mirror of
https://github.com/servalproject/serval-dna.git
synced 2024-12-24 15:26:43 +00:00
2252fdcaa7
OUT()s or where return() is used instead of RETURN(). Added OUT() to end of all functions using IN() that lacked it to make it easier to statically analyse this invariant. Fixed several return instead of RETURNs detected through use of this tool. #49
1020 lines
33 KiB
C
1020 lines
33 KiB
C
/*
|
|
Serval Distributed Numbering Architecture (DNA)
|
|
Copyright (C) 2010 Paul Gardner-Stephen
|
|
|
|
This program is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU General Public License
|
|
as published by the Free Software Foundation; either version 2
|
|
of the License, or (at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
*/
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <assert.h>
|
|
#include <time.h>
|
|
#include <fnmatch.h>
|
|
#include "serval.h"
|
|
#include "conf.h"
|
|
#include "strbuf.h"
|
|
#include "strbuf_helpers.h"
|
|
#include "overlay_buffer.h"
|
|
#include "overlay_packet.h"
|
|
#include "str.h"
|
|
|
|
#ifdef HAVE_IFADDRS_H
|
|
#include <ifaddrs.h>
|
|
#endif
|
|
|
|
int overlay_ready=0;
|
|
int overlay_interface_count=0;
|
|
overlay_interface overlay_interfaces[OVERLAY_MAX_INTERFACES];
|
|
int overlay_last_interface_number=-1;
|
|
|
|
struct profile_total interface_poll_stats;
|
|
|
|
struct sched_ent sock_any;
|
|
struct sockaddr_in sock_any_addr;
|
|
struct profile_total sock_any_stats;
|
|
|
|
static void overlay_interface_poll(struct sched_ent *alarm);
|
|
static void logServalPacket(int level, struct __sourceloc __whence, const char *message, const unsigned char *packet, size_t len);
|
|
static int re_init_socket(int interface_index);
|
|
|
|
#define DEBUG_packet_visualise(M,P,N) logServalPacket(LOG_LEVEL_DEBUG, __WHENCE__, (M), (P), (N))
|
|
|
|
static int mark_subscriber_down(struct subscriber *subscriber, void *context)
|
|
{
|
|
overlay_interface *interface=context;
|
|
if ((subscriber->reachable & REACHABLE_DIRECT) && subscriber->interface == interface)
|
|
set_reachable(subscriber, REACHABLE_NONE);
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
overlay_interface_close(overlay_interface *interface){
|
|
enum_subscribers(NULL, mark_subscriber_down, interface);
|
|
INFOF("Interface %s addr %s is down", interface->name, inet_ntoa(interface->broadcast_address.sin_addr));
|
|
unschedule(&interface->alarm);
|
|
unwatch(&interface->alarm);
|
|
close(interface->alarm.poll.fd);
|
|
interface->alarm.poll.fd=-1;
|
|
interface->state=INTERFACE_STATE_DOWN;
|
|
}
|
|
|
|
// create a socket with options common to all our UDP sockets
|
|
static int
|
|
overlay_bind_socket(const struct sockaddr *addr, size_t addr_size, char *interface_name){
|
|
int fd;
|
|
int reuseP = 1;
|
|
int broadcastP = 1;
|
|
|
|
fd = socket(PF_INET,SOCK_DGRAM,0);
|
|
if (fd < 0) {
|
|
WHY_perror("Error creating socket");
|
|
return -1;
|
|
}
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuseP, sizeof(reuseP)) < 0) {
|
|
WHY_perror("setsockopt(SO_REUSEADR)");
|
|
goto error;
|
|
}
|
|
|
|
#ifdef SO_REUSEPORT
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEPORT, &reuseP, sizeof(reuseP)) < 0) {
|
|
WHY_perror("setsockopt(SO_REUSEPORT)");
|
|
goto error;
|
|
}
|
|
#endif
|
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_BROADCAST, &broadcastP, sizeof(broadcastP)) < 0) {
|
|
WHY_perror("setsockopt(SO_BROADCAST)");
|
|
goto error;
|
|
}
|
|
|
|
/* Automatically close socket on calls to exec().
|
|
This makes life easier when we restart with an exec after receiving
|
|
a bad signal. */
|
|
fcntl(fd, F_SETFL, fcntl(fd, F_GETFL, NULL) |
|
|
#ifdef FD_CLOEXEC
|
|
FD_CLOEXEC
|
|
#else
|
|
O_CLOEXEC
|
|
#endif
|
|
);
|
|
|
|
#ifdef SO_BINDTODEVICE
|
|
/*
|
|
Limit incoming and outgoing packets to this interface, no matter what the routing table says.
|
|
This should allow for a device with multiple interfaces on the same subnet.
|
|
Don't abort if this fails, I believe it requires root, just log it.
