1 /* $OpenBSD: control.c,v 1.131 2024/01/20 09:01:03 claudio Exp $ */
2
3 /*
4 * Copyright (c) 2012 Gilles Chehade <gilles@poolp.org>
5 * Copyright (c) 2008 Pierre-Yves Ritschard <pyr@openbsd.org>
6 * Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
7 *
8 * Permission to use, copy, modify, and distribute this software for any
9 * purpose with or without fee is hereby granted, provided that the above
10 * copyright notice and this permission notice appear in all copies.
11 *
12 * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
13 * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
14 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
15 * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
16 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
17 * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
18 * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
19 */
20
21 #include <sys/stat.h>
22 #include <sys/un.h>
23
24 #include <errno.h>
25 #include <pwd.h>
26 #include <signal.h>
27 #include <stdlib.h>
28 #include <string.h>
29 #include <time.h>
30 #include <unistd.h>
31
32 #include "smtpd.h"
33 #include "log.h"
34
35 #define CONTROL_BACKLOG 5
36
37 struct ctl_conn {
38 uint32_t id;
39 uint8_t flags;
40 #define CTL_CONN_NOTIFY 0x01
41 struct mproc mproc;
42 uid_t euid;
43 gid_t egid;
44 };
45
46 struct {
47 struct event ev;
48 int fd;
49 } control_state;
50
51 static void control_imsg(struct mproc *, struct imsg *);
52 static void control_shutdown(void);
53 static void control_listen(void);
54 static void control_accept(int, short, void *);
55 static void control_close(struct ctl_conn *);
56 static void control_dispatch_ext(struct mproc *, struct imsg *);
57 static void control_digest_update(const char *, size_t, int);
58 static void control_broadcast_verbose(int, int);
59
60 static struct stat_backend *stat_backend = NULL;
61 extern const char *backend_stat;
62
63 static uint64_t connid = 0;
64 static struct tree ctl_conns;
65 static struct tree ctl_count;
66 static struct stat_digest digest;
67
68 #define CONTROL_FD_RESERVE 5
69 #define CONTROL_MAXCONN_PER_CLIENT 32
70
71 static void
control_imsg(struct mproc * p,struct imsg * imsg)72 control_imsg(struct mproc *p, struct imsg *imsg)
73 {
74 struct ctl_conn *c;
75 struct stat_value val;
76 struct msg m;
77 const char *key;
78 const void *data;
79 size_t sz;
80
81 if (imsg == NULL) {
82 if (p->proc != PROC_CLIENT)
83 control_shutdown();
84 return;
85 }
86
87 switch (imsg->hdr.type) {
88 case IMSG_CTL_OK:
89 case IMSG_CTL_FAIL:
90 case IMSG_CTL_LIST_MESSAGES:
91 case IMSG_CTL_LIST_ENVELOPES:
92 case IMSG_CTL_DISCOVER_EVPID:
93 case IMSG_CTL_DISCOVER_MSGID:
94 case IMSG_CTL_MTA_SHOW_HOSTS:
95 case IMSG_CTL_MTA_SHOW_RELAYS:
96 case IMSG_CTL_MTA_SHOW_ROUTES:
97 case IMSG_CTL_MTA_SHOW_HOSTSTATS:
98 case IMSG_CTL_MTA_SHOW_BLOCK:
99 c = tree_get(&ctl_conns, imsg->hdr.peerid);
100 if (c == NULL)
101 return;
102 imsg->hdr.peerid = 0;
103 m_forward(&c->mproc, imsg);
104 return;
105
106 case IMSG_CTL_SMTP_SESSION:
107 c = tree_get(&ctl_conns, imsg->hdr.peerid);
108 if (c == NULL)
109 return;
110 m_compose(&c->mproc, IMSG_CTL_OK, 0, 0, imsg_get_fd(imsg),
111 NULL, 0);
112 return;
113
114 case IMSG_STAT_INCREMENT:
115 m_msg(&m, imsg);
116 m_get_string(&m, &key);
117 m_get_data(&m, &data, &sz);
118 m_end(&m);
119 if (sz != sizeof(val))
120 fatalx("control: IMSG_STAT_INCREMENT size mismatch");
