Annotation of libaitrpc/src/aitrpc.c, revision 1.18
1.1 misho 1: /*************************************************************************
2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
3: * by Michael Pounov <misho@openbsd-bg.org>
4: *
5: * $Author: misho $
1.18 ! misho 6: * $Id: aitrpc.c,v 1.17.2.3 2015/05/18 15:00:54 misho Exp $
1.1 misho 7: *
1.2 misho 8: **************************************************************************
9: The ELWIX and AITNET software is distributed under the following
10: terms:
11:
12: All of the documentation and software included in the ELWIX and AITNET
13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
14:
1.17 misho 15: Copyright 2004 - 2015
1.2 misho 16: by Michael Pounov <misho@elwix.org>. All rights reserved.
17:
18: Redistribution and use in source and binary forms, with or without
19: modification, are permitted provided that the following conditions
20: are met:
21: 1. Redistributions of source code must retain the above copyright
22: notice, this list of conditions and the following disclaimer.
23: 2. Redistributions in binary form must reproduce the above copyright
24: notice, this list of conditions and the following disclaimer in the
25: documentation and/or other materials provided with the distribution.
26: 3. All advertising materials mentioning features or use of this software
27: must display the following acknowledgement:
28: This product includes software developed by Michael Pounov <misho@elwix.org>
29: ELWIX - Embedded LightWeight unIX and its contributors.
30: 4. Neither the name of AITNET nor the names of its contributors
31: may be used to endorse or promote products derived from this software
32: without specific prior written permission.
33:
34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44: SUCH DAMAGE.
45: */
1.1 misho 46: #include "global.h"
47:
48:
49: #pragma GCC visibility push(hidden)
50:
51: int rpc_Errno;
52: char rpc_Error[STRSIZ];
53:
1.7 misho 54: inline int
55: rpc_funcs_cmp(struct tagRPCFunc *a, struct tagRPCFunc *b)
56: {
57: int ret;
58:
59: assert(a && b);
60:
61: ret = AIT_KEY(&a->func_name) - AIT_KEY(&b->func_name);
62:
63: if (ret < 0)
64: return -1;
65: else if (ret > 0)
66: return 1;
67:
68: return ret;
69: }
70:
71: AVL_GENERATE(tagRPCFuncs, tagRPCFunc, func_node, rpc_funcs_cmp);
72:
1.1 misho 73: #pragma GCC visibility pop
74:
75: // rpc_GetErrno() Get error code of last operation
1.10 misho 76: int
1.1 misho 77: rpc_GetErrno()
78: {
79: return rpc_Errno;
80: }
81:
82: // rpc_GetError() Get error text of last operation
1.10 misho 83: const char *
1.1 misho 84: rpc_GetError()
85: {
86: return rpc_Error;
87: }
88:
89: // rpc_SetErr() Set error to variables for internal use!!!
1.10 misho 90: void
1.1 misho 91: rpc_SetErr(int eno, char *estr, ...)
92: {
93: va_list lst;
94:
95: rpc_Errno = eno;
1.8 misho 96: memset(rpc_Error, 0, sizeof rpc_Error);
1.1 misho 97: va_start(lst, estr);
1.8 misho 98: vsnprintf(rpc_Error, sizeof rpc_Error, estr, lst);
1.1 misho 99: va_end(lst);
100: }
101:
102:
1.4 misho 103: /*
1.6 misho 104: * rpc_chkPktSession() - Check RPC session
1.5 misho 105: *
1.4 misho 106: * @p = packet session
107: * @s = active session
1.6 misho 108: * return: -1, 1, 2, 3 are errors or 0 ok
1.4 misho 109: */
1.10 misho 110: int
1.4 misho 111: rpc_chkPktSession(rpc_sess_t *p, rpc_sess_t *s)
112: {
113: if (!p || !s)
114: return -1;
115:
116: if (p->sess_version != s->sess_version)
117: return 1;
1.9 misho 118: if (p->sess_instance != s->sess_instance)
1.4 misho 119: return 2;
120:
121: return 0;
122: }
123:
124: /*
1.6 misho 125: * rpc_addPktSession() - Prepare session into network format
1.5 misho 126: *
1.4 misho 127: * @p = packet session
1.6 misho 128: * @s = host session
1.4 misho 129: * return: -1 error or 0 ok
130: */
1.10 misho 131: int
