• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2016 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 #include "common/libs/fs/shared_fd.h"
17 
18 #include <arpa/inet.h>
19 #include <errno.h>
20 #include <fcntl.h>
21 #include <net/if.h>
22 #include <netinet/in.h>
23 #include <poll.h>
24 #include <sys/file.h>
25 #include <sys/mman.h>
26 #include <sys/stat.h>
27 #include <sys/syscall.h>
28 #include <sys/types.h>
29 #include <unistd.h>
30 #include <cstddef>
31 
32 #include <algorithm>
33 #include <sstream>
34 #include <vector>
35 
36 #include <android-base/file.h>
37 #include <android-base/logging.h>
38 
39 #include "common/libs/fs/shared_buf.h"
40 #include "common/libs/fs/shared_select.h"
41 #include "common/libs/utils/known_paths.h"
42 #include "common/libs/utils/result.h"
43 
44 // #define ENABLE_GCE_SHARED_FD_LOGGING 1
45 
46 namespace cuttlefish {
47 
48 namespace {
49 
50 class LocalErrno {
51  public:
LocalErrno(int & local_errno)52   LocalErrno(int& local_errno) : local_errno_(local_errno), preserved_(errno) {
53     errno = 0;
54   }
~LocalErrno()55   ~LocalErrno() {
56     local_errno_ = errno;
57     errno = preserved_;
58   }
59 
60  private:
61   int& local_errno_;
62   int preserved_;
63 };
64 
MarkAll(const SharedFDSet & input,fd_set * dest,int * max_index)65 void MarkAll(const SharedFDSet& input, fd_set* dest, int* max_index) {
66   for (SharedFDSet::const_iterator it = input.begin(); it != input.end();
67        ++it) {
68     (*it)->Set(dest, max_index);
69   }
70 }
71 
CheckMarked(fd_set * in_out_mask,SharedFDSet * in_out_set)72 void CheckMarked(fd_set* in_out_mask, SharedFDSet* in_out_set) {
73   if (!in_out_set) {
74     return;
75   }
76   SharedFDSet save;
77   save.swap(in_out_set);
78   for (SharedFDSet::iterator it = save.begin(); it != save.end(); ++it) {
79     if ((*it)->IsSet(in_out_mask)) {
80       in_out_set->Set(*it);
81     }
82   }
83 }
84 
memfd_create_wrapper(const char * name,unsigned int flags)85 int memfd_create_wrapper(const char* name, unsigned int flags) {
86 #ifdef __linux__
87 #ifdef CUTTLEFISH_HOST
88   // TODO(schuffelen): Use memfd_create with a newer host libc.
89   return syscall(__NR_memfd_create, name, flags);
90 #else
91   return memfd_create(name, flags);
92 #endif
93 #else
94   (void)flags;
95   return shm_open(name, O_RDWR);
96 #endif
97 }
98 
IsRegularFile(const int fd)99 bool IsRegularFile(const int fd) {
100   struct stat info;
101   if (fstat(fd, &info) < 0) {
102     return false;
103   }
104   return S_ISREG(info.st_mode);
105 }
106 
107 constexpr size_t kPreferredBufferSize = 8192;
108 
109 }  // namespace
110 
CopyFrom(FileInstance & in,size_t length,FileInstance * stop)111 bool FileInstance::CopyFrom(FileInstance& in, size_t length, FileInstance* stop) {
112   LocalErrno record_errno(errno_);
113   std::vector<char> buffer(kPreferredBufferSize);
114   while (length > 0) {
115     int nfds = stop == nullptr ? 2 : 3;
116     // Wait until either in becomes readable or our fd closes.
117     constexpr ssize_t IN = 0;
118     constexpr ssize_t OUT = 1;
119     constexpr ssize_t STOP = 2;
120     struct pollfd pollfds[3];
121     pollfds[IN].fd = in.fd_;
122     pollfds[IN].events = POLLIN;
123     pollfds[IN].revents = 0;
124     pollfds[OUT].fd = fd_;
125     pollfds[OUT].events = 0;
126     pollfds[OUT].revents = 0;
127     if (stop) {
128       pollfds[STOP].fd = stop->fd_;
129       pollfds[STOP].events = POLLIN;
130       pollfds[STOP].revents = 0;
131     }
132     if (poll(pollfds, nfds, -1 /* indefinitely */) < 0) {
133       return false;
134     }
135     if (stop && pollfds[STOP].revents & POLLIN) {
136       return false;
137     }
138     if (pollfds[OUT].revents != 0) {
139       // destination was either closed, invalid or errored, either way there is no
140       // point in continuing.
141       return false;
142     }
143 
144     ssize_t num_read = in.Read(buffer.data(), std::min(buffer.size(), length));
145     if (num_read <= 0) {
146       return false;
147     }
148     length -= num_read;
149 
150     ssize_t written = 0;
151     do {
152       // No need to use poll for writes: even if the source closes, the data
153       // needs to be delivered to the other side.
154       auto res = Write(buffer.data(), num_read);
155       if (res <= 0) {
156         // The caller will have to log an appropriate message.
157         return false;
158       }
159       written += res;
160     } while(written < num_read);
161   }
162   return true;
163 }
164 
CopyAllFrom(FileInstance & in,FileInstance * stop)165 bool FileInstance::CopyAllFrom(FileInstance& in, FileInstance* stop) {
166   // FileInstance may have been constructed with a non-zero errno_ value because
167   // the errno variable is not zeroed out before.
168   errno_ = 0;
169   in.errno_ = 0;
170   while (CopyFrom(in, kPreferredBufferSize, stop)) {
171   }
172   // Only return false if there was an actual error.
