shim_socket.c 45 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 OSCAR lab, Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/in.h>
  33. #include <linux/in6.h>
  34. #include <asm/socket.h>
  35. /*
  36. * User-settable options (used with setsockopt).
  37. */
  38. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  39. #define TCP_MAXSEG 2 /* Set maximum segment size */
  40. #define TCP_CORK 3 /* Control sending of partial frames */
  41. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  42. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  43. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  44. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  45. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  46. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  47. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  48. #define TCP_INFO 11 /* Information about this connection. */
  49. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  50. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  51. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  52. #define SOCK_URI_SIZE 108
  53. static int rebase_on_lo __attribute_migratable = -1;
  54. static int init_port_rebase (void)
  55. {
  56. if (rebase_on_lo != -1)
  57. return 0;
  58. char cfg[CONFIG_MAX];
  59. int rebase = 0;
  60. if (!root_config ||
  61. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  62. rebase_on_lo = 0;
  63. return 0;
  64. }
  65. for (const char * p = cfg ; *p ; p++) {
  66. if (*p < '0' || *p > '9' || rebase > 32767) {
  67. rebase_on_lo = 0;
  68. return 0;
  69. }
  70. rebase = rebase * 10 + (*p - '0');
  71. }
  72. rebase_on_lo = rebase;
  73. return 0;
  74. }
  75. static int __process_pending_options (struct shim_handle * hdl);
  76. int shim_do_socket (int family, int type, int protocol)
  77. {
  78. struct shim_handle * hdl = get_new_handle();
  79. if (!hdl)
  80. return -ENOMEM;
  81. struct shim_sock_handle * sock = &hdl->info.sock;
  82. hdl->type = TYPE_SOCK;
  83. set_handle_fs(hdl, &socket_builtin_fs);
  84. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  85. hdl->acc_mode = 0;
  86. sock->domain = family;
  87. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  88. sock->protocol = protocol;
  89. int ret = -ENOSYS;
  90. switch (sock->domain) {
  91. case AF_UNIX: //Local communication
  92. case AF_INET: //IPv4 Internet protocols ip(7)
  93. case AF_INET6: //IPv6 Internet protocols
  94. break;
  95. default:
  96. debug("shim_socket: unknown socket domain %d\n",
  97. sock->domain);
  98. goto err;
  99. }
  100. switch (sock->sock_type) {
  101. case SOCK_STREAM: //TCP
  102. break;
  103. case SOCK_DGRAM: //UDP
  104. hdl->acc_mode = MAY_READ|MAY_WRITE;
  105. break;
  106. default:
  107. debug("shim_socket: unknown socket type %d\n",
  108. sock->sock_type);
  109. goto err;
  110. }
  111. sock->sock_state = SOCK_CREATED;
  112. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  113. err:
  114. put_handle(hdl);
  115. return ret;
  116. }
  117. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  118. unsigned int pipeid)
  119. {
  120. int bytes = 0;
  121. switch (state) {
  122. case SOCK_CREATED:
  123. case SOCK_BOUNDCONNECTED:
  124. case SOCK_SHUTDOWN:
  125. return -ENOTCONN;
  126. case SOCK_BOUND:
  127. case SOCK_LISTENED:
  128. case SOCK_ACCEPTED:
  129. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  130. break;
  131. case SOCK_CONNECTED:
  132. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  133. break;
  134. default:
  135. return -ENOTCONN;
  136. }
  137. return bytes == count ? -ENAMETOOLONG : bytes;
  138. }
  139. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  140. bool local)
  141. {
  142. init_port_rebase();
  143. if (rebase_on_lo) {
  144. if (domain == AF_INET) {
  145. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  146. if (!local && memcmp(ad, "\177\0\0\1", 4))
  147. return;
  148. }
  149. if (domain == AF_INET6) {
  150. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  151. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  152. return;
  153. }
  154. }
  155. if (reverse)
  156. addr->port = addr->ext_port - rebase_on_lo;
  157. else
  158. addr->ext_port = addr->port + rebase_on_lo;
  159. }
  160. static int inet_translate_addr (int domain, char * uri, int count,
  161. struct addr_inet * addr)
  162. {
  163. if (domain == AF_INET) {
  164. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  165. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  166. ad[0], ad[1], ad[2], ad[3], addr->ext_port);
  167. return bytes == count ? -ENAMETOOLONG : bytes;
  168. }
  169. if (domain == AF_INET6) {
  170. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  171. int bytes = snprintf(uri, count,
  172. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  173. ad[0], ad[1], ad[2], ad[3],
  174. ad[4], ad[5], ad[6], ad[7], addr->ext_port);
  175. return bytes == count ? -ENAMETOOLONG : bytes;
  176. }
  177. return -EPROTONOSUPPORT;
  178. }
  179. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  180. enum shim_sock_state state,
  181. struct addr_inet * bind, struct addr_inet * conn)
  182. {
  183. int bytes = 0, ret;
  184. if (sock_type == SOCK_STREAM) {
  185. switch (state) {
  186. case SOCK_CREATED:
  187. case SOCK_SHUTDOWN:
  188. return -ENOTCONN;
  189. case SOCK_BOUND:
