LocalSocket.cpp 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/Singleton.h>
  7. #include <AK/StringBuilder.h>
  8. #include <Kernel/Debug.h>
  9. #include <Kernel/FileSystem/FileDescription.h>
  10. #include <Kernel/FileSystem/VirtualFileSystem.h>
  11. #include <Kernel/Net/LocalSocket.h>
  12. #include <Kernel/Process.h>
  13. #include <Kernel/StdLib.h>
  14. #include <Kernel/UnixTypes.h>
  15. #include <LibC/errno_numbers.h>
  16. namespace Kernel {
  17. static AK::Singleton<Lockable<LocalSocket::List>> s_list;
  18. static Lockable<LocalSocket::List>& all_sockets()
  19. {
  20. return *s_list;
  21. }
  22. void LocalSocket::for_each(Function<void(const LocalSocket&)> callback)
  23. {
  24. Locker locker(all_sockets().lock(), Mutex::Mode::Shared);
  25. for (auto& socket : all_sockets().resource())
  26. callback(socket);
  27. }
  28. KResultOr<NonnullRefPtr<Socket>> LocalSocket::create(int type)
  29. {
  30. auto socket = adopt_ref_if_nonnull(new (nothrow) LocalSocket(type));
  31. if (socket)
  32. return socket.release_nonnull();
  33. return ENOMEM;
  34. }
  35. KResultOr<SocketPair> LocalSocket::create_connected_pair(int type)
  36. {
  37. auto socket = adopt_ref_if_nonnull(new (nothrow) LocalSocket(type));
  38. if (!socket)
  39. return ENOMEM;
  40. auto description1_result = FileDescription::create(*socket);
  41. if (description1_result.is_error())
  42. return description1_result.error();
  43. socket->m_address.sun_family = AF_LOCAL;
  44. memcpy(socket->m_address.sun_path, "[socketpair]", 13);
  45. auto& process = *Process::current();
  46. socket->m_acceptor = { process.pid().value(), process.uid(), process.gid() };
  47. socket->set_connected(true);
  48. socket->set_connect_side_role(Role::Connected);
  49. socket->m_role = Role::Accepted;
  50. auto description2_result = FileDescription::create(*socket);
  51. if (description2_result.is_error())
  52. return description2_result.error();
  53. return SocketPair { description1_result.release_value(), description2_result.release_value() };
  54. }
  55. LocalSocket::LocalSocket(int type)
  56. : Socket(AF_LOCAL, type, 0)
  57. {
  58. {
  59. Locker locker(all_sockets().lock());
  60. all_sockets().resource().append(*this);
  61. }
  62. auto current_process = Process::current();
  63. m_prebind_uid = current_process->euid();
  64. m_prebind_gid = current_process->egid();
  65. m_prebind_mode = 0666;
  66. m_for_client.set_unblock_callback([this]() {
  67. evaluate_block_conditions();
  68. });
  69. m_for_server.set_unblock_callback([this]() {
  70. evaluate_block_conditions();
  71. });
  72. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) created with type={}", this, type);
  73. }
  74. LocalSocket::~LocalSocket()
  75. {
  76. Locker locker(all_sockets().lock());
  77. all_sockets().resource().remove(*this);
  78. }
  79. void LocalSocket::get_local_address(sockaddr* address, socklen_t* address_size)
  80. {
  81. size_t bytes_to_copy = min(static_cast<size_t>(*address_size), sizeof(sockaddr_un));
  82. memcpy(address, &m_address, bytes_to_copy);
  83. *address_size = sizeof(sockaddr_un);
  84. }
  85. void LocalSocket::get_peer_address(sockaddr* address, socklen_t* address_size)
  86. {
  87. get_local_address(address, address_size);
  88. }
  89. KResult LocalSocket::bind(Userspace<const sockaddr*> user_address, socklen_t address_size)
  90. {
  91. VERIFY(setup_state() == SetupState::Unstarted);
  92. if (address_size != sizeof(sockaddr_un))
  93. return EINVAL;
  94. sockaddr_un address;
  95. if (!copy_from_user(&address, user_address, sizeof(sockaddr_un)))
  96. return EFAULT;
  97. if (address.sun_family != AF_LOCAL)
  98. return EINVAL;
  99. auto path = String(address.sun_path, strnlen(address.sun_path, sizeof(address.sun_path)));
  100. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) bind({})", this, path);
  101. mode_t mode = S_IFSOCK | (m_prebind_mode & 0777);
  102. UidAndGid owner { m_prebind_uid, m_prebind_gid };
  103. auto result = VirtualFileSystem::the().open(path, O_CREAT | O_EXCL | O_NOFOLLOW_NOERROR, mode, Process::current()->current_directory(), owner);
