shell_telnet.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507
  1. /*
  2. * Copyright (c) 2017 Intel Corporation
  3. * Copyright (c) 2019 Nordic Semiconductor ASA
  4. *
  5. * SPDX-License-Identifier: Apache-2.0
  6. */
  7. #include <init.h>
  8. #include <logging/log.h>
  9. #include <net/net_context.h>
  10. #include <net/net_ip.h>
  11. #include <net/net_pkt.h>
  12. #include <shell/shell_telnet.h>
  13. #include "shell_telnet_protocol.h"
  14. SHELL_TELNET_DEFINE(shell_transport_telnet);
  15. SHELL_DEFINE(shell_telnet, CONFIG_SHELL_PROMPT_TELNET, &shell_transport_telnet,
  16. CONFIG_SHELL_TELNET_LOG_MESSAGE_QUEUE_SIZE,
  17. CONFIG_SHELL_TELNET_LOG_MESSAGE_QUEUE_TIMEOUT,
  18. SHELL_FLAG_OLF_CRLF);
  19. LOG_MODULE_REGISTER(shell_telnet, CONFIG_SHELL_TELNET_LOG_LEVEL);
  20. struct shell_telnet *sh_telnet;
  21. /* Various definitions mapping the TELNET service configuration options */
  22. #define TELNET_PORT CONFIG_SHELL_TELNET_PORT
  23. #define TELNET_LINE_SIZE CONFIG_SHELL_TELNET_LINE_BUF_SIZE
  24. #define TELNET_TIMEOUT CONFIG_SHELL_TELNET_SEND_TIMEOUT
  25. #define TELNET_MIN_COMMAND_LEN 2
  26. /* Basic TELNET implmentation. */
  27. static void telnet_end_client_connection(void)
  28. {
  29. struct net_pkt *pkt;
  30. (void)net_context_put(sh_telnet->client_ctx);
  31. sh_telnet->client_ctx = NULL;
  32. sh_telnet->output_lock = false;
  33. k_work_cancel_delayable_sync(&sh_telnet->send_work,
  34. &sh_telnet->work_sync);
  35. /* Flush the RX FIFO */
  36. while ((pkt = k_fifo_get(&sh_telnet->rx_fifo, K_NO_WAIT)) != NULL) {
  37. net_pkt_unref(pkt);
  38. }
  39. }
  40. static void telnet_sent_cb(struct net_context *client,
  41. int status, void *user_data)
  42. {
  43. if (status < 0) {
  44. telnet_end_client_connection();
  45. LOG_ERR("Could not send packet %d", status);
  46. }
  47. }
  48. static void telnet_command_send_reply(uint8_t *msg, uint16_t len)
  49. {
  50. int err;
  51. if (sh_telnet->client_ctx == NULL) {
  52. return;
  53. }
  54. err = net_context_send(sh_telnet->client_ctx, msg, len, telnet_sent_cb,
  55. K_FOREVER, NULL);
  56. if (err < 0) {
  57. LOG_ERR("Failed to send command %d, shutting down", err);
  58. telnet_end_client_connection();
  59. }
  60. }
  61. static void telnet_reply_ay_command(void)
  62. {
  63. static const char alive[] = "Zephyr at your service\r\n";
  64. telnet_command_send_reply((uint8_t *)alive, strlen(alive));
  65. }
  66. static void telnet_reply_do_command(struct telnet_simple_command *cmd)
  67. {
  68. switch (cmd->opt) {
  69. case NVT_OPT_SUPR_GA:
  70. cmd->op = NVT_CMD_WILL;
  71. break;
  72. default:
  73. cmd->op = NVT_CMD_WONT;
  74. break;
  75. }
  76. telnet_command_send_reply((uint8_t *)cmd,
  77. sizeof(struct telnet_simple_command));
  78. }
  79. static void telnet_reply_command(struct telnet_simple_command *cmd)
  80. {
  81. if (!cmd->iac) {
  82. return;
  83. }
  84. switch (cmd->op) {
  85. case NVT_CMD_AO:
  86. /* OK, no output then */
  87. sh_telnet->output_lock = true;
  88. sh_telnet->line_out.len = 0;
  89. k_work_cancel_delayable_sync(&sh_telnet->send_work,
  90. &sh_telnet->work_sync);
  91. break;
  92. case NVT_CMD_AYT:
  93. telnet_reply_ay_command();
  94. break;
  95. case NVT_CMD_DO:
  96. telnet_reply_do_command(cmd);
