shim_socket.c 58 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940
  1. /* Copyright (C) 2014 Stony Brook University
  2. This file is part of Graphene Library OS.
  3. Graphene Library OS is free software: you can redistribute it and/or
  4. modify it under the terms of the GNU Lesser General Public License
  5. as published by the Free Software Foundation, either version 3 of the
  6. License, or (at your option) any later version.
  7. Graphene Library OS is distributed in the hope that it will be useful,
  8. but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. GNU Lesser General Public License for more details.
  11. You should have received a copy of the GNU Lesser General Public License
  12. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  13. /*
  14. * shim_socket.c
  15. *
  16. * Implementation of system call "socket", "bind", "accept4", "listen",
  17. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  18. * "getsockname", "getpeername".
  19. */
  20. #include <asm/socket.h>
  21. #include <errno.h>
  22. #include <linux/fcntl.h>
  23. #include <linux/in.h>
  24. #include <linux/in6.h>
  25. #include <pal.h>
  26. #include <pal_error.h>
  27. #include <shim_checkpoint.h>
  28. #include <shim_fs.h>
  29. #include <shim_handle.h>
  30. #include <shim_internal.h>
  31. #include <shim_table.h>
  32. #include <shim_utils.h>
  33. /*
  34. * User-settable options (used with setsockopt).
  35. */
  36. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  37. #define TCP_MAXSEG 2 /* Set maximum segment size */
  38. #define TCP_CORK 3 /* Control sending of partial frames */
  39. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  40. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  41. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  42. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  43. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  44. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  45. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  46. #define TCP_INFO 11 /* Information about this connection. */
  47. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  48. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  49. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  50. #define AF_UNSPEC 0
  51. static int rebase_on_lo __attribute_migratable = -1;
  52. static size_t minimal_addrlen(int domain) {
  53. switch (domain) {
  54. case AF_INET:
  55. return sizeof(struct sockaddr_in);
  56. case AF_INET6:
  57. return sizeof(struct sockaddr_in6);
  58. default:
  59. return sizeof(struct sockaddr);
  60. }
  61. }
  62. static int init_port_rebase(void) {
  63. if (rebase_on_lo != -1)
  64. return 0;
  65. char cfg[CONFIG_MAX];
  66. int rebase = 0;
  67. if (!root_config || get_config(root_config, "net.port.rebase_on_lo", cfg, sizeof(cfg)) <= 0) {
  68. rebase_on_lo = 0;
  69. return 0;
  70. }
  71. for (const char* p = cfg; *p; p++) {
  72. if (*p < '0' || *p > '9' || rebase > 32767) {
  73. rebase_on_lo = 0;
  74. return 0;
  75. }
  76. rebase = rebase * 10 + (*p - '0');
  77. }
  78. rebase_on_lo = rebase;
  79. return 0;
  80. }
  81. static int inet_parse_addr(int domain, int type, const char* uri, struct addr_inet* bind,
  82. struct addr_inet* conn);
  83. static int __process_pending_options(struct shim_handle* hdl);
  84. int shim_do_socket(int family, int type, int protocol) {
  85. struct shim_handle* hdl = get_new_handle();
  86. if (!hdl)
  87. return -ENOMEM;
  88. struct shim_sock_handle* sock = &hdl->info.sock;
  89. hdl->type = TYPE_SOCK;
  90. set_handle_fs(hdl, &socket_builtin_fs);
  91. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  92. hdl->acc_mode = 0;
  93. sock->domain = family;
  94. sock->sock_type = type & ~(SOCK_NONBLOCK | SOCK_CLOEXEC);
  95. sock->protocol = protocol;
  96. int ret = -ENOSYS;
  97. switch (sock->domain) {
  98. case AF_UNIX: // Local communication
  99. case AF_INET: // IPv4 Internet protocols ip(7)
  100. case AF_INET6: // IPv6 Internet protocols
  101. break;
  102. default:
  103. debug("shim_socket: unknown socket domain %d\n", sock->domain);
  104. goto err;
  105. }
  106. switch (sock->sock_type) {
  107. case SOCK_STREAM: // TCP
  108. break;
  109. case SOCK_DGRAM: // UDP
  110. hdl->acc_mode = MAY_READ | MAY_WRITE;
  111. break;
  112. default:
  113. debug("shim_socket: unknown socket type %d\n", sock->sock_type);
  114. goto err;
  115. }
  116. sock->sock_state = SOCK_CREATED;
  117. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  118. err:
  119. put_handle(hdl);
  120. return ret;
  121. }
  122. static int unix_create_uri(char* uri, int count, enum shim_sock_state state, unsigned int pipeid) {
  123. int bytes = 0;
  124. switch (state) {
  125. case SOCK_CREATED:
  126. case SOCK_BOUNDCONNECTED:
  127. case SOCK_SHUTDOWN:
  128. return -ENOTCONN;
  129. case SOCK_BOUND:
  130. case SOCK_LISTENED:
  131. case SOCK_ACCEPTED:
  132. bytes = snprintf(uri, count, URI_PREFIX_PIPE_SRV "%u", pipeid);
  133. break;
  134. case SOCK_CONNECTED:
  135. bytes = snprintf(uri, count, URI_PREFIX_PIPE "%u", pipeid);
  136. break;
  137. default:
  138. return -ENOTCONN;
  139. }
  140. return bytes == count ? -ENAMETOOLONG : bytes;
  141. }
  142. static void inet_rebase_port(bool reverse, int domain, struct addr_inet* addr, bool local) {
  143. init_port_rebase();
  144. if (rebase_on_lo) {
  145. if (domain == AF_INET) {
  146. unsigned char* ad = (unsigned char*)&addr->addr.v4.s_addr;
  147. if (!local && memcmp(ad, "\177\0\0\1", 4))
  148. return;
  149. }
  150. if (domain == AF_INET6) {
  151. unsigned short* ad = (void*)&addr->addr.v6.s6_addr;
  152. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  153. return;
  154. }
  155. }
  156. if (reverse)
  157. addr->port = addr->ext_port - rebase_on_lo;
  158. else
  159. addr->ext_port = addr->port + rebase_on_lo;
  160. }
  161. static ssize_t inet_translate_addr(int domain, char* uri, size_t count, struct addr_inet* addr) {
  162. if (domain == AF_INET) {
  163. unsigned char* ad = (unsigned char*)&addr->addr.v4.s_addr;
  164. return snprintf(uri, count, "%u.%u.%u.%u:%u", ad[0], ad[1], ad[2], ad[3], addr->ext_port);
  165. }
  166. if (domain == AF_INET6) {
  167. unsigned short* ad = (void*)&addr->addr.v6.s6_addr;
  168. return snprintf(uri, count, "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u", __ntohs(ad[0]),
  169. __ntohs(ad[1]), __ntohs(ad[2]), __ntohs(ad[3]), __ntohs(ad[4]), __ntohs(ad[5]),
  170. __ntohs(ad[6]), __ntohs(ad[7]), addr->ext_port);
  171. }
  172. return -EPROTONOSUPPORT;
  173. }
  174. static ssize_t inet_create_uri(int domain, char* uri, size_t count, int sock_type,
  175. enum shim_sock_state state, struct addr_inet* bind,
  176. struct addr_inet* conn) {
  177. size_t bytes = 0;
  178. ssize_t ret;
  179. size_t prefix_len;
  180. if (sock_type == SOCK_STREAM) {
  181. switch (state) {
  182. case SOCK_CREATED:
  183. case SOCK_SHUTDOWN:
