]>
Commit | Line | Data |
---|---|---|
89c4ed63 A |
1 | /* |
2 | * util/netevent.c - event notification | |
3 | * | |
4 | * Copyright (c) 2007, NLnet Labs. All rights reserved. | |
5 | * | |
6 | * This software is open source. | |
7 | * | |
8 | * Redistribution and use in source and binary forms, with or without | |
9 | * modification, are permitted provided that the following conditions | |
10 | * are met: | |
11 | * | |
12 | * Redistributions of source code must retain the above copyright notice, | |
13 | * this list of conditions and the following disclaimer. | |
14 | * | |
15 | * Redistributions in binary form must reproduce the above copyright notice, | |
16 | * this list of conditions and the following disclaimer in the documentation | |
17 | * and/or other materials provided with the distribution. | |
18 | * | |
19 | * Neither the name of the NLNET LABS nor the names of its contributors may | |
20 | * be used to endorse or promote products derived from this software without | |
21 | * specific prior written permission. | |
22 | * | |
23 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | |
24 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | |
25 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | |
26 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT | |
27 | * HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
28 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED | |
29 | * TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR | |
30 | * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF | |
31 | * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING | |
32 | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | |
33 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
34 | */ | |
35 | ||
36 | /** | |
37 | * \file | |
38 | * | |
39 | * This file contains event notification functions. | |
40 | */ | |
41 | #include "config.h" | |
42 | #include "util/netevent.h" | |
43 | #include "util/log.h" | |
44 | #include "util/net_help.h" | |
45 | #include "util/fptr_wlist.h" | |
46 | #include "ldns/pkthdr.h" | |
47 | #include "ldns/sbuffer.h" | |
48 | #include "dnstap/dnstap.h" | |
49 | #ifdef HAVE_OPENSSL_SSL_H | |
50 | #include <openssl/ssl.h> | |
51 | #endif | |
52 | #ifdef HAVE_OPENSSL_ERR_H | |
53 | #include <openssl/err.h> | |
54 | #endif | |
55 | ||
56 | /* -------- Start of local definitions -------- */ | |
57 | /** if CMSG_ALIGN is not defined on this platform, a workaround */ | |
58 | #ifndef CMSG_ALIGN | |
59 | # ifdef _CMSG_DATA_ALIGN | |
60 | # define CMSG_ALIGN _CMSG_DATA_ALIGN | |
61 | # else | |
62 | # define CMSG_ALIGN(len) (((len)+sizeof(long)-1) & ~(sizeof(long)-1)) | |
63 | # endif | |
64 | #endif | |
65 | ||
66 | /** if CMSG_LEN is not defined on this platform, a workaround */ | |
67 | #ifndef CMSG_LEN | |
68 | # define CMSG_LEN(len) (CMSG_ALIGN(sizeof(struct cmsghdr))+(len)) | |
69 | #endif | |
70 | ||
71 | /** if CMSG_SPACE is not defined on this platform, a workaround */ | |
72 | #ifndef CMSG_SPACE | |
73 | # ifdef _CMSG_HDR_ALIGN | |
74 | # define CMSG_SPACE(l) (CMSG_ALIGN(l)+_CMSG_HDR_ALIGN(sizeof(struct cmsghdr))) | |
75 | # else | |
76 | # define CMSG_SPACE(l) (CMSG_ALIGN(l)+CMSG_ALIGN(sizeof(struct cmsghdr))) | |
77 | # endif | |
78 | #endif | |
79 | ||
80 | /** The TCP reading or writing query timeout in seconds */ | |
81 | #define TCP_QUERY_TIMEOUT 120 | |
82 | ||
83 | #ifndef NONBLOCKING_IS_BROKEN | |
84 | /** number of UDP reads to perform per read indication from select */ | |
85 | #define NUM_UDP_PER_SELECT 100 | |
86 | #else | |
87 | #define NUM_UDP_PER_SELECT 1 | |
88 | #endif | |
89 | ||
90 | /* We define libevent structures here to hide the libevent stuff. */ | |
91 | ||
92 | #ifdef USE_MINI_EVENT | |
93 | # ifdef USE_WINSOCK | |
94 | # include "util/winsock_event.h" | |
95 | # else | |
96 | # include "util/mini_event.h" | |
97 | # endif /* USE_WINSOCK */ | |
98 | #else /* USE_MINI_EVENT */ | |
99 | /* we use libevent */ | |
100 | # ifdef HAVE_EVENT_H | |
101 | # include <event.h> | |
102 | # else | |
103 | # include "event2/event.h" | |
104 | # include "event2/event_struct.h" | |
105 | # include "event2/event_compat.h" | |
106 | # endif | |
107 | #endif /* USE_MINI_EVENT */ | |
108 | ||
109 | /** | |
110 | * The internal event structure for keeping libevent info for the event. | |
111 | * Possibly other structures (list, tree) this is part of. | |
112 | */ | |
113 | struct internal_event { | |
114 | /** the comm base */ | |
115 | struct comm_base* base; | |
116 | /** libevent event type, alloced here */ | |
117 | struct event ev; | |
118 | }; | |
119 | ||
120 | /** | |
121 | * Internal base structure, so that every thread has its own events. | |
122 | */ | |
123 | struct internal_base { | |
124 | /** libevent event_base type. */ | |
125 | struct event_base* base; | |
126 | /** seconds time pointer points here */ | |
127 | time_t secs; | |
128 | /** timeval with current time */ | |
129 | struct timeval now; | |
130 | /** the event used for slow_accept timeouts */ | |
131 | struct event slow_accept; | |
132 | /** true if slow_accept is enabled */ | |
133 | int slow_accept_enabled; | |
134 | }; | |
135 | ||
136 | /** | |
137 | * Internal timer structure, to store timer event in. | |
138 | */ | |
139 | struct internal_timer { | |
140 | /** the comm base */ | |
141 | struct comm_base* base; | |
142 | /** libevent event type, alloced here */ | |
143 | struct event ev; | |
144 | /** is timer enabled */ | |
145 | uint8_t enabled; | |
146 | }; | |
147 | ||
148 | /** | |
149 | * Internal signal structure, to store signal event in. | |
150 | */ | |
151 | struct internal_signal { | |
152 | /** libevent event type, alloced here */ | |
153 | struct event ev; | |
154 | /** next in signal list */ | |
155 | struct internal_signal* next; | |
156 | }; | |
157 | ||
158 | /** create a tcp handler with a parent */ | |
159 | static struct comm_point* comm_point_create_tcp_handler( | |
160 | struct comm_base *base, struct comm_point* parent, size_t bufsize, | |
161 | comm_point_callback_t* callback, void* callback_arg); | |
162 | ||
163 | /* -------- End of local definitions -------- */ | |
164 | ||
165 | #ifdef USE_MINI_EVENT | |
166 | /** minievent updates the time when it blocks. */ | |
167 | #define comm_base_now(x) /* nothing to do */ | |
168 | #else /* !USE_MINI_EVENT */ | |
169 | /** fillup the time values in the event base */ | |
170 | static void | |
171 | comm_base_now(struct comm_base* b) | |
172 | { | |
173 | if(gettimeofday(&b->eb->now, NULL) < 0) { | |
174 | log_err("gettimeofday: %s", strerror(errno)); | |
175 | } | |
176 | b->eb->secs = (time_t)b->eb->now.tv_sec; | |
177 | } | |
178 | #endif /* USE_MINI_EVENT */ | |
179 | ||
180 | struct comm_base* | |
181 | comm_base_create(int sigs) | |
182 | { | |
183 | struct comm_base* b = (struct comm_base*)calloc(1, | |
184 | sizeof(struct comm_base)); | |
185 | if(!b) | |
186 | return NULL; | |
187 | b->eb = (struct internal_base*)calloc(1, sizeof(struct internal_base)); | |
188 | if(!b->eb) { | |
189 | free(b); | |
190 | return NULL; | |
191 | } | |
192 | #ifdef USE_MINI_EVENT | |
193 | (void)sigs; | |
194 | /* use mini event time-sharing feature */ | |
195 | b->eb->base = event_init(&b->eb->secs, &b->eb->now); | |
196 | #else | |
197 | # if defined(HAVE_EV_LOOP) || defined(HAVE_EV_DEFAULT_LOOP) | |
198 | /* libev */ | |
199 | if(sigs) | |
200 | b->eb->base=(struct event_base *)ev_default_loop(EVFLAG_AUTO); | |
201 | else | |
202 | b->eb->base=(struct event_base *)ev_loop_new(EVFLAG_AUTO); | |
203 | # else | |
204 | (void)sigs; | |
205 | # ifdef HAVE_EVENT_BASE_NEW | |
206 | b->eb->base = event_base_new(); | |
207 | # else | |
208 | b->eb->base = event_init(); | |
209 | # endif | |
210 | # endif | |
211 | #endif | |
212 | if(!b->eb->base) { | |
213 | free(b->eb); | |
214 | free(b); | |
215 | return NULL; | |
216 | } | |
217 | comm_base_now(b); | |
218 | /* avoid event_get_method call which causes crashes even when | |
219 | * not printing, because its result is passed */ | |
220 | verbose(VERB_ALGO, | |
221 | #if defined(HAVE_EV_LOOP) || defined(HAVE_EV_DEFAULT_LOOP) | |
222 | "libev" | |
223 | #elif defined(USE_MINI_EVENT) | |
224 | "event " | |
225 | #else | |
226 | "libevent " | |
227 | #endif | |
228 | "%s uses %s method.", | |
229 | event_get_version(), | |
230 | #ifdef HAVE_EVENT_BASE_GET_METHOD | |
231 | event_base_get_method(b->eb->base) | |
232 | #else | |
233 | "not_obtainable" | |
234 | #endif | |
235 | ); | |
236 | return b; | |
237 | } | |
238 | ||
239 | struct comm_base* | |
240 | comm_base_create_event(struct event_base* base) | |
241 | { | |
242 | struct comm_base* b = (struct comm_base*)calloc(1, | |
243 | sizeof(struct comm_base)); | |
244 | if(!b) | |
245 | return NULL; | |
246 | b->eb = (struct internal_base*)calloc(1, sizeof(struct internal_base)); | |
247 | if(!b->eb) { | |
248 | free(b); | |
249 | return NULL; | |
250 | } | |
251 | b->eb->base = base; | |
252 | comm_base_now(b); | |
253 | return b; | |
254 | } | |
255 | ||
256 | void | |
257 | comm_base_delete(struct comm_base* b) | |
258 | { | |
259 | if(!b) | |
260 | return; | |
261 | if(b->eb->slow_accept_enabled) { | |
262 | if(event_del(&b->eb->slow_accept) != 0) { | |
263 | log_err("could not event_del slow_accept"); | |
264 | } | |
265 | } | |
266 | #ifdef USE_MINI_EVENT | |
267 | event_base_free(b->eb->base); | |
268 | #elif defined(HAVE_EVENT_BASE_FREE) && defined(HAVE_EVENT_BASE_ONCE) | |
269 | /* only libevent 1.2+ has it, but in 1.2 it is broken - | |
270 | assertion fails on signal handling ev that is not deleted | |
271 | in libevent 1.3c (event_base_once appears) this is fixed. */ | |
272 | event_base_free(b->eb->base); | |
273 | #endif /* HAVE_EVENT_BASE_FREE and HAVE_EVENT_BASE_ONCE */ | |
274 | b->eb->base = NULL; | |
275 | free(b->eb); | |
276 | free(b); | |
277 | } | |
