blob: b01a3eeb2683900a76b0498b446f6bcc48a93b47 [file] [log] [blame]
Tom Cherry618d3102018-01-19 14:25:48 -08001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherry7bfea3d2018-11-06 14:12:05 -080017#include "builtins.h"
18#include "first_stage_init.h"
Tom Cherry618d3102018-01-19 14:25:48 -080019#include "init.h"
Tom Cherry7bfea3d2018-11-06 14:12:05 -080020#include "selinux.h"
21#include "subcontext.h"
22#include "ueventd.h"
23
24#include <android-base/logging.h>
25
26#if __has_feature(address_sanitizer)
27#include <sanitizer/asan_interface.h>
David Anderson81387172021-07-07 18:46:11 -070028#elif __has_feature(hwaddress_sanitizer)
29#include <sanitizer/hwasan_interface.h>
Tom Cherry7bfea3d2018-11-06 14:12:05 -080030#endif
31
David Anderson81387172021-07-07 18:46:11 -070032#if __has_feature(address_sanitizer) || __has_feature(hwaddress_sanitizer)
Tom Cherry7bfea3d2018-11-06 14:12:05 -080033// Load asan.options if it exists since these are not yet in the environment.
34// Always ensure detect_container_overflow=0 as there are false positives with this check.
35// Always ensure abort_on_error=1 to ensure we reboot to bootloader for development builds.
36extern "C" const char* __asan_default_options() {
37 return "include_if_exists=/system/asan.options:detect_container_overflow=0:abort_on_error=1";
38}
39
40__attribute__((no_sanitize("address", "memory", "thread", "undefined"))) extern "C" void
41__sanitizer_report_error_summary(const char* summary) {
42 LOG(ERROR) << "Init (error summary): " << summary;
43}
44
45__attribute__((no_sanitize("address", "memory", "thread", "undefined"))) static void
46AsanReportCallback(const char* str) {
47 LOG(ERROR) << "Init: " << str;
48}
49#endif
50
51using namespace android::init;
Tom Cherry618d3102018-01-19 14:25:48 -080052
53int main(int argc, char** argv) {
Tom Cherry7bfea3d2018-11-06 14:12:05 -080054#if __has_feature(address_sanitizer)
55 __asan_set_error_report_callback(AsanReportCallback);
David Anderson81387172021-07-07 18:46:11 -070056#elif __has_feature(hwaddress_sanitizer)
57 __hwasan_set_error_report_callback(AsanReportCallback);
Tom Cherry7bfea3d2018-11-06 14:12:05 -080058#endif
Wei Wang30bbf7d2020-07-06 15:26:49 -070059 // Boost prio which will be restored later
60 setpriority(PRIO_PROCESS, 0, -20);
Tom Cherry7bfea3d2018-11-06 14:12:05 -080061 if (!strcmp(basename(argv[0]), "ueventd")) {
62 return ueventd_main(argc, argv);
63 }
64
Haoyu Tangf32bc7c2019-01-05 09:31:28 +080065 if (argc > 1) {
66 if (!strcmp(argv[1], "subcontext")) {
67 android::base::InitLogging(argv, &android::base::KernelLogger);
Tom Cherryd52a5b32019-07-22 16:05:36 -070068 const BuiltinFunctionMap& function_map = GetBuiltinFunctionMap();
Haoyu Tangf32bc7c2019-01-05 09:31:28 +080069
70 return SubcontextMain(argc, argv, &function_map);
71 }
72
73 if (!strcmp(argv[1], "selinux_setup")) {
74 return SetupSelinux(argv);
75 }
76
77 if (!strcmp(argv[1], "second_stage")) {
78 return SecondStageMain(argc, argv);
79 }
Tom Cherry7bfea3d2018-11-06 14:12:05 -080080 }
81
Haoyu Tangf32bc7c2019-01-05 09:31:28 +080082 return FirstStageMain(argc, argv);
Tom Cherry618d3102018-01-19 14:25:48 -080083}