Include ntsvc NDR in libndr-standard.
[Samba/eduardoll.git] / lib / socket_wrapper / socket_wrapper.c
blob933b1260e43270d92060acb97ea3e9e4c3d4e0a4
1 /*
2 * Copyright (C) Jelmer Vernooij 2005,2008 <jelmer@samba.org>
3 * Copyright (C) Stefan Metzmacher 2006-2009 <metze@samba.org>
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
18 * 3. Neither the name of the author nor the names of its contributors
19 * may be used to endorse or promote products derived from this software
20 * without specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
37 Socket wrapper library. Passes all socket communication over
38 unix domain sockets if the environment variable SOCKET_WRAPPER_DIR
39 is set.
42 #ifdef _SAMBA_BUILD_
44 #define SOCKET_WRAPPER_NOT_REPLACE
45 #include "../replace/replace.h"
46 #include "system/network.h"
47 #include "system/filesys.h"
48 #include "system/time.h"
50 #else /* _SAMBA_BUILD_ */
52 #include <sys/types.h>
53 #include <sys/time.h>
54 #include <sys/stat.h>
55 #include <sys/socket.h>
56 #include <sys/ioctl.h>
57 #include <sys/filio.h>
58 #include <errno.h>
59 #include <sys/un.h>
60 #include <netinet/in.h>
61 #include <netinet/tcp.h>
62 #include <fcntl.h>
63 #include <stdlib.h>
64 #include <unistd.h>
65 #include <string.h>
66 #include <stdio.h>
67 #include <stdint.h>
69 #endif
71 #ifndef _PUBLIC_
72 #define _PUBLIC_
73 #endif
75 #define SWRAP_DLIST_ADD(list,item) do { \
76 if (!(list)) { \
77 (item)->prev = NULL; \
78 (item)->next = NULL; \
79 (list) = (item); \
80 } else { \
81 (item)->prev = NULL; \
82 (item)->next = (list); \
83 (list)->prev = (item); \
84 (list) = (item); \
85 } \
86 } while (0)
88 #define SWRAP_DLIST_REMOVE(list,item) do { \
89 if ((list) == (item)) { \
90 (list) = (item)->next; \
91 if (list) { \
92 (list)->prev = NULL; \
93 } \
94 } else { \
95 if ((item)->prev) { \
96 (item)->prev->next = (item)->next; \
97 } \
98 if ((item)->next) { \
99 (item)->next->prev = (item)->prev; \
102 (item)->prev = NULL; \
103 (item)->next = NULL; \
104 } while (0)
106 /* LD_PRELOAD doesn't work yet, so REWRITE_CALLS is all we support
107 * for now */
108 #define REWRITE_CALLS
110 #ifdef REWRITE_CALLS
111 #define real_accept accept
112 #define real_connect connect
113 #define real_bind bind
114 #define real_listen listen
115 #define real_getpeername getpeername
116 #define real_getsockname getsockname
117 #define real_getsockopt getsockopt
118 #define real_setsockopt setsockopt
119 #define real_recvfrom recvfrom
120 #define real_sendto sendto
121 #define real_sendmsg sendmsg
122 #define real_ioctl ioctl
123 #define real_recv recv
124 #define real_send send
125 #define real_readv readv
126 #define real_writev writev
127 #define real_socket socket
128 #define real_close close
129 #endif
131 #ifdef HAVE_GETTIMEOFDAY_TZ
132 #define swrapGetTimeOfDay(tval) gettimeofday(tval,NULL)
133 #else
134 #define swrapGetTimeOfDay(tval) gettimeofday(tval)
135 #endif
137 /* we need to use a very terse format here as IRIX 6.4 silently
138 truncates names to 16 chars, so if we use a longer name then we
139 can't tell which port a packet came from with recvfrom()
141 with this format we have 8 chars left for the directory name
143 #define SOCKET_FORMAT "%c%02X%04X"
144 #define SOCKET_TYPE_CHAR_TCP 'T'
145 #define SOCKET_TYPE_CHAR_UDP 'U'
146 #define SOCKET_TYPE_CHAR_TCP_V6 'X'
147 #define SOCKET_TYPE_CHAR_UDP_V6 'Y'
149 #define MAX_WRAPPED_INTERFACES 16
151 #ifdef HAVE_IPV6
153 * FD00::5357:5FXX
155 static const struct in6_addr *swrap_ipv6(void)
157 static struct in6_addr v;
158 static int initialized;
159 int ret;
161 if (initialized) {
162 return &v;
164 initialized = 1;
166 ret = inet_pton(AF_INET6, "FD00::5357:5F00", &v);
167 if (ret <= 0) {
168 abort();
171 return &v;
173 #endif
175 static struct sockaddr *sockaddr_dup(const void *data, socklen_t len)
177 struct sockaddr *ret = (struct sockaddr *)malloc(len);
178 memcpy(ret, data, len);
179 return ret;
182 static void set_port(int family, int prt, struct sockaddr *addr)
184 switch (family) {
185 case AF_INET:
186 ((struct sockaddr_in *)addr)->sin_port = htons(prt);
187 break;
188 #ifdef HAVE_IPV6
189 case AF_INET6:
190 ((struct sockaddr_in6 *)addr)->sin6_port = htons(prt);
191 break;
192 #endif
196 static size_t socket_length(int family)
198 switch (family) {
199 case AF_INET:
200 return sizeof(struct sockaddr_in);
201 #ifdef HAVE_IPV6
202 case AF_INET6:
203 return sizeof(struct sockaddr_in6);
204 #endif
206 return 0;
211 struct socket_info
213 int fd;
215 int family;
216 int type;
217 int protocol;
218 int bound;
219 int bcast;
220 int is_server;
221 int connected;
222 int defer_connect;
224 char *path;
225 char *tmp_path;
227 struct sockaddr *myname;
228 socklen_t myname_len;
230 struct sockaddr *peername;
231 socklen_t peername_len;
233 struct {
234 unsigned long pck_snd;
235 unsigned long pck_rcv;
236 } io;
238 struct socket_info *prev, *next;
241 static struct socket_info *sockets;
243 const char *socket_wrapper_dir(void)
245 const char *s = getenv("SOCKET_WRAPPER_DIR");
246 if (s == NULL) {
247 return NULL;
249 if (strncmp(s, "./", 2) == 0) {
250 s += 2;
252 return s;
255 unsigned int socket_wrapper_default_iface(void)
257 const char *s = getenv("SOCKET_WRAPPER_DEFAULT_IFACE");
258 if (s) {
259 unsigned int iface;
260 if (sscanf(s, "%u", &iface) == 1) {
261 if (iface >= 1 && iface <= MAX_WRAPPED_INTERFACES) {
262 return iface;
267 return 1;/* 127.0.0.1 */
270 static int convert_un_in(const struct sockaddr_un *un, struct sockaddr *in, socklen_t *len)
272 unsigned int iface;
273 unsigned int prt;
274 const char *p;
275 char type;
277 p = strrchr(un->sun_path, '/');
278 if (p) p++; else p = un->sun_path;
280 if (sscanf(p, SOCKET_FORMAT, &type, &iface, &prt) != 3) {
281 errno = EINVAL;
282 return -1;
285 if (iface == 0 || iface > MAX_WRAPPED_INTERFACES) {
286 errno = EINVAL;
287 return -1;
290 if (prt > 0xFFFF) {
291 errno = EINVAL;
292 return -1;
295 switch(type) {
296 case SOCKET_TYPE_CHAR_TCP:
297 case SOCKET_TYPE_CHAR_UDP: {
298 struct sockaddr_in *in2 = (struct sockaddr_in *)in;
300 if ((*len) < sizeof(*in2)) {
301 errno = EINVAL;
302 return -1;
305 memset(in2, 0, sizeof(*in2));
306 in2->sin_family = AF_INET;
307 in2->sin_addr.s_addr = htonl((127<<24) | iface);
308 in2->sin_port = htons(prt);
310 *len = sizeof(*in2);
311 break;
313 #ifdef HAVE_IPV6
314 case SOCKET_TYPE_CHAR_TCP_V6:
315 case SOCKET_TYPE_CHAR_UDP_V6: {
316 struct sockaddr_in6 *in2 = (struct sockaddr_in6 *)in;
318 if ((*len) < sizeof(*in2)) {
319 errno = EINVAL;
320 return -1;
