157 }
158 return 0;
159 }
160
HashNodeTraverseForDump(WorkSpace * workSpace,int verbose)161 static void HashNodeTraverseForDump(WorkSpace *workSpace, int verbose)
162 {
163 PARAM_DUMP(" map file: %s \n", workSpace->fileName);
164 PARAM_DUMP(" space index : %d \n", workSpace->spaceIndex);
165 PARAM_DUMP(" space size : %d \n", workSpace->spaceSize);
166 if (workSpace->area != NULL) {
167 PARAM_DUMP(" total size: %u \n", workSpace->area->dataSize);
168 PARAM_DUMP(" first offset: %u \n", workSpace->area->firstNode);
169 PARAM_DUMP(" current offset: %u \n", workSpace->area->currOffset);
170 PARAM_DUMP(" total node: %u \n", workSpace->area->trieNodeCount);
171 PARAM_DUMP(" total param node: %u \n", workSpace->area->paramNodeCount);
172 PARAM_DUMP(" total security node: %u\n", workSpace->area->securityNodeCount);
173 if (verbose) {
174 PARAM_DUMP(" commitId : %" PRId64 "\n", workSpace->area->commitId);
175 PARAM_DUMP(" commitPersistId : %" PRId64 "\n", workSpace->area->commitPersistId);
176 }
177 }
178 PARAM_DUMP(" node info: \n");
179 PARAMSPACE_AREA_RD_LOCK(workSpace);
180 TraversalTrieNode(workSpace, NULL, DumpTrieDataNodeTraversal, (const void *)&verbose);
181 PARAMSPACE_AREA_RW_UNLOCK(workSpace);
182 }
183
SystemDumpParameters(int verbose,int index,int (* dump)(const char * fmt,...))184 void SystemDumpParameters(int verbose, int index, int (*dump)(const char *fmt, ...))
185 {
186 if (dump != NULL) {
187 g_printf = dump;
188 } else {
189 g_printf = printf;
190 }
191 ParamWorkSpace *paramSpace = GetParamWorkSpace();
192 PARAM_CHECK(paramSpace != NULL, return, "Invalid paramSpace");
193 PARAM_WORKSPACE_CHECK(paramSpace, return, "Invalid space");
194 // check default dac
195 int ret = CheckParamPermission(GetParamSecurityLabel(), "#", DAC_READ);
196 PARAM_CHECK(ret == 0, return, "Forbid to dump parameters ");
197 #ifdef PARAM_SUPPORT_SELINUX // load security label
198 ParamSecurityOps *ops = GetParamSecurityOps(PARAM_SECURITY_SELINUX);
199 if (ops != NULL && ops->securityGetLabel != NULL) {
200 ops->securityGetLabel("open");
201 }
202 #endif
203 PARAM_DUMP("Dump all parameters begin ...\n");
204 if (verbose) {
205 PARAM_DUMP("Local security information\n");
206 PARAM_DUMP("pid: %d uid: %u gid: %u \n",
207 paramSpace->securityLabel.cred.pid,
208 paramSpace->securityLabel.cred.uid,
209 paramSpace->securityLabel.cred.gid);
210 }
211 if (index > 0) {
212 WorkSpace *workSpace = GetWorkSpace(index);
213 if (workSpace != NULL) {
214 HashNodeTraverseForDump(workSpace, verbose);
215 }
216 return;
217 }
218 // show workspace size
219 WorkSpaceSize *spaceSize = GetWorkSpaceSize(GetWorkSpace(WORKSPACE_INDEX_SIZE));
220 if (spaceSize != NULL) {
221 PARAM_DUMP("Max label index : %u\n", spaceSize->maxLabelIndex);
222 for (uint32_t i = 0; i < spaceSize->maxLabelIndex; i++) {
223 if (spaceSize->spaceSize[i] == PARAM_WORKSPACE_MIN) {
224 continue;
225 }
226 PARAM_DUMP("\t workspace %u size : %u\n", i, spaceSize->spaceSize[i]);
227 }
228 }
229
230 WorkSpace *workSpace = GetNextWorkSpace(NULL);
231 while (workSpace != NULL) {
232 WorkSpace *next = GetNextWorkSpace(workSpace);
233 HashNodeTraverseForDump(workSpace, verbose);
234 workSpace = next;
235 }
236 PARAM_DUMP("Dump all parameters finish\n");
237 }
238
SysCheckParamExist(const char * name)239 INIT_LOCAL_API int SysCheckParamExist(const char *name)
240 {
241 ParamWorkSpace *paramSpace = GetParamWorkSpace();
242 PARAM_CHECK(paramSpace != NULL, return -1, "Invalid paramSpace");
243 PARAM_WORKSPACE_CHECK(paramSpace, return -1, "Invalid space");
244 PARAM_CHECK(name != NULL, return -1, "The name or handle is null");
245
246 WorkSpace *workSpace = GetNextWorkSpace(NULL);