  184. return -ENOTCONN;
  185. case SOCK_BOUND:
  186. case SOCK_LISTENED:
  187. prefix_len = static_strlen(URI_PREFIX_TCP_SRV);
  188. if (count < prefix_len + 1)
  189. return -ENAMETOOLONG;
  190. memcpy(uri, URI_PREFIX_TCP_SRV, prefix_len + 1);
  191. ret = inet_translate_addr(domain, uri + prefix_len, count - prefix_len, bind);
  192. return ret < 0 ? ret : (ssize_t)(ret + prefix_len);
  193. case SOCK_BOUNDCONNECTED:
  194. prefix_len = static_strlen(URI_PREFIX_TCP);
  195. if (count < prefix_len + 1)
  196. return -ENAMETOOLONG;
  197. memcpy(uri, URI_PREFIX_TCP, prefix_len + 1);
  198. bytes = prefix_len;
  199. ret = inet_translate_addr(domain, uri + bytes, count - bytes, bind);
  200. if (ret < 0)
  201. return ret;
  202. uri[bytes + ret] = ':';
  203. bytes += ret + 1;
  204. ret = inet_translate_addr(domain, uri + bytes, count - bytes, conn);
  205. return ret < 0 ? ret : (ssize_t)(ret + bytes);
  206. case SOCK_CONNECTED:
  207. case SOCK_ACCEPTED:
  208. prefix_len = static_strlen(URI_PREFIX_TCP);
  209. if (count < prefix_len + 1)
  210. return -ENAMETOOLONG;
  211. memcpy(uri, URI_PREFIX_TCP, prefix_len + 1);
  212. ret = inet_translate_addr(domain, uri + prefix_len, count - prefix_len, conn);
  213. return ret < 0 ? ret : (ssize_t)(ret + prefix_len);
  214. }
  215. }
  216. if (sock_type == SOCK_DGRAM) {
  217. switch (state) {
  218. case SOCK_CREATED:
  219. case SOCK_SHUTDOWN:
  220. return -ENOTCONN;
  221. case SOCK_LISTENED:
  222. case SOCK_ACCEPTED:
  223. return -EOPNOTSUPP;
  224. case SOCK_BOUNDCONNECTED:
  225. prefix_len = static_strlen(URI_PREFIX_UDP_SRV);
  226. if (count < prefix_len + 1)
  227. return -ENAMETOOLONG;
  228. memcpy(uri, URI_PREFIX_UDP_SRV, prefix_len + 1);
  229. bytes = prefix_len;
  230. ret = inet_translate_addr(domain, uri + bytes, count - bytes, bind);
  231. if (ret < 0)
  232. return ret;
  233. uri[bytes + ret] = ':';
  234. bytes += ret + 1;
  235. ret = inet_translate_addr(domain, uri + bytes, count - bytes, conn);
  236. return ret < 0 ? ret : (ssize_t)(ret + bytes);
  237. case SOCK_BOUND:
  238. prefix_len = static_strlen(URI_PREFIX_UDP_SRV);
  239. if (count < prefix_len + 1)
  240. return -ENAMETOOLONG;
  241. memcpy(uri, URI_PREFIX_UDP_SRV, prefix_len + 1);
  242. ret = inet_translate_addr(domain, uri + prefix_len, count - prefix_len, bind);
  243. return ret < 0 ? ret : (ssize_t)(ret + prefix_len);
  244. case SOCK_CONNECTED:
  245. prefix_len = static_strlen(URI_PREFIX_UDP);
  246. if (count < prefix_len + 1)
  247. return -ENAMETOOLONG;
  248. memcpy(uri, URI_PREFIX_UDP, prefix_len + 1);
  249. ret = inet_translate_addr(domain, uri + prefix_len, count - prefix_len, conn);
  250. return ret < 0 ? ret : (ssize_t)(ret + prefix_len);
  251. }
  252. }
  253. return -EPROTONOSUPPORT;
  254. }
  255. static inline void unix_copy_addr(struct sockaddr* saddr, struct shim_dentry* dent) {
  256. struct sockaddr_un* un = (struct sockaddr_un*)saddr;
  257. un->sun_family = AF_UNIX;
  258. size_t size;
  259. const char* path = dentry_get_path(dent, true, &size);
  260. memcpy(un->sun_path, path, size + 1);
  261. }
  262. static int inet_check_addr(int domain, struct sockaddr* addr, socklen_t addrlen) {
  263. if (domain == AF_INET) {
  264. if (addr->sa_family != AF_INET)
  265. return -EAFNOSUPPORT;
  266. if (addrlen != sizeof(struct sockaddr_in))
  267. return -EINVAL;
  268. return 0;
  269. }
  270. if (domain == AF_INET6) {
  271. if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
  272. return -EAFNOSUPPORT;
  273. if (addrlen != minimal_addrlen(addr->sa_family))
  274. return -EINVAL;
  275. return 0;
  276. }
  277. return -EINVAL;
  278. }
  279. static int inet_copy_addr(int domain, struct sockaddr* saddr, const struct addr_inet* addr) {
  280. if (domain == AF_INET) {
  281. struct sockaddr_in* in = (struct sockaddr_in*)saddr;
  282. in->sin_family = AF_INET;
  283. in->sin_port = __htons(addr->port);
  284. in->sin_addr = addr->addr.v4;
  285. return sizeof(struct sockaddr_in);
  286. }
  287. if (domain == AF_INET6) {
  288. struct sockaddr_in6* in6 = (struct sockaddr_in6*)saddr;
  289. in6->sin6_family = AF_INET6;
  290. in6->sin6_port = __htons(addr->port);
  291. in6->sin6_addr = addr->addr.v6;
  292. return sizeof(struct sockaddr_in6);
  293. }
  294. return sizeof(struct sockaddr);
  295. }
  296. static void inet_save_addr(int domain, struct addr_inet* addr, const struct sockaddr* saddr) {
  297. if (domain == AF_INET) {
  298. const struct sockaddr_in* in = (const struct sockaddr_in*)saddr;
  299. addr->port = __ntohs(in->sin_port);
  300. addr->addr.v4 = in->sin_addr;
  301. return;
  302. }
  303. if (domain == AF_INET6) {
  304. if (saddr->sa_family == AF_INET) {
  305. const struct sockaddr_in* in = (const struct sockaddr_in*)saddr;
  306. addr->port = __ntohs(in->sin_port);
  307. addr->addr.v6.s6_addr32[0] = __htonl(0);
  308. addr->addr.v6.s6_addr32[1] = __htonl(0);
  309. addr->addr.v6.s6_addr32[2] = __htonl(0x0000ffff);
  310. /* in->sin_addr.s_addr is already network byte order */
  311. addr->addr.v6.s6_addr32[3] = in->sin_addr.s_addr;
  312. } else {
  313. const struct sockaddr_in6* in6 = (const struct sockaddr_in6*)saddr;
  314. addr->port = __ntohs(in6->sin6_port);
  315. addr->addr.v6 = in6->sin6_addr;
  316. }
  317. return;
  318. }
  319. }
  320. static inline bool inet_comp_addr(int domain, const struct addr_inet* addr,
  321. const struct sockaddr* saddr) {
  322. if (domain == AF_INET) {
  323. const struct sockaddr_in* in = (const struct sockaddr_in*)saddr;
  324. return addr->port == __ntohs(in->sin_port) &&
  325. !memcmp(&addr->addr.v4, &in->sin_addr, sizeof(struct in_addr));
  326. }
  327. if (domain == AF_INET6) {
  328. const struct sockaddr_in6* in6 = (const struct sockaddr_in6*)saddr;
  329. return addr->port == __ntohs(in6->sin6_port) &&
  330. !memcmp(&addr->addr.v6, &in6->sin6_addr, sizeof(struct in6_addr));
  331. }
  332. return false;
  333. }
  334. static int create_socket_uri(struct shim_handle* hdl) {
  335. struct shim_sock_handle* sock = &hdl->info.sock;
  336. if (sock->domain == AF_UNIX) {
  337. char uri_buf[32];
  338. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state, sock->addr.un.pipeid);
  339. if (bytes < 0)
  340. return bytes;
  341. qstrsetstr(&hdl->uri, uri_buf, bytes);
  342. return 0;
  343. }
  344. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  345. char uri_buf[SOCK_URI_SIZE];
  346. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE, sock->sock_type,
  347. sock->sock_state, &sock->addr.in.bind, &sock->addr.in.conn);
  348. if (bytes < 0)
  349. return bytes;
  350. qstrsetstr(&hdl->uri, uri_buf, bytes);
  351. return 0;
  352. }
  353. return -EPROTONOSUPPORT;
  354. }
  355. /* hdl->lock must be held */
  356. static bool __socket_is_ipv6_v6only(struct shim_handle* hdl) {
  357. assert(locked(&hdl->lock));
  358. struct shim_sock_option* o = hdl->info.sock.pending_options;
  359. while (o) {