  190. case SOCK_LISTENED:
  191. if (count < 9)
  192. return -ENAMETOOLONG;
  193. memcpy(uri, "tcp.srv:", 9);
  194. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  195. return ret < 0 ? ret : ret + 8;
  196. case SOCK_BOUNDCONNECTED:
  197. if (count < 5)
  198. return -ENAMETOOLONG;
  199. memcpy(uri, "tcp:", 5);
  200. bytes = 4;
  201. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  202. bind);
  203. if (ret < 0)
  204. return ret;
  205. uri[bytes + ret] = ':';
  206. bytes += ret + 1;
  207. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  208. conn);
  209. return ret < 0 ? ret : ret + bytes;
  210. case SOCK_CONNECTED:
  211. case SOCK_ACCEPTED:
  212. if (count < 5)
  213. return -ENAMETOOLONG;
  214. memcpy(uri, "tcp:", 5);
  215. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  216. return ret < 0 ? ret : ret + 4;
  217. }
  218. }
  219. if (sock_type == SOCK_DGRAM) {
  220. switch (state) {
  221. case SOCK_CREATED:
  222. case SOCK_SHUTDOWN:
  223. return -ENOTCONN;
  224. case SOCK_LISTENED:
  225. case SOCK_ACCEPTED:
  226. return -EOPNOTSUPP;
  227. case SOCK_BOUNDCONNECTED:
  228. if (count < 9)
  229. return -ENAMETOOLONG;
  230. memcpy(uri, "tcp.srv:", 9);
  231. bytes = 8;
  232. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  233. bind);
  234. if (ret < 0)
  235. return ret;
  236. uri[bytes + ret] = ':';
  237. bytes += ret + 1;
  238. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  239. conn);
  240. return ret < 0 ? ret : ret + bytes;
  241. case SOCK_BOUND:
  242. if (count < 9)
  243. return -ENAMETOOLONG;
  244. memcpy(uri, "udp.srv:", 9);
  245. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  246. return ret < 0 ? ret : ret + 9;
  247. case SOCK_CONNECTED:
  248. if (count < 5)
  249. return -ENAMETOOLONG;
  250. memcpy(uri, "udp:", 5);
  251. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  252. return ret < 0 ? ret : ret + 4;
  253. }
  254. }
  255. return -EPROTONOSUPPORT;
  256. }
  257. static inline void unix_copy_addr (struct sockaddr * saddr,
  258. struct shim_dentry * dent)
  259. {
  260. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  261. un->sun_family = AF_UNIX;
  262. int size;
  263. const char * path = dentry_get_path(dent, true, &size);
  264. memcpy(un->sun_path, path, size + 1);
  265. }
  266. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  267. const struct addr_inet * addr)
  268. {
  269. if (domain == AF_INET) {
  270. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  271. in->sin_family = AF_INET;
  272. in->sin_port = __htons(addr->port);
  273. in->sin_addr = addr->addr.v4;
  274. return sizeof(struct sockaddr_in);
  275. }
  276. if (domain == AF_INET6) {
  277. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  278. in6->sin6_family = AF_INET6;
  279. in6->sin6_port = __htons(addr->port);
  280. in6->sin6_addr = addr->addr.v6;
  281. return sizeof(struct sockaddr_in6);
  282. }
  283. return sizeof(struct sockaddr);
  284. }
  285. static void inet_save_addr (int domain, struct addr_inet * addr,
  286. const struct sockaddr * saddr)
  287. {
  288. if (domain == AF_INET) {
  289. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  290. addr->port = __ntohs(in->sin_port);
  291. addr->addr.v4 = in->sin_addr;
  292. return;
  293. }
  294. if (domain == AF_INET6) {
  295. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  296. addr->port = __ntohs(in6->sin6_port);
  297. addr->addr.v6 = in6->sin6_addr;
  298. return;
  299. }
  300. }
  301. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  302. const struct sockaddr * saddr)
  303. {
  304. if (domain == AF_INET) {
  305. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  306. return addr->port == __ntohs(in->sin_port) &&
  307. !memcmp(&addr->addr.v4, &in->sin_addr,
  308. sizeof(struct in_addr));
  309. }
  310. if (domain == AF_INET6) {
  311. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  312. return addr->port == __ntohs(in6->sin6_port) &&
  313. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  314. sizeof(struct in6_addr));
  315. }
  316. return false;
  317. }
  318. static int create_socket_uri (struct shim_handle * hdl)
  319. {
  320. struct shim_sock_handle * sock = &hdl->info.sock;
  321. if (sock->domain == AF_UNIX) {
  322. char uri_buf[32];
  323. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  324. sock->addr.un.pipeid);
  325. if (bytes < 0)
  326. return bytes;
  327. qstrsetstr(&hdl->uri, uri_buf, bytes);
  328. return 0;
  329. }
  330. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  331. char uri_buf[SOCK_URI_SIZE];
  332. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  333. sock->sock_type, sock->sock_state,
  334. &sock->addr.in.bind, &sock->addr.in.conn);
  335. if (bytes < 0)
  336. return bytes;
  337. qstrsetstr(&hdl->uri, uri_buf, bytes);
  338. return 0;
  339. }
  340. return -EPROTONOSUPPORT;
  341. }
  342. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  343. {
  344. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  345. if (!hdl)
  346. return -EBADF;
  347. int ret = -EINVAL;
  348. if (hdl->type != TYPE_SOCK) {
  349. put_handle(hdl);
  350. return -ENOTSOCK;
  351. }
  352. struct shim_sock_handle * sock = &hdl->info.sock;
  353. lock(hdl->lock);
  354. enum shim_sock_state state = sock->sock_state;
  355. if (state != SOCK_CREATED) {
  356. debug("shim_bind: bind on a bound socket\n");
