NetconEthernetTap.cpp 44 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2015 ZeroTier, Inc.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * ZeroTier may be used and distributed under the terms of the GPLv3, which
  21. * are available at: http://www.gnu.org/licenses/gpl-3.0.html
  22. *
  23. * If you would like to embed ZeroTier into a commercial application or
  24. * redistribute it in a modified binary form, please contact ZeroTier Networks
  25. * LLC. Start here: http://www.zerotier.com/
  26. */
  27. #include <algorithm>
  28. #include <utility>
  29. #include <dlfcn.h>
  30. #include <sys/poll.h>
  31. #include <stdint.h>
  32. #include <utility>
  33. #include <string>
  34. #include <sys/resource.h>
  35. #include "NetconEthernetTap.hpp"
  36. #include "../node/Utils.hpp"
  37. #include "../osdep/OSUtils.hpp"
  38. #include "../osdep/Phy.hpp"
  39. #include "Intercept.h"
  40. #include "LWIPStack.hpp"
  41. #include "lwip/tcp_impl.h"
  42. #include "netif/etharp.h"
  43. #include "lwip/api.h"
  44. #include "lwip/ip.h"
  45. #include "lwip/ip_addr.h"
  46. #include "lwip/ip_frag.h"
  47. #include "lwip/tcp.h"
  48. #include "common.inc.c"
  49. #include "RPC.h"
  50. #define APPLICATION_POLL_FREQ 20
  51. #define ZT_LWIP_TCP_TIMER_INTERVAL 5
  52. #define STATUS_TMR_INTERVAL 60000 // How often we check connection statuses (in ms)
  53. #define DEFAULT_READ_BUFFER_SIZE 1024 * 1024 * 5
  54. namespace ZeroTier {
  55. // ---------------------------------------------------------------------------
  56. static err_t tapif_init(struct netif *netif)
  57. {
  58. // Actual init functionality is in addIp() of tap
  59. return ERR_OK;
  60. }
  61. static err_t low_level_output(struct netif *netif, struct pbuf *p)
  62. {
  63. struct pbuf *q;
  64. char buf[ZT_MAX_MTU+32];
  65. char *bufptr;
  66. int tot_len = 0;
  67. ZeroTier::NetconEthernetTap *tap = (ZeroTier::NetconEthernetTap*)netif->state;
  68. /* initiate transfer(); */
  69. bufptr = buf;
  70. for(q = p; q != NULL; q = q->next) {
  71. /* Send the data from the pbuf to the interface, one pbuf at a
  72. time. The size of the data in each pbuf is kept in the ->len
  73. variable. */
  74. /* send data from(q->payload, q->len); */
  75. memcpy(bufptr, q->payload, q->len);
  76. bufptr += q->len;
  77. tot_len += q->len;
  78. }
  79. // [Send packet to network]
  80. // Split ethernet header and feed into handler
  81. struct eth_hdr *ethhdr;
  82. ethhdr = (struct eth_hdr *)buf;
  83. ZeroTier::MAC src_mac;
  84. ZeroTier::MAC dest_mac;
  85. src_mac.setTo(ethhdr->src.addr, 6);
  86. dest_mac.setTo(ethhdr->dest.addr, 6);
  87. tap->_handler(tap->_arg,tap->_nwid,src_mac,dest_mac,
  88. Utils::ntoh((uint16_t)ethhdr->type),0,buf + sizeof(struct eth_hdr),tot_len - sizeof(struct eth_hdr));
  89. return ERR_OK;
  90. }
  91. /*
  92. * TCP connection administered by service
  93. */
  94. class TcpConnection
  95. {
  96. public:
  97. uint64_t accept_token;
  98. bool pending, listening;
  99. int pid, idx;
  100. unsigned long written, acked;
  101. PhySocket *rpcsock;
  102. PhySocket *sock;
  103. struct tcp_pcb *pcb;
  104. struct sockaddr_storage *addr;
  105. unsigned char buf[DEFAULT_READ_BUFFER_SIZE];
  106. };
  107. /*
  108. * A helper class for passing a reference to _phy to LWIP callbacks as a "state"
  109. */
  110. class Larg
  111. {
  112. public:
  113. NetconEthernetTap *tap;
  114. TcpConnection *conn;
  115. Larg(NetconEthernetTap *_tap, TcpConnection *conn) : tap(_tap), conn(conn) {}
  116. };
  117. // ---------------------------------------------------------------------------
  118. NetconEthernetTap::NetconEthernetTap(
  119. const char *homePath,
  120. const MAC &mac,
  121. unsigned int mtu,
  122. unsigned int metric,
  123. uint64_t nwid,
  124. const char *friendlyName,
  125. void (*handler)(void *,uint64_t,const MAC &,const MAC &,unsigned int,unsigned int,const void *,unsigned int),
  126. void *arg) :
  127. _nwid(nwid),
  128. _handler(handler),
  129. _arg(arg),
  130. _phy(this,false,true),
  131. _unixListenSocket((PhySocket *)0),
  132. _mac(mac),
  133. _homePath(homePath),
  134. _mtu(mtu),
  135. _enabled(true),
  136. _run(true)
  137. {
  138. char sockPath[4096],lwipPath[4096];
  139. rpc_counter = -1;
  140. Utils::snprintf(sockPath,sizeof(sockPath),"%s%snc_%.16llx",homePath,ZT_PATH_SEPARATOR_S,_nwid,ZT_PATH_SEPARATOR_S,(unsigned long long)nwid);
  141. _dev = sockPath; // in netcon mode, set device to be just the network ID
  142. Utils::snprintf(lwipPath,sizeof(lwipPath),"%s%sliblwip.so",homePath,ZT_PATH_SEPARATOR_S);
  143. lwipstack = new LWIPStack(lwipPath);
  144. if(!lwipstack)
  145. throw std::runtime_error("unable to dynamically load a new instance of liblwip.so (searched ZeroTier home path)");
  146. lwipstack->lwip_init();
  147. _unixListenSocket = _phy.unixListen(sockPath,(void *)this);
  148. dwr(MSG_INFO," NetconEthernetTap initialized!\n", _phy.getDescriptor(_unixListenSocket));
  149. if (!_unixListenSocket)
  150. throw std::runtime_error(std::string("unable to bind to ")+sockPath);
  151. _thread = Thread::start(this);
  152. }
  153. NetconEthernetTap::~NetconEthernetTap()
  154. {
  155. _run = false;
  156. _phy.whack();
  157. _phy.whack();
  158. Thread::join(_thread);
  159. _phy.close(_unixListenSocket,false);
  160. delete lwipstack;
  161. }
  162. void NetconEthernetTap::setEnabled(bool en)
  163. {
  164. _enabled = en;
  165. }
  166. bool NetconEthernetTap::enabled() const
  167. {
  168. return _enabled;
  169. }
  170. bool NetconEthernetTap::addIp(const InetAddress &ip)
  171. {
  172. Mutex::Lock _l(_ips_m);
  173. if (std::find(_ips.begin(),_ips.end(),ip) == _ips.end()) {
  174. _ips.push_back(ip);
  175. std::sort(_ips.begin(),_ips.end());
  176. if (ip.isV4()) {
  177. // Set IP
  178. static ip_addr_t ipaddr, netmask, gw;
  179. IP4_ADDR(&gw,192,168,0,1);
  180. ipaddr.addr = *((u32_t *)ip.rawIpData());
  181. netmask.addr = *((u32_t *)ip.netmask().rawIpData());
  182. // Set up the lwip-netif for LWIP's sake
  183. lwipstack->netif_add(&interface,&ipaddr, &netmask, &gw, NULL, tapif_init, lwipstack->_ethernet_input);
  184. interface.state = this;
  185. interface.output = lwipstack->_etharp_output;
  186. _mac.copyTo(interface.hwaddr, 6);
  187. interface.mtu = _mtu;
  188. interface.name[0] = 't';
  189. interface.name[1] = 'p';
  190. interface.linkoutput = low_level_output;
  191. interface.hwaddr_len = 6;
  192. interface.flags = NETIF_FLAG_BROADCAST | NETIF_FLAG_ETHARP | NETIF_FLAG_IGMP;
  193. lwipstack->netif_set_default(&interface);
  194. lwipstack->netif_set_up(&interface);
  195. }
  196. }
  197. return true;
  198. }
  199. bool NetconEthernetTap::removeIp(const InetAddress &ip)
  200. {
  201. Mutex::Lock _l(_ips_m);
  202. std::vector<InetAddress>::iterator i(std::find(_ips.begin(),_ips.end(),ip));
  203. if (i == _ips.end())
  204. return false;
  205. _ips.erase(i);
  206. if (ip.isV4()) {
  207. // TODO: dealloc from LWIP
  208. }
  209. return true;
  210. }
  211. std::vector<InetAddress> NetconEthernetTap::ips() const
  212. {
  213. Mutex::Lock _l(_ips_m);
  214. return _ips;
  215. }
  216. void NetconEthernetTap::put(const MAC &from,const MAC &to,unsigned int etherType,const void *data,unsigned int len)
  217. {
  218. struct pbuf *p,*q;
  219. if (!_enabled)
  220. return;
  221. struct eth_hdr ethhdr;
  222. from.copyTo(ethhdr.src.addr, 6);
  223. to.copyTo(ethhdr.dest.addr, 6);
  224. ethhdr.type = Utils::hton((uint16_t)etherType);
  225. // We allocate a pbuf chain of pbufs from the pool.