247 while (workSpace != NULL) {
248 PARAM_LOGV("SysCheckParamExist name %s in space %s", name, workSpace->fileName);
249 WorkSpace *next = GetNextWorkSpace(workSpace);
250 ParamTrieNode *node = FindTrieNode(workSpace, name, strlen(name), NULL);
251 if (node != NULL && node->dataIndex != 0) {
252 return 0;
253 } else if (node != NULL) {
254 return PARAM_CODE_NODE_EXIST;
255 }
256 workSpace = next;
257 }
258 return PARAM_CODE_NOT_FOUND;
259 }
260
GetParamSecurityAuditData(const char * name,int type,ParamAuditData * auditData)261 INIT_INNER_API int GetParamSecurityAuditData(const char *name, int type, ParamAuditData *auditData)
262 {
263 UNUSED(type);
264 ParamWorkSpace *paramSpace = GetParamWorkSpace();
265 PARAM_CHECK(paramSpace != NULL, return -1, "Invalid paramSpace");
266 PARAM_WORKSPACE_CHECK(paramSpace, return -1, "Invalid space");
267 uint32_t labelIndex = 0;
268 // get from dac
269 WorkSpace *space = GetWorkSpace(WORKSPACE_INDEX_DAC);
270 PARAM_CHECK(space != NULL, return -1, "Invalid workSpace");
271 FindTrieNode(space, name, strlen(name), &labelIndex);
272 ParamSecurityNode *node = (ParamSecurityNode *)GetTrieNode(space, labelIndex);
273 PARAM_CHECK(node != NULL, return DAC_RESULT_FORBIDED, "Can not get security label %d", labelIndex);
274
275 auditData->name = name;
276 auditData->dacData.uid = node->uid;
277 auditData->dacData.gid = node->gid;
278 auditData->dacData.mode = node->mode;
279 #ifdef PARAM_SUPPORT_SELINUX
280 const char *tmpName = (paramSpace->selinuxSpace.getParamLabel != NULL) ?
281 paramSpace->selinuxSpace.getParamLabel(name) : NULL;
282 if (tmpName != NULL) {
283 int ret = strcpy_s(auditData->label, sizeof(auditData->label), tmpName);
284 PARAM_CHECK(ret == 0, return 0, "Failed to copy label for %s", name);
285 }
286 #endif
287 return 0;
288 }
289
CreateCtrlInfo(ServiceCtrlInfo ** ctrlInfo,const char * cmd,uint32_t offset,uint8_t ctrlParam,const char * format,...)290 static int CreateCtrlInfo(ServiceCtrlInfo **ctrlInfo, const char *cmd, uint32_t offset,
291 uint8_t ctrlParam, const char *format, ...)
292 {
293 *ctrlInfo = calloc(1, sizeof(ServiceCtrlInfo));
294 PARAM_CHECK(ctrlInfo != NULL, return -1, "Failed to alloc memory %s", cmd);
295 va_list vargs;
296 va_start(vargs, format);
297 int len = vsnprintf_s((*ctrlInfo)->realKey,
298 sizeof((*ctrlInfo)->realKey), sizeof((*ctrlInfo)->realKey) - 1, format, vargs);
299 va_end(vargs);
300 int ret = strcpy_s((*ctrlInfo)->cmdName, sizeof((*ctrlInfo)->cmdName), cmd);
301 (*ctrlInfo)->valueOffset = offset;
302 if (ret != 0 || len <= 0) {
303 free(*ctrlInfo);
304 return -1;
305 }
306 (*ctrlInfo)->ctrlParam = ctrlParam;
307 return 0;
308 }
309
GetServiceCtrlInfoForPowerCtrl(const char * name,const char * value,ServiceCtrlInfo ** ctrlInfo)310 static int GetServiceCtrlInfoForPowerCtrl(const char *name, const char *value, ServiceCtrlInfo **ctrlInfo)
311 {
312 size_t size = 0;
313 const ParamCmdInfo *powerCtrlArg = GetStartupPowerCtl(&size);
314 PARAM_CHECK(powerCtrlArg != NULL, return -1, "Invalid ctrlInfo for %s", name);
315 uint32_t valueOffset = strlen(OHOS_SERVICE_CTRL_PREFIX) + strlen("reboot") + 1;
316 if (strcmp(value, "reboot") == 0) {
317 return CreateCtrlInfo(ctrlInfo, "reboot", valueOffset, 1,
318 "%s%s.%s", OHOS_SERVICE_CTRL_PREFIX, "reboot", value);
319 }
320 for (size_t i = 0; i < size; i++) {
321 PARAM_LOGV("Get power ctrl %s name %s value %s", powerCtrlArg[i].name, name, value);
322 if (strncmp(value, powerCtrlArg[i].name, strlen(powerCtrlArg[i].name)) == 0) {
323 valueOffset = strlen(OHOS_SERVICE_CTRL_PREFIX) + strlen(powerCtrlArg[i].replace) + 1;
324 return CreateCtrlInfo(ctrlInfo, powerCtrlArg[i].cmd, valueOffset, 1,
