1 /*
2  * Copyright (C) 2016 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 #include "common/libs/fs/shared_fd.h"
17 
18 #include <arpa/inet.h>
19 #include <errno.h>
20 #include <fcntl.h>
21 #include <net/if.h>
22 #include <netinet/in.h>
23 #include <poll.h>
24 #include <sys/file.h>
25 #include <sys/mman.h>
26 #include <sys/stat.h>
27 #include <sys/syscall.h>
28 #include <sys/types.h>
29 #include <unistd.h>
30 #include <cstddef>
31 
32 #include <algorithm>
33 #include <sstream>
34 #include <vector>
35 
36 #include <android-base/file.h>
37 #include <android-base/logging.h>
38 
39 #include "common/libs/fs/shared_buf.h"
40 #include "common/libs/fs/shared_select.h"
41 #include "common/libs/utils/result.h"
42 
43 // #define ENABLE_GCE_SHARED_FD_LOGGING 1
44 
45 namespace cuttlefish {
46 
47 namespace {
48 
49 class LocalErrno {
50  public:
LocalErrno(int & local_errno)51   LocalErrno(int& local_errno) : local_errno_(local_errno), preserved_(errno) {
52     errno = 0;
53   }
~LocalErrno()54   ~LocalErrno() {
55     local_errno_ = errno;
56     errno = preserved_;
57   }
58 
59  private:
60   int& local_errno_;
61   int preserved_;
62 };
63 
MarkAll(const SharedFDSet & input,fd_set * dest,int * max_index)64 void MarkAll(const SharedFDSet& input, fd_set* dest, int* max_index) {
65   for (SharedFDSet::const_iterator it = input.begin(); it != input.end();
66        ++it) {
67     (*it)->Set(dest, max_index);
68   }
69 }
70 
CheckMarked(fd_set * in_out_mask,SharedFDSet * in_out_set)71 void CheckMarked(fd_set* in_out_mask, SharedFDSet* in_out_set) {
72   if (!in_out_set) {
73     return;
74   }
75   SharedFDSet save;
76   save.swap(in_out_set);
77   for (SharedFDSet::iterator it = save.begin(); it != save.end(); ++it) {
78     if ((*it)->IsSet(in_out_mask)) {
79       in_out_set->Set(*it);
80     }
81   }
82 }
83 
84 /*
85  * Android currently has host prebuilts of glibc 2.15 and 2.17, but
86  * memfd_create was only added in glibc 2.27. It was defined in Linux 3.17,
87  * so we consider it safe to use the low-level arbitrary syscall wrapper.
88  */
89 #ifndef __NR_memfd_create
90 # if defined(__x86_64__)
91 #  define __NR_memfd_create 319
92 # elif defined(__i386__)
93 #  define __NR_memfd_create 356
94 # elif defined(__aarch64__)
95 #  define __NR_memfd_create 279
96 # else
97 /* No interest in other architectures. */
98 #  error "Unknown architecture."
99 # endif
100 #endif
101 
memfd_create_wrapper(const char * name,unsigned int flags)102 int memfd_create_wrapper(const char* name, unsigned int flags) {
103 #ifdef __linux__
104 #ifdef CUTTLEFISH_HOST
105   // TODO(schuffelen): Use memfd_create with a newer host libc.
106   return syscall(__NR_memfd_create, name, flags);
107 #else
108   return memfd_create(name, flags);
109 #endif
110 #else
111   (void)flags;
112   return shm_open(name, O_RDWR);
113 #endif
114 }
115 
IsRegularFile(const int fd)116 bool IsRegularFile(const int fd) {
117   struct stat info;
118   if (fstat(fd, &info) < 0) {
119     return false;
120   }
121   return S_ISREG(info.st_mode);
122 }
123 
124 constexpr size_t kPreferredBufferSize = 8192;
125 
126 }  // namespace
127 
CopyFrom(FileInstance & in,size_t length,FileInstance * stop)128 bool FileInstance::CopyFrom(FileInstance& in, size_t length, FileInstance* stop) {
129   LocalErrno record_errno(errno_);
130   std::vector<char> buffer(kPreferredBufferSize);
131   while (length > 0) {
132     int nfds = stop == nullptr ? 2 : 3;
133     // Wait until either in becomes readable or our fd closes.
134     constexpr ssize_t IN = 0;
135     constexpr ssize_t OUT = 1;
136     constexpr ssize_t STOP = 2;
137     struct pollfd pollfds[3];
138     pollfds[IN].fd = in.fd_;
139     pollfds[IN].events = POLLIN;
140     pollfds[IN].revents = 0;
141     pollfds[OUT].fd = fd_;
142     pollfds[OUT].events = 0;
143     pollfds[OUT].revents = 0;
144     if (stop) {
145       pollfds[STOP].fd = stop->fd_;
146       pollfds[STOP].events = POLLIN;
147       pollfds[STOP].revents = 0;
148     }
149     if (poll(pollfds, nfds, -1 /* indefinitely */) < 0) {
150       return false;
151     }
152     if (stop && pollfds[STOP].revents & POLLIN) {
153       return false;
154     }
155     if (pollfds[OUT].revents != 0) {
156       // destination was either closed, invalid or errored, either way there is no
157       // point in continuing.
158       return false;
159     }
160 
161     ssize_t num_read = in.Read(buffer.data(), std::min(buffer.size(), length));
162     if (num_read <= 0) {
163       return false;
164     }
165     length -= num_read;
166 
167     ssize_t written = 0;
168     do {
169       // No need to use poll for writes: even if the source closes, the data
170       // needs to be delivered to the other side.
171       auto res = Write(buffer.data(), num_read);
172       if (res <= 0) {
173         // The caller will have to log an appropriate message.
