socket.cpp 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <Kernel/FileSystem/FileDescription.h>
  7. #include <Kernel/Net/IPv4Socket.h>
  8. #include <Kernel/Net/LocalSocket.h>
  9. #include <Kernel/Process.h>
  10. #include <Kernel/UnixTypes.h>
  11. namespace Kernel {
  12. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  13. do { \
  14. if (domain == AF_INET) \
  15. REQUIRE_PROMISE(inet); \
  16. else if (domain == AF_LOCAL) \
  17. REQUIRE_PROMISE(unix); \
  18. } while (0)
  19. void Process::setup_socket_fd(int fd, NonnullRefPtr<FileDescription> description, int type)
  20. {
  21. description->set_readable(true);
  22. description->set_writable(true);
  23. unsigned flags = 0;
  24. if (type & SOCK_CLOEXEC)
  25. flags |= FD_CLOEXEC;
  26. if (type & SOCK_NONBLOCK)
  27. description->set_blocking(false);
  28. m_fds[fd].set(*description, flags);
  29. }
  30. KResultOr<int> Process::sys$socket(int domain, int type, int protocol)
  31. {
  32. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  33. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !is_superuser())
  34. return EACCES;
  35. int fd = alloc_fd();
  36. if (fd < 0)
  37. return fd;
  38. auto result = Socket::create(domain, type, protocol);
  39. if (result.is_error())
  40. return result.error();
  41. auto description_result = FileDescription::create(*result.value());
  42. if (description_result.is_error())
  43. return description_result.error();
  44. setup_socket_fd(fd, description_result.value(), type);
  45. return fd;
  46. }
  47. KResultOr<int> Process::sys$bind(int sockfd, Userspace<const sockaddr*> address, socklen_t address_length)
  48. {
  49. auto description = file_description(sockfd);
  50. if (!description)
  51. return EBADF;
  52. if (!description->is_socket())
  53. return ENOTSOCK;
  54. auto& socket = *description->socket();
  55. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  56. return socket.bind(address, address_length);
  57. }
  58. KResultOr<int> Process::sys$listen(int sockfd, int backlog)
  59. {
  60. if (backlog < 0)
  61. return EINVAL;
  62. auto description = file_description(sockfd);
  63. if (!description)
  64. return EBADF;
  65. if (!description->is_socket())
  66. return ENOTSOCK;
  67. auto& socket = *description->socket();
  68. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  69. if (socket.is_connected())
  70. return EINVAL;
  71. return socket.listen(backlog);
  72. }
  73. KResultOr<int> Process::sys$accept(int accepting_socket_fd, Userspace<sockaddr*> user_address, Userspace<socklen_t*> user_address_size)
  74. {
  75. REQUIRE_PROMISE(accept);
  76. socklen_t address_size = 0;
  77. if (user_address && !copy_from_user(&address_size, static_ptr_cast<const socklen_t*>(user_address_size)))
  78. return EFAULT;
  79. int accepted_socket_fd = alloc_fd();
  80. if (accepted_socket_fd < 0)
  81. return accepted_socket_fd;
  82. auto accepting_socket_description = file_description(accepting_socket_fd);
  83. if (!accepting_socket_description)
  84. return EBADF;
  85. if (!accepting_socket_description->is_socket())
  86. return ENOTSOCK;
  87. auto& socket = *accepting_socket_description->socket();
  88. if (!socket.can_accept()) {
  89. if (accepting_socket_description->is_blocking()) {
  90. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  91. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  92. return EINTR;
  93. } else {
  94. return EAGAIN;
  95. }
  96. }
  97. auto accepted_socket = socket.accept();
  98. VERIFY(accepted_socket);
  99. if (user_address) {
  100. u8 address_buffer[sizeof(sockaddr_un)];
  101. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  102. accepted_socket->get_peer_address((sockaddr*)address_buffer, &address_size);
  103. if (!copy_to_user(user_address, address_buffer, address_size))
  104. return EFAULT;
  105. if (!copy_to_user(user_address_size, &address_size))
  106. return EFAULT;
  107. }
  108. auto accepted_socket_description_result = FileDescription::create(*accepted_socket);
  109. if (accepted_socket_description_result.is_error())
  110. return accepted_socket_description_result.error();
  111. accepted_socket_description_result.value()->set_readable(true);
  112. accepted_socket_description_result.value()->set_writable(true);
  113. // NOTE: The accepted socket inherits fd flags from the accepting socket.
  114. // I'm not sure if this matches other systems but it makes sense to me.
