/*- * Copyright (c) 1995 Søren Schmidt * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer * in this position and unchanged. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. The name of the author may not be used to endorse or promote products * derived from this software without specific prior written permission * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include __FBSDID("$FreeBSD: head/sys/compat/linux/linux_socket.c 116173 2003-06-10 21:29:12Z obrien $"); /* XXX we use functions that might not exist. */ #include "opt_compat.h" #include "opt_inet6.h" #ifndef COMPAT_43 #error "Unable to compile Linux-emulator due to missing COMPAT_43 option!" #endif #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef INET6 #include #include #endif #include #include #include #include static int do_sa_get(struct sockaddr **, const struct osockaddr *, int *, struct malloc_type *); static int linux_to_bsd_domain(int); /* * Reads a linux sockaddr and does any necessary translation. * Linux sockaddrs don't have a length field, only a family. */ static int linux_getsockaddr(struct sockaddr **sap, const struct osockaddr *osa, int len) { int osalen = len; return (do_sa_get(sap, osa, &osalen, M_SONAME)); } /* * Copy the osockaddr structure pointed to by osa to kernel, adjust * family and convert to sockaddr. */ static int do_sa_get(struct sockaddr **sap, const struct osockaddr *osa, int *osalen, struct malloc_type *mtype) { int error=0, bdom; struct sockaddr *sa; struct osockaddr *kosa; int alloclen; #ifdef INET6 int oldv6size; struct sockaddr_in6 *sin6; #endif if (*osalen < 2 || *osalen > UCHAR_MAX || !osa) return (EINVAL); alloclen = *osalen; #ifdef INET6 oldv6size = 0; /* * Check for old (pre-RFC2553) sockaddr_in6. We may accept it * if it's a v4-mapped address, so reserve the proper space * for it. */ if (alloclen == sizeof (struct sockaddr_in6) - sizeof (u_int32_t)) { alloclen = sizeof (struct sockaddr_in6); oldv6size = 1; } #endif MALLOC(kosa, struct osockaddr *, alloclen, mtype, M_WAITOK); if ((error = copyin(osa, kosa, *osalen))) goto out; bdom = linux_to_bsd_domain(kosa->sa_family); if (bdom == -1) { error = EINVAL; goto out; } #ifdef INET6 /* * Older Linux IPv6 code uses obsolete RFC2133 struct sockaddr_in6, * which lacks the scope id compared with RFC2553 one. If we detect * the situation, reject the address and write a message to system log. * * Still accept addresses for which the scope id is not used. */ if (oldv6size && bdom == AF_INET6) { sin6 = (struct sockaddr_in6 *)kosa; if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr) || (!IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) && !IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr) && !IN6_IS_ADDR_V4COMPAT(&sin6->sin6_addr) && !IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) && !IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr))) { sin6->sin6_scope_id = 0; } else { log(LOG_DEBUG, "obsolete pre-RFC2553 sockaddr_in6 rejected"); error = EINVAL; goto out; } } else #endif if (bdom == AF_INET) alloclen = sizeof(struct sockaddr_in); sa = (struct sockaddr *) kosa; sa->sa_family = bdom; sa->sa_len = alloclen; *sap = sa; *osalen = alloclen; return (0); out: FREE(kosa, mtype); return (error); } static int linux_to_bsd_domain(int domain) { switch (domain) { case LINUX_AF_UNSPEC: return (AF_UNSPEC); case LINUX_AF_UNIX: return (AF_LOCAL); case LINUX_AF_INET: return (AF_INET); case LINUX_AF_INET6: return (AF_INET6); case LINUX_AF_AX25: return (AF_CCITT); case LINUX_AF_IPX: return (AF_IPX); case LINUX_AF_APPLETALK: return (AF_APPLETALK); } return (-1); } #ifndef __alpha__ static int bsd_to_linux_domain(int domain) { switch (domain) { case AF_UNSPEC: return (LINUX_AF_UNSPEC); case AF_LOCAL: return (LINUX_AF_UNIX); case AF_INET: return (LINUX_AF_INET); case AF_INET6: return (LINUX_AF_INET6); case AF_CCITT: return (LINUX_AF_AX25); case AF_IPX: return (LINUX_AF_IPX); case AF_APPLETALK: return (LINUX_AF_APPLETALK); } return (-1); } static int linux_to_bsd_sockopt_level(int level) { switch (level) { case LINUX_SOL_SOCKET: return (SOL_SOCKET); } return (level); } static int linux_to_bsd_ip_sockopt(int opt) { switch (opt) { case LINUX_IP_TOS: return (IP_TOS); case LINUX_IP_TTL: return (IP_TTL); case LINUX_IP_OPTIONS: return (IP_OPTIONS); case LINUX_IP_MULTICAST_IF: return (IP_MULTICAST_IF); case LINUX_IP_MULTICAST_TTL: return (IP_MULTICAST_TTL); case LINUX_IP_MULTICAST_LOOP: return (IP_MULTICAST_LOOP); case LINUX_IP_ADD_MEMBERSHIP: return (IP_ADD_MEMBERSHIP); case LINUX_IP_DROP_MEMBERSHIP: return (IP_DROP_MEMBERSHIP); case LINUX_IP_HDRINCL: return (IP_HDRINCL); } return (-1); } static int linux_to_bsd_so_sockopt(int opt) { switch (opt) { case LINUX_SO_DEBUG: return (SO_DEBUG); case LINUX_SO_REUSEADDR: return (SO_REUSEADDR); case LINUX_SO_TYPE: return (SO_TYPE); case LINUX_SO_ERROR: return (SO_ERROR); case LINUX_SO_DONTROUTE: return (SO_DONTROUTE); case LINUX_SO_BROADCAST: return (SO_BROADCAST); case LINUX_SO_SNDBUF: return (SO_SNDBUF); case LINUX_SO_RCVBUF: return (SO_RCVBUF); case LINUX_SO_KEEPALIVE: return (SO_KEEPALIVE); case LINUX_SO_OOBINLINE: return (SO_OOBINLINE); case LINUX_SO_LINGER: return (SO_LINGER); } return (-1); } static int linux_to_bsd_msg_flags(int flags) { int ret_flags = 0; if (flags & LINUX_MSG_OOB) ret_flags |= MSG_OOB; if (flags & LINUX_MSG_PEEK) ret_flags |= MSG_PEEK; if (flags & LINUX_MSG_DONTROUTE) ret_flags |= MSG_DONTROUTE; if (flags & LINUX_MSG_CTRUNC) ret_flags |= MSG_CTRUNC; if (flags & LINUX_MSG_TRUNC) ret_flags |= MSG_TRUNC; if (flags & LINUX_MSG_DONTWAIT) ret_flags |= MSG_DONTWAIT; if (flags & LINUX_MSG_EOR) ret_flags |= MSG_EOR; if (flags & LINUX_MSG_WAITALL) ret_flags |= MSG_WAITALL; #if 0 /* not handled */ if (flags & LINUX_MSG_PROXY) ; if (flags & LINUX_MSG_FIN) ; if (flags & LINUX_MSG_SYN) ; if (flags & LINUX_MSG_CONFIRM) ; if (flags & LINUX_MSG_RST) ; if (flags & LINUX_MSG_ERRQUEUE) ; if (flags & LINUX_MSG_NOSIGNAL) ; #endif return ret_flags; } /* * Allocate stackgap and put the converted sockaddr structure * there, address on stackgap returned in sap. */ static int linux_sa_get(caddr_t *sgp, struct sockaddr **sap, const struct osockaddr *osa, int *osalen) { struct sockaddr *sa, *usa; int alloclen, error; alloclen = *osalen; error = do_sa_get(&sa, osa, &alloclen, M_TEMP); if (error) return (error); usa = (struct sockaddr *) stackgap_alloc(sgp, alloclen); if (!usa) { error = ENOMEM; goto out; } if ((error = copyout(sa, usa, alloclen))) goto out; *sap = usa; *osalen = alloclen; out: FREE(sa, M_TEMP); return (error); } static int linux_sa_put(struct osockaddr *osa) { struct osockaddr sa; int error, bdom; /* * Only read/write the osockaddr family part, the rest is * not changed. */ error = copyin(osa, &sa, sizeof(sa.sa_family)); if (error) return (error); bdom = bsd_to_linux_domain(sa.sa_family); if (bdom == -1) return (EINVAL); sa.sa_family = bdom; error = copyout(&sa, osa, sizeof(sa.sa_family)); if (error) return (error); return (0); } /* Return 0 if IP_HDRINCL is set for the given