| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright (C) 2007 The Android Open Source Project | 
|  | 3 | * | 
|  | 4 | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | 5 | * you may not use this file except in compliance with the License. | 
|  | 6 | * You may obtain a copy of the License at | 
|  | 7 | * | 
|  | 8 | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | 9 | * | 
|  | 10 | * Unless required by applicable law or agreed to in writing, software | 
|  | 11 | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | 13 | * See the License for the specific language governing permissions and | 
|  | 14 | * limitations under the License. | 
|  | 15 | */ | 
|  | 16 |  | 
|  | 17 | #define LOG_TAG "mq" | 
|  | 18 |  | 
|  | 19 | #include <assert.h> | 
|  | 20 | #include <errno.h> | 
|  | 21 | #include <fcntl.h> | 
|  | 22 | #include <pthread.h> | 
|  | 23 | #include <stdlib.h> | 
|  | 24 | #include <string.h> | 
|  | 25 | #include <unistd.h> | 
|  | 26 |  | 
|  | 27 | #include <sys/socket.h> | 
|  | 28 | #include <sys/types.h> | 
|  | 29 | #include <sys/un.h> | 
|  | 30 | #include <sys/uio.h> | 
|  | 31 |  | 
|  | 32 | #include <cutils/array.h> | 
|  | 33 | #include <cutils/hashmap.h> | 
|  | 34 | #include <cutils/selector.h> | 
|  | 35 |  | 
|  | 36 | #include "loghack.h" | 
|  | 37 | #include "buffer.h" | 
|  | 38 |  | 
|  | 39 | /** Number of dead peers to remember. */ | 
|  | 40 | #define PEER_HISTORY (16) | 
|  | 41 |  | 
|  | 42 | typedef struct sockaddr SocketAddress; | 
|  | 43 | typedef struct sockaddr_un UnixAddress; | 
|  | 44 |  | 
|  | 45 | /** | 
|  | 46 | * Process/user/group ID. We don't use ucred directly because it's only | 
|  | 47 | * available on Linux. | 
|  | 48 | */ | 
|  | 49 | typedef struct { | 
|  | 50 | pid_t pid; | 
|  | 51 | uid_t uid; | 
|  | 52 | gid_t gid; | 
|  | 53 | } Credentials; | 
|  | 54 |  | 
|  | 55 | /** Listens for bytes coming from remote peers. */ | 
|  | 56 | typedef void BytesListener(Credentials credentials, char* bytes, size_t size); | 
|  | 57 |  | 
|  | 58 | /** Listens for the deaths of remote peers. */ | 
|  | 59 | typedef void DeathListener(pid_t pid); | 
|  | 60 |  | 
|  | 61 | /** Types of packets. */ | 
|  | 62 | typedef enum { | 
|  | 63 | /** Request for a connection to another peer. */ | 
|  | 64 | CONNECTION_REQUEST, | 
|  | 65 |  | 
|  | 66 | /** A connection to another peer. */ | 
|  | 67 | CONNECTION, | 
|  | 68 |  | 
|  | 69 | /** Reports a failed connection attempt. */ | 
|  | 70 | CONNECTION_ERROR, | 
|  | 71 |  | 
|  | 72 | /** A generic packet of bytes. */ | 
|  | 73 | BYTES, | 
|  | 74 | } PacketType; | 
|  | 75 |  | 
|  | 76 | typedef enum { | 
|  | 77 | /** Reading a packet header. */ | 
|  | 78 | READING_HEADER, | 
|  | 79 |  | 
|  | 80 | /** Waiting for a connection from the master. */ | 
|  | 81 | ACCEPTING_CONNECTION, | 
|  | 82 |  | 
|  | 83 | /** Reading bytes. */ | 
|  | 84 | READING_BYTES, | 
|  | 85 | } InputState; | 
|  | 86 |  | 
|  | 87 | /** A packet header. */ | 
|  | 88 | // TODO: Use custom headers for master->peer, peer->master, peer->peer. | 
|  | 89 | typedef struct { | 
|  | 90 | PacketType type; | 
|  | 91 | union { | 
|  | 92 | /** Packet size. Used for BYTES. */ | 
|  | 93 | size_t size; | 
|  | 94 |  | 
|  | 95 | /** Credentials. Used for CONNECTION and CONNECTION_REQUEST. */ | 
|  | 96 | Credentials credentials; | 
|  | 97 | }; | 
|  | 98 | } Header; | 
|  | 99 |  | 
|  | 100 | /** A packet which will be sent to a peer. */ | 
|  | 101 | typedef struct OutgoingPacket OutgoingPacket; | 
|  | 102 | struct OutgoingPacket { | 
|  | 103 | /** Packet header. */ | 
|  | 104 | Header header; | 
|  | 105 |  | 
|  | 106 | union { | 
|  | 107 | /** Connection to peer. Used with CONNECTION. */ | 
|  | 108 | int socket; | 
|  | 109 |  | 
|  | 110 | /** Buffer of bytes. Used with BYTES. */ | 
|  | 111 | Buffer* bytes; | 
|  | 112 | }; | 
|  | 113 |  | 
|  | 114 | /** Frees all resources associated with this packet. */ | 
|  | 115 | void (*free)(OutgoingPacket* packet); | 
|  | 116 |  | 
|  | 117 | /** Optional context. */ | 
|  | 118 | void* context; | 
|  | 119 |  | 
|  | 120 | /** Next packet in the queue. */ | 
|  | 121 | OutgoingPacket* nextPacket; | 
|  | 122 | }; | 
|  | 123 |  | 
|  | 124 | /** Represents a remote peer. */ | 
|  | 125 | typedef struct PeerProxy PeerProxy; | 
|  | 126 |  | 
|  | 127 | /** Local peer state. You typically have one peer per process. */ | 
|  | 128 | typedef struct { | 
|  | 129 | /** This peer's PID. */ | 
|  | 130 | pid_t pid; | 
|  | 131 |  | 
|  | 132 | /** | 
|  | 133 | * Map from pid to peer proxy. The peer has a peer proxy for each remote | 
|  | 134 | * peer it's connected to. | 
|  | 135 | * | 
|  | 136 | * Acquire mutex before use. | 
|  | 137 | */ | 
|  | 138 | Hashmap* peerProxies; | 
|  | 139 |  | 
|  | 140 | /** Manages I/O. */ | 
|  | 141 | Selector* selector; | 
|  | 142 |  | 
|  | 143 | /** Used to synchronize operations with the selector thread. */ | 
|  | 144 | pthread_mutex_t mutex; | 
|  | 145 |  | 
|  | 146 | /** Is this peer the master? */ | 
|  | 147 | bool master; | 
|  | 148 |  | 
|  | 149 | /** Peer proxy for the master. */ | 
|  | 150 | PeerProxy* masterProxy; | 
|  | 151 |  | 
|  | 152 | /** Listens for packets from remote peers. */ | 
|  | 153 | BytesListener* onBytes; | 
|  | 154 |  | 
|  | 155 | /** Listens for deaths of remote peers. */ | 
|  | 156 | DeathListener* onDeath; | 
|  | 157 |  | 
|  | 158 | /** Keeps track of recently dead peers. Requires mutex. */ | 
|  | 159 | pid_t deadPeers[PEER_HISTORY]; | 
|  | 160 | size_t deadPeerCursor; | 
|  | 161 | } Peer; | 
|  | 162 |  | 
|  | 163 | struct PeerProxy { | 
|  | 164 | /** Credentials of the remote process. */ | 
|  | 165 | Credentials credentials; | 
|  | 166 |  | 
|  | 167 | /** Keeps track of data coming in from the remote peer. */ | 
|  | 168 | InputState inputState; | 
|  | 169 | Buffer* inputBuffer; | 
|  | 170 | PeerProxy* connecting; | 
|  | 171 |  | 
|  | 172 | /** File descriptor for this peer. */ | 
|  | 173 | SelectableFd* fd; | 
|  | 174 |  | 
|  | 175 | /** | 
|  | 176 | * Queue of packets to be written out to the remote peer. | 
|  | 177 | * | 
|  | 178 | * Requires mutex. | 
|  | 179 | */ | 
|  | 180 | // TODO: Limit queue length. | 
|  | 181 | OutgoingPacket* currentPacket; | 
|  | 182 | OutgoingPacket* lastPacket; | 
|  | 183 |  | 
|  | 184 | /** Used to write outgoing header. */ | 
|  | 185 | Buffer outgoingHeader; | 
|  | 186 |  | 
|  | 187 | /** True if this is the master's proxy. */ | 
|  | 188 | bool master; | 
|  | 189 |  | 
|  | 190 | /** Reference back to the local peer. */ | 