325 "%s%s.%s", OHOS_SERVICE_CTRL_PREFIX, powerCtrlArg[i].replace, value);
326 }
327 }
328 // not found reboot, so reboot by normal
329 valueOffset = strlen(OHOS_SERVICE_CTRL_PREFIX) + strlen("reboot") + 1;
330 return CreateCtrlInfo(ctrlInfo, "reboot.other", valueOffset, 1, "%s%s.%s",
331 OHOS_SERVICE_CTRL_PREFIX, "reboot", value);
332 }
333
GetServiceCtrlInfo(const char * name,const char * value,ServiceCtrlInfo ** ctrlInfo)334 INIT_LOCAL_API int GetServiceCtrlInfo(const char *name, const char *value, ServiceCtrlInfo **ctrlInfo)
335 {
336 PARAM_CHECK(ctrlInfo != NULL, return -1, "Invalid ctrlInfo %s", name);
337 *ctrlInfo = NULL;
338 size_t size = 0;
339 if (strcmp("ohos.startup.powerctrl", name) == 0) {
340 return GetServiceCtrlInfoForPowerCtrl(name, value, ctrlInfo);
341 }
342 if (strncmp("ohos.ctl.", name, strlen("ohos.ctl.")) == 0) {
343 const ParamCmdInfo *ctrlParam = GetServiceStartCtrl(&size);
344 PARAM_CHECK(ctrlParam != NULL, return -1, "Invalid ctrlInfo for %s", name);
345 for (size_t i = 0; i < size; i++) {
346 if (strcmp(name, ctrlParam[i].name) == 0) {
347 uint32_t valueOffset = strlen(OHOS_SERVICE_CTRL_PREFIX) + strlen(ctrlParam[i].replace) + 1;
348 return CreateCtrlInfo(ctrlInfo, ctrlParam[i].cmd, valueOffset, 1,
349 "%s%s.%s", OHOS_SERVICE_CTRL_PREFIX, ctrlParam[i].replace, value);
350 }
351 }
352 }
353 if (strncmp("ohos.servicectrl.", name, strlen("ohos.servicectrl.")) == 0) {
354 const ParamCmdInfo *installParam = GetServiceCtl(&size);
355 PARAM_CHECK(installParam != NULL, return -1, "Invalid ctrlInfo for %s", name);
356 for (size_t i = 0; i < size; i++) {
357 if (strncmp(name, installParam[i].name, strlen(installParam[i].name)) == 0) {
358 return CreateCtrlInfo(ctrlInfo, installParam[i].cmd, strlen(name) + 1, 1, "%s.%s", name, value);
359 }
360 }
361 }
362 const ParamCmdInfo *other = GetOtherSpecial(&size);
363 for (size_t i = 0; i < size; i++) {
364 if (strncmp(name, other[i].name, strlen(other[i].name)) == 0) {
365 return CreateCtrlInfo(ctrlInfo, other[i].cmd, strlen(other[i].replace), 0, "%s.%s", name, value);
366 }
367 }
368 return 0;
369 }
370
CheckParameterSet(const char * name,const char * value,const ParamSecurityLabel * srcLabel,int * ctrlService)371 INIT_LOCAL_API int CheckParameterSet(const char *name,
372 const char *value, const ParamSecurityLabel *srcLabel, int *ctrlService)
373 {
374 ParamWorkSpace *paramSpace = GetParamWorkSpace();
375 PARAM_CHECK(paramSpace != NULL, return PARAM_WORKSPACE_NOT_INIT, "Invalid paramSpace");
376 PARAM_WORKSPACE_CHECK(paramSpace, return PARAM_WORKSPACE_NOT_INIT, "Invalid space");
377 PARAM_LOGV("CheckParameterSet name %s value: %s", name, value);
378 PARAM_CHECK(srcLabel != NULL && ctrlService != NULL, return -1, "Invalid param ");
379 int ret = CheckParamName(name, 0);
380 PARAM_CHECK(ret == 0, return ret, "Illegal param name %s", name);
381 ret = CheckParamValue(NULL, name, value, GetParamValueType(name));
382 PARAM_CHECK(ret == 0, return ret, "Illegal param value %s", value);
383 *ctrlService = 0;
384
385 ServiceCtrlInfo *serviceInfo = NULL;
386 GetServiceCtrlInfo(name, value, &serviceInfo);
387 ret = CheckParamPermission(srcLabel, (serviceInfo == NULL) ? name : serviceInfo->realKey, DAC_WRITE);
388 if (ret == 0) {
389 if (serviceInfo == NULL) {
390 return 0;
391 }
392 if (serviceInfo->ctrlParam != 0) { // ctrl param
393 *ctrlService |= PARAM_CTRL_SERVICE;
394 }
395 #if !(defined __LITEOS_A__ || defined __LITEOS_M__)
396 // do hook cmd
397 PARAM_LOGV("Check parameter settings realKey %s cmd: '%s' value: %s",
398 serviceInfo->realKey, serviceInfo->cmdName, (char *)serviceInfo->realKey + serviceInfo->valueOffset);
