25#include <freeradius-devel/bio/fd_priv.h>
26#include <freeradius-devel/util/file.h>
27#include <freeradius-devel/util/cap.h>
28#include <freeradius-devel/util/rand.h>
34#include <netinet/tcp.h>
35#include <netinet/in.h>
49 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE, &on,
sizeof(on)) < 0) {
59# if !defined(SOL_TCP) && defined(IPPROTO_TCP)
60# define SOL_TCP IPPROTO_TCP
70 if (setsockopt(fd, SOL_TCP, TCP_NODELAY, &on,
sizeof(on)) < 0) {
94 if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMPNS, &on,
sizeof(
int)) < 0) {
99#elif defined(SO_TIMESTAMP)
105 if (setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, &on,
sizeof(
int)) < 0) {
119 if (opt > (1 << 29)) opt = (1 << 29);
121 if (setsockopt(fd, SOL_SOCKET, SO_RCVBUF, &opt,
sizeof(opt)) < 0) {
135 if (opt > (1 << 29)) opt = (1 << 29);
137 if (setsockopt(fd, SOL_SOCKET, SO_SNDBUF, &opt,
sizeof(opt)) < 0) {
163 if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &on,
sizeof(on)) < 0) {
180 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &on,
sizeof(on)) < 0) {
195#if defined(IP_MTU_DISCOVER) && defined(IP_PMTUDISC_DONT)
200 flag = IP_PMTUDISC_DONT;
202 if (setsockopt(fd, IPPROTO_IP, IP_MTU_DISCOVER, &flag,
sizeof(flag)) < 0) {
208#if defined(IP_DONTFRAG)
214 if (setsockopt(fd, IPPROTO_IP, IP_DONTFRAG, &flag,
sizeof(flag)) < 0) {
237 if (IN6_IS_ADDR_UNSPECIFIED(
UNCONST(
struct in6_addr *, &sock->inet.src_ipaddr.addr.v6))) {
240 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, (
char *)&on,
sizeof(on)) < 0) {
268 if (fstatat(dirfd, filename, &buf, AT_SYMLINK_NOFOLLOW) < 0) {
269 if (errno != ENOENT) {
280 if (!S_ISSOCK(buf.st_mode)) {
289 if (buf.st_uid != cfg->
uid) {
312 if (unlinkat(dirfd, filename, 0) < 0) {
329 char const *path = cfg->
path;
330 char *p, *dir = NULL;
333 perm = S_IREAD | S_IWRITE | S_IEXEC;
334 perm |= S_IRGRP | S_IWGRP | S_IXGRP;
342 if (
fr_dirfd(dirfd, filename, path) == 0) {
345 if (fstat(*dirfd, &buf) < 0) {
353 if (buf.st_uid != cfg->
uid) {
354 fr_strerror_printf(
"Failed reading parent directory for file %s: Incorrect UID", path);
358 if (buf.st_gid != cfg->
gid) {
359 fr_strerror_printf(
"Failed reading parent directory for file %s: Incorrect GID", path);
368 if (fchmod(*dirfd, perm) < 0) {
376 dir = talloc_strdup(NULL, path);
382 slashes[0] = slashes[1] = NULL;
383 for (p = dir; *p !=
'\0'; p++) {
385 slashes[0] = slashes[1];
418 parent_fd = open(dir, O_DIRECTORY | O_NOFOLLOW);
429 if (mkdirat(parent_fd, dir, 0700) < 0) {
436 fd = openat(parent_fd, dir, O_DIRECTORY);
442 if (fchmod(fd, perm) < 0) {
454 if (fchown(fd, cfg->
uid, cfg->
gid) < 0) {
483 if (
my->user_shutdown)
my->user_shutdown(bio);
485 (void) unlink(
my->info.socket.unix.path);
502 char const *filename, *p;
504 struct sockaddr_un sun;
515 if (cfg->
uid == (uid_t) -1) {
520 if (cfg->
gid == (gid_t) -1) {
528 p = strrchr(cfg->
path,
'/');
531 filename = cfg->
path;
533 }
else if (p == cfg->
path) {
537 fr_strerror_printf(
"Failed opening domain socket %s: cannot exist at file system root", p);
549 if (dirfd != AT_FDCWD)
close(dirfd);
562 rcode = bindat(dirfd,
my->info.socket.fd, (
struct sockaddr *) &sun, sunlen);
569 rcode = bind(
my->info.socket.fd, (
struct sockaddr *) &sun, sunlen);
584 if (fchmod(
my->info.socket.fd, S_IREAD | S_IWRITE | S_IEXEC | S_IRGRP | S_IWGRP | S_IXGRP) < 0) {
594 if (fchown(
my->info.socket.fd, cfg->
uid, cfg->
gid) < 0) {
604 if (
my->cb.shutdown)
my->user_shutdown =
my->cb.shutdown;
614#undef SO_BINDTODEVICE
617#ifdef SO_BINDTODEVICE
626 if (!
