2018-08-03 21:22:36 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* net/netlink/netlink_sockif.c
|
|
|
|
*
|
2021-02-19 12:45:37 +01:00
|
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
|
|
* this work for additional information regarding copyright ownership. The
|
|
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
|
|
* "License"); you may not use this file except in compliance with the
|
|
|
|
* License. You may obtain a copy of the License at
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
2021-02-19 12:45:37 +01:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
2021-02-19 12:45:37 +01:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
|
|
* License for the specific language governing permissions and limitations
|
|
|
|
* under the License.
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <stdbool.h>
|
2019-11-03 20:59:42 +01:00
|
|
|
#include <string.h>
|
2019-11-27 01:52:22 +01:00
|
|
|
#include <poll.h>
|
2019-11-28 04:30:01 +01:00
|
|
|
#include <sched.h>
|
2018-08-03 21:22:36 +02:00
|
|
|
#include <assert.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
#include <nuttx/kmalloc.h>
|
2019-11-27 01:52:22 +01:00
|
|
|
#include <nuttx/semaphore.h>
|
2019-11-28 21:20:40 +01:00
|
|
|
#include <nuttx/wqueue.h>
|
2018-08-03 21:22:36 +02:00
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
|
|
|
|
#include "netlink/netlink.h"
|
|
|
|
|
|
|
|
#ifdef CONFIG_NET_NETLINK
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Function Prototypes
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_setup(FAR struct socket *psock, int protocol);
|
|
|
|
static sockcaps_t netlink_sockcaps(FAR struct socket *psock);
|
|
|
|
static void netlink_addref(FAR struct socket *psock);
|
|
|
|
static int netlink_bind(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen);
|
|
|
|
static int netlink_getsockname(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen);
|
|
|
|
static int netlink_getpeername(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen);
|
|
|
|
static int netlink_listen(FAR struct socket *psock, int backlog);
|
|
|
|
static int netlink_connect(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen);
|
2020-04-10 15:03:34 +02:00
|
|
|
static int netlink_accept(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen,
|
|
|
|
FAR struct socket *newsock);
|
2018-08-03 21:22:36 +02:00
|
|
|
static int netlink_poll(FAR struct socket *psock, FAR struct pollfd *fds,
|
|
|
|
bool setup);
|
2020-12-01 07:55:16 +01:00
|
|
|
static ssize_t netlink_sendmsg(FAR struct socket *psock,
|
|
|
|
FAR struct msghdr *msg, int flags);
|
|
|
|
static ssize_t netlink_recvmsg(FAR struct socket *psock,
|
|
|
|
FAR struct msghdr *msg, int flags);
|
2018-08-03 21:22:36 +02:00
|
|
|
static int netlink_close(FAR struct socket *psock);
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Data
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
const struct sock_intf_s g_netlink_sockif =
|
|
|
|
{
|
|
|
|
netlink_setup, /* si_setup */
|
|
|
|
netlink_sockcaps, /* si_sockcaps */
|
|
|
|
netlink_addref, /* si_addref */
|
|
|
|
netlink_bind, /* si_bind */
|
|
|
|
netlink_getsockname, /* si_getsockname */
|
|
|
|
netlink_getpeername, /* si_getpeername */
|
|
|
|
netlink_listen, /* si_listen */
|
|
|
|
netlink_connect, /* si_connect */
|
|
|
|
netlink_accept, /* si_accept */
|
|
|
|
netlink_poll, /* si_poll */
|
2020-12-01 07:55:16 +01:00
|
|
|
netlink_sendmsg, /* si_sendmsg */
|
|
|
|
netlink_recvmsg, /* si_recvmsg */
|
2018-08-03 21:22:36 +02:00
|
|
|
netlink_close /* si_close */
|
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
2020-04-07 19:44:23 +02:00
|
|
|
* Name: netlink_setup
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Called for socket() to verify that the provided socket type and
|
|
|
|
* protocol are usable by this address family. Perform any family-
|
|
|
|
* specific socket fields.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2019-11-03 20:59:42 +01:00
|
|
|
* psock - A pointer to a user allocated socket structure to be
|
|
|
|
* initialized.