174         return false;
175       }
176       written += res;
177     } while(written < num_read);
178   }
179   return true;
180 }
181 
CopyAllFrom(FileInstance & in,FileInstance * stop)182 bool FileInstance::CopyAllFrom(FileInstance& in, FileInstance* stop) {
183   // FileInstance may have been constructed with a non-zero errno_ value because
184   // the errno variable is not zeroed out before.
185   errno_ = 0;
186   in.errno_ = 0;
187   while (CopyFrom(in, kPreferredBufferSize, stop)) {
188   }
189   // Only return false if there was an actual error.
190   return !GetErrno() && !in.GetErrno();
191 }
192 
Close()193 void FileInstance::Close() {
194   std::stringstream message;
195   if (fd_ == -1) {
196     errno_ = EBADF;
197   } else if (close(fd_) == -1) {
198     errno_ = errno;
199     if (identity_.size()) {
200       message << __FUNCTION__ << ": " << identity_ << " failed (" << StrError() << ")";
201       std::string message_str = message.str();
202       Log(message_str.c_str());
203     }
204   } else {
205     if (identity_.size()) {
206       message << __FUNCTION__ << ": " << identity_ << "succeeded";
207       std::string message_str = message.str();
208       Log(message_str.c_str());
209     }
210   }
211   fd_ = -1;
212 }
213 
Chmod(mode_t mode)214 bool FileInstance::Chmod(mode_t mode) {
215   LocalErrno record_errno(errno_);
216 
217   return fchmod(fd_, mode) == 0;
218 }
219 
ConnectWithTimeout(const struct sockaddr * addr,socklen_t addrlen,struct timeval * timeout)220 int FileInstance::ConnectWithTimeout(const struct sockaddr* addr,
221                                      socklen_t addrlen,
222                                      struct timeval* timeout) {
223   int original_flags = Fcntl(F_GETFL, 0);
224   if (original_flags == -1) {
225     LOG(ERROR) << "Could not get current file descriptor flags: " << StrError();
226     return -1;
227   }
228   if (Fcntl(F_SETFL, original_flags | O_NONBLOCK) == -1) {
229     LOG(ERROR) << "Failed to set O_NONBLOCK: " << StrError();
230     return -1;
231   }
232 
233   auto connect_res = Connect(
234       addr, addrlen);  // This will return immediately because of O_NONBLOCK
235 
236   if (connect_res == 0) {  // Immediate success
237     if (Fcntl(F_SETFL, original_flags) == -1) {
238       LOG(ERROR) << "Failed to restore original flags: " << StrError();
239       return -1;
240     }
241     return 0;
242   }
243 
244   if (GetErrno() != EAGAIN && GetErrno() != EINPROGRESS) {
245     LOG(DEBUG) << "Immediate connection failure: " << StrError();
246     if (Fcntl(F_SETFL, original_flags) == -1) {
247       LOG(ERROR) << "Failed to restore original flags: " << StrError();
248     }
249     return -1;
250   }
251 
252   fd_set fdset;
253   FD_ZERO(&fdset);
254   FD_SET(fd_, &fdset);
255 
256   int select_res = select(fd_ + 1, nullptr, &fdset, nullptr, timeout);
257 
258   if (Fcntl(F_SETFL, original_flags) == -1) {
259     LOG(ERROR) << "Failed to restore original flags: " << StrError();
260     return -1;
261   }
262 
263   if (select_res != 1) {
264     LOG(ERROR) << "Did not connect within the timeout";
265     return -1;
266   }
267 
268   int so_error;
269   socklen_t len = sizeof(so_error);
270   if (GetSockOpt(SOL_SOCKET, SO_ERROR, &so_error, &len) == -1) {
271     LOG(ERROR) << "Failed to get socket options: " << StrError();
272     return -1;
273   }
274 
275   if (so_error != 0) {
276     LOG(ERROR) << "Failure in opening socket: " << so_error;
277     errno_ = so_error;
278     return -1;
279   }
280   errno_ = 0;
281   return 0;
282 }
283 
IsSet(fd_set * in) const284 bool FileInstance::IsSet(fd_set* in) const {
285   if (IsOpen() && FD_ISSET(fd_, in)) {
286     return true;
287   }
288   return false;
289 }
290 
291 #if ENABLE_GCE_SHARED_FD_LOGGING
Log(const char * message)292 void FileInstance::Log(const char* message) {
293   LOG(INFO) << message;
294 }
295 #else
Log(const char *)296 void FileInstance::Log(const char*) {}
297 #endif
298 
Set(fd_set * dest,int * max_index) const299 void FileInstance::Set(fd_set* dest, int* max_index) const {
300   if (!IsOpen()) {
301     return;
302   }
303   if (fd_ >= *max_index) {
304     *max_index = fd_ + 1;
305   }
306   FD_SET(fd_, dest);
307 }
308 
Select(SharedFDSet * read_set,SharedFDSet * write_set,SharedFDSet * error_set,struct timeval * timeout)309 int Select(SharedFDSet* read_set, SharedFDSet* write_set,
310            SharedFDSet* error_set, struct timeval* timeout) {
311   int max_index = 0;
312   fd_set readfds;
313   FD_ZERO(&readfds);
314   if (read_set) {
315     MarkAll(*read_set, &readfds, &max_index);
316   }
317   fd_set writefds;
318   FD_ZERO(&writefds);
319   if (write_set) {
320     MarkAll(*write_set, &writefds, &max_index);
321   }
322   fd_set errorfds;
323   FD_ZERO(&errorfds);
324   if (error_set) {
325     MarkAll(*error_set, &errorfds, &max_index);
326   }
327 
328   int rval = TEMP_FAILURE_RETRY(
