blob: 070146d4ca117bc701b5851d0ed17524ba7efb12 [file] [log] [blame]
Ove Kaaven019211f1999-10-13 16:05:37 +00001/*
2 * Server-side socket management
3 *
4 * Copyright (C) 1999 Marcus Meissner, Ove Kåven
5 *
6 * FIXME: we use read|write access in all cases. Shouldn't we depend that
7 * on the access of the current handle?
8 */
9
Patrik Stridvall96336321999-10-24 22:13:47 +000010#include "config.h"
11
Ove Kaaven019211f1999-10-13 16:05:37 +000012#include <assert.h>
13#include <fcntl.h>
14#include <stdio.h>
15#include <string.h>
16#include <stdlib.h>
17#include <errno.h>
Patrik Stridvall96336321999-10-24 22:13:47 +000018#ifdef HAVE_SYS_ERRNO_H
19# include <sys/errno.h>
20#endif
Ove Kaaven019211f1999-10-13 16:05:37 +000021#include <sys/time.h>
22#include <sys/types.h>
Patrik Stridvall96336321999-10-24 22:13:47 +000023#ifdef HAVE_SYS_SOCKET_H
24# include <sys/socket.h>
25#endif
Ove Kaaven019211f1999-10-13 16:05:37 +000026#include <sys/ioctl.h>
Patrik Stridvall96336321999-10-24 22:13:47 +000027#ifdef HAVE_SYS_FILIO_H
28# include <sys/filio.h>
29#endif
Ove Kaaven019211f1999-10-13 16:05:37 +000030#include <time.h>
31#include <unistd.h>
32
33#include "winerror.h"
34#include "winbase.h"
35#include "winsock2.h"
36#include "process.h"
37#include "handle.h"
38#include "thread.h"
39#include "request.h"
40
41struct sock
42{
43 struct object obj; /* object header */
Ove Kaaven019211f1999-10-13 16:05:37 +000044 unsigned int state; /* status bits */
45 unsigned int mask; /* event mask */
46 unsigned int hmask; /* held (blocked) events */
47 unsigned int pmask; /* pending events */
48 struct event *event; /* event object */
49 int errors[FD_MAX_EVENTS]; /* event errors */
50};
51
52static void sock_dump( struct object *obj, int verbose );
Ove Kaaven019211f1999-10-13 16:05:37 +000053static int sock_signaled( struct object *obj, struct thread *thread );
Alexandre Julliard1dca5e22000-01-01 00:56:27 +000054static int sock_get_poll_events( struct object *obj );
55static void sock_poll_event( struct object *obj, int event );
Ove Kaaven019211f1999-10-13 16:05:37 +000056static int sock_get_fd( struct object *obj );
57static void sock_destroy( struct object *obj );
Ove Kaavencb98a6e2000-03-26 18:21:16 +000058static int sock_get_error( int err );
Ove Kaaven019211f1999-10-13 16:05:37 +000059static void sock_set_error(void);
60
61static const struct object_ops sock_ops =
62{
Alexandre Julliard1dca5e22000-01-01 00:56:27 +000063 sizeof(struct sock), /* size */
64 sock_dump, /* dump */
65 add_queue, /* add_queue */
66 remove_queue, /* remove_queue */
67 sock_signaled, /* signaled */
68 no_satisfied, /* satisfied */
69 sock_get_poll_events, /* get_poll_events */
70 sock_poll_event, /* poll_event */
Alexandre Julliard1ab243b2000-12-19 02:12:45 +000071 sock_get_fd, /* get_fd */
Alexandre Julliard1dca5e22000-01-01 00:56:27 +000072 no_flush, /* flush */
73 no_get_file_info, /* get_file_info */
74 sock_destroy /* destroy */
Ove Kaaven019211f1999-10-13 16:05:37 +000075};
76
Ove Kaaven019211f1999-10-13 16:05:37 +000077static void sock_reselect( struct sock *sock )
78{
Alexandre Julliard1dca5e22000-01-01 00:56:27 +000079 int ev = sock_get_poll_events( &sock->obj );
Ove Kaaven77c30552000-03-25 21:41:43 +000080 struct pollfd pfd;
81
Ove Kaavenf45608f1999-10-23 16:53:34 +000082 if (debug_level)
Alexandre Julliard1dca5e22000-01-01 00:56:27 +000083 fprintf(stderr,"sock_reselect(%d): new mask %x\n", sock->obj.fd, ev);
Ove Kaaven7a0f96c2000-09-06 19:40:23 +000084
85 if (sock->obj.select == -1) {
86 /* previously unconnected socket, is this reselect supposed to connect it? */
Daniel Walkerc86517f2001-08-23 23:25:33 +000087 if (!(sock->state & ~WS_FD_NONBLOCKING)) return;
