Handle partial read/write by dropping back into the event loop.

This commit is contained in:
Todd C. Miller
2021-08-31 07:36:54 -06:00
parent 33d1b26c6a
commit 3c26b92a75

View File

@@ -69,7 +69,8 @@ struct intercept_closure {
char **run_argv; /* owned by plugin */ char **run_argv; /* owned by plugin */
char **run_envp; /* dynamically allocated */ char **run_envp; /* dynamically allocated */
uint8_t *buf; /* dynamically allocated */ uint8_t *buf; /* dynamically allocated */
size_t len; uint32_t len;
uint32_t off;
int listen_sock; int listen_sock;
enum intercept_state state; enum intercept_state state;
}; };
@@ -100,7 +101,7 @@ intercept_setup(int fd, struct sudo_event_base *evbase,
closure->details = details; closure->details = details;
closure->listen_sock = -1; closure->listen_sock = -1;
if (sudo_ev_set(&closure->ev, fd, SUDO_EV_READ, intercept_cb, closure) == -1) { if (sudo_ev_set(&closure->ev, fd, SUDO_EV_READ|SUDO_EV_PERSIST, intercept_cb, closure) == -1) {
/* This cannot (currently) fail. */ /* This cannot (currently) fail. */
sudo_warn("%s", U_("unable to add event to queue")); sudo_warn("%s", U_("unable to add event to queue"));
goto bad; goto bad;
@@ -306,7 +307,7 @@ intercept_check_policy(PolicyCheckRequest *req,
"req_command: %s", req->command); "req_command: %s", req->command);
for (n = 0; n < req->n_argv; n++) { for (n = 0; n < req->n_argv; n++) {
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO, sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO,
"req_argv[%zu]: %s", n, req->argv[n]); "req_argv[%zu]: %s", n, req->argv[n]);
} }
} }
@@ -454,86 +455,90 @@ done:
debug_return_bool(ret); debug_return_bool(ret);
} }
/*
* Read a single message from sudo_intercept.so and unpack it.
* Assumes fd is in blocking mode.
*/
static InterceptRequest *
intercept_recv_request(int fd)
{
InterceptRequest *req = NULL;
uint8_t *cp, *buf = NULL;
uint32_t req_len;
ssize_t nread;
debug_decl(intercept_recv_request, SUDO_DEBUG_EXEC);
/* Read message size (uint32_t in host byte order). */
nread = recv(fd, &req_len, sizeof(req_len), 0);
if (nread != sizeof(req_len)) {
if (nread != 0)
sudo_warn("read");
goto done;
}
if (req_len > MESSAGE_SIZE_MAX) {
sudo_warnx(U_("client request too large: %zu"), (size_t)req_len);
goto done;
}
if (req_len > 0) {
size_t rem = req_len;
if ((buf = malloc(req_len)) == NULL) {
sudo_warnx("%s", U_("unable to allocate memory"));
goto done;
}
cp = buf;
do {
nread = recv(fd, cp, rem, 0);
switch (nread) {
case 0:
/* EOF, other side must have exited. */
goto done;
case -1:
sudo_warn("read");
goto done;
default:
rem -= nread;
cp += nread;
break;
}
} while (rem > 0);
}
req = intercept_request__unpack(NULL, req_len, buf);
if (req == NULL) {
sudo_warnx("unable to unpack %s size %zu", "InterceptRequest",
(size_t)req_len);
goto done;
}
done:
free(buf);
debug_return_ptr(req);
}
/* /*
* Read a message from sudo_intercept.so and act on it. * Read a message from sudo_intercept.so and act on it.
