socket.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright notice, this
  9. * list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright notice,
  12. * this list of conditions and the following disclaimer in the documentation
  13. * and/or other materials provided with the distribution.
  14. *
  15. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  16. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  17. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  18. * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  19. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  20. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  21. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  22. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  23. * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  24. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  25. */
  26. #include <Kernel/FileSystem/FileDescription.h>
  27. #include <Kernel/Net/IPv4Socket.h>
  28. #include <Kernel/Net/LocalSocket.h>
  29. #include <Kernel/Process.h>
  30. namespace Kernel {
  31. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  32. do { \
  33. if (domain == AF_INET) \
  34. REQUIRE_PROMISE(inet); \
  35. else if (domain == AF_LOCAL) \
  36. REQUIRE_PROMISE(unix); \
  37. } while (0)
  38. int Process::sys$socket(int domain, int type, int protocol)
  39. {
  40. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  41. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  42. return -EACCES;
  43. int fd = alloc_fd();
  44. if (fd < 0)
  45. return fd;
  46. auto result = Socket::create(domain, type, protocol);
  47. if (result.is_error())
  48. return result.error();
  49. auto description = FileDescription::create(*result.value());
  50. description->set_readable(true);
  51. description->set_writable(true);
  52. unsigned flags = 0;
  53. if (type & SOCK_CLOEXEC)
  54. flags |= FD_CLOEXEC;
  55. if (type & SOCK_NONBLOCK)
  56. description->set_blocking(false);
  57. m_fds[fd].set(move(description), flags);
  58. return fd;
  59. }
  60. int Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  61. {
  62. if (!validate_read(address, address_length))
  63. return -EFAULT;
  64. auto description = file_description(sockfd);
  65. if (!description)
  66. return -EBADF;
  67. if (!description->is_socket())
  68. return -ENOTSOCK;
  69. auto& socket = *description->socket();
  70. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  71. return socket.bind(address, address_length);
  72. }
  73. int Process::sys$listen(int sockfd, int backlog)
  74. {
  75. if (backlog < 0)
  76. return -EINVAL;
  77. auto description = file_description(sockfd);
  78. if (!description)
  79. return -EBADF;
  80. if (!description->is_socket())
  81. return -ENOTSOCK;
  82. auto& socket = *description->socket();
  83. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  84. if (socket.is_connected())
  85. return -EINVAL;
  86. return socket.listen(backlog);
  87. }
  88. int Process::sys$accept(int accepting_socket_fd, Userspace<sockaddr*> user_address, Userspace<socklen_t*> user_address_size)
  89. {
  90. REQUIRE_PROMISE(accept);
  91. socklen_t address_size = 0;
  92. if (user_address) {
  93. if (!validate_write_typed(user_address_size))
  94. return -EFAULT;
  95. if (!validate_read_and_copy_typed(&address_size, user_address_size))
  96. return -EFAULT;
  97. if (!validate_write(user_address, address_size))
  98. return -EFAULT;
  99. }
  100. int accepted_socket_fd = alloc_fd();
  101. if (accepted_socket_fd < 0)
  102. return accepted_socket_fd;
  103. auto accepting_socket_description = file_description(accepting_socket_fd);
  104. if (!accepting_socket_description)
  105. return -EBADF;
  106. if (!accepting_socket_description->is_socket())
  107. return -ENOTSOCK;
  108. auto& socket = *accepting_socket_description->socket();
  109. if (!socket.can_accept()) {
  110. if (accepting_socket_description->is_blocking()) {
  111. if (Thread::current()->block<Thread::AcceptBlocker>(nullptr, *accepting_socket_description).was_interrupted())
  112. return -EINTR;
  113. } else {
  114. return -EAGAIN;
  115. }
  116. }
  117. auto accepted_socket = socket.accept();
  118. ASSERT(accepted_socket);
  119. if (user_address) {
  120. u8 address_buffer[sizeof(sockaddr_un)];
  121. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  122. accepted_socket->get_peer_address((sockaddr*)address_buffer, &address_size);
  123. copy_to_user(user_address, address_buffer, address_size);
  124. copy_to_user(user_address_size, &address_size);
  125. }
  126. auto accepted_socket_description = FileDescription::create(*accepted_socket);
  127. accepted_socket_description->set_readable(true);
  128. accepted_socket_description->set_writable(true);
  129. // NOTE: The accepted socket inherits fd flags from the accepting socket.
