--- libaitrpc/src/aitrpc.c 2015/01/15 01:42:37 1.16 +++ libaitrpc/src/aitrpc.c 2016/08/08 13:21:13 1.21 @@ -3,7 +3,7 @@ * by Michael Pounov * * $Author: misho $ -* $Id: aitrpc.c,v 1.16 2015/01/15 01:42:37 misho Exp $ +* $Id: aitrpc.c,v 1.21 2016/08/08 13:21:13 misho Exp $ * ************************************************************************** The ELWIX and AITNET software is distributed under the following @@ -12,7 +12,7 @@ terms: All of the documentation and software included in the ELWIX and AITNET Releases is copyrighted by ELWIX - Sofia/Bulgaria -Copyright 2004 - 2014 +Copyright 2004 - 2016 by Michael Pounov . All rights reserved. Redistribution and use in source and binary forms, with or without @@ -51,25 +51,6 @@ SUCH DAMAGE. int rpc_Errno; char rpc_Error[STRSIZ]; -inline int -rpc_funcs_cmp(struct tagRPCFunc *a, struct tagRPCFunc *b) -{ - int ret; - - assert(a && b); - - ret = AIT_KEY(&a->func_name) - AIT_KEY(&b->func_name); - - if (ret < 0) - return -1; - else if (ret > 0) - return 1; - - return ret; -} - -AVL_GENERATE(tagRPCFuncs, tagRPCFunc, func_node, rpc_funcs_cmp); - #pragma GCC visibility pop // rpc_GetErrno() Get error code of last operation @@ -147,119 +128,161 @@ rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s) * @type = type of socket * @flags = receive flags * @sa = check client address, if you use udp protocol - * @buf = buffer - * @blen = buffer length + * @pkt = RPC packet * return: -1 error, 0 EOF or or >0 readed bytes into buffer */ ssize_t -rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, - u_char * __restrict buf, size_t blen) +rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt) { struct pollfd pfd; sockaddr_t sa2; socklen_t salen; - int ret = 0, len, cx = 0; - ait_val_t v = AIT_VAL_INIT; + int ret = 0, hlen, cx = 0; + ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }}; + u_char *buf = AIT_GET_BUF(pkt); + size_t blen = AIT_LEN(pkt); + struct tagRPCCall *rpc = (struct tagRPCCall *) buf; +#ifndef __linux__ struct ether_header *eh; struct bpf_hdr *h; - ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }}; + ait_val_t v = AIT_VAL_INIT; +#endif - if (type == SOCK_BPF && sa) { - AIT_SET_BUF(&v, NULL, blen); - h = (struct bpf_hdr*) AIT_GET_BUF(&v); - } - +try2read: pfd.fd = sock; pfd.events = POLLIN | POLLPRI; memset(buf, 0, blen); memset(&sa2, 0, sizeof sa2); - salen = sa2.ss.ss_len = sizeof(sockaddr_t); + salen = E_SOCKADDR_MAX; +#ifndef __linux__ + sa2.ss.ss_len = salen; +#endif + if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || + pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { + if (ret) + LOGERR; + else + rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond"); + return -1; + } - for (len = blen; len > 0; len -= ret, buf += ret) { - if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || - pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { - if (ret) - LOGERR; - else - rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond"); - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); - return -1; - } - if (type == SOCK_STREAM) - ret = recv(sock, buf, len, flags); - else if (type == SOCK_BPF && sa) { + switch (type) { + case SOCK_STREAM: + ret = recv(sock, buf, blen, flags); + break; + case SOCK_EXT: + ret = read(sock, buf, blen); + break; +#ifndef __linux__ + case SOCK_BPF: + if (!sa) { + rpc_SetErr(EINVAL, "Invalid argument(s)!"); + return -1; + } + + AIT_SET_BUF(&v, NULL, blen); + h = (struct bpf_hdr*) AIT_GET_BUF(&v); + ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v)); if (ret > 0) { ret -= h->bh_hdrlen; if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen || ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) { + AIT_FREE_VAL(&v); if (cx < 3) { cx++; ret ^= ret; - continue; /* wait for known address */ - } else { - AIT_FREE_VAL(&v); + goto try2read; /* wait for known address */ + } else return -1; - } } ret = h->bh_caplen; eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen); ret -= ETHER_HDR_LEN; if (eh->ether_type != ntohs(RPC_DEFPORT)) { + AIT_FREE_VAL(&v); if (cx < 3) { cx++; ret ^= ret; - continue; /* wait for known address */ - } else { - AIT_FREE_VAL(&v); + goto try2read; /* wait for known address */ + } else return -1; - } } -#if 0 - else - e_getlinkbymac((const ether_addr_t*) eh->ether_shost, &sa2); - if (sa && e_addrcmp(sa, &sa2, 0)) { -#else + if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) || !memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) { -#endif + AIT_FREE_VAL(&v); if (cx < 3) { cx++; ret ^= ret; - continue; /* wait for known address */ - } else { - AIT_FREE_VAL(&v); + goto try2read; /* wait for known address */ + } else return -1; - } } - memcpy(buf, (u_char*) (eh + 1), MIN(ret, len)); + memcpy(buf, (u_char*) (eh + 1), MIN(ret, blen)); AIT_FREE_VAL(&v); - return ret; } - } else { - ret = recvfrom(sock, buf, len, flags, &sa2.sa, &salen); - if (ret > -1 && sa && e_addrcmp(sa, &sa2, 42)) { - ret ^= ret; - continue; /* wait for known address */ + break; +#endif + case SOCK_RAW: + case