121 memmove(&val, data, sz);
122 if (stat_backend)
123 stat_backend->increment(key, val.u.counter);
124 control_digest_update(key, val.u.counter, 1);
125 return;
126
127 case IMSG_STAT_DECREMENT:
128 m_msg(&m, imsg);
129 m_get_string(&m, &key);
130 m_get_data(&m, &data, &sz);
131 m_end(&m);
132 if (sz != sizeof(val))
133 fatalx("control: IMSG_STAT_DECREMENT size mismatch");
134 memmove(&val, data, sz);
135 if (stat_backend)
136 stat_backend->decrement(key, val.u.counter);
137 control_digest_update(key, val.u.counter, 0);
138 return;
139
140 case IMSG_STAT_SET:
141 m_msg(&m, imsg);
142 m_get_string(&m, &key);
143 m_get_data(&m, &data, &sz);
144 m_end(&m);
145 if (sz != sizeof(val))
146 fatalx("control: IMSG_STAT_SET size mismatch");
147 memmove(&val, data, sz);
148 if (stat_backend)
149 stat_backend->set(key, &val);
150 return;
151 }
152
153 fatalx("control_imsg: unexpected %s imsg",
154 imsg_to_str(imsg->hdr.type));
155 }
156
157 int
control_create_socket(void)158 control_create_socket(void)
159 {
160 struct sockaddr_un s_un;
161 int fd;
162 mode_t old_umask;
163
164 if ((fd = socket(AF_UNIX, SOCK_STREAM, 0)) == -1)
165 fatal("control: socket");
166
167 memset(&s_un, 0, sizeof(s_un));
168 s_un.sun_family = AF_UNIX;
169 if (strlcpy(s_un.sun_path, SMTPD_SOCKET,
170 sizeof(s_un.sun_path)) >= sizeof(s_un.sun_path))
171 fatal("control: socket name too long");
172
173 if (connect(fd, (struct sockaddr *)&s_un, sizeof(s_un)) == 0)
174 fatalx("control socket already listening");
175
176 if (unlink(SMTPD_SOCKET) == -1)
177 if (errno != ENOENT)
178 fatal("control: cannot unlink socket");
179
180 old_umask = umask(S_IXUSR|S_IXGRP|S_IWOTH|S_IROTH|S_IXOTH);
181 if (bind(fd, (struct sockaddr *)&s_un, sizeof(s_un)) == -1) {
182 (void)umask(old_umask);
183 fatal("control: bind");
184 }
185 (void)umask(old_umask);
186
187 if (chmod(SMTPD_SOCKET,
188 S_IRUSR|S_IWUSR|S_IRGRP|S_IWGRP|S_IROTH|S_IWOTH) == -1) {
189 (void)unlink(SMTPD_SOCKET);
190 fatal("control: chmod");
191 }
192
193 io_set_nonblocking(fd);
194 control_state.fd = fd;
195
196 return fd;
197 }
198
199 int
control(void)200 control(void)
201 {
202 struct passwd *pw;
203
204 purge_config(PURGE_EVERYTHING);
205
206 if ((pw = getpwnam(SMTPD_USER)) == NULL)
207 fatalx("unknown user " SMTPD_USER);
208
209 stat_backend = env->sc_stat;
210 stat_backend->init();
211
212 if (chroot(PATH_CHROOT) == -1)
213 fatal("control: chroot");
214 if (chdir("/") == -1)
215 fatal("control: chdir(\"/\")");
216
217 config_process(PROC_CONTROL);
218
219 if (setgroups(1, &pw->pw_gid) ||
220 setresgid(pw->pw_gid, pw->pw_gid, pw->pw_gid) ||
221 setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
222 fatal("control: cannot drop privileges");
223
224 imsg_callback = control_imsg;
225 event_init();
226
227 signal(SIGINT, SIG_IGN);
228 signal(SIGTERM, SIG_IGN);
229 signal(SIGPIPE, SIG_IGN);
230 signal(SIGHUP, SIG_IGN);
231
232 tree_init(&ctl_conns);
233 tree_init(&ctl_count);
234
235 memset(&digest, 0, sizeof digest);
236 digest.startup = time(NULL);
237
238 config_peer(PROC_SCHEDULER);
239 config_peer(PROC_QUEUE);
240 config_peer(PROC_PARENT);
241 config_peer(PROC_LKA);
242 config_peer(PROC_DISPATCHER);
243 config_peer(PROC_CA);
244
245 control_listen();
246
247 if (pledge("stdio unix recvfd sendfd", NULL) == -1)
248 fatal("pledge");
249
250 event_dispatch();
251 fatalx("exited event loop");
252
