ITS#4893 back to pipes...

This commit is contained in:
Howard Chu 2007-03-26 12:44:11 +00:00
parent 867fb2fd9f
commit c49812bf6f
2 changed files with 51 additions and 43 deletions

View file

@ -182,12 +182,15 @@ ldap_pvt_connect(LDAP *ld, ber_socket_t s, struct sockaddr_un *sa, int async)
#ifdef LDAP_PF_LOCAL_SENDMSG
/* Send a dummy message with access rights. Remote side will
* obtain our uid/gid by fstat'ing this descriptor.
* obtain our uid/gid by fstat'ing this descriptor. The
* descriptor permissions must match exactly, and we also
* send the socket name, which must also match.
*/
sendcred:
{
fchmod( s, S_ISUID|S_IRWXU );
int fds[2];
socklen_t salen = sizeof(*sa);
if (pipe(fds) == 0) {
/* Abandon, noop, has no reply */
struct iovec iov;
struct msghdr msg = {0};
@ -220,16 +223,22 @@ sendcred:
cmsg->cmsg_level = SOL_SOCKET;
cmsg->cmsg_type = SCM_RIGHTS;
*((int *)CMSG_DATA(cmsg)) = s;
*((int *)CMSG_DATA(cmsg)) = fds[0];
# else
msg.msg_accrights = (char *)&s;
msg.msg_accrights = (char *)fds;
msg.msg_accrightslen = sizeof(int);
# endif /* HAVE_STRUCT_MSGHDR_MSG_CONTROL */
getpeername( s, sa, &salen );
fchmod( fds[0], S_ISUID|S_IRWXU );
write( fds[1], sa, salen );
sendmsg( s, &msg, 0 );
close(fds[0]);
close(fds[1]);
}
}
#endif
return 0;
}
}
if ( errno != EINPROGRESS && errno != EWOULDBLOCK ) return -1;

View file

@ -108,15 +108,15 @@ int lutil_getpeereid( int s, uid_t *euid, gid_t *egid
rlen = sizeof(rname);
llen = sizeof(lname);
memset( &lname, 0, sizeof( lname ));
getsockname(s, (struct sockaddr *)&lname, &llen);
msg.msg_name = NULL;
msg.msg_namelen = 0;
iov.iov_base = peerbv->bv_val;
iov.iov_len = peerbv->bv_len;
msg.msg_iov = &iov;
msg.msg_iovlen = 1;
peerbv->bv_len = 0;
# ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
msg.msg_control = &control_st;
msg.msg_controllen = sizeof( struct cmsghdr ) + sizeof( int ); /* no padding! */
@ -132,8 +132,8 @@ int lutil_getpeereid( int s, uid_t *euid, gid_t *egid
* called with MSG_PEEK (is this a bug?). Hence we need
* to receive the Abandon PDU.
*/
peerbv->bv_len = recvmsg( s, &msg, MSG_WAITALL );
if( peerbv->bv_len >= 0 &&
err = recvmsg( s, &msg, MSG_WAITALL );
if( err >= 0 &&
# ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
cmsg->cmsg_len == CMSG_LEN( sizeof(int) ) &&
cmsg->cmsg_level == SOL_SOCKET &&
@ -142,18 +142,19 @@ int lutil_getpeereid( int s, uid_t *euid, gid_t *egid
msg.msg_accrightslen == sizeof(int)
# endif /* HAVE_STRUCT_MSGHDR_MSG_CONTROL*/
) {
int mode = S_IFSOCK|S_ISUID|S_IRWXU;
int mode = S_IFIFO|S_ISUID|S_IRWXU;
/* We must receive a valid descriptor, it must be a socket,
* it must only be accessible by its owner, and it must be
* connected to our socket.
/* We must receive a valid descriptor, it must be a pipe,
* it must only be accessible by its owner, and it must
* have the name of our socket written on it.
*/
peerbv->bv_len = err;
# ifdef HAVE_STRUCT_MSGHDR_MSG_CONTROL
fd = (*(int *)CMSG_DATA( cmsg ));
# endif
err = fstat( fd, &st );
if ( err == 0 )
err = getpeername(fd, (struct sockaddr *)&rname, &rlen);
rlen = read(fd, &rname, rlen);
close(fd);
if( err == 0 && st.st_mode == mode &&
llen == rlen && !memcmp(&lname, &rname, llen))
@ -162,8 +163,6 @@ int lutil_getpeereid( int s, uid_t *euid, gid_t *egid
*egid = st.st_gid;
return 0;
}
} else if ( peerbv->bv_len < 0 ) {
peerbv->bv_len = 0;
}
#elif defined(SOCKCREDSIZE)
struct msghdr msg;