mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2025-04-13 22:12:56 +00:00
Stateless RPC rework
This commit is contained in:
parent
ff9317365a
commit
3e65ecb93d
@ -49,6 +49,14 @@
|
||||
#undef TCP_MSS
|
||||
#define TCP_MSS 1460
|
||||
|
||||
|
||||
/**
|
||||
* MEMP_NUM_REASSDATA: the number of IP packets simultaneously queued for
|
||||
* reassembly (whole packets, not fragments!)
|
||||
*/
|
||||
// #undef MEMP_NUM_REASSDATA
|
||||
//#define MEMP_NUM_REASSDATA 64
|
||||
|
||||
/*
|
||||
The TCP window size can be adjusted by changing the define TCP_WND. However,
|
||||
do keep in mind that this should be at least twice the size of TCP_MSS (thus
|
||||
|
@ -58,40 +58,6 @@
|
||||
#include "RPC.h"
|
||||
#include "common.inc.c"
|
||||
|
||||
/* Global Declarations */
|
||||
static int (*realconnect)(CONNECT_SIG);
|
||||
static int (*realbind)(BIND_SIG);
|
||||
static int (*realaccept)(ACCEPT_SIG);
|
||||
static int (*reallisten)(LISTEN_SIG);
|
||||
static int (*realsocket)(SOCKET_SIG);
|
||||
static int (*realsetsockopt)(SETSOCKOPT_SIG);
|
||||
static int (*realgetsockopt)(GETSOCKOPT_SIG);
|
||||
static int (*realaccept4)(ACCEPT4_SIG);
|
||||
static long (*realsyscall)(SYSCALL_SIG);
|
||||
static int (*realclose)(CLOSE_SIG);
|
||||
static int (*realclone)(CLONE_SIG);
|
||||
static int (*realdup2)(DUP2_SIG);
|
||||
static int (*realdup3)(DUP3_SIG);
|
||||
static int (*realgetsockname)(GETSOCKNAME_SIG);
|
||||
|
||||
/* Exported Function Prototypes */
|
||||
void my_init(void);
|
||||
int connect(CONNECT_SIG);
|
||||
int bind(BIND_SIG);
|
||||
int accept(ACCEPT_SIG);
|
||||
int listen(LISTEN_SIG);
|
||||
int socket(SOCKET_SIG);
|
||||
int setsockopt(SETSOCKOPT_SIG);
|
||||
int getsockopt(GETSOCKOPT_SIG);
|
||||
int accept4(ACCEPT4_SIG);
|
||||
long syscall(SYSCALL_SIG);
|
||||
int close(CLOSE_SIG);
|
||||
int clone(CLONE_SIG);
|
||||
int dup2(DUP2_SIG);
|
||||
int dup3(DUP3_SIG);
|
||||
int getsockname(GETSOCKNAME_SIG);
|
||||
|
||||
static int init_service_connection();
|
||||
static void load_symbols(void);
|
||||
static void set_up_intercept();
|
||||
|
||||
@ -99,44 +65,33 @@ static void set_up_intercept();
|
||||
------------------- Intercept<--->Service Comm mechanisms ----------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
|
||||
static int rpcfd = -1; /* used for fd-transfers */
|
||||
static int thispid = -1;
|
||||
static int instance_count = 0;
|
||||
|
||||
static int connected_to_service() {
|
||||
return rpcfd == -1 ? 0 : 1;
|
||||
}
|
||||
char *network_pathname;
|
||||
|
||||
/* Check whether the socket is mapped to the service or not. We
|
||||
need to know if this is a regular AF_LOCAL socket or an end of a socketpair
|
||||
that the service uses. We don't want to keep state in the intercept, so
|
||||
we simply ask the service via an RPC */
|
||||
static int is_mapped_to_service(int sockfd)
|
||||
|
||||
static int connected_to_service(int sockfd)
|
||||
{
|
||||
if(rpcfd < 0)
|
||||
return 0; /* no connection obviously implies no mapping */
|
||||
dwr(MSG_DEBUG,"is_mapped_to_service()\n");
|
||||
return rpc_send_command(RPC_MAP_REQ, rpcfd, &sockfd, sizeof(sockfd));
|
||||
dwr(MSG_DEBUG_EXTRA,"connected_to_service():\n");
|
||||
socklen_t len;
|
||||
struct sockaddr_storage addr;
|
||||
len = sizeof addr;
|
||||
struct sockaddr_un * addr_un;
|
||||
getpeername(sockfd, (struct sockaddr*)&addr, &len);
|
||||
if (addr.ss_family == AF_LOCAL || addr.ss_family == AF_LOCAL) {
|
||||
addr_un = (struct sockaddr_un*)&addr;
|
||||
if(strcmp(addr_un->sun_path, network_pathname) == 0) {
|
||||
dwr(MSG_DEBUG_EXTRA,"connected_to_service(): Yes, %s\n", addr_un->sun_path);
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
dwr(MSG_DEBUG_EXTRA,"connected_to_service(): Not connected to service\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Sets up the connection pipes and sockets to the service */
|
||||
static int init_service_connection()
|
||||
{
|
||||
const char *network_id;
|
||||
char rpcname[1024];
|
||||
network_id = getenv("ZT_NC_NETWORK");
|
||||
/* Do noting if not configured (sanity check -- should never get here in this case) */
|
||||
if (!network_id){
|
||||
fprintf(stderr, "init_service_connection(): ZT_NC_NETWORK not set.\n");
|
||||
exit(0);
|
||||
}
|
||||
if((rpcfd < 0 && instance_count==0) || thispid != getpid())
|
||||
rpc_mutex_init();
|
||||
|
||||
strncpy(rpcname,network_id,sizeof(rpcname));
|
||||
instance_count++;
|
||||
return rpc_join(rpcname);
