3 * Fraunhofer Institute for Open Communication Systems (FhG Fokus).
6 * Author: Harti Brandt <harti@freebsd.org>
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * $Begemot: bsnmp/snmpd/trans_lsock.c,v 1.6 2005/02/25 11:50:25 brandt_h Exp $
31 * Local domain socket transport
33 #include <sys/types.h>
34 #include <sys/queue.h>
48 #include "trans_lsock.h"
52 static const struct asn_oid
53 oid_begemotSnmpdLocalPortTable = OIDX_begemotSnmpdLocalPortTable;
55 static int lsock_start(void);
56 static int lsock_stop(int);
57 static void lsock_close_port(struct tport *);
58 static int lsock_init_port(struct tport *);
59 static ssize_t lsock_send(struct tport *, const u_char *, size_t,
60 const struct sockaddr *, size_t);
63 const struct transport_def lsock_trans = {
65 OIDX_begemotSnmpdTransLsock,
72 static struct transport *my_trans;
75 lsock_remove(struct tport *tp, intptr_t arg __unused)
77 struct lsock_port *port = (struct lsock_port *)tp;
79 (void)remove(port->name);
88 if (my_trans != NULL) {
89 if (!force && trans_first_port(my_trans) != NULL)
90 return (SNMP_ERR_GENERR);
91 trans_iter_port(my_trans, lsock_remove, 0);
92 return (trans_unregister(my_trans));
94 return (SNMP_ERR_NOERROR);
100 return (trans_register(&lsock_trans, &my_trans));
104 * Open a local port. If this is a datagram socket create also the
108 lsock_open_port(u_char *name, size_t namelen, struct lsock_port **pp,
111 struct lsock_port *port;
112 struct lsock_peer *peer = NULL;
113 int is_stream, need_cred;
116 struct sockaddr_un sa;
118 if (namelen == 0 || namelen + 1 > sizeof(sa.sun_path))
119 return (SNMP_ERR_BADVALUE);
122 case LOCP_DGRAM_UNPRIV:
127 case LOCP_DGRAM_PRIV:
132 case LOCP_STREAM_UNPRIV:
137 case LOCP_STREAM_PRIV:
143 return (SNMP_ERR_BADVALUE);
146 if ((port = malloc(sizeof(*port))) == NULL)
147 return (SNMP_ERR_GENERR);
149 memset(port, 0, sizeof(*port));
151 if ((peer = malloc(sizeof(*peer))) == NULL) {
153 return (SNMP_ERR_GENERR);
155 memset(peer, 0, sizeof(*peer));
157 if ((port->name = malloc(namelen + 1)) == NULL) {
161 return (SNMP_ERR_GENERR);
163 strncpy(port->name, name, namelen);
164 port->name[namelen] = '\0';
168 LIST_INIT(&port->peers);
170 port->tport.index.len = namelen + 1;
171 port->tport.index.subs[0] = namelen;
172 for (u = 0; u < namelen; u++)
173 port->tport.index.subs[u + 1] = name[u];
176 LIST_INSERT_HEAD(&port->peers, peer, link);
181 peer->input.id = NULL;
182 peer->input.stream = is_stream;
183 peer->input.cred = need_cred;
184 peer->input.peer = (struct sockaddr *)&peer->peer;
187 trans_insert_port(my_trans, &port->tport);
189 if (community != COMM_INITIALIZE &&
190 (err = lsock_init_port(&port->tport)) != SNMP_ERR_NOERROR) {
191 lsock_close_port(&port->tport);
197 return (SNMP_ERR_NOERROR);
201 * Close a local domain peer
204 lsock_peer_close(struct lsock_peer *peer)
207 LIST_REMOVE(peer, link);
208 snmpd_input_close(&peer->input);
216 lsock_close_port(struct tport *tp)
218 struct lsock_port *port = (struct lsock_port *)tp;
219 struct lsock_peer *peer;
221 if (port->str_id != NULL)
222 fd_deselect(port->str_id);
223 if (port->str_sock >= 0)
224 (void)close(port->str_sock);
225 (void)remove(port->name);
227 trans_remove_port(tp);
229 while ((peer = LIST_FIRST(&port->peers)) != NULL)
230 lsock_peer_close(peer);
237 * Input on a local socket (either datagram or stream)
240 lsock_input(int fd __unused, void *udata)
242 struct lsock_peer *peer = udata;
