shim_socket.c 45 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 OSCAR lab, Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/in.h>
  33. #include <linux/in6.h>
  34. #include <asm/socket.h>
  35. /*
  36. * User-settable options (used with setsockopt).
  37. */
  38. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  39. #define TCP_MAXSEG 2 /* Set maximum segment size */
  40. #define TCP_CORK 3 /* Control sending of partial frames */
  41. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  42. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  43. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  44. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  45. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  46. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  47. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  48. #define TCP_INFO 11 /* Information about this connection. */
  49. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  50. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  51. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  52. #define SOCK_URI_SIZE 108
  53. static int rebase_on_lo __attribute_migratable = -1;
  54. static int init_port_rebase (void)
  55. {
  56. if (rebase_on_lo != -1)
  57. return 0;
  58. char cfg[CONFIG_MAX];
  59. int rebase = 0;
  60. if (!root_config ||
  61. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  62. rebase_on_lo = 0;
  63. return 0;
  64. }
  65. for (const char * p = cfg ; *p ; p++) {
  66. if (*p < '0' || *p > '9' || rebase > 32767) {
  67. rebase_on_lo = 0;
  68. return 0;
  69. }
  70. rebase = rebase * 10 + (*p - '0');
  71. }
  72. rebase_on_lo = rebase;
  73. return 0;
  74. }
  75. static int __process_pending_options (struct shim_handle * hdl);
  76. int shim_do_socket (int family, int type, int protocol)
  77. {
  78. struct shim_handle * hdl = get_new_handle();
  79. if (!hdl)
  80. return -ENOMEM;
  81. struct shim_sock_handle * sock = &hdl->info.sock;
  82. hdl->type = TYPE_SOCK;
  83. set_handle_fs(hdl, &socket_builtin_fs);
  84. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  85. hdl->acc_mode = 0;
  86. sock->domain = family;
  87. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  88. sock->protocol = protocol;
  89. int ret = -ENOSYS;
  90. switch (sock->domain) {
  91. case AF_UNIX: //Local communication
  92. case AF_INET: //IPv4 Internet protocols ip(7)
  93. case AF_INET6: //IPv6 Internet protocols
  94. break;
  95. default:
  96. debug("shim_socket: unknown socket domain %d\n",
  97. sock->domain);
  98. goto err;
  99. }
  100. switch (sock->sock_type) {
  101. case SOCK_STREAM: //TCP
  102. break;
  103. case SOCK_DGRAM: //UDP
  104. hdl->acc_mode = MAY_READ|MAY_WRITE;
  105. break;
  106. default:
  107. debug("shim_socket: unknown socket type %d\n",
  108. sock->sock_type);
  109. goto err;
  110. }
  111. sock->sock_state = SOCK_CREATED;
  112. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  113. err:
  114. put_handle(hdl);
  115. return ret;
  116. }
  117. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  118. unsigned int pipeid)
  119. {
  120. int bytes = 0;
  121. switch (state) {
  122. case SOCK_CREATED:
  123. case SOCK_BOUNDCONNECTED:
  124. case SOCK_SHUTDOWN:
  125. return -ENOTCONN;
  126. case SOCK_BOUND:
  127. case SOCK_LISTENED:
  128. case SOCK_ACCEPTED:
  129. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  130. break;
  131. case SOCK_CONNECTED:
  132. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  133. break;
  134. default:
  135. return -ENOTCONN;
  136. }
  137. return bytes == count ? -ENAMETOOLONG : bytes;
  138. }
  139. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  140. bool local)
  141. {
  142. init_port_rebase();
  143. if (rebase_on_lo) {
  144. if (domain == AF_INET) {
  145. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  146. if (!local && memcmp(ad, "\177\0\0\1", 4))
  147. return;
  148. }
  149. if (domain == AF_INET6) {
  150. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  151. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  152. return;
  153. }
  154. }
  155. if (reverse)
  156. addr->port = addr->ext_port - rebase_on_lo;
  157. else
  158. addr->ext_port = addr->port + rebase_on_lo;
  159. }
  160. static int inet_translate_addr (int domain, char * uri, int count,
  161. struct addr_inet * addr)
  162. {
  163. if (domain == AF_INET) {
  164. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  165. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  166. ad[0], ad[1], ad[2], ad[3], addr->ext_port);
  167. return bytes == count ? -ENAMETOOLONG : bytes;
  168. }
  169. if (domain == AF_INET6) {
  170. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  171. int bytes = snprintf(uri, count,
  172. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  173. ad[0], ad[1], ad[2], ad[3],
  174. ad[4], ad[5], ad[6], ad[7], addr->ext_port);
  175. return bytes == count ? -ENAMETOOLONG : bytes;
  176. }
  177. return -EPROTONOSUPPORT;
  178. }
  179. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  180. enum shim_sock_state state,
  181. struct addr_inet * bind, struct addr_inet * conn)
  182. {
  183. int bytes = 0, ret;
  184. if (sock_type == SOCK_STREAM) {
  185. switch (state) {
  186. case SOCK_CREATED:
  187. case SOCK_SHUTDOWN:
  188. return -ENOTCONN;
  189. case SOCK_BOUND:
  190. case SOCK_LISTENED:
  191. if (count < 9)
  192. return -ENAMETOOLONG;
  193. memcpy(uri, "tcp.srv:", 9);
  194. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  195. return ret < 0 ? ret : ret + 8;
  196. case SOCK_BOUNDCONNECTED:
  197. if (count < 5)
  198. return -ENAMETOOLONG;
  199. memcpy(uri, "tcp:", 5);
  200. bytes = 4;
  201. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  202. bind);
  203. if (ret < 0)
  204. return ret;
  205. uri[bytes + ret] = ':';
  206. bytes += ret + 1;
  207. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  208. conn);
  209. return ret < 0 ? ret : ret + bytes;
  210. case SOCK_CONNECTED:
  211. case SOCK_ACCEPTED:
  212. if (count < 5)
  213. return -ENAMETOOLONG;
  214. memcpy(uri, "tcp:", 5);
  215. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  216. return ret < 0 ? ret : ret + 4;
  217. }
  218. }
  219. if (sock_type == SOCK_DGRAM) {
  220. switch (state) {
  221. case SOCK_CREATED:
  222. case SOCK_SHUTDOWN:
  223. return -ENOTCONN;
  224. case SOCK_LISTENED:
  225. case SOCK_ACCEPTED:
  226. return -EOPNOTSUPP;
  227. case SOCK_BOUNDCONNECTED:
  228. if (count < 9)
  229. return -ENAMETOOLONG;
  230. memcpy(uri, "tcp.srv:", 9);
  231. bytes = 8;
  232. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  233. bind);
  234. if (ret < 0)
  235. return ret;
  236. uri[bytes + ret] = ':';
  237. bytes += ret + 1;
  238. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  239. conn);
  240. return ret < 0 ? ret : ret + bytes;
  241. case SOCK_BOUND:
  242. if (count < 9)
  243. return -ENAMETOOLONG;
  244. memcpy(uri, "udp.srv:", 9);
  245. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  246. return ret < 0 ? ret : ret + 9;
  247. case SOCK_CONNECTED:
  248. if (count < 5)
  249. return -ENAMETOOLONG;
  250. memcpy(uri, "udp:", 5);
  251. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  252. return ret < 0 ? ret : ret + 4;
  253. }
  254. }
  255. return -EPROTONOSUPPORT;
  256. }
  257. static inline void unix_copy_addr (struct sockaddr * saddr,
  258. struct shim_dentry * dent)
  259. {
  260. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  261. un->sun_family = AF_UNIX;
  262. int size;
  263. const char * path = dentry_get_path(dent, true, &size);
  264. memcpy(un->sun_path, path, size + 1);
  265. }
  266. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  267. const struct addr_inet * addr)
  268. {
  269. if (domain == AF_INET) {
  270. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  271. in->sin_family = AF_INET;
  272. in->sin_port = __htons(addr->port);
  273. in->sin_addr = addr->addr.v4;
  274. return sizeof(struct sockaddr_in);
  275. }
  276. if (domain == AF_INET6) {
  277. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  278. in6->sin6_family = AF_INET6;
  279. in6->sin6_port = __htons(addr->port);
  280. in6->sin6_addr = addr->addr.v6;
  281. return sizeof(struct sockaddr_in6);
  282. }
  283. return sizeof(struct sockaddr);
  284. }
  285. static void inet_save_addr (int domain, struct addr_inet * addr,
  286. const struct sockaddr * saddr)
  287. {
  288. if (domain == AF_INET) {
  289. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  290. addr->port = __ntohs(in->sin_port);
  291. addr->addr.v4 = in->sin_addr;
  292. return;
  293. }
  294. if (domain == AF_INET6) {
  295. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  296. addr->port = __ntohs(in6->sin6_port);
  297. addr->addr.v6 = in6->sin6_addr;
  298. return;
  299. }
  300. }
  301. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  302. const struct sockaddr * saddr)
  303. {
  304. if (domain == AF_INET) {
  305. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  306. return addr->port == __ntohs(in->sin_port) &&
  307. !memcmp(&addr->addr.v4, &in->sin_addr,
  308. sizeof(struct in_addr));
  309. }
  310. if (domain == AF_INET6) {
  311. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  312. return addr->port == __ntohs(in6->sin6_port) &&
  313. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  314. sizeof(struct in6_addr));
  315. }
  316. return false;
  317. }
  318. static int create_socket_uri (struct shim_handle * hdl)
  319. {
  320. struct shim_sock_handle * sock = &hdl->info.sock;
  321. if (sock->domain == AF_UNIX) {
  322. char uri_buf[32];
  323. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  324. sock->addr.un.pipeid);
  325. if (bytes < 0)
  326. return bytes;
  327. qstrsetstr(&hdl->uri, uri_buf, bytes);
  328. return 0;
  329. }
  330. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  331. char uri_buf[SOCK_URI_SIZE];
  332. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  333. sock->sock_type, sock->sock_state,
  334. &sock->addr.in.bind, &sock->addr.in.conn);
  335. if (bytes < 0)
  336. return bytes;
  337. qstrsetstr(&hdl->uri, uri_buf, bytes);
  338. return 0;
  339. }
  340. return -EPROTONOSUPPORT;
  341. }
  342. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  343. {
  344. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  345. if (!hdl)
  346. return -EBADF;
  347. int ret = -EINVAL;
  348. if (hdl->type != TYPE_SOCK) {
  349. put_handle(hdl);
  350. return -ENOTSOCK;
  351. }
  352. struct shim_sock_handle * sock = &hdl->info.sock;
  353. lock(hdl->lock);
  354. enum shim_sock_state state = sock->sock_state;
  355. if (state != SOCK_CREATED) {
  356. debug("shim_bind: bind on a bound socket\n");
