changelog: mention hippotat
[secnet] / util.c
CommitLineData
b2a56f7c
SE
1/*
2 * util.c
3 * - output and logging support
4 * - program lifetime support
5 * - IP address and subnet munging routines
6 * - MPI convenience functions
7 */
8/*
c215a4bc
IJ
9 * This file is part of secnet.
10 * See README for full list of copyright holders.
2fe58dfd 11 *
c215a4bc
IJ
12 * secnet is free software; you can redistribute it and/or modify it
13 * under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version d of the License, or
15 * (at your option) any later version.
16 *
17 * secnet is distributed in the hope that it will be useful, but
18 * WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
20 * General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License
23 * version 3 along with secnet; if not, see
24 * https://www.gnu.org/licenses/gpl.html.
2fe58dfd
SE
25 */
26
8689b3a9 27#include "secnet.h"
2fe58dfd 28#include <stdio.h>
2fe58dfd
SE
29#include <string.h>
30#include <errno.h>
2fe58dfd 31#include <unistd.h>
59635212 32#include <limits.h>
2fe58dfd 33#include <assert.h>
4efd681a 34#include <sys/wait.h>
61dbc9e0 35#include <adns.h>
2fe58dfd 36#include "util.h"
59635212 37#include "unaligned.h"
8534d602 38#include "magic.h"
bb839899 39#include "ipaddr.h"
2fe58dfd
SE
40
41#define MIN_BUFFER_SIZE 64
42#define DEFAULT_BUFFER_SIZE 4096
43#define MAX_BUFFER_SIZE 131072
44
fe5e9cc4 45static const char *hexdigits="0123456789abcdef";
2fe58dfd 46
7138d0c5 47uint32_t current_phase=0;
2fe58dfd
SE
48
49struct phase_hook {
50 hook_fn *fn;
51 void *state;
a614cf77 52 LIST_ENTRY(phase_hook) entry;
2fe58dfd
SE
53};
54
a614cf77 55static LIST_HEAD(, phase_hook) hooks[NR_PHASES];
2fe58dfd 56
fe5e9cc4 57char *safe_strdup(const char *s, const char *message)
2fe58dfd
SE
58{
59 char *d;
60 d=strdup(s);
61 if (!d) {
779837e1 62 fatal_perror("%s",message);
2fe58dfd
SE
63 }
64 return d;
65}
66
fe5e9cc4 67void *safe_malloc(size_t size, const char *message)
2fe58dfd
SE
68{
69 void *r;
6f146b5d
IJ
70 if (!size)
71 return 0;
2fe58dfd
SE
72 r=malloc(size);
73 if (!r) {
779837e1 74 fatal_perror("%s",message);
2fe58dfd
SE
75 }
76 return r;
77}
6f146b5d
IJ
78void *safe_realloc_ary(void *p, size_t size, size_t count,
79 const char *message) {
bb9d0561
IJ
80 if (count >= INT_MAX/size) {
81 fatal("array allocation overflow: %s", message);
82 }
6f146b5d
IJ
83 assert(size && count);
84 p = realloc(p, size*count);
85 if (!p)
86 fatal_perror("%s", message);
87 return p;
88}
89
90void *safe_malloc_ary(size_t size, size_t count, const char *message) {
91 if (!size || !count)
92 return 0;
93 return safe_realloc_ary(0,size,count,message);
bb9d0561 94}
2fe58dfd
SE
95
96/* Convert a buffer into its MP_INT representation */
97void read_mpbin(MP_INT *a, uint8_t *bin, int binsize)
98{
99 char *buff;
100 int i;
101
102 buff=safe_malloc(binsize*2 + 1,"read_mpbin");
103