399 int cmdIndex = 0;
400 (void)GetMatchCmd(serviceInfo->cmdName, &cmdIndex);
401 DoCmdByIndex(cmdIndex, (char *)serviceInfo->realKey + serviceInfo->valueOffset, NULL);
402 #endif
403 }
404 if (serviceInfo != NULL) {
405 free(serviceInfo);
406 }
407 return ret;
408 }
409
SystemGetParameterName(ParamHandle handle,char * name,unsigned int len)410 int SystemGetParameterName(ParamHandle handle, char *name, unsigned int len)
411 {
412 PARAM_CHECK(name != NULL && handle != 0, return -1, "The name is null");
413 return ReadParamName(handle, name, len);
414 }
415
AddParam(WorkSpace * workSpace,uint8_t type,const char * name,const char * value,uint32_t * dataIndex)416 static int AddParam(WorkSpace *workSpace, uint8_t type, const char *name, const char *value, uint32_t *dataIndex)
417 {
418 ParamTrieNode *node = AddTrieNode(workSpace, name, strlen(name));
419 PARAM_CHECK(node != NULL, return PARAM_CODE_REACHED_MAX,
420 "Failed to add node name %s space %s", name, workSpace->fileName);
421 ParamNode *entry = (ParamNode *)GetTrieNode(workSpace, node->dataIndex);
422 if (entry == NULL) {
423 uint32_t offset = AddParamNode(workSpace, type, name, strlen(name), value, strlen(value));
424 PARAM_CHECK(offset > 0, return PARAM_CODE_REACHED_MAX,
425 "Failed to allocate name %s space %s", name, workSpace->fileName);
426 SaveIndex(&node->dataIndex, offset);
427 ATOMIC_SYNC_ADD_AND_FETCH(&workSpace->area->commitId, 1, MEMORY_ORDER_RELEASE);
428 #ifdef PARAM_SUPPORT_SELINUX
429 WorkSpace *space = GetWorkSpace(WORKSPACE_INDEX_DAC);
430 if (space != NULL && space != workSpace) { // dac commit is global commit
431 ATOMIC_SYNC_ADD_AND_FETCH(&space->area->commitId, 1, MEMORY_ORDER_RELEASE);
432 }
433 #endif
434 }
435 if (dataIndex != NULL) {
436 *dataIndex = node->dataIndex;
437 }
438 PARAM_LOGV("AddParam name %s value: %s", name, value);
439 return 0;
440 }
441
UpdateParam(const WorkSpace * workSpace,uint32_t * dataIndex,const char * name,const char * value)442 static int UpdateParam(const WorkSpace *workSpace, uint32_t *dataIndex, const char *name, const char *value)
443 {
444 ParamNode *entry = (ParamNode *)GetTrieNode(workSpace, *dataIndex);
445 PARAM_CHECK(entry != NULL, return PARAM_CODE_REACHED_MAX, "Failed to update param value %s %u", name, *dataIndex);
446 PARAM_CHECK(entry->keyLength == strlen(name), return PARAM_CODE_INVALID_NAME, "Failed to check name len %s", name);
447
448 uint32_t valueLen = strlen(value);
449 uint32_t commitId = ATOMIC_LOAD_EXPLICIT(&entry->commitId, MEMORY_ORDER_RELAXED);
450 ATOMIC_STORE_EXPLICIT(&entry->commitId, commitId | PARAM_FLAGS_MODIFY, MEMORY_ORDER_RELAXED);
451 if (entry->valueLength < PARAM_VALUE_LEN_MAX && valueLen < PARAM_VALUE_LEN_MAX) {
452 int ret = PARAM_MEMCPY(entry->data + entry->keyLength + 1, PARAM_VALUE_LEN_MAX, value, valueLen + 1);
453 PARAM_CHECK(ret == 0, return PARAM_CODE_INVALID_VALUE, "Failed to copy value");
454 entry->valueLength = valueLen;
455 }
456 uint32_t flags = commitId & ~PARAM_FLAGS_COMMITID;
457 ATOMIC_STORE_EXPLICIT(&entry->commitId, (++commitId) | flags, MEMORY_ORDER_RELEASE);
458 ATOMIC_SYNC_ADD_AND_FETCH(&workSpace->area->commitId, 1, MEMORY_ORDER_RELEASE);
459 #ifdef PARAM_SUPPORT_SELINUX
460 WorkSpace *space = GetWorkSpace(WORKSPACE_INDEX_DAC);
461 if (space != NULL && space != workSpace) { // dac commit is global commit
462 ATOMIC_SYNC_ADD_AND_FETCH(&space->area->commitId, 1, MEMORY_ORDER_RELEASE);
463 }
464 #endif
465 PARAM_LOGV("UpdateParam name %s value: %s", name, value);
466 futex_wake(&entry->commitId, INT_MAX);
467 return 0;
468 }
469
