/* * Copyright (c) 2018-2020, Andreas Kling * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, this * list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright notice, * this list of conditions and the following disclaimer in the documentation * and/or other materials provided with the distribution. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include #include #include #include namespace Kernel { #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \ do { \ if (domain == AF_INET) \ REQUIRE_PROMISE(inet); \ else if (domain == AF_LOCAL) \ REQUIRE_PROMISE(unix); \ } while (0) int Process::sys$socket(int domain, int type, int protocol) { REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain); if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser()) return -EACCES; int fd = alloc_fd(); if (fd < 0) return fd; auto result = Socket::create(domain, type, protocol); if (result.is_error()) return result.error(); auto description = FileDescription::create(*result.value()); description->set_readable(true); description->set_writable(true); unsigned flags = 0; if (type & SOCK_CLOEXEC) flags |= FD_CLOEXEC; if (type & SOCK_NONBLOCK) description->set_blocking(false); m_fds[fd].set(move(description), flags); return fd; } int Process::sys$bind(int sockfd, Userspace address, socklen_t address_length) { auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); return socket.bind(address, address_length); } int Process::sys$listen(int sockfd, int backlog) { if (backlog < 0) return -EINVAL; auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); if (socket.is_connected()) return -EINVAL; return socket.listen(backlog); } int Process::sys$accept(int accepting_socket_fd, Userspace user_address, Userspace user_address_size) { REQUIRE_PROMISE(accept); socklen_t address_size = 0; if (user_address && !copy_from_user(&address_size, static_ptr_cast(user_address_size))) return -EFAULT; int accepted_socket_fd = alloc_fd(); if (accepted_socket_fd < 0) return accepted_socket_fd; auto accepting_socket_description = file_description(accepting_socket_fd); if (!accepting_socket_description) return -EBADF; if (!accepting_socket_description->is_socket()) return -ENOTSOCK; auto& socket = *accepting_socket_description->socket(); if (!socket.can_accept()) { if (accepting_socket_description->is_blocking()) { if (Thread::current()->block(nullptr, *accepting_socket_description).was_interrupted()) return -EINTR; } else { return -EAGAIN; } } auto accepted_socket = socket.accept(); ASSERT(accepted_socket); if (user_address) { u8 address_buffer[sizeof(sockaddr_un)]; address_size = min(sizeof(sockaddr_un), static_cast(address_size)); accepted_socket->get_peer_address((sockaddr*)address_buffer, &address_size); if (!copy_to_user(user_address, address_buffer, address_size)) return -EFAULT; if (!copy_to_user(user_address_size, &address_size)) return -EFAULT; } auto accepted_socket_description = FileDescription::create(*accepted_socket); accepted_socket_description->set_readable(true); accepted_socket_description->set_writable(true); // NOTE: The accepted socket inherits fd flags from the accepting socket. // I'm not sure if this matches other systems but it makes sense to me. accepted_socket_description->set_blocking(accepting_socket_description->is_blocking()); m_fds[accepted_socket_fd].set(move(accepted_socket_description), m_fds[accepting_socket_fd].flags()); // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side. accepted_socket->set_setup_state(Socket::SetupState::Completed); return accepted_socket_fd; } int Process::sys$connect(int sockfd, Userspace user_address, socklen_t user_address_size) { int fd = alloc_fd(); if (fd < 0) return fd; auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); return socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No); } int Process::sys$shutdown(int sockfd, int how) { REQUIRE_PROMISE(stdio); if (how & ~SHUT_RDWR) return -EINVAL; auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); return socket.shutdown(how); } ssize_t Process::sys$sendmsg(int sockfd, Userspace user_msg, int flags) { REQUIRE_PROMISE(stdio); struct msghdr msg; if (!copy_from_user(&msg, user_msg)) return -EFAULT; if (msg.msg_iovlen != 1) return -ENOTSUP; // FIXME: Support this :) Vector iovs; iovs.resize(msg.msg_iovlen); if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen)) return -EFAULT; Userspace user_addr((FlatPtr)msg.msg_name); socklen_t addr_length = msg.msg_namelen; auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); if (socket.is_shut_down_for_writing()) return -EPIPE; SmapDisabler disabler; auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len); if (!data_buffer.has_value()) return -EFAULT; auto result = socket.sendto(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, addr_length); if (result.is_error()) return result.error(); return result.value(); } ssize_t Process::sys$recvmsg(int sockfd, Userspace user_msg, int flags) { REQUIRE_PROMISE(stdio); struct msghdr msg; if (!copy_from_user(&msg, user_msg)) return -EFAULT; if (msg.msg_iovlen != 1) return -ENOTSUP; // FIXME: Support this :) Vector iovs; iovs.resize(msg.msg_iovlen); if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen)) return -EFAULT; Userspace user_addr((FlatPtr)msg.msg_name); Userspace user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0); SmapDisabler disabler; auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); if (socket.is_shut_down_for_reading()) return 0; bool original_blocking = description->is_blocking(); if (flags & MSG_DONTWAIT) description->set_blocking(false); auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len); if (!data_buffer.has_value()) return -EFAULT; timeval timestamp = { 0, 0 }; auto result = socket.recvfrom(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp); if (flags & MSG_DONTWAIT) description->set_blocking(original_blocking); if (result.is_error()) return result.error(); int msg_flags = 0; if (result.value() > iovs[0].iov_len) { ASSERT(socket.type() != SOCK_STREAM); msg_flags |= MSG_TRUNC; } if (socket.wants_timestamp()) { struct { cmsghdr cmsg; timeval timestamp; } cmsg_timestamp; socklen_t control_length = sizeof(cmsg_timestamp); if (msg.msg_controllen < control_length) { msg_flags |= MSG_CTRUNC; } else { cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp }; if (!copy_to_user(msg.msg_control, &cmsg_timestamp, control_length)) return -EFAULT; } if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length)) return -EFAULT; } if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags)) return -EFAULT; return result.value(); } template int Process::get_sock_or_peer_name(const Params& params) { socklen_t addrlen_value; if (!copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t))) return -EFAULT; if (addrlen_value <= 0) return -EINVAL; auto description = file_description(params.sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); u8 address_buffer[sizeof(sockaddr_un)]; addrlen_value = min(sizeof(sockaddr_un), static_cast(addrlen_value)); if constexpr (sockname) socket.get_local_address((sockaddr*)address_buffer, &addrlen_value); else socket.get_peer_address((sockaddr*)address_buffer, &addrlen_value); if (!copy_to_user(params.addr, address_buffer, addrlen_value)) return -EFAULT; if (!copy_to_user(params.addrlen, &addrlen_value)) return -EFAULT; return 0; } int Process::sys$getsockname(Userspace user_params) { Syscall::SC_getsockname_params params; if (!copy_from_user(¶ms, user_params)) return -EFAULT; return get_sock_or_peer_name(params); } int Process::sys$getpeername(Userspace user_params) { Syscall::SC_getpeername_params params; if (!copy_from_user(¶ms, user_params)) return -EFAULT; return get_sock_or_peer_name(params); } int Process::sys$getsockopt(Userspace user_params) { Syscall::SC_getsockopt_params params; if (!copy_from_user(¶ms, user_params)) return -EFAULT; int sockfd = params.sockfd; int level = params.level; int option = params.option; Userspace user_value((FlatPtr)params.value); Userspace user_value_size((FlatPtr)params.value_size); socklen_t value_size; if (!copy_from_user(&value_size, params.value_size, sizeof(socklen_t))) return -EFAULT; auto description = file_description(sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); if (has_promised(Pledge::accept) && socket.is_local() && level == SOL_SOCKET && option == SO_PEERCRED) { // We make an exception for SOL_SOCKET::SO_PEERCRED on local sockets if you've pledged "accept" } else { REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); } return socket.getsockopt(*description, level, option, user_value, user_value_size); } int Process::sys$setsockopt(Userspace user_params) { Syscall::SC_setsockopt_params params; if (!copy_from_user(¶ms, user_params)) return -EFAULT; Userspace user_value((FlatPtr)params.value); auto description = file_description(params.sockfd); if (!description) return -EBADF; if (!description->is_socket()) return -ENOTSOCK; auto& socket = *description->socket(); REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain()); return socket.setsockopt(params.level, params.option, user_value, params.value_size); } }