From patchwork Wed Apr 25 09:57:15 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Antonio Quartulli X-Patchwork-Id: 322 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director9.mail.ord1d.rsapps.net ([172.27.255.58]) by backend30.mail.ord1d.rsapps.net (Dovecot) with LMTP id E5eqJjXe4FqdPwAAIUCqbw for ; Wed, 25 Apr 2018 15:59:49 -0400 Received: from proxy20.mail.iad3a.rsapps.net ([172.27.255.58]) by director9.mail.ord1d.rsapps.net (Dovecot) with LMTP id O0XMCTXe4FqiTQAAalYnBA ; Wed, 25 Apr 2018 15:59:49 -0400 Received: from smtp28.gate.iad3a ([172.27.255.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy20.mail.iad3a.rsapps.net with LMTP id YJR4HzXe4FqpAgAAtfLT2w ; Wed, 25 Apr 2018 15:59:49 -0400 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.105.38.7] Authentication-Results: smtp28.gate.iad3a.rsapps.net; iprev=pass policy.iprev="216.105.38.7"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dmarc=none (p=nil; dis=none) header.from=unstable.cc X-Suspicious-Flag: YES X-Classification-ID: 35475f56-48c3-11e8-a363-52540000591c-1-1 Received: from [216.105.38.7] ([216.105.38.7:30491] helo=lists.sourceforge.net) by smtp28.gate.iad3a.rsapps.net (envelope-from ) (ecelerity 4.2.1.56364 r(Core:4.2.1.14)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 98/D9-13310-43ED0EA5; Wed, 25 Apr 2018 15:59:49 -0400 Received: from [127.0.0.1] (helo=sfs-ml-4.v29.lw.sourceforge.com) by sfs-ml-4.v29.lw.sourceforge.com with esmtp (Exim 4.90_1) (envelope-from ) id 1fBQZ2-0008Q4-FE; Wed, 25 Apr 2018 19:58:52 +0000 Received: from [172.30.20.202] (helo=mx.sourceforge.net) by sfs-ml-4.v29.lw.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) (envelope-from ) id 1fBQZ0-0008Px-Tk for openvpn-devel@lists.sourceforge.net; Wed, 25 Apr 2018 19:58:50 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=References:In-Reply-To:Message-Id:Date:Subject:Cc: To:From:Sender:Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=9Y51vj7itw1cJyrokp2/v9bAZEM5Ecxxgcgu33f97vs=; b=ksxBT4vxmju6wgNs3Z65FeMG93 rmUJghrwWGYycwCVDXlt/aDy7N8iFuDr7jlDeneaDcOMTg201z8hzqOytOWnjjhAHW6DjPbBvz8gb n4ulI91wQtyLxgqcI0YUpqEGr/TaeqQl409R8NIEIIr9vr4YEfOTRbGYToczn2GKKzsw=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To :MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=9Y51vj7itw1cJyrokp2/v9bAZEM5Ecxxgcgu33f97vs=; b=c3re8YYvxgfcLCU4TWuM6jIBtL Q/mjtzwGJYzknTlowcyN5/hMxmTZ7mT38dxx5SgsOaCcRilBgtbe9QKMtGnWtYva1vpUGjCJfhKf7 /t7rtJ7wh9TxOiIhVNcaVUFRri/7vT89BNZX2uCLVPH+yZECk0UQuzFNsdodkcjOszG4=; Received: from s2.neomailbox.net ([5.148.176.60]) by sfi-mx-2.v28.lw.sourceforge.com with esmtps (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.90_1) id 1fBQYx-007Na9-VJ for openvpn-devel@lists.sourceforge.net; Wed, 25 Apr 2018 19:58:50 +0000 From: Antonio Quartulli To: openvpn-devel@lists.sourceforge.net Date: Thu, 26 Apr 2018 03:57:15 +0800 Message-Id: <20180425195722.20744-2-a@unstable.cc> In-Reply-To: <20180425195722.20744-1-a@unstable.cc> References: <20180425195722.20744-1-a@unstable.cc> X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no