  357. goto out;
  358. }
  359. if (sock->domain == AF_UNIX) {
  360. if (addrlen != sizeof(struct sockaddr_un))
  361. goto out;
  362. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  363. char * spath = saddr->sun_path;
  364. struct shim_dentry * dent = NULL;
  365. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  366. goto out;
  367. if (dent->state & DENTRY_VALID &&
  368. !(dent->state & DENTRY_NEGATIVE)) {
  369. ret = -EADDRINUSE;
  370. goto out;
  371. }
  372. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  373. data->pipeid = dent->rel_path.hash >> 32;
  374. sock->addr.un.pipeid = data->pipeid;
  375. sock->addr.un.data = data;
  376. sock->addr.un.dentry = dent;
  377. } else if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  378. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  379. sizeof(struct sockaddr_in6)))
  380. goto out;
  381. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  382. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  383. }
  384. sock->sock_state = SOCK_BOUND;
  385. if ((ret = create_socket_uri(hdl)) < 0)
  386. goto out;
  387. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  388. 0, 0, 0,
  389. hdl->flags & O_NONBLOCK);
  390. if (!pal_hdl) {
  391. debug("bind: invalid handle returned\n");
  392. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  393. goto out;
  394. }
  395. if (sock->domain == AF_UNIX) {
  396. struct shim_dentry * dent = sock->addr.un.dentry;
  397. dent->state ^= DENTRY_NEGATIVE;
  398. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  399. dent->fs = &socket_builtin_fs;
  400. dent->data = sock->addr.un.data;
  401. }
  402. hdl->pal_handle = pal_hdl;
  403. __process_pending_options(hdl);
  404. ret = 0;
  405. out:
  406. if (ret < 0) {
  407. sock->sock_state = state;
  408. sock->error = -ret;
  409. if (sock->domain == AF_UNIX) {
  410. if (sock->addr.un.dentry)
  411. put_dentry(sock->addr.un.dentry);
  412. if (sock->addr.un.data) {
  413. free(sock->addr.un.data);
  414. sock->addr.un.data = NULL;
  415. }
  416. }
  417. }
  418. unlock(hdl->lock);
  419. put_handle(hdl);
  420. return ret;
  421. }
  422. static int inet_parse_addr (int domain, int type, const char * uri,
  423. struct addr_inet * bind,
  424. struct addr_inet * conn)
  425. {
  426. char * ip_str, * port_str, * next_str;
  427. int ip_len = 0;
  428. if (!(next_str = strchr(uri, ':')))
  429. return -EINVAL;
  430. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  431. int n = (next_str++) - uri;
  432. if (!memcmp(uri, "udp", n))
  433. prefix = UDP;
  434. else if (!memcmp(uri, "udp.srv", n))
  435. prefix = UDPSRV;
  436. else if (!memcmp(uri, "tcp", n))
  437. prefix = TCP;
  438. else if (!memcmp(uri, "tcp.srv", n))
  439. prefix = TCPSRV;
  440. else
  441. return -EINVAL;
  442. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  443. return -EINVAL;
  444. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  445. return -EINVAL;
  446. for (int round = 0 ; (ip_str = next_str) ; round++) {
  447. if (ip_str[0] == '[') {
  448. ip_str++;
  449. if (domain != AF_INET6)
  450. return -EINVAL;
  451. if (!(port_str = strchr(ip_str, ']')))
  452. return -EINVAL;
  453. ip_len = port_str - ip_str;
  454. port_str++;
  455. if (*port_str != ':')
  456. return -EINVAL;
  457. } else {
  458. if (domain != AF_INET)
  459. return -EINVAL;
  460. if (!(port_str = strchr(ip_str, ':')))
  461. return -EINVAL;
  462. ip_len = port_str - ip_str;
  463. }
  464. port_str++;
  465. next_str = strchr(port_str, ':');
  466. if (next_str)
  467. next_str++;
  468. struct addr_inet * addr = round ? conn : bind;
  469. if (domain == AF_INET) {
  470. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  471. addr->ext_port = atoi(port_str);
  472. }
  473. if (domain == AF_INET6) {
  474. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  475. addr->ext_port = atoi(port_str);
  476. }
  477. }
  478. return 0;
  479. }
  480. struct un_conn {
  481. unsigned int pipeid;
  482. unsigned char path_size;
  483. char path[];
  484. } __attribute__((packed));
  485. int shim_do_listen (int sockfd, int backlog)
  486. {
  487. if (backlog < 0)
  488. return -EINVAL;
  489. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  490. if (!hdl)
  491. return -EBADF;
  492. if (hdl->type != TYPE_SOCK) {
  493. put_handle(hdl);
  494. return -ENOTSOCK;
  495. }
  496. struct shim_sock_handle * sock = &hdl->info.sock;
  497. if (sock->sock_type != SOCK_STREAM) {
  498. debug("shim_listen: not a stream socket\n");
  499. put_handle(hdl);
  500. return -EINVAL;
  501. }
  502. lock(hdl->lock);
  503. enum shim_sock_state state = sock->sock_state;
  504. int ret = -EINVAL;
  505. if (state != SOCK_BOUND) {
  506. debug("shim_listen: listen on unbound socket\n");
  507. goto out;
  508. }
  509. hdl->acc_mode = MAY_READ;
  510. sock->sock_state = SOCK_LISTENED;
  511. ret = 0;
  512. out:
  513. if (ret < 0)
  514. sock->sock_state = state;
  515. unlock(hdl->lock);
  516. put_handle(hdl);
  517. return ret;
  518. }
  519. /* Connect with the TCP socket is always in the client.
  520. *
  521. * With UDP, the connection is make to the socket specific for a
  522. * destination. A process with a connected UDP socket can call
  523. * connect again for that socket for one of two reasons: 1. To
  524. * specify a new IP address and port 2. To unconnect the socket.
