San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2008 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 17 | #include <dirent.h> |
| 18 | #include <errno.h> |
| 19 | #include <fcntl.h> |
| 20 | #include <signal.h> |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 21 | #include <stdio.h> |
| 22 | #include <stdlib.h> |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 23 | #include <string.h> |
| 24 | #include <sys/stat.h> |
| 25 | #include <sys/types.h> |
San Mehat | 5c1b8af | 2010-01-21 15:37:10 -0800 | [diff] [blame] | 26 | #include <sys/wait.h> |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 27 | #include <chrono> |
| 28 | #include <cinttypes> |
| 29 | #include <mutex> |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 30 | |
| 31 | #define LOG_TAG "Netd" |
| 32 | |
Logan Chien | 3f46148 | 2018-04-23 14:31:32 +0800 | [diff] [blame] | 33 | #include "log/log.h" |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 34 | |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 35 | #include <android/binder_manager.h> |
| 36 | #include <android/binder_process.h> |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 37 | #include <binder/IPCThreadState.h> |
| 38 | #include <binder/IServiceManager.h> |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 39 | #include <hidl/HidlTransportSupport.h> |
Mike Yu | e7e332f | 2019-03-13 17:15:48 +0800 | [diff] [blame] | 40 | #include <netdutils/Stopwatch.h> |
Ken Chen | ebdeba8 | 2021-10-28 09:54:46 +0800 | [diff] [blame] | 41 | #include <processgroup/processgroup.h> |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 42 | |
Joel Scherpelz | 08b84cd | 2017-05-22 13:11:54 +0900 | [diff] [blame] | 43 | #include "Controllers.h" |
Joel Scherpelz | 08b84cd | 2017-05-22 13:11:54 +0900 | [diff] [blame] | 44 | #include "FwmarkServer.h" |
| 45 | #include "MDnsSdListener.h" |
paulhu | c8a58ff | 2022-02-09 18:37:27 +0800 | [diff] [blame] | 46 | #include "MDnsService.h" |
Joel Scherpelz | 08b84cd | 2017-05-22 13:11:54 +0900 | [diff] [blame] | 47 | #include "NFLogListener.h" |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 48 | #include "NetdConstants.h" |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 49 | #include "NetdHwAidlService.h" |
Niranjan Pendharkar | 7e08f85 | 2017-07-24 11:40:05 -0700 | [diff] [blame] | 50 | #include "NetdHwService.h" |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 51 | #include "NetdNativeService.h" |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 52 | #include "NetlinkManager.h" |
Erik Kline | 8589004 | 2018-05-25 19:19:11 +0900 | [diff] [blame] | 53 | #include "Process.h" |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 54 | |
Ken Chen | ebdeba8 | 2021-10-28 09:54:46 +0800 | [diff] [blame] | 55 | #include "NetdUpdatablePublic.h" |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 56 | #include "netd_resolv/resolv.h" |
Lorenzo Colitti | afaaa8e | 2018-12-18 19:16:12 +0900 | [diff] [blame] | 57 | |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 58 | using android::IPCThreadState; |
Hans Boehm | ccdecaa | 2019-08-26 17:36:42 -0700 | [diff] [blame] | 59 | using android::sp; |
Bernie Innocenti | a5161a0 | 2019-01-30 22:40:53 +0900 | [diff] [blame] | 60 | using android::status_t; |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 61 | using android::String16; |
