socket.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. * All rights reserved.
  4. *
  5. * Redistribution and use in source and binary forms, with or without
  6. * modification, are permitted provided that the following conditions are met:
  7. *
  8. * 1. Redistributions of source code must retain the above copyright notice, this
  9. * list of conditions and the following disclaimer.
  10. *
  11. * 2. Redistributions in binary form must reproduce the above copyright notice,
  12. * this list of conditions and the following disclaimer in the documentation
  13. * and/or other materials provided with the distribution.
  14. *
  15. * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
  16. * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  17. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  18. * DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
  19. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  20. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  21. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
  22. * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
  23. * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
  24. * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  25. */
  26. #include <Kernel/FileSystem/FileDescription.h>
  27. #include <Kernel/Net/IPv4Socket.h>
  28. #include <Kernel/Net/LocalSocket.h>
  29. #include <Kernel/Process.h>
  30. #include <Kernel/UnixTypes.h>
  31. namespace Kernel {
  32. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  33. do { \
  34. if (domain == AF_INET) \
  35. REQUIRE_PROMISE(inet); \
  36. else if (domain == AF_LOCAL) \
  37. REQUIRE_PROMISE(unix); \
  38. } while (0)
  39. int Process::sys$socket(int domain, int type, int protocol)
  40. {
  41. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  42. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  43. return -EACCES;
  44. int fd = alloc_fd();
  45. if (fd < 0)
  46. return fd;
  47. auto result = Socket::create(domain, type, protocol);
  48. if (result.is_error())
  49. return result.error();
  50. auto description_result = FileDescription::create(*result.value());
  51. if (description_result.is_error())
  52. return description_result.error();
  53. description_result.value()->set_readable(true);
  54. description_result.value()->set_writable(true);
  55. unsigned flags = 0;
  56. if (type & SOCK_CLOEXEC)
  57. flags |= FD_CLOEXEC;
  58. if (type & SOCK_NONBLOCK)
  59. description_result.value()->set_blocking(false);
  60. m_fds[fd].set(description_result.release_value(), flags);
  61. return fd;
  62. }
  63. int Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  64. {
  65. auto description = file_description(sockfd);
  66. if (!description)
  67. return -EBADF;
  68. if (!description->is_socket())
  69. return -ENOTSOCK;
  70. auto& socket = *description->socket();
  71. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  72. return socket.bind(address, address_length);
  73. }
  74. int Process::sys$listen(int sockfd, int backlog)
  75. {
  76. if (backlog < 0)
  77. return -EINVAL;
  78. auto description = file_description(sockfd);
  79. if (!description)
  80. return -EBADF;
  81. if (!description->is_socket())
  82. return -ENOTSOCK;
  83. auto& socket = *description->socket();
  84. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  85. if (socket.is_connected())
  86. return -EINVAL;
  87. return socket.listen(backlog);
  88. }
  89. int Process::sys$accept(int accepting_socket_fd, Userspace<sockaddr*> user_address, Userspace<socklen_t*> user_address_size)
  90. {
  91. REQUIRE_PROMISE(accept);
  92. socklen_t address_size = 0;
  93. if (user_address && !copy_from_user(&address_size, static_ptr_cast<const socklen_t*>(user_address_size)))
  94. return -EFAULT;
  95. int accepted_socket_fd = alloc_fd();
  96. if (accepted_socket_fd < 0)
  97. return accepted_socket_fd;
  98. auto accepting_socket_description = file_description(accepting_socket_fd);
  99. if (!accepting_socket_description)
  100. return -EBADF;
  101. if (!accepting_socket_description->is_socket())
  102. return -ENOTSOCK;
  103. auto& socket = *accepting_socket_description->socket();
  104. if (!socket.can_accept()) {
  105. if (accepting_socket_description->is_blocking()) {
  106. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  107. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  108. return -EINTR;
  109. } else {
  110. return -EAGAIN;
  111. }
  112. }
  113. auto accepted_socket = socket.accept();
  114. ASSERT(accepted_socket);
  115. if (user_address) {
  116. u8 address_buffer[sizeof(sockaddr_un)];
  117. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  118. accepted_socket->get_peer_address((sockaddr*)address_buffer, &address_size);
  119. if (!copy_to_user(user_address, address_buffer, address_size))
  120. return -EFAULT;
  121. if (!copy_to_user(user_address_size, &address_size))
  122. return -EFAULT;
  123. }
  124. auto accepted_socket_description_result = FileDescription::create(*accepted_socket);
  125. if (accepted_socket_description_result.is_error())
  126. return accepted_socket_description_result.error();
  127. accepted_socket_description_result.value()->set_readable(true);
  128. accepted_socket_description_result.value()->set_writable(true);
  129. // NOTE: The accepted socket inherits fd flags from the accepting socket.
