mapiipc.c 13 KB
Newer Older
1
2
3
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
Arne Øslebø's avatar
Arne Øslebø committed
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <errno.h>
#include <sys/ipc.h>
#include <sys/msg.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/un.h>
#include <string.h>
#include <errno.h>

#include "mapiipc.h"
#include "debug.h"

#define HAVE_MSGHDR_MSG_CONTROL 1

22
23
24
25
26
27
28
#ifdef DIMAPI
#include <netdb.h>
#include <netinet/in.h>
#include <semaphore.h>
#include "flist.h"
#endif

Arne Øslebø's avatar
Arne Øslebø committed
29
30
// this file contains all the client-side IPC related functions

's avatar
   
committed
31
32
33
static int sock;
static int mapidaddr_len;
static struct sockaddr_un mapidaddr;
's avatar
committed
34
//static struct sockaddr_un fromaddr;
's avatar
committed
35
static char* mapidsocket;
Arne Øslebø's avatar
Arne Øslebø committed
36

's avatar
committed
37
38
39
40
#ifdef DIMAPISSL
static SSL_CTX *ctx;
#endif

's avatar
committed
41
int mapiipc_write(struct mapiipcbuf *qbuf)
Arne Øslebø's avatar
Arne Øslebø committed
42
43
44
45
46
47
//Sends an IPC message to mapid
{
  qbuf->uid=getuid();
  if(send(sock, qbuf, sizeof(struct mapiipcbuf), 0) == -1) {
    WARNING_CMD(printf("send: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
    //    exit(1);
's avatar
committed
48
    return -1;
Arne Øslebø's avatar
Arne Øslebø committed
49
  }
's avatar
committed
50
  return 0;
Arne Øslebø's avatar
Arne Øslebø committed
51
52
}

's avatar
committed
53
int mapiipc_read(struct mapiipcbuf *qbuf)
Arne Øslebø's avatar
Arne Øslebø committed
54
55
56
57
//Reads an IPC message. Blocking call
{
  if(recv(sock, qbuf, MAX_SEND_SIZE, 0) == -1){
    ERROR_CMD(printf("recv: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
's avatar
committed
58
59
    //exit(1);
    return -1;
Arne Øslebø's avatar
Arne Øslebø committed
60
  }
's avatar
committed
61
  return 0;
Arne Øslebø's avatar
Arne Øslebø committed
62
63
}

's avatar
committed
64
int mapiipc_client_init()
Arne Øslebø's avatar
Arne Øslebø committed
65
66
67
68
//Initializes IPC for mapi functions
{
  if ((sock = socket(AF_LOCAL, SOCK_STREAM, 0)) == -1) {
    ERROR_CMD(printf("socket: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
's avatar
committed
69
70
    //exit(1);
    return -1;
Arne Øslebø's avatar
Arne Øslebø committed
71
  }
's avatar
committed
72
73
74

  mapidsocket=malloc(sizeof(MAPIDSOCKHOME)-2+strlen(getenv("HOME")));
  sprintf(mapidsocket,MAPIDSOCKHOME,getenv("HOME")); 
Arne Øslebø's avatar
Arne Øslebø committed
75
76
77

  // Construct name of mapid's socket
  mapidaddr.sun_family = AF_LOCAL;
's avatar
committed
78
  strcpy(mapidaddr.sun_path, mapidsocket);
Arne Øslebø's avatar
Arne Øslebø committed
79
80
  mapidaddr_len = sizeof mapidaddr.sun_family + strlen(mapidaddr.sun_path);

's avatar
committed
81
  if (connect(sock, (struct sockaddr *)&mapidaddr, mapidaddr_len) < 0) 
's avatar
   
committed
82
  {
's avatar
committed
83
	//	ERROR_CMD(printf("connect: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
's avatar
committed
84
85
86
87
      free(mapidsocket);
      mapidsocket=strdup(MAPIDSOCKGLOBAL);
      strcpy(mapidaddr.sun_path, mapidsocket);
      mapidaddr_len = sizeof mapidaddr.sun_family + strlen(mapidaddr.sun_path);
88
89
90
      if (connect(sock, (struct sockaddr *)&mapidaddr, mapidaddr_len) < 0) {
    		ERROR_CMD(printf("connect: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
	}
's avatar
committed
91
      else {
92
		free(mapidsocket);
's avatar
committed
93
      	//exit(EXIT_FAILURE);
94
      	return 0;
's avatar
committed
95
      }
's avatar
   