Ove Kaaven7a0f96c2000-09-06 19:40:23 +000088 /* ok, it is, attach it to the wineserver's main poll loop */
89 add_select_user( &sock->obj );
90 }
91 /* update condition mask */
Alexandre Julliard1dca5e22000-01-01 00:56:27 +000092 set_select_events( &sock->obj, ev );
Ove Kaaven77c30552000-03-25 21:41:43 +000093
94 /* check whether condition is satisfied already */
95 pfd.fd = sock->obj.fd;
96 pfd.events = ev;
97 pfd.revents = 0;
98 poll( &pfd, 1, 0 );
Ove Kaavencb98a6e2000-03-26 18:21:16 +000099 if (pfd.revents)
Ove Kaaven77c30552000-03-25 21:41:43 +0000100 sock_poll_event( &sock->obj, pfd.revents);
Ove Kaaven019211f1999-10-13 16:05:37 +0000101}
102
103inline static int sock_error(int s)
104{
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000105 unsigned int optval = 0, optlen;
Ove Kaaven019211f1999-10-13 16:05:37 +0000106
107 optlen = sizeof(optval);
108 getsockopt(s, SOL_SOCKET, SO_ERROR, (void *) &optval, &optlen);
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000109 return optval ? sock_get_error(optval) : 0;
Ove Kaaven019211f1999-10-13 16:05:37 +0000110}
111
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000112static void sock_poll_event( struct object *obj, int event )
Ove Kaaven019211f1999-10-13 16:05:37 +0000113{
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000114 struct sock *sock = (struct sock *)obj;
Ove Kaaven019211f1999-10-13 16:05:37 +0000115 unsigned int emask;
116 assert( sock->obj.ops == &sock_ops );
Ove Kaavenf45608f1999-10-23 16:53:34 +0000117 if (debug_level)
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000118 fprintf(stderr, "socket %d select event: %x\n", sock->obj.fd, event);
Ove Kaaven019211f1999-10-13 16:05:37 +0000119 if (sock->state & WS_FD_CONNECT)
120 {
121 /* connecting */
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000122 if (event & POLLOUT)
Ove Kaaven019211f1999-10-13 16:05:37 +0000123 {
124 /* we got connected */
125 sock->state |= WS_FD_CONNECTED|WS_FD_READ|WS_FD_WRITE;
126 sock->state &= ~WS_FD_CONNECT;
127 sock->pmask |= FD_CONNECT;
128 sock->errors[FD_CONNECT_BIT] = 0;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000129 if (debug_level)
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000130 fprintf(stderr, "socket %d connection success\n", sock->obj.fd);
Ove Kaaven019211f1999-10-13 16:05:37 +0000131 }
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000132 else if (event & (POLLERR|POLLHUP))
Ove Kaaven019211f1999-10-13 16:05:37 +0000133 {
134 /* we didn't get connected? */
135 sock->state &= ~WS_FD_CONNECT;
136 sock->pmask |= FD_CONNECT;
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000137 sock->errors[FD_CONNECT_BIT] = sock_error( sock->obj.fd );
Ove Kaavenf45608f1999-10-23 16:53:34 +0000138 if (debug_level)
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000139 fprintf(stderr, "socket %d connection failure\n", sock->obj.fd);
Ove Kaaven019211f1999-10-13 16:05:37 +0000140 }
141 } else
142 if (sock->state & WS_FD_LISTENING)
143 {
144 /* listening */
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000145 if (event & POLLIN)
Ove Kaaven019211f1999-10-13 16:05:37 +0000146 {
147 /* incoming connection */
148 sock->pmask |= FD_ACCEPT;
149 sock->errors[FD_ACCEPT_BIT] = 0;
150 sock->hmask |= FD_ACCEPT;
151 }
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000152 else if (event & (POLLERR|POLLHUP))
Ove Kaaven019211f1999-10-13 16:05:37 +0000153 {
154 /* failed incoming connection? */
155 sock->pmask |= FD_ACCEPT;
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000156 sock->errors[FD_ACCEPT_BIT] = sock_error( sock->obj.fd );
Ove Kaaven019211f1999-10-13 16:05:37 +0000157 sock->hmask |= FD_ACCEPT;
158 }
159 } else
160 {
161 /* normal data flow */
