shim_socket.c 48 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 OSCAR lab, Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU General Public License for more details.
  13. You should have received a copy of the GNU General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/in.h>
  33. #include <linux/in6.h>
  34. #include <asm/socket.h>
  35. /*
  36. * User-settable options (used with setsockopt).
  37. */
  38. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  39. #define TCP_MAXSEG 2 /* Set maximum segment size */
  40. #define TCP_CORK 3 /* Control sending of partial frames */
  41. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  42. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  43. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  44. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  45. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  46. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  47. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  48. #define TCP_INFO 11 /* Information about this connection. */
  49. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  50. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  51. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  52. #define AF_UNSPEC 0
  53. #define SOCK_URI_SIZE 108
  54. static int rebase_on_lo __attribute_migratable = -1;
  55. static int init_port_rebase (void)
  56. {
  57. if (rebase_on_lo != -1)
  58. return 0;
  59. char cfg[CONFIG_MAX];
  60. int rebase = 0;
  61. if (!root_config ||
  62. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  63. rebase_on_lo = 0;
  64. return 0;
  65. }
  66. for (const char * p = cfg ; *p ; p++) {
  67. if (*p < '0' || *p > '9' || rebase > 32767) {
  68. rebase_on_lo = 0;
  69. return 0;
  70. }
  71. rebase = rebase * 10 + (*p - '0');
  72. }
  73. rebase_on_lo = rebase;
  74. return 0;
  75. }
  76. static int __process_pending_options (struct shim_handle * hdl);
  77. int shim_do_socket (int family, int type, int protocol)
  78. {
  79. struct shim_handle * hdl = get_new_handle();
  80. if (!hdl)
  81. return -ENOMEM;
  82. struct shim_sock_handle * sock = &hdl->info.sock;
  83. hdl->type = TYPE_SOCK;
  84. set_handle_fs(hdl, &socket_builtin_fs);
  85. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  86. hdl->acc_mode = 0;
  87. sock->domain = family;
  88. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  89. sock->protocol = protocol;
  90. int ret = -ENOSYS;
  91. switch (sock->domain) {
  92. case AF_UNIX: //Local communication
  93. case AF_INET: //IPv4 Internet protocols ip(7)
  94. case AF_INET6: //IPv6 Internet protocols
  95. break;
  96. default:
  97. debug("shim_socket: unknown socket domain %d\n",
  98. sock->domain);
  99. goto err;
  100. }
  101. switch (sock->sock_type) {
  102. case SOCK_STREAM: //TCP
  103. break;
  104. case SOCK_DGRAM: //UDP
  105. hdl->acc_mode = MAY_READ|MAY_WRITE;
  106. break;
  107. default:
  108. debug("shim_socket: unknown socket type %d\n",
  109. sock->sock_type);
  110. goto err;
  111. }
  112. sock->sock_state = SOCK_CREATED;
  113. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  114. err:
  115. put_handle(hdl);
  116. return ret;
  117. }
  118. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  119. unsigned int pipeid)
  120. {
  121. int bytes = 0;
  122. switch (state) {
  123. case SOCK_CREATED:
  124. case SOCK_BOUNDCONNECTED:
  125. case SOCK_SHUTDOWN:
  126. return -ENOTCONN;
  127. case SOCK_BOUND:
  128. case SOCK_LISTENED:
  129. case SOCK_ACCEPTED:
  130. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  131. break;
  132. case SOCK_CONNECTED:
  133. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  134. break;
  135. default:
  136. return -ENOTCONN;
  137. }
  138. return bytes == count ? -ENAMETOOLONG : bytes;
  139. }
  140. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  141. bool local)
  142. {
  143. init_port_rebase();
  144. if (rebase_on_lo) {
  145. if (domain == AF_INET) {
  146. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  147. if (!local && memcmp(ad, "\177\0\0\1", 4))
  148. return;
  149. }
  150. if (domain == AF_INET6) {
  151. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  152. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  153. return;
  154. }
  155. }
  156. if (reverse)
  157. addr->port = addr->ext_port - rebase_on_lo;
  158. else
  159. addr->ext_port = addr->port + rebase_on_lo;
  160. }
  161. static int inet_translate_addr (int domain, char * uri, int count,
  162. struct addr_inet * addr)
  163. {
  164. if (domain == AF_INET) {
  165. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  166. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  167. ad[0], ad[1], ad[2], ad[3],
  168. addr->ext_port);
  169. return bytes == count ? -ENAMETOOLONG : bytes;
  170. }
  171. if (domain == AF_INET6) {
  172. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  173. int bytes = snprintf(uri, count,
  174. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  175. __ntohs(ad[0]), __ntohs(ad[1]),
  176. __ntohs(ad[2]), __ntohs(ad[3]),
  177. __ntohs(ad[4]), __ntohs(ad[5]),
  178. __ntohs(ad[6]), __ntohs(ad[7]),
  179. addr->ext_port);
  180. return bytes == count ? -ENAMETOOLONG : bytes;
  181. }
  182. return -EPROTONOSUPPORT;
  183. }
  184. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  185. enum shim_sock_state state,
  186. struct addr_inet * bind, struct addr_inet * conn)
  187. {
  188. int bytes = 0, ret;
  189. if (sock_type == SOCK_STREAM) {
  190. switch (state) {
  191. case SOCK_CREATED:
  192. case SOCK_SHUTDOWN:
  193. return -ENOTCONN;
  194. case SOCK_BOUND:
  195. case SOCK_LISTENED:
  196. if (count < 9)