323 memset(in2, 0, sizeof(*in2));
324 in2->sin6_family = AF_INET6;
325 in2->sin6_addr = *swrap_ipv6();
326 in2->sin6_addr.s6_addr[15] = iface;
327 in2->sin6_port = htons(prt);
329 *len = sizeof(*in2);
330 break;
332 #endif
333 default:
334 errno = EINVAL;
335 return -1;
338 return 0;
341 static int convert_in_un_remote(struct socket_info *si, const struct sockaddr *inaddr, struct sockaddr_un *un,
342 int *bcast)
344 char type = '\0';
345 unsigned int prt;
346 unsigned int iface;
347 int is_bcast = 0;
349 if (bcast) *bcast = 0;
351 switch (inaddr->sa_family) {
352 case AF_INET: {
353 const struct sockaddr_in *in =
354 (const struct sockaddr_in *)inaddr;
355 unsigned int addr = ntohl(in->sin_addr.s_addr);
356 char u_type = '\0';
357 char b_type = '\0';
358 char a_type = '\0';
360 switch (si->type) {
361 case SOCK_STREAM:
362 u_type = SOCKET_TYPE_CHAR_TCP;
363 break;
364 case SOCK_DGRAM:
365 u_type = SOCKET_TYPE_CHAR_UDP;
366 a_type = SOCKET_TYPE_CHAR_UDP;
367 b_type = SOCKET_TYPE_CHAR_UDP;
368 break;
371 prt = ntohs(in->sin_port);
372 if (a_type && addr == 0xFFFFFFFF) {
373 /* 255.255.255.255 only udp */
374 is_bcast = 2;
375 type = a_type;
376 iface = socket_wrapper_default_iface();
377 } else if (b_type && addr == 0x7FFFFFFF) {
378 /* 127.255.255.255 only udp */
379 is_bcast = 1;
380 type = b_type;
381 iface = socket_wrapper_default_iface();
382 } else if ((addr & 0xFFFFFF00) == 0x7F000000) {
383 /* 127.0.0.X */
384 is_bcast = 0;
385 type = u_type;
386 iface = (addr & 0x000000FF);
387 } else {
388 errno = ENETUNREACH;
389 return -1;
391 if (bcast) *bcast = is_bcast;
392 break;
394 #ifdef HAVE_IPV6
395 case AF_INET6: {
396 const struct sockaddr_in6 *in =
397 (const struct sockaddr_in6 *)inaddr;
398 struct in6_addr cmp;
400 switch (si->type) {
401 case SOCK_STREAM:
402 type = SOCKET_TYPE_CHAR_TCP_V6;
403 break;
404 case SOCK_DGRAM:
405 type = SOCKET_TYPE_CHAR_UDP_V6;
406 break;
409 /* XXX no multicast/broadcast */
411 prt = ntohs(in->sin6_port);
413 cmp = in->sin6_addr;
414 cmp.s6_addr[15] = 0;
415 if (IN6_ARE_ADDR_EQUAL(swrap_ipv6(), &cmp)) {
416 iface = in->sin6_addr.s6_addr[15];
417 } else {
418 errno = ENETUNREACH;
419 return -1;
422 break;
424 #endif
425 default:
426 errno = ENETUNREACH;
427 return -1;
430 if (prt == 0) {
431 errno = EINVAL;
432 return -1;
435 if (is_bcast) {
436 snprintf(un->sun_path, sizeof(un->sun_path), "%s/EINVAL",
437 socket_wrapper_dir());
438 /* the caller need to do more processing */
439 return 0;
442 snprintf(un->sun_path, sizeof(un->sun_path), "%s/"SOCKET_FORMAT,
443 socket_wrapper_dir(), type, iface, prt);
445 return 0;
448 static int convert_in_un_alloc(struct socket_info *si, const struct sockaddr *inaddr, struct sockaddr_un *un,
449 int *bcast)
451 char type = '\0';
452 unsigned int prt;
453 unsigned int iface;
454 struct stat st;
455 int is_bcast = 0;
457 if (bcast) *bcast = 0;
459 switch (si->family) {
460 case AF_INET: {
461 const struct sockaddr_in *in =
462 (const struct sockaddr_in *)inaddr;
463 unsigned int addr = ntohl(in->sin_addr.s_addr);
464 char u_type = '\0';
465 char d_type = '\0';
466 char b_type = '\0';
467 char a_type = '\0';
469 prt = ntohs(in->sin_port);
471 switch (si->type) {
472 case SOCK_STREAM:
473 u_type = SOCKET_TYPE_CHAR_TCP;
474 d_type = SOCKET_TYPE_CHAR_TCP;
475 break;
476 case SOCK_DGRAM:
477 u_type = SOCKET_TYPE_CHAR_UDP;
478 d_type = SOCKET_TYPE_CHAR_UDP;
479 a_type = SOCKET_TYPE_CHAR_UDP;
480 b_type = SOCKET_TYPE_CHAR_UDP;
481 break;
484 if (addr == 0) {
485 /* 0.0.0.0 */
486 is_bcast = 0;
487 type = d_type;
488 iface = socket_wrapper_default_iface();
489 } else if (a_type && addr == 0xFFFFFFFF) {
490 /* 255.255.255.255 only udp */
491 is_bcast = 2;
492 type = a_type;
493 iface = socket_wrapper_default_iface();
494 } else if (b_type && addr == 0x7FFFFFFF) {
495 /* 127.255.255.255 only udp */
496 is_bcast = 1;
497 type = b_type;
498 iface = socket_wrapper_default_iface();
499 } else if ((addr & 0xFFFFFF00) == 0x7F000000) {
500 /* 127.0.0.X */
501 is_bcast = 0;
502 type = u_type;
503 iface = (addr & 0x000000FF);
504 } else {
505 errno = EADDRNOTAVAIL;
506 return -1;
508 break;
510 #ifdef HAVE_IPV6
511 case AF_INET6: {
512 const struct sockaddr_in6 *in =
513 (const struct sockaddr_in6 *)inaddr;
514 struct in6_addr cmp;
516 switch (si->type) {
517 case SOCK_STREAM:
518 type = SOCKET_TYPE_CHAR_TCP_V6;
519 break;
520 case SOCK_DGRAM:
521 type = SOCKET_TYPE_CHAR_UDP_V6;
522 break;
525 /* XXX no multicast/broadcast */
527 prt = ntohs(in->sin6_port);
529 cmp = in->sin6_addr;
530 cmp.s6_addr[15] = 0;
531 if (IN6_IS_ADDR_UNSPECIFIED(&in->sin6_addr)) {
532 iface = socket_wrapper_default_iface();
533 } else if (IN6_ARE_ADDR_EQUAL(swrap_ipv6(), &cmp)) {
534 iface = in->sin6_addr.s6_addr[15];
535 } else {
536 errno = EADDRNOTAVAIL;
537 return -1;
540 break;
542 #endif
543 default:
544 errno = EADDRNOTAVAIL;
545 return -1;
549 if (bcast) *bcast = is_bcast;
551 if (prt == 0) {
552 /* handle auto-allocation of ephemeral ports */
553 for (prt = 5001; prt < 10000; prt++) {
554 snprintf(un->sun_path, sizeof(un->sun_path), "%s/"SOCKET_FORMAT,
555 socket_wrapper_dir(), type, iface, prt);
556 if (stat(un->sun_path, &st) == 0) continue;
558 set_port(si->family, prt, si->myname);
559 break;
561 if (prt == 10000) {
562 errno = ENFILE;
563 return -1;
567 snprintf(un->sun_path, sizeof(un->sun_path), "%s/"SOCKET_FORMAT,
568 socket_wrapper_dir(), type, iface, prt);
569 return 0;
572 static struct socket_info *find_socket_info(int fd)
574 struct socket_info *i;
575 for (i = sockets; i; i = i->next) {
576 if (i->fd == fd)
577 return i;
580 return NULL;
583 static int sockaddr_convert_to_un(struct socket_info *si, const struct sockaddr *in_addr, socklen_t in_len,
584 struct sockaddr_un *out_addr, int alloc_sock, int *bcast)
586 if (!out_addr)
587 return 0;
589 out_addr->sun_family = AF_UNIX;
591 switch (in_addr->sa_family) {
592 case AF_INET:
593 #ifdef HAVE_IPV6
594 case AF_INET6:
595 #endif
596 switch (si->type) {
597 case SOCK_STREAM:
598 case SOCK_DGRAM:
599 break;
600 default:
601 errno = ESOCKTNOSUPPORT;
602 return -1;
604 if (alloc_sock) {
605 return convert_in_un_alloc(si, in_addr, out_addr, bcast);
606 } else {
607 return convert_in_un_remote(si, in_addr, out_addr, bcast);
609 default:
610 break;
613 errno = EAFNOSUPPORT;
614 return -1;
617 static int sockaddr_convert_from_un(const struct socket_info *si,
618 const struct sockaddr_un *in_addr,
619 socklen_t un_addrlen,
620 int family,
621 struct sockaddr *out_addr,
622 socklen_t *out_addrlen)
624 if (out_addr == NULL || out_addrlen == NULL)