|  | 191 | Peer* peer; | 
|  | 192 |  | 
|  | 193 | /** | 
|  | 194 | * Used in master only. Maps this peer proxy to other peer proxies to | 
|  | 195 | * which the peer has been connected to. Maps pid to PeerProxy. Helps | 
|  | 196 | * keep track of which connections we've sent to whom. | 
|  | 197 | */ | 
|  | 198 | Hashmap* connections; | 
|  | 199 | }; | 
|  | 200 |  | 
|  | 201 | /** Server socket path. */ | 
|  | 202 | static const char* MASTER_PATH = "/master.peer"; | 
|  | 203 |  | 
|  | 204 | /** Credentials of the master peer. */ | 
|  | 205 | static const Credentials MASTER_CREDENTIALS = {0, 0, 0}; | 
|  | 206 |  | 
|  | 207 | /** Creates a peer proxy and adds it to the peer proxy map. */ | 
|  | 208 | static PeerProxy* peerProxyCreate(Peer* peer, Credentials credentials); | 
|  | 209 |  | 
|  | 210 | /** Sets the non-blocking flag on a descriptor. */ | 
|  | 211 | static void setNonBlocking(int fd) { | 
|  | 212 | int flags; | 
|  | 213 | if ((flags = fcntl(fd, F_GETFL, 0)) < 0) { | 
|  | 214 | LOG_ALWAYS_FATAL("fcntl() error: %s", strerror(errno)); | 
|  | 215 | } | 
|  | 216 | if (fcntl(fd, F_SETFL, flags | O_NONBLOCK) < 0) { | 
|  | 217 | LOG_ALWAYS_FATAL("fcntl() error: %s", strerror(errno)); | 
|  | 218 | } | 
|  | 219 | } | 
|  | 220 |  | 
|  | 221 | /** Closes a fd and logs a warning if the close fails. */ | 
|  | 222 | static void closeWithWarning(int fd) { | 
|  | 223 | int result = close(fd); | 
|  | 224 | if (result == -1) { | 
|  | 225 | LOGW("close() error: %s", strerror(errno)); | 
|  | 226 | } | 
|  | 227 | } | 
|  | 228 |  | 
|  | 229 | /** Hashes pid_t keys. */ | 
|  | 230 | static int pidHash(void* key) { | 
|  | 231 | pid_t* pid = (pid_t*) key; | 
|  | 232 | return (int) (*pid); | 
|  | 233 | } | 
|  | 234 |  | 
|  | 235 | /** Compares pid_t keys. */ | 
|  | 236 | static bool pidEquals(void* keyA, void* keyB) { | 
|  | 237 | pid_t* a = (pid_t*) keyA; | 
|  | 238 | pid_t* b = (pid_t*) keyB; | 
|  | 239 | return *a == *b; | 
|  | 240 | } | 
|  | 241 |  | 
|  | 242 | /** Gets the master address. Not thread safe. */ | 
|  | 243 | static UnixAddress* getMasterAddress() { | 
|  | 244 | static UnixAddress masterAddress; | 
|  | 245 | static bool initialized = false; | 
|  | 246 | if (initialized == false) { | 
|  | 247 | masterAddress.sun_family = AF_LOCAL; | 
|  | 248 | strcpy(masterAddress.sun_path, MASTER_PATH); | 
|  | 249 | initialized = true; | 
|  | 250 | } | 
|  | 251 | return &masterAddress; | 
|  | 252 | } | 
|  | 253 |  | 
|  | 254 | /** Gets exclusive access to the peer for this thread. */ | 
|  | 255 | static void peerLock(Peer* peer) { | 
|  | 256 | pthread_mutex_lock(&peer->mutex); | 
|  | 257 | } | 
|  | 258 |  | 
|  | 259 | /** Releases exclusive access to the peer. */ | 
|  | 260 | static void peerUnlock(Peer* peer) { | 
|  | 261 | pthread_mutex_unlock(&peer->mutex); | 
|  | 262 | } | 
|  | 263 |  | 
|  | 264 | /** Frees a simple, i.e. header-only, outgoing packet. */ | 
|  | 265 | static void outgoingPacketFree(OutgoingPacket* packet) { | 
|  | 266 | LOGD("Freeing outgoing packet."); | 
|  | 267 | free(packet); | 
|  | 268 | } | 
|  | 269 |  | 
|  | 270 | /** | 
|  | 271 | * Prepare to read a new packet from the peer. | 
|  | 272 | */ | 
|  | 273 | static void peerProxyExpectHeader(PeerProxy* peerProxy) { | 
|  | 274 | peerProxy->inputState = READING_HEADER; | 
|  | 275 | bufferPrepareForRead(peerProxy->inputBuffer, sizeof(Header)); | 
|  | 276 | } | 
|  | 277 |  | 
|  | 278 | /** Sets up the buffer for the outgoing header. */ | 
|  | 279 | static void peerProxyPrepareOutgoingHeader(PeerProxy* peerProxy) { | 
|  | 280 | peerProxy->outgoingHeader.data | 
|  | 281 | = (char*) &(peerProxy->currentPacket->header); | 
|  | 282 | peerProxy->outgoingHeader.size = sizeof(Header); | 
|  | 283 | bufferPrepareForWrite(&peerProxy->outgoingHeader); | 
|  | 284 | } | 
|  | 285 |  | 
|  | 286 | /** Adds a packet to the end of the queue. Callers must have the mutex. */ | 
|  | 287 | static void peerProxyEnqueueOutgoingPacket(PeerProxy* peerProxy, | 
|  | 288 | OutgoingPacket* newPacket) { | 
|  | 289 | newPacket->nextPacket = NULL; // Just in case. | 
|  | 290 | if (peerProxy->currentPacket == NULL) { | 
|  | 291 | // The queue is empty. | 
|  | 292 | peerProxy->currentPacket = newPacket; | 
|  | 293 | peerProxy->lastPacket = newPacket; | 
|  | 294 |  | 
|  | 295 | peerProxyPrepareOutgoingHeader(peerProxy); | 
|  | 296 | } else { | 
|  | 297 | peerProxy->lastPacket->nextPacket = newPacket; | 
|  | 298 | } | 
|  | 299 | } | 
|  | 300 |  | 
|  | 301 | /** Takes the peer lock and enqueues the given packet. */ | 
|  | 302 | static void peerProxyLockAndEnqueueOutgoingPacket(PeerProxy* peerProxy, | 
|  | 303 | OutgoingPacket* newPacket) { | 
|  | 304 | Peer* peer = peerProxy->peer; | 
|  | 305 | peerLock(peer); | 
|  | 306 | peerProxyEnqueueOutgoingPacket(peerProxy, newPacket); | 
|  | 307 | peerUnlock(peer); | 
|  | 308 | } | 
|  | 309 |  | 
|  | 310 | /** | 
|  | 311 | * Frees current packet and moves to the next one. Returns true if there is | 
|  | 312 | * a next packet or false if the queue is empty. | 
|  | 313 | */ | 
|  | 314 | static bool peerProxyNextPacket(PeerProxy* peerProxy) { | 
|  | 315 | Peer* peer = peerProxy->peer; | 
|  | 316 | peerLock(peer); | 
|  | 317 |  | 
|  | 318 | OutgoingPacket* current = peerProxy->currentPacket; | 
|  | 319 |  | 
|  | 320 | if (current == NULL) { | 
|  | 321 | // The queue is already empty. | 
|  | 322 | peerUnlock(peer); | 
|  | 323 | return false; | 
|  | 324 | } | 
|  | 325 |  | 
|  | 326 | OutgoingPacket* next = current->nextPacket; | 
|  | 327 | peerProxy->currentPacket = next; | 
|  | 328 | current->nextPacket = NULL; | 
|  | 329 | current->free(current); | 
|  | 330 | if (next == NULL) { | 
|  | 331 | // The queue is empty. | 
|  | 332 | peerProxy->lastPacket = NULL; | 
|  | 333 | peerUnlock(peer); | 
|  | 334 | return false; | 
|  | 335 | } else { | 
|  | 336 | peerUnlock(peer); | 
|  | 337 | peerProxyPrepareOutgoingHeader(peerProxy); | 
|  | 338 |  | 
|  | 339 | // TODO: Start writing next packet? It would reduce the number of | 
|  | 340 | // system calls, but we could also starve other peers. | 
|  | 341 | return true; | 
|  | 342 | } | 
|  | 343 | } | 
|  | 344 |  | 
|  | 345 | /** | 
|  | 346 | * Checks whether a peer died recently. | 
|  | 347 | */ | 
|  | 348 | static bool peerIsDead(Peer* peer, pid_t pid) { | 
|  | 349 | size_t i; | 
|  | 350 | for (i = 0; i < PEER_HISTORY; i++) { | 
|  | 351 | pid_t deadPeer = peer->deadPeers[i]; | 
|  | 352 | if (deadPeer == 0) { | 
|  | 353 | return false; | 
|  | 354 | } | 
