xref: /openbsd-src/usr.sbin/relayd/control.c (revision f2da64fbbbf1b03f09f390ab01267c93dfd77c4c)
1 /*	$OpenBSD: control.c,v 1.53 2016/09/02 12:12:51 reyk Exp $	*/
2 
3 /*
4  * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
5  *
6  * Permission to use, copy, modify, and distribute this software for any
7  * purpose with or without fee is hereby granted, provided that the above
8  * copyright notice and this permission notice appear in all copies.
9  *
10  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
11  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
12  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
13  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
14  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
15  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
16  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17  */
18 
19 #include <sys/queue.h>
20 #include <sys/stat.h>
21 #include <sys/socket.h>
22 #include <sys/time.h>
23 #include <sys/un.h>
24 
25 #include <errno.h>
26 #include <event.h>
27 #include <fcntl.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <unistd.h>
31 #include <imsg.h>
32 
33 #include "relayd.h"
34 
35 #define	CONTROL_BACKLOG	5
36 
37 struct ctl_connlist ctl_conns;
38 
39 void		 control_accept(int, short, void *);
40 void		 control_close(int, struct control_sock *);
41 
42 int
43 control_init(struct privsep *ps, struct control_sock *cs)
44 {
45 	struct relayd		*env = ps->ps_env;
46 	struct sockaddr_un	 sun;
47 	int			 fd;
48 	mode_t			 old_umask, mode;
49 
50 	if (cs->cs_name == NULL)
51 		return (0);
52 
53 	if ((fd = socket(AF_UNIX, SOCK_STREAM | SOCK_NONBLOCK, 0)) == -1) {
54 		log_warn("%s: socket", __func__);
55 		return (-1);
56 	}
57 
58 	sun.sun_family = AF_UNIX;
59 	if (strlcpy(sun.sun_path, cs->cs_name,
60 	    sizeof(sun.sun_path)) >= sizeof(sun.sun_path)) {
61 		log_warn("%s: %s name too long", __func__, cs->cs_name);
62 		close(fd);
63 		return (-1);
64 	}
65 
66 	if (unlink(cs->cs_name) == -1)
67 		if (errno != ENOENT) {
68 			log_warn("%s: unlink %s", __func__, cs->cs_name);
69 			close(fd);
70 			return (-1);
71 		}
72 
73 	if (cs->cs_restricted) {
74 		old_umask = umask(S_IXUSR|S_IXGRP|S_IXOTH);
75 		mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH;
76 	} else {
77 		old_umask = umask(S_IXUSR|S_IXGRP|S_IWOTH|S_IROTH|S_IXOTH);
78 		mode = S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP;
79 	}
80 
81 	if (bind(fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) {
82 		log_warn("%s: bind: %s", __func__, cs->cs_name);
83 		close(fd);
84 		(void)umask(old_umask);
85 		return (-1);
86 	}
87 	(void)umask(old_umask);
88 
89 	if (chmod(cs->cs_name, mode) == -1) {
90 		log_warn("%s: chmod", __func__);
91 		close(fd);
92 		(void)unlink(cs->cs_name);
93 		return (-1);
94 	}
95 
96 	cs->cs_fd = fd;
97 	cs->cs_env = env;
98 
99 	return (0);
100 }
101 
102 int
103 control_listen(struct control_sock *cs)
104 {
105 	if (cs->cs_name == NULL)
106 		return (0);
107 
108 	if (listen(cs->cs_fd, CONTROL_BACKLOG) == -1) {
109 		log_warn("%s: listen", __func__);
110 		return (-1);
111 	}
112 
113 	event_set(&cs->cs_ev, cs->cs_fd, EV_READ,
114 	    control_accept, cs);
115 	event_add(&cs->cs_ev, NULL);
116 	evtimer_set(&cs->cs_evt, control_accept, cs);
117 
118 	return (0);
119 }
120 
121 void
122 control_cleanup(struct control_sock *cs)
123 {
124 	if (cs->cs_name == NULL)
125 		return;
126 	event_del(&cs->cs_ev);
127 	event_del(&cs->cs_evt);
128 }
129 
130 /* ARGSUSED */
131 void
132 control_accept(int listenfd, short event, void *arg)
133 {
134 	int			 connfd;
135 	socklen_t		 len;
136 	struct sockaddr_un	 sun;
137 	struct ctl_conn		*c;
138 	struct control_sock	*cs = arg;
139 
140 	event_add(&cs->cs_ev, NULL);
141 	if ((event & EV_TIMEOUT))
142 		return;
143 
144 	len = sizeof(sun);
145 	if ((connfd = accept4(listenfd,
146 	    (struct sockaddr *)&sun, &len, SOCK_NONBLOCK)) == -1) {
147 		/*
148 		 * Pause accept if we are out of file descriptors, or
149 		 * libevent will haunt us here too.
