diff options
Diffstat (limited to 'pfinet/socket-ops.c')
-rw-r--r-- | pfinet/socket-ops.c | 450 |
1 files changed, 244 insertions, 206 deletions
diff --git a/pfinet/socket-ops.c b/pfinet/socket-ops.c index 691dccfc..b4172dc4 100644 --- a/pfinet/socket-ops.c +++ b/pfinet/socket-ops.c @@ -1,5 +1,5 @@ /* Interface functions for the socket.defs interface. - Copyright (C) 1995, 1996 Free Software Foundation, Inc. + Copyright (C) 1995,96,97,99,2000,02,07 Free Software Foundation, Inc. Written by Michael I. Bushnell, p/BSG. This file is part of the GNU Hurd. @@ -18,13 +18,22 @@ along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111, USA. */ +#include <sys/stat.h> #include <hurd/trivfs.h> #include <string.h> +#include <stddef.h> +#include <fcntl.h> +#include <hurd/fshelp.h> #include "pfinet.h" #include "socket_S.h" - +#include <linux/sched.h> +#include <linux/socket.h> +#include <linux/net.h> +#include <net/sock.h> + + error_t S_socket_create (struct trivfs_protid *master, int sock_type, @@ -35,40 +44,60 @@ S_socket_create (struct trivfs_protid *master, struct sock_user *user; struct socket *sock; error_t err; - + int isroot; + if (!master) return EOPNOTSUPP; /* Don't allow bogus SOCK_PACKET here. */ - if ((sock_type != SOCK_STREAM - && sock_type != SOCK_DGRAM - && sock_type != SOCK_SEQPACKET - && sock_type != SOCK_RAW) - || protocol < 0) - return EINVAL; - - mutex_lock (&global_lock); + if (sock_type != SOCK_STREAM + && sock_type != SOCK_DGRAM + && sock_type != SOCK_SEQPACKET + && sock_type != SOCK_RAW) + return EPROTOTYPE; + + if (protocol < 0) + return EPROTONOSUPPORT; + + __mutex_lock (&global_lock); become_task_protid (master); sock = sock_alloc (); - + sock->type = sock_type; - sock->ops = proto_ops; - - err = - (*sock->ops->create) (sock, protocol); + + isroot = master->isroot; + if (!isroot) + { + struct stat st; + + /* XXX */ + st.st_uid = pfinet_owner; + st.st_gid = pfinet_group; + + err = fshelp_isowner (&st, master->user); + if (! err) + isroot = 1; + } + + if (master->pi.class == trivfs_protid_portclasses[PORTCLASS_INET]) + err = - (*net_families[PF_INET]->create) (sock, protocol); + else + err = - (*net_families[PF_INET6]->create) (sock, protocol); + if (err) sock_release (sock); else { - user = make_sock_user (sock, master->isroot, 0); + user = make_sock_user (sock, isroot, 0, 1); *port = ports_get_right (user); *porttype = MACH_MSG_TYPE_MAKE_SEND; ports_port_deref (user); } - - mutex_unlock (&global_lock); + + __mutex_unlock (&global_lock); return err; } @@ -78,26 +107,17 @@ S_socket_create (struct trivfs_protid *master, error_t S_socket_listen (struct sock_user *user, int queue_limit) { + error_t err; + if (!user) return EOPNOTSUPP; - - mutex_lock (&global_lock); + __mutex_lock (&global_lock); become_task (user); - - if (user->sock->state == SS_UNCONNECTED) - { - if (user->sock->ops && user->sock->ops->listen) - (*user->sock->ops->listen) (user->sock, queue_limit); - user->sock->flags |= SO_ACCEPTCON; - mutex_unlock (&global_lock); - return 0; - } - else - { - mutex_unlock (&global_lock); - return EINVAL; - } + err = - (*user->sock->ops->listen) (user->sock, queue_limit); + __mutex_unlock (&global_lock); + + return err; } error_t @@ -113,48 +133,44 @@ S_socket_accept (struct sock_user *user, if (!user) return EOPNOTSUPP; - - mutex_lock (&global_lock); - become_task (user); - sock = user->sock; - newsock = 0; - err = 0; - if ((sock->state != SS_UNCONNECTED) - || (!(sock->flags & SO_ACCEPTCON))) - err = EINVAL; - else if (!