505 lines
10 KiB
C
505 lines
10 KiB
C
/*
|
|
* Copyright (c) 2017 Intel Corporation
|
|
* Copyright (c) 2019 Nordic Semiconductor ASA
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*/
|
|
|
|
#include <init.h>
|
|
|
|
#include <logging/log.h>
|
|
#include <net/net_context.h>
|
|
#include <net/net_ip.h>
|
|
#include <net/net_pkt.h>
|
|
#include <shell/shell_telnet.h>
|
|
|
|
#include "shell_telnet_protocol.h"
|
|
|
|
SHELL_TELNET_DEFINE(shell_transport_telnet);
|
|
SHELL_DEFINE(shell_telnet, CONFIG_SHELL_PROMPT_TELNET, &shell_transport_telnet,
|
|
CONFIG_SHELL_TELNET_LOG_MESSAGE_QUEUE_SIZE,
|
|
CONFIG_SHELL_TELNET_LOG_MESSAGE_QUEUE_TIMEOUT,
|
|
SHELL_FLAG_OLF_CRLF);
|
|
|
|
LOG_MODULE_REGISTER(shell_telnet, CONFIG_SHELL_TELNET_LOG_LEVEL);
|
|
|
|
struct shell_telnet *sh_telnet;
|
|
|
|
/* Various definitions mapping the TELNET service configuration options */
|
|
#define TELNET_PORT CONFIG_SHELL_TELNET_PORT
|
|
#define TELNET_LINE_SIZE CONFIG_SHELL_TELNET_LINE_BUF_SIZE
|
|
#define TELNET_TIMEOUT K_MSEC(CONFIG_SHELL_TELNET_SEND_TIMEOUT)
|
|
|
|
#define TELNET_MIN_MSG 2
|
|
|
|
/* Basic TELNET implmentation. */
|
|
|
|
static void telnet_end_client_connection(void)
|
|
{
|
|
struct net_pkt *pkt;
|
|
|
|
(void)net_context_put(sh_telnet->client_ctx);
|
|
|
|
sh_telnet->client_ctx = NULL;
|
|
sh_telnet->output_lock = false;
|
|
|
|
k_timer_stop(&sh_telnet->send_timer);
|
|
|
|
/* Flush the RX FIFO */
|
|
while ((pkt = k_fifo_get(&sh_telnet->rx_fifo, K_NO_WAIT)) != NULL) {
|
|
net_pkt_unref(pkt);
|
|
}
|
|
}
|
|
|
|
static void telnet_sent_cb(struct net_context *client,
|
|
int status, void *user_data)
|
|
{
|
|
if (status < 0) {
|
|
telnet_end_client_connection();
|
|
LOG_ERR("Could not send packet %d", status);
|
|
}
|
|
}
|
|
|
|
static void telnet_command_send_reply(u8_t *msg, u16_t len)
|
|
{
|
|
int err;
|
|
|
|
if (sh_telnet->client_ctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
err = net_context_send(sh_telnet->client_ctx, msg, len, telnet_sent_cb,
|
|
K_FOREVER, NULL);
|
|
if (err < 0) {
|
|
LOG_ERR("Failed to send command %d, shutting down", err);
|
|
telnet_end_client_connection();
|
|
}
|
|
}
|
|
|
|
static void telnet_reply_ay_command(void)
|
|
{
|
|
static const char alive[] = "Zephyr at your service\r\n";
|
|
|
|
telnet_command_send_reply((u8_t *)alive, strlen(alive));
|
|
}
|
|
|
|
static void telnet_reply_do_command(struct telnet_simple_command *cmd)
|
|
{
|
|
switch (cmd->opt) {
|
|
case NVT_OPT_SUPR_GA:
|
|
cmd->op = NVT_CMD_WILL;
|
|
break;
|
|
default:
|
|
cmd->op = NVT_CMD_WONT;
|
|
break;
|
|
}
|
|
|
|
telnet_command_send_reply((u8_t *)cmd,
|
|
sizeof(struct telnet_simple_command));
|
|
}
|
|
|
|
static void telnet_reply_command(struct telnet_simple_command *cmd)
|
|
{
|
|
if (!cmd->iac) {
|
|
return;
|
|
}
|
|
|
|
switch (cmd->op) {
|
|
case NVT_CMD_AO:
|
|
/* OK, no output then */
|
|
sh_telnet->output_lock = true;
|
|
sh_telnet->line_out.len = 0;
|
|
k_timer_stop(&sh_telnet->send_timer);
|
|
break;
|
|
case NVT_CMD_AYT:
|
|
telnet_reply_ay_command();
|
|
break;
|
|
case NVT_CMD_DO:
|
|
telnet_reply_do_command(cmd);
|
|
