aboutsummaryrefslogtreecommitdiffstats
path: root/erts/emulator/drivers/common/inet_drv.c
diff options
context:
space:
mode:
Diffstat (limited to 'erts/emulator/drivers/common/inet_drv.c')
-rw-r--r--erts/emulator/drivers/common/inet_drv.c9949
1 files changed, 9949 insertions, 0 deletions
diff --git a/erts/emulator/drivers/common/inet_drv.c b/erts/emulator/drivers/common/inet_drv.c
new file mode 100644
index 0000000000..b7b577da5b
--- /dev/null
+++ b/erts/emulator/drivers/common/inet_drv.c
@@ -0,0 +1,9949 @@
+/*
+ * %CopyrightBegin%
+ *
+ * Copyright Ericsson AB 1997-2009. All Rights Reserved.
+ *
+ * The contents of this file are subject to the Erlang Public License,
+ * Version 1.1, (the "License"); you may not use this file except in
+ * compliance with the License. You should have received a copy of the
+ * Erlang Public License along with this software. If not, it can be
+ * retrieved online at http://www.erlang.org/.
+ *
+ * Software distributed under the License is distributed on an "AS IS"
+ * basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See
+ * the License for the specific language governing rights and limitations
+ * under the License.
+ *
+ * %CopyrightEnd%
+ */
+
+#ifdef HAVE_CONFIG_H
+#include "config.h"
+#endif
+
+/* If we HAVE_SCTP_H and Solaris, we need to define the following in
+ order to get SCTP working:
+*/
+#if (defined(HAVE_SCTP_H) && defined(__sun) && defined(__SVR4))
+#define SOLARIS10 1
+/* WARNING: This is not quite correct, it may also be Solaris 11! */
+#define _XPG4_2
+#define __EXTENSIONS__
+#endif
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <ctype.h>
+#include <sys/types.h>
+#include <errno.h>
+
+#define IDENTITY(c) c
+#define STRINGIFY_1(b) IDENTITY(#b)
+#define STRINGIFY(a) STRINGIFY_1(a)
+
+#ifndef _OSE_
+#ifdef HAVE_UNISTD_H
+#include <unistd.h>
+#endif
+#ifdef HAVE_SYS_UIO_H
+#include <sys/uio.h>
+#endif
+#endif
+
+
+/* All platforms fail on malloc errors. */
+#define FATAL_MALLOC
+
+
+#include "erl_driver.h"
+
+#ifdef __WIN32__
+#define STRNCASECMP strncasecmp
+
+#define INCL_WINSOCK_API_TYPEDEFS 1
+
+#ifndef WINDOWS_H_INCLUDES_WINSOCK2_H
+#include <winsock2.h>
+#endif
+#include <windows.h>
+
+#include <Ws2tcpip.h> /* NEED VC 6.0 !!! */
+
+#undef WANT_NONBLOCKING
+#include "sys.h"
+
+#undef EWOULDBLOCK
+#undef ETIMEDOUT
+
+#define HAVE_MULTICAST_SUPPORT
+
+#define ERRNO_BLOCK WSAEWOULDBLOCK
+
+#define EWOULDBLOCK WSAEWOULDBLOCK
+#define EINPROGRESS WSAEINPROGRESS
+#define EALREADY WSAEALREADY
+#define ENOTSOCK WSAENOTSOCK
+#define EDESTADDRREQ WSAEDESTADDRREQ
+#define EMSGSIZE WSAEMSGSIZE
+#define EPROTOTYPE WSAEPROTOTYPE
+#define ENOPROTOOPT WSAENOPROTOOPT
+#define EPROTONOSUPPORT WSAEPROTONOSUPPORT
+#define ESOCKTNOSUPPORT WSAESOCKTNOSUPPORT
+#define EOPNOTSUPP WSAEOPNOTSUPP
+#define EPFNOSUPPORT WSAEPFNOSUPPORT
+#define EAFNOSUPPORT WSAEAFNOSUPPORT
+#define EADDRINUSE WSAEADDRINUSE
+#define EADDRNOTAVAIL WSAEADDRNOTAVAIL
+#define ENETDOWN WSAENETDOWN
+#define ENETUNREACH WSAENETUNREACH
+#define ENETRESET WSAENETRESET
+#define ECONNABORTED WSAECONNABORTED
+#define ECONNRESET WSAECONNRESET
+#define ENOBUFS WSAENOBUFS
+#define EISCONN WSAEISCONN
+#define ENOTCONN WSAENOTCONN
+#define ESHUTDOWN WSAESHUTDOWN
+#define ETOOMANYREFS WSAETOOMANYREFS
+#define ETIMEDOUT WSAETIMEDOUT
+#define ECONNREFUSED WSAECONNREFUSED
+#define ELOOP WSAELOOP
+#undef ENAMETOOLONG
+#define ENAMETOOLONG WSAENAMETOOLONG
+#define EHOSTDOWN WSAEHOSTDOWN
+#define EHOSTUNREACH WSAEHOSTUNREACH
+#undef ENOTEMPTY
+#define ENOTEMPTY WSAENOTEMPTY
+#define EPROCLIM WSAEPROCLIM
+#define EUSERS WSAEUSERS
+#define EDQUOT WSAEDQUOT
+#define ESTALE WSAESTALE
+#define EREMOTE WSAEREMOTE
+
+#define INVALID_EVENT WSA_INVALID_EVENT
+
+static BOOL (WINAPI *fpSetHandleInformation)(HANDLE,DWORD,DWORD);
+
+#define sock_open(af, type, proto) \
+ make_noninheritable_handle(socket((af), (type), (proto)))
+#define sock_close(s) closesocket((s))
+#define sock_shutdown(s, how) shutdown((s), (how))
+
+#define sock_accept(s, addr, len) \
+ make_noninheritable_handle(accept((s), (addr), (len)))
+#define sock_connect(s, addr, len) connect((s), (addr), (len))
+#define sock_listen(s, b) listen((s), (b))
+#define sock_bind(s, addr, len) bind((s), (addr), (len))
+#define sock_getopt(s,t,n,v,l) getsockopt((s),(t),(n),(v),(l))
+#define sock_setopt(s,t,n,v,l) setsockopt((s),(t),(n),(v),(l))
+#define sock_name(s, addr, len) getsockname((s), (addr), (len))
+#define sock_peer(s, addr, len) getpeername((s), (addr), (len))
+#define sock_ntohs(x) ntohs((x))
+#define sock_ntohl(x) ntohl((x))
+#define sock_htons(x) htons((x))
+#define sock_htonl(x) htonl((x))
+#define sock_send(s,buf,len,flag) send((s),(buf),(len),(flag))
+#define sock_sendv(s, vec, size, np, flag) \
+ WSASend((s),(WSABUF*)(vec),\
+ (size),(np),(flag),NULL,NULL)
+#define sock_recv(s,buf,len,flag) recv((s),(buf),(len),(flag))
+
+#define sock_recvfrom(s,buf,blen,flag,addr,alen) \
+ recvfrom((s),(buf),(blen),(flag),(addr),(alen))
+#define sock_sendto(s,buf,blen,flag,addr,alen) \
+ sendto((s),(buf),(blen),(flag),(addr),(alen))
+#define sock_hostname(buf, len) gethostname((buf), (len))
+
+#define sock_getservbyname(name,proto) getservbyname((name),(proto))
+#define sock_getservbyport(port,proto) getservbyport((port),(proto))
+
+#define sock_errno() WSAGetLastError()
+#define sock_create_event(d) WSACreateEvent()
+#define sock_close_event(e) WSACloseEvent(e)
+
+#define sock_select(D, Flags, OnOff) winsock_event_select(D, Flags, OnOff)
+
+#define SET_BLOCKING(s) ioctlsocket(s, FIONBIO, &zero_value)
+#define SET_NONBLOCKING(s) ioctlsocket(s, FIONBIO, &one_value)
+
+
+static unsigned long zero_value = 0;
+static unsigned long one_value = 1;
+
+#else
+
+#ifdef VXWORKS
+#include <sockLib.h>
+#include <sys/times.h>
+#include <iosLib.h>
+#include <taskLib.h>
+#include <selectLib.h>
+#include <ioLib.h>
+#else
+#include <sys/time.h>
+#ifdef NETDB_H_NEEDS_IN_H
+#include <netinet/in.h>
+#endif
+#include <netdb.h>
+#endif
+
+#ifndef _OSE_
+#include <sys/socket.h>
+#include <netinet/in.h>
+#else
+/* datatypes and macros from Solaris socket.h */
+struct linger {
+ int l_onoff; /* option on/off */
+ int l_linger; /* linger time */
+};
+#define SO_OOBINLINE 0x0100 /* leave received OOB data in line */
+#define SO_LINGER 0x0080 /* linger on close if data present */
+#endif
+
+#ifdef VXWORKS
+#include <rpc/rpctypes.h>
+#endif
+#ifdef DEF_INADDR_LOOPBACK_IN_RPC_TYPES_H
+#include <rpc/types.h>
+#endif
+
+#ifndef _OSE_
+#include <netinet/tcp.h>
+#include <arpa/inet.h>
+#endif
+
+#if (!defined(VXWORKS) && !defined(_OSE_))
+#include <sys/param.h>
+#ifdef HAVE_ARPA_NAMESER_H
+#include <arpa/nameser.h>
+#endif
+#endif
+
+#ifdef HAVE_SYS_SOCKIO_H
+#include <sys/sockio.h>
+#endif
+
+#ifdef HAVE_SYS_IOCTL_H
+#include <sys/ioctl.h>
+#endif
+
+#ifndef _OSE_
+#include <net/if.h>
+#else
+#define IFF_MULTICAST 0x00000800
+#endif
+
+#ifdef _OSE_
+#include "inet.h"
+#include "ineterr.h"
+#include "ose_inet_drv.h"
+#include "nameser.h"
+#include "resolv.h"
+#define SET_ASYNC(s) setsockopt((s), SOL_SOCKET, SO_OSEEVENT, (&(s)), sizeof(int))
+
+extern void select_release(void);
+
+#endif /* _OSE_ */
+
+/* Solaris headers, only to be used with SFK */
+#ifdef _OSE_SFK_
+#include <ctype.h>
+#include <string.h>
+#endif
+
+/* SCTP support -- currently for UNIX platforms only: */
+#undef HAVE_SCTP
+#if (!defined(VXWORKS) && !defined(_OSE_) && !defined(__WIN32__) && defined(HAVE_SCTP_H))
+
+#include <netinet/sctp.h>
+
+/* SCTP Socket API Draft from version 11 on specifies that netinet/sctp.h must
+ explicitly define HAVE_SCTP in case when SCTP is supported, but Solaris 10
+ still apparently uses Draft 10, and does not define that symbol, so we have
+ to define it explicitly:
+*/
+#ifndef HAVE_SCTP
+# define HAVE_SCTP
+#endif
+
+/* These changed in draft 11, so SOLARIS10 uses the old MSG_* */
+#if ! HAVE_DECL_SCTP_UNORDERED
+# define SCTP_UNORDERED MSG_UNORDERED
+#endif
+#if ! HAVE_DECL_SCTP_ADDR_OVER
+# define SCTP_ADDR_OVER MSG_ADDR_OVER
+#endif
+#if ! HAVE_DECL_SCTP_ABORT
+# define SCTP_ABORT MSG_ABORT
+#endif
+#if ! HAVE_DECL_SCTP_EOF
+# define SCTP_EOF MSG_EOF
+#endif
+
+/* New spelling in lksctp 2.6.22 or maybe even earlier:
+ * adaption -> adaptation
+ */
+#if !defined(SCTP_ADAPTATION_LAYER) && defined (SCTP_ADAPTION_LAYER)
+# define SCTP_ADAPTATION_LAYER SCTP_ADAPTION_LAYER
+# define SCTP_ADAPTATION_INDICATION SCTP_ADAPTION_INDICATION
+# define sctp_adaptation_event sctp_adaption_event
+# define sctp_setadaptation sctp_setadaption
+# define sn_adaptation_event sn_adaption_event
+# define sai_adaptation_ind sai_adaption_ind
+# define ssb_adaptation_ind ssb_adaption_ind
+# define sctp_adaptation_layer_event sctp_adaption_layer_event
+#endif
+
+static void *h_libsctp = NULL;
+#ifdef __GNUC__
+static typeof(sctp_bindx) *p_sctp_bindx = NULL;
+#else
+static int (*p_sctp_bindx)(int sd, struct sockaddr *addrs,
+ int addrcnt, int flags) = NULL;
+#endif
+
+#endif /* SCTP supported */
+
+#ifndef WANT_NONBLOCKING
+#define WANT_NONBLOCKING
+#endif
+#include "sys.h"
+
+/* #define INET_DRV_DEBUG 1 */
+#ifdef INET_DRV_DEBUG
+#define DEBUG 1
+#undef DEBUGF
+#define DEBUGF(X) printf X
+#endif
+
+#if !defined(__WIN32__) && !defined(HAVE_STRNCASECMP)
+#define STRNCASECMP my_strncasecmp
+
+static int my_strncasecmp(const char *s1, const char *s2, size_t n)
+{
+ int i;
+
+ for (i=0;i<n-1 && s1[i] && s2[i] && toupper(s1[i]) == toupper(s2[i]);++i)
+ ;
+ return (toupper(s1[i]) - toupper(s2[i]));
+}
+
+
+#else
+#define STRNCASECMP strncasecmp
+#endif
+
+#define INVALID_SOCKET -1
+#define INVALID_EVENT -1
+#define SOCKET_ERROR -1
+#define SOCKET int
+#define HANDLE long int
+#define FD_READ ERL_DRV_READ
+#define FD_WRITE ERL_DRV_WRITE
+#define FD_CLOSE 0
+#define FD_CONNECT ERL_DRV_WRITE
+#define FD_ACCEPT ERL_DRV_READ
+
+#define sock_connect(s, addr, len) connect((s), (addr), (len))
+#define sock_listen(s, b) listen((s), (b))
+#define sock_bind(s, addr, len) bind((s), (addr), (len))
+#ifdef VXWORKS
+#define sock_getopt(s,t,n,v,l) wrap_sockopt(&getsockopt,\
+ s,t,n,v,(unsigned int)(l))
+#define sock_setopt(s,t,n,v,l) wrap_sockopt(&setsockopt,\
+ s,t,n,v,(unsigned int)(l))
+#else
+#define sock_getopt(s,t,n,v,l) getsockopt((s),(t),(n),(v),(l))
+#define sock_setopt(s,t,n,v,l) setsockopt((s),(t),(n),(v),(l))
+#endif
+#define sock_name(s, addr, len) getsockname((s), (addr), (len))
+#define sock_peer(s, addr, len) getpeername((s), (addr), (len))
+#define sock_ntohs(x) ntohs((x))
+#define sock_ntohl(x) ntohl((x))
+#define sock_htons(x) htons((x))
+#define sock_htonl(x) htonl((x))
+
+#ifdef _OSE_
+#define sock_accept(s, addr, len) ose_inet_accept((s), (addr), (len))
+#define sock_send(s,buf,len,flag) ose_inet_send((s),(buf),(len),(flag))
+#define sock_sendto(s,buf,blen,flag,addr,alen) \
+ ose_inet_sendto((s),(buf),(blen),(flag),(addr),(alen))
+#define sock_sendv(s, vec, size, np, flag) \
+ (*(np) = ose_inet_sendv((s), (SysIOVec*)(vec), (size)))
+#define sock_open(af, type, proto) ose_inet_socket((af), (type), (proto))
+#define sock_close(s) ose_inet_close((s))
+#define sock_hostname(buf, len) ose_gethostname((buf), (len))
+#define sock_getservbyname(name,proto) ose_getservbyname((name), (proto))
+#define sock_getservbyport(port,proto) ose_getservbyport((port), (proto))
+
+#else
+#define sock_accept(s, addr, len) accept((s), (addr), (len))
+#define sock_send(s,buf,len,flag) send((s),(buf),(len),(flag))
+#define sock_sendto(s,buf,blen,flag,addr,alen) \
+ sendto((s),(buf),(blen),(flag),(addr),(alen))
+#define sock_sendv(s, vec, size, np, flag) \
+ (*(np) = writev((s), (struct iovec*)(vec), (size)))
+#define sock_sendmsg(s,msghdr,flag) sendmsg((s),(msghdr),(flag))
+
+#define sock_open(af, type, proto) socket((af), (type), (proto))
+#define sock_close(s) close((s))
+#define sock_shutdown(s, how) shutdown((s), (how))
+
+#define sock_hostname(buf, len) gethostname((buf), (len))
+#define sock_getservbyname(name,proto) getservbyname((name), (proto))
+#define sock_getservbyport(port,proto) getservbyport((port), (proto))
+#endif /* _OSE_ */
+
+#define sock_recv(s,buf,len,flag) recv((s),(buf),(len),(flag))
+#define sock_recvfrom(s,buf,blen,flag,addr,alen) \
+ recvfrom((s),(buf),(blen),(flag),(addr),(alen))
+#define sock_recvmsg(s,msghdr,flag) recvmsg((s),(msghdr),(flag))
+
+#define sock_errno() errno
+#define sock_create_event(d) ((d)->s) /* return file descriptor */
+#define sock_close_event(e) /* do nothing */
+
+#ifdef _OSE_
+#define inet_driver_select(port, e, mode, on) \
+ ose_inet_select(port, e, mode, on)
+#else
+#define inet_driver_select(port, e, mode, on) \
+ driver_select(port, e, mode | (on?ERL_DRV_USE:0), on)
+#endif /* _OSE_ */
+
+#define sock_select(d, flags, onoff) do { \
+ (d)->event_mask = (onoff) ? \
+ ((d)->event_mask | (flags)) : \
+ ((d)->event_mask & ~(flags)); \
+ DEBUGF(("sock_select(%ld): flags=%02X, onoff=%d, event_mask=%02lX\r\n", \
+ (long) (d)->port, (flags), (onoff), (unsigned long) (d)->event_mask)); \
+ inet_driver_select((d)->port, (ErlDrvEvent)(long)(d)->event, (flags), (onoff)); \
+ } while(0)
+
+
+#endif /* __WIN32__ */
+
+#include "packet_parser.h"
+
+#define get_int24(s) ((((unsigned char*) (s))[0] << 16) | \
+ (((unsigned char*) (s))[1] << 8) | \
+ (((unsigned char*) (s))[2]))
+
+#define get_little_int32(s) ((((unsigned char*) (s))[3] << 24) | \
+ (((unsigned char*) (s))[2] << 16) | \
+ (((unsigned char*) (s))[1] << 8) | \
+ (((unsigned char*) (s))[0]))
+
+/*----------------------------------------------------------------------------
+** Interface constants.
+**
+** This section must be "identical" to the corresponding inet_int.hrl
+*/
+
+/* general address encode/decode tag */
+#define INET_AF_INET 1
+#define INET_AF_INET6 2
+#define INET_AF_ANY 3 /* INADDR_ANY or IN6ADDR_ANY_INIT */
+#define INET_AF_LOOPBACK 4 /* INADDR_LOOPBACK or IN6ADDR_LOOPBACK_INIT */
+
+/* INET_REQ_GETTYPE enumeration */
+#define INET_TYPE_STREAM 1
+#define INET_TYPE_DGRAM 2
+#define INET_TYPE_SEQPACKET 3
+
+/* INET_LOPT_MODE options */
+#define INET_MODE_LIST 0
+#define INET_MODE_BINARY 1
+
+/* INET_LOPT_DELIVER options */
+#define INET_DELIVER_PORT 0
+#define INET_DELIVER_TERM 1
+
+/* INET_LOPT_ACTIVE options */
+#define INET_PASSIVE 0 /* false */
+#define INET_ACTIVE 1 /* true */
+#define INET_ONCE 2 /* true; active once then passive */
+
+/* INET_REQ_GETSTATUS enumeration */
+#define INET_F_OPEN 0x0001
+#define INET_F_BOUND 0x0002
+#define INET_F_ACTIVE 0x0004
+#define INET_F_LISTEN 0x0008
+#define INET_F_CON 0x0010
+#define INET_F_ACC 0x0020
+#define INET_F_LST 0x0040
+#define INET_F_BUSY 0x0080
+#define INET_F_MULTI_CLIENT 0x0100 /* Multiple clients for one descriptor, i.e. multi-accept */
+
+/* One numberspace for *_REC_* so if an e.g UDP request is issued
+** for a TCP socket, the driver can protest.
+*/
+#define INET_REQ_OPEN 1
+#define INET_REQ_CLOSE 2
+#define INET_REQ_CONNECT 3
+#define INET_REQ_PEER 4
+#define INET_REQ_NAME 5
+#define INET_REQ_BIND 6
+#define INET_REQ_SETOPTS 7
+#define INET_REQ_GETOPTS 8
+/* #define INET_REQ_GETIX 9 NOT USED ANY MORE */
+/* #define INET_REQ_GETIF 10 REPLACE BY NEW STUFF */
+#define INET_REQ_GETSTAT 11
+#define INET_REQ_GETHOSTNAME 12
+#define INET_REQ_FDOPEN 13
+#define INET_REQ_GETFD 14
+#define INET_REQ_GETTYPE 15
+#define INET_REQ_GETSTATUS 16
+#define INET_REQ_GETSERVBYNAME 17
+#define INET_REQ_GETSERVBYPORT 18
+#define INET_REQ_SETNAME 19
+#define INET_REQ_SETPEER 20
+#define INET_REQ_GETIFLIST 21
+#define INET_REQ_IFGET 22
+#define INET_REQ_IFSET 23
+#define INET_REQ_SUBSCRIBE 24
+/* TCP requests */
+#define TCP_REQ_ACCEPT 40
+#define TCP_REQ_LISTEN 41
+#define TCP_REQ_RECV 42
+#define TCP_REQ_UNRECV 43
+#define TCP_REQ_SHUTDOWN 44
+#define TCP_REQ_MULTI_OP 45
+/* UDP and SCTP requests */
+#define PACKET_REQ_RECV 60 /* Common for UDP and SCTP */
+#define SCTP_REQ_LISTEN 61 /* Different from TCP; not for UDP */
+#define SCTP_REQ_BINDX 62 /* Multi-home SCTP bind */
+
+/* INET_REQ_SUBSCRIBE sub-requests */
+#define INET_SUBS_EMPTY_OUT_Q 1
+
+/* TCP additional flags */
+#define TCP_ADDF_DELAY_SEND 1
+#define TCP_ADDF_CLOSE_SENT 2 /* Close sent (active mode only) */
+#define TCP_ADDF_DELAYED_CLOSE_RECV 4 /* If receive fails, report {error,closed} (passive mode) */
+#define TCP_ADDF_DELAYED_CLOSE_SEND 8 /* If send fails, report {error,closed} (passive mode) */
+
+/* *_REQ_* replies */
+#define INET_REP_ERROR 0
+#define INET_REP_OK 1
+#define INET_REP_SCTP 2
+
+/* INET_REQ_SETOPTS and INET_REQ_GETOPTS options */
+#define INET_OPT_REUSEADDR 0 /* enable/disable local address reuse */
+#define INET_OPT_KEEPALIVE 1 /* enable/disable keep connections alive */
+#define INET_OPT_DONTROUTE 2 /* enable/disable routing for messages */
+#define INET_OPT_LINGER 3 /* linger on close if data is present */
+#define INET_OPT_BROADCAST 4 /* enable/disable transmission of broadcast */
+#define INET_OPT_OOBINLINE 5 /* enable/disable out-of-band data in band */
+#define INET_OPT_SNDBUF 6 /* set send buffer size */
+#define INET_OPT_RCVBUF 7 /* set receive buffer size */
+#define INET_OPT_PRIORITY 8 /* set priority */
+#define INET_OPT_TOS 9 /* Set type of service */
+#define TCP_OPT_NODELAY 10 /* don't delay send to coalesce packets */
+#define UDP_OPT_MULTICAST_IF 11 /* set/get IP multicast interface */
+#define UDP_OPT_MULTICAST_TTL 12 /* set/get IP multicast timetolive */
+#define UDP_OPT_MULTICAST_LOOP 13 /* set/get IP multicast loopback */
+#define UDP_OPT_ADD_MEMBERSHIP 14 /* add an IP group membership */
+#define UDP_OPT_DROP_MEMBERSHIP 15 /* drop an IP group membership */
+/* LOPT is local options */
+#define INET_LOPT_BUFFER 20 /* min buffer size hint */
+#define INET_LOPT_HEADER 21 /* list header size */
+#define INET_LOPT_ACTIVE 22 /* enable/disable active receive */
+#define INET_LOPT_PACKET 23 /* packet header type (TCP) */
+#define INET_LOPT_MODE 24 /* list or binary mode */
+#define INET_LOPT_DELIVER 25 /* port or term delivery */
+#define INET_LOPT_EXITONCLOSE 26 /* exit port on active close or not ! */
+#define INET_LOPT_TCP_HIWTRMRK 27 /* set local high watermark */
+#define INET_LOPT_TCP_LOWTRMRK 28 /* set local low watermark */
+#define INET_LOPT_BIT8 29 /* set 8 bit detection */
+#define INET_LOPT_TCP_SEND_TIMEOUT 30 /* set send timeout */
+#define INET_LOPT_TCP_DELAY_SEND 31 /* Delay sends until next poll */
+#define INET_LOPT_PACKET_SIZE 32 /* Max packet size */
+#define INET_LOPT_UDP_READ_PACKETS 33 /* Number of packets to read */
+#define INET_OPT_RAW 34 /* Raw socket options */
+#define INET_LOPT_TCP_SEND_TIMEOUT_CLOSE 35 /* auto-close on send timeout or not */
+/* SCTP options: a separate range, from 100: */
+#define SCTP_OPT_RTOINFO 100
+#define SCTP_OPT_ASSOCINFO 101
+#define SCTP_OPT_INITMSG 102
+#define SCTP_OPT_AUTOCLOSE 103
+#define SCTP_OPT_NODELAY 104
+#define SCTP_OPT_DISABLE_FRAGMENTS 105
+#define SCTP_OPT_I_WANT_MAPPED_V4_ADDR 106
+#define SCTP_OPT_MAXSEG 107
+#define SCTP_OPT_SET_PEER_PRIMARY_ADDR 108
+#define SCTP_OPT_PRIMARY_ADDR 109
+#define SCTP_OPT_ADAPTATION_LAYER 110
+#define SCTP_OPT_PEER_ADDR_PARAMS 111
+#define SCTP_OPT_DEFAULT_SEND_PARAM 112
+#define SCTP_OPT_EVENTS 113
+#define SCTP_OPT_DELAYED_ACK_TIME 114
+#define SCTP_OPT_STATUS 115
+#define SCTP_OPT_GET_PEER_ADDR_INFO 116
+
+/* INET_REQ_IFGET and INET_REQ_IFSET options */
+#define INET_IFOPT_ADDR 1
+#define INET_IFOPT_BROADADDR 2
+#define INET_IFOPT_DSTADDR 3
+#define INET_IFOPT_MTU 4
+#define INET_IFOPT_NETMASK 5
+#define INET_IFOPT_FLAGS 6
+#define INET_IFOPT_HWADDR 7
+
+/* INET_LOPT_BIT8 options */
+#define INET_BIT8_CLEAR 0
+#define INET_BIT8_SET 1
+#define INET_BIT8_ON 2
+#define INET_BIT8_OFF 3
+
+/* INET_REQ_GETSTAT enumeration */
+#define INET_STAT_RECV_CNT 1
+#define INET_STAT_RECV_MAX 2
+#define INET_STAT_RECV_AVG 3
+#define INET_STAT_RECV_DVI 4
+#define INET_STAT_SEND_CNT 5
+#define INET_STAT_SEND_MAX 6
+#define INET_STAT_SEND_AVG 7
+#define INET_STAT_SEND_PND 8
+#define INET_STAT_RECV_OCT 9 /* received octets */
+#define INET_STAT_SEND_OCT 10 /* sent octets */
+
+/* INET_IFOPT_FLAGS enumeration */
+#define INET_IFF_UP 0x0001
+#define INET_IFF_BROADCAST 0x0002
+#define INET_IFF_LOOPBACK 0x0004
+#define INET_IFF_POINTTOPOINT 0x0008
+#define INET_IFF_RUNNING 0x0010
+#define INET_IFF_MULTICAST 0x0020
+/* Complement flags for turning them off */
+#define INET_IFF_DOWN 0x0100
+#define INET_IFF_NBROADCAST 0x0200
+/* #define INET_IFF_NLOOPBACK 0x0400 */
+#define INET_IFF_NPOINTTOPOINT 0x0800
+/* #define INET_IFF_NRUNNING 0x1000 */
+/* #define INET_IFF_NMULTICAST 0x2000 */
+
+/* Flags for "sctp_sndrcvinfo". Used in a bitmask -- must be powers of 2:
+** INET_REQ_SETOPTS:SCTP_OPT_DEFAULT_SEND_PARAM
+*/
+#define SCTP_FLAG_UNORDERED (1 /* am_unordered */)
+#define SCTP_FLAG_ADDR_OVER (2 /* am_addr_over */)
+#define SCTP_FLAG_ABORT (4 /* am_abort */)
+#define SCTP_FLAG_EOF (8 /* am_eof */)
+#define SCTP_FLAG_SNDALL (16 /* am_sndall, NOT YET IMPLEMENTED */)
+
+/* Flags for "sctp_set_opts" (actually for SCTP_OPT_PEER_ADDR_PARAMS).
+** These flags are also used in a bitmask, so they must be powers of 2:
+*/
+#define SCTP_FLAG_HB_ENABLE (1 /* am_hb_enable */)
+#define SCTP_FLAG_HB_DISABLE (2 /* am_hb_disable */)
+#define SCTP_FLAG_HB_DEMAND (4 /* am_hb_demand */)
+#define SCTP_FLAG_PMTUD_ENABLE (8 /* am_pmtud_enable */)
+#define SCTP_FLAG_PMTUD_DISABLE (16 /* am_pmtud_disable */)
+#define SCTP_FLAG_SACDELAY_ENABLE (32 /* am_sackdelay_enable */)
+#define SCTP_FLAG_SACDELAY_DISABLE (64 /* am_sackdelay_disable */)
+
+/*
+** End of interface constants.
+**--------------------------------------------------------------------------*/
+
+#define INET_STATE_CLOSED 0
+#define INET_STATE_OPEN (INET_F_OPEN)
+#define INET_STATE_BOUND (INET_STATE_OPEN | INET_F_BOUND)
+#define INET_STATE_CONNECTED (INET_STATE_BOUND | INET_F_ACTIVE)
+
+#define IS_OPEN(d) \
+ (((d)->state & INET_F_OPEN) == INET_F_OPEN)
+
+#define IS_BOUND(d) \
+ (((d)->state & INET_F_BOUND) == INET_F_BOUND)
+
+#define IS_CONNECTED(d) \
+ (((d)->state & INET_STATE_CONNECTED) == INET_STATE_CONNECTED)
+
+#define IS_CONNECTING(d) \
+ (((d)->state & INET_F_CON) == INET_F_CON)
+
+#define IS_BUSY(d) \
+ (((d)->state & INET_F_BUSY) == INET_F_BUSY)
+
+#define INET_DEF_BUFFER 1460 /* default buffer size */
+#define INET_MIN_BUFFER 1 /* internal min buffer */
+#define INET_MAX_BUFFER (1024*64) /* internal max buffer */
+
+/* Note: INET_HIGH_WATERMARK MUST be less than 2*INET_MAX_BUFFER */
+#define INET_HIGH_WATERMARK (1024*8) /* 8k pending high => busy */
+/* Note: INET_LOW_WATERMARK MUST be less than INET_MAX_BUFFER and
+** less than INET_HIGH_WATERMARK
+*/
+#define INET_LOW_WATERMARK (1024*4) /* 4k pending => allow more */
+
+#define INET_INFINITY 0xffffffff /* infinity value */
+
+#define INET_MAX_ASYNC 1 /* max number of async queue ops */
+
+/* INET_LOPT_UDP_PACKETS */
+#define INET_PACKET_POLL 5 /* maximum number of packets to poll */
+
+/* Max interface name */
+#define INET_IFNAMSIZ 16
+
+/* Max length of Erlang Term Buffer (for outputting structured terms): */
+#ifdef HAVE_SCTP
+#define PACKET_ERL_DRV_TERM_DATA_LEN 512
+#else
+#define PACKET_ERL_DRV_TERM_DATA_LEN 32
+#endif
+
+
+#define BIN_REALLOC_LIMIT(x) (((x)*3)/4) /* 75% */
+
+/* The general purpose sockaddr */
+typedef union {
+ struct sockaddr sa;
+ struct sockaddr_in sai;
+#ifdef HAVE_IN6
+ struct sockaddr_in6 sai6;
+#endif
+} inet_address;
+
+
+/* for AF_INET & AF_INET6 */
+#define inet_address_port(x) ((x)->sai.sin_port)
+
+#if defined(HAVE_IN6) && defined(AF_INET6)
+#define addrlen(family) \
+ ((family == AF_INET) ? sizeof(struct in_addr) : \
+ ((family == AF_INET6) ? sizeof(struct in6_addr) : 0))
+#else
+#define addrlen(family) \
+ ((family == AF_INET) ? sizeof(struct in_addr) : 0)
+#endif
+
+typedef struct _multi_timer_data {
+ ErlDrvNowData when;
+ ErlDrvTermData caller;
+ void (*timeout_function)(ErlDrvData drv_data, ErlDrvTermData caller);
+ struct _multi_timer_data *next;
+ struct _multi_timer_data *prev;
+} MultiTimerData;
+
+static MultiTimerData *add_multi_timer(MultiTimerData **first, ErlDrvPort port,
+ ErlDrvTermData caller, unsigned timeout,
+ void (*timeout_fun)(ErlDrvData drv_data,
+ ErlDrvTermData caller));
+static void fire_multi_timers(MultiTimerData **first, ErlDrvPort port,
+ ErlDrvData data);
+static void remove_multi_timer(MultiTimerData **first, ErlDrvPort port, MultiTimerData *p);
+
+static void tcp_inet_multi_timeout(ErlDrvData e, ErlDrvTermData caller);
+static void clean_multi_timers(MultiTimerData **first, ErlDrvPort port);
+
+typedef struct {
+ int id; /* id used to identify reply */
+ ErlDrvTermData caller; /* recipient of async reply */
+ int req; /* Request id (CONNECT/ACCEPT/RECV) */
+ union {
+ unsigned value; /* Request timeout (since op issued,not started) */
+ MultiTimerData *mtd;
+ } tmo;
+ ErlDrvMonitor monitor;
+} inet_async_op;
+
+typedef struct inet_async_multi_op_ {
+ inet_async_op op;
+ struct inet_async_multi_op_ *next;
+} inet_async_multi_op;
+
+
+typedef struct subs_list_ {
+ ErlDrvTermData subscriber;
+ struct subs_list_ *next;
+} subs_list;
+
+#define NO_PROCESS 0
+#define NO_SUBSCRIBERS(SLP) ((SLP)->subscriber == NO_PROCESS)
+static void send_to_subscribers(ErlDrvPort, subs_list *, int,
+ ErlDrvTermData [], int);
+static void free_subscribers(subs_list*);
+static int save_subscriber(subs_list *, ErlDrvTermData);
+
+typedef struct {
+ SOCKET s; /* the socket or INVALID_SOCKET if not open */
+ HANDLE event; /* Event handle (same as s in unix) */
+ long event_mask; /* current FD events */
+#ifdef __WIN32__
+ long forced_events; /* Mask of events that are forcefully signalled
+ on windows see winsock_event_select
+ for details */
+ int send_would_block; /* Last send attempt failed with "WOULDBLOCK" */
+#endif
+ ErlDrvPort port; /* the port identifier */
+ ErlDrvTermData dport; /* the port identifier as DriverTermData */
+ int state; /* status */
+ int prebound; /* only set when opened with inet_fdopen */
+ int mode; /* BINARY | LIST
+ (affect how to interpret hsz) */
+ int exitf; /* exit port on close or not */
+ int bit8f; /* check if data has bit number 7 set */
+ int deliver; /* Delivery mode, TERM or PORT */
+
+ ErlDrvTermData caller; /* recipient of sync reply */
+ ErlDrvTermData busy_caller; /* recipient of sync reply when caller busy.
+ * Only valid while INET_F_BUSY. */
+
+ inet_async_op* oph; /* queue head or NULL */
+ inet_async_op* opt; /* queue tail or NULL */
+ inet_async_op op_queue[INET_MAX_ASYNC]; /* call queue */
+
+ int active; /* 0 = passive, 1 = active, 2 = active once */
+ int stype; /* socket type:
+ SOCK_STREAM/SOCK_DGRAM/SOCK_SEQPACKET */
+ int sprotocol; /* socket protocol:
+ IPPROTO_TCP|IPPROTO_UDP|IPPROTO_SCTP */
+ int sfamily; /* address family */
+ enum PacketParseType htype; /* header type (TCP only?) */
+ unsigned int psize; /* max packet size (TCP only?) */
+ int bit8; /* set if bit8f==true and data some data
+ seen had the 7th bit set */
+ inet_address remote; /* remote address for connected sockets */
+ inet_address peer_addr; /* fake peer address */
+ inet_address name_addr; /* fake local address */
+
+ inet_address* peer_ptr; /* fake peername or NULL */
+ inet_address* name_ptr; /* fake sockname or NULL */
+
+ int bufsz; /* minimum buffer constraint */
+ unsigned int hsz; /* the list header size, -1 is large !!! */
+ /* statistics */
+ unsigned long recv_oct[2]; /* number of received octets >= 64 bits */
+ unsigned long recv_cnt; /* number of packets received */
+ unsigned long recv_max; /* maximum packet size received */
+ double recv_avg; /* average packet size received */
+ double recv_dvi; /* avarage deviation from avg_size */
+ unsigned long send_oct[2]; /* number of octets sent >= 64 bits */
+ unsigned long send_cnt; /* number of packets sent */
+ unsigned long send_max; /* maximum packet send */
+ double send_avg; /* average packet size sent */
+
+ subs_list empty_out_q_subs; /* Empty out queue subscribers */
+} inet_descriptor;
+
+
+
+#define TCP_STATE_CLOSED INET_STATE_CLOSED
+#define TCP_STATE_OPEN (INET_F_OPEN)
+#define TCP_STATE_BOUND (TCP_STATE_OPEN | INET_F_BOUND)
+#define TCP_STATE_CONNECTED (TCP_STATE_BOUND | INET_F_ACTIVE)
+#define TCP_STATE_LISTEN (TCP_STATE_BOUND | INET_F_LISTEN)
+#define TCP_STATE_CONNECTING (TCP_STATE_BOUND | INET_F_CON)
+#define TCP_STATE_ACCEPTING (TCP_STATE_LISTEN | INET_F_ACC)
+#define TCP_STATE_MULTI_ACCEPTING (TCP_STATE_ACCEPTING | INET_F_MULTI_CLIENT)
+
+
+#define TCP_MAX_PACKET_SIZE 0x4000000 /* 64 M */
+
+#define MAX_VSIZE 16 /* Max number of entries allowed in an I/O
+ * vector sock_sendv().
+ */
+
+static int tcp_inet_init(void);
+static void tcp_inet_stop(ErlDrvData);
+static void tcp_inet_command(ErlDrvData, char*, int);
+static void tcp_inet_commandv(ErlDrvData, ErlIOVec*);
+static void tcp_inet_flush(ErlDrvData drv_data);
+static void tcp_inet_drv_input(ErlDrvData, ErlDrvEvent);
+static void tcp_inet_drv_output(ErlDrvData data, ErlDrvEvent event);
+static ErlDrvData tcp_inet_start(ErlDrvPort, char* command);
+static int tcp_inet_ctl(ErlDrvData, unsigned int, char*, int, char**, int);
+static void tcp_inet_timeout(ErlDrvData);
+static void tcp_inet_process_exit(ErlDrvData, ErlDrvMonitor *);
+static void inet_stop_select(ErlDrvEvent, void*);
+#ifdef __WIN32__
+static void tcp_inet_event(ErlDrvData, ErlDrvEvent);
+static void find_dynamic_functions(void);
+#endif
+
+static struct erl_drv_entry tcp_inet_driver_entry =
+{
+ tcp_inet_init, /* inet_init will add this driver !! */
+ tcp_inet_start,
+ tcp_inet_stop,
+ tcp_inet_command,
+#ifdef __WIN32__
+ tcp_inet_event,
+ NULL,
+#else
+ tcp_inet_drv_input,
+ tcp_inet_drv_output,
+#endif
+ "tcp_inet",
+ NULL,
+ NULL,
+ tcp_inet_ctl,
+ tcp_inet_timeout,
+ tcp_inet_commandv,
+ NULL,
+ tcp_inet_flush,
+ NULL,
+ NULL,
+ ERL_DRV_EXTENDED_MARKER,
+ ERL_DRV_EXTENDED_MAJOR_VERSION,
+ ERL_DRV_EXTENDED_MINOR_VERSION,
+ ERL_DRV_FLAG_USE_PORT_LOCKING|ERL_DRV_FLAG_SOFT_BUSY,
+ NULL,
+ tcp_inet_process_exit,
+ inet_stop_select
+};
+
+#define PACKET_STATE_CLOSED INET_STATE_CLOSED
+#define PACKET_STATE_OPEN (INET_F_OPEN)
+#define PACKET_STATE_BOUND (PACKET_STATE_OPEN | INET_F_BOUND)
+#define SCTP_STATE_LISTEN (PACKET_STATE_BOUND | INET_F_LISTEN)
+#define SCTP_STATE_CONNECTING (PACKET_STATE_BOUND | INET_F_CON)
+#define PACKET_STATE_CONNECTED (PACKET_STATE_BOUND | INET_F_ACTIVE)
+
+
+static int packet_inet_init(void);
+static void packet_inet_stop(ErlDrvData);
+static void packet_inet_command(ErlDrvData, char*, int);
+static void packet_inet_drv_input(ErlDrvData data, ErlDrvEvent event);
+static void packet_inet_drv_output(ErlDrvData data, ErlDrvEvent event);
+static ErlDrvData udp_inet_start(ErlDrvPort, char* command);
+#ifdef HAVE_SCTP
+static ErlDrvData sctp_inet_start(ErlDrvPort, char* command);
+#endif
+static int packet_inet_ctl(ErlDrvData, unsigned int, char*,
+ int, char**, int);
+static void packet_inet_timeout(ErlDrvData);
+#ifdef __WIN32__
+static void packet_inet_event(ErlDrvData, ErlDrvEvent);
+static SOCKET make_noninheritable_handle(SOCKET s);
+static int winsock_event_select(inet_descriptor *, int, int);
+#endif
+
+static struct erl_drv_entry udp_inet_driver_entry =
+{
+ packet_inet_init, /* inet_init will add this driver !! */
+ udp_inet_start,
+ packet_inet_stop,
+ packet_inet_command,
+#ifdef __WIN32__
+ packet_inet_event,
+ NULL,
+#else
+ packet_inet_drv_input,
+ packet_inet_drv_output,
+#endif
+ "udp_inet",
+ NULL,
+ NULL,
+ packet_inet_ctl,
+ packet_inet_timeout,
+ NULL,
+ NULL,
+ NULL,
+ NULL,
+ NULL,
+ ERL_DRV_EXTENDED_MARKER,
+ ERL_DRV_EXTENDED_MAJOR_VERSION,
+ ERL_DRV_EXTENDED_MINOR_VERSION,
+ ERL_DRV_FLAG_USE_PORT_LOCKING,
+ NULL,
+ NULL,
+ inet_stop_select
+};
+
+#ifdef HAVE_SCTP
+static struct erl_drv_entry sctp_inet_driver_entry =
+{
+ packet_inet_init, /* inet_init will add this driver !! */
+ sctp_inet_start,
+ packet_inet_stop,
+ packet_inet_command,
+#ifdef __WIN32__
+ packet_inet_event,
+ NULL,
+#else
+ packet_inet_drv_input,
+ packet_inet_drv_output,
+#endif
+ "sctp_inet",
+ NULL,
+ NULL,
+ packet_inet_ctl,
+ packet_inet_timeout,
+ NULL,
+ NULL,
+ NULL,
+ NULL,
+ NULL,
+ ERL_DRV_EXTENDED_MARKER,
+ ERL_DRV_EXTENDED_MAJOR_VERSION,
+ ERL_DRV_EXTENDED_MINOR_VERSION,
+ ERL_DRV_FLAG_USE_PORT_LOCKING,
+ NULL,
+ NULL, /* process_exit */
+ inet_stop_select
+};
+#endif
+
+typedef struct {
+ inet_descriptor inet; /* common data structure (DON'T MOVE) */
+ int high; /* high watermark */
+ int low; /* low watermark */
+ int send_timeout; /* timeout to use in send */
+ int send_timeout_close; /* auto-close socket on send_timeout */
+ int busy_on_send; /* busy on send with timeout! */
+ int i_bufsz; /* current input buffer size (<= bufsz) */
+ ErlDrvBinary* i_buf; /* current binary buffer */
+ char* i_ptr; /* current pos in buf */
+ char* i_ptr_start; /* packet start pos in buf */
+ int i_remain; /* remaining chars to read */
+ int tcp_add_flags;/* Additional TCP descriptor flags */
+ int http_state; /* 0 = response|request 1=headers fields */
+ inet_async_multi_op *multi_first;/* NULL == no multi-accept-queue, op is in ordinary queue */
+ inet_async_multi_op *multi_last;
+ MultiTimerData *mtd; /* Timer structures for multiple accept */
+} tcp_descriptor;
+
+/* send function */
+static int tcp_send(tcp_descriptor* desc, char* ptr, int len);
+static int tcp_sendv(tcp_descriptor* desc, ErlIOVec* ev);
+static int tcp_recv(tcp_descriptor* desc, int request_len);
+static int tcp_deliver(tcp_descriptor* desc, int len);
+
+static int tcp_inet_output(tcp_descriptor* desc, HANDLE event);
+static int tcp_inet_input(tcp_descriptor* desc, HANDLE event);
+
+typedef struct {
+ inet_descriptor inet; /* common data structure (DON'T MOVE) */
+ int read_packets; /* Number of packets to read per invocation */
+} udp_descriptor;
+
+
+static int packet_inet_input(udp_descriptor* udesc, HANDLE event);
+static int packet_inet_output(udp_descriptor* udesc, HANDLE event);
+
+/* convert descriptor poiner to inet_descriptor pointer */
+#define INETP(d) (&(d)->inet)
+
+static int async_ref = 0; /* async reference id generator */
+#define NEW_ASYNC_ID() ((async_ref++) & 0xffff)
+
+
+static ErlDrvTermData am_ok;
+static ErlDrvTermData am_tcp;
+static ErlDrvTermData am_udp;
+static ErlDrvTermData am_error;
+static ErlDrvTermData am_inet_async;
+static ErlDrvTermData am_inet_reply;
+static ErlDrvTermData am_timeout;
+static ErlDrvTermData am_closed;
+static ErlDrvTermData am_tcp_closed;
+static ErlDrvTermData am_tcp_error;
+static ErlDrvTermData am_udp_error;
+static ErlDrvTermData am_empty_out_q;
+static ErlDrvTermData am_ssl_tls;
+#ifdef HAVE_SCTP
+static ErlDrvTermData am_sctp;
+static ErlDrvTermData am_sctp_error;
+static ErlDrvTermData am_true;
+static ErlDrvTermData am_false;
+static ErlDrvTermData am_buffer;
+static ErlDrvTermData am_mode;
+static ErlDrvTermData am_list;
+static ErlDrvTermData am_binary;
+static ErlDrvTermData am_active;
+static ErlDrvTermData am_once;
+static ErlDrvTermData am_buffer;
+static ErlDrvTermData am_linger;
+static ErlDrvTermData am_recbuf;
+static ErlDrvTermData am_sndbuf;
+static ErlDrvTermData am_reuseaddr;
+static ErlDrvTermData am_dontroute;
+static ErlDrvTermData am_priority;
+static ErlDrvTermData am_tos;
+#endif
+
+/* speical errors for bad ports and sequences */
+#define EXBADPORT "exbadport"
+#define EXBADSEQ "exbadseq"
+
+
+static int inet_init(void);
+static int ctl_reply(int, char*, int, char**, int);
+
+struct erl_drv_entry inet_driver_entry =
+{
+ inet_init, /* inet_init will add TCP, UDP and SCTP drivers */
+ NULL, /* start */
+ NULL, /* stop */
+ NULL, /* output */
+ NULL, /* ready_input */
+ NULL, /* ready_output */
+ "inet"
+};
+
+/* XXX: is this a driver interface function ??? */
+extern void erl_exit(int n, char*, _DOTS_);
+
+/*
+ * Malloc wrapper,
+ * we would like to change the behaviour for different
+ * systems here.