(newsock = sock_alloc ())) + __mutex_lock (&global_lock); + + become_task (user); + + newsock = sock_alloc (); + if (!newsock) err = ENOMEM; - - if (err) - goto out; + else + { + newsock->type = sock->type; + + err = - (*sock->ops->dup) (newsock, sock); + if (!err) + err = - (*sock->ops->accept) (sock, newsock, sock->flags); + + if (!err) + /* In Linux there is a race here with the socket closing before the + ops->getname call we do in make_sockaddr_port. Since we still + have the world locked, this shouldn't be an issue for us. */ + err = make_sockaddr_port (newsock, 1, addr_port, addr_port_type); + + if (!err) + { + newuser = make_sock_user (newsock, user->isroot, 0, 1); + *new_port = ports_get_right (newuser); + *new_port_type = MACH_MSG_TYPE_MAKE_SEND; + ports_port_deref (newuser); + } + + if (err) + sock_release (newsock); + } + + __mutex_unlock (&global_lock); - newsock->type = sock->type; - newsock->ops = sock->ops; - - err = - (*sock->ops->dup) (newsock, sock); - if (err) - goto out; - - err = - (*sock->ops->accept) (sock, newsock, sock->userflags); - if (err) - goto out; - - err = make_sockaddr_port (newsock, 1, addr_port, addr_port_type); - if (err) - goto out; - - newuser = make_sock_user (newsock, user->isroot, 0); - *new_port = ports_get_right (newuser); - *new_port_type = MACH_MSG_TYPE_MAKE_SEND; - ports_port_deref (newuser); - - out: - if (err && newsock) - sock_release (newsock); - mutex_unlock (&global_lock); return err; } @@ -167,29 +183,18 @@ S_socket_connect (struct sock_user *user, if (!user || !addr) return EOPNOTSUPP; - + sock = user->sock; - - mutex_lock (&global_lock); + + __mutex_lock (&global_lock); become_task (user); - err = 0; - - if (sock->state == SS_CONNECTED - && sock->type != SOCK_DGRAM) - err = EISCONN; - else if (sock->state != SS_UNCONNECTED - && sock->state != SS_CONNECTING - && sock->state != SS_CONNECTED) - err = EINVAL; - - if (!err) - err = - (*sock->ops->connect) (sock, addr->address, addr->len, - sock->userflags); - - mutex_unlock (&global_lock); - + err = - (*sock->ops->connect) (sock, &addr->address, addr->address.sa_len, + sock->flags); + + __mutex_unlock (&global_lock); + /* MiG should do this for us, but it doesn't. */ if (!err) mach_port_deallocate (mach_task_self (), addr->pi.port_right); @@ -202,15 +207,18 @@ S_socket_bind (struct sock_user *user, struct sock_addr *addr) { error_t err; - + if (!user) return EOPNOTSUPP; - - mutex_lock (&global_lock); + if (! addr) + return EADDRNOTAVAIL; + + __mutex_lock (&global_lock); become_task (user); - err = - (*user->sock->ops->bind) (user->sock, addr->address, addr->len); - mutex_unlock (&global_lock); - + err = - (*user->sock->ops->bind) (user->sock, + &addr->address, addr->address.sa_len); + __mutex_unlock (&global_lock); + /* MiG should do this for us, but it doesn't. */ if (!err) mach_port_deallocate (mach_task_self (), addr->pi.port_right); @@ -225,11 +233,11 @@ S_socket_name (struct sock_user *user, { if (!user) return EOPNOTSUPP; - - mutex_lock (&global_lock); + + __mutex_lock (&global_lock); become_task (user); make_sockaddr_port (user->sock, 0, addr_port, addr_port_name); - mutex_unlock (&global_lock); + __mutex_unlock (&global_lock); return 0; } @@ -242,12 +250,12 @@ S_socket_peername (struct sock_user *user, if (!user) return EOPNOTSUPP; - - mutex_lock (&global_lock); + + __mutex_lock (&global_lock); become_task (user); err = make_sockaddr_port (user->sock, 1, addr_port, addr_port_name); - mutex_unlock (&global_lock); - + __mutex_unlock (&global_lock); + return err; } @@ -256,11 +264,11 @@ S_socket_connect2 (struct sock_user *user1, struct sock_user *user2) { error_t err; - + if (!user1 || !user2) return EOPNOTSUPP; - - mutex_lock (&global_lock); + + __mutex_lock (&global_lock); become_task (user1); @@ -271,16 +279,8 @@ S_socket_connect2 (struct sock_user *user1, err = EISCONN; else err = - (*user1->sock->ops->socketpair) (user1->sock, user2->sock); - - if (!err) - { - user1->sock->conn = user2->sock; - user2->sock->conn = user1->sock; - user1->sock->state = SS_CONNECTED; - user2->sock->state = SS_CONNECTED; - } - - mutex_unlock (&global_lock); + + __mutex_unlock (&global_lock); /* MiG should