|
|
*/
|
|
if (interface_name && setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, interface_name, strlen(interface_name)+1) < 0) {
|
|
WHY_perror("setsockopt(SO_BINDTODEVICE)");
|
|
}
|
|
#endif
|
|
|
|
if (bind(fd, addr, addr_size)) {
|
|
WHY_perror("Bind failed");
|
|
goto error;
|
|
}
|
|
|
|
return fd;
|
|
|
|
error:
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
overlay_interface * overlay_interface_get_default(){
|
|
int i;
|
|
for (i=0;i<OVERLAY_MAX_INTERFACES;i++){
|
|
if (overlay_interfaces[i].state==INTERFACE_STATE_UP && overlay_interfaces[i].default_route)
|
|
return &overlay_interfaces[i];
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
overlay_interface * overlay_interface_find(struct in_addr addr, int return_default){
|
|
int i;
|
|
overlay_interface *ret = NULL;
|
|
for (i=0;i<OVERLAY_MAX_INTERFACES;i++){
|
|
if (overlay_interfaces[i].state!=INTERFACE_STATE_UP)
|
|
continue;
|
|
|
|
if ((overlay_interfaces[i].netmask.s_addr & addr.s_addr) == (overlay_interfaces[i].netmask.s_addr & overlay_interfaces[i].address.sin_addr.s_addr)){
|
|
return &overlay_interfaces[i];
|
|
}
|
|
|
|
// check if this is a default interface
|
|
if (return_default && overlay_interfaces[i].default_route)
|
|
ret=&overlay_interfaces[i];
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
overlay_interface * overlay_interface_find_name(const char *name){
|
|
int i;
|
|
for (i=0;i<OVERLAY_MAX_INTERFACES;i++){
|
|
if (overlay_interfaces[i].state!=INTERFACE_STATE_UP)
|
|
continue;
|
|
if (strcasecmp(name, overlay_interfaces[i].name) == 0)
|
|
return &overlay_interfaces[i];
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
// OSX doesn't recieve broadcast packets on sockets bound to an interface's address
|
|
// So we have to bind a socket to INADDR_ANY to receive these packets.
|
|
static void
|
|
overlay_interface_read_any(struct sched_ent *alarm){
|
|
if (alarm->poll.revents & POLLIN) {
|
|
int plen=0;
|
|
int recvttl=1;
|
|
unsigned char packet[16384];
|
|
overlay_interface *interface=NULL;
|
|
struct sockaddr src_addr;
|
|
socklen_t addrlen = sizeof(src_addr);
|
|
|
|
/* Read only one UDP packet per call to share resources more fairly, and also
|
|
enable stats to accurately count packets received */
|
|
plen = recvwithttl(alarm->poll.fd, packet, sizeof(packet), &recvttl, &src_addr, &addrlen);
|
|
if (plen == -1) {
|
|
WHY_perror("recvwithttl(c)");
|
|
unwatch(alarm);
|
|
close(alarm->poll.fd);
|
|
return;
|
|
}
|
|
|
|
struct in_addr src = ((struct sockaddr_in *)&src_addr)->sin_addr;
|
|
|
|
/* Try to identify the real interface that the packet arrived on */
|
|
interface = overlay_interface_find(src, 0);
|
|
|
|
/* Drop the packet if we don't find a match */
|
|
if (!interface){
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Could not find matching interface for packet received from %s", inet_ntoa(src));
|
|
return;
|
|
}
|
|
|
|
/* We have a frame from this interface */
|
|
if (config.debug.packetrx)
|
|
DEBUG_packet_visualise("Read from real interface", packet,plen);
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Received %d bytes from %s on interface %s (ANY)",plen,
|
|
inet_ntoa(src),
|
|
interface->name);
|
|
|
|
if (packetOkOverlay(interface, packet, plen, recvttl, &src_addr, addrlen)) {
|
|
if (config.debug.rejecteddata) {
|
|
WHYF("Malformed packet (length = %d)",plen);
|
|
dump("the malformed packet",packet,plen);
|
|
}
|
|
}
|
|
}
|
|
if (alarm->poll.revents & (POLLHUP | POLLERR)) {
|
|
INFO("Closing broadcast socket due to error");
|
|
unwatch(alarm);
|
|
close(alarm->poll.fd);
|
|
alarm->poll.fd=-1;
|
|
}
|
|
}
|
|
|
|
// bind a socket to INADDR_ANY:port
|
|
// for now, we don't have a graceful close for this interface but it should go away when the process dies
|
|
static int overlay_interface_init_any(int port)
|
|
{
|
|
struct sockaddr_in addr;
|
|
|
|
if (sock_any.poll.fd>0){
|
|
// Check the port number matches
|
|
if (sock_any_addr.sin_port != htons(port))
|
|
return WHYF("Unable to listen to broadcast packets for ports %d & %d", port, ntohs(sock_any_addr.sin_port));
|
|
|
|
return 0;
|
|
}
|
|
addr.sin_family = AF_INET;
|
|
addr.sin_port = htons(port);
|
|
addr.sin_addr.s_addr = INADDR_ANY;
|
|
|
|
sock_any.poll.fd = overlay_bind_socket((const struct sockaddr *)&addr, sizeof(addr), NULL);
|
|
if (sock_any.poll.fd<0)
|
|
return -1;
|
|
|
|
sock_any_addr = addr;
|
|
|
|
sock_any.poll.events=POLLIN;
|
|
sock_any.function = overlay_interface_read_any;
|
|
|
|
sock_any_stats.name="overlay_interface_read_any";
|
|
sock_any.stats=&sock_any_stats;
|
|
watch(&sock_any);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
overlay_interface_init_socket(int interface_index)
|
|
{
|
|
overlay_interface *const interface = &overlay_interfaces[interface_index];
|
|
|
|
/*
|
|
On linux you can bind to the broadcast address to receive broadcast packets per interface [or subnet],
|
|
but then you can't receive unicast packets on the same socket.
|
|
|
|
On osx, you can only receive broadcast packets if you bind to INADDR_ANY.
