blob: 714bcfd62cc69ac19a2b84c4e261348a45d63c80 [file] [log] [blame]
Andrew Walbranb12a43e2020-11-10 14:22:42 +00001// Copyright 2021, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
Andrew Walbranf6bf6862021-05-21 12:41:13 +000015//! Android VirtualizationService
Andrew Walbranb12a43e2020-11-10 14:22:42 +000016
Andrew Walbrand6dce6f2021-03-05 16:39:08 +000017mod aidl;
Seungjae Yoo0a8c84c2022-07-11 08:19:15 +000018mod atom;
Andrew Walbranf5fbb7d2021-05-12 17:15:48 +000019mod composite;
Andrew Walbrand6dce6f2021-03-05 16:39:08 +000020mod crosvm;
Jooyung Han21e9b922021-06-26 04:14:16 +090021mod payload;
Jiyong Park029977d2021-11-24 21:56:49 +090022mod selinux;
Andrew Walbrand6dce6f2021-03-05 16:39:08 +000023
Andrew Walbran488bd072021-07-14 13:29:51 +000024use crate::aidl::{VirtualizationService, BINDER_SERVICE_IDENTIFIER, TEMPORARY_DIRECTORY};
Jiyong Park6c60fea2022-10-24 16:10:01 +090025use android_logger::{Config, FilterBuilder};
Andrew Walbranf6bf6862021-05-21 12:41:13 +000026use android_system_virtualizationservice::aidl::android::system::virtualizationservice::IVirtualizationService::BnVirtualizationService;
David Brazdil533e3432022-10-28 14:06:49 +010027use anyhow::{bail, Context, Error};
Alan Stokes0e82b502022-08-08 14:44:48 +010028use binder::{register_lazy_service, BinderFeatures, ProcessState};
Andrew Walbranbf1fb042021-03-15 16:54:09 +000029use log::{info, Level};
Andrew Walbran488bd072021-07-14 13:29:51 +000030use std::fs::{remove_dir_all, remove_file, read_dir};
Andrew Walbranb12a43e2020-11-10 14:22:42 +000031
Andrew Walbranf6bf6862021-05-21 12:41:13 +000032const LOG_TAG: &str = "VirtualizationService";
Andrew Walbranbf1fb042021-03-15 16:54:09 +000033
Andrew Walbranb12a43e2020-11-10 14:22:42 +000034fn main() {
Andrew Walbran0909bc52021-03-17 12:11:56 +000035 android_logger::init_once(
Jiyong Park6c60fea2022-10-24 16:10:01 +090036 Config::default()
Alan Stokes9c069a42022-02-25 16:10:23 +000037 .with_tag(LOG_TAG)
38 .with_min_level(Level::Info)
Jiyong Park6c60fea2022-10-24 16:10:01 +090039 .with_log_id(android_logger::LogId::System)
40 .with_filter(
41 // Reduce logspam by silencing logs from the disk crate which don't provide much
42 // information to us.
43 FilterBuilder::new().parse("info,disk=off").build(),
44 ),
Andrew Walbran0909bc52021-03-17 12:11:56 +000045 );
Andrew Walbranbf1fb042021-03-15 16:54:09 +000046
David Brazdil533e3432022-10-28 14:06:49 +010047 remove_memlock_rlimit().expect("Failed to remove memlock rlimit");
Andrew Walbran488bd072021-07-14 13:29:51 +000048 clear_temporary_files().expect("Failed to delete old temporary files");
49
Jiyong Park8611a6c2021-07-09 18:17:44 +090050 let service = VirtualizationService::init();
David Brazdil2d967202022-10-05 13:01:03 +010051 let service = BnVirtualizationService::new_binder(service, BinderFeatures::default());
Alan Stokes7e54e292021-09-09 11:37:56 +010052 register_lazy_service(BINDER_SERVICE_IDENTIFIER, service.as_binder()).unwrap();
Andrew Walbranb12a43e2020-11-10 14:22:42 +000053 info!("Registered Binder service, joining threadpool.");
Andrew Walbrand6dce6f2021-03-05 16:39:08 +000054 ProcessState::join_thread_pool();
Andrew Walbranb12a43e2020-11-10 14:22:42 +000055}
Andrew Walbran488bd072021-07-14 13:29:51 +000056
David Brazdil533e3432022-10-28 14:06:49 +010057/// Set this PID's RLIMIT_MEMLOCK to RLIM_INFINITY to allow crosvm (a child process) to mlock()
58/// arbitrary amounts of memory. This is necessary for spawning protected VMs.
59fn remove_memlock_rlimit() -> Result<(), Error> {
60 let lim = libc::rlimit { rlim_cur: libc::RLIM_INFINITY, rlim_max: libc::RLIM_INFINITY };
61 // SAFETY - borrowing the new limit struct only
62 match unsafe { libc::setrlimit(libc::RLIMIT_MEMLOCK, &lim) } {
63 0 => Ok(()),
64 -1 => Err(std::io::Error::last_os_error()).context("setrlimit failed"),
65 n => bail!("Unexpected return value from setrlimit(): {}", n),
66 }
67}
68
Andrew Walbran488bd072021-07-14 13:29:51 +000069/// Remove any files under `TEMPORARY_DIRECTORY`.
70fn clear_temporary_files() -> Result<(), Error> {
71 for dir_entry in read_dir(TEMPORARY_DIRECTORY)? {
72 let dir_entry = dir_entry?;
73 let path = dir_entry.path();
74 if dir_entry.file_type()?.is_dir() {
75 remove_dir_all(path)?;
76 } else {
77 remove_file(path)?;
78 }
79 }
80 Ok(())
81}