The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
fd.c
Go to the documentation of this file.
1/*
2 * This program is is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or (at
5 * your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 80432c1cd278445e3e9d51fe59134b9f249cf427 $
19 * @file lib/bio/fd.c
20 * @brief BIO abstractions for file descriptors
21 *
22 * @copyright 2024 Network RADIUS SAS (legal@networkradius.com)
23 */
24
25#include <freeradius-devel/bio/fd_priv.h>
26#include <freeradius-devel/bio/null.h>
27
28/*
29 * More portability idiocy
30 * Mac OSX Lion doesn't define SOL_IP. But IPPROTO_IP works.
31 */
32#ifndef SOL_IP
33# define SOL_IP IPPROTO_IP
34#endif
35
36/*
37 * glibc 2.4 and uClibc 0.9.29 introduce IPV6_RECVPKTINFO etc. and
38 * change IPV6_PKTINFO This is only supported in Linux kernel >=
39 * 2.6.14
40 *
41 * This is only an approximation because the kernel version that libc
42 * was compiled against could be older or newer than the one being
43 * run. But this should not be a problem -- we just keep using the
44 * old kernel interface.
45 */
46#ifdef __linux__
47# ifdef IPV6_RECVPKTINFO
48# include <linux/version.h>
49# if LINUX_VERSION_CODE < KERNEL_VERSION(2,6,14)
50# ifdef IPV6_2292PKTINFO
51# undef IPV6_RECVPKTINFO
52# undef IPV6_PKTINFO
53# define IPV6_RECVPKTINFO IPV6_2292PKTINFO
54# define IPV6_PKTINFO IPV6_2292PKTINFO
55# endif
56# endif
57/* Fall back to the legacy socket option if IPV6_RECVPKTINFO isn't defined */
58# elif defined(IPV6_2292PKTINFO)
59# define IPV6_RECVPKTINFO IPV6_2292PKTINFO
60# endif
61#else
62
63/*
64 * For everything that's not Linux we assume RFC 3542 compliance
65 * - setsockopt() takes IPV6_RECVPKTINFO
66 * - cmsg_type is IPV6_PKTINFO (in sendmsg, recvmsg)
67 *
68 * If we don't have IPV6_RECVPKTINFO defined but do have IPV6_PKTINFO
69 * defined, chances are the API is RFC2292 compliant and we need to use
70 * IPV6_PKTINFO for both.
71 */
72# if !defined(IPV6_RECVPKTINFO) && defined(IPV6_PKTINFO)
73# define IPV6_RECVPKTINFO IPV6_PKTINFO
74
75/*
76 * Ensure IPV6_RECVPKTINFO is not defined somehow if we have we
77 * don't have IPV6_PKTINFO.
78 */
79# elif !defined(IPV6_PKTINFO)
80# undef IPV6_RECVPKTINFO
81# endif
82#endif
83
84#define ADDR_INIT do { \
85 addr->when = fr_time(); \
86 addr->socket.type = my->info.socket.type; \
87 addr->socket.fd = -1; \
88 addr->socket.inet.ifindex = my->info.socket.inet.ifindex; \
89 } while (0)
90
91/*
92 * Close the descriptor and free the bio.
93 */
95{
96 /*
97 * The upstream bio must have unlinked it from the chain before calling talloc_free() on this
98 * bio.
99 */
100 fr_assert(!fr_bio_prev(&my->bio));
101 fr_assert(!fr_bio_next(&my->bio));
102
103 if (my->connect.ev) {
104 talloc_const_free(my->connect.ev);
105 my->connect.ev = NULL;
106 }
107
108 if (my->connect.el) {
109 (void) fr_event_fd_delete(my->connect.el, my->info.socket.fd, FR_EVENT_FILTER_IO);
110 my->connect.el = NULL;
111 }
112
113 if (my->cb.shutdown) my->cb.shutdown(&my->bio);
114
115 return fr_bio_fd_close(&my->bio);
116}
117
118static int fr_bio_fd_eof(fr_bio_t *bio)
119{
120 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
121
122 my->info.eof = true;
123
124 bio->read = fr_bio_null_read;
126
127 /*
128 * Nothing more for us to do, tell fr_bio_eof() that it can continue with poking other BIOs.
129 */
130 return 1;
131}
132
134{
135 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
136
137 my->info.write_blocked = false;
138 return 1;
139}
140
141/** Stream read.
142 *
143 * Stream sockets return 0 at EOF. However, we want to distinguish that from the case of datagram
144 * sockets, which return 0 when there's no data. So we return 0 to the caller for "no data", but also
145 * call the EOF function to tell all of the related BIOs that we're at EOF.
146 */
147static ssize_t fr_bio_fd_read_stream(fr_bio_t *bio, UNUSED void *packet_ctx, void *buffer, size_t size)
148{
149 int tries = 0;
150 ssize_t rcode;
151 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
152
153retry:
154 rcode = read(my->info.socket.fd, buffer, size);
155 if (rcode == 0) {
156 fr_bio_eof(bio);
157 return 0;
158 }
159
160#include "fd_read.h"
161
162 return fr_bio_error(IO);
163}
164
165/** Connected datagram read.
166 *
167 * The difference between this and stream protocols is that for datagrams. a read of zero means "no packets",
168 * where a read of zero on a steam socket means "EOF".
169 *
170 * Connected sockets do _not_ update per-packet contexts.
171 *
172 * Note that for UDP, connect() only affects the sending path. It
173 * means that the application can call send() without specifying IP
174 * addresses. But when the application calls recv(), the OS will
175 * deliver packets which have been sent from _any_ port, even ones
176 * which don't match the address given in connect().
177 *
178 * @todo - arguably this means that for connected UDP sockets, we
179 * should _only_ use this function when we can't use the udpfromto
180 * functionality. And then if that's available, connected sockets
181 * should have a special read function which discards packets which
182 * are not from the connected source IP/port.
183 */
184static ssize_t fr_bio_fd_read_connected_datagram(fr_bio_t *bio, UNUSED void *packet_ctx, void *buffer, size_t size)
185{
186 int tries = 0;
187 ssize_t rcode;
188 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
189
190retry:
191 rcode = read(my->info.socket.fd, buffer, size);
192 if (rcode == 0) return rcode;
193
194#include "fd_read.h"
195
196 return fr_bio_error(IO);
197}
198
199/** Read from a UDP socket where we know our IP
200 */
201static ssize_t fr_bio_fd_recvfrom(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
202{
203 int tries = 0;
204 ssize_t rcode;
205 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
206 socklen_t salen;
207 struct sockaddr_storage sockaddr;
208
209retry:
210 salen = sizeof(sockaddr);
211
212 rcode = recvfrom(my->info.socket.fd, buffer, size, 0, (struct sockaddr *) &sockaddr, &salen);
213 if (rcode > 0) {
215
216 ADDR_INIT;
217
218 addr->socket.inet.dst_ipaddr = my->info.socket.inet.src_ipaddr;
219 addr->socket.inet.dst_port = my->info.socket.inet.src_port;
220
221 (void) fr_ipaddr_from_sockaddr(&addr->socket.inet.src_ipaddr, &addr->socket.inet.src_port,
222 &sockaddr, salen);
223 }
224
225 if (rcode == 0) return rcode;
226
227#include "fd_read.h"
228
229 return fr_bio_error(IO);
230}
231
232/** Write to fd.
233 *
234 * This function is used for connected sockets, where we ignore the packet_ctx.
235 */
236static ssize_t fr_bio_fd_write(fr_bio_t *bio, UNUSED void *packet_ctx, const void *buffer, size_t size)
237{
238 int tries = 0;
239 ssize_t rcode;
240 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
241
242 /*
243 * FD bios do nothing on flush.
