chiark / gitweb /
audit,utmp: implement audit logic and rip utmp stuff out of the main daemon and into...
[elogind.git] / src / socket-util.c
1 /*-*- Mode: C; c-basic-offset: 8 -*-*/
2
3 /***
4   This file is part of systemd.
5
6   Copyright 2010 Lennart Poettering
7
8   systemd is free software; you can redistribute it and/or modify it
9   under the terms of the GNU General Public License as published by
10   the Free Software Foundation; either version 2 of the License, or
11   (at your option) any later version.
12
13   systemd is distributed in the hope that it will be useful, but
14   WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16   General Public License for more details.
17
18   You should have received a copy of the GNU General Public License
19   along with systemd; If not, see <http://www.gnu.org/licenses/>.
20 ***/
21
22 #include <assert.h>
23 #include <string.h>
24 #include <unistd.h>
25 #include <errno.h>
26 #include <stdlib.h>
27 #include <arpa/inet.h>
28 #include <stdio.h>
29 #include <net/if.h>
30 #include <sys/types.h>
31 #include <sys/stat.h>
32
33 #include "macro.h"
34 #include "util.h"
35 #include "socket-util.h"
36 #include "missing.h"
37
38 int socket_address_parse(SocketAddress *a, const char *s) {
39         int r;
40         char *e, *n;
41         unsigned u;
42
43         assert(a);
44         assert(s);
45
46         zero(*a);
47         a->type = SOCK_STREAM;
48
49         if (*s == '[') {
50                 /* IPv6 in [x:.....:z]:p notation */
51
52                 if (!(e = strchr(s+1, ']')))
53                         return -EINVAL;
54
55                 if (!(n = strndup(s+1, e-s-1)))
56                         return -ENOMEM;
57
58                 errno = 0;
59                 if (inet_pton(AF_INET6, n, &a->sockaddr.in6.sin6_addr) <= 0) {
60                         free(n);
61                         return errno != 0 ? -errno : -EINVAL;
62                 }
63
64                 free(n);
65
66                 e++;
67                 if (*e != ':')
68                         return -EINVAL;
69
70                 e++;
71                 if ((r = safe_atou(e, &u)) < 0)
72                         return r;
73
74                 if (u <= 0 || u > 0xFFFF)
75                         return -EINVAL;
76
77                 a->sockaddr.in6.sin6_family = AF_INET6;
78                 a->sockaddr.in6.sin6_port = htons((uint16_t) u);
79                 a->size = sizeof(struct sockaddr_in6);
80
81         } else if (*s == '/') {
82                 /* AF_UNIX socket */
83
84                 size_t l;
85
86                 l = strlen(s);
87                 if (l >= sizeof(a->sockaddr.un.sun_path))
88                         return -EINVAL;
89
90                 a->sockaddr.un.sun_family = AF_UNIX;
91                 memcpy(a->sockaddr.un.sun_path, s, l);
92                 a->size = sizeof(sa_family_t) + l + 1;
93
94         } else if (*s == '@') {
95                 /* Abstract AF_UNIX socket */
96                 size_t l;
97
98                 l = strlen(s+1);
99                 if (l >= sizeof(a->sockaddr.un.sun_path) - 1)
100                         return -EINVAL;
101
102                 a->sockaddr.un.sun_family = AF_UNIX;
103                 memcpy(a->sockaddr.un.sun_path+1, s+1, l);
104                 a->size = sizeof(sa_family_t) + 1 + l;
105
106         } else {
107
108                 if ((e = strchr(s, ':'))) {
109
110                         if ((r = safe_atou(e+1, &u)) < 0)
111                                 return r;
112
113                         if (u <= 0 || u > 0xFFFF)
114                                 return -EINVAL;
115
116                         if (!(n = strndup(s, e-s)))
117                                 return -ENOMEM;
118
119                         /* IPv4 in w.x.y.z:p notation? */
120                         if ((r = inet_pton(AF_INET, n, &a->sockaddr.in4.sin_addr)) < 0) {
121                                 free(n);
122                                 return -errno;
123                         }
124
125                         if (r > 0) {
126                                 /* Gotcha, it's a traditional IPv4 address */
127                                 free(n);
128
129                                 a->sockaddr.in4.sin_family = AF_INET;
130                                 a->sockaddr.in4.sin_port = htons((uint16_t) u);