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000162 if (event & POLLIN)
Ove Kaaven019211f1999-10-13 16:05:37 +0000163 {
Daniel Walkerc86517f2001-08-23 23:25:33 +0000164 char dummy;
165
166 /* Linux 2.4 doesn't report POLLHUP if only one side of the socket
167 * has been closed, so we need to check for it explicitly here */
168 if (!recv( sock->obj.fd, &dummy, 1, MSG_PEEK )) event = POLLHUP;
169 else
170 {
171 /* incoming data */
172 sock->pmask |= FD_READ;
173 sock->hmask |= FD_READ;
174 sock->errors[FD_READ_BIT] = 0;
175 if (debug_level)
176 fprintf(stderr, "socket %d is readable\n", sock->obj.fd );
177 }
Ove Kaaven019211f1999-10-13 16:05:37 +0000178 }
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000179 if (event & POLLOUT)
Ove Kaaven019211f1999-10-13 16:05:37 +0000180 {
181 sock->pmask |= FD_WRITE;
182 sock->hmask |= FD_WRITE;
183 sock->errors[FD_WRITE_BIT] = 0;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000184 if (debug_level)
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000185 fprintf(stderr, "socket %d is writable\n", sock->obj.fd);
186 }
187 if (event & POLLPRI)
188 {
189 sock->pmask |= FD_OOB;
190 sock->hmask |= FD_OOB;
Ove Kaaven77c30552000-03-25 21:41:43 +0000191 sock->errors[FD_OOB_BIT] = 0;
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000192 if (debug_level)
193 fprintf(stderr, "socket %d got OOB data\n", sock->obj.fd);
Ove Kaaven019211f1999-10-13 16:05:37 +0000194 }
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000195 if (((event & POLLERR) || ((event & (POLLIN|POLLHUP)) == POLLHUP))
196 && (sock->state & (WS_FD_READ|WS_FD_WRITE))) {
197 /* socket closing */
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000198 sock->errors[FD_CLOSE_BIT] = sock_error( sock->obj.fd );
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000199 sock->state &= ~(WS_FD_CONNECTED|WS_FD_READ|WS_FD_WRITE);
200 sock->pmask |= FD_CLOSE;
201 if (debug_level)
202 fprintf(stderr, "socket %d aborted by error %d\n",
203 sock->obj.fd, sock->errors[FD_CLOSE_BIT]);
Ove Kaaven019211f1999-10-13 16:05:37 +0000204 }
205 }
206
Ove Kaaven77c30552000-03-25 21:41:43 +0000207 if (event & (POLLERR|POLLHUP))
208 set_select_events( &sock->obj, -1 );
209 else
210 sock_reselect( sock );
Ove Kaaven019211f1999-10-13 16:05:37 +0000211 /* wake up anyone waiting for whatever just happened */
212 emask = sock->pmask & sock->mask;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000213 if (debug_level && emask)
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000214 fprintf(stderr, "socket %d pending events: %x\n", sock->obj.fd, emask);
Ove Kaavenf45608f1999-10-23 16:53:34 +0000215 if (emask && sock->event) {
216 if (debug_level) fprintf(stderr, "signalling event ptr %p\n", sock->event);
Ove Kaaven019211f1999-10-13 16:05:37 +0000217 set_event(sock->event);
Ove Kaavenf45608f1999-10-23 16:53:34 +0000218 }
Ove Kaaven019211f1999-10-13 16:05:37 +0000219
220 /* if anyone is stupid enough to wait on the socket object itself,
221 * maybe we should wake them up too, just in case? */
222 wake_up( &sock->obj, 0 );
223}
224
225static void sock_dump( struct object *obj, int verbose )
226{
227 struct sock *sock = (struct sock *)obj;
228 assert( obj->ops == &sock_ops );
Ove Kaavenf45608f1999-10-23 16:53:34 +0000229 printf( "Socket fd=%d, state=%x, mask=%x, pending=%x, held=%x\n",
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000230 sock->obj.fd, sock->state,
Ove Kaavenf45608f1999-10-23 16:53:34 +0000231 sock->mask, sock->pmask, sock->hmask );
Ove Kaaven019211f1999-10-13 16:05:37 +0000232}
233
Ove Kaaven019211f1999-10-13 16:05:37 +0000234static int sock_signaled( struct object *obj, struct thread *thread )
235{