173   return !GetErrno() && !in.GetErrno();
174 }
175 
Close()176 void FileInstance::Close() {
177   std::stringstream message;
178   if (fd_ == -1) {
179     errno_ = EBADF;
180   } else if (close(fd_) == -1) {
181     errno_ = errno;
182     if (identity_.size()) {
183       message << __FUNCTION__ << ": " << identity_ << " failed (" << StrError() << ")";
184       std::string message_str = message.str();
185       Log(message_str.c_str());
186     }
187   } else {
188     if (identity_.size()) {
189       message << __FUNCTION__ << ": " << identity_ << "succeeded";
190       std::string message_str = message.str();
191       Log(message_str.c_str());
192     }
193   }
194   fd_ = -1;
195 }
196 
Chmod(mode_t mode)197 bool FileInstance::Chmod(mode_t mode) {
198   LocalErrno record_errno(errno_);
199 
200   return fchmod(fd_, mode) == 0;
201 }
202 
ConnectWithTimeout(const struct sockaddr * addr,socklen_t addrlen,struct timeval * timeout)203 int FileInstance::ConnectWithTimeout(const struct sockaddr* addr,
204                                      socklen_t addrlen,
205                                      struct timeval* timeout) {
206   int original_flags = Fcntl(F_GETFL, 0);
207   if (original_flags == -1) {
208     LOG(ERROR) << "Could not get current file descriptor flags: " << StrError();
209     return -1;
210   }
211   if (Fcntl(F_SETFL, original_flags | O_NONBLOCK) == -1) {
212     LOG(ERROR) << "Failed to set O_NONBLOCK: " << StrError();
213     return -1;
214   }
215 
216   auto connect_res = Connect(
217       addr, addrlen);  // This will return immediately because of O_NONBLOCK
218 
219   if (connect_res == 0) {  // Immediate success
220     if (Fcntl(F_SETFL, original_flags) == -1) {
221       LOG(ERROR) << "Failed to restore original flags: " << StrError();
222       return -1;
223     }
224     return 0;
225   }
226 
227   if (GetErrno() != EAGAIN && GetErrno() != EINPROGRESS) {
228     LOG(DEBUG) << "Immediate connection failure: " << StrError();
229     if (Fcntl(F_SETFL, original_flags) == -1) {
230       LOG(ERROR) << "Failed to restore original flags: " << StrError();
231     }
232     return -1;
233   }
234 
235   fd_set fdset;
236   FD_ZERO(&fdset);
237   FD_SET(fd_, &fdset);
238 
239   int select_res = select(fd_ + 1, nullptr, &fdset, nullptr, timeout);
240 
241   if (Fcntl(F_SETFL, original_flags) == -1) {
242     LOG(ERROR) << "Failed to restore original flags: " << StrError();
243     return -1;
244   }
245 
246   if (select_res != 1) {
247     LOG(ERROR) << "Did not connect within the timeout";
248     return -1;
249   }
250 
251   int so_error;
252   socklen_t len = sizeof(so_error);
253   if (GetSockOpt(SOL_SOCKET, SO_ERROR, &so_error, &len) == -1) {
254     LOG(ERROR) << "Failed to get socket options: " << StrError();
255     return -1;
256   }
257 
258   if (so_error != 0) {
259     LOG(ERROR) << "Failure in opening socket: " << so_error;
260     errno_ = so_error;
261     return -1;
262   }
263   errno_ = 0;
264   return 0;
265 }
266 
IsSet(fd_set * in) const267 bool FileInstance::IsSet(fd_set* in) const {
268   if (IsOpen() && FD_ISSET(fd_, in)) {
269     return true;
270   }
271   return false;
272 }
273 
274 #if ENABLE_GCE_SHARED_FD_LOGGING
Log(const char * message)275 void FileInstance::Log(const char* message) {
276   LOG(INFO) << message;
277 }
278 #else
Log(const char *)279 void FileInstance::Log(const char*) {}
280 #endif
281 
Set(fd_set * dest,int * max_index) const282 void FileInstance::Set(fd_set* dest, int* max_index) const {
283   if (!IsOpen()) {
284     return;
285   }
286   if (fd_ >= *max_index) {
287     *max_index = fd_ + 1;
288   }
289   FD_SET(fd_, dest);
290 }
291 
Select(SharedFDSet * read_set,SharedFDSet * write_set,SharedFDSet * error_set,struct timeval * timeout)292 int Select(SharedFDSet* read_set, SharedFDSet* write_set,
293            SharedFDSet* error_set, struct timeval* timeout) {
294   int max_index = 0;
295   fd_set readfds;
296   FD_ZERO(&readfds);
297   if (read_set) {
298     MarkAll(*read_set, &readfds, &max_index);
299   }
300   fd_set writefds;
301   FD_ZERO(&writefds);
302   if (write_set) {
303     MarkAll(*write_set, &writefds, &max_index);
304   }
305   fd_set errorfds;
306   FD_ZERO(&errorfds);
307   if (error_set) {
308     MarkAll(*error_set, &errorfds, &max_index);
309   }
310 
311   int rval = TEMP_FAILURE_RETRY(
312       select(max_index, &readfds, &writefds, &errorfds, timeout));
313   FileInstance::Log("select\n");
314   CheckMarked(&readfds, read_set);
315   CheckMarked(&writefds, write_set);
316   CheckMarked(&errorfds, error_set);
317   return rval;
318 }
319 
SharedFD(SharedFD && other)320 SharedFD::SharedFD(SharedFD&& other) {
321   value_ = std::move(other.value_);
322   other.value_.reset(new FileInstance(-1, EBADF));
323 }
324 
operator =(SharedFD && other)325 SharedFD& SharedFD::operator=(SharedFD&& other) {
326   value_ = std::move(other.value_);
327   other.value_.reset(new FileInstance(-1, EBADF));
328   return *this;
329 }
330 
Poll(std::vector<PollSharedFd> & fds,int timeout)331 int SharedFD::Poll(std::vector<PollSharedFd>& fds, int timeout) {
332   return Poll(fds.data(), fds.size(), timeout);
333 }
334 
Poll(PollSharedFd * fds,size_t num_fds,int timeout)335 int SharedFD::Poll(PollSharedFd* fds, size_t num_fds, int timeout) {
336   std::vector<pollfd> native_pollfds(num_fds);
337   for (size_t i = 0; i < num_fds; i++) {
338     native_pollfds[i].fd = fds[i].fd->fd_;
339     native_pollfds[i].events = fds[i].events;
340     native_pollfds[i].revents = 0;
341   }
342   int ret = poll(native_pollfds.data(), native_pollfds.size(), timeout);
343   for (size_t i = 0; i < num_fds; i++) {
344     fds[i].revents = native_pollfds[i].revents;
345   }
346   return ret;
347 }
348 
MakeAddress(const char * name,bool abstract,struct sockaddr_un * dest,socklen_t * len)349 static void MakeAddress(const char* name, bool abstract,
350                         struct sockaddr_un* dest, socklen_t* len) {
351   memset(dest, 0, sizeof(*dest));
352   dest->sun_family = AF_UNIX;
353   // sun_path is NOT expected to be nul-terminated.
