socket.cpp 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/FileSystem/FileDescription.h>
  7. #include <Kernel/Net/LocalSocket.h>
  8. #include <Kernel/Process.h>
  9. #include <Kernel/UnixTypes.h>
  10. namespace Kernel {
  11. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  12. do { \
  13. if (domain == AF_INET) \
  14. REQUIRE_PROMISE(inet); \
  15. else if (domain == AF_LOCAL) \
  16. REQUIRE_PROMISE(unix); \
  17. } while (0)
  18. void Process::setup_socket_fd(int fd, NonnullRefPtr<FileDescription> description, int type)
  19. {
  20. description->set_readable(true);
  21. description->set_writable(true);
  22. unsigned flags = 0;
  23. if (type & SOCK_CLOEXEC)
  24. flags |= FD_CLOEXEC;
  25. if (type & SOCK_NONBLOCK)
  26. description->set_blocking(false);
  27. m_fds[fd].set(*description, flags);
  28. }
  29. KResultOr<FlatPtr> Process::sys$socket(int domain, int type, int protocol)
  30. {
  31. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  32. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  33. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  34. return EACCES;
  35. auto fd_or_error = m_fds.allocate();
  36. if (fd_or_error.is_error())
  37. return fd_or_error.error();
  38. auto socket_fd = fd_or_error.release_value();
  39. auto result = Socket::create(domain, type, protocol);
  40. if (result.is_error())
  41. return result.error();
  42. auto description_result = FileDescription::try_create(*result.value());
  43. if (description_result.is_error())
  44. return description_result.error();
  45. setup_socket_fd(socket_fd.fd, description_result.value(), type);
  46. return socket_fd.fd;
  47. }
  48. KResultOr<FlatPtr> Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  49. {
  50. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  51. auto description = fds().file_description(sockfd);
  52. if (!description)
  53. return EBADF;
  54. if (!description->is_socket())
  55. return ENOTSOCK;
  56. auto& socket = *description->socket();
  57. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  58. return socket.bind(address, address_length);
  59. }
  60. KResultOr<FlatPtr> Process::sys$listen(int sockfd, int backlog)
  61. {
  62. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  63. if (backlog < 0)
  64. return EINVAL;
  65. auto description = fds().file_description(sockfd);
  66. if (!description)
  67. return EBADF;
  68. if (!description->is_socket())
  69. return ENOTSOCK;
  70. auto& socket = *description->socket();
  71. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  72. if (socket.is_connected())
  73. return EINVAL;
  74. return socket.listen(backlog);
  75. }
  76. KResultOr<FlatPtr> Process::sys$accept4(Userspace<const Syscall::SC_accept4_params*> user_params)
  77. {
  78. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  79. REQUIRE_PROMISE(accept);
  80. Syscall::SC_accept4_params params;
  81. if (!copy_from_user(&params, user_params))
  82. return EFAULT;
  83. int accepting_socket_fd = params.sockfd;
  84. Userspace<sockaddr*> user_address((FlatPtr)params.addr);
  85. Userspace<socklen_t*> user_address_size((FlatPtr)params.addrlen);
  86. int flags = params.flags;
  87. socklen_t address_size = 0;
  88. if (user_address && !copy_from_user(&address_size, static_ptr_cast<const socklen_t*>(user_address_size)))
  89. return EFAULT;
  90. auto accepted_socket_fd_or_error = m_fds.allocate();
  91. if (accepted_socket_fd_or_error.is_error())
  92. return accepted_socket_fd_or_error.error();
  93. auto accepted_socket_fd = accepted_socket_fd_or_error.release_value();
  94. auto accepting_socket_description = fds().file_description(accepting_socket_fd);
  95. if (!accepting_socket_description)
  96. return EBADF;
  97. if (!accepting_socket_description->is_socket())
  98. return ENOTSOCK;
  99. auto& socket = *accepting_socket_description->socket();
  100. if (!socket.can_accept()) {
  101. if (accepting_socket_description->is_blocking()) {
  102. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  103. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  104. return EINTR;
  105. } else {
  106. return EAGAIN;
  107. }
  108. }
  109. auto accepted_socket = socket.accept();
  110. VERIFY(accepted_socket);
  111. if (user_address) {
  112. sockaddr_un address_buffer;
  113. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  114. accepted_socket->get_peer_address((sockaddr*)&address_buffer, &address_size);
  115. if (!copy_to_user(user_address, &address_buffer, address_size))
  116. return EFAULT;
  117. if (!copy_to_user(user_address_size, &address_size))
  118. return EFAULT;
  119. }
  120. auto accepted_socket_description_result = FileDescription::try_create(*accepted_socket);
  121. if (accepted_socket_description_result.is_error())
  122. return accepted_socket_description_result.error();
  123. accepted_socket_description_result.value()->set_readable(true);
