| 1 |
30 |
unneback |
/*
|
| 2 |
|
|
**************************************************************************
|
| 3 |
|
|
*
|
| 4 |
|
|
* Component: RDBG
|
| 5 |
|
|
* Module: servtsp.c
|
| 6 |
|
|
*
|
| 7 |
|
|
* Synopsis: Transport management for remote debug server.
|
| 8 |
|
|
*
|
| 9 |
|
|
* $Id: servtsp.c,v 1.2 2001-09-27 12:02:01 chris Exp $
|
| 10 |
|
|
*
|
| 11 |
|
|
**************************************************************************
|
| 12 |
|
|
*/
|
| 13 |
|
|
|
| 14 |
|
|
#include <sys/errno.h>
|
| 15 |
|
|
#include <rdbg/rdbg.h>
|
| 16 |
|
|
#include <rdbg/servrpc.h>
|
| 17 |
|
|
#include <signal.h>
|
| 18 |
|
|
#include <rpc/rpc.h>
|
| 19 |
|
|
#include <rpc/svc.h>
|
| 20 |
|
|
#include <netinet/in.h>
|
| 21 |
|
|
#include <sys/socket.h>
|
| 22 |
|
|
|
| 23 |
|
|
static int out_sock;
|
| 24 |
|
|
static int warm_test;
|
| 25 |
|
|
|
| 26 |
|
|
static void TimeTestHandler();
|
| 27 |
|
|
|
| 28 |
|
|
/*
|
| 29 |
|
|
* TspInit - Initialize the transport system.
|
| 30 |
|
|
*
|
| 31 |
|
|
*/
|
| 32 |
|
|
|
| 33 |
|
|
void
|
| 34 |
|
|
TspInit (int id)
|
| 35 |
|
|
{
|
| 36 |
|
|
struct sigaction sa;
|
| 37 |
|
|
|
| 38 |
|
|
/* setup a socket to send event messages back through */
|
| 39 |
|
|
out_sock = socket (PF_INET, SOCK_DGRAM, 0);
|
| 40 |
|
|
if (out_sock < 0) {
|
| 41 |
|
|
DPRINTF (("TspInit: socket() failed %d errno %d\n",
|
| 42 |
|
|
out_sock, getErrno()));
|
| 43 |
|
|
return; /* failed to open socket, let caller deal with */
|
| 44 |
|
|
}
|
| 45 |
|
|
{
|
| 46 |
|
|
struct sockaddr_in addr;
|
| 47 |
|
|
|
| 48 |
|
|
bzero ((void *)(&addr), sizeof addr);
|
| 49 |
|
|
addr.sin_family = AF_INET;
|
| 50 |
|
|
addr.sin_port = htons (BackPort);
|
| 51 |
|
|
if (bind (out_sock, (struct sockaddr*) &addr, sizeof addr) < 0) {
|
| 52 |
|
|
DPRINTF (("TspInit: bind() failed\n"));
|
| 53 |
|
|
}
|
| 54 |
|
|
}
|
| 55 |
|
|
/* setup alarm timer for warm testing */
|
| 56 |
|
|
memset (&sa, 0, sizeof (sa));
|
| 57 |
|
|
sa.sa_handler = TimeTestHandler;
|
| 58 |
|
|
sigaction (SIGALRM, &sa, 0);
|
| 59 |
|
|
}
|
| 60 |
|
|
|
| 61 |
|
|
/*
|
| 62 |
|
|
* TspTranslateRpcAddr - translate from an RPC handle to an
|
| 63 |
|
|
* opaque address.
|
| 64 |
|
|
*
|
| 65 |
|
|
* Converts the sender's address into the opaque data structure
|
| 66 |
|
|
* used for network addresses. This is used to look up the sender
|
| 67 |
|
|
* on each call.
