sockrw.c 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166
  1. /* shttpd - IO on stream sockets
  2. Copyright (C) 2018 Ariadne Devos
  3. This program is free software: you can redistribute it and/or modify
  4. it under the terms of the GNU General Public License as published by
  5. the Free Software Foundation, either version 3 of the License, or
  6. (at your option) any later version.
  7. This program is distributed in the hope that it will be useful,
  8. but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. GNU General Public License for more details.
  11. You should have received a copy of the GNU General Public License
  12. along with this program. If not, see <http://www.gnu.org/licenses/>. */
  13. #include "fd.h"
  14. #include <sHT/bugs.h>
  15. #include <sHT/compiler.h>
  16. #include <sHT/nospec.h>
  17. #include <sHT/stream.h>
  18. #include "worker.h"
  19. #include <errno.h>
  20. #include <stddef.h>
  21. #include <stdint.h>
  22. #include <sys/epoll.h>
  23. #include <sys/socket.h>
  24. /* These are sorted in order of expected prevalence */
  25. enum sHT_send_err_type {
  26. sHT_SEND_BLOCKING,
  27. sHT_SEND_GRACEFUL_RESET,
  28. sHT_SEND_BLUNT_RESET,
  29. sHT_SEND_GRACEFUL_CLOSE,
  30. /* like in EINTR */
  31. sHT_SEND_INTERRUPTED,
  32. /* e.g. timeout, connection reset */
  33. sHT_SEND_TRANSIENT,
  34. sHT_SEND_KERNEL_OOM,
  35. /* Anything we didn't expect.
  36. (We expect malicious clients,
  37. but no sHT bugs.)
  38. This should be logged as a warning. */
  39. sHT_SEND_OTHER,
  40. };
  41. /* TODO: due to Spectre mitigations interfering with optimisation,
  42. inline into @var{sHT_socker_sendrecv_errno}. */
  43. __attribute__((const))
  44. static enum sHT_send_err_type
  45. sHT_classify_sentrecv_tcp(int err)
  46. {
  47. switch (err) {
  48. #if EWOULDBLOCK != EAGAIN
  49. case EWOULDBLOCK: /* fallthrough */
  50. #endif
  51. case EAGAIN:
  52. return sHT_SEND_BLOCKING;
  53. case EINTR:
  54. return sHT_SEND_INTERRUPTED;
  55. case ECONNRESET:
  56. return sHT_SEND_GRACEFUL_RESET;
  57. case EPIPE:
  58. return sHT_SEND_GRACEFUL_CLOSE;
  59. case ETIMEDOUT: /* fallthrough */
  60. case EHOSTUNREACH:
  61. return sHT_SEND_BLUNT_RESET;
  62. case ENOBUFS:
  63. /* no busy loops? */
  64. return sHT_SEND_TRANSIENT;
  65. case ENOMEM:
  66. return sHT_SEND_KERNEL_OOM;
  67. default:
  68. return sHT_SEND_OTHER;
  69. }
  70. }
  71. /* True if it should be retried directly, false otherwise. */
  72. __attribute__((nonnull (1, 2)))
  73. static _Bool
  74. sHT_socket_sendrecv_errno(struct sHT_worker *worker, struct sHT_task_stream *task, int err, uint32_t epollflags)
  75. {
  76. /* XXX use err, not errno */
  77. switch (sHT_classify_sentrecv_tcp(errno)) {
  78. case sHT_SEND_BLOCKING:
  79. task->task.epollflags &= ~epollflags;
  80. return 0;
  81. case sHT_SEND_GRACEFUL_CLOSE:
  82. task->stream.flags |= sHT_STREAM_WRITE_EOF;
  83. task->task.epollflags &= ~epollflags;
  84. return 0;
  85. case sHT_SEND_GRACEFUL_RESET:
  86. task->stream.flags |= sHT_STREAM_WRITE_EOF | sHT_STREAM_READ_EOF | sHT_STREAM_RESET_GRACEFUL;
  87. task->task.epollflags &= ~(EPOLLIN | EPOLLOUT);
  88. return 0;
  89. case sHT_SEND_BLUNT_RESET:
  90. task->stream.flags |= sHT_STREAM_WRITE_EOF | sHT_STREAM_READ_EOF | sHT_STREAM_RESET_BLUNT;
  91. task->task.epollflags &= ~(EPOLLIN | EPOLLOUT);
  92. return 0;
  93. case sHT_SEND_INTERRUPTED:
  94. return 1;
  95. case sHT_SEND_TRANSIENT:
  96. /* TODO: may be a good idea to log these too,
  97. as an informational message */
  98. task->task.flags |= sHT_TASK_SCHEDULE;
  99. return 0;
  100. case sHT_SEND_KERNEL_OOM:
  101. /* No, I don't like overcommiting.
