1: /*************************************************************************
2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
3: * by Michael Pounov <misho@openbsd-bg.org>
4: *
5: * $Author: misho $
6: * $Id: aitrpc.c,v 1.17.2.2 2015/05/18 14:50:12 misho Exp $
7: *
8: **************************************************************************
9: The ELWIX and AITNET software is distributed under the following
10: terms:
11:
12: All of the documentation and software included in the ELWIX and AITNET
13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
14:
15: Copyright 2004 - 2015
16: by Michael Pounov <misho@elwix.org>. All rights reserved.
17:
18: Redistribution and use in source and binary forms, with or without
19: modification, are permitted provided that the following conditions
20: are met:
21: 1. Redistributions of source code must retain the above copyright
22: notice, this list of conditions and the following disclaimer.
23: 2. Redistributions in binary form must reproduce the above copyright
24: notice, this list of conditions and the following disclaimer in the
25: documentation and/or other materials provided with the distribution.
26: 3. All advertising materials mentioning features or use of this software
27: must display the following acknowledgement:
28: This product includes software developed by Michael Pounov <misho@elwix.org>
29: ELWIX - Embedded LightWeight unIX and its contributors.
30: 4. Neither the name of AITNET nor the names of its contributors
31: may be used to endorse or promote products derived from this software
32: without specific prior written permission.
33:
34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44: SUCH DAMAGE.
45: */
46: #include "global.h"
47:
48:
49: #pragma GCC visibility push(hidden)
50:
51: int rpc_Errno;
52: char rpc_Error[STRSIZ];
53:
54: inline int
55: rpc_funcs_cmp(struct tagRPCFunc *a, struct tagRPCFunc *b)
56: {
57: int ret;
58:
59: assert(a && b);
60:
61: ret = AIT_KEY(&a->func_name) - AIT_KEY(&b->func_name);
62:
63: if (ret < 0)
64: return -1;
65: else if (ret > 0)
66: return 1;
67:
68: return ret;
69: }
70:
71: AVL_GENERATE(tagRPCFuncs, tagRPCFunc, func_node, rpc_funcs_cmp);
72:
73: #pragma GCC visibility pop
74:
75: // rpc_GetErrno() Get error code of last operation
76: int
77: rpc_GetErrno()
78: {
79: return rpc_Errno;
80: }
81:
82: // rpc_GetError() Get error text of last operation
83: const char *
84: rpc_GetError()
85: {
86: return rpc_Error;
87: }
88:
89: // rpc_SetErr() Set error to variables for internal use!!!
90: void
91: rpc_SetErr(int eno, char *estr, ...)
92: {
93: va_list lst;
94:
95: rpc_Errno = eno;
96: memset(rpc_Error, 0, sizeof rpc_Error);
97: va_start(lst, estr);
98: vsnprintf(rpc_Error, sizeof rpc_Error, estr, lst);
99: va_end(lst);
100: }
101:
102:
103: /*
104: * rpc_chkPktSession() - Check RPC session
105: *
106: * @p = packet session
107: * @s = active session
108: * return: -1, 1, 2, 3 are errors or 0 ok
109: */
110: int
111: rpc_chkPktSession(rpc_sess_t *p, rpc_sess_t *s)
112: {
113: if (!p || !s)
114: return -1;
115:
116: if (p->sess_version != s->sess_version)
117: return 1;
118: if (p->sess_instance != s->sess_instance)
119: return 2;
120:
121: return 0;
122: }
123:
124: /*
125: * rpc_addPktSession() - Prepare session into network format
126: *
127: * @p = packet session
128: * @s = host session
129: * return: -1 error or 0 ok
130: */
131: int
132: rpc_addPktSession(rpc_sess_t *p, rpc_sess_t *s)
133: {
134: if (!p || !s)
135: return -1;
136:
