2 * Copyright (c) 1998 Mark Newton. All rights reserved.
3 * Copyright (c) 1994, 1996 Christos Zoulas. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Christos Zoulas.
16 * 4. The name of the author may not be used to endorse or promote products
17 * derived from this software without specific prior written permission.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
20 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
21 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
22 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
23 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
24 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
25 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
26 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
27 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
28 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 * Pretend that we have streams...
35 * ToDo: The state machine for getmsg needs re-thinking
38 #include <sys/cdefs.h>
39 __FBSDID("$FreeBSD$");
41 #include "opt_compat.h"
42 #include "opt_ktrace.h"
44 #include <sys/param.h>
45 #include <sys/systm.h>
46 #include <sys/fcntl.h>
47 #include <sys/filedesc.h>
48 #include <sys/filio.h>
50 #include <sys/malloc.h>
51 #include <sys/file.h> /* Must come after sys/malloc.h */
53 #include <sys/mutex.h>
55 #include <sys/protosw.h>
56 #include <sys/signal.h>
57 #include <sys/signalvar.h>
58 #include <sys/socket.h>
59 #include <sys/socketvar.h>
61 #include <sys/syscallsubr.h>
62 #include <sys/sysproto.h>
64 #include <sys/ktrace.h> /* Must come after sys/uio.h */
67 #include <netinet/in.h>
69 #include <compat/svr4/svr4.h>
70 #include <compat/svr4/svr4_types.h>
71 #include <compat/svr4/svr4_util.h>
72 #include <compat/svr4/svr4_signal.h>
73 #include <compat/svr4/svr4_proto.h>
74 #include <compat/svr4/svr4_stropts.h>
75 #include <compat/svr4/svr4_timod.h>
76 #include <compat/svr4/svr4_sockmod.h>
77 #include <compat/svr4/svr4_ioctl.h>
78 #include <compat/svr4/svr4_socket.h>
81 static int clean_pipe(struct thread *, char *);
82 static void getparm(struct file *, struct svr4_si_sockparms *);
83 static int svr4_do_putmsg(struct thread *, struct svr4_sys_putmsg_args *,
85 static int svr4_do_getmsg(struct thread *, struct svr4_sys_getmsg_args *,
88 /* Address Conversions */
89 static void sockaddr_to_netaddr_in(struct svr4_strmcmd *,
90 const struct sockaddr_in *);
91 static void sockaddr_to_netaddr_un(struct svr4_strmcmd *,
92 const struct sockaddr_un *);
93 static void netaddr_to_sockaddr_in(struct sockaddr_in *,
94 const struct svr4_strmcmd *);
95 static void netaddr_to_sockaddr_un(struct sockaddr_un *,
96 const struct svr4_strmcmd *);
99 static int i_nread(struct file *, struct thread *, register_t *, int,
101 static int i_fdinsert(struct file *, struct thread *, register_t *, int,
103 static int i_str(struct file *, struct thread *, register_t *, int,
105 static int i_setsig(struct file *, struct thread *, register_t *, int,
107 static int i_getsig(struct file *, struct thread *, register_t *, int,
109 static int _i_bind_rsvd(struct file *, struct thread *, register_t *, int,
111 static int _i_rele_rsvd(struct file *, struct thread *, register_t *, int,
114 /* i_str sockmod calls */
115 static int sockmod(struct file *, int, struct svr4_strioctl *,
117 static int si_listen(struct file *, int, struct svr4_strioctl *,
119 static int si_ogetudata(struct file *, int, struct svr4_strioctl *,
121 static int si_sockparams(struct file *, int, struct svr4_strioctl *,
123 static int si_shutdown (struct file *, int, struct svr4_strioctl *,
125 static int si_getudata(struct file *, int, struct svr4_strioctl *,
128 /* i_str timod calls */
129 static int timod(struct file *, int, struct svr4_strioctl *, struct thread *);
130 static int ti_getinfo(struct file *, int, struct svr4_strioctl *,
132 static int ti_bind(struct file *, int, struct svr4_strioctl *, struct thread *);
135 static void bufprint(u_char *, size_t);
136 static int show_ioc(const char *, struct svr4_strioctl *);
137 static int show_strbuf(struct svr4_strbuf *);
138 static void show_msg(const char *, int, struct svr4_strbuf *,
139 struct svr4_strbuf *, int);
149 for (i = 0; i < len; i++) {
150 uprintf("%x ", buf[i]);
151 if (i && (i % 16) == 0)
159 struct svr4_strioctl *ioc;
170 ptr = (u_char *) malloc(len, M_TEMP, M_WAITOK);
171 if ((error = copyin(ioc->buf, ptr, len)) != 0) {
172 free((char *) ptr, M_TEMP);
177 uprintf("%s cmd = %ld, timeout = %d, len = %d, buf = %p { ",
178 str, ioc->cmd, ioc->timeout, ioc->len, ioc->buf);
186 free((char *) ptr, M_TEMP);
193 struct svr4_strbuf *str;
197 int maxlen = str->maxlen;
210 ptr = (u_char *) malloc(len, M_TEMP, M_WAITOK);
212 if ((error = copyin(str->buf, ptr, len)) != 0) {
213 free((char *) ptr, M_TEMP);
218 uprintf(", { %d, %d, %p=[ ", str->maxlen, str->len, str->buf);
226 free((char *) ptr, M_TEMP);
233 show_msg(str, fd, ctl, dat, flags)
236 struct svr4_strbuf *ctl;
237 struct svr4_strbuf *dat;
240 struct svr4_strbuf buf;
243 uprintf("%s(%d", str, fd);
245 if ((error = copyin(ctl, &buf, sizeof(buf))) != 0)
253 if ((error = copyin(dat, &buf, sizeof(buf))) != 0)
260 uprintf(", %x);\n", flags);
263 #endif /* DEBUG_SVR4 */
266 * We are faced with an interesting situation. On svr4 unix sockets
267 * are really pipes. But we really have sockets, and we might as
268 * well use them. At the point where svr4 calls TI_BIND, it has
269 * already created a named pipe for the socket using mknod(2).