625 return 0;
627 if (un_addrlen == 0) {
628 *out_addrlen = 0;
629 return 0;
632 switch (family) {
633 case AF_INET:
634 #ifdef HAVE_IPV6
635 case AF_INET6:
636 #endif
637 switch (si->type) {
638 case SOCK_STREAM:
639 case SOCK_DGRAM:
640 break;
641 default:
642 errno = ESOCKTNOSUPPORT;
643 return -1;
645 return convert_un_in(in_addr, out_addr, out_addrlen);
646 default:
647 break;
650 errno = EAFNOSUPPORT;
651 return -1;
654 enum swrap_packet_type {
655 SWRAP_CONNECT_SEND,
656 SWRAP_CONNECT_UNREACH,
657 SWRAP_CONNECT_RECV,
658 SWRAP_CONNECT_ACK,
659 SWRAP_ACCEPT_SEND,
660 SWRAP_ACCEPT_RECV,
661 SWRAP_ACCEPT_ACK,
662 SWRAP_RECVFROM,
663 SWRAP_SENDTO,
664 SWRAP_SENDTO_UNREACH,
665 SWRAP_PENDING_RST,
666 SWRAP_RECV,
667 SWRAP_RECV_RST,
668 SWRAP_SEND,
669 SWRAP_SEND_RST,
670 SWRAP_CLOSE_SEND,
671 SWRAP_CLOSE_RECV,
672 SWRAP_CLOSE_ACK
675 struct swrap_file_hdr {
676 uint32_t magic;
677 uint16_t version_major;
678 uint16_t version_minor;
679 int32_t timezone;
680 uint32_t sigfigs;
681 uint32_t frame_max_len;
682 #define SWRAP_FRAME_LENGTH_MAX 0xFFFF
683 uint32_t link_type;
685 #define SWRAP_FILE_HDR_SIZE 24
687 struct swrap_packet_frame {
688 uint32_t seconds;
689 uint32_t micro_seconds;
690 uint32_t recorded_length;
691 uint32_t full_length;
693 #define SWRAP_PACKET_FRAME_SIZE 16
695 union swrap_packet_ip {
696 struct {
697 uint8_t ver_hdrlen;
698 uint8_t tos;
699 uint16_t packet_length;
700 uint16_t identification;
701 uint8_t flags;
702 uint8_t fragment;
703 uint8_t ttl;
704 uint8_t protocol;
705 uint16_t hdr_checksum;
706 uint32_t src_addr;
707 uint32_t dest_addr;
708 } v4;
709 #define SWRAP_PACKET_IP_V4_SIZE 20
710 struct {
711 uint8_t ver_prio;
712 uint8_t flow_label_high;
713 uint16_t flow_label_low;
714 uint16_t payload_length;
715 uint8_t next_header;
716 uint8_t hop_limit;
717 uint8_t src_addr[16];
718 uint8_t dest_addr[16];
719 } v6;
720 #define SWRAP_PACKET_IP_V6_SIZE 40
722 #define SWRAP_PACKET_IP_SIZE 40
724 union swrap_packet_payload {
725 struct {
726 uint16_t source_port;
727 uint16_t dest_port;
728 uint32_t seq_num;
729 uint32_t ack_num;
730 uint8_t hdr_length;
731 uint8_t control;
732 uint16_t window;
733 uint16_t checksum;
734 uint16_t urg;
735 } tcp;
736 #define SWRAP_PACKET_PAYLOAD_TCP_SIZE 20
737 struct {
738 uint16_t source_port;
739 uint16_t dest_port;
740 uint16_t length;
741 uint16_t checksum;
742 } udp;
743 #define SWRAP_PACKET_PAYLOAD_UDP_SIZE 8
744 struct {
745 uint8_t type;
746 uint8_t code;
747 uint16_t checksum;
748 uint32_t unused;
749 } icmp4;
750 #define SWRAP_PACKET_PAYLOAD_ICMP4_SIZE 8
751 struct {
752 uint8_t type;
753 uint8_t code;
754 uint16_t checksum;
755 uint32_t unused;
756 } icmp6;
757 #define SWRAP_PACKET_PAYLOAD_ICMP6_SIZE 8
759 #define SWRAP_PACKET_PAYLOAD_SIZE 20
761 #define SWRAP_PACKET_MIN_ALLOC \
762 (SWRAP_PACKET_FRAME_SIZE + \
763 SWRAP_PACKET_IP_SIZE + \
764 SWRAP_PACKET_PAYLOAD_SIZE)
766 static const char *socket_wrapper_pcap_file(void)
768 static int initialized = 0;
769 static const char *s = NULL;
770 static const struct swrap_file_hdr h;
771 static const struct swrap_packet_frame f;
772 static const union swrap_packet_ip i;
773 static const union swrap_packet_payload p;
775 if (initialized == 1) {
776 return s;
778 initialized = 1;
781 * TODO: don't use the structs use plain buffer offsets
782 * and PUSH_U8(), PUSH_U16() and PUSH_U32()
784 * for now make sure we disable PCAP support
785 * if the struct has alignment!
787 if (sizeof(h) != SWRAP_FILE_HDR_SIZE) {
788 return NULL;
790 if (sizeof(f) != SWRAP_PACKET_FRAME_SIZE) {
791 return NULL;
793 if (sizeof(i) != SWRAP_PACKET_IP_SIZE) {
794 return NULL;
796 if (sizeof(i.v4) != SWRAP_PACKET_IP_V4_SIZE) {
797 return NULL;
799 if (sizeof(i.v6) != SWRAP_PACKET_IP_V6_SIZE) {
800 return NULL;
802 if (sizeof(p) != SWRAP_PACKET_PAYLOAD_SIZE) {
803 return NULL;
805 if (sizeof(p.tcp) != SWRAP_PACKET_PAYLOAD_TCP_SIZE) {
806 return NULL;
808 if (sizeof(p.udp) != SWRAP_PACKET_PAYLOAD_UDP_SIZE) {
809 return NULL;
811 if (sizeof(p.icmp4) != SWRAP_PACKET_PAYLOAD_ICMP4_SIZE) {
812 return NULL;
814 if (sizeof(p.icmp6) != SWRAP_PACKET_PAYLOAD_ICMP6_SIZE) {
815 return NULL;
818 s = getenv("SOCKET_WRAPPER_PCAP_FILE");
819 if (s == NULL) {
820 return NULL;
822 if (strncmp(s, "./", 2) == 0) {
823 s += 2;
825 return s;
828 static uint8_t *swrap_packet_init(struct timeval *tval,
829 const struct sockaddr *src,
830 const struct sockaddr *dest,
831 int socket_type,
832 const uint8_t *payload,
833 size_t payload_len,
834 unsigned long tcp_seqno,
835 unsigned long tcp_ack,
836 unsigned char tcp_ctl,
837 int unreachable,
838 size_t *_packet_len)
840 uint8_t *base;
841 uint8_t *buf;
842 struct swrap_packet_frame *frame;
843 union swrap_packet_ip *ip;
844 union swrap_packet_payload *pay;
845 size_t packet_len;
846 size_t alloc_len;
847 size_t nonwire_len = sizeof(*frame);
848 size_t wire_hdr_len = 0;
849 size_t wire_len = 0;
850 size_t ip_hdr_len = 0;
851 size_t icmp_hdr_len = 0;
852 size_t icmp_truncate_len = 0;
853 uint8_t protocol = 0, icmp_protocol = 0;
854 const struct sockaddr_in *src_in = NULL;
855 const struct sockaddr_in *dest_in = NULL;
856 #ifdef HAVE_IPV6
857 const struct sockaddr_in6 *src_in6 = NULL;
858 const struct sockaddr_in6 *dest_in6 = NULL;
859 #endif
860 uint16_t src_port;
861 uint16_t dest_port;
863 switch (src->sa_family) {
864 case AF_INET:
865 src_in = (const struct sockaddr_in *)src;
866 dest_in = (const struct sockaddr_in *)dest;
867 src_port = src_in->sin_port;
868 dest_port = dest_in->sin_port;
869 ip_hdr_len = sizeof(ip->v4);
870 break;
871 #ifdef HAVE_IPV6
872 case AF_INET6:
873 src_in6 = (const struct sockaddr_in6 *)src;
874 dest_in6 = (const struct sockaddr_in6 *)dest;
875 src_port = src_in6->sin6_port;
876 dest_port = dest_in6->sin6_port;
877 ip_hdr_len = sizeof(ip->v6);
878 break;
879 #endif
880 default:
881 return NULL;
884 switch (socket_type) {
885 case SOCK_STREAM:
886 protocol = 0x06; /* TCP */
887 wire_hdr_len = ip_hdr_len + sizeof(pay->tcp);
888 wire_len = wire_hdr_len + payload_len;
889 break;
891 case SOCK_DGRAM:
892 protocol = 0x11; /* UDP */
893 wire_hdr_len = ip_hdr_len + sizeof(pay->udp);
894 wire_len = wire_hdr_len + payload_len;
895 break;
897 default:
898 return NULL;
901 if (unreachable) {
902 icmp_protocol = protocol;
903 switch (src->sa_family) {
904 case AF_INET:
905 protocol = 0x01; /* ICMPv4 */
906 icmp_hdr_len = ip_hdr_len + sizeof(pay->icmp4);
907 break;
908 #ifdef HAVE_IPV6
909 case AF_INET6:
910 protocol = 0x3A; /* ICMPv6 */
911 icmp_hdr_len = ip_hdr_len + sizeof(pay->icmp6);
