networklayer_tcp.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539
  1. /*
  2. * This work is licensed under a Creative Commons CCZero 1.0 Universal License.
  3. * See http://creativecommons.org/publicdomain/zero/1.0/ for more information.
  4. */
  5. #include <stdlib.h> // malloc, free
  6. #ifdef _WIN32
  7. #include <malloc.h>
  8. #include <winsock2.h>
  9. #include <sys/types.h>
  10. #include <windows.h>
  11. #include <ws2tcpip.h>
  12. #define CLOSESOCKET(S) closesocket(S)
  13. #else
  14. #include <sys/select.h>
  15. #include <netinet/in.h>
  16. #include <netinet/tcp.h>
  17. #include <sys/socketvar.h>
  18. #include <sys/ioctl.h>
  19. #include <unistd.h> // read, write, close
  20. #include <arpa/inet.h>
  21. #define CLOSESOCKET(S) close(S)
  22. #endif
  23. #include <stdio.h>
  24. #include <errno.h> // errno, EINTR
  25. #include <fcntl.h> // fcntl
  26. #include "networklayer_tcp.h" // UA_MULTITHREADING is defined in here
  27. #ifdef UA_MULTITHREADING
  28. #include <urcu/uatomic.h>
  29. #endif
  30. /* Forwarded as a (UA_Connection) and used for callbacks back into the
  31. networklayer */
  32. typedef struct {
  33. UA_Connection connection;
  34. UA_Int32 sockfd;
  35. void *layer;
  36. } TCPConnection;
  37. /***************************/
  38. /* Server NetworkLayer TCP */
  39. /***************************/
  40. #define MAXBACKLOG 100
  41. /* Internal mapping of sockets to connections */
  42. typedef struct {
  43. TCPConnection *connection;
  44. #ifdef _WIN32
  45. UA_UInt32 sockfd;
  46. #else
  47. UA_Int32 sockfd;
  48. #endif
  49. } ConnectionLink;
  50. typedef struct {
  51. UA_ConnectionConfig conf;
  52. fd_set fdset;
  53. #ifdef _WIN32
  54. UA_UInt32 serversockfd;
  55. UA_UInt32 highestfd;
  56. #else
  57. UA_Int32 serversockfd;
  58. UA_Int32 highestfd;
  59. #endif
  60. UA_UInt16 conLinksSize;
  61. ConnectionLink *conLinks;
  62. UA_UInt32 port;
  63. /* We remove the connection links only in the main thread. Attach
  64. to-be-deleted links with atomic operations */
  65. struct deleteLink {
  66. #ifdef _WIN32
  67. UA_UInt32 sockfd;
  68. #else
  69. UA_Int32 sockfd;
  70. #endif
  71. struct deleteLink *next;
  72. } *deleteLinkList;
  73. } ServerNetworkLayerTCP;
  74. static UA_StatusCode setNonBlocking(int sockid) {
  75. #ifdef _WIN32
  76. u_long iMode = 1;
  77. if(ioctlsocket(sockid, FIONBIO, &iMode) != NO_ERROR)
  78. return UA_STATUSCODE_BADINTERNALERROR;
  79. #else
  80. int opts = fcntl(sockid,F_GETFL);
  81. if(opts < 0 || fcntl(sockid,F_SETFL,opts|O_NONBLOCK) < 0)
  82. return UA_STATUSCODE_BADINTERNALERROR;
  83. #endif
  84. return UA_STATUSCODE_GOOD;
  85. }
  86. static void freeConnectionCallback(UA_Server *server, TCPConnection *connection) {
  87. free(connection);
  88. }
  89. // after every select, reset the set of sockets we want to listen on
  90. static void setFDSet(ServerNetworkLayerTCP *layer) {
  91. FD_ZERO(&layer->fdset);
  92. FD_SET(layer->serversockfd, &layer->fdset);
  93. layer->highestfd = layer->serversockfd;
  94. for(UA_Int32 i=0;i<layer->conLinksSize;i++) {
