| /* |
| Copyright 2012 bigbiff/Dees_Troy TeamWin |
| This file is part of TWRP/TeamWin Recovery Project. |
| |
| TWRP is free software: you can redistribute it and/or modify |
| it under the terms of the GNU General Public License as published by |
| the Free Software Foundation, either version 3 of the License, or |
| (at your option) any later version. |
| |
| TWRP is distributed in the hope that it will be useful, |
| but WITHOUT ANY WARRANTY; without even the implied warranty of |
| MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| GNU General Public License for more details. |
| |
| You should have received a copy of the GNU General Public License |
| along with TWRP. If not, see <http://www.gnu.org/licenses/>. |
| */ |
| |
| #include <ctype.h> |
| #include <errno.h> |
| #include <fcntl.h> |
| #include <limits.h> |
| #include <sys/stat.h> |
| #include <sys/wait.h> |
| #include <unistd.h> |
| |
| #include <string.h> |
| #include <stdio.h> |
| |
| #include "twcommon.h" |
| #include "mincrypt/rsa.h" |
| #include "mincrypt/sha.h" |
| #include "mtdutils/mounts.h" |
| #include "mtdutils/mtdutils.h" |
| #include "minzip/SysUtil.h" |
| #include "minzip/Zip.h" |
| #include "verifier.h" |
| #include "variables.h" |
| #include "data.hpp" |
| #include "partitions.hpp" |
| #include "twrpDigest.hpp" |
| #include "twrp-functions.hpp" |
| extern "C" { |
| #include "gui/gui.h" |
| #include "legacy_property_service.h" |
| } |
| |
| static const char* properties_path = "/dev/__properties__"; |
| static const char* properties_path_renamed = "/dev/__properties_kk__"; |
| static bool legacy_props_env_initd = false; |
| static bool legacy_props_path_modified = false; |
| |
| static int switch_to_legacy_properties() |
| { |
| if (!legacy_props_env_initd) { |
| if (legacy_properties_init() != 0) |
| return -1; |
| |
| char tmp[32]; |
| int propfd, propsz; |
| legacy_get_property_workspace(&propfd, &propsz); |
| sprintf(tmp, "%d,%d", dup(propfd), propsz); |
| setenv("ANDROID_PROPERTY_WORKSPACE", tmp, 1); |
| legacy_props_env_initd = true; |
| } |
| |
| if (TWFunc::Path_Exists(properties_path)) { |
| // hide real properties so that the updater uses the envvar to find the legacy format properties |
| if (rename(properties_path, properties_path_renamed) != 0) { |
| LOGERR("Renaming %s failed: %s\n", properties_path, strerror(errno)); |
| return -1; |
| } else { |
| legacy_props_path_modified = true; |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int switch_to_new_properties() |
| { |
| if (TWFunc::Path_Exists(properties_path_renamed)) { |
| if (rename(properties_path_renamed, properties_path) != 0) { |
| LOGERR("Renaming %s failed: %s\n", properties_path_renamed, strerror(errno)); |
| return -1; |
| } else { |
| legacy_props_path_modified = false; |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int Run_Update_Binary(const char *path, ZipArchive *Zip, int* wipe_cache) { |
| const ZipEntry* binary_location = mzFindZipEntry(Zip, ASSUMED_UPDATE_BINARY_NAME); |
| string Temp_Binary = "/tmp/updater"; |
| int binary_fd, ret_val, pipe_fd[2], status, zip_verify; |
| char buffer[1024]; |
| const char** args = (const char**)malloc(sizeof(char*) * 5); |
