mirror of
https://github.com/jart/cosmopolitan.git
synced 2025-06-26 22:38:30 +00:00
Support non-blocking i/o across platforms
This change introduces new tests for `O_NONBLOCK` and `SOCK_NONBLOCK` to confirm that non-blocking i/o is now working on all supported platforms, including Windows. For example, you can now say on Windows, MacOS, etc.: socket(AF_INET, SOCK_STREAM | SOCK_NONBLOCK, IPPROTO_TCP); To create a non-blocking IPv4 TCP socket. Or you can enable non-blocking i/o on an existing socket / pipe / etc. file descriptor by calling fcntl fcntl(fd, F_SETFL, fcntl(fd, F_GETFL) | O_NONBLOCK); This functionality is polyfilled on older Linux kernels too, e.g. RHEL5. Now that fcntl() support is much better the FIOCLEX / FIONCLEX polyfills for ioctl() have been removed since they're ugly non-POSIX diameond APIs This change fixes a weakness in kprintf() that was causing Windows trace tools to frequently crash.
This commit is contained in:
parent
5c9e03e3e0
commit
1d4eb08fa1
102 changed files with 678 additions and 331 deletions
|
@ -17,58 +17,109 @@
|
|||
│ PERFORMANCE OF THIS SOFTWARE. │
|
||||
╚─────────────────────────────────────────────────────────────────────────────*/
|
||||
#include "libc/calls/internal.h"
|
||||
#include "libc/calls/sig.internal.h"
|
||||
#include "libc/calls/state.internal.h"
|
||||
#include "libc/macros.internal.h"
|
||||
#include "libc/mem/mem.h"
|
||||
#include "libc/nt/winsock.h"
|
||||
#include "libc/sock/internal.h"
|
||||
#include "libc/sock/struct/sockaddr.h"
|
||||
#include "libc/sock/struct/sockaddr.internal.h"
|
||||
#include "libc/sock/struct/sockaddr6.h"
|
||||
#include "libc/sock/syscall_fd.internal.h"
|
||||
#include "libc/sysv/consts/fio.h"
|
||||
#include "libc/str/str.h"
|
||||
#include "libc/sysv/consts/af.h"
|
||||
#include "libc/sysv/consts/o.h"
|
||||
#include "libc/sysv/consts/poll.h"
|
||||
#include "libc/sysv/consts/sock.h"
|
||||
#include "libc/sysv/errfuns.h"
|
||||
|
||||
textwindows int sys_accept_nt(struct Fd *fd, void *addr, uint32_t *addrsize,
|
||||
int flags) {
|
||||
int64_t h;
|
||||
int rc, client, oflags;
|
||||
struct SockFd *sockfd, *sockfd2;
|
||||
sockfd = (struct SockFd *)fd->extra;
|
||||
if (_check_interrupts(true, g_fds.p)) return -1;
|
||||
for (;;) {
|
||||
if (!WSAPoll(&(struct sys_pollfd_nt){fd->handle, POLLIN}, 1,
|
||||
__SIG_POLLING_INTERVAL_MS)) {
|
||||
if (_check_interrupts(true, g_fds.p)) {
|
||||
return eintr();
|
||||
}
|
||||
continue;
|
||||
union AcceptExAddr {
|
||||
union sockaddr_storage_linux addr;
|
||||
char buf[sizeof(struct sockaddr_storage) + 16];
|
||||
};
|
||||
|
||||
struct AcceptExBuffer {
|
||||
union AcceptExAddr local;
|
||||
union AcceptExAddr remote;
|
||||
};
|
||||
|
||||
static void CopyLinuxSockAddr(const union sockaddr_storage_linux *addr,
|
||||
void *out_addr, uint32_t *inout_addrsize) {
|
||||
uint32_t insize, outsize;
|
||||
if (out_addr && inout_addrsize) {
|
||||
if (addr->sa.sa_family == AF_INET) {
|
||||
outsize = sizeof(struct sockaddr_in);
|
||||
} else if (addr->sa.sa_family == AF_INET6) {
|
||||
outsize = sizeof(struct sockaddr_in6);
|
||||
} else if (addr->sa.sa_family == AF_UNIX) {
|
||||
outsize = sizeof(addr->sun.sun_family) +
|
||||
strnlen(addr->sun.sun_path, sizeof(addr->sun.sun_path)) + 1;
|
||||
} else {
|
||||
outsize = sizeof(union sockaddr_storage_linux);
|
||||
}
|
||||