278 | ||
279 | void | |
280 | comm_base_delete_no_base(struct comm_base* b) | |
281 | { | |
282 | if(!b) | |
283 | return; | |
284 | if(b->eb->slow_accept_enabled) { | |
285 | if(event_del(&b->eb->slow_accept) != 0) { | |
286 | log_err("could not event_del slow_accept"); | |
287 | } | |
288 | } | |
289 | b->eb->base = NULL; | |
290 | free(b->eb); | |
291 | free(b); | |
292 | } | |
293 | ||
294 | void | |
295 | comm_base_timept(struct comm_base* b, time_t** tt, struct timeval** tv) | |
296 | { | |
297 | *tt = &b->eb->secs; | |
298 | *tv = &b->eb->now; | |
299 | } | |
300 | ||
301 | void | |
302 | comm_base_dispatch(struct comm_base* b) | |
303 | { | |
304 | int retval; | |
305 | retval = event_base_dispatch(b->eb->base); | |
306 | if(retval != 0) { | |
307 | fatal_exit("event_dispatch returned error %d, " | |
308 | "errno is %s", retval, strerror(errno)); | |
309 | } | |
310 | } | |
311 | ||
312 | void comm_base_exit(struct comm_base* b) | |
313 | { | |
314 | if(event_base_loopexit(b->eb->base, NULL) != 0) { | |
315 | log_err("Could not loopexit"); | |
316 | } | |
317 | } | |
318 | ||
319 | void comm_base_set_slow_accept_handlers(struct comm_base* b, | |
320 | void (*stop_acc)(void*), void (*start_acc)(void*), void* arg) | |
321 | { | |
322 | b->stop_accept = stop_acc; | |
323 | b->start_accept = start_acc; | |
324 | b->cb_arg = arg; | |
325 | } | |
326 | ||
327 | struct event_base* comm_base_internal(struct comm_base* b) | |
328 | { | |
329 | return b->eb->base; | |
330 | } | |
331 | ||
332 | /** see if errno for udp has to be logged or not uses globals */ | |
333 | static int | |
334 | udp_send_errno_needs_log(struct sockaddr* addr, socklen_t addrlen) | |
335 | { | |
336 | /* do not log transient errors (unless high verbosity) */ | |
337 | #if defined(ENETUNREACH) || defined(EHOSTDOWN) || defined(EHOSTUNREACH) || defined(ENETDOWN) | |
338 | switch(errno) { | |
339 | # ifdef ENETUNREACH | |
340 | case ENETUNREACH: | |
341 | # endif | |
342 | # ifdef EHOSTDOWN | |
343 | case EHOSTDOWN: | |
344 | # endif | |
345 | # ifdef EHOSTUNREACH | |
346 | case EHOSTUNREACH: | |
347 | # endif | |
348 | # ifdef ENETDOWN | |
349 | case ENETDOWN: | |
350 | # endif | |
351 | if(verbosity < VERB_ALGO) | |
352 | return 0; | |
353 | default: | |
354 | break; | |
355 | } | |
356 | #endif | |
357 | /* permission denied is gotten for every send if the | |
358 | * network is disconnected (on some OS), squelch it */ | |
359 | if(errno == EPERM && verbosity < VERB_DETAIL) | |
360 | return 0; | |
361 | /* squelch errors where people deploy AAAA ::ffff:bla for | |
362 | * authority servers, which we try for intranets. */ | |
363 | if(errno == EINVAL && addr_is_ip4mapped( | |
364 | (struct sockaddr_storage*)addr, addrlen) && | |
365 | verbosity < VERB_DETAIL) | |
366 | return 0; | |
367 | /* SO_BROADCAST sockopt can give access to 255.255.255.255, | |
368 | * but a dns cache does not need it. */ | |
369 | if(errno == EACCES && addr_is_broadcast( | |
370 | (struct sockaddr_storage*)addr, addrlen) && | |
371 | verbosity < VERB_DETAIL) | |
372 | return 0; | |
373 | return 1; | |
374 | } | |
375 | ||
376 | int tcp_connect_errno_needs_log(struct sockaddr* addr, socklen_t addrlen) | |
377 | { | |
378 | return udp_send_errno_needs_log(addr, addrlen); | |
379 | } | |
380 | ||
381 | /* send a UDP reply */ | |
382 | int | |
383 | comm_point_send_udp_msg(struct comm_point *c, sldns_buffer* packet, | |
384 | struct sockaddr* addr, socklen_t addrlen) | |
385 | { | |
386 | ssize_t sent; | |
387 | log_assert(c->fd != -1); | |
388 | #ifdef UNBOUND_DEBUG | |
389 | if(sldns_buffer_remaining(packet) == 0) | |
390 | log_err("error: send empty UDP packet"); | |
391 | #endif | |
392 | log_assert(addr && addrlen > 0); | |
393 | sent = sendto(c->fd, (void*)sldns_buffer_begin(packet), | |
394 | sldns_buffer_remaining(packet), 0, | |
395 | addr, addrlen); | |
396 | if(sent == -1) { | |
397 | if(!udp_send_errno_needs_log(addr, addrlen)) | |
398 | return 0; | |
399 | #ifndef USE_WINSOCK | |
400 | verbose(VERB_OPS, "sendto failed: %s", strerror(errno)); | |
401 | #else | |
402 | verbose(VERB_OPS, "sendto failed: %s", | |
403 | wsa_strerror(WSAGetLastError())); | |
404 | #endif | |
405 | log_addr(VERB_OPS, "remote address is", | |
406 | (struct sockaddr_storage*)addr, addrlen); | |
407 | return 0; | |
408 | } else if((size_t)sent != sldns_buffer_remaining(packet)) { | |
409 | log_err("sent %d in place of %d bytes", | |
410 | (int)sent, (int)sldns_buffer_remaining(packet)); | |
411 | return 0; | |
412 | } | |
413 | return 1; | |
414 | } | |
415 | ||
416 | #if defined(AF_INET6) && defined(IPV6_PKTINFO) && (defined(HAVE_RECVMSG) || defined(HAVE_SENDMSG)) | |
417 | /** print debug ancillary info */ | |
418 | static void p_ancil(const char* str, struct comm_reply* r) | |
419 | { | |
420 | if(r->srctype != 4 && r->srctype != 6) { | |
421 | log_info("%s: unknown srctype %d", str, r->srctype); | |
422 | return; | |
423 | } | |
424 | if(r->srctype == 6) { | |
425 | char buf[1024]; | |
426 | if(inet_ntop(AF_INET6, &r->pktinfo.v6info.ipi6_addr, | |
427 | buf, (socklen_t)sizeof(buf)) == 0) { | |
428 | (void)strlcpy(buf, "(inet_ntop error)", sizeof(buf)); | |
429 | } | |
430 | buf[sizeof(buf)-1]=0; | |
431 | log_info("%s: %s %d", str, buf, r->pktinfo.v6info.ipi6_ifindex); | |
432 | } else if(r->srctype == 4) { | |
433 | #ifdef IP_PKTINFO | |
434 | char buf1[1024], buf2[1024]; | |
435 | if(inet_ntop(AF_INET, &r->pktinfo.v4info.ipi_addr, | |
436 | buf1, (socklen_t)sizeof(buf1)) == 0) { | |
437 | (void)strlcpy(buf1, "(inet_ntop error)", sizeof(buf1)); | |
438 | } | |
439 | buf1[sizeof(buf1)-1]=0; | |
440 | #ifdef HAVE_STRUCT_IN_PKTINFO_IPI_SPEC_DST | |
441 | if(inet_ntop(AF_INET, &r->pktinfo.v4info.ipi_spec_dst, | |
442 | buf2, (socklen_t)sizeof(buf2)) == 0) { | |
443 | (void)strlcpy(buf2, "(inet_ntop error)", sizeof(buf2)); | |
444 | } | |
445 | buf2[sizeof(buf2)-1]=0; | |
446 | #else | |
447 | buf2[0]=0; | |
448 | #endif | |
449 | log_info("%s: %d %s %s", str, r->pktinfo.v4info.ipi_ifindex, | |
450 | buf1, buf2); | |
451 | #elif defined(IP_RECVDSTADDR) | |
452 | char buf1[1024]; | |
453 | if(inet_ntop(AF_INET, &r->pktinfo.v4addr, | |
454 | buf1, (socklen_t)sizeof(buf1)) == 0) { | |
455 | (void)strlcpy(buf1, "(inet_ntop error)", sizeof(buf1)); | |
456 | } | |
457 | buf1[sizeof(buf1)-1]=0; | |
458 | log_info("%s: %s", str, buf1); | |
459 | #endif /* IP_PKTINFO or PI_RECVDSTDADDR */ | |
460 | } | |
461 | } | |
462 | #endif /* AF_INET6 && IPV6_PKTINFO && HAVE_RECVMSG||HAVE_SENDMSG */ | |
463 | ||
464 | /** send a UDP reply over specified interface*/ | |
465 | static int | |
466 | comm_point_send_udp_msg_if(struct comm_point *c, sldns_buffer* packet, | |
467 | struct sockaddr* addr, socklen_t addrlen, struct comm_reply* r) | |
468 | { | |
469 | #if defined(AF_INET6) && defined(IPV6_PKTINFO) && defined(HAVE_SENDMSG) | |
470 | ssize_t sent; | |
471 | struct msghdr msg; | |
472 | struct iovec iov[1]; | |
473 | char control[256]; | |
474 | #ifndef S_SPLINT_S | |
475 | struct cmsghdr *cmsg; | |
476 | #endif /* S_SPLINT_S */ | |
477 | ||
478 | log_assert(c->fd != -1); | |
479 | #ifdef UNBOUND_DEBUG | |
480 | if(sldns_buffer_remaining(packet) == 0) | |
481 | log_err("error: send empty UDP packet"); | |
482 | #endif | |
483 | log_assert(addr && addrlen > 0); | |
484 | ||
485 | msg.msg_name = addr; | |
486 | msg.msg_namelen = addrlen; | |
487 | iov[0].iov_base = sldns_buffer_begin(packet); | |
488 | iov[0].iov_len = sldns_buffer_remaining(packet); | |
489 | msg.msg_iov = iov; | |
490 | msg.msg_iovlen = 1; | |
491 | msg.msg_control = control; | |
492 | #ifndef S_SPLINT_S | |
493 | msg.msg_controllen = sizeof(control); | |
494 | #endif /* S_SPLINT_S */ | |
495 | msg.msg_flags = 0; | |
496 | ||
497 | #ifndef S_SPLINT_S | |
498 | cmsg = CMSG_FIRSTHDR(&msg); | |
499 | if(r->srctype == 4) { | |
500 | #ifdef IP_PKTINFO | |
501 | msg.msg_controllen = CMSG_SPACE(sizeof(struct in_pktinfo)); | |
502 | log_assert(msg.msg_controllen <= sizeof(control)); | |
503 | cmsg->cmsg_level = IPPROTO_IP; | |
504 | cmsg->cmsg_type = IP_PKTINFO; | |
505 | memmove(CMSG_DATA(cmsg), &r->pktinfo.v4info, | |
506 | sizeof(struct in_pktinfo)); | |
507 | cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo)); | |
508 | #elif defined(IP_SENDSRCADDR) | |
509 | msg.msg_controllen = CMSG_SPACE(sizeof(struct in_addr)); | |
510 | log_assert(msg.msg_controllen <= sizeof(control)); | |
511 | cmsg->cmsg_level = IPPROTO_IP; | |
512 | cmsg->cmsg_type = IP_SENDSRCADDR; | |
513 | memmove(CMSG_DATA(cmsg), &r->pktinfo.v4addr, | |
514 | sizeof(struct in_addr)); | |
515 | cmsg->cmsg_len = CMSG_LEN(sizeof(struct in_addr)); | |
516 | #else | |
517 | verbose(VERB_ALGO, "no IP_PKTINFO or IP_SENDSRCADDR"); | |
518 | msg.msg_control = NULL; | |
519 | #endif /* IP_PKTINFO or IP_SENDSRCADDR */ | |
520 | } else if(r->srctype == 6) { | |
521 | msg.msg_controllen = CMSG_SPACE(sizeof(struct in6_pktinfo)); | |
522 | log_assert(msg.msg_controllen <= sizeof(control)); | |
523 | cmsg->cmsg_level = IPPROTO_IPV6; | |
524 | cmsg->cmsg_type = IPV6_PKTINFO; | |
525 | memmove(CMSG_DATA(cmsg), &r->pktinfo.v6info, | |
526 | sizeof(struct in6_pktinfo)); | |
527 | cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo)); | |
528 | } else { | |
529 | /* try to pass all 0 to use default route */ | |
530 | msg.msg_controllen = CMSG_SPACE(sizeof(struct in6_pktinfo)); | |
531 | log_assert(msg.msg_controllen <= sizeof(control)); | |
532 | cmsg->cmsg_level = IPPROTO_IPV6; | |
533 | cmsg->cmsg_type = IPV6_PKTINFO; | |
534 | memset(CMSG_DATA(cmsg), 0, sizeof(struct in6_pktinfo)); | |
535 | cmsg->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo)); | |
536 | } | |
537 | #endif /* S_SPLINT_S */ | |
538 | if(verbosity >= VERB_ALGO) | |
539 | p_ancil("send_udp over interface", r); | |
540 | sent = sendmsg(c->fd, &msg, 0); | |