  97. break;
  98. default:
  99. LOG_DBG("Operation %u not handled", cmd->op);
  100. break;
  101. }
  102. }
  103. static int telnet_send(void)
  104. {
  105. int err;
  106. if (sh_telnet->line_out.len == 0) {
  107. return 0;
  108. }
  109. if (sh_telnet->client_ctx == NULL) {
  110. return -ENOTCONN;
  111. }
  112. err = net_context_send(sh_telnet->client_ctx, sh_telnet->line_out.buf,
  113. sh_telnet->line_out.len, telnet_sent_cb,
  114. K_FOREVER, NULL);
  115. if (err < 0) {
  116. LOG_ERR("Failed to send %d, shutting down", err);
  117. telnet_end_client_connection();
  118. return err;
  119. }
  120. /* We reinitialize the line buffer */
  121. sh_telnet->line_out.len = 0;
  122. return 0;
  123. }
  124. static void telnet_send_prematurely(struct k_work *work)
  125. {
  126. (void)telnet_send();
  127. }
  128. static inline bool telnet_handle_command(struct net_pkt *pkt)
  129. {
  130. /* Commands are two or three bytes. */
  131. NET_PKT_DATA_ACCESS_CONTIGUOUS_DEFINE(cmd_access, uint16_t);
  132. struct telnet_simple_command *cmd;
  133. cmd = (struct telnet_simple_command *)net_pkt_get_data(pkt,
  134. &cmd_access);
  135. if (!cmd || cmd->iac != NVT_CMD_IAC) {
  136. return false;
  137. }
  138. if (IS_ENABLED(CONFIG_SHELL_TELNET_SUPPORT_COMMAND)) {
  139. LOG_DBG("Got a command %u/%u/%u", cmd->iac, cmd->op, cmd->opt);
  140. telnet_reply_command(cmd);
  141. }
  142. return true;
  143. }
  144. static void telnet_recv(struct net_context *client,
  145. struct net_pkt *pkt,
  146. union net_ip_header *ip_hdr,
  147. union net_proto_header *proto_hdr,
  148. int status,
  149. void *user_data)
  150. {
  151. size_t len;
  152. if (!pkt || status) {
  153. telnet_end_client_connection();
  154. LOG_DBG("Telnet client dropped (AF_INET%s) status %d",
  155. net_context_get_family(client) == AF_INET ?
  156. "" : "6", status);
  157. return;
  158. }
  159. len = net_pkt_remaining_data(pkt);
  160. if (len >= TELNET_MIN_COMMAND_LEN) {
  161. if (telnet_handle_command(pkt)) {
  162. LOG_DBG("Handled command");
  163. goto unref;
  164. }
  165. }
  166. /* Fifo add */
  167. k_fifo_put(&sh_telnet->rx_fifo, pkt);
  168. sh_telnet->shell_handler(SHELL_TRANSPORT_EVT_RX_RDY,
  169. sh_telnet->shell_context);
  170. return;
  171. unref:
  172. net_pkt_unref(pkt);
  173. }
  174. static void telnet_accept(struct net_context *client,
  175. struct sockaddr *addr,
  176. socklen_t addrlen,
  177. int error,
  178. void *user_data)
  179. {
  180. if (error) {
  181. LOG_ERR("Error %d", error);
  182. goto error;
  183. }
  184. if (sh_telnet->client_ctx) {
  185. LOG_INF("A telnet client is already in.");
  186. goto error;
  187. }
  188. if (net_context_recv(client, telnet_recv, K_NO_WAIT, NULL)) {
  189. LOG_ERR("Unable to setup reception (family %u)",
  190. net_context_get_family(client));
  191. goto error;
  192. }
  193. net_context_set_accepting(client, false);
  194. LOG_DBG("Telnet client connected (family AF_INET%s)",
  195. net_context_get_family(client) == AF_INET ? "" : "6");
  196. sh_telnet->client_ctx = client;
  197. return;
  198. error:
  199. net_context_put(client);
  200. }
  201. static void telnet_setup_server(struct net_context **ctx, sa_family_t family,
