GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: usr.sbin/sasyncd/monitor.c Lines: 0 255 0.0 %
Date: 2017-11-07 Branches: 0 170 0.0 %

Line Branch Exec Source
1
/*	$OpenBSD: monitor.c,v 1.22 2017/05/21 02:37:52 deraadt Exp $	*/
2
3
/*
4
 * Copyright (c) 2005 Håkan Olsson.  All rights reserved.
5
 *
6
 * Redistribution and use in source and binary forms, with or without
7
 * modification, are permitted provided that the following conditions
8
 * are met:
9
 *
10
 * 1. Redistributions of source code must retain the above copyright
11
 *    notice, this list of conditions and the following disclaimer.
12
 * 2. Redistributions in binary form must reproduce the above copyright
13
 *    notice, this list of conditions and the following disclaimer in the
14
 *    documentation and/or other materials provided with the distribution.
15
 *
16
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26
 */
27
28
#include <sys/types.h>
29
#include <sys/ioctl.h>
30
#include <sys/socket.h>
31
#include <sys/stat.h>
32
#include <sys/sysctl.h>
33
#include <sys/queue.h>
34
#include <sys/wait.h>
35
#include <sys/un.h>
36
#include <net/pfkeyv2.h>
37
38
#include <errno.h>
39
#include <fcntl.h>
40
#include <pwd.h>
41
#include <signal.h>
42
#include <string.h>
43
#include <stdlib.h>
44
#include <unistd.h>
45
#include <limits.h>
46
#include <imsg.h>
47
48
#include "types.h"	/* iked imsg types */
49
50
#include "monitor.h"
51
#include "sasyncd.h"
52
53
struct m_state {
54
	pid_t	pid;
55
	int	s;
56
} m_state;
57
58
volatile sig_atomic_t		sigchld = 0;
59
60
static void	got_sigchld(int);
61
static void	sig_to_child(int);
62
static void	m_priv_pfkey_snap(int);
63
static int	m_priv_control_activate(void);
64
static int	m_priv_control_passivate(void);
65
static ssize_t	m_write(int, void *, size_t);
66
static ssize_t	m_read(int, void *, size_t);
67
68
pid_t
69
monitor_init(void)
70
{
71
	struct passwd	*pw = getpwnam(SASYNCD_USER);
72
	extern char	*__progname;
73
	char		root[PATH_MAX];
74
	int		p[2];
75
76
	if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, p) != 0) {
77
		log_err("%s: socketpair failed - %s", __progname,
78
		    strerror(errno));
79
		exit(1);
80
	}
81
82
	if (!pw) {
83
		log_err("%s: getpwnam(\"%s\") failed", __progname,
84
		    SASYNCD_USER);
85
		exit(1);
86
	}
87
	strlcpy(root, pw->pw_dir, sizeof root);
88
	endpwent();
89
90
	signal(SIGCHLD, got_sigchld);
91
	signal(SIGTERM, sig_to_child);
92
	signal(SIGHUP, sig_to_child);
93
	signal(SIGINT, sig_to_child);
94
95
	m_state.pid = fork();
96
97
	if (m_state.pid == -1) {
98
		log_err("%s: fork failed - %s", __progname, strerror(errno));
99
		exit(1);
100
	} else if (m_state.pid == 0) {
101
		/* Child */
102
		m_state.s = p[0];
103
		close(p[1]);
104
105
		if (chroot(pw->pw_dir) != 0 || chdir("/") != 0) {
106
			log_err("%s: chroot failed", __progname);
107
			exit(1);
108
		}
109
110
		if (setgroups(1, &pw->pw_gid) ||
111
		    setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
112
		    setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid)) {
113
			log_err("%s: failed to drop privileges", __progname);
114
			exit(1);
115
		}
116
	} else {
117
		/* Parent */
118