  95. FD_SET(layer->conLinks[i].sockfd, &layer->fdset);
  96. if(layer->conLinks[i].sockfd > layer->highestfd)
  97. layer->highestfd = layer->conLinks[i].sockfd;
  98. }
  99. }
  100. // the callbacks are thread-safe if UA_MULTITHREADING is defined
  101. void closeConnection(TCPConnection *handle);
  102. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf);
  103. static UA_StatusCode ServerNetworkLayerTCP_add(ServerNetworkLayerTCP *layer, UA_Int32 newsockfd) {
  104. setNonBlocking(newsockfd);
  105. TCPConnection *c = malloc(sizeof(TCPConnection));
  106. if(!c)
  107. return UA_STATUSCODE_BADINTERNALERROR;
  108. c->sockfd = newsockfd;
  109. c->layer = layer;
  110. c->connection.state = UA_CONNECTION_OPENING;
  111. c->connection.localConf = layer->conf;
  112. c->connection.channel = (void*)0;
  113. c->connection.close = (void (*)(void*))closeConnection;
  114. c->connection.write = (void (*)(void*, UA_ByteStringArray))writeCallback;
  115. layer->conLinks = realloc(layer->conLinks, sizeof(ConnectionLink)*(layer->conLinksSize+1));
  116. if(!layer->conLinks) {
  117. free(c);
  118. return UA_STATUSCODE_BADINTERNALERROR;
  119. }
  120. layer->conLinks[layer->conLinksSize].connection = c;
  121. layer->conLinks[layer->conLinksSize].sockfd = newsockfd;
  122. layer->conLinksSize++;
  123. return UA_STATUSCODE_GOOD;
  124. }
  125. // Takes the linked list of closed connections and returns the work for the server loop
  126. static UA_UInt32 batchDeleteLinks(ServerNetworkLayerTCP *layer, UA_WorkItem **returnWork) {
  127. UA_WorkItem *work = malloc(sizeof(UA_WorkItem)*layer->conLinksSize);
  128. if (!work) {
  129. *returnWork = NULL;
  130. return 0;
  131. }
  132. #ifdef UA_MULTITHREADING
  133. struct deleteLink *d = uatomic_xchg(&layer->deleteLinkList, (void*)0);
  134. #else
  135. struct deleteLink *d = layer->deleteLinkList;
  136. layer->deleteLinkList = (void*)0;
  137. #endif
  138. UA_UInt32 count = 0;
  139. while(d) {
  140. UA_Int32 i;
  141. for(i = 0;i<layer->conLinksSize;i++) {
  142. if(layer->conLinks[i].sockfd == d->sockfd)
  143. break;
  144. }
  145. if(i < layer->conLinksSize) {
  146. TCPConnection *c = layer->conLinks[i].connection;
  147. layer->conLinksSize--;
  148. layer->conLinks[i] = layer->conLinks[layer->conLinksSize];
  149. work[count] = (UA_WorkItem)
  150. {.type = UA_WORKITEMTYPE_DELAYEDMETHODCALL,
  151. .work.methodCall = {.data = c,
  152. .method = (void (*)(UA_Server*,void*))freeConnectionCallback} };
  153. }
  154. struct deleteLink *oldd = d;
  155. d = d->next;
  156. free(oldd);
  157. count++;
  158. }
  159. *returnWork = work;
  160. return count;
  161. }
  162. #ifdef UA_MULTITHREADING
  163. void closeConnection(TCPConnection *handle) {
  164. if(uatomic_xchg(&handle->connection.state, UA_CONNECTION_CLOSING) == UA_CONNECTION_CLOSING)
  165. return;
  166. UA_Connection_detachSecureChannel(&handle->connection);
  167. shutdown(handle->sockfd,2);
  168. CLOSESOCKET(handle->sockfd);
  169. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  170. // Remove the link later in the main thread
