Accepting request 634947 from home:pluskalm:branches:security
- Update to version 1.9.4: * Avoid misleading message if cmd socket is in use * Implements a command mode and use it for chroot - Drop upstreamed patches: * change-sysroot.patch - Update project and download url's OBS-URL: https://build.opensuse.org/request/show/634947 OBS-URL: https://build.opensuse.org/package/show/security/haveged?expand=0&rev=120
This commit is contained in:
parent
6bdf774b77
commit
564e22aadf
@ -1,676 +0,0 @@
|
||||
---
|
||||
nist/nist.c | 10 -
|
||||
src/haveged.c | 503 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++--
|
||||
src/haveged.h | 2
|
||||
3 files changed, 501 insertions(+), 14 deletions(-)
|
||||
|
||||
--- nist/nist.c
|
||||
+++ nist/nist.c 2018-07-02 13:55:06.644166819 +0000
|
||||
@@ -11,11 +11,11 @@
|
||||
|
||||
|
||||
static int random_pool1 [_32MB];
|
||||
-char basename[FILENAME_MAX+1];
|
||||
+char mybasename[FILENAME_MAX+1];
|
||||
|
||||
char *GetBaseDir(void)
|
||||
{
|
||||
- return basename;
|
||||
+ return mybasename;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
@@ -31,10 +31,10 @@ long result=0;
|
||||
/**
|
||||
* get optional directory name
|
||||
*/
|
||||
- basename[0] = 0;
|
||||
+ mybasename[0] = 0;
|
||||
if (argc>2) {
|
||||
- strcat(basename, argv[2]);
|
||||
- strcat(basename, "/");
|
||||
+ strcat(mybasename, argv[2]);
|
||||
+ strcat(mybasename, "/");
|
||||
}
|
||||
|
||||
filename = argv[1];
|
||||
--- src/haveged.c
|
||||
+++ src/haveged.c 2018-07-12 12:10:51.341352610 +0000
|
||||
@@ -32,9 +32,26 @@
|
||||
#include <syslog.h>
|
||||
#include <sys/ioctl.h>
|
||||
#include <asm/types.h>
|
||||
+#include <sys/types.h>
|
||||
+#include <sys/stat.h>
|
||||
#include <linux/random.h>
|
||||
#endif
|
||||
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+#include <sys/socket.h>
|
||||
+#include <sys/un.h>
|
||||
+#include <limits.h>
|
||||
+#define HAVEGED_SOCKET_PATH "\0/sys/entropy/haveged"
|
||||
+static int cmd_listen(void);
|
||||
+static int cmd_connect(void);
|
||||
+static int getcmd(char *arg);
|
||||
+static int socket_handler(int fd, const volatile char *path, char *const argv[]);
|
||||
+static int socket_fd;
|
||||
+#define MAGIC_CHROOT 'R'
|
||||
+static ssize_t safein(int fd, void *ptr, size_t sz);
|
||||
+static void safeout(int fd, const void *ptr, size_t len);
|
||||
+#endif
|
||||
+
|
||||
#include <errno.h>
|
||||
#include "haveged.h"
|
||||
#include "havegecollect.h"
|
||||
@@ -67,7 +84,8 @@ static struct pparams defaults = {
|
||||
.sample_in = INPUT_DEFAULT,
|
||||
.sample_out = OUTPUT_DEFAULT,
|
||||
.verbose = 0,
|
||||
- .watermark = "/proc/sys/kernel/random/write_wakeup_threshold"
|
||||
+ .watermark = "/proc/sys/kernel/random/write_wakeup_threshold",
|
||||
+ .command = 0,
|
||||
};
|
||||
struct pparams *params = &defaults;
|
||||
|
||||
@@ -90,8 +108,9 @@ static H_UINT poolSize = 0;
|
||||
|
||||
static void daemonize(void);
|
||||
static int get_poolsize(void);
|
||||
-static void run_daemon(H_PTR handle);
|
||||
+static void run_daemon(H_PTR handle, const volatile char *path, char *const argv[]);
|
||||
static void set_watermark(int level);
|
