shim_socket.c 51 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865
  1. /* Copyright (C) 2014 Stony Brook University
  2. This file is part of Graphene Library OS.
  3. Graphene Library OS is free software: you can redistribute it and/or
  4. modify it under the terms of the GNU Lesser General Public License
  5. as published by the Free Software Foundation, either version 3 of the
  6. License, or (at your option) any later version.
  7. Graphene Library OS is distributed in the hope that it will be useful,
  8. but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. GNU Lesser General Public License for more details.
  11. You should have received a copy of the GNU Lesser General Public License
  12. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  13. /*
  14. * shim_socket.c
  15. *
  16. * Implementation of system call "socket", "bind", "accept4", "listen",
  17. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  18. * "getsockname", "getpeername".
  19. */
  20. #include <shim_internal.h>
  21. #include <shim_table.h>
  22. #include <shim_handle.h>
  23. #include <shim_fs.h>
  24. #include <shim_utils.h>
  25. #include <shim_checkpoint.h>
  26. #include <pal.h>
  27. #include <pal_error.h>
  28. #include <errno.h>
  29. #include <linux/fcntl.h>
  30. #include <linux/in.h>
  31. #include <linux/in6.h>
  32. #include <asm/socket.h>
  33. /*
  34. * User-settable options (used with setsockopt).
  35. */
  36. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  37. #define TCP_MAXSEG 2 /* Set maximum segment size */
  38. #define TCP_CORK 3 /* Control sending of partial frames */
  39. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  40. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  41. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  42. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  43. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  44. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  45. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  46. #define TCP_INFO 11 /* Information about this connection. */
  47. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  48. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  49. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  50. #define AF_UNSPEC 0
  51. #define SOCK_URI_SIZE 108
  52. static int rebase_on_lo __attribute_migratable = -1;
  53. static size_t minimal_addrlen (int domain)
  54. {
  55. switch(domain) {
  56. case AF_INET:
  57. return sizeof(struct sockaddr_in);
  58. case AF_INET6:
  59. return sizeof(struct sockaddr_in6);
  60. default:
  61. return sizeof(struct sockaddr);
  62. }
  63. }
  64. static int init_port_rebase (void)
  65. {
  66. if (rebase_on_lo != -1)
  67. return 0;
  68. char cfg[CONFIG_MAX];
  69. int rebase = 0;
  70. if (!root_config ||
  71. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  72. rebase_on_lo = 0;
  73. return 0;
  74. }
  75. for (const char * p = cfg ; *p ; p++) {
  76. if (*p < '0' || *p > '9' || rebase > 32767) {
  77. rebase_on_lo = 0;
  78. return 0;
  79. }
  80. rebase = rebase * 10 + (*p - '0');
  81. }
  82. rebase_on_lo = rebase;
  83. return 0;
  84. }
  85. static int inet_parse_addr (int domain, int type, const char * uri,
  86. struct addr_inet * bind,
  87. struct addr_inet * conn);
  88. static int __process_pending_options (struct shim_handle * hdl);
  89. int shim_do_socket (int family, int type, int protocol)
  90. {
  91. struct shim_handle * hdl = get_new_handle();
  92. if (!hdl)
  93. return -ENOMEM;
  94. struct shim_sock_handle * sock = &hdl->info.sock;
  95. hdl->type = TYPE_SOCK;
  96. set_handle_fs(hdl, &socket_builtin_fs);
  97. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  98. hdl->acc_mode = 0;
  99. sock->domain = family;
  100. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  101. sock->protocol = protocol;
  102. int ret = -ENOSYS;
  103. switch (sock->domain) {
  104. case AF_UNIX: //Local communication
  105. case AF_INET: //IPv4 Internet protocols ip(7)
  106. case AF_INET6: //IPv6 Internet protocols
  107. break;
  108. default:
  109. debug("shim_socket: unknown socket domain %d\n",
  110. sock->domain);
  111. goto err;
  112. }
  113. switch (sock->sock_type) {
  114. case SOCK_STREAM: //TCP
  115. break;
  116. case SOCK_DGRAM: //UDP
  117. hdl->acc_mode = MAY_READ|MAY_WRITE;
  118. break;
  119. default:
  120. debug("shim_socket: unknown socket type %d\n",
  121. sock->sock_type);
  122. goto err;
  123. }
  124. sock->sock_state = SOCK_CREATED;
  125. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  126. err:
  127. put_handle(hdl);
  128. return ret;
  129. }
  130. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  131. unsigned int pipeid)
  132. {
  133. int bytes = 0;
  134. switch (state) {
  135. case SOCK_CREATED:
  136. case SOCK_BOUNDCONNECTED:
  137. case SOCK_SHUTDOWN:
  138. return -ENOTCONN;
  139. case SOCK_BOUND:
  140. case SOCK_LISTENED:
  141. case SOCK_ACCEPTED:
  142. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  143. break;
  144. case SOCK_CONNECTED:
  145. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  146. break;
  147. default:
  148. return -ENOTCONN;
  149. }
  150. return bytes == count ? -ENAMETOOLONG : bytes;
  151. }
  152. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  153. bool local)
  154. {
  155. init_port_rebase();
  156. if (rebase_on_lo) {
  157. if (domain == AF_INET) {
  158. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  159. if (!local && memcmp(ad, "\177\0\0\1", 4))
  160. return;
  161. }
  162. if (domain == AF_INET6) {
  163. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  164. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  165. return;
  166. }
  167. }
  168. if (reverse)
  169. addr->port = addr->ext_port - rebase_on_lo;
  170. else
  171. addr->ext_port = addr->port + rebase_on_lo;
  172. }
  173. static int inet_translate_addr (int domain, char * uri, int count,
  174. struct addr_inet * addr)
  175. {
  176. if (domain == AF_INET) {
  177. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  178. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  179. ad[0], ad[1], ad[2], ad[3],
  180. addr->ext_port);
  181. return bytes == count ? -ENAMETOOLONG : bytes;
  182. }
  183. if (domain == AF_INET6) {
  184. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  185. int bytes = snprintf(uri, count,
  186. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  187. __ntohs(ad[0]), __ntohs(ad[1]),