243 struct lsock_port *p = peer->port;
245 peer->input.peerlen = sizeof(peer->peer);
246 if (snmpd_input(&peer->input, &p->tport) == -1 && peer->input.stream)
247 /* framing or other input error */
248 lsock_peer_close(peer);
252 * A UNIX domain listening socket is ready. This means we have a peer
253 * that we need to accept
256 lsock_listen_input(int fd, void *udata)
258 struct lsock_port *p = udata;
259 struct lsock_peer *peer;
261 if ((peer = malloc(sizeof(*peer))) == NULL) {
262 syslog(LOG_WARNING, "%s: peer malloc failed", p->name);
263 (void)close(accept(fd, NULL, NULL));
266 memset(peer, 0, sizeof(*peer));
270 peer->input.stream = 1;
271 peer->input.cred = (p->type == LOCP_DGRAM_PRIV ||
272 p->type == LOCP_STREAM_PRIV);
273 peer->input.peerlen = sizeof(peer->peer);
274 peer->input.peer = (struct sockaddr *)&peer->peer;
276 peer->input.fd = accept(fd, peer->input.peer, &peer->input.peerlen);
277 if (peer->input.fd == -1) {
278 syslog(LOG_WARNING, "%s: accept failed: %m", p->name);
283 if ((peer->input.id = fd_select(peer->input.fd, lsock_input,
284 peer, NULL)) == NULL) {
285 close(peer->input.fd);
290 LIST_INSERT_HEAD(&p->peers, peer, link);
294 * Create a local socket
297 lsock_init_port(struct tport *tp)
299 struct lsock_port *p = (struct lsock_port *)tp;
300 struct sockaddr_un sa;
302 if (p->type == LOCP_STREAM_PRIV || p->type == LOCP_STREAM_UNPRIV) {
303 if ((p->str_sock = socket(PF_LOCAL, SOCK_STREAM, 0)) < 0) {
304 syslog(LOG_ERR, "creating local socket: %m");
305 return (SNMP_ERR_RES_UNAVAIL);
308 strcpy(sa.sun_path, p->name);
309 sa.sun_family = AF_LOCAL;
310 sa.sun_len = strlen(p->name) +
311 offsetof(struct sockaddr_un, sun_path);
313 (void)remove(p->name);
315 if (bind(p->str_sock, (struct sockaddr *)&sa, sizeof(sa))) {
316 if (errno == EADDRNOTAVAIL) {
319 return (SNMP_ERR_INCONS_NAME);
321 syslog(LOG_ERR, "bind: %s %m", p->name);
324 return (SNMP_ERR_GENERR);
326 if (chmod(p->name, 0666) == -1)
327 syslog(LOG_WARNING, "chmod(%s,0666): %m", p->name);
329 if (listen(p->str_sock, 10) == -1) {
330 syslog(LOG_ERR, "listen: %s %m", p->name);
331 (void)remove(p->name);
334 return (SNMP_ERR_GENERR);
337 p->str_id = fd_select(p->str_sock, lsock_listen_input, p, NULL);
338 if (p->str_id == NULL) {
339 (void)remove(p->name);
342 return (SNMP_ERR_GENERR);
345 struct lsock_peer *peer;
347 peer = LIST_FIRST(&p->peers);
349 if ((peer->input.fd = socket(PF_LOCAL, SOCK_DGRAM, 0)) < 0) {
350 syslog(LOG_ERR, "creating local socket: %m");
351 return (SNMP_ERR_RES_UNAVAIL);
354 strcpy(sa.sun_path, p->name);
355 sa.sun_family = AF_LOCAL;
356 sa.sun_len = strlen(p->name) +
357 offsetof(struct sockaddr_un, sun_path);
359 (void)remove(p->name);
361 if (bind(peer->input.fd, (struct sockaddr *)&sa, sizeof(sa))) {
362 if (errno == EADDRNOTAVAIL) {
363 close(peer->input.fd);
365 return (SNMP_ERR_INCONS_NAME);
367 syslog(LOG_ERR, "bind: %s %m", p->name);
368 close(peer->input.fd);
370 return (SNMP_ERR_GENERR);
372 if (chmod(p->name, 0666) == -1)
373 syslog(LOG_WARNING, "chmod(%s,0666): %m", p->name);
375 peer->input.id = fd_select(peer->input.fd, lsock_input,
377 if (peer->input.id == NULL) {
378 (void)remove(p->name);
379 close(peer->input.fd);
381 return (SNMP_ERR_GENERR);
384 return (SNMP_ERR_NOERROR);
391 lsock_send(struct tport *tp, const u_char *buf, size_t len,
392 const struct sockaddr *addr, size_t addrlen)
394 struct lsock_port *p = (struct lsock_port *)tp;