  171. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  172. d->sockfd = handle->sockfd;
  173. while(1) {
  174. d->next = layer->deleteLinkList;
  175. if(uatomic_cmpxchg(&layer->deleteLinkList, d->next, d) == d->next)
  176. break;
  177. }
  178. }
  179. #else
  180. void closeConnection(TCPConnection *handle) {
  181. struct deleteLink *d = malloc(sizeof(struct deleteLink));
  182. if(!d)
  183. return;
  184. if(handle->connection.state == UA_CONNECTION_CLOSING)
  185. return;
  186. handle->connection.state = UA_CONNECTION_CLOSING;
  187. UA_Connection_detachSecureChannel(&handle->connection);
  188. shutdown(handle->sockfd,2);
  189. CLOSESOCKET(handle->sockfd);
  190. // Remove the link later in the main thread
  191. d->sockfd = handle->sockfd;
  192. ServerNetworkLayerTCP *layer = (ServerNetworkLayerTCP*)handle->layer;
  193. d->next = layer->deleteLinkList;
  194. layer->deleteLinkList = d;
  195. }
  196. #endif
  197. /** Accesses only the sockfd in the handle. Can be run from parallel threads. */
  198. void writeCallback(TCPConnection *handle, UA_ByteStringArray gather_buf) {
  199. UA_UInt32 total_len = 0, nWritten = 0;
  200. #ifdef _WIN32
  201. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  202. int result = 0;
  203. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  204. buf[i].buf = (char*)gather_buf.strings[i].data;
  205. buf[i].len = gather_buf.strings[i].length;
  206. total_len += gather_buf.strings[i].length;
  207. }
  208. while(nWritten < total_len) {
  209. UA_UInt32 n = 0;
  210. do {
  211. result = WSASend(handle->sockfd, buf, gather_buf.stringsSize ,
  212. (LPDWORD)&n, 0, NULL, NULL);
  213. if(result != 0)
  214. printf("Error WSASend, code: %d \n", WSAGetLastError());
  215. } while(errno == EINTR);
  216. nWritten += n;
  217. }
  218. #else
  219. struct iovec iov[gather_buf.stringsSize];
  220. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  221. iov[i] = (struct iovec) {.iov_base = gather_buf.strings[i].data,
  222. .iov_len = gather_buf.strings[i].length};
  223. total_len += gather_buf.strings[i].length;
  224. }
  225. struct msghdr message = {.msg_name = NULL, .msg_namelen = 0, .msg_iov = iov,
  226. .msg_iovlen = gather_buf.stringsSize, .msg_control = NULL,
  227. .msg_controllen = 0, .msg_flags = 0};
  228. while (nWritten < total_len) {
  229. UA_Int32 n = 0;
  230. do {
  231. n = sendmsg(handle->sockfd, &message, 0);
  232. } while (n == -1L && errno == EINTR);
  233. nWritten += n;
  234. }
  235. #endif
  236. }
  237. static UA_StatusCode ServerNetworkLayerTCP_start(ServerNetworkLayerTCP *layer) {
  238. #ifdef _WIN32
  239. WORD wVersionRequested;
  240. WSADATA wsaData;
  241. wVersionRequested = MAKEWORD(2, 2);
  242. WSAStartup(wVersionRequested, &wsaData);
  243. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM,0)) == INVALID_SOCKET) {
  244. printf("ERROR opening socket, code: %d\n", WSAGetLastError());
  245. return UA_STATUSCODE_BADINTERNALERROR;
  246. }
  247. #else
  248. if((layer->serversockfd = socket(PF_INET, SOCK_STREAM, 0)) < 0) {
