xref: /netbsd-src/sys/compat/linux/common/linux_socketcall.c (revision 1f2744e6e4915c9da2a3f980279398c4cf7d5e6d)
1 /*	$NetBSD: linux_socketcall.c,v 1.1 1995/02/28 23:25:17 fvdl Exp $	*/
2 
3 /*
4  * Copyright (c) 1995 Frank van der Linden
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *      This product includes software developed for the NetBSD Project
18  *      by Frank van der Linden
19  * 4. The name of the author may not be used to endorse or promote products
20  *    derived from this software without specific prior written permission
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
23  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
24  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
25  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
26  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
27  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
28  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
29  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
30  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
31  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32  */
33 
34 #include <sys/param.h>
35 #include <sys/kernel.h>
36 #include <sys/systm.h>
37 #include <sys/buf.h>
38 #include <sys/malloc.h>
39 #include <sys/ioctl.h>
40 #include <sys/tty.h>
41 #include <sys/file.h>
42 #include <sys/filedesc.h>
43 #include <sys/select.h>
44 #include <sys/socket.h>
45 #include <sys/socketvar.h>
46 #include <net/if.h>
47 #include <netinet/in.h>
48 #include <sys/mount.h>
49 #include <sys/proc.h>
50 #include <sys/vnode.h>
51 #include <sys/device.h>
52 
53 #include <sys/syscallargs.h>
54 
55 #include <compat/linux/linux_types.h>
56 #include <compat/linux/linux_util.h>
57 #include <compat/linux/linux_syscallargs.h>
58 #include <compat/linux/linux_ioctl.h>
59 #include <compat/linux/linux_socket.h>
60 #include <compat/linux/linux_socketcall.h>
61 #include <compat/linux/linux_sockio.h>
62 
63 /*
64  * All the calls in this file are entered via one common system
65  * call in Linux, represented here by linux_socketcall()
66  * Arguments for the various calls are on the user stack. A pointer
67  * to them is the only thing that is passed. It is up to the various
68  * calls to copy them in themselves. To make it look better, they
69  * are copied to structures.
70  */
71 
72 /*
73  * Convert between Linux and BSD socket domain values
74  */
75 static int
76 linux_to_bsd_domain(ldom)
77 	int ldom;
78 {
79 	switch (ldom) {
80 	case LINUX_AF_UNSPEC:
81 		return AF_UNSPEC;
82 	case LINUX_AF_UNIX:
83 		return AF_LOCAL;
84 	case LINUX_AF_INET:
85 		return AF_INET;
86 	case LINUX_AF_AX25:
87 		return AF_CCITT;
88 	case LINUX_AF_IPX:
89 		return AF_IPX;
90 	case LINUX_AF_APPLETALK:
91 		return AF_APPLETALK;
92 	default:
93 		return -1;
94 	}
95 }
96 
97 static int
98 linux_socket(p, args, retval)
99 	struct proc *p;
100 	struct linux_socket_args /* {
101 		syscallarg(int)	domain;
102 		syscallarg(int)	type;
103 		syscallarg(int) protocol;
104 	} */ *args;
105 	register_t *retval;
106 {
107 	struct linux_socket_args lsa;
108 	struct socket_args bsa;
109 	int error;
110 
111 	if ((error = copyin((caddr_t) args, (caddr_t) &lsa, sizeof lsa)))
112 		return error;
113 
114 	SCARG(&bsa, protocol) = lsa.protocol;
115 	SCARG(&bsa, type) = lsa.type;
116 	SCARG(&bsa, domain) = linux_to_bsd_domain(lsa.domain);
117 	if (SCARG(&bsa, domain) == -1)
118 		return EINVAL;
119 	return socket(p, &bsa, retval);
120 }
121 
122 static int
123 linux_bind(p, args, retval)
124 	struct proc *p;
125 	struct linux_bind_args /* {
126 		syscallarg(int)	s;
127 		syscallarg(struct sockaddr *) name;
128 		syscallarg(int)	namelen;
129 	} */ *args;
130 	register_t *retval;
131 {