  226. p = lwipstack->pbuf_alloc(PBUF_RAW, len+sizeof(struct eth_hdr), PBUF_POOL);
  227. if (p != NULL) {
  228. const char *dataptr = reinterpret_cast<const char *>(data);
  229. // First pbuf gets ethernet header at start
  230. q = p;
  231. if (q->len < sizeof(ethhdr)) {
  232. dwr(MSG_ERROR,"_put(): Dropped packet: first pbuf smaller than ethernet header\n");
  233. return;
  234. }
  235. memcpy(q->payload,&ethhdr,sizeof(ethhdr));
  236. memcpy((char*)q->payload + sizeof(ethhdr),dataptr,q->len - sizeof(ethhdr));
  237. dataptr += q->len - sizeof(ethhdr);
  238. // Remaining pbufs (if any) get rest of data
  239. while ((q = q->next)) {
  240. memcpy(q->payload,dataptr,q->len);
  241. dataptr += q->len;
  242. }
  243. } else {
  244. dwr(MSG_ERROR,"put(): Dropped packet: no pbufs available\n");
  245. return;
  246. }
  247. {
  248. Mutex::Lock _l2(lwipstack->_lock);
  249. if(interface.input(p, &interface) != ERR_OK) {
  250. dwr(MSG_ERROR,"put(): Error while RXing packet (netif->input)\n");
  251. }
  252. }
  253. }
  254. std::string NetconEthernetTap::deviceName() const
  255. {
  256. return _dev;
  257. }
  258. void NetconEthernetTap::setFriendlyName(const char *friendlyName) {
  259. }
  260. void NetconEthernetTap::scanMulticastGroups(std::vector<MulticastGroup> &added,std::vector<MulticastGroup> &removed)
  261. {
  262. std::vector<MulticastGroup> newGroups;
  263. Mutex::Lock _l(_multicastGroups_m);
  264. // TODO: get multicast subscriptions from LWIP
  265. std::vector<InetAddress> allIps(ips());
  266. for(std::vector<InetAddress>::iterator ip(allIps.begin());ip!=allIps.end();++ip)
  267. newGroups.push_back(MulticastGroup::deriveMulticastGroupForAddressResolution(*ip));
  268. std::sort(newGroups.begin(),newGroups.end());
  269. std::unique(newGroups.begin(),newGroups.end());
  270. for(std::vector<MulticastGroup>::iterator m(newGroups.begin());m!=newGroups.end();++m) {
  271. if (!std::binary_search(_multicastGroups.begin(),_multicastGroups.end(),*m))
  272. added.push_back(*m);
  273. }
  274. for(std::vector<MulticastGroup>::iterator m(_multicastGroups.begin());m!=_multicastGroups.end();++m) {
  275. if (!std::binary_search(newGroups.begin(),newGroups.end(),*m))
  276. removed.push_back(*m);
  277. }
  278. _multicastGroups.swap(newGroups);
  279. }
  280. TcpConnection *NetconEthernetTap::getConnection(PhySocket *sock)
  281. {
  282. for(size_t i=0; i<tcp_connections.size(); i++) {
  283. if(tcp_connections[i]->sock == sock)
  284. return tcp_connections[i];
  285. }
  286. return NULL;
  287. }
  288. void NetconEthernetTap::threadMain()
  289. throw()
  290. {
  291. uint64_t prev_tcp_time = 0;
  292. uint64_t prev_status_time = 0;
  293. uint64_t prev_etharp_time = 0;
  294. // Main timer loop
  295. while (_run) {
  296. uint64_t now = OSUtils::now();
  297. uint64_t since_tcp = now - prev_tcp_time;
  298. uint64_t since_etharp = now - prev_etharp_time;
  299. uint64_t since_status = now - prev_status_time;
  300. uint64_t tcp_remaining = ZT_LWIP_TCP_TIMER_INTERVAL;
  301. uint64_t etharp_remaining = ARP_TMR_INTERVAL;
  302. uint64_t status_remaining = STATUS_TMR_INTERVAL;
  303. // Connection prunning
  304. if (since_status >= STATUS_TMR_INTERVAL) {
  305. prev_status_time = now;
  306. status_remaining = STATUS_TMR_INTERVAL - since_status;
  307. dwr(MSG_DEBUG," tap_thread(): tcp\\jobs = {%d, %d}\n", tcp_connections.size(), jobmap.size());
  308. for(size_t i=0; i<tcp_connections.size(); i++) {
  309. // No TCP connections are associated, this is a candidate for removal
  310. if(!tcp_connections[i]->sock)
  311. continue; // Skip, this is a pending connection
  312. int fd = _phy.getDescriptor(tcp_connections[i]->sock);
  313. fcntl(fd, F_SETFL, O_NONBLOCK);
  314. unsigned char tmpbuf[BUF_SZ];
  315. int n;
  316. if((n = read(fd,&tmpbuf,BUF_SZ)) < 0 && errno != EAGAIN) {
  317. dwr(MSG_DEBUG," tap_thread(): closing sock (%x)\n", tcp_connections[i]->sock);
  318. closeConnection(tcp_connections[i]->sock);
  319. }
  320. // < 0 is failure
  321. // 0 nothing to read, RPC still active
  322. // > 0 RPC data read, handle it
  323. else if (n > 0) {
  324. dwr(MSG_DEBUG," tap_thread(): data read during connection check (%d bytes)\n", n);
  325. phyOnUnixData(tcp_connections[i]->sock,_phy.getuptr(tcp_connections[i]->sock),&tmpbuf,BUF_SZ);
  326. }
  327. }
  328. }
  329. // Main TCP/ETHARP timer section
  330. if (since_tcp >= ZT_LWIP_TCP_TIMER_INTERVAL) {
  331. prev_tcp_time = now;
  332. lwipstack->tcp_tmr();
  333. // Makeshift poll
  334. for(size_t i=0; i<tcp_connections.size(); i++) {
  335. if(tcp_connections[i]->idx > 0){
  336. lwipstack->_lock.lock();
  337. handle_write(tcp_connections[i]);
  338. lwipstack->_lock.unlock();
  339. }
  340. }
  341. } else {
  342. tcp_remaining = ZT_LWIP_TCP_TIMER_INTERVAL - since_tcp;
  343. }
  344. if (since_etharp >= ARP_TMR_INTERVAL) {
  345. prev_etharp_time = now;
  346. lwipstack->etharp_tmr();
  347. } else {
  348. etharp_remaining = ARP_TMR_INTERVAL - since_etharp;
  349. }
  350. _phy.poll((unsigned long)std::min(tcp_remaining,etharp_remaining));
  351. }
  352. dlclose(lwipstack->_libref);
  353. }
  354. // Unused -- no UDP or TCP from this thread/Phy<>
  355. void NetconEthernetTap::phyOnDatagram(PhySocket *sock,void **uptr,const struct sockaddr *from,void *data,unsigned long len) {}
  356. void NetconEthernetTap::phyOnTcpConnect(PhySocket *sock,void **uptr,bool success) {}
  357. void NetconEthernetTap::phyOnTcpAccept(PhySocket *sockL,PhySocket *sockN,void **uptrL,void **uptrN,const struct sockaddr *from) {}
  358. void NetconEthernetTap::phyOnTcpClose(PhySocket *sock,void **uptr) {}
  359. void NetconEthernetTap::phyOnTcpData(PhySocket *sock,void **uptr,void *data,unsigned long len) {}
  360. void NetconEthernetTap::phyOnTcpWritable(PhySocket *sock,void **uptr) {}
  361. /*
  362. * Closes a TcpConnection and associated LWIP PCB strcuture.