  188. __ntohs(ad[2]), __ntohs(ad[3]),
  189. __ntohs(ad[4]), __ntohs(ad[5]),
  190. __ntohs(ad[6]), __ntohs(ad[7]),
  191. addr->ext_port);
  192. return bytes == count ? -ENAMETOOLONG : bytes;
  193. }
  194. return -EPROTONOSUPPORT;
  195. }
  196. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  197. enum shim_sock_state state,
  198. struct addr_inet * bind, struct addr_inet * conn)
  199. {
  200. int bytes = 0, ret;
  201. if (sock_type == SOCK_STREAM) {
  202. switch (state) {
  203. case SOCK_CREATED:
  204. case SOCK_SHUTDOWN:
  205. return -ENOTCONN;
  206. case SOCK_BOUND:
  207. case SOCK_LISTENED:
  208. if (count < 9)
  209. return -ENAMETOOLONG;
  210. memcpy(uri, "tcp.srv:", 9);
  211. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  212. return ret < 0 ? ret : ret + 8;
  213. case SOCK_BOUNDCONNECTED:
  214. if (count < 5)
  215. return -ENAMETOOLONG;
  216. memcpy(uri, "tcp:", 5);
  217. bytes = 4;
  218. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  219. bind);
  220. if (ret < 0)
  221. return ret;
  222. uri[bytes + ret] = ':';
  223. bytes += ret + 1;
  224. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  225. conn);
  226. return ret < 0 ? ret : ret + bytes;
  227. case SOCK_CONNECTED:
  228. case SOCK_ACCEPTED:
  229. if (count < 5)
  230. return -ENAMETOOLONG;
  231. memcpy(uri, "tcp:", 5);
  232. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  233. return ret < 0 ? ret : ret + 4;
  234. }
  235. }
  236. if (sock_type == SOCK_DGRAM) {
  237. switch (state) {
  238. case SOCK_CREATED:
  239. case SOCK_SHUTDOWN:
  240. return -ENOTCONN;
  241. case SOCK_LISTENED:
  242. case SOCK_ACCEPTED:
  243. return -EOPNOTSUPP;
  244. case SOCK_BOUNDCONNECTED:
  245. if (count < 9)
  246. return -ENAMETOOLONG;
  247. memcpy(uri, "tcp.srv:", 9);
  248. bytes = 8;
  249. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  250. bind);
  251. if (ret < 0)
  252. return ret;
  253. uri[bytes + ret] = ':';
  254. bytes += ret + 1;
  255. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  256. conn);
  257. return ret < 0 ? ret : ret + bytes;
  258. case SOCK_BOUND:
  259. if (count < 9)
  260. return -ENAMETOOLONG;
  261. memcpy(uri, "udp.srv:", 9);
  262. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  263. return ret < 0 ? ret : ret + 9;
  264. case SOCK_CONNECTED:
  265. if (count < 5)
  266. return -ENAMETOOLONG;
  267. memcpy(uri, "udp:", 5);
  268. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  269. return ret < 0 ? ret : ret + 4;
  270. }
  271. }
  272. return -EPROTONOSUPPORT;
  273. }
  274. static inline void unix_copy_addr (struct sockaddr * saddr,
  275. struct shim_dentry * dent)
  276. {
  277. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  278. un->sun_family = AF_UNIX;
  279. size_t size;
  280. const char * path = dentry_get_path(dent, true, &size);
  281. memcpy(un->sun_path, path, size + 1);
  282. }
  283. static int inet_check_addr (int domain, struct sockaddr * addr, socklen_t addrlen)
  284. {
  285. if (domain == AF_INET) {
  286. if (addr->sa_family != AF_INET)
  287. return -EAFNOSUPPORT;
  288. if (addrlen != sizeof(struct sockaddr_in))
  289. return -EINVAL;
  290. return 0;
  291. }
  292. if (domain == AF_INET6) {
  293. if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
  294. return -EAFNOSUPPORT;
  295. if (addrlen != minimal_addrlen(addr->sa_family))
  296. return -EINVAL;
  297. return 0;
  298. }
  299. return -EINVAL;
  300. }
  301. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  302. const struct addr_inet * addr)
  303. {
  304. if (domain == AF_INET) {
  305. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  306. in->sin_family = AF_INET;
  307. in->sin_port = __htons(addr->port);
  308. in->sin_addr = addr->addr.v4;
  309. return sizeof(struct sockaddr_in);
  310. }
  311. if (domain == AF_INET6) {
  312. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  313. in6->sin6_family = AF_INET6;
  314. in6->sin6_port = __htons(addr->port);
  315. in6->sin6_addr = addr->addr.v6;
  316. return sizeof(struct sockaddr_in6);
  317. }
  318. return sizeof(struct sockaddr);
  319. }
  320. static void inet_save_addr (int domain, struct addr_inet * addr,
  321. const struct sockaddr * saddr)
  322. {
  323. if (domain == AF_INET) {
  324. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  325. addr->port = __ntohs(in->sin_port);
  326. addr->addr.v4 = in->sin_addr;
  327. return;
  328. }
  329. if (domain == AF_INET6) {
  330. if (saddr->sa_family == AF_INET) {
  331. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  332. addr->port = __ntohs(in->sin_port);
  333. ((uint32_t *) &addr->addr.v6.s6_addr)[0] = 0;
  334. ((uint32_t *) &addr->addr.v6.s6_addr)[1] = 0;
  335. ((uint32_t *) &addr->addr.v6.s6_addr)[2] = 0xffff0000;
  336. ((uint32_t *) &addr->addr.v6.s6_addr)[3] = in->sin_addr.s_addr;
  337. } else {
  338. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  339. addr->port = __ntohs(in6->sin6_port);
  340. addr->addr.v6 = in6->sin6_addr;
  341. }
  342. return;
  343. }
  344. }
  345. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  346. const struct sockaddr * saddr)
  347. {
  348. if (domain == AF_INET) {
  349. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  350. return addr->port == __ntohs(in->sin_port) &&
  351. !memcmp(&addr->addr.v4, &in->sin_addr,
  352. sizeof(struct in_addr));
  353. }
  354. if (domain == AF_INET6) {
  355. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  356. return addr->port == __ntohs(in6->sin6_port) &&
  357. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  358. sizeof(struct in6_addr));
  359. }
  360. return false;
  361. }
  362. static int create_socket_uri (struct shim_handle * hdl)
  363. {
  364. struct shim_sock_handle * sock = &hdl->info.sock;
  365. if (sock->domain == AF_UNIX) {
  366. char uri_buf[32];
  367. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  368. sock->addr.un.pipeid);
  369. if (bytes < 0)
  370. return bytes;
  371. qstrsetstr(&hdl->uri, uri_buf, bytes);
  372. return 0;
  373. }
  374. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  375. char uri_buf[SOCK_URI_SIZE];
  376. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  377. sock->sock_type, sock->sock_state,
  378. &sock->addr.in.bind, &sock->addr.in.conn);
  379. if (bytes < 0)
  380. return bytes;
  381. qstrsetstr(&hdl->uri, uri_buf, bytes);
  382. return 0;
  383. }