if ((h = WSAAccept(fd->handle, addr, (int32_t *)addrsize, 0, 0)) != -1) {
|
||||
oflags = 0;
|
||||
if (flags & SOCK_CLOEXEC) oflags |= O_CLOEXEC;
|
||||
if (flags & SOCK_NONBLOCK) oflags |= O_NONBLOCK;
|
||||
if ((!(flags & SOCK_NONBLOCK) ||
|
||||
__sys_ioctlsocket_nt(h, FIONBIO, (uint32_t[]){1}) != -1) &&
|
||||
(sockfd2 = calloc(1, sizeof(struct SockFd)))) {
|
||||
__fds_lock();
|
||||
if ((client = __reservefd_unlocked(-1)) != -1) {
|
||||
sockfd2->family = sockfd->family;
|
||||
sockfd2->type = sockfd->type;
|
||||
sockfd2->protocol = sockfd->protocol;
|
||||
g_fds.p[client].kind = kFdSocket;
|
||||
g_fds.p[client].flags = oflags;
|
||||
g_fds.p[client].mode = 0140666;
|
||||
g_fds.p[client].handle = h;
|
||||
g_fds.p[client].extra = (uintptr_t)sockfd2;
|
||||
__fds_unlock();
|
||||
return client;
|
||||
}
|
||||
__fds_unlock();
|
||||
free(sockfd2);
|
||||
}
|
||||
__sys_closesocket_nt(h);
|
||||
}
|
||||
return __winsockerr();
|
||||
insize = *inout_addrsize;
|
||||
if (insize) bzero(out_addr, insize);
|
||||
outsize = MIN(insize, outsize);
|
||||
if (outsize) memcpy(out_addr, addr, outsize);
|
||||
*inout_addrsize = outsize;
|
||||
}
|
||||
}
|
||||
|
||||
textwindows int sys_accept_nt(struct Fd *fd, void *out_addr,
|
||||
uint32_t *inout_addrsize, int accept4_flags) {
|
||||
int64_t handle;
|
||||
int rc, client, oflags;
|
||||
uint32_t bytes_received;
|
||||
uint32_t completion_flags;
|
||||
struct AcceptExBuffer buffer;
|
||||
struct SockFd *sockfd, *sockfd2;
|
||||
|
||||
// deliver interrupt instead if any are pending
|
||||
if (_check_interrupts(true, g_fds.p)) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
// creates resources for child socket
|
||||
// inherit the listener configuration
|
||||
sockfd = (struct SockFd *)fd->extra;
|
||||
if (!(sockfd2 = malloc(sizeof(struct SockFd)))) {
|
||||
return -1;
|
||||
}
|
||||
memcpy(sockfd2, sockfd, sizeof(*sockfd));
|
||||
if ((handle = WSASocket(sockfd2->family, sockfd2->type, sockfd2->protocol,
|
||||
NULL, 0, kNtWsaFlagOverlapped)) == -1) {
|
||||
free(sockfd2);
|
||||
return __winsockerr();
|
||||
}
|
||||
|
||||
// accept network connection
|
||||
struct NtOverlapped overlapped = {.hEvent = WSACreateEvent()};
|
||||
if (!AcceptEx(fd->handle, handle, &buffer, 0, sizeof(buffer.local),
|
||||
sizeof(buffer.remote), &bytes_received, &overlapped)) {
|
||||
sockfd = (struct SockFd *)fd->extra;
|
||||
if (__wsablock(fd, &overlapped, &completion_flags, true,
|
||||
sockfd->rcvtimeo) == -1) {
|
||||
WSACloseEvent(overlapped.hEvent);
|
||||
__sys_closesocket_nt(handle);
|
||||
free(sockfd2);
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
WSACloseEvent(overlapped.hEvent);
|
||||
|
||||
// create file descriptor for new socket
|
||||
// don't inherit the file open mode bits
|
||||
oflags = 0;
|
||||
if (accept4_flags & SOCK_CLOEXEC) oflags |= O_CLOEXEC;
|
||||
if (accept4_flags & SOCK_NONBLOCK) oflags |= O_NONBLOCK;
|
||||
__fds_lock();
|
||||
client = __reservefd_unlocked(-1);
|
||||
g_fds.p[client].kind = kFdSocket;
|
||||
g_fds.p[client].flags = oflags;
|
||||
g_fds.p[client].mode = 0140666;
|
||||
g_fds.p[client].handle = handle;
|
||||
g_fds.p[client].extra = (uintptr_t)sockfd2;
|
||||
__fds_unlock();
|
||||
|
||||
// handoff information to caller;
|
||||
CopyLinuxSockAddr(&buffer.remote.addr, out_addr, inout_addrsize);
|
||||
return client;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue