Files
gem5/src/base/socket.cc
Melissa Jost 74072cdc80 base: Update <experimental/filesystem> include
This change addresses an error in the compiler tests:
https://jenkins.gem5.org/job/compiler-checks/573/

For clang versions 6 through 10, as well as GCC 7,
in order to use the "filesystem" module, you must
include the experimental namespace.  In all newer
versions, you can use the "filesystem" module as is.

Because of this, include guards to handle this. They include
"<experimental/filesystem>" for the older clang versions and
the "<filesystem>" for all other versions.

As opposed to checking by version, we now check if the
filesystem library has been defined before using it.

Change-Id: I8fb8d4eaa33f3edc29b7626f44b82ee66ffe72be
Reviewed-on: https://gem5-review.googlesource.com/c/public/gem5/+/69778
Maintainer: Bobby Bruce <bbruce@ucdavis.edu>
Tested-by: kokoro <noreply+kokoro@google.com>
Reviewed-by: Bobby Bruce <bbruce@ucdavis.edu>
2023-04-24 23:30:01 +00:00

408 lines
12 KiB
C++

/*
* Copyright (c) 2020 The Regents of the University of California
* All rights reserved
*
* Copyright (c) 2002-2005 The Regents of The University of Michigan
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met: redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer;
* redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution;
* neither the name of the copyright holders nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "base/socket.hh"
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/un.h>
#include <unistd.h>
#include <cerrno>
// check if filesystem library is available
#if defined(__cpp_lib_filesystem) || __has_include(<filesystem>)
#include <filesystem>
#else
// This is only reachable if we're using GCC 7 or clang versions 6
// through 10 (note: gem5 does not support GCC versions older than
// GCC 7 or clang versions older than clang 6.0 as they do not
// support the C++17 standard).
// If we're using GCC 7 or clang versions 6 through 10, we need to use
// <experimental/filesystem>.
#include <experimental/filesystem>
namespace std {
namespace filesystem = experimental::filesystem;
}
#endif
#include "base/logging.hh"
#include "base/output.hh"
#include "base/str.hh"
#include "base/types.hh"
#include "sim/byteswap.hh"
namespace gem5
{
bool ListenSocket::listeningDisabled = false;
bool ListenSocket::anyListening = false;
bool ListenSocket::bindToLoopback = false;
void
ListenSocket::cleanup()
{
listeningDisabled = false;
anyListening = false;
bindToLoopback = false;
}
void
ListenSocket::disableAll()
{
if (anyListening)
panic("Too late to disable all listeners, already have a listener");
listeningDisabled = true;
}
bool
ListenSocket::allDisabled()
{
return listeningDisabled;
}
void
ListenSocket::loopbackOnly()
{
if (anyListening)
panic("Too late to bind to loopback, already have a listener");
bindToLoopback = true;
}
// Wrappers to stub out SOCK_CLOEXEC/accept4 availability
int
ListenSocket::socketCloexec(int domain, int type, int protocol)
{
#ifdef SOCK_CLOEXEC
type |= SOCK_CLOEXEC;
#endif
return ::socket(domain, type, protocol);
}
int
ListenSocket::acceptCloexec(int sockfd, struct sockaddr *addr,
socklen_t *addrlen)
{
#if defined(_GNU_SOURCE) && defined(SOCK_CLOEXEC)
return ::accept4(sockfd, addr, addrlen, SOCK_CLOEXEC);
#else
return ::accept(sockfd, addr, addrlen);
#endif
}
////////////////////////////////////////////////////////////////////////
//
//
ListenSocket::ListenSocket(const std::string &_name) : Named(_name) {}
