shim_socket.c 45 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 OSCAR lab, Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/in.h>
  33. #include <linux/in6.h>
  34. #include <asm/socket.h>
  35. /*
  36. * User-settable options (used with setsockopt).
  37. */
  38. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  39. #define TCP_MAXSEG 2 /* Set maximum segment size */
  40. #define TCP_CORK 3 /* Control sending of partial frames */
  41. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  42. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  43. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  44. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  45. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  46. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  47. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  48. #define TCP_INFO 11 /* Information about this connection. */
  49. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  50. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  51. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  52. #define SOCK_URI_SIZE 108
  53. static int rebase_on_lo __attribute_migratable = -1;
  54. static int init_port_rebase (void)
  55. {
  56. if (rebase_on_lo != -1)
  57. return 0;
  58. char cfg[CONFIG_MAX];
  59. int rebase = 0;
  60. if (!root_config ||
  61. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  62. rebase_on_lo = 0;
  63. return 0;
  64. }
  65. for (const char * p = cfg ; *p ; p++) {
  66. if (*p < '0' || *p > '9' || rebase > 32767) {
  67. rebase_on_lo = 0;
  68. return 0;
  69. }
  70. rebase = rebase * 10 + (*p - '0');
  71. }
  72. rebase_on_lo = rebase;
  73. return 0;
  74. }
  75. static int __process_pending_options (struct shim_handle * hdl);
  76. int shim_do_socket (int family, int type, int protocol)
  77. {
  78. struct shim_handle * hdl = get_new_handle();
  79. if (!hdl)
  80. return -ENOMEM;
  81. struct shim_sock_handle * sock = &hdl->info.sock;
  82. hdl->type = TYPE_SOCK;
  83. set_handle_fs(hdl, &socket_builtin_fs);
  84. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  85. hdl->acc_mode = 0;
  86. sock->domain = family;
  87. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  88. sock->protocol = protocol;
  89. int ret = -ENOSYS;
  90. switch (sock->domain) {
  91. case AF_UNIX: //Local communication
  92. case AF_INET: //IPv4 Internet protocols ip(7)
  93. case AF_INET6: //IPv6 Internet protocols
  94. break;
  95. default:
  96. debug("shim_socket: unknown socket domain %d\n",
  97. sock->domain);
  98. goto err;
  99. }
  100. switch (sock->sock_type) {
  101. case SOCK_STREAM: //TCP
  102. break;
  103. case SOCK_DGRAM: //UDP
  104. hdl->acc_mode = MAY_READ|MAY_WRITE;
  105. break;
  106. default:
  107. debug("shim_socket: unknown socket type %d\n",
  108. sock->sock_type);
  109. goto err;
  110. }
  111. sock->sock_state = SOCK_CREATED;
  112. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  113. err:
  114. put_handle(hdl);
  115. return ret;
  116. }
  117. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  118. unsigned int pipeid)
  119. {
  120. int bytes = 0;
  121. switch (state) {
  122. case SOCK_CREATED:
  123. case SOCK_BOUNDCONNECTED:
  124. case SOCK_SHUTDOWN:
  125. return -ENOTCONN;
  126. case SOCK_BOUND:
  127. case SOCK_LISTENED:
  128. case SOCK_ACCEPTED:
  129. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  130. break;
  131. case SOCK_CONNECTED:
  132. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  133. break;
  134. default:
  135. return -ENOTCONN;
  136. }
  137. return bytes == count ? -ENAMETOOLONG : bytes;
  138. }
  139. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  140. bool local)
  141. {
  142. init_port_rebase();
  143. if (rebase_on_lo) {
  144. if (domain == AF_INET) {
  145. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  146. if (!local && memcmp(ad, "\177\0\0\1", 4))
  147. return;
  148. }
  149. if (domain == AF_INET6) {
  150. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  151. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  152. return;
  153. }
  154. }
  155. if (reverse)
  156. addr->port = addr->ext_port - rebase_on_lo;
  157. else
  158. addr->ext_port = addr->port + rebase_on_lo;
  159. }
  160. static int inet_translate_addr (int domain, char * uri, int count,
  161. struct addr_inet * addr)
  162. {
  163. if (domain == AF_INET) {
  164. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  165. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  166. ad[0], ad[1], ad[2], ad[3], addr->ext_port);
  167. return bytes == count ? -ENAMETOOLONG : bytes;
  168. }
  169. if (domain == AF_INET6) {
  170. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  171. int bytes = snprintf(uri, count,
  172. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  173. ad[0], ad[1], ad[2], ad[3],
  174. ad[4], ad[5], ad[6], ad[7], addr->ext_port);
  175. return bytes == count ? -ENAMETOOLONG : bytes;
  176. }
  177. return -EPROTONOSUPPORT;
  178. }
  179. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  180. enum shim_sock_state state,
  181. struct addr_inet * bind, struct addr_inet * conn)
  182. {
  183. int bytes = 0, ret;
  184. if (sock_type == SOCK_STREAM) {
  185. switch (state) {
  186. case SOCK_CREATED:
  187. case SOCK_SHUTDOWN:
  188. return -ENOTCONN;
  189. case SOCK_BOUND:
