1 /* $OpenBSD: proc.c,v 1.52 2024/11/21 13:38:45 claudio Exp $ */ 2 3 /* 4 * Copyright (c) 2010 - 2016 Reyk Floeter <reyk@openbsd.org> 5 * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> 6 * 7 * Permission to use, copy, modify, and distribute this software for any 8 * purpose with or without fee is hereby granted, provided that the above 9 * copyright notice and this permission notice appear in all copies. 10 * 11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 18 */ 19 20 #include <sys/types.h> 21 #include <sys/queue.h> 22 #include <sys/socket.h> 23 #include <sys/wait.h> 24 25 #include <fcntl.h> 26 #include <stdio.h> 27 #include <stdlib.h> 28 #include <unistd.h> 29 #include <string.h> 30 #include <errno.h> 31 #include <signal.h> 32 #include <paths.h> 33 #include <pwd.h> 34 #include <event.h> 35 #include <imsg.h> 36 37 #include "httpd.h" 38 39 void proc_exec(struct privsep *, struct privsep_proc *, unsigned int, int, 40 char **); 41 void proc_setup(struct privsep *, struct privsep_proc *, unsigned int); 42 void proc_open(struct privsep *, int, int); 43 void proc_accept(struct privsep *, int, enum privsep_procid, 44 unsigned int); 45 void proc_close(struct privsep *); 46 void proc_shutdown(struct privsep_proc *); 47 void proc_sig_handler(int, short, void *); 48 void proc_range(struct privsep *, enum privsep_procid, int *, int *); 49 int proc_dispatch_null(int, struct privsep_proc *, struct imsg *); 50 51 enum privsep_procid 52 proc_getid(struct privsep_proc *procs, unsigned int nproc, 53 const char *proc_name) 54 { 55 struct privsep_proc *p; 56 unsigned int proc; 57 58 for (proc = 0; proc < nproc; proc++) { 59 p = &procs[proc]; 60 if (strcmp(p->p_title, proc_name)) 61 continue; 62 63 return (p->p_id); 64 } 65 66 return (PROC_MAX); 67 } 68 69 void 70 proc_exec(struct privsep *ps, struct privsep_proc *procs, unsigned int nproc, 71 int argc, char **argv) 72 { 73 unsigned int proc, nargc, i, proc_i; 74 char **nargv; 75 struct privsep_proc *p; 76 char num[32]; 77 int fd; 78 79 /* Prepare the new process argv. */ 80 nargv = calloc(argc + 5, sizeof(char *)); 81 if (nargv == NULL) 82 fatal("%s: calloc", __func__); 83 84 /* Copy call argument first. */ 85 nargc = 0; 86 nargv[nargc++] = argv[0]; 87 88 /* Set process name argument and save the position. */ 89 nargv[nargc++] = "-P"; 90 proc_i = nargc; 91 nargc++; 92 93 /* Point process instance arg to stack and copy the original args. */ 94 nargv[nargc++] = "-I"; 95 nargv[nargc++] = num; 96 for (i = 1; i < (unsigned int) argc; i++) 97 nargv[nargc++] = argv[i]; 98 99 nargv[nargc] = NULL; 100 101 for (proc = 0; proc < nproc; proc++) { 102 p = &procs[proc]; 103 104 /* Update args with process title. */ 105 nargv[proc_i] = (char *)(uintptr_t)p->p_title; 106 107 /* Fire children processes. */ 108 for (i = 0; i < ps->ps_instances[p->p_id]; i++) { 109 /* Update the process instance number. */ 110 snprintf(num, sizeof(num), "%u", i); 111 112 fd = ps->ps_pipes[p->p_id][i].pp_pipes[PROC_PARENT][0]; 113 ps->ps_pipes[p->p_id][i].pp_pipes[PROC_PARENT][0] = -1; 114 115 switch (fork()) { 