shim_socket.c 45 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 OSCAR lab, Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/un.h>
  33. #include <netinet/in.h>
  34. #include <netinet/tcp.h>
  35. #define SOCK_URI_SIZE 64
  36. static int rebase_on_lo __attribute_migratable = -1;
  37. static int init_port_rebase (void)
  38. {
  39. if (rebase_on_lo != -1)
  40. return 0;
  41. char cfg[CONFIG_MAX];
  42. int rebase = 0;
  43. if (!root_config ||
  44. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  45. rebase_on_lo = 0;
  46. return 0;
  47. }
  48. for (const char * p = cfg ; *p ; p++) {
  49. if (*p < '0' || *p > '9' || rebase > 32767) {
  50. rebase_on_lo = 0;
  51. return 0;
  52. }
  53. rebase = rebase * 10 + (*p - '0');
  54. }
  55. rebase_on_lo = rebase;
  56. return 0;
  57. }
  58. static int __process_pending_options (struct shim_handle * hdl);
  59. int shim_do_socket (int family, int type, int protocol)
  60. {
  61. struct shim_handle * hdl = get_new_handle();
  62. if (!hdl)
  63. return -ENOMEM;
  64. struct shim_sock_handle * sock = &hdl->info.sock;
  65. hdl->type = TYPE_SOCK;
  66. set_handle_fs(hdl, &socket_builtin_fs);
  67. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  68. hdl->acc_mode = 0;
  69. sock->domain = family;
  70. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  71. sock->protocol = protocol;
  72. int ret = -ENOSYS;
  73. #undef NOTSUPPORT
  74. #define NOTSUPPORT(domain) \
  75. case domain: \
  76. debug("shim_socket: domain " #domain " not supported\n"); \
  77. goto err;
  78. switch (sock->domain) {
  79. case AF_UNIX: //Local communication
  80. case AF_INET: //IPv4 Internet protocols ip(7)
  81. case AF_INET6: //IPv6 Internet protocols
  82. break;
  83. NOTSUPPORT(AF_IPX) //IPX - Novell protocols
  84. NOTSUPPORT(AF_NETLINK) //Kernel user interface device netlink(7)
  85. NOTSUPPORT(AF_X25) //ITU-T X.25 / ISO-8208 protocol x25(7)
  86. NOTSUPPORT(AF_AX25) //Amateur radio AX.25 protocol
  87. NOTSUPPORT(AF_ATMPVC) //Access to raw ATM PVCs
  88. NOTSUPPORT(AF_APPLETALK) //Appletalk ddp(7)
  89. NOTSUPPORT(AF_PACKET) //Low level packet interface packet(7)
  90. default:
  91. debug("shim_socket: unknown socket domain %d\n",
  92. sock->domain);
  93. goto err;
  94. }
  95. #undef NOTSUPPORT
  96. #define NOTSUPPORT(type) \
  97. case type: \
  98. debug("shim_socket: type " #type " not supported\n"); \
  99. goto err;
  100. switch (sock->sock_type) {
  101. case SOCK_STREAM: //TCP
  102. break;
  103. case SOCK_DGRAM: //UDP
  104. hdl->acc_mode = MAY_READ|MAY_WRITE;
  105. break;
  106. NOTSUPPORT(SOCK_SEQPACKET)
  107. NOTSUPPORT(SOCK_RAW)
  108. NOTSUPPORT(SOCK_RDM)
  109. NOTSUPPORT(SOCK_PACKET)
  110. default:
  111. debug("shim_socket: unknown socket type %d\n",
  112. sock->sock_type);
  113. goto err;
  114. }
  115. sock->sock_state = SOCK_CREATED;
  116. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  117. err:
  118. put_handle(hdl);
  119. return ret;
  120. }
  121. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  122. unsigned int pipeid)
  123. {
  124. int bytes = 0;
  125. switch (state) {
  126. case SOCK_CREATED:
  127. case SOCK_BOUNDCONNECTED:
  128. case SOCK_SHUTDOWN:
  129. return -ENOTCONN;
  130. case SOCK_BOUND:
  131. case SOCK_LISTENED:
  132. case SOCK_ACCEPTED:
  133. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  134. break;
  135. case SOCK_CONNECTED:
  136. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  137. break;
  138. default:
  139. return -ENOTCONN;
  140. }
  141. return bytes == count ? -ENAMETOOLONG : bytes;
  142. }
  143. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  144. bool local)
  145. {
  146. init_port_rebase();
  147. if (rebase_on_lo) {
  148. if (domain == AF_INET) {
  149. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  150. if (!local && memcmp(ad, "\177\0\0\1", 4))
  151. return;
  152. }
  153. if (domain == AF_INET6) {
  154. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  155. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  156. return;
  157. }
  158. }
  159. if (reverse)
  160. addr->port = addr->ext_port - rebase_on_lo;
  161. else
  162. addr->ext_port = addr->port + rebase_on_lo;
  163. }
  164. static int inet_translate_addr (int domain, char * uri, int count,
  165. struct addr_inet * addr)
  166. {
  167. if (domain == AF_INET) {
  168. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  169. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  170. ad[0], ad[1], ad[2], ad[3], addr->ext_port);
  171. return bytes == count ? -ENAMETOOLONG : bytes;
  172. }
  173. if (domain == AF_INET6) {
  174. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  175. int bytes = snprintf(uri, count, "[%x:%x:%x:%x:%x:%x:%x:%x]:%u",
  176. ad[0], ad[1], ad[2], ad[3],
  177. ad[4], ad[5], ad[6], ad[7], addr->ext_port);
  178. return bytes == count ? -ENAMETOOLONG : bytes;
  179. }
  180. return -EPROTONOSUPPORT;
  181. }
  182. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  183. enum shim_sock_state state,
  184. struct addr_inet * bind, struct addr_inet * conn)
  185. {
  186. int bytes = 0, ret;
  187. if (sock_type == SOCK_STREAM) {
  188. switch (state) {
  189. case SOCK_CREATED:
  190. case SOCK_SHUTDOWN:
  191. return -ENOTCONN;
