summaryrefslogtreecommitdiff
path: root/netcon/RPC.c
diff options
context:
space:
mode:
Diffstat (limited to 'netcon/RPC.c')
-rw-r--r--netcon/RPC.c277
1 files changed, 277 insertions, 0 deletions
diff --git a/netcon/RPC.c b/netcon/RPC.c
new file mode 100644
index 00000000..a6965892
--- /dev/null
+++ b/netcon/RPC.c
@@ -0,0 +1,277 @@
+#include <stdio.h>
+#include <unistd.h>
+#include <sys/un.h>
+#include <pthread.h>
+#include <errno.h>
+#include <sys/syscall.h>
+
+#include <fcntl.h>
+#include <dlfcn.h>
+#include <stdint.h>
+
+#include <sys/socket.h>
+#include <strings.h>
+#include "RPC.h"
+
+#define SERVICE_CONNECT_ATTEMPTS 30
+
+#define CONNECT_SIG int __fd, const struct sockaddr * __addr, socklen_t __len
+#define SOCKET_SIG int socket_family, int socket_type, int protocol
+
+static int (*realconnect)(CONNECT_SIG) = 0;
+static int (*realsocket)(SOCKET_SIG) = 0;
+
+#ifdef NETCON_INTERCEPT
+static int rpc_count;
+#endif
+
+static pthread_mutex_t lock;
+void rpc_mutex_init() {
+ if(pthread_mutex_init(&lock, NULL) != 0) {
+ fprintf(stderr, "error while initializing service call mutex\n");
+ }
+}
+void rpc_mutex_destroy() {
+ pthread_mutex_destroy(&lock);
+}
+
+/*
+ * Reads a new file descriptor from the service
+ */
+int get_new_fd(int sock)
+{
+ char buf[BUF_SZ];
+ int newfd;
+ ssize_t size = sock_fd_read(sock, buf, sizeof(buf), &newfd);
+ if(size > 0)
+ return newfd;
+ return -1;
+}
+
+/*
+ * Reads a return value from the service and sets errno (if applicable)
+ */
+int get_retval(int rpc_sock)
+{
+ if(rpc_sock >= 0) {
+ int retval;
+ int sz = sizeof(char) + sizeof(retval) + sizeof(errno);
+ char retbuf[BUF_SZ];
+ memset(&retbuf, 0, sz);
+ int n_read = read(rpc_sock, &retbuf, sz);
+ if(n_read > 0) {
+ memcpy(&retval, &retbuf[1], sizeof(retval));
+ memcpy(&errno, &retbuf[1+sizeof(retval)], sizeof(errno));
+ return retval;
+ }
+ }
+ return -1;
+}
+
+int load_symbols_rpc()
+{
+ #ifdef NETCON_INTERCEPT
+ realsocket = dlsym(RTLD_NEXT, "socket");
+ realconnect = dlsym(RTLD_NEXT, "connect");
+ if(!realconnect || !realsocket)
+ return -1;
+ #endif
+ return 1;
+}
+
+int rpc_join(const char * sockname)
+{
+ if(!load_symbols_rpc())
+ return -1;
+
+ struct sockaddr_un addr;
+ int conn_err = -1, attempts = 0;
+ memset(&addr, 0, sizeof(addr));
+ addr.sun_family = AF_UNIX;
+ strncpy(addr.sun_path, sockname, sizeof(addr.sun_path)-1);
+
+ int sock;
+ if((sock = realsocket(AF_UNIX, SOCK_STREAM, 0)) < 0){
+ fprintf(stderr, "Error while creating RPC socket\n");
+ return -1;
+ }
+ while((conn_err != 0) && (attempts < SERVICE_CONNECT_ATTEMPTS)){
+ if((conn_err = realconnect(sock, (struct sockaddr*)&addr, sizeof(addr))) != 0) {
+ fprintf(stderr, "Error while connecting to RPC socket. Re-attempting...\n");
+ sleep(1);
+ }
+ else
+ return sock;
+ attempts++;
+ }
+ return -1;
+}
+
+/*
+ * Send a command to the service
+ */
+int rpc_send_command(char *path, int cmd, int forfd, void *data, int len)
+{
+ pthread_mutex_lock(&lock);
+ char c, padding[] = {PADDING};
+ char cmdbuf[BUF_SZ], CANARY[CANARY_SZ+PADDING_SZ], metabuf[BUF_SZ];
+ memcpy(CANARY+CANARY_SZ, padding, sizeof(padding));
+ uint64_t canary_num;
+ // ephemeral RPC socket used only for this command
+ int rpc_sock = rpc_join(path);
+ // Generate token
+ int fdrand = open("/dev/urandom", O_RDONLY);
+
+ if(read(fdrand, &CANARY, CANARY_SZ) < 0) {
+ fprintf(stderr,"unable to read from /dev/urandom for RPC canary data\n");
+ return -1;
+ }
+ memcpy(&canary_num, CANARY, CANARY_SZ);
+ cmdbuf[CMD_ID_IDX] = cmd;
+ memcpy(&cmdbuf[CANARY_IDX], &canary_num, CANARY_SZ);
+ memcpy(&cmdbuf[STRUCT_IDX], data, len);
+
+#ifdef VERBOSE
+ memset(metabuf, 0, BUF_SZ);
+ pid_t pid = syscall(SYS_getpid);
+ pid_t tid = syscall(SYS_gettid);
+ rpc_count++;