236 struct sock *sock = (struct sock *)obj;
237 assert( obj->ops == &sock_ops );
238
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000239 return check_select_events( sock->obj.fd, sock_get_poll_events( &sock->obj ) );
240}
241
242static int sock_get_poll_events( struct object *obj )
243{
244 struct sock *sock = (struct sock *)obj;
245 unsigned int mask = sock->mask & sock->state & ~sock->hmask;
246 int ev = 0;
247
248 assert( obj->ops == &sock_ops );
249
250 if (sock->state & WS_FD_CONNECT)
251 /* connecting, wait for writable */
252 return POLLOUT;
253 if (sock->state & WS_FD_LISTENING)
254 /* listening, wait for readable */
255 return (sock->hmask & FD_ACCEPT) ? 0 : POLLIN;
256
257 if (mask & FD_READ) ev |= POLLIN | POLLPRI;
258 if (mask & FD_WRITE) ev |= POLLOUT;
259 return ev;
Ove Kaaven019211f1999-10-13 16:05:37 +0000260}
261
262static int sock_get_fd( struct object *obj )
263{
264 struct sock *sock = (struct sock *)obj;
Ove Kaaven019211f1999-10-13 16:05:37 +0000265 assert( obj->ops == &sock_ops );
Alexandre Julliard63411db2000-12-22 21:12:36 +0000266 return sock->obj.fd;
Ove Kaaven019211f1999-10-13 16:05:37 +0000267}
268
269static void sock_destroy( struct object *obj )
270{
271 struct sock *sock = (struct sock *)obj;
272 assert( obj->ops == &sock_ops );
273
Ove Kaaven019211f1999-10-13 16:05:37 +0000274 /* FIXME: special socket shutdown stuff? */
Ove Kaaven019211f1999-10-13 16:05:37 +0000275 if (sock->event)
276 {
277 /* if the service thread was waiting for the event object,
278 * we should now signal it, to let the service thread
279 * object detect that it is now orphaned... */
Ove Kaavenf45608f1999-10-23 16:53:34 +0000280 if (sock->mask & WS_FD_SERVEVENT)
281 set_event( sock->event );
Ove Kaaven019211f1999-10-13 16:05:37 +0000282 /* we're through with it */
283 release_object( sock->event );
284 }
Ove Kaaven019211f1999-10-13 16:05:37 +0000285}
286
287/* create a new and unconnected socket */
288static struct object *create_socket( int family, int type, int protocol )
289{
290 struct sock *sock;
Ove Kaaven3669b941999-11-07 05:23:02 +0000291 int sockfd;
Ove Kaaven019211f1999-10-13 16:05:37 +0000292
Ove Kaaven3669b941999-11-07 05:23:02 +0000293 sockfd = socket( family, type, protocol );
294 if (debug_level)
295 fprintf(stderr,"socket(%d,%d,%d)=%d\n",family,type,protocol,sockfd);
296 if (sockfd == -1) {
297 sock_set_error();
Ove Kaaven019211f1999-10-13 16:05:37 +0000298 return NULL;
Ove Kaaven3669b941999-11-07 05:23:02 +0000299 }
300 fcntl(sockfd, F_SETFL, O_NONBLOCK); /* make socket nonblocking */
Ove Kaaven7a0f96c2000-09-06 19:40:23 +0000301 if (!(sock = alloc_object( &sock_ops, -1 ))) return NULL;
302 sock->obj.fd = sockfd;
303 sock->state = (type != SOCK_STREAM) ? (WS_FD_READ|WS_FD_WRITE) : 0;
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000304 sock->mask = 0;
305 sock->hmask = 0;
306 sock->pmask = 0;
307 sock->event = NULL;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000308 sock_reselect( sock );
Ove Kaaven019211f1999-10-13 16:05:37 +0000309 clear_error();
310 return &sock->obj;
311}
312
313/* accept a socket (creates a new fd) */
Alexandre Julliard8081e5a2001-01-05 04:08:07 +0000314static struct object *accept_socket( handle_t handle )
Ove Kaaven019211f1999-10-13 16:05:37 +0000315{
316 struct sock *acceptsock;
317 struct sock *sock;
318 int acceptfd;
319 struct sockaddr saddr;
320 int slen;
321
322 sock=(struct sock*)get_handle_obj(current->process,handle,
323 GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
324 if (!sock)
325 return NULL;
326 /* Try to accept(2). We can't be safe that this an already connected socket
327 * or that accept() is allowed on it. In those cases we will get -1/errno
328 * return.
