Files @ 48cedf26fcaa
Branch filter:

Location: CSY/reowolf/src/ffi/pseudo_socket_api.rs - annotation

48cedf26fcaa 10.9 KiB application/rls-services+xml Show Source Show as Raw Download as Raw
Christopher Esterhuyse
correctly checking for null message and addr out-pointers
4db4ea6f0eb3
6c04a99de862
3801521d486d
700221108e9f
700221108e9f
700221108e9f
700221108e9f
700221108e9f
700221108e9f
700221108e9f
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
6c04a99de862
6c04a99de862
bdcf814bde8c
700221108e9f
700221108e9f
700221108e9f
700221108e9f
700221108e9f
14c1a07d148a
700221108e9f
700221108e9f
700221108e9f
3801521d486d
3028e66928d3
700221108e9f
bdcf814bde8c
bdcf814bde8c
14c1a07d148a
14c1a07d148a
bdcf814bde8c
bdcf814bde8c
fdc328afed95
3028e66928d3
3028e66928d3
3028e66928d3
3028e66928d3
3028e66928d3
c8994576abce
c8994576abce
fdc328afed95
3801521d486d
700221108e9f
3801521d486d
700221108e9f
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
6c04a99de862
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
6c04a99de862
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
14c1a07d148a
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
7b9df91324ad
700221108e9f
3801521d486d
14c1a07d148a
bdcf814bde8c
3028e66928d3
14c1a07d148a
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
6c04a99de862
bdcf814bde8c
3801521d486d
14c1a07d148a
14c1a07d148a
1db6ec21a437
4db4ea6f0eb3
bdcf814bde8c
4db4ea6f0eb3
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
fdc328afed95
3801521d486d
fdc328afed95
fdc328afed95
fdc328afed95
fdc328afed95
3801521d486d
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
3801521d486d
700221108e9f
700221108e9f
14c1a07d148a
700221108e9f
700221108e9f
700221108e9f
700221108e9f
700221108e9f
3801521d486d
3801521d486d
3028e66928d3
3801521d486d
cef38284c738
700221108e9f
4db4ea6f0eb3
bdcf814bde8c
bdcf814bde8c
bdcf814bde8c
6c04a99de862
6c04a99de862
fdc328afed95
fdc328afed95
bdcf814bde8c
fdc328afed95
fdc328afed95
fdc328afed95
fdc328afed95
bdcf814bde8c
3801521d486d
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
3801521d486d
3801521d486d
3028e66928d3
3801521d486d
3801521d486d
3801521d486d
3801521d486d
3801521d486d
bdcf814bde8c
700221108e9f
bdcf814bde8c
6c04a99de862
6c04a99de862
6c04a99de862
6c04a99de862
7b9df91324ad
7b9df91324ad
6c04a99de862
3801521d486d
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
3801521d486d
3028e66928d3
3801521d486d
3801521d486d
3801521d486d
3028e66928d3
3028e66928d3
3801521d486d
3801521d486d
3801521d486d
3801521d486d
3801521d486d
6c04a99de862
6c04a99de862
3801521d486d
6c04a99de862
6c04a99de862
6c04a99de862
6c04a99de862
3801521d486d
3801521d486d
6c04a99de862
6c04a99de862
3801521d486d
3801521d486d
3028e66928d3
3801521d486d
3801521d486d
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
3801521d486d
3801521d486d
3801521d486d
3801521d486d
3801521d486d
3028e66928d3
3801521d486d
3801521d486d
3028e66928d3
3028e66928d3
3028e66928d3
3028e66928d3
3801521d486d
3801521d486d
3801521d486d
3801521d486d
3801521d486d
3801521d486d
b747c570a11c
b747c570a11c
b747c570a11c
3801521d486d
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
3801521d486d
3801521d486d
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
3028e66928d3
3028e66928d3
3801521d486d
3028e66928d3
3801521d486d
3801521d486d
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
3801521d486d
48cedf26fcaa
48cedf26fcaa
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
b747c570a11c
3801521d486d
3801521d486d
b747c570a11c
3801521d486d
3801521d486d
14c1a07d148a
14c1a07d148a
14c1a07d148a
14c1a07d148a
3028e66928d3
3028e66928d3
3801521d486d
3028e66928d3
3801521d486d
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
3801521d486d
3801521d486d
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
48cedf26fcaa
3801521d486d
48cedf26fcaa
3801521d486d
3801521d486d
6c04a99de862
bdcf814bde8c
use super::*;

