Added Node.js support

This commit is contained in:
Joseph Henry 2015-10-21 16:27:17 -07:00
parent 8b03965912
commit 303579cb42
6 changed files with 106 additions and 125 deletions

View File

@ -33,6 +33,9 @@
/* Name used in err msgs */ /* Name used in err msgs */
char *progname = ""; char *progname = "";
#include <unistd.h>
#include <stdint.h>
#include <pthread.h>
#include <stdio.h> #include <stdio.h>
#include <dlfcn.h> #include <dlfcn.h>
#include <strings.h> #include <strings.h>
@ -44,39 +47,18 @@ char *progname = "";
#include <netdb.h> #include <netdb.h>
#include <string.h> #include <string.h>
#include <stdlib.h> #include <stdlib.h>
#include <netinet/in.h>
#include <net/if.h>
#include <sys/syscall.h> #include <sys/syscall.h>
#include <sys/types.h> #include <sys/types.h>
#include <sys/socket.h> #include <sys/socket.h>
#include <sys/un.h> #include <sys/un.h>
#include <arpa/inet.h> #include <arpa/inet.h>
#include <poll.h>
#include <pthread.h>
#include <unistd.h>
/* For NPs */
#include <sys/stat.h>
#include <sys/ipc.h>
#include <sys/shm.h>
/* for mmap */
#include <sys/mman.h>
#ifdef USE_SOCKS_DNS
#include <resolv.h>
#endif
#include "Intercept.h" #include "Intercept.h"
#include "Common.h" #include "Common.h"
#ifdef CHECKS #ifdef CHECKS
//#include <sys/time.h>
#include <sys/resource.h> #include <sys/resource.h>
#include <linux/net.h> /* for NPROTO */ #include <linux/net.h> /* for NPROTO */
#define SOCK_MAX (SOCK_PACKET + 1) #define SOCK_MAX (SOCK_PACKET + 1)
#define SOCK_TYPE_MASK 0xf #define SOCK_TYPE_MASK 0xf
#endif #endif
@ -87,7 +69,6 @@ static int (*realresinit)(void);
#endif #endif
static int (*realconnect)(CONNECT_SIG); static int (*realconnect)(CONNECT_SIG);
static int (*realselect)(SELECT_SIG); static int (*realselect)(SELECT_SIG);
static int (*realpoll)(POLL_SIG);
static int (*realbind)(BIND_SIG); static int (*realbind)(BIND_SIG);
static int (*realaccept)(ACCEPT_SIG); static int (*realaccept)(ACCEPT_SIG);
static int (*reallisten)(LISTEN_SIG); static int (*reallisten)(LISTEN_SIG);
@ -95,12 +76,12 @@ static int (*realsocket)(SOCKET_SIG);
static int (*realsetsockopt)(SETSOCKOPT_SIG); static int (*realsetsockopt)(SETSOCKOPT_SIG);
static int (*realgetsockopt)(GETSOCKOPT_SIG); static int (*realgetsockopt)(GETSOCKOPT_SIG);
static int (*realaccept4)(ACCEPT4_SIG); static int (*realaccept4)(ACCEPT4_SIG);
static long (*realsyscall)(SYSCALL_SIG);
/* Exported Function Prototypes */ /* Exported Function Prototypes */
void my_init(void); void my_init(void);
int connect(CONNECT_SIG); int connect(CONNECT_SIG);
int select(SELECT_SIG); int select(SELECT_SIG);
int poll(POLL_SIG);
int close(CLOSE_SIG); int close(CLOSE_SIG);
int bind(BIND_SIG); int bind(BIND_SIG);
int accept(ACCEPT_SIG); int accept(ACCEPT_SIG);
@ -109,6 +90,7 @@ int socket(SOCKET_SIG);
int setsockopt(SETSOCKOPT_SIG); int setsockopt(SETSOCKOPT_SIG);
int getsockopt(GETSOCKOPT_SIG); int getsockopt(GETSOCKOPT_SIG);
int accept4(ACCEPT4_SIG); int accept4(ACCEPT4_SIG);
long syscall(SYSCALL_SIG);
#ifdef USE_SOCKS_DNS #ifdef USE_SOCKS_DNS
int res_init(void); int res_init(void);
