|
@@ -21,7 +21,9 @@
|
|
|
static int (*realconnect)(CONNECT_SIG) = 0;
|
|
|
static int (*realsocket)(SOCKET_SIG) = 0;
|
|
|
|
|
|
+#ifdef NETCON_INTERCEPT
|
|
|
static int rpc_count;
|
|
|
+#endif
|
|
|
|
|
|
static pthread_mutex_t lock;
|
|
|
void rpc_mutex_init() {
|
|
@@ -115,13 +117,17 @@ int rpc_send_command(char *path, int cmd, int forfd, void *data, int len)
|
|
|
pthread_mutex_lock(&lock);
|
|
|
char c, padding[] = {0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89};
|
|
|
char cmdbuf[BUF_SZ], CANARY[TOKEN_SIZE], metabuf[BUF_SZ];
|
|
|
- memcpy(CANARY+CANARY_SIZE, padding, TOKEN_SIZE);
|
|
|
+ memcpy(CANARY+CANARY_SIZE, padding, sizeof(padding));
|
|
|
uint64_t canary_num;
|
|
|
// ephemeral RPC socket used only for this command
|
|
|
int rpc_sock = rpc_join(path);
|
|
|
// Generate token
|
|
|
int fdrand = open("/dev/urandom", O_RDONLY);
|
|
|
- read(fdrand, &CANARY, CANARY_SIZE);
|
|
|
+
|
|
|
+ if(read(fdrand, &CANARY, CANARY_SIZE) < 0) {
|
|
|
+ fprintf(stderr,"unable to read from /dev/urandom for RPC canary data\n");
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
memcpy(&canary_num, CANARY, CANARY_SIZE);
|
|
|
cmdbuf[CMD_ID_IDX] = cmd;
|
|
|
memcpy(&cmdbuf[CANARY_IDX], &canary_num, CANARY_SIZE);
|
|
@@ -153,7 +159,10 @@ int rpc_send_command(char *path, int cmd, int forfd, void *data, int len)
|
|
|
errno = 0;
|
|
|
}
|
|
|
// Write token to corresponding data stream
|
|
|
- read(rpc_sock, &c, 1);
|
|
|
+ if(read(rpc_sock, &c, 1) < 0) {
|
|
|
+ fprintf(stderr, "unable to read RPC ACK byte from service.\n");
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
if(c == 'z' && n_write > 0 && forfd > -1){
|
|
|
if(send(forfd, &CANARY, TOKEN_SIZE, 0) < 0) {
|
|
|
fprintf(stderr,"unable to write canary to stream\n");
|
|
@@ -269,4 +278,4 @@ ssize_t sock_fd_read(int sock, void *buf, ssize_t bufsize, int *fd)
|
|
|
}
|
|
|
}
|
|
|
return size;
|
|
|
-}
|
|
|
+}
|