socket.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/FileSystem/FileDescription.h>
  7. #include <Kernel/Net/IPv4Socket.h>
  8. #include <Kernel/Net/LocalSocket.h>
  9. #include <Kernel/Process.h>
  10. #include <Kernel/UnixTypes.h>
  11. namespace Kernel {
  12. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  13. do { \
  14. if (domain == AF_INET) \
  15. REQUIRE_PROMISE(inet); \
  16. else if (domain == AF_LOCAL) \
  17. REQUIRE_PROMISE(unix); \
  18. } while (0)
  19. void Process::setup_socket_fd(int fd, NonnullRefPtr<FileDescription> description, int type)
  20. {
  21. description->set_readable(true);
  22. description->set_writable(true);
  23. unsigned flags = 0;
  24. if (type & SOCK_CLOEXEC)
  25. flags |= FD_CLOEXEC;
  26. if (type & SOCK_NONBLOCK)
  27. description->set_blocking(false);
  28. m_fds[fd].set(*description, flags);
  29. }
  30. KResultOr<FlatPtr> Process::sys$socket(int domain, int type, int protocol)
  31. {
  32. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  33. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  34. return EACCES;
  35. int fd = alloc_fd();
  36. if (fd < 0)
  37. return fd;
  38. auto result = Socket::create(domain, type, protocol);
  39. if (result.is_error())
  40. return result.error();
  41. auto description_result = FileDescription::create(*result.value());
  42. if (description_result.is_error())
  43. return description_result.error();
  44. setup_socket_fd(fd, description_result.value(), type);
  45. return fd;
  46. }
  47. KResultOr<FlatPtr> Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  48. {
  49. auto description = file_description(sockfd);
  50. if (!description)
  51. return EBADF;
  52. if (!description->is_socket())
  53. return ENOTSOCK;
  54. auto& socket = *description->socket();
  55. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  56. return socket.bind(address, address_length);
  57. }
  58. KResultOr<FlatPtr> Process::sys$listen(int sockfd, int backlog)
  59. {
  60. if (backlog < 0)
  61. return EINVAL;
  62. auto description = file_description(sockfd);
  63. if (!description)
  64. return EBADF;
  65. if (!description->is_socket())
  66. return ENOTSOCK;
  67. auto& socket = *description->socket();
  68. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  69. if (socket.is_connected())
  70. return EINVAL;
  71. return socket.listen(backlog);
  72. }
  73. KResultOr<FlatPtr> Process::sys$accept4(Userspace<const Syscall::SC_accept4_params*> user_params)
  74. {
  75. REQUIRE_PROMISE(accept);
  76. Syscall::SC_accept4_params params;
  77. if (!copy_from_user(&params, user_params))
  78. return EFAULT;
  79. int accepting_socket_fd = params.sockfd;
  80. Userspace<sockaddr*> user_address((FlatPtr)params.addr);
  81. Userspace<socklen_t*> user_address_size((FlatPtr)params.addrlen);
  82. int flags = params.flags;
  83. socklen_t address_size = 0;
  84. if (user_address && !copy_from_user(&address_size, static_ptr_cast<const socklen_t*>(user_address_size)))
  85. return EFAULT;
  86. int accepted_socket_fd = alloc_fd();
  87. if (accepted_socket_fd < 0)
  88. return accepted_socket_fd;
  89. auto accepting_socket_description = file_description(accepting_socket_fd);
  90. if (!accepting_socket_description)
  91. return EBADF;
  92. if (!accepting_socket_description->is_socket())
  93. return ENOTSOCK;
  94. auto& socket = *accepting_socket_description->socket();
  95. if (!socket.can_accept()) {
  96. if (accepting_socket_description->is_blocking()) {
  97. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  98. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  99. return EINTR;
  100. } else {
  101. return EAGAIN;
  102. }
  103. }
  104. auto accepted_socket = socket.accept();
  105. VERIFY(accepted_socket);
  106. if (user_address) {
  107. u8 address_buffer[sizeof(sockaddr_un)];
  108. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  109. accepted_socket->get_peer_address((sockaddr*)address_buffer, &address_size);
  110. if (!copy_to_user(user_address, address_buffer, address_size))
  111. return EFAULT;
  112. if (!copy_to_user(user_address_size, &address_size))
  113. return EFAULT;
  114. }
  115. auto accepted_socket_description_result = FileDescription::create(*accepted_socket);
  116. if (accepted_socket_description_result.is_error())
  117. return accepted_socket_description_result.error();
  118. accepted_socket_description_result.value()->set_readable(true);
  119. accepted_socket_description_result.value()->set_writable(true);
  120. if (flags & SOCK_NONBLOCK)
