• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2016 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 #include "common/libs/fs/shared_fd.h"
17 
18 #include <sys/types.h>
19 #include <sys/stat.h>
20 #include <sys/mman.h>
21 #include <sys/syscall.h>
22 #include <cstddef>
23 #include <errno.h>
24 #include <fcntl.h>
25 #include <netinet/in.h>
26 #include <unistd.h>
27 #include <algorithm>
28 #include <vector>
29 
30 #include "android-base/logging.h"
31 #include "common/libs/fs/shared_select.h"
32 
33 // #define ENABLE_GCE_SHARED_FD_LOGGING 1
34 
35 namespace cuttlefish {
36 
37 namespace {
38 
MarkAll(const SharedFDSet & input,fd_set * dest,int * max_index)39 void MarkAll(const SharedFDSet& input, fd_set* dest, int* max_index) {
40   for (SharedFDSet::const_iterator it = input.begin(); it != input.end();
41        ++it) {
42     (*it)->Set(dest, max_index);
43   }
44 }
45 
CheckMarked(fd_set * in_out_mask,SharedFDSet * in_out_set)46 void CheckMarked(fd_set* in_out_mask, SharedFDSet* in_out_set) {
47   if (!in_out_set) {
48     return;
49   }
50   SharedFDSet save;
51   save.swap(in_out_set);
52   for (SharedFDSet::iterator it = save.begin(); it != save.end(); ++it) {
53     if ((*it)->IsSet(in_out_mask)) {
54       in_out_set->Set(*it);
55     }
56   }
57 }
58 
59 /*
60  * Android currently has host prebuilts of glibc 2.15 and 2.17, but
61  * memfd_create was only added in glibc 2.27. It was defined in Linux 3.17,
62  * so we consider it safe to use the low-level arbitrary syscall wrapper.
63  */
64 #ifndef __NR_memfd_create
65 # if defined(__x86_64__)
66 #  define __NR_memfd_create 319
67 # elif defined(__i386__)
68 #  define __NR_memfd_create 356
69 # elif defined(__aarch64__)
70 #  define __NR_memfd_create 279
71 # else
72 /* No interest in other architectures. */
73 #  error "Unknown architecture."
74 # endif
75 #endif
76 
memfd_create_wrapper(const char * name,unsigned int flags)77 int memfd_create_wrapper(const char* name, unsigned int flags) {
78 #ifdef CUTTLEFISH_HOST
79   // TODO(schuffelen): Use memfd_create with a newer host libc.
80   return syscall(__NR_memfd_create, name, flags);
81 #else
82   return memfd_create(name, flags);
83 #endif
84 }
85 
86 }  // namespace
87 
CopyFrom(FileInstance & in,size_t length)88 bool FileInstance::CopyFrom(FileInstance& in, size_t length) {
89   std::vector<char> buffer(8192);
90   while (length > 0) {
91     ssize_t num_read = in.Read(buffer.data(), std::min(buffer.size(), length));
92     length -= num_read;
93     if (num_read <= 0) {
94       return false;
95     }
96     if (Write(buffer.data(), num_read) != num_read) {
97       // The caller will have to log an appropriate message.
