devices.cpp revision 3fa467338fbf3462ed7617efd95bb1a048d1bdbf
1/*
2 * Copyright (C) 2007-2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <dirent.h>
18#include <errno.h>
19#include <fcntl.h>
20#include <fnmatch.h>
21#include <libgen.h>
22#include <linux/netlink.h>
23#include <stddef.h>
24#include <stdio.h>
25#include <stdlib.h>
26#include <string.h>
27#include <sys/sendfile.h>
28#include <sys/socket.h>
29#include <sys/time.h>
30#include <sys/types.h>
31#include <sys/un.h>
32#include <sys/wait.h>
33#include <unistd.h>
34
35#include <algorithm>
36#include <memory>
37#include <string>
38#include <thread>
39#include <vector>
40
41#include <android-base/file.h>
42#include <android-base/logging.h>
43#include <android-base/stringprintf.h>
44#include <android-base/strings.h>
45#include <android-base/unique_fd.h>
46#include <cutils/list.h>
47#include <cutils/uevent.h>
48#include <private/android_filesystem_config.h>
49#include <selinux/android.h>
50#include <selinux/avc.h>
51#include <selinux/label.h>
52#include <selinux/selinux.h>
53
54#include "devices.h"
55#include "ueventd_parser.h"
56#include "util.h"
57
58#define SYSFS_PREFIX    "/sys"
59static const char *firmware_dirs[] = { "/etc/firmware",
60                                       "/vendor/firmware",
61                                       "/firmware/image" };
62
63extern struct selabel_handle *sehandle;
64
65static android::base::unique_fd device_fd;
66
67struct perms_ {
68    char *name;
69    char *attr;
70    mode_t perm;
71    unsigned int uid;
72    unsigned int gid;
73    unsigned short prefix;
74    unsigned short wildcard;
75};
76
77struct perm_node {
78    struct perms_ dp;
79    struct listnode plist;
80};
81
82struct platform_node {
83    char *name;
84    char *path;
85    int path_len;
86    struct listnode list;
87};
88
89static list_declare(sys_perms);
90static list_declare(dev_perms);
91static list_declare(platform_names);
92
93int add_dev_perms(const char *name, const char *attr,
94                  mode_t perm, unsigned int uid, unsigned int gid,
95                  unsigned short prefix,
96                  unsigned short wildcard) {
97    struct perm_node *node = (perm_node*) calloc(1, sizeof(*node));
98    if (!node)
99        return -ENOMEM;
100
101    node->dp.name = strdup(name);
102    if (!node->dp.name) {
103        free(node);
104        return -ENOMEM;
105    }
106
107    if (attr) {
108        node->dp.attr = strdup(attr);
109        if (!node->dp.attr) {
110            free(node->dp.name);
111            free(node);
112            return -ENOMEM;
113        }
114    }
115
116    node->dp.perm = perm;
117    node->dp.uid = uid;
118    node->dp.gid = gid;
119    node->dp.prefix = prefix;
120    node->dp.wildcard = wildcard;
121
122    if (attr)
123        list_add_tail(&sys_perms, &node->plist);
124    else
125        list_add_tail(&dev_perms, &node->plist);
126
127    return 0;
128}
129
130static bool perm_path_matches(const char *path, struct perms_ *dp)
131{
132    if (dp->prefix) {
133        if (strncmp(path, dp->name, strlen(dp->name)) == 0)
134            return true;
135    } else if (dp->wildcard) {
136        if (fnmatch(dp->name, path, FNM_PATHNAME) == 0)
137            return true;
138    } else {
139        if (strcmp(path, dp->name) == 0)
140            return true;
141    }
142
143    return false;
144}
145
146static bool match_subsystem(perms_* dp, const char* pattern,
147                            const char* path, const char* subsystem) {
148    if (!pattern || !subsystem || strstr(dp->name, subsystem) == NULL) {
149        return false;
150    }
151
152    std::string subsys_path = android::base::StringPrintf(pattern, subsystem, basename(path));
153    return perm_path_matches(subsys_path.c_str(), dp);
154}
155
156static void fixup_sys_perms(const char* upath, const char* subsystem) {
157    // upaths omit the "/sys" that paths in this list
158    // contain, so we prepend it...