116 case -1: 117 fatal("%s: fork", __func__); 118 break; 119 case 0: 120 /* Prepare parent socket. */ 121 if (fd != PROC_PARENT_SOCK_FILENO) { 122 if (dup2(fd, PROC_PARENT_SOCK_FILENO) 123 == -1) 124 fatal("dup2"); 125 } else if (fcntl(fd, F_SETFD, 0) == -1) 126 fatal("fcntl"); 127 128 execvp(argv[0], nargv); 129 fatal("%s: execvp", __func__); 130 break; 131 default: 132 /* Close child end. */ 133 close(fd); 134 break; 135 } 136 } 137 } 138 free(nargv); 139 } 140 141 void 142 proc_connect(struct privsep *ps) 143 { 144 struct imsgev *iev; 145 unsigned int src, dst, inst; 146 147 /* Don't distribute any sockets if we are not really going to run. */ 148 if (ps->ps_noaction) 149 return; 150 151 for (dst = 0; dst < PROC_MAX; dst++) { 152 /* We don't communicate with ourselves. */ 153 if (dst == PROC_PARENT) 154 continue; 155 156 for (inst = 0; inst < ps->ps_instances[dst]; inst++) { 157 iev = &ps->ps_ievs[dst][inst]; 158 if (imsgbuf_init(&iev->ibuf, 159 ps->ps_pp->pp_pipes[dst][inst]) == -1) 160 fatal(NULL); 161 imsgbuf_allow_fdpass(&iev->ibuf); 162 event_set(&iev->ev, iev->ibuf.fd, iev->events, 163 iev->handler, iev->data); 164 event_add(&iev->ev, NULL); 165 } 166 } 167 168 /* Distribute the socketpair()s for everyone. */ 169 for (src = 0; src < PROC_MAX; src++) 170 for (dst = src; dst < PROC_MAX; dst++) { 171 /* Parent already distributed its fds. */ 172 if (src == PROC_PARENT || dst == PROC_PARENT) 173 continue; 174 175 proc_open(ps, src, dst); 176 } 177 } 178 179 void 180 proc_init(struct privsep *ps, struct privsep_proc *procs, unsigned int nproc, 181 int debug, int argc, char **argv, enum privsep_procid proc_id) 182 { 183 struct privsep_proc *p = NULL; 184 struct privsep_pipes *pa, *pb; 185 unsigned int proc; 186 unsigned int dst; 187 int fds[2]; 188 189 /* Don't initiate anything if we are not really going to run. */ 190 if (ps->ps_noaction) 191 return; 192 193 if (proc_id == PROC_PARENT) { 194 privsep_process = PROC_PARENT; 195 proc_setup(ps, procs, nproc); 196 197 if (!debug && daemon(1, 0) == -1) 198 fatal("failed to daemonize"); 199 200 /* 201 * Create the children sockets so we can use them 202 * to distribute the rest of the socketpair()s using 203 * proc_connect() later. 204 */ 205 for (dst = 0; dst < PROC_MAX; dst++) { 206 /* Don't create socket for ourselves. */ 207 if (dst == PROC_PARENT) 208 continue; 209 210 for (proc = 0; proc < ps->ps_instances[dst]; proc++) { 211 pa = &ps->ps_pipes[PROC_PARENT][0]; 212 pb = &ps->ps_pipes[dst][proc]; 213 if (socketpair(AF_UNIX, 214 SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC, 215 PF_UNSPEC, fds) == -1) 216 fatal("%s: socketpair", __func__); 217 218 pa->pp_pipes[dst][proc] = fds[0]; 219 pb->pp_pipes[PROC_PARENT][0] = fds[1]; 220 } 221 } 222 223 /* Engage! */ 224 proc_exec(ps, procs, nproc, argc, argv); 225 return; 226 } 227 228 /* Initialize a child */ 229 for (proc = 0; proc < nproc; proc++) { 230 if (procs[proc].p_id != proc_id) 231 continue; 232 p = &procs[proc]; 233 break; 234 } 235 if (p == NULL || p->p_init == NULL) 236 fatalx("%s: process %d missing