udp.c: call buffer_init
[secnet] / slip.c
CommitLineData
9d3a4132
SE
1/* When dealing with SLIP (to a pty, or ipif) we have separate rx, tx
2 and client buffers. When receiving we may read() any amount, not
3 just whole packets. When transmitting we need to bytestuff anyway,
4 and may be part-way through receiving. */
5
6#include "secnet.h"
7#include "util.h"
8#include "netlink.h"
042a8da9 9#include "process.h"
993db2a6 10#include "unaligned.h"
9d3a4132
SE
11#include <stdio.h>
12#include <string.h>
13#include <unistd.h>
042a8da9
SE
14#include <errno.h>
15#include <fcntl.h>
9d3a4132
SE
16
17#define SLIP_END 192
18#define SLIP_ESC 219
19#define SLIP_ESCEND 220
20#define SLIP_ESCESC 221
21
042a8da9
SE
22struct slip {
23 struct netlink nl;
24 struct buffer_if *buff; /* We unstuff received packets into here
25 and send them to the netlink code. */
26 bool_t pending_esc;
e8a0782f
ST
27 bool_t ignoring_packet; /* If this packet was corrupt or overlong,
28 we ignore everything up to the next END */
042a8da9
SE
29 netlink_deliver_fn *netlink_to_tunnel;
30 uint32_t local_address;
31};
32
33/* Generic SLIP mangling code */
34
35static void slip_stuff(struct slip *st, struct buffer_if *buf, int fd)
36{
37 uint8_t txbuf[DEFAULT_BUFSIZE];
38 uint8_t *i;
1caa23ff 39 int32_t j=0;
042a8da9
SE
40
41 BUF_ASSERT_USED(buf);
42
d3fe100d 43 /* There's probably a much more efficient way of implementing this */
042a8da9
SE
44 txbuf[j++]=SLIP_END;
45 for (i=buf->start; i<(buf->start+buf->size); i++) {
46 switch (*i) {
47 case SLIP_END:
48 txbuf[j++]=SLIP_ESC;
49 txbuf[j++]=SLIP_ESCEND;
50 break;
51 case SLIP_ESC:
52 txbuf[j++]=SLIP_ESC;
53 txbuf[j++]=SLIP_ESCESC;
54 break;
55 default:
56 txbuf[j++]=*i;
57 break;
58 }
59 if ((j+2)>DEFAULT_BUFSIZE) {
60 if (write(fd,txbuf,j)<0) {
61 fatal_perror("slip_stuff: write()");
62 }
63 j=0;
64 }
65 }
66 txbuf[j++]=SLIP_END;
67 if (write(fd,txbuf,j)<0) {
68 fatal_perror("slip_stuff: write()");
69 }
70 BUF_FREE(buf);
71}
72
73static void slip_unstuff(struct slip *st, uint8_t *buf, uint32_t l)
74{
75 uint32_t i;
76
042a8da9
SE
77 BUF_ASSERT_USED(st->buff);
78 for (i=0; i<l; i++) {
e8a0782f
ST
79 int outputchr;
80 enum { OUTPUT_END = 256, OUTPUT_NOTHING = 257 };
81
042a8da9
SE
82 if (st->pending_esc) {
83 st->pending_esc=False;
84 switch(buf[i]) {
85 case SLIP_ESCEND:
e8a0782f 86 outputchr=SLIP_END;
042a8da9
SE
87 break;
88 case SLIP_ESCESC:
e8a0782f 89 outputchr=SLIP_ESC;
042a8da9
SE
90 break;
91 default:
e8a0782f
ST
92 if (!st->ignoring_packet) {
93 Message(M_WARNING, "userv_afterpoll: bad SLIP escape"
94 " character, dropping packet\n");
95 }
96 st->ignoring_packet=True;
97 outputchr=OUTPUT_NOTHING;
98 break;
042a8da9
SE
99 }
100 } else {
101 switch (buf[i]) {
102 case SLIP_END:
e8a0782f 103 outputchr=OUTPUT_END;
042a8da9
SE
104 break;
105 case SLIP_ESC:
106 st->pending_esc=True;
e8a0782f 107 outputchr=OUTPUT_NOTHING;
042a8da9
SE
108 break;
109 default:
e8a0782f 110 outputchr=buf[i];
042a8da9
SE
111 break;
112 }
113 }
e8a0782f
ST
114
115 if (st->ignoring_packet) {
116 if (outputchr == OUTPUT_END) {
117 st->ignoring_packet=False;
3abd18e8 118 buffer_init(st->buff,calculate_max_start_pad());
e8a0782f
ST
119 }
120 } else {
121 if (outputchr == OUTPUT_END) {
122 if (st->buff->size>0) {
123 st->netlink_to_tunnel(&st->nl,st->buff);
124 BUF_ALLOC(st->buff,"userv_afterpoll");
125 }