my->info.socket.inet.ifindex)
return 0;
637#ifdef HAVE_CAPABILITY_H
638 (void)fr_cap_enable(CAP_NET_RAW, CAP_EFFECTIVE);
641 if (setsockopt(
my->info.socket.fd, SOL_SOCKET, SO_BINDTODEVICE, cfg->
interface, strlen(cfg->
interface)) < 0) {
649#elif defined(IP_BOUND_IF) || defined(IPV6_BOUND_IF)
657 if (!
my->info.socket.inet.ifindex)
return 0;
659 opt =
my->info.socket.inet.ifindex;
661 switch (
my->info.socket.af) {
663 rcode = setsockopt(
my->info.socket.fd, IPPROTO_IP, IP_BOUND_IF, &opt,
sizeof(opt));
667 rcode = setsockopt(
my->info.socket.fd, IPPROTO_IPV6, IPV6_BOUND_IF, &opt,
sizeof(opt));
672 errno = EAFNOSUPPORT;
693 if (!
my->info.socket.inet.ifindex)
return 0;
705 struct sockaddr_storage salocal;
707 fr_assert((
my->info.socket.af == AF_INET) || (
my->info.socket.af == AF_INET6));
709#ifdef HAVE_CAPABILITY_H
715 if ((
my->info.socket.inet.src_port < 1024) && (geteuid() != 0)) {
716 (void)fr_cap_enable(CAP_NET_BIND_SERVICE, CAP_EFFECTIVE);
725 if (
fr_ipaddr_to_sockaddr(&salocal, &salen, &
my->info.socket.inet.src_ipaddr,
my->info.socket.inet.src_port) < 0)
return -1;
730 if (
my->info.cfg->src_port || !
my->info.cfg->src_port_start) {
731 if (bind(
my->info.socket.fd, (
struct sockaddr *) &salocal, salen) < 0) {
737 struct sockaddr_in *sin = (
struct sockaddr_in *) &salocal;
741 fr_assert(
my->info.cfg->src_port_end >=
my->info.cfg->src_port_start);
743 range =
my->info.cfg->src_port_end -
my->info.cfg->src_port_start;
751 sin->sin_port = htons(
my->info.cfg->src_port_start + src_port);
757 if (bind(
my->info.socket.fd, (
struct sockaddr *) &salocal, salen) == 0)
goto done;
773 if (
current == src_port)
break;
775 sin->sin_port = htons(
my->info.cfg->src_port_start +
current);
777 if (bind(
my->info.socket.fd, (
struct sockaddr *) &salocal, salen) == 0)
goto done;
799 switch (
my->info.type) {
806 switch (
my->info.socket.af) {
811 my->info.socket.inet.src_port);
821 my->info.name =
"??? invalid BIO ???";
828 switch (
my->info.socket.af) {
831 my->info.name =
fr_asprintf(
my,
"proto %s local %pV port %u remote %pV port %u",
834 my->info.socket.inet.src_port,
836 my->info.socket.inet.dst_port);
841 (cfg->
socket_type == SOCK_DGRAM) ?
"(datagram) " :
"",
848 if (cfg->
flags == O_RDONLY) {
852 }
else if (cfg->
flags == O_WRONLY) {
863 my->info.name =
"??? invalid BIO ???";
871 switch (
my->info.socket.af) {
877 my->info.socket.inet.src_port);
887 my->info.name =
"??? invalid BIO ???";
931 fr_strerror_printf(
"Source and destination IP addresses are not from the same IP address family");
948 fr_strerror_const(
"Unconnected sockets cannot be used with Unix sockets or files");
992 my->info.socket.inet.src_port = cfg->
src_port;
993 my->info.socket.inet.dst_port = cfg->
dst_port;
1001 switch (cfg->
type) {
1009 if (
my->info.socket.inet.src_ipaddr.af == AF_UNSPEC) {
1011 .af =
my->info.socket.inet.dst_ipaddr.af,
1012 .prefix = (
my->info.socket.inet.dst_ipaddr.af == AF_INET) ? 32 : 128,
1018 my->info.socket.af =
my->info.socket.inet.dst_ipaddr.af;
1024 if (
my->info.socket.inet.src_ipaddr.af !=
my->info.socket.inet.dst_ipaddr.af) {
1025 fr_strerror_const(
"Source and destination IP addresses are not from the same IP address family");
1032 fr_assert(
my->info.socket.inet.src_ipaddr.af != AF_UNSPEC);
1036 fr_assert(
my->info.socket.inet.src_ipaddr.af != AF_UNSPEC);
1037 fr_assert(
my->info.socket.inet.dst_ipaddr.af != AF_UNSPEC);
1042 protocol = IPPROTO_TCP;
1044 protocol = IPPROTO_UDP;
1048 my->info.socket.inet.ifindex = if_nametoindex(cfg->
interface);
1050 if (!