  190. case SOCK_LISTENED:
  191. if (count < 9)
  192. return -ENAMETOOLONG;
  193. memcpy(uri, "tcp.srv:", 9);
  194. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  195. return ret < 0 ? ret : ret + 8;
  196. case SOCK_BOUNDCONNECTED:
  197. if (count < 5)
  198. return -ENAMETOOLONG;
  199. memcpy(uri, "tcp:", 5);
  200. bytes = 4;
  201. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  202. bind);
  203. if (ret < 0)
  204. return ret;
  205. uri[bytes + ret] = ':';
  206. bytes += ret + 1;
  207. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  208. conn);
  209. return ret < 0 ? ret : ret + bytes;
  210. case SOCK_CONNECTED:
  211. case SOCK_ACCEPTED:
  212. if (count < 5)
  213. return -ENAMETOOLONG;
  214. memcpy(uri, "tcp:", 5);
  215. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  216. return ret < 0 ? ret : ret + 4;
  217. }
  218. }
  219. if (sock_type == SOCK_DGRAM) {
  220. switch (state) {
  221. case SOCK_CREATED:
  222. case SOCK_SHUTDOWN:
  223. return -ENOTCONN;
  224. case SOCK_LISTENED:
  225. case SOCK_ACCEPTED:
  226. return -EOPNOTSUPP;
  227. case SOCK_BOUNDCONNECTED:
  228. if (count < 9)
  229. return -ENAMETOOLONG;
  230. memcpy(uri, "tcp.srv:", 9);
  231. bytes = 8;
  232. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  233. bind);
  234. if (ret < 0)
  235. return ret;
  236. uri[bytes + ret] = ':';
  237. bytes += ret + 1;
  238. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  239. conn);
  240. return ret < 0 ? ret : ret + bytes;
  241. case SOCK_BOUND:
  242. if (count < 9)
  243. return -ENAMETOOLONG;
  244. memcpy(uri, "udp.srv:", 9);
  245. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  246. return ret < 0 ? ret : ret + 9;
  247. case SOCK_CONNECTED:
  248. if (count < 5)
  249. return -ENAMETOOLONG;
  250. memcpy(uri, "udp:", 5);
  251. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  252. return ret < 0 ? ret : ret + 4;
  253. }
  254. }
  255. return -EPROTONOSUPPORT;
  256. }
  257. static inline void unix_copy_addr (struct sockaddr * saddr,
  258. struct shim_dentry * dent)
  259. {
  260. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  261. un->sun_family = AF_UNIX;
  262. int size;
  263. const char * path = dentry_get_path(dent, true, &size);
  264. memcpy(un->sun_path, path, size + 1);
  265. }
  266. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  267. const struct addr_inet * addr)
  268. {
  269. if (domain == AF_INET) {
  270. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  271. in->sin_family = AF_INET;
  272. in->sin_port = __htons(addr->port);
  273. in->sin_addr = addr->addr.v4;
  274. return sizeof(struct sockaddr_in);
  275. }
  276. if (domain == AF_INET6) {
  277. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  278. in6->sin6_family = AF_INET6;
  279. in6->sin6_port = __htons(addr->port);
  280. in6->sin6_addr = addr->addr.v6;
  281. return sizeof(struct sockaddr_in6);
  282. }
  283. return sizeof(struct sockaddr);
  284. }
  285. static void inet_save_addr (int domain, struct addr_inet * addr,
  286. const struct sockaddr * saddr)
  287. {
  288. if (domain == AF_INET) {
  289. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  290. addr->port = __ntohs(in->sin_port);
  291. addr->addr.v4 = in->sin_addr;
  292. return;
  293. }
  294. if (domain == AF_INET6) {
  295. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  296. addr->port = __ntohs(in6->sin6_port);
  297. addr->addr.v6 = in6->sin6_addr;
  298. return;
  299. }
  300. }
  301. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  302. const struct sockaddr * saddr)
  303. {
  304. if (domain == AF_INET) {
  305. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  306. return addr->port == __ntohs(in->sin_port) &&
  307. !memcmp(&addr->addr.v4, &in->sin_addr,
  308. sizeof(struct in_addr));
  309. }
  310. if (domain == AF_INET6) {
  311. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  312. return addr->port == __ntohs(in6->sin6_port) &&
  313. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  314. sizeof(struct in6_addr));
  315. }
  316. return false;
  317. }
  318. static int create_socket_uri (struct shim_handle * hdl)
  319. {
  320. struct shim_sock_handle * sock = &hdl->info.sock;
  321. if (sock->domain == AF_UNIX) {
  322. char uri_buf[32];
  323. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  324. sock->addr.un.pipeid);
  325. if (bytes < 0)
  326. return bytes;
  327. qstrsetstr(&hdl->uri, uri_buf, bytes);
  328. return 0;
  329. }
  330. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  331. char uri_buf[SOCK_URI_SIZE];
  332. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  333. sock->sock_type, sock->sock_state,
  334. &sock->addr.in.bind, &sock->addr.in.conn);
  335. if (bytes < 0)
  336. return bytes;
  337. qstrsetstr(&hdl->uri, uri_buf, bytes);
  338. return 0;
  339. }
  340. return -EPROTONOSUPPORT;
  341. }
  342. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  343. {
  344. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  345. if (!hdl)
  346. return -EBADF;
  347. int ret = -EINVAL;
  348. if (hdl->type != TYPE_SOCK) {
  349. put_handle(hdl);
  350. return -ENOTSOCK;
  351. }
  352. struct shim_sock_handle * sock = &hdl->info.sock;
  353. lock(hdl->lock);
  354. enum shim_sock_state state = sock->sock_state;
  355. if (state != SOCK_CREATED) {
