4 void ControlConn::processPacket()
8 // Note that where we call queuePacket, we must generally check the return value. If it
9 // returns false it has either deleted the connection or marked it for deletion; we
10 // shouldn't touch instance members after that point.
12 int pktType = rbuf[0];
13 if (pktType == DINIT_CP_QUERYVERSION) {
15 // DINIT_RP_CVERSION, (2 byte) minimum compatible version, (2 byte) maximum compatible version
16 char replyBuf[] = { DINIT_RP_CPVERSION, 0, 0, 0, 0 };
17 if (! queuePacket(replyBuf, 1)) return;
21 if (pktType == DINIT_CP_FINDSERVICE || pktType == DINIT_CP_LOADSERVICE) {
22 processFindLoad(pktType);
25 if (pktType == DINIT_CP_STARTSERVICE || pktType == DINIT_CP_STOPSERVICE
26 || pktType == DINIT_CP_WAKESERVICE || pktType == DINIT_CP_RELEASESERVICE) {
27 processStartStop(pktType);
30 if (pktType == DINIT_CP_UNPINSERVICE) {
31 processUnpinService();
34 if (pktType == DINIT_CP_SHUTDOWN) {
36 if (rbuf.get_length() < 2) {
41 auto sd_type = static_cast<ShutdownType>(rbuf[1]);
43 service_set->stop_all_services(sd_type);
44 char ackBuf[] = { DINIT_RP_ACK };
45 if (! queuePacket(ackBuf, 1)) return;
47 // Clear the packet from the buffer
53 // Unrecognized: give error response
54 char outbuf[] = { DINIT_RP_BADREQ };
55 if (! queuePacket(outbuf, 1)) return;
56 bad_conn_close = true;
57 iob.setWatchFlags(out_events);
62 void ControlConn::processFindLoad(int pktType)
66 constexpr int pkt_size = 4;
68 if (rbuf.get_length() < pkt_size) {
74 rbuf.extract((char *)&svcSize, 1, 2);
75 chklen = svcSize + 3; // packet type + (2 byte) length + service name
76 if (svcSize <= 0 || chklen > 1024) {
77 // Queue error response / mark connection bad
78 char badreqRep[] = { DINIT_RP_BADREQ };
79 if (! queuePacket(badreqRep, 1)) return;
80 bad_conn_close = true;
81 iob.setWatchFlags(out_events);
85 if (rbuf.get_length() < chklen) {
86 // packet not complete yet; read more
90 ServiceRecord * record = nullptr;
92 string serviceName = rbuf.extract_string(3, svcSize);
94 if (pktType == DINIT_CP_LOADSERVICE) {
97 record = service_set->loadService(serviceName);
99 catch (ServiceLoadExc &slexc) {
100 log(LogLevel::ERROR, "Could not load service ", slexc.serviceName, ": ", slexc.excDescription);
105 record = service_set->findService(serviceName.c_str());
108 if (record != nullptr) {
109 // Allocate a service handle
110 handle_t handle = allocateServiceHandle(record);
111 std::vector<char> rp_buf;
113 rp_buf.push_back(DINIT_RP_SERVICERECORD);
114 rp_buf.push_back(static_cast<char>(record->getState()));
115 for (int i = 0; i < (int) sizeof(handle); i++) {
116 rp_buf.push_back(*(((char *) &handle) + i));
118 rp_buf.push_back(static_cast<char>(record->getTargetState()));
119 if (! queuePacket(std::move(rp_buf))) return;
122 std::vector<char> rp_buf = { DINIT_RP_NOSERVICE };
123 if (! queuePacket(std::move(rp_buf))) return;
126 // Clear the packet from the buffer
127 rbuf.consume(chklen);
132 void ControlConn::processStartStop(int pktType)
136 constexpr int pkt_size = 2 + sizeof(handle_t);
138 if (rbuf.get_length() < pkt_size) {
143 // 1 byte: packet type
144 // 1 byte: pin in requested state (0 = no pin, 1 = pin)
145 // 4 bytes: service handle
147 bool do_pin = (rbuf[1] == 1);
149 rbuf.extract((char *) &handle, 2, sizeof(handle));
151 ServiceRecord *service = findServiceForKey(handle);
152 if (service == nullptr) {
153 // Service handle is bad
154 char badreqRep[] = { DINIT_RP_BADREQ };
155 if (! queuePacket(badreqRep, 1)) return;
156 bad_conn_close = true;
157 iob.setWatchFlags(out_events);
161 bool already_there = false;
163 case DINIT_CP_STARTSERVICE:
164 if (do_pin) service->pinStart();
166 already_there = service->getState() == ServiceState::STARTED;
168 case DINIT_CP_STOPSERVICE:
169 if (do_pin) service->pinStop();
171 already_there = service->getState() == ServiceState::STOPPED;
173 case DINIT_CP_WAKESERVICE:
174 // re-start a stopped service.
175 if (do_pin) service->pinStart();
176 service->start(false);
177 already_there = service->getState() == ServiceState::STARTED;
179 default: /* DINIT_CP_RELEASESERVICE */
180 // remove explicit start from a service, without necessarily stopping it.