104 for (i=0; i<binsize; i++) {
105 buff[i*2]=hexdigits[(bin[i] & 0xf0) >> 4];
106 buff[i*2+1]=hexdigits[(bin[i] & 0xf)];
107 }
108 buff[binsize*2]=0;
109
110 mpz_set_str(a, buff, 16);
111 free(buff);
112}
113
114/* Convert a MP_INT into a hex string */
115char *write_mpstring(MP_INT *a)
116{
117 char *buff;
118
119 buff=safe_malloc(mpz_sizeinbase(a,16)+2,"write_mpstring");
120 mpz_get_str(buff, 16, a);
121 return buff;
122}
123
124static uint8_t hexval(uint8_t c)
125{
126 switch (c) {
127 case '0': return 0;
128 case '1': return 1;
129 case '2': return 2;
130 case '3': return 3;
131 case '4': return 4;
132 case '5': return 5;
133 case '6': return 6;
134 case '7': return 7;
135 case '8': return 8;
136 case '9': return 9;
137 case 'a': return 10;
138 case 'A': return 10;
139 case 'b': return 11;
140 case 'B': return 11;
141 case 'c': return 12;
142 case 'C': return 12;
143 case 'd': return 13;
144 case 'D': return 13;
145 case 'e': return 14;
146 case 'E': return 14;
147 case 'f': return 15;
148 case 'F': return 15;
149 }
150 return -1;
151}
152
153/* Convert a MP_INT into a buffer; return length; truncate if necessary */
1caa23ff 154int32_t write_mpbin(MP_INT *a, uint8_t *buffer, int32_t buflen)
2fe58dfd
SE
155{
156 char *hb;
157 int i,j,l;
158
159 if (buflen==0) return 0;
160 hb=write_mpstring(a);
161
162 l=strlen(hb);
163 i=0; j=0;
164 if (l&1) {
165 /* The number starts with a half-byte */
166 buffer[i++]=hexval(hb[j++]);
167 }
168 for (; hb[j] && i<buflen; i++) {
169 buffer[i]=(hexval(hb[j])<<4)|hexval(hb[j+1]);
170 j+=2;
171 }
172 free(hb);
173 return i;
174}
175
f54d5ada
IJ
176#define DEFINE_SETFDFLAG(fn,FL,FLAG) \
177void fn(int fd) { \
178 int r=fcntl(fd, F_GET##FL); \
179 if (r<0) fatal_perror("fcntl(,F_GET" #FL ") failed"); \
180 r=fcntl(fd, F_SET##FL, r|FLAG); \
181 if (r<0) fatal_perror("fcntl(,F_SET" #FL ",|" #FLAG ") failed"); \
4fb0f88d
IJ
182}
183
f54d5ada
IJ
184DEFINE_SETFDFLAG(setcloexec,FD,FD_CLOEXEC);
185DEFINE_SETFDFLAG(setnonblock,FL,O_NONBLOCK);
186
6a06198c
IJ
187void pipe_cloexec(int fd[2]) {
188 int r=pipe(fd);
189 if (r) fatal_perror("pipe");
190 setcloexec(fd[0]);
191 setcloexec(fd[1]);
192}
193
fe5e9cc4 194static const char *phases[NR_PHASES]={
2fe58dfd
SE
195 "PHASE_INIT",
196 "PHASE_GETOPTS",
197 "PHASE_READCONFIG",
198 "PHASE_SETUP",
7b1a9fb7 199 "PHASE_DAEMONIZE",
baa06aeb 200 "PHASE_GETRESOURCES",
2fe58dfd
SE
201 "PHASE_DROPPRIV",
202 "PHASE_RUN",
32654a31
IJ
203 "PHASE_SHUTDOWN",
204 "PHASE_CHILDPERSIST"
2fe58dfd
SE
205};
206
207void enter_phase(uint32_t new_phase)
208{
209 struct phase_hook *i;
210
a614cf77 211 if (!LIST_EMPTY(&hooks[new_phase]))
baa06aeb 212 Message(M_DEBUG_PHASE,"Running hooks for %s...\n", phases[new_phase]);
2fe58dfd
SE
213 current_phase=new_phase;
214
a614cf77 215 LIST_FOREACH(i, &hooks[new_phase], entry)
2fe58dfd 216 i->fn(i->state, new_phase);
