2010-01-26 00:18:02 +01:00
|
|
|
/* Part of libhgfs - (c) 2009, D.C. van Moolenbroek */
|
|
|
|
|
|
|
|
#include "inc.h"
|
|
|
|
|
2012-03-25 20:25:53 +02:00
|
|
|
char rpc_buf[RPC_BUF_SIZE];
|
|
|
|
char *rpc_ptr;
|
2010-01-26 00:18:02 +01:00
|
|
|
|
2012-03-25 20:25:53 +02:00
|
|
|
static struct channel rpc_chan;
|
2010-01-26 00:18:02 +01:00
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* rpc_open *
|
|
|
|
*===========================================================================*/
|
2014-02-24 14:00:17 +01:00
|
|
|
int rpc_open(void)
|
2010-01-26 00:18:02 +01:00
|
|
|
{
|
|
|
|
/* Open a HGFS RPC backdoor channel to the VMware host, and make sure that it
|
2012-04-09 17:17:42 +02:00
|
|
|
* is working. Return OK upon success, or a negative error code otherwise; in
|
|
|
|
* particular, return EAGAIN if shared folders are disabled.
|
2010-01-26 00:18:02 +01:00
|
|
|
*/
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if ((r = channel_open(&rpc_chan, CH_OUT)) != OK)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = rpc_test();
|
|
|
|
|
2012-04-09 17:17:42 +02:00
|
|
|
if (r != OK)
|
2010-01-26 00:18:02 +01:00
|
|
|
channel_close(&rpc_chan);
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* rpc_query *
|
|
|
|
*===========================================================================*/
|
2014-02-24 14:00:17 +01:00
|
|
|
int rpc_query(void)
|
2010-01-26 00:18:02 +01:00
|
|
|
{
|
|
|
|
/* Send a HGFS RPC query over the backdoor channel. Return OK upon success, or
|
|
|
|
* a negative error code otherwise; EAGAIN is returned if shared folders are
|
|
|
|
* disabled. In general, we make the assumption that the sender (= VMware)
|
|
|
|
* speaks the protocol correctly. Hence, the callers of this function do not
|
|
|
|
* check for lengths.
|
|
|
|
*/
|
|
|
|
int r, len, id, err;
|
|
|
|
|
|
|
|
len = RPC_LEN;
|
|
|
|
|
|
|
|
/* A more robust version of this call could reopen the channel and
|
|
|
|
* retry the request upon low-level failure.
|
|
|
|
*/
|
|
|
|
r = channel_send(&rpc_chan, rpc_buf, len);
|
|
|
|
if (r < 0) return r;
|
|
|
|
|
|
|
|
r = channel_recv(&rpc_chan, rpc_buf, sizeof(rpc_buf));
|
|
|
|
if (r < 0) return r;
|
|
|
|
if (r < 2 || (len > 2 && r < 10)) return EIO;
|
|
|
|
|
|
|
|
RPC_RESET;
|
|
|
|
|
|
|
|
if (RPC_NEXT8 != '1') return EAGAIN;
|
|
|
|
if (RPC_NEXT8 != ' ') return EAGAIN;
|
|
|
|
|
|
|
|
if (len <= 2) return OK;
|
|
|
|
|
|
|
|
id = RPC_NEXT32;
|
|
|
|
err = RPC_NEXT32;
|
|
|
|
|
|
|
|
return error_convert(err);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* rpc_test *
|
|
|
|
*===========================================================================*/
|
2014-02-24 14:00:17 +01:00
|
|
|
int rpc_test(void)
|
2010-01-26 00:18:02 +01:00
|
|
|
{
|
|
|
|
/* Test whether HGFS communication is working. Return OK on success, EAGAIN if
|
|
|
|
* shared folders are disabled, or another negative error code upon error.
|
|
|
|
*/
|
|
|
|
|
|
|
|
RPC_RESET;
|
|
|
|
RPC_NEXT8 = 'f';
|
|
|
|
RPC_NEXT8 = ' ';
|
|
|
|
|
|
|
|
return rpc_query();
|
|
|
|
}
|
|
|
|
|
|
|
|
/*===========================================================================*
|
|
|
|
* rpc_close *
|
|
|
|
*===========================================================================*/
|
2014-02-24 14:00:17 +01:00
|
|
|
void rpc_close(void)
|
2010-01-26 00:18:02 +01:00
|
|
|
{
|
|
|
|
/* Close the HGFS RPC backdoor channel.
|
|
|
|
*/
|
|
|
|
|
|
|
|
channel_close(&rpc_chan);
|
|
|
|
}
|