sendrecvmsg.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 7 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2018 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Gustavo Lopes <cataphract@php.net> |
  16. +----------------------------------------------------------------------+
  17. */
  18. #include <php.h>
  19. #include "php_sockets.h"
  20. #include "sendrecvmsg.h"
  21. #include "conversions.h"
  22. #include <limits.h>
  23. #include <Zend/zend_llist.h>
  24. #ifdef ZTS
  25. #include <TSRM/TSRM.h>
  26. #endif
  27. #define MAX_USER_BUFF_SIZE ((size_t)(100*1024*1024))
  28. #define DEFAULT_BUFF_SIZE 8192
  29. #define MAX_ARRAY_KEY_SIZE 128
  30. #ifdef PHP_WIN32
  31. #include "windows_common.h"
  32. #include <Mswsock.h>
  33. #define IPV6_RECVPKTINFO IPV6_PKTINFO
  34. #define IPV6_RECVHOPLIMIT IPV6_HOPLIMIT
  35. #define msghdr _WSAMSG
  36. static GUID WSARecvMsg_GUID = WSAID_WSARECVMSG;
  37. static __declspec(thread) LPFN_WSARECVMSG WSARecvMsg = NULL;
  38. inline ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags)
  39. {
  40. DWORD recvd = 0,
  41. bytesReturned;
  42. if (WSARecvMsg == NULL) {
  43. int res = WSAIoctl((SOCKET) sockfd, SIO_GET_EXTENSION_FUNCTION_POINTER,
  44. &WSARecvMsg_GUID, sizeof(WSARecvMsg_GUID),
  45. &WSARecvMsg, sizeof(WSARecvMsg),
  46. &bytesReturned, NULL, NULL);
  47. if (res != 0) {
  48. return -1;
  49. }
  50. }
  51. msg->dwFlags = (DWORD)flags;
  52. return WSARecvMsg((SOCKET)sockfd, msg, &recvd, NULL, NULL) == 0
  53. ? (ssize_t)recvd
  54. : -1;
  55. }
  56. inline ssize_t sendmsg(int sockfd, const struct msghdr *msg, int flags)
  57. {
  58. DWORD sent = 0;
  59. return WSASendMsg((SOCKET)sockfd, (struct msghdr*)msg, (DWORD)flags, &sent, NULL, NULL) == 0
  60. ? (ssize_t)sent
  61. : -1;
  62. }
  63. #endif
  64. #define LONG_CHECK_VALID_INT(l) \
  65. do { \
  66. if ((l) < INT_MIN && (l) > INT_MAX) { \
  67. php_error_docref0(NULL, E_WARNING, "The value " ZEND_LONG_FMT " does not fit inside " \
  68. "the boundaries of a native integer", (l)); \
  69. return; \
  70. } \
  71. } while (0)
  72. static struct {
  73. int initialized;
  74. HashTable ht;
  75. } ancillary_registry;
  76. static void ancillary_registery_free_elem(zval *el) {
  77. pefree(Z_PTR_P(el), 1);
  78. }
  79. #ifdef ZTS
  80. static MUTEX_T ancillary_mutex;
  81. #endif
  82. static void init_ancillary_registry(void)
  83. {
  84. ancillary_reg_entry entry;
  85. anc_reg_key key;
  86. ancillary_registry.initialized = 1;
  87. zend_hash_init(&ancillary_registry.ht, 32, NULL, ancillary_registery_free_elem, 1);
  88. #define PUT_ENTRY(sizev, var_size, calc, from, to, level, type) \
  89. entry.size = sizev; \
  90. entry.var_el_size = var_size; \
  91. entry.calc_space = calc; \
  92. entry.from_array = from; \
  93. entry.to_array = to; \
  94. key.cmsg_level = level; \
  95. key.cmsg_type = type; \
  96. zend_hash_str_update_mem(&ancillary_registry.ht, (char*)&key, sizeof(key), (void*)&entry, sizeof(entry))
  97. #if defined(IPV6_PKTINFO) && HAVE_IPV6
  98. PUT_ENTRY(sizeof(struct in6_pktinfo), 0, 0, from_zval_write_in6_pktinfo,
  99. to_zval_read_in6_pktinfo, IPPROTO_IPV6, IPV6_PKTINFO);
  100. #endif
  101. #if defined(IPV6_HOPLIMIT) && HAVE_IPV6
  102. PUT_ENTRY(sizeof(int), 0, 0, from_zval_write_int,
  103. to_zval_read_int, IPPROTO_IPV6, IPV6_HOPLIMIT);
  104. #endif
  105. #if defined(IPV6_TCLASS) && HAVE_IPV6