  356. debug("shim_bind: bind on a bound socket\n");
  357. goto out;
  358. }
  359. if (sock->domain == AF_UNIX) {
  360. if (addrlen != sizeof(struct sockaddr_un))
  361. goto out;
  362. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  363. char * spath = saddr->sun_path;
  364. struct shim_dentry * dent = NULL;
  365. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  366. goto out;
  367. if (dent->state & DENTRY_VALID &&
  368. !(dent->state & DENTRY_NEGATIVE)) {
  369. ret = -EADDRINUSE;
  370. goto out;
  371. }
  372. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  373. data->pipeid = dent->rel_path.hash >> 32;
  374. sock->addr.un.pipeid = data->pipeid;
  375. sock->addr.un.data = data;
  376. sock->addr.un.dentry = dent;
  377. }
  378. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  379. sizeof(struct sockaddr_in6)))
  380. goto out;
  381. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  382. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  383. sock->sock_state = SOCK_BOUND;
  384. if ((ret = create_socket_uri(hdl)) < 0)
  385. goto out;
  386. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  387. 0, 0, 0,
  388. hdl->flags & O_NONBLOCK);
  389. if (!pal_hdl) {
  390. debug("bind: invalid handle returned\n");
  391. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  392. goto out;
  393. }
  394. if (sock->domain == AF_UNIX) {
  395. struct shim_dentry * dent = sock->addr.un.dentry;
  396. dent->state ^= DENTRY_NEGATIVE;
  397. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  398. dent->fs = &socket_builtin_fs;
  399. dent->data = sock->addr.un.data;
  400. }
  401. hdl->pal_handle = pal_hdl;
  402. __process_pending_options(hdl);
  403. ret = 0;
  404. out:
  405. if (ret < 0) {
  406. sock->sock_state = state;
  407. sock->error = -ret;
  408. if (sock->domain == AF_UNIX) {
  409. if (sock->addr.un.dentry)
  410. put_dentry(sock->addr.un.dentry);
  411. if (sock->addr.un.data) {
  412. free(sock->addr.un.data);
  413. sock->addr.un.data = NULL;
  414. }
  415. }
  416. }
  417. unlock(hdl->lock);
  418. put_handle(hdl);
  419. return ret;
  420. }
  421. static int inet_parse_addr (int domain, int type, const char * uri,
  422. struct addr_inet * bind,
  423. struct addr_inet * conn)
  424. {
  425. char * ip_str, * port_str, * next_str;
  426. int ip_len = 0;
  427. if (!(next_str = strchr(uri, ':')))
  428. return -EINVAL;
  429. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  430. int n = (next_str++) - uri;
  431. if (!memcmp(uri, "udp", n))
  432. prefix = UDP;
  433. else if (!memcmp(uri, "udp.srv", n))
  434. prefix = UDPSRV;
  435. else if (!memcmp(uri, "tcp", n))
  436. prefix = TCP;
  437. else if (!memcmp(uri, "tcp.srv", n))
  438. prefix = TCPSRV;
  439. else
  440. return -EINVAL;
  441. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  442. return -EINVAL;
  443. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  444. return -EINVAL;
  445. for (int round = 0 ; (ip_str = next_str) ; round++) {
  446. if (ip_str[0] == '[') {
  447. ip_str++;
  448. if (domain != AF_INET6)
  449. return -EINVAL;
  450. if (!(port_str = strchr(ip_str, ']')))
  451. return -EINVAL;
  452. ip_len = port_str - ip_str;
  453. port_str++;
  454. if (*port_str != ':')
  455. return -EINVAL;
  456. } else {
  457. if (domain != AF_INET)
  458. return -EINVAL;
  459. if (!(port_str = strchr(ip_str, ':')))
  460. return -EINVAL;
  461. ip_len = port_str - ip_str;
  462. }
  463. port_str++;
  464. next_str = strchr(port_str, ':');
  465. if (next_str)
  466. next_str++;
  467. struct addr_inet * addr = round ? conn : bind;
  468. if (domain == AF_INET) {
  469. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  470. addr->ext_port = atoi(port_str);
  471. }
  472. if (domain == AF_INET6) {
  473. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  474. addr->ext_port = atoi(port_str);
  475. }
  476. }
  477. return 0;
  478. }
  479. struct un_conn {
  480. unsigned int pipeid;
  481. unsigned char path_size;
  482. char path[];
  483. } __attribute__((packed));
  484. int shim_do_listen (int sockfd, int backlog)
  485. {
  486. if (backlog < 0)
  487. return -EINVAL;
  488. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  489. if (!hdl)
  490. return -EBADF;
  491. if (hdl->type != TYPE_SOCK) {
  492. put_handle(hdl);
  493. return -ENOTSOCK;
  494. }
  495. struct shim_sock_handle * sock = &hdl->info.sock;
  496. if (sock->sock_type != SOCK_STREAM) {
  497. debug("shim_listen: not a stream socket\n");
  498. put_handle(hdl);
  499. return -EINVAL;
  500. }
  501. lock(hdl->lock);
  502. enum shim_sock_state state = sock->sock_state;
  503. int ret = -EINVAL;
  504. if (state != SOCK_BOUND) {
  505. debug("shim_listen: listen on unbound socket\n");
  506. goto out;
  507. }
  508. hdl->acc_mode = MAY_READ;
  509. sock->sock_state = SOCK_LISTENED;
  510. ret = 0;
  511. out:
  512. if (ret < 0)
  513. sock->sock_state = state;
  514. unlock(hdl->lock);
  515. put_handle(hdl);
  516. return ret;
  517. }
  518. /* Connect with the TCP socket is always in the client.
  519. *
  520. * With UDP, the connection is make to the socket specific for a
  521. * destination. A process with a connected UDP socket can call
  522. * connect again for that socket for one of two reasons: 1. To
  523. * specify a new IP address and port 2. To unconnect the socket.
