| #include <stdio.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <unistd.h> |
| #include <vector> |
| #include <dirent.h> |
| #include <time.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <sys/mount.h> |
| #include <sys/reboot.h> |
| #include <sys/sendfile.h> |
| #include <sys/stat.h> |
| #include <sys/vfs.h> |
| #include "cutils/android_reboot.h" |
| #include <iostream> |
| #include <fstream> |
| #include "twrp-functions.hpp" |
| #include "partitions.hpp" |
| #include "common.h" |
| #include "data.hpp" |
| #include "bootloader.h" |
| #include "variables.h" |
| |
| extern "C" { |
| #include "libcrecovery/common.h" |
| } |
| |
| |
| /* Execute a command */ |
| |
| int TWFunc::Exec_Cmd(string cmd, string &result) { |
| FILE* exec; |
| char buffer[130]; |
| int ret = 0; |
| exec = __popen(cmd.c_str(), "r"); |
| if (!exec) return -1; |
| while(!feof(exec)) { |
| memset(&buffer, 0, sizeof(buffer)); |
| if (fgets(buffer, 128, exec) != NULL) { |
| buffer[128] = '\n'; |
| buffer[129] = NULL; |
| result += buffer; |
| } |
| } |
| ret = __pclose(exec); |
| return ret; |
| } |
| |
| /* Checks md5 for a path |
| Return values: |
| -1 : MD5 does not exist |
| 0 : Failed |
| 1 : Success */ |
| int TWFunc::Check_MD5(string File) { |
| int ret; |
| string Command, DirPath, MD5_File, Sline, Filename, MD5_File_Filename, OK; |
| char line[255]; |
| size_t pos; |
| string result; |
| |
| MD5_File = File + ".md5"; |
| if (Path_Exists(MD5_File)) { |
| DirPath = Get_Path(File); |
| MD5_File = Get_Filename(MD5_File); |
| Command = "cd '" + DirPath + "' && /sbin/busybox md5sum -c '" + MD5_File + "'"; |
| Exec_Cmd(Command, result); |
| pos = result.find(":"); |
| if (pos != string::npos) { |
| Filename = Get_Filename(File); |
| MD5_File_Filename = result.substr(0, pos); |
| OK = result.substr(pos + 2, result.size() - pos - 2); |
| if (Filename == MD5_File_Filename && (OK == "OK" || OK == "OK\n")) { |
| //MD5 is good, return 1 |
| ret = 1; |
| } else { |
| // MD5 is bad, return 0 |
| ret = 0; |
| } |
| } else { |
| // MD5 is bad, return 0 |
| ret = 0; |
| } |
| } else { |
| //No md5 file, return -1 |
| ret = -1; |
| } |
| |
| return ret; |
| } |
| |
| // Returns "file.name" from a full /path/to/file.name |
| string TWFunc::Get_Filename(string Path) { |
| size_t pos = Path.find_last_of("/"); |
| if (pos != string::npos) { |
| string Filename; |
| Filename = Path.substr(pos + 1, Path.size() - pos - 1); |
| return Filename; |
| } else |
| return Path; |
| } |
| |
| // Returns "/path/to/" from a full /path/to/file.name |
| string TWFunc::Get_Path(string Path) { |
| size_t pos = Path.find_last_of("/"); |
| if (pos != string::npos) { |
| string Pathonly; |
| Pathonly = Path.substr(0, pos + 1); |
| return Pathonly; |
| } else |
| return Path; |
| } |
| |
| // Returns "/path" from a full /path/to/file.name |
| string TWFunc::Get_Root_Path(string Path) { |
| string Local_Path = Path; |
| |
| // Make sure that we have a leading slash |
| if (Local_Path.substr(0, 1) != "/") |
| Local_Path = "/" + Local_Path; |
| |
| // Trim the path to get the root path only |
| size_t position = Local_Path.find("/", 2); |
| if (position != string::npos) { |
| Local_Path.resize(position); |
| } |
| return Local_Path; |
| } |
| |
| void TWFunc::install_htc_dumlock(void) { |
| int need_libs = 0; |
| |
| if (!PartitionManager.Mount_By_Path("/system", true)) |
| return; |
| |
| if (!PartitionManager.Mount_By_Path("/data", true)) |
| return; |
| |