270 * We need to create a socket with the same name when we bind,
271 * so we need to remove the pipe before, otherwise we'll get address
272 * already in use. So we *carefully* remove the pipe, to avoid
273 * using this as a random file removal tool. We use system calls
274 * to avoid code duplication.
284 error = kern_lstat(td, path, UIO_SYSSPACE, &st);
287 * Make sure we are dealing with a mode 0 named pipe.
289 if ((st.st_mode & S_IFMT) != S_IFIFO)
292 if ((st.st_mode & ALLPERMS) != 0)
295 error = kern_unlink(td, path, UIO_SYSSPACE);
297 DPRINTF(("clean_pipe: unlink failed %d\n", error));
303 sockaddr_to_netaddr_in(sc, sain)
304 struct svr4_strmcmd *sc;
305 const struct sockaddr_in *sain;
307 struct svr4_netaddr_in *na;
308 na = SVR4_ADDROF(sc);
310 na->family = sain->sin_family;
311 na->port = sain->sin_port;
312 na->addr = sain->sin_addr.s_addr;
313 DPRINTF(("sockaddr_in -> netaddr %d %d %lx\n", na->family, na->port,
319 sockaddr_to_netaddr_un(sc, saun)
320 struct svr4_strmcmd *sc;
321 const struct sockaddr_un *saun;
323 struct svr4_netaddr_un *na;
324 char *dst, *edst = ((char *) sc) + sc->offs + sizeof(na->family) + 1 -
328 na = SVR4_ADDROF(sc);
329 na->family = saun->sun_family;
330 for (src = saun->sun_path, dst = na->path; (*dst++ = *src++) != '\0'; )
333 DPRINTF(("sockaddr_un -> netaddr %d %s\n", na->family, na->path));
338 netaddr_to_sockaddr_in(sain, sc)
339 struct sockaddr_in *sain;
340 const struct svr4_strmcmd *sc;
342 const struct svr4_netaddr_in *na;
345 na = SVR4_C_ADDROF(sc);
346 memset(sain, 0, sizeof(*sain));
347 sain->sin_len = sizeof(*sain);
348 sain->sin_family = na->family;
349 sain->sin_port = na->port;
350 sain->sin_addr.s_addr = na->addr;
351 DPRINTF(("netaddr -> sockaddr_in %d %d %x\n", sain->sin_family,
352 sain->sin_port, sain->sin_addr.s_addr));
357 netaddr_to_sockaddr_un(saun, sc)
358 struct sockaddr_un *saun;
359 const struct svr4_strmcmd *sc;
361 const struct svr4_netaddr_un *na;
362 char *dst, *edst = &saun->sun_path[sizeof(saun->sun_path) - 1];
365 na = SVR4_C_ADDROF(sc);
366 memset(saun, 0, sizeof(*saun));
367 saun->sun_family = na->family;
368 for (src = na->path, dst = saun->sun_path; (*dst++ = *src++) != '\0'; )
371 saun->sun_len = dst - saun->sun_path;
372 DPRINTF(("netaddr -> sockaddr_un %d %s\n", saun->sun_family,
380 struct svr4_si_sockparms *pa;
382 struct svr4_strm *st;
385 st = svr4_stream_get(fp);
391 pa->family = st->s_family;
393 switch (so->so_type) {
395 pa->type = SVR4_T_CLTS;
396 pa->protocol = IPPROTO_UDP;
397 DPRINTF(("getparm(dgram)\n"));
401 pa->type = SVR4_T_COTS; /* What about T_COTS_ORD? XXX */
402 pa->protocol = IPPROTO_IP;
403 DPRINTF(("getparm(stream)\n"));
407 pa->type = SVR4_T_CLTS;
408 pa->protocol = IPPROTO_RAW;
409 DPRINTF(("getparm(raw)\n"));
415 DPRINTF(("getparm(type %d?)\n", so->so_type));
422 si_ogetudata(fp, fd, ioc, td)
425 struct svr4_strioctl *ioc;
429 struct svr4_si_oudata ud;
430 struct svr4_si_sockparms pa;
432 if (ioc->len != sizeof(ud) && ioc->len != sizeof(ud) - sizeof(int)) {
433 DPRINTF(("SI_OGETUDATA: Wrong size %d != %d\n",
434 sizeof(ud), ioc->len));
438 if ((error = copyin(ioc->buf, &ud, sizeof(ud))) != 0)
446 ud.addrsize = sizeof(struct svr4_sockaddr_in);
447 if (pa.type == SVR4_SOCK_STREAM)
460 DPRINTF(("SI_OGETUDATA: Unsupported address family %d\n",
465 /* I have no idea what these should be! */
469 ud.servtype = pa.type;
474 return copyout(&ud, ioc->buf, ioc->len);
479 si_sockparams(fp, fd, ioc, td)
482 struct svr4_strioctl *ioc;
485 struct svr4_si_sockparms pa;
488 return copyout(&pa, ioc->buf, sizeof(pa));
493 si_listen(fp, fd, ioc, td)
496 struct svr4_strioctl *ioc;
500 struct svr4_strm *st = svr4_stream_get(fp);
501 struct svr4_strmcmd lst;
502 struct listen_args la;
507 if (ioc->len < 0 || ioc->len > sizeof(lst))
510 if ((error = copyin(ioc->buf, &lst, ioc->len)) != 0)
513 if (lst.cmd != SVR4_TI_OLD_BIND_REQUEST) {
514 DPRINTF(("si_listen: bad request %ld\n", lst.cmd));
519 * We are making assumptions again...