  524. */
  525. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  526. {
  527. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  528. if (!hdl)
  529. return -EBADF;
  530. if (hdl->type != TYPE_SOCK) {
  531. put_handle(hdl);
  532. return -ENOTSOCK;
  533. }
  534. struct shim_sock_handle * sock = &hdl->info.sock;
  535. lock(hdl->lock);
  536. enum shim_sock_state state = sock->sock_state;
  537. int ret = -EINVAL;
  538. if (state == SOCK_CONNECTED) {
  539. debug("shim_connect: reconnect on a stream socket\n");
  540. goto out;
  541. }
  542. if (state != SOCK_BOUND &&
  543. state != SOCK_CREATED) {
  544. debug("shim_connect: connect on invalid socket\n");
  545. goto out;
  546. }
  547. if (sock->domain == AF_UNIX) {
  548. if (addrlen != sizeof(struct sockaddr_un))
  549. goto out;
  550. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  551. char * spath = saddr->sun_path;
  552. struct shim_dentry * dent;
  553. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  554. goto out;
  555. struct shim_unix_data * data = dent->data;
  556. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  557. data = malloc(sizeof(struct shim_unix_data));
  558. data->pipeid = dent->rel_path.hash >> 32;
  559. } else if (dent->fs != &socket_builtin_fs) {
  560. ret = -ECONNREFUSED;
  561. goto out;
  562. }
  563. sock->addr.un.pipeid = data->pipeid;
  564. sock->addr.un.data = data;
  565. sock->addr.un.dentry = dent;
  566. get_dentry(dent);
  567. }
  568. if (state == SOCK_BOUND) {
  569. /* if the socket is bound, the stream needs to be shut and rebound. */
  570. assert(hdl->pal_handle);
  571. DkStreamDelete(hdl->pal_handle, 0);
  572. DkObjectClose(hdl->pal_handle);
  573. hdl->pal_handle = NULL;
  574. }
  575. if (addrlen != ((sock->domain == AF_INET) ? sizeof(struct sockaddr_in) :
  576. sizeof(struct sockaddr_in6)))
  577. goto out;
  578. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  579. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  580. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  581. SOCK_CONNECTED;
  582. if ((ret = create_socket_uri(hdl)) < 0)
  583. goto out;
  584. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  585. 0, 0, 0,
  586. hdl->flags & O_NONBLOCK);
  587. if (!pal_hdl) {
  588. ret = -PAL_ERRNO;
  589. goto out;
  590. }
  591. hdl->pal_handle = pal_hdl;
  592. if (sock->domain == AF_UNIX) {
  593. struct shim_dentry * dent = sock->addr.un.dentry;
  594. lock(dent->lock);
  595. dent->state ^= DENTRY_NEGATIVE;
  596. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  597. dent->fs = &socket_builtin_fs;
  598. dent->data = sock->addr.un.data;
  599. unlock(dent->lock);
  600. }
  601. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  602. char uri[SOCK_URI_SIZE];
  603. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  604. ret = -PAL_ERRNO;
  605. goto out;
  606. }
  607. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  608. &sock->addr.in.bind,
  609. &sock->addr.in.conn)) < 0)
  610. goto out;
  611. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  612. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  613. }
  614. hdl->acc_mode = MAY_READ|MAY_WRITE;
  615. __process_pending_options(hdl);
  616. ret = 0;
  617. out:
  618. if (ret < 0) {
  619. sock->sock_state = state;
  620. sock->error = -ret;
  621. if (sock->domain == AF_UNIX) {
  622. if (sock->addr.un.dentry)
  623. put_dentry(sock->addr.un.dentry);
  624. if (sock->addr.un.data) {
  625. free(sock->addr.un.data);
  626. sock->addr.un.data = NULL;
  627. }
  628. }
  629. }
  630. unlock(hdl->lock);
  631. put_handle(hdl);
  632. return ret;
  633. }
  634. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  635. socklen_t * addrlen)
  636. {
  637. if (hdl->type != TYPE_SOCK)
  638. return -ENOTSOCK;
  639. struct shim_sock_handle * sock = &hdl->info.sock;
  640. int ret;
  641. PAL_HANDLE accepted = NULL;
  642. if (sock->sock_type != SOCK_STREAM) {
  643. debug("shim_listen: not a stream socket\n");
  644. return -EINVAL;
  645. }
  646. lock(hdl->lock);
  647. if (sock->sock_state != SOCK_LISTENED) {
  648. debug("shim_accpet: invalid socket\n");
  649. ret = -EINVAL;
  650. goto out;
  651. }
  652. accepted = DkStreamWaitForClient(hdl->pal_handle);
  653. if (!accepted) {
  654. ret = -PAL_ERRNO;
  655. goto out;
  656. }
  657. if (flags & O_NONBLOCK) {
  658. PAL_STREAM_ATTR attr;
  659. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  660. ret = -PAL_ERRNO;
  661. goto out;
  662. }
  663. attr.nonblocking = PAL_TRUE;
  664. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  665. ret = -PAL_ERRNO;
  666. goto out;
  667. }
  668. }
  669. struct shim_handle * cli = get_new_handle();
  670. if (!cli) {
  671. ret = -ENOMEM;
  672. goto out;
  673. }
  674. struct shim_sock_handle * cli_sock = &cli->info.sock;
  675. cli->type = TYPE_SOCK;
  676. set_handle_fs(cli, &socket_builtin_fs);
  677. cli->acc_mode = MAY_READ|MAY_WRITE;
  678. cli->flags = O_RDWR|flags;
  679. cli->pal_handle = accepted;
  680. cli_sock->domain = sock->domain;
  681. cli_sock->sock_type = sock->sock_type;
  682. cli_sock->protocol = sock->protocol;
  683. cli_sock->sock_state = SOCK_ACCEPTED;
  684. if (sock->domain == AF_UNIX) {
  685. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  686. if (sock->addr.un.dentry) {
  687. get_dentry(sock->addr.un.dentry);
  688. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  689. }
  690. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  691. if (addr) {
  692. unix_copy_addr(addr, sock->addr.un.dentry);
  693. if (addrlen)
  694. *addrlen = sizeof(struct sockaddr_un);
  695. }
  696. }
  697. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  698. char uri[SOCK_URI_SIZE];
  699. int uri_len;
  700. if (!(uri_len = DkStreamGetName(accepted, uri, SOCK_URI_SIZE))) {
  701. ret = -PAL_ERRNO;
  702. out_hdl:
  703. DkObjectClose(accepted);
  704. goto out_cli;
  705. }
  706. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  707. &cli_sock->addr.in.bind,
  708. &cli_sock->addr.in.conn)) < 0)
  709. goto out_hdl;
  710. qstrsetstr(&cli->uri, uri, uri_len);
  711. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  712. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  713. if (addr) {
  714. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  715. if (addrlen)
  716. *addrlen = (sock->domain == AF_INET) ?
