This source file includes following definitions.
- linux_to_bsd_domain
- bsd_to_linux_domain
- linux_socket
- linux_bind
- linux_connect
- linux_listen
- linux_accept
- linux_getsockname
- linux_getpeername
- linux_socketpair
- linux_send
- linux_recv
- linux_check_hdrincl
- linux_sendto_hdrincl
- linux_sendto
- linux_recvfrom
- linux_shutdown
- linux_to_bsd_sopt_level
- linux_to_bsd_so_sockopt
- linux_to_bsd_ip_sockopt
- linux_to_bsd_tcp_sockopt
- linux_to_bsd_udp_sockopt
- linux_setsockopt
- linux_getsockopt
- linux_recvmsg
- linux_sendmsg
- linux_sa_get
- linux_sa_put
- linux_sys_socketcall
- linux_ioctl_socket
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35 #include <sys/param.h>
36 #include <sys/kernel.h>
37 #include <sys/systm.h>
38 #include <sys/buf.h>
39 #include <sys/malloc.h>
40 #include <sys/ioctl.h>
41 #include <sys/tty.h>
42 #include <sys/file.h>
43 #include <sys/filedesc.h>
44 #include <sys/selinfo.h>
45 #include <sys/socket.h>
46 #include <sys/socketvar.h>
47 #include <net/if.h>
48 #include <net/if_types.h>
49 #include <net/if_dl.h>
50 #include <netinet/in.h>
51 #include <netinet/in_systm.h>
52 #include <netinet/ip.h>
53 #include <netinet/tcp.h>
54 #include <sys/mount.h>
55 #include <sys/proc.h>
56 #include <sys/vnode.h>
57 #include <sys/device.h>
58
59 #include <sys/syscallargs.h>
60
61 #include <compat/linux/linux_types.h>
62 #include <compat/linux/linux_util.h>
63 #include <compat/linux/linux_signal.h>
64 #include <compat/linux/linux_syscallargs.h>
65 #include <compat/linux/linux_ioctl.h>
66 #include <compat/linux/linux_socket.h>
67 #include <compat/linux/linux_socketcall.h>
68 #include <compat/linux/linux_sockio.h>
69
70
71
72
73
74
75
76
77
78
79 static int linux_to_bsd_domain (int);
80 static int bsd_to_linux_domain(int);
81
82 int linux_socket(struct proc *, void *, register_t *);
83 int linux_bind(struct proc *, void *, register_t *);
84 int linux_connect(struct proc *, void *, register_t *);
85 int linux_listen(struct proc *, void *, register_t *);
86 int linux_accept(struct proc *, void *, register_t *);
87 int linux_getsockname(struct proc *, void *, register_t *);
88 int linux_getpeername(struct proc *, void *, register_t *);
89 int linux_socketpair(struct proc *, void *, register_t *);
90 int linux_send(struct proc *, void *, register_t *);
91 int linux_recv(struct proc *, void *, register_t *);
92 int linux_sendto(struct proc *, void *, register_t *);
93 int linux_recvfrom(struct proc *, void *, register_t *);
94 int linux_shutdown(struct proc *, void *, register_t *);
95 int linux_to_bsd_sopt_level(int);
96 int linux_to_bsd_so_sockopt(int);
97 int linux_to_bsd_ip_sockopt(int);
98 int linux_to_bsd_tcp_sockopt(int);
99 int linux_to_bsd_udp_sockopt(int);
100 int linux_setsockopt(struct proc *, void *, register_t *);
101 int linux_getsockopt(struct proc *, void *, register_t *);
102 int linux_recvmsg(struct proc *, void *, register_t *);
103 int linux_sendmsg(struct proc *, void *, register_t *);
104
105 int linux_check_hdrincl(struct proc *, int, register_t *, caddr_t *);
106 int linux_sendto_hdrincl(struct proc *, struct sys_sendto_args *,
107 register_t *, caddr_t *);
108
109 int linux_sa_get(struct proc *, caddr_t *, struct sockaddr **,
110 const struct osockaddr *, int *);
111 int linux_sa_put(struct osockaddr *);
112
113 static const int linux_to_bsd_domain_[LINUX_AF_MAX] = {
114 AF_UNSPEC,
115 AF_UNIX,
116 AF_INET,
117 -1,
118 -1,
119 AF_APPLETALK,
120 -1,
121 -1,
122 -1,
123 -1,
124 AF_INET6,
125 -1,
126 AF_DECnet,
127 -1,
128 -1,
129 -1,
130 AF_ROUTE,
131 -1,
132 -1,
133 -1,
134 -1,
135 AF_SNA,
136
137 -1, -1, -1, -1, -1, -1, -1, -1, -1, -1,
138 };
139
140 static const int bsd_to_linux_domain_[AF_MAX] = {
141 LINUX_AF_UNSPEC,
142 LINUX_AF_UNIX,
143 LINUX_AF_INET,
144 -1,
145 -1,
146 -1,
147 -1,
148 -1,
149 -1,
150 -1,
151 -1,
152 -1,
153 -1,
154 -1,
155 -1,
156 -1,