  115. accepted_socket_description_result.value()->set_blocking(accepting_socket_description->is_blocking());
  116. m_fds[accepted_socket_fd].set(accepted_socket_description_result.release_value(), m_fds[accepting_socket_fd].flags());
  117. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  118. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  119. return accepted_socket_fd;
  120. }
  121. KResultOr<int> Process::sys$connect(int sockfd, Userspace<const sockaddr*> user_address, socklen_t user_address_size)
  122. {
  123. int fd = alloc_fd();
  124. if (fd < 0)
  125. return fd;
  126. auto description = file_description(sockfd);
  127. if (!description)
  128. return EBADF;
  129. if (!description->is_socket())
  130. return ENOTSOCK;
  131. auto& socket = *description->socket();
  132. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  133. return socket.connect(*description, user_address, user_address_size, description->is_blocking() ? ShouldBlock::Yes : ShouldBlock::No);
  134. }
  135. KResultOr<int> Process::sys$shutdown(int sockfd, int how)
  136. {
  137. REQUIRE_PROMISE(stdio);
  138. if (how & ~SHUT_RDWR)
  139. return EINVAL;
  140. auto description = file_description(sockfd);
  141. if (!description)
  142. return EBADF;
  143. if (!description->is_socket())
  144. return ENOTSOCK;
  145. auto& socket = *description->socket();
  146. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  147. return socket.shutdown(how);
  148. }
  149. KResultOr<ssize_t> Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  150. {
  151. REQUIRE_PROMISE(stdio);
  152. struct msghdr msg;
  153. if (!copy_from_user(&msg, user_msg))
  154. return EFAULT;
  155. if (msg.msg_iovlen != 1)
  156. return ENOTSUP; // FIXME: Support this :)
  157. Vector<iovec, 1> iovs;
  158. if (!iovs.try_resize(msg.msg_iovlen))
  159. return ENOMEM;
  160. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  161. return EFAULT;
  162. Userspace<const sockaddr*> user_addr((FlatPtr)msg.msg_name);
  163. socklen_t addr_length = msg.msg_namelen;
  164. auto description = file_description(sockfd);
  165. if (!description)
  166. return EBADF;
  167. if (!description->is_socket())
  168. return ENOTSOCK;
  169. auto& socket = *description->socket();
  170. if (socket.is_shut_down_for_writing())
  171. return EPIPE;
  172. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  173. if (!data_buffer.has_value())
  174. return EFAULT;
  175. auto result = socket.sendto(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, addr_length);
  176. if (result.is_error())
  177. return result.error();
  178. return result.value();
  179. }
  180. KResultOr<ssize_t> Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  181. {
  182. REQUIRE_PROMISE(stdio);
  183. struct msghdr msg;
  184. if (!copy_from_user(&msg, user_msg))
  185. return EFAULT;
  186. if (msg.msg_iovlen != 1)
  187. return ENOTSUP; // FIXME: Support this :)
  188. Vector<iovec, 1> iovs;
  189. if (!iovs.try_resize(msg.msg_iovlen))
  190. return ENOMEM;
  191. if (!copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen))
  192. return EFAULT;
  193. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  194. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  195. auto description = file_description(sockfd);
  196. if (!description)
  197. return EBADF;
  198. if (!description->is_socket())
  199. return ENOTSOCK;
  200. auto& socket = *description->socket();
  201. if (socket.is_shut_down_for_reading())
  202. return 0;
  203. bool original_blocking = description->is_blocking();
  204. if (flags & MSG_DONTWAIT)
  205. description->set_blocking(false);
  206. auto data_buffer = UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len);
  207. if (!data_buffer.has_value())
  208. return EFAULT;
  209. Time timestamp {};
  210. auto result = socket.recvfrom(*description, data_buffer.value(), iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp);
  211. if (flags & MSG_DONTWAIT)
  212. description->set_blocking(original_blocking);
  213. if (result.is_error())
  214. return result.error();
  215. int msg_flags = 0;
  216. if (result.value() > iovs[0].iov_len) {
  217. VERIFY(socket.type() != SOCK_STREAM);
  218. msg_flags |= MSG_TRUNC;
  219. }
  220. if (socket.wants_timestamp()) {
  221. struct {
  222. cmsghdr cmsg;
  223. timeval timestamp;
  224. } cmsg_timestamp;
  225. socklen_t control_length = sizeof(cmsg_timestamp);
  226. if (msg.msg_controllen < control_length) {
  227. msg_flags |= MSG_CTRUNC;
  228. } else {
  229. cmsg_timestamp = { { control_length, SOL_SOCKET, SCM_TIMESTAMP }, timestamp.to_timeval() };