  384. return -EPROTONOSUPPORT;
  385. }
  386. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  387. {
  388. if (!addr || test_user_memory(addr, addrlen, false))
  389. return -EFAULT;
  390. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  391. int ret = -EINVAL;
  392. if (!hdl)
  393. return -EBADF;
  394. if (hdl->type != TYPE_SOCK) {
  395. put_handle(hdl);
  396. return -ENOTSOCK;
  397. }
  398. struct shim_sock_handle * sock = &hdl->info.sock;
  399. lock(&hdl->lock);
  400. enum shim_sock_state state = sock->sock_state;
  401. if (state != SOCK_CREATED) {
  402. debug("shim_bind: bind on a bound socket\n");
  403. goto out;
  404. }
  405. if (sock->domain == AF_UNIX) {
  406. if (addrlen != sizeof(struct sockaddr_un))
  407. goto out;
  408. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  409. char * spath = saddr->sun_path;
  410. struct shim_dentry * dent = NULL;
  411. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0) {
  412. // DEP 7/3/17: We actually want either 0 or -ENOENT, as the
  413. // expected case is that the name is free (and we get the dent to
  414. // populate the name)
  415. if (ret != -ENOENT || !dent)
  416. goto out;
  417. }
  418. if (dent->state & DENTRY_VALID &&
  419. !(dent->state & DENTRY_NEGATIVE)) {
  420. ret = -EADDRINUSE;
  421. goto out;
  422. }
  423. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  424. data->pipeid = hashtype_to_idtype(dent->rel_path.hash);
  425. sock->addr.un.pipeid = data->pipeid;
  426. sock->addr.un.data = data;
  427. sock->addr.un.dentry = dent;
  428. } else if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  429. if ((ret = inet_check_addr(sock->domain, addr, addrlen)) < 0)
  430. goto out;
  431. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  432. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  433. }
  434. sock->sock_state = SOCK_BOUND;
  435. if ((ret = create_socket_uri(hdl)) < 0)
  436. goto out;
  437. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  438. 0, 0, 0,
  439. hdl->flags & O_NONBLOCK);
  440. if (!pal_hdl) {
  441. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  442. debug("bind: invalid handle returned\n");
  443. goto out;
  444. }
  445. if (sock->domain == AF_UNIX) {
  446. struct shim_dentry * dent = sock->addr.un.dentry;
  447. dent->state ^= DENTRY_NEGATIVE;
  448. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  449. dent->fs = &socket_builtin_fs;
  450. dent->data = sock->addr.un.data;
  451. }
  452. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  453. char uri[SOCK_URI_SIZE];
  454. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  455. ret = -PAL_ERRNO;
  456. goto out;
  457. }
  458. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  459. &sock->addr.in.bind, NULL)) < 0)
  460. goto out;
  461. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  462. }
  463. hdl->pal_handle = pal_hdl;
  464. __process_pending_options(hdl);
  465. ret = 0;
  466. out:
  467. if (ret < 0) {
  468. sock->sock_state = state;
  469. sock->error = -ret;
  470. if (sock->domain == AF_UNIX) {
  471. if (sock->addr.un.dentry)
  472. put_dentry(sock->addr.un.dentry);
  473. if (sock->addr.un.data) {
  474. free(sock->addr.un.data);
  475. sock->addr.un.data = NULL;
  476. }
  477. }
  478. }
  479. unlock(&hdl->lock);
  480. put_handle(hdl);
  481. return ret;
  482. }
  483. static int inet_parse_addr (int domain, int type, const char * uri,
  484. struct addr_inet * bind,
  485. struct addr_inet * conn)
  486. {
  487. char * ip_str, * port_str, * next_str;
  488. int ip_len = 0;
  489. if (!(next_str = strchr(uri, ':')))
  490. return -EINVAL;
  491. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  492. int n = (next_str++) - uri;
  493. if (!memcmp(uri, "udp", n))
  494. prefix = UDP;
  495. else if (!memcmp(uri, "udp.srv", n))
  496. prefix = UDPSRV;
  497. else if (!memcmp(uri, "tcp", n))
  498. prefix = TCP;
  499. else if (!memcmp(uri, "tcp.srv", n))
  500. prefix = TCPSRV;
  501. else
  502. return -EINVAL;
  503. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  504. return -EINVAL;
  505. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  506. return -EINVAL;
  507. for (int round = 0 ; (ip_str = next_str) ; round++) {
  508. if (ip_str[0] == '[') {
  509. ip_str++;
  510. if (domain != AF_INET6)
  511. return -EINVAL;
  512. if (!(port_str = strchr(ip_str, ']')))
  513. return -EINVAL;
  514. ip_len = port_str - ip_str;
  515. port_str++;
  516. if (*port_str != ':')
  517. return -EINVAL;
  518. } else {
  519. if (domain != AF_INET)
  520. return -EINVAL;
  521. if (!(port_str = strchr(ip_str, ':')))
  522. return -EINVAL;
  523. ip_len = port_str - ip_str;
  524. }
  525. port_str++;
  526. next_str = strchr(port_str, ':');
  527. if (next_str)
  528. next_str++;
  529. struct addr_inet * addr = round ? conn : bind;
  530. if (domain == AF_INET) {
  531. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  532. addr->ext_port = atoi(port_str);
  533. }
  534. if (domain == AF_INET6) {
  535. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  536. addr->ext_port = atoi(port_str);
  537. }
  538. }
  539. return 0;
  540. }
  541. int shim_do_listen (int sockfd, int backlog)
  542. {
  543. if (backlog < 0)
  544. return -EINVAL;
  545. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  546. if (!hdl)
  547. return -EBADF;
  548. if (hdl->type != TYPE_SOCK) {
  549. put_handle(hdl);
  550. return -ENOTSOCK;
  551. }
  552. struct shim_sock_handle * sock = &hdl->info.sock;
  553. if (sock->sock_type != SOCK_STREAM) {
  554. debug("shim_listen: not a stream socket\n");
  555. put_handle(hdl);
  556. return -EINVAL;
  557. }
  558. lock(&hdl->lock);
  559. enum shim_sock_state state = sock->sock_state;
  560. int ret = -EINVAL;
  561. if (state != SOCK_BOUND) {
  562. debug("shim_listen: listen on unbound socket\n");
  563. goto out;
  564. }
  565. hdl->acc_mode = MAY_READ;
  566. sock->sock_state = SOCK_LISTENED;
  567. ret = 0;
  568. out:
  569. if (ret < 0)
  570. sock->sock_state = state;
  571. unlock(&hdl->lock);
  572. put_handle(hdl);
  573. return ret;
  574. }
  575. /* Connect with the TCP socket is always in the client.
  576. *
  577. * With UDP, the connection is make to the socket specific for a
  578. * destination. A process with a connected UDP socket can call
  579. * connect again for that socket for one of two reasons: 1. To
  580. * specify a new IP address and port 2. To unconnect the socket.
