Add required Android includes
Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
This commit is contained in:
parent
f5c21f2b2c
commit
62768dbac9
117
include/private/android_filesystem_capability.h
Normal file
117
include/private/android_filesystem_capability.h
Normal file
@ -0,0 +1,117 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2013 The Android Open Source Project
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Taken from linux/capability.h, with minor modifications
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef _SYSTEM_CORE_INCLUDE_PRIVATE_ANDROID_FILESYSTEM_CAPABILITY_H
|
||||||
|
#define _SYSTEM_CORE_INCLUDE_PRIVATE_ANDROID_FILESYSTEM_CAPABILITY_H
|
||||||
|
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
#define __user
|
||||||
|
#define __u32 uint32_t
|
||||||
|
#define __le32 uint32_t
|
||||||
|
|
||||||
|
#define _LINUX_CAPABILITY_VERSION_1 0x19980330
|
||||||
|
#define _LINUX_CAPABILITY_U32S_1 1
|
||||||
|
#define _LINUX_CAPABILITY_VERSION_2 0x20071026
|
||||||
|
#define _LINUX_CAPABILITY_U32S_2 2
|
||||||
|
#define _LINUX_CAPABILITY_VERSION_3 0x20080522
|
||||||
|
#define _LINUX_CAPABILITY_U32S_3 2
|
||||||
|
|
||||||
|
typedef struct __user_cap_header_struct {
|
||||||
|
__u32 version;
|
||||||
|
int pid;
|
||||||
|
} __user *cap_user_header_t;
|
||||||
|
|
||||||
|
typedef struct __user_cap_data_struct {
|
||||||
|
__u32 effective;
|
||||||
|
__u32 permitted;
|
||||||
|
__u32 inheritable;
|
||||||
|
} __user *cap_user_data_t;
|
||||||
|
|
||||||
|
#define VFS_CAP_REVISION_MASK 0xFF000000
|
||||||
|
#define VFS_CAP_REVISION_SHIFT 24
|
||||||
|
#define VFS_CAP_FLAGS_MASK ~VFS_CAP_REVISION_MASK
|
||||||
|
#define VFS_CAP_FLAGS_EFFECTIVE 0x000001
|
||||||
|
#define VFS_CAP_REVISION_1 0x01000000
|
||||||
|
#define VFS_CAP_U32_1 1
|
||||||
|
#define XATTR_CAPS_SZ_1 (sizeof(__le32)*(1 + 2*VFS_CAP_U32_1))
|
||||||
|
#define VFS_CAP_REVISION_2 0x02000000
|
||||||
|
#define VFS_CAP_U32_2 2
|
||||||
|
#define XATTR_CAPS_SZ_2 (sizeof(__le32)*(1 + 2*VFS_CAP_U32_2))
|
||||||
|
#define XATTR_CAPS_SZ XATTR_CAPS_SZ_2
|
||||||
|
#define VFS_CAP_U32 VFS_CAP_U32_2
|
||||||
|
#define VFS_CAP_REVISION VFS_CAP_REVISION_2
|
||||||
|
|
||||||
|
struct vfs_cap_data {
|
||||||
|
__le32 magic_etc;
|
||||||
|
struct {
|
||||||
|
__le32 permitted;
|
||||||
|
__le32 inheritable;
|
||||||
|
} data[VFS_CAP_U32];
|
||||||
|
};
|
||||||
|
|
||||||
|
#define _LINUX_CAPABILITY_VERSION _LINUX_CAPABILITY_VERSION_1
|
||||||
|
#define _LINUX_CAPABILITY_U32S _LINUX_CAPABILITY_U32S_1
|
||||||
|
#define CAP_CHOWN 0
|
||||||
|