  360. if (o->level == IPPROTO_IPV6 && o->optname == IPV6_V6ONLY) {
  361. int* intval = (int*)o->optval;
  362. return *intval ? 1 : 0;
  363. }
  364. o = o->next;
  365. }
  366. return false;
  367. }
  368. int shim_do_bind(int sockfd, struct sockaddr* addr, socklen_t addrlen) {
  369. if (!addr || test_user_memory(addr, addrlen, false))
  370. return -EFAULT;
  371. struct shim_handle* hdl = get_fd_handle(sockfd, NULL, NULL);
  372. int ret = -EINVAL;
  373. if (!hdl)
  374. return -EBADF;
  375. if (hdl->type != TYPE_SOCK) {
  376. put_handle(hdl);
  377. return -ENOTSOCK;
  378. }
  379. struct shim_sock_handle* sock = &hdl->info.sock;
  380. lock(&hdl->lock);
  381. enum shim_sock_state state = sock->sock_state;
  382. if (state != SOCK_CREATED) {
  383. debug("shim_bind: bind on a bound socket\n");
  384. goto out;
  385. }
  386. if (sock->domain == AF_UNIX) {
  387. if (addrlen != sizeof(struct sockaddr_un))
  388. goto out;
  389. struct sockaddr_un* saddr = (struct sockaddr_un*)addr;
  390. char* spath = saddr->sun_path;
  391. struct shim_dentry* dent = NULL;
  392. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0) {
  393. // DEP 7/3/17: We actually want either 0 or -ENOENT, as the
  394. // expected case is that the name is free (and we get the dent to
  395. // populate the name)
  396. if (ret != -ENOENT || !dent)
  397. goto out;
  398. }
  399. if (dent->state & DENTRY_VALID && !(dent->state & DENTRY_NEGATIVE)) {
  400. ret = -EADDRINUSE;
  401. goto out;
  402. }
  403. struct shim_unix_data* data = malloc(sizeof(struct shim_unix_data));
  404. data->pipeid = hashtype_to_idtype(dent->rel_path.hash);
  405. sock->addr.un.pipeid = data->pipeid;
  406. sock->addr.un.data = data;
  407. sock->addr.un.dentry = dent;
  408. } else if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  409. if ((ret = inet_check_addr(sock->domain, addr, addrlen)) < 0)
  410. goto out;
  411. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  412. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  413. }
  414. sock->sock_state = SOCK_BOUND;
  415. if ((ret = create_socket_uri(hdl)) < 0)
  416. goto out;
  417. int create_flags = PAL_CREATE_DUALSTACK;
  418. if (__socket_is_ipv6_v6only(hdl)) {
  419. /* application requests IPV6_V6ONLY, this socket is not dual-stack */
  420. create_flags &= ~PAL_CREATE_DUALSTACK;
  421. }
  422. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri), 0, 0, create_flags, hdl->flags & O_NONBLOCK);
  423. if (!pal_hdl) {
  424. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  425. debug("bind: invalid handle returned\n");
  426. goto out;
  427. }
  428. if (sock->domain == AF_UNIX) {
  429. struct shim_dentry* dent = sock->addr.un.dentry;
  430. dent->state ^= DENTRY_NEGATIVE;
  431. dent->state |= DENTRY_VALID | DENTRY_RECENTLY;
  432. dent->fs = &socket_builtin_fs;
  433. dent->data = sock->addr.un.data;
  434. }
  435. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  436. char uri[SOCK_URI_SIZE];
  437. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  438. ret = -PAL_ERRNO;
  439. goto out;
  440. }
  441. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri, &sock->addr.in.bind, NULL)) <
  442. 0)
  443. goto out;
  444. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  445. }
  446. hdl->pal_handle = pal_hdl;
  447. __process_pending_options(hdl);
  448. ret = 0;
  449. out:
  450. if (ret < 0) {
  451. sock->sock_state = state;
  452. sock->error = -ret;
  453. if (sock->domain == AF_UNIX) {
  454. if (sock->addr.un.dentry)
  455. put_dentry(sock->addr.un.dentry);
  456. if (sock->addr.un.data) {
  457. free(sock->addr.un.data);
  458. sock->addr.un.data = NULL;
  459. }
  460. }
  461. }
  462. unlock(&hdl->lock);
  463. put_handle(hdl);
  464. return ret;
  465. }
  466. static int inet_parse_addr(int domain, int type, const char* uri, struct addr_inet* bind,
  467. struct addr_inet* conn) {
  468. char* ip_str;
  469. char* port_str;
  470. char* next_str;
  471. int ip_len = 0;
  472. if (!(next_str = strchr(uri, ':')))
  473. return -EINVAL;
  474. next_str++;
  475. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  476. if (strstartswith_static(uri, URI_PREFIX_UDP))
  477. prefix = UDP;
  478. else if (strstartswith_static(uri, URI_PREFIX_UDP_SRV))
  479. prefix = UDPSRV;
  480. else if (strstartswith_static(uri, URI_PREFIX_TCP))
  481. prefix = TCP;
  482. else if (strstartswith_static(uri, URI_PREFIX_TCP_SRV))
  483. prefix = TCPSRV;
  484. else
  485. return -EINVAL;
  486. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  487. return -EINVAL;
  488. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  489. return -EINVAL;
  490. for (int round = 0; (ip_str = next_str); round++) {
  491. if (ip_str[0] == '[') {
  492. ip_str++;
  493. if (domain != AF_INET6)
  494. return -EINVAL;
  495. if (!(port_str = strchr(ip_str, ']')))
  496. return -EINVAL;
  497. ip_len = port_str - ip_str;
  498. port_str++;
  499. if (*port_str != ':')
  500. return -EINVAL;
  501. } else {
  502. if (domain != AF_INET)
  503. return -EINVAL;
  504. if (!(port_str = strchr(ip_str, ':')))
  505. return -EINVAL;
  506. ip_len = port_str - ip_str;
  507. }
  508. port_str++;
  509. next_str = strchr(port_str, ':');
  510. if (next_str)
  511. next_str++;
  512. struct addr_inet* addr = round ? conn : bind;
  513. if (domain == AF_INET) {
  514. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  515. addr->ext_port = atoi(port_str);
  516. }
  517. if (domain == AF_INET6) {
  518. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  519. addr->ext_port = atoi(port_str);
  520. }
  521. }
  522. return 0;
  523. }
  524. int shim_do_listen(int sockfd, int backlog) {
  525. if (backlog < 0)
  526. return -EINVAL;
  527. struct shim_handle* hdl = get_fd_handle(sockfd, NULL, NULL);
  528. if (!hdl)
  529. return -EBADF;
  530. if (hdl->type != TYPE_SOCK) {
  531. put_handle(hdl);
  532. return -ENOTSOCK;
  533. }
  534. struct shim_sock_handle* sock = &hdl->info.sock;
  535. if (sock->sock_type != SOCK_STREAM) {
  536. debug("shim_listen: not a stream socket\n");
  537. put_handle(hdl);
  538. return -EINVAL;
  539. }
  540. lock(&hdl->lock);
  541. enum shim_sock_state state = sock->sock_state;
  542. int ret = -EINVAL;
  543. if (state != SOCK_BOUND && state != SOCK_LISTENED) {
  544. debug("shim_listen: listen on unbound socket\n");
  545. goto out;
  546. }
  547. hdl->acc_mode = MAY_READ;
  548. sock->sock_state = SOCK_LISTENED;
  549. ret = 0;
  550. out:
  551. if (ret < 0)
  552. sock->sock_state = state;
  553. unlock(&hdl->lock);
  554. put_handle(hdl);
  555. return ret;
  556. }
  557. /* Connect with the TCP socket is always in the client.
  558. *
  559. * With UDP, the connection is make to the socket specific for a
  560. * destination. A process with a connected UDP socket can call
  561. * connect again for that socket for one of two reasons: 1. To
  562. * specify a new IP address and port 2. To unconnect the socket.