  106. PUT_ENTRY(sizeof(int), 0, 0, from_zval_write_int,
  107. to_zval_read_int, IPPROTO_IPV6, IPV6_TCLASS);
  108. #endif
  109. #ifdef SO_PASSCRED
  110. PUT_ENTRY(sizeof(struct ucred), 0, 0, from_zval_write_ucred,
  111. to_zval_read_ucred, SOL_SOCKET, SCM_CREDENTIALS);
  112. #endif
  113. #ifdef SCM_RIGHTS
  114. PUT_ENTRY(0, sizeof(int), calculate_scm_rights_space, from_zval_write_fd_array,
  115. to_zval_read_fd_array, SOL_SOCKET, SCM_RIGHTS);
  116. #endif
  117. }
  118. static void destroy_ancillary_registry(void)
  119. {
  120. if (ancillary_registry.initialized) {
  121. zend_hash_destroy(&ancillary_registry.ht);
  122. ancillary_registry.initialized = 0;
  123. }
  124. }
  125. ancillary_reg_entry *get_ancillary_reg_entry(int cmsg_level, int msg_type)
  126. {
  127. anc_reg_key key = { cmsg_level, msg_type };
  128. ancillary_reg_entry *entry;
  129. #ifdef ZTS
  130. tsrm_mutex_lock(ancillary_mutex);
  131. #endif
  132. if (!ancillary_registry.initialized) {
  133. init_ancillary_registry();
  134. }
  135. #ifdef ZTS
  136. tsrm_mutex_unlock(ancillary_mutex);
  137. #endif
  138. if ((entry = zend_hash_str_find_ptr(&ancillary_registry.ht, (char*)&key, sizeof(key))) != NULL) {
  139. return entry;
  140. } else {
  141. return NULL;
  142. }
  143. }
  144. PHP_FUNCTION(socket_sendmsg)
  145. {
  146. zval *zsocket,
  147. *zmsg;
  148. zend_long flags = 0;
  149. php_socket *php_sock;
  150. struct msghdr *msghdr;
  151. zend_llist *allocations;
  152. struct err_s err = {0};
  153. ssize_t res;
  154. /* zmsg should be passed by ref */
  155. if (zend_parse_parameters(ZEND_NUM_ARGS(), "ra|l", &zsocket, &zmsg, &flags) == FAILURE) {
  156. return;
  157. }
  158. LONG_CHECK_VALID_INT(flags);
  159. if ((php_sock = (php_socket *)zend_fetch_resource(Z_RES_P(zsocket),
  160. php_sockets_le_socket_name, php_sockets_le_socket())) == NULL) {
  161. RETURN_FALSE;
  162. }
  163. msghdr = from_zval_run_conversions(zmsg, php_sock, from_zval_write_msghdr_send,
  164. sizeof(*msghdr), "msghdr", &allocations, &err);
  165. if (err.has_error) {
  166. err_msg_dispose(&err);
  167. RETURN_FALSE;
  168. }
  169. res = sendmsg(php_sock->bsd_socket, msghdr, (int)flags);
  170. if (res != -1) {
  171. RETVAL_LONG((zend_long)res);
  172. } else {
  173. PHP_SOCKET_ERROR(php_sock, "error in sendmsg", errno);
  174. RETVAL_FALSE;
  175. }
  176. allocations_dispose(&allocations);
  177. }
  178. PHP_FUNCTION(socket_recvmsg)
  179. {
  180. zval *zsocket,
  181. *zmsg;
  182. zend_long flags = 0;
  183. php_socket *php_sock;
  184. ssize_t res;
  185. struct msghdr *msghdr;
  186. zend_llist *allocations;
  187. struct err_s err = {0};
  188. //ssize_t recvmsg(int sockfd, struct msghdr *msg, int flags);
  189. if (zend_parse_parameters(ZEND_NUM_ARGS(), "ra|l",
  190. &zsocket, &zmsg, &flags) == FAILURE) {
  191. return;
  192. }
  193. LONG_CHECK_VALID_INT(flags);
  194. if ((php_sock = (php_socket *)zend_fetch_resource(Z_RES_P(zsocket),
  195. php_sockets_le_socket_name, php_sockets_le_socket())) == NULL) {
  196. RETURN_FALSE;
  197. }
  198. msghdr = from_zval_run_conversions(zmsg, php_sock, from_zval_write_msghdr_recv,
  199. sizeof(*msghdr), "msghdr", &allocations, &err);
  200. if (err.has_error) {
  201. err_msg_dispose(&err);
  202. RETURN_FALSE;
  203. }
  204. res = recvmsg(php_sock->bsd_socket, msghdr, (int)flags);
  205. if (res != -1) {
  206. zval *zres, tmp;
  207. struct key_value kv[] = {
