1 /* 2 * Copyright (c) 2001-2003 3 * Fraunhofer Institute for Open Communication Systems (FhG Fokus). 4 * All rights reserved. 5 * 6 * Author: Harti Brandt <harti@freebsd.org> 7 * 8 * Copyright (c) 2010 The FreeBSD Foundation 9 * All rights reserved. 10 * 11 * Portions of this software were developed by Shteryana Sotirova Shopova 12 * under sponsorship from the FreeBSD Foundation. 13 * 14 * Redistribution and use in source and binary forms, with or without 15 * modification, are permitted provided that the following conditions 16 * are met: 17 * 1. Redistributions of source code must retain the above copyright 18 * notice, this list of conditions and the following disclaimer. 19 * 2. Redistributions in binary form must reproduce the above copyright 20 * notice, this list of conditions and the following disclaimer in the 21 * documentation and/or other materials provided with the distribution. 22 * 23 * THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND 24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26 * ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE 27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33 * SUCH DAMAGE. 34 * 35 * $Begemot: bsnmp/snmpd/trap.c,v 1.9 2005/10/04 11:21:39 brandt_h Exp $ 36 * 37 * TrapSinkTable 38 */ 39 #include <sys/types.h> 40 #include <sys/queue.h> 41 #include <sys/sysctl.h> 42 #include <sys/un.h> 43 #include <stdint.h> 44 #include <stdio.h> 45 #include <stdlib.h> 46 #include <stdarg.h> 47 #include <stdarg.h> 48 #include <string.h> 49 #include <ctype.h> 50 #include <syslog.h> 51 #include <unistd.h> 52 #include <netinet/in.h> 53 #include <arpa/inet.h> 54 55 #include "snmpmod.h" 56 #include "snmpd.h" 57 #include "tree.h" 58 #include "oid.h" 59 60 struct trapsink_list trapsink_list = TAILQ_HEAD_INITIALIZER(trapsink_list); 61 62 /* List of target addresses */ 63 static struct target_addresslist target_addresslist = 64 SLIST_HEAD_INITIALIZER(target_addresslist); 65 66 /* List of target parameters */ 67 static struct target_paramlist target_paramlist = 68 SLIST_HEAD_INITIALIZER(target_paramlist); 69 70 /* List of notification targets */ 71 static struct target_notifylist target_notifylist = 72 SLIST_HEAD_INITIALIZER(target_notifylist); 73 74 static const struct asn_oid oid_begemotTrapSinkTable = 75 OIDX_begemotTrapSinkTable; 76 static const struct asn_oid oid_sysUpTime = OIDX_sysUpTime; 77 static const struct asn_oid oid_snmpTrapOID = OIDX_snmpTrapOID; 78 79 struct trapsink_dep { 80 struct snmp_dependency dep; 81 u_int set; 82 u_int status; 83 u_char comm[SNMP_COMMUNITY_MAXLEN + 1]; 84 u_int version; 85 u_int rb; 86 u_int rb_status; 87 u_int rb_version; 88 u_char rb_comm[SNMP_COMMUNITY_MAXLEN + 1]; 89 }; 90 enum { 91 TDEP_STATUS = 0x0001, 92 TDEP_COMM = 0x0002, 93 TDEP_VERSION = 0x0004, 94 95 TDEP_CREATE = 0x0001, 96 TDEP_MODIFY = 0x0002, 97 TDEP_DESTROY = 0x0004, 98 }; 99 100 static int 101 trapsink_create(struct trapsink_dep *tdep) 102 { 103 struct trapsink *t; 104 struct sockaddr_in sa; 105 106 if ((t = malloc(sizeof(*t))) == NULL) 107 return (SNMP_ERR_RES_UNAVAIL); 108 109 t->index = tdep->dep.idx; 110 t->status = TRAPSINK_NOT_READY; 111 t->comm[0] = '\0'; 112 t->version = TRAPSINK_V2; 113 114 if ((t->socket = socket(PF_INET, SOCK_DGRAM, 0)) == -1) { 115 syslog(LOG_ERR, "socket(UDP): %m"); 116 free(t); 117 return (SNMP_ERR_RES_UNAVAIL); 118 } 119 (void)shutdown(t->socket, SHUT_RD); 120 memset(&sa, 0, sizeof(sa)); 121 sa.sin_len = sizeof(sa); 122 sa.sin_family = AF_INET; 123 sa.sin_addr.s_addr = htonl((t->index.subs[0] << 24) | 124 (t->index.subs[1] << 16) | (t->index.subs[2] << 8) | 125 (t->index.subs[3] << 0)); 126 sa.sin_port = htons(t->index.subs[4]); 127 128 if (connect(t->socket, (struct sockaddr *)&sa, sa.sin_len) == -1) { 129 syslog(LOG_ERR, "connect(%s,%u): %m", 130 inet_ntoa(sa.sin_addr), ntohs(sa.sin_port)); 131 (void)close(t->socket); 132 free(t); 133 return (SNMP_ERR_GENERR); 134 } 135 136 if (tdep->set & TDEP_VERSION) 137 t->version = tdep->version; 138 if (tdep->set & TDEP_COMM) 139 strcpy(t->comm, tdep->comm); 140 141 if (t->comm[0] != '\0') 142 t->status = TRAPSINK_NOT_IN_SERVICE; 143 144 /* look whether we should activate */ 145 if (tdep->status == 4) { 146 if (t->status == TRAPSINK_NOT_READY) { 147 if (t->socket != -1) 148 (void)close(t->socket); 149 free(t); 150 return (SNMP_ERR_INCONS_VALUE); 151 } 152 t->status = TRAPSINK_ACTIVE; 153 } 154 155 INSERT_OBJECT_OID(t, &trapsink_list); 156 157 tdep->rb |= TDEP_CREATE; 158 159 return (SNMP_ERR_NOERROR); 160 } 161 162 static void 163 trapsink_free(struct trapsink *t) 164 { 165 TAILQ_REMOVE(&trapsink_list, t, link); 166 if (t->socket != -1) 167 (void)close(t->socket); 168 free(t); 169 } 170 171 static int 172 trapsink_modify(struct trapsink *t, struct trapsink_dep *tdep) 173 { 174 tdep->rb_status = t->status; 175 tdep->rb_version = t->version; 176 strcpy(tdep->rb_comm, t->comm); 177 178 if (tdep->set & TDEP_STATUS) { 179 /* if we are active and should move to not_in_service do 180 * this first */ 181 if (tdep->status == 2 && tdep->rb_status == TRAPSINK_ACTIVE) { 182 t->status = TRAPSINK_NOT_IN_SERVICE; 183 tdep->rb |= TDEP_MODIFY; 184 } 185 } 186 187 if (tdep->set & TDEP_VERSION) 188 t->version = tdep->version; 189 if (tdep->set & TDEP_COMM) 190 strcpy(t->comm, tdep->comm); 191 192 if (tdep->set & TDEP_STATUS) { 193 /* if we were inactive and should go active - do this now */ 194 if (tdep->status == 1 && tdep->rb_status != TRAPSINK_ACTIVE) { 195 if (t->comm[0] == '\0') { 196 t->status = tdep->rb_status; 197 t->version = tdep->rb_version; 198 strcpy(t->comm, tdep->rb_comm); 199 