  581. */
  582. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  583. {
  584. if (!addr || test_user_memory(addr, addrlen, false))
  585. return -EFAULT;
  586. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  587. if (!hdl)
  588. return -EBADF;
  589. if (hdl->type != TYPE_SOCK) {
  590. put_handle(hdl);
  591. return -ENOTSOCK;
  592. }
  593. struct shim_sock_handle * sock = &hdl->info.sock;
  594. lock(&hdl->lock);
  595. enum shim_sock_state state = sock->sock_state;
  596. int ret = -EINVAL;
  597. if (state == SOCK_CONNECTED) {
  598. if (addr->sa_family == AF_UNSPEC) {
  599. sock->sock_state = SOCK_CREATED;
  600. if (sock->sock_type == SOCK_STREAM && hdl->pal_handle) {
  601. DkStreamDelete(hdl->pal_handle, 0);
  602. DkObjectClose(hdl->pal_handle);
  603. hdl->pal_handle = NULL;
  604. }
  605. debug("shim_connect: reconnect on a stream socket\n");
  606. ret = 0;
  607. goto out;
  608. }
  609. debug("shim_connect: reconnect on a stream socket\n");
  610. ret = -EISCONN;
  611. goto out;
  612. }
  613. if (state != SOCK_BOUND &&
  614. state != SOCK_CREATED) {
  615. debug("shim_connect: connect on invalid socket\n");
  616. goto out;
  617. }
  618. if (sock->domain == AF_UNIX) {
  619. if (addrlen != sizeof(struct sockaddr_un))
  620. goto out;
  621. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  622. char * spath = saddr->sun_path;
  623. struct shim_dentry * dent;
  624. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0) {
  625. // DEP 7/3/17: We actually want either 0 or -ENOENT, as the
  626. // expected case is that the name is free (and we get the dent to
  627. // populate the name)
  628. if (ret != -ENOENT || !dent)
  629. goto out;
  630. }
  631. struct shim_unix_data * data = dent->data;
  632. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  633. data = malloc(sizeof(struct shim_unix_data));
  634. data->pipeid = hashtype_to_idtype(dent->rel_path.hash);
  635. } else if (dent->fs != &socket_builtin_fs) {
  636. ret = -ECONNREFUSED;
  637. goto out;
  638. }
  639. sock->addr.un.pipeid = data->pipeid;
  640. sock->addr.un.data = data;
  641. sock->addr.un.dentry = dent;
  642. get_dentry(dent);
  643. }
  644. if (state == SOCK_BOUND) {
  645. /* if the socket is bound, the stream needs to be shut and rebound. */
  646. assert(hdl->pal_handle);
  647. DkStreamDelete(hdl->pal_handle, 0);
  648. DkObjectClose(hdl->pal_handle);
  649. hdl->pal_handle = NULL;
  650. }
  651. if (sock->domain != AF_UNIX) {
  652. if ((ret = inet_check_addr(sock->domain, addr, addrlen)) < 0)
  653. goto out;
  654. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  655. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  656. }
  657. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  658. SOCK_CONNECTED;
  659. if ((ret = create_socket_uri(hdl)) < 0)
  660. goto out;
  661. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  662. 0, 0, 0,
  663. hdl->flags & O_NONBLOCK);
  664. if (!pal_hdl) {
  665. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_DENIED) ? -ECONNREFUSED : -PAL_ERRNO;
  666. goto out;
  667. }
  668. hdl->pal_handle = pal_hdl;
  669. if (sock->domain == AF_UNIX) {
  670. struct shim_dentry * dent = sock->addr.un.dentry;
  671. lock(&dent->lock);
  672. dent->state ^= DENTRY_NEGATIVE;
  673. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  674. dent->fs = &socket_builtin_fs;
  675. dent->data = sock->addr.un.data;
  676. unlock(&dent->lock);
  677. }
  678. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  679. char uri[SOCK_URI_SIZE];
  680. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  681. ret = -PAL_ERRNO;
  682. goto out;
  683. }
  684. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  685. &sock->addr.in.bind,
  686. &sock->addr.in.conn)) < 0)
  687. goto out;
  688. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  689. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  690. }
  691. hdl->acc_mode = MAY_READ|MAY_WRITE;
  692. __process_pending_options(hdl);
  693. ret = 0;
  694. out:
  695. if (ret < 0) {
  696. sock->sock_state = state;
  697. sock->error = -ret;
  698. if (sock->domain == AF_UNIX) {
  699. if (sock->addr.un.dentry)
  700. put_dentry(sock->addr.un.dentry);
  701. if (sock->addr.un.data) {
  702. free(sock->addr.un.data);
  703. sock->addr.un.data = NULL;
  704. }
  705. }
  706. }
  707. unlock(&hdl->lock);
  708. put_handle(hdl);
  709. return ret;
  710. }
  711. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  712. socklen_t * addrlen)
  713. {
  714. if (hdl->type != TYPE_SOCK)
  715. return -ENOTSOCK;
  716. struct shim_sock_handle * sock = &hdl->info.sock;
  717. int ret;
  718. PAL_HANDLE accepted = NULL;
  719. if (sock->sock_type != SOCK_STREAM) {
  720. debug("shim_accept: not a stream socket\n");
  721. return -EOPNOTSUPP;
  722. }
  723. if (addr) {
  724. if (!addrlen || test_user_memory(addrlen, sizeof(*addrlen), false))
  725. return -EINVAL;
  726. if (*addrlen < minimal_addrlen(sock->domain))
  727. return -EINVAL;
  728. if (test_user_memory(addr, *addrlen, true))
  729. return -EINVAL;
  730. }
  731. lock(&hdl->lock);
  732. if (sock->sock_state != SOCK_LISTENED) {
  733. debug("shim_accpet: invalid socket\n");
  734. ret = -EINVAL;
  735. goto out;
  736. }
  737. accepted = DkStreamWaitForClient(hdl->pal_handle);
  738. if (!accepted) {
  739. ret = -PAL_ERRNO;
  740. goto out;
  741. }
  742. if (flags & O_NONBLOCK) {
  743. PAL_STREAM_ATTR attr;
  744. if (!DkStreamAttributesQueryByHandle(accepted, &attr)) {
  745. ret = -PAL_ERRNO;
  746. goto out;
  747. }
  748. attr.nonblocking = PAL_TRUE;
  749. if (!DkStreamAttributesSetByHandle(accepted, &attr)) {
  750. ret = -PAL_ERRNO;
  751. goto out;
  752. }
  753. }
  754. struct shim_handle * cli = get_new_handle();
