2 * Server-side socket management
4 * Copyright (C) 1999 Marcus Meissner, Ove Kåven
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * FIXME: we use read|write access in all cases. Shouldn't we depend that
21 * on the access of the current handle?
33 #ifdef HAVE_NETINET_IN_H
34 # include <netinet/in.h>
40 #include <sys/types.h>
41 #ifdef HAVE_SYS_SOCKET_H
42 # include <sys/socket.h>
44 #ifdef HAVE_SYS_IOCTL_H
45 #include <sys/ioctl.h>
47 #ifdef HAVE_SYS_FILIO_H
48 # include <sys/filio.h>
53 #ifdef HAVE_LINUX_RTNETLINK_H
54 # include <linux/rtnetlink.h>
57 #ifdef HAVE_NETIPX_IPX_H
58 # include <netipx/ipx.h>
59 #elif defined(HAVE_LINUX_IPX_H)
60 # ifdef HAVE_ASM_TYPES_H
61 # include <asm/types.h>
63 # ifdef HAVE_LINUX_TYPES_H
64 # include <linux/types.h>
66 # include <linux/ipx.h>
68 #if defined(SOL_IPX) || defined(SO_DEFAULT_HEADERS)
72 #ifdef HAVE_LINUX_IRDA_H
73 # ifdef HAVE_LINUX_TYPES_H
74 # include <linux/types.h>
76 # include <linux/irda.h>
81 #define WIN32_NO_STATUS
104 struct sock
*sock
, *acceptsock
;
106 unsigned int recv_len
, local_len
;
111 struct object obj
; /* object header */
112 struct fd
*fd
; /* socket file descriptor */
113 unsigned int state
; /* status bits */
114 unsigned int mask
; /* event mask */
115 unsigned int hmask
; /* held (blocked) events */
116 unsigned int pmask
; /* pending events */
117 unsigned int flags
; /* socket flags */
118 int polling
; /* is socket being polled? */
119 unsigned short proto
; /* socket protocol */
120 unsigned short type
; /* socket type */
121 unsigned short family
; /* socket family */
122 struct event
*event
; /* event object */
123 user_handle_t window
; /* window to send the message to */
124 unsigned int message
; /* message to send */
125 obj_handle_t wparam
; /* message wparam (socket handle) */
126 unsigned int errors
[FD_MAX_EVENTS
]; /* event errors */
127 timeout_t connect_time
;/* time the socket was connected */
128 struct sock
*deferred
; /* socket that waits for a deferred accept */
129 struct async_queue read_q
; /* queue for asynchronous reads */
130 struct async_queue write_q
; /* queue for asynchronous writes */
131 struct async_queue ifchange_q
; /* queue for interface change notifications */
132 struct async_queue accept_q
; /* queue for asynchronous accepts */
133 struct object
*ifchange_obj
; /* the interface change notification object */
134 struct list ifchange_entry
; /* entry in ifchange notification list */
135 struct list accept_list
; /* list of pending accept requests */
136 struct accept_req
*accept_recv_req
; /* pending accept-into request which will recv on this socket */
139 static void sock_dump( struct object
*obj
, int verbose
);
140 static struct fd
*sock_get_fd( struct object
*obj
);
141 static int sock_close_handle( struct object
*obj
, struct process
*process
, obj_handle_t handle
);
142 static void sock_destroy( struct object
*obj
);
143 static struct object
*sock_get_ifchange( struct sock
*sock
);
144 static void sock_release_ifchange( struct sock
*sock
);
146 static int sock_get_poll_events( struct fd
*fd
);
147 static void sock_poll_event( struct fd
*fd
, int event
);
148 static enum server_fd_type
sock_get_fd_type( struct fd
*fd
);
149 static int sock_ioctl( struct fd
*fd
, ioctl_code_t code
, struct async
*async
);
150 static void sock_queue_async( struct fd
*fd
, struct async
*async
, int type
, int count
);
151 static void sock_reselect_async( struct fd
*fd
, struct async_queue
*queue
);
153 static int accept_into_socket( struct sock
*sock
, struct sock
*acceptsock
);
154 static struct sock
*accept_socket( struct sock
*sock
);
155 static int sock_get_ntstatus( int err
);
156 static unsigned int sock_get_error( int err
);
158 static const struct object_ops sock_ops
=
160 sizeof(struct sock
), /* size */
161 &file_type
, /* type */
162 sock_dump
, /* dump */
163 add_queue
, /* add_queue */
164 remove_queue
, /* remove_queue */
165 default_fd_signaled
, /* signaled */
166 no_satisfied
, /* satisfied */
167 no_signal
, /* signal */
168 sock_get_fd
, /* get_fd */
169 default_map_access
, /* map_access */
170 default_get_sd
, /* get_sd */
171 default_set_sd
, /* set_sd */
172 no_get_full_name
, /* get_full_name */
173 no_lookup_name
, /* lookup_name */
174 no_link_name
, /* link_name */
175 NULL
, /* unlink_name */
176 no_open_file
, /* open_file */
177 no_kernel_obj_list
, /* get_kernel_obj_list */
178 sock_close_handle
, /* close_handle */
179 sock_destroy
/* destroy */
182 static const struct fd_ops sock_fd_ops
=
184 sock_get_poll_events
, /* get_poll_events */
185 sock_poll_event
, /* poll_event */
186 sock_get_fd_type
, /* get_fd_type */
187 no_fd_read
, /* read */
188 no_fd_write
, /* write */
189 no_fd_flush
, /* flush */
190 default_fd_get_file_info
, /* get_file_info */
191 no_fd_get_volume_info
, /* get_volume_info */
192 sock_ioctl
, /* ioctl */
193 sock_queue_async
, /* queue_async */
194 sock_reselect_async
/* reselect_async */
199 struct sockaddr addr
;
200 struct sockaddr_in in
;
201 struct sockaddr_in6 in6
;
203 struct sockaddr_ipx ipx
;
206 struct sockaddr_irda irda
;
210 static int sockaddr_from_unix( const union unix_sockaddr
*uaddr
, struct WS_sockaddr
*wsaddr
, socklen_t wsaddrlen
)
212 memset( wsaddr
, 0, wsaddrlen
);
214 switch (uaddr
->addr
.sa_family
)
218 struct WS_sockaddr_in win
= {0};
220 if (wsaddrlen
< sizeof(win
)) return -1;
221 win
.sin_family
= WS_AF_INET
;
222 win
.sin_port
= uaddr
->in
.sin_port
;
223 memcpy( &win
.sin_addr
, &uaddr
->in
.sin_addr
, sizeof(win
.sin_addr
) );
224 memcpy( wsaddr
, &win
, sizeof(win
) );
230 struct WS_sockaddr_in6 win
= {0};
232 if (wsaddrlen
< sizeof(struct WS_sockaddr_in6_old
)) return -1;
233 win
.sin6_family
= WS_AF_INET6
;
234 win
.sin6_port
= uaddr
->in6
.sin6_port
;
235 win
.sin6_flowinfo
= uaddr
->in6
.sin6_flowinfo
;
236 memcpy( &win
.sin6_addr
, &uaddr
->in6
.sin6_addr
, sizeof(win
.sin6_addr
) );
237 #ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
238 win
.sin6_scope_id
= uaddr
->in6
.sin6_scope_id
;
240 if (wsaddrlen
>= sizeof(struct WS_sockaddr_in6
))
242 memcpy( wsaddr
, &win
, sizeof(struct WS_sockaddr_in6
) );
243 return sizeof(struct WS_sockaddr_in6
);
245 memcpy( wsaddr
, &win
, sizeof(struct WS_sockaddr_in6_old
) );
246 return sizeof(struct WS_sockaddr_in6_old
);
252 struct WS_sockaddr_ipx win
= {0};
254 if (wsaddrlen
< sizeof(win
)) return -1;
255 win
.sa_family
= WS_AF_IPX
;
256 memcpy( win
.sa_netnum
, &uaddr
->ipx
.sipx_network
, sizeof(win
.sa_netnum
) );
257 memcpy( win
.sa_nodenum
, &uaddr
->ipx
.sipx_node
, sizeof(win
.sa_nodenum
) );
258 win
.sa_socket
= uaddr
->ipx
.sipx_port
;
259 memcpy( wsaddr
, &win
, sizeof(win
) );
269 if (wsaddrlen
< sizeof(win
)) return -1;
270 win
.irdaAddressFamily
= WS_AF_IRDA
;
271 memcpy( win
.irdaDeviceID
, &uaddr
->irda
.sir_addr
, sizeof(win
.irdaDeviceID
) );
272 if (uaddr
->irda
.sir_lsap_sel
!= LSAP_ANY
)
273 snprintf( win
.irdaServiceName
, sizeof(win
.irdaServiceName
), "LSAP-SEL%u", uaddr
->irda
.sir_lsap_sel
);
275 memcpy( win
.irdaServiceName
, uaddr
->irda
.sir_name
, sizeof(win
.irdaServiceName
) );
276 memcpy( wsaddr
, &win
, sizeof(win
) );
290 /* Permutation of 0..FD_MAX_EVENTS - 1 representing the order in which
291 * we post messages if there are multiple events. Used to send
292 * messages. The problem is if there is both a FD_CONNECT event and,
293 * say, an FD_READ event available on the same socket, we want to
294 * notify the app of the connect event first. Otherwise it may
295 * discard the read event because it thinks it hasn't connected yet.