912 break;
913 #endif
915 if (wire_len > 64 ) {
916 icmp_truncate_len = wire_len - 64;
918 wire_hdr_len += icmp_hdr_len;
919 wire_len += icmp_hdr_len;
922 packet_len = nonwire_len + wire_len;
923 alloc_len = packet_len;
924 if (alloc_len < SWRAP_PACKET_MIN_ALLOC) {
925 alloc_len = SWRAP_PACKET_MIN_ALLOC;
928 base = (uint8_t *)malloc(alloc_len);
929 if (!base) return NULL;
931 buf = base;
933 frame = (struct swrap_packet_frame *)buf;
934 frame->seconds = tval->tv_sec;
935 frame->micro_seconds = tval->tv_usec;
936 frame->recorded_length = wire_len - icmp_truncate_len;
937 frame->full_length = wire_len - icmp_truncate_len;
938 buf += SWRAP_PACKET_FRAME_SIZE;
940 ip = (union swrap_packet_ip *)buf;
941 switch (src->sa_family) {
942 case AF_INET:
943 ip->v4.ver_hdrlen = 0x45; /* version 4 and 5 * 32 bit words */
944 ip->v4.tos = 0x00;
945 ip->v4.packet_length = htons(wire_len - icmp_truncate_len);
946 ip->v4.identification = htons(0xFFFF);
947 ip->v4.flags = 0x40; /* BIT 1 set - means don't fraqment */
948 ip->v4.fragment = htons(0x0000);
949 ip->v4.ttl = 0xFF;
950 ip->v4.protocol = protocol;
951 ip->v4.hdr_checksum = htons(0x0000);
952 ip->v4.src_addr = src_in->sin_addr.s_addr;
953 ip->v4.dest_addr = dest_in->sin_addr.s_addr;
954 buf += SWRAP_PACKET_IP_V4_SIZE;
955 break;
956 #ifdef HAVE_IPV6
957 case AF_INET6:
958 ip->v6.ver_prio = 0x60; /* version 4 and 5 * 32 bit words */
959 ip->v6.flow_label_high = 0x00;
960 ip->v6.flow_label_low = 0x0000;
961 ip->v6.payload_length = htons(wire_len - icmp_truncate_len);//TODO
962 ip->v6.next_header = protocol;
963 memcpy(ip->v6.src_addr, src_in6->sin6_addr.s6_addr, 16);
964 memcpy(ip->v6.dest_addr, dest_in6->sin6_addr.s6_addr, 16);
965 buf += SWRAP_PACKET_IP_V6_SIZE;
966 break;
967 #endif
970 if (unreachable) {
971 pay = (union swrap_packet_payload *)buf;
972 switch (src->sa_family) {
973 case AF_INET:
974 pay->icmp4.type = 0x03; /* destination unreachable */
975 pay->icmp4.code = 0x01; /* host unreachable */
976 pay->icmp4.checksum = htons(0x0000);
977 pay->icmp4.unused = htonl(0x00000000);
978 buf += SWRAP_PACKET_PAYLOAD_ICMP4_SIZE;
980 /* set the ip header in the ICMP payload */
981 ip = (union swrap_packet_ip *)buf;
982 ip->v4.ver_hdrlen = 0x45; /* version 4 and 5 * 32 bit words */
983 ip->v4.tos = 0x00;
984 ip->v4.packet_length = htons(wire_len - icmp_hdr_len);
985 ip->v4.identification = htons(0xFFFF);
986 ip->v4.flags = 0x40; /* BIT 1 set - means don't fraqment */
987 ip->v4.fragment = htons(0x0000);
988 ip->v4.ttl = 0xFF;
989 ip->v4.protocol = icmp_protocol;
990 ip->v4.hdr_checksum = htons(0x0000);
991 ip->v4.src_addr = dest_in->sin_addr.s_addr;
992 ip->v4.dest_addr = src_in->sin_addr.s_addr;
993 buf += SWRAP_PACKET_IP_V4_SIZE;
995 src_port = dest_in->sin_port;
996 dest_port = src_in->sin_port;
997 break;
998 #ifdef HAVE_IPV6
999 case AF_INET6:
1000 pay->icmp6.type = 0x01; /* destination unreachable */
1001 pay->icmp6.code = 0x03; /* address unreachable */
1002 pay->icmp6.checksum = htons(0x0000);
1003 pay->icmp6.unused = htonl(0x00000000);
1004 buf += SWRAP_PACKET_PAYLOAD_ICMP6_SIZE;
1006 /* set the ip header in the ICMP payload */
1007 ip = (union swrap_packet_ip *)buf;
1008 ip->v6.ver_prio = 0x60; /* version 4 and 5 * 32 bit words */
1009 ip->v6.flow_label_high = 0x00;
1010 ip->v6.flow_label_low = 0x0000;
1011 ip->v6.payload_length = htons(wire_len - icmp_truncate_len);//TODO
1012 ip->v6.next_header = protocol;
1013 memcpy(ip->v6.src_addr, dest_in6->sin6_addr.s6_addr, 16);
1014 memcpy(ip->v6.dest_addr, src_in6->sin6_addr.s6_addr, 16);
1015 buf += SWRAP_PACKET_IP_V6_SIZE;
1017 src_port = dest_in6->sin6_port;
1018 dest_port = src_in6->sin6_port;
1019 break;
1020 #endif
1024 pay = (union swrap_packet_payload *)buf;
1026 switch (socket_type) {
1027 case SOCK_STREAM:
1028 pay->tcp.source_port = src_port;
1029 pay->tcp.dest_port = dest_port;
1030 pay->tcp.seq_num = htonl(tcp_seqno);
1031 pay->tcp.ack_num = htonl(tcp_ack);
1032 pay->tcp.hdr_length = 0x50; /* 5 * 32 bit words */
1033 pay->tcp.control = tcp_ctl;
1034 pay->tcp.window = htons(0x7FFF);
1035 pay->tcp.checksum = htons(0x0000);
1036 pay->tcp.urg = htons(0x0000);
1037 buf += SWRAP_PACKET_PAYLOAD_TCP_SIZE;
1039 break;
1041 case SOCK_DGRAM:
1042 pay->udp.source_port = src_port;
1043 pay->udp.dest_port = dest_port;
1044 pay->udp.length = htons(8 + payload_len);
1045 pay->udp.checksum = htons(0x0000);
1046 buf += SWRAP_PACKET_PAYLOAD_UDP_SIZE;
1048 break;
1051 if (payload && payload_len > 0) {
1052 memcpy(buf, payload, payload_len);
1055 *_packet_len = packet_len - icmp_truncate_len;
1056 return base;
1059 static int swrap_get_pcap_fd(const char *fname)
1061 static int fd = -1;
1063 if (fd != -1) return fd;
1065 fd = open(fname, O_WRONLY|O_CREAT|O_EXCL|O_APPEND, 0644);
1066 if (fd != -1) {
1067 struct swrap_file_hdr file_hdr;
1068 file_hdr.magic = 0xA1B2C3D4;
1069 file_hdr.version_major = 0x0002;
1070 file_hdr.version_minor = 0x0004;
1071 file_hdr.timezone = 0x00000000;
1072 file_hdr.sigfigs = 0x00000000;
1073 file_hdr.frame_max_len = SWRAP_FRAME_LENGTH_MAX;
1074 file_hdr.link_type = 0x0065; /* 101 RAW IP */
1076 if (write(fd, &file_hdr, sizeof(file_hdr)) != sizeof(file_hdr)) {
1077 close(fd);
1078 fd = -1;
1080 return fd;
1083 fd = open(fname, O_WRONLY|O_APPEND, 0644);
1085 return fd;
1088 static uint8_t *swrap_marshall_packet(struct socket_info *si,
1089 const struct sockaddr *addr,
1090 enum swrap_packet_type type,
1091 const void *buf, size_t len,
1092 size_t *packet_len)
1094 const struct sockaddr *src_addr;
1095 const struct sockaddr *dest_addr;
1096 unsigned long tcp_seqno = 0;
1097 unsigned long tcp_ack = 0;
1098 unsigned char tcp_ctl = 0;
1099 int unreachable = 0;
1101 struct timeval tv;
1103 switch (si->family) {
1104 case AF_INET:
1105 break;
1106 #ifdef HAVE_IPV6
1107 case AF_INET6:
1108 break;
1109 #endif
1110 default:
1111 return NULL;
1114 switch (type) {
1115 case SWRAP_CONNECT_SEND:
1116 if (si->type != SOCK_STREAM) return NULL;
1118 src_addr = si->myname;
1119 dest_addr = addr;
1121 tcp_seqno = si->io.pck_snd;
1122 tcp_ack = si->io.pck_rcv;
1123 tcp_ctl = 0x02; /* SYN */
1125 si->io.pck_snd += 1;
1127 break;
1129 case SWRAP_CONNECT_RECV:
1130 if (si->type != SOCK_STREAM) return NULL;
1132 dest_addr = si->myname;
1133 src_addr = addr;
1135 tcp_seqno = si->io.pck_rcv;
1136 tcp_ack = si->io.pck_snd;
1137 tcp_ctl = 0x12; /** SYN,ACK */
1139 si->io.pck_rcv += 1;
1141 break;
1143 case SWRAP_CONNECT_UNREACH:
1144 if (si->type != SOCK_STREAM) return NULL;
1146 dest_addr = si->myname;
1147 src_addr = addr;