522 DPRINTF(("SI_LISTEN: fileno %d backlog = %d\n", fd, 5));
525 if ((error = listen(td, &la)) != 0) {
526 DPRINTF(("SI_LISTEN: listen failed %d\n", error));
530 st->s_cmd = SVR4_TI__ACCEPT_WAIT;
531 lst.cmd = SVR4_TI_BIND_REPLY;
533 switch (st->s_family) {
535 /* XXX: Fill the length here */
540 lst.pad[28] = 0x00000000; /* magic again */
541 lst.pad[29] = 0x00000800; /* magic again */
542 lst.pad[30] = 0x80001400; /* magic again */
546 DPRINTF(("SI_LISTEN: Unsupported address family %d\n",
552 if ((error = copyout(&lst, ioc->buf, ioc->len)) != 0)
560 si_getudata(fp, fd, ioc, td)
563 struct svr4_strioctl *ioc;
567 struct svr4_si_udata ud;
569 if (sizeof(ud) != ioc->len) {
570 DPRINTF(("SI_GETUDATA: Wrong size %d != %d\n",
571 sizeof(ud), ioc->len));
575 if ((error = copyin(ioc->buf, &ud, sizeof(ud))) != 0)
578 getparm(fp, &ud.sockparms);
580 switch (ud.sockparms.family) {
582 DPRINTF(("getudata_inet\n"));
585 ud.addrsize = sizeof(struct svr4_sockaddr_in);
586 if (ud.sockparms.type == SVR4_SOCK_STREAM)
594 DPRINTF(("getudata_local\n"));
603 DPRINTF(("SI_GETUDATA: Unsupported address family %d\n",
604 ud.sockparms.family));
609 ud.servtype = ud.sockparms.type;
610 DPRINTF(("ud.servtype = %d\n", ud.servtype));
614 return copyout(&ud, ioc->buf, sizeof(ud));
619 si_shutdown(fp, fd, ioc, td)
622 struct svr4_strioctl *ioc;
626 struct shutdown_args ap;
628 if (ioc->len != sizeof(ap.how)) {
629 DPRINTF(("SI_SHUTDOWN: Wrong size %d != %d\n",
630 sizeof(ap.how), ioc->len));
634 if ((error = copyin(ioc->buf, &ap.how, ioc->len)) != 0)
639 return shutdown(td, &ap);
644 sockmod(fp, fd, ioc, td)
647 struct svr4_strioctl *ioc;
651 case SVR4_SI_OGETUDATA:
652 DPRINTF(("SI_OGETUDATA\n"));
653 return si_ogetudata(fp, fd, ioc, td);
655 case SVR4_SI_SHUTDOWN:
656 DPRINTF(("SI_SHUTDOWN\n"));
657 return si_shutdown(fp, fd, ioc, td);
660 DPRINTF(("SI_LISTEN\n"));
661 return si_listen(fp, fd, ioc, td);
663 case SVR4_SI_SETMYNAME:
664 DPRINTF(("SI_SETMYNAME\n"));
667 case SVR4_SI_SETPEERNAME:
668 DPRINTF(("SI_SETPEERNAME\n"));
671 case SVR4_SI_GETINTRANSIT:
672 DPRINTF(("SI_GETINTRANSIT\n"));
675 case SVR4_SI_TCL_LINK:
676 DPRINTF(("SI_TCL_LINK\n"));
679 case SVR4_SI_TCL_UNLINK:
680 DPRINTF(("SI_TCL_UNLINK\n"));
683 case SVR4_SI_SOCKPARAMS:
684 DPRINTF(("SI_SOCKPARAMS\n"));
685 return si_sockparams(fp, fd, ioc, td);
687 case SVR4_SI_GETUDATA:
688 DPRINTF(("SI_GETUDATA\n"));
689 return si_getudata(fp, fd, ioc, td);
692 DPRINTF(("Unknown sockmod ioctl %lx\n", ioc->cmd));
700 ti_getinfo(fp, fd, ioc, td)
703 struct svr4_strioctl *ioc;
707 struct svr4_infocmd info;
709 memset(&info, 0, sizeof(info));
711 if (ioc->len < 0 || ioc->len > sizeof(info))
714 if ((error = copyin(ioc->buf, &info, ioc->len)) != 0)
717 if (info.cmd != SVR4_TI_INFO_REQUEST)
720 info.cmd = SVR4_TI_INFO_REPLY;
732 ioc->len = sizeof(info);
733 if ((error = copyout(&info, ioc->buf, ioc->len)) != 0)
741 ti_bind(fp, fd, ioc, td)
744 struct svr4_strioctl *ioc;
748 struct svr4_strm *st = svr4_stream_get(fp);
749 struct sockaddr_in sain;
750 struct sockaddr_un saun;
751 struct sockaddr *skp;
753 struct svr4_strmcmd bnd;
756 DPRINTF(("ti_bind: bad file descriptor\n"));
760 if (ioc->len < 0 || ioc->len > sizeof(bnd))
763 if ((error = copyin(ioc->buf, &bnd, ioc->len)) != 0)