  104. if (result.is_error()) {
  105. if (result.error() == -EEXIST)
  106. return EADDRINUSE;
  107. return result.error();
  108. }
  109. auto file = move(result.value());
  110. VERIFY(file->inode());
  111. if (!file->inode()->bind_socket(*this))
  112. return EADDRINUSE;
  113. m_file = move(file);
  114. m_address = address;
  115. m_bound = true;
  116. return KSuccess;
  117. }
  118. KResult LocalSocket::connect(FileDescription& description, Userspace<const sockaddr*> address, socklen_t address_size, ShouldBlock)
  119. {
  120. VERIFY(!m_bound);
  121. if (address_size != sizeof(sockaddr_un))
  122. return EINVAL;
  123. u16 sa_family_copy;
  124. auto* user_address = reinterpret_cast<const sockaddr*>(address.unsafe_userspace_ptr());
  125. if (!copy_from_user(&sa_family_copy, &user_address->sa_family, sizeof(u16)))
  126. return EFAULT;
  127. if (sa_family_copy != AF_LOCAL)
  128. return EINVAL;
  129. if (is_connected())
  130. return EISCONN;
  131. const auto& local_address = *reinterpret_cast<const sockaddr_un*>(user_address);
  132. char safe_address[sizeof(local_address.sun_path) + 1] = { 0 };
  133. if (!copy_from_user(&safe_address[0], &local_address.sun_path[0], sizeof(safe_address) - 1))
  134. return EFAULT;
  135. safe_address[sizeof(safe_address) - 1] = '\0';
  136. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) connect({})", this, safe_address);
  137. auto description_or_error = VirtualFileSystem::the().open(safe_address, O_RDWR, 0, Process::current()->current_directory());
  138. if (description_or_error.is_error())
  139. return ECONNREFUSED;
  140. m_file = move(description_or_error.value());
  141. VERIFY(m_file->inode());
  142. if (!m_file->inode()->socket())
  143. return ECONNREFUSED;
  144. m_address.sun_family = sa_family_copy;
  145. memcpy(m_address.sun_path, safe_address, sizeof(m_address.sun_path));
  146. VERIFY(m_connect_side_fd == &description);
  147. set_connect_side_role(Role::Connecting);
  148. auto peer = m_file->inode()->socket();
  149. auto result = peer->queue_connection_from(*this);
  150. if (result.is_error()) {
  151. set_connect_side_role(Role::None);
  152. return result;
  153. }
  154. if (is_connected()) {
  155. set_connect_side_role(Role::Connected);
  156. return KSuccess;
  157. }
  158. auto unblock_flags = Thread::FileDescriptionBlocker::BlockFlags::None;
  159. if (Thread::current()->block<Thread::ConnectBlocker>({}, description, unblock_flags).was_interrupted()) {
  160. set_connect_side_role(Role::None);
  161. return EINTR;
  162. }
  163. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) connect({}) status is {}", this, safe_address, to_string(setup_state()));
  164. if (!has_flag(unblock_flags, Thread::FileDescriptionBlocker::BlockFlags::Connect)) {
  165. set_connect_side_role(Role::None);
  166. return ECONNREFUSED;
  167. }
  168. set_connect_side_role(Role::Connected);
  169. return KSuccess;
  170. }
  171. KResult LocalSocket::listen(size_t backlog)
  172. {
  173. Locker locker(lock());
  174. if (type() != SOCK_STREAM)
  175. return EOPNOTSUPP;
  176. set_backlog(backlog);
  177. auto previous_role = m_role;
  178. m_role = Role::Listener;
  179. set_connect_side_role(Role::Listener, previous_role != m_role);
  180. dbgln_if(LOCAL_SOCKET_DEBUG, "LocalSocket({}) listening with backlog={}", this, backlog);
  181. return KSuccess;
  182. }
  183. KResult LocalSocket::attach(FileDescription& description)
  184. {
  185. VERIFY(!m_accept_side_fd_open);
  186. if (m_connect_side_role == Role::None) {
  187. VERIFY(m_connect_side_fd == nullptr);
  188. m_connect_side_fd = &description;
  189. } else {
  190. VERIFY(m_connect_side_fd != &description);
  191. m_accept_side_fd_open = true;
  192. }
  193. evaluate_block_conditions();
  194. return KSuccess;
  195. }
  196. void LocalSocket::detach(FileDescription& description)
  197. {
  198. if (m_connect_side_fd == &description) {
  199. m_connect_side_fd = nullptr;
  200. } else {
  201. VERIFY(m_accept_side_fd_open);