|  | 355 | if (deadPeer == pid) { | 
|  | 356 | return true; | 
|  | 357 | } | 
|  | 358 | } | 
|  | 359 | return false; | 
|  | 360 | } | 
|  | 361 |  | 
|  | 362 | /** | 
|  | 363 | * Cleans up connection information. | 
|  | 364 | */ | 
|  | 365 | static bool peerProxyRemoveConnection(void* key, void* value, void* context) { | 
|  | 366 | PeerProxy* deadPeer = (PeerProxy*) context; | 
|  | 367 | PeerProxy* otherPeer = (PeerProxy*) value; | 
|  | 368 | hashmapRemove(otherPeer->connections, &(deadPeer->credentials.pid)); | 
|  | 369 | return true; | 
|  | 370 | } | 
|  | 371 |  | 
|  | 372 | /** | 
|  | 373 | * Called when the peer dies. | 
|  | 374 | */ | 
|  | 375 | static void peerProxyKill(PeerProxy* peerProxy, bool errnoIsSet) { | 
|  | 376 | if (errnoIsSet) { | 
|  | 377 | LOGI("Peer %d died. errno: %s", peerProxy->credentials.pid, | 
|  | 378 | strerror(errno)); | 
|  | 379 | } else { | 
|  | 380 | LOGI("Peer %d died.", peerProxy->credentials.pid); | 
|  | 381 | } | 
|  | 382 |  | 
|  | 383 | // If we lost the master, we're up a creek. We can't let this happen. | 
|  | 384 | if (peerProxy->master) { | 
|  | 385 | LOG_ALWAYS_FATAL("Lost connection to master."); | 
|  | 386 | } | 
|  | 387 |  | 
|  | 388 | Peer* localPeer = peerProxy->peer; | 
|  | 389 | pid_t pid = peerProxy->credentials.pid; | 
|  | 390 |  | 
|  | 391 | peerLock(localPeer); | 
|  | 392 |  | 
|  | 393 | // Remember for awhile that the peer died. | 
|  | 394 | localPeer->deadPeers[localPeer->deadPeerCursor] | 
|  | 395 | = peerProxy->credentials.pid; | 
|  | 396 | localPeer->deadPeerCursor++; | 
|  | 397 | if (localPeer->deadPeerCursor == PEER_HISTORY) { | 
|  | 398 | localPeer->deadPeerCursor = 0; | 
|  | 399 | } | 
|  | 400 |  | 
|  | 401 | // Remove from peer map. | 
|  | 402 | hashmapRemove(localPeer->peerProxies, &pid); | 
|  | 403 |  | 
|  | 404 | // External threads can no longer get to this peer proxy, so we don't | 
|  | 405 | // need the lock anymore. | 
|  | 406 | peerUnlock(localPeer); | 
|  | 407 |  | 
|  | 408 | // Remove the fd from the selector. | 
|  | 409 | if (peerProxy->fd != NULL) { | 
|  | 410 | peerProxy->fd->remove = true; | 
|  | 411 | } | 
|  | 412 |  | 
|  | 413 | // Clear outgoing packet queue. | 
|  | 414 | while (peerProxyNextPacket(peerProxy)) {} | 
|  | 415 |  | 
|  | 416 | bufferFree(peerProxy->inputBuffer); | 
|  | 417 |  | 
|  | 418 | // This only applies to the master. | 
|  | 419 | if (peerProxy->connections != NULL) { | 
|  | 420 | // We can't leave these other maps pointing to freed memory. | 
|  | 421 | hashmapForEach(peerProxy->connections, &peerProxyRemoveConnection, | 
|  | 422 | peerProxy); | 
|  | 423 | hashmapFree(peerProxy->connections); | 
|  | 424 | } | 
|  | 425 |  | 
|  | 426 | // Invoke death listener. | 
|  | 427 | localPeer->onDeath(pid); | 
|  | 428 |  | 
|  | 429 | // Free the peer proxy itself. | 
|  | 430 | free(peerProxy); | 
|  | 431 | } | 
|  | 432 |  | 
|  | 433 | static void peerProxyHandleError(PeerProxy* peerProxy, char* functionName) { | 
|  | 434 | if (errno == EINTR) { | 
|  | 435 | // Log interruptions but otherwise ignore them. | 
|  | 436 | LOGW("%s() interrupted.", functionName); | 
|  | 437 | } else if (errno == EAGAIN) { | 
|  | 438 | LOGD("EWOULDBLOCK"); | 
|  | 439 | // Ignore. | 
|  | 440 | } else { | 
|  | 441 | LOGW("Error returned by %s().", functionName); | 
|  | 442 | peerProxyKill(peerProxy, true); | 
|  | 443 | } | 
|  | 444 | } | 
|  | 445 |  | 
|  | 446 | /** | 
|  | 447 | * Buffers output sent to a peer. May be called multiple times until the entire | 
|  | 448 | * buffer is filled. Returns true when the buffer is empty. | 
|  | 449 | */ | 
|  | 450 | static bool peerProxyWriteFromBuffer(PeerProxy* peerProxy, Buffer* outgoing) { | 
|  | 451 | ssize_t size = bufferWrite(outgoing, peerProxy->fd->fd); | 
|  | 452 | if (size < 0) { | 
|  | 453 | peerProxyHandleError(peerProxy, "write"); | 
|  | 454 | return false; | 
|  | 455 | } else { | 
|  | 456 | return bufferWriteComplete(outgoing); | 
|  | 457 | } | 
|  | 458 | } | 
|  | 459 |  | 
|  | 460 | /** Writes packet bytes to peer. */ | 
|  | 461 | static void peerProxyWriteBytes(PeerProxy* peerProxy) { | 
|  | 462 | Buffer* buffer = peerProxy->currentPacket->bytes; | 
|  | 463 | if (peerProxyWriteFromBuffer(peerProxy, buffer)) { | 
|  | 464 | LOGD("Bytes written."); | 
|  | 465 | peerProxyNextPacket(peerProxy); | 
|  | 466 | } | 
|  | 467 | } | 
|  | 468 |  | 
|  | 469 | /** Sends a socket to the peer. */ | 
|  | 470 | static void peerProxyWriteConnection(PeerProxy* peerProxy) { | 
|  | 471 | int socket = peerProxy->currentPacket->socket; | 
|  | 472 |  | 
|  | 473 | // Why does sending and receiving fds have to be such a PITA? | 
|  | 474 | struct msghdr msg; | 
|  | 475 | struct iovec iov[1]; | 
|  | 476 |  | 
|  | 477 | union { | 
|  | 478 | struct cmsghdr cm; | 
|  | 479 | char control[CMSG_SPACE(sizeof(int))]; | 
|  | 480 | } control_un; | 
|  | 481 |  | 
|  | 482 | struct cmsghdr *cmptr; | 
|  | 483 |  | 
|  | 484 | msg.msg_control = control_un.control; | 
|  | 485 | msg.msg_controllen = sizeof(control_un.control); | 
|  | 486 | cmptr = CMSG_FIRSTHDR(&msg); | 
|  | 487 | cmptr->cmsg_len = CMSG_LEN(sizeof(int)); | 
|  | 488 | cmptr->cmsg_level = SOL_SOCKET; | 
|  | 489 | cmptr->cmsg_type = SCM_RIGHTS; | 
|  | 490 |  | 
|  | 491 | // Store the socket in the message. | 
|  | 492 | *((int *) CMSG_DATA(cmptr)) = peerProxy->currentPacket->socket; | 
|  | 493 |  | 
|  | 494 | msg.msg_name = NULL; | 
|  | 495 | msg.msg_namelen = 0; | 
|  | 496 | iov[0].iov_base = ""; | 
|  | 497 | iov[0].iov_len = 1; | 
|  | 498 | msg.msg_iov = iov; | 
|  | 499 | msg.msg_iovlen = 1; | 
|  | 500 |  | 
|  | 501 | ssize_t result = sendmsg(peerProxy->fd->fd, &msg, 0); | 
|  | 502 |  | 
|  | 503 | if (result < 0) { | 
|  | 504 | peerProxyHandleError(peerProxy, "sendmsg"); | 
|  | 505 | } else { | 
|  | 506 | // Success. Queue up the next packet. | 
|  | 507 | peerProxyNextPacket(peerProxy); | 
|  | 508 |  | 
|  | 509 | } | 
|  | 510 | } | 
|  | 511 |  | 
|  | 512 | /** | 
|  | 513 | * Writes some outgoing data. | 
|  | 514 | */ | 
|  | 515 | static void peerProxyWrite(SelectableFd* fd) { | 
|  | 516 | // TODO: Try to write header and body with one system call. | 
|  | 517 |  | 
|  | 518 | PeerProxy* peerProxy = (PeerProxy*) fd->data; | 
|  | 519 | OutgoingPacket* current = peerProxy->currentPacket; | 
|  | 520 |  | 
|  | 521 | if (current == NULL) { | 
|  | 522 | // We have nothing left to write. | 
|  | 523 | return; | 
|  | 524 | } | 
|  | 525 |  | 
|  | 526 | // Write the header. | 