  357. goto out;
  358. }
  359. if (sock->domain == AF_UNIX) {
  360. if (addrlen != sizeof(struct sockaddr_un))
  361. goto out;
  362. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  363. char * spath = saddr->sun_path;
  364. struct shim_dentry * dent = NULL;
  365. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  366. goto out;
  367. if (dent->state & DENTRY_VALID &&
  368. !(dent->state & DENTRY_NEGATIVE)) {
  369. ret = -EADDRINUSE;
  370. goto out;
  371. }
  372. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  373. data->pipeid = dent->rel_path.hash >> 32;
  374. sock->addr.un.pipeid = data->pipeid;
  375. sock->addr.un.data = data;
  376. sock->addr.un.dentry = dent;
  377. }
  378. else { /* AF_INET/INET6 case */
  379. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  380. sizeof(struct sockaddr_in6)))
  381. goto out;
  382. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  383. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  384. }
  385. sock->sock_state = SOCK_BOUND;
  386. if ((ret = create_socket_uri(hdl)) < 0)
  387. goto out;
  388. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  389. 0, 0, 0,
  390. hdl->flags & O_NONBLOCK);
  391. if (!pal_hdl) {
  392. debug("bind: invalid handle returned\n");
  393. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  394. goto out;
  395. }
  396. if (sock->domain == AF_UNIX) {
  397. struct shim_dentry * dent = sock->addr.un.dentry;
  398. dent->state ^= DENTRY_NEGATIVE;
  399. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  400. dent->fs = &socket_builtin_fs;
  401. dent->data = sock->addr.un.data;
  402. }
  403. hdl->pal_handle = pal_hdl;
  404. __process_pending_options(hdl);
  405. ret = 0;
  406. out:
  407. if (ret < 0) {
  408. sock->sock_state = state;
  409. sock->error = -ret;
  410. if (sock->domain == AF_UNIX) {
  411. if (sock->addr.un.dentry)
  412. put_dentry(sock->addr.un.dentry);
  413. if (sock->addr.un.data) {
  414. free(sock->addr.un.data);
  415. sock->addr.un.data = NULL;
  416. }
  417. }
  418. }
  419. unlock(hdl->lock);
  420. put_handle(hdl);
  421. return ret;
  422. }
  423. static int inet_parse_addr (int domain, int type, const char * uri,
  424. struct addr_inet * bind,
  425. struct addr_inet * conn)
  426. {
  427. char * ip_str, * port_str, * next_str;
  428. int ip_len = 0;
  429. if (!(next_str = strchr(uri, ':')))
  430. return -EINVAL;
  431. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  432. int n = (next_str++) - uri;
  433. if (!memcmp(uri, "udp", n))
  434. prefix = UDP;
  435. else if (!memcmp(uri, "udp.srv", n))
  436. prefix = UDPSRV;
  437. else if (!memcmp(uri, "tcp", n))
  438. prefix = TCP;
  439. else if (!memcmp(uri, "tcp.srv", n))
  440. prefix = TCPSRV;
  441. else
  442. return -EINVAL;
  443. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  444. return -EINVAL;
  445. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  446. return -EINVAL;
  447. for (int round = 0 ; (ip_str = next_str) ; round++) {
  448. if (ip_str[0] == '[') {
  449. ip_str++;
  450. if (domain != AF_INET6)
  451. return -EINVAL;
  452. if (!(port_str = strchr(ip_str, ']')))
  453. return -EINVAL;
  454. ip_len = port_str - ip_str;
  455. port_str++;
  456. if (*port_str != ':')
  457. return -EINVAL;
  458. } else {
  459. if (domain != AF_INET)
  460. return -EINVAL;
  461. if (!(port_str = strchr(ip_str, ':')))
  462. return -EINVAL;
  463. ip_len = port_str - ip_str;
  464. }
  465. port_str++;
  466. next_str = strchr(port_str, ':');
  467. if (next_str)
  468. next_str++;
  469. struct addr_inet * addr = round ? conn : bind;
  470. if (domain == AF_INET) {
  471. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  472. addr->ext_port = atoi(port_str);
  473. }
  474. if (domain == AF_INET6) {
  475. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  476. addr->ext_port = atoi(port_str);
  477. }
  478. }
  479. return 0;
  480. }
  481. struct un_conn {
  482. unsigned int pipeid;
  483. unsigned char path_size;
  484. char path[];
  485. } __attribute__((packed));
  486. int shim_do_listen (int sockfd, int backlog)
  487. {
  488. if (backlog < 0)
  489. return -EINVAL;
  490. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  491. if (!hdl)
  492. return -EBADF;
  493. if (hdl->type != TYPE_SOCK) {
  494. put_handle(hdl);
  495. return -ENOTSOCK;
  496. }
  497. struct shim_sock_handle * sock = &hdl->info.sock;
  498. if (sock->sock_type != SOCK_STREAM) {
  499. debug("shim_listen: not a stream socket\n");
  500. put_handle(hdl);
  501. return -EINVAL;
  502. }
  503. lock(hdl->lock);
  504. enum shim_sock_state state = sock->sock_state;
  505. int ret = -EINVAL;
  506. if (state != SOCK_BOUND) {
  507. debug("shim_listen: listen on unbound socket\n");
  508. goto out;
  509. }
  510. hdl->acc_mode = MAY_READ;
  511. sock->sock_state = SOCK_LISTENED;
  512. ret = 0;
  513. out:
  514. if (ret < 0)
  515. sock->sock_state = state;
  516. unlock(hdl->lock);
  517. put_handle(hdl);
  518. return ret;
  519. }
  520. /* Connect with the TCP socket is always in the client.
  521. *
  522. * With UDP, the connection is make to the socket specific for a
  523. * destination. A process with a connected UDP socket can call
  524. * connect again for that socket for one of two reasons: 1. To
  525. * specify a new IP address and port 2. To unconnect the socket.
