LocalSocket.cpp 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Singleton.h>
  7. #include <AK/StringBuilder.h>
  8. #include <Kernel/Debug.h>
  9. #include <Kernel/FileSystem/FileDescription.h>
  10. #include <Kernel/FileSystem/VirtualFileSystem.h>
  11. #include <Kernel/Locking/Mutex.h>
  12. #include <Kernel/Locking/MutexProtected.h>
  13. #include <Kernel/Net/LocalSocket.h>
  14. #include <Kernel/Process.h>
  15. #include <Kernel/StdLib.h>
  16. #include <Kernel/UnixTypes.h>
  17. #include <LibC/errno_numbers.h>
  18. #include <LibC/sys/ioctl_numbers.h>
  19. namespace Kernel {
  20. static Singleton<MutexProtected<LocalSocket::List>> s_list;
  21. static MutexProtected<LocalSocket::List>& all_sockets()
  22. {
  23. return *s_list;
  24. }
  25. void LocalSocket::for_each(Function<void(const LocalSocket&)> callback)
  26. {
  27. all_sockets().for_each_shared([&](const auto& socket) {
  28. callback(socket);
  29. });
  30. }
  31. KResultOr<NonnullRefPtr<LocalSocket>> LocalSocket::try_create(int type)
  32. {
  33. auto client_buffer = DoubleBuffer::try_create();
  34. if (!client_buffer)
  35. return ENOMEM;
  36. auto server_buffer = DoubleBuffer::try_create();
  37. if (!server_buffer)
  38. return ENOMEM;
  39. auto socket = adopt_ref_if_nonnull(new (nothrow) LocalSocket(type, client_buffer.release_nonnull(), server_buffer.release_nonnull()));
  40. if (socket)
  41. return socket.release_nonnull();
  42. return ENOMEM;
  43. }
  44. KResultOr<SocketPair> LocalSocket::try_create_connected_pair(int type)
  45. {
  46. auto socket = TRY(LocalSocket::try_create(type));
  47. auto description1 = TRY(FileDescription::try_create(*socket));
  48. if (auto result = socket->try_set_path("[socketpair]"sv); result.is_error())
  49. return result;
  50. socket->set_acceptor(Process::current());
  51. socket->set_connected(true);
  52. socket->set_connect_side_role(Role::Connected);
  53. socket->set_role(Role::Accepted);
  54. auto description2 = TRY(FileDescription::try_create(*socket));
  55. return SocketPair { move(description1), move(description2) };
  56. }
  57. LocalSocket::LocalSocket(int type, NonnullOwnPtr<DoubleBuffer> client_buffer, NonnullOwnPtr<DoubleBuffer> server_buffer)
  58. : Socket(AF_LOCAL, type, 0)
  59. , m_for_client(move(client_buffer))
  60. , m_for_server(move(server_buffer))
  61. {
  62. auto& current_process = Process::current();
  63. m_prebind_uid = current_process.euid();
  64. m_prebind_gid = current_process.egid();
  65. m_prebind_mode = 0666;
  66. m_for_client->set_unblock_callback([this]() {
  67. evaluate_block_conditions();
  68. });
  69. m_for_server->set_unblock_callback([this]() {
  70. evaluate_block_conditions();
  71. });
  72. all_sockets().with_exclusive([&](auto& list) {
  73. list.append(*this);
  74. });
  75. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) created with type={}", this, type);
  76. }
  77. LocalSocket::~LocalSocket()
  78. {
  79. all_sockets().with_exclusive([&](auto& list) {
  80. list.remove(*this);
  81. });
  82. }
  83. void LocalSocket::get_local_address(sockaddr* address, socklen_t* address_size)
  84. {
  85. if (!m_path || m_path->is_empty()) {
  86. size_t bytes_to_copy = min(static_cast<size_t>(*address_size), sizeof(sockaddr_un));
  87. memset(address, 0, bytes_to_copy);
  88. } else {
  89. size_t bytes_to_copy = min(m_path->length(), min(static_cast<size_t>(*address_size), sizeof(sockaddr_un)));
  90. memcpy(address, m_path->characters(), bytes_to_copy);
  91. }
  92. *address_size = sizeof(sockaddr_un);
  93. }