159    std::string path = std::string(SYSFS_PREFIX) + upath;
160
161    listnode* node;
162    list_for_each(node, &sys_perms) {
163        perms_* dp = &(node_to_item(node, perm_node, plist))->dp;
164        if (match_subsystem(dp, SYSFS_PREFIX "/class/%s/%s", path.c_str(), subsystem)) {
165            ; // matched
166        } else if (match_subsystem(dp, SYSFS_PREFIX "/bus/%s/devices/%s", path.c_str(), subsystem)) {
167            ; // matched
168        } else if (!perm_path_matches(path.c_str(), dp)) {
169            continue;
170        }
171
172        std::string attr_file = path + "/" + dp->attr;
173        LOG(INFO) << "fixup " << attr_file
174                  << " " << dp->uid << " " << dp->gid << " " << std::oct << dp->perm;
175        chown(attr_file.c_str(), dp->uid, dp->gid);
176        chmod(attr_file.c_str(), dp->perm);
177    }
178
179    if (access(path.c_str(), F_OK) == 0) {
180        LOG(VERBOSE) << "restorecon_recursive: " << path;
181        restorecon(path.c_str(), SELINUX_ANDROID_RESTORECON_RECURSE);
182    }
183}
184
185static mode_t get_device_perm(const char* path, const std::vector<std::string>& links,
186                              unsigned* uid, unsigned* gid) {
187    struct listnode *node;
188    struct perm_node *perm_node;
189    struct perms_ *dp;
190
191    /* search the perms list in reverse so that ueventd.$hardware can
192     * override ueventd.rc
193     */
194    list_for_each_reverse(node, &dev_perms) {
195        perm_node = node_to_item(node, struct perm_node, plist);
196        dp = &perm_node->dp;
197
198        if (perm_path_matches(path, dp) ||
199            std::any_of(links.begin(), links.end(),
200                        [dp](const auto& link) { return perm_path_matches(link.c_str(), dp); })) {
201            *uid = dp->uid;
202            *gid = dp->gid;
203            return dp->perm;
204        }
205    }
206    /* Default if nothing found. */
207    *uid = 0;
208    *gid = 0;
209    return 0600;
210}
211
212static void make_device(const char* path, const char* /*upath*/, int block, int major, int minor,
213                        const std::vector<std::string>& links) {
214    unsigned uid;
215    unsigned gid;
216    mode_t mode;
217    dev_t dev;
218    char *secontext = NULL;
219
220    mode = get_device_perm(path, links, &uid, &gid) | (block ? S_IFBLK : S_IFCHR);
221
222    if (sehandle) {
223        std::vector<const char*> c_links;
224        for (const auto& link : links) {
225            c_links.emplace_back(link.c_str());
226        }
227        c_links.emplace_back(nullptr);
228        if (selabel_lookup_best_match(sehandle, &secontext, path, &c_links[0], mode)) {
229            PLOG(ERROR) << "Device '" << path << "' not created; cannot find SELinux label";
230            return;
231        }
232        setfscreatecon(secontext);
233    }
234
235    dev = makedev(major, minor);
236    /* Temporarily change egid to avoid race condition setting the gid of the
237     * device node. Unforunately changing the euid would prevent creation of
238     * some device nodes, so the uid has to be set with chown() and is still
239     * racy. Fixing the gid race at least fixed the issue with system_server
240     * opening dynamic input devices under the AID_INPUT gid. */
241    if (setegid(gid)) {
242        PLOG(ERROR) << "setegid(" << gid << ") for " << path << " device failed";
243        goto out;
244    }
245    /* If the node already exists update its SELinux label to handle cases when
246     * it was created with the wrong context during coldboot procedure. */
247    if (mknod(path, mode, dev) && (errno == EEXIST) && secontext) {
248
249        char* fcon = nullptr;
250        int rc = lgetfilecon(path, &fcon);
251        if (rc < 0) {
252            PLOG(ERROR) << "Cannot get SELinux label on '" << path << "' device";
253            goto out;
254        }
255
256        bool different = strcmp(fcon, secontext) != 0;
257        freecon(fcon);