committed
96
  }
's avatar
committed
97
  free(mapidsocket);
98
  return -1;
Arne Øslebø's avatar
Arne Øslebø committed
99
100
101
102
103
104
105
106
}

void mapiipc_client_close()
//Releases socket resources
{
  close(sock);
}

107
108
109
110
#ifdef DIMAPI
struct sockaddr_in remoteaddr;
flist_t *remote_flowlist=NULL;

's avatar
committed
111
int mapiipc_remote_write(struct dmapiipcbuf *dbuf, struct host *h)
112
113
114
//Sends an IPC message to mapid
{
//  qbuf->uid=getuid(); 
's avatar
committed
115
116
117
118
119
120
121
122
123
124
125

#ifdef DIMAPISSL
	if(SSL_write(h->con,dbuf,dbuf->length) == -1){
		WARNING_CMD(printf("SSL_write: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
		//    exit(1);
		return -1;
	}
#endif

#ifndef DIMAPISSL
	
126
127
128
  if(send(h->sockfd, dbuf, dbuf->length, 0) == -1) {
    WARNING_CMD(printf("send: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
    //    exit(1);
's avatar
committed
129
    return -1;
's avatar
committed
130
131
    }
#endif
's avatar
committed
132
  return 0;
133
134
}

's avatar
committed
135
136


's avatar
committed
137
int mapiipc_remote_write_to_all(remote_flowdescr_t* rflow)
138
139
140
{
  host_flow* hflow;
  flist_node_t* fnode;
's avatar
committed
141

's avatar
committed
142
143
  //pthread_mutex_lock(&rflow->mutex);
  //rflow->pending_msgs=0;
144
145
146
  for (fnode=flist_head(rflow->host_flowlist); fnode!=NULL; fnode=flist_next(fnode)) {
    hflow=(host_flow*)fnode->data;
    hflow->dbuf->fd=hflow->fd;
's avatar
fix    
committed
147
    if (mapiipc_remote_write(hflow->dbuf, hflow->rhost)<0) return -1;
's avatar
committed
148
149
150
151
152
    //rflow->pending_msgs++;
  }
  //pthread_mutex_unlock(&rflow->mutex);
  for (fnode=flist_head(rflow->host_flowlist); fnode!=NULL; fnode=flist_next(fnode)) {
  	sem_wait(&rflow->fd_sem);
153
  }
's avatar
committed
154
  return 0;
155
156
157
158
159
160
161
162
}

void *mapiipc_comm_thread(void *host) {
//Reads an IPC message. Blocking call
  struct dmapiipcbuf* dbuf;
  remote_flowdescr_t* rflow;
  host_flow* hflow;
  int recv_bytes;
's avatar
committed
163
  int sockfd=((struct host *)host)->sockfd;
's avatar
committed
164

's avatar
committed
165
166
167
168
#ifdef DIMAPISSL
  SSL *hostconn = ((struct host*)host)->con;
#endif

's avatar
committed
169
170
171
  /* Guarantees that thread resources are deallocated upon return */
  pthread_detach(pthread_self());

's avatar
committed
172
  dbuf = (struct dmapiipcbuf *)malloc(sizeof(struct dmapiipcbuf));  
173
174
175

  while (1) {

's avatar
committed
176
177
      if (host==NULL) break;

's avatar
committed
178
179
180
181
182
183
184
185
186
#ifdef DIMAPISSL
      recv_bytes = SSL_readn(hostconn,dbuf,BASIC_SIZE);
#endif