return (SNMP_ERR_INCONS_VALUE); 200 } 201 t->status = TRAPSINK_ACTIVE; 202 tdep->rb |= TDEP_MODIFY; 203 } 204 } 205 return (SNMP_ERR_NOERROR); 206 } 207 208 static int 209 trapsink_unmodify(struct trapsink *t, struct trapsink_dep *tdep) 210 { 211 if (tdep->set & TDEP_STATUS) 212 t->status = tdep->rb_status; 213 if (tdep->set & TDEP_VERSION) 214 t->version = tdep->rb_version; 215 if (tdep->set & TDEP_COMM) 216 strcpy(t->comm, tdep->rb_comm); 217 218 return (SNMP_ERR_NOERROR); 219 } 220 221 static int 222 trapsink_destroy(struct snmp_context *ctx __unused, struct trapsink *t, 223 struct trapsink_dep *tdep) 224 { 225 t->status = TRAPSINK_DESTROY; 226 tdep->rb_status = t->status; 227 tdep->rb |= TDEP_DESTROY; 228 return (SNMP_ERR_NOERROR); 229 } 230 231 static int 232 trapsink_undestroy(struct trapsink *t, struct trapsink_dep *tdep) 233 { 234 t->status = tdep->rb_status; 235 return (SNMP_ERR_NOERROR); 236 } 237 238 static int 239 trapsink_dep(struct snmp_context *ctx, struct snmp_dependency *dep, 240 enum snmp_depop op) 241 { 242 struct trapsink_dep *tdep = (struct trapsink_dep *)dep; 243 struct trapsink *t; 244 245 t = FIND_OBJECT_OID(&trapsink_list, &dep->idx, 0); 246 247 switch (op) { 248 249 case SNMP_DEPOP_COMMIT: 250 if (tdep->set & TDEP_STATUS) { 251 switch (tdep->status) { 252 253 case 1: 254 case 2: 255 if (t == NULL) 256 return (SNMP_ERR_INCONS_VALUE); 257 return (trapsink_modify(t, tdep)); 258 259 case 4: 260 case 5: 261 if (t != NULL) 262 return (SNMP_ERR_INCONS_VALUE); 263 return (trapsink_create(tdep)); 264 265 case 6: 266 if (t == NULL) 267 return (SNMP_ERR_NOERROR); 268 return (trapsink_destroy(ctx, t, tdep)); 269 } 270 } else if (tdep->set != 0) 271 return (trapsink_modify(t, tdep)); 272 273 return (SNMP_ERR_NOERROR); 274 275 case SNMP_DEPOP_ROLLBACK: 276 if (tdep->rb & TDEP_CREATE) { 277 trapsink_free(t); 278 return (SNMP_ERR_NOERROR); 279 } 280 if (tdep->rb & TDEP_MODIFY) 281 return (trapsink_unmodify(t, tdep)); 282 if(tdep->rb & TDEP_DESTROY) 283 return (trapsink_undestroy(t, tdep)); 284 return (SNMP_ERR_NOERROR); 285 286 case SNMP_DEPOP_FINISH: 287 if ((tdep->rb & TDEP_DESTROY) && t != NULL && 288 ctx->code == SNMP_RET_OK) 289 trapsink_free(t); 290 return (SNMP_ERR_NOERROR); 291 } 292 abort(); 293 } 294 295 int 296 op_trapsink(struct snmp_context *ctx, struct snmp_value *value, 297 u_int sub, u_int iidx, enum snmp_op op) 298 { 299 struct trapsink *t; 300 u_char ipa[4]; 301 int32_t port; 302 struct asn_oid idx; 303 struct trapsink_dep *tdep; 304 u_char *p; 305 306 t = NULL; /* gcc */ 307 308 switch (op) { 309 310 case SNMP_OP_GETNEXT: 311 if ((t = NEXT_OBJECT_OID(&trapsink_list, &value->var, sub)) == NULL) 312 return (SNMP_ERR_NOSUCHNAME); 313 index_append(&value->var, sub, &t->index); 314 break; 315 316 case SNMP_OP_GET: 317 if ((t = FIND_OBJECT_OID(&trapsink_list, &value->var, sub)) == NULL) 318 return (SNMP_ERR_NOSUCHNAME); 319 break; 320 321 case SNMP_OP_SET: 322 if (index_decode(&value->var, sub, iidx, ipa, &port) || 323 port == 0 || port > 65535) 324 return (SNMP_ERR_NO_CREATION); 325 t = FIND_OBJECT_OID(&trapsink_list, &value->var, sub); 326 327 asn_slice_oid(&idx, &value->var, sub, value->var.len); 328 329 tdep = (struct trapsink_dep *)snmp_dep_lookup(ctx, 330 &oid_begemotTrapSinkTable, &idx, 331 sizeof(*tdep), trapsink_dep); 332 if (tdep == NULL) 333 return (SNMP_ERR_RES_UNAVAIL); 334 335 switch (value->var.subs[sub - 1]) { 336 337 case LEAF_begemotTrapSinkStatus: 338 if (tdep->set & TDEP_STATUS) 339 return (SNMP_ERR_INCONS_VALUE); 340 switch (value->v.integer) { 341 342 case 1: 343 case 2: 344 if (t == NULL) 345 return (SNMP_ERR_INCONS_VALUE); 346 break; 347 348 case 4: 349 case 5: 350 if (t != NULL) 351 return (SNMP_ERR_INCONS_VALUE); 352 break; 353 354 case 6: 355 break; 356 357 default: 358 return (SNMP_ERR_WRONG_VALUE); 359 } 360 tdep->status = value->v.integer; 361 tdep->set |= TDEP_STATUS; 362 return (SNMP_ERR_NOERROR); 363 364 case LEAF_begemotTrapSinkComm: 365 if (tdep->set & TDEP_COMM) 366 return (SNMP_ERR_INCONS_VALUE); 367 if (value->v.octetstring.len == 0 || 368 value->v.octetstring.len > SNMP_COMMUNITY_MAXLEN) 369 return (SNMP_ERR_WRONG_VALUE); 370 for (p = value->v.octetstring.octets; 371 p < value->v.octetstring.octets + value->v.octetstring.len; 372 p++) { 373 if (!isascii(*p) || !isprint(*p)) 374 return (SNMP_ERR_WRONG_VALUE); 375 } 376 tdep->set |= TDEP_COMM; 377 strncpy(tdep->comm, value->v.octetstring.octets, 378 value->v.octetstring.len); 379 tdep->comm[value->v.octetstring.len] = '\0'; 380 return (SNMP_ERR_NOERROR); 381 382 case LEAF_begemotTrapSinkVersion: 383 if (tdep->set & TDEP_VERSION) 384 return (SNMP_ERR_INCONS_VALUE); 385 if (value->v.integer != TRAPSINK_V1 && 386 value->v.integer != TRAPSINK_V2) 387 return (SNMP_ERR_WRONG_VALUE); 388 tdep->version = value->v.integer; 389 tdep->set |= TDEP_VERSION; 390 return (SNMP_ERR_NOERROR); 391 } 392 if (t == NULL) 393 return (SNMP_ERR_INCONS_NAME); 394 else 395 return (SNMP_ERR_NOT_WRITEABLE); 396 397 398 case SNMP_OP_ROLLBACK: 399 case SNMP_OP_COMMIT: 400 return (SNMP_ERR_NOERROR); 401 } 402 403 switch (value->var.subs[sub - 1]) { 404 405 case LEAF_begemotTrapSinkStatus: 406 value->v.integer = t->status; 407 break; 408 409 case LEAF_begemotTrapSinkComm: 410 return (string_get(value, t->comm, -1)); 411 412 case LEAF_begemotTrapSinkVersion: 413 value->v.integer = t->version; 414 break; 415 416 } 417 return (SNMP_ERR_NOERROR); 418 } 419 420 static void 421 snmp_create_v1_trap(struct snmp_pdu *pdu, char *com, 422 const struct asn_oid *trap_oid) 423 { 424 memset(pdu, 0, sizeof(*pdu)); 425 strcpy(pdu->community, com); 