break;
|
|
default:
|
|
LOG_DBG("Operation %u not handled", cmd->op);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static int telnet_send(void)
|
|
{
|
|
int err;
|
|
|
|
if (sh_telnet->line_out.len == 0) {
|
|
return 0;
|
|
}
|
|
|
|
if (sh_telnet->client_ctx == NULL) {
|
|
return -ENOTCONN;
|
|
}
|
|
|
|
err = net_context_send(sh_telnet->client_ctx, sh_telnet->line_out.buf,
|
|
sh_telnet->line_out.len, telnet_sent_cb,
|
|
K_FOREVER, NULL);
|
|
if (err < 0) {
|
|
LOG_ERR("Failed to send %d, shutting down", err);
|
|
telnet_end_client_connection();
|
|
return err;
|
|
}
|
|
|
|
/* We reinitialize the line buffer */
|
|
sh_telnet->line_out.len = 0;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void telnet_send_prematurely(struct k_timer *timer)
|
|
{
|
|
(void)telnet_send();
|
|
}
|
|
|
|
static inline bool telnet_handle_command(struct net_pkt *pkt)
|
|
{
|
|
/* Commands are two or three bytes. */
|
|
NET_PKT_DATA_ACCESS_CONTIGUOUS_DEFINE(cmd_access, u16_t);
|
|
struct telnet_simple_command *cmd;
|
|
|
|
cmd = (struct telnet_simple_command *)net_pkt_get_data(pkt,
|
|
&cmd_access);
|
|
if (!cmd || cmd->iac != NVT_CMD_IAC) {
|
|
return false;
|
|
}
|
|
|
|
if (IS_ENABLED(CONFIG_SHELL_TELNET_SUPPORT_COMMAND)) {
|
|
LOG_DBG("Got a command %u/%u/%u", cmd->iac, cmd->op, cmd->opt);
|
|
telnet_reply_command(cmd);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static void telnet_recv(struct net_context *client,
|
|
struct net_pkt *pkt,
|
|
union net_ip_header *ip_hdr,
|
|
union net_proto_header *proto_hdr,
|
|
int status,
|
|
void *user_data)
|
|
{
|
|
size_t len;
|
|
|
|
if (!pkt || status) {
|
|
telnet_end_client_connection();
|
|
|
|
LOG_DBG("Telnet client dropped (AF_INET%s) status %d",
|
|
net_context_get_family(client) == AF_INET ?
|
|
"" : "6", status);
|
|
return;
|
|
}
|
|
|
|
len = net_pkt_remaining_data(pkt);
|
|
if (len < TELNET_MIN_MSG) {
|
|
LOG_DBG("Packet smaller than minimum length");
|
|
goto unref;
|
|
}
|
|
|
|
if (telnet_handle_command(pkt)) {
|
|
LOG_DBG("Handled command");
|
|
goto unref;
|
|
}
|
|
|
|
/* Fifo add */
|
|
k_fifo_put(&sh_telnet->rx_fifo, pkt);
|
|
|
|
sh_telnet->shell_handler(SHELL_TRANSPORT_EVT_RX_RDY,
|
|
sh_telnet->shell_context);
|
|
|
|
return;
|
|
|
|
unref:
|
|
net_pkt_unref(pkt);
|
|
}
|
|
|
|
static void telnet_accept(struct net_context *client,
|
|
struct sockaddr *addr,
|
|
socklen_t addrlen,
|
|
int error,
|
|
void *user_data)
|
|
{
|
|
if (error) {
|
|
LOG_ERR("Error %d", error);
|
|
goto error;
|
|
}
|
|
|
|
if (sh_telnet->client_ctx) {
|
|
LOG_INF("A telnet client is already in.");
|
|
goto error;
|
|
}
|
|
|
|
if (net_context_recv(client, telnet_recv, 0, NULL)) {
|
|
LOG_ERR("Unable to setup reception (family %u)",
|
|
net_context_get_family(client));
|
|
goto error;
|
|
}
|
|
|
|
net_context_set_accepting(client, false);
|
|
|
|
LOG_DBG("Telnet client connected (family AF_INET%s)",
|
|
net_context_get_family(client) == AF_INET ? "" : "6");
|
|
|
|
sh_telnet->client_ctx = client;
|
|
|
|
return;
|
|
error:
|
|
net_context_put(client);
|
|
}
|
|
|
|
static void telnet_setup_server(struct net_context **ctx, sa_family_t family,
