blob: 90b4789af6d165025a8da2b1e58cc504acc29ac6 [file] [log] [blame]
David Brazdil1f530702022-10-03 12:18:10 +01001// Copyright 2022, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15//! Android Virtualization Manager
16
17mod aidl;
18mod atom;
19mod composite;
20mod crosvm;
21mod payload;
22mod selinux;
23
David Brazdil4b4c5102022-12-19 22:56:20 +000024use crate::aidl::{GLOBAL_SERVICE, VirtualizationService};
David Brazdil1f530702022-10-03 12:18:10 +010025use android_system_virtualizationservice::aidl::android::system::virtualizationservice::IVirtualizationService::BnVirtualizationService;
26use anyhow::{bail, Context};
David Brazdil4b4c5102022-12-19 22:56:20 +000027use binder::{BinderFeatures, ProcessState};
David Brazdil1f530702022-10-03 12:18:10 +010028use lazy_static::lazy_static;
29use log::{info, Level};
30use rpcbinder::{FileDescriptorTransportMode, RpcServer};
31use std::os::unix::io::{FromRawFd, OwnedFd, RawFd};
32use clap::Parser;
33use nix::unistd::{Pid, Uid};
34use std::os::unix::raw::{pid_t, uid_t};
35
36const LOG_TAG: &str = "virtmgr";
37
38lazy_static! {
39 static ref PID_PARENT: Pid = Pid::parent();
40 static ref UID_CURRENT: Uid = Uid::current();
41}
42
43fn get_calling_pid() -> pid_t {
44 // The caller is the parent of this process.
45 PID_PARENT.as_raw()
46}
47
48fn get_calling_uid() -> uid_t {
49 // The caller and this process share the same UID.
50 UID_CURRENT.as_raw()
51}
52
53#[derive(Parser)]
54struct Args {
55 /// File descriptor inherited from the caller to run RpcBinder server on.
56 /// This should be one end of a socketpair() compatible with RpcBinder's
57 /// UDS bootstrap transport.
58 #[clap(long)]
59 rpc_server_fd: RawFd,
60 /// File descriptor inherited from the caller to signal RpcBinder server
61 /// readiness. This should be one end of pipe() and the caller should be
62 /// waiting for HUP on the other end.
63 #[clap(long)]
64 ready_fd: RawFd,
65}
66
67fn take_fd_ownership(raw_fd: RawFd, owned_fds: &mut Vec<RawFd>) -> Result<OwnedFd, anyhow::Error> {
68 // Basic check that the integer value does correspond to a file descriptor.
69 nix::fcntl::fcntl(raw_fd, nix::fcntl::F_GETFD)
70 .with_context(|| format!("Invalid file descriptor {raw_fd}"))?;
71
72 // Creating OwnedFd for stdio FDs is not safe.
73 if [libc::STDIN_FILENO, libc::STDOUT_FILENO, libc::STDERR_FILENO].contains(&raw_fd) {
74 bail!("File descriptor {raw_fd} is standard I/O descriptor");
75 }
76
77 // Reject RawFds that already have a corresponding OwnedFd.
78 if owned_fds.contains(&raw_fd) {
79 bail!("File descriptor {raw_fd} already owned");
80 }
81 owned_fds.push(raw_fd);
82
83 // SAFETY - Initializing OwnedFd for a RawFd provided in cmdline arguments.
84 // We checked that the integer value corresponds to a valid FD and that this
85 // is the first argument to claim its ownership.
86 Ok(unsafe { OwnedFd::from_raw_fd(raw_fd) })
87}
88
89fn main() {
90 android_logger::init_once(
91 android_logger::Config::default()
92 .with_tag(LOG_TAG)
93 .with_min_level(Level::Info)
94 .with_log_id(android_logger::LogId::System),
95 );
96
97 let args = Args::parse();
98
99 let mut owned_fds = vec![];
100 let rpc_server_fd = take_fd_ownership(args.rpc_server_fd, &mut owned_fds)
101 .expect("Failed to take ownership of rpc_server_fd");
102 let ready_fd = take_fd_ownership(args.ready_fd, &mut owned_fds)
103 .expect("Failed to take ownership of ready_fd");
104
David Brazdil4b4c5102022-12-19 22:56:20 +0000105 // Start thread pool for kernel Binder connection to VirtualizationServiceInternal.
106 ProcessState::start_thread_pool();
107
108 GLOBAL_SERVICE.removeMemlockRlimit().expect("Failed to remove memlock rlimit");
109
David Brazdil1f530702022-10-03 12:18:10 +0100110 let service = VirtualizationService::init();
111 let service =
112 BnVirtualizationService::new_binder(service, BinderFeatures::default()).as_binder();
113
114 let server = RpcServer::new_unix_domain_bootstrap(service, rpc_server_fd)
115 .expect("Failed to start RpcServer");
116 server.set_supported_file_descriptor_transport_modes(&[FileDescriptorTransportMode::Unix]);
117
118 info!("Started VirtualizationService RpcServer. Ready to accept connections");
119
120 // Signal readiness to the caller by closing our end of the pipe.
121 drop(ready_fd);
122
123 server.join();
124 info!("Shutting down VirtualizationService RpcServer");
125}