137: p->sess_version = s->sess_version;
138: p->sess_instance = s->sess_instance;
139:
140: return 0;
141: }
142:
143: /*
144: * rpc_Read() - RPC read operation
145: *
146: * @sock = socket
147: * @type = type of socket
148: * @flags = receive flags
149: * @sa = check client address, if you use udp protocol
150: * @pkt = RPC packet
151: * return: -1 error, 0 EOF or or >0 readed bytes into buffer
152: */
153: ssize_t
154: rpc_Read(int sock, int type, int flags, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt)
155: {
156: struct pollfd pfd;
157: sockaddr_t sa2;
158: socklen_t salen;
159: int ret = 0, len, hlen, cx = 0;
160: ait_val_t v = AIT_VAL_INIT;
161: struct ether_header *eh;
162: struct bpf_hdr *h;
163: ether_addr_t bcst = {{ [0 ... sizeof bcst - 1] = 0xff }};
164: u_char *buf = AIT_GET_BUF(pkt);
165: size_t blen = AIT_LEN(pkt);
166: struct tagRPCCall *rpc = (struct tagRPCCall *) buf;
167:
168: if (type == SOCK_BPF && sa) {
169: AIT_SET_BUF(&v, NULL, blen);
170: h = (struct bpf_hdr*) AIT_GET_BUF(&v);
171: }
172:
173: pfd.fd = sock;
174: pfd.events = POLLIN | POLLPRI;
175: memset(buf, 0, blen);
176: memset(&sa2, 0, sizeof sa2);
177: salen = sa2.ss.ss_len = sizeof(sockaddr_t);
178:
179: for (len = blen; len > 0; len -= ret, buf += ret) {
180: printf("%s_0. buf=%p len=%d\n", __func__, buf, len);
181: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
182: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
183: if (ret)
184: LOGERR;
185: else
186: rpc_SetErr(ETIMEDOUT, "Timeout reached! Server not respond");
187: if (type == SOCK_BPF)
188: AIT_FREE_VAL(&v);
189: return -1;
190: }
191: if (type == SOCK_STREAM)
192: ret = recv(sock, buf, len, flags);
193: else if (type == SOCK_EXT)
194: ret = read(sock, buf, len);
195: else if (type == SOCK_BPF && sa) {
196: ret = read(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
197: if (ret > 0) {
198: ret -= h->bh_hdrlen;
199: if (ret < h->bh_caplen || h->bh_caplen != h->bh_datalen ||
200: ret < ETHER_HDR_LEN + sizeof(struct tagRPCCall)) {
201: if (cx < 3) {
202: cx++;
203: ret ^= ret;
204: continue; /* wait for known address */
205: } else {
206: AIT_FREE_VAL(&v);
207: return -1;
208: }
209: }
210: ret = h->bh_caplen;
211: eh = (struct ether_header*) (AIT_GET_BUF(&v) + h->bh_hdrlen);
212: ret -= ETHER_HDR_LEN;
213: if (eh->ether_type != ntohs(RPC_DEFPORT)) {
214: if (cx < 3) {
215: cx++;
216: ret ^= ret;
217: continue; /* wait for known address */
218: } else {
219: AIT_FREE_VAL(&v);
220: return -1;
221: }
222: }
223:
224: if (!memcmp(bcst.octet, eh->ether_dhost, sizeof bcst) ||
225: !memcmp(bcst.octet, eh->ether_shost, sizeof bcst)) {
226: if (cx < 3) {
227: cx++;
228: ret ^= ret;
229: continue; /* wait for known address */
230: } else {
231: AIT_FREE_VAL(&v);
232: return -1;
233: }
234: }
235: memcpy(buf, (u_char*) (eh + 1), MIN(ret, len));
236: AIT_FREE_VAL(&v);
237: return ret;
238: }
239: } else {
240: ret = recvfrom(sock, buf, len, flags, &sa2.sa, &salen);
241: if (ret > -1 && sa && e_addrcmp(sa, &sa2, 42)) {
242: if (cx < 3) {
243: cx++;
244: ret ^= ret;
245: continue; /* wait for known address */
246: } else
247: return -1;
248: }
249: }
250: if (ret < 0) {
251: LOGERR;
252: if (type == SOCK_BPF)
253: AIT_FREE_VAL(&v);
254: return -1;
255: }
256: if (!ret) { /* EOF */
257: if (type == SOCK_BPF)
258: AIT_FREE_VAL(&v);
259: return 0;
260: }
261:
262: /* check RPC packet header */
263: if ((u_char*) rpc == buf) {
264: if (type == SOCK_RAW) {
265: printf("raw: ret=%d\n", ret);