1149 /* Unreachable: resend the data of SWRAP_CONNECT_SEND */
1150 tcp_seqno = si->io.pck_snd - 1;
1151 tcp_ack = si->io.pck_rcv;
1152 tcp_ctl = 0x02; /* SYN */
1153 unreachable = 1;
1155 break;
1157 case SWRAP_CONNECT_ACK:
1158 if (si->type != SOCK_STREAM) return NULL;
1160 src_addr = si->myname;
1161 dest_addr = addr;
1163 tcp_seqno = si->io.pck_snd;
1164 tcp_ack = si->io.pck_rcv;
1165 tcp_ctl = 0x10; /* ACK */
1167 break;
1169 case SWRAP_ACCEPT_SEND:
1170 if (si->type != SOCK_STREAM) return NULL;
1172 dest_addr = si->myname;
1173 src_addr = addr;
1175 tcp_seqno = si->io.pck_rcv;
1176 tcp_ack = si->io.pck_snd;
1177 tcp_ctl = 0x02; /* SYN */
1179 si->io.pck_rcv += 1;
1181 break;
1183 case SWRAP_ACCEPT_RECV:
1184 if (si->type != SOCK_STREAM) return NULL;
1186 src_addr = si->myname;
1187 dest_addr = addr;
1189 tcp_seqno = si->io.pck_snd;
1190 tcp_ack = si->io.pck_rcv;
1191 tcp_ctl = 0x12; /* SYN,ACK */
1193 si->io.pck_snd += 1;
1195 break;
1197 case SWRAP_ACCEPT_ACK:
1198 if (si->type != SOCK_STREAM) return NULL;
1200 dest_addr = si->myname;
1201 src_addr = addr;
1203 tcp_seqno = si->io.pck_rcv;
1204 tcp_ack = si->io.pck_snd;
1205 tcp_ctl = 0x10; /* ACK */
1207 break;
1209 case SWRAP_SEND:
1210 src_addr = si->myname;
1211 dest_addr = si->peername;
1213 tcp_seqno = si->io.pck_snd;
1214 tcp_ack = si->io.pck_rcv;
1215 tcp_ctl = 0x18; /* PSH,ACK */
1217 si->io.pck_snd += len;
1219 break;
1221 case SWRAP_SEND_RST:
1222 dest_addr = si->myname;
1223 src_addr = si->peername;
1225 if (si->type == SOCK_DGRAM) {
1226 return swrap_marshall_packet(si, si->peername,
1227 SWRAP_SENDTO_UNREACH,
1228 buf, len, packet_len);
1231 tcp_seqno = si->io.pck_rcv;
1232 tcp_ack = si->io.pck_snd;
1233 tcp_ctl = 0x14; /** RST,ACK */
1235 break;
1237 case SWRAP_PENDING_RST:
1238 dest_addr = si->myname;
1239 src_addr = si->peername;
1241 if (si->type == SOCK_DGRAM) {
1242 return NULL;
1245 tcp_seqno = si->io.pck_rcv;
1246 tcp_ack = si->io.pck_snd;
1247 tcp_ctl = 0x14; /* RST,ACK */
1249 break;
1251 case SWRAP_RECV:
1252 dest_addr = si->myname;
1253 src_addr = si->peername;
1255 tcp_seqno = si->io.pck_rcv;
1256 tcp_ack = si->io.pck_snd;
1257 tcp_ctl = 0x18; /* PSH,ACK */
1259 si->io.pck_rcv += len;
1261 break;
1263 case SWRAP_RECV_RST:
1264 dest_addr = si->myname;
1265 src_addr = si->peername;
1267 if (si->type == SOCK_DGRAM) {
1268 return NULL;
1271 tcp_seqno = si->io.pck_rcv;
1272 tcp_ack = si->io.pck_snd;
1273 tcp_ctl = 0x14; /* RST,ACK */
1275 break;
1277 case SWRAP_SENDTO:
1278 src_addr = si->myname;
1279 dest_addr = addr;
1281 si->io.pck_snd += len;
1283 break;
1285 case SWRAP_SENDTO_UNREACH:
1286 dest_addr = si->myname;
1287 src_addr = addr;
1289 unreachable = 1;
1291 break;
1293 case SWRAP_RECVFROM:
1294 dest_addr = si->myname;
1295 src_addr = addr;
1297 si->io.pck_rcv += len;
1299 break;
1301 case SWRAP_CLOSE_SEND:
1302 if (si->type != SOCK_STREAM) return NULL;
1304 src_addr = si->myname;
1305 dest_addr = si->peername;
1307 tcp_seqno = si->io.pck_snd;
1308 tcp_ack = si->io.pck_rcv;
1309 tcp_ctl = 0x11; /* FIN, ACK */
1311 si->io.pck_snd += 1;
1313 break;
1315 case SWRAP_CLOSE_RECV:
1316 if (si->type != SOCK_STREAM) return NULL;
1318 dest_addr = si->myname;
1319 src_addr = si->peername;
1321 tcp_seqno = si->io.pck_rcv;
1322 tcp_ack = si->io.pck_snd;
1323 tcp_ctl = 0x11; /* FIN,ACK */
1325 si->io.pck_rcv += 1;
1327 break;
1329 case SWRAP_CLOSE_ACK:
1330 if (si->type != SOCK_STREAM) return NULL;
1332 src_addr = si->myname;
1333 dest_addr = si->peername;
1335 tcp_seqno = si->io.pck_snd;
1336 tcp_ack = si->io.pck_rcv;
1337 tcp_ctl = 0x10; /* ACK */
1339 break;
1340 default:
1341 return NULL;
1344 swrapGetTimeOfDay(&tv);
1346 return swrap_packet_init(&tv, src_addr, dest_addr, si->type,
1347 (const uint8_t *)buf, len,
1348 tcp_seqno, tcp_ack, tcp_ctl, unreachable,
1349 packet_len);
1352 static void swrap_dump_packet(struct socket_info *si,
1353 const struct sockaddr *addr,
1354 enum swrap_packet_type type,
1355 const void *buf, size_t len)
1357 const char *file_name;
1358 uint8_t *packet;
1359 size_t packet_len = 0;
1360 int fd;
1362 file_name = socket_wrapper_pcap_file();
1363 if (!file_name) {
1364 return;
1367 packet = swrap_marshall_packet(si, addr, type, buf, len, &packet_len);
1368 if (!packet) {
1369 return;
1372 fd = swrap_get_pcap_fd(file_name);
1373 if (fd != -1) {
1374 if (write(fd, packet, packet_len) != packet_len) {
1375 free(packet);
1376 return;
1380 free(packet);
1383 _PUBLIC_ int swrap_socket(int family, int type, int protocol)
1385 struct socket_info *si;
1386 int fd;
1387 int real_type = type;
1388 #ifdef SOCK_CLOEXEC
1389 real_type &= ~SOCK_CLOEXEC;
1390 #endif
1391 #ifdef SOCK_NONBLOCK
1392 real_type &= ~SOCK_NONBLOCK;
1393 #endif
1395 if (!socket_wrapper_dir()) {
1396 return real_socket(family, type, protocol);
1399 switch (family) {
1400 case AF_INET:
1401 #ifdef HAVE_IPV6
1402 case AF_INET6:
1403 #endif
1404 break;
1405 case AF_UNIX:
1406 return real_socket(family, type, protocol);
1407 default:
1408 errno = EAFNOSUPPORT;
1409 return -1;
1412 switch (real_type) {
1413 case SOCK_STREAM:
1414 break;
1415 case SOCK_DGRAM:
1416 break;
1417 default:
1418 errno = EPROTONOSUPPORT;
1419 return -1;
1422 switch (protocol) {
1423 case 0:
1424 break;
1425 case 6:
1426 if (real_type == SOCK_STREAM) {
1427 break;
1429 /*fall through*/
1430 case 17:
1431 if (real_type == SOCK_DGRAM) {
1432 break;
1434 /*fall through*/
1435 default:
1436 errno = EPROTONOSUPPORT;
1437 return -1;
1440 /* We must call real_socket with type, from the caller, not the version we removed
1441 SOCK_CLOEXEC and SOCK_NONBLOCK from */
1442 fd = real_socket(AF_UNIX, type, 0);
1444 if (fd == -1) return -1;
1446 si = (struct socket_info *)calloc(1, sizeof(struct socket_info));
1448 si->family = family;
1450 /* however, the rest of the socket_wrapper code expects just
1451 * the type, not the flags */
1452 si->type = real_type;
1453 si->protocol = protocol;
1454 si->fd = fd;
1456 SWRAP_DLIST_ADD(sockets, si);
1458 return si->fd;
1461 _PUBLIC_ int swrap_accept(int s, struct sockaddr *addr, socklen_t *addrlen)
1463 struct socket_info *parent_si, *child_si;
1464 int fd;
1465 struct sockaddr_un un_addr;
1466 socklen_t un_addrlen = sizeof(un_addr);
1467 struct sockaddr_un un_my_addr;
1468 socklen_t un_my_addrlen = sizeof(un_my_addr);
1469 struct sockaddr *my_addr;
1470 socklen_t my_addrlen, len;
1471 int ret;
1473 parent_si = find_socket_info(s);
1474 if (!parent_si) {
1475 return real_accept(s, addr, addrlen);
1479 * assume out sockaddr have the same size as the in parent