process initialization", 237 __func__, proc_id); 238 239 p->p_init(ps, p); 240 241 fatalx("failed to initiate child process"); 242 } 243 244 void 245 proc_accept(struct privsep *ps, int fd, enum privsep_procid dst, 246 unsigned int n) 247 { 248 struct privsep_pipes *pp = ps->ps_pp; 249 struct imsgev *iev; 250 251 if (ps->ps_ievs[dst] == NULL) { 252 #if DEBUG > 1 253 log_debug("%s: %s src %d %d to dst %d %d not connected", 254 __func__, ps->ps_title[privsep_process], 255 privsep_process, ps->ps_instance + 1, 256 dst, n + 1); 257 #endif 258 close(fd); 259 return; 260 } 261 262 if (pp->pp_pipes[dst][n] != -1) { 263 log_warnx("%s: duplicated descriptor", __func__); 264 close(fd); 265 return; 266 } else 267 pp->pp_pipes[dst][n] = fd; 268 269 iev = &ps->ps_ievs[dst][n]; 270 if (imsgbuf_init(&iev->ibuf, fd) == -1) 271 fatal(NULL); 272 imsgbuf_allow_fdpass(&iev->ibuf); 273 event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data); 274 event_add(&iev->ev, NULL); 275 } 276 277 void 278 proc_setup(struct privsep *ps, struct privsep_proc *procs, unsigned int nproc) 279 { 280 unsigned int i, j, src, dst, id; 281 struct privsep_pipes *pp; 282 283 /* Initialize parent title, ps_instances and procs. */ 284 ps->ps_title[PROC_PARENT] = "parent"; 285 286 for (src = 0; src < PROC_MAX; src++) 287 /* Default to 1 process instance */ 288 if (ps->ps_instances[src] < 1) 289 ps->ps_instances[src] = 1; 290 291 for (src = 0; src < nproc; src++) { 292 procs[src].p_ps = ps; 293 if (procs[src].p_cb == NULL) 294 procs[src].p_cb = proc_dispatch_null; 295 296 id = procs[src].p_id; 297 ps->ps_title[id] = procs[src].p_title; 298 if ((ps->ps_ievs[id] = calloc(ps->ps_instances[id], 299 sizeof(struct imsgev))) == NULL) 300 fatal("%s: calloc", __func__); 301 302 /* With this set up, we are ready to call imsgbuf_init(). */ 303 for (i = 0; i < ps->ps_instances[id]; i++) { 304 ps->ps_ievs[id][i].handler = proc_dispatch; 305 ps->ps_ievs[id][i].events = EV_READ; 306 ps->ps_ievs[id][i].proc = &procs[src]; 307 ps->ps_ievs[id][i].data = &ps->ps_ievs[id][i]; 308 } 309 } 310 311 /* 312 * Allocate pipes for all process instances (incl. parent) 313 * 314 * - ps->ps_pipes: N:M mapping 315 * N source processes connected to M destination processes: 316 * [src][instances][dst][instances], for example 317 * [PROC_RELAY][3][PROC_CA][3] 318 * 319 * - ps->ps_pp: per-process 1:M part of ps->ps_pipes 320 * Each process instance has a destination array of socketpair fds: 321 * [dst][instances], for example 322 * [PROC_PARENT][0] 323 */ 324 for (src = 0; src < PROC_MAX; src++) { 325 /* Allocate destination array for each process */ 326 if ((ps->ps_pipes[src] = calloc(ps->ps_instances[src], 327 sizeof(struct privsep_pipes))) == NULL) 328 fatal("%s: calloc", __func__); 329 330 for (i = 0; i < ps->ps_instances[src]; i++) { 331 pp = &ps->ps_pipes[src][i]; 332 333 for (dst = 0; dst < PROC_MAX; dst++) { 334 /* Allocate maximum fd integers */ 335 if ((pp->pp_pipes[dst] = 336 calloc(ps->ps_instances[dst], 337 sizeof(int))) == NULL) 338 fatal("%s: calloc", __func__); 339 340 /* Mark fd as unused */ 341 for (j = 0; j < ps->ps_instances[dst]; j++) 342 pp->pp_pipes[dst][j] = -1; 343 } 344 } 345 } 346 347 ps->ps_pp = &ps->ps_pipes[privsep_process][ps->ps_instance]; 348 } 349 350 void 351 proc_kill(struct privsep *ps) 352 { 353 char *cause; 354 pid_t pid; 355 int len, status; 356 357 if (privsep_process != PROC_PARENT) 358 return; 359 360 proc_close(ps); 361 362 do { 363 pid = waitpid(WAIT_ANY, &status, 0); 364 if (pid <= 0) 365 continue; 366 367 if (WIFSIGNALED(status)) { 368 len = asprintf(&cause, "terminated; signal %d", 369 WTERMSIG(status)); 370 } else if (WIFEXITED(status)) { 371 if (WEXITSTATUS(status) != 0) 372 len = asprintf(&cause, "exited abnormally"); 373 else 374 len = 0; 375 } else 376 len = -1; 377 378 if (len == 0) { 379 /* child exited OK, don't print a warning message */ 380 } else if (len != -1) { 381 log_warnx("lost child: pid %u %s", pid, cause); 382 free(cause); 383 } else 384 log_warnx("lost child: pid %u", pid); 385 } while (pid != -1 || errno == EINTR); 386 } 387 388 void 389 proc_open(struct privsep *ps, int src, int dst) 390 { 391 struct privsep_pipes *pa, *pb; 392 struct privsep_fd pf; 393 int fds[2]; 394 unsigned int i, j; 395 396 /* Exchange pipes between process. */ 397 for (i = 0; i < ps->ps_instances[src]; i++) { 398 for (j = 0; j < ps->ps_instances[dst]; j++) { 399 /* Don't create sockets for ourself. */ 400 if (src == dst && i == j) 401 continue; 402 403 /* Servers don't talk to each other. */ 404 if (src == PROC_SERVER && dst == PROC_SERVER) 405 continue; 406 407 pa = &ps->ps_pipes[src][i]; 408 pb = &ps->ps_pipes[dst][j]; 409 if (socketpair(AF_UNIX, 410 SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC, 411 PF_UNSPEC, fds) == -1) 412 fatal("%s: socketpair", __func__); 413 414 pa->pp_pipes[dst][j] = fds[0]; 415 pb->pp_pipes[src][i] = fds[1]; 416 417 pf.pf_procid = src; 418 pf.pf_instance = i; 419 if (proc_compose_imsg(ps, dst, j, IMSG_CTL_PROCFD, 420 -1, pb->pp_pipes[src][i], &pf, sizeof(pf)) == -1) 421 fatal("%s: proc_compose_imsg", __func__); 422 423 pf.pf_procid = dst; 424 pf.pf_instance = j; 425 if (proc_compose_imsg(ps, src, i, IMSG_CTL_PROCFD, 426 -1, pa->pp_pipes[dst][j], &pf, sizeof(pf)) == -1) 427 fatal("%s: proc_compose_imsg", __func__); 428 429 /* 430 * We have to flush to send the descriptors and close 431 * them to avoid the fd ramp on startup. 432 */ 433 if (proc_flush_imsg(ps, src, i) == -1 || 434 proc_flush_imsg(ps, dst, j) == -1) 435 fatal("%s: imsgbuf_flush", __func__); 436 } 437 } 438 } 439 440 void 441 proc_close(struct privsep *ps) 442 { 443 unsigned int dst, n; 444 struct privsep_pipes *pp; 445 446 if (ps == NULL) 447 return; 448 449 pp = ps->ps_pp; 450 451 for (dst = 0; dst < PROC_MAX; dst++) { 452 if (ps->ps_ievs[dst] == NULL) 453 continue; 454 455 for (n = 0; n < ps->ps_instances[dst]; n++) { 456 if (pp->pp_pipes[dst][n] == -1) 457 continue; 458 459 /* Cancel the fd, close and invalidate the fd */ 460 event_del(&(ps->ps_ievs[dst][n].ev)); 461 imsgbuf_clear(&(ps->ps_ievs[dst][n].ibuf)); 462 close(pp->pp_pipes[dst][n]); 463 pp->pp_pipes[dst][n] = -1; 464 } 465 free(ps->ps_ievs[dst]); 466 } 467 } 468 469 void 470 proc_shutdown(struct privsep_proc *p) 471 { 472 struct privsep *ps = p->p_ps; 473 474 if (p->p_id == PROC_CONTROL && ps) 475 control_cleanup(&ps->ps_csock); 476 477 if (p->p_shutdown != NULL) 478 (*p->p_shutdown)(); 479 480 proc_close(ps); 481 482 log_info("%s exiting, pid %d", p->p_title, getpid()); 483 484 exit(0); 485 } 486 487 void 488 proc_sig_handler(int sig, short event, void *arg) 489 { 490 struct privsep_proc *p = arg; 491 492 switch (sig) { 493 case SIGINT: 494 case SIGTERM: 495 proc_shutdown(p); 496 break; 497 case SIGCHLD: 498 case SIGHUP: 499 case SIGPIPE: 500 case SIGUSR1: 501 /* ignore */ 502 break; 503 default: 504 fatalx("%s: unexpected signal", __func__); 505 /* NOTREACHED */ 506 } 507 } 508 509 void 510 proc_run(struct privsep *ps, struct privsep_proc *p, 511 struct privsep_proc *procs, unsigned int nproc, 512 void (*run)(struct privsep *, struct privsep_proc *, void *), void *arg) 513 { 514 struct passwd *pw; 515 const char *root; 516 struct control_sock *rcs; 517 518 log_procinit(p->p_title); 519 520 if (p->p_id == PROC_CONTROL && ps->ps_instance == 0) { 521 if (control_init(ps, &ps->ps_csock) == -1) 522 fatalx("%s: control_init", __func__); 523 TAILQ_FOREACH(rcs, &ps->ps_rcsocks, cs_entry) 524 if (control_init(ps, rcs) == -1) 525 fatalx("%s: control_init", __func__); 526 } 527 528 /* Use non-standard user */ 529 if (p->p_pw != NULL) 530 pw = p->p_pw; 531 else 532 pw = ps->ps_pw; 533 534 /* Change root directory */ 535 if (p->p_chroot != NULL) 536 root = p->p_chroot; 537 else 538 root = pw->pw_dir; 539 540 if (chroot(root) == -1) 541 fatal("%s: chroot", __func__); 542 if (chdir("/") == -1) 543 fatal("%s: chdir(\"/\")", __func__); 544 545 privsep_process = p->p_id; 546 547 setproctitle("%s", p->p_title); 548 549 if (setgroups(1, &pw->pw_gid) || 550 setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) || 551 setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) 552 fatal("%s: cannot drop privileges", __func__); 553 554 event_init(); 555 556 signal_set(&ps->ps_evsigint, SIGINT, proc_sig_handler, p); 557 signal_set(&ps->ps_evsigterm, SIGTERM, proc_sig_handler, p); 558 signal_set(&ps->ps_evsigchld, SIGCHLD, proc_sig_handler, p); 559 signal_set(&ps->ps_evsighup, SIGHUP, proc_sig_handler, p); 560 signal_set(&ps->ps_evsigpipe, SIGPIPE, proc_sig_handler, p); 561 signal_set(&ps->ps_evsigusr1, SIGUSR1, proc_sig_handler, p); 562 563 signal_add(&ps->ps_evsigint, NULL); 564 signal_add(&ps->ps_evsigterm, NULL); 565 signal_add(&ps->ps_evsigchld, NULL); 566 signal_add(&ps->ps_evsighup, NULL); 567 signal_add(&ps->ps_evsigpipe, NULL); 568 signal_add(&ps->ps_evsigusr1, NULL); 569 570 proc_setup(ps, procs, nproc); 571 proc_accept(ps, PROC_PARENT_SOCK_FILENO, PROC_PARENT, 0); 572 if (p->p_id == PROC_CONTROL && ps->ps_instance == 0) { 573 if (control_listen(&ps->ps_csock) == -1) 574 fatalx("%s: control_listen", __func__); 575 TAILQ_FOREACH(rcs, &ps->ps_rcsocks, cs_entry) 576 if (control_listen(rcs) == -1) 577 fatalx("%s: control_listen", __func__); 578 } 579 580 DPRINTF("%s: %s %d/%d, pid %d", __func__, p->p_title, 581 ps->ps_instance + 1, ps->ps_instances[p->p_id], getpid()); 582 583 if (run != NULL) 584 run(ps, p, arg); 585 586 event_dispatch(); 587 588 proc_shutdown(p); 589 } 590 591 void 592 proc_dispatch(int fd, short event, void *arg) 593 { 594 struct imsgev *iev = arg; 595 struct privsep_proc *p = iev->proc; 596 struct privsep *ps = p->p_ps; 597 struct imsgbuf *ibuf; 598 struct imsg imsg; 599 ssize_t n; 600 int verbose; 601 const char *title; 602 struct privsep_fd pf; 603 604 title = ps->ps_title[privsep_process]; 605 ibuf = &iev->ibuf; 606 607 if (event & EV_READ) { 608 if ((n = imsgbuf_read(ibuf)) == -1) 609 fatal("%s: imsgbuf_read", __func__); 610 if (n == 0) { 611 /* this pipe is dead, so remove the event handler */ 612 event_del(&iev->ev); 613 event_loopexit(NULL); 614 return; 615 } 616 } 617 618 if (event & EV_WRITE) { 619 if (imsgbuf_write(ibuf) == -1) { 620 if (errno == EPIPE) { /* connection closed */ 621 /* remove the event handler */ 622 event_del(&iev->ev); 623 event_loopexit(NULL); 624 return; 625 } else 626 fatal("%s: imsgbuf_write", __func__); 627 } 628 } 629 630 for (;;) { 631 if ((n = imsg_get(ibuf, &imsg)) == -1) 632 fatal("%s: imsg_get", __func__); 633 if (n == 0) 634 break; 635 636 #if DEBUG > 1 637 log_debug("%s: %s %d got imsg %d peerid %d from %s %d", 638 __func__, title, ps->ps_instance + 1, 639 imsg.hdr.type, imsg.hdr.peerid, p->p_title, imsg.hdr.pid); 640 #endif 641 642 /* 643 * Check the message with the program callback 644 */ 645 if ((p->p_cb)(fd, p, &imsg) == 0) { 646 /* Message was handled by the callback, continue */ 647 imsg_free(&imsg); 648 continue; 649 } 650 651 /* 652 * Generic message handling 653 */ 654 switch (imsg.hdr.type) { 655 case IMSG_CTL_VERBOSE: 656 IMSG_SIZE_CHECK(&imsg, &verbose); 657 memcpy(&verbose, imsg.data, sizeof(verbose)); 658 log_setverbose(verbose); 659 break; 660 case IMSG_CTL_PROCFD: 661 IMSG_SIZE_CHECK(&imsg, &pf); 662 memcpy(&pf, imsg.data, sizeof(pf)); 663 proc_accept(ps, imsg_get_fd(&imsg), pf.pf_procid, 664 pf.pf_instance); 665 break; 666 default: 667 fatalx("%s: %s %d got invalid imsg %d peerid %d " 668 "from %s %d", 669 __func__, title, ps->ps_instance + 1, 670 imsg.hdr.type, imsg.hdr.peerid, 671 p->p_title, imsg.hdr.pid); 672 } 673 imsg_free(&imsg); 674 } 675 imsg_event_add(iev); 676 } 677 678 int 679 proc_dispatch_null(int fd, struct privsep_proc *p, struct imsg *imsg) 680 { 681 return (-1); 682 } 683 684 /* 685 * imsg helper functions 686 */ 687 688 void 689 imsg_event_add(struct imsgev *iev) 690 { 691 if (iev->handler == NULL) { 692 imsgbuf_flush(&iev->ibuf); 693 return; 694 } 695 696 iev->events = EV_READ; 697 if (imsgbuf_queuelen(&iev->ibuf) > 0) 698 iev->events |= EV_WRITE; 699 700 event_del(&iev->ev); 701 event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data); 702 event_add(&iev->ev, NULL); 703 } 704 705 int 706 imsg_compose_event(struct imsgev *iev, uint16_t type, uint32_t peerid, 707 pid_t pid, int fd, void *data, uint16_t datalen) 708 { 709 int ret; 710 711 if ((ret = imsg_compose(&iev->ibuf, type, peerid, 712 pid, fd, data, datalen)) == -1) 713 return (ret); 714 imsg_event_add(iev); 715 return (ret); 716 } 717 718 int 719 imsg_composev_event(struct imsgev *iev, uint16_t type, uint32_t peerid, 720 pid_t pid, int fd, const struct iovec *iov, int iovcnt) 721 { 722 int ret; 723 724 if ((ret = imsg_composev(&iev->ibuf, type, peerid, 725 pid, fd, iov, iovcnt)) == -1) 726 return (ret); 727 imsg_event_add(iev); 728 return (ret); 729 } 730 731 void 732 proc_range(struct privsep *ps, enum privsep_procid id, int *n, int *m) 733 { 734 if (*n == -1) { 735 /* Use a range of all target instances */ 736 *n = 0; 737 *m = ps->ps_instances[id]; 738 } else { 739 /* Use only a single slot of the specified peer process */ 740 *m = *n + 1; 741 } 742 } 743 744 int 745 proc_compose_imsg(struct privsep *ps, enum privsep_procid id, int n, 746 uint16_t type, uint32_t peerid, int fd, void *data, uint16_t datalen) 747 { 748 int m; 749 750 proc_range(ps, id, &n, &m); 751 for (; n < m; n++) { 752 if (imsg_compose_event(&ps->ps_ievs[id][n], 753 type, peerid, ps->ps_instance + 1, fd, data, datalen) == -1) 754 return (-1); 755 } 756 757 return (0); 758 } 759 760 int 761 proc_compose(struct privsep *ps, enum privsep_procid id, 762 uint16_t type, void *data, uint16_t datalen) 763 { 764 return (proc_compose_imsg(ps, id, -1, type, -1, -1, data, datalen)); 765 } 766 767 int 768 proc_composev_imsg(struct privsep *ps, enum privsep_procid id, int n, 769 uint16_t type, uint32_t peerid, int fd, const struct iovec *iov, int iovcnt) 770 { 771 int m; 772 773 proc_range(ps, id, &n, &m); 774 for (; n < m; n++) 775 if (imsg_composev_event(&ps->ps_ievs[id][n], 776 type, peerid, ps->ps_instance + 1, fd, iov, iovcnt) == -1) 777 return (-1); 778 779 return (0); 780 } 781 782 int 783 proc_composev(struct privsep *ps, enum privsep_procid id, 784 uint16_t type, const struct iovec *iov, int iovcnt) 785 { 786 return (proc_composev_imsg(ps, id, -1, type, -1, -1, iov, iovcnt)); 787 } 788 789 int 790 proc_forward_imsg(struct privsep *ps, struct imsg *imsg, 791 enum privsep_procid id, int n) 792 { 793 return (proc_compose_imsg(ps, id, n, imsg->hdr.type, 794 imsg->hdr.peerid, -1, imsg->data, IMSG_DATA_SIZE(imsg))); 795 } 796 797 struct imsgbuf * 798 proc_ibuf(struct privsep *ps, enum privsep_procid id, int n) 799 { 800 int m; 801 802 proc_range(ps, id, &n, &m); 803 return (&ps->ps_ievs[id][n].ibuf); 804 } 805 806 struct imsgev * 807 proc_iev(struct privsep *ps, enum privsep_procid id, int n) 808 { 809 int m; 810 811 proc_range(ps, id, &n, &m); 812 return (&ps->ps_ievs[id][n]); 813 } 814 815 /* This function should only be called with care as it breaks async I/O */ 816 int 817 proc_flush_imsg(struct privsep *ps, enum privsep_procid id, int n) 818 { 819 struct imsgbuf *ibuf; 820 int m, ret = 0; 821 822 proc_range(ps, id, &n, &m); 823 for (; n < m; n++) { 824 if ((ibuf = proc_ibuf(ps, id, n)) == NULL) 825 return (-1); 826 if ((ret = imsgbuf_flush(ibuf)) == -1) 827 break; 828 imsg_event_add(&ps->ps_ievs[id][n]); 829 } 830 831 return (ret); 832 } 833