Lorenzo Colitti | 7035f22 | 2017-02-13 18:29:00 +0900 | [diff] [blame] | 62 | using android::net::FwmarkServer; |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 63 | using android::net::gCtls; |
| 64 | using android::net::gLog; |
Bernie Innocenti | a5161a0 | 2019-01-30 22:40:53 +0900 | [diff] [blame] | 65 | using android::net::makeNFLogListener; |
paulhu | c8a58ff | 2022-02-09 18:37:27 +0800 | [diff] [blame] | 66 | using android::net::MDnsService; |
Niranjan Pendharkar | 7e08f85 | 2017-07-24 11:40:05 -0700 | [diff] [blame] | 67 | using android::net::NetdHwService; |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 68 | using android::net::NetdNativeService; |
Lorenzo Colitti | 7035f22 | 2017-02-13 18:29:00 +0900 | [diff] [blame] | 69 | using android::net::NetlinkManager; |
Joel Scherpelz | 08b84cd | 2017-05-22 13:11:54 +0900 | [diff] [blame] | 70 | using android::net::NFLogListener; |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 71 | using android::net::aidl::NetdHwAidlService; |
Mike Yu | e7e332f | 2019-03-13 17:15:48 +0800 | [diff] [blame] | 72 | using android::netdutils::Stopwatch; |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 73 | |
Robert Greenwalt | 347f693 | 2014-10-31 18:54:06 -0700 | [diff] [blame] | 74 | const char* const PID_FILE_PATH = "/data/misc/net/netd_pid"; |
Mike Yu | 0ae31af | 2018-11-15 21:58:19 +0800 | [diff] [blame] | 75 | constexpr const char DNSPROXYLISTENER_SOCKET_NAME[] = "dnsproxyd"; |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 76 | |
Luke Huang | d1ee462 | 2018-06-29 13:49:58 +0800 | [diff] [blame] | 77 | std::mutex android::net::gBigNetdLock; |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 78 | |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 79 | namespace { |
| 80 | |
| 81 | void getNetworkContextCallback(uint32_t netId, uint32_t uid, android_net_context* netcontext) { |
| 82 | gCtls->netCtrl.getNetworkContext(netId, uid, netcontext); |
| 83 | } |
| 84 | |
| 85 | bool checkCallingPermissionCallback(const char* permission) { |
| 86 | return checkCallingPermission(String16(permission)); |
| 87 | } |
| 88 | |
| 89 | void logCallback(const char* msg) { |
| 90 | gLog.info(std::string(msg)); |
| 91 | } |
| 92 | |
Praveen Moongalam Thyagarajan | f7b003d | 2019-09-04 15:08:22 -0700 | [diff] [blame] | 93 | int tagSocketCallback(int sockFd, uint32_t tag, uid_t uid, pid_t) { |
Maciej Żenczykowski | e9d140b | 2020-07-02 04:08:59 -0700 | [diff] [blame] | 94 | // Workaround for secureVPN with VpnIsolation enabled, refer to b/159994981 for details. |
| 95 | if (tag == TAG_SYSTEM_DNS) uid = AID_DNS; |
Ken Chen | ebdeba8 | 2021-10-28 09:54:46 +0800 | [diff] [blame] | 96 | return libnetd_updatable_tagSocket(sockFd, tag, uid, AID_DNS); |
Sehee Park | b953a91 | 2019-07-04 13:53:45 +0900 | [diff] [blame] | 97 | } |
| 98 | |
Ken Chen | e22ac8d | 2022-12-24 09:24:56 +0800 | [diff] [blame] | 99 | bool evaluateDomainNameCallback(const android_net_context& netcontext, const char* /*name*/) { |
| 100 | // OEMs should NOT modify IF statement, or DNS control provided by mainline modules may break. |
| 101 | if (!gCtls->netCtrl.isUidAllowed(netcontext.app_netid, netcontext.uid)) { |