#define CAP_DAC_OVERRIDE 1
|
||||||
|
#define CAP_DAC_READ_SEARCH 2
|
||||||
|
#define CAP_FOWNER 3
|
||||||
|
#define CAP_FSETID 4
|
||||||
|
#define CAP_KILL 5
|
||||||
|
#define CAP_SETGID 6
|
||||||
|
#define CAP_SETUID 7
|
||||||
|
#define CAP_SETPCAP 8
|
||||||
|
#define CAP_LINUX_IMMUTABLE 9
|
||||||
|
#define CAP_NET_BIND_SERVICE 10
|
||||||
|
#define CAP_NET_BROADCAST 11
|
||||||
|
#define CAP_NET_ADMIN 12
|
||||||
|
#define CAP_NET_RAW 13
|
||||||
|
#define CAP_IPC_LOCK 14
|
||||||
|
#define CAP_IPC_OWNER 15
|
||||||
|
#define CAP_SYS_MODULE 16
|
||||||
|
#define CAP_SYS_RAWIO 17
|
||||||
|
#define CAP_SYS_CHROOT 18
|
||||||
|
#define CAP_SYS_PTRACE 19
|
||||||
|
#define CAP_SYS_PACCT 20
|
||||||
|
#define CAP_SYS_ADMIN 21
|
||||||
|
#define CAP_SYS_BOOT 22
|
||||||
|
#define CAP_SYS_NICE 23
|
||||||
|
#define CAP_SYS_RESOURCE 24
|
||||||
|
#define CAP_SYS_TIME 25
|
||||||
|
#define CAP_SYS_TTY_CONFIG 26
|
||||||
|
#define CAP_MKNOD 27
|
||||||
|
#define CAP_LEASE 28
|
||||||
|
#define CAP_AUDIT_WRITE 29
|
||||||
|
#define CAP_AUDIT_CONTROL 30
|
||||||
|
#define CAP_SETFCAP 31
|
||||||
|
#define CAP_MAC_OVERRIDE 32
|
||||||
|
#define CAP_MAC_ADMIN 33
|
||||||
|
#define CAP_SYSLOG 34
|
||||||
|
#define CAP_WAKE_ALARM 35
|
||||||
|
#define CAP_LAST_CAP CAP_WAKE_ALARM
|
||||||
|
#define cap_valid(x) ((x) >= 0 && (x) <= CAP_LAST_CAP)
|
||||||
|
#define CAP_TO_INDEX(x) ((x) >> 5)
|
||||||
|
#define CAP_TO_MASK(x) (1 << ((x) & 31))
|
||||||
|
|
||||||
|
#undef __user
|
||||||
|
#undef __u32
|
||||||
|
#undef __le32
|
||||||
|
|
||||||
|
#endif
|
306
include/private/android_filesystem_config.h
Normal file
306
include/private/android_filesystem_config.h
Normal file
@ -0,0 +1,306 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2007 The Android Open Source Project
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/* This file is used to define the properties of the filesystem
|
||||||
|
** images generated by build tools (mkbootfs and mkyaffs2image) and
|
||||||
|
** by the device side of adb.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#ifndef _ANDROID_FILESYSTEM_CONFIG_H_
|
||||||
|
#define _ANDROID_FILESYSTEM_CONFIG_H_
|
||||||
|
|
||||||
|
#include <string.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
|
#include <sys/types.h>
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
#ifdef HAVE_ANDROID_OS
|
||||||
|
#include <linux/capability.h>
|
||||||
|
#else
|
||||||
|
#include "android_filesystem_capability.h"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* This is the master Users and Groups config for the platform.