trust [5.148.176.60 listed in list.dnswl.org] -0.0 SPF_PASS SPF: sender matches SPF record X-Headers-End: 1fBQYx-007Na9-VJ Subject: [Openvpn-devel] [RFC 1/8] event/multi: add event_arg object to make event handling more generic X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Antonio Quartulli MIME-Version: 1.0 Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox In order to prepare the event handling code to deal with multiple listening sockets, we have to make sure that it is possible to distinguish which of these sockets have been pocked by an incoming connection request. To achieve that, this patch changes the object being passed as event handler argument, from a "partly integer evaluated variable" to a full struct with a proper type attribute. This struct will allow the code to carry around the particular listening socket where the connection is being established. This change affects the TCP server code path only as UDP servers use only one socket to handle all clients i/o. Signed-off-by: Antonio Quartulli --- src/openvpn/event.h | 14 ++++++++++ src/openvpn/mtcp.c | 62 +++++++++++++++++++++++++------------------- src/openvpn/multi.c | 3 +++ src/openvpn/multi.h | 1 + src/openvpn/socket.c | 2 ++ src/openvpn/socket.h | 2 ++ 6 files changed, 58 insertions(+), 26 deletions(-) diff --git a/src/openvpn/event.h b/src/openvpn/event.h index 4af6371e..33ff8890 100644 --- a/src/openvpn/event.h +++ b/src/openvpn/event.h @@ -85,6 +85,20 @@ struct event_set struct event_set_functions func; }; +typedef enum { + EVENT_ARG_MULTI_INSTANCE = 0, + EVENT_ARG_LINK_SOCKET, +} event_arg_t; + +/* generic event argument object to pass to event_ctl() */ +struct event_arg +{ + event_arg_t type; + union { + struct multi_instance *mi; /* if type = EVENT_ARG_MULTI_INSTANCE */ + } u; +}; + /* * maxevents on input: desired max number of event_t descriptors * simultaneously set with event_ctl diff --git a/src/openvpn/mtcp.c b/src/openvpn/mtcp.c index 3756c270..234c077c 100644 --- a/src/openvpn/mtcp.c +++ b/src/openvpn/mtcp.c @@ -58,7 +58,6 @@ /* * Special tags passed to event.[ch] functions */ -#define MTCP_SOCKET ((void *)1) #define MTCP_TUN ((void *)2) #define MTCP_SIG ((void *)3) /* Only on Windows */ #ifdef ENABLE_MANAGEMENT @@ -259,7 +258,7 @@ multi_tcp_set_global_rw_flags(struct multi_context *m, struct multi_instance *mi socket_set(mi->context.c2.link_socket, m->mtcp->es, mbuf_defined(mi->tcp_link_out_deferred) ? EVENT_WRITE : EVENT_READ, - mi, + &mi->ev_arg, &mi->tcp_rwflags); } } @@ -269,7 +268,8 @@ multi_tcp_wait(const struct context *c, struct multi_tcp *mtcp) { int status; - socket_set_listen_persistent(c->c2.link_socket, mtcp->es, MTCP_SOCKET); + socket_set_listen_persistent(c->c2.link_socket, mtcp->es, + &c->c2.link_socket->ev_arg); tun_set(c->c1.tuntap, mtcp->es, EVENT_READ, MTCP_TUN, &mtcp->tun_rwflags); #ifdef ENABLE_MANAGEMENT if (management) @@ -679,21 +679,43 @@ multi_tcp_process_io(struct multi_context *m) for (i = 0; i < mtcp->n_esr; ++i) { struct event_set_return *e = &mtcp->esr[i]; + struct event_arg *ev_arg = (struct event_arg *)e->arg; - /* incoming data for instance? */ + /* incoming data for instance or listening socket? */ if (e->arg >= MTCP_N) { - struct multi_instance *mi = (struct multi_instance *) e->arg; - if (mi) + switch (ev_arg->type) { - if (e->rwflags & EVENT_WRITE) - { - multi_tcp_action(m, mi, TA_SOCKET_WRITE_READY, false); - } - else if (e->rwflags & EVENT_READ) - { - multi_tcp_action(m, mi, TA_SOCKET_READ, false); - } + struct multi_instance *mi; + + /* react to event on child instance */ + case EVENT_ARG_MULTI_INSTANCE: + if (!ev_arg->u.mi) + { + msg(D_MULTI_ERRORS, "MULTI: mtcp_proc_io: null minstance"); + break; + } + + mi = ev_arg->u.mi; + if (e->rwflags & EVENT_WRITE) + { + multi_tcp_action(m, mi, TA_SOCKET_WRITE_READY, false); + } + else if (e->rwflags & EVENT_READ) + { + multi_tcp_action(m, mi, TA_SOCKET_READ, false); + } + break; + /* new incoming TCP client attempting to connect? */ + case EVENT_ARG_LINK_SOCKET: + ASSERT(m->top.c2.link_socket); + socket_reset_listen_persistent(m->top.c2.link_socket); + mi = multi_create_instance_tcp(m); + if (mi) + { + multi_tcp_action(m, mi, TA_INITIAL, false); + } + break; } } else @@ -718,18 +740,6 @@ multi_tcp_process_io(struct multi_context *m) multi_tcp_action(m, NULL, TA_TUN_READ, false); } } - /* new incoming TCP client attempting to connect? */ - else if (e->arg == MTCP_SOCKET) - { - struct multi_instance *mi; - ASSERT(m->top.c2.link_socket); - socket_reset_listen_persistent(m->top.c2.link_socket); - mi = multi_create_instance_tcp(m); - if (mi) - { - multi_tcp_action(m, mi, TA_INITIAL, false); - } - } /* signal received? */ else if (e->arg == MTCP_SIG) { diff --git a/src/openvpn/multi.c b/src/openvpn/multi.c index 3da8c110..f877c060 100644 --- a/src/openvpn/multi.c +++ b/src/openvpn/multi.c @@ -841,6 +841,9 @@ multi_create_instance(struct multi_context *m, const struct mroute_addr *real) goto err; } + mi->ev_arg.type = EVENT_ARG_MULTI_INSTANCE; + mi->ev_arg.u.mi = mi; + perf_pop(); gc_free(&gc); return mi; diff --git a/src/openvpn/multi.h b/src/openvpn/multi.h index d7e5c298..c52445ed 100644 --- a/src/openvpn/multi.h +++ b/src/openvpn/multi.h @@ -75,6 +75,7 @@ struct deferred_signal_schedule_entry */ struct multi_instance { struct schedule_entry se; /* this must be the first element of the structure */ + struct event_arg ev_arg; struct gc_arena gc; bool defined; bool halt; diff --git a/src/openvpn/socket.c b/src/openvpn/socket.c index 211e7441..e0620f09 100644 --- a/src/openvpn/socket.c +++ b/src/openvpn/socket.c @@ -1712,6 +1712,8 @@ link_socket_new(void) ALLOC_OBJ_CLEAR(sock, struct link_socket); sock->sd = SOCKET_UNDEFINED; sock->ctrl_sd = SOCKET_UNDEFINED; + sock->ev_arg.type = EVENT_ARG_LINK_SOCKET; + return sock; } diff --git a/src/openvpn/socket.h b/src/openvpn/socket.h index 479d1150..46000246 100644 --- a/src/openvpn/socket.h +++ b/src/openvpn/socket.h @@ -165,6 +165,8 @@ struct link_socket { struct link_socket_info info; + struct event_arg ev_arg; + socket_descriptor_t sd; socket_descriptor_t ctrl_sd; /* only used for UDP over Socks */