buffers_net.c 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. /* Copyright (c) 2001 Matej Pfajfar.
  2. * Copyright (c) 2001-2004, Roger Dingledine.
  3. * Copyright (c) 2004-2006, Roger Dingledine, Nick Mathewson.
  4. * Copyright (c) 2007-2018, The Tor Project, Inc. */
  5. /* See LICENSE for licensing information */
  6. /**
  7. * \file buffers_net.c
  8. * \brief Read and write data on a buf_t object.
  9. **/
  10. #define BUFFERS_PRIVATE
  11. #include "lib/net/buffers_net.h"
  12. #include "lib/container/buffers.h"
  13. #include "lib/log/log.h"
  14. #include "lib/log/util_bug.h"
  15. #include "lib/net/nettypes.h"
  16. #ifdef _WIN32
  17. #include <winsock2.h>
  18. #endif
  19. #include <stdlib.h>
  20. #include <unistd.h>
  21. #ifdef PARANOIA
  22. /** Helper: If PARANOIA is defined, assert that the buffer in local variable
  23. * <b>buf</b> is well-formed. */
  24. #define check() STMT_BEGIN buf_assert_ok(buf); STMT_END
  25. #else
  26. #define check() STMT_NIL
  27. #endif /* defined(PARANOIA) */
  28. /** Read up to <b>at_most</b> bytes from the file descriptor <b>fd</b> into
  29. * <b>chunk</b> (which must be on <b>buf</b>). If we get an EOF, set
  30. * *<b>reached_eof</b> to 1. Return -1 on error, 0 on eof or blocking,
  31. * and the number of bytes read otherwise. */
  32. static inline int
  33. read_to_chunk(buf_t *buf, chunk_t *chunk, tor_socket_t fd, size_t at_most,
  34. int *reached_eof, int *error, bool is_socket)
  35. {
  36. ssize_t read_result;
  37. if (at_most > CHUNK_REMAINING_CAPACITY(chunk))
  38. at_most = CHUNK_REMAINING_CAPACITY(chunk);
  39. if (is_socket)
  40. read_result = tor_socket_recv(fd, CHUNK_WRITE_PTR(chunk), at_most, 0);
  41. else
  42. read_result = read(fd, CHUNK_WRITE_PTR(chunk), at_most);
  43. if (read_result < 0) {
  44. int e = tor_socket_errno(fd);
  45. if (!ERRNO_IS_EAGAIN(e)) { /* it's a real error */
  46. #ifdef _WIN32
  47. if (e == WSAENOBUFS)
  48. log_warn(LD_NET, "%s() failed: WSAENOBUFS. Not enough ram?",
  49. is_socket ? "recv" : "read");
  50. #endif
  51. if (error)
  52. *error = e;
  53. return -1;
  54. }
  55. return 0; /* would block. */
  56. } else if (read_result == 0) {
  57. log_debug(LD_NET,"Encountered eof on fd %d", (int)fd);
  58. *reached_eof = 1;
  59. return 0;
  60. } else { /* actually got bytes. */
  61. buf->datalen += read_result;
  62. chunk->datalen += read_result;
  63. log_debug(LD_NET,"Read %ld bytes. %d on inbuf.", (long)read_result,
  64. (int)buf->datalen);
  65. tor_assert(read_result < INT_MAX);
  66. return (int)read_result;
  67. }
  68. }
  69. /** Read from socket <b>s</b>, writing onto end of <b>buf</b>. Read at most
  70. * <b>at_most</b> bytes, growing the buffer as necessary. If recv() returns 0
  71. * (because of EOF), set *<b>reached_eof</b> to 1 and return 0. Return -1 on
  72. * error; else return the number of bytes read.
  73. */
  74. /* XXXX indicate "read blocked" somehow? */
  75. int
  76. buf_read_from_socket(buf_t *buf, tor_socket_t s, size_t at_most,
  77. int *reached_eof,
  78. int *socket_error)
  79. {
  80. /* XXXX It's stupid to overload the return values for these functions:
  81. * "error status" and "number of bytes read" are not mutually exclusive.