258
259        if (different && lsetfilecon(path, secontext)) {
260            PLOG(ERROR) << "Cannot set '" << secontext << "' SELinux label on '" << path << "' device";
261        }
262    }
263
264out:
265    chown(path, uid, -1);
266    if (setegid(AID_ROOT)) {
267        PLOG(FATAL) << "setegid(AID_ROOT) failed";
268    }
269
270    if (secontext) {
271        freecon(secontext);
272        setfscreatecon(NULL);
273    }
274}
275
276void add_platform_device(const char* path) {
277    int path_len = strlen(path);
278    struct platform_node *bus;
279    const char *name = path;
280
281    if (!strncmp(path, "/devices/", 9)) {
282        name += 9;
283        if (!strncmp(name, "platform/", 9))
284            name += 9;
285    }
286
287    LOG(VERBOSE) << "adding platform device " << name << " (" << path << ")";
288
289    bus = (platform_node*) calloc(1, sizeof(struct platform_node));
290    bus->path = strdup(path);
291    bus->path_len = path_len;
292    bus->name = bus->path + (name - path);
293    list_add_tail(&platform_names, &bus->list);
294}
295
296/*
297 * given a path that may start with a platform device, find the length of the
298 * platform device prefix.  If it doesn't start with a platform device, return
299 * 0.
300 */
301static struct platform_node *find_platform_device(const char *path)
302{
303    int path_len = strlen(path);
304    struct listnode *node;
305    struct platform_node *bus;
306
307    list_for_each_reverse(node, &platform_names) {
308        bus = node_to_item(node, struct platform_node, list);
309        if ((bus->path_len < path_len) &&
310                (path[bus->path_len] == '/') &&
311                !strncmp(path, bus->path, bus->path_len))
312            return bus;
313    }
314
315    return NULL;
316}
317
318void remove_platform_device(const char* path) {
319    struct listnode *node;
320    struct platform_node *bus;
321
322    list_for_each_reverse(node, &platform_names) {
323        bus = node_to_item(node, struct platform_node, list);
324        if (!strcmp(path, bus->path)) {
325            LOG(INFO) << "removing platform device " << bus->name;
326            free(bus->path);
327            list_remove(node);
328            free(bus);
329            return;
330        }
331    }
332}
333
334static void destroy_platform_devices() {
335    struct listnode* node;
336    struct listnode* n;
337    struct platform_node* bus;
338
339    list_for_each_safe(node, n, &platform_names) {
340        list_remove(node);
341        bus = node_to_item(node, struct platform_node, list);
342        free(bus->path);
343        free(bus);
344    }
345}
346
347/* Given a path that may start with a PCI device, populate the supplied buffer
348 * with the PCI domain/bus number and the peripheral ID and return 0.
349 * If it doesn't start with a PCI device, or there is some error, return -1 */
350static bool find_pci_device_prefix(const std::string& path, std::string* result) {
351    result->clear();
352
353    if (!android::base::StartsWith(path, "/devices/pci")) return false;
354
355    /* Beginning of the prefix is the initial "pci" after "/devices/" */
356    std::string::size_type start = 9;
357
358    /* End of the prefix is two path '/' later, capturing the domain/bus number
359     * and the peripheral ID. Example: pci0000:00/0000:00:1f.2 */
360    auto end = path.find('/', start);
361    if (end == std::string::npos) return false;
362
363    end = path.find('/', end + 1);
364    if (end == std::string::npos) return false;
365
366    auto length = end - start;
367    if (length <= 4) {
368        // The minimum string that will get to this check is 'pci/', which is malformed,
369        // so return false
370        return false;
371    }
372
373    *result = path.substr(start, length);
374    return true;
375}
376
377/* Given a path that may start with a virtual block device, populate
378 * the supplied buffer with the virtual block device ID and return 0.