  208. {KEY_RECVMSG_RET, sizeof(KEY_RECVMSG_RET), &res},
  209. {0}
  210. };
  211. zres = to_zval_run_conversions((char *)msghdr, to_zval_read_msghdr,
  212. "msghdr", kv, &err, &tmp);
  213. /* we don;t need msghdr anymore; free it */
  214. msghdr = NULL;
  215. zval_ptr_dtor(zmsg);
  216. if (!err.has_error) {
  217. ZVAL_COPY_VALUE(zmsg, zres);
  218. } else {
  219. err_msg_dispose(&err);
  220. ZVAL_FALSE(zmsg);
  221. /* no need to destroy/free zres -- it's NULL in this circumstance */
  222. assert(zres == NULL);
  223. }
  224. RETVAL_LONG((zend_long)res);
  225. } else {
  226. SOCKETS_G(last_error) = errno;
  227. php_error_docref(NULL, E_WARNING, "error in recvmsg [%d]: %s",
  228. errno, sockets_strerror(errno));
  229. RETVAL_FALSE;
  230. }
  231. allocations_dispose(&allocations);
  232. }
  233. PHP_FUNCTION(socket_cmsg_space)
  234. {
  235. zend_long level,
  236. type,
  237. n = 0;
  238. ancillary_reg_entry *entry;
  239. if (zend_parse_parameters(ZEND_NUM_ARGS(), "ll|l",
  240. &level, &type, &n) == FAILURE) {
  241. return;
  242. }
  243. LONG_CHECK_VALID_INT(level);
  244. LONG_CHECK_VALID_INT(type);
  245. LONG_CHECK_VALID_INT(n);
  246. if (n < 0) {
  247. php_error_docref0(NULL, E_WARNING, "The third argument "
  248. "cannot be negative");
  249. return;
  250. }
  251. entry = get_ancillary_reg_entry(level, type);
  252. if (entry == NULL) {
  253. php_error_docref0(NULL, E_WARNING, "The pair level " ZEND_LONG_FMT "/type " ZEND_LONG_FMT " is "
  254. "not supported by PHP", level, type);
  255. return;
  256. }
  257. if (entry->var_el_size > 0 && n > (zend_long)((ZEND_LONG_MAX - entry->size -
  258. CMSG_SPACE(0) - 15L) / entry->var_el_size)) {
  259. /* the -15 is to account for any padding CMSG_SPACE may add after the data */
  260. php_error_docref0(NULL, E_WARNING, "The value for the "
  261. "third argument (" ZEND_LONG_FMT ") is too large", n);
  262. return;
  263. }
  264. RETURN_LONG((zend_long)CMSG_SPACE(entry->size + n * entry->var_el_size));
  265. }
  266. #if HAVE_IPV6
  267. int php_do_setsockopt_ipv6_rfc3542(php_socket *php_sock, int level, int optname, zval *arg4)
  268. {
  269. struct err_s err = {0};
  270. zend_llist *allocations = NULL;
  271. void *opt_ptr;
  272. socklen_t optlen;
  273. int retval;
  274. assert(level == IPPROTO_IPV6);
  275. switch (optname) {
  276. #ifdef IPV6_PKTINFO
  277. case IPV6_PKTINFO:
  278. #ifdef PHP_WIN32
  279. if (Z_TYPE_P(arg4) == IS_ARRAY) {
  280. php_error_docref0(NULL, E_WARNING, "Windows does not "
  281. "support sticky IPV6_PKTINFO");
  282. return FAILURE;
  283. } else {
  284. /* windows has no IPV6_RECVPKTINFO, and uses IPV6_PKTINFO
  285. * for the same effect. We define IPV6_RECVPKTINFO to be
  286. * IPV6_PKTINFO, so assume the assume user used IPV6_RECVPKTINFO */
  287. return 1;
  288. }
  289. #endif
  290. opt_ptr = from_zval_run_conversions(arg4, php_sock, from_zval_write_in6_pktinfo,
  291. sizeof(struct in6_pktinfo), "in6_pktinfo", &allocations, &err);
  292. if (err.has_error) {
  293. err_msg_dispose(&err);
  294. return FAILURE;
  295. }
  296. optlen = sizeof(struct in6_pktinfo);
  297. goto dosockopt;
  298. #endif
  299. }
  300. /* we also support IPV6_TCLASS, but that can be handled by the default
  301. * integer optval handling in the caller */
  302. return 1;
  303. dosockopt:
  304. retval = setsockopt(php_sock->bsd_socket, level, optname, opt_ptr, optlen);