  717. sizeof(struct sockaddr_in) :
  718. sizeof(struct sockaddr_in6);
  719. }
  720. }
  721. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  722. out_cli:
  723. put_handle(cli);
  724. out:
  725. if (ret < 0)
  726. sock->error = -ret;
  727. unlock(hdl->lock);
  728. return ret;
  729. }
  730. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  731. {
  732. int flags;
  733. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  734. if (!hdl)
  735. return -EBADF;
  736. int ret = __do_accept(hdl, flags & FD_CLOEXEC ? O_CLOEXEC : 0,
  737. addr, addrlen);
  738. put_handle(hdl);
  739. return ret;
  740. }
  741. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  742. int flags)
  743. {
  744. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  745. if (!hdl)
  746. return -EBADF;
  747. int ret = __do_accept(hdl,
  748. (flags & SOCK_CLOEXEC ? FD_CLOEXEC : 0) |
  749. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  750. addr, addrlen);
  751. put_handle(hdl);
  752. return ret;
  753. }
  754. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  755. const struct sockaddr * addr, socklen_t addrlen)
  756. {
  757. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  758. if (!hdl)
  759. return -EBADF;
  760. int ret = -EINVAL;
  761. if (hdl->type != TYPE_SOCK) {
  762. ret = -ENOTSOCK;
  763. goto out;
  764. }
  765. struct shim_sock_handle * sock = &hdl->info.sock;
  766. lock(hdl->lock);
  767. PAL_HANDLE pal_hdl = hdl->pal_handle;
  768. char * uri = NULL;
  769. /* Data gram sock need not be conneted or bound at all */
  770. if (sock->sock_type == SOCK_STREAM &&
  771. sock->sock_state != SOCK_CONNECTED &&
  772. sock->sock_state != SOCK_BOUNDCONNECTED &&
  773. sock->sock_state != SOCK_ACCEPTED) {
  774. ret = -ENOTCONN;
  775. goto out_locked;
  776. }
  777. if (sock->sock_type == SOCK_DGRAM &&
  778. sock->sock_state == SOCK_SHUTDOWN) {
  779. ret = -ENOTCONN;
  780. goto out_locked;
  781. }
  782. if (!(hdl->acc_mode & MAY_WRITE)) {
  783. ret = -ECONNRESET;
  784. goto out_locked;
  785. }
  786. if (sock->sock_type == SOCK_DGRAM &&
  787. sock->sock_state != SOCK_BOUNDCONNECTED &&
  788. sock->sock_state != SOCK_CONNECTED) {
  789. if (!addr) {
  790. ret = -EDESTADDRREQ;
  791. goto out_locked;
  792. }
  793. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  794. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  795. hdl->flags & O_NONBLOCK);
  796. if (!pal_hdl) {
  797. ret = -PAL_ERRNO;
  798. goto out_locked;
  799. }
  800. hdl->pal_handle = pal_hdl;
  801. }
  802. if (addr && addr->sa_family != sock->domain) {
  803. ret = -EINVAL;
  804. goto out_locked;
  805. }
  806. uri = __alloca(SOCK_URI_SIZE);
  807. }
  808. unlock(hdl->lock);
  809. if (uri) {
  810. struct addr_inet addr_buf;
  811. inet_save_addr(sock->domain, &addr_buf, addr);
  812. inet_rebase_port(false, sock->domain, &addr_buf, false);
  813. memcpy(uri, "udp:", 5);
  814. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  815. &addr_buf)) < 0) {
  816. lock(hdl->lock);
  817. goto out_locked;
  818. }
  819. debug("next packet send to %s\n", uri);
  820. }
  821. int bytes = 0;
  822. ret = 0;
  823. for (int i = 0 ; i < nbufs ; i++) {
  824. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  825. uri);
  826. if (!ret) {
  827. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  828. - ECONNABORTED : -PAL_ERRNO;
  829. break;
  830. }
  831. bytes += ret;
  832. }
  833. if (bytes)
  834. ret = bytes;
  835. if (ret < 0) {
  836. lock(hdl->lock);
  837. goto out_locked;
  838. }
  839. goto out;
  840. out_locked:
  841. if (ret < 0)
  842. sock->error = -ret;
  843. unlock(hdl->lock);
  844. out:
  845. put_handle(hdl);
  846. return ret;
  847. }
  848. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  849. const struct sockaddr * addr, socklen_t addrlen)
  850. {
  851. struct iovec iovbuf;
  852. iovbuf.iov_base = (void *) buf;
  853. iovbuf.iov_len = len;
  854. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  855. }
  856. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  857. {
  858. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  859. msg->msg_name, msg->msg_namelen);
  860. }
  861. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  862. struct sockaddr * addr, socklen_t * addrlen)
  863. {
  864. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  865. if (!hdl)
  866. return -EBADF;
  867. int ret = 0;
  868. if (hdl->type != TYPE_SOCK) {
  869. ret = -ENOTSOCK;
  870. goto out;
  871. }
  872. struct shim_sock_handle * sock = &hdl->info.sock;
