shim_socket.c 49 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783
  1. /* -*- mode:c; c-file-style:"k&r"; c-basic-offset: 4; tab-width:4; indent-tabs-mode:nil; mode:auto-fill; fill-column:78; -*- */
  2. /* vim: set ts=4 sw=4 et tw=78 fo=cqt wm=0: */
  3. /* Copyright (C) 2014 Stony Brook University
  4. This file is part of Graphene Library OS.
  5. Graphene Library OS is free software: you can redistribute it and/or
  6. modify it under the terms of the GNU Lesser General Public License
  7. as published by the Free Software Foundation, either version 3 of the
  8. License, or (at your option) any later version.
  9. Graphene Library OS is distributed in the hope that it will be useful,
  10. but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. GNU Lesser General Public License for more details.
  13. You should have received a copy of the GNU Lesser General Public License
  14. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  15. /*
  16. * shim_socket.c
  17. *
  18. * Implementation of system call "socket", "bind", "accept4", "listen",
  19. * "connect", "sendto", "recvfrom", "sendmsg", "recvmsg" and "shutdown" and
  20. * "getsockname", "getpeername".
  21. */
  22. #include <shim_internal.h>
  23. #include <shim_table.h>
  24. #include <shim_handle.h>
  25. #include <shim_fs.h>
  26. #include <shim_utils.h>
  27. #include <shim_checkpoint.h>
  28. #include <pal.h>
  29. #include <pal_error.h>
  30. #include <errno.h>
  31. #include <linux/fcntl.h>
  32. #include <linux/in.h>
  33. #include <linux/in6.h>
  34. #include <asm/socket.h>
  35. /*
  36. * User-settable options (used with setsockopt).
  37. */
  38. #define TCP_NODELAY 1 /* Don't delay send to coalesce packets */
  39. #define TCP_MAXSEG 2 /* Set maximum segment size */
  40. #define TCP_CORK 3 /* Control sending of partial frames */
  41. #define TCP_KEEPIDLE 4 /* Start keeplives after this period */
  42. #define TCP_KEEPINTVL 5 /* Interval between keepalives */
  43. #define TCP_KEEPCNT 6 /* Number of keepalives before death */
  44. #define TCP_SYNCNT 7 /* Number of SYN retransmits */
  45. #define TCP_LINGER2 8 /* Life time of orphaned FIN-WAIT-2 state */
  46. #define TCP_DEFER_ACCEPT 9 /* Wake up listener only when data arrive */
  47. #define TCP_WINDOW_CLAMP 10 /* Bound advertised window */
  48. #define TCP_INFO 11 /* Information about this connection. */
  49. #define TCP_QUICKACK 12 /* Bock/reenable quick ACKs. */
  50. #define TCP_CONGESTION 13 /* Congestion control algorithm. */
  51. #define TCP_MD5SIG 14 /* TCP MD5 Signature (RFC2385) */
  52. #define AF_UNSPEC 0
  53. #define SOCK_URI_SIZE 108
  54. static int rebase_on_lo __attribute_migratable = -1;
  55. static int init_port_rebase (void)
  56. {
  57. if (rebase_on_lo != -1)
  58. return 0;
  59. char cfg[CONFIG_MAX];
  60. int rebase = 0;
  61. if (!root_config ||
  62. get_config(root_config, "net.port.rebase_on_lo", cfg, CONFIG_MAX) <= 0) {
  63. rebase_on_lo = 0;
  64. return 0;
  65. }
  66. for (const char * p = cfg ; *p ; p++) {
  67. if (*p < '0' || *p > '9' || rebase > 32767) {
  68. rebase_on_lo = 0;
  69. return 0;
  70. }
  71. rebase = rebase * 10 + (*p - '0');
  72. }
  73. rebase_on_lo = rebase;
  74. return 0;
  75. }
  76. static int inet_parse_addr (int domain, int type, const char * uri,
  77. struct addr_inet * bind,
  78. struct addr_inet * conn);
  79. static int __process_pending_options (struct shim_handle * hdl);
  80. int shim_do_socket (int family, int type, int protocol)
  81. {
  82. struct shim_handle * hdl = get_new_handle();
  83. if (!hdl)
  84. return -ENOMEM;
  85. struct shim_sock_handle * sock = &hdl->info.sock;
  86. hdl->type = TYPE_SOCK;
  87. set_handle_fs(hdl, &socket_builtin_fs);
  88. hdl->flags = type & SOCK_NONBLOCK ? O_NONBLOCK : 0;
  89. hdl->acc_mode = 0;
  90. sock->domain = family;
  91. sock->sock_type = type & ~(SOCK_NONBLOCK|SOCK_CLOEXEC);
  92. sock->protocol = protocol;
  93. int ret = -ENOSYS;
  94. switch (sock->domain) {
  95. case AF_UNIX: //Local communication
  96. case AF_INET: //IPv4 Internet protocols ip(7)
  97. case AF_INET6: //IPv6 Internet protocols
  98. break;
  99. default:
  100. debug("shim_socket: unknown socket domain %d\n",
  101. sock->domain);
  102. goto err;
  103. }
  104. switch (sock->sock_type) {
  105. case SOCK_STREAM: //TCP
  106. break;
  107. case SOCK_DGRAM: //UDP
  108. hdl->acc_mode = MAY_READ|MAY_WRITE;
  109. break;
  110. default:
  111. debug("shim_socket: unknown socket type %d\n",
  112. sock->sock_type);
  113. goto err;
  114. }
  115. sock->sock_state = SOCK_CREATED;
  116. ret = set_new_fd_handle(hdl, type & SOCK_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  117. err:
  118. put_handle(hdl);
  119. return ret;
  120. }
  121. static int unix_create_uri (char * uri, int count, enum shim_sock_state state,
  122. unsigned int pipeid)
  123. {
  124. int bytes = 0;
  125. switch (state) {
  126. case SOCK_CREATED:
  127. case SOCK_BOUNDCONNECTED:
  128. case SOCK_SHUTDOWN:
  129. return -ENOTCONN;
  130. case SOCK_BOUND:
  131. case SOCK_LISTENED:
  132. case SOCK_ACCEPTED:
  133. bytes = snprintf(uri, count, "pipe.srv:%u", pipeid);
  134. break;
  135. case SOCK_CONNECTED:
  136. bytes = snprintf(uri, count, "pipe:%u", pipeid);
  137. break;
  138. default:
  139. return -ENOTCONN;
  140. }
  141. return bytes == count ? -ENAMETOOLONG : bytes;
  142. }
  143. static void inet_rebase_port (bool reverse, int domain, struct addr_inet * addr,
  144. bool local)
  145. {
  146. init_port_rebase();
  147. if (rebase_on_lo) {
  148. if (domain == AF_INET) {
  149. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  150. if (!local && memcmp(ad, "\177\0\0\1", 4))
  151. return;
  152. }
  153. if (domain == AF_INET6) {
  154. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  155. if (!local && memcmp(ad, "\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\1", 16))
  156. return;
  157. }
  158. }
  159. if (reverse)
  160. addr->port = addr->ext_port - rebase_on_lo;
  161. else
  162. addr->ext_port = addr->port + rebase_on_lo;
  163. }
  164. static int inet_translate_addr (int domain, char * uri, int count,
  165. struct addr_inet * addr)
  166. {
  167. if (domain == AF_INET) {
  168. unsigned char * ad = (unsigned char *) &addr->addr.v4.s_addr;
  169. int bytes = snprintf(uri, count, "%u.%u.%u.%u:%u",
  170. ad[0], ad[1], ad[2], ad[3],
  171. addr->ext_port);
  172. return bytes == count ? -ENAMETOOLONG : bytes;
  173. }
  174. if (domain == AF_INET6) {
  175. unsigned short * ad = (void *) &addr->addr.v6.s6_addr;