+ */
+
+#ifdef FATAL_MALLOC
+
+static void *alloc_wrapper(size_t size){
+ void *ret = driver_alloc(size);
+ if(ret == NULL)
+ erl_exit(1,"Out of virtual memory in malloc (%s)", __FILE__);
+ return ret;
+}
+#define ALLOC(X) alloc_wrapper(X)
+
+static void *realloc_wrapper(void *current, size_t size){
+ void *ret = driver_realloc(current,size);
+ if(ret == NULL)
+ erl_exit(1,"Out of virtual memory in realloc (%s)", __FILE__);
+ return ret;
+}
+#define REALLOC(X,Y) realloc_wrapper(X,Y)
+#define FREE(P) driver_free((P))
+#else /* FATAL_MALLOC */
+
+#define ALLOC(X) driver_alloc((X))
+#define REALLOC(X,Y) driver_realloc((X), (Y))
+#define FREE(P) driver_free((P))
+
+#endif /* FATAL_MALLOC */
+
+#define INIT_ATOM(NAME) am_ ## NAME = driver_mk_atom(#NAME)
+
+#define LOAD_ATOM_CNT 2
+#define LOAD_ATOM(vec, i, atom) \
+ (((vec)[(i)] = ERL_DRV_ATOM), \
+ ((vec)[(i)+1] = (atom)), \
+ ((i)+LOAD_ATOM_CNT))
+
+#define LOAD_INT_CNT 2
+#define LOAD_INT(vec, i, val) \
+ (((vec)[(i)] = ERL_DRV_INT), \
+ ((vec)[(i)+1] = (ErlDrvTermData)(val)), \
+ ((i)+LOAD_INT_CNT))
+
+#define LOAD_UINT_CNT 2
+#define LOAD_UINT(vec, i, val) \
+ (((vec)[(i)] = ERL_DRV_UINT), \
+ ((vec)[(i)+1] = (ErlDrvTermData)(val)), \
+ ((i)+LOAD_UINT_CNT))
+
+#define LOAD_PORT_CNT 2
+#define LOAD_PORT(vec, i, port) \
+ (((vec)[(i)] = ERL_DRV_PORT), \
+ ((vec)[(i)+1] = (port)), \
+ ((i)+LOAD_PORT_CNT))
+
+#define LOAD_PID_CNT 2
+#define LOAD_PID(vec, i, pid) \
+ (((vec)[(i)] = ERL_DRV_PID), \
+ ((vec)[(i)+1] = (pid)), \
+ ((i)+LOAD_PID_CNT))
+
+#define LOAD_BINARY_CNT 4
+#define LOAD_BINARY(vec, i, bin, offs, len) \
+ (((vec)[(i)] = ERL_DRV_BINARY), \
+ ((vec)[(i)+1] = (ErlDrvTermData)(bin)), \
+ ((vec)[(i)+2] = (len)), \
+ ((vec)[(i)+3] = (offs)), \
+ ((i)+LOAD_BINARY_CNT))
+
+#define LOAD_BUF2BINARY_CNT 3
+#define LOAD_BUF2BINARY(vec, i, buf, len) \
+ (((vec)[(i)] = ERL_DRV_BUF2BINARY), \
+ ((vec)[(i)+1] = (ErlDrvTermData)(buf)), \
+ ((vec)[(i)+2] = (len)), \
+ ((i)+LOAD_BUF2BINARY_CNT))
+
+#define LOAD_STRING_CNT 3
+#define LOAD_STRING(vec, i, str, len) \
+ (((vec)[(i)] = ERL_DRV_STRING), \
+ ((vec)[(i)+1] = (ErlDrvTermData)(str)), \
+ ((vec)[(i)+2] = (len)), \
+ ((i)+LOAD_STRING_CNT))
+
+#define LOAD_STRING_CONS_CNT 3
+#define LOAD_STRING_CONS(vec, i, str, len) \
+ (((vec)[(i)] = ERL_DRV_STRING_CONS), \
+ ((vec)[(i)+1] = (ErlDrvTermData)(str)), \
+ ((vec)[(i)+2] = (len)), \
+ ((i)+LOAD_STRING_CONS_CNT))
+
+#define LOAD_TUPLE_CNT 2
+#define LOAD_TUPLE(vec, i, size) \
+ (((vec)[(i)] = ERL_DRV_TUPLE), \
+ ((vec)[(i)+1] = (size)), \
+ ((i)+LOAD_TUPLE_CNT))
+
+#define LOAD_NIL_CNT 1
+#define LOAD_NIL(vec, i) \
+ (((vec)[(i)] = ERL_DRV_NIL), \
+ ((i)+LOAD_NIL_CNT))
+
+#define LOAD_LIST_CNT 2
+#define LOAD_LIST(vec, i, size) \
+ (((vec)[(i)] = ERL_DRV_LIST), \
+ ((vec)[(i)+1] = (size)), \
+ ((i)+LOAD_LIST_CNT))
+
+
+#ifdef HAVE_SCTP
+ /* "IS_SCTP": tells the difference between a UDP and an SCTP socket: */
+# define IS_SCTP(desc)((desc)->sprotocol==IPPROTO_SCTP)
+
+ /* For AssocID, 4 bytes should be enough -- checked by "init": */
+# define GET_ASSOC_ID get_int32
+# define ASSOC_ID_LEN 4
+# define LOAD_ASSOC_ID LOAD_INT
+# define LOAD_ASSOC_ID_CNT LOAD_INT_CNT
+# define SCTP_ANC_BUFF_SIZE INET_DEF_BUFFER/2 /* XXX: not very good... */
+#endif
+
+static int load_ip_port(ErlDrvTermData* spec, int i, char* buf)
+{
+ spec[i++] = ERL_DRV_INT;
+ spec[i++] = (ErlDrvTermData) get_int16(buf);
+ return i;
+}
+
+static int load_ip_address(ErlDrvTermData* spec, int i, int family, char* buf)
+{
+ int n;
+ if (family == AF_INET) {
+ for (n = 0; n < 4; n++) {
+ spec[i++] = ERL_DRV_INT;
+ spec[i++] = (ErlDrvTermData) ((unsigned char)buf[n]);
+ }
+ spec[i++] = ERL_DRV_TUPLE;
+ spec[i++] = 4;
+ }
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if (family == AF_INET6) {
+ for (n = 0; n < 16; n += 2) {
+ spec[i++] = ERL_DRV_INT;
+ spec[i++] = (ErlDrvTermData) get_int16(buf+n);
+ }
+ spec[i++] = ERL_DRV_TUPLE;
+ spec[i++] = 8;
+ }
+#endif
+ else {
+ spec[i++] = ERL_DRV_TUPLE;
+ spec[i++] = 0;
+ }
+ return i;
+}
+
+
+#ifdef HAVE_SCTP
+/* For SCTP, we often need to return {IP, Port} tuples: */
+static int inet_get_address
+ (int family, char* dst, inet_address* src, unsigned int* len);
+
+#define LOAD_IP_AND_PORT_CNT \
+ (8*LOAD_INT_CNT + LOAD_TUPLE_CNT + LOAD_INT_CNT + LOAD_TUPLE_CNT)
+
+static int load_ip_and_port
+ (ErlDrvTermData* spec, int i, inet_descriptor* desc,
+ struct sockaddr_storage* addr)
+{
+ /* The size of the buffer used to stringify the addr is the same as
+ that of "sockaddr_storage" itself: only their layout is different:
+ */
+ unsigned int len = sizeof(struct sockaddr_storage);
+ unsigned int alen = len;
+ char abuf [len];
+ int res =
+ inet_get_address(desc->sfamily, abuf, (inet_address*) addr, &alen);
+ ASSERT(res==0);
+ res = 0;
+ /* Now "abuf" contains: Family(1b), Port(2b), IP(4|16b) */
+
+ /* NB: the following functions are safe to use, as they create tuples
+ of copied Ints on the "spec", and do not install any String pts --
+ a ptr to "abuf" would be dangling upon exiting this function: */
+ i = load_ip_address(spec, i, desc->sfamily, abuf+3);
+ i = load_ip_port (spec, i, abuf+1);
+ i = LOAD_TUPLE (spec, i, 2);
+ return i;
+}
+
+/* Loading Boolean flags as Atoms: */
+#define LOAD_BOOL_CNT LOAD_ATOM_CNT
+#define LOAD_BOOL(spec, i, flag) \
+ LOAD_ATOM((spec), (i), (flag) ? am_true : am_false);
+#endif /* HAVE_SCTP */
+
+/*
+** Binary Buffer Managment
+** We keep a stack of usable buffers
+*/
+#define BUFFER_STACK_SIZE 16
+
+static erts_smp_spinlock_t inet_buffer_stack_lock;
+static ErlDrvBinary* buffer_stack[BUFFER_STACK_SIZE];
+static int buffer_stack_pos = 0;
+
+
+/*
+ * XXX
+ * The erts_smp_spin_* functions should not be used by drivers (but this
+ * driver is special). Replace when driver locking api has been implemented.
+ * /rickard
+ */
+#define BUFSTK_LOCK erts_smp_spin_lock(&inet_buffer_stack_lock);
+#define BUFSTK_UNLOCK erts_smp_spin_unlock(&inet_buffer_stack_lock);
+
+#ifdef DEBUG
+static int tot_buf_allocated = 0; /* memory in use for i_buf */
+static int tot_buf_stacked = 0; /* memory on stack */
+static int max_buf_allocated = 0; /* max allocated */
+
+#define COUNT_BUF_ALLOC(sz) do { \
+ BUFSTK_LOCK; \
+ tot_buf_allocated += (sz); \
+ if (tot_buf_allocated > max_buf_allocated) \
+ max_buf_allocated = tot_buf_allocated; \
+ BUFSTK_UNLOCK; \
+} while(0)
+
+#define COUNT_BUF_FREE(sz) do { \
+ BUFSTK_LOCK; \
+ tot_buf_allocated -= (sz); \
+ BUFSTK_UNLOCK; \
+ } while(0)
+
+#define COUNT_BUF_STACK(sz) do { \
+ BUFSTK_LOCK; \
+ tot_buf_stacked += (sz); \
+ BUFSTK_UNLOCK; \
+ } while(0)
+
+#else
+
+#define COUNT_BUF_ALLOC(sz)
+#define COUNT_BUF_FREE(sz)
+#define COUNT_BUF_STACK(sz)
+
+#endif
+
+static ErlDrvBinary* alloc_buffer(long minsz)
+{
+ ErlDrvBinary* buf = NULL;
+
+ BUFSTK_LOCK;
+
+ DEBUGF(("alloc_buffer: sz = %ld, tot = %d, max = %d\r\n",
+ minsz, tot_buf_allocated, max_buf_allocated));
+
+ if (buffer_stack_pos > 0) {
+ int origsz;
+
+ buf = buffer_stack[--buffer_stack_pos];
+ origsz = buf->orig_size;
+ BUFSTK_UNLOCK;
+ COUNT_BUF_STACK(-origsz);
+ if (origsz < minsz) {
+ if ((buf = driver_realloc_binary(buf, minsz)) == NULL)
+ return NULL;
+ COUNT_BUF_ALLOC(buf->orig_size - origsz);
+ }
+ }
+ else {
+ BUFSTK_UNLOCK;
+ if ((buf = driver_alloc_binary(minsz)) == NULL)
+ return NULL;
+ COUNT_BUF_ALLOC(buf->orig_size);
+ }
+ return buf;
+}
+
+/*
+** Max buffer memory "cached" BUFFER_STACK_SIZE * INET_MAX_BUFFER
+** (16 * 64k ~ 1M)
+*/
+/*#define CHECK_DOUBLE_RELEASE 1*/
+static void release_buffer(ErlDrvBinary* buf)
+{
+ DEBUGF(("release_buffer: %ld\r\n", (buf==NULL) ? 0 : buf->orig_size));
+ if (buf == NULL)
+ return;
+ BUFSTK_LOCK;
+ if ((buf->orig_size > INET_MAX_BUFFER) ||
+ (buffer_stack_pos >= BUFFER_STACK_SIZE)) {
+ BUFSTK_UNLOCK;
+ COUNT_BUF_FREE(buf->orig_size);
+ driver_free_binary(buf);
+ }
+ else {
+#ifdef CHECK_DOUBLE_RELEASE
+#ifdef __GNUC__
+#warning CHECK_DOUBLE_RELEASE is enabled, this is a custom build emulator
+#endif
+ int i;
+ for (i = 0; i < buffer_stack_pos; ++i) {
+ if (buffer_stack[i] == buf) {
+ erl_exit(1,"Multiple buffer release in inet_drv, this is a "
+ "bug, save the core and send it to "
+ }
+ }
+#endif
+ buffer_stack[buffer_stack_pos++] = buf;
+ BUFSTK_UNLOCK;
+ COUNT_BUF_STACK(buf->orig_size);
+ }
+}
+
+static ErlDrvBinary* realloc_buffer(ErlDrvBinary* buf, long newsz)
+{
+ ErlDrvBinary* bin;
+#ifdef DEBUG
+ long orig_size = buf->orig_size;
+#endif
+
+ if ((bin = driver_realloc_binary(buf,newsz)) != NULL) {
+ COUNT_BUF_ALLOC(newsz - orig_size);
+ ;
+ }
+ return bin;
+}
+
+/* use a TRICK, access the refc field to see if any one else has
+ * a ref to this buffer then call driver_free_binary else
+ * release_buffer instead
+ */
+static void free_buffer(ErlDrvBinary* buf)
+{
+ DEBUGF(("free_buffer: %ld\r\n", (buf==NULL) ? 0 : buf->orig_size));
+
+ if (buf != NULL) {
+ if (driver_binary_get_refc(buf) == 1)
+ release_buffer(buf);
+ else {
+ COUNT_BUF_FREE(buf->orig_size);
+ driver_free_binary(buf);
+ }
+ }
+}
+
+
+#ifdef __WIN32__
+
+static ErlDrvData dummy_start(ErlDrvPort port, char* command)
+{
+ return (ErlDrvData)port;
+}
+
+static int dummy_ctl(ErlDrvData data, unsigned int cmd, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ static char error[] = "no_winsock2";
+
+ driver_failure_atom((ErlDrvPort)data, error);
+ return ctl_reply(INET_REP_ERROR, error, sizeof(error), rbuf, rsize);
+}
+
+static void dummy_command(ErlDrvData data, char* buf, int len)
+{
+}
+
+static struct erl_drv_entry dummy_tcp_driver_entry =
+{
+ NULL, /* init */
+ dummy_start, /* start */
+ NULL, /* stop */
+ dummy_command, /* command */
+ NULL, /* input */
+ NULL, /* output */
+ "tcp_inet", /* name */
+ NULL,
+ NULL,
+ dummy_ctl,
+ NULL,
+ NULL
+};
+
+static struct erl_drv_entry dummy_udp_driver_entry =
+{
+ NULL, /* init */
+ dummy_start, /* start */
+ NULL, /* stop */
+ dummy_command, /* command */
+ NULL, /* input */
+ NULL, /* output */
+ "udp_inet", /* name */
+ NULL,
+ NULL,
+ dummy_ctl,
+ NULL,
+ NULL
+};
+
+#ifdef HAVE_SCTP
+static struct erl_drv_entry dummy_sctp_driver_entry =
+{ /* Though there is no SCTP for Win32 yet... */
+ NULL, /* init */
+ dummy_start, /* start */
+ NULL, /* stop */
+ dummy_command, /* command */
+ NULL, /* input */
+ NULL, /* output */
+ "sctp_inet", /* name */
+ NULL,
+ NULL,
+ dummy_ctl,
+ NULL,
+ NULL
+};
+#endif
+
+#endif
+
+/* general control reply function */
+static int ctl_reply(int rep, char* buf, int len, char** rbuf, int rsize)
+{
+ char* ptr;
+
+ if ((len+1) > rsize) {
+ ptr = ALLOC(len+1);
+ *rbuf = ptr;
+ }
+ else
+ ptr = *rbuf;
+ *ptr++ = rep;
+ memcpy(ptr, buf, len);
+ return len+1;
+}
+
+/* general control error reply function */
+static int ctl_error(int err, char** rbuf, int rsize)
+{
+ char response[256]; /* Response buffer. */
+ char* s;
+ char* t;
+
+ for (s = erl_errno_id(err), t = response; *s; s++, t++)
+ *t = tolower(*s);
+ return ctl_reply(INET_REP_ERROR, response, t-response, rbuf, rsize);
+}
+
+static int ctl_xerror(char* xerr, char** rbuf, int rsize)
+{
+ int n = strlen(xerr);
+ return ctl_reply(INET_REP_ERROR, xerr, n, rbuf, rsize);
+}
+
+
+static ErlDrvTermData error_atom(int err)
+{
+ char errstr[256];
+ char* s;
+ char* t;
+
+ for (s = erl_errno_id(err), t = errstr; *s; s++, t++)
+ *t = tolower(*s);
+ *t = '\0';
+ return driver_mk_atom(errstr);
+}
+
+
+static void enq_old_multi_op(tcp_descriptor *desc, int id, int req,
+ ErlDrvTermData caller, MultiTimerData *timeout,
+ ErlDrvMonitor *monitorp)
+{
+ inet_async_multi_op *opp;
+
+ opp = ALLOC(sizeof(inet_async_multi_op));
+
+ opp->op.id = id;
+ opp->op.caller = caller;
+ opp->op.req = req;
+ opp->op.tmo.mtd = timeout;
+ memcpy(&(opp->op.monitor), monitorp, sizeof(ErlDrvMonitor));
+ opp->next = NULL;
+
+ if (desc->multi_first == NULL) {
+ desc->multi_first = opp;
+ } else {
+ desc->multi_last->next = opp;
+ }
+ desc->multi_last = opp;
+}
+
+static void enq_multi_op(tcp_descriptor *desc, char *buf, int req,
+ ErlDrvTermData caller, MultiTimerData *timeout,
+ ErlDrvMonitor *monitorp)
+{
+ int id = NEW_ASYNC_ID();
+ enq_old_multi_op(desc,id,req,caller,timeout,monitorp);
+ if (buf != NULL)
+ put_int16(id, buf);
+}
+
+static int deq_multi_op(tcp_descriptor *desc, int *id_p, int *req_p,
+ ErlDrvTermData *caller_p, MultiTimerData **timeout_p,
+ ErlDrvMonitor *monitorp)
+{
+ inet_async_multi_op *opp;
+ opp = desc->multi_first;
+ if (!opp) {
+ return -1;
+ }
+ desc->multi_first = opp->next;
+ if (desc->multi_first == NULL) {
+ desc->multi_last = NULL;
+ }
+ *id_p = opp->op.id;
+ *req_p = opp->op.req;
+ *caller_p = opp->op.caller;
+ if (timeout_p != NULL) {
+ *timeout_p = opp->op.tmo.mtd;
+ }
+ if (monitorp != NULL) {
+ memcpy(monitorp,&(opp->op.monitor),sizeof(ErlDrvMonitor));
+ }
+ FREE(opp);
+ return 0;
+}
+
+static int remove_multi_op(tcp_descriptor *desc, int *id_p, int *req_p,
+ ErlDrvTermData caller, MultiTimerData **timeout_p,
+ ErlDrvMonitor *monitorp)
+{
+ inet_async_multi_op *opp, *slap;
+ for (opp = desc->multi_first, slap = NULL;
+ opp != NULL && opp->op.caller != caller;
+ slap = opp, opp = opp->next)
+ ;
+ if (!opp) {
+ return -1;
+ }
+ if (slap == NULL) {
+ desc->multi_first = opp->next;
+ } else {
+ slap->next = opp->next;
+ }
+ if (desc->multi_last == opp) {
+ desc->multi_last = slap;
+ }
+ *id_p = opp->op.id;
+ *req_p = opp->op.req;
+ if (timeout_p != NULL) {
+ *timeout_p = opp->op.tmo.mtd;
+ }
+ if (monitorp != NULL) {
+ memcpy(monitorp,&(opp->op.monitor),sizeof(ErlDrvMonitor));
+ }
+ FREE(opp);
+ return 0;
+}
+
+/* setup a new async id + caller (format async_id into buf) */
+
+static int enq_async_w_tmo(inet_descriptor* desc, char* buf, int req, unsigned timeout,
+ ErlDrvMonitor *monitorp)
+{
+ int id = NEW_ASYNC_ID();
+ inet_async_op* opp;
+
+ if ((opp = desc->oph) == NULL) /* queue empty */
+ opp = desc->oph = desc->opt = desc->op_queue;
+ else if (desc->oph == desc->opt) { /* queue full */
+ DEBUGF(("enq(%ld): queue full\r\n", (long)desc->port));
+ return -1;
+ }
+
+ opp->id = id;
+ opp->caller = driver_caller(desc->port);
+ opp->req = req;
+ opp->tmo.value = timeout;
+ if (monitorp != NULL) {
+ memcpy(&(opp->monitor),monitorp,sizeof(ErlDrvMonitor));
+ }
+
+ DEBUGF(("enq(%ld): %d %ld %d\r\n",
+ (long) desc->port, opp->id, opp->caller, opp->req));
+
+ opp++;
+ if (opp >= desc->op_queue + INET_MAX_ASYNC)
+ desc->oph = desc->op_queue;
+ else
+ desc->oph = opp;
+
+ if (buf != NULL)
+ put_int16(id, buf);
+ return 0;
+}
+
+static int enq_async(inet_descriptor* desc, char* buf, int req)
+{
+ return enq_async_w_tmo(desc,buf,req,INET_INFINITY, NULL);
+}
+
+static int deq_async_w_tmo(inet_descriptor* desc, int* ap, ErlDrvTermData* cp,
+ int* rp, unsigned *tp, ErlDrvMonitor *monitorp)
+{
+ inet_async_op* opp;
+
+ if ((opp = desc->opt) == NULL) { /* queue empty */
+ DEBUGF(("deq(%ld): queue empty\r\n", (long)desc->port));
+ return -1;
+ }
+ *ap = opp->id;
+ *cp = opp->caller;
+ *rp = opp->req;
+ if (tp != NULL) {
+ *tp = opp->tmo.value;
+ }
+ if (monitorp != NULL) {
+ memcpy(monitorp,&(opp->monitor),sizeof(ErlDrvMonitor));
+ }
+
+ DEBUGF(("deq(%ld): %d %ld %d\r\n",
+ (long)desc->port, opp->id, opp->caller, opp->req));
+
+ opp++;
+ if (opp >= desc->op_queue + INET_MAX_ASYNC)
+ desc->opt = desc->op_queue;
+ else
+ desc->opt = opp;
+
+ if (desc->opt == desc->oph)
+ desc->opt = desc->oph = NULL;
+ return 0;
+}
+
+static int deq_async(inet_descriptor* desc, int* ap, ErlDrvTermData* cp, int* rp)
+{
+ return deq_async_w_tmo(desc,ap,cp,rp,NULL,NULL);
+}
+/* send message:
+** {inet_async, Port, Ref, ok}
+*/
+static int
+send_async_ok(ErlDrvPort port, ErlDrvTermData Port, int Ref,
+ ErlDrvTermData recipient)
+{
+ ErlDrvTermData spec[2*LOAD_ATOM_CNT + LOAD_PORT_CNT +
+ LOAD_INT_CNT + LOAD_TUPLE_CNT];
+ int i = 0;
+
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, Port);
+ i = LOAD_INT(spec, i, Ref);
+ i = LOAD_ATOM(spec, i, am_ok);
+ i = LOAD_TUPLE(spec, i, 4);
+
+ ASSERT(i == sizeof(spec)/sizeof(*spec));
+
+ return driver_send_term(port, recipient, spec, i);
+}
+
+/* send message:
+** {inet_async, Port, Ref, {ok,Port2}}
+*/
+static int
+send_async_ok_port(ErlDrvPort port, ErlDrvTermData Port, int Ref,
+ ErlDrvTermData recipient, ErlDrvTermData Port2)
+{
+ ErlDrvTermData spec[2*LOAD_ATOM_CNT + 2*LOAD_PORT_CNT +
+ LOAD_INT_CNT + 2*LOAD_TUPLE_CNT];
+ int i = 0;
+
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, Port);
+ i = LOAD_INT(spec, i, Ref);
+ {
+ i = LOAD_ATOM(spec, i, am_ok);
+ i = LOAD_PORT(spec, i, Port2);
+ i = LOAD_TUPLE(spec, i, 2);
+ }
+ i = LOAD_TUPLE(spec, i, 4);
+
+ ASSERT(i == sizeof(spec)/sizeof(*spec));
+
+ return driver_send_term(port, recipient, spec, i);
+}
+
+/* send message:
+** {inet_async, Port, Ref, {error,Reason}}
+*/
+static int
+send_async_error(ErlDrvPort port, ErlDrvTermData Port, int Ref,
+ ErlDrvTermData recipient, ErlDrvTermData Reason)
+{
+ ErlDrvTermData spec[3*LOAD_ATOM_CNT + LOAD_PORT_CNT +
+ LOAD_INT_CNT + 2*LOAD_TUPLE_CNT];
+ int i = 0;
+
+ i = 0;
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, Port);
+ i = LOAD_INT(spec, i, Ref);
+ {
+ i = LOAD_ATOM(spec, i, am_error);
+ i = LOAD_ATOM(spec, i, Reason);
+ i = LOAD_TUPLE(spec, i, 2);
+ }
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i == sizeof(spec)/sizeof(*spec));
+ DEBUGF(("send_async_error %ld %ld\r\n", recipient, Reason));
+ return driver_send_term(port, recipient, spec, i);
+}
+
+
+static int async_ok(inet_descriptor* desc)
+{
+ int req;
+ int aid;
+ ErlDrvTermData caller;
+
+ if (deq_async(desc, &aid, &caller, &req) < 0)
+ return -1;
+ return send_async_ok(desc->port, desc->dport, aid, caller);
+}
+
+static int async_ok_port(inet_descriptor* desc, ErlDrvTermData Port2)
+{
+ int req;
+ int aid;
+ ErlDrvTermData caller;
+
+ if (deq_async(desc, &aid, &caller, &req) < 0)
+ return -1;
+ return send_async_ok_port(desc->port, desc->dport, aid, caller, Port2);
+}
+
+static int async_error_am(inet_descriptor* desc, ErlDrvTermData reason)
+{
+ int req;
+ int aid;
+ ErlDrvTermData caller;
+
+ if (deq_async(desc, &aid, &caller, &req) < 0)
+ return -1;
+ return send_async_error(desc->port, desc->dport, aid, caller,
+ reason);
+}
+
+/* dequeue all operations */
+static int async_error_am_all(inet_descriptor* desc, ErlDrvTermData reason)
+{
+ int req;
+ int aid;
+ ErlDrvTermData caller;
+
+ while (deq_async(desc, &aid, &caller, &req) == 0) {
+ send_async_error(desc->port, desc->dport, aid, caller,
+ reason);
+ }
+ return 0;
+}
+
+
+static int async_error(inet_descriptor* desc, int err)
+{
+ return async_error_am(desc, error_atom(err));
+}
+
+/* send:
+** {inet_reply, S, ok}
+*/
+
+static int inet_reply_ok(inet_descriptor* desc)
+{
+ ErlDrvTermData spec[2*LOAD_ATOM_CNT + LOAD_PORT_CNT + LOAD_TUPLE_CNT];
+ ErlDrvTermData caller = desc->caller;
+ int i = 0;
+
+ i = LOAD_ATOM(spec, i, am_inet_reply);
+ i = LOAD_PORT(spec, i, desc->dport);
+ i = LOAD_ATOM(spec, i, am_ok);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i == sizeof(spec)/sizeof(*spec));
+
+ desc->caller = 0;
+ return driver_send_term(desc->port, caller, spec, i);
+}
+
+/* send:
+** {inet_reply, S, {error, Reason}}
+*/
+static int inet_reply_error_am(inet_descriptor* desc, ErlDrvTermData reason)
+{
+ ErlDrvTermData spec[3*LOAD_ATOM_CNT + LOAD_PORT_CNT + 2*LOAD_TUPLE_CNT];
+ ErlDrvTermData caller = desc->caller;
+ int i = 0;
+
+ i = LOAD_ATOM(spec, i, am_inet_reply);
+ i = LOAD_PORT(spec, i, desc->dport);
+ i = LOAD_ATOM(spec, i, am_error);
+ i = LOAD_ATOM(spec, i, reason);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i == sizeof(spec)/sizeof(*spec));
+ desc->caller = 0;
+
+ DEBUGF(("inet_reply_error_am %ld %ld\r\n", caller, reason));
+ return driver_send_term(desc->port, caller, spec, i);
+}
+
+/* send:
+** {inet_reply, S, {error, Reason}}
+*/
+static int inet_reply_error(inet_descriptor* desc, int err)
+{
+ return inet_reply_error_am(desc, error_atom(err));
+}
+
+/*
+** Deliver port data from buffer
+*/
+static int inet_port_data(inet_descriptor* desc, const char* buf, int len)
+{
+ unsigned int hsz = desc->hsz;
+
+ DEBUGF(("inet_port_data(%ld): len = %d\r\n", (long)desc->port, len));
+
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len))
+ return driver_output2(desc->port, (char*)buf, len, NULL, 0);
+ else if (hsz > 0)
+ return driver_output2(desc->port, (char*)buf, hsz, (char*)buf+hsz, len-hsz);
+ else
+ return driver_output(desc->port, (char*)buf, len);
+}
+
+/*
+** Deliver port data from binary (for an active mode socket)
+*/
+static int
+inet_port_binary_data(inet_descriptor* desc, ErlDrvBinary* bin, int offs, int len)
+{
+ unsigned int hsz = desc->hsz;
+
+ DEBUGF(("inet_port_binary_data(%ld): offs=%d, len = %d\r\n",
+ (long)desc->port, offs, len));
+
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len))
+ return driver_output2(desc->port, bin->orig_bytes+offs, len, NULL, 0);
+ else
+ return driver_output_binary(desc->port, bin->orig_bytes+offs, hsz,
+ bin, offs+hsz, len-hsz);
+}
+
+static ErlDrvTermData am_http_eoh;
+static ErlDrvTermData am_http_header;
+static ErlDrvTermData am_http_request;
+static ErlDrvTermData am_http_response;
+static ErlDrvTermData am_http_error;
+static ErlDrvTermData am_abs_path;
+static ErlDrvTermData am_absoluteURI;
+static ErlDrvTermData am_star;
+static ErlDrvTermData am_undefined;
+static ErlDrvTermData am_http;
+static ErlDrvTermData am_https;
+static ErlDrvTermData am_scheme;
+
+static int http_load_string(tcp_descriptor* desc, ErlDrvTermData* spec, int i,
+ const char* str, int len)
+{
+ if (desc->inet.htype >= TCP_PB_HTTP_BIN) {
+ ASSERT(desc->inet.htype == TCP_PB_HTTP_BIN ||
+ desc->inet.htype == TCP_PB_HTTPH_BIN);
+ i = LOAD_BUF2BINARY(spec, i, str, len);
+ } else {
+ i = LOAD_STRING(spec, i, str, len);
+ }
+ return i;
+}
+
+static int http_response_inetdrv(void *arg, int major, int minor,
+ int status, const char* phrase, int phrase_len)
+{
+ tcp_descriptor* desc = (tcp_descriptor*) arg;
+ int i = 0;
+ ErlDrvTermData spec[27];
+ ErlDrvTermData caller;
+
+ if (desc->inet.active == INET_PASSIVE) {
+ /* {inet_async,S,Ref,{ok,{http_response,Version,Status,Phrase}}} */
+ int req;
+ int aid;
+
+ if (deq_async(INETP(desc), &aid, &caller, &req) < 0)
+ return -1;
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, aid);
+ i = LOAD_ATOM(spec, i, am_ok);
+ }
+ else {
+ /* {http, S, {http_response,Version,Status,Phrase}} */
+ i = LOAD_ATOM(spec, i, am_http);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ }
+ i = LOAD_ATOM(spec, i, am_http_response);
+ i = LOAD_INT(spec, i, major);
+ i = LOAD_INT(spec, i, minor);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_INT(spec, i, status);
+ i = http_load_string(desc, spec, i, phrase, phrase_len);
+ i = LOAD_TUPLE(spec, i, 4);
+
+ if (desc->inet.active == INET_PASSIVE) {
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i<=27);
+ return driver_send_term(desc->inet.port, caller, spec, i);
+ }
+ else {
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i<=27);
+ return driver_output_term(desc->inet.port, spec, i);
+ }
+}
+
+static int http_load_uri(tcp_descriptor* desc, ErlDrvTermData* spec, int i,
+ const PacketHttpURI* uri)
+{
+ ErlDrvTermData scheme;
+
+ switch (uri->type) {
+ case URI_STAR:
+ i = LOAD_ATOM(spec, i, am_star);
+ break;
+ case URI_ABS_PATH:
+ i = LOAD_ATOM(spec, i, am_abs_path);
+ i = http_load_string(desc, spec, i, uri->s1_ptr, uri->s1_len);
+ i = LOAD_TUPLE(spec, i, 2);
+ break;
+ case URI_HTTP:
+ scheme = am_http;
+ goto http_common;
+ case URI_HTTPS:
+ scheme = am_https;
+ http_common:
+ i = LOAD_ATOM(spec, i, am_absoluteURI);
+ i = LOAD_ATOM(spec, i, scheme);
+ i = http_load_string(desc, spec, i, uri->s1_ptr, uri->s1_len);
+ if (uri->port == 0) {
+ i = LOAD_ATOM(spec, i, am_undefined);
+ } else {
+ i = LOAD_INT(spec, i, uri->port);
+ }
+ i = http_load_string(desc, spec, i, uri->s2_ptr, uri->s2_len);
+ i = LOAD_TUPLE(spec, i, 5);
+ break;
+
+ case URI_STRING:
+ i = http_load_string(desc, spec, i, uri->s1_ptr, uri->s1_len);
+ break;
+ case URI_SCHEME:
+ i = LOAD_ATOM(spec, i, am_scheme);
+ i = http_load_string(desc, spec, i, uri->s1_ptr, uri->s1_len);
+ i = http_load_string(desc, spec, i, uri->s2_ptr, uri->s2_len);
+ i = LOAD_TUPLE(spec, i, 3);
+ }
+ return i;
+}
+
+
+static int
+http_request_inetdrv(void* arg, const http_atom_t* meth, const char* meth_ptr,
+ int meth_len, const PacketHttpURI* uri,
+ int major, int minor)
+{
+ tcp_descriptor* desc = (tcp_descriptor*) arg;
+ int i = 0;
+ ErlDrvTermData spec[43];
+ ErlDrvTermData caller;
+
+ if (desc->inet.active == INET_PASSIVE) {
+ /* {inet_async, S, Ref, {ok,{http_request,Meth,Uri,Version}}} */
+ int req;
+ int aid;
+
+ if (deq_async(INETP(desc), &aid, &caller, &req) < 0)
+ return -1;
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, aid);
+ i = LOAD_ATOM(spec, i, am_ok);
+ }
+ else {
+ /* {http, S, {http_request,Meth,Uri,Version}}} */
+ i = LOAD_ATOM(spec, i, am_http);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ }
+
+ i = LOAD_ATOM(spec, i, am_http_request);
+ if (meth != NULL)
+ i = LOAD_ATOM(spec, i, meth->atom);
+ else
+ i = http_load_string(desc, spec, i, meth_ptr, meth_len);
+ i = http_load_uri(desc, spec, i, uri);
+ i = LOAD_INT(spec, i, major);
+ i = LOAD_INT(spec, i, minor);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+
+ if (desc->inet.active == INET_PASSIVE) {
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i <= 43);
+ return driver_send_term(desc->inet.port, caller, spec, i);
+ }
+ else {
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 43);
+ return driver_output_term(desc->inet.port, spec, i);
+ }
+}
+
+static int
+http_header_inetdrv(void* arg, const http_atom_t* name, const char* name_ptr,
+ int name_len, const char* value_ptr, int value_len)
+{
+ tcp_descriptor* desc = (tcp_descriptor*) arg;
+ int i = 0;
+ ErlDrvTermData spec[26];
+ ErlDrvTermData caller;
+
+ if (desc->inet.active == INET_PASSIVE) {
+ /* {inet_async,S,Ref,{ok,{http_header,Bit,Name,IValue,Value}} */
+ int req;
+ int aid;
+
+
+ if (deq_async(INETP(desc), &aid, &caller, &req) < 0)
+ return -1;
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, aid);
+ i = LOAD_ATOM(spec, i, am_ok);
+ }
+ else {
+ /* {http, S, {http_header,Bit,Name,IValue,Value}} */
+ i = LOAD_ATOM(spec, i, am_http);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ }
+
+ i = LOAD_ATOM(spec, i, am_http_header);
+ if (name != NULL) {
+ i = LOAD_INT(spec, i, name->index+1);
+ i = LOAD_ATOM(spec, i, name->atom);
+ }
+ else {
+ i = LOAD_INT(spec, i, 0);
+ i = http_load_string(desc, spec, i, name_ptr, name_len);
+ }
+ i = LOAD_ATOM(spec, i, am_undefined);
+ i = http_load_string(desc, spec, i, value_ptr, value_len);
+ i = LOAD_TUPLE(spec, i, 5);
+
+ if (desc->inet.active == INET_PASSIVE) {
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i <= 26);
+ return driver_send_term(desc->inet.port, caller, spec, i);
+ }
+ else {
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 26);
+ return driver_output_term(desc->inet.port, spec, i);
+ }
+}
+
+static int http_eoh_inetdrv(void* arg)
+{
+ tcp_descriptor* desc = (tcp_descriptor*) arg;
+ int i = 0;
+ ErlDrvTermData spec[14];
+
+ if (desc->inet.active == INET_PASSIVE) {
+ /* {inet_async,S,Ref,{ok,http_eoh}} */
+ int req;
+ int aid;
+ ErlDrvTermData caller;
+
+ if (deq_async(INETP(desc), &aid, &caller, &req) < 0)
+ return -1;
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, aid);
+ i = LOAD_ATOM(spec, i, am_ok);
+ i = LOAD_ATOM(spec, i, am_http_eoh);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i <= 14);
+ return driver_send_term(desc->inet.port, caller, spec, i);
+ }
+ else {
+ /* {http, S, http_eoh} */
+ i = LOAD_ATOM(spec, i, am_http);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_ATOM(spec, i, am_http_eoh);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 14);
+ return driver_output_term(desc->inet.port, spec, i);
+ }
+}
+
+static int http_error_inetdrv(void* arg, const char* buf, int len)
+{
+ tcp_descriptor* desc = (tcp_descriptor*) arg;
+ int i = 0;
+ ErlDrvTermData spec[19];
+
+ if (desc->inet.active == INET_PASSIVE) {
+ /* {inet_async,S,Ref,{error,{http_error,Line}}} */
+ int req;
+ int aid;
+ ErlDrvTermData caller;
+
+ if (deq_async(INETP(desc), &aid, &caller, &req) < 0)
+ return -1;
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, aid);
+ i = LOAD_ATOM(spec, i, am_error);
+ i = LOAD_ATOM(spec, i, am_http_error);
+ i = http_load_string(desc, spec, i, buf, len);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i <= 19);
+ return driver_send_term(desc->inet.port, caller, spec, i);
+ }
+ else {
+ /* {http, S, {http_error,Line} */
+ i = LOAD_ATOM(spec, i, am_http);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_ATOM(spec, i, am_http_error);
+ i = http_load_string(desc, spec, i, buf, len);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 19);
+ return driver_output_term(desc->inet.port, spec, i);
+ }
+}
+
+
+static
+int ssl_tls_inetdrv(void* arg, unsigned type, unsigned major, unsigned minor,
+ const char* buf, int len, const char* prefix, int plen)
+{
+ tcp_descriptor* desc = (tcp_descriptor*) arg;
+ int i = 0;
+ ErlDrvTermData spec[28];
+ ErlDrvTermData caller;
+ ErlDrvBinary* bin;
+ int ret;
+
+ if ((bin = driver_alloc_binary(plen+len)) == NULL)
+ return async_error(&desc->inet, ENOMEM);
+ memcpy(bin->orig_bytes+plen, buf, len);
+ if (plen) {
+ memcpy(bin->orig_bytes, prefix, plen);
+ len += plen;
+ }
+
+ if (desc->inet.active == INET_PASSIVE) {
+ /* {inet_async,S,Ref,{ok,{ssl_tls,...}}} */
+ int req;
+ int aid;
+
+ if (deq_async(INETP(desc), &aid, &caller, &req) < 0) {
+ ret = -1;
+ goto done;
+ }
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, aid);
+ i = LOAD_ATOM(spec, i, am_ok);
+ }
+
+ /* {ssl_tls,S,ContentType,{Major,Minor},Bin} */
+ i = LOAD_ATOM(spec, i, am_ssl_tls);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_INT(spec, i, type);
+ i = LOAD_INT(spec, i, major);
+ i = LOAD_INT(spec, i, minor);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_BINARY(spec, i, bin, 0, len);
+ i = LOAD_TUPLE(spec, i, 5);
+
+ if (desc->inet.active == INET_PASSIVE) {
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i <= 28);
+ ret = driver_send_term(desc->inet.port, caller, spec, i);
+ }
+ else {
+ ASSERT(i <= 28);
+ ret = driver_output_term(desc->inet.port, spec, i);
+ }
+done:
+ driver_free_binary(bin);
+ return ret;
+}
+
+
+static PacketCallbacks packet_callbacks =
+{
+ http_response_inetdrv,
+ http_request_inetdrv,
+ http_eoh_inetdrv,
+ http_header_inetdrv,
+ http_error_inetdrv,
+ ssl_tls_inetdrv
+};
+
+
+/*
+** passive mode reply:
+** {inet_async, S, Ref, {ok,[H1,...Hsz | Data]}}
+** NB: this is for TCP only;
+** UDP and SCTP use inet_async_binary_data .