98       return false;
99     }
100   }
101   return true;
102 }
103 
Close()104 void FileInstance::Close() {
105   std::stringstream message;
106   if (fd_ == -1) {
107     errno_ = EBADF;
108   } else if (close(fd_) == -1) {
109     errno_ = errno;
110     if (identity_.size()) {
111       message << __FUNCTION__ << ": " << identity_ << " failed (" << StrError() << ")";
112       std::string message_str = message.str();
113       Log(message_str.c_str());
114     }
115   } else {
116     if (identity_.size()) {
117       message << __FUNCTION__ << ": " << identity_ << "succeeded";
118       std::string message_str = message.str();
119       Log(message_str.c_str());
120     }
121   }
122   fd_ = -1;
123 }
124 
ConnectWithTimeout(const struct sockaddr * addr,socklen_t addrlen,struct timeval * timeout)125 int FileInstance::ConnectWithTimeout(const struct sockaddr* addr,
126                                      socklen_t addrlen,
127                                      struct timeval* timeout) {
128   int original_flags = Fcntl(F_GETFL, 0);
129   if (original_flags == -1) {
130     LOG(ERROR) << "Could not get current file descriptor flags: " << StrError();
131     return -1;
132   }
133   if (Fcntl(F_SETFL, original_flags | O_NONBLOCK) == -1) {
134     LOG(ERROR) << "Failed to set O_NONBLOCK: " << StrError();
135     return -1;
136   }
137   Connect(addr, addrlen);  // This will return immediately because of O_NONBLOCK
138 
139   fd_set fdset;
140   FD_ZERO(&fdset);
141   FD_SET(fd_, &fdset);
142 
143   int select_res = select(fd_ + 1, nullptr, &fdset, nullptr, timeout);
144 
145   if (Fcntl(F_SETFL, original_flags) == -1) {
146     LOG(ERROR) << "Failed to restore original flags: " << StrError();
147     return -1;
148   }
149 
150   if (select_res != 1) {
151     LOG(ERROR) << "Did not connect within the timeout";
152     return -1;
153   }
154 
155   int so_error;
156   socklen_t len = sizeof(so_error);
157   if (GetSockOpt(SOL_SOCKET, SO_ERROR, &so_error, &len) == -1) {
158     LOG(ERROR) << "Failed to get socket options: " << StrError();
159     return -1;
160   }
161 
162   if (so_error != 0) {
163     LOG(ERROR) << "Failure in opening socket: " << so_error;
164     errno_ = so_error;
165     return -1;
166   }
167   errno_ = 0;
168   return 0;
169 }
170 
IsSet(fd_set * in) const171 bool FileInstance::IsSet(fd_set* in) const {
172   if (IsOpen() && FD_ISSET(fd_, in)) {
173     return true;
174   }
175   return false;
176 }
177 
178 #if ENABLE_GCE_SHARED_FD_LOGGING
Log(const char * message)179 void FileInstance::Log(const char* message) {
180   LOG(INFO) << message;
181 }
182 #else
Log(const char *)183 void FileInstance::Log(const char*) {}
184 #endif
185 
Set(fd_set * dest,int * max_index) const186 void FileInstance::Set(fd_set* dest, int* max_index) const {
187   if (!IsOpen()) {
188     return;
189   }
190   if (fd_ >= *max_index) {
191     *max_index = fd_ + 1;
192   }
193   FD_SET(fd_, dest);
194 }
195 
Select(SharedFDSet * read_set,SharedFDSet * write_set,SharedFDSet * error_set,struct timeval * timeout)196 int Select(SharedFDSet* read_set, SharedFDSet* write_set,
197            SharedFDSet* error_set, struct timeval* timeout) {
198   int max_index = 0;
199   fd_set readfds;
200   FD_ZERO(&readfds);
201   if (read_set) {
202     MarkAll(*read_set, &readfds, &max_index);
203   }
204   fd_set writefds;
205   FD_ZERO(&writefds);
206   if (write_set) {
207     MarkAll(*write_set, &writefds, &max_index);
208   }
209   fd_set errorfds;
210   FD_ZERO(&errorfds);
211   if (error_set) {
212     MarkAll(*error_set, &errorfds, &max_index);
213   }
214 
215   int rval = TEMP_FAILURE_RETRY(
216       select(max_index, &readfds, &writefds, &errorfds, timeout));
217   FileInstance::Log("select\n");
218   CheckMarked(&readfds, read_set);
219   CheckMarked(&writefds, write_set);
220   CheckMarked(&errorfds, error_set);
221   return rval;
222 }
223 
MakeAddress(const char * name,bool abstract,struct sockaddr_un * dest,socklen_t * len)224 static void MakeAddress(const char* name, bool abstract,
225                         struct sockaddr_un* dest, socklen_t* len) {
226   memset(dest, 0, sizeof(*dest));
227   dest->sun_family = AF_UNIX;
228   // sun_path is NOT expected to be nul-terminated.
229   // See man 7 unix.