baa06aeb 217 Message(M_DEBUG_PHASE,"Now in %s\n",phases[new_phase]);
2fe58dfd
SE
218}
219
a614cf77
IJ
220void phase_hooks_init(void)
221{
222 int i;
223 for (i=0; i<NR_PHASES; i++)
224 LIST_INIT(&hooks[i]);
225}
226
c72aa743
IJ
227void clear_phase_hooks(uint32_t phase)
228{
229 struct phase_hook *h, *htmp;
230 LIST_FOREACH_SAFE(h, &hooks[phase], entry, htmp)
231 free(h);
232 LIST_INIT(&hooks[phase]);
233}
234
2fe58dfd
SE
235bool_t add_hook(uint32_t phase, hook_fn *fn, void *state)
236{
237 struct phase_hook *h;
238
b7886fd4 239 NEW(h);
2fe58dfd
SE
240 h->fn=fn;
241 h->state=state;
a614cf77 242 LIST_INSERT_HEAD(&hooks[phase],h,entry);
2fe58dfd
SE
243 return True;
244}
245
246bool_t remove_hook(uint32_t phase, hook_fn *fn, void *state)
247{
4f5e39ec 248 fatal("remove_hook: not implemented");
2fe58dfd
SE
249
250 return False;
251}
252
59938e0e
IJ
253void vslilog(struct log_if *lf, int priority, const char *message, va_list ap)
254{
779837e1 255 lf->vlogfn(lf->st,priority,message,ap);
59938e0e
IJ
256}
257
040ee979 258void slilog(struct log_if *lf, int priority, const char *message, ...)
2fe58dfd
SE
259{
260 va_list ap;
261
262 va_start(ap,message);
59938e0e 263 vslilog(lf,priority,message,ap);
2fe58dfd
SE
264 va_end(ap);
265}
266
267struct buffer {
268 closure_t cl;
269 struct buffer_if ops;
270};
271
fe5e9cc4 272void buffer_assert_free(struct buffer_if *buffer, cstring_t file,
1caa23ff 273 int line)
2fe58dfd
SE
274{
275 if (!buffer->free) {
28db900b
IJ
276 fprintf(stderr,"secnet: BUF_ASSERT_FREE, %s line %d, owned by %s",
277 file,line,buffer->owner);
278 assert(!"buffer_assert_free failure");
2fe58dfd
SE
279 }
280}
281
fe5e9cc4 282void buffer_assert_used(struct buffer_if *buffer, cstring_t file,
1caa23ff 283 int line)
2fe58dfd
SE
284{
285 if (buffer->free) {
28db900b
IJ
286 fprintf(stderr,"secnet: BUF_ASSERT_USED, %s line %d, last owned by %s",
287 file,line,buffer->owner);
288 assert(!"buffer_assert_used failure");
2fe58dfd
SE
289 }
290}
291
1caa23ff 292void buffer_init(struct buffer_if *buffer, int32_t max_start_pad)
2fe58dfd 293{
10068344 294 assert(max_start_pad<=buffer->alloclen);
2fe58dfd
SE
295 buffer->start=buffer->base+max_start_pad;
296 buffer->size=0;
297}
298
46d06c39
IJ
299void buffer_destroy(struct buffer_if *buf)
300{
301 BUF_ASSERT_FREE(buf);
302 free(buf->base);
303 buf->start=buf->base=0;
304 buf->size=buf->alloclen=0;
305}
306
1caa23ff 307void *buf_append(struct buffer_if *buf, int32_t amount) {
2fe58dfd 308 void *p;
92795040 309 assert(amount <= buf_remaining_space(buf));
2fe58dfd
SE
310 p=buf->start + buf->size;
311 buf->size+=amount;
312 return p;
313}
314
1caa23ff 315void *buf_prepend(struct buffer_if *buf, int32_t amount) {
59230b9b 316 assert(amount <= buf->start - buf->base);
2fe58dfd
SE
317 buf->size+=amount;
318 return buf->start-=amount;
319}
320
1caa23ff 321void *buf_unappend(struct buffer_if *buf, int32_t amount) {