socket. */ static int linux_check_hdrincl(struct thread *td, caddr_t *sg, int s) { struct getsockopt_args /* { int s; int level; int name; caddr_t val; int *avalsize; } */ bsd_args; int error; caddr_t val, valsize; int size_val = sizeof val; int optval; val = stackgap_alloc(sg, sizeof(int)); valsize = stackgap_alloc(sg, sizeof(int)); if ((error = copyout(&size_val, valsize, sizeof(size_val)))) return (error); bsd_args.s = s; bsd_args.level = IPPROTO_IP; bsd_args.name = IP_HDRINCL; bsd_args.val = val; bsd_args.avalsize = (int *)valsize; if ((error = getsockopt(td, &bsd_args))) return (error); if ((error = copyin(val, &optval, sizeof(optval)))) return (error); return (optval == 0); } /* * Updated sendto() when IP_HDRINCL is set: * tweak endian-dependent fields in the IP packet. */ static int linux_sendto_hdrincl(struct thread *td, caddr_t *sg, struct sendto_args *bsd_args) { /* * linux_ip_copysize defines how many bytes we should copy * from the beginning of the IP packet before we customize it for BSD. * It should include all the fields we modify (ip_len and ip_off) * and be as small as possible to minimize copying overhead. */ #define linux_ip_copysize 8 struct ip *packet; struct msghdr *msg; struct iovec *iov; int error; struct sendmsg_args /* { int s; caddr_t msg; int flags; } */ sendmsg_args; /* Check the packet isn't too small before we mess with it */ if (bsd_args->len < linux_ip_copysize) return (EINVAL); /* * Tweaking the user buffer in place would be bad manners. * We create a corrected IP header with just the needed length, * then use an iovec to glue it to the rest of the user packet * when calling sendmsg(). */ packet = (struct ip *)stackgap_alloc(sg, linux_ip_copysize); msg = (struct msghdr *)stackgap_alloc(sg, sizeof(*msg)); iov = (struct iovec *)stackgap_alloc(sg, sizeof(*iov)*2); /* Make a copy of the beginning of the packet to be sent */ if ((error = copyin(bsd_args->buf, packet, linux_ip_copysize))) return (error); /* Convert fields from Linux to BSD raw IP socket format */ packet->ip_len = bsd_args->len; packet->ip_off = ntohs(packet->ip_off); /* Prepare the msghdr and iovec structures describing the new packet */ msg->msg_name = bsd_args->to; msg->msg_namelen = bsd_args->tolen; msg->msg_iov = iov; msg->msg_iovlen = 2; msg->msg_control = NULL; msg->msg_controllen = 0; msg->msg_flags = 0; iov[0].iov_base = (char *)packet; iov[0].iov_len = linux_ip_copysize; iov[1].iov_base = (char *)(bsd_args->buf) + linux_ip_copysize; iov[1].iov_len = bsd_args->len - linux_ip_copysize; sendmsg_args.s = bsd_args->s; sendmsg_args.msg = (caddr_t)msg; sendmsg_args.flags = bsd_args->flags; return (sendmsg(td, &sendmsg_args)); } struct linux_socket_args { int domain; int type; int protocol; }; static int linux_socket(struct thread *td, struct linux_socket_args *args) { struct linux_socket_args linux_args; struct socket_args /* { int domain; int type; int protocol; } */ bsd_args; struct setsockopt_args /* { int s; int level; int name; caddr_t val; int valsize; } */ bsd_setsockopt_args; int error; int retval_socket; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.protocol = linux_args.protocol; bsd_args.type = linux_args.type; bsd_args.domain = linux_to_bsd_domain(linux_args.domain); if (bsd_args.domain == -1) return (EINVAL); retval_socket = socket(td, &bsd_args); if (bsd_args.type == SOCK_RAW && (bsd_args.protocol == IPPROTO_RAW || bsd_args.protocol == 0) && bsd_args.domain == AF_INET && retval_socket >= 0) { /* It's a raw IP socket: set the IP_HDRINCL