426 427 pdu->version = SNMP_V1; 428 pdu->type = SNMP_PDU_TRAP; 429 pdu->enterprise = systemg.object_id; 430 memcpy(pdu->agent_addr, snmpd.trap1addr, 4); 431 pdu->generic_trap = trap_oid->subs[trap_oid->len - 1] - 1; 432 pdu->specific_trap = 0; 433 pdu->time_stamp = get_ticks() - start_tick; 434 pdu->nbindings = 0; 435 } 436 437 static void 438 snmp_create_v2_trap(struct snmp_pdu *pdu, char *com, 439 const struct asn_oid *trap_oid) 440 { 441 memset(pdu, 0, sizeof(*pdu)); 442 strcpy(pdu->community, com); 443 444 pdu->version = SNMP_V2c; 445 pdu->type = SNMP_PDU_TRAP2; 446 pdu->request_id = reqid_next(trap_reqid); 447 pdu->error_index = 0; 448 pdu->error_status = SNMP_ERR_NOERROR; 449 450 pdu->bindings[0].var = oid_sysUpTime; 451 pdu->bindings[0].var.subs[pdu->bindings[0].var.len++] = 0; 452 pdu->bindings[0].syntax = SNMP_SYNTAX_TIMETICKS; 453 pdu->bindings[0].v.uint32 = get_ticks() - start_tick; 454 455 pdu->bindings[1].var = oid_snmpTrapOID; 456 pdu->bindings[1].var.subs[pdu->bindings[1].var.len++] = 0; 457 pdu->bindings[1].syntax = SNMP_SYNTAX_OID; 458 pdu->bindings[1].v.oid = *trap_oid; 459 460 pdu->nbindings = 2; 461 } 462 463 static void 464 snmp_create_v3_trap(struct snmp_pdu *pdu, struct target_param *target, 465 const struct asn_oid *trap_oid) 466 { 467 uint64_t etime; 468 struct usm_user *usmuser; 469 470 memset(pdu, 0, sizeof(*pdu)); 471 472 pdu->version = SNMP_V3; 473 pdu->type = SNMP_PDU_TRAP2; 474 pdu->request_id = reqid_next(trap_reqid); 475 pdu->error_index = 0; 476 pdu->error_status = SNMP_ERR_NOERROR; 477 478 pdu->bindings[0].var = oid_sysUpTime; 479 pdu->bindings[0].var.subs[pdu->bindings[0].var.len++] = 0; 480 pdu->bindings[0].syntax = SNMP_SYNTAX_TIMETICKS; 481 pdu->bindings[0].v.uint32 = get_ticks() - start_tick; 482 483 pdu->bindings[1].var = oid_snmpTrapOID; 484 pdu->bindings[1].var.subs[pdu->bindings[1].var.len++] = 0; 485 pdu->bindings[1].syntax = SNMP_SYNTAX_OID; 486 pdu->bindings[1].v.oid = *trap_oid; 487 488 pdu->nbindings = 2; 489 490 etime = (get_ticks() - start_tick) / 100ULL; 491 if (etime < INT32_MAX) 492 snmpd_engine.engine_time = etime; 493 else { 494 start_tick = get_ticks(); 495 set_snmpd_engine(); 496 snmpd_engine.engine_time = start_tick; 497 } 498 499 memcpy(pdu->engine.engine_id, snmpd_engine.engine_id, 500 snmpd_engine.engine_len); 501 pdu->engine.engine_len = snmpd_engine.engine_len; 502 pdu->engine.engine_boots = snmpd_engine.engine_boots; 503 pdu->engine.engine_time = snmpd_engine.engine_time; 504 pdu->engine.max_msg_size = snmpd_engine.max_msg_size; 505 strlcpy(pdu->user.sec_name, target->secname, 506 sizeof(pdu->user.sec_name)); 507 pdu->security_model = target->sec_model; 508 509 pdu->context_engine_len = snmpd_engine.engine_len; 510 memcpy(pdu->context_engine, snmpd_engine.engine_id, 511 