  755. if (!cli) {
  756. ret = -ENOMEM;
  757. goto out;
  758. }
  759. struct shim_sock_handle * cli_sock = &cli->info.sock;
  760. cli->type = TYPE_SOCK;
  761. set_handle_fs(cli, &socket_builtin_fs);
  762. cli->acc_mode = MAY_READ|MAY_WRITE;
  763. cli->flags = O_RDWR|flags;
  764. cli->pal_handle = accepted;
  765. accepted = NULL;
  766. cli_sock->domain = sock->domain;
  767. cli_sock->sock_type = sock->sock_type;
  768. cli_sock->protocol = sock->protocol;
  769. cli_sock->sock_state = SOCK_ACCEPTED;
  770. if (sock->domain == AF_UNIX) {
  771. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  772. if (sock->addr.un.dentry) {
  773. get_dentry(sock->addr.un.dentry);
  774. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  775. }
  776. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  777. if (addr) {
  778. unix_copy_addr(addr, sock->addr.un.dentry);
  779. if (addrlen)
  780. *addrlen = sizeof(struct sockaddr_un);
  781. }
  782. }
  783. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  784. char uri[SOCK_URI_SIZE];
  785. int uri_len;
  786. if (!(uri_len = DkStreamGetName(cli->pal_handle, uri, SOCK_URI_SIZE))) {
  787. ret = -PAL_ERRNO;
  788. goto out_cli;
  789. }
  790. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  791. &cli_sock->addr.in.bind,
  792. &cli_sock->addr.in.conn)) < 0)
  793. goto out_cli;
  794. qstrsetstr(&cli->uri, uri, uri_len);
  795. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  796. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  797. if (addr) {
  798. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  799. if (addrlen) {
  800. assert(sock->domain == AF_INET || sock->domain == AF_INET6);
  801. *addrlen = minimal_addrlen(sock->domain);
  802. }
  803. }
  804. }
  805. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  806. out_cli:
  807. put_handle(cli);
  808. out:
  809. if (ret < 0)
  810. sock->error = -ret;
  811. if (accepted)
  812. DkObjectClose(accepted);
  813. unlock(&hdl->lock);
  814. return ret;
  815. }
  816. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  817. {
  818. int flags;
  819. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  820. if (!hdl)
  821. return -EBADF;
  822. int ret = __do_accept(hdl, flags & O_CLOEXEC,
  823. addr, addrlen);
  824. put_handle(hdl);
  825. return ret;
  826. }
  827. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  828. int flags)
  829. {
  830. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  831. if (!hdl)
  832. return -EBADF;
  833. int ret = __do_accept(hdl,
  834. (flags & SOCK_CLOEXEC ? O_CLOEXEC : 0) |
  835. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  836. addr, addrlen);
  837. put_handle(hdl);
  838. return ret;
  839. }
  840. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  841. const struct sockaddr * addr, socklen_t addrlen)
  842. {
  843. // Issue #752 - https://github.com/oscarlab/graphene/issues/752
  844. __UNUSED(flags);
  845. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  846. if (!hdl)
  847. return -EBADF;
  848. int ret = -ENOTSOCK;
  849. if (hdl->type != TYPE_SOCK)
  850. goto out;
  851. struct shim_sock_handle * sock = &hdl->info.sock;
  852. ret = -EFAULT;
  853. if (addr && test_user_memory((void *) addr, addrlen, false))
  854. goto out;
  855. if (!bufs || test_user_memory(bufs, sizeof(*bufs) * nbufs, false))
  856. goto out;
  857. for (int i = 0 ; i < nbufs ; i++) {
  858. if (!bufs[i].iov_base ||
  859. test_user_memory(bufs[i].iov_base, bufs[i].iov_len, false))
  860. goto out;
  861. }
  862. lock(&hdl->lock);
  863. PAL_HANDLE pal_hdl = hdl->pal_handle;
  864. char * uri = NULL;
  865. /* Data gram sock need not be conneted or bound at all */
  866. if (sock->sock_type == SOCK_STREAM &&
  867. sock->sock_state != SOCK_CONNECTED &&
  868. sock->sock_state != SOCK_BOUNDCONNECTED &&
  869. sock->sock_state != SOCK_ACCEPTED) {
  870. ret = -ENOTCONN;
  871. goto out_locked;
  872. }
  873. if (sock->sock_type == SOCK_DGRAM &&
  874. sock->sock_state == SOCK_SHUTDOWN) {
  875. ret = -ENOTCONN;
  876. goto out_locked;
  877. }
  878. if (!(hdl->acc_mode & MAY_WRITE)) {
  879. ret = -ECONNRESET;
  880. goto out_locked;
  881. }
  882. if (sock->sock_type == SOCK_DGRAM &&
  883. sock->sock_state != SOCK_BOUNDCONNECTED &&
  884. sock->sock_state != SOCK_CONNECTED) {
  885. if (!addr) {
  886. ret = -EDESTADDRREQ;
  887. goto out_locked;
  888. }
  889. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  890. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  891. hdl->flags & O_NONBLOCK);
  892. if (!pal_hdl) {
  893. ret = -PAL_ERRNO;
  894. goto out_locked;
  895. }
  896. hdl->pal_handle = pal_hdl;
  897. }
  898. if (addr && addr->sa_family != sock->domain) {
  899. ret = -EINVAL;
  900. goto out_locked;
  901. }
  902. uri = __alloca(SOCK_URI_SIZE);
  903. }
  904. unlock(&hdl->lock);
  905. if (uri) {
  906. struct addr_inet addr_buf;
  907. inet_save_addr(sock->domain, &addr_buf, addr);
  908. inet_rebase_port(false, sock->domain, &addr_buf, false);
  909. memcpy(uri, "udp:", 5);
  910. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  911. &addr_buf)) < 0) {
  912. lock(&hdl->lock);
  913. goto out_locked;
  914. }
  915. debug("next packet send to %s\n", uri);
  916. }
  917. int bytes = 0;
  918. ret = 0;
  919. for (int i = 0 ; i < nbufs ; i++) {
  920. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  921. uri);
  922. if (!ret) {
  923. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  924. - ECONNABORTED : -PAL_ERRNO;
  925. break;
  926. }
  927. bytes += ret;
  928. }
  929. if (bytes)
  930. ret = bytes;
  931. if (ret < 0) {
  932. lock(&hdl->lock);
  933. goto out_locked;
  934. }
  935. goto out;
  936. out_locked:
  937. if (ret < 0)
  938. sock->error = -ret;
  939. unlock(&hdl->lock);
  940. out:
  941. put_handle(hdl);
  942. return ret;
  943. }
  944. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  945. const struct sockaddr * addr, socklen_t addrlen)
  946. {
  947. struct iovec iovbuf;
  948. iovbuf.iov_base = (void *) buf;
  949. iovbuf.iov_len = len;
  950. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  951. }
  952. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  953. {
  954. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  955. msg->msg_name, msg->msg_namelen);
  956. }
  957. ssize_t shim_do_sendmmsg (int sockfd, struct mmsghdr * msg, size_t vlen, int flags)
  958. {
  959. ssize_t total = 0;
  960. for (size_t i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  961. struct msghdr * m = &msg[i].msg_hdr;
  962. ssize_t bytes = do_sendmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  963. m->msg_name, m->msg_namelen);
  964. if (bytes < 0)
  965. return total > 0 ? total : bytes;
  966. msg[i].msg_len = bytes;
  967. total++;
  968. }
  969. return total;
  970. }
  971. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  972. struct sockaddr * addr, socklen_t * addrlen)
  973. {
  974. /* TODO handle flags properly. For now, explicitly return an error. */
  975. if (flags) {
  976. debug("recvmsg()/recvmmsg()/recvfrom(): flags parameter unsupported.\n");
  977. return -EOPNOTSUPP;
  978. }
  979. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  980. if (!hdl)
  981. return -EBADF;
  982. int ret = -ENOTSOCK;
  983. if (hdl->type != TYPE_SOCK)
  984. goto out;
  985. struct shim_sock_handle * sock = &hdl->info.sock;
  986. if (addr) {
  987. ret = -EINVAL;
  988. if (!addrlen || test_user_memory(addrlen, sizeof(*addrlen), false))
  989. goto out;
  990. if (*addrlen < minimal_addrlen(sock->domain))
  991. goto out;
  992. if (test_user_memory(addr, *addrlen, true))
  993. goto out;
  994. }
  995. ret = -EFAULT;
  996. if (!bufs || test_user_memory(bufs, sizeof(*bufs) * nbufs, false))
  997. goto out;
  998. for (int i = 0 ; i < nbufs ; i++) {
  999. if (!bufs[i].iov_base ||
  1000. test_user_memory(bufs[i].iov_base, bufs[i].iov_len, true))
  1001. goto out;
  1002. }
  1003. lock(&hdl->lock);
  1004. PAL_HANDLE pal_hdl = hdl->pal_handle;
  1005. char * uri = NULL;
  1006. if (sock->sock_type == SOCK_STREAM &&
  1007. sock->sock_state != SOCK_CONNECTED &&
  1008. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1009. sock->sock_state != SOCK_ACCEPTED) {
  1010. ret = -ENOTCONN;
  1011. goto out_locked;
  1012. }
  1013. if (!(hdl->acc_mode & MAY_READ)) {
  1014. ret = 0;
  1015. goto out_locked;
  1016. }
  1017. if (addr && sock->sock_type == SOCK_DGRAM &&
  1018. sock->sock_state != SOCK_CONNECTED &&
  1019. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1020. if (sock->sock_state == SOCK_CREATED) {
  1021. ret = -EINVAL;
  1022. goto out_locked;
  1023. }
  1024. uri = __alloca(SOCK_URI_SIZE);
  1025. }
  1026. unlock(&hdl->lock);
  1027. bool address_received = false;
  1028. int bytes = 0;
  1029. ret = 0;
  1030. for (int i = 0 ; i < nbufs ; i++) {
  1031. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  1032. uri, uri ? SOCK_URI_SIZE : 0);
  1033. if (!ret) {
  1034. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  1035. - ECONNABORTED : -PAL_ERRNO;
  1036. break;
  1037. }
  1038. bytes += ret;
  1039. if (!addr || !bytes || address_received)
  1040. continue;
  1041. if (sock->domain == AF_UNIX) {
  1042. unix_copy_addr(addr, sock->addr.un.dentry);
  1043. *addrlen = sizeof(struct sockaddr_un);
  1044. }
  1045. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  1046. if (uri) {
  1047. struct addr_inet conn;
  1048. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  1049. &conn, NULL)) < 0) {
  1050. lock(&hdl->lock);
  1051. goto out_locked;
  1052. }
  1053. debug("last packet received from %s\n", uri);
  1054. inet_rebase_port(true, sock->domain, &conn, false);
  1055. inet_copy_addr(sock->domain, addr, &conn);
  1056. } else {
  1057. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  1058. }
  1059. *addrlen = (sock->domain == AF_INET) ?
  1060. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  1061. }
  1062. address_received = false;
  1063. }
  1064. if (bytes)
  1065. ret = bytes;
  1066. if (ret < 0) {
  1067. lock(&hdl->lock);
  1068. goto out_locked;
  1069. }
  1070. goto out;
  1071. out_locked:
  1072. if (ret < 0)
  1073. sock->error = -ret;
  1074. unlock(&hdl->lock);
  1075. out:
  1076. put_handle(hdl);
  1077. return ret;
  1078. }
  1079. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  1080. struct sockaddr * addr, socklen_t * addrlen)
  1081. {
  1082. struct iovec iovbuf;
  1083. iovbuf.iov_base = (void *) buf;
  1084. iovbuf.iov_len = len;
  1085. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  1086. }
  1087. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  1088. {
  1089. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  1090. msg->msg_name, &msg->msg_namelen);
  1091. }
  1092. ssize_t shim_do_recvmmsg (int sockfd, struct mmsghdr * msg, size_t vlen, int flags,
  1093. struct __kernel_timespec * timeout)
  1094. {
  1095. ssize_t total = 0;
  1096. // Issue # 753 - https://github.com/oscarlab/graphene/issues/753
  1097. /* TODO(donporter): timeout properly. For now, explicitly return an error. */
  1098. if (timeout) {
  1099. debug("recvmmsg(): timeout parameter unsupported.\n");
  1100. return -EOPNOTSUPP;
  1101. }
  1102. for (size_t i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  1103. struct msghdr * m = &msg[i].msg_hdr;
  1104. ssize_t bytes = do_recvmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  1105. m->msg_name, &m->msg_namelen);
  1106. if (bytes < 0)