329       select(max_index, &readfds, &writefds, &errorfds, timeout));
330   FileInstance::Log("select\n");
331   CheckMarked(&readfds, read_set);
332   CheckMarked(&writefds, write_set);
333   CheckMarked(&errorfds, error_set);
334   return rval;
335 }
336 
SharedFD(SharedFD && other)337 SharedFD::SharedFD(SharedFD&& other) {
338   value_ = std::move(other.value_);
339   other.value_.reset(new FileInstance(-1, EBADF));
340 }
341 
operator =(SharedFD && other)342 SharedFD& SharedFD::operator=(SharedFD&& other) {
343   value_ = std::move(other.value_);
344   other.value_.reset(new FileInstance(-1, EBADF));
345   return *this;
346 }
347 
Poll(std::vector<PollSharedFd> & fds,int timeout)348 int SharedFD::Poll(std::vector<PollSharedFd>& fds, int timeout) {
349   return Poll(fds.data(), fds.size(), timeout);
350 }
351 
Poll(PollSharedFd * fds,size_t num_fds,int timeout)352 int SharedFD::Poll(PollSharedFd* fds, size_t num_fds, int timeout) {
353   std::vector<pollfd> native_pollfds(num_fds);
354   for (size_t i = 0; i < num_fds; i++) {
355     native_pollfds[i].fd = fds[i].fd->fd_;
356     native_pollfds[i].events = fds[i].events;
357     native_pollfds[i].revents = 0;
358   }
359   int ret = poll(native_pollfds.data(), native_pollfds.size(), timeout);
360   for (size_t i = 0; i < num_fds; i++) {
361     fds[i].revents = native_pollfds[i].revents;
362   }
363   return ret;
364 }
365 
MakeAddress(const char * name,bool abstract,struct sockaddr_un * dest,socklen_t * len)366 static void MakeAddress(const char* name, bool abstract,
367                         struct sockaddr_un* dest, socklen_t* len) {
368   memset(dest, 0, sizeof(*dest));
369   dest->sun_family = AF_UNIX;
370   // sun_path is NOT expected to be nul-terminated.
371   // See man 7 unix.
372   size_t namelen;
373   if (abstract) {
374     // ANDROID_SOCKET_NAMESPACE_ABSTRACT
375     namelen = strlen(name);
376     CHECK_LE(namelen, sizeof(dest->sun_path) - 1)
377         << "MakeAddress failed. Name=" << name << " is longer than allowed.";
378     dest->sun_path[0] = 0;
379     memcpy(dest->sun_path + 1, name, namelen);
380   } else {
381     // ANDROID_SOCKET_NAMESPACE_RESERVED
382     // ANDROID_SOCKET_NAMESPACE_FILESYSTEM
383     // TODO(pinghao): Distinguish between them?
384     namelen = strlen(name);
385     CHECK_LE(namelen, sizeof(dest->sun_path))
386         << "MakeAddress failed. Name=" << name << " is longer than allowed.";
387     strncpy(dest->sun_path, name, strlen(name));
388   }
389   *len = namelen + offsetof(struct sockaddr_un, sun_path) + 1;
390 }
391 
Accept(const FileInstance & listener,struct sockaddr * addr,socklen_t * addrlen)392 SharedFD SharedFD::Accept(const FileInstance& listener, struct sockaddr* addr,
393                           socklen_t* addrlen) {
394   return SharedFD(
395       std::shared_ptr<FileInstance>(listener.Accept(addr, addrlen)));
396 }
397 
Accept(const FileInstance & listener)398 SharedFD SharedFD::Accept(const FileInstance& listener) {
399   return SharedFD::Accept(listener, NULL, NULL);
400 }
401 
Dup(int unmanaged_fd)402 SharedFD SharedFD::Dup(int unmanaged_fd) {
403   int fd = fcntl(unmanaged_fd, F_DUPFD_CLOEXEC, 3);
404   int error_num = errno;
405   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, error_num)));
406 }
407 
Pipe(SharedFD * fd0,SharedFD * fd1)408 bool SharedFD::Pipe(SharedFD* fd0, SharedFD* fd1) {
409   int fds[2];
410 #ifdef __linux__
411   int rval = pipe2(fds, O_CLOEXEC);
412 #else
413   int rval = pipe(fds);
414 #endif
415   if (rval != -1) {
416     (*fd0) = std::shared_ptr<FileInstance>(new FileInstance(fds[0], errno));
417     (*fd1) = std::shared_ptr<FileInstance>(new FileInstance(fds[1], errno));
418     return true;
419   }
420   return false;
421 }
422 
423 #ifdef __linux__
Event(int initval,int flags)424 SharedFD SharedFD::Event(int initval, int flags) {
425   int fd = eventfd(initval, flags);
426   return std::shared_ptr<FileInstance>(new FileInstance(fd, errno));
427 }
428 #endif
429 
MemfdCreate(const std::string & name,unsigned int flags)430 SharedFD SharedFD::MemfdCreate(const std::string& name, unsigned int flags) {
431   int fd = memfd_create_wrapper(name.c_str(), flags);
432   int error_num = errno;
433   return std::shared_ptr<FileInstance>(new FileInstance(fd, error_num));
434 }
435 
MemfdCreateWithData(const std::string & name,const std::string & data,unsigned int flags)436 SharedFD SharedFD::MemfdCreateWithData(const std::string& name, const std::string& data, unsigned int flags) {
437   auto memfd = MemfdCreate(name, flags);
438   if (WriteAll(memfd, data) != data.size()) {
439     return ErrorFD(errno);
440   }
441   if (memfd->LSeek(0, SEEK_SET) != 0) {
442     return ErrorFD(memfd->GetErrno());
443   }
444   if (!memfd->Chmod(0700)) {
445     return ErrorFD(memfd->GetErrno());
446   }
447   return memfd;
448 }
449 
SocketPair(int domain,int type,int protocol,SharedFD * fd0,SharedFD * fd1)450 bool SharedFD::SocketPair(int domain, int type, int protocol,