244 */
245 if (!buffer) return 0;
246
247retry:
248 /*
249 * We could call send() instead of write()! Posix says:
250 *
251 * "A write was attempted on a socket that is shut down for writing, or is no longer
252 * connected. In the latter case, if the socket is of type SOCK_STREAM, a SIGPIPE signal shall
253 * also be sent to the thread."
254 *
255 * We can override this behavior by calling send(), and passing the special flag which says
256 * "don't do that!". The system call will then return EPIPE, which indicates that the socket is
257 * no longer usable.
258 *
259 * However, we also set the SO_NOSIGPIPE socket option, which means that we can just call write()
260 * here.
261 */
262 rcode = write(my->info.socket.fd, buffer, size);
263
264#include "fd_write.h"
265
266 return fr_bio_error(IO);
267}
268
269/** Write to a UDP socket where we know our IP
270 *
271 */
272static ssize_t fr_bio_fd_sendto(fr_bio_t *bio, void *packet_ctx, const void *buffer, size_t size)
273{
274 int tries = 0;
275 ssize_t rcode;
276 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
278 socklen_t salen;
279 struct sockaddr_storage sockaddr;
280
281 /*
282 * FD bios do nothing on flush.
283 */
284 if (!buffer) return 0;
285
286 // get destination IP
287 (void) fr_ipaddr_to_sockaddr(&sockaddr, &salen, &addr->socket.inet.dst_ipaddr, addr->socket.inet.dst_port);
288
289retry:
290 rcode = sendto(my->info.socket.fd, buffer, size, 0, (struct sockaddr *) &sockaddr, salen);
291
292#include "fd_write.h"
293
294 return fr_bio_error(IO);
295}
296
297
298#if defined(IP_PKTINFO) || defined(IP_RECVDSTADDR) || defined(IPV6_PKTINFO)
299static ssize_t fd_fd_recvfromto_common(fr_bio_fd_t *my, void *packet_ctx, void *buffer, size_t size)
300{
301 int tries = 0;
302 ssize_t rcode;
303 struct sockaddr_storage from;
305
306#ifdef STATIC_ANALYZER
307 from.ss_family = AF_UNSPEC;
308#endif
309
310 memset(&my->cbuf, 0, sizeof(my->cbuf));
311 memset(&my->msgh, 0, sizeof(struct msghdr));
312
313 my->iov = (struct iovec) {
314 .iov_base = buffer,
315 .iov_len = size,
316 };
317
318 my->msgh = (struct msghdr) {
319 .msg_control = my->cbuf,
320 .msg_controllen = sizeof(my->cbuf),
321 .msg_name = &from,
322 .msg_namelen = sizeof(from),
323 .msg_iov = &my->iov,
324 .msg_iovlen = 1,
325 .msg_flags = 0,
326 };
327
328retry:
329 rcode = recvmsg(my->info.socket.fd, &my->msgh, 0);
330 if (rcode > 0) {
331 ADDR_INIT;
332
333 (void) fr_ipaddr_from_sockaddr(&addr->socket.inet.src_ipaddr, &addr->socket.inet.src_port,
334 &from, my->msgh.msg_namelen);
335 }
336
337 if (rcode == 0) return rcode;
338
339#include "fd_read.h"
340
341 return fr_bio_error(IO);
342}
343#endif
344
345#if defined(IP_PKTINFO) || defined(IP_RECVDSTADDR)
346
347/** Read from a UDP socket where we can change our IP, IPv4 version.
348 */
349static ssize_t fr_bio_fd_recvfromto4(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
350{
351 ssize_t rcode;
352 struct cmsghdr *cmsg;
353 fr_time_t when = fr_time_wrap(0);
354 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
356
357 rcode = fd_fd_recvfromto_common(my, packet_ctx, buffer, size);
358 if (rcode <= 0) return rcode;
359
360DIAG_OFF(sign-compare)
361 /* Process auxiliary received data in msgh */
362 for (cmsg = CMSG_FIRSTHDR(&my->msgh);
363 cmsg != NULL;
364 cmsg = CMSG_NXTHDR(&my->msgh, cmsg)) {
365DIAG_ON(sign-compare)
366
367#ifdef IP_PKTINFO
368 if ((cmsg->cmsg_level == SOL_IP) &&
369 (cmsg->cmsg_type == IP_PKTINFO)) {
370 struct in_pktinfo *i = (struct in_pktinfo *) CMSG_DATA(cmsg);
371 struct sockaddr_in to;
372
373 to.sin_addr = i->ipi_addr;
374
375 (void) fr_ipaddr_from_sockaddr(&addr->socket.inet.dst_ipaddr, &addr->socket.inet.dst_port,
376 (struct sockaddr_storage *) &to, sizeof(struct sockaddr_in));
377 addr->socket.inet.ifindex = i->ipi_ifindex;
378 break;
379 }
380#endif
381
382#ifdef IP_RECVDSTADDR
383 if ((cmsg->cmsg_level == IPPROTO_IP) &&
384 (cmsg->cmsg_type == IP_RECVDSTADDR)) {
385 struct in_addr *i = (struct in_addr *) CMSG_DATA(cmsg);
386 struct sockaddr_in to;
387
388 to.sin_addr = *i;
389 (void) fr_ipaddr_from_sockaddr(&addr->socket.inet.dst_ipaddr, &addr->socket.inet.dst_port,
390 (struct sockaddr_storage *) &to, sizeof(struct sockaddr_in));
391 break;
392 }
393#endif
394
395#ifdef SO_TIMESTAMPNS
396 if ((cmsg->cmsg_level == SOL_IP) && (cmsg->cmsg_type == SO_TIMESTAMPNS)) {
397 when = fr_time_from_timespec((struct timespec *)CMSG_DATA(cmsg));
398 }
399
400#elif defined(SO_TIMESTAMP)
401 if ((cmsg->cmsg_level == SOL_IP) && (cmsg->cmsg_type == SO_TIMESTAMP)) {
402 when = fr_time_from_timeval((struct timeval *)CMSG_DATA(cmsg));
403 }
404#endif
405 }
406
407 if fr_time_eq(when, fr_time_wrap(0)) when = fr_time();
408
409 addr->when = when;
410
411 return rcode;
412}
413
414/** Send to UDP socket where we can change our IP, IPv4 version.