WriteParam(const char * name,const char * value,uint32_t * dataIndex,int mode)470 INIT_LOCAL_API int WriteParam(const char *name, const char *value, uint32_t *dataIndex, int mode)
471 {
472 int flag = 0;
473 PARAM_LOGV("WriteParam %s", name);
474 ParamWorkSpace *paramSpace = GetParamWorkSpace();
475 PARAM_CHECK(paramSpace != NULL, return PARAM_WORKSPACE_NOT_INIT, "Invalid paramSpace");
476 PARAM_WORKSPACE_CHECK(paramSpace, return PARAM_WORKSPACE_NOT_INIT, "Invalid space");
477 PARAM_CHECK(value != NULL && name != NULL, return PARAM_CODE_INVALID_PARAM, "Invalid name or value");
478 WorkSpace *workSpace = GetWorkSpaceByName(name);
479 PARAM_CHECK(workSpace != NULL, return PARAM_CODE_INVALID_PARAM, "Invalid workSpace");
480 #ifdef PARAM_SUPPORT_SELINUX
481 if (strcmp(workSpace->fileName, WORKSPACE_NAME_DEF_SELINUX) == 0) {
482 flag = 1;
483 }
484 #endif
485 ParamTrieNode *node = FindTrieNode(workSpace, name, strlen(name), NULL);
486 int ret = 0;
487 if (node != NULL && node->dataIndex != 0) {
488 if (dataIndex != NULL) {
489 *dataIndex = node->dataIndex;
490 }
491 if ((mode & LOAD_PARAM_ONLY_ADD) == LOAD_PARAM_ONLY_ADD) {
492 return PARAM_CODE_READ_ONLY;
493 }
494 ParamNode *entry = (ParamNode *)GetTrieNode(workSpace, node->dataIndex);
495 PARAM_CHECK(entry != NULL, return PARAM_CODE_REACHED_MAX,
496 "Failed to update param value %s %u", name, node->dataIndex);
497 // use save type to check value
498 ret = CheckParamValue(node, name, value, entry->type);
499 PARAM_CHECK(ret == 0, return ret, "Invalid param value param: %s=%s", name, value);
500 PARAMSPACE_AREA_RW_LOCK(workSpace);
501 ret = UpdateParam(workSpace, &node->dataIndex, name, value);
502 PARAMSPACE_AREA_RW_UNLOCK(workSpace);
503 } else {
504 uint8_t type = GetParamValueType(name);
505 ret = CheckParamValue(node, name, value, type);
506 PARAM_CHECK(ret == 0, return ret, "Invalid param value param: %s=%s", name, value);
507 PARAMSPACE_AREA_RW_LOCK(workSpace);
508 ret = AddParam((WorkSpace *)workSpace, type, name, value, dataIndex);
509 PARAMSPACE_AREA_RW_UNLOCK(workSpace);
510 }
511 if ((ret == PARAM_CODE_REACHED_MAX) && (flag == 1)) {
512 PARAM_LOGE("Add node %s to space %s failed! memory is not enough, system reboot!", name, workSpace->fileName);
513 return PARAM_DEFAULT_PARAM_MEMORY_NOT_ENOUGH;
514 }
515 return ret;
516 }
517
GetNextWorkSpace(WorkSpace * curr)518 INIT_LOCAL_API WorkSpace *GetNextWorkSpace(WorkSpace *curr)
519 {
520 ParamWorkSpace *paramSpace = GetParamWorkSpace();
521 PARAM_CHECK(paramSpace != NULL, return NULL, "Invalid paramSpace");
522 uint32_t i = (curr == NULL) ? 0 : (curr->spaceIndex + 1);
523 WorkSpace *workSpace = NULL;
524 for (; i < paramSpace->maxLabelIndex; ++i) {
525 workSpace = GetWorkSpace(i);
526 if (workSpace != NULL) {
527 return workSpace;
528 }
529 }
530 return NULL;
531 }
532
GetParamValueType(const char * name)533 INIT_LOCAL_API uint8_t GetParamValueType(const char *name)
534 {
535 uint32_t labelIndex = 0;
536 WorkSpace *space = GetWorkSpace(WORKSPACE_INDEX_DAC);
537 if (space == NULL) {
538 return PARAM_TYPE_STRING;
539 }
540 (void)FindTrieNode(space, name, strlen(name), &labelIndex);
541 ParamSecurityNode *securityNode = (ParamSecurityNode *)GetTrieNode(space, labelIndex);
542 if (securityNode == NULL) {
543 return PARAM_TYPE_STRING;
544 }
545 return securityNode->type;
546 }
547
CheckParamValueType(const char * name,const char * value,uint8_t paramType)548 static int CheckParamValueType(const char *name, const char *value, uint8_t paramType)
549 {
550 (void)name;
551 if (paramType == PARAM_TYPE_INT) {
552 long long int temp1 = 0;
553 if (strlen(value) > 1 && value[0] == '-' && StringToLL(value, &temp1) != 0) {
554 PARAM_LOGE("Illegal param value %s for int", value);
