2021-05-22 05:08:48 +02:00
|
|
|
/*
|
|
|
|
* Windows sockets
|
|
|
|
*
|
|
|
|
* Copyright 2021 Zebediah Figura for CodeWeavers
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#if 0
|
|
|
|
#pragma makedep unix
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#include <errno.h>
|
2021-06-08 02:53:09 +02:00
|
|
|
#include <sys/types.h>
|
2021-12-09 11:04:40 +01:00
|
|
|
#include <sys/socket.h>
|
2021-12-09 11:09:50 +01:00
|
|
|
#include <sys/ioctl.h>
|
2021-05-22 05:08:48 +02:00
|
|
|
#include <unistd.h>
|
2021-06-08 02:53:09 +02:00
|
|
|
#ifdef HAVE_IFADDRS_H
|
|
|
|
# include <ifaddrs.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NET_IF_H
|
|
|
|
# include <net/if.h>
|
|
|
|
#endif
|
2021-05-27 06:36:50 +02:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
2021-08-03 07:08:38 +02:00
|
|
|
# define __APPLE_USE_RFC_3542
|
|
|
|
# include <netinet/in.h>
|
2021-05-27 06:36:50 +02:00
|
|
|
#endif
|
2021-06-08 02:53:11 +02:00
|
|
|
#ifdef HAVE_NETINET_TCP_H
|
|
|
|
# include <netinet/tcp.h>
|
|
|
|
#endif
|
2021-05-27 06:36:50 +02:00
|
|
|
|
|
|
|
#ifdef HAVE_NETIPX_IPX_H
|
|
|
|
# include <netipx/ipx.h>
|
|
|
|
#elif defined(HAVE_LINUX_IPX_H)
|
|
|
|
# ifdef HAVE_ASM_TYPES_H
|
|
|
|
# include <asm/types.h>
|
|
|
|
# endif
|
|
|
|
# ifdef HAVE_LINUX_TYPES_H
|
|
|
|
# include <linux/types.h>
|
|
|
|
# endif
|
|
|
|
# include <linux/ipx.h>
|
|
|
|
#endif
|
|
|
|
#if defined(SOL_IPX) || defined(SO_DEFAULT_HEADERS)
|
|
|
|
# define HAS_IPX
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_LINUX_IRDA_H
|
|
|
|
# ifdef HAVE_LINUX_TYPES_H
|
|
|
|
# include <linux/types.h>
|
|
|
|
# endif
|
|
|
|
# include <linux/irda.h>
|
|
|
|
# define HAS_IRDA
|
|
|
|
#endif
|
2021-05-22 05:08:48 +02:00
|
|
|
|
|
|
|
#include "ntstatus.h"
|
|
|
|
#define WIN32_NO_STATUS
|
|
|
|
#include "windef.h"
|
|
|
|
#include "winioctl.h"
|
|
|
|
#define USE_WS_PREFIX
|
|
|
|
#include "winsock2.h"
|
2021-05-27 06:36:50 +02:00
|
|
|
#include "mswsock.h"
|
2021-06-08 02:53:11 +02:00
|
|
|
#include "mstcpip.h"
|
2021-05-27 06:36:50 +02:00
|
|
|
#include "ws2tcpip.h"
|
|
|
|
#include "wsipx.h"
|
|
|
|
#include "af_irda.h"
|
2021-05-22 05:08:48 +02:00
|
|
|
#include "wine/afd.h"
|
|
|
|
|
|
|
|
#include "unix_private.h"
|
|
|
|
|
2021-06-08 02:53:11 +02:00
|
|
|
#if !defined(TCP_KEEPIDLE) && defined(TCP_KEEPALIVE)
|
|
|
|
/* TCP_KEEPALIVE is the Mac OS name for TCP_KEEPIDLE */
|
|
|
|
#define TCP_KEEPIDLE TCP_KEEPALIVE
|
|
|
|
#endif
|
|
|
|
|
2021-07-27 07:13:34 +02:00
|
|
|
#if defined(linux) && !defined(IP_UNICAST_IF)
|
|
|
|
#define IP_UNICAST_IF 50
|
|
|
|
#endif
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(winsock);
|
|
|
|
|
2021-12-10 18:27:35 +01:00
|
|
|
#define u64_to_user_ptr(u) ((void *)(uintptr_t)(u))
|
|
|
|
|
2021-05-27 06:36:53 +02:00
|
|
|
union unix_sockaddr
|
|
|
|
{
|
|
|
|
struct sockaddr addr;
|
|
|
|
struct sockaddr_in in;
|
|
|
|
struct sockaddr_in6 in6;
|
|
|
|
#ifdef HAS_IPX
|
|
|
|
struct sockaddr_ipx ipx;
|
|
|
|
#endif
|
|
|
|
#ifdef HAS_IRDA
|
|
|
|
struct sockaddr_irda irda;
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
struct async_recv_ioctl
|
|
|
|
{
|
|
|
|
struct async_fileio io;
|
2021-12-10 18:27:34 +01:00
|
|
|
void *control;
|
2021-05-27 06:36:50 +02:00
|
|
|
struct WS_sockaddr *addr;
|
|
|
|
int *addr_len;
|
|
|
|
DWORD *ret_flags;
|
2021-05-22 05:08:48 +02:00
|
|
|
int unix_flags;
|
|
|
|
unsigned int count;
|
|
|
|
struct iovec iov[1];
|
|
|
|
};
|
|
|
|
|
2021-05-27 06:36:53 +02:00
|
|
|
struct async_send_ioctl
|
|
|
|
{
|
|
|
|
struct async_fileio io;
|
|
|
|
const struct WS_sockaddr *addr;
|
|
|
|
int addr_len;
|
|
|
|
int unix_flags;
|
|
|
|
unsigned int sent_len;
|
|
|
|
unsigned int count;
|
|
|
|
unsigned int iov_cursor;
|
|
|
|
struct iovec iov[1];
|
|
|
|
};
|
|
|
|
|
2021-05-28 01:57:29 +02:00
|
|
|
struct async_transmit_ioctl
|
|
|
|
{
|
|
|
|
struct async_fileio io;
|
|
|
|
HANDLE file;
|
|
|
|
char *buffer;
|
|
|
|
unsigned int buffer_size; /* allocated size of buffer */
|
|
|
|
unsigned int read_len; /* amount of valid data currently in the buffer */
|
|
|
|
unsigned int head_cursor; /* amount of header data already sent */
|
|
|
|
unsigned int file_cursor; /* amount of file data already sent */
|
|
|
|
unsigned int buffer_cursor; /* amount of data currently in the buffer already sent */
|
|
|
|
unsigned int tail_cursor; /* amount of tail data already sent */
|
|
|
|
unsigned int file_len; /* total file length to send */
|
|
|
|
DWORD flags;
|
2021-12-10 18:27:37 +01:00
|
|
|
const char *head;
|
|
|
|
const char *tail;
|
|
|
|
unsigned int head_len;
|
|
|
|
unsigned int tail_len;
|
2021-05-28 01:57:29 +02:00
|
|
|
LARGE_INTEGER offset;
|
|
|
|
};
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
static NTSTATUS sock_errno_to_status( int err )
|
|
|
|
{
|
|
|
|
switch (err)
|
|
|
|
{
|
|
|
|
case EBADF: return STATUS_INVALID_HANDLE;
|
|
|
|
case EBUSY: return STATUS_DEVICE_BUSY;
|
|
|
|
case EPERM:
|
|
|
|
case EACCES: return STATUS_ACCESS_DENIED;
|
|
|
|
case EFAULT: return STATUS_ACCESS_VIOLATION;
|
|
|
|
case EINVAL: return STATUS_INVALID_PARAMETER;
|
|
|
|
case ENFILE:
|
|
|
|
case EMFILE: return STATUS_TOO_MANY_OPENED_FILES;
|
|
|
|
case EINPROGRESS:
|
|
|
|
case EWOULDBLOCK: return STATUS_DEVICE_NOT_READY;
|
|
|
|
case EALREADY: return STATUS_NETWORK_BUSY;
|
|
|
|
case ENOTSOCK: return STATUS_OBJECT_TYPE_MISMATCH;
|
|
|
|
case EDESTADDRREQ: return STATUS_INVALID_PARAMETER;
|
|
|
|
case EMSGSIZE: return STATUS_BUFFER_OVERFLOW;
|
|
|
|
case EPROTONOSUPPORT:
|
|
|
|
case ESOCKTNOSUPPORT:
|
|
|
|
case EPFNOSUPPORT:
|
|
|
|
case EAFNOSUPPORT:
|
|
|
|
case EPROTOTYPE: return STATUS_NOT_SUPPORTED;
|
|
|
|
case ENOPROTOOPT: return STATUS_INVALID_PARAMETER;
|
|
|
|
case EOPNOTSUPP: return STATUS_NOT_SUPPORTED;
|
|
|
|
case EADDRINUSE: return STATUS_SHARING_VIOLATION;
|
|
|
|
case EADDRNOTAVAIL: return STATUS_INVALID_PARAMETER;
|
|
|
|
case ECONNREFUSED: return STATUS_CONNECTION_REFUSED;
|
|
|
|
case ESHUTDOWN: return STATUS_PIPE_DISCONNECTED;
|
|
|
|
case ENOTCONN: return STATUS_INVALID_CONNECTION;
|
|
|
|
case ETIMEDOUT: return STATUS_IO_TIMEOUT;
|
|
|
|
case ENETUNREACH: return STATUS_NETWORK_UNREACHABLE;
|
|
|
|
case EHOSTUNREACH: return STATUS_HOST_UNREACHABLE;
|
|
|
|
case ENETDOWN: return STATUS_NETWORK_BUSY;
|
|
|
|
case EPIPE:
|
|
|
|
case ECONNRESET: return STATUS_CONNECTION_RESET;
|
|
|
|
case ECONNABORTED: return STATUS_CONNECTION_ABORTED;
|
|
|
|
case EISCONN: return STATUS_CONNECTION_ACTIVE;
|
|
|
|
|
|
|
|
case 0: return STATUS_SUCCESS;
|
|
|
|
default:
|
|
|
|
FIXME( "unknown errno %d\n", err );
|
|
|
|
return STATUS_UNSUCCESSFUL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-27 06:36:53 +02:00
|
|
|
static socklen_t sockaddr_to_unix( const struct WS_sockaddr *wsaddr, int wsaddrlen, union unix_sockaddr *uaddr )
|
2021-05-27 06:36:50 +02:00
|
|
|
{
|
2021-05-27 06:36:53 +02:00
|
|
|
memset( uaddr, 0, sizeof(*uaddr) );
|
|
|
|
|
|
|
|
switch (wsaddr->sa_family)
|
|
|
|
{
|
|
|
|
case WS_AF_INET:
|
|
|
|
{
|
|
|
|
struct WS_sockaddr_in win = {0};
|
|
|
|
|
|
|
|
if (wsaddrlen < sizeof(win)) return 0;
|
|
|
|
memcpy( &win, wsaddr, sizeof(win) );
|
|
|
|
uaddr->in.sin_family = AF_INET;
|
|
|
|
uaddr->in.sin_port = win.sin_port;
|
|
|
|
memcpy( &uaddr->in.sin_addr, &win.sin_addr, sizeof(win.sin_addr) );
|
|
|
|
return sizeof(uaddr->in);
|
|
|
|
}
|
|
|
|
|
|
|
|
case WS_AF_INET6:
|
|
|
|
{
|
|
|
|
struct WS_sockaddr_in6 win = {0};
|
|
|
|
|
2021-07-23 18:39:09 +02:00
|
|
|
if (wsaddrlen < sizeof(win)) return 0;
|
|
|
|
memcpy( &win, wsaddr, sizeof(win) );
|
2021-05-27 06:36:53 +02:00
|
|
|
uaddr->in6.sin6_family = AF_INET6;
|
|
|
|
uaddr->in6.sin6_port = win.sin6_port;
|
|
|
|
uaddr->in6.sin6_flowinfo = win.sin6_flowinfo;
|
|
|
|
memcpy( &uaddr->in6.sin6_addr, &win.sin6_addr, sizeof(win.sin6_addr) );
|
|
|
|
#ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
|
2021-07-23 18:39:09 +02:00
|
|
|
uaddr->in6.sin6_scope_id = win.sin6_scope_id;
|
2021-05-27 06:36:53 +02:00
|
|
|
#endif
|
|
|
|
return sizeof(uaddr->in6);
|
|
|
|
}
|
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
#ifdef HAS_IPX
|
2021-05-27 06:36:53 +02:00
|
|
|
case WS_AF_IPX:
|
|
|
|
{
|
|
|
|
struct WS_sockaddr_ipx win = {0};
|
|
|
|
|
|
|
|
if (wsaddrlen < sizeof(win)) return 0;
|
|
|
|
memcpy( &win, wsaddr, sizeof(win) );
|
|
|
|
uaddr->ipx.sipx_family = AF_IPX;
|
|
|
|
memcpy( &uaddr->ipx.sipx_network, win.sa_netnum, sizeof(win.sa_netnum) );
|
|
|
|
memcpy( &uaddr->ipx.sipx_node, win.sa_nodenum, sizeof(win.sa_nodenum) );
|
|
|
|
uaddr->ipx.sipx_port = win.sa_socket;
|
|
|
|
return sizeof(uaddr->ipx);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAS_IRDA
|
|
|
|
case WS_AF_IRDA:
|
|
|
|
{
|
|
|
|
SOCKADDR_IRDA win = {0};
|
|
|
|
unsigned int lsap_sel;
|
|
|
|
|
|
|
|
if (wsaddrlen < sizeof(win)) return 0;
|
|
|
|
memcpy( &win, wsaddr, sizeof(win) );
|
|
|
|
uaddr->irda.sir_family = AF_IRDA;
|
|
|
|
if (sscanf( win.irdaServiceName, "LSAP-SEL%u", &lsap_sel ) == 1)
|
2021-05-29 17:43:54 +02:00
|
|
|
uaddr->irda.sir_lsap_sel = lsap_sel;
|
2021-05-27 06:36:53 +02:00
|
|
|
else
|
|
|
|
{
|
2021-05-29 17:43:54 +02:00
|
|
|
uaddr->irda.sir_lsap_sel = LSAP_ANY;
|
2021-05-27 06:36:53 +02:00
|
|
|
memcpy( uaddr->irda.sir_name, win.irdaServiceName, sizeof(win.irdaServiceName) );
|
|
|
|
}
|
|
|
|
memcpy( &uaddr->irda.sir_addr, win.irdaDeviceID, sizeof(win.irdaDeviceID) );
|
|
|
|
return sizeof(uaddr->irda);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
case WS_AF_UNSPEC:
|
|
|
|
switch (wsaddrlen)
|
|
|
|
{
|
|
|
|
default: /* likely an ipv4 address */
|
|
|
|
case sizeof(struct WS_sockaddr_in):
|
|
|
|
return sizeof(uaddr->in);
|
|
|
|
|
|
|
|
#ifdef HAS_IPX
|
|
|
|
case sizeof(struct WS_sockaddr_ipx):
|
|
|
|
return sizeof(uaddr->ipx);
|
2021-05-27 06:36:50 +02:00
|
|
|
#endif
|
2021-05-27 06:36:53 +02:00
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
#ifdef HAS_IRDA
|
2021-05-27 06:36:53 +02:00
|
|
|
