The FreeRADIUS server $Id: 15bac2a4c627c01d1aa2047687b3418955ac7f00 $
Loading...
Searching...
No Matches
master.c
Go to the documentation of this file.
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License as published by
4 * the Free Software Foundation; either version 2 of the License, or
5 * (at your option) any later version.
6 *
7 * This program is distributed in the hope that it will be useful,
8 * but WITHOUT ANY WARRANTY; without even the implied warranty of
9 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
10 * GNU General Public License for more details.
11 *
12 * You should have received a copy of the GNU General Public License
13 * along with this program; if not, write to the Free Software
14 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
15 */
16
17/**
18 * $Id: 31c24b3e874190645e3a5e167b001290db192a43 $
19 * @file io/master.c
20 * @brief Master IO handler
21 *
22 * @copyright 2018 Alan DeKok (aland@freeradius.org)
23 */
24#include <freeradius-devel/io/listen.h>
25#include <freeradius-devel/io/master.h>
26
27#include <freeradius-devel/server/base.h>
28#include <freeradius-devel/server/module.h>
29#include <freeradius-devel/server/log.h>
30
31#include <freeradius-devel/util/debug.h>
32
33#include <freeradius-devel/util/misc.h>
34#include <freeradius-devel/util/syserror.h>
35
36typedef struct {
37 fr_event_list_t *el; //!< event list, for the master socket.
38 fr_network_t *nr; //!< network for the master socket
39
40 fr_trie_t *trie; //!< trie of clients
41 fr_heap_t *pending_clients; //!< heap of pending clients
42 fr_heap_t *alive_clients; //!< heap of active clients
43
44 fr_listen_t *listen; //!< The master IO path
45 fr_listen_t *child; //!< The child (app_io) IO path
46 fr_schedule_t *sc; //!< the scheduler
47
48 // @todo - count num_nak_clients, and num_nak_connections, too
49 uint32_t num_connections; //!< number of dynamic connections
50 uint32_t num_pending_packets; //!< number of pending packets
51 uint64_t client_id; //!< Unique client identifier.
52
53 struct {
54 fr_rate_limit_t accept_failed;
55 fr_rate_limit_t alloc_failed;
56 fr_rate_limit_t bad_type;
57 fr_rate_limit_t conn_alloc_failed;
58 fr_rate_limit_t max_connections;
59 fr_rate_limit_t queue_full;
60 fr_rate_limit_t repeat_nak;
61 fr_rate_limit_t too_many_pending;
62 fr_rate_limit_t tracking_failed;
63 fr_rate_limit_t unknown_client;
64 } rate_limit;
66
67/** A saved packet
68 *
69 */
78
79
80/** Client states
81 *
82 */
83typedef enum {
85 PR_CLIENT_STATIC, //!< static / global clients
86 PR_CLIENT_NAK, //!< negative cache entry
87 PR_CLIENT_DYNAMIC, //!< dynamically defined client
88 PR_CLIENT_CONNECTED, //!< dynamically defined client in a connected socket
89 PR_CLIENT_PENDING, //!< dynamic client pending definition
91
92/*
93 * Dynamic clients are run through the normal src/process/foo state machine.
94 *
95 * request->async->packet_ctx is an fr_io_track_t
96 *
97 * track->dynamic is set to a non-zero value.
98 *
99 * The dynamic client code returns a buffer of 1 byte for a NAK.
100 *
101 * If the client creation is successful, then it does talloc(NULL, fr_client_t),
102 * fills out the structure, and sends the pointer in the buffer (8 bytes).
103 *
104 * This code will take over ownership of the structure, and
105 * create the dynamic client.
106 */
107
109
110/** Client definitions for master IO
111 *
112 */
114 fr_io_connection_t *connection; //!< parent connection
115 fr_io_client_state_t state; //!< state of this client
116 fr_ipaddr_t src_ipaddr; //!< packets come from this address
117 fr_ipaddr_t network; //!< network for dynamic clients
118 fr_client_t *radclient; //!< old-style definition of this client
119
120 int packets; //!< number of packets using this client
121 fr_heap_index_t pending_id; //!< for pending clients
122 fr_heap_index_t alive_id; //!< for all clients
123
124 bool use_connected; //!< does this client allow connected sub-sockets?
125 bool ready_to_delete; //!< are we ready to delete this client?
126 bool in_trie; //!< is the client in the trie?
127
128 fr_io_instance_t const *inst; //!< parent instance for master IO handler
130 fr_timer_t *ev; //!< when we clean up the client
131 fr_rb_tree_t *table; //!< tracking table for packets
132
133 fr_heap_t *pending; //!< pending packets for this client
134 fr_hash_table_t *addresses; //!< list of src/dst addresses used by this client
135
136 pthread_mutex_t mutex; //!< for parent / child signaling
137 fr_hash_table_t *ht; //!< for tracking connected sockets
138};
139
140/** Track a connection
141 *
142 * This structure contains information about the connection,
143 * a pointer to the library instance so that we can clean up on exit,
144 * and the listener.
145 *
146 * It also points to a client structure which is for this connection,
147 * and only this connection.
148 *
149 * Finally, a pointer to the parent client, so that the child can
150 * tell the parent it's alive, and the parent can push packets to the
151 * child.
152 */
154 char const *name; //!< taken from proto_FOO_TRANSPORT
155 int packets; //!< number of packets using this connection
156 fr_io_address_t *address; //!< full information about the connection.
157 fr_listen_t *listen; //!< master listener for this socket
158 fr_listen_t *child; //!< child listener (app_io) for this socket
159 fr_io_client_t *client; //!< our local client (pending or connected).
160 fr_io_client_t *parent; //!< points to the parent client.
161 module_instance_t *mi; //!< for submodule
162
163 bool dead; //!< roundabout way to get the network side to close a socket
164 bool paused; //!< event filter doesn't like resuming something that isn't paused
165 bool in_parent_hash; //!< for tracking thread issues
166 fr_event_list_t *el; //!< event list for this connection
167 fr_network_t *nr; //!< network for this connection
168};
169
172 { 0 }
173};
174
177 { 0 }
178};
179
180static int track_free(fr_io_track_t *track)
181{
182 if (track->ev) (void) fr_timer_delete(&track->ev);
183
184 talloc_free_children(track);
185
186 fr_assert(track->client->packets > 0);
187 track->client->packets--;
188
189 return 0;
190}
191
193{
194 fr_assert(track->client->table != NULL);
195 fr_assert(fr_rb_find(track->client->table, track) != NULL);
196
197 if (!fr_rb_delete(track->client->table, track)) {
198 fr_assert(0);
199 }
200
201 return track_free(track);
202}
203
204/*
205 * Return negative numbers to put 'one' at the top of the heap.
206 * Return positive numbers to put 'two' at the top of the heap.
207 */
208static int8_t pending_packet_cmp(void const *one, void const *two)
209{
212 int ret;
213
214 /*
215 * Higher priority elements are larger than lower
216 * priority elements. So if "a" is larger than "b", we
217 * wish to prefer "a".
218 */
219 ret = CMP_PREFER_LARGER(a->priority, b->priority);
220 if (ret != 0) return ret;
221
222 /*
223 * Smaller numbers mean packets were received earlier.
224 * We want to process packets in time order. So if "a"
225 * is smaller than "b", we wish to prefer "a".
226 *
227 * After that, it doesn't really matter what order the
228 * packets go in. Since we'll never have two identical
229 * "recv_time" values, the code should never get here.
230 */
232}
233
234/*
235 * Order clients in the pending_clients heap, based on the
236 * packets that they contain.
237 */
238static int8_t pending_client_cmp(void const *one, void const *two)
239{
240 fr_io_pending_packet_t const *a;
241 fr_io_pending_packet_t const *b;
242
245
246 a = fr_heap_peek(c1->pending);
247 b = fr_heap_peek(c2->pending);
248
249 fr_assert(a != NULL);
250 fr_assert(b != NULL);
251
252 return pending_packet_cmp(a, b);
253}
254
255
256static int8_t address_cmp(void const *one, void const *two)
257{
260 int8_t ret;
261
262 CMP_RETURN(a, b, socket.inet.src_port);
263 CMP_RETURN(a, b, socket.inet.dst_port);
264 CMP_RETURN(a, b, socket.inet.ifindex);
265
266 ret = fr_ipaddr_cmp(&a->socket.inet.src_ipaddr, &b->socket.inet.src_ipaddr);
267 if (ret != 0) return ret;
268
269 return fr_ipaddr_cmp(&a->socket.inet.dst_ipaddr, &b->socket.inet.dst_ipaddr);
270}
271
272static uint32_t connection_hash(void const *ctx)
273{
276
277 hash = fr_hash(&c->address->socket.inet.src_ipaddr, sizeof(c->address->socket.inet.src_ipaddr));
278 hash = fr_hash_update(&c->address->socket.inet.src_port, sizeof(c->address->socket.inet.src_port), hash);
279
280 hash = fr_hash_update(&c->address->socket.inet.ifindex, sizeof(c->address->socket.inet.ifindex), hash);
281
282 hash = fr_hash_update(&c->address->socket.inet.dst_ipaddr, sizeof(c->address->socket.inet.dst_ipaddr), hash);
283 return fr_hash_update(&c->address->socket.inet.dst_port, sizeof(c->address->socket.inet.dst_port), hash);
284}
285
286static int8_t connection_cmp(void const *one, void const *two)
287{
290
291 return address_cmp(a->address, b->address);
292}
293
294
295static int8_t track_cmp(void const *one, void const *two)
296{
299 int ret;
300
301 fr_assert(a->client != NULL);
302 fr_assert(b->client != NULL);
303 fr_assert(a->client == b->client); /* tables are per-client */
304
307
308 /*
309 * Unconnected sockets must check src/dst ip/port.
310 */
311 ret = address_cmp(a->address, b->address);
312 if (ret != 0) return ret;
313
314 /*
315 * Call the per-protocol comparison function.
316 */
319 a->client->radclient,
320 a->packet, b->packet);
321 return CMP(ret, 0);
322}
323
324
325static int8_t track_connected_cmp(void const *one, void const *two)
326{
329 int ret;
330
331 fr_assert(a->client != NULL);
332 fr_assert(b->client != NULL);
333
336 fr_assert(a->client == b->client);
338
339 /*
340 * Note that we pass the connection "client", as
341 * we may do negotiation specific to this connection.
342 */
346 a->packet, b->packet);
347 return CMP(ret, 0);
348}
349
350
352{
353 fr_io_client_t *client;
354 fr_io_pending_packet_t *pending;
355
356 client = fr_heap_pop(&thread->pending_clients);
357 if (!client) {
358 fr_assert(thread->num_pending_packets == 0);
359
360 /*
361 * 99% of the time we don't have pending clients.
362 * So we might as well free this, so that the
363 * caller doesn't keep checking us for every packet.
364 */
366 thread->pending_clients = NULL;
367 return NULL;
368 }
369
370 pending = fr_heap_pop(&client->pending);
371 fr_assert(pending != NULL);
372
373 /*
374 * If the client has more packets pending, add it back to
375 * the heap.
376 */
377 if (fr_heap_num_elements(client->pending) > 0) {
378 if (fr_heap_insert(&thread->pending_clients, client) < 0) {
379 fr_assert(0 == 1);
380 }
381 }
382
383 fr_assert(thread->num_pending_packets > 0);
384 thread->num_pending_packets--;
385
386 return pending;
387}
388
389static fr_client_t *radclient_clone(TALLOC_CTX *ctx, fr_client_t const *parent)
390{
391 fr_client_t *c;
392
393 if (!parent) return NULL;
394
395 c = talloc_zero(ctx, fr_client_t);
396 if (!c) return NULL;
397
398 /*
399 * Do NOT set ipaddr or src_ipaddr. The caller MUST do this!
400 */
401
402#define DUP_FIELD(_x) do { if (parent->_x) {c->_x = talloc_strdup(c, parent->_x); if (!c->_x) {goto error;}}} while (0)
403#define COPY_FIELD(_x) c->_x = parent->_x
404
405 DUP_FIELD(longname);
406 DUP_FIELD(shortname);
408 DUP_FIELD(nas_type);
409 DUP_FIELD(server);
410 DUP_FIELD(nas_type);
411
412 COPY_FIELD(require_message_authenticator);
413 COPY_FIELD(require_message_authenticator_is_set);
414 COPY_FIELD(limit_proxy_state);
415 COPY_FIELD(limit_proxy_state_is_set);
416 COPY_FIELD(received_message_authenticator);
417 COPY_FIELD(first_packet_no_proxy_state);
418 /* dynamic MUST be false */
419 COPY_FIELD(server_cs);
420 COPY_FIELD(cs);
421 COPY_FIELD(proto);
422 COPY_FIELD(active);
423
424 COPY_FIELD(use_connected);
425
426#ifdef WITH_TLS
427 COPY_FIELD(tls_required);
428#endif
429
430 c->ipaddr = parent->ipaddr;
431 c->src_ipaddr = parent->src_ipaddr;
432
433 return c;
434
435 /*
436 * @todo - fill in other fields, too!
437 */
438
439error:
440 talloc_free(c);
441 return NULL;
442}
443#undef COPY_FIELD
444#undef DUP_FIELD
445
446
447/** Count the number of connections used by active clients.
448 *
449 * Unfortunately, we also count NAK'd connections, too, even if they
450 * are closed. The alternative is to walk through all connections
451 * for each client, which would be a long time.
452 */
453static int count_connections(UNUSED uint8_t const *key, UNUSED size_t keylen, void *data, void *ctx)
454{
455 fr_io_client_t *client = talloc_get_type_abort(data, fr_io_client_t);
456 int connections;
457
458 pthread_mutex_lock(&client->mutex);
459
460 if (!client->ht) {
461 pthread_mutex_unlock(&client->mutex);
462 return 0;
463 }
464
465 connections = fr_hash_table_num_elements(client->ht);
466 pthread_mutex_unlock(&client->mutex);
467
468 fr_assert(client->use_connected);
469 *((uint32_t *) ctx) += connections;
470
471 return 0;
472}
473
474
475static int _client_free(fr_io_client_t *client)
476{
477 TALLOC_FREE(client->pending);
478
479 return 0;
480}
481
483{
484 size_t num;
485
486 fr_assert(!client->connection);
487
488 if (!client->pending) return;
489
490 num = fr_heap_num_elements(client->pending);
491
492 fr_assert(client->thread->num_pending_packets >= num);
493 client->thread->num_pending_packets -= num;
494
495 TALLOC_FREE(client->pending);
496}
497
498
499static int connection_free(fr_io_connection_t *connection)
500{
501 /*
502 * This is it's own talloc context, as there are
503 * thousands of packets associated with it.
504 */
505 TALLOC_FREE(connection->client);
506
507 return 0;
508}
509
510/** Create a new connection.
511 *
512 * Called ONLY from the master socket.
513 */
515 fr_io_thread_t *thread,
516 fr_io_client_t *client, int fd,
517 fr_io_address_t *address,
519{
520 int ret;
521 fr_io_connection_t *connection;
522 module_instance_t *mi = NULL;
523 fr_listen_t *li;
524 fr_client_t *radclient;
525
526 /*
527 * Reload the app_io module as a "new" library. This
528 * causes the link count for the library to be correct.
529 * It also allocates a new instance data for it, too.
530 * Passing CONF_SECTION of NULL ensures that there's no
531 * config for it, as we'll just clone it's contents from
532 * the original. It also means that detach should be
533 * called when the instance data is freed.
534 */
535 if (!nak) {
536 CONF_SECTION *cs;
537 char *inst_name;
538
539 if (inst->max_connections || client->radclient->limit.max_connections) {
540 uint32_t max_connections = inst->max_connections ? inst->max_connections : client->radclient->limit.max_connections;
541
542 /*
543 * We've hit the connection limit. Walk
544 * over all clients with connections, and
545 * count the number of connections used.
