socket.cpp 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/FileSystem/FileDescription.h>
  7. #include <Kernel/Net/IPv4Socket.h>
  8. #include <Kernel/Net/LocalSocket.h>
  9. #include <Kernel/Process.h>
  10. #include <Kernel/UnixTypes.h>
  11. namespace Kernel {
  12. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  13. do { \
  14. if (domain == AF_INET) \
  15. REQUIRE_PROMISE(inet); \
  16. else if (domain == AF_LOCAL) \
  17. REQUIRE_PROMISE(unix); \
  18. } while (0)
  19. void Process::setup_socket_fd(int fd, NonnullRefPtr<FileDescription> description, int type)
  20. {
  21. description->set_readable(true);
  22. description->set_writable(true);
  23. unsigned flags = 0;
  24. if (type & SOCK_CLOEXEC)
  25. flags |= FD_CLOEXEC;
  26. if (type & SOCK_NONBLOCK)
  27. description->set_blocking(false);
  28. m_fds[fd].set(*description, flags);
  29. }
  30. KResultOr<FlatPtr> Process::sys$socket(int domain, int type, int protocol)
  31. {
  32. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  33. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  34. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  35. return EACCES;
  36. auto fd_or_error = m_fds.allocate();
  37. if (fd_or_error.is_error())
  38. return fd_or_error.error();
  39. auto fd = fd_or_error.value();
  40. auto result = Socket::create(domain, type, protocol);
  41. if (result.is_error())
  42. return result.error();
  43. auto description_result = FileDescription::create(*result.value());
  44. if (description_result.is_error())
  45. return description_result.error();
  46. setup_socket_fd(fd, description_result.value(), type);
  47. return fd;
  48. }
  49. KResultOr<FlatPtr> Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  50. {
  51. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  52. auto description = fds().file_description(sockfd);
  53. if (!description)
  54. return EBADF;
  55. if (!description->is_socket())
  56. return ENOTSOCK;
  57. auto& socket = *description->socket();
  58. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  59. return socket.bind(address, address_length);
  60. }
  61. KResultOr<FlatPtr> Process::sys$listen(int sockfd, int backlog)
  62. {
  63. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  64. if (backlog < 0)
  65. return EINVAL;
  66. auto description = fds().file_description(sockfd);
  67. if (!description)
  68. return EBADF;
  69. if (!description->is_socket())
  70. return ENOTSOCK;
  71. auto& socket = *description->socket();
  72. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  73. if (socket.is_connected())
  74. return EINVAL;
  75. return socket.listen(backlog);
  76. }
  77. KResultOr<FlatPtr> Process::sys$accept4(Userspace<const Syscall::SC_accept4_params*> user_params)
  78. {
  79. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  80. REQUIRE_PROMISE(accept);
  81. Syscall::SC_accept4_params params;
  82. if (!copy_from_user(&params, user_params))
  83. return EFAULT;
  84. int accepting_socket_fd = params.sockfd;
  85. Userspace<sockaddr*> user_address((FlatPtr)params.addr);
  86. Userspace<socklen_t*> user_address_size((FlatPtr)params.addrlen);
  87. int flags = params.flags;
  88. socklen_t address_size = 0;
  89. if (user_address && !copy_from_user(&address_size, static_ptr_cast<const socklen_t*>(user_address_size)))
  90. return EFAULT;
  91. auto accepted_socket_fd_or_error = m_fds.allocate();
  92. if (accepted_socket_fd_or_error.is_error())
  93. return accepted_socket_fd_or_error.error();
  94. auto accepted_socket_fd = accepted_socket_fd_or_error.value();
  95. auto accepting_socket_description = fds().file_description(accepting_socket_fd);
  96. if (!accepting_socket_description)
  97. return EBADF;
  98. if (!accepting_socket_description->is_socket())
  99. return ENOTSOCK;
  100. auto& socket = *accepting_socket_description->socket();
  101. if (!socket.can_accept()) {
  102. if (accepting_socket_description->is_blocking()) {
  103. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  104. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  105. return EINTR;
  106. } else {
  107. return EAGAIN;
  108. }
  109. }
  110. auto accepted_socket = socket.accept();
  111. VERIFY(accepted_socket);
  112. if (user_address) {
  113. sockaddr_un address_buffer;
  114. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  115. accepted_socket->get_peer_address((sockaddr*)&address_buffer, &address_size);
  116. if (!copy_to_user(user_address, &address_buffer, address_size))
  117. return EFAULT;
  118. if (!copy_to_user(user_address_size, &address_size))
  119. return EFAULT;
  120. }
  121. auto accepted_socket_description_result = FileDescription::create(*accepted_socket);
  122. if (accepted_socket_description_result.is_error())
  123. return accepted_socket_description_result.error();
  124. accepted_socket_description_result.value()->set_readable(true);