2fe58dfd
SE
322 if (buf->size < amount) return 0;
323 return buf->start+(buf->size-=amount);
324}
325
1caa23ff 326void *buf_unprepend(struct buffer_if *buf, int32_t amount) {
2fe58dfd 327 void *p;
20138876 328 if (buf->size < amount) return 0;
2fe58dfd
SE
329 p=buf->start;
330 buf->start+=amount;
331 buf->size-=amount;
332 return p;
333}
334
335/* Append a two-byte length and the string to the buffer. Length is in
336 network byte order. */
fe5e9cc4 337void buf_append_string(struct buffer_if *buf, cstring_t s)
2fe58dfd 338{
1caa23ff 339 size_t len;
2fe58dfd
SE
340
341 len=strlen(s);
59230b9b 342 /* fixme: if string is longer than 65535, result is a corrupted packet */
59635212 343 buf_append_uint16(buf,len);
4f28e77e 344 BUF_ADD_BYTES(append,buf,s,len);
2fe58dfd
SE
345}
346
1caa23ff 347void buffer_new(struct buffer_if *buf, int32_t len)
2fe58dfd
SE
348{
349 buf->free=True;
350 buf->owner=NULL;
351 buf->flags=0;
352 buf->loc.file=NULL;
353 buf->loc.line=0;
354 buf->size=0;
10068344 355 buf->alloclen=len;
2fe58dfd
SE
356 buf->start=NULL;
357 buf->base=safe_malloc(len,"buffer_new");
358}
359
28db900b
IJ
360void buffer_readonly_view(struct buffer_if *buf, const void *data, int32_t len)
361{
362 buf->free=False;
363 buf->owner="READONLY";
364 buf->flags=0;
365 buf->loc.file=NULL;
366 buf->loc.line=0;
10068344 367 buf->size=buf->alloclen=len;
28db900b
IJ
368 buf->base=buf->start=(uint8_t*)data;
369}
370
371void buffer_readonly_clone(struct buffer_if *out, const struct buffer_if *in)
372{
373 buffer_readonly_view(out,in->start,in->size);
374}
375
05f39b4d
IJ
376void buffer_copy(struct buffer_if *dst, const struct buffer_if *src)
377{
10068344
IJ
378 if (dst->alloclen < src->alloclen) {
379 dst->base=realloc(dst->base,src->alloclen);
05f39b4d 380 if (!dst->base) fatal_perror("buffer_copy");
10068344 381 dst->alloclen = src->alloclen;
05f39b4d
IJ
382 }
383 dst->start = dst->base + (src->start - src->base);
384 dst->size = src->size;
385 memcpy(dst->start, src->start, dst->size);
386}
387
2fe58dfd
SE
388static list_t *buffer_apply(closure_t *self, struct cloc loc, dict_t *context,
389 list_t *args)
390{
391 struct buffer *st;
392 item_t *item;
393 dict_t *dict;
394 bool_t lockdown=False;
4efd681a 395 uint32_t len=DEFAULT_BUFFER_SIZE;
2fe58dfd 396
b7886fd4 397 NEW(st);
2fe58dfd
SE
398 st->cl.description="buffer";
399 st->cl.type=CL_BUFFER;
400 st->cl.apply=NULL;
401 st->cl.interface=&st->ops;
2fe58dfd
SE
402
403 /* First argument, if present, is buffer length */
404 item=list_elem(args,0);
405 if (item) {
406 if (item->type!=t_number) {
407 cfgfatal(st->ops.loc,"buffer","first parameter must be a "
408 "number (buffer size)\n");
409 }
4efd681a
SE
410 len=item->data.number;
411 if (len<MIN_BUFFER_SIZE) {
2fe58dfd
SE
412 cfgfatal(st->ops.loc,"buffer","ludicrously small buffer size\n");
413 }
4efd681a 414 if (len>MAX_BUFFER_SIZE) {
