2 * Server-side socket management
4 * Copyright (C) 1999 Marcus Meissner, Ove Kåven
6 * FIXME: we use read|write access in all cases. Shouldn't we depend that
7 * on the access of the current handle?
18 #ifdef HAVE_SYS_ERRNO_H
19 # include <sys/errno.h>
22 #include <sys/types.h>
23 #ifdef HAVE_SYS_SOCKET_H
24 # include <sys/socket.h>
26 #include <sys/ioctl.h>
27 #ifdef HAVE_SYS_FILIO_H
28 # include <sys/filio.h>
40 /* To avoid conflicts with the Unix socket headers. Plus we only need a few
48 struct object obj; /* object header */
49 unsigned int state; /* status bits */
50 unsigned int mask; /* event mask */
51 unsigned int hmask; /* held (blocked) events */
52 unsigned int pmask; /* pending events */
53 struct event *event; /* event object */
54 int errors[FD_MAX_EVENTS]; /* event errors */
57 static void sock_dump( struct object *obj, int verbose );
58 static int sock_signaled( struct object *obj, struct thread *thread );
59 static int sock_get_poll_events( struct object *obj );
60 static void sock_poll_event( struct object *obj, int event );
61 static int sock_get_fd( struct object *obj );
62 static int sock_get_info( struct object *obj, struct get_file_info_request *req );
63 static void sock_destroy( struct object *obj );
64 static int sock_get_error( int err );
65 static void sock_set_error(void);
67 static const struct object_ops sock_ops =
69 sizeof(struct sock), /* size */
71 add_queue, /* add_queue */
72 remove_queue, /* remove_queue */
73 sock_signaled, /* signaled */
74 no_satisfied, /* satisfied */
75 sock_get_poll_events, /* get_poll_events */
76 sock_poll_event, /* poll_event */
77 sock_get_fd, /* get_fd */
79 sock_get_info, /* get_file_info */
80 sock_destroy /* destroy */
83 static void sock_reselect( struct sock *sock )
85 int ev = sock_get_poll_events( &sock->obj );
89 fprintf(stderr,"sock_reselect(%d): new mask %x\n", sock->obj.fd, ev);
91 if (sock->obj.select == -1) {
92 /* previously unconnected socket, is this reselect supposed to connect it? */
93 if (!(sock->state & ~FD_WINE_NONBLOCKING)) return;
94 /* ok, it is, attach it to the wineserver's main poll loop */
95 add_select_user( &sock->obj );
97 /* update condition mask */
98 set_select_events( &sock->obj, ev );
100 /* check whether condition is satisfied already */
101 pfd.fd = sock->obj.fd;
106 sock_poll_event( &sock->obj, pfd.revents);
109 inline static int sock_error(int s)
111 unsigned int optval = 0, optlen;
113 optlen = sizeof(optval);
114 getsockopt(s, SOL_SOCKET, SO_ERROR, (void *) &optval, &optlen);
115 return optval ? sock_get_error(optval) : 0;
118 static void sock_poll_event( struct object *obj, int event )
120 struct sock *sock = (struct sock *)obj;
122 assert( sock->obj.ops == &sock_ops );
124 fprintf(stderr, "socket %d select event: %x\n", sock->obj.fd, event);
125 if (sock->state & FD_CONNECT)
130 /* we got connected */
131 sock->state |= FD_WINE_CONNECTED|FD_READ|FD_WRITE;
132 sock->state &= ~FD_CONNECT;
133 sock->pmask |= FD_CONNECT;
134 sock->errors[FD_CONNECT_BIT] = 0;
136 fprintf(stderr, "socket %d connection success\n", sock->obj.fd);
138 else if (event & (POLLERR|POLLHUP))
140 /* we didn't get connected? */
141 sock->state &= ~FD_CONNECT;
142 sock->pmask |= FD_CONNECT;
143 sock->errors[FD_CONNECT_BIT] = sock_error( sock->obj.fd );
145 fprintf(stderr, "socket %d connection failure\n", sock->obj.fd);
148 if (sock->state & FD_WINE_LISTENING)
153 /* incoming connection */
154 sock->pmask |= FD_ACCEPT;
155 sock->errors[FD_ACCEPT_BIT] = 0;
156 sock->hmask |= FD_ACCEPT;
158 else if (event & (POLLERR|POLLHUP))
160 /* failed incoming connection? */
161 sock->pmask |= FD_ACCEPT;