  526. */
  527. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  528. {
  529. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  530. if (!hdl)
  531. return -EBADF;
  532. if (hdl->type != TYPE_SOCK) {
  533. put_handle(hdl);
  534. return -ENOTSOCK;
  535. }
  536. struct shim_sock_handle * sock = &hdl->info.sock;
  537. lock(hdl->lock);
  538. enum shim_sock_state state = sock->sock_state;
  539. int ret = -EINVAL;
  540. if (state == SOCK_CONNECTED) {
  541. debug("shim_connect: reconnect on a stream socket\n");
  542. goto out;
  543. }
  544. if (state != SOCK_BOUND &&
  545. state != SOCK_CREATED) {
  546. debug("shim_connect: connect on invalid socket\n");
  547. goto out;
  548. }
  549. if (sock->domain == AF_UNIX) {
  550. if (addrlen != sizeof(struct sockaddr_un))
  551. goto out;
  552. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  553. char * spath = saddr->sun_path;
  554. struct shim_dentry * dent;
  555. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  556. goto out;
  557. struct shim_unix_data * data = dent->data;
  558. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  559. data = malloc(sizeof(struct shim_unix_data));
  560. data->pipeid = dent->rel_path.hash >> 32;
  561. } else if (dent->fs != &socket_builtin_fs) {
  562. ret = -ECONNREFUSED;
  563. goto out;
  564. }
  565. sock->addr.un.pipeid = data->pipeid;
  566. sock->addr.un.data = data;
  567. sock->addr.un.dentry = dent;
  568. get_dentry(dent);
  569. }
  570. if (state == SOCK_BOUND) {
  571. /* if the socket is bound, the stream needs to be shut and rebound. */
  572. assert(hdl->pal_handle);
  573. DkStreamDelete(hdl->pal_handle, 0);
  574. DkObjectClose(hdl->pal_handle);
  575. hdl->pal_handle = NULL;
  576. }
  577. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  578. sizeof(struct sockaddr_in6)))
  579. goto out;
  580. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  581. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  582. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  583. SOCK_CONNECTED;
  584. if ((ret = create_socket_uri(hdl)) < 0)
  585. goto out;
  586. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  587. 0, 0, 0,
  588. hdl->flags & O_NONBLOCK);
  589. if (!pal_hdl) {
  590. ret = -PAL_ERRNO;
  591. goto out;
  592. }
  593. hdl->pal_handle = pal_hdl;
  594. if (sock->domain == AF_UNIX) {
  595. struct shim_dentry * dent = sock->addr.un.dentry;
  596. lock(dent->lock);
  597. dent->state ^= DENTRY_NEGATIVE;
  598. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  599. dent->fs = &socket_builtin_fs;
  600. dent->data = sock->addr.un.data;
  601. unlock(dent->lock);
  602. }
  603. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  604. char uri[SOCK_URI_SIZE];
  605. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  606. ret = -PAL_ERRNO;
  607. goto out;
  608. }
  609. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  610. &sock->addr.in.bind,
  611. &sock->addr.in.conn)) < 0)
  612. goto out;
  613. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  614. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  615. }
  616. hdl->acc_mode = MAY_READ|MAY_WRITE;
  617. __process_pending_options(hdl);
  618. ret = 0;
  619. out:
  620. if (ret < 0) {
  621. sock->sock_state = state;
  622. sock->error = -ret;
  623. if (sock->domain == AF_UNIX) {
  624. if (sock->addr.un.dentry)
  625. put_dentry(sock->addr.un.dentry);
  626. if (sock->addr.un.data) {
  627. free(sock->addr.un.data);
  628. sock->addr.un.data = NULL;
  629. }
  630. }
  631. }
  632. unlock(hdl->lock);
  633. put_handle(hdl);
  634. return ret;
  635. }
  636. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  637. socklen_t * addrlen)
  638. {
  639. if (hdl->type != TYPE_SOCK)
  640. return -ENOTSOCK;
  641. struct shim_sock_handle * sock = &hdl->info.sock;
  642. int ret;
  643. PAL_HANDLE accepted = NULL;
  644. if (sock->sock_type != SOCK_STREAM) {
  645. debug("shim_listen: not a stream socket\n");
  646. return -EINVAL;
  647. }
  648. lock(hdl->lock);
  649. if (sock->sock_state != SOCK_LISTENED) {
  650. debug("shim_accpet: invalid socket\n");
  651. ret = -EINVAL;
  652. goto out;
  653. }
  654. accepted = DkStreamWaitForClient(hdl->pal_handle);
  655. if (!accepted) {
  656. ret = -PAL_ERRNO;
  657. goto out;
  658. }
  659. if (flags & O_NONBLOCK) {
  660. PAL_STREAM_ATTR attr;
  661. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  662. ret = -PAL_ERRNO;
  663. goto out;
  664. }
  665. attr.nonblocking = PAL_TRUE;
  666. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  667. ret = -PAL_ERRNO;
  668. goto out;
  669. }
  670. }
  671. struct shim_handle * cli = get_new_handle();
  672. if (!cli) {
  673. ret = -ENOMEM;
  674. goto out;
  675. }
  676. struct shim_sock_handle * cli_sock = &cli->info.sock;
  677. cli->type = TYPE_SOCK;
  678. set_handle_fs(cli, &socket_builtin_fs);
  679. cli->acc_mode = MAY_READ|MAY_WRITE;
  680. cli->flags = O_RDWR|flags;
  681. cli->pal_handle = accepted;
  682. cli_sock->domain = sock->domain;
  683. cli_sock->sock_type = sock->sock_type;
  684. cli_sock->protocol = sock->protocol;
  685. cli_sock->sock_state = SOCK_ACCEPTED;
  686. if (sock->domain == AF_UNIX) {
  687. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  688. if (sock->addr.un.dentry) {
  689. get_dentry(sock->addr.un.dentry);
  690. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  691. }
  692. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  693. if (addr) {
  694. unix_copy_addr(addr, sock->addr.un.dentry);
  695. if (addrlen)
  696. *addrlen = sizeof(struct sockaddr_un);
  697. }
  698. }
  699. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  700. char uri[SOCK_URI_SIZE];
  701. int uri_len;
  702. if (!(uri_len = DkStreamGetName(accepted, uri, SOCK_URI_SIZE))) {
  703. ret = -PAL_ERRNO;
  704. out_hdl:
  705. DkObjectClose(accepted);
  706. goto out_cli;
  707. }
  708. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  709. &cli_sock->addr.in.bind,
  710. &cli_sock->addr.in.conn)) < 0)
  711. goto out_hdl;
  712. qstrsetstr(&cli->uri, uri, uri_len);
  713. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  714. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  715. if (addr) {
  716. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  717. if (addrlen)
  718. *addrlen = (sock->domain == AF_INET) ?