|  | 527 | Buffer* outgoingHeader = &peerProxy->outgoingHeader; | 
|  | 528 | bool headerWritten = bufferWriteComplete(outgoingHeader); | 
|  | 529 | if (!headerWritten) { | 
|  | 530 | LOGD("Writing header..."); | 
|  | 531 | headerWritten = peerProxyWriteFromBuffer(peerProxy, outgoingHeader); | 
|  | 532 | if (headerWritten) { | 
|  | 533 | LOGD("Header written."); | 
|  | 534 | } | 
|  | 535 | } | 
|  | 536 |  | 
|  | 537 | // Write body. | 
|  | 538 | if (headerWritten) { | 
|  | 539 | PacketType type = current->header.type; | 
|  | 540 | switch (type) { | 
|  | 541 | case CONNECTION: | 
|  | 542 | peerProxyWriteConnection(peerProxy); | 
|  | 543 | break; | 
|  | 544 | case BYTES: | 
|  | 545 | peerProxyWriteBytes(peerProxy); | 
|  | 546 | break; | 
|  | 547 | case CONNECTION_REQUEST: | 
|  | 548 | case CONNECTION_ERROR: | 
|  | 549 | // These packets consist solely of a header. | 
|  | 550 | peerProxyNextPacket(peerProxy); | 
|  | 551 | break; | 
|  | 552 | default: | 
|  | 553 | LOG_ALWAYS_FATAL("Unknown packet type: %d", type); | 
|  | 554 | } | 
|  | 555 | } | 
|  | 556 | } | 
|  | 557 |  | 
|  | 558 | /** | 
|  | 559 | * Sets up a peer proxy's fd before we try to select() it. | 
|  | 560 | */ | 
|  | 561 | static void peerProxyBeforeSelect(SelectableFd* fd) { | 
|  | 562 | LOGD("Before select..."); | 
|  | 563 |  | 
|  | 564 | PeerProxy* peerProxy = (PeerProxy*) fd->data; | 
|  | 565 |  | 
|  | 566 | peerLock(peerProxy->peer); | 
|  | 567 | bool hasPackets = peerProxy->currentPacket != NULL; | 
|  | 568 | peerUnlock(peerProxy->peer); | 
|  | 569 |  | 
|  | 570 | if (hasPackets) { | 
|  | 571 | LOGD("Packets found. Setting onWritable()."); | 
|  | 572 |  | 
|  | 573 | fd->onWritable = &peerProxyWrite; | 
|  | 574 | } else { | 
|  | 575 | // We have nothing to write. | 
|  | 576 | fd->onWritable = NULL; | 
|  | 577 | } | 
|  | 578 | } | 
|  | 579 |  | 
|  | 580 | /** Prepare to read bytes from the peer. */ | 
|  | 581 | static void peerProxyExpectBytes(PeerProxy* peerProxy, Header* header) { | 
|  | 582 | LOGD("Expecting %d bytes.", header->size); | 
|  | 583 |  | 
|  | 584 | peerProxy->inputState = READING_BYTES; | 
|  | 585 | if (bufferPrepareForRead(peerProxy->inputBuffer, header->size) == -1) { | 
|  | 586 | LOGW("Couldn't allocate memory for incoming data. Size: %u", | 
|  | 587 | (unsigned int) header->size); | 
|  | 588 |  | 
|  | 589 | // TODO: Ignore the packet and log a warning? | 
|  | 590 | peerProxyKill(peerProxy, false); | 
|  | 591 | } | 
|  | 592 | } | 
|  | 593 |  | 
|  | 594 | /** | 
|  | 595 | * Gets a peer proxy for the given ID. Creates a peer proxy if necessary. | 
|  | 596 | * Sends a connection request to the master if desired. | 
|  | 597 | * | 
|  | 598 | * Returns NULL if an error occurs. Sets errno to EHOSTDOWN if the peer died | 
|  | 599 | * or ENOMEM if memory couldn't be allocated. | 
|  | 600 | */ | 
|  | 601 | static PeerProxy* peerProxyGetOrCreate(Peer* peer, pid_t pid, | 
|  | 602 | bool requestConnection) { | 
|  | 603 | if (pid == peer->pid) { | 
|  | 604 | errno = EINVAL; | 
|  | 605 | return NULL; | 
|  | 606 | } | 
|  | 607 |  | 
|  | 608 | if (peerIsDead(peer, pid)) { | 
|  | 609 | errno = EHOSTDOWN; | 
|  | 610 | return NULL; | 
|  | 611 | } | 
|  | 612 |  | 
|  | 613 | PeerProxy* peerProxy = hashmapGet(peer->peerProxies, &pid); | 
|  | 614 | if (peerProxy != NULL) { | 
|  | 615 | return peerProxy; | 
|  | 616 | } | 
|  | 617 |  | 
|  | 618 | // If this is the master peer, we already know about all peers. | 
|  | 619 | if (peer->master) { | 
|  | 620 | errno = EHOSTDOWN; | 
|  | 621 | return NULL; | 
|  | 622 | } | 
|  | 623 |  | 
|  | 624 | // Try to create a peer proxy. | 
|  | 625 | Credentials credentials; | 
|  | 626 | credentials.pid = pid; | 
|  | 627 |  | 
|  | 628 | // Fake gid and uid until we have the real thing. The real creds are | 
|  | 629 | // filled in by masterProxyExpectConnection(). These fake creds will | 
|  | 630 | // never be exposed to the user. | 
|  | 631 | credentials.uid = 0; | 
|  | 632 | credentials.gid = 0; | 
|  | 633 |  | 
|  | 634 | // Make sure we can allocate the connection request packet. | 
|  | 635 | OutgoingPacket* packet = NULL; | 
|  | 636 | if (requestConnection) { | 
|  | 637 | packet = calloc(1, sizeof(OutgoingPacket)); | 
|  | 638 | if (packet == NULL) { | 
|  | 639 | errno = ENOMEM; | 
|  | 640 | return NULL; | 
|  | 641 | } | 
|  | 642 |  | 
|  | 643 | packet->header.type = CONNECTION_REQUEST; | 
|  | 644 | packet->header.credentials = credentials; | 
|  | 645 | packet->free = &outgoingPacketFree; | 
|  | 646 | } | 
|  | 647 |  | 
|  | 648 | peerProxy = peerProxyCreate(peer, credentials); | 
|  | 649 | if (peerProxy == NULL) { | 
|  | 650 | free(packet); | 
|  | 651 | errno = ENOMEM; | 
|  | 652 | return NULL; | 
|  | 653 | } else { | 
|  | 654 | // Send a connection request to the master. | 
|  | 655 | if (requestConnection) { | 
|  | 656 | PeerProxy* masterProxy = peer->masterProxy; | 
|  | 657 | peerProxyEnqueueOutgoingPacket(masterProxy, packet); | 
|  | 658 | } | 
|  | 659 |  | 
|  | 660 | return peerProxy; | 
|  | 661 | } | 
|  | 662 | } | 
|  | 663 |  | 
|  | 664 | /** | 
|  | 665 | * Switches the master peer proxy into a state where it's waiting for a | 
|  | 666 | * connection from the master. | 
|  | 667 | */ | 
|  | 668 | static void masterProxyExpectConnection(PeerProxy* masterProxy, | 
|  | 669 | Header* header) { | 
|  | 670 | // TODO: Restructure things so we don't need this check. | 
|  | 671 | // Verify that this really is the master. | 
|  | 672 | if (!masterProxy->master) { | 
|  | 673 | LOGW("Non-master process %d tried to send us a connection.", | 
|  | 674 | masterProxy->credentials.pid); | 
|  | 675 | // Kill off the evil peer. | 
|  | 676 | peerProxyKill(masterProxy, false); | 
|  | 677 | return; | 
|  | 678 | } | 
|  | 679 |  | 
|  | 680 | masterProxy->inputState = ACCEPTING_CONNECTION; | 
|  | 681 | Peer* localPeer = masterProxy->peer; | 
|  | 682 |  | 
|  | 683 | // Create a peer proxy so we have somewhere to stash the creds. | 
|  | 684 | // See if we already have a proxy set up. | 
|  | 685 | pid_t pid = header->credentials.pid; | 
|  | 686 | peerLock(localPeer); | 
|  | 687 | PeerProxy* peerProxy = peerProxyGetOrCreate(localPeer, pid, false); | 
|  | 688 | if (peerProxy == NULL) { | 
|  | 689 | LOGW("Peer proxy creation failed: %s", strerror(errno)); | 
|  | 690 | } else { | 
|  | 691 | // Fill in full credentials. | 
|  | 692 | peerProxy->credentials = header->credentials; | 
|  | 693 | } | 
|  | 694 | peerUnlock(localPeer); | 
|  | 695 |  | 
|  | 696 | // Keep track of which peer proxy we're accepting a connection for. | 