*/ */
static bool static bool
intercept_read(int fd, struct intercept_closure *closure) intercept_read(int fd, struct intercept_closure *closure)
{ {
struct sudo_event_base *base = sudo_ev_get_base(&closure->ev); struct sudo_event_base *evbase = sudo_ev_get_base(&closure->ev);
InterceptRequest *req; InterceptRequest *req = NULL;
pid_t saved_pgrp = -1; pid_t saved_pgrp = -1;
struct termios oterm; struct termios oterm;
ssize_t nread;
bool ret = false; bool ret = false;
int ttyfd = -1; int ttyfd = -1;
debug_decl(intercept_read, SUDO_DEBUG_EXEC); debug_decl(intercept_read, SUDO_DEBUG_EXEC);
req = intercept_recv_request(fd); if (closure->len == 0) {
if (req == NULL) uint32_t req_len;
/* Read message size (uint32_t in host byte order). */
nread = recv(fd, &req_len, sizeof(req_len), 0);
if (nread != sizeof(req_len)) {
if (nread == -1) {
if (errno == EINTR || errno == EAGAIN)
debug_return_bool(true);
sudo_warn("read");
}
goto done;
}
if (req_len == 0) {
/* zero-length message is possible */
goto unpack;
}
if (req_len > MESSAGE_SIZE_MAX) {
sudo_warnx(U_("client request too large: %zu"), (size_t)req_len);
goto done;
}
if ((closure->buf = malloc(req_len)) == NULL) {
sudo_warnx("%s", U_("unable to allocate memory"));
goto done;
}
closure->len = req_len;
sudo_debug_printf(SUDO_DEBUG_INFO, "%s: expecting %u bytes from client",
__func__, closure->len);
}
nread = recv(fd, closure->buf + closure->off, closure->len - closure->off,
0);
switch (nread) {
case 0:
/* EOF, other side must have exited. */
goto done; goto done;
case -1:
if (errno == EINTR || errno == EAGAIN)
debug_return_bool(true);
sudo_warn("read");
goto done;
default:
closure->off += nread;
break;
}
sudo_debug_printf(SUDO_DEBUG_INFO, "%s: received %zd bytes from client",
__func__, nread);
if (closure->off != closure->len) {
/* Partial read. */
debug_return_bool(true);
}
unpack:
req = intercept_request__unpack(NULL, closure->len, closure->buf);
if (req == NULL) {
sudo_warnx("unable to unpack %s size %zu", "InterceptRequest",
(size_t)closure->len);
goto done;
}
sudo_debug_printf(SUDO_DEBUG_INFO,
"%s: finished receiving %u bytes from client", __func__, closure->len);
sudo_ev_del(evbase, &closure->ev);
free(closure->buf);
closure->buf = NULL;
closure->len = 0;
closure->off = 0;
switch (req->type_case) { switch (req->type_case) {
case INTERCEPT_REQUEST__TYPE_POLICY_CHECK_REQ: case INTERCEPT_REQUEST__TYPE_POLICY_CHECK_REQ:
@@ -588,12 +593,12 @@ intercept_read(int fd, struct intercept_closure *closure)
} }
/* Switch event to write mode for the reply. */ /* Switch event to write mode for the reply. */
if (sudo_ev_set(&closure->ev, fd, SUDO_EV_WRITE, intercept_cb, closure) == -1) { if (sudo_ev_set(&closure->ev, fd, SUDO_EV_WRITE|SUDO_EV_PERSIST, intercept_cb, closure) == -1) {
/* This cannot (currently) fail. */ /* This cannot (currently) fail. */
sudo_warn("%s", U_("unable to add event to queue")); sudo_warn("%s", U_("unable to add event to queue"));
goto done; goto done;
} }
if (sudo_ev_add(base, &closure->ev, NULL, false) == -1) { if (sudo_ev_add(evbase, &closure->ev, NULL, false) == -1) {
sudo_warn("%s", U_("unable to add event to queue")); sudo_warn("%s", U_("unable to add event to queue"));
goto done; goto done;
} }
@@ -617,7 +622,7 @@ fmt_intercept_response(InterceptResponse *resp,
closure->len = intercept_response__get_packed_size(resp); closure->len = intercept_response__get_packed_size(resp);
if (closure->len > MESSAGE_SIZE_MAX) { if (closure->len > MESSAGE_SIZE_MAX) {
sudo_warnx(U_("server message too large: %zu"), closure->len); sudo_warnx(U_("server message too large: %zu"), (size_t)closure->len);
goto done; goto done;
} }
@@ -626,7 +631,7 @@ fmt_intercept_response(InterceptResponse *resp,
closure->len += sizeof(resp_len); closure->len += sizeof(resp_len);
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO, sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO,
"size + InterceptResponse %zu bytes", closure->len); "size + InterceptResponse %zu bytes", (size_t)closure->len);