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
------------------------ ctors and dtors (and friends) ------------------------
|
||||
@ -154,7 +109,6 @@ static void load_symbols(void)
|
||||
dwr(MSG_DEBUG,"detected duplicate call to global constructor (pid=%d).\n", thispid);
|
||||
}
|
||||
thispid = getpid();
|
||||
|
||||
realconnect = dlsym(RTLD_NEXT, "connect");
|
||||
realbind = dlsym(RTLD_NEXT, "bind");
|
||||
realaccept = dlsym(RTLD_NEXT, "accept");
|
||||
@ -179,9 +133,12 @@ static void _init(void) { set_up_intercept(); }
|
||||
/* get symbols and initialize mutexes */
|
||||
static void set_up_intercept()
|
||||
{
|
||||
network_pathname = getenv("ZT_NC_NETWORK");
|
||||
dwr(MSG_DEBUG,"Connecting to service at: %s\n", network_pathname);
|
||||
if (!getenv("ZT_NC_NETWORK"))
|
||||
return;
|
||||
/* Hook/intercept Posix net API symbols */
|
||||
rpc_mutex_init();
|
||||
load_symbols();
|
||||
}
|
||||
|
||||
@ -193,11 +150,10 @@ static void set_up_intercept()
|
||||
int setsockopt(SETSOCKOPT_SIG)
|
||||
{
|
||||
if(realsetsockopt == NULL){
|
||||
dwr(MSG_ERROR, "setsockopt(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"setsockopt(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"setsockopt(%d)\n", socket);
|
||||
|
||||
/* return(realsetsockopt(socket, level, option_name, option_value, option_len)); */
|
||||
if(level == SOL_IPV6 && option_name == IPV6_V6ONLY)
|
||||
return 0;
|
||||
@ -209,9 +165,8 @@ int setsockopt(SETSOCKOPT_SIG)
|
||||
if(socket == STDIN_FILENO || socket == STDOUT_FILENO || socket == STDERR_FILENO)
|
||||
return(realsetsockopt(socket, level, option_name, option_value, option_len));
|
||||
int err = realsetsockopt(socket, level, option_name, option_value, option_len);
|
||||
if(err < 0){
|
||||
if(err < 0)
|
||||
perror("setsockopt():\n");
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
@ -223,19 +178,13 @@ int setsockopt(SETSOCKOPT_SIG)
|
||||
int getsockopt(GETSOCKOPT_SIG)
|
||||
{
|
||||
if(realgetsockopt == NULL){
|
||||
dwr(MSG_ERROR, "getsockopt(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"getsockopt(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"getsockopt(%d)\n", sockfd);
|
||||
|
||||
if(is_mapped_to_service(sockfd) <= 0) { // First, check if the service manages this
|
||||
if(!connected_to_service(sockfd)) {
|
||||
return realgetsockopt(sockfd, level, optname, optval, optlen);
|
||||
}
|
||||
|
||||
//int err = realgetsockopt(sockfd, level, optname, optval, optlen);
|
||||
/* TODO: this condition will need a little more intelligence later on
|
||||
-- we will need to know if this fd is a local we are spoofing, or a true local */
|
||||
|
||||
if(optname == SO_TYPE) {
|
||||
int* val = (int*)optval;
|
||||
*val = 2;
|
||||
@ -244,7 +193,6 @@ int getsockopt(GETSOCKOPT_SIG)
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
----------------------------------- socket() -----------------------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
@ -255,9 +203,7 @@ int socket(SOCKET_SIG)
|
||||
{
|
||||
if(realsocket == NULL)
|
||||
set_up_intercept();
|
||||
|
||||
dwr(MSG_DEBUG,"socket():\n");
|
||||
int newfd = -1;
|
||||
/* Check that type makes sense */
|
||||
int flags = socket_type & ~SOCK_TYPE_MASK;
|
||||
if (flags & ~(SOCK_CLOEXEC | SOCK_NONBLOCK)) {
|
||||
@ -275,7 +221,6 @@ int socket(SOCKET_SIG)
|
||||
return -1;
|
||||
}
|
||||
/* TODO: detect ENFILE condition */
|
||||
|
||||
if(socket_family == AF_LOCAL
|
||||
|| socket_family == AF_NETLINK
|
||||
|| socket_family == AF_UNIX) {
|
||||
@ -283,35 +228,14 @@ int socket(SOCKET_SIG)
|
||||
dwr(MSG_DEBUG,"realsocket() = %d\n", err);
|
||||
return err;
|
||||
}
|
||||
|
||||
rpcfd = !connected_to_service() ? init_service_connection() : rpcfd;
|
||||
if(rpcfd < 0) {
|
||||
dwr(MSG_DEBUG,"BAD service connection. exiting.\n");
|
||||
exit(-1);
|
||||
}
|
||||
|
||||
/* Assemble and send RPC */
|
||||
struct socket_st rpc_st;
|
||||
rpc_st.socket_family = socket_family;
|
||||
rpc_st.socket_type = socket_type;
|
||||
rpc_st.protocol = protocol;
|
||||
rpc_st.__tid = syscall(SYS_gettid);
|
||||
|
||||
newfd = rpc_send_command(RPC_SOCKET, rpcfd, &rpc_st, sizeof(struct socket_st));
|
||||
if(newfd > 0)
|
||||
{
|
||||
dwr(MSG_DEBUG,"sending fd = %d to Service over (%d)\n", newfd, rpcfd);
|
||||
/* send our local-fd number back to service so
|
||||
it can complete its mapping table entry */
|
||||
/* send fd mapping and get confirmation */
|
||||