SOCK_DGRAM: + if (!sa) { + rpc_SetErr(EINVAL, "Invalid argument(s)!"); + return -1; } - } - if (ret == -1) { - LOGERR; - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); + + ret = recvfrom(sock, buf, blen, flags, &sa2.sa, &salen); + if (ret > -1 && e_addrcmp(sa, &sa2, 42)) { + if (cx < 3) { + cx++; + ret ^= ret; + goto try2read; /* wait for known address */ + } else + return -1; + } + break; + default: + rpc_SetErr(EINVAL, "Invalid argument(s)!"); return -1; + } + if (ret < 0) { + LOGERR; + return -1; + } + if (!ret) /* EOF */ + return 0; + + /* check RPC packet header */ + if (type == SOCK_RAW) { +#ifdef IPV6_REMOVE_HEADER + hlen = sa->sa.sa_family == AF_INET ? + sizeof(struct ip) : sizeof(struct ip6_hdr); +#else + hlen = sa->sa.sa_family == AF_INET ? + sizeof(struct ip) : 0; +#endif + ret -= hlen; + if (ret > 0) + memmove(buf, buf + hlen, blen - hlen); + } + + /* 1st read for RPC header */ + if (ret < sizeof(struct tagRPCCall) || ret < ntohl(rpc->call_len)) { + rpc_SetErr(ERPCMISMATCH, "Short RPC packet %d bytes", ret); + return -1; + } + /* check for loop request */ + if (!(rpc->call_io & RPC_ACK)) { + if (cx < 3) { + cx++; + ret ^= ret; + goto try2read; /* wait for known address */ + } else { + rpc_SetErr(ERPCMISMATCH, "Loop in RPC communication"); + return -1; } - if (!ret) { /* EOF */ - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); - return 0; - } } - ret = blen - len; - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); return ret; } @@ -270,79 +293,97 @@ rpc_Read(int sock, int type, int flags, sockaddr_t * _ * @type = type of socket * @flags = send flags * @sa = send to client address, if you use udp protocol - * @buf = buffer + * @pkt = RPC packet * @blen = buffer length * return: -1 error, 0 EOF or >0 written bytes into buffer */ ssize_t rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa, - u_char * __restrict buf, size_t blen) + ait_val_t * __restrict pkt, size_t blen) { struct pollfd pfd; - int ret = 0, len = 0; + int ret = 0; + u_char *buf = AIT_GET_BUF(pkt); +#ifndef __linux__ ait_val_t v = AIT_VAL_INIT; struct ether_header *eh; +#endif - if (type == SOCK_BPF && sa) { - AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header)); - eh = (struct ether_header*) AIT_GET_BUF(&v); - memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN); - eh->ether_type = htons(RPC_DEFPORT); - memcpy(eh + 1, buf, blen); - blen += sizeof(struct ether_header); - } pfd.fd = sock; pfd.events = POLLOUT; - for (len = blen; len > 0; len -= ret, buf += ret) { - if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || - pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { -#if 0 - if (!ret) - continue; -#endif - if (ret > 0) - rpc_SetErr(EPIPE, "Disconnected RPC session\n"); - else - LOGERR; - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); - return -1; - } - if (type == SOCK_STREAM) - ret = send(sock, buf, len, flags); - else if (type == SOCK_BPF && sa) { + if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 || + pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) { + if (ret > 0) + rpc_SetErr(EPIPE, "Disconnected RPC session\n"); + else + LOGERR; + return -1; + } + + switch (type) { + case SOCK_STREAM: + ret = send(sock, buf, blen, flags); + break; + case SOCK_EXT: + ret = write(sock, buf, blen); + break; +#ifndef __linux__ + case SOCK_BPF: + if (!sa) { + rpc_SetErr(EINVAL, "Invalid argument(s)!"); + return -1; + } + + AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header)); + eh = (struct ether_header*) AIT_GET_BUF(&v); + memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN); + eh->ether_type = htons(RPC_DEFPORT); + memcpy(eh + 1, buf, blen); + blen += sizeof(struct ether_header); + ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v)); - } else if (sa) - ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len); - else { + + AIT_FREE_VAL(&v); + break; +#endif + case SOCK_RAW: + case SOCK_DGRAM: + if (!sa) { + rpc_SetErr(EINVAL, "Invalid argument(s)!"); + return -1; + } + + ret = sendto(sock, buf, blen, flags, &sa->sa, e_addrlen(sa)); + break; + default: rpc_SetErr(EINVAL, "Invalid argument(s)!"); - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); return -1; - } - if (ret == -1) { - LOGERR; - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); - return -1; - } - if (!ret) { /* EOF */ - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); - return 0; - } } - ret = blen - len; + if (ret < 0) { + LOGERR; + return -1; + } + if (!ret) /* EOF */ + return 0; + if (ret != blen) { rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, " "really sended %d bytes", blen, ret); - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); return -1; } - if (type == SOCK_BPF) - AIT_FREE_VAL(&v); return ret; +} + +/* + * rpc_pktFreeSpace() - Get free space for payload into RPC packet + * + * @c = RPC client + * return: remains free bytes from packet + */ +size_t +rpc_pktFreeSpace(rpc_cli_t * __restrict c) +{ + return (sizeof(struct tagRPCCall) + ait_resideVars(RPC_RETVARS(c))); }