socket.cpp 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441
  1. /*
  2. * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
  3. *
  4. * SPDX-License-Identifier: BSD-2-Clause
  5. */
  6. #include <AK/ByteBuffer.h>
  7. #include <Kernel/FileSystem/OpenFileDescription.h>
  8. #include <Kernel/Net/LocalSocket.h>
  9. #include <Kernel/Process.h>
  10. #include <Kernel/UnixTypes.h>
  11. namespace Kernel {
  12. #define REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain) \
  13. do { \
  14. if (domain == AF_INET) \
  15. TRY(require_promise(Pledge::inet)); \
  16. else if (domain == AF_LOCAL) \
  17. TRY(require_promise(Pledge::unix)); \
  18. } while (0)
  19. static void setup_socket_fd(Process::OpenFileDescriptions& fds, int fd, NonnullLockRefPtr<OpenFileDescription> description, int type)
  20. {
  21. description->set_readable(true);
  22. description->set_writable(true);
  23. unsigned flags = 0;
  24. if (type & SOCK_CLOEXEC)
  25. flags |= FD_CLOEXEC;
  26. if (type & SOCK_NONBLOCK)
  27. description->set_blocking(false);
  28. fds[fd].set(*description, flags);
  29. }
  30. ErrorOr<FlatPtr> Process::sys$socket(int domain, int type, int protocol)
  31. {
  32. VERIFY_NO_PROCESS_BIG_LOCK(this);
  33. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(domain);
  34. auto credentials = this->credentials();
  35. if ((type & SOCK_TYPE_MASK) == SOCK_RAW && !credentials->is_superuser())
  36. return EACCES;
  37. return m_fds.with_exclusive([&](auto& fds) -> ErrorOr<FlatPtr> {
  38. auto fd_allocation = TRY(fds.allocate());
  39. auto socket = TRY(Socket::create(domain, type, protocol));
  40. auto description = TRY(OpenFileDescription::try_create(socket));
  41. setup_socket_fd(fds, fd_allocation.fd, move(description), type);
  42. return fd_allocation.fd;
  43. });
  44. }
  45. ErrorOr<FlatPtr> Process::sys$bind(int sockfd, Userspace<sockaddr const*> address, socklen_t address_length)
  46. {
  47. VERIFY_NO_PROCESS_BIG_LOCK(this);
  48. auto description = TRY(open_file_description(sockfd));
  49. if (!description->is_socket())
  50. return ENOTSOCK;
  51. auto& socket = *description->socket();
  52. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  53. TRY(socket.bind(credentials(), address, address_length));
  54. return 0;
  55. }
  56. ErrorOr<FlatPtr> Process::sys$listen(int sockfd, int backlog)
  57. {
  58. VERIFY_NO_PROCESS_BIG_LOCK(this);
  59. if (backlog < 0)
  60. return EINVAL;
  61. auto description = TRY(open_file_description(sockfd));
  62. if (!description->is_socket())
  63. return ENOTSOCK;
  64. auto& socket = *description->socket();
  65. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  66. if (socket.is_connected())
  67. return EINVAL;
  68. TRY(socket.listen(backlog));
  69. return 0;
  70. }
  71. ErrorOr<FlatPtr> Process::sys$accept4(Userspace<Syscall::SC_accept4_params const*> user_params)
  72. {
  73. VERIFY_NO_PROCESS_BIG_LOCK(this);
  74. TRY(require_promise(Pledge::accept));
  75. auto params = TRY(copy_typed_from_user(user_params));
  76. int accepting_socket_fd = params.sockfd;
  77. Userspace<sockaddr*> user_address((FlatPtr)params.addr);
  78. Userspace<socklen_t*> user_address_size((FlatPtr)params.addrlen);
  79. int flags = params.flags;
  80. socklen_t address_size = 0;
  81. if (user_address)
  82. TRY(copy_from_user(&address_size, static_ptr_cast<socklen_t const*>(user_address_size)));
  83. ScopedDescriptionAllocation fd_allocation;
  84. LockRefPtr<OpenFileDescription> accepting_socket_description;
  85. TRY(m_fds.with_exclusive([&](auto& fds) -> ErrorOr<void> {
  86. fd_allocation = TRY(fds.allocate());
  87. accepting_socket_description = TRY(fds.open_file_description(accepting_socket_fd));
  88. return {};
  89. }));
  90. if (!accepting_socket_description->is_socket())
  91. return ENOTSOCK;