use libc::{sockaddr, socklen_t};
use std::{
    collections::HashMap,
    ffi::c_void,
    net::{Ipv4Addr, SocketAddr, SocketAddrV4},
    os::raw::c_int,
    sync::RwLock,
};
///////////////////////////////////////////////////////////////////

struct FdAllocator {
    next: Option<c_int>,
    freed: Vec<c_int>,
}
struct ConnectorBound {
    connector: Connector,
    putter: PortId,
    getter: PortId,
}
struct ConnectorComplex {
    // invariants:
    // 1. connector is a upd-socket singleton
    // 2. putter and getter are ports in the native interface with the appropriate polarities
    // 3. connected_to always mirrors connector's single udp socket's connect addr. both are overwritten together.
    connected_to: Option<SocketAddr>,
    connector_bound: Option<ConnectorBound>,
}
#[derive(Default)]
struct CcMap {
    fd_to_cc: HashMap<c_int, RwLock<ConnectorComplex>>,
    fd_allocator: FdAllocator,
}
///////////////////////////////////////////////////////////////////
unsafe fn payload_from_raw(bytes_ptr: *const c_void, bytes_len: usize) -> Payload {
    let bytes_ptr = std::mem::transmute(bytes_ptr);
    let bytes = &*slice_from_raw_parts(bytes_ptr, bytes_len);
    Payload::from(bytes)
}
unsafe fn addr_from_raw(addr: *const sockaddr, addr_len: socklen_t) -> Option<SocketAddr> {
    os_socketaddr::OsSocketAddr::from_raw_parts(addr as _, addr_len as usize).into_addr()
}
fn dummy_peer_addr() -> SocketAddr {
    // SocketAddrV4::new isn't a constant-time func
    SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::new(127, 0, 0, 0), 8000))
}
impl Default for FdAllocator {
    fn default() -> Self {
        Self {
            next: Some(0), // positive values used only
            freed: vec![],
        }
    }
}
impl FdAllocator {
    fn alloc(&mut self) -> c_int {
        if let Some(fd) = self.freed.pop() {
            return fd;
        }
        if let Some(fd) = self.next {
            self.next = fd.checked_add(1);
            return fd;
        }
        panic!("No more Connector FDs to allocate!")
    }
    fn free(&mut self, fd: c_int) {
        self.freed.push(fd);
    }
}
lazy_static::lazy_static! {
    static ref CC_MAP: RwLock<CcMap> = Default::default();
}
///////////////////////////////////////////////////////////////////

#[no_mangle]
pub extern "C" fn rw_socket(_domain: c_int, _type: c_int) -> c_int {
    // ignoring domain and type
    // get writer lock
    let mut w = if let Ok(w) = CC_MAP.write() { w } else { return CC_MAP_LOCK_POISONED };
    let fd = w.fd_allocator.alloc();
    let cc = ConnectorComplex { connected_to: None, connector_bound: None };
    w.fd_to_cc.insert(fd, RwLock::new(cc));
    fd
}

#[no_mangle]
pub extern "C" fn rw_close(fd: c_int, _how: c_int) -> c_int {
    // ignoring HOW
    // get writer lock
    let mut w = if let Ok(w) = CC_MAP.write() { w } else { return CC_MAP_LOCK_POISONED };
    if w.fd_to_cc.remove(&fd).is_some() {
        w.fd_allocator.free(fd);
        ERR_OK
    } else {
        CLOSE_FAIL
    }
}

#[no_mangle]
pub unsafe extern "C" fn rw_bind(fd: c_int, addr: *const sockaddr, addr_len: socklen_t) -> c_int {
    // assuming _domain is AF_INET and _type is SOCK_DGRAM
    let addr = match addr_from_raw(addr, addr_len) {
        Some(addr) => addr,
        _ => return BAD_SOCKADDR,
    };
    // get outer reader, inner writer locks
    let r = if let Ok(r) = CC_MAP.read() { r } else { return CC_MAP_LOCK_POISONED };
    let cc = if let Some(cc) = r.fd_to_cc.get(&fd) { cc } else { return BAD_FD };
    let mut cc = if let Ok(cc) = cc.write() { cc } else { return CC_MAP_LOCK_POISONED };
    let cc: &mut ConnectorComplex = &mut cc;
    if cc.connector_bound.is_some() {
        // already bound!
        return WRONG_STATE;
    }
    cc.connector_bound = {
        let mut connector = Connector::new(
            Box::new(crate::DummyLogger),
            crate::TRIVIAL_PD.clone(),
            Connector::random_id(),
        );
        // maintain invariant: if cc.connected_to.is_some():
        //   cc.connected_to matches the connected address of the socket
        let peer_addr = cc.connected_to.unwrap_or_else(dummy_peer_addr);
        let [putter, getter] = connector.new_udp_mediator_component(addr, peer_addr).unwrap();
        Some(ConnectorBound { connector, putter, getter })
    };
    ERR_OK
}