case sizeof(SOCKADDR_IRDA):
|
|
|
|
return sizeof(uaddr->irda);
|
2021-05-27 06:36:50 +02:00
|
|
|
#endif
|
2021-05-27 06:36:53 +02:00
|
|
|
|
|
|
|
case sizeof(struct WS_sockaddr_in6):
|
|
|
|
return sizeof(uaddr->in6);
|
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
FIXME( "unknown address family %u\n", wsaddr->sa_family );
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2021-05-27 06:36:50 +02:00
|
|
|
|
|
|
|
static int sockaddr_from_unix( const union unix_sockaddr *uaddr, struct WS_sockaddr *wsaddr, socklen_t wsaddrlen )
|
|
|
|
{
|
|
|
|
memset( wsaddr, 0, wsaddrlen );
|
|
|
|
|
|
|
|
switch (uaddr->addr.sa_family)
|
|
|
|
{
|
|
|
|
case AF_INET:
|
|
|
|
{
|
|
|
|
struct WS_sockaddr_in win = {0};
|
|
|
|
|
|
|
|
if (wsaddrlen < sizeof(win)) return -1;
|
|
|
|
win.sin_family = WS_AF_INET;
|
|
|
|
win.sin_port = uaddr->in.sin_port;
|
|
|
|
memcpy( &win.sin_addr, &uaddr->in.sin_addr, sizeof(win.sin_addr) );
|
|
|
|
memcpy( wsaddr, &win, sizeof(win) );
|
|
|
|
return sizeof(win);
|
|
|
|
}
|
|
|
|
|
|
|
|
case AF_INET6:
|
|
|
|
{
|
|
|
|
struct WS_sockaddr_in6 win = {0};
|
|
|
|
|
2021-07-23 18:39:09 +02:00
|
|
|
if (wsaddrlen < sizeof(win)) return -1;
|
2021-05-27 06:36:50 +02:00
|
|
|
win.sin6_family = WS_AF_INET6;
|
|
|
|
win.sin6_port = uaddr->in6.sin6_port;
|
|
|
|
win.sin6_flowinfo = uaddr->in6.sin6_flowinfo;
|
|
|
|
memcpy( &win.sin6_addr, &uaddr->in6.sin6_addr, sizeof(win.sin6_addr) );
|
|
|
|
#ifdef HAVE_STRUCT_SOCKADDR_IN6_SIN6_SCOPE_ID
|
|
|
|
win.sin6_scope_id = uaddr->in6.sin6_scope_id;
|
|
|
|
#endif
|
2021-07-23 18:39:09 +02:00
|
|
|
memcpy( wsaddr, &win, sizeof(win) );
|
|
|
|
return sizeof(win);
|
2021-05-27 06:36:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef HAS_IPX
|
|
|
|
case AF_IPX:
|
|
|
|
{
|
|
|
|
struct WS_sockaddr_ipx win = {0};
|
|
|
|
|
|
|
|
if (wsaddrlen < sizeof(win)) return -1;
|
|
|
|
win.sa_family = WS_AF_IPX;
|
|
|
|
memcpy( win.sa_netnum, &uaddr->ipx.sipx_network, sizeof(win.sa_netnum) );
|
|
|
|
memcpy( win.sa_nodenum, &uaddr->ipx.sipx_node, sizeof(win.sa_nodenum) );
|
|
|
|
win.sa_socket = uaddr->ipx.sipx_port;
|
|
|
|
memcpy( wsaddr, &win, sizeof(win) );
|
|
|
|
return sizeof(win);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAS_IRDA
|
|
|
|
case AF_IRDA:
|
|
|
|
{
|
|
|
|
SOCKADDR_IRDA win;
|
|
|
|
|
|
|
|
if (wsaddrlen < sizeof(win)) return -1;
|
|
|
|
win.irdaAddressFamily = WS_AF_IRDA;
|
|
|
|
memcpy( win.irdaDeviceID, &uaddr->irda.sir_addr, sizeof(win.irdaDeviceID) );
|
|
|
|
if (uaddr->irda.sir_lsap_sel != LSAP_ANY)
|
|
|
|
snprintf( win.irdaServiceName, sizeof(win.irdaServiceName), "LSAP-SEL%u", uaddr->irda.sir_lsap_sel );
|
|
|
|
else
|
|
|
|
memcpy( win.irdaServiceName, uaddr->irda.sir_name, sizeof(win.irdaServiceName) );
|
|
|
|
memcpy( wsaddr, &win, sizeof(win) );
|
|
|
|
return sizeof(win);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
case AF_UNSPEC:
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
default:
|
|
|
|
FIXME( "unknown address family %d\n", uaddr->addr.sa_family );
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS
|
|
|
|
static WSACMSGHDR *fill_control_message( int level, int type, WSACMSGHDR *current, ULONG *maxsize, void *data, int len )
|
|
|
|
{
|
|
|
|
ULONG msgsize = sizeof(WSACMSGHDR) + WSA_CMSG_ALIGN(len);
|
|
|
|
char *ptr = (char *) current + sizeof(WSACMSGHDR);
|
|
|
|
|
|
|
|
if (msgsize > *maxsize)
|
|
|
|
return NULL;
|
|
|
|
*maxsize -= msgsize;
|
|
|
|
current->cmsg_len = sizeof(WSACMSGHDR) + len;
|
|
|
|
current->cmsg_level = level;
|
|
|
|
current->cmsg_type = type;
|
|
|
|
memcpy(ptr, data, len);
|
|
|
|
return (WSACMSGHDR *)(ptr + WSA_CMSG_ALIGN(len));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int convert_control_headers(struct msghdr *hdr, WSABUF *control)
|
|
|
|
{
|
|
|
|
WSACMSGHDR *cmsg_win = (WSACMSGHDR *)control->buf, *ptr;
|
|
|
|
ULONG ctlsize = control->len;
|
|
|
|
struct cmsghdr *cmsg_unix;
|
|
|
|
|
|
|
|
ptr = cmsg_win;
|
|
|
|
for (cmsg_unix = CMSG_FIRSTHDR(hdr); cmsg_unix != NULL; cmsg_unix = CMSG_NXTHDR(hdr, cmsg_unix))
|
|
|
|
{
|
|
|
|
switch (cmsg_unix->cmsg_level)
|
|
|
|
{
|
|
|
|
case IPPROTO_IP:
|
|
|
|
switch (cmsg_unix->cmsg_type)
|
|
|
|
{
|
|
|
|
#if defined(IP_PKTINFO)
|
|
|
|
case IP_PKTINFO:
|
|
|
|
{
|
|
|
|
const struct in_pktinfo *data_unix = (struct in_pktinfo *)CMSG_DATA(cmsg_unix);
|
|
|
|
struct WS_in_pktinfo data_win;
|
|
|
|
|
|
|
|
memcpy( &data_win.ipi_addr, &data_unix->ipi_addr.s_addr, 4 ); /* 4 bytes = 32 address bits */
|
|
|
|
data_win.ipi_ifindex = data_unix->ipi_ifindex;
|
|
|
|
ptr = fill_control_message( WS_IPPROTO_IP, WS_IP_PKTINFO, ptr, &ctlsize,
|
|
|
|
(void *)&data_win, sizeof(data_win) );
|
|
|
|
if (!ptr) goto error;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#elif defined(IP_RECVDSTADDR)
|
|
|
|
case IP_RECVDSTADDR:
|
|
|
|
{
|
|
|
|
const struct in_addr *addr_unix = (struct in_addr *)CMSG_DATA(cmsg_unix);
|
|
|
|
struct WS_in_pktinfo data_win;
|
|
|
|
|
|
|
|
memcpy( &data_win.ipi_addr, &addr_unix->s_addr, 4 ); /* 4 bytes = 32 address bits */
|
|
|
|
data_win.ipi_ifindex = 0; /* FIXME */
|
|
|
|
ptr = fill_control_message( WS_IPPROTO_IP, WS_IP_PKTINFO, ptr, &ctlsize,
|
|
|
|
(void *)&data_win, sizeof(data_win) );
|
|
|
|
if (!ptr) goto error;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif /* IP_PKTINFO */
|
2021-09-29 08:40:54 +02:00
|
|
|
|
2021-09-29 08:40:55 +02:00
|
|
|
#if defined(IP_TOS)
|
|
|
|
case IP_TOS:
|
|
|
|
{
|
2022-01-18 20:27:37 +01:00
|
|
|
INT tos = *(unsigned char *)CMSG_DATA(cmsg_unix);
|
2021-09-29 08:40:55 +02:00
|
|
|
ptr = fill_control_message( WS_IPPROTO_IP, WS_IP_TOS, ptr, &ctlsize,
|
2022-01-18 20:27:37 +01:00
|
|
|
&tos, sizeof(INT) );
|
2021-09-29 08:40:55 +02:00
|
|
|
if (!ptr) goto error;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif /* IP_TOS */
|
|
|
|
|
2021-09-29 08:40:54 +02:00
|
|
|
#if defined(IP_TTL)
|
|
|
|
case IP_TTL:
|
|
|
|
{
|
|
|
|
ptr = fill_control_message( WS_IPPROTO_IP, WS_IP_TTL, ptr, &ctlsize,
|
|
|
|
CMSG_DATA(cmsg_unix), sizeof(INT) );
|
|
|
|
if (!ptr) goto error;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif /* IP_TTL */
|
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
default:
|
|
|
|
FIXME("Unhandled IPPROTO_IP message header type %d\n", cmsg_unix->cmsg_type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2021-08-03 07:08:38 +02:00
|
|
|
case IPPROTO_IPV6:
|
|
|
|
switch (cmsg_unix->cmsg_type)
|
|
|
|
{
|
|
|
|
#if defined(IPV6_HOPLIMIT)
|
|
|
|
case IPV6_HOPLIMIT:
|
|
|
|
{
|
|
|
|
ptr = fill_control_message( WS_IPPROTO_IPV6, WS_IPV6_HOPLIMIT, ptr, &ctlsize,
|
|
|
|
CMSG_DATA(cmsg_unix), sizeof(INT) );
|
|
|
|
if (!ptr) goto error;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif /* IPV6_HOPLIMIT */
|
|
|
|
|
2021-08-03 07:08:39 +02:00
|
|
|
#if defined(IPV6_PKTINFO) && defined(HAVE_STRUCT_IN6_PKTINFO_IPI6_ADDR)
|
|
|
|
case IPV6_PKTINFO:
|
|
|
|
{
|
|
|
|
struct in6_pktinfo *data_unix = (struct in6_pktinfo *)CMSG_DATA(cmsg_unix);
|
|
|
|
struct WS_in6_pktinfo data_win;
|
|
|
|
|
|
|
|
memcpy(&data_win.ipi6_addr, &data_unix->ipi6_addr.s6_addr, 16);
|
|
|
|
data_win.ipi6_ifindex = data_unix->ipi6_ifindex;
|
|
|
|
ptr = fill_control_message( WS_IPPROTO_IPV6, WS_IPV6_PKTINFO, ptr, &ctlsize,
|
|
|
|
(void *)&data_win, sizeof(data_win) );
|
|
|
|
if (!ptr) goto error;
|
2021-08-06 07:26:25 +02:00
|
|
|
break;
|
2021-08-03 07:08:39 +02:00
|
|
|
}
|
|
|
|
#endif /* IPV6_PKTINFO */
|
|
|
|
|
2021-08-13 07:56:13 +02:00
|
|
|
#if defined(IPV6_TCLASS)
|
|
|
|
case IPV6_TCLASS:
|
|
|
|
{
|
|
|
|
ptr = fill_control_message( WS_IPPROTO_IPV6, WS_IPV6_TCLASS, ptr, &ctlsize,
|
|
|
|
CMSG_DATA(cmsg_unix), sizeof(INT) );
|
|
|
|
if (!ptr) goto error;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif /* IPV6_TCLASS */
|
|
|
|
|
2021-08-03 07:08:38 +02:00
|
|
|
default:
|
|
|
|
FIXME("Unhandled IPPROTO_IPV6 message header type %d\n", cmsg_unix->cmsg_type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
default:
|
|
|
|
FIXME("Unhandled message header level %d\n", cmsg_unix->cmsg_level);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
control->len = (char *)ptr - (char *)cmsg_win;
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
error:
|
|
|
|
control->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
2021-12-10 18:27:34 +01:00
|
|
|
#else
|
|
|
|
static int convert_control_headers(struct msghdr *hdr, WSABUF *control)
|
|
|
|
{
|
|
|
|
ERR( "Message control headers cannot be properly supported on this system.\n" );
|
|
|
|
control->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
2021-05-27 06:36:50 +02:00
|
|
|
#endif /* HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS */
|
|
|
|
|
2021-12-10 18:27:34 +01:00
|
|
|
struct cmsghdr_32
|
|
|
|
{
|
|
|
|
ULONG cmsg_len;
|
|
|
|
INT cmsg_level;
|
|
|
|
INT cmsg_type;
|
|
|
|
/* UCHAR cmsg_data[]; */
|
|
|
|
};
|
|
|
|
|
|
|
|
static size_t cmsg_align_32( size_t len )
|
|
|
|
{
|
|
|
|
return (len + sizeof(ULONG) - 1) & ~(sizeof(ULONG) - 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* we assume that cmsg_data does not require translation, which is currently
|
|
|
|
* true for all messages */
|
|
|
|
static int wow64_translate_control( const WSABUF *control64, struct afd_wsabuf_32 *control32 )
|
|
|
|
{
|
|
|
|
char *const buf32 = ULongToPtr(control32->buf);
|
|
|
|
const ULONG max_len = control32->len;
|
|
|
|
const char *ptr64 = control64->buf;
|
|
|
|
char *ptr32 = buf32;
|
|
|
|
|
|
|
|
while (ptr64 < control64->buf + control64->len)
|
|
|
|
{
|
|
|
|
struct cmsghdr_32 *cmsg32 = (struct cmsghdr_32 *)ptr32;
|
|
|
|
const WSACMSGHDR *cmsg64 = (const WSACMSGHDR *)ptr64;
|
|
|
|
|
|
|
|
if (ptr32 + sizeof(*cmsg32) + cmsg_align_32( cmsg64->cmsg_len ) > buf32 + max_len)
|
|
|
|
{
|
|
|
|
control32->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
cmsg32->cmsg_len = cmsg64->cmsg_len - sizeof(*cmsg64) + sizeof(*cmsg32);
|
|
|
|
cmsg32->cmsg_level = cmsg64->cmsg_level;
|
|
|
|