if ((closure->buf = malloc(closure->len)) == NULL) { if ((closure->buf = malloc(closure->len)) == NULL) {
sudo_warnx("%s", U_("unable to allocate memory")); sudo_warnx("%s", U_("unable to allocate memory"));
@@ -720,48 +725,63 @@ intercept_write(int fd, struct intercept_closure *closure)
struct sudo_event_base *evbase = sudo_ev_get_base(&closure->ev); struct sudo_event_base *evbase = sudo_ev_get_base(&closure->ev);
ssize_t nwritten; ssize_t nwritten;
bool ret = false; bool ret = false;
uint8_t *cp;
size_t rem;
debug_decl(intercept_write, SUDO_DEBUG_EXEC); debug_decl(intercept_write, SUDO_DEBUG_EXEC);
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO, "state %d", sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO, "state %d",
closure->state); closure->state);
switch (closure->state) { if (closure->len == 0) {
case RECV_HELLO_INITIAL: /* Format new message. */
case RECV_HELLO: switch (closure->state) {
if (!fmt_hello_response(closure)) case RECV_HELLO_INITIAL:
goto done; case RECV_HELLO:
break; if (!fmt_hello_response(closure))
case POLICY_ACCEPT: goto done;
if (!fmt_accept_message(closure)) break;
goto done; case POLICY_ACCEPT:
break; if (!fmt_accept_message(closure))
case POLICY_REJECT: goto done;
if (!fmt_reject_message(closure)) break;
goto done; case POLICY_REJECT:
break; if (!fmt_reject_message(closure))
default: goto done;
if (!fmt_error_message(closure)) break;
goto done; default:
break; if (!fmt_error_message(closure))
goto done;
break;
}
} }
cp = closure->buf; sudo_debug_printf(SUDO_DEBUG_INFO, "%s: sending %u bytes to client",
rem = closure->len; __func__, closure->len - closure->off);
do { nwritten = send(fd, closure->buf + closure->off,
nwritten = send(fd, cp, rem, 0); closure->len - closure->off, 0);
if (nwritten == -1) { if (nwritten == -1) {
sudo_warn("send"); if (errno == EINTR || errno == EAGAIN)
goto done; debug_return_bool(true);
} sudo_warn("send");
cp += nwritten; goto done;
rem -= nwritten; }
} while (rem > 0); closure->off += nwritten;
if (closure->off != closure->len) {
/* Partial write. */
debug_return_bool(true);
}
sudo_debug_printf(SUDO_DEBUG_INFO, "%s: sent %u bytes to client",
__func__, closure->len);
sudo_ev_del(evbase, &closure->ev);
free(closure->buf);
closure->buf = NULL;
closure->len = 0;
closure->off = 0;
switch (closure->state) { switch (closure->state) {
case RECV_HELLO_INITIAL: case RECV_HELLO_INITIAL:
/* Re-use event for the listener. */ /* Re-use event for the listener. */
close(fd);
if (sudo_ev_set(&closure->ev, closure->listen_sock, SUDO_EV_READ|SUDO_EV_PERSIST, intercept_accept_cb, closure) == -1) { if (sudo_ev_set(&closure->ev, closure->listen_sock, SUDO_EV_READ|SUDO_EV_PERSIST, intercept_accept_cb, closure) == -1) {
/* This cannot (currently) fail. */ /* This cannot (currently) fail. */
sudo_warn("%s", U_("unable to add event to queue")); sudo_warn("%s", U_("unable to add event to queue"));
@@ -771,18 +791,12 @@ intercept_write(int fd, struct intercept_closure *closure)
sudo_warn("%s", U_("unable to add event to queue")); sudo_warn("%s", U_("unable to add event to queue"));
goto done; goto done;
} }
close(fd);
/* Reset bits of closure we used for ClientHello. */
free(closure->buf);
closure->buf = NULL;
closure->len = 0;
closure->listen_sock = -1; closure->listen_sock = -1;
closure->state = RECV_CONNECTION; closure->state = RECV_CONNECTION;
break; break;
case POLICY_ACCEPT: case POLICY_ACCEPT:
/* Re-use event to read ClientHello from sudo_intercept.so ctor. */ /* Re-use event to read ClientHello from sudo_intercept.so ctor. */
if (sudo_ev_set(&closure->ev, fd, SUDO_EV_READ, intercept_cb, closure) == -1) { if (sudo_ev_set(&closure->ev, fd, SUDO_EV_READ|SUDO_EV_PERSIST, intercept_cb, closure) == -1) {
/* This cannot (currently) fail. */ /* This cannot (currently) fail. */
sudo_warn("%s", U_("unable to add event to queue")); sudo_warn("%s", U_("unable to add event to queue"));
goto done; goto done;