		setproctitle("[priv]");
119
		m_state.s = p[1];
120
		close(p[0]);
121
	}
122
	return m_state.pid;
123
}
124
125
static void
126
got_sigchld(int s)
127
{
128
	sigchld = 1;
129
}
130
131
static void
132
sig_to_child(int s)
133
{
134
	if (m_state.pid != -1)
135
		kill(m_state.pid, s);
136
}
137
138
static void
139
monitor_drain_input(void)
140
{
141
	int		one = 1;
142
	u_int8_t	tmp;
143
144
	ioctl(m_state.s, FIONBIO, &one);
145
	while (m_read(m_state.s, &tmp, 1) > 0)
146
		;
147
	ioctl(m_state.s, FIONBIO, 0);
148
}
149
150
/* We only use privsep to get in-kernel SADB and SPD snapshots via sysctl */
151
void
152
monitor_loop(void)
153
{
154
	u_int32_t	 v, vn;
155
	ssize_t		 r;
156
	fd_set		 rfds;
157
	int		 ret;
158
	struct timeval	*tvp, tv;
159
160
	FD_ZERO(&rfds);
161
	tvp = NULL;
162
	vn = 0;
163
164
	for (;;) {
165
		ret = 0;
166
		v = 0;
167
168
		if (sigchld) {
169
			pid_t	pid;
170
			int	status;
171
			do {
172
				pid = waitpid(m_state.pid, &status, WNOHANG);
173
			} while (pid == -1 && errno == EINTR);
174
175
			if (pid == m_state.pid &&
176
			    (WIFEXITED(status) || WIFSIGNALED(status)))
177
				break;
178
		}
179
180
		FD_SET(m_state.s, &rfds);
181
		if (select(m_state.s + 1, &rfds, NULL, NULL, tvp) == -1) {
182
			if (errno == EINTR || errno == EAGAIN)
183
				continue;
184
			log_err("monitor_loop: select()");
185
			break;
186
		}
187
188
		/* Wait for next task */
189
		if (FD_ISSET(m_state.s, &rfds)) {
190
			if ((r = m_read(m_state.s, &v, sizeof v)) < 1) {
191
				if (r == -1)
192
					log_err("monitor_loop: read()");
193
				break;
194
			}
195
		}
196
197
		/* Retry after timeout */
198
		if (v == 0 && tvp != NULL) {
199
			v = vn;
200
			tvp = NULL;
201
			vn = 0;
202
		}
203
204
		switch (v) {
205
		case MONITOR_GETSNAP:
206
			/* Get the data. */
207
			m_priv_pfkey_snap(m_state.s);
208
			break;
209
		case MONITOR_CARPINC:
210
			carp_demote(CARP_INC, 1);
211
			break;
212
		case MONITOR_CARPDEC:
213
			carp_demote(CARP_DEC, 1);
214
			break;
215
		case MONITOR_CONTROL_ACTIVATE:
216
			ret = m_priv_control_activate();
217
			break;
218
		case MONITOR_CONTROL_PASSIVATE:
219
			ret = m_priv_control_passivate();
220
			break;
221
		}
222
223
		if (ret == -1) {
224
			/* Trigger retry after timeout */
225
			tv.tv_sec = MONITOR_RETRY_TIMEOUT;
226
			tv.tv_usec = 0;
227
			tvp = &tv;
228
			vn = v;
229
		}
230
	}
231
232
	monitor_carpundemote(NULL);
233
234
	if (!sigchld)
235
		log_msg(0, "monitor_loop: priv process exiting abnormally");
236
	exit(0);
237
}
238
239
void
240
monitor_carpundemote(void *v)
241
{
242
	u_int32_t mtype = MONITOR_CARPDEC;
243
	if (!carp_demoted)
244
		return;
245
	if (m_write(m_state.s, &mtype, sizeof mtype) < 1)
246
		log_msg(1, "monitor_carpundemote: unable to write to monitor");
247
	else
248
		carp_demoted = 0;
249
}
250
251
void
252
monitor_carpdemote(void *v)
253
{
254
	u_int32_t mtype = MONITOR_CARPINC;
255
	if (carp_demoted)
256
		return;
257
	if (m_write(m_state.s, &mtype, sizeof mtype) < 1)
258
		log_msg(1, "monitor_carpdemote: unable to write to monitor");
259
	else
260
		carp_demoted = 1;
261
}
262
263
int
264
monitor_get_pfkey_snap(u_int8_t **sadb, u_int32_t *sadbsize, u_int8_t **spd,