cmsg32->cmsg_type = cmsg64->cmsg_type;
|
|
|
|
memcpy( cmsg32 + 1, cmsg64 + 1, cmsg64->cmsg_len );
|
|
|
|
|
|
|
|
ptr64 += WSA_CMSG_ALIGN( cmsg64->cmsg_len );
|
|
|
|
ptr32 += cmsg_align_32( cmsg32->cmsg_len );
|
|
|
|
}
|
|
|
|
|
|
|
|
control32->len = ptr32 - buf32;
|
|
|
|
FIXME("-> %d\n", control32->len);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
static NTSTATUS try_recv( int fd, struct async_recv_ioctl *async, ULONG_PTR *size )
|
|
|
|
{
|
|
|
|
#ifndef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS
|
|
|
|
char control_buffer[512];
|
|
|
|
#endif
|
2021-05-27 06:36:50 +02:00
|
|
|
union unix_sockaddr unix_addr;
|
2021-05-22 05:08:48 +02:00
|
|
|
struct msghdr hdr;
|
2021-05-27 06:36:50 +02:00
|
|
|
NTSTATUS status;
|
2021-05-22 05:08:48 +02:00
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
memset( &hdr, 0, sizeof(hdr) );
|
2021-05-27 06:36:50 +02:00
|
|
|
if (async->addr)
|
|
|
|
{
|
|
|
|
hdr.msg_name = &unix_addr.addr;
|
|
|
|
hdr.msg_namelen = sizeof(unix_addr);
|
|
|
|
}
|
2021-05-22 05:08:48 +02:00
|
|
|
hdr.msg_iov = async->iov;
|
|
|
|
hdr.msg_iovlen = async->count;
|
|
|
|
#ifndef HAVE_STRUCT_MSGHDR_MSG_ACCRIGHTS
|
|
|
|
hdr.msg_control = control_buffer;
|
|
|
|
hdr.msg_controllen = sizeof(control_buffer);
|
|
|
|
#endif
|
2021-05-27 06:36:52 +02:00
|
|
|
while ((ret = virtual_locked_recvmsg( fd, &hdr, async->unix_flags )) < 0 && errno == EINTR);
|
2021-05-22 05:08:48 +02:00
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* Unix-like systems return EINVAL when attempting to read OOB data from
|
|
|
|
* an empty socket buffer; Windows returns WSAEWOULDBLOCK. */
|
|
|
|
if ((async->unix_flags & MSG_OOB) && errno == EINVAL)
|
|
|
|
errno = EWOULDBLOCK;
|
|
|
|
|
|
|
|
if (errno != EWOULDBLOCK) WARN( "recvmsg: %s\n", strerror( errno ) );
|
|
|
|
return sock_errno_to_status( errno );
|
|
|
|
}
|
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
status = (hdr.msg_flags & MSG_TRUNC) ? STATUS_BUFFER_OVERFLOW : STATUS_SUCCESS;
|
|
|
|
|
|
|
|
if (async->control)
|
|
|
|
{
|
2021-12-10 18:27:34 +01:00
|
|
|
if (in_wow64_call())
|
|
|
|
{
|
|
|
|
char control_buffer64[512];
|
|
|
|
WSABUF wsabuf;
|
|
|
|
|
|
|
|
wsabuf.len = sizeof(control_buffer64);
|
|
|
|
wsabuf.buf = control_buffer64;
|
|
|
|
if (convert_control_headers( &hdr, &wsabuf ))
|
|
|
|
{
|
|
|
|
if (!wow64_translate_control( &wsabuf, async->control ))
|
|
|
|
{
|
|
|
|
WARN( "Application passed insufficient room for control headers.\n" );
|
|
|
|
*async->ret_flags |= WS_MSG_CTRUNC;
|
|
|
|
status = STATUS_BUFFER_OVERFLOW;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FIXME( "control buffer is too small\n" );
|
|
|
|
*async->ret_flags |= WS_MSG_CTRUNC;
|
|
|
|
status = STATUS_BUFFER_OVERFLOW;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (!convert_control_headers( &hdr, async->control ))
|
|
|
|
{
|
|
|
|
WARN( "Application passed insufficient room for control headers.\n" );
|
|
|
|
*async->ret_flags |= WS_MSG_CTRUNC;
|
|
|
|
status = STATUS_BUFFER_OVERFLOW;
|
|
|
|
}
|
|
|
|
}
|
2021-05-27 06:36:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* If this socket is connected, Linux doesn't give us msg_name and
|
|
|
|
* msg_namelen from recvmsg, but it does set msg_namelen to zero.
|
|
|
|
*
|
|
|
|
* MSDN says that the address is ignored for connection-oriented sockets, so
|
|
|
|
* don't try to translate it.
|
|
|
|
*/
|
|
|
|
if (async->addr && hdr.msg_namelen)
|
|
|
|
*async->addr_len = sockaddr_from_unix( &unix_addr, async->addr, *async->addr_len );
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
*size = ret;
|
2021-05-27 06:36:50 +02:00
|
|
|
return status;
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
static BOOL async_recv_proc( void *user, ULONG_PTR *info, NTSTATUS *status )
|
2021-05-22 05:08:48 +02:00
|
|
|
{
|
|
|
|
struct async_recv_ioctl *async = user;
|
|
|
|
int fd, needs_close;
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
TRACE( "%#x\n", *status );
|
2021-05-22 05:08:48 +02:00
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
if (*status == STATUS_ALERTED)
|
2021-05-22 05:08:48 +02:00
|
|
|
{
|
2021-09-14 08:02:48 +02:00
|
|
|
if ((*status = server_get_unix_fd( async->io.handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return TRUE;
|
2021-05-22 05:08:48 +02:00
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
*status = try_recv( fd, async, info );
|
|
|
|
TRACE( "got status %#x, %#lx bytes read\n", *status, *info );
|
2021-05-22 05:08:48 +02:00
|
|
|
if (needs_close) close( fd );
|
2021-09-14 08:02:48 +02:00
|
|
|
|
|
|
|
if (*status == STATUS_DEVICE_NOT_READY)
|
|
|
|
return FALSE;
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
2021-09-14 08:02:48 +02:00
|
|
|
release_fileio( &async->io );
|
|
|
|
return TRUE;
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static NTSTATUS sock_recv( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user, IO_STATUS_BLOCK *io,
|
2021-12-10 18:27:32 +01:00
|
|
|
int fd, const void *buffers_ptr, unsigned int count, WSABUF *control,
|
2021-05-27 06:36:50 +02:00
|
|
|
struct WS_sockaddr *addr, int *addr_len, DWORD *ret_flags, int unix_flags, int force_async )
|
2021-05-22 05:08:48 +02:00
|
|
|
{
|
|
|
|
struct async_recv_ioctl *async;
|
|
|
|
ULONG_PTR information;
|
|
|
|
HANDLE wait_handle;
|
|
|
|
DWORD async_size;
|
|
|
|
NTSTATUS status;
|
|
|
|
unsigned int i;
|
|
|
|
ULONG options;
|
2022-02-09 17:17:59 +01:00
|
|
|
BOOL nonblocking, alerted;
|
2021-05-22 05:08:48 +02:00
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
if (unix_flags & MSG_OOB)
|
|
|
|
{
|
|
|
|
int oobinline;
|
|
|
|
socklen_t len = sizeof(oobinline);
|
|
|
|
if (!getsockopt( fd, SOL_SOCKET, SO_OOBINLINE, (char *)&oobinline, &len ) && oobinline)
|
|
|
|
return STATUS_INVALID_PARAMETER;
|
|
|
|
}
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
async_size = offsetof( struct async_recv_ioctl, iov[count] );
|
|
|
|
|
|
|
|
if (!(async = (struct async_recv_ioctl *)alloc_fileio( async_size, async_recv_proc, handle )))
|
|
|
|
return STATUS_NO_MEMORY;
|
|
|
|
|
|
|
|
async->count = count;
|
2021-12-10 18:27:32 +01:00
|
|
|
if (in_wow64_call())
|
2021-05-22 05:08:48 +02:00
|
|
|
{
|
2021-12-10 18:27:32 +01:00
|
|
|
const struct afd_wsabuf_32 *buffers = buffers_ptr;
|
|
|
|
|
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
{
|
|
|
|
async->iov[i].iov_base = ULongToPtr( buffers[i].buf );
|
|
|
|
async->iov[i].iov_len = buffers[i].len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
const WSABUF *buffers = buffers_ptr;
|
|
|
|
|
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
{
|
|
|
|
async->iov[i].iov_base = buffers[i].buf;
|
|
|
|
async->iov[i].iov_len = buffers[i].len;
|
|
|
|
}
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
|
|
|
async->unix_flags = unix_flags;
|
2021-05-27 06:36:50 +02:00
|
|
|
async->control = control;
|
|
|
|
async->addr = addr;
|
|
|
|
async->addr_len = addr_len;
|
|
|
|
async->ret_flags = ret_flags;
|
2021-05-22 05:08:48 +02:00
|
|
|
|
2021-12-10 18:27:32 +01:00
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
{
|
|
|
|
if (!virtual_check_buffer_for_write( async->iov[i].iov_base, async->iov[i].iov_len ))
|
|
|
|
{
|
|
|
|
release_fileio( &async->io );
|
|
|
|
return STATUS_ACCESS_VIOLATION;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
SERVER_START_REQ( recv_socket )
|
|
|
|
{
|
2022-02-09 17:18:11 +01:00
|
|
|
req->force_async = force_async;
|
2021-08-05 17:42:57 +02:00
|
|
|
req->async = server_async( handle, &async->io, event, apc, apc_user, iosb_client_ptr(io) );
|
2021-05-27 06:36:49 +02:00
|
|
|
req->oob = !!(unix_flags & MSG_OOB);
|
2021-05-22 05:08:48 +02:00
|
|
|
status = wine_server_call( req );
|
|
|
|
wait_handle = wine_server_ptr_handle( reply->wait );
|
|
|
|
options = reply->options;
|
2022-02-09 17:17:59 +01:00
|
|
|
nonblocking = reply->nonblocking;
|
|
|
|
}
|
|
|
|
SERVER_END_REQ;
|
|
|
|
|
|
|
|
alerted = status == STATUS_ALERTED;
|
|
|
|
if (alerted)
|
|
|
|
{
|
|
|
|
status = try_recv( fd, async, &information );
|
|
|
|
if (status == STATUS_DEVICE_NOT_READY && (force_async || !nonblocking))
|
|
|
|
status = STATUS_PENDING;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (status != STATUS_PENDING)
|
|
|
|
{
|
|
|
|
if (!NT_ERROR(status) || (wait_handle && !alerted))
|
2021-07-26 18:53:47 +02:00
|
|
|
{
|
|
|
|
io->Status = status;
|
|
|
|
io->Information = information;
|
|
|
|
}
|
2022-02-09 17:17:59 +01:00
|
|
|
release_fileio( &async->io );
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
|
|
|
|
2022-02-09 17:17:59 +01:00
|
|
|
if (alerted) set_async_direct_result( &wait_handle, status, information );
|
2021-05-22 05:08:48 +02:00
|
|
|
if (wait_handle) status = wait_async( wait_handle, options & FILE_SYNCHRONOUS_IO_ALERT );
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2021-05-25 06:13:41 +02:00
|
|
|
|
2021-05-27 06:36:53 +02:00
|
|
|
static NTSTATUS try_send( int fd, struct async_send_ioctl *async )
|
|
|
|
{
|
|
|
|
union unix_sockaddr unix_addr;
|
|
|
|
struct msghdr hdr;
|
|
|
|
ssize_t ret;
|
|
|
|
|
|
|
|
memset( &hdr, 0, sizeof(hdr) );
|
|
|
|
if (async->addr)
|
|
|
|
{
|
|
|
|
hdr.msg_name = &unix_addr;
|
|
|
|
hdr.msg_namelen = sockaddr_to_unix( async->addr, async->addr_len, &unix_addr );
|
|
|
|
if (!hdr.msg_namelen)
|
|
|
|
{
|
|
|
|
ERR( "failed to convert address\n" );
|
|
|
|
return STATUS_ACCESS_VIOLATION;
|
|
|
|
}
|
|
|
|
|
|
|
|
#if defined(HAS_IPX) && defined(SOL_IPX)
|
|
|
|
if (async->addr->sa_family == WS_AF_IPX)
|
|
|
|
{
|
|
|
|
int type;
|
|
|
|
socklen_t len = sizeof(type);
|
|
|
|
|
|
|
|
/* The packet type is stored at the IPX socket level. At least the
|
|
|
|
* linux kernel seems to do something with it in case hdr.msg_name
|
|
|
|
* is NULL. Nonetheless we can use it to store the packet type, and
|
|
|
|
* then we can retrieve it using getsockopt. After that we can set
|
|
|
|
* the IPX type in the sockaddr_ipx structure with the stored value.