131                                 a->size = sizeof(struct sockaddr_in);
132                         } else {
133                                 unsigned idx;
134
135                                 if (strlen(n) > IF_NAMESIZE-1) {
136                                         free(n);
137                                         return -EINVAL;
138                                 }
139
140                                 /* Uh, our last resort, an interface name */
141                                 idx = if_nametoindex(n);
142                                 free(n);
143
144                                 if (idx == 0)
145                                         return -EINVAL;
146
147                                 a->sockaddr.in6.sin6_family = AF_INET6;
148                                 a->sockaddr.in6.sin6_port = htons((uint16_t) u);
149                                 a->sockaddr.in6.sin6_scope_id = idx;
150                                 a->sockaddr.in6.sin6_addr = in6addr_any;
151                                 a->size = sizeof(struct sockaddr_in6);
152
153                         }
154                 } else {
155
156                         /* Just a port */
157                         if ((r = safe_atou(s, &u)) < 0)
158                                 return r;
159
160                         if (u <= 0 || u > 0xFFFF)
161                                 return -EINVAL;
162
163                         a->sockaddr.in6.sin6_family = AF_INET6;
164                         a->sockaddr.in6.sin6_port = htons((uint16_t) u);
165                         a->sockaddr.in6.sin6_addr = in6addr_any;
166                         a->size = sizeof(struct sockaddr_in6);
167                 }
168         }
169
170         return 0;
171 }
172
173 int socket_address_verify(const SocketAddress *a) {
174         assert(a);
175
176         switch (socket_address_family(a)) {
177                 case AF_INET:
178                         if (a->size != sizeof(struct sockaddr_in))
179                                 return -EINVAL;
180
181                         if (a->sockaddr.in4.sin_port == 0)
182                                 return -EINVAL;
183
184                         return 0;
185
186                 case AF_INET6:
187                         if (a->size != sizeof(struct sockaddr_in6))
188                                 return -EINVAL;
189
190                         if (a->sockaddr.in6.sin6_port == 0)
191                                 return -EINVAL;
192
193                         return 0;
194
195                 case AF_UNIX:
196                         if (a->size < sizeof(sa_family_t))
197                                 return -EINVAL;
198
199                         if (a->size > sizeof(sa_family_t)) {
200
201                                 if (a->sockaddr.un.sun_path[0] != 0) {
202                                         char *e;
203
204                                         /* path */
205                                         if (!(e = memchr(a->sockaddr.un.sun_path, 0, sizeof(a->sockaddr.un.sun_path))))
206                                                 return -EINVAL;
207
208                                         if (a->size != sizeof(sa_family_t) + (e - a->sockaddr.un.sun_path) + 1)
209                                                 return -EINVAL;
210                                 }
211                         }
212
213                         return 0;
214
215                 default:
216                         return -EAFNOSUPPORT;
217         }
218 }
219
220 int socket_address_print(const SocketAddress *a, char **p) {
221         int r;
222         assert(a);
223         assert(p);
224
225         if ((r = socket_address_verify(a)) < 0)
226                 return r;
227
228         switch (socket_address_family(a)) {
229                 case AF_INET: {
230                         char *ret;
231
232                         if (!(ret = new(char, INET_ADDRSTRLEN+1+5+1)))
233                                 return -ENOMEM;
234
235                         if (!inet_ntop(AF_INET, &a->sockaddr.in4.sin_addr, ret, INET_ADDRSTRLEN)) {
236                                 free(ret);
237                                 return -errno;
238                         }
239
240                         sprintf(strchr(ret, 0), ":%u", ntohs(a->sockaddr.in4.sin_port));
241                         *p = ret;