  525. */
  526. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  527. {
  528. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  529. if (!hdl)
  530. return -EBADF;
  531. if (hdl->type != TYPE_SOCK) {
  532. put_handle(hdl);
  533. return -ENOTSOCK;
  534. }
  535. struct shim_sock_handle * sock = &hdl->info.sock;
  536. lock(hdl->lock);
  537. enum shim_sock_state state = sock->sock_state;
  538. int ret = -EINVAL;
  539. if (state == SOCK_CONNECTED) {
  540. debug("shim_connect: reconnect on a stream socket\n");
  541. goto out;
  542. }
  543. if (state != SOCK_BOUND &&
  544. state != SOCK_CREATED) {
  545. debug("shim_connect: connect on invalid socket\n");
  546. goto out;
  547. }
  548. if (sock->domain == AF_UNIX) {
  549. if (addrlen != sizeof(struct sockaddr_un))
  550. goto out;
  551. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  552. char * spath = saddr->sun_path;
  553. struct shim_dentry * dent;
  554. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  555. goto out;
  556. struct shim_unix_data * data = dent->data;
  557. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  558. data = malloc(sizeof(struct shim_unix_data));
  559. data->pipeid = dent->rel_path.hash >> 32;
  560. } else if (dent->fs != &socket_builtin_fs) {
  561. ret = -ECONNREFUSED;
  562. goto out;
  563. }
  564. sock->addr.un.pipeid = data->pipeid;
  565. sock->addr.un.data = data;
  566. sock->addr.un.dentry = dent;
  567. get_dentry(dent);
  568. }
  569. if (state == SOCK_BOUND) {
  570. /* if the socket is bound, the stream needs to be shut and rebound. */
  571. assert(hdl->pal_handle);
  572. DkStreamDelete(hdl->pal_handle, 0);
  573. DkObjectClose(hdl->pal_handle);
  574. hdl->pal_handle = NULL;
  575. }
  576. if (sock->domain != AF_UNIX) {
  577. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  578. sizeof(struct sockaddr_in6)))
  579. goto out;
  580. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  581. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  582. }
  583. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  584. SOCK_CONNECTED;
  585. if ((ret = create_socket_uri(hdl)) < 0)
  586. goto out;
  587. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  588. 0, 0, 0,
  589. hdl->flags & O_NONBLOCK);
  590. if (!pal_hdl) {
  591. ret = -PAL_ERRNO;
  592. goto out;
  593. }
  594. hdl->pal_handle = pal_hdl;
  595. if (sock->domain == AF_UNIX) {
  596. struct shim_dentry * dent = sock->addr.un.dentry;
  597. lock(dent->lock);
  598. dent->state ^= DENTRY_NEGATIVE;
  599. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  600. dent->fs = &socket_builtin_fs;
  601. dent->data = sock->addr.un.data;
  602. unlock(dent->lock);
  603. }
  604. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  605. char uri[SOCK_URI_SIZE];
  606. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  607. ret = -PAL_ERRNO;
  608. goto out;
  609. }
  610. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  611. &sock->addr.in.bind,
  612. &sock->addr.in.conn)) < 0)
  613. goto out;
  614. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  615. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  616. }
  617. hdl->acc_mode = MAY_READ|MAY_WRITE;
  618. __process_pending_options(hdl);
  619. ret = 0;
  620. out:
  621. if (ret < 0) {
  622. sock->sock_state = state;
  623. sock->error = -ret;
  624. if (sock->domain == AF_UNIX) {
  625. if (sock->addr.un.dentry)
  626. put_dentry(sock->addr.un.dentry);
  627. if (sock->addr.un.data) {
  628. free(sock->addr.un.data);
  629. sock->addr.un.data = NULL;
  630. }
  631. }
  632. }
  633. unlock(hdl->lock);
  634. put_handle(hdl);
  635. return ret;
  636. }
  637. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  638. socklen_t * addrlen)
  639. {
  640. if (hdl->type != TYPE_SOCK)
  641. return -ENOTSOCK;
  642. struct shim_sock_handle * sock = &hdl->info.sock;
  643. int ret;
  644. PAL_HANDLE accepted = NULL;
  645. if (sock->sock_type != SOCK_STREAM) {
  646. debug("shim_listen: not a stream socket\n");
  647. return -EINVAL;
  648. }
  649. lock(hdl->lock);
  650. if (sock->sock_state != SOCK_LISTENED) {
  651. debug("shim_accpet: invalid socket\n");
  652. ret = -EINVAL;
  653. goto out;
  654. }
  655. accepted = DkStreamWaitForClient(hdl->pal_handle);
  656. if (!accepted) {
  657. ret = -PAL_ERRNO;
  658. goto out;
  659. }
  660. if (flags & O_NONBLOCK) {
  661. PAL_STREAM_ATTR attr;
  662. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  663. ret = -PAL_ERRNO;
  664. goto out;
  665. }
  666. attr.nonblocking = PAL_TRUE;
  667. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  668. ret = -PAL_ERRNO;
  669. goto out;
  670. }
  671. }
  672. struct shim_handle * cli = get_new_handle();
  673. if (!cli) {
  674. ret = -ENOMEM;
  675. goto out;
  676. }
  677. struct shim_sock_handle * cli_sock = &cli->info.sock;
  678. cli->type = TYPE_SOCK;
  679. set_handle_fs(cli, &socket_builtin_fs);
  680. cli->acc_mode = MAY_READ|MAY_WRITE;
  681. cli->flags = O_RDWR|flags;
  682. cli->pal_handle = accepted;
  683. cli_sock->domain = sock->domain;
  684. cli_sock->sock_type = sock->sock_type;
  685. cli_sock->protocol = sock->protocol;
  686. cli_sock->sock_state = SOCK_ACCEPTED;
  687. if (sock->domain == AF_UNIX) {
  688. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  689. if (sock->addr.un.dentry) {
  690. get_dentry(sock->addr.un.dentry);
  691. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  692. }
  693. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  694. if (addr) {
  695. unix_copy_addr(addr, sock->addr.un.dentry);
  696. if (addrlen)
  697. *addrlen = sizeof(struct sockaddr_un);
  698. }
  699. }
  700. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  701. char uri[SOCK_URI_SIZE];
  702. int uri_len;
  703. if (!(uri_len = DkStreamGetName(accepted, uri, SOCK_URI_SIZE))) {
  704. ret = -PAL_ERRNO;
  705. out_hdl:
  706. DkObjectClose(accepted);
  707. goto out_cli;
  708. }
  709. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  710. &cli_sock->addr.in.bind,
  711. &cli_sock->addr.in.conn)) < 0)
  712. goto out_hdl;
  713. qstrsetstr(&cli->uri, uri, uri_len);
  714. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  715. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  716. if (addr) {
  717. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  718. if (addrlen)
  719. *addrlen = (sock->domain == AF_INET) ?
