blob: 4e88507e523b694994a5c8846598a345bf9f0c0e [file] [log] [blame]
David Brazdil1f530702022-10-03 12:18:10 +01001// Copyright 2022, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! Android Virtualization Manager
16
17mod aidl;
18mod atom;
19mod composite;
20mod crosvm;
Jaewan Kimc03f6612023-02-20 00:06:26 +090021mod debug_config;
Shikha Panwar55e10ec2024-02-13 12:53:49 +000022mod dt_overlay;
David Brazdil1f530702022-10-03 12:18:10 +010023mod payload;
24mod selinux;
25
David Brazdil4b4c5102022-12-19 22:56:20 +000026use crate::aidl::{GLOBAL_SERVICE, VirtualizationService};
David Brazdil1f530702022-10-03 12:18:10 +010027use android_system_virtualizationservice::aidl::android::system::virtualizationservice::IVirtualizationService::BnVirtualizationService;
Alan Stokesc4d5def2023-02-14 17:01:59 +000028use anyhow::{bail, Context, Result};
David Brazdil4b4c5102022-12-19 22:56:20 +000029use binder::{BinderFeatures, ProcessState};
David Brazdil1f530702022-10-03 12:18:10 +010030use lazy_static::lazy_static;
Jeff Vander Stoep57da1572024-01-31 10:52:16 +010031use log::{info, LevelFilter};
David Brazdil1f530702022-10-03 12:18:10 +010032use rpcbinder::{FileDescriptorTransportMode, RpcServer};
Seungjae Yoodaf396a2024-04-15 12:58:07 +090033use std::os::unix::io::{AsFd, FromRawFd, OwnedFd, RawFd};
David Brazdil1f530702022-10-03 12:18:10 +010034use clap::Parser;
David Brazdil161ddda2023-01-06 20:29:19 +000035use nix::fcntl::{fcntl, F_GETFD, F_SETFD, FdFlag};
Seungjae Yoodaf396a2024-04-15 12:58:07 +090036use nix::unistd::{write, Pid, Uid};
David Brazdil1f530702022-10-03 12:18:10 +010037use std::os::unix::raw::{pid_t, uid_t};
38
39const LOG_TAG: &str = "virtmgr";
40
41lazy_static! {
Seungjae Yoo13af0b62024-05-20 14:15:13 +090042 static ref PID_CURRENT: Pid = Pid::this();
David Brazdil1f530702022-10-03 12:18:10 +010043 static ref PID_PARENT: Pid = Pid::parent();
44 static ref UID_CURRENT: Uid = Uid::current();
45}
46
Seungjae Yoo13af0b62024-05-20 14:15:13 +090047fn get_this_pid() -> pid_t {
48 // Return the process ID of this process.
49 PID_CURRENT.as_raw()
50}
51
David Brazdil1f530702022-10-03 12:18:10 +010052fn get_calling_pid() -> pid_t {
53 // The caller is the parent of this process.
54 PID_PARENT.as_raw()
55}
56
57fn get_calling_uid() -> uid_t {
58 // The caller and this process share the same UID.
59 UID_CURRENT.as_raw()
60}
61
62#[derive(Parser)]
63struct Args {
64 /// File descriptor inherited from the caller to run RpcBinder server on.
65 /// This should be one end of a socketpair() compatible with RpcBinder's
66 /// UDS bootstrap transport.
67 #[clap(long)]
68 rpc_server_fd: RawFd,
69 /// File descriptor inherited from the caller to signal RpcBinder server
70 /// readiness. This should be one end of pipe() and the caller should be
71 /// waiting for HUP on the other end.
72 #[clap(long)]
73 ready_fd: RawFd,
74}
75
76fn take_fd_ownership(raw_fd: RawFd, owned_fds: &mut Vec<RawFd>) -> Result<OwnedFd, anyhow::Error> {
77 // Basic check that the integer value does correspond to a file descriptor.
David Brazdil161ddda2023-01-06 20:29:19 +000078 fcntl(raw_fd, F_GETFD).with_context(|| format!("Invalid file descriptor {raw_fd}"))?;
79
80 // The file descriptor had CLOEXEC disabled to be inherited from the parent.