|
|
|
|
So the most portable way to do this is to bind to each interface's IP address for sending broadcasts
|
|
and receiving unicasts, and bind a separate socket to INADDR_ANY just for receiving broadcast packets.
|
|
|
|
Sending packets from INADDR_ANY would probably work, but gives us less control over which interfaces are sending packets.
|
|
But there may be some platforms that need some other combination for everything to work.
|
|
*/
|
|
|
|
overlay_interface_init_any(interface->port);
|
|
|
|
const struct sockaddr *addr = (const struct sockaddr *)&interface->address;
|
|
|
|
interface->alarm.poll.fd = overlay_bind_socket(addr, sizeof(interface->broadcast_address), interface->name);
|
|
if (interface->alarm.poll.fd<0){
|
|
interface->state=INTERFACE_STATE_DOWN;
|
|
return WHYF("Failed to bind interface %s", interface->name);
|
|
}
|
|
|
|
if (config.debug.packetrx || config.debug.io) {
|
|
char srctxt[INET_ADDRSTRLEN];
|
|
if (inet_ntop(AF_INET, (const void *)&interface->broadcast_address.sin_addr, srctxt, INET_ADDRSTRLEN))
|
|
DEBUGF("Bound to %s:%d", srctxt, ntohs(interface->broadcast_address.sin_port));
|
|
}
|
|
|
|
interface->alarm.poll.events=POLLIN;
|
|
watch(&interface->alarm);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int re_init_socket(int interface_index){
|
|
if (overlay_interface_init_socket(interface_index))
|
|
return -1;
|
|
overlay_interface *interface = &overlay_interfaces[interface_index];
|
|
// schedule the first tick asap
|
|
interface->alarm.alarm=gettime_ms();
|
|
interface->alarm.deadline=interface->alarm.alarm;
|
|
schedule(&interface->alarm);
|
|
interface->state=INTERFACE_STATE_UP;
|
|
INFOF("Interface %s addr %s:%d, is up",interface->name,
|
|
inet_ntoa(interface->address.sin_addr), ntohs(interface->address.sin_port));
|
|
|
|
directory_registration();
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
overlay_interface_init(const char *name, struct in_addr src_addr, struct in_addr netmask, struct in_addr broadcast,
|
|
const struct config_network_interface *ifconfig)
|
|
{
|
|
/* Too many interfaces */
|
|
if (overlay_interface_count>=OVERLAY_MAX_INTERFACES) return WHY("Too many interfaces -- Increase OVERLAY_MAX_INTERFACES");
|
|
|
|
overlay_interface *const interface = &overlay_interfaces[overlay_interface_count];
|
|
|
|
strncpy(interface->name, name, sizeof interface->name);
|
|
|
|
// copy ifconfig values
|
|
interface->drop_broadcasts = ifconfig->drop_broadcasts;
|
|
interface->drop_unicasts = ifconfig->drop_unicasts;
|
|
interface->port = ifconfig->port;
|
|
interface->type = ifconfig->type;
|
|
interface->send_broadcasts = ifconfig->send_broadcasts;
|
|
interface->prefer_unicast = ifconfig->prefer_unicast;
|
|
interface->default_route = ifconfig->default_route;
|
|
interface->socket_type = ifconfig->socket_type;
|
|
interface->encapsulation = ifconfig->encapsulation;
|
|
|
|
/* Pick a reasonable default MTU.
|
|
This will ultimately get tuned by the bandwidth and other properties of the interface */
|
|
interface->mtu=1200;
|
|
interface->state=INTERFACE_STATE_DOWN;
|
|
interface->last_tick_ms= -1; // not ticked yet
|
|
interface->alarm.poll.fd=0;
|
|
|
|
// How often do we announce ourselves on this interface?
|
|
int tick_ms=-1;
|
|
int packet_interval=-1;
|
|
|
|
// hard coded defaults:
|
|
switch (ifconfig->type) {
|
|
case OVERLAY_INTERFACE_PACKETRADIO:
|
|
tick_ms = 15000;
|
|
packet_interval = 1000;
|
|
break;
|
|
case OVERLAY_INTERFACE_ETHERNET:
|
|
tick_ms = 500;
|
|
packet_interval = 100;
|
|
break;
|
|
case OVERLAY_INTERFACE_WIFI:
|
|
tick_ms = 500;
|
|
packet_interval = 400;
|
|
break;
|
|
case OVERLAY_INTERFACE_UNKNOWN:
|
|
tick_ms = 500;
|
|
packet_interval = 100;
|
|
break;
|
|
}
|
|
// configurable defaults per interface
|
|
{
|
|
int i = config_mdp_iftypelist__get(&config.mdp.iftype, &ifconfig->type);
|
|
if (i != -1){
|
|
if (config.mdp.iftype.av[i].value.tick_ms>=0)
|
|
tick_ms = config.mdp.iftype.av[i].value.tick_ms;
|
|
if (config.mdp.iftype.av[i].value.packet_interval>=0)
|
|
packet_interval=config.mdp.iftype.av[i].value.packet_interval;
|
|
}
|
|
}
|
|
// specific value for this interface
|
|
if (ifconfig->mdp_tick_ms>=0)
|
|
tick_ms = ifconfig->mdp_tick_ms;
|
|