  94. void LocalSocket::get_peer_address(sockaddr* address, socklen_t* address_size)
  95. {
  96. get_local_address(address, address_size);
  97. }
  98. KResult LocalSocket::bind(Userspace<const sockaddr*> user_address, socklen_t address_size)
  99. {
  100. VERIFY(setup_state() == SetupState::Unstarted);
  101. if (address_size != sizeof(sockaddr_un))
  102. return set_so_error(EINVAL);
  103. sockaddr_un address = {};
  104. if (!copy_from_user(&address, user_address, sizeof(sockaddr_un)))
  105. return set_so_error(EFAULT);
  106. if (address.sun_family != AF_LOCAL)
  107. return set_so_error(EINVAL);
  108. auto path = KString::try_create(StringView { address.sun_path, strnlen(address.sun_path, sizeof(address.sun_path)) });
  109. if (!path)
  110. return set_so_error(ENOMEM);
  111. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) bind({})", this, path);
  112. mode_t mode = S_IFSOCK | (m_prebind_mode & 0777);
  113. UidAndGid owner { m_prebind_uid, m_prebind_gid };
  114. auto result = VirtualFileSystem::the().open(path->view(), O_CREAT | O_EXCL | O_NOFOLLOW_NOERROR, mode, Process::current().current_directory(), owner);
  115. if (result.is_error()) {
  116. if (result.error() == EEXIST)
  117. return set_so_error(EADDRINUSE);
  118. return result.error();
  119. }
  120. auto file = move(result.value());
  121. VERIFY(file->inode());
  122. if (!file->inode()->bind_socket(*this))
  123. return set_so_error(EADDRINUSE);
  124. m_file = move(file);
  125. m_path = move(path);
  126. m_bound = true;
  127. return KSuccess;
  128. }
  129. KResult LocalSocket::connect(FileDescription& description, Userspace<const sockaddr*> address, socklen_t address_size, ShouldBlock)
  130. {
  131. VERIFY(!m_bound);
  132. if (address_size != sizeof(sockaddr_un))
  133. return set_so_error(EINVAL);
  134. u16 sa_family_copy;
  135. auto* user_address = reinterpret_cast<const sockaddr*>(address.unsafe_userspace_ptr());
  136. if (!copy_from_user(&sa_family_copy, &user_address->sa_family, sizeof(u16)))
  137. return set_so_error(EFAULT);
  138. if (sa_family_copy != AF_LOCAL)
  139. return set_so_error(EINVAL);
  140. if (is_connected())
  141. return set_so_error(EISCONN);
  142. OwnPtr<KString> maybe_path;
  143. {
  144. auto const& local_address = *reinterpret_cast<sockaddr_un const*>(user_address);
  145. char safe_address[sizeof(local_address.sun_path) + 1] = { 0 };
  146. if (!copy_from_user(&safe_address[0], &local_address.sun_path[0], sizeof(safe_address) - 1))
  147. return set_so_error(EFAULT);
  148. safe_address[sizeof(safe_address) - 1] = '\0';
  149. maybe_path = KString::try_create(safe_address);
  150. if (!maybe_path)
  151. return set_so_error(ENOMEM);
  152. }
  153. auto path = maybe_path.release_nonnull();
  154. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) connect({})", this, *path);
  155. auto description_or_error = VirtualFileSystem::the().open(path->view(), O_RDWR, 0, Process::current().current_directory());
  156. if (description_or_error.is_error())
  157. return set_so_error(ECONNREFUSED);
  158. m_file = move(description_or_error.value());
  159. VERIFY(m_file->inode());
  160. if (!m_file->inode()->socket())
  161. return set_so_error(ECONNREFUSED);
  162. m_path = move(path);
  163. VERIFY(m_connect_side_fd == &description);
  164. set_connect_side_role(Role::Connecting);
  165. auto peer = m_file->inode()->socket();
  166. auto result = peer->queue_connection_from(*this);
  167. if (result.is_error()) {
  168. set_connect_side_role(Role::None);
  169. return result;
  170. }
  171. if (is_connected()) {
  172. set_connect_side_role(Role::Connected);