| FILE* child_data; |
| |
| if (binary_location == NULL) { |
| mzCloseZipArchive(Zip); |
| return INSTALL_CORRUPT; |
| } |
| |
| // Delete any existing updater |
| if (TWFunc::Path_Exists(Temp_Binary) && unlink(Temp_Binary.c_str()) != 0) { |
| LOGINFO("Unable to unlink '%s'\n", Temp_Binary.c_str()); |
| } |
| |
| binary_fd = creat(Temp_Binary.c_str(), 0755); |
| if (binary_fd < 0) { |
| mzCloseZipArchive(Zip); |
| LOGERR("Could not create file for updater extract in '%s'\n", Temp_Binary.c_str()); |
| return INSTALL_ERROR; |
| } |
| |
| ret_val = mzExtractZipEntryToFile(Zip, binary_location, binary_fd); |
| close(binary_fd); |
| |
| if (!ret_val) { |
| mzCloseZipArchive(Zip); |
| LOGERR("Could not extract '%s'\n", ASSUMED_UPDATE_BINARY_NAME); |
| return INSTALL_ERROR; |
| } |
| |
| // If exists, extract file_contexts from the zip file |
| const ZipEntry* selinx_contexts = mzFindZipEntry(Zip, "file_contexts"); |
| if (selinx_contexts == NULL) { |
| mzCloseZipArchive(Zip); |
| LOGINFO("Zip does not contain SELinux file_contexts file in its root.\n"); |
| } else { |
| string output_filename = "/file_contexts"; |
| LOGINFO("Zip contains SELinux file_contexts file in its root. Extracting to %s\n", output_filename.c_str()); |
| // Delete any file_contexts |
| if (TWFunc::Path_Exists(output_filename) && unlink(output_filename.c_str()) != 0) { |
| LOGINFO("Unable to unlink '%s'\n", output_filename.c_str()); |
| } |
| |
| int file_contexts_fd = creat(output_filename.c_str(), 0644); |
| if (file_contexts_fd < 0) { |
| mzCloseZipArchive(Zip); |
| LOGERR("Could not extract file_contexts to '%s'\n", output_filename.c_str()); |
| return INSTALL_ERROR; |
| } |
| |
| ret_val = mzExtractZipEntryToFile(Zip, selinx_contexts, file_contexts_fd); |
| close(file_contexts_fd); |
| |
| if (!ret_val) { |
| mzCloseZipArchive(Zip); |
| LOGERR("Could not extract '%s'\n", ASSUMED_UPDATE_BINARY_NAME); |
| return INSTALL_ERROR; |
| } |
| } |
| mzCloseZipArchive(Zip); |
| |
| #ifndef TW_NO_LEGACY_PROPS |
| /* Set legacy properties */ |
| if (switch_to_legacy_properties() != 0) { |
| LOGERR("Legacy property environment did not initialize successfully. Properties may not be detected.\n"); |
| } else { |
| LOGINFO("Legacy property environment initialized.\n"); |
| } |
| #endif |
| |
| pipe(pipe_fd); |
| |
| args[0] = Temp_Binary.c_str(); |
| args[1] = EXPAND(RECOVERY_API_VERSION); |
| char* temp = (char*)malloc(10); |
| sprintf(temp, "%d", pipe_fd[1]); |
| args[2] = temp; |
| args[3] = (char*)path; |
| args[4] = NULL; |
| |
| pid_t pid = fork(); |
| if (pid == 0) { |
| close(pipe_fd[0]); |
| execve(Temp_Binary.c_str(), (char* const*)args, environ); |
| printf("E:Can't execute '%s'\n", Temp_Binary.c_str()); |
| _exit(-1); |
| } |
| close(pipe_fd[1]); |
| |
| *wipe_cache = 0; |
| |
| DataManager::GetValue(TW_SIGNED_ZIP_VERIFY_VAR, zip_verify); |
| child_data = fdopen(pipe_fd[0], "r"); |
| while (fgets(buffer, sizeof(buffer), child_data) != NULL) { |
| char* command = strtok(buffer, " \n"); |
| if (command == NULL) { |
| continue; |
| } else if (strcmp(command, "progress") == 0) { |
| char* fraction_char = strtok(NULL, " \n"); |
| char* seconds_char = strtok(NULL, " \n"); |