if (ifconfig->packet_interval>=0)
|
|
packet_interval=ifconfig->packet_interval;
|
|
|
|
if (packet_interval<0)
|
|
return WHYF("Invalid packet interval %d specified for interface %s", packet_interval, name);
|
|
if (packet_interval==0){
|
|
INFOF("Interface %s is not sending any traffic!", name);
|
|
tick_ms=0;
|
|
}else if (!interface->send_broadcasts){
|
|
INFOF("Interface %s is not sending any broadcast traffic!", name);
|
|
// no broadcast traffic implies no ticks
|
|
tick_ms=0;
|
|
}else if (tick_ms==0)
|
|
INFOF("Interface %s is running tickless", name);
|
|
|
|
if (tick_ms<0)
|
|
return WHYF("Invalid tick interval %d specified for interface %s", interface->tick_ms, name);
|
|
|
|
interface->tick_ms = tick_ms;
|
|
|
|
limit_init(&interface->transfer_limit, packet_interval);
|
|
|
|
interface->address.sin_family=AF_INET;
|
|
interface->address.sin_port = htons(ifconfig->port);
|
|
interface->address.sin_addr = ifconfig->dummy_address;
|
|
|
|
interface->netmask=ifconfig->dummy_netmask;
|
|
|
|
interface->broadcast_address.sin_family=AF_INET;
|
|
interface->broadcast_address.sin_port = htons(ifconfig->port);
|
|
interface->broadcast_address.sin_addr.s_addr = interface->address.sin_addr.s_addr | ~interface->netmask.s_addr;
|
|
|
|
interface->alarm.function = overlay_interface_poll;
|
|
interface_poll_stats.name="overlay_interface_poll";
|
|
interface->alarm.stats=&interface_poll_stats;
|
|
|
|
if (ifconfig->socket_type==SOCK_DGRAM){
|
|
interface->address.sin_addr = src_addr;
|
|
interface->broadcast_address.sin_addr = broadcast;
|
|
interface->netmask = netmask;
|
|
|
|
if (overlay_interface_init_socket(overlay_interface_count))
|
|
return WHY("overlay_interface_init_socket() failed");
|
|
}else{
|
|
char read_file[1024];
|
|
|
|
strbuf d = strbuf_local(read_file, sizeof read_file);
|
|
strbuf_path_join(d, serval_instancepath(), config.server.interface_path, ifconfig->file, NULL);
|
|
if (strbuf_overrun(d)){
|
|
WHYF("interface file name overrun: %s", alloca_str_toprint(strbuf_str(d)));
|
|
goto cleanup;
|
|
}
|
|
|
|
if ((interface->alarm.poll.fd = open(read_file,O_APPEND|O_RDWR)) < 1) {
|
|
WHYF_perror("could not open interface file %s", read_file);
|
|
goto cleanup;
|
|
}
|
|
|
|
if (ifconfig->type==OVERLAY_INTERFACE_PACKETRADIO)
|
|
overlay_packetradio_setup_port(interface);
|
|
|
|
if (ifconfig->socket_type==SOCK_STREAM){
|
|
interface->slip_decode_state.dst_offset=0;
|
|
// The encapsulation type should be configurable,
|
|
// but for now default to the one that should be safe on the RFD900
|
|
// radios, and that also allows us to receive RSSI reports inline
|
|
interface->slip_decode_state.encapsulator=SLIP_FORMAT_UPPER7;
|
|
interface->alarm.poll.events=POLLIN;
|
|
watch(&interface->alarm);
|
|
}else if(ifconfig->socket_type==SOCK_FILE){
|
|
/* Seek to end of file as initial reading point */
|
|
interface->recv_offset = lseek(interface->alarm.poll.fd,0,SEEK_END);
|
|
}
|
|
}
|
|
|
|
// schedule the first tick asap
|
|
interface->alarm.alarm=gettime_ms();
|
|
interface->alarm.deadline=interface->alarm.alarm;
|
|
schedule(&interface->alarm);
|
|
interface->state=INTERFACE_STATE_UP;
|
|
INFOF("Interface %s addr %s:%d, is up",interface->name,
|
|
inet_ntoa(interface->address.sin_addr), ntohs(interface->address.sin_port));
|
|
|
|
directory_registration();
|
|
|
|
INFOF("Allowing a maximum of %d packets every %lldms", interface->transfer_limit.burst_size, interface->transfer_limit.burst_length);
|
|
|
|
overlay_interface_count++;
|
|
return 0;
|
|
|
|
cleanup:
|
|
if (interface->alarm.poll.fd>=0){
|
|
unwatch(&interface->alarm);
|
|
close(interface->alarm.poll.fd);
|
|
interface->alarm.poll.fd=-1;
|
|
}
|
|
interface->state=INTERFACE_STATE_DOWN;
|
|
return -1;
|
|
}
|
|
|
|
static void interface_read_dgram(struct overlay_interface *interface){
|
|
int plen=0;
|
|
unsigned char packet[8096];
|
|
|
|
struct sockaddr src_addr;
|
|
socklen_t addrlen = sizeof(src_addr);
|
|
|
|
|
|
/* Read only one UDP packet per call to share resources more fairly, and also
|
|
enable stats to accurately count packets received */
|
|
int recvttl=1;
|
|
plen = recvwithttl(interface->alarm.poll.fd,packet, sizeof(packet), &recvttl, &src_addr, &addrlen);
|
|
if (plen == -1) {
|
|