  82. */
  83. int r = 0;
  84. size_t total_read = 0;
  85. check();
  86. tor_assert(reached_eof);
  87. tor_assert(SOCKET_OK(s));
  88. if (BUG(buf->datalen >= INT_MAX))
  89. return -1;
  90. if (BUG(buf->datalen >= INT_MAX - at_most))
  91. return -1;
  92. while (at_most > total_read) {
  93. size_t readlen = at_most - total_read;
  94. chunk_t *chunk;
  95. if (!buf->tail || CHUNK_REMAINING_CAPACITY(buf->tail) < MIN_READ_LEN) {
  96. chunk = buf_add_chunk_with_capacity(buf, at_most, 1);
  97. if (readlen > chunk->memlen)
  98. readlen = chunk->memlen;
  99. } else {
  100. size_t cap = CHUNK_REMAINING_CAPACITY(buf->tail);
  101. chunk = buf->tail;
  102. if (cap < readlen)
  103. readlen = cap;
  104. }
  105. r = read_to_chunk(buf, chunk, s, readlen, reached_eof, socket_error, true);
  106. check();
  107. if (r < 0)
  108. return r; /* Error */
  109. tor_assert(total_read+r < INT_MAX);
  110. total_read += r;
  111. if ((size_t)r < readlen) { /* eof, block, or no more to read. */
  112. break;
  113. }
  114. }
  115. return (int)total_read;
  116. }
  117. /** Helper for buf_flush_to_socket(): try to write <b>sz</b> bytes from chunk
  118. * <b>chunk</b> of buffer <b>buf</b> onto socket <b>s</b>. On success, deduct
  119. * the bytes written from *<b>buf_flushlen</b>. Return the number of bytes
  120. * written on success, 0 on blocking, -1 on failure.
  121. */
  122. static inline int
  123. flush_chunk(tor_socket_t s, buf_t *buf, chunk_t *chunk, size_t sz,
  124. size_t *buf_flushlen)
  125. {
  126. ssize_t write_result;
  127. if (sz > chunk->datalen)
  128. sz = chunk->datalen;
  129. write_result = tor_socket_send(s, chunk->data, sz, 0);
  130. if (write_result < 0) {
  131. int e = tor_socket_errno(s);
  132. if (!ERRNO_IS_EAGAIN(e)) { /* it's a real error */
  133. #ifdef _WIN32
  134. if (e == WSAENOBUFS)
  135. log_warn(LD_NET,"write() failed: WSAENOBUFS. Not enough ram?");
  136. #endif
  137. return -1;
  138. }
  139. log_debug(LD_NET,"write() would block, returning.");
  140. return 0;
  141. } else {
  142. *buf_flushlen -= write_result;
  143. buf_drain(buf, write_result);
  144. tor_assert(write_result < INT_MAX);
  145. return (int)write_result;
  146. }
  147. }
  148. /** Write data from <b>buf</b> to the socket <b>s</b>. Write at most
  149. * <b>sz</b> bytes, decrement *<b>buf_flushlen</b> by
  150. * the number of bytes actually written, and remove the written bytes
  151. * from the buffer. Return the number of bytes written on success,
  152. * -1 on failure. Return 0 if write() would block.
  153. */
  154. int
  155. buf_flush_to_socket(buf_t *buf, tor_socket_t s, size_t sz,
  156. size_t *buf_flushlen)
  157. {
  158. /* XXXX It's stupid to overload the return values for these functions:
  159. * "error status" and "number of bytes flushed" are not mutually exclusive.
  160. */
  161. int r;
  162. size_t flushed = 0;
  163. tor_assert(buf_flushlen);
  164. tor_assert(SOCKET_OK(s));
  165. if (BUG(*buf_flushlen > buf->datalen)) {
  166. *buf_flushlen = buf->datalen;
  167. }
  168. if (BUG(sz > *buf_flushlen)) {
  169. sz = *buf_flushlen;
  170. }
  171. check();
  172. while (sz) {
  173. size_t flushlen0;
  174. tor_assert(buf->head);
  175. if (buf->head->datalen >= sz)
  176. flushlen0 = sz;
  177. else
  178. flushlen0 = buf->head->datalen;
  179. r = flush_chunk(s, buf, buf->head, flushlen0, buf_flushlen);
  180. check();
  181. if (r < 0)
  182. return r;
  183. flushed += r;
  184. sz -= r;
  185. if (r == 0 || (size_t)r < flushlen0) /* can't flush any more now. */
  186. break;
  187. }
  188. tor_assert(flushed < INT_MAX);
  189. return (int)flushed;
  190. }