  363. */
  364. void NetconEthernetTap::closeConnection(PhySocket *sock)
  365. {
  366. dwr(MSG_DEBUG,"closeConnection(%x)",sock);
  367. TcpConnection *conn = getConnection(sock);
  368. if(conn) {
  369. if(!conn->pcb)
  370. return;
  371. // TODO: Removed to address double-free segfault when killing a python simple server
  372. // tell LWIP to close the associated PCB
  373. //if(conn->pcb->state != CLOSED && lwipstack->_tcp_close(conn->pcb) != ERR_OK) {
  374. // dwr(MSG_ERROR," closeConnection(): Error while calling tcp_close()\n");
  375. //}
  376. // remove from connection list
  377. for(size_t i=0; i<tcp_connections.size(); i++) {
  378. if(tcp_connections[i]->sock == sock){
  379. tcp_connections.erase(tcp_connections.begin() + i);
  380. //delete conn;
  381. break;
  382. }
  383. }
  384. }
  385. if(!sock)
  386. return;
  387. close(_phy.getDescriptor(sock)); // close underlying fd
  388. _phy.close(sock, false); // close PhySocket
  389. }
  390. void NetconEthernetTap::phyOnUnixClose(PhySocket *sock,void **uptr) {
  391. dwr(MSG_DEBUG,"\nphyOnUnixClose(): close connection = %x\n", sock);
  392. closeConnection(sock);
  393. }
  394. /*
  395. * Handles data on a client's data buffer. Data is sent to LWIP to be enqueued.
  396. */
  397. void NetconEthernetTap::phyOnFileDescriptorActivity(PhySocket *sock,void **uptr,bool readable,bool writable) {
  398. dwr(MSG_DEBUG,"\nphyOnFileDescriptorActivity(): new connection = %x\n", sock);
  399. }
  400. /*
  401. * Add a new PhySocket for the client connections
  402. */
  403. void NetconEthernetTap::phyOnUnixAccept(PhySocket *sockL,PhySocket *sockN,void **uptrL,void **uptrN) {
  404. dwr(MSG_DEBUG,"\nphyOnUnixAccept(): new connection = %x\n", sockN);
  405. }
  406. /* Unpacks the buffer from an RPC command */
  407. void NetconEthernetTap::unload_rpc(void *data, pid_t &pid, pid_t &tid,
  408. int &rpc_count, char (timestamp[20]), char (CANARY[sizeof(uint64_t)]), char &cmd, void* &payload)
  409. {
  410. unsigned char *buf = (unsigned char*)data;
  411. memcpy(&pid, &buf[IDX_PID], sizeof(pid_t));
  412. memcpy(&tid, &buf[IDX_TID], sizeof(pid_t));
  413. memcpy(&rpc_count, &buf[IDX_COUNT], sizeof(int));
  414. memcpy(timestamp, &buf[IDX_TIME], 20);
  415. memcpy(&cmd, &buf[IDX_PAYLOAD], sizeof(char));
  416. memcpy(CANARY, &buf[IDX_PAYLOAD+1], CANARY_SIZE);
  417. }
  418. /*
  419. * Processes incoming data on a client-specific RPC connection
  420. */
  421. void NetconEthernetTap::phyOnUnixData(PhySocket *sock,void **uptr,void *data,unsigned long len)
  422. {
  423. uint64_t CANARY_num;
  424. pid_t pid, tid;
  425. int rpc_count;
  426. char cmd, timestamp[20], CANARY[CANARY_SIZE];
  427. void *payload;
  428. unsigned char *buf = (unsigned char*)data;
  429. std::pair<PhySocket*, void*> sockdata;
  430. PhySocket *rpcsock;
  431. bool found_job = false, detected_rpc = false;
  432. TcpConnection *conn;
  433. int wlen = len;
  434. // RPC
  435. char phrase[RPC_PHRASE_SIZE];
  436. memset(phrase, 0, RPC_PHRASE_SIZE);
  437. if(len == BUF_SZ) {
  438. memcpy(phrase, buf, RPC_PHRASE_SIZE);
  439. if(strcmp(phrase, RPC_PHRASE) == 0)
  440. detected_rpc = true;
  441. }
  442. if(detected_rpc) {
  443. unload_rpc(data, pid, tid, rpc_count, timestamp, CANARY, cmd, payload);
  444. memcpy(&CANARY_num, CANARY, CANARY_SIZE);
  445. dwr(MSG_DEBUG," <%x> RPC: (pid=%d, tid=%d, rpc_count=%d, timestamp=%s, cmd=%d)\n", sock, pid, tid, rpc_count, timestamp, cmd);
  446. if(cmd == RPC_SOCKET) {
  447. dwr(MSG_DEBUG," <%x> RPC_SOCKET\n", sock);
  448. // Create new lwip socket and associate it with this sock
  449. struct socket_st socket_rpc;
  450. memcpy(&socket_rpc, &buf[IDX_PAYLOAD+STRUCT_IDX], sizeof(struct socket_st));
  451. TcpConnection * new_conn;
  452. if((new_conn = handle_socket(sock, uptr, &socket_rpc))) {
  453. pidmap[sock] = pid;
  454. new_conn->pid = pid;
  455. }
  456. }
  457. else { // All RPCs other than RPC_SOCKET
  458. jobmap[CANARY_num] = std::make_pair<PhySocket*, void*>(sock, data);
  459. }
  460. write(_phy.getDescriptor(sock), "z", 1); // RPC ACK byte to maintain RPC->Stream order
  461. }
  462. // STREAM
  463. else {
  464. int data_start = -1, data_end = -1, token_pos = -1, padding_pos = -1;
  465. char padding[] = {0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89};
  466. dwr(MSG_DEBUG," <%x> stream data, len = %d\n", sock, len);
  467. // Look for padding
  468. std::string padding_pattern(padding, padding+CANARY_PADDING_SIZE);
  469. std::string buffer(buf, buf + len);
  470. padding_pos = buffer.find(padding_pattern);
  471. token_pos = padding_pos-CANARY_SIZE;
  472. dwr(MSG_DEBUG, " <%x> padding_pos = %d\n", sock, padding_pos);
  473. // Grab token, next we'll use it to look up an RPC job
  474. if(token_pos > -1) {
  475. memcpy(&CANARY_num, buf+token_pos, CANARY_SIZE);
  476. if(CANARY_num != 0) { // TODO: Added to address CANARY_num==0 bug, last seeen 20160108
  477. // Find job
  478. sockdata = jobmap[CANARY_num];