WHY_perror("recvwithttl(c)");
|
|
overlay_interface_close(interface);
|
|
return;
|
|
}
|
|
|
|
/* We have a frame from this interface */
|
|
if (config.debug.packetrx)
|
|
DEBUG_packet_visualise("Read from real interface", packet,plen);
|
|
if (config.debug.overlayinterfaces) {
|
|
struct in_addr src = ((struct sockaddr_in *)&src_addr)->sin_addr; // avoid strict-alias warning on Solaris (gcc 4.4)
|
|
DEBUGF("Received %d bytes from %s on interface %s",plen,
|
|
inet_ntoa(src),
|
|
interface->name);
|
|
}
|
|
if (packetOkOverlay(interface, packet, plen, recvttl, &src_addr, addrlen)) {
|
|
if (config.debug.rejecteddata) {
|
|
WHYF("Malformed packet (length = %d)",plen);
|
|
dump("the malformed packet",packet,plen);
|
|
}
|
|
}
|
|
}
|
|
|
|
struct file_packet{
|
|
struct sockaddr_in src_addr;
|
|
struct sockaddr_in dst_addr;
|
|
int pid;
|
|
int payload_length;
|
|
|
|
/* TODO ? ;
|
|
half-power beam height (uint16)
|
|
half-power beam width (uint16)
|
|
range in metres, centre beam (uint32)
|
|
latitude (uint32)
|
|
longitude (uint32)
|
|
X/Z direction (uint16)
|
|
Y direction (uint16)
|
|
speed in metres per second (uint16)
|
|
TX frequency in Hz, uncorrected for doppler (which must be done at the receiving end to take into account
|
|
relative motion)
|
|
coding method (use for doppler response etc) null terminated string
|
|
*/
|
|
|
|
unsigned char payload[1400];
|
|
};
|
|
|
|
static void interface_read_file(struct overlay_interface *interface)
|
|
{
|
|
IN();
|
|
/* Grab packets, unpackage and dispatch frames to consumers */
|
|
struct file_packet packet;
|
|
time_ms_t now = gettime_ms();
|
|
|
|
/* Read from interface file */
|
|
long long length=lseek(interface->alarm.poll.fd,0,SEEK_END);
|
|
|
|
int new_packets = (length - interface->recv_offset) / sizeof packet;
|
|
if (new_packets > 20)
|
|
WARNF("Getting behind, there are %d unread packets", new_packets);
|
|
|
|
if (interface->recv_offset<length){
|
|
if (lseek(interface->alarm.poll.fd,interface->recv_offset,SEEK_SET) == -1){
|
|
WHY_perror("lseek");
|
|
OUT();
|
|
return;
|
|
}
|
|
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Read interface %s (size=%lld) at offset=%d",interface->name, length, interface->recv_offset);
|
|
|
|
ssize_t nread = read(interface->alarm.poll.fd, &packet, sizeof packet);
|
|
if (nread == -1){
|
|
WHY_perror("read");
|
|
OUT();
|
|
return;
|
|
}
|
|
|
|
if (nread == sizeof packet) {
|
|
interface->recv_offset += nread;
|
|
|
|
if (config.debug.packetrx)
|
|
DEBUG_packet_visualise("Read from dummy interface", packet.payload, packet.payload_length);
|
|
|
|
if (((!interface->drop_unicasts) && memcmp(&packet.dst_addr, &interface->address, sizeof(packet.dst_addr))==0) ||
|
|
((!interface->drop_broadcasts) &&
|
|
memcmp(&packet.dst_addr, &interface->broadcast_address, sizeof(packet.dst_addr))==0)){
|
|
|
|
if (packetOkOverlay(interface, packet.payload, packet.payload_length, -1,
|
|
(struct sockaddr*)&packet.src_addr, sizeof(packet.src_addr))<0) {
|
|
if (config.debug.rejecteddata) {
|
|
WARN("Unsupported packet from dummy interface");
|
|
WHYF("Malformed packet (length = %d)",packet.payload_length);
|
|
dump("the malformed packet",packet.payload,packet.payload_length);
|
|
}
|
|
}
|
|
}else if (config.debug.packetrx)
|
|
DEBUGF("Ignoring packet addressed to %s:%d", inet_ntoa(packet.dst_addr.sin_addr), ntohs(packet.dst_addr.sin_port));
|
|
}
|
|
}
|
|
|
|
/* if there's no input, while we want to check for more soon,
|
|
we need to allow all other low priority alarms to fire first,
|
|
otherwise we'll dominate the scheduler without accomplishing anything */
|
|
if (interface->recv_offset>=length){
|
|
if (interface->alarm.alarm == -1 || now + 5 < interface->alarm.alarm){
|
|
interface->alarm.alarm = now + 5;
|
|
interface->alarm.deadline = interface->alarm.alarm + 10000;
|
|
}
|
|
}else{
|
|
/* keep reading new packets as fast as possible,
|
|
but don't completely prevent other high priority alarms */
|
|
if (interface->alarm.alarm == -1 || now < interface->alarm.alarm){
|
|
interface->alarm.alarm = now;
|
|
interface->alarm.deadline = interface->alarm.alarm + 10000;
|
|
}
|
|
}
|
|
OUT();
|
|
}
|
|
|
|
static void interface_read_stream(struct overlay_interface *interface){
