| File: | libsofia-sip-ua/tport/tport_logging.c |
| Warning: | line 438, column 18 Although the value stored to 'error' is used in the enclosing expression, the value is never actually read from 'error' |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* |
| 2 | * This file is part of the Sofia-SIP package |
| 3 | * |
| 4 | * Copyright (C) 2006 Nokia Corporation. |
| 5 | * |
| 6 | * Contact: Pekka Pessi <pekka.pessi@nokia.com> |
| 7 | * |
| 8 | * This library is free software; you can redistribute it and/or |
| 9 | * modify it under the terms of the GNU Lesser General Public License |
| 10 | * as published by the Free Software Foundation; either version 2.1 of |
| 11 | * the License, or (at your option) any later version. |
| 12 | * |
| 13 | * This library is distributed in the hope that it will be useful, but |
| 14 | * WITHOUT ANY WARRANTY; without even the implied warranty of |
| 15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 16 | * Lesser General Public License for more details. |
| 17 | * |
| 18 | * You should have received a copy of the GNU Lesser General Public |
| 19 | * License along with this library; if not, write to the Free Software |
| 20 | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA |
| 21 | * 02110-1301 USA |
| 22 | * |
| 23 | */ |
| 24 | |
| 25 | /**@CFILE tport_logging.c Logging transported messages. |
| 26 | * |
| 27 | * See tport.docs for more detailed description of tport interface. |
| 28 | * |
| 29 | * @author Pekka Pessi <Pekka.Pessi@nokia.com> |
| 30 | * @author Martti Mela <Martti.Mela@nokia.com> |
| 31 | * |
| 32 | * @date Created: Fri Mar 24 08:45:49 EET 2006 ppessi |
| 33 | */ |
| 34 | |
| 35 | #include "config.h" |
| 36 | #include "msg_internal.h" |
| 37 | |
| 38 | #include "tport_internal.h" |
| 39 | |
| 40 | #include <sofia-sip/su.h> |
| 41 | #include <sofia-sip/su_string.h> |
| 42 | #include <stdlib.h> |
| 43 | #include <time.h> |
| 44 | #include <assert.h> |
| 45 | #include <errno(*__errno_location ()).h> |
| 46 | #include <limits.h> |
| 47 | |
| 48 | #define TPORT_STAMP_SIZE144 144 |
| 49 | |
| 50 | /**@var TPORT_LOG |
| 51 | * |
| 52 | * Environment variable determining if parsed message contents are logged. |
| 53 | * |
| 54 | * If the TPORT_LOG environment variable is set, the tport module logs the |
| 55 | * contents of parsed messages. This eases debugging the signaling greatly. |
| 56 | * |
| 57 | * @sa TPORT_DUMP, TPORT_DEBUG, tport_log |
| 58 | */ |
| 59 | #ifdef DOXYGEN |
| 60 | extern char const TPORT_LOG[]; /* dummy declaration for Doxygen */ |
| 61 | #endif |
| 62 | |
| 63 | /**@var TPORT_DUMP |
| 64 | * |
| 65 | * Environment variable for transport data dump. |
| 66 | * |
| 67 | * The received and sent data is dumped to the file specified by TPORT_DUMP |
| 68 | * environment variable. This can be used to save message traces and help |
| 69 | * hairy debugging tasks. |
| 70 | * |
| 71 | * @sa TPORT_LOG, TPORT_DEBUG, tport_log |
| 72 | */ |
| 73 | #ifdef DOXYGEN |
| 74 | extern char const TPORT_DUMP[]; /* dummy declaration for Doxygen */ |
| 75 | #endif |
| 76 | |
| 77 | /**@var TPORT_CAPT |
| 78 | * |
| 79 | * Environment variable for transport data capturing. |
| 80 | * |
| 81 | * The received and sent data is dumped to the capture server specified by TPORT_CAPT |
| 82 | * environment variable. This can be used to save message traces into database and help |
| 83 | * hairy debugging tasks. |
| 84 | * |
| 85 | * @sa TPORT_LOG, TPORT_DEBUG, TPORT_CAPT, tport_log |
| 86 | */ |
| 87 | #ifdef DOXYGEN |
| 88 | extern char const TPORT_CAPT[]; /* dummy declaration for Doxygen */ |
| 89 | #endif |
| 90 | |
| 91 | |
| 92 | /**@var TPORT_DEBUG |
| 93 | * |
| 94 | * Environment variable determining the debug log level for @b tport module. |
| 95 | * |
| 96 | * The TPORT_DEBUG environment variable is used to determine the debug logging |
| 97 | * level for @b tport module. The default level is 3. |
| 98 | * |
| 99 | * @sa <sofia-sip/su_debug.h>, tport_log, SOFIA_DEBUG |
| 100 | */ |
| 101 | #ifdef DOXYGEN |
| 102 | extern char const TPORT_DEBUG[]; /* dummy declaration for Doxygen */ |
| 103 | #endif |
| 104 | |
| 105 | /**Debug log for @b tport module. |
| 106 | * |
| 107 | * The tport_log is the log object used by @b tport module. The level of |
| 108 | * #tport_log is set using #TPORT_DEBUG environment variable. |
| 109 | */ |
| 110 | su_log_t tport_log[] = { |
