jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 1 | /* |
| 2 | * Copyright (C) 2011 The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
Elliott Hughes | 8e9aeb9 | 2017-11-10 10:22:07 -0800 | [diff] [blame] | 17 | #include <cutils/sockets.h> |
| 18 | |
Mark Salyzyn | cfd5b08 | 2016-10-17 14:28:00 -0700 | [diff] [blame] | 19 | #define LOG_TAG "socket-unix" |
| 20 | |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 21 | #include <stdio.h> |
| 22 | #include <stdlib.h> |
| 23 | #include <string.h> |
| 24 | #include <sys/socket.h> |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 25 | #include <sys/uio.h> |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 26 | #include <sys/un.h> |
Mark Salyzyn | cfd5b08 | 2016-10-17 14:28:00 -0700 | [diff] [blame] | 27 | #include <time.h> |
| 28 | #include <unistd.h> |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 29 | |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 30 | #include <cutils/android_get_control_file.h> |
Mark Salyzyn | 30f991f | 2017-01-10 13:19:54 -0800 | [diff] [blame] | 31 | #include <log/log.h> |
jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 32 | |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 33 | #include "android_get_control_env.h" |
| 34 | |
Elliott Hughes | 9b828ad | 2015-07-30 08:47:35 -0700 | [diff] [blame] | 35 | #if defined(__ANDROID__) |
jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 36 | /* For the socket trust (credentials) check */ |
| 37 | #include <private/android_filesystem_config.h> |
Mark Salyzyn | 1271716 | 2014-04-29 15:49:14 -0700 | [diff] [blame] | 38 | #define __android_unused |
| 39 | #else |
| 40 | #define __android_unused __attribute__((__unused__)) |
jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 41 | #endif |
| 42 | |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 43 | bool socket_peer_is_trusted(int fd __android_unused) { |
Elliott Hughes | 9b828ad | 2015-07-30 08:47:35 -0700 | [diff] [blame] | 44 | #if defined(__ANDROID__) |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 45 | ucred cr; |
jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 46 | socklen_t len = sizeof(cr); |
| 47 | int n = getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &cr, &len); |
| 48 | |
| 49 | if (n != 0) { |
Steve Block | 01dda20 | 2012-01-06 14:13:42 +0000 | [diff] [blame] | 50 | ALOGE("could not get socket credentials: %s\n", strerror(errno)); |
jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 51 | return false; |
| 52 | } |
| 53 | |
| 54 | if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) { |
Steve Block | 01dda20 | 2012-01-06 14:13:42 +0000 | [diff] [blame] | 55 | ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid); |
jeffhao | 2b8f76c | 2011-05-05 14:25:36 -0700 | [diff] [blame] | 56 | return false; |
| 57 | } |
| 58 | #endif |
| 59 | |
| 60 | return true; |
| 61 | } |
David Pursell | 0eb8e1b | 2016-01-14 17:18:27 -0800 | [diff] [blame] | 62 | |
| 63 | int socket_close(int sock) { |
David Pursell | 8385fb2 | 2016-01-29 13:49:25 -0800 | [diff] [blame] | 64 | return close(sock); |
David Pursell | 0eb8e1b | 2016-01-14 17:18:27 -0800 | [diff] [blame] | 65 | } |
David Pursell | 572bce2 | 2016-01-15 14:19:56 -0800 | [diff] [blame] | 66 | |
| 67 | int socket_set_receive_timeout(cutils_socket_t sock, int timeout_ms) { |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 68 | timeval tv; |
David Pursell | 8385fb2 | 2016-01-29 13:49:25 -0800 | [diff] [blame] | 69 | tv.tv_sec = timeout_ms / 1000; |
| 70 | tv.tv_usec = (timeout_ms % 1000) * 1000; |
| 71 | return setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv)); |
| 72 | } |
| 73 | |
David Pursell | 8385fb2 | 2016-01-29 13:49:25 -0800 | [diff] [blame] | 74 | ssize_t socket_send_buffers(cutils_socket_t sock, |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 75 | const cutils_socket_buffer_t* buffers, |
David Pursell | 8385fb2 | 2016-01-29 13:49:25 -0800 | [diff] [blame] | 76 | size_t num_buffers) { |
David Pursell | b34e4a0 | 2016-02-01 09:42:09 -0800 | [diff] [blame] | 77 | if (num_buffers > SOCKET_SEND_BUFFERS_MAX_BUFFERS) { |
| 78 | return -1; |
| 79 | } |
| 80 | |
| 81 | iovec iovec_buffers[SOCKET_SEND_BUFFERS_MAX_BUFFERS]; |
| 82 | for (size_t i = 0; i < num_buffers; ++i) { |
| 83 | // It's safe to cast away const here; iovec declares non-const |
| 84 | // void* because it's used for both send and receive, but since |
| 85 | // we're only sending, the data won't be modified. |
| 86 | iovec_buffers[i].iov_base = const_cast<void*>(buffers[i].data); |
| 87 | iovec_buffers[i].iov_len = buffers[i].length; |
| 88 | } |
| 89 | |
| 90 | return writev(sock, iovec_buffers, num_buffers); |
David Pursell | 572bce2 | 2016-01-15 14:19:56 -0800 | [diff] [blame] | 91 | } |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 92 | |
| 93 | int android_get_control_socket(const char* name) { |
| 94 | int fd = __android_get_control_from_env(ANDROID_SOCKET_ENV_PREFIX, name); |
| 95 | |
| 96 | if (fd < 0) return fd; |
| 97 | |
| 98 | // Compare to UNIX domain socket name, must match! |
| 99 | struct sockaddr_un addr; |
| 100 | socklen_t addrlen = sizeof(addr); |
Bernie Innocenti | 4351bb0 | 2018-05-28 14:56:57 +0900 | [diff] [blame^] | 101 | int ret = getsockname(fd, (struct sockaddr*)&addr, &addrlen); |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 102 | if (ret < 0) return -1; |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 103 | |
Bernie Innocenti | 4351bb0 | 2018-05-28 14:56:57 +0900 | [diff] [blame^] | 104 | constexpr char prefix[] = ANDROID_SOCKET_DIR "/"; |
| 105 | constexpr size_t prefix_size = sizeof(prefix) - sizeof('\0'); |
| 106 | if ((strncmp(addr.sun_path, prefix, prefix_size) == 0) && |
| 107 | (strcmp(addr.sun_path + prefix_size, name) == 0)) { |
| 108 | // It is what we think it is |
| 109 | return fd; |
| 110 | } |
| 111 | return -1; |
Mark Salyzyn | 52bd37e | 2016-11-07 09:39:30 -0800 | [diff] [blame] | 112 | } |