4 * tuntap-socket-rawlinux create [<ifname>] => <sockid>
5 * tuntap-socket-rawlinux ifname <sockid> => <ifname>
6 * tuntap-socket-rawlinux close <sockid>
7 * tuntap-socket-rawlinux receive <sockid> <data>
8 * tuntap-socket-rawlinux on-transmit <sockid> [<script>]
9 * calls, effectively, eval <script> [list <data> <socket>]
10 * if script not supplied, cancel
16 typedef struct TunSocket {
17 int ix, fd, script_llength;
21 unsigned char *msg_buf;
25 IdDataTable tuntap_socks= { "tuntap" };
27 static int sockfail(Tcl_Interp *ip, int fd, const char *m) {
31 return posixerr(ip,e,m);
34 int do_tuntap_socket_create_ptp(ClientData cd, Tcl_Interp *ip,
35 SockAddr_Value local, SockAddr_Value peer,
36 long mtu, const char *ifname,
38 int fd, local_al, peer_al, r;
41 const struct sockaddr *local_sa, *peer_sa;
43 local_sa= sockaddr_addr(&local);
44 local_al= sockaddr_len(&local);
46 peer_sa= sockaddr_addr(&peer);
47 peer_al= sockaddr_len(&peer);
49 if (local_sa != AF_INET || local_al != sizeof(struct in_addr) ||
50 peer_sa != AF_INET || peer_al != sizeof(struct in_addr))
51 return staticerr(ip,"tuntap not IPv4");
53 memset(&ifr,0,sizeof(ifr));
54 ifr.ifr_flags= IFF_TUN | IFF_NO_PI;
57 if (strlen(ifname) > IFNAMSIZ-1)
58 return staticerr(ip,"tun interface name too long");
59 strcpy(ifr.ifr_name, ifname);
62 fd= open("/dev/net/tun", O_RDWR);
63 if (fd<0) return posixerr(ip,errno,"open /dev/net/tun");
65 r= ioctl(fd, TUNSETIFF, (void*)&ifr);
66 if (r) return newfdposixerr(ip,fd,"ioctl TUNSETIFF");
68 sock= TALLOC(sizeof(TuntapSocket));
74 sock->ifname= TALLOC(strlen(ifr.ifr_name)+1);
75 strcpy(sock->ifname, ifr.ifr_name);
81 int do_tuntap_socket_receive(ClientData cd, Tcl_Interp *ip,
82 TuntapSocket *sock, HBytes_Value data,
83 SockAddr_Value remote) {
87 hbytes_data(&data), l=hbytes_len(&data));
88 if (r==-1) return posixerr(ip,errno,"write tuntap");
89 else if (r!=l) return staticerr(ip,"write tuntap gave wrong answer",0);
93 static void cancel(TuntapSocket *sock) {
95 Tcl_DeleteFileHandler(sock->fd);
96 Tcl_DecrRefCount(sock->script);
101 static void recv_call(ClientData sock_cd, int mask) {
102 TuntapSocket *sock= (void*)sock_cd;
103 Tcl_Interp *ip= sock->ip;
105 HBytes_Value message_val;
106 SockAddr_Value peer_val;
107 Tcl_Obj *args[3], *invoke;
112 sz= read(sock->fd, sock->msg_buf, sock->mtu);
114 if (errno == EAGAIN || errno == EWOULDBLOCK) rc=0;
115 else rc= posixerr(ip,errno,"read tuntap");
119 assert(sz <= sock->mtu);
121 hbytes_array(&message_val, sock->msg_buf, sz);
122 args[0]= ret_hb(ip, message_val); hbytes_empty(&message_val);
123 args[1]= ret_iddata(ip, sock, &tuntap_socks);
124 script_invoke(sock->script, args, 0);
127 for (i=0; i<2; i++) Tcl_IncrRefCount(args[i]);
131 sockaddr_clear(&peer_val);
132 invoke=0; for (i=0; i<3; i++) args[i]=0;
137 mh.msg_controllen= 0;
140 mh.msg_name= sock->addr_buf;
141 mh.msg_namelen= sock->addr_buflen;
