1: /*************************************************************************
2: * (C) 2010 AITNET ltd - Sofia/Bulgaria - <misho@aitbg.com>
3: * by Michael Pounov <misho@openbsd-bg.org>
4: *
5: * $Author: misho $
6: * $Id: cli.c,v 1.24.2.3 2015/05/18 14:50:12 misho Exp $
7: *
8: **************************************************************************
9: The ELWIX and AITNET software is distributed under the following
10: terms:
11:
12: All of the documentation and software included in the ELWIX and AITNET
13: Releases is copyrighted by ELWIX - Sofia/Bulgaria <info@elwix.org>
14:
15: Copyright 2004 - 2015
16: by Michael Pounov <misho@elwix.org>. All rights reserved.
17:
18: Redistribution and use in source and binary forms, with or without
19: modification, are permitted provided that the following conditions
20: are met:
21: 1. Redistributions of source code must retain the above copyright
22: notice, this list of conditions and the following disclaimer.
23: 2. Redistributions in binary form must reproduce the above copyright
24: notice, this list of conditions and the following disclaimer in the
25: documentation and/or other materials provided with the distribution.
26: 3. All advertising materials mentioning features or use of this software
27: must display the following acknowledgement:
28: This product includes software developed by Michael Pounov <misho@elwix.org>
29: ELWIX - Embedded LightWeight unIX and its contributors.
30: 4. Neither the name of AITNET nor the names of its contributors
31: may be used to endorse or promote products derived from this software
32: without specific prior written permission.
33:
34: THIS SOFTWARE IS PROVIDED BY AITNET AND CONTRIBUTORS ``AS IS'' AND
35: ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
36: IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
37: ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
38: FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
39: DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
40: OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
41: HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
42: LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
43: OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
44: SUCH DAMAGE.
45: */
46: #include "global.h"
47:
48:
49: /*
50: * rpc_cli_openBLOBClient() - Connect to BLOB Server
51: *
52: * @rpccli = RPC Client session
53: * @Port = Port for bind server, if Port == 0 default port is selected
54: * return: NULL == error or !=NULL connection to BLOB server established
55: */
56: rpc_cli_t *
57: rpc_cli_openBLOBClient(rpc_cli_t * __restrict rpccli, u_short Port)
58: {
59: rpc_cli_t *cli = NULL;
60: int n;
61:
62: if (!rpccli) {
63: rpc_SetErr(EINVAL, "Invalid parameters can`t connect to BLOB server");
64: return NULL;
65: }
66:
67: cli = e_malloc(sizeof(rpc_cli_t));
68: if (!cli) {
69: LOGERR;
70: return NULL;
71: } else
72: memcpy(cli, rpccli, sizeof(rpc_cli_t));
73:
74: memcpy(&cli->cli_sa, &rpccli->cli_sa, sizeof(sockaddr_t));
75: switch (cli->cli_sa.sa.sa_family) {
76: case AF_INET:
77: cli->cli_sa.sin.sin_port =
78: htons(Port ? Port : ntohs(cli->cli_sa.sin.sin_port) + 1);
79: break;
80: case AF_INET6:
81: cli->cli_sa.sin6.sin6_port =
82: htons(Port ? Port : ntohs(cli->cli_sa.sin6.sin6_port) + 1);
83: break;
84: case AF_LOCAL:
85: strlcat(cli->cli_sa.sun.sun_path, ".blob", sizeof cli->cli_sa.sun.sun_path);
86: break;
87: default:
88: rpc_SetErr(EINVAL, "Invalid socket type %d", cli->cli_sa.sa.sa_family);
89: return NULL;
90: }
91:
92: AIT_COPY_VAL(&cli->cli_buf, &rpccli->cli_buf);
93: n = AIT_LEN(&cli->cli_buf);
94:
95: /* connect to BLOB server */
96: cli->cli_sock = socket(cli->cli_sa.sa.sa_family, SOCK_STREAM, 0);
97: if (cli->cli_sock == -1) {
98: LOGERR;
99: e_free(cli);
100: return NULL;
101: }
102: if (setsockopt(cli->cli_sock, SOL_SOCKET, SO_SNDBUF, &n, sizeof n) == -1) {
103: LOGERR;
104: close(cli->cli_sock);
105: e_free(cli);
106: return NULL;
107: }
108: if (setsockopt(cli->cli_sock, SOL_SOCKET, SO_RCVBUF, &n, sizeof n) == -1) {
109: LOGERR;
110: close(cli->cli_sock);
111: e_free(cli);
112: return NULL;
113: }
114: if (connect(cli->cli_sock, &cli->cli_sa.sa, cli->cli_sa.sa.sa_len) == -1) {
115: LOGERR;
116: close(cli->cli_sock);
117: e_free(cli);
118: return NULL;
119: } else
120: fcntl(cli->cli_sock, F_SETFL, fcntl(cli->cli_sock, F_GETFL) | O_NONBLOCK);
121:
122: return cli;
123: }
124:
125: /*
126: * rpc_cli_closeBLOBClient() - Close connection to BLOB server and free resources
127: *
128: * @cli = BLOB Client session
129: * return: none
130: */
131: void
132: rpc_cli_closeBLOBClient(rpc_cli_t ** __restrict cli)
133: {
134: if (!cli || !*cli)
135: return;
136:
137: shutdown((*cli)->cli_sock, SHUT_RDWR);
138: close((*cli)->cli_sock);
139:
140: AIT_FREE_VAL(&(*cli)->cli_buf);
141:
142: e_free(*cli);
143: *cli = NULL;
144: }
145:
146: /* -------------------------------------------------------------- */
147:
148: /*
149: * rpc_cli_openClient() - Connect to RPC Server
150: *
151: * @InstID = InstID for RPC session request
152: * @netBuf = Network buffer length (min:512 bytes), if =0 == BUFSIZ (also meaning max RPC packet)
153: * @csHost = Host name or IP address for bind server
154: * @Port = Port for bind server, if Port == 0 default port is selected
155: * @proto = Protocol, if == 0 choose SOCK_STREAM
156: * return: NULL == error or !=NULL connection to RPC server established
157: */
158: rpc_cli_t *
159: rpc_cli_openClient(u_char InstID, int netBuf, const char *csHost, u_short Port, int proto)
160: {
161: rpc_cli_t *cli = NULL;
162: sockaddr_t sa = E_SOCKADDR_INIT;
163:
164: if (proto < 0 || proto > SOCK_RAW) {
165: rpc_SetErr(EINVAL, "Invalid parameters can`t open RPC client");
166: return NULL;
167: }
168:
169: srandom(time(NULL) ^ getpid());
170:
171: if (!Port && proto < SOCK_RAW)
172: Port = RPC_DEFPORT;
173: if (!e_gethostbyname(csHost, Port, &sa))
174: return NULL;
175: if (!proto)
176: proto = SOCK_STREAM;
177: if (netBuf < RPC_MIN_BUFSIZ)
178: netBuf = BUFSIZ;
179: else
180: netBuf = E_ALIGN(netBuf, 2); /* align netBuf length */
181:
182: cli = e_malloc(sizeof(rpc_cli_t));
183: if (!cli) {
184: LOGERR;
185: return NULL;
186: } else
187: memset(cli, 0, sizeof(rpc_cli_t));
188:
189: /* build session */
190: cli->cli_parent = e_malloc(sizeof(rpc_sess_t));
191: if (!cli->cli_parent) {
192: LOGERR;
193: e_free(cli);
194: return NULL;
195: } else {
196: ((rpc_sess_t*) cli->cli_parent)->sess_version = RPC_VERSION;
197: ((rpc_sess_t*) cli->cli_parent)->sess_instance = InstID;
198: }
199:
200: cli->cli_id = proto;
201: memcpy(&cli->cli_sa, &sa, sizeof cli->cli_sa);
202: AIT_SET_BUFSIZ(&cli->cli_buf, 0, netBuf);
