mirror of https://github.com/sipwise/kamailio.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
578 lines
15 KiB
578 lines
15 KiB
/*
|
|
* Copyright (C) 2001-2003 FhG Fokus
|
|
*
|
|
* This file is part of Kamailio, a free SIP server.
|
|
*
|
|
* Kamailio is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version
|
|
*
|
|
* Kamailio is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*
|
|
*/
|
|
|
|
|
|
/** Kamailio core :: udp send and loop-receive functions.
|
|
* @file udp_server.c
|
|
* @ingroup core
|
|
* Module: @ref core
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/ip.h>
|
|
#include <errno.h>
|
|
#include <arpa/inet.h>
|
|
#ifdef __linux__
|
|
#include <linux/types.h>
|
|
#include <linux/errqueue.h>
|
|
#endif
|
|
|
|
|
|
#include "udp_server.h"
|
|
#include "compiler_opt.h"
|
|
#include "globals.h"
|
|
#include "config.h"
|
|
#include "dprint.h"
|
|
#include "receive.h"
|
|
#include "mem/mem.h"
|
|
#include "ip_addr.h"
|
|
#include "cfg/cfg_struct.h"
|
|
#include "events.h"
|
|
#include "stun.h"
|
|
#ifdef USE_RAW_SOCKS
|
|
#include "raw_sock.h"
|
|
#endif /* USE_RAW_SOCKS */
|
|
|
|
|
|
#ifdef DBG_MSG_QA
|
|
/* message quality assurance -- frequently, bugs in ser have
|
|
been indicated by zero characters or long whitespaces
|
|
in generated messages; this debugging option aborts if
|
|
any such message is sighted
|
|
*/
|
|
static int dbg_msg_qa(char *buf, int len)
|
|
{
|
|
#define _DBG_WS_LEN 3
|
|
#define _DBG_WS " "
|
|
|
|
char *scan;
|
|
int my_len;
|
|
int space_cnt;
|
|
enum { QA_ANY, QA_SPACE, QA_EOL1 } state;
|
|
|
|
|
|
/* is there a zero character in there ? */
|
|
if (memchr(buf, 0, len)) {
|
|
LM_CRIT("message with 0 in it\n");
|
|
return 0;
|
|
}
|
|
|
|
my_len=len;
|
|
scan=buf;
|
|
state=QA_ANY;
|
|
space_cnt=0;
|
|
|
|
while(my_len) {
|
|
switch(*scan) {
|
|
case ' ': if (state==QA_SPACE) {
|
|
space_cnt++;
|
|
if (space_cnt==4) {
|
|
LM_CRIT("too many spaces\n");
|
|
return 0;
|
|
}
|
|
} else space_cnt=0;
|
|
state=QA_SPACE;
|
|
break;
|
|
|
|
case '\r': /* ignore */
|
|
space_cnt=0;
|
|
break;
|
|
|
|
case '\n': /* don't proceed to body on EoH */
|
|
if (state==QA_EOL1) goto qa_passed;
|
|
space_cnt=0;
|
|
state=QA_EOL1;
|
|
break;
|
|
|
|
default: space_cnt=0;
|
|
state=QA_ANY;
|
|
break;
|
|
}
|
|
scan++;
|
|
my_len--;
|
|
}
|
|
|
|
|
|
qa_passed:
|
|
return 1;
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
int probe_max_receive_buffer( int udp_sock )
|
|
{
|
|
int optval;
|
|
int ioptval;
|
|
unsigned int ioptvallen;
|
|
int foptval;
|
|
unsigned int foptvallen;
|
|
int voptval;
|
|
unsigned int voptvallen;
|