  563. */
  564. int shim_do_connect(int sockfd, struct sockaddr* addr, int addrlen) {
  565. if (!addr || test_user_memory(addr, addrlen, false))
  566. return -EFAULT;
  567. struct shim_handle* hdl = get_fd_handle(sockfd, NULL, NULL);
  568. if (!hdl)
  569. return -EBADF;
  570. if (hdl->type != TYPE_SOCK) {
  571. put_handle(hdl);
  572. return -ENOTSOCK;
  573. }
  574. struct shim_sock_handle* sock = &hdl->info.sock;
  575. lock(&hdl->lock);
  576. enum shim_sock_state state = sock->sock_state;
  577. int ret = -EINVAL;
  578. if (state == SOCK_CONNECTED) {
  579. if (addr->sa_family == AF_UNSPEC) {
  580. sock->sock_state = SOCK_CREATED;
  581. if (sock->sock_type == SOCK_STREAM && hdl->pal_handle) {
  582. DkStreamDelete(hdl->pal_handle, 0);
  583. DkObjectClose(hdl->pal_handle);
  584. hdl->pal_handle = NULL;
  585. }
  586. debug("shim_connect: reconnect on a stream socket\n");
  587. ret = 0;
  588. goto out;
  589. }
  590. debug("shim_connect: reconnect on a stream socket\n");
  591. ret = -EISCONN;
  592. goto out;
  593. }
  594. if (state != SOCK_BOUND && state != SOCK_CREATED) {
  595. debug("shim_connect: connect on invalid socket\n");
  596. goto out;
  597. }
  598. if (sock->domain == AF_UNIX) {
  599. if (addrlen != sizeof(struct sockaddr_un))
  600. goto out;
  601. struct sockaddr_un* saddr = (struct sockaddr_un*)addr;
  602. char* spath = saddr->sun_path;
  603. struct shim_dentry* dent;
  604. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0) {
  605. // DEP 7/3/17: We actually want either 0 or -ENOENT, as the
  606. // expected case is that the name is free (and we get the dent to
  607. // populate the name)
  608. if (ret != -ENOENT || !dent)
  609. goto out;
  610. }
  611. struct shim_unix_data* data = dent->data;
  612. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  613. data = malloc(sizeof(struct shim_unix_data));
  614. data->pipeid = hashtype_to_idtype(dent->rel_path.hash);
  615. } else if (dent->fs != &socket_builtin_fs) {
  616. ret = -ECONNREFUSED;
  617. goto out;
  618. }
  619. sock->addr.un.pipeid = data->pipeid;
  620. sock->addr.un.data = data;
  621. sock->addr.un.dentry = dent;
  622. get_dentry(dent);
  623. }
  624. if (state == SOCK_BOUND) {
  625. /* if the socket is bound, the stream needs to be shut and rebound. */
  626. assert(hdl->pal_handle);
  627. DkStreamDelete(hdl->pal_handle, 0);
  628. DkObjectClose(hdl->pal_handle);
  629. hdl->pal_handle = NULL;
  630. }
  631. if (sock->domain != AF_UNIX) {
  632. if ((ret = inet_check_addr(sock->domain, addr, addrlen)) < 0)
  633. goto out;
  634. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  635. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  636. }
  637. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED : SOCK_CONNECTED;
  638. if ((ret = create_socket_uri(hdl)) < 0)
  639. goto out;
  640. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri), 0, 0, 0, hdl->flags & O_NONBLOCK);
  641. if (!pal_hdl) {
  642. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_DENIED) ? -ECONNREFUSED : -PAL_ERRNO;
  643. goto out;
  644. }
  645. hdl->pal_handle = pal_hdl;
  646. if (sock->domain == AF_UNIX) {
  647. struct shim_dentry* dent = sock->addr.un.dentry;
  648. lock(&dent->lock);
  649. dent->state ^= DENTRY_NEGATIVE;
  650. dent->state |= DENTRY_VALID | DENTRY_RECENTLY;
  651. dent->fs = &socket_builtin_fs;
  652. dent->data = sock->addr.un.data;
  653. unlock(&dent->lock);
  654. }
  655. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  656. char uri[SOCK_URI_SIZE];
  657. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  658. ret = -PAL_ERRNO;
  659. goto out;
  660. }
  661. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri, &sock->addr.in.bind,
  662. &sock->addr.in.conn)) < 0)
  663. goto out;
  664. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  665. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  666. }
  667. hdl->acc_mode = MAY_READ | MAY_WRITE;
  668. __process_pending_options(hdl);
  669. ret = 0;
  670. out:
  671. if (ret < 0) {
  672. sock->sock_state = state;
  673. sock->error = -ret;
  674. if (sock->domain == AF_UNIX) {
  675. if (sock->addr.un.dentry)
  676. put_dentry(sock->addr.un.dentry);
  677. if (sock->addr.un.data) {
  678. free(sock->addr.un.data);
  679. sock->addr.un.data = NULL;
  680. }
  681. }
  682. }
  683. unlock(&hdl->lock);
  684. put_handle(hdl);
  685. return ret;
  686. }
  687. int __do_accept(struct shim_handle* hdl, int flags, struct sockaddr* addr, socklen_t* addrlen) {
  688. if (hdl->type != TYPE_SOCK)
  689. return -ENOTSOCK;
  690. struct shim_sock_handle* sock = &hdl->info.sock;
  691. int ret;
  692. PAL_HANDLE accepted = NULL;
  693. if (sock->sock_type != SOCK_STREAM) {
  694. debug("shim_accept: not a stream socket\n");
  695. return -EOPNOTSUPP;
  696. }
  697. if (addr) {
  698. if (!addrlen || test_user_memory(addrlen, sizeof(*addrlen), false))
  699. return -EINVAL;
  700. if (*addrlen < minimal_addrlen(sock->domain))
  701. return -EINVAL;
  702. if (test_user_memory(addr, *addrlen, true))
  703. return -EINVAL;
  704. }
  705. lock(&hdl->lock);
  706. if (sock->sock_state != SOCK_LISTENED) {
  707. debug("shim_accpet: invalid socket\n");
  708. ret = -EINVAL;
  709. goto out;
  710. }
  711. accepted = DkStreamWaitForClient(hdl->pal_handle);
  712. if (!accepted) {
  713. ret = -PAL_ERRNO;
  714. goto out;
  715. }
  716. if (flags & O_NONBLOCK) {
  717. PAL_STREAM_ATTR attr;
  718. if (!DkStreamAttributesQueryByHandle(accepted, &attr)) {
  719. ret = -PAL_ERRNO;
  720. goto out;
  721. }
  722. attr.nonblocking = PAL_TRUE;
  723. if (!DkStreamAttributesSetByHandle(accepted, &attr)) {
  724. ret = -PAL_ERRNO;
  725. goto out;
  726. }
  727. }
  728. struct shim_handle* cli = get_new_handle();
  729. if (!cli) {
  730. ret = -ENOMEM;
  731. goto out;
  732. }
  733. struct shim_sock_handle* cli_sock = &cli->info.sock;
  734. cli->type = TYPE_SOCK;
  735. set_handle_fs(cli, &socket_builtin_fs);
  736. cli->acc_mode = MAY_READ | MAY_WRITE;
  737. cli->flags = O_RDWR | flags;
  738. cli->pal_handle = accepted;
  739. accepted = NULL;
  740. cli_sock->domain = sock->domain;
  741. cli_sock->sock_type = sock->sock_type;
  742. cli_sock->protocol = sock->protocol;
  743. cli_sock->sock_state = SOCK_ACCEPTED;
  744. if (sock->domain == AF_UNIX) {
  745. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  746. if (sock->addr.un.dentry) {
  747. get_dentry(sock->addr.un.dentry);
  748. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  749. }
  750. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  751. if (addr) {
  752. unix_copy_addr(addr, sock->addr.un.dentry);
  753. if (addrlen)
  754. *addrlen = sizeof(struct sockaddr_un);
  755. }
  756. }
  757. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  758. char uri[SOCK_URI_SIZE];
  759. int uri_len;
  760. if (!(uri_len = DkStreamGetName(cli->pal_handle, uri, SOCK_URI_SIZE))) {
  761. ret = -PAL_ERRNO;
  762. goto out_cli;
  763. }
