Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 1 | // Copyright 2019 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "arc/network/adb_proxy.h" |
| 6 | |
jasongustaman | 1407628 | 2019-05-20 15:38:41 +0900 | [diff] [blame] | 7 | #include <linux/vm_sockets.h> |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 8 | #include <sys/socket.h> |
| 9 | #include <sys/types.h> |
| 10 | |
| 11 | #include <utility> |
| 12 | |
| 13 | #include <base/bind.h> |
| 14 | #include <base/logging.h> |
| 15 | #include <base/strings/stringprintf.h> |
| 16 | #include <brillo/minijail/minijail.h> |
| 17 | |
Hugo Benichi | 2ac4d07 | 2019-05-28 14:51:23 +0900 | [diff] [blame] | 18 | #include "arc/network/net_util.h" |
| 19 | |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 20 | namespace arc_networkd { |
| 21 | namespace { |
Garrick Evans | a7556db | 2019-05-07 11:22:40 +0900 | [diff] [blame] | 22 | // adb gets confused if we listen on 5555 and thinks there is an emulator |
| 23 | // running, which in turn ends up confusing our integration test libraries |
| 24 | // because multiple devices show up. |
| 25 | constexpr uint16_t kTcpListenPort = 5550; |
| 26 | // But we still connect to adbd on its standard TCP port. |
| 27 | constexpr uint16_t kTcpConnectPort = 5555; |
Hugo Benichi | 2ac4d07 | 2019-05-28 14:51:23 +0900 | [diff] [blame] | 28 | constexpr uint32_t kTcpAddr = Ipv4Addr(100, 115, 92, 2); |
jasongustaman | 1407628 | 2019-05-20 15:38:41 +0900 | [diff] [blame] | 29 | constexpr uint32_t kVsockPort = 5555; |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 30 | constexpr uint64_t kCapMask = CAP_TO_MASK(CAP_NET_RAW); |
| 31 | constexpr char kUnprivilegedUser[] = "arc-networkd"; |
| 32 | constexpr int kMaxConn = 16; |
| 33 | |
| 34 | } // namespace |
| 35 | |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 36 | AdbProxy::AdbProxy(base::ScopedFD control_fd) |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 37 | : msg_dispatcher_(std::move(control_fd)), |
| 38 | src_watcher_(FROM_HERE), |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 39 | arc_type_(GuestMessage::UNKNOWN_GUEST), |
| 40 | arcvm_vsock_cid_(-1) { |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 41 | msg_dispatcher_.RegisterFailureHandler( |
| 42 | base::Bind(&AdbProxy::OnParentProcessExit, weak_factory_.GetWeakPtr())); |
| 43 | |
| 44 | msg_dispatcher_.RegisterGuestMessageHandler( |
| 45 | base::Bind(&AdbProxy::OnGuestMessage, weak_factory_.GetWeakPtr())); |
| 46 | } |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 47 | |
| 48 | AdbProxy::~AdbProxy() { |
| 49 | src_watcher_.StopWatchingFileDescriptor(); |
| 50 | } |
| 51 | |
| 52 | int AdbProxy::OnInit() { |
| 53 | // Prevent the main process from sending us any signals. |
| 54 | if (setsid() < 0) { |
| 55 | PLOG(ERROR) << "Failed to created a new session with setsid; exiting"; |
| 56 | return -1; |
| 57 | } |
| 58 | |
| 59 | // Run with minimal privileges. |
| 60 | brillo::Minijail* m = brillo::Minijail::GetInstance(); |
| 61 | struct minijail* jail = m->New(); |
| 62 | |
| 63 | // Most of these return void, but DropRoot() can fail if the user/group |
| 64 | // does not exist. |
| 65 | CHECK(m->DropRoot(jail, kUnprivilegedUser, kUnprivilegedUser)) |
| 66 | << "Could not drop root privileges"; |
| 67 | m->UseCapabilities(jail, kCapMask); |
| 68 | m->Enter(jail); |
| 69 | m->Destroy(jail); |
| 70 | |
Garrick Evans | 6f258d0 | 2019-06-28 16:32:07 +0900 | [diff] [blame] | 71 | RegisterHandler(SIGUSR1, |
| 72 | base::Bind(&AdbProxy::OnSignal, base::Unretained(this))); |
| 73 | RegisterHandler(SIGUSR2, |
