zephyr_socket.c 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062
  1. /*
  2. * Copyright (C) 2024 Grenoble INP - ESISAR. All rights reserved.
  3. * SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  4. */
  5. #include "platform_api_extension.h"
  6. #include "platform_api_vmcore.h"
  7. #include <zephyr/net/net_ip.h>
  8. #include <zephyr/net/socket.h>
  9. #include <zephyr/net/socket_types.h>
  10. #include <zephyr/posix/poll.h>
  11. #include <zephyr/posix/fcntl.h>
  12. #include "libc_errno.h"
  13. #include <assert.h>
  14. #include <stdarg.h>
  15. // Static functions
  16. static bool
  17. textual_addr_to_sockaddr(const char *textual, int port, struct sockaddr *out,
  18. socklen_t *out_len)
  19. {
  20. struct sockaddr_in *v4;
  21. #ifdef IPPROTO_IPV6
  22. struct sockaddr_in *v6;
  23. #endif
  24. assert(textual);
  25. v4 = (struct sockaddr_in *)out;
  26. if (zsock_inet_pton(AF_INET, textual, &v4->sin_addr.s_addr) == 1) {
  27. v4->sin_family = AF_INET;
  28. v4->sin_port = htons(port);
  29. *out_len = sizeof(struct sockaddr_in);
  30. return true;
  31. }
  32. #ifdef IPPROTO_IPV6
  33. v6 = (struct sockaddr_in *)out;
  34. if (zsock_inet_pton(AF_INET6, textual, &v6->sin6_addr.s6_addr) == 1) {
  35. v6->sin6_family = AF_INET6;
  36. v6->sin6_port = htons(port);
  37. *out_len = sizeof(struct sockaddr_in);
  38. return true;
  39. }
  40. #endif
  41. return false;
  42. }
  43. static int
  44. sockaddr_to_bh_sockaddr(const struct sockaddr *sockaddr,
  45. bh_sockaddr_t *bh_sockaddr)
  46. {
  47. switch (sockaddr->sa_family) {
  48. case AF_INET:
  49. {
  50. struct sockaddr_in *addr = (struct sockaddr_in *)sockaddr;
  51. bh_sockaddr->port = ntohs(addr->sin_port);
  52. bh_sockaddr->addr_buffer.ipv4 = ntohl(addr->sin_addr.s_addr);
  53. bh_sockaddr->is_ipv4 = true;
  54. return BHT_OK;
  55. }
  56. #ifdef IPPROTO_IPV6
  57. case AF_INET6:
  58. {
  59. struct sockaddr_in *addr = (struct sockaddr_in *)sockaddr;
  60. size_t i;
  61. bh_sockaddr->port = ntohs(addr->sin6_port);
  62. for (i = 0; i < sizeof(bh_sockaddr->addr_buffer.ipv6)
  63. / sizeof(bh_sockaddr->addr_buffer.ipv6[0]);
  64. i++) {
  65. uint16 part_addr = addr->sin6_addr.s6_addr[i * 2]
  66. | (addr->sin6_addr.s6_addr[i * 2 + 1] << 8);
  67. bh_sockaddr->addr_buffer.ipv6[i] = ntohs(part_addr);
  68. }
  69. bh_sockaddr->is_ipv4 = false;
  70. return BHT_OK;
  71. }
  72. #endif
  73. default:
  74. errno = EAFNOSUPPORT;
  75. return BHT_ERROR;
  76. }
  77. }
  78. static void
  79. bh_sockaddr_to_sockaddr(const bh_sockaddr_t *bh_sockaddr,
  80. struct sockaddr_storage *sockaddr, socklen_t *socklen)
  81. {
  82. if (bh_sockaddr->is_ipv4) {
  83. struct sockaddr_in *addr = (struct sockaddr_in *)sockaddr;
  84. addr->sin_port = htons(bh_sockaddr->port);
  85. addr->sin_family = AF_INET;
  86. addr->sin_addr.s_addr = htonl(bh_sockaddr->addr_buffer.ipv4);
  87. *socklen = sizeof(*addr);
  88. }
  89. #ifdef IPPROTO_IPV6
  90. else {
  91. struct sockaddr_in6 *addr = (struct sockaddr_in6 *)sockaddr;
  92. size_t i;