  130. // I'm not sure if this matches other systems but it makes sense to me.
  131. accepted_socket_description_result.value()->set_blocking(accepting_socket_description->is_blocking());
  132. m_fds[accepted_socket_fd].set(accepted_socket_description_result.release_value(), m_fds[accepting_socket_fd].flags());
  133. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  134. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  135. return accepted_socket_fd;
  136. }
  137. int Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  138. {
  139. int fd = alloc_fd();
  140. if (fd < 0)
  141. return fd;
  142. auto description = file_description(sockfd);
  143. if (!description)
  144. return -EBADF;
  145. if (!description->is_socket())
  146. return -ENOTSOCK;
  147. auto& socket = *description->socket();
  148. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  149. return socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No);
  150. }
  151. int Process::sys$shutdown(int sockfd, int how)
  152. {
  153. REQUIRE_PROMISE(stdio);
  154. if (how & ~SHUT_RDWR)
  155. return -EINVAL;
  156. auto description = file_description(sockfd);
  157. if (!description)
  158. return -EBADF;
  159. if (!description->is_socket())
  160. return -ENOTSOCK;
  161. auto& socket = *description->socket();
  162. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  163. return socket.shutdown(how);
  164. }
  165. ssize_t Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  166. {
  167. REQUIRE_PROMISE(stdio);
  168. struct msghdr msg;
  169. if (!copy_from_user(&msg, user_msg))
  170. return -EFAULT;
  171. if (msg.msg_iovlen != 1)
  172. return -ENOTSUP; // FIXME: Support this :)
  173. Vector<iovec, 1> iovs;
  174. iovs.resize(msg.msg_iovlen);
  175. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  176. return -EFAULT;
  177. Userspace<const sockaddr*> user_addr((FlatPtr)msg.msg_name);
  178. socklen_t addr_length = msg.msg_namelen;
  179. auto description = file_description(sockfd);
  180. if (!description)
  181. return -EBADF;
  182. if (!description->is_socket())
  183. return -ENOTSOCK;
  184. auto& socket = *description->socket();
  185. if (socket.is_shut_down_for_writing())
  186. return -EPIPE;
  187. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  188. if (!data_buffer.has_value())
  189. return -EFAULT;
  190. auto result = socket.sendto(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, addr_length);
  191. if (result.is_error())
  192. return result.error();
  193. return result.value();
  194. }
  195. ssize_t Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  196. {
  197. REQUIRE_PROMISE(stdio);
  198. struct msghdr msg;
  199. if (!copy_from_user(&msg, user_msg))
  200. return -EFAULT;
  201. if (msg.msg_iovlen != 1)
  202. return -ENOTSUP; // FIXME: Support this :)
  203. Vector<iovec, 1> iovs;
  204. iovs.resize(msg.msg_iovlen);
  205. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  206. return -EFAULT;
  207. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  208. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  209. auto description = file_description(sockfd);
  210. if (!description)
  211. return -EBADF;
  212. if (!description->is_socket())
  213. return -ENOTSOCK;
  214. auto& socket = *description->socket();
  215. if (socket.is_shut_down_for_reading())
  216. return 0;
  217. bool original_blocking = description->is_blocking();
  218. if (flags & MSG_DONTWAIT)
  219. description->set_blocking(false);
  220. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  221. if (!data_buffer.has_value())
  222. return -EFAULT;
  223. timeval timestamp = { 0, 0 };
  224. auto result = socket.recvfrom(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp);
  225. if (flags & MSG_DONTWAIT)
  226. description->set_blocking(original_blocking);
  227. if (result.is_error())
  228. return result.error();
  229. int msg_flags = 0;
  230. if (result.value() > iovs[0].iov_len) {
  231. ASSERT(socket.type() != SOCK_STREAM);
  232. msg_flags |= MSG_TRUNC;