  173. return KSuccess;
  174. }
  175. auto unblock_flags = Thread::FileDescriptionBlocker::BlockFlags::None;
  176. if (Thread::current()->block<Thread::ConnectBlocker>({}, description, unblock_flags).was_interrupted()) {
  177. set_connect_side_role(Role::None);
  178. return set_so_error(EINTR);
  179. }
  180. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) connect({}) status is {}", this, *m_path, to_string(setup_state()));
  181. if (!has_flag(unblock_flags, Thread::FileDescriptionBlocker::BlockFlags::Connect)) {
  182. set_connect_side_role(Role::None);
  183. return set_so_error(ECONNREFUSED);
  184. }
  185. set_connect_side_role(Role::Connected);
  186. return KSuccess;
  187. }
  188. KResult LocalSocket::listen(size_t backlog)
  189. {
  190. MutexLocker locker(mutex());
  191. if (type() != SOCK_STREAM)
  192. return set_so_error(EOPNOTSUPP);
  193. set_backlog(backlog);
  194. auto previous_role = m_role;
  195. set_role(Role::Listener);
  196. set_connect_side_role(Role::Listener, previous_role != m_role);
  197. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) listening with backlog={}", this, backlog);
  198. return KSuccess;
  199. }
  200. KResult LocalSocket::attach(FileDescription& description)
  201. {
  202. VERIFY(!m_accept_side_fd_open);
  203. if (m_connect_side_role == Role::None) {
  204. VERIFY(m_connect_side_fd == nullptr);
  205. m_connect_side_fd = &description;
  206. } else {
  207. VERIFY(m_connect_side_fd != &description);
  208. m_accept_side_fd_open = true;
  209. }
  210. evaluate_block_conditions();
  211. return KSuccess;
  212. }
  213. void LocalSocket::detach(FileDescription& description)
  214. {
  215. if (m_connect_side_fd == &description) {
  216. m_connect_side_fd = nullptr;
  217. } else {
  218. VERIFY(m_accept_side_fd_open);
  219. m_accept_side_fd_open = false;
  220. }
  221. evaluate_block_conditions();
  222. }
  223. bool LocalSocket::can_read(const FileDescription& description, size_t) const
  224. {
  225. auto role = this->role(description);
  226. if (role == Role::Listener)
  227. return can_accept();
  228. if (role == Role::Accepted)
  229. return !has_attached_peer(description) || !m_for_server->is_empty();
  230. if (role == Role::Connected)
  231. return !has_attached_peer(description) || !m_for_client->is_empty();
  232. return false;
  233. }
  234. bool LocalSocket::has_attached_peer(const FileDescription& description) const
  235. {
  236. auto role = this->role(description);
  237. if (role == Role::Accepted)
  238. return m_connect_side_fd != nullptr;
  239. if (role == Role::Connected)
  240. return m_accept_side_fd_open;
  241. return false;
  242. }
  243. bool LocalSocket::can_write(const FileDescription& description, size_t) const
  244. {
  245. auto role = this->role(description);
  246. if (role == Role::Accepted)
  247. return !has_attached_peer(description) || m_for_client->space_for_writing();
  248. if (role == Role::Connected)
  249. return !has_attached_peer(description) || m_for_server->space_for_writing();
  250. return false;
  251. }
  252. KResultOr<size_t> LocalSocket::sendto(FileDescription& description, const UserOrKernelBuffer& data, size_t data_size, int, Userspace<const sockaddr*>, socklen_t)
  253. {
  254. if (!has_attached_peer(description))
  255. return set_so_error(EPIPE);
  256. auto* socket_buffer = send_buffer_for(description);
  257. if (!socket_buffer)
  258. return set_so_error(EINVAL);
  259. auto nwritten_or_error = socket_buffer->write(data, data_size);
  260. if (!nwritten_or_error.is_error() && nwritten_or_error.value() > 0)
