2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (C) 2011 Hiroki Sato <hrs@FreeBSD.org>
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
16 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
23 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
24 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
25 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
26 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
32 #include <sys/queue.h>
33 #include <sys/types.h>
34 #include <sys/socket.h>
39 #include <net/if_dl.h>
40 #include <netinet/in.h>
41 #include <netinet/icmp6.h>
56 #include "pathnames.h"
59 #define CM_RECV_TIMEOUT 30
62 cm_recv(int fd, char *buf)
65 struct ctrl_msg_hdr *cm;
67 struct pollfd pfds[1];
70 syslog(LOG_DEBUG, "<%s> enter, fd=%d", __func__, fd);
72 memset(buf, 0, CM_MSG_MAXLEN);
73 cm = (struct ctrl_msg_hdr *)buf;
74 msg = (char *)buf + sizeof(*cm);
77 pfds[0].events = POLLIN;
80 i = poll(pfds, sizeof(pfds)/sizeof(pfds[0]),
87 syslog(LOG_ERR, "<%s> poll error: %s",
88 __func__, strerror(errno));
92 if (pfds[0].revents & POLLIN) {
93 n = read(fd, cm, sizeof(*cm));
94 if (n < 0 && errno == EAGAIN) {
96 "<%s> waiting...", __func__);
103 if (n != (ssize_t)sizeof(*cm)) {
105 "<%s> received a too small message.", __func__);
108 if (cm->cm_len > CM_MSG_MAXLEN) {
110 "<%s> received a too large message.", __func__);
113 if (cm->cm_version != CM_VERSION) {
115 "<%s> version mismatch", __func__);
118 if (cm->cm_type >= CM_TYPE_MAX) {
120 "<%s> invalid msg type.", __func__);
125 "<%s> ctrl msg received: type=%d", __func__,
128 if (cm->cm_len > sizeof(*cm)) {
129 size_t msglen = cm->cm_len - sizeof(*cm);
132 "<%s> ctrl msg has payload (len=%zu)", __func__,
136 i = poll(pfds, sizeof(pfds)/sizeof(pfds[0]),
143 syslog(LOG_ERR, "<%s> poll error: %s",
144 __func__, strerror(errno));
148 if (pfds[0].revents & POLLIN) {
149 n = read(fd, msg, msglen);
150 if (n < 0 && errno == EAGAIN) {
152 "<%s> waiting...", __func__);
158 if (n != (ssize_t)msglen) {
160 "<%s> payload size mismatch.", __func__);
163 buf[CM_MSG_MAXLEN - 1] = '\0';
174 cm_send(int fd, char *buf)
179 ssize_t iov_len_total;
180 struct ctrl_msg_hdr *cm;
183 cm = (struct ctrl_msg_hdr *)buf;
184 msg = (char *)buf + sizeof(*cm);
187 iov[0].iov_base = cm;
188 iov[0].iov_len = sizeof(*cm);
189 iov_len_total = iov[0].iov_len;
190 if (cm->cm_len > sizeof(*cm)) {
192 iov[1].iov_base = msg;
193 iov[1].iov_len = cm->cm_len - iov[0].iov_len;
194 iov_len_total += iov[1].iov_len;
198 "<%s> ctrl msg send: type=%d, count=%d, total_len=%zd", __func__,
199 cm->cm_type, iovcnt, iov_len_total);
201 len = writev(fd, iov, iovcnt);
203 "<%s> ctrl msg send: length=%zd", __func__, len);
207 "<%s> write failed: (%d)%s", __func__, errno,
214 "<%s> write length = %zd (actual)", __func__, len);
216 "<%s> write length = %zd (expected)", __func__, iov_len_total);
218 if (len != iov_len_total) {
227 csock_accept(struct sockinfo *s)
229 struct sockaddr_un sun;
233 sun.sun_len = sizeof(sun);
234 if ((fd = accept(s->si_fd, (struct sockaddr *)&sun,
235 (socklen_t *)&sun.sun_len)) == -1) {
236 if (errno != EWOULDBLOCK && errno != EINTR)
237 syslog(LOG_WARNING, "<%s> accept ", __func__);
238 syslog(LOG_WARNING, "<%s> Xaccept: %s", __func__, strerror(errno));
241 if ((flags = fcntl(fd, F_GETFL, 0)) == -1) {
242 syslog(LOG_WARNING, "<%s> fcntl F_GETFL", __func__);
246 if ((flags = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1) {
247 syslog(LOG_WARNING, "<%s> fcntl F_SETFL", __func__);
250 syslog(LOG_DEBUG, "<%s> accept connfd=%d, listenfd=%d", __func__,
