diff options
author | The Android Open Source Project <initial-contribution@android.com> | 2009-03-03 19:31:44 -0800 |
---|---|---|
committer | The Android Open Source Project <initial-contribution@android.com> | 2009-03-03 19:31:44 -0800 |
commit | 9066cfe9886ac131c34d59ed0e2d287b0e3c0087 (patch) | |
tree | d88beb88001f2482911e3d28e43833b50e4b4e97 /cmds/installd | |
parent | d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 (diff) | |
download | frameworks_base-9066cfe9886ac131c34d59ed0e2d287b0e3c0087.zip frameworks_base-9066cfe9886ac131c34d59ed0e2d287b0e3c0087.tar.gz frameworks_base-9066cfe9886ac131c34d59ed0e2d287b0e3c0087.tar.bz2 |
auto import from //depot/cupcake/@135843
Diffstat (limited to 'cmds/installd')
-rw-r--r-- | cmds/installd/Android.mk | 21 | ||||
-rw-r--r-- | cmds/installd/commands.c | 568 | ||||
-rw-r--r-- | cmds/installd/installd.c | 259 | ||||
-rw-r--r-- | cmds/installd/installd.h | 100 | ||||
-rw-r--r-- | cmds/installd/utils.c | 149 |
5 files changed, 1097 insertions, 0 deletions
diff --git a/cmds/installd/Android.mk b/cmds/installd/Android.mk new file mode 100644 index 0000000..6673862 --- /dev/null +++ b/cmds/installd/Android.mk @@ -0,0 +1,21 @@ +ifneq ($(TARGET_SIMULATOR),true) + +LOCAL_PATH:= $(call my-dir) +include $(CLEAR_VARS) + +LOCAL_SRC_FILES:= \ + installd.c commands.c utils.c + +LOCAL_C_INCLUDES := \ + $(call include-path-for, system-core)/cutils + +LOCAL_SHARED_LIBRARIES := \ + libcutils + +LOCAL_STATIC_LIBRARIES := + +LOCAL_MODULE:= installd + +include $(BUILD_EXECUTABLE) + +endif # !simulator)) diff --git a/cmds/installd/commands.c b/cmds/installd/commands.c new file mode 100644 index 0000000..70a1206 --- /dev/null +++ b/cmds/installd/commands.c @@ -0,0 +1,568 @@ +/* +** Copyright 2008, The Android Open Source Project +** +** Licensed under the Apache License, Version 2.0 (the "License"); +** you may not use this file except in compliance with the License. +** You may obtain a copy of the License at +** +** http://www.apache.org/licenses/LICENSE-2.0 +** +** Unless required by applicable law or agreed to in writing, software +** distributed under the License is distributed on an "AS IS" BASIS, +** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +** See the License for the specific language governing permissions and +** limitations under the License. +*/ + +#include "installd.h" + +int install(const char *pkgname, uid_t uid, gid_t gid) +{ + char pkgdir[PKG_PATH_MAX]; + char libdir[PKG_PATH_MAX]; + + if ((uid < AID_SYSTEM) || (gid < AID_SYSTEM)) { + LOGE("invalid uid/gid: %d %d\n", uid, gid); + return -1; + + } + if (create_pkg_path(pkgdir, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) + return -1; + if (create_pkg_path(libdir, PKG_LIB_PREFIX, pkgname, PKG_LIB_POSTFIX)) + return -1; + + if (mkdir(pkgdir, 0755) < 0) { + LOGE("cannot create dir '%s': %s\n", pkgdir, strerror(errno)); + return -errno; + } + if (chown(pkgdir, uid, gid) < 0) { + LOGE("cannot chown dir '%s': %s\n", pkgdir, strerror(errno)); + unlink(pkgdir); + return -errno; + } + if (mkdir(libdir, 0755) < 0) { + LOGE("cannot create dir '%s': %s\n", libdir, strerror(errno)); + unlink(pkgdir); + return -errno; + } + if (chown(libdir, AID_SYSTEM, AID_SYSTEM) < 0) { + LOGE("cannot chown dir '%s': %s\n", libdir, strerror(errno)); + unlink(libdir); + unlink(pkgdir); + return -errno; + } + return 0; +} + +int uninstall(const char *pkgname) +{ + char pkgdir[PKG_PATH_MAX]; + + if (create_pkg_path(pkgdir, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) + return -1; + + /* delete contents AND directory, no exceptions */ + return delete_dir_contents(pkgdir, 1, 0); +} + +int delete_user_data(const char *pkgname) +{ + char pkgdir[PKG_PATH_MAX]; + + if (create_pkg_path(pkgdir, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) + return -1; + + /* delete contents, excluding "lib", but not the directory itself */ + return delete_dir_contents(pkgdir, 0, "lib"); +} + +int delete_cache(const char *pkgname) +{ + char cachedir[PKG_PATH_MAX]; + + if (create_pkg_path(cachedir, CACHE_DIR_PREFIX, pkgname, CACHE_DIR_POSTFIX)) + return -1; + + /* delete contents, not the directory, no exceptions */ + return delete_dir_contents(cachedir, 0, 0); +} + + +static int disk_free(void) +{ + struct statfs sfs; + if (statfs(PKG_DIR_PREFIX, &sfs) == 0) { + return sfs.f_bavail * sfs.f_bsize; + } else { + return -1; + } +} + + +/* Try to ensure free_size bytes of storage are available. + * Returns 0 on success. + * This is rather simple-minded because doing a full LRU would + * be potentially memory-intensive, and without atime it would + * also require that apps constantly modify file metadata even + * when just reading from the cache, which is pretty awful. + */ +int free_cache(int free_size) +{ + const char *name; + int dfd, subfd; + DIR *d; + struct dirent *de; + int avail; + + avail = disk_free(); + if (avail < 0) return -1; + + LOGI("free_cache(%d) avail %d\n", free_size, avail); + if (avail >= free_size) return 0; + + d = opendir(PKG_DIR_PREFIX); + if (d == NULL) { + LOGE("cannot open %s\n", PKG_DIR_PREFIX); + return -1; + } + dfd = dirfd(d); + + while ((de = readdir(d))) { + if (de->d_type != DT_DIR) continue; + name = de->d_name; + + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd < 0) continue; + + delete_dir_contents_fd(subfd, "cache"); + close(subfd); + + avail = disk_free(); + if (avail >= free_size) { + closedir(d); + return 0; + } + } + closedir(d); + return -1; +} + + +/* used by move_dex, rm_dex, etc to ensure that the provided paths + * don't point anywhere other than at the APK_DIR_PREFIX + */ +static int is_valid_apk_path(const char *path) +{ + int len = strlen(APK_DIR_PREFIX); + if (strncmp(path, APK_DIR_PREFIX, len)) { + len = strlen(PROTECTED_DIR_PREFIX); + if (strncmp(path, PROTECTED_DIR_PREFIX, len)) { + LOGE("invalid apk path '%s' (bad prefix)\n", path); + return 0; + } + } + if (strchr(path + len, '/')) { + LOGE("invalid apk path '%s' (subdir?)\n", path); + return 0; + } + if (path[len] == '.') { + LOGE("invalid apk path '%s' (trickery)\n", path); + return 0; + } + return 1; +} + +int move_dex(const char *src, const char *dst) +{ + char src_dex[PKG_PATH_MAX]; + char dst_dex[PKG_PATH_MAX]; + + if (!is_valid_apk_path(src)) return -1; + if (!is_valid_apk_path(dst)) return -1; + + if (create_cache_path(src_dex, src)) return -1; + if (create_cache_path(dst_dex, dst)) return -1; + + LOGI("move %s -> %s\n", src_dex, dst_dex); + if (rename(src_dex, dst_dex) < 0) { + return -1; + } else { + return 0; + } +} + +int rm_dex(const char *path) +{ + char dex_path[PKG_PATH_MAX]; + + if (!is_valid_apk_path(path)) return -1; + if (create_cache_path(dex_path, path)) return -1; + + LOGI("unlink %s\n", dex_path); + if (unlink(dex_path) < 0) { + return -1; + } else { + return 0; + } +} + +int protect(char *pkgname, gid_t gid) +{ + struct stat s; + char pkgpath[PKG_PATH_MAX]; + + if (gid < AID_SYSTEM) return -1; + + if (create_pkg_path(pkgpath, PROTECTED_DIR_PREFIX, pkgname, ".apk")) + return -1; + + if (stat(pkgpath, &s) < 0) return -1; + + if (chown(pkgpath, s.st_uid, gid) < 0) { + LOGE("failed to chgrp '%s': %s\n", pkgpath, strerror(errno)); + return -1; + } + + if (chmod(pkgpath, S_IRUSR|S_IWUSR|S_IRGRP) < 0) { + LOGE("failed to chmod '%s': %s\n", pkgpath, strerror(errno)); + return -1; + } + + return 0; +} + +static int stat_size(struct stat *s) +{ + int blksize = s->st_blksize; + int size = s->st_size; + + if (blksize) { + /* round up to filesystem block size */ + size = (size + blksize - 1) & (~(blksize - 1)); + } + + return size; +} + +static int calculate_dir_size(int dfd) +{ + int size = 0; + struct stat s; + DIR *d; + struct dirent *de; + + d = fdopendir(dfd); + if (d == NULL) { + close(dfd); + return 0; + } + + while ((de = readdir(d))) { + const char *name = de->d_name; + if (de->d_type == DT_DIR) { + int subfd; + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd >= 0) { + size += calculate_dir_size(subfd); + } + } else { + if (fstatat(dfd, name, &s, AT_SYMLINK_NOFOLLOW) == 0) { + size += stat_size(&s); + } + } + } + closedir(d); + return size; +} + +int get_size(const char *pkgname, const char *apkpath, + const char *fwdlock_apkpath, + int *_codesize, int *_datasize, int *_cachesize) +{ + DIR *d; + int dfd; + struct dirent *de; + struct stat s; + char path[PKG_PATH_MAX]; + + int codesize = 0; + int datasize = 0; + int cachesize = 0; + + /* count the source apk as code -- but only if it's not + * on the /system partition + */ + if (strncmp(apkpath, "/system", 7) != 0) { + if (stat(apkpath, &s) == 0) { + codesize += stat_size(&s); + } + } + /* count the forward locked apk as code if it is given + */ + if (fwdlock_apkpath != NULL && fwdlock_apkpath[0] != '!') { + if (stat(fwdlock_apkpath, &s) == 0) { + codesize += stat_size(&s); + } + } + + + /* count the cached dexfile as code */ + if (!create_cache_path(path, apkpath)) { + if (stat(path, &s) == 0) { + codesize += stat_size(&s); + } + } + + if (create_pkg_path(path, PKG_DIR_PREFIX, pkgname, PKG_DIR_POSTFIX)) { + goto done; + } + + d = opendir(path); + if (d == NULL) { + goto done; + } + dfd = dirfd(d); + + /* most stuff in the pkgdir is data, except for the "cache" + * directory and below, which is cache, and the "lib" directory + * and below, which is code... + */ + while ((de = readdir(d))) { + const char *name = de->d_name; + + if (de->d_type == DT_DIR) { + int subfd; + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd >= 0) { + int size = calculate_dir_size(subfd); + if (!strcmp(name,"lib")) { + codesize += size; + } else if(!strcmp(name,"cache")) { + cachesize += size; + } else { + datasize += size; + } + } + } else { + if (fstatat(dfd, name, &s, AT_SYMLINK_NOFOLLOW) == 0) { + datasize += stat_size(&s); + } + } + } + closedir(d); +done: + *_codesize = codesize; + *_datasize = datasize; + *_cachesize = cachesize; + return 0; +} + + +/* a simpler version of dexOptGenerateCacheFileName() */ +int create_cache_path(char