RPC.c 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281
  1. #include <stdio.h>
  2. #include <unistd.h>
  3. #include <sys/un.h>
  4. #include <pthread.h>
  5. #include <errno.h>
  6. #include <sys/syscall.h>
  7. #include <fcntl.h>
  8. #include <dlfcn.h>
  9. #include <stdint.h>
  10. #include <sys/socket.h>
  11. #include <strings.h>
  12. #include "RPC.h"
  13. #define SERVICE_CONNECT_ATTEMPTS 30
  14. #define CONNECT_SIG int __fd, const struct sockaddr * __addr, socklen_t __len
  15. #define SOCKET_SIG int socket_family, int socket_type, int protocol
  16. static int (*realconnect)(CONNECT_SIG) = 0;
  17. static int (*realsocket)(SOCKET_SIG) = 0;
  18. #ifdef NETCON_INTERCEPT
  19. static int rpc_count;
  20. #endif
  21. static pthread_mutex_t lock;
  22. void rpc_mutex_init() {
  23. if(pthread_mutex_init(&lock, NULL) != 0) {
  24. fprintf(stderr, "error while initializing service call mutex\n");
  25. }
  26. }
  27. void rpc_mutex_destroy() {
  28. pthread_mutex_destroy(&lock);
  29. }
  30. /*
  31. * Reads a new file descriptor from the service
  32. */
  33. int get_new_fd(int sock)
  34. {
  35. char buf[BUF_SZ];
  36. int newfd;
  37. ssize_t size = sock_fd_read(sock, buf, sizeof(buf), &newfd);
  38. if(size > 0){
  39. return newfd;
  40. }
  41. fprintf(stderr, "get_new_fd(): Error, unable to read fd over (%d)\n", sock);
  42. return -1;
  43. }
  44. /*
  45. * Reads a return value from the service and sets errno (if applicable)
  46. */
  47. int get_retval(int rpc_sock)
  48. {
  49. if(rpc_sock >= 0) {
  50. int retval;
  51. int sz = sizeof(char) + sizeof(retval) + sizeof(errno);
  52. char retbuf[BUF_SZ];
  53. memset(&retbuf, 0, sz);
  54. int n_read = read(rpc_sock, &retbuf, sz);
  55. if(n_read > 0) {
  56. memcpy(&retval, &retbuf[1], sizeof(retval));
  57. memcpy(&errno, &retbuf[1+sizeof(retval)], sizeof(errno));
  58. return retval;
  59. }
  60. }
  61. return -1;
  62. }
  63. int load_symbols_rpc()
  64. {
  65. #ifdef NETCON_INTERCEPT
  66. realsocket = dlsym(RTLD_NEXT, "socket");
  67. realconnect = dlsym(RTLD_NEXT, "connect");
  68. if(!realconnect || !realsocket)
  69. return -1;
  70. #endif
  71. return 1;
  72. }
  73. int rpc_join(const char * sockname)
  74. {
  75. if(!load_symbols_rpc())
  76. return -1;
  77. struct sockaddr_un addr;
  78. int conn_err = -1, attempts = 0;
  79. memset(&addr, 0, sizeof(addr));
  80. addr.sun_family = AF_UNIX;
  81. strncpy(addr.sun_path, sockname, sizeof(addr.sun_path)-1);
  82. int sock;
  83. if((sock = realsocket(AF_UNIX, SOCK_STREAM, 0)) < 0){
  84. fprintf(stderr, "Error while creating RPC socket\n");
  85. return -1;
  86. }
  87. while((conn_err != 0) && (attempts < SERVICE_CONNECT_ATTEMPTS)){
  88. if((conn_err = realconnect(sock, (struct sockaddr*)&addr, sizeof(addr))) != 0) {
  89. fprintf(stderr, "Error while connecting to RPC socket. Re-attempting...\n");