354   // See man 7 unix.
355   size_t namelen;
356   if (abstract) {
357     // ANDROID_SOCKET_NAMESPACE_ABSTRACT
358     namelen = strlen(name);
359     CHECK_LE(namelen, sizeof(dest->sun_path) - 1)
360         << "MakeAddress failed. Name=" << name << " is longer than allowed.";
361     dest->sun_path[0] = 0;
362     memcpy(dest->sun_path + 1, name, namelen);
363   } else {
364     // ANDROID_SOCKET_NAMESPACE_RESERVED
365     // ANDROID_SOCKET_NAMESPACE_FILESYSTEM
366     // TODO(pinghao): Distinguish between them?
367     namelen = strlen(name);
368     CHECK_LE(namelen, sizeof(dest->sun_path))
369         << "MakeAddress failed. Name=" << name << " is longer than allowed.";
370     strncpy(dest->sun_path, name, strlen(name));
371   }
372   *len = namelen + offsetof(struct sockaddr_un, sun_path) + 1;
373 }
374 
Accept(const FileInstance & listener,struct sockaddr * addr,socklen_t * addrlen)375 SharedFD SharedFD::Accept(const FileInstance& listener, struct sockaddr* addr,
376                           socklen_t* addrlen) {
377   return SharedFD(
378       std::shared_ptr<FileInstance>(listener.Accept(addr, addrlen)));
379 }
380 
Accept(const FileInstance & listener)381 SharedFD SharedFD::Accept(const FileInstance& listener) {
382   return SharedFD::Accept(listener, NULL, NULL);
383 }
384 
Dup(int unmanaged_fd)385 SharedFD SharedFD::Dup(int unmanaged_fd) {
386   int fd = fcntl(unmanaged_fd, F_DUPFD_CLOEXEC, 3);
387   int error_num = errno;
388   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, error_num)));
389 }
390 
Pipe(SharedFD * fd0,SharedFD * fd1)391 bool SharedFD::Pipe(SharedFD* fd0, SharedFD* fd1) {
392   int fds[2];
393 #ifdef __linux__
394   int rval = pipe2(fds, O_CLOEXEC);
395 #else
396   int rval = pipe(fds);
397 #endif
398   if (rval != -1) {
399     (*fd0) = std::shared_ptr<FileInstance>(new FileInstance(fds[0], errno));
400     (*fd1) = std::shared_ptr<FileInstance>(new FileInstance(fds[1], errno));
401     return true;
402   }
403   return false;
404 }
405 
406 #ifdef __linux__
Event(int initval,int flags)407 SharedFD SharedFD::Event(int initval, int flags) {
408   int fd = eventfd(initval, flags);
409   return std::shared_ptr<FileInstance>(new FileInstance(fd, errno));
410 }
411 
412 #ifdef CUTTLEFISH_HOST
ShmOpen(const std::string & name,int oflag,int mode)413 SharedFD SharedFD::ShmOpen(const std::string& name, int oflag, int mode) {
414   errno = 0;
415   int fd = shm_open(name.c_str(), oflag, mode);
416   int error_num = errno;
417   return std::shared_ptr<FileInstance>(new FileInstance(fd, error_num));
418 }
419 #endif
420 
421 #endif
422 
MemfdCreate(const std::string & name,unsigned int flags)423 SharedFD SharedFD::MemfdCreate(const std::string& name, unsigned int flags) {
424   int fd = memfd_create_wrapper(name.c_str(), flags);
425   int error_num = errno;
426   return std::shared_ptr<FileInstance>(new FileInstance(fd, error_num));
427 }
428 
MemfdCreateWithData(const std::string & name,const std::string & data,unsigned int flags)429 SharedFD SharedFD::MemfdCreateWithData(const std::string& name, const std::string& data, unsigned int flags) {
430   auto memfd = MemfdCreate(name, flags);
431   if (WriteAll(memfd, data) != data.size()) {
432     return ErrorFD(errno);
433   }
434   if (memfd->LSeek(0, SEEK_SET) != 0) {
435     return ErrorFD(memfd->GetErrno());
436   }
437   if (!memfd->Chmod(0700)) {
438     return ErrorFD(memfd->GetErrno());
439   }
440   return memfd;
441 }
442 
SocketPair(int domain,int type,int protocol,SharedFD * fd0,SharedFD * fd1)443 bool SharedFD::SocketPair(int domain, int type, int protocol,
444                           SharedFD* fd0, SharedFD* fd1) {
445   int fds[2];
446   int rval = socketpair(domain, type, protocol, fds);
447   if (rval != -1) {
448     (*fd0) = std::shared_ptr<FileInstance>(new FileInstance(fds[0], errno));
449     (*fd1) = std::shared_ptr<FileInstance>(new FileInstance(fds[1], errno));
450     return true;
451   }
452   return false;
453 }
454 
SocketPair(int domain,int type,int protocol)455 Result<std::pair<SharedFD, SharedFD>> SharedFD::SocketPair(int domain, int type,
456                                                            int protocol) {
457   SharedFD a, b;
458   if (!SharedFD::SocketPair(domain, type, protocol, &a, &b)) {
459     return CF_ERR("socketpair failed: " << strerror(errno));
460   }
461   return std::make_pair(std::move(a), std::move(b));
462 }
463 