  233. }
  234. if (socket.wants_timestamp()) {
  235. struct {
  236. cmsghdr cmsg;
  237. timeval timestamp;
  238. } cmsg_timestamp;
  239. socklen_t control_length = sizeof(cmsg_timestamp);
  240. if (msg.msg_controllen < control_length) {
  241. msg_flags |= MSG_CTRUNC;
  242. } else {
  243. cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp };
  244. if (!copy_to_user(msg.msg_control, &cmsg_timestamp, control_length))
  245. return -EFAULT;
  246. }
  247. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length))
  248. return -EFAULT;
  249. }
  250. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags))
  251. return -EFAULT;
  252. return result.value();
  253. }
  254. template<bool sockname, typename Params>
  255. int Process::get_sock_or_peer_name(const Params& params)
  256. {
  257. socklen_t addrlen_value;
  258. if (!copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)))
  259. return -EFAULT;
  260. if (addrlen_value <= 0)
  261. return -EINVAL;
  262. auto description = file_description(params.sockfd);
  263. if (!description)
  264. return -EBADF;
  265. if (!description->is_socket())
  266. return -ENOTSOCK;
  267. auto& socket = *description->socket();
  268. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  269. u8 address_buffer[sizeof(sockaddr_un)];
  270. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  271. if constexpr (sockname)
  272. socket.get_local_address((sockaddr*)address_buffer, &addrlen_value);
  273. else
  274. socket.get_peer_address((sockaddr*)address_buffer, &addrlen_value);
  275. if (!copy_to_user(params.addr, address_buffer, addrlen_value))
  276. return -EFAULT;
  277. if (!copy_to_user(params.addrlen, &addrlen_value))
  278. return -EFAULT;
  279. return 0;
  280. }
  281. int Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  282. {
  283. Syscall::SC_getsockname_params params;
  284. if (!copy_from_user(&params, user_params))
  285. return -EFAULT;
  286. return get_sock_or_peer_name<true>(params);
  287. }
  288. int Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  289. {
  290. Syscall::SC_getpeername_params params;
  291. if (!copy_from_user(&params, user_params))
  292. return -EFAULT;
  293. return get_sock_or_peer_name<false>(params);
  294. }
  295. int Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  296. {
  297. Syscall::SC_getsockopt_params params;
  298. if (!copy_from_user(&params, user_params))
  299. return -EFAULT;
  300. int sockfd = params.sockfd;
  301. int level = params.level;
  302. int option = params.option;
  303. Userspace<void*> user_value((FlatPtr)params.value);
  304. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  305. socklen_t value_size;
  306. if (!copy_from_user(&value_size, params.value_size, sizeof(socklen_t)))
  307. return -EFAULT;
  308. auto description = file_description(sockfd);
  309. if (!description)
  310. return -EBADF;
  311. if (!description->is_socket())
  312. return -ENOTSOCK;
  313. auto& socket = *description->socket();
  314. if (has_promised(Pledge::accept) && socket.is_local() && level == SOL_SOCKET && option == SO_PEERCRED) {
  315. // We make an exception for SOL_SOCKET::SO_PEERCRED on local sockets if you've pledged "accept"
  316. } else {
  317. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  318. }
  319. return socket.getsockopt(*description, level, option, user_value, user_value_size);
  320. }
  321. int Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  322. {
  323. Syscall::SC_setsockopt_params params;
  324. if (!copy_from_user(&params, user_params))
  325. return -EFAULT;
  326. Userspace<const void*> user_value((FlatPtr)params.value);
  327. auto description = file_description(params.sockfd);
  328. if (!description)
  329. return -EBADF;
  330. if (!description->is_socket())
  331. return -ENOTSOCK;
  332. auto& socket = *description->socket();
  333. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  334. return socket.setsockopt(params.level, params.option, user_value, params.value_size);
  335. }
  336. }