||||
+static void new_root(const char *root, const volatile char *path, char *const argv[]);
|
||||
#endif
|
||||
|
||||
static void anchor_info(H_PTR h);
|
||||
@@ -105,14 +124,21 @@ static void show_meterInfo(H_UINT id, H_
|
||||
static void tidy_exit(int signum);
|
||||
static void usage(int db, int nopts, struct option *long_options, const char **cmds);
|
||||
|
||||
+static sigset_t mask, omask;
|
||||
+
|
||||
#define ATOU(a) (unsigned int)atoi(a)
|
||||
/**
|
||||
* Entry point
|
||||
*/
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
+ volatile char *path = strdup(argv[0]);
|
||||
+ volatile char *arg0 = argv[0];
|
||||
static const char* cmds[] = {
|
||||
"b", "buffer", "1", SETTINGR("Buffer size [KW], default: ",COLLECT_BUFSIZE),
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+ "c", "command", "1", "Send a command mode to an already running heaveged",
|
||||
+#endif
|
||||
"d", "data", "1", SETTINGR("Data cache size [KB], with fallback to: ", GENERIC_DCACHE ),
|
||||
"i", "inst", "1", SETTINGR("Instruction cache size [KB], with fallback to: ", GENERIC_ICACHE),
|
||||
"f", "file", "1", "Sample output file, default: '" OUTPUT_DEFAULT "', '-' for stdout",
|
||||
@@ -122,7 +148,9 @@ int main(int argc, char **argv)
|
||||
"o", "onlinetest", "1", "[t<x>][c<x>] x=[a[n][w]][b[w]] 't'ot, 'c'ontinuous, default: ta8b",
|
||||
"p", "pidfile", "1", "daemon pidfile, default: " PID_DEFAULT ,
|
||||
"s", "source", "1", "Injection source file, default: '" INPUT_DEFAULT "', '-' for stdin",
|
||||
+#if NUMBER_CORES>1
|
||||
"t", "threads", "1", "Number of threads",
|
||||
+#endif
|
||||
"v", "verbose", "1", "Verbose mask 0=none,1=summary,2=retries,4=timing,8=loop,16=code,32=test",
|
||||
"w", "write", "1", "Set write_wakeup_threshold [bits]",
|
||||
"h", "help", "0", "This help"
|
||||
@@ -157,11 +185,36 @@ int main(int argc, char **argv)
|
||||
#if NUMBER_CORES>1
|
||||
params->setup |= MULTI_CORE;
|
||||
#endif
|
||||
+
|
||||
+ if (access("/etc/initrd-release", F_OK) >= 0) {
|
||||
+ arg0[0] = '@';
|
||||
+ path[0] = '/';
|
||||
+ }
|
||||
+
|
||||
#ifdef SIGHUP
|
||||
signal(SIGHUP, tidy_exit);
|
||||
#endif
|
||||
signal(SIGINT, tidy_exit);
|
||||
signal(SIGTERM, tidy_exit);
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+ signal(SIGPIPE, SIG_IGN);
|
||||
+#endif
|
||||
+
|
||||
+ sigemptyset(&mask);
|
||||
+#ifdef SIGHUP
|
||||
+ sigaddset(&mask, SIGHUP);
|
||||
+#endif
|
||||
+ sigaddset(&mask, SIGINT);
|
||||
+ sigaddset(&mask, SIGTERM);
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+ sigaddset(&mask, SIGPIPE);
|
||||
+#endif
|
||||
+#if NUMBER_CORES>1
|
||||
+ /* Hmmm ... currently the code does not use pthread_create(3) but fork(2) */
|
||||
+ pthread_sigmask(SIG_UNBLOCK, &mask, NULL);
|
||||
+#else
|
||||
+ sigprocmask(SIG_UNBLOCK, &mask, NULL);
|
||||
+#endif
|
||||
strcpy(short_options,"");
|
||||
bufct = bufrem = 0;
|
||||
/**
|
||||
@@ -221,6 +274,12 @@ int main(int argc, char **argv)
|
||||
if (params->buffersz<4)
|
||||
error_exit("invalid size %s", optarg);
|
||||
break;
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+ case 'c':
|
||||
+ params->command = optarg;
|
||||