  176. int bytes = snprintf(uri, count,
  177. "[%04x:%04x:%x:%04x:%04x:%04x:%04x:%04x]:%u",
  178. __ntohs(ad[0]), __ntohs(ad[1]),
  179. __ntohs(ad[2]), __ntohs(ad[3]),
  180. __ntohs(ad[4]), __ntohs(ad[5]),
  181. __ntohs(ad[6]), __ntohs(ad[7]),
  182. addr->ext_port);
  183. return bytes == count ? -ENAMETOOLONG : bytes;
  184. }
  185. return -EPROTONOSUPPORT;
  186. }
  187. static int inet_create_uri (int domain, char * uri, int count, int sock_type,
  188. enum shim_sock_state state,
  189. struct addr_inet * bind, struct addr_inet * conn)
  190. {
  191. int bytes = 0, ret;
  192. if (sock_type == SOCK_STREAM) {
  193. switch (state) {
  194. case SOCK_CREATED:
  195. case SOCK_SHUTDOWN:
  196. return -ENOTCONN;
  197. case SOCK_BOUND:
  198. case SOCK_LISTENED:
  199. if (count < 9)
  200. return -ENAMETOOLONG;
  201. memcpy(uri, "tcp.srv:", 9);
  202. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  203. return ret < 0 ? ret : ret + 8;
  204. case SOCK_BOUNDCONNECTED:
  205. if (count < 5)
  206. return -ENAMETOOLONG;
  207. memcpy(uri, "tcp:", 5);
  208. bytes = 4;
  209. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  210. bind);
  211. if (ret < 0)
  212. return ret;
  213. uri[bytes + ret] = ':';
  214. bytes += ret + 1;
  215. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  216. conn);
  217. return ret < 0 ? ret : ret + bytes;
  218. case SOCK_CONNECTED:
  219. case SOCK_ACCEPTED:
  220. if (count < 5)
  221. return -ENAMETOOLONG;
  222. memcpy(uri, "tcp:", 5);
  223. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  224. return ret < 0 ? ret : ret + 4;
  225. }
  226. }
  227. if (sock_type == SOCK_DGRAM) {
  228. switch (state) {
  229. case SOCK_CREATED:
  230. case SOCK_SHUTDOWN:
  231. return -ENOTCONN;
  232. case SOCK_LISTENED:
  233. case SOCK_ACCEPTED:
  234. return -EOPNOTSUPP;
  235. case SOCK_BOUNDCONNECTED:
  236. if (count < 9)
  237. return -ENAMETOOLONG;
  238. memcpy(uri, "tcp.srv:", 9);
  239. bytes = 8;
  240. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  241. bind);
  242. if (ret < 0)
  243. return ret;
  244. uri[bytes + ret] = ':';
  245. bytes += ret + 1;
  246. ret = inet_translate_addr(domain, uri + bytes, count - bytes,
  247. conn);
  248. return ret < 0 ? ret : ret + bytes;
  249. case SOCK_BOUND:
  250. if (count < 9)
  251. return -ENAMETOOLONG;
  252. memcpy(uri, "udp.srv:", 9);
  253. ret = inet_translate_addr(domain, uri + 8, count - 8, bind);
  254. return ret < 0 ? ret : ret + 9;
  255. case SOCK_CONNECTED:
  256. if (count < 5)
  257. return -ENAMETOOLONG;
  258. memcpy(uri, "udp:", 5);
  259. ret = inet_translate_addr(domain, uri + 4, count - 4, conn);
  260. return ret < 0 ? ret : ret + 4;
  261. }
  262. }
  263. return -EPROTONOSUPPORT;
  264. }
  265. static inline void unix_copy_addr (struct sockaddr * saddr,
  266. struct shim_dentry * dent)
  267. {
  268. struct sockaddr_un * un = (struct sockaddr_un *) saddr;
  269. un->sun_family = AF_UNIX;
  270. int size;
  271. const char * path = dentry_get_path(dent, true, &size);
  272. memcpy(un->sun_path, path, size + 1);
  273. }
  274. static bool inet_check_addr (int domain, struct sockaddr * addr, int addrlen)
  275. {
  276. if (domain == AF_INET) {
  277. if (addr->sa_family != AF_INET ||
  278. addrlen != sizeof(struct sockaddr_in))
  279. return false;
  280. return true;
  281. }
  282. if (domain == AF_INET6) {
  283. if (addr->sa_family != AF_INET && addr->sa_family != AF_INET6)
  284. return false;
  285. if (addrlen != ((addr->sa_family == AF_INET) ?
  286. sizeof(struct sockaddr_in) :
  287. sizeof(struct sockaddr_in6)))
  288. return false;
  289. return true;
  290. }
  291. return false;
  292. }
  293. static int inet_copy_addr (int domain, struct sockaddr * saddr,
  294. const struct addr_inet * addr)
  295. {
  296. if (domain == AF_INET) {
  297. struct sockaddr_in * in = (struct sockaddr_in *) saddr;
  298. in->sin_family = AF_INET;
  299. in->sin_port = __htons(addr->port);
  300. in->sin_addr = addr->addr.v4;
  301. return sizeof(struct sockaddr_in);
  302. }
  303. if (domain == AF_INET6) {
  304. struct sockaddr_in6 * in6 = (struct sockaddr_in6 *) saddr;
  305. in6->sin6_family = AF_INET6;
  306. in6->sin6_port = __htons(addr->port);
  307. in6->sin6_addr = addr->addr.v6;
  308. return sizeof(struct sockaddr_in6);
  309. }
  310. return sizeof(struct sockaddr);
  311. }
  312. static void inet_save_addr (int domain, struct addr_inet * addr,
  313. const struct sockaddr * saddr)
  314. {
  315. if (domain == AF_INET) {
  316. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  317. addr->port = __ntohs(in->sin_port);
  318. addr->addr.v4 = in->sin_addr;
  319. return;
  320. }
  321. if (domain == AF_INET6) {
  322. if (saddr->sa_family == AF_INET) {
  323. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  324. addr->port = __ntohs(in->sin_port);
  325. ((uint32_t *) &addr->addr.v6.s6_addr)[0] = 0;
  326. ((uint32_t *) &addr->addr.v6.s6_addr)[1] = 0;
  327. ((uint32_t *) &addr->addr.v6.s6_addr)[2] = 0xffff0000;
  328. ((uint32_t *) &addr->addr.v6.s6_addr)[3] = in->sin_addr.s_addr;
  329. } else {
  330. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  331. addr->port = __ntohs(in6->sin6_port);
  332. addr->addr.v6 = in6->sin6_addr;
  333. }
  334. return;
  335. }
  336. }
  337. static inline bool inet_comp_addr (int domain, const struct addr_inet * addr,
  338. const struct sockaddr * saddr)
  339. {
  340. if (domain == AF_INET) {
  341. const struct sockaddr_in * in = (const struct sockaddr_in *) saddr;
  342. return addr->port == __ntohs(in->sin_port) &&
  343. !memcmp(&addr->addr.v4, &in->sin_addr,
  344. sizeof(struct in_addr));
  345. }
  346. if (domain == AF_INET6) {
  347. const struct sockaddr_in6 * in6 = (const struct sockaddr_in6 *) saddr;
  348. return addr->port == __ntohs(in6->sin6_port) &&
  349. !memcmp(&addr->addr.v6, &in6->sin6_addr,
  350. sizeof(struct in6_addr));
  351. }
  352. return false;
  353. }
  354. static int create_socket_uri (struct shim_handle * hdl)
  355. {
  356. struct shim_sock_handle * sock = &hdl->info.sock;
  357. if (sock->domain == AF_UNIX) {
  358. char uri_buf[32];
  359. int bytes = unix_create_uri(uri_buf, 32, sock->sock_state,
  360. sock->addr.un.pipeid);
  361. if (bytes < 0)
  362. return bytes;
  363. qstrsetstr(&hdl->uri, uri_buf, bytes);
  364. return 0;
  365. }
  366. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  367. char uri_buf[SOCK_URI_SIZE];
  368. int bytes = inet_create_uri(sock->domain, uri_buf, SOCK_URI_SIZE,