  202. struct sockaddr *addr, socklen_t addrlen)
  203. {
  204. if (net_context_get(family, SOCK_STREAM, IPPROTO_TCP, ctx)) {
  205. LOG_ERR("No context available");
  206. goto error;
  207. }
  208. if (net_context_bind(*ctx, addr, addrlen)) {
  209. LOG_ERR("Cannot bind on family AF_INET%s",
  210. family == AF_INET ? "" : "6");
  211. goto error;
  212. }
  213. if (net_context_listen(*ctx, 0)) {
  214. LOG_ERR("Cannot listen on");
  215. goto error;
  216. }
  217. if (net_context_accept(*ctx, telnet_accept, K_NO_WAIT, NULL)) {
  218. LOG_ERR("Cannot accept");
  219. goto error;
  220. }
  221. LOG_DBG("Telnet console enabled on AF_INET%s",
  222. family == AF_INET ? "" : "6");
  223. return;
  224. error:
  225. LOG_ERR("Unable to start telnet on AF_INET%s",
  226. family == AF_INET ? "" : "6");
  227. if (*ctx) {
  228. (void)net_context_put(*ctx);
  229. *ctx = NULL;
  230. }
  231. }
  232. static int telnet_init(void)
  233. {
  234. if (IS_ENABLED(CONFIG_NET_IPV4)) {
  235. struct sockaddr_in any_addr4 = {
  236. .sin_family = AF_INET,
  237. .sin_port = htons(TELNET_PORT),
  238. .sin_addr = INADDR_ANY_INIT
  239. };
  240. static struct net_context *ctx4;
  241. telnet_setup_server(&ctx4, AF_INET,
  242. (struct sockaddr *)&any_addr4,
  243. sizeof(any_addr4));
  244. }
  245. if (IS_ENABLED(CONFIG_NET_IPV6)) {
  246. struct sockaddr_in6 any_addr6 = {
  247. .sin6_family = AF_INET6,
  248. .sin6_port = htons(TELNET_PORT),
  249. .sin6_addr = IN6ADDR_ANY_INIT
  250. };
  251. static struct net_context *ctx6;
  252. telnet_setup_server(&ctx6, AF_INET6,
  253. (struct sockaddr *)&any_addr6,
  254. sizeof(any_addr6));
  255. }
  256. LOG_INF("Telnet shell backend initialized");
  257. return 0;
  258. }
  259. /* Shell API */
  260. static int init(const struct shell_transport *transport,
  261. const void *config,
  262. shell_transport_handler_t evt_handler,
  263. void *context)
  264. {
  265. int err;
  266. sh_telnet = (struct shell_telnet *)transport->ctx;
  267. err = telnet_init();
  268. if (err != 0) {
  269. return err;
  270. }
  271. memset(sh_telnet, 0, sizeof(struct shell_telnet));
  272. sh_telnet->shell_handler = evt_handler;
  273. sh_telnet->shell_context = context;
  274. k_fifo_init(&sh_telnet->rx_fifo);
  275. k_work_init_delayable(&sh_telnet->send_work, telnet_send_prematurely);
  276. return 0;
  277. }
  278. static int uninit(const struct shell_transport *transport)
  279. {
  280. if (sh_telnet == NULL) {
  281. return -ENODEV;
  282. }
  283. return 0;
  284. }
  285. static int enable(const struct shell_transport *transport, bool blocking)
  286. {
  287. if (sh_telnet == NULL) {
  288. return -ENODEV;
  289. }
  290. return 0;
  291. }
  292. static int write(const struct shell_transport *transport,
  293. const void *data, size_t length, size_t *cnt)
  294. {
  295. struct shell_telnet_line_buf *lb;
  296. size_t copy_len;
  297. int err;
  298. uint32_t timeout;
  299. bool was_running;
  300. if (sh_telnet == NULL) {
  301. *cnt = 0;
  302. return -ENODEV;
  303. }
  304. if (sh_telnet->client_ctx == NULL || sh_telnet->output_lock) {
  305. *cnt = length;
  306. return 0;
  307. }
  308. *cnt = 0;
  309. lb = &sh_telnet->line_out;
  310. /* Stop the transmission timer, so it does not interrupt the operation.