546 */
547 if (thread->num_connections >= max_connections) {
548 thread->num_connections = 0;
549
550 (void) fr_trie_walk(thread->trie, &thread->num_connections, count_connections);
551
552 if ((thread->num_connections + 1) >= max_connections) {
553 RATE_LIMIT_LOCAL(&thread->rate_limit.max_connections, INFO,
554 "proto_%s - Ignoring connection from client %s - 'max_connections' limit reached.",
555 inst->app->common.name, client->radclient->shortname);
556 if (fd >= 0) close(fd);
557 return NULL;
558 }
559 }
560 }
561
562 /*
563 * Add a client module into a sublist
564 */
565 inst_name = talloc_asprintf(NULL, "%"PRIu64, thread->client_id++);
566 mi = module_instance_copy(inst->clients, inst->submodule, inst_name);
567
568 cs = cf_section_dup(mi, NULL, inst->submodule->conf,
569 cf_section_name1(inst->submodule->conf),
570 cf_section_name2(inst->submodule->conf), false);
571 if (module_instance_conf_parse(mi, cs) < 0) {
572 cf_log_err(inst->server_cs, "Failed parsing module config");
573 goto cleanup;
574 }
575
576 /* Thread local module lists never run bootstrap */
577 if (module_instantiate(mi) < 0) {
578 cf_log_err(inst->server_cs, "Failed instantiating module");
579 goto cleanup;
580 }
581
582 if (module_thread_instantiate(mi, mi, thread->el) < 0) {
583 cf_log_err(inst->server_cs, "Failed instantiating module");
584 goto cleanup;
585 }
586
587 /*
588 * FIXME - Instantiate the new module?!
589 */
590 talloc_free(inst_name);
591 fr_assert(mi != NULL);
592 } else {
593 mi = talloc_init_const("nak");
594 }
595
596 MEM(connection = talloc_zero(mi, fr_io_connection_t));
597 MEM(connection->address = talloc_memdup(connection, address, sizeof(*address)));
598 (void) talloc_set_name_const(connection->address, "fr_io_address_t");
599
600 connection->parent = client;
601 connection->mi = mi;
602
603 MEM(connection->client = talloc_named(NULL, sizeof(fr_io_client_t), "fr_io_client_t"));
604 memset(connection->client, 0, sizeof(*connection->client));
605
606 MEM(connection->client->radclient = radclient = radclient_clone(connection->client, client->radclient));
607
608 talloc_set_destructor(connection->client, _client_free);
609 talloc_set_destructor(connection, connection_free);
610
613 connection->client->connection = connection;
614
615 /*
616 * Create the packet tracking table for this client.
617 *
618 * #todo - unify the code with static clients?
619 */
620 if (inst->app_io->track_duplicates) {
621 MEM(connection->client->table = fr_rb_inline_talloc_alloc(client, fr_io_track_t, node,
622 track_connected_cmp, NULL));
623 }
624
625 /*
626 * Set this radclient to be dynamic, and active.
627 */
628 radclient->dynamic = true;
629 radclient->active = true;
630
631 /*
632 * address->socket.inet.client points to a "static" client. We want
633 * to clean up everything associated with the connection
634 * when it closes. So we need to point to our own copy
635 * of the client here.
636 */
637 connection->address->radclient = connection->client->radclient;
638 connection->client->inst = inst;
639 connection->client->thread = thread;
640
641 /*
642 * Create a heap for packets which are pending for this
643 * client.
644 */
645 MEM(connection->client->pending = fr_heap_alloc(connection->client, pending_packet_cmp,
646 fr_io_pending_packet_t, heap_id, 0));
647
648 /*
649 * Clients for connected sockets are always a /32 or /128.
650 */
651 connection->client->src_ipaddr = address->socket.inet.src_ipaddr;
652 connection->client->network = address->socket.inet.src_ipaddr;
653
654 /*
655 * Don't initialize mutex or hash table.
656 * Connections cannot spawn other connections.
657 */
658
659 /*
660 * If this client state is pending, then the connection
661 * state is pending, too. That allows NAT gateways to be
662 * defined dynamically, AND for them to have multiple
663 * connections, each with a different client. This
664 * allows for different shared secrets to be used for
665 * different connections. Once the client gets defined
666 * for this connection, it will be either "connected" or
667 * not. If connected, then the parent client remains
668 * PENDING. Otherwise, the parent client is moved to
669 * DYNAMIC
670 *
671 * If this client state is static or dynamic,
672 * then we're just using connected sockets behind
673 * that client. The connections here all use the
674 * same shared secret, but they use different
675 * sockets, so they allow for sharing of IO
676 * across CPUs / threads.
677 */
678 switch (client->state) {
680 connection->client->state = PR_CLIENT_PENDING;
681
682 /*
683 * Needed for rlm_radius, which refuses to proxy packets
684 * that define a dynamic client.
685 */
686 radclient->active = false;
687 break;
688
689 case PR_CLIENT_STATIC:
691 connection->client->state = PR_CLIENT_CONNECTED;
692 break;
693
695 case PR_CLIENT_NAK:
697 fr_assert(0 == 1);
698 goto cleanup;
699 }
700
701 if (!nak) {
702 /*
703 * Get the child listener.
704 */
705 MEM(li = connection->child = talloc(connection, fr_listen_t));
706 memcpy(li, thread->listen, sizeof(*li));
707
708 /*
709 * Glue in the actual app_io
710 */
711 li->connected = true;
712 li->app_io = thread->child->app_io;
713 li->thread_instance = connection;
714 li->app_io_instance = mi->data;
716
717 /*
718 * Create writable thread instance data.
719 */
720 connection->child->thread_instance = talloc_zero_array(NULL, uint8_t,
721 inst->app_io->common.thread_inst_size);
722 talloc_set_destructor(connection->child, fr_io_listen_free);
723 talloc_set_name(connection->child->thread_instance, "proto_%s_thread_t",
724 inst->app_io->common.name);
725
726 /*
727 * This is "const", and the user can't
728 * touch it. So we just reuse the same
729 * configuration everywhere.
730 */
731 connection->child->app_io_instance = inst->app_io_instance;
732
733 /*
734 * Create the listener, based on our listener.
735 */
736 MEM(li = connection->listen = talloc(connection, fr_listen_t));
737
738 /*
739 * Note that our instance is effectively 'const'.
740 *
741 * i.e. we can't add things to it. Instead, we have to
742 * put all variable data into the connection.
743 */
744 memcpy(li, thread->listen, sizeof(*li));
745
746 /*
747 * Glue in the connection to the listener.
748 */
750
751 li->connected = true;
752 li->thread_instance = connection;
755
756 /*
757 * Instantiate the child, and open the socket.
758 */
759 fr_assert(inst->app_io->connection_set != NULL);
760
761 if (inst->app_io->connection_set(connection->child, connection->address) < 0) {
762 DEBUG("proto_%s - Failed setting connection for socket.", inst->app->common.name);
763 goto cleanup;
764 }
765
766 /*
767 * UDP sockets: open a new socket, and then
768 * connect it to the client. This emulates the
769 * behavior of accept().
770 *
771 * Note that there is a small window between the
772 * bind() and connect() where UDP packets for the
773 * wildcard socket can get received by this
774 * socket. We hope that this time frame is as
775 * small as possible.
776 *
777 * i.e. we ignore the problem, and don't
778 * currently check dst ip/port for UDP packets
779 * received on connected sockets.
780 */
781 if (fd < 0) {
782 socklen_t salen;
783 struct sockaddr_storage src;
784
785 if (fr_ipaddr_to_sockaddr(&src, &salen,
786 &connection->address->socket.inet.src_ipaddr,
787 connection->address->socket.inet.src_port) < 0) {
788 DEBUG("proto_%s - Failed getting IP address", inst->app->common.name);
789 talloc_free(mi);
790 return NULL;
791 }
792
793 if (inst->app_io->open(connection->child) < 0) {
794 DEBUG("proto_%s - Failed opening connected socket.", inst->app->common.name);
795 talloc_free(mi);
796 return NULL;
797 }
798
799 fd = connection->child->fd;
800
801 if (connect(fd, (struct sockaddr *) &src, salen) < 0) {
802 ERROR("proto_%s - Failed in connect: %s", inst->app->common.name, fr_syserror(errno));
803 goto cleanup;
804 }
805 } else {
806 connection->child->fd = fd;
807 }
808
809 /*
810 * Set the new FD, and get the module to set it's connection name.
811 */
812 if (inst->app_io->fd_set(connection->child, fd) < 0) {
813 DEBUG3("Failed setting FD to %s", inst->app_io->common.name);
814 goto cleanup;
815 }
816
817 li->fd = fd;
818
819 if (!inst->app_io->get_name) {
820 connection->name = fr_asprintf(connection, "proto_%s from client %pV port "
821 "%u to server %pV port %u",
822 inst->app->common.name,
823 fr_box_ipaddr(connection->address->socket.inet.src_ipaddr),
824 connection->address->socket.inet.src_port,
825 fr_box_ipaddr(connection->address->socket.inet.dst_ipaddr),
826 connection->address->socket.inet.dst_port);
827 } else {
828 connection->name = inst->app_io->get_name(connection->child);
829 }
830
831 /*
832 * Set the names for the listeners.
833 */
834 connection->listen->name = connection->name;
835 connection->child->name = connection->name;
836 }
837
838 /*
839 * Add the connection to the set of connections for this
840 * client.
841 */
842 pthread_mutex_lock(&client->mutex);
843 if (client->ht) {
844 if (nak) (void) fr_hash_table_delete(client->ht, nak);
845 ret = fr_hash_table_insert(client->ht, connection);
846 client->ready_to_delete = false;
847 connection->in_parent_hash = true;
848
849 if (!ret) {
850 pthread_mutex_unlock(&client->mutex);
851 ERROR("proto_%s - Failed inserting connection into tracking table. "
852 "Closing it, and discarding all packets for connection %s.",
853 inst->app_io->common.name, connection->name);
854 goto cleanup;
855 }
856 }
857 pthread_mutex_unlock(&client->mutex);
858
859 /*
860 * It's a NAK client. Set the state to NAK, and don't
861 * add it to the scheduler.
862 */
863 if (nak) {
864 INFO("proto_%s - Verification failed for packet from dynamic client %pV - adding IP address to the NAK cache",
865 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr));
866
867 connection->name = talloc_strdup(connection, nak->name);
868 connection->client->state = PR_CLIENT_NAK;
869 connection->el = nak->el;
870 return connection;
871 }
872
873 DEBUG("proto_%s - starting connection %s", inst->app_io->common.name, connection->name);
874 connection->nr = fr_schedule_listen_add(thread->sc, connection->listen);
875 if (!connection->nr) {
876 ERROR("proto_%s - Failed inserting connection into scheduler. "
877 "Closing it, and diuscarding all packets for connection %s.",
878 inst->app_io->common.name, connection->name);
879 pthread_mutex_lock(&client->mutex);
880 if (client->ht) (void) fr_hash_table_delete(client->ht, connection);
881 pthread_mutex_unlock(&client->mutex);
882
883 cleanup:
884 if (fd >= 0) close(fd);
885 talloc_free(mi);
886 return NULL;
887 }
888
889 /*
890 * We have one more connection. Note that we do
891 * NOT decrement this counter when a connection
892 * closes, as the close is done in a child
893 * thread. Instead, we just let counter hit the
894 * limit, and then walk over the clients to reset
895 * the count.
896 */
897 thread->num_connections++;
898
899 return connection;
900}
901
902
903/*
904 * And here we go into the rabbit hole...
905 *
906 * @todo future - have a similar structure
907 * fr_io_connection_io, which will duplicate some code,
908 * but may make things simpler?
909 */
910static void get_inst(fr_listen_t *li, fr_io_instance_t const **inst, fr_io_thread_t **thread,
911 fr_io_connection_t **connection, fr_listen_t **child)
912{
913 if (!li->connected) {
914 *inst = li->app_io_instance;
915 if (thread) *thread = li->thread_instance;
916 *connection = NULL;
917 if (child) *child = ((fr_io_thread_t *)li->thread_instance)->child;
918
919 } else {
920 fr_assert(connection != NULL);
921
922 *connection = li->thread_instance;
923 *inst = (*connection)->client->inst;
924 if (thread) *thread = NULL;
925 if (child) *child = (*connection)->child;
926 }
927}
928
929
930static fr_client_t *radclient_alloc(TALLOC_CTX *ctx, int ipproto, fr_io_address_t *address)
931{
932 fr_client_t *radclient;
933 char *shortname;
934
935 MEM(radclient = talloc_zero(ctx, fr_client_t));
936
937 fr_value_box_aprint(radclient, &shortname, fr_box_ipaddr(address->socket.inet.src_ipaddr), NULL);
938 radclient->longname = radclient->shortname = shortname;
939
940 radclient->secret = radclient->nas_type = talloc_strdup(radclient, "");
941
942 radclient->ipaddr = address->socket.inet.src_ipaddr;
943
944 radclient->src_ipaddr = address->socket.inet.dst_ipaddr;
945
946 radclient->proto = ipproto;
947 radclient->dynamic = true;
948
949 return radclient;
950}
951
952/*
953 * Remove a client from the list of "live" clients.
954 *
955 * This function is only used for the "main" socket. Clients
956 * from connections do not use it.
957 */
959{
960 talloc_get_type_abort(client, fr_io_client_t);
961
962 fr_assert(client->in_trie);
963 fr_assert(!client->connection);
964 fr_assert(client->thread);
965
966 if (client->pending) client_pending_free(client);
967
968 (void) fr_trie_remove_by_key(client->thread->trie, &client->src_ipaddr.addr, client->src_ipaddr.prefix);
969
970 if (client->thread->alive_clients) {
972 (void) fr_heap_extract(&client->thread->alive_clients, client);
973 }
974
975 return 0;
976}
977
978/** Allocate a dynamic client.
979 *
980 */
981static fr_io_client_t *client_alloc(TALLOC_CTX *ctx, fr_io_client_state_t state,
982 fr_io_instance_t const *inst, fr_io_thread_t *thread, fr_client_t *radclient,
983 fr_ipaddr_t const *network)
984{
985 fr_io_client_t *client;
986
987 /*
988 * Create our own local client. This client
989 * holds our state which really shouldn't go into
990 * fr_client_t.
991 *
992 * Note that we create a new top-level talloc
993 * context for this client, as there may be tens
994 * of thousands of packets associated with this
995 * client. And we want to avoid problems with
996 * O(N) issues in talloc.
997 */
998 MEM(client = talloc_named(ctx, sizeof(fr_io_client_t), "fr_io_client_t"));
999 memset(client, 0, sizeof(*client));
1000
1001 client->state = state;
1002 client->src_ipaddr = radclient->ipaddr;
1003 client->radclient = radclient;
1004 client->inst = inst;
1005 client->thread = thread;
1006
1007 if (network) {
1008 client->network = *network;
1009 } else {
1010 client->network = client->src_ipaddr;
1011 }
1012
1013 /*
1014 * At this point, this variable can only be true
1015 * for STATIC clients. PENDING clients may set
1016 * it to true later, after they've been defined.
1017 */
1018 client->use_connected = radclient->use_connected;
1019
1020 /*
1021 * Create the pending heap for pending clients.
1022 */
1023 if (state == PR_CLIENT_PENDING) {
1024 MEM(client->pending = fr_heap_alloc(client, pending_packet_cmp,
1025 fr_io_pending_packet_t, heap_id, 0));
1026 }
1027
1028 /*
1029 * Create the packet tracking table for this client.
1030 */
1031 if (inst->app_io->track_duplicates) {
1032 fr_assert(inst->app_io->track_compare != NULL);
1033 MEM(client->table = fr_rb_inline_talloc_alloc(client, fr_io_track_t, node, track_cmp, NULL));
1034 }
1035
1036 /*
1037 * Allow connected sockets to be set on a
1038 * per-client basis.
1039 */
1040 if (client->use_connected) {
1041 fr_assert(client->state == PR_CLIENT_STATIC);
1042
1043 (void) pthread_mutex_init(&client->mutex, NULL);
1044 MEM(client->ht = fr_hash_table_alloc(client, connection_hash, connection_cmp, NULL));
1045 }
1046
1047 /*
1048 * Add the newly defined client to the trie of
1049 * allowed clients.
1050 */
1051 if (fr_trie_insert_by_key(thread->trie, &client->src_ipaddr.addr, client->src_ipaddr.prefix, client)) {
1052 ERROR("proto_%s - Failed inserting client %s into tracking table. Discarding client, and all packets for it.",
1053 inst->app_io->common.name, client->radclient->shortname);
1054 talloc_free(client);
1055 return NULL;
1056 }
1057
1058 client->in_trie = true;
1059
1060 /*
1061 * Track the live clients so that we can clean
1062 * them up.
1063 */
1064 (void) fr_heap_insert(&thread->alive_clients, client);
1066
1067 /*
1068 * Now that we've inserted it into the heap and
1069 * incremented the numbers, set the destructor
1070 * function.
1071 */
1072 talloc_set_destructor(client, _client_live_free);
1073
1074 return client;
1075}
1076
1077
1079 fr_io_address_t *address,
1080 uint8_t const *packet, size_t packet_len,
1081 fr_time_t recv_time, bool *is_dup)
1082{
1083 size_t len;
1084 fr_io_track_t *track, *old;
1085 fr_io_address_t *my_address;
1086
1087 *is_dup = false;
1088
1089 /*
1090 * Allocate a new tracking structure. Most of the time
1091 * there are no duplicates, so this is fine.