451                           SharedFD* fd0, SharedFD* fd1) {
452   int fds[2];
453   int rval = socketpair(domain, type, protocol, fds);
454   if (rval != -1) {
455     (*fd0) = std::shared_ptr<FileInstance>(new FileInstance(fds[0], errno));
456     (*fd1) = std::shared_ptr<FileInstance>(new FileInstance(fds[1], errno));
457     return true;
458   }
459   return false;
460 }
461 
SocketPair(int domain,int type,int protocol)462 Result<std::pair<SharedFD, SharedFD>> SharedFD::SocketPair(int domain, int type,
463                                                            int protocol) {
464   SharedFD a, b;
465   if (!SharedFD::SocketPair(domain, type, protocol, &a, &b)) {
466     return CF_ERR("socketpair failed: " << strerror(errno));
467   }
468   return std::make_pair(std::move(a), std::move(b));
469 }
470 
Open(const std::string & path,int flags,mode_t mode)471 SharedFD SharedFD::Open(const std::string& path, int flags, mode_t mode) {
472   return Open(path.c_str(), flags, mode);
473 }
474 
Open(const char * path,int flags,mode_t mode)475 SharedFD SharedFD::Open(const char* path, int flags, mode_t mode) {
476   int fd = TEMP_FAILURE_RETRY(open(path, flags, mode));
477   if (fd == -1) {
478     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
479   } else {
480     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
481   }
482 }
483 
InotifyFd(void)484 SharedFD SharedFD::InotifyFd(void) {
485   errno = 0;
486   int fd = TEMP_FAILURE_RETRY(inotify_init1(IN_CLOEXEC));
487   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
488 }
489 
Creat(const std::string & path,mode_t mode)490 SharedFD SharedFD::Creat(const std::string& path, mode_t mode) {
491   return SharedFD::Open(path, O_CREAT|O_WRONLY|O_TRUNC, mode);
492 }
493 
Fchdir(SharedFD shared_fd)494 int SharedFD::Fchdir(SharedFD shared_fd) {
495   if (!shared_fd.value_) {
496     return -1;
497   }
498   LocalErrno record_errno(shared_fd->errno_);
499 
500   return TEMP_FAILURE_RETRY(fchdir(shared_fd->fd_));
501 }
502 
Fifo(const std::string & path,mode_t mode)503 Result<SharedFD> SharedFD::Fifo(const std::string& path, mode_t mode) {
504   struct stat st {};
505   if (TEMP_FAILURE_RETRY(stat(path.c_str(), &st)) == 0) {
506     CF_EXPECTF(TEMP_FAILURE_RETRY(remove(path.c_str())) == 0,
507                "Failed to delete old file at '{}': '{}'", path,
508                strerror(errno));
509   }
510 
511   CF_EXPECTF(TEMP_FAILURE_RETRY(mkfifo(path.c_str(), mode)) == 0,
512              "Failed to mkfifo('{}', {:o})", path, mode);
513   auto ret = Open(path, O_RDWR);
514   CF_EXPECTF(ret->IsOpen(), "Failed to open '{}': '{}'", path, ret->StrError());
515   return ret;
516 }
517 
Socket(int domain,int socket_type,int protocol)518 SharedFD SharedFD::Socket(int domain, int socket_type, int protocol) {
519   int fd = TEMP_FAILURE_RETRY(socket(domain, socket_type, protocol));
520   if (fd == -1) {
521     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
522   } else {
523     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
524   }
525 }
526 
Mkstemp(std::string * path)527 SharedFD SharedFD::Mkstemp(std::string* path) {
528   int fd = mkstemp(path->data());
529   if (fd == -1) {
530     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, errno)));
531   } else {
532     return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(fd, 0)));
533   }
534 }
535 
ErrorFD(int error)536 SharedFD SharedFD::ErrorFD(int error) {
537   return SharedFD(std::shared_ptr<FileInstance>(new FileInstance(-1, error)));
538 }
539 
SocketLocalClient(const std::string & name,bool abstract,int in_type)540 SharedFD SharedFD::SocketLocalClient(const std::string& name, bool abstract,
541                                      int in_type) {
542   return SocketLocalClient(name, abstract, in_type, 0);
543 }
544 
SocketLocalClient(const std::string & name,bool abstract,int in_type,int timeout_seconds)545 SharedFD SharedFD::SocketLocalClient(const std::string& name, bool abstract,
546                                      int in_type, int timeout_seconds) {
547   struct sockaddr_un addr;
548   socklen_t addrlen;
549   MakeAddress(name.c_str(), abstract, &addr, &addrlen);
550   SharedFD rval = SharedFD::Socket(PF_UNIX, in_type, 0);
551   if (!rval->IsOpen()) {
552     return rval;
553   }
554   struct timeval timeout = {timeout_seconds, 0};
555   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
556   if (rval->ConnectWithTimeout(casted_addr, addrlen, &timeout) == -1) {
557     return SharedFD::ErrorFD(rval->GetErrno());
558   }
559   return rval;
560 }
561 
SocketLocalClient(int port,int type)562 SharedFD SharedFD::SocketLocalClient(int port, int type) {
563   sockaddr_in addr{};
564   addr.sin_family = AF_INET;
565   addr.sin_port = htons(port);
566   addr.sin_addr.s_addr = htonl(INADDR_ANY);
567   auto rval = SharedFD::Socket(AF_INET, type, 0);
568   if (!rval->IsOpen()) {
