blob: 67e22a5b4a89445d632aae897fe8648874ec3f35 [file] [log] [blame]
Victor Hsieh045f1e62021-08-03 12:04:34 -07001/*
2 * Copyright (C) 2021 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//! AuthFsService facilitates authfs mounting (which is a privileged operation) for the client. The
18//! client will provide an `AuthFsConfig` which includes the backend address (only port for now) and
19//! the filesystem configuration. It is up to the client to ensure the backend server is running. On
20//! a successful mount, the client receives an `IAuthFs`, and through the binder object, the client
21//! is able to retrieve "remote file descriptors".
22
23mod authfs;
Victor Hsieh045f1e62021-08-03 12:04:34 -070024
Alice Wang15ae7b92022-10-24 14:36:59 +000025use anyhow::{bail, Result};
Victor Hsieh045f1e62021-08-03 12:04:34 -070026use log::*;
David Brazdil671e6142022-11-16 11:47:27 +000027use rpcbinder::RpcServer;
Alice Wangfd222fd2023-05-25 09:37:38 +000028use rustutils::sockets::android_get_control_socket;
Victor Hsieh045f1e62021-08-03 12:04:34 -070029use std::ffi::OsString;
30use std::fs::{create_dir, read_dir, remove_dir_all, remove_file};
Alice Wangfd222fd2023-05-25 09:37:38 +000031use std::os::unix::io::{FromRawFd, OwnedFd};
Victor Hsieh045f1e62021-08-03 12:04:34 -070032use std::sync::atomic::{AtomicUsize, Ordering};
33
Victor Hsieh045f1e62021-08-03 12:04:34 -070034use authfs_aidl_interface::aidl::com::android::virt::fs::AuthFsConfig::AuthFsConfig;
35use authfs_aidl_interface::aidl::com::android::virt::fs::IAuthFs::IAuthFs;
36use authfs_aidl_interface::aidl::com::android::virt::fs::IAuthFsService::{
Alice Wang15ae7b92022-10-24 14:36:59 +000037 BnAuthFsService, IAuthFsService, AUTHFS_SERVICE_SOCKET_NAME,
Victor Hsieh045f1e62021-08-03 12:04:34 -070038};
Alice Wang15ae7b92022-10-24 14:36:59 +000039use binder::{self, BinderFeatures, ExceptionCode, Interface, Status, Strong};
Victor Hsieh045f1e62021-08-03 12:04:34 -070040
Victor Hsieh8bb67b62021-08-04 12:10:58 -070041const SERVICE_ROOT: &str = "/data/misc/authfs";
Victor Hsieh045f1e62021-08-03 12:04:34 -070042
43/// Implementation of `IAuthFsService`.
44pub struct AuthFsService {
45 serial_number: AtomicUsize,
46 debuggable: bool,
47}
48
49impl Interface for AuthFsService {}
50
51impl IAuthFsService for AuthFsService {
52 fn mount(&self, config: &AuthFsConfig) -> binder::Result<Strong<dyn IAuthFs>> {
53 self.validate(config)?;
54
55 let mountpoint = self.get_next_mount_point();
56
57 // The directory is supposed to be deleted when `AuthFs` is dropped.