3abd18e8 126 buffer_init(st->buff,calculate_max_start_pad());
e8a0782f
ST
127 } else if (outputchr != OUTPUT_NOTHING) {
128 if (st->buff->size < st->buff->len) {
993db2a6 129 buf_append_uint8(st->buff,outputchr);
e8a0782f
ST
130 } else {
131 Message(M_WARNING, "userv_afterpoll: dropping overlong"
132 " SLIP packet\n");
133 st->ignoring_packet=True;
134 }
135 }
136 }
042a8da9
SE
137 }
138}
139
140static void slip_init(struct slip *st, struct cloc loc, dict_t *dict,
fe5e9cc4 141 cstring_t name, netlink_deliver_fn *to_host)
042a8da9
SE
142{
143 st->netlink_to_tunnel=
144 netlink_init(&st->nl,st,loc,dict,
145 "netlink-userv-ipif",NULL,to_host);
146 st->buff=find_cl_if(dict,"buffer",CL_BUFFER,True,"name",loc);
794f2398 147 st->local_address=string_item_to_ipaddr(
042a8da9
SE
148 dict_find_item(dict,"local-address", True, name, loc),"netlink");
149 BUF_ALLOC(st->buff,"slip_init");
150 st->pending_esc=False;
e8a0782f 151 st->ignoring_packet=False;
042a8da9
SE
152}
153
9d3a4132
SE
154/* Connection to the kernel through userv-ipif */
155
156struct userv {
042a8da9 157 struct slip slip;
9d3a4132
SE
158 int txfd; /* We transmit to userv */
159 int rxfd; /* We receive from userv */
fe5e9cc4
SE
160 cstring_t userv_path;
161 cstring_t service_user;
162 cstring_t service_name;
042a8da9
SE
163 pid_t pid;
164 bool_t expecting_userv_exit;
9d3a4132
SE
165};
166
167static int userv_beforepoll(void *sst, struct pollfd *fds, int *nfds_io,
90a39563 168 int *timeout_io)
9d3a4132
SE
169{
170 struct userv *st=sst;
042a8da9
SE
171
172 if (st->rxfd!=-1) {
173 *nfds_io=2;
174 fds[0].fd=st->txfd;
fe5e9cc4 175 fds[0].events=0; /* Might want to pick up POLLOUT sometime */
042a8da9 176 fds[1].fd=st->rxfd;
fe5e9cc4 177 fds[1].events=POLLIN;
042a8da9
SE
178 } else {
179 *nfds_io=0;
180 }
9d3a4132
SE
181 return 0;
182}
183
90a39563 184static void userv_afterpoll(void *sst, struct pollfd *fds, int nfds)
9d3a4132
SE
185{
186 struct userv *st=sst;
187 uint8_t rxbuf[DEFAULT_BUFSIZE];
042a8da9
SE
188 int l;
189
190 if (nfds==0) return;
9d3a4132
SE
191
192 if (fds[1].revents&POLLERR) {
469fd1d9 193 Message(M_ERR,"%s: userv_afterpoll: POLLERR!\n",st->slip.nl.name);
9d3a4132
SE
194 }
195 if (fds[1].revents&POLLIN) {
196 l=read(st->rxfd,rxbuf,DEFAULT_BUFSIZE);
197 if (l<0) {
042a8da9
SE
198 if (errno!=EINTR)
199 fatal_perror("%s: userv_afterpoll: read(rxfd)",
200 st->slip.nl.name);
201 } else if (l==0) {
4f5e39ec 202 fatal("%s: userv_afterpoll: read(rxfd)=0; userv gone away?",
042a8da9
SE
203 st->slip.nl.name);
204 } else slip_unstuff(&st->slip,rxbuf,l);
9d3a4132
SE
205 }
206}
207
208/* Send buf to the kernel. Free buf before returning. */
469fd1d9 209static void userv_deliver_to_kernel(void *sst, struct buffer_if *buf)
9d3a4132
SE
210{
211 struct userv *st=sst;
9d3a4132 212
042a8da9
SE
213 slip_stuff(&st->slip,buf,st->txfd);
214}
9d3a4132 215
042a8da9
SE
216static void userv_userv_callback(void *sst, pid_t pid, int status)
217{
218 struct userv *st=sst;
219
220 if (pid!=st->pid) {
221 Message(M_WARNING,"userv_callback called unexpectedly with pid %d "
222 "(expected %d)\n",pid,st->pid);
223 return;
9d3a4132 224 }
042a8da9
SE
225 if (!st->expecting_userv_exit) {
226 if (WIFEXITED(status)) {
4f5e39ec 227 fatal("%s: userv exited unexpectedly with status %d",
042a8da9
SE
228 st->slip.nl.name,WEXITSTATUS(status));
229 } else if (WIFSIGNALED(status)) {