1.4 misho 132: rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
133: {
134: if (!p || !s)
135: return -1;
136:
137: p->sess_version = s->sess_version;
1.9 misho 138: p->sess_instance = s->sess_instance;
1.4 misho 139:
140: return 0;
141: }
1.11 misho 142:
143: /*
144: * rpc_Read() - RPC read operation
145: *
146: * @sock = socket
147: * @type = type of socket
148: * @flags = receive flags
149: * @sa = check client address, if you use udp protocol
1.18 ! misho 150: * @pkt = RPC packet
1.14 misho 151: * return: -1 error, 0 EOF or or >0 readed bytes into buffer
1.11 misho 152: */
153: ssize_t
1.18 ! misho 154: rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt)
1.11 misho 155: {
156: struct pollfd pfd;
157: sockaddr_t sa2;
158: socklen_t salen;
1.18 ! misho 159: int ret = 0, len, hlen, cx = 0;
1.16 misho 160: ait_val_t v = AIT_VAL_INIT;
161: struct ether_header *eh;
162: struct bpf_hdr *h;
163: ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }};
1.18 ! misho 164: u_char *buf = AIT_GET_BUF(pkt);
! 165: size_t blen = AIT_LEN(pkt);
! 166: struct tagRPCCall *rpc = (struct tagRPCCall *) buf;
1.16 misho 167:
168: if (type == SOCK_BPF && sa) {
169: AIT_SET_BUF(&v, NULL, blen);
170: h = (struct bpf_hdr*) AIT_GET_BUF(&v);
171: }
1.11 misho 172:
173: pfd.fd = sock;
174: pfd.events = POLLIN | POLLPRI;
175: memset(buf, 0, blen);
176: memset(&sa2, 0, sizeof sa2);
177: salen = sa2.ss.ss_len = sizeof(sockaddr_t);
178:
1.13 misho 179: for (len = blen; len > 0; len -= ret, buf += ret) {
180: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
181: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
182: if (ret)
1.11 misho 183: LOGERR;
1.13 misho 184: else
185: rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond");
1.16 misho 186: if (type == SOCK_BPF)
187: AIT_FREE_VAL(&v);
1.13 misho 188: return -1;
189: }
190: if (type == SOCK_STREAM)
191: ret = recv(sock, buf, len, flags);
1.17 misho 192: else if (type == SOCK_EXT)
193: ret = read(sock, buf, len);
1.16 misho 194: else if (type == SOCK_BPF && sa) {
195: ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
196: if (ret > 0) {
197: ret -= h->bh_hdrlen;
198: if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen ||
199: ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) {
200: if (cx < 3) {
201: cx++;
202: ret ^= ret;
203: continue; /* wait for known address */
204: } else {
205: AIT_FREE_VAL(&v);
206: return -1;
207: }
208: }
209: ret = h->bh_caplen;
210: eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen);
211: ret -= ETHER_HDR_LEN;
212: if (eh->ether_type != ntohs(RPC_DEFPORT)) {
213: if (cx < 3) {
214: cx++;
215: ret ^= ret;
216: continue; /* wait for known address */
217: } else {
218: AIT_FREE_VAL(&v);
219: return -1;
220: }
221: }
1.18 ! misho 222:
1.16 misho 223: if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) ||
224: !memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) {
225: if (cx < 3) {
226: cx++;
227: ret ^= ret;
228: continue; /* wait for known address */
229: } else {
230: AIT_FREE_VAL(&v);
231: return -1;
232: }
233: }
234: memcpy(buf, (u_char*) (eh + 1), MIN(ret, len));
235: AIT_FREE_VAL(&v);
236: return ret;
237: }
238: } else {
1.13 misho 239: ret = recvfrom(sock, buf, len, flags, &sa2.sa, &salen);
240: if (ret > -1 && sa && e_addrcmp(sa, &sa2, 42)) {
1.18 ! misho 241: if (cx < 3) {
! 242: cx++;
! 243: ret ^= ret;
! 244: continue; /* wait for known address */
! 245: } else
! 246: return -1;
1.11 misho 247: }
248: }
1.18 ! misho 249: if (ret < 0) {
1.13 misho 250: LOGERR;
1.16 misho 251: if (type == SOCK_BPF)
252: AIT_FREE_VAL(&v);
1.13 misho 253: return -1;
254: }
1.16 misho 255: if (!ret) { /* EOF */
256: if (type == SOCK_BPF)
257: AIT_FREE_VAL(&v);
1.14 misho 258: return 0;
1.16 misho 259: }
1.18 ! misho 260:
! 261: /* check RPC packet header */