|
| 68 |
|
|
*/
|
| 69 |
|
|
|
| 70 |
|
|
Boolean
|
| 71 |
|
|
TspTranslateRpcAddr (struct svc_req* rqstp, NET_OPAQUE* opaque)
|
| 72 |
|
|
{
|
| 73 |
|
|
struct sockaddr_in* addr; /* used as template to extract net info */
|
| 74 |
|
|
unsigned char* up;
|
| 75 |
|
|
|
| 76 |
|
|
memset (opaque, 0, sizeof (NET_OPAQUE));
|
| 77 |
|
|
/*
|
| 78 |
|
|
* We interpret the remote address as a standard netbuf name.
|
| 79 |
|
|
* The format is 2 bytes of address family (normally AF_INET)
|
| 80 |
|
|
* and then a length (5) and then the IP address.
|
| 81 |
|
|
*/
|
| 82 |
|
|
if (rqstp->rq_xprt->xp_addrlen != 16)
|
| 83 |
|
|
{
|
| 84 |
|
|
DPRINTF (("TspTranslateRpcAddr: Unknown remote address!!!\n"));
|
| 85 |
|
|
setErrno (EPROTONOSUPPORT);
|
| 86 |
|
|
return False; /* invalid, so fails */
|
| 87 |
|
|
}
|
| 88 |
|
|
/* addr = &rqstp->rq_xprt->xp_raddr; */
|
| 89 |
|
|
addr = svc_getcaller (rqstp->rq_xprt);
|
| 90 |
|
|
/* verify it is AF_INET */
|
| 91 |
|
|
if (addr->sin_family != AF_INET) { /* no, error */
|
| 92 |
|
|
DPRINTF (("TspTranslateRpcAddr: Not an internet address!!\n"));
|
| 93 |
|
|
setErrno (EAFNOSUPPORT);/* invalid addr family */
|
| 94 |
|
|
return False;
|
| 95 |
|
|
}
|
| 96 |
|
|
/* good address type */
|
| 97 |
|
|
up = (unsigned char *) &addr->sin_addr.s_addr;
|
| 98 |
|
|
DPRINTF (("TspTranslateRpcAddr: Sent by %u.%u.%u.%u port #%u\n",
|
| 99 |
|
|
up[0], up[1], up[2], up[3], htons (addr->sin_port)));
|
| 100 |
|
|
memcpy (opaque, addr, sizeof (struct sockaddr_in));
|
| 101 |
|
|
return True;
|
| 102 |
|
|
}
|
| 103 |
|
|
|
| 104 |
|
|
/*
|
| 105 |
|
|
* TspValidateAddr - validate a passed in opaque address.
|
| 106 |
|
|
*
|
| 107 |
|
|
* Checks that the passed in address is in the format
|
| 108 |
|
|
* expected.
|
| 109 |
|
|
*/
|
| 110 |
|
|
|
| 111 |
|
|
Boolean
|
| 112 |
|
|
TspValidateAddr (NET_OPAQUE* opaque, NET_OPAQUE* sender)
|
| 113 |
|
|
{
|
| 114 |
|
|
struct sockaddr_in* addr; /* used as template to extract net info */
|
| 115 |
|
|
|
| 116 |
|
|
addr = (struct sockaddr_in*) opaque;
|
| 117 |
|
|
/* Verify it is AF_INET. Should check against sender IP address too */
|
| 118 |
|
|
if (addr->sin_family != AF_INET) {
|
| 119 |
|
|
DPRINTF (("TspValidateAddr: Back port invalid: %d\n",
|
| 120 |
|
|
htons (addr->sin_port)));
|
| 121 |
|
|
return False; /* not valid */
|
| 122 |
|
|
}
|
| 123 |
|
|
/* otherwise, we copy in the IP address, since client may not know it */
|
| 124 |
|
|
addr->sin_addr.s_addr = ((struct sockaddr_in*) sender)->sin_addr.s_addr;
|
| 125 |
|
|
DPRINTF (("TspValidateAddr: Back port is %d\n", htons (addr->sin_port)));
|
| 126 |
|
|
return True;
|
| 127 |
|
|
}
|
| 128 |
|
|
|
| 129 |
|
|
/*
|
| 130 |
|
|
* TspConnGetIndex - lookup an rpc caller's address as a connection entry.