  1107. return total > 0 ? total : bytes;
  1108. msg[i].msg_len = bytes;
  1109. total++;
  1110. }
  1111. return total;
  1112. }
  1113. #define SHUT_RD 0
  1114. #define SHUT_WR 1
  1115. #define SHUT_RDWR 2
  1116. int shim_do_shutdown (int sockfd, int how)
  1117. {
  1118. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1119. if (!hdl)
  1120. return -EBADF;
  1121. int ret = 0;
  1122. struct shim_sock_handle * sock = &hdl->info.sock;
  1123. if (hdl->type != TYPE_SOCK) {
  1124. ret = -ENOTSOCK;
  1125. goto out;
  1126. }
  1127. lock(&hdl->lock);
  1128. if (sock->sock_state != SOCK_LISTENED &&
  1129. sock->sock_state != SOCK_ACCEPTED &&
  1130. sock->sock_state != SOCK_CONNECTED &&
  1131. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1132. ret = -ENOTCONN;
  1133. goto out_locked;
  1134. }
  1135. switch (how) {
  1136. case SHUT_RD:
  1137. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  1138. hdl->acc_mode &= ~MAY_READ;
  1139. break;
  1140. case SHUT_WR:
  1141. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  1142. hdl->acc_mode &= ~MAY_WRITE;
  1143. break;
  1144. case SHUT_RDWR:
  1145. DkStreamDelete(hdl->pal_handle, 0);
  1146. hdl->acc_mode = 0;
  1147. sock->sock_state = SOCK_SHUTDOWN;
  1148. break;
  1149. }
  1150. ret = 0;
  1151. out_locked:
  1152. if (ret < 0)
  1153. sock->error = -ret;
  1154. unlock(&hdl->lock);
  1155. out:
  1156. put_handle(hdl);
  1157. return ret;
  1158. }
  1159. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1160. {
  1161. if (!addr || !addrlen)
  1162. return -EFAULT;
  1163. if (*addrlen <= 0)
  1164. return -EINVAL;
  1165. if (test_user_memory(addr, *addrlen, true))
  1166. return -EFAULT;
  1167. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1168. if (!hdl)
  1169. return -EBADF;
  1170. int ret = -EINVAL;
  1171. if (hdl->type != TYPE_SOCK) {
  1172. ret = -ENOTSOCK;
  1173. goto out;
  1174. }
  1175. struct shim_sock_handle * sock = &hdl->info.sock;
  1176. lock(&hdl->lock);
  1177. struct sockaddr saddr;
  1178. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1179. if (len < *addrlen)
  1180. len = *addrlen;
  1181. memcpy(addr, &saddr, len);
  1182. *addrlen = len;
  1183. ret = 0;
  1184. unlock(&hdl->lock);
  1185. out:
  1186. put_handle(hdl);
  1187. return ret;
  1188. }
  1189. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1190. {
  1191. if (!addr || !addrlen)
  1192. return -EFAULT;
  1193. if (*addrlen <= 0)
  1194. return -EINVAL;
  1195. if (test_user_memory(addr, *addrlen, true))
  1196. return -EFAULT;
  1197. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1198. if (!hdl)
  1199. return -EBADF;
  1200. int ret = -EINVAL;
  1201. if (hdl->type != TYPE_SOCK) {
  1202. ret = -ENOTSOCK;
  1203. goto out;
  1204. }
  1205. struct shim_sock_handle * sock = &hdl->info.sock;
  1206. lock(&hdl->lock);
  1207. /* Data gram sock need not be conneted or bound at all */
  1208. if (sock->sock_type == SOCK_STREAM &&
  1209. sock->sock_state != SOCK_CONNECTED &&
  1210. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1211. sock->sock_state != SOCK_ACCEPTED) {
  1212. ret = -ENOTCONN;
  1213. goto out_locked;
  1214. }
  1215. if (sock->sock_type == SOCK_DGRAM &&
  1216. sock->sock_state != SOCK_CONNECTED &&
  1217. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1218. ret = -ENOTCONN;
  1219. goto out_locked;
  1220. }
  1221. struct sockaddr saddr;
  1222. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1223. if (len < *addrlen)
  1224. len = *addrlen;
  1225. memcpy(addr, &saddr, len);
  1226. *addrlen = len;
  1227. ret = 0;
  1228. out_locked:
  1229. unlock(&hdl->lock);
  1230. out:
  1231. put_handle(hdl);
  1232. return ret;
  1233. }
  1234. struct __kernel_linger {
  1235. int l_onoff;
  1236. int l_linger;
  1237. };
  1238. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1239. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1240. {
  1241. // Issue 754 - https://github.com/oscarlab/graphene/issues/754
  1242. __UNUSED(optlen);
  1243. int intval = *((int *) optval);
  1244. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1245. if (level == SOL_SOCKET) {
  1246. switch(optname) {
  1247. case SO_ACCEPTCONN:
  1248. case SO_DOMAIN:
  1249. case SO_ERROR:
  1250. case SO_PROTOCOL:
  1251. case SO_TYPE:
  1252. return -EPERM;
  1253. case SO_KEEPALIVE:
  1254. case SO_LINGER:
  1255. case SO_RCVBUF:
  1256. case SO_SNDBUF:
  1257. case SO_RCVTIMEO:
  1258. case SO_SNDTIMEO:
  1259. case SO_REUSEADDR:
  1260. goto query;
  1261. default:
  1262. goto unknown;
  1263. }
  1264. }
  1265. if (level == SOL_TCP) {
  1266. switch(optname) {
  1267. case TCP_CORK:
  1268. case TCP_NODELAY:
  1269. goto query;
  1270. default:
  1271. goto unknown;
  1272. }
  1273. }
  1274. unknown:
  1275. return -ENOPROTOOPT;
  1276. query:
  1277. if (!attr) {
  1278. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1279. if (!DkStreamAttributesQueryByHandle(hdl->pal_handle, attr))
  1280. return -PAL_ERRNO;
  1281. }
  1282. if (level == SOL_SOCKET) {
  1283. switch(optname) {
  1284. case SO_KEEPALIVE:
  1285. if (bolval != attr->socket.tcp_keepalive) {
  1286. attr->socket.tcp_keepalive = bolval;
  1287. goto set;
  1288. }
  1289. break;
  1290. case SO_LINGER: {
  1291. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1292. int linger = l->l_onoff ? l->l_linger : 0;
  1293. if (linger != (int) attr->socket.linger) {
  1294. attr->socket.linger = linger;
  1295. goto set;
  1296. }
  1297. break;
  1298. }
  1299. case SO_RCVBUF:
  1300. if (intval != (int) attr->socket.receivebuf) {
  1301. attr->socket.receivebuf = intval;
  1302. goto set;
  1303. }
  1304. break;
  1305. case SO_SNDBUF:
  1306. if (intval != (int) attr->socket.sendbuf) {