541 | if(sent == -1) { | |
542 | if(!udp_send_errno_needs_log(addr, addrlen)) | |
543 | return 0; | |
544 | verbose(VERB_OPS, "sendmsg failed: %s", strerror(errno)); | |
545 | log_addr(VERB_OPS, "remote address is", | |
546 | (struct sockaddr_storage*)addr, addrlen); | |
547 | return 0; | |
548 | } else if((size_t)sent != sldns_buffer_remaining(packet)) { | |
549 | log_err("sent %d in place of %d bytes", | |
550 | (int)sent, (int)sldns_buffer_remaining(packet)); | |
551 | return 0; | |
552 | } | |
553 | return 1; | |
554 | #else | |
555 | (void)c; | |
556 | (void)packet; | |
557 | (void)addr; | |
558 | (void)addrlen; | |
559 | (void)r; | |
560 | log_err("sendmsg: IPV6_PKTINFO not supported"); | |
561 | return 0; | |
562 | #endif /* AF_INET6 && IPV6_PKTINFO && HAVE_SENDMSG */ | |
563 | } | |
564 | ||
565 | void | |
566 | comm_point_udp_ancil_callback(int fd, short event, void* arg) | |
567 | { | |
568 | #if defined(AF_INET6) && defined(IPV6_PKTINFO) && defined(HAVE_RECVMSG) | |
569 | struct comm_reply rep; | |
570 | struct msghdr msg; | |
571 | struct iovec iov[1]; | |
572 | ssize_t rcv; | |
573 | char ancil[256]; | |
574 | int i; | |
575 | #ifndef S_SPLINT_S | |
576 | struct cmsghdr* cmsg; | |
577 | #endif /* S_SPLINT_S */ | |
578 | ||
579 | rep.c = (struct comm_point*)arg; | |
580 | log_assert(rep.c->type == comm_udp); | |
581 | ||
582 | if(!(event&EV_READ)) | |
583 | return; | |
584 | log_assert(rep.c && rep.c->buffer && rep.c->fd == fd); | |
585 | comm_base_now(rep.c->ev->base); | |
586 | for(i=0; i<NUM_UDP_PER_SELECT; i++) { | |
587 | sldns_buffer_clear(rep.c->buffer); | |
588 | rep.addrlen = (socklen_t)sizeof(rep.addr); | |
589 | log_assert(fd != -1); | |
590 | log_assert(sldns_buffer_remaining(rep.c->buffer) > 0); | |
591 | msg.msg_name = &rep.addr; | |
592 | msg.msg_namelen = (socklen_t)sizeof(rep.addr); | |
593 | iov[0].iov_base = sldns_buffer_begin(rep.c->buffer); | |
594 | iov[0].iov_len = sldns_buffer_remaining(rep.c->buffer); | |
595 | msg.msg_iov = iov; | |
596 | msg.msg_iovlen = 1; | |
597 | msg.msg_control = ancil; | |
598 | #ifndef S_SPLINT_S | |
599 | msg.msg_controllen = sizeof(ancil); | |
600 | #endif /* S_SPLINT_S */ | |
601 | msg.msg_flags = 0; | |
602 | rcv = recvmsg(fd, &msg, 0); | |
603 | if(rcv == -1) { | |
604 | if(errno != EAGAIN && errno != EINTR) { | |
605 | log_err("recvmsg failed: %s", strerror(errno)); | |
606 | } | |
607 | return; | |
608 | } | |
609 | rep.addrlen = msg.msg_namelen; | |
610 | sldns_buffer_skip(rep.c->buffer, rcv); | |
611 | sldns_buffer_flip(rep.c->buffer); | |
612 | rep.srctype = 0; | |
613 | #ifndef S_SPLINT_S | |
614 | for(cmsg = CMSG_FIRSTHDR(&msg); cmsg != NULL; | |
615 | cmsg = CMSG_NXTHDR(&msg, cmsg)) { | |
616 | if( cmsg->cmsg_level == IPPROTO_IPV6 && | |
617 | cmsg->cmsg_type == IPV6_PKTINFO) { | |
618 | rep.srctype = 6; | |
619 | memmove(&rep.pktinfo.v6info, CMSG_DATA(cmsg), | |
620 | sizeof(struct in6_pktinfo)); | |
621 | break; | |
622 | #ifdef IP_PKTINFO | |
623 | } else if( cmsg->cmsg_level == IPPROTO_IP && | |
624 | cmsg->cmsg_type == IP_PKTINFO) { | |
625 | rep.srctype = 4; | |
626 | memmove(&rep.pktinfo.v4info, CMSG_DATA(cmsg), | |
627 | sizeof(struct in_pktinfo)); | |
628 | break; | |
629 | #elif defined(IP_RECVDSTADDR) | |
630 | } else if( cmsg->cmsg_level == IPPROTO_IP && | |
631 | cmsg->cmsg_type == IP_RECVDSTADDR) { | |
632 | rep.srctype = 4; | |
633 | memmove(&rep.pktinfo.v4addr, CMSG_DATA(cmsg), | |
634 | sizeof(struct in_addr)); | |
635 | break; | |
636 | #endif /* IP_PKTINFO or IP_RECVDSTADDR */ | |
637 | } | |
638 | } | |
639 | if(verbosity >= VERB_ALGO) | |
640 | p_ancil("receive_udp on interface", &rep); | |
641 | #endif /* S_SPLINT_S */ | |
642 | fptr_ok(fptr_whitelist_comm_point(rep.c->callback)); | |
643 | if((*rep.c->callback)(rep.c, rep.c->cb_arg, NETEVENT_NOERROR, &rep)) { | |
644 | /* send back immediate reply */ | |
645 | (void)comm_point_send_udp_msg_if(rep.c, rep.c->buffer, | |
646 | (struct sockaddr*)&rep.addr, rep.addrlen, &rep); | |
647 | } | |
648 | if(rep.c->fd == -1) /* commpoint closed */ | |
649 | break; | |
650 | } | |
651 | #else | |
652 | (void)fd; | |
653 | (void)event; | |
654 | (void)arg; | |
655 | fatal_exit("recvmsg: No support for IPV6_PKTINFO. " | |
656 | "Please disable interface-automatic"); | |
657 | #endif /* AF_INET6 && IPV6_PKTINFO && HAVE_RECVMSG */ | |
658 | } | |
659 | ||
660 | void | |
661 | comm_point_udp_callback(int fd, short event, void* arg) | |
662 | { | |
663 | struct comm_reply rep; | |
664 | ssize_t rcv; | |
665 | int i; | |
666 | ||
667 | rep.c = (struct comm_point*)arg; | |
668 | log_assert(rep.c->type == comm_udp); | |
669 | ||
670 | if(!(event&EV_READ)) | |
671 | return; | |
672 | log_assert(rep.c && rep.c->buffer && rep.c->fd == fd); | |
673 | comm_base_now(rep.c->ev->base); | |
674 | for(i=0; i<NUM_UDP_PER_SELECT; i++) { | |
675 | sldns_buffer_clear(rep.c->buffer); | |
676 | rep.addrlen = (socklen_t)sizeof(rep.addr); | |
677 | log_assert(fd != -1); | |
678 | log_assert(sldns_buffer_remaining(rep.c->buffer) > 0); | |
679 | rcv = recvfrom(fd, (void*)sldns_buffer_begin(rep.c->buffer), | |
680 | sldns_buffer_remaining(rep.c->buffer), 0, | |
681 | (struct sockaddr*)&rep.addr, &rep.addrlen); | |
682 | if(rcv == -1) { | |
683 | #ifndef USE_WINSOCK | |
684 | if(errno != EAGAIN && errno != EINTR) | |
685 | log_err("recvfrom %d failed: %s", | |
686 | fd, strerror(errno)); | |
687 | #else | |
688 | if(WSAGetLastError() != WSAEINPROGRESS && | |
689 | WSAGetLastError() != WSAECONNRESET && | |
690 | WSAGetLastError()!= WSAEWOULDBLOCK) | |
691 | log_err("recvfrom failed: %s", | |
692 | wsa_strerror(WSAGetLastError())); | |
693 | #endif | |
694 | return; | |
695 | } | |
696 | sldns_buffer_skip(rep.c->buffer, rcv); | |
697 | sldns_buffer_flip(rep.c->buffer); | |
698 | rep.srctype = 0; | |
699 | fptr_ok(fptr_whitelist_comm_point(rep.c->callback)); | |
700 | if((*rep.c->callback)(rep.c, rep.c->cb_arg, NETEVENT_NOERROR, &rep)) { | |
701 | /* send back immediate reply */ | |
702 | (void)comm_point_send_udp_msg(rep.c, rep.c->buffer, | |
703 | (struct sockaddr*)&rep.addr, rep.addrlen); | |
704 | } | |
705 | if(rep.c->fd != fd) /* commpoint closed to -1 or reused for | |
706 | another UDP port. Note rep.c cannot be reused with TCP fd. */ | |
707 | break; | |
708 | } | |
709 | } | |
710 | ||
711 | /** Use a new tcp handler for new query fd, set to read query */ | |
712 | static void | |
713 | setup_tcp_handler(struct comm_point* c, int fd) | |
714 | { | |
715 | log_assert(c->type == comm_tcp); | |
716 | log_assert(c->fd == -1); | |
717 | sldns_buffer_clear(c->buffer); | |
718 | c->tcp_is_reading = 1; | |
719 | c->tcp_byte_count = 0; | |
720 | comm_point_start_listening(c, fd, TCP_QUERY_TIMEOUT); | |
721 | } | |
722 | ||
723 | void comm_base_handle_slow_accept(int ATTR_UNUSED(fd), | |
724 | short ATTR_UNUSED(event), void* arg) | |
725 | { | |
726 | struct comm_base* b = (struct comm_base*)arg; | |
727 | /* timeout for the slow accept, re-enable accepts again */ | |
728 | if(b->start_accept) { | |
729 | verbose(VERB_ALGO, "wait is over, slow accept disabled"); | |
730 | fptr_ok(fptr_whitelist_start_accept(b->start_accept)); | |
731 | (*b->start_accept)(b->cb_arg); | |
732 | b->eb->slow_accept_enabled = 0; | |
733 | } | |
734 | } | |
735 | ||
736 | int comm_point_perform_accept(struct comm_point* c, | |
737 | struct sockaddr_storage* addr, socklen_t* addrlen) | |
738 | { | |
739 | int new_fd; | |
740 | *addrlen = (socklen_t)sizeof(*addr); | |
741 | new_fd = accept(c->fd, (struct sockaddr*)addr, addrlen); | |
742 | if(new_fd == -1) { | |
743 | #ifndef USE_WINSOCK | |
744 | /* EINTR is signal interrupt. others are closed connection. */ | |
745 | if( errno == EINTR || errno == EAGAIN | |
746 | #ifdef EWOULDBLOCK | |
747 | || errno == EWOULDBLOCK | |
748 | #endif | |
749 | #ifdef ECONNABORTED | |
750 | || errno == ECONNABORTED | |
751 | #endif | |
752 | #ifdef EPROTO | |
753 | || errno == EPROTO | |
754 | #endif /* EPROTO */ | |
755 | ) | |
756 | return -1; | |
757 | #if defined(ENFILE) && defined(EMFILE) | |
758 | if(errno == ENFILE || errno == EMFILE) { | |
759 | /* out of file descriptors, likely outside of our | |
760 | * control. stop accept() calls for some time */ | |
761 | if(c->ev->base->stop_accept) { | |
762 | struct comm_base* b = c->ev->base; | |
763 | struct timeval tv; | |
764 | verbose(VERB_ALGO, "out of file descriptors: " | |
765 | "slow accept"); | |
766 | b->eb->slow_accept_enabled = 1; | |
767 | fptr_ok(fptr_whitelist_stop_accept( | |
768 | b->stop_accept)); | |
769 | (*b->stop_accept)(b->cb_arg); | |
770 | /* set timeout, no mallocs */ | |
771 | tv.tv_sec = NETEVENT_SLOW_ACCEPT_TIME/1000; | |
772 | tv.tv_usec = NETEVENT_SLOW_ACCEPT_TIME%1000; | |
773 | event_set(&b->eb->slow_accept, -1, EV_TIMEOUT, | |
774 | comm_base_handle_slow_accept, b); | |
775 | if(event_base_set(b->eb->base, | |
776 | &b->eb->slow_accept) != 0) { | |
777 | /* we do not want to log here, because | |
778 | * that would spam the logfiles. | |
779 | * error: "event_base_set failed." */ | |
780 | } | |
781 | if(event_add(&b->eb->slow_accept, &tv) != 0) { | |
782 | /* we do not want to log here, | |
783 | * error: "event_add failed." */ | |
784 | } | |
785 | } | |
786 | return -1; | |
787 | } | |
788 | #endif | |
789 | log_err_addr("accept failed", strerror(errno), addr, *addrlen); | |
790 | #else /* USE_WINSOCK */ | |
791 | if(WSAGetLastError() == WSAEINPROGRESS || | |
792 | WSAGetLastError() == WSAECONNRESET) | |
793 | return -1; | |
794 | if(WSAGetLastError() == WSAEWOULDBLOCK) { | |
795 | winsock_tcp_wouldblock(&c->ev->ev, EV_READ); | |
796 | return -1; | |
797 | } | |
798 | log_err_addr("accept failed", wsa_strerror(WSAGetLastError()), | |
799 | addr, *addrlen); | |
800 | #endif | |
801 | return -1; | |
802 | } | |
803 | fd_set_nonblock(new_fd); | |
804 | return new_fd; | |
805 | } | |
