Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2014 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | package com.android.internal.os; |
| 18 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 19 | import static android.system.OsConstants.O_CLOEXEC; |
| 20 | |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 21 | import static com.android.internal.os.ZygoteConnectionConstants.MAX_ZYGOTE_ARGC; |
| 22 | |
Martijn Coenen | 4b98816 | 2019-01-28 13:58:45 +0100 | [diff] [blame] | 23 | import android.content.pm.ApplicationInfo; |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 24 | import android.net.Credentials; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 25 | import android.net.LocalServerSocket; |
| 26 | import android.net.LocalSocket; |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 27 | import android.os.FactoryTest; |
Jeff Sharkey | ace874b | 2017-09-07 15:27:33 -0600 | [diff] [blame] | 28 | import android.os.IVold; |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 29 | import android.os.Process; |
| 30 | import android.os.SystemProperties; |
Narayan Kamath | fbb32f6 | 2015-06-12 15:34:35 +0100 | [diff] [blame] | 31 | import android.os.Trace; |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 32 | import android.provider.DeviceConfig; |
Elliott Hughes | 860c591 | 2014-04-28 19:19:13 -0700 | [diff] [blame] | 33 | import android.system.ErrnoException; |
| 34 | import android.system.Os; |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 35 | import android.util.Log; |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 36 | |
Jeff Sharkey | ace874b | 2017-09-07 15:27:33 -0600 | [diff] [blame] | 37 | import dalvik.system.ZygoteHooks; |
Tobias Sargeant | b9679dc | 2016-01-19 16:34:54 +0000 | [diff] [blame] | 38 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 39 | import libcore.io.IoUtils; |
| 40 | |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 41 | import java.io.BufferedReader; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 42 | import java.io.ByteArrayOutputStream; |
| 43 | import java.io.DataOutputStream; |
| 44 | import java.io.FileDescriptor; |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 45 | import java.io.IOException; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 46 | import java.io.InputStreamReader; |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 47 | |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 48 | /** @hide */ |
| 49 | public final class Zygote { |
| 50 | /* |
Nicolas Geoffray | 81edac4 | 2017-09-07 14:13:29 +0100 | [diff] [blame] | 51 | * Bit values for "runtimeFlags" argument. The definitions are duplicated |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 52 | * in the native code. |
| 53 | */ |
| 54 | |
| 55 | /** enable debugging over JDWP */ |
Nicolas Geoffray | 347b1df | 2016-12-20 14:05:05 +0000 | [diff] [blame] | 56 | public static final int DEBUG_ENABLE_JDWP = 1; |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 57 | /** enable JNI checks */ |
| 58 | public static final int DEBUG_ENABLE_CHECKJNI = 1 << 1; |
| 59 | /** enable Java programming language "assert" statements */ |
| 60 | public static final int DEBUG_ENABLE_ASSERT = 1 << 2; |
Mathieu Chartier | 7a49028 | 2015-03-17 09:51:36 -0700 | [diff] [blame] | 61 | /** disable the AOT compiler and JIT */ |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 62 | public static final int DEBUG_ENABLE_SAFEMODE = 1 << 3; |
| 63 | /** Enable logging of third-party JNI activity. */ |
| 64 | public static final int DEBUG_ENABLE_JNI_LOGGING = 1 << 4; |
David Srbecky | 065075e | 2015-05-28 17:16:09 +0100 | [diff] [blame] | 65 | /** Force generation of native debugging information. */ |
Nicolas Geoffray | 9abbf45 | 2015-11-05 11:29:42 +0000 | [diff] [blame] | 66 | public static final int DEBUG_GENERATE_DEBUG_INFO = 1 << 5; |
Tamas Berghammer | df6cb28 | 2016-01-29 12:07:00 +0000 | [diff] [blame] | 67 | /** Always use JIT-ed code. */ |
| 68 | public static final int DEBUG_ALWAYS_JIT = 1 << 6; |
Nicolas Geoffray | 347b1df | 2016-12-20 14:05:05 +0000 | [diff] [blame] | 69 | /** Make the code native debuggable by turning off some optimizations. */ |
Tamas Berghammer | df6cb28 | 2016-01-29 12:07:00 +0000 | [diff] [blame] | 70 | public static final int DEBUG_NATIVE_DEBUGGABLE = 1 << 7; |
Nicolas Geoffray | 347b1df | 2016-12-20 14:05:05 +0000 | [diff] [blame] | 71 | /** Make the code Java debuggable by turning off some optimizations. */ |
| 72 | public static final int DEBUG_JAVA_DEBUGGABLE = 1 << 8; |
Mathieu Chartier | 7a49028 | 2015-03-17 09:51:36 -0700 | [diff] [blame] | 73 | |
Nicolas Geoffray | 1f88ad6 | 2017-09-13 14:21:00 +0100 | [diff] [blame] | 74 | /** Turn off the verifier. */ |
| 75 | public static final int DISABLE_VERIFIER = 1 << 9; |
| 76 | /** Only use oat files located in /system. Otherwise use dex/jar/apk . */ |
| 77 | public static final int ONLY_USE_SYSTEM_OAT_FILES = 1 << 10; |
David Srbecky | 156ed92 | 2018-01-30 14:37:37 +0000 | [diff] [blame] | 78 | /** Force generation of native debugging information for backtraces. */ |
Mathew Inwood | 16073b8 | 2018-03-23 10:05:01 +0000 | [diff] [blame] | 79 | public static final int DEBUG_GENERATE_MINI_DEBUG_INFO = 1 << 11; |
| 80 | /** |
| 81 | * Hidden API access restrictions. This is a mask for bits representing the API enforcement |
| 82 | * policy, defined by {@code @ApplicationInfo.HiddenApiEnforcementPolicy}. |
| 83 | */ |
| 84 | public static final int API_ENFORCEMENT_POLICY_MASK = (1 << 12) | (1 << 13); |
| 85 | /** |
| 86 | * Bit shift for use with {@link #API_ENFORCEMENT_POLICY_MASK}. |
| 87 | * |
| 88 | * (flags & API_ENFORCEMENT_POLICY_MASK) >> API_ENFORCEMENT_POLICY_SHIFT gives |
| 89 | * @ApplicationInfo.ApiEnforcementPolicy values. |
| 90 | */ |
| 91 | public static final int API_ENFORCEMENT_POLICY_SHIFT = |
| 92 | Integer.numberOfTrailingZeros(API_ENFORCEMENT_POLICY_MASK); |
Calin Juravle | 8eb891b | 2018-05-03 19:51:18 -0700 | [diff] [blame] | 93 | /** |
| 94 | * Enable system server ART profiling. |
| 95 | */ |
| 96 | public static final int PROFILE_SYSTEM_SERVER = 1 << 14; |
Nicolas Geoffray | 1f88ad6 | 2017-09-13 14:21:00 +0100 | [diff] [blame] | 97 | |
Yabin Cui | 4d8546d | 2019-01-29 16:29:20 -0800 | [diff] [blame] | 98 | /** |
| 99 | * Enable profiling from shell. |
| 100 | */ |
| 101 | public static final int PROFILE_FROM_SHELL = 1 << 15; |
| 102 | |
Mathieu Chartier | ced7e08 | 2019-02-04 13:28:36 -0800 | [diff] [blame] | 103 | /* |
| 104 | * Enable using the ART app image startup cache |
| 105 | */ |
| 106 | public static final int USE_APP_IMAGE_STARTUP_CACHE = 1 << 16; |
| 107 | |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 108 | /** No external storage should be mounted. */ |
Jeff Sharkey | ace874b | 2017-09-07 15:27:33 -0600 | [diff] [blame] | 109 | public static final int MOUNT_EXTERNAL_NONE = IVold.REMOUNT_MODE_NONE; |