143 iov.iov_base= sock->msg_buf;
144 iov.iov_len= sock->msg_buflen;
146 sz= recvmsg(sock->fd, &mh, peek);
147 if (sz==-1) { rc=0; goto x_rc; }
149 assert(mh.msg_namelen < sock->addr_buflen);
151 if (!(mh.msg_flags & MSG_TRUNC)) {
157 TFREE(sock->msg_buf);
158 sock->msg_buflen *= 2;
159 sock->msg_buflen += 100;
160 sock->msg_buf= TALLOC(sock->msg_buflen);
163 hbytes_array(&message_val, iov.iov_base, sz);
164 sockaddr_create(&peer_val, mh.msg_name, mh.msg_namelen);
166 args[0]= ret_hb(ip, message_val); hbytes_empty(&message_val);
167 args[1]= ret_sockaddr(ip, peer_val); sockaddr_clear(&peer_val);
168 args[2]= ret_sockid(ip, sock);
169 for (i=0; i<3; i++) Tcl_IncrRefCount(args[i]);
171 invoke= Tcl_DuplicateObj(sock->script);
172 Tcl_IncrRefCount(invoke);
174 rc= Tcl_ListObjReplace(ip,invoke,sock->script_llength,0,3,args);
175 for (i=0; i<3; i++) { Tcl_DecrRefCount(args[i]); args[i]= 0; }
178 rc= Tcl_EvalObjEx(ip,invoke,TCL_EVAL_GLOBAL|TCL_EVAL_DIRECT);
181 if (invoke) Tcl_DecrRefCount(invoke);
184 Tcl_BackgroundError(ip);
187 int do_tuntap_socket_on_receive(ClientData cd, Tcl_Interp *ip,
188 TuntapSocket *sock, Tcl_Obj *script) {
192 return staticerr(ip,"tuntap mtu >2^16");
195 rc= Tcl_ListObjLength(ip, script, &sock->script_llength);
201 Tcl_IncrRefCount(script);
202 sock->script= script;
205 Tcl_CreateFileHandler(sock->fd, TCL_READABLE, recv_call, sock);
209 int do_tuntap_socket_close(ClientData cd, Tcl_Interp *ip, TuntapSocket *sock) {
212 close(sock->fd); /* nothing useful to be done with errors */
214 TFREE(sock->addr_buf);
215 TFREE(sock->msg_buf);
223 int pat_sockid(Tcl_Interp *ip, Tcl_Obj *o, TuntapSocket **val) {
227 rc= Tcl_ConvertToType(ip,o,&tuntapsockid_type);
230 sockix= o->internalRep.longValue;
231 if (sockix >= n_socks || !(sock= socks[sockix]))
232 return staticerr(ip,"tuntap socket not open",0);
234 assert(socks[sockix]->ix == sockix);
240 Tcl_Obj *ret_sockid(Tcl_Interp *ip, TuntapSocket *val) {
244 Tcl_InvalidateStringRep(o);
245 o->internalRep.longValue= val->ix;
246 o->typePtr= &tuntapsockid_type;
250 static void sockid_t_free(Tcl_Obj *o) { }
252 static void sockid_t_dup(Tcl_Obj *src, Tcl_Obj *dup) {
253 dup->internalRep= src->internalRep;
254 dup->typePtr= &tuntapsockid_type;
257 static void sockid_t_ustr(Tcl_Obj *o) {
260 snprintf(buf,sizeof(buf), "%d", (int)o->internalRep.longValue);
261 obj_updatestr_vstringls(o,
267 static int sockid_t_sfa(Tcl_Interp *ip, Tcl_Obj *o) {
271 str= Tcl_GetStringFromObj(o,0);
272 if (memcmp(str,"tuntapsock",9)) return staticerr(ip,"bad tuntap socket id",0);
273 errno=0; ul=strtoul(str+9,&ep,10);
274 if (errno || *ep) return staticerr(ip,"bad tuntap socket id number",0);
275 if (ul > INT_MAX) return staticerr(ip,"out of range tuntap socket id",0);
278 o->internalRep.longValue= ul;
279 o->typePtr= &tuntapsockid_type;
283 Tcl_ObjType tuntapsockid_type = {
285 sockid_t_free, sockid_t_dup, sockid_t_ustr, sockid_t_sfa