2011-05-06 05:25:36 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2011 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2016-10-18 05:28:00 +08:00
|
|
|
#define LOG_TAG "socket-unix"
|
|
|
|
|
2016-11-08 01:39:30 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/socket.h>
|
2016-02-02 01:42:09 +08:00
|
|
|
#include <sys/uio.h>
|
2016-11-08 01:39:30 +08:00
|
|
|
#include <sys/un.h>
|
2016-10-18 05:28:00 +08:00
|
|
|
#include <time.h>
|
|
|
|
#include <unistd.h>
|
2016-02-02 01:42:09 +08:00
|
|
|
|
2016-11-08 01:39:30 +08:00
|
|
|
#include <cutils/android_get_control_file.h>
|
2016-09-29 06:54:45 +08:00
|
|
|
#include <cutils/sockets.h>
|
2017-01-11 05:19:54 +08:00
|
|
|
#include <log/log.h>
|
2011-05-06 05:25:36 +08:00
|
|
|
|
2016-11-08 01:39:30 +08:00
|
|
|
#include "android_get_control_env.h"
|
|
|
|
|
2016-11-18 00:33:19 +08:00
|
|
|
#ifndef TEMP_FAILURE_RETRY
|
|
|
|
#define TEMP_FAILURE_RETRY(exp) (exp) // KISS implementation
|
|
|
|
#endif
|
|
|
|
|
2015-07-30 23:47:35 +08:00
|
|
|
#if defined(__ANDROID__)
|
2011-05-06 05:25:36 +08:00
|
|
|
/* For the socket trust (credentials) check */
|
|
|
|
#include <private/android_filesystem_config.h>
|
2014-04-30 06:49:14 +08:00
|
|
|
#define __android_unused
|
|
|
|
#else
|
|
|
|
#define __android_unused __attribute__((__unused__))
|
2011-05-06 05:25:36 +08:00
|
|
|
#endif
|
|
|
|
|
2016-02-02 01:42:09 +08:00
|
|
|
bool socket_peer_is_trusted(int fd __android_unused) {
|
2015-07-30 23:47:35 +08:00
|
|
|
#if defined(__ANDROID__)
|
2016-02-02 01:42:09 +08:00
|
|
|
ucred cr;
|
2011-05-06 05:25:36 +08:00
|
|
|
socklen_t len = sizeof(cr);
|
|
|
|
int n = getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &cr, &len);
|
|
|
|
|
|
|
|
if (n != 0) {
|
2012-01-06 22:13:42 +08:00
|
|
|
ALOGE("could not get socket credentials: %s\n", strerror(errno));
|
2011-05-06 05:25:36 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((cr.uid != AID_ROOT) && (cr.uid != AID_SHELL)) {
|
2012-01-06 22:13:42 +08:00
|
|
|
ALOGE("untrusted userid on other end of socket: userid %d\n", cr.uid);
|
2011-05-06 05:25:36 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2016-01-15 09:18:27 +08:00
|
|
|
|
|
|
|
int socket_close(int sock) {
|
2016-01-30 05:49:25 +08:00
|
|
|
return close(sock);
|
2016-01-15 09:18:27 +08:00
|
|
|
}
|
2016-01-16 06:19:56 +08:00
|
|
|
|
|
|
|
int socket_set_receive_timeout(cutils_socket_t sock, int timeout_ms) {
|
2016-02-02 01:42:09 +08:00
|
|
|
timeval tv;
|
2016-01-30 05:49:25 +08:00
|
|
|
tv.tv_sec = timeout_ms / 1000;
|
|
|
|
tv.tv_usec = (timeout_ms % 1000) * 1000;
|
|
|
|
return setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
|
|
|
|
}
|
|
|
|
|
|
|
|
ssize_t socket_send_buffers(cutils_socket_t sock,
|
2016-02-02 01:42:09 +08:00
|
|
|
const cutils_socket_buffer_t* buffers,
|
2016-01-30 05:49:25 +08:00
|
|
|
size_t num_buffers) {
|
2016-02-02 01:42:09 +08:00
|
|
|
if (num_buffers > SOCKET_SEND_BUFFERS_MAX_BUFFERS) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
iovec iovec_buffers[SOCKET_SEND_BUFFERS_MAX_BUFFERS];
|
|
|
|
for (size_t i = 0; i < num_buffers; ++i) {
|
|
|
|
// It's safe to cast away const here; iovec declares non-const
|
|
|
|
// void* because it's used for both send and receive, but since
|
|
|
|
// we're only sending, the data won't be modified.
|
|
|
|
iovec_buffers[i].iov_base = const_cast<void*>(buffers[i].data);
|
|
|
|
iovec_buffers[i].iov_len = buffers[i].length;
|
|
|
|
}
|
|
|
|
|
|
|
|
return writev(sock, iovec_buffers, num_buffers);
|
2016-01-16 06:19:56 +08:00
|
|
|
}
|
2016-11-08 01:39:30 +08:00
|
|
|
|
|
|
|
int android_get_control_socket(const char* name) {
|
|
|
|
int fd = __android_get_control_from_env(ANDROID_SOCKET_ENV_PREFIX, name);
|
|
|
|
|
|
|
|
if (fd < 0) return fd;
|
|
|
|
|
|
|
|
// Compare to UNIX domain socket name, must match!
|
|
|
|
struct sockaddr_un addr;
|
|
|
|
socklen_t addrlen = sizeof(addr);
|
|
|
|
int ret = TEMP_FAILURE_RETRY(getsockname(fd, (struct sockaddr *)&addr, &addrlen));
|
|
|
|
if (ret < 0) return -1;
|
|
|
|
char *path = NULL;
|
|
|
|
if (asprintf(&path, ANDROID_SOCKET_DIR "/%s", name) < 0) return -1;
|
|
|
|
if (!path) return -1;
|
|
|
|
int cmp = strcmp(addr.sun_path, path);
|
|
|
|
free(path);
|
|
|
|
if (cmp != 0) return -1;
|
|
|
|
|
|
|
|
// It is what we think it is
|
|
|
|
return fd;
|
|
|
|
}
|