203:
204: /* connect to RPC server */
205: cli->cli_sock = socket(cli->cli_sa.sa.sa_family, cli->cli_id,
206: cli->cli_id == SOCK_RAW ? IPPROTO_ERPC : 0);
207: if (cli->cli_sock == -1) {
208: LOGERR;
209: goto err;
210: }
211: if (setsockopt(cli->cli_sock, SOL_SOCKET, SO_SNDBUF,
212: &netBuf, sizeof netBuf) == -1) {
213: LOGERR;
214: goto err;
215: }
216: if (setsockopt(cli->cli_sock, SOL_SOCKET, SO_RCVBUF,
217: &netBuf, sizeof netBuf) == -1) {
218: LOGERR;
219: goto err;
220: }
221: if (cli->cli_id == SOCK_STREAM)
222: if (connect(cli->cli_sock, &cli->cli_sa.sa, cli->cli_sa.sa.sa_len) == -1) {
223: LOGERR;
224: goto err;
225: }
226:
227: fcntl(cli->cli_sock, F_SETFL, fcntl(cli->cli_sock, F_GETFL) | O_NONBLOCK);
228: return cli;
229: err:
230: AIT_FREE_VAL(&cli->cli_buf);
231: if (cli->cli_sock > 2)
232: close(cli->cli_sock);
233: e_free(cli->cli_parent);
234: e_free(cli);
235: return NULL;
236: }
237:
238: /*
239: * rpc_cli_reconnectClient() - Reconnecting client to RPC server
240: *
241: * @cli = RPC Client session
242: * return: -1 error or 0 ok
243: */
244: int
245: rpc_cli_reconnectClient(rpc_cli_t * __restrict cli)
246: {
247: int netBuf;
248:
249: if (!cli)
250: return -1;
251: else
252: netBuf = AIT_LEN(&cli->cli_buf);
253:
254: close(cli->cli_sock);
255:
256: srandom(time(NULL) ^ getpid());
257:
258: cli->cli_sock = socket(cli->cli_sa.sa.sa_family, cli->cli_id, 0);
259: if (cli->cli_sock == -1) {
260: LOGERR;
261: return -1;
262: }
263: if (setsockopt(cli->cli_sock, SOL_SOCKET, SO_SNDBUF,
264: &netBuf, sizeof netBuf) == -1) {
265: LOGERR;
266: close(cli->cli_sock);
267: return -1;
268: }
269: if (setsockopt(cli->cli_sock, SOL_SOCKET, SO_RCVBUF,
270: &netBuf, sizeof netBuf) == -1) {
271: LOGERR;
272: close(cli->cli_sock);
273: return -1;
274: }
275: if (cli->cli_id == SOCK_STREAM)
276: if (connect(cli->cli_sock, &cli->cli_sa.sa, cli->cli_sa.sa.sa_len) == -1) {
277: LOGERR;
278: close(cli->cli_sock);
279: return -1;
280: }
281:
282: fcntl(cli->cli_sock, F_SETFL, fcntl(cli->cli_sock, F_GETFL) | O_NONBLOCK);
283: return 0;
284: }
285:
286: /*
287: * rpc_cli_closeClient() - Close connection to RPC server and free resources
288: *
289: * @cli = RPC Client session
290: * return: none
291: */
292: void
293: rpc_cli_closeClient(rpc_cli_t ** __restrict cli)
294: {
295: if (!cli || !*cli || (*cli)->cli_id == SOCK_BPF)
296: return;
297:
298: if ((*cli)->cli_id == SOCK_STREAM)
299: shutdown((*cli)->cli_sock, SHUT_RDWR);
300: close((*cli)->cli_sock);
301:
302: AIT_FREE_VAL(&(*cli)->cli_buf);
303:
304: if ((*cli)->cli_parent)
305: e_free((*cli)->cli_parent);
306:
307: e_free(*cli);
308: *cli = NULL;
309: }
310:
311: /*
312: * rpc_pkt_Send() - Send RPC packet
313: *
314: * @sock = Socket
315: * @type = Type of socket
316: * @sa = Server address
317: * @pkt = RPC packet
318: * @len = Length of packet
319: * return: -1 error, 0 EOF or >0 sended bytes
320: */
321: int
322: rpc_pkt_Send(int sock, int type, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt, int len)
323: {
324: if (!pkt) {
325: rpc_SetErr(EINVAL, "Invalid argument(s)!");
326: return -1;
327: }
328:
329: return rpc_Write(sock, type, MSG_NOSIGNAL, sa, pkt, len);
330: }
331:
332: /*
333: * rpc_pkt_Receive() - Receive RPC packet
334: *
335: * @sock = Socket
336: * @type = Type of socket
337: * @sa = Server address