1092 */
1093 MEM(track = talloc_zero_pooled_object(client, fr_io_track_t, 1, sizeof(*track) + sizeof(track->address) + 64));
1094 MEM(track->address = my_address = talloc_zero(track, fr_io_address_t));
1095
1096 memcpy(my_address, address, sizeof(*address));
1097 my_address->radclient = client->radclient;
1098
1099 track->client = client;
1100 if (client->connection) {
1101 track->address = client->connection->address;
1102 }
1103
1104 track->timestamp = recv_time;
1105 track->packets = 1;
1106
1107 /*
1108 * We're not tracking duplicates, so just return the
1109 * tracking entry. This tracks src/dst IP/port, client,
1110 * receive time, etc.
1111 */
1112 if (!client->inst->app_io->track_duplicates) {
1113 client->packets++;
1114 talloc_set_destructor(track, track_free);
1115 return track;
1116 }
1117
1118 /*
1119 * We are checking for duplicates, see if there is a dup
1120 * already in the tree.
1121 */
1122 track->packet = client->inst->app_io->track_create(client->inst->app_io_instance,
1123 client->thread->child->thread_instance,
1124 client->radclient,
1125 track, packet, packet_len);
1126 if (!track->packet) {
1127 talloc_free(track);
1128 return NULL;
1129 }
1130
1131 /*
1132 * No existing duplicate. Return the new tracking entry.
1133 */
1134 old = fr_rb_find(client->table, track);
1135 if (!old) goto do_insert;
1136
1137 fr_assert(old->client == client);
1138
1139 /*
1140 * It cannot be both in the free list and in the tracking table.
1141 *
1142 * 2020-08-17, this assertion fails randomly in travis.
1143 * Which means that "track" was in the free list, *and*
1144 * in the rbtree.
1145 */
1146 fr_assert(old != track);
1147
1148 /*
1149 * The new packet has the same dedup fields as the old
1150 * one, BUT it may be a conflicting packet. Check for
1151 * that via a simple memcmp().
1152 *
1153 * It's an exact duplicate. Drop the new one and
1154 * use the old one.
1155 *
1156 * If there's a cached reply, the caller will take care
1157 * of sending it to the network layer.
1158 */
1159 len = talloc_array_length(old->packet);
1160 if ((len == talloc_array_length(track->packet)) &&
1161 (memcmp(old->packet, track->packet, len) == 0)) {
1162 fr_assert(old != track);
1163
1164 /*
1165 * Ignore duplicates while the client is
1166 * still pending.
1167 */
1168 if (client->state == PR_CLIENT_PENDING) {
1169 DEBUG("Ignoring duplicate packet while client %s is still pending dynamic definition",
1170 client->radclient->shortname);
1171 return NULL;
1172 }
1173
1174 *is_dup = true;
1175 old->packets++;
1176 talloc_free(track);
1177
1178 /*
1179 * Retransmits can sit in the outbound queue for
1180 * a while. We don't want to time out this
1181 * struct while the packet is in the outbound
1182 * queue.
1183 */
1184 if (old->ev) (void) fr_timer_delete(&old->ev);
1185 return old;
1186 }
1187
1188 /*
1189 * Else it's a conflicting packet. Which is OK if we
1190 * already have a reply. We just delete the old entry,
1191 * and insert the new one.
1192 *
1193 * If there's no reply, then the old request is still
1194 * "live". Delete the old one from the tracking tree,
1195 * and return the new one.
1196 */
1197 if (old->reply_len || old->do_not_respond) {
1198 talloc_free(old);
1199
1200 } else {
1201 fr_assert(client == old->client);
1202
1203 if (!fr_rb_delete(client->table, old)) {
1204 fr_assert(0);
1205 }
1206 if (old->ev) (void) fr_timer_delete(&old->ev);
1207
1208 talloc_set_destructor(old, track_free);
1209
1210 old->discard = true; /* don't send any reply, there's nowhere for it to go */
1211 }
1212
1213do_insert:
1214 if (!fr_rb_insert(client->table, track)) {
1215 fr_assert(0);
1216 }
1217
1218 client->packets++;
1219 talloc_set_destructor(track, track_dedup_free);
1220 return track;
1221}
1222
1223
1225{
1226 fr_io_track_t *track = pending->track;
1227
1228 /*
1229 * Note that we don't check timestamps, replies, etc. If
1230 * a packet is pending, then any conflicting packet gets
1231 * the "pending" entry marked as such, and a new entry
1232 * added. Any duplicate packet gets suppressed. And
1233 * because the packets are pending, track->reply MUST be
1234 * NULL.
1235 */
1236 fr_assert(track->packets > 0);
1237 track->packets--;
1238
1239 /*
1240 * No more packets using this tracking entry,
1241 * delete it.
1242 */
1243 if (track->packets == 0) talloc_free(track);
1244
1245 return 0;
1246}
1247
1249 uint8_t const *buffer, size_t packet_len,
1250 fr_io_track_t *track,
1251 int priority)
1252{
1253 fr_io_pending_packet_t *pending;
1254
1255 MEM(pending = talloc_zero(client->pending, fr_io_pending_packet_t));
1256
1257 MEM(pending->buffer = talloc_memdup(pending, buffer, packet_len));
1258 pending->buffer_len = packet_len;
1259 pending->priority = priority;
1260 pending->track = track;
1261 pending->recv_time = track->timestamp; /* there can only be one */
1262
1263 talloc_set_destructor(pending, pending_free);
1264
1265 /*
1266 * Insert the pending packet for this client. If it
1267 * fails, silently discard the packet.
1268 */
1269 if (fr_heap_insert(&client->pending, pending) < 0) {
1270 talloc_free(pending);
1271 return NULL;
1272 }
1273
1274 /*
1275 * We only track pending packets for the
1276 * main socket. For connected sockets,
1277 * we pause the FD, so the number of
1278 * pending packets will always be small.
1279 */
1280 if (!connection) client->thread->num_pending_packets++;
1281
1282 return pending;
1283}
1284
1285
1286/*
1287 * Order clients in the alive_clients heap, based on their IP
1288 * address.
1289 *
1290 * This function is only used for the "main" socket. Clients
1291 * from connections do not use it.
1292 */
1293static int8_t alive_client_cmp(void const *one, void const *two)
1294{
1297
1298 return fr_ipaddr_cmp(&a->src_ipaddr, &b->src_ipaddr);
1299}
1300
1301/** Implement 99% of the read routines.
1302 *
1303 * The app_io->read does the transport-specific data read.
1304 */
1305static ssize_t mod_read(fr_listen_t *li, void **packet_ctx, fr_time_t *recv_time_p,
1306 uint8_t *buffer, size_t buffer_len, size_t *leftover)
1307{
1308 fr_io_instance_t const *inst;
1309 fr_io_thread_t *thread;
1310 ssize_t packet_len = -1;
1311 fr_time_t recv_time = fr_time_wrap(0);
1312 fr_io_client_t *client;
1313 fr_io_address_t address;
1314 fr_io_connection_t my_connection, *connection;
1315 fr_io_pending_packet_t *pending = NULL;
1316 fr_io_track_t *track;
1317 fr_listen_t *child;
1318 int value, accept_fd = -1;
1319 uint32_t priority = PRIORITY_NORMAL;
1320
1321/** Log that we ignore clients in debug mode, or when it's enabled for a listener
1322 */
1323#define LOG_IGNORED_CLIENTS(_inst) ((_inst)->log_ignored_clients || fr_debug_lvl >= 1)
1324
1325 get_inst(li, &inst, &thread, &connection, &child);
1326
1327 track = NULL;
1328
1329 /*
1330 * There was data left over from the previous read, go
1331 * get the rest of it now. We MUST do this instead of
1332 * popping a pending packet, because the leftover bytes
1333 * are already in the output buffer.
1334 */
1335 if (*leftover) goto do_read;
1336
1337redo:
1338 /*
1339 * Read one pending packet. The packet may be pending
1340 * because of dynamic client definitions, or because it's
1341 * for a connected UDP socket, and was sent over by the
1342 * "master" UDP socket.
1343 */
1344 if (connection) {
1345 /*
1346 * The connection is dead. Tell the network side
1347 * to close it.
1348 */
1349 if (connection->dead) {
1350 DEBUG("Dead connection %s", connection->name);
1351 return -1;
1352 }
1353
1354 pending = fr_heap_pop(&connection->client->pending);
1355
1356 } else if (thread->pending_clients) {
1357 pending = pending_packet_pop(thread);
1358
1359 } else {
1360 pending = NULL;
1361 }
1362
1363 if (pending) {
1364 fr_assert(buffer_len >= pending->buffer_len);
1365 track = pending->track;
1366
1367 /*
1368 * Clear the destructor as we now own the
1369 * tracking entry.
1370 */
1371 talloc_set_destructor(pending, NULL);
1372
1373 /*
1374 * We received a conflicting packet while this
1375 * packet was pending. Discard this entry and
1376 * try to get another one.
1377 *
1378 * Note that the pending heap is *simple*. We
1379 * just track priority and recv_time. This means
1380 * it's fast, but also that it's hard to look up
1381 * random packets in the pending heap.
1382 */
1383 if (fr_time_neq(pending->recv_time, track->timestamp)) {
1384 DEBUG3("Discarding old packet");
1385 TALLOC_FREE(pending);
1386 goto redo;
1387 }
1388
1389 /*
1390 * We have a valid packet. Copy it over to the
1391 * caller, and return.
1392 */
1393 *packet_ctx = track;
1394 *leftover = 0;
1395 recv_time = *recv_time_p = pending->recv_time;
1396 client = track->client;
1397
1398 memcpy(buffer, pending->buffer, pending->buffer_len);
1399 packet_len = pending->buffer_len;
1400
1401 /*
1402 * Shouldn't be necessary, but what the heck...
1403 */
1404 memcpy(&address, track->address, sizeof(address));
1405 TALLOC_FREE(pending);
1406
1407 /*
1408 * Skip over all kinds of logic to find /
1409 * allocate the client, when we don't need to do
1410 * it any more.
1411 */
1412 goto have_client;
1413
1414 } else if (!connection && (inst->ipproto == IPPROTO_TCP)) {
1415 struct sockaddr_storage saremote;
1416 socklen_t salen;
1417
1418 salen = sizeof(saremote);
1419
1420 /*
1421 * We're a TCP socket but are NOT connected. We
1422 * must be the master socket. Accept the new
1423 * connection, and figure out src/dst IP/port.
1424 */
1425 accept_fd = accept(child->fd,
1426 (struct sockaddr *) &saremote, &salen);
1427
1428 /*
1429 * Couldn't open a NEW socket, but THIS ONE is
1430 * OK. So don't return -1.
1431 */
1432 if (accept_fd < 0) {
1433 RATE_LIMIT_LOCAL(&thread->rate_limit.accept_failed,
1434 INFO, "proto_%s - failed to accept new socket: %s",
1435 inst->app->common.name, fr_syserror(errno));
1436 return 0;
1437 }
1438
1439 /*
1440 * Set the new descriptor to be non-blocking.
1441 */
1442 (void) fr_nonblock(accept_fd);
1443
1444#ifdef STATIC_ANALYZER
1445 saremote.ss_family = AF_INET; /* static analyzer doesn't know that accept() initializes this */
1446#endif
1447
1448 /*
1449 * Get IP addresses only if we have IP addresses.
1450 */
1451 if ((saremote.ss_family == AF_INET) || (saremote.ss_family == AF_INET6)) {
1452 memset(&address.socket, 0, sizeof(address.socket));
1453 (void) fr_ipaddr_from_sockaddr(&address.socket.inet.src_ipaddr, &address.socket.inet.src_port,
1454 &saremote, salen);
1455 salen = sizeof(saremote);
1456
1457 /*
1458 * @todo - only if the local listen address is "*".
1459 */
1460 (void) getsockname(accept_fd, (struct sockaddr *) &saremote, &salen);
1461 (void) fr_ipaddr_from_sockaddr(&address.socket.inet.dst_ipaddr, &address.socket.inet.dst_port,
1462 &saremote, salen);
1463 address.socket.type = (inst->ipproto == IPPROTO_TCP) ? SOCK_STREAM : SOCK_DGRAM;
1464 address.socket.fd = accept_fd;
1465 }
1466
1467 } else {
1468 fr_io_address_t *local_address;
1469
1470 /*
1471 * We're either not a TCP socket, or we are a
1472 * connected TCP socket. Just read it.
1473 */
1474do_read:
1475 local_address = &address;
1476
1477 /*
1478 * @todo - For connected TCP sockets which are
1479 * dynamically defined, the app_io read()
1480 * function should stop reading the socket if the
1481 * server is busy. That change puts TCP
1482 * backpressure on the client.
1483 *
1484 * @todo TLS - for TLS and dynamic sockets, do
1485 * the SSL setup here, but have a structure which
1486 * describes the TLS data and run THAT through
1487 * the dynamic client definition, instead of
1488 * using normal packets. Or, rely on the app_io
1489 * read() function to do all TLS work? Given
1490 * that some protocols have "starttls" beginning
1491 * after a clear-text exchange, it's likely best
1492 * to have yet another layer of trampoline
1493 * functions which do all of the TLS work.
1494 */
1495 packet_len = inst->app_io->read(child, (void **) &local_address, &recv_time,
1496 buffer, buffer_len, leftover);
1497 if (packet_len <= 0) {
1498 return packet_len;
1499 }
1500
1501 /*
1502 * Not allowed? Discard it. The priority()
1503 * function has done any complaining, if
1504 * necessary.
1505 */
1506 if (inst->app->priority) {
1507 value = inst->app->priority(inst->app_instance, buffer, packet_len);
1508 if (value <= 0) {
1509 static fr_rate_limit_t bad_type;
1510
1511 /*
1512 * @todo - unix sockets. We need to use
1513 * the "name" of the socket, in the
1514 * listener?
1515 */
1517 RATE_LIMIT_LOCAL(thread ? &thread->rate_limit.bad_type : &bad_type, INFO,
1518 "proto_%s - ignoring packet from IP %pV. It is not configured as 'type = ...'",
1519 inst->app_io->common.name, fr_box_ipaddr(address.socket.inet.src_ipaddr));
1520 }
1521 return 0;
1522 }
1523 priority = value;
1524 }
1525
1526 /*
1527 * If the connection is pending, pause reading of
1528 * more packets. If mod_write() accepts the
1529 * connection, it will resume reading.
1530 * Otherwise, it will close the socket without
1531 * resuming it.
1532 */
1533 if (connection &&
1534 (connection->client->state == PR_CLIENT_PENDING)) {
1535 fr_assert(!connection->paused);
1536
1537 connection->paused = true;
1538 (void) fr_event_filter_update(connection->el,
1539 child->fd,
1541 }
1542 }
1543
1544 /*
1545 * Look up the client, unless we already have one (for a
1546 * connected socket).
1547 */
1548 if (!connection) {
1549 client = fr_trie_lookup_by_key(thread->trie,
1550 &address.socket.inet.src_ipaddr.addr, address.socket.inet.src_ipaddr.prefix);
1551 fr_assert(!client || !client->connection);
1552
1553 } else {
1554 client = connection->client;
1555
1556 /*
1557 * We don't care what the read function says
1558 * about address. We have it already.
1559 */
1560 address = *connection->address;
1561 }
1562
1563 /*
1564 * Negative cache entry. Drop the packet.
1565 */
1566 if (client && client->state == PR_CLIENT_NAK) {
1567 if (accept_fd >= 0) close(accept_fd);
1568 return 0;
1569 }
1570
1571 /*
1572 * If there's no client, try to pull one from the global
1573 * / static client list. Or if dynamic clients are
1574 * allowed, try to define a dynamic client.
1575 */
1576 if (!client) {
1577 fr_client_t *radclient = NULL;
1579 fr_ipaddr_t const *network = NULL;
1580 char const *error;
1581
1582 /*
1583 * We MUST be the master socket.
1584 */
1585 fr_assert(!connection);
1586
1587 radclient = inst->app_io->client_find(thread->child, &address.socket.inet.src_ipaddr, inst->ipproto);
1588 if (radclient) {
1589 state = PR_CLIENT_STATIC;
1590
1591 /*
1592 * Make our own copy that we can modify it.
1593 */
1594 MEM(radclient = radclient_clone(thread, radclient));
1595 radclient->active = true;
1596
1597 } else if (inst->dynamic_clients) {
1598 if (inst->max_clients && (fr_heap_num_elements(thread->alive_clients) >= inst->max_clients)) {
1599 error = "Too many dynamic clients have been defined";
1600 goto ignore;
1601 }
1602
1603 /*
1604 * Look up the allowed networks.