| 111 | SU_LOG_INIT("tport", "TPORT_DEBUG", SU_DEBUG){ sizeof(su_log_t), "tport", "TPORT_DEBUG", 0, SU_LOG_MAX, 0, ((void*)0), ((void*)0), } |
| 112 | }; |
| 113 | |
| 114 | |
| 115 | |
| 116 | /** Initialize logging. */ |
| 117 | int tport_open_log(tport_master_t *mr, tagi_t *tags) |
| 118 | { |
| 119 | int n; |
| 120 | int log_msg = mr->mr_log != 0; |
| 121 | char const *dump = NULL((void*)0); |
| 122 | char const *capt = NULL((void*)0);; |
| 123 | |
| 124 | if(mr->mr_capt_name) capt = mr->mr_capt_name; |
| 125 | |
| 126 | n = tl_gets(tags, |
| 127 | TPTAG_LOG_REF(log_msg)tptag_log_ref, tag_bool_vr(&(log_msg)), |
| 128 | TPTAG_DUMP_REF(dump)tptag_dump_ref, tag_str_vr(&(dump)), |
| 129 | TPTAG_CAPT_REF(capt)tptag_capt_ref, tag_str_vr(&(capt)), |
| 130 | TAG_END()(tag_type_t)0, (tag_value_t)0); |
| 131 | |
| 132 | if (getenv("MSG_STREAM_LOG") != NULL((void*)0) || getenv("TPORT_LOG") != NULL((void*)0)) |
| 133 | log_msg = 1; |
| 134 | mr->mr_log = log_msg ? MSG_DO_EXTRACT_COPYMSG_FLG_EXTRACT_COPY : 0; |
| 135 | |
| 136 | if (getenv("TPORT_CAPT")) |
| 137 | capt = getenv("TPORT_CAPT"); |
| 138 | if (getenv("MSG_DUMP")) |
| 139 | dump = getenv("MSG_DUMP"); |
| 140 | if (getenv("TPORT_DUMP")) |
| 141 | dump = getenv("TPORT_DUMP"); |
| 142 | |
| 143 | if(capt) { |
| 144 | |
| 145 | char *captname, *p, *host_s; |
| 146 | char port[10]; |
| 147 | su_addrinfo_t *ai = NULL((void*)0), hints[1] = {{ 0 }}; |
| 148 | unsigned len =0, iport = 0; |
| 149 | |
| 150 | |
| 151 | |
| 152 | if (mr->mr_capt_name && mr->mr_capt_sock && strcmp(capt, mr->mr_capt_name) == 0) |
| 153 | return n; |
| 154 | |
| 155 | captname = su_strdup(mr->mr_homemr_master->tp_home, capt); |
| 156 | if (captname == NULL((void*)0)) |
| 157 | return n; |
| 158 | |
| 159 | if(strncmp(captname, "udp:",4) != 0) { |
| 160 | su_log("tport_open_log: capturing. Only udp protocol supported [%s]\n", captname); |
| 161 | return n; |
| 162 | } |
| 163 | |
| 164 | /* separate proto and host */ |
| 165 | p = captname+4; |
| 166 | if( (*(p)) == '\0') { |
| 167 | su_log("malformed ip address\n"); |
| 168 | return n; |
| 169 | } |
| 170 | host_s = p; |
| 171 | |
| 172 | if( (p = strrchr(p+1, ':')) == 0 ) { |
| 173 | su_log("no host or port specified\n"); |
| 174 | return n; |
| 175 | } |
| 176 | |
| 177 | /*the address contains a port number*/ |
| 178 | *p = '\0'; |
| 179 | p++; |
| 180 | |
| 181 | iport = atoi(p); |
| 182 | |
| 183 | if (iport <1024 || iport >65536) |
| 184 | { |
| 185 | su_log("invalid port number; must be in [1024,65536]\n"); |
| 186 | return n; |
| 187 | } |
| 188 | |
| 189 | snprintf(port, sizeof(port), "%d", iport); |
| 190 | |
| 191 | /* default values for capture protocol and agent id */ |
| 192 | mr->mr_prot_ver = 3; |
| 193 | mr->mr_agent_id = 200; |
| 194 | |
| 195 | /* get all params */ |
| 196 | while(p) |
| 197 | { |
| 198 | /* check ; in the URL */ |
| 199 | if( (p = strchr(p+1, ';')) == 0 ) { |
| 200 | break; |
| 201 | } |
| 202 | |
| 203 | *p = '\0'; |
| 204 | p++; |
| 205 | |
| 206 | SU_DEBUG_7(("events HEP RRR DATA [%s]\n", p))(((tport_log != ((void*)0) && tport_log->log_init) == 0 ? 9 : ((tport_log != ((void*)0) && tport_log-> log_init > 1) ? tport_log->log_level : su_log_default-> log_level)) >= 7 ? (_su_llog(tport_log, 7, "tport_logging.c" , (const char *)__func__, 206, "events HEP RRR DATA [%s]\n", p )) : (void)0); |
| 207 | |
| 208 | if(strncmp(p, "hep=",4) == 0) { |
| 209 | p+=4; |
| 210 | mr->mr_prot_ver = atoi(p); |
| 211 | /* hepv3 come later */ |
| 212 | if (mr->mr_prot_ver < 1 || mr->mr_prot_ver > 3) |
| 213 | { |
| 214 | su_log("invalid hep version number; must be in [1-3]\n"); |
| 215 | mr->mr_prot_ver = 3; |
| 216 | return n; |
| 217 | } |
| 218 | } |
| 219 | else if(strncmp(p, "capture_id=", 11) == 0) { |
| 220 | p+=11; |
| 221 | if((mr->mr_agent_id = atoi(p)) == 0) |
| 222 | { |
| 223 | mr->mr_agent_id = 200; |
| 224 | su_log("invalid capture id number; must be uint32 \n"); |
| 225 | return n; |
| 226 | } |
| 227 | } |
| 228 | else { |
| 229 | su_log("unsupported capture param\n"); |
| 230 | return n; |
| 231 | } |
| 232 | } |
| 233 | |
| 234 | /* check if we have [] */ |
| 235 | if (host_s[0] == '[') { |
| 236 | len = strlen(host_s + 1) - 1; |
| 237 | if(host_s[len+1] != ']') { |
| 238 | su_log("bracket not closed\n"); |
| 239 | return n; |
| 240 | } |
| 241 | memmove(host_s, host_s + 1, len); |
