blob: d766edcf11ca28550179967b6e638b2b35b4fa80 [file] [log] [blame]
jca@openbsd.org18f64b92016-02-29 20:22:36 +00001/* $OpenBSD: monitor_fdpass.c,v 1.21 2016/02/29 20:22:36 jca Exp $ */
Ben Lindstrom7a2073c2002-03-22 02:30:41 +00002/*
3 * Copyright 2001 Niels Provos <provos@citi.umich.edu>
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
18 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 */
26
27#include "includes.h"
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000028
Damien Millere3b60b52006-07-10 21:08:03 +100029#include <sys/types.h>
30#include <sys/socket.h>
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000031#include <sys/uio.h>
Darren Tuckera43c0052006-10-16 19:49:12 +100032#ifdef HAVE_SYS_UN_H
33#include <sys/un.h>
34#endif
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000035
Darren Tucker39972492006-07-12 22:22:46 +100036#include <errno.h>
Damien Millere3476ed2006-07-24 14:13:33 +100037#include <string.h>
Damien Millerd7834352006-08-05 12:39:39 +100038#include <stdarg.h>
Darren Tucker39972492006-07-12 22:22:46 +100039
Damien Miller9eb4cd92014-07-03 13:29:50 +100040#ifdef HAVE_POLL_H
41# include <poll.h>
42#else
43# ifdef HAVE_SYS_POLL_H
44# include <sys/poll.h>
45# endif
46#endif
47
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000048#include "log.h"
49#include "monitor_fdpass.h"
50
Damien Miller54fd7cf2007-09-17 12:04:08 +100051int
Darren Tucker3f9fdc72004-06-22 12:56:01 +100052mm_send_fd(int sock, int fd)
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000053{
Tim Rice66480f12002-04-15 21:10:09 -070054#if defined(HAVE_SENDMSG) && (defined(HAVE_ACCRIGHTS_IN_MSGHDR) || defined(HAVE_CONTROL_IN_MSGHDR))
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000055 struct msghdr msg;
Tim Rice28bbb0c2002-05-27 17:37:32 -070056#ifndef HAVE_ACCRIGHTS_IN_MSGHDR
Damien Millerc0c53c32008-03-07 18:35:26 +110057 union {
58 struct cmsghdr hdr;
Damien Millerf92e0632008-03-27 10:53:23 +110059 char buf[CMSG_SPACE(sizeof(int))];
60 } cmsgbuf;
Kevin Steves1adb1202002-03-22 19:32:53 +000061 struct cmsghdr *cmsg;
62#endif
Darren Tucker69087ea2008-11-23 14:03:19 +110063 struct iovec vec;
64 char ch = '\0';
65 ssize_t n;
Darren Tuckere371a132010-01-12 19:43:12 +110066 struct pollfd pfd;
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000067
68 memset(&msg, 0, sizeof(msg));
Tim Rice28bbb0c2002-05-27 17:37:32 -070069#ifdef HAVE_ACCRIGHTS_IN_MSGHDR
Kevin Steves1adb1202002-03-22 19:32:53 +000070 msg.msg_accrights = (caddr_t)&fd;
71 msg.msg_accrightslen = sizeof(fd);
72#else
djm@openbsd.org6e6458b2015-02-25 23:05:47 +000073 memset(&cmsgbuf, 0, sizeof(cmsgbuf));
Damien Millerf92e0632008-03-27 10:53:23 +110074 msg.msg_control = (caddr_t)&cmsgbuf.buf;
Damien Millere241e852008-03-27 11:01:15 +110075 msg.msg_controllen = sizeof(cmsgbuf.buf);
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000076 cmsg = CMSG_FIRSTHDR(&msg);
77 cmsg->cmsg_len = CMSG_LEN(sizeof(int));
78 cmsg->cmsg_level = SOL_SOCKET;
79 cmsg->cmsg_type = SCM_RIGHTS;
80 *(int *)CMSG_DATA(cmsg) = fd;
Kevin Steves1adb1202002-03-22 19:32:53 +000081#endif
Ben Lindstrom7a2073c2002-03-22 02:30:41 +000082
83 vec.iov_base = &ch;
84 vec.iov_len = 1;
85 msg.msg_iov = &vec;
86 msg.msg_iovlen = 1;
87
Darren Tuckere371a132010-01-12 19:43:12 +110088 pfd.fd = sock;
89 pfd.events = POLLOUT;
90 while ((n = sendmsg(sock, &msg, 0)) == -1 &&
91 (errno == EAGAIN || errno == EINTR)) {
Darren Tucker23645642008-12-01 21:42:13 +110092 debug3("%s: sendmsg(%d): %s", __func__, fd, strerror(errno));
Darren Tuckere371a132010-01-12 19:43:12 +110093 (void)poll(&pfd, 1, -1);
94 }
Darren Tucker23645642008-12-01 21:42:13 +110095 if (n == -1) {
Damien Miller54fd7cf2007-09-17 12:04:08 +100096 error("%s: sendmsg(%d): %s", __func__, fd,
Ben Lindstrom31ee7ae2002-03-26 02:36:29 +000097 strerror(errno));
Damien Miller54fd7cf2007-09-17 12:04:08 +100098 return -1;
99 }
100
101 if (n != 1) {
jca@openbsd.org18f64b92016-02-29 20:22:36 +0000102 error("%s: sendmsg: expected sent 1 got %zd", __func__, n);
Damien Miller54fd7cf2007-09-17 12:04:08 +1000103 return -1;
104 }
105 return 0;
Kevin Stevesc3c82552002-04-07 16:39:12 +0000106#else
Damien Miller54fd7cf2007-09-17 12:04:08 +1000107 error("%s: file descriptor passing not supported", __func__);