  249. perror("ERROR opening socket");
  250. return UA_STATUSCODE_BADINTERNALERROR;
  251. }
  252. #endif
  253. const struct sockaddr_in serv_addr = {
  254. .sin_family = AF_INET, .sin_addr.s_addr = INADDR_ANY,
  255. .sin_port = htons(layer->port), .sin_zero = {0}};
  256. int optval = 1;
  257. if(setsockopt(layer->serversockfd, SOL_SOCKET,
  258. SO_REUSEADDR, (const char *)&optval,
  259. sizeof(optval)) == -1) {
  260. perror("setsockopt");
  261. CLOSESOCKET(layer->serversockfd);
  262. return UA_STATUSCODE_BADINTERNALERROR;
  263. }
  264. if(bind(layer->serversockfd, (const struct sockaddr *)&serv_addr,
  265. sizeof(serv_addr)) < 0) {
  266. perror("binding");
  267. CLOSESOCKET(layer->serversockfd);
  268. return UA_STATUSCODE_BADINTERNALERROR;
  269. }
  270. setNonBlocking(layer->serversockfd);
  271. listen(layer->serversockfd, MAXBACKLOG);
  272. printf("Listening for TCP connections on %s:%d\n",
  273. inet_ntoa(serv_addr.sin_addr),
  274. ntohs(serv_addr.sin_port));
  275. return UA_STATUSCODE_GOOD;
  276. }
  277. static UA_Int32 ServerNetworkLayerTCP_getWork(ServerNetworkLayerTCP *layer, UA_WorkItem **workItems,
  278. UA_UInt16 timeout) {
  279. UA_WorkItem *items = (void*)0;
  280. UA_Int32 itemsCount = batchDeleteLinks(layer, &items);
  281. setFDSet(layer);
  282. struct timeval tmptv = {0, timeout};
  283. UA_Int32 resultsize = select(layer->highestfd+1, &layer->fdset, NULL, NULL, &tmptv);
  284. if(resultsize < 0) {
  285. *workItems = items;
  286. return itemsCount;
  287. }
  288. // accept new connections (can only be a single one)
  289. if(FD_ISSET(layer->serversockfd,&layer->fdset)) {
  290. resultsize--;
  291. struct sockaddr_in cli_addr;
  292. socklen_t cli_len = sizeof(cli_addr);
  293. int newsockfd = accept(layer->serversockfd, (struct sockaddr *) &cli_addr, &cli_len);
  294. int i = 1;
  295. setsockopt(newsockfd, IPPROTO_TCP, TCP_NODELAY, (void *)&i, sizeof(i));
  296. if (newsockfd >= 0)
  297. ServerNetworkLayerTCP_add(layer, newsockfd);
  298. }
  299. items = realloc(items, sizeof(UA_WorkItem)*(itemsCount+resultsize));
  300. // read from established sockets
  301. UA_Int32 j = itemsCount;
  302. UA_ByteString buf = { -1, NULL};
  303. for(UA_Int32 i=0;i<layer->conLinksSize && j<itemsCount+resultsize;i++) {
  304. if(!(FD_ISSET(layer->conLinks[i].sockfd, &layer->fdset)))
  305. continue;
  306. if(!buf.data) {
  307. buf.data = malloc(sizeof(UA_Byte) * layer->conf.recvBufferSize);
  308. if(!buf.data)
  309. break;
  310. }
  311. buf.length = recv(layer->conLinks[i].sockfd, (char *)buf.data,
  312. layer->conf.recvBufferSize, 0);
  313. if (buf.length <= 0) {
  314. closeConnection(layer->conLinks[i].connection); // work is returned in the next iteration
  315. } else {
  316. items[j].type = UA_WORKITEMTYPE_BINARYNETWORKMESSAGE;
  317. items[j].work.binaryNetworkMessage.message = buf;
  318. items[j].work.binaryNetworkMessage.connection = &layer->conLinks[i].connection->connection;
  319. buf.data = NULL;
  320. j++;
  321. }
  322. }
  323. if(buf.data)
  324. free(buf.data);
  325. if(j == 0) {
  326. free(items);