297 static const int event_bitorder
[FD_MAX_EVENTS
] =
305 6, 7, 8, 9 /* leftovers */
308 /* Flags that make sense only for SOCK_STREAM sockets */
309 #define STREAM_FLAG_MASK ((unsigned int) (FD_CONNECT | FD_ACCEPT | FD_WINE_LISTENING | FD_WINE_CONNECTED))
312 SOCK_SHUTDOWN_ERROR
= -1,
313 SOCK_SHUTDOWN_EOF
= 0,
314 SOCK_SHUTDOWN_POLLHUP
= 1
317 static sock_shutdown_t sock_shutdown_type
= SOCK_SHUTDOWN_ERROR
;
319 static sock_shutdown_t
sock_check_pollhup(void)
321 sock_shutdown_t ret
= SOCK_SHUTDOWN_ERROR
;
326 if ( socketpair( AF_UNIX
, SOCK_STREAM
, 0, fd
) ) return ret
;
327 if ( shutdown( fd
[0], 1 ) ) goto out
;
333 /* Solaris' poll() sometimes returns nothing if given a 0ms timeout here */
334 n
= poll( &pfd
, 1, 1 );
335 if ( n
!= 1 ) goto out
; /* error or timeout */
336 if ( pfd
.revents
& POLLHUP
)
337 ret
= SOCK_SHUTDOWN_POLLHUP
;
338 else if ( pfd
.revents
& POLLIN
&&
339 read( fd
[1], &dummy
, 1 ) == 0 )
340 ret
= SOCK_SHUTDOWN_EOF
;
350 sock_shutdown_type
= sock_check_pollhup();
352 switch ( sock_shutdown_type
)
354 case SOCK_SHUTDOWN_EOF
:
355 if (debug_level
) fprintf( stderr
, "sock_init: shutdown() causes EOF\n" );
357 case SOCK_SHUTDOWN_POLLHUP
:
358 if (debug_level
) fprintf( stderr
, "sock_init: shutdown() causes POLLHUP\n" );
361 fprintf( stderr
, "sock_init: ERROR in sock_check_pollhup()\n" );
362 sock_shutdown_type
= SOCK_SHUTDOWN_EOF
;
366 static int sock_reselect( struct sock
*sock
)
368 int ev
= sock_get_poll_events( sock
->fd
);
371 fprintf(stderr
,"sock_reselect(%p): new mask %x\n", sock
, ev
);
373 if (!sock
->polling
) /* FIXME: should find a better way to do this */
375 /* previously unconnected socket, is this reselect supposed to connect it? */
376 if (!(sock
->state
& ~FD_WINE_NONBLOCKING
)) return 0;
377 /* ok, it is, attach it to the wineserver's main poll loop */
379 allow_fd_caching( sock
->fd
);
381 /* update condition mask */
382 set_fd_events( sock
->fd
, ev
);
386 /* wake anybody waiting on the socket event or send the associated message */
387 static void sock_wake_up( struct sock
*sock
)
389 unsigned int events
= sock
->pmask
& sock
->mask
;
392 if ( !events
) return;
396 if (debug_level
) fprintf(stderr
, "signalling events %x ptr %p\n", events
, sock
->event
);
397 set_event( sock
->event
);
401 if (debug_level
) fprintf(stderr
, "signalling events %x win %08x\n", events
, sock
->window
);
402 for (i
= 0; i
< FD_MAX_EVENTS
; i
++)
404 int event
= event_bitorder
[i
];
405 if (sock
->pmask
& (1 << event
))
407 lparam_t lparam
= (1 << event
) | (sock
->errors
[event
] << 16);
408 post_message( sock
->window
, sock
->message
, sock
->wparam
, lparam
);
412 sock_reselect( sock
);
416 static inline int sock_error( struct fd
*fd
)
418 unsigned int optval
= 0;
419 socklen_t optlen
= sizeof(optval
);
421 getsockopt( get_unix_fd(fd
), SOL_SOCKET
, SO_ERROR
, (void *) &optval
, &optlen
);
425 static void free_accept_req( void *private )
427 struct accept_req
*req
= private;
428 list_remove( &req
->entry
);
431 req
->acceptsock
->accept_recv_req
= NULL
;
432 release_object( req
->acceptsock
);
434 release_object( req
->async
);
435 release_object( req
->iosb
);
436 release_object( req
->sock
);
440 static void fill_accept_output( struct accept_req
*req
)
442 struct iosb
*iosb
= req
->iosb
;
443 union unix_sockaddr unix_addr
;
444 struct WS_sockaddr
*win_addr
;
445 unsigned int remote_len
;
451 if (!(out_data
= mem_alloc( iosb
->out_size
))) return;
453 fd
= get_unix_fd( req
->acceptsock
->fd
);
455 if (req
->recv_len
&& (size
= recv( fd
, out_data
, req
->recv_len
, 0 )) < 0)
457 if (!req
->accepted
&& errno
== EWOULDBLOCK
)
460 sock_reselect( req
->acceptsock
);
461 set_error( STATUS_PENDING
);
465 set_win32_error( sock_get_error( errno
) );
472 if (req
->local_len
< sizeof(int))
474 set_error( STATUS_BUFFER_TOO_SMALL
);
479 unix_len
= sizeof(unix_addr
);
480 win_addr
= (struct WS_sockaddr
*)(out_data
+ req
->recv_len
+ sizeof(int));
481 if (getsockname( fd
, &unix_addr
.addr
, &unix_len
) < 0 ||
482 (win_len
= sockaddr_from_unix( &unix_addr
, win_addr
, req
->local_len
- sizeof(int) )) < 0)
484 set_win32_error( sock_get_error( errno
) );
488 memcpy( out_data
+ req
->recv_len
, &win_len
, sizeof(int) );
491 unix_len
= sizeof(unix_addr
);
492 win_addr
= (struct WS_sockaddr
*)(out_data
+ req
->recv_len
+ req
->local_len
+ sizeof(int));
493 remote_len
= iosb
->out_size
- req
->recv_len
- req
->local_len
;
494 if (getpeername( fd
, &unix_addr
.addr
, &unix_len
) < 0 ||
495 (win_len
= sockaddr_from_unix( &unix_addr
, win_addr
, remote_len
- sizeof(int) )) < 0)
497 set_win32_error( sock_get_error( errno
) );
501 memcpy( out_data
+ req
->recv_len
+ req
->local_len
, &win_len
, sizeof(int) );
503 iosb
->status
= STATUS_SUCCESS
;
505 iosb
->out_data
= out_data
;
506 set_error( STATUS_ALERTED
);
509 static void complete_async_accept( struct sock
*sock
, struct accept_req
*req
)
511 struct sock
*acceptsock
= req
->acceptsock
;
512 struct async
*async
= req
->async
;
514 if (debug_level
) fprintf( stderr
, "completing accept request for socket %p\n", sock
);
518 if (!accept_into_socket( sock
, acceptsock
)) return;
519 fill_accept_output( req
);
523 struct iosb
*iosb
= req
->iosb
;
526 if (!(acceptsock
= accept_socket( sock
))) return;
527 handle
= alloc_handle_no_access_check( async_get_thread( async
)->process
, &acceptsock
->obj
,
528 GENERIC_READ
| GENERIC_WRITE
| SYNCHRONIZE
, OBJ_INHERIT
);
529 acceptsock
->wparam
= handle
;
530 release_object( acceptsock
);
533 if (!(iosb
->out_data
= malloc( sizeof(handle
) ))) return;
535 iosb
->status
= STATUS_SUCCESS
;
536 iosb
->out_size
= sizeof(handle
);
537 memcpy( iosb
->out_data
, &handle
, sizeof(handle
) );
538 set_error( STATUS_ALERTED
);
542 static void complete_async_accept_recv( struct accept_req
*req
)
544 if (debug_level
) fprintf( stderr
, "completing accept recv request for socket %p\n", req