  719. sizeof(struct sockaddr_in) :
  720. sizeof(struct sockaddr_in6);
  721. }
  722. }
  723. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  724. out_cli:
  725. put_handle(cli);
  726. out:
  727. if (ret < 0)
  728. sock->error = -ret;
  729. unlock(hdl->lock);
  730. return ret;
  731. }
  732. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  733. {
  734. int flags;
  735. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  736. if (!hdl)
  737. return -EBADF;
  738. int ret = __do_accept(hdl, flags & FD_CLOEXEC ? O_CLOEXEC : 0,
  739. addr, addrlen);
  740. put_handle(hdl);
  741. return ret;
  742. }
  743. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  744. int flags)
  745. {
  746. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  747. if (!hdl)
  748. return -EBADF;
  749. int ret = __do_accept(hdl,
  750. (flags & SOCK_CLOEXEC ? FD_CLOEXEC : 0) |
  751. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  752. addr, addrlen);
  753. put_handle(hdl);
  754. return ret;
  755. }
  756. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  757. const struct sockaddr * addr, socklen_t addrlen)
  758. {
  759. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  760. if (!hdl)
  761. return -EBADF;
  762. int ret = -EINVAL;
  763. if (hdl->type != TYPE_SOCK) {
  764. ret = -ENOTSOCK;
  765. goto out;
  766. }
  767. struct shim_sock_handle * sock = &hdl->info.sock;
  768. lock(hdl->lock);
  769. PAL_HANDLE pal_hdl = hdl->pal_handle;
  770. char * uri = NULL;
  771. /* Data gram sock need not be conneted or bound at all */
  772. if (sock->sock_type == SOCK_STREAM &&
  773. sock->sock_state != SOCK_CONNECTED &&
  774. sock->sock_state != SOCK_BOUNDCONNECTED &&
  775. sock->sock_state != SOCK_ACCEPTED) {
  776. ret = -ENOTCONN;
  777. goto out_locked;
  778. }
  779. if (sock->sock_type == SOCK_DGRAM &&
  780. sock->sock_state == SOCK_SHUTDOWN) {
  781. ret = -ENOTCONN;
  782. goto out_locked;
  783. }
  784. if (!(hdl->acc_mode & MAY_WRITE)) {
  785. ret = -ECONNRESET;
  786. goto out_locked;
  787. }
  788. if (sock->sock_type == SOCK_DGRAM &&
  789. sock->sock_state != SOCK_BOUNDCONNECTED &&
  790. sock->sock_state != SOCK_CONNECTED) {
  791. if (!addr) {
  792. ret = -EDESTADDRREQ;
  793. goto out_locked;
  794. }
  795. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  796. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  797. hdl->flags & O_NONBLOCK);
  798. if (!pal_hdl) {
  799. ret = -PAL_ERRNO;
  800. goto out_locked;
  801. }
  802. hdl->pal_handle = pal_hdl;
  803. }
  804. if (addr && addr->sa_family != sock->domain) {
  805. ret = -EINVAL;
  806. goto out_locked;
  807. }
  808. uri = __alloca(SOCK_URI_SIZE);
  809. }
  810. unlock(hdl->lock);
  811. if (uri) {
  812. struct addr_inet addr_buf;
  813. inet_save_addr(sock->domain, &addr_buf, addr);
  814. inet_rebase_port(false, sock->domain, &addr_buf, false);
  815. memcpy(uri, "udp:", 5);
  816. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  817. &addr_buf)) < 0) {
  818. lock(hdl->lock);
  819. goto out_locked;
  820. }
  821. debug("next packet send to %s\n", uri);
  822. }
  823. int bytes = 0;
  824. ret = 0;
  825. for (int i = 0 ; i < nbufs ; i++) {
  826. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  827. uri);
  828. if (!ret) {
  829. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  830. - ECONNABORTED : -PAL_ERRNO;
  831. break;
  832. }
  833. bytes += ret;
  834. }
  835. if (bytes)
  836. ret = bytes;
  837. if (ret < 0) {
  838. lock(hdl->lock);
  839. goto out_locked;
  840. }
  841. goto out;
  842. out_locked:
  843. if (ret < 0)
  844. sock->error = -ret;
  845. unlock(hdl->lock);
  846. out:
  847. put_handle(hdl);
  848. return ret;
  849. }
  850. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  851. const struct sockaddr * addr, socklen_t addrlen)
  852. {
  853. struct iovec iovbuf;
  854. iovbuf.iov_base = (void *) buf;
  855. iovbuf.iov_len = len;
  856. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  857. }
  858. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  859. {
  860. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  861. msg->msg_name, msg->msg_namelen);
  862. }
  863. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  864. struct sockaddr * addr, socklen_t * addrlen)
  865. {
  866. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  867. if (!hdl)
  868. return -EBADF;
  869. int ret = 0;
  870. if (hdl->type != TYPE_SOCK) {
  871. ret = -ENOTSOCK;
  872. goto out;
  873. }
  874. struct shim_sock_handle * sock = &hdl->info.sock;