Open(const std::string & path,int flags,mode_t mode)464 SharedFD SharedFD::Open(const std::string& path, int flags, mode_t mode) {
465   return Open(path.c_str(), flags, mode);
466 }
467 
Open(const char * path,int flags,mode_t mode)468 SharedFD SharedFD::Open(const char* path, int flags, mode_t mode) {
469   int fd = TEMP_FAILURE_RETRY(open(path, flags, mode));
470   if (fd == -1) {
471     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
472   } else {
473     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
474   }
475 }
476 
InotifyFd(void)477 SharedFD SharedFD::InotifyFd(void) {
478   errno = 0;
479   int fd = TEMP_FAILURE_RETRY(inotify_init1(IN_CLOEXEC));
480   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
481 }
482 
Creat(const std::string & path,mode_t mode)483 SharedFD SharedFD::Creat(const std::string& path, mode_t mode) {
484   return SharedFD::Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode);
485 }
486 
Fchdir(SharedFD shared_fd)487 int SharedFD::Fchdir(SharedFD shared_fd) {
488   if (!shared_fd.value_) {
489     return -1;
490   }
491   LocalErrno record_errno(shared_fd->errno_);
492 
493   return TEMP_FAILURE_RETRY(fchdir(shared_fd->fd_));
494 }
495 
Fifo(const std::string & path,mode_t mode)496 Result<SharedFD> SharedFD::Fifo(const std::string& path, mode_t mode) {
497   struct stat st {};
498   if (TEMP_FAILURE_RETRY(stat(path.c_str(), &st)) == 0) {
499     CF_EXPECTF(TEMP_FAILURE_RETRY(remove(path.c_str())) == 0,
500                "Failed to delete old file at '{}': '{}'", path,
501                strerror(errno));
502   }
503 
504   CF_EXPECTF(TEMP_FAILURE_RETRY(mkfifo(path.c_str(), mode)) == 0,
505              "Failed to mkfifo('{}', {:o})", path, mode);
506   auto ret = Open(path, O_RDWR);
507   CF_EXPECTF(ret->IsOpen(), "Failed to open '{}': '{}'", path, ret->StrError());
508   return ret;
509 }
510 
Socket(int domain,int socket_type,int protocol)511 SharedFD SharedFD::Socket(int domain, int socket_type, int protocol) {
512   int fd = TEMP_FAILURE_RETRY(socket(domain, socket_type, protocol));
513   if (fd == -1) {
514     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
515   } else {
516     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
517   }
518 }
519 
Mkstemp(std::string * path)520 SharedFD SharedFD::Mkstemp(std::string* path) {
521   int fd = mkstemp(path->data());
522   if (fd == -1) {
523     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
524   } else {
525     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
526   }
527 }
528 
ErrorFD(int error)529 SharedFD SharedFD::ErrorFD(int error) {
530   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(-1, error)));
531 }
532 
SocketLocalClient(const std::string & name,bool abstract,int in_type)533 SharedFD SharedFD::SocketLocalClient(const std::string& name, bool abstract,
534                                      int in_type) {
535   return SocketLocalClient(name, abstract, in_type, 0);
536 }
537 
SocketLocalClient(const std::string & name,bool abstract,int in_type,int timeout_seconds)538 SharedFD SharedFD::SocketLocalClient(const std::string& name, bool abstract,
539                                      int in_type, int timeout_seconds) {
540   struct sockaddr_un addr;
541   socklen_t addrlen;
542   MakeAddress(name.c_str(), abstract, &addr, &addrlen);
543   SharedFD rval = SharedFD::Socket(PF_UNIX, in_type, 0);
544   if (!rval->IsOpen()) {
545     return rval;
546   }
547   struct timeval timeout = {timeout_seconds, 0};
548   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
549   if (rval->ConnectWithTimeout(casted_addr, addrlen, &timeout) == -1) {
550     return SharedFD::ErrorFD(rval->GetErrno());
551   }
552   return rval;
553 }
554 
SocketLocalClient(int port,int type)555 SharedFD SharedFD::SocketLocalClient(int port, int type) {
556   sockaddr_in addr{};
557   addr.sin_family = AF_INET;
558   addr.sin_port = htons(port);
559   addr.sin_addr.s_addr = htonl(INADDR_ANY);
560   auto rval = SharedFD::Socket(AF_INET, type, 0);
561   if (!rval->IsOpen()) {
562     return rval;
563   }
564   if (rval->Connect(reinterpret_cast<const sockaddr*>(&addr), sizeof addr) < 0) {
565     return SharedFD::ErrorFD(rval->GetErrno());
566   }
567   return rval;
568 }
569 
SocketClient(const std::string & host,int port,int type,std::chrono::seconds timeout)570 SharedFD SharedFD::SocketClient(const std::string& host, int port, int type,
571                                 std::chrono::seconds timeout) {
572   sockaddr_in addr{};