230   size_t namelen;
231   if (abstract) {
232     // ANDROID_SOCKET_NAMESPACE_ABSTRACT
233     namelen = strlen(name);
234     CHECK_LE(namelen, sizeof(dest->sun_path) - 1)
235         << "MakeAddress failed. Name=" << name << " is longer than allowed.";
236     dest->sun_path[0] = 0;
237     memcpy(dest->sun_path + 1, name, namelen);
238   } else {
239     // ANDROID_SOCKET_NAMESPACE_RESERVED
240     // ANDROID_SOCKET_NAMESPACE_FILESYSTEM
241     // TODO(pinghao): Distinguish between them?
242     namelen = strlen(name);
243     CHECK_LE(namelen, sizeof(dest->sun_path))
244         << "MakeAddress failed. Name=" << name << " is longer than allowed.";
245     strncpy(dest->sun_path, name, strlen(name));
246   }
247   *len = namelen + offsetof(struct sockaddr_un, sun_path) + 1;
248 }
249 
Accept(const FileInstance & listener,struct sockaddr * addr,socklen_t * addrlen)250 SharedFD SharedFD::Accept(const FileInstance& listener, struct sockaddr* addr,
251                           socklen_t* addrlen) {
252   return SharedFD(
253       std::shared_ptr<FileInstance>(listener.Accept(addr, addrlen)));
254 }
255 
Accept(const FileInstance & listener)256 SharedFD SharedFD::Accept(const FileInstance& listener) {
257   return SharedFD::Accept(listener, NULL, NULL);
258 }
259 
Dup(int unmanaged_fd)260 SharedFD SharedFD::Dup(int unmanaged_fd) {
261   int fd = fcntl(unmanaged_fd, F_DUPFD_CLOEXEC, 3);
262   int error_num = errno;
263   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, error_num)));
264 }
265 
Pipe(SharedFD * fd0,SharedFD * fd1)266 bool SharedFD::Pipe(SharedFD* fd0, SharedFD* fd1) {
267   int fds[2];
268   int rval = pipe(fds);
269   if (rval != -1) {
270     (*fd0) = std::shared_ptr<FileInstance>(new FileInstance(fds[0], errno));
271     (*fd1) = std::shared_ptr<FileInstance>(new FileInstance(fds[1], errno));
272     return true;
273   }
274   return false;
275 }
276 
Event(int initval,int flags)277 SharedFD SharedFD::Event(int initval, int flags) {
278   int fd = eventfd(initval, flags);
279   return std::shared_ptr<FileInstance>(new FileInstance(fd, errno));
280 }
281 
MemfdCreate(const std::string & name,unsigned int flags)282 SharedFD SharedFD::MemfdCreate(const std::string& name, unsigned int flags) {
283   int fd = memfd_create_wrapper(name.c_str(), flags);
284   int error_num = errno;
285   return std::shared_ptr<FileInstance>(new FileInstance(fd, error_num));
286 }
287 
SocketPair(int domain,int type,int protocol,SharedFD * fd0,SharedFD * fd1)288 bool SharedFD::SocketPair(int domain, int type, int protocol,
289                           SharedFD* fd0, SharedFD* fd1) {
290   int fds[2];
291   int rval = socketpair(domain, type, protocol, fds);
292   if (rval != -1) {
293     (*fd0) = std::shared_ptr<FileInstance>(new FileInstance(fds[0], errno));
294     (*fd1) = std::shared_ptr<FileInstance>(new FileInstance(fds[1], errno));
295     return true;
296   }
297   return false;
298 }
299 
Open(const std::string & path,int flags,mode_t mode)300 SharedFD SharedFD::Open(const std::string& path, int flags, mode_t mode) {
301   int fd = TEMP_FAILURE_RETRY(open(path.c_str(), flags, mode));
302   if (fd == -1) {
303     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
304   } else {
305     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
306   }
307 }
308 
Creat(const std::string & path,mode_t mode)309 SharedFD SharedFD::Creat(const std::string& path, mode_t mode) {
310   return SharedFD::Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode);
311 }
312 
Socket(int domain,int socket_type,int protocol)313 SharedFD SharedFD::Socket(int domain, int socket_type, int protocol) {
