blob: 05e632b68c4f1b1ad2cafdcd0718c2b9b443ab2d [file] [log] [blame]
Vic Yange01ca4d2019-05-29 15:58:32 -07001/*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "service_utils.h"
18
Tom Cherryf74b7f52019-09-23 16:16:54 -070019#include <fcntl.h>
Vic Yange01ca4d2019-05-29 15:58:32 -070020#include <grp.h>
21#include <sys/mount.h>
22#include <sys/prctl.h>
23#include <sys/wait.h>
Tom Cherryf74b7f52019-09-23 16:16:54 -070024#include <unistd.h>
Vic Yange01ca4d2019-05-29 15:58:32 -070025
26#include <android-base/file.h>
27#include <android-base/logging.h>
28#include <android-base/properties.h>
29#include <android-base/stringprintf.h>
30#include <android-base/strings.h>
Tom Cherry2e4c85f2019-07-09 13:33:36 -070031#include <cutils/android_get_control_file.h>
32#include <cutils/sockets.h>
Vic Yange01ca4d2019-05-29 15:58:32 -070033#include <processgroup/processgroup.h>
34
35#include "mount_namespace.h"
Tom Cherry2e4c85f2019-07-09 13:33:36 -070036#include "util.h"
Vic Yange01ca4d2019-05-29 15:58:32 -070037
38using android::base::GetProperty;
39using android::base::StartsWith;
40using android::base::StringPrintf;
41using android::base::unique_fd;
42using android::base::WriteStringToFile;
43
44namespace android {
45namespace init {
46
47namespace {
48
Tom Cherrybbcbc2f2019-06-10 11:08:01 -070049Result<void> EnterNamespace(int nstype, const char* path) {
Vic Yange01ca4d2019-05-29 15:58:32 -070050 auto fd = unique_fd{open(path, O_RDONLY | O_CLOEXEC)};
51 if (fd == -1) {
52 return ErrnoError() << "Could not open namespace at " << path;
53 }
54 if (setns(fd, nstype) == -1) {
55 return ErrnoError() << "Could not setns() namespace at " << path;
56 }
Tom Cherrybbcbc2f2019-06-10 11:08:01 -070057 return {};
Vic Yange01ca4d2019-05-29 15:58:32 -070058}
59
Tom Cherrybbcbc2f2019-06-10 11:08:01 -070060Result<void> SetUpMountNamespace(bool remount_proc, bool remount_sys) {
Vic Yange01ca4d2019-05-29 15:58:32 -070061 constexpr unsigned int kSafeFlags = MS_NODEV | MS_NOEXEC | MS_NOSUID;
62
63 // Recursively remount / as slave like zygote does so unmounting and mounting /proc
64 // doesn't interfere with the parent namespace's /proc mount. This will also
65 // prevent any other mounts/unmounts initiated by the service from interfering
66 // with the parent namespace but will still allow mount events from the parent
67 // namespace to propagate to the child.
68 if (mount("rootfs", "/", nullptr, (MS_SLAVE | MS_REC), nullptr) == -1) {
69 return ErrnoError() << "Could not remount(/) recursively as slave";
70 }
71
72 // umount() then mount() /proc and/or /sys
73 // Note that it is not sufficient to mount with MS_REMOUNT.