150 		 */
151 		if (errno == ENFILE || errno == EMFILE) {
152 			struct timeval evtpause = { 1, 0 };
153 
154 			event_del(&cs->cs_ev);
155 			evtimer_add(&cs->cs_evt, &evtpause);
156 		} else if (errno != EWOULDBLOCK && errno != EINTR &&
157 		    errno != ECONNABORTED)
158 			log_warn("%s: accept", __func__);
159 		return;
160 	}
161 
162 	if ((c = calloc(1, sizeof(struct ctl_conn))) == NULL) {
163 		close(connfd);
164 		log_warn("%s: calloc", __func__);
165 		return;
166 	}
167 
168 	imsg_init(&c->iev.ibuf, connfd);
169 	c->iev.handler = control_dispatch_imsg;
170 	c->iev.events = EV_READ;
171 	c->iev.data = cs;	/* proc.c cheats (reuses the handler) */
172 	event_set(&c->iev.ev, c->iev.ibuf.fd, c->iev.events,
173 	    c->iev.handler, cs);
174 	event_add(&c->iev.ev, NULL);
175 
176 	TAILQ_INSERT_TAIL(&ctl_conns, c, entry);
177 }
178 
179 struct ctl_conn *
180 control_connbyfd(int fd)
181 {
182 	struct ctl_conn	*c;
183 
184 	for (c = TAILQ_FIRST(&ctl_conns); c != NULL && c->iev.ibuf.fd != fd;
185 	    c = TAILQ_NEXT(c, entry))
186 		;	/* nothing */
187 
188 	return (c);
189 }
190 
191 void
192 control_close(int fd, struct control_sock *cs)
193 {
194 	struct ctl_conn	*c;
195 
196 	if ((c = control_connbyfd(fd)) == NULL) {
197 		log_warn("%s: fd %d not found", __func__, fd);
198 		return;
199 	}
200 
201 	msgbuf_clear(&c->iev.ibuf.w);
202 	TAILQ_REMOVE(&ctl_conns, c, entry);
203 
204 	event_del(&c->iev.ev);
205 	close(c->iev.ibuf.fd);
206 
207 	/* Some file descriptors are available again. */
208 	if (evtimer_pending(&cs->cs_evt, NULL)) {
209 		evtimer_del(&cs->cs_evt);
210 		event_add(&cs->cs_ev, NULL);
211 	}
212 
213 	free(c);
214 }
215 
216 /* ARGSUSED */
217 void
218 control_dispatch_imsg(int fd, short event, void *arg)
219 {
220 	struct control_sock	*cs = arg;
221 	struct ctl_conn		*c;
222 	struct imsg		 imsg;
223 	struct ctl_id		 id;
224 	int			 n;
225 	int			 verbose;
226 	struct relayd		*env = cs->cs_env;
227 	struct privsep		*ps = env->sc_ps;
228 
229 	if ((c = control_connbyfd(fd)) == NULL) {
230 		log_warn("%s: fd %d not found", __func__, fd);
231 		return;
232 	}
233 
234 	if (event & EV_READ) {
235 		if (((n = imsg_read(&c->iev.ibuf)) == -1 && errno != EAGAIN) ||
236 		    n == 0) {
237 			control_close(fd, cs);
238 			return;
239 		}
240 	}
241 
242 	if (event & EV_WRITE) {
243 		if (msgbuf_write(&c->iev.ibuf.w) <= 0 && errno != EAGAIN) {
244 			control_close(fd, cs);
245 			return;
246 		}
247 	}
248 
249 	for (;;) {
250 		if ((n = imsg_get(&c->iev.ibuf, &imsg)) == -1) {
251 			control_close(fd, cs);
252 			return;
253 		}
254 
255 		if (n == 0)
256 			break;
257 
