1 /* $OpenBSD: proc.c,v 1.28 2023/02/15 20:44:01 tobhe Exp $ */ 2 3 /* 4 * Copyright (c) 2010 - 2016 Reyk Floeter <reyk@openbsd.org> 5 * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org> 6 * 7 * Permission to use, copy, modify, and distribute this software for any 8 * purpose with or without fee is hereby granted, provided that the above 9 * copyright notice and this permission notice appear in all copies. 10 * 11 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 12 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 13 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 14 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 15 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 16 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 17 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 18 */ 19 20 #include <sys/types.h> 21 #include <sys/queue.h> 22 #include <sys/socket.h> 23 #include <sys/wait.h> 24 25 #include <fcntl.h> 26 #include <stdio.h> 27 #include <stdlib.h> 28 #include <unistd.h> 29 #include <string.h> 30 #include <errno.h> 31 #include <signal.h> 32 #include <paths.h> 33 #include <pwd.h> 34 #include <event.h> 35 #include <imsg.h> 36 37 #include "snmpd.h" 38 39 void proc_exec(struct privsep *, struct privsep_proc *, unsigned int, int, 40 int, char **); 41 void proc_setup(struct privsep *, struct privsep_proc *, unsigned int); 42 void proc_open(struct privsep *, int, int); 43 void proc_accept(struct privsep *, int, enum privsep_procid, 44 unsigned int); 45 void proc_close(struct privsep *); 46 void proc_shutdown(struct privsep_proc *); 47 void proc_sig_handler(int, short, void *); 48 void proc_range(struct privsep *, enum privsep_procid, int *, int *); 49 int proc_dispatch_null(int, struct privsep_proc *, struct imsg *); 50 51 enum privsep_procid 52 proc_getid(struct privsep_proc *procs, unsigned int nproc, 53 const char *proc_name) 54 { 55 struct privsep_proc *p; 56 unsigned int proc; 57 58 for (proc = 0; proc < nproc; proc++) { 59 p = &procs[proc]; 60 if (strcmp(p->p_title, proc_name)) 61 continue; 62 63 return (p->p_id); 64 } 65 66 return (PROC_MAX); 67 } 68 69 void 70 proc_exec(struct privsep *ps, struct privsep_proc *procs, unsigned int nproc, 71 int debug, int argc, char **argv) 72 { 73 unsigned int proc, nargc, i, proc_i; 74 char **nargv; 75 struct privsep_proc *p; 76 char num[32]; 77 int fd; 78 79 /* Prepare the new process argv. */ 80 nargv = calloc(argc + 5, sizeof(char *)); 81 if (nargv == NULL) 82 fatal("%s: calloc", __func__); 83 84 /* Copy call argument first. */ 85 nargc = 0; 86 nargv[nargc++] = argv[0]; 87 88 /* Set process name argument and save the position. */ 89 nargv[nargc++] = "-P"; 90 proc_i = nargc; 91 nargc++; 92 93 /* Point process instance arg to stack and copy the original args. */ 94 nargv[nargc++] = "-I"; 95 nargv[nargc++] = num; 96 for (i = 1; i < (unsigned int) argc; i++) 97 nargv[nargc++] = argv[i]; 98 99 nargv[nargc] = NULL; 100 101 for (proc = 0; proc < nproc; proc++) { 102 p = &procs[proc]; 103 104 /* Update args with process title. */ 