  479. if(!sockdata.first) { // Stream before RPC
  480. dwr(MSG_DEBUG," <%x> unable to locate job entry for %llu\n", sock, CANARY_num);
  481. return;
  482. }
  483. else
  484. found_job = true;
  485. }
  486. }
  487. conn = getConnection(sock);
  488. if(!conn)
  489. return;
  490. if(padding_pos == -1) { // [DATA]
  491. memcpy(&conn->buf[conn->idx], buf, wlen);
  492. }
  493. else { // Padding found, implies a token is present
  494. // [TOKEN]
  495. if(len == TOKEN_SIZE && token_pos == 0) {
  496. wlen = 0; // Nothing to write
  497. }
  498. else {
  499. // [TOKEN] + [DATA]
  500. if(len > TOKEN_SIZE && token_pos == 0) {
  501. wlen = len - TOKEN_SIZE;
  502. data_start = padding_pos+CANARY_PADDING_SIZE;
  503. memcpy((&conn->buf)+conn->idx, buf+data_start, wlen);
  504. }
  505. // [DATA] + [TOKEN]
  506. if(len > TOKEN_SIZE && token_pos > 0 && token_pos == len - TOKEN_SIZE) {
  507. wlen = len - TOKEN_SIZE;
  508. data_start = 0;
  509. memcpy((&conn->buf)+conn->idx, buf+data_start, wlen);
  510. }
  511. // [DATA] + [TOKEN] + [DATA]
  512. if(len > TOKEN_SIZE && token_pos > 0 && len > (token_pos + TOKEN_SIZE)) {
  513. wlen = len - TOKEN_SIZE;
  514. data_start = 0;
  515. data_end = padding_pos-CANARY_SIZE;
  516. memcpy((&conn->buf)+conn->idx, buf+data_start, (data_end-data_start)+1);
  517. memcpy((&conn->buf)+conn->idx, buf+(padding_pos+CANARY_PADDING_SIZE), len-(token_pos+TOKEN_SIZE));
  518. }
  519. }
  520. }
  521. // Write data from stream
  522. if(conn->idx > (DEFAULT_READ_BUFFER_SIZE / 2)) {
  523. _phy.setNotifyReadable(sock, false);
  524. }
  525. lwipstack->_lock.lock();
  526. conn->idx += wlen;
  527. handle_write(conn);
  528. lwipstack->_lock.unlock();
  529. }
  530. if(found_job) {
  531. rpcsock = sockdata.first;
  532. buf = (unsigned char*)sockdata.second;
  533. }
  534. // Process RPC if we have a corresponding jobmap entry
  535. if(found_job) {
  536. conn = getConnection(sock);
  537. unload_rpc(buf, pid, tid, rpc_count, timestamp, CANARY, cmd, payload);
  538. switch(cmd) {
  539. case RPC_BIND:
  540. dwr(MSG_DEBUG," <%x> RPC_BIND\n", sock);
  541. struct bind_st bind_rpc;
  542. memcpy(&bind_rpc, &buf[IDX_PAYLOAD+STRUCT_IDX], sizeof(struct bind_st));
  543. handle_bind(sock, rpcsock, uptr, &bind_rpc);
  544. break;
  545. case RPC_LISTEN:
  546. dwr(MSG_DEBUG," <%x> RPC_LISTEN\n", sock);
  547. struct listen_st listen_rpc;
  548. memcpy(&listen_rpc, &buf[IDX_PAYLOAD+STRUCT_IDX], sizeof(struct listen_st));
  549. handle_listen(sock, rpcsock, uptr, &listen_rpc);
  550. break;
  551. case RPC_GETSOCKNAME:
  552. dwr(MSG_DEBUG," <%x> RPC_GETSOCKNAME\n", sock);
  553. struct getsockname_st getsockname_rpc;
  554. memcpy(&getsockname_rpc, &buf[IDX_PAYLOAD+STRUCT_IDX], sizeof(struct getsockname_st));
  555. handle_getsockname(sock, rpcsock, uptr, &getsockname_rpc);
  556. break;
  557. case RPC_CONNECT:
  558. dwr(MSG_DEBUG," <%x> RPC_CONNECT\n", sock);
  559. struct connect_st connect_rpc;
  560. memcpy(&connect_rpc, &buf[IDX_PAYLOAD+STRUCT_IDX], sizeof(struct connect_st));
  561. handle_connect(sock, rpcsock, conn, &connect_rpc);
  562. return; // Keep open RPC, we'll use it once in nc_connected to send retval
  563. default:
  564. break;
  565. }
  566. closeConnection(sockdata.first); // close RPC after sending retval, no longer needed
  567. jobmap.erase(CANARY_num);
  568. return;
  569. }
  570. }
  571. int NetconEthernetTap::send_return_value(PhySocket *sock, int retval, int _errno = 0){
  572. return send_return_value(_phy.getDescriptor(sock), retval, _errno);
  573. }
  574. int NetconEthernetTap::send_return_value(int fd, int retval, int _errno = 0)
  575. {
  576. dwr(MSG_DEBUG," send_return_value(): fd = %d, retval = %d, errno = %d\n", fd, retval, _errno);
  577. int sz = sizeof(char) + sizeof(retval) + sizeof(errno);
  578. char retmsg[sz];
  579. memset(&retmsg, 0, sizeof(retmsg));
  580. retmsg[0]=RPC_RETVAL;
  581. memcpy(&retmsg[1], &retval, sizeof(retval));
  582. memcpy(&retmsg[1]+sizeof(retval), &_errno, sizeof(_errno));
  583. return write(fd, &retmsg, sz);
  584. }
  585. /*------------------------------------------------------------------------------
  586. --------------------------------- LWIP callbacks -------------------------------
  587. ------------------------------------------------------------------------------*/
  588. // NOTE: these are called from within LWIP, meaning that lwipstack->_lock is ALREADY
  589. // locked in this case!
  590. /*
  591. * Callback from LWIP for when a connection has been accepted and the PCB has been
  592. * put into an ACCEPT state.
  593. *
  594. * A socketpair is created, one end is kept and wrapped into a PhySocket object
  595. * for use in the main ZT I/O loop, and one end is sent to the client. The client
  596. * is then required to tell the service what new file descriptor it has allocated
  597. * for this connection. After the mapping is complete, the accepted socket can be
  598. * used.