Jeff Sharkey | 9527b22 | 2015-06-24 15:24:48 -0700 | [diff] [blame] | 110 | /** Default external storage should be mounted. */ |
Jeff Sharkey | ace874b | 2017-09-07 15:27:33 -0600 | [diff] [blame] | 111 | public static final int MOUNT_EXTERNAL_DEFAULT = IVold.REMOUNT_MODE_DEFAULT; |
Jeff Sharkey | 9527b22 | 2015-06-24 15:24:48 -0700 | [diff] [blame] | 112 | /** Read-only external storage should be mounted. */ |
Jeff Sharkey | ace874b | 2017-09-07 15:27:33 -0600 | [diff] [blame] | 113 | public static final int MOUNT_EXTERNAL_READ = IVold.REMOUNT_MODE_READ; |
Jeff Sharkey | 9527b22 | 2015-06-24 15:24:48 -0700 | [diff] [blame] | 114 | /** Read-write external storage should be mounted. */ |
Jeff Sharkey | ace874b | 2017-09-07 15:27:33 -0600 | [diff] [blame] | 115 | public static final int MOUNT_EXTERNAL_WRITE = IVold.REMOUNT_MODE_WRITE; |
Sudheer Shanka | 3a0df3b | 2018-12-12 12:43:43 -0800 | [diff] [blame] | 116 | /** |
Sudheer Shanka | 0b6da53 | 2019-01-09 12:06:51 -0800 | [diff] [blame] | 117 | * Mount mode for apps that are already installed on the device before the isolated_storage |
| 118 | * feature is enabled. |
| 119 | */ |
| 120 | public static final int MOUNT_EXTERNAL_LEGACY = IVold.REMOUNT_MODE_LEGACY; |
| 121 | /** |
Sudheer Shanka | 3a0df3b | 2018-12-12 12:43:43 -0800 | [diff] [blame] | 122 | * Mount mode for package installers which should give them access to |
| 123 | * all obb dirs in addition to their package sandboxes |
| 124 | */ |
| 125 | public static final int MOUNT_EXTERNAL_INSTALLER = IVold.REMOUNT_MODE_INSTALLER; |
Sudheer Shanka | 98cb3f0 | 2018-08-17 16:10:29 -0700 | [diff] [blame] | 126 | /** Read-write external storage should be mounted instead of package sandbox */ |
| 127 | public static final int MOUNT_EXTERNAL_FULL = IVold.REMOUNT_MODE_FULL; |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 128 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 129 | /** Number of bytes sent to the Zygote over USAP pipes or the pool event FD */ |
| 130 | public static final int USAP_MANAGEMENT_MESSAGE_BYTES = 8; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 131 | |
Chris Wailes | ba4c2eb | 2019-01-11 17:13:00 -0800 | [diff] [blame] | 132 | /** |
Robert Sesek | d0a190df | 2018-02-12 18:46:01 -0500 | [diff] [blame] | 133 | * An extraArg passed when a zygote process is forking a child-zygote, specifying a name |
| 134 | * in the abstract socket namespace. This socket name is what the new child zygote |
| 135 | * should listen for connections on. |
| 136 | */ |
| 137 | public static final String CHILD_ZYGOTE_SOCKET_NAME_ARG = "--zygote-socket="; |
| 138 | |
Martijn Coenen | 7e6fa67 | 2018-11-05 11:45:26 +0100 | [diff] [blame] | 139 | /** |
| 140 | * An extraArg passed when a zygote process is forking a child-zygote, specifying the |
| 141 | * requested ABI for the child Zygote. |
| 142 | */ |
| 143 | public static final String CHILD_ZYGOTE_ABI_LIST_ARG = "--abi-list="; |
| 144 | |
Martijn Coenen | 86f08a5 | 2019-01-03 16:23:01 +0100 | [diff] [blame] | 145 | /** |
| 146 | * An extraArg passed when a zygote process is forking a child-zygote, specifying the |
| 147 | * start of the UID range the children of the Zygote may setuid()/setgid() to. This |
| 148 | * will be enforced with a seccomp filter. |
| 149 | */ |
| 150 | public static final String CHILD_ZYGOTE_UID_RANGE_START = "--uid-range-start="; |
| 151 | |
| 152 | /** |
| 153 | * An extraArg passed when a zygote process is forking a child-zygote, specifying the |
| 154 | * end of the UID range the children of the Zygote may setuid()/setgid() to. This |
| 155 | * will be enforced with a seccomp filter. |
| 156 | */ |
| 157 | public static final String CHILD_ZYGOTE_UID_RANGE_END = "--uid-range-end="; |
| 158 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 159 | /** Prefix prepended to socket names created by init */ |
| 160 | private static final String ANDROID_SOCKET_PREFIX = "ANDROID_SOCKET_"; |
| 161 | |
| 162 | /** |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 163 | * The duration to wait before re-checking Zygote related system properties. |
| 164 | * |
Chris Wailes | db132a3 | 2019-02-20 10:49:27 -0800 | [diff] [blame] | 165 | * One minute in milliseconds. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 166 | */ |
Chris Wailes | db132a3 | 2019-02-20 10:49:27 -0800 | [diff] [blame] | 167 | public static final long PROPERTY_CHECK_INTERVAL = 60000; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 168 | |
Chris Wailes | ba4c2eb | 2019-01-11 17:13:00 -0800 | [diff] [blame] | 169 | /** |
| 170 | * @hide for internal use only |
| 171 | */ |
| 172 | public static final int SOCKET_BUFFER_SIZE = 256; |
| 173 | |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 174 | /** a prototype instance for a future List.toArray() */ |
| 175 | protected static final int[][] INT_ARRAY_2D = new int[0][0]; |
| 176 | |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 177 | /** |
| 178 | * @hide for internal use only. |
| 179 | */ |
| 180 | public static final String PRIMARY_SOCKET_NAME = "zygote"; |
| 181 | |
| 182 | /** |
| 183 | * @hide for internal use only. |
| 184 | */ |
| 185 | public static final String SECONDARY_SOCKET_NAME = "zygote_secondary"; |
| 186 | |
| 187 | /** |
| 188 | * @hide for internal use only |
| 189 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 190 | public static final String USAP_POOL_PRIMARY_SOCKET_NAME = "usap_pool_primary"; |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 191 | |
| 192 | /** |
| 193 | * @hide for internal use only |
| 194 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 195 | public static final String USAP_POOL_SECONDARY_SOCKET_NAME = "usap_pool_secondary"; |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 196 | |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 197 | private Zygote() {} |
| 198 | |
Victor Hsieh | c8176ef | 2018-01-08 12:43:00 -0800 | [diff] [blame] | 199 | /** Called for some security initialization before any fork. */ |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 200 | static native void nativeSecurityInit(); |
Victor Hsieh | c8176ef | 2018-01-08 12:43:00 -0800 | [diff] [blame] | 201 | |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 202 | /** |
| 203 | * Forks a new VM instance. The current VM must have been started |
| 204 | * with the -Xzygote flag. <b>NOTE: new instance keeps all |
| 205 | * root capabilities. The new process is expected to call capset()</b>. |
| 206 | * |
| 207 | * @param uid the UNIX uid that the new process should setuid() to after |
| 208 | * fork()ing and and before spawning any threads. |
| 209 | * @param gid the UNIX gid that the new process should setgid() to after |
| 210 | * fork()ing and and before spawning any threads. |
| 211 | * @param gids null-ok; a list of UNIX gids that the new process should |