  192. case SOCK_BOUND:
  193. case SOCK_LISTENED:
  194. if (count < 9)
  195. return -ENAMETOOLONG;
  196. memcpy(uri, "tcp.srv:", 9);
  197. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  198. return ret < 0 ? ret : ret + 8;
  199. case SOCK_BOUNDCONNECTED:
  200. if (count < 5)
  201. return -ENAMETOOLONG;
  202. memcpy(uri, "tcp:", 5);
  203. bytes = 4;
  204. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  205. bind);
  206. if (ret < 0)
  207. return ret;
  208. uri[bytes + ret] = ':';
  209. bytes += ret + 1;
  210. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  211. conn);
  212. return ret < 0 ? ret : ret + bytes;
  213. case SOCK_CONNECTED:
  214. case SOCK_ACCEPTED:
  215. if (count < 5)
  216. return -ENAMETOOLONG;
  217. memcpy(uri, "tcp:", 5);
  218. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  219. return ret < 0 ? ret : ret + 4;
  220. }
  221. }
  222. if (sock_type == SOCK_DGRAM) {
  223. switch (state) {
  224. case SOCK_CREATED:
  225. case SOCK_SHUTDOWN:
  226. return -ENOTCONN;
  227. case SOCK_LISTENED:
  228. case SOCK_ACCEPTED:
  229. return -EOPNOTSUPP;
  230. case SOCK_BOUNDCONNECTED:
  231. if (count < 9)
  232. return -ENAMETOOLONG;
  233. memcpy(uri, "tcp.srv:", 9);
  234. bytes = 8;
  235. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  236. bind);
  237. if (ret < 0)
  238. return ret;
  239. uri[bytes + ret] = ':';
  240. bytes += ret + 1;
  241. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  242. conn);
  243. return ret < 0 ? ret : ret + bytes;
  244. case SOCK_BOUND:
  245. if (count < 9)
  246. return -ENAMETOOLONG;
  247. memcpy(uri, "udp.srv:", 9);
  248. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  249. return ret < 0 ? ret : ret + 9;
  250. case SOCK_CONNECTED:
  251. if (count < 5)
  252. return -ENAMETOOLONG;
  253. memcpy(uri, "udp:", 5);
  254. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  255. return ret < 0 ? ret : ret + 4;
  256. }
  257. }
  258. return -EPROTONOSUPPORT;
  259. }
  260. static inline void unix_copy_addr (struct sockaddr * saddr,
  261. struct shim_dentry * dent)
  262. {
  263. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  264. un->sun_family = AF_UNIX;
  265. int size;
  266. const char * path = dentry_get_path(dent, true, &size);
  267. memcpy(un->sun_path, path, size + 1);
  268. }
  269. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  270. const struct addr_inet * addr)
  271. {
  272. if (domain == AF_INET) {
  273. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  274. in->sin_family = AF_INET;
  275. in->sin_port = __htons(addr->port);
  276. in->sin_addr = addr->addr.v4;
  277. return sizeof(struct sockaddr_in);
  278. }
  279. if (domain == AF_INET6) {
  280. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  281. in6->sin6_family = AF_INET6;
  282. in6->sin6_port = __htons(addr->port);
  283. in6->sin6_addr = addr->addr.v6;
  284. return sizeof(struct sockaddr_in6);
  285. }
  286. return sizeof(struct sockaddr);
  287. }
  288. static void inet_save_addr (int domain, struct addr_inet * addr,
  289. const struct sockaddr * saddr)
  290. {
  291. if (domain == AF_INET) {
  292. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  293. addr->port = __ntohs(in->sin_port);
  294. addr->addr.v4 = in->sin_addr;
  295. return;
  296. }
  297. if (domain == AF_INET6) {
  298. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  299. addr->port = __ntohs(in6->sin6_port);
  300. addr->addr.v6 = in6->sin6_addr;
  301. return;
  302. }
  303. }
  304. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  305. const struct sockaddr * saddr)
  306. {
  307. if (domain == AF_INET) {
  308. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  309. return addr->port == __ntohs(in->sin_port) &&
  310. !memcmp(&addr->addr.v4, &in->sin_addr,
  311. sizeof(struct in_addr));
  312. }
  313. if (domain == AF_INET6) {
  314. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  315. return addr->port == __ntohs(in6->sin6_port) &&
  316. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  317. sizeof(struct in6_addr));
  318. }
  319. return false;
  320. }
  321. static int create_socket_uri (struct shim_handle * hdl)
  322. {
  323. struct shim_sock_handle * sock = &hdl->info.sock;
  324. if (sock->domain == AF_UNIX) {
  325. char uri_buf[32];
  326. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  327. sock->addr.un.pipeid);
  328. if (bytes < 0)
  329. return bytes;
  330. qstrsetstr(&hdl->uri, uri_buf, bytes);
  331. return 0;
  332. }
  333. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  334. char uri_buf[SOCK_URI_SIZE];
  335. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  336. sock->sock_type, sock->sock_state,
  337. &sock->addr.in.bind, &sock->addr.in.conn);
  338. if (bytes < 0)
  339. return bytes;
  340. qstrsetstr(&hdl->uri, uri_buf, bytes);
  341. return 0;
  342. }
  343. return -EPROTONOSUPPORT;
  344. }
  345. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  346. {
  347. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  348. if (!hdl)
  349. return -EBADF;
  350. int ret = -EINVAL;
  351. if (hdl->type != TYPE_SOCK) {
  352. put_handle(hdl);
  353. return -ENOTSOCK;
  354. }
  355. struct shim_sock_handle * sock = &hdl->info.sock;
  356. lock(hdl->lock);