  261. Thread::current()->did_unix_socket_write(nwritten_or_error.value());
  262. return nwritten_or_error;
  263. }
  264. DoubleBuffer* LocalSocket::receive_buffer_for(FileDescription& description)
  265. {
  266. auto role = this->role(description);
  267. if (role == Role::Accepted)
  268. return m_for_server.ptr();
  269. if (role == Role::Connected)
  270. return m_for_client.ptr();
  271. return nullptr;
  272. }
  273. DoubleBuffer* LocalSocket::send_buffer_for(FileDescription& description)
  274. {
  275. auto role = this->role(description);
  276. if (role == Role::Connected)
  277. return m_for_server.ptr();
  278. if (role == Role::Accepted)
  279. return m_for_client.ptr();
  280. return nullptr;
  281. }
  282. KResultOr<size_t> LocalSocket::recvfrom(FileDescription& description, UserOrKernelBuffer& buffer, size_t buffer_size, int, Userspace<sockaddr*>, Userspace<socklen_t*>, Time&)
  283. {
  284. auto* socket_buffer = receive_buffer_for(description);
  285. if (!socket_buffer)
  286. return set_so_error(EINVAL);
  287. if (!description.is_blocking()) {
  288. if (socket_buffer->is_empty()) {
  289. if (!has_attached_peer(description))
  290. return 0;
  291. return set_so_error(EAGAIN);
  292. }
  293. } else if (!can_read(description, 0)) {
  294. auto unblock_flags = Thread::FileDescriptionBlocker::BlockFlags::None;
  295. if (Thread::current()->block<Thread::ReadBlocker>({}, description, unblock_flags).was_interrupted())
  296. return set_so_error(EINTR);
  297. }
  298. if (!has_attached_peer(description) && socket_buffer->is_empty())
  299. return 0;
  300. VERIFY(!socket_buffer->is_empty());
  301. auto nread_or_error = socket_buffer->read(buffer, buffer_size);
  302. if (!nread_or_error.is_error() && nread_or_error.value() > 0)
  303. Thread::current()->did_unix_socket_read(nread_or_error.value());
  304. return nread_or_error;
  305. }
  306. StringView LocalSocket::socket_path() const
  307. {
  308. if (!m_path)
  309. return {};
  310. return m_path->view();
  311. }
  312. String LocalSocket::absolute_path(const FileDescription& description) const
  313. {
  314. StringBuilder builder;
  315. builder.append("socket:");
  316. builder.append(socket_path());
  317. switch (role(description)) {
  318. case Role::Listener:
  319. builder.append(" (listening)");
  320. break;
  321. case Role::Accepted:
  322. builder.appendff(" (accepted from pid {})", origin_pid());
  323. break;
  324. case Role::Connected:
  325. builder.appendff(" (connected to pid {})", acceptor_pid());
  326. break;
  327. case Role::Connecting:
  328. builder.append(" (connecting)");
  329. break;
  330. default:
  331. break;
  332. }
  333. return builder.to_string();
  334. }
  335. KResult LocalSocket::getsockopt(FileDescription& description, int level, int option, Userspace<void*> value, Userspace<socklen_t*> value_size)
  336. {
  337. if (level != SOL_SOCKET)
  338. return Socket::getsockopt(description, level, option, value, value_size);
  339. socklen_t size;
  340. if (!copy_from_user(&size, value_size.unsafe_userspace_ptr()))
  341. return EFAULT;
  342. switch (option) {
  343. case SO_SNDBUF:
  344. return ENOTSUP;
  345. case SO_RCVBUF:
  346. return ENOTSUP;
  347. case SO_PEERCRED: {
  348. if (size < sizeof(ucred))
  349. return EINVAL;
  350. switch (role(description)) {
  351. case Role::Accepted:
  352. if (!copy_to_user(static_ptr_cast<ucred*>(value), &m_origin))
  353. return EFAULT;
  354. size = sizeof(ucred);
  355. if (!copy_to_user(value_size, &size))
  356. return EFAULT;