+*/
+static int inet_async_data(inet_descriptor* desc, const char* buf, int len)
+{
+ unsigned int hsz = desc->hsz;
+ ErlDrvTermData spec[20];
+ ErlDrvTermData caller;
+ int req;
+ int aid;
+ int i = 0;
+
+ DEBUGF(("inet_async_data(%ld): len = %d\r\n", (long)desc->port, len));
+
+ if (deq_async(desc, &aid, &caller, &req) < 0)
+ return -1;
+
+ i = LOAD_ATOM(spec, i, am_inet_async);
+ i = LOAD_PORT(spec, i, desc->dport);
+ i = LOAD_INT(spec, i, aid);
+
+ i = LOAD_ATOM(spec, i, am_ok);
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len)) {
+ i = LOAD_STRING(spec, i, buf, len); /* => [H1,H2,...Hn] */
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i == 15);
+ desc->caller = 0;
+ return driver_send_term(desc->port, caller, spec, i);
+ }
+ else {
+ /* INET_MODE_BINARY => [H1,H2,...HSz | Binary] */
+ int sz = len - hsz;
+ int code;
+
+ i = LOAD_BUF2BINARY(spec, i, buf+hsz, sz);
+ if (hsz > 0)
+ i = LOAD_STRING_CONS(spec, i, buf, hsz);
+ i = LOAD_TUPLE(spec, i, 2);
+ i = LOAD_TUPLE(spec, i, 4);
+ ASSERT(i <= 20);
+ desc->caller = 0;
+ code = driver_send_term(desc->port, caller, spec, i);
+ return code;
+ }
+}
+
+#ifdef HAVE_SCTP
+/*
+** SCTP-related atoms:
+*/
+static ErlDrvTermData am_sctp_rtoinfo, /* Option names */
+ am_sctp_associnfo, am_sctp_initmsg,
+ am_sctp_autoclose, am_sctp_nodelay,
+ am_sctp_disable_fragments, am_sctp_i_want_mapped_v4_addr,
+ am_sctp_maxseg, am_sctp_set_peer_primary_addr,
+ am_sctp_primary_addr, am_sctp_adaptation_layer,
+ am_sctp_peer_addr_params, am_sctp_default_send_param,
+ am_sctp_events, am_sctp_delayed_ack_time,
+ am_sctp_status, am_sctp_get_peer_addr_info,
+
+ /* Record names */
+ am_sctp_sndrcvinfo, am_sctp_assoc_change,
+ am_sctp_paddr_change, am_sctp_remote_error,
+ am_sctp_send_failed, am_sctp_shutdown_event,
+ am_sctp_adaptation_event, am_sctp_pdapi_event,
+ am_sctp_assocparams, am_sctp_prim,
+ am_sctp_setpeerprim, am_sctp_setadaptation,
+ am_sctp_paddrparams, am_sctp_event_subscribe,
+ am_sctp_assoc_value, am_sctp_paddrinfo,
+
+ /* For #sctp_sndrcvinfo{}: */
+ am_unordered, am_addr_over,
+ am_abort, am_eof,
+
+ /* For #sctp_assoc_change{}: */
+ am_comm_up, am_comm_lost,
+ am_restart, am_shutdown_comp,
+ am_cant_assoc,
+
+ /* For #sctp_paddr_change{}: */
+ am_addr_available, am_addr_unreachable,
+ am_addr_removed, am_addr_added,
+ am_addr_made_prim, am_addr_confirmed,
+
+ /* For #sctp_remote_error{}: */
+ am_short_recv, am_wrong_anc_data,
+
+ /* For #sctp_pdap_event{}: */
+ am_partial_delivery_aborted,
+
+ /* For #sctp_paddrparams{}: */
+ am_hb_enable, am_hb_disable,
+ am_hb_demand, am_pmtud_enable,
+ am_pmtud_disable, am_sackdelay_enable,
+ am_sackdelay_disable,
+
+ /* For #sctp_paddrinfo{}: */
+ am_active, am_inactive,
+
+ /* For #sctp_status{}: */
+ am_empty, am_closed,
+ am_cookie_wait, am_cookie_echoed,
+ am_established, am_shutdown_pending,
+ am_shutdown_sent, am_shutdown_received,
+ am_shutdown_ack_sent;
+ /* Not yet implemented in the Linux kernel:
+ ** am_bound, am_listen;
+ */
+
+/*
+** Parsing of "sctp_sndrcvinfo": ancillary data coming with received msgs.
+** This function is mainly used by "sctp_parse_ancillary_data", but also
+** by "sctp_parse_async_event" in case of SCTP_SEND_FAILED:
+*/
+#define SCTP_PARSE_SNDRCVINFO_CNT \
+ (5*LOAD_ATOM_CNT + 5*LOAD_INT_CNT + 2*LOAD_UINT_CNT + \
+ LOAD_NIL_CNT + LOAD_LIST_CNT + LOAD_ASSOC_ID_CNT + LOAD_TUPLE_CNT)
+static int sctp_parse_sndrcvinfo
+ (ErlDrvTermData * spec, int i, struct sctp_sndrcvinfo * sri)
+{
+ int n;
+
+ i = LOAD_ATOM (spec, i, am_sctp_sndrcvinfo);
+ i = LOAD_INT (spec, i, sri->sinfo_stream);
+ i = LOAD_INT (spec, i, sri->sinfo_ssn);
+ /* Now Flags, as a list: */
+ n = 0;
+ if (sri->sinfo_flags & SCTP_UNORDERED)
+ { i = LOAD_ATOM (spec, i, am_unordered); n++; }
+
+ if (sri->sinfo_flags & SCTP_ADDR_OVER)
+ { i = LOAD_ATOM (spec, i, am_addr_over); n++; }
+
+ if (sri->sinfo_flags & SCTP_ABORT)
+ { i = LOAD_ATOM (spec, i, am_abort); n++; }
+
+ if (sri->sinfo_flags & SCTP_EOF)
+ { i = LOAD_ATOM (spec, i, am_eof); n++; }
+
+ /* SCTP_SENDALL is not yet supported by the Linux kernel */
+ i = LOAD_NIL (spec, i);
+ i = LOAD_LIST (spec, i, n+1);
+
+ /* Continue with other top-level fields: */
+ i = LOAD_INT (spec, i, sock_ntohl(sri->sinfo_ppid));
+ i = LOAD_INT (spec, i, sri->sinfo_context);
+ i = LOAD_INT (spec, i, sri->sinfo_timetolive);
+ i = LOAD_UINT (spec, i, sri->sinfo_tsn);
+ i = LOAD_UINT (spec, i, sri->sinfo_cumtsn);
+ i = LOAD_ASSOC_ID (spec, i, sri->sinfo_assoc_id);
+
+ /* Close up the record: */
+ i = LOAD_TUPLE (spec, i, 10);
+ return i;
+}
+
+/*
+** This function skips non-SCTP ancillary data, returns SCTP-specific anc.data
+** (currently "sctp_sndrcvinfo" only) as a list of records:
+*/
+static int sctp_parse_ancillary_data
+ (ErlDrvTermData * spec, int i, struct msghdr * mptr)
+{
+ /* First of all, check for ancillary data: */
+ struct cmsghdr * cmsg, * frst_msg = CMSG_FIRSTHDR(mptr);
+ int s = 0;
+ for (cmsg = frst_msg; cmsg != NULL; cmsg = CMSG_NXTHDR(mptr,cmsg))
+ {
+ struct sctp_sndrcvinfo * sri;
+
+ /* Skip other possible ancillary data, e.g. from IPv6: */
+ if (cmsg->cmsg_level != IPPROTO_SCTP ||
+ cmsg->cmsg_type != SCTP_SNDRCV)
+ continue;
+
+ if (((char*)cmsg + cmsg->cmsg_len) - (char*)frst_msg >
+ mptr->msg_controllen)
+ /* MUST check this in Linux -- the returned "cmsg" may actually
+ go too far! */
+ break;
+
+ /* The ONLY kind of ancillary SCTP data which can occur on receiving
+ is "sctp_sndrcvinfo" (on sending, "sctp_initmsg" can be specified
+ by the user). So parse this type:
+ */
+ sri = (struct sctp_sndrcvinfo*) CMSG_DATA(cmsg);
+ i = sctp_parse_sndrcvinfo (spec, i, sri);
+ s ++;
+ }
+ /* Now make the list of tuples created above. Normally, it will be [] or
+ a singleton list. The list must first be closed with NIL, otherwise
+ traversing it in Erlang would be problematic:
+ */
+ i = LOAD_NIL (spec, i);
+ i = LOAD_LIST(spec, i, s+1);
+ return i;
+}
+
+/*
+** Parsing of ERROR and ABORT SCTP chunks. The function returns a list of error
+** causes (as atoms). The chunks also contain some extended cause info, but it
+** is not very detailed anyway, and of no interest at the user level (it only
+** concerns the protocol implementation), so we omit it:
+*/
+static int sctp_parse_error_chunk
+ (ErlDrvTermData * spec, int i, char * chunk, int chlen)
+{
+ /* The "chunk" itself contains its length, which must not be greater than
+ the "chlen" derived from the over-all msg size:
+ */
+ char *causes, *cause;
+ int coff, /* Cause offset */
+ ccode, /* Cause code */
+ clen, /* cause length */
+ s;
+ int len = sock_ntohs (*((uint16_t*)(chunk+2)));
+ ASSERT(len >= 4 && len <= chlen);
+
+ causes = chunk + 4;
+ coff = 0;
+ len -= 4; /* Total length of the "causes" fields */
+ cause = causes;
+ s = 0;
+
+ while (coff < len)
+ {
+ ccode = sock_ntohs (*((uint16_t*)(cause)));
+ clen = sock_ntohs (*((uint16_t*)(cause + 2)));
+ if (clen <= 0)
+ /* Strange, but must guard against that! */
+ break;
+
+ /* Install the corresp atom for this "ccode": */
+ i = LOAD_INT (spec, i, ccode);
+ cause += clen;
+ coff += clen;
+ s ++;
+ }
+ i = LOAD_NIL (spec, i);
+ i = LOAD_LIST(spec, i, s+1);
+ return i;
+}
+
+/*
+** Parsing of SCTP notification events. NB: they are NOT ancillary data: they
+** are sent IN PLACE OF, not in conjunction with, the normal data:
+*/
+static int sctp_parse_async_event
+ (ErlDrvTermData * spec, int i, int ok_pos,
+ ErlDrvTermData error_atom, inet_descriptor* desc,
+ ErlDrvBinary * bin, int offs, int sz)
+{
+ char* body = bin->orig_bytes + offs;
+ union sctp_notification * nptr = (union sctp_notification *) body;
+
+ switch (nptr->sn_header.sn_type)
+ {
+ case SCTP_ASSOC_CHANGE:
+ { /* {sctp_assoc_change,
+ State : Atom(),
+ Error : Atom(),
+ OutBoundStreams : Int(),
+ InBoundStreams : Int(),
+ AssocID : Int(),
+ // AbortCauses : [Atom()] // NOT YET IMPLEMENTED
+ }
+ */
+ struct sctp_assoc_change* sptr = &(nptr->sn_assoc_change);
+ ASSERT(sptr->sac_length <= sz); /* No buffer overrun */
+
+ i = LOAD_ATOM (spec, i, am_sctp_assoc_change);
+
+ switch (sptr->sac_state)
+ {
+ case SCTP_COMM_UP:
+ i = LOAD_ATOM (spec, i, am_comm_up);
+ break;
+ case SCTP_COMM_LOST:
+ i = LOAD_ATOM (spec, i, am_comm_lost);
+ break;
+ case SCTP_RESTART:
+ i = LOAD_ATOM (spec, i, am_restart);
+ break;
+ case SCTP_SHUTDOWN_COMP:
+ i = LOAD_ATOM (spec, i, am_shutdown_comp);
+ break;
+ case SCTP_CANT_STR_ASSOC:
+ i = LOAD_ATOM (spec, i, am_cant_assoc);
+ break;
+ default:
+ ASSERT(0);
+ }
+ i = LOAD_INT (spec, i, sptr->sac_error);
+ i = LOAD_INT (spec, i, sptr->sac_outbound_streams);
+ i = LOAD_INT (spec, i, sptr->sac_inbound_streams);
+ i = LOAD_INT (spec, i, sptr->sac_assoc_id);
+
+ /* The ABORT chunk may or may not be present at the end, depending
+ on whether there was really an ABORT. In the Linux Kernel SCTP
+ implementation, this chunk is not delivered anyway, so we leave
+ it out. Just close up the tuple:
+ */
+ i = LOAD_TUPLE (spec, i, 6);
+ break;
+ }
+
+ case SCTP_PEER_ADDR_CHANGE:
+ { /* {sctp_paddr_change,
+ AffectedAddr : String(),
+ State : Atom(),
+ Error : Atom(),
+ AssocID : Int()
+ }
+ */
+ struct sctp_paddr_change* sptr = &(nptr->sn_paddr_change);
+ ASSERT(sptr->spc_length <= sz); /* No buffer overrun */
+
+ i = LOAD_ATOM (spec, i, am_sctp_paddr_change);
+ i = load_ip_and_port(spec, i, desc, &sptr->spc_aaddr);
+
+ switch (sptr->spc_state)
+ {
+ case SCTP_ADDR_AVAILABLE:
+ i = LOAD_ATOM (spec, i, am_addr_available);
+ break;
+ case SCTP_ADDR_UNREACHABLE:
+ i = LOAD_ATOM (spec, i, am_addr_unreachable);
+ break;
+ case SCTP_ADDR_REMOVED:
+ i = LOAD_ATOM (spec, i, am_addr_removed);
+ break;
+ case SCTP_ADDR_ADDED:
+ i = LOAD_ATOM (spec, i, am_addr_added);
+ break;
+ case SCTP_ADDR_MADE_PRIM:
+ i = LOAD_ATOM (spec, i, am_addr_made_prim);
+ break;
+#if HAVE_DECL_SCTP_ADDR_CONFIRMED
+ case SCTP_ADDR_CONFIRMED:
+ i = LOAD_ATOM (spec, i, am_addr_confirmed);
+ break;
+#endif
+ default:
+ ASSERT(0);
+ }
+ i = LOAD_INT (spec, i, sptr->spc_error);
+ i = LOAD_INT (spec, i, sptr->spc_assoc_id);
+ i = LOAD_TUPLE (spec, i, 5);
+ break;
+ }
+
+ case SCTP_REMOTE_ERROR:
+ { /* This is an error condition, so we return an error term
+ {sctp_remote_error,
+ Error : Int(),
+ AssocID : Int(),
+ RemoteCauses : [Atom()] // Remote Error flags
+ }
+ */
+ char *chunk;
+ int chlen;
+ struct sctp_remote_error * sptr = &(nptr->sn_remote_error);
+ ASSERT(sptr->sre_length <= sz); /* No buffer overrun */
+
+ /* Over-write the prev part of the response with an error: */
+ (void)LOAD_ATOM(spec, ok_pos, error_atom);
+
+ /* Continue from the curr pos: */
+ i = LOAD_ATOM (spec, i, am_sctp_remote_error);
+
+ i = LOAD_INT (spec, i, sock_ntohs(sptr->sre_error));
+ i = LOAD_INT (spec, i, sptr->sre_assoc_id);
+
+# ifdef HAVE_STRUCT_SCTP_REMOTE_ERROR_SRE_DATA
+ chunk = (char*) (&(sptr->sre_data));
+# else
+ chunk = ((char*)sptr) + sizeof(*sptr);
+# endif
+ chlen = sptr->sre_length - (chunk - (char *)sptr);
+ i = sctp_parse_error_chunk(spec, i, chunk, chlen);
+
+ i = LOAD_TUPLE (spec, i, 4);
+ /* The {error, {...}} will be closed by the caller */
+ break;
+ }
+
+ case SCTP_SEND_FAILED:
+ { /* {sctp_send_failed,
+ DataSent : Atom() // true or false
+ Error : Atom(),
+ OrigInfo : Tuple(),
+ AssocID : Int(),
+ OrigData : Binary()
+ }
+ This is also an ERROR condition -- overwrite the 'ok':
+ */
+ char *chunk;
+ int chlen, choff;
+ struct sctp_send_failed * sptr = &(nptr->sn_send_failed);
+ ASSERT(sptr->ssf_length <= sz); /* No buffer overrun */
+
+ /* Over-write 'ok' with 'error', continue from curr "i": */
+ (void)LOAD_ATOM(spec, ok_pos, error_atom);
+
+ i = LOAD_ATOM (spec, i, am_sctp_send_failed);
+ switch (sptr->ssf_flags) {
+ case SCTP_DATA_SENT:
+ i = LOAD_ATOM (spec, i, am_true);
+ break;
+ case SCTP_DATA_UNSENT:
+ i = LOAD_ATOM (spec, i, am_false);
+ break;
+ default:
+ ASSERT(0);
+ }
+ i = LOAD_INT (spec, i, sptr->ssf_error);
+ /* Now parse the orig SCTP_SNDRCV info */
+ i = sctp_parse_sndrcvinfo (spec, i, &sptr->ssf_info);
+ i = LOAD_ASSOC_ID (spec, i, sptr->ssf_assoc_id);
+
+ /* Load the orig data chunk, as an unparsed binary. Note that
+ in LOAD_BINARY below, we must specify the offset wrt bin->
+ orig_bytes. In Solaris 10, we don't have ssf_data:
+ */
+# ifdef HAVE_STRUCT_SCTP_SEND_FAILED_SSF_DATA
+ chunk = (char*) (&(sptr->ssf_data));
+# else
+ chunk = ((char*)sptr) + sizeof(*sptr);
+# endif
+ chlen = sptr->ssf_length - (chunk - (char*) sptr);
+ choff = chunk - bin->orig_bytes;
+
+ i = LOAD_BINARY(spec, i, bin, choff, chlen);
+ i = LOAD_TUPLE (spec, i, 6);
+ /* The {error, {...}} tuple is not yet closed */
+ break;
+ }
+
+ case SCTP_SHUTDOWN_EVENT:
+ { /* {sctp_shutdown_event,
+ AssocID : Int()
+ }
+ */
+ struct sctp_shutdown_event * sptr = &(nptr->sn_shutdown_event);
+
+ ASSERT (sptr->sse_length == sizeof(struct sctp_shutdown_event) &&
+ sptr->sse_length <= sz); /* No buffer overrun */
+
+ i = LOAD_ATOM (spec, i, am_sctp_shutdown_event);
+ i = LOAD_INT (spec, i, sptr->sse_assoc_id);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+
+ case SCTP_ADAPTATION_INDICATION:
+ { /* {sctp_adaptation_event,
+ Indication : Atom(),
+ AssocID : Int()
+ }
+ */
+ struct sctp_adaptation_event * sptr =
+ &(nptr->sn_adaptation_event);
+ ASSERT (sptr->sai_length == sizeof(struct sctp_adaptation_event)
+ && sptr->sai_length <= sz); /* No buffer overrun */
+
+ i = LOAD_ATOM (spec, i, am_sctp_adaptation_event);
+ i = LOAD_INT (spec, i, sock_ntohl(sptr->sai_adaptation_ind));
+ i = LOAD_INT (spec, i, sptr->sai_assoc_id);
+ i = LOAD_TUPLE (spec, i, 3);
+ break;
+ }
+
+ case SCTP_PARTIAL_DELIVERY_EVENT:
+ { /* It is not clear whether this event is sent to the sender
+ (when the receiver gets only a part of a message), or to
+ the receiver itself. In any case, we do not support partial
+ delivery of msgs in this implementation, so this is an error
+ condition:
+ {sctp_pdapi_event, sctp_partial_delivery_aborted, AssocID}:
+ */
+ struct sctp_pdapi_event * sptr;
+ (void) LOAD_ATOM (spec, ok_pos, error_atom);
+
+ sptr = &(nptr->sn_pdapi_event);
+ ASSERT (sptr->pdapi_length == sizeof(struct sctp_pdapi_event) &&
+ sptr->pdapi_length <= sz); /* No buffer overrun */
+
+ i = LOAD_ATOM (spec, i, am_sctp_pdapi_event);
+
+ /* Currently, there is only one indication possible: */
+ ASSERT (sptr->pdapi_indication == SCTP_PARTIAL_DELIVERY_ABORTED);
+
+ i = LOAD_ATOM (spec, i, am_partial_delivery_aborted);
+ i = LOAD_INT (spec, i, sptr->pdapi_assoc_id);
+ i = LOAD_TUPLE (spec, i, 3);
+ /* The {error, {...}} tuple is not yet closed */
+ break;
+ }
+
+ /* XXX: No more supported SCTP Event types. The standard also provides
+ SCTP_AUTHENTICATION_EVENT, but it is not implemented in the Linux
+ kernel, hence not supported here either. It is not possible to
+ request delivery of such events in this implementation, so they
+ cannot occur:
+ */
+ default: ASSERT(0);
+ }
+ return i;
+}
+#endif /* HAVE_SCTP */
+
+/*
+** passive mode reply:
+** for UDP:
+** {inet_async, S, Ref, {ok, Data=[H1,...,Hsz | BinData]}}
+** or (in the list mode)
+** {inet_async, S, Ref, {ok, Data=[H1,...,Hsz]}}
+**
+** for SCTP:
+** {inet_async, S, Ref, {ok, {[H1,...,HSz], [AncilData], Data_OR_Event}}}
+** where each AncilDatum:Tuple();
+** Data:List() or Binary(), but if List(), then without the Addr part,
+** which is moved in front;
+** Event:Tuple();
+** or
+** {inet_async, S, Ref, {error, {[H1,...,HSz], [AncilData], ErrorTerm}}}
+**
+** Cf: the output of send_async_error() is
+** {inet_async, S, Ref, {error, Cause:Atom()}}
+*/
+static int
+inet_async_binary_data
+ (inet_descriptor* desc, unsigned int phsz,
+ ErlDrvBinary * bin, int offs, int len, void * extra)
+{
+ unsigned int hsz = desc->hsz + phsz;
+ ErlDrvTermData spec [PACKET_ERL_DRV_TERM_DATA_LEN];
+ ErlDrvTermData caller = desc->caller;
+ int aid;
+ int req;
+ int i = 0;
+#ifdef HAVE_SCTP
+ int ok_pos;
+#endif
+
+ DEBUGF(("inet_async_binary_data(%ld): offs=%d, len=%d\r\n",
+ (long)desc->port, offs, len));
+
+ if (deq_async(desc, &aid, &caller, &req) < 0)
+ return -1;
+
+ i = LOAD_ATOM(spec, i, am_inet_async); /* 'inet_async' */
+ i = LOAD_PORT(spec, i, desc->dport); /* S */
+ i = LOAD_INT (spec, i, aid); /* Ref */
+
+#ifdef HAVE_SCTP
+ /* Need to memoise the position of the 'ok' atom written, as it may
+ later be overridden by an 'error': */
+ ok_pos = i;
+#endif
+ i = LOAD_ATOM(spec, i, am_ok);
+
+#ifdef HAVE_SCTP
+ if (IS_SCTP(desc))
+ { /* For SCTP we always have desc->hsz==0 (i.e., no application-level
+ headers are used), so hsz==phsz (see above): */
+ struct msghdr* mptr;
+ int sz;
+
+ ASSERT (hsz == phsz && hsz != 0);
+ sz = len - hsz; /* Size of the msg data proper, w/o the addr */
+
+ /* We always put the Addr as a list in front */
+ i = LOAD_STRING(spec, i, bin->orig_bytes+offs, hsz);
+
+ /* Put in the list (possibly empty) of Ancillary Data: */
+ mptr = (struct msghdr *) extra;
+ i = sctp_parse_ancillary_data (spec, i, mptr);
+
+ /* Then: Data or Event (Notification)? */
+ if (mptr->msg_flags & MSG_NOTIFICATION)
+ /* This is an Event, parse it. It may indicate a normal or an error
+ condition; in the latter case, the 'ok' above is overridden by
+ an 'error', and the Event we receive contains the error term: */
+ i = sctp_parse_async_event
+ (spec, i, ok_pos, am_error, desc, bin, offs+hsz, sz);
+ else
+ /* This is SCTP data, not a notification event. The data can be
+ returned as a List or as a Binary, similar to the generic case:
+ */
+ if (desc->mode == INET_MODE_LIST)
+ /* INET_MODE_LIST => [H1,H2,...Hn], addr and data together,
+ butthe Addr has already been parsed, so start at offs+hsz:
+ */
+ i = LOAD_STRING(spec, i, bin->orig_bytes+offs+hsz, sz);
+ else
+ /* INET_MODE_BINARY => Binary */
+ i = LOAD_BINARY(spec, i, bin, offs+hsz, sz);
+
+ /* Close up the {[H1,...,HSz], [AncilData], Event_OR_Data} tuple. This
+ is valid even in the case when Event is a error notification: */
+ i = LOAD_TUPLE (spec, i, 3);
+ }
+ else
+#endif /* HAVE_SCTP */
+ /* Generic case. Both Addr and Data (or a single list of them together) are
+ returned: */
+
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len)) {
+ /* INET_MODE_LIST => [H1,H2,...Hn] */
+ i = LOAD_STRING(spec, i, bin->orig_bytes+offs, len);
+ }
+ else {
+ /* INET_MODE_BINARY => [H1,H2,...HSz | Binary] or [Binary]: */
+ int sz = len - hsz;
+ i = LOAD_BINARY(spec, i, bin, offs+hsz, sz);
+ if (hsz > 0)
+ i = LOAD_STRING_CONS(spec, i, bin->orig_bytes+offs, hsz);
+ }
+ /* Close up the {ok, ...} or {error, ...} tuple: */
+ i = LOAD_TUPLE(spec, i, 2);
+
+ /* Close up the outer {inet_async, S, Ref, {ok|error, ...}} tuple: */
+ i = LOAD_TUPLE(spec, i, 4);
+
+ ASSERT(i <= PACKET_ERL_DRV_TERM_DATA_LEN);
+ desc->caller = 0;
+ return driver_send_term(desc->port, caller, spec, i);
+}
+
+/*
+** active mode message:
+** {tcp, S, [H1,...Hsz | Data]}
+*/
+static int tcp_message(inet_descriptor* desc, const char* buf, int len)
+{
+ unsigned int hsz = desc->hsz;
+ ErlDrvTermData spec[20];
+ int i = 0;
+
+ DEBUGF(("tcp_message(%ld): len = %d\r\n", (long)desc->port, len));
+
+ i = LOAD_ATOM(spec, i, am_tcp);
+ i = LOAD_PORT(spec, i, desc->dport);
+
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len)) {
+ i = LOAD_STRING(spec, i, buf, len); /* => [H1,H2,...Hn] */
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 20);
+ return driver_output_term(desc->port, spec, i);
+ }
+ else {
+ /* INET_MODE_BINARY => [H1,H2,...HSz | Binary] */
+ int sz = len - hsz;
+ int code;
+
+ i = LOAD_BUF2BINARY(spec, i, buf+hsz, sz);
+ if (hsz > 0)
+ i = LOAD_STRING_CONS(spec, i, buf, hsz);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 20);
+ code = driver_output_term(desc->port, spec, i);
+ return code;
+ }
+}
+
+/*
+** active mode message:
+** {tcp, S, [H1,...Hsz | Data]}
+*/
+static int
+tcp_binary_message(inet_descriptor* desc, ErlDrvBinary* bin, int offs, int len)
+{
+ unsigned int hsz = desc->hsz;
+ ErlDrvTermData spec[20];
+ int i = 0;
+
+ DEBUGF(("tcp_binary_message(%ld): len = %d\r\n", (long)desc->port, len));
+
+ i = LOAD_ATOM(spec, i, am_tcp);
+ i = LOAD_PORT(spec, i, desc->dport);
+
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len)) {
+ /* INET_MODE_LIST => [H1,H2,...Hn] */
+ i = LOAD_STRING(spec, i, bin->orig_bytes+offs, len);
+ }
+ else {
+ /* INET_MODE_BINARY => [H1,H2,...HSz | Binary] */
+ int sz = len - hsz;
+
+ i = LOAD_BINARY(spec, i, bin, offs+hsz, sz);
+ if (hsz > 0)
+ i = LOAD_STRING_CONS(spec, i, bin->orig_bytes+offs, hsz);
+ }
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 20);
+ return driver_output_term(desc->port, spec, i);
+}
+
+/*
+** send: active mode {tcp_closed, S}
+*/
+static int tcp_closed_message(tcp_descriptor* desc)
+{
+ ErlDrvTermData spec[6];
+ int i = 0;
+
+ DEBUGF(("tcp_closed_message(%ld):\r\n", (long)desc->inet.port));
+ if (!(desc->tcp_add_flags & TCP_ADDF_CLOSE_SENT)) {
+ desc->tcp_add_flags |= TCP_ADDF_CLOSE_SENT;
+
+ i = LOAD_ATOM(spec, i, am_tcp_closed);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_TUPLE(spec, i, 2);
+ ASSERT(i <= 6);
+ return driver_output_term(desc->inet.port, spec, i);
+ }
+ return 0;
+}
+
+/*
+** send active message {tcp_error, S, Error}
+*/
+static int tcp_error_message(tcp_descriptor* desc, int err)
+{
+ ErlDrvTermData spec[8];
+ ErlDrvTermData am_err = error_atom(err);
+ int i = 0;
+
+ DEBUGF(("tcp_error_message(%ld): %d\r\n", (long)desc->inet.port, err));
+
+ i = LOAD_ATOM(spec, i, am_tcp_error);
+ i = LOAD_PORT(spec, i, desc->inet.dport);
+ i = LOAD_ATOM(spec, i, am_err);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i <= 8);
+ return driver_output_term(desc->inet.port, spec, i);
+}
+
+/*
+** active mode message:
+** {udp, S, IP, Port, [H1,...Hsz | Data]} or
+** {sctp, S, IP, Port, {[AncilData], Event_or_Data}}
+** where
+** [H1,...,HSz] are msg headers (without IP/Port, UDP only),
+** Data : List() | Binary()
+*/
+static int packet_binary_message
+ (inet_descriptor* desc, ErlDrvBinary* bin, int offs, int len, void* extra)
+{
+ unsigned int hsz = desc->hsz;
+ ErlDrvTermData spec [PACKET_ERL_DRV_TERM_DATA_LEN];
+ int i = 0;
+ int alen;
+
+ DEBUGF(("packet_binary_message(%ld): len = %d\r\n",
+ (long)desc->port, len));
+# ifdef HAVE_SCTP
+ i = LOAD_ATOM(spec, i, IS_SCTP(desc) ? am_sctp : am_udp); /* UDP|SCTP */
+# else
+ i = LOAD_ATOM(spec, i, am_udp ); /* UDP only */
+# endif
+ i = LOAD_PORT(spec, i, desc->dport); /* S */
+
+ alen = addrlen(desc->sfamily);
+ i = load_ip_address(spec, i, desc->sfamily, bin->orig_bytes+offs+3);
+ i = load_ip_port(spec, i, bin->orig_bytes+offs+1); /* IP, Port */
+
+ offs += (alen + 3);
+ len -= (alen + 3);
+
+# ifdef HAVE_SCTP
+ if (!IS_SCTP(desc))
+ {
+# endif
+ if ((desc->mode == INET_MODE_LIST) || (hsz > len))
+ /* INET_MODE_LIST, or only headers => [H1,H2,...Hn] */
+ i = LOAD_STRING(spec, i, bin->orig_bytes+offs, len);
+ else {
+ /* INET_MODE_BINARY => [H1,H2,...HSz | Binary] */
+ int sz = len - hsz;
+
+ i = LOAD_BINARY(spec, i, bin, offs+hsz, sz);
+ if (hsz > 0)
+ i = LOAD_STRING_CONS(spec, i, bin->orig_bytes+offs, hsz);
+ }
+# ifdef HAVE_SCTP
+ }
+ else
+ { /* For SCTP we always have desc->hsz==0 (i.e., no application-level
+ headers are used): */
+ struct msghdr* mptr;
+ ASSERT(hsz == 0);
+
+ /* Put in the list (possibly empty) of Ancillary Data: */
+ mptr = (struct msghdr *) extra;
+ i = sctp_parse_ancillary_data (spec, i, mptr);
+
+ /* Then: Data or Event (Notification)? */
+ if (mptr->msg_flags & MSG_NOTIFICATION)
+ /* This is an Event, parse it. It may indicate a normal or an error
+ condition; in the latter case, the initial 'sctp' atom is over-
+ ridden by 'sctp_error', and the Event we receive contains the
+ error term: */
+ i = sctp_parse_async_event
+ (spec, i, 0, am_sctp_error, desc, bin, offs, len);
+ else
+ /* This is SCTP data, not a notification event. The data can be
+ returned as a List or as a Binary, similar to the generic case:
+ */
+ if (desc->mode == INET_MODE_LIST)
+ /* INET_MODE_LIST => [H1,H2,...Hn], addr and data together,
+ but the Addr has already been parsed, so start at offs:
+ */
+ i = LOAD_STRING(spec, i, bin->orig_bytes+offs, len);
+ else
+ /* INET_MODE_BINARY => Binary */
+ i = LOAD_BINARY(spec, i, bin, offs, len);
+
+ /* Close up the {[AncilData], Event_OR_Data} tuple: */
+ i = LOAD_TUPLE (spec, i, 2);
+ }
+# endif /* HAVE_SCTP */
+
+ /* Close up the outer 5-tuple: */
+ i = LOAD_TUPLE(spec, i, 5);
+ ASSERT(i <= PACKET_ERL_DRV_TERM_DATA_LEN);
+ return driver_output_term(desc->port, spec, i);
+}
+
+/*
+** send active message {udp_error|sctp_error, S, Error}
+*/
+static int packet_error_message(udp_descriptor* udesc, int err)
+{
+ inet_descriptor* desc = INETP(udesc);
+ ErlDrvTermData spec[2*LOAD_ATOM_CNT + LOAD_PORT_CNT + LOAD_TUPLE_CNT];
+ ErlDrvTermData am_err = error_atom(err);
+ int i = 0;
+
+ DEBUGF(("packet_error_message(%ld): %d\r\n",
+ (long)desc->port, err));
+
+# ifdef HAVE_SCTP
+ if (IS_SCTP(desc) )
+ i = LOAD_ATOM(spec, i, am_sctp_error);
+ else
+# endif
+ i = LOAD_ATOM(spec, i, am_udp_error);
+
+ i = LOAD_PORT(spec, i, desc->dport);
+ i = LOAD_ATOM(spec, i, am_err);
+ i = LOAD_TUPLE(spec, i, 3);
+ ASSERT(i == sizeof(spec)/sizeof(*spec));
+ return driver_output_term(desc->port, spec, i);
+}
+
+
+/* scan buffer for bit 7 */
+static void scanbit8(inet_descriptor* desc, const char* buf, int len)
+{
+ int c;
+
+ if (!desc->bit8f || desc->bit8) return;
+ c = 0;
+ while(len--) c |= *buf++;
+ desc->bit8 = ((c & 0x80) != 0);
+}
+
+/*
+** active=TRUE:
+** (NOTE! distribution MUST use active=TRUE, deliver=PORT)
+** deliver=PORT {S, {data, [H1,..Hsz | Data]}}
+** deliver=TERM {tcp, S, [H1..Hsz | Data]}
+**
+** active=FALSE:
+** {async, S, Ref, {ok,[H1,...Hsz | Data]}}
+*/
+static int tcp_reply_data(tcp_descriptor* desc, char* buf, int len)
+{
+ int code;
+ const char* body = buf;
+ int bodylen = len;
+
+ packet_get_body(desc->inet.htype, &body, &bodylen);
+
+ scanbit8(INETP(desc), body, bodylen);
+
+ if (desc->inet.deliver == INET_DELIVER_PORT) {
+ code = inet_port_data(INETP(desc), body, bodylen);
+ }
+ else if ((code=packet_parse(desc->inet.htype, buf, len,
+ &desc->http_state, &packet_callbacks,
+ desc)) == 0) {
+ /* No body parsing, return raw binary */
+ if (desc->inet.active == INET_PASSIVE)
+ return inet_async_data(INETP(desc), body, bodylen);
+ else
+ code = tcp_message(INETP(desc), body, bodylen);
+ }
+
+ if (code < 0)
+ return code;
+ if (desc->inet.active == INET_ONCE)
+ desc->inet.active = INET_PASSIVE;
+ return code;
+}
+
+static int
+tcp_reply_binary_data(tcp_descriptor* desc, ErlDrvBinary* bin, int offs, int len)
+{
+ int code;
+ const char* buf = bin->orig_bytes + offs;
+ const char* body = buf;
+ int bodylen = len;
+
+ packet_get_body(desc->inet.htype, &body, &bodylen);
+ offs = body - bin->orig_bytes; /* body offset now */
+
+ scanbit8(INETP(desc), body, bodylen);
+
+ if (desc->inet.deliver == INET_DELIVER_PORT)
+ code = inet_port_binary_data(INETP(desc), bin, offs, bodylen);
+ else if ((code=packet_parse(desc->inet.htype, buf, len, &desc->http_state,
+ &packet_callbacks,desc)) == 0) {
+ /* No body parsing, return raw data */
+ if (desc->inet.active == INET_PASSIVE)
+ return inet_async_binary_data(INETP(desc), 0, bin, offs, bodylen, NULL);
+ else
+ code = tcp_binary_message(INETP(desc), bin, offs, bodylen);
+ }
+ if (code < 0)
+ return code;
+ if (desc->inet.active == INET_ONCE)
+ desc->inet.active = INET_PASSIVE;
+ return code;
+}
+
+
+static int
+packet_reply_binary_data(inet_descriptor* desc, unsigned int hsz,
+ ErlDrvBinary * bin, int offs, int len,
+ void * extra)
+{
+ int code;
+
+ scanbit8(desc, bin->orig_bytes+offs, len);
+
+ if (desc->active == INET_PASSIVE)
+ /* "inet" is actually for both UDP and SCTP, as well as TCP! */
+ return inet_async_binary_data(desc, hsz, bin, offs, len, extra);
+ else
+ { /* INET_ACTIVE or INET_ONCE: */
+ if (desc->deliver == INET_DELIVER_PORT)
+ code = inet_port_binary_data(desc, bin, offs, len);
+ else
+ code = packet_binary_message(desc, bin, offs, len, extra);
+ if (code < 0)
+ return code;
+ if (desc->active == INET_ONCE)
+ desc->active = INET_PASSIVE;
+ return code;
+ }
+}
+
+/* ----------------------------------------------------------------------------
+
+ INET
+
+---------------------------------------------------------------------------- */
+
+static int
+sock_init(void) /* May be called multiple times. */
+{
+#ifdef __WIN32__
+ WORD wVersionRequested;
+ WSADATA wsaData;
+ static int res = -1; /* res < 0 == initialization never attempted */
+
+ if (res >= 0)
+ return res;
+
+ wVersionRequested = MAKEWORD(2,0);
+ if (WSAStartup(wVersionRequested, &wsaData) != 0)
+ goto error;
+
+ if ((LOBYTE(wsaData.wVersion) != 2) || (HIBYTE(wsaData.wVersion) != 0))
+ goto error;
+
+ find_dynamic_functions();
+
+ return res = 1;
+
+ error:
+
+ WSACleanup();
+ return res = 0;
+#else
+ return 1;
+#endif
+}
+
+#ifdef HAVE_SCTP
+static void inet_init_sctp(void) {
+ INIT_ATOM(sctp);
+ INIT_ATOM(sctp_error);
+ INIT_ATOM(true);
+ INIT_ATOM(false);
+ INIT_ATOM(buffer);
+ INIT_ATOM(mode);
+ INIT_ATOM(list);
+ INIT_ATOM(binary);
+ INIT_ATOM(active);
+ INIT_ATOM(once);
+ INIT_ATOM(buffer);
+ INIT_ATOM(linger);
+ INIT_ATOM(recbuf);
+ INIT_ATOM(sndbuf);
+ INIT_ATOM(reuseaddr);
+ INIT_ATOM(dontroute);
+ INIT_ATOM(priority);
+ INIT_ATOM(tos);
+
+ /* Option names */
+ INIT_ATOM(sctp_rtoinfo);
+ INIT_ATOM(sctp_associnfo);
+ INIT_ATOM(sctp_initmsg);
+ INIT_ATOM(sctp_autoclose);
+ INIT_ATOM(sctp_nodelay);
+ INIT_ATOM(sctp_disable_fragments);
+ INIT_ATOM(sctp_i_want_mapped_v4_addr);
+ INIT_ATOM(sctp_maxseg);
+ INIT_ATOM(sctp_set_peer_primary_addr);
+ INIT_ATOM(sctp_primary_addr);
+ INIT_ATOM(sctp_adaptation_layer);
+ INIT_ATOM(sctp_peer_addr_params);
+ INIT_ATOM(sctp_default_send_param);
+ INIT_ATOM(sctp_events);
+ INIT_ATOM(sctp_delayed_ack_time);
+ INIT_ATOM(sctp_status);
+ INIT_ATOM(sctp_get_peer_addr_info);
+
+ /* Record names */
+ INIT_ATOM(sctp_sndrcvinfo);
+ INIT_ATOM(sctp_assoc_change);
+ INIT_ATOM(sctp_paddr_change);
+ INIT_ATOM(sctp_remote_error);
+ INIT_ATOM(sctp_send_failed);
+ INIT_ATOM(sctp_shutdown_event);
+ INIT_ATOM(sctp_adaptation_event);
+ INIT_ATOM(sctp_pdapi_event);
+ INIT_ATOM(sctp_assocparams);
+ INIT_ATOM(sctp_prim);
+ INIT_ATOM(sctp_setpeerprim);
+ INIT_ATOM(sctp_setadaptation);
+ INIT_ATOM(sctp_paddrparams);
+ INIT_ATOM(sctp_event_subscribe);
+ INIT_ATOM(sctp_assoc_value);
+ INIT_ATOM(sctp_paddrinfo);
+
+ /* For #sctp_sndrcvinfo{}: */
+ INIT_ATOM(unordered);
+ INIT_ATOM(addr_over);
+ INIT_ATOM(abort);
+ INIT_ATOM(eof);
+
+ /* For #sctp_assoc_change{}: */
+ INIT_ATOM(comm_up);
+ INIT_ATOM(comm_lost);
+ INIT_ATOM(restart);
+ INIT_ATOM(shutdown_comp);
+ INIT_ATOM(cant_assoc);
+
+ /* For #sctp_paddr_change{}: */
+ INIT_ATOM(addr_available);
+ INIT_ATOM(addr_unreachable);
+ INIT_ATOM(addr_removed);
+ INIT_ATOM(addr_added);
+ INIT_ATOM(addr_made_prim);
+ INIT_ATOM(addr_confirmed);
+
+ INIT_ATOM(short_recv);
+ INIT_ATOM(wrong_anc_data);
+
+ /* For #sctp_pdap_event{}: */
+ INIT_ATOM(partial_delivery_aborted);
+
+ /* For #sctp_paddrparams{}: */
+ INIT_ATOM(hb_enable);
+ INIT_ATOM(hb_disable);
+ INIT_ATOM(hb_demand);
+ INIT_ATOM(pmtud_enable);
+ INIT_ATOM(pmtud_disable);
+ INIT_ATOM(sackdelay_enable);
+ INIT_ATOM(sackdelay_disable);
+
+ /* For #sctp_paddrinfo{}: */
+ INIT_ATOM(active);
+ INIT_ATOM(inactive);
+
+ /* For #sctp_status{}: */
+ INIT_ATOM(empty);
+ INIT_ATOM(closed);
+ INIT_ATOM(cookie_wait);
+ INIT_ATOM(cookie_echoed);
+ INIT_ATOM(established);
+ INIT_ATOM(shutdown_pending);
+ INIT_ATOM(shutdown_sent);
+ INIT_ATOM(shutdown_received);
+ INIT_ATOM(shutdown_ack_sent);
+ /* Not yet implemented in the Linux kernel:
+ ** INIT_ATOM(bound);
+ ** INIT_ATOM(listen);
+ */
+}
+#endif /* HAVE_SCTP */
+
+static int inet_init()
+{
+ if (!sock_init())
+ goto error;
+
+ buffer_stack_pos = 0;
+
+ erts_smp_spinlock_init(&inet_buffer_stack_lock, "inet_buffer_stack_lock");
+
+ ASSERT(sizeof(struct in_addr) == 4);
+# if defined(HAVE_IN6) && defined(AF_INET6)
+ ASSERT(sizeof(struct in6_addr) == 16);
+# endif
+
+#ifdef DEBUG
+ tot_buf_allocated = 0;
+ max_buf_allocated = 0;
+ tot_buf_stacked = 0;
+#endif
+ INIT_ATOM(ok);
+ INIT_ATOM(tcp);
+ INIT_ATOM(udp);
+ INIT_ATOM(error);
+ INIT_ATOM(inet_async);
+ INIT_ATOM(inet_reply);
+ INIT_ATOM(timeout);
+ INIT_ATOM(closed);
+ INIT_ATOM(tcp_closed);
+ INIT_ATOM(tcp_error);
+ INIT_ATOM(udp_error);
+ INIT_ATOM(empty_out_q);
+ INIT_ATOM(ssl_tls);
+
+ INIT_ATOM(http_eoh);
+ INIT_ATOM(http_header);
+ INIT_ATOM(http_request);
+ INIT_ATOM(http_response);
+ INIT_ATOM(http_error);
+ INIT_ATOM(abs_path);
+ INIT_ATOM(absoluteURI);
+ am_star = driver_mk_atom("*");
+ INIT_ATOM(undefined);
+ INIT_ATOM(http);
+ INIT_ATOM(https);
+ INIT_ATOM(scheme);
+
+ /* add TCP, UDP and SCTP drivers */
+#ifdef _OSE_
+ add_ose_tcp_drv_entry(&tcp_inet_driver_entry);
+ add_ose_udp_drv_entry(&udp_inet_driver_entry);
+#else
+ add_driver_entry(&tcp_inet_driver_entry);
+ add_driver_entry(&udp_inet_driver_entry);
+# ifdef HAVE_SCTP
+ /* Check the size of SCTP AssocID -- currently both this driver and the
+ Erlang part require 32 bit: */
+ ASSERT(sizeof(sctp_assoc_t)==ASSOC_ID_LEN);
+# ifndef LIBSCTP
+# error LIBSCTP not defined
+# endif
+ if (erts_sys_ddll_open_noext(STRINGIFY(LIBSCTP), &h_libsctp, NULL) == 0) {
+ void *ptr;
+ if (erts_sys_ddll_sym(h_libsctp, "sctp_bindx", &ptr) == 0) {
+ p_sctp_bindx = ptr;
+ inet_init_sctp();
+ add_driver_entry(&sctp_inet_driver_entry);
+ }
+ }
+# endif
+#endif /* _OSE_ */
+ /* remove the dummy inet driver */
+ remove_driver_entry(&inet_driver_entry);
+ return 0;
+
+ error:
+ remove_driver_entry(&inet_driver_entry);
+ return -1;
+}
+
+
+/*
+** Set a inaddr structure:
+** src = [P1,P0,X1,X2,.....]