4f5e39ec 230 fatal("%s: userv exited unexpectedly: uncaught signal %d",
042a8da9
SE
231 st->slip.nl.name,WTERMSIG(status));
232 } else {
779837e1
IJ
233 fatal("%s: userv stopped unexpectedly",
234 st->slip.nl.name);
042a8da9 235 }
9d3a4132 236 }
042a8da9
SE
237 Message(M_WARNING,"%s: userv subprocess died with status %d\n",
238 st->slip.nl.name,WEXITSTATUS(status));
239 st->pid=0;
9d3a4132
SE
240}
241
042a8da9 242struct userv_entry_rec {
fe5e9cc4
SE
243 cstring_t path;
244 const char **argv;
469fd1d9
SE
245 int in;
246 int out;
042a8da9
SE
247 /* XXX perhaps we should collect and log stderr? */
248};
249
250static void userv_entry(void *sst)
9d3a4132 251{
042a8da9
SE
252 struct userv_entry_rec *st=sst;
253
469fd1d9
SE
254 dup2(st->in,0);
255 dup2(st->out,1);
042a8da9
SE
256
257 /* XXX close all other fds */
258 setsid();
fe5e9cc4
SE
259 /* XXX We really should strdup() all of argv[] but because we'll just
260 exit anyway if execvp() fails it doesn't seem worth bothering. */
261 execvp(st->path,(char *const*)st->argv);
042a8da9
SE
262 perror("userv-entry: execvp()");
263 exit(1);
264}
265
266static void userv_invoke_userv(struct userv *st)
267{
268 struct userv_entry_rec *er;
9d3a4132
SE
269 int c_stdin[2];
270 int c_stdout[2];
271 string_t addrs;
272 string_t nets;
273 string_t s;
d3fe100d
SE
274 struct netlink_client *r;
275 struct ipset *allnets;
794f2398 276 struct subnet_list *snets;
4f5e39ec 277 int i, nread;
042a8da9
SE
278 uint8_t confirm;
279
280 if (st->pid) {
4f5e39ec 281 fatal("userv_invoke_userv: already running");
042a8da9 282 }
9d3a4132
SE
283
284 /* This is where we actually invoke userv - all the networks we'll
285 be using should already have been registered. */
286
042a8da9
SE
287 addrs=safe_malloc(512,"userv_invoke_userv:addrs");
288 snprintf(addrs,512,"%s,%s,%d,slip",
289 ipaddr_to_string(st->slip.local_address),
290 ipaddr_to_string(st->slip.nl.secnet_address),st->slip.nl.mtu);
9d3a4132 291
d3fe100d
SE
292 allnets=ipset_new();
293 for (r=st->slip.nl.clients; r; r=r->next) {
f208b9a9
IJ
294 if (r->link_quality > LINK_QUALITY_UNUSED) {
295 struct ipset *nan;
296 r->kup=True;
297 nan=ipset_union(allnets,r->networks);
298 ipset_free(allnets);
299 allnets=nan;
300 }
9d3a4132 301 }
d3fe100d
SE
302 snets=ipset_to_subnet_list(allnets);
303 ipset_free(allnets);
794f2398
SE
304 nets=safe_malloc(20*snets->entries,"userv_invoke_userv:nets");
305 *nets=0;
306 for (i=0; i<snets->entries; i++) {
307 s=subnet_to_string(snets->list[i]);
308 strcat(nets,s);
309 strcat(nets,",");
310 free(s);
311 }
9d3a4132 312 nets[strlen(nets)-1]=0;
794f2398 313 subnet_list_free(snets);
9d3a4132 314
042a8da9 315 Message(M_INFO,"%s: about to invoke: %s %s %s %s %s\n",st->slip.nl.name,
9d3a4132
SE
316 st->userv_path,st->service_user,st->service_name,addrs,nets);
317
042a8da9 318 st->slip.pending_esc=False;
9d3a4132
SE
319
320 /* Invoke userv */
321 if (pipe(c_stdin)!=0) {
042a8da9 322 fatal_perror("userv_invoke_userv: pipe(c_stdin)");
9d3a4132
SE
323 }
324 if (pipe(c_stdout)!=0) {
042a8da9 325 fatal_perror("userv_invoke_userv: pipe(c_stdout)");
9d3a4132
SE
326 }
327 st->txfd=c_stdin[1];
328 st->rxfd=c_stdout[0];
329
042a8da9
SE
330 er=safe_malloc(sizeof(*r),"userv_invoke_userv: er");
331
469fd1d9
SE
332 er->in=c_stdin[0];
333 er->out=c_stdout[1];
042a8da9
SE
334 /* The arguments are:
335 userv
336 service-user
337 service-name