  599. *
  600. * @param associated service state object
  601. * @param newly allocated PCB
  602. * @param error code
  603. * @return ERR_OK if everything is ok, -1 otherwise
  604. i := should be implemented in intercept lib
  605. I := is implemented in intercept lib
  606. X := is implemented in service
  607. ? := required treatment Unknown
  608. - := Not needed
  609. [ ] EAGAIN or EWOULDBLOCK - The socket is marked nonblocking and no connections are present
  610. to be accepted. POSIX.1-2001 allows either error to be returned for
  611. this case, and does not require these constants to have the same value,
  612. so a portable application should check for both possibilities.
  613. [I] EBADF - The descriptor is invalid.
  614. [I] ECONNABORTED - A connection has been aborted.
  615. [i] EFAULT - The addr argument is not in a writable part of the user address space.
  616. [-] EINTR - The system call was interrupted by a signal that was caught before a valid connection arrived; see signal(7).
  617. [I] EINVAL - Socket is not listening for connections, or addrlen is invalid (e.g., is negative).
  618. [I] EINVAL - (accept4()) invalid value in flags.
  619. [I] EMFILE - The per-process limit of open file descriptors has been reached.
  620. [ ] ENFILE - The system limit on the total number of open files has been reached.
  621. [ ] ENOBUFS, ENOMEM - Not enough free memory. This often means that the memory allocation is
  622. limited by the socket buffer limits, not by the system memory.
  623. [I] ENOTSOCK - The descriptor references a file, not a socket.
  624. [I] EOPNOTSUPP - The referenced socket is not of type SOCK_STREAM.
  625. [ ] EPROTO - Protocol error.
  626. *
  627. */
  628. err_t NetconEthernetTap::nc_accept(void *arg, struct tcp_pcb *newpcb, err_t err)
  629. {
  630. dwr(MSG_DEBUG," nc_accept()\n");
  631. Larg *l = (Larg*)arg;
  632. TcpConnection *conn = l->conn;
  633. NetconEthernetTap *tap = l->tap;
  634. if(!conn->sock)
  635. return -1;
  636. int listening_fd = tap->_phy.getDescriptor(conn->sock);
  637. if(conn) {
  638. // create new socketpair
  639. ZT_PHY_SOCKFD_TYPE fds[2];
  640. if(socketpair(PF_LOCAL, SOCK_STREAM, 0, fds) < 0) {
  641. if(errno < 0) {
  642. l->tap->send_return_value(conn, -1, errno);
  643. dwr(MSG_ERROR," nc_accept(): unable to create socketpair\n");
  644. return ERR_MEM;
  645. }
  646. }
  647. // create and populate new TcpConnection
  648. TcpConnection *new_tcp_conn = new TcpConnection();
  649. tap->tcp_connections.push_back(new_tcp_conn);
  650. new_tcp_conn->pcb = newpcb;
  651. new_tcp_conn->sock = tap->_phy.wrapSocket(fds[0], new_tcp_conn);
  652. if(sock_fd_write(listening_fd, fds[1]) < 0)
  653. return -1;
  654. else {
  655. //close(fds[1]); // close other end of socketpair
  656. new_tcp_conn->pending = true;
  657. }
  658. tap->lwipstack->_tcp_arg(newpcb, new Larg(tap, new_tcp_conn));
  659. tap->lwipstack->_tcp_recv(newpcb, nc_recved);
  660. tap->lwipstack->_tcp_err(newpcb, nc_err);
  661. tap->lwipstack->_tcp_sent(newpcb, nc_sent);
  662. tap->lwipstack->_tcp_poll(newpcb, nc_poll, 1);
  663. if(conn->pcb->state == LISTEN) {
  664. dwr(MSG_DEBUG," nc_accept(): Can't call tcp_accept() on LISTEN socket (pcb = %x)\n", conn->pcb);
  665. return ERR_OK; // TODO: Verify this is correct
  666. }
  667. tcp_accepted(conn->pcb); // Let lwIP know that it can queue additional incoming connections
  668. return ERR_OK;
  669. }
  670. else
  671. dwr(MSG_ERROR," nc_accept(%d): can't locate Connection object for PCB.\n", listening_fd);
  672. return -1;
  673. }
  674. /*
  675. * Callback from LWIP for when data is available to be read from the network.
  676. *
  677. * Data is in the form of a linked list of struct pbufs, it is then recombined and
  678. * send to the client over the associated unix socket.
  679. *
  680. * @param associated service state object
  681. * @param allocated PCB
  682. * @param chain of pbufs
  683. * @param error code
  684. * @return ERR_OK if everything is ok, -1 otherwise
  685. *
  686. */
  687. err_t NetconEthernetTap::nc_recved(void *arg, struct tcp_pcb *tpcb, struct pbuf *p, err_t err)
  688. {
  689. dwr(MSG_DEBUG," nc_recved()\n");
  690. Larg *l = (Larg*)arg;
  691. int n;
  692. struct pbuf* q = p;
  693. if(!l->conn) {
  694. dwr(MSG_ERROR," nc_recved(): no connection\n");
  695. return ERR_OK;
  696. }
  697. if(p == NULL) {
  698. if(l->conn && !l->conn->listening) {
  699. dwr(MSG_INFO," nc_recved(): closing connection\n");
  700. //if(l->tap->lwipstack->_tcp_close(l->conn->pcb) != ERR_OK) {
  701. // dwr(MSG_ERROR," closeConnection(): Error while calling tcp_close()\n");
  702. //}
  703. l->tap->closeConnection(l->conn->sock);
  704. return ERR_ABRT;
  705. }
  706. else {
  707. dwr(MSG_ERROR," nc_recved(): invalid connection/state\n");
  708. }
  709. return err;
  710. }
  711. q = p;
  712. while(p != NULL) { // Cycle through pbufs and write them to the socket
  713. if(p->len <= 0)
  714. break;
  715. if((n = l->tap->_phy.streamSend(l->conn->sock,p->payload, p->len)) > 0) {
  716. if(n < p->len) {
  717. dwr(MSG_INFO," nc_recved(): unable to write entire pbuf to stream\n");
  718. }
  719. l->tap->lwipstack->_tcp_recved(tpcb, n);
  720. dwr(MSG_DEBUG," nc_recved(): wrote %d bytes to <%x>\n", n, l->conn->sock);
  721. }
  722. else
  723. dwr(MSG_INFO," nc_recved(): No data written to stream <%d>\n", l->conn->sock);
  724. p = p->next;
  725. }
  726. l->tap->lwipstack->_pbuf_free(q); // free pbufs
  727. return ERR_OK;
  728. }
  729. /*
  730. * Callback from LWIP when an internal error is associtated with the given (arg)
  731. *
  732. * Since the PCB related to this error might no longer exist, only its perviously
  733. * associated (arg) is provided to us.