157 LINUX_AF_APPLETALK,
158 -1,
159 -1,
160 -1,
161 -1,
162 -1,
163 -1,
164 LINUX_AF_IPX,
165 LINUX_AF_INET6,
166 -1,
167 -1,
168 -1,
169 -1,
170 -1,
171 -1,
172 };
173
174
175
176
177 static int
178 linux_to_bsd_domain(ldom)
179 int ldom;
180 {
181 if (ldom < 0 || ldom >= LINUX_AF_MAX)
182 return (-1);
183
184 return linux_to_bsd_domain_[ldom];
185 }
186
187
188
189
190 static int
191 bsd_to_linux_domain(bdom)
192 int bdom;
193 {
194 if (bdom < 0 || bdom >= AF_MAX)
195 return (-1);
196
197 return bsd_to_linux_domain_[bdom];
198 }
199
200 int
201 linux_socket(p, v, retval)
202 struct proc *p;
203 void *v;
204 register_t *retval;
205 {
206 struct linux_socket_args
207
208
209
210 *uap = v;
211 struct linux_socket_args lsa;
212 struct sys_socket_args bsa;
213 int error;
214
215 if ((error = copyin((caddr_t) uap, (caddr_t) &lsa, sizeof lsa)))
216 return error;
217
218 SCARG(&bsa, protocol) = lsa.protocol;
219 SCARG(&bsa, type) = lsa.type;
220 SCARG(&bsa, domain) = linux_to_bsd_domain(lsa.domain);
221 if (SCARG(&bsa, domain) == -1)
222 return EINVAL;
223 return sys_socket(p, &bsa, retval);
224 }
225
226 int
227 linux_bind(p, v, retval)
228 struct proc *p;
229 void *v;
230 register_t *retval;
231 {
232 struct linux_bind_args
233
234
235
236 *uap = v;
237 struct linux_bind_args lba;
238 struct sys_bind_args bba;
239 int error;
240 int namlen;
241
242 if ((error = copyin((caddr_t) uap, (caddr_t) &lba, sizeof lba)))
243 return error;
244
245 SCARG(&bba, s) = lba.s;
246 namlen = lba.namelen;
247 if (lba.name) {
248 struct sockaddr *sa;
249 caddr_t sg = stackgap_init(p->p_emul);
250
251 error = linux_sa_get(p, &sg, &sa, lba.name, &namlen);
252 if (error)
253 return (error);
254 SCARG(&bba, name) = sa;
255 } else
256 SCARG(&bba, name) = NULL;
257 SCARG(&bba, namelen) = namlen;
258
259 return sys_bind(p, &bba, retval);
260 }
261
262 int
263 linux_connect(p, v, retval)
264 struct proc *p;
265 void *v;
266 register_t *retval;
267 {
268 struct linux_connect_args
269
270
271
272 *uap = v;
273 struct linux_connect_args lca;
274 struct sys_connect_args bca;
275 struct sockaddr *sa;
276 caddr_t sg = stackgap_init(p->p_emul);
277 int namlen;
278 int error;
279
280 if ((error = copyin((caddr_t) uap, (caddr_t) &lca, sizeof lca)))
281 return error;
282
283 namlen = lca.namelen;
284 error = linux_sa_get(p, &sg, &sa, lca.name, &namlen);
285 if (error)
286 return (error);
287
288 SCARG(&bca, s) = lca.s;
289 SCARG(&bca, name) = sa;
290 SCARG(&bca, namelen) = (unsigned int)namlen;
291
292 error = sys_connect(p, &bca, retval);
293
294 if (error == EISCONN) {
295 struct sys_getsockopt_args bga;
296 #if 0
297 struct sys_fcntl_args fca;
298 #endif
299 void *status, *statusl;
300 int stat, statl = sizeof stat;
301
302 #if 0
303 SCARG(&fca, fd) = lca.s;
304 SCARG(&fca, cmd) = F_GETFL;
305 SCARG(&fca, arg) = 0;
306 if (sys_fcntl(p, &fca, retval) == -1 ||
307 (*retval & O_NONBLOCK) == 0)
308 return error;
309 #endif
310
311 status = stackgap_alloc(&sg, sizeof stat);
312 statusl = stackgap_alloc(&sg, sizeof statusl);
313
314 if ((error = copyout(&statl, statusl, sizeof statl)))
315 return error;
316
317 SCARG(&bga, s) = lca.s;
318 SCARG(&bga, level) = SOL_SOCKET;
319 SCARG(&bga, name) = SO_ERROR;
320 SCARG(&bga, val) = status;
321 SCARG(&bga, avalsize) = statusl;
322
323 error = sys_getsockopt(p, &bga, retval);
324 if (error)
325 return error;
326 if ((error = copyin(status, &stat, sizeof stat)))
327 return error;
328 return stat;
329 }
330 return error;
331 }
332
333 int
334 linux_listen(p, v, retval)
335 struct proc *p;
336 void *v;
337 register_t *retval;
338 {
339 struct linux_listen_args
340
341
342 *uap = v;
343 struct linux_listen_args lla;
344 struct sys_listen_args bla;
345 int error;
346
347 if ((error = copyin((caddr_t) uap, (caddr_t) &lla, sizeof lla)))
348 return error;
349
350 SCARG(&bla, s) = lla.s;
351 SCARG(&bla, backlog) = lla.backlog;