132 	struct linux_bind_args lba;
133 	struct bind_args bba;
134 	int error;
135 
136 	if ((error = copyin((caddr_t) args, (caddr_t) &lba, sizeof lba)))
137 		return error;
138 
139 	SCARG(&bba, s) = lba.s;
140 	SCARG(&bba, name) = (caddr_t) lba.name;
141 	SCARG(&bba, namelen) = lba.namelen;
142 
143 	return bind(p, &bba, retval);
144 }
145 
146 static int
147 linux_connect(p, args, retval)
148 	struct proc *p;
149 	struct linux_connect_args /* {
150 		syscallarg(int)	s;
151 		syscallarg(struct sockaddr *) name;
152 		syscallarg(int)	namelen;
153 	} */ *args;
154 	register_t *retval;
155 {
156 	struct linux_connect_args lca;
157 	struct connect_args bca;
158 	int error;
159 
160 	if ((error = copyin((caddr_t) args, (caddr_t) &lca, sizeof lca)))
161 		return error;
162 
163 	SCARG(&bca, s) = lca.s;
164 	SCARG(&bca, name) = (caddr_t) lca.name;
165 	SCARG(&bca, namelen) = lca.namelen;
166 
167 	return connect(p, &bca, retval);
168 }
169 
170 static int
171 linux_listen(p, args, retval)
172 	struct proc *p;
173 	struct linux_listen_args /* {
174 		syscallarg(int) s;
175 		syscallarg(int) backlog;
176 	} */ *args;
177 	register *retval;
178 {
179 	struct linux_listen_args lla;
180 	struct listen_args bla;
181 	int error;
182 
183 	if ((error = copyin((caddr_t) args, (caddr_t) &lla, sizeof lla)))
184 		return error;
185 
186 	SCARG(&bla, s) = lla.s;
187 	SCARG(&bla, backlog) = lla.backlog;
188 
189 	return listen(p, &bla, retval);
190 }
191 
192 static int
193 linux_accept(p, args, retval)
194 	struct proc *p;
195 	struct linux_accept_args /* {
196 		syscallarg(int) s;
197 		syscallarg(struct sockaddr *) addr;
198 		syscallarg(int *) namelen;
199 	} */ *args;
200 	register_t *retval;
201 {
202 	struct linux_accept_args laa;
203 	struct compat_43_accept_args baa;
204 	int error;
205 
206 	if ((error = copyin((caddr_t) args, (caddr_t) &laa, sizeof laa)))
207 		return error;
208 
209 	SCARG(&baa, s) = laa.s;
210 	SCARG(&baa, name) = (caddr_t) laa.addr;
211 	SCARG(&baa, anamelen) = laa.namelen;
212 
213 	return compat_43_accept(p, &baa, retval);
214 }
215 
216 static int
217 linux_getsockname(p, args, retval)
218 	struct proc *p;
219 	struct linux_getsockname_args /* {
220 		syscallarg(int) s;
221 		syscallarg(struct sockaddr *) addr;
222 		syscallarg(int *) namelen;
223 	} */ *args;
224 	register_t *retval;
225 {
226 	struct linux_getsockname_args lga;
227 	struct compat_43_getsockname_args bga;
228 	int error;
229 
230 	if ((error = copyin((caddr_t) args, (caddr_t) &lga, sizeof lga)))
231 		return error;
232 
233 	SCARG(&bga, fdec) = lga.s;
234 	SCARG(&bga, asa) = (caddr_t) lga.addr;
235 	SCARG(&bga, alen) = lga.namelen;
236 
237 	return compat_43_getsockname(p, &bga, retval);
238 }
239 
240 static int
241 linux_getpeername(p, args, retval)
242 	struct proc *p;
243 	struct linux_getpeername_args /* {
244 		syscallarg(int) s;
245 		syscallarg(struct sockaddr *) addr;
246 		syscallarg(int *) namelen;
247 	} */ *args;
248 	register_t *retval;
249 {
250 	struct linux_getpeername_args lga;
251 	struct compat_43_getpeername_args bga;
252 	int error;
253 
254 	if ((error = copyin((caddr_t) args, (caddr_t) &lga, sizeof lga)))
255 		return error;
256 
257 	SCARG(&bga, fdes) = lga.s;
258 	SCARG(&bga, asa) = (caddr_t) lga.addr;
259 	SCARG(&bga, alen) = lga.namelen;
260 
261 	return compat_43_getpeername(p, &bga, retval);
262 }
263 
264 static int
265 linux_socketpair(p, args, retval)
266 	struct proc *p;
267 	struct linux_socketpair_args /* {
268 		syscallarg(int) domain;
269 		syscallarg(int) type;
270 		syscallarg(int) protocol;
271 		syscallarg(int *) rsv;
272 	} */ *args;
273 	register_t *retval;
274 {
275 	struct linux_socketpair_args lsa;
276 	struct socketpair_args bsa;
277 	int error;
278 