  734. *
  735. * @param associated service state object
  736. * @param error code
  737. *
  738. */
  739. void NetconEthernetTap::nc_err(void *arg, err_t err)
  740. {
  741. dwr(MSG_DEBUG,"nc_err() = %d\n", err);
  742. Larg *l = (Larg*)arg;
  743. if(!l->conn)
  744. dwr(MSG_ERROR,"nc_err(): Connection is NULL!\n");
  745. switch(err)
  746. {
  747. case ERR_MEM:
  748. dwr(MSG_ERROR,"nc_err(): ERR_MEM->ENOMEM\n");
  749. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, ENOMEM);
  750. break;
  751. case ERR_BUF:
  752. dwr(MSG_ERROR,"nc_err(): ERR_BUF->ENOBUFS\n");
  753. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, ENOBUFS);
  754. break;
  755. case ERR_TIMEOUT:
  756. dwr(MSG_ERROR,"nc_err(): ERR_TIMEOUT->ETIMEDOUT\n");
  757. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, ETIMEDOUT);
  758. break;
  759. case ERR_RTE:
  760. dwr(MSG_ERROR,"nc_err(): ERR_RTE->ENETUNREACH\n");
  761. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, ENETUNREACH);
  762. break;
  763. case ERR_INPROGRESS:
  764. dwr(MSG_ERROR,"nc_err(): ERR_INPROGRESS->EINPROGRESS\n");
  765. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, EINPROGRESS);
  766. break;
  767. case ERR_VAL:
  768. dwr(MSG_ERROR,"nc_err(): ERR_VAL->EINVAL\n");
  769. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, EINVAL);
  770. break;
  771. case ERR_WOULDBLOCK:
  772. dwr(MSG_ERROR,"nc_err(): ERR_WOULDBLOCK->EWOULDBLOCK\n");
  773. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, EWOULDBLOCK);
  774. break;
  775. case ERR_USE:
  776. dwr(MSG_ERROR,"nc_err(): ERR_USE->EADDRINUSE\n");
  777. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, EADDRINUSE);
  778. break;
  779. case ERR_ISCONN:
  780. dwr(MSG_ERROR,"nc_err(): ERR_ISCONN->EISCONN\n");
  781. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, EISCONN);
  782. break;
  783. case ERR_ABRT:
  784. dwr(MSG_ERROR,"nc_err(): ERR_ABRT->ECONNREFUSED\n");
  785. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, ECONNREFUSED);
  786. break;
  787. // FIXME: Below are errors which don't have a standard errno correlate
  788. case ERR_RST:
  789. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, -1);
  790. break;
  791. case ERR_CLSD:
  792. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, -1);
  793. break;
  794. case ERR_CONN:
  795. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, -1);
  796. break;
  797. case ERR_ARG:
  798. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, -1);
  799. break;
  800. case ERR_IF:
  801. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->sock), -1, -1);
  802. break;
  803. default:
  804. break;
  805. }
  806. //dwr(MSG_ERROR,"nc_err(): closing connection\n");
  807. //l->tap->closeConnection(l->conn);
  808. }
  809. /*
  810. * Callback from LWIP to do whatever work we might need to do.
  811. *
  812. * @param associated service state object
  813. * @param PCB we're polling on
  814. * @return ERR_OK if everything is ok, -1 otherwise
  815. *
  816. */
  817. err_t NetconEthernetTap::nc_poll(void* arg, struct tcp_pcb *tpcb)
  818. {
  819. return ERR_OK;
  820. }
  821. /*
  822. * Callback from LWIP to signal that 'len' bytes have successfully been sent.
  823. * As a result, we should put our socket back into a notify-on-readability state
  824. * since there is now room on the PCB buffer to write to.
  825. *
  826. * NOTE: This could be used to track the amount of data sent by a connection.
  827. *
  828. * @param associated service state object
  829. * @param relevant PCB
  830. * @param length of data sent
  831. * @return ERR_OK if everything is ok, -1 otherwise
  832. *
  833. */
  834. err_t NetconEthernetTap::nc_sent(void* arg, struct tcp_pcb *tpcb, u16_t len)
  835. {
  836. Larg *l = (Larg*)arg;
  837. if(len) {
  838. if(l->conn->idx < DEFAULT_READ_BUFFER_SIZE / 2) {
  839. l->tap->_phy.setNotifyReadable(l->conn->sock, true);
  840. l->tap->_phy.whack();
  841. }
  842. }
  843. return ERR_OK;
  844. }
  845. /*
  846. * Callback from LWIP which sends a return value to the client to signal that
  847. * a connection was established for this PCB
  848. *
  849. * @param associated service state object
  850. * @param relevant PCB
  851. * @param error code
  852. * @return ERR_OK if everything is ok, -1 otherwise
  853. *
  854. */
  855. err_t NetconEthernetTap::nc_connected(void *arg, struct tcp_pcb *tpcb, err_t err)
  856. {
  857. dwr(MSG_DEBUG," nc_connected()\n");
  858. Larg *l = (Larg*)arg;
  859. l->tap->send_return_value(l->tap->_phy.getDescriptor(l->conn->rpcsock), ERR_OK);
  860. return ERR_OK;
  861. }
  862. /*------------------------------------------------------------------------------
  863. ----------------------------- RPC Handler functions ----------------------------
  864. ------------------------------------------------------------------------------*/
  865. /* Return the address that the socket is bound to */
  866. void NetconEthernetTap::handle_getsockname(PhySocket *sock, PhySocket *rpcsock, void **uptr, struct getsockname_st *getsockname_rpc)
  867. {
  868. TcpConnection *conn = getConnection(sock);
  869. // Assemble address "command" to send to intercept
  870. char retmsg[sizeof(struct sockaddr_storage)];
  871. memset(&retmsg, 0, sizeof(retmsg));
  872. if ((conn)&&(conn->addr))
  873. memcpy(&retmsg, conn->addr, sizeof(struct sockaddr_storage));
  874. write(_phy.getDescriptor(rpcsock), &retmsg, sizeof(struct sockaddr_storage));
  875. }
  876. /*
  877. * Handles an RPC to bind an LWIP PCB to a given address and port
  878. *
  879. * @param PhySocket associated with this RPC connection
  880. * @param structure containing the data and parameters for this client's RPC
  881. *
  882. i := should be implemented in intercept lib
  883. I := is implemented in intercept lib
  884. X := is implemented in service
  885. ? := required treatment Unknown
  886. - := Not needed
  887. [ ] EACCES - The address is protected, and the user is not the superuser.
  888. [X] EADDRINUSE - The given address is already in use.
  889. [I] EBADF - sockfd is not a valid descriptor.
  890. [X] EINVAL - The socket is already bound to an address.
  891. [I] ENOTSOCK - sockfd is a descriptor for a file, not a socket.
  892. [X] ENOMEM - Insufficient kernel memory was available.
  893. - The following errors are specific to UNIX domain (AF_UNIX) sockets:
  894. [-] EACCES - Search permission is denied on a component of the path prefix. (See also path_resolution(7).)
  895. [-] EADDRNOTAVAIL - A nonexistent interface was requested or the requested address was not local.
  896. [-] EFAULT - addr points outside the user's accessible address space.
  897. [-] EINVAL - The addrlen is wrong, or the socket was not in the AF_UNIX family.
  898. [-] ELOOP - Too many symbolic links were encountered in resolving addr.
  899. [-] ENAMETOOLONG - s addr is too long.
  900. [-] ENOENT - The file does not exist.
  901. [-] ENOTDIR - A component of the path prefix is not a directory.
  902. [-] EROFS - The socket inode would reside on a read-only file system.