+ params->setup |= CMD_MODE;
|
||||
+ break;
|
||||
+#endif
|
||||
case 'd':
|
||||
params->d_cache = ATOU(optarg);
|
||||
break;
|
||||
@@ -272,6 +331,74 @@ int main(int argc, char **argv)
|
||||
break;
|
||||
}
|
||||
} while (c!=-1);
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+ if (params->setup & CMD_MODE) {
|
||||
+ int ret = 0, len;
|
||||
+ char *message = NULL, *ptr, answer[2], cmd[2];
|
||||
+ fd_set read_fd;
|
||||
+
|
||||
+ socket_fd = cmd_connect();
|
||||
+ if (socket_fd < 0) {
|
||||
+ ret = -1;
|
||||
+ goto err;
|
||||
+ }
|
||||
+ cmd[0] = getcmd(params->command);
|
||||
+ if (cmd[0] < 0) {
|
||||
+ ret = -1;
|
||||
+ goto err;
|
||||
+ }
|
||||
+ cmd[1] = '\0';
|
||||
+ switch (cmd[0]) {
|
||||
+ char *root;
|
||||
+ case MAGIC_CHROOT:
|
||||
+ root = optarg;
|
||||
+ len = (int)strlen(root);
|
||||
+ ret = asprintf(&message, "%c\002%c%s%n", cmd[0], (int)(strlen(root) + 1), root, &len);
|
||||
+ if (ret < 0) {
|
||||
+ fprintf(stderr, "%s: can not allocate message\n", params->daemon);
|
||||
+ break;
|
||||
+ }
|
||||
+ ptr = message;
|
||||
+ len += 1;
|
||||
+ safeout(socket_fd, message, len);
|
||||
+ break;
|
||||
+ case '?':
|
||||
+ default:
|
||||
+ ret = -1;
|
||||
+ break;
|
||||
+ }
|
||||
+ answer[0] = '\0';
|
||||
+ ptr = &answer[0];
|
||||
+ len = sizeof(answer);
|
||||
+
|
||||
+ FD_ZERO(&read_fd);
|
||||
+ FD_SET(socket_fd, &read_fd);
|
||||
+
|
||||
+ do {
|
||||
+ struct timeval two = {2, 0};
|
||||
+ ret = select(socket_fd+1, &read_fd, NULL, NULL, &two);
|
||||
+ if (ret >= 0) break;
|
||||
+ if (errno != EINTR)
|
||||
+ error_exit("Select error: %s", strerror(errno));
|
||||
+ }
|
||||
+ while (1);
|
||||
+
|
||||
+ ret = safein(socket_fd, ptr, len);
|
||||
+ close(socket_fd);
|
||||
+ if (ret < 0)
|
||||
+ goto err;
|
||||
+ if (answer[0] != '\x6')
|
||||
+ ret = -1;
|
||||
+ else
|
||||
+ ret = 0;
|
||||
+ err:
|
||||
+ return ret;
|
||||
+ }
|
||||
+ else {
|
||||
+ socket_fd = cmd_listen();
|
||||
+ fprintf(stderr, "%s: listening socket at %d\n", params->daemon, socket_fd);
|
||||
+ }
|
||||
+#endif
|
||||
if (params->tests_config == 0)
|
||||
params->tests_config = (0 != (params->setup & RUN_AS_APP))? TESTS_DEFAULT_APP : TESTS_DEFAULT_RUN;
|
||||
memset(&cmd, 0, sizeof(H_PARAMS));
|
||||
@@ -348,7 +475,7 @@ int main(int argc, char **argv)
|
||||
else run_app(handle, bufct, bufrem);
|
||||
}
|
||||
#ifndef NO_DAEMON
|
||||
- else run_daemon(handle);
|
||||
+ else run_daemon(handle, path, argv);
|
||||
#endif
|
||||
havege_destroy(handle);
|
||||
exit(0);
|
||||
@@ -405,9 +532,11 @@ static int get_poolsize( /* RETURN: nu
|
||||
* Run as a daemon writing to random device entropy pool
|
||||
*/
|
||||
static void run_daemon( /* RETURN: nothing */
|
||||
- H_PTR h) /* IN: app instance */
|
||||
+ H_PTR h, /* IN: app instance */
|
||||
+ const volatile char *path,
|
||||
+ char *const argv[])
|
||||
{
|
||||
- int random_fd = -1;
|
||||
+ int random_fd = -1, conn_fd = -1;
|
||||
struct rand_pool_info *output;
|
||||
|
||||
if (0 != params->run_level) {
|
||||
@@ -428,18 +557,56 @@ static void run_daemon( /* RETURN: no
|
||||
error_exit("Couldn't open random device: %s", strerror(errno));