| 212 | * setgroups() to after fork and before spawning any threads. |
Nicolas Geoffray | 81edac4 | 2017-09-07 14:13:29 +0100 | [diff] [blame] | 213 | * @param runtimeFlags bit flags that enable ART features. |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 214 | * @param rlimits null-ok an array of rlimit tuples, with the second |
| 215 | * dimension having a length of 3 and representing |
| 216 | * (resource, rlim_cur, rlim_max). These are set via the posix |
| 217 | * setrlimit(2) call. |
| 218 | * @param seInfo null-ok a string specifying SELinux information for |
| 219 | * the new process. |
| 220 | * @param niceName null-ok a string specifying the process name. |
| 221 | * @param fdsToClose an array of ints, holding one or more POSIX |
| 222 | * file descriptor numbers that are to be closed by the child |
| 223 | * (and replaced by /dev/null) after forking. An integer value |
| 224 | * of -1 in any entry in the array means "ignore this one". |
Andreas Gampe | 8dfa178 | 2017-01-05 12:45:58 -0800 | [diff] [blame] | 225 | * @param fdsToIgnore null-ok an array of ints, either null or holding |
| 226 | * one or more POSIX file descriptor numbers that are to be ignored |
| 227 | * in the file descriptor table check. |
Robert Sesek | d0a190df | 2018-02-12 18:46:01 -0500 | [diff] [blame] | 228 | * @param startChildZygote if true, the new child process will itself be a |
| 229 | * new zygote process. |
Andreas Gampe | aec67dc | 2014-09-02 21:23:06 -0700 | [diff] [blame] | 230 | * @param instructionSet null-ok the instruction set to use. |
jgu21 | 2eacd06 | 2014-09-10 06:55:07 -0400 | [diff] [blame] | 231 | * @param appDataDir null-ok the data directory of the app. |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 232 | * |
| 233 | * @return 0 if this is the child, pid of the child |
| 234 | * if this is the parent, or -1 on error. |
| 235 | */ |
Nicolas Geoffray | 81edac4 | 2017-09-07 14:13:29 +0100 | [diff] [blame] | 236 | public static int forkAndSpecialize(int uid, int gid, int[] gids, int runtimeFlags, |
Sudheer Shanka | 3f0645b | 2018-09-18 13:07:59 -0700 | [diff] [blame] | 237 | int[][] rlimits, int mountExternal, String seInfo, String niceName, int[] fdsToClose, |
| 238 | int[] fdsToIgnore, boolean startChildZygote, String instructionSet, String appDataDir, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 239 | String packageName, String[] packagesForUID, String sandboxId) { |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 240 | ZygoteHooks.preFork(); |
Hiroshi Yamauchi | 1e3db87 | 2017-03-02 13:39:07 -0800 | [diff] [blame] | 241 | // Resets nice priority for zygote process. |
| 242 | resetNicePriority(); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 243 | int pid = nativeForkAndSpecialize( |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 244 | uid, gid, gids, runtimeFlags, rlimits, mountExternal, seInfo, niceName, fdsToClose, |
| 245 | fdsToIgnore, startChildZygote, instructionSet, appDataDir, packageName, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 246 | packagesForUID, sandboxId); |
Narayan Kamath | fbb32f6 | 2015-06-12 15:34:35 +0100 | [diff] [blame] | 247 | // Enable tracing as soon as possible for the child process. |
| 248 | if (pid == 0) { |
Andreas Gampe | 8f4eab2 | 2017-09-13 18:16:13 -0700 | [diff] [blame] | 249 | Trace.setTracingEnabled(true, runtimeFlags); |
Narayan Kamath | fbb32f6 | 2015-06-12 15:34:35 +0100 | [diff] [blame] | 250 | |
| 251 | // Note that this event ends at the end of handleChildProc, |
| 252 | Trace.traceBegin(Trace.TRACE_TAG_ACTIVITY_MANAGER, "PostFork"); |
| 253 | } |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 254 | ZygoteHooks.postForkCommon(); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 255 | return pid; |
| 256 | } |
| 257 | |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 258 | private static native int nativeForkAndSpecialize(int uid, int gid, int[] gids, |
| 259 | int runtimeFlags, int[][] rlimits, int mountExternal, String seInfo, String niceName, |
| 260 | int[] fdsToClose, int[] fdsToIgnore, boolean startChildZygote, String instructionSet, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 261 | String appDataDir, String packageName, String[] packagesForUID, |
Sudheer Shanka | 03fd40b | 2019-02-06 12:39:14 -0800 | [diff] [blame] | 262 | String sandboxId); |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 263 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 264 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 265 | * Specialize an unspecialized app process. The current VM must have been started |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 266 | * with the -Xzygote flag. |
| 267 | * |
| 268 | * @param uid The UNIX uid that the new process should setuid() to before spawning any threads |
| 269 | * @param gid The UNIX gid that the new process should setgid() to before spawning any threads |
| 270 | * @param gids null-ok; A list of UNIX gids that the new process should |
| 271 | * setgroups() to before spawning any threads |
| 272 | * @param runtimeFlags Bit flags that enable ART features |
| 273 | * @param rlimits null-ok An array of rlimit tuples, with the second |
| 274 | * dimension having a length of 3 and representing |
| 275 | * (resource, rlim_cur, rlim_max). These are set via the posix |
| 276 | * setrlimit(2) call. |
| 277 | * @param seInfo null-ok A string specifying SELinux information for |
| 278 | * the new process. |
| 279 | * @param niceName null-ok A string specifying the process name. |
| 280 | * @param startChildZygote If true, the new child process will itself be a |
| 281 | * new zygote process. |
| 282 | * @param instructionSet null-ok The instruction set to use. |
| 283 | * @param appDataDir null-ok The data directory of the app. |
| 284 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 285 | public static void specializeAppProcess(int uid, int gid, int[] gids, int runtimeFlags, |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 286 | int[][] rlimits, int mountExternal, String seInfo, String niceName, |
Chris Wailes | ba4c2eb | 2019-01-11 17:13:00 -0800 | [diff] [blame] | 287 | boolean startChildZygote, String instructionSet, String appDataDir, String packageName, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 288 | String[] packagesForUID, String sandboxId) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 289 | nativeSpecializeAppProcess(uid, gid, gids, runtimeFlags, rlimits, mountExternal, seInfo, |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 290 | niceName, startChildZygote, instructionSet, appDataDir, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 291 | packageName, packagesForUID, sandboxId); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 292 | |
| 293 | // Enable tracing as soon as possible for the child process. |
| 294 | Trace.setTracingEnabled(true, runtimeFlags); |
| 295 | |