|
|
IN();
|
|
unsigned char buffer[OVERLAY_INTERFACE_RX_BUFFER_SIZE];
|
|
ssize_t nread = read(interface->alarm.poll.fd, buffer, OVERLAY_INTERFACE_RX_BUFFER_SIZE);
|
|
if (nread == -1){
|
|
WHY_perror("read");
|
|
OUT();
|
|
return;
|
|
}
|
|
|
|
struct slip_decode_state *state=&interface->slip_decode_state;
|
|
|
|
if (config.debug.slip) {
|
|
dump("RX bytes",&state->src[state->src_offset],
|
|
state->src_size-state->src_offset);
|
|
}
|
|
|
|
state->src=buffer;
|
|
state->src_size=nread;
|
|
state->src_offset=0;
|
|
|
|
while (state->src_offset < state->src_size) {
|
|
int ret = slip_decode(state);
|
|
if (ret==1){
|
|
if (packetOkOverlay(interface, state->dst, state->packet_length, -1, NULL, -1)) {
|
|
if (config.debug.rejecteddata) {
|
|
WHYF("Malformed packet (length = %d)",state->packet_length);
|
|
dump("the malformed packet",state->dst,state->packet_length);
|
|
}
|
|
}
|
|
state->dst_offset=0;
|
|
}
|
|
}
|
|
OUT();
|
|
}
|
|
|
|
static void write_stream_buffer(overlay_interface *interface){
|
|
if (interface->tx_bytes_pending>0) {
|
|
int written=write(interface->alarm.poll.fd,interface->txbuffer,
|
|
interface->tx_bytes_pending);
|
|
if (config.debug.packetradio) DEBUGF("Trying to write %d bytes",
|
|
interface->tx_bytes_pending);
|
|
if (written>0) {
|
|
interface->tx_bytes_pending-=written;
|
|
bcopy(&interface->txbuffer[written],&interface->txbuffer[0],
|
|
interface->tx_bytes_pending);
|
|
if (config.debug.packetradio) DEBUGF("Wrote %d bytes (%d left pending)",
|
|
written,interface->tx_bytes_pending);
|
|
} else {
|
|
if (config.debug.packetradio) DEBUGF("Failed to write any data");
|
|
}
|
|
}
|
|
|
|
if (interface->tx_bytes_pending>0) {
|
|
// more to write, so keep POLLOUT flag
|
|
interface->alarm.poll.events|=POLLOUT;
|
|
} else {
|
|
// nothing more to write, so clear POLLOUT flag
|
|
interface->alarm.poll.events&=~POLLOUT;
|
|
// try to empty another packet from the queue ASAP
|
|
overlay_queue_schedule_next(gettime_ms());
|
|
}
|
|
watch(&interface->alarm);
|
|
}
|
|
|
|
|
|
static void overlay_interface_poll(struct sched_ent *alarm)
|
|
{
|
|
struct overlay_interface *interface = (overlay_interface *)alarm;
|
|
|
|
if (alarm->poll.revents==0){
|
|
time_ms_t now = gettime_ms();
|
|
|
|
if (interface->state==INTERFACE_STATE_UP && interface->tick_ms>0 && now >= interface->last_tick_ms+interface->tick_ms){
|
|
// tick the interface
|
|
overlay_route_queue_advertisements(interface);
|
|
interface->last_tick_ms=now;
|
|
alarm->alarm=interface->last_tick_ms+interface->tick_ms;
|
|
}else{
|
|
alarm->alarm=-1;
|
|
}
|
|
alarm->deadline=alarm->alarm+interface->tick_ms/2;
|
|
|
|
switch(interface->socket_type){
|
|
case SOCK_DGRAM:
|
|
case SOCK_STREAM:
|
|
break;
|
|
case SOCK_FILE:
|
|
interface_read_file(interface);
|
|
break;
|
|
}
|
|
if (alarm->alarm!=-1) {
|
|
schedule(alarm);
|
|
}
|
|
}
|
|
|
|
if (alarm->poll.revents & POLLOUT){
|
|
switch(interface->socket_type){
|
|
case SOCK_STREAM:
|
|
write_stream_buffer(interface);
|
|
break;
|
|
case SOCK_DGRAM:
|
|
case SOCK_FILE:
|
|
//XXX error? fatal?
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (alarm->poll.revents & POLLIN) {
|
|
switch(interface->socket_type){
|
|
case SOCK_DGRAM:
|
|
interface_read_dgram(interface);
|
|
break;
|
|
case SOCK_STREAM:
|
|
interface_read_stream(interface);
|
|
break;
|
|
case SOCK_FILE:
|
|
interface_read_file(interface);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (alarm->poll.revents & (POLLHUP | POLLERR)) {
|
|
overlay_interface_close(interface);
|
|
}
|
|
}
|
|
|
|
int
|
|
overlay_broadcast_ensemble(overlay_interface *interface,
|
|
struct sockaddr_in *recipientaddr,
|
|
unsigned char *bytes,int len)
|
|
{
|
|
if (config.debug.packettx)
|
|
{
|
|
DEBUGF("Sending this packet via interface %s (len=%d)",interface->name,len);
|
|
DEBUG_packet_visualise(NULL,bytes,len);
|
|
}
|
|
|
|
if (interface->state!=INTERFACE_STATE_UP){
|
|
return WHYF("Cannot send to interface %s as it is down", interface->name);
|
|
}
|
|
|
|
switch(interface->socket_type){
|
|
case SOCK_STREAM:
|
|
{
|
|
if (interface->tx_bytes_pending>0)
|
|
return WHYF("Cannot send two packets to a stream at the same time");
|
|
|
|
/* Encode packet with SLIP escaping.