766 if (bnd.cmd != SVR4_TI_OLD_BIND_REQUEST) {
767 DPRINTF(("ti_bind: bad request %ld\n", bnd.cmd));
771 switch (st->s_family) {
773 skp = (struct sockaddr *)&sain;
774 sasize = sizeof(sain);
779 netaddr_to_sockaddr_in(&sain, &bnd);
781 DPRINTF(("TI_BIND: fam %d, port %d, addr %x\n",
782 sain.sin_family, sain.sin_port,
783 sain.sin_addr.s_addr));
787 skp = (struct sockaddr *)&saun;
788 sasize = sizeof(saun);
792 netaddr_to_sockaddr_un(&saun, &bnd);
794 if (saun.sun_path[0] == '\0')
797 DPRINTF(("TI_BIND: fam %d, path %s\n",
798 saun.sun_family, saun.sun_path));
800 if ((error = clean_pipe(td, saun.sun_path)) != 0)
803 bnd.pad[28] = 0x00001000; /* magic again */
807 DPRINTF(("TI_BIND: Unsupported address family %d\n",
812 DPRINTF(("TI_BIND: fileno %d\n", fd));
814 if ((error = kern_bind(td, fd, skp)) != 0) {
815 DPRINTF(("TI_BIND: bind failed %d\n", error));
821 memset(&bnd, 0, sizeof(bnd));
822 bnd.len = sasize + 4;
823 bnd.offs = 0x10; /* XXX */
826 bnd.cmd = SVR4_TI_BIND_REPLY;
828 if ((error = copyout(&bnd, ioc->buf, ioc->len)) != 0)
836 timod(fp, fd, ioc, td)
839 struct svr4_strioctl *ioc;
843 case SVR4_TI_GETINFO:
844 DPRINTF(("TI_GETINFO\n"));
845 return ti_getinfo(fp, fd, ioc, td);
847 case SVR4_TI_OPTMGMT:
848 DPRINTF(("TI_OPTMGMT\n"));
852 DPRINTF(("TI_BIND\n"));
853 return ti_bind(fp, fd, ioc, td);
856 DPRINTF(("TI_UNBIND\n"));
860 DPRINTF(("Unknown timod ioctl %lx\n", ioc->cmd));
867 svr4_stream_ti_ioctl(fp, td, retval, fd, cmd, dat)
875 struct svr4_strbuf skb, *sub = (struct svr4_strbuf *) dat;
876 struct svr4_strm *st = svr4_stream_get(fp);
879 socklen_t sasize, oldsasize;
880 struct svr4_strmcmd sc;
882 DPRINTF(("svr4_stream_ti_ioctl\n"));
889 if ((error = copyin(sub, &skb, sizeof(skb))) != 0) {
890 DPRINTF(("ti_ioctl: error copying in strbuf\n"));
894 switch (st->s_family) {
896 sasize = sizeof(struct sockaddr_in);
900 sasize = sizeof(struct sockaddr_un);
904 DPRINTF(("ti_ioctl: Unsupported address family %d\n",
911 case SVR4_TI_GETMYNAME:
912 DPRINTF(("TI_GETMYNAME\n"));
914 error = kern_getsockname(td, fd, &sa, &sasize);
916 DPRINTF(("ti_ioctl: getsockname error\n"));
922 case SVR4_TI_GETPEERNAME:
923 DPRINTF(("TI_GETPEERNAME\n"));
925 error = kern_getpeername(td, fd, &sa, &sasize);
927 DPRINTF(("ti_ioctl: getpeername error\n"));
933 case SVR4_TI_SETMYNAME:
934 DPRINTF(("TI_SETMYNAME\n"));
937 case SVR4_TI_SETPEERNAME:
938 DPRINTF(("TI_SETPEERNAME\n"));
941 DPRINTF(("ti_ioctl: Unknown ioctl %lx\n", cmd));
945 if (sasize < 0 || sasize > oldsasize) {
950 switch (st->s_family) {
952 sockaddr_to_netaddr_in(&sc, (struct sockaddr_in *)sa);
957 sockaddr_to_netaddr_un(&sc, (struct sockaddr_un *)sa);
958 skb.len = sasize + 4;
967 if ((error = copyout(SVR4_ADDROF(&sc), skb.buf, sasize)) != 0) {
968 DPRINTF(("ti_ioctl: error copying out socket data\n"));
973 if ((error = copyout(&skb, sub, sizeof(skb))) != 0) {
974 DPRINTF(("ti_ioctl: error copying out strbuf\n"));
985 i_nread(fp, td, retval, fd, cmd, dat)
997 * We are supposed to return the message length in nread, and the
998 * number of messages in retval. We don't have the notion of number
999 * of stream messages, so we just find out if we have any bytes waiting
1000 * for us, and if we do, then we assume that we have at least one
1001 * message waiting for us.