| ui_print("Installing HTC Dumlock to system...\n"); |
| copy_file("/res/htcd/htcdumlocksys", "/system/bin/htcdumlock", 0755); |
| if (!Path_Exists("/system/bin/flash_image")) { |
| ui_print("Installing flash_image...\n"); |
| copy_file("/res/htcd/flash_imagesys", "/system/bin/flash_image", 0755); |
| need_libs = 1; |
| } else |
| ui_print("flash_image is already installed, skipping...\n"); |
| if (!Path_Exists("/system/bin/dump_image")) { |
| ui_print("Installing dump_image...\n"); |
| copy_file("/res/htcd/dump_imagesys", "/system/bin/dump_image", 0755); |
| need_libs = 1; |
| } else |
| ui_print("dump_image is already installed, skipping...\n"); |
| if (need_libs) { |
| ui_print("Installing libs needed for flash_image and dump_image...\n"); |
| copy_file("/res/htcd/libbmlutils.so", "/system/lib/libbmlutils.so", 0755); |
| copy_file("/res/htcd/libflashutils.so", "/system/lib/libflashutils.so", 0755); |
| copy_file("/res/htcd/libmmcutils.so", "/system/lib/libmmcutils.so", 0755); |
| copy_file("/res/htcd/libmtdutils.so", "/system/lib/libmtdutils.so", 0755); |
| } |
| ui_print("Installing HTC Dumlock app...\n"); |
| mkdir("/data/app", 0777); |
| unlink("/data/app/com.teamwin.htcdumlock*"); |
| copy_file("/res/htcd/HTCDumlock.apk", "/data/app/com.teamwin.htcdumlock.apk", 0777); |
| sync(); |
| ui_print("HTC Dumlock is installed.\n"); |
| } |
| |
| void TWFunc::htc_dumlock_restore_original_boot(void) { |
| string status; |
| if (!PartitionManager.Mount_By_Path("/sdcard", true)) |
| return; |
| |
| ui_print("Restoring original boot...\n"); |
| Exec_Cmd("htcdumlock restore", status); |
| ui_print("Original boot restored.\n"); |
| } |
| |
| void TWFunc::htc_dumlock_reflash_recovery_to_boot(void) { |
| string status; |
| if (!PartitionManager.Mount_By_Path("/sdcard", true)) |
| return; |
| ui_print("Reflashing recovery to boot...\n"); |
| Exec_Cmd("htcdumlock recovery noreboot", status); |
| ui_print("Recovery is flashed to boot.\n"); |
| } |
| |
| int TWFunc::Recursive_Mkdir(string Path) { |
| string pathCpy = Path; |
| string wholePath; |
| size_t pos = pathCpy.find("/", 2); |
| |
| while (pos != string::npos) |
| { |
| wholePath = pathCpy.substr(0, pos); |
| if (mkdir(wholePath.c_str(), 0777) && errno != EEXIST) { |
| LOGE("Unable to create folder: %s (errno=%d)\n", wholePath.c_str(), errno); |
| return false; |
| } |
| |
| pos = pathCpy.find("/", pos + 1); |
| } |
| if (mkdir(wholePath.c_str(), 0777) && errno != EEXIST) |
| return false; |
| return true; |
| } |
| |
| unsigned long long TWFunc::Get_Folder_Size(const string& Path, bool Display_Error) { |
| DIR* d; |
| struct dirent* de; |
| struct stat st; |
| unsigned long long dusize = 0; |
| unsigned long long dutemp = 0; |
| |
| d = opendir(Path.c_str()); |
| if (d == NULL) |
| { |
| LOGE("error opening '%s'\n", Path.c_str()); |
| LOGE("error: %s\n", strerror(errno)); |
| return 0; |
| } |
| |
| while ((de = readdir(d)) != NULL) |
| { |
| if (de->d_type == DT_DIR && strcmp(de->d_name, ".") != 0 && strcmp(de->d_name, "..") != 0) |
| { |
| dutemp = Get_Folder_Size((Path + "/" + de->d_name), Display_Error); |
| dusize += dutemp; |
| dutemp = 0; |
| } |
| else if (de->d_type == DT_REG) |
| { |
| stat((Path + "/" + de->d_name).c_str(), &st); |
| dusize += (unsigned long long)(st.st_size); |
| } |
| } |
| closedir(d); |
| return dusize; |
| } |
| |
| bool TWFunc::Path_Exists(string Path) { |
| // Check to see if the Path exists |
| struct stat st; |
| if (stat(Path.c_str(), &st) != 0) |