|  | 697 | masterProxy->connecting = peerProxy; | 
|  | 698 | } | 
|  | 699 |  | 
|  | 700 | /** | 
|  | 701 | * Reads input from a peer process. | 
|  | 702 | */ | 
|  | 703 | static void peerProxyRead(SelectableFd* fd); | 
|  | 704 |  | 
|  | 705 | /** Sets up fd callbacks. */ | 
|  | 706 | static void peerProxySetFd(PeerProxy* peerProxy, SelectableFd* fd) { | 
|  | 707 | peerProxy->fd = fd; | 
|  | 708 | fd->data = peerProxy; | 
|  | 709 | fd->onReadable = &peerProxyRead; | 
|  | 710 | fd->beforeSelect = &peerProxyBeforeSelect; | 
|  | 711 |  | 
|  | 712 | // Make the socket non-blocking. | 
|  | 713 | setNonBlocking(fd->fd); | 
|  | 714 | } | 
|  | 715 |  | 
|  | 716 | /** | 
|  | 717 | * Accepts a connection sent by the master proxy. | 
|  | 718 | */ | 
|  | 719 | static void masterProxyAcceptConnection(PeerProxy* masterProxy) { | 
|  | 720 | struct msghdr msg; | 
|  | 721 | struct iovec iov[1]; | 
|  | 722 | ssize_t size; | 
|  | 723 | char ignored; | 
|  | 724 | int incomingFd; | 
|  | 725 |  | 
|  | 726 | // TODO: Reuse code which writes the connection. Who the heck designed | 
|  | 727 | // this API anyway? | 
|  | 728 | union { | 
|  | 729 | struct cmsghdr cm; | 
|  | 730 | char control[CMSG_SPACE(sizeof(int))]; | 
|  | 731 | } control_un; | 
|  | 732 | struct cmsghdr *cmptr; | 
|  | 733 | msg.msg_control = control_un.control; | 
|  | 734 | msg.msg_controllen = sizeof(control_un.control); | 
|  | 735 |  | 
|  | 736 | msg.msg_name = NULL; | 
|  | 737 | msg.msg_namelen = 0; | 
|  | 738 |  | 
|  | 739 | // We sent 1 byte of data so we can detect EOF. | 
|  | 740 | iov[0].iov_base = &ignored; | 
|  | 741 | iov[0].iov_len = 1; | 
|  | 742 | msg.msg_iov = iov; | 
|  | 743 | msg.msg_iovlen = 1; | 
|  | 744 |  | 
|  | 745 | size = recvmsg(masterProxy->fd->fd, &msg, 0); | 
|  | 746 | if (size < 0) { | 
|  | 747 | if (errno == EINTR) { | 
|  | 748 | // Log interruptions but otherwise ignore them. | 
|  | 749 | LOGW("recvmsg() interrupted."); | 
|  | 750 | return; | 
|  | 751 | } else if (errno == EAGAIN) { | 
|  | 752 | // Keep waiting for the connection. | 
|  | 753 | return; | 
|  | 754 | } else { | 
|  | 755 | LOG_ALWAYS_FATAL("Error reading connection from master: %s", | 
|  | 756 | strerror(errno)); | 
|  | 757 | } | 
|  | 758 | } else if (size == 0) { | 
|  | 759 | // EOF. | 
|  | 760 | LOG_ALWAYS_FATAL("Received EOF from master."); | 
|  | 761 | } | 
|  | 762 |  | 
|  | 763 | // Extract fd from message. | 
|  | 764 | if ((cmptr = CMSG_FIRSTHDR(&msg)) != NULL | 
|  | 765 | && cmptr->cmsg_len == CMSG_LEN(sizeof(int))) { | 
|  | 766 | if (cmptr->cmsg_level != SOL_SOCKET) { | 
|  | 767 | LOG_ALWAYS_FATAL("Expected SOL_SOCKET."); | 
|  | 768 | } | 
|  | 769 | if (cmptr->cmsg_type != SCM_RIGHTS) { | 
|  | 770 | LOG_ALWAYS_FATAL("Expected SCM_RIGHTS."); | 
|  | 771 | } | 
|  | 772 | incomingFd = *((int*) CMSG_DATA(cmptr)); | 
|  | 773 | } else { | 
|  | 774 | LOG_ALWAYS_FATAL("Expected fd."); | 
|  | 775 | } | 
|  | 776 |  | 
|  | 777 | // The peer proxy this connection is for. | 
|  | 778 | PeerProxy* peerProxy = masterProxy->connecting; | 
|  | 779 | if (peerProxy == NULL) { | 
|  | 780 | LOGW("Received connection for unknown peer."); | 
|  | 781 | closeWithWarning(incomingFd); | 
|  | 782 | } else { | 
|  | 783 | Peer* peer = masterProxy->peer; | 
|  | 784 |  | 
|  | 785 | SelectableFd* selectableFd = selectorAdd(peer->selector, incomingFd); | 
|  | 786 | if (selectableFd == NULL) { | 
|  | 787 | LOGW("Error adding fd to selector for %d.", | 
|  | 788 | peerProxy->credentials.pid); | 
|  | 789 | closeWithWarning(incomingFd); | 
|  | 790 | peerProxyKill(peerProxy, false); | 
|  | 791 | } | 
|  | 792 |  | 
|  | 793 | peerProxySetFd(peerProxy, selectableFd); | 
|  | 794 | } | 
|  | 795 |  | 
|  | 796 | peerProxyExpectHeader(masterProxy); | 
|  | 797 | } | 
|  | 798 |  | 
|  | 799 | /** | 
|  | 800 | * Frees an outgoing packet containing a connection. | 
|  | 801 | */ | 
|  | 802 | static void outgoingPacketFreeSocket(OutgoingPacket* packet) { | 
|  | 803 | closeWithWarning(packet->socket); | 
|  | 804 | outgoingPacketFree(packet); | 
|  | 805 | } | 
|  | 806 |  | 
|  | 807 | /** | 
|  | 808 | * Connects two known peers. | 
|  | 809 | */ | 
|  | 810 | static void masterConnectPeers(PeerProxy* peerA, PeerProxy* peerB) { | 
|  | 811 | int sockets[2]; | 
|  | 812 | int result = socketpair(AF_LOCAL, SOCK_STREAM, 0, sockets); | 
|  | 813 | if (result == -1) { | 
|  | 814 | LOGW("socketpair() error: %s", strerror(errno)); | 
|  | 815 | // TODO: Send CONNECTION_FAILED packets to peers. | 
|  | 816 | return; | 
|  | 817 | } | 
|  | 818 |  | 
|  | 819 | OutgoingPacket* packetA = calloc(1, sizeof(OutgoingPacket)); | 
|  | 820 | OutgoingPacket* packetB = calloc(1, sizeof(OutgoingPacket)); | 
|  | 821 | if (packetA == NULL || packetB == NULL) { | 
|  | 822 | free(packetA); | 
|  | 823 | free(packetB); | 
|  | 824 | LOGW("malloc() error. Failed to tell process %d that process %d is" | 
|  | 825 | " dead.", peerA->credentials.pid, peerB->credentials.pid); | 
|  | 826 | return; | 
|  | 827 | } | 
|  | 828 |  | 
|  | 829 | packetA->header.type = CONNECTION; | 
|  | 830 | packetB->header.type = CONNECTION; | 
|  | 831 |  | 
|  | 832 | packetA->header.credentials = peerB->credentials; | 
|  | 833 | packetB->header.credentials = peerA->credentials; | 
|  | 834 |  | 
|  | 835 | packetA->socket = sockets[0]; | 
|  | 836 | packetB->socket = sockets[1]; | 
|  | 837 |  | 
|  | 838 | packetA->free = &outgoingPacketFreeSocket; | 
|  | 839 | packetB->free = &outgoingPacketFreeSocket; | 
|  | 840 |  | 
|  | 841 | peerLock(peerA->peer); | 
|  | 842 | peerProxyEnqueueOutgoingPacket(peerA, packetA); | 
|  | 843 | peerProxyEnqueueOutgoingPacket(peerB, packetB); | 
|  | 844 | peerUnlock(peerA->peer); | 
|  | 845 | } | 
|  | 846 |  | 
|  | 847 | /** | 
|  | 848 | * Informs a peer that the peer they're trying to connect to couldn't be | 
|  | 849 | * found. | 
|  | 850 | */ | 
|  | 851 | static void masterReportConnectionError(PeerProxy* peerProxy, | 
|  | 852 | Credentials credentials) { | 
|  | 853 | OutgoingPacket* packet = calloc(1, sizeof(OutgoingPacket)); | 
|  | 854 | if (packet == NULL) { | 
|  | 855 | LOGW("malloc() error. Failed to tell process %d that process %d is" | 
|  | 856 | " dead.", peerProxy->credentials.pid, credentials.pid); | 
|  | 857 | return; | 
|  | 858 | } | 
|  | 859 |  | 
|  | 860 | packet->header.type = CONNECTION_ERROR; | 
|  | 861 | packet->header.credentials = credentials; | 
|  | 862 | packet->free = &outgoingPacketFree; | 
|  | 863 |  | 
|  | 864 | peerProxyLockAndEnqueueOutgoingPacket(peerProxy, packet); | 