105 nargv[proc_i] = (char *)(uintptr_t)p->p_title; 106 107 /* Fire children processes. */ 108 for (i = 0; i < ps->ps_instances[p->p_id]; i++) { 109 /* Update the process instance number. */ 110 snprintf(num, sizeof(num), "%u", i); 111 112 fd = ps->ps_pipes[p->p_id][i].pp_pipes[PROC_PARENT][0]; 113 ps->ps_pipes[p->p_id][i].pp_pipes[PROC_PARENT][0] = -1; 114 115 switch (fork()) { 116 case -1: 117 fatal("%s: fork", __func__); 118 break; 119 case 0: 120 /* First create a new session */ 121 if (setsid() == -1) 122 fatal("setsid"); 123 124 /* Prepare parent socket. */ 125 if (fd != PROC_PARENT_SOCK_FILENO) { 126 if (dup2(fd, PROC_PARENT_SOCK_FILENO) 127 == -1) 128 fatal("dup2"); 129 } else if (fcntl(fd, F_SETFD, 0) == -1) 130 fatal("fcntl"); 131 132 /* Daemons detach from terminal. */ 133 if (!debug && (fd = 134 open(_PATH_DEVNULL, O_RDWR, 0)) != -1) { 135 (void)dup2(fd, STDIN_FILENO); 136 (void)dup2(fd, STDOUT_FILENO); 137 (void)dup2(fd, STDERR_FILENO); 138 if (fd > 2) 139 (void)close(fd); 140 } 141 142 execvp(argv[0], nargv); 143 fatal("%s: execvp", __func__); 144 break; 145 default: 146 /* Close child end. */ 147 close(fd); 148 break; 149 } 150 } 151 } 152 free(nargv); 153 } 154 155 void 156 proc_connect(struct privsep *ps) 157 { 158 struct imsgev *iev; 159 unsigned int src, dst, inst; 160 161 /* Don't distribute any sockets if we are not really going to run. */ 162 if (ps->ps_noaction) 163 return; 164 165 for (dst = 0; dst < PROC_MAX; dst++) { 166 /* We don't communicate with ourselves. */ 167 if (dst == PROC_PARENT) 168 continue; 169 170 for (inst = 0; inst < ps->ps_instances[dst]; inst++) { 171 iev = &ps->ps_ievs[dst][inst]; 172 imsg_init(&iev->ibuf, ps->ps_pp->pp_pipes[dst][inst]); 173 event_set(&iev->ev, iev->ibuf.fd, iev->events, 174 iev->handler, iev->data); 175 event_add(&iev->ev, NULL); 176 } 177 } 178 179 /* Distribute the socketpair()s for everyone. */ 180 for (src = 0; src < PROC_MAX; src++) 181 for (dst = src; dst < PROC_MAX; dst++) { 182 /* Parent already distributed its fds. */ 183 if (src == PROC_PARENT || dst == PROC_PARENT) 184 continue; 185 186 proc_open(ps, src, dst); 187 } 188 } 189 190 void 191 proc_init(struct privsep *ps, struct privsep_proc *procs, unsigned int nproc, 192 int debug, int argc, char **argv, enum privsep_procid proc_id) 193 { 194 struct privsep_proc *p = NULL; 195 struct privsep_pipes *pa, *pb; 196 unsigned int proc; 197 unsigned int dst; 198 int fds[2]; 199 200 /* Don't initiate anything if we are not really going to run. */ 201 if (ps->ps_noaction) 202 return; 203 204 if (proc_id == PROC_PARENT) { 205 privsep_process = PROC_PARENT; 206 proc_setup(ps, procs, nproc); 207 208 /* 209 * Create the children sockets so we can use them 210 * to distribute the rest of the socketpair()s using 211 * proc_connect() later. 