do this for us, but it doesn't. */ if (!err) @@ -297,23 +297,31 @@ S_socket_create_address (mach_port_t server, mach_port_t *addr_port, mach_msg_type_name_t *addr_port_type) { - struct sock_addr *addr; error_t err; - - if (sockaddr_type != AF_INET) + struct sock_addr *addrstruct; + const struct sockaddr *const sa = (void *) data; + + if (sockaddr_type != AF_INET && sockaddr_type != AF_INET6 + && sockaddr_type != AF_UNSPEC) return EAFNOSUPPORT; - - err = ports_create_port (addrport_class, pfinet_bucket, - sizeof (struct sock_addr) + data_len, &addr); + if (sa->sa_family != sockaddr_type + || data_len < offsetof (struct sockaddr, sa_data)) + return EINVAL; + + err = ports_create_port (addrport_class, pfinet_bucket, + (offsetof (struct sock_addr, address) + + data_len), &addrstruct); if (err) return err; - - addr->len = data_len; - bcopy (data, addr->address, data_len); - - *addr_port = ports_get_right (addr); + + memcpy (&addrstruct->address, data, data_len); + + /* BSD does not require incoming sa_len to be set, so we don't either. */ + addrstruct->address.sa_len = data_len; + + *addr_port = ports_get_right (addrstruct); *addr_port_type = MACH_MSG_TYPE_MAKE_SEND; - ports_port_deref (addr); + ports_port_deref (addrstruct); return 0; } @@ -334,12 +342,13 @@ S_socket_whatis_address (struct sock_addr *addr, { if (!addr) return EOPNOTSUPP; - - *type = AF_INET; - if (*datalen < addr->len) - vm_allocate (mach_task_self (), (vm_address_t *) data, addr->len, 1); - bcopy (addr->address, *data, addr->len); - *datalen = addr->len; + + *type = addr->address.sa_family; + if (*datalen < addr->address.sa_len) + *data = mmap (0, addr->address.sa_len, + PROT_READ|PROT_WRITE, MAP_ANON, 0, 0); + *datalen = addr->address.sa_len; + memcpy (*data, &addr->address, addr->address.sa_len); return 0; } @@ -349,15 +358,15 @@ S_socket_shutdown (struct sock_user *user, int direction) { error_t err; - + if (!user) return EOPNOTSUPP; - - mutex_lock (&global_lock); + + __mutex_lock (&global_lock); become_task (user); err = - (*user->sock->ops->shutdown) (user->sock, direction); - mutex_unlock (&global_lock); - + __mutex_unlock (&global_lock); + return err; } @@ -366,9 +375,28 @@ S_socket_getopt (struct sock_user *user, int level, int option, char **data, - u_int *datalen) + size_t *datalen) { - return EOPNOTSUPP; + error_t err; + + if (! user) + return EOPNOTSUPP; + + __mutex_lock (&global_lock); + become_task (user); + + int len = *datalen; + err = - (level == SOL_SOCKET ? sock_getsockopt + : *user->sock->ops->getsockopt) + (user->sock, level, option, *data, &len); + *datalen = len; + + __mutex_unlock (&global_lock); + + /* XXX option data not properly typed, needs byte-swapping for netmsgserver. + Most options are ints, some like IP_OPTIONS are bytesex-neutral. */ + + return err; } error_t @@ -376,20 +404,24 @@ S_socket_setopt (struct sock_user *user, int level, int option, char *data, - u_int datalen) + size_t datalen) { error_t err; if (! user) return EOPNOTSUPP; - - mutex_lock (&global_lock); + + /* XXX option data not properly typed, needs byte-swapping for netmsgserver. + Most options are ints, some like IP_OPTIONS are bytesex-neutral. */ + + __mutex_lock (&global_lock); become_task (user); - err = - - (user->sock->ops->setsockopt)(user->sock, level, option, data, datalen); + err = - (level == SOL_SOCKET ? sock_setsockopt + : *user->sock->ops->setsockopt) + (user->sock, level, option, data, datalen); - mutex_unlock (&global_lock); + __mutex_unlock (&global_lock); return err; } @@ -399,38 +431,36 @@ S_socket_send (struct sock_user *user, struct sock_addr *addr, int flags, char *data, - u_int datalen, + size_t datalen, mach_port_t *ports, - u_int nports, + size_t nports, char *control, - u_int controllen, + size_t controllen, mach_msg_type_number_t *amount) { int sent; - + struct iovec iov = { data, datalen }; + struct msghdr m = { msg_name: addr ? &addr->address : 0, + msg_namelen: addr ? addr->address.sa_len : 0, + msg_flags: flags, + msg_controllen: 0, msg_iov: &iov, msg_iovlen: 1 }; + if (!user) return EOPNOTSUPP; - + /* Don't do this yet, it's too bizarre to think about right now. */ if (nports != 0 || controllen != 0) return EINVAL; - - mutex_lock (&global_lock); + __mutex_lock (&global_lock); become_task (user); - - if (addr) - sent = (*user->sock->ops->sendto) (user->sock, data, datalen, - user->sock->userflags, flags, - addr->address, addr->len); - else - sent = (*user->sock->ops->send) (user->sock, data, datalen, - user->sock->userflags, flags); - - mutex_unlock (&global_lock); - + if (user->sock->flags & O_NONBLOCK) + m.msg_flags |= MSG_DONTWAIT; + sent = (*user->sock->ops->sendmsg) (user->sock, &m, datalen, 0); + __mutex_unlock (&global_lock); + /* MiG should do this for us, but it doesn't. */ - if (sent >= 0) + if (addr && sent >= 0) mach_port_deallocate (mach_task_self (), addr->pi.port_right); if (sent >= 0) @@ -448,59 +478,67 @@ S_socket_recv (struct sock_user *user, mach_msg_type_name_t *addrporttype, int flags, char **data, - u_int *datalen, + size_t *datalen, mach_port_t **ports, mach_msg_type_name_t *portstype, - u_int *nports, + size_t *nports, char **control, - u_int *controllen, + size_t *controllen, int *outflags, mach_msg_type_number_t amount) { - int recvd; - char addr[128]; - size_t addrlen = sizeof addr; - int didalloc = 0; + error_t err; + union { struct sockaddr_storage storage; struct sockaddr sa; } addr; + int alloced = 0; + struct iovec iov; + struct msghdr m = { msg_name: &addr.sa, msg_namelen: sizeof addr, + msg_controllen: 0, msg_iov: &iov, msg_iovlen: 1 }; if (!user) return EOPNOTSUPP; - - /* For unused recvmsg interface */ - *nports = 0; - *portstype = MACH_MSG_TYPE_COPY_SEND; - *controllen = 0; - *outflags = 0; - - /* Instead of this, we should peek at the socket and only allocate - as much as necessary. */ - if (*datalen < amount) + + /* Instead of this, we should peek and the socket and only + allocate as much as necessary. */ + if (amount > *datalen) { - vm_allocate (mach_task_self (), (vm_address_t *) data, amount, 1); - didalloc = 1; + *data = mmap (0, amount, PROT_READ|PROT_WRITE, MAP_ANON, 0, 0); + if (*data == MAP_FAILED) + /* Should check whether errno is indeed ENOMEM -- + but this can't be done in a straightforward way, + because the glue headers #undef errno. */ + return ENOMEM; + alloced = 1; } - - mutex_lock (&global_lock); - become_task (user); - - recvd = (*user->sock->ops->recvfrom) (user->sock, *data, amount, 0, flags, - (struct sockaddr *)addr, &addrlen); - - mutex_unlock (&global_lock); - if (recvd < 0) - return (error_t)-recvd; + iov.iov_base = *data; + iov.iov_len = amount; - *datalen = recvd; + __mutex_lock (&global_lock); + become_task (user); + if (user->sock->flags & O_NONBLOCK) + flags |= MSG_DONTWAIT; + err = (*user->sock->ops->recvmsg) (user->sock, &m, amount, flags, 0); + __mutex_unlock (&global_lock); - if (didalloc && round_page (*datalen) < round_page (amount)) - vm_deallocate (mach_task_self (), - (vm_address_t) (*data + round_page (*datalen)), - round_page (amount) - round_page (*datalen)); + if (err < 0) + err = -err; + else + { + *datalen = err; + if (alloced && round_page (*datalen) < round_page (amount)) + munmap (*data + round_page (*datalen), + round_page (amount) - round_page (*datalen)); + err = S_socket_create_address (0, addr.sa.sa_family, + (void *) &addr.sa, m.msg_namelen, + addrport, addrporttype); + if (err && alloced) + munmap (*data, *datalen); + + *outflags = m.msg_flags; + *nports = 0; + *portstype = MACH_MSG_TYPE_COPY_SEND; + *controllen = 0; + } - - S_socket_create_address (0, AF_INET, addr, addrlen, addrport, - addrporttype); - - return 0; + return err; } - |