  357. enum shim_sock_state state = sock->sock_state;
  358. if (state != SOCK_CREATED) {
  359. debug("shim_bind: bind on a bound socket\n");
  360. goto out;
  361. }
  362. if (sock->domain == AF_UNIX) {
  363. if (addrlen != sizeof(struct sockaddr_un))
  364. goto out;
  365. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  366. char * spath = saddr->sun_path;
  367. struct shim_dentry * dent = NULL;
  368. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  369. goto out;
  370. if (dent->state & DENTRY_VALID &&
  371. !(dent->state & DENTRY_NEGATIVE)) {
  372. ret = -EADDRINUSE;
  373. goto out;
  374. }
  375. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  376. data->pipeid = dent->rel_path.hash >> 32;
  377. sock->addr.un.pipeid = data->pipeid;
  378. sock->addr.un.data = data;
  379. sock->addr.un.dentry = dent;
  380. }
  381. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  382. sizeof(struct sockaddr_in6)))
  383. goto out;
  384. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  385. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  386. sock->sock_state = SOCK_BOUND;
  387. if ((ret = create_socket_uri(hdl)) < 0)
  388. goto out;
  389. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  390. 0, 0, 0,
  391. hdl->flags & O_NONBLOCK);
  392. if (!pal_hdl) {
  393. debug("bind: invalid handle returned\n");
  394. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  395. goto out;
  396. }
  397. if (sock->domain == AF_UNIX) {
  398. struct shim_dentry * dent = sock->addr.un.dentry;
  399. dent->state ^= DENTRY_NEGATIVE;
  400. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  401. dent->fs = &socket_builtin_fs;
  402. dent->data = sock->addr.un.data;
  403. }
  404. hdl->pal_handle = pal_hdl;
  405. __process_pending_options(hdl);
  406. ret = 0;
  407. out:
  408. if (ret < 0) {
  409. sock->sock_state = state;
  410. sock->error = -ret;
  411. if (sock->domain == AF_UNIX) {
  412. if (sock->addr.un.dentry)
  413. put_dentry(sock->addr.un.dentry);
  414. if (sock->addr.un.data) {
  415. free(sock->addr.un.data);
  416. sock->addr.un.data = NULL;
  417. }
  418. }
  419. }
  420. unlock(hdl->lock);
  421. put_handle(hdl);
  422. return ret;
  423. }
  424. static int inet_parse_addr (int domain, int type, const char * uri,
  425. struct addr_inet * bind,
  426. struct addr_inet * conn)
  427. {
  428. char * ip_str, * port_str, * next_str;
  429. int ip_len = 0;
  430. if (!(next_str = strchr(uri, ':')))
  431. return -EINVAL;
  432. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  433. int n = (next_str++) - uri;
  434. if (!memcmp(uri, "udp", n))
  435. prefix = UDP;
  436. else if (!memcmp(uri, "udp.srv", n))
  437. prefix = UDPSRV;
  438. else if (!memcmp(uri, "tcp", n))
  439. prefix = TCP;
  440. else if (!memcmp(uri, "tcp.srv", n))
  441. prefix = TCPSRV;
  442. else
  443. return -EINVAL;
  444. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  445. return -EINVAL;
  446. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  447. return -EINVAL;
  448. for (int round = 0 ; (ip_str = next_str) ; round++) {
  449. if (ip_str[0] == '[') {
  450. ip_str++;
  451. if (domain != AF_INET6)
  452. return -EINVAL;
  453. if (!(port_str = strchr(ip_str, ']')))
  454. return -EINVAL;
  455. ip_len = port_str - ip_str;
  456. port_str++;
  457. if (*port_str != ':')
  458. return -EINVAL;
  459. } else {
  460. if (domain != AF_INET)
  461. return -EINVAL;
  462. if (!(port_str = strchr(ip_str, ':')))
  463. return -EINVAL;
  464. ip_len = port_str - ip_str;
  465. }
  466. port_str++;
  467. next_str = strchr(port_str, ':');
  468. struct addr_inet * addr = round ? conn : bind;
  469. if (domain == AF_INET) {
  470. char ip_buf[20];
  471. memcpy(ip_buf, ip_str, ip_len);
  472. ip_buf[ip_len] = 0;
  473. inet_pton4(ip_buf, &addr->addr.v4);
  474. addr->ext_port = atoi(port_str);
  475. }
  476. if (domain == AF_INET6) {
  477. char ip_buf[48];
  478. memcpy(ip_buf, ip_str, ip_len);
  479. ip_buf[ip_len] = 0;
  480. inet_pton6(ip_str, &addr->addr.v6);
  481. addr->ext_port = atoi(port_str);
  482. }
  483. }
  484. return 0;
  485. }
  486. struct un_conn {
  487. unsigned int pipeid;
  488. unsigned char path_size;
  489. char path[];
  490. } __attribute__((packed));
  491. int shim_do_listen (int sockfd, int backlog)
  492. {
  493. if (backlog < 0)
  494. return -EINVAL;
  495. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  496. if (!hdl)
  497. return -EBADF;
  498. if (hdl->type != TYPE_SOCK) {
  499. put_handle(hdl);
  500. return -ENOTSOCK;
  501. }
  502. struct shim_sock_handle * sock = &hdl->info.sock;
  503. if (sock->sock_type != SOCK_STREAM) {
  504. debug("shim_listen: not a stream socket\n");
  505. put_handle(hdl);
  506. return -EINVAL;
  507. }
  508. lock(hdl->lock);
  509. enum shim_sock_state state = sock->sock_state;
  510. int ret = -EINVAL;
  511. if (state != SOCK_BOUND) {
  512. debug("shim_listen: listen on unbound socket\n");
  513. goto out;
  514. }
  515. hdl->acc_mode = MAY_READ;
  516. sock->sock_state = SOCK_LISTENED;
  517. ret = 0;
  518. out:
  519. if (ret < 0)
  520. sock->sock_state = state;
  521. unlock(hdl->lock);
  522. put_handle(hdl);
  523. return ret;
  524. }
  525. /* Connect with the TCP socket is always in the client.