257 csock_close(struct sockinfo *s)
261 syslog(LOG_DEBUG, "<%s> remove %s", __func__, s->si_name);
266 csock_listen(struct sockinfo *s)
268 if (s->si_fd == -1) {
269 syslog(LOG_ERR, "<%s> listen failed", __func__);
272 if (listen(s->si_fd, SOCK_BACKLOG) == -1) {
273 syslog(LOG_ERR, "<%s> listen failed", __func__);
281 csock_open(struct sockinfo *s, mode_t mode)
284 struct sockaddr_un sun;
288 syslog(LOG_ERR, "<%s> internal error.", __func__);
291 if (s->si_name == NULL)
292 s->si_name = _PATH_CTRL_SOCK;
294 if ((s->si_fd = socket(PF_UNIX, SOCK_STREAM, 0)) == -1) {
296 "<%s> cannot open control socket", __func__);
299 memset(&sun, 0, sizeof(sun));
300 sun.sun_family = AF_UNIX;
301 sun.sun_len = sizeof(sun);
302 strlcpy(sun.sun_path, s->si_name, sizeof(sun.sun_path));
304 if (unlink(s->si_name) == -1)
305 if (errno != ENOENT) {
307 "<%s> unlink %s", __func__, s->si_name);
311 old_umask = umask(S_IXUSR|S_IXGRP|S_IXOTH);
312 if (bind(s->si_fd, (struct sockaddr *)&sun, sizeof(sun)) == -1) {
314 "<%s> bind failed: %s", __func__, s->si_name);
320 if (chmod(s->si_name, mode) == -1) {
322 "<%s> chmod failed: %s", __func__, s->si_name);
325 if ((flags = fcntl(s->si_fd, F_GETFL, 0)) == -1) {
327 "<%s> fcntl F_GETFL failed: %s", __func__, s->si_name);
330 if ((flags = fcntl(s->si_fd, F_SETFL, flags | O_NONBLOCK)) == -1) {
332 "<%s> fcntl F_SETFL failed: %s", __func__, s->si_name);
345 cm_bin2pl(char *str, struct ctrl_msg_pl *cp)
351 memset(cp, 0, sizeof(*cp));
358 syslog(LOG_DEBUG, "<%s> len(ifname) = %zu", __func__, len);
360 cp->cp_ifname = malloc(len + 1);
361 if (cp->cp_ifname == NULL) {
362 syslog(LOG_ERR, "<%s> malloc", __func__);
365 memcpy(cp->cp_ifname, p, len);
366 cp->cp_ifname[len] = '\0';
373 syslog(LOG_DEBUG, "<%s> len(key) = %zu", __func__, len);
375 cp->cp_key = malloc(len + 1);
376 if (cp->cp_key == NULL) {
377 syslog(LOG_ERR, "<%s> malloc", __func__);
380 memcpy(cp->cp_key, p, len);
381 cp->cp_key[len] = '\0';
388 syslog(LOG_DEBUG, "<%s> len(val) = %zu", __func__, len);
390 cp->cp_val = malloc(len + 1);
391 if (cp->cp_val == NULL) {
392 syslog(LOG_ERR, "<%s> malloc", __func__);
395 memcpy(cp->cp_val, p, len);
396 cp->cp_val[len] = '\0';
397 cp->cp_val_len = len;
405 cm_pl2bin(char *str, struct ctrl_msg_pl *cp)
410 struct ctrl_msg_hdr *cm;
412 len = sizeof(size_t);
413 if (cp->cp_ifname != NULL)
414 len += strlen(cp->cp_ifname);
415 len += sizeof(size_t);
416 if (cp->cp_key != NULL)
417 len += strlen(cp->cp_key);
418 len += sizeof(size_t);
419 if (cp->cp_val != NULL && cp->cp_val_len > 0)
420 len += cp->cp_val_len;
422 if (len > CM_MSG_MAXLEN - sizeof(*cm)) {
423 syslog(LOG_DEBUG, "<%s> msg too long (len=%zu)",
427 syslog(LOG_DEBUG, "<%s> msglen=%zu", __func__, len);
432 if (cp->cp_ifname != NULL) {
433 *lenp++ = strlen(cp->cp_ifname);
435 memcpy(p, cp->cp_ifname, strlen(cp->cp_ifname));
436 p += strlen(cp->cp_ifname);
443 if (cp->cp_key != NULL) {
444 *lenp++ = strlen(cp->cp_key);
446 memcpy(p, cp->cp_key, strlen(cp->cp_key));
447 p += strlen(cp->cp_key);
454 if (cp->cp_val != NULL && cp->cp_val_len > 0) {
455 *lenp++ = cp->cp_val_len;
457 memcpy(p, cp->cp_val, cp->cp_val_len);
468 cm_str2bin(char *bin, void *str, size_t len)
470 struct ctrl_msg_hdr *cm;
472 syslog(LOG_DEBUG, "<%s> enter", __func__);
474 if (len > CM_MSG_MAXLEN - sizeof(*cm)) {
475 syslog(LOG_DEBUG, "<%s> msg too long (len=%zu)",
479 syslog(LOG_DEBUG, "<%s> msglen=%zu", __func__, len);
480 memcpy(bin, (char *)str, len);
486 cm_bin2str(char *bin, void *str, size_t len)
489 syslog(LOG_DEBUG, "<%s> enter", __func__);
491 memcpy((char *)str, bin, len);