  125. accepted_socket_description_result.value()->set_writable(true);
  126. if (flags & SOCK_NONBLOCK)
  127. accepted_socket_description_result.value()->set_blocking(false);
  128. int fd_flags = 0;
  129. if (flags & SOCK_CLOEXEC)
  130. fd_flags |= FD_CLOEXEC;
  131. m_fds[accepted_socket_fd].set(accepted_socket_description_result.release_value(), fd_flags);
  132. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  133. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  134. return accepted_socket_fd;
  135. }
  136. KResultOr<FlatPtr> Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  137. {
  138. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  139. auto description = fds().file_description(sockfd);
  140. if (!description)
  141. return EBADF;
  142. if (!description->is_socket())
  143. return ENOTSOCK;
  144. auto& socket = *description->socket();
  145. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  146. return socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No);
  147. }
  148. KResultOr<FlatPtr> Process::sys$shutdown(int sockfd, int how)
  149. {
  150. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  151. REQUIRE_PROMISE(stdio);
  152. if (how & ~SHUT_RDWR)
  153. return EINVAL;
  154. auto description = fds().file_description(sockfd);
  155. if (!description)
  156. return EBADF;
  157. if (!description->is_socket())
  158. return ENOTSOCK;
  159. auto& socket = *description->socket();
  160. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  161. return socket.shutdown(how);
  162. }
  163. KResultOr<FlatPtr> Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  164. {
  165. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  166. REQUIRE_PROMISE(stdio);
  167. struct msghdr msg;
  168. if (!copy_from_user(&msg, user_msg))
  169. return EFAULT;
  170. if (msg.msg_iovlen != 1)
  171. return ENOTSUP; // FIXME: Support this :)
  172. Vector<iovec, 1> iovs;
  173. if (!iovs.try_resize(msg.msg_iovlen))
  174. return ENOMEM;
  175. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  176. return EFAULT;
  177. if (iovs[0].iov_len > NumericLimits<ssize_t>::max())
  178. return EINVAL;
  179. Userspace<const sockaddr*> user_addr((FlatPtr)msg.msg_name);
  180. socklen_t addr_length = msg.msg_namelen;
  181. auto description = fds().file_description(sockfd);
  182. if (!description)
  183. return EBADF;
  184. if (!description->is_socket())
  185. return ENOTSOCK;
  186. auto& socket = *description->socket();
  187. if (socket.is_shut_down_for_writing())
  188. return EPIPE;
  189. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  190. if (!data_buffer.has_value())
  191. return EFAULT;
  192. auto result = socket.sendto(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, addr_length);
  193. if (result.is_error())
  194. return result.error();
  195. else
  196. return result.release_value();
  197. }
  198. KResultOr<FlatPtr> Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  199. {
  200. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  201. REQUIRE_PROMISE(stdio);
  202. struct msghdr msg;
  203. if (!copy_from_user(&msg, user_msg))
  204. return EFAULT;
  205. if (msg.msg_iovlen != 1)
  206. return ENOTSUP; // FIXME: Support this :)
  207. Vector<iovec, 1> iovs;
  208. if (!iovs.try_resize(msg.msg_iovlen))
  209. return ENOMEM;
  210. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  211. return EFAULT;
  212. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  213. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  214. auto description = fds().file_description(sockfd);
  215. if (!description)
  216. return EBADF;
  217. if (!description->is_socket())
  218. return ENOTSOCK;
  219. auto& socket = *description->socket();
  220. if (socket.is_shut_down_for_reading())
  221. return 0;
  222. bool original_blocking = description->is_blocking();
  223. if (flags & MSG_DONTWAIT)
  224. description->set_blocking(false);
  225. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  226. if (!data_buffer.has_value())
  227. return EFAULT;
  228. Time timestamp {};
  229. auto result = socket.recvfrom(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp);
  230. if (flags & MSG_DONTWAIT)
  231. description->set_blocking(original_blocking);
  232. if (result.is_error())
  233. return result.error();
  234. int msg_flags = 0;
  235. if (result.value() > iovs[0].iov_len) {
  236. VERIFY(socket.type() != SOCK_STREAM);
  237. msg_flags |= MSG_TRUNC;
  238. }
  239. if (socket.wants_timestamp()) {
  240. struct {
  241. cmsghdr cmsg;
  242. timeval timestamp;
  243. } cmsg_timestamp;
  244. socklen_t control_length = sizeof(cmsg_timestamp);
  245. if (msg.msg_controllen < control_length) {
  246. msg_flags |= MSG_CTRUNC;
  247. } else {
  248. cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp.to_timeval() };
  249. if (!copy_to_user(msg.msg_control, &cmsg_timestamp, control_length))
  250. return EFAULT;
  251. }
  252. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length))
  253. return EFAULT;
  254. }
  255. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags))
  256. return EFAULT;
  257. return result.value();
  258. }
  259. template<bool sockname, typename Params>
  260. int Process::get_sock_or_peer_name(const Params& params)
  261. {
  262. socklen_t addrlen_value;
  263. if (!copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)))
  264. return EFAULT;
  265. if (addrlen_value <= 0)
  266. return EINVAL;
  267. auto description = fds().file_description(params.sockfd);
  268. if (!description)
  269. return EBADF;
  270. if (!description->is_socket())
  271. return ENOTSOCK;
  272. auto& socket = *description->socket();
  273. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  274. sockaddr_un address_buffer;
  275. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  276. if constexpr (sockname)
  277. socket.get_local_address((sockaddr*)&address_buffer, &addrlen_value);
  278. else
  279. socket.get_peer_address((sockaddr*)&address_buffer, &addrlen_value);
  280. if (!copy_to_user(params.addr, &address_buffer, addrlen_value))
  281. return EFAULT;
  282. if (!copy_to_user(params.addrlen, &addrlen_value))
  283. return EFAULT;
  284. return 0;
  285. }
  286. KResultOr<FlatPtr> Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  287. {
  288. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  289. Syscall::SC_getsockname_params params;
  290. if (!copy_from_user(&params, user_params))
  291. return EFAULT;
  292. return get_sock_or_peer_name<true>(params);
  293. }
  294. KResultOr<FlatPtr> Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  295. {
  296. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  297. Syscall::SC_getpeername_params params;
  298. if (!copy_from_user(&params, user_params))
  299. return EFAULT;
  300. return get_sock_or_peer_name<false>(params);
  301. }
  302. KResultOr<FlatPtr> Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  303. {
  304. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  305. Syscall::SC_getsockopt_params params;
  306. if (!copy_from_user(&params, user_params))
  307. return EFAULT;
  308. int sockfd = params.sockfd;
  309. int level = params.level;
  310. int option = params.option;
  311. Userspace<void*> user_value((FlatPtr)params.value);
  312. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  313. socklen_t value_size;
  314. if (!copy_from_user(&value_size, params.value_size, sizeof(socklen_t)))
  315. return EFAULT;
  316. auto description = fds().file_description(sockfd);
  317. if (!description)
  318. return EBADF;
  319. if (!description->is_socket())
  320. return ENOTSOCK;
  321. auto& socket = *description->socket();
  322. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  323. return socket.getsockopt(*description, level, option, user_value, user_value_size);
  324. }
  325. KResultOr<FlatPtr> Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  326. {
  327. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  328. Syscall::SC_setsockopt_params params;
  329. if (!copy_from_user(&params, user_params))
  330. return EFAULT;
  331. Userspace<const void*> user_value((FlatPtr)params.value);
  332. auto description = fds().file_description(params.sockfd);
  333. if (!description)
  334. return EBADF;
  335. if (!description->is_socket())
  336. return ENOTSOCK;
  337. auto& socket = *description->socket();
  338. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  339. return socket.setsockopt(params.level, params.option, user_value, params.value_size);
  340. }
  341. KResultOr<FlatPtr> Process::sys$socketpair(Userspace<const Syscall::SC_socketpair_params*> user_params)
  342. {
  343. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this)
  344. Syscall::SC_socketpair_params params;
  345. if (!copy_from_user(&params, user_params))
  346. return EFAULT;
  347. if (params.domain != AF_LOCAL)
  348. return EINVAL;
  349. if (params.protocol != 0 && params.protocol != PF_LOCAL)
  350. return EINVAL;
  351. auto result = LocalSocket::create_connected_pair(params.type & SOCK_TYPE_MASK);
  352. if (result.is_error())
  353. return result.error();
  354. auto pair = result.value();
  355. int fds[2];
  356. auto fd1_or_error = m_fds.allocate();
  357. if (fd1_or_error.is_error())
  358. return fd1_or_error.error();
  359. fds[0] = fd1_or_error.value();
  360. setup_socket_fd(fds[0], pair.description1, params.type);
  361. auto fd2_or_error = m_fds.allocate();
  362. if (fd2_or_error.is_error())
  363. return fd2_or_error.error();
  364. fds[1] = fd2_or_error.value();
  365. setup_socket_fd(fds[1], pair.description2, params.type);
  366. if (!copy_to_user(params.sv, fds, sizeof(fds))) {
  367. // FIXME: This leaks both file descriptors
  368. return EFAULT;
  369. }
  370. return KSuccess;
  371. }
  372. }