  93. addr->sin6_port = htons(bh_sockaddr->port);
  94. addr->sin6_family = AF_INET6;
  95. for (i = 0; i < sizeof(bh_sockaddr->addr_buffer.ipv6)
  96. / sizeof(bh_sockaddr->addr_buffer.ipv6[0]);
  97. i++) {
  98. uint16 part_addr = htons(bh_sockaddr->addr_buffer.ipv6[i]);
  99. addr->sin6_addr.s6_addr[i * 2] = 0xff & part_addr;
  100. addr->sin6_addr.s6_addr[i * 2 + 1] = (0xff00 & part_addr) >> 8;
  101. }
  102. *socklen = sizeof(*addr);
  103. }
  104. #endif
  105. }
  106. static int
  107. getaddrinfo_error_to_errno(int error)
  108. {
  109. switch (error) {
  110. case DNS_EAI_AGAIN:
  111. return EAGAIN;
  112. case DNS_EAI_FAIL:
  113. return EFAULT;
  114. case DNS_EAI_MEMORY:
  115. return ENOMEM;
  116. case DNS_EAI_SYSTEM:
  117. return errno;
  118. default:
  119. return EINVAL;
  120. }
  121. }
  122. static int
  123. is_addrinfo_supported(struct zsock_addrinfo *info)
  124. {
  125. return
  126. // Allow only IPv4 and IPv6
  127. (info->ai_family == AF_INET || info->ai_family == AF_INET6)
  128. // Allow only UDP and TCP
  129. && (info->ai_socktype == SOCK_DGRAM || info->ai_socktype == SOCK_STREAM)
  130. && (info->ai_protocol == IPPROTO_TCP
  131. || info->ai_protocol == IPPROTO_UDP);
  132. }
  133. static int
  134. os_socket_setbooloption(bh_socket_t socket, int level, int optname,
  135. bool is_enabled)
  136. {
  137. int option = (int)is_enabled;
  138. if (zsock_setsockopt(socket->fd, level, optname, &option, sizeof(option))
  139. != 0) {
  140. return BHT_ERROR;
  141. }
  142. return BHT_OK;
  143. }
  144. static int
  145. os_socket_getbooloption(bh_socket_t socket, int level, int optname,
  146. bool *is_enabled)
  147. {
  148. assert(is_enabled);
  149. int optval;
  150. socklen_t optval_size = sizeof(optval);
  151. if (zsock_setsockopt(socket->fd, level, optname, &optval, optval_size)
  152. != 0) {
  153. return BHT_ERROR;
  154. }
  155. *is_enabled = (bool)optval;
  156. return BHT_OK;
  157. }
  158. // Platform API implementation
  159. int
  160. os_socket_create(bh_socket_t *sock, bool is_ipv4, bool is_tcp)
  161. {
  162. int af = is_ipv4 ? AF_INET : AF_INET6;
  163. // now socket is a struct try *(sock)->fd
  164. *(sock) = BH_MALLOC(sizeof(zephyr_handle));
  165. if (!sock) {
  166. return BHT_ERROR;
  167. }
  168. if (is_tcp) {
  169. (*sock)->fd = zsock_socket(af, SOCK_STREAM, IPPROTO_TCP);
  170. }
  171. else {
  172. (*sock)->fd =
  173. zsock_socket(af, SOCK_DGRAM, IPPROTO_UDP); // IPPROTO_UDP or 0
  174. }
  175. (*sock)->is_sock = true;
  176. if ((*sock)->fd == -1) {
  177. BH_FREE(*sock);
  178. return BHT_ERROR;
  179. }
  180. return BHT_OK;
  181. }
  182. int
  183. os_socket_bind(bh_socket_t socket, const char *host, int *port)
  184. {
  185. struct sockaddr_storage addr = { 0 };
  186. socklen_t socklen;
  187. int ret;
  188. assert(host);
  189. assert(port);
  190. if (!textual_addr_to_sockaddr(host, *port, (struct sockaddr *)&addr,
  191. &socklen)) {
  192. return BHT_ERROR;
  193. }
  194. // F_SETF_SETFD and FD_CLOEXEC are not defined in zephyr.