  197. return -ENAMETOOLONG;
  198. memcpy(uri, "tcp.srv:", 9);
  199. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  200. return ret < 0 ? ret : ret + 8;
  201. case SOCK_BOUNDCONNECTED:
  202. if (count < 5)
  203. return -ENAMETOOLONG;
  204. memcpy(uri, "tcp:", 5);
  205. bytes = 4;
  206. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  207. bind);
  208. if (ret < 0)
  209. return ret;
  210. uri[bytes + ret] = ':';
  211. bytes += ret + 1;
  212. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  213. conn);
  214. return ret < 0 ? ret : ret + bytes;
  215. case SOCK_CONNECTED:
  216. case SOCK_ACCEPTED:
  217. if (count < 5)
  218. return -ENAMETOOLONG;
  219. memcpy(uri, "tcp:", 5);
  220. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  221. return ret < 0 ? ret : ret + 4;
  222. }
  223. }
  224. if (sock_type == SOCK_DGRAM) {
  225. switch (state) {
  226. case SOCK_CREATED:
  227. case SOCK_SHUTDOWN:
  228. return -ENOTCONN;
  229. case SOCK_LISTENED:
  230. case SOCK_ACCEPTED:
  231. return -EOPNOTSUPP;
  232. case SOCK_BOUNDCONNECTED:
  233. if (count < 9)
  234. return -ENAMETOOLONG;
  235. memcpy(uri, "tcp.srv:", 9);
  236. bytes = 8;
  237. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  238. bind);
  239. if (ret < 0)
  240. return ret;
  241. uri[bytes + ret] = ':';
  242. bytes += ret + 1;
  243. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  244. conn);
  245. return ret < 0 ? ret : ret + bytes;
  246. case SOCK_BOUND:
  247. if (count < 9)
  248. return -ENAMETOOLONG;
  249. memcpy(uri, "udp.srv:", 9);
  250. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  251. return ret < 0 ? ret : ret + 9;
  252. case SOCK_CONNECTED:
  253. if (count < 5)
  254. return -ENAMETOOLONG;
  255. memcpy(uri, "udp:", 5);
  256. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  257. return ret < 0 ? ret : ret + 4;
  258. }
  259. }
  260. return -EPROTONOSUPPORT;
  261. }
  262. static inline void unix_copy_addr (struct sockaddr * saddr,
  263. struct shim_dentry * dent)
  264. {
  265. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  266. un->sun_family = AF_UNIX;
  267. int size;
  268. const char * path = dentry_get_path(dent, true, &size);
  269. memcpy(un->sun_path, path, size + 1);
  270. }
  271. static bool inet_check_addr (int domain, struct sockaddr * addr, int addrlen)
  272. {
  273. if (domain == AF_INET) {
  274. if (addr->sa_family != AF_INET ||
  275. addrlen != sizeof(struct sockaddr_in))
  276. return false;
  277. return true;
  278. }
  279. if (domain == AF_INET6) {
  280. if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
  281. return false;
  282. if (addrlen != ((addr->sa_family == AF_INET) ?
  283. sizeof(struct sockaddr_in) :
  284. sizeof(struct sockaddr_in6)))
  285. return false;
  286. return true;
  287. }
  288. return false;
  289. }
  290. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  291. const struct addr_inet * addr)
  292. {
  293. if (domain == AF_INET) {
  294. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  295. in->sin_family = AF_INET;
  296. in->sin_port = __htons(addr->port);
  297. in->sin_addr = addr->addr.v4;
  298. return sizeof(struct sockaddr_in);
  299. }
  300. if (domain == AF_INET6) {
  301. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  302. in6->sin6_family = AF_INET6;
  303. in6->sin6_port = __htons(addr->port);
  304. in6->sin6_addr = addr->addr.v6;
  305. return sizeof(struct sockaddr_in6);
  306. }
  307. return sizeof(struct sockaddr);
  308. }
  309. static void inet_save_addr (int domain, struct addr_inet * addr,
  310. const struct sockaddr * saddr)
  311. {
  312. if (domain == AF_INET) {
  313. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  314. addr->port = __ntohs(in->sin_port);
  315. addr->addr.v4 = in->sin_addr;
  316. return;
  317. }
  318. if (domain == AF_INET6) {
  319. if (saddr->sa_family == AF_INET) {
  320. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  321. addr->port = __ntohs(in->sin_port);
  322. ((uint32_t *) &addr->addr.v6.s6_addr)[0] = 0;
  323. ((uint32_t *) &addr->addr.v6.s6_addr)[1] = 0;
  324. ((uint32_t *) &addr->addr.v6.s6_addr)[2] = 0xffff0000;
  325. ((uint32_t *) &addr->addr.v6.s6_addr)[3] = in->sin_addr.s_addr;
  326. } else {
  327. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  328. addr->port = __ntohs(in6->sin6_port);
  329. addr->addr.v6 = in6->sin6_addr;
  330. }
  331. return;
  332. }
  333. }
  334. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  335. const struct sockaddr * saddr)
  336. {
  337. if (domain == AF_INET) {
  338. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  339. return addr->port == __ntohs(in->sin_port) &&
  340. !memcmp(&addr->addr.v4, &in->sin_addr,
  341. sizeof(struct in_addr));
  342. }
  343. if (domain == AF_INET6) {
  344. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  345. return addr->port == __ntohs(in6->sin6_port) &&
  346. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  347. sizeof(struct in6_addr));
  348. }
  349. return false;
  350. }
  351. static int create_socket_uri (struct shim_handle * hdl)
  352. {
  353. struct shim_sock_handle * sock = &hdl->info.sock;
  354. if (sock->domain == AF_UNIX) {
  355. char uri_buf[32];
  356. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  357. sock->addr.un.pipeid);
  358. if (bytes < 0)
  359. return bytes;
  360. qstrsetstr(&hdl->uri, uri_buf, bytes);
  361. return 0;
  362. }
  363. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  364. char uri_buf[SOCK_URI_SIZE];
  365. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  366. sock->sock_type, sock->sock_state,
  367. &sock->addr.in.bind, &sock->addr.in.conn);
  368. if (bytes < 0)