338: * @pkt = RPC packet
339: * @seq = Signed packet with seq.no
340: * return: -1 error, 0 EOF or >0 received bytes
341: */
342: int
343: rpc_pkt_Receive(int sock, int type, sockaddr_t * __restrict sa, ait_val_t * __restrict pkt, int seq)
344: {
345: int ret;
346: struct tagRPCCall *rpc;
347:
348: if (!pkt) {
349: rpc_SetErr(EINVAL, "Invalid argument(s)!");
350: return -1;
351: }
352:
353: /* reply from RPC server */
354: do {
355: if (type == SOCK_STREAM || type == SOCK_EXT)
356: ret = rpc_Read(sock, type, 0, NULL, pkt);
357: else
358: ret = rpc_Read(sock, type, 0, sa, pkt);
359:
360: if (ret > 0) {
361: rpc = (struct tagRPCCall*) AIT_GET_BUF(pkt);
362:
363: /* check for loop request */
364: if (!(rpc->call_io & RPC_ACK))
365: continue;
366: /* check for signed request */
367: if (seq != ntohl(rpc->call_seq))
368: continue;
369: }
370: } while (ret < 1);
371: printf("================================== packet end seq=%u ============\n", seq);
372:
373: return ret;
374: }
375:
376: /*
377: * rpc_pkt_Request() - Build RPC Request packet
378: *
379: * @pkt = Packet buffer
380: * @sess = RPC session info
381: * @tag = Function tag for execution
382: * @vars = Function argument array of values, may be NULL
383: * @noreply = We not want RPC reply
384: * @nocrc = Without CRC calculation
385: * @seq = Sign packet with seq.no
386: * return: -1 error or != -1 prepared bytes into packet
387: */
388: int
389: rpc_pkt_Request(ait_val_t * __restrict pkt, rpc_sess_t * __restrict sess, u_short tag,
390: array_t * __restrict vars, int noreply, int nocrc, int seq)
391: {
392: struct tagRPCCall *rpc;
393: int ret = 0, estlen, len = sizeof(struct tagRPCCall);
394: u_char *buf;
395:
396: if (!pkt || !sess) {
397: rpc_SetErr(EINVAL, "Invalid argument(s)!");
398: return -1;
399: }
400:
401: /* calc estimated length */
402: estlen = ait_resideVars(vars) + len;
403: if (estlen > AIT_LEN(pkt))
404: AIT_RE_BUF(pkt, estlen);
405: buf = AIT_GET_BUF(pkt);
406:
407: /* prepare RPC call */
408: rpc = (struct tagRPCCall*) buf;
409: rpc_addPktSession(&rpc->call_session, sess);
410: rpc->call_tag = htons(tag);
411: if (!vars)
412: rpc->call_argc = 0;
413: else
414: rpc->call_argc = (u_char) array_Size(vars);
415:
416: /* set reply */
417: rpc->call_req.flags = (uint64_t) htonl(noreply ? RPC_NOREPLY : RPC_REPLY);
418:
419: if (array_Size(vars)) {
420: /* marshaling variables */
421: ret = ait_vars2buffer(buf + len, AIT_LEN(pkt) - len, vars);
422: if (ret == -1) {
423: rpc_SetErr(EBADRPC, "Failed to prepare RPC packet values");
424: return -1;
425: } else
426: len += ret;
427: }
428:
429: /* total packet length */
430: rpc->call_len = htonl(len);
431: rpc->call_io = RPC_REQ;
432:
433: /* sign packet */
434: rpc->call_seq = htonl(seq);
435:
436: if (!nocrc) {
437: /* calculate CRC */
438: rpc->call_crc ^= rpc->call_crc;
439: rpc->call_crc = htons(crcFletcher16((u_short*) buf, len / 2));
440: }
441:
442: return len;
443: }
444:
445: /*
446: * rpc_pkt_Replay() - Decode RPC Replay packet
447: *
448: * @pkt = Packet buffer
449: * @sess = RPC session info, if =NULL don't check session
450: * @tag = Function tag, if =CALL_TAG_MAX don't check tag
451: * @vars = Function argument array of values, may be NULL
452: * @nocrc = Without CRC calculation
453: * return: -1 error or != -1 return value from function
454: */
455: int