  195. // SO_LINGER: Socket lingers on close (ignored, for compatibility)
  196. ret = zsock_bind(socket->fd, (struct sockaddr *)&addr, socklen);
  197. if (ret < 0) {
  198. return BHT_ERROR;
  199. }
  200. socklen = sizeof(addr);
  201. if (zsock_getsockname(socket->fd, (void *)&addr, &socklen) == -1) {
  202. return BHT_ERROR;
  203. }
  204. if (addr.ss_family == AF_INET) { // addr.sin_family
  205. *port = ntohs(((struct sockaddr_in *)&addr)->sin_port);
  206. }
  207. else {
  208. #ifdef IPPROTO_IPV6
  209. *port = ntohs(((struct sockaddr_in *)&addr)->sin6_port);
  210. #else
  211. return BHT_ERROR;
  212. #endif
  213. }
  214. return BHT_OK;
  215. }
  216. int
  217. os_socket_settimeout(bh_socket_t socket, uint64 timeout_us)
  218. {
  219. struct timeval timeout = { 0 };
  220. timeout.tv_sec = timeout_us / 1000000;
  221. timeout.tv_usec = timeout_us % 1000000;
  222. return zsock_setsockopt(socket->fd, SOL_SOCKET, SO_RCVTIMEO, &timeout,
  223. sizeof(timeout));
  224. }
  225. int
  226. os_socket_listen(bh_socket_t socket, int max_client)
  227. {
  228. return zsock_listen(socket->fd, max_client) != 0 ? BHT_ERROR : BHT_OK;
  229. }
  230. int
  231. os_socket_accept(bh_socket_t server_sock, bh_socket_t *sock, void *addr,
  232. unsigned int *addrlen)
  233. {
  234. *sock = BH_MALLOC(sizeof(zephyr_handle));
  235. if (!sock) {
  236. return BHT_ERROR;
  237. }
  238. (*sock)->fd = zsock_accept(server_sock->fd, addr, addrlen);
  239. if ((*sock)->fd < 0) {
  240. BH_FREE(*sock);
  241. return BHT_ERROR;
  242. }
  243. (*sock)->is_sock = true;
  244. return BHT_OK;
  245. }
  246. int
  247. os_socket_connect(bh_socket_t socket, const char *addr, int port)
  248. {
  249. struct sockaddr_storage addr_in = { 0 };
  250. socklen_t socklen;
  251. int ret;
  252. assert(addr);
  253. if (!textual_addr_to_sockaddr(addr, port, (struct sockaddr *)&addr_in,
  254. &socklen)) {
  255. return BHT_ERROR;
  256. }
  257. ret = zsock_connect(socket->fd, (struct sockaddr *)&addr_in, socklen);
  258. if (ret < 0) {
  259. return BHT_ERROR;
  260. }
  261. return BHT_OK;
  262. }
  263. int
  264. os_socket_recv(bh_socket_t socket, void *buf, unsigned int len)
  265. {
  266. return zsock_recv(socket->fd, buf, len, 0);
  267. }
  268. int
  269. os_socket_recv_from(bh_socket_t socket, void *buf, unsigned int len, int flags,
  270. bh_sockaddr_t *src_addr)
  271. {
  272. struct sockaddr_storage sock_addr = { 0 };
  273. socklen_t socklen = sizeof(sock_addr);
  274. int ret;
  275. ret = zsock_recvfrom(socket->fd, buf, len, flags,
  276. (struct sockaddr *)&sock_addr, &socklen);
  277. if (ret < 0) {
  278. return BHT_ERROR;
  279. }
  280. if (src_addr && socklen > 0) {
  281. // zsock_recvfrom doesn't seem to set `addr->sa_family`,
  282. // so we set it manually.
  283. ((struct sockaddr *)&sock_addr)->sa_family =
  284. src_addr->is_ipv4 == true ? AF_INET : AF_INET6;
  285. if (sockaddr_to_bh_sockaddr((struct sockaddr *)&sock_addr, src_addr)
  286. == BHT_ERROR) {
  287. return -1;
  288. }
  289. }
  290. else if (src_addr) {
  291. memset(src_addr, 0, sizeof(*src_addr));
  292. }
  293. return ret;
  294. }
  295. int
  296. os_socket_send(bh_socket_t socket, const void *buf, unsigned int len)
  297. {
  298. return zsock_send(socket->fd, buf, len, 0);
  299. }
  300. int