  90. sleep(1);
  91. }
  92. else
  93. return sock;
  94. attempts++;
  95. }
  96. return -1;
  97. }
  98. /*
  99. * Send a command to the service
  100. */
  101. int rpc_send_command(char *path, int cmd, int forfd, void *data, int len)
  102. {
  103. pthread_mutex_lock(&lock);
  104. char c, padding[] = {0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89};
  105. char cmdbuf[BUF_SZ], CANARY[TOKEN_SIZE], metabuf[BUF_SZ];
  106. memcpy(CANARY+CANARY_SIZE, padding, sizeof(padding));
  107. uint64_t canary_num;
  108. // ephemeral RPC socket used only for this command
  109. int rpc_sock = rpc_join(path);
  110. // Generate token
  111. int fdrand = open("/dev/urandom", O_RDONLY);
  112. if(read(fdrand, &CANARY, CANARY_SIZE) < 0) {
  113. fprintf(stderr,"unable to read from /dev/urandom for RPC canary data\n");
  114. return -1;
  115. }
  116. memcpy(&canary_num, CANARY, CANARY_SIZE);
  117. cmdbuf[CMD_ID_IDX] = cmd;
  118. memcpy(&cmdbuf[CANARY_IDX], &canary_num, CANARY_SIZE);
  119. memcpy(&cmdbuf[STRUCT_IDX], data, len);
  120. #ifdef VERBOSE
  121. memset(metabuf, 0, BUF_SZ);
  122. pid_t pid = syscall(SYS_getpid);
  123. pid_t tid = syscall(SYS_gettid);
  124. rpc_count++;
  125. char timestring[20];
  126. time_t timestamp;
  127. timestamp = time(NULL);
  128. strftime(timestring, sizeof(timestring), "%H:%M:%S", localtime(&timestamp));
  129. memcpy(metabuf, RPC_PHRASE, RPC_PHRASE_SIZE); // Write signal phrase
  130. memcpy(&metabuf[IDX_PID], &pid, sizeof(pid_t) ); /* pid */
  131. memcpy(&metabuf[IDX_TID], &tid, sizeof(pid_t) ); /* tid */
  132. memcpy(&metabuf[IDX_COUNT], &rpc_count, sizeof(rpc_count) ); /* rpc_count */
  133. memcpy(&metabuf[IDX_TIME], &timestring, 20 ); /* timestamp */
  134. #endif
  135. /* Combine command flag+payload with RPC metadata */
  136. memcpy(&metabuf[IDX_PAYLOAD], cmdbuf, len + 1 + CANARY_SIZE);
  137. // Write RPC
  138. int n_write = write(rpc_sock, &metabuf, BUF_SZ);
  139. if(n_write < 0) {
  140. fprintf(stderr, "Error writing command to service (CMD = %d)\n", cmdbuf[CMD_ID_IDX]);
  141. errno = 0;
  142. }
  143. // Write token to corresponding data stream
  144. if(read(rpc_sock, &c, 1) < 0) {
  145. fprintf(stderr, "unable to read RPC ACK byte from service.\n");
  146. return -1;
  147. }
  148. if(c == 'z' && n_write > 0 && forfd > -1){
  149. if(send(forfd, &CANARY, TOKEN_SIZE, 0) < 0) {
  150. fprintf(stderr,"unable to write canary to stream\n");
  151. return -1;
  152. }
  153. }
  154. // Process response from service
  155. int ret = ERR_OK;
  156. if(n_write > 0) {
  157. if(cmdbuf[CMD_ID_IDX]==RPC_SOCKET) {
  158. pthread_mutex_unlock(&lock);
  159. return rpc_sock; // Used as new socket
  160. }
  161. if(cmdbuf[CMD_ID_IDX]==RPC_CONNECT
  162. || cmdbuf[CMD_ID_IDX]==RPC_BIND
  163. || cmdbuf[CMD_ID_IDX]==RPC_LISTEN) {