|  | 865 | } | 
|  | 866 |  | 
|  | 867 | /** | 
|  | 868 | * Handles a request to be connected to another peer. | 
|  | 869 | */ | 
|  | 870 | static void masterHandleConnectionRequest(PeerProxy* peerProxy, | 
|  | 871 | Header* header) { | 
|  | 872 | Peer* master = peerProxy->peer; | 
|  | 873 | pid_t targetPid = header->credentials.pid; | 
|  | 874 | if (!hashmapContainsKey(peerProxy->connections, &targetPid)) { | 
|  | 875 | // We haven't connected these peers yet. | 
|  | 876 | PeerProxy* targetPeer | 
|  | 877 | = (PeerProxy*) hashmapGet(master->peerProxies, &targetPid); | 
|  | 878 | if (targetPeer == NULL) { | 
|  | 879 | // Unknown process. | 
|  | 880 | masterReportConnectionError(peerProxy, header->credentials); | 
|  | 881 | } else { | 
|  | 882 | masterConnectPeers(peerProxy, targetPeer); | 
|  | 883 | } | 
|  | 884 | } | 
|  | 885 |  | 
|  | 886 | // This packet is complete. Get ready for the next one. | 
|  | 887 | peerProxyExpectHeader(peerProxy); | 
|  | 888 | } | 
|  | 889 |  | 
|  | 890 | /** | 
|  | 891 | * The master told us this peer is dead. | 
|  | 892 | */ | 
|  | 893 | static void masterProxyHandleConnectionError(PeerProxy* masterProxy, | 
|  | 894 | Header* header) { | 
|  | 895 | Peer* peer = masterProxy->peer; | 
|  | 896 |  | 
|  | 897 | // Look up the peer proxy. | 
|  | 898 | pid_t pid = header->credentials.pid; | 
|  | 899 | PeerProxy* peerProxy = NULL; | 
|  | 900 | peerLock(peer); | 
|  | 901 | peerProxy = hashmapGet(peer->peerProxies, &pid); | 
|  | 902 | peerUnlock(peer); | 
|  | 903 |  | 
|  | 904 | if (peerProxy != NULL) { | 
|  | 905 | LOGI("Couldn't connect to %d.", pid); | 
|  | 906 | peerProxyKill(peerProxy, false); | 
|  | 907 | } else { | 
|  | 908 | LOGW("Peer proxy for %d not found. This shouldn't happen.", pid); | 
|  | 909 | } | 
|  | 910 |  | 
|  | 911 | peerProxyExpectHeader(masterProxy); | 
|  | 912 | } | 
|  | 913 |  | 
|  | 914 | /** | 
|  | 915 | * Handles a packet header. | 
|  | 916 | */ | 
|  | 917 | static void peerProxyHandleHeader(PeerProxy* peerProxy, Header* header) { | 
|  | 918 | switch (header->type) { | 
|  | 919 | case CONNECTION_REQUEST: | 
|  | 920 | masterHandleConnectionRequest(peerProxy, header); | 
|  | 921 | break; | 
|  | 922 | case CONNECTION: | 
|  | 923 | masterProxyExpectConnection(peerProxy, header); | 
|  | 924 | break; | 
|  | 925 | case CONNECTION_ERROR: | 
|  | 926 | masterProxyHandleConnectionError(peerProxy, header); | 
|  | 927 | break; | 
|  | 928 | case BYTES: | 
|  | 929 | peerProxyExpectBytes(peerProxy, header); | 
|  | 930 | break; | 
|  | 931 | default: | 
|  | 932 | LOGW("Invalid packet type from %d: %d", peerProxy->credentials.pid, | 
|  | 933 | header->type); | 
|  | 934 | peerProxyKill(peerProxy, false); | 
|  | 935 | } | 
|  | 936 | } | 
|  | 937 |  | 
|  | 938 | /** | 
|  | 939 | * Buffers input sent by peer. May be called multiple times until the entire | 
|  | 940 | * buffer is filled. Returns true when the buffer is full. | 
|  | 941 | */ | 
|  | 942 | static bool peerProxyBufferInput(PeerProxy* peerProxy) { | 
|  | 943 | Buffer* in = peerProxy->inputBuffer; | 
|  | 944 | ssize_t size = bufferRead(in, peerProxy->fd->fd); | 
|  | 945 | if (size < 0) { | 
|  | 946 | peerProxyHandleError(peerProxy, "read"); | 
|  | 947 | return false; | 
|  | 948 | } else if (size == 0) { | 
|  | 949 | // EOF. | 
|  | 950 | LOGI("EOF"); | 
|  | 951 | peerProxyKill(peerProxy, false); | 
|  | 952 | return false; | 
|  | 953 | } else if (bufferReadComplete(in)) { | 
|  | 954 | // We're done! | 
|  | 955 | return true; | 
|  | 956 | } else { | 
|  | 957 | // Continue reading. | 
|  | 958 | return false; | 
|  | 959 | } | 
|  | 960 | } | 
|  | 961 |  | 
|  | 962 | /** | 
|  | 963 | * Reads input from a peer process. | 
|  | 964 | */ | 
|  | 965 | static void peerProxyRead(SelectableFd* fd) { | 
|  | 966 | LOGD("Reading..."); | 
|  | 967 | PeerProxy* peerProxy = (PeerProxy*) fd->data; | 
|  | 968 | int state = peerProxy->inputState; | 
|  | 969 | Buffer* in = peerProxy->inputBuffer; | 
|  | 970 | switch (state) { | 
|  | 971 | case READING_HEADER: | 
|  | 972 | if (peerProxyBufferInput(peerProxy)) { | 
|  | 973 | LOGD("Header read."); | 
|  | 974 | // We've read the complete header. | 
|  | 975 | Header* header = (Header*) in->data; | 
|  | 976 | peerProxyHandleHeader(peerProxy, header); | 
|  | 977 | } | 
|  | 978 | break; | 
|  | 979 | case READING_BYTES: | 
|  | 980 | LOGD("Reading bytes..."); | 
|  | 981 | if (peerProxyBufferInput(peerProxy)) { | 
|  | 982 | LOGD("Bytes read."); | 
|  | 983 | // We have the complete packet. Notify bytes listener. | 
|  | 984 | peerProxy->peer->onBytes(peerProxy->credentials, | 
|  | 985 | in->data, in->size); | 
|  | 986 |  | 
|  | 987 | // Get ready for the next packet. | 
|  | 988 | peerProxyExpectHeader(peerProxy); | 
|  | 989 | } | 
|  | 990 | break; | 
|  | 991 | case ACCEPTING_CONNECTION: | 
|  | 992 | masterProxyAcceptConnection(peerProxy); | 
|  | 993 | break; | 
|  | 994 | default: | 
|  | 995 | LOG_ALWAYS_FATAL("Unknown state: %d", state); | 
|  | 996 | } | 
|  | 997 | } | 
|  | 998 |  | 
|  | 999 | static PeerProxy* peerProxyCreate(Peer* peer, Credentials credentials) { | 
|  | 1000 | PeerProxy* peerProxy = calloc(1, sizeof(PeerProxy)); | 
|  | 1001 | if (peerProxy == NULL) { | 
|  | 1002 | return NULL; | 
|  | 1003 | } | 
|  | 1004 |  | 
|  | 1005 | peerProxy->inputBuffer = bufferCreate(sizeof(Header)); | 
|  | 1006 | if (peerProxy->inputBuffer == NULL) { | 
|  | 1007 | free(peerProxy); | 
|  | 1008 | return NULL; | 
|  | 1009 | } | 
|  | 1010 |  | 
|  | 1011 | peerProxy->peer = peer; | 
|  | 1012 | peerProxy->credentials = credentials; | 
|  | 1013 |  | 
|  | 1014 | // Initial state == expecting a header. | 
|  | 1015 | peerProxyExpectHeader(peerProxy); | 
|  | 1016 |  | 
|  | 1017 | // Add this proxy to the map. Make sure the key points to the stable memory | 
|  | 1018 | // inside of the peer proxy itself. | 
|  | 1019 | pid_t* pid = &(peerProxy->credentials.pid); | 
|  | 1020 | hashmapPut(peer->peerProxies, pid, peerProxy); | 
|  | 1021 | return peerProxy; | 
|  | 1022 | } | 
|  | 1023 |  | 
|  | 1024 | /** Accepts a connection to the master peer. */ | 
|  | 1025 | static void masterAcceptConnection(SelectableFd* listenerFd) { | 
|  | 1026 | // Accept connection. | 
|  | 1027 | int socket = accept(listenerFd->fd, NULL, NULL); | 
|  | 1028 | if (socket == -1) { | 
|  | 1029 | LOGW("accept() error: %s", strerror(errno)); | 
|  | 1030 | return; | 
|  | 1031 | } | 
|  | 1032 |  | 
|  | 1033 | LOGD("Accepted connection as fd %d.", socket); | 
|  | 1034 |  | 