569     return rval;
570   }
571   if (rval->Connect(reinterpret_cast<const sockaddr*>(&addr), sizeof addr) < 0) {
572     return SharedFD::ErrorFD(rval->GetErrno());
573   }
574   return rval;
575 }
576 
SocketClient(const std::string & host,int port,int type,std::chrono::seconds timeout)577 SharedFD SharedFD::SocketClient(const std::string& host, int port, int type,
578                                 std::chrono::seconds timeout) {
579   sockaddr_in addr{};
580   addr.sin_family = AF_INET;
581   addr.sin_port = htons(port);
582   addr.sin_addr.s_addr = inet_addr(host.c_str());
583   auto rval = SharedFD::Socket(AF_INET, type, 0);
584   if (!rval->IsOpen()) {
585     return rval;
586   }
587   struct timeval timeout_timeval = {static_cast<time_t>(timeout.count()), 0};
588   if (rval->ConnectWithTimeout(reinterpret_cast<const sockaddr*>(&addr),
589                                sizeof addr, &timeout_timeval) < 0) {
590     return SharedFD::ErrorFD(rval->GetErrno());
591   }
592   return rval;
593 }
594 
Socket6Client(const std::string & host,const std::string & interface,int port,int type,std::chrono::seconds timeout)595 SharedFD SharedFD::Socket6Client(const std::string& host, const std::string& interface,
596                                  int port, int type, std::chrono::seconds timeout) {
597   sockaddr_in6 addr{};
598   addr.sin6_family = AF_INET6;
599   addr.sin6_port = htons(port);
600   inet_pton(AF_INET6, host.c_str(), &addr.sin6_addr);
601   auto rval = SharedFD::Socket(AF_INET6, type, 0);
602   if (!rval->IsOpen()) {
603     return rval;
604   }
605 
606   if (!interface.empty()) {
607 #ifdef __linux__
608     ifreq ifr{};
609     snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s", interface.c_str());
610 
611     if (rval->SetSockOpt(SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr)) == -1) {
612       return SharedFD::ErrorFD(rval->GetErrno());
613     }
614 #elif defined(__APPLE__)
615     int idx = if_nametoindex(interface.c_str());
616     if (rval->SetSockOpt(IPPROTO_IP, IP_BOUND_IF, &idx, sizeof(idx)) == -1) {
617       return SharedFD::ErrorFD(rval->GetErrno());
618     }
619 #else
620 #error "Unsupported operating system"
621 #endif
622   }
623 
624   struct timeval timeout_timeval = {static_cast<time_t>(timeout.count()), 0};
625   if (rval->ConnectWithTimeout(reinterpret_cast<const sockaddr*>(&addr),
626                                sizeof addr, &timeout_timeval) < 0) {
627     return SharedFD::ErrorFD(rval->GetErrno());
628   }
629   return rval;
630 }
631 
SocketLocalServer(int port,int type)632 SharedFD SharedFD::SocketLocalServer(int port, int type) {
633   struct sockaddr_in addr;
634   memset(&addr, 0, sizeof(addr));
635   addr.sin_family = AF_INET;
636   addr.sin_port = htons(port);
637   addr.sin_addr.s_addr = htonl(INADDR_ANY);
638   SharedFD rval = SharedFD::Socket(AF_INET, type, 0);
639   if(!rval->IsOpen()) {
640     return rval;
641   }
642   int n = 1;
643   if (rval->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1) {
644     LOG(ERROR) << "SetSockOpt failed " << rval->StrError();
645     return SharedFD::ErrorFD(rval->GetErrno());
646   }
647   if(rval->Bind(reinterpret_cast<sockaddr*>(&addr), sizeof(addr)) < 0) {
648     LOG(ERROR) << "Bind failed " << rval->StrError();
649     return SharedFD::ErrorFD(rval->GetErrno());
650   }
651   if (type == SOCK_STREAM || type == SOCK_SEQPACKET) {
652     if (rval->Listen(4) < 0) {
653       LOG(ERROR) << "Listen failed " << rval->StrError();
654       return SharedFD::ErrorFD(rval->GetErrno());
655     }
656   }
657   return rval;
658 }
659 
SocketLocalServer(const std::string & name,bool abstract,int in_type,mode_t mode)660 SharedFD SharedFD::SocketLocalServer(const std::string& name, bool abstract,
661                                      int in_type, mode_t mode) {
662   // DO NOT UNLINK addr.sun_path. It does NOT have to be null-terminated.
663   // See man 7 unix for more details.
664   if (!abstract) {
665     (void)unlink(name.c_str());
666   }
667 
668   struct sockaddr_un addr;
669   socklen_t addrlen;
670   MakeAddress(name.c_str(), abstract, &addr, &addrlen);
671   SharedFD rval = SharedFD::Socket(PF_UNIX, in_type, 0);
672   if (!rval->IsOpen()) {
673     return rval;
674   }
675 
676   int n = 1;
677   if (rval->SetSockOpt(SOL_SOCKET, SO_REUSEADDR, &n, sizeof(n)) == -1) {
678     LOG(ERROR) << "SetSockOpt failed " << rval->StrError();
679     return SharedFD::ErrorFD(rval->GetErrno());
680   }
681   if (rval->Bind(reinterpret_cast<sockaddr*>(&addr), addrlen) == -1) {
682     LOG(ERROR) << "Bind failed; name=" << name << ": " << rval->StrError();
683     return SharedFD::ErrorFD(rval->GetErrno());
684   }
685 
686   /* Only the bottom bits are really the socket type; there are flags too. */
687   constexpr int SOCK_TYPE_MASK = 0xf;
688   auto socket_type = in_type & SOCK_TYPE_MASK;
689 
690   // Connection oriented sockets: start listening.