555 return PARAM_CODE_INVALID_VALUE;
556 }
557 unsigned long long int temp2 = 0;
558 if (StringToULL(value, &temp2) != 0) {
559 PARAM_LOGE("Illegal param value %s for int", value);
560 return PARAM_CODE_INVALID_VALUE;
561 }
562 } else if (paramType == PARAM_TYPE_BOOL) {
563 static const char *validValue[] = {
564 "1", "0", "true", "false", "y", "yes", "on", "off", "n", "no"
565 };
566 size_t i = 0;
567 for (; i < ARRAY_LENGTH(validValue); i++) {
568 if (strcasecmp(validValue[i], value) == 0) {
569 break;
570 }
571 }
572 if (i >= ARRAY_LENGTH(validValue)) {
573 PARAM_LOGE("Illegal param value %s for bool", value);
574 return PARAM_CODE_INVALID_VALUE;
575 }
576 }
577 return 0;
578 }
579
CheckParamValue(const ParamTrieNode * node,const char * name,const char * value,uint8_t paramType)580 INIT_LOCAL_API int CheckParamValue(const ParamTrieNode *node, const char *name, const char *value, uint8_t paramType)
581 {
582 if (IS_READY_ONLY(name)) {
583 PARAM_CHECK(strlen(value) < PARAM_CONST_VALUE_LEN_MAX,
584 return PARAM_CODE_INVALID_VALUE, "Illegal param value %s", value);
585 if (node != NULL && node->dataIndex != 0) {
586 PARAM_LOGE("Read-only param was already set %s", name);
587 return PARAM_CODE_READ_ONLY;
588 }
589 } else {
590 PARAM_CHECK(strlen(value) < GetParamMaxLen(paramType),
591 return PARAM_CODE_INVALID_VALUE, "Illegal param value %s length", value);
592 }
593 return CheckParamValueType(name, value, paramType);
594 }
595
ReadParamName(ParamHandle handle,char * name,uint32_t length)596 static int ReadParamName(ParamHandle handle, char *name, uint32_t length)
597 {
598 PARAM_CHECK(name != NULL, return PARAM_CODE_INVALID_PARAM, "Invalid param");
599 ParamWorkSpace *paramSpace = GetParamWorkSpace();
600 PARAM_WORKSPACE_CHECK(paramSpace, return -1, "Param workspace has not init.");
601 PARAM_ONLY_CHECK(handle != (ParamHandle)-1, return PARAM_CODE_NOT_FOUND);
602 uint32_t labelIndex = 0;
603 uint32_t index = 0;
604 PARAM_GET_HANDLE_INFO(handle, labelIndex, index);
605 WorkSpace *workSpace = GetWorkSpace(labelIndex);
606 PARAM_CHECK(workSpace != NULL, return PARAM_CODE_NOT_FOUND, "Invalid workSpace for handle %x", handle);
607 ParamNode *entry = NULL;
608 if (PARAM_IS_ALIGNED(index)) {
609 entry = (ParamNode *)GetTrieNode(workSpace, index);
610 }
611 if (entry == NULL) {
612 return PARAM_CODE_NOT_FOUND;
613 }
614 PARAM_CHECK(length > entry->keyLength, return -1, "Invalid param size %u %u", entry->keyLength, length);
615 int ret = PARAM_MEMCPY(name, length, entry->data, entry->keyLength);
616 PARAM_CHECK(ret == 0, return PARAM_CODE_INVALID_PARAM, "Failed to copy name");
617 name[entry->keyLength] = '\0';
618 return 0;
619 }
620
CheckParamName(const char * name,int info)621 INIT_LOCAL_API int CheckParamName(const char *name, int info)
622 {
623 PARAM_CHECK(name != NULL, return PARAM_CODE_INVALID_PARAM, "Invalid param");
624 size_t nameLen = strlen(name);
625 if (nameLen >= PARAM_NAME_LEN_MAX) {
626 return PARAM_CODE_INVALID_NAME;
627 }
628 if (strcmp(name, "#") == 0) {
629 return 0;
630 }
631
632 if (nameLen < 1 || name[0] == '.' || (!info && name[nameLen - 1] == '.')) {
633 PARAM_LOGE("CheckParamName %s %d", name, info);
634 return PARAM_CODE_INVALID_NAME;
635 }
636
637 /* Only allow alphanumeric, plus '.', '-', '@', ':', or '_' */
638 /* Don't allow ".." to appear in a param name */
639 for (size_t i = 0; i < nameLen; i++) {
640 if (name[i] == '.') {
641 if (name[i - 1] == '.') {
642 return PARAM_CODE_INVALID_NAME;
643 }
644 continue;
645 }
646 if (name[i] == '_' || name[i] == '-' || name[i] == '@' || name[i] == ':') {
647 continue;
648 }
649 if (isalnum(name[i])) {
650 continue;
651 }