my->info.socket.inet.ifindex) {
1060 fd =
my->info.socket.fd;
1064 fd = socket(
my->info.socket.af,
my->info.socket.type, protocol);
1071 }
else if (cfg->
path) {
1072 my->info.socket.af = AF_LOCAL;
1073 my->info.socket.type = SOCK_STREAM;
1074 my->info.socket.unix.path = cfg->
path;
1076 fd = socket(
my->info.socket.af,
my->info.socket.type, 0);
1092 my->info.socket.type = SOCK_STREAM;
1098 if (strcmp(cfg->
filename,
"/dev/stdout") == 0) {
1099 if (cfg->
flags != O_WRONLY) {
1105 fd = dup(STDOUT_FILENO);
1107 }
else if (strcmp(cfg->
filename,
"/dev/stderr") == 0) {
1108 if (cfg->
flags != O_WRONLY)
goto fail_dev;
1110 fd = dup(STDERR_FILENO);
1112 }
else if (strcmp(cfg->
filename,
"/dev/stdin") == 0) {
1113 if (cfg->
flags != O_RDONLY) {
1118 fd = dup(STDIN_FILENO);
1124 my->info.socket.fd = -1;
1145 my->info.cfg = NULL;
1154 rcode = fcntl(fd, F_GETFD);
1156 if (fcntl(fd, F_SETFD, rcode |
FD_CLOEXEC) < 0) {
1171 my->info.socket.fd = fd;
1176 my->info.type = cfg->
type;
1182 switch (cfg->
type) {
1190 if (
my->info.socket.type != SOCK_DGRAM) {
1191 fr_strerror_const(
"Failed configuring socket: unconnected sockets must be UDP");
1195 switch (
my->info.socket.af) {
1223 if (
my->info.socket.type == SOCK_DGRAM) {
1225 if (rcode < 0)
goto fail;
1227 }
else if ((
my->info.socket.af == AF_INET) || (
my->info.socket.af == AF_INET6)) {
1229 if (rcode < 0)
goto fail;
1232 switch (
my->info.socket.af) {
1264 setsockopt(
my->info.socket.fd, SOL_SOCKET, SO_NOSIGPIPE, &on,
sizeof(on));
1279 switch (
my->info.socket.af) {
1332 if (flags != O_RDONLY) flags |= O_CREAT;
1350 char *p = strrchr(cfg->
filename,
'/');
1353 if (!p)
goto do_open;
1363 fd = openat(dir_fd, p + 1, flags, cfg->
perm);
1373 if (
my->info.socket.fd < 0) {
1381 if (dup2(fd,
my->info.socket.fd) < 0) {
1388 return my->info.socket.fd;
#define UNCONST(_type, _ptr)
Remove const qualification from a pointer.
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
int fr_bio_fd_socket_name(fr_bio_fd_t *my)
int fr_bio_fd_init_connected(fr_bio_fd_t *my)
int fr_filename_to_sockaddr(struct sockaddr_un *sun, socklen_t *sunlen, char const *filename)
int fr_bio_fd_init_listen(fr_bio_fd_t *my)
int fr_bio_fd_init_common(fr_bio_fd_t *my)
uint16_t src_port
our port
@ FR_BIO_FD_ACCEPTED
temporarily until it's connected.
