shim_socket.c 51 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU Lesser General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU Lesser General Public License for more details.
  13. You should have received a copy of the GNU Lesser General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/in.h>
  33. #include <linux/in6.h>
  34. #include <asm/socket.h>
  35. /*
  36. * User-settable options (used with setsockopt).
  37. */
  38. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  39. #define TCP_MAXSEG 2 /* Set maximum segment size */
  40. #define TCP_CORK 3 /* Control sending of partial frames */
  41. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  42. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  43. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  44. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  45. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  46. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  47. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  48. #define TCP_INFO 11 /* Information about this connection. */
  49. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  50. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  51. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  52. #define AF_UNSPEC 0
  53. #define SOCK_URI_SIZE 108
  54. static int rebase_on_lo __attribute_migratable = -1;
  55. static int minimal_addrlen (int domain)
  56. {
  57. switch(domain) {
  58. case AF_INET:
  59. return sizeof(struct sockaddr_in);
  60. case AF_INET6:
  61. return sizeof(struct sockaddr_in6);
  62. default:
  63. return sizeof(struct sockaddr);
  64. }
  65. }
  66. static int init_port_rebase (void)
  67. {
  68. if (rebase_on_lo != -1)
  69. return 0;
  70. char cfg[CONFIG_MAX];
  71. int rebase = 0;
  72. if (!root_config ||
  73. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  74. rebase_on_lo = 0;
  75. return 0;
  76. }
  77. for (const char * p = cfg ; *p ; p++) {
  78. if (*p < '0' || *p > '9' || rebase > 32767) {
  79. rebase_on_lo = 0;
  80. return 0;
  81. }
  82. rebase = rebase * 10 + (*p - '0');
  83. }
  84. rebase_on_lo = rebase;
  85. return 0;
  86. }
  87. static int inet_parse_addr (int domain, int type, const char * uri,
  88. struct addr_inet * bind,
  89. struct addr_inet * conn);
  90. static int __process_pending_options (struct shim_handle * hdl);
  91. int shim_do_socket (int family, int type, int protocol)
  92. {
  93. struct shim_handle * hdl = get_new_handle();
  94. if (!hdl)
  95. return -ENOMEM;
  96. struct shim_sock_handle * sock = &hdl->info.sock;
  97. hdl->type = TYPE_SOCK;
  98. set_handle_fs(hdl, &socket_builtin_fs);
  99. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  100. hdl->acc_mode = 0;
  101. sock->domain = family;
  102. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  103. sock->protocol = protocol;
  104. int ret = -ENOSYS;
  105. switch (sock->domain) {
  106. case AF_UNIX: //Local communication
  107. case AF_INET: //IPv4 Internet protocols ip(7)
  108. case AF_INET6: //IPv6 Internet protocols
  109. break;
  110. default:
  111. debug("shim_socket: unknown socket domain %d\n",
  112. sock->domain);
  113. goto err;
  114. }
  115. switch (sock->sock_type) {
  116. case SOCK_STREAM: //TCP
  117. break;
  118. case SOCK_DGRAM: //UDP
  119. hdl->acc_mode = MAY_READ|MAY_WRITE;
  120. break;
  121. default:
  122. debug("shim_socket: unknown socket type %d\n",
  123. sock->sock_type);
  124. goto err;
  125. }
  126. sock->sock_state = SOCK_CREATED;
  127. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  128. err:
  129. put_handle(hdl);
  130. return ret;
  131. }
  132. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  133. unsigned int pipeid)
  134. {
  135. int bytes = 0;
  136. switch (state) {
  137. case SOCK_CREATED:
  138. case SOCK_BOUNDCONNECTED:
  139. case SOCK_SHUTDOWN:
  140. return -ENOTCONN;
  141. case SOCK_BOUND:
  142. case SOCK_LISTENED:
  143. case SOCK_ACCEPTED:
  144. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  145. break;
  146. case SOCK_CONNECTED:
  147. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  148. break;
  149. default:
  150. return -ENOTCONN;
  151. }
  152. return bytes == count ? -ENAMETOOLONG : bytes;
  153. }
  154. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  155. bool local)
  156. {
  157. init_port_rebase();
  158. if (rebase_on_lo) {
  159. if (domain == AF_INET) {
  160. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  161. if (!local && memcmp(ad, "\177\0\0\1", 4))
  162. return;
  163. }
  164. if (domain == AF_INET6) {
  165. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  166. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  167. return;
  168. }
  169. }
  170. if (reverse)
  171. addr->port = addr->ext_port - rebase_on_lo;
  172. else
  173. addr->ext_port = addr->port + rebase_on_lo;
  174. }
  175. static int inet_translate_addr (int domain, char * uri, int count,
  176. struct addr_inet * addr)
  177. {
  178. if (domain == AF_INET) {
  179. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  180. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  181. ad[0], ad[1], ad[2], ad[3],
  182. addr->ext_port);
  183. return bytes == count ? -ENAMETOOLONG : bytes;
  184. }
  185. if (domain == AF_INET6) {
  186. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  187. int bytes = snprintf(uri, count,
  188. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  189. __ntohs(ad[0]), __ntohs(ad[1]),
  190. __ntohs(ad[2]), __ntohs(ad[3]),
  191. __ntohs(ad[4]), __ntohs(ad[5]),
  192. __ntohs(ad[6]), __ntohs(ad[7]),
  193. addr->ext_port);
  194. return bytes == count ? -ENAMETOOLONG : bytes;
  195. }
  196. return -EPROTONOSUPPORT;
  197. }
  198. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  199. enum shim_sock_state state,
  200. struct addr_inet * bind, struct addr_inet * conn)
  201. {
  202. int bytes = 0, ret;
  203. if (sock_type == SOCK_STREAM) {
  204. switch (state) {
  205. case SOCK_CREATED:
  206. case SOCK_SHUTDOWN:
  207. return -ENOTCONN;
