xref: /aosp_15_r20/frameworks/native/cmds/installd/installd.cpp (revision 38e8c45f13ce32b0dcecb25141ffecaf386fa17f)
1 /*
2 ** Copyright 2008, The Android Open Source Project
3 **
4 ** Licensed under the Apache License, Version 2.0 (the "License");
5 ** you may not use this file except in compliance with the License.
6 ** You may obtain a copy of the License at
7 **
8 **     http://www.apache.org/licenses/LICENSE-2.0
9 **
10 ** Unless required by applicable law or agreed to in writing, software
11 ** distributed under the License is distributed on an "AS IS" BASIS,
12 ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 ** See the License for the specific language governing permissions and
14 ** limitations under the License.
15 */
16 #define LOG_TAG "installd"
17 
18 #include <fcntl.h>
19 #include <selinux/android.h>
20 #include <selinux/avc.h>
21 #include <sys/capability.h>
22 #include <sys/fsuid.h>
23 #include <sys/prctl.h>
24 #include <sys/stat.h>
25 
26 #include <android-base/logging.h>
27 #include <cutils/fs.h>
28 #include <cutils/properties.h>
29 #include <log/log.h>              // TODO: Move everything to base::logging.
30 #include <private/android_filesystem_config.h>
31 
32 #include "InstalldNativeService.h"
33 #include "dexopt.h"
34 #include "globals.h"
35 #include "installd_constants.h"
36 #include "installd_deps.h"  // Need to fill in requirements of commands.
37 #include "utils.h"
38 
39 namespace android {
40 namespace installd {
41 
42 // Check that installd-deps sizes match cutils sizes.
43 static_assert(kPropertyKeyMax == PROPERTY_KEY_MAX, "Size mismatch.");
44 static_assert(kPropertyValueMax == PROPERTY_VALUE_MAX, "Size mismatch.");
45 
46 ////////////////////////
47 // Plug-in functions. //
48 ////////////////////////
49 
get_property(const char * key,char * value,const char * default_value)50 int get_property(const char *key, char *value, const char *default_value) {
51     return property_get(key, value, default_value);
52 }
53 
calculate_oat_file_path(char path[PKG_PATH_MAX],const char * oat_dir,const char * apk_path,const char * instruction_set)54 bool calculate_oat_file_path(char path[PKG_PATH_MAX], const char *oat_dir, const char *apk_path,
55         const char *instruction_set) {
56     return calculate_oat_file_path_default(path, oat_dir, apk_path, instruction_set);
57 }
58 
calculate_odex_file_path(char path[PKG_PATH_MAX],const char * apk_path,const char * instruction_set)59 bool calculate_odex_file_path(char path[PKG_PATH_MAX], const char *apk_path,
60         const char *instruction_set) {
61     return calculate_odex_file_path_default(path, apk_path, instruction_set);
62 }
63 
create_cache_path(char path[PKG_PATH_MAX],const char * src,const char * instruction_set)64 bool create_cache_path(char path[PKG_PATH_MAX], const char *src, const char *instruction_set) {
65     return create_cache_path_default(path, src, instruction_set);
66 }
67 
force_compile_without_image()68 bool force_compile_without_image() {
69     return false;
70 }
71 
initialize_globals()72 static bool initialize_globals() {
73     return init_globals_from_data_and_root();
74 }
75 
initialize_directories()76 static int initialize_directories() {
77     int res = -1;
78 
79     // Read current filesystem layout version to handle upgrade paths
80     char version_path[PATH_MAX];
81     snprintf(version_path, PATH_MAX, "%smisc/installd/layout_version", android_data_dir.c_str());
82 
83     int oldVersion;
84     if (fs_read_atomic_int(version_path, &oldVersion) == -1) {
85         oldVersion = 0;
86     }
87     int version = oldVersion;
88 
89     if (version < 2) {
90         SLOGD("Assuming that device has multi-user storage layout; upgrade no longer supported");
91         version = 2;
92     }
93 
94     if (ensure_config_user_dirs(0) == -1) {
95         SLOGE("Failed to setup misc for user 0");
96         goto fail;
97     }
98 
99     if (version == 2) {
100         SLOGD("Upgrading to /data/misc/user directories");
101 
102         char misc_dir[PATH_MAX];
103         snprintf(misc_dir, PATH_MAX, "%smisc", android_data_dir.c_str());
104 
105         char keychain_added_dir[PATH_MAX];
106         snprintf(keychain_added_dir, PATH_MAX, "%s/keychain/cacerts-added", misc_dir);
107 
108         char keychain_removed_dir[PATH_MAX];
109         snprintf(keychain_removed_dir, PATH_MAX, "%s/keychain/cacerts-removed", misc_dir);
110 
111         DIR *dir;
112         struct dirent *dirent;
113         dir = opendir("/data/user");
114         if (dir != nullptr) {
115             while ((dirent = readdir(dir))) {
116                 const char *name = dirent->d_name;
117 
118                 // skip "." and ".."
119                 if (name[0] == '.') {
120                     if (name[1] == 0) continue;
121                     if ((name[1] == '.') && (name[2] == 0)) continue;
122                 }
123 
124                 uint32_t user_id = std::stoi(name);
125 
126                 // /data/misc/user/<user_id>
127                 if (ensure_config_user_dirs(user_id) == -1) {
128                     goto fail;
129                 }
130 
131                 char misc_added_dir[PATH_MAX];
132                 snprintf(misc_added_dir, PATH_MAX, "%s/user/%s/cacerts-added", misc_dir, name);
133 
134                 char misc_removed_dir[PATH_MAX];
135                 snprintf(misc_removed_dir, PATH_MAX, "%s/user/%s/cacerts-removed", misc_dir, name);
136 
137                 uid_t uid = multiuser_get_uid(user_id, AID_SYSTEM);
138                 gid_t gid = uid;
139                 if (access(keychain_added_dir, F_OK) == 0) {
140                     if (copy_dir_files(keychain_added_dir, misc_added_dir, uid, gid) != 0) {
141                         SLOGE("Some files failed to copy");
142                     }
143                 }
144                 if (access(keychain_removed_dir, F_OK) == 0) {
145                     if (copy_dir_files(keychain_removed_dir, misc_removed_dir, uid, gid) != 0) {
146                         SLOGE("Some files failed to copy");
147                     }
148                 }
149             }
150             closedir(dir);
151 
152             if (access(keychain_added_dir, F_OK) == 0) {
153                 delete_dir_contents(keychain_added_dir, 1, nullptr);
154             }
155             if (access(keychain_removed_dir, F_OK) == 0) {
156                 delete_dir_contents(keychain_removed_dir, 1, nullptr);
157             }
158         }
159 
160         version = 3;
161     }
162 
163     // Persist layout version if changed
164     if (version != oldVersion) {
165         if (fs_write_atomic_int(version_path, version) == -1) {
166             SLOGE("Failed to save version to %s: %s", version_path, strerror(errno));
167             goto fail;
168         }
169     }
170 
171     // Success!
172     res = 0;
173 
174 fail:
175     return res;
176 }
177 
log_callback(int type,const char * fmt,...)178 static int log_callback(int type, const char *fmt, ...) { // NOLINT
179     va_list ap;
180     int priority;
181 
182     switch (type) {
183     case SELINUX_WARNING:
184         priority = ANDROID_LOG_WARN;
185         break;
186     case SELINUX_INFO:
187         priority = ANDROID_LOG_INFO;
188         break;
189     default:
190         priority = ANDROID_LOG_ERROR;
191         break;
192     }
193     va_start(ap, fmt);
194     LOG_PRI_VA(priority, "SELinux", fmt, ap);
195     va_end(ap);
196     return 0;
197 }
198 
installd_main(const int argc ATTRIBUTE_UNUSED,char * argv[])199 static int installd_main(const int argc ATTRIBUTE_UNUSED, char *argv[]) {
200     int ret;
201     int selinux_enabled = (is_selinux_enabled() > 0);
202 
203     setenv("ANDROID_LOG_TAGS", "*:v", 1);
204     android::base::InitLogging(argv);
205 
206     SLOGI("installd firing up");
207 
208     union selinux_callback cb;
209     cb.func_log = log_callback;
210     selinux_set_callback(SELINUX_CB_LOG, cb);
211 
212     if (!initialize_globals()) {
213         SLOGE("Could not initialize globals; exiting.\n");
214         exit(1);
215     }
216 
217     if (initialize_directories() < 0) {
218         SLOGE("Could not create directories; exiting.\n");
219         exit(1);
220     }
221 
222     if (selinux_enabled && selinux_status_open(true) < 0) {
223         SLOGE("Could not open selinux status; exiting.\n");
224         exit(1);
225     }
226 
227     if ((ret = InstalldNativeService::start()) != android::OK) {
228         SLOGE("Unable to start InstalldNativeService: %d", ret);
229         exit(1);
230     }
231 
232     IPCThreadState::self()->joinThreadPool();
233 
234     LOG(INFO) << "installd shutting down";
235 
236     return 0;
237 }
238 
239 }  // namespace installd
240 }  // namespace android
241 
main(const int argc,char * argv[])242 int main(const int argc, char *argv[]) {
243     return android::installd::installd_main(argc, argv);
244 }
245