+** dst points to a structure large enugh to keep any kind
+** of inaddr.
+** *len is set to length of src on call
+** and is set to actual length of dst on return
+** return NULL on error and ptr after port address on success
+*/
+static char* inet_set_address(int family, inet_address* dst, char* src, int* len)
+{
+ short port;
+
+ if ((family == AF_INET) && (*len >= 2+4)) {
+ sys_memzero((char*)dst, sizeof(struct sockaddr_in));
+ port = get_int16(src);
+ dst->sai.sin_family = family;
+ dst->sai.sin_port = sock_htons(port);
+ sys_memcpy(&dst->sai.sin_addr, src+2, 4);
+ *len = sizeof(struct sockaddr_in);
+ return src + 2+4;
+ }
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if ((family == AF_INET6) && (*len >= 2+16)) {
+ sys_memzero((char*)dst, sizeof(struct sockaddr_in6));
+ port = get_int16(src);
+ dst->sai6.sin6_family = family;
+ dst->sai6.sin6_port = sock_htons(port);
+ dst->sai6.sin6_flowinfo = 0; /* XXX this may be set as well ?? */
+ sys_memcpy(&dst->sai6.sin6_addr, src+2, 16);
+ *len = sizeof(struct sockaddr_in6);
+ return src + 2+16;
+ }
+#endif
+ return NULL;
+}
+#ifdef HAVE_SCTP
+/*
+** Set an inaddr structure, address family comes from source data,
+** or from argument if source data specifies constant address.
+**
+** src = [TAG,P1,P0] when TAG = INET_AF_ANY | INET_AF_LOOPBACK
+** src = [TAG,P1,P0,X1,X2,...] when TAG = INET_AF_INET | INET_AF_INET6
+*/
+static char *inet_set_faddress(int family, inet_address* dst,
+ char *src, int* len) {
+ int tag;
+
+ if (*len < 1) return NULL;
+ (*len) --;
+ tag = *(src ++);
+ switch (tag) {
+ case INET_AF_INET:
+ family = AF_INET;
+ break;
+# if defined(HAVE_IN6) && defined(AF_INET6)
+ case INET_AF_INET6:
+ family = AF_INET6;
+ break;
+# endif
+ case INET_AF_ANY:
+ case INET_AF_LOOPBACK: {
+ int port;
+
+ if (*len < 2) return NULL;
+ port = get_int16(src);
+ switch (family) {
+ case AF_INET: {
+ struct in_addr addr;
+ switch (tag) {
+ case INET_AF_ANY:
+ addr.s_addr = sock_htonl(INADDR_ANY);
+ break;
+ case INET_AF_LOOPBACK:
+ addr.s_addr = sock_htonl(INADDR_LOOPBACK);
+ break;
+ default:
+ return NULL;
+ }
+ sys_memzero((char*)dst, sizeof(struct sockaddr_in));
+ dst->sai.sin_family = family;
+ dst->sai.sin_port = sock_htons(port);
+ dst->sai.sin_addr.s_addr = addr.s_addr;
+ *len = sizeof(struct sockaddr_in);
+ } break;
+# if defined(HAVE_IN6) && defined(AF_INET6)
+ case AF_INET6: {
+ const struct in6_addr* paddr;
+ switch (tag) {
+ case INET_AF_ANY:
+ paddr = &in6addr_any;
+ break;
+ case INET_AF_LOOPBACK:
+ paddr = &in6addr_loopback;
+ break;
+ default:
+ return NULL;
+ }
+ sys_memzero((char*)dst, sizeof(struct sockaddr_in6));
+ dst->sai6.sin6_family = family;
+ dst->sai6.sin6_port = sock_htons(port);
+ dst->sai6.sin6_flowinfo = 0; /* XXX this may be set as well ?? */
+ dst->sai6.sin6_addr = *paddr;
+ *len = sizeof(struct sockaddr_in6);
+ } break;
+# endif
+ default:
+ return NULL;
+ }
+ return src + 2;
+ } break;
+ default:
+ return NULL;
+ }
+ return inet_set_address(family, dst, src, len);
+}
+#endif /* HAVE_SCTP */
+
+/* Get a inaddr structure
+** src = inaddr structure
+** *len is the lenght of structure
+** dst is filled with [F,P1,P0,X1,....]
+** where F is the family code (coded)
+** and *len is the length of dst on return
+** (suitable to deliver to erlang)
+*/
+static int inet_get_address(int family, char* dst, inet_address* src, unsigned int* len)
+{
+ short port;
+
+ if ((family == AF_INET) && (*len >= sizeof(struct sockaddr_in))) {
+ dst[0] = INET_AF_INET;
+ port = sock_ntohs(src->sai.sin_port);
+ put_int16(port, dst+1);
+ sys_memcpy(dst+3, (char*)&src->sai.sin_addr, sizeof(struct in_addr));
+ *len = 3 + sizeof(struct in_addr);
+ return 0;
+ }
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if ((family == AF_INET6) && (*len >= sizeof(struct sockaddr_in6))) {
+ dst[0] = INET_AF_INET6;
+ port = sock_ntohs(src->sai6.sin6_port);
+ put_int16(port, dst+1);
+ sys_memcpy(dst+3, (char*)&src->sai6.sin6_addr,sizeof(struct in6_addr));
+ *len = 3 + sizeof(struct in6_addr);
+ return 0;
+ }
+#endif
+ return -1;
+}
+
+static void desc_close(inet_descriptor* desc)
+{
+ if (desc->s != INVALID_SOCKET) {
+#ifdef __WIN32__
+ winsock_event_select(desc, FD_READ|FD_WRITE|FD_CLOSE, 0);
+ sock_close(desc->s);
+ desc->forced_events = 0;
+ desc->send_would_block = 0;
+#endif
+ driver_select(desc->port, (ErlDrvEvent)(long)desc->event, ERL_DRV_USE, 0);
+ desc->event = INVALID_EVENT; /* closed by stop_select callback */
+ desc->s = INVALID_SOCKET;
+ desc->event_mask = 0;
+ }
+}
+
+static void desc_close_read(inet_descriptor* desc)
+{
+ if (desc->s != INVALID_SOCKET) {
+#ifdef __WIN32__
+ /* This call can not be right???
+ * We want to turn off read events but keep any write events.
+ * But on windows driver_select(...,READ,1) is only used as a
+ * way to hook into the pollset. sock_select is used to control
+ * which events to wait for.
+ * It seems we used to disabled all events for the socket here.
+ *
+ driver_select(desc->port, desc->event, DO_READ, 0); REMOVED */
+#endif
+ sock_select(desc, FD_READ | FD_CLOSE, 0);
+ }
+}
+
+
+static int erl_inet_close(inet_descriptor* desc)
+{
+ free_subscribers(&desc->empty_out_q_subs);
+ if ((desc->prebound == 0) && (desc->state & INET_F_OPEN)) {
+ desc_close(desc);
+ desc->state = INET_STATE_CLOSED;
+ } else if (desc->prebound && (desc->s != INVALID_SOCKET)) {
+ sock_select(desc, FD_READ | FD_WRITE | FD_CLOSE, 0);
+ desc->event_mask = 0;
+#ifdef __WIN32__
+ desc->forced_events = 0;
+ desc->send_would_block = 0;
+#endif
+ }
+ return 0;
+}
+
+
+static int inet_ctl_open(inet_descriptor* desc, int domain, int type,
+ char** rbuf, int rsize)
+{
+ if (desc->state != INET_STATE_CLOSED)
+ return ctl_xerror(EXBADSEQ, rbuf, rsize);
+ if ((desc->s = sock_open(domain, type, desc->sprotocol)) == INVALID_SOCKET)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ if ((desc->event = sock_create_event(desc)) == INVALID_EVENT)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ SET_NONBLOCKING(desc->s);
+#ifdef __WIN32__
+ driver_select(desc->port, desc->event, ERL_DRV_READ, 1);
+#endif
+ desc->state = INET_STATE_OPEN;
+ desc->stype = type;
+ desc->sfamily = domain;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+}
+
+
+/* as inet_open but pass in an open socket (MUST BE OF RIGHT TYPE) */
+static int inet_ctl_fdopen(inet_descriptor* desc, int domain, int type,
+ SOCKET s, char** rbuf, int rsize)
+{
+ inet_address name;
+ unsigned int sz = sizeof(name);
+
+ /* check that it is a socket and that the socket is bound */
+ if (sock_name(s, (struct sockaddr*) &name, &sz) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ desc->s = s;
+ if ((desc->event = sock_create_event(desc)) == INVALID_EVENT)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ SET_NONBLOCKING(desc->s);
+#ifdef __WIN32__
+ driver_select(desc->port, desc->event, ERL_DRV_READ, 1);
+#endif
+ desc->state = INET_STATE_BOUND; /* assume bound */
+ if (type == SOCK_STREAM) { /* check if connected */
+ sz = sizeof(name);
+ if (sock_peer(s, (struct sockaddr*) &name, &sz) != SOCKET_ERROR)
+ desc->state = INET_STATE_CONNECTED;
+ }
+
+ desc->prebound = 1; /* used to prevent a real close since
+ * the fd probably comes from an
+ * external wrapper program, so it is
+ * not certain that we can open it again */
+ desc->stype = type;
+ desc->sfamily = domain;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+}
+
+/*
+** store interface info as: (bytes)
+** [Len] Name(Len) Flags(1) addr(4) baddr(4) mask(4) bw(4)
+*/
+struct addr_if {
+ char name[INET_IFNAMSIZ];
+ long flags; /* coded flags */
+ struct in_addr addr; /* interface address */
+ struct in_addr baddr; /* broadcast address */
+ struct in_addr mask; /* netmask */
+};
+
+
+#ifndef SIOCGIFNETMASK
+static struct in_addr net_mask(in)
+struct in_addr in;
+{
+ register u_long i = sock_ntohl(in.s_addr);
+
+ if (IN_CLASSA(i))
+ in.s_addr = sock_htonl(IN_CLASSA_NET);
+ else if (IN_CLASSB(i))
+ in.s_addr = sock_htonl(IN_CLASSB_NET);
+ else
+ in.s_addr = sock_htonl(IN_CLASSC_NET);
+ return in;
+}
+#endif
+
+#if defined(__WIN32__) && defined(SIO_GET_INTERFACE_LIST)
+
+/* format address in dot notation */
+static char* fmt_addr(unsigned long x, char* ptr)
+{
+ int i;
+ for (i = 0; i < 4; i++) {
+ int nb[3];
+ int y = (x >> 24) & 0xff;
+ x <<= 8;
+ nb[0] = y % 10; y /= 10;
+ nb[1] = y % 10; y /= 10;
+ nb[2] = y % 10; y /= 10;
+ switch((nb[2] ? 3 : (nb[1] ? 2 : 1))) {
+ case 3: *ptr++ = nb[2] + '0';
+ case 2: *ptr++ = nb[1] + '0';
+ case 1: *ptr++ = nb[0] + '0';
+ }
+ *ptr++ = '.';
+ }
+ *(ptr-1) = '\0';
+ return ptr;
+}
+
+static int parse_addr(char* ptr, int n, long* x)
+{
+ long addr = 0;
+ int dots = 0;
+ int digs = 0;
+ int v = 0;
+
+ while(n--) {
+ switch(*ptr) {
+ case '0': case '1': case '2':case '3':case '4':case '5':
+ case '6': case '7': case '8':case '9':
+ v = v*10 + *ptr - '0';
+ if (++digs > 3) return -1;
+ break;
+ case '.':
+ if ((dots>2) || (digs==0) || (digs > 3) || (v > 0xff)) return -1;
+ dots++;
+ digs = 0;
+ addr = (addr << 8) | v;
+ v = 0;
+ break;
+ default:
+ return -1;
+ }
+ ptr++;
+ }
+ if ((dots!=3) || (digs==0) || (digs > 3) || (v > 0xff)) return -1;
+ addr = (addr << 8) | v;
+ *x = addr;
+ return 0;
+}
+
+#endif
+
+#define buf_check(ptr, end, n) \
+do { if ((end)-(ptr) < (n)) goto error; } while(0)
+
+static char* sockaddr_to_buf(struct sockaddr* addr, char* ptr, char* end)
+{
+ if (addr->sa_family == AF_INET || addr->sa_family == 0) {
+ struct in_addr a;
+ buf_check(ptr,end,sizeof(struct in_addr));
+ a = ((struct sockaddr_in*) addr)->sin_addr;
+ sys_memcpy(ptr, (char*)&a, sizeof(struct in_addr));
+ return ptr + sizeof(struct in_addr);
+ }
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if (addr->sa_family == AF_INET6) {
+ struct in6_addr a;
+ buf_check(ptr,end,sizeof(struct in6_addr));
+ a = ((struct sockaddr_in6*) addr)->sin6_addr;
+ sys_memcpy(ptr, (char*)&a, sizeof(struct in6_addr));
+ return ptr + sizeof(struct in6_addr);
+ }
+#endif
+ error:
+ return NULL;
+
+}
+
+static char* buf_to_sockaddr(char* ptr, char* end, struct sockaddr* addr)
+{
+ buf_check(ptr,end,sizeof(struct in_addr));
+ sys_memcpy((char*) &((struct sockaddr_in*)addr)->sin_addr, ptr,
+ sizeof(struct in_addr));
+ addr->sa_family = AF_INET;
+ return ptr + sizeof(struct in_addr);
+
+ error:
+ return NULL;
+}
+
+
+
+#if defined(__WIN32__) && defined(SIO_GET_INTERFACE_LIST)
+
+static int inet_ctl_getiflist(inet_descriptor* desc, char** rbuf, int rsize)
+{
+ char ifbuf[BUFSIZ];
+ char sbuf[BUFSIZ];
+ char* sptr;
+ INTERFACE_INFO* ifp;
+ DWORD len;
+ int n;
+ int err;
+
+ ifp = (INTERFACE_INFO*) ifbuf;
+ len = 0;
+ err = WSAIoctl(desc->s, SIO_GET_INTERFACE_LIST, NULL, 0,
+ (LPVOID) ifp, BUFSIZ, (LPDWORD) &len,
+ NULL, NULL);
+
+ if (err == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+
+ n = (len + sizeof(INTERFACE_INFO) - 1) / sizeof(INTERFACE_INFO);
+ sptr = sbuf;
+
+ while(n--) {
+ if (((struct sockaddr*)&ifp->iiAddress)->sa_family == desc->sfamily) {
+ struct in_addr sina = ((struct sockaddr_in*)&ifp->iiAddress)->sin_addr;
+ /* discard INADDR_ANY interface address */
+ if (sina.s_addr != INADDR_ANY)
+ sptr = fmt_addr(sock_ntohl(sina.s_addr), sptr);
+ }
+ ifp++;
+ }
+ return ctl_reply(INET_REP_OK, sbuf, sptr - sbuf, rbuf, rsize);
+}
+
+
+/* input is an ip-address in string format i.e A.B.C.D
+** scan the INTERFACE_LIST to get the options
+*/
+static int inet_ctl_ifget(inet_descriptor* desc, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ char ifbuf[BUFSIZ];
+ int n;
+ char sbuf[BUFSIZ];
+ char* sptr;
+ char* s_end = sbuf + BUFSIZ;
+ int namlen;
+ int err;
+ INTERFACE_INFO* ifp;
+ long namaddr;
+
+ if ((len == 0) || ((namlen = buf[0]) > len))
+ goto error;
+ if (parse_addr(buf+1, namlen, &namaddr) < 0)
+ goto error;
+ namaddr = sock_ntohl(namaddr);
+ buf += (namlen+1);
+ len -= (namlen+1);
+
+ ifp = (INTERFACE_INFO*) ifbuf;
+ err = WSAIoctl(desc->s, SIO_GET_INTERFACE_LIST, NULL, 0,
+ (LPVOID) ifp, BUFSIZ, (LPDWORD) &n,
+ NULL, NULL);
+ if (err == SOCKET_ERROR) {
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+
+ n = (n + sizeof(INTERFACE_INFO) - 1) / sizeof(INTERFACE_INFO);
+
+ /* find interface */
+ while(n) {
+ if (((struct sockaddr_in*)&ifp->iiAddress)->sin_addr.s_addr == namaddr)
+ break;
+ ifp++;
+ n--;
+ }
+ if (n == 0)
+ goto error;
+
+ sptr = sbuf;
+
+ while (len--) {
+ switch(*buf++) {
+ case INET_IFOPT_ADDR:
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_ADDR;
+ if ((sptr = sockaddr_to_buf((struct sockaddr *)&ifp->iiAddress,
+ sptr, s_end)) == NULL)
+ goto error;
+ break;
+
+ case INET_IFOPT_HWADDR:
+ break;
+
+ case INET_IFOPT_BROADADDR:
+#ifdef SIOCGIFBRDADDR
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_BROADADDR;
+ if ((sptr=sockaddr_to_buf((struct sockaddr *)
+ &ifp->iiBroadcastAddress,sptr,s_end))
+ == NULL)
+ goto error;
+#endif
+ break;
+
+ case INET_IFOPT_DSTADDR:
+ break;
+
+ case INET_IFOPT_NETMASK:
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_NETMASK;
+ if ((sptr = sockaddr_to_buf((struct sockaddr *)
+ &ifp->iiNetmask,sptr,s_end)) == NULL)
+ goto error;
+ break;
+
+ case INET_IFOPT_MTU:
+ break;
+
+ case INET_IFOPT_FLAGS: {
+ long eflags = 0;
+ int flags = ifp->iiFlags;
+ /* just enumerate the interfaces (no names) */
+
+ /* translate flags */
+ if (flags & IFF_UP)
+ eflags |= INET_IFF_UP;
+ if (flags & IFF_BROADCAST)
+ eflags |= INET_IFF_BROADCAST;
+ if (flags & IFF_LOOPBACK)
+ eflags |= INET_IFF_LOOPBACK;
+ if (flags & IFF_POINTTOPOINT)
+ eflags |= INET_IFF_POINTTOPOINT;
+ if (flags & IFF_UP) /* emulate runnign ? */
+ eflags |= INET_IFF_RUNNING;
+ if (flags & IFF_MULTICAST)
+ eflags |= INET_IFF_MULTICAST;
+
+ buf_check(sptr, s_end, 5);
+ *sptr++ = INET_IFOPT_FLAGS;
+ put_int32(eflags, sptr);
+ sptr += 4;
+ break;
+ }
+ default:
+ goto error;
+ }
+ }
+ return ctl_reply(INET_REP_OK, sbuf, sptr - sbuf, rbuf, rsize);
+
+ error:
+ return ctl_error(EINVAL, rbuf, rsize);
+}
+
+/* not supported */
+static int inet_ctl_ifset(inet_descriptor* desc, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+}
+
+
+#elif defined(SIOCGIFCONF) && defined(SIOCSIFFLAGS)
+/* cygwin has SIOCGIFCONF but not SIOCSIFFLAGS (Nov 2002) */
+
+#define VOIDP(x) ((void*)(x))
+#if defined(AF_LINK) && !defined(NO_SA_LEN)
+#define SIZEA(p) (((p).sa_len > sizeof(p)) ? (p).sa_len : sizeof(p))
+#else
+#define SIZEA(p) (sizeof (p))
+#endif
+
+
+static int inet_ctl_getiflist(inet_descriptor* desc, char** rbuf, int rsize)
+{
+ struct ifconf ifc;
+ struct ifreq *ifr;
+ char *buf;
+ int buflen, ifc_len, i;
+ char *sbuf, *sp;
+
+ /* Courtesy of Per Bergqvist and W. Richard Stevens */
+
+ ifc_len = 0;
+ buflen = 100 * sizeof(struct ifreq);
+ buf = ALLOC(buflen);
+
+ for (;;) {
+ ifc.ifc_len = buflen;
+ ifc.ifc_buf = buf;
+ if (ioctl(desc->s, SIOCGIFCONF, (char *)&ifc) < 0) {
+ int res = sock_errno();
+ if (res != EINVAL || ifc_len) {
+ FREE(buf);
+ return ctl_error(res, rbuf, rsize);
+ }
+ } else {
+ if (ifc.ifc_len == ifc_len) break; /* buf large enough */
+ ifc_len = ifc.ifc_len;
+ }
+ buflen += 10 * sizeof(struct ifreq);
+ buf = (char *)REALLOC(buf, buflen);
+ }
+
+ sp = sbuf = ALLOC(ifc_len+1);
+ *sp++ = INET_REP_OK;
+ i = 0;
+ for (;;) {
+ int n;
+
+ ifr = (struct ifreq *) VOIDP(buf + i);
+ n = sizeof(ifr->ifr_name) + SIZEA(ifr->ifr_addr);
+ if (n < sizeof(*ifr)) n = sizeof(*ifr);
+ if (i+n > ifc_len) break;
+ i += n;
+
+ switch (ifr->ifr_addr.sa_family) {
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ case AF_INET6:
+#endif
+ case AF_INET:
+ ASSERT(sp+IFNAMSIZ+1 < sbuf+buflen+1)
+ strncpy(sp, ifr->ifr_name, IFNAMSIZ);
+ sp[IFNAMSIZ] = '\0';
+ sp += strlen(sp), ++sp;
+ }
+
+ if (i >= ifc_len) break;
+ }
+ FREE(buf);
+ *rbuf = sbuf;
+ return sp - sbuf;
+}
+
+
+
+static int inet_ctl_ifget(inet_descriptor* desc, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ char sbuf[BUFSIZ];
+ char* sptr;
+ char* s_end = sbuf + BUFSIZ;
+ struct ifreq ifreq;
+ int namlen;
+
+ if ((len == 0) || ((namlen = buf[0]) > len))
+ goto error;
+ sys_memset(ifreq.ifr_name, '\0', IFNAMSIZ);
+ sys_memcpy(ifreq.ifr_name, buf+1,
+ (namlen > IFNAMSIZ) ? IFNAMSIZ : namlen);
+ buf += (namlen+1);
+ len -= (namlen+1);
+ sptr = sbuf;
+
+ while (len--) {
+ switch(*buf++) {
+ case INET_IFOPT_ADDR:
+ if (ioctl(desc->s, SIOCGIFADDR, (char *)&ifreq) < 0)
+ break;
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_ADDR;
+ if ((sptr = sockaddr_to_buf(&ifreq.ifr_addr, sptr, s_end)) == NULL)
+ goto error;
+ break;
+
+ case INET_IFOPT_HWADDR: {
+#ifdef SIOCGIFHWADDR
+ if (ioctl(desc->s, SIOCGIFHWADDR, (char *)&ifreq) < 0)
+ break;
+ buf_check(sptr, s_end, 1+IFHWADDRLEN);
+ *sptr++ = INET_IFOPT_HWADDR;
+ /* raw memcpy (fix include autoconf later) */
+ sys_memcpy(sptr, (char*)(&ifreq.ifr_hwaddr.sa_data), IFHWADDRLEN);
+ sptr += IFHWADDRLEN;
+#endif
+ break;
+ }
+
+
+ case INET_IFOPT_BROADADDR:
+#ifdef SIOCGIFBRDADDR
+ if (ioctl(desc->s, SIOCGIFBRDADDR, (char *)&ifreq) < 0)
+ break;
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_BROADADDR;
+ if ((sptr=sockaddr_to_buf(&ifreq.ifr_broadaddr,sptr,s_end)) == NULL)
+ goto error;
+#endif
+ break;
+
+ case INET_IFOPT_DSTADDR:
+#ifdef SIOCGIFDSTADDR
+ if (ioctl(desc->s, SIOCGIFDSTADDR, (char *)&ifreq) < 0)
+ break;
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_DSTADDR;
+ if ((sptr = sockaddr_to_buf(&ifreq.ifr_dstaddr,sptr,s_end)) == NULL)
+ goto error;
+#endif
+ break;
+
+ case INET_IFOPT_NETMASK:
+#if defined(SIOCGIFNETMASK)
+ if (ioctl(desc->s, SIOCGIFNETMASK, (char *)&ifreq) < 0)
+ break;
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_NETMASK;
+#if defined(ifr_netmask)
+ sptr = sockaddr_to_buf(&ifreq.ifr_netmask,sptr,s_end);
+#else
+ /* SIOCGNETMASK exist but not macro ??? */
+ sptr = sockaddr_to_buf(&ifreq.ifr_addr,sptr,s_end);
+#endif
+ if (sptr == NULL)
+ goto error;
+#else
+ if (ioctl(desc->s, SIOCGIFADDR, (char *)&ifreq) < 0)
+ break;
+ else {
+ struct sockadd_in* ap;
+ /* emulate netmask,
+ * (wasted stuff since noone uses classes)
+ */
+ buf_check(sptr, s_end, 1);
+ *sptr++ = INET_IFOPT_NETMASK;
+ ap = (struct sockaddr_in*) VOIDP(&ifreq.ifr_addr);
+ ap->sin_addr = net_mask(ap->sin_addr);
+ if ((sptr = sockaddr_to_buf(&ifreq.ifr_addr,sptr,s_end)) == NULL)
+ goto error;
+ }
+#endif
+ break;
+
+ case INET_IFOPT_MTU: {
+#if defined(SIOCGIFMTU) && defined(ifr_mtu)
+ int n;
+
+ if (ioctl(desc->s, SIOCGIFMTU, (char *)&ifreq) < 0)
+ break;
+ buf_check(sptr, s_end, 5);
+ *sptr++ = INET_IFOPT_MTU;
+ n = ifreq.ifr_mtu;
+ put_int32(n, sptr);
+ sptr += 4;
+#endif
+ break;
+ }
+
+ case INET_IFOPT_FLAGS: {
+ int flags;
+ int eflags = 0;
+
+ if (ioctl(desc->s, SIOCGIFFLAGS, (char*)&ifreq) < 0)
+ flags = 0;
+ else
+ flags = ifreq.ifr_flags;
+ /* translate flags */
+ if (flags & IFF_UP)
+ eflags |= INET_IFF_UP;
+ if (flags & IFF_BROADCAST)
+ eflags |= INET_IFF_BROADCAST;
+ if (flags & IFF_LOOPBACK)
+ eflags |= INET_IFF_LOOPBACK;
+ if (flags & IFF_POINTOPOINT)
+ eflags |= INET_IFF_POINTTOPOINT;
+ if (flags & IFF_RUNNING)
+ eflags |= INET_IFF_RUNNING;
+ if (flags & IFF_MULTICAST)
+ eflags |= INET_IFF_MULTICAST;
+
+ buf_check(sptr, s_end, 5);
+ *sptr++ = INET_IFOPT_FLAGS;
+ put_int32(eflags, sptr);
+ sptr += 4;
+ break;
+ }
+ default:
+ goto error;
+ }
+ }
+ return ctl_reply(INET_REP_OK, sbuf, sptr - sbuf, rbuf, rsize);
+
+ error:
+ return ctl_error(EINVAL, rbuf, rsize);
+}
+
+/* FIXME: temporary hack */
+#ifndef IFHWADDRLEN
+#define IFHWADDRLEN 6
+#endif
+
+static int inet_ctl_ifset(inet_descriptor* desc, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ struct ifreq ifreq;
+ int namlen;
+ char* b_end = buf + len;
+
+ if ((len == 0) || ((namlen = buf[0]) > len))
+ goto error;
+ sys_memset(ifreq.ifr_name, '\0', IFNAMSIZ);
+ sys_memcpy(ifreq.ifr_name, buf+1,
+ (namlen > IFNAMSIZ) ? IFNAMSIZ : namlen);
+ buf += (namlen+1);
+ len -= (namlen+1);
+
+ while(buf < b_end) {
+ switch(*buf++) {
+ case INET_IFOPT_ADDR:
+ if ((buf = buf_to_sockaddr(buf, b_end, &ifreq.ifr_addr)) == NULL)
+ goto error;
+ (void) ioctl(desc->s, SIOCSIFADDR, (char*)&ifreq);
+ break;
+
+ case INET_IFOPT_HWADDR:
+ buf_check(buf, b_end, IFHWADDRLEN);
+#ifdef SIOCSIFHWADDR
+ /* raw memcpy (fix include autoconf later) */
+ sys_memcpy((char*)(&ifreq.ifr_hwaddr.sa_data), buf, IFHWADDRLEN);
+
+ (void) ioctl(desc->s, SIOCSIFHWADDR, (char *)&ifreq);
+#endif
+ buf += IFHWADDRLEN;
+ break;
+
+
+ case INET_IFOPT_BROADADDR:
+#ifdef SIOCSIFBRDADDR
+ if ((buf = buf_to_sockaddr(buf, b_end, &ifreq.ifr_broadaddr)) == NULL)
+ goto error;
+ (void) ioctl(desc->s, SIOCSIFBRDADDR, (char *)&ifreq);
+#endif
+ break;
+
+ case INET_IFOPT_DSTADDR:
+#ifdef SIOCSIFDSTADDR
+ if ((buf = buf_to_sockaddr(buf, b_end, &ifreq.ifr_dstaddr)) == NULL)
+ goto error;
+ (void) ioctl(desc->s, SIOCSIFDSTADDR, (char *)&ifreq);
+#endif
+ break;
+
+ case INET_IFOPT_NETMASK:
+#ifdef SIOCSIFNETMASK
+
+#if defined(ifr_netmask)
+ buf = buf_to_sockaddr(buf,b_end, &ifreq.ifr_netmask);
+#else
+ buf = buf_to_sockaddr(buf,b_end, &ifreq.ifr_addr);
+#endif
+ if (buf == NULL)
+ goto error;
+ (void) ioctl(desc->s, SIOCSIFNETMASK, (char *)&ifreq);
+#endif
+ break;
+
+ case INET_IFOPT_MTU:
+ buf_check(buf, b_end, 4);
+#if defined(SIOCSIFMTU) && defined(ifr_mtu)
+ ifreq.ifr_mtu = get_int32(buf);
+ (void) ioctl(desc->s, SIOCSIFMTU, (char *)&ifreq);
+#endif
+ buf += 4;
+ break;
+
+ case INET_IFOPT_FLAGS: {
+ int flags0;
+ int flags;
+ int eflags;
+
+ buf_check(buf, b_end, 4);
+ eflags = get_int32(buf);
+
+ /* read current flags */
+ if (ioctl(desc->s, SIOCGIFFLAGS, (char*)&ifreq) < 0)
+ flags0 = flags = 0;
+ else
+ flags0 = flags = ifreq.ifr_flags;
+
+ /* update flags */
+ if (eflags & INET_IFF_UP) flags |= IFF_UP;
+ if (eflags & INET_IFF_DOWN) flags &= ~IFF_UP;
+ if (eflags & INET_IFF_BROADCAST) flags |= IFF_BROADCAST;
+ if (eflags & INET_IFF_NBROADCAST) flags &= ~IFF_BROADCAST;
+ if (eflags & INET_IFF_POINTTOPOINT) flags |= IFF_POINTOPOINT;
+ if (eflags & INET_IFF_NPOINTTOPOINT) flags &= ~IFF_POINTOPOINT;
+
+ if (flags != flags0) {
+ ifreq.ifr_flags = flags;
+ (void) ioctl(desc->s, SIOCSIFFLAGS, (char*)&ifreq);
+ }
+ buf += 4;
+ break;
+ }
+
+ default:
+ goto error;
+ }
+ }
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+
+ error:
+ return ctl_error(EINVAL, rbuf, rsize);
+}
+
+#else
+
+
+static int inet_ctl_getiflist(inet_descriptor* desc, char** rbuf, int rsize)
+{
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+}
+
+
+static int inet_ctl_ifget(inet_descriptor* desc, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+}
+
+
+static int inet_ctl_ifset(inet_descriptor* desc, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+}
+
+#endif
+
+#ifdef VXWORKS
+/*
+** THIS is a terrible creature, a bug in the TCP part
+** of the old VxWorks stack (non SENS) created a race.
+** If (and only if?) a socket got closed from the other
+** end and we tried a set/getsockopt on the TCP level,
+** the task would generate a bus error...
+*/
+static STATUS wrap_sockopt(STATUS (*function)() /* Yep, no parameter
+ check */,
+ int s, int level, int optname,
+ char *optval, unsigned int optlen
+ /* optlen is a pointer if function
+ is getsockopt... */)
+{
+ fd_set rs;
+ struct timeval timeout;
+ int to_read;
+ int ret;
+
+ FD_ZERO(&rs);
+ FD_SET(s,&rs);
+ memset(&timeout,0,sizeof(timeout));
+ if (level == IPPROTO_TCP) {
+ taskLock();
+ if (select(s+1,&rs,NULL,NULL,&timeout)) {
+ if (ioctl(s,FIONREAD,(int)&to_read) == ERROR ||
+ to_read == 0) { /* End of file, other end closed? */
+ sock_errno() = EBADF;
+ taskUnlock();
+ return ERROR;
+ }
+ }
+ ret = (*function)(s,level,optname,optval,optlen);
+ taskUnlock();
+ } else {
+ ret = (*function)(s,level,optname,optval,optlen);
+ }
+ return ret;
+}
+#endif
+
+#if defined(IP_TOS) && defined(SOL_IP) && defined(SO_PRIORITY)
+static int setopt_prio_tos_trick
+ (int fd, int proto, int type, char* arg_ptr, int arg_sz)
+{
+ /* The relations between SO_PRIORITY, TOS and other options
+ is not what you (or at least I) would expect...:
+ If TOS is set after priority, priority is zeroed.
+ If any other option is set after tos, tos might be zeroed.
+ Therefore, save tos and priority. If something else is set,
+ restore both after setting, if tos is set, restore only
+ prio and if prio is set restore none... All to keep the
+ user feeling socket options are independent. /PaN */
+ int tmp_ival_prio;
+ int tmp_ival_tos;
+ int res;
+#ifdef HAVE_SOCKLEN_T
+ socklen_t
+#else
+ int
+#endif
+ tmp_arg_sz_prio = sizeof(tmp_ival_prio),
+ tmp_arg_sz_tos = sizeof(tmp_ival_tos);
+
+ res = sock_getopt(fd, SOL_SOCKET, SO_PRIORITY,
+ (char *) &tmp_ival_prio, &tmp_arg_sz_prio);
+ if (res == 0) {
+ res = sock_getopt(fd, SOL_IP, IP_TOS,
+ (char *) &tmp_ival_tos, &tmp_arg_sz_tos);
+ if (res == 0) {
+ res = sock_setopt(fd, proto, type, arg_ptr, arg_sz);
+ if (res == 0) {
+ if (type != SO_PRIORITY) {
+ if (type != IP_TOS) {
+ res = sock_setopt(fd,
+ SOL_IP,
+ IP_TOS,
+ (char *) &tmp_ival_tos,
+ tmp_arg_sz_tos);
+ }
+ if (res == 0) {
+ res = sock_setopt(fd,
+ SOL_SOCKET,
+ SO_PRIORITY,
+ (char *) &tmp_ival_prio,
+ tmp_arg_sz_prio);
+ }
+ }
+ }
+ }
+ }
+ return (res);
+}
+#endif
+
+/* set socket options:
+** return -1 on error
+** 0 if ok
+** 1 if ok force deliver of queued data
+*/
+#ifdef HAVE_SCTP
+static int sctp_set_opts(inet_descriptor* desc, char* ptr, int len);
+#endif
+
+static int inet_set_opts(inet_descriptor* desc, char* ptr, int len)
+{
+ int type;
+ int proto;
+ int opt;
+ struct linger li_val;
+#ifdef HAVE_MULTICAST_SUPPORT
+ struct ip_mreq mreq_val;
+#endif
+ int ival;
+ char* arg_ptr;
+ int arg_sz;
+ enum PacketParseType old_htype = desc->htype;
+ int old_active = desc->active;
+ int propagate = 0; /* Set to 1 if failure to set this option
+ should be propagated to erlang (not all
+ errors can be propagated for BC reasons) */
+ int res;
+#ifdef HAVE_SCTP
+ /* SCTP sockets are treated completely separately: */
+ if (IS_SCTP(desc))
+ return sctp_set_opts(desc, ptr, len);
+#endif
+
+ while(len >= 5) {
+ opt = *ptr++;
+ ival = get_int32(ptr);
+ ptr += 4;
+ len -= 5;
+ arg_ptr = (char*) &ival;
+ arg_sz = sizeof(ival);
+ proto = SOL_SOCKET;
+
+ switch(opt) {
+ case INET_LOPT_HEADER:
+ DEBUGF(("inet_set_opts(%ld): s=%d, HEADER=%d\r\n",
+ (long)desc->port, desc->s,ival));
+ desc->hsz = ival;
+ continue;
+
+ case INET_LOPT_MODE:
+ /* List or Binary: */
+ DEBUGF(("inet_set_opts(%ld): s=%d, MODE=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ desc->mode = ival;
+ continue;
+
+ case INET_LOPT_DELIVER:
+ DEBUGF(("inet_set_opts(%ld): s=%d, DELIVER=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ desc->deliver = ival;
+ continue;
+
+ case INET_LOPT_BUFFER:
+ DEBUGF(("inet_set_opts(%ld): s=%d, BUFFER=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ if (ival > INET_MAX_BUFFER) ival = INET_MAX_BUFFER;
+ else if (ival < INET_MIN_BUFFER) ival = INET_MIN_BUFFER;
+ desc->bufsz = ival;
+ continue;
+
+ case INET_LOPT_ACTIVE:
+ DEBUGF(("inet_set_opts(%ld): s=%d, ACTIVE=%d\r\n",
+ (long)desc->port, desc->s,ival));
+ desc->active = ival;
+ if ((desc->stype == SOCK_STREAM) && (desc->active != INET_PASSIVE) &&
+ (desc->state == INET_STATE_CLOSED)) {
+ tcp_closed_message((tcp_descriptor *) desc);
+ if (desc->exitf) {
+ driver_exit(desc->port, 0);
+ return 0; /* Give up on this socket, descriptor lost */
+ } else {
+ desc_close_read(desc);
+ }
+ }
+ continue;
+
+ case INET_LOPT_PACKET:
+ DEBUGF(("inet_set_opts(%ld): s=%d, PACKET=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ desc->htype = ival;
+ continue;
+
+ case INET_LOPT_PACKET_SIZE:
+ DEBUGF(("inet_set_opts(%ld): s=%d, PACKET_SIZE=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ desc->psize = (unsigned int)ival;
+ continue;
+
+ case INET_LOPT_EXITONCLOSE:
+ DEBUGF(("inet_set_opts(%ld): s=%d, EXITONCLOSE=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ desc->exitf = ival;
+ continue;
+
+ case INET_LOPT_BIT8:
+ DEBUGF(("inet_set_opts(%ld): s=%d, BIT8=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ switch(ival) {
+ case INET_BIT8_ON:
+ desc->bit8f = 1;
+ desc->bit8 = 0;
+ break;
+ case INET_BIT8_OFF:
+ desc->bit8f = 0;
+ desc->bit8 = 0;
+ break;
+ case INET_BIT8_CLEAR:
+ desc->bit8f = 1;
+ desc->bit8 = 0;
+ break;
+ case INET_BIT8_SET:
+ desc->bit8f = 1;
+ desc->bit8 = 1;
+ break;
+ }
+ continue;
+
+ case INET_LOPT_TCP_HIWTRMRK:
+ if (desc->stype == SOCK_STREAM) {
+ tcp_descriptor* tdesc = (tcp_descriptor*) desc;
+ if (ival < 0) ival = 0;
+ else if (ival > INET_MAX_BUFFER*2) ival = INET_MAX_BUFFER*2;
+ if (tdesc->low > ival)
+ tdesc->low = ival;
+ tdesc->high = ival;
+ }
+ continue;
+
+ case INET_LOPT_TCP_LOWTRMRK:
+ if (desc->stype == SOCK_STREAM) {
+ tcp_descriptor* tdesc = (tcp_descriptor*) desc;
+ if (ival < 0) ival = 0;
+ else if (ival > INET_MAX_BUFFER) ival = INET_MAX_BUFFER;
+ if (tdesc->high < ival)
+ tdesc->high = ival;
+ tdesc->low = ival;
+ }
+ continue;
+
+ case INET_LOPT_TCP_SEND_TIMEOUT:
+ if (desc->stype == SOCK_STREAM) {
+ tcp_descriptor* tdesc = (tcp_descriptor*) desc;
+ tdesc->send_timeout = ival;
+ }
+ continue;
+
+ case INET_LOPT_TCP_SEND_TIMEOUT_CLOSE:
+ if (desc->stype == SOCK_STREAM) {
+ tcp_descriptor* tdesc = (tcp_descriptor*) desc;
+ tdesc->send_timeout_close = ival;
+ }
+ continue;
+
+
+ case INET_LOPT_TCP_DELAY_SEND:
+ if (desc->stype == SOCK_STREAM) {
+ tcp_descriptor* tdesc = (tcp_descriptor*) desc;
+ if (ival)
+ tdesc->tcp_add_flags |= TCP_ADDF_DELAY_SEND;
+ else
+ tdesc->tcp_add_flags &= ~TCP_ADDF_DELAY_SEND;
+ }
+ continue;
+
+ case INET_LOPT_UDP_READ_PACKETS:
+ if (desc->stype == SOCK_DGRAM) {
+ udp_descriptor* udesc = (udp_descriptor*) desc;
+ if (ival <= 0) return -1;
+ udesc->read_packets = ival;
+ }
+ continue;
+
+ case INET_OPT_REUSEADDR:
+#ifdef __WIN32__
+ continue; /* Bjorn says */
+#else
+ type = SO_REUSEADDR;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_REUSEADDR=%d\r\n",
+ (long)desc->port, desc->s,ival));
+ break;
+#endif
+ case INET_OPT_KEEPALIVE: type = SO_KEEPALIVE;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_KEEPALIVE=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ break;
+ case INET_OPT_DONTROUTE: type = SO_DONTROUTE;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_DONTROUTE=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ break;
+ case INET_OPT_BROADCAST: type = SO_BROADCAST;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_BROADCAST=%d\r\n",
+ (long)desc->port, desc->s,ival));
+ break;
+ case INET_OPT_OOBINLINE: type = SO_OOBINLINE;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_OOBINLINE=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ break;
+ case INET_OPT_SNDBUF: type = SO_SNDBUF;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_SNDBUF=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ /*
+ * Setting buffer sizes in VxWorks gives unexpected results
+ * our workaround is to leave it at default.