|
||||
|
||||
output = (struct rand_pool_info *) h->io_buf;
|
||||
+
|
||||
+#if NUMBER_CORES>1
|
||||
+ /* Hmmm ... currently the code does not use pthread_create(3) but fork(2) */
|
||||
+ pthread_sigmask(SIG_BLOCK, &mask, &omask);
|
||||
+#else
|
||||
+ sigprocmask(SIG_BLOCK, &mask, &omask);
|
||||
+#endif
|
||||
for(;;) {
|
||||
- int current,nbytes,r;
|
||||
+ int current, nbytes, r, max = 0;
|
||||
+ fd_set read_fd, write_fd;
|
||||
+
|
||||
+ if (params->exit_code > 128)
|
||||
+ error_exit("Stopping due to signal %d\n", params->exit_code - 128);
|
||||
|
||||
- fd_set write_fd;
|
||||
FD_ZERO(&write_fd);
|
||||
+ FD_ZERO(&read_fd);
|
||||
FD_SET(random_fd, &write_fd);
|
||||
+ if (random_fd > max)
|
||||
+ max = random_fd;
|
||||
+ FD_SET(socket_fd, &read_fd);
|
||||
+ if (socket_fd > max)
|
||||
+ max = socket_fd;
|
||||
+ if (conn_fd >= 0) {
|
||||
+ FD_SET(conn_fd, &read_fd);
|
||||
+ if (conn_fd > max)
|
||||
+ max = conn_fd;
|
||||
+ }
|
||||
for(;;) {
|
||||
- int rc = select(random_fd+1, NULL, &write_fd, NULL, NULL);
|
||||
+ struct timespec two = {2, 0};
|
||||
+ int rc = pselect(max+1, &read_fd, &write_fd, NULL, &two, &omask);
|
||||
if (rc >= 0) break;
|
||||
+ if (params->exit_code > 128)
|
||||
+ break;
|
||||
if (errno != EINTR)
|
||||
error_exit("Select error: %s", strerror(errno));
|
||||
}
|
||||
+ if (params->exit_code > 128)
|
||||
+ continue;
|
||||
+
|
||||
+ if (FD_ISSET(socket_fd, &read_fd) && conn_fd < 0) {
|
||||
+ conn_fd = accept4(socket_fd, NULL, NULL, SOCK_CLOEXEC|SOCK_NONBLOCK);
|
||||
+ if (conn_fd >= 0)
|
||||
+ continue;
|
||||
+ }
|
||||
+ if (conn_fd >= 0 && FD_ISSET(conn_fd, &read_fd))
|
||||
+ conn_fd = socket_handler(conn_fd, path, argv);
|
||||
+
|
||||
+ if (!FD_ISSET(random_fd, &write_fd))
|
||||
+ continue;
|
||||
+
|
||||
if (ioctl(random_fd, RNDGETENTCNT, ¤t) == -1)
|
||||
error_exit("Couldn't query entropy-level from kernel");
|
||||
/* get number of bytes needed to fill pool */
|
||||
@@ -719,8 +886,8 @@ static void tidy_exit( /* OUT:
|
||||
int signum) /* IN: signal number */
|
||||
{
|
||||
params->exit_code = 128 + signum;
|
||||
- error_exit("Stopping due to signal %d\n", signum);
|
||||
}
|
||||
+
|
||||
/**
|
||||
* send usage display to stderr
|
||||
*/
|
||||
@@ -750,3 +917,321 @@ static void usage( /* OUT:
|
||||
fprintf(stderr, "\n");
|
||||
exit(1);
|
||||
}
|
||||
+
|
||||
+#ifndef NO_DAEMON
|
||||
+static void new_root(
|
||||
+ const char *root,
|
||||
+ const volatile char *path,
|
||||
+ char *const argv[])
|
||||
+{
|
||||
+ int ret;
|
||||
+
|
||||
+ fprintf(stderr, "%s: restart in new root: %s\n", params->daemon, root);
|
||||
+ ret = chdir(root);
|
||||
+ if (ret < 0) {
|
||||
+ if (errno != ENOENT)
|
||||
+ error_exit("can't change to working directory : %s", root);
|
||||
+ else
|
||||
+ fprintf(stderr, "%s: can't change to working directory : %s\n", params->daemon, root);
|
||||
+ }
|
||||
+ ret = chroot(".");
|
||||
+ if (ret < 0) {
|
||||
+ if (errno != ENOENT)
|
||||
+ error_exit("can't change root directory");
|
||||
+ else
|
||||
+ fprintf(stderr, "%s: can't change root directory\n", params->daemon);
|
||||
+ }
|
||||