  720. sizeof(struct sockaddr_in) :
  721. sizeof(struct sockaddr_in6);
  722. }
  723. }
  724. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  725. out_cli:
  726. put_handle(cli);
  727. out:
  728. if (ret < 0)
  729. sock->error = -ret;
  730. unlock(hdl->lock);
  731. return ret;
  732. }
  733. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  734. {
  735. int flags;
  736. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  737. if (!hdl)
  738. return -EBADF;
  739. int ret = __do_accept(hdl, flags & FD_CLOEXEC ? O_CLOEXEC : 0,
  740. addr, addrlen);
  741. put_handle(hdl);
  742. return ret;
  743. }
  744. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  745. int flags)
  746. {
  747. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  748. if (!hdl)
  749. return -EBADF;
  750. int ret = __do_accept(hdl,
  751. (flags & SOCK_CLOEXEC ? FD_CLOEXEC : 0) |
  752. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  753. addr, addrlen);
  754. put_handle(hdl);
  755. return ret;
  756. }
  757. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  758. const struct sockaddr * addr, socklen_t addrlen)
  759. {
  760. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  761. if (!hdl)
  762. return -EBADF;
  763. int ret = -EINVAL;
  764. if (hdl->type != TYPE_SOCK) {
  765. ret = -ENOTSOCK;
  766. goto out;
  767. }
  768. struct shim_sock_handle * sock = &hdl->info.sock;
  769. lock(hdl->lock);
  770. PAL_HANDLE pal_hdl = hdl->pal_handle;
  771. char * uri = NULL;
  772. /* Data gram sock need not be conneted or bound at all */
  773. if (sock->sock_type == SOCK_STREAM &&
  774. sock->sock_state != SOCK_CONNECTED &&
  775. sock->sock_state != SOCK_BOUNDCONNECTED &&
  776. sock->sock_state != SOCK_ACCEPTED) {
  777. ret = -ENOTCONN;
  778. goto out_locked;
  779. }
  780. if (sock->sock_type == SOCK_DGRAM &&
  781. sock->sock_state == SOCK_SHUTDOWN) {
  782. ret = -ENOTCONN;
  783. goto out_locked;
  784. }
  785. if (!(hdl->acc_mode & MAY_WRITE)) {
  786. ret = -ECONNRESET;
  787. goto out_locked;
  788. }
  789. if (sock->sock_type == SOCK_DGRAM &&
  790. sock->sock_state != SOCK_BOUNDCONNECTED &&
  791. sock->sock_state != SOCK_CONNECTED) {
  792. if (!addr) {
  793. ret = -EDESTADDRREQ;
  794. goto out_locked;
  795. }
  796. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  797. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  798. hdl->flags & O_NONBLOCK);
  799. if (!pal_hdl) {
  800. ret = -PAL_ERRNO;
  801. goto out_locked;
  802. }
  803. hdl->pal_handle = pal_hdl;
  804. }
  805. if (addr && addr->sa_family != sock->domain) {
  806. ret = -EINVAL;
  807. goto out_locked;
  808. }
  809. uri = __alloca(SOCK_URI_SIZE);
  810. }
  811. unlock(hdl->lock);
  812. if (uri) {
  813. struct addr_inet addr_buf;
  814. inet_save_addr(sock->domain, &addr_buf, addr);
  815. inet_rebase_port(false, sock->domain, &addr_buf, false);
  816. memcpy(uri, "udp:", 5);
  817. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  818. &addr_buf)) < 0) {
  819. lock(hdl->lock);
  820. goto out_locked;
  821. }
  822. debug("next packet send to %s\n", uri);
  823. }
  824. int bytes = 0;
  825. ret = 0;
  826. for (int i = 0 ; i < nbufs ; i++) {
  827. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  828. uri);
  829. if (!ret) {
  830. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  831. - ECONNABORTED : -PAL_ERRNO;
  832. break;
  833. }
  834. bytes += ret;
  835. }
  836. if (bytes)
  837. ret = bytes;
  838. if (ret < 0) {
  839. lock(hdl->lock);
  840. goto out_locked;
  841. }
  842. goto out;
  843. out_locked:
  844. if (ret < 0)
  845. sock->error = -ret;
  846. unlock(hdl->lock);
  847. out:
  848. put_handle(hdl);
  849. return ret;
  850. }
  851. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  852. const struct sockaddr * addr, socklen_t addrlen)
  853. {
  854. struct iovec iovbuf;
  855. iovbuf.iov_base = (void *) buf;
  856. iovbuf.iov_len = len;
  857. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  858. }
  859. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  860. {
  861. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  862. msg->msg_name, msg->msg_namelen);
  863. }
  864. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  865. struct sockaddr * addr, socklen_t * addrlen)
  866. {
  867. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  868. if (!hdl)
  869. return -EBADF;
  870. int ret = 0;
  871. if (hdl->type != TYPE_SOCK) {
  872. ret = -ENOTSOCK;
  873. goto out;
  874. }
  875. struct shim_sock_handle * sock = &hdl->info.sock;