81 // Re-enable it to make sure it is not accidentally inherited further.
82 fcntl(raw_fd, F_SETFD(FdFlag::FD_CLOEXEC))
83 .with_context(|| format!("Could not set CLOEXEC on file descriptor {raw_fd}"))?;
David Brazdil1f530702022-10-03 12:18:10 +010084
85 // Creating OwnedFd for stdio FDs is not safe.
86 if [libc::STDIN_FILENO, libc::STDOUT_FILENO, libc::STDERR_FILENO].contains(&raw_fd) {
87 bail!("File descriptor {raw_fd} is standard I/O descriptor");
88 }
89
90 // Reject RawFds that already have a corresponding OwnedFd.
91 if owned_fds.contains(&raw_fd) {
92 bail!("File descriptor {raw_fd} already owned");
93 }
94 owned_fds.push(raw_fd);
95
Andrew Walbranb58d1b42023-07-07 13:54:49 +010096 // SAFETY: Initializing OwnedFd for a RawFd provided in cmdline arguments.
David Brazdil1f530702022-10-03 12:18:10 +010097 // We checked that the integer value corresponds to a valid FD and that this
98 // is the first argument to claim its ownership.
99 Ok(unsafe { OwnedFd::from_raw_fd(raw_fd) })
100}
101
Alan Stokesc4d5def2023-02-14 17:01:59 +0000102fn check_vm_support() -> Result<()> {
103 if hypervisor_props::is_any_vm_supported()? {
104 Ok(())
105 } else {
106 // This should never happen, it indicates a misconfigured device where the virt APEX
107 // is present but VMs are not supported. If it does happen, fail fast to avoid wasting
108 // resources trying.
109 bail!("Device doesn't support protected or non-protected VMs")
110 }
Alan Stokes8d39a9b2023-01-10 15:01:00 +0000111}
112
David Brazdil1f530702022-10-03 12:18:10 +0100113fn main() {
114 android_logger::init_once(
115 android_logger::Config::default()
116 .with_tag(LOG_TAG)
Jeff Vander Stoep57da1572024-01-31 10:52:16 +0100117 .with_max_level(LevelFilter::Info)
118 .with_log_buffer(android_logger::LogId::System),
David Brazdil1f530702022-10-03 12:18:10 +0100119 );
120
Alan Stokesc4d5def2023-02-14 17:01:59 +0000121 check_vm_support().unwrap();
Alan Stokes8d39a9b2023-01-10 15:01:00 +0000122
David Brazdil1f530702022-10-03 12:18:10 +0100123 let args = Args::parse();
124
125 let mut owned_fds = vec![];
126 let rpc_server_fd = take_fd_ownership(args.rpc_server_fd, &mut owned_fds)
127 .expect("Failed to take ownership of rpc_server_fd");
128 let ready_fd = take_fd_ownership(args.ready_fd, &mut owned_fds)
129 .expect("Failed to take ownership of ready_fd");
130
David Brazdil4b4c5102022-12-19 22:56:20 +0000131 // Start thread pool for kernel Binder connection to VirtualizationServiceInternal.
132 ProcessState::start_thread_pool();
133
134 GLOBAL_SERVICE.removeMemlockRlimit().expect("Failed to remove memlock rlimit");
135
David Brazdil1f530702022-10-03 12:18:10 +0100136 let service = VirtualizationService::init();
137 let service =
138 BnVirtualizationService::new_binder(service, BinderFeatures::default()).as_binder();
139
140 let server = RpcServer::new_unix_domain_bootstrap(service, rpc_server_fd)
141 .expect("Failed to start RpcServer");
142 server.set_supported_file_descriptor_transport_modes(&[FileDescriptorTransportMode::Unix]);
143
144 info!("Started VirtualizationService RpcServer. Ready to accept connections");
145
146 // Signal readiness to the caller by closing our end of the pipe.
Seungjae Yoodaf396a2024-04-15 12:58:07 +0900147 write(ready_fd.as_fd(), "o".as_bytes())
148 .expect("Failed to write a single character through ready_fd");
David Brazdil1f530702022-10-03 12:18:10 +0100149 drop(ready_fd);
150
151 server.join();
152 info!("Shutting down VirtualizationService RpcServer");
153}