+ ret = chdir("/");
|
||||
+ if (ret < 0) {
|
||||
+ if (errno != ENOENT)
|
||||
+ error_exit("can't change to working directory /");
|
||||
+ else
|
||||
+ fprintf(stderr, "%s: can't change to working directory /\n", params->daemon);
|
||||
+ }
|
||||
+ ret = execv((const char *)path, argv);
|
||||
+ if (ret < 0) {
|
||||
+ if (errno != ENOENT)
|
||||
+ error_exit("can't restart %s", path);
|
||||
+ else
|
||||
+ fprintf(stderr, "%s: can't restart %s\n", params->daemon, path);
|
||||
+ }
|
||||
+}
|
||||
+#endif
|
||||
+
|
||||
+#ifndef NO_COMMAND_MODE
|
||||
+/**
|
||||
+ * Open and listen on a UNIX socket to get command from there
|
||||
+ */
|
||||
+static int cmd_listen(void)
|
||||
+{
|
||||
+ struct sockaddr_un su = { /* The abstract UNIX socket of haveged */
|
||||
+ .sun_family = AF_UNIX,
|
||||
+ .sun_path = HAVEGED_SOCKET_PATH,
|
||||
+ };
|
||||
+ const int one = 1;
|
||||
+ int fd, ret;
|
||||
+
|
||||
+ fd = socket(PF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
||||
+ if (fd < 0) {
|
||||
+ fprintf(stderr, "%s: can not open UNIX socket\n", params->daemon);
|
||||
+ goto err;
|
||||
+ }
|
||||
+
|
||||
+ ret = setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &one, (socklen_t)sizeof(one));
|
||||
+ if (ret < 0) {
|
||||
+ close(fd);
|
||||
+ fd = -1;
|
||||
+ fprintf(stderr, "%s: can not set option for UNIX socket\n", params->daemon);
|
||||
+ goto err;
|
||||
+ }
|
||||
+
|
||||
+ ret = bind(fd, &su, offsetof(struct sockaddr_un, sun_path) + 1 + strlen(su.sun_path+1));
|
||||
+ if (ret < 0) {
|
||||
+ close(fd);
|
||||
+ fd = -1;
|
||||
+ if (errno != EADDRINUSE)
|
||||
+ fprintf(stderr, "%s: can not bind a name to UNIX socket\n", params->daemon);
|
||||
+ else
|
||||
+ fd = -2;
|
||||
+ goto err;
|
||||
+ }
|
||||
+
|
||||
+ ret = listen(fd, SOMAXCONN);
|
||||
+ if (ret < 0) {
|
||||
+ close(fd);
|
||||
+ fd = -1;
|
||||
+ fprintf(stderr, "%s: can not listen on UNIX socket\n", params->daemon);
|
||||
+ goto err;
|
||||
+ }
|
||||
+err:
|
||||
+ return fd;
|
||||
+}
|
||||
+
|
||||
+/**
|
||||
+ * Open and connect on a UNIX socket to send command over this
|
||||
+ */
|
||||
+static int cmd_connect(void)
|
||||
+{
|
||||
+ struct sockaddr_un su = { /* The abstract UNIX socket of haveged */
|
||||
+ .sun_family = AF_UNIX,
|
||||
+ .sun_path = HAVEGED_SOCKET_PATH,
|
||||
+ };
|
||||
+ const int one = 1;
|
||||
+ int fd, ret;
|
||||
+
|
||||
+ fd = socket(PF_UNIX, SOCK_STREAM|SOCK_CLOEXEC|SOCK_NONBLOCK, 0);
|
||||
+ if (fd < 0) {
|
||||
+ fprintf(stderr, "%s: can not open UNIX socket\n", params->daemon);
|
||||
+ goto err;
|
||||
+ }
|
||||
+
|
||||
+ ret = setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &one, (socklen_t)sizeof(one));
|
||||
+ if (ret < 0) {
|
||||
+ fprintf(stderr, "%s: can not set option for UNIX socket\n", params->daemon);
|
||||
+ close(fd);
|
||||
+ fd = -1;
|
||||
+ goto err;
|
||||
+ }
|
||||
+
|
||||
+ ret = connect(fd, &su, offsetof(struct sockaddr_un, sun_path) + 1 + strlen(su.sun_path+1));
|
||||
+ if (ret < 0) {
|
||||
+ if (errno != ECONNREFUSED)
|
||||
+ fprintf(stderr, "%s: can not connect on UNIX socket\n", params->daemon);
|
||||
+ close(fd);
|
||||