| 74 | base::Bind(&AdbProxy::OnSignal, base::Unretained(this))); |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 75 | return Daemon::OnInit(); |
| 76 | } |
| 77 | |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 78 | void AdbProxy::Reset() { |
| 79 | src_watcher_.StopWatchingFileDescriptor(); |
| 80 | src_.reset(); |
| 81 | fwd_.clear(); |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 82 | arcvm_vsock_cid_ = -1; |
| 83 | arc_type_ = GuestMessage::UNKNOWN_GUEST; |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 84 | } |
| 85 | |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 86 | void AdbProxy::OnParentProcessExit() { |
| 87 | LOG(ERROR) << "Quitting because the parent process died"; |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 88 | Reset(); |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 89 | Quit(); |
| 90 | } |
| 91 | |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 92 | void AdbProxy::OnFileCanReadWithoutBlocking(int fd) { |
| 93 | if (auto conn = src_->Accept()) { |
| 94 | if (auto dst = Connect()) { |
| 95 | LOG(INFO) << "Connection established: " << *conn << " <-> " << *dst; |
| 96 | auto fwd = std::make_unique<SocketForwarder>( |
| 97 | base::StringPrintf("adbp%d-%d", conn->fd(), dst->fd()), |
| 98 | std::move(conn), std::move(dst)); |
| 99 | fwd->Start(); |
| 100 | fwd_.emplace_back(std::move(fwd)); |
| 101 | } |
| 102 | } |
| 103 | |
| 104 | // Cleanup any defunct forwarders. |
| 105 | for (auto it = fwd_.begin(); it != fwd_.end();) { |
Garrick Evans | 088cd0e | 2019-06-04 15:20:43 +0900 | [diff] [blame] | 106 | if (!(*it)->IsRunning() && (*it)->HasBeenStarted()) |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 107 | it = fwd_.erase(it); |
Garrick Evans | 4e96fad | 2019-05-17 10:19:38 +0900 | [diff] [blame] | 108 | else |
| 109 | ++it; |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 110 | } |
| 111 | } |
| 112 | |
| 113 | std::unique_ptr<Socket> AdbProxy::Connect() const { |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 114 | switch (arc_type_) { |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 115 | case GuestMessage::ARC: |
| 116 | case GuestMessage::ARC_LEGACY: { |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 117 | struct sockaddr_in addr_in = {0}; |
| 118 | addr_in.sin_family = AF_INET; |
| 119 | addr_in.sin_port = htons(kTcpConnectPort); |
| 120 | addr_in.sin_addr.s_addr = kTcpAddr; |
| 121 | auto dst = std::make_unique<Socket>(AF_INET, SOCK_STREAM); |
| 122 | return dst->Connect((const struct sockaddr*)&addr_in, sizeof(addr_in)) |
| 123 | ? std::move(dst) |
| 124 | : nullptr; |
| 125 | } |
| 126 | case GuestMessage::ARC_VM: { |
| 127 | struct sockaddr_vm addr_vm = {0}; |
| 128 | addr_vm.svm_family = AF_VSOCK; |
| 129 | addr_vm.svm_port = kVsockPort; |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 130 | addr_vm.svm_cid = arcvm_vsock_cid_; |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 131 | auto dst = std::make_unique<Socket>(AF_VSOCK, SOCK_STREAM); |
| 132 | return dst->Connect((const struct sockaddr*)&addr_vm, sizeof(addr_vm)) |
| 133 | ? std::move(dst) |
| 134 | : nullptr; |
| 135 | } |
| 136 | default: |
| 137 | LOG(DFATAL) << "Unexpected connect - no ARC guest"; |
| 138 | return nullptr; |
| 139 | } |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 140 | } |
| 141 | |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 142 | void AdbProxy::OnGuestMessage(const GuestMessage& msg) { |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 143 | if (msg.type() == GuestMessage::UNKNOWN_GUEST) { |
