/* Copyright (c) 2016-2020 Chung, Hyung-Hwan. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ #include #include "hio-prv.h" #include #include #include #include #include #include /* strerror */ #include #include #include #include #if defined(HAVE_NETINET_SCTP_H) # include # if defined(IPPROTO_SCTP) # define ENABLE_SCTP # endif #endif #if defined(HAVE_NETPACKET_PACKET_H) # include #endif #if defined(HAVE_NET_IF_DL_H) # include #endif #if defined(HAVE_SYS_SENDFILE_H) # include #endif #if defined(HAVE_SYS_IOCTL_H) # include #endif #if defined(HAVE_NET_BPF_H) # include #endif #if defined(__linux__) # include # if defined(HAVE_LINUX_NETFILTER_IPV4_H) # include /* SO_ORIGINAL_DST */ # endif # if !defined(SO_ORIGINAL_DST) # define SO_ORIGINAL_DST 80 # endif # if !defined(IP_TRANSPARENT) # define IP_TRANSPARENT 19 # endif # if !defined(SO_REUSEPORT) # define SO_REUSEPORT 15 # endif #endif #if defined(HAVE_OPENSSL_SSL_H) && defined(HAVE_SSL) # include # if defined(HAVE_OPENSSL_ERR_H) # include # endif # if defined(HAVE_OPENSSL_ENGINE_H) # include # endif # define USE_SSL #endif /* ========================================================================= */ static hio_syshnd_t open_async_socket (hio_t* hio, int domain, int type, int proto) { hio_syshnd_t sck = HIO_SYSHND_INVALID; #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) type |= SOCK_NONBLOCK | SOCK_CLOEXEC; open_socket: #endif sck = socket(domain, type, proto); if (sck == HIO_SYSHND_INVALID) { #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) if (errno == EINVAL && (type & (SOCK_NONBLOCK | SOCK_CLOEXEC))) { type &= ~(SOCK_NONBLOCK | SOCK_CLOEXEC); goto open_socket; } #endif goto oops; } else { #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) if (type & (SOCK_NONBLOCK | SOCK_CLOEXEC)) goto done; #endif } if (hio_makesyshndasync(hio, sck) <= -1 || hio_makesyshndcloexec(hio, sck) <= -1) goto oops; done: return sck; oops: hio_seterrwithsyserr (hio, 0, errno); if (sck != HIO_SYSHND_INVALID) close (sck); return HIO_SYSHND_INVALID; } static hio_syshnd_t open_async_qx (hio_t* hio, hio_syshnd_t* side_chan) { int fd[2]; int type = SOCK_DGRAM; #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) type |= SOCK_NONBLOCK | SOCK_CLOEXEC; open_socket: #endif if (socketpair(AF_UNIX, type, 0, fd) <= -1) { #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) if (errno == EINVAL && (type & (SOCK_NONBLOCK | SOCK_CLOEXEC))) { type &= ~(SOCK_NONBLOCK | SOCK_CLOEXEC); goto open_socket; } #endif hio_seterrwithsyserr (hio, 0, errno); return HIO_SYSHND_INVALID; } else { #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) if (type & (SOCK_NONBLOCK | SOCK_CLOEXEC)) goto done; #endif } if (hio_makesyshndasync(hio, fd[0]) <= -1 || hio_makesyshndasync(hio, fd[1]) <= -1 || hio_makesyshndcloexec(hio, fd[0]) <= -1 || hio_makesyshndcloexec(hio, fd[1]) <= -1) { hio_seterrwithsyserr (hio, 0, errno); close (fd[0]); close (fd[1]); return HIO_SYSHND_INVALID; } done: *side_chan = fd[1]; /* write end of the pipe */ return fd[0]; /* read end of the pipe */ } static hio_syshnd_t open_async_bpf (hio_t* hio) { hio_syshnd_t fd = HIO_SYSHND_INVALID; #if 0 int tmp; unsigned int bufsize; #endif fd = open("/dev/bpf", O_RDWR); if (fd == HIO_SYSHND_INVALID) goto oops; #if 0 if (ioctl(fd, BIOCIMMEDIATE, &tmp) <= -1) goto oops; if (ioctl(fd, BIOCGBLEN, &bufsize) <= -1) goto oops; #endif return fd; oops: hio_seterrwithsyserr (hio, 0, errno); if (fd != HIO_SYSHND_INVALID) close (fd); return HIO_SYSHND_INVALID; } /* ========================================================================= */ static hio_devaddr_t* skad_to_devaddr (hio_dev_sck_t* dev, const hio_skad_t* sckaddr, hio_devaddr_t* devaddr) { if (sckaddr) { devaddr->ptr = (void*)sckaddr; devaddr->len = hio_skad_get_size(sckaddr); return devaddr; } return HIO_NULL; } static HIO_INLINE hio_skad_t* devaddr_to_skad (hio_dev_sck_t* dev, const hio_devaddr_t* devaddr, hio_skad_t* sckaddr) { return (hio_skad_t*)devaddr->ptr; } /* ========================================================================= */ #define IS_STREAM(sck) ((sck)->dev_cap & HIO_DEV_CAP_STREAM) struct sck_type_map_t { int domain; int type; int proto; unsigned int connectable: 1; unsigned int listenable: 1; hio_bitmask_t extra_dev_cap; }; #define __AF_BPF 999998 static struct sck_type_map_t sck_type_map[] = { /* HIO_DEV_SCK_QX */ { HIO_AF_QX, 0, 0, 0, 0, 0 }, #if defined(AF_UNIX) { AF_UNIX, SOCK_STREAM, 0, 1, 1, HIO_DEV_CAP_STREAM }, #else { -1, 0, 0, 0, 0, 0 }, #endif /* HIO_DEV_SCK_TCP4 */ { AF_INET, SOCK_STREAM, 0, 1, 1, HIO_DEV_CAP_STREAM }, /* HIO_DEV_SCK_TCP6 */ { AF_INET6, SOCK_STREAM, 0, 1, 1, HIO_DEV_CAP_STREAM }, /* HIO_DEV_SCK_UPD4 */ /* TODO: the socket api allows connect() on UDP sockets. should i mark it connectable? */ { AF_INET, SOCK_DGRAM, 0, 0, 0, 0 }, /* HIO_DEV_SCK_UDP6 */ { AF_INET6, SOCK_DGRAM, 0, 0, 0, 0 }, #if defined(ENABLE_SCTP) /* HIO_DEV_SCK_SCTP4 */ { AF_INET, SOCK_STREAM, IPPROTO_SCTP, 1, 1, HIO_DEV_CAP_STREAM }, /* HIO_DEV_SCK_SCTP6 */ { AF_INET6, SOCK_STREAM, IPPROTO_SCTP, 1, 1, HIO_DEV_CAP_STREAM }, /* HIO_DEV_SCK_SCTP4_SP - not implemented */ /*{ AF_INET, SOCK_SEQPACKET, IPPROTO_SCTP, 1, 1, 0 },*/ { -1, 0, 0, 0, 0, 0 }, /* HIO_DEV_SCK_SCTP6_SP - not implemented */ /*{ AF_INET6, SOCK_SEQPACKET, IPPROTO_SCTP, 1, 1, 0 },*/ { -1, 0, 0, 0, 0, 0 }, #else { -1, 0, 0, 0, 0, 0 }, { -1, 0, 0, 0, 0, 0 }, { -1, 0, 0, 0, 0, 0 }, { -1, 0, 0, 0, 0, 0 }, #endif /* HIO_DEV_SCK_ICMP4 - IP protocol field is 1 byte only. no byte order conversion is needed */ { AF_INET, SOCK_RAW, IPPROTO_ICMP, 0, 0, 0 }, /* HIO_DEV_SCK_ICMP6 - IP protocol field is 1 byte only. no byte order conversion is needed */ { AF_INET6, SOCK_RAW, IPPROTO_ICMP, 0, 0, 0 }, #if defined(AF_PACKET) && (HIO_SIZEOF_STRUCT_SOCKADDR_LL > 0) /* HIO_DEV_SCK_ARP - Ethernet type is 2 bytes long. Protocol must be specified in the network byte order */ { AF_PACKET, SOCK_RAW, HIO_CONST_HTON16(HIO_ETHHDR_PROTO_ARP), 0, 0, 0 }, /* HIO_DEV_SCK_ARP_DGRAM - link-level header removed*/ { AF_PACKET, SOCK_DGRAM, HIO_CONST_HTON16(HIO_ETHHDR_PROTO_ARP), 0, 0, 0 }, #elif defined(AF_LINK) && (HIO_SIZEOF_STRUCT_SOCKADDR_DL > 0) /* HIO_DEV_SCK_ARP */ { AF_LINK, SOCK_RAW, HIO_CONST_HTON16(HIO_ETHHDR_PROTO_ARP), 0, 0, 0 }, /* HIO_DEV_SCK_ARP_DGRAM */ { AF_LINK, SOCK_DGRAM, HIO_CONST_HTON16(HIO_ETHHDR_PROTO_ARP), 0, 0, 0 }, #else { -1, 0, 0, 0, 0, 0 }, { -1, 0, 0, 0, 0, 0 }, #endif #if defined(AF_PACKET) && (HIO_SIZEOF_STRUCT_SOCKADDR_LL > 0) /* HIO_DEV_SCK_PACKET */ { AF_PACKET, SOCK_RAW, HIO_CONST_HTON16(ETH_P_ALL), 0, 0, 0 }, #elif defined(AF_LINK) && (HIO_SIZEOF_STRUCT_SOCKADDR_DL > 0) /* HIO_DEV_SCK_PACKET */ { AF_LINK, SOCK_RAW, HIO_CONST_HTON16(0), 0, 0, 0 }, #else { -1, 0, 0, 0, 0, 0 }, #endif /* HIO_DEV_SCK_BPF - arp */ { __AF_BPF, 0, 0, 0, 0, 0 } /* not implemented yet */ }; /* ======================================================================== */ static void connect_timedout (hio_t* hio, const hio_ntime_t* now, hio_tmrjob_t* job) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)job->ctx; HIO_ASSERT (hio, IS_STREAM(rdev)); if (rdev->state & HIO_DEV_SCK_CONNECTING) { /* the state check for HIO_DEV_TCP_CONNECTING is actually redundant * as it must not be fired after it gets connected. the timer job * doesn't need to be deleted when it gets connected for this check * here. this libarary, however, deletes the job when it gets * connected. */ HIO_DEBUG1 (hio, "SCK(%p) - connect timed out. halting\n", rdev); hio_dev_sck_halt (rdev); } } static void ssl_accept_timedout (hio_t* hio, const hio_ntime_t* now, hio_tmrjob_t* job) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)job->ctx; HIO_ASSERT (hio, IS_STREAM(rdev)); if (rdev->state & HIO_DEV_SCK_ACCEPTING_SSL) { HIO_DEBUG1 (hio, "SCK(%p) - ssl-accept timed