  369. sock->sock_type, sock->sock_state,
  370. &sock->addr.in.bind, &sock->addr.in.conn);
  371. if (bytes < 0)
  372. return bytes;
  373. qstrsetstr(&hdl->uri, uri_buf, bytes);
  374. return 0;
  375. }
  376. return -EPROTONOSUPPORT;
  377. }
  378. int shim_do_bind (int sockfd, struct sockaddr * addr, socklen_t addrlen)
  379. {
  380. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  381. int ret = -EINVAL;
  382. if (!hdl)
  383. return -EBADF;
  384. if (hdl->type != TYPE_SOCK) {
  385. put_handle(hdl);
  386. return -ENOTSOCK;
  387. }
  388. struct shim_sock_handle * sock = &hdl->info.sock;
  389. lock(hdl->lock);
  390. enum shim_sock_state state = sock->sock_state;
  391. if (state != SOCK_CREATED) {
  392. debug("shim_bind: bind on a bound socket\n");
  393. goto out;
  394. }
  395. if (sock->domain == AF_UNIX) {
  396. if (addrlen != sizeof(struct sockaddr_un))
  397. goto out;
  398. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  399. char * spath = saddr->sun_path;
  400. struct shim_dentry * dent = NULL;
  401. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0) {
  402. // DEP 7/3/17: We actually want either 0 or -ENOENT, as the
  403. // expected case is that the name is free (and we get the dent to
  404. // populate the name)
  405. if (ret != -ENOENT || !dent)
  406. goto out;
  407. }
  408. if (dent->state & DENTRY_VALID &&
  409. !(dent->state & DENTRY_NEGATIVE)) {
  410. ret = -EADDRINUSE;
  411. goto out;
  412. }
  413. struct shim_unix_data * data = malloc(sizeof(struct shim_unix_data));
  414. data->pipeid = dent->rel_path.hash >> 32;
  415. sock->addr.un.pipeid = data->pipeid;
  416. sock->addr.un.data = data;
  417. sock->addr.un.dentry = dent;
  418. } else if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  419. if (!inet_check_addr(sock->domain, addr, addrlen))
  420. goto out;
  421. inet_save_addr(sock->domain, &sock->addr.in.bind, addr);
  422. inet_rebase_port(false, sock->domain, &sock->addr.in.bind, true);
  423. }
  424. sock->sock_state = SOCK_BOUND;
  425. if ((ret = create_socket_uri(hdl)) < 0)
  426. goto out;
  427. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  428. 0, 0, 0,
  429. hdl->flags & O_NONBLOCK);
  430. if (!pal_hdl) {
  431. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ? -EADDRINUSE : -PAL_ERRNO;
  432. debug("bind: invalid handle returned\n");
  433. goto out;
  434. }
  435. if (sock->domain == AF_UNIX) {
  436. struct shim_dentry * dent = sock->addr.un.dentry;
  437. dent->state ^= DENTRY_NEGATIVE;
  438. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  439. dent->fs = &socket_builtin_fs;
  440. dent->data = sock->addr.un.data;
  441. }
  442. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  443. char uri[SOCK_URI_SIZE];
  444. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  445. ret = -PAL_ERRNO;
  446. goto out;
  447. }
  448. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  449. &sock->addr.in.bind, NULL)) < 0)
  450. goto out;
  451. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  452. }
  453. hdl->pal_handle = pal_hdl;
  454. __process_pending_options(hdl);
  455. ret = 0;
  456. out:
  457. if (ret < 0) {
  458. sock->sock_state = state;
  459. sock->error = -ret;
  460. if (sock->domain == AF_UNIX) {
  461. if (sock->addr.un.dentry)
  462. put_dentry(sock->addr.un.dentry);
  463. if (sock->addr.un.data) {
  464. free(sock->addr.un.data);
  465. sock->addr.un.data = NULL;
  466. }
  467. }
  468. }
  469. unlock(hdl->lock);
  470. put_handle(hdl);
  471. return ret;
  472. }
  473. static int inet_parse_addr (int domain, int type, const char * uri,
  474. struct addr_inet * bind,
  475. struct addr_inet * conn)
  476. {
  477. char * ip_str, * port_str, * next_str;
  478. int ip_len = 0;
  479. if (!(next_str = strchr(uri, ':')))
  480. return -EINVAL;
  481. enum { UDP, UDPSRV, TCP, TCPSRV } prefix;
  482. int n = (next_str++) - uri;
  483. if (!memcmp(uri, "udp", n))
  484. prefix = UDP;
  485. else if (!memcmp(uri, "udp.srv", n))
  486. prefix = UDPSRV;
  487. else if (!memcmp(uri, "tcp", n))
  488. prefix = TCP;
  489. else if (!memcmp(uri, "tcp.srv", n))
  490. prefix = TCPSRV;
  491. else
  492. return -EINVAL;
  493. if ((prefix == UDP || prefix == UDPSRV) && type != SOCK_DGRAM)
  494. return -EINVAL;
  495. if ((prefix == TCP || prefix == TCPSRV) && type != SOCK_STREAM)
  496. return -EINVAL;
  497. for (int round = 0 ; (ip_str = next_str) ; round++) {
  498. if (ip_str[0] == '[') {
  499. ip_str++;
  500. if (domain != AF_INET6)
  501. return -EINVAL;
  502. if (!(port_str = strchr(ip_str, ']')))
  503. return -EINVAL;
  504. ip_len = port_str - ip_str;
  505. port_str++;
  506. if (*port_str != ':')
  507. return -EINVAL;
  508. } else {
  509. if (domain != AF_INET)
  510. return -EINVAL;
  511. if (!(port_str = strchr(ip_str, ':')))
  512. return -EINVAL;
  513. ip_len = port_str - ip_str;
  514. }
  515. port_str++;
  516. next_str = strchr(port_str, ':');
  517. if (next_str)
  518. next_str++;
  519. struct addr_inet * addr = round ? conn : bind;
  520. if (domain == AF_INET) {
  521. inet_pton4(ip_str, ip_len, &addr->addr.v4);
  522. addr->ext_port = atoi(port_str);
  523. }
  524. if (domain == AF_INET6) {
  525. inet_pton6(ip_str, ip_len, &addr->addr.v6);
  526. addr->ext_port = atoi(port_str);
  527. }
  528. }
  529. return 0;
  530. }
  531. struct un_conn {
  532. unsigned int pipeid;
  533. unsigned char path_size;
  534. char path[];
  535. } __attribute__((packed));
  536. int shim_do_listen (int sockfd, int backlog)
  537. {
  538. if (backlog < 0)
  539. return -EINVAL;
  540. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  541. if (!hdl)
  542. return -EBADF;
  543. if (hdl->type != TYPE_SOCK) {
  544. put_handle(hdl);
  545. return -ENOTSOCK;
  546. }
  547. struct shim_sock_handle * sock = &hdl->info.sock;
  548. if (sock->sock_type != SOCK_STREAM) {
  549. debug("shim_listen: not a stream socket\n");
  550. put_handle(hdl);
  551. return -EINVAL;
  552. }
  553. lock(hdl->lock);
  554. enum shim_sock_state state = sock->sock_state;
  555. int ret = -EINVAL;
  556. if (state != SOCK_BOUND) {
  557. debug("shim_listen: listen on unbound socket\n");
  558. goto out;
  559. }
  560. hdl->acc_mode = MAY_READ;
  561. sock->sock_state = SOCK_LISTENED;
  562. ret = 0;
  563. out:
  564. if (ret < 0)
  565. sock->sock_state = state;
  566. unlock(hdl->lock);
  567. put_handle(hdl);
  568. return ret;
  569. }
  570. /* Connect with the TCP socket is always in the client.