| 144 | LOG(DFATAL) << "Unexpected message from unknown guest"; |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 145 | return; |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 146 | } |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 147 | |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 148 | arc_type_ = msg.type(); |
Garrick Evans | 1cce71a | 2019-06-21 10:43:14 +0900 | [diff] [blame^] | 149 | arcvm_vsock_cid_ = msg.arcvm_vsock_cid(); |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 150 | |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 151 | // On ARC up, start accepting connections. |
| 152 | if (msg.event() == GuestMessage::START) { |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 153 | src_ = std::make_unique<Socket>(AF_INET, SOCK_STREAM | SOCK_NONBLOCK); |
Garrick Evans | 20cc37c | 2019-05-29 17:25:59 +0900 | [diff] [blame] | 154 | // Need to set this to reuse the port on localhost. |
Garrick Evans | 20cc37c | 2019-05-29 17:25:59 +0900 | [diff] [blame] | 155 | int on = 1; |
| 156 | if (setsockopt(src_->fd(), SOL_SOCKET, SO_REUSEADDR, &on, sizeof(int)) < |
| 157 | 0) { |
| 158 | PLOG(ERROR) << "setsockopt(SO_REUSEADDR) failed"; |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 159 | return; |
Garrick Evans | 20cc37c | 2019-05-29 17:25:59 +0900 | [diff] [blame] | 160 | } |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 161 | struct sockaddr_in addr = {0}; |
| 162 | addr.sin_family = AF_INET; |
Garrick Evans | a7556db | 2019-05-07 11:22:40 +0900 | [diff] [blame] | 163 | addr.sin_port = htons(kTcpListenPort); |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 164 | addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); |
| 165 | if (!src_->Bind((const struct sockaddr*)&addr, sizeof(addr))) { |
| 166 | LOG(ERROR) << "Cannot bind source socket"; |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 167 | return; |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 168 | } |
| 169 | |
| 170 | if (!src_->Listen(kMaxConn)) { |
| 171 | LOG(ERROR) << "Cannot listen on source socket"; |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 172 | return; |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 173 | } |
| 174 | |
| 175 | // Run the accept loop. |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 176 | LOG(INFO) << "Accepting connections..."; |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 177 | base::MessageLoopForIO::current()->WatchFileDescriptor( |
| 178 | src_->fd(), true, base::MessageLoopForIO::WATCH_READ, &src_watcher_, |
| 179 | this); |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 180 | return; |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 181 | } |
| 182 | |
Garrick Evans | 96e0304 | 2019-05-28 14:30:52 +0900 | [diff] [blame] | 183 | // On ARC down, cull any open connections and stop listening. |
| 184 | if (msg.event() == GuestMessage::STOP) { |
Garrick Evans | bdf1f98 | 2019-06-07 09:46:49 +0900 | [diff] [blame] | 185 | Reset(); |
Garrick Evans | 584210b | 2019-05-27 14:25:43 +0900 | [diff] [blame] | 186 | } |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 187 | } |
| 188 | |
Garrick Evans | 6f258d0 | 2019-06-28 16:32:07 +0900 | [diff] [blame] | 189 | // TODO(garrick): Remove this workaround ASAP. |
| 190 | bool AdbProxy::OnSignal(const struct signalfd_siginfo& info) { |
| 191 | // Do nothing. This is only here to prevent the process from crashing. |
| 192 | return false; |
| 193 | } |
| 194 | |
Garrick Evans | 3cbac7c | 2019-04-18 15:31:31 +0900 | [diff] [blame] | 195 | } // namespace arc_networkd |