Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 03642ad8 authored by Tom Cherry's avatar Tom Cherry Committed by Gerrit Code Review
Browse files

Merge "init: create sockets before forking"

parents 89562f11 5241d100
Loading
Loading
Loading
Loading
+19 −10
Original line number Diff line number Diff line
@@ -441,6 +441,23 @@ Result<void> Service::Start() {

    LOG(INFO) << "starting service '" << name_ << "'...";

    std::vector<Descriptor> descriptors;
    for (const auto& socket : sockets_) {
        if (auto result = socket.Create(scon)) {
            descriptors.emplace_back(std::move(*result));
        } else {
            LOG(INFO) << "Could not create socket '" << socket.name << "': " << result.error();
        }
    }

    for (const auto& file : files_) {
        if (auto result = file.Create()) {
            descriptors.emplace_back(std::move(*result));
        } else {
            LOG(INFO) << "Could not open file '" << file.name << "': " << result.error();
        }
    }

    pid_t pid = -1;
    if (namespaces_.flags) {
        pid = clone(nullptr, nullptr, namespaces_.flags | SIGCHLD, nullptr);
@@ -460,16 +477,8 @@ Result<void> Service::Start() {
            setenv(key.c_str(), value.c_str(), 1);
        }

        for (const auto& socket : sockets_) {
            if (auto result = socket.CreateAndPublish(scon); !result) {
                LOG(INFO) << "Could not create socket '" << socket.name << "': " << result.error();
            }
        }

        for (const auto& file : files_) {
            if (auto result = file.CreateAndPublish(); !result) {
                LOG(INFO) << "Could not open file '" << file.name << "': " << result.error();
            }
        for (const auto& descriptor : descriptors) {
            descriptor.Publish();
        }

        if (auto result = WritePidToFiles(&writepid_files_); !result) {
+19 −15
Original line number Diff line number Diff line
@@ -26,7 +26,6 @@
#include <android-base/properties.h>
#include <android-base/stringprintf.h>
#include <android-base/strings.h>
#include <android-base/unique_fd.h>
#include <cutils/android_get_control_file.h>
#include <cutils/sockets.h>
#include <processgroup/processgroup.h>
@@ -138,37 +137,44 @@ void OpenConsole(const std::string& console) {
    dup2(fd, 2);
}

void PublishDescriptor(const std::string& key, const std::string& name, int fd) {
    std::string published_name = key + name;
}  // namespace

void Descriptor::Publish() const {
    auto published_name = name_;

    for (auto& c : published_name) {
        c = isalnum(c) ? c : '_';
    }

    int fd = fd_.get();
    // For safety, the FD is created as CLOEXEC, so that must be removed before publishing.
    auto fd_flags = fcntl(fd, F_GETFD);
    fd_flags &= ~FD_CLOEXEC;
    if (fcntl(fd, F_SETFD, fd_flags) != 0) {
        PLOG(ERROR) << "Failed to remove CLOEXEC from '" << published_name << "'";
    }

    std::string val = std::to_string(fd);
    setenv(published_name.c_str(), val.c_str(), 1);
}

}  // namespace

Result<void> SocketDescriptor::CreateAndPublish(const std::string& global_context) const {
Result<Descriptor> SocketDescriptor::Create(const std::string& global_context) const {
    const auto& socket_context = context.empty() ? global_context : context;
    auto result = CreateSocket(name, type, passcred, perm, uid, gid, socket_context);
    auto result = CreateSocket(name, type | SOCK_CLOEXEC, passcred, perm, uid, gid, socket_context);
    if (!result) {
        return result.error();
    }

    PublishDescriptor(ANDROID_SOCKET_ENV_PREFIX, name, *result);

    return {};
    return Descriptor(ANDROID_SOCKET_ENV_PREFIX + name, unique_fd(*result));
}

Result<void> FileDescriptor::CreateAndPublish() const {
Result<Descriptor> FileDescriptor::Create() const {
    int flags = (type == "r") ? O_RDONLY : (type == "w") ? O_WRONLY : O_RDWR;

    // Make sure we do not block on open (eg: devices can chose to block on carrier detect).  Our
    // intention is never to delay launch of a service for such a condition.  The service can
    // perform its own blocking on carrier detect.
    android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(name.c_str(), flags | O_NONBLOCK)));
    unique_fd fd(TEMP_FAILURE_RETRY(open(name.c_str(), flags | O_NONBLOCK | O_CLOEXEC)));

    if (fd < 0) {
        return ErrnoError() << "Failed to open file '" << name << "'";
@@ -179,9 +185,7 @@ Result<void> FileDescriptor::CreateAndPublish() const {

    LOG(INFO) << "Opened file '" << name << "', flags " << flags;

    PublishDescriptor(ANDROID_FILE_ENV_PREFIX, name, fd.release());

    return {};
    return Descriptor(ANDROID_FILE_ENV_PREFIX + name, std::move(fd));
}

Result<void> EnterNamespaces(const NamespaceInfo& info, const std::string& name, bool pre_apexd) {
+15 −2
Original line number Diff line number Diff line
@@ -22,6 +22,7 @@
#include <string>
#include <vector>

#include <android-base/unique_fd.h>
#include <cutils/iosched_policy.h>

#include "result.h"
@@ -29,6 +30,18 @@
namespace android {
namespace init {

class Descriptor {
  public:
    Descriptor(const std::string& name, android::base::unique_fd fd)
        : name_(name), fd_(std::move(fd)){};

    void Publish() const;

  private:
    std::string name_;
    android::base::unique_fd fd_;
};

struct SocketDescriptor {
    std::string name;
    int type = 0;
@@ -38,14 +51,14 @@ struct SocketDescriptor {
    std::string context;
    bool passcred = false;

    Result<void> CreateAndPublish(const std::string& global_context) const;
    Result<Descriptor> Create(const std::string& global_context) const;
};

struct FileDescriptor {
    std::string name;
    std::string type;

    Result<void> CreateAndPublish() const;
    Result<Descriptor> Create() const;
};

struct NamespaceInfo {