if(rpc_send_command(RPC_MAP, rpcfd, &newfd, sizeof(newfd)) > -1) {
|
||||
errno = ERR_OK;
|
||||
dwr(MSG_DEBUG, "RXd fd confirmation. Mapped!\n");
|
||||
return newfd; /* Mapping complete, everything is OK */
|
||||
}
|
||||
}
|
||||
dwr(MSG_DEBUG,"Error while receiving new fd.\n");
|
||||
return -1;
|
||||
/* -1 is passed since we we're generating the new socket in this call */
|
||||
return rpc_send_command(RPC_SOCKET, -1, &rpc_st, sizeof(struct socket_st));
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
@ -323,13 +247,12 @@ int socket(SOCKET_SIG)
|
||||
int connect(CONNECT_SIG)
|
||||
{
|
||||
if(realconnect == NULL){
|
||||
dwr(MSG_ERROR, "connect(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"connect(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"connect(%d):\n", __fd);
|
||||
struct sockaddr_in *connaddr;
|
||||
connaddr = (struct sockaddr_in *) __addr;
|
||||
|
||||
/* Check that this is a valid fd */
|
||||
if(fcntl(__fd, F_GETFD) < 0) {
|
||||
errno = EBADF;
|
||||
@ -347,8 +270,6 @@ int connect(CONNECT_SIG)
|
||||
errno = EAFNOSUPPORT;
|
||||
return -1;
|
||||
}
|
||||
/* FIXME: Check that address is in user space, return EFAULT ? */
|
||||
|
||||
/* make sure we don't touch any standard outputs */
|
||||
if(__fd == STDIN_FILENO || __fd == STDOUT_FILENO || __fd == STDERR_FILENO)
|
||||
return(realconnect(__fd, __addr, __len));
|
||||
@ -358,18 +279,15 @@ int connect(CONNECT_SIG)
|
||||
|| connaddr->sin_family == AF_NETLINK
|
||||
|| connaddr->sin_family == AF_UNIX)) {
|
||||
int err = realconnect(__fd, __addr, __len);
|
||||
//perror("connect():");
|
||||
return err;
|
||||
}
|
||||
|
||||
/* Assemble and send RPC */
|
||||
struct connect_st rpc_st;
|
||||
rpc_st.__tid = syscall(SYS_gettid);
|
||||
rpc_st.__fd = __fd;
|
||||
memcpy(&rpc_st.__addr, __addr, sizeof(struct sockaddr_storage));
|
||||
memcpy(&rpc_st.__len, &__len, sizeof(socklen_t));
|
||||
|
||||
return rpc_send_command(RPC_CONNECT, rpcfd, &rpc_st, sizeof(struct connect_st));
|
||||
return rpc_send_command(RPC_CONNECT, __fd, &rpc_st, sizeof(struct connect_st));
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
@ -381,7 +299,7 @@ int connect(CONNECT_SIG)
|
||||
int bind(BIND_SIG)
|
||||
{
|
||||
if(realbind == NULL){
|
||||
dwr(MSG_ERROR, "bind(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"bind(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"bind(%d):\n", sockfd);
|
||||
@ -397,11 +315,9 @@ int bind(BIND_SIG)
|
||||
errno = ENOTSOCK;
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* make sure we don't touch any standard outputs */
|
||||
if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO)
|
||||
return(realbind(sockfd, addr, addrlen));
|
||||
|
||||
/* If local, just use normal syscall */
|
||||
struct sockaddr_in *connaddr;
|
||||
connaddr = (struct sockaddr_in *)addr;
|
||||
@ -413,7 +329,6 @@ int bind(BIND_SIG)
|
||||
dwr(MSG_DEBUG,"realbind, err = %d\n", err);
|
||||
return err;
|
||||
}
|
||||
|
||||
int port = connaddr->sin_port;
|
||||
int ip = connaddr->sin_addr.s_addr;
|
||||
unsigned char d[4];
|
||||
@ -421,28 +336,25 @@ int bind(BIND_SIG)
|
||||
d[1] = (ip >> 8) & 0xFF;
|
||||
d[2] = (ip >> 16) & 0xFF;
|
||||
d[3] = (ip >> 24) & 0xFF;
|
||||
dwr(MSG_DEBUG, "bind(): %d.%d.%d.%d: %d\n", d[0],d[1],d[2],d[3], ntohs(port));
|
||||
|
||||
dwr(MSG_DEBUG,"bind(): %d.%d.%d.%d: %d\n", d[0],d[1],d[2],d[3], ntohs(port));
|
||||
/* Assemble and send RPC */
|
||||
struct bind_st rpc_st;
|
||||
rpc_st.sockfd = sockfd;
|
||||
rpc_st.__tid = syscall(SYS_gettid);
|
||||
memcpy(&rpc_st.addr, addr, sizeof(struct sockaddr_storage));
|
||||
memcpy(&rpc_st.addrlen, &addrlen, sizeof(socklen_t));
|
||||
|
||||
return rpc_send_command(RPC_BIND, rpcfd, &rpc_st, sizeof(struct bind_st));
|
||||
return rpc_send_command(RPC_BIND, sockfd, &rpc_st, sizeof(struct bind_st));
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
----------------------------------- accept4() ----------------------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
|
||||
|
||||
/* int sockfd, struct sockaddr *addr, socklen_t *addrlen, int flags */
|
||||
int accept4(ACCEPT4_SIG)
|
||||
{
|
||||
if(realaccept4 == NULL){
|
||||
dwr(MSG_ERROR, "accept4(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"accept4(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"accept4(%d):\n", sockfd);
|
||||
@ -450,8 +362,7 @@ int accept4(ACCEPT4_SIG)
|
||||
fcntl(sockfd, F_SETFL, FD_CLOEXEC);
|
||||
if ((flags & SOCK_NONBLOCK))
|
||||
fcntl(sockfd, F_SETFL, O_NONBLOCK);