  903. */
  904. void NetconEthernetTap::handle_bind(PhySocket *sock, PhySocket *rpcsock, void **uptr, struct bind_st *bind_rpc)
  905. {
  906. struct sockaddr_in *connaddr;
  907. connaddr = (struct sockaddr_in *) &bind_rpc->addr;
  908. int conn_port = lwipstack->ntohs(connaddr->sin_port);
  909. ip_addr_t conn_addr;
  910. conn_addr.addr = *((u32_t *)_ips[0].rawIpData());
  911. TcpConnection *conn = getConnection(sock);
  912. dwr(MSG_DEBUG," handle_bind(%d)\n", bind_rpc->sockfd);
  913. if(conn) {
  914. if(conn->pcb->state == CLOSED){
  915. int err = lwipstack->tcp_bind(conn->pcb, &conn_addr, conn_port);
  916. int ip = connaddr->sin_addr.s_addr;
  917. unsigned char d[4];
  918. d[0] = ip & 0xFF;
  919. d[1] = (ip >> 8) & 0xFF;
  920. d[2] = (ip >> 16) & 0xFF;
  921. d[3] = (ip >> 24) & 0xFF;
  922. dwr(MSG_DEBUG," handle_bind(): %d.%d.%d.%d : %d\n", d[0],d[1],d[2],d[3], conn_port);
  923. if(err != ERR_OK) {
  924. dwr(MSG_ERROR," handle_bind(): err = %d\n", err);
  925. if(err == ERR_USE)
  926. send_return_value(rpcsock, -1, EADDRINUSE);
  927. if(err == ERR_MEM)
  928. send_return_value(rpcsock, -1, ENOMEM);
  929. if(err == ERR_BUF)
  930. send_return_value(rpcsock, -1, ENOMEM);
  931. }
  932. else {
  933. conn->addr = (struct sockaddr_storage *) &bind_rpc->addr;
  934. send_return_value(rpcsock, ERR_OK, ERR_OK); // Success
  935. }
  936. }
  937. else {
  938. dwr(MSG_ERROR," handle_bind(): PCB (%x) not in CLOSED state. Ignoring BIND request.\n", conn->pcb);
  939. send_return_value(rpcsock, -1, EINVAL);
  940. }
  941. }
  942. else {
  943. dwr(MSG_ERROR," handle_bind(): can't locate connection for PCB\n");
  944. send_return_value(rpcsock, -1, EBADF);
  945. }
  946. }
  947. /*
  948. * Handles an RPC to put an LWIP PCB into LISTEN mode
  949. *
  950. * @param PhySocket associated with this RPC connection
  951. * @param structure containing the data and parameters for this client's RPC
  952. *
  953. i := should be implemented in intercept lib
  954. I := is implemented in intercept lib
  955. X := is implemented in service
  956. ? := required treatment Unknown
  957. - := Not needed
  958. [?] EADDRINUSE - Another socket is already listening on the same port.
  959. [IX] EBADF - The argument sockfd is not a valid descriptor.
  960. [I] ENOTSOCK - The argument sockfd is not a socket.
  961. [I] EOPNOTSUPP - The socket is not of a type that supports the listen() operation.
  962. */
  963. void NetconEthernetTap::handle_listen(PhySocket *sock, PhySocket *rpcsock, void **uptr, struct listen_st *listen_rpc)
  964. {
  965. dwr(MSG_DEBUG," handle_listen(their=%d):\n", listen_rpc->sockfd);
  966. TcpConnection *conn = getConnection(sock);
  967. if(!conn){
  968. dwr(MSG_ERROR," handle_listen(): unable to locate connection object\n");
  969. send_return_value(rpcsock, -1, EBADF);
  970. return;
  971. }
  972. if(conn->pcb->state == LISTEN) {
  973. dwr(MSG_ERROR," handle_listen(): PCB is already in listening state.\n");
  974. send_return_value(rpcsock, ERR_OK, ERR_OK);
  975. return;
  976. }
  977. struct tcp_pcb* listening_pcb;
  978. #ifdef TCP_LISTEN_BACKLOG
  979. listening_pcb = lwipstack->tcp_listen_with_backlog(conn->pcb, listen_rpc->backlog);
  980. #else
  981. listening_pcb = lwipstack->tcp_listen(conn->pcb);
  982. #endif
  983. if(listening_pcb != NULL) {
  984. conn->pcb = listening_pcb;
  985. lwipstack->tcp_accept(listening_pcb, nc_accept);
  986. lwipstack->tcp_arg(listening_pcb, new Larg(this, conn));
  987. /* we need to wait for the client to send us the fd allocated on their end
  988. for this listening socket */
  989. fcntl(_phy.getDescriptor(conn->sock), F_SETFL, O_NONBLOCK);
  990. conn->listening = true;
  991. conn->pending = true;
  992. send_return_value(rpcsock, ERR_OK, ERR_OK);
  993. return;
  994. }
  995. send_return_value(rpcsock, -1, -1);
  996. }
  997. /*
  998. * Handles an RPC to create a socket (LWIP PCB and associated socketpair)
  999. *
  1000. * A socketpair is created, one end is kept and wrapped into a PhySocket object
  1001. * for use in the main ZT I/O loop, and one end is sent to the client. The client
  1002. * is then required to tell the service what new file descriptor it has allocated
  1003. * for this connection. After the mapping is complete, the socket can be used.
  1004. *
  1005. * @param PhySocket associated with this RPC connection
  1006. * @param structure containing the data and parameters for this client's RPC
  1007. *
  1008. i := should be implemented in intercept lib
  1009. I := is implemented in intercept lib
  1010. X := is implemented in service
  1011. ? := required treatment Unknown
  1012. - := Not needed
  1013. [-] EACCES - Permission to create a socket of the specified type and/or protocol is denied.
  1014. [I] EAFNOSUPPORT - The implementation does not support the specified address family.
  1015. [I] EINVAL - Unknown protocol, or protocol family not available.
  1016. [I] EINVAL - Invalid flags in type.
  1017. [I] EMFILE - Process file table overflow.
  1018. [?] ENFILE - The system limit on the total number of open files has been reached.
  1019. [X] ENOBUFS or ENOMEM - Insufficient memory is available. The socket cannot be created until sufficient resources are freed.
  1020. [?] EPROTONOSUPPORT - The protocol type or the specified protocol is not supported within this domain.
  1021. */
  1022. TcpConnection * NetconEthernetTap::handle_socket(PhySocket *sock, void **uptr, struct socket_st* socket_rpc)
  1023. {
  1024. struct tcp_pcb *newpcb = lwipstack->tcp_new();
  1025. dwr(MSG_DEBUG," handle_socket(): pcb=%x\n", newpcb);
  1026. if(newpcb != NULL) {
  1027. TcpConnection *new_conn = new TcpConnection();
  1028. *uptr = new_conn;
  1029. new_conn->sock = sock;
  1030. new_conn->pcb = newpcb;
  1031. tcp_connections.push_back(new_conn);
  1032. new_conn->pending = true;
  1033. return new_conn;
  1034. }
  1035. dwr(MSG_ERROR," handle_socket(): Memory not available for new PCB\n");
  1036. send_return_value(_phy.getDescriptor(sock), -1, ENOMEM);
  1037. return NULL;
  1038. }
  1039. /*
  1040. * Handles an RPC to connect to a given address and port
  1041. *
  1042. * @param PhySocket associated with this RPC connection
  1043. * @param structure containing the data and parameters for this client's RPC
  1044. --- Error handling in this method will only catch problems which are immedately
  1045. apprent. Some errors will need to be caught in the nc_connected(0 callback
  1046. i := should be implemented in intercept lib
  1047. I := is implemented in intercept lib
  1048. X := is implemented in service
  1049. ? := required treatment Unknown
  1050. - := Not needed
  1051. [-] EACCES - For UNIX domain sockets, which are identified by pathname: Write permission is denied ...
  1052. [?] EACCES, EPERM - The user tried to connect to a broadcast address without having the socket broadcast flag enabled ...
  1053. [X] EADDRINUSE - Local address is already in use.