1003 if ((error = fo_ioctl(fp, FIONREAD, (caddr_t) &nread, td->td_ucred,
1012 return copyout(&nread, dat, sizeof(nread));
1016 i_fdinsert(fp, td, retval, fd, cmd, dat)
1025 * Major hack again here. We assume that we are using this to
1026 * implement accept(2). If that is the case, we have already
1027 * called accept, and we have stored the file descriptor in
1028 * afd. We find the file descriptor that the code wants to use
1029 * in fd insert, and then we dup2() our accepted file descriptor
1033 struct svr4_strm *st = svr4_stream_get(fp);
1034 struct svr4_strfdinsert fdi;
1035 struct dup2_args d2p;
1038 DPRINTF(("fdinsert: bad file type\n"));
1043 if (st->s_afd == -1) {
1044 DPRINTF(("fdinsert: accept fd not found\n"));
1049 if ((error = copyin(dat, &fdi, sizeof(fdi))) != 0) {
1050 DPRINTF(("fdinsert: copyin failed %d\n", error));
1055 d2p.from = st->s_afd;
1058 if ((error = dup2(td, &d2p)) != 0) {
1059 DPRINTF(("fdinsert: dup2(%d, %d) failed %d\n",
1060 st->s_afd, fdi.fd, error));
1065 if ((error = kern_close(td, st->s_afd)) != 0) {
1066 DPRINTF(("fdinsert: close(%d) failed %d\n",
1081 _i_bind_rsvd(fp, td, retval, fd, cmd, dat)
1089 struct mkfifo_args ap;
1092 * This is a supposed to be a kernel and library only ioctl.
1093 * It gets called before ti_bind, when we have a unix
1094 * socket, to physically create the socket transport and
1095 * ``reserve'' it. I don't know how this get reserved inside
1096 * the kernel, but we are going to create it nevertheless.
1101 return mkfifo(td, &ap);
1105 _i_rele_rsvd(fp, td, retval, fd, cmd, dat)
1113 struct unlink_args ap;
1116 * This is a supposed to be a kernel and library only ioctl.
1117 * I guess it is supposed to release the socket.
1121 return unlink(td, &ap);
1125 i_str(fp, td, retval, fd, cmd, dat)
1134 struct svr4_strioctl ioc;
1136 if ((error = copyin(dat, &ioc, sizeof(ioc))) != 0)
1140 if ((error = show_ioc(">", &ioc)) != 0)
1142 #endif /* DEBUG_SVR4 */
1144 switch (ioc.cmd & 0xff00) {
1146 if ((error = sockmod(fp, fd, &ioc, td)) != 0)
1151 if ((error = timod(fp, fd, &ioc, td)) != 0)
1156 DPRINTF(("Unimplemented module %c %ld\n",
1157 (char) (cmd >> 8), cmd & 0xff));
1162 if ((error = show_ioc("<", &ioc)) != 0)
1164 #endif /* DEBUG_SVR4 */
1165 return copyout(&ioc, dat, sizeof(ioc));
1169 i_setsig(fp, td, retval, fd, cmd, dat)
1178 * This is the best we can do for now; we cannot generate
1179 * signals only for specific events so the signal mask gets
1180 * ignored; we save it just to pass it to a possible I_GETSIG...
1182 * We alse have to fix the O_ASYNC fcntl bit, so the
1183 * process will get SIGPOLLs.
1186 register_t oflags, flags;
1187 struct svr4_strm *st = svr4_stream_get(fp);
1190 DPRINTF(("i_setsig: bad file descriptor\n"));
1193 /* get old status flags */
1194 error = kern_fcntl(td, fd, F_GETFL, 0);
1198 oflags = td->td_retval[0];
1200 /* update the flags */
1205 flags = oflags | O_ASYNC;
1206 if ((error = copyin(dat, &mask, sizeof(mask))) != 0) {
1207 DPRINTF(("i_setsig: bad eventmask pointer\n"));
1210 if (mask & SVR4_S_ALLMASK) {
1211 DPRINTF(("i_setsig: bad eventmask data %x\n", mask));
1214 st->s_eventmask = mask;
1217 flags = oflags & ~O_ASYNC;
1218 st->s_eventmask = 0;
1222 /* set the new flags, if changed */
1223 if (flags != oflags) {
1224 error = kern_fcntl(td, fd, F_SETFL, flags);
1227 flags = td->td_retval[0];
1230 /* set up SIGIO receiver if needed */
1232 return (kern_fcntl(td, fd, F_SETOWN, td->td_proc->p_pid));
1237 i_getsig(fp, td, retval, fd, cmd, dat)
1245 int error, eventmask;
1248 struct svr4_strm *st = svr4_stream_get(fp);
1251 DPRINTF(("i_getsig: bad file descriptor\n"));
1255 eventmask = st->s_eventmask;
1257 if ((error = copyout(&eventmask, dat,
1258 sizeof(eventmask))) != 0) {
1259 DPRINTF(("i_getsig: bad eventmask pointer\n"));
1267 svr4_stream_ioctl(fp, td, retval, fd, cmd, dat)
1278 * All the following stuff assumes "sockmod" is pushed...