| 242 | host_s[len] = '\0'; |
| 243 | } |
| 244 | |
| 245 | /* and again */ |
| 246 | captname = su_strdup(mr->mr_homemr_master->tp_home, capt); |
| 247 | if (captname == NULL((void*)0)) return n; |
| 248 | |
| 249 | su_free(mr->mr_homemr_master->tp_home, mr->mr_capt_name); |
| 250 | mr->mr_capt_name = captname; |
| 251 | |
| 252 | if (mr->mr_capt_sock) |
| 253 | su_close(mr->mr_capt_sock), mr->mr_capt_sock = 0; |
| 254 | |
| 255 | /* HINTS && getaddrinfo */ |
| 256 | hints->ai_flags = AI_NUMERICSERV0x0400; |
| 257 | hints->ai_family = AF_UNSPEC0; |
| 258 | hints->ai_socktype = SOCK_DGRAMSOCK_DGRAM; |
| 259 | hints->ai_protocol = IPPROTO_UDPIPPROTO_UDP; |
| 260 | |
| 261 | if (su_getaddrinfo(host_s, port, hints, &ai)) { |
| 262 | su_perror("capture: su_getaddrinfo()"); |
| 263 | return n; |
| 264 | } |
| 265 | |
| 266 | mr->mr_capt_sock = su_socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol); |
| 267 | if (mr->mr_capt_sock == INVALID_SOCKET((su_socket_t)INVALID_SOCKET)) { |
| 268 | su_perror("capture: invalid socket"); |
| 269 | return n; |
| 270 | } |
| 271 | |
| 272 | su_setblocking(mr->mr_capt_sock, 0); /* Don't block */ |
| 273 | |
| 274 | if (connect(mr->mr_capt_sock, ai->ai_addr, (socklen_t)(ai->ai_addrlen)) == -1) { |
| 275 | if (errno(*__errno_location ()) != EINPROGRESS115) { |
| 276 | su_perror("capture: socket connect"); |
| 277 | return n; |
| 278 | } |
| 279 | } |
| 280 | |
| 281 | su_freeaddrinfo(ai); |
| 282 | } |
| 283 | else if(mr->mr_capt_sock) { |
| 284 | /* close capture server*/ |
| 285 | su_close(mr->mr_capt_sock); |
| 286 | mr->mr_capt_sock = 0; |
| 287 | } |
| 288 | |
| 289 | if (dump) { |
| 290 | time_t now; |
| 291 | char *dumpname; |
| 292 | |
| 293 | if (mr->mr_dump && strcmp(dump, mr->mr_dump) == 0) |
| 294 | return n; |
| 295 | dumpname = su_strdup(mr->mr_homemr_master->tp_home, dump); |
| 296 | if (dumpname == NULL((void*)0)) |
| 297 | return n; |
| 298 | su_free(mr->mr_homemr_master->tp_home, mr->mr_dump); |
| 299 | mr->mr_dump = dumpname; |
| 300 | |
| 301 | if (mr->mr_dump_file && mr->mr_dump_file != stdoutstdout) |
| 302 | fclose(mr->mr_dump_file), mr->mr_dump_file = NULL((void*)0); |
| 303 | |
| 304 | if (strcmp(dumpname, "-")) |
| 305 | mr->mr_dump_file = fopen(dumpname, "ab"); /* XXX */ |
| 306 | else |
| 307 | mr->mr_dump_file = stdoutstdout; |
| 308 | |
| 309 | if (mr->mr_dump_file) { |
| 310 | time(&now); |
| 311 | fprintf(mr->mr_dump_file, "dump started at %s\n\n", ctime(&now)); |
| 312 | } |
| 313 | } |
| 314 | |
| 315 | return n; |
| 316 | } |
| 317 | |
| 318 | /** Create log stamp */ |
| 319 | void tport_stamp(tport_t const *self, msg_t *msg, |
| 320 | char *stamp, char const *what, |
| 321 | size_t n, char const *via, |
| 322 | su_time_t now) |
| 323 | { |
| 324 | char label[24] = ""; |
| 325 | char *comp = ""; |
| 326 | char name[SU_ADDRSIZE(48)] = ""; |
| 327 | su_sockaddr_t const *su; |
| 328 | unsigned short second, minute, hour; |
| 329 | /* should check for ifdef HAVE_LOCALTIME_R instead -_- */ |
| 330 | #if defined(HAVE_GETTIMEOFDAY1) || defined(HAVE_CLOCK_MONOTONIC1) |
| 331 | struct tm nowtm = { 0 }; |
| 332 | time_t nowtime = (now.tv_sec - SU_TIME_EPOCH2208988800UL); /* see su_time0.c 'now' is not really 'now', so we decrease it by SU_TIME_EPOCH */ |
| 333 | #endif |
| 334 | |
| 335 | assert(self)((void) sizeof ((self) ? 1 : 0), __extension__ ({ if (self) ; else __assert_fail ("self", "tport_logging.c", 335, __extension__ __PRETTY_FUNCTION__); })); assert(msg)((void) sizeof ((msg) ? 1 : 0), __extension__ ({ if (msg) ; else __assert_fail ("msg", "tport_logging.c", 335, __extension__ __PRETTY_FUNCTION__ ); })); |
| 336 | |
| 337 | #if defined(HAVE_GETTIMEOFDAY1) || defined(HAVE_CLOCK_MONOTONIC1) |
| 338 | localtime_r(&nowtime, &nowtm); |
| 339 | second = nowtm.tm_sec; |
| 340 | minute = nowtm.tm_min; |
| 341 | hour = nowtm.tm_hour; |
| 342 | #else |
| 343 | second = (unsigned short)(now.tv_sec % 60); |
| 344 | minute = (unsigned short)((now.tv_sec / 60) % 60); |
| 345 | hour = (unsigned short)((now.tv_sec / 3600) % 24); |
| 346 | #endif |
| 347 | |
| 348 | su = msg_addr(msg); |
| 349 | |
| 350 | #if SU_HAVE_IN61 |
| 351 | if (su->su_familysu_sa.sa_family == AF_INET610) { |
| 352 | if (su->su_sin6.sin6_flowinfo) |
| 353 | snprintf(label, sizeof(label), "/%u", ntohl(su->su_sin6.sin6_flowinfo)); |
| 354 | } |
| 355 | #endif |
| 356 | |