415 */
416static ssize_t fr_bio_fd_sendfromto4(fr_bio_t *bio, void *packet_ctx, const void *buffer, size_t size)
417{
418 int tries = 0;
419 ssize_t rcode;
420 struct cmsghdr *cmsg;
421 struct sockaddr_storage to;
422 socklen_t to_len;
423 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
425
426 memset(&my->cbuf, 0, sizeof(my->cbuf));
427 memset(&my->msgh, 0, sizeof(struct msghdr));
428
429 (void) fr_ipaddr_to_sockaddr(&to, &to_len, &addr->socket.inet.dst_ipaddr, addr->socket.inet.dst_port);
430
431 my->iov = (struct iovec) {
432 .iov_base = UNCONST(void *, buffer),
433 .iov_len = size,
434 };
435
436 my->msgh = (struct msghdr) {
437 .msg_control = my->cbuf,
438 // controllen is set below
439 .msg_name = &to,
440 .msg_namelen = to_len,
441 .msg_iov = &my->iov,
442 .msg_iovlen = 1,
443 .msg_flags = 0,
444 };
445
446 {
447#ifdef IP_PKTINFO
448 struct in_pktinfo *pkt;
449
450 my->msgh.msg_controllen = CMSG_SPACE(sizeof(*pkt));
451
452 cmsg = CMSG_FIRSTHDR(&my->msgh);
453 cmsg->cmsg_level = SOL_IP;
454 cmsg->cmsg_type = IP_PKTINFO;
455 cmsg->cmsg_len = CMSG_LEN(sizeof(*pkt));
456
457 pkt = (struct in_pktinfo *) CMSG_DATA(cmsg);
458 memset(pkt, 0, sizeof(*pkt));
459 pkt->ipi_spec_dst = addr->socket.inet.src_ipaddr.addr.v4;
460 pkt->ipi_ifindex = addr->socket.inet.ifindex;
461
462#elif defined(IP_SENDSRCADDR)
463 struct in_addr *in;
464
465 my->msgh.msg_controllen = CMSG_SPACE(sizeof(*in));
466
467 cmsg = CMSG_FIRSTHDR(&my->msgh);
468 cmsg->cmsg_level = IPPROTO_IP;
469 cmsg->cmsg_type = IP_SENDSRCADDR;
470 cmsg->cmsg_len = CMSG_LEN(sizeof(*in));
471
472 in = (struct in_addr *) CMSG_DATA(cmsg);
473 *in = addr->socket.inet.src_ipaddr.addr.v4;
474#endif
475 }
476
477retry:
478 rcode = sendmsg(my->info.socket.fd, &my->msgh, 0);
479
480#include "fd_write.h"
481
482 return fr_bio_error(IO);
483}
484
485static inline int fr_bio_fd_udpfromto_init4(int fd)
486{
487 int proto = 0, flag = 0, opt = 1;
488
489#ifdef HAVE_IP_PKTINFO
490 /*
491 * Linux
492 */
493 proto = SOL_IP;
494 flag = IP_PKTINFO;
495
496#elif defined(IP_RECVDSTADDR)
497 /*
498 * Set the IP_RECVDSTADDR option (BSD). Note:
499 * IP_RECVDSTADDR == IP_SENDSRCADDR
500 */
501 proto = IPPROTO_IP;
502 flag = IP_RECVDSTADDR;
503#endif
504
505 return setsockopt(fd, proto, flag, &opt, sizeof(opt));
506}
507#endif
508
509#if defined(IPV6_PKTINFO)
510/** Read from a UDP socket where we can change our IP, IPv4 version.
511 */
512static ssize_t fr_bio_fd_recvfromto6(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
513{
514 ssize_t rcode;
515 struct cmsghdr *cmsg;
516 fr_time_t when = fr_time_wrap(0);
517 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
519
520 rcode = fd_fd_recvfromto_common(my, packet_ctx, buffer, size);
521 if (rcode <= 0) return rcode;
522
523DIAG_OFF(sign-compare)
524 /* Process auxiliary received data in msgh */
525 for (cmsg = CMSG_FIRSTHDR(&my->msgh);
526 cmsg != NULL;
527 cmsg = CMSG_NXTHDR(&my->msgh, cmsg)) {
528DIAG_ON(sign-compare)
529
530 if ((cmsg->cmsg_level == IPPROTO_IPV6) &&
531 (cmsg->cmsg_type == IPV6_PKTINFO)) {
532 struct in6_pktinfo *i = (struct in6_pktinfo *) CMSG_DATA(cmsg);
533 struct sockaddr_in6 to;
534
535 to.sin6_addr = i->ipi6_addr;
536
537 (void) fr_ipaddr_from_sockaddr(&addr->socket.inet.dst_ipaddr, &addr->socket.inet.dst_port,
538 (struct sockaddr_storage *) &to, sizeof(struct sockaddr_in6));
539 addr->socket.inet.ifindex = i->ipi6_ifindex;
540 break;
541 }
542
543#ifdef SO_TIMESTAMPNS
544 if ((cmsg->cmsg_level == SOL_IP) && (cmsg->cmsg_type == SO_TIMESTAMPNS)) {
545 when = fr_time_from_timespec((struct timespec *)CMSG_DATA(cmsg));
546 }
547
548#elif defined(SO_TIMESTAMP)
549 if ((cmsg->cmsg_level == SOL_IP) && (cmsg->cmsg_type == SO_TIMESTAMP)) {
550 when = fr_time_from_timeval((struct timeval *)CMSG_DATA(cmsg));
551 }
552#endif
553 }
554
555 if fr_time_eq(when, fr_time_wrap(0)) when = fr_time();
556
557 addr->when = when;
558
559 return rcode;
560}
561
562/** Send to UDP socket where we can change our IP, IPv4 version.
563 */
564static ssize_t fr_bio_fd_sendfromto6(fr_bio_t *bio, void *packet_ctx, const void *buffer, size_t size)
565{
566 int tries = 0;
567 ssize_t rcode;
568 struct cmsghdr *cmsg;
569 struct sockaddr_storage to;
570 socklen_t to_len;
571 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
573
574 memset(&my->cbuf, 0, sizeof(my->cbuf));
575 memset(&my->msgh, 0, sizeof(struct msghdr));
576
577 (void) fr_ipaddr_to_sockaddr(&to, &to_len, &addr->socket.inet.dst_ipaddr, addr->socket.inet.dst_port);
578
579 my->iov = (struct iovec) {
580 .iov_base = UNCONST(void *, buffer),
581 .iov_len = size,
582 };
583
584 my->msgh = (struct msghdr) {
585 .msg_control = my->cbuf,
586 // controllen is set below
587 .msg_name = &to,
588 .msg_namelen = to_len,
589 .msg_iov = &my->iov,
590 .msg_iovlen = 1,
591 .msg_flags = 0,
592 };
593
594 {
595 struct in6_pktinfo *pkt;
596
597 my->msgh.msg_controllen = CMSG_SPACE(sizeof(*pkt));
598
599 cmsg = CMSG_FIRSTHDR(&my->msgh);
600 cmsg->cmsg_level = IPPROTO_IPV6;
601 cmsg->cmsg_type = IPV6_PKTINFO;
602 cmsg->cmsg_len = CMSG_LEN(sizeof(*pkt));
603
604 pkt = (struct in6_pktinfo *) CMSG_DATA(cmsg);
605 memset(pkt, 0, sizeof(*pkt));
606 pkt->ipi6_addr = addr->socket.inet.src_ipaddr.addr.v6;
607 pkt->ipi6_ifindex = addr->socket.inet.ifindex;
608 }
609
610retry:
611 rcode = sendmsg(my->info.socket.fd, &my->msgh, 0);
612
613#include "fd_write.h"
614
615 return fr_bio_error(IO);
616}
617
618
619static inline int fr_bio_fd_udpfromto_init6(int fd)
620{
621 int opt = 1;
622
623 return setsockopt(fd, IPPROTO_IPV6, IPV6_RECVPKTINFO, &opt, sizeof(opt));
624}
625#endif
626
627int fr_filename_to_sockaddr(struct sockaddr_un *sun, socklen_t *sunlen, char const *filename)
628{
629 size_t len;
630
631 len = strlen(filename);
632 if (len >= sizeof(sun->sun_path)) {
633 fr_strerror_const("Failed parsing unix domain socket filename: Name is too long");
634 return -1;
635 }
636
637 sun->sun_family = AF_LOCAL;
638 memcpy(sun->sun_path, filename, len + 1); /* SUN_LEN will do strlen */
639
640 *sunlen = SUN_LEN(sun);
641
642 return 0;
643}
644
646{
647 socklen_t salen;
648 struct sockaddr_storage salocal;
649
650 /*
651 * Already set: do nothing.
652 */
653 if (!fr_ipaddr_is_inaddr_any(&my->info.socket.inet.src_ipaddr) &&
654 (my->info.socket.inet.src_port != 0)) {
655 return 0;
656 }
657
658 /*
659 * FreeBSD jail issues. We bind to 0.0.0.0, but the
660 * kernel instead binds us to a 1.2.3.4. So once the
661 * socket is bound, ask it what it's IP address is.