| 102 | ALOGI("uid %d is not allowed to use netid %u", netcontext.uid, netcontext.app_netid); |
| 103 | return false; |
| 104 | } |
| 105 | |
| 106 | // Add OEM customization from here |
| 107 | // ... |
Felipe Mosso Ferfoglia | feafd18 | 2019-10-31 10:31:25 -0300 | [diff] [blame] | 108 | return true; |
| 109 | } |
| 110 | |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 111 | bool initDnsResolver() { |
| 112 | ResolverNetdCallbacks callbacks = { |
Nick Desaulniers | 6b35750 | 2019-10-11 09:26:44 -0700 | [diff] [blame] | 113 | .check_calling_permission = &checkCallingPermissionCallback, |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 114 | .get_network_context = &getNetworkContextCallback, |
| 115 | .log = &logCallback, |
Sehee Park | b953a91 | 2019-07-04 13:53:45 +0900 | [diff] [blame] | 116 | .tagSocket = &tagSocketCallback, |
Felipe Mosso Ferfoglia | feafd18 | 2019-10-31 10:31:25 -0300 | [diff] [blame] | 117 | .evaluate_domain_name = &evaluateDomainNameCallback, |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 118 | }; |
Jooyung Han | 3e64aa1 | 2019-11-27 15:36:29 +0900 | [diff] [blame] | 119 | return resolv_init(&callbacks); |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 120 | } |
| 121 | |
| 122 | } // namespace |
| 123 | |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 124 | int main() { |
Lorenzo Colitti | 4362bb2 | 2017-01-21 15:00:36 +0900 | [diff] [blame] | 125 | Stopwatch s; |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 126 | gLog.info("netd 1.0 starting"); |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 127 | |
Erik Kline | 8589004 | 2018-05-25 19:19:11 +0900 | [diff] [blame] | 128 | android::net::process::removePidFile(PID_FILE_PATH); |
Ken Chen | 66e860f | 2021-04-01 15:50:28 +0800 | [diff] [blame] | 129 | gLog.info("Pid file removed"); |
Erik Kline | 8589004 | 2018-05-25 19:19:11 +0900 | [diff] [blame] | 130 | android::net::process::blockSigPipe(); |
Ken Chen | 66e860f | 2021-04-01 15:50:28 +0800 | [diff] [blame] | 131 | gLog.info("SIGPIPE is blocked"); |
San Mehat | 5c1b8af | 2010-01-21 15:37:10 -0800 | [diff] [blame] | 132 | |
Lorenzo Colitti | 548bbd4 | 2017-08-28 23:05:12 +0900 | [diff] [blame] | 133 | // Before we do anything that could fork, mark CLOEXEC the UNIX sockets that we get from init. |
| 134 | // FrameworkListener does this on initialization as well, but we only initialize these |
| 135 | // components after having initialized other subsystems that can fork. |
Maciej Żenczykowski | 3875839 | 2019-05-09 05:47:59 +0000 | [diff] [blame] | 136 | for (const auto& sock : |
| 137 | {DNSPROXYLISTENER_SOCKET_NAME, FwmarkServer::SOCKET_NAME, MDnsSdListener::SOCKET_NAME}) { |
Lorenzo Colitti | 548bbd4 | 2017-08-28 23:05:12 +0900 | [diff] [blame] | 138 | setCloseOnExec(sock); |
Ken Chen | 66e860f | 2021-04-01 15:50:28 +0800 | [diff] [blame] | 139 | gLog.info("setCloseOnExec(%s)", sock); |
Lorenzo Colitti | 548bbd4 | 2017-08-28 23:05:12 +0900 | [diff] [blame] | 140 | } |
| 141 | |
Ken Chen | ebdeba8 | 2021-10-28 09:54:46 +0800 | [diff] [blame] | 142 | std::string cg2_path; |
| 143 | if (!CgroupGetControllerPath(CGROUPV2_CONTROLLER_NAME, &cg2_path)) { |
| 144 | ALOGE("Failed to find cgroup v2 root %s", strerror(errno)); |