| 296 | // Note that this event ends at the end of handleChildProc. |
| 297 | Trace.traceBegin(Trace.TRACE_TAG_ACTIVITY_MANAGER, "PostFork"); |
| 298 | |
| 299 | /* |
| 300 | * This is called here (instead of after the fork but before the specialize) to maintain |
| 301 | * consistancy with the code paths for forkAndSpecialize. |
| 302 | * |
| 303 | * TODO (chriswailes): Look into moving this to immediately after the fork. |
| 304 | */ |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 305 | ZygoteHooks.postForkCommon(); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 306 | } |
| 307 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 308 | private static native void nativeSpecializeAppProcess(int uid, int gid, int[] gids, |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 309 | int runtimeFlags, int[][] rlimits, int mountExternal, String seInfo, String niceName, |
| 310 | boolean startChildZygote, String instructionSet, String appDataDir, String packageName, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 311 | String[] packagesForUID, String sandboxId); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 312 | |
| 313 | /** |
Christopher Ferris | 2980de4 | 2017-06-20 16:13:40 -0700 | [diff] [blame] | 314 | * Called to do any initialization before starting an application. |
| 315 | */ |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 316 | static native void nativePreApplicationInit(); |
Christopher Ferris | 2980de4 | 2017-06-20 16:13:40 -0700 | [diff] [blame] | 317 | |
| 318 | /** |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 319 | * Special method to start the system server process. In addition to the |
| 320 | * common actions performed in forkAndSpecialize, the pid of the child |
| 321 | * process is recorded such that the death of the child process will cause |
| 322 | * zygote to exit. |
| 323 | * |
| 324 | * @param uid the UNIX uid that the new process should setuid() to after |
| 325 | * fork()ing and and before spawning any threads. |
| 326 | * @param gid the UNIX gid that the new process should setgid() to after |
| 327 | * fork()ing and and before spawning any threads. |
| 328 | * @param gids null-ok; a list of UNIX gids that the new process should |
| 329 | * setgroups() to after fork and before spawning any threads. |
Nicolas Geoffray | 81edac4 | 2017-09-07 14:13:29 +0100 | [diff] [blame] | 330 | * @param runtimeFlags bit flags that enable ART features. |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 331 | * @param rlimits null-ok an array of rlimit tuples, with the second |
| 332 | * dimension having a length of 3 and representing |
| 333 | * (resource, rlim_cur, rlim_max). These are set via the posix |
| 334 | * setrlimit(2) call. |
| 335 | * @param permittedCapabilities argument for setcap() |
| 336 | * @param effectiveCapabilities argument for setcap() |
| 337 | * |
| 338 | * @return 0 if this is the child, pid of the child |
| 339 | * if this is the parent, or -1 on error. |
| 340 | */ |
Nicolas Geoffray | 81edac4 | 2017-09-07 14:13:29 +0100 | [diff] [blame] | 341 | public static int forkSystemServer(int uid, int gid, int[] gids, int runtimeFlags, |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 342 | int[][] rlimits, long permittedCapabilities, long effectiveCapabilities) { |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 343 | ZygoteHooks.preFork(); |
Hiroshi Yamauchi | 1e3db87 | 2017-03-02 13:39:07 -0800 | [diff] [blame] | 344 | // Resets nice priority for zygote process. |
| 345 | resetNicePriority(); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 346 | int pid = nativeForkSystemServer( |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 347 | uid, gid, gids, runtimeFlags, rlimits, |
| 348 | permittedCapabilities, effectiveCapabilities); |
Narayan Kamath | fbb32f6 | 2015-06-12 15:34:35 +0100 | [diff] [blame] | 349 | // Enable tracing as soon as we enter the system_server. |
| 350 | if (pid == 0) { |
Andreas Gampe | 8f4eab2 | 2017-09-13 18:16:13 -0700 | [diff] [blame] | 351 | Trace.setTracingEnabled(true, runtimeFlags); |
Narayan Kamath | fbb32f6 | 2015-06-12 15:34:35 +0100 | [diff] [blame] | 352 | } |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 353 | ZygoteHooks.postForkCommon(); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 354 | return pid; |
| 355 | } |
| 356 | |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 357 | private static native int nativeForkSystemServer(int uid, int gid, int[] gids, int runtimeFlags, |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 358 | int[][] rlimits, long permittedCapabilities, long effectiveCapabilities); |
| 359 | |
doheon1.lee | 885b742 | 2016-01-20 13:07:27 +0900 | [diff] [blame] | 360 | /** |
Robert Sesek | 54e387d | 2016-12-02 17:27:50 -0500 | [diff] [blame] | 361 | * Lets children of the zygote inherit open file descriptors to this path. |
| 362 | */ |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 363 | protected static native void nativeAllowFileAcrossFork(String path); |
Robert Sesek | 54e387d | 2016-12-02 17:27:50 -0500 | [diff] [blame] | 364 | |
| 365 | /** |
Martijn Coenen | 4b98816 | 2019-01-28 13:58:45 +0100 | [diff] [blame] | 366 | * Lets children of the zygote inherit open file descriptors that belong to the |
| 367 | * ApplicationInfo that is passed in. |
| 368 | * |
| 369 | * @param appInfo ApplicationInfo of the application |
| 370 | */ |
| 371 | protected static void allowAppFilesAcrossFork(ApplicationInfo appInfo) { |
Torne (Richard Coles) | 1aaae10 | 2019-03-01 15:02:29 -0500 | [diff] [blame] | 372 | for (String path : appInfo.getAllApkPaths()) { |
| 373 | Zygote.nativeAllowFileAcrossFork(path); |
Martijn Coenen | 4b98816 | 2019-01-28 13:58:45 +0100 | [diff] [blame] | 374 | } |
| 375 | } |
| 376 | |
| 377 | /** |
Martijn Coenen | 86f08a5 | 2019-01-03 16:23:01 +0100 | [diff] [blame] | 378 | * Installs a seccomp filter that limits setresuid()/setresgid() to the passed-in range |
| 379 | * @param uidGidMin The smallest allowed uid/gid |
| 380 | * @param uidGidMax The largest allowed uid/gid |
| 381 | */ |
| 382 | native protected static void nativeInstallSeccompUidGidFilter(int uidGidMin, int uidGidMax); |
| 383 | |
| 384 | /** |
doheon1.lee | 885b742 | 2016-01-20 13:07:27 +0900 | [diff] [blame] | 385 | * Zygote unmount storage space on initializing. |
| 386 | * This method is called once. |
| 387 | */ |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 388 | protected static native void nativeUnmountStorageOnInit(); |
| 389 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 390 | /** |
| 391 | * Get socket file descriptors (opened by init) from the environment and |
| 392 | * store them for access from native code later. |
| 393 | * |
| 394 | * @param isPrimary True if this is the zygote process, false if it is zygote_secondary |
| 395 | */ |
| 396 | public static void getSocketFDs(boolean isPrimary) { |