329 */
330 slen = sizeof(saddr);
Alexandre Julliard1dca5e22000-01-01 00:56:27 +0000331 acceptfd = accept(sock->obj.fd,&saddr,&slen);
Ove Kaaven019211f1999-10-13 16:05:37 +0000332 if (acceptfd==-1) {
333 sock_set_error();
334 release_object( sock );
335 return NULL;
336 }
Ove Kaaven7a0f96c2000-09-06 19:40:23 +0000337 if (!(acceptsock = alloc_object( &sock_ops, -1 )))
Ove Kaaven019211f1999-10-13 16:05:37 +0000338 {
339 release_object( sock );
340 return NULL;
341 }
342
Stephane Lussier0d5f1ab2000-09-27 22:27:33 +0000343 /* newly created socket gets the same properties of the listening socket */
344 fcntl(acceptfd, F_SETFL, O_NONBLOCK); /* make socket nonblocking */
Ove Kaaven7a0f96c2000-09-06 19:40:23 +0000345 acceptsock->obj.fd = acceptfd;
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000346 acceptsock->state = WS_FD_CONNECTED|WS_FD_READ|WS_FD_WRITE;
Stephane Lussier0d5f1ab2000-09-27 22:27:33 +0000347 if (sock->state & WS_FD_NONBLOCKING)
348 acceptsock->state |= WS_FD_NONBLOCKING;
Alexandre Julliard247b8ae1999-12-13 00:16:44 +0000349 acceptsock->mask = sock->mask;
350 acceptsock->hmask = 0;
351 acceptsock->pmask = 0;
352 acceptsock->event = NULL;
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000353 if (sock->event && !(sock->mask & WS_FD_SERVEVENT))
354 acceptsock->event = (struct event *)grab_object( sock->event );
Jeremy White942010a1999-11-07 19:15:19 +0000355
Ove Kaavenf45608f1999-10-23 16:53:34 +0000356 sock_reselect( acceptsock );
Ove Kaaven019211f1999-10-13 16:05:37 +0000357 clear_error();
358 sock->pmask &= ~FD_ACCEPT;
359 sock->hmask &= ~FD_ACCEPT;
Stephane Lussier21b099f2000-10-13 17:04:52 +0000360 sock_reselect( sock );
Ove Kaaven019211f1999-10-13 16:05:37 +0000361 release_object( sock );
362 return &acceptsock->obj;
363}
364
365/* set the last error depending on errno */
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000366static int sock_get_error( int err )
Ove Kaaven019211f1999-10-13 16:05:37 +0000367{
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000368 switch (err)
Ove Kaaven019211f1999-10-13 16:05:37 +0000369 {
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000370 case EINTR: return WSAEINTR; break;
371 case EBADF: return WSAEBADF; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000372 case EPERM:
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000373 case EACCES: return WSAEACCES; break;
374 case EFAULT: return WSAEFAULT; break;
375 case EINVAL: return WSAEINVAL; break;
376 case EMFILE: return WSAEMFILE; break;
377 case EWOULDBLOCK: return WSAEWOULDBLOCK; break;
378 case EINPROGRESS: return WSAEINPROGRESS; break;
379 case EALREADY: return WSAEALREADY; break;
380 case ENOTSOCK: return WSAENOTSOCK; break;
381 case EDESTADDRREQ: return WSAEDESTADDRREQ; break;
382 case EMSGSIZE: return WSAEMSGSIZE; break;
383 case EPROTOTYPE: return WSAEPROTOTYPE; break;
384 case ENOPROTOOPT: return WSAENOPROTOOPT; break;
385 case EPROTONOSUPPORT: return WSAEPROTONOSUPPORT; break;
386 case ESOCKTNOSUPPORT: return WSAESOCKTNOSUPPORT; break;
387 case EOPNOTSUPP: return WSAEOPNOTSUPP; break;
388 case EPFNOSUPPORT: return WSAEPFNOSUPPORT; break;
389 case EAFNOSUPPORT: return WSAEAFNOSUPPORT; break;
390 case EADDRINUSE: return WSAEADDRINUSE; break;
391 case EADDRNOTAVAIL: return WSAEADDRNOTAVAIL; break;
392 case ENETDOWN: return WSAENETDOWN; break;
393 case ENETUNREACH: return WSAENETUNREACH; break;
394 case ENETRESET: return WSAENETRESET; break;
395 case ECONNABORTED: return WSAECONNABORTED; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000396 case EPIPE:
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000397 case ECONNRESET: return WSAECONNRESET; break;
398 case ENOBUFS: return WSAENOBUFS; break;
399 case EISCONN: return WSAEISCONN; break;
400 case ENOTCONN: return WSAENOTCONN; break;
401 case ESHUTDOWN: return WSAESHUTDOWN; break;
402 case ETOOMANYREFS: return WSAETOOMANYREFS; break;
403 case ETIMEDOUT: return WSAETIMEDOUT; break;