58 create_dir(&mountpoint).map_err(|e| {
Andrew Walbrandcf9d582022-08-03 11:25:24 +000059 Status::new_service_specific_error_str(
60 -1,
61 Some(format!("Cannot create mount directory {:?}: {:?}", &mountpoint, e)),
Victor Hsieh045f1e62021-08-03 12:04:34 -070062 )
63 })?;
64
65 authfs::AuthFs::mount_and_wait(mountpoint, config, self.debuggable).map_err(|e| {
Andrew Walbrandcf9d582022-08-03 11:25:24 +000066 Status::new_service_specific_error_str(
67 -1,
68 Some(format!("mount_and_wait failed: {:?}", e)),
Victor Hsieh045f1e62021-08-03 12:04:34 -070069 )
70 })
71 }
72}
73
74impl AuthFsService {
75 fn new_binder(debuggable: bool) -> Strong<dyn IAuthFsService> {
76 let service = AuthFsService { serial_number: AtomicUsize::new(1), debuggable };
77 BnAuthFsService::new_binder(service, BinderFeatures::default())
78 }
79
80 fn validate(&self, config: &AuthFsConfig) -> binder::Result<()> {
81 if config.port < 0 {
Andrew Walbrandcf9d582022-08-03 11:25:24 +000082 return Err(Status::new_exception_str(
Victor Hsieh045f1e62021-08-03 12:04:34 -070083 ExceptionCode::ILLEGAL_ARGUMENT,
Andrew Walbrandcf9d582022-08-03 11:25:24 +000084 Some(format!("Invalid port: {}", config.port)),
Victor Hsieh045f1e62021-08-03 12:04:34 -070085 ));
86 }
87 Ok(())
88 }
89
90 fn get_next_mount_point(&self) -> OsString {
91 let previous = self.serial_number.fetch_add(1, Ordering::Relaxed);
92 OsString::from(format!("{}/{}", SERVICE_ROOT, previous))
93 }
94}
95
96fn clean_up_working_directory() -> Result<()> {
97 for entry in read_dir(SERVICE_ROOT)? {
98 let entry = entry?;
99 let path = entry.path();
100 if path.is_dir() {
101 remove_dir_all(path)?;
102 } else if path.is_file() {
103 remove_file(path)?;
104 } else {
105 bail!("Unrecognized path type: {:?}", path);
106 }
107 }
108 Ok(())
109}
110
Alice Wangfd222fd2023-05-25 09:37:38 +0000111/// Prepares a socket file descriptor for the authfs service.
112///
113/// # Safety requirement
114///
115/// The caller must ensure that this function is the only place that claims ownership
116/// of the file descriptor and it is called only once.
117unsafe fn prepare_authfs_service_socket() -> Result<OwnedFd> {
118 let raw_fd = android_get_control_socket(AUTHFS_SERVICE_SOCKET_NAME)?;
119
120 // Creating OwnedFd for stdio FDs is not safe.
121 if [libc::STDIN_FILENO, libc::STDOUT_FILENO, libc::STDERR_FILENO].contains(&raw_fd) {
122 bail!("File descriptor {raw_fd} is standard I/O descriptor");
123 }
124 // SAFETY: Initializing OwnedFd for a RawFd created by the init.
125 // We checked that the integer value corresponds to a valid FD and that the caller
126 // ensures that this is the only place to claim its ownership.
127 Ok(unsafe { OwnedFd::from_raw_fd(raw_fd) })
128}
129
Charisee484cead2023-11-30 04:24:10 +0000130#[allow(clippy::eq_op)]
Alan Stokese1b6e1c2021-10-01 12:44:49 +0100131fn try_main() -> Result<()> {
Victor Hsieh045f1e62021-08-03 12:04:34 -0700132 let debuggable = env!("TARGET_BUILD_VARIANT") != "user";
133 let log_level = if debuggable { log::Level::Trace } else { log::Level::Info };
134 android_logger::init_once(
135 android_logger::Config::default().with_tag("authfs_service").with_min_level(log_level),
136 );
137
138 clean_up_working_directory()?;
139
Alice Wangfd222fd2023-05-25 09:37:38 +0000140 // SAFETY: This is the only place we take the ownership of the fd of the authfs service.
141 let socket_fd = unsafe { prepare_authfs_service_socket()? };
Victor Hsieh045f1e62021-08-03 12:04:34 -0700142 let service = AuthFsService::new_binder(debuggable).as_binder();
Alice Wang15ae7b92022-10-24 14:36:59 +0000143 debug!("{} is starting as a rpc service.", AUTHFS_SERVICE_SOCKET_NAME);
Alice Wangfd222fd2023-05-25 09:37:38 +0000144 let server = RpcServer::new_bound_socket(service, socket_fd)?;
David Brazdil671e6142022-11-16 11:47:27 +0000145 info!("The RPC server '{}' is running.", AUTHFS_SERVICE_SOCKET_NAME);
146 server.join();
147 info!("The RPC server at '{}' has shut down gracefully.", AUTHFS_SERVICE_SOCKET_NAME);
148 Ok(())
Victor Hsieh045f1e62021-08-03 12:04:34 -0700149}
Alan Stokese1b6e1c2021-10-01 12:44:49 +0100150
151fn main() {
152 if let Err(e) = try_main() {
153 error!("failed with {:?}", e);
154 std::process::exit(1);
155 }
156}