  571. *
  572. * With UDP, the connection is make to the socket specific for a
  573. * destination. A process with a connected UDP socket can call
  574. * connect again for that socket for one of two reasons: 1. To
  575. * specify a new IP address and port 2. To unconnect the socket.
  576. */
  577. int shim_do_connect (int sockfd, struct sockaddr * addr, int addrlen)
  578. {
  579. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  580. if (!hdl)
  581. return -EBADF;
  582. if (hdl->type != TYPE_SOCK) {
  583. put_handle(hdl);
  584. return -ENOTSOCK;
  585. }
  586. struct shim_sock_handle * sock = &hdl->info.sock;
  587. lock(hdl->lock);
  588. enum shim_sock_state state = sock->sock_state;
  589. int ret = -EINVAL;
  590. if (state == SOCK_CONNECTED) {
  591. if (addr->sa_family == AF_UNSPEC) {
  592. sock->sock_state = SOCK_CREATED;
  593. if (sock->sock_type == SOCK_STREAM && hdl->pal_handle) {
  594. DkStreamDelete(hdl->pal_handle, 0);
  595. DkObjectClose(hdl->pal_handle);
  596. hdl->pal_handle = NULL;
  597. }
  598. debug("shim_connect: reconnect on a stream socket\n");
  599. ret = 0;
  600. goto out;
  601. }
  602. debug("shim_connect: reconnect on a stream socket\n");
  603. goto out;
  604. }
  605. if (state != SOCK_BOUND &&
  606. state != SOCK_CREATED) {
  607. debug("shim_connect: connect on invalid socket\n");
  608. goto out;
  609. }
  610. if (sock->domain == AF_UNIX) {
  611. if (addrlen != sizeof(struct sockaddr_un))
  612. goto out;
  613. struct sockaddr_un * saddr = (struct sockaddr_un *) addr;
  614. char * spath = saddr->sun_path;
  615. struct shim_dentry * dent;
  616. if ((ret = path_lookupat(NULL, spath, LOOKUP_CREATE, &dent, NULL)) < 0)
  617. goto out;
  618. struct shim_unix_data * data = dent->data;
  619. if (!(dent->state & DENTRY_VALID) || dent->state & DENTRY_NEGATIVE) {
  620. data = malloc(sizeof(struct shim_unix_data));
  621. data->pipeid = dent->rel_path.hash >> 32;
  622. } else if (dent->fs != &socket_builtin_fs) {
  623. ret = -ECONNREFUSED;
  624. goto out;
  625. }
  626. sock->addr.un.pipeid = data->pipeid;
  627. sock->addr.un.data = data;
  628. sock->addr.un.dentry = dent;
  629. get_dentry(dent);
  630. }
  631. if (state == SOCK_BOUND) {
  632. /* if the socket is bound, the stream needs to be shut and rebound. */
  633. assert(hdl->pal_handle);
  634. DkStreamDelete(hdl->pal_handle, 0);
  635. DkObjectClose(hdl->pal_handle);
  636. hdl->pal_handle = NULL;
  637. }
  638. if (sock->domain != AF_UNIX) {
  639. if (!inet_check_addr(sock->domain, addr, addrlen))
  640. goto out;
  641. inet_save_addr(sock->domain, &sock->addr.in.conn, addr);
  642. inet_rebase_port(false, sock->domain, &sock->addr.in.conn, false);
  643. }
  644. sock->sock_state = (state == SOCK_BOUND) ? SOCK_BOUNDCONNECTED :
  645. SOCK_CONNECTED;
  646. if ((ret = create_socket_uri(hdl)) < 0)
  647. goto out;
  648. PAL_HANDLE pal_hdl = DkStreamOpen(qstrgetstr(&hdl->uri),
  649. 0, 0, 0,
  650. hdl->flags & O_NONBLOCK);
  651. if (!pal_hdl) {
  652. ret = -PAL_ERRNO;
  653. goto out;
  654. }
  655. hdl->pal_handle = pal_hdl;
  656. if (sock->domain == AF_UNIX) {
  657. struct shim_dentry * dent = sock->addr.un.dentry;
  658. lock(dent->lock);
  659. dent->state ^= DENTRY_NEGATIVE;
  660. dent->state |= DENTRY_VALID|DENTRY_RECENTLY;
  661. dent->fs = &socket_builtin_fs;
  662. dent->data = sock->addr.un.data;
  663. unlock(dent->lock);
  664. }
  665. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  666. char uri[SOCK_URI_SIZE];
  667. if (!DkStreamGetName(pal_hdl, uri, SOCK_URI_SIZE)) {
  668. ret = -PAL_ERRNO;
  669. goto out;
  670. }
  671. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  672. &sock->addr.in.bind,
  673. &sock->addr.in.conn)) < 0)
  674. goto out;
  675. inet_rebase_port(true, sock->domain, &sock->addr.in.bind, true);
  676. inet_rebase_port(true, sock->domain, &sock->addr.in.conn, false);
  677. }
  678. hdl->acc_mode = MAY_READ|MAY_WRITE;
  679. __process_pending_options(hdl);
  680. ret = 0;
  681. out:
  682. if (ret < 0) {
  683. sock->sock_state = state;
  684. sock->error = -ret;
  685. if (sock->domain == AF_UNIX) {
  686. if (sock->addr.un.dentry)
  687. put_dentry(sock->addr.un.dentry);
  688. if (sock->addr.un.data) {
  689. free(sock->addr.un.data);
  690. sock->addr.un.data = NULL;
  691. }
  692. }
  693. }
  694. unlock(hdl->lock);
  695. put_handle(hdl);
  696. return ret;
  697. }
  698. int __do_accept (struct shim_handle * hdl, int flags, struct sockaddr * addr,
  699. socklen_t * addrlen)
  700. {
  701. if (hdl->type != TYPE_SOCK)
  702. return -ENOTSOCK;
  703. struct shim_sock_handle * sock = &hdl->info.sock;
  704. int ret;
  705. PAL_HANDLE accepted = NULL;
  706. if (sock->sock_type != SOCK_STREAM) {
  707. debug("shim_accept: not a stream socket\n");
  708. return -EOPNOTSUPP;
  709. }
  710. lock(hdl->lock);
  711. if (sock->sock_state != SOCK_LISTENED) {
  712. debug("shim_accpet: invalid socket\n");
  713. ret = -EINVAL;
  714. goto out;
  715. }
  716. accepted = DkStreamWaitForClient(hdl->pal_handle);
  717. if (!accepted) {
  718. ret = -PAL_ERRNO;
  719. goto out;
  720. }
  721. if (flags & O_NONBLOCK) {
  722. PAL_STREAM_ATTR attr;
  723. if (!DkStreamAttributesQuerybyHandle(accepted, &attr)) {
  724. ret = -PAL_ERRNO;
  725. goto out;
  726. }
  727. attr.nonblocking = PAL_TRUE;