2fe58dfd
SE
415 cfgfatal(st->ops.loc,"buffer","ludicrously large buffer size\n");
416 }
417 }
418 /* Second argument, if present, is a dictionary */
419 item=list_elem(args,1);
420 if (item) {
421 if (item->type!=t_dict) {
422 cfgfatal(st->ops.loc,"buffer","second parameter must be a "
423 "dictionary\n");
424 }
425 dict=item->data.dict;
426 lockdown=dict_read_bool(dict,"lockdown",False,"buffer",st->ops.loc,
427 False);
428 }
429
4efd681a 430 buffer_new(&st->ops,len);
2fe58dfd 431 if (lockdown) {
70dc107b 432 /* XXX mlock the buffer if possible */
2fe58dfd
SE
433 }
434
435 return new_closure(&st->cl);
436}
437
8534d602
IJ
438void send_nak(const struct comm_addr *dest, uint32_t our_index,
439 uint32_t their_index, uint32_t msgtype,
440 struct buffer_if *buf, const char *logwhy)
441{
3abd18e8 442 buffer_init(buf,calculate_max_start_pad());
8534d602
IJ
443 buf_append_uint32(buf,their_index);
444 buf_append_uint32(buf,our_index);
445 buf_append_uint32(buf,LABEL_NAK);
446 if (logwhy)
447 Message(M_INFO,"%s: %08"PRIx32"<-%08"PRIx32": %08"PRIx32":"
448 " %s; sending NAK\n",
1a448682 449 comm_addr_to_string(dest),
8534d602 450 our_index, their_index, msgtype, logwhy);
2d80199d 451 dest->comm->sendmsg(dest->comm->st, buf, dest, 0);
8534d602
IJ
452}
453
5ad34db2
IJ
454int consttime_memeq(const void *s1in, const void *s2in, size_t n)
455{
456 const uint8_t *s1=s1in, *s2=s2in;
457 register volatile uint8_t accumulator=0;
458
459 while (n-- > 0) {
460 accumulator |= (*s1++ ^ *s2++);
461 }
462 accumulator |= accumulator >> 4; /* constant-time */
463 accumulator |= accumulator >> 2; /* boolean canonicalisation */
464 accumulator |= accumulator >> 1;
465 accumulator &= 1;
466 accumulator ^= 1;
467 return accumulator;
468}
469
2fe58dfd
SE
470void util_module(dict_t *dict)
471{
2fe58dfd
SE
472 add_closure(dict,"sysbuffer",buffer_apply);
473}
3abd18e8
IJ
474
475void update_max_start_pad(int32_t *our_module_global, int32_t our_instance)
476{
477 if (*our_module_global < our_instance)
478 *our_module_global=our_instance;
479}
480
481int32_t transform_max_start_pad, comm_max_start_pad;
482
483int32_t calculate_max_start_pad(void)
484{
485 return
486 site_max_start_pad +
487 transform_max_start_pad +
488 comm_max_start_pad;
489}
ff1dcd86
IJ
490
491void vslilog_part(struct log_if *lf, int priority, const char *message, va_list ap)
492{
493 char *buff=lf->buff;
494 size_t bp;
495 char *nlp;
496
497 bp=strlen(buff);
498 assert(bp < LOG_MESSAGE_BUFLEN);
499 vsnprintf(buff+bp,LOG_MESSAGE_BUFLEN-bp,message,ap);
500 buff[LOG_MESSAGE_BUFLEN-1] = '\n';
501 buff[LOG_MESSAGE_BUFLEN] = '\0';
502 /* Each line is sent separately */
503 while ((nlp=strchr(buff,'\n'))) {
504 *nlp=0;
505 slilog(lf,priority,"%s",buff);
506 memmove(buff,nlp+1,strlen(nlp+1)+1);
507 }
508}
509
510extern void slilog_part(struct log_if *lf, int priority, const char *message, ...)