253 return (0);
254 }
255
256 static void
control_shutdown(void)257 control_shutdown(void)
258 {
259 log_debug("debug: control agent exiting");
260 _exit(0);
261 }
262
263 static void
control_listen(void)264 control_listen(void)
265 {
266 if (listen(control_state.fd, CONTROL_BACKLOG) == -1)
267 fatal("control_listen");
268
269 event_set(&control_state.ev, control_state.fd, EV_READ|EV_PERSIST,
270 control_accept, NULL);
271 event_add(&control_state.ev, NULL);
272 }
273
274 static void
control_accept(int listenfd,short event,void * arg)275 control_accept(int listenfd, short event, void *arg)
276 {
277 int connfd;
278 socklen_t len;
279 struct sockaddr_un s_un;
280 struct ctl_conn *c;
281 size_t *count;
282 uid_t euid;
283 gid_t egid;
284
285 if (getdtablesize() - getdtablecount() < CONTROL_FD_RESERVE)
286 goto pause;
287
288 len = sizeof(s_un);
289 if ((connfd = accept(listenfd, (struct sockaddr *)&s_un, &len)) == -1) {
290 if (errno == ENFILE || errno == EMFILE)
291 goto pause;
292 if (errno == EINTR || errno == EWOULDBLOCK ||
293 errno == ECONNABORTED)
294 return;
295 fatal("control_accept: accept");
296 }
297
298 io_set_nonblocking(connfd);
299
300 if (getpeereid(connfd, &euid, &egid) == -1)
301 fatal("getpeereid");
302
303 count = tree_get(&ctl_count, euid);
304 if (count == NULL) {
305 count = xcalloc(1, sizeof *count);
306 tree_xset(&ctl_count, euid, count);
307 }
308
309 if (*count == CONTROL_MAXCONN_PER_CLIENT) {
310 close(connfd);
311 log_warnx("warn: too many connections to control socket "
312 "from user with uid %lu", (unsigned long int)euid);
313 return;
314 }
315 (*count)++;
316
317 do {
318 ++connid;
319 } while (tree_get(&ctl_conns, connid));
320
321 c = xcalloc(1, sizeof(*c));
322 c->euid = euid;
323 c->egid = egid;
324 c->id = connid;
325 c->mproc.proc = PROC_CLIENT;
326 c->mproc.handler = control_dispatch_ext;
327 c->mproc.data = c;
328 if ((c->mproc.name = strdup(proc_title(c->mproc.proc))) == NULL)
329 fatal("strdup");
330 mproc_init(&c->mproc, connfd);
331 mproc_enable(&c->mproc);
332 tree_xset(&ctl_conns, c->id, c);
333
334 stat_backend->increment("control.session", 1);
335 return;
336
337 pause:
338 log_warnx("warn: ctl client limit hit, disabling new connections");
339 event_del(&control_state.ev);
340 }
341
342 static void
control_close(struct ctl_conn * c)343 control_close(struct ctl_conn *c)
344 {
345 size_t *count;
346
347 count = tree_xget(&ctl_count, c->euid);
348 (*count)--;
349 if (*count == 0) {
350 tree_xpop(&ctl_count, c->euid);
351 free(count);
352 }
353 tree_xpop(&ctl_conns, c->id);
354 mproc_clear(&c->mproc);
355 free(c);
356
357 stat_backend->decrement("control.session", 1);
358
359 if (getdtablesize() - getdtablecount() < CONTROL_FD_RESERVE)
360 return;
361
362 if (!event_pending(&control_state.ev, EV_READ, NULL)) {
363 log_warnx("warn: re-enabling ctl connections");
364 event_add(&control_state.ev, NULL);
365 }
366 }
367
368 static void
control_digest_update(const char * key,size_t value,int incr)369 control_digest_update(const char *key, size_t value, int incr)
370 {
371 size_t *p;
372
373 p = NULL;
374
375 if (!strcmp(key, "smtp.session")) {
376 if (incr)
377 p = &digest.clt_connect;
378 else
379 digest.clt_disconnect += value;
380 }
381 else if (!strcmp(key, "scheduler.envelope")) {
382 if (incr)
383 p = &digest.evp_enqueued;
384 else
385 digest.evp_dequeued += value;
386 }
