1 /*
2 ** Copyright 2008, The Android Open Source Project
3 **
4 ** Licensed under the Apache License, Version 2.0 (the "License");
5 ** you may not use this file except in compliance with the License.
6 ** You may obtain a copy of the License at
7 **
8 ** http://www.apache.org/licenses/LICENSE-2.0
9 **
10 ** Unless required by applicable law or agreed to in writing, software
11 ** distributed under the License is distributed on an "AS IS" BASIS,
12 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 ** See the License for the specific language governing permissions and
14 ** limitations under the License.
15 */
16 #define LOG_TAG "installd"
17
18 #include <fcntl.h>
19 #include <selinux/android.h>
20 #include <selinux/avc.h>
21 #include <sys/capability.h>
22 #include <sys/fsuid.h>
23 #include <sys/prctl.h>
24 #include <sys/stat.h>
25
26 #include <android-base/logging.h>
27 #include <cutils/fs.h>
28 #include <cutils/properties.h>
29 #include <log/log.h> // TODO: Move everything to base::logging.
30 #include <private/android_filesystem_config.h>
31
32 #include "InstalldNativeService.h"
33 #include "dexopt.h"
34 #include "globals.h"
35 #include "installd_constants.h"
36 #include "installd_deps.h" // Need to fill in requirements of commands.
37 #include "utils.h"
38
39 namespace android {
40 namespace installd {
41
42 // Check that installd-deps sizes match cutils sizes.
43 static_assert(kPropertyKeyMax == PROPERTY_KEY_MAX, "Size mismatch.");
44 static_assert(kPropertyValueMax == PROPERTY_VALUE_MAX, "Size mismatch.");
45
46 ////////////////////////
47 // Plug-in functions. //
48 ////////////////////////
49
get_property(const char * key,char * value,const char * default_value)50 int get_property(const char *key, char *value, const char *default_value) {
51 return property_get(key, value, default_value);
52 }
53
calculate_oat_file_path(char path[PKG_PATH_MAX],const char * oat_dir,const char * apk_path,const char * instruction_set)54 bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir, const char *apk_path,
55 const char *instruction_set) {
56 return calculate_oat_file_path_default(path, oat_dir, apk_path, instruction_set);
57 }
58
calculate_odex_file_path(char path[PKG_PATH_MAX],const char * apk_path,const char * instruction_set)59 bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
60 const char *instruction_set) {
61 return calculate_odex_file_path_default(path, apk_path, instruction_set);
62 }
63
create_cache_path(char path[PKG_PATH_MAX],const char * src,const char * instruction_set)64 bool create_cache_path(char path[PKG_PATH_MAX], const char *src, const char *instruction_set) {
65 return create_cache_path_default(path, src, instruction_set);
66 }
67
force_compile_without_image()68 bool force_compile_without_image() {
69 return false;
70 }
71
initialize_globals()72 static bool initialize_globals() {
73 return init_globals_from_data_and_root();
74 }
75
initialize_directories()76 static int initialize_directories() {
77 int res = -1;
78
79 // Read current filesystem layout version to handle upgrade paths
80 char version_path[PATH_MAX];
81 snprintf(version_path, PATH_MAX, "%smisc/installd/layout_version", android_data_dir.c_str());
82
83 int oldVersion;
84 if (fs_read_atomic_int(version_path, &oldVersion) == -1) {
85 oldVersion = 0;
86 }
87 int version = oldVersion;
88
89 if (version < 2) {
90 SLOGD("Assuming that device has multi-user storage layout; upgrade no longer supported");
91 version = 2;
92 }
93
94 if (ensure_config_user_dirs(0) == -1) {
95 SLOGE("Failed to setup misc for user 0");
96 goto fail;
97 }
98
99 if (version == 2) {
100 SLOGD("Upgrading to /data/misc/user directories");
101
102 char misc_dir[PATH_MAX];
103 snprintf(misc_dir, PATH_MAX, "%smisc", android_data_dir.c_str());
104
105 char keychain_added_dir[PATH_MAX];
106 snprintf(keychain_added_dir, PATH_MAX, "%s/keychain/cacerts-added", misc_dir);
107
108 char keychain_removed_dir[PATH_MAX];
109 snprintf(keychain_removed_dir, PATH_MAX, "%s/keychain/cacerts-removed", misc_dir);
110
111 DIR *dir;
112 struct dirent *dirent;
113 dir = opendir("/data/user");
114 if (dir != nullptr) {
115 while ((dirent = readdir(dir))) {
116 const char *name = dirent->d_name;
117
118 // skip "." and ".."