691   if (socket_type == SOCK_STREAM || socket_type == SOCK_SEQPACKET) {
692     // Follows the default from socket_local_server
693     if (rval->Listen(1) == -1) {
694       LOG(ERROR) << "Listen failed: " << rval->StrError();
695       return SharedFD::ErrorFD(rval->GetErrno());
696     }
697   }
698 
699   if (!abstract) {
700     if (TEMP_FAILURE_RETRY(chmod(name.c_str(), mode)) == -1) {
701       LOG(ERROR) << "chmod failed: " << strerror(errno);
702       // However, continue since we do have a listening socket
703     }
704   }
705   return rval;
706 }
707 
708 #ifdef __linux__
VsockServer(unsigned int port,int type,std::optional<int> vhost_user_vsock_listening_cid,unsigned int cid)709 SharedFD SharedFD::VsockServer(
710     unsigned int port, int type,
711     std::optional<int> vhost_user_vsock_listening_cid, unsigned int cid) {
712 #ifndef CUTTLEFISH_HOST
713   CHECK(!vhost_user_vsock_listening_cid)
714       << "vhost_user_vsock_listening_cid is supposed to be nullopt in the "
715          "guest";
716 #endif
717   if (vhost_user_vsock_listening_cid) {
718     return SharedFD::SocketLocalServer(
719         GetVhostUserVsockServerAddr(port, *vhost_user_vsock_listening_cid),
720         false /* abstract */, type, 0666 /* mode */);
721   }
722 
723   auto vsock = SharedFD::Socket(AF_VSOCK, type, 0);
724   if (!vsock->IsOpen()) {
725     return vsock;
726   }
727   sockaddr_vm addr{};
728   addr.svm_family = AF_VSOCK;
729   addr.svm_port = port;
730   addr.svm_cid = cid;
731   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
732   if (vsock->Bind(casted_addr, sizeof(addr)) == -1) {
733     LOG(ERROR) << "Port " << port << " Bind failed (" << vsock->StrError()
734                << ")";
735     return SharedFD::ErrorFD(vsock->GetErrno());
736   }
737   if (type == SOCK_STREAM || type == SOCK_SEQPACKET) {
738     if (vsock->Listen(4) < 0) {
739       LOG(ERROR) << "Port" << port << " Listen failed (" << vsock->StrError()
740                  << ")";
741       return SharedFD::ErrorFD(vsock->GetErrno());
742     }
743   }
744   return vsock;
745 }
746 
VsockServer(int type,std::optional<int> vhost_user_vsock_listening_cid)747 SharedFD SharedFD::VsockServer(
748     int type, std::optional<int> vhost_user_vsock_listening_cid) {
749   return VsockServer(VMADDR_PORT_ANY, type, vhost_user_vsock_listening_cid);
750 }
751 
GetVhostUserVsockServerAddr(unsigned int port,int vhost_user_vsock_listening_cid)752 std::string SharedFD::GetVhostUserVsockServerAddr(
753     unsigned int port, int vhost_user_vsock_listening_cid) {
754   // TODO(b/277909042): better path than /tmp/vsock_{}/vm.vsock_{}
755   return fmt::format(
756       "{}_{}", GetVhostUserVsockClientAddr(vhost_user_vsock_listening_cid),
757       port);
758 }
759 
GetVhostUserVsockClientAddr(int cid)760 std::string SharedFD::GetVhostUserVsockClientAddr(int cid) {
761   // TODO(b/277909042): better path than /tmp/vsock_{}/vm.vsock_{}
762   return fmt::format("/tmp/vsock_{}_{}/vm.vsock", cid,
763                      std::to_string(getuid()));
764 }
765 
VsockClient(unsigned int cid,unsigned int port,int type,bool vhost_user)766 SharedFD SharedFD::VsockClient(unsigned int cid, unsigned int port, int type,
767                                bool vhost_user) {
768 #ifndef CUTTLEFISH_HOST
769   CHECK(!vhost_user) << "vhost_user is supposed to be false in the guest";
770 #endif
771   if (vhost_user) {
772     // TODO(b/277909042): better path than /tmp/vsock_{}/vm.vsock
773     auto client = SharedFD::SocketLocalClient(GetVhostUserVsockClientAddr(cid),
774                                               false /* abstract */, type);
775     const std::string msg = fmt::format("connect {}\n", port);
776     SendAll(client, msg);
777 
778     const std::string expected_res = fmt::format("OK {}\n", port);
779     std::string actual_res(expected_res.length(), ' ');
780     if (ReadExact(client, &actual_res) != expected_res.length()) {
781       client->Close();
782       LOG(ERROR) << "cannot connect to " << cid << ":" << port;
783       return client;
784     }
785     if (actual_res != expected_res) {
786       client->Close();
787       LOG(ERROR) << "response from server: " << actual_res << ", but expect "
788                  << expected_res;
789       return client;
790     }
791     return client;
792   }
793   auto vsock = SharedFD::Socket(AF_VSOCK, type, 0);
794   if (!vsock->IsOpen()) {
795     return vsock;
796   }
797   sockaddr_vm addr{};
798   addr.svm_family = AF_VSOCK;
799   addr.svm_port = port;
800   addr.svm_cid = cid;
801   auto casted_addr = reinterpret_cast<sockaddr*>(&addr);
802   if (vsock->Connect(casted_addr, sizeof(addr)) == -1) {
803     return SharedFD::ErrorFD(vsock->GetErrno());
804   }
805   return vsock;
806 }
807 #endif
808 
lock() const809 SharedFD WeakFD::lock() const {
810   auto locked_file_instance = value_.lock();
811   if (locked_file_instance) {
812     return SharedFD(locked_file_instance);
813   }
814   return SharedFD();
815 }
816 
ScopedMMap(void * ptr,size_t len)817 ScopedMMap::ScopedMMap(void* ptr, size_t len) : ptr_(ptr), len_(len) {}
818 
ScopedMMap()819 ScopedMMap::ScopedMMap() : ptr_(MAP_FAILED), len_(0) {}
820 
ScopedMMap(ScopedMMap && other)821 ScopedMMap::ScopedMMap(ScopedMMap&& other)
822     : ptr_(other.ptr_), len_(other.len_) {
823   other.ptr_ = MAP_FAILED;
824   other.len_ = 0;
825 }
826 
~ScopedMMap()827 ScopedMMap::~ScopedMMap() {
828   if (ptr_ != MAP_FAILED) {
829     munmap(ptr_, len_);