|
2019-11-04 21:06:07 +01:00
|
|
|
* protocol - NetLink socket protocol (see sys/socket.h)
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
2018-09-14 14:55:45 +02:00
|
|
|
* Zero (OK) is returned on success. Otherwise, a negated errno value is
|
2018-08-03 21:22:36 +02:00
|
|
|
* returned.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_setup(FAR struct socket *psock, int protocol)
|
|
|
|
{
|
|
|
|
int domain = psock->s_domain;
|
|
|
|
int type = psock->s_type;
|
|
|
|
|
2019-11-03 20:59:42 +01:00
|
|
|
/* Verify that the protocol is supported */
|
|
|
|
|
|
|
|
DEBUGASSERT((unsigned int)protocol <= UINT8_MAX);
|
|
|
|
|
|
|
|
switch (protocol)
|
2018-08-03 21:22:36 +02:00
|
|
|
{
|
2019-11-03 20:59:42 +01:00
|
|
|
#ifdef CONFIG_NETLINK_ROUTE
|
|
|
|
case NETLINK_ROUTE:
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
|
|
|
return -EPROTONOSUPPORT;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
2019-11-03 20:59:42 +01:00
|
|
|
|
|
|
|
/* Verify the socket type (domain should always be PF_NETLINK here) */
|
|
|
|
|
|
|
|
if (domain == PF_NETLINK && (type == SOCK_RAW || type == SOCK_DGRAM))
|
2018-08-03 21:22:36 +02:00
|
|
|
{
|
2019-11-04 21:06:07 +01:00
|
|
|
/* Allocate the NetLink socket connection structure and save it in the
|
2019-11-03 20:59:42 +01:00
|
|
|
* new socket instance.
|
|
|
|
*/
|
|
|
|
|
|
|
|
FAR struct netlink_conn_s *conn = netlink_alloc();
|
|
|
|
if (conn == NULL)
|
|
|
|
{
|
|
|
|
/* Failed to reserve a connection structure */
|
|
|
|
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the connection instance */
|
|
|
|
|
|
|
|
conn->protocol = (uint8_t)protocol;
|
|
|
|
|
|
|
|
/* Set the reference count on the connection structure. This
|
|
|
|
* reference count will be incremented only if the socket is
|
|
|
|
* dup'ed
|
|
|
|
*/
|
|
|
|
|
|
|
|
conn->crefs = 1;
|
|
|
|
|
|
|
|
/* Attach the connection instance to the socket */
|
|
|
|
|
|
|
|
psock->s_conn = conn;
|
|
|
|
return OK;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
2019-11-03 20:59:42 +01:00
|
|
|
return -EPROTONOSUPPORT;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_sockcaps
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Return the bit encoded capabilities of this socket.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - Socket structure of the socket whose capabilities are being
|
|
|
|
* queried.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* The non-negative set of socket capabilities is returned.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static sockcaps_t netlink_sockcaps(FAR struct socket *psock)
|
|
|
|
{
|
2019-11-19 14:50:46 +01:00
|
|
|
/* Permit vfcntl to set socket to non-blocking */
|
|
|
|
|
|
|
|
return SOCKCAP_NONBLOCKING;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_addref
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Increment the reference count on the underlying connection structure.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock - Socket structure of the socket whose reference count will be
|
|
|
|
* incremented.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void netlink_addref(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
FAR struct netlink_conn_s *conn;
|
|
|
|
|
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL);
|
|
|
|
|
|
|
|
conn = psock->s_conn;
|
|
|
|
DEBUGASSERT(conn->crefs > 0 && conn->crefs < 255);
|
|
|
|
conn->crefs++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_bind
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* netlink_bind() gives the socket 'conn' the local address 'addr'. 'addr'
|
|
|
|
* is 'addrlen' bytes long. Traditionally, this is called "assigning a name
|
|
|
|
* to a socket." When a socket is created with socket, it exists in a name
|
|
|
|
* space (address family) but has no name assigned.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2019-11-04 21:06:07 +01:00
|
|
|
* conn NetLink socket connection structure
|
2018-08-03 21:22:36 +02:00
|
|
|
* addr Socket local address
|
|
|
|
* addrlen Length of 'addr'
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0 on success; -1 on error with errno set appropriately
|
|
|
|
*
|
|
|
|
* EACCES
|
|
|
|
* The address is protected, and the user is not the superuser.
|
|
|
|
* EADDRINUSE
|
|
|
|
* The given address is already in use.
|
|
|
|
* EINVAL
|
|
|
|
* The socket is already bound to an address.