  369. return bytes;
  370. qstrsetstr(&hdl->uri, uri_buf, bytes);
  371. return 0;
  372. }
  373. return -EPROTONOSUPPORT;
  374. }
  375. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  376. {
  377. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  378. int ret = -EINVAL;
  379. if (!hdl)
  380. return -EBADF;
  381. if (hdl->type != TYPE_SOCK) {
  382. put_handle(hdl);
  383. return -ENOTSOCK;
  384. }
  385. struct shim_sock_handle * sock = &hdl->info.sock;
  386. lock(hdl->lock);
  387. enum shim_sock_state state = sock->sock_state;
  388. if (state != SOCK_CREATED) {
  389. debug("shim_bind: bind on a bound socket\n");
  390. goto out;
  391. }
  392. if (sock->domain == AF_UNIX) {
  393. if (addrlen != sizeof(struct sockaddr_un))
  394. goto out;
  395. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  396. char * spath = saddr->sun_path;
  397. struct shim_dentry * dent = NULL;
  398. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  399. goto out;
  400. if (dent->state & DENTRY_VALID &&
  401. !(dent->state & DENTRY_NEGATIVE)) {
  402. ret = -EADDRINUSE;
  403. goto out;
  404. }
  405. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  406. data->pipeid = dent->rel_path.hash >> 32;
  407. sock->addr.un.pipeid = data->pipeid;
  408. sock->addr.un.data = data;
  409. sock->addr.un.dentry = dent;
  410. } else if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  411. if (!inet_check_addr(sock->domain, addr, addrlen))
  412. goto out;
  413. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  414. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  415. }
  416. sock->sock_state = SOCK_BOUND;
  417. if ((ret = create_socket_uri(hdl)) < 0)
  418. goto out;
  419. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  420. 0, 0, 0,
  421. hdl->flags & O_NONBLOCK);
  422. if (!pal_hdl) {
  423. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  424. debug("bind: invalid handle returned\n");
  425. goto out;
  426. }
  427. if (sock->domain == AF_UNIX) {
  428. struct shim_dentry * dent = sock->addr.un.dentry;
  429. dent->state ^= DENTRY_NEGATIVE;
  430. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  431. dent->fs = &socket_builtin_fs;
  432. dent->data = sock->addr.un.data;
  433. }
  434. hdl->pal_handle = pal_hdl;
  435. __process_pending_options(hdl);
  436. ret = 0;
  437. out:
  438. if (ret < 0) {
  439. sock->sock_state = state;
  440. sock->error = -ret;
  441. if (sock->domain == AF_UNIX) {
  442. if (sock->addr.un.dentry)
  443. put_dentry(sock->addr.un.dentry);
  444. if (sock->addr.un.data) {
  445. free(sock->addr.un.data);
  446. sock->addr.un.data = NULL;
  447. }
  448. }
  449. }
  450. unlock(hdl->lock);
  451. put_handle(hdl);
  452. return ret;
  453. }
  454. static int inet_parse_addr (int domain, int type, const char * uri,
  455. struct addr_inet * bind,
  456. struct addr_inet * conn)
  457. {
  458. char * ip_str, * port_str, * next_str;
  459. int ip_len = 0;
  460. if (!(next_str = strchr(uri, ':')))
  461. return -EINVAL;
  462. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  463. int n = (next_str++) - uri;
  464. if (!memcmp(uri, "udp", n))
  465. prefix = UDP;
  466. else if (!memcmp(uri, "udp.srv", n))
  467. prefix = UDPSRV;
  468. else if (!memcmp(uri, "tcp", n))
  469. prefix = TCP;
  470. else if (!memcmp(uri, "tcp.srv", n))
  471. prefix = TCPSRV;
  472. else
  473. return -EINVAL;
  474. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  475. return -EINVAL;
  476. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  477. return -EINVAL;
  478. for (int round = 0 ; (ip_str = next_str) ; round++) {
  479. if (ip_str[0] == '[') {
  480. ip_str++;
  481. if (domain != AF_INET6)
  482. return -EINVAL;
  483. if (!(port_str = strchr(ip_str, ']')))
  484. return -EINVAL;
  485. ip_len = port_str - ip_str;
  486. port_str++;
  487. if (*port_str != ':')
  488. return -EINVAL;
  489. } else {
  490. if (domain != AF_INET)
  491. return -EINVAL;
  492. if (!(port_str = strchr(ip_str, ':')))
  493. return -EINVAL;
  494. ip_len = port_str - ip_str;
  495. }
  496. port_str++;
  497. next_str = strchr(port_str, ':');
  498. if (next_str)
  499. next_str++;
  500. struct addr_inet * addr = round ? conn : bind;
  501. if (domain == AF_INET) {
  502. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  503. addr->ext_port = atoi(port_str);
  504. }
  505. if (domain == AF_INET6) {
  506. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  507. addr->ext_port = atoi(port_str);
  508. }
  509. }
  510. return 0;
  511. }
  512. struct un_conn {
  513. unsigned int pipeid;
  514. unsigned char path_size;
  515. char path[];
  516. } __attribute__((packed));
  517. int shim_do_listen (int sockfd, int backlog)
  518. {
  519. if (backlog < 0)
  520. return -EINVAL;
  521. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  522. if (!hdl)
  523. return -EBADF;
  524. if (hdl->type != TYPE_SOCK) {
  525. put_handle(hdl);
  526. return -ENOTSOCK;
  527. }
  528. struct shim_sock_handle * sock = &hdl->info.sock;
  529. if (sock->sock_type != SOCK_STREAM) {
  530. debug("shim_listen: not a stream socket\n");
  531. put_handle(hdl);
  532. return -EINVAL;
  533. }
  534. lock(hdl->lock);
  535. enum shim_sock_state state = sock->sock_state;
  536. int ret = -EINVAL;
  537. if (state != SOCK_BOUND) {
  538. debug("shim_listen: listen on unbound socket\n");
  539. goto out;
  540. }
  541. hdl->acc_mode = MAY_READ;
  542. sock->sock_state = SOCK_LISTENED;
  543. ret = 0;
  544. out:
  545. if (ret < 0)
  546. sock->sock_state = state;
  547. unlock(hdl->lock);
  548. put_handle(hdl);
  549. return ret;
  550. }
  551. /* Connect with the TCP socket is always in the client.