|
||||
int newfd = accept(sockfd, addr, addrlen);
|
||||
return newfd;
|
||||
return accept(sockfd, addr, addrlen);
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
@ -463,7 +374,7 @@ int accept4(ACCEPT4_SIG)
|
||||
int accept(ACCEPT_SIG)
|
||||
{
|
||||
if(realaccept == NULL){
|
||||
dwr(MSG_ERROR, "accept(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"accept(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"accept(%d):\n", sockfd);
|
||||
@ -502,39 +413,27 @@ int accept(ACCEPT_SIG)
|
||||
dwr(MSG_DEBUG,"EINVAL\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* redirect calls for standard I/O descriptors to kernel */
|
||||
if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO){
|
||||
dwr(MSG_DEBUG,"realaccept():\n");
|
||||
return(realaccept(sockfd, addr, addrlen));
|
||||
}
|
||||
|
||||
if(addr)
|
||||
addr->sa_family = AF_INET;
|
||||
/* TODO: also get address info */
|
||||
|
||||
/* The following line is required for libuv/nodejs to accept connections properly,
|
||||
however, this has the side effect of causing certain webservers to max out the CPU
|
||||
in an accept loop */
|
||||
//fcntl(sockfd, F_SETFL, SOCK_NONBLOCK);
|
||||
int new_conn_socket = get_new_fd(sockfd);
|
||||
|
||||
if(new_conn_socket > 0)
|
||||
{
|
||||
dwr(MSG_DEBUG, "accept(): RX: fd = (%d) over (%d)\n", new_conn_socket, rpcfd);
|
||||
/* Send our local-fd number back to service so it can complete its mapping table */
|
||||
dwr(MSG_DEBUG, "accept(): sending perceived fd (%d) to service.\n", new_conn_socket);
|
||||
rpc_send_command(RPC_MAP, rpcfd, &new_conn_socket, sizeof(new_conn_socket));
|
||||
dwr(MSG_DEBUG,"accept()=%d\n", new_conn_socket);
|
||||
int new_fd = get_new_fd(sockfd);
|
||||
if(new_fd > 0) {
|
||||
errno = ERR_OK;
|
||||
return new_conn_socket; /* OK */
|
||||
return new_fd;
|
||||
}
|
||||
dwr(MSG_DEBUG, "accept(): EAGAIN - Error reading signal byte from service");
|
||||
errno = EAGAIN;
|
||||
return -EAGAIN;
|
||||
}
|
||||
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
------------------------------------- listen()----------------------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
@ -543,7 +442,7 @@ int accept(ACCEPT_SIG)
|
||||
int listen(LISTEN_SIG)
|
||||
{
|
||||
if(reallisten == NULL){
|
||||
dwr(MSG_ERROR, "listen(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"listen(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"listen(%d):\n", sockfd);
|
||||
@ -565,25 +464,19 @@ int listen(LISTEN_SIG)
|
||||
errno = EOPNOTSUPP;
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* make sure we don't touch any standard outputs */
|
||||
if(sockfd == STDIN_FILENO || sockfd == STDOUT_FILENO || sockfd == STDERR_FILENO)
|
||||
return(reallisten(sockfd, backlog));
|
||||
|
||||
if(is_mapped_to_service(sockfd) < 0) {
|
||||
/* We now know this socket is not one of our socketpairs */
|
||||
int err = reallisten(sockfd, backlog);
|
||||
dwr(MSG_DEBUG,"reallisten()=%d\n", err);
|
||||
return err;
|
||||
if(!connected_to_service(sockfd)) {
|
||||
reallisten(sockfd, backlog);
|
||||
}
|
||||
|
||||
/* Assemble and send RPC */
|
||||
struct listen_st rpc_st;
|
||||
rpc_st.sockfd = sockfd;
|
||||
rpc_st.backlog = backlog;
|
||||
rpc_st.__tid = syscall(SYS_gettid);
|
||||
|
||||
return rpc_send_command(RPC_LISTEN, rpcfd, &rpc_st, sizeof(struct listen_st));
|
||||
return rpc_send_command(RPC_LISTEN, sockfd, &rpc_st, sizeof(struct listen_st));
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
@ -594,12 +487,12 @@ int listen(LISTEN_SIG)
|
||||
int clone(CLONE_SIG)
|
||||
{
|
||||
if(realclone == NULL){
|
||||
dwr(MSG_ERROR, "clone(): SYMBOL NOT FOUND.\n");
|
||||
dwr(MSG_ERROR,"clone(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"clone()\n");
|
||||
int err = realclone(fn, child_stack, flags, arg);
|
||||
init_service_connection();
|
||||
set_up_intercept();
|
||||
return err;
|
||||
}
|
||||
|
||||
@ -612,64 +505,26 @@ int close(CLOSE_SIG)
|
||||
{
|
||||
dwr(MSG_DEBUG, "close(%d)\n", fd);
|
||||
if(realclose == NULL)
|
||||
init_service_connection();
|
||||
if(fd == rpcfd)
|
||||
return -1; /* TODO: Ignore request to shut down our rpc fd, this is *almost always* safe */
|
||||
if(fd != STDIN_FILENO && fd != STDOUT_FILENO && fd != STDERR_FILENO)
|
||||
return realclose(fd);
|
||||
return -1;
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
-------------------------------------- dup2() ----------------------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
