blob: 6f729a37205c0f0200655a3bd6f5bf3222cb7021 [file] [log] [blame]
Mark Salyzyn62767fe2016-10-27 07:45:34 -07001/*
2 * Copyright (C) 2016 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "descriptors.h"
18
19#include <ctype.h>
20#include <fcntl.h>
21#include <sys/stat.h>
Mark Salyzyn62767fe2016-10-27 07:45:34 -070022#include <unistd.h>
23
Tom Cherry3f5eaae52017-04-06 16:30:22 -070024#include <android-base/logging.h>
Mark Salyzyn62767fe2016-10-27 07:45:34 -070025#include <android-base/stringprintf.h>
Mark Salyzynb066fcc2017-05-05 14:44:35 -070026#include <android-base/strings.h>
Mark Salyzyn978fd0e2016-12-02 08:05:22 -080027#include <android-base/unique_fd.h>
Mark Salyzyn52bd37e2016-11-07 09:39:30 -080028#include <cutils/android_get_control_file.h>
Mark Salyzyn62767fe2016-10-27 07:45:34 -070029#include <cutils/sockets.h>
30
31#include "init.h"
Mark Salyzyn62767fe2016-10-27 07:45:34 -070032#include "util.h"
33
34DescriptorInfo::DescriptorInfo(const std::string& name, const std::string& type, uid_t uid,
35 gid_t gid, int perm, const std::string& context)
36 : name_(name), type_(type), uid_(uid), gid_(gid), perm_(perm), context_(context) {
37}
38
39DescriptorInfo::~DescriptorInfo() {
40}
41
42std::ostream& operator<<(std::ostream& os, const DescriptorInfo& info) {
43 return os << " descriptors " << info.name_ << " " << info.type_ << " " << std::oct << info.perm_;
44}
45
46bool DescriptorInfo::operator==(const DescriptorInfo& other) const {
47 return name_ == other.name_ && type_ == other.type_ && key() == other.key();
48}
49
50void DescriptorInfo::CreateAndPublish(const std::string& globalContext) const {
51 // Create
52 const std::string& contextStr = context_.empty() ? globalContext : context_;
53 int fd = Create(contextStr);
54 if (fd < 0) return;
55
56 // Publish
57 std::string publishedName = key() + name_;
58 std::for_each(publishedName.begin(), publishedName.end(),
59 [] (char& c) { c = isalnum(c) ? c : '_'; });
60
61 std::string val = android::base::StringPrintf("%d", fd);
62 add_environment(publishedName.c_str(), val.c_str());
63
64 // make sure we don't close on exec
65 fcntl(fd, F_SETFD, 0);
66}
67
68void DescriptorInfo::Clean() const {
69}
70
71SocketInfo::SocketInfo(const std::string& name, const std::string& type, uid_t uid,
72 gid_t gid, int perm, const std::string& context)
73 : DescriptorInfo(name, type, uid, gid, perm, context) {
74}
75
76void SocketInfo::Clean() const {
77 unlink(android::base::StringPrintf(ANDROID_SOCKET_DIR "/%s", name().c_str()).c_str());
78}
79
80int SocketInfo::Create(const std::string& context) const {
Mark Salyzynb066fcc2017-05-05 14:44:35 -070081 auto types = android::base::Split(type(), "+");
82 int flags =
83 ((types[0] == "stream" ? SOCK_STREAM : (types[0] == "dgram" ? SOCK_DGRAM : SOCK_SEQPACKET)));
84 bool passcred = types.size() > 1 && types[1] == "passcred";
85 return CreateSocket(name().c_str(), flags, passcred, perm(), uid(), gid(), context.c_str(),
86 sehandle);
Mark Salyzyn62767fe2016-10-27 07:45:34 -070087}
88
89const std::string SocketInfo::key() const {
90 return ANDROID_SOCKET_ENV_PREFIX;
91}
92
93FileInfo::FileInfo(const std::string& name, const std::string& type, uid_t uid,
94 gid_t gid, int perm, const std::string& context)
Mark Salyzyn978fd0e2016-12-02 08:05:22 -080095 // defaults OK for uid,..., they are ignored for this class.
Mark Salyzyn62767fe2016-10-27 07:45:34 -070096 : DescriptorInfo(name, type, uid, gid, perm, context) {
97}
98
Mark Salyzyn978fd0e2016-12-02 08:05:22 -080099int FileInfo::Create(const std::string&) const {
100 int flags = (type() == "r") ? O_RDONLY :
101 (type() == "w") ? O_WRONLY :
102 O_RDWR;
103
104 // Make sure we do not block on open (eg: devices can chose to block on
105 // carrier detect). Our intention is never to delay launch of a service
106 // for such a condition. The service can perform its own blocking on
107 // carrier detect.
108 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(name().c_str(),
109 flags | O_NONBLOCK)));
110
111 if (fd < 0) {
112 PLOG(ERROR) << "Failed to open file '" << name().c_str() << "'";
113 return -1;
114 }
115
116 // Fixup as we set O_NONBLOCK for open, the intent for fd is to block reads.
117 fcntl(fd, F_SETFL, flags);
118
119 LOG(INFO) << "Opened file '" << name().c_str() << "'"
120 << ", flags " << std::oct << flags << std::dec;
121
122 return fd.release();
Mark Salyzyn62767fe2016-10-27 07:45:34 -0700123}
124
125const std::string FileInfo::key() const {
126 return ANDROID_FILE_ENV_PREFIX;
127}