212 */ 213 for (dst = 0; dst < PROC_MAX; dst++) { 214 /* Don't create socket for ourselves. */ 215 if (dst == PROC_PARENT) 216 continue; 217 218 for (proc = 0; proc < ps->ps_instances[dst]; proc++) { 219 pa = &ps->ps_pipes[PROC_PARENT][0]; 220 pb = &ps->ps_pipes[dst][proc]; 221 if (socketpair(AF_UNIX, 222 SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC, 223 PF_UNSPEC, fds) == -1) 224 fatal("%s: socketpair", __func__); 225 226 pa->pp_pipes[dst][proc] = fds[0]; 227 pb->pp_pipes[PROC_PARENT][0] = fds[1]; 228 } 229 } 230 231 /* Engage! */ 232 proc_exec(ps, procs, nproc, debug, argc, argv); 233 return; 234 } 235 236 /* Initialize a child */ 237 for (proc = 0; proc < nproc; proc++) { 238 if (procs[proc].p_id != proc_id) 239 continue; 240 p = &procs[proc]; 241 break; 242 } 243 if (p == NULL || p->p_init == NULL) 244 fatalx("%s: process %d missing process initialization", 245 __func__, proc_id); 246 247 p->p_init(ps, p); 248 249 fatalx("failed to initiate child process"); 250 } 251 252 void 253 proc_accept(struct privsep *ps, int fd, enum privsep_procid dst, 254 unsigned int n) 255 { 256 struct privsep_pipes *pp = ps->ps_pp; 257 struct imsgev *iev; 258 259 if (ps->ps_ievs[dst] == NULL) { 260 #if DEBUG > 1 261 log_debug("%s: %s src %d %d to dst %d %d not connected", 262 __func__, ps->ps_title[privsep_process], 263 privsep_process, ps->ps_instance + 1, 264 dst, n + 1); 265 #endif 266 close(fd); 267 return; 268 } 269 270 if (pp->pp_pipes[dst][n] != -1) { 271 log_warnx("%s: duplicated descriptor", __func__); 272 close(fd); 273 return; 274 } else 275 pp->pp_pipes[dst][n] = fd; 276 277 iev = &ps->ps_ievs[dst][n]; 278 imsg_init(&iev->ibuf, fd); 279 event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data); 280 event_add(&iev->ev, NULL); 281 } 282 283 void 284 proc_setup(struct privsep *ps, struct privsep_proc *procs, unsigned int nproc) 285 { 286 unsigned int i, j, src, dst, id; 287 struct privsep_pipes *pp; 288 289 /* Initialize parent title, ps_instances and procs. */ 290 ps->ps_title[PROC_PARENT] = "parent"; 291 292 for (src = 0; src < PROC_MAX; src++) 293 /* Default to 1 process instance */ 294 if (ps->ps_instances[src] < 1) 295 ps->ps_instances[src] = 1; 296 297 for (src = 0; src < nproc; src++) { 298 procs[src].p_ps = ps; 299 if (procs[src].p_cb == NULL) 300 procs[src].p_cb = proc_dispatch_null; 301 302 id = procs[src].p_id; 303 ps->ps_title[id] = procs[src].p_title; 304 if ((ps->ps_ievs[id] = calloc(ps->ps_instances[id], 305 sizeof(struct imsgev))) == NULL) 306 fatal("%s: calloc", __func__); 307 308 /* With this set up, we are ready to call imsg_init(). */ 309 for (i = 0; i < ps->ps_instances[id]; i++) { 310 ps->ps_ievs[id][i].handler = proc_dispatch; 311 ps->ps_ievs[id][i].events = EV_READ; 312 ps->ps_ievs[id][i].proc = &procs[src]; 313 ps->ps_ievs[id][i].data = &ps->ps_ievs[id][i]; 314 } 315 } 316 317 /* 318 * Allocate pipes for all process instances (incl. parent) 319 * 320 * - ps->ps_pipes: N:M mapping 321 * N source processes connected to M destination processes: 322 * [src][instances][dst][instances], for example 323 * [PROC_RELAY][3][PROC_CA][3] 324 * 325 * - ps->ps_pp: per-process 1:M part of ps->ps_pipes 326 * Each process instance has a destination array of socketpair fds: 327 * [dst][instances], for example 328 * [PROC_PARENT][0] 