out. halting\n", rdev); hio_dev_sck_halt(rdev); } } static void ssl_connect_timedout (hio_t* hio, const hio_ntime_t* now, hio_tmrjob_t* job) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)job->ctx; HIO_ASSERT (hio, IS_STREAM(rdev)); if (rdev->state & HIO_DEV_SCK_CONNECTING_SSL) { HIO_DEBUG1 (hio, "SCK(%p) - ssl-connect timed out. halting\n", rdev); hio_dev_sck_halt(rdev); } } static HIO_INLINE int schedule_timer_job_at (hio_dev_sck_t* dev, const hio_ntime_t* fire_at, hio_tmrjob_handler_t handler) { return hio_schedtmrjobat(dev->hio, fire_at, handler, &dev->tmrjob_index, dev); } static HIO_INLINE int schedule_timer_job_after (hio_dev_sck_t* dev, const hio_ntime_t* fire_after, hio_tmrjob_handler_t handler) { return hio_schedtmrjobafter(dev->hio, fire_after, handler, &dev->tmrjob_index, dev); } /* ======================================================================== */ #if defined(USE_SSL) static void set_ssl_error (hio_t* hio, int sslerr) { hio_bch_t emsg[128]; ERR_error_string_n (sslerr, emsg, HIO_COUNTOF(emsg)); hio_seterrbfmt (hio, HIO_ESYSERR, "%hs", emsg); } #endif static int dev_sck_make (hio_dev_t* dev, void* ctx) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; hio_dev_sck_make_t* arg = (hio_dev_sck_make_t*)ctx; hio_syshnd_t hnd = HIO_SYSHND_INVALID; hio_syshnd_t side_chan = HIO_SYSHND_INVALID; HIO_ASSERT (hio, arg->type >= 0 && arg->type < HIO_COUNTOF(sck_type_map)); /* initialize some fields first where 0 is not somthing initial or invalid. */ rdev->hnd = HIO_SYSHND_INVALID; rdev->side_chan = HIO_SYSHND_INVALID; rdev->tmrjob_index = HIO_TMRIDX_INVALID; if (sck_type_map[arg->type].domain <= -1) { hio_seterrnum (hio, HIO_ENOIMPL); /* TODO: better error info? */ goto oops; } if (HIO_UNLIKELY(sck_type_map[arg->type].domain == HIO_AF_QX)) { hnd = open_async_qx(hio, &side_chan); if (hnd == HIO_SYSHND_INVALID) goto oops; } else { hnd = open_async_socket(hio, sck_type_map[arg->type].domain, sck_type_map[arg->type].type, sck_type_map[arg->type].proto); if (hnd == HIO_SYSHND_INVALID) goto oops; #if defined(ENABLE_SCTP) if (sck_type_map[arg->type].type == SOCK_SEQPACKET && sck_type_map[arg->type].proto == IPPROTO_SCTP) { struct sctp_event_subscribe sctp_ev_s; HIO_MEMSET (&sctp_ev_s, 0, HIO_SIZEOF(sctp_ev_s)); sctp_ev_s.sctp_data_io_event = 1; setsockopt (hnd, IPPROTO_SCTP, SCTP_EVENTS, &sctp_ev_s, HIO_SIZEOF(sctp_ev_s)); } #endif } rdev->hnd = hnd; rdev->side_chan = side_chan; rdev->dev_cap = HIO_DEV_CAP_IN | HIO_DEV_CAP_OUT | sck_type_map[arg->type].extra_dev_cap; rdev->on_write = arg->on_write; rdev->on_read = arg->on_read; rdev->on_connect = arg->on_connect; rdev->on_disconnect = arg->on_disconnect; rdev->on_raw_accept = arg->on_raw_accept; rdev->type = arg->type; if (arg->options & HIO_DEV_SCK_MAKE_LENIENT) rdev->state |= HIO_DEV_SCK_LENIENT; return 0; oops: if (hnd != HIO_SYSHND_INVALID) close (hnd); if (side_chan != HIO_SYSHND_INVALID) close (side_chan); return -1; } static int dev_sck_make_client (hio_dev_t* dev, void* ctx) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; hio_syshnd_t* clisckhnd = (hio_syshnd_t*)ctx; /* create a socket device that is made of a socket connection * on a listening socket. * nothing special is done here except setting the socket handle. * most of the initialization is done by the listening socket device * after a client socket has been created. */ rdev->hnd = *clisckhnd; rdev->tmrjob_index = HIO_TMRIDX_INVALID; rdev->side_chan = HIO_SYSHND_INVALID; if (hio_makesyshndasync(hio, rdev->hnd) <= -1 || hio_makesyshndcloexec(hio, rdev->hnd) <= -1) goto oops; return 0; oops: if (rdev->hnd != HIO_SYSHND_INVALID) { close (rdev->hnd); rdev->hnd = HIO_SYSHND_INVALID; } return -1; } static void dev_sck_fail_before_make_client (void* ctx) { hio_syshnd_t* clisckhnd = (hio_syshnd_t*)ctx; close (*clisckhnd); } static int dev_sck_kill (hio_dev_t* dev, int force) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; HIO_DEBUG1 (hio, "SCK(%p) - being killed\n", rdev); #if 0 if (IS_STREAM(rdev)) { /*if (HIO_DEV_SCK_GET_PROGRESS(rdev)) {*/ /* for HIO_DEV_SCK_CONNECTING, HIO_DEV_SCK_CONNECTING_SSL, and HIO_DEV_SCK_ACCEPTING_SSL * on_disconnect() is called without corresponding on_connect(). * it is the same if connect or accept has not been called. */ if (rdev->on_disconnect) rdev->on_disconnect (rdev); /*}*/ } else { /* non-stream, but lisenable or connectable can have the progress bits on */ /*HIO_ASSERT (hio, (rdev->state & HIO_DEV_SCK_ALL_PROGRESS_BITS) == 0);*/ if (rdev->on_disconnect) rdev->on_disconnect (rdev); } #else if (rdev->on_disconnect) rdev->on_disconnect (rdev); #endif if (rdev->tmrjob_index != HIO_TMRIDX_INVALID) { hio_deltmrjob (hio, rdev->tmrjob_index); HIO_ASSERT (hio, rdev->tmrjob_index == HIO_TMRIDX_INVALID); } #if defined(USE_SSL) if (rdev->ssl) { SSL_shutdown ((SSL*)rdev->ssl); /* is this needed? */ SSL_free ((SSL*)rdev->ssl); rdev->ssl = HIO_NULL; } if (!(rdev->state & (HIO_DEV_SCK_ACCEPTED | HIO_DEV_SCK_ACCEPTING_SSL)) && rdev->ssl_ctx) { SSL_CTX_free ((SSL_CTX*)rdev->ssl_ctx); rdev->ssl_ctx = HIO_NULL; } #endif if (rdev->hnd != HIO_SYSHND_INVALID) { close (rdev->hnd); rdev->hnd = HIO_SYSHND_INVALID; } if (rdev->side_chan != HIO_SYSHND_INVALID) { close (rdev->side_chan); rdev->side_chan = HIO_SYSHND_INVALID; } return 0; } static hio_syshnd_t dev_sck_getsyshnd (hio_dev_t* dev) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; return (hio_syshnd_t)rdev->hnd; } /* ------------------------------------------------------------------------------ */ static int dev_sck_read_stream (hio_dev_t* dev, void* buf, hio_iolen_t* len, hio_devaddr_t* srcaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; #if defined(USE_SSL) if (rdev->ssl) { int x; x = SSL_read((SSL*)rdev->ssl, buf, *len); if (x <= -1) { int err = SSL_get_error((SSL*)rdev->ssl, x); if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) return 0; set_ssl_error (hio, err); return -1; } *len = x; } else { #endif ssize_t x; x = recv(rdev->hnd, buf, *len, 0); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data available */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *len = x; #if defined(USE_SSL) } #endif return 1; } static int dev_sck_read_stateless (hio_dev_t* dev, void* buf, hio_iolen_t* len, hio_devaddr_t* srcaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; hio_scklen_t srcaddrlen; ssize_t x; srcaddrlen = HIO_SIZEOF(rdev->remoteaddr); x = recvfrom(rdev->hnd, buf, *len, 0, (struct sockaddr*)&rdev->remoteaddr, &srcaddrlen); if (x <= -1) { int eno = errno; if (eno == EINPROGRESS || eno == EWOULDBLOCK || eno == EAGAIN) return 0; /* no data available */ if (eno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, eno); HIO_DEBUG2 (hio, "SCK(%p) - recvfrom failure - %hs", rdev, strerror(eno)); return -1; } srcaddr->ptr = &rdev->remoteaddr; srcaddr->len = srcaddrlen; *len = x; return 1; } static int dev_sck_read_bpf (hio_dev_t* dev, void* buf, hio_iolen_t* len, hio_devaddr_t* srcaddr) { hio_t* hio = dev->hio; /*hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev;*/ hio_seterrwithsyserr (hio, 0, HIO_ENOIMPL); return -1; } #if defined(ENABLE_SCTP) static int recvmsg_sctp( int s, void* ptr, hio_oow_t len, struct sockaddr* srcaddr, hio_scklen_t* srcaddrlen, struct sctp_sndrcvinfo* sinfo, int* msg_flags) { int n; struct iovec iov; struct msghdr msg; struct cmsghdr* cmsg; hio_uint8_t cmsg_buf[CMSG_SPACE(HIO_SIZEOF(*sinfo))]; iov.iov_base = ptr; iov.iov_len = len; HIO_MEMSET (&msg, 0, HIO_SIZEOF(msg)); msg.msg_name = srcaddr; msg.msg_namelen = *srcaddrlen; msg.msg_iov = &iov; msg.msg_iovlen = 1; msg.msg_control = cmsg_buf; msg.msg_controllen = HIO_SIZEOF(cmsg_buf); n = recvmsg(s, &msg, 0); if (n <= -1) return n; *srcaddrlen = msg.msg_namelen; if (msg_flags) *msg_flags = msg.msg_flags; for (cmsg = CMSG_FIRSTHDR(&msg); cmsg ; cmsg = CMSG_NXTHDR(&msg, cmsg)) { if (cmsg->cmsg_level == IPPROTO_SCTP && cmsg->cmsg_type == SCTP_SNDRCV) { HIO_MEMCPY(sinfo, CMSG_DATA(cmsg), HIO_SIZEOF(*sinfo)); break; } } return n; } static int sendmsg_sctp( int s, const hio_iovec_t* iov, hio_oow_t iovcnt, struct sockaddr* dstaddr, hio_scklen_t dstaddrlen, hio_uint32_t ppid, hio_uint32_t flags, hio_uint16_t stream_no, hio_uint32_t ttl, hio_uint32_t context) { struct sctp_sndrcvinfo* sinfo; struct msghdr msg; struct cmsghdr* cmsg; hio_uint8_t cmsg_buf[CMSG_SPACE(HIO_SIZEOF(*sinfo))]; msg.msg_name = dstaddr; msg.msg_namelen = dstaddrlen; msg.msg_iov = (struct iovec*)iov; msg.msg_iovlen = iovcnt; msg.msg_control = cmsg_buf; msg.msg_controllen = HIO_SIZEOF(cmsg_buf); msg.msg_flags = 0; cmsg = CMSG_FIRSTHDR(&msg); cmsg->cmsg_level = IPPROTO_SCTP; cmsg->cmsg_type = SCTP_SNDRCV; cmsg->cmsg_len = CMSG_LEN(HIO_SIZEOF(*sinfo)); msg.msg_controllen = cmsg->cmsg_len; sinfo = (struct sctp_sndrcvinfo *)CMSG_DATA(cmsg); HIO_MEMSET (sinfo, 0, HIO_SIZEOF(*sinfo)); sinfo->sinfo_ppid = ppid; sinfo->sinfo_flags = flags; sinfo->sinfo_stream = stream_no; sinfo->sinfo_timetolive = ttl; sinfo->sinfo_context = context; return sendmsg(s, &msg, 0); } static int dev_sck_read_sctp_sp (hio_dev_t* dev, void* buf, hio_iolen_t* len, hio_devaddr_t* srcaddr) { /* NOTE: sctp support is far away from complete */ hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; hio_scklen_t srcaddrlen; ssize_t x; int msg_flags; struct sctp_sndrcvinfo sri; srcaddrlen = HIO_SIZEOF(rdev->remoteaddr); /* msg_flags -> flags such as MSG_NOTIFICATION or MSG_EOR */ x = recvmsg_sctp(rdev->hnd, buf, *len, (struct sockaddr*)&rdev->remoteaddr, &srcaddrlen, &sri, &msg_flags); if (x <= -1) { int eno = errno; if (eno == EINPROGRESS || eno == EWOULDBLOCK || eno == EAGAIN) return 0; /* no data available */ if (eno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, eno); HIO_DEBUG2 (hio, "SCK(%p) - recvfrom failure - %hs", rdev, strerror(eno)); return -1; } /* if (msg_flags & MSG_EOR) end of message?? else push to buffer??? */ hio_skad_set_chan (&rdev->remoteaddr, sri.sinfo_stream); /* TODO: how to store sri.sinfo_ppid or sri.sinfo_context? */ srcaddr->ptr = &rdev->remoteaddr; srcaddr->len = srcaddrlen; *len = x; return 1; } #endif /* ------------------------------------------------------------------------------ */ static int dev_sck_write_stream (hio_dev_t* dev, const void* data, hio_iolen_t* len, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; #if defined(USE_SSL) if (rdev->ssl) { int x; if (*len <= 0) { /* it's a writing finish indicator. close the writing end of * the socket, probably leaving it in the half-closed state */ if ((x = SSL_shutdown((SSL*)rdev->ssl)) <= -1) { set_ssl_error (hio, SSL_get_error((SSL*)rdev->ssl, x)); return -1; } return 1; } x = SSL_write((SSL*)rdev->ssl, data, *len); if (x <= -1) { int err = SSL_get_error ((SSL*)rdev->ssl, x); if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) return 0; set_ssl_error (hio, err); return -1; } *len = x; } else { #endif ssize_t x; int flags = 0; if (*len <= 0) { /* the write handler for a stream device must handle a zero-length * writing request specially. it's a writing finish indicator. close * the writing end of the socket, probably leaving it in the half-closed state */ if (shutdown(rdev->hnd, SHUT_WR) <= -1) { hio_seterrwithsyserr (hio, 0, errno); return -1; } /* it must return a non-zero positive value. if it returns 0, this request * gets enqueued by the core. we must aovid it */ return 1; } /* TODO: flags MSG_DONTROUTE, MSG_DONTWAIT, MSG_MORE, MSG_OOB, MSG_NOSIGNAL */ #if defined(MSG_NOSIGNAL) flags |= MSG_NOSIGNAL; #endif x = send(rdev->hnd, data, *len, flags); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *len = x; #if defined(USE_SSL) } #endif return 1; } static int dev_sck_writev_stream (hio_dev_t* dev, const hio_iovec_t* iov, hio_iolen_t* iovcnt, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; #if defined(USE_SSL) if (rdev->ssl) { int x; hio_iolen_t i, nwritten; if (*iovcnt <= 0) { /* it's a writing finish indicator. close the writing end of * the socket, probably leaving it in the half-closed state */ if ((x = SSL_shutdown((SSL*)rdev->ssl)) <= -1) { set_ssl_error (hio, SSL_get_error((SSL*)rdev->ssl, x)); return -1; } return 1; } nwritten = 0; for (i = 0; i < *iovcnt; i++) { /* no SSL_writev. invoke multiple calls to SSL_write(). * since the write function is for the stream connection, * mutiple calls shouldn't really matter */ x = SSL_write((SSL*)rdev->ssl, iov[i].iov_ptr, iov[i].iov_len); if (x <= -1) { int err = SSL_get_error ((SSL*)rdev->ssl, x); if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) return 0; set_ssl_error (hio, err); return -1; } nwritten += x; } *iovcnt = nwritten; } else { #endif ssize_t x; int flags = 0; struct msghdr msg; if (*iovcnt <= 0) { /* it's a writing finish indicator. close the writing end of * the socket, probably leaving it in the half-closed state */ if (shutdown(rdev->hnd, SHUT_WR) <= -1) { hio_seterrwithsyserr (hio, 0, errno); return -1; } return 1; } /* TODO: flags MSG_DONTROUTE, MSG_DONTWAIT, MSG_MORE, MSG_OOB, MSG_NOSIGNAL */ #if defined(MSG_NOSIGNAL) flags |= MSG_NOSIGNAL; #endif #if defined(MSG_DONTWAIT) flags |= MSG_DONTWAIT; #endif #if defined(HAVE_SENDMSG) HIO_MEMSET (&msg, 0, HIO_SIZEOF(msg)); msg.msg_iov = (struct iovec*)iov; msg.msg_iovlen = *iovcnt; x = sendmsg(rdev->hnd, &msg, flags); #else x = writev(rdev->hnd, (const struct iovec*)iov, *iovcnt); #endif if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *iovcnt = x; #if defined(USE_SSL) } #endif return 1; } /* ------------------------------------------------------------------------------ */ static int dev_sck_write_stateless (hio_dev_t* dev, const void* data, hio_iolen_t* len, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; ssize_t x; x = sendto(rdev->hnd, data, *len, 0, dstaddr->ptr, dstaddr->len); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *len = x; return 1; } static int dev_sck_writev_stateless (hio_dev_t* dev, const hio_iovec_t* iov, hio_iolen_t* iovcnt, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; struct msghdr msg; ssize_t x; int flags = 0; HIO_MEMSET (&msg, 0, HIO_SIZEOF(msg)); if (HIO_LIKELY(dstaddr)) { msg.msg_name = dstaddr->ptr; msg.msg_namelen = dstaddr->len; } msg.msg_iov = (struct iovec*)iov; msg.msg_iovlen = *iovcnt; #if defined(MSG_NOSIGNAL) flags |= MSG_NOSIGNAL; #endif #if defined(MSG_DONTWAIT) flags |= MSG_DONTWAIT; #endif x = sendmsg(rdev->hnd, &msg, flags); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *iovcnt = x; return 1; } /* ------------------------------------------------------------------------------ */ static int dev_sck_write_bpf (hio_dev_t* dev, const void* data, hio_iolen_t* len, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; /*hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev;*/ hio_seterrwithsyserr (hio, 0, HIO_ENOIMPL); return -1; } static int dev_sck_writev_bpf (hio_dev_t* dev, const hio_iovec_t* iov, hio_iolen_t* iovcnt, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; /*hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev;*/ hio_seterrwithsyserr (hio, 0, HIO_ENOIMPL); return -1; } /* ------------------------------------------------------------------------------ */ #if defined(ENABLE_SCTP) static int dev_sck_write_sctp_sp (hio_dev_t* dev, const void* data, hio_iolen_t* len, const hio_devaddr_t* dstaddr) { /* NOTE: sctp support is far away from complete */ hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; ssize_t x; hio_iovec_t iov; iov.iov_ptr = (void*)data; iov.iov_len = *len; x = sendmsg_sctp(rdev->hnd, &iov, 1, dstaddr->ptr, dstaddr->len, 0, /* ppid - opaque */ 0, /* flags (e.g. SCTP_UNORDERED, SCTP_EOF, SCT_ABORT, ...) */ hio_skad_get_chan(dstaddr->ptr), /* stream number */ 0, /* ttl */ 0 /* context*/); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *len = x; return 1; } static int dev_sck_writev_sctp_sp (hio_dev_t* dev, const hio_iovec_t* iov, hio_iolen_t* iovcnt, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; ssize_t x; x = sendmsg_sctp(rdev->hnd, iov, *iovcnt, dstaddr->ptr, dstaddr->len, 0, /* ppid - opaque */ 0, /* flags (e.g. SCTP_UNORDERED, SCTP_EOF, SCT_ABORT, ...) */ hio_skad_get_chan(dstaddr->ptr), /* stream number */ 0, /* ttl */ 0 /* context*/); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *iovcnt = x; return 1; } #endif /* ------------------------------------------------------------------------------ */ static int dev_sck_sendfile_stream (hio_dev_t* dev, hio_syshnd_t in_fd, hio_foff_t foff, hio_iolen_t* len) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; #if 0 && defined(USE_SSL) /* TODO: ssl needs to read from the file... and send... */ if (rdev->ssl) { int x; if (*len <= 0) { /* it's a writing finish indicator. close the writing end of * the socket, probably leaving it in the half-closed state */ if ((x = SSL_shutdown((SSL*)rdev->ssl)) <= -1) { set_ssl_error (hio, SSL_get_error((SSL*)rdev->ssl, x)); return -1; } return 1; } x = SSL_write((SSL*)rdev->ssl, data, *len); if (x <= -1) { int err = SSL_get_error ((SSL*)rdev->ssl, x); if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) return 0; set_ssl_error (hio, err); return -1; } *len = x; } else { #endif ssize_t x; if (*len <= 0) { /* the write handler for a stream device must handle a zero-length * writing request specially. it's a writing finish indicator. close * the writing end of the socket, probably leaving it in the half-closed state */ if (shutdown(rdev->hnd, SHUT_WR) <= -1) { hio_seterrwithsyserr (hio, 0, errno); return -1; } /* it must return a non-zero positive value. if it returns 0, this request * gets enqueued by the core. we must aovid it */ return 1; } #if defined(HAVE_SENDFILE) /* TODO: cater for other systems */ x = sendfile(rdev->hnd, in_fd, &foff, *len); if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; /* no data can be written */ if (errno == EINTR) return 0; hio_seterrwithsyserr (hio, 0, errno); return -1; } *len = x; #else hio_seterrnum (hio, HIO_ENOIMPL); return -1; #endif #if 0 && defined(USE_SSL) } #endif return 1; } /* ------------------------------------------------------------------------------ */ #if defined(USE_SSL) static int do_ssl (hio_dev_sck_t* dev, int (*ssl_func)(SSL*)) { hio_t* hio = dev->hio; int ret, watcher_cmd, watcher_events; HIO_ASSERT (hio, dev->ssl_ctx); if (!dev->ssl) { SSL* ssl; ssl = SSL_new(dev->ssl_ctx); if (!ssl) { set_ssl_error (hio, ERR_get_error()); return -1; } if (SSL_set_fd(ssl, dev->hnd) == 0) { set_ssl_error (hio, ERR_get_error()); return -1; } SSL_set_read_ahead (ssl, 0); dev->ssl = ssl; } watcher_cmd = HIO_DEV_WATCH_RENEW; watcher_events = HIO_DEV_EVENT_IN; ret = ssl_func((SSL*)dev->ssl); if (ret <= 0) { int err = SSL_get_error(dev->ssl, ret); if (err == SSL_ERROR_WANT_READ) { /* handshaking isn't complete */ ret = 0; } else if (err == SSL_ERROR_WANT_WRITE) { /* handshaking isn't complete */ watcher_cmd = HIO_DEV_WATCH_UPDATE; watcher_events = HIO_DEV_EVENT_IN | HIO_DEV_EVENT_OUT; ret = 0; } else { set_ssl_error (hio, err); ret = -1; } } else { ret = 1; /* accepted */ } if (hio_dev_watch((hio_dev_t*)dev, watcher_cmd, watcher_events) <= -1) { hio_stop (hio, HIO_STOPREQ_WATCHER_ERROR); ret = -1; } return ret; } static HIO_INLINE int connect_ssl (hio_dev_sck_t* dev) { return do_ssl(dev, SSL_connect); } static HIO_INLINE int accept_ssl (hio_dev_sck_t* dev) { return do_ssl(dev, SSL_accept); } #endif static int dev_sck_ioctl (hio_dev_t* dev, int cmd, void* arg) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; switch (cmd) { case HIO_DEV_SCK_BIND: { hio_dev_sck_bind_t* bnd = (hio_dev_sck_bind_t*)arg; int x; #if defined(USE_SSL) SSL_CTX* ssl_ctx = HIO_NULL; #endif if (HIO_DEV_SCK_GET_PROGRESS(rdev)) { /* can't bind again */ hio_seterrbfmt (hio, HIO_EPERM, "operation in progress. not allowed to bind again"); return -1; } if (hio_skad_get_family(&bnd->localaddr) == HIO_AF_INET6) /* getsockopt(rdev->hnd, SO_DOMAIN, ...) may return the domain but it's kernel specific as well */ { #if defined(IPV6_V6ONLY) /* TODO: should i make it into bnd->options? HIO_DEV_SCK_BIND_IPV6ONLY? applicable to ipv6 though. */ int v = 1; if (setsockopt(rdev->hnd, IPPROTO_IPV6, IPV6_V6ONLY, &v, HIO_SIZEOF(v)) <= -1) { if (!(bnd->options & HIO_DEV_SCK_BIND_IGNERR)) { hio_seterrbfmtwithsyserr (hio, 0, errno, "unable to set IPV6_V6ONLY"); return -1; } } #endif } if (bnd->options & HIO_DEV_SCK_BIND_BROADCAST) { int v = 1; if (setsockopt(rdev->hnd, SOL_SOCKET, SO_BROADCAST, &v, HIO_SIZEOF(v)) <= -1) { /* not affected by HIO_DEV_SCK_BIND_IGNERR */ hio_seterrbfmtwithsyserr (hio, 0, errno, "unable to set SO_BROADCAST"); return -1; } } if (bnd->options & HIO_DEV_SCK_BIND_REUSEADDR) { #if defined(SO_REUSEADDR) int v = 1; if (setsockopt(rdev->hnd, SOL_SOCKET, SO_REUSEADDR, &v, HIO_SIZEOF(v)) <= -1) { if (!(bnd->options & HIO_DEV_SCK_BIND_IGNERR)) { hio_seterrbfmtwithsyserr (hio, 0, errno, "unable to set SO_REUSEADDR"); return -1; } } /* ignore it if not available #else hio_seterrnum (hio, HIO_ENOIMPL); return -1; */ #endif } if (bnd->options & HIO_DEV_SCK_BIND_REUSEPORT) { #if defined(SO_REUSEPORT) int v = 1; if (setsockopt(rdev->hnd, SOL_SOCKET, SO_REUSEPORT, &v, HIO_SIZEOF(v)) <= -1) { if (!(bnd->options & HIO_DEV_SCK_BIND_IGNERR)) { hio_seterrbfmtwithsyserr (hio, 0, errno, "unable to set SO_REUSEPORT"); return -1; } } /* ignore it if not available #else hio_seterrnum (hio, HIO_ENOIMPL); return -1; */ #endif } if (bnd->options & HIO_DEV_SCK_BIND_TRANSPARENT) { #if defined(IP_TRANSPARENT) int v = 1; if (setsockopt(rdev->hnd, SOL_IP, IP_TRANSPARENT, &v, HIO_SIZEOF(v)) <= -1) { hio_seterrbfmtwithsyserr (hio, 0, errno, "unable to set IP_TRANSPARENT"); return -1; } /* ignore it if not available #else hio_seterrnum (hio, HIO_ENOIMPL); return -1; */ #endif } if (rdev->ssl_ctx) { #if defined(USE_SSL) SSL_CTX_free (rdev->ssl_ctx); #endif rdev->ssl_ctx = HIO_NULL; if (rdev->ssl) { #if defined(USE_SSL) SSL_free (rdev->ssl); #endif rdev->ssl = HIO_NULL; } } if (bnd->options & HIO_DEV_SCK_BIND_SSL) { #if defined(USE_SSL) if (!bnd->ssl_certfile || !bnd->ssl_keyfile) { hio_seterrbfmt (hio, HIO_EINVAL, "SSL certficate/key file not set"); return -1; } ssl_ctx = SSL_CTX_new(SSLv23_server_method()); if (!ssl_ctx) { set_ssl_error (hio, ERR_get_error()); return -1; } if (SSL_CTX_use_certificate_file(ssl_ctx, bnd->ssl_certfile, SSL_FILETYPE_PEM) == 0 || SSL_CTX_use_PrivateKey_file(ssl_ctx, bnd->ssl_keyfile, SSL_FILETYPE_PEM) == 0 || SSL_CTX_check_private_key(ssl_ctx) == 0 /*|| SSL_CTX_use_certificate_chain_file(ssl_ctx, bnd->chainfile) == 0*/) { set_ssl_error (hio, ERR_get_error()); SSL_CTX_free (ssl_ctx); return -1; } SSL_CTX_set_read_ahead (ssl_ctx, 0); SSL_CTX_set_mode (ssl_ctx, SSL_CTX_get_mode(ssl_ctx) | /*SSL_MODE_ENABLE_PARTIAL_WRITE |*/ SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER); SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_SSLv2); /* no outdated SSLv2 by default */ #else hio_seterrnum (hio, HIO_ENOIMPL); return -1; #endif } x = bind(rdev->hnd, (struct sockaddr*)&bnd->localaddr, hio_skad_get_size(&bnd->localaddr)); if (x <= -1) { hio_seterrwithsyserr (hio, 0, errno); #if defined(USE_SSL) if (ssl_ctx) SSL_CTX_free (ssl_ctx); #endif return -1; } rdev->localaddr = bnd->localaddr; #if defined(USE_SSL) rdev->ssl_ctx = ssl_ctx; #endif return 0; } case HIO_DEV_SCK_CONNECT: { hio_dev_sck_connect_t* conn = (hio_dev_sck_connect_t*)arg; struct sockaddr* sa = (struct sockaddr*)&conn->remoteaddr; hio_scklen_t sl; int x; #if defined(USE_SSL) SSL_CTX* ssl_ctx = HIO_NULL; #endif if (HIO_DEV_SCK_GET_PROGRESS(rdev)) { /* can't connect again */ hio_seterrbfmt (hio, HIO_EPERM, "operation in progress. disallowed to connect again"); return -1; } if (!sck_type_map[rdev->type].connectable) { hio_seterrbfmt (hio, HIO_EPERM, "unconnectable socket device"); return -1; } if (sa->sa_family == AF_INET) sl = HIO_SIZEOF(struct sockaddr_in); else if (sa->sa_family == AF_INET6) sl = HIO_SIZEOF(struct sockaddr_in6); else { hio_seterrbfmt (hio, HIO_EINVAL, "unknown address family %d", sa->sa_family); return -1; } #if defined(USE_SSL) if (rdev->ssl_ctx) { if (rdev->ssl) { SSL_free (rdev->ssl); rdev->ssl = HIO_NULL; } SSL_CTX_free (rdev->ssl_ctx); rdev->ssl_ctx = HIO_NULL; } if (conn->options & HIO_DEV_SCK_CONNECT_SSL) { ssl_ctx = SSL_CTX_new(SSLv23_client_method()); if (!ssl_ctx) { set_ssl_error (hio, ERR_get_error()); return -1; } SSL_CTX_set_read_ahead (ssl_ctx, 0); SSL_CTX_set_mode (ssl_ctx, SSL_CTX_get_mode(ssl_ctx) | /* SSL_MODE_ENABLE_PARTIAL_WRITE | */ SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER); } #endif /* the socket is already non-blocking */ /*{ int flags = fcntl (rdev->hnd, F_GETFL); fcntl (rdev->hnd, F_SETFL, flags & ~O_NONBLOCK); }*/ x = connect(rdev->hnd, sa, sl); /*{ int flags = fcntl (rdev->hnd, F_GETFL); fcntl (rdev->hnd, F_SETFL, flags | O_NONBLOCK); }*/ if (x <= -1) { if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) { if (hio_dev_watch((hio_dev_t*)rdev, HIO_DEV_WATCH_UPDATE, HIO_DEV_EVENT_IN | HIO_DEV_EVENT_OUT) <= -1) { /* watcher update failure. it's critical */ hio_stop (hio, HIO_STOPREQ_WATCHER_ERROR); goto oops_connect_watcher_error; } else { HIO_INIT_NTIME (&rdev->tmout, 0, 0); /* just in case */ if (HIO_IS_POS_NTIME(&conn->connect_tmout)) { if (schedule_timer_job_after(rdev, &conn->connect_tmout, connect_timedout) <= -1) { goto oops_connect; } else { /* update rdev->tmout to the deadline of the connect timeout job */ HIO_ASSERT (hio, rdev->tmrjob_index != HIO_TMRIDX_INVALID); hio_gettmrjobdeadline (hio, rdev->tmrjob_index, &rdev->tmout); } } rdev->remoteaddr = conn->remoteaddr; #if defined(USE_SSL) rdev->ssl_ctx = ssl_ctx; #endif HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_CONNECTING); return 0; } } hio_seterrwithsyserr (hio, 0, errno); oops_connect: if (hio_dev_watch((hio_dev_t*)rdev, HIO_DEV_WATCH_UPDATE, HIO_DEV_EVENT_IN) <= -1) { /* watcher update failure. it's critical */ hio_stop (hio, HIO_STOPREQ_WATCHER_ERROR); } oops_connect_watcher_error: #if defined(USE_SSL) if (ssl_ctx) SSL_CTX_free (ssl_ctx); #endif return -1; } else { /* connected immediately */ /* don't call on_connect() callback even though the connection has been established. * i don't want on_connect() to be called within the this function. */ if (hio_dev_watch((hio_dev_t*)rdev, HIO_DEV_WATCH_UPDATE, HIO_DEV_EVENT_IN | HIO_DEV_EVENT_OUT) <= -1) { /* watcher update failure. it's critical */ hio_stop (hio, HIO_STOPREQ_WATCHER_ERROR); goto oops_connect; } /* as i know it's connected already, * i don't schedule a connection timeout job */ rdev->remoteaddr = conn->remoteaddr; #if defined(USE_SSL) rdev->ssl_ctx = ssl_ctx; #endif /* set progress CONNECTING so that the ready handler invokes on_connect() */ HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_CONNECTING); return 0; } } case HIO_DEV_SCK_LISTEN: { hio_dev_sck_listen_t* lstn = (hio_dev_sck_listen_t*)arg; int x; if (HIO_DEV_SCK_GET_PROGRESS(rdev)) { /* can't listen again */ hio_seterrbfmt (hio, HIO_EPERM, "operation in progress. disallowed to listen again"); return -1; } if (!sck_type_map[rdev->type].listenable) { hio_seterrbfmt (hio, HIO_EPERM, "unlistenable socket device"); return -1; } x = listen(rdev->hnd, lstn->backlogs); if (x <= -1) { hio_seterrwithsyserr (hio, 0, errno); return -1; } if (rdev->dev_cap & HIO_DEV_CAP_WATCH_REREG_REQUIRED) { /* On NetBSD, the listening socket added before listen() * doesn't generate an event even if a new connection is ready * to be accepted. */ /* TODO: need to keep the old watch flags before STOP and * use the flags witn START */ if (hio_dev_watch((hio_dev_t*)rdev, HIO_DEV_WATCH_STOP, 0) <= -1 || hio_dev_watch((hio_dev_t*)rdev, HIO_DEV_WATCH_START, 0) <= -1) { hio_stop (hio, HIO_STOPREQ_WATCHER_ERROR); return -1; } } rdev->tmout = lstn->accept_tmout; HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_LISTENING); return 0; } } return 0; } static hio_dev_mth_t dev_mth_sck_stateless = { dev_sck_make, dev_sck_kill, HIO_NULL, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, /* ioctl */ dev_sck_read_stateless, dev_sck_write_stateless, dev_sck_writev_stateless, HIO_NULL, /* sendfile */ }; static hio_dev_mth_t dev_mth_sck_stream = { dev_sck_make, dev_sck_kill, HIO_NULL, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, /* ioctl */ dev_sck_read_stream, dev_sck_write_stream, dev_sck_writev_stream, dev_sck_sendfile_stream, }; #if defined(ENABLE_SCTP) static hio_dev_mth_t dev_mth_sck_sctp_sp = { dev_sck_make, dev_sck_kill, HIO_NULL, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, /* ioctl */ dev_sck_read_sctp_sp, dev_sck_write_sctp_sp, dev_sck_writev_sctp_sp, HIO_NULL, /* sendfile */ }; #endif static hio_dev_mth_t dev_mth_clisck_stateless = { dev_sck_make_client, dev_sck_kill, dev_sck_fail_before_make_client, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, dev_sck_read_stateless, dev_sck_write_stateless, dev_sck_writev_stateless, HIO_NULL, }; static hio_dev_mth_t dev_mth_clisck_stream = { dev_sck_make_client, dev_sck_kill, dev_sck_fail_before_make_client, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, dev_sck_read_stream, dev_sck_write_stream, dev_sck_writev_stream, dev_sck_sendfile_stream }; #if defined(ENABLE_SCTP) static hio_dev_mth_t dev_mth_clisck_sctp_sp = { dev_sck_make_client, dev_sck_kill, dev_sck_fail_before_make_client, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, dev_sck_read_sctp_sp, dev_sck_write_sctp_sp, dev_sck_writev_sctp_sp, HIO_NULL, }; #endif static hio_dev_mth_t dev_mth_sck_bpf = { dev_sck_make, dev_sck_kill, HIO_NULL, dev_sck_getsyshnd, HIO_NULL, dev_sck_ioctl, /* ioctl */ dev_sck_read_bpf, dev_sck_write_bpf, dev_sck_writev_bpf, HIO_NULL, /* sendfile */ }; /* ========================================================================= */ static int harvest_outgoing_connection (hio_dev_sck_t* rdev) { hio_t* hio = rdev->hio; int errcode; hio_scklen_t len; HIO_ASSERT (hio, !(rdev->state & HIO_DEV_SCK_CONNECTED)); len = HIO_SIZEOF(errcode); if (getsockopt(rdev->hnd, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) <= -1) { hio_seterrbfmtwithsyserr (hio, 0, errno, "unable to get SO_ERROR"); return -1; } else if (errcode == 0) { hio_skad_t localaddr; hio_scklen_t addrlen; /* connected */ if (rdev->tmrjob_index != HIO_TMRIDX_INVALID) { hio_deltmrjob (hio, rdev->tmrjob_index); HIO_ASSERT (hio, rdev->tmrjob_index == HIO_TMRIDX_INVALID); } addrlen = HIO_SIZEOF(localaddr); if (getsockname(rdev->hnd, (struct sockaddr*)&localaddr, &addrlen) == 0) rdev->localaddr = localaddr; if (hio_dev_watch((hio_dev_t*)rdev, HIO_DEV_WATCH_RENEW, HIO_DEV_EVENT_IN) <= -1) { /* watcher update failure. it's critical */ hio_stop (hio, HIO_STOPREQ_WATCHER_ERROR); return -1; } #if defined(USE_SSL) if (rdev->ssl_ctx) { int x; HIO_ASSERT (hio, !rdev->ssl); /* must not be SSL-connected yet */ x = connect_ssl(rdev); if (x <= -1) return -1; if (x == 0) { /* underlying socket connected but not SSL-connected */ HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_CONNECTING_SSL); HIO_ASSERT (hio, rdev->tmrjob_index == HIO_TMRIDX_INVALID); /* rdev->tmout has been set to the deadline of the connect task * when the CONNECT IOCTL command has been executed. use the * same deadline here */ if (HIO_IS_POS_NTIME(&rdev->tmout) && schedule_timer_job_at(rdev, &rdev->tmout, ssl_connect_timedout) <= -1) { HIO_DEBUG1 (hio, "SCK(%p) - ssl-connect