404 case ECONNREFUSED: return WSAECONNREFUSED; break;
405 case ELOOP: return WSAELOOP; break;
406 case ENAMETOOLONG: return WSAENAMETOOLONG; break;
407 case EHOSTDOWN: return WSAEHOSTDOWN; break;
408 case EHOSTUNREACH: return WSAEHOSTUNREACH; break;
409 case ENOTEMPTY: return WSAENOTEMPTY; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000410#ifdef EPROCLIM
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000411 case EPROCLIM: return WSAEPROCLIM; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000412#endif
413#ifdef EUSERS
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000414 case EUSERS: return WSAEUSERS; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000415#endif
416#ifdef EDQUOT
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000417 case EDQUOT: return WSAEDQUOT; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000418#endif
419#ifdef ESTALE
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000420 case ESTALE: return WSAESTALE; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000421#endif
422#ifdef EREMOTE
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000423 case EREMOTE: return WSAEREMOTE; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000424#endif
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000425 default: errno=err; perror("sock_set_error"); return ERROR_UNKNOWN; break;
Ove Kaaven019211f1999-10-13 16:05:37 +0000426 }
427}
428
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000429/* set the last error depending on errno */
430static void sock_set_error(void)
431{
432 set_error( sock_get_error( errno ) );
433}
434
Ove Kaaven019211f1999-10-13 16:05:37 +0000435/* create a socket */
436DECL_HANDLER(create_socket)
437{
438 struct object *obj;
Ove Kaaven019211f1999-10-13 16:05:37 +0000439
Alexandre Julliard8081e5a2001-01-05 04:08:07 +0000440 req->handle = 0;
Ove Kaaven019211f1999-10-13 16:05:37 +0000441 if ((obj = create_socket( req->family, req->type, req->protocol )) != NULL)
442 {
Alexandre Julliard8081e5a2001-01-05 04:08:07 +0000443 req->handle = alloc_handle( current->process, obj, req->access, req->inherit );
Ove Kaaven019211f1999-10-13 16:05:37 +0000444 release_object( obj );
445 }
Ove Kaaven019211f1999-10-13 16:05:37 +0000446}
447
448/* accept a socket */
449DECL_HANDLER(accept_socket)
450{
451 struct object *obj;
Ove Kaaven019211f1999-10-13 16:05:37 +0000452
Alexandre Julliard8081e5a2001-01-05 04:08:07 +0000453 req->handle = 0;
Ove Kaaven019211f1999-10-13 16:05:37 +0000454 if ((obj = accept_socket( req->lhandle )) != NULL)
455 {
Alexandre Julliard8081e5a2001-01-05 04:08:07 +0000456 req->handle = alloc_handle( current->process, obj, req->access, req->inherit );
Ove Kaaven019211f1999-10-13 16:05:37 +0000457 release_object( obj );
458 }
Ove Kaaven019211f1999-10-13 16:05:37 +0000459}
460
461/* set socket event parameters */
462DECL_HANDLER(set_socket_event)
463{
464 struct sock *sock;
465 struct event *oevent;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000466 unsigned int omask;
Ove Kaaven019211f1999-10-13 16:05:37 +0000467
468 sock=(struct sock*)get_handle_obj(current->process,req->handle,GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
469 if (!sock)
470 return;
471 oevent = sock->event;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000472 omask = sock->mask;
Ove Kaaven019211f1999-10-13 16:05:37 +0000473 sock->mask = req->mask;
Ove Kaavenf45608f1999-10-23 16:53:34 +0000474 sock->event = get_event_obj( current->process, req->event, EVENT_MODIFY_STATE );
475 if (debug_level && sock->event) fprintf(stderr, "event ptr: %p\n", sock->event);
Ove Kaaven019211f1999-10-13 16:05:37 +0000476 sock_reselect( sock );
477 if (sock->mask)
478 sock->state |= WS_FD_NONBLOCKING;
Stephane Lussier56adb252000-07-16 18:14:01 +0000479
480 /* if a network event is pending, signal the event object
481 it is possible that FD_CONNECT or FD_ACCEPT network events has happened
482 before a WSAEventSelect() was done on it.