snmpd_engine.engine_len); 512 513 if (target->sec_model == SNMP_SECMODEL_USM && 514 target->sec_level != SNMP_noAuthNoPriv) { 515 usmuser = usm_find_user(pdu->engine.engine_id, 516 pdu->engine.engine_len, pdu->user.sec_name); 517 if (usmuser != NULL) { 518 pdu->user.auth_proto = usmuser->suser.auth_proto; 519 pdu->user.priv_proto = usmuser->suser.priv_proto; 520 memcpy(pdu->user.auth_key, usmuser->suser.auth_key, 521 sizeof(pdu->user.auth_key)); 522 memcpy(pdu->user.priv_key, usmuser->suser.priv_key, 523 sizeof(pdu->user.priv_key)); 524 } 525 snmp_pdu_init_secparams(pdu); 526 } 527 } 528 529 void 530 snmp_send_trap(const struct asn_oid *trap_oid, ...) 531 { 532 struct snmp_pdu pdu; 533 struct trapsink *t; 534 const struct snmp_value *v; 535 struct target_notify *n; 536 struct target_address *ta; 537 struct target_param *tp; 538 539 va_list ap; 540 u_char *sndbuf; 541 char *tag; 542 size_t sndlen; 543 ssize_t len; 544 int32_t ip; 545 546 TAILQ_FOREACH(t, &trapsink_list, link) { 547 if (t->status != TRAPSINK_ACTIVE) 548 continue; 549 550 if (t->version == TRAPSINK_V1) 551 snmp_create_v1_trap(&pdu, t->comm, trap_oid); 552 else 553 snmp_create_v2_trap(&pdu, t->comm, trap_oid); 554 555 va_start(ap, trap_oid); 556 while ((v = va_arg(ap, const struct snmp_value *)) != NULL) 557 pdu.bindings[pdu.nbindings++] = *v; 558 va_end(ap); 559 560 if (snmp_pdu_auth_access(&pdu, &ip) != SNMP_CODE_OK) { 561 syslog(LOG_DEBUG, "send trap to %s failed: no access", 562 t->comm); 563 continue; 564 } 565 566 if ((sndbuf = buf_alloc(1)) == NULL) { 567 syslog(LOG_ERR, "trap send buffer: %m"); 568 return; 569 } 570 571 snmp_output(&pdu, sndbuf, &sndlen, "TRAP"); 572 573 if ((len = send(t->socket, sndbuf, sndlen, 0)) == -1) 574 syslog(LOG_ERR, "send: %m"); 575 else if ((size_t)len != sndlen) 576 syslog(LOG_ERR, "send: short write %zu/%zu", 577 sndlen, (size_t)len); 578 579 free(sndbuf); 580 } 581 582 SLIST_FOREACH(n, &target_notifylist, tn) { 583 if (n->status != RowStatus_active || n->taglist[0] == '\0') 584 continue; 585 586 SLIST_FOREACH(ta, &target_addresslist, ta) 587 if ((tag = strstr(ta->taglist, n->taglist)) != NULL && 588 (tag[strlen(n->taglist)] == ' ' || 589 tag[strlen(n->taglist)] == '\0' || 590 tag[strlen(n->taglist)] == '\t' || 591 tag[strlen(n->taglist)] == '\r' || 592 tag[strlen(n->taglist)] == '\n') && 593 ta->status == RowStatus_active) 594 break; 595 if (ta == NULL) 596 continue; 597 598 SLIST_FOREACH(tp, &target_paramlist, tp) 599 if (strcmp(tp->name, ta->paramname) == 0 && 600 tp->status == 1) 601 break; 602 if (tp == NULL) 603 continue; 604 605 switch (tp->mpmodel) { 606 case SNMP_MPM_SNMP_V1: 607 snmp_create_v1_trap(&pdu, tp->secname, trap_oid); 608 break; 609 610 case SNMP_MPM_SNMP_V2c: 611 snmp_create_v2_trap(&pdu, tp->secname, trap_oid); 612 break; 613 614 