  202. m_accept_side_fd_open = false;
  203. }
  204. evaluate_block_conditions();
  205. }
  206. bool LocalSocket::can_read(const FileDescription& description, size_t) const
  207. {
  208. auto role = this->role(description);
  209. if (role == Role::Listener)
  210. return can_accept();
  211. if (role == Role::Accepted)
  212. return !has_attached_peer(description) || !m_for_server.is_empty();
  213. if (role == Role::Connected)
  214. return !has_attached_peer(description) || !m_for_client.is_empty();
  215. return false;
  216. }
  217. bool LocalSocket::has_attached_peer(const FileDescription& description) const
  218. {
  219. auto role = this->role(description);
  220. if (role == Role::Accepted)
  221. return m_connect_side_fd != nullptr;
  222. if (role == Role::Connected)
  223. return m_accept_side_fd_open;
  224. VERIFY_NOT_REACHED();
  225. }
  226. bool LocalSocket::can_write(const FileDescription& description, size_t) const
  227. {
  228. auto role = this->role(description);
  229. if (role == Role::Accepted)
  230. return !has_attached_peer(description) || m_for_client.space_for_writing();
  231. if (role == Role::Connected)
  232. return !has_attached_peer(description) || m_for_server.space_for_writing();
  233. return false;
  234. }
  235. KResultOr<size_t> LocalSocket::sendto(FileDescription& description, const UserOrKernelBuffer& data, size_t data_size, int, Userspace<const sockaddr*>, socklen_t)
  236. {
  237. if (!has_attached_peer(description))
  238. return EPIPE;
  239. auto* socket_buffer = send_buffer_for(description);
  240. if (!socket_buffer)
  241. return EINVAL;
  242. auto nwritten_or_error = socket_buffer->write(data, data_size);
  243. if (!nwritten_or_error.is_error() && nwritten_or_error.value() > 0)
  244. Thread::current()->did_unix_socket_write(nwritten_or_error.value());
  245. return nwritten_or_error;
  246. }
  247. DoubleBuffer* LocalSocket::receive_buffer_for(FileDescription& description)
  248. {
  249. auto role = this->role(description);
  250. if (role == Role::Accepted)
  251. return &m_for_server;
  252. if (role == Role::Connected)
  253. return &m_for_client;
  254. return nullptr;
  255. }
  256. DoubleBuffer* LocalSocket::send_buffer_for(FileDescription& description)
  257. {
  258. auto role = this->role(description);
  259. if (role == Role::Connected)
  260. return &m_for_server;
  261. if (role == Role::Accepted)
  262. return &m_for_client;
  263. return nullptr;
  264. }
  265. KResultOr<size_t> LocalSocket::recvfrom(FileDescription& description, UserOrKernelBuffer& buffer, size_t buffer_size, int, Userspace<sockaddr*>, Userspace<socklen_t*>, Time&)
  266. {
  267. auto* socket_buffer = receive_buffer_for(description);
  268. if (!socket_buffer)
  269. return EINVAL;
  270. if (!description.is_blocking()) {
  271. if (socket_buffer->is_empty()) {
  272. if (!has_attached_peer(description))
  273. return 0;
  274. return EAGAIN;
  275. }
  276. } else if (!can_read(description, 0)) {
  277. auto unblock_flags = Thread::FileDescriptionBlocker::BlockFlags::None;
  278. if (Thread::current()->block<Thread::ReadBlocker>({}, description, unblock_flags).was_interrupted())
  279. return EINTR;
  280. }
  281. if (!has_attached_peer(description) && socket_buffer->is_empty())
  282. return 0;
  283. VERIFY(!socket_buffer->is_empty());
  284. auto nread_or_error = socket_buffer->read(buffer, buffer_size);
  285. if (!nread_or_error.is_error() && nread_or_error.value() > 0)
  286. Thread::current()->did_unix_socket_read(nread_or_error.value());
  287. return nread_or_error;
  288. }
  289. StringView LocalSocket::socket_path() const
  290. {
  291. size_t len = strnlen(m_address.sun_path, sizeof(m_address.sun_path));
  292. return { m_address.sun_path, len };
  293. }
  294. String LocalSocket::absolute_path(const FileDescription& description) const
  295. {
  296. StringBuilder builder;
  297. builder.append("socket:");
  298. builder.append(socket_path());
  299. switch (role(description)) {
  300. case Role::Listener:
  301. builder.append(" (listening)");
  302. break;
