c865adaa3b
When running in a container, the process might be in a user/net namespace, which would cause setting the SO_RCVBUFFORCE socket option to fail with EPERM. But rmem_max is set to a high enough value which allows SO_RCVBUF to succeed. Bug: 62417946 Test: Run android in a new user and network namespace, vold does not abort here. Change-Id: I2b678ddd886a406a3394d9fdd33f9c8800ef78a3 Signed-off-by: Junichi Uekawa <uekawa@google.com> (cherry picked from commit b41155d4af0e00fc6f65d7d67b80e7b866f847d6)
112 lines
2.8 KiB
C++
112 lines
2.8 KiB
C++
/*
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
|
|
#include <sys/socket.h>
|
|
#include <sys/select.h>
|
|
#include <sys/time.h>
|
|
#include <sys/types.h>
|
|
#include <sys/un.h>
|
|
|
|
#include <linux/netlink.h>
|
|
|
|
#define LOG_TAG "Vold"
|
|
|
|
#include <cutils/log.h>
|
|
|
|
#include "NetlinkManager.h"
|
|
#include "NetlinkHandler.h"
|
|
|
|
NetlinkManager *NetlinkManager::sInstance = NULL;
|
|
|
|
NetlinkManager *NetlinkManager::Instance() {
|
|
if (!sInstance)
|
|
sInstance = new NetlinkManager();
|
|
return sInstance;
|
|
}
|
|
|
|
NetlinkManager::NetlinkManager() {
|
|
mBroadcaster = NULL;
|
|
}
|
|
|
|
NetlinkManager::~NetlinkManager() {
|
|
}
|
|
|
|
int NetlinkManager::start() {
|
|
struct sockaddr_nl nladdr;
|
|
int sz = 64 * 1024;
|
|
int on = 1;
|
|
|
|
memset(&nladdr, 0, sizeof(nladdr));
|
|
nladdr.nl_family = AF_NETLINK;
|
|
nladdr.nl_pid = getpid();
|
|
nladdr.nl_groups = 0xffffffff;
|
|
|
|
if ((mSock = socket(PF_NETLINK, SOCK_DGRAM | SOCK_CLOEXEC,
|
|
NETLINK_KOBJECT_UEVENT)) < 0) {
|
|
SLOGE("Unable to create uevent socket: %s", strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
// When running in a net/user namespace, SO_RCVBUFFORCE is not available.
|
|
// Try using SO_RCVBUF first.
|
|
if ((setsockopt(mSock, SOL_SOCKET, SO_RCVBUF, &sz, sizeof(sz)) < 0) &&
|
|
(setsockopt(mSock, SOL_SOCKET, SO_RCVBUFFORCE, &sz, sizeof(sz)) < 0)) {
|
|
SLOGE("Unable to set uevent socket SO_RCVBUF/SO_RCVBUFFORCE option: %s", strerror(errno));
|
|
goto out;
|
|
}
|
|
|
|
if (setsockopt(mSock, SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)) < 0) {
|
|
SLOGE("Unable to set uevent socket SO_PASSCRED option: %s", strerror(errno));
|
|
goto out;
|
|
}
|
|
|
|
if (bind(mSock, (struct sockaddr *) &nladdr, sizeof(nladdr)) < 0) {
|
|
SLOGE("Unable to bind uevent socket: %s", strerror(errno));
|
|
goto out;
|
|
}
|
|
|
|
mHandler = new NetlinkHandler(mSock);
|
|
if (mHandler->start()) {
|
|
SLOGE("Unable to start NetlinkHandler: %s", strerror(errno));
|
|
goto out;
|
|
}
|
|
|
|
return 0;
|
|
|
|
out:
|
|
close(mSock);
|
|
return -1;
|
|
}
|
|
|
|
int NetlinkManager::stop() {
|
|
int status = 0;
|
|
|
|
if (mHandler->stop()) {
|
|
SLOGE("Unable to stop NetlinkHandler: %s", strerror(errno));
|
|
status = -1;
|
|
}
|
|
delete mHandler;
|
|
mHandler = NULL;
|
|
|
|
close(mSock);
|
|
mSock = -1;
|
|
|
|
return status;
|
|
}
|