socket.cpp 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/FileSystem/OpenFileDescription.h>
  7. #include <Kernel/Net/LocalSocket.h>
  8. #include <Kernel/Process.h>
  9. #include <Kernel/UnixTypes.h>
  10. namespace Kernel {
  11. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  12. do { \
  13. if (domain == AF_INET) \
  14. TRY(require_promise(Pledge::inet)); \
  15. else if (domain == AF_LOCAL) \
  16. TRY(require_promise(Pledge::unix)); \
  17. } while (0)
  18. void Process::setup_socket_fd(int fd, NonnullRefPtr<OpenFileDescription> description, int type)
  19. {
  20. description->set_readable(true);
  21. description->set_writable(true);
  22. unsigned flags = 0;
  23. if (type & SOCK_CLOEXEC)
  24. flags |= FD_CLOEXEC;
  25. if (type & SOCK_NONBLOCK)
  26. description->set_blocking(false);
  27. m_fds[fd].set(*description, flags);
  28. }
  29. ErrorOr<FlatPtr> Process::sys$socket(int domain, int type, int protocol)
  30. {
  31. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  32. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  33. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  34. return EACCES;
  35. auto fd_allocation = TRY(m_fds.allocate());
  36. auto socket = TRY(Socket::create(domain, type, protocol));
  37. auto description = TRY(OpenFileDescription::try_create(socket));
  38. setup_socket_fd(fd_allocation.fd, move(description), type);
  39. return fd_allocation.fd;
  40. }
  41. ErrorOr<FlatPtr> Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  42. {
  43. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  44. auto description = TRY(fds().open_file_description(sockfd));
  45. if (!description->is_socket())
  46. return ENOTSOCK;
  47. auto& socket = *description->socket();
  48. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  49. TRY(socket.bind(address, address_length));
  50. return 0;
  51. }
  52. ErrorOr<FlatPtr> Process::sys$listen(int sockfd, int backlog)
  53. {
  54. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  55. if (backlog < 0)
  56. return EINVAL;
  57. auto description = TRY(fds().open_file_description(sockfd));
  58. if (!description->is_socket())
  59. return ENOTSOCK;
  60. auto& socket = *description->socket();
  61. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  62. if (socket.is_connected())
  63. return EINVAL;
  64. TRY(socket.listen(backlog));
  65. return 0;
  66. }
  67. ErrorOr<FlatPtr> Process::sys$accept4(Userspace<const Syscall::SC_accept4_params*> user_params)
  68. {
  69. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  70. TRY(require_promise(Pledge::accept));
  71. auto params = TRY(copy_typed_from_user(user_params));
  72. int accepting_socket_fd = params.sockfd;
  73. Userspace<sockaddr*> user_address((FlatPtr)params.addr);
  74. Userspace<socklen_t*> user_address_size((FlatPtr)params.addrlen);
  75. int flags = params.flags;
  76. socklen_t address_size = 0;
  77. if (user_address) {
  78. TRY(copy_from_user(&address_size, static_ptr_cast<const socklen_t*>(user_address_size)));
  79. }
  80. auto fd_allocation = TRY(m_fds.allocate());
  81. auto accepting_socket_description = TRY(fds().open_file_description(accepting_socket_fd));
  82. if (!accepting_socket_description->is_socket())
  83. return ENOTSOCK;
  84. auto& socket = *accepting_socket_description->socket();
  85. if (!socket.can_accept()) {
  86. if (accepting_socket_description->is_blocking()) {
  87. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  88. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  89. return EINTR;
  90. } else {
  91. return EAGAIN;
  92. }
  93. }
  94. auto accepted_socket = socket.accept();
  95. VERIFY(accepted_socket);
  96. if (user_address) {
  97. sockaddr_un address_buffer {};
  98. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  99. accepted_socket->get_peer_address((sockaddr*)&address_buffer, &address_size);
  100. TRY(copy_to_user(user_address, &address_buffer, address_size));
  101. TRY(copy_to_user(user_address_size, &address_size));
  102. }
  103. auto accepted_socket_description = TRY(OpenFileDescription::try_create(*accepted_socket));
  104. accepted_socket_description->set_readable(true);
  105. accepted_socket_description->set_writable(true);
  106. if (flags & SOCK_NONBLOCK)
  107. accepted_socket_description->set_blocking(false);
  108. int fd_flags = 0;