+ */
+#ifdef VXWORKS
+ goto skip_os_setopt;
+#else
+ break;
+#endif
+ case INET_OPT_RCVBUF: type = SO_RCVBUF;
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_RCVBUF=%d\r\n",
+ (long)desc->port, desc->s, ival));
+#ifdef VXWORKS
+ goto skip_os_setopt;
+#else
+ break;
+#endif
+ case INET_OPT_LINGER: type = SO_LINGER;
+ if (len < 4)
+ return -1;
+ li_val.l_onoff = ival;
+ li_val.l_linger = get_int32(ptr);
+ ptr += 4;
+ len -= 4;
+ arg_ptr = (char*) &li_val;
+ arg_sz = sizeof(li_val);
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_LINGER=%d,%d",
+ (long)desc->port, desc->s, li_val.l_onoff,li_val.l_linger));
+ break;
+
+ case INET_OPT_PRIORITY:
+#ifdef SO_PRIORITY
+ type = SO_PRIORITY;
+ propagate = 1; /* We do want to know if this fails */
+ DEBUGF(("inet_set_opts(%ld): s=%d, SO_PRIORITY=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ break;
+#else
+ continue;
+#endif
+ case INET_OPT_TOS:
+#if defined(IP_TOS) && defined(SOL_IP)
+ proto = SOL_IP;
+ type = IP_TOS;
+ propagate = 1;
+ DEBUGF(("inet_set_opts(%ld): s=%d, IP_TOS=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ break;
+#else
+ continue;
+#endif
+
+ case TCP_OPT_NODELAY:
+ proto = IPPROTO_TCP;
+ type = TCP_NODELAY;
+ DEBUGF(("inet_set_opts(%ld): s=%d, TCP_NODELAY=%d\r\n",
+ (long)desc->port, desc->s, ival));
+ break;
+
+#ifdef HAVE_MULTICAST_SUPPORT
+
+ case UDP_OPT_MULTICAST_TTL:
+ proto = IPPROTO_IP;
+ type = IP_MULTICAST_TTL;
+ DEBUGF(("inet_set_opts(%ld): s=%d, IP_MULTICAST_TTL=%d\r\n",
+ (long)desc->port,desc->s,ival));
+ break;
+
+ case UDP_OPT_MULTICAST_LOOP:
+ proto = IPPROTO_IP;
+ type = IP_MULTICAST_LOOP;
+ DEBUGF(("inet_set_opts(%ld): s=%d, IP_MULTICAST_LOOP=%d\r\n",
+ (long)desc->port,desc->s,ival));
+ break;
+
+ case UDP_OPT_MULTICAST_IF:
+ proto = IPPROTO_IP;
+ type = IP_MULTICAST_IF;
+ DEBUGF(("inet_set_opts(%ld): s=%d, IP_MULTICAST_IF=%x\r\n",
+ (long)desc->port, desc->s, ival));
+ ival = sock_htonl(ival);
+ break;
+
+ case UDP_OPT_ADD_MEMBERSHIP:
+ proto = IPPROTO_IP;
+ type = IP_ADD_MEMBERSHIP;
+ DEBUGF(("inet_set_opts(%ld): s=%d, IP_ADD_MEMBERSHIP=%d\r\n",
+ (long)desc->port, desc->s,ival));
+ goto L_set_mreq;
+
+ case UDP_OPT_DROP_MEMBERSHIP:
+ proto = IPPROTO_IP;
+ type = IP_DROP_MEMBERSHIP;
+ DEBUGF(("inet_set_opts(%ld): s=%d, IP_DROP_MEMBERSHIP=%x\r\n",
+ (long)desc->port, desc->s, ival));
+ L_set_mreq:
+ mreq_val.imr_multiaddr.s_addr = sock_htonl(ival);
+ ival = get_int32(ptr);
+ mreq_val.imr_interface.s_addr = sock_htonl(ival);
+ ptr += 4;
+ len -= 4;
+ arg_ptr = (char*)&mreq_val;
+ arg_sz = sizeof(mreq_val);
+ break;
+
+#endif /* HAVE_MULTICAST_SUPPORT */
+
+ case INET_OPT_RAW:
+ if (len < 8) {
+ return -1;
+ }
+ proto = ival;
+ type = get_int32(ptr);
+ ptr += 4;
+ arg_sz = get_int32(ptr);
+ ptr += 4;
+ len -= 8;
+ if (len < arg_sz) {
+ return -1;
+ }
+ arg_ptr = ptr;
+ ptr += arg_sz;
+ len -= arg_sz;
+ break;
+
+ default:
+ return -1;
+ }
+#if defined(IP_TOS) && defined(SOL_IP) && defined(SO_PRIORITY)
+ res = setopt_prio_tos_trick (desc->s, proto, type, arg_ptr, arg_sz);
+#else
+ res = sock_setopt (desc->s, proto, type, arg_ptr, arg_sz);
+#endif
+ if (propagate && res != 0) {
+ return -1;
+ }
+ DEBUGF(("inet_set_opts(%ld): s=%d returned %d\r\n",
+ (long)desc->port, desc->s, res));
+#ifdef VXWORKS
+skip_os_setopt:
+#endif
+ if (type == SO_RCVBUF) {
+ /* make sure we have desc->bufsz >= SO_RCVBUF */
+ if (ival > desc->bufsz)
+ desc->bufsz = ival;
+ }
+ }
+
+ if ( ((desc->stype == SOCK_STREAM) && IS_CONNECTED(desc)) ||
+ ((desc->stype == SOCK_DGRAM) && IS_OPEN(desc))) {
+
+ if (desc->active != old_active)
+ sock_select(desc, (FD_READ|FD_CLOSE), (desc->active>0));
+
+ if ((desc->stype==SOCK_STREAM) && desc->active) {
+ if (!old_active || (desc->htype != old_htype)) {
+ /* passive => active change OR header type change in active mode */
+ return 1;
+ }
+ return 0;
+ }
+ }
+ return 0;
+}
+
+#ifdef HAVE_SCTP
+
+/* "sctp_get_initmsg":
+** Used by both "send*" and "setsockopt". Gets the 4 fields of "sctp_initmsg"
+** from the input buffer:
+*/
+#define SCTP_GET_INITMSG_LEN (4*2)
+static char* sctp_get_initmsg(struct sctp_initmsg* ini, char* curr)
+{
+ ini->sinit_num_ostreams = get_int16 (curr); curr += 2;
+ ini->sinit_max_instreams = get_int16 (curr); curr += 2;
+ ini->sinit_max_attempts = get_int16 (curr); curr += 2;
+ ini->sinit_max_init_timeo = get_int16 (curr); curr += 2;
+ return curr;
+}
+
+/* "sctp_get_sendparams":
+** Parses (from the command buffer) the 6 user-sprcified parms of
+** "sctp_sndrcvinfo":
+** stream(u16), flags(u16), ppid(u32), context(u32),
+** timetoleave(u32), assoc_id
+** Is used by both "send*" and "setsockopt":
+*/
+#define SCTP_GET_SENDPARAMS_LEN (2*2 + 3*4 + ASSOC_ID_LEN)
+static char* sctp_get_sendparams (struct sctp_sndrcvinfo* sri, char* curr)
+{
+ int eflags;
+ int cflags;
+
+ sri->sinfo_stream = get_int16(curr); curr += 2;
+ sri->sinfo_ssn = 0;
+
+ /* The "flags" are already ORed at the Erlang side, here we
+ reconstruct the real SCTP flags:
+ */
+ eflags = get_int16(curr); curr += 2;
+ cflags = 0;
+ if (eflags & SCTP_FLAG_UNORDERED) cflags |= SCTP_UNORDERED;
+ if (eflags & SCTP_FLAG_ADDR_OVER) cflags |= SCTP_ADDR_OVER;
+ if (eflags & SCTP_FLAG_ABORT) cflags |= SCTP_ABORT;
+ if (eflags & SCTP_FLAG_EOF) cflags |= SCTP_EOF;
+
+ sri->sinfo_flags = cflags;
+ sri->sinfo_ppid = sock_htonl(get_int32(curr));
+ curr += 4;
+ sri->sinfo_context = get_int32(curr); curr += 4;
+ sri->sinfo_timetolive = get_int32(curr); curr += 4;
+ sri->sinfo_tsn = 0;
+ sri->sinfo_cumtsn = 0;
+ sri->sinfo_assoc_id = GET_ASSOC_ID (curr); curr += ASSOC_ID_LEN;
+
+ return curr;
+}
+
+/* Set SCTP options:
+** return -1 on error
+** 0 if ok
+** NB: unlike inet_set_opts(), we don't have an active mode here, so there is no
+** mode change which could force data delivery on setting an option.
+** Arg: "ptr": [(erlang_encoded_opt(u8), value(...)), ...]; thus, multiple opts
+** can be set at a time.
+*/
+static int sctp_set_opts(inet_descriptor* desc, char* ptr, int len)
+{
+# define CHKLEN(Ptr, Len) \
+ do { \
+ if ((Ptr) + (Len) > ptr + len) return -1; \
+ } while (0)
+
+ char * curr = ptr;
+ int proto, type, res;
+
+ /* The following union is used to hold any arg to "setsockopt": */
+ union opts_union
+ {
+ int ival;
+ struct sctp_rtoinfo rtoi;
+ struct sctp_assocparams ap;
+ struct sctp_initmsg im;
+ struct linger lin;
+ struct sctp_setpeerprim prim;
+ struct sctp_setadaptation ad;
+ struct sctp_paddrparams pap;
+ struct sctp_sndrcvinfo sri;
+ struct sctp_event_subscribe es;
+# ifdef SCTP_DELAYED_ACK_TIME
+ struct sctp_assoc_value av; /* Not in SOLARIS10 */
+# endif
+ }
+ arg;
+
+ char * arg_ptr = NULL;
+ int arg_sz = 0;
+ int old_active = desc->active;
+
+ while (curr < ptr + len)
+ {
+ /* Get the Erlang-encoded option type -- always 1 byte: */
+ int eopt = *curr;
+ curr++;
+
+ /* Get the option value. XXX: The condition (curr < ptr + len)
+ does not preclude us from reading from beyond the buffer end,
+ if the Erlang part of the driver specifies its input wrongly!
+ */
+ CHKLEN(curr, 4); /* All options need at least 4 bytes */
+ switch(eopt)
+ {
+ /* Local INET options: */
+
+ case INET_LOPT_BUFFER:
+ desc->bufsz = get_int32(curr); curr += 4;
+
+ if (desc->bufsz > INET_MAX_BUFFER)
+ desc->bufsz = INET_MAX_BUFFER;
+ else
+ if (desc->bufsz < INET_MIN_BUFFER)
+ desc->bufsz = INET_MIN_BUFFER;
+ res = 0; /* This does not affect the kernel buffer size */
+ continue;
+
+ case INET_LOPT_MODE:
+ desc->mode = get_int32(curr); curr += 4;
+ res = 0;
+ continue;
+
+ case INET_LOPT_ACTIVE:
+ desc->active = get_int32(curr); curr += 4;
+ res = 0;
+ continue;
+
+ /* SCTP options and applicable generic INET options: */
+
+ case SCTP_OPT_RTOINFO:
+ {
+ CHKLEN(curr, ASSOC_ID_LEN + 3*4);
+ arg.rtoi.srto_assoc_id = GET_ASSOC_ID(curr); curr += ASSOC_ID_LEN;
+ arg.rtoi.srto_initial = get_int32 (curr); curr += 4;
+ arg.rtoi.srto_max = get_int32 (curr); curr += 4;
+ arg.rtoi.srto_min = get_int32 (curr); curr += 4;
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_RTOINFO;
+ arg_ptr = (char*) (&arg.rtoi);
+ arg_sz = sizeof ( arg.rtoi);
+ break;
+ }
+ case SCTP_OPT_ASSOCINFO:
+ {
+ CHKLEN(curr, ASSOC_ID_LEN + 2*2 + 3*4);
+
+ arg.ap.sasoc_assoc_id = GET_ASSOC_ID(curr); curr += ASSOC_ID_LEN;
+ arg.ap.sasoc_asocmaxrxt = get_int16 (curr); curr += 2;
+ arg.ap.sasoc_number_peer_destinations =
+ get_int16 (curr); curr += 2;
+ arg.ap.sasoc_peer_rwnd = get_int32 (curr); curr += 4;
+ arg.ap.sasoc_local_rwnd = get_int32 (curr); curr += 4;
+ arg.ap.sasoc_cookie_life = get_int32 (curr); curr += 4;
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_ASSOCINFO;
+ arg_ptr = (char*) (&arg.ap);
+ arg_sz = sizeof ( arg.ap);
+ break;
+ }
+ case SCTP_OPT_INITMSG:
+ {
+ CHKLEN(curr, SCTP_GET_INITMSG_LEN);
+ curr = sctp_get_initmsg (&arg.im, curr);
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_INITMSG;
+ arg_ptr = (char*) (&arg.im);
+ arg_sz = sizeof ( arg.im);
+ break;
+ }
+ case INET_OPT_LINGER:
+ {
+ CHKLEN(curr, ASSOC_ID_LEN + 2 + 4);
+ arg.lin.l_onoff = get_int16 (curr); curr += 2;
+ arg.lin.l_linger = get_int32 (curr); curr += 4;
+
+ proto = SOL_SOCKET;
+ type = SO_LINGER;
+ arg_ptr = (char*) (&arg.lin);
+ arg_sz = sizeof ( arg.lin);
+ break;
+ }
+ case SCTP_OPT_NODELAY:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = IPPROTO_SCTP;
+ type = SCTP_NODELAY;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case INET_OPT_RCVBUF:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = SOL_SOCKET;
+ type = SO_RCVBUF;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+
+ /* Adjust the size of the user-level recv buffer, so it's not
+ smaller than the kernel one: */
+ if (desc->bufsz <= arg.ival)
+ desc->bufsz = arg.ival;
+ break;
+ }
+ case INET_OPT_SNDBUF:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = SOL_SOCKET;
+ type = SO_SNDBUF;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+
+ /* Adjust the size of the user-level recv buffer, so it's not
+ smaller than the kernel one: */
+ if (desc->bufsz <= arg.ival)
+ desc->bufsz = arg.ival;
+ break;
+ }
+ case INET_OPT_REUSEADDR:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = SOL_SOCKET;
+ type = SO_REUSEADDR;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case INET_OPT_DONTROUTE:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = SOL_SOCKET;
+ type = SO_DONTROUTE;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case INET_OPT_PRIORITY:
+# ifdef SO_PRIORITY
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = SOL_SOCKET;
+ type = SO_PRIORITY;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+# else
+ continue; /* Option not supported -- ignore it */
+# endif
+
+ case INET_OPT_TOS:
+# if defined(IP_TOS) && defined(SOL_IP)
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = SOL_IP;
+ type = IP_TOS;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+# else
+ continue; /* Option not supported -- ignore it */
+# endif
+
+ case SCTP_OPT_AUTOCLOSE:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = IPPROTO_SCTP;
+ type = SCTP_AUTOCLOSE;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case SCTP_OPT_DISABLE_FRAGMENTS:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = IPPROTO_SCTP;
+ type = SCTP_DISABLE_FRAGMENTS;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case SCTP_OPT_I_WANT_MAPPED_V4_ADDR:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = IPPROTO_SCTP;
+ type = SCTP_I_WANT_MAPPED_V4_ADDR;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case SCTP_OPT_MAXSEG:
+ {
+ arg.ival= get_int32 (curr); curr += 4;
+ proto = IPPROTO_SCTP;
+ type = SCTP_MAXSEG;
+ arg_ptr = (char*) (&arg.ival);
+ arg_sz = sizeof ( arg.ival);
+ break;
+ }
+ case SCTP_OPT_PRIMARY_ADDR:
+ case SCTP_OPT_SET_PEER_PRIMARY_ADDR:
+ {
+ int alen;
+ char *after;
+
+ CHKLEN(curr, ASSOC_ID_LEN);
+ /* XXX: These 2 opts have isomorphic value data structures,
+ "sctp_setpeerprim" and "sctp_prim" (in Solaris 10, the latter
+ is called "sctp_setprim"), so we grouped them together:
+ */
+ arg.prim.sspp_assoc_id = GET_ASSOC_ID(curr); curr += ASSOC_ID_LEN;
+
+ /* Fill in "arg.prim.sspp_addr": */
+ alen = ptr + len - curr;
+ after = inet_set_faddress(desc->sfamily,
+ (inet_address*) (&arg.prim.sspp_addr),
+ curr, &alen);
+ if (after == NULL)
+ return -1;
+ curr = after;
+
+ proto = IPPROTO_SCTP;
+ if (eopt == SCTP_OPT_PRIMARY_ADDR)
+ type = SCTP_PRIMARY_ADDR;
+ else
+ type = SCTP_SET_PEER_PRIMARY_ADDR;
+
+ arg_ptr = (char*) (&arg.prim);
+ arg_sz = sizeof ( arg.prim);
+ break;
+ }
+ case SCTP_OPT_ADAPTATION_LAYER:
+ {
+ /* XXX: do we need to convert the Ind into network byte order??? */
+ arg.ad.ssb_adaptation_ind = sock_htonl (get_int32(curr)); curr += 4;
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_ADAPTATION_LAYER;
+ arg_ptr = (char*) (&arg.ad);
+ arg_sz = sizeof ( arg.ad);
+ break;
+ }
+ case SCTP_OPT_PEER_ADDR_PARAMS:
+ {
+ int alen;
+ char *after;
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_FLAGS
+ int eflags, cflags, hb_enable, hb_disable,
+ pmtud_enable, pmtud_disable,
+ sackdelay_enable, sackdelay_disable;
+# endif
+
+ CHKLEN(curr, ASSOC_ID_LEN);
+ arg.pap.spp_assoc_id = GET_ASSOC_ID(curr); curr += ASSOC_ID_LEN;
+
+ /* Fill in "pap.spp_address": */
+ alen = ptr + len - curr;
+ after = inet_set_faddress(desc->sfamily,
+ (inet_address*) (&arg.pap.spp_address),
+ curr, &alen);
+ if (after == NULL)
+ return -1;
+ curr = after;
+
+ CHKLEN(curr, 4 + 2 + 3*4);
+
+ arg.pap.spp_hbinterval = get_int32(curr); curr += 4;
+ arg.pap.spp_pathmaxrxt = get_int16(curr); curr += 2;
+
+ /* The following are missing in Solaris 10: */
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_PATHMTU
+ arg.pap.spp_pathmtu = get_int32(curr);
+# endif
+ curr += 4;
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_SACKDELAY
+ arg.pap.spp_sackdelay = get_int32(curr);
+# endif
+ curr += 4;
+
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_FLAGS
+ /* Now re-construct the flags: */
+ eflags = get_int32(curr);
+ cflags = 0;
+
+ hb_enable = eflags & SCTP_FLAG_HB_ENABLE;
+ hb_disable = eflags & SCTP_FLAG_HB_DISABLE;
+ if (hb_enable && hb_disable)
+ return -1;
+ if (hb_enable) cflags |= SPP_HB_ENABLE;
+ if (hb_disable) cflags |= SPP_HB_DISABLE;
+ if (eflags & SCTP_FLAG_HB_DEMAND) cflags |= SPP_HB_DEMAND;
+
+ pmtud_enable = eflags & SCTP_FLAG_PMTUD_ENABLE;
+ pmtud_disable = eflags & SCTP_FLAG_PMTUD_DISABLE;
+ if (pmtud_enable && pmtud_disable)
+ return -1;
+ if (pmtud_enable) cflags |= SPP_PMTUD_ENABLE;
+ if (pmtud_disable) cflags |= SPP_PMTUD_DISABLE;
+
+ sackdelay_enable =eflags& SCTP_FLAG_SACDELAY_ENABLE;
+ sackdelay_disable=eflags& SCTP_FLAG_SACDELAY_DISABLE;
+ if (sackdelay_enable && sackdelay_disable)
+ return -1;
+ if (sackdelay_enable) cflags |= SPP_SACKDELAY_ENABLE;
+ if (sackdelay_disable) cflags |= SPP_SACKDELAY_DISABLE;
+
+ arg.pap.spp_flags = cflags;
+# endif
+ curr += 4;
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_PEER_ADDR_PARAMS;
+ arg_ptr = (char*) (&arg.pap);
+ arg_sz = sizeof ( arg.pap);
+ break;
+ }
+ case SCTP_OPT_DEFAULT_SEND_PARAM:
+ {
+ CHKLEN(curr, SCTP_GET_SENDPARAMS_LEN);
+ curr = sctp_get_sendparams (&arg.sri, curr);
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_DEFAULT_SEND_PARAM;
+ arg_ptr = (char*) (&arg.sri);
+ arg_sz = sizeof ( arg.sri);
+ break;
+ }
+ case SCTP_OPT_EVENTS:
+ {
+ CHKLEN(curr, 9);
+ /* We do not support "sctp_authentication_event" -- it is not
+ implemented in Linux Kernel SCTP anyway. Just in case if
+ the above structure has more fields than we support, zero
+ it out -- the extraneous events will NOT be used:
+ */
+ memset (&arg.es, 0, sizeof(arg.es));
+
+ /* The input "buf" must contain the full definition of all the
+ supported event fields, 1 byte per each, as each event is
+ either explicitly subscribed or cleared:
+ */
+ arg.es.sctp_data_io_event = get_int8(curr); curr++;
+ arg.es.sctp_association_event = get_int8(curr); curr++;
+ arg.es.sctp_address_event = get_int8(curr); curr++;
+ arg.es.sctp_send_failure_event = get_int8(curr); curr++;
+ arg.es.sctp_peer_error_event = get_int8(curr); curr++;
+ arg.es.sctp_shutdown_event = get_int8(curr); curr++;
+ arg.es.sctp_partial_delivery_event = get_int8(curr); curr++;
+ arg.es.sctp_adaptation_layer_event = get_int8(curr); curr++;
+ /* sctp_authentication_event not implemented */ curr++;
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_EVENTS;
+ arg_ptr = (char*) (&arg.es);
+ arg_sz = sizeof ( arg.es);
+ break;
+ }
+ /* The following is not available on Solaris 10: */
+# ifdef SCTP_DELAYED_ACK_TIME
+ case SCTP_OPT_DELAYED_ACK_TIME:
+ {
+ CHKLEN(curr, ASSOC_ID_LEN + 4);
+ arg.av.assoc_id = GET_ASSOC_ID(curr); curr += ASSOC_ID_LEN;
+ arg.av.assoc_value = get_int32(curr); curr += 4;
+
+ proto = IPPROTO_SCTP;
+ type = SCTP_DELAYED_ACK_TIME;
+ arg_ptr = (char*) (&arg.av);
+ arg_sz = sizeof ( arg.es);
+ break;
+ }
+# endif
+ default:
+ /* XXX: No more supported SCTP options. In particular, authentica-
+ tion options (SCTP_AUTH_CHUNK, SCTP_AUTH_KEY, SCTP_PEER_AUTH_
+ CHUNKS, SCTP_LOCAL_AUTH_CHUNKS, SCTP_AUTH_SETKEY_ACTIVE) are
+ not yet implemented in the Linux kernel, hence not supported
+ here. Also not supported are SCTP_HMAC_IDENT, as well as any
+ "generic" options except "INET_LOPT_MODE". Raise an error:
+ */
+ return -1;
+ }
+#if defined(IP_TOS) && defined(SOL_IP) && defined(SO_PRIORITY)
+ res = setopt_prio_tos_trick (desc->s, proto, type, arg_ptr, arg_sz);
+#else
+ res = sock_setopt (desc->s, proto, type, arg_ptr, arg_sz);
+#endif
+ /* The return values of "sock_setopt" can only be 0 or -1: */
+ ASSERT(res == 0 || res == -1);
+ if (res == -1)
+ { /* Got an error, DO NOT continue with other options. However, on
+ Solaris 10, we DO allow SO_SNDBUF and SO_RCVBUF to fail, assu-
+ min that the default kernel versions are good enough:
+ */
+# ifdef SOLARIS10
+ if (type != SO_SNDBUF && type != SO_RCVBUF)
+# endif
+ return res;
+ }
+ }
+ /* If we got here, all "sock_setopt"s above were successful: */
+ if (IS_OPEN(desc) && desc->active != old_active) {
+ sock_select(desc, (FD_READ|FD_CLOSE), (desc->active > 0));
+ }
+ return 0;
+# undef CHKLEN
+}
+#endif /* HAVE_SCTP */
+
+/* load all option values into the buf and reply
+** return total length of reply filled into ptr
+** ptr should point to a buffer with 9*len +1 to be safe!!
+*/
+
+static int inet_fill_opts(inet_descriptor* desc,
+ char* buf, int len, char** dest, int destlen)
+{
+ int type;
+ int proto;
+ int opt;
+ struct linger li_val;
+ int ival;
+ char* arg_ptr;
+ unsigned int arg_sz;
+ char *ptr = NULL;
+ int dest_used = 0;
+ int dest_allocated = destlen;
+ char *orig_dest = *dest;
+
+ /* Ptr is a name parameter */
+#define RETURN_ERROR() \
+ do { \
+ if (dest_allocated > destlen) { \
+ FREE(*dest); \
+ *dest = orig_dest; \
+ } \
+ return -1; \
+ } while(0)
+
+#define PLACE_FOR(Size,Ptr) \
+ do { \
+ int need = dest_used + (Size); \
+ if (need > INET_MAX_BUFFER) { \
+ RETURN_ERROR(); \
+ } \
+ if (need > dest_allocated) { \
+ char *new_buffer; \
+ if (dest_allocated == destlen) { \
+ new_buffer = ALLOC((dest_allocated = need + 10)); \
+ memcpy(new_buffer,*dest,dest_used); \
+ } else { \
+ new_buffer = REALLOC(*dest, (dest_allocated = need + 10)); \
+ } \
+ *dest = new_buffer; \
+ } \
+ (Ptr) = (*dest) + dest_used; \
+ dest_used = need; \
+ } while (0)
+
+ /* Ptr is a name parameter */
+#define TRUNCATE_TO(Size,Ptr) \
+ do { \
+ int new_need = ((Ptr) - (*dest)) + (Size); \
+ if (new_need > dest_used) { \
+ erl_exit(1,"Internal error in inet_drv, " \
+ "miscalculated buffer size"); \
+ } \
+ dest_used = new_need; \
+ } while(0)
+
+
+ PLACE_FOR(1,ptr);
+ *ptr = INET_REP_OK;
+
+ while(len--) {
+ opt = *buf++;
+ proto = SOL_SOCKET;
+ ival = 0; /* Windows Vista needs this (only writes part of it) */
+ arg_sz = sizeof(ival);
+ arg_ptr = (char*) &ival;
+
+ PLACE_FOR(5,ptr);
+
+ switch(opt) {
+ case INET_LOPT_BUFFER:
+ *ptr++ = opt;
+ put_int32(desc->bufsz, ptr);
+ continue;
+ case INET_LOPT_HEADER:
+ *ptr++ = opt;
+ put_int32(desc->hsz, ptr);
+ continue;
+ case INET_LOPT_MODE:
+ *ptr++ = opt;
+ put_int32(desc->mode, ptr);
+ continue;
+ case INET_LOPT_DELIVER:
+ *ptr++ = opt;
+ put_int32(desc->deliver, ptr);
+ continue;
+ case INET_LOPT_ACTIVE:
+ *ptr++ = opt;
+ put_int32(desc->active, ptr);
+ continue;
+ case INET_LOPT_PACKET:
+ *ptr++ = opt;
+ put_int32(desc->htype, ptr);
+ continue;
+ case INET_LOPT_PACKET_SIZE:
+ *ptr++ = opt;
+ put_int32(desc->psize, ptr);
+ continue;
+ case INET_LOPT_EXITONCLOSE:
+ *ptr++ = opt;
+ put_int32(desc->exitf, ptr);
+ continue;
+
+ case INET_LOPT_BIT8:
+ *ptr++ = opt;
+ if (desc->bit8f) {
+ put_int32(desc->bit8, ptr);
+ } else {
+ put_int32(INET_BIT8_OFF, ptr);
+ }
+ continue;
+
+ case INET_LOPT_TCP_HIWTRMRK:
+ if (desc->stype == SOCK_STREAM) {
+ *ptr++ = opt;
+ ival = ((tcp_descriptor*)desc)->high;
+ put_int32(ival, ptr);
+ } else {
+ TRUNCATE_TO(0,ptr);
+ }
+ continue;
+
+ case INET_LOPT_TCP_LOWTRMRK:
+ if (desc->stype == SOCK_STREAM) {
+ *ptr++ = opt;
+ ival = ((tcp_descriptor*)desc)->low;
+ put_int32(ival, ptr);
+ } else {
+ TRUNCATE_TO(0,ptr);
+ }
+ continue;
+
+ case INET_LOPT_TCP_SEND_TIMEOUT:
+ if (desc->stype == SOCK_STREAM) {
+ *ptr++ = opt;
+ ival = ((tcp_descriptor*)desc)->send_timeout;
+ put_int32(ival, ptr);
+ } else {
+ TRUNCATE_TO(0,ptr);
+ }
+ continue;
+
+ case INET_LOPT_TCP_SEND_TIMEOUT_CLOSE:
+ if (desc->stype == SOCK_STREAM) {
+ *ptr++ = opt;
+ ival = ((tcp_descriptor*)desc)->send_timeout_close;
+ put_int32(ival, ptr);
+ } else {
+ TRUNCATE_TO(0,ptr);
+ }
+ continue;
+
+ case INET_LOPT_TCP_DELAY_SEND:
+ if (desc->stype == SOCK_STREAM) {
+ *ptr++ = opt;
+ ival = !!(((tcp_descriptor*)desc)->tcp_add_flags & TCP_ADDF_DELAY_SEND);
+ put_int32(ival, ptr);
+ } else {
+ TRUNCATE_TO(0,ptr);
+ }
+ continue;
+
+ case INET_LOPT_UDP_READ_PACKETS:
+ if (desc->stype == SOCK_DGRAM) {
+ *ptr++ = opt;
+ ival = ((udp_descriptor*)desc)->read_packets;
+ put_int32(ival, ptr);
+ } else {
+ TRUNCATE_TO(0,ptr);
+ }
+ continue;
+
+ case INET_OPT_PRIORITY:
+#ifdef SO_PRIORITY
+ type = SO_PRIORITY;
+ break;
+#else
+ *ptr++ = opt;
+ put_int32(0, ptr);
+ continue;
+#endif
+ case INET_OPT_TOS:
+#if defined(IP_TOS) && defined(SOL_IP)
+ proto = SOL_IP;
+ type = IP_TOS;
+ break;
+#else
+ *ptr++ = opt;
+ put_int32(0, ptr);
+ continue;
+#endif
+ case INET_OPT_REUSEADDR:
+ type = SO_REUSEADDR;
+ break;
+ case INET_OPT_KEEPALIVE:
+ type = SO_KEEPALIVE;
+ break;
+ case INET_OPT_DONTROUTE:
+ type = SO_DONTROUTE;
+ break;
+ case INET_OPT_BROADCAST:
+ type = SO_BROADCAST;
+ break;
+ case INET_OPT_OOBINLINE:
+ type = SO_OOBINLINE;
+ break;
+ case INET_OPT_SNDBUF:
+ type = SO_SNDBUF;
+ break;
+ case INET_OPT_RCVBUF:
+ type = SO_RCVBUF;
+ break;
+ case TCP_OPT_NODELAY:
+ proto = IPPROTO_TCP;
+ type = TCP_NODELAY;
+ break;
+
+#ifdef HAVE_MULTICAST_SUPPORT
+ case UDP_OPT_MULTICAST_TTL:
+ proto = IPPROTO_IP;
+ type = IP_MULTICAST_TTL;
+ break;
+ case UDP_OPT_MULTICAST_LOOP:
+ proto = IPPROTO_IP;
+ type = IP_MULTICAST_LOOP;
+ break;
+ case UDP_OPT_MULTICAST_IF:
+ proto = IPPROTO_IP;
+ type = IP_MULTICAST_IF;
+ break;
+ case INET_OPT_LINGER:
+ arg_sz = sizeof(li_val);
+ sys_memzero((void *) &li_val, sizeof(li_val));
+ arg_ptr = (char*) &li_val;
+ type = SO_LINGER;
+ break;
+#endif /* HAVE_MULTICAST_SUPPORT */
+
+ case INET_OPT_RAW:
+ {
+ int data_provided;
+ /* Raw options are icky, handle directly... */
+ if (len < 13) {
+ RETURN_ERROR();
+ }
+ len -= 13;
+ proto = get_int32(buf);
+ buf += 4;
+ type = get_int32(buf);
+ buf += 4;
+ data_provided = (int) *buf++;
+ arg_sz = get_int32(buf);
+ if (arg_sz > INET_MAX_BUFFER) {
+ RETURN_ERROR();
+ }
+ buf += 4;
+ TRUNCATE_TO(0,ptr);
+ PLACE_FOR(13 + arg_sz,ptr);
+ arg_ptr = ptr + 13;
+ if (data_provided) {
+ if (len < arg_sz) {
+ RETURN_ERROR();
+ }
+ memcpy(arg_ptr,buf,arg_sz);
+ buf += arg_sz;
+ len -= arg_sz;
+ }
+ if (sock_getopt(desc->s,proto,type,arg_ptr,&arg_sz) ==
+ SOCKET_ERROR) {
+ TRUNCATE_TO(0,ptr);
+ continue;
+ }
+ TRUNCATE_TO(arg_sz + 13,ptr);
+ *ptr++ = opt;
+ put_int32(proto,ptr);
+ ptr += 4;
+ put_int32(type,ptr);
+ ptr += 4;
+ put_int32(arg_sz,ptr);
+ continue;
+ }
+ default:
+ RETURN_ERROR();
+ }
+ /* We have 5 bytes allocated to ptr */
+ if (sock_getopt(desc->s,proto,type,arg_ptr,&arg_sz) == SOCKET_ERROR) {
+ TRUNCATE_TO(0,ptr);
+ continue;
+ }
+ *ptr++ = opt;
+ if (arg_ptr == (char*)&ival) {
+ put_int32(ival, ptr);
+ }
+ else {
+ put_int32(((Uint32) li_val.l_onoff), ptr);
+ PLACE_FOR(4,ptr);
+ put_int32(((Uint32) li_val.l_linger), ptr);
+ }
+ }
+ return (dest_used);
+#undef PLACE_FOR
+#undef TRUNCATE_TO
+#undef RETURN_ERROR
+}
+
+#ifdef HAVE_SCTP
+#define LOAD_PADDRINFO_CNT \
+ (2*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT + LOAD_IP_AND_PORT_CNT + \
+ 4*LOAD_INT_CNT + LOAD_TUPLE_CNT)
+static int load_paddrinfo (ErlDrvTermData * spec, int i,
+ inet_descriptor* desc, struct sctp_paddrinfo* pai)
+{
+ i = LOAD_ATOM (spec, i, am_sctp_paddrinfo);
+ i = LOAD_ASSOC_ID (spec, i, pai->spinfo_assoc_id);
+ i = load_ip_and_port(spec, i, desc, &pai->spinfo_address);
+ switch(pai->spinfo_state)
+ {
+ case SCTP_ACTIVE:
+ i = LOAD_ATOM (spec, i, am_active);
+ break;
+ case SCTP_INACTIVE:
+ i = LOAD_ATOM (spec, i, am_inactive);
+ break;
+ default:
+ ASSERT(0); /* NB: SCTP_UNCONFIRMED modifier not yet supported */
+ }
+ i = LOAD_INT (spec, i, pai->spinfo_cwnd);
+ i = LOAD_INT (spec, i, pai->spinfo_srtt);
+ i = LOAD_INT (spec, i, pai->spinfo_rto );
+ i = LOAD_INT (spec, i, pai->spinfo_mtu );
+ /* Close up the record: */
+ i = LOAD_TUPLE (spec, i, 8);
+ return i;
+}
+
+/*
+** "sctp_fill_opts": Returns {ok, Results}, or an error:
+*/
+static int sctp_fill_opts(inet_descriptor* desc, char* buf, int buflen,
+ char** dest, int destlen)
+{
+ /* In contrast to the generic "inet_fill_opts", the output here is
+ represented by tuples/records, which are formed in the "spec":
+ */
+ ErlDrvTermData *spec;
+ int i = 0;
+ int length = 0; /* Number of result list entries */
+
+ int spec_allocated = PACKET_ERL_DRV_TERM_DATA_LEN;
+ spec = ALLOC(sizeof(* spec) * spec_allocated);
+
+# define RETURN_ERROR(Spec, Errno) \
+ do { \
+ FREE(Spec); \
+ return (Errno); \
+ } while(0)
+
+ /* Spec is a name parmeter */
+# define PLACE_FOR(Spec, Index, N) \
+ do { \
+ int need; \
+ if ((Index) > spec_allocated) { \
+ erl_exit(1,"Internal error in inet_drv, " \
+ "miscalculated buffer size"); \
+ } \
+ need = (Index) + (N); \
+ if (need > INET_MAX_BUFFER/sizeof(ErlDrvTermData)) { \
+ RETURN_ERROR((Spec), -ENOMEM); \
+ } \
+ if (need > spec_allocated) { \
+ (Spec) = REALLOC((Spec), \
+ sizeof(* (Spec)) \
+ * (spec_allocated = need + 20)); \
+ } \
+ } while (0)
+
+ PLACE_FOR(spec, i, 2*LOAD_ATOM_CNT + LOAD_PORT_CNT);
+ i = LOAD_ATOM (spec, i, am_inet_reply);
+ i = LOAD_PORT (spec, i, desc->dport);
+ i = LOAD_ATOM (spec, i, am_ok);
+
+ while (buflen > 0) {
+ int eopt = *buf; /* "eopt" is 1-byte encoded */
+ buf ++; buflen --;
+
+ switch(eopt)
+ {
+ /* Local options allowed for SCTP. For TCP and UDP, the values of
+ these options are returned via "res" using integer encoding,
+ but here, we encode them as proper terms the same way as we do
+ it for all other SCTP options:
+ */
+ case INET_LOPT_BUFFER:
+ {
+ PLACE_FOR(spec, i, LOAD_ATOM_CNT + LOAD_INT_CNT + LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_buffer);
+ i = LOAD_INT (spec, i, desc->bufsz);
+ i = LOAD_TUPLE(spec, i, 2);
+ break;
+ }
+ case INET_LOPT_MODE:
+ {
+ PLACE_FOR(spec, i, 2*LOAD_ATOM_CNT + LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_mode);
+ switch (desc->mode)
+ {
+ case INET_MODE_LIST :
+ { i = LOAD_ATOM (spec, i, am_list); break; }
+
+ case INET_MODE_BINARY:
+ { i = LOAD_ATOM (spec, i, am_binary); break; }
+
+ default: ASSERT (0);
+ }
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case INET_LOPT_ACTIVE:
+ {
+ PLACE_FOR(spec, i, 2*LOAD_ATOM_CNT + LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_active);
+ switch (desc->active)
+ {
+ case INET_ACTIVE :
+ { i = LOAD_ATOM (spec, i, am_true); break; }
+
+ case INET_PASSIVE:
+ { i = LOAD_ATOM (spec, i, am_false); break; }
+
+ case INET_ONCE :
+ { i = LOAD_ATOM (spec, i, am_once); break; }
+
+ default: ASSERT (0);
+ }
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+
+ /* SCTP and generic INET options: */
+
+ case SCTP_OPT_RTOINFO:
+ {
+ struct sctp_rtoinfo rti;
+ unsigned int sz = sizeof(rti);
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ rti.srto_assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_RTOINFO,
+ &rti, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT +
+ 3*LOAD_INT_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_rtoinfo);
+ i = LOAD_ATOM (spec, i, am_sctp_rtoinfo);
+ i = LOAD_ASSOC_ID (spec, i, rti.srto_assoc_id);
+ i = LOAD_INT (spec, i, rti.srto_initial);
+ i = LOAD_INT (spec, i, rti.srto_max);
+ i = LOAD_INT (spec, i, rti.srto_min);
+ i = LOAD_TUPLE (spec, i, 5);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_ASSOCINFO:
+ {
+ struct sctp_assocparams ap;
+ unsigned int sz = sizeof(ap);
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ ap.sasoc_assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_ASSOCINFO,
+ &ap, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT +
+ 5*LOAD_INT_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_associnfo);
+ i = LOAD_ATOM (spec, i, am_sctp_assocparams);
+ i = LOAD_ASSOC_ID (spec, i, ap.sasoc_assoc_id);
+ i = LOAD_INT (spec, i, ap.sasoc_asocmaxrxt);
+ i = LOAD_INT (spec, i, ap.sasoc_number_peer_destinations);
+ i = LOAD_INT (spec, i, ap.sasoc_peer_rwnd);
+ i = LOAD_INT (spec, i, ap.sasoc_local_rwnd);
+ i = LOAD_INT (spec, i, ap.sasoc_cookie_life);
+ i = LOAD_TUPLE (spec, i, 7);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_INITMSG:
+ {
+ struct sctp_initmsg im;
+ unsigned int sz = sizeof(im);
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_INITMSG,
+ &im, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT +
+ 4*LOAD_INT_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_initmsg);
+ i = LOAD_ATOM (spec, i, am_sctp_initmsg);
+ i = LOAD_INT (spec, i, im.sinit_num_ostreams);
+ i = LOAD_INT (spec, i, im.sinit_max_instreams);
+ i = LOAD_INT (spec, i, im.sinit_max_attempts);
+ i = LOAD_INT (spec, i, im.sinit_max_init_timeo);
+ i = LOAD_TUPLE (spec, i, 5);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ /* The following option returns a tuple {bool, int}: */
+ case INET_OPT_LINGER:
+ {
+ struct linger lg;
+ unsigned int sz = sizeof(lg);
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SO_LINGER,
+ &lg, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ LOAD_ATOM_CNT + LOAD_BOOL_CNT +
+ LOAD_INT_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_linger);
+ i = LOAD_BOOL (spec, i, lg.l_onoff);
+ i = LOAD_INT (spec, i, lg.l_linger);
+ i = LOAD_TUPLE (spec, i, 2);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ /* The following options just return an integer value: */
+ case INET_OPT_RCVBUF :
+ case INET_OPT_SNDBUF :
+ case INET_OPT_REUSEADDR:
+ case INET_OPT_DONTROUTE:
+ case INET_OPT_PRIORITY :
+ case INET_OPT_TOS :
+ case SCTP_OPT_AUTOCLOSE:
+ case SCTP_OPT_MAXSEG :
+ /* The following options return true or false: */
+ case SCTP_OPT_NODELAY :
+ case SCTP_OPT_DISABLE_FRAGMENTS:
+ case SCTP_OPT_I_WANT_MAPPED_V4_ADDR:
+ {
+ int res = 0;
+ unsigned int sz = sizeof(res);
+ int proto = 0, type = 0, is_int = 0;
+ ErlDrvTermData tag = am_sctp_error;
+
+ switch(eopt)
+ {
+ case INET_OPT_RCVBUF :
+ {
+ proto = IPPROTO_SCTP;
+ type = SO_RCVBUF;
+ is_int = 1;
+ tag = am_recbuf;
+ break;
+ }
+ case INET_OPT_SNDBUF :
+ {
+ proto = IPPROTO_SCTP;
+ type = SO_SNDBUF;
+ is_int = 1;
+ tag = am_sndbuf;
+ break;
+ }
+ case INET_OPT_REUSEADDR:
+ {
+ proto = SOL_SOCKET;
+ type = SO_REUSEADDR;
+ is_int = 0;
+ tag = am_reuseaddr;
+ break;
+ }
+ case INET_OPT_DONTROUTE:
+ {
+ proto = SOL_SOCKET;
+ type = SO_DONTROUTE;
+ is_int = 0;
+ tag = am_dontroute;
+ break;
+ }
+ case INET_OPT_PRIORITY:
+ {
+# if defined(SO_PRIORITY)
+ proto = SOL_SOCKET;
+ type = SO_PRIORITY;
+ is_int = 1;
+ tag = am_priority;
+ break;
+# else
+ /* Not supported -- ignore */
+ continue;
+# endif
+ }
+ case INET_OPT_TOS:
+ {
+# if defined(IP_TOS) && defined(SOL_IP)
+ proto = SOL_IP;
+ type = IP_TOS;
+ is_int = 1;
+ tag = am_tos;
+ break;
+# else
+ /* Not supported -- ignore */
+ continue;
+# endif
+ }
+ case SCTP_OPT_AUTOCLOSE:
+ {
+ proto = IPPROTO_SCTP;
+ type = SCTP_AUTOCLOSE;
+ is_int = 1;
+ tag = am_sctp_autoclose;
+ break;
+ }
+ case SCTP_OPT_MAXSEG :
+ {
+ proto = IPPROTO_SCTP;
+ type = SCTP_MAXSEG;
+ is_int = 1;
+ tag = am_sctp_maxseg;
+ break;
+ }
+ case SCTP_OPT_NODELAY :
+ {
+ proto = IPPROTO_SCTP;
+ type = SCTP_NODELAY;
+ is_int = 0;
+ tag = am_sctp_nodelay;
+ break;
+ }
+ case SCTP_OPT_DISABLE_FRAGMENTS:
+ {
+ proto = IPPROTO_SCTP;
+ type = SCTP_DISABLE_FRAGMENTS;
+ is_int = 0;
+ tag = am_sctp_disable_fragments;
+ break;
+ }
+ case SCTP_OPT_I_WANT_MAPPED_V4_ADDR:
+ {
+ proto = IPPROTO_SCTP;
+ type = SCTP_I_WANT_MAPPED_V4_ADDR;
+ is_int = 0;
+ tag = am_sctp_i_want_mapped_v4_addr;
+ break;
+ }
+ default: ASSERT(0);
+ }
+ if (sock_getopt (desc->s, proto, type, &res, &sz) < 0) continue;
+ /* Form the result: */
+ PLACE_FOR(spec, i, LOAD_ATOM_CNT +
+ (is_int ? LOAD_INT_CNT : LOAD_BOOL_CNT) +
+ LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, tag);
+ if (is_int)
+ i = LOAD_INT (spec, i, res);
+ else
+ i = LOAD_BOOL (spec, i, res);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_PRIMARY_ADDR:
+ case SCTP_OPT_SET_PEER_PRIMARY_ADDR:
+ {
+ /* These 2 options use completely isomorphic data structures: */
+ struct sctp_setpeerprim sp;
+ unsigned int sz = sizeof(sp);
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ sp.sspp_assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP,
+ (eopt == SCTP_OPT_PRIMARY_ADDR) ?