->acceptsock
);
546 assert( req
->recv_len
);
548 fill_accept_output( req
);
551 static int sock_dispatch_asyncs( struct sock
*sock
, int event
, int error
)
553 if (event
& (POLLIN
| POLLPRI
))
555 struct accept_req
*req
;
557 LIST_FOR_EACH_ENTRY( req
, &sock
->accept_list
, struct accept_req
, entry
)
559 if (req
->iosb
->status
== STATUS_PENDING
&& !req
->accepted
)
561 complete_async_accept( sock
, req
);
562 if (get_error() != STATUS_PENDING
)
563 async_terminate( req
->async
, get_error() );
568 if (sock
->accept_recv_req
&& sock
->accept_recv_req
->iosb
->status
== STATUS_PENDING
)
570 complete_async_accept_recv( sock
->accept_recv_req
);
571 if (get_error() != STATUS_PENDING
)
572 async_terminate( sock
->accept_recv_req
->async
, get_error() );
576 if (is_fd_overlapped( sock
->fd
))
578 if (event
& (POLLIN
|POLLPRI
) && async_waiting( &sock
->read_q
))
580 if (debug_level
) fprintf( stderr
, "activating read queue for socket %p\n", sock
);
581 async_wake_up( &sock
->read_q
, STATUS_ALERTED
);
582 event
&= ~(POLLIN
|POLLPRI
);
584 if (event
& POLLOUT
&& async_waiting( &sock
->write_q
))
586 if (debug_level
) fprintf( stderr
, "activating write queue for socket %p\n", sock
);
587 async_wake_up( &sock
->write_q
, STATUS_ALERTED
);
592 if (event
& (POLLERR
| POLLHUP
))
594 int status
= sock_get_ntstatus( error
);
595 struct accept_req
*req
, *next
;
597 if (!(sock
->state
& FD_READ
))
598 async_wake_up( &sock
->read_q
, status
);
599 if (!(sock
->state
& FD_WRITE
))
600 async_wake_up( &sock
->write_q
, status
);
602 LIST_FOR_EACH_ENTRY_SAFE( req
, next
, &sock
->accept_list
, struct accept_req
, entry
)
604 if (req
->iosb
->status
== STATUS_PENDING
)
605 async_terminate( req
->async
, status
);
608 if (sock
->accept_recv_req
&& sock
->accept_recv_req
->iosb
->status
== STATUS_PENDING
)
609 async_terminate( sock
->accept_recv_req
->async
, status
);
615 static void sock_dispatch_events( struct sock
*sock
, int prevstate
, int event
, int error
)
617 if (prevstate
& FD_CONNECT
)
619 sock
->pmask
|= FD_CONNECT
;
620 sock
->hmask
|= FD_CONNECT
;
621 sock
->errors
[FD_CONNECT_BIT
] = sock_get_error( error
);
624 if (prevstate
& FD_WINE_LISTENING
)
626 sock
->pmask
|= FD_ACCEPT
;
627 sock
->hmask
|= FD_ACCEPT
;
628 sock
->errors
[FD_ACCEPT_BIT
] = sock_get_error( error
);
634 sock
->pmask
|= FD_READ
;
635 sock
->hmask
|= FD_READ
;
636 sock
->errors
[FD_READ_BIT
] = 0;
641 sock
->pmask
|= FD_WRITE
;
642 sock
->hmask
|= FD_WRITE
;
643 sock
->errors
[FD_WRITE_BIT
] = 0;
648 sock
->pmask
|= FD_OOB
;
649 sock
->hmask
|= FD_OOB
;
650 sock
->errors
[FD_OOB_BIT
] = 0;
653 if (event
& (POLLERR
|POLLHUP
))
655 sock
->pmask
|= FD_CLOSE
;
656 sock
->hmask
|= FD_CLOSE
;
657 sock
->errors
[FD_CLOSE_BIT
] = sock_get_error( error
);
660 sock_wake_up( sock
);
663 static void sock_poll_event( struct fd
*fd
, int event
)
665 struct sock
*sock
= get_fd_user( fd
);
667 int prevstate
= sock
->state
;
670 assert( sock
->obj
.ops
== &sock_ops
);
672 fprintf(stderr
, "socket %p select event: %x\n", sock
, event
);
674 /* we may change event later, remove from loop here */
675 if (event
& (POLLERR
|POLLHUP
)) set_fd_events( sock
->fd
, -1 );
677 if (sock
->state
& FD_CONNECT
)
679 if (event
& (POLLERR
|POLLHUP
))
681 /* we didn't get connected? */
682 sock
->state
&= ~FD_CONNECT
;
684 error
= sock_error( fd
);
686 else if (event
& POLLOUT
)
688 /* we got connected */
689 sock
->state
|= FD_WINE_CONNECTED
|FD_READ
|FD_WRITE
;
690 sock
->state
&= ~FD_CONNECT
;
691 sock
->connect_time
= current_time
;
694 else if (sock
->state
& FD_WINE_LISTENING
)
697 if (event
& (POLLERR
|POLLHUP
))
698 error
= sock_error( fd
);
702 /* normal data flow */
703 if (sock
->type
== WS_SOCK_STREAM
&& (event
& POLLIN
))
708 /* Linux 2.4 doesn't report POLLHUP if only one side of the socket
709 * has been closed, so we need to check for it explicitly here */
710 nr
= recv( get_unix_fd( fd
), &dummy
, 1, MSG_PEEK
);
719 /* EAGAIN can happen if an async recv() falls between the server's poll()
720 call and the invocation of this routine */
721 if ( errno
!= EAGAIN
)
726 fprintf( stderr
, "recv error on socket %p: %d\n", sock
, errno
);
731 if ( (hangup_seen
|| event
& (POLLHUP
|POLLERR
)) && (sock
->state
& (FD_READ
|FD_WRITE
)) )
733 error
= error
? error
: sock_error( fd
);
734 if ( (event
& POLLERR
) || ( sock_shutdown_type
== SOCK_SHUTDOWN_EOF
&& (event
& POLLHUP
) ))
735 sock
->state
&= ~FD_WRITE
;
736 sock
->state
&= ~FD_READ
;
739 fprintf(stderr
, "socket %p aborted by error %d, event: %x\n", sock
, error
, event
);
746 event
= sock_dispatch_asyncs( sock
, event
, error
);
747 sock_dispatch_events( sock
, prevstate
, event
, error
);
749 sock_reselect( sock
);
752 static void sock_dump( struct object
*obj
, int verbose
)
754 struct sock
*sock
= (struct sock
*)obj
;
755 assert( obj
->ops
== &sock_ops
);
756 fprintf( stderr
, "Socket fd=%p, state=%x, mask=%x, pending=%x, held=%x\n",
757 sock
->fd
, sock
->state
,
758 sock
->mask
, sock
->pmask
, sock
->hmask
);
761 static int sock_get_poll_events( struct fd
*fd
)
763 struct sock
*sock
= get_fd_user( fd
);
764 unsigned int mask
= sock
->mask
& ~sock
->hmask
;
765 unsigned int smask
= sock
->state
& mask
;
768 assert( sock
->obj
.ops
== &sock_ops
);
770 if (sock
->state
& FD_CONNECT
)
771 /* connecting, wait for writable */
774 if (!list_empty( &sock
->accept_list
) || sock
->accept_recv_req
)
776 ev
|= POLLIN
| POLLPRI
;
778 else if (async_queued( &sock
->read_q
))
780 if (async_waiting( &sock
->read_q
)) ev
|= POLLIN
| POLLPRI
;
782 else if (smask
& FD_READ
|| (sock
->state
& FD_WINE_LISTENING
&& mask
& FD_ACCEPT
))
783 ev
|= POLLIN
| POLLPRI
;
784 /* We use POLLIN with 0 bytes recv() as FD_CLOSE indication for stream sockets. */
785 else if (sock
->type
== WS_SOCK_STREAM
&& (sock
->state
& FD_READ
) && (mask
& FD_CLOSE
) &&
786 !(sock
->hmask
& FD_READ
))
789 if (async_queued( &sock