  208. case SOCK_BOUND:
  209. case SOCK_LISTENED:
  210. if (count < 9)
  211. return -ENAMETOOLONG;
  212. memcpy(uri, "tcp.srv:", 9);
  213. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  214. return ret < 0 ? ret : ret + 8;
  215. case SOCK_BOUNDCONNECTED:
  216. if (count < 5)
  217. return -ENAMETOOLONG;
  218. memcpy(uri, "tcp:", 5);
  219. bytes = 4;
  220. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  221. bind);
  222. if (ret < 0)
  223. return ret;
  224. uri[bytes + ret] = ':';
  225. bytes += ret + 1;
  226. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  227. conn);
  228. return ret < 0 ? ret : ret + bytes;
  229. case SOCK_CONNECTED:
  230. case SOCK_ACCEPTED:
  231. if (count < 5)
  232. return -ENAMETOOLONG;
  233. memcpy(uri, "tcp:", 5);
  234. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  235. return ret < 0 ? ret : ret + 4;
  236. }
  237. }
  238. if (sock_type == SOCK_DGRAM) {
  239. switch (state) {
  240. case SOCK_CREATED:
  241. case SOCK_SHUTDOWN:
  242. return -ENOTCONN;
  243. case SOCK_LISTENED:
  244. case SOCK_ACCEPTED:
  245. return -EOPNOTSUPP;
  246. case SOCK_BOUNDCONNECTED:
  247. if (count < 9)
  248. return -ENAMETOOLONG;
  249. memcpy(uri, "tcp.srv:", 9);
  250. bytes = 8;
  251. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  252. bind);
  253. if (ret < 0)
  254. return ret;
  255. uri[bytes + ret] = ':';
  256. bytes += ret + 1;
  257. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  258. conn);
  259. return ret < 0 ? ret : ret + bytes;
  260. case SOCK_BOUND:
  261. if (count < 9)
  262. return -ENAMETOOLONG;
  263. memcpy(uri, "udp.srv:", 9);
  264. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  265. return ret < 0 ? ret : ret + 9;
  266. case SOCK_CONNECTED:
  267. if (count < 5)
  268. return -ENAMETOOLONG;
  269. memcpy(uri, "udp:", 5);
  270. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  271. return ret < 0 ? ret : ret + 4;
  272. }
  273. }
  274. return -EPROTONOSUPPORT;
  275. }
  276. static inline void unix_copy_addr (struct sockaddr * saddr,
  277. struct shim_dentry * dent)
  278. {
  279. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  280. un->sun_family = AF_UNIX;
  281. int size;
  282. const char * path = dentry_get_path(dent, true, &size);
  283. memcpy(un->sun_path, path, size + 1);
  284. }
  285. static int inet_check_addr (int domain, struct sockaddr * addr, int addrlen)
  286. {
  287. if (domain == AF_INET) {
  288. if (addr->sa_family != AF_INET)
  289. return -EAFNOSUPPORT;
  290. if (addrlen != sizeof(struct sockaddr_in))
  291. return -EINVAL;
  292. return 0;
  293. }
  294. if (domain == AF_INET6) {
  295. if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
  296. return -EAFNOSUPPORT;
  297. if (addrlen != minimal_addrlen(addr->sa_family))
  298. return -EINVAL;
  299. return 0;
  300. }
  301. return -EINVAL;
  302. }
  303. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  304. const struct addr_inet * addr)
  305. {
  306. if (domain == AF_INET) {
  307. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  308. in->sin_family = AF_INET;
  309. in->sin_port = __htons(addr->port);
  310. in->sin_addr = addr->addr.v4;
  311. return sizeof(struct sockaddr_in);
  312. }
  313. if (domain == AF_INET6) {
  314. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  315. in6->sin6_family = AF_INET6;
  316. in6->sin6_port = __htons(addr->port);
  317. in6->sin6_addr = addr->addr.v6;
  318. return sizeof(struct sockaddr_in6);
  319. }
  320. return sizeof(struct sockaddr);
  321. }
  322. static void inet_save_addr (int domain, struct addr_inet * addr,
  323. const struct sockaddr * saddr)
  324. {
  325. if (domain == AF_INET) {
  326. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  327. addr->port = __ntohs(in->sin_port);
  328. addr->addr.v4 = in->sin_addr;
  329. return;
  330. }
  331. if (domain == AF_INET6) {
  332. if (saddr->sa_family == AF_INET) {
  333. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  334. addr->port = __ntohs(in->sin_port);
  335. ((uint32_t *) &addr->addr.v6.s6_addr)[0] = 0;
  336. ((uint32_t *) &addr->addr.v6.s6_addr)[1] = 0;
  337. ((uint32_t *) &addr->addr.v6.s6_addr)[2] = 0xffff0000;
  338. ((uint32_t *) &addr->addr.v6.s6_addr)[3] = in->sin_addr.s_addr;
  339. } else {
  340. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  341. addr->port = __ntohs(in6->sin6_port);
  342. addr->addr.v6 = in6->sin6_addr;
  343. }
  344. return;
  345. }
  346. }
  347. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  348. const struct sockaddr * saddr)
  349. {
  350. if (domain == AF_INET) {
  351. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  352. return addr->port == __ntohs(in->sin_port) &&
  353. !memcmp(&addr->addr.v4, &in->sin_addr,
  354. sizeof(struct in_addr));
  355. }
  356. if (domain == AF_INET6) {
  357. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  358. return addr->port == __ntohs(in6->sin6_port) &&
  359. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  360. sizeof(struct in6_addr));
  361. }
  362. return false;
  363. }
  364. static int create_socket_uri (struct shim_handle * hdl)
  365. {
  366. struct shim_sock_handle * sock = &hdl->info.sock;
  367. if (sock->domain == AF_UNIX) {
  368. char uri_buf[32];
  369. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  370. sock->addr.un.pipeid);
  371. if (bytes < 0)
  372. return bytes;
  373. qstrsetstr(&hdl->uri, uri_buf, bytes);
  374. return 0;
  375. }
  376. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  377. char uri_buf[SOCK_URI_SIZE];
  378. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  379. sock->sock_type, sock->sock_state,
  380. &sock->addr.in.bind, &sock->addr.in.conn);
  381. if (bytes < 0)
  382. return bytes;
  383. qstrsetstr(&hdl->uri, uri_buf, bytes);
  384. return 0;
  385. }
  386. return -EPROTONOSUPPORT;
  387. }
  388. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  389. {
  390. if (!addr || test_user_memory(addr, addrlen, false))
  391. return -EFAULT;
  392. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  393. int ret = -EINVAL;