265
    u_int32_t *spdsize)
266
{
267
	u_int32_t	v;
268
	ssize_t		rbytes;
269
270
	v = MONITOR_GETSNAP;
271
	if (m_write(m_state.s, &v, sizeof v) < 1)
272
		return -1;
273
274
	/* Read SADB data. */
275
	*sadb = *spd = NULL;
276
	*spdsize = 0;
277
	if (m_read(m_state.s, sadbsize, sizeof *sadbsize) < 1)
278
		return -1;
279
	if (*sadbsize) {
280
		*sadb = malloc(*sadbsize);
281
		if (!*sadb) {
282
			log_err("monitor_get_pfkey_snap: malloc()");
283
			monitor_drain_input();
284
			return -1;
285
		}
286
		rbytes = m_read(m_state.s, *sadb, *sadbsize);
287
		if (rbytes < 1) {
288
			freezero(*sadb, *sadbsize);
289
			return -1;
290
		}
291
	}
292
293
	/* Read SPD data */
294
	if (m_read(m_state.s, spdsize, sizeof *spdsize) < 1) {
295
		freezero(*sadb, *sadbsize);
296
		return -1;
297
	}
298
	if (*spdsize) {
299
		*spd = malloc(*spdsize);
300
		if (!*spd) {
301
			log_err("monitor_get_pfkey_snap: malloc()");
302
			monitor_drain_input();
303
			freezero(*sadb, *sadbsize);
304
			return -1;
305
		}
306
		rbytes = m_read(m_state.s, *spd, *spdsize);
307
		if (rbytes < 1) {
308
			freezero(*spd, *spdsize);
309
			freezero(*sadb, *sadbsize);
310
			return -1;
311
		}
312
	}
313
314
	log_msg(2, "monitor_get_pfkey_snap: got %u bytes SADB, %u bytes SPD",
315
	    *sadbsize, *spdsize);
316
	return 0;
317
}
318
319
int
320
monitor_control_active(int active)
321
{
322
	u_int32_t	cmd =
323
	    active ? MONITOR_CONTROL_ACTIVATE : MONITOR_CONTROL_PASSIVATE;
324
	if (write(m_state.s, &cmd, sizeof cmd) < 1)
325
		return -1;
326
	return 0;
327
}
328
329
/* Privileged */
330
static void
331
m_priv_pfkey_snap(int s)
332
{
333
	u_int8_t	*sadb_buf = NULL, *spd_buf = NULL;
334
	size_t		 sadb_buflen = 0, spd_buflen = 0, sz;
335
	int		 mib[5];
336
	u_int32_t	 v;
337
338
	mib[0] = CTL_NET;
339
	mib[1] = PF_KEY;
340
	mib[2] = PF_KEY_V2;
341
	mib[3] = NET_KEY_SADB_DUMP;
342
	mib[4] = 0; /* Unspec SA type */
343
344
	/* First, fetch SADB data */
345
	for (;;) {
346
		if (sysctl(mib, sizeof mib / sizeof mib[0], NULL, &sz, NULL, 0)
347
		    == -1)
348
			break;
349
350
		if (!sz)
351
			break;
352
353
		/* Try to catch newly added data */
354
		sz *= 2;
355
356
		if ((sadb_buf = malloc(sz)) == NULL)
357
			break;
358
359
		if (sysctl(mib, sizeof mib / sizeof mib[0], sadb_buf, &sz, NULL, 0)
360
		    == -1) {
361
			free(sadb_buf);
362
			sadb_buf = NULL;
363
			/*
364
			 * If new SAs were added meanwhile and the given buffer is
365
			 * too small, retry.
366
			 */
367
			if (errno == ENOMEM)
368
				continue;
369
			break;
370
		}
371
372
		sadb_buflen = sz;
373
		break;
374
	}
375
376
	/* Next, fetch SPD data */
377
	mib[3] = NET_KEY_SPD_DUMP;
378
379
	for (;;) {
380
		if (sysctl(mib, sizeof mib / sizeof mib[0], NULL, &sz, NULL, 0)
381
		    == -1)
382
			break;
383
384
		if (!sz)
385
			break;
386
387
		/* Try to catch newly added data */
388
		sz *= 2;
389
390
		if ((spd_buf = malloc(sz)) == NULL)
391
			break;
392
393
		if (sysctl(mib, sizeof mib / sizeof mib[0], spd_buf, &sz, NULL, 0)
394
		    == -1) {
395
			free(spd_buf);
396
			spd_buf = NULL;
397
			/*
398
			 * If new SPDs were added meanwhile and the given buffer is
399
			 * too small, retry.