  311. */
  312. timeout = k_ticks_to_ms_ceil32(
  313. k_work_delayable_remaining_get(&sh_telnet->send_work));
  314. was_running = k_work_cancel_delayable_sync(&sh_telnet->send_work,
  315. &sh_telnet->work_sync);
  316. do {
  317. if (lb->len + length - *cnt > TELNET_LINE_SIZE) {
  318. copy_len = TELNET_LINE_SIZE - lb->len;
  319. } else {
  320. copy_len = length - *cnt;
  321. }
  322. memcpy(lb->buf + lb->len, (uint8_t *)data + *cnt, copy_len);
  323. lb->len += copy_len;
  324. /* Send the data immediately if the buffer is full or line feed
  325. * is recognized.
  326. */
  327. if (lb->buf[lb->len - 1] == '\n' ||
  328. lb->len == TELNET_LINE_SIZE) {
  329. err = telnet_send();
  330. if (err != 0) {
  331. *cnt = length;
  332. return err;
  333. }
  334. }
  335. *cnt += copy_len;
  336. } while (*cnt < length);
  337. if (lb->len > 0) {
  338. /* Check if the timer was already running, initialize otherwise.
  339. */
  340. timeout = was_running ? timeout : TELNET_TIMEOUT;
  341. k_work_reschedule(&sh_telnet->send_work, K_MSEC(timeout));
  342. }
  343. sh_telnet->shell_handler(SHELL_TRANSPORT_EVT_TX_RDY,
  344. sh_telnet->shell_context);
  345. return 0;
  346. }
  347. static int read(const struct shell_transport *transport,
  348. void *data, size_t length, size_t *cnt)
  349. {
  350. struct net_pkt *pkt;
  351. size_t read_len;
  352. bool flush = true;
  353. if (sh_telnet == NULL) {
  354. return -ENODEV;
  355. }
  356. if (sh_telnet->client_ctx == NULL) {
  357. goto no_data;
  358. }
  359. pkt = k_fifo_peek_head(&sh_telnet->rx_fifo);
  360. if (pkt == NULL) {
  361. goto no_data;
  362. }
  363. read_len = net_pkt_remaining_data(pkt);
  364. if (read_len > length) {
  365. read_len = length;
  366. flush = false;
  367. }
  368. *cnt = read_len;
  369. if (net_pkt_read(pkt, data, read_len) < 0) {
  370. /* Failed to read, get rid of the faulty packet. */
  371. LOG_ERR("Failed to read net packet.");
  372. *cnt = 0;
  373. flush = true;
  374. }
  375. if (flush) {
  376. (void)k_fifo_get(&sh_telnet->rx_fifo, K_NO_WAIT);
  377. net_pkt_unref(pkt);
  378. }
  379. return 0;
  380. no_data:
  381. *cnt = 0;
  382. return 0;
  383. }
  384. const struct shell_transport_api shell_telnet_transport_api = {
  385. .init = init,
  386. .uninit = uninit,
  387. .enable = enable,
  388. .write = write,
  389. .read = read
  390. };
  391. static int enable_shell_telnet(const struct device *arg)
  392. {
  393. ARG_UNUSED(arg);
  394. bool log_backend = CONFIG_SHELL_TELNET_INIT_LOG_LEVEL > 0;
  395. uint32_t level = (CONFIG_SHELL_TELNET_INIT_LOG_LEVEL > LOG_LEVEL_DBG) ?
  396. CONFIG_LOG_MAX_LEVEL : CONFIG_SHELL_TELNET_INIT_LOG_LEVEL;
  397. return shell_init(&shell_telnet, NULL, true, log_backend, level);
  398. }
  399. SYS_INIT(enable_shell_telnet, APPLICATION, 0);
  400. const struct shell *shell_backend_telnet_get_ptr(void)
  401. {
  402. return &shell_telnet;
  403. }