  552. *
  553. * With UDP, the connection is make to the socket specific for a
  554. * destination. A process with a connected UDP socket can call
  555. * connect again for that socket for one of two reasons: 1. To
  556. * specify a new IP address and port 2. To unconnect the socket.
  557. */
  558. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  559. {
  560. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  561. if (!hdl)
  562. return -EBADF;
  563. if (hdl->type != TYPE_SOCK) {
  564. put_handle(hdl);
  565. return -ENOTSOCK;
  566. }
  567. struct shim_sock_handle * sock = &hdl->info.sock;
  568. lock(hdl->lock);
  569. enum shim_sock_state state = sock->sock_state;
  570. int ret = -EINVAL;
  571. if (state == SOCK_CONNECTED) {
  572. if (addr->sa_family == AF_UNSPEC) {
  573. sock->sock_state = SOCK_CREATED;
  574. if (sock->sock_type == SOCK_STREAM && hdl->pal_handle) {
  575. DkStreamDelete(hdl->pal_handle, 0);
  576. DkObjectClose(hdl->pal_handle);
  577. hdl->pal_handle = NULL;
  578. }
  579. debug("shim_connect: reconnect on a stream socket\n");
  580. ret = 0;
  581. goto out;
  582. }
  583. debug("shim_connect: reconnect on a stream socket\n");
  584. goto out;
  585. }
  586. if (state != SOCK_BOUND &&
  587. state != SOCK_CREATED) {
  588. debug("shim_connect: connect on invalid socket\n");
  589. goto out;
  590. }
  591. if (sock->domain == AF_UNIX) {
  592. if (addrlen != sizeof(struct sockaddr_un))
  593. goto out;
  594. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  595. char * spath = saddr->sun_path;
  596. struct shim_dentry * dent;
  597. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent)) < 0)
  598. goto out;
  599. struct shim_unix_data * data = dent->data;
  600. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  601. data = malloc(sizeof(struct shim_unix_data));
  602. data->pipeid = dent->rel_path.hash >> 32;
  603. } else if (dent->fs != &socket_builtin_fs) {
  604. ret = -ECONNREFUSED;
  605. goto out;
  606. }
  607. sock->addr.un.pipeid = data->pipeid;
  608. sock->addr.un.data = data;
  609. sock->addr.un.dentry = dent;
  610. get_dentry(dent);
  611. }
  612. if (state == SOCK_BOUND) {
  613. /* if the socket is bound, the stream needs to be shut and rebound. */
  614. assert(hdl->pal_handle);
  615. DkStreamDelete(hdl->pal_handle, 0);
  616. DkObjectClose(hdl->pal_handle);
  617. hdl->pal_handle = NULL;
  618. }
  619. if (sock->domain != AF_UNIX) {
  620. if (!inet_check_addr(sock->domain, addr, addrlen))
  621. goto out;
  622. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  623. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  624. }
  625. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  626. SOCK_CONNECTED;
  627. if ((ret = create_socket_uri(hdl)) < 0)
  628. goto out;
  629. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  630. 0, 0, 0,
  631. hdl->flags & O_NONBLOCK);
  632. if (!pal_hdl) {
  633. ret = -PAL_ERRNO;
  634. goto out;
  635. }
  636. hdl->pal_handle = pal_hdl;
  637. if (sock->domain == AF_UNIX) {
  638. struct shim_dentry * dent = sock->addr.un.dentry;
  639. lock(dent->lock);
  640. dent->state ^= DENTRY_NEGATIVE;
  641. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  642. dent->fs = &socket_builtin_fs;
  643. dent->data = sock->addr.un.data;
  644. unlock(dent->lock);
  645. }
  646. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  647. char uri[SOCK_URI_SIZE];
  648. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  649. ret = -PAL_ERRNO;
  650. goto out;
  651. }
  652. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  653. &sock->addr.in.bind,
  654. &sock->addr.in.conn)) < 0)
  655. goto out;
  656. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  657. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  658. }
  659. hdl->acc_mode = MAY_READ|MAY_WRITE;
  660. __process_pending_options(hdl);
  661. ret = 0;
  662. out:
  663. if (ret < 0) {
  664. sock->sock_state = state;
  665. sock->error = -ret;
  666. if (sock->domain == AF_UNIX) {
  667. if (sock->addr.un.dentry)
  668. put_dentry(sock->addr.un.dentry);
  669. if (sock->addr.un.data) {
  670. free(sock->addr.un.data);
  671. sock->addr.un.data = NULL;
  672. }
  673. }
  674. }
  675. unlock(hdl->lock);
  676. put_handle(hdl);
  677. return ret;
  678. }
  679. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  680. socklen_t * addrlen)
  681. {
  682. if (hdl->type != TYPE_SOCK)
  683. return -ENOTSOCK;
  684. struct shim_sock_handle * sock = &hdl->info.sock;
  685. int ret;
  686. PAL_HANDLE accepted = NULL;
  687. if (sock->sock_type != SOCK_STREAM) {
  688. debug("shim_listen: not a stream socket\n");
  689. return -EINVAL;
  690. }
  691. lock(hdl->lock);
  692. if (sock->sock_state != SOCK_LISTENED) {
  693. debug("shim_accpet: invalid socket\n");
  694. ret = -EINVAL;
  695. goto out;
  696. }
  697. accepted = DkStreamWaitForClient(hdl->pal_handle);
  698. if (!accepted) {
  699. ret = -PAL_ERRNO;
  700. goto out;
  701. }
  702. if (flags & O_NONBLOCK) {
  703. PAL_STREAM_ATTR attr;
  704. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  705. ret = -PAL_ERRNO;
  706. goto out;
  707. }
  708. attr.nonblocking = PAL_TRUE;
  709. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  710. ret = -PAL_ERRNO;
  711. goto out;
  712. }
  713. }
  714. struct shim_handle * cli = get_new_handle();
  715. if (!cli) {
  716. ret = -ENOMEM;
  717. goto out;
  718. }
  719. struct shim_sock_handle * cli_sock = &cli->info.sock;
  720. cli->type = TYPE_SOCK;
  721. set_handle_fs(cli, &socket_builtin_fs);
  722. cli->acc_mode = MAY_READ|MAY_WRITE;
  723. cli->flags = O_RDWR|flags;
  724. cli->pal_handle = accepted;
  725. cli_sock->domain = sock->domain;
  726. cli_sock->sock_type = sock->sock_type;
  727. cli_sock->protocol = sock->protocol;
  728. cli_sock->sock_state = SOCK_ACCEPTED;
  729. if (sock->domain == AF_UNIX) {
  730. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  731. if (sock->addr.un.dentry) {
  732. get_dentry(sock->addr.un.dentry);
  733. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  734. }
  735. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  736. if (addr) {
  737. unix_copy_addr(addr, sock->addr.un.dentry);
  738. if (addrlen)
  739. *addrlen = sizeof(struct sockaddr_un);
  740. }
  741. }
  742. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  743. char uri[SOCK_URI_SIZE];
  744. int uri_len;
  745. if (!(uri_len = DkStreamGetName(accepted, uri, SOCK_URI_SIZE))) {
  746. ret = -PAL_ERRNO;
  747. out_hdl:
  748. DkObjectClose(accepted);
  749. goto out_cli;
  750. }
  751. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  752. &cli_sock->addr.in.bind,
  753. &cli_sock->addr.in.conn)) < 0)
  754. goto out_hdl;
  755. qstrsetstr(&cli->uri, uri, uri_len);
  756. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  757. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  758. if (addr) {
  759. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  760. if (addrlen)
  761. *addrlen = (sock->domain == AF_INET) ?