|
int phase=0;
|
|
|
|
/* jku: try to increase buffer size as much as we can */
|
|
ioptvallen=sizeof(ioptval);
|
|
if (getsockopt( udp_sock, SOL_SOCKET, SO_RCVBUF, (void*) &ioptval,
|
|
&ioptvallen) == -1 )
|
|
{
|
|
LM_ERR("getsockopt: %s\n", strerror(errno));
|
|
return -1;
|
|
}
|
|
if ( ioptval==0 )
|
|
{
|
|
LM_DBG("SO_RCVBUF initially set to 0; resetting to %d\n",
|
|
BUFFER_INCREMENT );
|
|
ioptval=BUFFER_INCREMENT;
|
|
} else LM_INFO("SO_RCVBUF is initially %d\n", ioptval );
|
|
for (optval=ioptval; ; ) {
|
|
/* increase size; double in initial phase, add linearly later */
|
|
if (phase==0) optval <<= 1; else optval+=BUFFER_INCREMENT;
|
|
if (optval > maxbuffer){
|
|
if (phase==1) break;
|
|
else { phase=1; optval >>=1; continue; }
|
|
}
|
|
LM_DBG("trying SO_RCVBUF: %d\n", optval );
|
|
if (setsockopt( udp_sock, SOL_SOCKET, SO_RCVBUF,
|
|
(void*)&optval, sizeof(optval)) ==-1){
|
|
/* Solaris returns -1 if asked size too big; Linux ignores */
|
|
LM_DBG("SOL_SOCKET failed for %d, phase %d: %s\n", optval, phase, strerror(errno));
|
|
/* if setting buffer size failed and still in the aggressive
|
|
phase, try less aggressively; otherwise give up
|
|
*/
|
|
if (phase==0) { phase=1; optval >>=1 ; continue; }
|
|
else break;
|
|
}
|
|
/* verify if change has taken effect */
|
|
/* Linux note -- otherwise I would never know that; funny thing: Linux
|
|
doubles size for which we asked in setsockopt
|
|
*/
|
|
voptvallen=sizeof(voptval);
|
|
if (getsockopt( udp_sock, SOL_SOCKET, SO_RCVBUF, (void*) &voptval,
|
|
&voptvallen) == -1 )
|
|
{
|
|
LM_ERR("getsockopt: %s\n", strerror(errno));
|
|
return -1;
|
|
} else {
|
|
LM_DBG("setting SO_RCVBUF; set=%d,verify=%d\n",
|
|
optval, voptval);
|
|
if (voptval<optval) {
|
|
LM_DBG("setting SO_RCVBUF has no effect\n");
|
|
/* if setting buffer size failed and still in the aggressive
|
|
phase, try less aggressively; otherwise give up
|
|
*/
|
|
if (phase==0) { phase=1; optval >>=1 ; continue; }
|
|
else break;
|
|
}
|
|
}
|
|
|
|
} /* for ... */
|
|
foptvallen=sizeof(foptval);
|
|
if (getsockopt( udp_sock, SOL_SOCKET, SO_RCVBUF, (void*) &foptval,
|
|
&foptvallen) == -1 )
|
|
{
|
|
LM_ERR("getsockopt: %s\n", strerror(errno));
|
|
return -1;
|
|
}
|
|
LM_INFO("SO_RCVBUF is finally %d\n", foptval );
|
|
|
|
return 0;
|
|
|
|
/* EoJKU */
|
|
}
|
|
|
|
|
|
#ifdef USE_MCAST
|
|
|
|
/*
|
|
* Setup multicast receiver
|
|
*/
|
|
static int setup_mcast_rcvr(int sock, union sockaddr_union* addr)
|
|
{
|
|
struct ip_mreq mreq;
|
|
struct ipv6_mreq mreq6;
|
|
|
|
if (addr->s.sa_family==AF_INET){
|
|
memcpy(&mreq.imr_multiaddr, &addr->sin.sin_addr,