162 sock->errors[FD_ACCEPT_BIT] = sock_error( sock->obj.fd );
163 sock->hmask |= FD_ACCEPT;
167 /* normal data flow */
172 /* Linux 2.4 doesn't report POLLHUP if only one side of the socket
173 * has been closed, so we need to check for it explicitly here */
174 if (!recv( sock->obj.fd, &dummy, 1, MSG_PEEK )) event = POLLHUP;
178 sock->pmask |= FD_READ;
179 sock->hmask |= FD_READ;
180 sock->errors[FD_READ_BIT] = 0;
182 fprintf(stderr, "socket %d is readable\n", sock->obj.fd );
187 sock->pmask |= FD_WRITE;
188 sock->hmask |= FD_WRITE;
189 sock->errors[FD_WRITE_BIT] = 0;
191 fprintf(stderr, "socket %d is writable\n", sock->obj.fd);
195 sock->pmask |= FD_OOB;
196 sock->hmask |= FD_OOB;
197 sock->errors[FD_OOB_BIT] = 0;
199 fprintf(stderr, "socket %d got OOB data\n", sock->obj.fd);
201 if (((event & POLLERR) || ((event & (POLLIN|POLLHUP)) == POLLHUP))
202 && (sock->state & (FD_READ|FD_WRITE))) {
204 sock->errors[FD_CLOSE_BIT] = sock_error( sock->obj.fd );
205 sock->state &= ~(FD_WINE_CONNECTED|FD_READ|FD_WRITE);
206 sock->pmask |= FD_CLOSE;
208 fprintf(stderr, "socket %d aborted by error %d\n",
209 sock->obj.fd, sock->errors[FD_CLOSE_BIT]);
213 if (event & (POLLERR|POLLHUP))
214 set_select_events( &sock->obj, -1 );
216 sock_reselect( sock );
217 /* wake up anyone waiting for whatever just happened */
218 emask = sock->pmask & sock->mask;
219 if (debug_level && emask)
220 fprintf(stderr, "socket %d pending events: %x\n", sock->obj.fd, emask);
221 if (emask && sock->event) {
222 if (debug_level) fprintf(stderr, "signalling event ptr %p\n", sock->event);
223 set_event(sock->event);
226 /* if anyone is stupid enough to wait on the socket object itself,
227 * maybe we should wake them up too, just in case? */
228 wake_up( &sock->obj, 0 );
231 static void sock_dump( struct object *obj, int verbose )
233 struct sock *sock = (struct sock *)obj;
234 assert( obj->ops == &sock_ops );
235 printf( "Socket fd=%d, state=%x, mask=%x, pending=%x, held=%x\n",
236 sock->obj.fd, sock->state,
237 sock->mask, sock->pmask, sock->hmask );
240 static int sock_signaled( struct object *obj, struct thread *thread )
242 struct sock *sock = (struct sock *)obj;
243 assert( obj->ops == &sock_ops );
245 return check_select_events( sock->obj.fd, sock_get_poll_events( &sock->obj ) );
248 static int sock_get_poll_events( struct object *obj )
250 struct sock *sock = (struct sock *)obj;
251 unsigned int mask = sock->mask & sock->state & ~sock->hmask;
254 assert( obj->ops == &sock_ops );
256 if (sock->state & FD_CONNECT)
257 /* connecting, wait for writable */
259 if (sock->state & FD_WINE_LISTENING)
260 /* listening, wait for readable */
261 return (sock->hmask & FD_ACCEPT) ? 0 : POLLIN;
263 if (mask & FD_READ) ev |= POLLIN | POLLPRI;
264 if (mask & FD_WRITE) ev |= POLLOUT;
268 static int sock_get_fd( struct object *obj )
270 struct sock *sock = (struct sock *)obj;
271 assert( obj->ops == &sock_ops );
275 static int sock_get_info( struct object *obj, struct get_file_info_request *req )
279 req->type = FILE_TYPE_PIPE;
281 req->access_time = 0;
290 return FD_TYPE_DEFAULT;
293 static void sock_destroy( struct object *obj )
295 struct sock *sock = (struct sock *)obj;
296 assert( obj->ops == &sock_ops );
298 /* FIXME: special socket shutdown stuff? */
301 /* if the service thread was waiting for the event object,
302 * we should now signal it, to let the service thread
303 * object detect that it is now orphaned... */
304 if (sock->mask & FD_WINE_SERVEVENT)
305 set_event( sock->event );
306 /* we're through with it */
307 release_object( sock->event );
311 /* create a new and unconnected socket */