|
||||
/* int oldfd, int newfd */
|
||||
int dup2(DUP2_SIG)
|
||||
{
|
||||
if(realdup2 == NULL){
|
||||
dwr(MSG_ERROR, "dup2(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"dup2(%d, %d)\n", oldfd, newfd);
|
||||
if(oldfd == rpcfd) {
|
||||
dwr(MSG_DEBUG,"client application attempted to dup2 RPC socket (%d). This is not allowed.\n", oldfd);
|
||||
errno = EBADF;
|
||||
return -1;
|
||||
}
|
||||
return realdup2(oldfd, newfd);
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
-------------------------------------- dup3() ----------------------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
|
||||
/* int oldfd, int newfd, int flags */
|
||||
int dup3(DUP3_SIG)
|
||||
{
|
||||
if(realdup3 == NULL){
|
||||
dwr(MSG_ERROR, "dup3(): SYMBOL NOT FOUND.\n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG,"dup3(%d, %d, %d)\n", oldfd, newfd, flags);
|
||||
return realdup3(oldfd, newfd, flags);
|
||||
set_up_intercept();
|
||||
return realclose(fd);
|
||||
}
|
||||
|
||||
/*------------------------------------------------------------------------------
|
||||
-------------------------------- getsockname() ---------------------------------
|
||||
------------------------------------------------------------------------------*/
|
||||
|
||||
/* define GETSOCKNAME_SIG int sockfd, struct sockaddr *addr, socklen_t *addrlen */
|
||||
/* int sockfd, struct sockaddr *addr, socklen_t *addrlen */
|
||||
int getsockname(GETSOCKNAME_SIG)
|
||||
{
|
||||
if (realgetsockname == NULL) {
|
||||
dwr(MSG_ERROR, "getsockname(): SYMBOL NOT FOUND. \n");
|
||||
dwr(MSG_ERROR,"getsockname(): SYMBOL NOT FOUND. \n");
|
||||
return -1;
|
||||
}
|
||||
dwr(MSG_DEBUG, "getsockname(%d)\n", sockfd);
|
||||
if(!is_mapped_to_service(sockfd))
|
||||
dwr(MSG_DEBUG,"getsockname(%d)\n", sockfd);
|
||||
if(connected_to_service(sockfd) == 0) {
|
||||
dwr(MSG_DEBUG,"getsockname(): not used by service\n");
|
||||
return realgetsockname(sockfd, addr, addrlen);
|
||||
|
||||
}
|
||||
/* This is kind of a hack as it stands -- assumes sockaddr is sockaddr_in
|
||||
* and is an IPv4 address. */
|
||||
|
||||
@ -678,12 +533,15 @@ int getsockname(GETSOCKNAME_SIG)
|
||||
rpc_st.sockfd = sockfd;
|
||||
memcpy(&rpc_st.addr, addr, *addrlen);
|
||||
memcpy(&rpc_st.addrlen, &addrlen, sizeof(socklen_t));
|
||||
rpc_send_command(RPC_GETSOCKNAME, rpcfd, &rpc_st, sizeof(struct getsockname_st));
|
||||
|
||||
int rpcfd = rpc_send_command(RPC_GETSOCKNAME, sockfd, &rpc_st, sizeof(struct getsockname_st));
|
||||
/* read address info from service */
|
||||
char addrbuf[sizeof(struct sockaddr_storage)];
|
||||
memset(&addrbuf, 0, sizeof(struct sockaddr_storage));
|
||||
read(rpcfd, &addrbuf, sizeof(struct sockaddr_storage));
|
||||
|
||||
if(rpcfd > -1)
|
||||
if(read(rpcfd, &addrbuf, sizeof(struct sockaddr_storage)) > 0)
|
||||
close(rpcfd);
|
||||
|
||||
struct sockaddr_storage sock_storage;
|
||||
memcpy(&sock_storage, addrbuf, sizeof(struct sockaddr_storage));
|
||||
*addrlen = sizeof(struct sockaddr_in);
|
||||
@ -697,9 +555,7 @@ int getsockname(GETSOCKNAME_SIG)
|
||||
------------------------------------------------------------------------------*/
|
||||
|
||||
long syscall(SYSCALL_SIG){
|
||||
|
||||
//dwr(MSG_DEBUG_EXTRA,"syscall(%u, ...):\n", number);
|
||||
|
||||
dwr(MSG_DEBUG_EXTRA,"syscall(%u, ...):\n", number);
|
||||
va_list ap;
|
||||
uintptr_t a,b,c,d,e,f;
|
||||
va_start(ap, number);
|
||||
|
@ -53,4 +53,35 @@
|
||||
#define DUP2_SIG int oldfd, int newfd
|
||||
#define DUP3_SIG int oldfd, int newfd, int flags
|
||||
|
||||
void my_init(void);
|
||||
int connect(CONNECT_SIG);
|
||||
int bind(BIND_SIG);
|
||||
int accept(ACCEPT_SIG);
|
||||
int listen(LISTEN_SIG);
|
||||
int socket(SOCKET_SIG);
|
||||
int setsockopt(SETSOCKOPT_SIG);
|
||||
int getsockopt(GETSOCKOPT_SIG);
|
||||
int accept4(ACCEPT4_SIG);
|
||||
long syscall(SYSCALL_SIG);
|
||||
int close(CLOSE_SIG);
|
||||
int clone(CLONE_SIG);
|
||||
int dup2(DUP2_SIG);
|
||||
int dup3(DUP3_SIG);
|
||||
int getsockname(GETSOCKNAME_SIG);
|
||||
|
||||
static int (*realconnect)(CONNECT_SIG);
|
||||
static int (*realbind)(BIND_SIG);
|
||||
static int (*realaccept)(ACCEPT_SIG);
|
||||
static int (*reallisten)(LISTEN_SIG);
|
||||
static int (*realsocket)(SOCKET_SIG);
|
||||
static int (*realsetsockopt)(SETSOCKOPT_SIG);
|
||||
static int (*realgetsockopt)(GETSOCKOPT_SIG);
|
||||
static int (*realaccept4)(ACCEPT4_SIG);
|
||||
static long (*realsyscall)(SYSCALL_SIG);
|
||||