| 357 | if (msg_addrinfo(msg)->ai_flags & TP_AI_COMPRESSED0x01000) |
| 358 | comp = ";comp=sigcomp"; |
| 359 | |
| 360 | su_inet_ntopinet_ntop(su->su_familysu_sa.sa_family, SU_ADDR(su)((su)->su_sa.sa_family == 2 ? (void *)&(su)->su_sin .sin_addr : ((su)->su_sa.sa_family == 10 ? (void *)&(su )->su_sin6.sin6_addr : (void *)&(su)->su_sa.sa_data )), name, sizeof(name)); |
| 361 | |
| 362 | snprintf(stamp, TPORT_STAMP_SIZE144, |
| 363 | "%s "MOD_ZU"%zu"" bytes %s %s/[%s]:%u%s%s at %02u:%02u:%02u.%06lu:\n", |
| 364 | what, (size_t)n, via, self->tp_name->tpn_proto, |
| 365 | name, ntohs(su->su_portsu_sin.sin_port), label[0] ? label : "", comp, |
| 366 | hour, minute, second, now.tv_usec); |
| 367 | } |
| 368 | |
| 369 | /** Dump the data from the iovec */ |
| 370 | void tport_dump_iovec(tport_t const *self, msg_t *msg, |
| 371 | size_t n, su_iovec_t const iov[], size_t iovused, |
| 372 | char const *what, char const *how) |
| 373 | { |
| 374 | tport_master_t *mr; |
| 375 | char stamp[TPORT_STAMP_SIZE144]; |
| 376 | size_t i; |
| 377 | |
| 378 | assert(self)((void) sizeof ((self) ? 1 : 0), __extension__ ({ if (self) ; else __assert_fail ("self", "tport_logging.c", 378, __extension__ __PRETTY_FUNCTION__); })); assert(msg)((void) sizeof ((msg) ? 1 : 0), __extension__ ({ if (msg) ; else __assert_fail ("msg", "tport_logging.c", 378, __extension__ __PRETTY_FUNCTION__ ); })); |
| 379 | |
| 380 | mr = self->tp_master; |
| 381 | if (!mr->mr_dump_file) |
| 382 | return; |
| 383 | |
| 384 | tport_stamp(self, msg, stamp, what, n, how, su_now()); |
| 385 | fputs(stamp, mr->mr_dump_file); |
| 386 | |
| 387 | for (i = 0; i < iovused && n > 0; i++) { |
| 388 | size_t len = iov[i].mv_lensiv_len; |
| 389 | if (len > n) |
| 390 | len = n; |
| 391 | if (fwrite(iov[i].mv_basesiv_base, len, 1, mr->mr_dump_file) != 1) |
| 392 | break; |
| 393 | n -= len; |
| 394 | } |
| 395 | |
| 396 | fputs("\v\n", mr->mr_dump_file); |
| 397 | fflush(mr->mr_dump_file); |
| 398 | } |
| 399 | |
| 400 | /** Capture the data from the iovec */ |
| 401 | void tport_capt_msg(tport_t const *self, msg_t *msg, size_t n, |
| 402 | su_iovec_t const iov[], size_t iovused, char const *what) |
| 403 | { |
| 404 | |
| 405 | int buflen = 0, error; |
| 406 | char* buffer = NULL((void*)0); |
| 407 | tport_master_t *mr; |
| 408 | |
| 409 | assert(self)((void) sizeof ((self) ? 1 : 0), __extension__ ({ if (self) ; else __assert_fail ("self", "tport_logging.c", 409, __extension__ __PRETTY_FUNCTION__); })); |
| 410 | |
| 411 | mr = self->tp_master; |
| 412 | |
| 413 | /* If we don't have socket, go out */ |
| 414 | if (!mr->mr_capt_sock) { |
| 415 | su_log("error: capture socket is not open\n"); |
| 416 | return; |
| 417 | } |
| 418 | |
| 419 | switch(mr->mr_prot_ver) |
| 420 | { |
| 421 | |
| 422 | case 3: |
| 423 | buflen = tport_capt_msg_hepv3(self, msg, n, iov, iovused, what, &buffer); |
| 424 | break; |
| 425 | |
| 426 | case 2: |
| 427 | case 1: |
| 428 | buflen = tport_capt_msg_hepv2(self, msg, n, iov, iovused, what, &buffer); |
| 429 | break; |
| 430 | |
| 431 | default: |
| 432 | su_log("error: unsupported hep version\n"); |
| 433 | break; |
| 434 | } |
| 435 | |
| 436 | if(buflen > 0) { |
| 437 | /* check if we have error i.e. capture server is down */ |
| 438 | if ((error = su_soerror(mr->mr_capt_sock))) { |
Although the value stored to 'error' is used in the enclosing expression, the value is never actually read from 'error' | |
| 439 | su_perror("error: tport_logging: capture socket error"); |
| 440 | goto done; |
| 441 | } |
| 442 | |
| 443 | su_send(mr->mr_capt_sock, buffer, buflen, 0)send((mr->mr_capt_sock),(buffer),(buflen),(0)); |
| 444 | } |
| 445 | |
| 446 | |
| 447 | done: |
| 448 | /* Now we release it */ |
| 449 | if(buffer) free(buffer); |
| 450 | return; |
| 451 | } |
| 452 | |
| 453 | /** Capture the data from the iovec */ |
| 454 | int tport_capt_msg_hepv2 (tport_t const *self, msg_t *msg, size_t n, |
| 455 | su_iovec_t const iov[], size_t iovused, char const *what, char **buffer) |
| 456 | { |
| 457 | |
| 458 | int buflen = 0; |
| 459 | su_sockaddr_t const *su, *su_self; |
| 460 | struct hep_hdr hep_header; |
| 461 | struct hep_timehdr hep_time = {0}; |
| 462 | su_time_t now; |
| 463 | #if __sun__ |
| 464 | struct hep_iphdr hep_ipheader = {{{{0}}}}; |
| 465 | #else |
| 466 | struct hep_iphdr hep_ipheader = {{0}}; |
| 467 | #endif |
| 468 | #if SU_HAVE_IN61 |