74 if (remount_proc) {
75 if (umount("/proc") == -1) {
76 return ErrnoError() << "Could not umount(/proc)";
77 }
78 if (mount("", "/proc", "proc", kSafeFlags, "") == -1) {
79 return ErrnoError() << "Could not mount(/proc)";
80 }
81 }
82 if (remount_sys) {
83 if (umount2("/sys", MNT_DETACH) == -1) {
84 return ErrnoError() << "Could not umount(/sys)";
85 }
86 if (mount("", "/sys", "sysfs", kSafeFlags, "") == -1) {
87 return ErrnoError() << "Could not mount(/sys)";
88 }
89 }
Tom Cherrybbcbc2f2019-06-10 11:08:01 -070090 return {};
Vic Yange01ca4d2019-05-29 15:58:32 -070091}
92
Tom Cherrybbcbc2f2019-06-10 11:08:01 -070093Result<void> SetUpPidNamespace(const char* name) {
Vic Yange01ca4d2019-05-29 15:58:32 -070094 if (prctl(PR_SET_NAME, name) == -1) {
95 return ErrnoError() << "Could not set name";
96 }
97
98 pid_t child_pid = fork();
99 if (child_pid == -1) {
100 return ErrnoError() << "Could not fork init inside the PID namespace";
101 }
102
103 if (child_pid > 0) {
104 // So that we exit with the right status.
105 static int init_exitstatus = 0;
106 signal(SIGTERM, [](int) { _exit(init_exitstatus); });
107
108 pid_t waited_pid;
109 int status;
110 while ((waited_pid = wait(&status)) > 0) {
111 // This loop will end when there are no processes left inside the
112 // PID namespace or when the init process inside the PID namespace
113 // gets a signal.
114 if (waited_pid == child_pid) {
115 init_exitstatus = status;
116 }
117 }
118 if (!WIFEXITED(init_exitstatus)) {
119 _exit(EXIT_FAILURE);
120 }
121 _exit(WEXITSTATUS(init_exitstatus));
122 }
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700123 return {};
Vic Yange01ca4d2019-05-29 15:58:32 -0700124}
125
Tom Cherryf74b7f52019-09-23 16:16:54 -0700126void SetupStdio(bool stdio_to_kmsg) {
Tom Cherry247ffbf2019-07-08 15:09:36 -0700127 auto fd = unique_fd{open("/dev/null", O_RDWR | O_CLOEXEC)};
Tom Cherryf74b7f52019-09-23 16:16:54 -0700128 dup2(fd, STDIN_FILENO);
129 if (stdio_to_kmsg) {
130 fd.reset(open("/dev/kmsg_debug", O_WRONLY | O_CLOEXEC));
131 if (fd == -1) fd.reset(open("/dev/null", O_WRONLY | O_CLOEXEC));
132 }
133 dup2(fd, STDOUT_FILENO);
134 dup2(fd, STDERR_FILENO);
Vic Yange01ca4d2019-05-29 15:58:32 -0700135}
136
137void OpenConsole(const std::string& console) {
Tom Cherry247ffbf2019-07-08 15:09:36 -0700138 auto fd = unique_fd{open(console.c_str(), O_RDWR | O_CLOEXEC)};
139 if (fd == -1) fd.reset(open("/dev/null", O_RDWR | O_CLOEXEC));
Vic Yange01ca4d2019-05-29 15:58:32 -0700140 ioctl(fd, TIOCSCTTY, 0);
141 dup2(fd, 0);
142 dup2(fd, 1);
143 dup2(fd, 2);
Vic Yange01ca4d2019-05-29 15:58:32 -0700144}
145
Tom Cherry5241d102019-09-10 14:20:35 -0700146} // namespace
147
148void Descriptor::Publish() const {
149 auto published_name = name_;
150
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700151 for (auto& c : published_name) {
152 c = isalnum(c) ? c : '_';
153 }
154
Tom Cherry5241d102019-09-10 14:20:35 -0700155 int fd = fd_.get();
156 // For safety, the FD is created as CLOEXEC, so that must be removed before publishing.