|
|
|
|
* ENOTSOCK
|
|
|
|
* psock is a descriptor for a file, not a socket.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_bind(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr, socklen_t addrlen)
|
|
|
|
{
|
2019-11-03 20:59:42 +01:00
|
|
|
FAR struct sockaddr_nl *nladdr;
|
|
|
|
FAR struct netlink_conn_s *conn;
|
|
|
|
|
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL && addr != NULL &&
|
|
|
|
addrlen >= sizeof(struct sockaddr_nl));
|
|
|
|
|
|
|
|
/* Save the address information in the connection structure */
|
|
|
|
|
2020-04-07 20:31:57 +02:00
|
|
|
nladdr = (FAR struct sockaddr_nl *)addr;
|
|
|
|
conn = (FAR struct netlink_conn_s *)psock->s_conn;
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-07 20:31:57 +02:00
|
|
|
conn->pid = nladdr->nl_pid ? nladdr->nl_pid : getpid();
|
|
|
|
conn->groups = nladdr->nl_groups;
|
2019-11-03 20:59:42 +01:00
|
|
|
|
|
|
|
return OK;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_getsockname
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The getsockname() function retrieves the locally-bound name of the
|
|
|
|
* specified socket, stores this address in the sockaddr structure pointed
|
|
|
|
* to by the 'addr' argument, and stores the length of this address in the
|
|
|
|
* object pointed to by the 'addrlen' argument.
|
|
|
|
*
|
|
|
|
* If the actual length of the address is greater than the length of the
|
|
|
|
* supplied sockaddr structure, the stored address will be truncated.
|
|
|
|
*
|
|
|
|
* If the socket has not been bound to a local name, the value stored in
|
|
|
|
* the object pointed to by address is unspecified.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2019-11-04 21:06:07 +01:00
|
|
|
* conn NetLink socket connection structure
|
2018-08-03 21:22:36 +02:00
|
|
|
* addr sockaddr structure to receive data [out]
|
|
|
|
* addrlen Length of sockaddr structure [in/out]
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_getsockname(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr,
|
|
|
|
FAR socklen_t *addrlen)
|
|
|
|
{
|
2019-11-03 20:59:42 +01:00
|
|
|
FAR struct sockaddr_nl *nladdr;
|
2020-04-07 20:31:57 +02:00
|
|
|
FAR struct netlink_conn_s *conn;
|
2019-11-03 20:59:42 +01:00
|
|
|
|
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL && addr != NULL &&
|
|
|
|
addrlen != NULL && *addrlen >= sizeof(struct sockaddr_nl));
|
|
|
|
|
2020-04-07 20:31:57 +02:00
|
|
|
conn = (FAR struct netlink_conn_s *)psock->s_conn;
|
|
|
|
|
2019-11-03 20:59:42 +01:00
|
|
|
/* Return the address information in the address structure */
|
|
|
|
|
|
|
|
nladdr = (FAR struct sockaddr_nl *)addr;
|
|
|
|
memset(nladdr, 0, sizeof(struct sockaddr_nl));
|
|
|
|
|
2020-04-07 20:31:57 +02:00
|
|
|
nladdr->nl_family = AF_NETLINK;
|
|
|
|
nladdr->nl_pid = conn->pid;
|
|
|
|
nladdr->nl_groups = conn->groups;
|
2019-11-03 20:59:42 +01:00
|
|
|
|
|
|
|
*addrlen = sizeof(struct sockaddr_nl);
|
|
|
|
return OK;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_getpeername
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The netlink_getpeername() function retrieves the remote-connected name
|
|
|
|
* of the specified packet socket, stores this address in the sockaddr
|
|
|
|
* structure pointed to by the 'addr' argument, and stores the length of
|
|
|
|
* this address in the object pointed to by the 'addrlen' argument.
|
|
|
|
*
|
|
|
|
* If the actual length of the address is greater than the length of the
|
|
|
|
* supplied sockaddr structure, the stored address will be truncated.
|
|
|
|
*
|
|
|
|
* If the socket has not been bound to a local name, the value stored in
|
|
|
|
* the object pointed to by address is unspecified.