static int (*realclose)(CLOSE_SIG);
|
||||
static int (*realclone)(CLONE_SIG);
|
||||
static int (*realdup2)(DUP2_SIG);
|
||||
static int (*realdup3)(DUP3_SIG);
|
||||
static int (*realgetsockname)(GETSOCKNAME_SIG);
|
||||
|
||||
#endif
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -33,7 +33,9 @@
|
||||
|
||||
#include <string>
|
||||
#include <vector>
|
||||
#include <utility>
|
||||
#include <stdexcept>
|
||||
#include <stdint.h>
|
||||
|
||||
#include "../node/Constants.hpp"
|
||||
#include "../node/MulticastGroup.hpp"
|
||||
@ -110,18 +112,17 @@ private:
|
||||
static err_t nc_connected(void *arg, struct tcp_pcb *tpcb, err_t err);
|
||||
|
||||
// RPC handlers (from NetconIntercept)
|
||||
void unload_rpc(void *data, pid_t &pid, pid_t &tid, int &rpc_count, char (timestamp[20]), char &cmd, void* &payload);
|
||||
void unload_rpc(void *data, pid_t &pid, pid_t &tid,
|
||||
int &rpc_count, char (timestamp[20]), char (magic[sizeof(uint64_t)]), char &cmd, void* &payload);
|
||||
|
||||
void handle_getsockname(PhySocket *sock, void **uptr, struct getsockname_st *getsockname_rpc);
|
||||
void handle_bind(PhySocket *sock, void **uptr, struct bind_st *bind_rpc);
|
||||
void handle_listen(PhySocket *sock, void **uptr, struct listen_st *listen_rpc);
|
||||
void handle_map_request(PhySocket *sock, void **uptr, unsigned char* buf);
|
||||
void handle_retval(PhySocket *sock, void **uptr, int rpc_count, int newfd);
|
||||
void handle_getsockname(PhySocket *sock, PhySocket *rpcsock, void **uptr, struct getsockname_st *getsockname_rpc);
|
||||
void handle_bind(PhySocket *sock, PhySocket *rpcsock, void **uptr, struct bind_st *bind_rpc);
|
||||
void handle_listen(PhySocket *sock, PhySocket *rpcsock, void **uptr, struct listen_st *listen_rpc);
|
||||
TcpConnection * handle_socket(PhySocket *sock, void **uptr, struct socket_st* socket_rpc);
|
||||
void handle_connect(PhySocket *sock, void **uptr, struct connect_st* connect_rpc);
|
||||
void handle_connect(PhySocket *sock, PhySocket *rpcsock, TcpConnection *conn, struct connect_st* connect_rpc);
|
||||
void handle_write(TcpConnection *conn);
|
||||
|
||||
int send_return_value(TcpConnection *conn, int retval, int _errno);
|
||||
int send_return_value(PhySocket *sock, int retval, int _errno);
|
||||
int send_return_value(int fd, int retval, int _errno);
|
||||
|
||||
void phyOnDatagram(PhySocket *sock,void **uptr,const struct sockaddr *from,void *data,unsigned long len);
|
||||
@ -135,6 +136,9 @@ private:
|
||||
void phyOnUnixData(PhySocket *sock,void **uptr,void *data,unsigned long len);
|
||||
void phyOnFileDescriptorActivity(PhySocket *sock,void **uptr,bool readable,bool writable);
|
||||
|
||||
TcpConnection *getConnection(PhySocket *sock);
|
||||
void closeConnection(PhySocket *sock);
|
||||
|
||||
ip_addr_t convert_ip(struct sockaddr_in * addr)
|
||||
{
|
||||
ip_addr_t conn_addr;
|
||||
@ -147,23 +151,16 @@ private:
|
||||
return conn_addr;
|
||||
}
|
||||
|
||||
// Client helpers
|
||||
TcpConnection *getConnectionByTheirFD(PhySocket *sock, int fd);
|
||||
void closeConnection(TcpConnection *conn);
|
||||
void closeAll();
|
||||
void closeClient(PhySocket *sock);
|
||||
void compact_dump();
|
||||
void dump();
|
||||
void die(int exret);
|
||||
|
||||
Phy<NetconEthernetTap *> _phy;
|
||||
PhySocket *_unixListenSocket;
|
||||
|
||||
std::vector<TcpConnection*> tcp_connections;
|
||||
std::vector<PhySocket*> rpc_sockets;
|
||||
std::map<PhySocket*, pid_t> pidmap;
|
||||
pid_t rpc_counter;
|
||||
|
||||
std::map<uint64_t, std::pair<PhySocket*, void*> > jobmap;
|
||||
std::map<uint64_t, PhySocket*> sockmap;
|
||||
|
||||
pid_t rpc_counter;
|
||||
netif interface;
|
||||
|
||||
MAC _mac;
|
||||
|
114
netcon/RPC.c
114
netcon/RPC.c
@ -5,6 +5,9 @@
|
||||
#include <errno.h>
|
||||
#include <sys/syscall.h>
|
||||
|
||||
#include <fcntl.h>
|
||||
#include <stdint.h>
|
||||
|
||||
#include <sys/socket.h>
|
||||
#include <strings.h>
|
||||
#include "RPC.h"
|
||||
@ -14,18 +17,32 @@
|
||||
|
||||
static int instance_count;
|
||||
static int rpc_count;
|
||||
static pthread_mutex_t lock;
|
||||
|
||||
static pthread_mutex_t lock;
|
||||
void rpc_mutex_init() {
|
||||
if(pthread_mutex_init(&lock, NULL) != 0) {
|
||||
fprintf(stderr, "error while initializing service call mutex\n");
|
||||
}
|
||||
}
|
||||
|
||||
void rpc_mutex_destroy() {
|
||||
pthread_mutex_destroy(&lock);
|
||||
}
|
||||
|
||||
/*
|
||||
* Reads a new file descriptor from the service
|
||||
*/
|