  526. *
  527. * With UDP, the connection is make to the socket specific for a
  528. * destination. A process with a connected UDP socket can call
  529. * connect again for that socket for one of two reasons: 1. To
  530. * specify a new IP address and port 2. To unconnect the socket.
  531. */
  532. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  533. {
  534. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  535. if (!hdl)
  536. return -EBADF;
  537. if (hdl->type != TYPE_SOCK) {
  538. put_handle(hdl);
  539. return -ENOTSOCK;
  540. }
  541. struct shim_sock_handle * sock = &hdl->info.sock;
  542. lock(hdl->lock);
  543. enum shim_sock_state state = sock->sock_state;
  544. int ret = -EINVAL;
  545. if (state == SOCK_CONNECTED) {
  546. debug("shim_connect: reconnect on a stream socket\n");
  547. goto out;
  548. }
  549. if (state != SOCK_BOUND &&
  550. state != SOCK_CREATED) {
  551. debug("shim_connect: connect on invalid socket\n");
  552. goto out;
  553. }
  554. if (sock->domain == AF_UNIX) {
  555. if (addrlen != sizeof(struct sockaddr_un))
  556. goto out;
  557. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  558. char * spath = saddr->sun_path;
  559. struct shim_dentry * dent;
  560. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  561. goto out;
  562. struct shim_unix_data * data = dent->data;
  563. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  564. data = malloc(sizeof(struct shim_unix_data));
  565. data->pipeid = dent->rel_path.hash >> 32;
  566. } else if (dent->fs != &socket_builtin_fs) {
  567. ret = -ECONNREFUSED;
  568. goto out;
  569. }
  570. sock->addr.un.pipeid = data->pipeid;
  571. sock->addr.un.data = data;
  572. sock->addr.un.dentry = dent;
  573. get_dentry(dent);
  574. }
  575. if (state == SOCK_BOUND) {
  576. /* if the socket is bound, the stream needs to be shut and rebound. */
  577. assert(hdl->pal_handle);
  578. DkStreamDelete(hdl->pal_handle, 0);
  579. DkObjectClose(hdl->pal_handle);
  580. hdl->pal_handle = NULL;
  581. }
  582. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  583. sizeof(struct sockaddr_in6)))
  584. goto out;
  585. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  586. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  587. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  588. SOCK_CONNECTED;
  589. if ((ret = create_socket_uri(hdl)) < 0)
  590. goto out;
  591. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  592. 0, 0, 0,
  593. hdl->flags & O_NONBLOCK);
  594. if (!pal_hdl) {
  595. ret = -PAL_ERRNO;
  596. goto out;
  597. }
  598. hdl->pal_handle = pal_hdl;
  599. if (sock->domain == AF_UNIX) {
  600. struct shim_dentry * dent = sock->addr.un.dentry;
  601. lock(dent->lock);
  602. dent->state ^= DENTRY_NEGATIVE;
  603. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  604. dent->fs = &socket_builtin_fs;
  605. dent->data = sock->addr.un.data;
  606. unlock(dent->lock);
  607. }
  608. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  609. char uri[SOCK_URI_SIZE];
  610. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  611. ret = -PAL_ERRNO;
  612. goto out;
  613. }
  614. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  615. &sock->addr.in.bind,
  616. &sock->addr.in.conn)) < 0)
  617. goto out;
  618. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  619. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  620. }
  621. hdl->acc_mode = MAY_READ|MAY_WRITE;
  622. __process_pending_options(hdl);
  623. ret = 0;
  624. out:
  625. if (ret < 0) {
  626. sock->sock_state = state;
  627. sock->error = -ret;
  628. if (sock->domain == AF_UNIX) {
  629. if (sock->addr.un.dentry)
  630. put_dentry(sock->addr.un.dentry);
  631. if (sock->addr.un.data) {
  632. free(sock->addr.un.data);
  633. sock->addr.un.data = NULL;
  634. }
  635. }
  636. }
  637. unlock(hdl->lock);
  638. put_handle(hdl);
  639. return ret;
  640. }
  641. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  642. socklen_t * addrlen)
  643. {
  644. if (hdl->type != TYPE_SOCK)
  645. return -ENOTSOCK;
  646. struct shim_sock_handle * sock = &hdl->info.sock;
  647. int ret;
  648. PAL_HANDLE accepted = NULL;
  649. if (sock->sock_type != SOCK_STREAM) {
  650. debug("shim_listen: not a stream socket\n");
  651. return -EINVAL;
  652. }
  653. lock(hdl->lock);
  654. if (sock->sock_state != SOCK_LISTENED) {
  655. debug("shim_accpet: invalid socket\n");
  656. ret = -EINVAL;
  657. goto out;
  658. }
  659. accepted = DkStreamWaitForClient(hdl->pal_handle);
  660. if (!accepted) {
  661. ret = -PAL_ERRNO;
  662. goto out;
  663. }
  664. if (flags & O_NONBLOCK) {
  665. PAL_STREAM_ATTR attr;
  666. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  667. ret = -PAL_ERRNO;
  668. goto out;
  669. }
  670. attr.nonblocking = PAL_TRUE;
  671. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  672. ret = -PAL_ERRNO;
  673. goto out;
  674. }
  675. }
  676. struct shim_handle * cli = get_new_handle();