#[no_mangle]
pub unsafe extern "C" fn rw_connect(
    fd: c_int,
    addr: *const sockaddr,
    addr_len: socklen_t,
) -> c_int {
    let addr = match addr_from_raw(addr, addr_len) {
        Some(addr) => addr,
        _ => return BAD_SOCKADDR,
    };
    // assuming _domain is AF_INET and _type is SOCK_DGRAM
    // get outer reader, inner writer locks
    let r = if let Ok(r) = CC_MAP.read() { r } else { return CC_MAP_LOCK_POISONED };
    let cc = if let Some(cc) = r.fd_to_cc.get(&fd) { cc } else { return BAD_FD };
    let mut cc = if let Ok(cc) = cc.write() { cc } else { return CC_MAP_LOCK_POISONED };
    let cc: &mut ConnectorComplex = &mut cc;
    if let Some(ConnectorBound { connector, .. }) = &mut cc.connector_bound {
        // already bound. maintain invariant by overwriting the socket's connection (DUMMY or otherwise)
        if connector.get_mut_udp_ee(0).unwrap().sock.connect(addr).is_err() {
            return CONNECT_FAILED;
        }
    }
    cc.connected_to = Some(addr);
    ERR_OK
}

#[no_mangle]
pub unsafe extern "C" fn rw_send(
    fd: c_int,
    bytes_ptr: *const c_void,
    bytes_len: usize,
    _flags: c_int,
) -> isize {
    // ignoring flags
    // get outer reader, inner writer locks
    let r = if let Ok(r) = CC_MAP.read() { r } else { return CC_MAP_LOCK_POISONED as isize };
    let cc = if let Some(cc) = r.fd_to_cc.get(&fd) { cc } else { return BAD_FD as isize };
    let mut cc = if let Ok(cc) = cc.write() { cc } else { return CC_MAP_LOCK_POISONED as isize };
    let cc: &mut ConnectorComplex = &mut cc;
    if cc.connected_to.is_none() {
        return SEND_BEFORE_CONNECT as isize;
    }
    if let Some(ConnectorBound { connector, putter, .. }) = &mut cc.connector_bound {
        // is bound
        connector.put(*putter, payload_from_raw(bytes_ptr, bytes_len)).unwrap();
        connector.sync(None).unwrap();
        bytes_len as isize
    } else {
        // is not bound
        WRONG_STATE as isize
    }
}
#[no_mangle]
pub unsafe extern "C" fn rw_sendto(
    fd: c_int,
    bytes_ptr: *mut c_void,
    bytes_len: usize,
    _flags: c_int,
    addr: *const sockaddr,
    addr_len: socklen_t,
) -> isize {
    // ignoring flags
    let addr = match addr_from_raw(addr, addr_len) {
        Some(addr) => addr,
        _ => return BAD_SOCKADDR as isize,
    };
    // get outer reader, inner writer locks
    let r = if let Ok(r) = CC_MAP.read() { r } else { return CC_MAP_LOCK_POISONED as isize };
    let cc = if let Some(cc) = r.fd_to_cc.get(&fd) { cc } else { return BAD_FD as isize };
    let mut cc = if let Ok(cc) = cc.write() { cc } else { return CC_MAP_LOCK_POISONED as isize };
    let cc: &mut ConnectorComplex = &mut cc;
    if let Some(ConnectorBound { connector, putter, .. }) = &mut cc.connector_bound {
        // is bound
        // (temporarily) break invariant
        if connector.get_mut_udp_ee(0).unwrap().sock.connect(addr).is_err() {
            // invariant not broken. nevermind
            return CONNECT_FAILED as isize;
        }
        // invariant broken...
        connector.put(*putter, payload_from_raw(bytes_ptr, bytes_len)).unwrap();
        connector.sync(None).unwrap();
        let old_addr = cc.connected_to.unwrap_or_else(dummy_peer_addr);
        connector.get_mut_udp_ee(0).unwrap().sock.connect(old_addr).unwrap();
        // ...invariant restored
        bytes_len as isize
    } else {
        // is not bound
        WRONG_STATE as isize
    }
}

