From 4159aedfaa35e9a41ba9478b7bb00f661c6646d3 Mon Sep 17 00:00:00 2001 From: Dees Troy Date: Fri, 28 Feb 2014 17:24:43 +0000 Subject: Restore capabilities to run-as binary Change-Id: I9e2b8e9b69c94b94c57143c04b950530490ec33e --- partition.cpp | 31 +++++++++++++++++++++++++++++-- 1 file changed, 29 insertions(+), 2 deletions(-) (limited to 'partition.cpp') diff --git a/partition.cpp b/partition.cpp index 57a692349..172633c07 100644 --- a/partition.cpp +++ b/partition.cpp @@ -63,6 +63,11 @@ extern "C" { #include "selinux/selinux.h" #include #endif +#ifdef HAVE_CAPABILITIES +#include +#include +#include +#endif using namespace std; @@ -1699,6 +1704,7 @@ bool TWPartition::Restore_Tar(string restore_folder, string Restore_File_System) string Full_FileName, Command; int index = 0; char split_index[5]; + bool ret = false; if (Has_Android_Secure) { if (!Wipe_AndSec()) @@ -1726,8 +1732,29 @@ bool TWPartition::Restore_Tar(string restore_folder, string Restore_File_System) tar.setpassword(Password); #endif if (tar.extractTarFork() != 0) - return false; - return true; + ret = false; + else + ret = true; +#ifdef HAVE_CAPABILITIES + // Restore capabilities to the run-as binary + if (Mount_Point == "/system" && Mount(true) && TWFunc::Path_Exists("/system/bin/run-as")) { + struct vfs_cap_data cap_data; + uint64_t capabilities = (1 << CAP_SETUID) | (1 << CAP_SETGID); + + memset(&cap_data, 0, sizeof(cap_data)); + cap_data.magic_etc = VFS_CAP_REVISION | VFS_CAP_FLAGS_EFFECTIVE; + cap_data.data[0].permitted = (uint32_t) (capabilities & 0xffffffff); + cap_data.data[0].inheritable = 0; + cap_data.data[1].permitted = (uint32_t) (capabilities >> 32); + cap_data.data[1].inheritable = 0; + if (setxattr("/system/bin/run-as", XATTR_NAME_CAPS, &cap_data, sizeof(cap_data), 0) < 0) { + LOGINFO("Failed to reset capabilities of /system/bin/run-as binary.\n"); + } else { + LOGINFO("Reset capabilities of /system/bin/run-as binary successful.\n"); + } + } +#endif + return ret; } bool TWPartition::Restore_DD(string restore_folder) { -- cgit v1.2.3