|
|
|
|
*/
|
|
|
|
if (getsockopt(fd, SOL_IPX, IPX_TYPE, &type, &len) >= 0)
|
|
|
|
unix_addr.ipx.sipx_type = type;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
hdr.msg_iov = async->iov + async->iov_cursor;
|
|
|
|
hdr.msg_iovlen = async->count - async->iov_cursor;
|
|
|
|
|
|
|
|
while ((ret = sendmsg( fd, &hdr, async->unix_flags )) == -1)
|
|
|
|
{
|
|
|
|
if (errno == EISCONN)
|
|
|
|
{
|
|
|
|
hdr.msg_name = NULL;
|
|
|
|
hdr.msg_namelen = 0;
|
|
|
|
}
|
|
|
|
else if (errno != EINTR)
|
|
|
|
{
|
|
|
|
if (errno != EWOULDBLOCK) WARN( "sendmsg: %s\n", strerror( errno ) );
|
|
|
|
return sock_errno_to_status( errno );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async->sent_len += ret;
|
|
|
|
|
|
|
|
while (async->iov_cursor < async->count && ret >= async->iov[async->iov_cursor].iov_len)
|
|
|
|
ret -= async->iov[async->iov_cursor++].iov_len;
|
|
|
|
if (async->iov_cursor < async->count)
|
|
|
|
{
|
|
|
|
async->iov[async->iov_cursor].iov_base = (char *)async->iov[async->iov_cursor].iov_base + ret;
|
|
|
|
async->iov[async->iov_cursor].iov_len -= ret;
|
|
|
|
return STATUS_DEVICE_NOT_READY;
|
|
|
|
}
|
|
|
|
return STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
static BOOL async_send_proc( void *user, ULONG_PTR *info, NTSTATUS *status )
|
2021-05-27 06:36:53 +02:00
|
|
|
{
|
|
|
|
struct async_send_ioctl *async = user;
|
|
|
|
int fd, needs_close;
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
TRACE( "%#x\n", *status );
|
2021-05-27 06:36:53 +02:00
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
if (*status == STATUS_ALERTED)
|
2021-05-27 06:36:53 +02:00
|
|
|
{
|
2021-09-14 08:02:48 +02:00
|
|
|
if ((*status = server_get_unix_fd( async->io.handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return TRUE;
|
2021-05-27 06:36:53 +02:00
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
*status = try_send( fd, async );
|
|
|
|
TRACE( "got status %#x\n", *status );
|
2021-05-27 06:36:53 +02:00
|
|
|
|
|
|
|
if (needs_close) close( fd );
|
2021-09-14 08:02:48 +02:00
|
|
|
|
|
|
|
if (*status == STATUS_DEVICE_NOT_READY)
|
|
|
|
return FALSE;
|
2021-05-27 06:36:53 +02:00
|
|
|
}
|
2021-09-14 08:02:48 +02:00
|
|
|
*info = async->sent_len;
|
|
|
|
release_fileio( &async->io );
|
|
|
|
return TRUE;
|
2021-05-27 06:36:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static NTSTATUS sock_send( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
|
2021-12-10 18:27:36 +01:00
|
|
|
IO_STATUS_BLOCK *io, int fd, const void *buffers_ptr, unsigned int count,
|
2021-05-27 06:36:53 +02:00
|
|
|
const struct WS_sockaddr *addr, unsigned int addr_len, int unix_flags, int force_async )
|
|
|
|
{
|
|
|
|
struct async_send_ioctl *async;
|
|
|
|
HANDLE wait_handle;
|
|
|
|
DWORD async_size;
|
|
|
|
NTSTATUS status;
|
|
|
|
unsigned int i;
|
|
|
|
ULONG options;
|
|
|
|
|
|
|
|
async_size = offsetof( struct async_send_ioctl, iov[count] );
|
|
|
|
|
|
|
|
if (!(async = (struct async_send_ioctl *)alloc_fileio( async_size, async_send_proc, handle )))
|
|
|
|
return STATUS_NO_MEMORY;
|
|
|
|
|
|
|
|
async->count = count;
|
2021-12-10 18:27:36 +01:00
|
|
|
if (in_wow64_call())
|
2021-05-27 06:36:53 +02:00
|
|
|
{
|
2021-12-10 18:27:36 +01:00
|
|
|
const struct afd_wsabuf_32 *buffers = buffers_ptr;
|
|
|
|
|
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
{
|
|
|
|
async->iov[i].iov_base = ULongToPtr( buffers[i].buf );
|
|
|
|
async->iov[i].iov_len = buffers[i].len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
const WSABUF *buffers = buffers_ptr;
|
|
|
|
|
|
|
|
for (i = 0; i < count; ++i)
|
|
|
|
{
|
|
|
|
async->iov[i].iov_base = buffers[i].buf;
|
|
|
|
async->iov[i].iov_len = buffers[i].len;
|
|
|
|
}
|
2021-05-27 06:36:53 +02:00
|
|
|
}
|
|
|
|
async->unix_flags = unix_flags;
|
|
|
|
async->addr = addr;
|
|
|
|
async->addr_len = addr_len;
|
|
|
|
async->iov_cursor = 0;
|
|
|
|
async->sent_len = 0;
|
|
|
|
|
|
|
|
status = try_send( fd, async );
|
|
|
|
|
|
|
|
if (status != STATUS_SUCCESS && status != STATUS_DEVICE_NOT_READY)
|
|
|
|
{
|
|
|
|
release_fileio( &async->io );
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (status == STATUS_DEVICE_NOT_READY && force_async)
|
|
|
|
status = STATUS_PENDING;
|
|
|
|
|
|
|
|
SERVER_START_REQ( send_socket )
|
|
|
|
{
|
|
|
|
req->status = status;
|
|
|
|
req->total = async->sent_len;
|
2021-08-05 17:42:57 +02:00
|
|
|
req->async = server_async( handle, &async->io, event, apc, apc_user, iosb_client_ptr(io) );
|
2021-05-27 06:36:53 +02:00
|
|
|
status = wine_server_call( req );
|
|
|
|
wait_handle = wine_server_ptr_handle( reply->wait );
|
|
|
|
options = reply->options;
|
2021-07-26 18:53:46 +02:00
|
|
|
if ((!NT_ERROR(status) || wait_handle) && status != STATUS_PENDING)
|
|
|
|
{
|
|
|
|
io->Status = status;
|
|
|
|
io->Information = async->sent_len;
|
|
|
|
}
|
2021-05-27 06:36:53 +02:00
|
|
|
}
|
|
|
|
SERVER_END_REQ;
|
|
|
|
|
|
|
|
if (status != STATUS_PENDING) release_fileio( &async->io );
|
|
|
|
|
|
|
|
if (wait_handle) status = wait_async( wait_handle, options & FILE_SYNCHRONOUS_IO_ALERT );
|
|
|
|
return status;
|
|
|
|
}
|
2021-05-25 06:13:41 +02:00
|
|
|
|
2021-05-28 01:57:29 +02:00
|
|
|
static ssize_t do_send( int fd, const void *buffer, size_t len, int flags )
|
|
|
|
{
|
|
|
|
ssize_t ret;
|
|
|
|
while ((ret = send( fd, buffer, len, flags )) < 0 && errno == EINTR);
|
|
|
|
if (ret < 0 && errno != EWOULDBLOCK) WARN( "send: %s\n", strerror( errno ) );
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static NTSTATUS try_transmit( int sock_fd, int file_fd, struct async_transmit_ioctl *async )
|
|
|
|
{
|
|
|
|
ssize_t ret;
|
|
|
|
|
2021-12-10 18:27:37 +01:00
|
|
|
while (async->head_cursor < async->head_len)
|
2021-05-28 01:57:29 +02:00
|
|
|
{
|
2021-12-10 18:27:37 +01:00
|
|
|
TRACE( "sending %u bytes of header data\n", async->head_len - async->head_cursor );
|
|
|
|
ret = do_send( sock_fd, async->head + async->head_cursor,
|
|
|
|
async->head_len - async->head_cursor, 0 );
|
2021-05-28 01:57:29 +02:00
|
|
|
if (ret < 0) return sock_errno_to_status( errno );
|
|
|
|
TRACE( "send returned %zd\n", ret );
|
|
|
|
async->head_cursor += ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (async->buffer_cursor < async->read_len)
|
|
|
|
{
|
|
|
|
TRACE( "sending %u bytes of file data\n", async->read_len - async->buffer_cursor );
|
|
|
|
ret = do_send( sock_fd, async->buffer + async->buffer_cursor,
|
|
|
|
async->read_len - async->buffer_cursor, 0 );
|
|
|
|
if (ret < 0) return sock_errno_to_status( errno );
|
|
|
|
TRACE( "send returned %zd\n", ret );
|
|
|
|
async->buffer_cursor += ret;
|
|
|
|
async->file_cursor += ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (async->file && async->buffer_cursor == async->read_len)
|
|
|
|
{
|
|
|
|
unsigned int read_size = async->buffer_size;
|
|
|
|
|
|
|
|
if (async->file_len)
|
|
|
|
read_size = min( read_size, async->file_len - async->file_cursor );
|
|
|
|
|
|
|
|
TRACE( "reading %u bytes of file data\n", read_size );
|
|
|
|
do
|
|
|
|
{
|
|
|
|
if (async->offset.QuadPart == FILE_USE_FILE_POINTER_POSITION)
|
|
|
|
ret = read( file_fd, async->buffer, read_size );
|
|
|
|
else
|
|
|
|
ret = pread( file_fd, async->buffer, read_size, async->offset.QuadPart );
|
|
|
|
} while (ret < 0 && errno == EINTR);
|
|
|
|
if (ret < 0) return errno_to_status( errno );
|
|
|
|
TRACE( "read returned %zd\n", ret );
|
|
|
|
|
|
|
|
async->read_len = ret;
|
|
|
|
async->buffer_cursor = 0;
|
|
|
|
if (async->offset.QuadPart != FILE_USE_FILE_POINTER_POSITION)
|
|
|
|
async->offset.QuadPart += ret;
|
|
|
|
|
|
|
|
if (ret < read_size || (async->file_len && async->file_cursor == async->file_len))
|
|
|
|
async->file = NULL;
|
2021-09-23 07:48:00 +02:00
|
|
|
return STATUS_DEVICE_NOT_READY; /* still more data to send */
|
2021-05-28 01:57:29 +02:00
|
|
|
}
|
|
|
|
|
2021-12-10 18:27:37 +01:00
|
|
|
while (async->tail_cursor < async->tail_len)
|
2021-05-28 01:57:29 +02:00
|
|
|
{
|
2021-12-10 18:27:37 +01:00
|
|
|
TRACE( "sending %u bytes of tail data\n", async->tail_len - async->tail_cursor );
|
|
|
|
ret = do_send( sock_fd, async->tail + async->tail_cursor,
|
|
|
|
async->tail_len - async->tail_cursor, 0 );
|
2021-05-28 01:57:29 +02:00
|
|
|
if (ret < 0) return sock_errno_to_status( errno );
|
|
|
|
TRACE( "send returned %zd\n", ret );
|
|
|
|
async->tail_cursor += ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
static BOOL async_transmit_proc( void *user, ULONG_PTR *info, NTSTATUS *status )
|
2021-05-28 01:57:29 +02:00
|
|
|
{
|
|
|
|
int sock_fd, file_fd = -1, sock_needs_close = FALSE, file_needs_close = FALSE;
|
|
|
|
struct async_transmit_ioctl *async = user;
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
TRACE( "%#x\n", *status );
|
2021-05-28 01:57:29 +02:00
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
if (*status == STATUS_ALERTED)
|
2021-05-28 01:57:29 +02:00
|
|
|
{
|
2021-09-14 08:02:48 +02:00
|
|
|
if ((*status = server_get_unix_fd( async->io.handle, 0, &sock_fd, &sock_needs_close, NULL, NULL )))
|
|
|
|
return TRUE;
|
2021-05-28 01:57:29 +02:00
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
if (async->file && (*status = server_get_unix_fd( async->file, 0, &file_fd, &file_needs_close, NULL, NULL )))
|
2021-05-28 01:57:29 +02:00
|
|
|
{
|
|
|
|
if (sock_needs_close) close( sock_fd );
|
2021-09-14 08:02:48 +02:00
|
|
|
return TRUE;
|
2021-05-28 01:57:29 +02:00
|
|
|
}
|
|
|
|
|
2021-09-14 08:02:48 +02:00
|
|
|
*status = try_transmit( sock_fd, file_fd, async );
|
|
|
|
TRACE( "got status %#x\n", *status );
|
2021-05-28 01:57:29 +02:00
|
|
|
|
|
|
|
if (sock_needs_close) close( sock_fd );
|
|
|
|
if (file_needs_close) close( file_fd );
|
2021-09-14 08:02:48 +02:00
|
|
|
|
|
|
|
if (*status == STATUS_DEVICE_NOT_READY)
|
|
|
|
return FALSE;
|
2021-05-28 01:57:29 +02:00
|
|
|
}
|
2021-09-14 08:02:48 +02:00
|
|
|
*info = async->head_cursor + async->file_cursor + async->tail_cursor;
|
|
|
|
release_fileio( &async->io );
|
|
|
|
return TRUE;
|
2021-05-28 01:57:29 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static NTSTATUS sock_transmit( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
|
|
|
|
IO_STATUS_BLOCK *io, int fd, const struct afd_transmit_params *params )
|
|
|
|
{
|
|
|
|
int file_fd, file_needs_close = FALSE;
|
|
|
|
struct async_transmit_ioctl *async;
|
|
|
|
enum server_fd_type file_type;
|
|
|
|
union unix_sockaddr addr;
|
|
|
|
socklen_t addr_len;
|
|
|
|
HANDLE wait_handle;
|
|
|
|
NTSTATUS status;
|
|
|
|
ULONG options;
|
|
|
|
|
|
|
|
addr_len = sizeof(addr);
|
|
|
|
if (getpeername( fd, &addr.addr, &addr_len ) != 0)
|
|
|
|
return STATUS_INVALID_CONNECTION;
|
|
|
|
|
|
|
|
if (params->file)
|
|
|
|
{
|
2021-12-10 18:27:37 +01:00
|
|
|
if ((status = server_get_unix_fd( ULongToHandle( params->file ), 0, &file_fd, &file_needs_close, &file_type, NULL )))
|
2021-05-28 01:57:29 +02:00
|
|
|
return status;
|
|
|
|
if (file_needs_close) close( file_fd );
|
|
|
|
|
|
|
|
if (file_type != FD_TYPE_FILE)