+ char timestring[20];
+ time_t timestamp;
+ timestamp = time(NULL);
+ strftime(timestring, sizeof(timestring), "%H:%M:%S", localtime(&timestamp));
+ memcpy(metabuf, RPC_PHRASE, RPC_PHRASE_SZ); // Write signal phrase
+
+ memcpy(&metabuf[IDX_PID], &pid, sizeof(pid_t) ); /* pid */
+ memcpy(&metabuf[IDX_TID], &tid, sizeof(pid_t) ); /* tid */
+ memcpy(&metabuf[IDX_COUNT], &rpc_count, sizeof(rpc_count) ); /* rpc_count */
+ memcpy(&metabuf[IDX_TIME], &timestring, 20 ); /* timestamp */
+#endif
+ /* Combine command flag+payload with RPC metadata */
+ memcpy(&metabuf[IDX_PAYLOAD], cmdbuf, len + 1 + CANARY_SZ);
+
+ // Write RPC
+ int n_write = write(rpc_sock, &metabuf, BUF_SZ);
+ if(n_write < 0) {
+ fprintf(stderr, "Error writing command to service (CMD = %d)\n", cmdbuf[CMD_ID_IDX]);
+ errno = 0;
+ }
+ // Write token to corresponding data stream
+ if(read(rpc_sock, &c, 1) < 0) {
+ fprintf(stderr, "unable to read RPC ACK byte from service.\n");
+ return -1;
+ }
+ if(c == 'z' && n_write > 0 && forfd > -1){
+ if(send(forfd, &CANARY, CANARY_SZ+PADDING_SZ, 0) < 0) {
+ fprintf(stderr,"unable to write canary to stream\n");
+ return -1;
+ }
+ }
+ // Process response from service
+ int ret = ERR_OK;
+ if(n_write > 0) {
+ if(cmdbuf[CMD_ID_IDX]==RPC_SOCKET) {
+ pthread_mutex_unlock(&lock);
+ return rpc_sock; // Used as new socket
+ }
+ if(cmdbuf[CMD_ID_IDX]==RPC_CONNECT
+ || cmdbuf[CMD_ID_IDX]==RPC_BIND
+ || cmdbuf[CMD_ID_IDX]==RPC_LISTEN) {
+ ret = get_retval(rpc_sock);
+ }
+ if(cmdbuf[CMD_ID_IDX]==RPC_GETSOCKNAME) {
+ pthread_mutex_unlock(&lock);
+ return rpc_sock; // Don't close rpc here, we'll use it to read getsockopt_st
+ }
+ }
+ else
+ ret = -1;
+ close(rpc_sock); // We're done with this RPC socket, close it (if type-R)
+ pthread_mutex_unlock(&lock);
+ return ret;
+}
+
+/*
+ * Send file descriptor
+ */
+ssize_t sock_fd_write(int sock, int fd)
+{
+ ssize_t size;
+ struct msghdr msg;
+ struct iovec iov;
+ char buf = '\0';
+ int buflen = 1;
+ union {
+ struct cmsghdr cmsghdr;
+ char control[CMSG_SPACE(sizeof (int))];
+ } cmsgu;
+ struct cmsghdr *cmsg;
+ iov.iov_base = &buf;
+ iov.iov_len = buflen;
+ msg.msg_name = NULL;
+ msg.msg_namelen = 0;
+ msg.msg_iov = &iov;
+ msg.msg_iovlen = 1;
+ if (fd != -1) {
+ msg.msg_control = cmsgu.control;
+ msg.msg_controllen = sizeof(cmsgu.control);
+ cmsg = CMSG_FIRSTHDR(&msg);
+ cmsg->cmsg_len = CMSG_LEN(sizeof (int));
+ cmsg->cmsg_level = SOL_SOCKET;
+ cmsg->cmsg_type = SCM_RIGHTS;
+ *((int *) CMSG_DATA(cmsg)) = fd;
+ } else {
+ msg.msg_control = NULL;
+ msg.msg_controllen = 0;
+ }
+ size = sendmsg(sock, &msg, 0);
+ if (size < 0)
+ perror ("sendmsg");
+ return size;
+}
+/*
+ * Read a file descriptor
+ */
+ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd)
+{
+ ssize_t size;
+ if (fd) {
+ struct msghdr msg;
+ struct iovec iov;
+ union {
+ struct cmsghdr cmsghdr;
+ char control[CMSG_SPACE(sizeof (int))];
+ } cmsgu;
+ struct cmsghdr *cmsg;
+ iov.iov_base = buf;
+ iov.iov_len = bufsize;
+ msg.msg_name = NULL;
+ msg.msg_namelen = 0;
+ msg.msg_iov = &iov;
+ msg.msg_iovlen = 1;
+ msg.msg_control = cmsgu.control;
+ msg.msg_controllen = sizeof(cmsgu.control);
+ size = recvmsg (sock, &msg, 0);
+ if (size < 0)
+ return -1;
+ cmsg = CMSG_FIRSTHDR(&msg);
+ if (cmsg && cmsg->cmsg_len == CMSG_LEN(sizeof(int))) {
+ if (cmsg->cmsg_level != SOL_SOCKET) {
+ fprintf (stderr, "invalid cmsg_level %d\n",cmsg->cmsg_level);
+ return -1;
+ }
+ if (cmsg->cmsg_type != SCM_RIGHTS) {
+ fprintf (stderr, "invalid cmsg_type %d\n",cmsg->cmsg_type);
+ return -1;
+ }
+ *fd = *((int *) CMSG_DATA(cmsg));
+ } else *fd = -1;
+ } else {
+ size = read (sock, buf, bufsize);
+ if (size < 0) {
+ fprintf(stderr, "sock_fd_read(): read: Error\n");
+ return -1;
+ }
+ }
+ return size;
+}