@ -121,7 +103,6 @@ void load_symbols(void);
void set_up_intercept(); void set_up_intercept();
int checkpid(); int checkpid();
#define BUF_SZ 32 #define BUF_SZ 32
#define SERVICE_CONNECT_ATTEMPTS 30 #define SERVICE_CONNECT_ATTEMPTS 30
#define ERR_OK 0 #define ERR_OK 0
@ -197,8 +178,7 @@ int get_retval()
/* Sets up the connection pipes and sockets to the service */ /* Sets up the connection pipes and sockets to the service */
int init_service_connection() int init_service_connection()
{ {
if(!is_initialized) if(!is_initialized) {
{
struct sockaddr_un addr; struct sockaddr_un addr;
int tfd = -1, attempts = 0, conn_err = -1; int tfd = -1, attempts = 0, conn_err = -1;
memset(&addr, 0, sizeof(addr)); memset(&addr, 0, sizeof(addr));
@ -209,11 +189,8 @@ int init_service_connection()
perror("socket error"); perror("socket error");
exit(-1); exit(-1);
} }
while(conn_err < 0 && attempts < SERVICE_CONNECT_ATTEMPTS) while(conn_err < 0 && attempts < SERVICE_CONNECT_ATTEMPTS) {
{
//dwr("trying connection (%d): %s\n", tfd, af_sock_name);
conn_err = realconnect(tfd, (struct sockaddr*)&addr, sizeof(addr)); conn_err = realconnect(tfd, (struct sockaddr*)&addr, sizeof(addr));
if(conn_err < 0) { if(conn_err < 0) {
dwr("re-attempting connection in %ds\n", 1+attempts); dwr("re-attempting connection in %ds\n", 1+attempts);
sleep(1); sleep(1);
@ -235,13 +212,11 @@ int init_service_connection()
void my_dest(void) __attribute__ ((destructor)); void my_dest(void) __attribute__ ((destructor));
void my_dest(void) { void my_dest(void) {
//dwr("closing connections to service...\n");
dwr("closing connections to service...\n");
close(fdret_sock); close(fdret_sock);
pthread_mutex_destroy(&lock); pthread_mutex_destroy(&lock);
} }
void load_symbols(void) void load_symbols(void)
{ {
#ifdef USE_OLD_DLSYM #ifdef USE_OLD_DLSYM
@ -262,11 +237,12 @@ void load_symbols(void)
reallisten = dlsym(RTLD_NEXT, "listen"); reallisten = dlsym(RTLD_NEXT, "listen");
realsocket = dlsym(RTLD_NEXT, "socket"); realsocket = dlsym(RTLD_NEXT, "socket");
realbind = dlsym(RTLD_NEXT, "bind"); realbind = dlsym(RTLD_NEXT, "bind");
realpoll = dlsym(RTLD_NEXT, "poll");
realselect = dlsym(RTLD_NEXT, "select"); realselect = dlsym(RTLD_NEXT, "select");
realsetsockopt = dlsym(RTLD_NEXT, "setsockopt"); realsetsockopt = dlsym(RTLD_NEXT, "setsockopt");
realgetsockopt = dlsym(RTLD_NEXT, "getsockopt"); realgetsockopt = dlsym(RTLD_NEXT, "getsockopt");
realaccept4 = dlsym(RTLD_NEXT, "accept4"); realaccept4 = dlsym(RTLD_NEXT, "accept4");
//realclone = dlsym(RTLD_NEXT, "clone");
realsyscall = dlsym(RTLD_NEXT, "syscall");
#ifdef USE_SOCKS_DNS #ifdef USE_SOCKS_DNS
realresinit = dlsym(RTLD_NEXT, "res_init"); realresinit = dlsym(RTLD_NEXT, "res_init");
#endif #endif
@ -278,11 +254,12 @@ void load_symbols(void)
realaccept = dlsym(lib, "accept"); realaccept = dlsym(lib, "accept");
reallisten = dlsym(lib, "listen"); reallisten = dlsym(lib, "listen");
realsocket = dlsym(lib, "socket"); realsocket = dlsym(lib, "socket");
realpoll = dlsym(lib, "poll");