  728. if (!DkStreamAttributesSetbyHandle(accepted, &attr)) {
  729. ret = -PAL_ERRNO;
  730. goto out;
  731. }
  732. }
  733. struct shim_handle * cli = get_new_handle();
  734. if (!cli) {
  735. ret = -ENOMEM;
  736. goto out;
  737. }
  738. struct shim_sock_handle * cli_sock = &cli->info.sock;
  739. cli->type = TYPE_SOCK;
  740. set_handle_fs(cli, &socket_builtin_fs);
  741. cli->acc_mode = MAY_READ|MAY_WRITE;
  742. cli->flags = O_RDWR|flags;
  743. cli->pal_handle = accepted;
  744. accepted = NULL;
  745. cli_sock->domain = sock->domain;
  746. cli_sock->sock_type = sock->sock_type;
  747. cli_sock->protocol = sock->protocol;
  748. cli_sock->sock_state = SOCK_ACCEPTED;
  749. if (sock->domain == AF_UNIX) {
  750. cli_sock->addr.un.pipeid = sock->addr.un.pipeid;
  751. if (sock->addr.un.dentry) {
  752. get_dentry(sock->addr.un.dentry);
  753. cli_sock->addr.un.dentry = sock->addr.un.dentry;
  754. }
  755. qstrsetstr(&cli->uri, qstrgetstr(&hdl->uri), hdl->uri.len);
  756. if (addr) {
  757. unix_copy_addr(addr, sock->addr.un.dentry);
  758. if (addrlen)
  759. *addrlen = sizeof(struct sockaddr_un);
  760. }
  761. }
  762. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  763. char uri[SOCK_URI_SIZE];
  764. int uri_len;
  765. if (!(uri_len = DkStreamGetName(cli->pal_handle, uri, SOCK_URI_SIZE))) {
  766. ret = -PAL_ERRNO;
  767. goto out_cli;
  768. }
  769. if ((ret = inet_parse_addr(cli_sock->domain, cli_sock->sock_type, uri,
  770. &cli_sock->addr.in.bind,
  771. &cli_sock->addr.in.conn)) < 0)
  772. goto out_cli;
  773. qstrsetstr(&cli->uri, uri, uri_len);
  774. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.bind, true);
  775. inet_rebase_port(true, cli_sock->domain, &cli_sock->addr.in.conn, false);
  776. if (addr) {
  777. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  778. if (addrlen)
  779. *addrlen = (sock->domain == AF_INET) ?
  780. sizeof(struct sockaddr_in) :
  781. sizeof(struct sockaddr_in6);
  782. }
  783. }
  784. ret = set_new_fd_handle(cli, flags & O_CLOEXEC ? FD_CLOEXEC : 0, NULL);
  785. out_cli:
  786. put_handle(cli);
  787. out:
  788. if (ret < 0)
  789. sock->error = -ret;
  790. if (accepted)
  791. DkObjectClose(accepted);
  792. unlock(hdl->lock);
  793. return ret;
  794. }
  795. int shim_do_accept (int fd, struct sockaddr * addr, socklen_t * addrlen)
  796. {
  797. int flags;
  798. struct shim_handle * hdl = get_fd_handle(fd, &flags, NULL);
  799. if (!hdl)
  800. return -EBADF;
  801. int ret = __do_accept(hdl, flags & O_CLOEXEC,
  802. addr, addrlen);
  803. put_handle(hdl);
  804. return ret;
  805. }
  806. int shim_do_accept4 (int fd, struct sockaddr * addr, socklen_t * addrlen,
  807. int flags)
  808. {
  809. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  810. if (!hdl)
  811. return -EBADF;
  812. int ret = __do_accept(hdl,
  813. (flags & SOCK_CLOEXEC ? O_CLOEXEC : 0) |
  814. (flags & SOCK_NONBLOCK ? O_NONBLOCK : 0),
  815. addr, addrlen);
  816. put_handle(hdl);
  817. return ret;
  818. }
  819. static ssize_t do_sendmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  820. const struct sockaddr * addr, socklen_t addrlen)
  821. {
  822. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  823. if (!hdl)
  824. return -EBADF;
  825. int ret = -EINVAL;
  826. if (hdl->type != TYPE_SOCK) {
  827. ret = -ENOTSOCK;
  828. goto out;
  829. }
  830. struct shim_sock_handle * sock = &hdl->info.sock;
  831. lock(hdl->lock);
  832. PAL_HANDLE pal_hdl = hdl->pal_handle;
  833. char * uri = NULL;
  834. /* Data gram sock need not be conneted or bound at all */
  835. if (sock->sock_type == SOCK_STREAM &&
  836. sock->sock_state != SOCK_CONNECTED &&
  837. sock->sock_state != SOCK_BOUNDCONNECTED &&
  838. sock->sock_state != SOCK_ACCEPTED) {
  839. ret = -ENOTCONN;
  840. goto out_locked;
  841. }
  842. if (sock->sock_type == SOCK_DGRAM &&
  843. sock->sock_state == SOCK_SHUTDOWN) {
  844. ret = -ENOTCONN;
  845. goto out_locked;
  846. }
  847. if (!(hdl->acc_mode & MAY_WRITE)) {
  848. ret = -ECONNRESET;
  849. goto out_locked;
  850. }
  851. if (sock->sock_type == SOCK_DGRAM &&
  852. sock->sock_state != SOCK_BOUNDCONNECTED &&
  853. sock->sock_state != SOCK_CONNECTED) {
  854. if (!addr) {
  855. ret = -EDESTADDRREQ;
  856. goto out_locked;
  857. }
  858. if (sock->sock_state == SOCK_CREATED && !pal_hdl) {
  859. pal_hdl = DkStreamOpen("udp:", 0, 0, 0,
  860. hdl->flags & O_NONBLOCK);
  861. if (!pal_hdl) {
  862. ret = -PAL_ERRNO;
  863. goto out_locked;
  864. }
  865. hdl->pal_handle = pal_hdl;
  866. }
  867. if (addr && addr->sa_family != sock->domain) {
  868. ret = -EINVAL;
  869. goto out_locked;
  870. }
  871. uri = __alloca(SOCK_URI_SIZE);
  872. }
  873. unlock(hdl->lock);
  874. if (uri) {
  875. struct addr_inet addr_buf;
  876. inet_save_addr(sock->domain, &addr_buf, addr);
  877. inet_rebase_port(false, sock->domain, &addr_buf, false);
  878. memcpy(uri, "udp:", 5);
  879. if ((ret = inet_translate_addr(sock->domain, uri + 4, SOCK_URI_SIZE - 4,
  880. &addr_buf)) < 0) {
  881. lock(hdl->lock);
  882. goto out_locked;
  883. }
  884. debug("next packet send to %s\n", uri);
  885. }
  886. int bytes = 0;
  887. ret = 0;
  888. for (int i = 0 ; i < nbufs ; i++) {
  889. ret = DkStreamWrite(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  890. uri);
  891. if (!ret) {
  892. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMEXIST) ?