662 */
663 salen = sizeof(salocal);
664 memset(&salocal, 0, salen);
665 if (getsockname(my->info.socket.fd, (struct sockaddr *) &salocal, &salen) < 0) {
666 fr_strerror_printf("Failed getting socket name: %s", fr_syserror(errno));
667 return -1;
668 }
669
670 if (fr_ipaddr_from_sockaddr(&my->info.socket.inet.src_ipaddr, &my->info.socket.inet.src_port, &salocal, salen) < 0) return -1;
671
672 fr_ipaddr_get_scope_id(&my->info.socket.inet.src_ipaddr);
673 my->info.socket.inet.ifindex = my->info.socket.inet.src_ipaddr.scope_id;
674
675 return 0;
676}
677
679{
680 my->info.state = FR_BIO_FD_STATE_OPEN;
681 my->info.eof = false;
682 my->info.read_blocked = false;
683 my->info.write_blocked = false;
684
685 /*
686 * Tell the caller that the socket is ready for application data.
687 */
688 if (my->cb.connected) my->cb.connected(&my->bio);
689}
690
691
692/** Try to connect().
693 *
694 * If connect is blocking, we either succeed or error immediately. Otherwise, the caller has to select the
695 * socket for writeability, and then call fr_bio_fd_connect() as soon as the socket is writeable.
696 */
698{
699 int tries = 0;
700 int rcode;
701 socklen_t salen;
702 struct sockaddr_storage sockaddr;
703
704 if (my->info.socket.af != AF_LOCAL) {
705 rcode = fr_ipaddr_to_sockaddr(&sockaddr, &salen, &my->info.socket.inet.dst_ipaddr, my->info.socket.inet.dst_port);
706 } else {
707 rcode = fr_filename_to_sockaddr((struct sockaddr_un *) &sockaddr, &salen, my->info.socket.unix.path);
708 }
709
710 if (rcode < 0) {
711 fr_bio_shutdown(&my->bio);
712 return fr_bio_error(GENERIC);
713 }
714
715 my->info.state = FR_BIO_FD_STATE_CONNECTING;
716
717retry:
718 if (connect(my->info.socket.fd, (struct sockaddr *) &sockaddr, salen) == 0) {
720
721 /*
722 * The source IP may have changed, so get the new one.
723 */
724 if (fr_bio_fd_socket_name(my) < 0) goto fail;
725
726 if (fr_bio_fd_init_common(my) < 0) goto fail;
727
728 return 0;
729 }
730
731 switch (errno) {
732 case EINTR:
733 tries++;
734 if (tries <= my->max_tries) goto retry;
736
737 /*
738 * This shouldn't happen, but we'll allow it
739 */
740 case EALREADY:
742
743 /*
744 * Once the socket is writable, it will be active, or in an error state. The caller has
745 * to call fr_bio_fd_connect() before calling write()
746 */
747 case EINPROGRESS:
748 if (!my->info.write_blocked) {
749 my->info.write_blocked = true;
750
751 rcode = fr_bio_write_blocked((fr_bio_t *) my);
752 if (rcode < 0) return rcode;
753 }
754
755 return fr_bio_error(IO_WOULD_BLOCK);
756
757 default:
758 break;
759 }
760
761fail:
762 fr_bio_shutdown(&my->bio);
763 return fr_bio_error(IO);
764}
765
766
767/** Files are a special case of connected sockets.
768 *
769 */
771{
773
774 /*
775 * Other flags may be O_CREAT, etc.
776 */
777 switch (my->info.cfg->flags & (O_RDONLY | O_WRONLY | O_RDWR)) {
778 case O_RDONLY:
779 my->bio.read = fr_bio_fd_read_stream;
780 my->bio.write = fr_bio_fail_write;
781 break;
782
783 case O_WRONLY:
784 my->bio.read = fr_bio_fail_read;
785 my->bio.write = fr_bio_fd_write;
786 break;
787
788 case O_RDWR:
789 my->bio.read = fr_bio_fd_read_stream;
790 my->bio.write = fr_bio_fd_write;
791 break;
792
793 default:
794 fr_strerror_const("Invalid flag for opening file");
795 return -1;
796 }
797
798 return 0;
799}
800
802{
803 int rcode;
804
805 if (my->info.socket.af == AF_FILE_BIO) return fr_bio_fd_init_file(my);
806
807 /*
808 * The source IP can be unspecified. It will get updated after we call connect().
809 */
810
811 /*
812 * All connected sockets must have a destination IP.
813 */
814 if (fr_ipaddr_is_inaddr_any(&my->info.socket.inet.dst_ipaddr)) {
815 fr_strerror_const("Destination IP address cannot be wildcard");
816 return -1;
817 }
818
819 /*
820 * Don't do any reads until we're connected.
821 */
822 my->bio.read = fr_bio_null_read;
823 my->bio.write = fr_bio_null_write;
824
825 my->info.eof = false;
826
827 my->info.read_blocked = false;
828 my->info.write_blocked = false;
829
830#ifdef SO_NOSIGPIPE
831 /*
832 * Although the server ignore SIGPIPE, some operating systems like BSD and OSX ignore the
833 * ignoring.
834 *
835 * Fortunately, those operating systems usually support SO_NOSIGPIPE. We set that to prevent
836 * them raising the signal in the first place.
837 */
838 {
839 int on = 1;
840
841 setsockopt(my->info.socket.fd, SOL_SOCKET, SO_NOSIGPIPE, &on, sizeof(on));
842 }
843#endif
844
845 /*
846 * Don't call connect() if the socket is synchronous, it will block.
847 */
848 if (!my->info.cfg->async) return 0;
849
850 rcode = fr_bio_fd_try_connect(my);
851 if (rcode == 0) return 0;
852
853 if (rcode != fr_bio_error(IO_WOULD_BLOCK)) return rcode;
854
855 /*
856 * The socket is blocked, and should be selected for writing.
857 */
858 fr_assert(my->info.write_blocked);
860
861 return 0;
862}
863
865{
866 if (my->info.socket.type == SOCK_STREAM) { //!< stream socket
867 my->bio.read = fr_bio_fd_read_stream;
868 my->bio.write = fr_bio_fd_write;
869
870 } else if (my->info.type == FR_BIO_FD_CONNECTED) { //!< connected datagram
872 my->bio.write = fr_bio_fd_write;
873
874 } else if (!fr_ipaddr_is_inaddr_any(&my->info.socket.inet.src_ipaddr)) { //!< we know our IP address
875 my->bio.read = fr_bio_fd_recvfrom;
876 my->bio.write = fr_bio_fd_sendto;
877
878#if defined(IP_PKTINFO) || defined(IP_RECVDSTADDR)
879 } else if (my->info.socket.inet.src_ipaddr.af == AF_INET) { //!< we don't know our IPv4
880 if (fr_bio_fd_udpfromto_init4(my->info.socket.fd) < 0) return -1;
881
882 my->bio.read = fr_bio_fd_recvfromto4;
883 my->bio.write = fr_bio_fd_sendfromto4;
884#endif
885
886#if defined(IPV6_PKTINFO)
887 } else if (my->info.socket.inet.src_ipaddr.af == AF_INET6) { //!< we don't know our IPv6
888
889 if (fr_bio_fd_udpfromto_init6(my->info.socket.fd) < 0) return -1;
890
891 my->bio.read = fr_bio_fd_recvfromto6;
892 my->bio.write = fr_bio_fd_sendfromto6;
893#endif
894
895 } else {
896 fr_strerror_const("Failed initializing socket: cannot determine what to do");
897 return -1;
898 }
899
901
902 return 0;
903}
904
905/** Return an fd on read()
906 *
907 * With packet_ctx containing information about the socket.