456: rpc_pkt_Replay(ait_val_t * __restrict pkt, rpc_sess_t * __restrict sess, u_short tag,
457: array_t ** __restrict vars, int nocrc)
458: {
459: struct tagRPCCall *rpc;
460: int len;
461: u_char *buf;
462: uint16_t crc;
463:
464: if (!pkt) {
465: rpc_SetErr(EINVAL, "Invalid argument(s)!");
466: return -1;
467: } else
468: buf = AIT_GET_BUF(pkt);
469:
470: rpc = (struct tagRPCCall*) buf;
471: if (!nocrc) {
472: /* calculate CRC */
473: crc = ntohs(rpc->call_crc);
474: rpc->call_crc ^= rpc->call_crc;
475: if (crc != crcFletcher16((u_short*) buf, ntohl(rpc->call_len) / 2)) {
476: rpc_SetErr(ERPCMISMATCH, "Bad CRC RPC packet");
477: return -1;
478: }
479: }
480:
481: /* check RPC packet session info */
482: if (sess && rpc_chkPktSession(&rpc->call_session, sess)) {
483: rpc_SetErr(ERPCMISMATCH, "Get invalid RPC session");
484: return -1;
485: }
486: if (tag != CALL_TAG_MAX && ntohs(rpc->call_tag) != tag) {
487: rpc_SetErr(ERPCMISMATCH, "Get wrong RPC reply");
488: return -1;
489: }
490: if (ntohl(rpc->call_rep.eno) && ntohl(rpc->call_rep.ret) == -1) {
491: rpc_SetErr(ntohl(rpc->call_rep.eno), "Server side: retcode=%d #%d %s",
492: ntohl(rpc->call_rep.ret), ntohl(rpc->call_rep.eno),
493: strerror(ntohl(rpc->call_rep.eno)));
494: return -1;
495: }
496: len = rpc->call_argc * sizeof(ait_val_t);
497: if (len > AIT_LEN(pkt) - sizeof(struct tagRPCCall)) {
498: rpc_SetErr(EMSGSIZE, "Reply RPC packet not enough buffer space ...");
499: return -1;
500: }
501: if (len > ntohl(rpc->call_len) - sizeof(struct tagRPCCall)) {
502: rpc_SetErr(EMSGSIZE, "Reply RPC packet is too short ...");
503: return -1;
504: }
505:
506: /* RPC is OK! Go de-marshaling variables ... */
507: if (vars && rpc->call_argc) {
508: #ifdef CLI_RES_ZCOPY
509: *vars = ait_buffer2vars(buf + sizeof(struct tagRPCCall), len,
510: rpc->call_argc, 42);
511: #else
512: *vars = ait_buffer2vars(buf + sizeof(struct tagRPCCall), len,
513: rpc->call_argc, 0);
514: #endif
515: if (!*vars) {
516: rpc_SetErr(elwix_GetErrno(), "%s", elwix_GetError());
517: return -1;
518: }
519: }
520:
521: return ntohl(rpc->call_rep.ret);
522: }
523:
524: /*
525: * rpc_cli_execCall() - Execute RPC call
526: *
527: * @cli = RPC Client session
528: * @noreply = We not want RPC reply
529: * @tag = Function tag for execution
530: * @in_vars = IN function argument array of values, may be NULL
531: * @out_vars = OUT returned array of rpc values, if !=NULL must be free after use with ait_freeVars()
532: * return: -1 error, 0 ok result or 1 closed rpc connection
533: */
534: int
535: rpc_cli_execCall(rpc_cli_t *cli, int noreply, u_short tag,
536: array_t * __restrict in_vars, array_t ** __restrict out_vars)
537: {
538: int type = 0, wlen;
539: u_char *buf;
540: u_int seq = 0;
541:
542: if (!cli) {
543: rpc_SetErr(EINVAL, "Can`t execute call because parameter is null or invalid!");
544: return -1;
545: } else {
546: if (cli->cli_id == SOCK_STREAM || cli->cli_id == SOCK_EXT)
547: type = cli->cli_id;
548: else
549: seq = random(); /* sign package */
550: buf = AIT_GET_BUF(&cli->cli_buf);
551: }
552: if (out_vars)
553: *out_vars = NULL;
554:
555: if ((wlen = rpc_pkt_Request(&cli->cli_buf, cli->cli_parent, tag, in_vars, noreply, type, seq)) == -1)
556: return -1;
557:
558: if ((wlen = rpc_pkt_Send(cli->cli_sock, cli->cli_id, &cli->cli_sa, &cli->cli_buf, wlen)) == -1)
559: return -1;