329 */ 330 for (src = 0; src < PROC_MAX; src++) { 331 /* Allocate destination array for each process */ 332 if ((ps->ps_pipes[src] = calloc(ps->ps_instances[src], 333 sizeof(struct privsep_pipes))) == NULL) 334 fatal("%s: calloc", __func__); 335 336 for (i = 0; i < ps->ps_instances[src]; i++) { 337 pp = &ps->ps_pipes[src][i]; 338 339 for (dst = 0; dst < PROC_MAX; dst++) { 340 /* Allocate maximum fd integers */ 341 if ((pp->pp_pipes[dst] = 342 calloc(ps->ps_instances[dst], 343 sizeof(int))) == NULL) 344 fatal("%s: calloc", __func__); 345 346 /* Mark fd as unused */ 347 for (j = 0; j < ps->ps_instances[dst]; j++) 348 pp->pp_pipes[dst][j] = -1; 349 } 350 } 351 } 352 353 ps->ps_pp = &ps->ps_pipes[privsep_process][ps->ps_instance]; 354 } 355 356 void 357 proc_kill(struct privsep *ps) 358 { 359 char *cause; 360 pid_t pid; 361 int len, status; 362 363 if (privsep_process != PROC_PARENT) 364 return; 365 366 proc_close(ps); 367 368 do { 369 pid = waitpid(WAIT_ANY, &status, 0); 370 if (pid <= 0) 371 continue; 372 373 if (WIFSIGNALED(status)) { 374 len = asprintf(&cause, "terminated; signal %d", 375 WTERMSIG(status)); 376 } else if (WIFEXITED(status)) { 377 if (WEXITSTATUS(status) != 0) 378 len = asprintf(&cause, "exited abnormally"); 379 else 380 len = 0; 381 } else 382 len = -1; 383 384 if (len == 0) { 385 /* child exited OK, don't print a warning message */ 386 } else if (len != -1) { 387 log_warnx("lost child: pid %u %s", pid, cause); 388 free(cause); 389 } else 390 log_warnx("lost child: pid %u", pid); 391 } while (pid != -1 || (pid == -1 && errno == EINTR)); 392 } 393 394 void 395 proc_open(struct privsep *ps, int src, int dst) 396 { 397 struct privsep_pipes *pa, *pb; 398 struct privsep_fd pf; 399 int fds[2]; 400 unsigned int i, j; 401 402 /* Exchange pipes between process. */ 403 for (i = 0; i < ps->ps_instances[src]; i++) { 404 for (j = 0; j < ps->ps_instances[dst]; j++) { 405 /* Don't create sockets for ourself. */ 406 if (src == dst && i == j) 407 continue; 408 409 pa = &ps->ps_pipes[src][i]; 410 pb = &ps->ps_pipes[dst][j]; 411 if (socketpair(AF_UNIX, 412 SOCK_STREAM | SOCK_NONBLOCK | SOCK_CLOEXEC, 413 PF_UNSPEC, fds) == -1) 414 fatal("%s: socketpair", __func__); 415 416 pa->pp_pipes[dst][j] = fds[0]; 417 pb->pp_pipes[src][i] = fds[1]; 418 419 pf.pf_procid = src; 420 pf.pf_instance = i; 421 if (proc_compose_imsg(ps, dst, j, IMSG_CTL_PROCFD, 422 -1, pb->pp_pipes[src][i], &pf, sizeof(pf)) == -1) 423 fatal("%s: proc_compose_imsg", __func__); 424 425 pf.pf_procid = dst; 426 pf.pf_instance = j; 427 if (proc_compose_imsg(ps, src, i, IMSG_CTL_PROCFD, 428 -1, pa->pp_pipes[dst][j], &pf, sizeof(pf)) == -1) 429 fatal("%s: proc_compose_imsg", __func__); 430 431 /* 432 * We have to flush to send the descriptors and close 433 * them to avoid the fd ramp on startup. 