#[no_mangle]
pub unsafe extern "C" fn rw_recv(
    fd: c_int,
    bytes_ptr: *mut c_void,
    bytes_len: usize,
    _flags: c_int,
) -> isize {
    // ignoring flags
    // get outer reader, inner writer locks
    let r = if let Ok(r) = CC_MAP.read() { r } else { return CC_MAP_LOCK_POISONED as isize };
    let cc = if let Some(cc) = r.fd_to_cc.get(&fd) { cc } else { return BAD_FD as isize };
    let mut cc = if let Ok(cc) = cc.write() { cc } else { return CC_MAP_LOCK_POISONED as isize };
    let cc: &mut ConnectorComplex = &mut cc;
    if let Some(ConnectorBound { connector, getter, .. }) = &mut cc.connector_bound {
        connector.get(*getter).unwrap();
        // this call BLOCKS until it succeeds, and its got no reason to fail
        connector.sync(None).unwrap();
        // copy from gotten to caller's buffer (truncating if necessary)
        let slice = connector.gotten(*getter).unwrap().as_slice();
        if !bytes_ptr.is_null() {
            let cpy_msg_bytes = slice.len().min(bytes_len);
            std::ptr::copy_nonoverlapping(slice.as_ptr(), bytes_ptr as *mut u8, cpy_msg_bytes);
        }
        // return number of bytes sent   
        slice.len() as isize
    } else {
        // not bound!
        WRONG_STATE as isize
    }
}

#[no_mangle]
pub unsafe extern "C" fn rw_recvfrom(
    fd: c_int,
    bytes_ptr: *mut c_void,
    bytes_len: usize,
    _flags: c_int,
    addr: *mut sockaddr,
    addr_len: *mut socklen_t,
) -> isize {
    // ignoring flags
    // get outer reader, inner writer locks
    let r = if let Ok(r) = CC_MAP.read() { r } else { return CC_MAP_LOCK_POISONED as isize };
    let cc = if let Some(cc) = r.fd_to_cc.get(&fd) { cc } else { return BAD_FD as isize };
    let mut cc = if let Ok(cc) = cc.write() { cc } else { return CC_MAP_LOCK_POISONED as isize };
    let cc: &mut ConnectorComplex = &mut cc;
    if let Some(ConnectorBound { connector, getter, .. }) = &mut cc.connector_bound {
        connector.get(*getter).unwrap();
        // this call BLOCKS until it succeeds, and its got no reason to fail
        connector.sync(None).unwrap();
        // overwrite addr and addr_len
        if !addr.is_null() && !addr_len.is_null() {
            let recvd_from = connector.get_mut_udp_ee(0).unwrap().received_from_this_round.unwrap();
            let os_addr = os_socketaddr::OsSocketAddr::from(recvd_from);
            let cpy_addr_bytes = (*addr_len).min(os_addr.capacity());
            // ptr-return addr bytes (truncated to addr_len)
            let src_u8: *const u8 = std::mem::transmute(os_addr.as_ptr());
            let dest_u8: *mut u8 = std::mem::transmute(addr);
            std::ptr::copy_nonoverlapping(src_u8, dest_u8, cpy_addr_bytes as usize);
            // ptr-return true addr size
            *addr_len = os_addr.capacity(); 
        }
        // copy from gotten to caller's buffer (truncating if necessary)
        let slice = connector.gotten(*getter).unwrap().as_slice();
        if !bytes_ptr.is_null() {
            let cpy_msg_bytes = slice.len().min(bytes_len);
            let dest_u8: *mut u8 = std::mem::transmute(bytes_ptr);
            std::ptr::copy_nonoverlapping(slice.as_ptr(), dest_u8, cpy_msg_bytes);   
        }
        // return number of bytes received
        slice.len() as isize
    } else {
        WRONG_STATE as isize // not bound!
    }
}