  92. auto& socket = *accepting_socket_description->socket();
  93. LockRefPtr<Socket> accepted_socket;
  94. for (;;) {
  95. accepted_socket = socket.accept();
  96. if (accepted_socket)
  97. break;
  98. if (!accepting_socket_description->is_blocking())
  99. return EAGAIN;
  100. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  101. if (Thread::current()->block<Thread::AcceptBlocker>({}, *accepting_socket_description, unblock_flags).was_interrupted())
  102. return EINTR;
  103. }
  104. if (user_address) {
  105. sockaddr_un address_buffer {};
  106. address_size = min(sizeof(sockaddr_un), static_cast<size_t>(address_size));
  107. accepted_socket->get_peer_address((sockaddr*)&address_buffer, &address_size);
  108. TRY(copy_to_user(user_address, &address_buffer, address_size));
  109. TRY(copy_to_user(user_address_size, &address_size));
  110. }
  111. auto accepted_socket_description = TRY(OpenFileDescription::try_create(*accepted_socket));
  112. accepted_socket_description->set_readable(true);
  113. accepted_socket_description->set_writable(true);
  114. if (flags & SOCK_NONBLOCK)
  115. accepted_socket_description->set_blocking(false);
  116. int fd_flags = 0;
  117. if (flags & SOCK_CLOEXEC)
  118. fd_flags |= FD_CLOEXEC;
  119. TRY(m_fds.with_exclusive([&](auto& fds) -> ErrorOr<void> {
  120. fds[fd_allocation.fd].set(move(accepted_socket_description), fd_flags);
  121. return {};
  122. }));
  123. // NOTE: Moving this state to Completed is what causes connect() to unblock on the client side.
  124. accepted_socket->set_setup_state(Socket::SetupState::Completed);
  125. return fd_allocation.fd;
  126. }
  127. ErrorOr<FlatPtr> Process::sys$connect(int sockfd, Userspace<sockaddr const*> user_address, socklen_t user_address_size)
  128. {
  129. VERIFY_NO_PROCESS_BIG_LOCK(this);
  130. auto description = TRY(open_file_description(sockfd));
  131. if (!description->is_socket())
  132. return ENOTSOCK;
  133. auto& socket = *description->socket();
  134. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  135. TRY(socket.connect(credentials(), *description, user_address, user_address_size));
  136. return 0;
  137. }
  138. ErrorOr<FlatPtr> Process::sys$shutdown(int sockfd, int how)
  139. {
  140. VERIFY_NO_PROCESS_BIG_LOCK(this);
  141. TRY(require_promise(Pledge::stdio));
  142. if (how != SHUT_RD && how != SHUT_WR && how != SHUT_RDWR)
  143. return EINVAL;
  144. auto description = TRY(open_file_description(sockfd));
  145. if (!description->is_socket())
  146. return ENOTSOCK;
  147. auto& socket = *description->socket();
  148. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  149. TRY(socket.shutdown(how));
  150. return 0;
  151. }
  152. ErrorOr<FlatPtr> Process::sys$sendmsg(int sockfd, Userspace<const struct msghdr*> user_msg, int flags)
  153. {
  154. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
  155. TRY(require_promise(Pledge::stdio));
  156. auto msg = TRY(copy_typed_from_user(user_msg));
  157. if (msg.msg_iovlen != 1)
  158. return ENOTSUP; // FIXME: Support this :)
  159. Vector<iovec, 1> iovs;
  160. TRY(iovs.try_resize(msg.msg_iovlen));
  161. TRY(copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen));
  162. if (iovs[0].iov_len > NumericLimits<ssize_t>::max())
  163. return EINVAL;
  164. Userspace<sockaddr const*> user_addr((FlatPtr)msg.msg_name);
  165. socklen_t addr_length = msg.msg_namelen;
  166. auto description = TRY(open_file_description(sockfd));
  167. if (!description->is_socket())
  168. return ENOTSOCK;
  169. auto& socket = *description->socket();
  170. if (socket.is_shut_down_for_writing()) {
  171. if ((flags & MSG_NOSIGNAL) == 0)
  172. Thread::current()->send_signal(SIGPIPE, &Process::current());
  173. return EPIPE;
  174. }
  175. if (msg.msg_controllen > 0) {
  176. // Handle command messages.
