control.c revision 1.14
1/* $OpenBSD: control.c,v 1.14 2014/04/22 12:00:03 reyk Exp $ */ 2 3/* 4 * Copyright (c) 2010-2013 Reyk Floeter <reyk@openbsd.org> 5 * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org> 6 * 7 * Permission to use, copy, modify, and distribute this software for any 8 * purpose with or without fee is hereby granted, provided that the above 9 * copyright notice and this permission notice appear in all copies. 10 * 11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 18 */ 19 20#include <sys/queue.h> 21#include <sys/param.h> 22#include <sys/stat.h> 23#include <sys/socket.h> 24#include <sys/un.h> 25#include <sys/tree.h> 26 27#include <net/if.h> 28 29#include <errno.h> 30#include <event.h> 31#include <fcntl.h> 32#include <stdlib.h> 33#include <string.h> 34#include <unistd.h> 35#include <signal.h> 36 37#include "iked.h" 38 39#define CONTROL_BACKLOG 5 40 41struct ctl_connlist ctl_conns; 42 43void 44 control_accept(int, short, void *); 45struct ctl_conn 46 *control_connbyfd(int); 47void control_close(int, struct control_sock *); 48void control_dispatch_imsg(int, short, void *); 49void control_imsg_forward(struct imsg *); 50 51int 52control_init(struct privsep *ps, struct control_sock *cs) 53{ 54 struct iked *env = ps->ps_env; 55 struct sockaddr_un sun; 56 int fd; 57 mode_t old_umask, mode; 58 59 if (cs->cs_name == NULL) 60 return (0); 61 62 if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) { 63 log_warn("%s: socket", __func__); 64 return (-1); 65 } 66 67 sun.sun_family = AF_UNIX; 68 if (strlcpy(sun.sun_path, cs->cs_name, 69 sizeof(sun.sun_path)) >= sizeof(sun.sun_path)) { 70 log_warn("%s: %s name too long", __func__, cs->cs_name); 71 close(fd); 72 return (-1); 73 } 74 75 if (unlink(cs->cs_name) == -1) 76 if (errno != ENOENT) { 77 log_warn("%s: unlink %s", __func__, cs->cs_name); 78 close(fd); 79 return (-1); 80 } 81 82 if (cs->cs_restricted) { 83 old_umask = umask(S_IXUSR|S_IXGRP|S_IXOTH); 84 mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH; 85 } else { 86 old_umask = umask(S_IXUSR|S_IXGRP|S_IWOTH|S_IROTH|S_IXOTH); 87 mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP; 88 } 89 90 if (bind(fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) { 91 log_warn("%s: bind: %s", __func__, cs->cs_name); 92 close(fd); 93 (void)umask(old_umask); 94 return (-1); 95 } 96 (void)umask(old_umask); 97 98 if (chmod(cs->cs_name, mode) == -1) { 99 log_warn("%s: chmod", __func__); 100 close(fd); 101 (void)unlink(cs->cs_name); 102 return (-1); 103 } 104 105 socket_set_blockmode(fd, BM_NONBLOCK); 106 cs->cs_fd = fd; 107 cs->cs_env = env; 108 109 return (0); 110} 111 112int 113control_listen(struct control_sock *cs) 114{ 115 if (cs->cs_name == NULL) 116 return (0); 117 118 if (listen(cs->cs_fd, CONTROL_BACKLOG) == -1) { 119 log_warn("%s: listen", __func__); 120 return (-1); 121 } 122 123 event_set(&cs->cs_ev, cs->cs_fd, EV_READ, 124 control_accept, cs); 125 event_add(&cs->cs_ev, NULL); 126 evtimer_set(&cs->cs_evt, control_accept, cs); 127 128 return (0); 129} 130 131void 132control_cleanup(struct control_sock *cs) 133{ 134 if (cs->cs_name == NULL) 135 return; 136 event_del(&cs->cs_ev); 137 event_del(&cs->cs_evt); 138 (void)unlink(cs->cs_name); 139} 140 141/* ARGSUSED */ 142void 143control_accept(int listenfd, short event, void *arg) 144{ 145 struct control_sock *cs = arg; 146 int connfd; 147 socklen_t len; 148 struct sockaddr_un sun; 149 struct ctl_conn *c; 150 151 event_add(&cs->cs_ev, NULL); 152 if ((event & EV_TIMEOUT)) 153 return; 154 155 len = sizeof(sun); 156 if ((connfd = accept(listenfd, 157 (struct sockaddr *)&sun, &len)) == -1) { 158 /* 159 * Pause accept if we are out of file descriptors, or 160 * libevent will haunt us here too. 161 */ 162 if (errno == ENFILE || errno == EMFILE) { 163 struct timeval evtpause = { 1, 0 }; 164 165 event_del(&cs->cs_ev); 166 evtimer_add(&cs->cs_evt, &evtpause); 167 } else if (errno != EWOULDBLOCK && errno != EINTR && 168 errno != ECONNABORTED) 169 log_warn("%s: accept", __func__); 170 return; 171 } 172 173 socket_set_blockmode(connfd, BM_NONBLOCK); 174 175 if ((c = calloc(1, sizeof(struct ctl_conn))) == NULL) { 176 log_warn("%s", __func__); 177 close(connfd); 178 return; 179 } 180 181 imsg_init(&c->iev.ibuf, connfd); 182 c->iev.handler = control_dispatch_imsg; 183 c->iev.events = EV_READ; 184 c->iev.data = cs; 185 event_set(&c->iev.ev, c->iev.ibuf.fd, c->iev.events, 186 c->iev.handler, c->iev.data); 187 event_add(&c->iev.ev, NULL); 188 189 TAILQ_INSERT_TAIL(&ctl_conns, c, entry); 190} 191 192struct ctl_conn * 193control_connbyfd(int fd) 194{ 195 struct ctl_conn *c; 196 197 for (c = TAILQ_FIRST(&ctl_conns); c != NULL && c->iev.ibuf.fd != fd; 198 c = TAILQ_NEXT(c, entry)) 199 ; /* nothing */ 200 201 return (c); 202} 203 204void 205control_close(int fd, struct control_sock *cs) 206{ 207 struct ctl_conn *c; 208 209 if ((c = control_connbyfd(fd)) == NULL) { 210 log_warn("%s: fd %d: not found", __func__, fd); 211 return; 212 } 213 214 msgbuf_clear(&c->iev.ibuf.w); 215 TAILQ_REMOVE(&ctl_conns, c, entry); 216 217 event_del(&c->iev.ev); 218 close(c->iev.ibuf.fd); 219 220 /* Some file descriptors are available again. */ 221 if (evtimer_pending(&cs->cs_evt, NULL)) { 222 evtimer_del(&cs->cs_evt); 223 event_add(&cs->cs_ev, NULL); 224 } 225 226 free(c); 227} 228 229/* ARGSUSED */ 230void 231control_dispatch_imsg(int fd, short event, void *arg) 232{ 233 struct control_sock *cs = arg; 234 struct iked *env = cs->cs_env; 235 struct ctl_conn *c; 236 struct imsg imsg; 237 int n, v; 238 239 if ((c = control_connbyfd(fd)) == NULL) { 240 log_warn("%s: fd %d: not found", __func__, fd); 241 return; 242 } 243 244 switch (event) { 245 case EV_READ: 246 if ((n = imsg_read(&c->iev.ibuf)) == -1 || n == 0) { 247 control_close(fd, cs); 248 return; 249 } 250 break; 251 case EV_WRITE: 252 if (msgbuf_write(&c->iev.ibuf.w) <= 0 && errno != EAGAIN) { 253 control_close(fd, cs); 254 return; 255 } 256 imsg_event_add(&c->iev); 257 return; 258 default: 259 fatalx("unknown event"); 260 } 261 262 for (;;) { 263 if ((n = imsg_get(&c->iev.ibuf, &imsg)) == -1) { 264 control_close(fd, cs); 265 return; 266 } 267 268 if (n == 0) 269 break; 270 271 control_imsg_forward(&imsg); 272 273 switch (imsg.hdr.type) { 274 case IMSG_CTL_NOTIFY: 275 if (c->flags & CTL_CONN_NOTIFY) { 276 log_debug("%s: " 277 "client requested notify more than once", 278 __func__); 279 imsg_compose_event(&c->iev, IMSG_CTL_FAIL, 280 0, 0, -1, NULL, 0); 281 break; 282 } 283 c->flags |= CTL_CONN_NOTIFY; 284 break; 285 case IMSG_CTL_VERBOSE: 286 IMSG_SIZE_CHECK(&imsg, &v); 287 288 memcpy(&v, imsg.data, sizeof(v)); 289 log_verbose(v); 290 291 proc_forward_imsg(&env->sc_ps, &imsg, PROC_PARENT, -1); 292 proc_forward_imsg(&env->sc_ps, &imsg, PROC_IKEV2, -1); 293 proc_forward_imsg(&env->sc_ps, &imsg, PROC_IKEV1, -1); 294 break; 295 case IMSG_CTL_RELOAD: 296 case IMSG_CTL_RESET: 297 case IMSG_CTL_COUPLE: 298 case IMSG_CTL_DECOUPLE: 299 case IMSG_CTL_ACTIVE: 300 case IMSG_CTL_PASSIVE: 301 proc_forward_imsg(&env->sc_ps, &imsg, PROC_PARENT, -1); 302 break; 303 default: 304 log_debug("%s: error handling imsg %d", 305 __func__, imsg.hdr.type); 306 break; 307 } 308 imsg_free(&imsg); 309 } 310 311 imsg_event_add(&c->iev); 312} 313 314void 315control_imsg_forward(struct imsg *imsg) 316{ 317 struct ctl_conn *c; 318 319 TAILQ_FOREACH(c, &ctl_conns, entry) 320 if (c->flags & CTL_CONN_NOTIFY) 321 imsg_compose(&c->iev.ibuf, imsg->hdr.type, 322 0, imsg->hdr.pid, -1, imsg->data, 323 imsg->hdr.len - IMSG_HEADER_SIZE); 324} 325