  327. *workItems = NULL;
  328. } else
  329. *workItems = items;
  330. return j;
  331. }
  332. static UA_Int32 ServerNetworkLayerTCP_stop(ServerNetworkLayerTCP * layer, UA_WorkItem **workItems) {
  333. for(UA_Int32 index = 0;index < layer->conLinksSize;index++)
  334. closeConnection(layer->conLinks[index].connection);
  335. #ifdef _WIN32
  336. WSACleanup();
  337. #endif
  338. return batchDeleteLinks(layer, workItems);
  339. }
  340. static void ServerNetworkLayerTCP_delete(ServerNetworkLayerTCP *layer) {
  341. free(layer->conLinks);
  342. free(layer);
  343. }
  344. UA_ServerNetworkLayer ServerNetworkLayerTCP_new(UA_ConnectionConfig conf, UA_UInt32 port) {
  345. ServerNetworkLayerTCP *tcplayer = malloc(sizeof(ServerNetworkLayerTCP));
  346. tcplayer->conf = conf;
  347. tcplayer->conLinksSize = 0;
  348. tcplayer->conLinks = NULL;
  349. tcplayer->port = port;
  350. tcplayer->deleteLinkList = (void*)0;
  351. UA_ServerNetworkLayer nl;
  352. nl.nlHandle = tcplayer;
  353. nl.start = (UA_StatusCode (*)(void*))ServerNetworkLayerTCP_start;
  354. nl.getWork = (UA_Int32 (*)(void*, UA_WorkItem**, UA_UInt16))ServerNetworkLayerTCP_getWork;
  355. nl.stop = (UA_Int32 (*)(void*, UA_WorkItem**))ServerNetworkLayerTCP_stop;
  356. nl.free = (void (*)(void*))ServerNetworkLayerTCP_delete;
  357. return nl;
  358. }
  359. /***************************/
  360. /* Client NetworkLayer TCP */
  361. /***************************/
  362. static UA_StatusCode ClientNetworkLayerTCP_connect(const UA_String endpointUrl, void **resultHandle) {
  363. if(endpointUrl.length < 11 || endpointUrl.length >= 512) {
  364. printf("server url size invalid");
  365. return UA_STATUSCODE_BADINTERNALERROR;
  366. }
  367. if(strncmp((char*)endpointUrl.data, "opc.tcp://", 10) != 0) {
  368. printf("server url does not begin with opc.tcp://");
  369. return UA_STATUSCODE_BADINTERNALERROR;
  370. }
  371. UA_UInt16 portpos = 9;
  372. UA_UInt16 port = 0;
  373. for(;portpos < endpointUrl.length; portpos++) {
  374. if(endpointUrl.data[portpos] == ':') {
  375. port = atoi((char*)&endpointUrl.data[portpos+1]);
  376. break;
  377. }
  378. }
  379. if(port == 0) {
  380. printf("port invalid");
  381. return UA_STATUSCODE_BADINTERNALERROR;
  382. }
  383. char hostname[512];
  384. for(int i=10; i < portpos; i++)
  385. hostname[i-10] = endpointUrl.data[i];
  386. hostname[portpos-10] = 0;
  387. UA_Int32 *sock = UA_Int32_new();
  388. if(!sock)
  389. return UA_STATUSCODE_BADOUTOFMEMORY;
  390. if((*sock = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
  391. free(sock);
  392. printf("Could not create socket");
  393. return UA_STATUSCODE_BADINTERNALERROR;
  394. }
  395. struct sockaddr_in server;
  396. server.sin_addr.s_addr = inet_addr(hostname);
  397. server.sin_family = AF_INET;
  398. server.sin_port = port;
  399. if(connect(*sock, (struct sockaddr *) &server, sizeof(server)) < 0) {
  400. free(sock);
  401. printf("Connect failed.");
  402. return UA_STATUSCODE_BADINTERNALERROR;
  403. }
  404. if(setNonBlocking(*sock) != UA_STATUSCODE_GOOD) {