312 static struct object *create_socket( int family, int type, int protocol )
317 sockfd = socket( family, type, protocol );
319 fprintf(stderr,"socket(%d,%d,%d)=%d\n",family,type,protocol,sockfd);
324 fcntl(sockfd, F_SETFL, O_NONBLOCK); /* make socket nonblocking */
325 if (!(sock = alloc_object( &sock_ops, -1 ))) return NULL;
326 sock->obj.fd = sockfd;
327 sock->state = (type != SOCK_STREAM) ? (FD_READ|FD_WRITE) : 0;
332 sock_reselect( sock );
337 /* accept a socket (creates a new fd) */
338 static struct object *accept_socket( handle_t handle )
340 struct sock *acceptsock;
343 struct sockaddr saddr;
346 sock=(struct sock*)get_handle_obj(current->process,handle,
347 GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
350 /* Try to accept(2). We can't be safe that this an already connected socket
351 * or that accept() is allowed on it. In those cases we will get -1/errno
354 slen = sizeof(saddr);
355 acceptfd = accept(sock->obj.fd,&saddr,&slen);
358 release_object( sock );
361 if (!(acceptsock = alloc_object( &sock_ops, -1 )))
363 release_object( sock );
367 /* newly created socket gets the same properties of the listening socket */
368 fcntl(acceptfd, F_SETFL, O_NONBLOCK); /* make socket nonblocking */
369 acceptsock->obj.fd = acceptfd;
370 acceptsock->state = FD_WINE_CONNECTED|FD_READ|FD_WRITE;
371 if (sock->state & FD_WINE_NONBLOCKING)
372 acceptsock->state |= FD_WINE_NONBLOCKING;
373 acceptsock->mask = sock->mask;
374 acceptsock->hmask = 0;
375 acceptsock->pmask = 0;
376 acceptsock->event = NULL;
377 if (sock->event && !(sock->mask & FD_WINE_SERVEVENT))
378 acceptsock->event = (struct event *)grab_object( sock->event );
380 sock_reselect( acceptsock );
382 sock->pmask &= ~FD_ACCEPT;
383 sock->hmask &= ~FD_ACCEPT;
384 sock_reselect( sock );
385 release_object( sock );
386 return &acceptsock->obj;
389 /* set the last error depending on errno */
390 static int sock_get_error( int err )
394 case EINTR: return WSAEINTR; break;
395 case EBADF: return WSAEBADF; break;
397 case EACCES: return WSAEACCES; break;
398 case EFAULT: return WSAEFAULT; break;
399 case EINVAL: return WSAEINVAL; break;
400 case EMFILE: return WSAEMFILE; break;
401 case EWOULDBLOCK: return WSAEWOULDBLOCK; break;
402 case EINPROGRESS: return WSAEINPROGRESS; break;
403 case EALREADY: return WSAEALREADY; break;
404 case ENOTSOCK: return WSAENOTSOCK; break;
405 case EDESTADDRREQ: return WSAEDESTADDRREQ; break;
406 case EMSGSIZE: return WSAEMSGSIZE; break;
407 case EPROTOTYPE: return WSAEPROTOTYPE; break;
408 case ENOPROTOOPT: return WSAENOPROTOOPT; break;
409 case EPROTONOSUPPORT: return WSAEPROTONOSUPPORT; break;
410 case ESOCKTNOSUPPORT: return WSAESOCKTNOSUPPORT; break;
411 case EOPNOTSUPP: return WSAEOPNOTSUPP; break;
412 case EPFNOSUPPORT: return WSAEPFNOSUPPORT; break;
413 case EAFNOSUPPORT: return WSAEAFNOSUPPORT; break;
414 case EADDRINUSE: return WSAEADDRINUSE; break;
415 case EADDRNOTAVAIL: return WSAEADDRNOTAVAIL; break;
416 case ENETDOWN: return WSAENETDOWN; break;
417 case ENETUNREACH: return WSAENETUNREACH; break;
418 case ENETRESET: return WSAENETRESET; break;
419 case ECONNABORTED: return WSAECONNABORTED; break;
421 case ECONNRESET: return WSAECONNRESET; break;
422 case ENOBUFS: return WSAENOBUFS; break;
423 case EISCONN: return WSAEISCONN; break;
424 case ENOTCONN: return WSAENOTCONN; break;
425 case ESHUTDOWN: return WSAESHUTDOWN; break;
426 case ETOOMANYREFS: return WSAETOOMANYREFS; break;
427 case ETIMEDOUT: return WSAETIMEDOUT; break;
428 case ECONNREFUSED: return WSAECONNREFUSED; break;
429 case ELOOP: return WSAELOOP; break;
430 case ENAMETOOLONG: return WSAENAMETOOLONG; break;