  177. auto cmsg_buffer = TRY(ByteBuffer::create_uninitialized(msg.msg_controllen));
  178. TRY(copy_from_user(cmsg_buffer.data(), msg.msg_control, msg.msg_controllen));
  179. msg.msg_control = cmsg_buffer.data();
  180. for (struct cmsghdr* cmsg = CMSG_FIRSTHDR(&msg); cmsg != nullptr; cmsg = CMSG_NXTHDR(&msg, cmsg)) {
  181. if (socket.is_local() && cmsg->cmsg_level == SOL_SOCKET && cmsg->cmsg_type == SCM_RIGHTS) {
  182. auto& local_socket = static_cast<LocalSocket&>(socket);
  183. int* fds = (int*)CMSG_DATA(cmsg);
  184. size_t nfds = (cmsg->cmsg_len - CMSG_ALIGN(sizeof(struct cmsghdr))) / sizeof(int);
  185. for (size_t i = 0; i < nfds; ++i) {
  186. TRY(local_socket.sendfd(*description, TRY(open_file_description(fds[i]))));
  187. }
  188. }
  189. }
  190. }
  191. auto data_buffer = TRY(UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len));
  192. while (true) {
  193. while (!description->can_write()) {
  194. if (!description->is_blocking()) {
  195. return EAGAIN;
  196. }
  197. auto unblock_flags = Thread::FileBlocker::BlockFlags::None;
  198. if (Thread::current()->block<Thread::WriteBlocker>({}, *description, unblock_flags).was_interrupted()) {
  199. return EINTR;
  200. }
  201. // TODO: handle exceptions in unblock_flags
  202. }
  203. auto bytes_sent_or_error = socket.sendto(*description, data_buffer, iovs[0].iov_len, flags, user_addr, addr_length);
  204. if (bytes_sent_or_error.is_error()) {
  205. if ((flags & MSG_NOSIGNAL) == 0 && bytes_sent_or_error.error().code() == EPIPE)
  206. Thread::current()->send_signal(SIGPIPE, &Process::current());
  207. return bytes_sent_or_error.release_error();
  208. }
  209. auto bytes_sent = bytes_sent_or_error.release_value();
  210. if (bytes_sent > 0)
  211. return bytes_sent;
  212. }
  213. }
  214. ErrorOr<FlatPtr> Process::sys$recvmsg(int sockfd, Userspace<struct msghdr*> user_msg, int flags)
  215. {
  216. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
  217. TRY(require_promise(Pledge::stdio));
  218. struct msghdr msg;
  219. TRY(copy_from_user(&msg, user_msg));
  220. if (msg.msg_iovlen != 1)
  221. return ENOTSUP; // FIXME: Support this :)
  222. Vector<iovec, 1> iovs;
  223. TRY(iovs.try_resize(msg.msg_iovlen));
  224. TRY(copy_n_from_user(iovs.data(), msg.msg_iov, msg.msg_iovlen));
  225. Userspace<sockaddr*> user_addr((FlatPtr)msg.msg_name);
  226. Userspace<socklen_t*> user_addr_length(msg.msg_name ? (FlatPtr)&user_msg.unsafe_userspace_ptr()->msg_namelen : 0);
  227. auto description = TRY(open_file_description(sockfd));
  228. if (!description->is_socket())
  229. return ENOTSOCK;
  230. auto& socket = *description->socket();
  231. if (socket.is_shut_down_for_reading())
  232. return 0;
  233. auto data_buffer = TRY(UserOrKernelBuffer::for_user_buffer((u8*)iovs[0].iov_base, iovs[0].iov_len));
  234. Time timestamp {};
  235. bool blocking = (flags & MSG_DONTWAIT) ? false : description->is_blocking();
  236. auto result = socket.recvfrom(*description, data_buffer, iovs[0].iov_len, flags, user_addr, user_addr_length, timestamp, blocking);
  237. if (result.is_error())