830   }
831 }
832 
ClosedInstance()833 /* static */ std::shared_ptr<FileInstance> FileInstance::ClosedInstance() {
834   return std::shared_ptr<FileInstance>(new FileInstance(-1, EBADF));
835 }
836 
Bind(const struct sockaddr * addr,socklen_t addrlen)837 int FileInstance::Bind(const struct sockaddr* addr, socklen_t addrlen) {
838   LocalErrno record_errno(errno_);
839 
840   return bind(fd_, addr, addrlen);
841 }
842 
Connect(const struct sockaddr * addr,socklen_t addrlen)843 int FileInstance::Connect(const struct sockaddr* addr, socklen_t addrlen) {
844   LocalErrno record_errno(errno_);
845 
846   return connect(fd_, addr, addrlen);
847 }
848 
UNMANAGED_Dup()849 int FileInstance::UNMANAGED_Dup() {
850   LocalErrno record_errno(errno_);
851 
852   return TEMP_FAILURE_RETRY(dup(fd_));
853 }
854 
UNMANAGED_Dup2(int newfd)855 int FileInstance::UNMANAGED_Dup2(int newfd) {
856   LocalErrno record_errno(errno_);
857 
858   return TEMP_FAILURE_RETRY(dup2(fd_, newfd));
859 }
860 
Fcntl(int command,int value)861 int FileInstance::Fcntl(int command, int value) {
862   LocalErrno record_errno(errno_);
863 
864   return TEMP_FAILURE_RETRY(fcntl(fd_, command, value));
865 }
866 
Fsync()867 int FileInstance::Fsync() {
868   LocalErrno record_errno(errno_);
869 
870   return TEMP_FAILURE_RETRY(fsync(fd_));
871 }
872 
Flock(int operation)873 Result<void> FileInstance::Flock(int operation) {
874   LocalErrno record_errno(errno_);
875 
876   CF_EXPECT(TEMP_FAILURE_RETRY(flock(fd_, operation)) == 0, strerror(errno));
877   return {};
878 }
879 
GetSockName(struct sockaddr * addr,socklen_t * addrlen)880 int FileInstance::GetSockName(struct sockaddr* addr, socklen_t* addrlen) {
881   LocalErrno record_errno(errno_);
882 
883   return TEMP_FAILURE_RETRY(getsockname(fd_, addr, addrlen));
884 }
885 
886 #ifdef __linux__
VsockServerPort()887 unsigned int FileInstance::VsockServerPort() {
888   struct sockaddr_vm vm_socket;
889   socklen_t length = sizeof(vm_socket);
890   GetSockName(reinterpret_cast<struct sockaddr*>(&vm_socket), &length);
891   return vm_socket.svm_port;
892 }
893 #endif
894 
Ioctl(int request,void * val)895 int FileInstance::Ioctl(int request, void* val) {
896   LocalErrno record_errno(errno_);
897 
898   return TEMP_FAILURE_RETRY(ioctl(fd_, request, val));
899 }
900 
LinkAtCwd(const std::string & path)901 int FileInstance::LinkAtCwd(const std::string& path) {
902   LocalErrno record_errno(errno_);
903 
904   std::string name = "/proc/self/fd/";
905   name += std::to_string(fd_);
906   return linkat(-1, name.c_str(), AT_FDCWD, path.c_str(), AT_SYMLINK_FOLLOW);
907 }
908 
Listen(int backlog)909 int FileInstance::Listen(int backlog) {
910   LocalErrno record_errno(errno_);
911 
912   return listen(fd_, backlog);
913 }
914 
LSeek(off_t offset,int whence)915 off_t FileInstance::LSeek(off_t offset, int whence) {
916   LocalErrno record_errno(errno_);
917 
918   return TEMP_FAILURE_RETRY(lseek(fd_, offset, whence));
919 }
920 
Recv(void * buf,size_t len,int flags)921 ssize_t FileInstance::Recv(void* buf, size_t len, int flags) {
922   LocalErrno record_errno(errno_);
923 
924   return TEMP_FAILURE_RETRY(recv(fd_, buf, len, flags));
925 }
926 
RecvMsg(struct msghdr * msg,int flags)927 ssize_t FileInstance::RecvMsg(struct msghdr* msg, int flags) {
928   LocalErrno record_errno(errno_);
929 
930   return TEMP_FAILURE_RETRY(recvmsg(fd_, msg, flags));
931 }
932 
Read(void * buf,size_t count)933 ssize_t FileInstance::Read(void* buf, size_t count) {
934   LocalErrno record_errno(errno_);
935 
936   return TEMP_FAILURE_RETRY(read(fd_, buf, count));
937 }
938 
939 #ifdef __linux__
EventfdRead(eventfd_t * value)940 int FileInstance::EventfdRead(eventfd_t* value) {
941   LocalErrno record_errno(errno_);
942 
943   return eventfd_read(fd_, value);
944 }
945 #endif
946 
Send(const void * buf,size_t len,int flags)947 ssize_t FileInstance::Send(const void* buf, size_t len, int flags) {
948   LocalErrno record_errno(errno_);
949 
950   return TEMP_FAILURE_RETRY(send(fd_, buf, len, flags));
951 }
952 
SendMsg(const struct msghdr * msg,int flags)953 ssize_t FileInstance::SendMsg(const struct msghdr* msg, int flags) {
954   LocalErrno record_errno(errno_);
955 
956   return TEMP_FAILURE_RETRY(sendmsg(fd_, msg, flags));
957 }
958 
Shutdown(int how)959 int FileInstance::Shutdown(int how) {
960   LocalErrno record_errno(errno_);
961 
962   return shutdown(fd_, how);
963 }
964 
SetSockOpt(int level,int optname,const void * optval,socklen_t optlen)965 int FileInstance::SetSockOpt(int level, int optname, const void* optval,
966                              socklen_t optlen) {
967   LocalErrno record_errno(errno_);
968 
969   return setsockopt(fd_, level, optname, optval, optlen);
970 }
971 
GetSockOpt(int level,int optname,void * optval,socklen_t * optlen)972 int FileInstance::GetSockOpt(int level, int optname, void* optval,
973                              socklen_t* optlen) {
974   LocalErrno record_errno(errno_);
975 
976   return getsockopt(fd_, level, optname, optval, optlen);
977 }
978 
SetTerminalRaw()979 int FileInstance::SetTerminalRaw() {
980   LocalErrno record_errno(errno_);
981 
982   termios terminal_settings;
983   if (int rval = tcgetattr(fd_, &terminal_settings); rval < 0) {
984     return rval;
985   }
986   cfmakeraw(&terminal_settings);
987   if (int rval = tcsetattr(fd_, TCSANOW, &terminal_settings); rval < 0) {
988     return rval;
989   }
990 
991   // tcsetattr() succeeds if any of the requested change success.
