On Thu, Jan 06, 2011 at 03:32:17PM -0800, Jeremy Evans wrote:
> This patch adds unix datagram socket support to nc(1). It's basically
> the same patch I sent last June (see
> http://marc.info/?l=openbsd-tech&m=127627296925965&w=2), but updated
> for -current.
>
> Tested on amd64. Doesn't appear to cause any regressions to existing
> support, tested with unix stream and IP stream and datagram sockets.
> Looking for OKs.
>
> Jeremy
Hmm, ISTR I meant to look at this ages ago but it got lost, sorry.
So you are overloading -u to mean UDP without -l and datagram with -l?
I guess this makes sense, but we need man page changes?
>
> Index: atomicio.c
> ===================================================================
> RCS file: /cvs/src/usr.bin/nc/atomicio.c,v
> retrieving revision 1.9
> diff -u -p -r1.9 atomicio.c
> --- atomicio.c 7 Sep 2007 14:50:44 -0000 1.9
> +++ atomicio.c 6 Jan 2011 21:48:04 -0000
> @@ -53,7 +53,7 @@ atomicio(ssize_t (*f) (int, void *, size
> case -1:
> if (errno == EINTR)
> continue;
> - if (errno == EAGAIN) {
> + if ((errno == EAGAIN) || (errno == ENOBUFS)) {
> (void)poll(&pfd, 1, -1);
> continue;
> }
Hmm. atomicio is used all over the place, but I guess this is necessary.
> Index: netcat.c
> ===================================================================
> RCS file: /cvs/src/usr.bin/nc/netcat.c,v
> retrieving revision 1.98
> diff -u -p -r1.98 netcat.c
> --- netcat.c 3 Jul 2010 04:44:51 -0000 1.98
> +++ netcat.c 6 Jan 2011 21:48:04 -0000
> @@ -89,6 +89,7 @@ u_int rtableid;
> int timeout = -1;
> int family = AF_UNSPEC;
> char *portlist[PORT_MAX+1];
> +char *unix_dg_tmp_socket;
>
> void atelnet(int, unsigned char *, unsigned int);
> void build_ports(char *);
> @@ -99,6 +100,7 @@ int remote_connect(const char *, const c
> int socks_connect(const char *, const char *, struct addrinfo,
> const char *, const char *, struct addrinfo, int, const char *);
> int udptest(int);
> +int unix_bind(char *);
> int unix_connect(char *);
> int unix_listen(char *);
> void set_common_sockopts(int);
> @@ -241,8 +243,6 @@ main(int argc, char *argv[])
>
> /* Cruft to make sure options are clean, and used properly. */
> if (argv[0] && !argv[1] && family == AF_UNIX) {
> - if (uflag)
> - errx(1, "cannot use -u and -U");
> host = argv[0];
> uport = NULL;
> } else if (argv[0] && !argv[1]) {
> @@ -265,6 +265,18 @@ main(int argc, char *argv[])
> if (!lflag && kflag)
> errx(1, "must use -l with -k");
>
> + /* Get name of temporary socket for unix datagram client */
> + if ((family == AF_UNIX) && uflag && !lflag) {
> + if(pflag) {
> + unix_dg_tmp_socket = pflag;
> + } else {
> + if((unix_dg_tmp_socket = (char *)malloc(19)) == NULL)
> + errx(1, "not enough memory");
Style nit: space between if and (.
> + strlcpy(unix_dg_tmp_socket, "/tmp/nc.XXXXXXXXXX", 19);
> + mktemp(unix_dg_tmp_socket);
What if this fails?