|
|
sizeof(struct in_addr));
|
|
mreq.imr_interface.s_addr = htonl(INADDR_ANY);
|
|
|
|
if (setsockopt(sock, IPPROTO_IP, IP_ADD_MEMBERSHIP,&mreq,
|
|
sizeof(mreq))==-1){
|
|
LM_ERR("setsockopt: %s\n", strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
} else if (addr->s.sa_family==AF_INET6){
|
|
memcpy(&mreq6.ipv6mr_multiaddr, &addr->sin6.sin6_addr,
|
|
sizeof(struct in6_addr));
|
|
mreq6.ipv6mr_interface = 0;
|
|
#ifdef __OS_linux
|
|
if (setsockopt(sock, IPPROTO_IPV6, IPV6_ADD_MEMBERSHIP, &mreq6,
|
|
#else
|
|
if (setsockopt(sock, IPPROTO_IPV6, IPV6_JOIN_GROUP, &mreq6,
|
|
#endif
|
|
sizeof(mreq6))==-1){
|
|
LM_ERR("setsockopt:%s\n", strerror(errno));
|
|
return -1;
|
|
}
|
|
|
|
} else {
|
|
LM_ERR("setup_mcast_rcvr: Unsupported protocol family\n");
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
#endif /* USE_MCAST */
|
|
|
|
|
|
int udp_init(struct socket_info* sock_info)
|
|
{
|
|
union sockaddr_union* addr;
|
|
int optval;
|
|
#ifdef USE_MCAST
|
|
unsigned char m_ttl, m_loop;
|
|
#endif
|
|
addr=&sock_info->su;
|
|
/*
|
|
addr=(union sockaddr_union*)pkg_malloc(sizeof(union sockaddr_union));
|
|
if (addr==0){
|
|
LM_ERR("out of memory\n");
|
|
goto error;
|
|
}
|
|
*/
|
|
sock_info->proto=PROTO_UDP;
|
|
if (init_su(addr, &sock_info->address, sock_info->port_no)<0){
|
|
LM_ERR("could not init sockaddr_union\n");
|
|
goto error;
|
|
}
|
|
|
|
sock_info->socket = socket(AF2PF(addr->s.sa_family), SOCK_DGRAM, 0);
|
|
if (sock_info->socket==-1){
|
|
LM_ERR("socket: %s\n", strerror(errno));
|
|
goto error;
|
|
}
|
|
/* set sock opts? */
|
|
optval=1;
|
|
if (setsockopt(sock_info->socket, SOL_SOCKET, SO_REUSEADDR ,
|
|
(void*)&optval, sizeof(optval)) ==-1){
|
|
LM_ERR("setsockopt: %s\n", strerror(errno));
|
|
goto error;
|
|
}
|
|
/* tos */
|
|
optval = tos;
|
|
if (addr->s.sa_family==AF_INET){
|
|
if (setsockopt(sock_info->socket, IPPROTO_IP, IP_TOS, (void*)&optval,
|
|
sizeof(optval)) ==-1){
|
|
LM_WARN("setsockopt tos: %s\n", strerror(errno));
|
|
/* continue since this is not critical */
|
|
}
|
|
} else if (addr->s.sa_family==AF_INET6){
|
|
if (setsockopt(sock_info->socket, IPPROTO_IPV6, IPV6_TCLASS,
|
|
(void*)&optval, sizeof(optval)) ==-1) {
|
|
LM_WARN("setsockopt v6 tos: %s\n", strerror(errno));
|
|
/* continue since this is not critical */
|
|
}
|
|
}
|
|
|
|
#if defined (__OS_linux) && defined(UDP_ERRORS)
|
|
optval=1;
|
|
/* enable error receiving on unconnected sockets */
|
|
if(setsockopt(sock_info->socket, SOL_IP, IP_RECVERR,
|
|
(void*)&optval, sizeof(optval)) ==-1){
|
|
LM_ERR("setsockopt: %s\n", strerror(errno));
|
|
goto error;
|
|
}
|
|
#endif