  764. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  765. &cli_sock->addr.in.bind, &cli_sock->addr.in.conn)) < 0)
  766. goto out_cli;
  767. qstrsetstr(&cli->uri, uri, uri_len);
  768. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  769. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  770. if (addr) {
  771. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  772. if (addrlen) {
  773. assert(sock->domain == AF_INET || sock->domain == AF_INET6);
  774. *addrlen = minimal_addrlen(sock->domain);
  775. }
  776. }
  777. }
  778. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  779. out_cli:
  780. put_handle(cli);
  781. out:
  782. if (ret < 0)
  783. sock->error = -ret;
  784. if (accepted)
  785. DkObjectClose(accepted);
  786. unlock(&hdl->lock);
  787. return ret;
  788. }
  789. int shim_do_accept(int fd, struct sockaddr* addr, socklen_t* addrlen) {
  790. int flags;
  791. struct shim_handle* hdl = get_fd_handle(fd, &flags, NULL);
  792. if (!hdl)
  793. return -EBADF;
  794. int ret = __do_accept(hdl, flags & O_CLOEXEC, addr, addrlen);
  795. put_handle(hdl);
  796. return ret;
  797. }
  798. int shim_do_accept4(int fd, struct sockaddr* addr, socklen_t* addrlen, int flags) {
  799. struct shim_handle* hdl = get_fd_handle(fd, NULL, NULL);
  800. if (!hdl)
  801. return -EBADF;
  802. int ret = __do_accept(
  803. hdl, (flags & SOCK_CLOEXEC ? O_CLOEXEC : 0) | (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  804. addr, addrlen);
  805. put_handle(hdl);
  806. return ret;
  807. }
  808. static ssize_t do_sendmsg(int fd, struct iovec* bufs, int nbufs, int flags,
  809. const struct sockaddr* addr, socklen_t addrlen) {
  810. // Issue #752 - https://github.com/oscarlab/graphene/issues/752
  811. __UNUSED(flags);
  812. struct shim_handle* hdl = get_fd_handle(fd, NULL, NULL);
  813. if (!hdl)
  814. return -EBADF;
  815. ssize_t ret = -ENOTSOCK;
  816. if (hdl->type != TYPE_SOCK)
  817. goto out;
  818. struct shim_sock_handle* sock = &hdl->info.sock;
  819. ret = -EFAULT;
  820. if (addr && test_user_memory((void*)addr, addrlen, false))
  821. goto out;
  822. if (!bufs || test_user_memory(bufs, sizeof(*bufs) * nbufs, false))
  823. goto out;
  824. for (int i = 0; i < nbufs; i++) {
  825. if (!bufs[i].iov_base || test_user_memory(bufs[i].iov_base, bufs[i].iov_len, false))
  826. goto out;
  827. }
  828. lock(&hdl->lock);
  829. PAL_HANDLE pal_hdl = hdl->pal_handle;
  830. char* uri = NULL;
  831. /* Data gram sock need not be conneted or bound at all */
  832. if (sock->sock_type == SOCK_STREAM && sock->sock_state != SOCK_CONNECTED &&
  833. sock->sock_state != SOCK_BOUNDCONNECTED && sock->sock_state != SOCK_ACCEPTED) {
  834. ret = -ENOTCONN;
  835. goto out_locked;
  836. }
  837. if (sock->sock_type == SOCK_DGRAM && sock->sock_state == SOCK_SHUTDOWN) {
  838. ret = -ENOTCONN;
  839. goto out_locked;
  840. }
  841. if (!(hdl->acc_mode & MAY_WRITE)) {
  842. ret = -ECONNRESET;
  843. goto out_locked;
  844. }
  845. if (sock->sock_type == SOCK_DGRAM && sock->sock_state != SOCK_BOUNDCONNECTED &&
  846. sock->sock_state != SOCK_CONNECTED) {
  847. if (!addr) {
  848. ret = -EDESTADDRREQ;
  849. goto out_locked;
  850. }
  851. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  852. pal_hdl = DkStreamOpen(URI_PREFIX_UDP, 0, 0, 0, hdl->flags & O_NONBLOCK);
  853. if (!pal_hdl) {
  854. ret = -PAL_ERRNO;
  855. goto out_locked;
  856. }
  857. hdl->pal_handle = pal_hdl;
  858. }
  859. if (addr && addr->sa_family != sock->domain) {
  860. ret = -EINVAL;
  861. goto out_locked;
  862. }
  863. uri = __alloca(SOCK_URI_SIZE);
  864. }
  865. unlock(&hdl->lock);
  866. if (uri) {
  867. struct addr_inet addr_buf;
  868. inet_save_addr(sock->domain, &addr_buf, addr);
  869. inet_rebase_port(false, sock->domain, &addr_buf, false);
  870. size_t prefix_len = static_strlen(URI_PREFIX_UDP);
  871. memcpy(uri, URI_PREFIX_UDP, prefix_len + 1);
  872. if ((ret = inet_translate_addr(sock->domain,
  873. uri + prefix_len,
  874. SOCK_URI_SIZE - prefix_len,
  875. &addr_buf)) < 0) {
  876. lock(&hdl->lock);
  877. goto out_locked;
  878. }
  879. debug("next packet send to %s\n", uri);
  880. }
  881. int bytes = 0;
  882. ret = 0;
  883. for (int i = 0; i < nbufs; i++) {
  884. PAL_NUM pal_ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base, uri);
  885. if (pal_ret == PAL_STREAM_ERROR) {
  886. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -ECONNABORTED : -PAL_ERRNO;
  887. break;
  888. }
  889. bytes += pal_ret;
  890. }
  891. if (bytes)
  892. ret = bytes;
  893. if (ret < 0) {
  894. lock(&hdl->lock);
  895. goto out_locked;
  896. }
  897. goto out;
  898. out_locked:
  899. if (ret < 0)
  900. sock->error = -ret;
  901. unlock(&hdl->lock);
  902. out:
  903. put_handle(hdl);
  904. return ret;
  905. }
  906. ssize_t shim_do_sendto(int sockfd, const void* buf, size_t len, int flags,
  907. const struct sockaddr* addr, socklen_t addrlen) {
  908. struct iovec iovbuf;
  909. iovbuf.iov_base = (void*)buf;
  910. iovbuf.iov_len = len;
  911. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  912. }
  913. ssize_t shim_do_sendmsg(int sockfd, struct msghdr* msg, int flags) {
  914. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags, msg->msg_name,
  915. msg->msg_namelen);
  916. }
  917. ssize_t shim_do_sendmmsg(int sockfd, struct mmsghdr* msg, size_t vlen, int flags) {
  918. ssize_t total = 0;
  919. for (size_t i = 0; i * sizeof(struct mmsghdr) < vlen; i++) {
  920. struct msghdr* m = &msg[i].msg_hdr;
  921. ssize_t bytes =
  922. do_sendmsg(sockfd, m->msg_iov, m->msg_iovlen, flags, m->msg_name, m->msg_namelen);
  923. if (bytes < 0)
  924. return total > 0 ? total : bytes;
  925. msg[i].msg_len = bytes;
  926. total++;
  927. }
  928. return total;
  929. }
  930. static ssize_t do_recvmsg(int fd, struct iovec* bufs, int nbufs, int flags, struct sockaddr* addr,
  931. socklen_t* addrlen) {
  932. if (flags & ~MSG_PEEK) {
  933. debug("recvmsg()/recvmmsg()/recvfrom(): unknown flag (only MSG_PEEK is supported).\n");
  934. return -EOPNOTSUPP;
  935. }
  936. struct shim_handle* hdl = get_fd_handle(fd, NULL, NULL);
  937. if (!hdl)
  938. return -EBADF;
  939. struct shim_peek_buffer* peek_buffer = NULL;
  940. int ret = -ENOTSOCK;
  941. if (hdl->type != TYPE_SOCK)
  942. goto out;
  943. struct shim_sock_handle* sock = &hdl->info.sock;
  944. if (addr) {
  945. ret = -EINVAL;
  946. if (!addrlen || test_user_memory(addrlen, sizeof(*addrlen), false))
  947. goto out;
  948. if (*addrlen < minimal_addrlen(sock->domain))
  949. goto out;
  950. if (test_user_memory(addr, *addrlen, true))
  951. goto out;
  952. }
  953. ret = -EFAULT;
  954. if (!bufs || test_user_memory(bufs, sizeof(*bufs) * nbufs, false))
  955. goto out;
  956. size_t expected_size = 0;
  957. for (int i = 0; i < nbufs; i++) {
  958. if (!bufs[i].iov_base || test_user_memory(bufs[i].iov_base, bufs[i].iov_len, true))
  959. goto out;
  960. expected_size += bufs[i].iov_len;
  961. }
  962. lock(&hdl->lock);
  963. peek_buffer = sock->peek_buffer;
