mirror of
https://github.com/zerotier/ZeroTierOne.git
synced 2024-12-19 13:07:55 +00:00
284 lines
7.3 KiB
C
284 lines
7.3 KiB
C
#include <stdio.h>
|
|
#include <unistd.h>
|
|
#include <sys/un.h>
|
|
#include <pthread.h>
|
|
#include <errno.h>
|
|
|
|
#if defined(__linux__)
|
|
#include <sys/syscall.h>
|
|
#endif
|
|
|
|
#include <fcntl.h>
|
|
#include <dlfcn.h>
|
|
#include <stdint.h>
|
|
|
|
#include <sys/socket.h>
|
|
#include <strings.h>
|
|
#include "RPC.h"
|
|
|
|
#define SERVICE_CONNECT_ATTEMPTS 30
|
|
|
|
#define CONNECT_SIG int __fd, const struct sockaddr * __addr, socklen_t __len
|
|
#define SOCKET_SIG int socket_family, int socket_type, int protocol
|
|
|
|
static int (*realconnect)(CONNECT_SIG) = 0;
|
|
static int (*realsocket)(SOCKET_SIG) = 0;
|
|
|
|
#ifdef NETCON_INTERCEPT
|
|
static int rpc_count;
|
|
#endif
|
|
|
|
static pthread_mutex_t lock;
|
|
void rpc_mutex_init() {
|
|
if(pthread_mutex_init(&lock, NULL) != 0) {
|
|
fprintf(stderr, "error while initializing service call mutex\n");
|
|
}
|
|
}
|
|
void rpc_mutex_destroy() {
|
|
pthread_mutex_destroy(&lock);
|
|
}
|
|
|
|
/*
|
|
* Reads a new file descriptor from the service
|
|
*/
|
|
int get_new_fd(int sock)
|
|
{
|
|
char buf[BUF_SZ];
|
|
int newfd;
|
|
ssize_t size = sock_fd_read(sock, buf, sizeof(buf), &newfd);
|
|
if(size > 0)
|
|
return newfd;
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* Reads a return value from the service and sets errno (if applicable)
|
|
*/
|
|
int get_retval(int rpc_sock)
|
|
{
|
|
if(rpc_sock >= 0) {
|
|
int retval;
|
|
int sz = sizeof(char) + sizeof(retval) + sizeof(errno);
|
|
char retbuf[BUF_SZ];
|
|
memset(&retbuf, 0, sz);
|
|
int n_read = read(rpc_sock, &retbuf, sz);
|
|
if(n_read > 0) {
|
|
memcpy(&retval, &retbuf[1], sizeof(retval));
|
|
memcpy(&errno, &retbuf[1+sizeof(retval)], sizeof(errno));
|
|
return retval;
|
|
}
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
int load_symbols_rpc()
|
|
{
|
|
#ifdef NETCON_INTERCEPT
|
|
realsocket = dlsym(RTLD_NEXT, "socket");
|
|
realconnect = dlsym(RTLD_NEXT, "connect");
|
|
if(!realconnect || !realsocket)
|
|
return -1;
|
|
#endif
|
|
return 1;
|
|
}
|
|
|
|
int rpc_join(const char * sockname)
|
|
{
|
|
if(!load_symbols_rpc())
|
|
return -1;
|
|
|
|
struct sockaddr_un addr;
|
|
int conn_err = -1, attempts = 0;
|
|
memset(&addr, 0, sizeof(addr));
|
|
addr.sun_family = AF_UNIX;
|
|
strncpy(addr.sun_path, sockname, sizeof(addr.sun_path)-1);
|
|
|
|
int sock;
|
|
if((sock = realsocket(AF_UNIX, SOCK_STREAM, 0)) < 0){
|
|
fprintf(stderr, "Error while creating RPC socket\n");
|
|
return -1;
|
|
}
|
|
while((conn_err != 0) && (attempts < SERVICE_CONNECT_ATTEMPTS)){
|
|