908 */
909static ssize_t fr_bio_fd_read_accept(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
910{
911 int fd, tries = 0;
912 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
913 socklen_t salen;
914 struct sockaddr_storage sockaddr;
915
916 if (size < sizeof(int)) return fr_bio_error(BUFFER_TOO_SMALL);
917
918 salen = sizeof(sockaddr);
919
920retry:
921#ifdef __linux__
922 /*
923 * Set these flags immediately on the new socket.
924 */
925 fd = accept4(my->info.socket.fd, (struct sockaddr *) &sockaddr, &salen, SOCK_NONBLOCK | SOCK_CLOEXEC);
926#else
927 fd = accept(my->info.socket.fd, (struct sockaddr *) &sockaddr, &salen);
928#endif
929 if (fd >= 0) {
931
932 ADDR_INIT;
933
934 (void) fr_ipaddr_from_sockaddr(&addr->socket.inet.src_ipaddr, &addr->socket.inet.src_port,
935 &sockaddr, salen);
936
937 addr->socket.inet.dst_ipaddr = my->info.socket.inet.src_ipaddr;
938 addr->socket.inet.dst_port = my->info.socket.inet.src_port;
939 addr->socket.fd = fd; /* might as well! */
940
941 *(int *) buffer = fd;
942 return sizeof(int);
943 }
944
945 switch (errno) {
946 case EINTR:
947 /*
948 * Try a few times before giving up.
949 */
950 tries++;
951 if (tries <= my->max_tries) goto retry;
952 return 0;
953
954 /*
955 * We can ignore these errors.
956 */
957 case ECONNABORTED:
958#if defined(EWOULDBLOCK) && (EWOULDBLOCK != EAGAIN)
959 case EWOULDBLOCK:
960#endif
961 case EAGAIN:
962#ifdef EPERM
963 case EPERM:
964#endif
965#ifdef ETIMEDOUT
966 case ETIMEDOUT:
967#endif
968 return 0;
969
970 default:
971 /*
972 * Some other error, it's fatal.
973 */
974 fr_bio_shutdown(&my->bio);
975 break;
976 }
977
978 return fr_bio_error(IO);
979}
980
981
983{
984 my->bio.read = fr_bio_fd_read_accept;
985 my->bio.write = fr_bio_null_write;
986
987 if (listen(my->info.socket.fd, 8) < 0) {
988 fr_strerror_printf("Failed opening setting FD_CLOEXE: %s", fr_syserror(errno));
989 return -1;
990 }
991
993
994 return 0;
995}
996
997/** Allocate a FD bio
998 *
999 * The caller is responsible for tracking the FD, and all associated management of it. The bio API is
1000 * intended to be simple, and does not provide wrapper functions for various ioctls. The caller should
1001 * instead do that work.
1002 *
1003 * Once the FD is give to the bio, its lifetime is "owned" by the bio. Calling talloc_free(bio) will close
1004 * the FD.
1005 *
1006 * The caller can still manage the FD for being readable / writeable. However, the caller should not call
1007 * this bio directly (unless it is the only one). Instead, the caller should read from / write to the
1008 * previous bio which will then eventually call this one.
1009 *
1010 * Before updating any event handler readable / writeable callbacks, the caller should check
1011 * fr_bio_fd_at_eof(). If true, then the handlers should not be inserted. The previous bios should still be
1012 * called to process any pending data, until they return EOF.
1013 *
1014 * The main purpose of an FD bio is to wrap the FD in a bio container. That, and handling retries on read /
1015 * write, along with returning EOF as an error instead of zero.
1016 *
1017 * Note that the read / write functions can return partial data. It is the callers responsibility to ensure
1018 * that any writes continue from where they left off (otherwise dat awill be missing). And any partial reads
1019 * should go to a memory bio.
1020 *
1021 * If a read returns EOF, then the FD remains open until talloc_free(bio) or fr_bio_fd_close() is called.
1022 *
1023 * @param ctx the talloc ctx
1024 * @param cfg structure holding configuration information
1025 * @param offset only for unconnected datagram sockets, where #fr_bio_fd_packet_ctx_t is stored
1026 * @return
1027 * - NULL on error, memory allocation failed
1028 * - !NULL the bio
1029 */
1030fr_bio_t *fr_bio_fd_alloc(TALLOC_CTX *ctx, fr_bio_fd_config_t const *cfg, size_t offset)
1031{
1032 fr_bio_fd_t *my;
1033
1034 my = talloc_zero(ctx, fr_bio_fd_t);
1035 if (!my) return NULL;
1036
1037 my->max_tries = 4;
1038 my->offset = offset;
1039
1040 if (!cfg) {
1041 /*
1042 * Add place-holder information.
1043 */
1044 my->info = (fr_bio_fd_info_t) {
1045 .socket = {
1046 .af = AF_UNSPEC,
1047 },
1048 .type = FR_BIO_FD_UNCONNECTED,
1049 .read_blocked = false,
1050 .write_blocked = false,
1051 .eof = false,
1052 .state = FR_BIO_FD_STATE_CLOSED,
1053 };
1054
1055 my->bio.read = fr_bio_null_read;
1056 my->bio.write = fr_bio_null_write;
1057 } else {
1058 my->info.state = FR_BIO_FD_STATE_CLOSED;
1059
1060 if (fr_bio_fd_open(&my->bio, cfg) < 0) {
1061 talloc_free(my);
1062 return NULL;
1063 }
1064 }
1065
1066 my->priv_cb.eof = fr_bio_fd_eof;
1067 my->priv_cb.write_resume = fr_bio_fd_write_resume;
1068
1069 talloc_set_destructor(my, fr_bio_fd_destructor);
1070 return (fr_bio_t *) my;
1071}
1072
1073/** Close the FD, but leave the bio allocated and alive.
1074 *
1075 */
1077{
1078 int rcode;
1079 int tries = 0;
1080 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
1081
1082 if (my->info.state == FR_BIO_FD_STATE_CLOSED) return 0;
1083
1084 /*
1085 * Shut the bio down cleanly.
1086 */
1087 rcode = fr_bio_shutdown(bio);
1088 if (rcode < 0) return rcode;
1089
1090 my->bio.read = fr_bio_fail_read;
1091 my->bio.write = fr_bio_fail_write;
1092
1093 /*
1094 * Shut down the connected socket. The only errors possible here are things we can't do anything
1095 * about.
1096 *
1097 * shutdown() will close ALL versions of this file descriptor, even if it's (somehow) used in
1098 * another process. shutdown() will also tell the kernel to gracefully close the connected
1099 * socket, so that it can signal the other end, instead of having the connection disappear.
1100 *
1101 * This shouldn't strictly be necessary, as no other processes should be sharing this file
1102 * descriptor. But it's the safe (and polite) thing to do.
1103 */
1104 if (my->info.type == FR_BIO_FD_CONNECTED) {
1105 (void) shutdown(my->info.socket.fd, SHUT_RDWR);
1106 }
1107
1108retry:
1109 rcode = close(my->info.socket.fd);
1110 if (rcode < 0) {
1111 switch (errno) {
1112 case EINTR:
1113 case EIO:
1114 tries++;
1115 if (tries < my->max_tries) goto retry;
1116 return -1;
1117
1118 default:
1119 /*
1120 * EBADF, or other unrecoverable error. We just call it closed, and continue.
1121 */
1122 break;
1123 }
1124 }
1125
1126 my->info.state = FR_BIO_FD_STATE_CLOSED;
1127 my->info.read_blocked = true;
1128 my->info.write_blocked = true;
1129 my->info.eof = true;
1130
1131 return 0;
1132}
1133
1134/** FD error when trying to connect, give up on the BIO.