|
| 131 |
|
|
*
|
| 132 |
|
|
* Looks up an ip address of a caller to locate the
|
| 133 |
|
|
* connection index in our connection array.
|
| 134 |
|
|
*/
|
| 135 |
|
|
|
| 136 |
|
|
int
|
| 137 |
|
|
TspConnGetIndex (struct svc_req* rqstp)
|
| 138 |
|
|
{
|
| 139 |
|
|
int conn;
|
| 140 |
|
|
/* &rqstp->rq_xprt->xp_raddr; */
|
| 141 |
|
|
struct sockaddr_in *addr = svc_getcaller (rqstp->rq_xprt);
|
| 142 |
|
|
|
| 143 |
|
|
for (conn = 0; conn < conn_list_cnt; conn++) {
|
| 144 |
|
|
if (!conn_list[conn].in_use)
|
| 145 |
|
|
continue; /* not used */
|
| 146 |
|
|
|
| 147 |
|
|
if (addr->sin_addr.s_addr == ((struct sockaddr_in *)
|
| 148 |
|
|
&conn_list [conn].sender)->sin_addr.s_addr
|
| 149 |
|
|
&& addr->sin_port == ((struct sockaddr_in *)
|
| 150 |
|
|
&conn_list[conn].sender)->sin_port) {
|
| 151 |
|
|
return conn;
|
| 152 |
|
|
}
|
| 153 |
|
|
}
|
| 154 |
|
|
return -1;
|
| 155 |
|
|
}
|
| 156 |
|
|
|
| 157 |
|
|
|
| 158 |
|
|
/*
|
| 159 |
|
|
* TspSendWaitChange - send wait-change message to clients to
|
| 160 |
|
|
* notify change.
|
| 161 |
|
|
*/
|
| 162 |
|
|
|
| 163 |
|
|
void
|
| 164 |
|
|
TspSendWaitChange(
|
| 165 |
|
|
int conn, /* connection to send to */
|
| 166 |
|
|
BACK_MSG msg, /* BMSG type */
|
| 167 |
|
|
UINT16 spec, /* special information */
|
| 168 |
|
|
PID pid, /* pid it refers to */
|
| 169 |
|
|
UINT32 context, /* additional context for message */
|
| 170 |
|
|
Boolean force) /* force into being only message */
|
| 171 |
|
|
{
|
| 172 |
|
|
int idx;
|
| 173 |
|
|
struct SEND_LIST* snd_ptr;
|
| 174 |
|
|
|
| 175 |
|
|
if (force) {
|
| 176 |
|
|
/* force to top, which means others gone */
|
| 177 |
|
|
idx = 0;
|
| 178 |
|
|
conn_list [conn].send_idx = 1;
|
| 179 |
|
|
conn_list[conn].retry = 0;
|
| 180 |
|
|
} else {
|
| 181 |
|
|
for (idx = 0; idx < (int) conn_list[conn].send_idx; idx++) {
|
| 182 |
|
|
if (conn_list[conn].send_list[idx].send_type == msg
|
| 183 |
|
|
&& conn_list[conn].send_list[idx].pid == pid)
|
| 184 |
|
|
return; /* already pended for this pid */
|
| 185 |
|
|
}
|
| 186 |
|
|
idx = conn_list[conn].send_idx;
|
| 187 |
|
|
if (idx+1 > MAX_SEND)
|
| 188 |
|
|
return; /* we lose it, what should we do??? */
|
| 189 |
|
|
conn_list[conn].send_idx++;
|
| 190 |
|
|
}
|
| 191 |
|
|
snd_ptr = &conn_list[conn].send_list[idx];
|
| 192 |
|
|
snd_ptr->send_type = msg; /* message to send */
|
| 193 |
|
|
snd_ptr->retry = TSP_RETRIES; /* about 1 minute of retries */
|
| 194 |
|
|
snd_ptr->spec = htons ((u_short) spec);
|
| 195 |
|
|
snd_ptr->pid = htonl (pid);
|
| 196 |
|
|
snd_ptr->context = htonl (context);
|
| 197 |
|
|
TspSendMessage (conn, False); /* now do the send */
|
| 198 |
|
|
}
|
| 199 |
|
|
|
| 200 |
|
|
/*
|
| 201 |
|
|
* TspSendMessage - send message at top of send list for connection.