  1054. [I] EAFNOSUPPORT - The passed address didn't have the correct address family in its sa_family field.
  1055. [X] EAGAIN - No more free local ports or insufficient entries in the routing cache.
  1056. [ ] EALREADY - The socket is nonblocking and a previous connection attempt has not yet been completed.
  1057. [IX] EBADF - The file descriptor is not a valid index in the descriptor table.
  1058. [ ] ECONNREFUSED - No-one listening on the remote address.
  1059. [i] EFAULT - The socket structure address is outside the user's address space.
  1060. [ ] EINPROGRESS - The socket is nonblocking and the connection cannot be completed immediately.
  1061. [-] EINTR - The system call was interrupted by a signal that was caught.
  1062. [X] EISCONN - The socket is already connected.
  1063. [X] ENETUNREACH - Network is unreachable.
  1064. [I] ENOTSOCK - The file descriptor is not associated with a socket.
  1065. [X] ETIMEDOUT - Timeout while attempting connection.
  1066. [X] EINVAL - Invalid argument, SVr4, generally makes sense to set this
  1067. *
  1068. */
  1069. void NetconEthernetTap::handle_connect(PhySocket *sock, PhySocket *rpcsock, TcpConnection *conn, struct connect_st* connect_rpc)
  1070. {
  1071. dwr(MSG_DEBUG," handle_connect()\n");
  1072. struct sockaddr_in *connaddr;
  1073. connaddr = (struct sockaddr_in *) &connect_rpc->__addr;
  1074. int conn_port = lwipstack->ntohs(connaddr->sin_port);
  1075. ip_addr_t conn_addr = convert_ip((struct sockaddr_in *)&connect_rpc->__addr);
  1076. if(conn != NULL) {
  1077. if (!conn->listening)
  1078. lwipstack->tcp_sent(conn->pcb, nc_sent);
  1079. lwipstack->tcp_recv(conn->pcb, nc_recved);
  1080. lwipstack->tcp_err(conn->pcb, nc_err);
  1081. lwipstack->tcp_poll(conn->pcb, nc_poll, APPLICATION_POLL_FREQ);
  1082. lwipstack->tcp_arg(conn->pcb, new Larg(this, conn));
  1083. int err = 0;
  1084. if((err = lwipstack->tcp_connect(conn->pcb,&conn_addr,conn_port, nc_connected)) < 0)
  1085. {
  1086. if(err == ERR_ISCONN) {
  1087. send_return_value(rpcsock, -1, EISCONN); // Already in connected state
  1088. return;
  1089. }
  1090. if(err == ERR_USE) {
  1091. send_return_value(rpcsock, -1, EADDRINUSE); // Already in use
  1092. return;
  1093. }
  1094. if(err == ERR_VAL) {
  1095. send_return_value(rpcsock, -1, EINVAL); // Invalid ipaddress parameter
  1096. return;
  1097. }
  1098. if(err == ERR_RTE) {
  1099. send_return_value(rpcsock, -1, ENETUNREACH); // No route to host
  1100. return;
  1101. }
  1102. if(err == ERR_BUF) {
  1103. send_return_value(rpcsock, -1, EAGAIN); // No more ports available
  1104. return;
  1105. }
  1106. if(err == ERR_MEM) {
  1107. /* Can occur for the following reasons: tcp_enqueue_flags()
  1108. 1) tcp_enqueue_flags is always called with either SYN or FIN in flags.
  1109. We need one available snd_buf byte to do that.
  1110. This means we can't send FIN while snd_buf==0. A better fix would be to
  1111. not include SYN and FIN sequence numbers in the snd_buf count.
  1112. 2) Cannot allocate new pbuf
  1113. 3) Cannot allocate new TCP segment
  1114. */
  1115. send_return_value(rpcsock, -1, EAGAIN); // FIXME: Doesn't describe the problem well, but closest match
  1116. return;
  1117. }
  1118. // We should only return a value if failure happens immediately
  1119. // Otherwise, we still need to wait for a callback from lwIP.
  1120. // - This is because an ERR_OK from tcp_connect() only verifies
  1121. // that the SYN packet was enqueued onto the stack properly,
  1122. // that's it!
  1123. // - Most instances of a retval for a connect() should happen
  1124. // in the nc_connect() and nc_err() callbacks!
  1125. dwr(MSG_ERROR," handle_connect(): unable to connect\n");
  1126. send_return_value(rpcsock, -1, EAGAIN);
  1127. }
  1128. // Everything seems to be ok, but we don't have enough info to retval
  1129. conn->pending=true;
  1130. conn->listening=true;
  1131. conn->rpcsock=rpcsock; // used for return value from lwip CB
  1132. }
  1133. else {
  1134. dwr(MSG_ERROR," handle_connect(): could not locate PCB based on their fd\n");
  1135. send_return_value(rpcsock, -1, EBADF);
  1136. }
  1137. }
  1138. void NetconEthernetTap::handle_write(TcpConnection *conn)
  1139. {
  1140. int r;
  1141. if(!conn) {
  1142. dwr(MSG_ERROR," handle_write(): could not locate connection for this fd\n");
  1143. return;
  1144. }
  1145. //dwr(MSG_DEBUG,"conn->idx = %d, TCP_SND_BUF = %d\n", conn->idx, TCP_SND_BUF);
  1146. if(!conn->pcb) {
  1147. dwr(MSG_ERROR," handle_write(): conn->pcb == NULL. Failed to write.\n");
  1148. return;
  1149. }
  1150. int sndbuf = conn->pcb->snd_buf; // How much we are currently allowed to write to the connection
  1151. /* PCB send buffer is full,turn off readability notifications for the
  1152. corresponding PhySocket until nc_sent() is called and confirms that there is
  1153. now space on the buffer */
  1154. if(sndbuf == 0) {
  1155. _phy.setNotifyReadable(conn->sock, false);
  1156. return;
  1157. }
  1158. if(!conn->listening)
  1159. lwipstack->_tcp_output(conn->pcb);
  1160. if(conn->sock && !conn->listening) {
  1161. r = conn->idx < sndbuf ? conn->idx : sndbuf;
  1162. //dwr(MSG_DEBUG,"handle_write(): r = %d\n", r);
  1163. /* Writes data pulled from the client's socket buffer to LWIP. This merely sends the
  1164. * data to LWIP to be enqueued and eventually sent to the network. */
  1165. if(r > 0) {
  1166. int sz;
  1167. // NOTE: this assumes that lwipstack->_lock is locked, either
  1168. // because we are in a callback or have locked it manually.
  1169. int err = lwipstack->_tcp_write(conn->pcb, &conn->buf, r, TCP_WRITE_FLAG_COPY);
  1170. lwipstack->_tcp_output(conn->pcb);
  1171. if(err != ERR_OK) {
  1172. dwr(MSG_ERROR," handle_write(): error while writing to PCB, (err = %d)\n", err);
  1173. if(err == -1)
  1174. dwr(MSG_DEBUG," handle_write(): possibly out of memory\n");
  1175. return;
  1176. }
  1177. else {
  1178. sz = (conn->idx)-r;
  1179. if(sz) {
  1180. memmove(&conn->buf, (conn->buf+r), sz);
  1181. }
  1182. conn->idx -= r;
  1183. conn->written+=r;
  1184. return;
  1185. }
  1186. }
  1187. else {
  1188. dwr(MSG_INFO," handle_write(): LWIP stack full\n");
  1189. return;
  1190. }
  1191. }
  1192. }
  1193. } // namespace ZeroTier