  301. os_socket_send_to(bh_socket_t socket, const void *buf, unsigned int len,
  302. int flags, const bh_sockaddr_t *dest_addr)
  303. {
  304. struct sockaddr_storage addr = { 0 };
  305. socklen_t socklen;
  306. (void)bh_sockaddr_to_sockaddr(dest_addr, &addr, &socklen);
  307. return zsock_sendto(socket->fd, buf, len, flags, (struct sockaddr *)&addr,
  308. socklen);
  309. }
  310. int
  311. os_socket_close(bh_socket_t socket)
  312. {
  313. zsock_close(socket->fd);
  314. BH_FREE(socket);
  315. return BHT_OK;
  316. }
  317. __wasi_errno_t
  318. os_socket_shutdown(bh_socket_t socket)
  319. {
  320. if (zsock_shutdown(socket->fd, ZSOCK_SHUT_RDWR) == -1) {
  321. return convert_errno(errno);
  322. }
  323. return __WASI_ESUCCESS;
  324. }
  325. int
  326. os_socket_inet_network(bool is_ipv4, const char *cp, bh_ip_addr_buffer_t *out)
  327. {
  328. if (!cp)
  329. return BHT_ERROR;
  330. if (is_ipv4) {
  331. if (zsock_inet_pton(AF_INET, cp, &out->ipv4) != 1) {
  332. return BHT_ERROR;
  333. }
  334. /* Note: ntohl(INADDR_NONE) == INADDR_NONE */
  335. out->ipv4 = ntohl(out->ipv4);
  336. }
  337. else {
  338. #ifdef IPPROTO_IPV6
  339. if (zsock_inet_pton(AF_INET6, cp, out->ipv6) != 1) {
  340. return BHT_ERROR;
  341. }
  342. for (int i = 0; i < 8; i++) {
  343. out->ipv6[i] = ntohs(out->ipv6[i]);
  344. }
  345. #else
  346. errno = EAFNOSUPPORT;
  347. return BHT_ERROR;
  348. #endif
  349. }
  350. return BHT_OK;
  351. }
  352. int
  353. os_socket_addr_resolve(const char *host, const char *service,
  354. uint8_t *hint_is_tcp, uint8_t *hint_is_ipv4,
  355. bh_addr_info_t *addr_info, size_t addr_info_size,
  356. size_t *max_info_size)
  357. {
  358. struct zsock_addrinfo hints = { 0 }, *res, *result;
  359. int hints_enabled = hint_is_tcp || hint_is_ipv4;
  360. int ret;
  361. size_t pos = 0;
  362. if (hints_enabled) {
  363. if (hint_is_ipv4) {
  364. hints.ai_family = *hint_is_ipv4 ? AF_INET : AF_INET6;
  365. }
  366. if (hint_is_tcp) {
  367. hints.ai_socktype = *hint_is_tcp ? SOCK_STREAM : SOCK_DGRAM;
  368. }
  369. }
  370. ret = zsock_getaddrinfo(host, strlen(service) == 0 ? NULL : service,
  371. hints_enabled ? &hints : NULL, &result);
  372. if (ret != BHT_OK) {
  373. errno = getaddrinfo_error_to_errno(ret);
  374. return BHT_ERROR;
  375. }
  376. res = result;
  377. while (res) {
  378. if (addr_info_size > pos) {
  379. if (!is_addrinfo_supported(res)) {
  380. res = res->ai_next;
  381. continue;
  382. }
  383. ret =
  384. sockaddr_to_bh_sockaddr(res->ai_addr, &addr_info[pos].sockaddr);
  385. if (ret == BHT_ERROR) {
  386. zsock_freeaddrinfo(result);
  387. return BHT_ERROR;
  388. }
  389. addr_info[pos].is_tcp = res->ai_socktype == SOCK_STREAM;
  390. }
  391. pos++;
  392. res = res->ai_next;
  393. }
  394. *max_info_size = pos;
  395. zsock_freeaddrinfo(result);
  396. return BHT_OK;
  397. }
  398. int
  399. os_socket_addr_local(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  400. {
  401. struct sockaddr_storage addr_storage = { 0 };
  402. socklen_t addr_len = sizeof(addr_storage);
  403. int ret;
  404. ret = zsock_getsockname(socket->fd, (struct sockaddr *)&addr_storage,
  405. &addr_len);
  406. if (ret != BHT_OK) {
  407. return BHT_ERROR;
  408. }
  409. return sockaddr_to_bh_sockaddr((struct sockaddr *)&addr_storage, sockaddr);
  410. }
  411. int