  875. lock(hdl->lock);
  876. PAL_HANDLE pal_hdl = hdl->pal_handle;
  877. char * uri = NULL;
  878. if (sock->sock_type == SOCK_STREAM &&
  879. sock->sock_state != SOCK_CONNECTED &&
  880. sock->sock_state != SOCK_BOUNDCONNECTED &&
  881. sock->sock_state != SOCK_ACCEPTED) {
  882. ret = -ENOTCONN;
  883. goto out_locked;
  884. }
  885. if (!(hdl->acc_mode & MAY_READ)) {
  886. ret = 0;
  887. goto out_locked;
  888. }
  889. if (addr && sock->sock_type == SOCK_DGRAM &&
  890. sock->sock_state != SOCK_CONNECTED &&
  891. sock->sock_state != SOCK_BOUNDCONNECTED) {
  892. if (sock->sock_state == SOCK_CREATED) {
  893. ret = -EINVAL;
  894. goto out_locked;
  895. }
  896. uri = __alloca(SOCK_URI_SIZE);
  897. }
  898. unlock(hdl->lock);
  899. bool address_received = false;
  900. int bytes = 0;
  901. ret = 0;
  902. for (int i = 0 ; i < nbufs ; i++) {
  903. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  904. uri, uri ? SOCK_URI_SIZE : 0);
  905. if (!ret) {
  906. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  907. - ECONNABORTED : -PAL_ERRNO;
  908. break;
  909. }
  910. bytes += ret;
  911. if (!addr || !bytes || address_received)
  912. continue;
  913. if (sock->domain == AF_UNIX) {
  914. unix_copy_addr(addr, sock->addr.un.dentry);
  915. *addrlen = sizeof(struct sockaddr_un);
  916. }
  917. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  918. if (uri) {
  919. struct addr_inet conn;
  920. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  921. &conn, NULL)) < 0) {
  922. lock(hdl->lock);
  923. goto out_locked;
  924. }
  925. debug("last packet received from %s\n", uri);
  926. inet_rebase_port(true, sock->domain, &conn, false);
  927. inet_copy_addr(sock->domain, addr, &conn);
  928. } else {
  929. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  930. }
  931. *addrlen = (sock->domain == AF_INET) ?
  932. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  933. }
  934. address_received = false;
  935. }
  936. if (bytes)
  937. ret = bytes;
  938. if (ret < 0) {
  939. lock(hdl->lock);
  940. goto out_locked;
  941. }
  942. goto out;
  943. out_locked:
  944. if (ret < 0)
  945. sock->error = -ret;
  946. unlock(hdl->lock);
  947. out:
  948. put_handle(hdl);
  949. return ret;
  950. }
  951. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  952. struct sockaddr * addr, socklen_t * addrlen)
  953. {
  954. struct iovec iovbuf;
  955. iovbuf.iov_base = (void *) buf;
  956. iovbuf.iov_len = len;
  957. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  958. }
  959. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  960. {
  961. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  962. msg->msg_name, &msg->msg_namelen);
  963. }
  964. #define SHUT_RD 0
  965. #define SHUT_WR 1
  966. #define SHUT_RDWR 2
  967. int shim_do_shutdown (int sockfd, int how)
  968. {
  969. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  970. if (!hdl)
  971. return -EBADF;
  972. int ret = 0;
  973. struct shim_sock_handle * sock = &hdl->info.sock;
  974. if (hdl->type != TYPE_SOCK) {
  975. ret = -ENOTSOCK;
  976. goto out;
  977. }
  978. lock(hdl->lock);
  979. if (sock->sock_state != SOCK_LISTENED &&
  980. sock->sock_state != SOCK_ACCEPTED &&
  981. sock->sock_state != SOCK_CONNECTED &&
  982. sock->sock_state != SOCK_BOUNDCONNECTED) {
  983. ret = -ENOTCONN;
  984. goto out_locked;
  985. }
  986. switch (how) {
  987. case SHUT_RD:
  988. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  989. hdl->acc_mode &= ~MAY_READ;
  990. break;
  991. case SHUT_WR:
  992. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  993. hdl->acc_mode &= ~MAY_WRITE;
  994. break;
  995. case SHUT_RDWR:
  996. DkStreamDelete(hdl->pal_handle, 0);
  997. hdl->acc_mode = 0;
  998. sock->sock_state = SOCK_SHUTDOWN;
  999. break;
  1000. }
  1001. ret = 0;
  1002. out_locked:
  1003. if (ret < 0)
  1004. sock->error = -ret;
  1005. unlock(hdl->lock);
  1006. out:
  1007. put_handle(hdl);
  1008. return ret;
  1009. }
  1010. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1011. {
  1012. if (!addr || !addrlen)
  1013. return -EFAULT;
  1014. if (*addrlen <= 0)
  1015. return -EINVAL;
  1016. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1017. if (!hdl)
  1018. return -EBADF;
  1019. int ret = -EINVAL;
  1020. if (hdl->type != TYPE_SOCK) {
  1021. ret = -ENOTSOCK;
  1022. goto out;
  1023. }
  1024. struct shim_sock_handle * sock = &hdl->info.sock;
  1025. lock(hdl->lock);
  1026. struct sockaddr saddr;
  1027. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1028. if (len < *addrlen)
  1029. len = *addrlen;