1480 * socket family
1482 my_addrlen = socket_length(parent_si->family);
1483 if (my_addrlen <= 0) {
1484 errno = EINVAL;
1485 return -1;
1488 my_addr = (struct sockaddr *)malloc(my_addrlen);
1489 if (my_addr == NULL) {
1490 return -1;
1493 memset(&un_addr, 0, sizeof(un_addr));
1494 memset(&un_my_addr, 0, sizeof(un_my_addr));
1496 ret = real_accept(s, (struct sockaddr *)&un_addr, &un_addrlen);
1497 if (ret == -1) {
1498 free(my_addr);
1499 return ret;
1502 fd = ret;
1504 len = my_addrlen;
1505 ret = sockaddr_convert_from_un(parent_si, &un_addr, un_addrlen,
1506 parent_si->family, my_addr, &len);
1507 if (ret == -1) {
1508 free(my_addr);
1509 close(fd);
1510 return ret;
1513 child_si = (struct socket_info *)malloc(sizeof(struct socket_info));
1514 memset(child_si, 0, sizeof(*child_si));
1516 child_si->fd = fd;
1517 child_si->family = parent_si->family;
1518 child_si->type = parent_si->type;
1519 child_si->protocol = parent_si->protocol;
1520 child_si->bound = 1;
1521 child_si->is_server = 1;
1522 child_si->connected = 1;
1524 child_si->peername_len = len;
1525 child_si->peername = sockaddr_dup(my_addr, len);
1527 if (addr != NULL && addrlen != NULL) {
1528 *addrlen = len;
1529 if (*addrlen >= len)
1530 memcpy(addr, my_addr, len);
1531 *addrlen = 0;
1534 ret = real_getsockname(fd, (struct sockaddr *)&un_my_addr, &un_my_addrlen);
1535 if (ret == -1) {
1536 free(child_si);
1537 close(fd);
1538 return ret;
1541 len = my_addrlen;
1542 ret = sockaddr_convert_from_un(child_si, &un_my_addr, un_my_addrlen,
1543 child_si->family, my_addr, &len);
1544 if (ret == -1) {
1545 free(child_si);
1546 free(my_addr);
1547 close(fd);
1548 return ret;
1551 child_si->myname_len = len;
1552 child_si->myname = sockaddr_dup(my_addr, len);
1553 free(my_addr);
1555 SWRAP_DLIST_ADD(sockets, child_si);
1557 swrap_dump_packet(child_si, addr, SWRAP_ACCEPT_SEND, NULL, 0);
1558 swrap_dump_packet(child_si, addr, SWRAP_ACCEPT_RECV, NULL, 0);
1559 swrap_dump_packet(child_si, addr, SWRAP_ACCEPT_ACK, NULL, 0);
1561 return fd;
1564 static int autobind_start_init;
1565 static int autobind_start;
1567 /* using sendto() or connect() on an unbound socket would give the
1568 recipient no way to reply, as unlike UDP and TCP, a unix domain
1569 socket can't auto-assign emphemeral port numbers, so we need to
1570 assign it here.
1571 Note: this might change the family from ipv6 to ipv4
1573 static int swrap_auto_bind(struct socket_info *si, int family)
1575 struct sockaddr_un un_addr;
1576 int i;
1577 char type;
1578 int ret;
1579 int port;
1580 struct stat st;
1582 if (autobind_start_init != 1) {
1583 autobind_start_init = 1;
1584 autobind_start = getpid();
1585 autobind_start %= 50000;
1586 autobind_start += 10000;
1589 un_addr.sun_family = AF_UNIX;
1591 switch (family) {
1592 case AF_INET: {
1593 struct sockaddr_in in;
1595 switch (si->type) {
1596 case SOCK_STREAM:
1597 type = SOCKET_TYPE_CHAR_TCP;
1598 break;
1599 case SOCK_DGRAM:
1600 type = SOCKET_TYPE_CHAR_UDP;
1601 break;
1602 default:
1603 errno = ESOCKTNOSUPPORT;
1604 return -1;
1607 memset(&in, 0, sizeof(in));
1608 in.sin_family = AF_INET;
1609 in.sin_addr.s_addr = htonl(127<<24 |
1610 socket_wrapper_default_iface());
1612 si->myname_len = sizeof(in);
1613 si->myname = sockaddr_dup(&in, si->myname_len);
1614 break;
1616 #ifdef HAVE_IPV6
1617 case AF_INET6: {
1618 struct sockaddr_in6 in6;
1620 if (si->family != family) {
1621 errno = ENETUNREACH;
1622 return -1;
1625 switch (si->type) {
1626 case SOCK_STREAM:
1627 type = SOCKET_TYPE_CHAR_TCP_V6;
1628 break;
1629 case SOCK_DGRAM:
1630 type = SOCKET_TYPE_CHAR_UDP_V6;
1631 break;
1632 default:
1633 errno = ESOCKTNOSUPPORT;
1634 return -1;
1637 memset(&in6, 0, sizeof(in6));
1638 in6.sin6_family = AF_INET6;
1639 in6.sin6_addr = *swrap_ipv6();
1640 in6.sin6_addr.s6_addr[15] = socket_wrapper_default_iface();
1641 si->myname_len = sizeof(in6);
1642 si->myname = sockaddr_dup(&in6, si->myname_len);
1643 break;
1645 #endif
1646 default:
1647 errno = ESOCKTNOSUPPORT;
1648 return -1;
1651 if (autobind_start > 60000) {
1652 autobind_start = 10000;
1655 for (i=0;i<1000;i++) {
1656 port = autobind_start + i;
1657 snprintf(un_addr.sun_path, sizeof(un_addr.sun_path),
1658 "%s/"SOCKET_FORMAT, socket_wrapper_dir(),
1659 type, socket_wrapper_default_iface(), port);
1660 if (stat(un_addr.sun_path, &st) == 0) continue;
1662 ret = real_bind(si->fd, (struct sockaddr *)&un_addr, sizeof(un_addr));
1663 if (ret == -1) return ret;
1665 si->tmp_path = strdup(un_addr.sun_path);
1666 si->bound = 1;
1667 autobind_start = port + 1;
1668 break;
1670 if (i == 1000) {
1671 errno = ENFILE;
1672 return -1;
1675 si->family = family;
1676 set_port(si->family, port, si->myname);
1678 return 0;
1682 _PUBLIC_ int swrap_connect(int s, const struct sockaddr *serv_addr, socklen_t addrlen)
1684 int ret;
1685 struct sockaddr_un un_addr;
1686 struct socket_info *si = find_socket_info(s);
1688 if (!si) {
1689 return real_connect(s, serv_addr, addrlen);
1692 if (si->bound == 0) {
1693 ret = swrap_auto_bind(si, serv_addr->sa_family);
1694 if (ret == -1) return -1;
1697 if (si->family != serv_addr->sa_family) {
1698 errno = EINVAL;
1699 return -1;
1702 ret = sockaddr_convert_to_un(si, (const struct sockaddr *)serv_addr, addrlen, &un_addr, 0, NULL);
1703 if (ret == -1) return -1;
1705 if (si->type == SOCK_DGRAM) {
1706 si->defer_connect = 1;
1707 ret = 0;
1708 } else {
1709 swrap_dump_packet(si, serv_addr, SWRAP_CONNECT_SEND, NULL, 0);
1711 ret = real_connect(s, (struct sockaddr *)&un_addr,
1712 sizeof(struct sockaddr_un));
1715 /* to give better errors */
1716 if (ret == -1 && errno == ENOENT) {
1717 errno = EHOSTUNREACH;
1720 if (ret == 0) {
1721 si->peername_len = addrlen;
1722 si->peername = sockaddr_dup(serv_addr, addrlen);
1723 si->connected = 1;
1725 swrap_dump_packet(si, serv_addr, SWRAP_CONNECT_RECV, NULL, 0);
1726 swrap_dump_packet(si, serv_addr, SWRAP_CONNECT_ACK, NULL, 0);
1727 } else {
1728 swrap_dump_packet(si, serv_addr, SWRAP_CONNECT_UNREACH, NULL, 0);
1731 return ret;
1734 _PUBLIC_ int swrap_bind(int s, const struct sockaddr *myaddr, socklen_t addrlen)
1736 int ret;
1737 struct sockaddr_un un_addr;
1738 struct socket_info *si = find_socket_info(s);
1740 if (!si) {
1741 return real_bind(s, myaddr, addrlen);
1744 si->myname_len = addrlen;
1745 si->myname = sockaddr_dup(myaddr, addrlen);
1747 ret = sockaddr_convert_to_un(si, (const struct sockaddr *)myaddr, addrlen, &un_addr, 1, &si->bcast);
1748 if (ret == -1) return -1;
1750 unlink(un_addr.sun_path);
1752 ret = real_bind(s, (struct sockaddr *)&un_addr,