242                         return 0;
243                 }
244
245                 case AF_INET6: {
246                         char *ret;
247
248                         if (!(ret = new(char, 1+INET6_ADDRSTRLEN+2+5+1)))
249                                 return -ENOMEM;
250
251                         ret[0] = '[';
252                         if (!inet_ntop(AF_INET6, &a->sockaddr.in6.sin6_addr, ret+1, INET6_ADDRSTRLEN)) {
253                                 free(ret);
254                                 return -errno;
255                         }
256
257                         sprintf(strchr(ret, 0), "]:%u", ntohs(a->sockaddr.in6.sin6_port));
258                         *p = ret;
259                         return 0;
260                 }
261
262                 case AF_UNIX: {
263                         char *ret;
264
265                         if (a->size <= sizeof(sa_family_t)) {
266
267                                 if (!(ret = strdup("<unamed>")))
268                                         return -ENOMEM;
269
270                         } else if (a->sockaddr.un.sun_path[0] == 0) {
271                                 /* abstract */
272
273                                 /* FIXME: We assume we can print the
274                                  * socket path here and that it hasn't
275                                  * more than one NUL byte. That is
276                                  * actually an invalid assumption */
277
278                                 if (!(ret = new(char, sizeof(a->sockaddr.un.sun_path)+1)))
279                                         return -ENOMEM;
280
281                                 ret[0] = '@';
282                                 memcpy(ret+1, a->sockaddr.un.sun_path+1, sizeof(a->sockaddr.un.sun_path)-1);
283                                 ret[sizeof(a->sockaddr.un.sun_path)] = 0;
284
285                         } else {
286
287                                 if (!(ret = strdup(a->sockaddr.un.sun_path)))
288                                         return -ENOMEM;
289                         }
290
291                         *p = ret;
292                         return 0;
293                 }
294
295                 default:
296                         return -EINVAL;
297         }
298 }
299
300 int socket_address_listen(
301                 const SocketAddress *a,
302                 int backlog,
303                 SocketAddressBindIPv6Only only,
304                 const char *bind_to_device,
305                 bool free_bind,
306                 mode_t directory_mode,
307                 mode_t socket_mode,
308                 const char *label,
309                 int *ret) {
310
311         int r, fd, one;
312         assert(a);
313         assert(ret);
314
315         if ((r = socket_address_verify(a)) < 0)
316                 return r;
317
318         r = label_socket_set(label);
319         if (r < 0)
320                 return r;
321
322         fd = socket(socket_address_family(a), a->type | SOCK_NONBLOCK | SOCK_CLOEXEC, 0);
323         r = fd < 0 ? -errno : 0;
324
325         label_socket_clear();
326
327         if (r < 0)
328                 return r;
329
330         if (socket_address_family(a) == AF_INET6 && only != SOCKET_ADDRESS_DEFAULT) {
331                 int flag = only == SOCKET_ADDRESS_IPV6_ONLY;
332
333                 if (setsockopt(fd, IPPROTO_IPV6, IPV6_V6ONLY, &flag, sizeof(flag)) < 0)
334                         goto fail;
335         }
336
337         if (bind_to_device)
338                 if (setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, bind_to_device, strlen(bind_to_device)+1) < 0)
339                         goto fail;
340
341         if (free_bind) {
342                 one = 1;
343                 if (setsockopt(fd, IPPROTO_IP, IP_FREEBIND, &one, sizeof(one)) < 0)
344                         log_warning("IP_FREEBIND failed: %m");
345         }
346
347         one = 1;
348         if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one)) < 0)
349                 goto fail;
350
351         if (socket_address_family(a) == AF_UNIX && a->sockaddr.un.sun_path[0] != 0) {
352                 mode_t old_mask;
353
354                 /* Create parents */
355                 mkdir_parents(a->sockaddr.un.sun_path, directory_mode);
356
357                 /* Enforce the right access mode for the socket*/