  238. return result.release_error();
  239. int msg_flags = 0;
  240. if (result.value() > iovs[0].iov_len) {
  241. VERIFY(socket.type() != SOCK_STREAM);
  242. msg_flags |= MSG_TRUNC;
  243. }
  244. socklen_t current_cmsg_len = 0;
  245. auto try_add_cmsg = [&](int level, int type, void const* data, socklen_t len) -> ErrorOr<bool> {
  246. if (current_cmsg_len + len > msg.msg_controllen) {
  247. msg_flags |= MSG_CTRUNC;
  248. return false;
  249. }
  250. cmsghdr cmsg = { (socklen_t)CMSG_LEN(len), level, type };
  251. cmsghdr* target = (cmsghdr*)(((char*)msg.msg_control) + current_cmsg_len);
  252. TRY(copy_to_user(target, &cmsg));
  253. TRY(copy_to_user(CMSG_DATA(target), data, len));
  254. current_cmsg_len += CMSG_ALIGN(cmsg.cmsg_len);
  255. return true;
  256. };
  257. if (socket.wants_timestamp()) {
  258. timeval time = timestamp.to_timeval();
  259. TRY(try_add_cmsg(SOL_SOCKET, SCM_TIMESTAMP, &time, sizeof(time)));
  260. }
  261. int space_for_fds = (msg.msg_controllen - current_cmsg_len - sizeof(struct cmsghdr)) / sizeof(int);
  262. if (space_for_fds > 0 && socket.is_local()) {
  263. auto& local_socket = static_cast<LocalSocket&>(socket);
  264. auto descriptions = TRY(local_socket.recvfds(description, space_for_fds));
  265. Vector<int> fdnums;
  266. for (auto& description : descriptions) {
  267. auto fd_allocation = TRY(m_fds.with_exclusive([](auto& fds) { return fds.allocate(); }));
  268. m_fds.with_exclusive([&](auto& fds) { fds[fd_allocation.fd].set(description, 0); });
  269. fdnums.append(fd_allocation.fd);
  270. }
  271. TRY(try_add_cmsg(SOL_SOCKET, SCM_RIGHTS, fdnums.data(), fdnums.size() * sizeof(int)));
  272. }
  273. TRY(copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_controllen, &current_cmsg_len));
  274. TRY(copy_to_user(&user_msg.unsafe_userspace_ptr()->msg_flags, &msg_flags));
  275. return result.value();
  276. }
  277. template<bool sockname, typename Params>
  278. ErrorOr<void> Process::get_sock_or_peer_name(Params const& params)
  279. {
  280. socklen_t addrlen_value;
  281. TRY(copy_from_user(&addrlen_value, params.addrlen, sizeof(socklen_t)));
  282. if (addrlen_value <= 0)
  283. return EINVAL;
  284. auto description = TRY(open_file_description(params.sockfd));
  285. if (!description->is_socket())
  286. return ENOTSOCK;
  287. auto& socket = *description->socket();
  288. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  289. sockaddr_un address_buffer {};
  290. addrlen_value = min(sizeof(sockaddr_un), static_cast<size_t>(addrlen_value));
  291. if constexpr (sockname)
  292. socket.get_local_address((sockaddr*)&address_buffer, &addrlen_value);
  293. else
  294. socket.get_peer_address((sockaddr*)&address_buffer, &addrlen_value);
  295. TRY(copy_to_user(params.addr, &address_buffer, addrlen_value));
  296. return copy_to_user(params.addrlen, &addrlen_value);
  297. }
  298. ErrorOr<FlatPtr> Process::sys$getsockname(Userspace<Syscall::SC_getsockname_params const*> user_params)
  299. {
  300. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
  301. auto params = TRY(copy_typed_from_user(user_params));