  893. - ECONNABORTED : -PAL_ERRNO;
  894. break;
  895. }
  896. bytes += ret;
  897. }
  898. if (bytes)
  899. ret = bytes;
  900. if (ret < 0) {
  901. lock(hdl->lock);
  902. goto out_locked;
  903. }
  904. goto out;
  905. out_locked:
  906. if (ret < 0)
  907. sock->error = -ret;
  908. unlock(hdl->lock);
  909. out:
  910. put_handle(hdl);
  911. return ret;
  912. }
  913. ssize_t shim_do_sendto (int sockfd, const void * buf, size_t len, int flags,
  914. const struct sockaddr * addr, socklen_t addrlen)
  915. {
  916. struct iovec iovbuf;
  917. iovbuf.iov_base = (void *) buf;
  918. iovbuf.iov_len = len;
  919. return do_sendmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  920. }
  921. ssize_t shim_do_sendmsg (int sockfd, struct msghdr * msg, int flags)
  922. {
  923. return do_sendmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  924. msg->msg_name, msg->msg_namelen);
  925. }
  926. int shim_do_sendmmsg (int sockfd, struct mmsghdr * msg, int vlen, int flags)
  927. {
  928. int i, total = 0;
  929. for (i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  930. struct msghdr * m = &msg[i].msg_hdr;
  931. int bytes = do_sendmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  932. m->msg_name, m->msg_namelen);
  933. if (bytes < 0)
  934. return total ? : bytes;
  935. msg[i].msg_len = bytes;
  936. total++;
  937. }
  938. return total;
  939. }
  940. static ssize_t do_recvmsg (int fd, struct iovec * bufs, int nbufs, int flags,
  941. struct sockaddr * addr, socklen_t * addrlen)
  942. {
  943. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  944. if (!hdl)
  945. return -EBADF;
  946. int ret = 0;
  947. if (hdl->type != TYPE_SOCK) {
  948. ret = -ENOTSOCK;
  949. goto out;
  950. }
  951. struct shim_sock_handle * sock = &hdl->info.sock;
  952. lock(hdl->lock);
  953. PAL_HANDLE pal_hdl = hdl->pal_handle;
  954. char * uri = NULL;
  955. if (sock->sock_type == SOCK_STREAM &&
  956. sock->sock_state != SOCK_CONNECTED &&
  957. sock->sock_state != SOCK_BOUNDCONNECTED &&
  958. sock->sock_state != SOCK_ACCEPTED) {
  959. ret = -ENOTCONN;
  960. goto out_locked;
  961. }
  962. if (!(hdl->acc_mode & MAY_READ)) {
  963. ret = 0;
  964. goto out_locked;
  965. }
  966. if (addr && sock->sock_type == SOCK_DGRAM &&
  967. sock->sock_state != SOCK_CONNECTED &&
  968. sock->sock_state != SOCK_BOUNDCONNECTED) {
  969. if (sock->sock_state == SOCK_CREATED) {
  970. ret = -EINVAL;
  971. goto out_locked;
  972. }
  973. uri = __alloca(SOCK_URI_SIZE);
  974. }
  975. unlock(hdl->lock);
  976. bool address_received = false;
  977. int bytes = 0;
  978. ret = 0;
  979. for (int i = 0 ; i < nbufs ; i++) {
  980. ret = DkStreamRead(pal_hdl, 0, bufs[i].iov_len, bufs[i].iov_base,
  981. uri, uri ? SOCK_URI_SIZE : 0);
  982. if (!ret) {
  983. ret = (PAL_NATIVE_ERRNO == PAL_ERROR_STREAMNOTEXIST) ?
  984. - ECONNABORTED : -PAL_ERRNO;
  985. break;
  986. }
  987. bytes += ret;
  988. if (!addr || !bytes || address_received)
  989. continue;
  990. if (sock->domain == AF_UNIX) {
  991. unix_copy_addr(addr, sock->addr.un.dentry);
  992. *addrlen = sizeof(struct sockaddr_un);
  993. }
  994. if (sock->domain == AF_INET || sock->domain == AF_INET6) {
  995. if (uri) {
  996. struct addr_inet conn;
  997. if ((ret = inet_parse_addr(sock->domain, sock->sock_type, uri,
  998. &conn, NULL)) < 0) {
  999. lock(hdl->lock);
  1000. goto out_locked;
  1001. }
  1002. debug("last packet received from %s\n", uri);
  1003. inet_rebase_port(true, sock->domain, &conn, false);
  1004. inet_copy_addr(sock->domain, addr, &conn);
  1005. } else {
  1006. inet_copy_addr(sock->domain, addr, &sock->addr.in.conn);
  1007. }
  1008. *addrlen = (sock->domain == AF_INET) ?
  1009. sizeof(struct sockaddr_in) : sizeof(struct sockaddr_in6);
  1010. }
  1011. address_received = false;
  1012. }
  1013. if (bytes)
  1014. ret = bytes;
  1015. if (ret < 0) {
  1016. lock(hdl->lock);
  1017. goto out_locked;
  1018. }
  1019. goto out;
  1020. out_locked:
  1021. if (ret < 0)
  1022. sock->error = -ret;
  1023. unlock(hdl->lock);
  1024. out:
  1025. put_handle(hdl);
  1026. return ret;
  1027. }
  1028. ssize_t shim_do_recvfrom (int sockfd, void * buf, size_t len, int flags,
  1029. struct sockaddr * addr, socklen_t * addrlen)
  1030. {
  1031. struct iovec iovbuf;
  1032. iovbuf.iov_base = (void *) buf;
  1033. iovbuf.iov_len = len;
  1034. return do_recvmsg(sockfd, &iovbuf, 1, flags, addr, addrlen);
  1035. }
  1036. ssize_t shim_do_recvmsg (int sockfd, struct msghdr * msg, int flags)
  1037. {
  1038. return do_recvmsg(sockfd, msg->msg_iov, msg->msg_iovlen, flags,
  1039. msg->msg_name, &msg->msg_namelen);
  1040. }
  1041. int shim_do_recvmmsg (int sockfd, struct mmsghdr * msg, int vlen, int flags,
  1042. struct __kernel_timespec * timeout)
  1043. {
  1044. int i, total = 0;
  1045. for (i = 0 ; i * sizeof(struct mmsghdr) < vlen ; i++) {
  1046. struct msghdr * m = &msg[i].msg_hdr;
  1047. int bytes = do_recvmsg(sockfd, m->msg_iov, m->msg_iovlen, flags,
  1048. m->msg_name, &m->msg_namelen);
  1049. if (bytes < 0)
  1050. return total ? : bytes;
  1051. msg[i].msg_len = bytes;
  1052. total++;
  1053. }
  1054. return total;
  1055. }
  1056. #define SHUT_RD 0
  1057. #define SHUT_WR 1
  1058. #define SHUT_RDWR 2
  1059. int shim_do_shutdown (int sockfd, int how)
  1060. {
  1061. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1062. if (!hdl)
  1063. return -EBADF;
  1064. int ret = 0;
  1065. struct shim_sock_handle * sock = &hdl->info.sock;