|
|
|
|
*
|
|
|
|
* Parameters:
|
|
|
|
* psock Socket structure of the socket to be queried
|
|
|
|
* addr sockaddr structure to receive data [out]
|
|
|
|
* addrlen Length of sockaddr structure [in/out]
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, 0 is returned, the 'addr' argument points to the address
|
|
|
|
* of the socket, and the 'addrlen' argument points to the length of the
|
|
|
|
* address. Otherwise, a negated errno value is returned. See
|
|
|
|
* getpeername() for the list of appropriate error numbers.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_getpeername(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr,
|
|
|
|
FAR socklen_t *addrlen)
|
|
|
|
{
|
2020-04-07 20:31:57 +02:00
|
|
|
FAR struct sockaddr_nl *nladdr;
|
|
|
|
FAR struct netlink_conn_s *conn;
|
|
|
|
|
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL && addr != NULL &&
|
|
|
|
addrlen != NULL && *addrlen >= sizeof(struct sockaddr_nl));
|
|
|
|
|
|
|
|
conn = (FAR struct netlink_conn_s *)psock->s_conn;
|
|
|
|
|
|
|
|
/* Return the address information in the address structure */
|
|
|
|
|
|
|
|
nladdr = (FAR struct sockaddr_nl *)addr;
|
|
|
|
memset(nladdr, 0, sizeof(struct sockaddr_nl));
|
|
|
|
|
|
|
|
nladdr->nl_family = AF_NETLINK;
|
|
|
|
nladdr->nl_pid = conn->dst_pid;
|
|
|
|
nladdr->nl_groups = conn->dst_groups;
|
|
|
|
|
|
|
|
*addrlen = sizeof(struct sockaddr_nl);
|
|
|
|
return OK;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_listen
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* To accept connections, a socket is first created with psock_socket(), a
|
|
|
|
* willingness to accept incoming connections and a queue limit for
|
|
|
|
* incoming connections are specified with psock_listen(), and then the
|
|
|
|
* connections are accepted with psock_accept(). For the case of AFINET
|
|
|
|
* and AFINET6 sockets, psock_listen() calls this function. The
|
|
|
|
* psock_listen() call applies only to sockets of type SOCK_STREAM or
|
|
|
|
* SOCK_SEQPACKET.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock Reference to an internal, bound socket structure.
|
|
|
|
* backlog The maximum length the queue of pending connections may grow.
|
|
|
|
* If a connection request arrives with the queue full, the client
|
|
|
|
* may receive an error with an indication of ECONNREFUSED or,
|
|
|
|
* if the underlying protocol supports retransmission, the request
|
|
|
|
* may be ignored so that retries succeed.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, zero is returned. On error, a negated errno value is
|
2020-12-13 14:58:02 +01:00
|
|
|
* returned. See listen() for the set of appropriate error values.
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_listen(FAR struct socket *psock, int backlog)
|
|
|
|
{
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_connect
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Perform a netlink connection
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
2020-04-10 15:03:34 +02:00
|
|
|
* psock A reference to the structure of the socket to be connected
|
2018-08-03 21:22:36 +02:00
|
|
|
* addr The address of the remote server to connect to
|
|
|
|
* addrlen Length of address buffer
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_connect(FAR struct socket *psock,
|
|
|
|
FAR const struct sockaddr *addr,
|
|
|
|
socklen_t addrlen)
|
|
|
|
{
|
2020-04-07 20:31:57 +02:00
|
|
|
FAR struct sockaddr_nl *nladdr;
|
|
|
|
FAR struct netlink_conn_s *conn;
|
|
|
|
|
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL && addr != NULL &&
|
|
|
|
addrlen >= sizeof(struct sockaddr_nl));
|
|
|
|
|
|
|
|
/* Save the address information in the connection structure */
|
|
|
|
|
|
|
|
nladdr = (FAR struct sockaddr_nl *)addr;
|
|
|
|
conn = (FAR struct netlink_conn_s *)psock->s_conn;
|
|
|
|
|
|
|
|
conn->dst_pid = nladdr->nl_pid;
|
|
|
|
conn->dst_groups = nladdr->nl_groups;
|
|
|
|
|
|
|
|
return OK;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_accept
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The netlink_accept function is used with connection-based socket
|
|
|
|
* types (SOCK_STREAM, SOCK_SEQPACKET and SOCK_RDM). It extracts the first
|
|
|
|
* connection request on the queue of pending connections, creates a new
|
|
|
|
* connected socket with mostly the same properties as 'sockfd', and
|
|
|
|
* allocates a new socket descriptor for the socket, which is returned. The
|
|
|
|
* newly created socket is no longer in the listening state. The original
|
|
|
|
* socket 'sockfd' is unaffected by this call. Per file descriptor flags
|
|
|
|
* are not inherited across an inet_accept.
|
|
|
|
*
|
|
|
|
* The 'sockfd' argument is a socket descriptor that has been created with
|
|
|
|
* socket(), bound to a local address with bind(), and is listening for
|
|
|
|
* connections after a call to listen().
|
|
|
|
*
|
|
|
|
* On return, the 'addr' structure is filled in with the address of the
|
|
|
|
* connecting entity. The 'addrlen' argument initially contains the size
|
|
|
|
* of the structure pointed to by 'addr'; on return it will contain the
|
|
|
|
* actual length of the address returned.