  109. if (flags & SOCK_CLOEXEC)
  110. fd_flags |= FD_CLOEXEC;
  111. m_fds[fd_allocation.fd].set(move(accepted_socket_description), fd_flags);
  112. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  113. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  114. return fd_allocation.fd;
  115. }
  116. ErrorOr<FlatPtr> Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  117. {
  118. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  119. auto description = TRY(fds().open_file_description(sockfd));
  120. if (!description->is_socket())
  121. return ENOTSOCK;
  122. auto& socket = *description->socket();
  123. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  124. TRY(socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No));
  125. return 0;
  126. }
  127. ErrorOr<FlatPtr> Process::sys$shutdown(int sockfd, int how)
  128. {
  129. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  130. TRY(require_promise(Pledge::stdio));
  131. if (how & ~SHUT_RDWR)
  132. return EINVAL;
  133. auto description = TRY(fds().open_file_description(sockfd));
  134. if (!description->is_socket())
  135. return ENOTSOCK;
  136. auto& socket = *description->socket();
  137. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  138. TRY(socket.shutdown(how));
  139. return 0;
  140. }
  141. ErrorOr<FlatPtr> Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  142. {
  143. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  144. TRY(require_promise(Pledge::stdio));
  145. auto msg = TRY(copy_typed_from_user(user_msg));
  146. if (msg.msg_iovlen != 1)
  147. return ENOTSUP; // FIXME: Support this :)
  148. Vector<iovec, 1> iovs;
  149. TRY(iovs.try_resize(msg.msg_iovlen));
  150. TRY(copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen));
  151. if (iovs[0].iov_len > NumericLimits<ssize_t>::max())
  152. return EINVAL;
  153. Userspace<const sockaddr*> user_addr((FlatPtr)msg.msg_name);
  154. socklen_t addr_length = msg.msg_namelen;
  155. auto description = TRY(fds().open_file_description(sockfd));
  156. if (!description->is_socket())
  157. return ENOTSOCK;
  158. auto& socket = *description->socket();
  159. if (socket.is_shut_down_for_writing())
  160. return EPIPE;
  161. auto data_buffer = TRY(UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len));
  162. auto bytes_sent = TRY(socket.sendto(*description, data_buffer, iovs[0].iov_len, flags, user_addr, addr_length));
  163. return bytes_sent;
  164. }
  165. ErrorOr<FlatPtr> Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  166. {
  167. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  168. TRY(require_promise(Pledge::stdio));
  169. struct msghdr msg;
  170. TRY(copy_from_user(&msg, user_msg));
  171. if (msg.msg_iovlen != 1)
  172. return ENOTSUP; // FIXME: Support this :)
  173. Vector<iovec, 1> iovs;
  174. TRY(iovs.try_resize(msg.msg_iovlen));
  175. TRY(copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen));
  176. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  177. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  178. auto description = TRY(fds().open_file_description(sockfd));
  179. if (!description->is_socket())
  180. return ENOTSOCK;
  181. auto& socket = *description->socket();
  182. if (socket.is_shut_down_for_reading())
  183. return 0;
  184. bool original_blocking = description->is_blocking();
  185. if (flags & MSG_DONTWAIT)
  186. description->set_blocking(false);
  187. auto data_buffer = TRY(UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len));
  188. Time timestamp {};
  189. auto result = socket.recvfrom(*description, data_buffer, iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp);
  190. if (flags & MSG_DONTWAIT)
  191. description->set_blocking(original_blocking);
  192. if (result.is_error())
  193. return result.release_error();
  194. int msg_flags = 0;
  195. if (result.value() > iovs[0].iov_len) {
  196. VERIFY(socket.type() != SOCK_STREAM);
  197. msg_flags |= MSG_TRUNC;
  198. }
  199. if (socket.wants_timestamp()) {
  200. struct {
  201. cmsghdr cmsg;
  202. timeval timestamp;
  203. } cmsg_timestamp;
  204. socklen_t control_length = sizeof(cmsg_timestamp);
  205. if (msg.msg_controllen < control_length) {
  206. msg_flags |= MSG_CTRUNC;
  207. } else {
  208. cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp.to_timeval() };