  394. if (!hdl)
  395. return -EBADF;
  396. if (hdl->type != TYPE_SOCK) {
  397. put_handle(hdl);
  398. return -ENOTSOCK;
  399. }
  400. struct shim_sock_handle * sock = &hdl->info.sock;
  401. lock(hdl->lock);
  402. enum shim_sock_state state = sock->sock_state;
  403. if (state != SOCK_CREATED) {
  404. debug("shim_bind: bind on a bound socket\n");
  405. goto out;
  406. }
  407. if (sock->domain == AF_UNIX) {
  408. if (addrlen != sizeof(struct sockaddr_un))
  409. goto out;
  410. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  411. char * spath = saddr->sun_path;
  412. struct shim_dentry * dent = NULL;
  413. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0) {
  414. // DEP 7/3/17: We actually want either 0 or -ENOENT, as the
  415. // expected case is that the name is free (and we get the dent to
  416. // populate the name)
  417. if (ret != -ENOENT || !dent)
  418. goto out;
  419. }
  420. if (dent->state & DENTRY_VALID &&
  421. !(dent->state & DENTRY_NEGATIVE)) {
  422. ret = -EADDRINUSE;
  423. goto out;
  424. }
  425. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  426. data->pipeid = dent->rel_path.hash >> 32;
  427. sock->addr.un.pipeid = data->pipeid;
  428. sock->addr.un.data = data;
  429. sock->addr.un.dentry = dent;
  430. } else if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  431. if ((ret = inet_check_addr(sock->domain, addr, addrlen)) < 0)
  432. goto out;
  433. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  434. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  435. }
  436. sock->sock_state = SOCK_BOUND;
  437. if ((ret = create_socket_uri(hdl)) < 0)
  438. goto out;
  439. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  440. 0, 0, 0,
  441. hdl->flags & O_NONBLOCK);
  442. if (!pal_hdl) {
  443. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  444. debug("bind: invalid handle returned\n");
  445. goto out;
  446. }
  447. if (sock->domain == AF_UNIX) {
  448. struct shim_dentry * dent = sock->addr.un.dentry;
  449. dent->state ^= DENTRY_NEGATIVE;
  450. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  451. dent->fs = &socket_builtin_fs;
  452. dent->data = sock->addr.un.data;
  453. }
  454. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  455. char uri[SOCK_URI_SIZE];
  456. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  457. ret = -PAL_ERRNO;
  458. goto out;
  459. }
  460. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  461. &sock->addr.in.bind, NULL)) < 0)
  462. goto out;
  463. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  464. }
  465. hdl->pal_handle = pal_hdl;
  466. __process_pending_options(hdl);
  467. ret = 0;
  468. out:
  469. if (ret < 0) {
  470. sock->sock_state = state;
  471. sock->error = -ret;
  472. if (sock->domain == AF_UNIX) {
  473. if (sock->addr.un.dentry)
  474. put_dentry(sock->addr.un.dentry);
  475. if (sock->addr.un.data) {
  476. free(sock->addr.un.data);
  477. sock->addr.un.data = NULL;
  478. }
  479. }
  480. }
  481. unlock(hdl->lock);
  482. put_handle(hdl);
  483. return ret;
  484. }
  485. static int inet_parse_addr (int domain, int type, const char * uri,
  486. struct addr_inet * bind,
  487. struct addr_inet * conn)
  488. {
  489. char * ip_str, * port_str, * next_str;
  490. int ip_len = 0;
  491. if (!(next_str = strchr(uri, ':')))
  492. return -EINVAL;
  493. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  494. int n = (next_str++) - uri;
  495. if (!memcmp(uri, "udp", n))
  496. prefix = UDP;
  497. else if (!memcmp(uri, "udp.srv", n))
  498. prefix = UDPSRV;
  499. else if (!memcmp(uri, "tcp", n))
  500. prefix = TCP;
  501. else if (!memcmp(uri, "tcp.srv", n))
  502. prefix = TCPSRV;
  503. else
  504. return -EINVAL;
  505. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  506. return -EINVAL;
  507. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  508. return -EINVAL;
  509. for (int round = 0 ; (ip_str = next_str) ; round++) {
  510. if (ip_str[0] == '[') {
  511. ip_str++;
  512. if (domain != AF_INET6)
  513. return -EINVAL;
  514. if (!(port_str = strchr(ip_str, ']')))
  515. return -EINVAL;
  516. ip_len = port_str - ip_str;
  517. port_str++;
  518. if (*port_str != ':')
  519. return -EINVAL;
  520. } else {
  521. if (domain != AF_INET)
  522. return -EINVAL;
  523. if (!(port_str = strchr(ip_str, ':')))
  524. return -EINVAL;
  525. ip_len = port_str - ip_str;
  526. }
  527. port_str++;
  528. next_str = strchr(port_str, ':');
  529. if (next_str)
  530. next_str++;
  531. struct addr_inet * addr = round ? conn : bind;
  532. if (domain == AF_INET) {
  533. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  534. addr->ext_port = atoi(port_str);
  535. }
  536. if (domain == AF_INET6) {
  537. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  538. addr->ext_port = atoi(port_str);
  539. }
  540. }
  541. return 0;
  542. }
  543. struct un_conn {
  544. unsigned int pipeid;
  545. unsigned char path_size;
  546. char path[];
  547. } __attribute__((packed));
  548. int shim_do_listen (int sockfd, int backlog)
  549. {
  550. if (backlog < 0)
  551. return -EINVAL;
  552. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  553. if (!hdl)
  554. return -EBADF;
  555. if (hdl->type != TYPE_SOCK) {
  556. put_handle(hdl);
  557. return -ENOTSOCK;
  558. }
  559. struct shim_sock_handle * sock = &hdl->info.sock;
  560. if (sock->sock_type != SOCK_STREAM) {
  561. debug("shim_listen: not a stream socket\n");
  562. put_handle(hdl);
  563. return -EINVAL;
  564. }
  565. lock(hdl->lock);
  566. enum shim_sock_state state = sock->sock_state;
  567. int ret = -EINVAL;
  568. if (state != SOCK_BOUND) {
  569. debug("shim_listen: listen on unbound socket\n");
  570. goto out;
  571. }
  572. hdl->acc_mode = MAY_READ;
  573. sock->sock_state = SOCK_LISTENED;
  574. ret = 0;
  575. out:
  576. if (ret < 0)
  577. sock->sock_state = state;
  578. unlock(hdl->lock);
  579. put_handle(hdl);
  580. return ret;
  581. }
  582. /* Connect with the TCP socket is always in the client.