  677. if (!cli) {
  678. ret = -ENOMEM;
  679. goto out;
  680. }
  681. struct shim_sock_handle * cli_sock = &cli->info.sock;
  682. cli->type = TYPE_SOCK;
  683. set_handle_fs(cli, &socket_builtin_fs);
  684. cli->acc_mode = MAY_READ|MAY_WRITE;
  685. cli->flags = O_RDWR|flags;
  686. cli->pal_handle = accepted;
  687. cli_sock->domain = sock->domain;
  688. cli_sock->sock_type = sock->sock_type;
  689. cli_sock->protocol = sock->protocol;
  690. cli_sock->sock_state = SOCK_ACCEPTED;
  691. if (sock->domain == AF_UNIX) {
  692. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  693. if (sock->addr.un.dentry) {
  694. get_dentry(sock->addr.un.dentry);
  695. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  696. }
  697. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  698. if (addr) {
  699. unix_copy_addr(addr, sock->addr.un.dentry);
  700. if (addrlen)
  701. *addrlen = sizeof(struct sockaddr_un);
  702. }
  703. }
  704. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  705. char uri[SOCK_URI_SIZE];
  706. int uri_len;
  707. if (!(uri_len = DkStreamGetName(accepted, uri, SOCK_URI_SIZE))) {
  708. ret = -PAL_ERRNO;
  709. out_hdl:
  710. DkObjectClose(accepted);
  711. goto out_cli;
  712. }
  713. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  714. &cli_sock->addr.in.bind,
  715. &cli_sock->addr.in.conn)) < 0)
  716. goto out_hdl;
  717. qstrsetstr(&cli->uri, uri, uri_len);
  718. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  719. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  720. if (addr) {
  721. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  722. if (addrlen)
  723. *addrlen = (sock->domain == AF_INET) ?
  724. sizeof(struct sockaddr_in) :
  725. sizeof(struct sockaddr_in6);
  726. }
  727. }
  728. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  729. out_cli:
  730. put_handle(cli);
  731. out:
  732. if (ret < 0)
  733. sock->error = -ret;
  734. unlock(hdl->lock);
  735. return ret;
  736. }
  737. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  738. {
  739. int flags;
  740. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  741. if (!hdl)
  742. return -EBADF;
  743. int ret = __do_accept(hdl, flags & FD_CLOEXEC ? O_CLOEXEC : 0,
  744. addr, addrlen);
  745. put_handle(hdl);
  746. return ret;
  747. }
  748. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  749. int flags)
  750. {
  751. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  752. if (!hdl)
  753. return -EBADF;
  754. int ret = __do_accept(hdl,
  755. (flags & SOCK_CLOEXEC ? FD_CLOEXEC : 0) |
  756. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  757. addr, addrlen);
  758. put_handle(hdl);
  759. return ret;
  760. }
  761. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  762. const struct sockaddr * addr, socklen_t addrlen)
  763. {
  764. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  765. if (!hdl)
  766. return -EBADF;
  767. int ret = -EINVAL;
  768. if (hdl->type != TYPE_SOCK) {
  769. ret = -ENOTSOCK;
  770. goto out;
  771. }
  772. struct shim_sock_handle * sock = &hdl->info.sock;
  773. lock(hdl->lock);
  774. PAL_HANDLE pal_hdl = hdl->pal_handle;
  775. char * uri = NULL;
  776. /* Data gram sock need not be conneted or bound at all */
  777. if (sock->sock_type == SOCK_STREAM &&
  778. sock->sock_state != SOCK_CONNECTED &&
  779. sock->sock_state != SOCK_BOUNDCONNECTED &&
  780. sock->sock_state != SOCK_ACCEPTED) {
  781. ret = -ENOTCONN;
  782. goto out_locked;
  783. }
  784. if (sock->sock_type == SOCK_DGRAM &&
  785. sock->sock_state == SOCK_SHUTDOWN) {
  786. ret = -ENOTCONN;
  787. goto out_locked;
  788. }
  789. if (!(hdl->acc_mode & MAY_WRITE)) {
  790. ret = -ECONNRESET;
  791. goto out_locked;
  792. }
  793. if (sock->sock_type == SOCK_DGRAM &&
  794. sock->sock_state != SOCK_BOUNDCONNECTED &&
  795. sock->sock_state != SOCK_CONNECTED) {
  796. if (!addr) {
  797. ret = -EDESTADDRREQ;
  798. goto out_locked;
  799. }
  800. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  801. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  802. hdl->flags & O_NONBLOCK);
  803. if (!pal_hdl) {
  804. ret = -PAL_ERRNO;
  805. goto out_locked;
  806. }
  807. hdl->pal_handle = pal_hdl;
  808. }
  809. if (addr && addr->sa_family != sock->domain) {
  810. ret = -EINVAL;
  811. goto out_locked;
  812. }
  813. uri = __alloca(SOCK_URI_SIZE);
  814. }
  815. unlock(hdl->lock);
  816. if (uri) {
  817. struct addr_inet addr_buf;
  818. inet_save_addr(sock->domain, &addr_buf, addr);
  819. inet_rebase_port(false, sock->domain, &addr_buf, false);
  820. memcpy(uri, "udp:", 5);
  821. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  822. &addr_buf)) < 0) {
  823. lock(hdl->lock);
  824. goto out_locked;
  825. }
  826. debug("next packet send to %s\n", uri);
  827. }
  828. int bytes = 0;
  829. ret = 0;
  830. for (int i = 0 ; i < nbufs ; i++) {
  831. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  832. uri);
  833. if (!ret) {