  124. accepted_socket_description_result.value()->set_writable(true);
  125. if (flags & SOCK_NONBLOCK)
  126. accepted_socket_description_result.value()->set_blocking(false);
  127. int fd_flags = 0;
  128. if (flags & SOCK_CLOEXEC)
  129. fd_flags |= FD_CLOEXEC;
  130. m_fds[accepted_socket_fd.fd].set(accepted_socket_description_result.release_value(), fd_flags);
  131. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  132. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  133. return accepted_socket_fd.fd;
  134. }
  135. KResultOr<FlatPtr> Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  136. {
  137. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  138. auto description = fds().file_description(sockfd);
  139. if (!description)
  140. return EBADF;
  141. if (!description->is_socket())
  142. return ENOTSOCK;
  143. auto& socket = *description->socket();
  144. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  145. return socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No);
  146. }
  147. KResultOr<FlatPtr> Process::sys$shutdown(int sockfd, int how)
  148. {
  149. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  150. REQUIRE_PROMISE(stdio);
  151. if (how & ~SHUT_RDWR)
  152. return EINVAL;
  153. auto description = fds().file_description(sockfd);
  154. if (!description)
  155. return EBADF;
  156. if (!description->is_socket())
  157. return ENOTSOCK;
  158. auto& socket = *description->socket();
  159. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  160. return socket.shutdown(how);
  161. }
  162. KResultOr<FlatPtr> Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  163. {
  164. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  165. REQUIRE_PROMISE(stdio);
  166. struct msghdr msg;
  167. if (!copy_from_user(&msg, user_msg))
  168. return EFAULT;
  169. if (msg.msg_iovlen != 1)
  170. return ENOTSUP; // FIXME: Support this :)
  171. Vector<iovec, 1> iovs;
  172. if (!iovs.try_resize(msg.msg_iovlen))
  173. return ENOMEM;
  174. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  175. return EFAULT;
  176. if (iovs[0].iov_len > NumericLimits<ssize_t>::max())
  177. return EINVAL;
  178. Userspace<const sockaddr*> user_addr((FlatPtr)msg.msg_name);
  179. socklen_t addr_length = msg.msg_namelen;
  180. auto description = fds().file_description(sockfd);
  181. if (!description)
  182. return EBADF;
  183. if (!description->is_socket())
  184. return ENOTSOCK;
  185. auto& socket = *description->socket();
  186. if (socket.is_shut_down_for_writing())
  187. return EPIPE;
  188. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  189. if (!data_buffer.has_value())
  190. return EFAULT;
  191. auto result = socket.sendto(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, addr_length);
  192. if (result.is_error())
  193. return result.error();
  194. else
  195. return result.release_value();
  196. }
  197. KResultOr<FlatPtr> Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  198. {
  199. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  200. REQUIRE_PROMISE(stdio);
  201. struct msghdr msg;
  202. if (!copy_from_user(&msg, user_msg))
  203. return EFAULT;
  204. if (msg.msg_iovlen != 1)
  205. return ENOTSUP; // FIXME: Support this :)
  206. Vector<iovec, 1> iovs;
  207. if (!iovs.try_resize(msg.msg_iovlen))
  208. return ENOMEM;
  209. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  210. return EFAULT;
  211. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  212. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  213. auto description = fds().file_description(sockfd);
  214. if (!description)
  215. return EBADF;
  216. if (!description->is_socket())
  217. return ENOTSOCK;
  218. auto& socket = *description->socket();
  219. if (socket.is_shut_down_for_reading())
  220. return 0;
  221. bool original_blocking = description->is_blocking();
  222. if (flags & MSG_DONTWAIT)
  223. description->set_blocking(false);
  224. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  225. if (!data_buffer.has_value())
  226. return EFAULT;
  227. Time timestamp {};
  228. auto result = socket.recvfrom(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp);
  229. if (flags & MSG_DONTWAIT)
  230. description->set_blocking(original_blocking);
  231. if (result.is_error())
  232. return result.error();
  233. int msg_flags = 0;
  234. if (result.value() > iovs[0].iov_len) {
  235. VERIFY(socket.type() != SOCK_STREAM);
  236. msg_flags |= MSG_TRUNC;
  237. }
  238. if (socket.wants_timestamp()) {
  239. struct {
  240. cmsghdr cmsg;
  241. timeval timestamp;
  242. } cmsg_timestamp;
  243. socklen_t control_length = sizeof(cmsg_timestamp);
  244. if (msg.msg_controllen < control_length) {
  245. msg_flags |= MSG_CTRUNC;
  246. } else {
  247. cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp.to_timeval() };
  248. if (!copy_to_user(msg.msg_control, &cmsg_timestamp, control_length))
  249. return EFAULT;
  250. }