379 * If it doesn't start with a virtual block device, or there is some
380 * error, return -1 */
381static bool find_vbd_device_prefix(const std::string& path, std::string* result) {
382    result->clear();
383
384    if (!android::base::StartsWith(path, "/devices/vbd-")) return false;
385
386    /* Beginning of the prefix is the initial "vbd-" after "/devices/" */
387    std::string::size_type start = 13;
388
389    /* End of the prefix is one path '/' later, capturing the
390       virtual block device ID. Example: 768 */
391    auto end = path.find('/', start);
392    if (end == std::string::npos) return false;
393
394    auto length = end - start;
395    if (length == 0) return false;
396
397    *result = path.substr(start, length);
398    return true;
399}
400
401static void parse_event(const char *msg, struct uevent *uevent)
402{
403    uevent->action = "";
404    uevent->path = "";
405    uevent->subsystem = "";
406    uevent->firmware = "";
407    uevent->major = -1;
408    uevent->minor = -1;
409    uevent->partition_name = NULL;
410    uevent->partition_num = -1;
411    uevent->device_name = NULL;
412
413        /* currently ignoring SEQNUM */
414    while(*msg) {
415        if(!strncmp(msg, "ACTION=", 7)) {
416            msg += 7;
417            uevent->action = msg;
418        } else if(!strncmp(msg, "DEVPATH=", 8)) {
419            msg += 8;
420            uevent->path = msg;
421        } else if(!strncmp(msg, "SUBSYSTEM=", 10)) {
422            msg += 10;
423            uevent->subsystem = msg;
424        } else if(!strncmp(msg, "FIRMWARE=", 9)) {
425            msg += 9;
426            uevent->firmware = msg;
427        } else if(!strncmp(msg, "MAJOR=", 6)) {
428            msg += 6;
429            uevent->major = atoi(msg);
430        } else if(!strncmp(msg, "MINOR=", 6)) {
431            msg += 6;
432            uevent->minor = atoi(msg);
433        } else if(!strncmp(msg, "PARTN=", 6)) {
434            msg += 6;
435            uevent->partition_num = atoi(msg);
436        } else if(!strncmp(msg, "PARTNAME=", 9)) {
437            msg += 9;
438            uevent->partition_name = msg;
439        } else if(!strncmp(msg, "DEVNAME=", 8)) {
440            msg += 8;
441            uevent->device_name = msg;
442        }
443
444        /* advance to after the next \0 */
445        while(*msg++)
446            ;
447    }
448
449    if (LOG_UEVENTS) {
450        LOG(INFO) << android::base::StringPrintf("event { '%s', '%s', '%s', '%s', %d, %d }",
451                                                 uevent->action, uevent->path, uevent->subsystem,
452                                                 uevent->firmware, uevent->major, uevent->minor);
453    }
454}
455
456std::vector<std::string> get_character_device_symlinks(uevent* uevent) {
457    platform_node* pdev = find_platform_device(uevent->path);
458    if (!pdev) return {};
459
460    /* skip "/devices/platform/<driver>" */
461    std::string parent = std::string(uevent->path);
462    auto parent_start = parent.find('/', pdev->path_len);
463    if (parent_start == std::string::npos) return {};
464
465    parent.erase(0, parent_start);
466
467    if (!android::base::StartsWith(parent, "/usb")) return {};
468
469    // skip root hub name and device. use device interface
470    // skip 3 slashes, including the first / by starting the search at the 1st character, not 0th.