434 */ 435 if (proc_flush_imsg(ps, src, i) == -1 || 436 proc_flush_imsg(ps, dst, j) == -1) 437 fatal("%s: imsg_flush", __func__); 438 } 439 } 440 } 441 442 void 443 proc_close(struct privsep *ps) 444 { 445 unsigned int dst, n; 446 struct privsep_pipes *pp; 447 448 if (ps == NULL) 449 return; 450 451 pp = ps->ps_pp; 452 453 for (dst = 0; dst < PROC_MAX; dst++) { 454 if (ps->ps_ievs[dst] == NULL) 455 continue; 456 457 for (n = 0; n < ps->ps_instances[dst]; n++) { 458 if (pp->pp_pipes[dst][n] == -1) 459 continue; 460 461 /* Cancel the fd, close and invalidate the fd */ 462 event_del(&(ps->ps_ievs[dst][n].ev)); 463 imsg_clear(&(ps->ps_ievs[dst][n].ibuf)); 464 close(pp->pp_pipes[dst][n]); 465 pp->pp_pipes[dst][n] = -1; 466 } 467 free(ps->ps_ievs[dst]); 468 } 469 } 470 471 void 472 proc_shutdown(struct privsep_proc *p) 473 { 474 struct privsep *ps = p->p_ps; 475 476 if (p->p_shutdown != NULL) 477 (*p->p_shutdown)(); 478 479 proc_close(ps); 480 481 log_info("%s exiting, pid %d", p->p_title, getpid()); 482 483 exit(0); 484 } 485 486 void 487 proc_sig_handler(int sig, short event, void *arg) 488 { 489 struct privsep_proc *p = arg; 490 491 switch (sig) { 492 case SIGINT: 493 case SIGTERM: 494 proc_shutdown(p); 495 break; 496 case SIGCHLD: 497 case SIGHUP: 498 case SIGPIPE: 499 case SIGUSR1: 500 /* ignore */ 501 break; 502 default: 503 fatalx("%s: unexpected signal", __func__); 504 /* NOTREACHED */ 505 } 506 } 507 508 void 509 proc_run(struct privsep *ps, struct privsep_proc *p, 510 struct privsep_proc *procs, unsigned int nproc, 511 void (*run)(struct privsep *, struct privsep_proc *, void *), void *arg) 512 { 513 struct passwd *pw; 514 const char *root; 515 516 log_procinit(p->p_title); 517 518 /* Set the process group of the current process */ 519 setpgid(0, 0); 520 521 /* Use non-standard user */ 522 if (p->p_pw != NULL) 523 pw = p->p_pw; 524 else 525 pw = ps->ps_pw; 526 527 /* Change root directory */ 528 if (p->p_chroot != NULL) 529 root = p->p_chroot; 530 else 531 root = pw->pw_dir; 532 533 if (chroot(root) == -1) 534 fatal("%s: chroot", __func__); 535 if (chdir("/") == -1) 536 fatal("%s: chdir(\"/\")", __func__); 537 538 privsep_process = p->p_id; 539 540 setproctitle("%s", p->p_title); 541 542 if (setgroups(1, &pw->pw_gid) || 543 setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) || 544 setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) 545 fatal("%s: cannot drop privileges", __func__); 546 547 event_init(); 548 549 signal_set(&ps->ps_evsigint, SIGINT, proc_sig_handler, p); 550 signal_set(&ps->ps_evsigterm, SIGTERM, proc_sig_handler, p); 551 signal_set(&ps->ps_evsigchld, SIGCHLD, proc_sig_handler, p); 552 signal_set(&ps->ps_evsighup, SIGHUP, proc_sig_handler, p); 553 signal_set(&ps->ps_evsigpipe, SIGPIPE, proc_sig_handler, p); 554 signal_set(&ps->ps_evsigusr1, SIGUSR1, proc_sig_handler, p); 555 556 signal_add(&ps->ps_evsigint, NULL); 557 signal_add(&ps->ps_evsigterm, NULL); 558 signal_add(&ps->ps_evsigchld, NULL); 559 signal_add(&ps->ps_evsighup, NULL); 560 signal_add(&ps->ps_evsigpipe, NULL); 561 signal_add(&ps->ps_evsigusr1, NULL); 562 563 proc_setup(ps, procs, nproc); 564 proc_accept(ps, PROC_PARENT_SOCK_FILENO, PROC_PARENT, 0); 565 DPRINTF("%s: %s %d/%d, pid %d", __func__, p->p_title, 566 ps->ps_instance + 