652 return PARAM_CODE_INVALID_NAME;
653 }
654 return 0;
655 }
656
CheckParamPermission_(WorkSpace ** workspace,ParamTrieNode ** node,const ParamSecurityLabel * srcLabel,const char * name,uint32_t mode)657 static int CheckParamPermission_(WorkSpace **workspace, ParamTrieNode **node,
658 const ParamSecurityLabel *srcLabel, const char *name, uint32_t mode)
659 {
660 ParamWorkSpace *paramSpace = GetParamWorkSpace();
661 PARAM_CHECK(srcLabel != NULL, return DAC_RESULT_FORBIDED, "The srcLabel is null");
662 WorkSpace *dacSpace = GetWorkSpace(WORKSPACE_INDEX_DAC);
663 PARAM_CHECK(paramSpace->checkParamPermission != NULL, return DAC_RESULT_FORBIDED, "Invalid check permission");
664 ParamLabelIndex labelIndex = {0};
665 // search node from dac space, and get selinux label index
666 *node = FindTrieNode(dacSpace, name, strlen(name), &labelIndex.dacLabelIndex);
667 labelIndex.workspace = GetWorkSpaceByName(name);
668 PARAM_CHECK(labelIndex.workspace != NULL, return DAC_RESULT_FORBIDED, "Invalid workSpace for %s", name);
669 labelIndex.selinuxLabelIndex = labelIndex.workspace->spaceIndex;
670
671 int ret = paramSpace->checkParamPermission(&labelIndex, srcLabel, name, mode);
672 PARAM_CHECK(ret == 0, return ret,
673 "Forbid to access %s label %u %u", name, labelIndex.dacLabelIndex, labelIndex.selinuxLabelIndex);
674 *workspace = labelIndex.workspace;
675 return ret;
676 }
677
CheckParamPermission(const ParamSecurityLabel * srcLabel,const char * name,uint32_t mode)678 INIT_LOCAL_API int CheckParamPermission(const ParamSecurityLabel *srcLabel, const char *name, uint32_t mode)
679 {
680 ParamTrieNode *entry = NULL;
681 WorkSpace *workspace = NULL;
682 return CheckParamPermission_(&workspace, &entry, srcLabel, name, mode);
683 }
684
GetTrieNodeByHandle(ParamHandle handle)685 STATIC_INLINE ParamTrieNode *GetTrieNodeByHandle(ParamHandle handle)
686 {
687 PARAM_ONLY_CHECK(handle != (ParamHandle)-1, return NULL);
688 uint32_t labelIndex = 0;
689 uint32_t index = 0;
690 PARAM_GET_HANDLE_INFO(handle, labelIndex, index);
691 WorkSpace *workSpace = GetWorkSpace(labelIndex);
692 PARAM_CHECK(workSpace != NULL, return NULL, "Invalid workSpace for handle %x", handle);
693 if (PARAM_IS_ALIGNED(index)) {
694 return (ParamTrieNode *)GetTrieNode(workSpace, index);
695 }
696 return NULL;
697 }
698
ReadParamValue(ParamNode * entry,char * value,uint32_t * length)699 STATIC_INLINE int ReadParamValue(ParamNode *entry, char *value, uint32_t *length)
700 {
701 if (entry == NULL) {
702 return PARAM_CODE_NOT_FOUND;
703 }
704 if (value == NULL) {
705 *length = entry->valueLength + 1;
706 return 0;
707 }
708 PARAM_CHECK(*length > entry->valueLength, return PARAM_CODE_INVALID_VALUE,
709 "Invalid value len %u %u", *length, entry->valueLength);
710 uint32_t commitId = ReadCommitId(entry);
711 return ReadParamValue_(entry, &commitId, value, length);
712 }
713
SystemReadParam(const char * name,char * value,uint32_t * len)714 int SystemReadParam(const char *name, char *value, uint32_t *len)
715 {
716 PARAM_WORKSPACE_CHECK(GetParamWorkSpace(), return PARAM_WORKSPACE_NOT_INIT,
717 "SystemReadParam failed! name is:%s, errNum is:%d!", name, PARAM_WORKSPACE_NOT_INIT);
718 PARAM_CHECK(name != NULL && len != NULL, return PARAM_CODE_ERROR,
719 "SystemReadParam failed! name is:%s, errNum is:%d!", name, PARAM_CODE_ERROR);
720 ParamTrieNode *node = NULL;
721 WorkSpace *workspace = NULL;
722 int ret = CheckParamPermission_(&workspace, &node, GetParamSecurityLabel(), name, DAC_READ);
723 if (ret != 0) {
724 PARAM_LOGE("SystemReadParam failed! name is:%s, errNum is:%d!", name, ret);
725 return ret;
726 }
727 #ifdef PARAM_SUPPORT_SELINUX