realselect = dlsym(lib, "select"); realselect = dlsym(lib, "select");
realsetsockopt = dlsym(lib, "setsockopt"); realsetsockopt = dlsym(lib, "setsockopt");
realgetsockopt = dlsym(lib, "getsockopt"); realgetsockopt = dlsym(lib, "getsockopt");
realaccept4 = dlsym(lib), "accept4"); realaccept4 = dlsym(lib), "accept4");
//realclone = dlsym(lib, "clone");
realsyscall = dlsym(lib, "syscall");
#ifdef USE_SOCKS_DNS #ifdef USE_SOCKS_DNS
realresinit = dlsym(lib, "res_init"); realresinit = dlsym(lib, "res_init");
#endif #endif
@ -317,6 +294,9 @@ void set_up_intercept()
/* int socket, int level, int option_name, const void *option_value, socklen_t option_len */ /* int socket, int level, int option_name, const void *option_value, socklen_t option_len */
int setsockopt(SETSOCKOPT_SIG) int setsockopt(SETSOCKOPT_SIG)
{ {
if(level == IPPROTO_TCP || (level == SOL_SOCKET && option_name == SO_KEEPALIVE)){
return 0;
}
/* make sure we don't touch any standard outputs */ /* make sure we don't touch any standard outputs */
if(socket == STDIN_FILENO || socket == STDOUT_FILENO || socket == STDERR_FILENO) if(socket == STDIN_FILENO || socket == STDOUT_FILENO || socket == STDERR_FILENO)
return(realsetsockopt(socket, level, option_name, option_value, option_len)); return(realsetsockopt(socket, level, option_name, option_value, option_len));
@ -362,6 +342,7 @@ int getsockopt(GETSOCKOPT_SIG)
int socket(SOCKET_SIG) int socket(SOCKET_SIG)
{ {
//dwr("socket()*:\n");
int err; int err;
#ifdef CHECKS #ifdef CHECKS
/* Check that type makes sense */ /* Check that type makes sense */
@ -401,7 +382,7 @@ int socket(SOCKET_SIG)
return realsocket(socket_family, socket_type, protocol); return realsocket(socket_family, socket_type, protocol);
} }
/* Assemble and route command */ /* Assemble and send RPC */
struct socket_st rpc_st; struct socket_st rpc_st;
rpc_st.socket_family = socket_family; rpc_st.socket_family = socket_family;
rpc_st.socket_type = socket_type; rpc_st.socket_type = socket_type;
@ -453,6 +434,7 @@ int socket(SOCKET_SIG)
connect() intercept function */ connect() intercept function */
int connect(CONNECT_SIG) int connect(CONNECT_SIG)
{ {
//dwr("connect()*:\n");
struct sockaddr_in *connaddr; struct sockaddr_in *connaddr;
connaddr = (struct sockaddr_in *) __addr; connaddr = (struct sockaddr_in *) __addr;
@ -494,13 +476,7 @@ int connect(CONNECT_SIG)
return err; return err;
} }
//int flags = fcntl(__fd, F_GETFD); /* Assemble and send RPC */
//dwr("connect(): socket flags = %d\n", flags);
//if(sock_type && O_NONBLOCK) {
// dwr("connect(): O_NONBLOCK\n");
//}
/* assemble and route command */
int err; int err;
char cmd[BUF_SZ]; char cmd[BUF_SZ];
memset(cmd, '\0', BUF_SZ); memset(cmd, '\0', BUF_SZ);
@ -513,10 +489,12 @@ int connect(CONNECT_SIG)
memcpy(&cmd[1], &rpc_st, sizeof(struct connect_st)); memcpy(&cmd[1], &rpc_st, sizeof(struct connect_st));
pthread_mutex_lock(&lock); pthread_mutex_lock(&lock);
send_command(fdret_sock, cmd); send_command(fdret_sock, cmd);
/*
if(sock_type && O_NONBLOCK) { if(sock_type && O_NONBLOCK) {
//pthread_mutex_unlock(&lock); //pthread_mutex_unlock(&lock);