1605 */
1606 network = fr_trie_lookup_by_key(inst->networks, &address.socket.inet.src_ipaddr.addr,
1607 address.socket.inet.src_ipaddr.prefix);
1608 if (!network) {
1609 error = "Address is outside of the the 'allow' network range";
1610 goto ignore;
1611 }
1612
1613 /*
1614 * It exists, but it's a "deny" rule, ignore it.
1615 */
1616 if (network->af == AF_UNSPEC) {
1617 error = "Address is forbidden by the 'deny' network range";
1618 goto ignore;
1619 }
1620
1621 /*
1622 * Allocate our local radclient as a
1623 * placeholder for the dynamic client.
1624 */
1625 radclient = radclient_alloc(thread, inst->ipproto, &address);
1626 state = PR_CLIENT_PENDING;
1627
1628 } else {
1629 char const *msg;
1630
1631 error = "No matching 'client' definition was found";
1632
1633 ignore:
1634 if (accept_fd < 0) {
1635 msg = "packet";
1636 } else {
1637 msg = "connection attempt";
1638 close(accept_fd);
1639 }
1640
1642 static fr_rate_limit_t unknown_client;
1643 RATE_LIMIT_LOCAL(thread ? &thread->rate_limit.unknown_client : &unknown_client,
1644 ERROR, "proto_%s - Ignoring %s from IP address %pV - %s",
1645 inst->app_io->common.name, msg, fr_box_ipaddr(address.socket.inet.src_ipaddr),
1646 error);
1647 }
1648
1649 return 0;
1650 }
1651
1652 MEM(client = client_alloc(thread, state, inst, thread, radclient, network));
1653 }
1654
1655have_client:
1656 fr_assert(client->state != PR_CLIENT_INVALID);
1657 fr_assert(client->state != PR_CLIENT_NAK);
1658
1659 /*
1660 * We've accepted a new connection. Go allocate it, and
1661 * let it read from the socket.
1662 */
1663 if (accept_fd >= 0) {
1664 if (!fr_io_connection_alloc(inst, thread, client, accept_fd, &address, NULL)) {
1665 static fr_rate_limit_t alloc_failed;
1666
1667 RATE_LIMIT_LOCAL(thread ? &thread->rate_limit.conn_alloc_failed : &alloc_failed,
1668 ERROR, "Failed to allocate connection from client %s", client->radclient->shortname);
1669 }
1670
1671 return 0;
1672 }
1673
1674 /*
1675 * No connected sockets, OR we are the connected socket.
1676 *
1677 * Track this packet and return it if necessary.
1678 */
1679 if (connection || !client->use_connected) {
1680 fr_io_track_t *to_free = NULL;
1681
1682 /*
1683 * Add the packet to the tracking table, if it's
1684 * not already there. Pending packets will be in
1685 * the tracking table, but won't be counted as
1686 * "live" packets.
1687 */
1688 if (!track) {
1689 static fr_rate_limit_t tracking_failed;
1690 bool is_dup = false;
1691
1692 track = fr_io_track_add(client, &address, buffer, packet_len, recv_time, &is_dup);
1693 if (!track) {
1694 RATE_LIMIT_LOCAL(thread ? &thread->rate_limit.tracking_failed : &tracking_failed,
1695 ERROR, "Failed tracking packet from client %s - discarding it",
1696 client->radclient->shortname);
1697 return 0;
1698 }
1699
1700 /*
1701 * If there's a cached reply, just send that and don't do anything else.
1702 */
1703 if (is_dup) {
1704 fr_network_t *nr;
1705
1706 if (track->do_not_respond) {
1707 DEBUG("Ignoring retransmit from client %s - we are not responding to this request", client->radclient->shortname);
1708 return 0;
1709 }
1710
1711 if (!track->reply) {
1712 fr_assert(!track->finished);
1713 DEBUG("Ignoring retransmit from client %s - we are still processing the request", client->radclient->shortname);
1714 return 0;
1715 }
1716
1717 if (connection) {
1718 nr = connection->nr;
1719 } else {
1720 nr = thread->nr;
1721 }
1722
1723 /*
1724 * @todo - mark things up so that we know to keep 'track' around
1725 * until the packet is actually written to the network. OR, add
1726 * a network API so that the talloc_free() function can remove
1727 * the packet from the queue of packets to be retransmitted.
1728 *
1729 * Perhaps via having fr_network_listen_write() return a pointer
1730 * to the localized message, and then caching that in the tracking
1731 * structure.
1732 */
1733 DEBUG("Sending duplicate reply to client %s", client->radclient->shortname);
1734 fr_network_listen_write(nr, li, track->reply, track->reply_len,
1735 track, track->timestamp);
1736 return 0;
1737 }
1738
1739 /*
1740 * Got to free this if we don't process the packet.
1741 */
1742 to_free = track;
1743 }
1744
1745 /*
1746 * This is a pending dynamic client. See if we
1747 * have to either run the dynamic client code to
1748 * define the client, OR to push the packet onto
1749 * the pending queue for this client.
1750 */
1751 if (client->state == PR_CLIENT_PENDING) {
1752 /*
1753 * Track pending packets for the master
1754 * socket. Connected sockets are paused
1755 * as soon as they are defined, so we
1756 * won't be reading any more packets from
1757 * them.
1758 *
1759 * Since we don't have pending packets
1760 * for connected sockets, we don't need
1761 * to track pending packets.
1762 */
1763 if (!connection && inst->max_pending_packets && (thread->num_pending_packets >= inst->max_pending_packets)) {
1764 RATE_LIMIT_LOCAL(&thread->rate_limit.too_many_pending,
1765 ERROR, "Too many pending dynamic client packets for listener - discarding packet from %pV",
1766 fr_box_ipaddr(client->src_ipaddr));
1767
1768 discard:
1769 talloc_free(to_free);
1770 return 0;
1771 }
1772
1773 /*
1774 * Allocate the pending packet structure.
1775 */
1776 pending = fr_io_pending_alloc(connection, client, buffer, packet_len,
1777 track, priority);
1778 if (!pending) {
1779 static fr_rate_limit_t alloc_failed;
1780 RATE_LIMIT_LOCAL(thread ? &thread->rate_limit.alloc_failed : &alloc_failed,
1781 ERROR, "proto_%s - Failed allocating space for dynamic client %pV - discarding packet",
1782 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr));
1783 goto discard;
1784 }
1785
1786 if (fr_heap_num_elements(client->pending) > 1) {
1787 DEBUG("Verification is still pending for dynamic client %pV - queuing additional packet(s)",
1788 fr_box_ipaddr(client->src_ipaddr));
1789 return 0;
1790 }
1791
1792 /*
1793 * Tell this packet that it's defining a
1794 * dynamic client.
1795 */
1796 track->dynamic = recv_time;
1797
1798 INFO("proto_%s - Verification started for packet from dynamic client %pV - queuing new packets",
1799 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr));
1800 }
1801
1802 /*
1803 * Remove all cleanup timers for the client /
1804 * connection. It's still in use, so we don't
1805 * want to clean it up.
1806 */
1807 if (client->ev) {
1808 talloc_const_free(client->ev);
1809 client->ready_to_delete = false;
1810 }
1811
1812 /*
1813 * Return the packet.
1814 */
1815 *recv_time_p = track->timestamp;
1816 *packet_ctx = track;
1817 return packet_len;
1818 }
1819
1820 /*
1821 *
1822 */
1823 fr_assert(!pending);
1824
1825 /*
1826 * This must be the main UDP socket which creates
1827 * connections.
1828 */
1829 fr_assert(inst->ipproto == IPPROTO_UDP);
1830
1831 /*
1832 * We're using connected sockets, but this socket isn't
1833 * connected. It must be the master socket. The master
1834 * can either be STATIC, DYNAMIC, or PENDING. Whatever
1835 * the state, the child socket will take care of handling
1836 * the packet. e.g. dynamic clients, etc.
1837 */
1838 {
1839 bool nak = false;
1840
1841 my_connection.address = &address;
1842
1843 pthread_mutex_lock(&client->mutex);
1844 connection = fr_hash_table_find(client->ht, &my_connection);
1845 if (connection) nak = (connection->client->state == PR_CLIENT_NAK);
1846 pthread_mutex_unlock(&client->mutex);
1847
1848 /*
1849 * The connection is in NAK state, ignore packets
1850 * for it.
1851 */
1852 if (nak) {
1853 RATE_LIMIT_LOCAL(&thread->rate_limit.repeat_nak, ERROR, "proto_%s - Discarding repeated packet from NAK'd dynamic client %pV",
1854 inst->app_io->common.name, fr_box_ipaddr(address.socket.inet.src_ipaddr));
1855
1856 DEBUG("Discarding packet to NAKed connection %s", connection->name);
1857 return 0;
1858 }
1859 }
1860
1861 /*
1862 * No existing connection, create one.
1863 */
1864 if (!connection) {
1865 connection = fr_io_connection_alloc(inst, thread, client, -1, &address, NULL);
1866 if (!connection) {
1867 RATE_LIMIT_LOCAL(&thread->rate_limit.conn_alloc_failed,
1868 ERROR, "Failed to allocate connection from client %s. Discarding packet.", client->radclient->shortname);
1869 return 0;
1870 }
1871 }
1872
1873 DEBUG("Sending packet to connection %s", connection->name);
1874
1875 /*
1876 * Inject the packet into the connected socket. It will
1877 * process the packet as if it came in from the network.
1878 *
1879 * @todo future - after creating the connection, put the
1880 * current packet into connection->pending, instead of
1881 * inject?, and then call fr_network_listen_read() from
1882 * the child's instantiation routine???
1883 *
1884 * @todo TCP - for ACCEPT sockets, we don't have a
1885 * packet, so don't do this. Instead, the connection
1886 * will take care of figuring out what to do.
1887 *
1888 * We don't need "to_free" after this, as it will be
1889 * tracked in the connected socket.
1890 */
1891 if (fr_network_listen_inject(connection->nr, connection->listen,
1892 buffer, packet_len, recv_time) < 0) {
1893 RATE_LIMIT_LOCAL(&thread->rate_limit.queue_full, PERROR,
1894 "proto_%s - Discarding packet from dynamic client %pV - cannot push packet to connected socket",
1895 inst->app_io->common.name, fr_box_ipaddr(address.socket.inet.src_ipaddr));
1896 /*
1897 * Don't return an error, because that will cause the listener to close its socket.
1898 */
1899 }
1900
1901 return 0;
1902}
1903
1904/** Inject a packet to a connection.
1905 *
1906 * Always called in the context of the network.
1907 */
1908static int mod_inject(fr_listen_t *li, uint8_t const *buffer, size_t buffer_len, fr_time_t recv_time)
1909{
1910 fr_io_instance_t const *inst;
1911 int priority;
1912 bool is_dup = false;
1913 fr_io_connection_t *connection;
1914 fr_io_pending_packet_t *pending;
1915 fr_io_track_t *track;
1916
1917 get_inst(li, &inst, NULL, &connection, NULL);
1918
1919 if (!connection) {
1920 DEBUG2("Received injected packet for an unconnected socket.");
1921 return -1;
1922 }
1923
1924 priority = inst->app->priority(inst, buffer, buffer_len);
1925 if (priority <= 0) {
1926 return -1;
1927 }
1928
1929 /*
1930 * Track this packet, because that's what mod_read expects.
1931 */
1932 track = fr_io_track_add(connection->client, connection->address,
1933 buffer, buffer_len, recv_time, &is_dup);
1934 if (!track) {
1935 DEBUG2("Failed injecting packet to tracking table");
1936 return -1;
1937 }
1938
1939 talloc_get_type_abort(track, fr_io_track_t);
1940
1941 /*
1942 * @todo future - what to do with duplicates?
1943 */
1944 fr_assert(!is_dup);
1945
1946 /*
1947 * Remember to restore this packet later.
1948 */
1949 pending = fr_io_pending_alloc(connection, connection->client, buffer, buffer_len,
1950 track, priority);
1951 if (!pending) {
1952 DEBUG2("Failed injecting packet due to allocation error");
1953 return -1;
1954 }
1955
1956 return 0;
1957}
1958
1959/** Open a new listener
1960 *
1961 */
1962static int mod_open(fr_listen_t *li)
1963{
1964 fr_io_thread_t *thread;
1965 fr_io_instance_t const *inst;
1966
1967 thread = li->thread_instance;
1968 inst = li->app_io_instance;
1969
1970 if (inst->app_io->open(thread->child) < 0) return -1;
1971
1972 li->fd = thread->child->fd; /* copy this back up */
1973
1974 /*
1975 * Set the name of the socket.
1976 */
1977 if (!li->app_io->get_name) {
1978 li->name = li->app_io->common.name;
1979 } else {
1980 li->name = li->app_io->get_name(li);
1981 }
1982
1983 /*
1984 * Note that we're opening a child socket, so we don't
1985 * put it into the list of global listeners.
1986 */
1987
1988 return 0;
1989}
1990
1991
1992/** Set the event list for a new socket
1993 *
1994 * @param[in] li the listener
1995 * @param[in] el the event list
1996 * @param[in] nr context from the network side
1997 */
1999{
2000 fr_io_instance_t const *inst;
2001 fr_io_connection_t *connection;
2002 fr_io_thread_t *thread;
2003 fr_listen_t *child;
2004
2005 get_inst(li, &inst, &thread, &connection, &child);
2006
2007 /*
2008 * We're not doing IO, so there are no timers for
2009 * cleaning up packets, dynamic clients, or connections.
2010 */
2011 if (!inst->submodule) return;
2012
2013 if (inst->app_io->event_list_set) {
2014 inst->app_io->event_list_set(child, el, nr);
2015 }
2016
2017 /*
2018 * Set event list and network side for this socket.
2019 */
2020 if (!connection) {
2021 thread->el = el;
2022 thread->nr = nr;
2023
2024 } else {
2025 connection->el = el;
2026 connection->nr = nr;
2027 }
2028}
2029
2030
2031static void client_expiry_timer(fr_timer_list_t *tl, fr_time_t now, void *uctx)
2032{
2033 fr_io_client_t *client = talloc_get_type_abort(uctx, fr_io_client_t);
2034 fr_io_instance_t const *inst;
2035 fr_io_connection_t *connection;
2036 fr_time_delta_t delay;
2037 int connections;
2038
2039 /*
2040 * No event list? We don't need to expire the client.
2041 */
2042 if (!tl) return;
2043
2044 // @todo - print out what we plan on doing next
2045 connection = client->connection;
2046 inst = client->inst;
2047
2048 fr_assert(client->state != PR_CLIENT_STATIC);
2049
2050 /*
2051 * Called from the read or write functions with
2052 * now==0, to signal that we have to *set* the timer.
2053 */
2054 if (fr_time_eq(now, fr_time_wrap(0))) {
2055 /*
2056 * The timer is already set, don't do anything.
2057 */
2058 if (client->ev) return;
2059
2060 switch (client->state) {
2062 fr_assert(connection != NULL);
2064
2065 case PR_CLIENT_DYNAMIC:
2066 delay = inst->idle_timeout;
2068 (fr_time_delta_lt(client->radclient->limit.idle_timeout, inst->idle_timeout))) {
2069 delay = client->radclient->limit.idle_timeout;
2070 }
2071 break;
2072
2073 case PR_CLIENT_NAK:
2074 delay = inst->nak_lifetime;
2075 break;
2076
2077 default:
2078 fr_assert(0 == 1);
2079 return;
2080 }
2081
2082 DEBUG("TIMER - setting idle timeout to %pVs for connection from client %s", fr_box_time_delta(delay), client->radclient->shortname);
2083
2084 goto reset_timer;
2085 }
2086
2087 /*
2088 * It's a negative cache entry. Just delete it.
2089 */
2090 if (client->state == PR_CLIENT_NAK) {
2091 INFO("proto_%s - Expiring NAK'd dynamic client %pV - permitting new packets to be verified",
2092 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr));
2093
2094 delete_client:
2095 fr_assert(client->packets == 0);
2096
2097 /*
2098 * It's a connected socket. Remove it from the
2099 * parents list of connections, and delete it.
2100 */
2101 if (connection) {
2102 pthread_mutex_lock(&connection->parent->mutex);
2103 if (connection->in_parent_hash) {
2104 connection->in_parent_hash = false;
2105 (void) fr_hash_table_delete(connection->parent->ht, connection);
2106 }
2107 pthread_mutex_unlock(&connection->parent->mutex);
2108
2109 /*
2110 * Mark the connection as dead, and tell
2111 * the network side to stop reading from
2112 * it.