157 auto fd_flags = fcntl(fd, F_GETFD);
158 fd_flags &= ~FD_CLOEXEC;
159 if (fcntl(fd, F_SETFD, fd_flags) != 0) {
160 PLOG(ERROR) << "Failed to remove CLOEXEC from '" << published_name << "'";
161 }
162
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700163 std::string val = std::to_string(fd);
164 setenv(published_name.c_str(), val.c_str(), 1);
165}
166
Tom Cherry5241d102019-09-10 14:20:35 -0700167Result<Descriptor> SocketDescriptor::Create(const std::string& global_context) const {
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700168 const auto& socket_context = context.empty() ? global_context : context;
Tom Cherry5241d102019-09-10 14:20:35 -0700169 auto result = CreateSocket(name, type | SOCK_CLOEXEC, passcred, perm, uid, gid, socket_context);
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900170 if (!result.ok()) {
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700171 return result.error();
172 }
173
Tom Cherry5241d102019-09-10 14:20:35 -0700174 return Descriptor(ANDROID_SOCKET_ENV_PREFIX + name, unique_fd(*result));
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700175}
176
Tom Cherry5241d102019-09-10 14:20:35 -0700177Result<Descriptor> FileDescriptor::Create() const {
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700178 int flags = (type == "r") ? O_RDONLY : (type == "w") ? O_WRONLY : O_RDWR;
179
180 // Make sure we do not block on open (eg: devices can chose to block on carrier detect). Our
181 // intention is never to delay launch of a service for such a condition. The service can
182 // perform its own blocking on carrier detect.
Tom Cherry5241d102019-09-10 14:20:35 -0700183 unique_fd fd(TEMP_FAILURE_RETRY(open(name.c_str(), flags | O_NONBLOCK | O_CLOEXEC)));
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700184
185 if (fd < 0) {
186 return ErrnoError() << "Failed to open file '" << name << "'";
187 }
188
189 // Fixup as we set O_NONBLOCK for open, the intent for fd is to block reads.
190 fcntl(fd, F_SETFL, flags);
191
192 LOG(INFO) << "Opened file '" << name << "', flags " << flags;
193
Tom Cherry5241d102019-09-10 14:20:35 -0700194 return Descriptor(ANDROID_FILE_ENV_PREFIX + name, std::move(fd));
Tom Cherry2e4c85f2019-07-09 13:33:36 -0700195}
196
Jooyung Han4f23d5a2020-06-09 13:44:17 +0900197Result<void> EnterNamespaces(const NamespaceInfo& info, const std::string& name,
198 std::optional<MountNamespace> override_mount_namespace) {
Vic Yange01ca4d2019-05-29 15:58:32 -0700199 for (const auto& [nstype, path] : info.namespaces_to_enter) {
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900200 if (auto result = EnterNamespace(nstype, path.c_str()); !result.ok()) {
Vic Yange01ca4d2019-05-29 15:58:32 -0700201 return result;
202 }
203 }
204
205#if defined(__ANDROID__)
Jooyung Han4f23d5a2020-06-09 13:44:17 +0900206 if (override_mount_namespace.has_value()) {
207 if (auto result = SwitchToMountNamespaceIfNeeded(override_mount_namespace.value());
208 !result.ok()) {
209 return result;
Vic Yange01ca4d2019-05-29 15:58:32 -0700210 }
211 }
212#endif
213
214 if (info.flags & CLONE_NEWNS) {
215 bool remount_proc = info.flags & CLONE_NEWPID;
216 bool remount_sys =
217 std::any_of(info.namespaces_to_enter.begin(), info.namespaces_to_enter.end(),
218 [](const auto& entry) { return entry.first == CLONE_NEWNET; });
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900219 if (auto result = SetUpMountNamespace(remount_proc, remount_sys); !result.ok()) {
Vic Yange01ca4d2019-05-29 15:58:32 -0700220 return result;
221 }
222 }
223
224 if (info.flags & CLONE_NEWPID) {
225 // This will fork again to run an init process inside the PID namespace.