|
|
|
|
{
|
|
|
|
FIXME( "unsupported file type %#x\n", file_type );
|
|
|
|
return STATUS_NOT_IMPLEMENTED;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(async = (struct async_transmit_ioctl *)alloc_fileio( sizeof(*async), async_transmit_proc, handle )))
|
|
|
|
return STATUS_NO_MEMORY;
|
|
|
|
|
2021-12-10 18:27:37 +01:00
|
|
|
async->file = ULongToHandle( params->file );
|
2021-05-28 01:57:29 +02:00
|
|
|
async->buffer_size = params->buffer_size ? params->buffer_size : 65536;
|
|
|
|
if (!(async->buffer = malloc( async->buffer_size )))
|
|
|
|
{
|
|
|
|
release_fileio( &async->io );
|
|
|
|
return STATUS_NO_MEMORY;
|
|
|
|
}
|
|
|
|
async->read_len = 0;
|
|
|
|
async->head_cursor = 0;
|
|
|
|
async->file_cursor = 0;
|
|
|
|
async->buffer_cursor = 0;
|
|
|
|
async->tail_cursor = 0;
|
|
|
|
async->file_len = params->file_len;
|
|
|
|
async->flags = params->flags;
|
2021-12-10 18:27:37 +01:00
|
|
|
async->head = u64_to_user_ptr(params->head_ptr);
|
|
|
|
async->head_len = params->head_len;
|
|
|
|
async->tail = u64_to_user_ptr(params->tail_ptr);
|
|
|
|
async->tail_len = params->tail_len;
|
2021-05-28 01:57:29 +02:00
|
|
|
async->offset = params->offset;
|
|
|
|
|
|
|
|
SERVER_START_REQ( send_socket )
|
|
|
|
{
|
|
|
|
req->status = STATUS_PENDING;
|
|
|
|
req->total = 0;
|
2021-08-05 17:42:57 +02:00
|
|
|
req->async = server_async( handle, &async->io, event, apc, apc_user, iosb_client_ptr(io) );
|
2021-05-28 01:57:29 +02:00
|
|
|
status = wine_server_call( req );
|
|
|
|
wait_handle = wine_server_ptr_handle( reply->wait );
|
|
|
|
options = reply->options;
|
2021-07-26 18:53:46 +02:00
|
|
|
/* In theory we'd fill the iosb here, as above in sock_send(), but it's
|
|
|
|
* actually currently impossible to get STATUS_SUCCESS. The server will
|
|
|
|
* either return STATUS_PENDING or an error code, and in neither case
|
|
|
|
* should the iosb be filled. */
|
2021-12-16 21:55:38 +01:00
|
|
|
if (!status) FIXME( "Unhandled success status." );
|
2021-05-28 01:57:29 +02:00
|
|
|
}
|
|
|
|
SERVER_END_REQ;
|
|
|
|
|
|
|
|
if (status != STATUS_PENDING) release_fileio( &async->io );
|
|
|
|
|
|
|
|
if (wait_handle) status = wait_async( wait_handle, options & FILE_SYNCHRONOUS_IO_ALERT );
|
|
|
|
return status;
|
|
|
|
}
|
|
|
|
|
2021-06-02 17:30:18 +02:00
|
|
|
static void complete_async( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user,
|
|
|
|
IO_STATUS_BLOCK *io, NTSTATUS status, ULONG_PTR information )
|
|
|
|
{
|
2021-08-05 17:42:57 +02:00
|
|
|
ULONG_PTR iosb_ptr = iosb_client_ptr(io);
|
|
|
|
|
2021-06-02 17:30:18 +02:00
|
|
|
io->Status = status;
|
|
|
|
io->Information = information;
|
|
|
|
if (event) NtSetEvent( event, NULL );
|
2021-08-05 17:42:57 +02:00
|
|
|
if (apc) NtQueueApcThread( GetCurrentThread(), (PNTAPCFUNC)apc, (ULONG_PTR)apc_user, iosb_ptr, 0 );
|
2021-06-02 17:30:18 +02:00
|
|
|
if (apc_user) add_completion( handle, (ULONG_PTR)apc_user, status, information, FALSE );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-06-23 18:23:45 +02:00
|
|
|
static NTSTATUS do_getsockopt( HANDLE handle, IO_STATUS_BLOCK *io, int level,
|
|
|
|
int option, void *out_buffer, ULONG out_size )
|
2021-06-23 18:23:44 +02:00
|
|
|
{
|
|
|
|
int fd, needs_close = FALSE;
|
|
|
|
socklen_t len = out_size;
|
|
|
|
NTSTATUS status;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
ret = getsockopt( fd, level, option, out_buffer, &len );
|
|
|
|
if (needs_close) close( fd );
|
|
|
|
if (ret) return sock_errno_to_status( errno );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (io)
|
|
|
|
{
|
|
|
|
io->Status = STATUS_SUCCESS;
|
|
|
|
io->Information = len;
|
|
|
|
}
|
2021-06-23 18:23:44 +02:00
|
|
|
return STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-06-23 18:23:45 +02:00
|
|
|
static NTSTATUS do_setsockopt( HANDLE handle, IO_STATUS_BLOCK *io, int level,
|
|
|
|
int option, const void *optval, socklen_t optlen )
|
|
|
|
{
|
|
|
|
int fd, needs_close = FALSE;
|
|
|
|
NTSTATUS status;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
ret = setsockopt( fd, level, option, optval, optlen );
|
|
|
|
if (needs_close) close( fd );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (ret) return sock_errno_to_status( errno );
|
|
|
|
if (io) io->Status = STATUS_SUCCESS;
|
|
|
|
return STATUS_SUCCESS;
|
2021-06-23 18:23:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-08-18 07:50:47 +02:00
|
|
|
static int get_sock_type( HANDLE handle )
|
|
|
|
{
|
|
|
|
int sock_type;
|
|
|
|
if (do_getsockopt( handle, NULL, SOL_SOCKET, SO_TYPE, &sock_type, sizeof(sock_type) ) != STATUS_SUCCESS)
|
|
|
|
return -1;
|
|
|
|
return sock_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
NTSTATUS sock_ioctl( HANDLE handle, HANDLE event, PIO_APC_ROUTINE apc, void *apc_user, IO_STATUS_BLOCK *io,
|
|
|
|
ULONG code, void *in_buffer, ULONG in_size, void *out_buffer, ULONG out_size )
|
|
|
|
{
|
2021-05-27 06:36:50 +02:00
|
|
|
int fd, needs_close = FALSE;
|
2021-05-22 05:08:48 +02:00
|
|
|
NTSTATUS status;
|
|
|
|
|
|
|
|
TRACE( "handle %p, code %#x, in_buffer %p, in_size %u, out_buffer %p, out_size %u\n",
|
|
|
|
handle, code, in_buffer, in_size, out_buffer, out_size );
|
|
|
|
|
|
|
|
switch (code)
|
|
|
|
{
|
2021-06-16 06:13:27 +02:00
|
|
|
case IOCTL_AFD_BIND:
|
|
|
|
{
|
|
|
|
const struct afd_bind_params *params = in_buffer;
|
|
|
|
|
|
|
|
if (params->unknown) FIXME( "bind: got unknown %#x\n", params->unknown );
|
|
|
|
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-06-16 06:13:28 +02:00
|
|
|
case IOCTL_AFD_GETSOCKNAME:
|
|
|
|
if (in_size) FIXME( "unexpected input size %u\n", in_size );
|
|
|
|
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
break;
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
case IOCTL_AFD_LISTEN:
|
|
|
|
{
|
|
|
|
const struct afd_listen_params *params = in_buffer;
|
|
|
|
|
|
|
|
TRACE( "backlog %u\n", params->backlog );
|
|
|
|
if (out_size) FIXME( "unexpected output size %u\n", out_size );
|
|
|
|
if (params->unknown1) FIXME( "listen: got unknown1 %#x\n", params->unknown1 );
|
|
|
|
if (params->unknown2) FIXME( "listen: got unknown2 %#x\n", params->unknown2 );
|
|
|
|
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
break;
|
|
|
|
}
|
2021-06-14 07:41:49 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_EVENT_SELECT:
|
|
|
|
{
|
|
|
|
const struct afd_event_select_params *params = in_buffer;
|
|
|
|
|
|
|
|
TRACE( "event %p, mask %#x\n", params->event, params->mask );
|
|
|
|
if (out_size) FIXME( "unexpected output size %u\n", out_size );
|
|
|
|
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
break;
|
|
|
|
}
|
2021-05-22 05:08:48 +02:00
|
|
|
|
2021-06-15 17:39:43 +02:00
|
|
|
case IOCTL_AFD_GET_EVENTS:
|
|
|
|
if (in_size) FIXME( "unexpected input size %u\n", in_size );
|
|
|
|
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
break;
|
|
|
|
|
2021-12-10 18:27:39 +01:00
|
|
|
case IOCTL_AFD_POLL:
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
break;
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
case IOCTL_AFD_RECV:
|
|
|
|
{
|
2021-12-10 18:27:33 +01:00
|
|
|
struct afd_recv_params params;
|
2021-05-22 05:08:48 +02:00
|
|
|
int unix_flags = 0;
|
|
|
|
|
2021-05-27 06:36:50 +02:00
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
if (out_size) FIXME( "unexpected output size %u\n", out_size );
|
|
|
|
|
2021-12-10 18:27:33 +01:00
|
|
|
if (in_wow64_call())
|
2021-05-22 05:08:48 +02:00
|
|
|
{
|
2021-12-10 18:27:33 +01:00
|
|
|
const struct afd_recv_params_32 *params32 = in_buffer;
|
|
|
|
|
|
|
|
if (in_size < sizeof(struct afd_recv_params_32))
|
|
|
|
{
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
params.recv_flags = params32->recv_flags;
|
|
|
|
params.msg_flags = params32->msg_flags;
|
|
|
|
params.buffers = ULongToPtr( params32->buffers );
|
|
|
|
params.count = params32->count;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (in_size < sizeof(struct afd_recv_params))
|
|
|
|
{
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy( ¶ms, in_buffer, sizeof(params) );
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
|
|
|
|
2021-12-10 18:27:33 +01:00
|
|
|
if ((params.msg_flags & (AFD_MSG_NOT_OOB | AFD_MSG_OOB)) == 0 ||
|
|
|
|
(params.msg_flags & (AFD_MSG_NOT_OOB | AFD_MSG_OOB)) == (AFD_MSG_NOT_OOB | AFD_MSG_OOB))
|
2021-05-22 05:08:48 +02:00
|
|
|
{
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-12-10 18:27:33 +01:00
|
|
|
if (params.msg_flags & ~(AFD_MSG_NOT_OOB | AFD_MSG_OOB | AFD_MSG_PEEK | AFD_MSG_WAITALL))
|
|
|
|
FIXME( "unknown msg_flags %#x\n", params.msg_flags );
|
|
|
|
if (params.recv_flags & ~AFD_RECV_FORCE_ASYNC)
|
|
|
|
FIXME( "unknown recv_flags %#x\n", params.recv_flags );
|
2021-05-22 05:08:48 +02:00
|
|
|
|
2021-12-10 18:27:33 +01:00
|
|
|
if (params.msg_flags & AFD_MSG_OOB)
|
2021-05-22 05:08:48 +02:00
|
|
|
unix_flags |= MSG_OOB;
|
2021-12-10 18:27:33 +01:00
|
|
|
if (params.msg_flags & AFD_MSG_PEEK)
|
2021-05-22 05:08:48 +02:00
|
|
|
unix_flags |= MSG_PEEK;
|
2021-12-10 18:27:33 +01:00
|
|
|
if (params.msg_flags & AFD_MSG_WAITALL)
|
2021-05-22 05:08:48 +02:00
|
|
|
FIXME( "MSG_WAITALL is not supported\n" );
|
2021-12-10 18:27:33 +01:00
|
|
|
status = sock_recv( handle, event, apc, apc_user, io, fd, params.buffers, params.count, NULL,
|
|
|
|
NULL, NULL, NULL, unix_flags, !!(params.recv_flags & AFD_RECV_FORCE_ASYNC) );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
return status;
|
2021-05-27 06:36:50 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_RECVMSG:
|
|
|
|
{
|
|
|
|
struct afd_recvmsg_params *params = in_buffer;
|
2021-12-10 18:27:35 +01:00
|
|
|
unsigned int *ws_flags = u64_to_user_ptr(params->ws_flags_ptr);
|
2021-05-27 06:36:50 +02:00
|
|
|
int unix_flags = 0;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (in_size < sizeof(*params))
|
|
|
|
{
|
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-12-10 18:27:35 +01:00
|
|
|
if (*ws_flags & WS_MSG_OOB)
|
2021-05-27 06:36:50 +02:00
|
|
|
unix_flags |= MSG_OOB;
|
2021-12-10 18:27:35 +01:00
|
|
|
if (*ws_flags & WS_MSG_PEEK)
|
2021-05-27 06:36:50 +02:00
|
|
|
unix_flags |= MSG_PEEK;
|
2021-12-10 18:27:35 +01:00
|
|
|
if (*ws_flags & WS_MSG_WAITALL)
|
2021-05-27 06:36:50 +02:00
|
|
|
FIXME( "MSG_WAITALL is not supported\n" );
|
2021-12-10 18:27:35 +01:00
|
|
|
status = sock_recv( handle, event, apc, apc_user, io, fd, u64_to_user_ptr(params->buffers_ptr),
|
|
|
|
params->count, u64_to_user_ptr(params->control_ptr),
|
|
|
|
u64_to_user_ptr(params->addr_ptr), u64_to_user_ptr(params->addr_len_ptr),
|
|
|
|
ws_flags, unix_flags, params->force_async );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
return status;
|
2021-05-22 05:08:48 +02:00
|
|
|
}
|
|
|
|
|
2021-05-27 06:36:53 +02:00
|
|
|
case IOCTL_AFD_WINE_SENDMSG:
|
|
|
|
{
|
|
|
|
const struct afd_sendmsg_params *params = in_buffer;
|
|
|
|
int unix_flags = 0;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (in_size < sizeof(*params))
|
|
|
|
{
|