->write_q
))
791 if (async_waiting( &sock
->write_q
)) ev
|= POLLOUT
;
793 else if (smask
& FD_WRITE
)
799 static enum server_fd_type
sock_get_fd_type( struct fd
*fd
)
801 return FD_TYPE_SOCKET
;
804 static void sock_queue_async( struct fd
*fd
, struct async
*async
, int type
, int count
)
806 struct sock
*sock
= get_fd_user( fd
);
807 struct async_queue
*queue
;
809 assert( sock
->obj
.ops
== &sock_ops
);
813 case ASYNC_TYPE_READ
:
814 queue
= &sock
->read_q
;
816 case ASYNC_TYPE_WRITE
:
817 queue
= &sock
->write_q
;
820 set_error( STATUS_INVALID_PARAMETER
);
824 if ( ( !( sock
->state
& (FD_READ
|FD_CONNECT
|FD_WINE_LISTENING
) ) && type
== ASYNC_TYPE_READ
) ||
825 ( !( sock
->state
& (FD_WRITE
|FD_CONNECT
) ) && type
== ASYNC_TYPE_WRITE
) )
827 set_error( STATUS_PIPE_DISCONNECTED
);
831 queue_async( queue
, async
);
832 sock_reselect( sock
);
834 set_error( STATUS_PENDING
);
837 static void sock_reselect_async( struct fd
*fd
, struct async_queue
*queue
)
839 struct sock
*sock
= get_fd_user( fd
);
841 /* ignore reselect on ifchange queue */
842 if (&sock
->ifchange_q
!= queue
)
843 sock_reselect( sock
);
846 static struct fd
*sock_get_fd( struct object
*obj
)
848 struct sock
*sock
= (struct sock
*)obj
;
849 return (struct fd
*)grab_object( sock
->fd
);
852 static int sock_close_handle( struct object
*obj
, struct process
*process
, obj_handle_t handle
)
854 struct sock
*sock
= (struct sock
*)obj
;
855 struct accept_req
*req
, *next
;
857 if (sock
->obj
.handle_count
== 1) /* last handle */
859 if (sock
->accept_recv_req
)
860 async_terminate( sock
->accept_recv_req
->async
, STATUS_CANCELLED
);
862 LIST_FOR_EACH_ENTRY_SAFE( req
, next
, &sock
->accept_list
, struct accept_req
, entry
)
863 async_terminate( req
->async
, STATUS_CANCELLED
);
869 static void sock_destroy( struct object
*obj
)
871 struct sock
*sock
= (struct sock
*)obj
;
873 assert( obj
->ops
== &sock_ops
);
875 /* FIXME: special socket shutdown stuff? */
877 if ( sock
->deferred
)
878 release_object( sock
->deferred
);
880 async_wake_up( &sock
->ifchange_q
, STATUS_CANCELLED
);
881 sock_release_ifchange( sock
);
882 free_async_queue( &sock
->read_q
);
883 free_async_queue( &sock
->write_q
);
884 free_async_queue( &sock
->ifchange_q
);
885 free_async_queue( &sock
->accept_q
);
886 if (sock
->event
) release_object( sock
->event
);
889 /* shut the socket down to force pending poll() calls in the client to return */
890 shutdown( get_unix_fd(sock
->fd
), SHUT_RDWR
);
891 release_object( sock
->fd
);
895 static struct sock
*create_socket(void)
899 if (!(sock
= alloc_object( &sock_ops
))) return NULL
;
914 sock
->connect_time
= 0;
915 sock
->deferred
= NULL
;
916 sock
->ifchange_obj
= NULL
;
917 sock
->accept_recv_req
= NULL
;
918 init_async_queue( &sock
->read_q
);
919 init_async_queue( &sock
->write_q
);
920 init_async_queue( &sock
->ifchange_q
);
921 init_async_queue( &sock
->accept_q
);
922 memset( sock
->errors
, 0, sizeof(sock
->errors
) );
923 list_init( &sock
->accept_list
);
927 static int get_unix_family( int family
)
931 case WS_AF_INET
: return AF_INET
;
932 case WS_AF_INET6
: return AF_INET6
;
934 case WS_AF_IPX
: return AF_IPX
;
937 case WS_AF_IRDA
: return AF_IRDA
;
939 case WS_AF_UNSPEC
: return AF_UNSPEC
;
944 static int get_unix_type( int type
)
948 case WS_SOCK_DGRAM
: return SOCK_DGRAM
;
949 case WS_SOCK_RAW
: return SOCK_RAW
;
950 case WS_SOCK_STREAM
: return SOCK_STREAM
;
955 static int get_unix_protocol( int protocol
)
957 if (protocol
>= WS_NSPROTO_IPX
&& protocol
<= WS_NSPROTO_IPX
+ 255)
962 case WS_IPPROTO_ICMP
: return IPPROTO_ICMP
;
963 case WS_IPPROTO_IGMP
: return IPPROTO_IGMP
;
964 case WS_IPPROTO_IP
: return IPPROTO_IP
;
965 case WS_IPPROTO_IPV4
: return IPPROTO_IPIP
;
966 case WS_IPPROTO_IPV6
: return IPPROTO_IPV6
;
967 case WS_IPPROTO_RAW
: return IPPROTO_RAW
;
968 case WS_IPPROTO_TCP
: return IPPROTO_TCP
;
969 case WS_IPPROTO_UDP
: return IPPROTO_UDP
;
974 static void set_dont_fragment( int fd
, int level
, int value
)
978 if (level
== IPPROTO_IP
)
981 optname
= IP_DONTFRAG
;
982 #elif defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DO) && defined(IP_PMTUDISC_DONT)
983 optname
= IP_MTU_DISCOVER
;
984 value
= value
? IP_PMTUDISC_DO
: IP_PMTUDISC_DONT
;
992 optname
= IPV6_DONTFRAG
;
993 #elif defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DO) && defined(IPV6_PMTUDISC_DONT)
994 optname
= IPV6_MTU_DISCOVER
;
995 value
= value
? IPV6_PMTUDISC_DO
: IPV6_PMTUDISC_DONT
;
1001 setsockopt( fd
, level
, optname
, &value
, sizeof(value
) );
1004 static int init_socket( struct sock
*sock
, int family
, int type
, int protocol
, unsigned int flags
)
1006 unsigned int options
= 0;
1007 int sockfd
, unix_type
, unix_family
, unix_protocol
;
1009 unix_family
= get_unix_family( family
);
1010 unix_type
= get_unix_type( type
);
1011 unix_protocol
= get_unix_protocol( protocol
);
1013 if (unix_protocol
< 0)
1015 if (type
&& unix_type
< 0)
1016 set_win32_error( WSAESOCKTNOSUPPORT
);
1018 set_win32_error( WSAEPROTONOSUPPORT
);
1021 if (unix_family
< 0)
1023 if (family
>= 0 && unix_type
< 0)
1024 set_win32_error( WSAESOCKTNOSUPPORT
);
1026 set_win32_error( WSAEAFNOSUPPORT
);
1030 sockfd
= socket( unix_family
, unix_type
, unix_protocol
);
1033 if (errno
== EINVAL
) set_win32_error( WSAESOCKTNOSUPPORT
);
1034 else set_win32_error( sock_get_error( errno
));
1037 fcntl(sockfd
, F_SETFL
, O_NONBLOCK
); /* make socket nonblocking */
1039 if (family
== WS_AF_IPX
&& protocol
>= WS_NSPROTO_IPX
&& protocol
<= WS_NSPROTO_IPX
+ 255)
1042 int ipx_type
= protocol
- WS_NSPROTO_IPX
;
1045 setsockopt( sockfd
, SOL_IPX
, IPX_TYPE
, &ipx_type
, sizeof(ipx_type
) );
1048 /* Should we retrieve val using a getsockopt call and then
1049 * set the modified one? */
1050 val
.ipx_pt
= ipx_type
;
1051 setsockopt( sockfd
, 0, SO_DEFAULT_HEADERS
, &val
, sizeof(val
) );
1056 if (unix_family
== AF_INET