| 397 | nativeGetSocketFDs(isPrimary); |
| 398 | } |
| 399 | |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 400 | protected static native void nativeGetSocketFDs(boolean isPrimary); |
| 401 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 402 | /** |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 403 | * Returns the raw string value of a system property. |
| 404 | * |
| 405 | * Note that Device Config is not available without an application so SystemProperties is used |
| 406 | * instead. |
| 407 | * |
| 408 | * TODO (chriswailes): Cache the system property location in native code and then write a JNI |
| 409 | * function to fetch it. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 410 | */ |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 411 | public static String getSystemProperty(String propertyName, String defaultValue) { |
| 412 | return SystemProperties.get( |
| 413 | String.join(".", |
| 414 | "persist.device_config", |
| 415 | DeviceConfig.RuntimeNative.NAMESPACE, |
| 416 | propertyName), |
| 417 | defaultValue); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 418 | } |
| 419 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 420 | protected static void emptyUsapPool() { |
| 421 | nativeEmptyUsapPool(); |
Chris Wailes | ae93714 | 2019-01-24 12:57:33 -0800 | [diff] [blame] | 422 | } |
| 423 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 424 | private static native void nativeEmptyUsapPool(); |
Chris Wailes | ae93714 | 2019-01-24 12:57:33 -0800 | [diff] [blame] | 425 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 426 | /** |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 427 | * Returns the value of a system property converted to a boolean using specific logic. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 428 | * |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 429 | * Note that Device Config is not available without an application so SystemProperties is used |
| 430 | * instead. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 431 | * |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 432 | * @see SystemProperties.getBoolean |
| 433 | * |
| 434 | * TODO (chriswailes): Cache the system property location in native code and then write a JNI |
| 435 | * function to fetch it. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 436 | */ |
Mathieu Chartier | 0bccbf7 | 2019-01-30 15:56:17 -0800 | [diff] [blame] | 437 | public static boolean getSystemPropertyBoolean(String propertyName, Boolean defaultValue) { |
| 438 | return SystemProperties.getBoolean( |
| 439 | String.join(".", |
| 440 | "persist.device_config", |
| 441 | DeviceConfig.RuntimeNative.NAMESPACE, |
| 442 | propertyName), |
| 443 | defaultValue); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 444 | } |
| 445 | |
| 446 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 447 | * @return Number of unspecialized app processes currently in the pool |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 448 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 449 | static int getUsapPoolCount() { |
| 450 | return nativeGetUsapPoolCount(); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 451 | } |
| 452 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 453 | private static native int nativeGetUsapPoolCount(); |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 454 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 455 | /** |
| 456 | * @return The event FD used for communication between the signal handler and the ZygoteServer |
| 457 | * poll loop |
| 458 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 459 | static FileDescriptor getUsapPoolEventFD() { |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 460 | FileDescriptor fd = new FileDescriptor(); |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 461 | fd.setInt$(nativeGetUsapPoolEventFD()); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 462 | |
| 463 | return fd; |
| 464 | } |
| 465 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 466 | private static native int nativeGetUsapPoolEventFD(); |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 467 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 468 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 469 | * Fork a new unspecialized app process from the zygote |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 470 | * |
| 471 | * @param sessionSocketRawFDs Anonymous session sockets that are currently open |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 472 | * @return In the Zygote process this function will always return null; in unspecialized app |
| 473 | * processes this function will return a Runnable object representing the new |
| 474 | * application that is passed up from usapMain. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 475 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 476 | static Runnable forkUsap(LocalServerSocket usapPoolSocket, |
| 477 | int[] sessionSocketRawFDs) { |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 478 | FileDescriptor[] pipeFDs = null; |
| 479 | |
| 480 | try { |
| 481 | pipeFDs = Os.pipe2(O_CLOEXEC); |
| 482 | } catch (ErrnoException errnoEx) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 483 | throw new IllegalStateException("Unable to create USAP pipe.", errnoEx); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 484 | } |
| 485 | |
| 486 | int pid = |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 487 | nativeForkUsap(pipeFDs[0].getInt$(), pipeFDs[1].getInt$(), sessionSocketRawFDs); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 488 | |
| 489 | if (pid == 0) { |
| 490 | IoUtils.closeQuietly(pipeFDs[0]); |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 491 | return usapMain(usapPoolSocket, pipeFDs[1]); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 492 | } else { |
| 493 | // The read-end of the pipe will be closed by the native code. |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 494 | // See removeUsapTableEntry(); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 495 | IoUtils.closeQuietly(pipeFDs[1]); |
| 496 | return null; |
| 497 | } |
| 498 | } |
| 499 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 500 | private static native int nativeForkUsap(int readPipeFD, |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 501 | int writePipeFD, |
| 502 | int[] sessionSocketRawFDs); |
| 503 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 504 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 505 | * This function is used by unspecialized app processes to wait for specialization requests from |
| 506 | * the system server. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 507 | * |
| 508 | * @param writePipe The write end of the reporting pipe used to communicate with the poll loop |
| 509 | * of the ZygoteServer. |