511{
512 va_list ap;
513 va_start(ap,message);
514 vslilog_part(lf,priority,message,ap);
515 va_end(ap);
516}
a32d56fb 517
bb839899
IJ
518void string_item_to_iaddr(const item_t *item, uint16_t port, union iaddr *ia,
519 const char *desc)
520{
521#ifndef CONFIG_IPV6
522
523 ia->sin.sin_family=AF_INET;
524 ia->sin.sin_addr.s_addr=string_item_to_ipaddr(item,desc);
656df7e2 525 ia->sin.sin_port=htons(port);
bb839899
IJ
526
527#else /* CONFIG_IPV6 => we have adns_text2addr */
528
529 if (item->type!=t_string)
530 cfgfatal(item->loc,desc,"expecting a string IP (v4 or v6) address\n");
531 socklen_t salen=sizeof(*ia);
532 int r=adns_text2addr(item->data.string, port,
533 adns_qf_addrlit_ipv4_quadonly,
534 &ia->sa, &salen);
535 assert(r!=ENOSPC);
536 if (r) cfgfatal(item->loc,desc,"invalid IP (v4 or v6) address: %s\n",
537 strerror(r));
538
539#endif /* CONFIG_IPV6 */
540}
541
5e7a63be 542#define IADDR_NBUFS 8
771a583a 543
a32d56fb
IJ
544const char *iaddr_to_string(const union iaddr *ia)
545{
61dbc9e0
IJ
546#ifndef CONFIG_IPV6
547
5e7a63be 548 SBUF_DEFINE(IADDR_NBUFS, 100);
61dbc9e0 549
a32d56fb
IJ
550 assert(ia->sa.sa_family == AF_INET);
551
5f37eb10 552 snprintf(SBUF, sizeof(SBUF), "[%s]:%d",
a32d56fb
IJ
553 inet_ntoa(ia->sin.sin_addr),
554 ntohs(ia->sin.sin_port));
61dbc9e0
IJ
555
556#else /* CONFIG_IPV6 => we have adns_addr2text */
557
5e7a63be 558 SBUF_DEFINE(IADDR_NBUFS, 1+ADNS_ADDR2TEXT_BUFLEN+20);
61dbc9e0
IJ
559
560 int port;
561
5f37eb10 562 char *addrbuf = SBUF;
61dbc9e0
IJ
563 *addrbuf++ = '[';
564 int addrbuflen = ADNS_ADDR2TEXT_BUFLEN;
565
566 int r = adns_addr2text(&ia->sa, 0, addrbuf, &addrbuflen, &port);
567 if (r) {
568 const char fmt[]= "scoped IPv6 addr, error: %.*s";
569 sprintf(addrbuf, fmt,
887c6ac7 570 (int)(ADNS_ADDR2TEXT_BUFLEN - sizeof(fmt)) /* underestimate */,
61dbc9e0
IJ
571 strerror(r));
572 }
573
574 char *portbuf = addrbuf;
575 int addrl = strlen(addrbuf);
576 portbuf += addrl;
577
5f37eb10 578 snprintf(portbuf, sizeof(SBUF)-addrl, "]:%d", port);
61dbc9e0
IJ
579
580#endif /* CONFIG_IPV6 */
581
5f37eb10 582 return SBUF;
a32d56fb
IJ
583}
584
9c44ef13
IJ
585bool_t iaddr_equal(const union iaddr *ia, const union iaddr *ib,
586 bool_t ignoreport)
a32d56fb
IJ
587{
588 if (ia->sa.sa_family != ib->sa.sa_family)
589 return 0;
590 switch (ia->sa.sa_family) {
591 case AF_INET:
592 return ia->sin.sin_addr.s_addr == ib->sin.sin_addr.s_addr
9c44ef13
IJ
593 && (ignoreport ||
594 ia->sin.sin_port == ib->sin.sin_port);
61dbc9e0
IJ
595#ifdef CONFIG_IPV6
596 case AF_INET6:
597 return !memcmp(&ia->sin6.sin6_addr, &ib->sin6.sin6_addr, 16)
9c44ef13
IJ
598 && ia->sin6.sin6_scope_id == ib->sin6.sin6_scope_id
599 && (ignoreport ||
600 ia->sin6.sin6_port == ib->sin6.sin6_port)
61dbc9e0
IJ
601 /* we ignore the flowinfo field */;
602#endif /* CONFIG_IPV6 */
a32d56fb