  130. // I'm not sure if this matches other systems but it makes sense to me.
  131. accepted_socket_description->set_blocking(accepting_socket_description->is_blocking());
  132. m_fds[accepted_socket_fd].set(move(accepted_socket_description), m_fds[accepting_socket_fd].flags());
  133. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  134. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  135. return accepted_socket_fd;
  136. }
  137. int Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  138. {
  139. if (!validate_read(user_address, user_address_size))
  140. return -EFAULT;
  141. int fd = alloc_fd();
  142. if (fd < 0)
  143. return fd;
  144. auto description = file_description(sockfd);
  145. if (!description)
  146. return -EBADF;
  147. if (!description->is_socket())
  148. return -ENOTSOCK;
  149. auto& socket = *description->socket();
  150. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  151. u8 address[sizeof(sockaddr_un)];
  152. size_t address_size = min(sizeof(address), static_cast<size_t>(user_address_size));
  153. copy_from_user(address, user_address, address_size);
  154. return socket.connect(*description, (const sockaddr*)address, address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No);
  155. }
  156. int Process::sys$shutdown(int sockfd, int how)
  157. {
  158. REQUIRE_PROMISE(stdio);
  159. if (how & ~SHUT_RDWR)
  160. return -EINVAL;
  161. auto description = file_description(sockfd);
  162. if (!description)
  163. return -EBADF;
  164. if (!description->is_socket())
  165. return -ENOTSOCK;
  166. auto& socket = *description->socket();
  167. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  168. return socket.shutdown(how);
  169. }
  170. ssize_t Process::sys$sendto(const Syscall::SC_sendto_params* user_params)
  171. {
  172. REQUIRE_PROMISE(stdio);
  173. Syscall::SC_sendto_params params;
  174. if (!validate_read_and_copy_typed(&params, user_params))
  175. return -EFAULT;
  176. int flags = params.flags;
  177. const sockaddr* addr = params.addr;
  178. socklen_t addr_length = params.addr_length;
  179. if (!validate(params.data))
  180. return -EFAULT;
  181. if (addr && !validate_read(addr, addr_length))
  182. return -EFAULT;
  183. auto description = file_description(params.sockfd);
  184. if (!description)
  185. return -EBADF;
  186. if (!description->is_socket())
  187. return -ENOTSOCK;
  188. auto& socket = *description->socket();
  189. if (socket.is_shut_down_for_writing())
  190. return -EPIPE;
  191. SmapDisabler disabler;
  192. auto result = socket.sendto(*description, params.data.data, params.data.size, flags, addr, addr_length);
  193. if (result.is_error())
  194. return result.error();
  195. return result.value();
  196. }
  197. ssize_t Process::sys$recvfrom(const Syscall::SC_recvfrom_params* user_params)
  198. {
  199. REQUIRE_PROMISE(stdio);
  200. Syscall::SC_recvfrom_params params;
  201. if (!validate_read_and_copy_typed(&params, user_params))
  202. return -EFAULT;
  203. int flags = params.flags;
  204. sockaddr* addr = params.addr;
  205. socklen_t* addr_length = params.addr_length;
  206. SmapDisabler disabler;
  207. if (!validate(params.buffer))
  208. return -EFAULT;
  209. if (addr_length) {
  210. if (!validate_write_typed(addr_length))
  211. return -EFAULT;
  212. if (!validate_write(addr, *addr_length))
  213. return -EFAULT;
  214. } else if (addr) {
  215. return -EINVAL;
  216. }
  217. auto description = file_description(params.sockfd);
  218. if (!description)
  219. return -EBADF;
  220. if (!description->is_socket())
  221. return -ENOTSOCK;
  222. auto& socket = *description->socket();
  223. if (socket.is_shut_down_for_reading())
  224. return 0;
  225. bool original_blocking = description->is_blocking();
  226. if (flags & MSG_DONTWAIT)
  227. description->set_blocking(false);
  228. auto result = socket.recvfrom(*description, params.buffer.data, params.buffer.size, flags, addr, addr_length);