258 		if (c->waiting) {
259 			log_debug("%s: unexpected imsg %d",
260 			    __func__, imsg.hdr.type);
261 			imsg_free(&imsg);
262 			control_close(fd, cs);
263 			return;
264 		}
265 
266 		switch (imsg.hdr.type) {
267 		case IMSG_CTL_SHOW_SUM:
268 			show(c);
269 			break;
270 		case IMSG_CTL_SESSION:
271 			show_sessions(c);
272 			break;
273 		case IMSG_CTL_RDR_DISABLE:
274 			if (imsg.hdr.len != IMSG_HEADER_SIZE + sizeof(id))
275 				fatalx("invalid imsg header len");
276 			memcpy(&id, imsg.data, sizeof(id));
277 			if (disable_rdr(c, &id))
278 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
279 				    0, ps->ps_instance + 1, -1, NULL, 0);
280 			else {
281 				memcpy(imsg.data, &id, sizeof(id));
282 				control_imsg_forward(ps, &imsg);
283 				imsg_compose_event(&c->iev, IMSG_CTL_OK,
284 				    0, ps->ps_instance + 1, -1, NULL, 0);
285 			}
286 			break;
287 		case IMSG_CTL_RDR_ENABLE:
288 			if (imsg.hdr.len != IMSG_HEADER_SIZE + sizeof(id))
289 				fatalx("invalid imsg header len");
290 			memcpy(&id, imsg.data, sizeof(id));
291 			if (enable_rdr(c, &id))
292 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
293 				    0, ps->ps_instance + 1, -1, NULL, 0);
294 			else {
295 				memcpy(imsg.data, &id, sizeof(id));
296 				control_imsg_forward(ps, &imsg);
297 				imsg_compose_event(&c->iev, IMSG_CTL_OK,
298 				    0, ps->ps_instance + 1, -1, NULL, 0);
299 			}
300 			break;
301 		case IMSG_CTL_TABLE_DISABLE:
302 			if (imsg.hdr.len != IMSG_HEADER_SIZE + sizeof(id))
303 				fatalx("invalid imsg header len");
304 			memcpy(&id, imsg.data, sizeof(id));
305 			if (disable_table(c, &id))
306 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
307 				    0, ps->ps_instance + 1, -1, NULL, 0);
308 			else {
309 				memcpy(imsg.data, &id, sizeof(id));
310 				control_imsg_forward(ps, &imsg);
311 				imsg_compose_event(&c->iev, IMSG_CTL_OK,
312 				    0, ps->ps_instance + 1, -1, NULL, 0);
313 			}
314 			break;
315 		case IMSG_CTL_TABLE_ENABLE:
316 			if (imsg.hdr.len != IMSG_HEADER_SIZE + sizeof(id))
317 				fatalx("invalid imsg header len");
318 			memcpy(&id, imsg.data, sizeof(id));
319 			if (enable_table(c, &id))
320 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
321 				    0, ps->ps_instance + 1, -1, NULL, 0);
322 			else {
323 				memcpy(imsg.data, &id, sizeof(id));
324 				control_imsg_forward(ps, &imsg);
325 				imsg_compose_event(&c->iev, IMSG_CTL_OK,
326 				    0, ps->ps_instance + 1, -1, NULL, 0);
327 			}
328 			break;
329 		case IMSG_CTL_HOST_DISABLE:
330 			if (imsg.hdr.len != IMSG_HEADER_SIZE + sizeof(id))
331 				fatalx("invalid imsg header len");