573   addr.sin_family = AF_INET;
574   addr.sin_port = htons(port);
575   addr.sin_addr.s_addr = inet_addr(host.c_str());
576   auto rval = SharedFD::Socket(AF_INET, type, 0);
577   if (!rval->IsOpen()) {
578     return rval;
579   }
580   struct timeval timeout_timeval = {static_cast<time_t>(timeout.count()), 0};
581   if (rval->ConnectWithTimeout(reinterpret_cast<const sockaddr*>(&addr),
582                                sizeof addr, &timeout_timeval) < 0) {
583     return SharedFD::ErrorFD(rval->GetErrno());
584   }
585   return rval;
586 }
587 
Socket6Client(const std::string & host,const std::string & interface,int port,int type,std::chrono::seconds timeout)588 SharedFD SharedFD::Socket6Client(const std::string& host, const std::string& interface,
589                                  int port, int type, std::chrono::seconds timeout) {
590   sockaddr_in6 addr{};
591   addr.sin6_family = AF_INET6;
592   addr.sin6_port = htons(port);
593   inet_pton(AF_INET6, host.c_str(), &addr.sin6_addr);
594   auto rval = SharedFD::Socket(AF_INET6, type, 0);
595   if (!rval->IsOpen()) {
596     return rval;
597   }
598 
599   if (!interface.empty()) {
600 #ifdef __linux__
601     ifreq ifr{};
602     snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s", interface.c_str());
603 
604     if (rval->SetSockOpt(SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr)) == -1) {
605       return SharedFD::ErrorFD(rval->GetErrno());
606     }
607 #elif defined(__APPLE__)
608     int idx = if_nametoindex(interface.c_str());
609     if (rval->SetSockOpt(IPPROTO_IP, IP_BOUND_IF, &idx, sizeof(idx)) == -1) {
610       return SharedFD::ErrorFD(rval->GetErrno());
611     }
612 #else
613 #error "Unsupported operating system"
614 #endif
615   }
616 
617   struct timeval timeout_timeval = {static_cast<time_t>(timeout.count()), 0};
618   if (rval->ConnectWithTimeout(reinterpret_cast<const sockaddr*>(&addr),
619                                sizeof addr, &timeout_timeval) < 0) {
620     return SharedFD::ErrorFD(rval->GetErrno());
621   }
622   return rval;
623 }
624 
SocketLocalServer(int port,int type)625 SharedFD SharedFD::SocketLocalServer(int port, int type) {
626   struct sockaddr_in addr;
627   memset(&addr, 0, sizeof(addr));
628   addr.sin_family = AF_INET;
629   addr.sin_port = htons(port);
630   addr.sin_addr.s_addr = htonl(INADDR_ANY);
631   SharedFD rval = SharedFD::Socket(AF_INET, type, 0);
632   if(!rval->IsOpen()) {
633     return rval;
634   }
635   int n = 1;
636   if (rval->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1) {
637     LOG(ERROR) << "SetSockOpt failed " << rval->StrError();
638     return SharedFD::ErrorFD(rval->GetErrno());
639   }
640   if(rval->Bind(reinterpret_cast<sockaddr*>(&addr), sizeof(addr)) < 0) {
641     LOG(ERROR) << "Bind failed " << rval->StrError();
642     return SharedFD::ErrorFD(rval->GetErrno());
643   }
644   if (type == SOCK_STREAM || type == SOCK_SEQPACKET) {
645     if (rval->Listen(4) < 0) {
646       LOG(ERROR) << "Listen failed " << rval->StrError();
647       return SharedFD::ErrorFD(rval->GetErrno());
648     }
649   }
650   return rval;
651 }
652 
SocketLocalServer(const std::string & name,bool abstract,int in_type,mode_t mode)653 SharedFD SharedFD::SocketLocalServer(const std::string& name, bool abstract,
654                                      int in_type, mode_t mode) {
655   // DO NOT UNLINK addr.sun_path. It does NOT have to be null-terminated.
656   // See man 7 unix for more details.
657   if (!abstract) {
658     (void)unlink(name.c_str());
659   }
660 
661   struct sockaddr_un addr;
662   socklen_t addrlen;
663   MakeAddress(name.c_str(), abstract, &addr, &addrlen);
664   SharedFD rval = SharedFD::Socket(PF_UNIX, in_type, 0);
665   if (!rval->IsOpen()) {
666     return rval;
667   }
668 
669   int n = 1;
670   if (rval->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1) {
671     LOG(ERROR) << "SetSockOpt failed " << rval->StrError();
672     return SharedFD::ErrorFD(rval->GetErrno());
673   }
674   if (rval->Bind(reinterpret_cast<sockaddr*>(&addr), addrlen) == -1) {
675     LOG(ERROR) << "Bind failed; name=" << name << ": " << rval->StrError();
676     return SharedFD::ErrorFD(rval->GetErrno());
677   }
678 
679   /* Only the bottom bits are really the socket type; there are flags too. */
680   constexpr int SOCK_TYPE_MASK = 0xf;
681   auto socket_type = in_type & SOCK_TYPE_MASK;
682 
683   // Connection oriented sockets: start listening.