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (params->ws_flags & WS_MSG_OOB)
|
|
|
|
unix_flags |= MSG_OOB;
|
|
|
|
if (params->ws_flags & WS_MSG_PARTIAL)
|
|
|
|
WARN( "ignoring MSG_PARTIAL\n" );
|
|
|
|
if (params->ws_flags & ~(WS_MSG_OOB | WS_MSG_PARTIAL))
|
|
|
|
FIXME( "unknown flags %#x\n", params->ws_flags );
|
2021-12-10 18:27:36 +01:00
|
|
|
status = sock_send( handle, event, apc, apc_user, io, fd, u64_to_user_ptr( params->buffers_ptr ), params->count,
|
|
|
|
u64_to_user_ptr( params->addr_ptr ), params->addr_len, unix_flags, params->force_async );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
return status;
|
2021-05-27 06:36:53 +02:00
|
|
|
}
|
|
|
|
|
2021-05-28 01:57:29 +02:00
|
|
|
case IOCTL_AFD_WINE_TRANSMIT:
|
|
|
|
{
|
|
|
|
const struct afd_transmit_params *params = in_buffer;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (in_size < sizeof(*params))
|
|
|
|
{
|
2021-06-03 23:09:32 +02:00
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
2021-05-28 01:57:29 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
status = sock_transmit( handle, event, apc, apc_user, io, fd, params );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
return status;
|
2021-05-28 01:57:29 +02:00
|
|
|
}
|
|
|
|
|
2021-06-02 17:30:18 +02:00
|
|
|
case IOCTL_AFD_WINE_COMPLETE_ASYNC:
|
|
|
|
{
|
|
|
|
if (in_size != sizeof(NTSTATUS))
|
|
|
|
return STATUS_BUFFER_TOO_SMALL;
|
|
|
|
|
|
|
|
status = *(NTSTATUS *)in_buffer;
|
|
|
|
complete_async( handle, event, apc, apc_user, io, status, 0 );
|
2021-12-16 21:55:38 +01:00
|
|
|
return status;
|
2021-06-02 17:30:18 +02:00
|
|
|
}
|
|
|
|
|
2021-06-03 00:03:59 +02:00
|
|
|
case IOCTL_AFD_WINE_FIONREAD:
|
|
|
|
{
|
|
|
|
int value, ret;
|
|
|
|
|
|
|
|
if (out_size < sizeof(int))
|
|
|
|
{
|
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
#ifdef linux
|
|
|
|
{
|
|
|
|
socklen_t len = sizeof(value);
|
|
|
|
|
|
|
|
/* FIONREAD on a listening socket always fails (see tcp(7)). */
|
|
|
|
if (!getsockopt( fd, SOL_SOCKET, SO_ACCEPTCONN, &value, &len ) && value)
|
|
|
|
{
|
|
|
|
*(int *)out_buffer = 0;
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
complete_async( handle, event, apc, apc_user, io, STATUS_SUCCESS, 0 );
|
|
|
|
return STATUS_SUCCESS;
|
2021-06-03 00:03:59 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if ((ret = ioctl( fd, FIONREAD, &value )) < 0)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
*(int *)out_buffer = value;
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
complete_async( handle, event, apc, apc_user, io, STATUS_SUCCESS, 0 );
|
|
|
|
return STATUS_SUCCESS;
|
2021-06-03 00:03:59 +02:00
|
|
|
}
|
|
|
|
|
2021-06-03 00:04:01 +02:00
|
|
|
case IOCTL_AFD_WINE_SIOCATMARK:
|
|
|
|
{
|
|
|
|
int value, ret;
|
|
|
|
socklen_t len = sizeof(value);
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (out_size < sizeof(int))
|
|
|
|
{
|
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (getsockopt( fd, SOL_SOCKET, SO_OOBINLINE, &value, &len ) < 0)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (value)
|
|
|
|
{
|
|
|
|
*(int *)out_buffer = TRUE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if ((ret = ioctl( fd, SIOCATMARK, &value )) < 0)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* windows is reversed with respect to unix */
|
|
|
|
*(int *)out_buffer = !value;
|
|
|
|
}
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
complete_async( handle, event, apc, apc_user, io, STATUS_SUCCESS, 0 );
|
|
|
|
return STATUS_SUCCESS;
|
2021-06-03 00:04:01 +02:00
|
|
|
}
|
|
|
|
|
2021-06-08 02:53:09 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_INTERFACE_LIST:
|
|
|
|
{
|
|
|
|
#ifdef HAVE_GETIFADDRS
|
|
|
|
INTERFACE_INFO *info = out_buffer;
|
|
|
|
struct ifaddrs *ifaddrs, *ifaddr;
|
|
|
|
unsigned int count = 0;
|
|
|
|
ULONG ret_size;
|
|
|
|
|
|
|
|
if (getifaddrs( &ifaddrs ) < 0)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (ifaddr = ifaddrs; ifaddr != NULL; ifaddr = ifaddr->ifa_next)
|
|
|
|
{
|
|
|
|
if (ifaddr->ifa_addr && ifaddr->ifa_addr->sa_family == AF_INET) ++count;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret_size = count * sizeof(*info);
|
|
|
|
if (out_size < ret_size)
|
|
|
|
{
|
|
|
|
freeifaddrs( ifaddrs );
|
2021-12-16 21:55:38 +01:00
|
|
|
complete_async( handle, event, apc, apc_user, io, STATUS_BUFFER_TOO_SMALL, 0 );
|
|
|
|
return STATUS_PENDING;
|
2021-06-08 02:53:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
memset( out_buffer, 0, ret_size );
|
|
|
|
|
|
|
|
count = 0;
|
|
|
|
for (ifaddr = ifaddrs; ifaddr != NULL; ifaddr = ifaddr->ifa_next)
|
|
|
|
{
|
|
|
|
in_addr_t addr, mask;
|
|
|
|
|
|
|
|
if (!ifaddr->ifa_addr || ifaddr->ifa_addr->sa_family != AF_INET)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
addr = ((const struct sockaddr_in *)ifaddr->ifa_addr)->sin_addr.s_addr;
|
|
|
|
mask = ((const struct sockaddr_in *)ifaddr->ifa_netmask)->sin_addr.s_addr;
|
|
|
|
|
|
|
|
info[count].iiFlags = 0;
|
|
|
|
if (ifaddr->ifa_flags & IFF_BROADCAST)
|
|
|
|
info[count].iiFlags |= WS_IFF_BROADCAST;
|
|
|
|
if (ifaddr->ifa_flags & IFF_LOOPBACK)
|
|
|
|
info[count].iiFlags |= WS_IFF_LOOPBACK;
|
|
|
|
if (ifaddr->ifa_flags & IFF_MULTICAST)
|
|
|
|
info[count].iiFlags |= WS_IFF_MULTICAST;
|
|
|
|
#ifdef IFF_POINTTOPOINT
|
|
|
|
if (ifaddr->ifa_flags & IFF_POINTTOPOINT)
|
|
|
|
info[count].iiFlags |= WS_IFF_POINTTOPOINT;
|
|
|
|
#endif
|
|
|
|
if (ifaddr->ifa_flags & IFF_UP)
|
|
|
|
info[count].iiFlags |= WS_IFF_UP;
|
|
|
|
|
|
|
|
info[count].iiAddress.AddressIn.sin_family = WS_AF_INET;
|
|
|
|
info[count].iiAddress.AddressIn.sin_port = 0;
|
|
|
|
info[count].iiAddress.AddressIn.sin_addr.WS_s_addr = addr;
|
|
|
|
|
|
|
|
info[count].iiNetmask.AddressIn.sin_family = WS_AF_INET;
|
|
|
|
info[count].iiNetmask.AddressIn.sin_port = 0;
|
|
|
|
info[count].iiNetmask.AddressIn.sin_addr.WS_s_addr = mask;
|
|
|
|
|
|
|
|
if (ifaddr->ifa_flags & IFF_BROADCAST)
|
|
|
|
{
|
|
|
|
info[count].iiBroadcastAddress.AddressIn.sin_family = WS_AF_INET;
|
|
|
|
info[count].iiBroadcastAddress.AddressIn.sin_port = 0;
|
|
|
|
info[count].iiBroadcastAddress.AddressIn.sin_addr.WS_s_addr = addr | ~mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
++count;
|
|
|
|
}
|
|
|
|
|
|
|
|
freeifaddrs( ifaddrs );
|
|
|
|
complete_async( handle, event, apc, apc_user, io, STATUS_SUCCESS, ret_size );
|
2021-12-16 21:55:38 +01:00
|
|
|
return STATUS_PENDING;
|
2021-06-08 02:53:09 +02:00
|
|
|
#else
|
|
|
|
FIXME( "Interface list queries are currently not supported on this platform.\n" );
|
|
|
|
status = STATUS_NOT_SUPPORTED;
|
|
|
|
#endif
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-06-08 02:53:11 +02:00
|
|
|
case IOCTL_AFD_WINE_KEEPALIVE_VALS:
|
|
|
|
{
|
|
|
|
struct tcp_keepalive *k = in_buffer;
|
|
|
|
int keepalive;
|
|
|
|
|
|
|
|
if (!in_buffer || in_size < sizeof(struct tcp_keepalive))
|
|
|
|
return STATUS_BUFFER_TOO_SMALL;
|
|
|
|
keepalive = !!k->onoff;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (setsockopt( fd, SOL_SOCKET, SO_KEEPALIVE, &keepalive, sizeof(int) ) < 0)
|
|
|
|
{
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (keepalive)
|
|
|
|
{
|
|
|
|
#ifdef TCP_KEEPIDLE
|
|
|
|
int idle = max( 1, (k->keepalivetime + 500) / 1000 );
|
|
|
|
|
|
|
|
if (setsockopt( fd, IPPROTO_TCP, TCP_KEEPIDLE, &idle, sizeof(int) ) < 0)
|
|
|
|
{
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
FIXME("ignoring keepalive timeout\n");
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
if (keepalive)
|
|
|
|
{
|
|
|
|
#ifdef TCP_KEEPINTVL
|
|
|
|
int interval = max( 1, (k->keepaliveinterval + 500) / 1000 );
|
|
|
|
|
|
|
|
if (setsockopt( fd, IPPROTO_TCP, TCP_KEEPINTVL, &interval, sizeof(int) ) < 0)
|
|
|
|
status = STATUS_INVALID_PARAMETER;
|
|
|
|
#else
|
|
|
|
FIXME("ignoring keepalive interval\n");
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2021-12-16 21:55:38 +01:00
|
|
|
if (needs_close) close( fd );
|
|
|
|
complete_async( handle, event, apc, apc_user, io, STATUS_SUCCESS, 0 );
|
|
|
|
return STATUS_SUCCESS;
|
2021-06-08 02:53:11 +02:00
|
|
|
}
|
|
|
|
|
2021-06-17 06:33:12 +02:00
|
|
|
case IOCTL_AFD_WINE_GETPEERNAME:
|
|
|
|
{
|
|
|
|
union unix_sockaddr unix_addr;
|
|
|
|
socklen_t unix_len = sizeof(unix_addr);
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (getpeername( fd, &unix_addr.addr, &unix_len ) < 0)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
len = sockaddr_from_unix( &unix_addr, out_buffer, out_size );
|
|
|
|
if (out_size < len)
|
|
|
|
{
|
|
|
|
status = STATUS_BUFFER_TOO_SMALL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
io->Information = len;
|
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-06-23 18:23:44 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_SO_BROADCAST:
|
2021-06-23 18:23:45 +02:00
|
|
|
return do_getsockopt( handle, io, SOL_SOCKET, SO_BROADCAST, out_buffer, out_size );
|
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_SO_BROADCAST:
|
|
|
|
return do_setsockopt( handle, io, SOL_SOCKET, SO_BROADCAST, in_buffer, in_size );
|
2021-06-23 18:23:44 +02:00
|
|
|
|
2021-06-24 07:00:14 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_SO_KEEPALIVE:
|
|
|
|
return do_getsockopt( handle, io, SOL_SOCKET, SO_KEEPALIVE, out_buffer, out_size );
|
|
|
|
|
2021-06-24 07:00:15 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_SO_KEEPALIVE:
|
|
|
|
return do_setsockopt( handle, io, SOL_SOCKET, SO_KEEPALIVE, in_buffer, in_size );
|
|
|
|
|
2021-06-25 05:32:45 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_SO_LINGER:
|
|
|
|
{
|
|
|
|
struct WS_linger *ws_linger = out_buffer;
|
|
|
|
struct linger unix_linger;
|
|
|
|
socklen_t len = sizeof(unix_linger);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
ret = getsockopt( fd, SOL_SOCKET, SO_LINGER, &unix_linger, &len );
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
ws_linger->l_onoff = unix_linger.l_onoff;
|
|
|
|
ws_linger->l_linger = unix_linger.l_linger;
|
|
|
|
io->Information = sizeof(*ws_linger);
|
|
|
|
}
|
|
|
|
|
2021-12-16 21:55:38 +01:00
|
|
|
status = ret ? sock_errno_to_status( errno ) : STATUS_SUCCESS;
|
|
|
|
break;
|
2021-06-25 05:32:45 +02:00
|
|
|
}
|
|
|
|
|
2021-06-25 05:32:46 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_SO_LINGER:
|
|
|
|
{
|
|
|
|
const struct WS_linger *ws_linger = in_buffer;
|
|
|
|
struct linger unix_linger;
|
|
|
|
|
|
|
|
unix_linger.l_onoff = ws_linger->l_onoff;
|
|
|
|
unix_linger.l_linger = ws_linger->l_linger;
|
|
|
|
|
|
|
|
return do_setsockopt( handle, io, SOL_SOCKET, SO_LINGER, &unix_linger, sizeof(unix_linger) );
|
|
|
|
}
|
|
|
|
|
2021-06-25 05:32:49 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_SO_OOBINLINE:
|
|
|
|
return do_getsockopt( handle, io, SOL_SOCKET, SO_OOBINLINE, out_buffer, out_size );
|
|
|
|
|
2021-06-25 05:32:50 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_SO_OOBINLINE:
|
|
|
|
return do_setsockopt( handle, io, SOL_SOCKET, SO_OOBINLINE, in_buffer, in_size );
|
|
|
|
|