471    // then extract what comes between the 3rd and 4th slash
472    // e.g. "/usb/usb_device/name/tty2-1:1.0" -> "name"
473
474    std::string::size_type start = 0;
475    start = parent.find('/', start + 1);
476    if (start == std::string::npos) return {};
477
478    start = parent.find('/', start + 1);
479    if (start == std::string::npos) return {};
480
481    auto end = parent.find('/', start + 1);
482    if (end == std::string::npos) return {};
483
484    start++;  // Skip the first '/'
485
486    auto length = end - start;
487    if (length == 0) return {};
488
489    auto name_string = parent.substr(start, length);
490
491    // TODO: remove std::string() when uevent->subsystem is an std::string
492    std::vector<std::string> links;
493    links.emplace_back("/dev/usb/" + std::string(uevent->subsystem) + name_string);
494
495    mkdir("/dev/usb", 0755);
496
497    return links;
498}
499
500// replaces any unacceptable characters with '_', the
501// length of the resulting string is equal to the input string
502void sanitize_partition_name(std::string* string) {
503    const char* accept =
504        "abcdefghijklmnopqrstuvwxyz"
505        "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
506        "0123456789"
507        "_-.";
508
509    if (!string) return;
510
511    std::string::size_type pos = 0;
512    while ((pos = string->find_first_not_of(accept, pos)) != std::string::npos) {
513        (*string)[pos] = '_';
514    }
515}
516
517std::vector<std::string> get_block_device_symlinks(uevent* uevent) {
518    std::string device;
519    struct platform_node* pdev;
520    std::string type;
521
522    pdev = find_platform_device(uevent->path);
523    if (pdev) {
524        device = pdev->name;
525        type = "platform";
526    } else if (find_pci_device_prefix(uevent->path, &device)) {
527        type = "pci";
528    } else if (find_vbd_device_prefix(uevent->path, &device)) {
529        type = "vbd";
530    } else {
531        return {};
532    }
533
534    std::vector<std::string> links;
535
536    LOG(VERBOSE) << "found " << type << " device " << device;
537
538    auto link_path = "/dev/block/" + type + "/" + device;
539
540    if (uevent->partition_name) {
541        std::string partition_name_sanitized(uevent->partition_name);
542        sanitize_partition_name(&partition_name_sanitized);
543        if (partition_name_sanitized != uevent->partition_name) {
544            LOG(VERBOSE) << "Linking partition '" << uevent->partition_name << "' as '"
545                         << partition_name_sanitized << "'";
546        }
547        links.emplace_back(link_path + "/by-name/" + partition_name_sanitized);
548    }
549
550    if (uevent->partition_num >= 0) {
551        links.emplace_back(link_path + "/by-num/p" + std::to_string(uevent->partition_num));
552    }
553
554    // TODO: remove uevent_path when uevent->path is an std::string
555    std::string uevent_path = uevent->path;
556    auto last_slash = uevent_path.rfind('/');
557    links.emplace_back(link_path + "/" + uevent_path.substr(last_slash + 1));
558
559    return links;
560}
561
562static void make_link_init(const char* oldpath, const char* newpath) {
563  const char* slash = strrchr(newpath, '/');
564  if (!slash) return;
565
566  if (mkdir_recursive(dirname(newpath), 0755)) {
567    PLOG(ERROR) << "Failed to create directory " << dirname(newpath);
568  }
569
570  if (symlink(oldpath, newpath) && errno != EEXIST) {
571    PLOG(ERROR) << "Failed to symlink " << oldpath << " to " << newpath;
572  }
573}
574
575static void remove_link(const char* oldpath, const char* newpath) {
576  std::string path;
577  if (android::base::Readlink(newpath, &path) && path == oldpath) unlink(newpath);
578}
579
580static void handle_device(const char* action, const char* devpath, const char* path, int block,
581                          int major, int minor, const std::vector<std::string>& links) {
582    if(!strcmp(action, "add")) {
583        make_device(devpath, path, block, major, minor, links);
584        for (const auto& link : links) {
585            make_link_init(devpath, link.c_str());
586        }
587    }
588
589    if(!strcmp(action, "remove")) {
590        for (const auto& link : links) {
591            remove_link(devpath, link.c_str());