  964. sock->peek_buffer = NULL;
  965. PAL_HANDLE pal_hdl = hdl->pal_handle;
  966. char* uri = NULL;
  967. if (sock->sock_type == SOCK_STREAM && sock->sock_state != SOCK_CONNECTED &&
  968. sock->sock_state != SOCK_BOUNDCONNECTED && sock->sock_state != SOCK_ACCEPTED) {
  969. ret = -ENOTCONN;
  970. goto out_locked;
  971. }
  972. if (!(hdl->acc_mode & MAY_READ)) {
  973. ret = 0;
  974. goto out_locked;
  975. }
  976. if (addr && sock->sock_type == SOCK_DGRAM && sock->sock_state != SOCK_CONNECTED &&
  977. sock->sock_state != SOCK_BOUNDCONNECTED) {
  978. if (sock->sock_state == SOCK_CREATED) {
  979. ret = -EINVAL;
  980. goto out_locked;
  981. }
  982. uri = __alloca(SOCK_URI_SIZE);
  983. }
  984. unlock(&hdl->lock);
  985. if (flags & MSG_PEEK) {
  986. if (!peek_buffer) {
  987. /* create new peek buffer with expected read size */
  988. peek_buffer = malloc(sizeof(*peek_buffer) + expected_size);
  989. if (!peek_buffer) {
  990. ret = -ENOMEM;
  991. lock(&hdl->lock);
  992. goto out_locked;
  993. }
  994. peek_buffer->size = expected_size;
  995. peek_buffer->start = 0;
  996. peek_buffer->end = 0;
  997. } else {
  998. /* realloc peek buffer to accommodate expected read size */
  999. if (expected_size > peek_buffer->size - peek_buffer->start) {
  1000. size_t expand = expected_size - (peek_buffer->size - peek_buffer->start);
  1001. struct shim_peek_buffer* old_peek_buffer = peek_buffer;
  1002. peek_buffer = malloc(sizeof(*peek_buffer) + old_peek_buffer->size + expand);
  1003. if (!peek_buffer) {
  1004. ret = -ENOMEM;
  1005. lock(&hdl->lock);
  1006. goto out_locked;
  1007. }
  1008. memcpy(peek_buffer, old_peek_buffer, sizeof(*peek_buffer) + old_peek_buffer->size);
  1009. peek_buffer->size += expand;
  1010. free(old_peek_buffer);
  1011. }
  1012. }
  1013. if (expected_size > peek_buffer->end - peek_buffer->start) {
  1014. /* fill peek buffer if this MSG_PEEK read request cannot be satisfied with data already
  1015. * present in peek buffer; note that buffer can hold expected read size at this point */
  1016. size_t left_to_read = expected_size - (peek_buffer->end - peek_buffer->start);
  1017. PAL_NUM pal_ret = DkStreamRead(pal_hdl, /*offset=*/0, left_to_read,
  1018. &peek_buffer->buf[peek_buffer->end],
  1019. uri, uri ? SOCK_URI_SIZE : 0);
  1020. if (pal_ret == PAL_STREAM_ERROR) {
  1021. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ? -ECONNABORTED : -PAL_ERRNO;
  1022. lock(&hdl->lock);
  1023. goto out_locked;
  1024. }
  1025. peek_buffer->end += pal_ret;
  1026. if (uri)
  1027. memcpy(peek_buffer->uri, uri, SOCK_URI_SIZE);
  1028. }
  1029. }
  1030. ret = 0;
  1031. bool address_received = false;
  1032. size_t total_bytes = 0;
  1033. for (int i = 0; i < nbufs; i++) {
  1034. size_t iov_bytes = 0;
  1035. if (peek_buffer) {
  1036. /* some data left to read from peek buffer */
  1037. assert(total_bytes < peek_buffer->end - peek_buffer->start);
  1038. iov_bytes = MIN(bufs[i].iov_len, peek_buffer->end - peek_buffer->start - total_bytes);
  1039. memcpy(bufs[i].iov_base, &peek_buffer->buf[peek_buffer->start + total_bytes], iov_bytes);
  1040. uri = peek_buffer->uri;
  1041. } else {
  1042. PAL_NUM pal_ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base, uri, uri ? SOCK_URI_SIZE : 0);
  1043. if (pal_ret == PAL_STREAM_ERROR) {
  1044. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ? -ECONNABORTED : -PAL_ERRNO;
  1045. break;
  1046. }
  1047. iov_bytes = pal_ret;
  1048. }
  1049. total_bytes += iov_bytes;
  1050. if (addr && !address_received) {
  1051. if (sock->domain == AF_UNIX) {
  1052. unix_copy_addr(addr, sock->addr.un.dentry);
  1053. *addrlen = sizeof(struct sockaddr_un);
  1054. }
  1055. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  1056. if (uri) {
  1057. struct addr_inet conn;
  1058. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri, &conn, NULL)) < 0) {
  1059. lock(&hdl->lock);
  1060. goto out_locked;
  1061. }
  1062. debug("last packet received from %s\n", uri);
  1063. inet_rebase_port(true, sock->domain, &conn, false);
  1064. inet_copy_addr(sock->domain, addr, &conn);
  1065. } else {
  1066. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  1067. }
  1068. *addrlen = (sock->domain == AF_INET) ? sizeof(struct sockaddr_in)
  1069. : sizeof(struct sockaddr_in6);
  1070. }
  1071. address_received = true;
  1072. }
  1073. /* gap in iovecs is not allowed, return a partial read to user; it is the responsibility of
  1074. * user application to deal with partial reads */
  1075. if (iov_bytes < bufs[i].iov_len)
  1076. break;
  1077. /* we read from peek_buffer and exhausted it, return a partial read to user; it is the
  1078. * responsibility of user application to deal with partial reads */
  1079. if (peek_buffer && total_bytes == peek_buffer->end - peek_buffer->start)
  1080. break;
  1081. }
  1082. if (total_bytes)
  1083. ret = total_bytes;
  1084. if (ret < 0) {
  1085. lock(&hdl->lock);
  1086. goto out_locked;
  1087. }
  1088. if (!(flags & MSG_PEEK) && peek_buffer) {
  1089. /* we read from peek buffer without MSG_PEEK, need to "remove" this read data */
  1090. peek_buffer->start += total_bytes;
  1091. if (peek_buffer->start == peek_buffer->end) {
  1092. /* we may have exhausted peek buffer, free it to not leak memory */
  1093. free(peek_buffer);
  1094. peek_buffer = NULL;
  1095. }
  1096. }
  1097. if (peek_buffer) {
  1098. /* there is non-exhausted peek buffer for this socket, update socket's data */
  1099. lock(&hdl->lock);
  1100. /* we assume it is impossible for other thread to update this socket's peek buffer (i.e.,
  1101. * only single thread works on a particular socket); if some real-world program actually has
  1102. * two threads working on one socket, then we need to fix "grab the lock twice" logic */
  1103. assert(!sock->peek_buffer);
  1104. sock->peek_buffer = peek_buffer;
  1105. unlock(&hdl->lock);
  1106. }
  1107. goto out;
  1108. out_locked:
  1109. if (ret < 0)
  1110. sock->error = -ret;
  1111. unlock(&hdl->lock);
  1112. free(peek_buffer);
  1113. out:
  1114. put_handle(hdl);
  1115. return ret;
  1116. }
  1117. ssize_t shim_do_recvfrom(int sockfd, void* buf, size_t len, int flags, struct sockaddr* addr,
  1118. socklen_t* addrlen) {
  1119. struct iovec iovbuf;
  1120. iovbuf.iov_base = (void*)buf;
  1121. iovbuf.iov_len = len;
  1122. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  1123. }
  1124. ssize_t shim_do_recvmsg(int sockfd, struct msghdr* msg, int flags) {
  1125. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags, msg->msg_name,
  1126. &msg->msg_namelen);
  1127. }
  1128. ssize_t shim_do_recvmmsg(int sockfd, struct mmsghdr* msg, size_t vlen, int flags,
  1129. struct __kernel_timespec* timeout) {
  1130. ssize_t total = 0;
  1131. // Issue # 753 - https://github.com/oscarlab/graphene/issues/753
  1132. /* TODO(donporter): timeout properly. For now, explicitly return an error. */
  1133. if (timeout) {
  1134. debug("recvmmsg(): timeout parameter unsupported.\n");