314   int fd = TEMP_FAILURE_RETRY(socket(domain, socket_type, protocol));
315   if (fd == -1) {
316     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
317   } else {
318     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
319   }
320 }
321 
Mkstemp(std::string * path)322 SharedFD SharedFD::Mkstemp(std::string* path) {
323   int fd = mkstemp(path->data());
324   if (fd == -1) {
325     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
326   } else {
327     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
328   }
329 }
330 
ErrorFD(int error)331 SharedFD SharedFD::ErrorFD(int error) {
332   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(-1, error)));
333 }
334 
SocketLocalClient(const std::string & name,bool abstract,int in_type)335 SharedFD SharedFD::SocketLocalClient(const std::string& name, bool abstract,
336                                      int in_type) {
337   return SocketLocalClient(name, abstract, in_type, 0);
338 }
339 
SocketLocalClient(const std::string & name,bool abstract,int in_type,int timeout_seconds)340 SharedFD SharedFD::SocketLocalClient(const std::string& name, bool abstract,
341                                      int in_type, int timeout_seconds) {
342   struct sockaddr_un addr;
343   socklen_t addrlen;
344   MakeAddress(name.c_str(), abstract, &addr, &addrlen);
345   SharedFD rval = SharedFD::Socket(PF_UNIX, in_type, 0);
346   if (!rval->IsOpen()) {
347     return rval;
348   }
349   struct timeval timeout = {timeout_seconds, 0};
350   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
351   if (rval->ConnectWithTimeout(casted_addr, addrlen, &timeout) == -1) {
352     return SharedFD::ErrorFD(rval->GetErrno());
353   }
354   return rval;
355 }
356 
SocketLocalClient(int port,int type)357 SharedFD SharedFD::SocketLocalClient(int port, int type) {
358   sockaddr_in addr{};
359   addr.sin_family = AF_INET;
360   addr.sin_port = htons(port);
361   addr.sin_addr.s_addr = htonl(INADDR_ANY);
362   SharedFD rval = SharedFD::Socket(AF_INET, type, 0);
363   if (!rval->IsOpen()) {
364     return rval;
365   }
366   if (rval->Connect(reinterpret_cast<const sockaddr*>(&addr),
367                     sizeof addr) < 0) {
368     return SharedFD::ErrorFD(rval->GetErrno());
369   }
370   return rval;
371 }
372 
SocketLocalServer(int port,int type)373 SharedFD SharedFD::SocketLocalServer(int port, int type) {
374   struct sockaddr_in addr;
375   memset(&addr, 0, sizeof(addr));
376   addr.sin_family = AF_INET;
377   addr.sin_port = htons(port);
378   addr.sin_addr.s_addr = htonl(INADDR_ANY);
379   SharedFD rval = SharedFD::Socket(AF_INET, type, 0);
380   if(!rval->IsOpen()) {
381     return rval;
382   }
383   int n = 1;
384   if (rval->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1) {
385     LOG(ERROR) << "SetSockOpt failed " << rval->StrError();
386     return SharedFD::ErrorFD(rval->GetErrno());
387   }
388   if(rval->Bind(reinterpret_cast<sockaddr*>(&addr), sizeof(addr)) < 0) {
389     LOG(ERROR) << "Bind failed " << rval->StrError();
390     return SharedFD::ErrorFD(rval->GetErrno());
391   }
392   if (type == SOCK_STREAM || type == SOCK_SEQPACKET) {
393     if (rval->Listen(4) < 0) {
394       LOG(ERROR) << "Listen failed " << rval->StrError();
395       return SharedFD::ErrorFD(rval->GetErrno());
396     }
397   }
398   return rval;
399 }
400 
SocketLocalServer(const std::string & name,bool abstract,int in_type,mode_t mode)401 SharedFD SharedFD::SocketLocalServer(const std::string& name, bool abstract,
402                                      int in_type, mode_t mode) {
403   // DO NOT UNLINK addr.sun_path. It does NOT have to be null-terminated.
404   // See man 7 unix for more details.