timeout scheduling failed. halting\n", rdev); hio_dev_sck_halt (rdev); } return 0; } else { goto ssl_connected; } } else { ssl_connected: #endif HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_CONNECTED); if (rdev->on_connect) rdev->on_connect (rdev); #if defined(USE_SSL) } #endif return 0; } else if (errcode == EINPROGRESS || errcode == EWOULDBLOCK) { /* still in progress */ return 0; } else { hio_seterrwithsyserr (hio, 0, errcode); return -1; } } static int make_accepted_client_connection (hio_dev_sck_t* rdev, hio_syshnd_t clisck, hio_skad_t* remoteaddr, hio_dev_sck_type_t clisck_type) { hio_t* hio = rdev->hio; hio_dev_sck_t* clidev; hio_scklen_t addrlen; hio_dev_mth_t* dev_mth; if (rdev->on_raw_accept) { /* this is a special optional callback. If you don't want a client socket device * to be created upon accept, you may implement the on_raw_accept() handler. * the socket handle is delegated to the callback. */ rdev->on_raw_accept (rdev, clisck, remoteaddr); return 0; } /* rdev->dev_size: * use rdev->dev_size when instantiating a client sck device * instead of HIO_SIZEOF(hio_dev_sck_t). therefore, the * extension area as big as that of the master socket device * is created in the client sck device * dev_mth: * choose the client socket method base on the master socket * device capability. currently, stream or non-stream is supported. */ #if defined(ENABLE_SCTP) dev_mth = (sck_type_map[clisck_type].extra_dev_cap & HIO_DEV_CAP_STREAM)? &dev_mth_clisck_stream: (sck_type_map[clisck_type].proto == IPPROTO_SCTP)? &dev_mth_clisck_sctp_sp: &dev_mth_clisck_stateless; #else dev_mth = (sck_type_map[clisck_type].extra_dev_cap & HIO_DEV_CAP_STREAM)? &dev_mth_clisck_stream: &dev_mth_clisck_stateless; #endif clidev = (hio_dev_sck_t*)hio_dev_make(hio, rdev->dev_size, dev_mth, rdev->dev_evcb, &clisck); if (HIO_UNLIKELY(!clidev)) { /* [NOTE] 'clisck' is closed by callback methods called by hio_dev_make() upon failure */ HIO_DEBUG3 (hio, "SCK(%p) - unable to make a new accepted device for %d - %js\n", rdev, (int)clisck, hio_geterrmsg(hio)); return -1; } clidev->type = clisck_type; HIO_ASSERT (hio, clidev->hnd == clisck); clidev->dev_cap |= HIO_DEV_CAP_IN | HIO_DEV_CAP_OUT | sck_type_map[clisck_type].extra_dev_cap; clidev->remoteaddr = *remoteaddr; addrlen = HIO_SIZEOF(clidev->localaddr); if (getsockname(clisck, (struct sockaddr*)&clidev->localaddr, &addrlen) <= -1) clidev->localaddr = rdev->localaddr; #if defined(SO_ORIGINAL_DST) /* if REDIRECT is used, SO_ORIGINAL_DST returns the original * destination address. When REDIRECT is not used, it returnes * the address of the local socket. In this case, it should * be same as the result of getsockname(). */ addrlen = HIO_SIZEOF(clidev->orgdstaddr); if (getsockopt(clisck, SOL_IP, SO_ORIGINAL_DST, &clidev->orgdstaddr, &addrlen) <= -1) clidev->orgdstaddr = rdev->localaddr; #else clidev->orgdstaddr = rdev->localaddr; #endif if (!hio_equal_skads(&clidev->orgdstaddr, &clidev->localaddr, 0)) { clidev->state |= HIO_DEV_SCK_INTERCEPTED; } else if (hio_skad_get_port(&clidev->localaddr) != hio_skad_get_port(&rdev->localaddr)) { /* When TPROXY is used, getsockname() and SO_ORIGNAL_DST return * the same addresses. however, the port number may be different * as a typical TPROXY rule is set to change the port number. * However, this check is fragile if the server port number is * set to 0. * * Take note that the above assumption gets wrong if the TPROXY * rule doesn't change the port number. so it won't be able * to handle such a TPROXYed packet without port transformation. */ clidev->state |= HIO_DEV_SCK_INTERCEPTED; } #if 0 else if ((clidev->initial_ifindex = resolve_ifindex(fd, clidev->localaddr)) <= -1) { /* the local_address is not one of a local address. * it's probably proxied. */ clidev->state |= HIO_DEV_SCK_INTERCEPTED; } #endif /* inherit some event handlers from the parent. * you can still change them inside the on_connect handler */ clidev->on_connect = rdev->on_connect; clidev->on_disconnect = rdev->on_disconnect; clidev->on_raw_accept = HIO_NULL; /* don't inherit this */ clidev->on_write = rdev->on_write; clidev->on_read = rdev->on_read; /* inherit the contents of the extension area */ HIO_ASSERT (hio, rdev->dev_size == clidev->dev_size); HIO_MEMCPY (hio_dev_sck_getxtn(clidev), hio_dev_sck_getxtn(rdev), rdev->dev_size - HIO_SIZEOF(hio_dev_sck_t)); HIO_ASSERT (hio, clidev->tmrjob_index == HIO_TMRIDX_INVALID); if (rdev->ssl_ctx) { HIO_DEV_SCK_SET_PROGRESS (clidev, HIO_DEV_SCK_ACCEPTING_SSL); HIO_ASSERT (hio, clidev->state & HIO_DEV_SCK_ACCEPTING_SSL); /* actual SSL acceptance must be completed in the client device */ /* let the client device know the SSL context to use */ clidev->ssl_ctx = rdev->ssl_ctx; if (HIO_IS_POS_NTIME(&rdev->tmout) && schedule_timer_job_after(clidev, &rdev->tmout, ssl_accept_timedout) <= -1) { /* timer job scheduling failed. halt the device */ HIO_DEBUG1 (hio, "SCK(%p) - ssl-accept timeout scheduling failed. halting\n", rdev); hio_dev_sck_halt (clidev); } } else { HIO_DEV_SCK_SET_PROGRESS (clidev, HIO_DEV_SCK_ACCEPTED); /*if (clidev->on_connect(clidev) <= -1) hio_dev_sck_halt (clidev);*/ if (clidev->on_connect) clidev->on_connect (clidev); } return 0; } static int accept_incoming_connection (hio_dev_sck_t* rdev) { hio_t* hio = rdev->hio; hio_syshnd_t clisck; hio_skad_t remoteaddr; hio_scklen_t addrlen; int flags; /* this is a server(lisening) socket */ #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) && defined(HAVE_PACCEPT) flags = SOCK_NONBLOCK | SOCK_CLOEXEC; addrlen = HIO_SIZEOF(remoteaddr); clisck = paccept(rdev->hnd, (struct sockaddr*)&remoteaddr, &addrlen, HIO_NULL, flags); if (clisck <= -1) { if (errno != ENOSYS) goto accept_error; /* go on for the normal 3-parameter accept */ } else { goto accept_done; } #elif defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) && defined(HAVE_ACCEPT4) flags = SOCK_NONBLOCK | SOCK_CLOEXEC; addrlen = HIO_SIZEOF(remoteaddr); clisck = accept4(rdev->hnd, (struct sockaddr*)&remoteaddr, &addrlen, flags); if (clisck <= -1) { if (errno != ENOSYS) goto accept_error; /* go on for the normal 3-parameter accept */ } else { goto accept_done; } #endif addrlen = HIO_SIZEOF(remoteaddr); clisck = accept(rdev->hnd, (struct sockaddr*)&remoteaddr, &addrlen); if (clisck <= -1) { #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) && defined(HAVE_ACCEPT4) accept_error: #endif if (errno == EINPROGRESS || errno == EWOULDBLOCK || errno == EAGAIN) return 0; if (errno == EINTR) return 0; /* if interrupted by a signal, treat it as if it's EINPROGRESS */ hio_seterrwithsyserr (hio, 0, errno); return -1; } #if defined(SOCK_NONBLOCK) && defined(SOCK_CLOEXEC) && defined(HAVE_ACCEPT4) accept_done: #endif return make_accepted_client_connection(rdev, clisck, &remoteaddr, rdev->type); } static int dev_evcb_sck_ready_stream (hio_dev_t* dev, int events) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; if (events & HIO_DEV_EVENT_ERR) { int errcode; hio_scklen_t len; len = HIO_SIZEOF(errcode); if (getsockopt(rdev->hnd, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) <= -1) { /* the error number is set to the socket error code. * errno resulting from getsockopt() doesn't reflect the actual * socket error. so errno is not used to set the error number. * instead, the generic device error HIO_EDEVERRR is used */ hio_seterrbfmt (hio, HIO_EDEVERR, "device error - unable to get SO_ERROR"); } else { hio_seterrwithsyserr (hio, 0, errcode); } return -1; } /* this socket can connect */ switch (HIO_DEV_SCK_GET_PROGRESS(rdev)) { case HIO_DEV_SCK_CONNECTING: if (events & HIO_DEV_EVENT_HUP) { /* device hang-up */ hio_seterrnum (hio, HIO_EDEVHUP); return -1; } else if (events & (HIO_DEV_EVENT_PRI | HIO_DEV_EVENT_IN)) { /* invalid event masks. generic device error */ hio_seterrbfmt (hio, HIO_EDEVERR, "device error - invalid event mask"); return -1; } else if (events & HIO_DEV_EVENT_OUT) { /* when connected, the socket becomes writable */ return harvest_outgoing_connection(rdev); } else { return 0; /* success but don't invoke on_read() */ } case HIO_DEV_SCK_CONNECTING_SSL: #if defined(USE_SSL) if (events & HIO_DEV_EVENT_HUP) { /* device hang-up */ hio_seterrnum (hio, HIO_EDEVHUP); return -1; } else if (events & HIO_DEV_EVENT_PRI) { /* invalid event masks. generic device error */ hio_seterrbfmt (hio, HIO_EDEVERR, "device error - invalid event mask"); return -1; } else if (events & (HIO_DEV_EVENT_IN | HIO_DEV_EVENT_OUT)) { int x; x = connect_ssl(rdev); if (x <= -1) return -1; if (x == 0) return 0; /* not SSL-Connected */ if (rdev->tmrjob_index != HIO_TMRIDX_INVALID) { hio_deltmrjob (rdev->hio, rdev->tmrjob_index); rdev->tmrjob_index = HIO_TMRIDX_INVALID; } HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_CONNECTED); if (rdev->on_connect) rdev->on_connect (rdev); return 0; } else { return 0; /* success. no actual I/O yet */ } #else hio_seterrnum (hio, HIO_EINTERN); return -1; #endif case HIO_DEV_SCK_LISTENING: if (events & HIO_DEV_EVENT_HUP) { /* device hang-up */ hio_seterrnum (hio, HIO_EDEVHUP); return -1; } else if (events & (HIO_DEV_EVENT_PRI | HIO_DEV_EVENT_OUT)) { hio_seterrbfmt (hio, HIO_EDEVERR, "device error - invalid event mask"); return -1; } else if (events & HIO_DEV_EVENT_IN) { if (rdev->state & HIO_DEV_SCK_LENIENT) { accept_incoming_connection(rdev); return 0; /* return ok to the core regardless of accept()'s result */ } else { /* [NOTE] if the accept operation fails, the core also kills this listening device. */ return accept_incoming_connection(rdev); } } else { return 0; /* success but don't invoke on_read() */ } case HIO_DEV_SCK_ACCEPTING_SSL: #if defined(USE_SSL) if (events & HIO_DEV_EVENT_HUP) { /* device hang-up */ hio_seterrnum (hio, HIO_EDEVHUP); return -1; } else if (events & HIO_DEV_EVENT_PRI) { /* invalid event masks. generic device error */ hio_seterrbfmt (hio, HIO_EDEVERR, "device error - invalid event mask"); return -1; } else if (events & (HIO_DEV_EVENT_IN | HIO_DEV_EVENT_OUT)) { int x; x = accept_ssl(rdev); if (x <= -1) return -1; if (x == 0) return 0; /* not SSL-accepted yet */ if (rdev->tmrjob_index != HIO_TMRIDX_INVALID) { hio_deltmrjob (rdev->hio, rdev->tmrjob_index); rdev->tmrjob_index = HIO_TMRIDX_INVALID; } HIO_DEV_SCK_SET_PROGRESS (rdev, HIO_DEV_SCK_ACCEPTED); if (rdev->on_connect) rdev->on_connect (rdev); return 0; } else { return 0; /* no reading or writing yet */ } #else hio_seterrnum (hio, HIO_EINTERN); return -1; #endif default: if (events & HIO_DEV_EVENT_HUP) { if (events & (HIO_DEV_EVENT_PRI | HIO_DEV_EVENT_IN | HIO_DEV_EVENT_OUT)) { /* probably half-open? */ return 1; } hio_seterrnum (hio, HIO_EDEVHUP); return -1; } return 1; /* the device is ok. carry on reading or writing */ } } static int dev_evcb_sck_ready_stateless (hio_dev_t* dev, int events) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; if (events & HIO_DEV_EVENT_ERR) { int errcode; hio_scklen_t len; len = HIO_SIZEOF(errcode); if (getsockopt(rdev->hnd, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) <= -1) { /* the error number is set to the socket error code. * errno resulting from getsockopt() doesn't reflect the actual * socket error. so errno is not used to set the error number. * instead, the generic device error HIO_EDEVERRR is used */ hio_seterrbfmt (hio, HIO_EDEVERR, "device error - unable to get SO_ERROR"); } else { hio_seterrwithsyserr (rdev->hio, 0, errcode); } return -1; } else if (events & HIO_DEV_EVENT_HUP) { hio_seterrnum (hio, HIO_EDEVHUP); return -1; } return 1; /* the device is ok. carry on reading or writing */ } static int dev_evcb_sck_on_read_stream (hio_dev_t* dev, const void* data, hio_iolen_t dlen, const hio_devaddr_t* srcaddr) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; return rdev->on_read(rdev, data, dlen, HIO_NULL); } static int dev_evcb_sck_on_write_stream (hio_dev_t* dev, hio_iolen_t wrlen, void* wrctx, const hio_devaddr_t* dstaddr) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; return rdev->on_write(rdev, wrlen, wrctx, HIO_NULL); } static int dev_evcb_sck_on_read_stateless (hio_dev_t* dev, const void* data, hio_iolen_t dlen, const hio_devaddr_t* srcaddr) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; return rdev->on_read(rdev, data, dlen, srcaddr->ptr); } static int dev_evcb_sck_on_write_stateless (hio_dev_t* dev, hio_iolen_t wrlen, void* wrctx, const hio_devaddr_t* dstaddr) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; return rdev->on_write(rdev, wrlen, wrctx, dstaddr->ptr); } /* ========================================================================= */ static hio_dev_evcb_t dev_sck_event_callbacks_stream = { dev_evcb_sck_ready_stream, dev_evcb_sck_on_read_stream, dev_evcb_sck_on_write_stream }; static hio_dev_evcb_t dev_sck_event_callbacks_stateless = { dev_evcb_sck_ready_stateless, dev_evcb_sck_on_read_stateless, dev_evcb_sck_on_write_stateless }; static hio_dev_evcb_t dev_sck_event_callbacks_sctp_sp = { dev_evcb_sck_ready_stateless, dev_evcb_sck_on_read_stateless, dev_evcb_sck_on_write_stateless }; /* ========================================================================= */ static int dev_evcb_sck_ready_qx (hio_dev_t* dev, int events) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; if (events & HIO_DEV_EVENT_ERR) { int errcode; hio_scklen_t len; len = HIO_SIZEOF(errcode); if (getsockopt(rdev->hnd, SOL_SOCKET, SO_ERROR, (char*)&errcode, &len) <= -1) { /* the error number is set to the socket error code. * errno resulting from getsockopt() doesn't reflect the actual * socket error. so errno is not used to set the error number. * instead, the generic device error HIO_EDEVERRR is used */ hio_seterrbfmt (hio, HIO_EDEVERR, "device error - unable to get SO_ERROR"); } else { hio_seterrwithsyserr (rdev->hio, 0, errcode); } return -1; } else if (events & HIO_DEV_EVENT_HUP) { hio_seterrnum (hio, HIO_EDEVHUP); return -1; } return 1; /* the device is ok. carry on reading or writing */ } static int dev_evcb_sck_on_read_qx (hio_dev_t* dev, const void* data, hio_iolen_t dlen, const hio_devaddr_t* srcaddr) { hio_t* hio = dev->hio; hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; if (rdev->type == HIO_DEV_SCK_QX) { hio_dev_sck_qxmsg_t* qxmsg; if (dlen != HIO_SIZEOF(*qxmsg)) { hio_seterrbfmt (hio, HIO_EINVAL, "wrong qx packet size"); return 0; } qxmsg = (hio_dev_sck_qxmsg_t*)data; if (qxmsg->cmd == HIO_DEV_SCK_QXMSG_NEWCONN) { if (make_accepted_client_connection(rdev, qxmsg->syshnd, &qxmsg->remoteaddr, qxmsg->scktype) <= -1) { /*printf ("unable to accept new client connection %d\n", qxmsg->syshnd);*/ return (rdev->state & HIO_DEV_SCK_LENIENT)? 