352
353 return sys_listen(p, &bla, retval);
354 }
355
356 int
357 linux_accept(p, v, retval)
358 struct proc *p;
359 void *v;
360 register_t *retval;
361 {
362 struct linux_accept_args
363
364
365
366 *uap = v;
367 struct linux_accept_args laa;
368 struct compat_43_sys_accept_args baa;
369 struct sys_fcntl_args fca;
370 int error;
371
372 if ((error = copyin((caddr_t) uap, (caddr_t) &laa, sizeof laa)))
373 return error;
374
375 SCARG(&baa, s) = laa.s;
376 SCARG(&baa, name) = (caddr_t) laa.addr;
377 SCARG(&baa, anamelen) = laa.namelen;
378
379 error = compat_43_sys_accept(p, &baa, retval);
380 if (error)
381 return (error);
382
383
384
385
386
387
388 SCARG(&fca, fd) = *retval;
389 SCARG(&fca, cmd) = F_SETFL;
390 SCARG(&fca, arg) = 0;
391 (void)sys_fcntl(p, &fca, retval);
392 *retval = SCARG(&fca, fd);
393 return (0);
394 }
395
396 int
397 linux_getsockname(p, v, retval)
398 struct proc *p;
399 void *v;
400 register_t *retval;
401 {
402 struct linux_getsockname_args
403
404
405
406 *uap = v;
407 struct linux_getsockname_args lga;
408 struct sys_getsockname_args bga;
409 int error;
410
411 if ((error = copyin((caddr_t) uap, (caddr_t) &lga, sizeof lga)))
412 return error;
413
414 SCARG(&bga, fdes) = lga.s;
415 SCARG(&bga, asa) = (struct sockaddr *) lga.addr;
416 SCARG(&bga, alen) = lga.namelen;
417
418 error = sys_getsockname(p, &bga, retval);
419 if (error)
420 return (error);
421
422 if ((error = linux_sa_put((struct osockaddr *)lga.addr)))
423 return (error);
424
425 return (0);
426 }
427
428 int
429 linux_getpeername(p, v, retval)
430 struct proc *p;
431 void *v;
432 register_t *retval;
433 {
434 struct linux_getpeername_args
435
436
437
438 *uap = v;
439 struct linux_getpeername_args lga;
440 struct sys_getpeername_args bga;
441 int error;
442
443 if ((error = copyin((caddr_t) uap, (caddr_t) &lga, sizeof lga)))
444 return error;
445
446 SCARG(&bga, fdes) = lga.s;
447 SCARG(&bga, asa) = (struct sockaddr *) lga.addr;
448 SCARG(&bga, alen) = lga.namelen;
449
450 error = sys_getpeername(p, &bga, retval);
451 if (error)
452 return (error);
453
454 if ((error = linux_sa_put((struct osockaddr *)lga.addr)))
455 return (error);
456
457 return (0);
458 }
459
460 int
461 linux_socketpair(p, v, retval)
462 struct proc *p;
463 void *v;
464 register_t *retval;
465 {
466 struct linux_socketpair_args
467
468
469
470
471 *uap = v;
472 struct linux_socketpair_args lsa;
473 struct sys_socketpair_args bsa;
474 int error;
475
476 if ((error = copyin((caddr_t) uap, &lsa, sizeof lsa)))
477 return error;
478
479 SCARG(&bsa, domain) = linux_to_bsd_domain(lsa.domain);
480 if (SCARG(&bsa, domain) == -1)
481 return EINVAL;
482 SCARG(&bsa, type) = lsa.type;
483 SCARG(&bsa, protocol) = lsa.protocol;
484 SCARG(&bsa, rsv) = lsa.rsv;
485
486 return sys_socketpair(p, &bsa, retval);
487 }
488
489 int
490 linux_send(p, v, retval)
491 struct proc *p;
492 void *v;
493 register_t *retval;
494 {
495 struct linux_send_args
496
497
498
499
500 *uap = v;
501 struct linux_send_args lsa;
502 struct compat_43_sys_send_args bsa;
503 int error;
504
505 if ((error = copyin((caddr_t) uap, (caddr_t) &lsa, sizeof lsa)))
506 return error;
507
508 SCARG(&bsa, s) = lsa.s;
509 SCARG(&bsa, buf) = lsa.msg;
510 SCARG(&bsa, len) = lsa.len;
511 SCARG(&bsa, flags) = lsa.flags;
512
513 return compat_43_sys_send(p, &bsa, retval);
514 }
515
516 int
517 linux_recv(p, v, retval)
518 struct proc *p;
519 void *v;
520 register_t *retval;
521 {
522 struct linux_recv_args
523
524
525
526
527 *uap = v;
528 struct linux_recv_args lra;
529 struct compat_43_sys_recv_args bra;
530 int error;
531
532 if ((error = copyin((caddr_t) uap, (caddr_t) &lra, sizeof lra)))
533 return error;
534
535 SCARG(&bra, s) = lra.s;
536 SCARG(&bra, buf) = lra.msg;
537 SCARG(&bra, len) = lra.len;
538 SCARG(&bra, flags) = lra.flags;
539
540 return compat_43_sys_recv(p, &bra, retval);
541 }