  121. accepted_socket_description_result.value()->set_blocking(false);
  122. int fd_flags = 0;
  123. if (flags & SOCK_CLOEXEC)
  124. fd_flags |= FD_CLOEXEC;
  125. m_fds[accepted_socket_fd].set(accepted_socket_description_result.release_value(), fd_flags);
  126. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  127. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  128. return accepted_socket_fd;
  129. }
  130. KResultOr<FlatPtr> Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  131. {
  132. int fd = alloc_fd();
  133. if (fd < 0)
  134. return fd;
  135. auto description = file_description(sockfd);
  136. if (!description)
  137. return EBADF;
  138. if (!description->is_socket())
  139. return ENOTSOCK;
  140. auto& socket = *description->socket();
  141. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  142. return socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No);
  143. }
  144. KResultOr<FlatPtr> Process::sys$shutdown(int sockfd, int how)
  145. {
  146. REQUIRE_PROMISE(stdio);
  147. if (how & ~SHUT_RDWR)
  148. return EINVAL;
  149. auto description = file_description(sockfd);
  150. if (!description)
  151. return EBADF;
  152. if (!description->is_socket())
  153. return ENOTSOCK;
  154. auto& socket = *description->socket();
  155. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  156. return socket.shutdown(how);
  157. }
  158. KResultOr<FlatPtr> Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  159. {
  160. REQUIRE_PROMISE(stdio);
  161. struct msghdr msg;
  162. if (!copy_from_user(&msg, user_msg))
  163. return EFAULT;
  164. if (msg.msg_iovlen != 1)
  165. return ENOTSUP; // FIXME: Support this :)
  166. Vector<iovec, 1> iovs;
  167. if (!iovs.try_resize(msg.msg_iovlen))
  168. return ENOMEM;
  169. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  170. return EFAULT;
  171. if (iovs[0].iov_len > NumericLimits<ssize_t>::max())
  172. return EINVAL;
  173. Userspace<const sockaddr*> user_addr((FlatPtr)msg.msg_name);
  174. socklen_t addr_length = msg.msg_namelen;
  175. auto description = file_description(sockfd);
  176. if (!description)
  177. return EBADF;
  178. if (!description->is_socket())
  179. return ENOTSOCK;
  180. auto& socket = *description->socket();
  181. if (socket.is_shut_down_for_writing())
  182. return EPIPE;
  183. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  184. if (!data_buffer.has_value())
  185. return EFAULT;
  186. auto result = socket.sendto(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, addr_length);
  187. if (result.is_error())
  188. return result.error();
  189. else
  190. return result.release_value();
  191. }
  192. KResultOr<FlatPtr> Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  193. {
  194. REQUIRE_PROMISE(stdio);
  195. struct msghdr msg;
  196. if (!copy_from_user(&msg, user_msg))
  197. return EFAULT;
  198. if (msg.msg_iovlen != 1)
  199. return ENOTSUP; // FIXME: Support this :)
  200. Vector<iovec, 1> iovs;
  201. if (!iovs.try_resize(msg.msg_iovlen))
  202. return ENOMEM;
  203. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  204. return EFAULT;
  205. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  206. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  207. auto description = file_description(sockfd);
  208. if (!description)
  209. return EBADF;
  210. if (!description->is_socket())
  211. return ENOTSOCK;
  212. auto& socket = *description->socket();
  213. if (socket.is_shut_down_for_reading())
  214. return 0;
  215. bool original_blocking = description->is_blocking();
  216. if (flags & MSG_DONTWAIT)
  217. description->set_blocking(false);
  218. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  219. if (!data_buffer.has_value())
  220. return EFAULT;
  221. Time timestamp {};
  222. auto result = socket.recvfrom(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp);
  223. if (flags & MSG_DONTWAIT)
  224. description->set_blocking(original_blocking);
  225. if (result.is_error())
  226. return result.error();
  227. int msg_flags = 0;
  228. if (result.value() > iovs[0].iov_len) {
  229. VERIFY(socket.type() != SOCK_STREAM);
  230. msg_flags |= MSG_TRUNC;
  231. }
  232. if (socket.wants_timestamp()) {
  233. struct {
  234. cmsghdr cmsg;
  235. timeval timestamp;
  236. } cmsg_timestamp;
  237. socklen_t control_length = sizeof(cmsg_timestamp);
  238. if (msg.msg_controllen < control_length) {
  239. msg_flags |= MSG_CTRUNC;
  240. } else {
  241. cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp.to_timeval() };