  1030. memcpy(addr, &saddr, len);
  1031. *addrlen = len;
  1032. ret = 0;
  1033. unlock(hdl->lock);
  1034. out:
  1035. put_handle(hdl);
  1036. return ret;
  1037. }
  1038. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1039. {
  1040. if (!addr || !addrlen)
  1041. return -EFAULT;
  1042. if (*addrlen <= 0)
  1043. return -EINVAL;
  1044. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1045. if (!hdl)
  1046. return -EBADF;
  1047. int ret = -EINVAL;
  1048. if (hdl->type != TYPE_SOCK) {
  1049. ret = -ENOTSOCK;
  1050. goto out;
  1051. }
  1052. struct shim_sock_handle * sock = &hdl->info.sock;
  1053. lock(hdl->lock);
  1054. /* Data gram sock need not be conneted or bound at all */
  1055. if (sock->sock_type == SOCK_STREAM &&
  1056. sock->sock_state != SOCK_CONNECTED &&
  1057. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1058. sock->sock_state != SOCK_ACCEPTED) {
  1059. ret = -ENOTCONN;
  1060. goto out_locked;
  1061. }
  1062. if (sock->sock_type == SOCK_DGRAM &&
  1063. sock->sock_state != SOCK_CONNECTED &&
  1064. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1065. ret = -ENOTCONN;
  1066. goto out_locked;
  1067. }
  1068. struct sockaddr saddr;
  1069. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1070. if (len < *addrlen)
  1071. len = *addrlen;
  1072. memcpy(addr, &saddr, len);
  1073. *addrlen = len;
  1074. ret = 0;
  1075. out_locked:
  1076. unlock(hdl->lock);
  1077. out:
  1078. put_handle(hdl);
  1079. return ret;
  1080. }
  1081. struct __kernel_linger {
  1082. int l_onoff;
  1083. int l_linger;
  1084. };
  1085. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1086. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1087. {
  1088. int intval = *((int *) optval);
  1089. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1090. if (level == SOL_SOCKET) {
  1091. switch(optname) {
  1092. case SO_ACCEPTCONN:
  1093. case SO_DOMAIN:
  1094. case SO_ERROR:
  1095. case SO_PROTOCOL:
  1096. case SO_TYPE:
  1097. return -EPERM;
  1098. case SO_KEEPALIVE:
  1099. case SO_LINGER:
  1100. case SO_RCVBUF:
  1101. case SO_SNDBUF:
  1102. case SO_RCVTIMEO:
  1103. case SO_SNDTIMEO:
  1104. case SO_REUSEADDR:
  1105. goto query;
  1106. default:
  1107. goto unknown;
  1108. }
  1109. }
  1110. if (level == SOL_TCP) {
  1111. switch(optname) {
  1112. case TCP_CORK:
  1113. case TCP_NODELAY:
  1114. goto query;
  1115. default:
  1116. goto unknown;
  1117. }
  1118. }
  1119. unknown:
  1120. return -ENOPROTOOPT;
  1121. query:
  1122. if (!attr) {
  1123. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1124. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1125. return -PAL_ERRNO;
  1126. }
  1127. if (level == SOL_SOCKET) {
  1128. switch(optname) {
  1129. case SO_KEEPALIVE:
  1130. if (bolval != attr->socket.tcp_keepalive) {
  1131. attr->socket.tcp_keepalive = bolval;
  1132. goto set;
  1133. }
  1134. break;
  1135. case SO_LINGER: {
  1136. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1137. int linger = l->l_onoff ? l->l_linger : 0;
  1138. if (linger != (int) attr->socket.linger) {
  1139. attr->socket.linger = linger;
  1140. goto set;
  1141. }
  1142. break;
  1143. }
  1144. case SO_RCVBUF:
  1145. if (intval != (int) attr->socket.receivebuf) {
  1146. attr->socket.receivebuf = intval;
  1147. goto set;
  1148. }
  1149. break;
  1150. case SO_SNDBUF:
  1151. if (intval != (int) attr->socket.sendbuf) {
  1152. attr->socket.sendbuf = intval;
  1153. goto set;
  1154. }
  1155. break;
  1156. case SO_RCVTIMEO:
  1157. if (intval != (int) attr->socket.receivetimeout) {
  1158. attr->socket.receivetimeout = intval;
  1159. goto set;
  1160. }
  1161. break;
  1162. case SO_SNDTIMEO:
  1163. if (intval != (int) attr->socket.sendtimeout) {
  1164. attr->socket.sendtimeout = intval;
  1165. goto set;
  1166. }
  1167. break;
  1168. case SO_REUSEADDR:
  1169. break;
  1170. }
  1171. }
  1172. if (level == SOL_TCP) {
  1173. switch(optname) {
  1174. case TCP_CORK:
  1175. if (bolval != attr->socket.tcp_cork) {
  1176. attr->socket.tcp_cork = bolval;
  1177. goto set;
  1178. }
  1179. break;
  1180. case TCP_NODELAY:
  1181. if (bolval != attr->socket.tcp_nodelay) {
  1182. attr->socket.tcp_nodelay = bolval;
  1183. goto set;
  1184. }
  1185. break;
  1186. }
  1187. }
  1188. return 0;
  1189. set:
  1190. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1191. return -PAL_ERRNO;
  1192. return 0;
  1193. }
  1194. static int __process_pending_options (struct shim_handle * hdl)
  1195. {
  1196. struct shim_sock_handle * sock = &hdl->info.sock;