  876. lock(hdl->lock);
  877. PAL_HANDLE pal_hdl = hdl->pal_handle;
  878. char * uri = NULL;
  879. if (sock->sock_type == SOCK_STREAM &&
  880. sock->sock_state != SOCK_CONNECTED &&
  881. sock->sock_state != SOCK_BOUNDCONNECTED &&
  882. sock->sock_state != SOCK_ACCEPTED) {
  883. ret = -ENOTCONN;
  884. goto out_locked;
  885. }
  886. if (!(hdl->acc_mode & MAY_READ)) {
  887. ret = 0;
  888. goto out_locked;
  889. }
  890. if (addr && sock->sock_type == SOCK_DGRAM &&
  891. sock->sock_state != SOCK_CONNECTED &&
  892. sock->sock_state != SOCK_BOUNDCONNECTED) {
  893. if (sock->sock_state == SOCK_CREATED) {
  894. ret = -EINVAL;
  895. goto out_locked;
  896. }
  897. uri = __alloca(SOCK_URI_SIZE);
  898. }
  899. unlock(hdl->lock);
  900. bool address_received = false;
  901. int bytes = 0;
  902. ret = 0;
  903. for (int i = 0 ; i < nbufs ; i++) {
  904. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  905. uri, uri ? SOCK_URI_SIZE : 0);
  906. if (!ret) {
  907. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  908. - ECONNABORTED : -PAL_ERRNO;
  909. break;
  910. }
  911. bytes += ret;
  912. if (!addr || !bytes || address_received)
  913. continue;
  914. if (sock->domain == AF_UNIX) {
  915. unix_copy_addr(addr, sock->addr.un.dentry);
  916. *addrlen = sizeof(struct sockaddr_un);
  917. }
  918. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  919. if (uri) {
  920. struct addr_inet conn;
  921. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  922. &conn, NULL)) < 0) {
  923. lock(hdl->lock);
  924. goto out_locked;
  925. }
  926. debug("last packet received from %s\n", uri);
  927. inet_rebase_port(true, sock->domain, &conn, false);
  928. inet_copy_addr(sock->domain, addr, &conn);
  929. } else {
  930. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  931. }
  932. *addrlen = (sock->domain == AF_INET) ?
  933. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  934. }
  935. address_received = false;
  936. }
  937. if (bytes)
  938. ret = bytes;
  939. if (ret < 0) {
  940. lock(hdl->lock);
  941. goto out_locked;
  942. }
  943. goto out;
  944. out_locked:
  945. if (ret < 0)
  946. sock->error = -ret;
  947. unlock(hdl->lock);
  948. out:
  949. put_handle(hdl);
  950. return ret;
  951. }
  952. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  953. struct sockaddr * addr, socklen_t * addrlen)
  954. {
  955. struct iovec iovbuf;
  956. iovbuf.iov_base = (void *) buf;
  957. iovbuf.iov_len = len;
  958. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  959. }
  960. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  961. {
  962. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  963. msg->msg_name, &msg->msg_namelen);
  964. }
  965. #define SHUT_RD 0
  966. #define SHUT_WR 1
  967. #define SHUT_RDWR 2
  968. int shim_do_shutdown (int sockfd, int how)
  969. {
  970. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  971. if (!hdl)
  972. return -EBADF;
  973. int ret = 0;
  974. struct shim_sock_handle * sock = &hdl->info.sock;
  975. if (hdl->type != TYPE_SOCK) {
  976. ret = -ENOTSOCK;
  977. goto out;
  978. }
  979. lock(hdl->lock);
  980. if (sock->sock_state != SOCK_LISTENED &&
  981. sock->sock_state != SOCK_ACCEPTED &&
  982. sock->sock_state != SOCK_CONNECTED &&
  983. sock->sock_state != SOCK_BOUNDCONNECTED) {
  984. ret = -ENOTCONN;
  985. goto out_locked;
  986. }
  987. switch (how) {
  988. case SHUT_RD:
  989. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  990. hdl->acc_mode &= ~MAY_READ;
  991. break;
  992. case SHUT_WR:
  993. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  994. hdl->acc_mode &= ~MAY_WRITE;
  995. break;
  996. case SHUT_RDWR:
  997. DkStreamDelete(hdl->pal_handle, 0);
  998. hdl->acc_mode = 0;
  999. sock->sock_state = SOCK_SHUTDOWN;
  1000. break;
  1001. }
  1002. ret = 0;
  1003. out_locked:
  1004. if (ret < 0)
  1005. sock->error = -ret;
  1006. unlock(hdl->lock);
  1007. out:
  1008. put_handle(hdl);
  1009. return ret;
  1010. }
  1011. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1012. {
  1013. if (!addr || !addrlen)
  1014. return -EFAULT;
  1015. if (*addrlen <= 0)
  1016. return -EINVAL;
  1017. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1018. if (!hdl)
  1019. return -EBADF;
  1020. int ret = -EINVAL;
  1021. if (hdl->type != TYPE_SOCK) {
  1022. ret = -ENOTSOCK;
  1023. goto out;
  1024. }
  1025. struct shim_sock_handle * sock = &hdl->info.sock;
  1026. lock(hdl->lock);
  1027. struct sockaddr saddr;
  1028. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1029. if (len < *addrlen)
  1030. len = *addrlen;