> + }
> + }
> +
> /* Initialize addrinfo structure. */
> if (family != AF_UNIX) {
> memset(&hints, 0, sizeof(struct addrinfo));
> @@ -307,8 +319,12 @@ main(int argc, char *argv[])
> int connfd;
> ret = 0;
>
> - if (family == AF_UNIX)
> - s = unix_listen(host);
> + if (family == AF_UNIX) {
> + if(uflag)
> + s = unix_bind(host);
> + else
> + s = unix_listen(host);
> + }
>
> /* Allow only one connection at a time, but stay alive. */
> for (;;) {
> @@ -337,17 +353,19 @@ main(int argc, char *argv[])
> if (rv < 0)
> err(1, "connect");
>
> - connfd = s;
> + readwrite(s);
> } else {
> len = sizeof(cliaddr);
> connfd = accept(s, (struct sockaddr *)&cliaddr,
> &len);
> + readwrite(connfd);
> + close(connfd);
> }
>
> - readwrite(connfd);
> - close(connfd);
> if (family != AF_UNIX)
> close(s);
> + else if (uflag)
> + connect(s, NULL, 0);
Likewise.
>
> if (!kflag)
> break;
> @@ -361,6 +379,8 @@ main(int argc, char *argv[])
> } else
> ret = 1;
>
> + if(uflag)
> + unlink(unix_dg_tmp_socket);
Shouldn't this have the same condition as above?
if ((family == AF_UNIX) && uflag && !lflag) {
> exit(ret);
>
> } else {
> @@ -421,18 +441,19 @@ main(int argc, char *argv[])
> }
>
> /*
> - * unix_connect()
> - * Returns a socket connected to a local unix socket. Returns -1 on failure.
> + * unix_bind()
> + * Returns a unix socket bound to the given path
> */
> int
> -unix_connect(char *path)
> +unix_bind(char *path)
> {
> struct sockaddr_un sun;
> int s;
>
> - if ((s = socket(AF_UNIX, SOCK_STREAM, 0)) < 0)
> + /* Create unix domain socket. */
> + if ((s = socket(AF_UNIX, uflag ? SOCK_DGRAM : SOCK_STREAM,
> + 0)) < 0)
> return (-1);
> - (void)fcntl(s, F_SETFD, 1);
>
> memset(&sun, 0, sizeof(struct sockaddr_un));
> sun.sun_family = AF_UNIX;
> @@ -443,27 +464,32 @@ unix_connect(char *path)
> errno = ENAMETOOLONG;
> return (-1);
> }
> - if (connect(s, (struct sockaddr *)&sun, SUN_LEN(&sun)) < 0) {
> +
> + if (bind(s, (struct sockaddr *)&sun, SUN_LEN(&sun)) < 0) {
> close(s);
> return (-1);
> }
> return (s);
> -
> }
>
> /*
> - * unix_listen()
> - * Create a unix domain socket, and listen on it.
> + * unix_connect()
> + * Returns a socket connected to a local unix socket. Returns -1 on failure.
> */
> int
> -unix_listen(char *path)
> +unix_connect(char *path)
> {
> struct sockaddr_un sun;
> int s;
>
> - /* Create unix domain socket. */
> - if ((s = socket(AF_UNIX, SOCK_STREAM, 0)) < 0)
> - return (-1);
> + if (uflag) {
> + if((s = unix_bind(unix_dg_tmp_socket)) < 0)
> + return (-1);
> + } else {
> + if ((s = socket(AF_UNIX, SOCK_STREAM, 0)) < 0)
> + return (-1);
> + }
> + (void)fcntl(s, F_SETFD, 1);
>
> memset(&sun, 0, sizeof(struct sockaddr_un));
> sun.sun_family = AF_UNIX;
> @@ -474,11 +500,24 @@ unix_listen(char *path)
> errno = ENAMETOOLONG;
> return (-1);
> }
> -
> - if (bind(s, (struct sockaddr *)&sun, SUN_LEN(&sun)) < 0) {
> + if (connect(s, (struct sockaddr *)&sun, SUN_LEN(&sun)) < 0) {
> close(s);
> return (-1);
> }
> + return (s);
> +
> +}
> +
> +/*
> + * unix_listen()
> + * Create a unix domain socket, and listen on it.
> + */
> +int
> +unix_listen(char *path)
> +{
> + int s;
> + if((s = unix_bind(path)) < 0)
> + return (-1);
>
> if (listen(s, 5) < 0) {
> close(s);