if((conn_err = realconnect(sock, (struct sockaddr*)&addr, sizeof(addr))) != 0) {
|
|
fprintf(stderr, "Error while connecting to RPC socket. Re-attempting...\n");
|
|
sleep(1);
|
|
}
|
|
else
|
|
return sock;
|
|
attempts++;
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* Send a command to the service
|
|
*/
|
|
int rpc_send_command(char *path, int cmd, int forfd, void *data, int len)
|
|
{
|
|
pthread_mutex_lock(&lock);
|
|
char c, padding[] = {PADDING};
|
|
char cmdbuf[BUF_SZ], CANARY[CANARY_SZ+PADDING_SZ], metabuf[BUF_SZ];
|
|
memcpy(CANARY+CANARY_SZ, padding, sizeof(padding));
|
|
uint64_t canary_num;
|
|
// ephemeral RPC socket used only for this command
|
|
int rpc_sock = rpc_join(path);
|
|
// Generate token
|
|
int fdrand = open("/dev/urandom", O_RDONLY);
|
|
|
|
if(read(fdrand, &CANARY, CANARY_SZ) < 0) {
|
|
fprintf(stderr,"unable to read from /dev/urandom for RPC canary data\n");
|
|
return -1;
|
|
}
|
|
memcpy(&canary_num, CANARY, CANARY_SZ);
|
|
cmdbuf[CMD_ID_IDX] = cmd;
|
|
memcpy(&cmdbuf[CANARY_IDX], &canary_num, CANARY_SZ);
|
|
memcpy(&cmdbuf[STRUCT_IDX], data, len);
|
|
|
|
#if defined(VERBOSE)
|
|
rpc_count++;
|
|
memset(metabuf, 0, BUF_SZ);
|
|
#if defined(__linux__)
|
|
pid_t pid = syscall(SYS_getpid);
|
|
pid_t tid = syscall(SYS_gettid);
|
|
#endif
|
|
char timestring[20];
|
|
time_t timestamp;
|
|
timestamp = time(NULL);
|
|
strftime(timestring, sizeof(timestring), "%H:%M:%S", localtime(×tamp));
|
|
memcpy(metabuf, RPC_PHRASE, RPC_PHRASE_SZ); // Write signal phrase
|
|
#if defined(__linux__)
|
|
memcpy(&metabuf[IDX_PID], &pid, sizeof(pid_t) ); /* pid */
|
|
memcpy(&metabuf[IDX_TID], &tid, sizeof(pid_t) ); /* tid */
|
|
#endif
|
|
memcpy(&metabuf[IDX_COUNT], &rpc_count, sizeof(rpc_count) ); /* rpc_count */
|
|
memcpy(&metabuf[IDX_TIME], ×tring, 20 ); /* timestamp */
|
|
#endif
|
|
/* Combine command flag+payload with RPC metadata */
|
|
memcpy(&metabuf[IDX_PAYLOAD], cmdbuf, len + 1 + CANARY_SZ);
|
|
|
|
// Write RPC
|
|
int n_write = write(rpc_sock, &metabuf, BUF_SZ);
|
|
if(n_write < 0) {
|
|
fprintf(stderr, "Error writing command to service (CMD = %d)\n", cmdbuf[CMD_ID_IDX]);
|
|
errno = 0;
|
|
}
|
|
// Write token to corresponding data stream
|
|
if(read(rpc_sock, &c, 1) < 0) {
|
|
fprintf(stderr, "unable to read RPC ACK byte from service.\n");
|
|
return -1;
|
|
}
|
|
if(c == 'z' && n_write > 0 && forfd > -1){
|
|
if(send(forfd, &CANARY, CANARY_SZ+PADDING_SZ, 0) < 0) {
|
|
fprintf(stderr,"unable to write canary to stream\n");
|
|
return -1;
|
|
}
|
|
}
|
|
// Process response from service
|
|
int ret = ERR_OK;
|
|
if(n_write > 0) {
|
|
if(cmdbuf[CMD_ID_IDX]==RPC_SOCKET) {
|
|
pthread_mutex_unlock(&lock);