||||
int get_new_fd(int sock)
|
||||
{
|
||||
char buf[BUF_SZ];
|
||||
int newfd;
|
||||
ssize_t size = sock_fd_read(sock, buf, sizeof(buf), &newfd);
|
||||
if(size > 0){
|
||||
return newfd;
|
||||
}
|
||||
fprintf(stderr, "get_new_fd(): Error, unable to read fd over (%d)\n", sock);
|
||||
return -1;
|
||||
}
|
||||
|
||||
/*
|
||||
* Reads a return value from the service and sets errno (if applicable)
|
||||
*/
|
||||
@ -46,21 +63,6 @@ int get_retval(int rpc_sock)
|
||||
return -1;
|
||||
}
|
||||
|
||||
/*
|
||||
* Reads a new file descriptor from the service
|
||||
*/
|
||||
int get_new_fd(int sock)
|
||||
{
|
||||
char buf[BUF_SZ];
|
||||
int newfd;
|
||||
ssize_t size = sock_fd_read(sock, buf, sizeof(buf), &newfd);
|
||||
if(size > 0){
|
||||
return newfd;
|
||||
}
|
||||
fprintf(stderr, "get_new_fd(): Error, unable to read fd over (%d)\n", sock);
|
||||
return -1;
|
||||
}
|
||||
|
||||
int rpc_join(const char * sockname)
|
||||
{
|
||||
struct sockaddr_un addr;
|
||||
@ -81,9 +83,9 @@ int rpc_join(const char * sockname)
|
||||
sleep(1);
|
||||
}
|
||||
else {
|
||||
int newfd = dup2(sock, RPC_FD-instance_count);
|
||||
close(sock);
|
||||
return newfd;
|
||||
//int newfd = dup2(sock, RPC_FD-instance_count);
|
||||
//close(sock);
|
||||
return sock;
|
||||
}
|
||||
attempts++;
|
||||
}
|
||||
@ -93,14 +95,26 @@ int rpc_join(const char * sockname)
|
||||
/*
|
||||
* Send a command to the service
|
||||
*/
|
||||
int rpc_send_command(int cmd, int rpc_sock, void *data, int len)
|
||||
int rpc_send_command(int cmd, int forfd, void *data, int len)
|
||||
{
|
||||
char cmdbuf[BUF_SZ];
|
||||
cmdbuf[0] = cmd;
|
||||
memcpy(&cmdbuf[1], data, len);
|
||||
|
||||
pthread_mutex_lock(&lock);
|
||||
char metabuf[BUF_SZ]; // portion of buffer which contains RPC metadata for debugging
|
||||
char padding[] = {0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89};
|
||||
char cmdbuf[BUF_SZ], magic[TOKEN_SIZE], metabuf[BUF_SZ];
|
||||
memcpy(magic+MAGIC_SIZE, padding, TOKEN_SIZE);
|
||||
uint64_t magic_num;
|
||||
|
||||
// ephemeral RPC socket used only for this command
|
||||
int rpc_sock = rpc_join("/root/dev/ztest/nc_e5cd7a9e1c3511dd");
|
||||
// Generate token
|
||||
int fdrand = open("/dev/urandom", O_RDONLY);
|
||||
read(fdrand, &magic, MAGIC_SIZE);
|
||||
memcpy(&magic_num, magic, MAGIC_SIZE);
|
||||
cmdbuf[CMD_ID_IDX] = cmd;
|
||||
memcpy(&cmdbuf[MAGIC_IDX], &magic_num, MAGIC_SIZE);
|
||||
memcpy(&cmdbuf[STRUCT_IDX], data, len);
|
||||
|
||||
// Format: [sig_byte] + [cmd_id] + [magic] + [meta] + [payload]
|
||||
|
||||
#ifdef VERBOSE
|
||||
/*
|
||||
#define IDX_PID 0
|
||||
@ -119,43 +133,52 @@ int rpc_send_command(int cmd, int rpc_sock, void *data, int len)
|
||||
time_t timestamp;
|
||||
timestamp = time(NULL);
|
||||
strftime(timestring, sizeof(timestring), "%H:%M:%S", localtime(×tamp));
|
||||
|
||||
metabuf[IDX_SIGNAL_BYTE] = 'R';
|
||||
|
||||
memcpy(&metabuf[IDX_PID], &pid, sizeof(pid_t) ); /* pid */
|
||||
memcpy(&metabuf[IDX_TID], &tid, sizeof(pid_t) ); /* tid */
|
||||
memcpy(&metabuf[IDX_COUNT], &rpc_count, sizeof(rpc_count) ); /* rpc_count */
|
||||
memcpy(&metabuf[IDX_TIME], ×tring, 20 ); /* timestamp */
|
||||
#endif
|
||||
/* Combine command flag+payload with RPC metadata */
|
||||
memcpy(&metabuf[IDX_PAYLOAD], cmdbuf, len);
|
||||
memcpy(&metabuf[IDX_PAYLOAD], cmdbuf, len + 1 + MAGIC_SIZE);
|
||||
|
||||
// Write RPC
|
||||
int n_write = write(rpc_sock, &metabuf, BUF_SZ);
|
||||
if(n_write < 0) {
|
||||
fprintf(stderr, "Error writing command to service (CMD = %d)\n", cmdbuf[0]);
|
||||
fprintf(stderr, "Error writing command to service (CMD = %d)\n", cmdbuf[CMD_ID_IDX]);
|
||||
errno = 0;
|
||||
}
|
||||
|
||||
// Write token to corresponding data stream
|
||||
if(n_write > 0 && forfd > -1){
|
||||
usleep(5000);
|
||||
int w = send(forfd, &magic, TOKEN_SIZE, 0);
|
||||
}
|
||||
// Process response from service
|
||||
int ret = ERR_OK;
|
||||
if(n_write > 0) {
|
||||
if(cmdbuf[0]==RPC_SOCKET) {
|
||||
ret = get_new_fd(rpc_sock);
|
||||
if(cmdbuf[CMD_ID_IDX]==RPC_SOCKET) {
|
||||
pthread_mutex_unlock(&lock);
|
||||
return rpc_sock; // Used as new socket
|
||||
}
|
||||
if(cmdbuf[0]==RPC_MAP_REQ
|
||||
|| cmdbuf[0]==RPC_CONNECT
|
||||
|| cmdbuf[0]==RPC_BIND
|
||||
|| cmdbuf[0]==RPC_LISTEN
|
||||
|| cmdbuf[0]==RPC_MAP) {
|
||||
if(cmdbuf[CMD_ID_IDX]==RPC_CONNECT
|
||||
|| cmdbuf[CMD_ID_IDX]==RPC_BIND
|
||||
|| cmdbuf[CMD_ID_IDX]==RPC_LISTEN) {
|
||||
ret = get_retval(rpc_sock);
|
||||