  873. lock(hdl->lock);
  874. PAL_HANDLE pal_hdl = hdl->pal_handle;
  875. char * uri = NULL;
  876. if (sock->sock_type == SOCK_STREAM &&
  877. sock->sock_state != SOCK_CONNECTED &&
  878. sock->sock_state != SOCK_BOUNDCONNECTED &&
  879. sock->sock_state != SOCK_ACCEPTED) {
  880. ret = -ENOTCONN;
  881. goto out_locked;
  882. }
  883. if (!(hdl->acc_mode & MAY_READ)) {
  884. ret = 0;
  885. goto out_locked;
  886. }
  887. if (addr && sock->sock_type == SOCK_DGRAM &&
  888. sock->sock_state != SOCK_CONNECTED &&
  889. sock->sock_state != SOCK_BOUNDCONNECTED) {
  890. if (sock->sock_state == SOCK_CREATED) {
  891. ret = -EINVAL;
  892. goto out_locked;
  893. }
  894. uri = __alloca(SOCK_URI_SIZE);
  895. }
  896. unlock(hdl->lock);
  897. bool address_received = false;
  898. int bytes = 0;
  899. ret = 0;
  900. for (int i = 0 ; i < nbufs ; i++) {
  901. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  902. uri, uri ? SOCK_URI_SIZE : 0);
  903. if (!ret) {
  904. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  905. - ECONNABORTED : -PAL_ERRNO;
  906. break;
  907. }
  908. bytes += ret;
  909. if (!addr || !bytes || address_received)
  910. continue;
  911. if (sock->domain == AF_UNIX) {
  912. unix_copy_addr(addr, sock->addr.un.dentry);
  913. *addrlen = sizeof(struct sockaddr_un);
  914. }
  915. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  916. if (uri) {
  917. struct addr_inet conn;
  918. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  919. &conn, NULL)) < 0) {
  920. lock(hdl->lock);
  921. goto out_locked;
  922. }
  923. debug("last packet received from %s\n", uri);
  924. inet_rebase_port(true, sock->domain, &conn, false);
  925. inet_copy_addr(sock->domain, addr, &conn);
  926. } else {
  927. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  928. }
  929. *addrlen = (sock->domain == AF_INET) ?
  930. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  931. }
  932. address_received = false;
  933. }
  934. if (bytes)
  935. ret = bytes;
  936. if (ret < 0) {
  937. lock(hdl->lock);
  938. goto out_locked;
  939. }
  940. goto out;
  941. out_locked:
  942. if (ret < 0)
  943. sock->error = -ret;
  944. unlock(hdl->lock);
  945. out:
  946. put_handle(hdl);
  947. return ret;
  948. }
  949. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  950. struct sockaddr * addr, socklen_t * addrlen)
  951. {
  952. struct iovec iovbuf;
  953. iovbuf.iov_base = (void *) buf;
  954. iovbuf.iov_len = len;
  955. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  956. }
  957. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  958. {
  959. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  960. msg->msg_name, &msg->msg_namelen);
  961. }
  962. #define SHUT_RD 0
  963. #define SHUT_WR 1
  964. #define SHUT_RDWR 2
  965. int shim_do_shutdown (int sockfd, int how)
  966. {
  967. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  968. if (!hdl)
  969. return -EBADF;
  970. int ret = 0;
  971. struct shim_sock_handle * sock = &hdl->info.sock;
  972. if (hdl->type != TYPE_SOCK) {
  973. ret = -ENOTSOCK;
  974. goto out;
  975. }
  976. lock(hdl->lock);
  977. if (sock->sock_state != SOCK_LISTENED &&
  978. sock->sock_state != SOCK_ACCEPTED &&
  979. sock->sock_state != SOCK_CONNECTED &&
  980. sock->sock_state != SOCK_BOUNDCONNECTED) {
  981. ret = -ENOTCONN;
  982. goto out_locked;
  983. }
  984. switch (how) {
  985. case SHUT_RD:
  986. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  987. hdl->acc_mode &= ~MAY_READ;
  988. break;
  989. case SHUT_WR:
  990. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  991. hdl->acc_mode &= ~MAY_WRITE;
  992. break;
  993. case SHUT_RDWR:
  994. DkStreamDelete(hdl->pal_handle, 0);
  995. hdl->acc_mode = 0;
  996. sock->sock_state = SOCK_SHUTDOWN;
  997. break;
  998. }
  999. ret = 0;
  1000. out_locked:
  1001. if (ret < 0)
  1002. sock->error = -ret;
  1003. unlock(hdl->lock);
  1004. out:
  1005. put_handle(hdl);
  1006. return ret;
  1007. }
  1008. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1009. {
  1010. if (!addr || !addrlen)
  1011. return -EFAULT;
  1012. if (*addrlen <= 0)
  1013. return -EINVAL;
  1014. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1015. if (!hdl)
  1016. return -EBADF;
  1017. int ret = -EINVAL;
  1018. if (hdl->type != TYPE_SOCK) {
  1019. ret = -ENOTSOCK;
  1020. goto out;
  1021. }
  1022. struct shim_sock_handle * sock = &hdl->info.sock;
  1023. lock(hdl->lock);
  1024. struct sockaddr saddr;
  1025. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1026. if (len < *addrlen)
  1027. len = *addrlen;