542
543 int
544 linux_check_hdrincl(p, fd, retval, sgp)
545 struct proc *p;
546 int fd;
547 register_t *retval;
548 caddr_t *sgp;
549 {
550 struct sys_getsockopt_args
551
552
553
554
555
556 gsa;
557 int error;
558 caddr_t val;
559 int *valsize;
560 int size_val = sizeof val;
561 int optval;
562
563 val = stackgap_alloc(sgp, sizeof(optval));
564 valsize = stackgap_alloc(sgp, sizeof(size_val));
565
566 if ((error = copyout(&size_val, valsize, sizeof(size_val))))
567 return (error);
568 SCARG(&gsa, s) = fd;
569 SCARG(&gsa, level) = IPPROTO_IP;
570 SCARG(&gsa, name) = IP_HDRINCL;
571 SCARG(&gsa, val) = val;
572 SCARG(&gsa, avalsize) = valsize;
573
574 if ((error = sys_getsockopt(p, &gsa, retval)))
575 return (error);
576 if ((error = copyin(val, &optval, sizeof(optval))))
577 return (error);
578 return (optval == 0);
579 }
580
581
582
583
584
585
586
587 #define linux_ip_copysize 8
588
589 int
590 linux_sendto_hdrincl(p, bsa, retval, sgp)
591 struct proc *p;
592 struct sys_sendto_args *bsa;
593 register_t *retval;
594 caddr_t *sgp;
595 {
596 struct sys_sendmsg_args ssa;
597 struct ip *packet, rpacket;
598 struct msghdr *msg, rmsg;
599 struct iovec *iov, riov[2];
600 int error;
601
602
603 if (SCARG(bsa, len) < linux_ip_copysize)
604 return EINVAL;
605
606
607
608
609
610
611
612 packet = (struct ip *)stackgap_alloc(sgp, linux_ip_copysize);
613 msg = (struct msghdr *)stackgap_alloc(sgp, sizeof(*msg));
614 iov = (struct iovec *)stackgap_alloc(sgp, sizeof(*iov)*2);
615
616
617 if ((error = copyin(SCARG(bsa, buf), (caddr_t)&rpacket,
618 linux_ip_copysize)))
619 return error;
620
621
622 rpacket.ip_len = SCARG(bsa, len);
623 error = copyout(&rpacket, packet, linux_ip_copysize);
624 if (error)
625 return (error);
626
627 riov[0].iov_base = (char *)packet;
628 riov[0].iov_len = linux_ip_copysize;
629 riov[1].iov_base = (caddr_t)SCARG(bsa, buf) + linux_ip_copysize;
630 riov[1].iov_len = SCARG(bsa, len) - linux_ip_copysize;
631
632 error = copyout(&riov[0], iov, sizeof(riov));
633 if (error)
634 return (error);
635
636
637 rmsg.msg_name = (void *)SCARG(bsa, to);
638 rmsg.msg_namelen = SCARG(bsa, tolen);
639 rmsg.msg_iov = iov;
640 rmsg.msg_iovlen = 2;
641 rmsg.msg_control = NULL;
642 rmsg.msg_controllen = 0;
643 rmsg.msg_flags = 0;
644
645 error = copyout(&riov[0], iov, sizeof(riov));
646 if (error)
647 return (error);
648
649 SCARG(&ssa, s) = SCARG(bsa, s);
650 SCARG(&ssa, msg) = msg;
651 SCARG(&ssa, flags) = SCARG(bsa, flags);
652 return sys_sendmsg(p, &ssa, retval);
653 }
654
655 int
656 linux_sendto(p, v, retval)
657 struct proc *p;
658 void *v;
659 register_t *retval;
660 {
661 struct linux_sendto_args
662
663
664
665
666
667
668 *uap = v;
669 struct linux_sendto_args lsa;
670 struct sys_sendto_args bsa;
671 int error;
672 int tolen;
673 caddr_t sg = stackgap_init(p->p_emul);
674
675 if ((error = copyin((caddr_t) uap, (caddr_t) &lsa, sizeof lsa)))
676 return error;
677
678 SCARG(&bsa, s) = lsa.s;
679 SCARG(&bsa, buf) = lsa.msg;
680 SCARG(&bsa, len) = lsa.len;
681 SCARG(&bsa, flags) = lsa.flags;
682 tolen = lsa.tolen;
683 if (lsa.to) {
684 struct sockaddr *sa;
685
686 if ((error = linux_sa_get(p, &sg, &sa, lsa.to, &tolen)))
687 return (error);
688 SCARG(&bsa, to) = sa;
689 } else
690 SCARG(&bsa, to) = NULL;
691 SCARG(&bsa, tolen) = tolen;
692
693 if (linux_check_hdrincl(p, lsa.s, retval, &sg) == 0)
694 return linux_sendto_hdrincl(p, &bsa, retval, &sg);
695 return sys_sendto(p, &bsa, retval);
696 }
697
698 int
699 linux_recvfrom(p, v, retval)
700 struct proc *p;
701 void *v;
702 register_t *retval;
703 {
704 struct linux_recvfrom_args
705
706
707
708
709
710
711 *uap = v;
712 struct linux_recvfrom_args lra;
713 struct sys_recvfrom_args bra;
714 int error;
715
716 if ((error = copyin((caddr_t) uap, (caddr_t) &lra, sizeof lra)))
717 return error;
718
719 SCARG(&bra, s) = lra.s;
720 SCARG(&bra, buf) = lra.buf;