ListenSocket::~ListenSocket()
{
if (fd != -1)
close(fd);
}
// Open a connection. Accept will block, so if you don't want it to,
// make sure a connection is ready before you call accept.
int
ListenSocket::accept()
{
struct sockaddr_in sockaddr;
socklen_t slen = sizeof(sockaddr);
int sfd = acceptCloexec(fd, (struct sockaddr *)&sockaddr, &slen);
panic_if(sfd == -1, "%s: Failed to accept connection: %s",
name(), strerror(errno));
return sfd;
}
bool
ListenSocketConfig::parseIni(const std::string &value,
ListenSocketConfig &retval)
{
if (value.size() == 0) {
retval = listenSocketEmptyConfig();
return true;
} else if (value[0] == '@') {
retval = listenSocketUnixAbstractConfig(value.substr(1));
return true;
} else if (value[0] == 'P') {
std::filesystem::path p(value.substr(1));
retval = listenSocketUnixFileConfig(p.parent_path(), p.filename());
return true;
} else if (value[0] == '#') {
uint64_t port;
bool ret = to_number(value.substr(1), port);
if (!ret)
return false;
retval = listenSocketInetConfig(port);
return true;
} else {
panic("Can't interpret %s as a host socket.", value);
}
}
ListenSocketInet::ListenSocketInet(const std::string &_name, int port)
: ListenSocket(_name), _port(port)
{}
int
ListenSocketInet::accept()
{
int sfd = ListenSocket::accept();
if (sfd == -1)
return -1;
int i = 1;
int ret = ::setsockopt(sfd, IPPROTO_TCP, TCP_NODELAY, &i, sizeof(i));
warn_if(ret < 0, "ListenSocket(accept): setsockopt() TCP_NODELAY failed!");
return sfd;
}
// Create a socket and configure it for listening
bool
ListenSocketInet::listen(int port)
{
panic_if(listening, "Socket already listening!");
// only create socket if not already created by a previous call
if (fd == -1) {
fd = socketCloexec(PF_INET, SOCK_STREAM, 0);
panic_if(fd < 0, "Can't create socket:%s !", strerror(errno));
}
int i = 1;
int ret = ::setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &i, sizeof(i));
panic_if(ret < 0,
"ListenSocket(listen): setsockopt() SO_REUSEADDR failed!");
struct sockaddr_in sockaddr;
sockaddr.sin_family = PF_INET;
sockaddr.sin_addr.s_addr =
htobe<in_addr_t>(bindToLoopback ? INADDR_LOOPBACK : INADDR_ANY);
sockaddr.sin_port = htons(port);
// finally clear sin_zero
std::memset(&sockaddr.sin_zero, 0, sizeof(sockaddr.sin_zero));
ret = ::bind(fd, (struct sockaddr *)&sockaddr, sizeof (sockaddr));
if (ret != 0) {
panic_if(ret == -1 && errno != EADDRINUSE,
"ListenSocket(listen): bind() failed!");
return false;
}
if (::listen(fd, 1) == -1) {
panic_if(errno != EADDRINUSE,
"ListenSocket(listen): listen() failed!");
// User may decide to retry with a different port later; however, the
// socket is already bound to a port and the next bind will surely
// fail. We'll close the socket and reset fd to -1 so our user can
// retry with a cleaner state.
close(fd);
fd = -1;
return false;
}
setListening();
return true;
}
void
ListenSocketInet::listen()
{
while (!listen(_port)) {
_port++;
fatal_if(_port > 65536, "%s: cannot find an available port.", name());
}
ccprintf(std::cerr, "%s: Listening for connections on %s\n",
name(), *this);
}
void
ListenSocketInet::output(std::ostream &os) const
{
os << "port " << _port;
}
ListenSocketConfig
listenSocketInetConfig(int port)
{
return ListenSocketConfig([port](const std::string &name) {
return std::make_unique<ListenSocketInet>(name, port);
});
}
void
ListenSocketUnix::checkPathLength(const std::string &original, size_t max_len)
{
fatal_if(original.size() > max_len,
"Length of socket path '%s' is %d, greater than max %d.",