|
||||||
|
* DO NOT EVER RENUMBER
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define AID_ROOT 0 /* traditional unix root user */
|
||||||
|
|
||||||
|
#define AID_SYSTEM 1000 /* system server */
|
||||||
|
|
||||||
|
#define AID_RADIO 1001 /* telephony subsystem, RIL */
|
||||||
|
#define AID_BLUETOOTH 1002 /* bluetooth subsystem */
|
||||||
|
#define AID_GRAPHICS 1003 /* graphics devices */
|
||||||
|
#define AID_INPUT 1004 /* input devices */
|
||||||
|
#define AID_AUDIO 1005 /* audio devices */
|
||||||
|
#define AID_CAMERA 1006 /* camera devices */
|
||||||
|
#define AID_LOG 1007 /* log devices */
|
||||||
|
#define AID_COMPASS 1008 /* compass device */
|
||||||
|
#define AID_MOUNT 1009 /* mountd socket */
|
||||||
|
#define AID_WIFI 1010 /* wifi subsystem */
|
||||||
|
#define AID_ADB 1011 /* android debug bridge (adbd) */
|
||||||
|
#define AID_INSTALL 1012 /* group for installing packages */
|
||||||
|
#define AID_MEDIA 1013 /* mediaserver process */
|
||||||
|
#define AID_DHCP 1014 /* dhcp client */
|
||||||
|
#define AID_SDCARD_RW 1015 /* external storage write access */
|
||||||
|
#define AID_VPN 1016 /* vpn system */
|
||||||
|
#define AID_KEYSTORE 1017 /* keystore subsystem */
|
||||||
|
#define AID_USB 1018 /* USB devices */
|
||||||
|
#define AID_DRM 1019 /* DRM server */
|
||||||
|
#define AID_MDNSR 1020 /* MulticastDNSResponder (service discovery) */
|
||||||
|
#define AID_GPS 1021 /* GPS daemon */
|
||||||
|
#define AID_UNUSED1 1022 /* deprecated, DO NOT USE */
|
||||||
|
#define AID_MEDIA_RW 1023 /* internal media storage write access */
|
||||||
|
#define AID_MTP 1024 /* MTP USB driver access */
|
||||||
|
#define AID_UNUSED2 1025 /* deprecated, DO NOT USE */
|
||||||
|
#define AID_DRMRPC 1026 /* group for drm rpc */
|
||||||
|
#define AID_NFC 1027 /* nfc subsystem */
|
||||||
|
#define AID_SDCARD_R 1028 /* external storage read access */
|
||||||
|
#define AID_CLAT 1029 /* clat part of nat464 */
|
||||||
|
#define AID_LOOP_RADIO 1030 /* loop radio devices */
|
||||||
|
#define AID_MEDIA_DRM 1031 /* MediaDrm plugins */
|
||||||
|
#define AID_PACKAGE_INFO 1032 /* access to installed package details */
|
||||||
|
#define AID_SDCARD_PICS 1033 /* external storage photos access */
|
||||||
|
#define AID_SDCARD_AV 1034 /* external storage audio/video access */
|
||||||
|
#define AID_SDCARD_ALL 1035 /* access all users external storage */
|
||||||
|
#define AID_LOGD 1036 /* log daemon */
|
||||||
|
#define AID_SHARED_RELRO 1037 /* creator of shared GNU RELRO files */
|
||||||
|
|
||||||
|
#define AID_SHELL 2000 /* adb and debug shell user */
|
||||||
|
#define AID_CACHE 2001 /* cache access */
|
||||||
|
#define AID_DIAG 2002 /* access to diagnostic resources */
|
||||||
|
|
||||||
|
/* The range 2900-2999 is reserved for OEM, and must never be
|
||||||
|
* used here */
|
||||||
|
#define AID_OEM_RESERVED_START 2900
|
||||||
|
#define AID_OEM_RESERVED_END 2999
|
||||||
|
|
||||||
|
/* The 3000 series are intended for use as supplemental group id's only.
|
||||||
|
* They indicate special Android capabilities that the kernel is aware of. */
|
||||||
|
#define AID_NET_BT_ADMIN 3001 /* bluetooth: create any socket */
|
||||||
|
#define AID_NET_BT 3002 /* bluetooth: create sco, rfcomm or l2cap sockets */
|
||||||
|
#define AID_INET 3003 /* can create AF_INET and AF_INET6 sockets */
|
||||||
|
#define AID_NET_RAW 3004 /* can create raw INET sockets */
|
||||||
|
#define AID_NET_ADMIN 3005 /* can configure interfaces and routing tables. */
|
||||||
|
#define AID_NET_BW_STATS 3006 /* read bandwidth statistics */
|
||||||
|