|
|
|
|
*
|
|
|
|
* If no pending connections are present on the queue, and the socket is
|
2020-04-07 19:44:23 +02:00
|
|
|
* not marked as non-blocking, accept blocks the caller until a
|
2018-08-03 21:22:36 +02:00
|
|
|
* connection is present. If the socket is marked non-blocking and no
|
|
|
|
* pending connections are present on the queue, inet_accept returns
|
|
|
|
* EAGAIN.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock Reference to the listening socket structure
|
|
|
|
* addr Receives the address of the connecting client
|
2019-11-04 21:06:07 +01:00
|
|
|
* addrlen Input: Allocated size of 'addr'
|
|
|
|
* Return: Actual size returned size of 'addr'
|
2018-08-03 21:22:36 +02:00
|
|
|
* newsock Location to return the accepted socket information.
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* Returns 0 (OK) on success. On failure, it returns a negated errno
|
2019-11-04 21:06:07 +01:00
|
|
|
* value. See accept() for a description of the appropriate error value.
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
* The network is locked.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-04-10 15:03:34 +02:00
|
|
|
static int netlink_accept(FAR struct socket *psock,
|
|
|
|
FAR struct sockaddr *addr, FAR socklen_t *addrlen,
|
|
|
|
FAR struct socket *newsock)
|
2018-08-03 21:22:36 +02:00
|
|
|
{
|
|
|
|
return -EOPNOTSUPP;
|
|
|
|
}
|
|
|
|
|
2019-11-28 04:30:01 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_response_available
|
|
|
|
*
|
|
|
|
* Description:
|
2019-11-28 21:20:40 +01:00
|
|
|
* Handle a Netlink response available notification.
|
2019-11-28 04:30:01 +01:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
2019-11-28 21:20:40 +01:00
|
|
|
* Standard work handler parameters
|
2019-11-28 04:30:01 +01:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* None
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
static void netlink_response_available(FAR void *arg)
|
2019-11-28 04:30:01 +01:00
|
|
|
{
|
2020-01-19 10:44:27 +01:00
|
|
|
FAR struct netlink_conn_s *conn = arg;
|
2019-11-28 04:30:01 +01:00
|
|
|
|
2020-01-19 10:44:27 +01:00
|
|
|
DEBUGASSERT(conn != NULL);
|
2019-11-28 04:30:01 +01:00
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
/* The following should always be true ... but maybe not in some race
|
|
|
|
* condition?
|
2019-11-28 04:30:01 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
sched_lock();
|
2019-11-28 21:20:40 +01:00
|
|
|
net_lock();
|
|
|
|
|
2019-11-28 04:30:01 +01:00
|
|
|
if (conn->pollsem != NULL && conn->pollevent != NULL)
|
|
|
|
{
|
|
|
|
/* Wake up the poll() with POLLIN */
|
|
|
|
|
|
|
|
*conn->pollevent |= POLLIN;
|
2020-04-07 19:44:23 +02:00
|
|
|
nxsem_post(conn->pollsem);
|
2019-11-28 04:30:01 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
nwarn("WARNING: Missing references in connection.\n");
|
|
|
|
}
|
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
/* Allow another poll() */
|
|
|
|
|
|
|
|
conn->pollsem = NULL;
|
|
|
|
conn->pollevent = NULL;
|
|
|
|
|
|
|
|
net_unlock();
|
2019-11-28 04:30:01 +01:00
|
|
|
sched_unlock();
|
|
|
|
}
|
|
|
|
|
2018-08-03 21:22:36 +02:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_poll
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The standard poll() operation redirects operations on socket descriptors
|
|
|
|
* to this function.
|
|
|
|
*
|
2019-11-27 01:52:22 +01:00
|
|
|
* POLLUP: Will never be reported
|
|
|
|
* POLLERR: Reported in the event of any failure.
|
|
|
|
* POLLOUT: Always reported if requested.
|
|
|
|
* POLLIN: Reported if requested but only when pending response data is
|
|
|
|
* available
|
|
|
|
*
|
2018-08-03 21:22:36 +02:00
|
|
|
* Input Parameters:
|
|
|
|
* psock - An instance of the internal socket structure.
|
|
|
|
* fds - The structure describing the events to be monitored.