| 469 | struct hep_ip6hdr hep_ip6header = {{{{0}}}}; |
| 470 | #endif |
| 471 | int eth_frame_len = 16000; |
| 472 | size_t i, dst = 1; |
| 473 | tport_master_t *mr; |
| 474 | |
| 475 | assert(self)((void) sizeof ((self) ? 1 : 0), __extension__ ({ if (self) ; else __assert_fail ("self", "tport_logging.c", 475, __extension__ __PRETTY_FUNCTION__); })); assert(msg)((void) sizeof ((msg) ? 1 : 0), __extension__ ({ if (msg) ; else __assert_fail ("msg", "tport_logging.c", 475, __extension__ __PRETTY_FUNCTION__ ); })); |
| 476 | |
| 477 | su = msg_addr(msg); |
| 478 | su_self = self->tp_pri->pri_primary->tp_addr; |
| 479 | |
| 480 | mr = self->tp_master; |
| 481 | |
| 482 | /* If we don't have socket, go out */ |
| 483 | if (!mr->mr_capt_sock) { |
| 484 | su_log("error: capture socket is not open\n"); |
| 485 | return 0; |
| 486 | } |
| 487 | |
| 488 | /*buffer for ethernet frame*/ |
| 489 | *buffer = (void*)malloc(eth_frame_len); |
| 490 | |
| 491 | /* VOIP Header */ |
| 492 | hep_header.hp_v = mr->mr_prot_ver; |
| 493 | hep_header.hp_f = su->su_familysu_sa.sa_family; |
| 494 | /* Header Length */ |
| 495 | hep_header.hp_l = sizeof(struct hep_hdr); |
| 496 | |
| 497 | /* PROTOCOL */ |
| 498 | if(strcmp(self->tp_name->tpn_proto, "tcp") == 0) hep_header.hp_p = IPPROTO_TCPIPPROTO_TCP; |
| 499 | else if(strcmp(self->tp_name->tpn_proto, "tls") == 0) hep_header.hp_p = IPPROTO_IDPIPPROTO_IDP; /* FAKE*/ |
| 500 | else if(strcmp(self->tp_name->tpn_proto, "sctp") == 0) hep_header.hp_p = IPPROTO_SCTPIPPROTO_SCTP; |
| 501 | else if(strcmp(self->tp_name->tpn_proto, "ws") == 0) hep_header.hp_p = IPPROTO_TCPIPPROTO_TCP; |
| 502 | else if(strcmp(self->tp_name->tpn_proto, "wss") == 0) hep_header.hp_p = IPPROTO_TCPIPPROTO_TCP; |
| 503 | else hep_header.hp_p = IPPROTO_UDPIPPROTO_UDP; /* DEFAULT UDP */ |
| 504 | |
| 505 | /* Check destination */ |
| 506 | if(strncmp("sent", what, 4) == 0) dst = 0; |
| 507 | |
| 508 | /* copy destination and source IPs*/ |
| 509 | if(su->su_familysu_sa.sa_family == AF_INET2) { |
| 510 | |
| 511 | memcpy(dst ? &hep_ipheader.hp_src : &hep_ipheader.hp_dst, &su->su_sin.sin_addr.s_addr, sizeof(su->su_sin.sin_addr.s_addr)); |
| 512 | memcpy(dst ? &hep_ipheader.hp_dst : &hep_ipheader.hp_src, &su_self->su_sin.sin_addr.s_addr, sizeof(su_self->su_sin.sin_addr.s_addr)); |
| 513 | hep_header.hp_l += sizeof(struct hep_iphdr); |
| 514 | } |
| 515 | #if SU_HAVE_IN61 |
| 516 | else { |
| 517 | memcpy(dst ? &hep_ip6header.hp6_src : &hep_ip6header.hp6_dst, &su->su_sin.sin_addr.s_addr, sizeof(su->su_sin.sin_addr.s_addr)); |
| 518 | memcpy(dst ? &hep_ip6header.hp6_dst : &hep_ip6header.hp6_src, &su_self->su_sin.sin_addr.s_addr, sizeof(su_self->su_sin.sin_addr.s_addr)); |
| 519 | hep_header.hp_l += sizeof(struct hep_ip6hdr); |
| 520 | } |
| 521 | #endif |
| 522 | |
| 523 | hep_header.hp_dport = dst ? su_self->su_portsu_sin.sin_port : su->su_portsu_sin.sin_port; |
| 524 | hep_header.hp_sport = dst ? su->su_portsu_sin.sin_port : su_self->su_portsu_sin.sin_port; |
| 525 | |
| 526 | if (hep_header.hp_v == 2){ |
| 527 | hep_header.hp_l += sizeof(struct hep_timehdr); |
| 528 | } |
| 529 | |
| 530 | /* Copy hepheader */ |
| 531 | memset(*buffer, '\0', eth_frame_len); |
| 532 | memcpy(*buffer, &hep_header, sizeof(struct hep_hdr)); |
| 533 | buflen = sizeof(struct hep_hdr); |
| 534 | |
| 535 | if(su->su_familysu_sa.sa_family == AF_INET2) { |
| 536 | memcpy(*buffer + buflen, &hep_ipheader, sizeof(struct hep_iphdr)); |
| 537 | buflen += sizeof(struct hep_iphdr); |
| 538 | } |
| 539 | #if SU_HAVE_IN61 |
| 540 | else if(su->su_familysu_sa.sa_family == AF_INET610) { |
| 541 | memcpy(*buffer+buflen, &hep_ip6header, sizeof(struct hep_ip6hdr)); |
| 542 | buflen += sizeof(struct hep_ip6hdr); |
| 543 | } |
| 544 | #endif |
| 545 | else { |
| 546 | su_perror("error: tport_logging: capture: unsupported protocol family"); |
| 547 | goto done; |
| 548 | } |
| 549 | |
| 550 | /* copy time header */ |
| 551 | if (hep_header.hp_v == 2) { |
| 552 | /* now */ |
| 553 | now = su_now(); |
| 554 | /* should check for ifdef HAVE_LOCALTIME_R instead -_- */ |
| 555 | #if defined(HAVE_GETTIMEOFDAY1) || defined(HAVE_CLOCK_MONOTONIC1) |
| 556 | hep_time.tv_sec = (now.tv_sec - SU_TIME_EPOCH2208988800UL); /* see su_time0.c 'now' is not really 'now', so we decrease it by SU_TIME_EPOCH */ |
| 557 | #else |
| 558 | hep_time.tv_sec = now.tv_sec; |
| 559 | #endif |