+ fd = -1;
|
||||
+ goto err;
|
||||
+ }
|
||||
+err:
|
||||
+ return fd;
|
||||
+}
|
||||
+
|
||||
+/**
|
||||
+ * Handle arguments in command mode
|
||||
+ */
|
||||
+static int getcmd(
|
||||
+ char *arg)
|
||||
+{
|
||||
+ static const struct {
|
||||
+ const char* cmd;
|
||||
+ const int req;
|
||||
+ const int arg;
|
||||
+ const char* opt;
|
||||
+ } cmds[] = {
|
||||
+ { "root=", MAGIC_CHROOT, 1, NULL }, /* New root */
|
||||
+ {}
|
||||
+ }, *cmd = cmds;
|
||||
+ int ret = -1;
|
||||
+
|
||||
+ if (!arg || !*arg)
|
||||
+ goto err;
|
||||
+
|
||||
+ optarg = NULL;
|
||||
+ for (; cmd->cmd; cmd++)
|
||||
+ if (cmd->arg) {
|
||||
+ if (strncmp(cmd->cmd, arg, strlen(cmd->cmd)) == 0) {
|
||||
+ optarg = strchr(arg, '=');
|
||||
+ optarg++;
|
||||
+ ret = cmd->req;
|
||||
+ break;
|
||||
+ }
|
||||
+ }
|
||||
+ else {
|
||||
+ if (strcmp(cmd->cmd, arg) == 0) {
|
||||
+ ret = cmd->req;
|
||||
+ break;
|
||||
+ }
|
||||
+ }
|
||||
+err:
|
||||
+ return ret;
|
||||
+}
|
||||
+
|
||||
+/**
|
||||
+ * Handle incomming messages from socket
|
||||
+ */
|
||||
+static int socket_handler(
|
||||
+ int fd,
|
||||
+ const volatile char *path,
|
||||
+ char *const argv[])
|
||||
+{
|
||||
+ struct ucred cred = {};
|
||||
+ unsigned char magic[2], *ptr;
|
||||
+ char *enqry;
|
||||
+ char *optarg = NULL;
|
||||
+ socklen_t clen;
|
||||
+ int ret = -1, len;
|
||||
+
|
||||
+ if (fd < 0) {
|
||||
+ fprintf(stderr, "%s: no connection jet\n", params->daemon);
|
||||
+ }
|
||||
+
|
||||
+ ptr = &magic[0];
|
||||
+ len = sizeof(magic);
|
||||
+ ret = safein(fd, ptr, len);
|
||||
+
|
||||
+ if (magic[1] == '\002') { /* read argument provided */
|
||||
+ unsigned char alen;
|
||||
+
|
||||
+ ret = safein(fd, &alen, sizeof(unsigned char));
|
||||
+
|
||||
+ optarg = calloc(alen, sizeof(char));
|
||||
+ if (!optarg)
|
||||
+ error_exit("can not allocate memory for message from UNUX socket");
|
||||
+
|
||||
+ ptr = (unsigned char*)optarg;
|
||||
+ len = alen;
|
||||
+ ret = safein(fd, ptr, len);
|
||||
+ }
|
||||
+
|
||||
+ clen = sizeof(struct ucred);
|
||||
+ ret = getsockopt(fd, SOL_SOCKET, SO_PEERCRED, &cred, &clen);
|
||||
+ if (ret < 0) {
|
||||
+ fprintf(stderr, "%s: can not get credentials from UNIX socket part1\n", params->daemon);
|
||||
+ goto out;
|
||||
+ }
|
||||
+ if (clen != sizeof(struct ucred)) {
|
||||
+ fprintf(stderr, "%s: can not get credentials from UNIX socket part2\n", params->daemon);
|
||||
+ goto out;
|
||||
+ }
|
||||
+ if (cred.uid != 0) {
|
||||
+ enqry = "\x15";
|
||||
+
|
||||
+ ptr = (unsigned char *)enqry;
|
||||
+ len = (int)strlen(enqry)+1;
|
||||
+ safeout(fd, ptr, len);
|
||||
+ }
|
||||
+
|
||||
+ switch (magic[0]) {
|
||||
+ case MAGIC_CHROOT:
|
||||
+ enqry = "\x6";
|
||||
+
|
||||
+ ptr = (unsigned char *)enqry;
|
||||
+ len = (int)strlen(enqry)+1;
|
||||
+ safeout(fd, ptr, len);
|
||||
+
|
||||
+ new_root(optarg, path, argv);
|
||||
+ break;
|
||||
+ default:
|
||||
+ enqry = "\x15";
|
||||
+
|
||||
+ ptr = (unsigned char *)enqry;
|
||||
+ len = (int)strlen(enqry)+1;
|
||||
+ safeout(fd, ptr, len);
|
||||
+ break;
|
||||
+ }
|
||||
+out:
|
||||
+ if (fd > 0) {
|
||||
+ close(fd);
|
||||
+ fd = -1;