@ FR_BIO_FD_CONNECTED
connected client sockets (UDP or TCP)
@ FR_BIO_FD_INVALID
not set
@ FR_BIO_FD_UNCONNECTED
unconnected UDP / datagram only
@ FR_BIO_FD_LISTEN
returns new fd in buffer on fr_bio_read() or fr_bio_fd_accept()
uint32_t recv_buff
How big the kernel's receive buffer should be.
bool mkdir
make intermediate directories
@ FR_BIO_FD_STATE_CONNECTING
@ FR_BIO_FD_STATE_OPEN
error states must be before this
fr_ipaddr_t dst_ipaddr
their IP address
fr_bio_fd_type_t type
accept, connected, unconnected, etc.
char const * path
for Unix domain sockets
uint32_t send_buff
How big the kernel's send buffer should be.
char const * filename
for files
uid_t uid
who owns the socket
bool server
is this a client or a server?
gid_t gid
who owns the socket
char const * interface
for binding to an interface
mode_t perm
permissions for domain sockets
int socket_type
SOCK_STREAM or SOCK_DGRAM.
uint16_t dst_port
their port
bool tcp_delay
We do tcp_nodelay by default.
bool reuse_port
whether or not we re-use the same destination port for datagram sockets
fr_ipaddr_t src_ipaddr
our IP address
Configuration for sockets.
Run-time status of the socket.
static int fr_bio_fd_socket_unix_mkdir(int *dirfd, char const **filename, fr_bio_fd_config_t const *cfg)
static void fr_bio_fd_name(fr_bio_fd_t *my)
static int fr_bio_fd_socket_unix_verify(int dirfd, char const *filename, fr_bio_fd_config_t const *cfg)
Verify or clean up a pre-existing domain socket.
static void fr_bio_fd_unix_shutdown(fr_bio_t *bio)
static int fr_bio_fd_server_ipv6(int fd, fr_socket_t const *sock, fr_bio_fd_config_t const *cfg)
Initialize an IPv6 server socket.
static int fr_bio_fd_common_udp(int fd, fr_socket_t const *sock, fr_bio_fd_config_t const *cfg)
Initialize a UDP socket.
int fr_bio_fd_reopen(fr_bio_t *bio)
Reopen a file BIO.
static int fr_bio_fd_server_tcp(int fd, UNUSED fr_socket_t const *sock)
Initialize a TCP server socket.
static int fr_bio_fd_socket_bind_unix(fr_bio_fd_t *my, fr_bio_fd_config_t const *cfg)
Bind to a Unix domain socket.
static int fr_bio_fd_socket_bind(fr_bio_fd_t *my, fr_bio_fd_config_t const *cfg)
static int fr_bio_fd_server_ipv4(int fd, fr_socket_t const *sock, fr_bio_fd_config_t const *cfg)
Initialize an IPv4 server socket.
static int fr_bio_fd_common_tcp(int fd, UNUSED fr_socket_t const *sock, fr_bio_fd_config_t const *cfg)
Initialize common datagram information.
static int fr_bio_fd_socket_bind_to_device(fr_bio_fd_t *my, fr_bio_fd_config_t const *cfg)
This system is missing SO_BINDTODEVICE, IP_BOUND_IF, IPV6_BOUND_IF.
int fr_bio_fd_open(fr_bio_t *bio, fr_bio_fd_config_t const *cfg)
Opens a socket and updates sock->fd.
int fr_bio_fd_check_config(fr_bio_fd_config_t const *cfg)
Checks the configuration without modifying anything.
static int fr_bio_fd_common_datagram(int fd, UNUSED fr_socket_t const *sock, fr_bio_fd_config_t const *cfg)
Initialize common datagram information.
ssize_t fr_mkdir(int *fd_out, char const *path, ssize_t len, mode_t mode, fr_mkdir_func_t func, void *uctx)
Create directories that are missing in the specified path.
int fr_mkdir_chown(int fd, char const *path, void *uctx)
Callback for the common case of chown() of the directory.
int fr_dirfd(int *dirfd, char const **filename, char const *pathname)
From a pathname, return fd and filename needed for *at() functions.
int fr_ipaddr_to_sockaddr(struct sockaddr_storage *sa, socklen_t *salen, fr_ipaddr_t const *ipaddr, uint16_t port)
Convert our internal ip address representation to a sockaddr.
int fr_nonblock(UNUSED int fd)
char * fr_asprintf(TALLOC_CTX *ctx, char const *fmt,...)
Special version of asprintf which implements custom format specifiers.
static rc_request_t * current
uint32_t fr_rand(void)
Return a 32-bit random number.
int fr_socket_client_unix(UNUSED char const *path, UNUSED bool async)
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
int type
SOCK_STREAM, SOCK_DGRAM, etc.
Holds information necessary for binding or connecting to a socket.
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
#define fr_strerror_printf_push(_fmt,...)
Add a message to an existing stack of messages at the tail.
#define fr_strerror_const(_msg)
#define fr_box_ipaddr(_val)