  583. *
  584. * With UDP, the connection is make to the socket specific for a
  585. * destination. A process with a connected UDP socket can call
  586. * connect again for that socket for one of two reasons: 1. To
  587. * specify a new IP address and port 2. To unconnect the socket.
  588. */
  589. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  590. {
  591. if (!addr || test_user_memory(addr, addrlen, false))
  592. return -EFAULT;
  593. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  594. if (!hdl)
  595. return -EBADF;
  596. if (hdl->type != TYPE_SOCK) {
  597. put_handle(hdl);
  598. return -ENOTSOCK;
  599. }
  600. struct shim_sock_handle * sock = &hdl->info.sock;
  601. lock(hdl->lock);
  602. enum shim_sock_state state = sock->sock_state;
  603. int ret = -EINVAL;
  604. if (state == SOCK_CONNECTED) {
  605. if (addr->sa_family == AF_UNSPEC) {
  606. sock->sock_state = SOCK_CREATED;
  607. if (sock->sock_type == SOCK_STREAM && hdl->pal_handle) {
  608. DkStreamDelete(hdl->pal_handle, 0);
  609. DkObjectClose(hdl->pal_handle);
  610. hdl->pal_handle = NULL;
  611. }
  612. debug("shim_connect: reconnect on a stream socket\n");
  613. ret = 0;
  614. goto out;
  615. }
  616. debug("shim_connect: reconnect on a stream socket\n");
  617. ret = -EISCONN;
  618. goto out;
  619. }
  620. if (state != SOCK_BOUND &&
  621. state != SOCK_CREATED) {
  622. debug("shim_connect: connect on invalid socket\n");
  623. goto out;
  624. }
  625. if (sock->domain == AF_UNIX) {
  626. if (addrlen != sizeof(struct sockaddr_un))
  627. goto out;
  628. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  629. char * spath = saddr->sun_path;
  630. struct shim_dentry * dent;
  631. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0)
  632. goto out;
  633. struct shim_unix_data * data = dent->data;
  634. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  635. data = malloc(sizeof(struct shim_unix_data));
  636. data->pipeid = dent->rel_path.hash >> 32;
  637. } else if (dent->fs != &socket_builtin_fs) {
  638. ret = -ECONNREFUSED;
  639. goto out;
  640. }
  641. sock->addr.un.pipeid = data->pipeid;
  642. sock->addr.un.data = data;
  643. sock->addr.un.dentry = dent;
  644. get_dentry(dent);
  645. }
  646. if (state == SOCK_BOUND) {
  647. /* if the socket is bound, the stream needs to be shut and rebound. */
  648. assert(hdl->pal_handle);
  649. DkStreamDelete(hdl->pal_handle, 0);
  650. DkObjectClose(hdl->pal_handle);
  651. hdl->pal_handle = NULL;
  652. }
  653. if (sock->domain != AF_UNIX) {
  654. if ((ret = inet_check_addr(sock->domain, addr, addrlen)) < 0)
  655. goto out;
  656. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  657. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  658. }
  659. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  660. SOCK_CONNECTED;
  661. if ((ret = create_socket_uri(hdl)) < 0)
  662. goto out;
  663. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  664. 0, 0, 0,
  665. hdl->flags & O_NONBLOCK);
  666. if (!pal_hdl) {
  667. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_DENIED) ? -ECONNREFUSED : -PAL_ERRNO;
  668. goto out;
  669. }
  670. hdl->pal_handle = pal_hdl;
  671. if (sock->domain == AF_UNIX) {
  672. struct shim_dentry * dent = sock->addr.un.dentry;
  673. lock(dent->lock);
  674. dent->state ^= DENTRY_NEGATIVE;
  675. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  676. dent->fs = &socket_builtin_fs;
  677. dent->data = sock->addr.un.data;
  678. unlock(dent->lock);
  679. }
  680. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  681. char uri[SOCK_URI_SIZE];
  682. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  683. ret = -PAL_ERRNO;
  684. goto out;
  685. }
  686. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  687. &sock->addr.in.bind,
  688. &sock->addr.in.conn)) < 0)
  689. goto out;
  690. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  691. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  692. }
  693. hdl->acc_mode = MAY_READ|MAY_WRITE;
  694. __process_pending_options(hdl);
  695. ret = 0;
  696. out:
  697. if (ret < 0) {
  698. sock->sock_state = state;
  699. sock->error = -ret;
  700. if (sock->domain == AF_UNIX) {
  701. if (sock->addr.un.dentry)
  702. put_dentry(sock->addr.un.dentry);
  703. if (sock->addr.un.data) {
  704. free(sock->addr.un.data);
  705. sock->addr.un.data = NULL;
  706. }
  707. }
  708. }
  709. unlock(hdl->lock);
  710. put_handle(hdl);
  711. return ret;
  712. }
  713. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  714. socklen_t * addrlen)
  715. {
  716. if (hdl->type != TYPE_SOCK)
  717. return -ENOTSOCK;
  718. struct shim_sock_handle * sock = &hdl->info.sock;
  719. int ret;
  720. PAL_HANDLE accepted = NULL;
  721. if (sock->sock_type != SOCK_STREAM) {
  722. debug("shim_accept: not a stream socket\n");
  723. return -EOPNOTSUPP;
  724. }
  725. if (addr) {
  726. if (!addrlen || test_user_memory(addrlen, sizeof(*addrlen), false))
  727. return -EINVAL;
  728. if (*addrlen < minimal_addrlen(sock->domain))
  729. return -EINVAL;
  730. if (test_user_memory(addr, *addrlen, true))
  731. return -EINVAL;
  732. }
  733. lock(hdl->lock);
  734. if (sock->sock_state != SOCK_LISTENED) {
  735. debug("shim_accpet: invalid socket\n");
  736. ret = -EINVAL;
  737. goto out;
  738. }
  739. accepted = DkStreamWaitForClient(hdl->pal_handle);
  740. if (!accepted) {
  741. ret = -PAL_ERRNO;
  742. goto out;
  743. }
  744. if (flags & O_NONBLOCK) {
  745. PAL_STREAM_ATTR attr;
  746. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  747. ret = -PAL_ERRNO;
  748. goto out;