400
			 */
401
			if (errno == ENOMEM)
402
				continue;
403
			break;
404
		}
405
406
		spd_buflen = sz;
407
		break;
408
	}
409
410
	/* Return SADB data */
411
	v = (u_int32_t)sadb_buflen;
412
	if (m_write(s, &v, sizeof v) == -1) {
413
		log_err("m_priv_pfkey_snap: write");
414
		goto cleanup;
415
	}
416
	if (m_write(s, sadb_buf, sadb_buflen) == -1) {
417
		log_err("m_priv_pfkey_snap: write");
418
		goto cleanup;
419
	}
420
421
	/* Return SPD data */
422
	v = (u_int32_t)spd_buflen;
423
	if (m_write(s, &v, sizeof v) == -1) {
424
		log_err("m_priv_pfkey_snap: write");
425
		goto cleanup;
426
	}
427
	if (m_write(s, spd_buf, spd_buflen) == -1) {
428
		log_err("m_priv_pfkey_snap: write");
429
		goto cleanup;
430
	}
431
432
cleanup:
433
	freezero(sadb_buf, sadb_buflen);
434
	freezero(spd_buf, spd_buflen);
435
}
436
437
static int
438
m_priv_isakmpd_fifocmd(const char *cmd)
439
{
440
	struct stat	sb;
441
	int		fd = -1, ret = -1;
442
443
	if ((fd = open(ISAKMPD_FIFO, O_WRONLY)) == -1) {
444
		log_err("m_priv_isakmpd_fifocmd: open(%s)", ISAKMPD_FIFO);
445
		goto out;
446
	}
447
	if (fstat(fd, &sb) == -1) {
448
		log_err("m_priv_isakmpd_fifocmd: fstat(%s)", ISAKMPD_FIFO);
449
		goto out;
450
	}
451
	if (!S_ISFIFO(sb.st_mode)) {
452
		log_err("m_priv_isakmpd_fifocmd: %s not a fifo", ISAKMPD_FIFO);
453
		goto out;
454
	}
455
456
	if (write(fd, cmd, strlen(cmd)) == -1) {
457
		log_err("m_priv_isakmpd_fifocmd write");
458
		goto out;
459
	}
460
461
	ret = 0;
462
 out:
463
	if (fd != -1)
464
		close(fd);
465
466
	return (ret);
467
}
468
469
static int
470
m_priv_iked_imsg(u_int cmd)
471
{
472
	struct sockaddr_un	 sun;
473
	int			 fd = -1, ret = -1;
474
	struct imsgbuf		 ibuf;
475
476
	if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) == -1) {
477
		log_err("m_priv_iked_imsg: socket");
478
		goto out;
479
	}
480
481
	bzero(&sun, sizeof(sun));
482
	sun.sun_family = AF_UNIX;
483
	strlcpy(sun.sun_path, IKED_SOCKET, sizeof(sun.sun_path));
484
485
	if (connect(fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) {
486
		log_err("m_priv_iked_imsg: connect");
487
		goto out;
488
	}
489
490
	imsg_init(&ibuf, fd);
491
	if (imsg_compose(&ibuf, cmd, 0, 0, -1, NULL, 0) == -1) {
492
		log_err("m_priv_iked_imsg: compose");
493
		goto err;
494
	}
495
	if (imsg_flush(&ibuf) == -1) {
496
		log_err("m_priv_iked_imsg: flush");
497
		goto err;
498
	}
499
500
	ret = 0;
501
 err:
502
	imsg_clear(&ibuf);
503
 out:
504
	if (fd != -1)
505
		close(fd);
506
507
	return (ret);
508
}
509
510
static int
511
m_priv_control_activate(void)
512
{
513
	if (cfgstate.flags & CTL_ISAKMPD)
514
		if (m_priv_isakmpd_fifocmd("M active\n") == -1)
515
			return (-1);
516
	if (cfgstate.flags & CTL_IKED)
517
		if (m_priv_iked_imsg(IMSG_CTL_ACTIVE) == -1)
518
			return (-1);
519
	return (0);
520
}
521
522
static int
523
m_priv_control_passivate(void)
524
{
525
	if (cfgstate.flags & CTL_ISAKMPD)
526
		if (m_priv_isakmpd_fifocmd("M passive\n") == -1)
527
			return (-1);
528
	if (cfgstate.flags & CTL_IKED)
529
		if (m_priv_iked_imsg(IMSG_CTL_PASSIVE) == -1)
530
			return (-1);
531
	return (0);
532
}
533
534
ssize_t
535
m_write(int sock, void *buf, size_t len)
536
{
537
	ssize_t n;
538
	size_t pos = 0;
539
	char *ptr = buf;
540
541
	while (len > pos) {
542
		switch (n = write(sock, ptr + pos, len - pos)) {
543
		case -1:
544
			if (errno == EINTR || errno == EAGAIN)
545
				continue;
546
			/* FALLTHROUGH */
547
		case 0:
548
			return n;
549
			/* NOTREACHED */
550
		default:
551
			pos += n;
552
		}
553
	}
554
	return pos;
555
}
556
557
ssize_t
558
m_read(int sock, void *buf, size_t len)
559
{
560
	ssize_t n;
561
	size_t pos = 0;
562
	char *ptr = buf;
563
564
	while (len > pos) {
565
		switch (n = read(sock, ptr + pos, len - pos)) {
566
		case -1:
567
			if (errno == EINTR || errno == EAGAIN)
568
				continue;
569
			/* FALLTHROUGH */
570
		case 0:
571
			return n;
572
			/* NOTREACHED */
573
		default:
574
			pos += n;
575
		}
576
	}
577
	return pos;
578
}