  305. if (retval != 0) {
  306. PHP_SOCKET_ERROR(php_sock, "unable to set socket option", errno);
  307. }
  308. allocations_dispose(&allocations);
  309. return retval != 0 ? FAILURE : SUCCESS;
  310. }
  311. int php_do_getsockopt_ipv6_rfc3542(php_socket *php_sock, int level, int optname, zval *result)
  312. {
  313. struct err_s err = {0};
  314. void *buffer;
  315. socklen_t size;
  316. int res;
  317. to_zval_read_field *reader;
  318. assert(level == IPPROTO_IPV6);
  319. switch (optname) {
  320. #ifdef IPV6_PKTINFO
  321. case IPV6_PKTINFO:
  322. size = sizeof(struct in6_pktinfo);
  323. reader = &to_zval_read_in6_pktinfo;
  324. break;
  325. #endif
  326. default:
  327. return 1;
  328. }
  329. buffer = ecalloc(1, size);
  330. res = getsockopt(php_sock->bsd_socket, level, optname, buffer, &size);
  331. if (res != 0) {
  332. PHP_SOCKET_ERROR(php_sock, "unable to get socket option", errno);
  333. } else {
  334. zval tmp;
  335. zval *zv = to_zval_run_conversions(buffer, reader, "in6_pktinfo",
  336. empty_key_value_list, &err, &tmp);
  337. if (err.has_error) {
  338. err_msg_dispose(&err);
  339. res = -1;
  340. } else {
  341. ZVAL_COPY_VALUE(result, zv);
  342. }
  343. }
  344. efree(buffer);
  345. return res == 0 ? SUCCESS : FAILURE;
  346. }
  347. #endif /* HAVE_IPV6 */
  348. void php_socket_sendrecvmsg_init(INIT_FUNC_ARGS)
  349. {
  350. /* IPv6 ancillary data */
  351. #if defined(IPV6_RECVPKTINFO) && HAVE_IPV6
  352. REGISTER_LONG_CONSTANT("IPV6_RECVPKTINFO", IPV6_RECVPKTINFO, CONST_CS | CONST_PERSISTENT);
  353. REGISTER_LONG_CONSTANT("IPV6_PKTINFO", IPV6_PKTINFO, CONST_CS | CONST_PERSISTENT);
  354. #endif
  355. #if defined(IPV6_RECVHOPLIMIT) && HAVE_IPV6
  356. REGISTER_LONG_CONSTANT("IPV6_RECVHOPLIMIT", IPV6_RECVHOPLIMIT, CONST_CS | CONST_PERSISTENT);
  357. REGISTER_LONG_CONSTANT("IPV6_HOPLIMIT", IPV6_HOPLIMIT, CONST_CS | CONST_PERSISTENT);
  358. #endif
  359. /* would require some effort:
  360. REGISTER_LONG_CONSTANT("IPV6_RECVRTHDR", IPV6_RECVRTHDR, CONST_CS | CONST_PERSISTENT);
  361. REGISTER_LONG_CONSTANT("IPV6_RECVHOPOPTS", IPV6_RECVHOPOPTS, CONST_CS | CONST_PERSISTENT);
  362. REGISTER_LONG_CONSTANT("IPV6_RECVDSTOPTS", IPV6_RECVDSTOPTS, CONST_CS | CONST_PERSISTENT);
  363. */
  364. #if defined(IPV6_RECVTCLASS) && HAVE_IPV6
  365. REGISTER_LONG_CONSTANT("IPV6_RECVTCLASS", IPV6_RECVTCLASS, CONST_CS | CONST_PERSISTENT);
  366. REGISTER_LONG_CONSTANT("IPV6_TCLASS", IPV6_TCLASS, CONST_CS | CONST_PERSISTENT);
  367. #endif
  368. /*
  369. REGISTER_LONG_CONSTANT("IPV6_RTHDR", IPV6_RTHDR, CONST_CS | CONST_PERSISTENT);
  370. REGISTER_LONG_CONSTANT("IPV6_HOPOPTS", IPV6_HOPOPTS, CONST_CS | CONST_PERSISTENT);
  371. REGISTER_LONG_CONSTANT("IPV6_DSTOPTS", IPV6_DSTOPTS, CONST_CS | CONST_PERSISTENT);
  372. */
  373. #ifdef SCM_RIGHTS
  374. REGISTER_LONG_CONSTANT("SCM_RIGHTS", SCM_RIGHTS, CONST_CS | CONST_PERSISTENT);
  375. #endif
  376. #ifdef SO_PASSCRED
  377. REGISTER_LONG_CONSTANT("SCM_CREDENTIALS", SCM_CREDENTIALS, CONST_CS | CONST_PERSISTENT);
  378. REGISTER_LONG_CONSTANT("SO_PASSCRED", SO_PASSCRED, CONST_CS | CONST_PERSISTENT);
  379. #endif
  380. #ifdef ZTS
  381. ancillary_mutex = tsrm_mutex_alloc();
  382. #endif
  383. }
  384. void php_socket_sendrecvmsg_shutdown(SHUTDOWN_FUNC_ARGS)
  385. {
  386. #ifdef ZTS
  387. tsrm_mutex_free(ancillary_mutex);
  388. #endif
  389. destroy_ancillary_registry();
  390. }