483 (when dealing with Asynchronous socket) */
484 if (sock->pmask & sock->mask)
485 set_event(sock->event);
486
Ove Kaaven019211f1999-10-13 16:05:37 +0000487 if (oevent)
488 {
Ove Kaavenf45608f1999-10-23 16:53:34 +0000489 if ((oevent != sock->event) && (omask & WS_FD_SERVEVENT))
Ove Kaaven019211f1999-10-13 16:05:37 +0000490 /* if the service thread was waiting for the old event object,
491 * we should now signal it, to let the service thread
492 * object detect that it is now orphaned... */
493 set_event( oevent );
494 /* we're through with it */
495 release_object( oevent );
496 }
497 release_object( &sock->obj );
498}
499
500/* get socket event parameters */
501DECL_HANDLER(get_socket_event)
502{
503 struct sock *sock;
Alexandre Julliard92643002000-08-31 01:59:51 +0000504 size_t size;
Ove Kaaven019211f1999-10-13 16:05:37 +0000505
506 sock=(struct sock*)get_handle_obj(current->process,req->handle,GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
507 if (!sock)
508 {
509 req->mask = 0;
510 req->pmask = 0;
511 req->state = 0;
512 set_error(WSAENOTSOCK);
513 return;
514 }
515 req->mask = sock->mask;
516 req->pmask = sock->pmask;
517 req->state = sock->state;
Alexandre Julliard92643002000-08-31 01:59:51 +0000518 size = min( get_req_data_size(req), sizeof(sock->errors) );
519 memcpy( get_req_data(req), sock->errors, size );
520 set_req_data_size( req, size );
521
Ove Kaaven019211f1999-10-13 16:05:37 +0000522 if (req->service)
523 {
524 if (req->s_event)
525 {
Ove Kaavenf45608f1999-10-23 16:53:34 +0000526 struct event *sevent = get_event_obj(current->process, req->s_event, 0);
Ove Kaaven019211f1999-10-13 16:05:37 +0000527 if (sevent == sock->event)
528 req->s_event = 0;
529 release_object( sevent );
530 }
531 if (!req->s_event)
532 {
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000533 if (req->c_event)
534 {
535 struct event *cevent = get_event_obj(current->process, req->c_event, EVENT_MODIFY_STATE);
536 reset_event( cevent );
537 release_object( cevent );
538 }
Ove Kaaven019211f1999-10-13 16:05:37 +0000539 sock->pmask = 0;
540 sock_reselect( sock );
541 }
542 else set_error(WSAEINVAL);
543 }
544 release_object( &sock->obj );
545}
546
547/* re-enable pending socket events */
548DECL_HANDLER(enable_socket_event)
549{
550 struct sock *sock;
551
552 sock=(struct sock*)get_handle_obj(current->process,req->handle,GENERIC_READ|GENERIC_WRITE|SYNCHRONIZE,&sock_ops);
553 if (!sock)
554 return;
555 sock->pmask &= ~req->mask; /* is this safe? */
556 sock->hmask &= ~req->mask;
557 sock->state |= req->sstate;
558 sock->state &= ~req->cstate;
559 sock_reselect( sock );
Ove Kaavencb98a6e2000-03-26 18:21:16 +0000560
561 /* service trigger */
562 if (req->mask & WS_FD_SERVEVENT)
563 {
564 sock->pmask |= WS_FD_SERVEVENT;
565 if (sock->event) {
566 if (debug_level) fprintf(stderr, "signalling service event ptr %p\n", sock->event);
567 set_event(sock->event);
568 }
569 }
570
Ove Kaaven019211f1999-10-13 16:05:37 +0000571 release_object( &sock->obj );
572}