}
|
||||
if(cmdbuf[0]==RPC_GETSOCKNAME) {
|
||||
ret = n_write;
|
||||
if(cmdbuf[CMD_ID_IDX]==RPC_GETSOCKNAME) {
|
||||
pthread_mutex_unlock(&lock);
|
||||
return rpc_sock; // Don't close rpc here, we'll use it to read getsockopt_st
|
||||
}
|
||||
}
|
||||
else {
|
||||
else
|
||||
ret = -1;
|
||||
}
|
||||
close(rpc_sock); // We're done with this RPC socket, close it (if type-R)
|
||||
pthread_mutex_unlock(&lock);
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Send file descriptor
|
||||
*/
|
||||
@ -166,21 +189,17 @@ ssize_t sock_fd_write(int sock, int fd)
|
||||
struct iovec iov;
|
||||
char buf = '\0';
|
||||
int buflen = 1;
|
||||
|
||||
union {
|
||||
struct cmsghdr cmsghdr;
|
||||
char control[CMSG_SPACE(sizeof (int))];
|
||||
} cmsgu;
|
||||
struct cmsghdr *cmsg;
|
||||
|
||||
iov.iov_base = &buf;
|
||||
iov.iov_len = buflen;
|
||||
|
||||
msg.msg_name = NULL;
|
||||
msg.msg_namelen = 0;
|
||||
msg.msg_iov = &iov;
|
||||
msg.msg_iovlen = 1;
|
||||
|
||||
if (fd != -1) {
|
||||
msg.msg_control = cmsgu.control;
|
||||
msg.msg_controllen = sizeof(cmsgu.control);
|
||||
@ -193,13 +212,11 @@ ssize_t sock_fd_write(int sock, int fd)
|
||||
msg.msg_control = NULL;
|
||||
msg.msg_controllen = 0;
|
||||
}
|
||||
|
||||
size = sendmsg(sock, &msg, 0);
|
||||
if (size < 0)
|
||||
perror ("sendmsg");
|
||||
return size;
|
||||
}
|
||||
|
||||
/*
|
||||
* Read a file descriptor
|
||||
*/
|
||||
@ -214,10 +231,8 @@ ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd)
|
||||
char control[CMSG_SPACE(sizeof (int))];
|
||||
} cmsgu;
|
||||
struct cmsghdr *cmsg;
|
||||
|
||||
iov.iov_base = buf;
|
||||
iov.iov_len = bufsize;
|
||||
|
||||
msg.msg_name = NULL;
|
||||
msg.msg_namelen = 0;
|
||||
msg.msg_iov = &iov;
|
||||
@ -239,7 +254,6 @@ ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd)
|
||||
fprintf (stderr, "invalid cmsg_type %d\n",cmsg->cmsg_type);
|
||||
return -1;
|
||||
}
|
||||
|
||||
*fd = *((int *) CMSG_DATA(cmsg));
|
||||
} else *fd = -1;
|
||||
} else {
|
||||
|
34
netcon/RPC.h
34
netcon/RPC.h
@ -1,12 +1,25 @@
|
||||
#ifndef __RPCLIB_H_
|
||||
#define __RPCLIB_H_
|
||||
|
||||
#define IDX_PID 0
|
||||
#define IDX_TID sizeof(pid_t)
|
||||
#include <stdint.h>
|
||||
|
||||
#define MAGIC_SIZE sizeof(uint64_t)
|
||||
#define MAGIC_PADDING_SIZE 12
|
||||
#define TOKEN_SIZE MAGIC_SIZE+MAGIC_PADDING_SIZE
|
||||
|
||||
// 1st section
|
||||
#define IDX_SIGNAL_BYTE 0
|
||||
#define IDX_PID 1
|
||||
#define IDX_TID sizeof(pid_t) + 1
|
||||
#define IDX_COUNT IDX_TID + sizeof(pid_t)
|
||||
#define IDX_TIME IDX_COUNT + sizeof(int)
|
||||
#define IDX_PAYLOAD IDX_TIME + 20 /* 20 being the length of the timestamp string */
|
||||
|
||||
// 2nd section
|
||||
#define CMD_ID_IDX 0
|
||||
#define MAGIC_IDX 1
|
||||
#define STRUCT_IDX MAGIC_IDX+MAGIC_SIZE
|
||||
|
||||
#define BUF_SZ 256
|
||||
#define PAYLOAD_SZ 223 /* BUF_SZ-IDX_PAYLOAD */
|
||||
|
||||
@ -37,17 +50,18 @@
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
int get_retval(int);
|
||||
|
||||
int rpc_join(const char * sockname);
|
||||
int rpc_send_command(int cmd, int forfd, void *data, int len);
|
||||
|
||||
int get_new_fd(int sock);
|
||||
ssize_t sock_fd_write(int sock, int fd);
|
||||
ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd);
|
||||
|
||||
void rpc_mutex_destroy();
|
||||
void rpc_mutex_init();
|
||||
|
||||
int get_retval(int);
|
||||
int get_new_fd(int);
|
||||
|
||||
int rpc_join(const char * sockname);
|
||||
int rpc_send_command(int cmd, int rpc_sock, void *data, int len);
|
||||
|
||||
ssize_t sock_fd_write(int sock, int fd);
|
||||
ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd);
|
||||
|
||||
/* Structures used for sending commands via RPC mechanism */
|
||||
|
||||
|
@ -42,7 +42,7 @@
|
||||
#ifndef _COMMON_H
|
||||
#define _COMMON_H 1
|
||||
|
||||
#define DEBUG_LEVEL 0
|
||||
#define DEBUG_LEVEL 3
|
||||
|
||||
#define MSG_WARNING 4
|
||||
#define MSG_ERROR 1 // Errors
|
||||
|
0
netcon/docker-test/e5cd7a9e1c3511dd.conf
Normal file
0
netcon/docker-test/e5cd7a9e1c3511dd.conf
Normal file
@ -309,7 +309,7 @@ public:
|
||||
if ((long)fd > _nfds)
|
||||
_nfds = (long)fd;
|
||||
FD_SET(fd,&_readfds);
|
||||
sws.type = ZT_PHY_SOCKET_FD;
|
||||
sws.type = ZT_PHY_SOCKET_UNIX_IN; /* TODO: Type was changed to allow for CBs with new RPC model */
|
||||
sws.sock = fd;
|
||||
sws.uptr = uptr;
|
||||
memset(&(sws.saddr),0,sizeof(struct sockaddr_storage));
|
||||
|
Loading…
x
Reference in New Issue
Block a user