1282 DPRINTF(("I_NREAD\n"));
1283 return i_nread(fp, td, retval, fd, cmd, dat);
1286 DPRINTF(("I_PUSH %p\n", dat));
1287 #if defined(DEBUG_SVR4)
1288 show_strbuf((struct svr4_strbuf *)dat);
1293 DPRINTF(("I_POP\n"));
1297 DPRINTF(("I_LOOK\n"));
1301 DPRINTF(("I_FLUSH\n"));
1305 DPRINTF(("I_SRDOPT\n"));
1309 DPRINTF(("I_GRDOPT\n"));
1313 DPRINTF(("I_STR\n"));
1314 return i_str(fp, td, retval, fd, cmd, dat);
1317 DPRINTF(("I_SETSIG\n"));
1318 return i_setsig(fp, td, retval, fd, cmd, dat);
1321 DPRINTF(("I_GETSIG\n"));
1322 return i_getsig(fp, td, retval, fd, cmd, dat);
1325 DPRINTF(("I_FIND\n"));
1327 * Here we are not pushing modules really, we just
1328 * pretend all are present
1334 DPRINTF(("I_LINK\n"));
1338 DPRINTF(("I_UNLINK\n"));
1341 case SVR4_I_ERECVFD:
1342 DPRINTF(("I_ERECVFD\n"));
1346 DPRINTF(("I_PEEK\n"));
1349 case SVR4_I_FDINSERT:
1350 DPRINTF(("I_FDINSERT\n"));
1351 return i_fdinsert(fp, td, retval, fd, cmd, dat);
1354 DPRINTF(("I_SENDFD\n"));
1358 DPRINTF(("I_RECVFD\n"));
1362 DPRINTF(("I_SWROPT\n"));
1366 DPRINTF(("I_GWROPT\n"));
1370 DPRINTF(("I_LIST\n"));
1374 DPRINTF(("I_PLINK\n"));
1377 case SVR4_I_PUNLINK:
1378 DPRINTF(("I_PUNLINK\n"));
1382 DPRINTF(("I_SETEV\n"));
1386 DPRINTF(("I_GETEV\n"));
1390 DPRINTF(("I_STREV\n"));
1393 case SVR4_I_UNSTREV:
1394 DPRINTF(("I_UNSTREV\n"));
1397 case SVR4_I_FLUSHBAND:
1398 DPRINTF(("I_FLUSHBAND\n"));
1402 DPRINTF(("I_CKBAND\n"));
1405 case SVR4_I_GETBAND:
1406 DPRINTF(("I_GETBANK\n"));
1410 DPRINTF(("I_ATMARK\n"));
1413 case SVR4_I_SETCLTIME:
1414 DPRINTF(("I_SETCLTIME\n"));
1417 case SVR4_I_GETCLTIME:
1418 DPRINTF(("I_GETCLTIME\n"));
1422 DPRINTF(("I_CANPUT\n"));
1425 case SVR4__I_BIND_RSVD:
1426 DPRINTF(("_I_BIND_RSVD\n"));
1427 return _i_bind_rsvd(fp, td, retval, fd, cmd, dat);
1429 case SVR4__I_RELE_RSVD:
1430 DPRINTF(("_I_RELE_RSVD\n"));
1431 return _i_rele_rsvd(fp, td, retval, fd, cmd, dat);
1434 DPRINTF(("unimpl cmd = %lx\n", cmd));
1444 svr4_sys_putmsg(td, uap)
1445 register struct thread *td;
1446 struct svr4_sys_putmsg_args *uap;
1451 if ((error = fget(td, uap->fd, &fp)) != 0) {
1453 uprintf("putmsg: bad fp\n");
1457 error = svr4_do_putmsg(td, uap, fp);
1463 svr4_do_putmsg(td, uap, fp)
1465 struct svr4_sys_putmsg_args *uap;
1468 struct svr4_strbuf dat, ctl;
1469 struct svr4_strmcmd sc;
1470 struct sockaddr_in sain;
1471 struct sockaddr_un saun;
1472 struct sockaddr *sa;
1473 int sasize, *retval;
1474 struct svr4_strm *st;
1477 retval = td->td_retval;
1480 show_msg(">putmsg", uap->fd, uap->ctl,
1481 uap->dat, uap->flags);
1482 #endif /* DEBUG_SVR4 */
1484 if (uap->ctl != NULL) {
1485 if ((error = copyin(uap->ctl, &ctl, sizeof(ctl))) != 0) {
1487 uprintf("putmsg: copyin(): %d\n", error);
1495 if (uap->dat != NULL) {
1496 if ((error = copyin(uap->dat, &dat, sizeof(dat))) != 0) {
1498 uprintf("putmsg: copyin(): %d (2)\n", error);
1507 * Only for sockets for now.