  412. os_socket_addr_remote(bh_socket_t socket, bh_sockaddr_t *sockaddr)
  413. {
  414. struct sockaddr_storage addr_storage = { 0 };
  415. socklen_t addr_len = sizeof(addr_storage);
  416. int ret;
  417. ret = zsock_getpeername(socket->fd, (struct sockaddr *)&addr_storage,
  418. &addr_len);
  419. if (ret != BHT_OK) {
  420. return BHT_ERROR;
  421. }
  422. return sockaddr_to_bh_sockaddr((struct sockaddr *)&addr_storage, sockaddr);
  423. }
  424. int
  425. os_socket_set_send_buf_size(bh_socket_t socket, size_t bufsiz)
  426. {
  427. int buf_size_int = (int)bufsiz;
  428. if (zsock_setsockopt(socket->fd, SOL_SOCKET, SO_SNDBUF, &buf_size_int,
  429. sizeof(buf_size_int))
  430. != 0) {
  431. return BHT_ERROR;
  432. }
  433. return BHT_OK;
  434. }
  435. int
  436. os_socket_get_send_buf_size(bh_socket_t socket, size_t *bufsiz)
  437. {
  438. assert(bufsiz);
  439. int buf_size_int;
  440. socklen_t bufsiz_len = sizeof(buf_size_int);
  441. if (zsock_getsockopt(socket->fd, SOL_SOCKET, SO_SNDBUF, &buf_size_int,
  442. &bufsiz_len)
  443. != 0) {
  444. return BHT_ERROR;
  445. }
  446. *bufsiz = (size_t)buf_size_int;
  447. return BHT_OK;
  448. }
  449. int
  450. os_socket_set_recv_buf_size(bh_socket_t socket, size_t bufsiz)
  451. {
  452. if (zsock_setsockopt(socket->fd, SOL_SOCKET, SO_RCVBUF, &bufsiz,
  453. sizeof(bufsiz))
  454. != 0) {
  455. return BHT_ERROR;
  456. }
  457. return BHT_OK;
  458. }
  459. int
  460. os_socket_get_recv_buf_size(bh_socket_t socket, size_t *bufsiz)
  461. {
  462. assert(bufsiz);
  463. int buf_size_int;
  464. socklen_t bufsiz_len = sizeof(buf_size_int);
  465. if (zsock_getsockopt(socket->fd, SOL_SOCKET, SO_RCVBUF, &buf_size_int,
  466. &bufsiz_len)
  467. != 0) {
  468. return BHT_ERROR;
  469. }
  470. *bufsiz = (size_t)buf_size_int;
  471. return BHT_OK;
  472. }
  473. int
  474. os_socket_set_keep_alive(bh_socket_t socket, bool is_enabled)
  475. {
  476. return os_socket_setbooloption(socket, SOL_SOCKET, SO_KEEPALIVE,
  477. is_enabled);
  478. }
  479. int
  480. os_socket_get_keep_alive(bh_socket_t socket, bool *is_enabled)
  481. {
  482. return os_socket_getbooloption(socket, SOL_SOCKET, SO_KEEPALIVE,
  483. is_enabled);
  484. }
  485. int
  486. os_socket_set_send_timeout(bh_socket_t socket, uint64 timeout_us)
  487. {
  488. struct timeval tv;
  489. tv.tv_sec = timeout_us / 1000000UL;
  490. tv.tv_usec = timeout_us % 1000000UL;
  491. if (zsock_setsockopt(socket->fd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv))
  492. != 0) {
  493. return BHT_ERROR;
  494. }
  495. return BHT_OK;
  496. }
  497. int
  498. os_socket_get_send_timeout(bh_socket_t socket, uint64 *timeout_us)
  499. {
  500. struct timeval tv;
  501. socklen_t tv_len = sizeof(tv);
  502. if (zsock_setsockopt(socket->fd, SOL_SOCKET, SO_SNDTIMEO, &tv, tv_len)
  503. != 0) {
  504. return BHT_ERROR;
  505. }
  506. *timeout_us = (tv.tv_sec * 1000000UL) + tv.tv_usec;
  507. return BHT_OK;
  508. }
  509. int
  510. os_socket_set_recv_timeout(bh_socket_t socket, uint64 timeout_us)
  511. {
  512. struct timeval tv;
  513. tv.tv_sec = timeout_us / 1000000UL;
  514. tv.tv_usec = timeout_us % 1000000UL;
  515. if (zsock_setsockopt(socket->fd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv))
  516. != 0) {
  517. return BHT_ERROR;
  518. }
  519. return BHT_OK;
  520. }