| return false; |
| else |
| return true; |
| } |
| |
| void TWFunc::GUI_Operation_Text(string Read_Value, string Default_Text) { |
| string Display_Text; |
| |
| DataManager::GetValue(Read_Value, Display_Text); |
| if (Display_Text.empty()) |
| Display_Text = Default_Text; |
| |
| DataManager::SetValue("tw_operation", Display_Text); |
| DataManager::SetValue("tw_partition", ""); |
| } |
| |
| void TWFunc::GUI_Operation_Text(string Read_Value, string Partition_Name, string Default_Text) { |
| string Display_Text; |
| |
| DataManager::GetValue(Read_Value, Display_Text); |
| if (Display_Text.empty()) |
| Display_Text = Default_Text; |
| |
| DataManager::SetValue("tw_operation", Display_Text); |
| DataManager::SetValue("tw_partition", Partition_Name); |
| } |
| |
| unsigned long TWFunc::Get_File_Size(string Path) { |
| struct stat st; |
| |
| if (stat(Path.c_str(), &st) != 0) |
| return 0; |
| return st.st_size; |
| } |
| |
| static const char *COMMAND_FILE = "/cache/recovery/command"; |
| static const char *INTENT_FILE = "/cache/recovery/intent"; |
| static const char *LOG_FILE = "/cache/recovery/log"; |
| static const char *LAST_LOG_FILE = "/cache/recovery/last_log"; |
| static const char *LAST_INSTALL_FILE = "/cache/recovery/last_install"; |
| static const char *CACHE_ROOT = "/cache"; |
| static const char *SDCARD_ROOT = "/sdcard"; |
| static const char *TEMPORARY_LOG_FILE = "/tmp/recovery.log"; |
| static const char *TEMPORARY_INSTALL_FILE = "/tmp/last_install"; |
| |
| // close a file, log an error if the error indicator is set |
| void TWFunc::check_and_fclose(FILE *fp, const char *name) { |
| fflush(fp); |
| if (ferror(fp)) LOGE("Error in %s\n(%s)\n", name, strerror(errno)); |
| fclose(fp); |
| } |
| |
| void TWFunc::copy_log_file(const char* source, const char* destination, int append) { |
| FILE *log = fopen_path(destination, append ? "a" : "w"); |
| if (log == NULL) { |
| LOGE("Can't open %s\n", destination); |
| } else { |
| FILE *tmplog = fopen(source, "r"); |
| if (tmplog != NULL) { |
| if (append) { |
| fseek(tmplog, tmplog_offset, SEEK_SET); // Since last write |
| } |
| char buf[4096]; |
| while (fgets(buf, sizeof(buf), tmplog)) fputs(buf, log); |
| if (append) { |
| tmplog_offset = ftell(tmplog); |
| } |
| check_and_fclose(tmplog, source); |
| } |
| check_and_fclose(log, destination); |
| } |
| } |
| |
| // clear the recovery command and prepare to boot a (hopefully working) system, |
| // copy our log file to cache as well (for the system to read), and |
| // record any intent we were asked to communicate back to the system. |
| // this function is idempotent: call it as many times as you like. |
| void TWFunc::twfinish_recovery(const char *send_intent) { |
| // By this point, we're ready to return to the main system... |
| if (send_intent != NULL) { |
| FILE *fp = fopen_path(INTENT_FILE, "w"); |
| if (fp == NULL) { |
| LOGE("Can't open %s\n", INTENT_FILE); |
| } else { |
| fputs(send_intent, fp); |
| check_and_fclose(fp, INTENT_FILE); |
| } |
| } |
| |
| // Copy logs to cache so the system can find out what happened. |
| copy_log_file(TEMPORARY_LOG_FILE, LOG_FILE, true); |
| copy_log_file(TEMPORARY_LOG_FILE, LAST_LOG_FILE, false); |
| copy_log_file(TEMPORARY_INSTALL_FILE, LAST_INSTALL_FILE, false); |
| chmod(LOG_FILE, 0600); |
| chown(LOG_FILE, 1000, 1000); // system user |
| chmod(LAST_LOG_FILE, 0640); |
| chmod(LAST_INSTALL_FILE, 0644); |
| |
| // Reset to normal system boot so recovery won't cycle indefinitely. |