2113 */
2114 connection->dead = true;
2115 fr_network_listen_read(connection->nr, connection->listen);
2116 return;
2117 }
2118
2119 talloc_free(client);
2120 return;
2121 }
2122
2123 DEBUG("TIMER - checking status of dynamic client %s %pV", client->radclient->shortname, fr_box_ipaddr(client->src_ipaddr));
2124
2125 /*
2126 * It's a dynamically defined client. If no one is using
2127 * it, clean it up after an idle timeout.
2128 */
2129 if ((client->state == PR_CLIENT_DYNAMIC) ||
2130 (client->state == PR_CLIENT_CONNECTED)) {
2131 if (client->packets > 0) {
2132 client->ready_to_delete = false;
2133 return;
2134 }
2135
2136 /*
2137 * No packets, check / set idle timeout.
2138 */
2139 goto idle_timeout;
2140 }
2141
2142 /*
2143 * The client is pending definition. It's either a
2144 * dynamic client which has timed out, OR it's a
2145 * "place-holder" client for connected sockets.
2146 */
2147 fr_assert(client->state == PR_CLIENT_PENDING);
2148
2149 /*
2150 * This is a dynamic client pending definition.
2151 * But it's taken too long to define, so we just
2152 * delete the client, and all packets for it. A
2153 * new packet will cause the dynamic definition
2154 * to be run again.
2155 */
2156 if (!client->use_connected) {
2157 if (!client->packets) {
2158 DEBUG("proto_%s - No packets are using unconnected socket %s", inst->app_io->common.name, connection->name);
2159 goto delete_client;
2160 }
2161
2162 /*
2163 * Tell the writer to NOT dynamically define the
2164 * client. We've run into a problem. Then,
2165 * return. The writer will take care of calling
2166 * us again when it notices that a PENDING client
2167 * is ready to delete.
2168 *
2169 * TBH... that shouldn't happen? We should rely
2170 * on the write to do this all of the time...
2171 */
2172 client->ready_to_delete = true;
2173 return;
2174 }
2175
2176 fr_assert(!connection);
2177
2178 /*
2179 * Find out how many connections are using this
2180 * client.
2181 */
2182 pthread_mutex_lock(&client->mutex);
2183 fr_assert(client->ht != NULL);
2184 connections = fr_hash_table_num_elements(client->ht);
2185 pthread_mutex_unlock(&client->mutex);
2186
2187 /*
2188 * No connections are using this client. If
2189 * we've passed the idle timeout, then just
2190 * delete it. Otherwise, set an idle timeout (as
2191 * above);
2192 */
2193 if (!connections) {
2194idle_timeout:
2195 /*
2196 * We didn't receive any packets during the
2197 * idle_timeout, just delete it.
2198 */
2199 if (client->ready_to_delete) {
2200 if (connection) {
2201 DEBUG("proto_%s - idle timeout for connection %s", inst->app_io->common.name, connection->name);
2202 } else {
2203 DEBUG("proto_%s - idle timeout for client %s", inst->app_io->common.name, client->radclient->shortname);
2204 }
2205 goto delete_client;
2206 }
2207
2208 /*
2209 * No packets and no idle timeout set, go set
2210 * idle timeut.
2211 */
2212 client->ready_to_delete = true;
2213 delay = inst->idle_timeout;
2214 goto reset_timer;
2215 }
2216
2217 /*
2218 * There are live sub-connections. Poll again after a
2219 * long period of time. Once all of the connections are
2220 * closed, we can then delete this client.
2221 *
2222 * @todo - maybe just leave it? we want to be able to
2223 * clean up this client after a while tho... especially
2224 * if the total number of clients is limited.
2225 */
2226 client->ready_to_delete = false;
2227 delay = inst->check_interval;
2228
2229reset_timer:
2230 if (fr_timer_in(client, tl, &client->ev,
2231 delay, false, client_expiry_timer, client) < 0) {
2232 ERROR("proto_%s - Failed adding timeout for dynamic client %s. It will be permanent!",
2233 inst->app_io->common.name, client->radclient->shortname);
2234 return;
2235 }
2236
2237 return;
2238}
2239
2240
2241/*
2242 * Expire cached packets after cleanup_delay time
2243 */
2244static void packet_expiry_timer(fr_timer_list_t *tl, fr_time_t now, void *uctx)
2245{
2246 fr_io_track_t *track = talloc_get_type_abort(uctx, fr_io_track_t);
2247 fr_io_client_t *client = track->client;
2248 fr_io_instance_t const *inst = client->inst;
2249
2250 /*
2251 * Insert the timer if requested.
2252 *
2253 * On duplicates this also extends the expiry timer.
2254 */
2255 if (fr_time_eq(now, fr_time_wrap(0)) && !track->discard && inst->app_io->track_duplicates) {
2256 fr_assert(fr_time_delta_ispos(inst->cleanup_delay));
2257 fr_assert(track->do_not_respond || track->reply_len);
2258
2259 track->expires = fr_time_add(fr_time(), inst->cleanup_delay);
2260
2261 /*
2262 * if the timer succeeds, then "track"
2263 * will be cleaned up when the timer
2264 * fires.
2265 */
2266 if (fr_timer_at(track, tl, &track->ev,
2267 track->expires,
2268 false, packet_expiry_timer, track) == 0) {
2269 DEBUG("proto_%s - cleaning up request in %.6fs", inst->app_io->common.name,
2270 fr_time_delta_unwrap(inst->cleanup_delay) / (double)NSEC);
2271 return;
2272 }
2273
2274 DEBUG("proto_%s - Failed adding cleanup_delay for packet. Discarding packet immediately",
2275 inst->app_io->common.name);
2276 }
2277
2278 /*
2279 * So that all cleanup paths can come here, not just the
2280 * timeout ones.
2281 */
2282 if (fr_time_neq(now, fr_time_wrap(0))) {
2283 DEBUG2("TIMER - proto_%s - cleanup delay", inst->app_io->common.name);
2284 } else {
2285 DEBUG2("proto_%s - cleaning up", inst->app_io->common.name);
2286 }
2287
2288 /*
2289 * Delete the tracking entry.
2290 */
2291 talloc_free(track);
2292
2293 /*
2294 * The client isn't dynamic, stop here.
2295 */
2296 if (client->state == PR_CLIENT_STATIC) return;
2297
2298 fr_assert(client->state != PR_CLIENT_NAK);
2299 fr_assert(client->state != PR_CLIENT_PENDING);
2300
2301 /*
2302 * If necessary, call the client expiry timer to clean up
2303 * the client.
2304 */
2305 if (client->packets == 0) {
2306 client_expiry_timer(tl, now, client);
2307 }
2308}
2309
2310static ssize_t mod_write(fr_listen_t *li, void *packet_ctx, fr_time_t request_time,
2311 uint8_t *buffer, size_t buffer_len, size_t written)
2312{
2313 fr_io_instance_t const *inst;
2314 fr_io_thread_t *thread;
2315 fr_io_connection_t *connection;
2316 fr_io_track_t *track = talloc_get_type_abort(packet_ctx, fr_io_track_t);
2317 fr_io_client_t *client;
2318 fr_client_t *radclient;
2319 fr_listen_t *child;
2321
2322 get_inst(li, &inst, &thread, &connection, &child);
2323
2324 client = track->client;
2325 if (connection) {
2326 el = connection->el;
2327 } else {
2328 el = thread->el;
2329 }
2330
2331 /*
2332 * A fully defined client means that we just send the reply.
2333 */
2334 if (client->state != PR_CLIENT_PENDING) {
2335 ssize_t packet_len;
2336
2337 track->finished = true;
2338
2339 /*
2340 * The request later received a conflicting
2341 * packet, so we discard this one.
2342 */
2343 if (fr_time_neq(track->timestamp, request_time) || track->discard) {
2344 fr_assert(track->packets > 0);
2345 track->packets--;
2346
2347 DEBUG3("Suppressing reply as we have a newer packet");
2348
2349 track->discard = true;
2350 goto setup_timer;
2351 }
2352
2353 /*
2354 * We have a NAK packet, or the request has timed
2355 * out, or it was discarded due to a conflicting
2356 * packet. We don't respond, but we do cache the
2357 * "do not respond" reply for a period of time.
2358 */
2359 if ((buffer_len == 1) || track->do_not_respond) {
2360 track->do_not_respond = true;
2361 goto setup_timer;
2362 }
2363
2364 /*
2365 * We have a real packet, write it to the network
2366 * via the underlying transport write.
2367 */
2368 packet_len = inst->app_io->write(child, track, request_time,
2369 buffer, buffer_len, written);
2370 if (packet_len <= 0) {
2371 track->discard = true;
2372 packet_expiry_timer(el->tl, fr_time_wrap(0), track);
2373 return packet_len;
2374 }
2375
2376 /*
2377 * Only a partial write. The network code will
2378 * take care of calling us again, and we will set
2379 * the expiry timer at that point.
2380 */
2381 if ((size_t) packet_len < buffer_len) {
2382 return packet_len;
2383 }
2384
2385 /*
2386 * We're not tracking duplicates, so just expire
2387 * the packet now.
2388 */
2389 if (!inst->app_io->track_duplicates) goto setup_timer;
2390
2391 /*
2392 * Cache the reply packet if we're doing dedup.
2393 *
2394 * On resend duplicate reply, the reply is
2395 * already filled out. So we don't do that twice.
2396 */
2397 if (!track->reply) {
2398 MEM(track->reply = talloc_memdup(track, buffer, buffer_len));
2399 track->reply_len = buffer_len;
2400 }
2401
2402 /*
2403 * Set the timer to expire the packet.
2404 *
2405 * On dedup this also extends the timer.
2406 */
2407 setup_timer:
2408 packet_expiry_timer(el->tl, fr_time_wrap(0), track);
2409 return buffer_len;
2410 }
2411
2412 /*
2413 * The client is pending, so we MUST have dynamic clients.
2414 *
2415 * If there's a connected socket and no dynamic clients, then the
2416 * client state is set to CONNECTED when the client is created.
2417 */
2418 fr_assert(inst->dynamic_clients);
2419 fr_assert(client->pending != NULL);
2420
2421 /*
2422 * The request has timed out trying to define the dynamic
2423 * client. Oops... try again.
2424 */
2425 if ((buffer_len == 1) && (*buffer == true)) {
2426 DEBUG("Request has timed out trying to define a new client. Trying again.");
2427 goto reread;
2428 }
2429
2430 /*
2431 * The dynamic client was NOT defined. Set it's state to
2432 * NAK, delete all pending packets, and close the
2433 * tracking table.
2434 */
2435 if (buffer_len == 1) {
2436 INFO("proto_%s - Verification failed for packet from dynamic client %pV - adding IP address to the NAK cache",
2437 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr));
2438
2439 client->state = PR_CLIENT_NAK;
2440 if (!connection) {
2441 client_pending_free(client);
2442 } else {
2443 TALLOC_FREE(client->pending);
2444 }
2445 if (client->table) TALLOC_FREE(client->table);
2446 fr_assert(client->packets == 0);
2447
2448 /*
2449 * If we're a connected UDP socket, allocate a
2450 * new connection which is the place-holder for
2451 * the NAK. We will reject packets from from the
2452 * src/dst IP/port.
2453 *
2454 * The timer will take care of deleting the NAK
2455 * connection (which doesn't have any FDs
2456 * associated with it). The network side will
2457 * call mod_close() when the original connection
2458 * is done, which will then free that connection,
2459 * too.
2460 */
2461 if (connection && (inst->ipproto == IPPROTO_UDP)) {
2462 connection = fr_io_connection_alloc(inst, thread, client, -1, connection->address, connection);
2463 client_expiry_timer(el->tl, fr_time_wrap(0), connection->client);
2464
2465 errno = ECONNREFUSED;
2466 return -1;
2467 }
2468
2469 /*
2470 * For connected TCP sockets, we just call the
2471 * expiry timer, which will close and free the
2472 * connection.
2473 */
2474 client_expiry_timer(el->tl, fr_time_wrap(0), client);
2475 return buffer_len;
2476 }
2477
2478 fr_assert(buffer_len == sizeof(radclient));
2479
2480 memcpy(&radclient, buffer, sizeof(radclient));
2481
2482 if (!connection) {
2483 fr_ipaddr_t ipaddr;
2484
2485 /*
2486 * Check the encapsulating network against the
2487 * address that the user wants to use, but only
2488 * for unconnected sockets.
2489 */
2490 if (client->network.af != radclient->ipaddr.af) {
2491 DEBUG("Client IP address %pV IP family does not match the source network %pV of the packet.",
2492 fr_box_ipaddr(radclient->ipaddr), fr_box_ipaddr(client->network));
2493 goto error;
2494 }
2495
2496 /*
2497 * Network prefix is more restrictive than the one given
2498 * by the client... that's bad.
2499 */
2500 if (client->network.prefix > radclient->ipaddr.prefix) {
2501 DEBUG("Client IP address %pV is not within the prefix with the defined network %pV",
2502 fr_box_ipaddr(radclient->ipaddr), fr_box_ipaddr(client->network));
2503 goto error;
2504 }
2505
2506 ipaddr = radclient->ipaddr;
2507 fr_ipaddr_mask(&ipaddr, client->network.prefix);
2508 if (fr_ipaddr_cmp(&ipaddr, &client->network) != 0) {
2509 DEBUG("Client IP address %pV is not within the defined network %pV.",
2510 fr_box_ipaddr(radclient->ipaddr), fr_box_ipaddr(client->network));
2511 goto error;
2512 }
2513
2514 /*
2515 * We can't define dynamic clients as networks (for now).
2516 *
2517 * @todo - If we did allow it, we would have to remove
2518 * this client from the trie, update it's IP address, and
2519 * re-add it. We can PROBABLY do this if this client
2520 * isn't already connected, AND radclient->use_connected
2521 * is true. But that's for later...
2522 */
2523 if (((radclient->ipaddr.af == AF_INET) &&
2524 (radclient->ipaddr.prefix != 32)) ||
2525 ((radclient->ipaddr.af == AF_INET6) &&
2526 (radclient->ipaddr.prefix != 128))) {
2527 ERROR("Cannot define a dynamic client as a network");
2528
2529 error:
2530 talloc_free(radclient);
2531
2532 /*
2533 * Remove the pending client from the trie.
2534 */
2535 fr_assert(!connection);
2536 talloc_free(client);
2537 return buffer_len;
2538 }
2539 }
2540
2541 /*
2542 * The new client is mostly OK. Copy the various fields
2543 * over.
2544 */
2545#define COPY_FIELD(_dest, _x) _dest->radclient->_x = radclient->_x
2546#define DUP_FIELD(_dest, _x) _dest->radclient->_x = talloc_strdup(_dest->radclient, radclient->_x)
2547
2548 /*
2549 * Only these two fields are set. Other strings in
2550 * radclient are copies of these ones.
2551 */
2554
2555 DUP_FIELD(client, longname);
2556 DUP_FIELD(client, shortname);
2557 DUP_FIELD(client, secret);
2558 DUP_FIELD(client, nas_type);
2559
2560 COPY_FIELD(client, ipaddr);
2561 COPY_FIELD(client, src_ipaddr);
2562 COPY_FIELD(client, require_message_authenticator);
2563 COPY_FIELD(client, require_message_authenticator_is_set);
2564 COPY_FIELD(client, limit_proxy_state);
2565 COPY_FIELD(client, limit_proxy_state_is_set);
2566 COPY_FIELD(client, use_connected);
2567 COPY_FIELD(client, cs);
2568
2569 // @todo - fill in other fields?
2570
2571 talloc_free(radclient);
2572
2573 radclient = client->radclient; /* laziness */
2574 radclient->server_cs = inst->server_cs;
2575 radclient->server = cf_section_name2(inst->server_cs);
2576
2577 /*
2578 * This is a connected socket, and it's just been
2579 * allowed. Go poke the network side to read from the
2580 * socket.
2581 */
2582 if (connection) {
2583 fr_assert(connection != NULL);
2584 fr_assert(connection->client == client);
2585 fr_assert(client->connection != NULL);
2586
2587 client->state = PR_CLIENT_CONNECTED;
2588
2589 /*
2590 * Connections can't spawn new connections.
2591 */
2592 client->use_connected = radclient->use_connected = false;
2593
2594 /*
2595 * If we were paused. resume reading from the
2596 * connection.
2597 *
2598 * Note that the event list doesn't like resuming
2599 * a connection that isn't paused. It just sets
2600 * the read function to NULL.