//return EINPROGRESS; //return EINPROGRESS;
} }
*/
err = get_retval(); err = get_retval();
pthread_mutex_unlock(&lock); pthread_mutex_unlock(&lock);
return err; return err;
@ -530,19 +508,10 @@ int connect(CONNECT_SIG)
fd_set *exceptfds, struct timeval *timeout */ fd_set *exceptfds, struct timeval *timeout */
int select(SELECT_SIG) int select(SELECT_SIG)
{ {
//dwr("select()*:\n");
return realselect(n, readfds, writefds, exceptfds, timeout); return realselect(n, readfds, writefds, exceptfds, timeout);
} }
/*------------------------------------------------------------------------------
----------------------------------- poll() -------------------------------------
------------------------------------------------------------------------------*/
/* struct pollfd *__fds, nfds_t __nfds, int __timeout */
int poll(POLL_SIG)
{
return realpoll(__fds, __nfds, __timeout);
}
/*------------------------------------------------------------------------------ /*------------------------------------------------------------------------------
------------------------------------ bind() ------------------------------------ ------------------------------------ bind() ------------------------------------
------------------------------------------------------------------------------*/ ------------------------------------------------------------------------------*/
@ -551,6 +520,7 @@ int poll(POLL_SIG)
bind() intercept function */ bind() intercept function */
int bind(BIND_SIG) int bind(BIND_SIG)
{ {
//dwr("bind()*:\n");
#ifdef CHECKS #ifdef CHECKS
/* Check that this is a valid fd */ /* Check that this is a valid fd */
if(fcntl(sockfd, F_GETFD) < 0) { if(fcntl(sockfd, F_GETFD) < 0) {
@ -558,9 +528,9 @@ int bind(BIND_SIG)
errno = EBADF; errno = EBADF;
} }
/* Check that it is a socket */ /* Check that it is a socket */
int sock_type = -1; int opt = -1;
socklen_t sock_type_len = sizeof(sock_type); socklen_t opt_len;
if(getsockopt(sockfd, SOL_SOCKET, SO_TYPE, (void *) &sock_type, &sock_type_len) < 0) { if(getsockopt(sockfd, SOL_SOCKET, SO_TYPE, (void *) &opt, &opt_len) < 0) {
errno = ENOTSOCK; errno = ENOTSOCK;
return -1; return -1;
} }
@ -586,7 +556,7 @@ int bind(BIND_SIG)
} }
return(realbind(sockfd, addr, addrlen)); return(realbind(sockfd, addr, addrlen));
} }
/* Assemble and route command */ /* Assemble and send RPC */
char cmd[BUF_SZ]; char cmd[BUF_SZ];
struct bind_st rpc_st; struct bind_st rpc_st;
rpc_st.sockfd = sockfd; rpc_st.sockfd = sockfd;
@ -612,13 +582,21 @@ int bind(BIND_SIG)
/* int sockfd, struct sockaddr *addr, socklen_t *addrlen, int flags */ /* int sockfd, struct sockaddr *addr, socklen_t *addrlen, int flags */
int accept4(ACCEPT4_SIG) int accept4(ACCEPT4_SIG)
{ {
//dwr("accept4()*:\n");
#ifdef CHECKS #ifdef CHECKS
if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) { if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) {
errno = EINVAL; errno = EINVAL;
return -1; return -1;
} }
#endif #endif
return accept(sockfd, addr, addrlen); int newfd = accept(sockfd, addr, addrlen);
if(newfd > 0) {