332 			memcpy(&id, imsg.data, sizeof(id));
333 			if (disable_host(c, &id, NULL))
334 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
335 				    0, ps->ps_instance + 1, -1, NULL, 0);
336 			else {
337 				memcpy(imsg.data, &id, sizeof(id));
338 				control_imsg_forward(ps, &imsg);
339 				imsg_compose_event(&c->iev, IMSG_CTL_OK,
340 				    0, ps->ps_instance + 1, -1, NULL, 0);
341 			}
342 			break;
343 		case IMSG_CTL_HOST_ENABLE:
344 			if (imsg.hdr.len != IMSG_HEADER_SIZE + sizeof(id))
345 				fatalx("invalid imsg header len");
346 			memcpy(&id, imsg.data, sizeof(id));
347 			if (enable_host(c, &id, NULL))
348 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
349 				    0, ps->ps_instance + 1, -1, NULL, 0);
350 			else {
351 				memcpy(imsg.data, &id, sizeof(id));
352 				control_imsg_forward(ps, &imsg);
353 				imsg_compose_event(&c->iev, IMSG_CTL_OK,
354 				    0, ps->ps_instance + 1, -1, NULL, 0);
355 			}
356 			break;
357 		case IMSG_CTL_SHUTDOWN:
358 		case IMSG_CTL_RELOAD:
359 			proc_forward_imsg(env->sc_ps, &imsg, PROC_PARENT, -1);
360 			break;
361 		case IMSG_CTL_POLL:
362 			proc_compose(env->sc_ps, PROC_HCE, IMSG_CTL_POLL, NULL, 0);
363 			imsg_compose_event(&c->iev, IMSG_CTL_OK,
364 			    0, ps->ps_instance + 1, -1, NULL, 0);
365 			break;
366 		case IMSG_CTL_NOTIFY:
367 			if (c->flags & CTL_CONN_NOTIFY) {
368 				log_debug("%s: "
369 				    "client requested notify more than once",
370 				    __func__);
371 				imsg_compose_event(&c->iev, IMSG_CTL_FAIL,
372 				    0, ps->ps_instance + 1, -1, NULL, 0);
373 				break;
374 			}
375 			c->flags |= CTL_CONN_NOTIFY;
376 			break;
377 		case IMSG_CTL_VERBOSE:
378 			IMSG_SIZE_CHECK(&imsg, &verbose);
379 
380 			memcpy(&verbose, imsg.data, sizeof(verbose));
381 
382 			proc_forward_imsg(env->sc_ps, &imsg, PROC_PARENT, -1);
383 			proc_forward_imsg(env->sc_ps, &imsg, PROC_HCE, -1);
384 			proc_forward_imsg(env->sc_ps, &imsg, PROC_RELAY, -1);
385 
386 			memcpy(imsg.data, &verbose, sizeof(verbose));
387 			control_imsg_forward(ps, &imsg);
388 			log_verbose(verbose);
389 			break;
390 		default:
391 			log_debug("%s: error handling imsg %d",
392 			    __func__, imsg.hdr.type);
393 			break;
394 		}
395 		imsg_free(&imsg);
396 	}
397 
398 	imsg_event_add(&c->iev);
399 }
400 
401 void
402 control_imsg_forward(struct privsep *ps, struct imsg *imsg)
403 {
404 	struct ctl_conn *c;
405 
406 	TAILQ_FOREACH(c, &ctl_conns, entry)
407 		if (c->flags & CTL_CONN_NOTIFY)
408 			imsg_compose_event(&c->iev, imsg->hdr.type,
409 			    0, ps->ps_instance + 1, -1, imsg->data,
410 			    imsg->hdr.len - IMSG_HEADER_SIZE);
411 }
412