266: hlen = sa->sa.sa_family == AF_INET ? sizeof(struct ip) : sizeof(struct ip6_hdr);
267: ret -= hlen;
268: printf("raw-cx: ret=%d\n", ret);
269: if (ret > 0)
270: memmove(buf, buf + hlen, blen - hlen);
271: printf("%s ret=%d call_io=0x%x call_len=%d call_seq=%u\n", __func__, ret, rpc->call_io, ntohl(rpc->call_len), ntohl(rpc->call_seq));
272: fflush(stdout);
273: }
274:
275: /* 1st read for RPC header */
276: if (ret < sizeof(struct tagRPCCall)) {
277: rpc_SetErr(ERPCMISMATCH, "Short RPC packet %d bytes", ret);
278: if (type == SOCK_BPF)
279: AIT_FREE_VAL(&v);
280: return -1;
281: }
282: /* check for loop request */
283: if (!(rpc->call_io & RPC_ACK)) {
284: ret ^= ret;
285: continue;
286: }
287: /* calc estimated length */
288: blen = len = ntohl(rpc->call_len);
289: printf("blen=%d len=%d ret=%d\n", blen, len, ret);
290: if (blen > AIT_LEN(pkt)) {
291: AIT_RE_BUF(pkt, blen);
292: buf = AIT_GET_BUF(pkt);
293: rpc = (struct tagRPCCall*) buf;
294: }
295: }
296: }
297: ret = blen - len;
298:
299: if (type == SOCK_BPF)
300: AIT_FREE_VAL(&v);
301: printf("exit from %s with ret=%d\n", __func__, ret);
302: return ret;
303: }
304:
305: /*
306: * rpc_Write() - RPC write operation
307: *
308: * @sock = socket
309: * @type = type of socket
310: * @flags = send flags
311: * @sa = send to client address, if you use udp protocol
312: * @pkt = RPC packet
313: * @blen = buffer length
314: * return: -1 error, 0 EOF or >0 written bytes into buffer
315: */
316: ssize_t
317: rpc_Write(int sock, int type, int flags, sockaddr_t * __restrict sa,
318: ait_val_t * __restrict pkt, size_t blen)
319: {
320: struct pollfd pfd;
321: int ret = 0, len = 0;
322: ait_val_t v = AIT_VAL_INIT;
323: struct ether_header *eh;
324: u_char *buf = AIT_GET_BUF(pkt);
325:
326: if (type == SOCK_BPF && sa) {
327: AIT_SET_BUF(&v, NULL, blen + sizeof(struct ether_header));
328: eh = (struct ether_header*) AIT_GET_BUF(&v);
329: memcpy(eh->ether_dhost, LLADDR(&sa->sdl), ETHER_ADDR_LEN);
330: eh->ether_type = htons(RPC_DEFPORT);
331: memcpy(eh + 1, buf, blen);
332: blen += sizeof(struct ether_header);
333: }
334:
335: pfd.fd = sock;
336: pfd.events = POLLOUT;
337: for (len = blen; len > 0; len -= ret, buf += ret) {
338: if ((ret = poll(&pfd, 1, DEF_RPC_TIMEOUT * 1000)) < 1 ||
339: pfd.revents & (POLLERR | POLLHUP | POLLNVAL)) {
340: #if 0
341: if (!ret)
342: continue;
343: #endif
344: if (ret > 0)
345: rpc_SetErr(EPIPE, "Disconnected RPC session\n");
346: else
347: LOGERR;
348: if (type == SOCK_BPF)
349: AIT_FREE_VAL(&v);
350: return -1;
351: }
352: if (type == SOCK_STREAM)
353: ret = send(sock, buf, len, flags);
354: else if (type == SOCK_EXT)
355: ret = write(sock, buf, len);
356: else if (type == SOCK_BPF && sa) {
357: ret = write(sock, AIT_GET_BUF(&v), AIT_LEN(&v));
358: } else if (sa)
359: ret = sendto(sock, buf, len, flags, &sa->sa, sa->sa.sa_len);
360: else {
361: rpc_SetErr(EINVAL, "Invalid argument(s)!");
362: if (type == SOCK_BPF)
363: AIT_FREE_VAL(&v);
364: return -1;
365: }
366: if (ret < 0) {
367: LOGERR;
368: if (type == SOCK_BPF)
369: AIT_FREE_VAL(&v);
370: return -1;
371: }
372: if (!ret) { /* EOF */
373: if (type == SOCK_BPF)
374: AIT_FREE_VAL(&v);
375: return 0;
376: }
377: }
378: ret = blen - len;
379: if (ret != blen) {
380: rpc_SetErr(EPROCUNAVAIL, "RPC request, should be send %d bytes, "
381: "really sended %d bytes", blen, ret);
382: if (type == SOCK_BPF)
383: AIT_FREE_VAL(&v);
384: return -1;
385: }
386:
387: if (type == SOCK_BPF)
388: AIT_FREE_VAL(&v);
389: return ret;
390: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>