| 560 | hep_time.tv_usec = now.tv_usec; |
| 561 | |
| 562 | hep_time.captid = mr->mr_agent_id; |
| 563 | memcpy((char*)*buffer+buflen, &hep_time, sizeof(struct hep_timehdr)); |
| 564 | buflen += sizeof(struct hep_timehdr); |
| 565 | } |
| 566 | |
| 567 | for (i = 0; i < iovused && n > 0; i++) { |
| 568 | size_t len = iov[i].mv_lensiv_len; |
| 569 | if (len > n) |
| 570 | len = n; |
| 571 | /* if the packet too big for us */ |
| 572 | if((buflen + len) > eth_frame_len) |
| 573 | break; |
| 574 | |
| 575 | memcpy(*buffer + buflen , (void*)iov[i].mv_basesiv_base, len); |
| 576 | buflen +=len; |
| 577 | n -= len; |
| 578 | } |
| 579 | |
| 580 | return buflen; |
| 581 | |
| 582 | done: |
| 583 | /* Now we release it */ |
| 584 | if(*buffer) { |
| 585 | free(*buffer); |
| 586 | *buffer = NULL((void*)0); |
| 587 | } |
| 588 | return 0; |
| 589 | } |
| 590 | |
| 591 | |
| 592 | /** Capture the data from the iovec */ |
| 593 | int tport_capt_msg_hepv3 (tport_t const *self, msg_t *msg, size_t n, |
| 594 | su_iovec_t const iov[], size_t iovused, char const *what, char **buffer) |
| 595 | { |
| 596 | |
| 597 | su_sockaddr_t const *su, *su_self; |
| 598 | struct hep_generic *hg=NULL((void*)0); |
| 599 | unsigned int buflen=0, iplen=0,tlen=0, payload_len = 0; |
| 600 | su_time_t now; |
| 601 | hep_chunk_ip4_t src_ip4 = {{0}}, dst_ip4 = {{0}}; |
| 602 | hep_chunk_t payload_chunk; |
| 603 | int orig_n = 0; |
| 604 | |
| 605 | #if SU_HAVE_IN61 |
| 606 | hep_chunk_ip6_t src_ip6 = {{0}}, dst_ip6 = {{0}}; |
| 607 | #endif |
| 608 | |
| 609 | int eth_frame_len = 16000; |
| 610 | size_t i, dst = 1; |
| 611 | tport_master_t *mr; |
| 612 | |
| 613 | assert(self)((void) sizeof ((self) ? 1 : 0), __extension__ ({ if (self) ; else __assert_fail ("self", "tport_logging.c", 613, __extension__ __PRETTY_FUNCTION__); })); assert(msg)((void) sizeof ((msg) ? 1 : 0), __extension__ ({ if (msg) ; else __assert_fail ("msg", "tport_logging.c", 613, __extension__ __PRETTY_FUNCTION__ ); })); |
| 614 | |
| 615 | su = msg_addr(msg); |
| 616 | su_self = self->tp_pri->pri_primary->tp_addr; |
| 617 | |
| 618 | mr = self->tp_master; |
| 619 | |
| 620 | /* If we don't have socket, go out */ |
| 621 | if (!mr->mr_capt_sock) { |
| 622 | su_log("error: capture socket is not open\n"); |
| 623 | return 0; |
| 624 | } |
| 625 | |
| 626 | /*buffer for ethernet frame*/ |
| 627 | |
| 628 | hg = malloc(sizeof(struct hep_generic)); |
| 629 | memset(hg, 0, sizeof(struct hep_generic)); |
| 630 | |
| 631 | /* header set */ |
| 632 | memcpy(hg->header.id, "\x48\x45\x50\x33", 4); |
| 633 | |
| 634 | /* IP proto */ |
| 635 | hg->ip_family.chunk.vendor_id = htons(0x0000); |
| 636 | hg->ip_family.chunk.type_id = htons(0x0001); |
| 637 | hg->ip_family.data = su->su_familysu_sa.sa_family; |
| 638 | hg->ip_family.chunk.length = htons(sizeof(hg->ip_family)); |
| 639 | |
| 640 | /* PROTOCOL */ |
| 641 | if(strcmp(self->tp_name->tpn_proto, "tcp") == 0) hg->ip_proto.data = IPPROTO_TCPIPPROTO_TCP; |
| 642 | else if(strcmp(self->tp_name->tpn_proto, "tls") == 0) hg->ip_proto.data = IPPROTO_IDPIPPROTO_IDP; /* FAKE*/ |
| 643 | else if(strcmp(self->tp_name->tpn_proto, "sctp") == 0) hg->ip_proto.data = IPPROTO_SCTPIPPROTO_SCTP; |
| 644 | else if(strcmp(self->tp_name->tpn_proto, "ws") == 0) hg->ip_proto.data = IPPROTO_TCPIPPROTO_TCP; |
| 645 | else if(strcmp(self->tp_name->tpn_proto, "wss") == 0) hg->ip_proto.data = IPPROTO_TCPIPPROTO_TCP; |
| 646 | else hg->ip_proto.data = IPPROTO_UDPIPPROTO_UDP; /* DEFAULT UDP */ |
| 647 | |
| 648 | /* Proto ID */ |
| 649 | hg->ip_proto.chunk.vendor_id = htons(0x0000); |
| 650 | hg->ip_proto.chunk.type_id = htons(0x0002); |
| 651 | hg->ip_proto.chunk.length = htons(sizeof(hg->ip_proto)); |
| 652 | |
| 653 | /* Check destination */ |
| 654 | if(strncmp("sent", what, 4) == 0) dst = 0; |
| 655 | |
| 656 | /* copy destination and source IPs*/ |
| 657 | if(su->su_familysu_sa.sa_family == AF_INET2) { |
| 658 | |
| 659 | /* SRC IP */ |
| 660 | src_ip4.chunk.vendor_id = htons(0x0000); |
| 661 | src_ip4.chunk.type_id = htons(0x0003); |
| 662 | memcpy(dst ? &src_ip4.data : &dst_ip4.data, &su->su_sin.sin_addr.s_addr, sizeof(su->su_sin.sin_addr.s_addr)); |
| 663 | src_ip4.chunk.length = htons(sizeof(src_ip4)); |
| 664 | |
| 665 | /* DST IP */ |
| 666 | dst_ip4.chunk.vendor_id = htons(0x0000); |
| 667 | dst_ip4.chunk.type_id = htons(0x0004); |