395 struct lsock_peer *peer;
397 if (p->type == LOCP_DGRAM_PRIV || p->type == LOCP_DGRAM_UNPRIV) {
398 peer = LIST_FIRST(&p->peers);
401 /* search for the peer */
402 LIST_FOREACH(peer, &p->peers, link)
403 if (peer->input.peerlen == addrlen &&
404 memcmp(peer->input.peer, addr, addrlen) == 0)
412 return (sendto(peer->input.fd, buf, len, 0, addr, addrlen));
416 * Dependency to create a lsock port
419 struct snmp_dependency dep;
421 /* index (path name) */
426 struct lsock_port *port;
428 /* which of the fields are set */
431 /* type of the port */
438 #define LD_STATUS 0x02
439 #define LD_CREATE 0x04 /* rollback create */
440 #define LD_DELETE 0x08 /* rollback delete */
443 * dependency handler for lsock ports
446 lsock_func(struct snmp_context *ctx, struct snmp_dependency *dep,
449 struct lsock_dep *ld = (struct lsock_dep *)(void *)dep;
450 int err = SNMP_ERR_NOERROR;
454 case SNMP_DEPOP_COMMIT:
455 if (!(ld->set & LD_STATUS))
456 err = SNMP_ERR_BADVALUE;
457 else if (ld->port == NULL) {
459 err = SNMP_ERR_BADVALUE;
463 err = lsock_open_port(ld->path, ld->pathlen,
464 &ld->port, ld->type);
465 if (err == SNMP_ERR_NOERROR)
466 ld->set |= LD_CREATE;
468 } else if (!ld->status) {
469 /* delete - hard to roll back so defer to finalizer */
470 ld->set |= LD_DELETE;
472 /* modify - read-only */
473 err = SNMP_ERR_READONLY;
477 case SNMP_DEPOP_ROLLBACK:
478 if (ld->set & LD_CREATE) {
480 lsock_close_port(&ld->port->tport);
482 return (SNMP_ERR_NOERROR);
484 case SNMP_DEPOP_FINISH:
485 if ((ld->set & LD_DELETE) && ctx->code == SNMP_RET_OK)
486 lsock_close_port(&ld->port->tport);
488 return (SNMP_ERR_NOERROR);
497 op_lsock_port(struct snmp_context *ctx, struct snmp_value *value,
498 u_int sub, u_int iidx, enum snmp_op op)
500 asn_subid_t which = value->var.subs[sub-1];
501 struct lsock_port *p;
504 struct lsock_dep *ld;
509 case SNMP_OP_GETNEXT:
510 if ((p = (struct lsock_port *)trans_next_port(my_trans,
511 &value->var, sub)) == NULL)
512 return (SNMP_ERR_NOSUCHNAME);
513 index_append(&value->var, sub, &p->tport.index);
517 if ((p = (struct lsock_port *)trans_find_port(my_trans,
518 &value->var, sub)) == NULL)
519 return (SNMP_ERR_NOSUCHNAME);
523 p = (struct lsock_port *)trans_find_port(my_trans,
526 if (index_decode(&value->var, sub, iidx, &name, &namelen))
527 return (SNMP_ERR_NO_CREATION);
529 asn_slice_oid(&didx, &value->var, sub, value->var.len);
530 if ((ld = (struct lsock_dep *)(void *)snmp_dep_lookup(ctx,
531 &oid_begemotSnmpdLocalPortTable, &didx, sizeof(*ld),
532 lsock_func)) == NULL) {
534 return (SNMP_ERR_GENERR);
537 if (ld->path == NULL) {
539 ld->pathlen = namelen;
547 case LEAF_begemotSnmpdLocalPortStatus:
548 if (ld->set & LD_STATUS)
549 return (SNMP_ERR_INCONS_VALUE);
550 if (!TRUTH_OK(value->v.integer))
551 return (SNMP_ERR_WRONG_VALUE);
553 ld->status = TRUTH_GET(value->v.integer);
554 ld->set |= LD_STATUS;
557 case LEAF_begemotSnmpdLocalPortType:
558 if (ld->set & LD_TYPE)
559 return (SNMP_ERR_INCONS_VALUE);
560 if (value->v.integer < 1 || value->v.integer > 4)
561 return (SNMP_ERR_WRONG_VALUE);
563 ld->type = value->v.integer;
567 return (SNMP_ERR_NOERROR);
569 case SNMP_OP_ROLLBACK:
571 return (SNMP_ERR_NOERROR);
578 * Come here to fetch the value
582 case LEAF_begemotSnmpdLocalPortStatus:
583 value->v.integer = 1;
586 case LEAF_begemotSnmpdLocalPortType:
587 value->v.integer = p->type;
594 return (SNMP_ERR_NOERROR);