| |
| float fraction_float = strtof(fraction_char, NULL); |
| int seconds_float = strtol(seconds_char, NULL, 10); |
| |
| if (zip_verify) |
| DataManager::ShowProgress(fraction_float * (1 - VERIFICATION_PROGRESS_FRACTION), seconds_float); |
| else |
| DataManager::ShowProgress(fraction_float, seconds_float); |
| } else if (strcmp(command, "set_progress") == 0) { |
| char* fraction_char = strtok(NULL, " \n"); |
| float fraction_float = strtof(fraction_char, NULL); |
| DataManager::SetProgress(fraction_float); |
| } else if (strcmp(command, "ui_print") == 0) { |
| char* display_value = strtok(NULL, "\n"); |
| if (display_value) { |
| gui_print("%s", display_value); |
| } else { |
| gui_print("\n"); |
| } |
| } else if (strcmp(command, "wipe_cache") == 0) { |
| *wipe_cache = 1; |
| } else if (strcmp(command, "clear_display") == 0) { |
| // Do nothing, not supported by TWRP |
| } else { |
| LOGERR("unknown command [%s]\n", command); |
| } |
| } |
| fclose(child_data); |
| |
| waitpid(pid, &status, 0); |
| |
| #ifndef TW_NO_LEGACY_PROPS |
| /* Unset legacy properties */ |
| if (legacy_props_path_modified) { |
| if (switch_to_new_properties() != 0) { |
| LOGERR("Legacy property environment did not disable successfully. Legacy properties may still be in use.\n"); |
| } else { |
| LOGINFO("Legacy property environment disabled.\n"); |
| } |
| } |
| #endif |
| |
| if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) { |
| LOGERR("Error executing updater binary in zip '%s'\n", path); |
| return INSTALL_ERROR; |
| } |
| |
| return INSTALL_SUCCESS; |
| } |
| |
| extern "C" int TWinstall_zip(const char* path, int* wipe_cache) { |
| int ret_val, zip_verify = 1, md5_return, key_count; |
| twrpDigest md5sum; |
| string strpath = path; |
| ZipArchive Zip; |
| |
| if (strcmp(path, "error") == 0) { |
| LOGERR("Failed to get adb sideload file: '%s'\n", path); |
| return INSTALL_CORRUPT; |
| } |
| |
| gui_print("Installing '%s'...\n", path); |
| if (strlen(path) < 9 || strncmp(path, "/sideload", 9) != 0) { |
| gui_print("Checking for MD5 file...\n"); |
| md5sum.setfn(strpath); |
| md5_return = md5sum.verify_md5digest(); |
| if (md5_return == -2) { // md5 did not match |
| LOGERR("Aborting zip install\n"); |
| return INSTALL_CORRUPT; |
| } |
| } |
| |
| #ifndef TW_OEM_BUILD |
| DataManager::GetValue(TW_SIGNED_ZIP_VERIFY_VAR, zip_verify); |
| #endif |
| DataManager::SetProgress(0); |
| |
| MemMapping map; |
| if (sysMapFile(path, &map) != 0) { |
| LOGERR("Failed to sysMapFile '%s'\n", path); |
| return -1; |
| } |
| |
| if (zip_verify) { |
| gui_print("Verifying zip signature...\n"); |
| ret_val = verify_file(map.addr, map.length); |
| if (ret_val != VERIFY_SUCCESS) { |
| LOGERR("Zip signature verification failed: %i\n", ret_val); |
| sysReleaseMap(&map); |
| return -1; |
| } else { |
| gui_print("Zip signature verified successfully.\n"); |
| } |
| } |
| ret_val = mzOpenZipArchive(map.addr, map.length, &Zip); |
| if (ret_val != 0) { |
| LOGERR("Zip file is corrupt!\n", path); |
| sysReleaseMap(&map); |
| return INSTALL_CORRUPT; |
| } |
| ret_val = Run_Update_Binary(path, &Zip, wipe_cache); |
| sysReleaseMap(&map); |
| return ret_val; |
| } |