  242. if (!copy_to_user(msg.msg_control, &cmsg_timestamp, control_length))
  243. return EFAULT;
  244. }
  245. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length))
  246. return EFAULT;
  247. }
  248. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags))
  249. return EFAULT;
  250. return result.value();
  251. }
  252. template<bool sockname, typename Params>
  253. int Process::get_sock_or_peer_name(const Params& params)
  254. {
  255. socklen_t addrlen_value;
  256. if (!copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)))
  257. return EFAULT;
  258. if (addrlen_value <= 0)
  259. return EINVAL;
  260. auto description = file_description(params.sockfd);
  261. if (!description)
  262. return EBADF;
  263. if (!description->is_socket())
  264. return ENOTSOCK;
  265. auto& socket = *description->socket();
  266. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  267. u8 address_buffer[sizeof(sockaddr_un)];
  268. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  269. if constexpr (sockname)
  270. socket.get_local_address((sockaddr*)address_buffer, &addrlen_value);
  271. else
  272. socket.get_peer_address((sockaddr*)address_buffer, &addrlen_value);
  273. if (!copy_to_user(params.addr, address_buffer, addrlen_value))
  274. return EFAULT;
  275. if (!copy_to_user(params.addrlen, &addrlen_value))
  276. return EFAULT;
  277. return 0;
  278. }
  279. KResultOr<FlatPtr> Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  280. {
  281. Syscall::SC_getsockname_params params;
  282. if (!copy_from_user(&params, user_params))
  283. return EFAULT;
  284. return get_sock_or_peer_name<true>(params);
  285. }
  286. KResultOr<FlatPtr> Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  287. {
  288. Syscall::SC_getpeername_params params;
  289. if (!copy_from_user(&params, user_params))
  290. return EFAULT;
  291. return get_sock_or_peer_name<false>(params);
  292. }
  293. KResultOr<FlatPtr> Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  294. {
  295. Syscall::SC_getsockopt_params params;
  296. if (!copy_from_user(&params, user_params))
  297. return EFAULT;
  298. int sockfd = params.sockfd;
  299. int level = params.level;
  300. int option = params.option;
  301. Userspace<void*> user_value((FlatPtr)params.value);
  302. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  303. socklen_t value_size;
  304. if (!copy_from_user(&value_size, params.value_size, sizeof(socklen_t)))
  305. return EFAULT;
  306. auto description = file_description(sockfd);
  307. if (!description)
  308. return EBADF;
  309. if (!description->is_socket())
  310. return ENOTSOCK;
  311. auto& socket = *description->socket();
  312. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  313. return socket.getsockopt(*description, level, option, user_value, user_value_size);
  314. }
  315. KResultOr<FlatPtr> Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  316. {
  317. Syscall::SC_setsockopt_params params;
  318. if (!copy_from_user(&params, user_params))
  319. return EFAULT;
  320. Userspace<const void*> user_value((FlatPtr)params.value);
  321. auto description = file_description(params.sockfd);
  322. if (!description)
  323. return EBADF;
  324. if (!description->is_socket())
  325. return ENOTSOCK;
  326. auto& socket = *description->socket();
  327. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  328. return socket.setsockopt(params.level, params.option, user_value, params.value_size);
  329. }
  330. KResultOr<FlatPtr> Process::sys$socketpair(Userspace<const Syscall::SC_socketpair_params*> user_params)
  331. {
  332. Syscall::SC_socketpair_params params;
  333. if (!copy_from_user(&params, user_params))
  334. return EFAULT;
  335. if (params.domain != AF_LOCAL)
  336. return EINVAL;
  337. if (params.protocol != 0 && params.protocol != PF_LOCAL)
  338. return EINVAL;
  339. auto result = LocalSocket::create_connected_pair(params.type & SOCK_TYPE_MASK);
  340. if (result.is_error())
  341. return result.error();
  342. auto pair = result.value();
  343. int fds[2];
  344. fds[0] = alloc_fd();
  345. if (fds[0] < 0)
  346. return ENFILE;
  347. setup_socket_fd(fds[0], pair.description1, params.type);
  348. fds[1] = alloc_fd();
  349. if (fds[1] < 0) {
  350. // FIXME: This leaks fds[0]
  351. return ENFILE;
  352. }
  353. setup_socket_fd(fds[1], pair.description2, params.type);
  354. if (!copy_to_user(params.sv, fds, sizeof(fds))) {
  355. // FIXME: This leaks both file descriptors
  356. return EFAULT;
  357. }
  358. return KSuccess;
  359. }
  360. }