387 else if (!strcmp(key, "scheduler.envelope.expired"))
388 p = &digest.evp_expired;
389 else if (!strcmp(key, "scheduler.envelope.removed"))
390 p = &digest.evp_removed;
391 else if (!strcmp(key, "scheduler.delivery.ok"))
392 p = &digest.dlv_ok;
393 else if (!strcmp(key, "scheduler.delivery.permfail"))
394 p = &digest.dlv_permfail;
395 else if (!strcmp(key, "scheduler.delivery.tempfail"))
396 p = &digest.dlv_tempfail;
397 else if (!strcmp(key, "scheduler.delivery.loop"))
398 p = &digest.dlv_loop;
399
400 else if (!strcmp(key, "queue.bounce"))
401 p = &digest.evp_bounce;
402
403 if (p) {
404 if (incr)
405 *p = *p + value;
406 else
407 *p = *p - value;
408 }
409 }
410
411 static void
control_dispatch_ext(struct mproc * p,struct imsg * imsg)412 control_dispatch_ext(struct mproc *p, struct imsg *imsg)
413 {
414 struct sockaddr_storage ss;
415 struct ctl_conn *c;
416 int v;
417 struct stat_kv *kvp;
418 char *key;
419 struct stat_value val;
420 size_t len;
421 uint64_t evpid;
422 uint32_t msgid;
423
424 c = p->data;
425
426 if (imsg == NULL) {
427 control_close(c);
428 return;
429 }
430
431 if (imsg->hdr.peerid != IMSG_VERSION) {
432 m_compose(p, IMSG_CTL_FAIL, IMSG_VERSION, 0, -1, NULL, 0);
433 return;
434 }
435
436 switch (imsg->hdr.type) {
437 case IMSG_CTL_SMTP_SESSION:
438 if (env->sc_flags & SMTPD_SMTP_PAUSED) {
439 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
440 return;
441 }
442 m_compose(p_dispatcher, IMSG_CTL_SMTP_SESSION, c->id, 0, -1,
443 &c->euid, sizeof(c->euid));
444 return;
445
446 case IMSG_CTL_GET_DIGEST:
447 if (c->euid)
448 goto badcred;
449 digest.timestamp = time(NULL);
450 m_compose(p, IMSG_CTL_GET_DIGEST, 0, 0, -1, &digest, sizeof digest);
451 return;
452
453 case IMSG_CTL_GET_STATS:
454 if (c->euid)
455 goto badcred;
456 kvp = imsg->data;
457 if (!stat_backend->iter(&kvp->iter, &key, &val))
458 kvp->iter = NULL;
459 else {
460 (void)strlcpy(kvp->key, key, sizeof kvp->key);
461 kvp->val = val;
462 }
463 m_compose(p, IMSG_CTL_GET_STATS, 0, 0, -1, kvp, sizeof *kvp);
464 return;
465
466 case IMSG_CTL_VERBOSE:
467 if (c->euid)
468 goto badcred;
469
470 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof(v))
471 goto badcred;
472
473 memcpy(&v, imsg->data, sizeof(v));
474 log_trace_verbose(v);
475
476 control_broadcast_verbose(IMSG_CTL_VERBOSE, v);
477
478 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
479 return;
480
481 case IMSG_CTL_TRACE_ENABLE:
482 if (c->euid)
483 goto badcred;
484
485 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof(v))
486 goto badcred;
487
488 memcpy(&v, imsg->data, sizeof(v));
489 tracing |= v;
490 log_trace_verbose(tracing);
491
492 control_broadcast_verbose(IMSG_CTL_VERBOSE, tracing);
493
494 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
495 return;
496
497 case IMSG_CTL_TRACE_DISABLE:
498 if (c->euid)
499 goto badcred;
500
501 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof(v))
502 goto badcred;
503
504 memcpy(&v, imsg->data, sizeof(v));
505 tracing &= ~v;
506 log_trace_verbose(tracing);
507
508 control_broadcast_verbose(IMSG_CTL_VERBOSE, tracing);
509
510 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
511 return;
512
513 case IMSG_CTL_PROFILE_ENABLE:
514 if (c->euid)
515 goto badcred;
516
517 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof(v))
518 goto badcred;
519
520 memcpy(&v, imsg->data, sizeof(v));
521 profiling |= v;
522