1753 sizeof(struct sockaddr_un));
1755 if (ret == 0) {
1756 si->bound = 1;
1759 return ret;
1762 _PUBLIC_ int swrap_listen(int s, int backlog)
1764 int ret;
1765 struct socket_info *si = find_socket_info(s);
1767 if (!si) {
1768 return real_listen(s, backlog);
1771 ret = real_listen(s, backlog);
1773 return ret;
1776 _PUBLIC_ int swrap_getpeername(int s, struct sockaddr *name, socklen_t *addrlen)
1778 struct socket_info *si = find_socket_info(s);
1780 if (!si) {
1781 return real_getpeername(s, name, addrlen);
1784 if (!si->peername)
1786 errno = ENOTCONN;
1787 return -1;
1790 memcpy(name, si->peername, si->peername_len);
1791 *addrlen = si->peername_len;
1793 return 0;
1796 _PUBLIC_ int swrap_getsockname(int s, struct sockaddr *name, socklen_t *addrlen)
1798 struct socket_info *si = find_socket_info(s);
1800 if (!si) {
1801 return real_getsockname(s, name, addrlen);
1804 memcpy(name, si->myname, si->myname_len);
1805 *addrlen = si->myname_len;
1807 return 0;
1810 _PUBLIC_ int swrap_getsockopt(int s, int level, int optname, void *optval, socklen_t *optlen)
1812 struct socket_info *si = find_socket_info(s);
1814 if (!si) {
1815 return real_getsockopt(s, level, optname, optval, optlen);
1818 if (level == SOL_SOCKET) {
1819 return real_getsockopt(s, level, optname, optval, optlen);
1822 errno = ENOPROTOOPT;
1823 return -1;
1826 _PUBLIC_ int swrap_setsockopt(int s, int level, int optname, const void *optval, socklen_t optlen)
1828 struct socket_info *si = find_socket_info(s);
1830 if (!si) {
1831 return real_setsockopt(s, level, optname, optval, optlen);
1834 if (level == SOL_SOCKET) {
1835 return real_setsockopt(s, level, optname, optval, optlen);
1838 switch (si->family) {
1839 case AF_INET:
1840 return 0;
1841 default:
1842 errno = ENOPROTOOPT;
1843 return -1;
1847 _PUBLIC_ ssize_t swrap_recvfrom(int s, void *buf, size_t len, int flags, struct sockaddr *from, socklen_t *fromlen)
1849 struct sockaddr_un un_addr;
1850 socklen_t un_addrlen = sizeof(un_addr);
1851 int ret;
1852 struct socket_info *si = find_socket_info(s);
1853 struct sockaddr_storage ss;
1854 socklen_t ss_len = sizeof(ss);
1856 if (!si) {
1857 return real_recvfrom(s, buf, len, flags, from, fromlen);
1860 if (!from) {
1861 from = (struct sockaddr *)&ss;
1862 fromlen = &ss_len;
1865 if (si->type == SOCK_STREAM) {
1866 /* cut down to 1500 byte packets for stream sockets,
1867 * which makes it easier to format PCAP capture files
1868 * (as the caller will simply continue from here) */
1869 len = MIN(len, 1500);
1872 /* irix 6.4 forgets to null terminate the sun_path string :-( */
1873 memset(&un_addr, 0, sizeof(un_addr));
1874 ret = real_recvfrom(s, buf, len, flags, (struct sockaddr *)&un_addr, &un_addrlen);
1875 if (ret == -1)
1876 return ret;
1878 if (sockaddr_convert_from_un(si, &un_addr, un_addrlen,
1879 si->family, from, fromlen) == -1) {
1880 return -1;
1883 swrap_dump_packet(si, from, SWRAP_RECVFROM, buf, ret);
1885 return ret;
1889 _PUBLIC_ ssize_t swrap_sendto(int s, const void *buf, size_t len, int flags, const struct sockaddr *to, socklen_t tolen)
1891 struct sockaddr_un un_addr;
1892 int ret;
1893 struct socket_info *si = find_socket_info(s);
1894 int bcast = 0;
1896 if (!si) {
1897 return real_sendto(s, buf, len, flags, to, tolen);
1900 if (si->connected) {
1901 if (to) {
1902 errno = EISCONN;
1903 return -1;
1906 to = si->peername;
1907 tolen = si->peername_len;
1910 switch (si->type) {
1911 case SOCK_STREAM:
1912 /* cut down to 1500 byte packets for stream sockets,
1913 * which makes it easier to format PCAP capture files
1914 * (as the caller will simply continue from here) */
1915 len = MIN(len, 1500);
1917 ret = real_send(s, buf, len, flags);
1918 break;
1919 case SOCK_DGRAM:
1920 if (si->bound == 0) {
1921 ret = swrap_auto_bind(si, si->family);
1922 if (ret == -1) return -1;
1925 ret = sockaddr_convert_to_un(si, to, tolen, &un_addr, 0, &bcast);
1926 if (ret == -1) return -1;
1928 if (bcast) {
1929 struct stat st;
1930 unsigned int iface;
1931 unsigned int prt = ntohs(((const struct sockaddr_in *)to)->sin_port);
1932 char type;
1934 type = SOCKET_TYPE_CHAR_UDP;
1936 for(iface=0; iface <= MAX_WRAPPED_INTERFACES; iface++) {
1937 snprintf(un_addr.sun_path, sizeof(un_addr.sun_path), "%s/"SOCKET_FORMAT,
1938 socket_wrapper_dir(), type, iface, prt);
1939 if (stat(un_addr.sun_path, &st) != 0) continue;
1941 /* ignore the any errors in broadcast sends */
1942 real_sendto(s, buf, len, flags, (struct sockaddr *)&un_addr, sizeof(un_addr));
1945 swrap_dump_packet(si, to, SWRAP_SENDTO, buf, len);
1947 return len;
1950 if (si->defer_connect) {
1951 ret = real_connect(s, (struct sockaddr *)&un_addr,
1952 sizeof(un_addr));
1954 /* to give better errors */
1955 if (ret == -1 && errno == ENOENT) {
1956 errno = EHOSTUNREACH;
1959 if (ret == -1) {
1960 return ret;
1962 si->defer_connect = 0;
1965 ret = real_sendto(s, buf, len, flags, (struct sockaddr *)&un_addr, sizeof(un_addr));
1966 break;
1967 default:
1968 ret = -1;
1969 errno = EHOSTUNREACH;
1970 break;
1973 /* to give better errors */
1974 if (ret == -1 && errno == ENOENT) {
1975 errno = EHOSTUNREACH;
1978 if (ret == -1) {
1979 swrap_dump_packet(si, to, SWRAP_SENDTO, buf, len);
1980 swrap_dump_packet(si, to, SWRAP_SENDTO_UNREACH, buf, len);
1981 } else {
1982 swrap_dump_packet(si, to, SWRAP_SENDTO, buf, ret);
1985 return ret;
1988 _PUBLIC_ int swrap_ioctl(int s, int r, void *p)
1990 int ret;
1991 struct socket_info *si = find_socket_info(s);
1992 int value;
1994 if (!si) {
1995 return real_ioctl(s, r, p);
1998 ret = real_ioctl(s, r, p);
2000 switch (r) {
2001 case FIONREAD:
2002 value = *((int *)p);
2003 if (ret == -1 && errno != EAGAIN && errno != ENOBUFS) {
2004 swrap_dump_packet(si, NULL, SWRAP_PENDING_RST, NULL, 0);
2005 } else if (value == 0) { /* END OF FILE */
2006 swrap_dump_packet(si, NULL, SWRAP_PENDING_RST, NULL, 0);
2008 break;
2011 return ret;
2014 _PUBLIC_ ssize_t swrap_recv(int s, void *buf, size_t len, int flags)
2016 int ret;
2017 struct socket_info *si = find_socket_info(s);
2019 if (!si) {
2020 return real_recv(s, buf, len, flags);
2023 if (si->type == SOCK_STREAM) {
2024 /* cut down to 1500 byte packets for stream sockets,
2025 * which makes it easier to format PCAP capture files
2026 * (as the caller will simply continue from here) */
2027 len = MIN(len, 1500);
2030 ret = real_recv(s, buf, len, flags);
2031 if (ret == -1 && errno != EAGAIN && errno != ENOBUFS) {
2032 swrap_dump_packet(si, NULL, SWRAP_RECV_RST, NULL, 0);
2033 } else if (ret == 0) { /* END OF FILE */