  762. sizeof(struct sockaddr_in) :
  763. sizeof(struct sockaddr_in6);
  764. }
  765. }
  766. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  767. out_cli:
  768. put_handle(cli);
  769. out:
  770. if (ret < 0)
  771. sock->error = -ret;
  772. unlock(hdl->lock);
  773. return ret;
  774. }
  775. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  776. {
  777. int flags;
  778. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  779. if (!hdl)
  780. return -EBADF;
  781. int ret = __do_accept(hdl, flags & O_CLOEXEC,
  782. addr, addrlen);
  783. put_handle(hdl);
  784. return ret;
  785. }
  786. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  787. int flags)
  788. {
  789. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  790. if (!hdl)
  791. return -EBADF;
  792. int ret = __do_accept(hdl,
  793. (flags & SOCK_CLOEXEC ? O_CLOEXEC : 0) |
  794. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  795. addr, addrlen);
  796. put_handle(hdl);
  797. return ret;
  798. }
  799. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  800. const struct sockaddr * addr, socklen_t addrlen)
  801. {
  802. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  803. if (!hdl)
  804. return -EBADF;
  805. int ret = -EINVAL;
  806. if (hdl->type != TYPE_SOCK) {
  807. ret = -ENOTSOCK;
  808. goto out;
  809. }
  810. struct shim_sock_handle * sock = &hdl->info.sock;
  811. lock(hdl->lock);
  812. PAL_HANDLE pal_hdl = hdl->pal_handle;
  813. char * uri = NULL;
  814. /* Data gram sock need not be conneted or bound at all */
  815. if (sock->sock_type == SOCK_STREAM &&
  816. sock->sock_state != SOCK_CONNECTED &&
  817. sock->sock_state != SOCK_BOUNDCONNECTED &&
  818. sock->sock_state != SOCK_ACCEPTED) {
  819. ret = -ENOTCONN;
  820. goto out_locked;
  821. }
  822. if (sock->sock_type == SOCK_DGRAM &&
  823. sock->sock_state == SOCK_SHUTDOWN) {
  824. ret = -ENOTCONN;
  825. goto out_locked;
  826. }
  827. if (!(hdl->acc_mode & MAY_WRITE)) {
  828. ret = -ECONNRESET;
  829. goto out_locked;
  830. }
  831. if (sock->sock_type == SOCK_DGRAM &&
  832. sock->sock_state != SOCK_BOUNDCONNECTED &&
  833. sock->sock_state != SOCK_CONNECTED) {
  834. if (!addr) {
  835. ret = -EDESTADDRREQ;
  836. goto out_locked;
  837. }
  838. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  839. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  840. hdl->flags & O_NONBLOCK);
  841. if (!pal_hdl) {
  842. ret = -PAL_ERRNO;
  843. goto out_locked;
  844. }
  845. hdl->pal_handle = pal_hdl;
  846. }
  847. if (addr && addr->sa_family != sock->domain) {
  848. ret = -EINVAL;
  849. goto out_locked;
  850. }
  851. uri = __alloca(SOCK_URI_SIZE);
  852. }
  853. unlock(hdl->lock);
  854. if (uri) {
  855. struct addr_inet addr_buf;
  856. inet_save_addr(sock->domain, &addr_buf, addr);
  857. inet_rebase_port(false, sock->domain, &addr_buf, false);
  858. memcpy(uri, "udp:", 5);
  859. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  860. &addr_buf)) < 0) {
  861. lock(hdl->lock);
  862. goto out_locked;
  863. }
  864. debug("next packet send to %s\n", uri);
  865. }
  866. int bytes = 0;
  867. ret = 0;
  868. for (int i = 0 ; i < nbufs ; i++) {
  869. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  870. uri);
  871. if (!ret) {
  872. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  873. - ECONNABORTED : -PAL_ERRNO;
  874. break;
  875. }
  876. bytes += ret;
  877. }
  878. if (bytes)
  879. ret = bytes;
  880. if (ret < 0) {
  881. lock(hdl->lock);
  882. goto out_locked;
  883. }
  884. goto out;
  885. out_locked:
  886. if (ret < 0)
  887. sock->error = -ret;
  888. unlock(hdl->lock);
  889. out:
  890. put_handle(hdl);
  891. return ret;
  892. }
  893. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  894. const struct sockaddr * addr, socklen_t addrlen)
  895. {
  896. struct iovec iovbuf;
  897. iovbuf.iov_base = (void *) buf;
  898. iovbuf.iov_len = len;
  899. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  900. }
  901. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  902. {
  903. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  904. msg->msg_name, msg->msg_namelen);
  905. }
  906. int shim_do_sendmmsg (int sockfd, struct mmsghdr * msg, int vlen, int flags)
  907. {
  908. int i, total = 0;
  909. for (i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  910. struct msghdr * m = &msg[i].msg_hdr;
  911. int bytes = do_sendmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  912. m->msg_name, m->msg_namelen);
  913. if (bytes < 0)
  914. return total ? : bytes;
  915. msg[i].msg_len = bytes;
  916. total++;
  917. }
  918. return total;
  919. }
  920. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  921. struct sockaddr * addr, socklen_t * addrlen)
  922. {
  923. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  924. if (!hdl)