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900226 if (auto result = SetUpPidNamespace(name.c_str()); !result.ok()) {
Vic Yange01ca4d2019-05-29 15:58:32 -0700227 return result;
228 }
229 }
230
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700231 return {};
Vic Yange01ca4d2019-05-29 15:58:32 -0700232}
233
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700234Result<void> SetProcessAttributes(const ProcessAttributes& attr) {
Vic Yange01ca4d2019-05-29 15:58:32 -0700235 if (attr.ioprio_class != IoSchedClass_NONE) {
236 if (android_set_ioprio(getpid(), attr.ioprio_class, attr.ioprio_pri)) {
237 PLOG(ERROR) << "failed to set pid " << getpid() << " ioprio=" << attr.ioprio_class
238 << "," << attr.ioprio_pri;
239 }
240 }
241
242 if (!attr.console.empty()) {
243 setsid();
244 OpenConsole(attr.console);
245 } else {
246 if (setpgid(0, getpid()) == -1) {
247 return ErrnoError() << "setpgid failed";
248 }
Tom Cherryf74b7f52019-09-23 16:16:54 -0700249 SetupStdio(attr.stdio_to_kmsg);
Vic Yange01ca4d2019-05-29 15:58:32 -0700250 }
251
252 for (const auto& rlimit : attr.rlimits) {
253 if (setrlimit(rlimit.first, &rlimit.second) == -1) {
Tom Cherry57b94282020-02-04 15:20:27 -0800254 return ErrnoErrorf("setrlimit({}, {{rlim_cur={}, rlim_max={}}}) failed", rlimit.first,
255 rlimit.second.rlim_cur, rlimit.second.rlim_max);
Vic Yange01ca4d2019-05-29 15:58:32 -0700256 }
257 }
258
259 if (attr.gid) {
260 if (setgid(attr.gid) != 0) {
261 return ErrnoError() << "setgid failed";
262 }
263 }
264 if (setgroups(attr.supp_gids.size(), const_cast<gid_t*>(&attr.supp_gids[0])) != 0) {
265 return ErrnoError() << "setgroups failed";
266 }
267 if (attr.uid) {
268 if (setuid(attr.uid) != 0) {
269 return ErrnoError() << "setuid failed";
270 }
271 }
272
273 if (attr.priority != 0) {
274 if (setpriority(PRIO_PROCESS, 0, attr.priority) != 0) {
275 return ErrnoError() << "setpriority failed";
276 }
277 }
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700278 return {};
Vic Yange01ca4d2019-05-29 15:58:32 -0700279}
280
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700281Result<void> WritePidToFiles(std::vector<std::string>* files) {
Vic Yange01ca4d2019-05-29 15:58:32 -0700282 // See if there were "writepid" instructions to write to files under cpuset path.
283 std::string cpuset_path;
284 if (CgroupGetControllerPath("cpuset", &cpuset_path)) {
285 auto cpuset_predicate = [&cpuset_path](const std::string& path) {
286 return StartsWith(path, cpuset_path + "/");
287 };
288 auto iter = std::find_if(files->begin(), files->end(), cpuset_predicate);
289 if (iter == files->end()) {
290 // There were no "writepid" instructions for cpusets, check if the system default
291 // cpuset is specified to be used for the process.
292 std::string default_cpuset = GetProperty("ro.cpuset.default", "");
293 if (!default_cpuset.empty()) {
294 // Make sure the cpuset name starts and ends with '/'.
295 // A single '/' means the 'root' cpuset.
296 if (default_cpuset.front() != '/') {
297 default_cpuset.insert(0, 1, '/');
298 }
299 if (default_cpuset.back() != '/') {
300 default_cpuset.push_back('/');
301 }
302 files->push_back(
303 StringPrintf("%s%stasks", cpuset_path.c_str(), default_cpuset.c_str()));
304 }
305 }
306 } else {
307 LOG(ERROR) << "cpuset cgroup controller is not mounted!";
308 }
309 std::string pid_str = std::to_string(getpid());
310 for (const auto& file : *files) {
311 if (!WriteStringToFile(pid_str, file)) {
312 return ErrnoError() << "couldn't write " << pid_str << " to " << file;
313 }
314 }
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700315 return {};
Vic Yange01ca4d2019-05-29 15:58:32 -0700316}
317
318} // namespace init
319} // namespace android