|
|
struct sockaddr *addr, socklen_t addrlen)
|
|
{
|
|
if (net_context_get(family, SOCK_STREAM, IPPROTO_TCP, ctx)) {
|
|
LOG_ERR("No context available");
|
|
goto error;
|
|
}
|
|
|
|
if (net_context_bind(*ctx, addr, addrlen)) {
|
|
LOG_ERR("Cannot bind on family AF_INET%s",
|
|
family == AF_INET ? "" : "6");
|
|
goto error;
|
|
}
|
|
|
|
if (net_context_listen(*ctx, 0)) {
|
|
LOG_ERR("Cannot listen on");
|
|
goto error;
|
|
}
|
|
|
|
if (net_context_accept(*ctx, telnet_accept, K_NO_WAIT, NULL)) {
|
|
LOG_ERR("Cannot accept");
|
|
goto error;
|
|
}
|
|
|
|
LOG_DBG("Telnet console enabled on AF_INET%s",
|
|
family == AF_INET ? "" : "6");
|
|
|
|
return;
|
|
error:
|
|
LOG_ERR("Unable to start telnet on AF_INET%s",
|
|
family == AF_INET ? "" : "6");
|
|
|
|
if (*ctx) {
|
|
(void)net_context_put(*ctx);
|
|
*ctx = NULL;
|
|
}
|
|
}
|
|
|
|
static int telnet_init(void)
|
|
{
|
|
if (IS_ENABLED(CONFIG_NET_IPV4)) {
|
|
struct sockaddr_in any_addr4 = {
|
|
.sin_family = AF_INET,
|
|
.sin_port = htons(TELNET_PORT),
|
|
.sin_addr = INADDR_ANY_INIT
|
|
};
|
|
static struct net_context *ctx4;
|
|
|
|
telnet_setup_server(&ctx4, AF_INET,
|
|
(struct sockaddr *)&any_addr4,
|
|
sizeof(any_addr4));
|
|
}
|
|
|
|
if (IS_ENABLED(CONFIG_NET_IPV6)) {
|
|
struct sockaddr_in6 any_addr6 = {
|
|
.sin6_family = AF_INET6,
|
|
.sin6_port = htons(TELNET_PORT),
|
|
.sin6_addr = IN6ADDR_ANY_INIT
|
|
};
|
|
static struct net_context *ctx6;
|
|
|
|
telnet_setup_server(&ctx6, AF_INET6,
|
|
(struct sockaddr *)&any_addr6,
|
|
sizeof(any_addr6));
|
|
}
|
|
|
|
LOG_INF("Telnet shell backend initialized");
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Shell API */
|
|
|
|
static int init(const struct shell_transport *transport,
|
|
const void *config,
|
|
shell_transport_handler_t evt_handler,
|
|
void *context)
|
|
{
|
|
int err;
|
|
|
|
sh_telnet = (struct shell_telnet *)transport->ctx;
|
|
|
|
err = telnet_init();
|
|
if (err != 0) {
|
|
return err;
|
|
}
|
|
|
|
memset(sh_telnet, 0, sizeof(struct shell_telnet));
|
|
|
|
sh_telnet->shell_handler = evt_handler;
|
|
sh_telnet->shell_context = context;
|
|
|
|
k_fifo_init(&sh_telnet->rx_fifo);
|
|
k_timer_init(&sh_telnet->send_timer, telnet_send_prematurely, NULL);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int uninit(const struct shell_transport *transport)
|
|
{
|
|
if (sh_telnet == NULL) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int enable(const struct shell_transport *transport, bool blocking)
|
|
{
|
|
if (sh_telnet == NULL) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int write(const struct shell_transport *transport,
|
|
const void *data, size_t length, size_t *cnt)
|
|
{
|
|
struct shell_telnet_line_buf *lb;
|
|
size_t copy_len;
|
|
int err;
|
|
u32_t timeout;
|
|
|
|
if (sh_telnet == NULL) {
|
|
*cnt = 0;
|
|
return -ENODEV;
|
|
}
|
|
|
|
if (sh_telnet->client_ctx == NULL || sh_telnet->output_lock) {
|
|
*cnt = length;
|
|
return 0;
|
|
}
|
|
|
|
*cnt = 0;
|
|
lb = &sh_telnet->line_out;
|
|
|
|
/* Stop the transmission timer, so it does not interrupt the operation.