523 control_broadcast_verbose(IMSG_CTL_PROFILE, profiling);
524
525 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
526 return;
527
528 case IMSG_CTL_PROFILE_DISABLE:
529 if (c->euid)
530 goto badcred;
531
532 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof(v))
533 goto badcred;
534
535 memcpy(&v, imsg->data, sizeof(v));
536 profiling &= ~v;
537
538 control_broadcast_verbose(IMSG_CTL_PROFILE, profiling);
539
540 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
541 return;
542
543 case IMSG_CTL_PAUSE_EVP:
544 if (c->euid)
545 goto badcred;
546
547 imsg->hdr.peerid = c->id;
548 m_forward(p_scheduler, imsg);
549 return;
550
551 case IMSG_CTL_PAUSE_MDA:
552 if (c->euid)
553 goto badcred;
554
555 if (env->sc_flags & SMTPD_MDA_PAUSED) {
556 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
557 return;
558 }
559 log_info("info: mda paused");
560 env->sc_flags |= SMTPD_MDA_PAUSED;
561 m_compose(p_queue, IMSG_CTL_PAUSE_MDA, 0, 0, -1, NULL, 0);
562 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
563 return;
564
565 case IMSG_CTL_PAUSE_MTA:
566 if (c->euid)
567 goto badcred;
568
569 if (env->sc_flags & SMTPD_MTA_PAUSED) {
570 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
571 return;
572 }
573 log_info("info: mta paused");
574 env->sc_flags |= SMTPD_MTA_PAUSED;
575 m_compose(p_queue, IMSG_CTL_PAUSE_MTA, 0, 0, -1, NULL, 0);
576 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
577 return;
578
579 case IMSG_CTL_PAUSE_SMTP:
580 if (c->euid)
581 goto badcred;
582
583 if (env->sc_flags & SMTPD_SMTP_PAUSED) {
584 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
585 return;
586 }
587 log_info("info: smtp paused");
588 env->sc_flags |= SMTPD_SMTP_PAUSED;
589 m_compose(p_dispatcher, IMSG_CTL_PAUSE_SMTP, 0, 0, -1, NULL, 0);
590 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
591 return;
592
593 case IMSG_CTL_RESUME_EVP:
594 if (c->euid)
595 goto badcred;
596
597 imsg->hdr.peerid = c->id;
598 m_forward(p_scheduler, imsg);
599 return;
600
601 case IMSG_CTL_RESUME_MDA:
602 if (c->euid)
603 goto badcred;
604
605 if (!(env->sc_flags & SMTPD_MDA_PAUSED)) {
606 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
607 return;
608 }
609 log_info("info: mda resumed");
610 env->sc_flags &= ~SMTPD_MDA_PAUSED;
611 m_compose(p_queue, IMSG_CTL_RESUME_MDA, 0, 0, -1, NULL, 0);
612 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
613 return;
614
615 case IMSG_CTL_RESUME_MTA:
616 if (c->euid)
617 goto badcred;
618
619 if (!(env->sc_flags & SMTPD_MTA_PAUSED)) {
620 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
621 return;
622 }
623 log_info("info: mta resumed");
624 env->sc_flags &= ~SMTPD_MTA_PAUSED;
625 m_compose(p_queue, IMSG_CTL_RESUME_MTA, 0, 0, -1, NULL, 0);
626 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
627 return;
628
629 case IMSG_CTL_RESUME_SMTP:
630 if (c->euid)
631 goto badcred;
632
633 if (!(env->sc_flags & SMTPD_SMTP_PAUSED)) {
634 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
635 return;
636 }
637 log_info("info: smtp resumed");
638 env->sc_flags &= ~SMTPD_SMTP_PAUSED;
639 m_forward(p_dispatcher, imsg);
640 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
641 return;
642
643 case IMSG_CTL_RESUME_ROUTE:
644 if (c->euid)
645 goto badcred;
646
647 m_forward(p_dispatcher, imsg);
648 m_compose(p, IMSG_CTL_OK, 0, 0, -1, NULL, 0);
649 return;
650
651 case IMSG_CTL_LIST_MESSAGES:
652 if (c->euid)
653 goto badcred;
654 m_compose(p_scheduler, IMSG_CTL_LIST_MESSAGES, c->id, 0, -1,
655 imsg->data, imsg->hdr.len - sizeof(imsg->hdr));
656 return;
657
658 case IMSG_CTL_LIST_ENVELOPES:
659 if (c->euid)
660 goto badcred;
661 m_compose(p_scheduler, IMSG_CTL_LIST_ENVELOPES, c->id, 0, -1,
662 imsg->data, imsg->hdr.len - sizeof(imsg->hdr));
663 return;
664
665 case IMSG_CTL_MTA_SHOW_HOSTS:
666 case IMSG_CTL_MTA_SHOW_RELAYS:
667 case IMSG_CTL_MTA_SHOW_ROUTES:
668 case IMSG_CTL_MTA_SHOW_HOSTSTATS:
669 case IMSG_CTL_MTA_SHOW_BLOCK:
670 if (c->euid)
671 goto badcred;
672
673 imsg->hdr.peerid = c->id;
674 m_forward(p_dispatcher, imsg);
675 return;
676
677 case IMSG_CTL_SHOW_STATUS:
678 if (c->euid)
679 goto badcred;
680
681 m_compose(p, IMSG_CTL_SHOW_STATUS, 0, 0, -1, &env->sc_flags,
682 sizeof(env->sc_flags));
683 return;
684
685 case IMSG_CTL_MTA_BLOCK:
686 case IMSG_CTL_MTA_UNBLOCK:
687 if (c->euid)
688 goto badcred;
689
690 if (imsg->hdr.len - IMSG_HEADER_SIZE <= sizeof(ss))
691 goto invalid;
692 memmove(&ss, imsg->data, sizeof(ss));
693 m_create(p_dispatcher, imsg->hdr.type, c->id, 0, -1);
694 m_add_sockaddr(p_dispatcher, (struct sockaddr *)&ss);
695 m_add_string(p_dispatcher, (char *)imsg->data + sizeof(ss));
696 m_close(p_dispatcher);
697 return;
698
699 case IMSG_CTL_SCHEDULE:
700 if (c->euid)
701 goto badcred;
702
703 imsg->hdr.peerid = c->id;
704 m_forward(p_scheduler, imsg);
705 return;
706
707 case IMSG_CTL_REMOVE:
708 if (c->euid)
709 goto badcred;
710
711 imsg->hdr.peerid = c->id;
712 m_forward(p_scheduler, imsg);
713 return;
714
715 case IMSG_CTL_UPDATE_TABLE:
716 if (c->euid)
717 goto badcred;
718
719 /* table name too long */
720 len = strlen(imsg->data);
721 if (len >= LINE_MAX)
722 goto invalid;
723
724 imsg->hdr.peerid = c->id;
725 m_forward(p_lka, imsg);
726 return;
727
728 case IMSG_CTL_DISCOVER_EVPID:
729 if (c->euid)
730 goto badcred;
731
732 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof evpid)
733 goto invalid;
734
735 memmove(&evpid, imsg->data, sizeof evpid);
736 m_create(p_queue, imsg->hdr.type, c->id, 0, -1);
737 m_add_evpid(p_queue, evpid);
738 m_close(p_queue);
739 return;
740
741 case IMSG_CTL_DISCOVER_MSGID:
742 if (c->euid)
743 goto badcred;
744
745 if (imsg->hdr.len - IMSG_HEADER_SIZE != sizeof msgid)
746 goto invalid;
747
748 memmove(&msgid, imsg->data, sizeof msgid);
749 m_create(p_queue, imsg->hdr.type, c->id, 0, -1);
750 m_add_msgid(p_queue, msgid);
751 m_close(p_queue);
752 return;
753
754 default:
755 log_debug("debug: control_dispatch_ext: "
756 "error handling %s imsg",
757 imsg_to_str(imsg->hdr.type));
758 return;
759 }
760 badcred:
761 invalid:
762 m_compose(p, IMSG_CTL_FAIL, 0, 0, -1, NULL, 0);
763 }
764
765 static void
control_broadcast_verbose(int msg,int v)766 control_broadcast_verbose(int msg, int v)
767 {
768 m_create(p_lka, msg, 0, 0, -1);
769 m_add_int(p_lka, v);
770 m_close(p_lka);
771
772 m_create(p_dispatcher, msg, 0, 0, -1);
773 m_add_int(p_dispatcher, v);
774 m_close(p_dispatcher);
775
776 m_create(p_queue, msg, 0, 0, -1);
777 m_add_int(p_queue, v);
778 m_close(p_queue);
779
780 m_create(p_ca, msg, 0, 0, -1);
781 m_add_int(p_ca, v);
782 m_close(p_ca);
783
784 m_create(p_scheduler, msg, 0, 0, -1);
785 m_add_int(p_scheduler, v);
786 m_close(p_scheduler);
787
788 m_create(p_parent, msg, 0, 0, -1);
789 m_add_int(p_parent, v);
790 m_close(p_parent);
791 }
792