2021-06-29 18:43:21 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_SO_REUSEADDR:
|
|
|
|
return do_getsockopt( handle, io, SOL_SOCKET, SO_REUSEADDR, out_buffer, out_size );
|
|
|
|
|
2021-06-29 18:43:22 +02:00
|
|
|
/* BSD socket SO_REUSEADDR is not 100% compatible to winsock semantics;
|
|
|
|
* however, using it the BSD way fixes bug 8513 and seems to be what
|
|
|
|
* most programmers assume, anyway */
|
|
|
|
case IOCTL_AFD_WINE_SET_SO_REUSEADDR:
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
ret = setsockopt( fd, SOL_SOCKET, SO_REUSEADDR, in_buffer, in_size );
|
|
|
|
#ifdef __APPLE__
|
|
|
|
if (!ret) ret = setsockopt( fd, SOL_SOCKET, SO_REUSEPORT, in_buffer, in_size );
|
|
|
|
#endif
|
2021-12-16 21:55:38 +01:00
|
|
|
status = ret ? sock_errno_to_status( errno ) : STATUS_SUCCESS;
|
|
|
|
break;
|
2021-06-29 18:43:22 +02:00
|
|
|
}
|
|
|
|
|
2021-07-01 03:24:39 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_ADD_MEMBERSHIP:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_ADD_MEMBERSHIP, in_buffer, in_size );
|
|
|
|
|
2021-07-02 00:10:25 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_ADD_SOURCE_MEMBERSHIP:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_ADD_SOURCE_MEMBERSHIP, in_buffer, in_size );
|
|
|
|
|
2021-07-02 00:10:26 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_BLOCK_SOURCE:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_BLOCK_SOURCE, in_buffer, in_size );
|
|
|
|
|
2021-07-02 00:10:27 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_DONTFRAGMENT:
|
|
|
|
{
|
|
|
|
socklen_t len = out_size;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
#ifdef IP_DONTFRAG
|
|
|
|
ret = getsockopt( fd, IPPROTO_IP, IP_DONTFRAG, out_buffer, &len );
|
|
|
|
#elif defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
|
|
|
|
{
|
|
|
|
int value;
|
|
|
|
|
|
|
|
len = sizeof(value);
|
|
|
|
ret = getsockopt( fd, IPPROTO_IP, IP_MTU_DISCOVER, &value, &len );
|
|
|
|
if (!ret) *(DWORD *)out_buffer = (value != IP_PMTUDISC_DONT);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
static int once;
|
|
|
|
|
|
|
|
if (!once++)
|
|
|
|
FIXME( "IP_DONTFRAGMENT is not supported on this platform\n" );
|
|
|
|
ret = 0; /* fake success */
|
|
|
|
}
|
|
|
|
#endif
|
2021-12-16 21:55:38 +01:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
io->Information = len;
|
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
break;
|
2021-07-02 00:10:27 +02:00
|
|
|
}
|
|
|
|
|
2021-07-02 00:10:28 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_DONTFRAGMENT:
|
|
|
|
#ifdef IP_DONTFRAG
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_DONTFRAG, in_buffer, in_size );
|
|
|
|
#elif defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DO) && defined(IP_PMTUDISC_DONT)
|
|
|
|
{
|
|
|
|
int value = *(DWORD *)in_buffer ? IP_PMTUDISC_DO : IP_PMTUDISC_DONT;
|
|
|
|
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_MTU_DISCOVER, &value, sizeof(value) );
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
static int once;
|
|
|
|
|
|
|
|
if (!once++)
|
|
|
|
FIXME( "IP_DONTFRAGMENT is not supported on this platform\n" );
|
2021-12-16 21:55:38 +01:00
|
|
|
status = STATUS_SUCCESS; /* fake success */
|
|
|
|
break;
|
2021-07-02 00:10:28 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-07-07 06:48:44 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_DROP_MEMBERSHIP:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_DROP_MEMBERSHIP, in_buffer, in_size );
|
|
|
|
|
2021-07-07 06:48:45 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_DROP_SOURCE_MEMBERSHIP:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_DROP_SOURCE_MEMBERSHIP, in_buffer, in_size );
|
|
|
|
|
2021-07-08 03:16:38 +02:00
|
|
|
#ifdef IP_HDRINCL
|
2021-08-18 07:50:48 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_HDRINCL:
|
|
|
|
if (get_sock_type( handle ) != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_HDRINCL, out_buffer, out_size );
|
|
|
|
|
2021-07-08 03:16:39 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_HDRINCL:
|
2021-08-18 07:50:48 +02:00
|
|
|
if (get_sock_type( handle ) != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-08 03:16:39 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_HDRINCL, in_buffer, in_size );
|
2021-07-08 03:16:38 +02:00
|
|
|
#endif
|
|
|
|
|
2021-07-08 03:16:40 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_MULTICAST_IF:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-08 03:16:40 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_MULTICAST_IF, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-08 03:16:40 +02:00
|
|
|
|
2021-07-08 03:16:41 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_MULTICAST_IF:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-08 03:16:41 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_MULTICAST_IF, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-08 03:16:41 +02:00
|
|
|
|
2021-07-08 03:16:42 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_MULTICAST_LOOP:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-08 03:16:42 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_MULTICAST_LOOP, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-08 03:16:42 +02:00
|
|
|
|
2021-07-09 04:24:45 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_MULTICAST_LOOP:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-09 04:24:45 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_MULTICAST_LOOP, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-09 04:24:45 +02:00
|
|
|
|
2021-07-09 04:24:46 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_MULTICAST_TTL:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-09 04:24:46 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_MULTICAST_TTL, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-09 04:24:46 +02:00
|
|
|
|
2021-07-09 04:24:47 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_MULTICAST_TTL:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-09 04:24:47 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_MULTICAST_TTL, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-09 04:24:47 +02:00
|
|
|
|
2021-07-09 04:24:48 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_OPTIONS:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_OPTIONS, out_buffer, out_size );
|
|
|
|
|
2021-07-09 04:24:49 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_OPTIONS:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_OPTIONS, in_buffer, in_size );
|
|
|
|
|
2021-07-10 02:40:39 +02:00
|
|
|
#ifdef IP_PKTINFO
|
|
|
|
case IOCTL_AFD_WINE_GET_IP_PKTINFO:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-10 02:40:39 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_PKTINFO, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-10 02:40:40 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IP_PKTINFO:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-10 02:40:40 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_PKTINFO, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-10 02:40:39 +02:00
|
|
|
#elif defined(IP_RECVDSTADDR)
|
|
|
|
case IOCTL_AFD_WINE_GET_IP_PKTINFO:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-10 02:40:39 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_RECVDSTADDR, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-10 02:40:40 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IP_PKTINFO:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-10 02:40:40 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_RECVDSTADDR, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-10 02:40:39 +02:00
|
|
|
#endif
|
|
|
|
|
2021-09-29 08:40:55 +02:00
|
|
|
#ifdef IP_RECVTOS
|
|
|
|
case IOCTL_AFD_WINE_GET_IP_RECVTOS:
|
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_RECVTOS, out_buffer, out_size );
|
|
|
|
}
|
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IP_RECVTOS:
|
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_RECVTOS, in_buffer, in_size );
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-09-29 08:40:54 +02:00
|
|
|
#ifdef IP_RECVTTL
|
|
|
|
case IOCTL_AFD_WINE_GET_IP_RECVTTL:
|
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_RECVTTL, out_buffer, out_size );
|
|
|
|
}
|
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IP_RECVTTL:
|
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_RECVTTL, in_buffer, in_size );
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-07-10 02:40:41 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_TOS:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_TOS, out_buffer, out_size );
|
|
|
|
|
2021-07-10 02:40:42 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_TOS:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_TOS, in_buffer, in_size );
|
|
|
|
|
2021-07-10 02:40:43 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IP_TTL:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_TTL, out_buffer, out_size );
|
|
|
|
|
2021-07-27 07:13:32 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_TTL:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_TTL, in_buffer, in_size );
|
|
|
|
|
2021-07-27 07:13:33 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IP_UNBLOCK_SOURCE:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_UNBLOCK_SOURCE, in_buffer, in_size );
|
|
|
|
|
2021-07-27 07:13:34 +02:00
|
|
|
#ifdef IP_UNICAST_IF
|
|
|
|
case IOCTL_AFD_WINE_GET_IP_UNICAST_IF:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IP, IP_UNICAST_IF, out_buffer, out_size );
|
2021-07-27 07:13:35 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IP_UNICAST_IF:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IP_UNICAST_IF, in_buffer, in_size );
|
2021-07-27 07:13:34 +02:00
|
|
|
#endif
|
|
|
|
|
2021-07-28 17:17:05 +02:00
|
|
|
#ifdef IPV6_ADD_MEMBERSHIP
|
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_ADD_MEMBERSHIP:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_ADD_MEMBERSHIP, in_buffer, in_size );
|
|
|
|
#endif
|
|
|
|
|
2021-07-28 17:17:06 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_DONTFRAG:
|
|
|
|
{
|
|
|
|
socklen_t len = out_size;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
#ifdef IPV6_DONTFRAG
|
|
|
|
ret = getsockopt( fd, IPPROTO_IPV6, IPV6_DONTFRAG, out_buffer, &len );
|
|
|
|
#elif defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DONT)
|
|
|
|
{
|
|
|
|
int value;
|
|
|
|
|
|
|
|
len = sizeof(value);
|
|
|
|
ret = getsockopt( fd, IPPROTO_IPV6, IPV6_MTU_DISCOVER, &value, &len );
|
|
|
|
if (!ret) *(DWORD *)out_buffer = (value != IPV6_PMTUDISC_DONT);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
static int once;
|
|
|
|
|
|
|
|
if (!once++)
|
|
|
|
FIXME( "IPV6_DONTFRAGMENT is not supported on this platform\n" );
|
|
|
|
ret = 0; /* fake success */
|
|
|
|
}
|
|
|
|
#endif
|
2021-12-16 21:55:38 +01:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
io->Information = len;
|
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
break;
|
2021-07-28 17:17:06 +02:00
|
|
|
}
|
|
|
|
|