  925. return -EBADF;
  926. int ret = 0;
  927. if (hdl->type != TYPE_SOCK) {
  928. ret = -ENOTSOCK;
  929. goto out;
  930. }
  931. struct shim_sock_handle * sock = &hdl->info.sock;
  932. lock(hdl->lock);
  933. PAL_HANDLE pal_hdl = hdl->pal_handle;
  934. char * uri = NULL;
  935. if (sock->sock_type == SOCK_STREAM &&
  936. sock->sock_state != SOCK_CONNECTED &&
  937. sock->sock_state != SOCK_BOUNDCONNECTED &&
  938. sock->sock_state != SOCK_ACCEPTED) {
  939. ret = -ENOTCONN;
  940. goto out_locked;
  941. }
  942. if (!(hdl->acc_mode & MAY_READ)) {
  943. ret = 0;
  944. goto out_locked;
  945. }
  946. if (addr && sock->sock_type == SOCK_DGRAM &&
  947. sock->sock_state != SOCK_CONNECTED &&
  948. sock->sock_state != SOCK_BOUNDCONNECTED) {
  949. if (sock->sock_state == SOCK_CREATED) {
  950. ret = -EINVAL;
  951. goto out_locked;
  952. }
  953. uri = __alloca(SOCK_URI_SIZE);
  954. }
  955. unlock(hdl->lock);
  956. bool address_received = false;
  957. int bytes = 0;
  958. ret = 0;
  959. for (int i = 0 ; i < nbufs ; i++) {
  960. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  961. uri, uri ? SOCK_URI_SIZE : 0);
  962. if (!ret) {
  963. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  964. - ECONNABORTED : -PAL_ERRNO;
  965. break;
  966. }
  967. bytes += ret;
  968. if (!addr || !bytes || address_received)
  969. continue;
  970. if (sock->domain == AF_UNIX) {
  971. unix_copy_addr(addr, sock->addr.un.dentry);
  972. *addrlen = sizeof(struct sockaddr_un);
  973. }
  974. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  975. if (uri) {
  976. struct addr_inet conn;
  977. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  978. &conn, NULL)) < 0) {
  979. lock(hdl->lock);
  980. goto out_locked;
  981. }
  982. debug("last packet received from %s\n", uri);
  983. inet_rebase_port(true, sock->domain, &conn, false);
  984. inet_copy_addr(sock->domain, addr, &conn);
  985. } else {
  986. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  987. }
  988. *addrlen = (sock->domain == AF_INET) ?
  989. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  990. }
  991. address_received = false;
  992. }
  993. if (bytes)
  994. ret = bytes;
  995. if (ret < 0) {
  996. lock(hdl->lock);
  997. goto out_locked;
  998. }
  999. goto out;
  1000. out_locked:
  1001. if (ret < 0)
  1002. sock->error = -ret;
  1003. unlock(hdl->lock);
  1004. out:
  1005. put_handle(hdl);
  1006. return ret;
  1007. }
  1008. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  1009. struct sockaddr * addr, socklen_t * addrlen)
  1010. {
  1011. struct iovec iovbuf;
  1012. iovbuf.iov_base = (void *) buf;
  1013. iovbuf.iov_len = len;
  1014. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  1015. }
  1016. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  1017. {
  1018. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  1019. msg->msg_name, &msg->msg_namelen);
  1020. }
  1021. int shim_do_recvmmsg (int sockfd, struct mmsghdr * msg, int vlen, int flags,
  1022. struct __kernel_timespec * timeout)
  1023. {
  1024. int i, total = 0;
  1025. for (i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  1026. struct msghdr * m = &msg[i].msg_hdr;
  1027. int bytes = do_recvmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  1028. m->msg_name, &m->msg_namelen);
  1029. if (bytes < 0)
  1030. return total ? : bytes;
  1031. msg[i].msg_len = bytes;
  1032. total++;
  1033. }
  1034. return total;
  1035. }
  1036. #define SHUT_RD 0
  1037. #define SHUT_WR 1
  1038. #define SHUT_RDWR 2
  1039. int shim_do_shutdown (int sockfd, int how)
  1040. {
  1041. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1042. if (!hdl)
  1043. return -EBADF;
  1044. int ret = 0;
  1045. struct shim_sock_handle * sock = &hdl->info.sock;
  1046. if (hdl->type != TYPE_SOCK) {
  1047. ret = -ENOTSOCK;
  1048. goto out;
  1049. }
  1050. lock(hdl->lock);
  1051. if (sock->sock_state != SOCK_LISTENED &&
  1052. sock->sock_state != SOCK_ACCEPTED &&
  1053. sock->sock_state != SOCK_CONNECTED &&
  1054. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1055. ret = -ENOTCONN;
  1056. goto out_locked;
  1057. }
  1058. switch (how) {
  1059. case SHUT_RD:
  1060. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  1061. hdl->acc_mode &= ~MAY_READ;
  1062. break;
  1063. case SHUT_WR:
  1064. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  1065. hdl->acc_mode &= ~MAY_WRITE;
  1066. break;
  1067. case SHUT_RDWR:
  1068. DkStreamDelete(hdl->pal_handle, 0);
  1069. hdl->acc_mode = 0;
  1070. sock->sock_state = SOCK_SHUTDOWN;
  1071. break;
  1072. }
  1073. ret = 0;
  1074. out_locked:
  1075. if (ret < 0)
  1076. sock->error = -ret;
  1077. unlock(hdl->lock);
  1078. out:
  1079. put_handle(hdl);
  1080. return ret;
  1081. }
  1082. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1083. {