original, original.size(), max_len);
}
void
ListenSocketUnix::listen()
{
panic_if(listening, "%s: Socket already listening!", name());
// only create socket if not already created by previous call
if (fd == -1) {
fd = socketCloexec(PF_UNIX, SOCK_STREAM, 0);
panic_if(fd < 0, "%s: Can't create unix socket:%s !",
name(), strerror(errno));
}
sockaddr_un serv_addr;
std::memset(&serv_addr, 0, sizeof(serv_addr));
size_t addr_size = prepSockaddrUn(serv_addr);
fatal_if(bind(fd, (struct sockaddr *)&(serv_addr), addr_size) != 0,
"%s: Cannot bind unix socket %s: %s", name(), *this,
strerror(errno));
fatal_if(::listen(fd, 1) == -1, "%s: Failed to listen on %s: %s\n",
name(), *this, strerror(errno));
ccprintf(std::cerr, "%s: Listening for connections on %s\n",
name(), *this);
setListening();
}
ListenSocketUnixFile::ListenSocketUnixFile(const std::string &_name,
const std::string &_dir, const std::string &_fname) :
ListenSocketUnix(_name), dir(_dir), fname(_fname)
{
checkPathLength(fname, sizeof(sockaddr_un::sun_path) - 1);
}
ListenSocketUnixFile::~ListenSocketUnixFile()
{
if (fd != -1) {
close(fd);
fd = -1;
unlink();
}
}
bool
ListenSocketUnixFile::unlink() const
{
auto path = resolvedDir + "/" + fname;
return ::unlink(path.c_str()) == 0;
}
size_t
ListenSocketUnixFile::prepSockaddrUn(sockaddr_un &addr) const
{
addr.sun_family = AF_UNIX;
std::memcpy(addr.sun_path, fname.c_str(), fname.size());
return sizeof(addr.sun_path);
}
void
ListenSocketUnixFile::listen()
{
resolvedDir = simout.resolve(dir);
warn_if(unlink(),
"%s: server path %s was occupied and will be replaced. Please "
"make sure there is no other server using the same path.",
name(), resolvedDir + "/" + fname);
// Make sure "dir" exists.
std::error_code ec;
std::filesystem::create_directory(resolvedDir, ec);
fatal_if(ec, "Failed to create directory %s", ec.message());
// Change the working directory to the directory containing the socket so
// that we maximize the limited space in sockaddr_un.sun_path.
auto cwd = std::filesystem::current_path(ec);
panic_if(ec, "Failed to get current working directory %s", ec.message());
std::filesystem::current_path(resolvedDir, ec);
fatal_if(ec, "Failed to change to directory %s: %s",
resolvedDir, ec.message());
ListenSocketUnix::listen();
std::filesystem::current_path(cwd, ec);
panic_if(ec, "Failed to change back working directory %s", ec.message());
}
void
ListenSocketUnixFile::output(std::ostream &os) const
{
os << "socket \"" << dir << "/" << fname << "\"";
}
ListenSocketConfig
listenSocketUnixFileConfig(std::string dir, std::string fname)
{
return ListenSocketConfig([dir, fname](const std::string &name) {
return std::make_unique<ListenSocketUnixFile>(name, dir, fname);
});
}
size_t
ListenSocketUnixAbstract::prepSockaddrUn(sockaddr_un &addr) const
{
addr.sun_family = AF_UNIX;
addr.sun_path[0] = '\0';
std::memcpy(&addr.sun_path[1], path.c_str(), path.size());
return offsetof(sockaddr_un, sun_path) + path.size() + 1;
}
ListenSocketUnixAbstract::ListenSocketUnixAbstract(
const std::string &_name, const std::string &_path) :
ListenSocketUnix(_name), path(_path)
{
checkPathLength(path, sizeof(sockaddr_un::sun_path) - 1);
}
void
ListenSocketUnixAbstract::output(std::ostream &os) const
{
os << "abstract socket \"" << path << "\"";
}
ListenSocketConfig
listenSocketUnixAbstractConfig(std::string path)
{
return ListenSocketConfig([path](const std::string &name) {
return std::make_unique<ListenSocketUnixAbstract>(name, path);
});
}
} // namespace gem5