592        }
593        unlink(devpath);
594    }
595}
596
597static void handle_platform_device_event(struct uevent *uevent)
598{
599    const char *path = uevent->path;
600
601    if (!strcmp(uevent->action, "add"))
602        add_platform_device(path);
603    else if (!strcmp(uevent->action, "remove"))
604        remove_platform_device(path);
605}
606
607static void handle_block_device_event(uevent* uevent) {
608    // if it's not a /dev device, nothing to do
609    if (uevent->major < 0 || uevent->minor < 0) return;
610
611    const char* base = "/dev/block/";
612    make_dir(base, 0755);
613
614    std::string name = android::base::Basename(uevent->path);
615    std::string devpath = base + name;
616
617    std::vector<std::string> links;
618    if (!strncmp(uevent->path, "/devices/", 9))
619        links = get_block_device_symlinks(uevent);
620
621    handle_device(uevent->action, devpath.c_str(), uevent->path, 1, uevent->major, uevent->minor,
622                  links);
623}
624
625static void handle_generic_device_event(uevent* uevent) {
626    // if it's not a /dev device, nothing to do
627    if (uevent->major < 0 || uevent->minor < 0) return;
628
629    std::string name = android::base::Basename(uevent->path);
630    ueventd_subsystem* subsystem = ueventd_subsystem_find_by_name(uevent->subsystem);
631
632    std::string devpath;
633
634    if (subsystem) {
635        std::string devname;
636
637        switch (subsystem->devname_src) {
638        case DEVNAME_UEVENT_DEVNAME:
639            devname = uevent->device_name;
640            break;
641
642        case DEVNAME_UEVENT_DEVPATH:
643            devname = name;
644            break;
645
646        default:
647            LOG(ERROR) << uevent->subsystem << " subsystem's devpath option is not set; ignoring event";
648            return;
649        }
650
651        // TODO: Remove std::string()
652        devpath = std::string(subsystem->dirname) + "/" + devname;
653        mkdir_recursive(android::base::Dirname(devpath), 0755);
654    } else if (!strncmp(uevent->subsystem, "usb", 3)) {
655        if (!strcmp(uevent->subsystem, "usb")) {
656            if (uevent->device_name) {
657                // TODO: Remove std::string
658                devpath = "/dev/" + std::string(uevent->device_name);
659            } else {
660                // This imitates the file system that would be created
661                // if we were using devfs instead.
662                // Minors are broken up into groups of 128, starting at "001"
663                int bus_id = uevent->minor / 128 + 1;
664                int device_id = uevent->minor % 128 + 1;
665                devpath = android::base::StringPrintf("/dev/bus/usb/%03d/%03d", bus_id, device_id);
666            }
667            mkdir_recursive(android::base::Dirname(devpath), 0755);
668        } else {
669            // ignore other USB events
670            return;
671        }
672    } else {
673        devpath = "/dev/" + name;
674    }
675
676    auto links = get_character_device_symlinks(uevent);
677
678    handle_device(uevent->action, devpath.c_str(), uevent->path, 0, uevent->major, uevent->minor,
679                  links);
680}
681
682static void handle_device_event(struct uevent *uevent)
683{
684    if (!strcmp(uevent->action,"add") || !strcmp(uevent->action, "change") || !strcmp(uevent->action, "online"))
685        fixup_sys_perms(uevent->path, uevent->subsystem);
686
687    if (!strncmp(uevent->subsystem, "block", 5)) {
688        handle_block_device_event(uevent);
689    } else if (!strncmp(uevent->subsystem, "platform", 8)) {
690        handle_platform_device_event(uevent);
691    } else {
692        handle_generic_device_event(uevent);
693    }
694}
695
696static void load_firmware(uevent* uevent, const std::string& root,
697                          int fw_fd, size_t fw_size,
698                          int loading_fd, int data_fd) {
699    // Start transfer.
700    android::base::WriteFully(loading_fd, "1", 1);
701
702    // Copy the firmware.
703    int rc = sendfile(data_fd, fw_fd, nullptr, fw_size);
704    if (rc == -1) {
705        PLOG(ERROR) << "firmware: sendfile failed { '" << root << "', '" << uevent->firmware << "' }";
706    }
707
708    // Tell the firmware whether to abort or commit.