#define AID_NET_BW_ACCT 3007 /* change bandwidth statistics accounting */
|
||||||
|
#define AID_NET_BT_STACK 3008 /* bluetooth: access config files */
|
||||||
|
|
||||||
|
#define AID_EVERYBODY 9997 /* shared between all apps in the same profile */
|
||||||
|
#define AID_MISC 9998 /* access to misc storage */
|
||||||
|
#define AID_NOBODY 9999
|
||||||
|
|
||||||
|
#define AID_APP 10000 /* first app user */
|
||||||
|
|
||||||
|
#define AID_ISOLATED_START 99000 /* start of uids for fully isolated sandboxed processes */
|
||||||
|
#define AID_ISOLATED_END 99999 /* end of uids for fully isolated sandboxed processes */
|
||||||
|
|
||||||
|
#define AID_USER 100000 /* offset for uid ranges for each user */
|
||||||
|
|
||||||
|
#define AID_SHARED_GID_START 50000 /* start of gids for apps in each user to share */
|
||||||
|
#define AID_SHARED_GID_END 59999 /* start of gids for apps in each user to share */
|
||||||
|
|
||||||
|
#if !defined(EXCLUDE_FS_CONFIG_STRUCTURES)
|
||||||
|
struct android_id_info {
|
||||||
|
const char *name;
|
||||||
|
unsigned aid;
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct android_id_info android_ids[] = {
|
||||||
|
{ "root", AID_ROOT, },
|
||||||
|
|
||||||
|
{ "system", AID_SYSTEM, },
|
||||||
|
|
||||||
|
{ "radio", AID_RADIO, },
|
||||||
|
{ "bluetooth", AID_BLUETOOTH, },
|
||||||
|
{ "graphics", AID_GRAPHICS, },
|
||||||
|
{ "input", AID_INPUT, },
|
||||||
|
{ "audio", AID_AUDIO, },
|
||||||
|
{ "camera", AID_CAMERA, },
|
||||||
|
{ "log", AID_LOG, },
|
||||||
|
{ "compass", AID_COMPASS, },
|
||||||
|
{ "mount", AID_MOUNT, },
|
||||||
|
{ "wifi", AID_WIFI, },
|
||||||
|
{ "adb", AID_ADB, },
|
||||||
|
{ "install", AID_INSTALL, },
|
||||||
|
{ "media", AID_MEDIA, },
|
||||||
|
{ "dhcp", AID_DHCP, },
|
||||||
|
{ "sdcard_rw", AID_SDCARD_RW, },
|
||||||
|
{ "vpn", AID_VPN, },
|
||||||
|
{ "keystore", AID_KEYSTORE, },
|
||||||
|
{ "usb", AID_USB, },
|
||||||
|
{ "drm", AID_DRM, },
|
||||||
|
{ "mdnsr", AID_MDNSR, },
|
||||||
|
{ "gps", AID_GPS, },
|
||||||
|
// AID_UNUSED1
|
||||||
|
{ "media_rw", AID_MEDIA_RW, },
|
||||||
|
{ "mtp", AID_MTP, },
|
||||||
|
// AID_UNUSED2
|
||||||
|
{ "drmrpc", AID_DRMRPC, },
|
||||||
|
{ "nfc", AID_NFC, },
|
||||||
|
{ "sdcard_r", AID_SDCARD_R, },
|
||||||
|
{ "clat", AID_CLAT, },
|
||||||
|
{ "loop_radio", AID_LOOP_RADIO, },
|
||||||
|
{ "mediadrm", AID_MEDIA_DRM, },
|
||||||
|
{ "package_info", AID_PACKAGE_INFO, },
|
||||||
|
{ "sdcard_pics", AID_SDCARD_PICS, },
|
||||||
|
{ "sdcard_av", AID_SDCARD_AV, },
|
||||||
|
{ "sdcard_all", AID_SDCARD_ALL, },
|
||||||
|
{ "logd", AID_LOGD, },
|
||||||
|
{ "shared_relro", AID_SHARED_RELRO, },
|
||||||
|
|
||||||
|
{ "shell", AID_SHELL, },
|
||||||
|
{ "cache", AID_CACHE, },
|
||||||
|
{ "diag", AID_DIAG, },
|
||||||
|
|
||||||
|
{ "net_bt_admin", AID_NET_BT_ADMIN, },
|
||||||
|
{ "net_bt", AID_NET_BT, },
|
||||||
|
{ "inet", AID_INET, },
|
||||||
|
{ "net_raw", AID_NET_RAW, },
|
||||||
|
{ "net_admin", AID_NET_ADMIN, },
|
||||||
|
{ "net_bw_stats", AID_NET_BW_STATS, },
|
||||||
|
{ "net_bw_acct", AID_NET_BW_ACCT, },
|
||||||
|
{ "net_bt_stack", AID_NET_BT_STACK, },
|
||||||
|
|
||||||
|
{ "everybody", AID_EVERYBODY, },
|
||||||
|
{ "misc", AID_MISC, },
|
||||||
|
{ "nobody", AID_NOBODY, },
|
||||||
|
};
|
||||||
|
|
||||||
|
#define android_id_count \
|
||||||
|
(sizeof(android_ids) / sizeof(android_ids[0]))
|
||||||
|
|
||||||
|
struct fs_path_config {
|
||||||
|
unsigned mode;
|
||||||
|
unsigned uid;
|
||||||
|
unsigned gid;
|
||||||
|
uint64_t capabilities;
|
||||||
|
const char *prefix;
|
||||||
|
};
|
||||||
|
|
||||||
|
/* Rules for directories.