  251. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length))
  252. return EFAULT;
  253. }
  254. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags))
  255. return EFAULT;
  256. return result.value();
  257. }
  258. template<bool sockname, typename Params>
  259. int Process::get_sock_or_peer_name(const Params& params)
  260. {
  261. socklen_t addrlen_value;
  262. if (!copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)))
  263. return EFAULT;
  264. if (addrlen_value <= 0)
  265. return EINVAL;
  266. auto description = fds().file_description(params.sockfd);
  267. if (!description)
  268. return EBADF;
  269. if (!description->is_socket())
  270. return ENOTSOCK;
  271. auto& socket = *description->socket();
  272. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  273. sockaddr_un address_buffer;
  274. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  275. if constexpr (sockname)
  276. socket.get_local_address((sockaddr*)&address_buffer, &addrlen_value);
  277. else
  278. socket.get_peer_address((sockaddr*)&address_buffer, &addrlen_value);
  279. if (!copy_to_user(params.addr, &address_buffer, addrlen_value))
  280. return EFAULT;
  281. if (!copy_to_user(params.addrlen, &addrlen_value))
  282. return EFAULT;
  283. return 0;
  284. }
  285. KResultOr<FlatPtr> Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  286. {
  287. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  288. Syscall::SC_getsockname_params params;
  289. if (!copy_from_user(&params, user_params))
  290. return EFAULT;
  291. return get_sock_or_peer_name<true>(params);
  292. }
  293. KResultOr<FlatPtr> Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  294. {
  295. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  296. Syscall::SC_getpeername_params params;
  297. if (!copy_from_user(&params, user_params))
  298. return EFAULT;
  299. return get_sock_or_peer_name<false>(params);
  300. }
  301. KResultOr<FlatPtr> Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  302. {
  303. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  304. Syscall::SC_getsockopt_params params;
  305. if (!copy_from_user(&params, user_params))
  306. return EFAULT;
  307. int sockfd = params.sockfd;
  308. int level = params.level;
  309. int option = params.option;
  310. Userspace<void*> user_value((FlatPtr)params.value);
  311. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  312. socklen_t value_size;
  313. if (!copy_from_user(&value_size, params.value_size, sizeof(socklen_t)))
  314. return EFAULT;
  315. auto description = fds().file_description(sockfd);
  316. if (!description)
  317. return EBADF;
  318. if (!description->is_socket())
  319. return ENOTSOCK;
  320. auto& socket = *description->socket();
  321. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  322. return socket.getsockopt(*description, level, option, user_value, user_value_size);
  323. }
  324. KResultOr<FlatPtr> Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  325. {
  326. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  327. Syscall::SC_setsockopt_params params;
  328. if (!copy_from_user(&params, user_params))
  329. return EFAULT;
  330. Userspace<const void*> user_value((FlatPtr)params.value);
  331. auto description = fds().file_description(params.sockfd);
  332. if (!description)
  333. return EBADF;
  334. if (!description->is_socket())
  335. return ENOTSOCK;
  336. auto& socket = *description->socket();
  337. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  338. return socket.setsockopt(params.level, params.option, user_value, params.value_size);
  339. }
  340. KResultOr<FlatPtr> Process::sys$socketpair(Userspace<const Syscall::SC_socketpair_params*> user_params)
  341. {
  342. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  343. Syscall::SC_socketpair_params params;
  344. if (!copy_from_user(&params, user_params))
  345. return EFAULT;
  346. if (params.domain != AF_LOCAL)
  347. return EINVAL;
  348. if (params.protocol != 0 && params.protocol != PF_LOCAL)
  349. return EINVAL;
  350. auto result = LocalSocket::try_create_connected_pair(params.type & SOCK_TYPE_MASK);
  351. if (result.is_error())
  352. return result.error();
  353. auto pair = result.value();
  354. auto fd0_or_error = m_fds.allocate();
  355. if (fd0_or_error.is_error())
  356. return fd0_or_error.error();
  357. auto fd1_or_error = m_fds.allocate();
  358. if (fd1_or_error.is_error())
  359. return fd1_or_error.error();
  360. int fds[2];
  361. fds[0] = fd0_or_error.value().fd;
  362. fds[1] = fd1_or_error.value().fd;
  363. setup_socket_fd(fds[0], pair.description0, params.type);
  364. setup_socket_fd(fds[1], pair.description1, params.type);
  365. if (!copy_to_user(params.sv, fds, sizeof(fds))) {
  366. // Avoid leaking both file descriptors on error.
  367. m_fds[fds[0]] = {};
  368. m_fds[fds[1]] = {};
  369. return EFAULT;
  370. }
  371. return KSuccess;
  372. }
  373. }