  1066. if (hdl->type != TYPE_SOCK) {
  1067. ret = -ENOTSOCK;
  1068. goto out;
  1069. }
  1070. lock(hdl->lock);
  1071. if (sock->sock_state != SOCK_LISTENED &&
  1072. sock->sock_state != SOCK_ACCEPTED &&
  1073. sock->sock_state != SOCK_CONNECTED &&
  1074. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1075. ret = -ENOTCONN;
  1076. goto out_locked;
  1077. }
  1078. switch (how) {
  1079. case SHUT_RD:
  1080. DkStreamDelete(hdl->pal_handle, PAL_DELETE_RD);
  1081. hdl->acc_mode &= ~MAY_READ;
  1082. break;
  1083. case SHUT_WR:
  1084. DkStreamDelete(hdl->pal_handle, PAL_DELETE_WR);
  1085. hdl->acc_mode &= ~MAY_WRITE;
  1086. break;
  1087. case SHUT_RDWR:
  1088. DkStreamDelete(hdl->pal_handle, 0);
  1089. hdl->acc_mode = 0;
  1090. sock->sock_state = SOCK_SHUTDOWN;
  1091. break;
  1092. }
  1093. ret = 0;
  1094. out_locked:
  1095. if (ret < 0)
  1096. sock->error = -ret;
  1097. unlock(hdl->lock);
  1098. out:
  1099. put_handle(hdl);
  1100. return ret;
  1101. }
  1102. int shim_do_getsockname (int sockfd, struct sockaddr * addr, int * addrlen)
  1103. {
  1104. if (!addr || !addrlen)
  1105. return -EFAULT;
  1106. if (*addrlen <= 0)
  1107. return -EINVAL;
  1108. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1109. if (!hdl)
  1110. return -EBADF;
  1111. int ret = -EINVAL;
  1112. if (hdl->type != TYPE_SOCK) {
  1113. ret = -ENOTSOCK;
  1114. goto out;
  1115. }
  1116. struct shim_sock_handle * sock = &hdl->info.sock;
  1117. lock(hdl->lock);
  1118. struct sockaddr saddr;
  1119. int len = inet_copy_addr(sock->domain, &saddr, &sock->addr.in.bind);
  1120. if (len < *addrlen)
  1121. len = *addrlen;
  1122. memcpy(addr, &saddr, len);
  1123. *addrlen = len;
  1124. ret = 0;
  1125. unlock(hdl->lock);
  1126. out:
  1127. put_handle(hdl);
  1128. return ret;
  1129. }
  1130. int shim_do_getpeername (int sockfd, struct sockaddr * addr, int * addrlen)
  1131. {
  1132. if (!addr || !addrlen)
  1133. return -EFAULT;
  1134. if (*addrlen <= 0)
  1135. return -EINVAL;
  1136. struct shim_handle * hdl = get_fd_handle(sockfd, NULL, NULL);
  1137. if (!hdl)
  1138. return -EBADF;
  1139. int ret = -EINVAL;
  1140. if (hdl->type != TYPE_SOCK) {
  1141. ret = -ENOTSOCK;
  1142. goto out;
  1143. }
  1144. struct shim_sock_handle * sock = &hdl->info.sock;
  1145. lock(hdl->lock);
  1146. /* Data gram sock need not be conneted or bound at all */
  1147. if (sock->sock_type == SOCK_STREAM &&
  1148. sock->sock_state != SOCK_CONNECTED &&
  1149. sock->sock_state != SOCK_BOUNDCONNECTED &&
  1150. sock->sock_state != SOCK_ACCEPTED) {
  1151. ret = -ENOTCONN;
  1152. goto out_locked;
  1153. }
  1154. if (sock->sock_type == SOCK_DGRAM &&
  1155. sock->sock_state != SOCK_CONNECTED &&
  1156. sock->sock_state != SOCK_BOUNDCONNECTED) {
  1157. ret = -ENOTCONN;
  1158. goto out_locked;
  1159. }
  1160. struct sockaddr saddr;
  1161. int len = inet_copy_addr (sock->domain, &saddr, &sock->addr.in.conn);
  1162. if (len < *addrlen)
  1163. len = *addrlen;
  1164. memcpy(addr, &saddr, len);
  1165. *addrlen = len;
  1166. ret = 0;
  1167. out_locked:
  1168. unlock(hdl->lock);
  1169. out:
  1170. put_handle(hdl);
  1171. return ret;
  1172. }
  1173. struct __kernel_linger {
  1174. int l_onoff;
  1175. int l_linger;
  1176. };
  1177. static int __do_setsockopt (struct shim_handle * hdl, int level, int optname,
  1178. char * optval, int optlen, PAL_STREAM_ATTR * attr)
  1179. {
  1180. int intval = *((int *) optval);
  1181. PAL_BOL bolval = intval ? PAL_TRUE : PAL_FALSE;
  1182. if (level == SOL_SOCKET) {
  1183. switch(optname) {
  1184. case SO_ACCEPTCONN:
  1185. case SO_DOMAIN:
  1186. case SO_ERROR:
  1187. case SO_PROTOCOL:
  1188. case SO_TYPE:
  1189. return -EPERM;
  1190. case SO_KEEPALIVE:
  1191. case SO_LINGER:
  1192. case SO_RCVBUF:
  1193. case SO_SNDBUF:
  1194. case SO_RCVTIMEO:
  1195. case SO_SNDTIMEO:
  1196. case SO_REUSEADDR:
  1197. goto query;
  1198. default:
  1199. goto unknown;
  1200. }
  1201. }
  1202. if (level == SOL_TCP) {
  1203. switch(optname) {
  1204. case TCP_CORK:
  1205. case TCP_NODELAY:
  1206. goto query;
  1207. default:
  1208. goto unknown;
  1209. }
  1210. }
  1211. unknown:
  1212. return -ENOPROTOOPT;
  1213. query:
  1214. if (!attr) {
  1215. attr = __alloca(sizeof(PAL_STREAM_ATTR));
  1216. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, attr))
  1217. return -PAL_ERRNO;
  1218. }
  1219. if (level == SOL_SOCKET) {
  1220. switch(optname) {
  1221. case SO_KEEPALIVE:
  1222. if (bolval != attr->socket.tcp_keepalive) {
  1223. attr->socket.tcp_keepalive = bolval;
  1224. goto set;
  1225. }
  1226. break;
  1227. case SO_LINGER: {
  1228. struct __kernel_linger * l = (struct __kernel_linger *) optval;
  1229. int linger = l->l_onoff ? l->l_linger : 0;
  1230. if (linger != (int) attr->socket.linger) {
  1231. attr->socket.linger = linger;
  1232. goto set;
  1233. }
  1234. break;
  1235. }
  1236. case SO_RCVBUF:
  1237. if (intval != (int) attr->socket.receivebuf) {
  1238. attr->socket.receivebuf = intval;
  1239. goto set;
  1240. }
  1241. break;
  1242. case SO_SNDBUF:
  1243. if (intval != (int) attr->socket.sendbuf) {
  1244. attr->socket.sendbuf = intval;
  1245. goto set;
  1246. }
  1247. break;
  1248. case SO_RCVTIMEO:
  1249. if (intval != (int) attr->socket.receivetimeout) {
  1250. attr->socket.receivetimeout = intval;
  1251. goto set;
  1252. }
  1253. break;
  1254. case SO_SNDTIMEO:
  1255. if (intval != (int) attr->socket.sendtimeout) {
