mirror of https://github.com/xemu-project/xemu.git
slirp updates
Andrew Oates (1): slirp: fix ICMP handling on macOS hosts Gavin Grant (1): slirp: Propagate host TCP RST packet to the guest after socket disconnected Peter Maydell (1): slirp: document mbuf pointers and sizes -----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEEM/p7ZGGVAfjOnI+X4/ZanpVg20wFAlu6Sp0ACgkQ4/ZanpVg 20y2UhAA25uzKP60Ihx7PPemTK1GEGgCGGFjjkBxP4qnkOLaJlHyH/tTHKGzI3ty BCvnuiBRgogrQd+kiqNU5NI9kxAWOBSE+PFAxrZk95mWgILjWxlq3tyyWUNMTYuS hcYsueyLza81L8vLPeOcoTWhSdkmOo/V5JERSjRPYWcS+13YHuFQwWZPGUglYt9/ WMsJzew6JSLx7d2D6TxhVuhQLkqjNtJymkeOJFPW4sh90opLUWrupAdtgjUtV2QB Yox77M6cLG4wIphroyIfBkb0nSx3ceECDm39Jthvw/HH1w8HbFOLvIu+G1ibmQVN AUNnFxIsSpasEmibOz66E7syj3vfKP1jpkBIt9yrQGUyWflPekZP8aD/0UsAoflX 3DcgVsPfADHDAW3TSxUrtW2i3Qiieu/9ecaxetygS01Y3V9B0A5wZODYSsdExK7w mJUFyea3idTvstHTN9j1sPCwEteylrGXGlUGvIQUW1gYtKeIqYqVPIq5fMr2xLqa rHGfavXm4wFDBLigyVYnZZtv20rkxSkAlgjeTPR9b2ZycidxDjKNnPZ01uyW4zfQ szJ8vKhO0hTtVcJSU0ew8LRW5sJItxAnK42ebHjRAn0MpcJRLsXN+V86Kjg5onOg Bh78/RXn6YvJ/+2VC3onpwFTmMjrlxZ/euUDZBSPgVQNm8XsBjI= =PzX7 -----END PGP SIGNATURE----- Merge remote-tracking branch 'remotes/thibault/tags/samuel-thibault' into staging slirp updates Andrew Oates (1): slirp: fix ICMP handling on macOS hosts Gavin Grant (1): slirp: Propagate host TCP RST packet to the guest after socket disconnected Peter Maydell (1): slirp: document mbuf pointers and sizes # gpg: Signature made Sun 07 Oct 2018 19:04:13 BST # gpg: using RSA key E3F65A9E9560DB4C # gpg: Good signature from "Samuel Thibault <samuel.thibault@aquilenet.fr>" # gpg: aka "Samuel Thibault <sthibault@debian.org>" # gpg: aka "Samuel Thibault <samuel.thibault@gnu.org>" # gpg: aka "Samuel Thibault <samuel.thibault@inria.fr>" # gpg: aka "Samuel Thibault <samuel.thibault@labri.fr>" # gpg: aka "Samuel Thibault <samuel.thibault@ens-lyon.org>" # gpg: aka "Samuel Thibault <samuel.thibault@u-bordeaux.fr>" # gpg: WARNING: This key is not certified with sufficiently trusted signatures! # gpg: It is not certain that the signature belongs to the owner. # Primary key fingerprint: 900C B024 B679 31D4 0F82 304B D017 8C76 7D06 9EE6 # Subkey fingerprint: 33FA 7B64 6195 01F8 CE9C 8F97 E3F6 5A9E 9560 DB4C * remotes/thibault/tags/samuel-thibault: slirp: Propagate host TCP RST packet to the guest after socket disconnected slirp: fix ICMP handling on macOS hosts slirp: document mbuf pointers and sizes Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
This commit is contained in:
commit
bb94c11985
|
@ -420,7 +420,32 @@ void icmp_receive(struct socket *so)
|
||||||
icp = mtod(m, struct icmp *);
|
icp = mtod(m, struct icmp *);
|
||||||
|
|
||||||
id = icp->icmp_id;
|
id = icp->icmp_id;
|
||||||
len = qemu_recv(so->s, icp, m->m_len, 0);
|
len = qemu_recv(so->s, icp, M_ROOM(m), 0);
|
||||||
|
/*
|
||||||
|
* The behavior of reading SOCK_DGRAM+IPPROTO_ICMP sockets is inconsistent
|
||||||
|
* between host OSes. On Linux, only the ICMP header and payload is
|
||||||
|
* included. On macOS/Darwin, the socket acts like a raw socket and
|
||||||
|
* includes the IP header as well. On other BSDs, SOCK_DGRAM+IPPROTO_ICMP
|
||||||
|
* sockets aren't supported at all, so we treat them like raw sockets. It
|
||||||
|
* isn't possible to detect this difference at runtime, so we must use an
|
||||||
|
* #ifdef to determine if we need to remove the IP header.