709    const char* response = (rc != -1) ? "0" : "-1";
710    android::base::WriteFully(loading_fd, response, strlen(response));
711}
712
713static int is_booting() {
714    return access("/dev/.booting", F_OK) == 0;
715}
716
717static void process_firmware_event(uevent* uevent) {
718    int booting = is_booting();
719
720    LOG(INFO) << "firmware: loading '" << uevent->firmware << "' for '" << uevent->path << "'";
721
722    std::string root = android::base::StringPrintf("/sys%s", uevent->path);
723    std::string loading = root + "/loading";
724    std::string data = root + "/data";
725
726    android::base::unique_fd loading_fd(open(loading.c_str(), O_WRONLY|O_CLOEXEC));
727    if (loading_fd == -1) {
728        PLOG(ERROR) << "couldn't open firmware loading fd for " << uevent->firmware;
729        return;
730    }
731
732    android::base::unique_fd data_fd(open(data.c_str(), O_WRONLY|O_CLOEXEC));
733    if (data_fd == -1) {
734        PLOG(ERROR) << "couldn't open firmware data fd for " << uevent->firmware;
735        return;
736    }
737
738try_loading_again:
739    for (size_t i = 0; i < arraysize(firmware_dirs); i++) {
740        std::string file = android::base::StringPrintf("%s/%s", firmware_dirs[i], uevent->firmware);
741        android::base::unique_fd fw_fd(open(file.c_str(), O_RDONLY|O_CLOEXEC));
742        struct stat sb;
743        if (fw_fd != -1 && fstat(fw_fd, &sb) != -1) {
744            load_firmware(uevent, root, fw_fd, sb.st_size, loading_fd, data_fd);
745            return;
746        }
747    }
748
749    if (booting) {
750        // If we're not fully booted, we may be missing
751        // filesystems needed for firmware, wait and retry.
752        std::this_thread::sleep_for(100ms);
753        booting = is_booting();
754        goto try_loading_again;
755    }
756
757    LOG(ERROR) << "firmware: could not find firmware for " << uevent->firmware;
758
759    // Write "-1" as our response to the kernel's firmware request, since we have nothing for it.
760    write(loading_fd, "-1", 2);
761}
762
763static void handle_firmware_event(uevent* uevent) {
764    if (strcmp(uevent->subsystem, "firmware")) return;
765    if (strcmp(uevent->action, "add")) return;
766
767    // Loading the firmware in a child means we can do that in parallel...
768    // (We ignore SIGCHLD rather than wait for our children.)
769    pid_t pid = fork();
770    if (pid == 0) {
771        Timer t;
772        process_firmware_event(uevent);
773        LOG(INFO) << "loading " << uevent->path << " took " << t;
774        _exit(EXIT_SUCCESS);
775    } else if (pid == -1) {
776        PLOG(ERROR) << "could not fork to process firmware event for " << uevent->firmware;
777    }
778}
779
780static bool inline should_stop_coldboot(coldboot_action_t act)
781{
782    return (act == COLDBOOT_STOP || act == COLDBOOT_FINISH);
783}
784
785#define UEVENT_MSG_LEN  2048
786
787static inline coldboot_action_t handle_device_fd_with(
788        std::function<coldboot_action_t(uevent* uevent)> handle_uevent)
789{
790    char msg[UEVENT_MSG_LEN+2];
791    int n;
792    while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) {
793        if(n >= UEVENT_MSG_LEN)   /* overflow -- discard */
794            continue;
795
796        msg[n] = '\0';
797        msg[n+1] = '\0';
798
799        struct uevent uevent;
800        parse_event(msg, &uevent);
801        coldboot_action_t act = handle_uevent(&uevent);
802        if (should_stop_coldboot(act))
803            return act;
804    }
805
806    return COLDBOOT_CONTINUE;
807}
808
809coldboot_action_t handle_device_fd(coldboot_callback fn)
810{
811    coldboot_action_t ret = handle_device_fd_with(
812        [&](uevent* uevent) -> coldboot_action_t {
813            if (selinux_status_updated() > 0) {
814                struct selabel_handle *sehandle2;
815                sehandle2 = selinux_android_file_context_handle();
816                if (sehandle2) {
817                    selabel_close(sehandle);
818                    sehandle = sehandle2;
819                }
820            }
821
822            // default is to always create the devices
823            coldboot_action_t act = COLDBOOT_CREATE;
824            if (fn) {
825                act = fn(uevent);
826            }
827
828            if (act == COLDBOOT_CREATE || act == COLDBOOT_STOP) {
829                handle_device_event(uevent);
830                handle_firmware_event(uevent);
831            }
832
833            return act;
834        });
835
836    return ret;
837}
838
839/* Coldboot walks parts of the /sys tree and pokes the uevent files
840** to cause the kernel to regenerate device add events that happened
841** before init's device manager was started
842**
843** We drain any pending events from the netlink socket every time
844** we poke another uevent file to make sure we don't overrun the
845** socket's buffer.
846*/
847
848static coldboot_action_t do_coldboot(DIR *d, coldboot_callback fn)
849{
850    struct dirent *de;
851    int dfd, fd;
852    coldboot_action_t act = COLDBOOT_CONTINUE;
853
854    dfd = dirfd(d);
855
856    fd = openat(dfd, "uevent", O_WRONLY);
857    if (fd >= 0) {
858        write(fd, "add\n", 4);
859        close(fd);
860        act = handle_device_fd(fn);
861        if (should_stop_coldboot(act))
862            return act;
863    }
864
865    while (!should_stop_coldboot(act) && (de = readdir(d))) {
866        DIR *d2;
867
868        if(de->d_type != DT_DIR || de->d_name[0] == '.')
869            continue;
870
871        fd = openat(dfd, de->d_name, O_RDONLY | O_DIRECTORY);
872        if(fd < 0)
873            continue;
874
875        d2 = fdopendir(fd);
876        if(d2 == 0)
877            close(fd);
878        else {
879            act = do_coldboot(d2, fn);
880            closedir(d2);
881        }
882    }
883
884    // default is always to continue looking for uevents
885    return act;
886}
887
888static coldboot_action_t coldboot(const char *path, coldboot_callback fn)
889{
890    std::unique_ptr<DIR, decltype(&closedir)> d(opendir(path), closedir);
891    if (d) {
892        return do_coldboot(d.get(), fn);
893    }
894
895    return COLDBOOT_CONTINUE;
896}
897
898void device_init(const char* path, coldboot_callback fn) {
899    if (!sehandle) {
900        sehandle = selinux_android_file_context_handle();
901    }
902    // open uevent socket and selinux status only if it hasn't been
903    // done before
904    if (device_fd == -1) {
905        /* is 256K enough? udev uses 16MB! */
906        device_fd.reset(uevent_open_socket(256 * 1024, true));
907        if (device_fd == -1) {
908            return;
909        }
910        fcntl(device_fd, F_SETFL, O_NONBLOCK);
911        selinux_status_open(true);
912    }
913
914    if (access(COLDBOOT_DONE, F_OK) == 0) {
915        LOG(VERBOSE) << "Skipping coldboot, already done!";
916        return;
917    }
918
919    Timer t;
920    coldboot_action_t act;
921    if (!path) {
922        act = coldboot("/sys/class", fn);
923        if (!should_stop_coldboot(act)) {
924            act = coldboot("/sys/block", fn);
925            if (!should_stop_coldboot(act)) {
926                act = coldboot("/sys/devices", fn);
927            }
928        }
929    } else {
930        act = coldboot(path, fn);
931    }
932
933    // If we have a callback, then do as it says. If no, then the default is
934    // to always create COLDBOOT_DONE file.
935    if (!fn || (act == COLDBOOT_FINISH)) {
936        close(open(COLDBOOT_DONE, O_WRONLY|O_CREAT|O_CLOEXEC, 0000));
937    }
938
939    LOG(INFO) << "Coldboot took " << t;
940}
941
942void device_close() {
943    destroy_platform_devices();
944    device_fd.reset();
945    selinux_status_close();
946}
947
948int get_device_fd() {
949    return device_fd;
950}
951