|  | 1035 | // Get credentials. | 
|  | 1036 | Credentials credentials; | 
|  | 1037 | struct ucred ucredentials; | 
|  | 1038 | socklen_t credentialsSize = sizeof(struct ucred); | 
|  | 1039 | int result = getsockopt(socket, SOL_SOCKET, SO_PEERCRED, | 
|  | 1040 | &ucredentials, &credentialsSize); | 
|  | 1041 | // We might want to verify credentialsSize. | 
|  | 1042 | if (result == -1) { | 
|  | 1043 | LOGW("getsockopt() error: %s", strerror(errno)); | 
|  | 1044 | closeWithWarning(socket); | 
|  | 1045 | return; | 
|  | 1046 | } | 
|  | 1047 |  | 
|  | 1048 | // Copy values into our own structure so we know we have the types right. | 
|  | 1049 | credentials.pid = ucredentials.pid; | 
|  | 1050 | credentials.uid = ucredentials.uid; | 
|  | 1051 | credentials.gid = ucredentials.gid; | 
|  | 1052 |  | 
|  | 1053 | LOGI("Accepted connection from process %d.", credentials.pid); | 
|  | 1054 |  | 
|  | 1055 | Peer* masterPeer = (Peer*) listenerFd->data; | 
|  | 1056 |  | 
|  | 1057 | peerLock(masterPeer); | 
|  | 1058 |  | 
|  | 1059 | // Make sure we don't already have a connection from that process. | 
|  | 1060 | PeerProxy* peerProxy | 
|  | 1061 | = hashmapGet(masterPeer->peerProxies, &credentials.pid); | 
|  | 1062 | if (peerProxy != NULL) { | 
|  | 1063 | peerUnlock(masterPeer); | 
|  | 1064 | LOGW("Alread connected to process %d.", credentials.pid); | 
|  | 1065 | closeWithWarning(socket); | 
|  | 1066 | return; | 
|  | 1067 | } | 
|  | 1068 |  | 
|  | 1069 | // Add connection to the selector. | 
|  | 1070 | SelectableFd* socketFd = selectorAdd(masterPeer->selector, socket); | 
|  | 1071 | if (socketFd == NULL) { | 
|  | 1072 | peerUnlock(masterPeer); | 
|  | 1073 | LOGW("malloc() failed."); | 
|  | 1074 | closeWithWarning(socket); | 
|  | 1075 | return; | 
|  | 1076 | } | 
|  | 1077 |  | 
|  | 1078 | // Create a peer proxy. | 
|  | 1079 | peerProxy = peerProxyCreate(masterPeer, credentials); | 
|  | 1080 | peerUnlock(masterPeer); | 
|  | 1081 | if (peerProxy == NULL) { | 
|  | 1082 | LOGW("malloc() failed."); | 
|  | 1083 | socketFd->remove = true; | 
|  | 1084 | closeWithWarning(socket); | 
|  | 1085 | } | 
|  | 1086 | peerProxy->connections = hashmapCreate(10, &pidHash, &pidEquals); | 
|  | 1087 | peerProxySetFd(peerProxy, socketFd); | 
|  | 1088 | } | 
|  | 1089 |  | 
|  | 1090 | /** | 
|  | 1091 | * Creates the local peer. | 
|  | 1092 | */ | 
|  | 1093 | static Peer* peerCreate() { | 
|  | 1094 | Peer* peer = calloc(1, sizeof(Peer)); | 
|  | 1095 | if (peer == NULL) { | 
|  | 1096 | LOG_ALWAYS_FATAL("malloc() error."); | 
|  | 1097 | } | 
|  | 1098 | peer->peerProxies = hashmapCreate(10, &pidHash, &pidEquals); | 
|  | 1099 | peer->selector = selectorCreate(); | 
|  | 1100 |  | 
|  | 1101 | pthread_mutexattr_t attributes; | 
|  | 1102 | if (pthread_mutexattr_init(&attributes) != 0) { | 
|  | 1103 | LOG_ALWAYS_FATAL("pthread_mutexattr_init() error."); | 
|  | 1104 | } | 
|  | 1105 | if (pthread_mutexattr_settype(&attributes, PTHREAD_MUTEX_RECURSIVE) != 0) { | 
|  | 1106 | LOG_ALWAYS_FATAL("pthread_mutexattr_settype() error."); | 
|  | 1107 | } | 
|  | 1108 | if (pthread_mutex_init(&peer->mutex, &attributes) != 0) { | 
|  | 1109 | LOG_ALWAYS_FATAL("pthread_mutex_init() error."); | 
|  | 1110 | } | 
|  | 1111 |  | 
|  | 1112 | peer->pid = getpid(); | 
|  | 1113 | return peer; | 
|  | 1114 | } | 
|  | 1115 |  | 
|  | 1116 | /** The local peer. */ | 
|  | 1117 | static Peer* localPeer; | 
|  | 1118 |  | 
|  | 1119 | /** Frees a packet of bytes. */ | 
|  | 1120 | static void outgoingPacketFreeBytes(OutgoingPacket* packet) { | 
|  | 1121 | LOGD("Freeing outgoing packet."); | 
|  | 1122 | bufferFree(packet->bytes); | 
|  | 1123 | free(packet); | 
|  | 1124 | } | 
|  | 1125 |  | 
|  | 1126 | /** | 
|  | 1127 | * Sends a packet of bytes to a remote peer. Returns 0 on success. | 
|  | 1128 | * | 
|  | 1129 | * Returns -1 if an error occurs. Sets errno to ENOMEM if memory couldn't be | 
|  | 1130 | * allocated. Sets errno to EHOSTDOWN if the peer died recently. Sets errno | 
|  | 1131 | * to EINVAL if pid is the same as the local pid. | 
|  | 1132 | */ | 
|  | 1133 | int peerSendBytes(pid_t pid, const char* bytes, size_t size) { | 
|  | 1134 | Peer* peer = localPeer; | 
|  | 1135 | assert(peer != NULL); | 
|  | 1136 |  | 
|  | 1137 | OutgoingPacket* packet = calloc(1, sizeof(OutgoingPacket)); | 
|  | 1138 | if (packet == NULL) { | 
|  | 1139 | errno = ENOMEM; | 
|  | 1140 | return -1; | 
|  | 1141 | } | 
|  | 1142 |  | 
|  | 1143 | Buffer* copy = bufferCreate(size); | 
|  | 1144 | if (copy == NULL) { | 
|  | 1145 | free(packet); | 
|  | 1146 | errno = ENOMEM; | 
|  | 1147 | return -1; | 
|  | 1148 | } | 
|  | 1149 |  | 
|  | 1150 | // Copy data. | 
|  | 1151 | memcpy(copy->data, bytes, size); | 
|  | 1152 | copy->size = size; | 
|  | 1153 |  | 
|  | 1154 | packet->bytes = copy; | 
|  | 1155 | packet->header.type = BYTES; | 
|  | 1156 | packet->header.size = size; | 
|  | 1157 | packet->free = outgoingPacketFreeBytes; | 
|  | 1158 | bufferPrepareForWrite(packet->bytes); | 
|  | 1159 |  | 
|  | 1160 | peerLock(peer); | 
|  | 1161 |  | 
|  | 1162 | PeerProxy* peerProxy = peerProxyGetOrCreate(peer, pid, true); | 
|  | 1163 | if (peerProxy == NULL) { | 
|  | 1164 | // The peer is already dead or we couldn't alloc memory. Either way, | 
|  | 1165 | // errno is set. | 
|  | 1166 | peerUnlock(peer); | 
|  | 1167 | packet->free(packet); | 
|  | 1168 | return -1; | 
|  | 1169 | } else { | 
|  | 1170 | peerProxyEnqueueOutgoingPacket(peerProxy, packet); | 
|  | 1171 | peerUnlock(peer); | 
|  | 1172 | selectorWakeUp(peer->selector); | 
|  | 1173 | return 0; | 
|  | 1174 | } | 
|  | 1175 | } | 
|  | 1176 |  | 
|  | 1177 | /** Keeps track of how to free shared bytes. */ | 
|  | 1178 | typedef struct { | 
|  | 1179 | void (*free)(void* context); | 
|  | 1180 | void* context; | 
|  | 1181 | } SharedBytesFreer; | 
|  | 1182 |  | 
|  | 1183 | /** Frees shared bytes. */ | 
|  | 1184 | static void outgoingPacketFreeSharedBytes(OutgoingPacket* packet) { | 
|  | 1185 | SharedBytesFreer* sharedBytesFreer | 
|  | 1186 | = (SharedBytesFreer*) packet->context; | 
|  | 1187 | sharedBytesFreer->free(sharedBytesFreer->context); | 
|  | 1188 | free(sharedBytesFreer); | 
|  | 1189 | free(packet); | 
|  | 1190 | } | 
|  | 1191 |  | 
|  | 1192 | /** | 
|  | 1193 | * Sends a packet of bytes to a remote peer without copying the bytes. Calls | 
|  | 1194 | * free() with context after the bytes have been sent. | 
|  | 1195 | * | 
|  | 1196 | * Returns -1 if an error occurs. Sets errno to ENOMEM if memory couldn't be | 