+ SCTP_PRIMARY_ADDR : SCTP_SET_PEER_PRIMARY_ADDR,
+ &sp, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT +
+ LOAD_IP_AND_PORT_CNT + 2*LOAD_TUPLE_CNT);
+ switch (eopt) {
+ case SCTP_OPT_PRIMARY_ADDR:
+ i = LOAD_ATOM(spec, i, am_sctp_primary_addr);
+ i = LOAD_ATOM(spec, i, am_sctp_prim);
+ break;
+ case SCTP_OPT_SET_PEER_PRIMARY_ADDR:
+ i = LOAD_ATOM(spec, i, am_sctp_set_peer_primary_addr);
+ i = LOAD_ATOM(spec, i, am_sctp_setpeerprim);
+ break;
+ default:
+ ASSERT(0);
+ }
+ i = LOAD_ASSOC_ID (spec, i, sp.sspp_assoc_id);
+ i = load_ip_and_port(spec, i, desc, &sp.sspp_addr);
+ i = LOAD_TUPLE (spec, i, 3);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_ADAPTATION_LAYER:
+ {
+ struct sctp_setadaptation ad;
+ unsigned int sz = sizeof (ad);
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_ADAPTATION_LAYER,
+ &ad, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT + LOAD_INT_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_adaptation_layer);
+ i = LOAD_ATOM (spec, i, am_sctp_setadaptation);
+ i = LOAD_INT (spec, i, ad.ssb_adaptation_ind);
+ i = LOAD_TUPLE (spec, i, 2);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_PEER_ADDR_PARAMS:
+ {
+ struct sctp_paddrparams ap;
+ unsigned int sz = sizeof(ap);
+ int n;
+ char *after;
+ int alen;
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ ap.spp_assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+ alen = buflen;
+ after = inet_set_faddress(desc->sfamily,
+ (inet_address*) (&ap.spp_address),
+ buf, &alen);
+ if (after == NULL) RETURN_ERROR(spec, -EINVAL);
+ buflen -= after - buf;
+ buf = after;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_PEER_ADDR_PARAMS,
+ &ap, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT +
+ LOAD_IP_AND_PORT_CNT + 4*LOAD_INT_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_peer_addr_params);
+ i = LOAD_ATOM (spec, i, am_sctp_paddrparams);
+ i = LOAD_ASSOC_ID (spec, i, ap.spp_assoc_id);
+ i = load_ip_and_port(spec, i, desc, &ap.spp_address);
+ i = LOAD_INT (spec, i, ap.spp_hbinterval);
+ i = LOAD_INT (spec, i, ap.spp_pathmaxrxt);
+
+ /* The following fields are not suported in SOLARIS10,
+ ** so put 0s for "spp_pathmtu", "spp_sackdelay",
+ ** and empty list for "spp_flags":
+ */
+
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_PATHMTU
+ i = LOAD_INT (spec, i, ap.spp_pathmtu);
+# else
+ i = LOAD_INT (spec, i, 0);
+# endif
+
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_SACKDELAY
+ i = LOAD_INT (spec, i, ap.spp_sackdelay);
+# else
+ i = LOAD_INT (spec, i, 0);
+# endif
+
+ n = 0;
+# ifdef HAVE_STRUCT_SCTP_PADDRPARAMS_SPP_FLAGS
+ PLACE_FOR(spec, i, 7*LOAD_ATOM_CNT);
+ /* Now Flags, as a list: */
+ if (ap.spp_flags & SPP_HB_ENABLE)
+ { i = LOAD_ATOM (spec, i, am_hb_enable); n++; }
+
+ if (ap.spp_flags & SPP_HB_DISABLE)
+ { i = LOAD_ATOM (spec, i, am_hb_disable); n++; }
+
+ if (ap.spp_flags & SPP_HB_DEMAND)
+ { i = LOAD_ATOM (spec, i, am_hb_demand); n++; }
+
+ if (ap.spp_flags & SPP_PMTUD_ENABLE)
+ { i = LOAD_ATOM (spec, i, am_pmtud_enable); n++; }
+
+ if (ap.spp_flags & SPP_PMTUD_DISABLE)
+ { i = LOAD_ATOM (spec, i, am_pmtud_disable); n++; }
+
+ if (ap.spp_flags & SPP_SACKDELAY_ENABLE)
+ { i = LOAD_ATOM (spec, i, am_sackdelay_enable); n++; }
+
+ if (ap.spp_flags & SPP_SACKDELAY_DISABLE)
+ { i = LOAD_ATOM (spec, i, am_sackdelay_disable); n++; }
+# endif
+
+ PLACE_FOR(spec, i,
+ LOAD_NIL_CNT + LOAD_LIST_CNT + 2*LOAD_TUPLE_CNT);
+
+ /* Close up the Flags list: */
+ i = LOAD_NIL (spec, i);
+ i = LOAD_LIST (spec, i, n+1);
+
+ /* Close up the record: */
+ i = LOAD_TUPLE (spec, i, 8);
+ /* Close up the result tuple: */
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_DEFAULT_SEND_PARAM:
+ {
+ struct sctp_sndrcvinfo sri;
+ unsigned int sz = sizeof(sri);
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_DEFAULT_SEND_PARAM,
+ &sri, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i, LOAD_ATOM_CNT +
+ SCTP_PARSE_SNDRCVINFO_CNT + LOAD_TUPLE_CNT);
+ i = LOAD_ATOM(spec, i, am_sctp_default_send_param);
+ i = sctp_parse_sndrcvinfo(spec, i, &sri);
+ i = LOAD_TUPLE(spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_EVENTS:
+ {
+ struct sctp_event_subscribe evs;
+ unsigned int sz = sizeof(evs);
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_EVENTS,
+ &evs, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ 2*LOAD_ATOM_CNT + 9*LOAD_BOOL_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_events);
+ i = LOAD_ATOM (spec, i, am_sctp_event_subscribe);
+ i = LOAD_BOOL (spec, i, evs.sctp_data_io_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_association_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_address_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_send_failure_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_peer_error_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_shutdown_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_partial_delivery_event);
+ i = LOAD_BOOL (spec, i, evs.sctp_adaptation_layer_event);
+ i = LOAD_BOOL (spec, i, 0);/* NB: sctp_authentication_event
+ * is not yet supported in Linux
+ */
+ i = LOAD_TUPLE (spec, i, 10);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ /* The following option is not available in Solaris 10: */
+# ifdef SCTP_DELAYED_ACK_TIME
+ case SCTP_OPT_DELAYED_ACK_TIME:
+ {
+ struct sctp_assoc_value av;
+ unsigned int sz = sizeof(av);
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ av.assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_DELAYED_ACK_TIME,
+ &av, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i, 2*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT +
+ LOAD_INT_CNT + 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_delayed_ack_time);
+ i = LOAD_ATOM (spec, i, am_sctp_assoc_value);
+ i = LOAD_ASSOC_ID (spec, i, av.assoc_id);
+ i = LOAD_INT (spec, i, av.assoc_value);
+ i = LOAD_TUPLE (spec, i, 3);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+# endif
+ case SCTP_OPT_STATUS:
+ {
+ struct sctp_status st;
+ unsigned int sz = sizeof(st);
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ st.sstat_assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_STATUS,
+ &st, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i, 3*LOAD_ATOM_CNT + LOAD_ASSOC_ID_CNT +
+ 6*LOAD_INT_CNT + LOAD_PADDRINFO_CNT +
+ 2*LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_status);
+ i = LOAD_ATOM (spec, i, am_sctp_status);
+ i = LOAD_ASSOC_ID (spec, i, st.sstat_assoc_id);
+ switch(st.sstat_state)
+ {
+ /* SCTP_EMPTY is not supported on SOLARIS10: */
+# ifdef SCTP_EMPTY
+ case SCTP_EMPTY:
+ i = LOAD_ATOM (spec, i, am_empty);
+ break;
+# endif
+ case SCTP_CLOSED:
+ i = LOAD_ATOM (spec, i, am_closed);
+ break;
+ /* The following states are not supported by Linux Kernel SCTP yet:
+ case SCTP_BOUND:
+ i = LOAD_ATOM (spec, i, am_bound);
+ break;
+ case SCTP_LISTEN:
+ i = LOAD_ATOM (spec, i, am_listen);
+ break;
+ */
+ case SCTP_COOKIE_WAIT:
+ i = LOAD_ATOM (spec, i, am_cookie_wait);
+ break;
+ case SCTP_COOKIE_ECHOED:
+ i = LOAD_ATOM (spec, i, am_cookie_echoed);
+ break;
+ case SCTP_ESTABLISHED:
+ i = LOAD_ATOM (spec, i, am_established);
+ break;
+ case SCTP_SHUTDOWN_PENDING:
+ i = LOAD_ATOM (spec, i, am_shutdown_pending);
+ break;
+ case SCTP_SHUTDOWN_SENT:
+ i = LOAD_ATOM (spec, i, am_shutdown_sent);
+ break;
+ case SCTP_SHUTDOWN_RECEIVED:
+ i = LOAD_ATOM (spec, i, am_shutdown_received);
+ break;
+ case SCTP_SHUTDOWN_ACK_SENT:
+ i = LOAD_ATOM (spec, i, am_shutdown_ack_sent);
+ break;
+ default:
+ i = LOAD_ATOM (spec, i, am_undefined);
+ break;
+ }
+ i = LOAD_INT (spec, i, st.sstat_rwnd);
+ i = LOAD_INT (spec, i, st.sstat_unackdata);
+ i = LOAD_INT (spec, i, st.sstat_penddata);
+ i = LOAD_INT (spec, i, st.sstat_instrms);
+ i = LOAD_INT (spec, i, st.sstat_outstrms);
+ i = LOAD_INT (spec, i, st.sstat_fragmentation_point);
+ i = load_paddrinfo (spec, i, desc, &st.sstat_primary);
+ /* Close up the record: */
+ i = LOAD_TUPLE (spec, i, 10);
+ /* Close up the result tuple: */
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ case SCTP_OPT_GET_PEER_ADDR_INFO:
+ {
+ struct sctp_paddrinfo pai;
+ unsigned int sz = sizeof(pai);
+ char *after;
+ int alen;
+
+ if (buflen < ASSOC_ID_LEN) RETURN_ERROR(spec, -EINVAL);
+ pai.spinfo_assoc_id = GET_ASSOC_ID(buf);
+ buf += ASSOC_ID_LEN;
+ buflen -= ASSOC_ID_LEN;
+ alen = buflen;
+ after = inet_set_faddress(desc->sfamily,
+ (inet_address*) (&pai.spinfo_address),
+ buf, &alen);
+ if (after == NULL) RETURN_ERROR(spec, -EINVAL);
+ buflen -= after - buf;
+ buf = after;
+
+ if (sock_getopt(desc->s, IPPROTO_SCTP, SCTP_GET_PEER_ADDR_INFO,
+ &pai, &sz) < 0) continue;
+ /* Fill in the response: */
+ PLACE_FOR(spec, i,
+ LOAD_ATOM_CNT + LOAD_PADDRINFO_CNT + LOAD_TUPLE_CNT);
+ i = LOAD_ATOM (spec, i, am_sctp_get_peer_addr_info);
+ i = load_paddrinfo (spec, i, desc, &pai);
+ i = LOAD_TUPLE (spec, i, 2);
+ break;
+ }
+ default:
+ RETURN_ERROR(spec, -EINVAL); /* No more valid options */
+ }
+ /* If we get here one result has been succesfully loaded */
+ length ++;
+ }
+ if (buflen != 0) RETURN_ERROR(spec, -EINVAL); /* Optparam mismatch */
+
+ PLACE_FOR(spec, i, LOAD_NIL_CNT + LOAD_LIST_CNT + 2*LOAD_TUPLE_CNT);
+
+ /* If we get here, we have "length" options: */
+ i = LOAD_NIL (spec, i);
+ i = LOAD_LIST (spec, i, length+1);
+
+ /* Close up the {ok, List} response: */
+ i = LOAD_TUPLE(spec, i, 2);
+ /* Close up the {inet_reply, S, {ok, List}} response: */
+ i = LOAD_TUPLE(spec, i, 3);
+
+ /* Now, convert "spec" into the returnable term: */
+ /* desc->caller = 0; What does it mean? */
+ driver_output_term(desc->port, spec, i);
+ FREE(spec);
+
+ (*dest)[0] = INET_REP_SCTP;
+ return 1; /* Response length */
+# undef PLACE_FOR
+# undef RETURN_ERROR
+}
+#endif
+
+/* fill statistics reply, op codes from src and result in dest
+** dst area must be a least 5*len + 1 bytes
+*/
+static int inet_fill_stat(inet_descriptor* desc, char* src, int len, char* dst)
+{
+ unsigned long val;
+ int op;
+ char* dst_start = dst;
+
+ *dst++ = INET_REP_OK; /* put reply code */
+ while (len--) {
+ op = *src++;
+ *dst++ = op; /* copy op code */
+ switch(op) {
+ case INET_STAT_RECV_CNT:
+ val = desc->recv_cnt;
+ break;
+ case INET_STAT_RECV_MAX:
+ val = (unsigned long) desc->recv_max;
+ break;
+ case INET_STAT_RECV_AVG:
+ val = (unsigned long) desc->recv_avg;
+ break;
+ case INET_STAT_RECV_DVI:
+ val = (unsigned long) fabs(desc->recv_dvi);
+ break;
+ case INET_STAT_SEND_CNT:
+ val = desc->send_cnt;
+ break;
+ case INET_STAT_SEND_MAX:
+ val = desc->send_max;
+ break;
+ case INET_STAT_SEND_AVG:
+ val = (unsigned long) desc->send_avg;
+ break;
+ case INET_STAT_SEND_PND:
+ val = driver_sizeq(desc->port);
+ break;
+ case INET_STAT_RECV_OCT:
+ put_int32(desc->recv_oct[1], dst); /* write high 32bit */
+ put_int32(desc->recv_oct[0], dst+4); /* write low 32bit */
+ dst += 8;
+ continue;
+ case INET_STAT_SEND_OCT:
+ put_int32(desc->send_oct[1], dst); /* write high 32bit */
+ put_int32(desc->send_oct[0], dst+4); /* write low 32bit */
+ dst += 8;
+ continue;
+ default: return -1; /* invalid argument */
+ }
+ put_int32(val, dst); /* write 32bit value */
+ dst += 4;
+ }
+ return dst - dst_start; /* actual length */
+}
+
+static void
+send_empty_out_q_msgs(inet_descriptor* desc)
+{
+ ErlDrvTermData msg[6];
+ int msg_len = 0;
+
+ if(NO_SUBSCRIBERS(&desc->empty_out_q_subs))
+ return;
+
+ msg_len = LOAD_ATOM(msg, msg_len, am_empty_out_q);
+ msg_len = LOAD_PORT(msg, msg_len, desc->dport);
+ msg_len = LOAD_TUPLE(msg, msg_len, 2);
+
+ ASSERT(msg_len == sizeof(msg)/sizeof(*msg));
+
+ send_to_subscribers(desc->port,
+ &desc->empty_out_q_subs,
+ 1,
+ msg,
+ msg_len);
+}
+
+/* subscribe and fill subscription reply, op codes from src and
+** result in dest dst area must be a least 5*len + 1 bytes
+*/
+static int inet_subscribe(inet_descriptor* desc, char* src, int len, char* dst)
+{
+ unsigned long val;
+ int op;
+ char* dst_start = dst;
+
+ *dst++ = INET_REP_OK; /* put reply code */
+ while (len--) {
+ op = *src++;
+ *dst++ = op; /* copy op code */
+ switch(op) {
+ case INET_SUBS_EMPTY_OUT_Q:
+ val = driver_sizeq(desc->port);
+ if(val > 0)
+ if(!save_subscriber(&desc->empty_out_q_subs,
+ driver_caller(desc->port)))
+ return 0;
+ break;
+ default: return -1; /* invalid argument */
+ }
+ put_int32(val, dst); /* write 32bit value */
+ dst += 4;
+ }
+ return dst - dst_start; /* actual length */
+}
+
+/* Terminate socket */
+static void inet_stop(inet_descriptor* desc)
+{
+ erl_inet_close(desc);
+ FREE(desc);
+}
+
+
+/* Allocate descriptor */
+static ErlDrvData inet_start(ErlDrvPort port, int size, int protocol)
+{
+ inet_descriptor* desc;
+
+ if ((desc = (inet_descriptor*) ALLOC(size)) == NULL)
+ return NULL;
+
+ desc->s = INVALID_SOCKET;
+ desc->event = INVALID_EVENT;
+ desc->event_mask = 0;
+#ifdef __WIN32__
+ desc->forced_events = 0;
+ desc->send_would_block = 0;
+#endif
+ desc->port = port;
+ desc->dport = driver_mk_port(port);
+ desc->state = INET_STATE_CLOSED;
+ desc->prebound = 0;
+ desc->bufsz = INET_DEF_BUFFER;
+ desc->hsz = 0; /* list header size */
+ desc->htype = TCP_PB_RAW; /* default packet type */
+ desc->psize = 0; /* no size check */
+ desc->stype = -1; /* bad stype */
+ desc->sfamily = -1;
+ desc->sprotocol = protocol;
+ desc->mode = INET_MODE_LIST; /* list mode */
+ desc->exitf = 1; /* exit port when close on active
+ socket */
+ desc->bit8f = 0;
+ desc->bit8 = 0;
+ desc->deliver = INET_DELIVER_TERM; /* standard term format */
+ desc->active = INET_PASSIVE; /* start passive */
+ desc->oph = NULL;
+ desc->opt = NULL;
+
+ desc->peer_ptr = NULL;
+ desc->name_ptr = NULL;
+
+ desc->recv_oct[0] = desc->recv_oct[1] = 0;
+ desc->recv_cnt = 0;
+ desc->recv_max = 0;
+ desc->recv_avg = 0.0;
+ desc->recv_dvi = 0.0;
+ desc->send_oct[0] = desc->send_oct[1] = 0;
+ desc->send_cnt = 0;
+ desc->send_max = 0;
+ desc->send_avg = 0.0;
+ desc->empty_out_q_subs.subscriber = NO_PROCESS;
+ desc->empty_out_q_subs.next = NULL;
+
+ sys_memzero((char *)&desc->remote,sizeof(desc->remote));
+
+ return (ErlDrvData)desc;
+}
+
+
+#ifndef MAXHOSTNAMELEN
+#define MAXHOSTNAMELEN 256
+#endif
+
+/*
+** common TCP/UDP/SCTP control command
+*/
+static int inet_ctl(inet_descriptor* desc, int cmd, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ switch (cmd) {
+
+ case INET_REQ_GETSTAT: {
+ char* dst;
+ int i;
+ int dstlen = 1; /* Reply code */
+
+ for (i = 0; i < len; i++) {
+ switch(buf[i]) {
+ case INET_STAT_SEND_OCT: dstlen += 9; break;
+ case INET_STAT_RECV_OCT: dstlen += 9; break;
+ default: dstlen += 5; break;
+ }
+ }
+ DEBUGF(("inet_ctl(%ld): GETSTAT\r\n", (long) desc->port));
+ if (dstlen > INET_MAX_BUFFER) /* sanity check */
+ return 0;
+ if (dstlen > rsize) {
+ if ((dst = (char*) ALLOC(dstlen)) == NULL)
+ return 0;
+ *rbuf = dst; /* call will free this buffer */
+ }
+ else
+ dst = *rbuf; /* ok we fit in buffer given */
+ return inet_fill_stat(desc, buf, len, dst);
+ }
+
+ case INET_REQ_SUBSCRIBE: {
+ char* dst;
+ int dstlen = 1 /* Reply code */ + len*5;
+ DEBUGF(("inet_ctl(%ld): INET_REQ_SUBSCRIBE\r\n", (long) desc->port));
+ if (dstlen > INET_MAX_BUFFER) /* sanity check */
+ return 0;
+ if (dstlen > rsize) {
+ if ((dst = (char*) ALLOC(dstlen)) == NULL)
+ return 0;
+ *rbuf = dst; /* call will free this buffer */
+ }
+ else
+ dst = *rbuf; /* ok we fit in buffer given */
+ return inet_subscribe(desc, buf, len, dst);
+ }
+
+ case INET_REQ_GETOPTS: { /* get options */
+ int replen;
+ DEBUGF(("inet_ctl(%ld): GETOPTS\r\n", (long)desc->port));
+#ifdef HAVE_SCTP
+ if (IS_SCTP(desc))
+ {
+ if ((replen = sctp_fill_opts(desc, buf, len, rbuf, rsize)) < 0)
+ return ctl_error(-replen, rbuf, rsize);
+ } else
+#endif
+ if ((replen = inet_fill_opts(desc, buf, len, rbuf, rsize)) < 0) {
+ return ctl_error(EINVAL, rbuf, rsize);
+ }
+ return replen;
+ }
+
+ case INET_REQ_GETIFLIST: {
+ DEBUGF(("inet_ctl(%ld): GETIFLIST\r\n", (long)desc->port));
+ if (!IS_OPEN(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ return inet_ctl_getiflist(desc, rbuf, rsize);
+ }
+
+ case INET_REQ_IFGET: {
+ DEBUGF(("inet_ctl(%ld): IFGET\r\n", (long)desc->port));
+ if (!IS_OPEN(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ return inet_ctl_ifget(desc, buf, len, rbuf, rsize);
+ }
+
+ case INET_REQ_IFSET: {
+ DEBUGF(("inet_ctl(%ld): IFSET\r\n", (long)desc->port));
+ if (!IS_OPEN(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ return inet_ctl_ifset(desc, buf, len, rbuf, rsize);
+ }
+
+ case INET_REQ_SETOPTS: { /* set options */
+ DEBUGF(("inet_ctl(%ld): SETOPTS\r\n", (long)desc->port));
+ switch(inet_set_opts(desc, buf, len)) {
+ case -1:
+ return ctl_error(EINVAL, rbuf, rsize);
+ case 0:
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ default: /* active/passive change!! */
+ /*
+ * Let's hope that the descriptor really is a tcp_descriptor here.
+ */
+ tcp_deliver((tcp_descriptor *) desc, 0);
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+ }
+
+ case INET_REQ_GETSTATUS: {
+ char tbuf[4];
+
+ DEBUGF(("inet_ctl(%ld): GETSTATUS\r\n", (long)desc->port));
+ put_int32(desc->state, tbuf);
+ return ctl_reply(INET_REP_OK, tbuf, 4, rbuf, rsize);
+ }
+
+ case INET_REQ_GETTYPE: {
+ char tbuf[8];
+
+ DEBUGF(("inet_ctl(%ld): GETTYPE\r\n", (long)desc->port));
+ if (desc->sfamily == AF_INET) {
+ put_int32(INET_AF_INET, &tbuf[0]);
+ }
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if (desc->sfamily == AF_INET6) {
+ put_int32(INET_AF_INET6, &tbuf[0]);
+ }
+#endif
+ else
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ if (desc->stype == SOCK_STREAM) {
+ put_int32(INET_TYPE_STREAM, &tbuf[4]);
+ }
+ else if (desc->stype == SOCK_DGRAM) {
+ put_int32(INET_TYPE_DGRAM, &tbuf[4]);
+ }
+#ifdef HAVE_SCTP
+ else if (desc->stype == SOCK_SEQPACKET) {
+ put_int32(INET_TYPE_SEQPACKET, &tbuf[4]);
+ }
+#endif
+ else
+ return ctl_error(EINVAL, rbuf, rsize);
+ return ctl_reply(INET_REP_OK, tbuf, 8, rbuf, rsize);
+ }
+
+
+ case INET_REQ_GETFD: {
+ char tbuf[4];
+
+ DEBUGF(("inet_ctl(%ld): GETFD\r\n", (long)desc->port));
+ if (!IS_OPEN(desc))
+ return ctl_error(EINVAL, rbuf, rsize);
+ put_int32((long)desc->s, tbuf);
+ return ctl_reply(INET_REP_OK, tbuf, 4, rbuf, rsize);
+ }
+
+ case INET_REQ_GETHOSTNAME: { /* get host name */
+ char tbuf[MAXHOSTNAMELEN];
+
+ DEBUGF(("inet_ctl(%ld): GETHOSTNAME\r\n", (long)desc->port));
+ if (len != 0)
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ if (sock_hostname(tbuf, MAXHOSTNAMELEN) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ return ctl_reply(INET_REP_OK, tbuf, strlen(tbuf), rbuf, rsize);
+ }
+
+ case INET_REQ_PEER: { /* get peername */
+ char tbuf[sizeof(inet_address)];
+ inet_address peer;
+ inet_address* ptr;
+ unsigned int sz = sizeof(peer);
+
+ DEBUGF(("inet_ctl(%ld): PEER\r\n", (long)desc->port));
+
+ if (!(desc->state & INET_F_ACTIVE))
+ return ctl_error(ENOTCONN, rbuf, rsize);
+ if ((ptr = desc->peer_ptr) == NULL) {
+ ptr = &peer;
+ if (sock_peer(desc->s, (struct sockaddr*)ptr,&sz) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ if (inet_get_address(desc->sfamily, tbuf, ptr, &sz) < 0)
+ return ctl_error(EINVAL, rbuf, rsize);
+ return ctl_reply(INET_REP_OK, tbuf, sz, rbuf, rsize);
+ }
+
+ case INET_REQ_SETPEER: { /* set fake peername Port Address */
+ if (len == 0) {
+ desc->peer_ptr = NULL;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+ else if (len < 2)
+ return ctl_error(EINVAL, rbuf, rsize);
+ else if (inet_set_address(desc->sfamily, &desc->peer_addr,
+ buf, &len) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+ else {
+ desc->peer_ptr = &desc->peer_addr;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+ }
+
+ case INET_REQ_NAME: { /* get sockname */
+ char tbuf[sizeof(inet_address)];
+ inet_address name;
+ inet_address* ptr;
+ unsigned int sz = sizeof(name);
+
+ DEBUGF(("inet_ctl(%ld): NAME\r\n", (long)desc->port));
+
+ if (!IS_BOUND(desc))
+ return ctl_error(EINVAL, rbuf, rsize); /* address is not valid */
+
+ if ((ptr = desc->name_ptr) == NULL) {
+ ptr = &name;
+ if (sock_name(desc->s, (struct sockaddr*)ptr, &sz) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ if (inet_get_address(desc->sfamily, tbuf, ptr, &sz) < 0)
+ return ctl_error(EINVAL, rbuf, rsize);
+ return ctl_reply(INET_REP_OK, tbuf, sz, rbuf, rsize);
+ }
+
+ case INET_REQ_SETNAME: { /* set fake peername Port Address */
+ if (len == 0) {
+ desc->name_ptr = NULL;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+ else if (len < 2)
+ return ctl_error(EINVAL, rbuf, rsize);
+ else if (inet_set_address(desc->sfamily, &desc->name_addr,
+ buf, &len) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+ else {
+ desc->name_ptr = &desc->name_addr;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+ }
+
+ case INET_REQ_BIND: { /* bind socket */
+ char tbuf[2];
+ inet_address local;
+ short port;
+
+ DEBUGF(("inet_ctl(%ld): BIND\r\n", (long)desc->port));
+
+ if (len < 2)
+ return ctl_error(EINVAL, rbuf, rsize);
+ if (desc->state != INET_STATE_OPEN)
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+
+ if (inet_set_address(desc->sfamily, &local, buf, &len) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ if (sock_bind(desc->s,(struct sockaddr*) &local, len) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+
+ desc->state = INET_STATE_BOUND;
+
+ if ((port = inet_address_port(&local)) == 0) {
+ len = sizeof(local);
+ sock_name(desc->s, (struct sockaddr*) &local, (unsigned int*)&len);
+ port = inet_address_port(&local);
+ }
+ port = sock_ntohs(port);
+ put_int16(port, tbuf);
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+
+#ifndef VXWORKS
+
+ case INET_REQ_GETSERVBYNAME: { /* L1 Name-String L2 Proto-String */
+ char namebuf[256];
+ char protobuf[256];
+ char tbuf[2];
+ struct servent* srv;
+ short port;
+ int n;
+
+ if (len < 2)
+ return ctl_error(EINVAL, rbuf, rsize);
+ n = buf[0]; buf++; len--;
+ if (n >= len) /* the = sign makes the test inklude next length byte */
+ return ctl_error(EINVAL, rbuf, rsize);
+ memcpy(namebuf, buf, n);
+ namebuf[n] = '\0';
+ len -= n; buf += n;
+ n = buf[0]; buf++; len--;
+ if (n > len)
+ return ctl_error(EINVAL, rbuf, rsize);
+ memcpy(protobuf, buf, n);
+ protobuf[n] = '\0';
+ if ((srv = sock_getservbyname(namebuf, protobuf)) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+ port = sock_ntohs(srv->s_port);
+ put_int16(port, tbuf);
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+
+ case INET_REQ_GETSERVBYPORT: { /* P1 P0 L1 Proto-String */
+ char protobuf[256];
+ unsigned short port;
+ int n;
+ struct servent* srv;
+
+ if (len < 3)
+ return ctl_error(EINVAL, rbuf, rsize);
+ port = get_int16(buf);
+ port = sock_htons(port);
+ buf += 2;
+ n = buf[0]; buf++; len -= 3;
+ if (n > len)
+ return ctl_error(EINVAL, rbuf, rsize);
+ memcpy(protobuf, buf, n);
+ protobuf[n] = '\0';
+ if ((srv = sock_getservbyport(port, protobuf)) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+ len = strlen(srv->s_name);
+ return ctl_reply(INET_REP_OK, srv->s_name, len, rbuf, rsize);
+ }
+
+#endif /* !VXWORKS */
+
+ default:
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ }
+}
+
+/* update statistics on output packets */
+static void inet_output_count(inet_descriptor* desc, int len)
+{
+ unsigned long n = desc->send_cnt + 1;
+ unsigned long t = desc->send_oct[0] + len;
+ int c = (t < desc->send_oct[0]);
+ double avg = desc->send_avg;
+
+ /* at least 64 bit octet count */
+ desc->send_oct[0] = t;
+ desc->send_oct[1] += c;
+
+ if (n == 0) /* WRAP, use old avg as input to a new sequence */
+ n = 1;
+ desc->send_avg += (len - avg) / n;
+ if (len > desc->send_max)
+ desc->send_max = len;
+ desc->send_cnt = n;
+}
+
+/* update statistics on input packets */
+static void inet_input_count(inet_descriptor* desc, int len)
+{
+ unsigned long n = desc->recv_cnt + 1;
+ unsigned long t = desc->recv_oct[0] + len;
+ int c = (t < desc->recv_oct[0]);
+ double avg = desc->recv_avg;
+ double dvi;
+
+ /* at least 64 bit octet count */
+ desc->recv_oct[0] = t;
+ desc->recv_oct[1] += c;
+
+ if (n == 0) /* WRAP */
+ n = 1;
+
+ /* average packet length */
+ avg = avg + (len - avg) / n;
+ desc->recv_avg = avg;
+
+ if (len > desc->recv_max)
+ desc->recv_max = len;
+
+ /* average deviation from average packet length */
+ dvi = desc->recv_dvi;
+ desc->recv_dvi = dvi + ((len - avg) - dvi) / n;
+ desc->recv_cnt = n;
+}
+
+/*----------------------------------------------------------------------------
+
+ TCP
+
+-----------------------------------------------------------------------------*/
+
+/*
+** Set new size on buffer, used when packet size is determined
+** and the buffer is to small.
+** buffer must have a size of at least len bytes (counting from ptr_start!)
+*/
+static int tcp_expand_buffer(tcp_descriptor* desc, int len)
+{
+ ErlDrvBinary* bin;
+ int offs1;
+ int offs2;
+ int used = desc->i_ptr_start - desc->i_buf->orig_bytes;
+ int ulen = used + len;
+
+ if (desc->i_bufsz >= ulen) /* packet will fit */
+ return 0;
+ else if (desc->i_buf->orig_size >= ulen) { /* buffer is large enough */
+ desc->i_bufsz = ulen; /* set "virtual" size */
+ return 0;
+ }
+
+ DEBUGF(("tcp_expand_buffer(%ld): s=%d, from %ld to %d\r\n",
+ (long)desc->inet.port, desc->inet.s, desc->i_buf->orig_size, ulen));
+
+ offs1 = desc->i_ptr_start - desc->i_buf->orig_bytes;
+ offs2 = desc->i_ptr - desc->i_ptr_start;
+
+ if ((bin = driver_realloc_binary(desc->i_buf, ulen)) == NULL)
+ return -1;
+
+ desc->i_buf = bin;
+ desc->i_ptr_start = bin->orig_bytes + offs1;
+ desc->i_ptr = desc->i_ptr_start + offs2;
+ desc->i_bufsz = ulen;
+ return 0;
+}
+
+/* push data into i_buf */
+static int tcp_push_buffer(tcp_descriptor* desc, char* buf, int len)
+{
+ ErlDrvBinary* bin;
+
+ if (desc->i_buf == NULL) {
+ bin = alloc_buffer(len);
+ sys_memcpy(bin->orig_bytes, buf, len);
+ desc->i_buf = bin;
+ desc->i_bufsz = len;
+ desc->i_ptr_start = desc->i_buf->orig_bytes;
+ desc->i_ptr = desc->i_ptr_start + len;
+ }
+ else {
+ char* start = desc->i_buf->orig_bytes;
+ int sz_before = desc->i_ptr_start - start;
+ int sz_filled = desc->i_ptr - desc->i_ptr_start;
+
+ if (len <= sz_before) {
+ sys_memcpy(desc->i_ptr_start - len, buf, len);
+ desc->i_ptr_start -= len;
+ }
+ else {
+ bin = alloc_buffer(desc->i_bufsz+len);
+ sys_memcpy(bin->orig_bytes, buf, len);
+ sys_memcpy(bin->orig_bytes+len, desc->i_ptr_start, sz_filled);
+ free_buffer(desc->i_buf);
+ desc->i_bufsz += len;
+ desc->i_buf = bin;
+ desc->i_ptr_start = bin->orig_bytes;
+ desc->i_ptr = desc->i_ptr_start + sz_filled + len;
+ }
+ }
+ desc->i_remain = 0;
+ return 0;
+}
+
+/* clear CURRENT input buffer */
+static void tcp_clear_input(tcp_descriptor* desc)
+{
+ if (desc->i_buf != NULL)
+ free_buffer(desc->i_buf);
+ desc->i_buf = NULL;
+ desc->i_remain = 0;
+ desc->i_ptr = NULL;
+ desc->i_ptr_start = NULL;
+ desc->i_bufsz = 0;
+}
+
+/* clear QUEUED output */
+static void tcp_clear_output(tcp_descriptor* desc)
+{
+ ErlDrvPort ix = desc->inet.port;
+ int qsz = driver_sizeq(ix);
+
+ driver_deq(ix, qsz);
+ send_empty_out_q_msgs(INETP(desc));
+}
+
+
+/* Move data so that ptr_start point at buf->orig_bytes */
+static void tcp_restart_input(tcp_descriptor* desc)
+{
+ if (desc->i_ptr_start != desc->i_buf->orig_bytes) {
+ int n = desc->i_ptr - desc->i_ptr_start;
+
+ DEBUGF(("tcp_restart_input: move %d bytes\r\n", n));
+ sys_memmove(desc->i_buf->orig_bytes, desc->i_ptr_start, n);
+ desc->i_ptr_start = desc->i_buf->orig_bytes;
+ desc->i_ptr = desc->i_ptr_start + n;
+ }
+}
+
+
+static int tcp_inet_init(void)
+{
+ DEBUGF(("tcp_inet_init() {}\r\n"));
+ return 0;
+}
+
+/* initialize the TCP descriptor */
+
+static ErlDrvData tcp_inet_start(ErlDrvPort port, char* args)
+{
+ tcp_descriptor* desc;
+ DEBUGF(("tcp_inet_start(%ld) {\r\n", (long)port));
+
+ desc = (tcp_descriptor*)
+ inet_start(port, sizeof(tcp_descriptor), IPPROTO_TCP);
+ if (desc == NULL)
+ return ERL_DRV_ERROR_ERRNO;
+ desc->high = INET_HIGH_WATERMARK;
+ desc->low = INET_LOW_WATERMARK;
+ desc->send_timeout = INET_INFINITY;
+ desc->send_timeout_close = 0;
+ desc->busy_on_send = 0;
+ desc->i_buf = NULL;
+ desc->i_ptr = NULL;
+ desc->i_ptr_start = NULL;
+ desc->i_remain = 0;
+ desc->i_bufsz = 0;
+ desc->tcp_add_flags = 0;
+ desc->http_state = 0;
+ desc->mtd = NULL;
+ desc->multi_first = desc->multi_last = NULL;
+ DEBUGF(("tcp_inet_start(%ld) }\r\n", (long)port));
+ return (ErlDrvData) desc;
+}
+
+/* Copy a descriptor, by creating a new port with same settings
+ * as the descriptor desc.
+ * return NULL on error (ENFILE no ports avail)
+ */
+static tcp_descriptor* tcp_inet_copy(tcp_descriptor* desc,SOCKET s,
+ ErlDrvTermData owner, int* err)
+{
+ ErlDrvPort port = desc->inet.port;
+ tcp_descriptor* copy_desc;
+
+ copy_desc = (tcp_descriptor*) tcp_inet_start(port, NULL);
+
+ /* Setup event if needed */
+ if ((copy_desc->inet.s = s) != INVALID_SOCKET) {
+ if ((copy_desc->inet.event = sock_create_event(INETP(copy_desc))) ==
+ INVALID_EVENT) {
+ *err = sock_errno();
+ FREE(copy_desc);
+ return NULL;
+ }
+ }
+
+ /* Some flags must be inherited at this point */
+ copy_desc->inet.mode = desc->inet.mode;
+ copy_desc->inet.exitf = desc->inet.exitf;
+ copy_desc->inet.bit8f = desc->inet.bit8f;
+ copy_desc->inet.deliver = desc->inet.deliver;
+ copy_desc->inet.htype = desc->inet.htype;
+ copy_desc->inet.psize = desc->inet.psize;
+ copy_desc->inet.stype = desc->inet.stype;
+ copy_desc->inet.sfamily = desc->inet.sfamily;
+ copy_desc->inet.hsz = desc->inet.hsz;
+ copy_desc->inet.bufsz = desc->inet.bufsz;
+ copy_desc->high = desc->high;
+ copy_desc->low = desc->low;
+ copy_desc->send_timeout = desc->send_timeout;
+ copy_desc->send_timeout_close = desc->send_timeout_close;
+
+ /* The new port will be linked and connected to the original caller */
+ port = driver_create_port(port, owner, "tcp_inet", (ErlDrvData) copy_desc);
+ if ((long)port == -1) {
+ *err = ENFILE;
+ FREE(copy_desc);
+ return NULL;
+ }
+ copy_desc->inet.port = port;
+ copy_desc->inet.dport = driver_mk_port(port);
+ *err = 0;
+ return copy_desc;
+}
+
+/*
+** Check Special cases:
+** 1. we are a listener doing nb accept -> report error on accept !