  357. return KSuccess;
  358. case Role::Connected:
  359. if (!copy_to_user(static_ptr_cast<ucred*>(value), &m_acceptor))
  360. return EFAULT;
  361. size = sizeof(ucred);
  362. if (!copy_to_user(value_size, &size))
  363. return EFAULT;
  364. return KSuccess;
  365. case Role::Connecting:
  366. return ENOTCONN;
  367. default:
  368. return EINVAL;
  369. }
  370. break;
  371. }
  372. default:
  373. return Socket::getsockopt(description, level, option, value, value_size);
  374. }
  375. }
  376. KResult LocalSocket::ioctl(FileDescription& description, unsigned request, Userspace<void*> arg)
  377. {
  378. switch (request) {
  379. case FIONREAD: {
  380. int readable = receive_buffer_for(description)->immediately_readable();
  381. if (!copy_to_user(Userspace<int*>(arg), &readable))
  382. return EFAULT;
  383. return KSuccess;
  384. }
  385. }
  386. return ENOTTY;
  387. }
  388. KResult LocalSocket::chmod(FileDescription&, mode_t mode)
  389. {
  390. if (m_file)
  391. return m_file->chmod(mode);
  392. m_prebind_mode = mode & 0777;
  393. return KSuccess;
  394. }
  395. KResult LocalSocket::chown(FileDescription&, UserID uid, GroupID gid)
  396. {
  397. if (m_file)
  398. return m_file->chown(uid, gid);
  399. auto& current_process = Process::current();
  400. if (!current_process.is_superuser() && (current_process.euid() != uid || !current_process.in_group(gid)))
  401. return set_so_error(EPERM);
  402. m_prebind_uid = uid;
  403. m_prebind_gid = gid;
  404. return KSuccess;
  405. }
  406. NonnullRefPtrVector<FileDescription>& LocalSocket::recvfd_queue_for(const FileDescription& description)
  407. {
  408. auto role = this->role(description);
  409. if (role == Role::Connected)
  410. return m_fds_for_client;
  411. if (role == Role::Accepted)
  412. return m_fds_for_server;
  413. VERIFY_NOT_REACHED();
  414. }
  415. NonnullRefPtrVector<FileDescription>& LocalSocket::sendfd_queue_for(const FileDescription& description)
  416. {
  417. auto role = this->role(description);
  418. if (role == Role::Connected)
  419. return m_fds_for_server;
  420. if (role == Role::Accepted)
  421. return m_fds_for_client;
  422. VERIFY_NOT_REACHED();
  423. }
  424. KResult LocalSocket::sendfd(const FileDescription& socket_description, FileDescription& passing_description)
  425. {
  426. MutexLocker locker(mutex());
  427. auto role = this->role(socket_description);
  428. if (role != Role::Connected && role != Role::Accepted)
  429. return set_so_error(EINVAL);
  430. auto& queue = sendfd_queue_for(socket_description);
  431. // FIXME: Figure out how we should limit this properly.
  432. if (queue.size() > 128)
  433. return set_so_error(EBUSY);
  434. if (!queue.try_append(move(passing_description)))
  435. return set_so_error(ENOMEM);
  436. return KSuccess;
  437. }
  438. KResultOr<NonnullRefPtr<FileDescription>> LocalSocket::recvfd(const FileDescription& socket_description)
  439. {
  440. MutexLocker locker(mutex());
  441. auto role = this->role(socket_description);
  442. if (role != Role::Connected && role != Role::Accepted)
  443. return set_so_error(EINVAL);
  444. auto& queue = recvfd_queue_for(socket_description);
  445. if (queue.is_empty()) {
  446. // FIXME: Figure out the perfect error code for this.
  447. return set_so_error(EAGAIN);
  448. }
  449. return queue.take_first();
  450. }
  451. KResult LocalSocket::try_set_path(StringView path)
  452. {
  453. auto kstring = KString::try_create(path);
  454. if (!kstring)
  455. return ENOMEM;
  456. m_path = move(kstring);
  457. return KSuccess;
  458. }
  459. }