|
|
#if defined (__OS_linux)
|
|
/* if pmtu_discovery=1 then set DF bit and do Path MTU discovery
|
|
* disabled by default */
|
|
optval= (pmtu_discovery) ? IP_PMTUDISC_DO : IP_PMTUDISC_DONT;
|
|
if(setsockopt(sock_info->socket, IPPROTO_IP, IP_MTU_DISCOVER,
|
|
(void*)&optval, sizeof(optval)) ==-1){
|
|
LM_ERR("setsockopt: %s\n", strerror(errno));
|
|
goto error;
|
|
}
|
|
#endif
|
|
|
|
#ifdef USE_MCAST
|
|
if ((sock_info->flags & SI_IS_MCAST)
|
|
&& (setup_mcast_rcvr(sock_info->socket, addr)<0)){
|
|
goto error;
|
|
}
|
|
/* set the multicast options */
|
|
if (addr->s.sa_family==AF_INET){
|
|
m_loop=mcast_loopback;
|
|
if (setsockopt(sock_info->socket, IPPROTO_IP, IP_MULTICAST_LOOP,
|
|
&m_loop, sizeof(m_loop))==-1){
|
|
LM_WARN("setsockopt(IP_MULTICAST_LOOP): %s\n", strerror(errno));
|
|
/* it's only a warning because we might get this error if the
|
|
network interface doesn't support multicasting -- andrei */
|
|
}
|
|
if (mcast_ttl>=0){
|
|
m_ttl=mcast_ttl;
|
|
if (setsockopt(sock_info->socket, IPPROTO_IP, IP_MULTICAST_TTL,
|
|
&m_ttl, sizeof(m_ttl))==-1){
|
|
LM_WARN("setsockopt (IP_MULTICAST_TTL): %s\n", strerror(errno));
|
|
}
|
|
}
|
|
} else if (addr->s.sa_family==AF_INET6){
|
|
if (setsockopt(sock_info->socket, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
|
|
&mcast_loopback, sizeof(mcast_loopback))==-1){
|
|
LM_WARN("setsockopt (IPV6_MULTICAST_LOOP): %s\n", strerror(errno));
|
|
}
|
|
if (mcast_ttl>=0){
|
|
if (setsockopt(sock_info->socket, IPPROTO_IP, IPV6_MULTICAST_HOPS,
|
|
&mcast_ttl, sizeof(mcast_ttl))==-1){
|
|
LM_WARN("setssckopt (IPV6_MULTICAST_HOPS): %s\n", strerror(errno));
|
|
}
|
|
}
|
|
} else {
|
|
LM_ERR("Unsupported protocol family %d\n", addr->s.sa_family);
|
|
goto error;
|
|
}
|
|
#endif /* USE_MCAST */
|
|
|
|
if ( probe_max_receive_buffer(sock_info->socket)==-1) goto error;
|
|
|
|
if (bind(sock_info->socket, &addr->s, sockaddru_len(*addr))==-1){
|
|
LM_ERR("bind(%x, %p, %d) on %s: %s\n",
|
|
sock_info->socket, &addr->s,
|
|
(unsigned)sockaddru_len(*addr),
|
|
sock_info->address_str.s,
|
|
strerror(errno));
|
|
if (addr->s.sa_family==AF_INET6)
|
|
LM_ERR("might be caused by using a link local address, try site local or global\n");
|
|
goto error;
|
|
}
|
|
|
|
/* pkg_free(addr);*/
|
|
return 0;
|
|
|
|
error:
|
|
/* if (addr) pkg_free(addr);*/
|
|
return -1;
|
|
}
|
|
|
|
|
|
|
|
int udp_rcv_loop()
|
|
{
|
|
unsigned len;
|
|
#ifdef DYN_BUF
|
|
char* buf;
|
|
#else
|
|
static char buf [BUF_SIZE+1];
|
|
#endif
|
|
char *tmp;
|
|
union sockaddr_union* from;
|
|
unsigned int fromlen;
|
|
struct receive_info ri;
|
|
|
|
|
|