431 case EHOSTDOWN: return WSAEHOSTDOWN; break;
432 case EHOSTUNREACH: return WSAEHOSTUNREACH; break;
433 case ENOTEMPTY: return WSAENOTEMPTY; break;
435 case EPROCLIM: return WSAEPROCLIM; break;
438 case EUSERS: return WSAEUSERS; break;
441 case EDQUOT: return WSAEDQUOT; break;
444 case ESTALE: return WSAESTALE; break;
447 case EREMOTE: return WSAEREMOTE; break;
449 default: errno=err; perror("sock_set_error"); return ERROR_UNKNOWN; break;
453 /* set the last error depending on errno */
454 static void sock_set_error(void)
456 set_error( sock_get_error( errno ) );
459 /* create a socket */
460 DECL_HANDLER(create_socket)
465 if ((obj = create_socket( req->family, req->type, req->protocol )) != NULL)
467 req->handle = alloc_handle( current->process, obj, req->access, req->inherit );
468 release_object( obj );
472 /* accept a socket */
473 DECL_HANDLER(accept_socket)
478 if ((obj = accept_socket( req->lhandle )) != NULL)
480 req->handle = alloc_handle( current->process, obj, req->access, req->inherit );
481 release_object( obj );
485 /* set socket event parameters */
486 DECL_HANDLER(set_socket_event)
489 struct event *oevent;
492 sock=(struct sock*)get_handle_obj(current->process,req->handle,GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
495 oevent = sock->event;
497 sock->mask = req->mask;
498 sock->event = get_event_obj( current->process, req->event, EVENT_MODIFY_STATE );
499 if (debug_level && sock->event) fprintf(stderr, "event ptr: %p\n", sock->event);
500 sock_reselect( sock );
502 sock->state |= FD_WINE_NONBLOCKING;
504 /* if a network event is pending, signal the event object
505 it is possible that FD_CONNECT or FD_ACCEPT network events has happened
506 before a WSAEventSelect() was done on it.
507 (when dealing with Asynchronous socket) */
508 if (sock->pmask & sock->mask)
509 set_event(sock->event);
513 if ((oevent != sock->event) && (omask & FD_WINE_SERVEVENT))
514 /* if the service thread was waiting for the old event object,
515 * we should now signal it, to let the service thread
516 * object detect that it is now orphaned... */
518 /* we're through with it */
519 release_object( oevent );
521 release_object( &sock->obj );
524 /* get socket event parameters */
525 DECL_HANDLER(get_socket_event)
530 sock=(struct sock*)get_handle_obj(current->process,req->handle,GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
536 set_error(WSAENOTSOCK);
539 req->mask = sock->mask;
540 req->pmask = sock->pmask;
541 req->state = sock->state;
542 size = min( get_req_data_size(req), sizeof(sock->errors) );
543 memcpy( get_req_data(req), sock->errors, size );
544 set_req_data_size( req, size );
550 struct event *sevent = get_event_obj(current->process, req->s_event, 0);
551 if (sevent == sock->event)
553 release_object( sevent );
559 struct event *cevent = get_event_obj(current->process, req->c_event, EVENT_MODIFY_STATE);
560 reset_event( cevent );
561 release_object( cevent );
564 sock_reselect( sock );
566 else set_error(WSAEINVAL);
568 release_object( &sock->obj );
571 /* re-enable pending socket events */
572 DECL_HANDLER(enable_socket_event)
576 sock=(struct sock*)get_handle_obj(current->process,req->handle,GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
579 sock->pmask &= ~req->mask; /* is this safe? */
580 sock->hmask &= ~req->mask;
581 sock->state |= req->sstate;
582 sock->state &= ~req->cstate;
583 sock_reselect( sock );
585 /* service trigger */
586 if (req->mask & FD_WINE_SERVEVENT)
588 sock->pmask |= FD_WINE_SERVEVENT;
590 if (debug_level) fprintf(stderr, "signalling service event ptr %p\n", sock->event);
591 set_event(sock->event);
595 release_object( &sock->obj );