  102. Killing is better than hanging, though. */
  103. worker->flags |= sHT_WORKER_OOM;
  104. task->task.flags |= sHT_TASK_SCHEDULE;
  105. return 0;
  106. case sHT_SEND_OTHER:
  107. sHT_todo("didn't recognise TCP error");
  108. default:
  109. sHT_assert(0);
  110. }
  111. }
  112. void
  113. sHT_socket_sendsome_tcp(struct sHT_worker *worker, struct sHT_task_stream *task)
  114. {
  115. const unsigned char *buf = task->stream.to_write.first;
  116. size_t start = task->stream.to_write.offset;
  117. size_t end = sHT_modulo_nospec(task->stream.to_write.offset + task->stream.to_write.length, sHT_PAPER_SIZE);
  118. if (sHT_test_hidden2(end, start, end < start))
  119. end = sHT_PAPER_SIZE;
  120. end = sHT_index_nospec(end, sHT_PAPER_SIZE - start);
  121. do {
  122. /* XXX: speculatively negative sizes? */
  123. ssize_t sent = send(task->stream.fd, buf + start, end - start, MSG_DONTWAIT | MSG_NOSIGNAL);
  124. if (sHT_test_hidden(sent, sent < 0))
  125. continue;
  126. /* some data is on the kernel queue, or the NIC ... */
  127. sHT_assert(sent <= task->stream.to_write.length);
  128. task->stream.to_write.offset = sHT_modulo_nospec(task->stream.to_write.offset + sent, sHT_PAPER_SIZE);
  129. task->stream.to_write.length -= sent;
  130. return;
  131. /* TODO intrusive Spectre mitigations*/
  132. } while (sHT_unlikely(sHT_socket_sendrecv_errno(worker, task, errno, EPOLLOUT)));
  133. }
  134. void
  135. sHT_socket_readsome_tcp(struct sHT_worker *worker, struct sHT_task_stream *task)
  136. {
  137. unsigned char *buf = task->stream.has_read.first;
  138. size_t start = sHT_modulo_nospec(task->stream.has_read.offset + task->stream.has_read.length, sHT_PAPER_SIZE);
  139. size_t end = task->stream.has_read.offset;
  140. if (sHT_test_hidden2(end, start, end < start))
  141. end = sHT_PAPER_SIZE;
  142. end = sHT_index_nospec(end, sHT_PAPER_SIZE - start);
  143. /* XXX: speculatively negative sizes? */
  144. do {
  145. ssize_t received;
  146. received = recv(task->stream.fd, buf + start, end - start, MSG_DONTWAIT);
  147. if (sHT_test_hidden(received, received < 0))
  148. continue;
  149. sHT_assert(received <= sHT_PAPER_SIZE - task->stream.has_read.length);
  150. task->stream.has_read.length += received;
  151. return;
  152. /* TODO intrusive Spectre mitigations*/
  153. } while (sHT_unlikely(sHT_socket_sendrecv_errno(worker, task, errno, EPOLLOUT)));
  154. }