358                 old_mask = umask(~ socket_mode);
359
360                 /* Include the original umask in our mask */
361                 umask(~socket_mode | old_mask);
362
363                 r = bind(fd, &a->sockaddr.sa, a->size);
364
365                 if (r < 0 && errno == EADDRINUSE) {
366                         /* Unlink and try again */
367                         unlink(a->sockaddr.un.sun_path);
368                         r = bind(fd, &a->sockaddr.sa, a->size);
369                 }
370
371                 umask(old_mask);
372         } else
373                 r = bind(fd, &a->sockaddr.sa, a->size);
374
375         if (r < 0)
376                 goto fail;
377
378         if (a->type == SOCK_STREAM)
379                 if (listen(fd, backlog) < 0)
380                         goto fail;
381
382         *ret = fd;
383         return 0;
384
385 fail:
386         r = -errno;
387         close_nointr_nofail(fd);
388         return r;
389 }
390
391 bool socket_address_can_accept(const SocketAddress *a) {
392         assert(a);
393
394         return
395                 a->type == SOCK_STREAM ||
396                 a->type == SOCK_SEQPACKET;
397 }
398
399 bool socket_address_equal(const SocketAddress *a, const SocketAddress *b) {
400         assert(a);
401         assert(b);
402
403         /* Invalid addresses are unequal to all */
404         if (socket_address_verify(a) < 0 ||
405             socket_address_verify(b) < 0)
406                 return false;
407
408         if (a->type != b->type)
409                 return false;
410
411         if (a->size != b->size)
412                 return false;
413
414         if (socket_address_family(a) != socket_address_family(b))
415                 return false;
416
417         switch (socket_address_family(a)) {
418
419         case AF_INET:
420                 if (a->sockaddr.in4.sin_addr.s_addr != b->sockaddr.in4.sin_addr.s_addr)
421                         return false;
422
423                 if (a->sockaddr.in4.sin_port != b->sockaddr.in4.sin_port)
424                         return false;
425
426                 break;
427
428         case AF_INET6:
429                 if (memcmp(&a->sockaddr.in6.sin6_addr, &b->sockaddr.in6.sin6_addr, sizeof(a->sockaddr.in6.sin6_addr)) != 0)
430                         return false;
431
432                 if (a->sockaddr.in6.sin6_port != b->sockaddr.in6.sin6_port)
433                         return false;
434
435                 break;
436
437         case AF_UNIX:
438
439                 if ((a->sockaddr.un.sun_path[0] == 0) != (b->sockaddr.un.sun_path[0] == 0))
440                         return false;
441
442                 if (a->sockaddr.un.sun_path[0]) {
443                         if (strncmp(a->sockaddr.un.sun_path, b->sockaddr.un.sun_path, sizeof(a->sockaddr.un.sun_path)) != 0)
444                                 return false;
445                 } else {
446                         if (memcmp(a->sockaddr.un.sun_path, b->sockaddr.un.sun_path, a->size) != 0)
447                                 return false;
448                 }
449
450                 break;
451
452         default:
453                 /* Cannot compare, so we assume the addresses are different */
454                 return false;
455         }
456
457         return true;
458 }
459
460 bool socket_address_is(const SocketAddress *a, const char *s, int type) {
461         struct SocketAddress b;
462
463         assert(a);
464         assert(s);
465
466         if (socket_address_parse(&b, s) < 0)
467                 return false;
468
469         b.type = type;
470
471         return socket_address_equal(a, &b);
472 }
473
474 bool socket_address_needs_mount(const SocketAddress *a, const char *prefix) {
475         assert(a);
476
477         if (socket_address_family(a) != AF_UNIX)
478                 return false;
479
480         if (a->sockaddr.un.sun_path[0] == 0)
481                 return false;
482
483         return path_startswith(a->sockaddr.un.sun_path, prefix);
484 }
485
486 static const char* const socket_address_bind_ipv6_only_table[_SOCKET_ADDRESS_BIND_IPV6_ONLY_MAX] = {
487         [SOCKET_ADDRESS_DEFAULT] = "default",
488         [SOCKET_ADDRESS_BOTH] = "both",
489         [SOCKET_ADDRESS_IPV6_ONLY] = "ipv6-only"
490 };
491
492 DEFINE_STRING_TABLE_LOOKUP(socket_address_bind_ipv6_only, SocketAddressBindIPv6Only);