1135 *
1136 */
1137static void fr_bio_fd_el_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
1138{
1139 fr_bio_fd_t *my = talloc_get_type_abort(uctx, fr_bio_fd_t);
1140
1141 my->info.connect_errno = fd_errno;
1142
1143 if (my->connect.error) {
1144 my->connect.error(&my->bio);
1145 }
1146
1147 fr_bio_shutdown(&my->bio);
1148}
1149
1150/** Connect callback for when the socket is writable.
1151 *
1152 * We try to connect the socket, and if so, call the application which should update the BIO status.
1153 */
1155{
1156 fr_bio_fd_t *my = talloc_get_type_abort(uctx, fr_bio_fd_t);
1157
1158 fr_assert(my->info.type == FR_BIO_FD_CONNECTED);
1159 fr_assert(my->info.state == FR_BIO_FD_STATE_CONNECTING);
1160 fr_assert(my->connect.el == el); /* and not NULL */
1161 fr_assert(my->connect.success != NULL);
1162 fr_assert(my->info.socket.fd == fd);
1163
1164#ifndef NDEBUG
1165 /*
1166 * This check shouldn't be necessary, as we have a kqeueue error callback. That should be called
1167 * when there's a connect error.
1168 */
1169 {
1170 int error;
1171 socklen_t socklen = sizeof(error);
1172
1173 /*
1174 * The socket is writeable. Let's see if there's an error.
1175 *
1176 * Unix Network Programming says:
1177 *
1178 * ""If so_error is nonzero when the process calls write, -1 is returned with errno set to the
1179 * value of SO_ERROR (p. 495 of TCPv2) and SO_ERROR is reset to 0. We have to check for the
1180 * error, and if there's no error, set the state to "open". ""
1181 *
1182 * The same applies to connect(). If a non-blocking connect returns INPROGRESS, it may later
1183 * become writable. It will be writable even if the connection fails. Rather than writing some
1184 * random application data, we call SO_ERROR, and get the underlying error.
1185 */
1186 if (getsockopt(my->info.socket.fd, SOL_SOCKET, SO_ERROR, (void *)&error, &socklen) < 0) {
1187 fr_bio_fd_el_error(el, fd, flags, errno, uctx);
1188 return;
1189 }
1190
1191 fr_assert(error == 0);
1192
1193 /*
1194 * There was an error, we call the error handler.
1195 */
1196 if (error) {
1197 fr_bio_fd_el_error(el, fd, flags, error, uctx);
1198 return;
1199 }
1200 }
1201#endif
1202
1203 /*
1204 * Try to connect it. Any magic handling is done in the callbacks.
1205 */
1206 if (fr_bio_fd_try_connect(my) < 0) return;
1207
1208 fr_assert(my->connect.success);
1209
1210 if (my->connect.ev) {
1211 talloc_const_free(my->connect.ev);
1212 my->connect.ev = NULL;
1213 }
1214 my->connect.el = NULL;
1215
1216 /*
1217 * This function MUST change the read/write/error callbacks for the FD.
1218 */
1219 my->connect.success(&my->bio);
1220}
1221
1222/** We have a timeout on the conenction
1223 *
1224 */
1226{
1227 fr_bio_fd_t *my = talloc_get_type_abort(uctx, fr_bio_fd_t);
1228
1229 fr_assert(my->connect.timeout);
1230
1231 my->connect.timeout(&my->bio);
1232
1233 fr_bio_shutdown(&my->bio);
1234}
1235
1236
1237/** Finalize a connect()
1238 *
1239 * connect() said "come back when the socket is writeable". It's now writeable, so we check if there was a
1240 * connection error.
1241 *
1242 * @param bio the binary IO handler
1243 * @param el the event list
1244 * @param connected_cb callback to run when the BIO is connected
1245 * @param error_cb callback to run when the FD has an error
1246 * @param timeout when to time out the connect() attempt
1247 * @param timeout_cb to call when the timeout runs.
1248 * @return
1249 * - <0 on error
1250 * - 0 for "try again later". If callbacks are set, the callbacks will try again. Otherwise the application has to try again.
1251 * - 1 for "we are now connected".
1252 */
1254 fr_bio_callback_t error_cb,
1255 fr_time_delta_t *timeout, fr_bio_callback_t timeout_cb)
1256{
1257 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
1258
1259 /*
1260 * We shouldn't be connected an unconnected socket.
1261 */
1262 if (my->info.type == FR_BIO_FD_UNCONNECTED) {
1263 error:
1264#ifdef ECONNABORTED
1265 my->info.connect_errno = ECONNABORTED;
1266#else
1267 my->info.connect_errno = ECONNREFUSED;
1268#endif
1269 if (error_cb) error_cb(bio);
1270 fr_bio_shutdown(&my->bio);
1271 return fr_bio_error(GENERIC);
1272 }
1273
1274 /*
1275 * The initial open may have succeeded in connecting the socket. In which case we just run the
1276 * callbacks and return.
1277 */
1278 if (my->info.state == FR_BIO_FD_STATE_OPEN) {
1279 connected:
1280 if (connected_cb) connected_cb(bio);
1281
1282 return 1;
1283 }
1284
1285 /*
1286 * The caller may just call us without caring about what the underlying BIO is. In which case we
1287 * need to be safe.
1288 */
1289 if ((my->info.socket.af == AF_FILE_BIO) || (my->info.type == FR_BIO_FD_LISTEN)) {
1291 goto connected;
1292 }
1293
1294 /*
1295 * It must be in the connecting state, i.e. not INVALID or CLOSED.
1296 */
1297 if (my->info.state != FR_BIO_FD_STATE_CONNECTING) goto error;
1298
1299 /*
1300 * No callback
1301 */
1302 if (!connected_cb) {
1303 ssize_t rcode;
1304
1305 rcode = fr_bio_fd_try_connect(my);
1306 if (rcode < 0) {
1307 if (error_cb) error_cb(bio);
1308 return rcode; /* it already called shutdown */
1309 }
1310
1311 return 1;
1312 }
1313
1314 /*
1315 * It's not connected, the caller has to try again.
1316 */
1317 if (!el) return 0;
1318
1319 /*
1320 * Set the callbacks to run when something happens.
1321 */
1322 my->connect.success = connected_cb;
1323 my->connect.error = error_cb;
1324 my->connect.timeout = timeout_cb;
1325
1326 /*
1327 * Set the timeout callback if asked.
1328 */
1329 if (timeout_cb) {
1330 if (fr_timer_in(my, el->tl, &my->connect.ev, *timeout, false, fr_bio_fd_el_timeout, my) < 0) {
1331 goto error;
1332 }
1333 }
1334
1335 /*
1336 * Set the FD callbacks, and tell the caller that we're not connected.
1337 */
1338 if (fr_event_fd_insert(my, NULL, el, my->info.socket.fd, NULL,
1340 goto error;
1341 }
1342 my->connect.el = el;
1343
1344 return 0;
1345}
1346
1347/** Returns a pointer to the bio-specific information.
1348 *
1349 */
1351{
1352 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
1353
1354 return &my->info;
1355}
1356
1357
1358/** Discard all reads from a UDP socket.
1359 */
1360static ssize_t fr_bio_fd_read_discard(fr_bio_t *bio, UNUSED void *packet_ctx, void *buffer, size_t size)
1361{
1362 int tries = 0;
1363 ssize_t rcode;
1364 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
1365
1366retry:
1367 rcode = read(my->info.socket.fd, buffer, size);
1368 if (rcode >= 0) return 0; /* always return that we read no data */
1369
1370#undef flag_blocked
1371#define flag_blocked read_blocked
1372#include "fd_errno.h"
1373
1374 return fr_bio_error(IO);
1375}
1376
1377/** Mark up a bio as write-only
1378 *
1379 */
1381{
1382 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
1383
1384 switch (my->info.type) {
1385 case FR_BIO_FD_INVALID:
1386 return -1;
1387
1389 if (my->info.socket.type != SOCK_DGRAM) {
1390 fr_strerror_const("Only datagram sockets can be marked 'write-only'");
1391 return -1;
1392 }
1393 goto set_recv_buff_zero;
1394
1396 case FR_BIO_FD_ACCEPTED:
1397 /*
1398 * Further reads are disallowed. However, this likely has no effect for UDP sockets.