|
|
*/
|
|
timeout = k_timer_remaining_get(&sh_telnet->send_timer);
|
|
k_timer_stop(&sh_telnet->send_timer);
|
|
|
|
do {
|
|
if (lb->len + length - *cnt > TELNET_LINE_SIZE) {
|
|
copy_len = TELNET_LINE_SIZE - lb->len;
|
|
} else {
|
|
copy_len = length - *cnt;
|
|
}
|
|
|
|
memcpy(lb->buf + lb->len, (u8_t *)data + *cnt, copy_len);
|
|
lb->len += copy_len;
|
|
|
|
/* Send the data immediately if the buffer is full or line feed
|
|
* is recognized.
|
|
*/
|
|
if (lb->buf[lb->len - 1] == '\n' ||
|
|
lb->len == TELNET_LINE_SIZE) {
|
|
err = telnet_send();
|
|
if (err != 0) {
|
|
*cnt = length;
|
|
return err;
|
|
}
|
|
}
|
|
|
|
*cnt += copy_len;
|
|
} while (*cnt < length);
|
|
|
|
if (lb->len > 0) {
|
|
/* Check if the timer was already running, initialize otherwise.
|
|
*/
|
|
timeout = (timeout == 0) ? TELNET_TIMEOUT : timeout;
|
|
|
|
k_timer_start(&sh_telnet->send_timer, timeout, K_NO_WAIT);
|
|
}
|
|
|
|
sh_telnet->shell_handler(SHELL_TRANSPORT_EVT_TX_RDY,
|
|
sh_telnet->shell_context);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int read(const struct shell_transport *transport,
|
|
void *data, size_t length, size_t *cnt)
|
|
{
|
|
struct net_pkt *pkt;
|
|
size_t read_len;
|
|
bool flush = true;
|
|
|
|
if (sh_telnet == NULL) {
|
|
return -ENODEV;
|
|
}
|
|
|
|
if (sh_telnet->client_ctx == NULL) {
|
|
goto no_data;
|
|
}
|
|
|
|
pkt = k_fifo_peek_head(&sh_telnet->rx_fifo);
|
|
if (pkt == NULL) {
|
|
goto no_data;
|
|
}
|
|
|
|
read_len = net_pkt_remaining_data(pkt);
|
|
if (read_len > length) {
|
|
read_len = length;
|
|
flush = false;
|
|
}
|
|
|
|
*cnt = read_len;
|
|
if (net_pkt_read(pkt, data, read_len) < 0) {
|
|
/* Failed to read, get rid of the faulty packet. */
|
|
LOG_ERR("Failed to read net packet.");
|
|
*cnt = 0;
|
|
flush = true;
|
|
}
|
|
|
|
if (flush) {
|
|
(void)k_fifo_get(&sh_telnet->rx_fifo, K_NO_WAIT);
|
|
net_pkt_unref(pkt);
|
|
}
|
|
|
|
return 0;
|
|
|
|
no_data:
|
|
*cnt = 0;
|
|
return 0;
|
|
}
|
|
|
|
const struct shell_transport_api shell_telnet_transport_api = {
|
|
.init = init,
|
|
.uninit = uninit,
|
|
.enable = enable,
|
|
.write = write,
|
|
.read = read
|
|
};
|
|
|
|
static int enable_shell_telnet(struct device *arg)
|
|
{
|
|
ARG_UNUSED(arg);
|
|
|
|
bool log_backend = CONFIG_SHELL_TELNET_INIT_LOG_LEVEL > 0;
|
|
u32_t level = (CONFIG_SHELL_TELNET_INIT_LOG_LEVEL > LOG_LEVEL_DBG) ?
|
|
CONFIG_LOG_MAX_LEVEL : CONFIG_SHELL_TELNET_INIT_LOG_LEVEL;
|
|
|
|
return shell_init(&shell_telnet, NULL, true, log_backend, level);
|
|
}
|
|
|
|
SYS_INIT(enable_shell_telnet, APPLICATION, 0);
|
|
|
|
const struct shell *shell_backend_telnet_get_ptr(void)
|
|
{
|
|
return &shell_telnet;
|
|
}
|