blob: f40f0c51453f4414bf30344544493cbe5d631052 [file] [log] [blame]
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -05001// Copyright 2015, The Android Open Source Project
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15#include <fcntl.h>
16#include <sys/stat.h>
17#include <sys/types.h>
18#include <unistd.h>
19
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050020#include <android-base/file.h>
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -050021#include <android-base/logging.h>
22#include <android-base/unique_fd.h>
23
24#include <libminijail.h>
25#include <scoped_minijail.h>
26
27#include "minijail.h"
28
29namespace android {
30
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050031int WritePolicyToPipe(const std::string& base_policy_content,
Ray Essickd03d42b2020-01-19 17:27:41 -080032 const std::vector<std::string>& additional_policy_contents)
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050033{
34 int pipefd[2];
35 if (pipe(pipefd) == -1) {
36 PLOG(ERROR) << "pipe() failed";
37 return -1;
38 }
39
40 base::unique_fd write_end(pipefd[1]);
41 std::string content = base_policy_content;
42
Ray Essickd03d42b2020-01-19 17:27:41 -080043 for (auto one_content : additional_policy_contents) {
44 if (one_content.length() > 0) {
45 content += "\n";
46 content += one_content;
47 }
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050048 }
49
50 if (!base::WriteStringToFd(content, write_end.get())) {
51 LOG(ERROR) << "Could not write policy to fd";
52 return -1;
53 }
54
55 return pipefd[0];
56}
57
Ray Essickd03d42b2020-01-19 17:27:41 -080058void SetUpMinijail(const std::string& base_policy_path,
59 const std::string& additional_policy_path)
60{
61 SetUpMinijailList(base_policy_path, {additional_policy_path});
62}
63
64void SetUpMinijailList(const std::string& base_policy_path,
65 const std::vector<std::string>& additional_policy_paths)
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -050066{
67 // No seccomp policy defined for this architecture.
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050068 if (access(base_policy_path.c_str(), R_OK) == -1) {
Ray Essickd03d42b2020-01-19 17:27:41 -080069 // LOG(WARNING) << "No seccomp policy defined for this architecture.";
70 LOG(WARNING) << "missing base seccomp_policy file '" << base_policy_path << "'";
Jorge Lucangeli Obes8bee1772017-02-16 15:26:33 -050071 return;
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -050072 }
73
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050074 std::string base_policy_content;
Ray Essickd03d42b2020-01-19 17:27:41 -080075 std::vector<std::string> additional_policy_contents;
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050076 if (!base::ReadFileToString(base_policy_path, &base_policy_content,
77 false /* follow_symlinks */)) {
Jorge Lucangeli Obes8bee1772017-02-16 15:26:33 -050078 LOG(FATAL) << "Could not read base policy file '" << base_policy_path << "'";
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050079 }
80
Ray Essickd03d42b2020-01-19 17:27:41 -080081 for (auto one_policy_path : additional_policy_paths) {
82 std::string one_policy_content;
83 if (one_policy_path.length() > 0 &&
84 !base::ReadFileToString(one_policy_path, &one_policy_content,
85 false /* follow_symlinks */)) {
86 LOG(WARNING) << "Could not read additional policy file '" << one_policy_path << "'";
87 }
88 additional_policy_contents.push_back(one_policy_content);
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050089 }
90
Ray Essickd03d42b2020-01-19 17:27:41 -080091 base::unique_fd policy_fd(WritePolicyToPipe(base_policy_content, additional_policy_contents));
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -050092 if (policy_fd.get() == -1) {
Jorge Lucangeli Obes8bee1772017-02-16 15:26:33 -050093 LOG(FATAL) << "Could not write seccomp policy to fd";
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -050094 }
95
96 ScopedMinijail jail{minijail_new()};
97 if (!jail) {
Jorge Lucangeli Obes8bee1772017-02-16 15:26:33 -050098 LOG(FATAL) << "Failed to create minijail.";
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -050099 }
100
101 minijail_no_new_privs(jail.get());
102 minijail_log_seccomp_filter_failures(jail.get());
103 minijail_use_seccomp_filter(jail.get());
Jorge Lucangeli Obes80959a72017-02-14 15:49:33 -0500104 // Transfer ownership of |policy_fd|.
105 minijail_parse_seccomp_filters_from_fd(jail.get(), policy_fd.release());
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -0500106 minijail_enter(jail.get());
Jorge Lucangeli Obesfbfb8e82017-02-14 10:33:41 -0500107}
108}