684   if (socket_type == SOCK_STREAM || socket_type == SOCK_SEQPACKET) {
685     // Follows the default from socket_local_server
686     if (rval->Listen(1) == -1) {
687       LOG(ERROR) << "Listen failed: " << rval->StrError();
688       return SharedFD::ErrorFD(rval->GetErrno());
689     }
690   }
691 
692   if (!abstract) {
693     if (TEMP_FAILURE_RETRY(chmod(name.c_str(), mode)) == -1) {
694       LOG(ERROR) << "chmod failed: " << strerror(errno);
695       // However, continue since we do have a listening socket
696     }
697   }
698   return rval;
699 }
700 
701 #ifdef __linux__
VsockServer(unsigned int port,int type,std::optional<int> vhost_user_vsock_listening_cid,unsigned int cid)702 SharedFD SharedFD::VsockServer(
703     unsigned int port, int type,
704     std::optional<int> vhost_user_vsock_listening_cid, unsigned int cid) {
705 #ifndef CUTTLEFISH_HOST
706   CHECK(!vhost_user_vsock_listening_cid)
707       << "vhost_user_vsock_listening_cid is supposed to be nullopt in the "
708          "guest";
709 #endif
710   if (vhost_user_vsock_listening_cid) {
711     return SharedFD::SocketLocalServer(
712         GetVhostUserVsockServerAddr(port, *vhost_user_vsock_listening_cid),
713         false /* abstract */, type, 0666 /* mode */);
714   }
715 
716   auto vsock = SharedFD::Socket(AF_VSOCK, type, 0);
717   if (!vsock->IsOpen()) {
718     return vsock;
719   }
720   sockaddr_vm addr{};
721   addr.svm_family = AF_VSOCK;
722   addr.svm_port = port;
723   addr.svm_cid = cid;
724   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
725   if (vsock->Bind(casted_addr, sizeof(addr)) == -1) {
726     LOG(ERROR) << "Port " << port << " Bind failed (" << vsock->StrError()
727                << ")";
728     return SharedFD::ErrorFD(vsock->GetErrno());
729   }
730   if (type == SOCK_STREAM || type == SOCK_SEQPACKET) {
731     if (vsock->Listen(4) < 0) {
732       LOG(ERROR) << "Port" << port << " Listen failed (" << vsock->StrError()
733                  << ")";
734       return SharedFD::ErrorFD(vsock->GetErrno());
735     }
736   }
737   return vsock;
738 }
739 
VsockServer(int type,std::optional<int> vhost_user_vsock_listening_cid)740 SharedFD SharedFD::VsockServer(
741     int type, std::optional<int> vhost_user_vsock_listening_cid) {
742   return VsockServer(VMADDR_PORT_ANY, type, vhost_user_vsock_listening_cid);
743 }
744 
GetVhostUserVsockServerAddr(unsigned int port,int vhost_user_vsock_listening_cid)745 std::string SharedFD::GetVhostUserVsockServerAddr(
746     unsigned int port, int vhost_user_vsock_listening_cid) {
747   // TODO(b/277909042): better path than /tmp/vsock_{}/vm.vsock_{}
748   return fmt::format(
749       "{}_{}", GetVhostUserVsockClientAddr(vhost_user_vsock_listening_cid),
750       port);
751 }
752 
GetVhostUserVsockClientAddr(int cid)753 std::string SharedFD::GetVhostUserVsockClientAddr(int cid) {
754   // TODO(b/277909042): better path than /tmp/vsock_{}/vm.vsock_{}
755   return fmt::format("{}/vsock_{}_{}/vm.vsock", TempDir(), cid, getuid());
756 }
757 
VsockClient(unsigned int cid,unsigned int port,int type,bool vhost_user)758 SharedFD SharedFD::VsockClient(unsigned int cid, unsigned int port, int type,
759                                bool vhost_user) {
760 #ifndef CUTTLEFISH_HOST
761   CHECK(!vhost_user) << "vhost_user is supposed to be false in the guest";
762 #endif
763   if (vhost_user) {
764     // TODO(b/277909042): better path than /tmp/vsock_{}/vm.vsock
765     auto client = SharedFD::SocketLocalClient(GetVhostUserVsockClientAddr(cid),
766                                               false /* abstract */, type);
767     const std::string msg = fmt::format("connect {}\n", port);
768     SendAll(client, msg);
769 
770     const std::string expected_res = fmt::format("OK {}\n", port);
771     std::string actual_res(expected_res.length(), ' ');
772     if (ReadExact(client, &actual_res) != expected_res.length()) {
773       client->Close();
774       LOG(ERROR) << "cannot connect to " << cid << ":" << port;
775       return client;
776     }
777     if (actual_res != expected_res) {
778       client->Close();
779       LOG(ERROR) << "response from server: " << actual_res << ", but expect "
780                  << expected_res;
781       return client;
782     }
783     return client;
784   }
785   auto vsock = SharedFD::Socket(AF_VSOCK, type, 0);
786   if (!vsock->IsOpen()) {
787     return vsock;
788   }
789   sockaddr_vm addr{};
790   addr.svm_family = AF_VSOCK;
791   addr.svm_port = port;
792   addr.svm_cid = cid;
793   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
794   if (vsock->Connect(casted_addr, sizeof(addr)) == -1) {
795     return SharedFD::ErrorFD(vsock->GetErrno());
796   }
797   return vsock;
798 }
799 #endif
800 
lock() const801 SharedFD WeakFD::lock() const {
802   auto locked_file_instance = value_.lock();
803   if (locked_file_instance) {
804     return SharedFD(locked_file_instance);
805   }
806   return SharedFD();
807 }
808 
ScopedMMap(void * ptr,size_t len)809 ScopedMMap::ScopedMMap(void* ptr, size_t len) : ptr_(ptr), len_(len) {}
810 
ScopedMMap()811 ScopedMMap::ScopedMMap() : ptr_(MAP_FAILED), len_(0) {}
812 
ScopedMMap(ScopedMMap && other)813 ScopedMMap::ScopedMMap(ScopedMMap&& other)
814     : ptr_(other.ptr_), len_(other.len_) {
815   other.ptr_ = MAP_FAILED;
816   other.len_ = 0;
817 }
818 
~ScopedMMap()819 ScopedMMap::~ScopedMMap() {
820   if (ptr_ != MAP_FAILED) {
821     munmap(ptr_, len_);
822   }
823 }
824 