1399 */
1400 if (shutdown(my->info.socket.fd, SHUT_RD) < 0) {
1401 fr_strerror_printf("Failed shutting down connected socket - %s", fr_syserror(errno));
1402 return -1;
1403 }
1404
1405 set_recv_buff_zero:
1406#ifdef __linux__
1407#ifdef SO_RCVBUF
1408 /*
1409 * On Linux setting the receive buffer to zero has the effect of discarding all incoming
1410 * data in the kernel. With macOS and others it's an invalid value.
1411 */
1412 {
1413 int opt = 0;
1414
1415 if (setsockopt(my->info.socket.fd, SOL_SOCKET, SO_RCVBUF, &opt, sizeof(opt)) < 0) {
1416 fr_strerror_printf("Failed setting SO_RCVBUF: %s", fr_syserror(errno));
1417 return -1;
1418 }
1419 }
1420#endif
1421#endif
1422 break;
1423
1424 case FR_BIO_FD_LISTEN:
1425 fr_strerror_const("Only unconnected sockets can be marked 'write-only'");
1426 return -1;
1427 }
1428
1429 /*
1430 * No matter what the possibilities above, we replace the read function with a "discard"
1431 * function.
1432 */
1433 my->bio.read = fr_bio_fd_read_discard;
1434 return 0;
1435}
1436
1437/** Alternative to calling fr_bio_read() on new socket.
1438 *
1439 */
1440int fr_bio_fd_accept(TALLOC_CTX *ctx, fr_bio_t **out_p, fr_bio_t *bio)
1441{
1442 int fd, tries = 0;
1443 int rcode;
1444 fr_bio_fd_t *my = talloc_get_type_abort(bio, fr_bio_fd_t);
1445 socklen_t salen;
1446 struct sockaddr_storage sockaddr;
1448 fr_bio_fd_config_t *cfg;
1449
1450 salen = sizeof(sockaddr);
1451 *out_p = NULL;
1452
1453 fr_assert(my->info.type == FR_BIO_FD_LISTEN);
1454 fr_assert(my->info.socket.type == SOCK_STREAM);
1455
1456retry:
1457#ifdef __linux__
1458 /*
1459 * Set these flags immediately on the new socket.
1460 */
1461 fd = accept4(my->info.socket.fd, (struct sockaddr *) &sockaddr, &salen, SOCK_NONBLOCK | SOCK_CLOEXEC);
1462#else
1463 fd = accept(my->info.socket.fd, (struct sockaddr *) &sockaddr, &salen);
1464#endif
1465 if (fd < 0) {
1466 switch (errno) {
1467 case EINTR:
1468 /*
1469 * Try a few times before giving up.
1470 */
1471 tries++;
1472 if (tries <= my->max_tries) goto retry;
1473 return 0;
1474
1475 /*
1476 * We can ignore these errors.
1477 */
1478 case ECONNABORTED:
1479#if defined(EWOULDBLOCK) && (EWOULDBLOCK != EAGAIN)
1480 case EWOULDBLOCK:
1481#endif
1482 case EAGAIN:
1483#ifdef EPERM
1484 case EPERM:
1485#endif
1486#ifdef ETIMEDOUT
1487 case ETIMEDOUT:
1488#endif
1489 return 0;
1490
1491 default:
1492 /*
1493 * Some other error, it's fatal.
1494 */
1495 fr_bio_shutdown(&my->bio);
1496 break;
1497 }
1498
1499 return fr_bio_error(IO);
1500 }
1501
1502 /*
1503 * Allocate the base BIO and set it up.
1504 */
1505 out = (fr_bio_fd_t *) fr_bio_fd_alloc(ctx, NULL, my->offset);
1506 if (!out) {
1507 close(fd);
1508 return fr_bio_error(GENERIC);
1509 }
1510
1511 /*
1512 * We have a file descriptor. Initialize the configuration with the new information.
1513 */
1514 cfg = talloc_memdup(out, my->info.cfg, sizeof(*my->info.cfg));
1515 if (!cfg) {
1516 fr_strerror_const("Out of memory");
1517 close(fd);
1519 return fr_bio_error(GENERIC);
1520 }
1521
1522 /*
1523 * Set the type to ACCEPTED, and set up the rest of the callbacks to match.
1524 */
1525 cfg->type = FR_BIO_FD_ACCEPTED;
1526 out->info.socket.fd = fd;
1527
1528 rcode = fr_bio_fd_open(bio, cfg);
1529 if (rcode < 0) {
1531 return rcode;
1532 }
1533
1534 fr_assert(out->info.type == FR_BIO_FD_CONNECTED);
1535
1536 *out_p = (fr_bio_t *) out;
1537 return 1;
1538}
static int const char char buffer[256]
Definition acutest.h:576
fr_bio_write_t _CONST write
write to the underlying bio
Definition base.h:116
static fr_bio_t * fr_bio_prev(fr_bio_t *bio)
Definition base.h:121
fr_bio_read_t _CONST read
read from the underlying bio
Definition base.h:115
static fr_bio_t * fr_bio_next(fr_bio_t *bio)
Definition base.h:130
void(* fr_bio_callback_t)(fr_bio_t *bio)
Definition base.h:85
#define fr_bio_error(_x)
Definition base.h:192
#define UNCONST(_type, _ptr)
Remove const qualification from a pointer.
Definition build.h:167
#define NDEBUG_UNUSED
Definition build.h:328
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
Definition build.h:324
#define DIAG_ON(_x)
Definition build.h:460
#define UNUSED
Definition build.h:317
#define DIAG_OFF(_x)
Definition build.h:459
static fr_slen_t in
Definition dict.h:831
#define fr_event_fd_insert(...)
Definition event.h:248
@ FR_EVENT_FILTER_IO
Combined filter for read/write functions/.
Definition event.h:84
int fr_bio_fd_connect_full(fr_bio_t *bio, fr_event_list_t *el, fr_bio_callback_t connected_cb, fr_bio_callback_t error_cb, fr_time_delta_t *timeout, fr_bio_callback_t timeout_cb)
Finalize a connect()
Definition fd.c:1253
static ssize_t fr_bio_fd_read_discard(fr_bio_t *bio, UNUSED void *packet_ctx, void *buffer, size_t size)
Discard all reads from a UDP socket.
Definition fd.c:1360
static ssize_t fr_bio_fd_write(fr_bio_t *bio, UNUSED void *packet_ctx, const void *buffer, size_t size)
Write to fd.
Definition fd.c:236
int fr_bio_fd_socket_name(fr_bio_fd_t *my)
Definition fd.c:645
static void fr_bio_fd_el_connect(NDEBUG_UNUSED fr_event_list_t *el, NDEBUG_UNUSED int fd, NDEBUG_UNUSED int flags, void *uctx)
Connect callback for when the socket is writable.
Definition fd.c:1154
#define ADDR_INIT
Definition fd.c:84
static int fr_bio_fd_write_resume(fr_bio_t *bio)
Definition fd.c:133
fr_bio_t * fr_bio_fd_alloc(TALLOC_CTX *ctx, fr_bio_fd_config_t const *cfg, size_t offset)
Allocate a FD bio.
Definition fd.c:1030
int fr_bio_fd_init_connected(fr_bio_fd_t *my)
Definition fd.c:801
static ssize_t fr_bio_fd_read_connected_datagram(fr_bio_t *bio, UNUSED void *packet_ctx, void *buffer, size_t size)
Connected datagram read.