  521. int
  522. os_socket_get_recv_timeout(bh_socket_t socket, uint64 *timeout_us)
  523. {
  524. struct timeval tv;
  525. socklen_t tv_len = sizeof(tv);
  526. if (zsock_setsockopt(socket->fd, SOL_SOCKET, SO_RCVTIMEO, &tv, tv_len)
  527. != 0) {
  528. return BHT_ERROR;
  529. }
  530. *timeout_us = (tv.tv_sec * 1000000UL) + tv.tv_usec;
  531. return BHT_OK;
  532. }
  533. int
  534. os_socket_set_reuse_addr(bh_socket_t socket, bool is_enabled)
  535. {
  536. return os_socket_setbooloption(socket, SOL_SOCKET, SO_REUSEADDR,
  537. is_enabled);
  538. }
  539. int
  540. os_socket_get_reuse_addr(bh_socket_t socket, bool *is_enabled)
  541. {
  542. return os_socket_getbooloption(socket, SOL_SOCKET, SO_REUSEADDR,
  543. is_enabled);
  544. }
  545. int
  546. os_socket_set_reuse_port(bh_socket_t socket, bool is_enabled)
  547. {
  548. return os_socket_setbooloption(socket, SOL_SOCKET, SO_REUSEPORT,
  549. is_enabled);
  550. }
  551. int
  552. os_socket_get_reuse_port(bh_socket_t socket, bool *is_enabled)
  553. {
  554. return os_socket_getbooloption(socket, SOL_SOCKET, SO_REUSEPORT,
  555. is_enabled);
  556. }
  557. // SO_LINGER Socket lingers on close (ignored, for compatibility)
  558. int
  559. os_socket_set_linger(bh_socket_t socket, bool is_enabled, int linger_s)
  560. {
  561. errno = ENOSYS;
  562. return BHT_ERROR;
  563. }
  564. int
  565. os_socket_get_linger(bh_socket_t socket, bool *is_enabled, int *linger_s)
  566. {
  567. errno = ENOSYS;
  568. return BHT_ERROR;
  569. }
  570. // TCP_NODELAY Disable TCP buffering (ignored, for compatibility)
  571. int
  572. os_socket_set_tcp_no_delay(bh_socket_t socket, bool is_enabled)
  573. {
  574. errno = ENOSYS;
  575. return BHT_ERROR;
  576. }
  577. int
  578. os_socket_get_tcp_no_delay(bh_socket_t socket, bool *is_enabled)
  579. {
  580. errno = ENOSYS;
  581. return BHT_ERROR;
  582. }
  583. int
  584. os_socket_set_tcp_quick_ack(bh_socket_t socket, bool is_enabled)
  585. {
  586. errno = ENOSYS;
  587. return BHT_ERROR;
  588. }
  589. int
  590. os_socket_get_tcp_quick_ack(bh_socket_t socket, bool *is_enabled)
  591. {
  592. errno = ENOSYS;
  593. return BHT_ERROR;
  594. }
  595. int
  596. os_socket_set_tcp_keep_idle(bh_socket_t socket, uint32_t time_s)
  597. {
  598. int time_s_int = (int)time_s;
  599. #ifdef TCP_KEEPIDLE
  600. if (zsock_setsockopt(socket->fd, IPPROTO_TCP, TCP_KEEPIDLE, &time_s_int,
  601. sizeof(time_s_int))
  602. != 0) {
  603. return BHT_ERROR;
  604. }
  605. return BHT_OK;
  606. #elif defined(TCP_KEEPALIVE)
  607. if (zsock_setsockopt(socket->fd, IPPROTO_TCP, TCP_KEEPALIVE, &time_s_int,
  608. sizeof(time_s_int))
  609. != 0) {
  610. return BHT_ERROR;
  611. }
  612. return BHT_OK;
  613. #else
  614. errno = ENOSYS;
  615. return BHT_ERROR;
  616. #endif
  617. }
  618. int
  619. os_socket_get_tcp_keep_idle(bh_socket_t socket, uint32_t *time_s)
  620. {
  621. assert(time_s);
  622. int time_s_int;
  623. socklen_t time_s_len = sizeof(time_s_int);
  624. #ifdef TCP_KEEPIDLE
  625. if (zsock_setsockopt(socket->fd, IPPROTO_TCP, TCP_KEEPIDLE, &time_s_int,
  626. time_s_len)
  627. != 0) {
  628. return BHT_ERROR;
  629. }
  630. *time_s = (uint32)time_s_int;
  631. return BHT_OK;
  632. #elif defined(TCP_KEEPALIVE)
  633. if (zsock_setsockopt(socket->fd, IPPROTO_TCP, TCP_KEEPALIVE, &time_s_int,
  634. time_s_len)
  635. != 0) {
  636. return BHT_ERROR;
  637. }
  638. *time_s = (uint32)time_s_int;
  639. return BHT_OK;
  640. #else
  641. errno = ENOSYS;
  642. return BHT_ERROR;
  643. #endif
  644. }
  645. int
  646. os_socket_set_tcp_keep_intvl(bh_socket_t socket, uint32_t time_s)
  647. {
  648. int time_s_int = (int)time_s;
  649. #ifdef TCP_KEEPINTVL
  650. if (zsock_setsockopt(socket->fd, IPPROTO_TCP, TCP_KEEPINTVL, &time_s_int,
  651. sizeof(time_s_int))
  652. != 0) {
  653. return BHT_ERROR;
  654. }
  655. return BHT_OK;
  656. #else
  657. errno = ENOSYS;
  658. return BHT_ERROR;
  659. #endif
  660. }
  661. int
  662. os_socket_get_tcp_keep_intvl(bh_socket_t socket, uint32_t *time_s)
  663. {
  664. #ifdef TCP_KEEPINTVL
  665. if (!socket || !time_s || socket->fd < 0) {
  666. errno = EINVAL;
  667. return BHT_ERROR;
  668. }
  669. int time_s_int;
  670. socklen_t time_s_len = sizeof(time_s_int);
  671. if (zsock_getsockopt(socket->fd, IPPROTO_TCP, TCP_KEEPINTVL, &time_s_int,
  672. &time_s_len)
  673. != 0) {
  674. return BHT_ERROR;
  675. }
  676. if (time_s_int < 0) {
  677. errno = EINVAL;
  678. return BHT_ERROR;
  679. }
  680. *time_s = (uint32_t)time_s_int;
  681. return BHT_OK;
  682. #else
  683. errno = ENOSYS;
  684. return BHT_ERROR;
  685. #endif
  686. }
  687. int
  688. os_socket_set_tcp_fastopen_connect(bh_socket_t socket, bool is_enabled)
  689. {
  690. errno = ENOSYS;
  691. return BHT_ERROR;
  692. }
  693. int
  694. os_socket_get_tcp_fastopen_connect(bh_socket_t socket, bool *is_enabled)
  695. {
  696. errno = ENOSYS;
  697. return BHT_ERROR;
  698. }
  699. int
  700. os_socket_set_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool is_enabled)
  701. {
  702. errno = ENOSYS;
  703. return BHT_ERROR;
  704. }
  705. int
  706. os_socket_get_ip_multicast_loop(bh_socket_t socket, bool ipv6, bool *is_enabled)
  707. {
  708. errno = ENOSYS;
  709. return BHT_ERROR;
  710. }
  711. int
  712. os_socket_set_ip_add_membership(bh_socket_t socket,
  713. bh_ip_addr_buffer_t *imr_multiaddr,
  714. uint32_t imr_interface, bool is_ipv6)
  715. {
  716. assert(imr_multiaddr);
  717. if (is_ipv6) {
  718. #if defined(IPPROTO_IPV6) && !defined(BH_PLATFORM_COSMOPOLITAN)
  719. struct ipv6_mreq mreq;
  720. for (int i = 0; i < 8; i++) {
  721. ((uint16_t *)mreq.ipv6mr_multiaddr.s6_addr)[i] =
  722. imr_multiaddr->ipv6[i];
  723. }
  724. mreq.ipv6mr_interface = imr_interface;
  725. if (setsockopt(socket->fd, IPPROTO_IPV6, IPV6_ADD_MEMBERSHIP, &mreq,
  726. sizeof(mreq))
  727. != 0) {
  728. return BHT_ERROR;
  729. }
  730. #else
  731. errno = EAFNOSUPPORT;
  732. return BHT_ERROR;
  733. #endif
  734. }
  735. else {
  736. struct ip_mreqn mreq;
  737. mreq.imr_multiaddr.s_addr = imr_multiaddr->ipv4;
  738. mreq.imr_address.s_addr = imr_interface;
  739. if (zsock_setsockopt(socket->fd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &mreq,
  740. sizeof(mreq))
  741. != 0) {
  742. return BHT_ERROR;
  743. }
  744. }
  745. return BHT_OK;
  746. }
  747. int
  748. os_socket_set_ip_drop_membership(bh_socket_t socket,
  749. bh_ip_addr_buffer_t *imr_multiaddr,
  750. uint32_t imr_interface, bool is_ipv6)
  751. {
  752. assert(imr_multiaddr);
  753. if (is_ipv6) {
  754. #if defined(IPPROTO_IPV6) && !defined(BH_PLATFORM_COSMOPOLITAN)
  755. struct ipv6_mreq mreq;