  749. }
  750. attr.nonblocking = PAL_TRUE;
  751. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  752. ret = -PAL_ERRNO;
  753. goto out;
  754. }
  755. }
  756. struct shim_handle * cli = get_new_handle();
  757. if (!cli) {
  758. ret = -ENOMEM;
  759. goto out;
  760. }
  761. struct shim_sock_handle * cli_sock = &cli->info.sock;
  762. cli->type = TYPE_SOCK;
  763. set_handle_fs(cli, &socket_builtin_fs);
  764. cli->acc_mode = MAY_READ|MAY_WRITE;
  765. cli->flags = O_RDWR|flags;
  766. cli->pal_handle = accepted;
  767. accepted = NULL;
  768. cli_sock->domain = sock->domain;
  769. cli_sock->sock_type = sock->sock_type;
  770. cli_sock->protocol = sock->protocol;
  771. cli_sock->sock_state = SOCK_ACCEPTED;
  772. if (sock->domain == AF_UNIX) {
  773. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  774. if (sock->addr.un.dentry) {
  775. get_dentry(sock->addr.un.dentry);
  776. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  777. }
  778. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  779. if (addr) {
  780. unix_copy_addr(addr, sock->addr.un.dentry);
  781. if (addrlen)
  782. *addrlen = sizeof(struct sockaddr_un);
  783. }
  784. }
  785. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  786. char uri[SOCK_URI_SIZE];
  787. int uri_len;
  788. if (!(uri_len = DkStreamGetName(cli->pal_handle, uri, SOCK_URI_SIZE))) {
  789. ret = -PAL_ERRNO;
  790. goto out_cli;
  791. }
  792. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  793. &cli_sock->addr.in.bind,
  794. &cli_sock->addr.in.conn)) < 0)
  795. goto out_cli;
  796. qstrsetstr(&cli->uri, uri, uri_len);
  797. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  798. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  799. if (addr) {
  800. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  801. if (addrlen) {
  802. assert(sock->domain == AF_INET || sock->domain == AF_INET6);
  803. *addrlen = minimal_addrlen(sock->domain);
  804. }
  805. }
  806. }
  807. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  808. out_cli:
  809. put_handle(cli);
  810. out:
  811. if (ret < 0)
  812. sock->error = -ret;
  813. if (accepted)
  814. DkObjectClose(accepted);
  815. unlock(hdl->lock);
  816. return ret;
  817. }
  818. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  819. {
  820. int flags;
  821. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  822. if (!hdl)
  823. return -EBADF;
  824. int ret = __do_accept(hdl, flags & O_CLOEXEC,
  825. addr, addrlen);
  826. put_handle(hdl);
  827. return ret;
  828. }
  829. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  830. int flags)
  831. {
  832. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  833. if (!hdl)
  834. return -EBADF;
  835. int ret = __do_accept(hdl,
  836. (flags & SOCK_CLOEXEC ? O_CLOEXEC : 0) |
  837. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  838. addr, addrlen);
  839. put_handle(hdl);
  840. return ret;
  841. }
  842. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  843. const struct sockaddr * addr, socklen_t addrlen)
  844. {
  845. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  846. if (!hdl)
  847. return -EBADF;
  848. int ret = -ENOTSOCK;
  849. if (hdl->type != TYPE_SOCK)
  850. goto out;
  851. struct shim_sock_handle * sock = &hdl->info.sock;
  852. ret = -EFAULT;
  853. if (addr && test_user_memory((void *) addr, addrlen, false))
  854. goto out;
  855. if (!bufs || test_user_memory(bufs, sizeof(*bufs) * nbufs, false))
  856. goto out;
  857. for (int i = 0 ; i < nbufs ; i++) {
  858. if (!bufs[i].iov_base ||
  859. test_user_memory(bufs[i].iov_base, bufs[i].iov_len, false))
  860. goto out;
  861. }
  862. lock(hdl->lock);
  863. PAL_HANDLE pal_hdl = hdl->pal_handle;
  864. char * uri = NULL;
  865. /* Data gram sock need not be conneted or bound at all */
  866. if (sock->sock_type == SOCK_STREAM &&
  867. sock->sock_state != SOCK_CONNECTED &&
  868. sock->sock_state != SOCK_BOUNDCONNECTED &&
  869. sock->sock_state != SOCK_ACCEPTED) {
  870. ret = -ENOTCONN;
  871. goto out_locked;
  872. }
  873. if (sock->sock_type == SOCK_DGRAM &&
  874. sock->sock_state == SOCK_SHUTDOWN) {
  875. ret = -ENOTCONN;
  876. goto out_locked;
  877. }
  878. if (!(hdl->acc_mode & MAY_WRITE)) {
  879. ret = -ECONNRESET;
  880. goto out_locked;
  881. }
  882. if (sock->sock_type == SOCK_DGRAM &&
  883. sock->sock_state != SOCK_BOUNDCONNECTED &&
  884. sock->sock_state != SOCK_CONNECTED) {
  885. if (!addr) {
  886. ret = -EDESTADDRREQ;
  887. goto out_locked;
  888. }
  889. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  890. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  891. hdl->flags & O_NONBLOCK);
  892. if (!pal_hdl) {
  893. ret = -PAL_ERRNO;
  894. goto out_locked;
  895. }
  896. hdl->pal_handle = pal_hdl;
  897. }
  898. if (addr && addr->sa_family != sock->domain) {
  899. ret = -EINVAL;
  900. goto out_locked;
  901. }
  902. uri = __alloca(SOCK_URI_SIZE);
  903. }
  904. unlock(hdl->lock);
  905. if (uri) {
  906. struct addr_inet addr_buf;
  907. inet_save_addr(sock->domain, &addr_buf, addr);
  908. inet_rebase_port(false, sock->domain, &addr_buf, false);
  909. memcpy(uri, "udp:", 5);
  910. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  911. &addr_buf)) < 0) {
  912. lock(hdl->lock);
  913. goto out_locked;
  914. }
  915. debug("next packet send to %s\n", uri);
  916. }
  917. int bytes = 0;
  918. ret = 0;
  919. for (int i = 0 ; i < nbufs ; i++) {
  920. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  921. uri);
  922. if (!ret) {
  923. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  924. - ECONNABORTED : -PAL_ERRNO;