if(flags & SOCK_CLOEXEC)
fcntl(newfd, F_SETFL, FD_CLOEXEC);
if(flags & SOCK_NONBLOCK)
fcntl(newfd, F_SETFL, O_NONBLOCK);
}
return newfd;
} }
@ -630,6 +608,7 @@ int accept4(ACCEPT4_SIG)
accept() intercept function */ accept() intercept function */
int accept(ACCEPT_SIG) int accept(ACCEPT_SIG)
{ {
//dwr("accept()*:\n");
#ifdef CHECKS #ifdef CHECKS
/* Check that this is a valid fd */ /* Check that this is a valid fd */
if(fcntl(sockfd, F_GETFD) < 0) { if(fcntl(sockfd, F_GETFD) < 0) {
@ -637,14 +616,14 @@ int accept(ACCEPT_SIG)
errno = EBADF; errno = EBADF;
} }
/* Check that it is a socket */ /* Check that it is a socket */
int sock_type; int opt;
socklen_t sock_type_len = sizeof(sock_type); socklen_t opt_len;
if(getsockopt(sockfd, SOL_SOCKET, SO_TYPE, (void *) &sock_type, &sock_type_len) < 0) { if(getsockopt(sockfd, SOL_SOCKET, SO_TYPE, (void *) &opt, &opt_len) < 0) {
errno = ENOTSOCK; errno = ENOTSOCK;
return -1; return -1;
} }
/* Check that this socket supports accept() */ /* Check that this socket supports accept() */
if(!(sock_type && (SOCK_STREAM | SOCK_SEQPACKET))) { if(!(opt && (SOCK_STREAM | SOCK_SEQPACKET))) {
errno = EOPNOTSUPP; errno = EOPNOTSUPP;
return -1; return -1;
} }
@ -662,12 +641,13 @@ int accept(ACCEPT_SIG)
} }
#endif #endif
/* make sure we don't touch any standard outputs */ /* redirect calls for standard I/O descriptors to kernel */
if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO) if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO)
return(realaccept(sockfd, addr, addrlen)); return(realaccept(sockfd, addr, addrlen));
addr->sa_family = AF_INET; if(addr)
/* TODO: also get address info */ addr->sa_family = AF_INET;
/* TODO: also get address info */
char cmd[BUF_SZ]; char cmd[BUF_SZ];
if(realaccept == NULL) { if(realaccept == NULL) {
@ -675,6 +655,9 @@ int accept(ACCEPT_SIG)
return -1; return -1;
} }
//if(opt & O_NONBLOCK)
//fcntl(sockfd, F_SETFL, O_NONBLOCK);
char rbuf[16], c[1]; char rbuf[16], c[1];
int new_conn_socket; int new_conn_socket;
int n = read(sockfd, c, sizeof(c)); // Read signal byte int n = read(sockfd, c, sizeof(c)); // Read signal byte
@ -694,7 +677,8 @@ int accept(ACCEPT_SIG)
return -1; return -1;
} }
pthread_mutex_unlock(&lock); pthread_mutex_unlock(&lock);
//errno = ERR_OK; errno = ERR_OK;
dwr("accepting for %d\n", new_conn_socket);
return new_conn_socket; // OK return new_conn_socket; // OK
} }
else { else {
@ -704,9 +688,8 @@ int accept(ACCEPT_SIG)
} }
} }
dwr("Error reading signal byte from service.\n"); dwr("Error reading signal byte from service.\n");
//errno = EWOULDBLOCK; errno = EAGAIN; /* necessary? */
errno = ECONNABORTED; // FIXME: Closest match, service unreachable return -EAGAIN;
return -1;
} }
@ -718,6 +701,7 @@ int accept(ACCEPT_SIG)
listen() intercept function */ listen() intercept function */
int listen(LISTEN_SIG) int listen(LISTEN_SIG)
{ {
//dwr("listen()*:\n");
#ifdef CHECKS #ifdef CHECKS
/* Check that this is a valid fd */ /* Check that this is a valid fd */
if(fcntl(sockfd, F_GETFD) < 0) { if(fcntl(sockfd, F_GETFD) < 0) {