185 char ack_buf[] = { (char)(already_there ? DINIT_RP_ALREADYSS : DINIT_RP_ACK) };
187 if (! queuePacket(ack_buf, 1)) return;
190 // Clear the packet from the buffer
191 rbuf.consume(pkt_size);
196 void ControlConn::processUnpinService()
200 constexpr int pkt_size = 1 + sizeof(handle_t);
202 if (rbuf.get_length() < pkt_size) {
207 // 1 byte: packet type
208 // 4 bytes: service handle
211 rbuf.extract((char *) &handle, 1, sizeof(handle));
213 ServiceRecord *service = findServiceForKey(handle);
214 if (service == nullptr) {
215 // Service handle is bad
216 char badreqRep[] = { DINIT_RP_BADREQ };
217 if (! queuePacket(badreqRep, 1)) return;
218 bad_conn_close = true;
219 iob.setWatchFlags(out_events);
224 char ack_buf[] = { (char) DINIT_RP_ACK };
225 if (! queuePacket(ack_buf, 1)) return;
228 // Clear the packet from the buffer
229 rbuf.consume(pkt_size);
234 ControlConn::handle_t ControlConn::allocateServiceHandle(ServiceRecord *record)
236 bool is_unique = true;
237 handle_t largest_seen = 0;
238 handle_t candidate = 0;
239 for (auto p : keyServiceMap) {
240 if (p.first > largest_seen) largest_seen = p.first;
241 if (p.first == candidate) {
242 if (largest_seen == std::numeric_limits<handle_t>::max()) throw std::bad_alloc();
243 candidate = largest_seen + 1;
245 is_unique &= (p.second != record);
248 keyServiceMap[candidate] = record;
249 serviceKeyMap.insert(std::make_pair(record, candidate));
252 record->addListener(this);
259 bool ControlConn::queuePacket(const char *pkt, unsigned size) noexcept
261 if (bad_conn_close) return false;
263 bool was_empty = outbuf.empty();
266 int wr = write(iob.fd, pkt, size);
268 if (errno == EPIPE) {
272 if (errno != EAGAIN && errno != EWOULDBLOCK) {
279 if ((unsigned)wr == size) {
286 iob.setWatchFlags(in_events | out_events);
289 // Create a vector out of the (remaining part of the) packet:
291 outbuf.emplace_back(pkt, pkt + size);
294 catch (std::bad_alloc &baexc) {
295 // Mark the connection bad, and stop reading further requests
296 bad_conn_close = true;
299 // We can't send out-of-memory response as we already wrote as much as we
300 // could above. Neither can we later send the response since we have currently
301 // sent an incomplete packet. All we can do is close the connection.
305 iob.setWatchFlags(out_events);
312 bool ControlConn::queuePacket(std::vector<char> &&pkt) noexcept
314 if (bad_conn_close) return false;
316 bool was_empty = outbuf.empty();
320 // We can try sending the packet immediately:
321 int wr = write(iob.fd, pkt.data(), pkt.size());
323 if (errno == EPIPE) {
327 if (errno != EAGAIN && errno != EWOULDBLOCK) {
334 if ((unsigned)wr == pkt.size()) {
340 iob.setWatchFlags(in_events | out_events);
344 outbuf.emplace_back(pkt);
347 catch (std::bad_alloc &baexc) {
348 // Mark the connection bad, and stop reading further requests
349 bad_conn_close = true;
352 // We can't send out-of-memory response as we already wrote as much as we
353 // could above. Neither can we later send the response since we have currently
354 // sent an incomplete packet. All we can do is close the connection.
358 iob.setWatchFlags(out_events);
364 bool ControlConn::rollbackComplete() noexcept
366 char ackBuf[2] = { DINIT_ROLLBACK_COMPLETED, 2 };
367 return queuePacket(ackBuf, 2);
370 bool ControlConn::dataReady() noexcept
374 int r = rbuf.fill(fd);
376 // Note file descriptor is non-blocking
378 if (errno != EAGAIN && errno != EWOULDBLOCK && errno != EINTR) {
392 if (rbuf.get_length() >= chklen) {
396 catch (std::bad_alloc &baexc) {
401 if (rbuf.get_length() == 1024) {
404 // TODO error response?
405 bad_conn_close = true;
406 iob.setWatchFlags(out_events);
412 void ControlConn::sendData() noexcept
414 if (outbuf.empty() && bad_conn_close) {
417 char oomBuf[] = { DINIT_RP_OOM };
418 write(iob.fd, oomBuf, 1);
424 vector<char> & pkt = outbuf.front();
425 char *data = pkt.data();
426 int written = write(iob.fd, data + outpkt_index, pkt.size() - outpkt_index);
428 if (errno == EPIPE) {
432 else if (errno == EAGAIN || errno == EWOULDBLOCK) {
433 // spurious readiness notification?
436 log(LogLevel::ERROR, "Error writing to control connection: ", strerror(errno));
442 outpkt_index += written;
443 if (outpkt_index == pkt.size()) {
444 // We've finished this packet, move on to the next:
447 if (outbuf.empty() && ! oom_close) {
448 if (! bad_conn_close) {
449 iob.setWatchFlags(in_events);
458 ControlConn::~ControlConn() noexcept
461 iob.deregisterWatch(loop);
463 // Clear service listeners
464 for (auto p : serviceKeyMap) {
465 p.first->removeListener(this);
468 active_control_conns--;