2601 */
2602 if (connection->paused) {
2603 (void) fr_event_filter_update(el, child->fd,
2605 }
2606
2607 connection->parent->radclient->active = true;
2608 fr_assert(connection->parent->state == PR_CLIENT_PENDING);
2609 connection->parent->state = PR_CLIENT_DYNAMIC;
2610
2611 DUP_FIELD(connection->parent, longname);
2612 DUP_FIELD(connection->parent, shortname);
2613 DUP_FIELD(connection->parent, secret);
2614 DUP_FIELD(connection->parent, nas_type);
2615
2616 COPY_FIELD(connection->parent, ipaddr);
2617 COPY_FIELD(connection->parent, src_ipaddr);
2618 COPY_FIELD(connection->parent, require_message_authenticator);
2619 COPY_FIELD(connection->parent, require_message_authenticator_is_set);
2620 COPY_FIELD(connection->parent, limit_proxy_state);
2621 COPY_FIELD(connection->parent, limit_proxy_state_is_set);
2622 COPY_FIELD(connection->parent, use_connected);
2623 COPY_FIELD(connection->parent, cs);
2624
2625 /*
2626 * Re-parent the conf section used to build this client
2627 * so its lifetime is linked to parent client
2628 */
2629 talloc_steal(connection->parent->radclient, connection->parent->radclient->cs);
2630
2631 /*
2632 * The client has been allowed.
2633 */
2634 client->state = PR_CLIENT_DYNAMIC;
2635 client->radclient->active = true;
2636
2637 INFO("proto_%s - Verification succeeded for packet from dynamic client %pV - processing queued packets",
2638 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr));
2639 goto finish;
2640 } else {
2641 /*
2642 * Re-parent the conf section used to build this client
2643 * so its lifetime is linked to the client
2644 */
2645 talloc_steal(radclient, radclient->cs);
2646 }
2647
2648 fr_assert(connection == NULL);
2649 fr_assert(client->use_connected == false); /* we weren't sure until now */
2650
2651 /*
2652 * Disallow unsupported configurations.
2653 */
2654 if (radclient->use_connected && !inst->app_io->connection_set) {
2655 DEBUG("proto_%s - cannot use connected sockets as underlying 'transport = %s' does not support it.",
2656 inst->app_io->common.name, inst->submodule->module->exported->name);
2657 goto error;
2658 }
2659
2660
2661 /*
2662 * Dynamic clients can spawn new connections.
2663 */
2664 client->use_connected = radclient->use_connected;
2665
2666 /*
2667 * The admin has defined a client which uses connected
2668 * sockets. Go spawn it
2669 */
2670 if (client->use_connected) {
2671 fr_assert(connection == NULL);
2672
2673
2674 /*
2675 * Leave the state as PENDING. Each connection
2676 * will then cause a dynamic client to be
2677 * defined.
2678 */
2679 (void) pthread_mutex_init(&client->mutex, NULL);
2680 MEM(client->ht = fr_hash_table_alloc(client, connection_hash, connection_cmp, NULL));
2681
2682 } else {
2683 /*
2684 * The client has been allowed.
2685 */
2686 client->state = PR_CLIENT_DYNAMIC;
2687 client->radclient->active = true;
2688
2689 INFO("proto_%s - Verification succeeded for packet from dynamic client %pV - processing %d queued packets",
2690 inst->app_io->common.name, fr_box_ipaddr(client->src_ipaddr),
2691 fr_heap_num_elements(client->pending));
2692 }
2693
2694 /*
2695 * Add this client to the master socket, so that
2696 * mod_read() will see the pending client, pop the
2697 * pending packet, and process it.
2698 *
2699 */
2700 if (!thread->pending_clients) {
2702 fr_io_client_t, pending_id, 0));
2703 }
2704
2706 (void) fr_heap_insert(&thread->pending_clients, client);
2707
2708finish:
2709 /*
2710 * Maybe we defined the client, but the original packet
2711 * timed out, so there's nothing more to do. In that case, set up the expiry timers.
2712 */
2713 if (client->packets == 0) {
2714 client_expiry_timer(el->tl, fr_time_wrap(0), client);
2715 }
2716
2717reread:
2718 /*
2719 * If there are pending packets (and there should be at
2720 * least one), tell the network socket to call our read()
2721 * function again.
2722 */
2723 if (fr_heap_num_elements(client->pending) > 0) {
2724 if (connection) {
2725 fr_network_listen_read(connection->nr, connection->listen);
2726 } else {
2727 fr_network_listen_read(thread->nr, thread->listen);
2728 }
2729 }
2730
2731 return buffer_len;
2732}
2733
2734/** Close the socket.
2735 *
2736 */
2737static int mod_close(fr_listen_t *li)
2738{
2739 fr_io_instance_t const *inst;
2740 fr_io_connection_t *connection;
2741 fr_listen_t *child;
2742
2743 get_inst(li, &inst, NULL, &connection, &child);
2744
2745 if (inst->app_io->close) {
2746 int ret;
2747
2748 ret = inst->app_io->close(child);
2749 if (ret < 0) return ret;
2750 } else {
2751 close(child->fd);
2752// child->fd = -1;
2753 }
2754
2755 if (!connection) return 0;
2756
2757 /*
2758 * We allocated this, so we're responsible for closing
2759 * it.
2760 */
2761 DEBUG("Closing connection %s", connection->name);
2762 if (connection->client->pending) {
2763 TALLOC_FREE(connection->client->pending); /* for any pending packets */
2764 }
2765
2766 /*
2767 * Remove connection from parent hash table
2768 */
2769 pthread_mutex_lock(&connection->parent->mutex);
2770 if (connection->in_parent_hash) {
2771 connection->in_parent_hash = false;
2772 (void) fr_hash_table_delete(connection->parent->ht, connection);
2773 }
2774 pthread_mutex_unlock(&connection->parent->mutex);
2775
2776 /*
2777 * Clean up listener
2778 */
2779 if (unlikely(fr_network_listen_delete(connection->nr, child) < 0)) {
2780 PERROR("Failed to delete connection %s", connection->name);
2781 }
2782
2783 talloc_free(connection->mi);
2784
2785 return 0;
2786}
2787
2788static int mod_instantiate(module_inst_ctx_t const *mctx)
2789{
2790 fr_io_instance_t *inst = mctx->mi->data;
2791 CONF_SECTION *conf = mctx->mi->conf;
2792
2793 inst->mi = mctx->mi;
2794 inst->app_io = (fr_app_io_t const *) inst->submodule->exported;
2795 inst->app_io_conf = inst->submodule->conf;
2796 inst->app_io_instance = inst->submodule->data;
2797
2798 /*
2799 * If we're not tracking duplicates then we don't need a
2800 * cleanup delay.
2801 *
2802 * If we are tracking duplicates, then we must have a non-zero cleanup delay.
2803 */
2804 if (!inst->app_io->track_duplicates) {
2805 inst->cleanup_delay = fr_time_delta_wrap(0);
2806
2807 } else {
2808 FR_TIME_DELTA_BOUND_CHECK("cleanup_delay", inst->cleanup_delay, >=, fr_time_delta_from_sec(1));
2809
2810 if (!inst->app_io->track_create) {
2811 cf_log_err(inst->app_io_conf, "Internal error: 'track_duplicates' is set, but there is no 'track create' function");
2812 return -1;
2813 }
2814 }
2815
2816 /*
2817 * Get various information after bootstrapping the
2818 * application IO module.
2819 */
2820 if (inst->app_io->network_get) {
2821 inst->app_io->network_get(&inst->ipproto, &inst->dynamic_clients, &inst->networks, inst->app_io_instance);
2822 }
2823
2824 if ((inst->ipproto == IPPROTO_TCP) && !inst->app_io->connection_set) {
2825 cf_log_err(inst->app_io_conf, "Missing 'connection set' API for proto_%s", inst->app_io->common.name);
2826 return -1;
2827 }
2828
2829 /*
2830 * Ensure that the dynamic client sections exist
2831 */
2832 if (inst->dynamic_clients) {
2834
2835 if (!cf_section_find(server, "new", "client")) {
2836 cf_log_err(conf, "Cannot use 'dynamic_clients = yes' as the virtual server has no 'new client { ... }' section defined.");
2837 return -1;
2838 }
2839
2840 if (!cf_section_find(server, "add", "client")) {
2841 cf_log_warn(conf, "No 'add client { ... }' section was defined.");
2842 }
2843
2844 if (!cf_section_find(server, "deny", "client")) {
2845 cf_log_warn(conf, "No 'deny client { ... }' section was defined.");
2846 }
2847 }
2848
2849 /*
2850 * Create a list of client modules.
2851 *
2852 * FIXME - Probably only want to do this for connected sockets?
2853 *
2854 * FIXME - We probably want write protect enabled?
2855 */
2856 inst->clients = module_list_alloc(inst, &module_list_type_thread_local, "clients", false);
2858
2859 return 0;
2860}
2861
2862
2863static char const *mod_name(fr_listen_t *li)
2864{
2865 fr_io_thread_t *thread;
2866 fr_io_connection_t *connection;
2867 fr_listen_t *child;
2868 fr_io_instance_t const *inst;
2869
2870 get_inst(li, &inst, &thread, &connection, &child);
2871
2872 fr_assert(child != NULL);
2873 return child->app_io->get_name(child);
2874}
2875
2876/** Create a trie from arrays of allow / deny IP addresses
2877 *
2878 * @param ctx the talloc ctx
2879 * @param af the address family to allow
2880 * @param allow the array of IPs / networks to allow. MUST be talloc'd
2881 * @param deny the array of IPs / networks to deny. MAY be NULL, MUST be talloc'd
2882 * @return
2883 * - fr_trie_t on success
2884 * - NULL on error
2885 */
2886fr_trie_t *fr_master_io_network(TALLOC_CTX *ctx, int af, fr_ipaddr_t *allow, fr_ipaddr_t *deny)
2887{
2888 fr_trie_t *trie;
2889 size_t i, num;
2890
2891 MEM(trie = fr_trie_alloc(ctx, NULL, NULL));
2892
2893 num = talloc_array_length(allow);
2894 fr_assert(num > 0);
2895
2896 for (i = 0; i < num; i++) {
2897 fr_ipaddr_t *network;
2898
2899 /*
2900 * Can't add v4 networks to a v6 socket, or vice versa.
2901 */
2902 if (allow[i].af != af) {
2903 fr_strerror_printf("Address family in entry %zd - 'allow = %pV' "
2904 "does not match 'ipaddr'", i + 1, fr_box_ipaddr(allow[i]));
2905 talloc_free(trie);
2906 return NULL;
2907 }
2908
2909 /*
2910 * Duplicates are bad.
2911 */
2912 network = fr_trie_match_by_key(trie,
2913 &allow[i].addr, allow[i].prefix);
2914 if (network) {
2915 fr_strerror_printf("Cannot add duplicate entry 'allow = %pV'",
2916 fr_box_ipaddr(allow[i]));
2917 talloc_free(trie);
2918 return NULL;
2919 }
2920
2921 /*
2922 * Look for overlapping entries.
2923 * i.e. the networks MUST be disjoint.
2924 *
2925 * Note that this catches 192.168.1/24
2926 * followed by 192.168/16, but NOT the
2927 * other way around. The best fix is
2928 * likely to add a flag to
2929 * fr_trie_alloc() saying "we can only
2930 * have terminal fr_trie_user_t nodes"
2931 */
2932 network = fr_trie_lookup_by_key(trie,
2933 &allow[i].addr, allow[i].prefix);
2934 if (network && (network->prefix <= allow[i].prefix)) {
2935 fr_strerror_printf("Cannot add overlapping entry 'allow = %pV'", fr_box_ipaddr(allow[i]));
2936 fr_strerror_const("Entry is completely enclosed inside of a previously defined network.");
2937 talloc_free(trie);
2938 return NULL;
2939 }
2940
2941 /*
2942 * Insert the network into the trie.
2943 * Lookups will return the fr_ipaddr_t of
2944 * the network.
2945 */
2946 if (fr_trie_insert_by_key(trie,
2947 &allow[i].addr, allow[i].prefix,
2948 &allow[i]) < 0) {
2949 fr_strerror_printf("Failed adding 'allow = %pV' to tracking table", fr_box_ipaddr(allow[i]));
2950 talloc_free(trie);
2951 return NULL;
2952 }
2953 }
2954
2955 /*
2956 * And now check denied networks.
2957 */
2958 num = talloc_array_length(deny);
2959 if (!num) return trie;
2960
2961 /*
2962 * Since the default is to deny, you can only add
2963 * a "deny" inside of a previous "allow".
2964 */
2965 for (i = 0; i < num; i++) {
2966 fr_ipaddr_t *network;
2967
2968 /*
2969 * Can't add v4 networks to a v6 socket, or vice versa.
2970 */
2971 if (deny[i].af != af) {
2972 fr_strerror_printf("Address family in entry %zd - 'deny = %pV' "
2973 "does not match 'ipaddr'", i + 1, fr_box_ipaddr(deny[i]));
2974 talloc_free(trie);
2975 return NULL;
2976 }
2977
2978 /*
2979 * Duplicates are bad.
2980 */
2981 network = fr_trie_match_by_key(trie,
2982 &deny[i].addr, deny[i].prefix);
2983 if (network) {
2984 fr_strerror_printf("Cannot add duplicate entry 'deny = %pV'", fr_box_ipaddr(deny[i]));
2985 talloc_free(trie);
2986 return NULL;
2987 }
2988
2989 /*
2990 * A "deny" can only be within a previous "allow".
2991 */
2992 network = fr_trie_lookup_by_key(trie,
2993 &deny[i].addr, deny[i].prefix);
2994 if (!network) {
2995 fr_strerror_printf("The network in entry %zd - 'deny = %pV' is not "
2996 "contained within a previous 'allow'", i + 1, fr_box_ipaddr(deny[i]));
2997 talloc_free(trie);
2998 return NULL;
2999 }
3000
3001 /*
3002 * We hack the AF in "deny" rules. If
3003 * the lookup gets AF_UNSPEC, then we're
3004 * adding a "deny" inside of a "deny".
3005 */
3006 if (network->af != af) {
3007 fr_strerror_printf("The network in entry %zd - 'deny = %pV' is overlaps "
3008 "with another 'deny' rule", i + 1, fr_box_ipaddr(deny[i]));
3009 talloc_free(trie);
3010 return NULL;
3011 }
3012
3013 /*
3014 * Insert the network into the trie.
3015 * Lookups will return the fr_ipaddr_t of
3016 * the network.
3017 */
3018 if (fr_trie_insert_by_key(trie,
3019 &deny[i].addr, deny[i].prefix,
3020 &deny[i]) < 0) {
3021 fr_strerror_printf("Failed adding 'deny = %pV' to tracking table", fr_box_ipaddr(deny[i]));
3022 talloc_free(trie);
3023 return NULL;
3024 }
3025
3026 /*
3027 * Hack it to make it a deny rule.
3028 */
3029 deny[i].af = AF_UNSPEC;
3030 }
3031
3032 return trie;
3033}
3034
3035
3037{
3038 if (!li->thread_instance) return 0;
3039
3041 return 0;
3042}
3043
3045 size_t default_message_size, size_t num_messages)
3046{
3047 fr_listen_t *li, *child;
3048 fr_io_thread_t *thread;
3049
3050 /*
3051 * No IO paths, so we don't initialize them.
3052 */
3053 if (!inst->app_io) {
3054 fr_assert(!inst->dynamic_clients);
3055 return 0;
3056 }
3057
3058 if (!inst->app_io->common.thread_inst_size) {
3059 fr_strerror_const("IO modules MUST set 'thread_inst_size' when using the master IO handler.");
3060 return -1;
3061 }
3062
3063 /*
3064 * Build the #fr_listen_t. This describes the complete
3065 * path data takes from the socket to the decoder and
3066 * back again.
3067 */
3068 MEM(li = talloc_zero(NULL, fr_listen_t));
3069 talloc_set_destructor(li, fr_io_listen_free);
3070
3071 /*
3072 * The first listener is the one for the application
3073 * (e.g. RADIUS). However, we mangle the IO path to
3074 * point to the master IO handler. That allows all of
3075 * the high-level work (dynamic client checking,
3076 * connected sockets, etc.) to be handled by the master
3077 * IO handler.
3078 *
3079 * This listener is then passed to the network code,
3080 * which calls our trampoline functions to do the actual
3081 * work.
3082 */
3083 li->app = inst->app;
3084 li->app_instance = inst->app_instance;
3085 li->server_cs = inst->server_cs;
3086
3087 /*
3088 * Set configurable parameters for message ring buffer.
3089 */
3090 li->default_message_size = default_message_size;
3091 li->num_messages = num_messages;
3092
3093 /*
3094 * Per-socket data lives here.
3095 */
3096 thread = talloc_zero(NULL, fr_io_thread_t);
3097 thread->listen = li;
3098 thread->sc = sc;
3099
3100 /*
3101 * Create the trie of clients for this socket.