  1307. attr->socket.sendbuf = intval;
  1308. goto set;
  1309. }
  1310. break;
  1311. case SO_RCVTIMEO:
  1312. if (intval != (int) attr->socket.receivetimeout) {
  1313. attr->socket.receivetimeout = intval;
  1314. goto set;
  1315. }
  1316. break;
  1317. case SO_SNDTIMEO:
  1318. if (intval != (int) attr->socket.sendtimeout) {
  1319. attr->socket.sendtimeout = intval;
  1320. goto set;
  1321. }
  1322. break;
  1323. case SO_REUSEADDR:
  1324. break;
  1325. }
  1326. }
  1327. if (level == SOL_TCP) {
  1328. switch(optname) {
  1329. case TCP_CORK:
  1330. if (bolval != attr->socket.tcp_cork) {
  1331. attr->socket.tcp_cork = bolval;
  1332. goto set;
  1333. }
  1334. break;
  1335. case TCP_NODELAY:
  1336. if (bolval != attr->socket.tcp_nodelay) {
  1337. attr->socket.tcp_nodelay = bolval;
  1338. goto set;
  1339. }
  1340. break;
  1341. }
  1342. }
  1343. return 0;
  1344. set:
  1345. if (!DkStreamAttributesSetByHandle(hdl->pal_handle, attr))
  1346. return -PAL_ERRNO;
  1347. return 0;
  1348. }
  1349. static int __process_pending_options (struct shim_handle * hdl)
  1350. {
  1351. struct shim_sock_handle * sock = &hdl->info.sock;
  1352. if (!sock->pending_options)
  1353. return 0;
  1354. PAL_STREAM_ATTR attr;
  1355. if (!DkStreamAttributesQueryByHandle(hdl->pal_handle, &attr))
  1356. return -PAL_ERRNO;
  1357. struct shim_sock_option * o = sock->pending_options;
  1358. while (o) {
  1359. PAL_STREAM_ATTR tmp = attr;
  1360. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1361. o->optlen, &tmp);
  1362. if (!ret)
  1363. attr = tmp;
  1364. struct shim_sock_option * next = o->next;
  1365. free(o);
  1366. o = next;
  1367. }
  1368. return 0;
  1369. }
  1370. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1371. int optlen)
  1372. {
  1373. if (!optval)
  1374. return -EFAULT;
  1375. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1376. if (!hdl)
  1377. return -EBADF;
  1378. int ret = 0;
  1379. if (hdl->type != TYPE_SOCK) {
  1380. ret = -ENOTSOCK;
  1381. goto out;
  1382. }
  1383. struct shim_sock_handle * sock = &hdl->info.sock;
  1384. lock(&hdl->lock);
  1385. if (!hdl->pal_handle) {
  1386. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1387. optlen);
  1388. if (!o) {
  1389. ret = -ENOMEM;
  1390. goto out_locked;
  1391. }
  1392. struct shim_sock_option ** next = &sock->pending_options;
  1393. while (*next)
  1394. next = &(*next)->next;
  1395. o->next = NULL;
  1396. *next = o;
  1397. o->level = level;
  1398. o->optname = optname;
  1399. o->optlen = optlen;
  1400. memcpy(&o->optval, optval, optlen);
  1401. goto out_locked;
  1402. }
  1403. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1404. out_locked:
  1405. unlock(&hdl->lock);
  1406. out:
  1407. put_handle(hdl);
  1408. return ret;
  1409. }
  1410. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1411. int * optlen)
  1412. {
  1413. if (!optval || !optlen)
  1414. return -EFAULT;
  1415. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1416. if (!hdl)
  1417. return -EBADF;
  1418. int ret = 0;
  1419. if (hdl->type != TYPE_SOCK) {
  1420. ret = -ENOTSOCK;
  1421. goto out;
  1422. }
  1423. struct shim_sock_handle * sock = &hdl->info.sock;
  1424. lock(&hdl->lock);
  1425. int * intval = (int *) optval;
  1426. if (level == SOL_SOCKET) {
  1427. switch(optname) {
  1428. case SO_ACCEPTCONN:
  1429. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1430. goto out;
  1431. case SO_DOMAIN:
  1432. *intval = sock->domain;
  1433. goto out;
  1434. case SO_ERROR:
  1435. *intval = sock->error;
  1436. goto out;
  1437. case SO_PROTOCOL:
  1438. switch(sock->protocol) {
  1439. case SOCK_STREAM:
  1440. *intval = IPPROTO_SCTP;
  1441. break;
  1442. case SOCK_DGRAM:
  1443. *intval = IPPROTO_UDP;
  1444. break;
  1445. default:
  1446. goto unknown;
  1447. }
  1448. goto out;
  1449. case SO_TYPE:
  1450. *intval = sock->sock_type;
  1451. goto out;
  1452. case SO_KEEPALIVE:
  1453. case SO_LINGER:
  1454. case SO_RCVBUF:
  1455. case SO_SNDBUF:
  1456. case SO_RCVTIMEO:
  1457. case SO_SNDTIMEO:
  1458. case SO_REUSEADDR:
  1459. goto query;
  1460. default:
  1461. goto unknown;
  1462. }
  1463. }
  1464. if (level == SOL_TCP) {
  1465. switch(optname) {
  1466. case TCP_CORK:
  1467. case TCP_NODELAY:
  1468. goto query;
  1469. default:
  1470. goto unknown;
  1471. }
  1472. }
  1473. unknown:
  1474. ret = -ENOPROTOOPT;
  1475. goto out;
  1476. query:
  1477. {
  1478. PAL_STREAM_ATTR attr;
  1479. if (!DkStreamAttributesQueryByHandle(hdl->pal_handle, &attr)) {
  1480. ret = -PAL_ERRNO;
  1481. goto out;
  1482. }
  1483. if (level == SOL_SOCKET) {
  1484. switch(optname) {
  1485. case SO_KEEPALIVE:
  1486. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1487. break;
  1488. case SO_LINGER: {
  1489. struct __kernel_linger * l =
  1490. (struct __kernel_linger *) optval;
  1491. l->l_onoff = attr.socket.linger ? 1 : 0;
  1492. l->l_linger = attr.socket.linger;
  1493. break;
  1494. }
  1495. case SO_RCVBUF:
  1496. *intval = attr.socket.receivebuf;
  1497. break;
  1498. case SO_SNDBUF:
  1499. *intval = attr.socket.sendbuf;
  1500. break;
  1501. case SO_RCVTIMEO:
  1502. *intval = attr.socket.receivetimeout;
  1503. break;
  1504. case SO_SNDTIMEO:
  1505. *intval = attr.socket.sendtimeout;
  1506. break;
  1507. case SO_REUSEADDR:
  1508. *intval = 1;
  1509. break;
  1510. }
  1511. }
  1512. if (level == SOL_TCP) {
  1513. switch(optname) {
  1514. case TCP_CORK:
  1515. *intval = attr.socket.tcp_cork ? 1 : 0;
  1516. break;
  1517. case TCP_NODELAY:
  1518. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1519. break;
  1520. }
  1521. }
  1522. }
  1523. out:
  1524. unlock(&hdl->lock);
  1525. put_handle(hdl);
  1526. return ret;
  1527. }