806 | ||
807 | #ifdef USE_WINSOCK | |
808 | static long win_bio_cb(BIO *b, int oper, const char* ATTR_UNUSED(argp), | |
809 | int ATTR_UNUSED(argi), long argl, long retvalue) | |
810 | { | |
811 | verbose(VERB_ALGO, "bio_cb %d, %s %s %s", oper, | |
812 | (oper&BIO_CB_RETURN)?"return":"before", | |
813 | (oper&BIO_CB_READ)?"read":((oper&BIO_CB_WRITE)?"write":"other"), | |
814 | WSAGetLastError()==WSAEWOULDBLOCK?"wsawb":""); | |
815 | /* on windows, check if previous operation caused EWOULDBLOCK */ | |
816 | if( (oper == (BIO_CB_READ|BIO_CB_RETURN) && argl == 0) || | |
817 | (oper == (BIO_CB_GETS|BIO_CB_RETURN) && argl == 0)) { | |
818 | if(WSAGetLastError() == WSAEWOULDBLOCK) | |
819 | winsock_tcp_wouldblock((struct event*) | |
820 | BIO_get_callback_arg(b), EV_READ); | |
821 | } | |
822 | if( (oper == (BIO_CB_WRITE|BIO_CB_RETURN) && argl == 0) || | |
823 | (oper == (BIO_CB_PUTS|BIO_CB_RETURN) && argl == 0)) { | |
824 | if(WSAGetLastError() == WSAEWOULDBLOCK) | |
825 | winsock_tcp_wouldblock((struct event*) | |
826 | BIO_get_callback_arg(b), EV_WRITE); | |
827 | } | |
828 | /* return original return value */ | |
829 | return retvalue; | |
830 | } | |
831 | ||
832 | /** set win bio callbacks for nonblocking operations */ | |
833 | void | |
834 | comm_point_tcp_win_bio_cb(struct comm_point* c, void* thessl) | |
835 | { | |
836 | SSL* ssl = (SSL*)thessl; | |
837 | /* set them both just in case, but usually they are the same BIO */ | |
838 | BIO_set_callback(SSL_get_rbio(ssl), &win_bio_cb); | |
839 | BIO_set_callback_arg(SSL_get_rbio(ssl), (char*)&c->ev->ev); | |
840 | BIO_set_callback(SSL_get_wbio(ssl), &win_bio_cb); | |
841 | BIO_set_callback_arg(SSL_get_wbio(ssl), (char*)&c->ev->ev); | |
842 | } | |
843 | #endif | |
844 | ||
845 | void | |
846 | comm_point_tcp_accept_callback(int fd, short event, void* arg) | |
847 | { | |
848 | struct comm_point* c = (struct comm_point*)arg, *c_hdl; | |
849 | int new_fd; | |
850 | log_assert(c->type == comm_tcp_accept); | |
851 | if(!(event & EV_READ)) { | |
852 | log_info("ignoring tcp accept event %d", (int)event); | |
853 | return; | |
854 | } | |
855 | comm_base_now(c->ev->base); | |
856 | /* find free tcp handler. */ | |
857 | if(!c->tcp_free) { | |
858 | log_warn("accepted too many tcp, connections full"); | |
859 | return; | |
860 | } | |
861 | /* accept incoming connection. */ | |
862 | c_hdl = c->tcp_free; | |
863 | log_assert(fd != -1); | |
864 | new_fd = comm_point_perform_accept(c, &c_hdl->repinfo.addr, | |
865 | &c_hdl->repinfo.addrlen); | |
866 | if(new_fd == -1) | |
867 | return; | |
868 | if(c->ssl) { | |
869 | c_hdl->ssl = incoming_ssl_fd(c->ssl, new_fd); | |
870 | if(!c_hdl->ssl) { | |
871 | c_hdl->fd = new_fd; | |
872 | comm_point_close(c_hdl); | |
873 | return; | |
874 | } | |
875 | c_hdl->ssl_shake_state = comm_ssl_shake_read; | |
876 | #ifdef USE_WINSOCK | |
877 | comm_point_tcp_win_bio_cb(c_hdl, c_hdl->ssl); | |
878 | #endif | |
879 | } | |
880 | ||
881 | /* grab the tcp handler buffers */ | |
882 | c->tcp_free = c_hdl->tcp_free; | |
883 | if(!c->tcp_free) { | |
884 | /* stop accepting incoming queries for now. */ | |
885 | comm_point_stop_listening(c); | |
886 | } | |
887 | /* addr is dropped. Not needed for tcp reply. */ | |
888 | setup_tcp_handler(c_hdl, new_fd); | |
889 | } | |
890 | ||
891 | /** Make tcp handler free for next assignment */ | |
892 | static void | |
893 | reclaim_tcp_handler(struct comm_point* c) | |
894 | { | |
895 | log_assert(c->type == comm_tcp); | |
896 | if(c->ssl) { | |
897 | #ifdef HAVE_SSL | |
898 | SSL_shutdown(c->ssl); | |
899 | SSL_free(c->ssl); | |
900 | c->ssl = NULL; | |
901 | #endif | |
902 | } | |
903 | comm_point_close(c); | |
904 | if(c->tcp_parent) { | |
905 | c->tcp_free = c->tcp_parent->tcp_free; | |
906 | c->tcp_parent->tcp_free = c; | |
907 | if(!c->tcp_free) { | |
908 | /* re-enable listening on accept socket */ | |
909 | comm_point_start_listening(c->tcp_parent, -1, -1); | |
910 | } | |
911 | } | |
912 | } | |
913 | ||
914 | /** do the callback when writing is done */ | |
915 | static void | |
916 | tcp_callback_writer(struct comm_point* c) | |
917 | { | |
918 | log_assert(c->type == comm_tcp); | |
919 | sldns_buffer_clear(c->buffer); | |
920 | if(c->tcp_do_toggle_rw) | |
921 | c->tcp_is_reading = 1; | |
922 | c->tcp_byte_count = 0; | |
923 | /* switch from listening(write) to listening(read) */ | |
924 | comm_point_stop_listening(c); | |
925 | comm_point_start_listening(c, -1, -1); | |
926 | } | |
927 | ||
928 | /** do the callback when reading is done */ | |
929 | static void | |
930 | tcp_callback_reader(struct comm_point* c) | |
931 | { | |
932 | log_assert(c->type == comm_tcp || c->type == comm_local); | |
933 | sldns_buffer_flip(c->buffer); | |
934 | if(c->tcp_do_toggle_rw) | |
935 | c->tcp_is_reading = 0; | |
936 | c->tcp_byte_count = 0; | |
937 | if(c->type == comm_tcp) | |
938 | comm_point_stop_listening(c); | |
939 | fptr_ok(fptr_whitelist_comm_point(c->callback)); | |
940 | if( (*c->callback)(c, c->cb_arg, NETEVENT_NOERROR, &c->repinfo) ) { | |
941 | comm_point_start_listening(c, -1, TCP_QUERY_TIMEOUT); | |
942 | } | |
943 | } | |
944 | ||
945 | /** continue ssl handshake */ | |
946 | #ifdef HAVE_SSL | |
947 | static int | |
948 | ssl_handshake(struct comm_point* c) | |
949 | { | |
950 | int r; | |
951 | if(c->ssl_shake_state == comm_ssl_shake_hs_read) { | |
952 | /* read condition satisfied back to writing */ | |
953 | comm_point_listen_for_rw(c, 1, 1); | |
954 | c->ssl_shake_state = comm_ssl_shake_none; | |
955 | return 1; | |
956 | } | |
957 | if(c->ssl_shake_state == comm_ssl_shake_hs_write) { | |
958 | /* write condition satisfied, back to reading */ | |
959 | comm_point_listen_for_rw(c, 1, 0); | |
960 | c->ssl_shake_state = comm_ssl_shake_none; | |
961 | return 1; | |
962 | } | |
963 | ||
964 | ERR_clear_error(); | |
965 | r = SSL_do_handshake(c->ssl); | |
966 | if(r != 1) { | |
967 | int want = SSL_get_error(c->ssl, r); | |
968 | if(want == SSL_ERROR_WANT_READ) { | |
969 | if(c->ssl_shake_state == comm_ssl_shake_read) | |
970 | return 1; | |
971 | c->ssl_shake_state = comm_ssl_shake_read; | |
972 | comm_point_listen_for_rw(c, 1, 0); | |
973 | return 1; | |
974 | } else if(want == SSL_ERROR_WANT_WRITE) { | |
975 | if(c->ssl_shake_state == comm_ssl_shake_write) | |
976 | return 1; | |
977 | c->ssl_shake_state = comm_ssl_shake_write; | |
978 | comm_point_listen_for_rw(c, 0, 1); | |
979 | return 1; | |
980 | } else if(r == 0) { | |
981 | return 0; /* closed */ | |
982 | } else if(want == SSL_ERROR_SYSCALL) { | |
983 | /* SYSCALL and errno==0 means closed uncleanly */ | |
984 | if(errno != 0) | |
985 | log_err("SSL_handshake syscall: %s", | |
986 | strerror(errno)); | |
987 | return 0; | |
988 | } else { | |
989 | log_crypto_err("ssl handshake failed"); | |
990 | log_addr(1, "ssl handshake failed", &c->repinfo.addr, | |
991 | c->repinfo.addrlen); | |
992 | return 0; | |
993 | } | |
994 | } | |
995 | /* this is where peer verification could take place */ | |
996 | log_addr(VERB_ALGO, "SSL DNS connection", &c->repinfo.addr, | |
997 | c->repinfo.addrlen); | |
998 | ||
999 | /* setup listen rw correctly */ | |
1000 | if(c->tcp_is_reading) { | |
1001 | if(c->ssl_shake_state != comm_ssl_shake_read) | |
1002 | comm_point_listen_for_rw(c, 1, 0); | |
1003 | } else { | |
1004 | comm_point_listen_for_rw(c, 1, 1); | |
1005 | } | |
1006 | c->ssl_shake_state = comm_ssl_shake_none; | |
1007 | return 1; | |
1008 | } | |
1009 | #endif /* HAVE_SSL */ | |
1010 | ||
1011 | /** ssl read callback on TCP */ | |
1012 | static int | |
1013 | ssl_handle_read(struct comm_point* c) | |
1014 | { | |
1015 | #ifdef HAVE_SSL | |
1016 | int r; | |
1017 | if(c->ssl_shake_state != comm_ssl_shake_none) { | |
1018 | if(!ssl_handshake(c)) | |
1019 | return 0; | |
1020 | if(c->ssl_shake_state != comm_ssl_shake_none) | |
1021 | return 1; | |
1022 | } | |
1023 | if(c->tcp_byte_count < sizeof(uint16_t)) { | |
1024 | /* read length bytes */ | |
1025 | ERR_clear_error(); | |
1026 | if((r=SSL_read(c->ssl, (void*)sldns_buffer_at(c->buffer, | |
1027 | c->tcp_byte_count), (int)(sizeof(uint16_t) - | |
1028 | c->tcp_byte_count))) <= 0) { | |
1029 | int want = SSL_get_error(c->ssl, r); | |
1030 | if(want == SSL_ERROR_ZERO_RETURN) { | |
1031 | return 0; /* shutdown, closed */ | |
1032 | } else if(want == SSL_ERROR_WANT_READ) { | |
1033 | return 1; /* read more later */ | |
1034 | } else if(want == SSL_ERROR_WANT_WRITE) { | |
1035 | c->ssl_shake_state = comm_ssl_shake_hs_write; | |
1036 | comm_point_listen_for_rw(c, 0, 1); | |
1037 | return 1; | |
1038 | } else if(want == SSL_ERROR_SYSCALL) { | |
1039 | if(errno != 0) | |
1040 | log_err("SSL_read syscall: %s", | |
1041 | strerror(errno)); | |
1042 | return 0; | |
1043 | } | |
1044 | log_crypto_err("could not SSL_read"); | |
1045 | return 0; | |
1046 | } | |
1047 | c->tcp_byte_count += r; | |
1048 | if(c->tcp_byte_count != sizeof(uint16_t)) | |
1049 | return 1; | |
1050 | if(sldns_buffer_read_u16_at(c->buffer, 0) > | |
1051 | sldns_buffer_capacity(c->buffer)) { | |
1052 | verbose(VERB_QUERY, "ssl: dropped larger than buffer"); | |
1053 | return 0; | |
1054 | } | |
1055 | sldns_buffer_set_limit(c->buffer, | |
1056 | sldns_buffer_read_u16_at(c->buffer, 0)); | |
1057 | if(sldns_buffer_limit(c->buffer) < LDNS_HEADER_SIZE) { | |
1058 | verbose(VERB_QUERY, "ssl: dropped bogus too short."); | |
1059 | return 0; | |
1060 | } | |
1061 | verbose(VERB_ALGO, "Reading ssl tcp query of length %d", | |
1062 | (int)sldns_buffer_limit(c->buffer)); | |
1063 | } | |
1064 | log_assert(sldns_buffer_remaining(c->buffer) > 0); | |
1065 | ERR_clear_error(); | |
1066 | r = SSL_read(c->ssl, (void*)sldns_buffer_current(c->buffer), | |
1067 | (int)sldns_buffer_remaining(c->buffer)); | |
1068 | if(r <= 0) { | |
1069 | int want = SSL_get_error(c->ssl, r); | |
1070 | if(want == SSL_ERROR_ZERO_RETURN) { | |