from=(union sockaddr_union*) pkg_malloc(sizeof(union sockaddr_union));
|
|
if (from==0){
|
|
LM_ERR("out of memory\n");
|
|
goto error;
|
|
}
|
|
memset(from, 0 , sizeof(union sockaddr_union));
|
|
ri.bind_address=bind_address; /* this will not change, we do it only once*/
|
|
ri.dst_port=bind_address->port_no;
|
|
ri.dst_ip=bind_address->address;
|
|
ri.proto=PROTO_UDP;
|
|
ri.proto_reserved1=ri.proto_reserved2=0;
|
|
|
|
/* initialize the config framework */
|
|
if (cfg_child_init()) goto error;
|
|
|
|
for(;;){
|
|
#ifdef DYN_BUF
|
|
buf=pkg_malloc(BUF_SIZE+1);
|
|
if (buf==0){
|
|
LM_ERR("could not allocate receive buffer\n");
|
|
goto error;
|
|
}
|
|
#endif
|
|
fromlen=sockaddru_len(bind_address->su);
|
|
len=recvfrom(bind_address->socket, buf, BUF_SIZE, 0, &from->s,
|
|
&fromlen);
|
|
if (len==-1){
|
|
if (errno==EAGAIN){
|
|
LM_DBG("packet with bad checksum received\n");
|
|
continue;
|
|
}
|
|
LM_ERR("recvfrom:[%d] %s\n", errno, strerror(errno));
|
|
if ((errno==EINTR)||(errno==EWOULDBLOCK)|| (errno==ECONNREFUSED))
|
|
continue; /* goto skip;*/
|
|
else goto error;
|
|
}
|
|
/* we must 0-term the messages, receive_msg expects it */
|
|
buf[len]=0; /* no need to save the previous char */
|
|
|
|
ri.src_su=*from;
|
|
su2ip_addr(&ri.src_ip, from);
|
|
ri.src_port=su_getport(from);
|
|
|
|
if(unlikely(sr_event_enabled(SREV_NET_DGRAM_IN)))
|
|
{
|
|
void *sredp[3];
|
|
sredp[0] = (void*)buf;
|
|
sredp[1] = (void*)(&len);
|
|
sredp[2] = (void*)(&ri);
|
|
if(sr_event_exec(SREV_NET_DGRAM_IN, (void*)sredp)<0) {
|
|
/* data handled by callback - continue to next packet */
|
|
continue;
|
|
}
|
|
}
|
|
#ifndef NO_ZERO_CHECKS
|
|
if (!unlikely(sr_event_enabled(SREV_STUN_IN)) || (unsigned char)*buf != 0x00) {
|
|
if (len<MIN_UDP_PACKET) {
|
|
tmp=ip_addr2a(&ri.src_ip);
|
|
LM_DBG("probing packet received from %s %d\n", tmp, htons(ri.src_port));
|
|
continue;
|
|
}
|
|
}
|
|
/* historically, zero-terminated packets indicated a bug in clients
|
|
* that calculated wrongly packet length and included string-terminating
|
|
* zero; today clients exist with legitimate binary payloads and we
|
|
* shall not check for zero-terminated payloads
|
|
*/
|
|
#ifdef TRASH_ZEROTERMINATED_PACKETS
|
|
if (buf[len-1]==0) {
|
|
tmp=ip_addr2a(&ri.src_ip);
|
|
LM_WARN("upstream bug - 0-terminated packet from %s %d\n",
|
|
tmp, htons(ri.src_port));
|
|
len--;
|
|
}
|
|
#endif
|
|
#endif
|
|
#ifdef DBG_MSG_QA
|
|
if (!dbg_msg_qa(buf, len)) {
|
|
LM_WARN("an incoming message didn't pass test,"
|
|
" drop it: %.*s\n", len, buf );
|
|
continue;
|
|
}
|
|
#endif
|
|
if (ri.src_port==0){
|
|
tmp=ip_addr2a(&ri.src_ip);