2021-07-28 17:17:07 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_DONTFRAG:
|
|
|
|
#ifdef IPV6_DONTFRAG
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_DONTFRAG, in_buffer, in_size );
|
|
|
|
#elif defined(IPV6_MTU_DISCOVER) && defined(IPV6_PMTUDISC_DO) && defined(IPV6_PMTUDISC_DONT)
|
|
|
|
{
|
|
|
|
int value = *(DWORD *)in_buffer ? IPV6_PMTUDISC_DO : IPV6_PMTUDISC_DONT;
|
|
|
|
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IP, IPV6_MTU_DISCOVER, &value, sizeof(value) );
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
{
|
|
|
|
static int once;
|
|
|
|
|
|
|
|
if (!once++)
|
|
|
|
FIXME( "IPV6_DONTFRAGMENT is not supported on this platform\n" );
|
|
|
|
return STATUS_SUCCESS; /* fake success */
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-07-28 17:17:08 +02:00
|
|
|
#ifdef IPV6_DROP_MEMBERSHIP
|
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_DROP_MEMBERSHIP:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_DROP_MEMBERSHIP, in_buffer, in_size );
|
|
|
|
#endif
|
|
|
|
|
2021-07-28 17:17:09 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_MULTICAST_HOPS:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-28 17:17:09 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-28 17:17:09 +02:00
|
|
|
|
2021-07-28 23:18:09 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_MULTICAST_HOPS:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-28 23:18:09 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_MULTICAST_HOPS, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-28 23:18:09 +02:00
|
|
|
|
2021-07-28 23:18:10 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_MULTICAST_IF:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-28 23:18:10 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_MULTICAST_IF, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-28 23:18:10 +02:00
|
|
|
|
2021-07-28 23:18:11 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_MULTICAST_IF:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-28 23:18:11 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_MULTICAST_IF, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-28 23:18:11 +02:00
|
|
|
|
2021-07-28 23:18:12 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_MULTICAST_LOOP:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-28 23:18:12 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-28 23:18:12 +02:00
|
|
|
|
2021-07-28 23:18:13 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_MULTICAST_LOOP:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-07-28 23:18:13 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_MULTICAST_LOOP, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-07-28 23:18:13 +02:00
|
|
|
|
2021-08-03 07:08:38 +02:00
|
|
|
#ifdef IPV6_RECVHOPLIMIT
|
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_RECVHOPLIMIT:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-08-03 07:08:38 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-08-03 07:08:38 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_RECVHOPLIMIT:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-08-03 07:08:38 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-08-03 07:08:38 +02:00
|
|
|
#endif
|
|
|
|
|
2021-08-03 07:08:39 +02:00
|
|
|
#ifdef IPV6_RECVPKTINFO
|
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_RECVPKTINFO:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-08-03 07:08:39 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_RECVPKTINFO, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-08-03 07:08:39 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_RECVPKTINFO:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-08-03 07:08:39 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_RECVPKTINFO, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-08-03 07:08:39 +02:00
|
|
|
#endif
|
|
|
|
|
2021-08-13 07:56:13 +02:00
|
|
|
#ifdef IPV6_RECVTCLASS
|
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_RECVTCLASS:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-08-13 07:56:13 +02:00
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_RECVTCLASS, out_buffer, out_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-08-13 07:56:13 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_RECVTCLASS:
|
2021-08-18 07:50:47 +02:00
|
|
|
{
|
|
|
|
int sock_type = get_sock_type( handle );
|
|
|
|
if (sock_type != SOCK_DGRAM && sock_type != SOCK_RAW) return STATUS_INVALID_PARAMETER;
|
2021-08-13 07:56:13 +02:00
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_RECVTCLASS, in_buffer, in_size );
|
2021-08-18 07:50:47 +02:00
|
|
|
}
|
2021-08-13 07:56:13 +02:00
|
|
|
#endif
|
|
|
|
|
2021-07-30 07:00:42 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_UNICAST_HOPS:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_UNICAST_HOPS, out_buffer, out_size );
|
|
|
|
|
2021-07-30 07:00:43 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_UNICAST_HOPS:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_UNICAST_HOPS, in_buffer, in_size );
|
|
|
|
|
2021-07-30 07:00:44 +02:00
|
|
|
#ifdef IPV6_UNICAST_IF
|
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_UNICAST_IF:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_UNICAST_IF, out_buffer, out_size );
|
2021-07-30 07:00:45 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_UNICAST_IF:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_IPV6, IPV6_UNICAST_IF, in_buffer, in_size );
|
2021-07-30 07:00:44 +02:00
|
|
|
#endif
|
|
|
|
|
2021-07-30 07:00:46 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_IPV6_V6ONLY:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_IPV6, IPV6_V6ONLY, out_buffer, out_size );
|
|
|
|
|
2021-07-30 07:00:47 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_IPV6_V6ONLY:
|
|
|
|
{
|
|
|
|
union unix_sockaddr addr;
|
|
|
|
socklen_t len = sizeof(addr);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
if (!getsockname( fd, &addr.addr, &len ) && addr.addr.sa_family == AF_INET && !addr.in.sin_port)
|
|
|
|
{
|
|
|
|
/* changing IPV6_V6ONLY succeeds on an unbound IPv4 socket */
|
|
|
|
WARN( "ignoring IPV6_V6ONLY on an unbound IPv4 socket\n" );
|
2021-12-16 21:55:38 +01:00
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
break;
|
2021-07-30 07:00:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
ret = setsockopt( fd, IPPROTO_IPV6, IPV6_V6ONLY, in_buffer, in_size );
|
2021-12-16 21:55:38 +01:00
|
|
|
status = ret ? sock_errno_to_status( errno ) : STATUS_SUCCESS;
|
|
|
|
break;
|
2021-07-30 07:00:47 +02:00
|
|
|
}
|
|
|
|
|
2021-07-31 01:55:36 +02:00
|
|
|
#ifdef SOL_IPX
|
|
|
|
case IOCTL_AFD_WINE_GET_IPX_PTYPE:
|
|
|
|
return do_getsockopt( handle, io, SOL_IPX, IPX_TYPE, out_buffer, out_size );
|
2021-07-31 01:55:37 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IPX_PTYPE:
|
|
|
|
return do_setsockopt( handle, io, SOL_IPX, IPX_TYPE, in_buffer, in_size );
|
2021-07-31 01:55:36 +02:00
|
|
|
#elif defined(SO_DEFAULT_HEADERS)
|
|
|
|
case IOCTL_AFD_WINE_GET_IPX_PTYPE:
|
|
|
|
{
|
|
|
|
struct ipx value;
|
|
|
|
socklen_t len = sizeof(value);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
ret = getsockopt( fd, 0, SO_DEFAULT_HEADERS, &value, &len );
|
2021-12-16 21:55:38 +01:00
|
|
|
if (ret)
|
|
|
|
{
|
|
|
|
status = sock_errno_to_status( errno );
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
*(DWORD *)out_buffer = value.ipx_pt;
|
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
}
|
|
|
|
break;
|
2021-07-31 01:55:36 +02:00
|
|
|
}
|
2021-07-31 01:55:37 +02:00
|
|
|
|
|
|
|
case IOCTL_AFD_WINE_SET_IPX_PTYPE:
|
|
|
|
{
|
|
|
|
struct ipx value = {0};
|
|
|
|
|
|
|
|
/* FIXME: should we retrieve SO_DEFAULT_HEADERS first and modify it? */
|
|
|
|
value.ipx_pt = *(DWORD *)in_buffer;
|
|
|
|
return do_setsockopt( handle, io, 0, SO_DEFAULT_HEADERS, &value, sizeof(value) );
|
|
|
|
}
|
2021-07-31 01:55:36 +02:00
|
|
|
#endif
|
|
|
|
|
2021-07-31 01:55:38 +02:00
|
|
|
#ifdef HAS_IRDA
|
|
|
|
#define MAX_IRDA_DEVICES 10
|
|
|
|
case IOCTL_AFD_WINE_GET_IRLMP_ENUMDEVICES:
|
|
|
|
{
|
|
|
|
char buffer[offsetof( struct irda_device_list, dev[MAX_IRDA_DEVICES] )];
|
|
|
|
struct irda_device_list *unix_list = (struct irda_device_list *)buffer;
|
|
|
|
socklen_t len = sizeof(buffer);
|
|
|
|
DEVICELIST *ws_list = out_buffer;
|
|
|
|
int fd, needs_close = FALSE;
|
|
|
|
unsigned int i;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((status = server_get_unix_fd( handle, 0, &fd, &needs_close, NULL, NULL )))
|
|
|
|
return status;
|
|
|
|
|
|
|
|
ret = getsockopt( fd, SOL_IRLMP, IRLMP_ENUMDEVICES, buffer, &len );
|
|
|
|
if (needs_close) close( fd );
|
|
|
|
if (ret) return sock_errno_to_status( errno );
|
|
|
|
|
2021-08-04 16:43:50 +02:00
|
|
|
io->Information = offsetof( DEVICELIST, Device[unix_list->len] );
|
2021-07-31 01:55:38 +02:00
|
|
|
if (out_size < io->Information)
|
|
|
|
return STATUS_BUFFER_TOO_SMALL;
|
|
|
|
|
|
|
|
TRACE( "IRLMP_ENUMDEVICES: got %u devices:\n", unix_list->len );
|
|
|
|
ws_list->numDevice = unix_list->len;
|
|
|
|
for (i = 0; i < unix_list->len; ++i)
|
|
|
|
{
|
|
|
|
const struct irda_device_info *unix_dev = &unix_list->dev[i];
|
|
|
|
IRDA_DEVICE_INFO *ws_dev = &ws_list->Device[i];
|
|
|
|
|
|
|
|
TRACE( "saddr %#08x, daddr %#08x, info %s, hints 0x%02x%02x\n",
|
|
|
|
unix_dev->saddr, unix_dev->daddr, unix_dev->info, unix_dev->hints[0], unix_dev->hints[1] );
|
|
|
|
memcpy( ws_dev->irdaDeviceID, &unix_dev->daddr, sizeof(unix_dev->daddr) );
|
|
|
|
memcpy( ws_dev->irdaDeviceName, unix_dev->info, sizeof(unix_dev->info) );
|
|
|
|
ws_dev->irdaDeviceHints1 = unix_dev->hints[0];
|
|
|
|
ws_dev->irdaDeviceHints2 = unix_dev->hints[1];
|
|
|
|
ws_dev->irdaCharSet = unix_dev->charset;
|
|
|
|
}
|
2021-12-16 21:55:38 +01:00
|
|
|
status = STATUS_SUCCESS;
|
|
|
|
break;
|
2021-07-31 01:55:38 +02:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-07-31 01:55:39 +02:00
|
|
|
case IOCTL_AFD_WINE_GET_TCP_NODELAY:
|
|
|
|
return do_getsockopt( handle, io, IPPROTO_TCP, TCP_NODELAY, out_buffer, out_size );
|
|
|
|
|
2021-07-31 01:55:40 +02:00
|
|
|
case IOCTL_AFD_WINE_SET_TCP_NODELAY:
|
|
|
|
return do_setsockopt( handle, io, IPPROTO_TCP, TCP_NODELAY, in_buffer, in_size );
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
default:
|
|
|
|
{
|
2021-05-27 06:36:50 +02:00
|
|
|
if ((code >> 16) == FILE_DEVICE_NETWORK)
|
|
|
|
{
|
|
|
|
/* Wine-internal ioctl */
|
|
|
|
status = STATUS_BAD_DEVICE_TYPE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
FIXME( "Unknown ioctl %#x (device %#x, access %#x, function %#x, method %#x)\n",
|
|
|
|
code, code >> 16, (code >> 14) & 3, (code >> 2) & 0xfff, code & 3 );
|
|
|
|
status = STATUS_INVALID_DEVICE_REQUEST;
|
|
|
|
}
|
2021-05-22 05:08:48 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (needs_close) close( fd );
|
2021-12-16 21:55:38 +01:00
|
|
|
|
|
|
|
if (status != STATUS_PENDING && !NT_ERROR(status)) io->Status = status;
|
|
|
|
|
2021-05-22 05:08:48 +02:00
|
|
|
return status;
|
|
|
|
}
|