|
2019-11-04 21:06:07 +01:00
|
|
|
* setup - true: Setup up the poll; false: Tear down the poll
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_poll(FAR struct socket *psock, FAR struct pollfd *fds,
|
|
|
|
bool setup)
|
|
|
|
{
|
2019-11-28 04:30:01 +01:00
|
|
|
FAR struct netlink_conn_s *conn;
|
2020-04-07 19:50:01 +02:00
|
|
|
int ret = OK;
|
2019-11-27 01:52:22 +01:00
|
|
|
|
2019-11-28 04:30:01 +01:00
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL);
|
|
|
|
conn = (FAR struct netlink_conn_s *)psock->s_conn;
|
|
|
|
|
2019-11-27 01:52:22 +01:00
|
|
|
/* Check if we are setting up or tearing down the poll */
|
|
|
|
|
|
|
|
if (setup)
|
|
|
|
{
|
|
|
|
/* If POLLOUT is selected, return immediately (maybe) */
|
|
|
|
|
|
|
|
pollevent_t revents = POLLOUT;
|
|
|
|
|
|
|
|
/* If POLLIN is selected and a response is available, return
|
|
|
|
* immediately (maybe).
|
|
|
|
*/
|
|
|
|
|
|
|
|
net_lock();
|
2020-04-13 14:49:52 +02:00
|
|
|
if (netlink_check_response(conn))
|
2019-11-27 01:52:22 +01:00
|
|
|
{
|
|
|
|
revents |= POLLIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* But return ONLY if POLLIN and/or POLLIN are included in the
|
|
|
|
* requested event set.
|
|
|
|
*/
|
|
|
|
|
|
|
|
revents &= fds->events;
|
|
|
|
if (revents != 0)
|
|
|
|
{
|
|
|
|
fds->revents = revents;
|
|
|
|
nxsem_post(fds->sem);
|
|
|
|
net_unlock();
|
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
/* Set up to be notified when a response is available if POLLIN is
|
|
|
|
* requested.
|
2019-11-27 01:52:22 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
if ((fds->events & POLLIN) != 0)
|
|
|
|
{
|
2019-11-28 21:20:40 +01:00
|
|
|
/* Some limitations: There can be only a single outstanding POLLIN
|
|
|
|
* on the Netlink connection.
|
2019-11-27 01:52:22 +01:00
|
|
|
*/
|
|
|
|
|
2019-11-28 04:30:01 +01:00
|
|
|
if (conn->pollsem != NULL || conn->pollevent != NULL)
|
|
|
|
{
|
2019-11-28 21:20:40 +01:00
|
|
|
nerr("ERROR: Multiple polls() on socket not supported.\n");
|
|
|
|
net_unlock();
|
|
|
|
return -EBUSY;
|
2019-11-28 04:30:01 +01:00
|
|
|
}
|
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
/* Set up the notification */
|
|
|
|
|
2019-11-28 04:30:01 +01:00
|
|
|
conn->pollsem = fds->sem;
|
|
|
|
conn->pollevent = &fds->revents;
|
|
|
|
|
2020-04-10 15:03:34 +02:00
|
|
|
ret = netlink_notifier_setup(netlink_response_available,
|
|
|
|
conn, conn);
|
2019-11-28 04:30:01 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2019-11-28 21:20:40 +01:00
|
|
|
nerr("ERROR: netlink_notifier_setup() failed: %d\n", ret);
|
|
|
|
conn->pollsem = NULL;
|
|
|
|
conn->pollevent = NULL;
|
2019-11-28 04:30:01 +01:00
|
|
|
}
|
|
|
|
}
|
2019-11-27 01:52:22 +01:00
|
|
|
|
|
|
|
net_unlock();
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Cancel any response notifications */
|
|
|
|
|
2019-11-28 21:20:40 +01:00
|
|
|
ret = netlink_notifier_teardown(conn);
|
|
|
|
conn->pollsem = NULL;
|
|
|
|
conn->pollevent = NULL;
|
2019-11-27 01:52:22 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2020-12-01 07:55:16 +01:00
|
|
|
* Name: netlink_sendmsg
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2020-12-01 07:55:16 +01:00
|
|
|
* If sendmsg() is used on a connection-mode (SOCK_STREAM, SOCK_SEQPACKET)
|
|
|
|
* socket, the parameters 'msg_name' and 'msg_namelen' are ignored (and the
|
|
|
|
* error EISCONN may be returned when they are not NULL and 0), and the
|
|
|
|
* error ENOTCONN is returned when the socket was not actually connected.