  209. TRY(copy_to_user(msg.msg_control, &cmsg_timestamp, control_length));
  210. }
  211. TRY(copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length));
  212. }
  213. TRY(copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags));
  214. return result.value();
  215. }
  216. template<bool sockname, typename Params>
  217. ErrorOr<void> Process::get_sock_or_peer_name(const Params& params)
  218. {
  219. socklen_t addrlen_value;
  220. TRY(copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)));
  221. if (addrlen_value <= 0)
  222. return EINVAL;
  223. auto description = TRY(fds().open_file_description(params.sockfd));
  224. if (!description->is_socket())
  225. return ENOTSOCK;
  226. auto& socket = *description->socket();
  227. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  228. sockaddr_un address_buffer {};
  229. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  230. if constexpr (sockname)
  231. socket.get_local_address((sockaddr*)&address_buffer, &addrlen_value);
  232. else
  233. socket.get_peer_address((sockaddr*)&address_buffer, &addrlen_value);
  234. TRY(copy_to_user(params.addr, &address_buffer, addrlen_value));
  235. return copy_to_user(params.addrlen, &addrlen_value);
  236. }
  237. ErrorOr<FlatPtr> Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  238. {
  239. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  240. auto params = TRY(copy_typed_from_user(user_params));
  241. TRY(get_sock_or_peer_name<true>(params));
  242. return 0;
  243. }
  244. ErrorOr<FlatPtr> Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  245. {
  246. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  247. auto params = TRY(copy_typed_from_user(user_params));
  248. TRY(get_sock_or_peer_name<false>(params));
  249. return 0;
  250. }
  251. ErrorOr<FlatPtr> Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  252. {
  253. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  254. auto params = TRY(copy_typed_from_user(user_params));
  255. int sockfd = params.sockfd;
  256. int level = params.level;
  257. int option = params.option;
  258. Userspace<void*> user_value((FlatPtr)params.value);
  259. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  260. socklen_t value_size;
  261. TRY(copy_from_user(&value_size, params.value_size, sizeof(socklen_t)));
  262. auto description = TRY(fds().open_file_description(sockfd));
  263. if (!description->is_socket())
  264. return ENOTSOCK;
  265. auto& socket = *description->socket();
  266. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  267. TRY(socket.getsockopt(*description, level, option, user_value, user_value_size));
  268. return 0;
  269. }
  270. ErrorOr<FlatPtr> Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  271. {
  272. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  273. auto params = TRY(copy_typed_from_user(user_params));
  274. Userspace<const void*> user_value((FlatPtr)params.value);
  275. auto description = TRY(fds().open_file_description(params.sockfd));
  276. if (!description->is_socket())
  277. return ENOTSOCK;
  278. auto& socket = *description->socket();
  279. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  280. TRY(socket.setsockopt(params.level, params.option, user_value, params.value_size));
  281. return 0;
  282. }
  283. ErrorOr<FlatPtr> Process::sys$socketpair(Userspace<const Syscall::SC_socketpair_params*> user_params)
  284. {
  285. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  286. auto params = TRY(copy_typed_from_user(user_params));
  287. if (params.domain != AF_LOCAL)
  288. return EINVAL;
  289. if (params.protocol != 0 && params.protocol != PF_LOCAL)
  290. return EINVAL;
  291. auto pair = TRY(LocalSocket::try_create_connected_pair(params.type & SOCK_TYPE_MASK));
  292. auto fd_allocation0 = TRY(m_fds.allocate());
  293. auto fd_allocation1 = TRY(m_fds.allocate());
  294. int fds[2];
  295. fds[0] = fd_allocation0.fd;
  296. fds[1] = fd_allocation1.fd;
  297. setup_socket_fd(fds[0], pair.description0, params.type);
  298. setup_socket_fd(fds[1], pair.description1, params.type);
  299. if (copy_to_user(params.sv, fds, sizeof(fds)).is_error()) {
  300. // Avoid leaking both file descriptors on error.
  301. m_fds[fds[0]] = {};
  302. m_fds[fds[1]] = {};
  303. return EFAULT;
  304. }
  305. return 0;
  306. }
  307. }