  230. if (!copy_to_user(msg.msg_control, &cmsg_timestamp, control_length))
  231. return EFAULT;
  232. }
  233. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &control_length))
  234. return EFAULT;
  235. }
  236. if (!copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags))
  237. return EFAULT;
  238. return result.value();
  239. }
  240. template<bool sockname, typename Params>
  241. int Process::get_sock_or_peer_name(const Params& params)
  242. {
  243. socklen_t addrlen_value;
  244. if (!copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)))
  245. return EFAULT;
  246. if (addrlen_value <= 0)
  247. return EINVAL;
  248. auto description = file_description(params.sockfd);
  249. if (!description)
  250. return EBADF;
  251. if (!description->is_socket())
  252. return ENOTSOCK;
  253. auto& socket = *description->socket();
  254. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  255. u8 address_buffer[sizeof(sockaddr_un)];
  256. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  257. if constexpr (sockname)
  258. socket.get_local_address((sockaddr*)address_buffer, &addrlen_value);
  259. else
  260. socket.get_peer_address((sockaddr*)address_buffer, &addrlen_value);
  261. if (!copy_to_user(params.addr, address_buffer, addrlen_value))
  262. return EFAULT;
  263. if (!copy_to_user(params.addrlen, &addrlen_value))
  264. return EFAULT;
  265. return 0;
  266. }
  267. KResultOr<int> Process::sys$getsockname(Userspace<const Syscall::SC_getsockname_params*> user_params)
  268. {
  269. Syscall::SC_getsockname_params params;
  270. if (!copy_from_user(&params, user_params))
  271. return EFAULT;
  272. return get_sock_or_peer_name<true>(params);
  273. }
  274. KResultOr<int> Process::sys$getpeername(Userspace<const Syscall::SC_getpeername_params*> user_params)
  275. {
  276. Syscall::SC_getpeername_params params;
  277. if (!copy_from_user(&params, user_params))
  278. return EFAULT;
  279. return get_sock_or_peer_name<false>(params);
  280. }
  281. KResultOr<int> Process::sys$getsockopt(Userspace<const Syscall::SC_getsockopt_params*> user_params)
  282. {
  283. Syscall::SC_getsockopt_params params;
  284. if (!copy_from_user(&params, user_params))
  285. return EFAULT;
  286. int sockfd = params.sockfd;
  287. int level = params.level;
  288. int option = params.option;
  289. Userspace<void*> user_value((FlatPtr)params.value);
  290. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  291. socklen_t value_size;
  292. if (!copy_from_user(&value_size, params.value_size, sizeof(socklen_t)))
  293. return EFAULT;
  294. auto description = file_description(sockfd);
  295. if (!description)
  296. return EBADF;
  297. if (!description->is_socket())
  298. return ENOTSOCK;
  299. auto& socket = *description->socket();
  300. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  301. return socket.getsockopt(*description, level, option, user_value, user_value_size);
  302. }
  303. KResultOr<int> Process::sys$setsockopt(Userspace<const Syscall::SC_setsockopt_params*> user_params)
  304. {
  305. Syscall::SC_setsockopt_params params;
  306. if (!copy_from_user(&params, user_params))
  307. return EFAULT;
  308. Userspace<const void*> user_value((FlatPtr)params.value);
  309. auto description = file_description(params.sockfd);
  310. if (!description)
  311. return EBADF;
  312. if (!description->is_socket())
  313. return ENOTSOCK;
  314. auto& socket = *description->socket();
  315. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  316. return socket.setsockopt(params.level, params.option, user_value, params.value_size);
  317. }
  318. KResultOr<int> Process::sys$socketpair(Userspace<const Syscall::SC_socketpair_params*> user_params)
  319. {
  320. Syscall::SC_socketpair_params params;
  321. if (!copy_from_user(&params, user_params))
  322. return EFAULT;
  323. if (params.domain != AF_LOCAL)
  324. return EINVAL;
  325. if (params.protocol != 0 && params.protocol != PF_LOCAL)
  326. return EINVAL;
  327. auto result = LocalSocket::create_connected_pair(params.type & SOCK_TYPE_MASK);
  328. if (result.is_error())
  329. return result.error();
  330. auto pair = result.value();
  331. int fds[2];
  332. fds[0] = alloc_fd();
  333. if (fds[0] < 0)
  334. return ENFILE;
  335. setup_socket_fd(fds[0], pair.description1, params.type);
  336. fds[1] = alloc_fd();
  337. if (fds[1] < 0) {
  338. // FIXME: This leaks fds[0]
  339. return ENFILE;
  340. }
  341. setup_socket_fd(fds[1], pair.description2, params.type);
  342. if (!copy_to_user(params.sv, fds, sizeof(fds))) {
  343. // FIXME: This leaks both file descriptors
  344. return EFAULT;
  345. }
  346. return KSuccess;
  347. }
  348. }