| 510 | * @return A runnable oject representing the new application. |
| 511 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 512 | private static Runnable usapMain(LocalServerSocket usapPoolSocket, |
| 513 | FileDescriptor writePipe) { |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 514 | final int pid = Process.myPid(); |
| 515 | |
| 516 | LocalSocket sessionSocket = null; |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 517 | DataOutputStream usapOutputStream = null; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 518 | Credentials peerCredentials = null; |
Chris Wailes | ae93714 | 2019-01-24 12:57:33 -0800 | [diff] [blame] | 519 | ZygoteArguments args = null; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 520 | |
| 521 | while (true) { |
| 522 | try { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 523 | sessionSocket = usapPoolSocket.accept(); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 524 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 525 | BufferedReader usapReader = |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 526 | new BufferedReader(new InputStreamReader(sessionSocket.getInputStream())); |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 527 | usapOutputStream = |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 528 | new DataOutputStream(sessionSocket.getOutputStream()); |
| 529 | |
| 530 | peerCredentials = sessionSocket.getPeerCredentials(); |
| 531 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 532 | String[] argStrings = readArgumentList(usapReader); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 533 | |
| 534 | if (argStrings != null) { |
Chris Wailes | ae93714 | 2019-01-24 12:57:33 -0800 | [diff] [blame] | 535 | args = new ZygoteArguments(argStrings); |
| 536 | |
| 537 | // TODO (chriswailes): Should this only be run for debug builds? |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 538 | validateUsapCommand(args); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 539 | break; |
| 540 | } else { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 541 | Log.e("USAP", "Truncated command received."); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 542 | IoUtils.closeQuietly(sessionSocket); |
| 543 | } |
Chris Wailes | ae93714 | 2019-01-24 12:57:33 -0800 | [diff] [blame] | 544 | } catch (Exception ex) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 545 | Log.e("USAP", ex.getMessage()); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 546 | IoUtils.closeQuietly(sessionSocket); |
| 547 | } |
| 548 | } |
| 549 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 550 | applyUidSecurityPolicy(args, peerCredentials); |
| 551 | applyDebuggerSystemProperty(args); |
| 552 | |
| 553 | int[][] rlimits = null; |
| 554 | |
| 555 | if (args.mRLimits != null) { |
| 556 | rlimits = args.mRLimits.toArray(INT_ARRAY_2D); |
| 557 | } |
| 558 | |
| 559 | // This must happen before the SELinux policy for this process is |
| 560 | // changed when specializing. |
| 561 | try { |
| 562 | // Used by ZygoteProcess.zygoteSendArgsAndGetResult to fill in a |
| 563 | // Process.ProcessStartResult object. |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 564 | usapOutputStream.writeInt(pid); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 565 | } catch (IOException ioEx) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 566 | Log.e("USAP", "Failed to write response to session socket: " + ioEx.getMessage()); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 567 | System.exit(-1); |
| 568 | } finally { |
| 569 | IoUtils.closeQuietly(sessionSocket); |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 570 | IoUtils.closeQuietly(usapPoolSocket); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 571 | } |
| 572 | |
| 573 | try { |
| 574 | ByteArrayOutputStream buffer = |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 575 | new ByteArrayOutputStream(Zygote.USAP_MANAGEMENT_MESSAGE_BYTES); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 576 | DataOutputStream outputStream = new DataOutputStream(buffer); |
| 577 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 578 | // This is written as a long so that the USAP reporting pipe and USAP pool event FD |
| 579 | // handlers in ZygoteServer.runSelectLoop can be unified. These two cases should both |
| 580 | // send/receive 8 bytes. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 581 | outputStream.writeLong(pid); |
| 582 | outputStream.flush(); |
| 583 | |
| 584 | Os.write(writePipe, buffer.toByteArray(), 0, buffer.size()); |
| 585 | } catch (Exception ex) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 586 | Log.e("USAP", |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 587 | String.format("Failed to write PID (%d) to pipe (%d): %s", |
| 588 | pid, writePipe.getInt$(), ex.getMessage())); |
| 589 | System.exit(-1); |
| 590 | } finally { |
| 591 | IoUtils.closeQuietly(writePipe); |
| 592 | } |
| 593 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 594 | specializeAppProcess(args.mUid, args.mGid, args.mGids, |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 595 | args.mRuntimeFlags, rlimits, args.mMountExternal, |
| 596 | args.mSeInfo, args.mNiceName, args.mStartChildZygote, |
| 597 | args.mInstructionSet, args.mAppDataDir, args.mPackageName, |
Sudheer Shanka | e51005d | 2019-02-24 10:24:09 -0800 | [diff] [blame] | 598 | args.mPackagesForUid, args.mSandboxId); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 599 | |
| 600 | if (args.mNiceName != null) { |
| 601 | Process.setArgV0(args.mNiceName); |
| 602 | } |
| 603 | |
| 604 | // End of the postFork event. |
| 605 | Trace.traceEnd(Trace.TRACE_TAG_ACTIVITY_MANAGER); |
| 606 | |
| 607 | return ZygoteInit.zygoteInit(args.mTargetSdkVersion, |
| 608 | args.mRemainingArgs, |
| 609 | null /* classLoader */); |
| 610 | } |
| 611 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 612 | private static final String USAP_ERROR_PREFIX = "Invalid command to USAP: "; |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 613 | |
| 614 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 615 | * Checks a set of zygote arguments to see if they can be handled by a USAP. Throws an |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 616 | * exception if an invalid arugment is encountered. |
| 617 | * @param args The arguments to test |