  1197. if (!sock->pending_options)
  1198. return 0;
  1199. PAL_STREAM_ATTR attr;
  1200. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1201. return -PAL_ERRNO;
  1202. struct shim_sock_option * o = sock->pending_options;
  1203. while (o) {
  1204. PAL_STREAM_ATTR tmp = attr;
  1205. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1206. o->optlen, &tmp);
  1207. if (!ret)
  1208. attr = tmp;
  1209. struct shim_sock_option * next = o->next;
  1210. free(o);
  1211. o = next;
  1212. }
  1213. return 0;
  1214. }
  1215. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1216. int optlen)
  1217. {
  1218. if (!optval)
  1219. return -EFAULT;
  1220. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1221. if (!hdl)
  1222. return -EBADF;
  1223. int ret = 0;
  1224. if (hdl->type != TYPE_SOCK) {
  1225. ret = -ENOTSOCK;
  1226. goto out;
  1227. }
  1228. struct shim_sock_handle * sock = &hdl->info.sock;
  1229. lock(hdl->lock);
  1230. if (!hdl->pal_handle) {
  1231. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1232. optlen);
  1233. if (!o) {
  1234. ret = -ENOMEM;
  1235. goto out_locked;
  1236. }
  1237. struct shim_sock_option ** next = &sock->pending_options;
  1238. while (*next)
  1239. next = &(*next)->next;
  1240. o->next = NULL;
  1241. *next = o;
  1242. o->level = level;
  1243. o->optname = optname;
  1244. o->optlen = optlen;
  1245. memcpy(&o->optval, optval, optlen);
  1246. goto out_locked;
  1247. }
  1248. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1249. out_locked:
  1250. unlock(hdl->lock);
  1251. out:
  1252. put_handle(hdl);
  1253. return ret;
  1254. }
  1255. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1256. int * optlen)
  1257. {
  1258. if (!optval || !optlen)
  1259. return -EFAULT;
  1260. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1261. if (!hdl)
  1262. return -EBADF;
  1263. int ret = 0;
  1264. if (hdl->type != TYPE_SOCK) {
  1265. ret = -ENOTSOCK;
  1266. goto out;
  1267. }
  1268. struct shim_sock_handle * sock = &hdl->info.sock;
  1269. lock(hdl->lock);
  1270. int * intval = (int *) optval;
  1271. if (level == SOL_SOCKET) {
  1272. switch(optname) {
  1273. case SO_ACCEPTCONN:
  1274. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1275. goto out;
  1276. case SO_DOMAIN:
  1277. *intval = sock->domain;
  1278. goto out;
  1279. case SO_ERROR:
  1280. *intval = sock->error;
  1281. goto out;
  1282. case SO_PROTOCOL:
  1283. switch(sock->protocol) {
  1284. case SOCK_STREAM:
  1285. *intval = IPPROTO_SCTP;
  1286. break;
  1287. case SOCK_DGRAM:
  1288. *intval = IPPROTO_UDP;
  1289. break;
  1290. default:
  1291. goto unknown;
  1292. }
  1293. goto out;
  1294. case SO_TYPE:
  1295. *intval = sock->protocol;
  1296. goto out;
  1297. case SO_KEEPALIVE:
  1298. case SO_LINGER:
  1299. case SO_RCVBUF:
  1300. case SO_SNDBUF:
  1301. case SO_RCVTIMEO:
  1302. case SO_SNDTIMEO:
  1303. case SO_REUSEADDR:
  1304. goto query;
  1305. default:
  1306. goto unknown;
  1307. }
  1308. }
  1309. if (level == SOL_TCP) {
  1310. switch(optname) {
  1311. case TCP_CORK:
  1312. case TCP_NODELAY:
  1313. goto query;
  1314. default:
  1315. goto unknown;
  1316. }
  1317. }
  1318. unknown:
  1319. ret = -ENOPROTOOPT;
  1320. goto out;
  1321. query:
  1322. {
  1323. PAL_STREAM_ATTR attr;
  1324. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1325. ret = -PAL_ERRNO;
  1326. goto out;
  1327. }
  1328. if (level == SOL_SOCKET) {
  1329. switch(optname) {
  1330. case SO_KEEPALIVE:
  1331. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1332. break;
  1333. case SO_LINGER: {
  1334. struct __kernel_linger * l =
  1335. (struct __kernel_linger *) optval;
  1336. l->l_onoff = attr.socket.linger ? 1 : 0;
  1337. l->l_linger = attr.socket.linger;
  1338. break;
  1339. }
  1340. case SO_RCVBUF:
  1341. *intval = attr.socket.receivebuf;
  1342. break;
  1343. case SO_SNDBUF:
  1344. *intval = attr.socket.sendbuf;
  1345. break;
  1346. case SO_RCVTIMEO:
  1347. *intval = attr.socket.receivetimeout;
  1348. break;
  1349. case SO_SNDTIMEO:
  1350. *intval = attr.socket.sendtimeout;
  1351. break;
  1352. case SO_REUSEADDR:
  1353. *intval = 1;
  1354. break;
  1355. }
  1356. }
  1357. if (level == SOL_TCP) {
  1358. switch(optname) {
  1359. case TCP_CORK:
  1360. *intval = attr.socket.tcp_cork ? 1 : 0;
  1361. break;
  1362. case TCP_NODELAY:
  1363. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1364. break;
  1365. }
  1366. }
  1367. }
  1368. out:
  1369. unlock(hdl->lock);
  1370. put_handle(hdl);
  1371. return ret;
  1372. }