279 	if ((error = copyin((caddr_t) args, &lsa, sizeof lsa)))
280 		return error;
281 
282 	SCARG(&bsa, domain) = linux_to_bsd_domain(lsa.domain);
283 	if (SCARG(&bsa, domain) == -1)
284 		return EINVAL;
285 	SCARG(&bsa, type) = lsa.type;
286 	SCARG(&bsa, protocol) = lsa.protocol;
287 	SCARG(&bsa, rsv) = lsa.rsv;
288 
289 	return socketpair(p, &bsa, retval);
290 }
291 
292 static int
293 linux_send(p, args, retval)
294 	struct proc *p;
295 	struct linux_send_args /* {
296 		syscallarg(int) s;
297 		syscallarg(void *) msg;
298 		syscallarg(int) len;
299 		syscallarg(int) flags;
300 	} */ *args;
301 	register_t *retval;
302 {
303 	struct linux_send_args lsa;
304 	struct compat_43_send_args bsa;
305 	int error;
306 
307 	if ((error = copyin((caddr_t) args, (caddr_t) &lsa, sizeof lsa)))
308 		return error;
309 
310 	SCARG(&bsa, s) = lsa.s;
311 	SCARG(&bsa, buf) = lsa.msg;
312 	SCARG(&bsa, len) = lsa.len;
313 	SCARG(&bsa, flags) = lsa.flags;
314 
315 	return compat_43_send(p, &bsa, retval);
316 }
317 
318 static int
319 linux_recv(p, args, retval)
320 	struct proc *p;
321 	struct linux_recv_args *args;
322 	register_t *retval;
323 {
324 	struct linux_recv_args lra;
325 	struct compat_43_recv_args bra;
326 	int error;
327 
328 	if ((error = copyin((caddr_t) args, (caddr_t) &lra, sizeof lra)))
329 		return error;
330 
331 	SCARG(&bra, s) = lra.s;
332 	SCARG(&bra, buf) = lra.msg;
333 	SCARG(&bra, len) = lra.len;
334 	SCARG(&bra, flags) = lra.flags;
335 
336 	return compat_43_recv(p, &bra, retval);
337 }
338 
339 static int
340 linux_sendto(p, args, retval)
341 	struct proc *p;
342 	struct linux_sendto_args /* {
343 		syscallarg(int) s;
344 		syscallarg(void *) msg;
345 		syscallarg(int) len;
346 		syscallarg(int) flags;
347 		syscallarg(sockaddr *) to;
348 		syscallarg(int) tolen;
349 	} */ *args;
350 	register_t *retval;
351 {
352 	struct linux_sendto_args lsa;
353 	struct sendto_args bsa;
354 	int error;
355 
356 	if ((error = copyin((caddr_t) args, (caddr_t) &lsa, sizeof lsa)))
357 		return error;
358 
359 	SCARG(&bsa, s) = lsa.s;
360 	SCARG(&bsa, buf) = lsa.msg;
361 	SCARG(&bsa, len) = lsa.len;
362 	SCARG(&bsa, flags) = lsa.flags;
363 	SCARG(&bsa, to) = (caddr_t) lsa.to;
364 	SCARG(&bsa, tolen) = lsa.tolen;
365 
366 	return sendto(p, &bsa, retval);
367 }
368 
369 static int
370 linux_recvfrom(p, args, retval)
371 	struct proc *p;
372 	struct linux_recvfrom_args /* {
373 		syscallarg(int) s;
374 		syscallarg(void *) buf;
375 		syscallarg(int) len;
376 		syscallarg(int) flags;
377 		syscallarg(struct sockaddr *) from;
378 		syscallarg(int *) fromlen;
379 	} */ *args;
380 {
381 	struct linux_recvfrom_args lra;
382 	struct compat_43_recvfrom_args bra;
383 	int error;
384 
385 	if ((error = copyin((caddr_t) args, (caddr_t) &lra, sizeof lra)))
386 		return error;
387 
388 	SCARG(&bra, s) = lra.s;
389 	SCARG(&bra, buf) = lra.buf;
390 	SCARG(&bra, len) = lra.len;
391 	SCARG(&bra, flags) = lra.flags;
392 	SCARG(&bra, from) = (caddr_t) lra.from;
393 	SCARG(&bra, fromlenaddr) = lra.fromlen;
394 
395 	return compat_43_recvfrom(p, &bra, retval);
396 }
397 
398 static int
399 linux_shutdown(p, args, retval)
400 	struct proc *p;
401 	struct linux_shutdown_args /* {
402 		syscallarg(int) s;
403 		syscallarg(int) how;
404 	} */ *args;
405 	register_t *retval;
406 {
407 	struct linux_shutdown_args lsa;
408 	struct shutdown_args bsa;
409 	int error;
410 
411 	if ((error = copyin((caddr_t) args, (caddr_t) &lsa, sizeof lsa)))
412 		return error;
413 
414 	SCARG(&bsa, s) = lsa.s;
415 	SCARG(&bsa, how) = lsa.how;
416 
417 	return shutdown(p, &bsa, retval);
418 }
419 
420 /*
421  * Convert socket option level from Linux to NetBSD value. Only SOL_SOCKET
422  * is different, the rest matches IPPROTO_* on both systems.