Definition fd.c:184
static ssize_t fr_bio_fd_try_connect(fr_bio_fd_t *my)
Try to connect().
Definition fd.c:697
static ssize_t fr_bio_fd_recvfrom(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
Read from a UDP socket where we know our IP.
Definition fd.c:201
#define SOL_IP
Definition fd.c:33
static int fr_bio_fd_eof(fr_bio_t *bio)
Definition fd.c:118
static ssize_t fr_bio_fd_sendto(fr_bio_t *bio, void *packet_ctx, const void *buffer, size_t size)
Write to a UDP socket where we know our IP.
Definition fd.c:272
int fr_filename_to_sockaddr(struct sockaddr_un *sun, socklen_t *sunlen, char const *filename)
Definition fd.c:627
int fr_bio_fd_init_listen(fr_bio_fd_t *my)
Definition fd.c:982
int fr_bio_fd_accept(TALLOC_CTX *ctx, fr_bio_t **out_p, fr_bio_t *bio)
Alternative to calling fr_bio_read() on new socket.
Definition fd.c:1440
fr_bio_fd_info_t const * fr_bio_fd_info(fr_bio_t *bio)
Returns a pointer to the bio-specific information.
Definition fd.c:1350
static ssize_t fr_bio_fd_read_accept(fr_bio_t *bio, void *packet_ctx, void *buffer, size_t size)
Return an fd on read()
Definition fd.c:909
static int fr_bio_fd_init_file(fr_bio_fd_t *my)
Files are a special case of connected sockets.
Definition fd.c:770
static void fr_bio_fd_el_timeout(UNUSED fr_timer_list_t *tl, UNUSED fr_time_t now, void *uctx)
We have a timeout on the conenction.
Definition fd.c:1225
static int fr_bio_fd_destructor(fr_bio_fd_t *my)
Definition fd.c:94
int fr_bio_fd_init_common(fr_bio_fd_t *my)
Definition fd.c:864
int fr_bio_fd_write_only(fr_bio_t *bio)
Mark up a bio as write-only.
Definition fd.c:1380
static void fr_bio_fd_el_error(UNUSED fr_event_list_t *el, UNUSED int fd, UNUSED int flags, int fd_errno, void *uctx)
FD error when trying to connect, give up on the BIO.
Definition fd.c:1137
int fr_bio_fd_close(fr_bio_t *bio)
Close the FD, but leave the bio allocated and alive.
Definition fd.c:1076
static void fr_bio_fd_set_open(fr_bio_fd_t *my)
Definition fd.c:678
static ssize_t fr_bio_fd_read_stream(fr_bio_t *bio, UNUSED void *packet_ctx, void *buffer, size_t size)
Stream read.
Definition fd.c:147
@ FR_BIO_FD_ACCEPTED
temporarily until it's connected.
Definition fd.h:71
@ FR_BIO_FD_CONNECTED
connected client sockets (UDP or TCP)
Definition fd.h:68
@ FR_BIO_FD_INVALID
not set
Definition fd.h:64
@ FR_BIO_FD_UNCONNECTED
unconnected UDP / datagram only
Definition fd.h:65
@ FR_BIO_FD_LISTEN
returns new fd in buffer on fr_bio_read() or fr_bio_fd_accept()
Definition fd.h:69
@ FR_BIO_FD_STATE_CLOSED
Definition fd.h:58
@ FR_BIO_FD_STATE_CONNECTING
Definition fd.h:60
@ FR_BIO_FD_STATE_OPEN
error states must be before this
Definition fd.h:59
fr_bio_fd_type_t type
accept, connected, unconnected, etc.
Definition fd.h:82
#define AF_FILE_BIO
Definition fd.h:40
int fr_bio_fd_open(fr_bio_t *bio, fr_bio_fd_config_t const *cfg)
Opens a socket and updates sock->fd.
Definition fd_open.c:971
fr_socket_t socket
socket information, including FD.
Definition fd.h:52
Configuration for sockets.
Definition fd.h:81
Run-time status of the socket.
Definition fd.h:128
Per-packet context.
Definition fd.h:51
fr_bio_shutdown & my
Definition fd_errno.h:59
#define fr_bio_fd_packet_ctx(_my, _packet_ctx)
Definition fd_priv.h:59
Our FD bio structure.
Definition fd_priv.h:35
void fr_ipaddr_get_scope_id(fr_ipaddr_t *ipaddr)
Definition inet.c:1486
int fr_ipaddr_from_sockaddr(fr_ipaddr_t *ipaddr, uint16_t *port, struct sockaddr_storage const *sa, socklen_t salen)
Convert sockaddr to our internal ip address representation.
Definition inet.c:1441
int fr_ipaddr_is_inaddr_any(fr_ipaddr_t const *ipaddr)
Determine if an address is the INADDR_ANY address for its address family.
Definition inet.c:62
int fr_ipaddr_to_sockaddr(struct sockaddr_storage *sa, socklen_t *salen, fr_ipaddr_t const *ipaddr, uint16_t port)
Convert our internal ip address representation to a sockaddr.
Definition inet.c:1392
int fr_bio_write_blocked(fr_bio_t *bio)
Internal BIO function to tell all BIOs that it's blocked.
Definition base.c:293
void fr_bio_eof(fr_bio_t *bio)
Internal BIO function to run EOF callbacks.
Definition base.c:244
int fr_bio_shutdown(fr_bio_t *bio)
Shut down a set of BIOs.
Definition base.c:141
talloc_free(reap)
int fr_event_fd_delete(fr_event_list_t *el, int fd, fr_event_filter_t filter)
Remove a file descriptor from the event loop.
Definition event.c:1206
Stores all information relating to an event list.
Definition event.c:380
long int ssize_t
ssize_t fr_bio_null_write(UNUSED fr_bio_t *bio, UNUSED void *packet_ctx, UNUSED void const *buffer, UNUSED size_t size)
Always return 0 on write.
Definition null.c:39
ssize_t fr_bio_null_read(UNUSED fr_bio_t *bio, UNUSED void *packet_ctx, UNUSED void *buffer, UNUSED size_t size)
Always return 0 on read.
Definition null.c:31
ssize_t fr_bio_fail_read(UNUSED fr_bio_t *bio, UNUSED void *packet_ctx, UNUSED void *buffer, UNUSED size_t size)
Always return error on read.
Definition null.c:47
ssize_t fr_bio_fail_write(UNUSED fr_bio_t *bio, UNUSED void *packet_ctx, UNUSED void const *buffer, UNUSED size_t size)
Always return 0 on write.
Definition null.c:56
#define fr_assert(_expr)
Definition rad_assert.h:38
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
static int talloc_const_free(void const *ptr)
Free const'd memory.
Definition talloc.h:224
static fr_time_t fr_time_from_timeval(struct timeval const *when_tv)
Convert a timeval (wallclock time) to a fr_time_t (internal time)
Definition time.h:896
#define fr_time_wrap(_time)
Definition time.h:145
#define fr_time_eq(_a, _b)
Definition time.h:241
static fr_time_t fr_time_from_timespec(struct timespec const *when_ts)
Convert a timespec (wallclock time) to a fr_time_t (internal time)
Definition time.h:878
A time delta, a difference in time measured in nanoseconds.
Definition time.h:80
"server local" time.
Definition time.h:69
An event timer list.
Definition timer.c:53
#define fr_timer_in(...)
Definition timer.h:86
close(uq->fd)
static fr_event_list_t * el
int fd
File descriptor if this is a live socket.
Definition socket.h:81
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
Definition strerror.h:64
#define fr_strerror_const(_msg)
Definition strerror.h:223
static size_t char ** out
Definition value.h:1012