| 145 | exit(1); |
| 146 | } |
| 147 | |
| 148 | if (libnetd_updatable_init(cg2_path.c_str())) { |
| 149 | ALOGE("libnetd_updatable_init failed"); |
| 150 | exit(1); |
| 151 | } |
| 152 | gLog.info("libnetd_updatable_init success"); |
Joel Fernandes | a03aced | 2019-01-10 11:24:11 -0500 | [diff] [blame] | 153 | |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 154 | NetlinkManager *nm = NetlinkManager::Instance(); |
| 155 | if (nm == nullptr) { |
Steve Block | 5ea0c05 | 2012-01-06 19:18:11 +0000 | [diff] [blame] | 156 | ALOGE("Unable to create NetlinkManager"); |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 157 | exit(1); |
| 158 | }; |
Ken Chen | 66e860f | 2021-04-01 15:50:28 +0800 | [diff] [blame] | 159 | gLog.info("NetlinkManager instanced"); |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 160 | |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 161 | gCtls = new android::net::Controllers(); |
Lorenzo Colitti | 1ed96e2 | 2017-02-02 12:21:56 +0900 | [diff] [blame] | 162 | gCtls->init(); |
| 163 | |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 164 | if (nm->start()) { |
Steve Block | 5ea0c05 | 2012-01-06 19:18:11 +0000 | [diff] [blame] | 165 | ALOGE("Unable to start NetlinkManager (%s)", strerror(errno)); |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 166 | exit(1); |
| 167 | } |
| 168 | |
Joel Scherpelz | 685deb5 | 2017-06-14 10:27:47 +0900 | [diff] [blame] | 169 | std::unique_ptr<NFLogListener> logListener; |
| 170 | { |
| 171 | auto result = makeNFLogListener(); |
| 172 | if (!isOk(result)) { |
| 173 | ALOGE("Unable to create NFLogListener: %s", toString(result).c_str()); |
| 174 | exit(1); |
| 175 | } |
| 176 | logListener = std::move(result.value()); |
| 177 | auto status = gCtls->wakeupCtrl.init(logListener.get()); |
Christian Koestlin | 002e5fa | 2021-06-03 00:11:02 +0200 | [diff] [blame] | 178 | if (!isOk(status)) { |
| 179 | gLog.error("Unable to init WakeupController: %s", toString(status).c_str()); |
Joel Scherpelz | 685deb5 | 2017-06-14 10:27:47 +0900 | [diff] [blame] | 180 | // We can still continue without wakeup packet logging. |
| 181 | } |
| 182 | } |
| 183 | |
Brad Fitzpatrick | 007e987 | 2010-10-27 11:39:52 -0700 | [diff] [blame] | 184 | // Set local DNS mode, to prevent bionic from proxying |
| 185 | // back to this service, recursively. |
Mike Yu | 0ae31af | 2018-11-15 21:58:19 +0800 | [diff] [blame] | 186 | // TODO: Check if we could remove it since resolver cache no loger |
| 187 | // checks this environment variable after aosp/838050. |
Brad Fitzpatrick | 007e987 | 2010-10-27 11:39:52 -0700 | [diff] [blame] | 188 | setenv("ANDROID_DNS_MODE", "local", 1); |
Luke Huang | f29fe68 | 2019-03-26 15:15:44 +0800 | [diff] [blame] | 189 | // Note that only call initDnsResolver after gCtls initializing. |
| 190 | if (!initDnsResolver()) { |
Mike Yu | 0ae31af | 2018-11-15 21:58:19 +0800 | [diff] [blame] | 191 | ALOGE("Unable to init resolver"); |
Brad Fitzpatrick | 007e987 | 2010-10-27 11:39:52 -0700 | [diff] [blame] | 192 | exit(1); |
| 193 | } |
| 194 | |
Patrick Rohr | b371bc3 | 2022-02-01 22:43:23 +0100 | [diff] [blame] | 195 | FwmarkServer fwmarkServer(&gCtls->netCtrl, &gCtls->eventReporter); |
Pierre Imai | 1cfa543 | 2016-02-24 18:00:03 +0900 | [diff] [blame] | 196 | if (fwmarkServer.startListener()) { |