|
||||
+ }
|
||||
+ return fd;
|
||||
+}
|
||||
+
|
||||
+/**
|
||||
+ * Receive incomming messages from socket
|
||||
+ */
|
||||
+static ssize_t safein(
|
||||
+ int fd,
|
||||
+ void *ptr,
|
||||
+ size_t sz)
|
||||
+{
|
||||
+ int saveerr = errno, t;
|
||||
+ ssize_t ret = 0;
|
||||
+ size_t len;
|
||||
+
|
||||
+ if (sz > SSIZE_MAX)
|
||||
+ sz = SSIZE_MAX;
|
||||
+
|
||||
+ t = 0;
|
||||
+ if ((ioctl(fd, FIONREAD, &t) < 0) || (t <= 0))
|
||||
+ goto out;
|
||||
+
|
||||
+ len = (size_t)t;
|
||||
+ if (len > sz)
|
||||
+ len = sz;
|
||||
+
|
||||
+ do {
|
||||
+ ssize_t p = recv(fd, ptr, len, MSG_DONTWAIT);
|
||||
+ if (p < 0) {
|
||||
+ if (errno == EINTR)
|
||||
+ continue;
|
||||
+ if (errno == EAGAIN || errno == EWOULDBLOCK)
|
||||
+ break;
|
||||
+ error_exit("Unable to read from socket: %d", socket_fd);
|
||||
+ }
|
||||
+ ptr += p;
|
||||
+ ret += p;
|
||||
+ len -= p;
|
||||
+ }
|
||||
+ while (len > 0);
|
||||
+out:
|
||||
+ errno = saveerr;
|
||||
+ return ret;
|
||||
+}
|
||||
+
|
||||
+/**
|
||||
+ * Send outgoing messages to socket
|
||||
+ */
|
||||
+static void safeout(
|
||||
+ int fd,
|
||||
+ const void *ptr,
|
||||
+ size_t len)
|
||||
+{
|
||||
+ int saveerr = errno;
|
||||
+
|
||||
+ do {
|
||||
+ ssize_t p = send(fd, ptr, len, MSG_NOSIGNAL);
|
||||
+ if (p < 0) {
|
||||
+ if (errno == EINTR)
|
||||
+ continue;
|
||||
+ if (errno == EPIPE || errno == EAGAIN || errno == EWOULDBLOCK)
|
||||
+ break;
|
||||
+ error_exit("Unable to write to socket: %d", fd);
|
||||
+ }
|
||||
+ ptr += p;
|
||||
+ len -= p;
|
||||
+ }
|
||||
+ while (len > 0);
|
||||
+
|
||||
+ errno = saveerr;
|
||||
+}
|
||||
+#endif
|
||||
--- src/haveged.h
|
||||
+++ src/haveged.h 2018-07-02 13:33:12.944114136 +0000
|
||||
@@ -45,6 +45,7 @@ struct pparams {
|
||||
H_UINT verbose; /* Output level for log or stdout */
|
||||
char *version; /* Our version */
|
||||
char *watermark; /* path to write_wakeup_threshold */
|
||||
+ char *command; /* command which will send/received */
|
||||
};
|
||||
/**
|
||||
* Buffer size used when not running as daemon
|
||||
@@ -64,6 +65,7 @@ struct pparams {
|
||||
#define RUN_IN_FG 0x020
|
||||
#define SET_LWM 0x040
|
||||
#define MULTI_CORE 0x080
|
||||
+#define CMD_MODE 0x100
|
||||
/**
|
||||
* Default tests settings
|
||||
*/
|
@ -1,3 +0,0 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:f77d9adbdf421b61601fa29faa9ce3b479d910f73c66b9e364ba8642ccbfbe70
|
||||
size 494682
|
3
haveged-1.9.4.tar.gz
Normal file
3
haveged-1.9.4.tar.gz
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:c4959d3cb1fa6391d16a3aa1ba4d82cd3a0d497206ae4b87d638088c0664e5aa
|
||||
size 493215
|
@ -1,3 +1,13 @@
|
||||
-------------------------------------------------------------------
|
||||
Tue Sep 11 11:00:13 UTC 2018 - Martin Pluskal <mpluskal@suse.com>
|
||||
|
||||
- Update to version 1.9.4:
|
||||
* Avoid misleading message if cmd socket is in use
|
||||
* Implements a command mode and use it for chroot
|
||||
- Drop upstreamed patches:
|
||||
* change-sysroot.patch
|
||||
- Update project and download url's
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Jul 2 13:37:19 UTC 2018 - werner@suse.de