+** 2. we are doing accept -> restore listener state
+*/
+static void tcp_close_check(tcp_descriptor* desc)
+{
+ /* XXX:PaN - multiple clients to handle! */
+ if (desc->inet.state == TCP_STATE_ACCEPTING) {
+ inet_async_op *this_op = desc->inet.opt;
+ sock_select(INETP(desc), FD_ACCEPT, 0);
+ desc->inet.state = TCP_STATE_LISTEN;
+ if (this_op != NULL) {
+ driver_demonitor_process(desc->inet.port, &(this_op->monitor));
+ }
+ async_error_am(INETP(desc), am_closed);
+ }
+ else if (desc->inet.state == TCP_STATE_MULTI_ACCEPTING) {
+ int id,req;
+ ErlDrvTermData caller;
+ ErlDrvMonitor monitor;
+
+ sock_select(INETP(desc), FD_ACCEPT, 0);
+ desc->inet.state = TCP_STATE_LISTEN;
+ while (deq_multi_op(desc,&id,&req,&caller,NULL,&monitor) == 0) {
+ driver_demonitor_process(desc->inet.port, &monitor);
+ send_async_error(desc->inet.port, desc->inet.dport, id, caller, am_closed);
+ }
+ clean_multi_timers(&(desc->mtd), desc->inet.port);
+ }
+
+ else if (desc->inet.state == TCP_STATE_CONNECTING) {
+ async_error_am(INETP(desc), am_closed);
+ }
+ else if (desc->inet.state == TCP_STATE_CONNECTED) {
+ async_error_am_all(INETP(desc), am_closed);
+ }
+}
+
+/*
+** Cleanup & Free
+*/
+static void tcp_inet_stop(ErlDrvData e)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ DEBUGF(("tcp_inet_stop(%ld) {s=%d\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ tcp_close_check(desc);
+ /* free input buffer & output buffer */
+ if (desc->i_buf != NULL)
+ release_buffer(desc->i_buf);
+ desc->i_buf = NULL; /* net_mess2 may call this function recursively when
+ faulty messages arrive on dist ports*/
+ DEBUGF(("tcp_inet_stop(%ld) }\r\n", (long)desc->inet.port));
+ inet_stop(INETP(desc));
+}
+
+
+
+
+/* TCP requests from Erlang */
+static int tcp_inet_ctl(ErlDrvData e, unsigned int cmd, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ switch(cmd) {
+ case INET_REQ_OPEN: /* open socket and return internal index */
+ DEBUGF(("tcp_inet_ctl(%ld): OPEN\r\n", (long)desc->inet.port));
+ if ((len == 1) && (buf[0] == INET_AF_INET))
+ return
+ inet_ctl_open(INETP(desc), AF_INET, SOCK_STREAM, rbuf, rsize);
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if ((len == 1) && (buf[0] == INET_AF_INET6))
+ return
+ inet_ctl_open(INETP(desc), AF_INET6, SOCK_STREAM, rbuf, rsize);
+#else
+ else if ((len == 1) && (buf[0] == INET_AF_INET6))
+ return ctl_xerror("eafnosupport",rbuf,rsize);
+#endif
+ else
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ case INET_REQ_FDOPEN: /* pass in an open socket */
+ DEBUGF(("tcp_inet_ctl(%ld): FDOPEN\r\n", (long)desc->inet.port));
+ if ((len == 5) && (buf[0] == INET_AF_INET))
+ return inet_ctl_fdopen(INETP(desc), AF_INET, SOCK_STREAM,
+ (SOCKET) get_int32(buf+1), rbuf, rsize);
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if ((len == 5) && (buf[0] == INET_AF_INET6))
+ return inet_ctl_fdopen(INETP(desc), AF_INET6, SOCK_STREAM,
+ (SOCKET) get_int32(buf+1), rbuf, rsize);
+#endif
+ else
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ case TCP_REQ_LISTEN: { /* argument backlog */
+
+ int backlog;
+ DEBUGF(("tcp_inet_ctl(%ld): LISTEN\r\n", (long)desc->inet.port));
+ if (desc->inet.state == TCP_STATE_CLOSED)
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ if (!IS_OPEN(INETP(desc)))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ if (!IS_BOUND(INETP(desc)))
+ return ctl_xerror(EXBADSEQ, rbuf, rsize);
+ if (len != 2)
+ return ctl_error(EINVAL, rbuf, rsize);
+ backlog = get_int16(buf);
+ if (sock_listen(desc->inet.s, backlog) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+ desc->inet.state = TCP_STATE_LISTEN;
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+
+
+ case INET_REQ_CONNECT: { /* do async connect */
+ int code;
+ char tbuf[2];
+ unsigned timeout;
+
+ DEBUGF(("tcp_inet_ctl(%ld): CONNECT\r\n", (long)desc->inet.port));
+ /* INPUT: Timeout(4), Port(2), Address(N) */
+
+ if (!IS_OPEN(INETP(desc)))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ if (IS_CONNECTED(INETP(desc)))
+ return ctl_error(EISCONN, rbuf, rsize);
+ if (!IS_BOUND(INETP(desc)))
+ return ctl_xerror(EXBADSEQ, rbuf, rsize);
+ if (IS_CONNECTING(INETP(desc)))
+ return ctl_error(EINVAL, rbuf, rsize);
+ if (len < 6)
+ return ctl_error(EINVAL, rbuf, rsize);
+ timeout = get_int32(buf);
+ buf += 4;
+ len -= 4;
+ if (inet_set_address(desc->inet.sfamily, &desc->inet.remote,
+ buf, &len) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ code = sock_connect(desc->inet.s,
+ (struct sockaddr*) &desc->inet.remote, len);
+ if ((code == SOCKET_ERROR) &&
+ ((sock_errno() == ERRNO_BLOCK) || /* Winsock2 */
+ (sock_errno() == EINPROGRESS))) { /* Unix & OSE!! */
+ sock_select(INETP(desc), FD_CONNECT, 1);
+ desc->inet.state = TCP_STATE_CONNECTING;
+ if (timeout != INET_INFINITY)
+ driver_set_timer(desc->inet.port, timeout);
+ enq_async(INETP(desc), tbuf, INET_REQ_CONNECT);
+ }
+ else if (code == 0) { /* ok we are connected */
+ desc->inet.state = TCP_STATE_CONNECTED;
+ if (desc->inet.active)
+ sock_select(INETP(desc), (FD_READ|FD_CLOSE), 1);
+ enq_async(INETP(desc), tbuf, INET_REQ_CONNECT);
+ async_ok(INETP(desc));
+ }
+ else {
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+
+ case TCP_REQ_ACCEPT: { /* do async accept */
+ char tbuf[2];
+ unsigned timeout;
+ inet_address remote;
+ unsigned int n;
+ SOCKET s;
+
+ DEBUGF(("tcp_inet_ctl(%ld): ACCEPT\r\n", (long)desc->inet.port));
+ /* INPUT: Timeout(4) */
+
+ if ((desc->inet.state != TCP_STATE_LISTEN && desc->inet.state != TCP_STATE_ACCEPTING &&
+ desc->inet.state != TCP_STATE_MULTI_ACCEPTING) || len != 4) {
+ return ctl_error(EINVAL, rbuf, rsize);
+ }
+
+ timeout = get_int32(buf);
+
+ if (desc->inet.state == TCP_STATE_ACCEPTING) {
+ unsigned long time_left;
+ int oid;
+ ErlDrvTermData ocaller;
+ int oreq;
+ unsigned otimeout;
+ ErlDrvTermData caller = driver_caller(desc->inet.port);
+ MultiTimerData *mtd = NULL,*omtd = NULL;
+ ErlDrvMonitor monitor, omonitor;
+
+
+ if (driver_monitor_process(desc->inet.port, caller ,&monitor) != 0) {
+ return ctl_xerror("noproc", rbuf, rsize);
+ }
+ deq_async_w_tmo(INETP(desc),&oid,&ocaller,&oreq,&otimeout,&omonitor);
+ if (otimeout != INET_INFINITY) {
+ driver_read_timer(desc->inet.port, &time_left);
+ driver_cancel_timer(desc->inet.port);
+ if (time_left <= 0) {
+ time_left = 1;
+ }
+ omtd = add_multi_timer(&(desc->mtd), desc->inet.port, ocaller,
+ time_left, &tcp_inet_multi_timeout);
+ }
+ enq_old_multi_op(desc, oid, oreq, ocaller, omtd, &omonitor);
+ if (timeout != INET_INFINITY) {
+ mtd = add_multi_timer(&(desc->mtd), desc->inet.port, caller,
+ timeout, &tcp_inet_multi_timeout);
+ }
+ enq_multi_op(desc, tbuf, TCP_REQ_ACCEPT, caller, mtd, &monitor);
+ desc->inet.state = TCP_STATE_MULTI_ACCEPTING;
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ } else if (desc->inet.state == TCP_STATE_MULTI_ACCEPTING) {
+ ErlDrvTermData caller = driver_caller(desc->inet.port);
+ MultiTimerData *mtd = NULL;
+ ErlDrvMonitor monitor;
+
+ if (driver_monitor_process(desc->inet.port, caller ,&monitor) != 0) {
+ return ctl_xerror("noproc", rbuf, rsize);
+ }
+ if (timeout != INET_INFINITY) {
+ mtd = add_multi_timer(&(desc->mtd), desc->inet.port, caller,
+ timeout, &tcp_inet_multi_timeout);
+ }
+ enq_multi_op(desc, tbuf, TCP_REQ_ACCEPT, caller, mtd, &monitor);
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ } else {
+ n = sizeof(desc->inet.remote);
+ s = sock_accept(desc->inet.s, (struct sockaddr*) &remote, &n);
+ if (s == INVALID_SOCKET) {
+ if (sock_errno() == ERRNO_BLOCK) {
+ ErlDrvMonitor monitor;
+ if (driver_monitor_process(desc->inet.port, driver_caller(desc->inet.port),
+ &monitor) != 0) {
+ return ctl_xerror("noproc", rbuf, rsize);
+ }
+ enq_async_w_tmo(INETP(desc), tbuf, TCP_REQ_ACCEPT, timeout, &monitor);
+ desc->inet.state = TCP_STATE_ACCEPTING;
+ sock_select(INETP(desc),FD_ACCEPT,1);
+ if (timeout != INET_INFINITY) {
+ driver_set_timer(desc->inet.port, timeout);
+ }
+ } else {
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ } else {
+ ErlDrvTermData caller = driver_caller(desc->inet.port);
+ tcp_descriptor* accept_desc;
+ int err;
+
+ if ((accept_desc = tcp_inet_copy(desc,s,caller,&err)) == NULL) {
+ sock_close(s);
+ return ctl_error(err, rbuf, rsize);
+ }
+ /* FIXME: may MUST lock access_port
+ * 1 - Port is accessible via the erlang:ports()
+ * 2 - Port is accessible via callers process_info(links)
+ */
+ accept_desc->inet.remote = remote;
+ SET_NONBLOCKING(accept_desc->inet.s);
+#ifdef __WIN32__
+ driver_select(accept_desc->inet.port, accept_desc->inet.event,
+ ERL_DRV_READ, 1);
+#endif
+ accept_desc->inet.state = TCP_STATE_CONNECTED;
+ enq_async(INETP(desc), tbuf, TCP_REQ_ACCEPT);
+ async_ok_port(INETP(desc), accept_desc->inet.dport);
+ }
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+ }
+ case INET_REQ_CLOSE:
+ DEBUGF(("tcp_inet_ctl(%ld): CLOSE\r\n", (long)desc->inet.port));
+ tcp_close_check(desc);
+ erl_inet_close(INETP(desc));
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+
+
+ case TCP_REQ_RECV: {
+ unsigned timeout;
+ char tbuf[2];
+ int n;
+
+ DEBUGF(("tcp_inet_ctl(%ld): RECV\r\n", (long)desc->inet.port));
+ /* INPUT: Timeout(4), Length(4) */
+ if (!IS_CONNECTED(INETP(desc))) {
+ if (desc->tcp_add_flags & TCP_ADDF_DELAYED_CLOSE_RECV) {
+ desc->tcp_add_flags &= ~(TCP_ADDF_DELAYED_CLOSE_RECV|
+ TCP_ADDF_DELAYED_CLOSE_SEND);
+ return ctl_reply(INET_REP_ERROR, "closed", 6, rbuf, rsize);
+ }
+ return ctl_error(ENOTCONN, rbuf, rsize);
+ }
+ if (desc->inet.active || (len != 8))
+ return ctl_error(EINVAL, rbuf, rsize);
+ timeout = get_int32(buf);
+ buf += 4;
+ n = get_int32(buf);
+ DEBUGF(("tcp_inet_ctl(%ld) timeout = %d, n = %d\r\n",
+ (long)desc->inet.port,timeout,n));
+ if ((desc->inet.htype != TCP_PB_RAW) && (n != 0))
+ return ctl_error(EINVAL, rbuf, rsize);
+ if (n > TCP_MAX_PACKET_SIZE)
+ return ctl_error(ENOMEM, rbuf, rsize);
+ if (enq_async(INETP(desc), tbuf, TCP_REQ_RECV) < 0)
+ return ctl_error(EALREADY, rbuf, rsize);
+
+ if (tcp_recv(desc, n) == 0) {
+ if (timeout == 0)
+ async_error_am(INETP(desc), am_timeout);
+ else {
+ if (timeout != INET_INFINITY)
+ driver_set_timer(desc->inet.port, timeout);
+ sock_select(INETP(desc),(FD_READ|FD_CLOSE),1);
+ }
+ }
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+
+ case TCP_REQ_UNRECV: {
+ DEBUGF(("tcp_inet_ctl(%ld): UNRECV\r\n", (long)desc->inet.port));
+ if (!IS_CONNECTED(INETP(desc)))
+ return ctl_error(ENOTCONN, rbuf, rsize);
+ tcp_push_buffer(desc, buf, len);
+ if (desc->inet.active)
+ tcp_deliver(desc, 0);
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+#ifndef _OSE_
+ case TCP_REQ_SHUTDOWN: {
+ int how;
+ DEBUGF(("tcp_inet_ctl(%ld): FDOPEN\r\n", (long)desc->inet.port));
+ if (!IS_CONNECTED(INETP(desc))) {
+ return ctl_error(ENOTCONN, rbuf, rsize);
+ }
+ if (len != 1) {
+ return ctl_error(EINVAL, rbuf, rsize);
+ }
+ how = buf[0];
+ if (sock_shutdown(INETP(desc)->s, how) == 0) {
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ } else {
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ }
+#endif
+ default:
+ DEBUGF(("tcp_inet_ctl(%ld): %u\r\n", (long)desc->inet.port, cmd));
+ return inet_ctl(INETP(desc), cmd, buf, len, rbuf, rsize);
+ }
+
+}
+
+/*
+** tcp_inet_timeout:
+** called when timer expire:
+** TCP socket may be:
+**
+** a) receiving -- deselect
+** b) connecting -- close socket
+** c) accepting -- reset listener
+**
+*/
+
+static void tcp_inet_timeout(ErlDrvData e)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ int state = desc->inet.state;
+
+ DEBUGF(("tcp_inet_timeout(%ld) {s=%d\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ if ((state & INET_F_MULTI_CLIENT)) { /* Multi-client always means multi-timers */
+ fire_multi_timers(&(desc->mtd), desc->inet.port, e);
+ } else if ((state & TCP_STATE_CONNECTED) == TCP_STATE_CONNECTED) {
+ if (desc->busy_on_send) {
+ ASSERT(IS_BUSY(INETP(desc)));
+ desc->inet.caller = desc->inet.busy_caller;
+ desc->inet.state &= ~INET_F_BUSY;
+ desc->busy_on_send = 0;
+ set_busy_port(desc->inet.port, 0);
+ inet_reply_error_am(INETP(desc), am_timeout);
+ if (desc->send_timeout_close) {
+ erl_inet_close(INETP(desc));
+ }
+ }
+ else {
+ /* assume recv timeout */
+ ASSERT(!desc->inet.active);
+ sock_select(INETP(desc),(FD_READ|FD_CLOSE),0);
+ desc->i_remain = 0;
+ async_error_am(INETP(desc), am_timeout);
+ }
+ }
+ else if ((state & TCP_STATE_CONNECTING) == TCP_STATE_CONNECTING) {
+ /* assume connect timeout */
+ /* close the socket since it's not usable (see man pages) */
+ erl_inet_close(INETP(desc));
+ async_error_am(INETP(desc), am_timeout);
+ }
+ else if ((state & TCP_STATE_ACCEPTING) == TCP_STATE_ACCEPTING) {
+ inet_async_op *this_op = desc->inet.opt;
+ /* timer is set on accept */
+ sock_select(INETP(desc), FD_ACCEPT, 0);
+ if (this_op != NULL) {
+ driver_demonitor_process(desc->inet.port, &(this_op->monitor));
+ }
+ desc->inet.state = TCP_STATE_LISTEN;
+ async_error_am(INETP(desc), am_timeout);
+ }
+ DEBUGF(("tcp_inet_timeout(%ld) }\r\n", (long)desc->inet.port));
+}
+
+static void tcp_inet_multi_timeout(ErlDrvData e, ErlDrvTermData caller)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ int id,req;
+ ErlDrvMonitor monitor;
+
+ if (remove_multi_op(desc, &id, &req, caller, NULL, &monitor) != 0) {
+ return;
+ }
+ driver_demonitor_process(desc->inet.port, &monitor);
+ if (desc->multi_first == NULL) {
+ sock_select(INETP(desc),FD_ACCEPT,0);
+ desc->inet.state = TCP_STATE_LISTEN; /* restore state */
+ }
+ send_async_error(desc->inet.port, desc->inet.dport, id, caller, am_timeout);
+}
+
+
+
+/*
+** command:
+** output on a socket only !
+** a reply code will be sent to connected (caller later)
+** {inet_reply, S, Status}
+** NOTE! normal sockets use the the tcp_inet_commandv
+** but distribution still uses the tcp_inet_command!!
+*/
+
+static void tcp_inet_command(ErlDrvData e, char *buf, int len)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ desc->inet.caller = driver_caller(desc->inet.port);
+
+ DEBUGF(("tcp_inet_command(%ld) {s=%d\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ if (!IS_CONNECTED(INETP(desc)))
+ inet_reply_error(INETP(desc), ENOTCONN);
+ else if (tcp_send(desc, buf, len) == 0)
+ inet_reply_ok(INETP(desc));
+ DEBUGF(("tcp_inet_command(%ld) }\r\n", (long)desc->inet.port));
+}
+
+
+static void tcp_inet_commandv(ErlDrvData e, ErlIOVec* ev)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ desc->inet.caller = driver_caller(desc->inet.port);
+
+ DEBUGF(("tcp_inet_commanv(%ld) {s=%d\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ if (!IS_CONNECTED(INETP(desc))) {
+ if (desc->tcp_add_flags & TCP_ADDF_DELAYED_CLOSE_SEND) {
+ desc->tcp_add_flags &= ~TCP_ADDF_DELAYED_CLOSE_SEND;
+ inet_reply_error_am(INETP(desc), am_closed);
+ }
+ else
+ inet_reply_error(INETP(desc), ENOTCONN);
+ }
+ else if (tcp_sendv(desc, ev) == 0)
+ inet_reply_ok(INETP(desc));
+ DEBUGF(("tcp_inet_commandv(%ld) }\r\n", (long)desc->inet.port));
+}
+
+static void tcp_inet_flush(ErlDrvData e)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ if (!(desc->inet.event_mask & FD_WRITE)) {
+ /* Discard send queue to avoid hanging port (OTP-7615) */
+ tcp_clear_output(desc);
+ }
+}
+
+static void tcp_inet_process_exit(ErlDrvData e, ErlDrvMonitor *monitorp)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ ErlDrvTermData who = driver_get_monitored_process(desc->inet.port,monitorp);
+ int state = desc->inet.state;
+
+ if ((state & TCP_STATE_MULTI_ACCEPTING) == TCP_STATE_MULTI_ACCEPTING) {
+ int id,req;
+ MultiTimerData *timeout;
+ if (remove_multi_op(desc, &id, &req, who, &timeout, NULL) != 0) {
+ return;
+ }
+ if (timeout != NULL) {
+ remove_multi_timer(&(desc->mtd), desc->inet.port, timeout);
+ }
+ if (desc->multi_first == NULL) {
+ sock_select(INETP(desc),FD_ACCEPT,0);
+ desc->inet.state = TCP_STATE_LISTEN; /* restore state */
+ }
+ } else if ((state & TCP_STATE_ACCEPTING) == TCP_STATE_ACCEPTING) {
+ int did,drid;
+ ErlDrvTermData dcaller;
+ deq_async(INETP(desc), &did, &dcaller, &drid);
+ driver_cancel_timer(desc->inet.port);
+ sock_select(INETP(desc),FD_ACCEPT,0);
+ desc->inet.state = TCP_STATE_LISTEN; /* restore state */
+ }
+}
+
+static void inet_stop_select(ErlDrvEvent event, void* _)
+{
+#ifdef __WIN32__
+ WSACloseEvent((HANDLE)event);
+#else
+ sock_close((SOCKET)(long)event);
+#endif
+}
+
+/* The peer socket has closed, cleanup and send event */
+static int tcp_recv_closed(tcp_descriptor* desc)
+{
+#ifdef DEBUG
+ long port = (long) desc->inet.port; /* Used after driver_exit() */
+#endif
+ DEBUGF(("tcp_recv_closed(%ld): s=%d, in %s, line %d\r\n",
+ port, desc->inet.s, __FILE__, __LINE__));
+ if (IS_BUSY(INETP(desc))) {
+ /* A send is blocked */
+ desc->inet.caller = desc->inet.busy_caller;
+ tcp_clear_output(desc);
+ if (desc->busy_on_send) {
+ driver_cancel_timer(desc->inet.port);
+ desc->busy_on_send = 0;
+ DEBUGF(("tcp_recv_closed(%ld): busy on send\r\n", port));
+ }
+ desc->inet.state &= ~INET_F_BUSY;
+ set_busy_port(desc->inet.port, 0);
+ inet_reply_error_am(INETP(desc), am_closed);
+ DEBUGF(("tcp_recv_closed(%ld): busy reply 'closed'\r\n", port));
+ }
+ if (!desc->inet.active) {
+ /* We must cancel any timer here ! */
+ driver_cancel_timer(desc->inet.port);
+ /* passive mode do not terminate port ! */
+ tcp_clear_input(desc);
+ if (desc->inet.exitf) {
+ tcp_clear_output(desc);
+ desc_close(INETP(desc));
+ } else {
+ desc_close_read(INETP(desc));
+ }
+ async_error_am_all(INETP(desc), am_closed);
+ /* next time EXBADSEQ will be delivered */
+ DEBUGF(("tcp_recv_closed(%ld): passive reply all 'closed'\r\n", port));
+ } else {
+ tcp_clear_input(desc);
+ tcp_closed_message(desc);
+ if (desc->inet.exitf) {
+ driver_exit(desc->inet.port, 0);
+ } else {
+ desc_close_read(INETP(desc));
+ }
+ DEBUGF(("tcp_recv_closed(%ld): active close\r\n", port));
+ }
+ DEBUGF(("tcp_recv_closed(%ld): done\r\n", port));
+ return -1;
+}
+
+
+/* We have a read error determine the action */
+static int tcp_recv_error(tcp_descriptor* desc, int err)
+{
+ if (err != ERRNO_BLOCK) {
+ if (IS_BUSY(INETP(desc))) {
+ /* A send is blocked */
+ desc->inet.caller = desc->inet.busy_caller;
+ tcp_clear_output(desc);
+ if (desc->busy_on_send) {
+ driver_cancel_timer(desc->inet.port);
+ desc->busy_on_send = 0;
+ }
+ desc->inet.state &= ~INET_F_BUSY;
+ set_busy_port(desc->inet.port, 0);
+ inet_reply_error_am(INETP(desc), am_closed);
+ }
+ if (!desc->inet.active) {
+ /* We must cancel any timer here ! */
+ driver_cancel_timer(desc->inet.port);
+ tcp_clear_input(desc);
+ if (desc->inet.exitf) {
+ desc_close(INETP(desc));
+ } else {
+ desc_close_read(INETP(desc));
+ }
+ async_error_am_all(INETP(desc), error_atom(err));
+ } else {
+ tcp_clear_input(desc);
+ tcp_error_message(desc, err); /* first error */
+ tcp_closed_message(desc); /* then closed */
+ if (desc->inet.exitf)
+ driver_exit(desc->inet.port, err);
+ else
+ desc_close(INETP(desc));
+ }
+ return -1;
+ }
+ return 0;
+}
+
+
+
+/*
+** Calculate number of bytes that remain to read before deliver
+** Assume buf, ptr_start, ptr has been setup
+**
+** return > 0 if more to read
+** = 0 if holding complete packet
+** < 0 on error
+**
+** if return value == 0 then *len will hold the length of the first packet
+** return value > 0 then if *len == 0 then value means upperbound
+** *len > 0 then value means exact
+**
+*/
+static int tcp_remain(tcp_descriptor* desc, int* len)
+{
+ char* ptr = desc->i_ptr_start;
+ int nfill = (desc->i_ptr - desc->i_buf->orig_bytes); /* filled */
+ int nsz = desc->i_bufsz - nfill; /* remain */
+ int n = desc->i_ptr - ptr; /* number of bytes read */
+ int tlen;
+
+ DEBUGF(("tcp_remain(%ld): s=%d, n=%d, nfill=%d nsz=%d\r\n",
+ (long)desc->inet.port, desc->inet.s, n, nfill, nsz));
+
+ tlen = packet_get_length(desc->inet.htype, ptr, n,
+ desc->inet.psize, desc->i_bufsz,
+ &desc->http_state);
+ if (tlen > 0) {
+ if (tlen <= n) { /* got a packet */
+ *len = tlen;
+ DEBUGF((" => nothing remain packet=%d\r\n", tlen));
+ return 0;
+ }
+ else { /* need known more */
+ if (tcp_expand_buffer(desc, tlen) < 0)
+ return -1;
+ *len = tlen - n;
+ DEBUGF((" => remain=%d\r\n", *len));
+ return *len;
+ }
+ }
+ else if (tlen == 0) { /* need unknown more */
+ *len = 0;
+ if (nsz == 0) {
+ if (nfill == n)
+ goto error;
+ DEBUGF((" => restart more=%d\r\n", nfill - n));
+ return nfill - n;
+ }
+ else {
+ DEBUGF((" => more=%d \r\n", nsz));
+ return nsz;
+ }
+ }
+
+error:
+ DEBUGF((" => packet error\r\n"));
+ return -1;
+}
+
+/*
+** Deliver all packets ready
+** if len == 0 then check start with a check for ready packet
+*/
+static int tcp_deliver(tcp_descriptor* desc, int len)
+{
+ int count = 0;
+ int n;
+
+ /* Poll for ready packet */
+ if (len == 0) {
+ /* empty buffer or waiting for more input */
+ if ((desc->i_buf == NULL) || (desc->i_remain > 0))
+ return count;
+ if ((n = tcp_remain(desc, &len)) != 0) {
+ if (n < 0) /* packet error */
+ return n;
+ if (len > 0) /* more data pending */
+ desc->i_remain = len;
+ return count;
+ }
+ }
+
+ while (len > 0) {
+ int code = 0;
+
+ inet_input_count(INETP(desc), len);
+
+ /* deliver binary? */
+ if (len*4 >= desc->i_buf->orig_size*3) { /* >=75% */
+ /* something after? */
+ if (desc->i_ptr_start + len == desc->i_ptr) { /* no */
+ code = tcp_reply_binary_data(desc, desc->i_buf,
+ (desc->i_ptr_start -
+ desc->i_buf->orig_bytes),
+ len);
+ tcp_clear_input(desc);
+ }
+ else { /* move trail to beginning of a new buffer */
+ ErlDrvBinary* bin;
+ char* ptr_end = desc->i_ptr_start + len;
+ int sz = desc->i_ptr - ptr_end;
+
+ bin = alloc_buffer(desc->i_bufsz);
+ memcpy(bin->orig_bytes, ptr_end, sz);
+
+ code = tcp_reply_binary_data(desc, desc->i_buf,
+ (desc->i_ptr_start-
+ desc->i_buf->orig_bytes),
+ len);
+ free_buffer(desc->i_buf);
+ desc->i_buf = bin;
+ desc->i_ptr_start = desc->i_buf->orig_bytes;
+ desc->i_ptr = desc->i_ptr_start + sz;
+ desc->i_remain = 0;
+ }
+ }
+ else {
+ code = tcp_reply_data(desc, desc->i_ptr_start, len);
+ /* XXX The buffer gets thrown away on error (code < 0) */
+ /* Windows needs workaround for this in tcp_inet_event... */
+ desc->i_ptr_start += len;
+ if (desc->i_ptr_start == desc->i_ptr)
+ tcp_clear_input(desc);
+ else
+ desc->i_remain = 0;
+
+ }
+
+ if (code < 0)
+ return code;
+
+ count++;
+ len = 0;
+
+ if (!desc->inet.active) {
+ driver_cancel_timer(desc->inet.port);
+ sock_select(INETP(desc),(FD_READ|FD_CLOSE),0);
+ if (desc->i_buf != NULL)
+ tcp_restart_input(desc);
+ }
+ else if (desc->i_buf != NULL) {
+ if ((n = tcp_remain(desc, &len)) != 0) {
+ if (n < 0) /* packet error */
+ return n;
+ tcp_restart_input(desc);
+ if (len > 0)
+ desc->i_remain = len;
+ len = 0;
+ }
+ }
+ }
+ return count;
+}
+
+
+static int tcp_recv(tcp_descriptor* desc, int request_len)
+{
+ int n;
+ int len;
+ int nread;
+
+ if (desc->i_buf == NULL) { /* allocte a read buffer */
+ int sz = (request_len > 0) ? request_len : desc->inet.bufsz;
+
+ if ((desc->i_buf = alloc_buffer(sz)) == NULL)
+ return -1;
+ /* XXX: changing bufsz during recv SHOULD/MAY? affect
+ * ongoing operation but is not now
+ */
+ desc->i_bufsz = sz; /* use i_bufsz not i_buf->orig_size ! */
+ desc->i_ptr_start = desc->i_buf->orig_bytes;
+ desc->i_ptr = desc->i_ptr_start;
+ nread = sz;
+ if (request_len > 0)
+ desc->i_remain = request_len;
+ else
+ desc->i_remain = 0;
+ }
+ else if (request_len > 0) { /* we have a data in buffer and a request */
+ n = desc->i_ptr - desc->i_ptr_start;
+ if (n >= request_len)
+ return tcp_deliver(desc, request_len);
+ else if (tcp_expand_buffer(desc, request_len) < 0)
+ return tcp_recv_error(desc, ENOMEM);
+ else
+ desc->i_remain = nread = request_len - n;
+ }
+ else if (desc->i_remain == 0) { /* poll remain from buffer data */
+ if ((nread = tcp_remain(desc, &len)) < 0)
+ return tcp_recv_error(desc, EMSGSIZE);
+ else if (nread == 0)
+ return tcp_deliver(desc, len);
+ else if (len > 0)
+ desc->i_remain = len; /* set remain */
+ }
+ else /* remain already set use it */
+ nread = desc->i_remain;
+
+ DEBUGF(("tcp_recv(%ld): s=%d about to read %d bytes...\r\n",
+ (long)desc->inet.port, desc->inet.s, nread));
+
+ n = sock_recv(desc->inet.s, desc->i_ptr, nread, 0);
+
+ if (n == SOCKET_ERROR) {
+ int err = sock_errno();
+ if (err == ECONNRESET) {
+ DEBUGF((" => detected close (connreset)\r\n"));
+ return tcp_recv_closed(desc);
+ }
+ if (err == ERRNO_BLOCK) {
+ DEBUGF((" => would block\r\n"));
+ return 0;
+ }
+ else {
+ DEBUGF((" => error: %d\r\n", err));
+ return tcp_recv_error(desc, err);
+ }
+ }
+ else if (n == 0) {
+ DEBUGF((" => detected close\r\n"));
+ return tcp_recv_closed(desc);
+ }
+
+ DEBUGF((" => got %d bytes\r\n", n));
+ desc->i_ptr += n;
+ if (desc->i_remain > 0) {
+ desc->i_remain -= n;
+ if (desc->i_remain == 0)
+ return tcp_deliver(desc, desc->i_ptr - desc->i_ptr_start);
+ }
+ else {
+ if ((nread = tcp_remain(desc, &len)) < 0)
+ return tcp_recv_error(desc, EMSGSIZE);
+ else if (nread == 0)
+ return tcp_deliver(desc, len);
+ else if (len > 0)
+ desc->i_remain = len; /* set remain */
+ }
+ return 0;
+}
+
+
+#ifdef __WIN32__
+
+
+static int winsock_event_select(inet_descriptor *desc, int flags, int on)
+{
+ int save_event_mask = desc->event_mask;
+
+ desc->forced_events = 0;
+ if (on)
+ desc->event_mask |= flags;
+ else
+ desc->event_mask &= (~flags);
+ DEBUGF(("port %d: winsock_event_select: "
+ "flags=%02X, on=%d, event_mask=%02X\n",
+ desc->port, flags, on, desc->event_mask));
+ /* The RIGHT WAY (TM) to do this is to make sure:
+ A) The cancelling of all network events is done with
+ NULL as the event parameter (bug in NT's winsock),
+ B) The actual event handle is reset so that it is only
+ raised if one of the requested network events is active,
+ C) Avoid race conditions by making sure that the event cannot be set
+ while we are preparing to set the correct network event mask.
+ The simplest way to do it is to turn off all events, reset the
+ event handle and then, if event_mask != 0, turn on the appropriate
+ events again. */
+ if (WSAEventSelect(desc->s, NULL, 0) != 0) {
+ DEBUGF(("port %d: winsock_event_select: "
+ "WSAEventSelect returned error, code %d.\n",
+ sock_errno()));
+ desc->event_mask = save_event_mask;
+ return -1;
+ }
+ if (!ResetEvent(desc->event)) {
+ DEBUGF(("port %d: winsock_event_select: "
+ "ResetEvent returned error, code %d.\n",
+ GetLastError()));
+ desc->event_mask = 0;
+ return -1;
+ }
+ if (desc->event_mask != 0) {
+ if (WSAEventSelect(desc->s,
+ desc->event,
+ desc->event_mask) != 0) {
+ DEBUGF(("port %d: winsock_event_select: "
+ "WSAEventSelect returned error, code %d.\n",
+ sock_errno()));
+ desc->event_mask = 0;
+ return -1;
+ }
+
+ /* Now, WSAEventSelect() is trigged only when the queue goes from
+ full to empty or from empty to full; therefore we need an extra test
+ to see whether it is writeable, readable or closed... */
+ if ((desc->event_mask & FD_WRITE)) {
+ int do_force = 1;
+ if (desc->send_would_block) {
+ TIMEVAL tmo = {0,0};
+ FD_SET fds;
+ int ret;
+
+ FD_ZERO(&fds);
+ FD_SET(desc->s,&fds);
+ do_force = (select(desc->s+1,0,&fds,0,&tmo) > 0);
+ }
+ if (do_force) {
+ SetEvent(desc->event);
+ desc->forced_events |= FD_WRITE;
+ }
+ }
+ if ((desc->event_mask & (FD_READ|FD_CLOSE))) {
+ int readable = 0;
+ int closed = 0;
+ TIMEVAL tmo = {0,0};
+ FD_SET fds;
+ int ret;
+ unsigned long arg;
+
+ FD_ZERO(&fds);
+ FD_SET(desc->s,&fds);
+ ret = select(desc->s+1,&fds,0,0,&tmo);
+ if (ret > 0) {
+ ++readable;
+ if (ioctlsocket(desc->s,FIONREAD,&arg) != 0) {
+ ++closed; /* Which gives a FD_CLOSE event */
+ } else {
+ closed = (arg == 0);
+ }
+ }
+ if ((desc->event_mask & FD_READ) && readable && !closed) {
+ SetEvent(desc->event);
+ desc->forced_events |= FD_READ;
+ }
+ if ((desc->event_mask & FD_CLOSE) && closed) {
+ SetEvent(desc->event);
+ desc->forced_events |= FD_CLOSE;
+ }
+ }
+ }
+ return 0;
+}
+
+static void tcp_inet_event(ErlDrvData e, ErlDrvEvent event)
+{
+ tcp_descriptor* desc = (tcp_descriptor*)e;
+ WSANETWORKEVENTS netEv;
+ int err;
+
+ DEBUGF(("tcp_inet_event(%ld) {s=%d\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ if (WSAEnumNetworkEvents(desc->inet.s, desc->inet.event,
+ &netEv) != 0) {
+ DEBUGF((" => EnumNetworkEvents = %d\r\n", sock_errno() ));
+ goto error;
+ }
+
+ DEBUGF((" => event=%02X, mask=%02X\r\n",
+ netEv.lNetworkEvents, desc->inet.event_mask));
+
+ /* Add the forced events. */
+
+ netEv.lNetworkEvents |= desc->inet.forced_events;
+
+ /*
+ * Calling WSAEventSelect() with a mask of 0 doesn't always turn off
+ * all events. To avoid acting on events we don't want, we mask
+ * the events with mask for the events we really want.
+ */
+
+#ifdef DEBUG
+ if ((netEv.lNetworkEvents & ~(desc->inet.event_mask)) != 0) {
+ DEBUGF(("port %d: ... unexpected event: %d\r\n",
+ desc->inet.port, netEv.lNetworkEvents & ~(desc->inet.event_mask)));
+ }
+#endif
+ netEv.lNetworkEvents &= desc->inet.event_mask;
+
+ if (netEv.lNetworkEvents & FD_READ) {
+ if (tcp_inet_input(desc, event) < 0) {
+ goto error;
+ }
+ if (netEv.lNetworkEvents & FD_CLOSE) {
+ /*
+ * We must loop to read out the remaining packets (if any).
+ */
+ for (;;) {
+ DEBUGF(("Retrying read due to closed port\r\n"));
+ /* XXX The buffer will be thrown away on error (empty que).
+ Possible SMP FIXME. */
+ if (!desc->inet.active && (desc->inet.opt) == NULL) {
+ goto error;
+ }
+ if (tcp_inet_input(desc, event) < 0) {
+ goto error;
+ }
+ }
+ }
+ }
+ if (netEv.lNetworkEvents & FD_WRITE) {
+ desc->inet.send_would_block = 0;
+ if (tcp_inet_output(desc, event) < 0)
+ goto error;
+ }
+ if (netEv.lNetworkEvents & FD_CONNECT) {
+ if ((err = netEv.iErrorCode[FD_CONNECT_BIT]) != 0) {
+ async_error(INETP(desc), err);
+ } else {
+ tcp_inet_output(desc, event);
+ }
+ } else if (netEv.lNetworkEvents & FD_ACCEPT) {
+ if ((err = netEv.iErrorCode[FD_ACCEPT_BIT]) != 0)
+ async_error(INETP(desc), err);
+ else
+ tcp_inet_input(desc, event);
+ }
+ if (netEv.lNetworkEvents & FD_CLOSE) {
+ /* error in err = netEv.iErrorCode[FD_CLOSE_BIT] */
+ DEBUGF(("Detected close in %s, line %d\r\n", __FILE__, __LINE__));
+ tcp_recv_closed(desc);
+ }
+ DEBUGF(("tcp_inet_event(%ld) }\r\n", (long)desc->inet.port));
+ return;
+
+ error:
+ DEBUGF(("tcp_inet_event(%ld) error}\r\n", (long)desc->inet.port));
+ return;
+}
+
+#endif /* WIN32 */
+
+
+/* socket has input:
+** 1. TCP_STATE_ACCEPTING => non block accept ?
+** 2. TCP_STATE_CONNECTED => read input
+*/
+static int tcp_inet_input(tcp_descriptor* desc, HANDLE event)
+{
+ int ret = 0;
+#ifdef DEBUG
+ long port = (long) desc->inet.port; /* Used after driver_exit() */
+#endif
+ DEBUGF(("tcp_inet_input(%ld) {s=%d\r\n", port, desc->inet.s));
+ if (desc->inet.state == TCP_STATE_ACCEPTING) {
+ SOCKET s;
+ unsigned int len;
+ inet_address remote;
+ inet_async_op *this_op = desc->inet.opt;
+
+ len = sizeof(desc->inet.remote);
+ s = sock_accept(desc->inet.s, (struct sockaddr*) &remote, &len);
+ if (s == INVALID_SOCKET && sock_errno() == ERRNO_BLOCK) {
+ /* Just try again, no real error, just a ghost trigger from poll,
+ keep the default return code and everything else as is */
+ goto done;
+ }
+
+ sock_select(INETP(desc),FD_ACCEPT,0);
+ desc->inet.state = TCP_STATE_LISTEN; /* restore state */
+
+ if (this_op != NULL) {
+ driver_demonitor_process(desc->inet.port, &(this_op->monitor));
+ }
+
+
+ driver_cancel_timer(desc->inet.port); /* posssibly cancel a timer */
+
+ if (s == INVALID_SOCKET) {
+ ret = async_error(INETP(desc), sock_errno());
+ goto done;
+ }
+ else {
+ ErlDrvTermData caller;
+ tcp_descriptor* accept_desc;
+ int err;
+
+ if (desc->inet.opt == NULL) {
+ /* No caller setup */
+ sock_close(s);
+ ret = async_error(INETP(desc), EINVAL);
+ goto done;
+ }
+ caller = desc->inet.opt->caller;
+ if ((accept_desc = tcp_inet_copy(desc,s,caller,&err)) == NULL) {
+ sock_close(s);
+ ret = async_error(INETP(desc), err);
+ goto done;
+ }
+ /* FIXME: may MUST lock port
+ * 1 - Port is accessible via the erlang:ports()
+ * 2 - Port is accessible via callers process_info(links)
+ */
+ accept_desc->inet.remote = remote;
+ SET_NONBLOCKING(accept_desc->inet.s);
+#ifdef __WIN32__
+ driver_select(accept_desc->inet.port, accept_desc->inet.event,
+ ERL_DRV_READ, 1);
+#endif
+ accept_desc->inet.state = TCP_STATE_CONNECTED;
+ ret = async_ok_port(INETP(desc), accept_desc->inet.dport);
+ goto done;
+ }
+ } else if (desc->inet.state == TCP_STATE_MULTI_ACCEPTING) {
+ SOCKET s;
+ unsigned int len;
+ inet_address remote;
+ int id,req;
+ ErlDrvTermData caller;
+ MultiTimerData *timeout;
+ ErlDrvMonitor monitor;
+#ifdef HARDDEBUG
+ int times = 0;
+#endif
+
+ while (desc->inet.state == TCP_STATE_MULTI_ACCEPTING) {
+ len = sizeof(desc->inet.remote);
+ s = sock_accept(desc->inet.s, (struct sockaddr*) &remote, &len);
+
+ if (s == INVALID_SOCKET && sock_errno() == ERRNO_BLOCK) {
+ /* Just try again, no real error, keep the last return code */
+ goto done;
+ }
+#ifdef HARDDEBUG
+ if (++times > 1) {
+ erts_fprintf(stderr,"Accepts in one suite: %d :-)\r\n",times);
+ }
+#endif
+ if (deq_multi_op(desc,&id,&req,&caller,&timeout,&monitor) != 0) {
+ ret = -1;
+ goto done;
+ }
+
+ if (desc->multi_first == NULL) {
+ sock_select(INETP(desc),FD_ACCEPT,0);
+ desc->inet.state = TCP_STATE_LISTEN; /* restore state */
+ }
+
+ if (timeout != NULL) {
+ remove_multi_timer(&(desc->mtd), desc->inet.port, timeout);
+ }
+
+ driver_demonitor_process(desc->inet.port, &monitor);
+
+
+ if (s == INVALID_SOCKET) { /* Not ERRNO_BLOCK, that's handled right away */
+ ret = send_async_error(desc->inet.port, desc->inet.dport,
+ id, caller, error_atom(sock_errno()));
+ goto done;
+ }
+ else {
+ tcp_descriptor* accept_desc;
+ int err;
+
+ if ((accept_desc = tcp_inet_copy(desc,s,caller,&err)) == NULL) {
+ sock_close(s);
+ ret = send_async_error(desc->inet.port, desc->inet.dport,
+ id, caller, error_atom(err));
+ goto done;
+ }
+ accept_desc->inet.remote = remote;
+ SET_NONBLOCKING(accept_desc->inet.s);
+#ifdef __WIN32__
+ driver_select(accept_desc->inet.port, accept_desc->inet.event,
+ ERL_DRV_READ, 1);
+#endif
+ accept_desc->inet.state = TCP_STATE_CONNECTED;
+ ret = send_async_ok_port(desc->inet.port, desc->inet.dport,
+ id, caller, accept_desc->inet.dport);
+ }
+ }
+ }
+ else if (IS_CONNECTED(INETP(desc))) {
+ ret = tcp_recv(desc, 0);
+ goto done;
+ }
+ else {
+ /* maybe a close op from connection attempt?? */
+ sock_select(INETP(desc),FD_ACCEPT,0);
+ DEBUGF(("tcp_inet_input(%ld): s=%d bad state: %04x\r\n",
+ port, desc->inet.s, desc->inet.state));
+ }
+ done:
+ DEBUGF(("tcp_inet_input(%ld) }\r\n", port));
+ return ret;
+}
+
+static int tcp_send_error(tcp_descriptor* desc, int err)
+{
+ /*
+ * If the port is busy, we must do some clean-up before proceeding.
+ */
+ if (IS_BUSY(INETP(desc))) {
+ desc->inet.caller = desc->inet.busy_caller;
+ if (desc->busy_on_send) {
+ driver_cancel_timer(desc->inet.port);
+ desc->busy_on_send = 0;
+ }
+ desc->inet.state &= ~INET_F_BUSY;
+ set_busy_port(desc->inet.port, 0);
+ }
+
+ /*
+ * We used to handle "expected errors" differently from unexpected ones.
+ * Now we handle all errors in the same way. We just have to distinguish
+ * between passive and active sockets.
+ */
+ DEBUGF(("driver_failure_eof(%ld) in %s, line %d\r\n",
+ (long)desc->inet.port, __FILE__, __LINE__));
+ if (desc->inet.active) {
+ tcp_closed_message(desc);
+ inet_reply_error_am(INETP(desc), am_closed);
+ if (desc->inet.exitf)
+ driver_exit(desc->inet.port, 0);
+ else
+ desc_close(INETP(desc));
+ } else {
+ tcp_clear_output(desc);
+ tcp_clear_input(desc);
+ tcp_close_check(desc);
+ erl_inet_close(INETP(desc));
+
+ if (desc->inet.caller) {
+ inet_reply_error_am(INETP(desc), am_closed);
+ }
+ else {
+ /* No blocking send op to reply to right now.
+ * If next op is a send, make sure it returns {error,closed}
+ * rather than {error,enotconn}.
+ */
+ desc->tcp_add_flags |= TCP_ADDF_DELAYED_CLOSE_SEND;
+ }
+
+ /*
+ * Make sure that the next receive operation gets an {error,closed}
+ * result rather than {error,enotconn}. That means that the caller
+ * can safely ignore errors in the send operations and handle them
+ * in the receive operation.
+ */
+ desc->tcp_add_flags |= TCP_ADDF_DELAYED_CLOSE_RECV;
+ }
+ return -1;
+}
+
+/*
+** Send non-blocking vector data
+*/
+static int tcp_sendv(tcp_descriptor* desc, ErlIOVec* ev)
+{
+ int sz;
+ char buf[4];
+ int h_len;
+ int n;
+ ErlDrvPort ix = desc->inet.port;
+ int len = ev->size;
+
+ switch(desc->inet.htype) {
+ case TCP_PB_1:
+ put_int8(len, buf);
+ h_len = 1;
+ break;
+ case TCP_PB_2:
+ put_int16(len, buf);
+ h_len = 2;
+ break;
+ case TCP_PB_4:
+ put_int32(len, buf);
+ h_len = 4;
+ break;
+ default:
+ if (len == 0)
+ return 0;
+ h_len = 0;
+ break;
+ }
+
+ inet_output_count(INETP(desc), len+h_len);
+
+ if (h_len > 0) {
+ ev->iov[0].iov_base = buf;
+ ev->iov[0].iov_len = h_len;
+ ev->size += h_len;
+ }
+
+ if ((sz = driver_sizeq(ix)) > 0) {
+ driver_enqv(ix, ev, 0);
+ if (sz+ev->size >= desc->high) {
+ DEBUGF(("tcp_sendv(%ld): s=%d, sender forced busy\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ desc->inet.state |= INET_F_BUSY; /* mark for low-watermark */
+ desc->inet.busy_caller = desc->inet.caller;
+ set_busy_port(desc->inet.port, 1);
+ if (desc->send_timeout != INET_INFINITY) {
+ desc->busy_on_send = 1;
+ driver_set_timer(desc->inet.port, desc->send_timeout);
+ }
+ return 1;
+ }
+ }
+ else {
+ int vsize = (ev->vsize > MAX_VSIZE) ? MAX_VSIZE : ev->vsize;
+
+ DEBUGF(("tcp_sendv(%ld): s=%d, about to send %d,%d bytes\r\n",
+ (long)desc->inet.port, desc->inet.s, h_len, len));
+ if (desc->tcp_add_flags & TCP_ADDF_DELAY_SEND) {
+ n = 0;
+ } else if (sock_sendv(desc->inet.s, ev->iov, vsize, &n, 0)
+ == SOCKET_ERROR) {
+ if ((sock_errno() != ERRNO_BLOCK) && (sock_errno() != EINTR)) {
+ int err = sock_errno();
+ DEBUGF(("tcp_sendv(%ld): s=%d, "
+ "sock_sendv(size=2) errno = %d\r\n",
+ (long)desc->inet.port, desc->inet.s, err));
+ return tcp_send_error(desc, err);
+ }
+#ifdef __WIN32__
+ desc->inet.send_would_block = 1;
+#endif
+ n = 0;
+ }
+ else if (n == ev->size) {
+ ASSERT(NO_SUBSCRIBERS(&INETP(desc)->empty_out_q_subs));
+ return 0;
+ }
+ else {
+ DEBUGF(("tcp_sendv(%ld): s=%d, only sent %d/%d of %d/%d bytes/items\r\n",
+ (long)desc->inet.port, desc->inet.s, n, vsize, ev->size, ev->vsize));
+ }
+
+ DEBUGF(("tcp_sendv(%ld): s=%d, Send failed, queuing\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ driver_enqv(ix, ev, n);
+ sock_select(INETP(desc),(FD_WRITE|FD_CLOSE), 1);
+ }
+ return 0;
+}
+
+/*
+** Send non blocking data
+*/
+static int tcp_send(tcp_descriptor* desc, char* ptr, int len)
+{
+ int sz;
+ char buf[4];
+ int h_len;
+ int n;
+ ErlDrvPort ix = desc->inet.port;
+ SysIOVec iov[2];
+
+ switch(desc->inet.htype) {
+ case TCP_PB_1:
+ put_int8(len, buf);
+ h_len = 1;
+ break;
+ case TCP_PB_2:
+ put_int16(len, buf);
+ h_len = 2;
+ break;
+ case TCP_PB_4:
+ put_int32(len, buf);
+ h_len = 4;
+ break;
+ default:
+ if (len == 0)
+ return 0;
+ h_len = 0;
+ break;
+ }
+
+ inet_output_count(INETP(desc), len+h_len);
+
+
+ if ((sz = driver_sizeq(ix)) > 0) {
+ if (h_len > 0)
+ driver_enq(ix, buf, h_len);
+ driver_enq(ix, ptr, len);
+ if (sz+h_len+len >= desc->high) {
+ DEBUGF(("tcp_send(%ld): s=%d, sender forced busy\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ desc->inet.state |= INET_F_BUSY; /* mark for low-watermark */
+ desc->inet.busy_caller = desc->inet.caller;
+ set_busy_port(desc->inet.port, 1);
+ if (desc->send_timeout != INET_INFINITY) {
+ desc->busy_on_send = 1;
+ driver_set_timer(desc->inet.port, desc->send_timeout);
+ }
+ return 1;
+ }
+ }
+ else {
+ iov[0].iov_base = buf;
+ iov[0].iov_len = h_len;
+ iov[1].iov_base = ptr;
+ iov[1].iov_len = len;
+
+ DEBUGF(("tcp_send(%ld): s=%d, about to send %d,%d bytes\r\n",
+ (long)desc->inet.port, desc->inet.s, h_len, len));
+ if (desc->tcp_add_flags & TCP_ADDF_DELAY_SEND) {
+ sock_send(desc->inet.s, buf, 0, 0);
+ n = 0;
+ } else if (sock_sendv(desc->inet.s,iov,2,&n,0) == SOCKET_ERROR) {
+ if ((sock_errno() != ERRNO_BLOCK) && (sock_errno() != EINTR)) {
+ int err = sock_errno();
+ DEBUGF(("tcp_send(%ld): s=%d,sock_sendv(size=2) errno = %d\r\n",
+ (long)desc->inet.port, desc->inet.s, err));
+ return tcp_send_error(desc, err);
+ }
+#ifdef __WIN32__
+ desc->inet.send_would_block = 1;
+#endif
+ n = 0;
+ }
+ else if (n == len+h_len) {
+ ASSERT(NO_SUBSCRIBERS(&INETP(desc)->empty_out_q_subs));
+ return 0;
+ }
+
+ DEBUGF(("tcp_send(%ld): s=%d, Send failed, queuing",
+ (long)desc->inet.port, desc->inet.s));
+
+ if (n < h_len) {
+ driver_enq(ix, buf+n, h_len-n);
+ driver_enq(ix, ptr, len);
+ }
+ else {
+ n -= h_len;
+ driver_enq(ix, ptr+n, len-n);
+ }
+ sock_select(INETP(desc),(FD_WRITE|FD_CLOSE), 1);
+ }
+ return 0;
+}
+
+static void tcp_inet_drv_output(ErlDrvData data, ErlDrvEvent event)
+{
+ (void)tcp_inet_output((tcp_descriptor*)data, (HANDLE)event);
+}
+
+static void tcp_inet_drv_input(ErlDrvData data, ErlDrvEvent event)
+{
+ (void)tcp_inet_input((tcp_descriptor*)data, (HANDLE)event);
+}
+
+/* socket ready for ouput:
+** 1. TCP_STATE_CONNECTING => non block connect ?