  925. break;
  926. }
  927. bytes += ret;
  928. }
  929. if (bytes)
  930. ret = bytes;
  931. if (ret < 0) {
  932. lock(hdl->lock);
  933. goto out_locked;
  934. }
  935. goto out;
  936. out_locked:
  937. if (ret < 0)
  938. sock->error = -ret;
  939. unlock(hdl->lock);
  940. out:
  941. put_handle(hdl);
  942. return ret;
  943. }
  944. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  945. const struct sockaddr * addr, socklen_t addrlen)
  946. {
  947. struct iovec iovbuf;
  948. iovbuf.iov_base = (void *) buf;
  949. iovbuf.iov_len = len;
  950. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  951. }
  952. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  953. {
  954. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  955. msg->msg_name, msg->msg_namelen);
  956. }
  957. int shim_do_sendmmsg (int sockfd, struct mmsghdr * msg, int vlen, int flags)
  958. {
  959. int i, total = 0;
  960. for (i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  961. struct msghdr * m = &msg[i].msg_hdr;
  962. int bytes = do_sendmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  963. m->msg_name, m->msg_namelen);
  964. if (bytes < 0)
  965. return total ? : bytes;
  966. msg[i].msg_len = bytes;
  967. total++;
  968. }
  969. return total;
  970. }
  971. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  972. struct sockaddr * addr, socklen_t * addrlen)
  973. {
  974. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  975. if (!hdl)
  976. return -EBADF;
  977. int ret = -ENOTSOCK;
  978. if (hdl->type != TYPE_SOCK)
  979. goto out;
  980. struct shim_sock_handle * sock = &hdl->info.sock;
  981. if (addr) {
  982. ret = -EINVAL;
  983. if (!addrlen || test_user_memory(addrlen, sizeof(*addrlen), false))
  984. goto out;
  985. if (*addrlen < minimal_addrlen(sock->domain))
  986. goto out;
  987. if (test_user_memory(addr, *addrlen, true))
  988. goto out;
  989. }
  990. ret = -EFAULT;
  991. if (!bufs || test_user_memory(bufs, sizeof(*bufs) * nbufs, false))
  992. goto out;
  993. for (int i = 0 ; i < nbufs ; i++) {
  994. if (!bufs[i].iov_base ||
  995. test_user_memory(bufs[i].iov_base, bufs[i].iov_len, true))
  996. goto out;
  997. }
  998. lock(hdl->lock);
  999. PAL_HANDLE pal_hdl = hdl->pal_handle;
  1000. char * uri = NULL;
  1001. if (sock->sock_type == SOCK_STREAM &&
  1002. sock->sock_state != SOCK_CONNECTED &&
  1003. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1004. sock->sock_state != SOCK_ACCEPTED) {
  1005. ret = -ENOTCONN;
  1006. goto out_locked;
  1007. }
  1008. if (!(hdl->acc_mode & MAY_READ)) {
  1009. ret = 0;
  1010. goto out_locked;
  1011. }
  1012. if (addr && sock->sock_type == SOCK_DGRAM &&
  1013. sock->sock_state != SOCK_CONNECTED &&
  1014. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1015. if (sock->sock_state == SOCK_CREATED) {
  1016. ret = -EINVAL;
  1017. goto out_locked;
  1018. }
  1019. uri = __alloca(SOCK_URI_SIZE);
  1020. }
  1021. unlock(hdl->lock);
  1022. bool address_received = false;
  1023. int bytes = 0;
  1024. ret = 0;
  1025. for (int i = 0 ; i < nbufs ; i++) {
  1026. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  1027. uri, uri ? SOCK_URI_SIZE : 0);
  1028. if (!ret) {
  1029. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  1030. - ECONNABORTED : -PAL_ERRNO;
  1031. break;
  1032. }
  1033. bytes += ret;
  1034. if (!addr || !bytes || address_received)
  1035. continue;
  1036. if (sock->domain == AF_UNIX) {
  1037. unix_copy_addr(addr, sock->addr.un.dentry);
  1038. *addrlen = sizeof(struct sockaddr_un);
  1039. }
  1040. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  1041. if (uri) {
  1042. struct addr_inet conn;
  1043. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  1044. &conn, NULL)) < 0) {
  1045. lock(hdl->lock);
  1046. goto out_locked;
  1047. }
  1048. debug("last packet received from %s\n", uri);
  1049. inet_rebase_port(true, sock->domain, &conn, false);
  1050. inet_copy_addr(sock->domain, addr, &conn);
  1051. } else {
  1052. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  1053. }
  1054. *addrlen = (sock->domain == AF_INET) ?
  1055. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  1056. }
  1057. address_received = false;
  1058. }
  1059. if (bytes)
  1060. ret = bytes;
  1061. if (ret < 0) {
  1062. lock(hdl->lock);
  1063. goto out_locked;
  1064. }
  1065. goto out;
  1066. out_locked:
  1067. if (ret < 0)
  1068. sock->error = -ret;
  1069. unlock(hdl->lock);
  1070. out:
  1071. put_handle(hdl);
  1072. return ret;
  1073. }
  1074. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  1075. struct sockaddr * addr, socklen_t * addrlen)
  1076. {
  1077. struct iovec iovbuf;
  1078. iovbuf.iov_base = (void *) buf;
  1079. iovbuf.iov_len = len;
  1080. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  1081. }
  1082. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  1083. {
  1084. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  1085. msg->msg_name, &msg->msg_namelen);
  1086. }
  1087. int shim_do_recvmmsg (int sockfd, struct mmsghdr * msg, int vlen, int flags,
  1088. struct __kernel_timespec * timeout)
  1089. {
  1090. int i, total = 0;
  1091. for (i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  1092. struct msghdr * m = &msg[i].msg_hdr;
  1093. int bytes = do_recvmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  1094. m->msg_name, &m->msg_namelen);
  1095. if (bytes < 0)
  1096. return total ? : bytes;
  1097. msg[i].msg_len = bytes;
  1098. total++;
  1099. }
  1100. return total;
  1101. }
  1102. #define SHUT_RD 0