|
||||
|
||||
|
29
haveged.spec
29
haveged.spec
@ -12,19 +12,19 @@
|
||||
# license that conforms to the Open Source Definition (Version 1.9)
|
||||
# published by the Open Source Initiative.
|
||||
|
||||
# Please submit bugfixes or comments via http://bugs.opensuse.org/
|
||||
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
||||
#
|
||||
|
||||
|
||||
%{!?_udevrulesdir: %global _udevrulesdir %(pkg-config --variable=udevdir udev)/rules.d }
|
||||
Name: haveged
|
||||
Version: 1.9.2
|
||||
Version: 1.9.4
|
||||
Release: 0
|
||||
Summary: Feed entropy into random pool
|
||||
License: GPL-3.0-only
|
||||
Group: System/Daemons
|
||||
Url: http://www.issihosts.com/haveged/
|
||||
Source0: http://www.issihosts.com/haveged/%{name}-%{version}.tar.gz
|
||||
URL: https://github.com/jirka-h/haveged
|
||||
Source0: https://github.com/jirka-h/haveged/archive/%{version}.tar.gz#/%{name}-%{version}.tar.gz
|
||||
Source2: %{name}.service
|
||||
Source3: 90-haveged.rules
|
||||
Source4: haveged-dracut.module
|
||||
@ -34,7 +34,6 @@ Patch0: ppc64le.patch
|
||||
Patch1: haveged-conditional-enttest.patch
|
||||
# PATCH-FIX-UPSTREAM: don't write to syslog at startup to avoid deadlocks psimons@suse.com bnc#959237
|
||||
Patch2: haveged-no-syslog.patch
|
||||
Patch3: change-sysroot.patch
|
||||
BuildRequires: autoconf
|
||||
BuildRequires: automake
|
||||
BuildRequires: libtool
|
||||
@ -83,7 +82,6 @@ algorithm and supporting features.
|
||||
%patch0 -p1
|
||||
%patch1 -p1
|
||||
%patch2 -p1
|
||||
%patch3 -p0
|
||||
|
||||
%build
|
||||
autoreconf -fvi
|
||||
@ -110,15 +108,17 @@ make %{?_smp_mflags} check
|
||||
|
||||
%install
|
||||
%make_install
|
||||
install -D -m0644 %{SOURCE2} %{buildroot}%{_unitdir}/%{name}.service
|
||||
install -D -m0644 %{SOURCE3} %{buildroot}%{_udevrulesdir}/90-%{name}.rules
|
||||
install -D -m0644 %{SOURCE5} %{buildroot}%{_unitdir}/%{name}-switch-root.service
|
||||
install -Dpm 0644 %{SOURCE2} \
|
||||
%{buildroot}%{_unitdir}/%{name}.service
|
||||
install -Dpm 0644 %{SOURCE3} \
|
||||
%{buildroot}%{_udevrulesdir}/90-%{name}.rules
|
||||
install -Dpm 0644 %{SOURCE5} \
|
||||
%{buildroot}%{_unitdir}/%{name}-switch-root.service
|
||||
install -Dpm 0755 %{SOURCE4} \
|
||||
%{buildroot}%{_prefix}/lib/dracut/modules.d/98%{name}/module-setup.sh
|
||||
rm -f %{buildroot}%{_libdir}/libhavege.*a
|
||||
ln -s %{_sbindir}/service %{buildroot}%{_sbindir}/rc%{name}
|
||||
|
||||
install -d -m0755 %{buildroot}%{_prefix}/lib/dracut/modules.d/98%{name}
|
||||
install -m0755 %{SOURCE4} %{buildroot}%{_prefix}/lib/dracut/modules.d/98%{name}/module-setup.sh
|
||||
|
||||
%post
|
||||
%{?udev_rules_update:%udev_rules_update}
|
||||
%service_add_post %{name}.service
|
||||
@ -148,7 +148,7 @@ install -m0755 %{SOURCE4} %{buildroot}%{_prefix}/lib/dracut/modules.d/98%{name}/
|
||||
%license COPYING
|
||||
%{_sbindir}/rc%{name}
|
||||
%{_sbindir}/%{name}
|
||||
%{_mandir}/man8/%{name}.8%{ext_man}
|
||||
%{_mandir}/man8/%{name}.8%{?ext_man}
|
||||
%{_unitdir}/%{name}.service
|
||||
%{_unitdir}/%{name}-switch-root.service
|
||||
%{_udevrulesdir}/90-%{name}.rules
|
||||
@ -159,9 +159,10 @@ install -m0755 %{SOURCE4} %{buildroot}%{_prefix}/lib/dracut/modules.d/98%{name}/
|
||||
|
||||
%files devel
|
||||
%license COPYING
|
||||
%{_mandir}/man3/libhavege.3%{ext_man}
|
||||
%{_mandir}/man3/libhavege.3%{?ext_man}
|
||||
%dir %{_includedir}/%{name}
|
||||
%{_includedir}/%{name}/havege.h
|
||||
%{_includedir}/%{name}/havegecmd.h
|
||||
%doc contrib/build/havege_sample.c
|
||||
%{_libdir}/*.so
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user