|
|
return rpc_sock; // Used as new socket
|
|
}
|
|
if(cmdbuf[CMD_ID_IDX]==RPC_CONNECT
|
|
|| cmdbuf[CMD_ID_IDX]==RPC_BIND
|
|
|| cmdbuf[CMD_ID_IDX]==RPC_LISTEN) {
|
|
ret = get_retval(rpc_sock);
|
|
}
|
|
if(cmdbuf[CMD_ID_IDX]==RPC_GETSOCKNAME) {
|
|
pthread_mutex_unlock(&lock);
|
|
return rpc_sock; // Don't close rpc here, we'll use it to read getsockopt_st
|
|
}
|
|
}
|
|
else
|
|
ret = -1;
|
|
close(rpc_sock); // We're done with this RPC socket, close it (if type-R)
|
|
pthread_mutex_unlock(&lock);
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Send file descriptor
|
|
*/
|
|
ssize_t sock_fd_write(int sock, int fd)
|
|
{
|
|
ssize_t size;
|
|
struct msghdr msg;
|
|
struct iovec iov;
|
|
char buf = '\0';
|
|
int buflen = 1;
|
|
union {
|
|
struct cmsghdr cmsghdr;
|
|
char control[CMSG_SPACE(sizeof (int))];
|
|
} cmsgu;
|
|
struct cmsghdr *cmsg;
|
|
iov.iov_base = &buf;
|
|
iov.iov_len = buflen;
|
|
msg.msg_name = NULL;
|
|
msg.msg_namelen = 0;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
if (fd != -1) {
|
|
msg.msg_control = cmsgu.control;
|
|
msg.msg_controllen = sizeof(cmsgu.control);
|
|
cmsg = CMSG_FIRSTHDR(&msg);
|
|
cmsg->cmsg_len = CMSG_LEN(sizeof (int));
|
|
cmsg->cmsg_level = SOL_SOCKET;
|
|
cmsg->cmsg_type = SCM_RIGHTS;
|
|
*((int *) CMSG_DATA(cmsg)) = fd;
|
|
} else {
|
|
msg.msg_control = NULL;
|
|
msg.msg_controllen = 0;
|
|
}
|
|
size = sendmsg(sock, &msg, 0);
|
|
if (size < 0)
|
|
perror ("sendmsg");
|
|
return size;
|
|
}
|
|
/*
|
|
* Read a file descriptor
|
|
*/
|
|
ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd)
|
|
{
|
|
ssize_t size;
|
|
if (fd) {
|
|
struct msghdr msg;
|
|
struct iovec iov;
|
|
union {
|
|
struct cmsghdr cmsghdr;
|
|
char control[CMSG_SPACE(sizeof (int))];
|
|
} cmsgu;
|
|
struct cmsghdr *cmsg;
|
|
iov.iov_base = buf;
|
|
iov.iov_len = bufsize;
|
|
msg.msg_name = NULL;
|
|
msg.msg_namelen = 0;
|
|
msg.msg_iov = &iov;
|
|
msg.msg_iovlen = 1;
|
|
msg.msg_control = cmsgu.control;
|
|
msg.msg_controllen = sizeof(cmsgu.control);
|
|
size = recvmsg (sock, &msg, 0);
|
|
if (size < 0)
|
|
return -1;
|
|
cmsg = CMSG_FIRSTHDR(&msg);
|
|
if (cmsg && cmsg->cmsg_len == CMSG_LEN(sizeof(int))) {
|
|
if (cmsg->cmsg_level != SOL_SOCKET) {
|
|
fprintf (stderr, "invalid cmsg_level %d\n",cmsg->cmsg_level);
|
|
return -1;
|
|
}
|
|
if (cmsg->cmsg_type != SCM_RIGHTS) {
|
|
fprintf (stderr, "invalid cmsg_type %d\n",cmsg->cmsg_type);
|
|
return -1;
|
|
}
|
|
*fd = *((int *) CMSG_DATA(cmsg));
|
|
} else *fd = -1;
|
|
} else {
|
|
size = read (sock, buf, bufsize);
|
|
if (size < 0) {
|
|
fprintf(stderr, "sock_fd_read(): read: Error\n");
|
|
return -1;
|
|
}
|
|
}
|
|
return size;
|
|
}
|