|
| 202 |
|
|
*/
|
| 203 |
|
|
|
| 204 |
|
|
void
|
| 205 |
|
|
TspSendMessage( int conn, Boolean resend)
|
| 206 |
|
|
{
|
| 207 |
|
|
struct sockaddr_in addr;
|
| 208 |
|
|
struct UDP_MSG msg;
|
| 209 |
|
|
int cnt;
|
| 210 |
|
|
|
| 211 |
|
|
if (!resend && conn_list[conn].retry)
|
| 212 |
|
|
return; /* already waiting for reply */
|
| 213 |
|
|
|
| 214 |
|
|
/*
|
| 215 |
|
|
* Note on above: if no back port we can't remove unless
|
| 216 |
|
|
* someone blows off.
|
| 217 |
|
|
*/
|
| 218 |
|
|
if (!resend) {
|
| 219 |
|
|
/* first time, setup. Set retry count: */
|
| 220 |
|
|
conn_list[conn].retry = conn_list[conn].send_list[0].retry;
|
| 221 |
|
|
conn_list[conn].last_msg_num++; /* new sequence number */
|
| 222 |
|
|
if (!warm_test++) { /* starting, so enable timer */
|
| 223 |
|
|
alarm (2); /* resend every 2 seconds as needed */
|
| 224 |
|
|
}
|
| 225 |
|
|
}
|
| 226 |
|
|
|
| 227 |
|
|
msg.type = conn_list[conn].send_list[0].send_type;
|
| 228 |
|
|
msg.msg_num = conn_list[conn].last_msg_num;
|
| 229 |
|
|
msg.spec = conn_list[conn].send_list[0].spec;
|
| 230 |
|
|
msg.pid = conn_list[conn].send_list[0].pid;
|
| 231 |
|
|
msg.context = conn_list[conn].send_list[0].context;
|
| 232 |
|
|
|
| 233 |
|
|
memset (&addr, 0, sizeof addr);
|
| 234 |
|
|
addr.sin_family = AF_INET;
|
| 235 |
|
|
addr.sin_port = ((struct sockaddr_in*)&conn_list[conn].back_port)->sin_port;
|
| 236 |
|
|
addr.sin_addr.s_addr =
|
| 237 |
|
|
((struct sockaddr_in*)&conn_list[conn].back_port)->sin_addr.s_addr;
|
| 238 |
|
|
|
| 239 |
|
|
DPRINTF (("TspSendMessage: Sending msg %d (%s) to port %d\n",
|
| 240 |
|
|
msg.type, BmsgNames [msg.type], HL_W (addr.sin_port)));
|
| 241 |
|
|
|
| 242 |
|
|
cnt = sendto (out_sock, &msg, sizeof msg, 0, (struct sockaddr*) &addr,
|
| 243 |
|
|
sizeof addr);
|
| 244 |
|
|
if (cnt != sizeof msg) { /* failed on send */
|
| 245 |
|
|
printf ("%s: Failed to send msg %d to conn %d (%d vs. %d)\n",
|
| 246 |
|
|
ActName, msg.type, conn, cnt, sizeof msg);
|
| 247 |
|
|
}
|
| 248 |
|
|
}
|
| 249 |
|
|
|
| 250 |
|
|
/*
|
| 251 |
|
|
* TspMessageReceive - confirmation received, now send next if any.
|
| 252 |
|
|
*
|
| 253 |
|
|
* - since UDP is connectionless, we batch up the sends and use
|
| 254 |
|
|
* one at a time until we get a message indicating ready for
|
| 255 |
|
|
* next (from ack).