  1031. memcpy(addr, &saddr, len);
  1032. *addrlen = len;
  1033. ret = 0;
  1034. unlock(hdl->lock);
  1035. out:
  1036. put_handle(hdl);
  1037. return ret;
  1038. }
  1039. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1040. {
  1041. if (!addr || !addrlen)
  1042. return -EFAULT;
  1043. if (*addrlen <= 0)
  1044. return -EINVAL;
  1045. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1046. if (!hdl)
  1047. return -EBADF;
  1048. int ret = -EINVAL;
  1049. if (hdl->type != TYPE_SOCK) {
  1050. ret = -ENOTSOCK;
  1051. goto out;
  1052. }
  1053. struct shim_sock_handle * sock = &hdl->info.sock;
  1054. lock(hdl->lock);
  1055. /* Data gram sock need not be conneted or bound at all */
  1056. if (sock->sock_type == SOCK_STREAM &&
  1057. sock->sock_state != SOCK_CONNECTED &&
  1058. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1059. sock->sock_state != SOCK_ACCEPTED) {
  1060. ret = -ENOTCONN;
  1061. goto out_locked;
  1062. }
  1063. if (sock->sock_type == SOCK_DGRAM &&
  1064. sock->sock_state != SOCK_CONNECTED &&
  1065. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1066. ret = -ENOTCONN;
  1067. goto out_locked;
  1068. }
  1069. struct sockaddr saddr;
  1070. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1071. if (len < *addrlen)
  1072. len = *addrlen;
  1073. memcpy(addr, &saddr, len);
  1074. *addrlen = len;
  1075. ret = 0;
  1076. out_locked:
  1077. unlock(hdl->lock);
  1078. out:
  1079. put_handle(hdl);
  1080. return ret;
  1081. }
  1082. struct __kernel_linger {
  1083. int l_onoff;
  1084. int l_linger;
  1085. };
  1086. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1087. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1088. {
  1089. int intval = *((int *) optval);
  1090. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1091. if (level == SOL_SOCKET) {
  1092. switch(optname) {
  1093. case SO_ACCEPTCONN:
  1094. case SO_DOMAIN:
  1095. case SO_ERROR:
  1096. case SO_PROTOCOL:
  1097. case SO_TYPE:
  1098. return -EPERM;
  1099. case SO_KEEPALIVE:
  1100. case SO_LINGER:
  1101. case SO_RCVBUF:
  1102. case SO_SNDBUF:
  1103. case SO_RCVTIMEO:
  1104. case SO_SNDTIMEO:
  1105. case SO_REUSEADDR:
  1106. goto query;
  1107. default:
  1108. goto unknown;
  1109. }
  1110. }
  1111. if (level == SOL_TCP) {
  1112. switch(optname) {
  1113. case TCP_CORK:
  1114. case TCP_NODELAY:
  1115. goto query;
  1116. default:
  1117. goto unknown;
  1118. }
  1119. }
  1120. unknown:
  1121. return -ENOPROTOOPT;
  1122. query:
  1123. if (!attr) {
  1124. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1125. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1126. return -PAL_ERRNO;
  1127. }
  1128. if (level == SOL_SOCKET) {
  1129. switch(optname) {
  1130. case SO_KEEPALIVE:
  1131. if (bolval != attr->socket.tcp_keepalive) {
  1132. attr->socket.tcp_keepalive = bolval;
  1133. goto set;
  1134. }
  1135. break;
  1136. case SO_LINGER: {
  1137. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1138. int linger = l->l_onoff ? l->l_linger : 0;
  1139. if (linger != (int) attr->socket.linger) {
  1140. attr->socket.linger = linger;
  1141. goto set;
  1142. }
  1143. break;
  1144. }
  1145. case SO_RCVBUF:
  1146. if (intval != (int) attr->socket.receivebuf) {
  1147. attr->socket.receivebuf = intval;
  1148. goto set;
  1149. }
  1150. break;
  1151. case SO_SNDBUF:
  1152. if (intval != (int) attr->socket.sendbuf) {
  1153. attr->socket.sendbuf = intval;
  1154. goto set;
  1155. }
  1156. break;
  1157. case SO_RCVTIMEO:
  1158. if (intval != (int) attr->socket.receivetimeout) {
  1159. attr->socket.receivetimeout = intval;
  1160. goto set;
  1161. }
  1162. break;
  1163. case SO_SNDTIMEO:
  1164. if (intval != (int) attr->socket.sendtimeout) {
  1165. attr->socket.sendtimeout = intval;
  1166. goto set;
  1167. }
  1168. break;
  1169. case SO_REUSEADDR:
  1170. break;
  1171. }
  1172. }
  1173. if (level == SOL_TCP) {
  1174. switch(optname) {
  1175. case TCP_CORK:
  1176. if (bolval != attr->socket.tcp_cork) {
  1177. attr->socket.tcp_cork = bolval;
  1178. goto set;
  1179. }
  1180. break;
  1181. case TCP_NODELAY:
  1182. if (bolval != attr->socket.tcp_nodelay) {
  1183. attr->socket.tcp_nodelay = bolval;
  1184. goto set;
  1185. }
  1186. break;
  1187. }
  1188. }
  1189. return 0;
  1190. set:
  1191. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1192. return -PAL_ERRNO;
  1193. return 0;
  1194. }
  1195. static int __process_pending_options (struct shim_handle * hdl)
  1196. {
  1197. struct shim_sock_handle * sock = &hdl->info.sock;