423  */
424 static int
425 linux_to_bsd_sopt_level(llevel)
426 	int llevel;
427 {
428 	switch (llevel) {
429 	case LINUX_SOL_SOCKET:
430 		return SOL_SOCKET;
431 	default:
432 		return llevel;
433 	}
434 }
435 
436 /*
437  * Convert Linux IP level socket option number to NetBSD values.
438  * Linux only implements IP_TOS and IP_TTL
439  */
440 static int linux_to_bsd_ip_sockopt(lopt)
441 	int lopt;
442 {
443 	switch (lopt) {
444 	case LINUX_IP_TOS:
445 		return IP_TOS;
446 	case LINUX_IP_TTL:
447 		return IP_TTL;
448 	default:
449 		return -1;
450 	}
451 }
452 
453 /*
454  * Convert Linux socket level socket option numbers to NetBSD values.
455  */
456 static int
457 linux_to_bsd_so_sockopt(lopt)
458 	int lopt;
459 {
460 	switch (lopt) {
461 	case LINUX_SO_DEBUG:
462 		return SO_DEBUG;
463 	case LINUX_SO_REUSEADDR:
464 		return SO_REUSEADDR;
465 	case LINUX_SO_TYPE:
466 		return SO_TYPE;
467 	case LINUX_SO_ERROR:
468 		return SO_ERROR;
469 	case LINUX_SO_DONTROUTE:
470 		return SO_DONTROUTE;
471 	case LINUX_SO_BROADCAST:
472 		return SO_BROADCAST;
473 	case LINUX_SO_SNDBUF:
474 		return SO_SNDBUF;
475 	case LINUX_SO_RCVBUF:
476 		return SO_RCVBUF;
477 	case LINUX_SO_KEEPALIVE:
478 		return SO_KEEPALIVE;
479 	case LINUX_SO_OOBINLINE:
480 		return SO_OOBINLINE;
481 	case LINUX_SO_LINGER:
482 		return SO_LINGER;
483 	case LINUX_SO_PRIORITY:
484 	case LINUX_SO_NO_CHECK:
485 	default:
486 		return -1;
487 	}
488 }
489 
490 /*
491  * Another reasonably straightforward function: setsockopt(2). Only
492  * the SOL_SOCKET and IPPROTO_IP levels are implemented here.
493  * The level and option numbers are converted; the values passed
494  * are not (yet) converted, the ones currently implemented don't
495  * need conversion, as they are the same on both systems.