405   if (!abstract) (void)unlink(name.c_str());
406 
407   struct sockaddr_un addr;
408   socklen_t addrlen;
409   MakeAddress(name.c_str(), abstract, &addr, &addrlen);
410   SharedFD rval = SharedFD::Socket(PF_UNIX, in_type, 0);
411   if (!rval->IsOpen()) {
412     return rval;
413   }
414 
415   int n = 1;
416   if (rval->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1) {
417     LOG(ERROR) << "SetSockOpt failed " << rval->StrError();
418     return SharedFD::ErrorFD(rval->GetErrno());
419   }
420   if (rval->Bind(reinterpret_cast<sockaddr*>(&addr), addrlen) == -1) {
421     LOG(ERROR) << "Bind failed; name=" << name << ": " << rval->StrError();
422     return SharedFD::ErrorFD(rval->GetErrno());
423   }
424 
425   /* Only the bottom bits are really the socket type; there are flags too. */
426   constexpr int SOCK_TYPE_MASK = 0xf;
427   auto socket_type = in_type & SOCK_TYPE_MASK;
428 
429   // Connection oriented sockets: start listening.
430   if (socket_type == SOCK_STREAM || socket_type == SOCK_SEQPACKET) {
431     // Follows the default from socket_local_server
432     if (rval->Listen(1) == -1) {
433       LOG(ERROR) << "Listen failed: " << rval->StrError();
434       return SharedFD::ErrorFD(rval->GetErrno());
435     }
436   }
437 
438   if (!abstract) {
439     if (TEMP_FAILURE_RETRY(chmod(name.c_str(), mode)) == -1) {
440       LOG(ERROR) << "chmod failed: " << strerror(errno);
441       // However, continue since we do have a listening socket
442     }
443   }
444   return rval;
445 }
446 
VsockServer(unsigned int port,int type)447 SharedFD SharedFD::VsockServer(unsigned int port, int type) {
448   auto vsock = SharedFD::Socket(AF_VSOCK, type, 0);
449   if (!vsock->IsOpen()) {
450     return vsock;
451   }
452   sockaddr_vm addr{};
453   addr.svm_family = AF_VSOCK;
454   addr.svm_port = port;
455   addr.svm_cid = VMADDR_CID_ANY;
456   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
457   if (vsock->Bind(casted_addr, sizeof(addr)) == -1) {
458     LOG(ERROR) << "Bind failed (" << vsock->StrError() << ")";
459     return SharedFD::ErrorFD(vsock->GetErrno());
460   }
461   if (type == SOCK_STREAM || type == SOCK_SEQPACKET) {
462     if (vsock->Listen(4) < 0) {
463       LOG(ERROR) << "Listen failed (" << vsock->StrError() << ")";
464       return SharedFD::ErrorFD(vsock->GetErrno());
465     }
466   }
467   return vsock;
468 }
469 
VsockServer(int type)470 SharedFD SharedFD::VsockServer(int type) {
471   return VsockServer(VMADDR_PORT_ANY, type);
472 }
473 
VsockClient(unsigned int cid,unsigned int port,int type)474 SharedFD SharedFD::VsockClient(unsigned int cid, unsigned int port, int type) {
475   auto vsock = SharedFD::Socket(AF_VSOCK, type, 0);
476   if (!vsock->IsOpen()) {
477     return vsock;
478   }
479   sockaddr_vm addr{};
480   addr.svm_family = AF_VSOCK;
481   addr.svm_port = port;
482   addr.svm_cid = cid;
483   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
484   if (vsock->Connect(casted_addr, sizeof(addr)) == -1) {
485     return SharedFD::ErrorFD(vsock->GetErrno());
486   }
487   return vsock;
488 }
489 
lock() const490 SharedFD WeakFD::lock() const {
491   auto locked_file_instance = value_.lock();
492   if (locked_file_instance) {
493     return SharedFD(locked_file_instance);
494   }
495   return SharedFD();
496 }
497 
ScopedMMap(void * ptr,size_t len)498 ScopedMMap::ScopedMMap(void* ptr, size_t len) : ptr_(ptr), len_(len) {}
499 
ScopedMMap()500 ScopedMMap::ScopedMMap() : ptr_(MAP_FAILED), len_(0) {}
501 
ScopedMMap(ScopedMMap && other)502 ScopedMMap::ScopedMMap(ScopedMMap&& other)
503     : ptr_(other.ptr_), len_(other.len_) {
504   other.ptr_ = MAP_FAILED;
505   other.len_ = 0;
506 }
507 
~ScopedMMap()508 ScopedMMap::~ScopedMMap() {
509   if (ptr_ != MAP_FAILED) {
510     munmap(ptr_, len_);
511   }
512 }
513 
514 }  // namespace cuttlefish
515