1509 if ((st = svr4_stream_get(fp)) == NULL) {
1510 DPRINTF(("putmsg: bad file type\n"));
1514 if (ctl.len < 0 || ctl.len > sizeof(sc)) {
1515 DPRINTF(("putmsg: Bad control size %d != %d\n", ctl.len,
1516 sizeof(struct svr4_strmcmd)));
1520 if ((error = copyin(ctl.buf, &sc, ctl.len)) != 0)
1523 switch (st->s_family) {
1525 if (sc.len != sizeof(sain)) {
1526 if (sc.cmd == SVR4_TI_DATA_REQUEST) {
1527 struct write_args wa;
1529 /* Solaris seems to use sc.cmd = 3 to
1530 * send "expedited" data. telnet uses
1531 * this for options processing, sending EOF,
1532 * etc. I'm sure other things use it too.
1533 * I don't have any documentation
1534 * on it, so I'm making a guess that this
1535 * is how it works. newton@atdot.dotat.org XXX
1537 DPRINTF(("sending expedited data ??\n"));
1541 return write(td, &wa);
1543 DPRINTF(("putmsg: Invalid inet length %ld\n", sc.len));
1546 netaddr_to_sockaddr_in(&sain, &sc);
1547 sa = (struct sockaddr *)&sain;
1548 sasize = sizeof(sain);
1549 if (sain.sin_family != st->s_family)
1555 /* We are doing an accept; succeed */
1556 DPRINTF(("putmsg: Do nothing\n"));
1561 /* Maybe we've been given a device/inode pair */
1562 dev_t *dev = SVR4_ADDROF(&sc);
1563 ino_t *ino = (ino_t *) &dev[1];
1564 if (svr4_find_socket(td, fp, *dev, *ino, &saun) != 0) {
1565 /* I guess we have it by name */
1566 netaddr_to_sockaddr_un(&saun, &sc);
1568 sa = (struct sockaddr *)&saun;
1569 sasize = sizeof(saun);
1574 DPRINTF(("putmsg: Unsupported address family %d\n",
1583 case SVR4_TI_CONNECT_REQUEST: /* connect */
1586 return (kern_connect(td, uap->fd, sa));
1589 case SVR4_TI_SENDTO_REQUEST: /* sendto */
1595 msg.msg_namelen = sasize;
1596 msg.msg_iov = &aiov;
1598 msg.msg_control = 0;
1600 aiov.iov_base = dat.buf;
1601 aiov.iov_len = dat.len;
1602 error = kern_sendit(td, uap->fd, &msg, uap->flags,
1603 NULL, UIO_USERSPACE);
1604 DPRINTF(("sendto_request error: %d\n", error));
1610 DPRINTF(("putmsg: Unimplemented command %lx\n", sc.cmd));
1616 svr4_sys_getmsg(td, uap)
1618 struct svr4_sys_getmsg_args *uap;
1623 if ((error = fget(td, uap->fd, &fp)) != 0) {
1625 uprintf("getmsg: bad fp\n");
1629 error = svr4_do_getmsg(td, uap, fp);
1635 svr4_do_getmsg(td, uap, fp)
1636 register struct thread *td;
1637 struct svr4_sys_getmsg_args *uap;
1640 struct svr4_strbuf dat, ctl;
1641 struct svr4_strmcmd sc;
1645 struct sockaddr_in sain;
1646 struct sockaddr_un saun;
1647 struct sockaddr *sa;
1649 struct svr4_strm *st;
1653 retval = td->td_retval;
1657 memset(&sc, 0, sizeof(sc));
1660 show_msg(">getmsg", uap->fd, uap->ctl,
1662 #endif /* DEBUG_SVR4 */
1664 if (uap->ctl != NULL) {
1665 if ((error = copyin(uap->ctl, &ctl, sizeof(ctl))) != 0)
1675 if (uap->dat != NULL) {
1676 if ((error = copyin(uap->dat, &dat, sizeof(dat))) != 0)
1685 * Only for sockets for now.
1687 if ((st = svr4_stream_get(fp)) == NULL) {
1688 DPRINTF(("getmsg: bad file type\n"));
1692 if (ctl.maxlen == -1 || dat.maxlen == -1) {
1693 DPRINTF(("getmsg: Cannot handle -1 maxlen (yet)\n"));
1697 switch (st->s_family) {
1699 sasize = sizeof(sain);
1703 sasize = sizeof(saun);
1707 DPRINTF(("getmsg: Unsupported address family %d\n",
1713 switch (st->s_cmd) {
1714 case SVR4_TI_CONNECT_REQUEST:
1715 DPRINTF(("getmsg: TI_CONNECT_REQUEST\n"));
1717 * We do the connect in one step, so the putmsg should
1718 * have gotten the error.
1720 sc.cmd = SVR4_TI_OK_REPLY;
1729 case SVR4_TI_OK_REPLY:
1730 DPRINTF(("getmsg: TI_OK_REPLY\n"));
1732 * We are immediately after a connect reply, so we send
1733 * a connect verification.
1736 error = kern_getpeername(td, uap->fd, &sa, &sasize);
1739 DPRINTF(("getmsg: getpeername failed %d\n", error));
1743 sc.cmd = SVR4_TI_CONNECT_REPLY;
1747 sc.pad[2] = 0x04000402;
1749 switch (st->s_family) {
1752 sockaddr_to_netaddr_in(&sc, (struct sockaddr_in *)sa);
1756 sc.len = sasize + 4;
1757 sockaddr_to_netaddr_un(&sc, (struct sockaddr_un *)sa);
1773 case SVR4_TI__ACCEPT_OK:
1774 DPRINTF(("getmsg: TI__ACCEPT_OK\n"));
1776 * We do the connect in one step, so the putmsg should
1777 * have gotten the error.