119 if (name[0] == '.') {
120 if (name[1] == 0) continue;
121 if ((name[1] == '.') && (name[2] == 0)) continue;
122 }
123
124 uint32_t user_id = std::stoi(name);
125
126 // /data/misc/user/<user_id>
127 if (ensure_config_user_dirs(user_id) == -1) {
128 goto fail;
129 }
130
131 char misc_added_dir[PATH_MAX];
132 snprintf(misc_added_dir, PATH_MAX, "%s/user/%s/cacerts-added", misc_dir, name);
133
134 char misc_removed_dir[PATH_MAX];
135 snprintf(misc_removed_dir, PATH_MAX, "%s/user/%s/cacerts-removed", misc_dir, name);
136
137 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM);
138 gid_t gid = uid;
139 if (access(keychain_added_dir, F_OK) == 0) {
140 if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) {
141 SLOGE("Some files failed to copy");
142 }
143 }
144 if (access(keychain_removed_dir, F_OK) == 0) {
145 if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gid) != 0) {
146 SLOGE("Some files failed to copy");
147 }
148 }
149 }
150 closedir(dir);
151
152 if (access(keychain_added_dir, F_OK) == 0) {
153 delete_dir_contents(keychain_added_dir, 1, nullptr);
154 }
155 if (access(keychain_removed_dir, F_OK) == 0) {
156 delete_dir_contents(keychain_removed_dir, 1, nullptr);
157 }
158 }
159
160 version = 3;
161 }
162
163 // Persist layout version if changed
164 if (version != oldVersion) {
165 if (fs_write_atomic_int(version_path, version) == -1) {
166 SLOGE("Failed to save version to %s: %s", version_path, strerror(errno));
167 goto fail;
168 }
169 }
170
171 // Success!
172 res = 0;
173
174 fail:
175 return res;
176 }
177
log_callback(int type,const char * fmt,...)178 static int log_callback(int type, const char *fmt, ...) { // NOLINT
179 va_list ap;
180 int priority;
181
182 switch (type) {
183 case SELINUX_WARNING:
184 priority = ANDROID_LOG_WARN;
185 break;
186 case SELINUX_INFO:
187 priority = ANDROID_LOG_INFO;
188 break;
189 default:
190 priority = ANDROID_LOG_ERROR;
191 break;
192 }
193 va_start(ap, fmt);
194 LOG_PRI_VA(priority, "SELinux", fmt, ap);
195 va_end(ap);
196 return 0;
197 }
198
installd_main(const int argc ATTRIBUTE_UNUSED,char * argv[])199 static int installd_main(const int argc ATTRIBUTE_UNUSED, char *argv[]) {
200 int ret;
201 int selinux_enabled = (is_selinux_enabled() > 0);
202
203 setenv("ANDROID_LOG_TAGS", "*:v", 1);
204 android::base::InitLogging(argv);
205
206 SLOGI("installd firing up");
207
208 union selinux_callback cb;
209 cb.func_log = log_callback;
210 selinux_set_callback(SELINUX_CB_LOG, cb);
211
212 if (!initialize_globals()) {
213 SLOGE("Could not initialize globals; exiting.\n");
214 exit(1);
215 }
216
217 if (initialize_directories() < 0) {
218 SLOGE("Could not create directories; exiting.\n");
219 exit(1);
220 }
221
222 if (selinux_enabled && selinux_status_open(true) < 0) {
223 SLOGE("Could not open selinux status; exiting.\n");
224 exit(1);
225 }
226
227 if ((ret = InstalldNativeService::start()) != android::OK) {
228 SLOGE("Unable to start InstalldNativeService: %d", ret);
229 exit(1);
230 }
231
232 IPCThreadState::self()->joinThreadPool();
233
234 LOG(INFO) << "installd shutting down";
235
236 return 0;
237 }
238
239 } // namespace installd
240 } // namespace android
241
main(const int argc,char * argv[])242 int main(const int argc, char *argv[]) {
243 return android::installd::installd_main(argc, argv);
244 }
245