1071 | return 0; /* shutdown, closed */ | |
1072 | } else if(want == SSL_ERROR_WANT_READ) { | |
1073 | return 1; /* read more later */ | |
1074 | } else if(want == SSL_ERROR_WANT_WRITE) { | |
1075 | c->ssl_shake_state = comm_ssl_shake_hs_write; | |
1076 | comm_point_listen_for_rw(c, 0, 1); | |
1077 | return 1; | |
1078 | } else if(want == SSL_ERROR_SYSCALL) { | |
1079 | if(errno != 0) | |
1080 | log_err("SSL_read syscall: %s", | |
1081 | strerror(errno)); | |
1082 | return 0; | |
1083 | } | |
1084 | log_crypto_err("could not SSL_read"); | |
1085 | return 0; | |
1086 | } | |
1087 | sldns_buffer_skip(c->buffer, (ssize_t)r); | |
1088 | if(sldns_buffer_remaining(c->buffer) <= 0) { | |
1089 | tcp_callback_reader(c); | |
1090 | } | |
1091 | return 1; | |
1092 | #else | |
1093 | (void)c; | |
1094 | return 0; | |
1095 | #endif /* HAVE_SSL */ | |
1096 | } | |
1097 | ||
1098 | /** ssl write callback on TCP */ | |
1099 | static int | |
1100 | ssl_handle_write(struct comm_point* c) | |
1101 | { | |
1102 | #ifdef HAVE_SSL | |
1103 | int r; | |
1104 | if(c->ssl_shake_state != comm_ssl_shake_none) { | |
1105 | if(!ssl_handshake(c)) | |
1106 | return 0; | |
1107 | if(c->ssl_shake_state != comm_ssl_shake_none) | |
1108 | return 1; | |
1109 | } | |
1110 | /* ignore return, if fails we may simply block */ | |
1111 | (void)SSL_set_mode(c->ssl, SSL_MODE_ENABLE_PARTIAL_WRITE); | |
1112 | if(c->tcp_byte_count < sizeof(uint16_t)) { | |
1113 | uint16_t len = htons(sldns_buffer_limit(c->buffer)); | |
1114 | ERR_clear_error(); | |
1115 | r = SSL_write(c->ssl, | |
1116 | (void*)(((uint8_t*)&len)+c->tcp_byte_count), | |
1117 | (int)(sizeof(uint16_t)-c->tcp_byte_count)); | |
1118 | if(r <= 0) { | |
1119 | int want = SSL_get_error(c->ssl, r); | |
1120 | if(want == SSL_ERROR_ZERO_RETURN) { | |
1121 | return 0; /* closed */ | |
1122 | } else if(want == SSL_ERROR_WANT_READ) { | |
1123 | c->ssl_shake_state = comm_ssl_shake_read; | |
1124 | comm_point_listen_for_rw(c, 1, 0); | |
1125 | return 1; /* wait for read condition */ | |
1126 | } else if(want == SSL_ERROR_WANT_WRITE) { | |
1127 | return 1; /* write more later */ | |
1128 | } else if(want == SSL_ERROR_SYSCALL) { | |
1129 | if(errno != 0) | |
1130 | log_err("SSL_write syscall: %s", | |
1131 | strerror(errno)); | |
1132 | return 0; | |
1133 | } | |
1134 | log_crypto_err("could not SSL_write"); | |
1135 | return 0; | |
1136 | } | |
1137 | c->tcp_byte_count += r; | |
1138 | if(c->tcp_byte_count < sizeof(uint16_t)) | |
1139 | return 1; | |
1140 | sldns_buffer_set_position(c->buffer, c->tcp_byte_count - | |
1141 | sizeof(uint16_t)); | |
1142 | if(sldns_buffer_remaining(c->buffer) == 0) { | |
1143 | tcp_callback_writer(c); | |
1144 | return 1; | |
1145 | } | |
1146 | } | |
1147 | log_assert(sldns_buffer_remaining(c->buffer) > 0); | |
1148 | ERR_clear_error(); | |
1149 | r = SSL_write(c->ssl, (void*)sldns_buffer_current(c->buffer), | |
1150 | (int)sldns_buffer_remaining(c->buffer)); | |
1151 | if(r <= 0) { | |
1152 | int want = SSL_get_error(c->ssl, r); | |
1153 | if(want == SSL_ERROR_ZERO_RETURN) { | |
1154 | return 0; /* closed */ | |
1155 | } else if(want == SSL_ERROR_WANT_READ) { | |
1156 | c->ssl_shake_state = comm_ssl_shake_read; | |
1157 | comm_point_listen_for_rw(c, 1, 0); | |
1158 | return 1; /* wait for read condition */ | |
1159 | } else if(want == SSL_ERROR_WANT_WRITE) { | |
1160 | return 1; /* write more later */ | |
1161 | } else if(want == SSL_ERROR_SYSCALL) { | |
1162 | if(errno != 0) | |
1163 | log_err("SSL_write syscall: %s", | |
1164 | strerror(errno)); | |
1165 | return 0; | |
1166 | } | |
1167 | log_crypto_err("could not SSL_write"); | |
1168 | return 0; | |
1169 | } | |
1170 | sldns_buffer_skip(c->buffer, (ssize_t)r); | |
1171 | ||
1172 | if(sldns_buffer_remaining(c->buffer) == 0) { | |
1173 | tcp_callback_writer(c); | |
1174 | } | |
1175 | return 1; | |
1176 | #else | |
1177 | (void)c; | |
1178 | return 0; | |
1179 | #endif /* HAVE_SSL */ | |
1180 | } | |
1181 | ||
1182 | /** handle ssl tcp connection with dns contents */ | |
1183 | static int | |
1184 | ssl_handle_it(struct comm_point* c) | |
1185 | { | |
1186 | if(c->tcp_is_reading) | |
1187 | return ssl_handle_read(c); | |
1188 | return ssl_handle_write(c); | |
1189 | } | |
1190 | ||
1191 | /** Handle tcp reading callback. | |
1192 | * @param fd: file descriptor of socket. | |
1193 | * @param c: comm point to read from into buffer. | |
1194 | * @param short_ok: if true, very short packets are OK (for comm_local). | |
1195 | * @return: 0 on error | |
1196 | */ | |
1197 | static int | |
1198 | comm_point_tcp_handle_read(int fd, struct comm_point* c, int short_ok) | |
1199 | { | |
1200 | ssize_t r; | |
1201 | log_assert(c->type == comm_tcp || c->type == comm_local); | |
1202 | if(c->ssl) | |
1203 | return ssl_handle_it(c); | |
1204 | if(!c->tcp_is_reading) | |
1205 | return 0; | |
1206 | ||
1207 | log_assert(fd != -1); | |
1208 | if(c->tcp_byte_count < sizeof(uint16_t)) { | |
1209 | /* read length bytes */ | |
1210 | r = recv(fd,(void*)sldns_buffer_at(c->buffer,c->tcp_byte_count), | |
1211 | sizeof(uint16_t)-c->tcp_byte_count, 0); | |
1212 | if(r == 0) | |
1213 | return 0; | |
1214 | else if(r == -1) { | |
1215 | #ifndef USE_WINSOCK | |
1216 | if(errno == EINTR || errno == EAGAIN) | |
1217 | return 1; | |
1218 | #ifdef ECONNRESET | |
1219 | if(errno == ECONNRESET && verbosity < 2) | |
1220 | return 0; /* silence reset by peer */ | |
1221 | #endif | |
1222 | log_err_addr("read (in tcp s)", strerror(errno), | |
1223 | &c->repinfo.addr, c->repinfo.addrlen); | |
1224 | #else /* USE_WINSOCK */ | |
1225 | if(WSAGetLastError() == WSAECONNRESET) | |
1226 | return 0; | |
1227 | if(WSAGetLastError() == WSAEINPROGRESS) | |
1228 | return 1; | |
1229 | if(WSAGetLastError() == WSAEWOULDBLOCK) { | |
1230 | winsock_tcp_wouldblock(&c->ev->ev, EV_READ); | |
1231 | return 1; | |
1232 | } | |
1233 | log_err_addr("read (in tcp s)", | |
1234 | wsa_strerror(WSAGetLastError()), | |
1235 | &c->repinfo.addr, c->repinfo.addrlen); | |
1236 | #endif | |
1237 | return 0; | |
1238 | } | |
1239 | c->tcp_byte_count += r; | |
1240 | if(c->tcp_byte_count != sizeof(uint16_t)) | |
1241 | return 1; | |
1242 | if(sldns_buffer_read_u16_at(c->buffer, 0) > | |
1243 | sldns_buffer_capacity(c->buffer)) { | |
1244 | verbose(VERB_QUERY, "tcp: dropped larger than buffer"); | |
1245 | return 0; | |
1246 | } | |
1247 | sldns_buffer_set_limit(c->buffer, | |
1248 | sldns_buffer_read_u16_at(c->buffer, 0)); | |
1249 | if(!short_ok && | |
1250 | sldns_buffer_limit(c->buffer) < LDNS_HEADER_SIZE) { | |
1251 | verbose(VERB_QUERY, "tcp: dropped bogus too short."); | |
1252 | return 0; | |
1253 | } | |
1254 | verbose(VERB_ALGO, "Reading tcp query of length %d", | |
1255 | (int)sldns_buffer_limit(c->buffer)); | |
1256 | } | |
1257 | ||
1258 | log_assert(sldns_buffer_remaining(c->buffer) > 0); | |
1259 | r = recv(fd, (void*)sldns_buffer_current(c->buffer), | |
1260 | sldns_buffer_remaining(c->buffer), 0); | |
1261 | if(r == 0) { | |
1262 | return 0; | |
1263 | } else if(r == -1) { | |
1264 | #ifndef USE_WINSOCK | |
1265 | if(errno == EINTR || errno == EAGAIN) | |
1266 | return 1; | |
1267 | log_err_addr("read (in tcp r)", strerror(errno), | |
1268 | &c->repinfo.addr, c->repinfo.addrlen); | |
1269 | #else /* USE_WINSOCK */ | |
1270 | if(WSAGetLastError() == WSAECONNRESET) | |
1271 | return 0; | |
1272 | if(WSAGetLastError() == WSAEINPROGRESS) | |
1273 | return 1; | |
1274 | if(WSAGetLastError() == WSAEWOULDBLOCK) { | |
1275 | winsock_tcp_wouldblock(&c->ev->ev, EV_READ); | |
1276 | return 1; | |
1277 | } | |
1278 | log_err_addr("read (in tcp r)", | |
1279 | wsa_strerror(WSAGetLastError()), | |
1280 | &c->repinfo.addr, c->repinfo.addrlen); | |
1281 | #endif | |
1282 | return 0; | |
1283 | } | |
1284 | sldns_buffer_skip(c->buffer, r); | |
1285 | if(sldns_buffer_remaining(c->buffer) <= 0) { | |
1286 | tcp_callback_reader(c); | |
1287 | } | |
1288 | return 1; | |
1289 | } | |
1290 | ||
1291 | /** | |
1292 | * Handle tcp writing callback. | |
1293 | * @param fd: file descriptor of socket. | |
1294 | * @param c: comm point to write buffer out of. | |
1295 | * @return: 0 on error | |
1296 | */ | |
1297 | static int | |
1298 | comm_point_tcp_handle_write(int fd, struct comm_point* c) | |
1299 | { | |
1300 | ssize_t r; | |
1301 | log_assert(c->type == comm_tcp); | |
1302 | if(c->tcp_is_reading && !c->ssl) | |
1303 | return 0; | |
1304 | log_assert(fd != -1); | |
1305 | if(c->tcp_byte_count == 0 && c->tcp_check_nb_connect) { | |
1306 | /* check for pending error from nonblocking connect */ | |
1307 | /* from Stevens, unix network programming, vol1, 3rd ed, p450*/ | |
1308 | int error = 0; | |
1309 | socklen_t len = (socklen_t)sizeof(error); | |
1310 | if(getsockopt(fd, SOL_SOCKET, SO_ERROR, (void*)&error, | |
1311 | &len) < 0){ | |
1312 | #ifndef USE_WINSOCK | |
1313 | error = errno; /* on solaris errno is error */ | |
1314 | #else /* USE_WINSOCK */ | |
1315 | error = WSAGetLastError(); | |
1316 | #endif | |
1317 | } | |
1318 | #ifndef USE_WINSOCK | |
1319 | #if defined(EINPROGRESS) && defined(EWOULDBLOCK) | |
1320 | if(error == EINPROGRESS || error == EWOULDBLOCK) | |
1321 | return 1; /* try again later */ | |
1322 | else | |
1323 | #endif | |
1324 | if(error != 0 && verbosity < 2) | |
1325 | return 0; /* silence lots of chatter in the logs */ | |
1326 | else if(error != 0) { | |
1327 | log_err_addr("tcp connect", strerror(error), | |
1328 | &c->repinfo.addr, c->repinfo.addrlen); | |
1329 | #else /* USE_WINSOCK */ | |
1330 | /* examine error */ | |
1331 | if(error == WSAEINPROGRESS) | |
1332 | return 1; | |
1333 | else if(error == WSAEWOULDBLOCK) { | |
1334 | winsock_tcp_wouldblock(&c->ev->ev, EV_WRITE); | |
1335 | return 1; | |
1336 | } else if(error != 0 && verbosity < 2) | |
1337 | return 0; | |
1338 | else if(error != 0) { | |