0: -1; } } else { hio_seterrbfmt (hio, HIO_EINVAL, "wrong qx command code"); return 0; } return 0; } /* this is not for a qx socket */ return rdev->on_read(rdev, data, dlen, HIO_NULL); } static int dev_evcb_sck_on_write_qx (hio_dev_t* dev, hio_iolen_t wrlen, void* wrctx, const hio_devaddr_t* dstaddr) { hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev; if (rdev->type == HIO_DEV_SCK_QX) { /* this should not be called */ return 0; } return rdev->on_write(rdev, wrlen, wrctx, HIO_NULL); } static hio_dev_evcb_t dev_sck_event_callbacks_qx = { dev_evcb_sck_ready_qx, dev_evcb_sck_on_read_qx, dev_evcb_sck_on_write_qx }; /* ========================================================================= */ static int dev_evcb_sck_ready_bpf (hio_dev_t* dev, int events) { hio_t* hio = dev->hio; /*hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev;*/ hio_seterrnum (hio, HIO_ENOIMPL); return -1; } static int dev_evcb_sck_on_read_bpf (hio_dev_t* dev, const void* data, hio_iolen_t dlen, const hio_devaddr_t* srcaddr) { hio_t* hio = dev->hio; /*hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev;*/ hio_seterrnum (hio, HIO_ENOIMPL); return -1; } static int dev_evcb_sck_on_write_bpf (hio_dev_t* dev, hio_iolen_t wrlen, void* wrctx, const hio_devaddr_t* dstaddr) { hio_t* hio = dev->hio; /*hio_dev_sck_t* rdev = (hio_dev_sck_t*)dev;*/ hio_seterrnum (hio, HIO_ENOIMPL); return -1; } static hio_dev_evcb_t dev_sck_event_callbacks_bpf = { dev_evcb_sck_ready_bpf, dev_evcb_sck_on_read_bpf, dev_evcb_sck_on_write_bpf }; /* ========================================================================= */ hio_dev_sck_t* hio_dev_sck_make (hio_t* hio, hio_oow_t xtnsize, const hio_dev_sck_make_t* info) { hio_dev_sck_t* rdev; if (info->type < 0 && info->type >= HIO_COUNTOF(sck_type_map)) { hio_seterrnum (hio, HIO_EINVAL); return HIO_NULL; } if (info->type == HIO_DEV_SCK_QX) { rdev = (hio_dev_sck_t*)hio_dev_make( hio, HIO_SIZEOF(hio_dev_sck_t) + xtnsize, &dev_mth_sck_stateless, &dev_sck_event_callbacks_qx, (void*)info); } else if (info->type == HIO_DEV_SCK_BPF) { rdev = (hio_dev_sck_t*)hio_dev_make( hio, HIO_SIZEOF(hio_dev_sck_t) + xtnsize, &dev_mth_sck_bpf, &dev_sck_event_callbacks_bpf, (void*)info); } else if (sck_type_map[info->type].extra_dev_cap & HIO_DEV_CAP_STREAM) /* can't use the IS_STREAM() macro yet */ { rdev = (hio_dev_sck_t*)hio_dev_make( hio, HIO_SIZEOF(hio_dev_sck_t) + xtnsize, &dev_mth_sck_stream, &dev_sck_event_callbacks_stream, (void*)info); } #if defined(ENABLE_SCTP) else if (sck_type_map[info->type].proto == IPPROTO_SCTP) { rdev = (hio_dev_sck_t*)hio_dev_make( hio, HIO_SIZEOF(hio_dev_sck_t) + xtnsize, &dev_mth_sck_sctp_sp, &dev_sck_event_callbacks_sctp_sp, (void*)info); } #endif else { rdev = (hio_dev_sck_t*)hio_dev_make( hio, HIO_SIZEOF(hio_dev_sck_t) + xtnsize, &dev_mth_sck_stateless, &dev_sck_event_callbacks_stateless, (void*)info); } return rdev; } int hio_dev_sck_bind (hio_dev_sck_t* dev, hio_dev_sck_bind_t* info) { return hio_dev_ioctl((hio_dev_t*)dev, HIO_DEV_SCK_BIND, info); } int hio_dev_sck_connect (hio_dev_sck_t* dev, hio_dev_sck_connect_t* info) { return hio_dev_ioctl((hio_dev_t*)dev, HIO_DEV_SCK_CONNECT, info); } int hio_dev_sck_listen (hio_dev_sck_t* dev, hio_dev_sck_listen_t* info) { return hio_dev_ioctl((hio_dev_t*)dev, HIO_DEV_SCK_LISTEN, info); } int hio_dev_sck_write (hio_dev_sck_t* dev, const void* data, hio_iolen_t dlen, void* wrctx, const hio_skad_t* dstaddr) { hio_devaddr_t devaddr; return hio_dev_write((hio_dev_t*)dev, data, dlen, wrctx, skad_to_devaddr(dev, dstaddr, &devaddr)); } int hio_dev_sck_writev (hio_dev_sck_t* dev, hio_iovec_t* iov, hio_iolen_t iovcnt, void* wrctx, const hio_skad_t* dstaddr) { hio_devaddr_t devaddr; return hio_dev_writev((hio_dev_t*)dev, iov, iovcnt, wrctx, skad_to_devaddr(dev, dstaddr, &devaddr)); } int hio_dev_sck_timedwrite (hio_dev_sck_t* dev, const void* data, hio_iolen_t dlen, const hio_ntime_t* tmout, void* wrctx, const hio_skad_t* dstaddr) { hio_devaddr_t devaddr; return hio_dev_timedwrite((hio_dev_t*)dev, data, dlen, tmout, wrctx, skad_to_devaddr(dev, dstaddr, &devaddr)); } int hio_dev_sck_timedwritev (hio_dev_sck_t* dev, hio_iovec_t* iov, hio_iolen_t iovcnt, const hio_ntime_t* tmout, void* wrctx, const hio_skad_t* dstaddr) { hio_devaddr_t devaddr; return hio_dev_timedwritev((hio_dev_t*)dev, iov, iovcnt, tmout, wrctx, skad_to_devaddr(dev, dstaddr, &devaddr)); } /* ========================================================================= */ int hio_dev_sck_setsockopt (hio_dev_sck_t* dev, int level, int optname, void* optval, hio_scklen_t optlen) { int n; n = setsockopt(dev->hnd, level, optname, optval, optlen); if (n <= -1) hio_seterrwithsyserr (dev->hio, 0, errno); return n; } int hio_dev_sck_getsockopt (hio_dev_sck_t* dev, int level, int optname, void* optval, hio_scklen_t* optlen) { int n; n = getsockopt(dev->hnd, level, optname, optval, optlen); if (n <= -1) hio_seterrwithsyserr (dev->hio, 0, errno); return n; } int hio_dev_sck_getsockaddr (hio_dev_sck_t* dev, hio_skad_t* skad) { hio_scklen_t addrlen = HIO_SIZEOF(*skad); if (dev->type == HIO_DEV_SCK_QX) { hio_skad_init_for_qx (skad); } else if (getsockname(dev->hnd, (struct sockaddr*)skad, &addrlen) <= -1) { hio_seterrwithsyserr (dev->hio, 0, errno); return -1; } return 0; } int hio_dev_sck_getpeeraddr (hio_dev_sck_t* dev, hio_skad_t* skad) { hio_scklen_t addrlen = HIO_SIZEOF(*skad); if (dev->type == HIO_DEV_SCK_QX) { hio_skad_init_for_qx (skad); } else if (getpeername(dev->hnd, (struct sockaddr*)skad, &addrlen) <= -1) { hio_seterrwithsyserr (dev->hio, 0, errno); return -1; } return 0; } static int update_mcast_group (hio_dev_sck_t* dev, int join, const hio_skad_t* mcast_skad, int ifindex) { int f; f = hio_skad_get_family(mcast_skad); switch (f) { case HIO_AF_INET: { /* TODO: if ip_mreqn doesn't exist, get the ip address of the index and set to imr_address */ #if defined(HAVE_STRUCT_IP_MREQN) struct ip_mreqn mreq; #else struct ip_mreq mreq; #endif HIO_MEMSET (&mreq, 0, HIO_SIZEOF(mreq)); hio_skad_get_ipad_bytes (mcast_skad, &mreq.imr_multiaddr, HIO_SIZEOF(mreq.imr_multiaddr)); /*mreq.imr_address = TODO: fill it will the ifindex's ip address */ #if defined(HAVE_STRUCT_IP_MREQN) mreq.imr_ifindex = ifindex; #endif if (hio_dev_sck_setsockopt(dev, IPPROTO_IP, (join? IP_ADD_MEMBERSHIP: IP_DROP_MEMBERSHIP), &mreq, HIO_SIZEOF(mreq)) <= -1) return -1; return 0; } case HIO_AF_INET6: { struct ipv6_mreq mreq; HIO_MEMSET (&mreq, 0, HIO_SIZEOF(mreq)); hio_skad_get_ipad_bytes (mcast_skad, &mreq.ipv6mr_multiaddr, HIO_SIZEOF(mreq.ipv6mr_multiaddr)); mreq.ipv6mr_interface = ifindex; if (hio_dev_sck_setsockopt(dev, IPPROTO_IPV6, (join? IPV6_JOIN_GROUP: IPV6_LEAVE_GROUP), &mreq, HIO_SIZEOF(mreq)) <= -1) return -1; return 0; } } hio_seterrbfmt (hio_dev_sck_gethio(dev), HIO_EINVAL, "invalid multicast address family"); return -1; } int hio_dev_sck_joinmcastgroup (hio_dev_sck_t* dev, const hio_skad_t* mcast_skad, int ifindex) { return update_mcast_group(dev, 1, mcast_skad, ifindex); } int hio_dev_sck_leavemcastgroup (hio_dev_sck_t* dev, const hio_skad_t* mcast_skad, int ifindex) { return update_mcast_group(dev, 0, mcast_skad, ifindex); } /* ========================================================================= */ int hio_dev_sck_shutdown (hio_dev_sck_t* dev, int how) { switch (how & (HIO_DEV_SCK_SHUTDOWN_READ | HIO_DEV_SCK_SHUTDOWN_WRITE)) { case (HIO_DEV_SCK_SHUTDOWN_READ | HIO_DEV_SCK_SHUTDOWN_WRITE): how = SHUT_RDWR; break; case HIO_DEV_SCK_SHUTDOWN_READ: how = SHUT_RD; break; case HIO_DEV_SCK_SHUTDOWN_WRITE: how = SHUT_WR; break; default: hio_seterrnum (dev->hio, HIO_EINVAL); return -1; } if (shutdown(dev->hnd, how) <= -1) { hio_seterrwithsyserr (dev->hio, 0, errno); return -1; } return 0; } int hio_dev_sck_sendfileok (hio_dev_sck_t* dev) { #if defined(USE_SSL) #if defined(HAVE_SENDFILE) /* unable to use sendfile over ssl */ return !(dev->ssl); #else /* no send file implementation */ return 0; #endif #else #if defined(HAVE_SENDFILE) return 1; #else return 0; #endif #endif } int hio_dev_sck_writetosidechan (hio_dev_sck_t* dev, const void* dptr, hio_oow_t dlen) { if (write(dev->side_chan, dptr, dlen) <= -1) { /* this doesn't set the error information on the main socket. if you may check errno, though */ /* TODO: make hio_seterrbfmt() thread safe and set the error information properly. still the caller may be in the thread-unsafe context */ return -1; } return 0; } /* ========================================================================= */ hio_uint16_t hio_checksum_ip (const void* hdr, hio_oow_t len) { hio_uint32_t sum = 0; hio_uint16_t *ptr = (hio_uint16_t*)hdr; while (len > 1) { sum += *ptr++; if (sum & 0x80000000) sum = (sum & 0xFFFF) + (sum >> 16); len -= 2; } while (sum >> 16) sum = (sum & 0xFFFF) + (sum >> 16); return (hio_uint16_t)~sum; }