#ifndef DIMAPISSL     
    recv_bytes=readn(sockfd, dbuf, BASIC_SIZE);
#endif
    
's avatar
committed
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
    if (recv_bytes == 0) { // the peer has gone
	//printf("Socket closed\n");
	break;
    }
    else if (recv_bytes == -1) {
	//ERROR_CMD(printf("recv: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
	continue;
    }
    
    if (dbuf->length > DIMAPI_DATA_SIZE) {
	fprintf(stderr,"Bad IPC message from agent\n");
	continue;
    }
    
    if (dbuf->length-BASIC_SIZE>0) {
's avatar
committed
202
203
204
205
206
207

#ifdef DIMAPISSL
	 recv_bytes = SSL_readn(hostconn,(char *)dbuf + BASIC_SIZE, dbuf->length - BASIC_SIZE );
#endif

#ifndef DIMAPISSL
's avatar
committed
208
	recv_bytes=readn(sockfd, (char*)dbuf+BASIC_SIZE, dbuf->length-BASIC_SIZE);
's avatar
committed
209
#endif
's avatar
committed
210
211
212
213
214
215
216
217
218
	if (recv_bytes == 0) { // the peer has gone
		//printf("Socket closed\n");
		break;
	}
	else if (recv_bytes == -1) {
		//ERROR_CMD(printf("recv: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
		continue;
	}
    }
's avatar
committed
219
	
220
221
222
    hflow=(host_flow*)flist_get( ((struct host*)host)->flows, dbuf->fd );
    if (hflow!=NULL) {
      rflow=flist_get(remote_flowlist, hflow->scope_fd);
's avatar
   
committed
223
224
      if (dbuf->cmd==GET_NEXT_PKT_ACK) {
		memcpy(hflow->pkt, dbuf->data, dbuf->length-BASIC_SIZE);
's avatar
committed
225
226
		flist_append(rflow->pkt_list, 0, hflow);
		sem_post(&rflow->pkt_sem);
's avatar
   
committed
227
228
229
      }
      else {
	memcpy( hflow->dbuf, dbuf, dbuf->length );	//place data
's avatar
committed
230
231

	sem_post( &rflow->fd_sem );
232
233
234
      }
    }
    else {
's avatar
committed
235
      fprintf(stderr,"Invalid IPC message, unknown fd %d\n",dbuf->fd);
's avatar
committed
236
      //exit(-1);
237
      //failure
's avatar
committed
238
      continue;
239
240
241
    }

  }
's avatar
committed
242
243
244

  free(dbuf);
  return NULL;
245
246
247
}


's avatar
committed
248
int mapiipc_remote_init(struct host *h)
249
250
//Initializes IPC for dmapi functions
{
's avatar
committed
251
252
  struct hostent* host=gethostbyname(h->hostname);
  struct timeval tv;
253

's avatar
committed
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
#ifdef DIMAPISSL 

	SSL_library_init();
	SSL_load_error_strings();

	if ((ctx=SSL_CTX_new(SSLv3_client_method())) == NULL) {
		ERR_print_errors_fp(stderr);
		return 0;
	}
	if ((h->con = SSL_new(ctx)) == NULL) {
		ERR_print_errors_fp(stderr);
		return 0;;
	}

#endif

  
271
272
  if ((h->sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
    ERROR_CMD(printf("socket: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
's avatar
committed
273
274
    //exit(-1);
    return -1;
's avatar
committed
275
276
  }

's avatar
fix    
committed
277
  /*
278
  tv.tv_sec=20;		//timeout 20 sec for recv
's avatar
committed
279
280
281
282
283
  tv.tv_usec=0;

  if (setsockopt(h->sockfd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(struct timeval)) == -1) {
    close(h->sockfd);
    printf("Unexpected error on setsockopt()");
's avatar
committed
284
285
    //exit(-1);
    return -1;
's avatar
committed
286
  }
's avatar
fix    
committed
287
  */
288

's avatar
committed
289
290
291
292
293
294
  tv.tv_sec=10;		//timeout 10 sec for send
  tv.tv_usec=0;

  if (setsockopt(h->sockfd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(struct timeval)) == -1) {
    close(h->sockfd);
    printf("Unexpected error on setsockopt()");
's avatar
committed
295
296
    //exit(-1);
    return -1;
's avatar
committed
297
298
299
300
  }

  if (host==NULL) {
    printf("Could not determine address for %s\n",h->hostname);
's avatar
committed
301
302
    //exit(1);
    return -1;
303
  }
's avatar
committed
304

