You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
198 lines
6.7 KiB
198 lines
6.7 KiB
/*
|
|
* Copyright (C) 2016 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#define LOG_TAG "dumpstate"
|
|
|
|
#include "DumpstateInternal.h"
|
|
|
|
#include <errno.h>
|
|
#include <grp.h>
|
|
#include <poll.h>
|
|
#include <pwd.h>
|
|
#include <stdint.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <sys/capability.h>
|
|
#include <sys/prctl.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#include <cstdint>
|
|
#include <string>
|
|
#include <vector>
|
|
|
|
#include <android-base/file.h>
|
|
#include <android-base/macros.h>
|
|
#include <log/log.h>
|
|
|
|
uint64_t Nanotime() {
|
|
timespec ts;
|
|
clock_gettime(CLOCK_MONOTONIC, &ts);
|
|
return static_cast<uint64_t>(ts.tv_sec * NANOS_PER_SEC + ts.tv_nsec);
|
|
}
|
|
|
|
// Switches to non-root user and group.
|
|
bool DropRootUser() {
|
|
struct group* grp = getgrnam("shell");
|
|
gid_t shell_gid = grp != nullptr ? grp->gr_gid : 0;
|
|
struct passwd* pwd = getpwnam("shell");
|
|
uid_t shell_uid = pwd != nullptr ? pwd->pw_uid : 0;
|
|
|
|
if (!shell_gid || !shell_uid) {
|
|
MYLOGE("Unable to get AID_SHELL: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
|
|
if (getgid() == shell_gid && getuid() == shell_uid) {
|
|
MYLOGD("drop_root_user(): already running as Shell\n");
|
|
return true;
|
|
}
|
|
/* ensure we will keep capabilities when we drop root */
|
|
if (prctl(PR_SET_KEEPCAPS, 1) < 0) {
|
|
MYLOGE("prctl(PR_SET_KEEPCAPS) failed: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
|
|
static const std::vector<std::string> group_names{
|
|
"log", "sdcard_r", "sdcard_rw", "mount", "inet", "net_bw_stats",
|
|
"readproc", "bluetooth", "wakelock", "nfc"};
|
|
std::vector<gid_t> groups(group_names.size(), 0);
|
|
for (size_t i = 0; i < group_names.size(); ++i) {
|
|
grp = getgrnam(group_names[i].c_str());
|
|
groups[i] = grp != nullptr ? grp->gr_gid : 0;
|
|
if (groups[i] == 0) {
|
|
MYLOGE("Unable to get required gid '%s': %s\n", group_names[i].c_str(),
|
|
strerror(errno));
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (setgroups(groups.size(), groups.data()) != 0) {
|
|
MYLOGE("Unable to setgroups, aborting: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
if (setgid(shell_gid) != 0) {
|
|
MYLOGE("Unable to setgid, aborting: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
if (setuid(shell_uid) != 0) {
|
|
MYLOGE("Unable to setuid, aborting: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
|
|
struct __user_cap_header_struct capheader;
|
|
struct __user_cap_data_struct capdata[2];
|
|
memset(&capheader, 0, sizeof(capheader));
|
|
memset(&capdata, 0, sizeof(capdata));
|
|
capheader.version = _LINUX_CAPABILITY_VERSION_3;
|
|
capheader.pid = 0;
|
|
|
|
if (capget(&capheader, &capdata[0]) != 0) {
|
|
MYLOGE("capget failed: %s\n", strerror(errno));
|
|
return false;
|
|
}
|
|
|
|
const uint32_t cap_syslog_mask = CAP_TO_MASK(CAP_SYSLOG);
|
|
const uint32_t cap_syslog_index = CAP_TO_INDEX(CAP_SYSLOG);
|
|
bool has_cap_syslog = (capdata[cap_syslog_index].effective & cap_syslog_mask) != 0;
|
|
|
|
memset(&capdata, 0, sizeof(capdata));
|
|
if (has_cap_syslog) {
|
|
// Only attempt to keep CAP_SYSLOG if it was present to begin with.