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
2020-12-01 07:55:16 +01:00
|
|
|
* psock A reference to the structure of the socket to be connected
|
|
|
|
* msg msg to send
|
|
|
|
* flags Send flags (ignored)
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* On success, returns the number of characters sent. On error, a negated
|
2020-12-01 07:55:16 +01:00
|
|
|
* errno value is returned (see sendmsg() for the list of appropriate error
|
2018-08-03 21:22:36 +02:00
|
|
|
* values.
|
|
|
|
*
|
2020-12-01 07:55:16 +01:00
|
|
|
* Assumptions:
|
|
|
|
*
|
2018-08-03 21:22:36 +02:00
|
|
|
****************************************************************************/
|
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
static ssize_t netlink_sendmsg(FAR struct socket *psock,
|
|
|
|
FAR struct msghdr *msg, int flags)
|
2018-08-03 21:22:36 +02:00
|
|
|
{
|
2020-12-01 07:55:16 +01:00
|
|
|
FAR const void *buf = msg->msg_iov->iov_base;
|
|
|
|
size_t len = msg->msg_iov->iov_len;
|
|
|
|
FAR const struct sockaddr *to = msg->msg_name;
|
|
|
|
socklen_t tolen = msg->msg_namelen;
|
2020-04-07 20:31:57 +02:00
|
|
|
FAR struct netlink_conn_s *conn;
|
2020-12-01 07:55:16 +01:00
|
|
|
FAR struct nlmsghdr *nlmsg;
|
2020-04-07 20:31:57 +02:00
|
|
|
struct sockaddr_nl nladdr;
|
2020-12-01 07:55:16 +01:00
|
|
|
int ret;
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-07 20:31:57 +02:00
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL && buf != NULL);
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
/* Validity check, only single iov supported */
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
if (msg->msg_iovlen != 1)
|
|
|
|
{
|
|
|
|
return -ENOTSUP;
|
|
|
|
}
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
/* Get the underlying connection structure */
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
conn = (FAR struct netlink_conn_s *)psock->s_conn;
|
|
|
|
if (to == NULL)
|
|
|
|
{
|
|
|
|
/* netlink_send() */
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
/* Format the address */
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
nladdr.nl_family = AF_NETLINK;
|
|
|
|
nladdr.nl_pad = 0;
|
|
|
|
nladdr.nl_pid = conn->dst_pid;
|
|
|
|
nladdr.nl_groups = conn->dst_groups;
|
2018-08-03 21:22:36 +02:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
to = (FAR const struct sockaddr *)&nladdr;
|
|
|
|
tolen = sizeof(struct sockaddr_nl);
|
|
|
|
}
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
DEBUGASSERT(tolen >= sizeof(struct sockaddr_nl));
|
2019-11-03 20:59:42 +01:00
|
|
|
|
|
|
|
/* Get a reference to the netlink message */
|
|
|
|
|
|
|
|
nlmsg = (FAR struct nlmsghdr *)buf;
|
2019-11-04 02:27:58 +01:00
|
|
|
DEBUGASSERT(nlmsg->nlmsg_len >= sizeof(struct nlmsghdr));
|
2019-11-03 20:59:42 +01:00
|
|
|
|
|
|
|
switch (conn->protocol)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NETLINK_ROUTE
|
|
|
|
case NETLINK_ROUTE:
|
2020-04-13 14:49:52 +02:00
|
|
|
ret = netlink_route_sendto(conn, nlmsg, len, flags,
|
2020-12-01 07:55:16 +01:00
|
|
|
(FAR const struct sockaddr_nl *)to,
|
2019-11-03 20:59:42 +01:00
|
|
|
tolen);
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
default:
|
2019-11-28 21:20:40 +01:00
|
|
|
ret = -EOPNOTSUPP;
|
2019-11-03 20:59:42 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2020-12-01 07:55:16 +01:00
|
|
|
* Name: netlink_recvmsg
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Description:
|
2020-12-01 07:55:16 +01:00
|
|
|
* recvmsg() receives messages from a socket, and may be used to receive
|
2018-08-03 21:22:36 +02:00
|
|
|
* data on a socket whether or not it is connection-oriented.
|
|
|
|
*
|
2020-12-01 07:55:16 +01:00
|
|
|
* If msg_name is not NULL, and the underlying protocol provides the source
|
|
|
|
* address, this source address is filled in. The argument 'msg_namelen' is
|
|
|
|
* initialized to the size of the buffer associated with msg_name, and
|
|
|
|
* modified on return to indicate the actual size of the address stored
|
|
|
|
* there.