ClosedInstance()825 /* static */ std::shared_ptr<FileInstance> FileInstance::ClosedInstance() {
826   return std::shared_ptr<FileInstance>(new FileInstance(-1, EBADF));
827 }
828 
Bind(const struct sockaddr * addr,socklen_t addrlen)829 int FileInstance::Bind(const struct sockaddr* addr, socklen_t addrlen) {
830   LocalErrno record_errno(errno_);
831 
832   return bind(fd_, addr, addrlen);
833 }
834 
Connect(const struct sockaddr * addr,socklen_t addrlen)835 int FileInstance::Connect(const struct sockaddr* addr, socklen_t addrlen) {
836   LocalErrno record_errno(errno_);
837 
838   return connect(fd_, addr, addrlen);
839 }
840 
UNMANAGED_Dup()841 int FileInstance::UNMANAGED_Dup() {
842   LocalErrno record_errno(errno_);
843 
844   return TEMP_FAILURE_RETRY(dup(fd_));
845 }
846 
UNMANAGED_Dup2(int newfd)847 int FileInstance::UNMANAGED_Dup2(int newfd) {
848   LocalErrno record_errno(errno_);
849 
850   return TEMP_FAILURE_RETRY(dup2(fd_, newfd));
851 }
852 
Fcntl(int command,int value)853 int FileInstance::Fcntl(int command, int value) {
854   LocalErrno record_errno(errno_);
855 
856   return TEMP_FAILURE_RETRY(fcntl(fd_, command, value));
857 }
858 
Fsync()859 int FileInstance::Fsync() {
860   LocalErrno record_errno(errno_);
861 
862   return TEMP_FAILURE_RETRY(fsync(fd_));
863 }
864 
Flock(int operation)865 Result<void> FileInstance::Flock(int operation) {
866   LocalErrno record_errno(errno_);
867 
868   CF_EXPECT(TEMP_FAILURE_RETRY(flock(fd_, operation)) == 0, strerror(errno));
869   return {};
870 }
871 
GetSockName(struct sockaddr * addr,socklen_t * addrlen)872 int FileInstance::GetSockName(struct sockaddr* addr, socklen_t* addrlen) {
873   LocalErrno record_errno(errno_);
874 
875   return TEMP_FAILURE_RETRY(getsockname(fd_, addr, addrlen));
876 }
877 
878 #ifdef __linux__
VsockServerPort()879 unsigned int FileInstance::VsockServerPort() {
880   struct sockaddr_vm vm_socket;
881   socklen_t length = sizeof(vm_socket);
882   GetSockName(reinterpret_cast<struct sockaddr*>(&vm_socket), &length);
883   return vm_socket.svm_port;
884 }
885 #endif
886 
Ioctl(int request,void * val)887 int FileInstance::Ioctl(int request, void* val) {
888   LocalErrno record_errno(errno_);
889 
890   return TEMP_FAILURE_RETRY(ioctl(fd_, request, val));
891 }
892 
LinkAtCwd(const std::string & path)893 int FileInstance::LinkAtCwd(const std::string& path) {
894   LocalErrno record_errno(errno_);
895 
896   std::string name = "/proc/self/fd/";
897   name += std::to_string(fd_);
898   return linkat(AT_FDCWD, name.c_str(), AT_FDCWD, path.c_str(),
899                 AT_SYMLINK_FOLLOW);
900 }
901 
Listen(int backlog)902 int FileInstance::Listen(int backlog) {
903   LocalErrno record_errno(errno_);
904 
905   return listen(fd_, backlog);
906 }
907 
LSeek(off_t offset,int whence)908 off_t FileInstance::LSeek(off_t offset, int whence) {
909   LocalErrno record_errno(errno_);
910 
911   return TEMP_FAILURE_RETRY(lseek(fd_, offset, whence));
912 }
913 
Recv(void * buf,size_t len,int flags)914 ssize_t FileInstance::Recv(void* buf, size_t len, int flags) {
915   LocalErrno record_errno(errno_);
916 
917   return TEMP_FAILURE_RETRY(recv(fd_, buf, len, flags));
918 }
919 
RecvMsg(struct msghdr * msg,int flags)920 ssize_t FileInstance::RecvMsg(struct msghdr* msg, int flags) {
921   LocalErrno record_errno(errno_);
922 
923   return TEMP_FAILURE_RETRY(recvmsg(fd_, msg, flags));
924 }
925 
Read(void * buf,size_t count)926 ssize_t FileInstance::Read(void* buf, size_t count) {
927   LocalErrno record_errno(errno_);
928 
929   return TEMP_FAILURE_RETRY(read(fd_, buf, count));
930 }
931 
932 #ifdef __linux__
EventfdRead(eventfd_t * value)933 int FileInstance::EventfdRead(eventfd_t* value) {
934   LocalErrno record_errno(errno_);
935 
936   return eventfd_read(fd_, value);
937 }
938 #endif
939 
Send(const void * buf,size_t len,int flags)940 ssize_t FileInstance::Send(const void* buf, size_t len, int flags) {
941   LocalErrno record_errno(errno_);
942 
943   return TEMP_FAILURE_RETRY(send(fd_, buf, len, flags));
944 }
945 
SendMsg(const struct msghdr * msg,int flags)946 ssize_t FileInstance::SendMsg(const struct msghdr* msg, int flags) {
947   LocalErrno record_errno(errno_);
948 
949   return TEMP_FAILURE_RETRY(sendmsg(fd_, msg, flags));
950 }
951 
Shutdown(int how)952 int FileInstance::Shutdown(int how) {
953   LocalErrno record_errno(errno_);
954 
955   return shutdown(fd_, how);
956 }
957 
SetSockOpt(int level,int optname,const void * optval,socklen_t optlen)958 int FileInstance::SetSockOpt(int level, int optname, const void* optval,
959                              socklen_t optlen) {
960   LocalErrno record_errno(errno_);
961 
962   return setsockopt(fd_, level, optname, optval, optlen);
963 }
964 
GetSockOpt(int level,int optname,void * optval,socklen_t * optlen)965 int FileInstance::GetSockOpt(int level, int optname, void* optval,
966                              socklen_t* optlen) {
967   LocalErrno record_errno(errno_);
968 
969   return getsockopt(fd_, level, optname, optval, optlen);
970 }
971 
SetTerminalRaw()972 int FileInstance::SetTerminalRaw() {
973   LocalErrno record_errno(errno_);
974 
975   termios terminal_settings;
976   if (int rval = tcgetattr(fd_, &terminal_settings); rval < 0) {
977     return rval;
978   }
979   cfmakeraw(&terminal_settings);
980   if (int rval = tcsetattr(fd_, TCSANOW, &terminal_settings); rval < 0) {
981     return rval;
982   }
983 
984   // tcsetattr() succeeds if any of the requested change success.