path[PKG_PATH_MAX], const char *src) +{ + char *tmp; + int srclen; + int dstlen; + + srclen = strlen(src); + + /* demand that we are an absolute path */ + if ((src == 0) || (src[0] != '/') || strstr(src,"..")) { + return -1; + } + + if (srclen > PKG_PATH_MAX) { // XXX: PKG_NAME_MAX? + return -1; + } + + dstlen = srclen + strlen(DALVIK_CACHE_PREFIX) + + strlen(DALVIK_CACHE_POSTFIX) + 1; + + if (dstlen > PKG_PATH_MAX) { + return -1; + } + + sprintf(path,"%s%s%s", + DALVIK_CACHE_PREFIX, + src + 1, /* skip the leading / */ + DALVIK_CACHE_POSTFIX); + + for(tmp = path + strlen(DALVIK_CACHE_PREFIX); *tmp; tmp++) { + if (*tmp == '/') { + *tmp = '@'; + } + } + + return 0; +} + +static void run_dexopt(int zip_fd, int odex_fd, const char* input_file_name, + const char* dexopt_flags) +{ + static const char* DEX_OPT_BIN = "/system/bin/dexopt"; + static const int MAX_INT_LEN = 12; // '-'+10dig+'\0' -OR- 0x+8dig + char zip_num[MAX_INT_LEN]; + char odex_num[MAX_INT_LEN]; + + sprintf(zip_num, "%d", zip_fd); + sprintf(odex_num, "%d", odex_fd); + + execl(DEX_OPT_BIN, DEX_OPT_BIN, "--zip", zip_num, odex_num, input_file_name, + dexopt_flags, (char*) NULL); + LOGE("execl(%s) failed: %s\n", DEX_OPT_BIN, strerror(errno)); +} + +static int wait_dexopt(pid_t pid, const char* apk_path) +{ + int status; + pid_t got_pid; + + /* + * Wait for the optimization process to finish. + */ + while (1) { + got_pid = waitpid(pid, &status, 0); + if (got_pid == -1 && errno == EINTR) { + printf("waitpid interrupted, retrying\n"); + } else { + break; + } + } + if (got_pid != pid) { + LOGW("waitpid failed: wanted %d, got %d: %s\n", + (int) pid, (int) got_pid, strerror(errno)); + return 1; + } + + if (WIFEXITED(status) && WEXITSTATUS(status) == 0) { + LOGD("DexInv: --- END '%s' (success) ---\n", apk_path); + return 0; + } else { + LOGW("DexInv: --- END '%s' --- status=0x%04x, process failed\n", + apk_path, status); + return status; /* always nonzero */ + } +} + +int dexopt(const char *apk_path, uid_t uid, int is_public) +{ + struct utimbuf ut; + struct stat apk_stat, dex_stat; + char dex_path[PKG_PATH_MAX]; + char dexopt_flags[PROPERTY_VALUE_MAX]; + char *end; + int res, zip_fd=-1, odex_fd=-1; + + /* Before anything else: is there a .odex file? If so, we have + * pre-optimized the apk and there is nothing to do here. + */ + if (strlen(apk_path) >= (PKG_PATH_MAX - 8)) { + return -1; + } + + /* platform-specific flags affecting optimization and verification */ + property_get("dalvik.vm.dexopt-flags", dexopt_flags, ""); + + strcpy(dex_path, apk_path); + end = strrchr(dex_path, '.'); + if (end != NULL) { + strcpy(end, ".odex"); + if (stat(dex_path, &dex_stat) == 0) { + return 0; + } + } + + if (create_cache_path(dex_path, apk_path)) { + return -1; + } + + memset(&apk_stat, 0, sizeof(apk_stat)); + stat(apk_path, &apk_stat); + + zip_fd = open(apk_path, O_RDONLY, 0); + if (zip_fd < 0) { + LOGE("dexopt cannot open '%s' for input\n", apk_path); + return -1; + } + + unlink(dex_path); + odex_fd = open(dex_path, O_RDWR | O_CREAT | O_EXCL, 0644); + if (odex_fd < 0) { + LOGE("dexopt cannot open '%s' for output\n", dex_path); + goto fail; + } + if (fchown(odex_fd, AID_SYSTEM, uid) < 0) { + LOGE("dexopt cannot chown '%s'\n", dex_path); + goto fail; + } + if (fchmod(odex_fd, + S_IRUSR|S_IWUSR|S_IRGRP | + (is_public ? S_IROTH : 0)) < 0) { + LOGE("dexopt cannot chmod '%s'\n", dex_path); + goto fail; + } + + LOGD("DexInv: --- BEGIN '%s' ---\n", apk_path); + + pid_t pid; + pid = fork(); + if (pid == 0) { + /* child -- drop privileges before continuing */ + if (setgid(uid) != 0) { + LOGE("setgid(%d) failed during dexopt\n", uid); + exit(64); + } + if (setuid(uid) != 0) { + LOGE("setuid(%d) during dexopt\n", uid); + exit(65); + } + if (flock(odex_fd, LOCK_EX | LOCK_NB) != 0) { + LOGE("flock(%s) failed: %s\n", dex_path, strerror(errno)); + exit(66); + } + + run_dexopt(zip_fd, odex_fd, apk_path, dexopt_flags); + exit(67); /* only get here on exec failure */ + } else { + res = wait_dexopt(pid, apk_path); + if (res != 0) { + LOGE("dexopt failed on '%s' res = %d\n", dex_path, res); + goto fail; + } + } + + ut.actime = apk_stat.st_atime; + ut.modtime = apk_stat.st_mtime; + utime(dex_path, &ut); + + close(odex_fd); + close(zip_fd); + return 0; + +fail: + if (odex_fd >= 0) { + close(odex_fd); + unlink(dex_path); + } + if (zip_fd >= 0) { + close(zip_fd); + } + return -1; +} diff --git a/cmds/installd/installd.c b/cmds/installd/installd.c new file mode 100644 index 0000000..7c7441f --- /dev/null +++ b/cmds/installd/installd.c @@ -0,0 +1,259 @@ +/* +** Copyright 2008, The Android Open Source Project +** +** Licensed under the Apache License, Version 2.0 (the "License"); +** you may not use this file except in compliance with the License. +** You may obtain a copy of the License at +** +** http://www.apache.org/licenses/LICENSE-2.0 +** +** Unless required by applicable law or agreed to in writing, software +** distributed under the License is distributed on an "AS IS" BASIS, +** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +** See the License for the specific language governing permissions and +** limitations under the License. +*/ + +#include "installd.h" + + +#define BUFFER_MAX 1024 /* input buffer for commands */ +#define TOKEN_MAX 8 /* max number of arguments in buffer */ +#define REPLY_MAX 256 /* largest reply allowed */ + + +static int do_ping(char **arg, char reply[REPLY_MAX]) +{ + return 0; +} + +static int do_install(char **arg, char reply[REPLY_MAX]) +{ + return install(arg[0], atoi(arg[1]), atoi(arg[2])); /* pkgname, uid, gid */ +} + +static int do_dexopt(char **arg, char reply[REPLY_MAX]) +{ + /* apk_path, uid, is_public */ + return dexopt(arg[0], atoi(arg[1]), atoi(arg[2])); +} + +static int do_move_dex(char **arg, char reply[REPLY_MAX]) +{ + return move_dex(arg[0], arg[1]); /* src, dst */ +} + +static int do_rm_dex(char **arg, char reply[REPLY_MAX]) +{ + return rm_dex(arg[0]); /* pkgname */ +} + +static int do_remove(char **arg, char reply[REPLY_MAX]) +{ + return uninstall(arg[0]); /* pkgname */ +} + +static int do_free_cache(char **arg, char reply[REPLY_MAX]) /* TODO int:free_size */ +{ + return free_cache(atoi(arg[0])); /* free_size */ +} + +static int do_rm_cache(char **arg, char reply[REPLY_MAX]) +{ + return delete_cache(arg[0]); /* pkgname */ +} + +static int do_protect(char **arg, char reply[REPLY_MAX]) +{ + return protect(arg[0], atoi(arg[1])); /* pkgname, gid */ +} + +static int do_get_size(char **arg, char reply[REPLY_MAX]) +{ + int codesize = 0; + int datasize = 0; + int cachesize = 0; + int res = 0; + + /* pkgdir, apkpath */ + res = get_size(arg[0], arg[1], arg[2], &codesize, &datasize, &cachesize); + + sprintf(reply,"%d %d %d", codesize, datasize, cachesize); + return res; +} + +static int do_rm_user_data(char **arg, char reply[REPLY_MAX]) +{ + return delete_user_data(arg[0]); /* pkgname */ +} + +struct cmdinfo { + const char *name; + unsigned numargs; + int (*func)(char **arg, char reply[REPLY_MAX]); +}; + +struct cmdinfo cmds[] = { + { "ping", 0, do_ping }, + { "install", 3, do_install }, + { "dexopt", 3, do_dexopt }, + { "movedex", 2, do_move_dex }, + { "rmdex", 1, do_rm_dex }, + { "remove", 1, do_remove }, + { "freecache", 1, do_free_cache }, + { "rmcache", 1, do_rm_cache }, + { "protect", 2, do_protect }, + { "getsize", 3, do_get_size }, + { "rmuserdata", 1, do_rm_user_data }, +}; + +static int readx(int s, void *_buf, int count) +{ + char *buf = _buf; + int n = 0, r; + if (count < 0) return -1; + while (n < count) { + r = read(s, buf + n, count - n); + if (r < 0) { + if (errno == EINTR) continue; + LOGE("read error: %s\n", strerror(errno)); + return -1; + } + if (r == 0) { + LOGE("eof\n"); + return -1; /* EOF */ + } + n += r; + } + return 0; +} + +static int writex(int s, const void *_buf, int count) +{ + const char *buf = _buf; + int n = 0, r; + if (count < 0) return -1; + while (n < count) { + r = write(s, buf + n, count - n); + if (r < 0) { + if (errno == EINTR) continue; + LOGE("write error: %s\n", strerror(errno)); + return -1; + } + n += r; + } + return 0; +} + + +/* Tokenize the command buffer, locate a matching command, + * ensure that the required number of arguments are provided, + * call the function(), return the result. + */ +static int execute(int s, char cmd[BUFFER_MAX]) +{ + char reply[REPLY_MAX]; + char *arg[TOKEN_MAX+1]; + unsigned i; + unsigned n = 0; + unsigned short count; + int ret = -1; + +// LOGI("execute('%s')\n", cmd); + + /* default reply is "" */ + reply[0] = 0; + + /* n is number of args (not counting arg[0]) */ + arg[0] = cmd; + while (*cmd) { + if (isspace(*cmd)) { + *cmd++ = 0; + n++; + arg[n] = cmd; + if (n == TOKEN_MAX) { + LOGE("too many arguments\n"); + goto done; + } + } + cmd++; + } + + for (i = 0; i < sizeof(cmds) / sizeof(cmds[0]); i++) { + if (!strcmp(cmds[i].name,arg[0])) { + if (n != cmds[i].numargs) { + LOGE("%s requires %d arguments (%d given)\n", + cmds[i].name, cmds[i].numargs, n); + } else { + ret = cmds[i].func(arg + 1, reply); + } + goto done; + } + } + LOGE("unsupported command '%s'\n", arg[0]); + +done: + if (reply[0]) { + n = snprintf(cmd, BUFFER_MAX, "%d %s", ret, reply); + } else { + n = snprintf(cmd, BUFFER_MAX, "%d", ret); + } + if (n > BUFFER_MAX) n = BUFFER_MAX; + count = n; + +// LOGI("reply: '%s'\n", cmd); + if (writex(s, &count, sizeof(count))) return -1; + if (writex(s, cmd, count)) return -1; + return 0; +} + +int main(const int argc, const char *argv[]) { + char buf[BUFFER_MAX]; + struct sockaddr addr; + socklen_t alen; + int lsocket, s, count; + + lsocket = android_get_control_socket(SOCKET_PATH); + if (lsocket < 0) { + LOGE("Failed to get socket from environment: %s\n", strerror(errno)); + exit(1); + } + if (listen(lsocket, 5)) { + LOGE("Listen on socket failed: %s\n", strerror(errno)); + exit(1); + } + fcntl(lsocket, F_SETFD, FD_CLOEXEC); + + for (;;) { + alen = sizeof(addr); + s = accept(lsocket, &addr, &alen); + if (s < 0) { + LOGE("Accept