  834. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  835. - ECONNABORTED : -PAL_ERRNO;
  836. break;
  837. }
  838. bytes += ret;
  839. }
  840. if (bytes)
  841. ret = bytes;
  842. if (ret < 0) {
  843. lock(hdl->lock);
  844. goto out_locked;
  845. }
  846. goto out;
  847. out_locked:
  848. if (ret < 0)
  849. sock->error = -ret;
  850. unlock(hdl->lock);
  851. out:
  852. put_handle(hdl);
  853. return ret;
  854. }
  855. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  856. const struct sockaddr * addr, socklen_t addrlen)
  857. {
  858. struct iovec iovbuf;
  859. iovbuf.iov_base = (void *) buf;
  860. iovbuf.iov_len = len;
  861. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  862. }
  863. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  864. {
  865. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  866. msg->msg_name, msg->msg_namelen);
  867. }
  868. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  869. struct sockaddr * addr, socklen_t * addrlen)
  870. {
  871. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  872. if (!hdl)
  873. return -EBADF;
  874. int ret = 0;
  875. if (hdl->type != TYPE_SOCK) {
  876. ret = -ENOTSOCK;
  877. goto out;
  878. }
  879. struct shim_sock_handle * sock = &hdl->info.sock;
  880. lock(hdl->lock);
  881. PAL_HANDLE pal_hdl = hdl->pal_handle;
  882. char * uri = NULL;
  883. if (sock->sock_type == SOCK_STREAM &&
  884. sock->sock_state != SOCK_CONNECTED &&
  885. sock->sock_state != SOCK_BOUNDCONNECTED &&
  886. sock->sock_state != SOCK_ACCEPTED) {
  887. ret = -ENOTCONN;
  888. goto out_locked;
  889. }
  890. if (!(hdl->acc_mode & MAY_READ)) {
  891. ret = 0;
  892. goto out_locked;
  893. }
  894. if (addr && sock->sock_type == SOCK_DGRAM &&
  895. sock->sock_state != SOCK_CONNECTED &&
  896. sock->sock_state != SOCK_BOUNDCONNECTED) {
  897. if (sock->sock_state == SOCK_CREATED) {
  898. ret = -EINVAL;
  899. goto out_locked;
  900. }
  901. uri = __alloca(SOCK_URI_SIZE);
  902. }
  903. unlock(hdl->lock);
  904. bool address_received = false;
  905. int bytes = 0;
  906. ret = 0;
  907. for (int i = 0 ; i < nbufs ; i++) {
  908. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  909. uri, uri ? SOCK_URI_SIZE : 0);
  910. if (!ret) {
  911. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  912. - ECONNABORTED : -PAL_ERRNO;
  913. break;
  914. }
  915. bytes += ret;
  916. if (!addr || !bytes || address_received)
  917. continue;
  918. if (sock->domain == AF_UNIX) {
  919. unix_copy_addr(addr, sock->addr.un.dentry);
  920. *addrlen = sizeof(struct sockaddr_un);
  921. }
  922. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  923. if (uri) {
  924. struct addr_inet conn;
  925. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  926. &conn, NULL)) < 0) {
  927. lock(hdl->lock);
  928. goto out_locked;
  929. }
  930. debug("last packet received from %s\n", uri);
  931. inet_rebase_port(true, sock->domain, &conn, false);
  932. inet_copy_addr(sock->domain, addr, &conn);
  933. } else {
  934. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  935. }
  936. *addrlen = (sock->domain == AF_INET) ?
  937. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  938. }
  939. address_received = false;
  940. }
  941. if (bytes)
  942. ret = bytes;
  943. if (ret < 0) {
  944. lock(hdl->lock);
  945. goto out_locked;
  946. }
  947. goto out;
  948. out_locked:
  949. if (ret < 0)
  950. sock->error = -ret;
  951. unlock(hdl->lock);
  952. out:
  953. put_handle(hdl);
  954. return ret;
  955. }
  956. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  957. struct sockaddr * addr, socklen_t * addrlen)
  958. {
  959. struct iovec iovbuf;
  960. iovbuf.iov_base = (void *) buf;
  961. iovbuf.iov_len = len;
  962. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  963. }
  964. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  965. {
  966. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  967. msg->msg_name, &msg->msg_namelen);
  968. }
  969. int shim_do_shutdown (int sockfd, int how)
  970. {
  971. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  972. if (!hdl)
  973. return -EBADF;
  974. int ret = 0;
  975. struct shim_sock_handle * sock = &hdl->info.sock;
  976. if (hdl->type != TYPE_SOCK) {
  977. ret = -ENOTSOCK;
  978. goto out;
  979. }
  980. lock(hdl->lock);
  981. if (sock->sock_state != SOCK_LISTENED &&
  982. sock->sock_state != SOCK_ACCEPTED &&
  983. sock->sock_state != SOCK_CONNECTED &&
  984. sock->sock_state != SOCK_BOUNDCONNECTED) {
  985. ret = -ENOTCONN;
  986. goto out_locked;
  987. }
  988. switch (how) {
  989. case SHUT_RD:
  990. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  991. hdl->acc_mode &= ~MAY_READ;
  992. break;
  993. case SHUT_WR:
  994. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  995. hdl->acc_mode &= ~MAY_WRITE;
  996. break;
  997. case SHUT_RDWR:
  998. DkStreamDelete(hdl->pal_handle, 0);
  999. hdl->acc_mode = 0;
  1000. sock->sock_state = SOCK_SHUTDOWN;