721 SCARG(&bra, len) = lra.len;
722 SCARG(&bra, flags) = lra.flags;
723 SCARG(&bra, from) = (struct sockaddr *) lra.from;
724 SCARG(&bra, fromlenaddr) = lra.fromlen;
725
726 if ((error = sys_recvfrom(p, &bra, retval)))
727 return (error);
728
729 if (lra.from && (error = linux_sa_put(lra.from)))
730 return (error);
731
732 return (0);
733 }
734
735 int
736 linux_shutdown(p, v, retval)
737 struct proc *p;
738 void *v;
739 register_t *retval;
740 {
741 struct linux_shutdown_args
742
743
744 *uap = v;
745 struct linux_shutdown_args lsa;
746 struct sys_shutdown_args bsa;
747 int error;
748
749 if ((error = copyin((caddr_t) uap, (caddr_t) &lsa, sizeof lsa)))
750 return error;
751
752 SCARG(&bsa, s) = lsa.s;
753 SCARG(&bsa, how) = lsa.how;
754
755 return sys_shutdown(p, &bsa, retval);
756 }
757
758
759
760
761
762 int
763 linux_to_bsd_sopt_level(llevel)
764 int llevel;
765 {
766
767 switch (llevel) {
768 case LINUX_SOL_SOCKET:
769 return SOL_SOCKET;
770 case LINUX_SOL_IP:
771 return IPPROTO_IP;
772 case LINUX_SOL_TCP:
773 return IPPROTO_TCP;
774 case LINUX_SOL_UDP:
775 return IPPROTO_UDP;
776 default:
777 return -1;
778 }
779 }
780
781
782
783
784 int
785 linux_to_bsd_so_sockopt(lopt)
786 int lopt;
787 {
788
789 switch (lopt) {
790 case LINUX_SO_DEBUG:
791 return SO_DEBUG;
792 case LINUX_SO_REUSEADDR:
793
794
795
796
797
798
799
800 return SO_REUSEPORT;
801 case LINUX_SO_TYPE:
802 return SO_TYPE;
803 case LINUX_SO_ERROR:
804 return SO_ERROR;
805 case LINUX_SO_DONTROUTE:
806 return SO_DONTROUTE;
807 case LINUX_SO_BROADCAST:
808 return SO_BROADCAST;
809 case LINUX_SO_SNDBUF:
810 return SO_SNDBUF;
811 case LINUX_SO_RCVBUF:
812 return SO_RCVBUF;
813 case LINUX_SO_KEEPALIVE:
814 return SO_KEEPALIVE;
815 case LINUX_SO_OOBINLINE:
816 return SO_OOBINLINE;
817 case LINUX_SO_LINGER:
818 return SO_LINGER;
819 case LINUX_SO_PRIORITY:
820 case LINUX_SO_NO_CHECK:
821 default:
822 return -1;
823 }
824 }
825
826
827
828
829 int
830 linux_to_bsd_ip_sockopt(lopt)
831 int lopt;
832 {
833
834 switch (lopt) {
835 case LINUX_IP_TOS:
836 return IP_TOS;
837 case LINUX_IP_TTL:
838 return IP_TTL;
839 case LINUX_IP_MULTICAST_TTL:
840 return IP_MULTICAST_TTL;
841 case LINUX_IP_MULTICAST_LOOP:
842 return IP_MULTICAST_LOOP;
843 case LINUX_IP_MULTICAST_IF:
844 return IP_MULTICAST_IF;
845 case LINUX_IP_ADD_MEMBERSHIP:
846 return IP_ADD_MEMBERSHIP;
847 case LINUX_IP_DROP_MEMBERSHIP:
848 return IP_DROP_MEMBERSHIP;
849 case LINUX_IP_HDRINCL:
850 return IP_HDRINCL;
851 default:
852 return -1;
853 }
854 }
855
856
857
858
859 int
860 linux_to_bsd_tcp_sockopt(lopt)
861 int lopt;
862 {
863
864 switch (lopt) {
865 case LINUX_TCP_NODELAY:
866 return TCP_NODELAY;
867 case LINUX_TCP_MAXSEG:
868 return TCP_MAXSEG;
869 default:
870 return -1;
871 }
872 }
873
874
875
876
877 int
878 linux_to_bsd_udp_sockopt(lopt)
879 int lopt;
880 {
881
882 switch (lopt) {
883 default:
884 return -1;
885 }
886 }
887
888
889
890
891
892
893
894 int
895 linux_setsockopt(p, v, retval)
896 struct proc *p;
897 void *v;
898 register_t *retval;
899 {
900 struct linux_setsockopt_args
901
902
903
904
905
906 *uap = v;
907 struct linux_setsockopt_args lsa;
908 struct sys_setsockopt_args bsa;
909 int error, name;
910
911 if ((error = copyin((caddr_t) uap, (caddr_t) &lsa, sizeof lsa)))
912 return error;
913
914 SCARG(&bsa, s) = lsa.s;
915 SCARG(&bsa, level) = linux_to_bsd_sopt_level(lsa.level);
916 SCARG(&bsa, val) = lsa.optval;
917 SCARG(&bsa, valsize) = lsa.optlen;
918
919 switch (SCARG(&bsa, level)) {
920 case SOL_SOCKET:
921 name = linux_to_bsd_so_sockopt(lsa.optname);
922 break;
923 case IPPROTO_IP:
924 name = linux_to_bsd_ip_sockopt(lsa.optname);
925 break;
926 case IPPROTO_TCP:
927 name = linux_to_bsd_tcp_sockopt(lsa.optname);
928 break;
929 case IPPROTO_UDP:
930 name = linux_to_bsd_udp_sockopt(lsa.optname);
931 break;
932 default:
933 return EINVAL;
934 }
935
936 if (name == -1)