496  */
497 static int
498 linux_setsockopt(p, args, retval)
499 	struct proc *p;
500 	struct linux_setsockopt_args /* {
501 		syscallarg(int) s;
502 		syscallarg(int) level;
503 		syscallarg(int) optname;
504 		syscallarg(void *) optval;
505 		syscallarg(int) optlen;
506 	} */ *args;
507 	register_t *retval;
508 {
509 	struct linux_setsockopt_args lsa;
510 	struct setsockopt_args bsa;
511 	int error, name;
512 
513 	if ((error = copyin((caddr_t) args, (caddr_t) &lsa, sizeof lsa)))
514 		return error;
515 
516 	SCARG(&bsa, s) = lsa.s;
517 
518 	SCARG(&bsa, level) = linux_to_bsd_sopt_level(lsa.level);
519 
520 	switch (SCARG(&bsa, level)) {
521 		case SOL_SOCKET:
522 			name = linux_to_bsd_so_sockopt(lsa.optname);
523 			break;
524 		case IPPROTO_IP:
525 			name = linux_to_bsd_ip_sockopt(lsa.optname);
526 			break;
527 		default:
528 			return EINVAL;
529 	}
530 
531 	if (name == -1)
532 		return EINVAL;
533 	SCARG(&bsa, name) = name;
534 	SCARG(&bsa, val) = lsa.optval;
535 	SCARG(&bsa, valsize) = lsa.optlen;
536 
537 	return setsockopt(p, &bsa, retval);
538 }
539 
540 /*
541  * getsockopt(2) is very much the same as setsockopt(2) (see above)
542  */
543 static int
544 linux_getsockopt(p, args, retval)
545 	struct proc *p;
546 	struct linux_getsockopt_args /* {
547 		syscallarg(int) s;
548 		syscallarg(int) level;
549 		syscallarg(int) optname;
550 		syscallarg(void *) optval;
551 		syscallarg(int) *optlen;
552 	} */ *args;
553 	register_t *retval;
554 {
555 	struct linux_getsockopt_args lga;
556 	struct getsockopt_args bga;
557 	int error, name;
558 
559 	if ((error = copyin((caddr_t) args, (caddr_t) &lga, sizeof lga)))
560 		return error;
561 
562 	SCARG(&bga, s) = lga.s;
563 
564 	SCARG(&bga, level) = linux_to_bsd_sopt_level(lga.level);
565 
566 	switch (SCARG(&bga, level)) {
567 		case SOL_SOCKET:
568 			name = linux_to_bsd_so_sockopt(lga.optname);
569 			break;
570 		case IPPROTO_IP:
571 			name = linux_to_bsd_ip_sockopt(lga.optname);
572 			break;
573 		default:
574 			return EINVAL;
575 	}
576 
577 	if (name == -1)
578 		return EINVAL;
579 	SCARG(&bga, val) = lga.optval;
580 	SCARG(&bga, avalsize) = lga.optlen;
581 
582 	return getsockopt(p, &bga, retval);
583 }
584 
585 /*
586  * Entry point to all Linux socket calls. Just check which call to
587  * make and take appropriate action.
588  */
589 int
590 linux_socketcall(p, uap, retval)
591 	struct proc *p;
592 	struct linux_socketcall_args /* {
593 		syscallarg(int) what;
594 		syscallarg(void *) args;
595 	} */ *uap;
596 	register_t *retval;
597 {
598 	switch (SCARG(uap, what)) {
599 	case LINUX_SYS_socket:
600 		return linux_socket(p, SCARG(uap, args), retval);
601 	case LINUX_SYS_bind:
602 		return linux_bind(p, SCARG(uap, args), retval);
603 	case LINUX_SYS_connect:
604 		return linux_connect(p, SCARG(uap, args), retval);
605 	case LINUX_SYS_listen:
606 		return linux_listen(p, SCARG(uap, args), retval);
607 	case LINUX_SYS_accept:
608 		return linux_accept(p, SCARG(uap, args), retval);
609 	case LINUX_SYS_getsockname:
610 		return linux_getsockname(p, SCARG(uap, args), retval);
611 	case LINUX_SYS_getpeername:
612 		return linux_getpeername(p, SCARG(uap, args), retval);
613 	case LINUX_SYS_socketpair:
614 		return linux_socketpair(p, SCARG(uap, args), retval);
615 	case LINUX_SYS_send:
616 		return linux_send(p, SCARG(uap, args), retval);
617 	case LINUX_SYS_recv:
618 		return linux_recv(p, SCARG(uap, args), retval);
619 	case LINUX_SYS_sendto:
620 		return linux_sendto(p, SCARG(uap, args), retval);
621 	case LINUX_SYS_recvfrom:
622 		return linux_recvfrom(p, SCARG(uap, args), retval);
623 	case LINUX_SYS_shutdown:
624 		return linux_shutdown(p, SCARG(uap, args), retval);
625 	case LINUX_SYS_setsockopt:
626 		return linux_setsockopt(p, SCARG(uap, args), retval);
627 	case LINUX_SYS_getsockopt:
628 		return linux_getsockopt(p, SCARG(uap, args), retval);
629 	default:
630 		return ENOSYS;
631 	}
632 }
633