| struct bootloader_message boot; |
| memset(&boot, 0, sizeof(boot)); |
| set_bootloader_message(&boot); |
| |
| // Remove the command file, so recovery won't repeat indefinitely. |
| if (!PartitionManager.Mount_By_Path("/system", true) || (unlink(COMMAND_FILE) && errno != ENOENT)) { |
| LOGW("Can't unlink %s\n", COMMAND_FILE); |
| } |
| |
| PartitionManager.UnMount_By_Path("/cache", true); |
| sync(); // For good measure. |
| } |
| |
| // reboot: Reboot the system. Return -1 on error, no return on success |
| int TWFunc::tw_reboot(RebootCommand command) |
| { |
| // Always force a sync before we reboot |
| sync(); |
| |
| switch (command) |
| { |
| case rb_current: |
| case rb_system: |
| twfinish_recovery("s"); |
| sync(); |
| check_and_run_script("/sbin/rebootsystem.sh", "reboot system"); |
| return reboot(RB_AUTOBOOT); |
| case rb_recovery: |
| check_and_run_script("/sbin/rebootrecovery.sh", "reboot recovery"); |
| return __reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, LINUX_REBOOT_CMD_RESTART2, (void*) "recovery"); |
| case rb_bootloader: |
| check_and_run_script("/sbin/rebootbootloader.sh", "reboot bootloader"); |
| return __reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, LINUX_REBOOT_CMD_RESTART2, (void*) "bootloader"); |
| case rb_poweroff: |
| check_and_run_script("/sbin/poweroff.sh", "power off"); |
| android_reboot(ANDROID_RB_POWEROFF, 0, 0); |
| return reboot(RB_POWER_OFF); |
| case rb_download: |
| check_and_run_script("/sbin/rebootdownload.sh", "reboot download"); |
| return __reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2, LINUX_REBOOT_CMD_RESTART2, (void*) "download"); |
| return 1; |
| default: |
| return -1; |
| } |
| return -1; |
| } |
| |
| void TWFunc::check_and_run_script(const char* script_file, const char* display_name) |
| { |
| // Check for and run startup script if script exists |
| struct stat st; |
| string result; |
| if (stat(script_file, &st) == 0) { |
| ui_print("Running %s script...\n", display_name); |
| chmod(script_file, S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH); |
| TWFunc::Exec_Cmd(script_file, result); |
| ui_print("\nFinished running %s script.\n", display_name); |
| } |
| } |
| |
| int TWFunc::removeDir(const string path, bool skipParent) { |
| DIR *d = opendir(path.c_str()); |
| int r = 0; |
| string new_path; |
| |
| if (d == NULL) { |
| LOGE("Error opening '%s'\n", path.c_str()); |
| return -1; |
| } |
| |
| if (d) { |
| struct dirent *p; |
| while (!r && (p = readdir(d))) { |
| if (!strcmp(p->d_name, ".") || !strcmp(p->d_name, "..")) |
| continue; |
| new_path = path + "/"; |
| new_path.append(p->d_name); |
| if (p->d_type == DT_DIR) { |
| r = removeDir(new_path, true); |
| if (!r) { |
| if (p->d_type == DT_DIR) |
| r = rmdir(new_path.c_str()); |
| else |
| LOGI("Unable to removeDir '%s': %s\n", new_path.c_str(), strerror(errno)); |
| } |
| } else if (p->d_type == DT_REG || p->d_type == DT_LNK || p->d_type == DT_FIFO || p->d_type == DT_SOCK) { |
| r = unlink(new_path.c_str()); |
| if (r != 0) { |
| LOGI("Unable to unlink '%s: %s'\n", new_path.c_str(), strerror(errno)); |
| } |
| } |
| } |
| closedir(d); |
| |
| if (!r) { |
| if (skipParent) |
| return 0; |
| else |
| r = rmdir(path.c_str()); |
| } |
| } |
| return r; |
| } |
| |
| int TWFunc::copy_file(string src, string dst, int mode) { |
| LOGI("Copying file %s to %s\n", src.c_str(), dst.c_str()); |
| ifstream srcfile(src.c_str(), ios::binary); |