2034 swrap_dump_packet(si, NULL, SWRAP_RECV_RST, NULL, 0);
2035 } else if (ret > 0) {
2036 swrap_dump_packet(si, NULL, SWRAP_RECV, buf, ret);
2039 return ret;
2043 _PUBLIC_ ssize_t swrap_send(int s, const void *buf, size_t len, int flags)
2045 int ret;
2046 struct socket_info *si = find_socket_info(s);
2048 if (!si) {
2049 return real_send(s, buf, len, flags);
2052 if (si->type == SOCK_STREAM) {
2053 /* cut down to 1500 byte packets for stream sockets,
2054 * which makes it easier to format PCAP capture files
2055 * (as the caller will simply continue from here) */
2056 len = MIN(len, 1500);
2059 if (si->defer_connect) {
2060 struct sockaddr_un un_addr;
2061 int bcast = 0;
2063 if (si->bound == 0) {
2064 ret = swrap_auto_bind(si, si->family);
2065 if (ret == -1) return -1;
2068 ret = sockaddr_convert_to_un(si, si->peername, si->peername_len,
2069 &un_addr, 0, &bcast);
2070 if (ret == -1) return -1;
2072 ret = real_connect(s, (struct sockaddr *)&un_addr,
2073 sizeof(un_addr));
2075 /* to give better errors */
2076 if (ret == -1 && errno == ENOENT) {
2077 errno = EHOSTUNREACH;
2080 if (ret == -1) {
2081 return ret;
2083 si->defer_connect = 0;
2086 ret = real_send(s, buf, len, flags);
2088 if (ret == -1) {
2089 swrap_dump_packet(si, NULL, SWRAP_SEND, buf, len);
2090 swrap_dump_packet(si, NULL, SWRAP_SEND_RST, NULL, 0);
2091 } else {
2092 swrap_dump_packet(si, NULL, SWRAP_SEND, buf, ret);
2095 return ret;
2098 _PUBLIC_ ssize_t swrap_sendmsg(int s, const struct msghdr *msg, int flags)
2100 int ret;
2101 uint8_t *buf;
2102 off_t ofs = 0;
2103 size_t i;
2104 size_t remain;
2106 struct socket_info *si = find_socket_info(s);
2108 if (!si) {
2109 return real_sendmsg(s, msg, flags);
2112 if (si->defer_connect) {
2113 struct sockaddr_un un_addr;
2114 int bcast = 0;
2116 if (si->bound == 0) {
2117 ret = swrap_auto_bind(si, si->family);
2118 if (ret == -1) return -1;
2121 ret = sockaddr_convert_to_un(si, si->peername, si->peername_len,
2122 &un_addr, 0, &bcast);
2123 if (ret == -1) return -1;
2125 ret = real_connect(s, (struct sockaddr *)&un_addr,
2126 sizeof(un_addr));
2128 /* to give better errors */
2129 if (ret == -1 && errno == ENOENT) {
2130 errno = EHOSTUNREACH;
2133 if (ret == -1) {
2134 return ret;
2136 si->defer_connect = 0;
2139 ret = real_sendmsg(s, msg, flags);
2140 remain = ret;
2142 /* we capture it as one single packet */
2143 buf = (uint8_t *)malloc(ret);
2144 if (!buf) {
2145 /* we just not capture the packet */
2146 errno = 0;
2147 return ret;
2150 for (i=0; i < msg->msg_iovlen; i++) {
2151 size_t this_time = MIN(remain, msg->msg_iov[i].iov_len);
2152 memcpy(buf + ofs,
2153 msg->msg_iov[i].iov_base,
2154 this_time);
2155 ofs += this_time;
2156 remain -= this_time;
2159 swrap_dump_packet(si, NULL, SWRAP_SEND, buf, ret);
2160 free(buf);
2161 if (ret == -1) {
2162 swrap_dump_packet(si, NULL, SWRAP_SEND_RST, NULL, 0);
2165 return ret;
2168 int swrap_readv(int s, const struct iovec *vector, size_t count)
2170 int ret;
2171 struct socket_info *si = find_socket_info(s);
2172 struct iovec v;
2174 if (!si) {
2175 return real_readv(s, vector, count);
2178 if (si->type == SOCK_STREAM && count > 0) {
2179 /* cut down to 1500 byte packets for stream sockets,
2180 * which makes it easier to format PCAP capture files
2181 * (as the caller will simply continue from here) */
2182 size_t i, len = 0;
2184 for (i=0; i < count; i++) {
2185 size_t nlen;
2186 nlen = len + vector[i].iov_len;
2187 if (nlen > 1500) {
2188 break;
2191 count = i;
2192 if (count == 0) {
2193 v = vector[0];
2194 v.iov_len = MIN(v.iov_len, 1500);
2195 vector = &v;
2196 count = 1;
2200 ret = real_readv(s, vector, count);
2201 if (ret == -1 && errno != EAGAIN && errno != ENOBUFS) {
2202 swrap_dump_packet(si, NULL, SWRAP_RECV_RST, NULL, 0);
2203 } else if (ret == 0) { /* END OF FILE */
2204 swrap_dump_packet(si, NULL, SWRAP_RECV_RST, NULL, 0);
2205 } else if (ret > 0) {
2206 uint8_t *buf;
2207 off_t ofs = 0;
2208 size_t i;
2209 size_t remain = ret;
2211 /* we capture it as one single packet */
2212 buf = (uint8_t *)malloc(ret);
2213 if (!buf) {
2214 /* we just not capture the packet */
2215 errno = 0;
2216 return ret;
2219 for (i=0; i < count; i++) {
2220 size_t this_time = MIN(remain, vector[i].iov_len);
2221 memcpy(buf + ofs,
2222 vector[i].iov_base,
2223 this_time);
2224 ofs += this_time;
2225 remain -= this_time;
2228 swrap_dump_packet(si, NULL, SWRAP_RECV, buf, ret);
2229 free(buf);
2232 return ret;
2235 int swrap_writev(int s, const struct iovec *vector, size_t count)
2237 int ret;
2238 struct socket_info *si = find_socket_info(s);
2239 struct iovec v;
2241 if (!si) {
2242 return real_writev(s, vector, count);
2245 if (si->type == SOCK_STREAM && count > 0) {
2246 /* cut down to 1500 byte packets for stream sockets,
2247 * which makes it easier to format PCAP capture files
2248 * (as the caller will simply continue from here) */
2249 size_t i, len = 0;
2251 for (i=0; i < count; i++) {
2252 size_t nlen;
2253 nlen = len + vector[i].iov_len;
2254 if (nlen > 1500) {
2255 break;
2258 count = i;
2259 if (count == 0) {
2260 v = vector[0];
2261 v.iov_len = MIN(v.iov_len, 1500);
2262 vector = &v;
2263 count = 1;
2267 ret = real_writev(s, vector, count);
2268 if (ret == -1) {
2269 swrap_dump_packet(si, NULL, SWRAP_SEND_RST, NULL, 0);
2270 } else {
2271 uint8_t *buf;
2272 off_t ofs = 0;
2273 size_t i;
2274 size_t remain = ret;
2276 /* we capture it as one single packet */
2277 buf = (uint8_t *)malloc(ret);
2278 if (!buf) {
2279 /* we just not capture the packet */
2280 errno = 0;
2281 return ret;
2284 for (i=0; i < count; i++) {
2285 size_t this_time = MIN(remain, vector[i].iov_len);
2286 memcpy(buf + ofs,
2287 vector[i].iov_base,
2288 this_time);
2289 ofs += this_time;
2290 remain -= this_time;
2293 swrap_dump_packet(si, NULL, SWRAP_SEND, buf, ret);
2294 free(buf);
2297 return ret;
2300 _PUBLIC_ int swrap_close(int fd)
2302 struct socket_info *si = find_socket_info(fd);
2303 int ret;
2305 if (!si) {
2306 return real_close(fd);
2309 SWRAP_DLIST_REMOVE(sockets, si);
2311 if (si->myname && si->peername) {
2312 swrap_dump_packet(si, NULL, SWRAP_CLOSE_SEND, NULL, 0);
2315 ret = real_close(fd);
2317 if (si->myname && si->peername) {
2318 swrap_dump_packet(si, NULL, SWRAP_CLOSE_RECV, NULL, 0);
2319 swrap_dump_packet(si, NULL, SWRAP_CLOSE_ACK, NULL, 0);
2322 if (si->path) free(si->path);
2323 if (si->myname) free(si->myname);
2324 if (si->peername) free(si->peername);
2325 if (si->tmp_path) {
2326 unlink(si->tmp_path);
2327 free(si->tmp_path);
2329 free(si);
2331 return ret;