  303. case Role::Accepted:
  304. builder.appendff(" (accepted from pid {})", origin_pid());
  305. break;
  306. case Role::Connected:
  307. builder.appendff(" (connected to pid {})", acceptor_pid());
  308. break;
  309. case Role::Connecting:
  310. builder.append(" (connecting)");
  311. break;
  312. default:
  313. break;
  314. }
  315. return builder.to_string();
  316. }
  317. KResult LocalSocket::getsockopt(FileDescription& description, int level, int option, Userspace<void*> value, Userspace<socklen_t*> value_size)
  318. {
  319. if (level != SOL_SOCKET)
  320. return Socket::getsockopt(description, level, option, value, value_size);
  321. socklen_t size;
  322. if (!copy_from_user(&size, value_size.unsafe_userspace_ptr()))
  323. return EFAULT;
  324. switch (option) {
  325. case SO_SNDBUF:
  326. TODO();
  327. case SO_RCVBUF:
  328. TODO();
  329. case SO_PEERCRED: {
  330. if (size < sizeof(ucred))
  331. return EINVAL;
  332. switch (role(description)) {
  333. case Role::Accepted:
  334. if (!copy_to_user(static_ptr_cast<ucred*>(value), &m_origin))
  335. return EFAULT;
  336. size = sizeof(ucred);
  337. if (!copy_to_user(value_size, &size))
  338. return EFAULT;
  339. return KSuccess;
  340. case Role::Connected:
  341. if (!copy_to_user(static_ptr_cast<ucred*>(value), &m_acceptor))
  342. return EFAULT;
  343. size = sizeof(ucred);
  344. if (!copy_to_user(value_size, &size))
  345. return EFAULT;
  346. return KSuccess;
  347. case Role::Connecting:
  348. return ENOTCONN;
  349. default:
  350. return EINVAL;
  351. }
  352. break;
  353. }
  354. default:
  355. return Socket::getsockopt(description, level, option, value, value_size);
  356. }
  357. }
  358. KResult LocalSocket::chmod(FileDescription&, mode_t mode)
  359. {
  360. if (m_file)
  361. return m_file->chmod(mode);
  362. m_prebind_mode = mode & 0777;
  363. return KSuccess;
  364. }
  365. KResult LocalSocket::chown(FileDescription&, uid_t uid, gid_t gid)
  366. {
  367. if (m_file)
  368. return m_file->chown(uid, gid);
  369. auto current_process = Process::current();
  370. if (!current_process->is_superuser() && (current_process->euid() != uid || !current_process->in_group(gid)))
  371. return EPERM;
  372. m_prebind_uid = uid;
  373. m_prebind_gid = gid;
  374. return KSuccess;
  375. }
  376. NonnullRefPtrVector<FileDescription>& LocalSocket::recvfd_queue_for(const FileDescription& description)
  377. {
  378. auto role = this->role(description);
  379. if (role == Role::Connected)
  380. return m_fds_for_client;
  381. if (role == Role::Accepted)
  382. return m_fds_for_server;
  383. VERIFY_NOT_REACHED();
  384. }
  385. NonnullRefPtrVector<FileDescription>& LocalSocket::sendfd_queue_for(const FileDescription& description)
  386. {
  387. auto role = this->role(description);
  388. if (role == Role::Connected)
  389. return m_fds_for_server;
  390. if (role == Role::Accepted)
  391. return m_fds_for_client;
  392. VERIFY_NOT_REACHED();
  393. }
  394. KResult LocalSocket::sendfd(const FileDescription& socket_description, FileDescription& passing_description)
  395. {
  396. Locker locker(lock());
  397. auto role = this->role(socket_description);
  398. if (role != Role::Connected && role != Role::Accepted)
  399. return EINVAL;
  400. auto& queue = sendfd_queue_for(socket_description);
  401. // FIXME: Figure out how we should limit this properly.
  402. if (queue.size() > 128)
  403. return EBUSY;
  404. if (!queue.try_append(move(passing_description)))
  405. return ENOMEM;
  406. return KSuccess;
  407. }
  408. KResultOr<NonnullRefPtr<FileDescription>> LocalSocket::recvfd(const FileDescription& socket_description)
  409. {
  410. Locker locker(lock());
  411. auto role = this->role(socket_description);
  412. if (role != Role::Connected && role != Role::Accepted)
  413. return EINVAL;
  414. auto& queue = recvfd_queue_for(socket_description);
  415. if (queue.is_empty()) {
  416. // FIXME: Figure out the perfect error code for this.
  417. return EAGAIN;
  418. }
  419. return queue.take_first();
  420. }
  421. }