305
306
  // Construct name of dmapid's socket
  remoteaddr.sin_family = AF_INET;
's avatar
committed
307
  remoteaddr.sin_addr = *((struct in_addr *)host->h_addr);
308
309
310
  remoteaddr.sin_port = htons(h->port);

  if (connect(h->sockfd, (struct sockaddr *)&remoteaddr, sizeof(remoteaddr)) < 0) {     
's avatar
committed
311
    ERROR_CMD(printf("connect failed: %s [%s:%d]\n",strerror(errno),__FILE__,__LINE__));
's avatar
committed
312
313
    //exit(EXIT_FAILURE);
    return -1;
314
  }
's avatar
committed
315
316
317
318
319
320
321
322
323
324
325
326
327

#ifdef DIMAPISSL
  
        if (SSL_set_fd(h->con, h->sockfd) == 0) {
		ERR_print_errors_fp(stderr);
		return 0;
	}
	if (SSL_connect(h->con) <= 0) {
		ERR_print_errors_fp(stderr);
		return 0;
	}

#endif
's avatar
committed
328
  return 0;
's avatar
committed
329

330
331
332
333
334
}

void mapiipc_remote_close(struct host *h)
//Releases socket resources
{
's avatar
committed
335
336
337
338
339

#ifdef DIMAPISSL
if (SSL_shutdown(h->con) == -1)
		ERR_print_errors_fp(stderr);
#endif
's avatar
committed
340
  shutdown(h->sockfd, SHUT_RDWR);
341
342
343
344
  close(h->sockfd);
}
#endif

Arne Øslebø's avatar
Arne Øslebø committed
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372

// Helper functions for function arguments retrieval
int getargint(mapiFunctArg **pos){
	int i;
	i = *((int *)(*pos));
	//	printf("getint: %d\n", i);
	(*pos) += sizeof(int);
	return i;
}

char getargchar(mapiFunctArg **pos){
	char c;
	c = *((char *)(*pos));
	//printf("getchar: %c\n", c);
	(*pos) += sizeof(char);
	return c;
}

unsigned long long getargulonglong(mapiFunctArg **pos){
	unsigned long long l;
	l = *((unsigned long long *)(*pos));
	//printf("getulonglong: %lld\n", l);
	(*pos) += sizeof(unsigned long long);
	return l;
}

char * getargstr(mapiFunctArg **pos){
	char *s;
373
	s = (char*)*pos;
Arne Øslebø's avatar
Arne Øslebø committed
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
	//printf("getstr: %s\n", s);
	(*pos) += strlen(s)+1;
	return s;
}

void addarg(mapiFunctArg **pos, void *arg, int type)
// Helper function for mapi_apply_function()
// pos: current position in message's argument buffer.
// arg: argument to copy into buffer
// type: argument type
{
  switch(type){
    case INT:
      memcpy(*pos, arg, sizeof(int));
      //printf("add_arg: %d\n", *((int *)(*pos)));
      (*pos) += sizeof(int);
      break;
    case CHAR:
      memcpy(*pos, arg, sizeof(char));
      //printf("add_arg: %d\n", *((char *)(*pos)));
      (*pos) += sizeof(char);
      break;
    case UNSIGNED_LONG_LONG:
      memcpy(*pos, arg, sizeof(unsigned long long));
      //printf("add_arg: %llu\n", *((unsigned long long *)(*pos)));
      (*pos) += sizeof(unsigned long long);
      break;
    case STRING:
      memcpy(*pos, arg, strlen((char *)arg)+1);
      //printf("add_arg: %s\n", (char *)(*pos));
      (*pos) += strlen((char *)arg)+1;
      break;
    default:
      break;
  }
}

int mapiipc_send_fd(int sendfd)
{
  struct msghdr	msg;
  struct iovec	iov[1];
  char ptr[2];
  int ret;