|
|
XXX - Add error correction here also */
|
|
unsigned char *buffer = interface->txbuffer;
|
|
int out_len=0;
|
|
|
|
int encoded = slip_encode(SLIP_FORMAT_UPPER7,
|
|
bytes, len, buffer+out_len, sizeof(interface->txbuffer) - out_len);
|
|
if (encoded < 0)
|
|
return WHY("Buffer overflow");
|
|
|
|
if (config.debug.slip)
|
|
{
|
|
// Test decoding of the packet we send
|
|
struct slip_decode_state state;
|
|
state.encapsulator=SLIP_FORMAT_UPPER7;
|
|
state.src_size=encoded;
|
|
state.src_offset=0;
|
|
state.src=buffer+out_len;
|
|
slip_decode(&state);
|
|
}
|
|
|
|
out_len+=encoded;
|
|
|
|
interface->tx_bytes_pending=out_len;
|
|
write_stream_buffer(interface);
|
|
|
|
return 0;
|
|
}
|
|
|
|
case SOCK_FILE:
|
|
{
|
|
struct file_packet packet={
|
|
.src_addr = interface->address,
|
|
.dst_addr = *recipientaddr,
|
|
.pid = getpid(),
|
|
};
|
|
|
|
if (len > sizeof(packet.payload)){
|
|
WARN("Truncating long packet to fit within MTU byte limit for dummy interface");
|
|
len = sizeof(packet.payload);
|
|
}
|
|
packet.payload_length=len;
|
|
bcopy(bytes, packet.payload, len);
|
|
/* This lseek() is unneccessary because the dummy file is opened in O_APPEND mode. It's
|
|
only purpose is to find out the offset to print in the DEBUG statement. It is vulnerable
|
|
to a race condition with other processes appending to the same file. */
|
|
off_t fsize = lseek(interface->alarm.poll.fd, (off_t) 0, SEEK_END);
|
|
/* Don't complain if the seek fails because we are writing to a pipe or device that does
|
|
not support seeking. */
|
|
if (errno!=ESPIPE) {
|
|
if (fsize == -1)
|
|
return WHY_perror("lseek");
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Write to interface %s at offset=%d", interface->name, fsize);
|
|
}
|
|
ssize_t nwrite = write(interface->alarm.poll.fd, &packet, sizeof(packet));
|
|
if (nwrite == -1)
|
|
return WHY_perror("write");
|
|
if (nwrite != sizeof(packet))
|
|
return WHYF("only wrote %lld of %lld bytes", nwrite, sizeof(packet));
|
|
return 0;
|
|
}
|
|
|
|
case SOCK_DGRAM:
|
|
{
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Sending %d byte overlay frame on %s to %s",len,interface->name,inet_ntoa(recipientaddr->sin_addr));
|
|
if(sendto(interface->alarm.poll.fd,
|
|
bytes, len, 0, (struct sockaddr *)recipientaddr, sizeof(struct sockaddr_in)) != len){
|
|
int e=errno;
|
|
WHY_perror("sendto(c)");
|
|
// only close the interface on some kinds of errors
|
|
if (e==ENETDOWN || e==EINVAL)
|
|
overlay_interface_close(interface);
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
default:
|
|
return WHY("Unsupported socket type");
|
|
}
|
|
}
|
|
|
|
/* Register the real interface, or update the existing interface registration. */
|
|
int
|
|
overlay_interface_register(char *name,
|
|
struct in_addr addr,
|
|
struct in_addr mask)
|
|
{
|
|
struct in_addr broadcast = {.s_addr = addr.s_addr | ~mask.s_addr};
|
|
|
|
if (config.debug.overlayinterfaces) {
|
|
// note, inet_ntop doesn't seem to behave on android
|
|
DEBUGF("%s address: %s", name, inet_ntoa(addr));
|
|
DEBUGF("%s broadcast address: %s", name, inet_ntoa(broadcast));
|
|
}
|
|
|
|
// Find the matching non-dummy interface rule.