|
||||||
|
** These rules are applied based on "first match", so they
|
||||||
|
** should start with the most specific path and work their
|
||||||
|
** way up to the root.
|
||||||
|
*/
|
||||||
|
|
||||||
|
static const struct fs_path_config android_dirs[] = {
|
||||||
|
{ 00770, AID_SYSTEM, AID_CACHE, 0, "cache" },
|
||||||
|
{ 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app" },
|
||||||
|
{ 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/app-private" },
|
||||||
|
{ 00771, AID_ROOT, AID_ROOT, 0, "data/dalvik-cache" },
|
||||||
|
{ 00771, AID_SYSTEM, AID_SYSTEM, 0, "data/data" },
|
||||||
|
{ 00771, AID_SHELL, AID_SHELL, 0, "data/local/tmp" },
|
||||||
|
{ 00771, AID_SHELL, AID_SHELL, 0, "data/local" },
|
||||||
|
{ 01771, AID_SYSTEM, AID_MISC, 0, "data/misc" },
|
||||||
|
{ 00770, AID_DHCP, AID_DHCP, 0, "data/misc/dhcp" },
|
||||||
|
{ 00771, AID_SHARED_RELRO, AID_SHARED_RELRO, 0, "data/misc/shared_relro" },
|
||||||
|
{ 00775, AID_MEDIA_RW, AID_MEDIA_RW, 0, "data/media" },
|
||||||
|
{ 00775, AID_MEDIA_RW, AID_MEDIA_RW, 0, "data/media/Music" },
|
||||||
|
{ 00771, AID_SYSTEM, AID_SYSTEM, 0, "data" },
|
||||||
|
{ 00750, AID_ROOT, AID_SHELL, 0, "sbin" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "system/bin" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "system/vendor" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "system/xbin" },
|
||||||
|
{ 00755, AID_ROOT, AID_ROOT, 0, "system/etc/ppp" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "vendor" },
|
||||||
|
{ 00777, AID_ROOT, AID_ROOT, 0, "sdcard" },
|
||||||
|
{ 00755, AID_ROOT, AID_ROOT, 0, 0 },
|
||||||
|
};
|
||||||
|
|
||||||
|
/* Rules for files.