  1135. return -EOPNOTSUPP;
  1136. }
  1137. for (size_t i = 0; i * sizeof(struct mmsghdr) < vlen; i++) {
  1138. struct msghdr* m = &msg[i].msg_hdr;
  1139. ssize_t bytes =
  1140. do_recvmsg(sockfd, m->msg_iov, m->msg_iovlen, flags, m->msg_name, &m->msg_namelen);
  1141. if (bytes < 0)
  1142. return total > 0 ? total : bytes;
  1143. msg[i].msg_len = bytes;
  1144. total++;
  1145. }
  1146. return total;
  1147. }
  1148. #define SHUT_RD 0
  1149. #define SHUT_WR 1
  1150. #define SHUT_RDWR 2
  1151. int shim_do_shutdown(int sockfd, int how) {
  1152. struct shim_handle* hdl = get_fd_handle(sockfd, NULL, NULL);
  1153. if (!hdl)
  1154. return -EBADF;
  1155. int ret = 0;
  1156. struct shim_sock_handle* sock = &hdl->info.sock;
  1157. if (hdl->type != TYPE_SOCK) {
  1158. ret = -ENOTSOCK;
  1159. goto out;
  1160. }
  1161. lock(&hdl->lock);
  1162. if (sock->sock_state != SOCK_LISTENED && sock->sock_state != SOCK_ACCEPTED &&
  1163. sock->sock_state != SOCK_CONNECTED && sock->sock_state != SOCK_BOUNDCONNECTED) {
  1164. ret = -ENOTCONN;
  1165. goto out_locked;
  1166. }
  1167. switch (how) {
  1168. case SHUT_RD:
  1169. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  1170. hdl->acc_mode &= ~MAY_READ;
  1171. break;
  1172. case SHUT_WR:
  1173. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  1174. hdl->acc_mode &= ~MAY_WRITE;
  1175. break;
  1176. case SHUT_RDWR:
  1177. DkStreamDelete(hdl->pal_handle, 0);
  1178. hdl->acc_mode = 0;
  1179. sock->sock_state = SOCK_SHUTDOWN;
  1180. break;
  1181. }
  1182. ret = 0;
  1183. out_locked:
  1184. if (ret < 0)
  1185. sock->error = -ret;
  1186. unlock(&hdl->lock);
  1187. out:
  1188. put_handle(hdl);
  1189. return ret;
  1190. }
  1191. int shim_do_getsockname(int sockfd, struct sockaddr* addr, int* addrlen) {
  1192. if (!addr || !addrlen)
  1193. return -EFAULT;
  1194. if (*addrlen <= 0)
  1195. return -EINVAL;
  1196. if (test_user_memory(addr, *addrlen, true))
  1197. return -EFAULT;
  1198. struct shim_handle* hdl = get_fd_handle(sockfd, NULL, NULL);
  1199. if (!hdl)
  1200. return -EBADF;
  1201. int ret = -EINVAL;
  1202. if (hdl->type != TYPE_SOCK) {
  1203. ret = -ENOTSOCK;
  1204. goto out;
  1205. }
  1206. struct shim_sock_handle* sock = &hdl->info.sock;
  1207. lock(&hdl->lock);
  1208. struct sockaddr saddr;
  1209. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1210. if (len < *addrlen)
  1211. len = *addrlen;
  1212. memcpy(addr, &saddr, len);
  1213. *addrlen = len;
  1214. ret = 0;
  1215. unlock(&hdl->lock);
  1216. out:
  1217. put_handle(hdl);
  1218. return ret;
  1219. }
  1220. int shim_do_getpeername(int sockfd, struct sockaddr* addr, int* addrlen) {
  1221. if (!addr || !addrlen)
  1222. return -EFAULT;
  1223. if (*addrlen <= 0)
  1224. return -EINVAL;
  1225. if (test_user_memory(addr, *addrlen, true))
  1226. return -EFAULT;
  1227. struct shim_handle* hdl = get_fd_handle(sockfd, NULL, NULL);
  1228. if (!hdl)
  1229. return -EBADF;
  1230. int ret = -EINVAL;
  1231. if (hdl->type != TYPE_SOCK) {
  1232. ret = -ENOTSOCK;
  1233. goto out;
  1234. }
  1235. struct shim_sock_handle* sock = &hdl->info.sock;
  1236. lock(&hdl->lock);
  1237. /* Data gram sock need not be conneted or bound at all */
  1238. if (sock->sock_type == SOCK_STREAM && sock->sock_state != SOCK_CONNECTED &&
  1239. sock->sock_state != SOCK_BOUNDCONNECTED && sock->sock_state != SOCK_ACCEPTED) {
  1240. ret = -ENOTCONN;
  1241. goto out_locked;
  1242. }
  1243. if (sock->sock_type == SOCK_DGRAM && sock->sock_state != SOCK_CONNECTED &&
  1244. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1245. ret = -ENOTCONN;
  1246. goto out_locked;
  1247. }
  1248. struct sockaddr saddr;
  1249. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.conn);
  1250. if (len < *addrlen)
  1251. len = *addrlen;
  1252. memcpy(addr, &saddr, len);
  1253. *addrlen = len;
  1254. ret = 0;
  1255. out_locked:
  1256. unlock(&hdl->lock);
  1257. out:
  1258. put_handle(hdl);
  1259. return ret;
  1260. }
  1261. struct __kernel_linger {
  1262. int l_onoff;
  1263. int l_linger;
  1264. };
  1265. static void __populate_addr_with_defaults(PAL_STREAM_ATTR* attr) {
  1266. /* Linux default recv/send buffer sizes for new sockets */
  1267. attr->socket.receivebuf = 212992;
  1268. attr->socket.sendbuf = 212992;
  1269. attr->socket.linger = 0;
  1270. attr->socket.receivetimeout = 0;
  1271. attr->socket.sendtimeout = 0;
  1272. attr->socket.tcp_cork = PAL_FALSE;
  1273. attr->socket.tcp_keepalive = PAL_FALSE;
  1274. attr->socket.tcp_nodelay = PAL_FALSE;
  1275. }
  1276. static bool __update_attr(PAL_STREAM_ATTR* attr, int level, int optname, char* optval) {
  1277. assert(attr);
  1278. bool need_set_attr = false;
  1279. int intval = *((int*)optval);
  1280. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1281. if (level == SOL_SOCKET) {
  1282. switch (optname) {
  1283. case SO_KEEPALIVE:
  1284. if (bolval != attr->socket.tcp_keepalive) {
  1285. attr->socket.tcp_keepalive = bolval;
  1286. need_set_attr = true;
  1287. }
  1288. break;
  1289. case SO_LINGER: {
  1290. struct __kernel_linger* l = (struct __kernel_linger*)optval;
  1291. int linger = l->l_onoff ? l->l_linger : 0;
  1292. if (linger != (int)attr->socket.linger) {
  1293. attr->socket.linger = linger;
  1294. need_set_attr = true;
  1295. }
  1296. break;
  1297. }
  1298. case SO_RCVBUF:
  1299. if (intval != (int)attr->socket.receivebuf) {
  1300. attr->socket.receivebuf = intval;
  1301. need_set_attr = true;
  1302. }
  1303. break;
  1304. case SO_SNDBUF:
  1305. if (intval != (int)attr->socket.sendbuf) {
  1306. attr->socket.sendbuf = intval;
  1307. need_set_attr = true;
  1308. }
  1309. break;
  1310. case SO_RCVTIMEO:
  1311. if (intval != (int)attr->socket.receivetimeout) {
  1312. attr->socket.receivetimeout = intval;
  1313. need_set_attr = true;
  1314. }
  1315. break;
  1316. case SO_SNDTIMEO:
  1317. if (intval != (int)attr->socket.sendtimeout) {
  1318. attr->socket.sendtimeout = intval;
  1319. need_set_attr = true;
  1320. }
  1321. break;
  1322. case SO_REUSEADDR:
  1323. /* PAL always does REUSEADDR, no need to check or update */
  1324. break;
  1325. }
  1326. }
  1327. if (level == SOL_TCP) {
  1328. switch (optname) {
  1329. case TCP_CORK:
  1330. if (bolval != attr->socket.tcp_cork) {
  1331. attr->socket.tcp_cork = bolval;
  1332. need_set_attr = true;
  1333. }
  1334. break;
  1335. case TCP_NODELAY:
  1336. if (bolval != attr->socket.tcp_nodelay) {
  1337. attr->socket.tcp_nodelay = bolval;
  1338. need_set_attr = true;
  1339. }
  1340. break;
  1341. }
  1342. }
  1343. return need_set_attr;
  1344. }
  1345. static int __do_setsockopt(struct shim_handle* hdl, int level, int optname, char* optval,
  1346. PAL_STREAM_ATTR* attr) {
  1347. if (level != SOL_SOCKET && level != SOL_TCP && level != IPPROTO_IPV6)
  1348. return -ENOPROTOOPT;
  1349. if (level == SOL_SOCKET) {
  1350. switch (optname) {
  1351. case SO_ACCEPTCONN:
  1352. case SO_DOMAIN:
  1353. case SO_ERROR:
  1354. case SO_PROTOCOL:
  1355. case SO_TYPE:
  1356. return -EPERM;
  1357. case SO_KEEPALIVE:
  1358. case SO_LINGER:
  1359. case SO_RCVBUF:
  1360. case SO_SNDBUF:
  1361. case SO_RCVTIMEO:
  1362. case SO_SNDTIMEO:
  1363. case SO_REUSEADDR:
  1364. break;
  1365. default:
  1366. return -ENOPROTOOPT;
  1367. }
  1368. }
  1369. if (level == IPPROTO_IPV6 && optname != IPV6_V6ONLY)
  1370. return -ENOPROTOOPT;
  1371. if (level == SOL_TCP && optname != TCP_CORK && optname != TCP_NODELAY)
  1372. return -ENOPROTOOPT;
  1373. PAL_STREAM_ATTR local_attr;
  1374. if (!attr) {
  1375. attr = &local_attr;
  1376. if (!DkStreamAttributesQueryByHandle(hdl->pal_handle, attr))
  1377. return -PAL_ERRNO;
  1378. }
  1379. bool need_set_attr = __update_attr(attr, level, optname, optval);
  1380. if (need_set_attr) {
  1381. if (!DkStreamAttributesSetByHandle(hdl->pal_handle, attr))
  1382. return -PAL_ERRNO;
  1383. }
  1384. return 0;
  1385. }
  1386. static int __process_pending_options(struct shim_handle* hdl) {
  1387. struct shim_sock_handle* sock = &hdl->info.sock;
  1388. if (!sock->pending_options)
  1389. return 0;
  1390. PAL_STREAM_ATTR attr;
  1391. if (!DkStreamAttributesQueryByHandle(hdl->pal_handle, &attr))
  1392. return -PAL_ERRNO;
  1393. struct shim_sock_option* o = sock->pending_options;
  1394. while (o) {
  1395. PAL_STREAM_ATTR tmp = attr;
  1396. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval, &tmp);
  1397. if (!ret)
  1398. attr = tmp;
  1399. struct shim_sock_option* next = o->next;
  1400. free(o);
  1401. o = next;
  1402. }
  1403. return 0;
  1404. }
  1405. int shim_do_setsockopt(int fd, int level, int optname, char* optval, int optlen) {
  1406. if (optlen < (int)sizeof(int))
  1407. return -EINVAL;
  1408. if (!optval || test_user_memory(optval, optlen, /*write=*/false))
  1409. return -EFAULT;
  1410. struct shim_handle* hdl = get_fd_handle(fd, NULL, NULL);
  1411. if (!hdl)
  1412. return -EBADF;
  1413. int ret = 0;
  1414. if (hdl->type != TYPE_SOCK) {
  1415. ret = -ENOTSOCK;
  1416. goto out;
  1417. }
  1418. struct shim_sock_handle* sock = &hdl->info.sock;
  1419. lock(&hdl->lock);
  1420. if (!hdl->pal_handle) {
  1421. struct shim_sock_option* o = malloc(sizeof(struct shim_sock_option) + optlen);
  1422. if (!o) {
  1423. ret = -ENOMEM;
  1424. goto out_locked;
  1425. }
  1426. struct shim_sock_option** next = &sock->pending_options;
  1427. while (*next) {
  1428. next = &(*next)->next;
  1429. }
  1430. o->next = NULL;
  1431. *next = o;
  1432. o->level = level;
  1433. o->optname = optname;
  1434. o->optlen = optlen;
  1435. memcpy(&o->optval, optval, optlen);
  1436. goto out_locked;
  1437. }
  1438. ret = __do_setsockopt(hdl, level, optname, optval, NULL);
  1439. out_locked:
  1440. unlock(&hdl->lock);
  1441. out:
  1442. put_handle(hdl);
  1443. return ret;
  1444. }
  1445. int shim_do_getsockopt(int fd, int level, int optname, char* optval, int* optlen) {
  1446. if (!optlen || test_user_memory(optlen, sizeof(*optlen), /*write=*/true))
  1447. return -EFAULT;
  1448. if (!optval || test_user_memory(optval, *optlen, /*write=*/true))
  1449. return -EFAULT;
  1450. struct shim_handle* hdl = get_fd_handle(fd, NULL, NULL);
  1451. if (!hdl)
  1452. return -EBADF;
  1453. int ret = 0;
  1454. if (hdl->type != TYPE_SOCK) {
  1455. ret = -ENOTSOCK;
  1456. goto out;
  1457. }
  1458. struct shim_sock_handle* sock = &hdl->info.sock;
  1459. lock(&hdl->lock);
  1460. int* intval = (int*)optval;
  1461. if (level != SOL_SOCKET && level != SOL_TCP && level != IPPROTO_IPV6)
  1462. goto unknown;
  1463. if (level == SOL_SOCKET) {
  1464. switch (optname) {
  1465. case SO_ACCEPTCONN:
  1466. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1467. goto out;
  1468. case SO_DOMAIN:
  1469. *intval = sock->domain;
  1470. goto out;
  1471. case SO_ERROR:
  1472. *intval = sock->error;
  1473. goto out;
  1474. case SO_PROTOCOL:
  1475. switch (sock->protocol) {
  1476. case SOCK_STREAM:
  1477. *intval = IPPROTO_SCTP;
  1478. break;
  1479. case SOCK_DGRAM:
  1480. *intval = IPPROTO_UDP;
  1481. break;
  1482. default:
  1483. goto unknown;
  1484. }
  1485. goto out;
  1486. case SO_TYPE:
  1487. *intval = sock->sock_type;
  1488. goto out;
  1489. case SO_KEEPALIVE:
  1490. case SO_LINGER:
  1491. case SO_RCVBUF:
  1492. case SO_SNDBUF:
  1493. case SO_RCVTIMEO:
  1494. case SO_SNDTIMEO:
  1495. case SO_REUSEADDR:
  1496. break;
  1497. default:
  1498. goto unknown;
  1499. }
  1500. }
  1501. if (level == SOL_TCP) {
  1502. switch (optname) {
  1503. case TCP_CORK:
  1504. case TCP_NODELAY:
  1505. break;
  1506. default:
  1507. goto unknown;
  1508. }
  1509. }
  1510. if (level == IPPROTO_IPV6) {
  1511. switch (optname) {
  1512. case IPV6_V6ONLY:
  1513. break;
  1514. default:
  1515. goto unknown;
  1516. }
  1517. }
  1518. /* at this point, we need to query PAL to get current attributes of hdl */
  1519. PAL_STREAM_ATTR attr;
  1520. if (!hdl->pal_handle) {
  1521. /* it is possible that there is no underlying PAL handle for hdl, e.g., socket() before
  1522. * bind(); in this case, augment default attrs with pending_options and skip quering PAL */
  1523. __populate_addr_with_defaults(&attr);
  1524. struct shim_sock_option* o = sock->pending_options;
  1525. while (o) {
  1526. __update_attr(&attr, o->level, o->optname, o->optval);
  1527. o = o->next;
  1528. }
  1529. } else {
  1530. /* query PAL to get current attributes */
  1531. if (!DkStreamAttributesQueryByHandle(hdl->pal_handle, &attr)) {
  1532. ret = -PAL_ERRNO;
  1533. goto out;
  1534. }
  1535. }
  1536. if (level == SOL_SOCKET) {
  1537. switch (optname) {
  1538. case SO_KEEPALIVE:
  1539. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1540. break;
  1541. case SO_LINGER: {
  1542. struct __kernel_linger* l = (struct __kernel_linger*)optval;
  1543. l->l_onoff = attr.socket.linger ? 1 : 0;
  1544. l->l_linger = attr.socket.linger;
  1545. break;
  1546. }
  1547. case SO_RCVBUF:
  1548. *intval = attr.socket.receivebuf;
  1549. break;
  1550. case SO_SNDBUF:
  1551. *intval = attr.socket.sendbuf;
  1552. break;
  1553. case SO_RCVTIMEO:
  1554. *intval = attr.socket.receivetimeout;
  1555. break;
  1556. case SO_SNDTIMEO:
  1557. *intval = attr.socket.sendtimeout;
  1558. break;
  1559. case SO_REUSEADDR:
  1560. *intval = 1;
  1561. break;
  1562. }
  1563. }
  1564. if (level == SOL_TCP) {
  1565. switch (optname) {
  1566. case TCP_CORK:
  1567. *intval = attr.socket.tcp_cork ? 1 : 0;
  1568. break;
  1569. case TCP_NODELAY:
  1570. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1571. break;
  1572. }
  1573. }
  1574. if (level == IPPROTO_IPV6) {
  1575. switch (optname) {
  1576. case IPV6_V6ONLY:
  1577. *intval = __socket_is_ipv6_v6only(hdl) ? 1 : 0;
  1578. break;
  1579. }
  1580. }
  1581. ret = 0;
  1582. out:
  1583. unlock(&hdl->lock);
  1584. put_handle(hdl);
  1585. return ret;
  1586. unknown:
  1587. ret = -ENOPROTOOPT;
  1588. goto out;
  1589. }