You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
103 lines
3.3 KiB
103 lines
3.3 KiB
4 months ago
|
// Copyright 2015, The Android Open Source Project
|
||
|
//
|
||
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
// you may not use this file except in compliance with the License.
|
||
|
// You may obtain a copy of the License at
|
||
|
//
|
||
|
// http://www.apache.org/licenses/LICENSE-2.0
|
||
|
//
|
||
|
// Unless required by applicable law or agreed to in writing, software
|
||
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
// See the License for the specific language governing permissions and
|
||
|
// limitations under the License.
|
||
|
|
||
|
#include <fcntl.h>
|
||
|
#include <sys/stat.h>
|
||
|
#include <sys/types.h>
|
||
|
#include <unistd.h>
|
||
|
|
||
|
#include <android-base/file.h>
|
||
|
#include <android-base/logging.h>
|
||
|
#include <android-base/unique_fd.h>
|
||
|
|
||
|
#include <libminijail.h>
|
||
|
#include <scoped_minijail.h>
|
||
|
|
||
|
#include "minijail.h"
|
||
|
|
||
|
namespace android {
|
||
|
|
||
|
int WritePolicyToPipe(const std::string& base_policy_content,
|
||
|
const std::vector<std::string>& additional_policy_contents)
|
||
|
{
|
||
|
int pipefd[2];
|
||
|
if (pipe(pipefd) == -1) {
|
||
|
PLOG(ERROR) << "pipe() failed";
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
base::unique_fd write_end(pipefd[1]);
|
||
|
std::string content = base_policy_content;
|
||
|
|
||
|
for (auto one_content : additional_policy_contents) {
|
||
|
if (one_content.length() > 0) {
|
||
|
content += "\n";
|
||
|
content += one_content;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
if (!base::WriteStringToFd(content, write_end.get())) {
|
||
|
LOG(ERROR) << "Could not write policy to fd";
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
return pipefd[0];
|
||
|
}
|
||
|
|
||
|
void SetUpMinijail(const std::string& base_policy_path,
|
||
|
const std::string& additional_policy_path)
|
||
|
{
|
||
|
SetUpMinijailList(base_policy_path, {additional_policy_path});
|
||
|
}
|
||
|
|
||
|
void SetUpMinijailList(const std::string& base_policy_path,
|
||
|
const std::vector<std::string>& additional_policy_paths)
|
||
|
{
|
||
|
std::string base_policy_content;
|
||
|
std::vector<std::string> additional_policy_contents;
|
||
|
if (!base::ReadFileToString(base_policy_path, &base_policy_content,
|
||
|
false /* follow_symlinks */)) {
|
||
|
LOG(FATAL) << "Could not read base policy file '" << base_policy_path << "'";
|
||
|
}
|
||
|
|
||
|
for (auto one_policy_path : additional_policy_paths) {
|
||
|
std::string one_policy_content;
|
||
|
if (one_policy_path.length() > 0 &&
|
||
|
!base::ReadFileToString(one_policy_path, &one_policy_content,
|
||
|
false /* follow_symlinks */)) {
|
||
|
// TODO: harder failure (fatal unless ENOENT?)
|
||
|
LOG(WARNING) << "Could not read additional policy file '" << one_policy_path << "'";
|
||
|
}
|
||
|
additional_policy_contents.push_back(one_policy_content);
|
||
|
}
|
||
|
|
||
|
base::unique_fd policy_fd(WritePolicyToPipe(base_policy_content, additional_policy_contents));
|
||
|
if (policy_fd.get() == -1) {
|
||
|
LOG(FATAL) << "Could not write seccomp policy to fd";
|
||
|
}
|
||
|
|
||
|
ScopedMinijail jail{minijail_new()};
|
||
|
if (!jail) {
|
||
|
LOG(FATAL) << "Failed to create minijail.";
|
||
|
}
|
||
|
|
||
|
minijail_no_new_privs(jail.get());
|
||
|
minijail_log_seccomp_filter_failures(jail.get());
|
||
|
minijail_use_seccomp_filter(jail.get());
|
||
|
// Transfer ownership of |policy_fd|.
|
||
|
minijail_parse_seccomp_filters_from_fd(jail.get(), policy_fd.release());
|
||
|
minijail_enter(jail.get());
|
||
|
}
|
||
|
}
|