failed: %s\n", strerror(errno)); + continue; + } + fcntl(s, F_SETFD, FD_CLOEXEC); + + LOGI("new connection\n"); + for (;;) { + unsigned short count; + if (readx(s, &count, sizeof(count))) { + LOGE("failed to read size\n"); + break; + } + if ((count < 1) || (count >= BUFFER_MAX)) { + LOGE("invalid size %d\n", count); + break; + } + if (readx(s, buf, count)) { + LOGE("failed to read command\n"); + break; + } + buf[count] = 0; + if (execute(s, buf)) break; + } + LOGI("closing connection\n"); + close(s); + } + + return 0; +} diff --git a/cmds/installd/installd.h b/cmds/installd/installd.h new file mode 100644 index 0000000..db3badd --- /dev/null +++ b/cmds/installd/installd.h @@ -0,0 +1,100 @@ +/* +** +** Copyright 2008, The Android Open Source Project +** +** Licensed under the Apache License, Version 2.0 (the "License"); +** you may not use this file except in compliance with the License. +** You may obtain a copy of the License at +** +** http://www.apache.org/licenses/LICENSE-2.0 +** +** Unless required by applicable law or agreed to in writing, software +** distributed under the License is distributed on an "AS IS" BASIS, +** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +** See the License for the specific language governing permissions and +** limitations under the License. +*/ + +#define LOG_TAG "installd" + +#include <stdio.h> +#include <stdlib.h> +#include <sys/stat.h> +#include <dirent.h> +#include <unistd.h> +#include <ctype.h> +#include <fcntl.h> +#include <errno.h> +#include <utime.h> +#include <sys/socket.h> +#include <sys/types.h> +#include <sys/wait.h> + +#include <cutils/sockets.h> +#include <cutils/log.h> +#include <cutils/properties.h> + +#include <private/android_filesystem_config.h> + +#if INCLUDE_SYS_MOUNT_FOR_STATFS +#include <sys/mount.h> +#else +#include <sys/statfs.h> +#endif + +#define SOCKET_PATH "installd" + + +/* elements combined with a valid package name to form paths */ + +#define PKG_DIR_PREFIX "/data/data/" +#define PKG_DIR_POSTFIX "" + +#define PKG_LIB_PREFIX "/data/data/" +#define PKG_LIB_POSTFIX "/lib" + +#define CACHE_DIR_PREFIX "/data/data/" +#define CACHE_DIR_POSTFIX "/cache" + +#define APK_DIR_PREFIX "/data/app/" + +/* other handy constants */ + +#define PROTECTED_DIR_PREFIX "/data/app-private/" + +#define DALVIK_CACHE_PREFIX "/data/dalvik-cache/" +#define DALVIK_CACHE_POSTFIX "/classes.dex" + + +#define PKG_NAME_MAX 128 /* largest allowed package name */ +#define PKG_PATH_MAX 256 /* max size of any path we use */ + + +/* util.c */ + +int create_pkg_path(char path[PKG_PATH_MAX], + const char *prefix, + const char *pkgname, + const char *postfix); + +int create_cache_path(char path[PKG_PATH_MAX], const char *src); + +int delete_dir_contents(const char *pathname, + int also_delete_dir, + const char *ignore); + +int delete_dir_contents_fd(int dfd, const char *name); + +/* commands.c */ + +int install(const char *pkgname, uid_t uid, gid_t gid); +int uninstall(const char *pkgname); +int delete_user_data(const char *pkgname); +int delete_cache(const char *pkgname); +int move_dex(const char *src, const char *dst); +int rm_dex(const char *path); +int protect(char *pkgname, gid_t gid); +int get_size(const char *pkgname, const char *apkpath, const char *fwdlock_apkpath, + int *codesize, int *datasize, int *cachesize); +int