| 668 | memcpy(dst ? &dst_ip4.data : &src_ip4.data, &su_self->su_sin.sin_addr.s_addr, sizeof(su_self->su_sin.sin_addr.s_addr)); |
| 669 | dst_ip4.chunk.length = htons(sizeof(dst_ip4)); |
| 670 | |
| 671 | iplen = sizeof(dst_ip4) + sizeof(src_ip4); |
| 672 | } |
| 673 | #if SU_HAVE_IN61 |
| 674 | else if(su->su_familysu_sa.sa_family == AF_INET610) { |
| 675 | |
| 676 | /* SRC IPv6 */ |
| 677 | src_ip6.chunk.vendor_id = htons(0x0000); |
| 678 | src_ip6.chunk.type_id = htons(0x0005); |
| 679 | memcpy(dst ? &src_ip6.data : &dst_ip6.data, &su->su_sin.sin_addr.s_addr, sizeof(su->su_sin.sin_addr.s_addr)); |
| 680 | src_ip6.chunk.length = htons(sizeof(src_ip6)); |
| 681 | |
| 682 | /* DST IPv6 */ |
| 683 | dst_ip6.chunk.vendor_id = htons(0x0000); |
| 684 | dst_ip6.chunk.type_id = htons(0x0006); |
| 685 | memcpy(dst ? &dst_ip6.data : &src_ip6.data, &su_self->su_sin.sin_addr.s_addr, sizeof(su_self->su_sin.sin_addr.s_addr)); |
| 686 | dst_ip6.chunk.length = htons(sizeof(dst_ip6)); |
| 687 | |
| 688 | iplen = sizeof(dst_ip6) + sizeof(src_ip6); |
| 689 | } |
| 690 | #endif |
| 691 | else { |
| 692 | su_perror("error: tport_logging hepv3: capture: unsupported protocol family"); |
| 693 | goto done; |
| 694 | } |
| 695 | |
| 696 | /* SRC PORT */ |
| 697 | hg->src_port.chunk.vendor_id = htons(0x0000); |
| 698 | hg->src_port.chunk.type_id = htons(0x0007); |
| 699 | hg->src_port.data = dst ? su->su_portsu_sin.sin_port : su_self->su_portsu_sin.sin_port; |
| 700 | hg->src_port.chunk.length = htons(sizeof(hg->src_port)); |
| 701 | |
| 702 | /* DST PORT */ |
| 703 | hg->dst_port.chunk.vendor_id = htons(0x0000); |
| 704 | hg->dst_port.chunk.type_id = htons(0x0008); |
| 705 | hg->dst_port.data = dst ? su_self->su_portsu_sin.sin_port : su->su_portsu_sin.sin_port; |
| 706 | hg->dst_port.chunk.length = htons(sizeof(hg->dst_port)); |
| 707 | |
| 708 | |
| 709 | /* TIMESTAMP SEC */ |
| 710 | hg->time_sec.chunk.vendor_id = htons(0x0000); |
| 711 | hg->time_sec.chunk.type_id = htons(0x0009); |
| 712 | hg->time_sec.chunk.length = htons(sizeof(hg->time_sec)); |
| 713 | |
| 714 | now = su_now(); |
| 715 | /* should check for ifdef HAVE_LOCALTIME_R instead -_- */ |
| 716 | #if defined(HAVE_GETTIMEOFDAY1) || defined(HAVE_CLOCK_MONOTONIC1) |
| 717 | hg->time_sec.data = htonl(now.tv_sec - SU_TIME_EPOCH2208988800UL); /* see su_time0.c 'now' is not really 'now', so we decrease it by SU_TIME_EPOCH */ |
| 718 | #else |
| 719 | hg->time_sec.data = htonl(now.tv_sec); |
| 720 | #endif |
| 721 | |
| 722 | /* TIMESTAMP USEC */ |
| 723 | hg->time_usec.chunk.vendor_id = htons(0x0000); |
| 724 | hg->time_usec.chunk.type_id = htons(0x000a); |
| 725 | hg->time_usec.data = htonl(now.tv_usec); |
| 726 | hg->time_usec.chunk.length = htons(sizeof(hg->time_usec)); |
| 727 | |
| 728 | /* Protocol TYPE */ |
| 729 | hg->proto_t.chunk.vendor_id = htons(0x0000); |
| 730 | hg->proto_t.chunk.type_id = htons(0x000b); |
| 731 | hg->proto_t.data = 0x001; //SIP |
| 732 | hg->proto_t.chunk.length = htons(sizeof(hg->proto_t)); |
| 733 | |
| 734 | /* Capture ID */ |
| 735 | hg->capt_id.chunk.vendor_id = htons(0x0000); |
| 736 | hg->capt_id.chunk.type_id = htons(0x000c); |
| 737 | hg->capt_id.data = htonl(mr->mr_agent_id); |
| 738 | hg->capt_id.chunk.length = htons(sizeof(hg->capt_id)); |
| 739 | |
| 740 | |
| 741 | /* Payload caclulation */ |
| 742 | orig_n = n; |
| 743 | for (i = 0; i < iovused && n > 0; i++) { |
| 744 | size_t len = iov[i].mv_lensiv_len; |
| 745 | if (len > n) len = n; |
| 746 | if((payload_len + len) > eth_frame_len) break; |
| 747 | payload_len +=len; |
| 748 | n -= len; |
| 749 | } |
| 750 | /* restore n */ |
| 751 | n = orig_n; |
| 752 | |
| 753 | /* Payload */ |
| 754 | payload_chunk.vendor_id = htons(0x0000); |
| 755 | payload_chunk.type_id = htons(0x000f); |
| 756 | payload_chunk.length = htons(sizeof(payload_chunk) + payload_len); |
| 757 | |
| 758 | tlen = sizeof(struct hep_generic) + payload_len + iplen + sizeof(hep_chunk_t); |
| 759 | |
| 760 | /* total */ |
| 761 | hg->header.length = htons(tlen); |
| 762 | |
| 763 | *buffer = (void*)malloc(tlen); |
| 764 | |
| 765 | if (*buffer==NULL((void*)0)){ |
| 766 | su_perror("error: tport_logging hepv3: no memory for buffer"); |
| 767 | goto done; |
| 768 | } |
| 769 | |
| 770 | memcpy((void*) *buffer, hg, sizeof(struct hep_generic)); |
| 771 | buflen = sizeof(struct hep_generic); |
| 772 | |
| 773 | /* IPv4 */ |