985   // So double check whether everything is applied.
986   termios raw_settings;
987   if (int rval = tcgetattr(fd_, &raw_settings); rval < 0) {
988     return rval;
989   }
990   if (memcmp(&terminal_settings, &raw_settings, sizeof(terminal_settings))) {
991     errno = EPROTO;
992     return -1;
993   }
994   return 0;
995 }
996 
StrError() const997 std::string FileInstance::StrError() const {
998   errno = 0;
999   return std::string(strerror(errno_));
1000 }
1001 
MMap(void * addr,size_t length,int prot,int flags,off_t offset)1002 ScopedMMap FileInstance::MMap(void* addr, size_t length, int prot, int flags,
1003                               off_t offset) {
1004   LocalErrno record_errno(errno_);
1005 
1006   auto ptr = mmap(addr, length, prot, flags, fd_, offset);
1007   return ScopedMMap(ptr, length);
1008 }
1009 
Truncate(off_t length)1010 ssize_t FileInstance::Truncate(off_t length) {
1011   LocalErrno record_errno(errno_);
1012 
1013   return TEMP_FAILURE_RETRY(ftruncate(fd_, length));
1014 }
1015 
Write(const void * buf,size_t count)1016 ssize_t FileInstance::Write(const void* buf, size_t count) {
1017   if (count == 0 && !IsRegular()) {
1018     return 0;
1019   }
1020 
1021   LocalErrno record_errno(errno_);
1022 
1023   return TEMP_FAILURE_RETRY(write(fd_, buf, count));
1024 }
1025 
1026 #ifdef __linux__
EventfdWrite(eventfd_t value)1027 int FileInstance::EventfdWrite(eventfd_t value) {
1028   LocalErrno record_errno(errno_);
1029 
1030   return eventfd_write(fd_, value);
1031 }
1032 #endif
1033 
IsATTY()1034 bool FileInstance::IsATTY() {
1035   LocalErrno record_errno(errno_);
1036 
1037   return isatty(fd_);
1038 }
1039 
Futimens(const struct timespec times[2])1040 int FileInstance::Futimens(const struct timespec times[2]) {
1041   LocalErrno record_errno(errno_);
1042 
1043   return TEMP_FAILURE_RETRY(futimens(fd_, times));
1044 }
1045 
1046 #ifdef __linux__
ProcFdLinkTarget() const1047 Result<std::string> FileInstance::ProcFdLinkTarget() const {
1048   std::stringstream output_composer;
1049   output_composer << "/proc/" << getpid() << "/fd/" << fd_;
1050   const std::string mem_fd_link = output_composer.str();
1051   std::string mem_fd_target;
1052   CF_EXPECT(
1053       android::base::Readlink(mem_fd_link, &mem_fd_target),
1054       "Getting link for the memory file \"" << mem_fd_link << "\" failed");
1055   return mem_fd_target;
1056 }
1057 #endif
1058 
1059 // inotify related functions
InotifyAddWatch(const std::string & pathname,uint32_t mask)1060 int FileInstance::InotifyAddWatch(const std::string& pathname, uint32_t mask) {
1061   return inotify_add_watch(fd_, pathname.c_str(), mask);
1062 }
1063 
InotifyRmWatch(int watch)1064 void FileInstance::InotifyRmWatch(int watch) {
1065   inotify_rm_watch(fd_, watch);
1066 }
1067 
FileInstance(int fd,int in_errno)1068 FileInstance::FileInstance(int fd, int in_errno)
1069     : fd_(fd), errno_(in_errno), is_regular_file_(IsRegularFile(fd_)) {
1070   // Ensure every file descriptor managed by a FileInstance has the CLOEXEC
1071   // flag
1072   TEMP_FAILURE_RETRY(fcntl(fd, F_SETFD, FD_CLOEXEC));
1073   std::stringstream identity;
1074   identity << "fd=" << fd << " @" << this;
1075   identity_ = identity.str();
1076 }
1077 
Accept(struct sockaddr * addr,socklen_t * addrlen) const1078 FileInstance* FileInstance::Accept(struct sockaddr* addr,
1079                                    socklen_t* addrlen) const {
1080   int fd = TEMP_FAILURE_RETRY(accept(fd_, addr, addrlen));
1081   if (fd == -1) {
1082     return new FileInstance(fd, errno);
1083   } else {
1084     return new FileInstance(fd, 0);
1085   }
1086 }
1087 
1088 }  // namespace cuttlefish
1089