1, ps->ps_instances[p->p_id], getpid()); 567 568 if (run != NULL) 569 run(ps, p, arg); 570 571 event_dispatch(); 572 573 proc_shutdown(p); 574 } 575 576 void 577 proc_dispatch(int fd, short event, void *arg) 578 { 579 struct imsgev *iev = arg; 580 struct privsep_proc *p = iev->proc; 581 struct privsep *ps = p->p_ps; 582 struct imsgbuf *ibuf; 583 struct imsg imsg; 584 ssize_t n; 585 int verbose; 586 const char *title; 587 struct privsep_fd pf; 588 589 title = ps->ps_title[privsep_process]; 590 ibuf = &iev->ibuf; 591 592 if (event & EV_READ) { 593 if ((n = imsg_read(ibuf)) == -1 && errno != EAGAIN) 594 fatal("%s: imsg_read", __func__); 595 if (n == 0) { 596 /* this pipe is dead, so remove the event handler */ 597 event_del(&iev->ev); 598 event_loopexit(NULL); 599 return; 600 } 601 } 602 603 if (event & EV_WRITE) { 604 if ((n = msgbuf_write(&ibuf->w)) == -1 && errno != EAGAIN) 605 fatal("%s: msgbuf_write", __func__); 606 if (n == 0) { 607 /* this pipe is dead, so remove the event handler */ 608 event_del(&iev->ev); 609 event_loopexit(NULL); 610 return; 611 } 612 } 613 614 for (;;) { 615 if ((n = imsg_get(ibuf, &imsg)) == -1) 616 fatal("%s: imsg_get", __func__); 617 if (n == 0) 618 break; 619 620 #if DEBUG > 1 621 log_debug("%s: %s %d got imsg %d peerid %d from %s %d", 622 __func__, title, ps->ps_instance + 1, 623 imsg.hdr.type, imsg.hdr.peerid, p->p_title, imsg.hdr.pid); 624 #endif 625 626 /* 627 * Check the message with the program callback 628 */ 629 if ((p->p_cb)(fd, p, &imsg) == 0) { 630 /* Message was handled by the callback, continue */ 631 imsg_free(&imsg); 632 continue; 633 } 634 635 /* 636 * Generic message handling 637 */ 638 switch (imsg.hdr.type) { 639 case IMSG_CTL_VERBOSE: 640 IMSG_SIZE_CHECK(&imsg, &verbose); 641 memcpy(&verbose, imsg.data, sizeof(verbose)); 642 log_setverbose(verbose); 643 break; 644 case IMSG_CTL_PROCFD: 645 IMSG_SIZE_CHECK(&imsg, &pf); 646 memcpy(&pf, imsg.data, sizeof(pf)); 647 proc_accept(ps, imsg.fd, pf.pf_procid, 648 pf.pf_instance); 649 break; 650 default: 651 fatalx("%s: %s %d got invalid imsg %d peerid %d " 652 "from %s %d", 653 __func__, title, ps->ps_instance + 1, 654 imsg.hdr.type, imsg.hdr.peerid, 655 p->p_title, imsg.hdr.pid); 656 } 657 imsg_free(&imsg); 658 } 659 imsg_event_add(iev); 660 } 661 662 int 663 proc_dispatch_null(int fd, struct privsep_proc *p, struct imsg *imsg) 664 { 665 return (-1); 666 } 667 668 /* 669 * imsg helper functions 670 */ 671 672 void 673 imsg_event_add(struct imsgev *iev) 674 { 675 if (iev->handler == NULL) { 676 imsg_flush(&iev->ibuf); 677 return; 678 } 679 680 iev->events = EV_READ; 681 if (iev->ibuf.w.queued) 682 iev->events |= EV_WRITE; 683 684 event_del(&iev->ev); 685 event_set(&iev->ev, iev->ibuf.fd, iev->events, iev->handler, iev->data); 686 event_add(&iev->ev, NULL); 687 } 688 689 int 690 imsg_compose_event(struct imsgev *iev, uint16_t type, uint32_t peerid, 691 pid_t pid, int fd, void *data, uint16_t datalen) 692 { 693 int ret; 694 695 if ((ret = imsg_compose(&iev->ibuf, type, peerid, 696 pid, fd, data, datalen)) == -1) 697 return (ret); 698 imsg_event_add(iev); 699 return (ret); 700 } 701 702 int 703 imsg_composev_event(struct imsgev *iev, uint16_t type, uint32_t peerid, 704 pid_t pid, int fd, const struct iovec *iov, int iovcnt) 705 { 706 int ret; 707 708 if ((ret = imsg_composev(&iev->ibuf, type, peerid, 709 pid, fd, iov, iovcnt)) == -1) 710 return (ret); 711 imsg_event_add(iev); 712 return (ret); 713 } 714 715 void 716 proc_range(struct privsep *ps, enum privsep_procid id, int *n, int *m) 717 { 718 if (*n == -1) { 719 /* Use a range of all target instances */ 720 *n = 0; 721 *m = ps->ps_instances[id]; 722 } else { 723 /* Use only a single slot of the specified peer process */ 724 *m = *n + 1; 725 } 726 } 727 728 int 729 proc_compose_imsg(struct privsep *ps, enum privsep_procid id, int n, 730 uint16_t type, uint32_t peerid, int fd, void *data, uint16_t datalen) 731 { 732 int m; 733 734 proc_range(ps, id, &n, &m); 735 for (; n < m; n++) { 736 if (imsg_compose_event(&ps->ps_ievs[id][n], 737 type, peerid, ps->ps_instance + 1, fd, data, datalen) == -1) 738 return (-1); 739 } 740 741 return (0); 742 } 743 744 int 745 proc_compose(struct privsep *ps, enum privsep_procid id, 746 uint16_t type, void *data, uint16_t datalen) 747 { 748 return (proc_compose_imsg(ps, id, -1, type, -1, -1, data, datalen)); 749 } 750 751 int 752 proc_composev_imsg(struct privsep *ps, enum privsep_procid id, int n, 753 uint16_t type, uint32_t peerid, int fd, const struct iovec *iov, int iovcnt) 754 { 755 int m; 756 757 proc_range(ps, id, &n, &m); 758 for (; n < m; n++) 759 if (imsg_composev_event(&ps->ps_ievs[id][n], 760 type, peerid, ps->ps_instance + 1, fd, iov, iovcnt) == -1) 761 return (-1); 762 763 return (0); 764 } 765 766 int 767 proc_composev(struct privsep *ps, enum privsep_procid id, 768 uint16_t type, const struct iovec *iov, int iovcnt) 769 { 770 return (proc_composev_imsg(ps, id, -1, type, -1, -1, iov, iovcnt)); 771 } 772 773 int 774 proc_forward_imsg(struct privsep *ps, struct imsg *imsg, 775 enum privsep_procid id, int n) 776 { 777 return (proc_compose_imsg(ps, id, n, imsg->hdr.type, 778 imsg->hdr.peerid, imsg->fd, imsg->data, IMSG_DATA_SIZE(imsg))); 779 } 780 781 struct imsgbuf * 782 proc_ibuf(struct privsep *ps, enum privsep_procid id, int n) 783 { 784 int m; 785 786 proc_range(ps, id, &n, &m); 787 return (&ps->ps_ievs[id][n].ibuf); 788 } 789 790 struct imsgev * 791 proc_iev(struct privsep *ps, enum privsep_procid id, int n) 792 { 793 int m; 794 795 proc_range(ps, id, &n, &m); 796 return (&ps->ps_ievs[id][n]); 797 } 798 799 /* This function should only be called with care as it breaks async I/O */ 800 int 801 proc_flush_imsg(struct privsep *ps, enum privsep_procid id, int n) 802 { 803 struct imsgbuf *ibuf; 804 int m, ret = 0; 805 806 proc_range(ps, id, &n, &m); 807 for (; n < m; n++) { 808 if ((ibuf = proc_ibuf(ps, id, n)) == NULL) 809 return (-1); 810 do { 811 ret = imsg_flush(ibuf); 812 } while (ret == -1 && errno == EAGAIN); 813 if (ret == -1) 814 break; 815 imsg_event_add(&ps->ps_ievs[id][n]); 816 } 817 818 return (ret); 819 } 820