  1028. memcpy(addr, &saddr, len);
  1029. *addrlen = len;
  1030. ret = 0;
  1031. unlock(hdl->lock);
  1032. out:
  1033. put_handle(hdl);
  1034. return ret;
  1035. }
  1036. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1037. {
  1038. if (!addr || !addrlen)
  1039. return -EFAULT;
  1040. if (*addrlen <= 0)
  1041. return -EINVAL;
  1042. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1043. if (!hdl)
  1044. return -EBADF;
  1045. int ret = -EINVAL;
  1046. if (hdl->type != TYPE_SOCK) {
  1047. ret = -ENOTSOCK;
  1048. goto out;
  1049. }
  1050. struct shim_sock_handle * sock = &hdl->info.sock;
  1051. lock(hdl->lock);
  1052. /* Data gram sock need not be conneted or bound at all */
  1053. if (sock->sock_type == SOCK_STREAM &&
  1054. sock->sock_state != SOCK_CONNECTED &&
  1055. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1056. sock->sock_state != SOCK_ACCEPTED) {
  1057. ret = -ENOTCONN;
  1058. goto out_locked;
  1059. }
  1060. if (sock->sock_type == SOCK_DGRAM &&
  1061. sock->sock_state != SOCK_CONNECTED &&
  1062. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1063. ret = -ENOTCONN;
  1064. goto out_locked;
  1065. }
  1066. struct sockaddr saddr;
  1067. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1068. if (len < *addrlen)
  1069. len = *addrlen;
  1070. memcpy(addr, &saddr, len);
  1071. *addrlen = len;
  1072. ret = 0;
  1073. out_locked:
  1074. unlock(hdl->lock);
  1075. out:
  1076. put_handle(hdl);
  1077. return ret;
  1078. }
  1079. struct __kernel_linger {
  1080. int l_onoff;
  1081. int l_linger;
  1082. };
  1083. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1084. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1085. {
  1086. int intval = *((int *) optval);
  1087. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1088. if (level == SOL_SOCKET) {
  1089. switch(optname) {
  1090. case SO_ACCEPTCONN:
  1091. case SO_DOMAIN:
  1092. case SO_ERROR:
  1093. case SO_PROTOCOL:
  1094. case SO_TYPE:
  1095. return -EPERM;
  1096. case SO_KEEPALIVE:
  1097. case SO_LINGER:
  1098. case SO_RCVBUF:
  1099. case SO_SNDBUF:
  1100. case SO_RCVTIMEO:
  1101. case SO_SNDTIMEO:
  1102. case SO_REUSEADDR:
  1103. goto query;
  1104. default:
  1105. goto unknown;
  1106. }
  1107. }
  1108. if (level == SOL_TCP) {
  1109. switch(optname) {
  1110. case TCP_CORK:
  1111. case TCP_NODELAY:
  1112. goto query;
  1113. default:
  1114. goto unknown;
  1115. }
  1116. }
  1117. unknown:
  1118. return -ENOPROTOOPT;
  1119. query:
  1120. if (!attr) {
  1121. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1122. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1123. return -PAL_ERRNO;
  1124. }
  1125. if (level == SOL_SOCKET) {
  1126. switch(optname) {
  1127. case SO_KEEPALIVE:
  1128. if (bolval != attr->socket.tcp_keepalive) {
  1129. attr->socket.tcp_keepalive = bolval;
  1130. goto set;
  1131. }
  1132. break;
  1133. case SO_LINGER: {
  1134. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1135. int linger = l->l_onoff ? l->l_linger : 0;
  1136. if (linger != (int) attr->socket.linger) {
  1137. attr->socket.linger = linger;
  1138. goto set;
  1139. }
  1140. break;
  1141. }
  1142. case SO_RCVBUF:
  1143. if (intval != (int) attr->socket.receivebuf) {
  1144. attr->socket.receivebuf = intval;
  1145. goto set;
  1146. }
  1147. break;
  1148. case SO_SNDBUF:
  1149. if (intval != (int) attr->socket.sendbuf) {
  1150. attr->socket.sendbuf = intval;
  1151. goto set;
  1152. }
  1153. break;
  1154. case SO_RCVTIMEO:
  1155. if (intval != (int) attr->socket.receivetimeout) {
  1156. attr->socket.receivetimeout = intval;
  1157. goto set;
  1158. }
  1159. break;
  1160. case SO_SNDTIMEO:
  1161. if (intval != (int) attr->socket.sendtimeout) {
  1162. attr->socket.sendtimeout = intval;
  1163. goto set;
  1164. }
  1165. break;
  1166. case SO_REUSEADDR:
  1167. break;
  1168. }
  1169. }
  1170. if (level == SOL_TCP) {
  1171. switch(optname) {
  1172. case TCP_CORK:
  1173. if (bolval != attr->socket.tcp_cork) {
  1174. attr->socket.tcp_cork = bolval;
  1175. goto set;
  1176. }
  1177. break;
  1178. case TCP_NODELAY:
  1179. if (bolval != attr->socket.tcp_nodelay) {
  1180. attr->socket.tcp_nodelay = bolval;
  1181. goto set;
  1182. }
  1183. break;
  1184. }
  1185. }
  1186. return 0;
  1187. set:
  1188. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1189. return -PAL_ERRNO;
  1190. return 0;
  1191. }
  1192. static int __process_pending_options (struct shim_handle * hdl)
  1193. {
  1194. struct shim_sock_handle * sock = &hdl->info.sock;