  164. ret = get_retval(rpc_sock);
  165. }
  166. if(cmdbuf[CMD_ID_IDX]==RPC_GETSOCKNAME) {
  167. pthread_mutex_unlock(&lock);
  168. return rpc_sock; // Don't close rpc here, we'll use it to read getsockopt_st
  169. }
  170. }
  171. else
  172. ret = -1;
  173. close(rpc_sock); // We're done with this RPC socket, close it (if type-R)
  174. pthread_mutex_unlock(&lock);
  175. return ret;
  176. }
  177. /*
  178. * Send file descriptor
  179. */
  180. ssize_t sock_fd_write(int sock, int fd)
  181. {
  182. ssize_t size;
  183. struct msghdr msg;
  184. struct iovec iov;
  185. char buf = '\0';
  186. int buflen = 1;
  187. union {
  188. struct cmsghdr cmsghdr;
  189. char control[CMSG_SPACE(sizeof (int))];
  190. } cmsgu;
  191. struct cmsghdr *cmsg;
  192. iov.iov_base = &buf;
  193. iov.iov_len = buflen;
  194. msg.msg_name = NULL;
  195. msg.msg_namelen = 0;
  196. msg.msg_iov = &iov;
  197. msg.msg_iovlen = 1;
  198. if (fd != -1) {
  199. msg.msg_control = cmsgu.control;
  200. msg.msg_controllen = sizeof(cmsgu.control);
  201. cmsg = CMSG_FIRSTHDR(&msg);
  202. cmsg->cmsg_len = CMSG_LEN(sizeof (int));
  203. cmsg->cmsg_level = SOL_SOCKET;
  204. cmsg->cmsg_type = SCM_RIGHTS;
  205. *((int *) CMSG_DATA(cmsg)) = fd;
  206. } else {
  207. msg.msg_control = NULL;
  208. msg.msg_controllen = 0;
  209. }
  210. size = sendmsg(sock, &msg, 0);
  211. if (size < 0)
  212. perror ("sendmsg");
  213. return size;
  214. }
  215. /*
  216. * Read a file descriptor
  217. */
  218. ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd)
  219. {
  220. ssize_t size;
  221. if (fd) {
  222. struct msghdr msg;
  223. struct iovec iov;
  224. union {
  225. struct cmsghdr cmsghdr;
  226. char control[CMSG_SPACE(sizeof (int))];
  227. } cmsgu;
  228. struct cmsghdr *cmsg;
  229. iov.iov_base = buf;
  230. iov.iov_len = bufsize;
  231. msg.msg_name = NULL;
  232. msg.msg_namelen = 0;
  233. msg.msg_iov = &iov;
  234. msg.msg_iovlen = 1;
  235. msg.msg_control = cmsgu.control;
  236. msg.msg_controllen = sizeof(cmsgu.control);
  237. size = recvmsg (sock, &msg, 0);
  238. if (size < 0) {
  239. fprintf(stderr, "sock_fd_read(): recvmsg: Error\n");
  240. return -1;
  241. }
  242. cmsg = CMSG_FIRSTHDR(&msg);
  243. if (cmsg && cmsg->cmsg_len == CMSG_LEN(sizeof(int))) {
  244. if (cmsg->cmsg_level != SOL_SOCKET) {
  245. fprintf (stderr, "invalid cmsg_level %d\n",cmsg->cmsg_level);
  246. return -1;
  247. }
  248. if (cmsg->cmsg_type != SCM_RIGHTS) {
  249. fprintf (stderr, "invalid cmsg_type %d\n",cmsg->cmsg_type);
  250. return -1;
  251. }
  252. *fd = *((int *) CMSG_DATA(cmsg));
  253. } else *fd = -1;
  254. } else {
  255. size = read (sock, buf, bufsize);
  256. if (size < 0) {
  257. fprintf(stderr, "sock_fd_read(): read: Error\n");
  258. return -1;
  259. }
  260. }
  261. return size;
  262. }