560: if (!wlen) /* closed rpc connection */
561: return 1;
562:
563: if (noreply) /* we not want reply */
564: return 0;
565:
566: if ((wlen = rpc_pkt_Receive(cli->cli_sock, cli->cli_id, &cli->cli_sa, &cli->cli_buf, seq)) == -1)
567: return -1;
568: if (!wlen) /* closed rpc connection */
569: return 1;
570:
571: if ((wlen = rpc_pkt_Replay(&cli->cli_buf, cli->cli_parent, tag, out_vars, type)) == -1)
572: return -1;
573:
574: return 0;
575: }
576:
577: /*
578: * rpc_cli_freeCall() - Free resouce allocated by RPC call
579: *
580: * @out_vars = Returned array with variables from RPC call
581: * return: none
582: */
583: void
584: rpc_cli_freeCall(array_t ** __restrict out_vars)
585: {
586: #ifdef CLI_RES_ZCOPY
587: array_Destroy(out_vars);
588: #else
589: ait_freeVars(out_vars);
590: #endif
591: }
592:
593: /*
594: * rpc_cli_ping() - Ping RPC server
595: *
596: * @cli = connected client
597: * return: -1 error or !=-1 ping seq id
598: */
599: int
600: rpc_cli_ping(rpc_cli_t *cli)
601: {
602: int ret = 0;
603: array_t *arr = NULL;
604:
605: if (!cli)
606: return -1;
607:
608: if (rpc_cli_execCall(cli, RPC_REPLY, CALL_SRVPING, NULL, &arr))
609: return -1;
610: else
611: ret = AIT_GET_U16(array(arr, 0, ait_val_t*));
612: rpc_cli_freeCall(&arr);
613:
614: return ret;
615: }
616:
617:
618: /*
619: * rpc_cli_openClient2() - Connect to layer2 RPC Server
620: *
621: * @InstID = InstID for RPC session request
622: * @netBuf = Network buffer length (min:512 bytes), if =0 == BUFSIZ (also meaning max RPC packet)
623: * @csIface = Interface name for bind client, if NULL first interface on host
624: * @csHost = Host ethernet address
625: * return: NULL == error or !=NULL connection to RPC server established
626: */
627: rpc_cli_t *
628: rpc_cli_openClient2(u_char InstID, int netBuf, const char *csIface, const char *csHost)
629: {
630: rpc_cli_t *cli = NULL;
631: sockaddr_t sa = E_SOCKADDR_INIT, sal = E_SOCKADDR_INIT;
632: char szIface[64], szStr[STRSIZ];
633: register int i;
634: struct ifreq ifr;
635: int n = 1;
636: struct bpf_insn insns[] = {
637: BPF_STMT(BPF_LD + BPF_H + BPF_ABS, 12),
638: BPF_JUMP(BPF_JMP + BPF_JEQ + BPF_K, RPC_DEFPORT, 0, 1),
639: BPF_STMT(BPF_RET + BPF_K, -1),
640: BPF_STMT(BPF_RET + BPF_K, 0),
641: };
642: struct bpf_program fcode = {
643: .bf_len = sizeof(insns) / sizeof(struct bpf_insn),
644: .bf_insns = insns
645: };
646:
647: if (!csHost || !e_getlinkbyname(csHost, &sa))
648: return NULL;
649: if (!csIface) {
650: if (e_get1stiface(szIface, sizeof szIface))
651: return NULL;
652: } else
653: strlcpy(szIface, csIface, sizeof szIface);
654: if (!e_getifacebyname(szIface, &sal))
655: return NULL;
656:
657: cli = e_malloc(sizeof(rpc_cli_t));
658: if (!cli) {
659: LOGERR;
660: return NULL;
661: } else
662: memset(cli, 0, sizeof(rpc_cli_t));
663:
664: /* build session */
665: cli->cli_parent = e_malloc(sizeof(rpc_sess_t));
666: if (!cli->cli_parent) {
667: LOGERR;
668: e_free(cli);
669: return NULL;
670: } else {
671: ((rpc_sess_t*) cli->cli_parent)->sess_version = RPC_VERSION;
672: ((rpc_sess_t*) cli->cli_parent)->sess_instance = InstID;
673: }
674:
675: cli->cli_id = SOCK_BPF;
676: memcpy(&cli->cli_sa, &sa, sizeof cli->cli_sa);
677:
678: /* connect to RPC server */
679: for (i = 0; i < 10; i++) {
680: memset(szStr, 0, sizeof szStr);
681: snprintf(szStr, sizeof szStr, "/dev/bpf%d", i);