| 618 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 619 | private static void validateUsapCommand(ZygoteArguments args) { |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 620 | if (args.mAbiListQuery) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 621 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--query-abi-list"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 622 | } else if (args.mPidQuery) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 623 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--get-pid"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 624 | } else if (args.mPreloadDefault) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 625 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--preload-default"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 626 | } else if (args.mPreloadPackage != null) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 627 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--preload-package"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 628 | } else if (args.mPreloadApp != null) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 629 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--preload-app"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 630 | } else if (args.mStartChildZygote) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 631 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--start-child-zygote"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 632 | } else if (args.mApiBlacklistExemptions != null) { |
| 633 | throw new IllegalArgumentException( |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 634 | USAP_ERROR_PREFIX + "--set-api-blacklist-exemptions"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 635 | } else if (args.mHiddenApiAccessLogSampleRate != -1) { |
| 636 | throw new IllegalArgumentException( |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 637 | USAP_ERROR_PREFIX + "--hidden-api-log-sampling-rate="); |
Andrei Onea | e8e150d | 2019-02-18 18:27:11 +0000 | [diff] [blame] | 638 | } else if (args.mHiddenApiAccessStatslogSampleRate != -1) { |
| 639 | throw new IllegalArgumentException( |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 640 | USAP_ERROR_PREFIX + "--hidden-api-statslog-sampling-rate="); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 641 | } else if (args.mInvokeWith != null) { |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 642 | throw new IllegalArgumentException(USAP_ERROR_PREFIX + "--invoke-with"); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 643 | } else if (args.mPermittedCapabilities != 0 || args.mEffectiveCapabilities != 0) { |
| 644 | throw new ZygoteSecurityException("Client may not specify capabilities: " |
| 645 | + "permitted=0x" + Long.toHexString(args.mPermittedCapabilities) |
| 646 | + ", effective=0x" + Long.toHexString(args.mEffectiveCapabilities)); |
| 647 | } |
| 648 | } |
| 649 | |
| 650 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 651 | * @return Raw file descriptors for the read-end of USAP reporting pipes. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 652 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 653 | protected static int[] getUsapPipeFDs() { |
| 654 | return nativeGetUsapPipeFDs(); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 655 | } |
| 656 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 657 | private static native int[] nativeGetUsapPipeFDs(); |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 658 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 659 | /** |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 660 | * Remove the USAP table entry for the provided process ID. |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 661 | * |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 662 | * @param usapPID Process ID of the entry to remove |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 663 | * @return True if the entry was removed; false if it doesn't exist |
| 664 | */ |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 665 | protected static boolean removeUsapTableEntry(int usapPID) { |
| 666 | return nativeRemoveUsapTableEntry(usapPID); |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 667 | } |
| 668 | |
Chris Wailes | 7e797b6 | 2019-02-22 18:29:22 -0800 | [diff] [blame] | 669 | private static native boolean nativeRemoveUsapTableEntry(int usapPID); |
Chris Wailes | aa1c962 | 2019-01-10 16:55:32 -0800 | [diff] [blame] | 670 | |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 671 | /** |
| 672 | * uid 1000 (Process.SYSTEM_UID) may specify any uid > 1000 in normal |
| 673 | * operation. It may also specify any gid and setgroups() list it chooses. |
| 674 | * In factory test mode, it may specify any UID. |
| 675 | * |
| 676 | * @param args non-null; zygote spawner arguments |
| 677 | * @param peer non-null; peer credentials |
| 678 | * @throws ZygoteSecurityException |
| 679 | */ |
| 680 | protected static void applyUidSecurityPolicy(ZygoteArguments args, Credentials peer) |
| 681 | throws ZygoteSecurityException { |
| 682 | |
| 683 | if (peer.getUid() == Process.SYSTEM_UID) { |
| 684 | /* In normal operation, SYSTEM_UID can only specify a restricted |
| 685 | * set of UIDs. In factory test mode, SYSTEM_UID may specify any uid. |
| 686 | */ |
| 687 | boolean uidRestricted = FactoryTest.getMode() == FactoryTest.FACTORY_TEST_OFF; |
| 688 | |
| 689 | if (uidRestricted && args.mUidSpecified && (args.mUid < Process.SYSTEM_UID)) { |
| 690 | throw new ZygoteSecurityException( |
| 691 | "System UID may not launch process with UID < " |
| 692 | + Process.SYSTEM_UID); |
| 693 | } |
| 694 | } |
| 695 | |
| 696 | // If not otherwise specified, uid and gid are inherited from peer |
| 697 | if (!args.mUidSpecified) { |
| 698 | args.mUid = peer.getUid(); |
| 699 | args.mUidSpecified = true; |
| 700 | } |
| 701 | if (!args.mGidSpecified) { |
| 702 | args.mGid = peer.getGid(); |
| 703 | args.mGidSpecified = true; |
| 704 | } |
| 705 | } |
| 706 | |
| 707 | /** |
| 708 | * Applies debugger system properties to the zygote arguments. |
| 709 | * |
| 710 | * If "ro.debuggable" is "1", all apps are debuggable. Otherwise, |
| 711 | * the debugger state is specified via the "--enable-jdwp" flag |
| 712 | * in the spawn request. |
| 713 | * |
| 714 | * @param args non-null; zygote spawner args |
| 715 | */ |
| 716 | protected static void applyDebuggerSystemProperty(ZygoteArguments args) { |
| 717 | if (RoSystemProperties.DEBUGGABLE) { |
| 718 | args.mRuntimeFlags |= Zygote.DEBUG_ENABLE_JDWP; |
| 719 | } |
| 720 | } |
| 721 | |
| 722 | /** |
| 723 | * Applies zygote security policy. |
| 724 | * Based on the credentials of the process issuing a zygote command: |
| 725 | * <ol> |
| 726 | * <li> uid 0 (root) may specify --invoke-with to launch Zygote with a |
| 727 | * wrapper command. |
| 728 | * <li> Any other uid may not specify any invoke-with argument. |
| 729 | * </ul> |
| 730 | * |
| 731 | * @param args non-null; zygote spawner arguments |
| 732 | * @param peer non-null; peer credentials |
| 733 | * @throws ZygoteSecurityException |
| 734 | */ |
| 735 | protected static void applyInvokeWithSecurityPolicy(ZygoteArguments args, Credentials peer) |
| 736 | throws ZygoteSecurityException { |
| 737 | int peerUid = peer.getUid(); |
| 738 | |
| 739 | if (args.mInvokeWith != null && peerUid != 0 |
| 740 | && (args.mRuntimeFlags & Zygote.DEBUG_ENABLE_JDWP) == 0) { |