|
||||||
|
** These rules are applied based on "first match", so they
|
||||||
|
** should start with the most specific path and work their
|
||||||
|
** way up to the root. Prefixes ending in * denotes wildcard
|
||||||
|
** and will allow partial matches.
|
||||||
|
*/
|
||||||
|
static const struct fs_path_config android_files[] = {
|
||||||
|
{ 00440, AID_ROOT, AID_SHELL, 0, "system/etc/init.goldfish.rc" },
|
||||||
|
{ 00550, AID_ROOT, AID_SHELL, 0, "system/etc/init.goldfish.sh" },
|
||||||
|
{ 00550, AID_ROOT, AID_SHELL, 0, "system/etc/init.ril" },
|
||||||
|
{ 00550, AID_DHCP, AID_SHELL, 0, "system/etc/dhcpcd/dhcpcd-run-hooks" },
|
||||||
|
{ 00555, AID_ROOT, AID_ROOT, 0, "system/etc/ppp/*" },
|
||||||
|
{ 00555, AID_ROOT, AID_ROOT, 0, "system/etc/rc.*" },
|
||||||
|
{ 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app/*" },
|
||||||
|
{ 00644, AID_MEDIA_RW, AID_MEDIA_RW, 0, "data/media/*" },
|
||||||
|
{ 00644, AID_SYSTEM, AID_SYSTEM, 0, "data/app-private/*" },
|
||||||
|
{ 00644, AID_APP, AID_APP, 0, "data/data/*" },
|
||||||
|
|
||||||
|
/* the following five files are INTENTIONALLY set-uid, but they
|
||||||
|
* are NOT included on user builds. */
|
||||||
|
{ 04750, AID_ROOT, AID_SHELL, 0, "system/xbin/su" },
|
||||||
|
{ 06755, AID_ROOT, AID_ROOT, 0, "system/xbin/librank" },
|
||||||
|
{ 06755, AID_ROOT, AID_ROOT, 0, "system/xbin/procrank" },
|
||||||
|
{ 06755, AID_ROOT, AID_ROOT, 0, "system/xbin/procmem" },
|
||||||
|
{ 04770, AID_ROOT, AID_RADIO, 0, "system/bin/pppd-ril" },
|
||||||
|
|
||||||
|
/* the following files have enhanced capabilities and ARE included in user builds. */
|
||||||
|
{ 00750, AID_ROOT, AID_SHELL, (1 << CAP_SETUID) | (1 << CAP_SETGID), "system/bin/run-as" },
|
||||||
|
|
||||||
|
{ 00750, AID_ROOT, AID_ROOT, 0, "system/bin/uncrypt" },
|
||||||
|
{ 00750, AID_ROOT, AID_ROOT, 0, "system/bin/install-recovery.sh" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "system/bin/*" },
|
||||||
|
{ 00755, AID_ROOT, AID_ROOT, 0, "system/lib/valgrind/*" },
|
||||||
|
{ 00755, AID_ROOT, AID_ROOT, 0, "system/lib64/valgrind/*" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "system/xbin/*" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "system/vendor/bin/*" },
|
||||||
|
{ 00755, AID_ROOT, AID_SHELL, 0, "vendor/bin/*" },
|
||||||
|
{ 00750, AID_ROOT, AID_SHELL, 0, "sbin/*" },
|
||||||
|
{ 00755, AID_ROOT, AID_ROOT, 0, "bin/*" },
|
||||||
|
{ 00750, AID_ROOT, AID_SHELL, 0, "init*" },
|
||||||
|
{ 00750, AID_ROOT, AID_SHELL, 0, "sbin/fs_mgr" },
|
||||||
|
{ 00640, AID_ROOT, AID_SHELL, 0, "fstab.*" },
|
||||||
|
{ 00644, AID_ROOT, AID_ROOT, 0, 0 },
|
||||||
|
};
|
||||||
|
|
||||||
|
static inline void fs_config(const char *path, int dir,
|
||||||
|
unsigned *uid, unsigned *gid, unsigned *mode, uint64_t *capabilities)
|
||||||
|
{
|
||||||
|
const struct fs_path_config *pc;
|
||||||
|
int plen;
|
||||||
|
|
||||||
|
if (path[0] == '/') {
|
||||||
|
path++;
|
||||||
|
}
|
||||||
|
|
||||||
|
pc = dir ? android_dirs : android_files;
|
||||||
|
plen = strlen(path);
|
||||||
|
for(; pc->prefix; pc++){
|
||||||
|
int len = strlen(pc->prefix);
|
||||||
|
if (dir) {
|
||||||
|
if(plen < len) continue;
|
||||||
|
if(!strncmp(pc->prefix, path, len)) break;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
/* If name ends in * then allow partial matches. */
|
||||||
|
if (pc->prefix[len -1] == '*') {
|
||||||
|
if(!strncmp(pc->prefix, path, len - 1)) break;
|
||||||
|
} else if (plen == len){
|
||||||
|
if(!strncmp(pc->prefix, path, len)) break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
*uid = pc->uid;
|
||||||
|
*gid = pc->gid;
|
||||||
|
*mode = (*mode & (~07777)) | pc->mode;
|
||||||
|
*capabilities = pc->capabilities;
|
||||||
|
|
||||||
|
#if 0
|
||||||
|
fprintf(stderr,"< '%s' '%s' %d %d %o >\n",
|
||||||
|
path, pc->prefix ? pc->prefix : "", *uid, *gid, *mode);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
#endif
|
Reference in New Issue
Block a user