|  | 1197 | * allocated. Sets errno to EHOSTDOWN if the peer died recently. Sets errno | 
|  | 1198 | * to EINVAL if pid is the same as the local pid. | 
|  | 1199 | */ | 
|  | 1200 | int peerSendSharedBytes(pid_t pid, char* bytes, size_t size, | 
|  | 1201 | void (*free)(void* context), void* context) { | 
|  | 1202 | Peer* peer = localPeer; | 
|  | 1203 | assert(peer != NULL); | 
|  | 1204 |  | 
|  | 1205 | OutgoingPacket* packet = calloc(1, sizeof(OutgoingPacket)); | 
|  | 1206 | if (packet == NULL) { | 
|  | 1207 | errno = ENOMEM; | 
|  | 1208 | return -1; | 
|  | 1209 | } | 
|  | 1210 |  | 
|  | 1211 | Buffer* wrapper = bufferWrap(bytes, size, size); | 
|  | 1212 | if (wrapper == NULL) { | 
|  | 1213 | free(packet); | 
|  | 1214 | errno = ENOMEM; | 
|  | 1215 | return -1; | 
|  | 1216 | } | 
|  | 1217 |  | 
|  | 1218 | SharedBytesFreer* sharedBytesFreer = malloc(sizeof(SharedBytesFreer)); | 
|  | 1219 | if (sharedBytesFreer == NULL) { | 
|  | 1220 | free(packet); | 
|  | 1221 | free(wrapper); | 
|  | 1222 | errno = ENOMEM; | 
|  | 1223 | return -1; | 
|  | 1224 | } | 
|  | 1225 | sharedBytesFreer->free = free; | 
|  | 1226 | sharedBytesFreer->context = context; | 
|  | 1227 |  | 
|  | 1228 | packet->bytes = wrapper; | 
|  | 1229 | packet->context = sharedBytesFreer; | 
|  | 1230 | packet->header.type = BYTES; | 
|  | 1231 | packet->header.size = size; | 
|  | 1232 | packet->free = &outgoingPacketFreeSharedBytes; | 
|  | 1233 | bufferPrepareForWrite(packet->bytes); | 
|  | 1234 |  | 
|  | 1235 | peerLock(peer); | 
|  | 1236 |  | 
|  | 1237 | PeerProxy* peerProxy = peerProxyGetOrCreate(peer, pid, true); | 
|  | 1238 | if (peerProxy == NULL) { | 
|  | 1239 | // The peer is already dead or we couldn't alloc memory. Either way, | 
|  | 1240 | // errno is set. | 
|  | 1241 | peerUnlock(peer); | 
|  | 1242 | packet->free(packet); | 
|  | 1243 | return -1; | 
|  | 1244 | } else { | 
|  | 1245 | peerProxyEnqueueOutgoingPacket(peerProxy, packet); | 
|  | 1246 | peerUnlock(peer); | 
|  | 1247 | selectorWakeUp(peer->selector); | 
|  | 1248 | return 0; | 
|  | 1249 | } | 
|  | 1250 | } | 
|  | 1251 |  | 
|  | 1252 | /** | 
|  | 1253 | * Starts the master peer. The master peer differs from other peers in that | 
|  | 1254 | * it is responsible for connecting the other peers. You can only have one | 
|  | 1255 | * master peer. | 
|  | 1256 | * | 
|  | 1257 | * Goes into an I/O loop and does not return. | 
|  | 1258 | */ | 
|  | 1259 | void masterPeerInitialize(BytesListener* bytesListener, | 
|  | 1260 | DeathListener* deathListener) { | 
|  | 1261 | // Create and bind socket. | 
|  | 1262 | int listenerSocket = socket(AF_LOCAL, SOCK_STREAM, 0); | 
|  | 1263 | if (listenerSocket == -1) { | 
|  | 1264 | LOG_ALWAYS_FATAL("socket() error: %s", strerror(errno)); | 
|  | 1265 | } | 
|  | 1266 | unlink(MASTER_PATH); | 
|  | 1267 | int result = bind(listenerSocket, (SocketAddress*) getMasterAddress(), | 
|  | 1268 | sizeof(UnixAddress)); | 
|  | 1269 | if (result == -1) { | 
|  | 1270 | LOG_ALWAYS_FATAL("bind() error: %s", strerror(errno)); | 
|  | 1271 | } | 
|  | 1272 |  | 
|  | 1273 | LOGD("Listener socket: %d",  listenerSocket); | 
|  | 1274 |  | 
|  | 1275 | // Queue up to 16 connections. | 
|  | 1276 | result = listen(listenerSocket, 16); | 
|  | 1277 | if (result != 0) { | 
|  | 1278 | LOG_ALWAYS_FATAL("listen() error: %s", strerror(errno)); | 
|  | 1279 | } | 
|  | 1280 |  | 
|  | 1281 | // Make socket non-blocking. | 
|  | 1282 | setNonBlocking(listenerSocket); | 
|  | 1283 |  | 
|  | 1284 | // Create the peer for this process. Fail if we already have one. | 
|  | 1285 | if (localPeer != NULL) { | 
|  | 1286 | LOG_ALWAYS_FATAL("Peer is already initialized."); | 
|  | 1287 | } | 
|  | 1288 | localPeer = peerCreate(); | 
|  | 1289 | if (localPeer == NULL) { | 
|  | 1290 | LOG_ALWAYS_FATAL("malloc() failed."); | 
|  | 1291 | } | 
|  | 1292 | localPeer->master = true; | 
|  | 1293 | localPeer->onBytes = bytesListener; | 
|  | 1294 | localPeer->onDeath = deathListener; | 
|  | 1295 |  | 
|  | 1296 | // Make listener socket selectable. | 
|  | 1297 | SelectableFd* listenerFd = selectorAdd(localPeer->selector, listenerSocket); | 
|  | 1298 | if (listenerFd == NULL) { | 
|  | 1299 | LOG_ALWAYS_FATAL("malloc() error."); | 
|  | 1300 | } | 
|  | 1301 | listenerFd->data = localPeer; | 
|  | 1302 | listenerFd->onReadable = &masterAcceptConnection; | 
|  | 1303 | } | 
|  | 1304 |  | 
|  | 1305 | /** | 
|  | 1306 | * Starts a local peer. | 
|  | 1307 | * | 
|  | 1308 | * Goes into an I/O loop and does not return. | 
|  | 1309 | */ | 
|  | 1310 | void peerInitialize(BytesListener* bytesListener, | 
|  | 1311 | DeathListener* deathListener) { | 
|  | 1312 | // Connect to master peer. | 
|  | 1313 | int masterSocket = socket(AF_LOCAL, SOCK_STREAM, 0); | 
|  | 1314 | if (masterSocket == -1) { | 
|  | 1315 | LOG_ALWAYS_FATAL("socket() error: %s", strerror(errno)); | 
|  | 1316 | } | 
|  | 1317 | int result = connect(masterSocket, (SocketAddress*) getMasterAddress(), | 
|  | 1318 | sizeof(UnixAddress)); | 
|  | 1319 | if (result != 0) { | 
|  | 1320 | LOG_ALWAYS_FATAL("connect() error: %s", strerror(errno)); | 
|  | 1321 | } | 
|  | 1322 |  | 
|  | 1323 | // Create the peer for this process. Fail if we already have one. | 
|  | 1324 | if (localPeer != NULL) { | 
|  | 1325 | LOG_ALWAYS_FATAL("Peer is already initialized."); | 
|  | 1326 | } | 
|  | 1327 | localPeer = peerCreate(); | 
|  | 1328 | if (localPeer == NULL) { | 
|  | 1329 | LOG_ALWAYS_FATAL("malloc() failed."); | 
|  | 1330 | } | 
|  | 1331 | localPeer->onBytes = bytesListener; | 
|  | 1332 | localPeer->onDeath = deathListener; | 
|  | 1333 |  | 
|  | 1334 | // Make connection selectable. | 
|  | 1335 | SelectableFd* masterFd = selectorAdd(localPeer->selector, masterSocket); | 
|  | 1336 | if (masterFd == NULL) { | 
|  | 1337 | LOG_ALWAYS_FATAL("malloc() error."); | 
|  | 1338 | } | 
|  | 1339 |  | 
|  | 1340 | // Create a peer proxy for the master peer. | 
|  | 1341 | PeerProxy* masterProxy = peerProxyCreate(localPeer, MASTER_CREDENTIALS); | 
|  | 1342 | if (masterProxy == NULL) { | 
|  | 1343 | LOG_ALWAYS_FATAL("malloc() error."); | 
|  | 1344 | } | 
|  | 1345 | peerProxySetFd(masterProxy, masterFd); | 
|  | 1346 | masterProxy->master = true; | 
|  | 1347 | localPeer->masterProxy = masterProxy; | 
|  | 1348 | } | 
|  | 1349 |  | 
|  | 1350 | /** Starts the master peer I/O loop. Doesn't return. */ | 
|  | 1351 | void peerLoop() { | 
|  | 1352 | assert(localPeer != NULL); | 
|  | 1353 |  | 
|  | 1354 | // Start selector. | 
|  | 1355 | selectorLoop(localPeer->selector); | 
|  | 1356 | } | 
|  | 1357 |  |