@ -738,14 +722,12 @@ int listen(LISTEN_SIG)
} }
#endif #endif
int err;
/* make sure we don't touch any standard outputs */ /* make sure we don't touch any standard outputs */
if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO) if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO)
return(reallisten(sockfd, backlog)); return(reallisten(sockfd, backlog));
/* Assemble and send RPC */
char cmd[BUF_SZ]; char cmd[BUF_SZ];
/* Assemble and route command */
memset(cmd, '\0', BUF_SZ); memset(cmd, '\0', BUF_SZ);
struct listen_st rpc_st; struct listen_st rpc_st;
rpc_st.sockfd = sockfd; rpc_st.sockfd = sockfd;
@ -757,6 +739,41 @@ int listen(LISTEN_SIG)
send_command(fdret_sock, cmd); send_command(fdret_sock, cmd);
//err = get_retval(); //err = get_retval();
pthread_mutex_unlock(&lock); pthread_mutex_unlock(&lock);
//errno = ERR_OK;
return ERR_OK; return ERR_OK;
} }
/*------------------------------------------------------------------------------
------------------------------------ syscall()----------------------------------
------------------------------------------------------------------------------*/
long syscall(SYSCALL_SIG)
{
va_list ap;
uintptr_t a,b,c,d,e,f;
va_start(ap, number);
a=va_arg(ap, uintptr_t);
b=va_arg(ap, uintptr_t);
c=va_arg(ap, uintptr_t);
d=va_arg(ap, uintptr_t);
e=va_arg(ap, uintptr_t);
f=va_arg(ap, uintptr_t);
va_end(ap);
#if defined(__i386__)
/* TODO: Implement for 32-bit systems: syscall(__NR_socketcall, 18, args);
args[0] = (unsigned long) fd;
args[1] = (unsigned long) addr;
args[2] = (unsigned long) addrlen;
args[3] = (unsigned long) flags;
*/
#else
if(number == __NR_accept4) {
int sockfd = a;
struct sockaddr * addr = (struct sockaddr*)b;
socklen_t * addrlen = (socklen_t*)c;
int flags = d;
return accept4(sockfd, addr, addrlen, flags);
}
#endif
return realsyscall(number,a,b,c,d,e,f);
}

View File

@ -165,58 +165,11 @@ struct shutdown_st
#define CONNECT_SOCKARG struct sockaddr * #define CONNECT_SOCKARG struct sockaddr *
#define SELECT_SIG int n, fd_set *readfds, fd_set *writefds, fd_set *exceptfds, struct timeval *timeout #define SELECT_SIG int n, fd_set *readfds, fd_set *writefds, fd_set *exceptfds, struct timeval *timeout
#define POLL_SIG struct pollfd *__fds, nfds_t __nfds, int __timeout
#define IOCTL_SIG int __fd, unsigned long int __request, ... #define IOCTL_SIG int __fd, unsigned long int __request, ...
#define FCNTL_SIG int __fd, int __cmd, ... #define FCNTL_SIG int __fd, int __cmd, ...
#define CLONE_SIG int (*fn) (void *arg), void *child_stack, int flags, void *arg
#define DAEMON_SIG int nochdir, int noclose #define DAEMON_SIG int nochdir, int noclose
#define SETSOCKOPT_SIG int socket, int level, int option_name, const void *option_value, socklen_t option_len #define SETSOCKOPT_SIG int socket, int level, int option_name, const void *option_value, socklen_t option_len
#define GETSOCKOPT_SIG int sockfd, int level, int optname, void *optval, socklen_t *optlen #define GETSOCKOPT_SIG int sockfd, int level, int optname, void *optval, socklen_t *optlen
#define SYSCALL_SIG long number, ...