3102 */
3103 MEM(thread->trie = fr_trie_alloc(thread, NULL, NULL));
3104
3105 if (inst->dynamic_clients) {
3107 fr_io_client_t, alive_id, 0));
3108 }
3109
3110 /*
3111 * Set the listener to call our master trampoline function.
3112 */
3113 li->app_io = &fr_master_app_io;
3114 li->thread_instance = thread;
3115 li->app_io_instance = inst;
3116 li->track_duplicates = inst->app_io->track_duplicates;
3117
3118 /*
3119 * The child listener points to the *actual* IO path.
3120 *
3121 * We need to create a complete listener here (e.g.
3122 * RADIUS + RADIUS_UDP), because the underlying IO
3123 * functions expect to get passed a full listener.
3124 *
3125 * Once the network side calls us, we will call the child
3126 * listener to do the actual IO.
3127 */
3128 child = thread->child = talloc_zero(li, fr_listen_t);
3129 memcpy(child, li, sizeof(*child));
3130
3131 /*
3132 * Reset these fields to point to the IO instance data.
3133 */
3134 child->app_io = inst->app_io;
3135 child->track_duplicates = inst->app_io->track_duplicates;
3136
3137 if (child->app_io->common.thread_inst_size > 0) {
3138 child->thread_instance = talloc_zero_array(NULL, uint8_t,
3139 inst->app_io->common.thread_inst_size);
3140 talloc_set_destructor(child, fr_io_listen_free);
3141
3142 talloc_set_name(child->thread_instance, "proto_%s_thread_t",
3143 inst->app_io->common.name);
3144
3145 /*
3146 * This is "const", and the user can't
3147 * touch it. So we just reuse the same
3148 * configuration everywhere.
3149 */
3150 child->app_io_instance = inst->app_io_instance;
3151
3152 } else {
3153 child->thread_instance = inst->app_io_instance;
3154 child->app_io_instance = child->thread_instance;
3155 }
3156
3157 /*
3158 * Don't call connection_set() for the main socket. It's
3159 * not connected. Instead, tell the IO path to open the
3160 * socket for us.
3161 */
3162 if (inst->app_io->open(child) < 0) {
3163 cf_log_err(inst->app_io_conf, "Failed opening %s interface", inst->app_io->common.name);
3164 talloc_free(li);
3165 return -1;
3166 }
3167
3168 li->fd = child->fd; /* copy this back up */
3169
3170 if (!child->app_io->get_name) {
3171 child->name = child->app_io->common.name;
3172 } else {
3173 child->name = child->app_io->get_name(child);
3174 }
3175 li->name = child->name;
3176
3177 /*
3178 * Record which socket we opened.
3179 */
3180 if (child->app_io_addr) {
3181 fr_listen_t *other;
3182
3183 other = listen_find_any(thread->child);
3184 if (other) {
3185 ERROR("Failed opening %s - that port is already in use by another listener in server %s { ... } - %s",
3186 child->name, cf_section_name2(other->server_cs), other->name);
3187
3188 ERROR("got socket %d %d\n", child->app_io_addr->inet.src_port, other->app_io_addr->inet.src_port);
3189
3190 talloc_free(li);
3191 return -1;
3192 }
3193
3194 (void) listen_record(child);
3195 }
3196
3197 /*
3198 * Add the socket to the scheduler, where it might end up
3199 * in a different thread.
3200 */
3201 if (!fr_schedule_listen_add(sc, li)) {
3202 talloc_free(li);
3203 return -1;
3204 }
3205
3206 return 0;
3207}
3208
3209/*
3210 * Used to create a tracking structure for fr_network_sendto_worker()
3211 */
3212fr_io_track_t *fr_master_io_track_alloc(fr_listen_t *li, fr_client_t *radclient, fr_ipaddr_t const *src_ipaddr, int src_port,
3213 fr_ipaddr_t const *dst_ipaddr, int dst_port)
3214{
3215 fr_io_instance_t const *inst;
3216 fr_io_thread_t *thread;
3217 fr_io_connection_t *connection;
3218 fr_listen_t *child;
3219 fr_io_track_t *track;
3220 fr_io_client_t *client;
3221 fr_io_address_t *address;
3222 fr_listen_t *parent = talloc_parent(li);
3223
3224 (void) talloc_get_type_abort(parent, fr_listen_t);
3225
3226 get_inst(parent, &inst, &thread, &connection, &child);
3227
3228 fr_assert(child == li);
3229
3230 if (unlikely(!thread)) return NULL;
3231 fr_assert(thread->trie != NULL);
3232
3233 client = fr_trie_lookup_by_key(thread->trie, &src_ipaddr->addr, src_ipaddr->prefix);
3234 if (!client) {
3235 MEM(client = client_alloc(thread, PR_CLIENT_STATIC, inst, thread, radclient, NULL));
3236 }
3237
3238 MEM(track = talloc_zero_pooled_object(client, fr_io_track_t, 1, sizeof(*track) + sizeof(track->address) + 64));
3239 MEM(track->address = address = talloc_zero(track, fr_io_address_t));
3240 track->client = client;
3241
3242 address->socket.inet.src_port = src_port;
3243 address->socket.inet.dst_port = dst_port;
3244
3245 address->socket.inet.src_ipaddr = *src_ipaddr;
3246 address->socket.inet.dst_ipaddr = *dst_ipaddr;
3247 address->radclient = radclient;
3248
3249 return track;
3250}
3251
3252
3254 .common = {
3255 .magic = MODULE_MAGIC_INIT,
3256 .name = "radius_master_io",
3257
3259 },
3260 .default_message_size = 4096,
3261 .track_duplicates = true,
3262
3263 .read = mod_read,
3264 .write = mod_write,
3265 .inject = mod_inject,
3266
3267 .open = mod_open,
3268 .close = mod_close,
3269 .event_list_set = mod_event_list_set,
3270 .get_name = mod_name,
3271};
static int const char char buffer[256]
Definition acutest.h:576
log_entry msg
Definition acutest.h:794
module_t common
Common fields to all loadable modules.
Definition app_io.h:34
fr_io_track_create_t track_create
create a tracking structure
Definition app_io.h:64
bool track_duplicates
track duplicate packets
Definition app_io.h:41
fr_io_name_t get_name
get the socket name
Definition app_io.h:70
fr_io_track_cmp_t track_compare
compare two tracking structures
Definition app_io.h:65
Public structure describing an I/O path for a protocol.
Definition app_io.h:33
#define FALL_THROUGH
clang 10 doesn't recognised the FALL-THROUGH comment anymore
Definition build.h:324
#define CMP_PREFER_SMALLER(_a, _b)
Evaluates to +1 for a > b, and -1 for a < b.
Definition build.h:104
#define CMP_PREFER_LARGER(_a, _b)
Evaluates to -1 for a > b, and +1 for a < b.
Definition build.h:108
#define CMP_RETURN(_a, _b, _field)
Return if the comparison is not 0 (is unequal)
Definition build.h:121
#define CMP(_a, _b)
Same as CMP_PREFER_SMALLER use when you don't really care about ordering, you just want an ordering.
Definition build.h:112
#define unlikely(_x)
Definition build.h:383
#define UNUSED
Definition build.h:317
#define FR_TIME_DELTA_BOUND_CHECK(_name, _var, _op, _bound)
Definition cf_parse.h:529
A section grouping multiple CONF_PAIR.
Definition cf_priv.h:101
char const * cf_section_name2(CONF_SECTION const *cs)
Return the second identifier of a CONF_SECTION.
Definition cf_util.c:1185
char const * cf_section_name1(CONF_SECTION const *cs)
Return the second identifier of a CONF_SECTION.
Definition cf_util.c:1171
CONF_SECTION * cf_section_find(CONF_SECTION const *cs, char const *name1, char const *name2)
Find a CONF_SECTION with name1 and optionally name2.
Definition cf_util.c:1028
CONF_SECTION * cf_item_to_section(CONF_ITEM const *ci)
Cast a CONF_ITEM to a CONF_SECTION.
Definition cf_util.c:684
CONF_SECTION * cf_section_dup(TALLOC_CTX *ctx, CONF_SECTION *parent, CONF_SECTION const *cs, char const *name1, char const *name2, bool copy_meta)
Duplicate a configuration section.
Definition cf_util.c:928
#define cf_log_err(_cf, _fmt,...)
Definition cf_util.h:289
#define cf_parent(_cf)
Definition cf_util.h:101
#define cf_log_warn(_cf, _fmt,...)
Definition cf_util.h:290
#define PRIORITY_NORMAL
Definition channel.h:151
#define MEM(x)
Definition debug.h:36
#define ERROR(fmt,...)
Definition dhcpclient.c:41
#define DEBUG(fmt,...)
Definition dhcpclient.c:39
Test enumeration values.
Definition dict_test.h:92
#define MODULE_MAGIC_INIT
Stop people using different module/library/server versions together.
Definition dl_module.h:63
@ FR_EVENT_FILTER_IO
Combined filter for read/write functions/.
Definition event.h:84
#define fr_event_filter_update(...)
Definition event.h:240
#define FR_EVENT_RESUME(_s, _f)
Re-add the filter for a func from kevent.
Definition event.h:132
#define FR_EVENT_SUSPEND(_s, _f)
Temporarily remove the filter for a func from kevent.
Definition event.h:116
Callbacks for the FR_EVENT_FILTER_IO filter.
Definition event.h:189
Structure describing a modification to a filter's state.
Definition event.h:97
void * fr_hash_table_find(fr_hash_table_t *ht, void const *data)
Find data in a hash table.
Definition hash.c:429
uint32_t fr_hash_update(void const *data, size_t size, uint32_t hash)
Definition hash.c:846
uint32_t fr_hash(void const *data, size_t size)
Definition hash.c:812
bool fr_hash_table_insert(fr_hash_table_t *ht, void const *data)
Insert data into a hash table.
Definition hash.c:468
bool fr_hash_table_delete(fr_hash_table_t *ht, void const *data)
Remove and free data (if a free function was specified)
Definition hash.c:594
uint32_t fr_hash_table_num_elements(fr_hash_table_t *ht)
Definition hash.c:610
#define fr_hash_table_alloc(_ctx, _hash_node, _cmp_node, _free_node)
Definition hash.h:58
int fr_heap_insert(fr_heap_t **hp, void *data)
Insert a new element into the heap.
Definition heap.c:146
void * fr_heap_pop(fr_heap_t **hp)
Remove a node from the heap.
Definition heap.c:322
int fr_heap_extract(fr_heap_t **hp, void *data)
Remove a node from the heap.
Definition heap.c:239
unsigned int fr_heap_index_t
Definition heap.h:80
static void * fr_heap_peek(fr_heap_t *h)
Return the item from the top of the heap but don't pop it.
Definition heap.h:136
#define fr_heap_alloc(_ctx, _cmp, _type, _field, _init)
Creates a heap that can be used with non-talloced elements.
Definition heap.h:100
static bool fr_heap_entry_inserted(fr_heap_index_t heap_idx)
Check if an entry is inserted into a heap.
Definition heap.h:124
static unsigned int fr_heap_num_elements(fr_heap_t *h)
Return the number of elements in the heap.
Definition heap.h:179
#define FR_HEAP_INDEX_INVALID
Definition heap.h:83
The main heap structure.
Definition heap.h:66
int fr_ipaddr_from_sockaddr(fr_ipaddr_t *ipaddr, uint16_t *port, struct sockaddr_storage const *sa, socklen_t salen)
Convert sockaddr to our internal ip address representation.
Definition inet.c:1441
int fr_ipaddr_to_sockaddr(struct sockaddr_storage *sa, socklen_t *salen, fr_ipaddr_t const *ipaddr, uint16_t port)
Convert our internal ip address representation to a sockaddr.
Definition inet.c:1392
int8_t fr_ipaddr_cmp(fr_ipaddr_t const *a, fr_ipaddr_t const *b)
Compare two ip addresses.
Definition inet.c:1346
void fr_ipaddr_mask(fr_ipaddr_t *addr, uint8_t prefix)
Zeroes out the host portion of an fr_ipaddr_t.
Definition inet.c:217
uint8_t prefix
Prefix length - Between 0-32 for IPv4 and 0-128 for IPv6.
Definition inet.h:69
int af
Address family.
Definition inet.h:64
union fr_ipaddr_t::@131 addr
IPv4/6 prefix.
fr_socket_t socket
src/dst ip and port.
Definition base.h:336
fr_client_t const * radclient
old-style client definition
Definition base.h:338
size_t num_messages
for the message ring buffer
Definition listen.h:52
char const * name
printable name for this socket - set by open
Definition listen.h:29
bool track_duplicates
do we track duplicate packets?
Definition listen.h:43
fr_socket_t * app_io_addr
for tracking duplicate sockets
Definition listen.h:35
void const * app_instance
Definition listen.h:38
size_t default_message_size
copied from app_io, but may be changed
Definition listen.h:51
bool connected
is this for a connected socket?
Definition listen.h:42
fr_app_t const * app
Definition listen.h:37
void const * app_io_instance
I/O path configuration context.
Definition listen.h:32
CONF_SECTION * server_cs
CONF_SECTION of the server.
Definition listen.h:40
void * thread_instance
thread / socket context
Definition listen.h:33
int fd
file descriptor for this socket - set by open
Definition listen.h:28
fr_app_io_t const * app_io
I/O path functions.
Definition listen.h:31
int fr_network_listen_delete(fr_network_t *nr, fr_listen_t *li)
Delete a socket from a network.
Definition network.c:259
int fr_network_listen_inject(fr_network_t *nr, fr_listen_t *li, uint8_t const *packet, size_t packet_len, fr_time_t recv_time)
Inject a packet for a listener to read.
Definition network.c:398
void fr_network_listen_read(fr_network_t *nr, fr_listen_t *li)
Signal the network to read from a listener.
Definition network.c:324
void fr_network_listen_write(fr_network_t *nr, fr_listen_t *li, uint8_t const *packet, size_t packet_len, void *packet_ctx, fr_time_t request_time)
Inject a packet for a listener to write.
Definition network.c:350
char const * server
Name of the virtual server client is associated with.
Definition client.h:129
fr_ipaddr_t ipaddr
IPv4/IPv6 address of the host.
Definition client.h:83
char const * secret
Secret PSK.
Definition client.h:90
bool active
for dynamic clients
Definition client.h:119
fr_ipaddr_t src_ipaddr
IPv4/IPv6 address to send responses from (family must match ipaddr).
Definition client.h:84
char const * nas_type
Type of client (arbitrary).
Definition client.h:127
int proto
Protocol number.
Definition client.h:143
CONF_SECTION * cs
CONF_SECTION that was parsed to generate the client.
Definition client.h:134
bool dynamic
Whether the client was dynamically defined.
Definition client.h:118
char const * longname
Client identifier.
Definition client.h:87
fr_socket_limit_t limit
Connections per client (TCP clients only).
Definition client.h:144
char const * shortname
Client nickname.
Definition client.h:88
bool use_connected
do we use connected sockets for this client
Definition client.h:120
CONF_SECTION * server_cs
Virtual server that the client is associated with.
Definition client.h:130
Describes a host allowed to send packets to the server.
Definition client.h:80
#define PERROR(_fmt,...)
Definition log.h:228
#define DEBUG3(_fmt,...)
Definition log.h:266
#define RATE_LIMIT_LOCAL(_entry, _log, _fmt,...)
Rate limit messages using a local limiting entry.
Definition log.h:569
Track when a log message was last repeated.
Definition log.h:547
talloc_free(reap)
Stores all information relating to an event list.
Definition event.c:380
fr_listen_t * child
The child (app_io) IO path.
Definition master.c:45
fr_network_t * nr
network for this connection
Definition master.c:167
static int8_t alive_client_cmp(void const *one, void const *two)
Definition master.c:1293
bool in_trie
is the client in the trie?
Definition master.c:126
static fr_io_pending_packet_t * fr_io_pending_alloc(fr_io_connection_t *connection, fr_io_client_t *client, uint8_t const *buffer, size_t packet_len, fr_io_track_t *track, int priority)
Definition master.c:1248
bool paused
event filter doesn't like resuming something that isn't paused
Definition master.c:164
bool in_parent_hash
for tracking thread issues
Definition master.c:165
static fr_client_t * radclient_clone(TALLOC_CTX *ctx, fr_client_t const *parent)
Definition master.c:389
static ssize_t mod_read(fr_listen_t *li, void **packet_ctx, fr_time_t *recv_time_p, uint8_t *buffer, size_t buffer_len, size_t *leftover)
Implement 99% of the read routines.