| 774 | if(su->su_familysu_sa.sa_family == AF_INET2) { |
| 775 | /* SRC IP */ |
| 776 | memcpy((char*) *buffer+buflen, &src_ip4, sizeof(struct hep_chunk_ip4)); |
| 777 | buflen += sizeof(struct hep_chunk_ip4); |
| 778 | |
| 779 | memcpy((char*) *buffer+buflen, &dst_ip4, sizeof(struct hep_chunk_ip4)); |
| 780 | buflen += sizeof(struct hep_chunk_ip4); |
| 781 | } |
| 782 | #if SU_HAVE_IN61 |
| 783 | /* IPv6 */ |
| 784 | else if(su->su_familysu_sa.sa_family == AF_INET610) { |
| 785 | /* SRC IPv6 */ |
| 786 | memcpy((char*) *buffer+buflen, &src_ip6, sizeof(struct hep_chunk_ip6)); |
| 787 | buflen += sizeof(struct hep_chunk_ip6); |
| 788 | |
| 789 | memcpy((char*) *buffer+buflen, &dst_ip6, sizeof(struct hep_chunk_ip6)); |
| 790 | buflen += sizeof(struct hep_chunk_ip6); |
| 791 | } |
| 792 | #endif |
| 793 | |
| 794 | /* PAYLOAD CHUNK */ |
| 795 | memcpy((char*) *buffer+buflen, &payload_chunk, sizeof(struct hep_chunk)); |
| 796 | buflen += sizeof(struct hep_chunk); |
| 797 | |
| 798 | /* PAYLOAD */ |
| 799 | for (i = 0; i < iovused && n > 0; i++) { |
| 800 | size_t len = iov[i].mv_lensiv_len; |
| 801 | if (len > n) len = n; |
| 802 | /* if the packet too big for us */ |
| 803 | if((buflen + len) > eth_frame_len) |
| 804 | break; |
| 805 | |
| 806 | memcpy(*buffer + buflen , (void*)iov[i].mv_basesiv_base, len); |
| 807 | buflen +=len; |
| 808 | n -= len; |
| 809 | } |
| 810 | |
| 811 | free(hg); |
| 812 | return buflen; |
| 813 | |
| 814 | done: |
| 815 | /* Now we release it */ |
| 816 | if(hg) free(hg); |
| 817 | return 0; |
| 818 | } |
| 819 | |
| 820 | |
| 821 | /** Log the message. */ |
| 822 | void tport_log_msg(tport_t *self, msg_t *msg, |
| 823 | char const *what, char const *via, |
| 824 | su_time_t now) |
| 825 | { |
| 826 | msg_iovec_t iov[80]; |
| 827 | size_t i, iovlen = msg_iovec(msg, iov, 80); |
| 828 | size_t n; |
| 829 | int skip_lf = 0; |
| 830 | char *buffer = NULL((void*)0); |
| 831 | size_t buffer_size = 0; |
| 832 | size_t buffer_pos = 0; |
| 833 | size_t bytes_written = 0; |
| 834 | |
| 835 | #define MSG_SEPARATOR"------------------------------------------------------------------------\n" \ |
| 836 | "------------------------------------------------------------------------\n" |
| 837 | |
| 838 | for (i = n = 0; i < iovlen && i < 80; i++) |
| 839 | n += iov[i].mv_lensiv_len; |
| 840 | |
| 841 | buffer_size = sizeof(char) * n + 1 + TPORT_STAMP_SIZE144 + sizeof(MSG_SEPARATOR"------------------------------------------------------------------------\n"); |
| 842 | if (buffer_size > 16000) { |
| 843 | buffer_size = 16000; |
| 844 | } |
| 845 | |
| 846 | buffer = malloc(buffer_size); |
| 847 | buffer[0] = '\0'; |
| 848 | |
| 849 | tport_stamp(self, msg, buffer, what, n, via, now); |
| 850 | buffer_pos = strlen(buffer); |
| 851 | if (buffer_pos < buffer_size) { |
| 852 | bytes_written = snprintf(buffer + buffer_pos, buffer_size - buffer_pos, "%s", MSG_SEPARATOR"------------------------------------------------------------------------\n"); |
| 853 | if (bytes_written > 0) { |
| 854 | buffer_pos += bytes_written; |
| 855 | } |
| 856 | } |
| 857 | |
| 858 | for (i = 0; buffer_pos < buffer_size && i < iovlen && i < 80; i++) { |
| 859 | char *s = iov[i].mv_basesiv_base, *end = s + iov[i].mv_lensiv_len; |
| 860 | |
| 861 | if (skip_lf && s < end && s[0] == '\n') { s++; skip_lf = 0; } |
| 862 | |
| 863 | while (s < end) { |
| 864 | if (s[0] == '\0') { |
| 865 | break; |
| 866 | } |
| 867 | |
| 868 | n = su_strncspn(s, end - s, "\r\n"); |
| 869 | if (buffer_pos > buffer_size) { |
| 870 | break; |
| 871 | } |
| 872 | bytes_written = snprintf(buffer + buffer_pos, buffer_size - buffer_pos, "%.*s", (int)n, s); |
| 873 | if (bytes_written > 0) { |
| 874 | buffer_pos += bytes_written; |
| 875 | } |
| 876 | |
| 877 | s += n; |
| 878 | |
| 879 | if (s == end) |
| 880 | break; |
| 881 | |
| 882 | if (buffer_pos < buffer_size) { |
| 883 | buffer[buffer_pos++] = '\n'; |
| 884 | } |
| 885 | /* Skip eol */ |
| 886 | if (s[0] == '\r') { |
| 887 | s++; |
| 888 | if (s == end) { |
| 889 | skip_lf = 1; |
| 890 | continue; |
| 891 | } |
| 892 | } |
| 893 | |
| 894 | if (s[0] == '\n') { |
| 895 | s++; |
| 896 | } |
| 897 | } |
| 898 | } |
| 899 | |
| 900 | if (buffer_pos >= buffer_size) { |
| 901 | buffer_pos = buffer_size - 1; |
| 902 | } |
| 903 | buffer[buffer_pos] = '\0'; |
| 904 | su_log("%s\n", buffer); |
| 905 | free(buffer); |
| 906 | } |