  1001. break;
  1002. }
  1003. ret = 0;
  1004. out_locked:
  1005. if (ret < 0)
  1006. sock->error = -ret;
  1007. unlock(hdl->lock);
  1008. out:
  1009. put_handle(hdl);
  1010. return ret;
  1011. }
  1012. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1013. {
  1014. if (!addr || !addrlen)
  1015. return -EFAULT;
  1016. if (*addrlen <= 0)
  1017. return -EINVAL;
  1018. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1019. if (!hdl)
  1020. return -EBADF;
  1021. int ret = -EINVAL;
  1022. if (hdl->type != TYPE_SOCK) {
  1023. ret = -ENOTSOCK;
  1024. goto out;
  1025. }
  1026. struct shim_sock_handle * sock = &hdl->info.sock;
  1027. lock(hdl->lock);
  1028. struct sockaddr saddr;
  1029. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1030. if (len < *addrlen)
  1031. len = *addrlen;
  1032. memcpy(addr, &saddr, len);
  1033. *addrlen = len;
  1034. ret = 0;
  1035. unlock(hdl->lock);
  1036. out:
  1037. put_handle(hdl);
  1038. return ret;
  1039. }
  1040. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1041. {
  1042. if (!addr || !addrlen)
  1043. return -EFAULT;
  1044. if (*addrlen <= 0)
  1045. return -EINVAL;
  1046. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1047. if (!hdl)
  1048. return -EBADF;
  1049. int ret = -EINVAL;
  1050. if (hdl->type != TYPE_SOCK) {
  1051. ret = -ENOTSOCK;
  1052. goto out;
  1053. }
  1054. struct shim_sock_handle * sock = &hdl->info.sock;
  1055. lock(hdl->lock);
  1056. /* Data gram sock need not be conneted or bound at all */
  1057. if (sock->sock_type == SOCK_STREAM &&
  1058. sock->sock_state != SOCK_CONNECTED &&
  1059. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1060. sock->sock_state != SOCK_ACCEPTED) {
  1061. ret = -ENOTCONN;
  1062. goto out_locked;
  1063. }
  1064. if (sock->sock_type == SOCK_DGRAM &&
  1065. sock->sock_state != SOCK_CONNECTED &&
  1066. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1067. ret = -ENOTCONN;
  1068. goto out_locked;
  1069. }
  1070. struct sockaddr saddr;
  1071. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1072. if (len < *addrlen)
  1073. len = *addrlen;
  1074. memcpy(addr, &saddr, len);
  1075. *addrlen = len;
  1076. ret = 0;
  1077. out_locked:
  1078. unlock(hdl->lock);
  1079. out:
  1080. put_handle(hdl);
  1081. return ret;
  1082. }
  1083. struct __kernel_linger {
  1084. int l_onoff;
  1085. int l_linger;
  1086. };
  1087. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1088. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1089. {
  1090. int intval = *((int *) optval);
  1091. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1092. if (level == SOL_SOCKET) {
  1093. switch(optname) {
  1094. case SO_ACCEPTCONN:
  1095. case SO_DOMAIN:
  1096. case SO_ERROR:
  1097. case SO_PROTOCOL:
  1098. case SO_TYPE:
  1099. return -EPERM;
  1100. case SO_KEEPALIVE:
  1101. case SO_LINGER:
  1102. case SO_RCVBUF:
  1103. case SO_SNDBUF:
  1104. case SO_RCVTIMEO:
  1105. case SO_SNDTIMEO:
  1106. case SO_REUSEADDR:
  1107. goto query;
  1108. default:
  1109. goto unknown;
  1110. }
  1111. }
  1112. if (level == SOL_TCP) {
  1113. switch(optname) {
  1114. case TCP_CORK:
  1115. case TCP_NODELAY:
  1116. goto query;
  1117. default:
  1118. goto unknown;
  1119. }
  1120. }
  1121. unknown:
  1122. return -ENOPROTOOPT;
  1123. query:
  1124. if (!attr) {
  1125. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1126. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1127. return -PAL_ERRNO;
  1128. }
  1129. if (level == SOL_SOCKET) {
  1130. switch(optname) {
  1131. case SO_KEEPALIVE:
  1132. if (bolval != attr->socket.tcp_keepalive) {
  1133. attr->socket.tcp_keepalive = bolval;
  1134. goto set;
  1135. }
  1136. break;
  1137. case SO_LINGER: {
  1138. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1139. int linger = l->l_onoff ? l->l_linger : 0;
  1140. if (linger != (int) attr->socket.linger) {
  1141. attr->socket.linger = linger;
  1142. goto set;
  1143. }
  1144. break;
  1145. }
  1146. case SO_RCVBUF:
  1147. if (intval != (int) attr->socket.receivebuf) {
  1148. attr->socket.receivebuf = intval;
  1149. goto set;
  1150. }
  1151. break;
  1152. case SO_SNDBUF:
  1153. if (intval != (int) attr->socket.sendbuf) {
  1154. attr->socket.sendbuf = intval;
  1155. goto set;
  1156. }
  1157. break;
  1158. case SO_RCVTIMEO:
  1159. if (intval != (int) attr->socket.receivetimeout) {
  1160. attr->socket.receivetimeout = intval;
  1161. goto set;
  1162. }
  1163. break;
  1164. case SO_SNDTIMEO:
  1165. if (intval != (int) attr->socket.sendtimeout) {
  1166. attr->socket.sendtimeout = intval;
  1167. goto set;
  1168. }
  1169. break;
  1170. case SO_REUSEADDR:
  1171. break;
  1172. }
  1173. }
  1174. if (level == SOL_TCP) {
  1175. switch(optname) {
  1176. case TCP_CORK:
  1177. if (bolval != attr->socket.tcp_cork) {
  1178. attr->socket.tcp_cork = bolval;
  1179. goto set;
  1180. }
  1181. break;
  1182. case TCP_NODELAY:
  1183. if (bolval != attr->socket.tcp_nodelay) {