Definition master.c:1305
int packets
number of packets using this connection
Definition master.c:155
uint32_t num_pending_packets
number of pending packets
Definition master.c:50
#define DUP_FIELD(_x)
static int track_dedup_free(fr_io_track_t *track)
Definition master.c:192
fr_rb_tree_t * table
tracking table for packets
Definition master.c:131
fr_time_t recv_time
Definition master.c:73
static int8_t pending_packet_cmp(void const *one, void const *two)
Definition master.c:208
fr_heap_t * pending_clients
heap of pending clients
Definition master.c:41
static fr_io_track_t * fr_io_track_add(fr_io_client_t *client, fr_io_address_t *address, uint8_t const *packet, size_t packet_len, fr_time_t recv_time, bool *is_dup)
Definition master.c:1078
bool ready_to_delete
are we ready to delete this client?
Definition master.c:125
static int _client_live_free(fr_io_client_t *client)
Definition master.c:958
fr_heap_index_t pending_id
for pending clients
Definition master.c:121
static int pending_free(fr_io_pending_packet_t *pending)
Definition master.c:1224
bool use_connected
does this client allow connected sub-sockets?
Definition master.c:124
fr_io_client_t * client
our local client (pending or connected).
Definition master.c:159
static int track_free(fr_io_track_t *track)
Definition master.c:180
fr_app_io_t fr_master_app_io
Definition master.c:3253
static void packet_expiry_timer(fr_timer_list_t *tl, fr_time_t now, void *uctx)
Definition master.c:2244
fr_listen_t * listen
The master IO path.
Definition master.c:44
static int8_t pending_client_cmp(void const *one, void const *two)
Definition master.c:238
fr_io_track_t * fr_master_io_track_alloc(fr_listen_t *li, fr_client_t *radclient, fr_ipaddr_t const *src_ipaddr, int src_port, fr_ipaddr_t const *dst_ipaddr, int dst_port)
Definition master.c:3212
fr_io_address_t * address
full information about the connection.
Definition master.c:156
static int8_t address_cmp(void const *one, void const *two)
Definition master.c:256
fr_listen_t * child
child listener (app_io) for this socket
Definition master.c:158
fr_listen_t * listen
master listener for this socket
Definition master.c:157
fr_timer_t * ev
when we clean up the client
Definition master.c:130
fr_network_t * nr
network for the master socket
Definition master.c:38
fr_trie_t * fr_master_io_network(TALLOC_CTX *ctx, int af, fr_ipaddr_t *allow, fr_ipaddr_t *deny)
Create a trie from arrays of allow / deny IP addresses.
Definition master.c:2886
static fr_io_pending_packet_t * pending_packet_pop(fr_io_thread_t *thread)
Definition master.c:351
fr_ipaddr_t network
network for dynamic clients
Definition master.c:117
static void mod_event_list_set(fr_listen_t *li, fr_event_list_t *el, void *nr)
Set the event list for a new socket.
Definition master.c:1998
static int mod_open(fr_listen_t *li)
Open a new listener.
Definition master.c:1962
pthread_mutex_t mutex
for parent / child signaling
Definition master.c:136
fr_heap_index_t heap_id
Definition master.c:71
static fr_io_client_t * client_alloc(TALLOC_CTX *ctx, fr_io_client_state_t state, fr_io_instance_t const *inst, fr_io_thread_t *thread, fr_client_t *radclient, fr_ipaddr_t const *network)
Allocate a dynamic client.
Definition master.c:981
fr_io_instance_t const * inst
parent instance for master IO handler
Definition master.c:128
#define LOG_IGNORED_CLIENTS(_inst)
#define COPY_FIELD(_x)
fr_trie_t * trie
trie of clients
Definition master.c:40
static void client_expiry_timer(fr_timer_list_t *tl, fr_time_t now, void *uctx)
Definition master.c:2031
fr_io_client_state_t
Client states.
Definition master.c:83
@ PR_CLIENT_DYNAMIC
dynamically defined client
Definition master.c:87
@ PR_CLIENT_CONNECTED
dynamically defined client in a connected socket
Definition master.c:88
@ PR_CLIENT_PENDING
dynamic client pending definition
Definition master.c:89
@ PR_CLIENT_INVALID
Definition master.c:84
@ PR_CLIENT_NAK
negative cache entry
Definition master.c:86
@ PR_CLIENT_STATIC
static / global clients
Definition master.c:85
static void get_inst(fr_listen_t *li, fr_io_instance_t const **inst, fr_io_thread_t **thread, fr_io_connection_t **connection, fr_listen_t **child)
Definition master.c:910
static fr_event_update_t pause_read[]
Definition master.c:170
static int8_t track_connected_cmp(void const *one, void const *two)
Definition master.c:325
fr_heap_t * alive_clients
heap of active clients
Definition master.c:42
fr_schedule_t * sc
the scheduler
Definition master.c:46
static fr_io_connection_t * fr_io_connection_alloc(fr_io_instance_t const *inst, fr_io_thread_t *thread, fr_io_client_t *client, int fd, fr_io_address_t *address, fr_io_connection_t *nak)
Create a new connection.
Definition master.c:514
fr_hash_table_t * addresses
list of src/dst addresses used by this client
Definition master.c:134
int fr_master_io_listen(fr_io_instance_t *inst, fr_schedule_t *sc, size_t default_message_size, size_t num_messages)
Definition master.c:3044
static int connection_free(fr_io_connection_t *connection)
Definition master.c:499
struct fr_io_thread_t::@38 rate_limit
int fr_io_listen_free(fr_listen_t *li)
Definition master.c:3036
char const * name
taken from proto_FOO_TRANSPORT
Definition master.c:154
fr_heap_index_t alive_id
for all clients
Definition master.c:122
fr_event_list_t * el
event list for this connection
Definition master.c:166
fr_io_client_state_t state
state of this client
Definition master.c:115
int packets
number of packets using this client
Definition master.c:120
static ssize_t mod_write(fr_listen_t *li, void *packet_ctx, fr_time_t request_time, uint8_t *buffer, size_t buffer_len, size_t written)
Definition master.c:2310
bool dead
roundabout way to get the network side to close a socket
Definition master.c:163
fr_event_list_t * el
event list, for the master socket.
Definition master.c:37
uint64_t client_id
Unique client identifier.
Definition master.c:51
fr_io_thread_t * thread
Definition master.c:129
static char const * mod_name(fr_listen_t *li)
Definition master.c:2863
module_instance_t * mi
for submodule
Definition master.c:161
static int _client_free(fr_io_client_t *client)
Definition master.c:475
static int mod_close(fr_listen_t *li)
Close the socket.
Definition master.c:2737
static uint32_t connection_hash(void const *ctx)
Definition master.c:272
fr_io_connection_t * connection
parent connection
Definition master.c:114
fr_heap_t * pending
pending packets for this client
Definition master.c:133
static int count_connections(UNUSED uint8_t const *key, UNUSED size_t keylen, void *data, void *ctx)
Count the number of connections used by active clients.
Definition master.c:453
static int8_t connection_cmp(void const *one, void const *two)
Definition master.c:286
static int8_t track_cmp(void const *one, void const *two)
Definition master.c:295
fr_hash_table_t * ht
for tracking connected sockets
Definition master.c:137
static int mod_instantiate(module_inst_ctx_t const *mctx)
Definition master.c:2788
fr_io_track_t * track
Definition master.c:74
fr_client_t * radclient
old-style definition of this client
Definition master.c:118
fr_ipaddr_t src_ipaddr
packets come from this address
Definition master.c:116
static fr_event_update_t resume_read[]
Definition master.c:175
static void client_pending_free(fr_io_client_t *client)
Definition master.c:482
uint32_t num_connections
number of dynamic connections
Definition master.c:49
fr_io_client_t * parent
points to the parent client.
Definition master.c:160
static fr_client_t * radclient_alloc(TALLOC_CTX *ctx, int ipproto, fr_io_address_t *address)
Definition master.c:930
static int mod_inject(fr_listen_t *li, uint8_t const *buffer, size_t buffer_len, fr_time_t recv_time)
Inject a packet to a connection.
Definition master.c:1908
Client definitions for master IO.
Definition master.c:113
Track a connection.
Definition master.c:153
A saved packet.
Definition master.c:70
fr_timer_t * ev
when we clean up this tracking entry
Definition master.h:42
uint8_t * reply
reply packet (if any)
Definition master.h:46
int packets
number of packets using this entry
Definition master.h:45
fr_time_t dynamic
timestamp for packet doing dynamic client definition
Definition master.h:53
void * app_io_instance
Easy access to the app_io instance.
Definition master.h:104
fr_app_io_t const * app_io
Easy access to the app_io handle.
Definition master.h:103
fr_io_address_t const * address
of this packet.. shared between multiple packets
Definition master.h:54
bool do_not_respond
don't respond
Definition master.h:50
bool discard
whether or not we discard the packet
Definition master.h:49
fr_time_t timestamp
when this packet was received
Definition master.h:43
bool finished
are we finished the request?
Definition master.h:51
uint8_t * packet
really a tracking structure, not a packet
Definition master.h:56
size_t reply_len
length of reply, or 1 for "do not reply"
Definition master.h:47
fr_io_client_t * client
client handling this packet.
Definition master.h:55
fr_time_t expires
when this packet expires
Definition master.h:44
The master IO instance.
Definition master.h:72
unsigned int uint32_t
long int ssize_t
unsigned char uint8_t
int fr_nonblock(UNUSED int fd)
Definition misc.c:293
module_instance_t * mi
Instance of the module being instantiated.
Definition module_ctx.h:51
Temporary structure to hold arguments for instantiation calls.
Definition module_ctx.h:50
char * fr_asprintf(TALLOC_CTX *ctx, char const *fmt,...)
Special version of asprintf which implements custom format specifiers.
Definition print.c:874
#define fr_assert(_expr)
Definition rad_assert.h:38
static int ipproto
static char * secret
#define DEBUG2(fmt,...)
Definition radclient.h:43
#define INFO(fmt,...)
Definition radict.c:54
static bool cleanup
Definition radsniff.c:60
static rs_t * conf
Definition radsniff.c:53
void * fr_rb_find(fr_rb_tree_t const *tree, void const *data)
Find an element in the tree, returning the data, not the node.
Definition rb.c:577
bool fr_rb_insert(fr_rb_tree_t *tree, void const *data)
Insert data into a tree.
Definition rb.c:626
bool fr_rb_delete(fr_rb_tree_t *tree, void const *data)
Remove node and free data (if a free function was specified)
Definition rb.c:741
#define fr_rb_inline_talloc_alloc(_ctx, _type, _field, _data_cmp, _data_free)
Allocs a red black that verifies elements are of a specific talloc type.
Definition rb.h:246
The main red black tree structure.
Definition rb.h:73
static unsigned int hash(char const *username, unsigned int tablesize)
Definition rlm_passwd.c:132
fr_network_t * fr_schedule_listen_add(fr_schedule_t *sc, fr_listen_t *li)
Add a fr_listen_t to a scheduler.
Definition schedule.c:892
The scheduler.
Definition schedule.c:125
CONF_SECTION * conf
Module's instance configuration.
Definition module.h:329
void * data
Module's instance data.
Definition module.h:271
module_instantiate_t instantiate
Callback to allow the module to register any per-instance resources like sockets and file handles.
Definition module.h:218
@ MODULE_INSTANCE_BOOTSTRAPPED
Module instance has been bootstrapped, but not yet instantiated.
Definition module.h:244
size_t thread_inst_size
Size of the module's thread-specific instance data.
Definition module.h:235
Module instance data.
Definition module.h:265
fr_time_delta_t idle_timeout
Definition socket.h:38
uint32_t max_connections
Definition socket.h:33
static const uchar sc[16]
Definition smbdes.c:115
module_list_type_t const module_list_type_thread_local
Callbacks for a thread local list.
Definition module.c:590
void module_list_mask_set(module_list_t *ml, module_instance_state_t mask)
Set a new bootstrap/instantiate state for a list.
Definition module.c:1837
module_instance_t * module_instance_copy(module_list_t *dst, module_instance_t const *src, char const *inst_name)
Duplicate a module instance, placing it in a new module list.
Definition module.c:1536
module_list_t * module_list_alloc(TALLOC_CTX *ctx, module_list_type_t const *type, char const *name, bool write_protect)
Allocate a new module list.
Definition module.c:1859
int module_thread_instantiate(TALLOC_CTX *ctx, module_instance_t *mi, fr_event_list_t *el)
Allocate thread-local instance data for a module.
Definition module.c:1085
int module_instantiate(module_instance_t *instance)
Manually complete module setup by calling its instantiate function.
Definition module.c:1197
int module_instance_conf_parse(module_instance_t *mi, CONF_SECTION *conf)
Covert a CONF_SECTION into parsed module instance data.
Definition module.c:766
eap_aka_sim_process_conf_t * inst
#define fr_time()
Allow us to arbitrarily manipulate time.
Definition state_test.c:8
char const * fr_syserror(int num)
Guaranteed to be thread-safe version of strerror.
Definition syserror.c:243
#define talloc_get_type_abort_const
Definition talloc.h:282
#define talloc_zero_pooled_object(_ctx, _type, _num_subobjects, _total_subobjects_size)
Definition talloc.h:177
static int talloc_const_free(void const *ptr)
Free const'd memory.
Definition talloc.h:224
static TALLOC_CTX * talloc_init_const(char const *name)
Allocate a top level chunk with a constant name.
Definition talloc.h:112
static int64_t fr_time_delta_unwrap(fr_time_delta_t time)
Definition time.h:154
#define fr_time_delta_lt(_a, _b)
Definition time.h:285
static int64_t fr_time_unwrap(fr_time_t time)
Definition time.h:146
static fr_time_delta_t fr_time_delta_from_sec(int64_t sec)
Definition time.h:590
#define fr_time_delta_wrap(_time)
Definition time.h:152
#define fr_time_wrap(_time)
Definition time.h:145
#define fr_time_delta_ispos(_a)
Definition time.h:290
#define fr_time_eq(_a, _b)
Definition time.h:241
#define NSEC
Definition time.h:379
#define fr_time_add(_a, _b)
Add a time/time delta together.
Definition time.h:196
#define fr_time_neq(_a, _b)
Definition time.h:242
A time delta, a difference in time measured in nanoseconds.
Definition time.h:80
"server local" time.
Definition time.h:69
int fr_timer_delete(fr_timer_t **ev_p)
Delete a timer event and free its memory.
Definition timer.c:643
An event timer list.
Definition timer.c:53
A timer event.
Definition timer.c:79
#define fr_timer_in(...)
Definition timer.h:86
#define fr_timer_at(...)
Definition timer.h:80
void * fr_trie_remove_by_key(fr_trie_t *ft, void const *key, size_t keylen)
Remove a key and return the associated user ctx.
Definition trie.c:2154
fr_trie_t * fr_trie_alloc(TALLOC_CTX *ctx, fr_trie_key_t get_key, fr_free_t free_data)
Allocate a trie.
Definition trie.c:741
int fr_trie_walk(fr_trie_t *ft, void *ctx, fr_trie_walk_t callback)
Definition trie.c:2607
void * fr_trie_lookup_by_key(fr_trie_t const *ft, void const *key, size_t keylen)
Lookup a key in a trie and return user ctx, if any.
Definition trie.c:1262
void * fr_trie_match_by_key(fr_trie_t const *ft, void const *key, size_t keylen)
Match a key and length in a trie and return user ctx, if any.
Definition trie.c:1286
int fr_trie_insert_by_key(fr_trie_t *ft, void const *key, size_t keylen, void const *data)
Insert a key and user ctx into a trie.
Definition trie.c:1875
close(uq->fd)
static fr_event_list_t * el
static fr_slen_t parent
Definition pair.h:845
int fd
File descriptor if this is a live socket.
Definition socket.h:81
int type
SOCK_STREAM, SOCK_DGRAM, etc.
Definition socket.h:79
#define fr_strerror_printf(_fmt,...)
Log to thread local error buffer.
Definition strerror.h:64
#define fr_strerror_const(_msg)
Definition strerror.h:223
static fr_slen_t fr_value_box_aprint(TALLOC_CTX *ctx, char **out, fr_value_box_t const *data, fr_sbuff_escape_rules_t const *e_rules) 1(fr_value_box_print
#define fr_box_ipaddr(_val)
Definition value.h:305
static fr_slen_t data
Definition value.h:1274
#define fr_box_time_delta(_val)
Definition value.h:354
bool listen_record(fr_listen_t *li)
Record that we're listening on a particular IP / port.
fr_listen_t * listen_find_any(fr_listen_t *li)
See if another global listener is using a particular IP / port.