option. */ caddr_t sg; int *hdrincl; sg = stackgap_init(); hdrincl = (int *)stackgap_alloc(&sg, sizeof(*hdrincl)); *hdrincl = 1; bsd_setsockopt_args.s = td->td_retval[0]; bsd_setsockopt_args.level = IPPROTO_IP; bsd_setsockopt_args.name = IP_HDRINCL; bsd_setsockopt_args.val = (caddr_t)hdrincl; bsd_setsockopt_args.valsize = sizeof(*hdrincl); /* We ignore any error returned by setsockopt() */ setsockopt(td, &bsd_setsockopt_args); /* Copy back the return value from socket() */ td->td_retval[0] = bsd_setsockopt_args.s; } #ifdef INET6 /* * Linux AF_INET6 socket has IPV6_V6ONLY setsockopt set to 0 by * default and some apps depend on this. So, set V6ONLY to 0 * for Linux apps if the sysctl value is set to 1. */ if (bsd_args.domain == PF_INET6 && retval_socket >= 0 #ifndef KLD_MODULE /* * XXX: Avoid undefined symbol error with an IPv4 only * kernel. */ && ip6_v6only #endif ) { caddr_t sg; int *v6only; sg = stackgap_init(); v6only = (int *)stackgap_alloc(&sg, sizeof(*v6only)); *v6only = 0; bsd_setsockopt_args.s = td->td_retval[0]; bsd_setsockopt_args.level = IPPROTO_IPV6; bsd_setsockopt_args.name = IPV6_V6ONLY; bsd_setsockopt_args.val = (caddr_t)v6only; bsd_setsockopt_args.valsize = sizeof(*v6only); /* We ignore any error returned by setsockopt() */ setsockopt(td, &bsd_setsockopt_args); /* Copy back the return value from socket() */ td->td_retval[0] = bsd_setsockopt_args.s; } #endif return (retval_socket); } struct linux_bind_args { int s; struct osockaddr *name; int namelen; }; static int linux_bind(struct thread *td, struct linux_bind_args *args) { struct linux_bind_args linux_args; struct sockaddr *sa; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); error = linux_getsockaddr(&sa, linux_args.name, linux_args.namelen); if (error) return (error); return (kern_bind(td, linux_args.s, sa)); } struct linux_connect_args { int s; struct osockaddr * name; int namelen; }; int linux_connect(struct thread *, struct linux_connect_args *); #endif /* !__alpha__*/ int linux_connect(struct thread *td, struct linux_connect_args *args) { struct linux_connect_args linux_args; struct socket *so; struct sockaddr *sa; u_int fflag; int error; #ifdef __alpha__ bcopy(args, &linux_args, sizeof(linux_args)); #else if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); #endif /* __alpha__ */ error = linux_getsockaddr(&sa, (struct osockaddr *)linux_args.name, linux_args.namelen); if (error) return (error); error = kern_connect(td, linux_args.s, sa); if (error != EISCONN) return (error); /* * Linux doesn't return EISCONN the first time it occurs, * when on a non-blocking socket. Instead it returns the * error getsockopt(SOL_SOCKET, SO_ERROR) would return on BSD. */ if ((error = fgetsock(td, linux_args.s, &so, &fflag)) != 0) return(error); error = EISCONN; if (fflag & FNONBLOCK) { if (so->so_emuldata == 0) error = so->so_error; so->so_emuldata = (void *)1; } fputsock(so); return (error); } #ifndef __alpha__ struct linux_listen_args { int s; int backlog; }; static int linux_listen(struct thread *td, struct linux_listen_args *args) { struct linux_listen_args linux_args; struct listen_args /* { int s; int backlog; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.backlog = linux_args.backlog; return (listen(td, &bsd_args)); } struct linux_accept_args { int s; struct osockaddr *addr; int *namelen; }; static int linux_accept(struct thread *td, struct linux_accept_args *args) { struct linux_accept_args linux_args; struct accept_args /* { int s; caddr_t name; int *anamelen; } */ bsd_args; struct