/* LWIP error beautification */
/*
const char *lwiperror(int n)
{
switch(n)
{
case 0:
return "ERR_OK";
case -1:
return "ERR_MEM (out of memory)";
case -2:
return "ERR_BUF (buffer error)";
case -3:
return "ERR_TIMEOUT (timeout)";
case -4:
return "ERR_RTE (routing problem)";
case -5:
return "ERR_INPROGRESS (operation in progress)";
case -6:
return "ERR_VAL (illegal value)";
case -7:
return "ERR_WOULDBLOCK (operation would block)";
case -8:
return "ERR_USE (address in use)";
case -9:
return "ERR_ISCONN (already connected)";
case -10:
return "Fatal: ERR_ABRT (connection aborted)";
case -11:
return "Fatal: ERR_RST (connection reset)";
case -12:
return "Fatal: ERR_CLSD (connection closed)";
case -13:
return "Fatal: ERR_CONN (not connected)";
case -14:
return "Fatal: ERR_ARG (illegal argument)";
case -15:
return "Fatal: ERR_IF (low level netif error)";
default:
return "UNKNOWN_RET_VAL";
}
}
*/
#endif #endif

View File

@ -547,7 +547,7 @@ err_t NetconEthernetTap::nc_accept(void *arg, struct tcp_pcb *newpcb, err_t err)
if(socketpair(PF_LOCAL, SOCK_STREAM, 0, fds) < 0) { if(socketpair(PF_LOCAL, SOCK_STREAM, 0, fds) < 0) {
if(errno < 0) { if(errno < 0) {
l->tap->send_return_value(conn, -1, errno); l->tap->send_return_value(conn, -1, errno);
//fprintf(stderr, "**************\n"); fprintf(stderr, "nc_accept(): unable to create socketpair\n");
return ERR_MEM; return ERR_MEM;
} }
} }
@ -857,7 +857,6 @@ void NetconEthernetTap::handle_bind(PhySocket *sock, void **uptr, struct bind_st
int conn_port = lwipstack->ntohs(connaddr->sin_port); int conn_port = lwipstack->ntohs(connaddr->sin_port);
ip_addr_t conn_addr; ip_addr_t conn_addr;
conn_addr.addr = *((u32_t *)_ips[0].rawIpData()); conn_addr.addr = *((u32_t *)_ips[0].rawIpData());
TcpConnection *conn = getConnectionByTheirFD(sock, bind_rpc->sockfd); TcpConnection *conn = getConnectionByTheirFD(sock, bind_rpc->sockfd);
if(conn) { if(conn) {
@ -878,9 +877,8 @@ void NetconEthernetTap::handle_bind(PhySocket *sock, void **uptr, struct bind_st
if(err == ERR_BUF) if(err == ERR_BUF)
send_return_value(conn, -1, ENOMEM); // FIXME: Closest match send_return_value(conn, -1, ENOMEM); // FIXME: Closest match
} }
else { else
send_return_value(conn, ERR_OK, ERR_OK); // Success send_return_value(conn, ERR_OK, ERR_OK); // Success
}
} }
else { else {
fprintf(stderr, "handle_bind(): PCB not in CLOSED state. Ignoring BIND request.\n"); fprintf(stderr, "handle_bind(): PCB not in CLOSED state. Ignoring BIND request.\n");

13
netcon/README.md Normal file
View File

@ -0,0 +1,13 @@
20151021 Added Node.js support
Notes:
- syscall(long number, ...) is now intercepted and re-directs the __NR_accept4 call to our intercepted accept4() function
- accept() now returns -EAGAIN in the case that we cannot read a signal byte from the descriptor linked to the service. This
is because the uv__server_io() function in libuv used by Node.js looks for this return value upon failure, without it we
were observing an innfinite loop in the I/O polling code in libuv.
- accept4() now correctly sets given flags for descriptor returned by accept()
- setsockopt() was modified to return success on any call with the following conditions:
level == IPPROTO_TCP || (level == SOL_SOCKET && option_name == SO_KEEPALIVE)
This might be unnecessary or might need a better workaround
- Careful attention should be given to how arguments are passed in the intercepted syscall() function, this differs for
32/64-bit systems

Binary file not shown.

Binary file not shown.