IJ
603 default:
604 abort();
605 }
606}
607
608int iaddr_socklen(const union iaddr *ia)
609{
610 switch (ia->sa.sa_family) {
611 case AF_INET: return sizeof(ia->sin);
61dbc9e0
IJ
612#ifdef CONFIG_IPV6
613 case AF_INET6: return sizeof(ia->sin6);
614#endif /* CONFIG_IPV6 */
a32d56fb
IJ
615 default: abort();
616 }
617}
a0fac2f1 618
ae5ae3bf
IJ
619const char *pollbadbit(int revents)
620{
621#define BADBIT(b) \
622 if ((revents & b)) return #b
623 BADBIT(POLLERR);
624 BADBIT(POLLHUP);
625 /* POLLNVAL is handled by the event loop - see afterpoll_fn comment */
626#undef BADBIT
627 return 0;
628}
629
a0fac2f1
IJ
630enum async_linebuf_result
631async_linebuf_read(struct pollfd *pfd, struct buffer_if *buf,
632 const char **emsg_out)
633{
634 int revents=pfd->revents;
635
636#define BAD(m) do{ *emsg_out=(m); return async_linebuf_broken; }while(0)
ae5ae3bf
IJ
637
638 const char *badbit=pollbadbit(revents);
639 if (badbit) BAD(badbit);
a0fac2f1
IJ
640
641 if (!(revents & POLLIN))
642 return async_linebuf_nothing;
643
644 /*
645 * Data structure: A line which has been returned to the user is
646 * stored in buf at base before start. But we retain the usual
647 * buffer meaning of size. So:
648 *
649 * | returned : | input read, | unused |
650 * | to user : \0 | awaiting | buffer |
651 * | : | processing | space |
652 * | : | | |
653 * ^base ^start ^start+size ^base+alloclen
654 */
655
656 BUF_ASSERT_USED(buf);
657
658 /* firstly, eat any previous */
659 if (buf->start != buf->base) {
660 memmove(buf->base,buf->start,buf->size);
661 buf->start=buf->base;
662 }
663
664 uint8_t *searched=buf->base;
665
666 /*
667 * During the workings here we do not use start. We set start
668 * when we return some actual data. So we have this:
669 *
670 * | searched | read, might | unused |
671 * | for \n | contain \n | buffer |
672 * | none found | but not \0 | space |
673 * | | | |
674 * ^base ^searched ^base+size ^base+alloclen
675 * [^start] ^dataend
676 *
677 */
678 for (;;) {
679 uint8_t *dataend=buf->base+buf->size;
680 char *newline=memchr(searched,'\n',dataend-searched);
681 if (newline) {
682 *newline=0;
683 buf->start=newline+1;
684 buf->size=dataend-buf->start;
685 return async_linebuf_ok;
686 }
687 searched=dataend;
688 ssize_t space=(buf->base+buf->alloclen)-dataend;
689 if (!space) BAD("input line too long");
690 ssize_t r=read(pfd->fd,searched,space);
691 if (r==0) {
692 *searched=0;
693 *emsg_out=buf->size?"no newline at eof":0;
694 buf->start=searched+1;
695 buf->size=0;
696 return async_linebuf_eof;
697 }
698 if (r<0) {
699 if (errno==EINTR)
700 continue;
701 if (iswouldblock(errno))
702 return async_linebuf_nothing;
703 BAD(strerror(errno));
704 }
705 assert(r<=space);
706 if (memchr(searched,0,r)) BAD("nul in input data");
707 buf->size+=r;
708 }
709
710#undef BAD
711}