  1198. if (!sock->pending_options)
  1199. return 0;
  1200. PAL_STREAM_ATTR attr;
  1201. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1202. return -PAL_ERRNO;
  1203. struct shim_sock_option * o = sock->pending_options;
  1204. while (o) {
  1205. PAL_STREAM_ATTR tmp = attr;
  1206. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1207. o->optlen, &tmp);
  1208. if (!ret)
  1209. attr = tmp;
  1210. struct shim_sock_option * next = o->next;
  1211. free(o);
  1212. o = next;
  1213. }
  1214. return 0;
  1215. }
  1216. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1217. int optlen)
  1218. {
  1219. if (!optval)
  1220. return -EFAULT;
  1221. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1222. if (!hdl)
  1223. return -EBADF;
  1224. int ret = 0;
  1225. if (hdl->type != TYPE_SOCK) {
  1226. ret = -ENOTSOCK;
  1227. goto out;
  1228. }
  1229. struct shim_sock_handle * sock = &hdl->info.sock;
  1230. lock(hdl->lock);
  1231. if (!hdl->pal_handle) {
  1232. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1233. optlen);
  1234. if (!o) {
  1235. ret = -ENOMEM;
  1236. goto out_locked;
  1237. }
  1238. struct shim_sock_option ** next = &sock->pending_options;
  1239. while (*next)
  1240. next = &(*next)->next;
  1241. o->next = NULL;
  1242. *next = o;
  1243. o->level = level;
  1244. o->optname = optname;
  1245. o->optlen = optlen;
  1246. memcpy(&o->optval, optval, optlen);
  1247. goto out_locked;
  1248. }
  1249. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1250. out_locked:
  1251. unlock(hdl->lock);
  1252. out:
  1253. put_handle(hdl);
  1254. return ret;
  1255. }
  1256. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1257. int * optlen)
  1258. {
  1259. if (!optval || !optlen)
  1260. return -EFAULT;
  1261. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1262. if (!hdl)
  1263. return -EBADF;
  1264. int ret = 0;
  1265. if (hdl->type != TYPE_SOCK) {
  1266. ret = -ENOTSOCK;
  1267. goto out;
  1268. }
  1269. struct shim_sock_handle * sock = &hdl->info.sock;
  1270. lock(hdl->lock);
  1271. int * intval = (int *) optval;
  1272. if (level == SOL_SOCKET) {
  1273. switch(optname) {
  1274. case SO_ACCEPTCONN:
  1275. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1276. goto out;
  1277. case SO_DOMAIN:
  1278. *intval = sock->domain;
  1279. goto out;
  1280. case SO_ERROR:
  1281. *intval = sock->error;
  1282. goto out;
  1283. case SO_PROTOCOL:
  1284. switch(sock->protocol) {
  1285. case SOCK_STREAM:
  1286. *intval = IPPROTO_SCTP;
  1287. break;
  1288. case SOCK_DGRAM:
  1289. *intval = IPPROTO_UDP;
  1290. break;
  1291. default:
  1292. goto unknown;
  1293. }
  1294. goto out;
  1295. case SO_TYPE:
  1296. *intval = sock->protocol;
  1297. goto out;
  1298. case SO_KEEPALIVE:
  1299. case SO_LINGER:
  1300. case SO_RCVBUF:
  1301. case SO_SNDBUF:
  1302. case SO_RCVTIMEO:
  1303. case SO_SNDTIMEO:
  1304. case SO_REUSEADDR:
  1305. goto query;
  1306. default:
  1307. goto unknown;
  1308. }
  1309. }
  1310. if (level == SOL_TCP) {
  1311. switch(optname) {
  1312. case TCP_CORK:
  1313. case TCP_NODELAY:
  1314. goto query;
  1315. default:
  1316. goto unknown;
  1317. }
  1318. }
  1319. unknown:
  1320. ret = -ENOPROTOOPT;
  1321. goto out;
  1322. query:
  1323. {
  1324. PAL_STREAM_ATTR attr;
  1325. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1326. ret = -PAL_ERRNO;
  1327. goto out;
  1328. }
  1329. if (level == SOL_SOCKET) {
  1330. switch(optname) {
  1331. case SO_KEEPALIVE:
  1332. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1333. break;
  1334. case SO_LINGER: {
  1335. struct __kernel_linger * l =
  1336. (struct __kernel_linger *) optval;
  1337. l->l_onoff = attr.socket.linger ? 1 : 0;
  1338. l->l_linger = attr.socket.linger;
  1339. break;
  1340. }
  1341. case SO_RCVBUF:
  1342. *intval = attr.socket.receivebuf;
  1343. break;
  1344. case SO_SNDBUF:
  1345. *intval = attr.socket.sendbuf;
  1346. break;
  1347. case SO_RCVTIMEO:
  1348. *intval = attr.socket.receivetimeout;
  1349. break;
  1350. case SO_SNDTIMEO:
  1351. *intval = attr.socket.sendtimeout;
  1352. break;
  1353. case SO_REUSEADDR:
  1354. *intval = 1;
  1355. break;
  1356. }
  1357. }
  1358. if (level == SOL_TCP) {
  1359. switch(optname) {
  1360. case TCP_CORK:
  1361. *intval = attr.socket.tcp_cork ? 1 : 0;
  1362. break;
  1363. case TCP_NODELAY:
  1364. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1365. break;
  1366. }
  1367. }
  1368. }
  1369. out:
  1370. unlock(hdl->lock);
  1371. put_handle(hdl);
  1372. return ret;
  1373. }