blob: e91f3583174355a7f398862b3e9e000ecddc0f5d [file] [log] [blame]
jeffhao2b8f76c2011-05-05 14:25:36 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Mark Salyzyncfd5b082016-10-17 14:28:00 -070017#define LOG_TAG "socket-unix"
18
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080019#include <stdio.h>
20#include <stdlib.h>
21#include <string.h>
22#include <sys/socket.h>
David Pursellb34e4a02016-02-01 09:42:09 -080023#include <sys/uio.h>
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080024#include <sys/un.h>
Mark Salyzyncfd5b082016-10-17 14:28:00 -070025#include <time.h>
26#include <unistd.h>
David Pursellb34e4a02016-02-01 09:42:09 -080027
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080028#include <cutils/android_get_control_file.h>
Mark Salyzynff2dcd92016-09-28 15:54:45 -070029#include <cutils/sockets.h>
Mark Salyzyn30f991f2017-01-10 13:19:54 -080030#include <log/log.h>
jeffhao2b8f76c2011-05-05 14:25:36 -070031
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080032#include "android_get_control_env.h"
33
Mark Salyzyn0958b182016-11-17 08:33:19 -080034#ifndef TEMP_FAILURE_RETRY
35#define TEMP_FAILURE_RETRY(exp) (exp) // KISS implementation
36#endif
37
Elliott Hughes9b828ad2015-07-30 08:47:35 -070038#if defined(__ANDROID__)
jeffhao2b8f76c2011-05-05 14:25:36 -070039/* For the socket trust (credentials) check */
40#include <private/android_filesystem_config.h>
Mark Salyzyn12717162014-04-29 15:49:14 -070041#define __android_unused
42#else
43#define __android_unused __attribute__((__unused__))
jeffhao2b8f76c2011-05-05 14:25:36 -070044#endif
45
David Pursellb34e4a02016-02-01 09:42:09 -080046bool socket_peer_is_trusted(int fd __android_unused) {
Elliott Hughes9b828ad2015-07-30 08:47:35 -070047#if defined(__ANDROID__)
David Pursellb34e4a02016-02-01 09:42:09 -080048 ucred cr;
jeffhao2b8f76c2011-05-05 14:25:36 -070049 socklen_t len = sizeof(cr);
50 int n = getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &cr, &len);
51
52 if (n != 0) {
Steve Block01dda202012-01-06 14:13:42 +000053 ALOGE("could not get socket credentials: %s\n", strerror(errno));
jeffhao2b8f76c2011-05-05 14:25:36 -070054 return false;
55 }
56
57 if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) {
Steve Block01dda202012-01-06 14:13:42 +000058 ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
jeffhao2b8f76c2011-05-05 14:25:36 -070059 return false;
60 }
61#endif
62
63 return true;
64}
David Pursell0eb8e1b2016-01-14 17:18:27 -080065
66int socket_close(int sock) {
David Pursell8385fb22016-01-29 13:49:25 -080067 return close(sock);
David Pursell0eb8e1b2016-01-14 17:18:27 -080068}
David Pursell572bce22016-01-15 14:19:56 -080069
70int socket_set_receive_timeout(cutils_socket_t sock, int timeout_ms) {
David Pursellb34e4a02016-02-01 09:42:09 -080071 timeval tv;
David Pursell8385fb22016-01-29 13:49:25 -080072 tv.tv_sec = timeout_ms / 1000;
73 tv.tv_usec = (timeout_ms % 1000) * 1000;
74 return setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
75}
76
David Pursell8385fb22016-01-29 13:49:25 -080077ssize_t socket_send_buffers(cutils_socket_t sock,
David Pursellb34e4a02016-02-01 09:42:09 -080078 const cutils_socket_buffer_t* buffers,
David Pursell8385fb22016-01-29 13:49:25 -080079 size_t num_buffers) {
David Pursellb34e4a02016-02-01 09:42:09 -080080 if (num_buffers > SOCKET_SEND_BUFFERS_MAX_BUFFERS) {
81 return -1;
82 }
83
84 iovec iovec_buffers[SOCKET_SEND_BUFFERS_MAX_BUFFERS];
85 for (size_t i = 0; i < num_buffers; ++i) {
86 // It's safe to cast away const here; iovec declares non-const
87 // void* because it's used for both send and receive, but since
88 // we're only sending, the data won't be modified.
89 iovec_buffers[i].iov_base = const_cast<void*>(buffers[i].data);
90 iovec_buffers[i].iov_len = buffers[i].length;
91 }
92
93 return writev(sock, iovec_buffers, num_buffers);
David Pursell572bce22016-01-15 14:19:56 -080094}
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080095
96int android_get_control_socket(const char* name) {
97 int fd = __android_get_control_from_env(ANDROID_SOCKET_ENV_PREFIX, name);
98
99 if (fd < 0) return fd;
100
101 // Compare to UNIX domain socket name, must match!
102 struct sockaddr_un addr;
103 socklen_t addrlen = sizeof(addr);
104 int ret = TEMP_FAILURE_RETRY(getsockname(fd, (struct sockaddr *)&addr, &addrlen));
105 if (ret < 0) return -1;
106 char *path = NULL;
107 if (asprintf(&path, ANDROID_SOCKET_DIR "/%s", name) < 0) return -1;
108 if (!path) return -1;
109 int cmp = strcmp(addr.sun_path, path);
110 free(path);
111 if (cmp != 0) return -1;
112
113 // It is what we think it is
114 return fd;
115}