  229. if (flags & MSG_DONTWAIT)
  230. description->set_blocking(original_blocking);
  231. if (result.is_error())
  232. return result.error();
  233. return result.value();
  234. }
  235. template<bool sockname, typename Params>
  236. int Process::get_sock_or_peer_name(const Params& params)
  237. {
  238. socklen_t addrlen_value;
  239. if (!validate_read_and_copy_typed(&addrlen_value, params.addrlen))
  240. return -EFAULT;
  241. if (addrlen_value <= 0)
  242. return -EINVAL;
  243. if (!validate_write(params.addr, addrlen_value))
  244. return -EFAULT;
  245. if (!validate_write_typed(params.addrlen))
  246. return -EFAULT;
  247. auto description = file_description(params.sockfd);
  248. if (!description)
  249. return -EBADF;
  250. if (!description->is_socket())
  251. return -ENOTSOCK;
  252. auto& socket = *description->socket();
  253. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  254. u8 address_buffer[sizeof(sockaddr_un)];
  255. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  256. if constexpr (sockname)
  257. socket.get_local_address((sockaddr*)address_buffer, &addrlen_value);
  258. else
  259. socket.get_peer_address((sockaddr*)address_buffer, &addrlen_value);
  260. copy_to_user(params.addr, address_buffer, addrlen_value);
  261. copy_to_user(params.addrlen, &addrlen_value);
  262. return 0;
  263. }
  264. int Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  265. {
  266. Syscall::SC_getsockname_params params;
  267. if (!validate_read_and_copy_typed(&params, user_params))
  268. return -EFAULT;
  269. return get_sock_or_peer_name<true>(params);
  270. }
  271. int Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  272. {
  273. Syscall::SC_getpeername_params params;
  274. if (!validate_read_and_copy_typed(&params, user_params))
  275. return -EFAULT;
  276. return get_sock_or_peer_name<false>(params);
  277. }
  278. int Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  279. {
  280. Syscall::SC_getsockopt_params params;
  281. if (!validate_read_and_copy_typed(&params, user_params))
  282. return -EFAULT;
  283. int sockfd = params.sockfd;
  284. int level = params.level;
  285. int option = params.option;
  286. Userspace<void*> user_value = params.value;
  287. Userspace<socklen_t*> user_value_size = params.value_size;
  288. if (!validate_write_typed(user_value_size))
  289. return -EFAULT;
  290. socklen_t value_size;
  291. if (!validate_read_and_copy_typed(&value_size, user_value_size))
  292. return -EFAULT;
  293. if (!validate_write(user_value, value_size))
  294. return -EFAULT;
  295. auto description = file_description(sockfd);
  296. if (!description)
  297. return -EBADF;
  298. if (!description->is_socket())
  299. return -ENOTSOCK;
  300. auto& socket = *description->socket();
  301. if (has_promised(Pledge::accept) && socket.is_local() && level == SOL_SOCKET && option == SO_PEERCRED) {
  302. // We make an exception for SOL_SOCKET::SO_PEERCRED on local sockets if you've pledged "accept"
  303. } else {
  304. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  305. }
  306. return socket.getsockopt(*description, level, option, user_value, user_value_size);
  307. }
  308. int Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  309. {
  310. Syscall::SC_setsockopt_params params;
  311. if (!validate_read_and_copy_typed(&params, user_params))
  312. return -EFAULT;
  313. if (!validate_read(params.value, params.value_size))
  314. return -EFAULT;
  315. auto description = file_description(params.sockfd);
  316. if (!description)
  317. return -EBADF;
  318. if (!description->is_socket())
  319. return -ENOTSOCK;
  320. auto& socket = *description->socket();
  321. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  322. return socket.setsockopt(params.level, params.option, params.value, params.value_size);
  323. }
  324. }