937 return EINVAL;
938 SCARG(&bsa, name) = name;
939
940 return sys_setsockopt(p, &bsa, retval);
941 }
942
943
944
945
946 int
947 linux_getsockopt(p, v, retval)
948 struct proc *p;
949 void *v;
950 register_t *retval;
951 {
952 struct linux_getsockopt_args
953
954
955
956
957
958 *uap = v;
959 struct linux_getsockopt_args lga;
960 struct sys_getsockopt_args bga;
961 int error, name;
962
963 if ((error = copyin((caddr_t) uap, (caddr_t) &lga, sizeof lga)))
964 return error;
965
966 SCARG(&bga, s) = lga.s;
967 SCARG(&bga, level) = linux_to_bsd_sopt_level(lga.level);
968 SCARG(&bga, val) = lga.optval;
969 SCARG(&bga, avalsize) = lga.optlen;
970
971 switch (SCARG(&bga, level)) {
972 case SOL_SOCKET:
973 name = linux_to_bsd_so_sockopt(lga.optname);
974 break;
975 case IPPROTO_IP:
976 name = linux_to_bsd_ip_sockopt(lga.optname);
977 break;
978 case IPPROTO_TCP:
979 name = linux_to_bsd_tcp_sockopt(lga.optname);
980 break;
981 case IPPROTO_UDP:
982 name = linux_to_bsd_udp_sockopt(lga.optname);
983 break;
984 default:
985 return EINVAL;
986 }
987
988 if (name == -1)
989 return EINVAL;
990 SCARG(&bga, name) = name;
991
992 return sys_getsockopt(p, &bga, retval);
993 }
994
995 int
996 linux_recvmsg(p, v, retval)
997 struct proc *p;
998 void *v;
999 register_t *retval;
1000 {
1001 struct linux_recvmsg_args
1002
1003
1004
1005 *uap = v;
1006 struct linux_recvmsg_args lla;
1007 struct sys_recvmsg_args bla;
1008 struct msghdr msg;
1009 int error;
1010
1011 if ((error = copyin((caddr_t) uap, (caddr_t) &lla, sizeof lla)))
1012 return error;
1013
1014 SCARG(&bla, s) = lla.s;
1015 SCARG(&bla, msg) = (struct msghdr *)lla.msg;
1016 SCARG(&bla, flags) = lla.flags;
1017
1018 error = sys_recvmsg(p, &bla, retval);
1019 if (error)
1020 return (error);
1021
1022 error = copyin(lla.msg, (caddr_t)&msg, sizeof(msg));
1023
1024 if (!error && msg.msg_name && msg.msg_namelen > 2)
1025 error = linux_sa_put(msg.msg_name);
1026
1027 return (error);
1028 }
1029
1030 int
1031 linux_sendmsg(p, v, retval)
1032 struct proc *p;
1033 void *v;
1034 register_t *retval;
1035 {
1036 struct linux_sendmsg_args
1037
1038
1039
1040 *uap = v;
1041 struct linux_sendmsg_args lla;
1042 struct sys_sendmsg_args bla;
1043 struct msghdr msg, *nmsg = NULL;
1044 int error;
1045 caddr_t control;
1046 int level;
1047
1048 if ((error = copyin((caddr_t) uap, (caddr_t) &lla, sizeof lla)))
1049 return error;
1050
1051 if ((error = copyin(lla.msg, (caddr_t) &msg, sizeof(msg))))
1052 return (error);
1053
1054 if (msg.msg_name) {
1055 struct sockaddr *sa;
1056 caddr_t sg = stackgap_init(p->p_emul);
1057
1058 nmsg = (struct msghdr *)stackgap_alloc(&sg,
1059 sizeof(struct msghdr));
1060 if (!nmsg)
1061 return (ENOMEM);
1062
1063 error = linux_sa_get(p, &sg, &sa,
1064 (struct osockaddr *)msg.msg_name, &msg.msg_namelen);
1065 if (error)
1066 return (error);
1067
1068 msg.msg_name = (struct sockaddr *)sa;
1069 if ((error = copyout(&msg, nmsg, sizeof(struct msghdr))))
1070 return (error);
1071 lla.msg = nmsg;
1072 }
1073
1074 SCARG(&bla, s) = lla.s;
1075 SCARG(&bla, msg) = lla.msg;
1076 SCARG(&bla, flags) = lla.flags;
1077
1078 error = copyin(lla.msg->msg_control, &control, sizeof(caddr_t));
1079 if (error)
1080 return error;
1081 if (control == NULL)
1082 goto done;
1083 error = copyin(&((struct cmsghdr *)control)->cmsg_level,
1084 &level, sizeof(int));
1085 if (error)
1086 return error;
1087 if (level == 1) {
1088
1089
1090
1091
1092 level = SOL_SOCKET;
1093
1094
1095
1096
1097
1098 error = copyout(&level, &((struct cmsghdr *)control)->
1099 cmsg_level, sizeof(int));
1100 if (error)
1101 return error;
1102 }
1103 done:
1104 error = sys_sendmsg(p, &bla, retval);
1105
1106 if (level == SOL_SOCKET) {
1107 level = 1;
1108
1109 copyout(&level, &((struct cmsghdr *)control)->cmsg_level,
1110 sizeof(int));
1111 }
1112 return (error);
1113 }
1114
1115
1116
1117
1118
1119
1120 int