|
|
const struct config_network_interface *ifconfig = NULL;
|
|
int i;
|
|
for (i = 0; i < config.interfaces.ac; ++i, ifconfig = NULL) {
|
|
ifconfig = &config.interfaces.av[i].value;
|
|
if (ifconfig->socket_type==SOCK_DGRAM) {
|
|
int j;
|
|
for (j = 0; j < ifconfig->match.patc; ++j){
|
|
if (fnmatch(ifconfig->match.patv[j], name, 0) == 0)
|
|
break;
|
|
}
|
|
|
|
if (j < ifconfig->match.patc)
|
|
break;
|
|
}
|
|
}
|
|
if (ifconfig == NULL) {
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Interface %s does not match any rule", name);
|
|
return 0;
|
|
}
|
|
if (ifconfig->exclude) {
|
|
if (config.debug.overlayinterfaces)
|
|
DEBUGF("Interface %s is explicitly excluded", name);
|
|
return 0;
|
|
}
|
|
|
|
/* Search in the exist list of interfaces */
|
|
int found_interface= -1;
|
|
for(i = 0; i < overlay_interface_count; i++){
|
|
int broadcast_match = 0;
|
|
int name_match =0;
|
|
|
|
if (overlay_interfaces[i].broadcast_address.sin_addr.s_addr == broadcast.s_addr)
|
|
broadcast_match = 1;
|
|
|
|
name_match = !strcasecmp(overlay_interfaces[i].name, name);
|
|
|
|
// if we find an exact match we can stop searching
|
|
if (name_match && broadcast_match){
|
|
// mark this interface as still alive
|
|
if (overlay_interfaces[i].state==INTERFACE_STATE_DETECTING)
|
|
overlay_interfaces[i].state=INTERFACE_STATE_UP;
|
|
|
|
// try to bring the interface back up again even if the address has changed
|
|
if (overlay_interfaces[i].state==INTERFACE_STATE_DOWN){
|
|
overlay_interfaces[i].address.sin_addr = addr;
|
|
re_init_socket(i);
|
|
}
|
|
|
|
// we already know about this interface, and it's up so stop looking immediately
|
|
return 0;
|
|
}
|
|
|
|
// remember this slot to bring the interface back up again, even if the address has changed
|
|
if (name_match && overlay_interfaces[i].state==INTERFACE_STATE_DOWN)
|
|
found_interface=i;
|
|
}
|
|
|
|
if (found_interface>=0){
|
|
// try to reactivate the existing interface
|
|
overlay_interfaces[found_interface].address.sin_addr = addr;
|
|
overlay_interfaces[found_interface].broadcast_address.sin_addr = broadcast;
|
|
overlay_interfaces[found_interface].netmask = mask;
|
|
return re_init_socket(found_interface);
|
|
}
|
|
|
|
/* New interface, so register it */
|
|
if (overlay_interface_init(name, addr, mask, broadcast, ifconfig))
|
|
return WHYF("Could not initialise newly seen interface %s", name);
|
|
else
|
|
if (config.debug.overlayinterfaces) DEBUGF("Registered interface %s", name);
|
|
|
|
return 0;
|
|
}
|
|
|
|
void overlay_interface_discover(struct sched_ent *alarm)
|
|
{
|
|
/* Mark all UP interfaces as DETECTING, so we can tell which interfaces are new, and which are dead */
|
|
int i;
|
|
for (i = 0; i < overlay_interface_count; i++)
|
|
if (overlay_interfaces[i].state==INTERFACE_STATE_UP)
|
|
overlay_interfaces[i].state=INTERFACE_STATE_DETECTING;
|
|
|
|
/* Register new dummy interfaces */
|
|
int detect_real_interfaces = 0;
|
|
const struct config_network_interface *ifconfig = NULL;
|
|
for (i = 0; i < config.interfaces.ac; ++i, ifconfig = NULL) {
|
|
ifconfig = &config.interfaces.av[i].value;
|
|
if (ifconfig->socket_type==SOCK_DGRAM) {
|
|
detect_real_interfaces = 1;
|
|
continue;
|
|
}
|
|
int j;
|
|
for (j = 0; j < overlay_interface_count; j++){
|
|
if (overlay_interfaces[i].socket_type == ifconfig->socket_type &&
|
|
strcasecmp(overlay_interfaces[j].name, ifconfig->file) == 0 &&
|
|
overlay_interfaces[j].state==INTERFACE_STATE_DETECTING){
|
|
overlay_interfaces[j].state=INTERFACE_STATE_UP;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (j >= overlay_interface_count) {
|
|
// New dummy interface, so register it.
|
|
struct in_addr dummyaddr = hton_in_addr(INADDR_NONE);
|
|
overlay_interface_init(ifconfig->file, dummyaddr, dummyaddr, dummyaddr, ifconfig);
|
|
}
|
|
}
|
|
|
|
// Register new real interfaces
|
|
if (detect_real_interfaces) {
|
|
int no_route = 1;
|
|
#ifdef HAVE_IFADDRS_H
|
|
if (no_route != 0)
|
|
no_route = doifaddrs();
|
|
#endif
|
|
#ifdef SIOCGIFCONF
|
|
if (no_route != 0)
|
|
no_route = lsif();
|
|
#endif
|
|
#ifdef linux
|
|
if (no_route != 0)
|
|
no_route = scrapeProcNetRoute();
|
|
#endif
|
|
if (no_route != 0) {
|
|
FATAL("Unable to get any interface information");
|
|
}
|
|
}
|
|
|
|
// Close any interfaces that have gone away.
|
|
for(i = 0; i < overlay_interface_count; i++)
|
|
if (overlay_interfaces[i].state==INTERFACE_STATE_DETECTING)
|
|
overlay_interface_close(&overlay_interfaces[i]);
|
|
|
|
alarm->alarm = gettime_ms()+5000;
|
|
alarm->deadline = alarm->alarm + 10000;
|
|
schedule(alarm);
|
|
return;
|
|
}
|
|
|
|
static void
|
|
logServalPacket(int level, struct __sourceloc __whence, const char *message, const unsigned char *packet, size_t len) {
|
|
struct mallocbuf mb = STRUCT_MALLOCBUF_NULL;
|
|
if (!message) message="<no message>";
|
|
if (serval_packetvisualise(XPRINTF_MALLOCBUF(&mb), message, packet, len) == -1)
|
|
WHY("serval_packetvisualise() failed");
|
|
else if (mb.buffer == NULL)
|
|
WHYF("serval_packetvisualise() output buffer missing, message=%s packet=%p len=%lu", alloca_toprint(-1, message, strlen(message)), packet, len);
|
|
else
|
|
logString(level, __whence, mb.buffer);
|
|
if (mb.buffer)
|
|
free(mb.buffer);
|
|
}
|