|
| 256 |
|
|
*/
|
| 257 |
|
|
|
| 258 |
|
|
void
|
| 259 |
|
|
TspMessageReceive (int conn, PID pid)
|
| 260 |
|
|
{
|
| 261 |
|
|
/* We remove the send list entry and use next if any */
|
| 262 |
|
|
conn_list[conn].retry = 0; /* reset */
|
| 263 |
|
|
if (!warm_test || !--warm_test) {
|
| 264 |
|
|
alarm (0); /* reset timer if not used */
|
| 265 |
|
|
}
|
| 266 |
|
|
#ifdef DDEBUG
|
| 267 |
|
|
if (conn_list[conn].send_list[0].send_type == BMSG_WARM) {
|
| 268 |
|
|
DPRINTF (("TspMessageReceive: Connection reset for conn %d\n", conn));
|
| 269 |
|
|
}
|
| 270 |
|
|
#endif
|
| 271 |
|
|
/* Move up by one if needed */
|
| 272 |
|
|
if (!--conn_list[conn].send_idx)
|
| 273 |
|
|
return; /* no more to do */
|
| 274 |
|
|
|
| 275 |
|
|
memcpy (conn_list[conn].send_list, conn_list[conn].send_list+1,
|
| 276 |
|
|
conn_list[conn].send_idx * sizeof(struct SEND_LIST)); /* copy down */
|
| 277 |
|
|
TspSendMessage (conn, 0);
|
| 278 |
|
|
}
|
| 279 |
|
|
|
| 280 |
|
|
/*
|
| 281 |
|
|
* TspGetHostName - return client's host name.
|
| 282 |
|
|
*
|
| 283 |
|
|
* - this routine returns the name of the client's host or the net
|
| 284 |
|
|
* number of unknown.
|
| 285 |
|
|
*/
|
| 286 |
|
|
|
| 287 |
|
|
char*
|
| 288 |
|
|
TspGetHostName (conn_idx)
|
| 289 |
|
|
int conn_idx; /* client connection number */
|
| 290 |
|
|
{
|
| 291 |
|
|
static char buff [30]; /* largest net num */
|
| 292 |
|
|
unsigned char* cp;
|
| 293 |
|
|
|
| 294 |
|
|
cp = conn_list[conn_idx].sender.c+4;
|
| 295 |
|
|
sprintf (buff, "%u.%u.%u.%u", cp[0], cp[1], cp[2], cp[3]);
|
| 296 |
|
|
return buff;
|
| 297 |
|
|
}
|
| 298 |
|
|
|
| 299 |
|
|
/*
|
| 300 |
|
|
* TimeTestHandler - alarm timer handler to resend warm/wait test.
|
| 301 |
|
|
*/
|
| 302 |
|
|
|
| 303 |
|
|
static void
|
| 304 |
|
|
TimeTestHandler()
|
| 305 |
|
|
{
|
| 306 |
|
|
int conn;
|
| 307 |
|
|
|
| 308 |
|
|
if (!warm_test)
|
| 309 |
|
|
return; /* no longer enabled */
|
| 310 |
|
|
|
| 311 |
|
|
for (conn = 0; conn < conn_list_cnt; conn++) {
|
| 312 |
|
|
/* locate all that are using this */
|
| 313 |
|
|
if (!conn_list[conn].in_use)
|
| 314 |
|
|
continue; /* not used */
|
| 315 |
|
|
|
| 316 |
|
|
if (!conn_list[conn].retry) continue;
|
| 317 |
|
|
/* found one that we are testing */
|
| 318 |
|
|
if (!--conn_list[conn].retry) {
|
| 319 |
|
|
/*
|
| 320 |
|
|
* Counted down the retries: blow off.
|
| 321 |
|
|
* Need to have connection flag to indicate not blowing
|
| 322 |
|
|
* off for cases where client is stopped due to being
|
| 323 |
|
|
* debugged.
|
| 324 |
|
|
*/
|
| 325 |
|
|
ConnDelete (conn, NULL, CLOSE_IGNORE);
|
| 326 |
|
|
continue;
|
| 327 |
|
|
}
|
| 328 |
|
|
TspSendMessage (conn, True); /* send another message */
|
| 329 |
|
|
}
|
| 330 |
|
|
alarm (2); /* setup for 2 seconds from now */
|
| 331 |
|
|
}
|