asterinas/kernel/src/net/socket/util/options.rs

274 lines
9.5 KiB
Rust
Raw Normal View History

2024-01-03 03:22:36 +00:00
// SPDX-License-Identifier: MPL-2.0
2025-06-11 07:03:05 +00:00
use core::ops::RangeInclusive;
2024-09-06 10:49:37 +00:00
use aster_bigtcp::socket::{
NeedIfacePoll, TCP_RECV_BUF_LEN, TCP_SEND_BUF_LEN, UDP_RECV_PAYLOAD_LEN, UDP_SEND_PAYLOAD_LEN,
2024-09-06 10:49:37 +00:00
};
use super::LingerOption;
use crate::{
match_sock_option_mut, match_sock_option_ref,
net::socket::{
options::{
AcceptConn, KeepAlive, Linger, PassCred, PeerCred, PeerGroups, Priority, RecvBuf,
RecvBufForce, ReuseAddr, ReusePort, SendBuf, SendBufForce, SocketOption,
},
2025-06-11 08:28:05 +00:00
unix::{CUserCred, UNIX_STREAM_DEFAULT_BUF_SIZE},
},
prelude::*,
process::{credentials::capabilities::CapSet, posix_thread::AsPosixThread},
};
2023-12-28 09:24:23 +00:00
#[derive(Debug, Clone, CopyGetters, Setters)]
#[get_copy = "pub"]
#[set = "pub"]
pub struct SocketOptionSet {
reuse_addr: bool,
reuse_port: bool,
send_buf: u32,
recv_buf: u32,
linger: LingerOption,
keep_alive: bool,
pass_cred: bool,
2025-06-11 07:03:05 +00:00
priority: i32,
}
impl Default for SocketOptionSet {
fn default() -> Self {
Self {
reuse_addr: false,
reuse_port: false,
send_buf: MIN_SENDBUF,
recv_buf: MIN_RECVBUF,
linger: LingerOption::default(),
keep_alive: false,
pass_cred: false,
2025-06-11 07:03:05 +00:00
priority: 0,
}
}
2023-12-28 09:24:23 +00:00
}
impl SocketOptionSet {
/// Returns the default socket level options for tcp socket.
pub(in crate::net) fn new_tcp() -> Self {
2023-12-28 09:24:23 +00:00
Self {
send_buf: TCP_SEND_BUF_LEN as u32,
recv_buf: TCP_RECV_BUF_LEN as u32,
2025-06-11 07:03:05 +00:00
..Default::default()
2023-12-28 09:24:23 +00:00
}
}
/// Returns the default socket level options for udp socket.
pub(in crate::net) fn new_udp() -> Self {
Self {
send_buf: UDP_SEND_PAYLOAD_LEN as u32,
recv_buf: UDP_RECV_PAYLOAD_LEN as u32,
2025-06-11 07:03:05 +00:00
..Default::default()
}
}
/// Returns the default socket level options for unix stream socket.
pub(in crate::net) fn new_unix_stream() -> Self {
Self {
send_buf: UNIX_STREAM_DEFAULT_BUF_SIZE as u32,
recv_buf: UNIX_STREAM_DEFAULT_BUF_SIZE as u32,
2025-06-11 07:03:05 +00:00
..Default::default()
}
}
/// Gets socket-level options.
///
/// Note that the socket error has to be handled separately, because it is automatically
/// cleared after reading. This method does not handle it. Instead,
/// [`Self::get_and_clear_socket_errors`] should be used.
2025-06-11 07:20:57 +00:00
pub fn get_option(
&self,
option: &mut dyn SocketOption,
socket: &dyn GetSocketLevelOption,
) -> Result<()> {
match_sock_option_mut!(option, {
socket_reuse_addr: ReuseAddr => {
let reuse_addr = self.reuse_addr();
socket_reuse_addr.set(reuse_addr);
},
socket_send_buf: SendBuf => {
let send_buf = self.send_buf();
socket_send_buf.set(send_buf);
},
socket_recv_buf: RecvBuf => {
let recv_buf = self.recv_buf();
socket_recv_buf.set(recv_buf);
},
socket_reuse_port: ReusePort => {
let reuse_port = self.reuse_port();
socket_reuse_port.set(reuse_port);
},
socket_linger: Linger => {
let linger = self.linger();
socket_linger.set(linger);
},
2025-06-11 07:03:05 +00:00
socket_priority: Priority => {
let priority = self.priority();
socket_priority.set(priority);
},
socket_keepalive: KeepAlive => {
let keep_alive = self.keep_alive();
socket_keepalive.set(keep_alive);
},
socket_pass_cred: PassCred => {
// This option only affects UNIX sockets. However, it also works well with other
// sockets for setting and getting.