|| unix_family
== AF_INET6
)
1058 /* ensure IP_DONTFRAGMENT is disabled for SOCK_DGRAM and SOCK_RAW, enabled for SOCK_STREAM */
1059 if (unix_type
== SOCK_DGRAM
|| unix_type
== SOCK_RAW
) /* in Linux the global default can be enabled */
1060 set_dont_fragment( sockfd
, unix_family
== AF_INET6
? IPPROTO_IPV6
: IPPROTO_IP
, FALSE
);
1061 else if (unix_type
== SOCK_STREAM
)
1062 set_dont_fragment( sockfd
, unix_family
== AF_INET6
? IPPROTO_IPV6
: IPPROTO_IP
, TRUE
);
1066 if (unix_family
== AF_INET6
)
1068 static const int enable
= 1;
1069 setsockopt( sockfd
, IPPROTO_IPV6
, IPV6_V6ONLY
, &enable
, sizeof(enable
) );
1073 sock
->state
= (type
!= SOCK_STREAM
) ? (FD_READ
|FD_WRITE
) : 0;
1074 sock
->flags
= flags
;
1075 sock
->proto
= protocol
;
1077 sock
->family
= family
;
1081 options
= get_fd_options( sock
->fd
);
1082 release_object( sock
->fd
);
1085 if (!(sock
->fd
= create_anonymous_fd( &sock_fd_ops
, sockfd
, &sock
->obj
, options
)))
1089 sock_reselect( sock
);
1094 /* accepts a socket and inits it */
1095 static int accept_new_fd( struct sock
*sock
)
1098 /* Try to accept(2). We can't be safe that this an already connected socket
1099 * or that accept() is allowed on it. In those cases we will get -1/errno
1102 struct sockaddr saddr
;
1103 socklen_t slen
= sizeof(saddr
);
1104 int acceptfd
= accept( get_unix_fd(sock
->fd
), &saddr
, &slen
);
1106 fcntl( acceptfd
, F_SETFL
, O_NONBLOCK
);
1108 set_win32_error( sock_get_error( errno
));
1112 /* accept a socket (creates a new fd) */
1113 static struct sock
*accept_socket( struct sock
*sock
)
1115 struct sock
*acceptsock
;
1118 if (get_unix_fd( sock
->fd
) == -1) return NULL
;
1120 if ( sock
->deferred
)
1122 acceptsock
= sock
->deferred
;
1123 sock
->deferred
= NULL
;
1127 if ((acceptfd
= accept_new_fd( sock
)) == -1) return NULL
;
1128 if (!(acceptsock
= create_socket()))
1134 /* newly created socket gets the same properties of the listening socket */
1135 acceptsock
->state
= FD_WINE_CONNECTED
|FD_READ
|FD_WRITE
;
1136 if (sock
->state
& FD_WINE_NONBLOCKING
)
1137 acceptsock
->state
|= FD_WINE_NONBLOCKING
;
1138 acceptsock
->mask
= sock
->mask
;
1139 acceptsock
->proto
= sock
->proto
;
1140 acceptsock
->type
= sock
->type
;
1141 acceptsock
->family
= sock
->family
;
1142 acceptsock
->window
= sock
->window
;
1143 acceptsock
->message
= sock
->message
;
1144 acceptsock
->connect_time
= current_time
;
1145 if (sock
->event
) acceptsock
->event
= (struct event
*)grab_object( sock
->event
);
1146 acceptsock
->flags
= sock
->flags
;
1147 if (!(acceptsock
->fd
= create_anonymous_fd( &sock_fd_ops
, acceptfd
, &acceptsock
->obj
,
1148 get_fd_options( sock
->fd
) )))
1150 release_object( acceptsock
);
1155 sock
->pmask
&= ~FD_ACCEPT
;
1156 sock
->hmask
&= ~FD_ACCEPT
;
1157 sock_reselect( sock
);
1161 static int accept_into_socket( struct sock
*sock
, struct sock
*acceptsock
)
1166 if (get_unix_fd( sock
->fd
) == -1) return FALSE
;
1168 if ( sock
->deferred
)
1170 newfd
= dup_fd_object( sock
->deferred
->fd
, 0, 0,
1171 get_fd_options( acceptsock
->fd
) );
1175 set_fd_user( newfd
, &sock_fd_ops
, &acceptsock
->obj
);
1177 release_object( sock
->deferred
);
1178 sock
->deferred
= NULL
;
1182 if ((acceptfd
= accept_new_fd( sock
)) == -1)
1185 if (!(newfd
= create_anonymous_fd( &sock_fd_ops
, acceptfd
, &acceptsock
->obj
,
1186 get_fd_options( acceptsock
->fd
) )))
1190 acceptsock
->state
|= FD_WINE_CONNECTED
|FD_READ
|FD_WRITE
;
1191 acceptsock
->hmask
= 0;
1192 acceptsock
->pmask
= 0;
1193 acceptsock
->polling
= 0;
1194 acceptsock
->proto
= sock
->proto
;
1195 acceptsock
->type
= sock
->type
;
1196 acceptsock
->family
= sock
->family
;
1197 acceptsock
->wparam
= 0;
1198 acceptsock
->deferred
= NULL
;
1199 acceptsock
->connect_time
= current_time
;
1200 fd_copy_completion( acceptsock
->fd
, newfd
);
1201 release_object( acceptsock
->fd
);
1202 acceptsock
->fd
= newfd
;
1205 sock
->pmask
&= ~FD_ACCEPT
;
1206 sock
->hmask
&= ~FD_ACCEPT
;
1207 sock_reselect( sock
);
1212 /* return an errno value mapped to a WSA error */
1213 static unsigned int sock_get_error( int err
)
1217 case EINTR
: return WSAEINTR
;
1218 case EBADF
: return WSAEBADF
;
1220 case EACCES
: return WSAEACCES
;
1221 case EFAULT
: return WSAEFAULT
;
1222 case EINVAL
: return WSAEINVAL
;
1223 case EMFILE
: return WSAEMFILE
;
1224 case EWOULDBLOCK
: return WSAEWOULDBLOCK
;
1225 case EINPROGRESS
: return WSAEINPROGRESS
;
1226 case EALREADY
: return WSAEALREADY
;
1227 case ENOTSOCK
: return WSAENOTSOCK
;
1228 case EDESTADDRREQ
: return WSAEDESTADDRREQ
;
1229 case EMSGSIZE
: return WSAEMSGSIZE
;
1230 case EPROTOTYPE
: return WSAEPROTOTYPE
;
1231 case ENOPROTOOPT
: return WSAENOPROTOOPT
;
1232 case EPROTONOSUPPORT
: return WSAEPROTONOSUPPORT
;
1233 case ESOCKTNOSUPPORT
: return WSAESOCKTNOSUPPORT
;
1234 case EOPNOTSUPP
: return WSAEOPNOTSUPP
;
1235 case EPFNOSUPPORT
: return WSAEPFNOSUPPORT
;
1236 case EAFNOSUPPORT
: return WSAEAFNOSUPPORT
;
1237 case EADDRINUSE
: return WSAEADDRINUSE
;
1238 case EADDRNOTAVAIL
: return WSAEADDRNOTAVAIL
;
1239 case ENETDOWN
: return WSAENETDOWN
;
1240 case ENETUNREACH
: return WSAENETUNREACH
;
1241 case ENETRESET
: return WSAENETRESET
;
1242 case ECONNABORTED
: return WSAECONNABORTED
;
1244 case ECONNRESET
: return WSAECONNRESET
;
1245 case ENOBUFS
: return WSAENOBUFS
;
1246 case EISCONN
: return WSAEISCONN
;
1247 case ENOTCONN
: return WSAENOTCONN
;
1248 case ESHUTDOWN
: return WSAESHUTDOWN
;
1249 case ETOOMANYREFS
: return WSAETOOMANYREFS
;
1250 case ETIMEDOUT
: return WSAETIMEDOUT
;
1251 case ECONNREFUSED
: return WSAECONNREFUSED
;
1252 case ELOOP
: return WSAELOOP
;
1253 case ENAMETOOLONG
: return WSAENAMETOOLONG
;
1254 case EHOSTDOWN
: return WSAEHOSTDOWN
;
1255 case EHOSTUNREACH
: return WSAEHOSTUNREACH
;
1256 case ENOTEMPTY
: return WSAENOTEMPTY
;
1258 case EPROCLIM
: return WSAEPROCLIM
;
1261 case EUSERS
: return WSAEUSERS
;
1264 case EDQUOT