#ifdef	HAVE_MSGHDR_MSG_CONTROL
  union {
    struct cmsghdr	cm;
    char control[CMSG_SPACE(sizeof(int))];
  } control_un;
  struct cmsghdr	*cmptr;
  
  msg.msg_control = control_un.control;
  msg.msg_controllen = sizeof(control_un.control);
  
  cmptr = CMSG_FIRSTHDR(&msg);
  cmptr->cmsg_len = CMSG_LEN(sizeof(int));
  cmptr->cmsg_level = SOL_SOCKET;
  cmptr->cmsg_type = SCM_RIGHTS;
  *((int *) CMSG_DATA(cmptr)) = sendfd;
#else
  msg.msg_accrights = (caddr_t) &sendfd;
  msg.msg_accrightslen = sizeof(int);
#endif
    
  iov[0].iov_base = ptr;
  iov[0].iov_len = 2;
  msg.msg_iov = iov;
  msg.msg_iovlen = 1;
  msg.msg_name = NULL;
  msg.msg_namelen = 0;

  ret=sendmsg(sock,&msg,0);
  return(ret);
}


int mapiipc_read_fd(int sock)
{
  struct msghdr	msg;
  struct iovec	iov[1];
  ssize_t n;
  int recvfd;
  char c[2];
  
#ifdef	HAVE_MSGHDR_MSG_CONTROL
  union {
    struct cmsghdr	cm;
    char				control[CMSG_SPACE(sizeof(int))];
  } control_un;
  struct cmsghdr	*cmptr;
  
  msg.msg_control = control_un.control;
  msg.msg_controllen = sizeof(control_un.control);
#else
  msg.msg_accrights = (caddr_t) &newfd;
  msg.msg_accrightslen = sizeof(int);
#endif
  
  iov[0].iov_base = &c;
  iov[0].iov_len = 2;
  msg.msg_iov = iov;
  msg.msg_iovlen = 1;
  msg.msg_name = NULL;
  msg.msg_namelen = 0;
  
  
  if ( (n = recvmsg(sock, &msg, 0)) <= 0)
    return(n);
  
#ifdef	HAVE_MSGHDR_MSG_CONTROL
  if ( (cmptr = CMSG_FIRSTHDR(&msg)) != NULL &&
       cmptr->cmsg_len == CMSG_LEN(sizeof(int))) {
    if (cmptr->cmsg_level != SOL_SOCKET) {
      // err_quit("control level != SOL_SOCKET");
      fprintf(stderr, "control level != SOL_SOCKET");
      return -1;
    }
    if (cmptr->cmsg_type != SCM_RIGHTS) {
      // err_quit("control type != SCM_RIGHTS");
      fprintf(stderr, "control type != SCM_RIGHTS");
      return -1;
    }
    recvfd = *((int *) CMSG_DATA(cmptr));
  } else
    recvfd = -1;		/* descriptor was not passed */
#else
  /* *INDENT-OFF* */
  if (msg.msg_accrightslen == sizeof(int))
    recvfd = newfd;
  else
    recvfd = -1;		/* descriptor was not passed */
  /* *INDENT-ON* */
#endif

  return recvfd;
}
's avatar
committed
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534

/* Read "n" bytes from a socket. */
ssize_t readn(int fd, void *vptr, size_t n) {
        size_t nleft;
        ssize_t nread;
        char *ptr;

        ptr = vptr;
        nleft = n;
        while (nleft > 0) {
		errno=0;
                if ( (nread = read(fd, ptr, nleft)) < 0) {
                        if (errno == EINTR)
                                nread = 0;              /* and call read() again */
                        else
                                return(-1);
                } else if (nread == 0)
                        return 0;                          /* EOF */

                nleft -= nread;
                ptr   += nread;
        }
        return(n - nleft);              /* return >= 0 */
}

's avatar
committed
535
536
537
538
539
540
#ifdef DIMAPISSL
ssize_t SSL_readn(SSL *con, void *vptr, size_t n) {
	
        size_t nleft;
        ssize_t nread;
        char *ptr;
's avatar
committed
541

's avatar
committed
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
        ptr = vptr;
        nleft = n;
	
        while (nleft > 0) {
		errno=0;
                if ( (nread = SSL_read(con, ptr, nleft)) < 0) {
                        if (errno == EINTR)
                                nread = 0;              /* and call read() again */
                        else
                                return(-1);
                } else if (nread == 0)
                        return 0;                          /* EOF */

                nleft -= nread;
                ptr   += nread;
        }
        return(n - nleft);              /* return >= 0 */
}
#endif