|
|
LM_INFO("dropping 0 port packet from %s\n", tmp);
|
|
continue;
|
|
}
|
|
|
|
/* update the local config */
|
|
cfg_update();
|
|
if (unlikely(sr_event_enabled(SREV_STUN_IN)) && (unsigned char)*buf == 0x00) {
|
|
/* stun_process_msg releases buf memory if necessary */
|
|
if ((stun_process_msg(buf, len, &ri)) != 0) {
|
|
continue; /* some error occurred */
|
|
}
|
|
} else {
|
|
/* receive_msg must free buf too!*/
|
|
receive_msg(buf, len, &ri);
|
|
}
|
|
|
|
/* skip: do other stuff */
|
|
|
|
}
|
|
/*
|
|
if (from) pkg_free(from);
|
|
return 0;
|
|
*/
|
|
|
|
error:
|
|
if (from) pkg_free(from);
|
|
return -1;
|
|
}
|
|
|
|
|
|
|
|
|
|
/* send buf:len over udp to dst (uses only the to and send_sock dst members)
|
|
* returns the numbers of bytes sent on success (>=0) and -1 on error
|
|
*/
|
|
int udp_send(struct dest_info* dst, char *buf, unsigned len)
|
|
{
|
|
|
|
int n;
|
|
int tolen;
|
|
struct ip_addr ip; /* used only on error, for debugging */
|
|
#ifdef USE_RAW_SOCKS
|
|
int mtu;
|
|
#endif /* USE_RAW_SOCKS */
|
|
|
|
#ifdef DBG_MSG_QA
|
|
/* aborts on error, does nothing otherwise */
|
|
if (!dbg_msg_qa( buf, len )) {
|
|
LM_ERR("dbg_msg_qa failed\n");
|
|
abort();
|
|
}
|
|
#endif
|
|
#ifdef USE_RAW_SOCKS
|
|
if (likely( ! (raw_udp4_send_sock >= 0 &&
|
|
cfg_get(core, core_cfg, udp4_raw) &&
|
|
dst->send_sock->address.af == AF_INET) )) {
|
|
#endif /* USE_RAW_SOCKS */
|
|
/* normal send over udp socket */
|
|
tolen=sockaddru_len(dst->to);
|
|
again:
|
|
n=sendto(dst->send_sock->socket, buf, len, 0, &dst->to.s, tolen);
|
|
#ifdef XL_DEBUG
|
|
LM_INFO("send status: %d\n", n);
|
|
#endif
|
|
if (unlikely(n==-1)){
|
|
su2ip_addr(&ip, &dst->to);
|
|
LM_ERR("sendto(sock,%p,%u,0,%s:%d,%d): %s(%d)\n",
|
|
buf,len, ip_addr2a(&ip),
|
|
su_getport(&dst->to), tolen, strerror(errno), errno);
|
|
if (errno==EINTR) goto again;
|
|
if (errno==EINVAL) {
|
|
LM_CRIT("invalid sendtoparameters\n"
|
|
"one possible reason is the server is bound to localhost and\n"
|
|
"attempts to send to the net\n");
|
|
}
|
|
}
|
|
#ifdef USE_RAW_SOCKS
|
|
} else {
|
|
/* send over a raw socket */
|
|
mtu = cfg_get(core, core_cfg, udp4_raw_mtu);
|
|
raw_again:
|
|
n=raw_iphdr_udp4_send(raw_udp4_send_sock, buf, len,
|
|
&dst->send_sock->su,
|
|
&dst->to,
|
|
mtu);
|
|
if (unlikely(n==-1)){
|
|
su2ip_addr(&ip, &dst->to);
|
|
LM_ERR("raw_iphdr_udp4_send(%d,%p,%u,...,%s:%d,%d): %s(%d)\n",
|
|
raw_udp4_send_sock, buf,len, ip_addr2a(&ip),
|
|
su_getport(&dst->to), mtu, strerror(errno), errno);
|
|
if (errno==EINTR) goto raw_again;
|
|
}
|
|
}
|
|
#endif /* USE_RAW_SOCKS */
|
|
return n;
|
|
}
|