: return WSAEDQUOT
;
1267 case ESTALE
: return WSAESTALE
;
1270 case EREMOTE
: return WSAEREMOTE
;
1276 perror("wineserver: sock_get_error() can't map error");
1281 static int sock_get_ntstatus( int err
)
1285 case EBADF
: return STATUS_INVALID_HANDLE
;
1286 case EBUSY
: return STATUS_DEVICE_BUSY
;
1288 case EACCES
: return STATUS_ACCESS_DENIED
;
1289 case EFAULT
: return STATUS_NO_MEMORY
;
1290 case EINVAL
: return STATUS_INVALID_PARAMETER
;
1292 case EMFILE
: return STATUS_TOO_MANY_OPENED_FILES
;
1293 case EWOULDBLOCK
: return STATUS_CANT_WAIT
;
1294 case EINPROGRESS
: return STATUS_PENDING
;
1295 case EALREADY
: return STATUS_NETWORK_BUSY
;
1296 case ENOTSOCK
: return STATUS_OBJECT_TYPE_MISMATCH
;
1297 case EDESTADDRREQ
: return STATUS_INVALID_PARAMETER
;
1298 case EMSGSIZE
: return STATUS_BUFFER_OVERFLOW
;
1299 case EPROTONOSUPPORT
:
1300 case ESOCKTNOSUPPORT
:
1303 case EPROTOTYPE
: return STATUS_NOT_SUPPORTED
;
1304 case ENOPROTOOPT
: return STATUS_INVALID_PARAMETER
;
1305 case EOPNOTSUPP
: return STATUS_NOT_SUPPORTED
;
1306 case EADDRINUSE
: return STATUS_ADDRESS_ALREADY_ASSOCIATED
;
1307 case EADDRNOTAVAIL
: return STATUS_INVALID_PARAMETER
;
1308 case ECONNREFUSED
: return STATUS_CONNECTION_REFUSED
;
1309 case ESHUTDOWN
: return STATUS_PIPE_DISCONNECTED
;
1310 case ENOTCONN
: return STATUS_CONNECTION_DISCONNECTED
;
1311 case ETIMEDOUT
: return STATUS_IO_TIMEOUT
;
1312 case ENETUNREACH
: return STATUS_NETWORK_UNREACHABLE
;
1313 case EHOSTUNREACH
: return STATUS_HOST_UNREACHABLE
;
1314 case ENETDOWN
: return STATUS_NETWORK_BUSY
;
1316 case ECONNRESET
: return STATUS_CONNECTION_RESET
;
1317 case ECONNABORTED
: return STATUS_CONNECTION_ABORTED
;
1319 case 0: return STATUS_SUCCESS
;
1322 perror("wineserver: sock_get_ntstatus() can't map error");
1323 return STATUS_UNSUCCESSFUL
;
1327 static struct accept_req
*alloc_accept_req( struct sock
*sock
, struct sock
*acceptsock
, struct async
*async
,
1328 const struct afd_accept_into_params
*params
)
1330 struct accept_req
*req
= mem_alloc( sizeof(*req
) );
1334 req
->async
= (struct async
*)grab_object( async
);
1335 req
->iosb
= async_get_iosb( async
);
1336 req
->sock
= (struct sock
*)grab_object( sock
);
1337 req
->acceptsock
= acceptsock
;
1338 if (acceptsock
) grab_object( acceptsock
);
1344 req
->recv_len
= params
->recv_len
;
1345 req
->local_len
= params
->local_len
;
1351 static int sock_ioctl( struct fd
*fd
, ioctl_code_t code
, struct async
*async
)
1353 struct sock
*sock
= get_fd_user( fd
);
1355 assert( sock
->obj
.ops
== &sock_ops
);
1357 if (get_unix_fd( fd
) == -1 && code
!= IOCTL_AFD_CREATE
) return 0;
1361 case IOCTL_AFD_CREATE
:
1363 const struct afd_create_params
*params
= get_req_data();
1365 if (get_req_data_size() != sizeof(*params
))
1367 set_error( STATUS_INVALID_PARAMETER
);
1370 init_socket( sock
, params
->family
, params
->type
, params
->protocol
, params
->flags
);
1374 case IOCTL_AFD_ACCEPT
:
1376 struct sock
*acceptsock
;
1377 obj_handle_t handle
;
1379 if (get_reply_max_size() != sizeof(handle
))
1381 set_error( STATUS_BUFFER_TOO_SMALL
);
1385 if (!(acceptsock
= accept_socket( sock
)))
1387 struct accept_req
*req
;
1389 if (sock
->state
& FD_WINE_NONBLOCKING
) return 0;
1390 if (get_error() != (0xc0010000 | WSAEWOULDBLOCK
)) return 0;
1392 if (!(req
= alloc_accept_req( sock
, NULL
, async
, NULL
))) return 0;
1393 list_add_tail( &sock
->accept_list
, &req
->entry
);
1395 async_set_completion_callback( async
, free_accept_req
, req
);
1396 queue_async( &sock
->accept_q
, async
);
1397 sock_reselect( sock
);
1398 set_error( STATUS_PENDING
);
1401 handle
= alloc_handle( current
->process
, &acceptsock
->obj
,
1402 GENERIC_READ
| GENERIC_WRITE
| SYNCHRONIZE
, OBJ_INHERIT
);
1403 acceptsock
->wparam
= handle
;
1404 release_object( acceptsock
);
1405 set_reply_data( &handle
, sizeof(handle
) );
1409 case IOCTL_AFD_ACCEPT_INTO
:
1411 static const int access
= FILE_READ_ATTRIBUTES
| FILE_WRITE_ATTRIBUTES
| FILE_READ_DATA
;
1412 const struct afd_accept_into_params
*params
= get_req_data();
1413 struct sock
*acceptsock
;
1414 unsigned int remote_len
;
1415 struct accept_req
*req
;
1417 if (get_req_data_size() != sizeof(*params
) ||
1418 get_reply_max_size() < params
->recv_len
||
1419 get_reply_max_size() - params
->recv_len
< params
->local_len
)
1421 set_error( STATUS_BUFFER_TOO_SMALL
);
1425 remote_len
= get_reply_max_size() - params
->recv_len
- params
->local_len
;
1426 if (remote_len
< sizeof(int))
1428 set_error( STATUS_INVALID_PARAMETER
);
1432 if (!(acceptsock
= (struct sock
*)get_handle_obj( current
->process
, params
->accept_handle
, access
, &sock_ops
)))
1435 if (acceptsock
->accept_recv_req
)
1437 release_object( acceptsock
);
1438 set_win32_error( WSAEINVAL
);
1442 if (!(req
= alloc_accept_req( sock
, acceptsock
, async
, params
)))
1444 release_object( acceptsock
);
1447 list_add_tail( &sock
->accept_list
, &req
->entry
);
1448 acceptsock
->accept_recv_req
= req
;
1449 release_object( acceptsock
);
1451 acceptsock
->wparam
= params
->accept_handle
;
1452 async_set_completion_callback( async
, free_accept_req
, req
);
1453 queue_async( &sock
->accept_q
, async
);
1454 sock_reselect( sock
);
1455 set_error( STATUS_PENDING
);
1459 case IOCTL_AFD_ADDRESS_LIST_CHANGE
:
1460 if ((sock
->state
& FD_WINE_NONBLOCKING
) && async_is_blocking( async
))
1462 set_win32_error( WSAEWOULDBLOCK
);
1465 if (!sock_get_ifchange( sock
)) return 0;
1466 queue_async( &sock
->ifchange_q
, async
);
1467 set_error( STATUS_PENDING
);
1471 set_error( STATUS_NOT_SUPPORTED
);
1476 #ifdef HAVE_LINUX_RTNETLINK_H
1478 /* only keep one ifchange object around, all sockets waiting for wakeups will look to it */
1479 static struct object
*ifchange_object
;
1481 static void ifchange_dump( struct object
*obj
, int verbose
);
1482 static struct fd
*ifchange_get_fd( struct object
*obj
);
1483 static void ifchange_destroy( struct object