  1184. attr->socket.tcp_nodelay = bolval;
  1185. goto set;
  1186. }
  1187. break;
  1188. }
  1189. }
  1190. return 0;
  1191. set:
  1192. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1193. return -PAL_ERRNO;
  1194. return 0;
  1195. }
  1196. static int __process_pending_options (struct shim_handle * hdl)
  1197. {
  1198. struct shim_sock_handle * sock = &hdl->info.sock;
  1199. if (!sock->pending_options)
  1200. return 0;
  1201. PAL_STREAM_ATTR attr;
  1202. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1203. return -PAL_ERRNO;
  1204. struct shim_sock_option * o = sock->pending_options;
  1205. while (o) {
  1206. PAL_STREAM_ATTR tmp = attr;
  1207. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1208. o->optlen, &tmp);
  1209. if (!ret)
  1210. attr = tmp;
  1211. struct shim_sock_option * next = o->next;
  1212. free(o);
  1213. o = next;
  1214. }
  1215. return 0;
  1216. }
  1217. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1218. int optlen)
  1219. {
  1220. if (!optval)
  1221. return -EFAULT;
  1222. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1223. if (!hdl)
  1224. return -EBADF;
  1225. int ret = 0;
  1226. if (hdl->type != TYPE_SOCK) {
  1227. ret = -ENOTSOCK;
  1228. goto out;
  1229. }
  1230. struct shim_sock_handle * sock = &hdl->info.sock;
  1231. lock(hdl->lock);
  1232. if (!hdl->pal_handle) {
  1233. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1234. optlen);
  1235. if (!o) {
  1236. ret = -ENOMEM;
  1237. goto out_locked;
  1238. }
  1239. struct shim_sock_option ** next = &sock->pending_options;
  1240. while (*next)
  1241. next = &(*next)->next;
  1242. o->next = NULL;
  1243. *next = o;
  1244. o->level = level;
  1245. o->optname = optname;
  1246. o->optlen = optlen;
  1247. memcpy(&o->optval, optval, optlen);
  1248. goto out_locked;
  1249. }
  1250. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1251. out_locked:
  1252. unlock(hdl->lock);
  1253. out:
  1254. put_handle(hdl);
  1255. return ret;
  1256. }
  1257. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1258. int * optlen)
  1259. {
  1260. if (!optval || !optlen)
  1261. return -EFAULT;
  1262. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1263. if (!hdl)
  1264. return -EBADF;
  1265. int ret = 0;
  1266. if (hdl->type != TYPE_SOCK) {
  1267. ret = -ENOTSOCK;
  1268. goto out;
  1269. }
  1270. struct shim_sock_handle * sock = &hdl->info.sock;
  1271. lock(hdl->lock);
  1272. int * intval = (int *) optval;
  1273. if (level == SOL_SOCKET) {
  1274. switch(optname) {
  1275. case SO_ACCEPTCONN:
  1276. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1277. goto out;
  1278. case SO_DOMAIN:
  1279. *intval = sock->domain;
  1280. goto out;
  1281. case SO_ERROR:
  1282. *intval = sock->error;
  1283. goto out;
  1284. case SO_PROTOCOL:
  1285. switch(sock->protocol) {
  1286. case SOCK_STREAM:
  1287. *intval = IPPROTO_SCTP;
  1288. break;
  1289. case SOCK_DGRAM:
  1290. *intval = IPPROTO_UDP;
  1291. break;
  1292. default:
  1293. goto unknown;
  1294. }
  1295. goto out;
  1296. case SO_TYPE:
  1297. *intval = sock->protocol;
  1298. goto out;
  1299. case SO_KEEPALIVE:
  1300. case SO_LINGER:
  1301. case SO_RCVBUF:
  1302. case SO_SNDBUF:
  1303. case SO_RCVTIMEO:
  1304. case SO_SNDTIMEO:
  1305. case SO_REUSEADDR:
  1306. goto query;
  1307. default:
  1308. goto unknown;
  1309. }
  1310. }
  1311. if (level == SOL_TCP) {
  1312. switch(optname) {
  1313. case TCP_CORK:
  1314. case TCP_NODELAY:
  1315. goto query;
  1316. default:
  1317. goto unknown;
  1318. }
  1319. }
  1320. unknown:
  1321. ret = -ENOPROTOOPT;
  1322. goto out;
  1323. query:
  1324. {
  1325. PAL_STREAM_ATTR attr;
  1326. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1327. ret = -PAL_ERRNO;
  1328. goto out;
  1329. }
  1330. if (level == SOL_SOCKET) {
  1331. switch(optname) {
  1332. case SO_KEEPALIVE:
  1333. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1334. break;
  1335. case SO_LINGER: {
  1336. struct __kernel_linger * l =
  1337. (struct __kernel_linger *) optval;
  1338. l->l_onoff = attr.socket.linger ? 1 : 0;
  1339. l->l_linger = attr.socket.linger;
  1340. break;
  1341. }
  1342. case SO_RCVBUF:
  1343. *intval = attr.socket.receivebuf;
  1344. break;
  1345. case SO_SNDBUF:
  1346. *intval = attr.socket.sendbuf;
  1347. break;
  1348. case SO_RCVTIMEO:
  1349. *intval = attr.socket.receivetimeout;
  1350. break;
  1351. case SO_SNDTIMEO:
  1352. *intval = attr.socket.sendtimeout;
  1353. break;
  1354. case SO_REUSEADDR:
  1355. *intval = 1;
  1356. break;
  1357. }
  1358. }
  1359. if (level == SOL_TCP) {
  1360. switch(optname) {
  1361. case TCP_CORK:
  1362. *intval = attr.socket.tcp_cork ? 1 : 0;
  1363. break;
  1364. case TCP_NODELAY:
  1365. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1366. break;
  1367. }
  1368. }
  1369. }
  1370. out:
  1371. unlock(hdl->lock);
  1372. put_handle(hdl);
  1373. return ret;
  1374. }