| ofstream dstfile(dst.c_str(), ios::binary); |
| dstfile << srcfile.rdbuf(); |
| srcfile.close(); |
| dstfile.close(); |
| if (chmod(dst.c_str(), mode) != 0) |
| return -1; |
| return 0; |
| } |
| |
| unsigned int TWFunc::Get_D_Type_From_Stat(string Path) { |
| struct stat st; |
| |
| stat(Path.c_str(), &st); |
| if (st.st_mode & S_IFDIR) |
| return DT_DIR; |
| else if (st.st_mode & S_IFBLK) |
| return DT_BLK; |
| else if (st.st_mode & S_IFCHR) |
| return DT_CHR; |
| else if (st.st_mode & S_IFIFO) |
| return DT_FIFO; |
| else if (st.st_mode & S_IFLNK) |
| return DT_LNK; |
| else if (st.st_mode & S_IFREG) |
| return DT_REG; |
| else if (st.st_mode & S_IFSOCK) |
| return DT_SOCK; |
| return DT_UNKNOWN; |
| } |
| |
| int TWFunc::read_file(string fn, string& results) { |
| ifstream file; |
| file.open(fn.c_str(), ios::in); |
| if (file.is_open()) { |
| file >> results; |
| file.close(); |
| return 0; |
| } |
| LOGI("Cannot find file %s\n", fn.c_str()); |
| return -1; |
| } |
| |
| int TWFunc::write_file(string fn, string& line) { |
| FILE *file; |
| file = fopen(fn.c_str(), "w"); |
| if (file != NULL) { |
| fwrite(line.c_str(), line.size(), 1, file); |
| fclose(file); |
| return 0; |
| } |
| LOGI("Cannot find file %s\n", fn.c_str()); |
| return -1; |
| } |
| |
| timespec TWFunc::timespec_diff(timespec& start, timespec& end) |
| { |
| timespec temp; |
| if ((end.tv_nsec-start.tv_nsec)<0) { |
| temp.tv_sec = end.tv_sec-start.tv_sec-1; |
| temp.tv_nsec = 1000000000+end.tv_nsec-start.tv_nsec; |
| } else { |
| temp.tv_sec = end.tv_sec-start.tv_sec; |
| temp.tv_nsec = end.tv_nsec-start.tv_nsec; |
| } |
| return temp; |
| } |
| |
| int TWFunc::drop_caches(void) { |
| string file = "/proc/sys/vm/drop_caches"; |
| string value = "3"; |
| if (write_file(file, value) != 0) |
| return -1; |
| return 0; |
| } |
| |
| int TWFunc::Check_su_Perms(void) { |
| struct stat st; |
| int ret = 0; |
| |
| if (!PartitionManager.Mount_By_Path("/system", false)) |
| return 0; |
| |
| // Check to ensure that perms are 6755 for all 3 file locations |
| if (stat("/system/bin/su", &st) == 0) { |
| if ((st.st_mode & (S_ISUID | S_ISGID | S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH)) != (S_ISUID | S_ISGID | S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) || st.st_uid != 0 || st.st_gid != 0) { |
| ret = 1; |
| } |
| } |
| if (stat("/system/xbin/su", &st) == 0) { |
| if ((st.st_mode & (S_ISUID | S_ISGID | S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH)) != (S_ISUID | S_ISGID | S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) || st.st_uid != 0 || st.st_gid != 0) { |
| ret += 2; |
| } |
| } |
| if (stat("/system/bin/.ext/.su", &st) == 0) { |
| if ((st.st_mode & (S_ISUID | S_ISGID | S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH)) != (S_ISUID | S_ISGID | S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH) || st.st_uid != 0 || st.st_gid != 0) { |
| ret += 4; |
| } |
| } |
| return ret; |
| } |
| |
| bool TWFunc::Fix_su_Perms(void) { |
| if (!PartitionManager.Mount_By_Path("/system", true)) |
| return false; |
| |
| string file = "/system/bin/su"; |
| if (TWFunc::Path_Exists(file)) { |
| if (chown(file.c_str(), 0, 0) != 0) { |
| LOGE("Failed to chown '%s'\n", file.c_str()); |
| return false; |
| } |
| if (tw_chmod(file, "6755") != 0) { |
| LOGE("Failed to chmod '%s'\n", file.c_str()); |
| return false; |
| } |
| } |
| file = "/system/xbin/su"; |
| if (TWFunc::Path_Exists(file)) { |
| if (chown(file.c_str(), 0, 0) != 0) { |