682: cli->cli_sock = open(szStr, O_RDWR);
683: if (cli->cli_sock > STDERR_FILENO)
684: break;
685: }
686: if (cli->cli_sock < 3) {
687: LOGERR;
688: e_free(cli->cli_parent);
689: e_free(cli);
690: return NULL;
691: }
692:
693: if (ioctl(cli->cli_sock, BIOCIMMEDIATE, &n) == -1) {
694: LOGERR;
695: goto err;
696: }
697: if (ioctl(cli->cli_sock, BIOCSETF, &fcode) == -1) {
698: LOGERR;
699: goto err;
700: }
701: n = (netBuf < RPC_MIN_BUFSIZ) ? getpagesize() : E_ALIGN(netBuf, 2);
702: if (ioctl(cli->cli_sock, BIOCSBLEN, &n) == -1) {
703: LOGERR;
704: goto err;
705: } else
706: AIT_SET_BUFSIZ(&cli->cli_buf, 0, n);
707:
708: memset(&ifr, 0, sizeof ifr);
709: strlcpy(ifr.ifr_name, szIface, sizeof ifr.ifr_name);
710: if (ioctl(cli->cli_sock, BIOCSETIF, &ifr) == -1) {
711: LOGERR;
712: goto err;
713: } else
714: fcntl(cli->cli_sock, F_SETFL,
715: fcntl(cli->cli_sock, F_GETFL) | O_NONBLOCK);
716:
717: return cli;
718: err:
719: AIT_FREE_VAL(&cli->cli_buf);
720: if (cli->cli_sock > 2)
721: close(cli->cli_sock);
722: e_free(cli->cli_parent);
723: e_free(cli);
724: return NULL;
725: }
726:
727: /*
728: * rpc_cli_closeClient2() - Close layer2 connection to RPC server and free resources
729: *
730: * @cli = RPC Client session
731: * return: none
732: */
733: void
734: rpc_cli_closeClient2(rpc_cli_t ** __restrict cli)
735: {
736: if (!cli || !*cli || (*cli)->cli_id != SOCK_BPF)
737: return;
738:
739: close((*cli)->cli_sock);
740:
741: AIT_FREE_VAL(&(*cli)->cli_buf);
742:
743: if ((*cli)->cli_parent)
744: e_free((*cli)->cli_parent);
745:
746: e_free(*cli);
747: *cli = NULL;
748: }
749:
750: /*
751: * rpc_cli_openClientExt() - Connect to pipe RPC Server
752: *
753: * @InstID = InstID for RPC session request
754: * @netBuf = Network buffer length (min:512 bytes), if =0 == BUFSIZ (also meaning max RPC packet)
755: * @fd = File descriptor
756: * return: NULL == error or !=NULL connection to RPC server established
757: */
758: rpc_cli_t *
759: rpc_cli_openClientExt(u_char InstID, int netBuf, int fd)
760: {
761: rpc_cli_t *cli = NULL;
762: int n;
763:
764: cli = e_malloc(sizeof(rpc_cli_t));
765: if (!cli) {
766: LOGERR;
767: return NULL;
768: } else
769: memset(cli, 0, sizeof(rpc_cli_t));
770:
771: /* build session */
772: cli->cli_parent = e_malloc(sizeof(rpc_sess_t));
773: if (!cli->cli_parent) {
774: LOGERR;
775: e_free(cli);
776: return NULL;
777: } else {
778: ((rpc_sess_t*) cli->cli_parent)->sess_version = RPC_VERSION;
779: ((rpc_sess_t*) cli->cli_parent)->sess_instance = InstID;
780: }
781:
782: cli->cli_id = SOCK_EXT;
783: cli->cli_sock = fd;
784:
785: n = (netBuf < RPC_MIN_BUFSIZ) ? getpagesize() : E_ALIGN(netBuf, 2);
786: AIT_SET_BUFSIZ(&cli->cli_buf, 0, n);
787:
788: fcntl(cli->cli_sock, F_SETFL,
789: fcntl(cli->cli_sock, F_GETFL) | O_NONBLOCK);
790:
791: return cli;
792: }
793:
794: /*
795: * rpc_cli_closeClientExt() - Close pipe connection to RPC server and free resources
796: *
797: * @cli = RPC Client session
798: * return: none
799: */
800: void
801: rpc_cli_closeClientExt(rpc_cli_t ** __restrict cli)
802: {
803: if (!cli || !*cli || (*cli)->cli_id != SOCK_EXT)
804: return;
805:
806: AIT_FREE_VAL(&(*cli)->cli_buf);
807:
808: if ((*cli)->cli_parent)
809: e_free((*cli)->cli_parent);
810:
811: e_free(*cli);
812: *cli = NULL;
813: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>