*obj
);
1485 static int ifchange_get_poll_events( struct fd
*fd
);
1486 static void ifchange_poll_event( struct fd
*fd
, int event
);
1490 struct object obj
; /* object header */
1491 struct fd
*fd
; /* interface change file descriptor */
1492 struct list sockets
; /* list of sockets to send interface change notifications */
1495 static const struct object_ops ifchange_ops
=
1497 sizeof(struct ifchange
), /* size */
1498 &no_type
, /* type */
1499 ifchange_dump
, /* dump */
1500 no_add_queue
, /* add_queue */
1501 NULL
, /* remove_queue */
1502 NULL
, /* signaled */
1503 no_satisfied
, /* satisfied */
1504 no_signal
, /* signal */
1505 ifchange_get_fd
, /* get_fd */
1506 default_map_access
, /* map_access */
1507 default_get_sd
, /* get_sd */
1508 default_set_sd
, /* set_sd */
1509 no_get_full_name
, /* get_full_name */
1510 no_lookup_name
, /* lookup_name */
1511 no_link_name
, /* link_name */
1512 NULL
, /* unlink_name */
1513 no_open_file
, /* open_file */
1514 no_kernel_obj_list
, /* get_kernel_obj_list */
1515 no_close_handle
, /* close_handle */
1516 ifchange_destroy
/* destroy */
1519 static const struct fd_ops ifchange_fd_ops
=
1521 ifchange_get_poll_events
, /* get_poll_events */
1522 ifchange_poll_event
, /* poll_event */
1523 NULL
, /* get_fd_type */
1524 no_fd_read
, /* read */
1525 no_fd_write
, /* write */
1526 no_fd_flush
, /* flush */
1527 no_fd_get_file_info
, /* get_file_info */
1528 no_fd_get_volume_info
, /* get_volume_info */
1529 no_fd_ioctl
, /* ioctl */
1530 NULL
, /* queue_async */
1531 NULL
/* reselect_async */
1534 static void ifchange_dump( struct object
*obj
, int verbose
)
1536 assert( obj
->ops
== &ifchange_ops
);
1537 fprintf( stderr
, "Interface change\n" );
1540 static struct fd
*ifchange_get_fd( struct object
*obj
)
1542 struct ifchange
*ifchange
= (struct ifchange
*)obj
;
1543 return (struct fd
*)grab_object( ifchange
->fd
);
1546 static void ifchange_destroy( struct object
*obj
)
1548 struct ifchange
*ifchange
= (struct ifchange
*)obj
;
1549 assert( obj
->ops
== &ifchange_ops
);
1551 release_object( ifchange
->fd
);
1553 /* reset the global ifchange object so that it will be recreated if it is needed again */
1554 assert( obj
== ifchange_object
);
1555 ifchange_object
= NULL
;
1558 static int ifchange_get_poll_events( struct fd
*fd
)
1563 /* wake up all the sockets waiting for a change notification event */
1564 static void ifchange_wake_up( struct object
*obj
, unsigned int status
)
1566 struct ifchange
*ifchange
= (struct ifchange
*)obj
;
1567 struct list
*ptr
, *next
;
1568 assert( obj
->ops
== &ifchange_ops
);
1569 assert( obj
== ifchange_object
);
1571 LIST_FOR_EACH_SAFE( ptr
, next
, &ifchange
->sockets
)
1573 struct sock
*sock
= LIST_ENTRY( ptr
, struct sock
, ifchange_entry
);
1575 assert( sock
->ifchange_obj
);
1576 async_wake_up( &sock
->ifchange_q
, status
); /* issue ifchange notification for the socket */
1577 sock_release_ifchange( sock
); /* remove socket from list and decrement ifchange refcount */
1581 static void ifchange_poll_event( struct fd
*fd
, int event
)
1583 struct object
*ifchange
= get_fd_user( fd
);
1584 unsigned int status
= STATUS_PENDING
;
1585 char buffer
[PIPE_BUF
];
1588 r
= recv( get_unix_fd(fd
), buffer
, sizeof(buffer
), MSG_DONTWAIT
);
1591 if (errno
== EWOULDBLOCK
|| (EWOULDBLOCK
!= EAGAIN
&& errno
== EAGAIN
))
1592 return; /* retry when poll() says the socket is ready */
1593 status
= sock_get_ntstatus( errno
);
1597 struct nlmsghdr
*nlh
;
1599 for (nlh
= (struct nlmsghdr
*)buffer
; NLMSG_OK(nlh
, r
); nlh
= NLMSG_NEXT(nlh
, r
))
1601 if (nlh
->nlmsg_type
== NLMSG_DONE
)
1603 if (nlh
->nlmsg_type
== RTM_NEWADDR
|| nlh
->nlmsg_type
== RTM_DELADDR
)
1604 status
= STATUS_SUCCESS
;
1607 else status
= STATUS_CANCELLED
;
1609 if (status
!= STATUS_PENDING
) ifchange_wake_up( ifchange
, status
);
1614 /* we only need one of these interface notification objects, all of the sockets dependent upon
1615 * it will wake up when a notification event occurs */
1616 static struct object
*get_ifchange( void )
1618 #ifdef HAVE_LINUX_RTNETLINK_H
1619 struct ifchange
*ifchange
;
1620 struct sockaddr_nl addr
;
1623 if (ifchange_object
)
1625 /* increment the refcount for each socket that uses the ifchange object */
1626 return grab_object( ifchange_object
);
1629 /* create the socket we need for processing interface change notifications */
1630 unix_fd
= socket( PF_NETLINK
, SOCK_RAW
, NETLINK_ROUTE
);
1633 set_win32_error( sock_get_error( errno
));
1636 fcntl( unix_fd
, F_SETFL
, O_NONBLOCK
); /* make socket nonblocking */
1637 memset( &addr
, 0, sizeof(addr
) );
1638 addr
.nl_family
= AF_NETLINK
;
1639 addr
.nl_groups
= RTMGRP_IPV4_IFADDR
;
1640 /* bind the socket to the special netlink kernel interface */
1641 if (bind( unix_fd
, (struct sockaddr
*)&addr
, sizeof(addr
) ) == -1)
1644 set_win32_error( sock_get_error( errno
));
1647 if (!(ifchange
= alloc_object( &ifchange_ops
)))
1650 set_error( STATUS_NO_MEMORY
);
1653 list_init( &ifchange
->sockets
);
1654 if (!(ifchange
->fd
= create_anonymous_fd( &ifchange_fd_ops
, unix_fd
, &ifchange
->obj
, 0 )))
1656 release_object( ifchange
);
1657 set_error( STATUS_NO_MEMORY
);
1660 set_fd_events( ifchange
->fd
, POLLIN
); /* enable read wakeup on the file descriptor */
1662 /* the ifchange object is now successfully configured */
1663 ifchange_object
= &ifchange
->obj
;
1664 return &ifchange
->obj
;
1666 set_error( STATUS_NOT_SUPPORTED
);
1671 /* add the socket to the interface change notification list */
1672 static void ifchange_add_sock( struct object
*obj
, struct sock
*sock
)
1674 #ifdef HAVE_LINUX_RTNETLINK_H
1675 struct ifchange
*ifchange
= (struct ifchange
*)obj
;
1677 list_add_tail( &ifchange
->sockets
, &sock
->ifchange_entry
);
1681 /* create a new ifchange queue for a specific socket or, if one already exists, reuse the existing one */
1682 static struct object