1121 linux_sa_get(p, sgp, sap, osa, osalen)
1122 struct proc *p;
1123 caddr_t *sgp;
1124 struct sockaddr **sap;
1125 const struct osockaddr *osa;
1126 int *osalen;
1127 {
1128 int error=0, bdom;
1129 struct sockaddr *sa, *usa;
1130 struct osockaddr *kosa;
1131 int alloclen;
1132 #ifdef INET6
1133 int oldv6size;
1134 struct sockaddr_in6 *sin6;
1135 #endif
1136
1137 if (*osalen < 2 || *osalen > UCHAR_MAX || !osa) {
1138 return (EINVAL);
1139 }
1140
1141 alloclen = *osalen;
1142 #ifdef INET6
1143 oldv6size = 0;
1144
1145
1146
1147
1148
1149 if (alloclen == sizeof (struct sockaddr_in6) - sizeof (u_int32_t)) {
1150 alloclen = sizeof (struct sockaddr_in6);
1151 oldv6size = 1;
1152 }
1153 #endif
1154
1155 kosa = (struct osockaddr *) malloc(alloclen, M_TEMP, M_WAITOK);
1156
1157 if ((error = copyin(osa, (caddr_t) kosa, *osalen))) {
1158 goto out;
1159 }
1160
1161 bdom = linux_to_bsd_domain(kosa->sa_family);
1162 if (bdom == -1) {
1163 error = EINVAL;
1164 goto out;
1165 }
1166
1167 #ifdef INET6
1168
1169
1170
1171
1172
1173
1174
1175 if (oldv6size && bdom == AF_INET6) {
1176 sin6 = (struct sockaddr_in6 *)kosa;
1177 if (IN6_IS_ADDR_V4MAPPED(&sin6->sin6_addr) ||
1178 (!IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) &&
1179 !IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr) &&
1180 !IN6_IS_ADDR_V4COMPAT(&sin6->sin6_addr) &&
1181 !IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr) &&
1182 !IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr))) {
1183 sin6->sin6_scope_id = 0;
1184 } else {
1185 error = EINVAL;
1186 goto out;
1187 }
1188 } else
1189 #endif
1190 if (bdom == AF_INET) {
1191 alloclen = sizeof(struct sockaddr_in);
1192 }
1193
1194 sa = (struct sockaddr *) kosa;
1195 sa->sa_family = bdom;
1196 sa->sa_len = alloclen;
1197
1198 usa = (struct sockaddr *) stackgap_alloc(sgp, alloclen);
1199 if (!usa) {
1200 error = ENOMEM;
1201 goto out;
1202 }
1203
1204 if ((error = copyout(sa, usa, alloclen))) {
1205 goto out;
1206 }
1207
1208 *sap = usa;
1209
1210 out:
1211 *osalen = alloclen;
1212 free(kosa, M_TEMP);
1213 return (error);
1214 }
1215
1216 int
1217 linux_sa_put(osa)
1218 struct osockaddr *osa;
1219 {
1220 struct sockaddr sa;
1221 struct osockaddr *kosa;
1222 int error, bdom, len;
1223
1224
1225
1226
1227
1228 len = sizeof(sa.sa_len) + sizeof(sa.sa_family);
1229
1230 error = copyin((caddr_t) osa, (caddr_t) &sa, len);
1231 if (error)
1232 return (error);
1233
1234 bdom = bsd_to_linux_domain(sa.sa_family);
1235 if (bdom == -1)
1236 return (EINVAL);
1237
1238
1239 kosa = (struct osockaddr *) &sa;
1240 kosa->sa_family = bdom;
1241 error = copyout(kosa, osa, len);
1242 if (error)
1243 return (error);
1244
1245 return (0);
1246 }
1247
1248
1249
1250
1251
1252 int
1253 linux_sys_socketcall(p, v, retval)
1254 struct proc *p;
1255 void *v;
1256 register_t *retval;
1257 {
1258 struct linux_sys_socketcall_args
1259
1260
1261 *uap = v;
1262
1263 switch (SCARG(uap, what)) {
1264 case LINUX_SYS_socket:
1265 return linux_socket(p, SCARG(uap, args), retval);
1266 case LINUX_SYS_bind:
1267 return linux_bind(p, SCARG(uap, args), retval);
1268 case LINUX_SYS_connect:
1269 return linux_connect(p, SCARG(uap, args), retval);
1270 case LINUX_SYS_listen:
1271 return linux_listen(p, SCARG(uap, args), retval);
1272 case LINUX_SYS_accept:
1273 return linux_accept(p, SCARG(uap, args), retval);
1274 case LINUX_SYS_getsockname:
1275 return linux_getsockname(p, SCARG(uap, args), retval);
1276 case LINUX_SYS_getpeername:
1277 return linux_getpeername(p, SCARG(uap, args), retval);
1278 case LINUX_SYS_socketpair:
1279 return linux_socketpair(p, SCARG(uap, args), retval);
1280 case LINUX_SYS_send:
1281 return linux_send(p, SCARG(uap, args), retval);
1282 case LINUX_SYS_recv:
1283 return linux_recv(p, SCARG(uap, args), retval);
1284 case LINUX_SYS_sendto:
1285 return linux_sendto(p, SCARG(uap, args), retval);
1286 case LINUX_SYS_recvfrom:
1287 return linux_recvfrom(p, SCARG(uap, args), retval);
1288 case LINUX_SYS_shutdown:
1289 return linux_shutdown(p, SCARG(uap, args), retval);
1290 case LINUX_SYS_setsockopt:
1291 return linux_setsockopt(p, SCARG(uap, args), retval);
1292 case LINUX_SYS_getsockopt:
1293 return linux_getsockopt(p, SCARG(uap, args), retval);
1294 case LINUX_SYS_sendmsg:
1295 return linux_sendmsg(p, SCARG(uap, args), retval);
1296 case LINUX_SYS_recvmsg:
1297 return linux_recvmsg(p, SCARG(uap, args), retval);
1298 default:
1299 return ENOSYS;
1300 }
1301 }
1302
1303 int
1304 linux_ioctl_socket(p, v, retval)
1305 register struct proc *p;
1306 void *v;
1307 register_t *retval;
1308 {
1309 struct linux_sys_ioctl_args
1310
1311
1312
1313 *uap = v;
1314 u_long com;
1315 struct sys_ioctl_args ia;
1316 struct file *fp;
1317 struct filedesc *fdp;
1318 struct vnode *vp;
1319 int (*ioctlf)(struct file *, u_long, caddr_t, struct proc *);
1320 struct ioctl_pt pt;
1321 int error = 0, isdev = 0, dosys = 1;
1322
1323 fdp = p->p_fd;
1324 if ((fp = fd_getfile(fdp, SCARG(uap, fd))) == NULL)
1325 return (EBADF);
1326 FREF(fp);
1327
1328 if (fp->f_type == DTYPE_VNODE) {
1329 vp = (struct vnode *)fp->f_data;
1330 isdev = vp->v_type == VCHR;
1331 }
1332
1333
1334
1335
1336
1337
1338
1339
1340 if (isdev) {
1341 dosys = 0;
1342 ioctlf = fp->f_ops->fo_ioctl;
1343 pt.com = SCARG(uap, com);
1344 pt.data = SCARG(uap, data);
1345 error = ioctlf(fp, PTIOCLINUX, (caddr_t)&pt, p);
1346
1347
1348
1349
1350 if (error == EJUSTRETURN) {
1351 retval[0] = (register_t)pt.data;
1352 error = 0;
1353 }
1354 goto out;
1355 }
1356
1357 com = SCARG(uap, com);
1358 retval[0] = 0;
1359
1360 switch (com) {
1361 case LINUX_FIOSETOWN:
1362 SCARG(&ia, com) = FIOSETOWN;
1363 break;
1364 case LINUX_SIOCSPGRP:
1365 SCARG(&ia, com) = SIOCSPGRP;
1366 break;
1367 case LINUX_FIOGETOWN:
1368 SCARG(&ia, com) = FIOGETOWN;
1369 break;
1370 case LINUX_SIOCGPGRP:
1371 SCARG(&ia, com) = SIOCGPGRP;
1372 break;
1373 case LINUX_SIOCATMARK:
1374 SCARG(&ia, com) = SIOCATMARK;
1375 break;
1376 #if 0
1377 case LINUX_SIOCGSTAMP:
1378 SCARG(&ia, com) = SIOCGSTAMP;
1379 break;
1380 #endif
1381 case LINUX_SIOCGIFCONF:
1382 SCARG(&ia, com) = OSIOCGIFCONF;
1383 break;
1384 case LINUX_SIOCGIFFLAGS:
1385 SCARG(&ia, com) = SIOCGIFFLAGS;
1386 break;
1387 case LINUX_SIOCGIFADDR:
1388 SCARG(&ia, com) = OSIOCGIFADDR;
1389 break;
1390 case LINUX_SIOCGIFDSTADDR:
1391 SCARG(&ia, com) = OSIOCGIFDSTADDR;
1392 break;
1393 case LINUX_SIOCGIFBRDADDR:
1394 SCARG(&ia, com) = OSIOCGIFBRDADDR;
1395 break;
1396 case LINUX_SIOCGIFNETMASK:
1397 SCARG(&ia, com) = OSIOCGIFNETMASK;
1398 break;
1399 case LINUX_SIOCGIFMETRIC:
1400 SCARG(&ia, com) = SIOCGIFMETRIC;
1401 break;
1402 case LINUX_SIOCGIFMTU:
1403 SCARG(&ia, com) = SIOCGIFMTU;
1404 break;
1405 case LINUX_SIOCADDMULTI:
1406 SCARG(&ia, com) = SIOCADDMULTI;
1407 break;
1408 case LINUX_SIOCDELMULTI:
1409 SCARG(&ia, com) = SIOCDELMULTI;
1410 break;
1411 case LINUX_SIOCGIFHWADDR: {
1412 struct linux_ifreq *ifr = (struct linux_ifreq *)SCARG(uap, data);
1413 struct sockaddr_dl *sdl;
1414 struct ifnet *ifp;
1415 struct ifaddr *ifa;
1416
1417
1418
1419
1420
1421 TAILQ_FOREACH(ifp, &ifnet, if_list) {
1422 if (ifp->if_type != IFT_ETHER)
1423 continue;
1424 TAILQ_FOREACH(ifa, &ifp->if_addrlist, ifa_list) {
1425 if ((sdl = (struct sockaddr_dl *)ifa->ifa_addr) &&
1426 (sdl->sdl_family == AF_LINK) &&
1427 (sdl->sdl_type == IFT_ETHER)) {
1428 error = copyout(LLADDR(sdl),
1429 (caddr_t)&ifr->ifr_hwaddr.sa_data,
1430 LINUX_IFHWADDRLEN);
1431 dosys = 0;
1432 goto out;
1433 }
1434 }
1435 }
1436 error = ENOENT;
1437 break;
1438 }
1439 default:
1440 error = EINVAL;
1441 }
1442
1443 out:
1444 if (error == 0 && dosys) {
1445 SCARG(&ia, fd) = SCARG(uap, fd);
1446 SCARG(&ia, data) = SCARG(uap, data);
1447 error = sys_ioctl(p, &ia, retval);
1448 }
1449
1450 FRELE(fp);
1451 return (error);
1452 }