992   // So double check whether everything is applied.
993   termios raw_settings;
994   if (int rval = tcgetattr(fd_, &raw_settings); rval < 0) {
995     return rval;
996   }
997   if (memcmp(&terminal_settings, &raw_settings, sizeof(terminal_settings))) {
998     errno = EPROTO;
999     return -1;
1000   }
1001   return 0;
1002 }
1003 
StrError() const1004 std::string FileInstance::StrError() const {
1005   errno = 0;
1006   return std::string(strerror(errno_));
1007 }
1008 
MMap(void * addr,size_t length,int prot,int flags,off_t offset)1009 ScopedMMap FileInstance::MMap(void* addr, size_t length, int prot, int flags,
1010                               off_t offset) {
1011   LocalErrno record_errno(errno_);
1012 
1013   auto ptr = mmap(addr, length, prot, flags, fd_, offset);
1014   return ScopedMMap(ptr, length);
1015 }
1016 
Truncate(off_t length)1017 ssize_t FileInstance::Truncate(off_t length) {
1018   LocalErrno record_errno(errno_);
1019 
1020   return TEMP_FAILURE_RETRY(ftruncate(fd_, length));
1021 }
1022 
Write(const void * buf,size_t count)1023 ssize_t FileInstance::Write(const void* buf, size_t count) {
1024   if (count == 0 && !IsRegular()) {
1025     return 0;
1026   }
1027 
1028   LocalErrno record_errno(errno_);
1029 
1030   return TEMP_FAILURE_RETRY(write(fd_, buf, count));
1031 }
1032 
1033 #ifdef __linux__
EventfdWrite(eventfd_t value)1034 int FileInstance::EventfdWrite(eventfd_t value) {
1035   LocalErrno record_errno(errno_);
1036 
1037   return eventfd_write(fd_, value);
1038 }
1039 #endif
1040 
IsATTY()1041 bool FileInstance::IsATTY() {
1042   LocalErrno record_errno(errno_);
1043 
1044   return isatty(fd_);
1045 }
1046 
Futimens(const struct timespec times[2])1047 int FileInstance::Futimens(const struct timespec times[2]) {
1048   LocalErrno record_errno(errno_);
1049 
1050   return TEMP_FAILURE_RETRY(futimens(fd_, times));
1051 }
1052 
1053 #ifdef __linux__
ProcFdLinkTarget() const1054 Result<std::string> FileInstance::ProcFdLinkTarget() const {
1055   std::stringstream output_composer;
1056   output_composer << "/proc/" << getpid() << "/fd/" << fd_;
1057   const std::string mem_fd_link = output_composer.str();
1058   std::string mem_fd_target;
1059   CF_EXPECT(
1060       android::base::Readlink(mem_fd_link, &mem_fd_target),
1061       "Getting link for the memory file \"" << mem_fd_link << "\" failed");
1062   return mem_fd_target;
1063 }
1064 #endif
1065 
1066 // inotify related functions
InotifyAddWatch(const std::string & pathname,uint32_t mask)1067 int FileInstance::InotifyAddWatch(const std::string& pathname, uint32_t mask) {
1068   return inotify_add_watch(fd_, pathname.c_str(), mask);
1069 }
1070 
InotifyRmWatch(int watch)1071 void FileInstance::InotifyRmWatch(int watch) {
1072   inotify_rm_watch(fd_, watch);
1073 }
1074 
FileInstance(int fd,int in_errno)1075 FileInstance::FileInstance(int fd, int in_errno)
1076     : fd_(fd), errno_(in_errno), is_regular_file_(IsRegularFile(fd_)) {
1077   // Ensure every file descriptor managed by a FileInstance has the CLOEXEC
1078   // flag
1079   TEMP_FAILURE_RETRY(fcntl(fd, F_SETFD, FD_CLOEXEC));
1080   std::stringstream identity;
1081   identity << "fd=" << fd << " @" << this;
1082   identity_ = identity.str();
1083 }
1084 
Accept(struct sockaddr * addr,socklen_t * addrlen) const1085 FileInstance* FileInstance::Accept(struct sockaddr* addr,
1086                                    socklen_t* addrlen) const {
1087   int fd = TEMP_FAILURE_RETRY(accept(fd_, addr, addrlen));
1088   if (fd == -1) {
1089     return new FileInstance(fd, errno);
1090   } else {
1091     return new FileInstance(fd, 0);
1092   }
1093 }
1094 
1095 }  // namespace cuttlefish
1096