*sock_get_ifchange( struct sock
*sock
)
1684 struct object
*ifchange
;
1686 if (sock
->ifchange_obj
) /* reuse existing ifchange_obj for this socket */
1687 return sock
->ifchange_obj
;
1689 if (!(ifchange
= get_ifchange()))
1692 /* add the socket to the ifchange notification list */
1693 ifchange_add_sock( ifchange
, sock
);
1694 sock
->ifchange_obj
= ifchange
;
1698 /* destroy an existing ifchange queue for a specific socket */
1699 static void sock_release_ifchange( struct sock
*sock
)
1701 if (sock
->ifchange_obj
)
1703 list_remove( &sock
->ifchange_entry
);
1704 release_object( sock
->ifchange_obj
);
1705 sock
->ifchange_obj
= NULL
;
1709 static void socket_device_dump( struct object
*obj
, int verbose
);
1710 static struct object
*socket_device_lookup_name( struct object
*obj
, struct unicode_str
*name
,
1711 unsigned int attr
, struct object
*root
);
1712 static struct object
*socket_device_open_file( struct object
*obj
, unsigned int access
,
1713 unsigned int sharing
, unsigned int options
);
1715 static const struct object_ops socket_device_ops
=
1717 sizeof(struct object
), /* size */
1718 &device_type
, /* type */
1719 socket_device_dump
, /* dump */
1720 no_add_queue
, /* add_queue */
1721 NULL
, /* remove_queue */
1722 NULL
, /* signaled */
1723 no_satisfied
, /* satisfied */
1724 no_signal
, /* signal */
1725 no_get_fd
, /* get_fd */
1726 default_map_access
, /* map_access */
1727 default_get_sd
, /* get_sd */
1728 default_set_sd
, /* set_sd */
1729 default_get_full_name
, /* get_full_name */
1730 socket_device_lookup_name
, /* lookup_name */
1731 directory_link_name
, /* link_name */
1732 default_unlink_name
, /* unlink_name */
1733 socket_device_open_file
, /* open_file */
1734 no_kernel_obj_list
, /* get_kernel_obj_list */
1735 no_close_handle
, /* close_handle */
1736 no_destroy
/* destroy */
1739 static void socket_device_dump( struct object
*obj
, int verbose
)
1741 fputs( "Socket device\n", stderr
);
1744 static struct object
*socket_device_lookup_name( struct object
*obj
, struct unicode_str
*name
,
1745 unsigned int attr
, struct object
*root
)
1750 static struct object
*socket_device_open_file( struct object
*obj
, unsigned int access
,
1751 unsigned int sharing
, unsigned int options
)
1755 if (!(sock
= create_socket())) return NULL
;
1756 if (!(sock
->fd
= alloc_pseudo_fd( &sock_fd_ops
, &sock
->obj
, options
)))
1758 release_object( sock
);
1764 struct object
*create_socket_device( struct object
*root
, const struct unicode_str
*name
,
1765 unsigned int attr
, const struct security_descriptor
*sd
)
1767 return create_named_object( root
, &socket_device_ops
, name
, attr
, sd
);
1770 /* set socket event parameters */
1771 DECL_HANDLER(set_socket_event
)
1774 struct event
*old_event
;
1776 if (!(sock
= (struct sock
*)get_handle_obj( current
->process
, req
->handle
,
1777 FILE_WRITE_ATTRIBUTES
, &sock_ops
))) return;
1778 if (get_unix_fd( sock
->fd
) == -1) return;
1779 old_event
= sock
->event
;
1780 sock
->mask
= req
->mask
;
1781 sock
->hmask
&= ~req
->mask
; /* re-enable held events */
1783 sock
->window
= req
->window
;
1784 sock
->message
= req
->msg
;
1785 sock
->wparam
= req
->handle
; /* wparam is the socket handle */
1786 if (req
->event
) sock
->event
= get_event_obj( current
->process
, req
->event
, EVENT_MODIFY_STATE
);
1788 if (debug_level
&& sock
->event
) fprintf(stderr
, "event ptr: %p\n", sock
->event
);
1790 sock_reselect( sock
);
1792 sock
->state
|= FD_WINE_NONBLOCKING
;
1794 /* if a network event is pending, signal the event object
1795 it is possible that FD_CONNECT or FD_ACCEPT network events has happened
1796 before a WSAEventSelect() was done on it.
1797 (when dealing with Asynchronous socket) */
1798 sock_wake_up( sock
);
1800 if (old_event
) release_object( old_event
); /* we're through with it */
1801 release_object( &sock
->obj
);
1804 /* get socket event parameters */
1805 DECL_HANDLER(get_socket_event
)
1809 if (!(sock
= (struct sock
*)get_handle_obj( current
->process
, req
->handle
,
1810 FILE_READ_ATTRIBUTES
, &sock_ops
))) return;
1811 if (get_unix_fd( sock
->fd
) == -1) return;
1812 reply
->mask
= sock
->mask
;
1813 reply
->pmask
= sock
->pmask
;
1814 reply
->state
= sock
->state
;
1815 set_reply_data( sock
->errors
, min( get_reply_max_size(), sizeof(sock
->errors
) ));
1821 struct event
*cevent
= get_event_obj( current
->process
, req
->c_event
,
1822 EVENT_MODIFY_STATE
);
1825 reset_event( cevent
);
1826 release_object( cevent
);
1830 sock_reselect( sock
);
1832 release_object( &sock
->obj
);
1835 /* re-enable pending socket events */
1836 DECL_HANDLER(enable_socket_event
)
1840 if (!(sock
= (struct sock
*)get_handle_obj( current
->process
, req
->handle
,
1841 FILE_WRITE_ATTRIBUTES
, &sock_ops
)))
1844 if (get_unix_fd( sock
->fd
) == -1) return;
1846 /* for event-based notification, windows erases stale events */
1847 sock
->pmask
&= ~req
->mask
;
1849 sock
->hmask
&= ~req
->mask
;
1850 sock
->state
|= req
->sstate
;
1851 sock
->state
&= ~req
->cstate
;
1852 if (sock
->type
!= WS_SOCK_STREAM
) sock
->state
&= ~STREAM_FLAG_MASK
;
1854 sock_reselect( sock
);
1856 release_object( &sock
->obj
);
1859 DECL_HANDLER(set_socket_deferred
)
1861 struct sock
*sock
, *acceptsock
;
1863 sock
=(struct sock
*)get_handle_obj( current
->process
, req
->handle
, FILE_WRITE_ATTRIBUTES
, &sock_ops
);
1867 acceptsock
= (struct sock
*)get_handle_obj( current
->process
, req
->deferred
, 0, &sock_ops
);
1870 release_object( sock
);
1873 sock
->deferred
= acceptsock
;
1874 release_object( sock
);
1877 DECL_HANDLER(get_socket_info
)
1881 sock
= (struct sock
*)get_handle_obj( current
->process
, req
->handle
, FILE_READ_ATTRIBUTES
, &sock_ops
);
1884 if (get_unix_fd( sock
->fd
) == -1) return;
1886 reply
->family
= sock
->family
;
1887 reply
->type
= sock
->type
;
1888 reply
->protocol
= sock
->proto
;
1890 release_object( &sock
->obj
);