Sreeram Ramachandran | 030b36e | 2014-05-11 21:04:03 -0700 | [diff] [blame] | 197 | ALOGE("Unable to start FwmarkServer (%s)", strerror(errno)); |
| 198 | exit(1); |
| 199 | } |
| 200 | |
Luke Huang | cfd04b2 | 2019-03-18 15:53:21 +0800 | [diff] [blame] | 201 | Stopwatch subTime; |
| 202 | status_t ret; |
| 203 | if ((ret = NetdNativeService::start()) != android::OK) { |
| 204 | ALOGE("Unable to start NetdNativeService: %d", ret); |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 205 | exit(1); |
| 206 | } |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 207 | gLog.info("Registering NetdNativeService: %" PRId64 "us", subTime.getTimeAndResetUs()); |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 208 | |
paulhu | c8a58ff | 2022-02-09 18:37:27 +0800 | [diff] [blame] | 209 | if ((ret = MDnsService::start()) != android::OK) { |
| 210 | ALOGE("Unable to start MDnsService: %d", ret); |
| 211 | exit(1); |
| 212 | } |
| 213 | gLog.info("Registering MDnsService: %" PRId64 "us", subTime.getTimeAndResetUs()); |
| 214 | |
Erik Kline | 8589004 | 2018-05-25 19:19:11 +0900 | [diff] [blame] | 215 | android::net::process::ScopedPidFile pidFile(PID_FILE_PATH); |
Robert Greenwalt | 347f693 | 2014-10-31 18:54:06 -0700 | [diff] [blame] | 216 | |
Hans Boehm | ccdecaa | 2019-08-26 17:36:42 -0700 | [diff] [blame] | 217 | // Now that netd is ready to process commands, advertise service availability for HAL clients. |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 218 | // Usage of this HAL is anticipated to be thin; one thread per HAL service should suffice, |
| 219 | // AIDL and HIDL. |
| 220 | android::hardware::configureRpcThreadpool(2, true /* callerWillJoin */); |
| 221 | IPCThreadState::self()->disableBackgroundScheduling(true); |
| 222 | |
| 223 | std::thread aidlService = std::thread(NetdHwAidlService::run); |
| 224 | |
Hans Boehm | ccdecaa | 2019-08-26 17:36:42 -0700 | [diff] [blame] | 225 | sp<NetdHwService> mHwSvc(new NetdHwService()); |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 226 | bool startedHidlService = true; |
Hans Boehm | ccdecaa | 2019-08-26 17:36:42 -0700 | [diff] [blame] | 227 | if ((ret = mHwSvc->start()) != android::OK) { |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 228 | ALOGE("Unable to start HIDL NetdHwService: %d", ret); |
| 229 | startedHidlService = false; |
Niranjan Pendharkar | 7e08f85 | 2017-07-24 11:40:05 -0700 | [diff] [blame] | 230 | } |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 231 | |
Bernie Innocenti | 196f1b8 | 2019-05-20 16:34:16 +0900 | [diff] [blame] | 232 | gLog.info("Registering NetdHwService: %" PRId64 "us", subTime.getTimeAndResetUs()); |
| 233 | gLog.info("Netd started in %" PRId64 "us", s.timeTakenUs()); |
Devin Moore | c304b47 | 2022-04-08 21:42:50 +0000 | [diff] [blame] | 234 | if (startedHidlService) { |
| 235 | IPCThreadState::self()->joinThreadPool(); |
| 236 | } |
| 237 | aidlService.join(); |
Erik Kline | b31fd69 | 2018-06-06 20:50:11 +0900 | [diff] [blame] | 238 | gLog.info("netd exiting"); |
Lorenzo Colitti | e4d626e | 2016-02-02 17:19:04 +0900 | [diff] [blame] | 239 | |
San Mehat | d183042 | 2010-01-15 08:02:39 -0800 | [diff] [blame] | 240 | exit(0); |
| 241 | } |