108 return -1;
Kevin Stevesc3c82552002-04-07 16:39:12 +0000109#endif
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000110}
111
112int
Darren Tucker3f9fdc72004-06-22 12:56:01 +1000113mm_receive_fd(int sock)
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000114{
Tim Rice66480f12002-04-15 21:10:09 -0700115#if defined(HAVE_RECVMSG) && (defined(HAVE_ACCRIGHTS_IN_MSGHDR) || defined(HAVE_CONTROL_IN_MSGHDR))
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000116 struct msghdr msg;
Tim Rice28bbb0c2002-05-27 17:37:32 -0700117#ifndef HAVE_ACCRIGHTS_IN_MSGHDR
Damien Millerc0c53c32008-03-07 18:35:26 +1100118 union {
Damien Millerc0c53c32008-03-07 18:35:26 +1100119 struct cmsghdr hdr;
Damien Millerf92e0632008-03-27 10:53:23 +1100120 char buf[CMSG_SPACE(sizeof(int))];
121 } cmsgbuf;
Kevin Steves1adb1202002-03-22 19:32:53 +0000122 struct cmsghdr *cmsg;
Kevin Steves1adb1202002-03-22 19:32:53 +0000123#endif
Darren Tucker69087ea2008-11-23 14:03:19 +1100124 struct iovec vec;
125 ssize_t n;
126 char ch;
127 int fd;
Darren Tuckere371a132010-01-12 19:43:12 +1100128 struct pollfd pfd;
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000129
130 memset(&msg, 0, sizeof(msg));
131 vec.iov_base = &ch;
132 vec.iov_len = 1;
133 msg.msg_iov = &vec;
134 msg.msg_iovlen = 1;
Tim Rice28bbb0c2002-05-27 17:37:32 -0700135#ifdef HAVE_ACCRIGHTS_IN_MSGHDR
Kevin Steves1adb1202002-03-22 19:32:53 +0000136 msg.msg_accrights = (caddr_t)&fd;
137 msg.msg_accrightslen = sizeof(fd);
138#else
djm@openbsd.org6e6458b2015-02-25 23:05:47 +0000139 memset(&cmsgbuf, 0, sizeof(cmsgbuf));
Damien Millerf92e0632008-03-27 10:53:23 +1100140 msg.msg_control = &cmsgbuf.buf;
Damien Millere241e852008-03-27 11:01:15 +1100141 msg.msg_controllen = sizeof(cmsgbuf.buf);
Kevin Steves1adb1202002-03-22 19:32:53 +0000142#endif
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000143
Darren Tuckere371a132010-01-12 19:43:12 +1100144 pfd.fd = sock;
145 pfd.events = POLLIN;
146 while ((n = recvmsg(sock, &msg, 0)) == -1 &&
147 (errno == EAGAIN || errno == EINTR)) {
Darren Tucker23645642008-12-01 21:42:13 +1100148 debug3("%s: recvmsg: %s", __func__, strerror(errno));
Darren Tuckere371a132010-01-12 19:43:12 +1100149 (void)poll(&pfd, 1, -1);
150 }
Darren Tucker23645642008-12-01 21:42:13 +1100151 if (n == -1) {
Damien Miller54fd7cf2007-09-17 12:04:08 +1000152 error("%s: recvmsg: %s", __func__, strerror(errno));
153 return -1;
154 }
Darren Tucker69087ea2008-11-23 14:03:19 +1100155
Damien Miller54fd7cf2007-09-17 12:04:08 +1000156 if (n != 1) {
jca@openbsd.org18f64b92016-02-29 20:22:36 +0000157 error("%s: recvmsg: expected received 1 got %zd", __func__, n);
Damien Miller54fd7cf2007-09-17 12:04:08 +1000158 return -1;
159 }
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000160
Tim Rice28bbb0c2002-05-27 17:37:32 -0700161#ifdef HAVE_ACCRIGHTS_IN_MSGHDR
Damien Miller54fd7cf2007-09-17 12:04:08 +1000162 if (msg.msg_accrightslen != sizeof(fd)) {
163 error("%s: no fd", __func__);
164 return -1;
165 }
Kevin Steves1adb1202002-03-22 19:32:53 +0000166#else
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000167 cmsg = CMSG_FIRSTHDR(&msg);
Damien Miller54fd7cf2007-09-17 12:04:08 +1000168 if (cmsg == NULL) {
169 error("%s: no message header", __func__);
170 return -1;
171 }
Darren Tucker69087ea2008-11-23 14:03:19 +1100172
Darren Tucker3c016542003-05-02 20:48:21 +1000173#ifndef BROKEN_CMSG_TYPE
Damien Miller54fd7cf2007-09-17 12:04:08 +1000174 if (cmsg->cmsg_type != SCM_RIGHTS) {
175 error("%s: expected type %d got %d", __func__,
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000176 SCM_RIGHTS, cmsg->cmsg_type);
Damien Miller54fd7cf2007-09-17 12:04:08 +1000177 return -1;
178 }
Darren Tucker3c016542003-05-02 20:48:21 +1000179#endif
Ben Lindstrom31ee7ae2002-03-26 02:36:29 +0000180 fd = (*(int *)CMSG_DATA(cmsg));
Kevin Steves1adb1202002-03-22 19:32:53 +0000181#endif
Ben Lindstrom31ee7ae2002-03-26 02:36:29 +0000182 return fd;
Kevin Stevesc3c82552002-04-07 16:39:12 +0000183#else
Damien Miller54fd7cf2007-09-17 12:04:08 +1000184 error("%s: file descriptor passing not supported", __func__);
185 return -1;
Kevin Stevesc3c82552002-04-07 16:39:12 +0000186#endif
Ben Lindstrom7a2073c2002-03-22 02:30:41 +0000187}