| LOGE("Failed to chown '%s'\n", file.c_str()); |
| return false; |
| } |
| if (tw_chmod(file, "6755") != 0) { |
| LOGE("Failed to chmod '%s'\n", file.c_str()); |
| return false; |
| } |
| } |
| file = "/system/bin/.ext/.su"; |
| if (TWFunc::Path_Exists(file)) { |
| if (chown(file.c_str(), 0, 0) != 0) { |
| LOGE("Failed to chown '%s'\n", file.c_str()); |
| return false; |
| } |
| if (tw_chmod(file, "6755") != 0) { |
| LOGE("Failed to chmod '%s'\n", file.c_str()); |
| return false; |
| } |
| } |
| file = "/system/app/Superuser.apk"; |
| if (TWFunc::Path_Exists(file)) { |
| if (chown(file.c_str(), 0, 0) != 0) { |
| LOGE("Failed to chown '%s'\n", file.c_str()); |
| return false; |
| } |
| if (tw_chmod(file, "0644") != 0) { |
| LOGE("Failed to chmod '%s'\n", file.c_str()); |
| return false; |
| } |
| } |
| sync(); |
| if (!PartitionManager.UnMount_By_Path("/system", true)) |
| return false; |
| return true; |
| } |
| |
| int TWFunc::tw_chmod(string fn, string mode) { |
| long mask = 0; |
| |
| for ( std::string::size_type n = 0; n < mode.length(); ++n) { |
| if (n == 0) { |
| if (mode[n] == '0') |
| continue; |
| if (mode[n] == '1') |
| mask |= S_ISVTX; |
| if (mode[n] == '2') |
| mask |= S_ISGID; |
| if (mode[n] == '4') |
| mask |= S_ISUID; |
| if (mode[n] == '5') { |
| mask |= S_ISVTX; |
| mask |= S_ISUID; |
| } |
| if (mode[n] == '6') { |
| mask |= S_ISGID; |
| mask |= S_ISUID; |
| } |
| if (mode[n] == '7') { |
| mask |= S_ISVTX; |
| mask |= S_ISGID; |
| mask |= S_ISUID; |
| } |
| } |
| else if (n == 1) { |
| if (mode[n] == '7') { |
| mask |= S_IRWXU; |
| } |
| if (mode[n] == '6') { |
| mask |= S_IRUSR; |
| mask |= S_IWUSR; |
| } |
| if (mode[n] == '5') { |
| mask |= S_IRUSR; |
| mask |= S_IXUSR; |
| } |
| if (mode[n] == '4') |
| mask |= S_IRUSR; |
| if (mode[n] == '3') { |
| mask |= S_IWUSR; |
| mask |= S_IRUSR; |
| } |
| if (mode[n] == '2') |
| mask |= S_IWUSR; |
| if (mode[n] == '1') |
| mask |= S_IXUSR; |
| } |
| else if (n == 2) { |
| if (mode[n] == '7') { |
| mask |= S_IRWXG; |
| } |
| if (mode[n] == '6') { |
| mask |= S_IRGRP; |
| mask |= S_IWGRP; |
| } |
| if (mode[n] == '5') { |
| mask |= S_IRGRP; |
| mask |= S_IXGRP; |
| } |
| if (mode[n] == '4') |
| mask |= S_IRGRP; |
| if (mode[n] == '3') { |
| mask |= S_IWGRP; |
| mask |= S_IXGRP; |
| } |
| if (mode[n] == '2') |
| mask |= S_IWGRP; |
| if (mode[n] == '1') |
| mask |= S_IXGRP; |
| } |
| else if (n == 3) { |
| if (mode[n] == '7') { |
| mask |= S_IRWXO; |
| } |
| if (mode[n] == '6') { |
| mask |= S_IROTH; |
| mask |= S_IWOTH; |
| } |
| if (mode[n] == '5') { |
| mask |= S_IROTH; |
| mask |= S_IXOTH; |
| } |
| if (mode[n] == '4') |
| mask |= S_IROTH; |
| if (mode[n] == '3') { |
| mask |= S_IWOTH; |
| mask |= S_IXOTH; |
| } |
| if (mode[n] == '2') |
| mask |= S_IWOTH; |
| if (mode[n] == '1') |
| mask |= S_IXOTH; |
| } |
| } |
| |
| if (chmod(fn.c_str(), mask) != 0) { |
| LOGE("Unable to chmod '%s' %l\n", fn.c_str(), mask); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| bool TWFunc::Install_SuperSU(void) { |
| if (!PartitionManager.Mount_By_Path("/system", true)) |
| return false; |
| |
| if (copy_file("/res/supersu/su", "/system/xbin/su", 0755) != 0) { |
| LOGE("Failed to copy su binary to /system/bin\n"); |
| return false; |
| } |
| if (copy_file("/res/supersu/Superuser.apk", "/system/app/Superuser.apk", 0644) != 0) { |
| LOGE("Failed to copy Superuser app to /system/app\n"); |
| return false; |
| } |
| if (!Fix_su_Perms()) |
| return false; |
| return true; |
| } |