Chris Wailes | ae93714 | 2019-01-24 12:57:33 -0800 | [diff] [blame] | 741 | throw new ZygoteSecurityException("Peer is permitted to specify an " |
| 742 | + "explicit invoke-with wrapper command only for debuggable " |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 743 | + "applications."); |
| 744 | } |
| 745 | } |
| 746 | |
| 747 | /** |
| 748 | * Applies invoke-with system properties to the zygote arguments. |
| 749 | * |
| 750 | * @param args non-null; zygote args |
| 751 | */ |
| 752 | protected static void applyInvokeWithSystemProperty(ZygoteArguments args) { |
| 753 | if (args.mInvokeWith == null && args.mNiceName != null) { |
| 754 | String property = "wrap." + args.mNiceName; |
| 755 | args.mInvokeWith = SystemProperties.get(property); |
| 756 | if (args.mInvokeWith != null && args.mInvokeWith.length() == 0) { |
| 757 | args.mInvokeWith = null; |
| 758 | } |
| 759 | } |
| 760 | } |
| 761 | |
| 762 | /** |
| 763 | * Reads an argument list from the provided socket |
| 764 | * @return Argument list or null if EOF is reached |
| 765 | * @throws IOException passed straight through |
| 766 | */ |
| 767 | static String[] readArgumentList(BufferedReader socketReader) throws IOException { |
Chris Wailes | 2be2626 | 2019-01-11 16:14:43 -0800 | [diff] [blame] | 768 | int argc; |
| 769 | |
| 770 | try { |
| 771 | String argc_string = socketReader.readLine(); |
| 772 | |
| 773 | if (argc_string == null) { |
| 774 | // EOF reached. |
| 775 | return null; |
| 776 | } |
| 777 | argc = Integer.parseInt(argc_string); |
| 778 | |
| 779 | } catch (NumberFormatException ex) { |
| 780 | Log.e("Zygote", "Invalid Zygote wire format: non-int at argc"); |
| 781 | throw new IOException("Invalid wire format"); |
| 782 | } |
| 783 | |
| 784 | // See bug 1092107: large argc can be used for a DOS attack |
| 785 | if (argc > MAX_ZYGOTE_ARGC) { |
| 786 | throw new IOException("Max arg count exceeded"); |
| 787 | } |
| 788 | |
| 789 | String[] args = new String[argc]; |
| 790 | for (int arg_index = 0; arg_index < argc; arg_index++) { |
| 791 | args[arg_index] = socketReader.readLine(); |
| 792 | if (args[arg_index] == null) { |
| 793 | // We got an unexpected EOF. |
| 794 | throw new IOException("Truncated request"); |
| 795 | } |
| 796 | } |
| 797 | |
| 798 | return args; |
| 799 | } |
| 800 | |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 801 | /** |
Chris Wailes | cb0b37f | 2019-01-11 17:04:41 -0800 | [diff] [blame] | 802 | * Creates a managed LocalServerSocket object using a file descriptor |
| 803 | * created by an init.rc script. The init scripts that specify the |
| 804 | * sockets name can be found in system/core/rootdir. The socket is bound |
| 805 | * to the file system in the /dev/sockets/ directory, and the file |
| 806 | * descriptor is shared via the ANDROID_SOCKET_<socketName> environment |
| 807 | * variable. |
| 808 | */ |
| 809 | static LocalServerSocket createManagedSocketFromInitSocket(String socketName) { |
| 810 | int fileDesc; |
| 811 | final String fullSocketName = ANDROID_SOCKET_PREFIX + socketName; |
| 812 | |
| 813 | try { |
| 814 | String env = System.getenv(fullSocketName); |
| 815 | fileDesc = Integer.parseInt(env); |
| 816 | } catch (RuntimeException ex) { |
| 817 | throw new RuntimeException("Socket unset or invalid: " + fullSocketName, ex); |
| 818 | } |
| 819 | |
| 820 | try { |
| 821 | FileDescriptor fd = new FileDescriptor(); |
| 822 | fd.setInt$(fileDesc); |
| 823 | return new LocalServerSocket(fd); |
| 824 | } catch (IOException ex) { |
| 825 | throw new RuntimeException( |
| 826 | "Error building socket from file descriptor: " + fileDesc, ex); |
| 827 | } |
| 828 | } |
doheon1.lee | 885b742 | 2016-01-20 13:07:27 +0900 | [diff] [blame] | 829 | |
Orion Hodson | 46724e7 | 2018-10-19 13:05:33 +0100 | [diff] [blame] | 830 | private static void callPostForkSystemServerHooks() { |
| 831 | // SystemServer specific post fork hooks run before child post fork hooks. |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 832 | ZygoteHooks.postForkSystemServer(); |
Orion Hodson | 46724e7 | 2018-10-19 13:05:33 +0100 | [diff] [blame] | 833 | } |
| 834 | |
Nicolas Geoffray | 81edac4 | 2017-09-07 14:13:29 +0100 | [diff] [blame] | 835 | private static void callPostForkChildHooks(int runtimeFlags, boolean isSystemServer, |
Robert Sesek | d0a190df | 2018-02-12 18:46:01 -0500 | [diff] [blame] | 836 | boolean isZygote, String instructionSet) { |
Neil Fuller | 555d8b7 | 2019-01-28 18:29:20 +0000 | [diff] [blame] | 837 | ZygoteHooks.postForkChild(runtimeFlags, isSystemServer, isZygote, instructionSet); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 838 | } |
| 839 | |
Narayan Kamath | b49996d | 2017-02-06 20:24:08 +0000 | [diff] [blame] | 840 | /** |
Hiroshi Yamauchi | 1e3db87 | 2017-03-02 13:39:07 -0800 | [diff] [blame] | 841 | * Resets the calling thread priority to the default value (Thread.NORM_PRIORITY |
| 842 | * or nice value 0). This updates both the priority value in java.lang.Thread and |
| 843 | * the nice value (setpriority). |
Narayan Kamath | b49996d | 2017-02-06 20:24:08 +0000 | [diff] [blame] | 844 | */ |
Hiroshi Yamauchi | 1e3db87 | 2017-03-02 13:39:07 -0800 | [diff] [blame] | 845 | static void resetNicePriority() { |
| 846 | Thread.currentThread().setPriority(Thread.NORM_PRIORITY); |
| 847 | } |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 848 | |
| 849 | /** |
| 850 | * Executes "/system/bin/sh -c <command>" using the exec() system call. |
| 851 | * This method throws a runtime exception if exec() failed, otherwise, this |
| 852 | * method never returns. |
| 853 | * |
| 854 | * @param command The shell command to execute. |
| 855 | */ |
| 856 | public static void execShell(String command) { |
| 857 | String[] args = { "/system/bin/sh", "-c", command }; |
| 858 | try { |
Elliott Hughes | 860c591 | 2014-04-28 19:19:13 -0700 | [diff] [blame] | 859 | Os.execv(args[0], args); |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 860 | } catch (ErrnoException e) { |
| 861 | throw new RuntimeException(e); |
| 862 | } |
| 863 | } |
| 864 | |
| 865 | /** |
| 866 | * Appends quotes shell arguments to the specified string builder. |
| 867 | * The arguments are quoted using single-quotes, escaped if necessary, |
| 868 | * prefixed with a space, and appended to the command. |
| 869 | * |
| 870 | * @param command A string builder for the shell command being constructed. |
| 871 | * @param args An array of argument strings to be quoted and appended to the command. |
| 872 | * @see #execShell(String) |
| 873 | */ |
| 874 | public static void appendQuotedShellArgs(StringBuilder command, String[] args) { |
| 875 | for (String arg : args) { |
| 876 | command.append(" '").append(arg.replace("'", "'\\''")).append("'"); |
| 877 | } |
| 878 | } |
Narayan Kamath | 973b466 | 2014-03-31 13:41:26 +0100 | [diff] [blame] | 879 | } |