+** 2. TCP_STATE_CONNECTED => write output
+*/
+static int tcp_inet_output(tcp_descriptor* desc, HANDLE event)
+{
+ int ret = 0;
+ ErlDrvPort ix = desc->inet.port;
+
+ DEBUGF(("tcp_inet_output(%ld) {s=%d\r\n",
+ (long)desc->inet.port, desc->inet.s));
+ if (desc->inet.state == TCP_STATE_CONNECTING) {
+ sock_select(INETP(desc),FD_CONNECT,0);
+
+ driver_cancel_timer(ix); /* posssibly cancel a timer */
+#ifndef __WIN32__
+ /*
+ * XXX This is strange. This *should* work on Windows NT too,
+ * but doesn't. An bug in Winsock 2.0 for Windows NT?
+ *
+ * See "Unix Netwok Programming", W.R.Stevens, p 412 for a
+ * discussion about Unix portability and non blocking connect.
+ */
+
+#ifndef SO_ERROR
+ {
+ int sz = sizeof(desc->inet.remote);
+ int code = sock_peer(desc->inet.s,
+ (struct sockaddr*) &desc->inet.remote, &sz);
+
+ if (code == SOCKET_ERROR) {
+ desc->inet.state = TCP_STATE_BOUND; /* restore state */
+ ret = async_error(INETP(desc), sock_errno());
+ goto done;
+ }
+ }
+#else
+ {
+ int error = 0; /* Has to be initiated, we check it */
+ unsigned int sz = sizeof(error); /* even if we get -1 */
+ int code = sock_getopt(desc->inet.s, SOL_SOCKET, SO_ERROR,
+ (void *)&error, &sz);
+
+ if ((code < 0) || error) {
+ desc->inet.state = TCP_STATE_BOUND; /* restore state */
+ ret = async_error(INETP(desc), error);
+ goto done;
+ }
+ }
+#endif /* SOCKOPT_CONNECT_STAT */
+#endif /* !__WIN32__ */
+
+ desc->inet.state = TCP_STATE_CONNECTED;
+ if (desc->inet.active)
+ sock_select(INETP(desc),(FD_READ|FD_CLOSE),1);
+ async_ok(INETP(desc));
+ }
+ else if (IS_CONNECTED(INETP(desc))) {
+ for (;;) {
+ int vsize;
+ int n;
+ SysIOVec* iov;
+
+ if ((iov = driver_peekq(ix, &vsize)) == NULL) {
+ sock_select(INETP(desc), FD_WRITE, 0);
+ send_empty_out_q_msgs(INETP(desc));
+ goto done;
+ }
+ vsize = vsize > MAX_VSIZE ? MAX_VSIZE : vsize;
+ DEBUGF(("tcp_inet_output(%ld): s=%d, About to send %d items\r\n",
+ (long)desc->inet.port, desc->inet.s, vsize));
+ if (sock_sendv(desc->inet.s, iov, vsize, &n, 0)==SOCKET_ERROR) {
+ if ((sock_errno() != ERRNO_BLOCK) && (sock_errno() != EINTR)) {
+ DEBUGF(("tcp_inet_output(%ld): sock_sendv(%d) errno = %d\r\n",
+ (long)desc->inet.port, vsize, sock_errno()));
+ ret = tcp_send_error(desc, sock_errno());
+ goto done;
+ }
+#ifdef __WIN32__
+ desc->inet.send_would_block = 1;
+#endif
+ goto done;
+ }
+ if (driver_deq(ix, n) <= desc->low) {
+ if (IS_BUSY(INETP(desc))) {
+ desc->inet.caller = desc->inet.busy_caller;
+ desc->inet.state &= ~INET_F_BUSY;
+ set_busy_port(desc->inet.port, 0);
+ /* if we have a timer then cancel and send ok to client */
+ if (desc->busy_on_send) {
+ driver_cancel_timer(desc->inet.port);
+ desc->busy_on_send = 0;
+ }
+ inet_reply_ok(INETP(desc));
+ }
+ }
+ }
+ }
+ else {
+ sock_select(INETP(desc),FD_CONNECT,0);
+ DEBUGF(("tcp_inet_output(%ld): bad state: %04x\r\n",
+ (long)desc->inet.port, desc->inet.state));
+ }
+ done:
+ DEBUGF(("tcp_inet_output(%ld) }\r\n", (long)desc->inet.port));
+ return ret;
+}
+
+/*-----------------------------------------------------------------------------
+
+ UDP & SCTP (the latter in a 1<->M Mode)
+
+-----------------------------------------------------------------------------*/
+
+#if defined(HAVE_SO_BSDCOMPAT)
+#if defined(__linux__)
+#include <sys/utsname.h>
+static int should_use_so_bsdcompat(void)
+{
+ /* SMP: FIXME this is probably not SMP safe but may be ok anyway? */
+ static int init_done;
+ static int so_bsdcompat_is_obsolete;
+
+ if (!init_done) {
+ struct utsname utsname;
+ unsigned int version, patchlevel;
+
+ init_done = 1;
+ if (uname(&utsname) < 0) {
+ fprintf(stderr, "uname: %s\r\n", strerror(sock_errno()));
+ return 1;
+ }
+ /* Format is <version>.<patchlevel>.<sublevel><extraversion>
+ where the first three are unsigned integers and the last
+ is an arbitrary string. We only care about the first two. */
+ if (sscanf(utsname.release, "%u.%u", &version, &patchlevel) != 2) {
+ fprintf(stderr, "uname: unexpected release '%s'\r\n",
+ utsname.release);
+ return 1;
+ }
+ /* SO_BSDCOMPAT is deprecated and triggers warnings in 2.5
+ kernels. It is a no-op in 2.4 but not in 2.2 kernels. */
+ if (version > 2 || (version == 2 && patchlevel >= 5))
+ so_bsdcompat_is_obsolete = 1;
+ }
+ return !so_bsdcompat_is_obsolete;
+}
+#else /* __linux__ */
+#define should_use_so_bsdcompat() 1
+#endif /* __linux__ */
+#endif /* HAVE_SO_BSDCOMPAT */
+
+static int packet_inet_init()
+{
+ return 0;
+}
+
+static ErlDrvData packet_inet_start(ErlDrvPort port, char* args, int protocol)
+{
+ /* "inet_start" returns "ErlDrvData", but in fact it is "inet_descriptor*",
+ so we can preserve it as "ErlDrvData":
+ */
+ ErlDrvData drvd = inet_start(port, sizeof(udp_descriptor),
+ protocol);
+ udp_descriptor* desc = (udp_descriptor*) drvd;
+
+ if (desc == NULL)
+ return ERL_DRV_ERROR_ERRNO;
+
+ desc->read_packets = INET_PACKET_POLL;
+ return drvd;
+}
+
+static ErlDrvData udp_inet_start(ErlDrvPort port, char *args)
+{
+ return packet_inet_start(port, args, IPPROTO_UDP);
+}
+
+#ifdef HAVE_SCTP
+static ErlDrvData sctp_inet_start(ErlDrvPort port, char *args)
+{
+ return packet_inet_start(port, args, IPPROTO_SCTP);
+}
+#endif
+
+static void packet_inet_stop(ErlDrvData e)
+{
+ /* There should *never* be any "empty out q" subscribers on
+ an UDP or SCTP socket!
+ NB: as in "inet_start", we can always cast "ErlDRvData"
+ into "udp_descriptor*" or "inet_descriptor*":
+ */
+ udp_descriptor * udesc = (udp_descriptor*) e;
+ inet_descriptor* descr = INETP(udesc);
+
+ ASSERT(NO_SUBSCRIBERS(&(descr->empty_out_q_subs)));
+ inet_stop(descr);
+}
+
+static int packet_error(udp_descriptor* udesc, int err)
+{
+ inet_descriptor * desc = INETP(udesc);
+ if (!desc->active)
+ async_error(desc, err);
+ driver_failure_posix(desc->port, err);
+ return -1;
+}
+
+/*
+** Various functions accessible via "port_control" on the Erlang side:
+*/
+static int packet_inet_ctl(ErlDrvData e, unsigned int cmd, char* buf, int len,
+ char** rbuf, int rsize)
+{
+ int replen;
+ udp_descriptor * udesc = (udp_descriptor *) e;
+ inet_descriptor* desc = INETP(udesc);
+ int type = SOCK_DGRAM;
+ int af;
+#ifdef HAVE_SCTP
+ if (IS_SCTP(desc)) type = SOCK_SEQPACKET;
+#endif
+
+ switch(cmd) {
+ case INET_REQ_OPEN: /* open socket and return internal index */
+ DEBUGF(("packet_inet_ctl(%ld): OPEN\r\n", (long)desc->port));
+ if (len != 1) {
+ return ctl_error(EINVAL, rbuf, rsize);
+ }
+ switch (buf[0]) {
+ case INET_AF_INET: af = AF_INET; break;
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ case INET_AF_INET6: af = AF_INET6; break;
+#endif
+ default:
+ return ctl_error(EINVAL, rbuf, rsize);
+ }
+ replen = inet_ctl_open(desc, af, type, rbuf, rsize);
+
+ if ((*rbuf)[0] != INET_REP_ERROR) {
+ if (desc->active)
+ sock_select(desc,FD_READ,1);
+#ifdef HAVE_SO_BSDCOMPAT
+ /*
+ * Make sure that sending UDP packets to a non existing port on an
+ * existing machine doesn't close the socket. (Linux behaves this
+ * way)
+ */
+ if (should_use_so_bsdcompat()) {
+ int one = 1;
+ /* Ignore errors */
+ sock_setopt(desc->s, SOL_SOCKET, SO_BSDCOMPAT, &one,
+ sizeof(one));
+ }
+#endif
+ }
+ return replen;
+
+
+ case INET_REQ_FDOPEN: /* pass in an open (and bound) socket */
+ DEBUGF(("packet inet_ctl(%ld): FDOPEN\r\n", (long)desc->port));
+ if ((len == 5) && (buf[0] == INET_AF_INET))
+ replen = inet_ctl_fdopen(desc, AF_INET, SOCK_DGRAM,
+ (SOCKET)get_int32(buf+1),rbuf,rsize);
+#if defined(HAVE_IN6) && defined(AF_INET6)
+ else if ((len == 5) && (buf[0] == INET_AF_INET6))
+ replen = inet_ctl_fdopen(desc, AF_INET6, SOCK_DGRAM,
+ (SOCKET)get_int32(buf+1),rbuf,rsize);
+#endif
+ else
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ if ((*rbuf)[0] != INET_REP_ERROR) {
+ if (desc->active)
+ sock_select(desc,FD_READ,1);
+#ifdef HAVE_SO_BSDCOMPAT
+ /*
+ * Make sure that sending UDP packets to a non existing port on an
+ * existing machine doesn't close the socket. (Linux behaves this
+ * way)
+ */
+ if (should_use_so_bsdcompat()) {
+ int one = 1;
+ /* Ignore errors */
+ sock_setopt(desc->s, SOL_SOCKET, SO_BSDCOMPAT, &one,
+ sizeof(one));
+ }
+#endif
+ }
+ return replen;
+
+
+ case INET_REQ_CLOSE:
+ DEBUGF(("packet_inet_ctl(%ld): CLOSE\r\n", (long)desc->port));
+ erl_inet_close(desc);
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ return 0;
+
+
+ case INET_REQ_CONNECT: {
+ /* UDP and SCTP connect operations are completely different. UDP
+ connect means only setting the default peer addr locally, so
+ it is always synchronous. SCTP connect means actual establish-
+ ing of an SCTP association with a remote peer, so it is async-
+ ronous, and similar to TCP connect. However, unlike TCP, SCTP
+ allows the socket to have multiple simultaneous associations:
+ */
+ int code;
+ char tbuf[2];
+ unsigned timeout;
+
+ DEBUGF(("packet_inet_ctl(%ld): CONNECT\r\n", (long)desc->port));
+
+ /* INPUT: [ Timeout(4), Port(2), Address(N) ] */
+
+ if (!IS_OPEN(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+
+ if (!IS_BOUND(desc))
+ return ctl_xerror(EXBADSEQ, rbuf, rsize);
+#ifdef HAVE_SCTP
+ if (IS_SCTP(desc)) {
+ inet_address remote;
+
+ if (IS_CONNECTING(desc))
+ return ctl_error(EINVAL, rbuf, rsize);
+ if (len < 6)
+ return ctl_error(EINVAL, rbuf, rsize);
+ timeout = get_int32(buf);
+ buf += 4;
+ len -= 4;
+
+ /* For SCTP, we do not set the peer's addr in desc->remote, as
+ multiple peers are possible: */
+ if (inet_set_address(desc->sfamily, &remote, buf, &len) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ sock_select(desc, FD_CONNECT, 1);
+ code = sock_connect(desc->s, &remote.sa, len);
+
+ if ((code == SOCKET_ERROR) && (sock_errno() == EINPROGRESS)) {
+ /* XXX: Unix only -- WinSock would have a different cond! */
+ desc->state = SCTP_STATE_CONNECTING;
+ if (timeout != INET_INFINITY)
+ driver_set_timer(desc->port, timeout);
+ enq_async(desc, tbuf, INET_REQ_CONNECT);
+ }
+ else if (code == 0) { /* OK we are connected */
+ sock_select(desc, FD_CONNECT, 0);
+ desc->state = PACKET_STATE_CONNECTED;
+ enq_async(desc, tbuf, INET_REQ_CONNECT);
+ async_ok(desc);
+ }
+ else {
+ sock_select(desc, FD_CONNECT, 0);
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+#endif
+ /* UDP */
+ if (len == 0) {
+ /* What does it mean??? NULL sockaddr??? */
+ sock_connect(desc->s, (struct sockaddr*) NULL, 0);
+ desc->state &= ~INET_F_ACTIVE;
+ enq_async(desc, tbuf, INET_REQ_CONNECT);
+ async_ok (desc);
+ }
+ else if (len < 6)
+ return ctl_error(EINVAL, rbuf, rsize);
+ else {
+ timeout = get_int32(buf); /* IGNORED */
+ buf += 4;
+ len -= 4;
+ if (inet_set_address(desc->sfamily,
+ &desc->remote, buf, &len) == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ code = sock_connect(desc->s,
+ (struct sockaddr*) &desc->remote, len);
+ if (code == SOCKET_ERROR) {
+ sock_connect(desc->s, (struct sockaddr*) NULL, 0);
+ desc->state &= ~INET_F_ACTIVE;
+ return ctl_error(sock_errno(), rbuf, rsize);
+ }
+ else /* ok we are connected */ {
+ enq_async(desc, tbuf, INET_REQ_CONNECT);
+ desc->state |= INET_F_ACTIVE;
+ async_ok (desc);
+ }
+ }
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+
+#ifdef HAVE_SCTP
+ case SCTP_REQ_LISTEN:
+ { /* LISTEN is only for SCTP sockets, not UDP. This code is borrowed
+ from the TCP section. Returns: {ok,[]} on success.
+ */
+ int flag;
+
+ DEBUGF(("packet_inet_ctl(%ld): LISTEN\r\n", (long)desc->port));
+ if (!IS_SCTP(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ if (!IS_OPEN(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ if (!IS_BOUND(desc))
+ return ctl_xerror(EXBADSEQ, rbuf, rsize);
+
+ /* The arg is a binary value: 1:enable, 0:disable */
+ if (len != 1)
+ return ctl_error(EINVAL, rbuf, rsize);
+ flag = get_int8(buf);
+
+ if (sock_listen(desc->s, flag) == SOCKET_ERROR)
+ return ctl_error(sock_errno(), rbuf, rsize);
+
+ desc->state = SCTP_STATE_LISTEN; /* XXX: not used? */
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+
+ case SCTP_REQ_BINDX:
+ { /* Multi-homing bind for SCTP: */
+ /* Construct the list of addresses we bind to. The curr limit is
+ 256 addrs. Buff structure: Flags(1), ListItem,...:
+ */
+ struct sockaddr addrs[256];
+ char* curr;
+ int add_flag, n, rflag;
+
+ if (!IS_SCTP(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+
+ curr = buf;
+ add_flag = get_int8(curr);
+ curr++;
+
+ for(n=0; n < 256 && curr < buf+len; n++)
+ {
+ /* List item format: Port(2), IP(4|16) -- compatible with
+ "inet_set_address": */
+ inet_address tmp;
+ int alen = buf + len - curr;
+ curr = inet_set_address(desc->sfamily, &tmp, curr, &alen);
+ if (curr == NULL)
+ return ctl_error(EINVAL, rbuf, rsize);
+
+ /* Now: we need to squeeze "tmp" into the size of "sockaddr",
+ which is smaller than "tmp" for IPv6 (extra IN6 info will
+ be cut off): */
+ memcpy(addrs + n, &tmp, sizeof(struct sockaddr));
+ }
+ /* Make the real flags: */
+ rflag = add_flag ? SCTP_BINDX_ADD_ADDR : SCTP_BINDX_REM_ADDR;
+
+ /* Invoke the call: */
+ if (p_sctp_bindx(desc->s, addrs, n, rflag) < 0)
+ return ctl_error(sock_errno(), rbuf, rsize);
+
+ desc->state = INET_STATE_BOUND;
+
+ return ctl_reply(INET_REP_OK, NULL, 0, rbuf, rsize);
+ }
+#endif /* HAVE_SCTP */
+
+ case PACKET_REQ_RECV:
+ { /* THIS IS A FRONT-END for "recv*" requests. It only enqueues the
+ request and possibly returns the data immediately available.
+ The actual data returning function is the back-end ("*input"):
+ */
+ unsigned timeout;
+ char tbuf[2];
+
+ DEBUGF(("packet_inet_ctl(%ld): RECV\r\n", (long)desc->port));
+ /* INPUT: Timeout(4), Length(4) */
+ if (!IS_OPEN(desc))
+ return ctl_xerror(EXBADPORT, rbuf, rsize);
+ if (!IS_BOUND(desc))
+ return ctl_error(EINVAL, rbuf, rsize);
+ if (desc->active || (len != 8))
+ return ctl_error(EINVAL, rbuf, rsize);
+ timeout = get_int32(buf);
+ /* The 2nd arg, Length(4), is ignored for both UDP ans SCTP protocols,
+ since they are msg-oriented. */
+
+ if (enq_async(desc, tbuf, PACKET_REQ_RECV) < 0)
+ return ctl_error(EALREADY, rbuf, rsize);
+
+ if (packet_inet_input(udesc, desc->event) == 0) {
+ if (timeout == 0)
+ async_error_am(desc, am_timeout);
+ else {
+ if (timeout != INET_INFINITY)
+ driver_set_timer(desc->port, timeout);
+ }
+ }
+ return ctl_reply(INET_REP_OK, tbuf, 2, rbuf, rsize);
+ }
+
+ default:
+ /* Delegate the request to the INET layer. In particular,
+ INET_REQ_BIND goes here. If the req is not recognised
+ there either, an error is returned:
+ */
+ return inet_ctl(desc, cmd, buf, len, rbuf, rsize);
+ }
+}
+
+static void packet_inet_timeout(ErlDrvData e)
+{
+ udp_descriptor * udesc = (udp_descriptor*) e;
+ inet_descriptor * desc = INETP(udesc);
+ if (!(desc->active))
+ sock_select(desc, FD_READ, 0);
+ async_error_am (desc, am_timeout);
+}
+
+
+/* THIS IS A "send*" REQUEST; on the Erlang side: "port_command".
+** input should be: P1 P0 Address buffer .
+** For UDP, buffer (after Address) is just data to be sent.
+** For SCTP, buffer contains a list representing 2 items:
+** (1) 6 parms for sctp_sndrcvinfo, as in sctp_get_sendparams();
+** (2) 0+ real data bytes.
+** There is no destination address -- SCTYP send is performed over
+** an existing association, using "sctp_sndrcvinfo" specified.
+*/
+static void packet_inet_command(ErlDrvData e, char* buf, int len)
+{
+ udp_descriptor * udesc= (udp_descriptor*) e;
+ inet_descriptor* desc = INETP(udesc);
+ char* ptr = buf;
+ char* qtr;
+ int sz;
+ int code;
+ inet_address other;
+
+ desc->caller = driver_caller(desc->port);
+
+ if (!IS_OPEN(desc)) {
+ inet_reply_error(desc, EINVAL);
+ return;
+ }
+ if (!IS_BOUND(desc)) {
+ inet_reply_error(desc, EINVAL);
+ return;
+ }
+
+#ifdef HAVE_SCTP
+ if (IS_SCTP(desc))
+ {
+ int data_len;
+ struct iovec iov[1]; /* For real data */
+ struct msghdr mhdr; /* Message wrapper */
+ struct sctp_sndrcvinfo *sri; /* The actual ancilary data */
+ union { /* For ancilary data */
+ struct cmsghdr hdr;
+ char ancd[CMSG_SPACE(sizeof(*sri))];
+ } cmsg;
+
+ if (len < SCTP_GET_SENDPARAMS_LEN) {
+ inet_reply_error(desc, EINVAL);
+ return;
+ }
+
+ /* The ancilary data */
+ sri = (struct sctp_sndrcvinfo *) (CMSG_DATA(&cmsg.hdr));
+ /* Get the "sndrcvinfo" from the buffer, advancing the "ptr": */
+ ptr = sctp_get_sendparams(sri, ptr);
+
+ /* The ancilary data wrapper */
+ cmsg.hdr.cmsg_level = IPPROTO_SCTP;
+ cmsg.hdr.cmsg_type = SCTP_SNDRCV;
+ cmsg.hdr.cmsg_len = CMSG_LEN(sizeof(*sri));
+
+ data_len = (buf + len) - ptr;
+ /* The whole msg.
+ * Solaris (XPG 4.2) requires iovlen >= 1 even for data_len == 0.
+ */
+ mhdr.msg_name = NULL; /* Already connected */
+ mhdr.msg_namelen = 0;
+ iov[0].iov_len = data_len;
+ iov[0].iov_base = ptr; /* The real data */
+ mhdr.msg_iov = iov;
+ mhdr.msg_iovlen = 1;
+ mhdr.msg_control = cmsg.ancd; /* For ancilary data */
+ mhdr.msg_controllen = cmsg.hdr.cmsg_len;
+ mhdr.msg_flags = 0; /* Not used with "sendmsg" */
+
+ /* Now do the actual sending. NB: "flags" in "sendmsg" itself are NOT
+ used: */
+ code = sock_sendmsg(desc->s, &mhdr, 0);
+ goto check_result_code;
+ }
+#endif
+ /* UDP socket. Even if it is connected, there is an address prefix
+ here -- ignored for connected sockets: */
+ sz = len;
+ qtr = inet_set_address(desc->sfamily, &other, ptr, &sz);
+ if (qtr == NULL) {
+ inet_reply_error(desc, EINVAL);
+ return;
+ }
+ len -= (qtr - ptr);
+ ptr = qtr;
+ /* Now "ptr" is the user data ptr, "len" is data length: */
+ inet_output_count(desc, len);
+
+ if (desc->state & INET_F_ACTIVE) { /* connected (ignore address) */
+ code = sock_send(desc->s, ptr, len, 0);
+ }
+ else {
+ code = sock_sendto(desc->s, ptr, len, 0, &other.sa, sz);
+ }
+
+#ifdef HAVE_SCTP
+ check_result_code:
+ /* "code" analysis is the same for both SCTP and UDP cases above: */
+#endif
+ if (code == SOCKET_ERROR) {
+ int err = sock_errno();
+ inet_reply_error(desc, err);
+ }
+ else
+ inet_reply_ok(desc);
+}
+
+
+#ifdef __WIN32__
+static void packet_inet_event(ErlDrvData e, ErlDrvEvent event)
+{
+ udp_descriptor * udesc = (udp_descriptor*)e;
+ inet_descriptor* desc = INETP(udesc);
+ WSANETWORKEVENTS netEv;
+
+ if ((WSAEnumNetworkEvents)(desc->s, desc->event, &netEv) != 0) {
+ DEBUGF(( "port %d: EnumNetwrokEvents = %d\r\n",
+ desc->port, sock_errno() ));
+ return; /* -1; */
+ }
+ netEv.lNetworkEvents |= desc->forced_events;
+ if (netEv.lNetworkEvents & FD_READ) {
+ packet_inet_input(udesc, (HANDLE)event);
+ }
+}
+
+#endif
+
+static void packet_inet_drv_input(ErlDrvData e, ErlDrvEvent event)
+{
+ (void) packet_inet_input((udp_descriptor*)e, (HANDLE)event);
+}
+
+/*
+** THIS IS A BACK-END FOR "recv*" REQUEST, which actually receives the
+** data requested, and delivers them to the caller:
+*/
+static int packet_inet_input(udp_descriptor* udesc, HANDLE event)
+{
+ inet_descriptor* desc = INETP(udesc);
+ int n;
+ unsigned int len;
+ inet_address other;
+ char abuf[sizeof(inet_address)]; /* buffer address; enough??? */
+ int sz;
+ char* ptr;
+ ErlDrvBinary* buf; /* binary */
+ int packet_count = udesc->read_packets;
+ int count = 0; /* number of packets delivered to owner */
+#ifdef HAVE_SCTP
+ struct msghdr mhdr; /* Top-level msg structure */
+ struct iovec iov[1]; /* Data or Notification Event */
+ char ancd[SCTP_ANC_BUFF_SIZE]; /* Ancillary Data */
+ int short_recv = 0;
+#endif
+
+ while(packet_count--) {
+ len = sizeof(other);
+ sz = desc->bufsz;
+ /* Allocate space for message and address. NB: "bufsz" is in "desc",
+ but the "buf" itself is allocated separately:
+ */
+ if ((buf = alloc_buffer(sz+len)) == NULL)
+ return packet_error(udesc, ENOMEM);
+ ptr = buf->orig_bytes + len; /* pointer to message part */
+
+ /* Note: On Windows NT, recvfrom() fails if the socket is connected. */
+#ifdef HAVE_SCTP
+ /* For SCTP we must use recvmsg() */
+ if (IS_SCTP(desc)) {
+ iov->iov_base = ptr; /* Data will come here */
+ iov->iov_len = sz; /* Remaining buffer space */
+
+ mhdr.msg_name = &other; /* Peer addr comes into "other" */
+ mhdr.msg_namelen = len;
+ mhdr.msg_iov = iov;
+ mhdr.msg_iovlen = 1;
+ mhdr.msg_control = ancd;
+ mhdr.msg_controllen = SCTP_ANC_BUFF_SIZE;
+ mhdr.msg_flags = 0; /* To be filled by "recvmsg" */
+
+ /* Do the actual SCTP receive: */
+ n = sock_recvmsg(desc->s, &mhdr, 0);
+ goto check_result;
+ }
+#endif
+ /* Use recv() instead on connected sockets. */
+ if ((desc->state & INET_F_ACTIVE)) {
+ n = sock_recv(desc->s, ptr, sz, 0);
+ other = desc->remote;
+ }
+ else
+ n = sock_recvfrom(desc->s, ptr, sz, 0, &other.sa, &len);
+
+#ifdef HAVE_SCTP
+ check_result:
+#endif
+ /* Analyse the result: */
+ if (n == SOCKET_ERROR
+#ifdef HAVE_SCTP
+ || (short_recv = (IS_SCTP(desc) && !(mhdr.msg_flags & MSG_EOR)))
+ /* NB: here we check for EOR not being set -- this is an error as
+ well, we don't support partial msgs:
+ */
+#endif
+ ) {
+ int err = sock_errno();
+ release_buffer(buf);
+ if (err != ERRNO_BLOCK) {
+ if (!desc->active) {
+#ifdef HAVE_SCTP
+ if (short_recv)
+ async_error_am(desc, am_short_recv);
+ else
+#else
+ async_error(desc, err);
+#endif
+ driver_cancel_timer(desc->port);
+ sock_select(desc,FD_READ,0);
+ }
+ else {
+ /* This is for an active desc only: */
+ packet_error_message(udesc, err);
+ }
+ }
+ else if (!desc->active)
+ sock_select(desc,FD_READ,1);
+ return count; /* strange, not ready */
+ }
+ else {
+ int offs;
+ int nsz;
+ int code;
+ unsigned int alen = len;
+ void * extra = NULL;
+
+ inet_input_count(desc, n);
+ inet_get_address(desc->sfamily, abuf, &other, &alen);
+ /* Copy formatted address to the buffer allocated; "alen" is the
+ actual length which must be <= than the original reserved "len".
+ This means that the addr + data in the buffer are contiguous,
+ but they may start not at the "orig_bytes", but with some "offs"
+ from them:
+ */
+ ASSERT (alen <= len);
+ sys_memcpy(ptr - alen, abuf, alen);
+ ptr -= alen;
+ nsz = n + alen; /* nsz = data + address */
+ offs = ptr - buf->orig_bytes; /* initial pointer offset */
+
+ /* Check if we need to reallocate binary */
+ if ((desc->mode == INET_MODE_BINARY) &&
+ (desc->hsz < n) && (nsz < BIN_REALLOC_LIMIT(sz))) {
+ ErlDrvBinary* tmp;
+ if ((tmp = realloc_buffer(buf,nsz+offs)) != NULL)
+ buf = tmp;
+ }
+#ifdef HAVE_SCTP
+ if (IS_SCTP(desc)) extra = &mhdr;
+#endif
+ /* Actual parsing and return of the data received, occur here: */
+ code = packet_reply_binary_data(desc, (unsigned int)alen,
+ buf, offs, nsz, extra);
+ free_buffer(buf);
+ if (code < 0)
+ return count;
+ count++;
+ if (!desc->active) {
+ driver_cancel_timer(desc->port); /* possibly cancel */
+ sock_select(desc,FD_READ,0);
+ return count; /* passive mode (read one packet only) */
+ }
+ }
+ }
+ return count;
+}
+
+static void packet_inet_drv_output(ErlDrvData e, ErlDrvEvent event)
+{
+ (void) packet_inet_output((udp_descriptor*)e, (HANDLE)event);
+}
+
+/* UDP/SCTP socket ready for output:
+** This is a Back-End for Non-Block SCTP Connect (SCTP_STATE_CONNECTING)
+*/
+static int packet_inet_output(udp_descriptor* udesc, HANDLE event)
+{
+ inet_descriptor* desc = INETP(udesc);
+ int ret = 0;
+ ErlDrvPort ix = desc->port;
+
+ DEBUGF(("packet_inet_output(%ld) {s=%d\r\n",
+ (long)desc->port, desc->s));
+
+ if (desc->state == SCTP_STATE_CONNECTING) {
+ sock_select(desc, FD_CONNECT, 0);
+
+ driver_cancel_timer(ix); /* posssibly cancel a timer */
+#ifndef __WIN32__
+ /*
+ * XXX This is strange. This *should* work on Windows NT too,
+ * but doesn't. An bug in Winsock 2.0 for Windows NT?
+ *
+ * See "Unix Netwok Programming", W.R.Stevens, p 412 for a
+ * discussion about Unix portability and non blocking connect.
+ */
+
+#ifndef SO_ERROR
+ {
+ int sz = sizeof(desc->remote);
+ int code = sock_peer(desc->s,
+ (struct sockaddr*) &desc->remote, &sz);
+
+ if (code == SOCKET_ERROR) {
+ desc->state = PACKET_STATE_BOUND; /* restore state */
+ ret = async_error(desc, sock_errno());
+ goto done;
+ }
+ }
+#else
+ {
+ int error = 0; /* Has to be initiated, we check it */
+ unsigned int sz = sizeof(error); /* even if we get -1 */
+ int code = sock_getopt(desc->s, SOL_SOCKET, SO_ERROR,
+ (void *)&error, &sz);
+
+ if ((code < 0) || error) {
+ desc->state = PACKET_STATE_BOUND; /* restore state */
+ ret = async_error(desc, error);
+ goto done;
+ }
+ }
+#endif /* SOCKOPT_CONNECT_STAT */
+#endif /* !__WIN32__ */
+
+ desc->state = PACKET_STATE_CONNECTED;
+ async_ok(desc);
+ }
+ else {
+ sock_select(desc,FD_CONNECT,0);
+
+ DEBUGF(("packet_inet_output(%ld): bad state: %04x\r\n",
+ (long)desc->port, desc->state));
+ }
+ done:
+ DEBUGF(("packet_inet_output(%ld) }\r\n", (long)desc->port));
+ return ret;
+}
+
+/*---------------------------------------------------------------------------*/
+
+#ifdef __WIN32__
+
+/*
+ * Although we no longer need to lookup all of winsock2 dynamically,
+ * there are still some function(s) we need to look up.
+ */
+static void find_dynamic_functions(void)
+{
+ char kernel_dll_name[] = "kernel32";
+ HMODULE module;
+ module = GetModuleHandle(kernel_dll_name);
+ fpSetHandleInformation = (module != NULL) ?
+ (BOOL (WINAPI *)(HANDLE,DWORD,DWORD))
+ GetProcAddress(module,"SetHandleInformation") :
+ NULL;
+}
+
+
+
+/*
+ * We must make sure that the socket handles are not inherited
+ * by port programs (if there are inherited, the sockets will not
+ * get closed when the emulator terminates, and epmd and other Erlang
+ * nodes will not notice that we have exited).
+ *
+ * XXX It is not clear whether this works/is necessary in Windows 95.
+ * There could also be problems with Winsock implementations from other
+ * suppliers than Microsoft.
+ */
+
+static SOCKET
+make_noninheritable_handle(SOCKET s)
+{
+ if (s != INVALID_SOCKET) {
+ if (fpSetHandleInformation != NULL) {
+ (*fpSetHandleInformation)((HANDLE) s, HANDLE_FLAG_INHERIT, 0);
+ } else {
+ HANDLE non_inherited;
+ HANDLE this_process = GetCurrentProcess();
+ if (DuplicateHandle(this_process, (HANDLE) s,
+ this_process, &non_inherited, 0,
+ FALSE, DUPLICATE_SAME_ACCESS)) {
+ sock_close(s);
+ s = (SOCKET) non_inherited;
+ }
+ }
+ }
+ return s;
+}
+
+#endif /* UDP for __WIN32__ */
+
+/*
+ * Multi-timers
+ */
+
+static void absolute_timeout(unsigned millis, ErlDrvNowData *out)
+{
+ unsigned rest;
+ unsigned long millipart;
+ unsigned long secpart;
+ unsigned long megasecpart;
+ unsigned tmo_secs = (millis / 1000U);
+ unsigned tmo_millis = (millis % 1000);
+ driver_get_now(out);
+ rest = (out->microsecs) % 1000;
+ millipart = ((out->microsecs) / 1000UL);
+ if (rest >= 500) {
+ ++millipart;
+ }
+ secpart = out->secs;
+ megasecpart = out->megasecs;
+ millipart += tmo_millis;
+ secpart += (millipart / 1000000UL);
+ millipart %= 1000000UL;
+ secpart += tmo_secs;
+ megasecpart += (secpart / 1000000UL);
+ secpart %= 1000000UL;
+ out->megasecs = megasecpart;
+ out->secs = secpart;
+ out->microsecs = (millipart * 1000UL);
+}
+
+static unsigned relative_timeout(ErlDrvNowData *in)
+{
+ ErlDrvNowData now;
+ unsigned rest;
+ unsigned long millipart, in_millis, in_secs, in_megasecs;
+
+ driver_get_now(&now);
+
+ in_secs = in->secs;
+ in_megasecs = in->megasecs;
+
+ rest = (now.microsecs) % 1000;
+ millipart = ((now.microsecs) / 1000UL);
+ if (rest >= 500) {
+ ++millipart;
+ }
+ in_millis = ((in->microsecs) / 1000UL);
+ if ( in_millis < millipart ) {
+ if (in_secs > 0) {
+ --in_secs;
+ } else {
+ in_secs = (1000000UL - 1UL);
+ if (in_megasecs <= now.megasecs) {
+ return 0;
+ } else {
+ --in_megasecs;
+ }
+ }
+ in_millis += 1000UL;
+ }
+ in_millis -= millipart;
+
+ if (in_secs < now.secs) {
+ if (in_megasecs <= now.megasecs) {
+ return 0;
+ } else {
+ --in_megasecs;
+ }
+ in_secs += 1000000;
+ }
+ in_secs -= now.secs;
+ if (in_megasecs < now.megasecs) {
+ return 0;
+ } else {
+ in_megasecs -= now.megasecs;
+ }
+ return (unsigned) ((in_megasecs * 1000000000UL) +
+ (in_secs * 1000UL) +
+ in_millis);
+}
+
+#ifdef DEBUG
+static int nowcmp(ErlDrvNowData *d1, ErlDrvNowData *d2)
+{
+ /* Assume it's not safe to do signed conversion on megasecs... */
+ if (d1->megasecs < d2->megasecs) {
+ return -1;
+ } else if (d1->megasecs > d2->megasecs) {
+ return 1;
+ } else if (d1->secs != d2->secs) {
+ return ((int) d1->secs) - ((int) d2->secs);
+ }
+ return ((int) d1->microsecs) - ((int) d2->microsecs);
+}
+#endif
+
+static void fire_multi_timers(MultiTimerData **first, ErlDrvPort port,
+ ErlDrvData data)
+{
+ unsigned next_timeout;
+ if (!*first) {
+ ASSERT(0);
+ return;
+ }
+#ifdef DEBUG
+ {
+ ErlDrvNowData chk;
+ driver_get_now(&chk);
+ chk.microsecs /= 10000UL;
+ chk.microsecs *= 10000UL;
+ chk.microsecs += 10000;
+ ASSERT(nowcmp(&chk,&((*first)->when)) >= 0);
+ }
+#endif
+ do {
+ MultiTimerData *save = *first;
+ *first = save->next;
+ (*(save->timeout_function))(data,save->caller);
+ FREE(save);
+ if (*first == NULL) {
+ return;
+ }
+ (*first)->prev = NULL;
+ next_timeout = relative_timeout(&((*first)->when));
+ } while (next_timeout == 0);
+ driver_set_timer(port,next_timeout);
+}
+
+static void clean_multi_timers(MultiTimerData **first, ErlDrvPort port)
+{
+ MultiTimerData *p;
+ if (*first) {
+ driver_cancel_timer(port);
+ }
+ while (*first) {
+ p = *first;
+ *first = p->next;
+ FREE(p);
+ }
+}
+static void remove_multi_timer(MultiTimerData **first, ErlDrvPort port, MultiTimerData *p)
+{
+ if (p->prev != NULL) {
+ p->prev->next = p->next;
+ } else {
+ driver_cancel_timer(port);
+ *first = p->next;
+ if (*first) {
+ unsigned ntmo = relative_timeout(&((*first)->when));
+ driver_set_timer(port,ntmo);
+ }
+ }
+ if (p->next != NULL) {
+ p->next->prev = p->prev;
+ }
+ FREE(p);
+}
+
+static MultiTimerData *add_multi_timer(MultiTimerData **first, ErlDrvPort port,
+ ErlDrvTermData caller, unsigned timeout,
+ void (*timeout_fun)(ErlDrvData drv_data,
+ ErlDrvTermData caller))
+{
+ MultiTimerData *mtd, *p, *s;
+ mtd = ALLOC(sizeof(MultiTimerData));
+ absolute_timeout(timeout, &(mtd->when));
+ mtd->timeout_function = timeout_fun;
+ mtd->caller = caller;
+ mtd->next = mtd->prev = NULL;
+ for(p = *first,s = NULL; p != NULL; s = p, p = p->next) {
+ if (p->when.megasecs >= mtd->when.megasecs) {
+ break;
+ }
+ }
+ if (!p || p->when.megasecs > mtd->when.megasecs) {
+ goto found;
+ }
+ for (; p!= NULL; s = p, p = p->next) {
+ if (p->when.secs >= mtd->when.secs) {
+ break;
+ }
+ }
+ if (!p || p->when.secs > mtd->when.secs) {
+ goto found;
+ }
+ for (; p!= NULL; s = p, p = p->next) {
+ if (p->when.microsecs >= mtd->when.microsecs) {
+ break;
+ }
+ }
+ found:
+ if (!p) {
+ if (!s) {
+ *first = mtd;
+ } else {
+ s->next = mtd;
+ mtd->prev = s;
+ }
+ } else {
+ if (!s) {
+ *first = mtd;
+ } else {
+ s->next = mtd;
+ mtd->prev = s;
+ }
+ mtd->next = p;
+ p->prev = mtd;
+ }
+ if (!s) {
+ if (mtd->next) {
+ driver_cancel_timer(port);
+ }
+ driver_set_timer(port,timeout);
+ }
+ return mtd;
+}
+
+
+
+
+
+/*-----------------------------------------------------------------------------
+
+ Subscription
+
+-----------------------------------------------------------------------------*/
+
+static int
+save_subscriber(subs, subs_pid)
+subs_list *subs; ErlDrvTermData subs_pid;
+{
+ subs_list *tmp;
+
+ if(NO_SUBSCRIBERS(subs)) {
+ subs->subscriber = subs_pid;
+ subs->next = NULL;
+ }
+ else {
+ tmp = subs->next;
+ subs->next = ALLOC(sizeof(subs_list));
+ if(subs->next == NULL) {
+ subs->next = tmp;
+ return 0;
+ }
+ subs->next->subscriber = subs_pid;
+ subs->next->next = tmp;
+ }
+ return 1;
+}
+
+static void
+free_subscribers(subs)
+subs_list *subs;
+{
+ subs_list *this;
+ subs_list *next;
+
+ this = subs->next;
+ while(this) {
+ next = this->next;
+ FREE((void *) this);
+ this = next;
+ }
+
+ subs->subscriber = NO_PROCESS;
+ subs->next = NULL;
+}
+
+static void send_to_subscribers
+(
+ ErlDrvPort port,
+ subs_list *subs,
+ int free_subs,
+ ErlDrvTermData msg[],
+ int msg_len
+)
+{
+ subs_list *this;
+ subs_list *next;
+ int first = 1;
+
+ if(NO_SUBSCRIBERS(subs))
+ return;
+
+ this = subs;
+ while(this) {
+
+ (void) driver_send_term(port, this->subscriber, msg, msg_len);
+
+ if(free_subs && !first) {
+ next = this->next;
+ FREE((void *) this);
+ this = next;
+ }
+ else
+ this = this->next;
+ first = 0;
+ }
+
+ if(free_subs) {
+ subs->subscriber = NO_PROCESS;
+ subs->next = NULL;
+ }
+
+}
+
+/*
+ * A *very* limited socket interface. Used by the memory tracer
+ * (erl_mtrace.c).
+ */
+#include "erl_sock.h"
+
+erts_sock_t erts_sock_open(void)
+{
+ SOCKET s;
+
+ if(!sock_init())
+ return ERTS_SOCK_INVALID_SOCKET;
+
+ s = sock_open(AF_INET, SOCK_STREAM, 0);
+
+ if (s == INVALID_SOCKET)
+ return ERTS_SOCK_INVALID_SOCKET;
+
+ return (erts_sock_t) s;
+}
+
+void erts_sock_close(erts_sock_t socket)
+{
+ if (socket != ERTS_SOCK_INVALID_SOCKET)
+ sock_close((SOCKET) socket);
+}
+
+
+int erts_sock_connect(erts_sock_t socket, byte *ip_addr, int len, Uint16 port)
+{
+ SOCKET s = (SOCKET) socket;
+ char buf[2 + 4];
+ int blen = 6;
+ inet_address addr;
+
+ if (socket == ERTS_SOCK_INVALID_SOCKET || len != 4)
+ return 0;
+
+ put_int16(port, buf);
+ memcpy((void *) (buf + 2), (void *) ip_addr, 4);
+
+ if (!inet_set_address(AF_INET, &addr, buf, &blen))
+ return 0;
+
+ if (SOCKET_ERROR == sock_connect(s,
+ (struct sockaddr *) &addr,
+ sizeof(struct sockaddr_in)))
+ return 0;
+ return 1;
+}
+
+Sint erts_sock_send(erts_sock_t socket, const void *buf, Sint len)
+{
+ return (Sint) sock_send((SOCKET) socket, buf, (size_t) len, 0);
+}
+
+
+int erts_sock_gethostname(char *buf, int bufsz)
+{
+ if (sock_hostname(buf, bufsz) == SOCKET_ERROR)
+ return -1;
+ return 0;
+}
+
+
+int erts_sock_errno()
+{
+ return sock_errno();
+}