|
|
capdata[cap_syslog_index].permitted |= cap_syslog_mask;
|
|
capdata[cap_syslog_index].effective |= cap_syslog_mask;
|
|
}
|
|
|
|
const uint32_t cap_block_suspend_mask = CAP_TO_MASK(CAP_BLOCK_SUSPEND);
|
|
const uint32_t cap_block_suspend_index = CAP_TO_INDEX(CAP_BLOCK_SUSPEND);
|
|
capdata[cap_block_suspend_index].permitted |= cap_block_suspend_mask;
|
|
capdata[cap_block_suspend_index].effective |= cap_block_suspend_mask;
|
|
|
|
if (capset(&capheader, &capdata[0]) != 0) {
|
|
MYLOGE("capset({%#x, %#x}) failed: %s\n", capdata[0].effective,
|
|
capdata[1].effective, strerror(errno));
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
int DumpFileFromFdToFd(const std::string& title, const std::string& path_string, int fd, int out_fd,
|
|
bool dry_run) {
|
|
const char* path = path_string.c_str();
|
|
if (!title.empty()) {
|
|
dprintf(out_fd, "------ %s (%s", title.c_str(), path);
|
|
|
|
struct stat st;
|
|
// Only show the modification time of non-device files.
|
|
size_t path_len = strlen(path);
|
|
if ((path_len < 6 || memcmp(path, "/proc/", 6)) &&
|
|
(path_len < 5 || memcmp(path, "/sys/", 5)) &&
|
|
(path_len < 3 || memcmp(path, "/d/", 3)) && !fstat(fd, &st)) {
|
|
char stamp[80];
|
|
time_t mtime = st.st_mtime;
|
|
strftime(stamp, sizeof(stamp), "%Y-%m-%d %H:%M:%S", localtime(&mtime));
|
|
dprintf(out_fd, ": %s", stamp);
|
|
}
|
|
dprintf(out_fd, ") ------\n");
|
|
fsync(out_fd);
|
|
}
|
|
if (dry_run) {
|
|
if (out_fd != STDOUT_FILENO) {
|
|
// There is no title, but we should still print a dry-run message
|
|
dprintf(out_fd, "%s: skipped on dry run\n", path);
|
|
} else if (!title.empty()) {
|
|
dprintf(out_fd, "\t(skipped on dry run)\n");
|
|
}
|
|
fsync(out_fd);
|
|
return 0;
|
|
}
|
|
bool newline = false;
|
|
while (true) {
|
|
uint64_t start_time = Nanotime();
|
|
pollfd fds[] = { { .fd = fd, .events = POLLIN } };
|
|
int ret = TEMP_FAILURE_RETRY(poll(fds, arraysize(fds), 30 * 1000));
|
|
if (ret == -1) {
|
|
dprintf(out_fd, "*** %s: poll failed: %s\n", path, strerror(errno));
|
|
newline = true;
|
|
break;
|
|
} else if (ret == 0) {
|
|
uint64_t elapsed = Nanotime() - start_time;
|
|
dprintf(out_fd, "*** %s: Timed out after %.3fs\n", path, (float)elapsed / NANOS_PER_SEC);
|
|
newline = true;
|
|
break;
|
|
} else {
|
|
char buffer[65536];
|
|
ssize_t bytes_read = TEMP_FAILURE_RETRY(read(fd, buffer, sizeof(buffer)));
|
|
if (bytes_read > 0) {
|
|
android::base::WriteFully(out_fd, buffer, bytes_read);
|
|
newline = (buffer[bytes_read - 1] == '\n');
|
|
} else {
|
|
if (bytes_read == -1) {
|
|
dprintf(out_fd, "*** %s: Failed to read from fd: %s", path, strerror(errno));
|
|
newline = true;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!newline) dprintf(out_fd, "\n");
|
|
if (!title.empty()) dprintf(out_fd, "\n");
|
|
return 0;
|
|
}
|