! 262: if ((u_char*) rpc == buf) {
! 263: if (type == SOCK_RAW) {
! 264: hlen = sa->sa.sa_family == AF_INET ? sizeof(struct ip) : sizeof(struct ip6_hdr);
! 265: ret -= hlen;
! 266: if (ret > 0)
! 267: memmove(buf, buf + hlen, blen - hlen);
! 268: }
! 269:
! 270: /* 1st read for RPC header */
! 271: if (ret < sizeof(struct tagRPCCall)) {
! 272: rpc_SetErr(ERPCMISMATCH, "Short RPC packet %d bytes", ret);
! 273: if (type == SOCK_BPF)
! 274: AIT_FREE_VAL(&v);
! 275: return -1;
! 276: }
! 277: /* check for loop request */
! 278: if (!(rpc->call_io & RPC_ACK)) {
! 279: ret ^= ret;
! 280: continue;
! 281: }
! 282: /* calc estimated length */
! 283: blen = len = ntohl(rpc->call_len);
! 284: if (blen > AIT_LEN(pkt)) {
! 285: AIT_RE_BUF(pkt, blen);
! 286: buf = AIT_GET_BUF(pkt);
! 287: rpc = (struct tagRPCCall*) buf;
! 288: }
! 289: }
1.11 misho 290: }
1.13 misho 291: ret = blen - len;
1.11 misho 292:
1.16 misho 293: if (type == SOCK_BPF)
294: AIT_FREE_VAL(&v);
1.11 misho 295: return ret;
296: }
297:
298: /*
299: * rpc_Write() - RPC write operation
300: *
301: * @sock = socket
302: * @type = type of socket
303: * @flags = send flags
304: * @sa = send to client address, if you use udp protocol
1.18 ! misho 305: * @pkt = RPC packet
1.11 misho 306: * @blen = buffer length
1.14 misho 307: * return: -1 error, 0 EOF or >0 written bytes into buffer
1.11 misho 308: */
309: ssize_t
310: rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa,
1.18 ! misho 311: ait_val_t * __restrict pkt, size_t blen)
1.11 misho 312: {
313: struct pollfd pfd;
314: int ret = 0, len = 0;
1.16 misho 315: ait_val_t v = AIT_VAL_INIT;
316: struct ether_header *eh;
1.18 ! misho 317: u_char *buf = AIT_GET_BUF(pkt);
1.16 misho 318:
319: if (type == SOCK_BPF && sa) {
320: AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header));
321: eh = (struct ether_header*) AIT_GET_BUF(&v);
322: memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN);
323: eh->ether_type = htons(RPC_DEFPORT);
324: memcpy(eh + 1, buf, blen);
325: blen += sizeof(struct ether_header);
326: }
1.11 misho 327:
328: pfd.fd = sock;
329: pfd.events = POLLOUT;
1.13 misho 330: for (len = blen; len > 0; len -= ret, buf += ret) {
331: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
332: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
1.14 misho 333: #if 0
1.13 misho 334: if (!ret)
335: continue;
1.14 misho 336: #endif
1.13 misho 337: if (ret > 0)
338: rpc_SetErr(EPIPE, "Disconnected RPC session\n");
339: else
1.11 misho 340: LOGERR;
1.16 misho 341: if (type == SOCK_BPF)
342: AIT_FREE_VAL(&v);
1.13 misho 343: return -1;
344: }
345: if (type == SOCK_STREAM)
346: ret = send(sock, buf, len, flags);
1.17 misho 347: else if (type == SOCK_EXT)
348: ret = write(sock, buf, len);
1.16 misho 349: else if (type == SOCK_BPF && sa) {
350: ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
351: } else if (sa)
1.13 misho 352: ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len);
353: else {
354: rpc_SetErr(EINVAL, "Invalid argument(s)!");
1.16 misho 355: if (type == SOCK_BPF)
356: AIT_FREE_VAL(&v);
1.13 misho 357: return -1;
358: }
1.18 ! misho 359: if (ret < 0) {
1.13 misho 360: LOGERR;
1.16 misho 361: if (type == SOCK_BPF)
362: AIT_FREE_VAL(&v);
1.13 misho 363: return -1;
1.11 misho 364: }
1.16 misho 365: if (!ret) { /* EOF */
366: if (type == SOCK_BPF)
367: AIT_FREE_VAL(&v);
1.14 misho 368: return 0;
1.16 misho 369: }
1.11 misho 370: }
1.13 misho 371: ret = blen - len;
372: if (ret != blen) {
1.11 misho 373: rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, "
1.16 misho 374: "really sended %d bytes", blen, ret);
375: if (type == SOCK_BPF)
376: AIT_FREE_VAL(&v);
1.11 misho 377: return -1;
378: }
379:
1.16 misho 380: if (type == SOCK_BPF)
381: AIT_FREE_VAL(&v);
1.11 misho 382: return ret;
383: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>