free_cache(int free_size); +int dexopt(const char *apk_path, uid_t uid, int is_public); diff --git a/cmds/installd/utils.c b/cmds/installd/utils.c new file mode 100644 index 0000000..5db5545 --- /dev/null +++ b/cmds/installd/utils.c @@ -0,0 +1,149 @@ +/* +** Copyright 2008, The Android Open Source Project +** +** Licensed under the Apache License, Version 2.0 (the "License"); +** you may not use this file except in compliance with the License. +** You may obtain a copy of the License at +** +** http://www.apache.org/licenses/LICENSE-2.0 +** +** Unless required by applicable law or agreed to in writing, software +** distributed under the License is distributed on an "AS IS" BASIS, +** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +** See the License for the specific language governing permissions and +** limitations under the License. +*/ + +#include "installd.h" + +int create_pkg_path(char path[PKG_PATH_MAX], + const char *prefix, + const char *pkgname, + const char *postfix) +{ + int len; + const char *x; + + len = strlen(pkgname); + if (len > PKG_NAME_MAX) { + return -1; + } + if ((len + strlen(prefix) + strlen(postfix)) >= PKG_PATH_MAX) { + return -1; + } + + x = pkgname; + while (*x) { + if (isalnum(*x) || (*x == '_')) { + /* alphanumeric or underscore are fine */ + } else if (*x == '.') { + if ((x == pkgname) || (x[1] == '.') || (x[1] == 0)) { + /* periods must not be first, last, or doubled */ + LOGE("invalid package name '%s'\n", pkgname); + return -1; + } + } else { + /* anything not A-Z, a-z, 0-9, _, or . is invalid */ + LOGE("invalid package name '%s'\n", pkgname); + return -1; + } + x++; + } + + sprintf(path, "%s%s%s", prefix, pkgname, postfix); + return 0; +} + +static int _delete_dir_contents(DIR *d, const char *ignore) +{ + int result = 0; + struct dirent *de; + int dfd; + + dfd = dirfd(d); + + if (dfd < 0) return -1; + + while ((de = readdir(d))) { + const char *name = de->d_name; + + /* skip the ignore name if provided */ + if (ignore && !strcmp(name, ignore)) continue; + + if (de->d_type == DT_DIR) { + int r, subfd; + DIR *subdir; + + /* always skip "." and ".." */ + if (name[0] == '.') { + if (name[1] == 0) continue; + if ((name[1] == '.') && (name[2] == 0)) continue; + } + + subfd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (subfd < 0) { + result = -1; + continue; + } + subdir = fdopendir(subfd); + if (subdir == NULL) { + close(subfd); + result = -1; + continue; + } + if (_delete_dir_contents(subdir, 0)) { + result = -1; + } + closedir(subdir); + if (unlinkat(dfd, name, AT_REMOVEDIR) < 0) { + result = -1; + } + } else { + if (unlinkat(dfd, name, 0) < 0) { + result = -1; + } + } + } + + return result; +} + +int delete_dir_contents(const char *pathname, + int also_delete_dir, + const char *ignore) +{ + int res = 0; + DIR *d; + + d = opendir(pathname); + if (d == NULL) { + return -errno; + } + res = _delete_dir_contents(d, ignore); + closedir(d); + if (also_delete_dir) { + if (rmdir(pathname)) { + res = -1; + } + } + return res; +} + +int delete_dir_contents_fd(int dfd, const char *name) +{ + int fd, res; + DIR *d; + + fd = openat(dfd, name, O_RDONLY | O_DIRECTORY); + if (fd < 0) { + return -1; + } + d = fdopendir(fd); + if (d == NULL) { + close(fd); + return -1; + } + res = _delete_dir_contents(d, 0); + closedir(d); + return res; +} |