  1103. #define SHUT_WR 1
  1104. #define SHUT_RDWR 2
  1105. int shim_do_shutdown (int sockfd, int how)
  1106. {
  1107. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1108. if (!hdl)
  1109. return -EBADF;
  1110. int ret = 0;
  1111. struct shim_sock_handle * sock = &hdl->info.sock;
  1112. if (hdl->type != TYPE_SOCK) {
  1113. ret = -ENOTSOCK;
  1114. goto out;
  1115. }
  1116. lock(hdl->lock);
  1117. if (sock->sock_state != SOCK_LISTENED &&
  1118. sock->sock_state != SOCK_ACCEPTED &&
  1119. sock->sock_state != SOCK_CONNECTED &&
  1120. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1121. ret = -ENOTCONN;
  1122. goto out_locked;
  1123. }
  1124. switch (how) {
  1125. case SHUT_RD:
  1126. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  1127. hdl->acc_mode &= ~MAY_READ;
  1128. break;
  1129. case SHUT_WR:
  1130. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  1131. hdl->acc_mode &= ~MAY_WRITE;
  1132. break;
  1133. case SHUT_RDWR:
  1134. DkStreamDelete(hdl->pal_handle, 0);
  1135. hdl->acc_mode = 0;
  1136. sock->sock_state = SOCK_SHUTDOWN;
  1137. break;
  1138. }
  1139. ret = 0;
  1140. out_locked:
  1141. if (ret < 0)
  1142. sock->error = -ret;
  1143. unlock(hdl->lock);
  1144. out:
  1145. put_handle(hdl);
  1146. return ret;
  1147. }
  1148. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1149. {
  1150. if (!addr || !addrlen)
  1151. return -EFAULT;
  1152. if (*addrlen <= 0)
  1153. return -EINVAL;
  1154. if (test_user_memory(addr, *addrlen, true))
  1155. return -EFAULT;
  1156. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1157. if (!hdl)
  1158. return -EBADF;
  1159. int ret = -EINVAL;
  1160. if (hdl->type != TYPE_SOCK) {
  1161. ret = -ENOTSOCK;
  1162. goto out;
  1163. }
  1164. struct shim_sock_handle * sock = &hdl->info.sock;
  1165. lock(hdl->lock);
  1166. struct sockaddr saddr;
  1167. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1168. if (len < *addrlen)
  1169. len = *addrlen;
  1170. memcpy(addr, &saddr, len);
  1171. *addrlen = len;
  1172. ret = 0;
  1173. unlock(hdl->lock);
  1174. out:
  1175. put_handle(hdl);
  1176. return ret;
  1177. }
  1178. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1179. {
  1180. if (!addr || !addrlen)
  1181. return -EFAULT;
  1182. if (*addrlen <= 0)
  1183. return -EINVAL;
  1184. if (test_user_memory(addr, *addrlen, true))
  1185. return -EFAULT;
  1186. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1187. if (!hdl)
  1188. return -EBADF;
  1189. int ret = -EINVAL;
  1190. if (hdl->type != TYPE_SOCK) {
  1191. ret = -ENOTSOCK;
  1192. goto out;
  1193. }
  1194. struct shim_sock_handle * sock = &hdl->info.sock;
  1195. lock(hdl->lock);
  1196. /* Data gram sock need not be conneted or bound at all */
  1197. if (sock->sock_type == SOCK_STREAM &&
  1198. sock->sock_state != SOCK_CONNECTED &&
  1199. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1200. sock->sock_state != SOCK_ACCEPTED) {
  1201. ret = -ENOTCONN;
  1202. goto out_locked;
  1203. }
  1204. if (sock->sock_type == SOCK_DGRAM &&
  1205. sock->sock_state != SOCK_CONNECTED &&
  1206. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1207. ret = -ENOTCONN;
  1208. goto out_locked;
  1209. }
  1210. struct sockaddr saddr;
  1211. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1212. if (len < *addrlen)
  1213. len = *addrlen;
  1214. memcpy(addr, &saddr, len);
  1215. *addrlen = len;
  1216. ret = 0;
  1217. out_locked:
  1218. unlock(hdl->lock);
  1219. out:
  1220. put_handle(hdl);
  1221. return ret;
  1222. }
  1223. struct __kernel_linger {
  1224. int l_onoff;
  1225. int l_linger;
  1226. };
  1227. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1228. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1229. {
  1230. int intval = *((int *) optval);
  1231. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1232. if (level == SOL_SOCKET) {
  1233. switch(optname) {
  1234. case SO_ACCEPTCONN:
  1235. case SO_DOMAIN:
  1236. case SO_ERROR:
  1237. case SO_PROTOCOL:
  1238. case SO_TYPE:
  1239. return -EPERM;
  1240. case SO_KEEPALIVE:
  1241. case SO_LINGER:
  1242. case SO_RCVBUF:
  1243. case SO_SNDBUF:
  1244. case SO_RCVTIMEO:
  1245. case SO_SNDTIMEO:
  1246. case SO_REUSEADDR:
  1247. goto query;
  1248. default:
  1249. goto unknown;
  1250. }
  1251. }
  1252. if (level == SOL_TCP) {
  1253. switch(optname) {
  1254. case TCP_CORK:
  1255. case TCP_NODELAY:
  1256. goto query;
  1257. default:
  1258. goto unknown;
  1259. }
  1260. }
  1261. unknown:
  1262. return -ENOPROTOOPT;
  1263. query:
  1264. if (!attr) {
  1265. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1266. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1267. return -PAL_ERRNO;
  1268. }
  1269. if (level == SOL_SOCKET) {
  1270. switch(optname) {
  1271. case SO_KEEPALIVE:
  1272. if (bolval != attr->socket.tcp_keepalive) {
  1273. attr->socket.tcp_keepalive = bolval;
  1274. goto set;
  1275. }
  1276. break;
  1277. case SO_LINGER: {
  1278. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1279. int linger = l->l_onoff ? l->l_linger : 0;
  1280. if (linger != (int) attr->socket.linger) {
  1281. attr->socket.linger = linger;
  1282. goto set;
  1283. }
  1284. break;
  1285. }
  1286. case SO_RCVBUF:
  1287. if (intval != (int) attr->socket.receivebuf) {
  1288. attr->socket.receivebuf = intval;
  1289. goto set;
  1290. }
  1291. break;
  1292. case SO_SNDBUF:
  1293. if (intval != (int) attr->socket.sendbuf) {
  1294. attr->socket.sendbuf = intval;
  1295. goto set;
  1296. }
  1297. break;
  1298. case SO_RCVTIMEO:
  1299. if (intval != (int) attr->socket.receivetimeout) {
  1300. attr->socket.receivetimeout = intval;
  1301. goto set;
  1302. }
  1303. break;
  1304. case SO_SNDTIMEO:
  1305. if (intval != (int) attr->socket.sendtimeout) {
  1306. attr->socket.sendtimeout = intval;
  1307. goto set;
  1308. }
  1309. break;
  1310. case SO_REUSEADDR:
  1311. break;
  1312. }
  1313. }
  1314. if (level == SOL_TCP) {
  1315. switch(optname) {
  1316. case TCP_CORK:
  1317. if (bolval != attr->socket.tcp_cork) {
  1318. attr->socket.tcp_cork = bolval;
  1319. goto set;
  1320. }
  1321. break;
  1322. case TCP_NODELAY:
  1323. if (bolval != attr->socket.tcp_nodelay) {
  1324. attr->socket.tcp_nodelay = bolval;
  1325. goto set;
  1326. }
  1327. break;
  1328. }
  1329. }
  1330. return 0;
  1331. set:
  1332. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1333. return -PAL_ERRNO;
  1334. return 0;
  1335. }
  1336. static int __process_pending_options (struct shim_handle * hdl)
  1337. {
  1338. struct shim_sock_handle * sock = &hdl->info.sock;
  1339. if (!sock->pending_options)
  1340. return 0;
  1341. PAL_STREAM_ATTR attr;
  1342. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1343. return -PAL_ERRNO;
  1344. struct shim_sock_option * o = sock->pending_options;
  1345. while (o) {
  1346. PAL_STREAM_ATTR tmp = attr;
  1347. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1348. o->optlen, &tmp);
  1349. if (!ret)
  1350. attr = tmp;
  1351. struct shim_sock_option * next = o->next;
  1352. free(o);
  1353. o = next;
  1354. }
  1355. return 0;
  1356. }
  1357. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1358. int optlen)
  1359. {
  1360. if (!optval)
  1361. return -EFAULT;
  1362. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1363. if (!hdl)
  1364. return -EBADF;
  1365. int ret = 0;
  1366. if (hdl->type != TYPE_SOCK) {
  1367. ret = -ENOTSOCK;
  1368. goto out;
  1369. }
  1370. struct shim_sock_handle * sock = &hdl->info.sock;
  1371. lock(hdl->lock);
  1372. if (!hdl->pal_handle) {
  1373. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1374. optlen);
  1375. if (!o) {
  1376. ret = -ENOMEM;
  1377. goto out_locked;
  1378. }
  1379. struct shim_sock_option ** next = &sock->pending_options;
  1380. while (*next)
  1381. next = &(*next)->next;
  1382. o->next = NULL;
  1383. *next = o;
  1384. o->level = level;
  1385. o->optname = optname;
  1386. o->optlen = optlen;
  1387. memcpy(&o->optval, optval, optlen);
  1388. goto out_locked;
  1389. }
  1390. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1391. out_locked:
  1392. unlock(hdl->lock);
  1393. out:
  1394. put_handle(hdl);
  1395. return ret;
  1396. }
  1397. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1398. int * optlen)
  1399. {
  1400. if (!optval || !optlen)
  1401. return -EFAULT;
  1402. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1403. if (!hdl)
  1404. return -EBADF;
  1405. int ret = 0;
  1406. if (hdl->type != TYPE_SOCK) {
  1407. ret = -ENOTSOCK;
  1408. goto out;
  1409. }
  1410. struct shim_sock_handle * sock = &hdl->info.sock;
  1411. lock(hdl->lock);
  1412. int * intval = (int *) optval;
  1413. if (level == SOL_SOCKET) {
  1414. switch(optname) {
  1415. case SO_ACCEPTCONN:
  1416. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1417. goto out;
  1418. case SO_DOMAIN:
  1419. *intval = sock->domain;
  1420. goto out;
  1421. case SO_ERROR:
  1422. *intval = sock->error;
  1423. goto out;
  1424. case SO_PROTOCOL:
  1425. switch(sock->protocol) {
  1426. case SOCK_STREAM:
  1427. *intval = IPPROTO_SCTP;
  1428. break;
  1429. case SOCK_DGRAM:
  1430. *intval = IPPROTO_UDP;
  1431. break;
  1432. default:
  1433. goto unknown;
  1434. }
  1435. goto out;
  1436. case SO_TYPE:
  1437. *intval = sock->sock_type;
  1438. goto out;
  1439. case SO_KEEPALIVE:
  1440. case SO_LINGER:
  1441. case SO_RCVBUF:
  1442. case SO_SNDBUF:
  1443. case SO_RCVTIMEO:
  1444. case SO_SNDTIMEO:
  1445. case SO_REUSEADDR:
  1446. goto query;
  1447. default:
  1448. goto unknown;
  1449. }
  1450. }
  1451. if (level == SOL_TCP) {
  1452. switch(optname) {
  1453. case TCP_CORK:
  1454. case TCP_NODELAY:
  1455. goto query;
  1456. default:
  1457. goto unknown;
  1458. }
  1459. }
  1460. unknown:
  1461. ret = -ENOPROTOOPT;
  1462. goto out;
  1463. query:
  1464. {
  1465. PAL_STREAM_ATTR attr;
  1466. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1467. ret = -PAL_ERRNO;
  1468. goto out;
  1469. }
  1470. if (level == SOL_SOCKET) {
  1471. switch(optname) {
  1472. case SO_KEEPALIVE:
  1473. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1474. break;
  1475. case SO_LINGER: {
  1476. struct __kernel_linger * l =
  1477. (struct __kernel_linger *) optval;
  1478. l->l_onoff = attr.socket.linger ? 1 : 0;
  1479. l->l_linger = attr.socket.linger;
  1480. break;
  1481. }
  1482. case SO_RCVBUF:
  1483. *intval = attr.socket.receivebuf;
  1484. break;
  1485. case SO_SNDBUF:
  1486. *intval = attr.socket.sendbuf;
  1487. break;
  1488. case SO_RCVTIMEO:
  1489. *intval = attr.socket.receivetimeout;
  1490. break;
  1491. case SO_SNDTIMEO:
  1492. *intval = attr.socket.sendtimeout;
  1493. break;
  1494. case SO_REUSEADDR:
  1495. *intval = 1;
  1496. break;
  1497. }
  1498. }
  1499. if (level == SOL_TCP) {
  1500. switch(optname) {
  1501. case TCP_CORK:
  1502. *intval = attr.socket.tcp_cork ? 1 : 0;
  1503. break;
  1504. case TCP_NODELAY:
  1505. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1506. break;
  1507. }
  1508. }
  1509. }
  1510. out:
  1511. unlock(hdl->lock);
  1512. put_handle(hdl);
  1513. return ret;
  1514. }