  1084. if (!addr || !addrlen)
  1085. return -EFAULT;
  1086. if (*addrlen <= 0)
  1087. return -EINVAL;
  1088. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1089. if (!hdl)
  1090. return -EBADF;
  1091. int ret = -EINVAL;
  1092. if (hdl->type != TYPE_SOCK) {
  1093. ret = -ENOTSOCK;
  1094. goto out;
  1095. }
  1096. struct shim_sock_handle * sock = &hdl->info.sock;
  1097. lock(hdl->lock);
  1098. struct sockaddr saddr;
  1099. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1100. if (len < *addrlen)
  1101. len = *addrlen;
  1102. memcpy(addr, &saddr, len);
  1103. *addrlen = len;
  1104. ret = 0;
  1105. unlock(hdl->lock);
  1106. out:
  1107. put_handle(hdl);
  1108. return ret;
  1109. }
  1110. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1111. {
  1112. if (!addr || !addrlen)
  1113. return -EFAULT;
  1114. if (*addrlen <= 0)
  1115. return -EINVAL;
  1116. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1117. if (!hdl)
  1118. return -EBADF;
  1119. int ret = -EINVAL;
  1120. if (hdl->type != TYPE_SOCK) {
  1121. ret = -ENOTSOCK;
  1122. goto out;
  1123. }
  1124. struct shim_sock_handle * sock = &hdl->info.sock;
  1125. lock(hdl->lock);
  1126. /* Data gram sock need not be conneted or bound at all */
  1127. if (sock->sock_type == SOCK_STREAM &&
  1128. sock->sock_state != SOCK_CONNECTED &&
  1129. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1130. sock->sock_state != SOCK_ACCEPTED) {
  1131. ret = -ENOTCONN;
  1132. goto out_locked;
  1133. }
  1134. if (sock->sock_type == SOCK_DGRAM &&
  1135. sock->sock_state != SOCK_CONNECTED &&
  1136. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1137. ret = -ENOTCONN;
  1138. goto out_locked;
  1139. }
  1140. struct sockaddr saddr;
  1141. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1142. if (len < *addrlen)
  1143. len = *addrlen;
  1144. memcpy(addr, &saddr, len);
  1145. *addrlen = len;
  1146. ret = 0;
  1147. out_locked:
  1148. unlock(hdl->lock);
  1149. out:
  1150. put_handle(hdl);
  1151. return ret;
  1152. }
  1153. struct __kernel_linger {
  1154. int l_onoff;
  1155. int l_linger;
  1156. };
  1157. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1158. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1159. {
  1160. int intval = *((int *) optval);
  1161. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1162. if (level == SOL_SOCKET) {
  1163. switch(optname) {
  1164. case SO_ACCEPTCONN:
  1165. case SO_DOMAIN:
  1166. case SO_ERROR:
  1167. case SO_PROTOCOL:
  1168. case SO_TYPE:
  1169. return -EPERM;
  1170. case SO_KEEPALIVE:
  1171. case SO_LINGER:
  1172. case SO_RCVBUF:
  1173. case SO_SNDBUF:
  1174. case SO_RCVTIMEO:
  1175. case SO_SNDTIMEO:
  1176. case SO_REUSEADDR:
  1177. goto query;
  1178. default:
  1179. goto unknown;
  1180. }
  1181. }
  1182. if (level == SOL_TCP) {
  1183. switch(optname) {
  1184. case TCP_CORK:
  1185. case TCP_NODELAY:
  1186. goto query;
  1187. default:
  1188. goto unknown;
  1189. }
  1190. }
  1191. unknown:
  1192. return -ENOPROTOOPT;
  1193. query:
  1194. if (!attr) {
  1195. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1196. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1197. return -PAL_ERRNO;
  1198. }
  1199. if (level == SOL_SOCKET) {
  1200. switch(optname) {
  1201. case SO_KEEPALIVE:
  1202. if (bolval != attr->socket.tcp_keepalive) {
  1203. attr->socket.tcp_keepalive = bolval;
  1204. goto set;
  1205. }
  1206. break;
  1207. case SO_LINGER: {
  1208. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1209. int linger = l->l_onoff ? l->l_linger : 0;
  1210. if (linger != (int) attr->socket.linger) {
  1211. attr->socket.linger = linger;
  1212. goto set;
  1213. }
  1214. break;
  1215. }
  1216. case SO_RCVBUF:
  1217. if (intval != (int) attr->socket.receivebuf) {
  1218. attr->socket.receivebuf = intval;
  1219. goto set;
  1220. }
  1221. break;
  1222. case SO_SNDBUF:
  1223. if (intval != (int) attr->socket.sendbuf) {
  1224. attr->socket.sendbuf = intval;
  1225. goto set;
  1226. }
  1227. break;
  1228. case SO_RCVTIMEO:
  1229. if (intval != (int) attr->socket.receivetimeout) {
  1230. attr->socket.receivetimeout = intval;
  1231. goto set;
  1232. }
  1233. break;
  1234. case SO_SNDTIMEO:
  1235. if (intval != (int) attr->socket.sendtimeout) {
  1236. attr->socket.sendtimeout = intval;
  1237. goto set;
  1238. }
  1239. break;
  1240. case SO_REUSEADDR:
  1241. break;
  1242. }
  1243. }
  1244. if (level == SOL_TCP) {
  1245. switch(optname) {
  1246. case TCP_CORK:
  1247. if (bolval != attr->socket.tcp_cork) {
  1248. attr->socket.tcp_cork = bolval;
  1249. goto set;
  1250. }
  1251. break;
  1252. case TCP_NODELAY:
  1253. if (bolval != attr->socket.tcp_nodelay) {
  1254. attr->socket.tcp_nodelay = bolval;
  1255. goto set;
  1256. }
  1257. break;
  1258. }
  1259. }
  1260. return 0;
  1261. set:
  1262. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1263. return -PAL_ERRNO;
  1264. return 0;
  1265. }
  1266. static int __process_pending_options (struct shim_handle * hdl)
  1267. {
  1268. struct shim_sock_handle * sock = &hdl->info.sock;
  1269. if (!sock->pending_options)
  1270. return 0;
  1271. PAL_STREAM_ATTR attr;
  1272. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1273. return -PAL_ERRNO;
  1274. struct shim_sock_option * o = sock->pending_options;
  1275. while (o) {
  1276. PAL_STREAM_ATTR tmp = attr;
  1277. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1278. o->optlen, &tmp);
  1279. if (!ret)
  1280. attr = tmp;
  1281. struct shim_sock_option * next = o->next;
  1282. free(o);
  1283. o = next;
  1284. }
  1285. return 0;
  1286. }
  1287. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1288. int optlen)
  1289. {
  1290. if (!optval)
  1291. return -EFAULT;
  1292. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1293. if (!hdl)
  1294. return -EBADF;
  1295. int ret = 0;
  1296. if (hdl->type != TYPE_SOCK) {
  1297. ret = -ENOTSOCK;
  1298. goto out;
  1299. }
  1300. struct shim_sock_handle * sock = &hdl->info.sock;
  1301. lock(hdl->lock);
  1302. if (!hdl->pal_handle) {
  1303. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1304. optlen);
  1305. if (!o) {
  1306. ret = -ENOMEM;
  1307. goto out_locked;
  1308. }
  1309. struct shim_sock_option ** next = &sock->pending_options;
  1310. while (*next)
  1311. next = &(*next)->next;
  1312. o->next = NULL;
  1313. *next = o;
  1314. o->level = level;
  1315. o->optname = optname;
  1316. o->optlen = optlen;
  1317. memcpy(&o->optval, optval, optlen);
  1318. goto out_locked;
  1319. }
  1320. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1321. out_locked:
  1322. unlock(hdl->lock);
  1323. out:
  1324. put_handle(hdl);
  1325. return ret;
  1326. }
  1327. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1328. int * optlen)
  1329. {
  1330. if (!optval || !optlen)
  1331. return -EFAULT;
  1332. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1333. if (!hdl)
  1334. return -EBADF;
  1335. int ret = 0;
  1336. if (hdl->type != TYPE_SOCK) {
  1337. ret = -ENOTSOCK;
  1338. goto out;
  1339. }
  1340. struct shim_sock_handle * sock = &hdl->info.sock;
  1341. lock(hdl->lock);
  1342. int * intval = (int *) optval;
  1343. if (level == SOL_SOCKET) {
  1344. switch(optname) {
  1345. case SO_ACCEPTCONN:
  1346. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1347. goto out;
  1348. case SO_DOMAIN:
  1349. *intval = sock->domain;
  1350. goto out;
  1351. case SO_ERROR:
  1352. *intval = sock->error;
  1353. goto out;
  1354. case SO_PROTOCOL:
  1355. switch(sock->protocol) {
  1356. case SOCK_STREAM:
  1357. *intval = IPPROTO_SCTP;
  1358. break;
  1359. case SOCK_DGRAM:
  1360. *intval = IPPROTO_UDP;
  1361. break;
  1362. default:
  1363. goto unknown;
  1364. }
  1365. goto out;
  1366. case SO_TYPE:
  1367. *intval = sock->protocol;
  1368. goto out;
  1369. case SO_KEEPALIVE:
  1370. case SO_LINGER:
  1371. case SO_RCVBUF:
  1372. case SO_SNDBUF:
  1373. case SO_RCVTIMEO:
  1374. case SO_SNDTIMEO:
  1375. case SO_REUSEADDR:
  1376. goto query;
  1377. default:
  1378. goto unknown;
  1379. }
  1380. }
  1381. if (level == SOL_TCP) {
  1382. switch(optname) {
  1383. case TCP_CORK:
  1384. case TCP_NODELAY:
  1385. goto query;
  1386. default:
  1387. goto unknown;
  1388. }
  1389. }
  1390. unknown:
  1391. ret = -ENOPROTOOPT;
  1392. goto out;
  1393. query:
  1394. {
  1395. PAL_STREAM_ATTR attr;
  1396. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1397. ret = -PAL_ERRNO;
  1398. goto out;
  1399. }
  1400. if (level == SOL_SOCKET) {
  1401. switch(optname) {
  1402. case SO_KEEPALIVE:
  1403. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1404. break;
  1405. case SO_LINGER: {
  1406. struct __kernel_linger * l =
  1407. (struct __kernel_linger *) optval;
  1408. l->l_onoff = attr.socket.linger ? 1 : 0;
  1409. l->l_linger = attr.socket.linger;
  1410. break;
  1411. }
  1412. case SO_RCVBUF:
  1413. *intval = attr.socket.receivebuf;
  1414. break;
  1415. case SO_SNDBUF:
  1416. *intval = attr.socket.sendbuf;
  1417. break;
  1418. case SO_RCVTIMEO:
  1419. *intval = attr.socket.receivetimeout;
  1420. break;
  1421. case SO_SNDTIMEO:
  1422. *intval = attr.socket.sendtimeout;
  1423. break;
  1424. case SO_REUSEADDR:
  1425. *intval = 1;
  1426. break;
  1427. }
  1428. }
  1429. if (level == SOL_TCP) {
  1430. switch(optname) {
  1431. case TCP_CORK:
  1432. *intval = attr.socket.tcp_cork ? 1 : 0;
  1433. break;
  1434. case TCP_NODELAY:
  1435. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1436. break;
  1437. }
  1438. }
  1439. }
  1440. out:
  1441. unlock(hdl->lock);
  1442. put_handle(hdl);
  1443. return ret;
  1444. }