338 local-addr,secnet-addr,mtu,protocol
339 route1,route2,... */
340 er->argv=safe_malloc(sizeof(*er->argv)*6,"userv_invoke_userv:argv");
341 er->argv[0]=st->userv_path;
342 er->argv[1]=st->service_user;
343 er->argv[2]=st->service_name;
344 er->argv[3]=addrs;
345 er->argv[4]=nets;
346 er->argv[5]=NULL;
347 er->path=st->userv_path;
348
349 st->pid=makesubproc(userv_entry, userv_userv_callback,
350 er, st, st->slip.nl.name);
469fd1d9
SE
351 close(er->in);
352 close(er->out);
042a8da9
SE
353 free(er->argv);
354 free(er);
355 free(addrs);
356 free(nets);
357 Message(M_INFO,"%s: userv-ipif pid is %d\n",st->slip.nl.name,st->pid);
358 /* Read a single character from the pipe to confirm userv-ipif is
359 running. If we get a SIGCHLD at this point then we'll get EINTR. */
4f5e39ec 360 if ((nread=read(st->rxfd,&confirm,1))!=1) {
042a8da9
SE
361 if (errno==EINTR) {
362 Message(M_WARNING,"%s: read of confirmation byte was "
363 "interrupted\n",st->slip.nl.name);
364 } else {
4f5e39ec
SE
365 if (nread<0) {
366 fatal_perror("%s: error reading confirmation byte",
367 st->slip.nl.name);
368 } else {
369 fatal("%s: unexpected EOF instead of confirmation byte"
370 " - userv ipif failed?", st->slip.nl.name);
371 }
042a8da9
SE
372 }
373 } else {
374 if (confirm!=SLIP_END) {
4f5e39ec 375 fatal("%s: bad confirmation byte %d from userv-ipif",
042a8da9
SE
376 st->slip.nl.name,confirm);
377 }
9d3a4132 378 }
042a8da9
SE
379}
380
381static void userv_kill_userv(struct userv *st)
382{
383 if (st->pid) {
384 kill(-st->pid,SIGTERM);
385 st->expecting_userv_exit=True;
386 }
387}
388
389static void userv_phase_hook(void *sst, uint32_t newphase)
390{
391 struct userv *st=sst;
392 /* We must wait until signal processing has started before forking
393 userv */
394 if (newphase==PHASE_RUN) {
395 userv_invoke_userv(st);
396 /* Register for poll() */
397 register_for_poll(st, userv_beforepoll, userv_afterpoll, 2,
398 st->slip.nl.name);
399 }
400 if (newphase==PHASE_SHUTDOWN) {
401 userv_kill_userv(st);
9d3a4132 402 }
9d3a4132
SE
403}
404
405static list_t *userv_apply(closure_t *self, struct cloc loc, dict_t *context,
406 list_t *args)
407{
408 struct userv *st;
409 item_t *item;
410 dict_t *dict;
411
412 st=safe_malloc(sizeof(*st),"userv_apply");
413
414 /* First parameter must be a dict */
415 item=list_elem(args,0);
416 if (!item || item->type!=t_dict)
417 cfgfatal(loc,"userv-ipif","parameter must be a dictionary\n");
418
419 dict=item->data.dict;
420
042a8da9
SE
421 slip_init(&st->slip,loc,dict,"netlink-userv-ipif",
422 userv_deliver_to_kernel);
9d3a4132
SE
423
424 st->userv_path=dict_read_string(dict,"userv-path",False,"userv-netlink",
425 loc);
426 st->service_user=dict_read_string(dict,"service-user",False,
427 "userv-netlink",loc);
428 st->service_name=dict_read_string(dict,"service-name",False,
429 "userv-netlink",loc);
430 if (!st->userv_path) st->userv_path="userv";
431 if (!st->service_user) st->service_user="root";
432 if (!st->service_name) st->service_name="ipif";
9d3a4132 433 st->rxfd=-1; st->txfd=-1;
042a8da9
SE
434 st->pid=0;
435 st->expecting_userv_exit=False;
436 add_hook(PHASE_RUN,userv_phase_hook,st);
437 add_hook(PHASE_SHUTDOWN,userv_phase_hook,st);
9d3a4132 438
042a8da9 439 return new_closure(&st->slip.nl.cl);
9d3a4132
SE
440}
441
9d3a4132
SE
442void slip_module(dict_t *dict)
443{
444 add_closure(dict,"userv-ipif",userv_apply);
9d3a4132 445}