|
||||||
|
*/
|
||||||
|
#ifdef CONFIG_BSD
|
||||||
|
if (len >= sizeof(struct ip)) {
|
||||||
|
struct ip *inner_ip = mtod(m, struct ip *);
|
||||||
|
int inner_hlen = inner_ip->ip_hl << 2;
|
||||||
|
if (inner_hlen > len) {
|
||||||
|
len = -1;
|
||||||
|
errno = -EINVAL;
|
||||||
|
} else {
|
||||||
|
len -= inner_hlen;
|
||||||
|
memmove(icp, (unsigned char *)icp + inner_hlen, len);
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
len = -1;
|
||||||
|
errno = -EINVAL;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
icp->icmp_id = id;
|
icp->icmp_id = id;
|
||||||
|
|
||||||
m->m_data -= hlen;
|
m->m_data -= hlen;
|
||||||
|
|
14
slirp/mbuf.c
14
slirp/mbuf.c
|
@ -151,7 +151,7 @@ m_cat(struct mbuf *m, struct mbuf *n)
|
||||||
void
|
void
|
||||||
m_inc(struct mbuf *m, int size)
|
m_inc(struct mbuf *m, int size)
|
||||||
{
|
{
|
||||||
int datasize;
|
int gapsize;
|
||||||
|
|
||||||
/* some compilers throw up on gotos. This one we can fake. */
|
/* some compilers throw up on gotos. This one we can fake. */
|
||||||
if (M_ROOM(m) > size) {
|
if (M_ROOM(m) > size) {
|
||||||
|
@ -159,17 +159,17 @@ m_inc(struct mbuf *m, int size)
|
||||||
}
|
}
|
||||||
|
|
||||||
if (m->m_flags & M_EXT) {
|
if (m->m_flags & M_EXT) {
|
||||||
datasize = m->m_data - m->m_ext;
|
gapsize = m->m_data - m->m_ext;
|
||||||
m->m_ext = g_realloc(m->m_ext, size + datasize);
|
m->m_ext = g_realloc(m->m_ext, size + gapsize);
|
||||||
} else {
|
} else {
|
||||||
datasize = m->m_data - m->m_dat;
|
gapsize = m->m_data - m->m_dat;
|
||||||
m->m_ext = g_malloc(size + datasize);
|
m->m_ext = g_malloc(size + gapsize);
|
||||||
memcpy(m->m_ext, m->m_dat, m->m_size);
|
memcpy(m->m_ext, m->m_dat, m->m_size);
|
||||||
m->m_flags |= M_EXT;
|
m->m_flags |= M_EXT;
|
||||||
}
|
}
|
||||||
|
|
||||||
m->m_data = m->m_ext + datasize;
|
m->m_data = m->m_ext + gapsize;
|
||||||
m->m_size = size + datasize;
|
m->m_size = size + gapsize;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
13
slirp/mbuf.h
13
slirp/mbuf.h
|
@ -47,6 +47,19 @@
|
||||||
* free the m_ext. This is inefficient memory-wise, but who cares.
|
* free the m_ext. This is inefficient memory-wise, but who cares.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* mbufs allow to have a gap between the start of the allocated buffer (m_ext if
|
||||||
|
* M_EXT is set, m_dat otherwise) and the in-use data:
|
||||||
|
*
|
||||||
|
* |--gapsize----->|---m_len------->
|
||||||
|
* |----------m_size------------------------------>
|
||||||
|
* |----M_ROOM-------------------->
|
||||||
|
* |-M_FREEROOM-->
|
||||||
|
*
|
||||||
|
* ^ ^ ^
|
||||||
|
* m_dat/m_ext m_data end of buffer
|
||||||
|
*/
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* How much room is in the mbuf, from m_data to the end of the mbuf
|
* How much room is in the mbuf, from m_data to the end of the mbuf
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -204,12 +204,19 @@ soread(struct socket *so)
|
||||||
return 0;
|
return 0;
|
||||||
else {
|
else {
|
||||||
int err;
|
int err;
|
||||||
socklen_t slen = sizeof err;
|
socklen_t elen = sizeof err;
|
||||||
|
struct sockaddr_storage addr;
|
||||||
|
struct sockaddr *paddr = (struct sockaddr *) &addr;
|
||||||
|
socklen_t alen = sizeof addr;
|
||||||
|
|
||||||
err = errno;
|
err = errno;
|
||||||
if (nn == 0) {
|
if (nn == 0) {
|
||||||
|
if (getpeername(so->s, paddr, &alen) < 0) {
|
||||||
|
err = errno;
|
||||||
|
} else {
|
||||||
getsockopt(so->s, SOL_SOCKET, SO_ERROR,
|
getsockopt(so->s, SOL_SOCKET, SO_ERROR,
|
||||||
&err, &slen);
|
&err, &elen);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
DEBUG_MISC((dfd, " --- soread() disconnected, nn = %d, errno = %d-%s\n", nn, errno,strerror(errno)));
|
DEBUG_MISC((dfd, " --- soread() disconnected, nn = %d, errno = %d-%s\n", nn, errno,strerror(errno)));
|
||||||
|
|
Loading…
Reference in New Issue