let pass_cred = self.pass_cred();
socket_pass_cred.set(pass_cred);
},
2025-06-11 08:28:05 +00:00
socket_peer_cred: PeerCred => {
2025-06-25 15:55:39 +00:00
let peer_cred = CUserCred::new_invalid();
2025-06-11 08:28:05 +00:00
socket_peer_cred.set(peer_cred);
},
2025-06-11 07:20:57 +00:00
socket_accept_conn: AcceptConn => {
let is_listening = socket.is_listening();
socket_accept_conn.set(is_listening);
},
socket_sendbuf_force: SendBufForce => {
check_current_privileged()?;
let send_buf = self.send_buf();
socket_sendbuf_force.set(send_buf);
},
socket_recvbuf_force: RecvBufForce => {
check_current_privileged()?;
let recv_buf = self.recv_buf();
socket_recvbuf_force.set(recv_buf);
},
2025-06-11 08:28:05 +00:00
_socket_peer_groups: PeerGroups => {
return_errno_with_message!(Errno::ENODATA, "the socket does not have peer groups");
},
_ => return_errno_with_message!(Errno::ENOPROTOOPT, "the socket option to get is unknown")
});
Ok(())
}
/// Sets socket-level options.
pub fn set_option(
&mut self,
option: &dyn SocketOption,
2025-04-20 08:43:38 +00:00
socket: &dyn SetSocketLevelOption,
) -> Result<NeedIfacePoll> {
match_sock_option_ref!(option, {
socket_send_buf: SendBuf => {
let send_buf = socket_send_buf.get().unwrap();
if *send_buf <= MIN_SENDBUF {
self.set_send_buf(MIN_SENDBUF);
} else {
self.set_send_buf(*send_buf);
}
},
socket_recv_buf: RecvBuf => {
let recv_buf = socket_recv_buf.get().unwrap();
if *recv_buf <= MIN_RECVBUF {
self.set_recv_buf(MIN_RECVBUF);
} else {
self.set_recv_buf(*recv_buf);
}
},
socket_reuse_addr: ReuseAddr => {
let reuse_addr = socket_reuse_addr.get().unwrap();
self.set_reuse_addr(*reuse_addr);
2025-07-23 08:28:40 +00:00
socket.set_reuse_addr(*reuse_addr);
},
socket_reuse_port: ReusePort => {
let reuse_port = socket_reuse_port.get().unwrap();
self.set_reuse_port(*reuse_port);
},
2025-06-11 07:03:05 +00:00
socket_priority: Priority => {
let priority = socket_priority.get().unwrap();
check_priority(*priority)?;
self.set_priority(*priority);
},
socket_linger: Linger => {
let linger = socket_linger.get().unwrap();
self.set_linger(*linger);
},
socket_keepalive: KeepAlive => {
let keep_alive = socket_keepalive.get().unwrap();
self.set_keep_alive(*keep_alive);
return Ok(socket.set_keep_alive(*keep_alive));
},
socket_pass_cred: PassCred => {
// This option only affects UNIX sockets. However, it also works well with other
// sockets for setting and getting.
let pass_cred = socket_pass_cred.get().unwrap();
self.set_pass_cred(*pass_cred);
2025-06-25 15:55:39 +00:00
socket.set_pass_cred(*pass_cred);
},
socket_sendbuf_force: SendBufForce => {
check_current_privileged()?;
let send_buf = socket_sendbuf_force.get().unwrap();
if *send_buf <= MIN_SENDBUF {
self.set_send_buf(MIN_SENDBUF);
} else {
self.set_send_buf(*send_buf);
}
},
socket_recvbuf_force: RecvBufForce => {
check_current_privileged()?;
let recv_buf = socket_recvbuf_force.get().unwrap();
if *recv_buf <= MIN_RECVBUF {
self.set_recv_buf(MIN_RECVBUF);
} else {
self.set_recv_buf(*recv_buf);
}
},
_ => return_errno_with_message!(Errno::ENOPROTOOPT, "the socket option to be set is unknown")
});
Ok(NeedIfacePoll::FALSE)
}
2023-12-28 09:24:23 +00:00
}
fn check_current_privileged() -> Result<()> {
let credentials = {
let current = current_thread!();
let posix_thread = current.as_posix_thread().unwrap();
posix_thread.credentials()
};
if credentials.euid().is_root() || credentials.effective_capset().contains(CapSet::NET_ADMIN) {
return Ok(());
}
return_errno_with_message!(Errno::EPERM, "the process does not have permissions")
}
2025-06-11 07:03:05 +00:00
fn check_priority(priority: i32) -> Result<()> {
const NORMAL_PRIORITY_RANGE: RangeInclusive<i32> = 0..=6;
if NORMAL_PRIORITY_RANGE.contains(&priority) {
return Ok(());
}
check_current_privileged()
}
2023-12-28 09:24:23 +00:00
pub const MIN_SENDBUF: u32 = 2304;
pub const MIN_RECVBUF: u32 = 2304;
2025-06-11 07:20:57 +00:00
/// A trait used for getting socket level options on actual sockets.
pub(in crate::net) trait GetSocketLevelOption {
/// Returns whether the socket is in listening state.
fn is_listening(&self) -> bool;
}
/// A trait used for setting socket level options on actual sockets.
pub(in crate::net) trait SetSocketLevelOption {
2025-07-23 08:28:40 +00:00
/// Sets whether the socket address can be reused.
fn set_reuse_addr(&self, _reuse_addr: bool) {}
/// Sets whether keepalive messages are enabled.
2024-12-02 15:11:43 +00:00
fn set_keep_alive(&self, _keep_alive: bool) -> NeedIfacePoll {
NeedIfacePoll::FALSE
}
2025-06-25 15:55:39 +00:00
/// Sets whether receipt of the credentials of the sending process is enabled.
fn set_pass_cred(&self, _pass_cred: bool) {}
}