1339 | log_err_addr("tcp connect", wsa_strerror(error), | |
1340 | &c->repinfo.addr, c->repinfo.addrlen); | |
1341 | #endif /* USE_WINSOCK */ | |
1342 | return 0; | |
1343 | } | |
1344 | } | |
1345 | if(c->ssl) | |
1346 | return ssl_handle_it(c); | |
1347 | ||
1348 | if(c->tcp_byte_count < sizeof(uint16_t)) { | |
1349 | uint16_t len = htons(sldns_buffer_limit(c->buffer)); | |
1350 | #ifdef HAVE_WRITEV | |
1351 | struct iovec iov[2]; | |
1352 | iov[0].iov_base = (uint8_t*)&len + c->tcp_byte_count; | |
1353 | iov[0].iov_len = sizeof(uint16_t) - c->tcp_byte_count; | |
1354 | iov[1].iov_base = sldns_buffer_begin(c->buffer); | |
1355 | iov[1].iov_len = sldns_buffer_limit(c->buffer); | |
1356 | log_assert(iov[0].iov_len > 0); | |
1357 | log_assert(iov[1].iov_len > 0); | |
1358 | r = writev(fd, iov, 2); | |
1359 | #else /* HAVE_WRITEV */ | |
1360 | r = send(fd, (void*)(((uint8_t*)&len)+c->tcp_byte_count), | |
1361 | sizeof(uint16_t)-c->tcp_byte_count, 0); | |
1362 | #endif /* HAVE_WRITEV */ | |
1363 | if(r == -1) { | |
1364 | #ifndef USE_WINSOCK | |
1365 | # ifdef EPIPE | |
1366 | if(errno == EPIPE && verbosity < 2) | |
1367 | return 0; /* silence 'broken pipe' */ | |
1368 | #endif | |
1369 | if(errno == EINTR || errno == EAGAIN) | |
1370 | return 1; | |
1371 | # ifdef HAVE_WRITEV | |
1372 | log_err_addr("tcp writev", strerror(errno), | |
1373 | &c->repinfo.addr, c->repinfo.addrlen); | |
1374 | # else /* HAVE_WRITEV */ | |
1375 | log_err_addr("tcp send s", strerror(errno), | |
1376 | &c->repinfo.addr, c->repinfo.addrlen); | |
1377 | # endif /* HAVE_WRITEV */ | |
1378 | #else | |
1379 | if(WSAGetLastError() == WSAENOTCONN) | |
1380 | return 1; | |
1381 | if(WSAGetLastError() == WSAEINPROGRESS) | |
1382 | return 1; | |
1383 | if(WSAGetLastError() == WSAEWOULDBLOCK) { | |
1384 | winsock_tcp_wouldblock(&c->ev->ev, EV_WRITE); | |
1385 | return 1; | |
1386 | } | |
1387 | log_err_addr("tcp send s", | |
1388 | wsa_strerror(WSAGetLastError()), | |
1389 | &c->repinfo.addr, c->repinfo.addrlen); | |
1390 | #endif | |
1391 | return 0; | |
1392 | } | |
1393 | c->tcp_byte_count += r; | |
1394 | if(c->tcp_byte_count < sizeof(uint16_t)) | |
1395 | return 1; | |
1396 | sldns_buffer_set_position(c->buffer, c->tcp_byte_count - | |
1397 | sizeof(uint16_t)); | |
1398 | if(sldns_buffer_remaining(c->buffer) == 0) { | |
1399 | tcp_callback_writer(c); | |
1400 | return 1; | |
1401 | } | |
1402 | } | |
1403 | log_assert(sldns_buffer_remaining(c->buffer) > 0); | |
1404 | r = send(fd, (void*)sldns_buffer_current(c->buffer), | |
1405 | sldns_buffer_remaining(c->buffer), 0); | |
1406 | if(r == -1) { | |
1407 | #ifndef USE_WINSOCK | |
1408 | if(errno == EINTR || errno == EAGAIN) | |
1409 | return 1; | |
1410 | log_err_addr("tcp send r", strerror(errno), | |
1411 | &c->repinfo.addr, c->repinfo.addrlen); | |
1412 | #else | |
1413 | if(WSAGetLastError() == WSAEINPROGRESS) | |
1414 | return 1; | |
1415 | if(WSAGetLastError() == WSAEWOULDBLOCK) { | |
1416 | winsock_tcp_wouldblock(&c->ev->ev, EV_WRITE); | |
1417 | return 1; | |
1418 | } | |
1419 | log_err_addr("tcp send r", wsa_strerror(WSAGetLastError()), | |
1420 | &c->repinfo.addr, c->repinfo.addrlen); | |
1421 | #endif | |
1422 | return 0; | |
1423 | } | |
1424 | sldns_buffer_skip(c->buffer, r); | |
1425 | ||
1426 | if(sldns_buffer_remaining(c->buffer) == 0) { | |
1427 | tcp_callback_writer(c); | |
1428 | } | |
1429 | ||
1430 | return 1; | |
1431 | } | |
1432 | ||
1433 | void | |
1434 | comm_point_tcp_handle_callback(int fd, short event, void* arg) | |
1435 | { | |
1436 | struct comm_point* c = (struct comm_point*)arg; | |
1437 | log_assert(c->type == comm_tcp); | |
1438 | comm_base_now(c->ev->base); | |
1439 | ||
1440 | if(event&EV_READ) { | |
1441 | if(!comm_point_tcp_handle_read(fd, c, 0)) { | |
1442 | reclaim_tcp_handler(c); | |
1443 | if(!c->tcp_do_close) { | |
1444 | fptr_ok(fptr_whitelist_comm_point( | |
1445 | c->callback)); | |
1446 | (void)(*c->callback)(c, c->cb_arg, | |
1447 | NETEVENT_CLOSED, NULL); | |
1448 | } | |
1449 | } | |
1450 | return; | |
1451 | } | |
1452 | if(event&EV_WRITE) { | |
1453 | if(!comm_point_tcp_handle_write(fd, c)) { | |
1454 | reclaim_tcp_handler(c); | |
1455 | if(!c->tcp_do_close) { | |
1456 | fptr_ok(fptr_whitelist_comm_point( | |
1457 | c->callback)); | |
1458 | (void)(*c->callback)(c, c->cb_arg, | |
1459 | NETEVENT_CLOSED, NULL); | |
1460 | } | |
1461 | } | |
1462 | return; | |
1463 | } | |
1464 | if(event&EV_TIMEOUT) { | |
1465 | verbose(VERB_QUERY, "tcp took too long, dropped"); | |
1466 | reclaim_tcp_handler(c); | |
1467 | if(!c->tcp_do_close) { | |
1468 | fptr_ok(fptr_whitelist_comm_point(c->callback)); | |
1469 | (void)(*c->callback)(c, c->cb_arg, | |
1470 | NETEVENT_TIMEOUT, NULL); | |
1471 | } | |
1472 | return; | |
1473 | } | |
1474 | log_err("Ignored event %d for tcphdl.", event); | |
1475 | } | |
1476 | ||
1477 | void comm_point_local_handle_callback(int fd, short event, void* arg) | |
1478 | { | |
1479 | struct comm_point* c = (struct comm_point*)arg; | |
1480 | log_assert(c->type == comm_local); | |
1481 | comm_base_now(c->ev->base); | |
1482 | ||
1483 | if(event&EV_READ) { | |
1484 | if(!comm_point_tcp_handle_read(fd, c, 1)) { | |
1485 | fptr_ok(fptr_whitelist_comm_point(c->callback)); | |
1486 | (void)(*c->callback)(c, c->cb_arg, NETEVENT_CLOSED, | |
1487 | NULL); | |
1488 | } | |
1489 | return; | |
1490 | } | |
1491 | log_err("Ignored event %d for localhdl.", event); | |
1492 | } | |
1493 | ||
1494 | void comm_point_raw_handle_callback(int ATTR_UNUSED(fd), | |
1495 | short event, void* arg) | |
1496 | { | |
1497 | struct comm_point* c = (struct comm_point*)arg; | |
1498 | int err = NETEVENT_NOERROR; | |
1499 | log_assert(c->type == comm_raw); | |
1500 | comm_base_now(c->ev->base); | |
1501 | ||
1502 | if(event&EV_TIMEOUT) | |
1503 | err = NETEVENT_TIMEOUT; | |
1504 | fptr_ok(fptr_whitelist_comm_point_raw(c->callback)); | |
1505 | (void)(*c->callback)(c, c->cb_arg, err, NULL); | |
1506 | } | |
1507 | ||
1508 | struct comm_point* | |
1509 | comm_point_create_udp(struct comm_base *base, int fd, sldns_buffer* buffer, | |
1510 | comm_point_callback_t* callback, void* callback_arg) | |
1511 | { | |
1512 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1513 | sizeof(struct comm_point)); | |
1514 | short evbits; | |
1515 | if(!c) | |
1516 | return NULL; | |
1517 | c->ev = (struct internal_event*)calloc(1, | |
1518 | sizeof(struct internal_event)); | |
1519 | if(!c->ev) { | |
1520 | free(c); | |
1521 | return NULL; | |
1522 | } | |
1523 | c->ev->base = base; | |
1524 | c->fd = fd; | |
1525 | c->buffer = buffer; | |
1526 | c->timeout = NULL; | |
1527 | c->tcp_is_reading = 0; | |
1528 | c->tcp_byte_count = 0; | |
1529 | c->tcp_parent = NULL; | |
1530 | c->max_tcp_count = 0; | |
1531 | c->tcp_handlers = NULL; | |
1532 | c->tcp_free = NULL; | |
1533 | c->type = comm_udp; | |
1534 | c->tcp_do_close = 0; | |
1535 | c->do_not_close = 0; | |
1536 | c->tcp_do_toggle_rw = 0; | |
1537 | c->tcp_check_nb_connect = 0; | |
1538 | c->inuse = 0; | |
1539 | c->callback = callback; | |
1540 | c->cb_arg = callback_arg; | |
1541 | evbits = EV_READ | EV_PERSIST; | |
1542 | /* libevent stuff */ | |
1543 | event_set(&c->ev->ev, c->fd, evbits, comm_point_udp_callback, c); | |
1544 | if(event_base_set(base->eb->base, &c->ev->ev) != 0) { | |
1545 | log_err("could not baseset udp event"); | |
1546 | comm_point_delete(c); | |
1547 | return NULL; | |
1548 | } | |
1549 | if(fd!=-1 && event_add(&c->ev->ev, c->timeout) != 0 ) { | |
1550 | log_err("could not add udp event"); | |
1551 | comm_point_delete(c); | |
1552 | return NULL; | |
1553 | } | |
1554 | return c; | |
1555 | } | |
1556 | ||
1557 | struct comm_point* | |
1558 | comm_point_create_udp_ancil(struct comm_base *base, int fd, | |
1559 | sldns_buffer* buffer, | |
1560 | comm_point_callback_t* callback, void* callback_arg) | |
1561 | { | |
1562 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1563 | sizeof(struct comm_point)); | |
1564 | short evbits; | |
1565 | if(!c) | |
1566 | return NULL; | |
1567 | c->ev = (struct internal_event*)calloc(1, | |
1568 | sizeof(struct internal_event)); | |
1569 | if(!c->ev) { | |
1570 | free(c); | |
1571 | return NULL; | |
1572 | } | |
1573 | c->ev->base = base; | |
1574 | c->fd = fd; | |
1575 | c->buffer = buffer; | |
1576 | c->timeout = NULL; | |
1577 | c->tcp_is_reading = 0; | |
1578 | c->tcp_byte_count = 0; | |
1579 | c->tcp_parent = NULL; | |
1580 | c->max_tcp_count = 0; | |
1581 | c->tcp_handlers = NULL; | |
1582 | c->tcp_free = NULL; | |
1583 | c->type = comm_udp; | |
1584 | c->tcp_do_close = 0; | |
1585 | c->do_not_close = 0; | |
1586 | c->inuse = 0; | |
1587 | c->tcp_do_toggle_rw = 0; | |
1588 | c->tcp_check_nb_connect = 0; | |
1589 | c->callback = callback; | |
1590 | c->cb_arg = callback_arg; | |
1591 | evbits = EV_READ | EV_PERSIST; | |
1592 | /* libevent stuff */ | |
1593 | event_set(&c->ev->ev, c->fd, evbits, comm_point_udp_ancil_callback, c); | |
1594 | if(event_base_set(base->eb->base, &c->ev->ev) != 0) { | |
1595 | log_err("could not baseset udp event"); | |
1596 | comm_point_delete(c); | |
1597 | return NULL; | |
1598 | } | |
1599 | if(fd!=-1 && event_add(&c->ev->ev, c->timeout) != 0 ) { | |
1600 | log_err("could not add udp event"); | |
1601 | comm_point_delete(c); | |
1602 | return NULL; | |
1603 | } | |
1604 | return c; | |
1605 | } | |
1606 | ||
1607 | static struct comm_point* | |
1608 | comm_point_create_tcp_handler(struct comm_base *base, | |
1609 | struct comm_point* parent, size_t bufsize, | |
1610 | comm_point_callback_t* callback, void* callback_arg) | |
1611 | { | |
1612 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1613 | sizeof(struct comm_point)); | |
1614 | short evbits; | |
1615 | if(!c) | |
1616 | return NULL; | |
1617 | c->ev = (struct internal_event*)calloc(1, | |
1618 | sizeof(struct internal_event)); | |