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock A pointer to a NuttX-specific, internal socket structure
|
2020-12-01 07:55:16 +01:00
|
|
|
* msg Buffer to receive the message
|
2018-08-03 21:22:36 +02:00
|
|
|
* flags Receive flags (ignored)
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2020-12-01 07:55:16 +01:00
|
|
|
static ssize_t netlink_recvmsg(FAR struct socket *psock,
|
|
|
|
FAR struct msghdr *msg, int flags)
|
2018-08-03 21:22:36 +02:00
|
|
|
{
|
2020-12-01 07:55:16 +01:00
|
|
|
FAR void *buf = msg->msg_iov->iov_base;
|
|
|
|
size_t len = msg->msg_iov->iov_len;
|
|
|
|
FAR struct sockaddr *from = msg->msg_name;
|
|
|
|
FAR socklen_t *fromlen = &msg->msg_namelen;
|
2020-04-08 12:30:28 +02:00
|
|
|
FAR struct netlink_response_s *entry;
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2019-11-04 02:27:58 +01:00
|
|
|
DEBUGASSERT(psock != NULL && psock->s_conn != NULL && buf != NULL);
|
|
|
|
DEBUGASSERT(from == NULL ||
|
|
|
|
(fromlen != NULL && *fromlen >= sizeof(struct sockaddr_nl)));
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-08 12:30:28 +02:00
|
|
|
/* Find the response to this message. The return value */
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-13 14:49:52 +02:00
|
|
|
entry = netlink_tryget_response(psock->s_conn);
|
2020-04-08 12:30:28 +02:00
|
|
|
if (entry == NULL)
|
|
|
|
{
|
|
|
|
/* No response is variable, but presumably, one is expected. Check
|
|
|
|
* if the socket has been configured for non-blocking operation.
|
|
|
|
*/
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-08 12:30:28 +02:00
|
|
|
if (_SS_ISNONBLOCK(psock->s_flags) || (flags & MSG_DONTWAIT) != 0)
|
|
|
|
{
|
|
|
|
return -EAGAIN;
|
|
|
|
}
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-08 12:30:28 +02:00
|
|
|
/* Wait for the response. This should always succeed. */
|
|
|
|
|
2020-04-13 14:49:52 +02:00
|
|
|
entry = netlink_get_response(psock->s_conn);
|
2020-04-08 12:30:28 +02:00
|
|
|
DEBUGASSERT(entry != NULL);
|
|
|
|
if (entry == NULL)
|
|
|
|
{
|
|
|
|
return -EPIPE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len > entry->msg.nlmsg_len)
|
2019-11-03 20:59:42 +01:00
|
|
|
{
|
2020-04-08 12:30:28 +02:00
|
|
|
len = entry->msg.nlmsg_len;
|
|
|
|
}
|
2019-11-04 02:27:58 +01:00
|
|
|
|
2020-04-08 12:30:28 +02:00
|
|
|
/* Copy the payload to the user buffer */
|
2019-11-03 20:59:42 +01:00
|
|
|
|
2020-04-08 12:30:28 +02:00
|
|
|
memcpy(buf, &entry->msg, len);
|
|
|
|
kmm_free(entry);
|
|
|
|
|
|
|
|
if (from != NULL)
|
|
|
|
{
|
|
|
|
netlink_getpeername(psock, from, fromlen);
|
2019-11-03 20:59:42 +01:00
|
|
|
}
|
|
|
|
|
2020-04-08 12:30:28 +02:00
|
|
|
return len;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: netlink_close
|
|
|
|
*
|
|
|
|
* Description:
|
2019-11-04 21:06:07 +01:00
|
|
|
* Performs the close operation on a NetLink socket instance
|
2018-08-03 21:22:36 +02:00
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* psock Socket instance
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0 on success; -1 on error with errno set appropriately.
|
|
|
|
*
|
|
|
|
* Assumptions:
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int netlink_close(FAR struct socket *psock)
|
|
|
|
{
|
|
|
|
FAR struct netlink_conn_s *conn = psock->s_conn;
|
2019-11-03 20:59:42 +01:00
|
|
|
int ret = OK;
|
2018-08-03 21:22:36 +02:00
|
|
|
|
|
|
|
/* Perform some pre-close operations for the NETLINK socket type. */
|
|
|
|
|
|
|
|
/* Is this the last reference to the connection structure (there
|
|
|
|
* could be more if the socket was dup'ed).
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (conn->crefs <= 1)
|
|
|
|
{
|
|
|
|
/* Free the connection structure */
|
|
|
|
|
|
|
|
conn->crefs = 0;
|
|
|
|
netlink_free(psock->s_conn);
|
|
|
|
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* Return with error code, but free resources. */
|
|
|
|
|
|
|
|
nerr("ERROR: netlink_close failed: %d\n", ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* No.. Just decrement the reference count */
|
|
|
|
|
|
|
|
conn->crefs--;
|
|
|
|
}
|
|
|
|
|
2019-11-03 20:59:42 +01:00
|
|
|
return ret;
|
2018-08-03 21:22:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NET_NETLINK */
|