  302. TRY(get_sock_or_peer_name<true>(params));
  303. return 0;
  304. }
  305. ErrorOr<FlatPtr> Process::sys$getpeername(Userspace<Syscall::SC_getpeername_params const*> user_params)
  306. {
  307. VERIFY_PROCESS_BIG_LOCK_ACQUIRED(this);
  308. auto params = TRY(copy_typed_from_user(user_params));
  309. TRY(get_sock_or_peer_name<false>(params));
  310. return 0;
  311. }
  312. ErrorOr<FlatPtr> Process::sys$getsockopt(Userspace<Syscall::SC_getsockopt_params const*> user_params)
  313. {
  314. VERIFY_NO_PROCESS_BIG_LOCK(this);
  315. auto params = TRY(copy_typed_from_user(user_params));
  316. int sockfd = params.sockfd;
  317. int level = params.level;
  318. int option = params.option;
  319. Userspace<void*> user_value((FlatPtr)params.value);
  320. Userspace<socklen_t*> user_value_size((FlatPtr)params.value_size);
  321. socklen_t value_size;
  322. TRY(copy_from_user(&value_size, params.value_size, sizeof(socklen_t)));
  323. auto description = TRY(open_file_description(sockfd));
  324. if (!description->is_socket())
  325. return ENOTSOCK;
  326. auto& socket = *description->socket();
  327. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  328. TRY(socket.getsockopt(*description, level, option, user_value, user_value_size));
  329. return 0;
  330. }
  331. ErrorOr<FlatPtr> Process::sys$setsockopt(Userspace<Syscall::SC_setsockopt_params const*> user_params)
  332. {
  333. VERIFY_NO_PROCESS_BIG_LOCK(this);
  334. auto params = TRY(copy_typed_from_user(user_params));
  335. Userspace<void const*> user_value((FlatPtr)params.value);
  336. auto description = TRY(open_file_description(params.sockfd));
  337. if (!description->is_socket())
  338. return ENOTSOCK;
  339. auto& socket = *description->socket();
  340. REQUIRE_PROMISE_FOR_SOCKET_DOMAIN(socket.domain());
  341. TRY(socket.setsockopt(params.level, params.option, user_value, params.value_size));
  342. return 0;
  343. }
  344. ErrorOr<FlatPtr> Process::sys$socketpair(Userspace<Syscall::SC_socketpair_params const*> user_params)
  345. {
  346. VERIFY_NO_PROCESS_BIG_LOCK(this);
  347. auto params = TRY(copy_typed_from_user(user_params));
  348. if (params.domain != AF_LOCAL)
  349. return EINVAL;
  350. if (params.protocol != 0 && params.protocol != PF_LOCAL)
  351. return EINVAL;
  352. auto pair = TRY(LocalSocket::try_create_connected_pair(params.type & SOCK_TYPE_MASK));
  353. return m_fds.with_exclusive([&](auto& fds) -> ErrorOr<FlatPtr> {
  354. auto fd_allocation0 = TRY(fds.allocate());
  355. auto fd_allocation1 = TRY(fds.allocate());
  356. int allocated_fds[2];
  357. allocated_fds[0] = fd_allocation0.fd;
  358. allocated_fds[1] = fd_allocation1.fd;
  359. setup_socket_fd(fds, allocated_fds[0], pair.description0, params.type);
  360. setup_socket_fd(fds, allocated_fds[1], pair.description1, params.type);
  361. if (copy_to_user(params.sv, allocated_fds, sizeof(allocated_fds)).is_error()) {
  362. // Avoid leaking both file descriptors on error.
  363. fds[allocated_fds[0]] = {};
  364. fds[allocated_fds[1]] = {};
  365. return EFAULT;
  366. }
  367. return 0;
  368. });
  369. }
  370. }