  405. free(sock);
  406. printf("Could not switch to nonblocking.");
  407. return UA_STATUSCODE_BADINTERNALERROR;
  408. }
  409. *resultHandle = sock;
  410. return UA_STATUSCODE_GOOD;
  411. }
  412. static void ClientNetworkLayerTCP_disconnect(UA_Int32 *handle) {
  413. close(*handle);
  414. free(handle);
  415. }
  416. static UA_StatusCode ClientNetworkLayerTCP_send(UA_Int32 *handle, UA_ByteStringArray gather_buf) {
  417. UA_UInt32 total_len = 0, nWritten = 0;
  418. #ifdef _WIN32
  419. LPWSABUF buf = _alloca(gather_buf.stringsSize * sizeof(WSABUF));
  420. int result = 0;
  421. for(UA_UInt32 i = 0; i<gather_buf.stringsSize; i++) {
  422. buf[i].buf = (char*)gather_buf.strings[i].data;
  423. buf[i].len = gather_buf.strings[i].length;
  424. total_len += gather_buf.strings[i].length;
  425. }
  426. while(nWritten < total_len) {
  427. UA_UInt32 n = 0;
  428. do {
  429. result = WSASend(*handle, buf, gather_buf.stringsSize ,
  430. (LPDWORD)&n, 0, NULL, NULL);
  431. if(result != 0)
  432. printf("Error WSASend, code: %d \n", WSAGetLastError());
  433. } while(errno == EINTR);
  434. nWritten += n;
  435. }
  436. #else
  437. struct iovec iov[gather_buf.stringsSize];
  438. for(UA_UInt32 i=0;i<gather_buf.stringsSize;i++) {
  439. iov[i] = (struct iovec) {.iov_base = gather_buf.strings[i].data,
  440. .iov_len = gather_buf.strings[i].length};
  441. total_len += gather_buf.strings[i].length;
  442. }
  443. struct msghdr message = {.msg_name = NULL, .msg_namelen = 0, .msg_iov = iov,
  444. .msg_iovlen = gather_buf.stringsSize, .msg_control = NULL,
  445. .msg_controllen = 0, .msg_flags = 0};
  446. while (nWritten < total_len) {
  447. int n = sendmsg(*handle, &message, 0);
  448. if(n <= -1)
  449. return UA_STATUSCODE_BADINTERNALERROR;
  450. nWritten += n;
  451. }
  452. #endif
  453. return UA_STATUSCODE_GOOD;
  454. }
  455. static UA_StatusCode ClientNetworkLayerTCP_awaitResponse(UA_Int32 *handle, UA_ByteString *response,
  456. UA_UInt32 timeout) {
  457. fd_set read_fds;
  458. FD_ZERO(&read_fds);
  459. struct timeval tmptv = {0, timeout};
  460. int ret = select(*handle+1, &read_fds, NULL, NULL, &tmptv);
  461. if(ret <= -1)
  462. return UA_STATUSCODE_BADINTERNALERROR;
  463. if(ret == 0)
  464. return UA_STATUSCODE_BADTIMEOUT;
  465. ret = recv(*handle, (char*)response->data, response->length, 0);
  466. if(ret <= -1)
  467. return UA_STATUSCODE_BADINTERNALERROR;
  468. if(ret == 0)
  469. return UA_STATUSCODE_BADSERVERNOTCONNECTED;
  470. response->length = ret;
  471. return UA_STATUSCODE_GOOD;
  472. }
  473. UA_ClientNetworkLayer ClientNetworkLayerTCP_new(UA_ConnectionConfig conf) {
  474. UA_ClientNetworkLayer layer;
  475. layer.connect = (UA_StatusCode (*)(const UA_String, void**)) ClientNetworkLayerTCP_connect;
  476. layer.disconnect = (void (*)(void*)) ClientNetworkLayerTCP_disconnect;
  477. layer.send = (UA_StatusCode (*)(void*, UA_ByteStringArray)) ClientNetworkLayerTCP_send;
  478. layer.awaitResponse = (UA_StatusCode (*)(void*, UA_ByteString *, UA_UInt32))ClientNetworkLayerTCP_awaitResponse;
  479. return layer;
  480. }