  1195. if (!sock->pending_options)
  1196. return 0;
  1197. PAL_STREAM_ATTR attr;
  1198. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1199. return -PAL_ERRNO;
  1200. struct shim_sock_option * o = sock->pending_options;
  1201. while (o) {
  1202. PAL_STREAM_ATTR tmp = attr;
  1203. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1204. o->optlen, &tmp);
  1205. if (!ret)
  1206. attr = tmp;
  1207. struct shim_sock_option * next = o->next;
  1208. free(o);
  1209. o = next;
  1210. }
  1211. return 0;
  1212. }
  1213. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1214. int optlen)
  1215. {
  1216. if (!optval)
  1217. return -EFAULT;
  1218. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1219. if (!hdl)
  1220. return -EBADF;
  1221. int ret = 0;
  1222. if (hdl->type != TYPE_SOCK) {
  1223. ret = -ENOTSOCK;
  1224. goto out;
  1225. }
  1226. struct shim_sock_handle * sock = &hdl->info.sock;
  1227. lock(hdl->lock);
  1228. if (!hdl->pal_handle) {
  1229. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1230. optlen);
  1231. if (!o) {
  1232. ret = -ENOMEM;
  1233. goto out_locked;
  1234. }
  1235. struct shim_sock_option ** next = &sock->pending_options;
  1236. while (*next)
  1237. next = &(*next)->next;
  1238. o->next = NULL;
  1239. *next = o;
  1240. o->level = level;
  1241. o->optname = optname;
  1242. o->optlen = optlen;
  1243. memcpy(&o->optval, optval, optlen);
  1244. goto out_locked;
  1245. }
  1246. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1247. out_locked:
  1248. unlock(hdl->lock);
  1249. out:
  1250. put_handle(hdl);
  1251. return ret;
  1252. }
  1253. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1254. int * optlen)
  1255. {
  1256. if (!optval || !optlen)
  1257. return -EFAULT;
  1258. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1259. if (!hdl)
  1260. return -EBADF;
  1261. int ret = 0;
  1262. if (hdl->type != TYPE_SOCK) {
  1263. ret = -ENOTSOCK;
  1264. goto out;
  1265. }
  1266. struct shim_sock_handle * sock = &hdl->info.sock;
  1267. lock(hdl->lock);
  1268. int * intval = (int *) optval;
  1269. if (level == SOL_SOCKET) {
  1270. switch(optname) {
  1271. case SO_ACCEPTCONN:
  1272. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1273. goto out;
  1274. case SO_DOMAIN:
  1275. *intval = sock->domain;
  1276. goto out;
  1277. case SO_ERROR:
  1278. *intval = sock->error;
  1279. goto out;
  1280. case SO_PROTOCOL:
  1281. switch(sock->protocol) {
  1282. case SOCK_STREAM:
  1283. *intval = IPPROTO_SCTP;
  1284. break;
  1285. case SOCK_DGRAM:
  1286. *intval = IPPROTO_UDP;
  1287. break;
  1288. default:
  1289. goto unknown;
  1290. }
  1291. goto out;
  1292. case SO_TYPE:
  1293. *intval = sock->protocol;
  1294. goto out;
  1295. case SO_KEEPALIVE:
  1296. case SO_LINGER:
  1297. case SO_RCVBUF:
  1298. case SO_SNDBUF:
  1299. case SO_RCVTIMEO:
  1300. case SO_SNDTIMEO:
  1301. case SO_REUSEADDR:
  1302. goto query;
  1303. default:
  1304. goto unknown;
  1305. }
  1306. }
  1307. if (level == SOL_TCP) {
  1308. switch(optname) {
  1309. case TCP_CORK:
  1310. case TCP_NODELAY:
  1311. goto query;
  1312. default:
  1313. goto unknown;
  1314. }
  1315. }
  1316. unknown:
  1317. ret = -ENOPROTOOPT;
  1318. goto out;
  1319. query:
  1320. {
  1321. PAL_STREAM_ATTR attr;
  1322. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1323. ret = -PAL_ERRNO;
  1324. goto out;
  1325. }
  1326. if (level == SOL_SOCKET) {
  1327. switch(optname) {
  1328. case SO_KEEPALIVE:
  1329. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1330. break;
  1331. case SO_LINGER: {
  1332. struct __kernel_linger * l =
  1333. (struct __kernel_linger *) optval;
  1334. l->l_onoff = attr.socket.linger ? 1 : 0;
  1335. l->l_linger = attr.socket.linger;
  1336. break;
  1337. }
  1338. case SO_RCVBUF:
  1339. *intval = attr.socket.receivebuf;
  1340. break;
  1341. case SO_SNDBUF:
  1342. *intval = attr.socket.sendbuf;
  1343. break;
  1344. case SO_RCVTIMEO:
  1345. *intval = attr.socket.receivetimeout;
  1346. break;
  1347. case SO_SNDTIMEO:
  1348. *intval = attr.socket.sendtimeout;
  1349. break;
  1350. case SO_REUSEADDR:
  1351. *intval = 1;
  1352. break;
  1353. }
  1354. }
  1355. if (level == SOL_TCP) {
  1356. switch(optname) {
  1357. case TCP_CORK:
  1358. *intval = attr.socket.tcp_cork ? 1 : 0;
  1359. break;
  1360. case TCP_NODELAY:
  1361. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1362. break;
  1363. }
  1364. }
  1365. }
  1366. out:
  1367. unlock(hdl->lock);
  1368. put_handle(hdl);
  1369. return ret;
  1370. }