  1256. attr->socket.sendtimeout = intval;
  1257. goto set;
  1258. }
  1259. break;
  1260. case SO_REUSEADDR:
  1261. break;
  1262. }
  1263. }
  1264. if (level == SOL_TCP) {
  1265. switch(optname) {
  1266. case TCP_CORK:
  1267. if (bolval != attr->socket.tcp_cork) {
  1268. attr->socket.tcp_cork = bolval;
  1269. goto set;
  1270. }
  1271. break;
  1272. case TCP_NODELAY:
  1273. if (bolval != attr->socket.tcp_nodelay) {
  1274. attr->socket.tcp_nodelay = bolval;
  1275. goto set;
  1276. }
  1277. break;
  1278. }
  1279. }
  1280. return 0;
  1281. set:
  1282. if (!DkStreamAttributesSetbyHandle(hdl->pal_handle, attr))
  1283. return -PAL_ERRNO;
  1284. return 0;
  1285. }
  1286. static int __process_pending_options (struct shim_handle * hdl)
  1287. {
  1288. struct shim_sock_handle * sock = &hdl->info.sock;
  1289. if (!sock->pending_options)
  1290. return 0;
  1291. PAL_STREAM_ATTR attr;
  1292. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr))
  1293. return -PAL_ERRNO;
  1294. struct shim_sock_option * o = sock->pending_options;
  1295. while (o) {
  1296. PAL_STREAM_ATTR tmp = attr;
  1297. int ret = __do_setsockopt(hdl, o->level, o->optname, o->optval,
  1298. o->optlen, &tmp);
  1299. if (!ret)
  1300. attr = tmp;
  1301. struct shim_sock_option * next = o->next;
  1302. free(o);
  1303. o = next;
  1304. }
  1305. return 0;
  1306. }
  1307. int shim_do_setsockopt (int fd, int level, int optname, char * optval,
  1308. int optlen)
  1309. {
  1310. if (!optval)
  1311. return -EFAULT;
  1312. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1313. if (!hdl)
  1314. return -EBADF;
  1315. int ret = 0;
  1316. if (hdl->type != TYPE_SOCK) {
  1317. ret = -ENOTSOCK;
  1318. goto out;
  1319. }
  1320. struct shim_sock_handle * sock = &hdl->info.sock;
  1321. lock(hdl->lock);
  1322. if (!hdl->pal_handle) {
  1323. struct shim_sock_option * o = malloc(sizeof(struct shim_sock_option) +
  1324. optlen);
  1325. if (!o) {
  1326. ret = -ENOMEM;
  1327. goto out_locked;
  1328. }
  1329. struct shim_sock_option ** next = &sock->pending_options;
  1330. while (*next)
  1331. next = &(*next)->next;
  1332. o->next = NULL;
  1333. *next = o;
  1334. o->level = level;
  1335. o->optname = optname;
  1336. o->optlen = optlen;
  1337. memcpy(&o->optval, optval, optlen);
  1338. goto out_locked;
  1339. }
  1340. ret = __do_setsockopt(hdl, level, optname, optval, optlen, NULL);
  1341. out_locked:
  1342. unlock(hdl->lock);
  1343. out:
  1344. put_handle(hdl);
  1345. return ret;
  1346. }
  1347. int shim_do_getsockopt (int fd, int level, int optname, char * optval,
  1348. int * optlen)
  1349. {
  1350. if (!optval || !optlen)
  1351. return -EFAULT;
  1352. struct shim_handle * hdl = get_fd_handle(fd, NULL, NULL);
  1353. if (!hdl)
  1354. return -EBADF;
  1355. int ret = 0;
  1356. if (hdl->type != TYPE_SOCK) {
  1357. ret = -ENOTSOCK;
  1358. goto out;
  1359. }
  1360. struct shim_sock_handle * sock = &hdl->info.sock;
  1361. lock(hdl->lock);
  1362. int * intval = (int *) optval;
  1363. if (level == SOL_SOCKET) {
  1364. switch(optname) {
  1365. case SO_ACCEPTCONN:
  1366. *intval = (sock->sock_state == SOCK_LISTENED) ? 1 : 0;
  1367. goto out;
  1368. case SO_DOMAIN:
  1369. *intval = sock->domain;
  1370. goto out;
  1371. case SO_ERROR:
  1372. *intval = sock->error;
  1373. goto out;
  1374. case SO_PROTOCOL:
  1375. switch(sock->protocol) {
  1376. case SOCK_STREAM:
  1377. *intval = IPPROTO_SCTP;
  1378. break;
  1379. case SOCK_DGRAM:
  1380. *intval = IPPROTO_UDP;
  1381. break;
  1382. default:
  1383. goto unknown;
  1384. }
  1385. goto out;
  1386. case SO_TYPE:
  1387. *intval = sock->sock_type;
  1388. goto out;
  1389. case SO_KEEPALIVE:
  1390. case SO_LINGER:
  1391. case SO_RCVBUF:
  1392. case SO_SNDBUF:
  1393. case SO_RCVTIMEO:
  1394. case SO_SNDTIMEO:
  1395. case SO_REUSEADDR:
  1396. goto query;
  1397. default:
  1398. goto unknown;
  1399. }
  1400. }
  1401. if (level == SOL_TCP) {
  1402. switch(optname) {
  1403. case TCP_CORK:
  1404. case TCP_NODELAY:
  1405. goto query;
  1406. default:
  1407. goto unknown;
  1408. }
  1409. }
  1410. unknown:
  1411. ret = -ENOPROTOOPT;
  1412. goto out;
  1413. query:
  1414. {
  1415. PAL_STREAM_ATTR attr;
  1416. if (!DkStreamAttributesQuerybyHandle(hdl->pal_handle, &attr)) {
  1417. ret = -PAL_ERRNO;
  1418. goto out;
  1419. }
  1420. if (level == SOL_SOCKET) {
  1421. switch(optname) {
  1422. case SO_KEEPALIVE:
  1423. *intval = attr.socket.tcp_keepalive ? 1 : 0;
  1424. break;
  1425. case SO_LINGER: {
  1426. struct __kernel_linger * l =
  1427. (struct __kernel_linger *) optval;
  1428. l->l_onoff = attr.socket.linger ? 1 : 0;
  1429. l->l_linger = attr.socket.linger;
  1430. break;
  1431. }
  1432. case SO_RCVBUF:
  1433. *intval = attr.socket.receivebuf;
  1434. break;
  1435. case SO_SNDBUF:
  1436. *intval = attr.socket.sendbuf;
  1437. break;
  1438. case SO_RCVTIMEO:
  1439. *intval = attr.socket.receivetimeout;
  1440. break;
  1441. case SO_SNDTIMEO:
  1442. *intval = attr.socket.sendtimeout;
  1443. break;
  1444. case SO_REUSEADDR:
  1445. *intval = 1;
  1446. break;
  1447. }
  1448. }
  1449. if (level == SOL_TCP) {
  1450. switch(optname) {
  1451. case TCP_CORK:
  1452. *intval = attr.socket.tcp_cork ? 1 : 0;
  1453. break;
  1454. case TCP_NODELAY:
  1455. *intval = attr.socket.tcp_nodelay ? 1 : 0;
  1456. break;
  1457. }
  1458. }
  1459. }
  1460. out:
  1461. unlock(hdl->lock);
  1462. put_handle(hdl);
  1463. return ret;
  1464. }