1779 sc.cmd = SVR4_TI_OK_REPLY;
1785 st->s_cmd = SVR4_TI__ACCEPT_WAIT;
1788 case SVR4_TI__ACCEPT_WAIT:
1789 DPRINTF(("getmsg: TI__ACCEPT_WAIT\n"));
1791 * We are after a listen, so we try to accept...
1794 error = kern_accept(td, uap->fd, &sa, &sasize, &afp);
1797 DPRINTF(("getmsg: accept failed %d\n", error));
1801 st->s_afd = *retval;
1803 DPRINTF(("getmsg: Accept fd = %d\n", st->s_afd));
1805 sc.cmd = SVR4_TI_ACCEPT_REPLY;
1809 switch (st->s_family) {
1812 sockaddr_to_netaddr_in(&sc, (struct sockaddr_in *)&sa);
1818 sc.pad[1] = 0x00010000;
1819 sc.pad[2] = 0xf6bcdaa0; /* I don't know what that is */
1820 sc.pad[3] = 0x00010000;
1822 sc.len = sasize + 4;
1826 fdclose(td->td_proc->p_fd, afp, st->s_afd, td);
1837 st->s_cmd = SVR4_TI__ACCEPT_OK;
1840 case SVR4_TI_SENDTO_REQUEST:
1841 DPRINTF(("getmsg: TI_SENDTO_REQUEST\n"));
1842 if (ctl.maxlen > 36 && ctl.len < 36)
1845 if (ctl.len > sizeof(sc))
1846 ctl.len = sizeof(sc);
1848 if ((error = copyin(ctl.buf, &sc, ctl.len)) != 0) {
1853 switch (st->s_family) {
1855 sa = (struct sockaddr *)&sain;
1856 sockaddr_to_netaddr_in(&sc, &sain);
1860 sa = (struct sockaddr *)&saun;
1861 sockaddr_to_netaddr_un(&sc, &saun);
1870 msg.msg_namelen = sasize;
1871 msg.msg_iov = &aiov;
1873 msg.msg_control = 0;
1874 aiov.iov_base = dat.buf;
1875 aiov.iov_len = dat.maxlen;
1878 error = kern_recvit(td, uap->fd, &msg, UIO_SYSSPACE, NULL);
1882 DPRINTF(("getmsg: recvit failed %d\n", error));
1886 sc.cmd = SVR4_TI_RECVFROM_IND;
1888 switch (st->s_family) {
1891 sockaddr_to_netaddr_in(&sc, &sain);
1895 sc.len = sasize + 4;
1896 sockaddr_to_netaddr_un(&sc, &saun);
1911 if (st->s_cmd == SVR4_TI_CONNECT_REQUEST) {
1912 struct read_args ra;
1914 /* More weirdness: Again, I can't find documentation
1915 * to back this up, but when a process does a generic
1916 * "getmsg()" call it seems that the command field is
1917 * zero and the length of the data area is zero. I
1918 * think processes expect getmsg() to fill in dat.len
1919 * after reading at most dat.maxlen octets from the
1920 * stream. Since we're using sockets I can let
1921 * read() look after it and frob return values
1922 * appropriately (or inappropriately :-)
1923 * -- newton@atdot.dotat.org XXX
1927 ra.nbyte = dat.maxlen;
1928 if ((error = read(td, &ra)) != 0) {
1934 st->s_cmd = SVR4_TI_SENDTO_REQUEST;
1938 DPRINTF(("getmsg: Unknown state %x\n", st->s_cmd));
1943 if (ctl.len > sizeof(sc))
1944 ctl.len = sizeof(sc);
1946 error = copyout(&sc, ctl.buf, ctl.len);
1949 error = copyout(&ctl, uap->ctl, sizeof(ctl));
1954 error = copyout(&dat, uap->dat, sizeof(dat));
1957 if (uap->flags) { /* XXX: Need translation */
1959 error = copyout(&fl, uap->flags, sizeof(fl));
1964 fdclose(td->td_proc->p_fd, afp, st->s_afd, td);
1978 show_msg("<getmsg", uap->fd, uap->ctl,
1980 #endif /* DEBUG_SVR4 */
1984 int svr4_sys_send(td, uap)
1986 struct svr4_sys_send_args *uap;
1988 struct sendto_args sta;
1993 sta.flags = uap->flags;
1997 return (sendto(td, &sta));
2000 int svr4_sys_recv(td, uap)
2002 struct svr4_sys_recv_args *uap;
2004 struct recvfrom_args rfa;
2009 rfa.flags = uap->flags;
2011 rfa.fromlenaddr = NULL;
2013 return (recvfrom(td, &rfa));
2017 * XXX This isn't necessary, but it's handy for inserting debug code into
2018 * sendto(). Let's leave it here for now...
2021 svr4_sys_sendto(td, uap)
2023 struct svr4_sys_sendto_args *uap;
2025 struct sendto_args sa;
2030 sa.flags = uap->flags;
2031 sa.to = (caddr_t)uap->to;
2032 sa.tolen = uap->tolen;
2034 DPRINTF(("calling sendto()\n"));
2035 return sendto(td, &sa);