  756. for (int i = 0; i < 8; i++) {
  757. ((uint16_t *)mreq.ipv6mr_multiaddr.s6_addr)[i] =
  758. imr_multiaddr->ipv6[i];
  759. }
  760. mreq.ipv6mr_interface = imr_interface;
  761. if (zsock_setsockopt(socket->fd, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP,
  762. &mreq, sizeof(mreq))
  763. != 0) {
  764. return BHT_ERROR;
  765. }
  766. #else
  767. errno = EAFNOSUPPORT;
  768. return BHT_ERROR;
  769. #endif
  770. }
  771. else {
  772. struct ip_mreqn mreq;
  773. mreq.imr_multiaddr.s_addr = imr_multiaddr->ipv4;
  774. mreq.imr_address.s_addr = imr_interface;
  775. if (zsock_setsockopt(socket->fd, IPPROTO_IP, IP_DROP_MEMBERSHIP, &mreq,
  776. sizeof(mreq))
  777. != 0) {
  778. return BHT_ERROR;
  779. }
  780. }
  781. return BHT_OK;
  782. }
  783. int
  784. os_socket_set_ip_ttl(bh_socket_t socket, uint8_t ttl_s)
  785. {
  786. if (zsock_setsockopt(socket->fd, IPPROTO_IP, IP_TTL, &ttl_s, sizeof(ttl_s))
  787. != 0) {
  788. return BHT_ERROR;
  789. }
  790. return BHT_OK;
  791. }
  792. int
  793. os_socket_get_ip_ttl(bh_socket_t socket, uint8_t *ttl_s)
  794. {
  795. socklen_t opt_len = sizeof(*ttl_s);
  796. if (zsock_setsockopt(socket->fd, IPPROTO_IP, IP_MULTICAST_TTL, ttl_s,
  797. opt_len)
  798. != 0) {
  799. return BHT_ERROR;
  800. }
  801. return BHT_OK;
  802. }
  803. int
  804. os_socket_set_ip_multicast_ttl(bh_socket_t socket, uint8_t ttl_s)
  805. {
  806. if (zsock_setsockopt(socket->fd, IPPROTO_IP, IP_MULTICAST_TTL, &ttl_s,
  807. sizeof(ttl_s))
  808. != 0) {
  809. return BHT_ERROR;
  810. }
  811. return BHT_OK;
  812. }
  813. int
  814. os_socket_get_ip_multicast_ttl(bh_socket_t socket, uint8_t *ttl_s)
  815. {
  816. socklen_t opt_len = sizeof(*ttl_s);
  817. if (zsock_setsockopt(socket->fd, IPPROTO_IP, IP_MULTICAST_TTL, ttl_s,
  818. opt_len)
  819. != 0) {
  820. return BHT_ERROR;
  821. }
  822. return BHT_OK;
  823. }
  824. int
  825. os_socket_set_ipv6_only(bh_socket_t socket, bool is_enabled)
  826. {
  827. #ifdef IPPROTO_IPV6
  828. return os_socket_setbooloption(socket, IPPROTO_IPV6, IPV6_V6ONLY,
  829. is_enabled);
  830. #else
  831. errno = EAFNOSUPPORT;
  832. return BHT_ERROR;
  833. #endif
  834. }
  835. int
  836. os_socket_get_ipv6_only(bh_socket_t socket, bool *is_enabled)
  837. {
  838. #ifdef IPPROTO_IPV6
  839. return os_socket_getbooloption(socket, IPPROTO_IPV6, IPV6_V6ONLY,
  840. is_enabled);
  841. #else
  842. errno = EAFNOSUPPORT;
  843. return BHT_ERROR;
  844. #endif
  845. }
  846. int
  847. os_socket_set_broadcast(bh_socket_t socket, bool is_enabled)
  848. {
  849. return os_socket_setbooloption(socket, SOL_SOCKET, SO_BROADCAST,
  850. is_enabled);
  851. }
  852. int
  853. os_socket_get_broadcast(bh_socket_t socket, bool *is_enabled)
  854. {
  855. return os_socket_getbooloption(socket, SOL_SOCKET, SO_BROADCAST,
  856. is_enabled);
  857. }
  858. // Experimental :
  859. int
  860. os_ioctl(os_file_handle handle, int request, ...)
  861. {
  862. return __WASI_ENOSYS;
  863. // int ret = -1;
  864. // va_list args;
  865. // va_start(args, request);
  866. // ret = zsock_ioctl(handle->fd, request, args);
  867. // va_end(args);
  868. // return ret;
  869. }
  870. int
  871. os_poll(os_poll_file_handle *fds, os_nfds_t nfs, int timeout)
  872. {
  873. return zsock_poll(fds, nfs, timeout);
  874. }