close_args /* { int fd; } */ c_args; struct fcntl_args /* { int fd; int cmd; long arg; } */ f_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.name = (caddr_t)linux_args.addr; bsd_args.anamelen = linux_args.namelen; error = oaccept(td, &bsd_args); if (error) return (error); if (linux_args.addr) { error = linux_sa_put(linux_args.addr); if (error) { c_args.fd = td->td_retval[0]; (void)close(td, &c_args); return (error); } } /* * linux appears not to copy flags from the parent socket to the * accepted one, so we must clear the flags in the new descriptor. * Ignore any errors, because we already have an open fd. */ f_args.fd = td->td_retval[0]; f_args.cmd = F_SETFL; f_args.arg = 0; (void)fcntl(td, &f_args); td->td_retval[0] = f_args.fd; return (0); } struct linux_getsockname_args { int s; struct osockaddr *addr; int *namelen; }; static int linux_getsockname(struct thread *td, struct linux_getsockname_args *args) { struct linux_getsockname_args linux_args; struct getsockname_args /* { int fdes; caddr_t asa; int *alen; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.fdes = linux_args.s; bsd_args.asa = (caddr_t) linux_args.addr; bsd_args.alen = linux_args.namelen; error = ogetsockname(td, &bsd_args); if (error) return (error); error = linux_sa_put(linux_args.addr); if (error) return (error); return (0); } struct linux_getpeername_args { int s; struct osockaddr *addr; int *namelen; }; static int linux_getpeername(struct thread *td, struct linux_getpeername_args *args) { struct linux_getpeername_args linux_args; struct ogetpeername_args /* { int fdes; caddr_t asa; int *alen; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.fdes = linux_args.s; bsd_args.asa = (caddr_t) linux_args.addr; bsd_args.alen = linux_args.namelen; error = ogetpeername(td, &bsd_args); if (error) return (error); error = linux_sa_put(linux_args.addr); if (error) return (error); return (0); } struct linux_socketpair_args { int domain; int type; int protocol; int *rsv; }; static int linux_socketpair(struct thread *td, struct linux_socketpair_args *args) { struct linux_socketpair_args linux_args; struct socketpair_args /* { int domain; int type; int protocol; int *rsv; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.domain = linux_to_bsd_domain(linux_args.domain); if (bsd_args.domain == -1) return (EINVAL); bsd_args.type = linux_args.type; bsd_args.protocol = linux_args.protocol; bsd_args.rsv = linux_args.rsv; return (socketpair(td, &bsd_args)); } struct linux_send_args { int s; void *msg; int len; int flags; }; static int linux_send(struct thread *td, struct linux_send_args *args) { struct linux_send_args linux_args; struct osend_args /* { int s; caddr_t buf; int len; int flags; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.buf = linux_args.msg; bsd_args.len = linux_args.len; bsd_args.flags = linux_args.flags; return (osend(td, &bsd_args)); } struct linux_recv_args { int s; void *msg; int len; int flags; }; static int linux_recv(struct thread *td, struct linux_recv_args *args) { struct linux_recv_args linux_args; struct orecv_args /* { int s; caddr_t buf; int len; int flags; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.buf = linux_args.msg; bsd_args.len = linux_args.len; bsd_args.flags = linux_args.flags; return (orecv(td, &bsd_args)); } struct linux_sendto_args { int s; void *msg; int len; int flags; caddr_t to; int tolen; }; static int linux_sendto(struct thread *td, struct linux_sendto_args *args) { struct linux_sendto_args linux_args; struct sendto_args /* { int s; caddr_t buf; size_t len; int flags; caddr_t to; int tolen; } */ bsd_args; caddr_t sg = stackgap_init(); struct sockaddr *to; int tolen, error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); tolen = linux_args.tolen; if (linux_args.to) { error = linux_sa_get(&sg, &to, (struct osockaddr *) linux_args.to, &tolen); if (error) return (error); } else to = NULL; bsd_args.s = linux_args.s; bsd_args.buf = linux_args.msg; bsd_args.len = linux_args.len; bsd_args.flags = linux_args.flags; bsd_args.to = (caddr_t) to; bsd_args.tolen = (unsigned int) tolen; if (linux_check_hdrincl(td, &sg, linux_args.s) == 0) /* IP_HDRINCL set, tweak the packet before sending */ return (linux_sendto_hdrincl(td, &sg, &bsd_args)); return (sendto(td, &bsd_args)); } struct linux_recvfrom_args { int s; void *buf; int len; int flags; caddr_t from; int *fromlen; }; static int linux_recvfrom(struct thread *td, struct linux_recvfrom_args *args) { struct linux_recvfrom_args linux_args; struct recvfrom_args /* { int s; caddr_t buf; size_t len; int flags; caddr_t from; int *fromlenaddr; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.buf = linux_args.buf; bsd_args.len = linux_args.len; bsd_args.flags = linux_to_bsd_msg_flags(linux_args.flags); bsd_args.from = linux_args.from; bsd_args.fromlenaddr = linux_args.fromlen; error = orecvfrom(td, &bsd_args); if (error) return (error); if (linux_args.from) { error = linux_sa_put((struct osockaddr *) linux_args.from); if (error) return (error); } return (0); } struct linux_sendmsg_args { int s; const struct msghdr *msg; int flags; }; static int linux_sendmsg(struct thread *td, struct linux_sendmsg_args *args) { struct linux_sendmsg_args linux_args; struct sendmsg_args /* { int s; const struct msghdr *msg; int flags; } */ bsd_args; struct msghdr msg; struct msghdr *nmsg = NULL; int error; int level; caddr_t control; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); error = copyin(linux_args.msg, &msg, sizeof(msg)); if (error) return (error); if (msg.msg_name) { struct sockaddr *sa; caddr_t sg = stackgap_init(); nmsg = (struct msghdr *) stackgap_alloc(&sg, sizeof(struct msghdr)); if (!nmsg) return (ENOMEM); error = linux_sa_get(&sg, &sa, (struct osockaddr *) msg.msg_name, &msg.msg_namelen); if (error) return (error); msg.msg_name = (struct sockaddr *) sa; error = copyout(&msg, nmsg, sizeof(struct msghdr)); if (error) return (error); } error = copyin(&linux_args.msg->msg_control, &control, sizeof(caddr_t)); if (error) return (error); if (control == NULL) goto done; error = copyin(&((struct cmsghdr*)control)->cmsg_level, &level, sizeof(int)); if (error) return (error); if (level == 1) { /* * Linux thinks that SOL_SOCKET is 1; we know * that it's really 0xffff, of course. */ level = SOL_SOCKET; error = copyout(&level, &((struct cmsghdr *)control)->cmsg_level, sizeof(int)); if (error) return (error); } done: bsd_args.s = linux_args.s; bsd_args.msg = (caddr_t)nmsg; bsd_args.flags = linux_args.flags; return (sendmsg(td, &bsd_args)); } struct linux_recvmsg_args { int s; struct msghdr *msg; int flags; }; static int linux_recvmsg(struct thread *td, struct linux_recvmsg_args *args) { struct linux_recvmsg_args linux_args; struct recvmsg_args /* { int s; struct msghdr *msg; int flags; } */ bsd_args; struct msghdr msg; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.msg = linux_args.msg; bsd_args.flags = linux_to_bsd_msg_flags(linux_args.flags); error = recvmsg(td, &bsd_args); if (error) return (error); error = copyin(linux_args.msg, &msg, sizeof(msg)); if (error) return (error); if (msg.msg_name && msg.msg_namelen > 2) error = linux_sa_put(msg.msg_name); return (error); } struct linux_shutdown_args { int s; int how; }; static int linux_shutdown(struct thread *td, struct linux_shutdown_args *args) { struct linux_shutdown_args linux_args; struct shutdown_args /* { int s; int how; } */ bsd_args; int error; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.how = linux_args.how; return (shutdown(td, &bsd_args)); } struct linux_setsockopt_args { int s; int level; int optname; void *optval; int optlen; }; static int linux_setsockopt(struct thread *td, struct linux_setsockopt_args *args) { struct linux_setsockopt_args linux_args; struct setsockopt_args /* { int s; int level; int name; caddr_t val; int valsize; } */ bsd_args; int error, name; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.level = linux_to_bsd_sockopt_level(linux_args.level); switch (bsd_args.level) { case SOL_SOCKET: name = linux_to_bsd_so_sockopt(linux_args.optname); break; case IPPROTO_IP: name = linux_to_bsd_ip_sockopt(linux_args.optname); break; case IPPROTO_TCP: /* Linux TCP option values match BSD's */ name = linux_args.optname; break; default: name = -1; break; } if (name == -1) return (EINVAL); bsd_args.name = name; bsd_args.val = linux_args.optval; bsd_args.valsize = linux_args.optlen; return (setsockopt(td, &bsd_args)); } struct linux_getsockopt_args { int s; int level; int optname; void *optval; int *optlen; }; static int linux_getsockopt(struct thread *td, struct linux_getsockopt_args *args) { struct linux_getsockopt_args linux_args; struct getsockopt_args /* { int s; int level; int name; caddr_t val; int *avalsize; } */ bsd_args; int error, name; if ((error = copyin(args, &linux_args, sizeof(linux_args)))) return (error); bsd_args.s = linux_args.s; bsd_args.level = linux_to_bsd_sockopt_level(linux_args.level); switch (bsd_args.level) { case SOL_SOCKET: name = linux_to_bsd_so_sockopt(linux_args.optname); break; case IPPROTO_IP: name = linux_to_bsd_ip_sockopt(linux_args.optname); break; case IPPROTO_TCP: /* Linux TCP option values match BSD's */ name = linux_args.optname; break; default: name = -1; break; } if (name == -1) return (EINVAL); bsd_args.name = name; bsd_args.val = linux_args.optval; bsd_args.avalsize = linux_args.optlen; return (getsockopt(td, &bsd_args)); } int linux_socketcall(struct thread *td, struct linux_socketcall_args *args) { void *arg = (void *)args->args; switch (args->what) { case LINUX_SOCKET: return (linux_socket(td, arg)); case LINUX_BIND: return (linux_bind(td, arg)); case LINUX_CONNECT: return (linux_connect(td, arg)); case LINUX_LISTEN: return (linux_listen(td, arg)); case LINUX_ACCEPT: return (linux_accept(td, arg)); case LINUX_GETSOCKNAME: return (linux_getsockname(td, arg)); case LINUX_GETPEERNAME: return (linux_getpeername(td, arg)); case LINUX_SOCKETPAIR: return (linux_socketpair(td, arg)); case LINUX_SEND: return (linux_send(td, arg)); case LINUX_RECV: return (linux_recv(td, arg)); case LINUX_SENDTO: return (linux_sendto(td, arg)); case LINUX_RECVFROM: return (linux_recvfrom(td, arg)); case LINUX_SHUTDOWN: return (linux_shutdown(td, arg)); case LINUX_SETSOCKOPT: return (linux_setsockopt(td, arg)); case LINUX_GETSOCKOPT: return (linux_getsockopt(td, arg)); case LINUX_SENDMSG: return (linux_sendmsg(td, arg)); case LINUX_RECVMSG: return (linux_recvmsg(td, arg)); } uprintf("LINUX: 'socket' typ=%d not implemented\n", args->what); return (ENOSYS); } #endif /*!__alpha__*/