728 // search from real workspace
729 node = FindTrieNode(workspace, name, strlen(name), NULL);
730 #endif
731 if (node == NULL) {
732 return PARAM_CODE_NOT_FOUND;
733 }
734 ret = ReadParamValue((ParamNode *)GetTrieNode(workspace, node->dataIndex), value, len);
735 if (ret != 0) {
736 PARAM_LOGE("SystemReadParam failed! name is:%s, errNum is:%d!", name, ret);
737 }
738 return ret;
739 }
740
SystemFindParameter(const char * name,ParamHandle * handle)741 int SystemFindParameter(const char *name, ParamHandle *handle)
742 {
743 PARAM_WORKSPACE_CHECK(GetParamWorkSpace(), return PARAM_WORKSPACE_NOT_INIT, "Param workspace has not init.");
744 PARAM_CHECK(name != NULL && handle != NULL, return -1, "The name or handle is null");
745 *handle = -1;
746 ParamTrieNode *entry = NULL;
747 WorkSpace *workspace = NULL;
748 int ret = CheckParamPermission_(&workspace, &entry, GetParamSecurityLabel(), name, DAC_READ);
749 PARAM_CHECK(ret == 0, return ret, "Forbid to access parameter %s", name);
750 #ifdef PARAM_SUPPORT_SELINUX
751 // search from real workspace
752 entry = FindTrieNode(workspace, name, strlen(name), NULL);
753 #endif
754 if (entry != NULL && entry->dataIndex != 0) {
755 *handle = PARAM_HANDLE(workspace, entry->dataIndex);
756 return 0;
757 } else if (entry != NULL) {
758 return PARAM_CODE_NODE_EXIST;
759 }
760 return PARAM_CODE_NOT_FOUND;
761 }
762
SystemGetParameterCommitId(ParamHandle handle,uint32_t * commitId)763 int SystemGetParameterCommitId(ParamHandle handle, uint32_t *commitId)
764 {
765 PARAM_WORKSPACE_CHECK(GetParamWorkSpace(), return -1, "Param workspace has not init.");
766 PARAM_ONLY_CHECK(handle != (ParamHandle)-1, return PARAM_CODE_NOT_FOUND);
767 PARAM_CHECK(handle != 0 && commitId != NULL, return -1, "The handle is null");
768 ParamNode *entry = (ParamNode *)GetTrieNodeByHandle(handle);
769 if (entry == NULL) {
770 return PARAM_CODE_NOT_FOUND;
771 }
772 *commitId = ReadCommitId(entry);
773 return 0;
774 }
775
GetSystemCommitId(void)776 long long GetSystemCommitId(void)
777 {
778 PARAM_WORKSPACE_CHECK(GetParamWorkSpace(), return -1, "Param workspace has not init.");
779 WorkSpace *space = GetWorkSpace(WORKSPACE_INDEX_DAC);
780 if (space == NULL || space->area == NULL) {
781 return 0;
782 }
783 return ATOMIC_UINT64_LOAD_EXPLICIT(&space->area->commitId, MEMORY_ORDER_ACQUIRE);
784 }
785
SystemGetParameterValue(ParamHandle handle,char * value,unsigned int * len)786 int SystemGetParameterValue(ParamHandle handle, char *value, unsigned int *len)
787 {
788 PARAM_WORKSPACE_CHECK(GetParamWorkSpace(), return -1, "Param workspace has not init.");
789 PARAM_ONLY_CHECK(handle != (ParamHandle)-1, return PARAM_CODE_NOT_FOUND);
790 PARAM_CHECK(len != NULL && handle != 0, return -1, "The value is null");
791 return ReadParamValue((ParamNode *)GetTrieNodeByHandle(handle), value, len);
792 }
793
CheckIfUidInGroup(const gid_t groupId,const char * groupCheckName)794 INIT_LOCAL_API int CheckIfUidInGroup(const gid_t groupId, const char *groupCheckName)
795 {
796 PARAM_CHECK(groupCheckName != NULL, return -1, "Invalid groupCheckName");
797 struct group *groupName = getgrnam(groupCheckName);
798 PARAM_CHECK(groupName != NULL, return -1, "Not find %s group", groupCheckName);
799 char **gr_mem = groupName->gr_mem;
800 PARAM_CHECK(gr_mem != NULL, return -1, "No member in %s", groupCheckName);
801 for (int i = 0; gr_mem[i] != NULL; ++i) {
802 struct group *userGroup = getgrnam(gr_mem[i]);
803 if (userGroup != NULL) {
804 if (groupId == userGroup->gr_gid) {
805 return 0;
806 }
807 }
808 }
809 PARAM_LOGE("Forbid to access, groupId %u not in %s", groupId, groupCheckName);
810 return PARAM_CODE_PERMISSION_DENIED;
811 }
812