1619 | if(!c->ev) { | |
1620 | free(c); | |
1621 | return NULL; | |
1622 | } | |
1623 | c->ev->base = base; | |
1624 | c->fd = -1; | |
1625 | c->buffer = sldns_buffer_new(bufsize); | |
1626 | if(!c->buffer) { | |
1627 | free(c->ev); | |
1628 | free(c); | |
1629 | return NULL; | |
1630 | } | |
1631 | c->timeout = (struct timeval*)malloc(sizeof(struct timeval)); | |
1632 | if(!c->timeout) { | |
1633 | sldns_buffer_free(c->buffer); | |
1634 | free(c->ev); | |
1635 | free(c); | |
1636 | return NULL; | |
1637 | } | |
1638 | c->tcp_is_reading = 0; | |
1639 | c->tcp_byte_count = 0; | |
1640 | c->tcp_parent = parent; | |
1641 | c->max_tcp_count = 0; | |
1642 | c->tcp_handlers = NULL; | |
1643 | c->tcp_free = NULL; | |
1644 | c->type = comm_tcp; | |
1645 | c->tcp_do_close = 0; | |
1646 | c->do_not_close = 0; | |
1647 | c->tcp_do_toggle_rw = 1; | |
1648 | c->tcp_check_nb_connect = 0; | |
1649 | c->repinfo.c = c; | |
1650 | c->callback = callback; | |
1651 | c->cb_arg = callback_arg; | |
1652 | /* add to parent free list */ | |
1653 | c->tcp_free = parent->tcp_free; | |
1654 | parent->tcp_free = c; | |
1655 | /* libevent stuff */ | |
1656 | evbits = EV_PERSIST | EV_READ | EV_TIMEOUT; | |
1657 | event_set(&c->ev->ev, c->fd, evbits, comm_point_tcp_handle_callback, c); | |
1658 | if(event_base_set(base->eb->base, &c->ev->ev) != 0) | |
1659 | { | |
1660 | log_err("could not basetset tcphdl event"); | |
1661 | parent->tcp_free = c->tcp_free; | |
1662 | free(c->ev); | |
1663 | free(c); | |
1664 | return NULL; | |
1665 | } | |
1666 | return c; | |
1667 | } | |
1668 | ||
1669 | struct comm_point* | |
1670 | comm_point_create_tcp(struct comm_base *base, int fd, int num, size_t bufsize, | |
1671 | comm_point_callback_t* callback, void* callback_arg) | |
1672 | { | |
1673 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1674 | sizeof(struct comm_point)); | |
1675 | short evbits; | |
1676 | int i; | |
1677 | /* first allocate the TCP accept listener */ | |
1678 | if(!c) | |
1679 | return NULL; | |
1680 | c->ev = (struct internal_event*)calloc(1, | |
1681 | sizeof(struct internal_event)); | |
1682 | if(!c->ev) { | |
1683 | free(c); | |
1684 | return NULL; | |
1685 | } | |
1686 | c->ev->base = base; | |
1687 | c->fd = fd; | |
1688 | c->buffer = NULL; | |
1689 | c->timeout = NULL; | |
1690 | c->tcp_is_reading = 0; | |
1691 | c->tcp_byte_count = 0; | |
1692 | c->tcp_parent = NULL; | |
1693 | c->max_tcp_count = num; | |
1694 | c->tcp_handlers = (struct comm_point**)calloc((size_t)num, | |
1695 | sizeof(struct comm_point*)); | |
1696 | if(!c->tcp_handlers) { | |
1697 | free(c->ev); | |
1698 | free(c); | |
1699 | return NULL; | |
1700 | } | |
1701 | c->tcp_free = NULL; | |
1702 | c->type = comm_tcp_accept; | |
1703 | c->tcp_do_close = 0; | |
1704 | c->do_not_close = 0; | |
1705 | c->tcp_do_toggle_rw = 0; | |
1706 | c->tcp_check_nb_connect = 0; | |
1707 | c->callback = NULL; | |
1708 | c->cb_arg = NULL; | |
1709 | evbits = EV_READ | EV_PERSIST; | |
1710 | /* libevent stuff */ | |
1711 | event_set(&c->ev->ev, c->fd, evbits, comm_point_tcp_accept_callback, c); | |
1712 | if(event_base_set(base->eb->base, &c->ev->ev) != 0 || | |
1713 | event_add(&c->ev->ev, c->timeout) != 0 ) | |
1714 | { | |
1715 | log_err("could not add tcpacc event"); | |
1716 | comm_point_delete(c); | |
1717 | return NULL; | |
1718 | } | |
1719 | ||
1720 | /* now prealloc the tcp handlers */ | |
1721 | for(i=0; i<num; i++) { | |
1722 | c->tcp_handlers[i] = comm_point_create_tcp_handler(base, | |
1723 | c, bufsize, callback, callback_arg); | |
1724 | if(!c->tcp_handlers[i]) { | |
1725 | comm_point_delete(c); | |
1726 | return NULL; | |
1727 | } | |
1728 | } | |
1729 | ||
1730 | return c; | |
1731 | } | |
1732 | ||
1733 | struct comm_point* | |
1734 | comm_point_create_tcp_out(struct comm_base *base, size_t bufsize, | |
1735 | comm_point_callback_t* callback, void* callback_arg) | |
1736 | { | |
1737 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1738 | sizeof(struct comm_point)); | |
1739 | short evbits; | |
1740 | if(!c) | |
1741 | return NULL; | |
1742 | c->ev = (struct internal_event*)calloc(1, | |
1743 | sizeof(struct internal_event)); | |
1744 | if(!c->ev) { | |
1745 | free(c); | |
1746 | return NULL; | |
1747 | } | |
1748 | c->ev->base = base; | |
1749 | c->fd = -1; | |
1750 | c->buffer = sldns_buffer_new(bufsize); | |
1751 | if(!c->buffer) { | |
1752 | free(c->ev); | |
1753 | free(c); | |
1754 | return NULL; | |
1755 | } | |
1756 | c->timeout = NULL; | |
1757 | c->tcp_is_reading = 0; | |
1758 | c->tcp_byte_count = 0; | |
1759 | c->tcp_parent = NULL; | |
1760 | c->max_tcp_count = 0; | |
1761 | c->tcp_handlers = NULL; | |
1762 | c->tcp_free = NULL; | |
1763 | c->type = comm_tcp; | |
1764 | c->tcp_do_close = 0; | |
1765 | c->do_not_close = 0; | |
1766 | c->tcp_do_toggle_rw = 1; | |
1767 | c->tcp_check_nb_connect = 1; | |
1768 | c->repinfo.c = c; | |
1769 | c->callback = callback; | |
1770 | c->cb_arg = callback_arg; | |
1771 | evbits = EV_PERSIST | EV_WRITE; | |
1772 | event_set(&c->ev->ev, c->fd, evbits, comm_point_tcp_handle_callback, c); | |
1773 | if(event_base_set(base->eb->base, &c->ev->ev) != 0) | |
1774 | { | |
1775 | log_err("could not basetset tcpout event"); | |
1776 | sldns_buffer_free(c->buffer); | |
1777 | free(c->ev); | |
1778 | free(c); | |
1779 | return NULL; | |
1780 | } | |
1781 | ||
1782 | return c; | |
1783 | } | |
1784 | ||
1785 | struct comm_point* | |
1786 | comm_point_create_local(struct comm_base *base, int fd, size_t bufsize, | |
1787 | comm_point_callback_t* callback, void* callback_arg) | |
1788 | { | |
1789 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1790 | sizeof(struct comm_point)); | |
1791 | short evbits; | |
1792 | if(!c) | |
1793 | return NULL; | |
1794 | c->ev = (struct internal_event*)calloc(1, | |
1795 | sizeof(struct internal_event)); | |
1796 | if(!c->ev) { | |
1797 | free(c); | |
1798 | return NULL; | |
1799 | } | |
1800 | c->ev->base = base; | |
1801 | c->fd = fd; | |
1802 | c->buffer = sldns_buffer_new(bufsize); | |
1803 | if(!c->buffer) { | |
1804 | free(c->ev); | |
1805 | free(c); | |
1806 | return NULL; | |
1807 | } | |
1808 | c->timeout = NULL; | |
1809 | c->tcp_is_reading = 1; | |
1810 | c->tcp_byte_count = 0; | |
1811 | c->tcp_parent = NULL; | |
1812 | c->max_tcp_count = 0; | |
1813 | c->tcp_handlers = NULL; | |
1814 | c->tcp_free = NULL; | |
1815 | c->type = comm_local; | |
1816 | c->tcp_do_close = 0; | |
1817 | c->do_not_close = 1; | |
1818 | c->tcp_do_toggle_rw = 0; | |
1819 | c->tcp_check_nb_connect = 0; | |
1820 | c->callback = callback; | |
1821 | c->cb_arg = callback_arg; | |
1822 | /* libevent stuff */ | |
1823 | evbits = EV_PERSIST | EV_READ; | |
1824 | event_set(&c->ev->ev, c->fd, evbits, comm_point_local_handle_callback, | |
1825 | c); | |
1826 | if(event_base_set(base->eb->base, &c->ev->ev) != 0 || | |
1827 | event_add(&c->ev->ev, c->timeout) != 0 ) | |
1828 | { | |
1829 | log_err("could not add localhdl event"); | |
1830 | free(c->ev); | |
1831 | free(c); | |
1832 | return NULL; | |
1833 | } | |
1834 | return c; | |
1835 | } | |
1836 | ||
1837 | struct comm_point* | |
1838 | comm_point_create_raw(struct comm_base* base, int fd, int writing, | |
1839 | comm_point_callback_t* callback, void* callback_arg) | |
1840 | { | |
1841 | struct comm_point* c = (struct comm_point*)calloc(1, | |
1842 | sizeof(struct comm_point)); | |
1843 | short evbits; | |
1844 | if(!c) | |
1845 | return NULL; | |
1846 | c->ev = (struct internal_event*)calloc(1, | |
1847 | sizeof(struct internal_event)); | |
1848 | if(!c->ev) { | |
1849 | free(c); | |
1850 | return NULL; | |
1851 | } | |
1852 | c->ev->base = base; | |
1853 | c->fd = fd; | |
1854 | c->buffer = NULL; | |
1855 | c->timeout = NULL; | |
1856 | c->tcp_is_reading = 0; | |
1857 | c->tcp_byte_count = 0; | |
1858 | c->tcp_parent = NULL; | |
1859 | c->max_tcp_count = 0; | |
1860 | c->tcp_handlers = NULL; | |
1861 | c->tcp_free = NULL; | |
1862 | c->type = comm_raw; | |
1863 | c->tcp_do_close = 0; | |
1864 | c->do_not_close = 1; | |
1865 | c->tcp_do_toggle_rw = 0; | |
1866 | c->tcp_check_nb_connect = 0; | |
1867 | c->callback = callback; | |
1868 | c->cb_arg = callback_arg; | |
1869 | /* libevent stuff */ | |
1870 | if(writing) | |
1871 | evbits = EV_PERSIST | EV_WRITE; | |
1872 | else evbits = EV_PERSIST | EV_READ; | |
1873 | event_set(&c->ev->ev, c->fd, evbits, comm_point_raw_handle_callback, | |
1874 | c); | |
1875 | if(event_base_set(base->eb->base, &c->ev->ev) != 0 || | |
1876 | event_add(&c->ev->ev, c->timeout) != 0 ) | |
1877 | { | |
1878 | log_err("could not add rawhdl event"); | |
1879 | free(c->ev); | |
1880 | free(c); | |
1881 | return NULL; | |
1882 | } | |
1883 | return c; | |
1884 | } | |
1885 | ||
1886 | void | |
1887 | comm_point_close(struct comm_point* c) | |
1888 | { | |
1889 | if(!c) | |
1890 | return; | |
1891 | if(c->fd != -1) | |
1892 | if(event_del(&c->ev->ev) != 0) { | |
1893 | log_err("could not event_del on close"); | |
1894 | } | |
1895 | /* close fd after removing from event lists, or epoll.. is messed up */ | |
1896 | if(c->fd != -1 && !c->do_not_close) { | |
1897 | verbose(VERB_ALGO, "close fd %d", c->fd); | |
1898 | #ifndef USE_WINSOCK | |
1899 | close(c->fd); | |
1900 | #else | |
1901 | closesocket(c->fd); | |
1902 | #endif | |
1903 | } | |
1904 | c->fd = -1; | |
1905 | } | |
1906 | ||
1907 | void | |
1908 | comm_point_delete(struct comm_point* c) | |
1909 | { | |
1910 | if(!c) | |
1911 | return; | |
1912 | if(c->type == comm_tcp && c->ssl) { | |
1913 | #ifdef HAVE_SSL | |
1914 | SSL_shutdown(c->ssl); | |
1915 | SSL_free(c->ssl); | |
1916 | #endif | |
1917 | } | |
1918 | comm_point_close(c); | |
1919 | if(c->tcp_handlers) { | |
1920 | int i; | |
1921 | for(i=0; i<c->max_tcp_count; i++) | |
1922 | comm_point_delete(c->tcp_handlers[i]); | |
1923 | free(c->tcp_handlers); | |
1924 | } | |
1925 | free(c->timeout); | |
1926 | if(c->type == comm_tcp || c->type == comm_local) | |
1927 | sldns_buffer_free(c->buffer); | |
1928 | free(c->ev); | |
1929 | free(c); | |
1930 | } | |
1931 | ||
1932 | void | |
1933 | comm_point_send_reply(struct comm_reply *repinfo) | |
1934 | { | |
1935 | log_assert(repinfo && repinfo->c); | |
1936 | if(repinfo->c->type == comm_udp) { | |
1937 | if(repinfo->srctype) | |
1938 | comm_point_send_udp_msg_if(repinfo->c, | |
1939 | repinfo->c->buffer, (struct sockaddr*)&repinfo->addr, | |
1940 | repinfo->addrlen, repinfo); | |
1941 | else | |
1942 | comm_point_send_udp_msg(repinfo->c, repinfo->c->buffer, | |
1943 | (struct sockaddr*)&repinfo->addr, repinfo->addrlen); | |
1944 | #ifdef USE_DNSTAP | |
1945 | if(repinfo->c->dtenv != NULL && | |
1946 | repinfo->c->dtenv->log_client_response_messages) | |
1947 | dt_msg_send_client_response(repinfo->c->dtenv, | |
1948 | &repinfo->addr, repinfo->c->type, repinfo->c->buffer); | |
1949 | #endif | |
1950 | } else { | |
1951 | #ifdef USE_DNSTAP | |
1952 | if(repinfo->c->tcp_parent->dtenv != NULL && | |
1953 | repinfo->c->tcp_parent->dtenv->log_client_response_messages) | |
1954 | dt_msg_send_client_response(repinfo->c->tcp_parent->dtenv, | |
1955 | &repinfo->addr, repinfo->c->type, repinfo->c->buffer); | |
1956 | #endif | |
1957 | comm_point_start_listening(repinfo->c, -1, TCP_QUERY_TIMEOUT); | |
1958 | } | |
1959 | } | |
1960 | ||
1961 | void | |
1962 | comm_point_drop_reply(struct comm_reply* repinfo) | |
1963 | { | |
1964 | if(!repinfo) | |
1965 | return; | |
1966 | log_assert(repinfo && repinfo->c); | |
1967 | log_assert(repinfo->c->type != comm_tcp_accept); | |
1968 | if(repinfo->c->type == comm_udp) | |
1969 | return; | |
1970 | reclaim_tcp_handler(repinfo->c); | |
1971 | } | |
1972 | ||
1973 | void | |
1974 | comm_point_stop_listening(struct comm_point* c) | |
1975 | { | |
1976 | verbose(VERB_ALGO, "comm point stop listening %d", c->fd); | |
1977 | if(event_del(&c->ev->ev) != 0) { | |
1978 | log_err("event_del error to stoplisten"); | |
1979 | } | |
1980 | } | |
1981 | ||
1982 | void | |
1983 | comm_point_start_listening(struct comm_point* c, int newfd, int sec) | |
1984 | { | |
1985 | verbose(VERB_ALGO, "comm point start listening %d", | |
1986 | c->fd==-1?newfd:c->fd); | |
1987 | if(c->type == comm_tcp_accept && !c->tcp_free) { | |
1988 | /* no use to start listening no free slots. */ | |
1989 | return; | |
1990 | } | |
1991 | if(sec != -1 && sec != 0) { | |
1992 | if(!c->timeout) { | |
1993 | c->timeout = (struct timeval*)malloc(sizeof( | |
1994 | struct timeval)); | |
1995 | if(!c->timeout) { | |
1996 | log_err("cpsl: malloc failed. No net read."); | |
1997 | return; | |
1998 | } | |
1999 | } | |
2000 | c->ev->ev.ev_events |= EV_TIMEOUT; | |
2001 | #ifndef S_SPLINT_S /* splint fails on struct timeval. */ | |
2002 | c->timeout->tv_sec = sec; | |
2003 | c->timeout->tv_usec = 0; | |
2004 | #endif /* S_SPLINT_S */ | |
2005 | } | |
2006 | if(c->type == comm_tcp) { | |
2007 | c->ev->ev.ev_events &= ~(EV_READ|EV_WRITE); | |
2008 | if(c->tcp_is_reading) | |
2009 | c->ev->ev.ev_events |= EV_READ; | |
2010 | else c->ev->ev.ev_events |= EV_WRITE; | |
2011 | } | |
2012 | if(newfd != -1) { | |
2013 | if(c->fd != -1) { | |
2014 | #ifndef USE_WINSOCK | |
2015 | close(c->fd); | |
2016 | #else | |
2017 | closesocket(c->fd); | |
2018 | #endif | |
2019 | } | |
2020 | c->fd = newfd; | |
2021 | c->ev->ev.ev_fd = c->fd; | |
2022 | } | |
2023 | if(event_add(&c->ev->ev, sec==0?NULL:c->timeout) != 0) { | |
2024 | log_err("event_add failed. in cpsl."); | |
2025 | } | |
2026 | } | |
2027 | ||
2028 | void comm_point_listen_for_rw(struct comm_point* c, int rd, int wr) | |
2029 | { | |
2030 | verbose(VERB_ALGO, "comm point listen_for_rw %d %d", c->fd, wr); | |
2031 | if(event_del(&c->ev->ev) != 0) { | |
2032 | log_err("event_del error to cplf"); | |
2033 | } | |
2034 | c->ev->ev.ev_events &= ~(EV_READ|EV_WRITE); | |
2035 | if(rd) c->ev->ev.ev_events |= EV_READ; | |
2036 | if(wr) c->ev->ev.ev_events |= EV_WRITE; | |
2037 | if(event_add(&c->ev->ev, c->timeout) != 0) { | |
2038 | log_err("event_add failed. in cplf."); | |
2039 | } | |
2040 | } | |
2041 | ||
2042 | size_t comm_point_get_mem(struct comm_point* c) | |
2043 | { | |
2044 | size_t s; | |
2045 | if(!c) | |
2046 | return 0; | |
2047 | s = sizeof(*c) + sizeof(*c->ev); | |
2048 | if(c->timeout) | |
2049 | s += sizeof(*c->timeout); | |
2050 | if(c->type == comm_tcp || c->type == comm_local) | |
2051 | s += sizeof(*c->buffer) + sldns_buffer_capacity(c->buffer); | |
2052 | if(c->type == comm_tcp_accept) { | |
2053 | int i; | |
2054 | for(i=0; i<c->max_tcp_count; i++) | |
2055 | s += comm_point_get_mem(c->tcp_handlers[i]); | |
2056 | } | |
2057 | return s; | |
2058 | } | |
2059 | ||
2060 | struct comm_timer* | |
2061 | comm_timer_create(struct comm_base* base, void (*cb)(void*), void* cb_arg) | |
2062 | { | |
2063 | struct comm_timer *tm = (struct comm_timer*)calloc(1, | |
2064 | sizeof(struct comm_timer)); | |
2065 | if(!tm) | |
2066 | return NULL; | |
2067 | tm->ev_timer = (struct internal_timer*)calloc(1, | |
2068 | sizeof(struct internal_timer)); | |
2069 | if(!tm->ev_timer) { | |
2070 | log_err("malloc failed"); | |
2071 | free(tm); | |
2072 | return NULL; | |
2073 | } | |
2074 | tm->ev_timer->base = base; | |
2075 | tm->callback = cb; | |
2076 | tm->cb_arg = cb_arg; | |
2077 | event_set(&tm->ev_timer->ev, -1, EV_TIMEOUT, | |
2078 | comm_timer_callback, tm); | |
2079 | if(event_base_set(base->eb->base, &tm->ev_timer->ev) != 0) { | |
2080 | log_err("timer_create: event_base_set failed."); | |
2081 | free(tm->ev_timer); | |
2082 | free(tm); | |
2083 | return NULL; | |
2084 | } | |
2085 | return tm; | |
2086 | } | |
2087 | ||
2088 | void | |
2089 | comm_timer_disable(struct comm_timer* timer) | |
2090 | { | |
2091 | if(!timer) | |
2092 | return; | |
2093 | evtimer_del(&timer->ev_timer->ev); | |
2094 | timer->ev_timer->enabled = 0; | |
2095 | } | |
2096 | ||
2097 | void | |
2098 | comm_timer_set(struct comm_timer* timer, struct timeval* tv) | |
2099 | { | |
2100 | log_assert(tv); | |
2101 | if(timer->ev_timer->enabled) | |
2102 | comm_timer_disable(timer); | |
2103 | event_set(&timer->ev_timer->ev, -1, EV_TIMEOUT, | |
2104 | comm_timer_callback, timer); | |
2105 | if(event_base_set(timer->ev_timer->base->eb->base, | |
2106 | &timer->ev_timer->ev) != 0) | |
2107 | log_err("comm_timer_set: set_base failed."); | |
2108 | if(evtimer_add(&timer->ev_timer->ev, tv) != 0) | |
2109 | log_err("comm_timer_set: evtimer_add failed."); | |
2110 | timer->ev_timer->enabled = 1; | |
2111 | } | |
2112 | ||
2113 | void | |
2114 | comm_timer_delete(struct comm_timer* timer) | |
2115 | { | |
2116 | if(!timer) | |
2117 | return; | |
2118 | comm_timer_disable(timer); | |
2119 | free(timer->ev_timer); | |
2120 | free(timer); | |
2121 | } | |
2122 | ||
2123 | void | |
2124 | comm_timer_callback(int ATTR_UNUSED(fd), short event, void* arg) | |
2125 | { | |
2126 | struct comm_timer* tm = (struct comm_timer*)arg; | |
2127 | if(!(event&EV_TIMEOUT)) | |
2128 | return; | |
2129 | comm_base_now(tm->ev_timer->base); | |
2130 | tm->ev_timer->enabled = 0; | |
2131 | fptr_ok(fptr_whitelist_comm_timer(tm->callback)); | |
2132 | (*tm->callback)(tm->cb_arg); | |
2133 | } | |
2134 | ||
2135 | int | |
2136 | comm_timer_is_set(struct comm_timer* timer) | |
2137 | { | |
2138 | return (int)timer->ev_timer->enabled; | |
2139 | } | |
2140 | ||
2141 | size_t | |
2142 | comm_timer_get_mem(struct comm_timer* timer) | |
2143 | { | |
2144 | return sizeof(*timer) + sizeof(struct internal_timer); | |
2145 | } | |
2146 | ||
2147 | struct comm_signal* | |
2148 | comm_signal_create(struct comm_base* base, | |
2149 | void (*callback)(int, void*), void* cb_arg) | |
2150 | { | |
2151 | struct comm_signal* com = (struct comm_signal*)malloc( | |
2152 | sizeof(struct comm_signal)); | |
2153 | if(!com) { | |
2154 | log_err("malloc failed"); | |
2155 | return NULL; | |
2156 | } | |
2157 | com->base = base; | |
2158 | com->callback = callback; | |
2159 | com->cb_arg = cb_arg; | |
2160 | com->ev_signal = NULL; | |
2161 | return com; | |
2162 | } | |
2163 | ||
2164 | void | |
2165 | comm_signal_callback(int sig, short event, void* arg) | |
2166 | { | |
2167 | struct comm_signal* comsig = (struct comm_signal*)arg; | |
2168 | if(!(event & EV_SIGNAL)) | |
2169 | return; | |
2170 | comm_base_now(comsig->base); | |
2171 | fptr_ok(fptr_whitelist_comm_signal(comsig->callback)); | |
2172 | (*comsig->callback)(sig, comsig->cb_arg); | |
2173 | } | |
2174 | ||
2175 | int | |
2176 | comm_signal_bind(struct comm_signal* comsig, int sig) | |
2177 | { | |
2178 | struct internal_signal* entry = (struct internal_signal*)calloc(1, | |
2179 | sizeof(struct internal_signal)); | |
2180 | if(!entry) { | |
2181 | log_err("malloc failed"); | |
2182 | return 0; | |
2183 | } | |
2184 | log_assert(comsig); | |
2185 | /* add signal event */ | |
2186 | signal_set(&entry->ev, sig, comm_signal_callback, comsig); | |
2187 | if(event_base_set(comsig->base->eb->base, &entry->ev) != 0) { | |
2188 | log_err("Could not set signal base"); | |
2189 | free(entry); | |
2190 | return 0; | |
2191 | } | |
2192 | if(signal_add(&entry->ev, NULL) != 0) { | |
2193 | log_err("Could not add signal handler"); | |
2194 | free(entry); | |
2195 | return 0; | |
2196 | } | |
2197 | /* link into list */ | |
2198 | entry->next = comsig->ev_signal; | |
2199 | comsig->ev_signal = entry; | |
2200 | return 1; | |
2201 | } | |
2202 | ||
2203 | void | |
2204 | comm_signal_delete(struct comm_signal* comsig) | |
2205 | { | |
2206 | struct internal_signal* p, *np; | |
2207 | if(!comsig) | |
2208 | return; | |
2209 | p=comsig->ev_signal; | |
2210 | while(p) { | |
2211 | np = p->next; | |
2212 | signal_del(&p->ev); | |
2213 | free(p); | |
2214 | p = np; | |
2215 | } | |
2216 | free(comsig); | |
2217 | } |