case SNMP_MPM_SNMP_V3: 615 snmp_create_v3_trap(&pdu, tp, trap_oid); 616 break; 617 618 default: 619 continue; 620 } 621 622 va_start(ap, trap_oid); 623 while ((v = va_arg(ap, const struct snmp_value *)) != NULL) 624 pdu.bindings[pdu.nbindings++] = *v; 625 va_end(ap); 626 627 if (snmp_pdu_auth_access(&pdu, &ip) != SNMP_CODE_OK) { 628 syslog(LOG_DEBUG, "send trap to %s failed: no access", 629 t->comm); 630 continue; 631 } 632 633 if ((sndbuf = buf_alloc(1)) == NULL) { 634 syslog(LOG_ERR, "trap send buffer: %m"); 635 return; 636 } 637 638 snmp_output(&pdu, sndbuf, &sndlen, "TRAP"); 639 640 if ((len = send(ta->socket, sndbuf, sndlen, 0)) == -1) 641 syslog(LOG_ERR, "send: %m"); 642 else if ((size_t)len != sndlen) 643 syslog(LOG_ERR, "send: short write %zu/%zu", 644 sndlen, (size_t)len); 645 646 free(sndbuf); 647 } 648 } 649 650 /* 651 * RFC 3413 SNMP Management Target MIB 652 */ 653 struct snmpd_target_stats * 654 bsnmpd_get_target_stats(void) 655 { 656 return (&snmpd_target_stats); 657 } 658 659 struct target_address * 660 target_first_address(void) 661 { 662 return (SLIST_FIRST(&target_addresslist)); 663 } 664 665 struct target_address * 666 target_next_address(struct target_address *addrs) 667 { 668 if (addrs == NULL) 669 return (NULL); 670 671 return (SLIST_NEXT(addrs, ta)); 672 } 673 674 struct target_address * 675 target_new_address(char *aname) 676 { 677 int cmp; 678 struct target_address *addrs, *temp, *prev; 679 680 SLIST_FOREACH(addrs, &target_addresslist, ta) 681 if (strcmp(aname, addrs->name) == 0) 682 return (NULL); 683 684 if ((addrs = (struct target_address *)malloc(sizeof(*addrs))) == NULL) 685 return (NULL); 686 687 memset(addrs, 0, sizeof(*addrs)); 688 strlcpy(addrs->name, aname, sizeof(addrs->name)); 689 addrs->timeout = 150; 690 addrs->retry = 3; /* XXX */ 691 692 if ((prev = SLIST_FIRST(&target_addresslist)) == NULL || 693 strcmp(aname, prev->name) < 0) { 694 SLIST_INSERT_HEAD(&target_addresslist, addrs, ta); 695 return (addrs); 696 } 697 698 SLIST_FOREACH(temp, &target_addresslist, ta) { 699 if ((cmp = strcmp(aname, temp->name)) <= 0) 700 break; 701 prev = temp; 702 } 703 704 if (temp == NULL || cmp < 0) 705 SLIST_INSERT_AFTER(prev, addrs, ta); 706 else if (cmp > 0) 707 SLIST_INSERT_AFTER(temp, addrs, ta); 708 else { 709 syslog(LOG_ERR, "Target address %s exists", addrs->name); 710 free(addrs); 711 return (NULL); 712 } 713 714 return (addrs); 715 } 716 717 int 718 target_activate_address(struct target_address *addrs) 719 { 720 struct sockaddr_in sa; 721 722 if ((addrs->socket = socket(PF_INET, SOCK_DGRAM, 0)) == -1) { 723 syslog(LOG_ERR, "socket(UDP): %m"); 724 return (SNMP_ERR_RES_UNAVAIL); 725 } 726 727 (void)shutdown(addrs->socket, SHUT_RD); 728 memset(&sa, 0, sizeof(sa)); 729 sa.sin_len = sizeof(sa); 730 sa.sin_family = AF_INET; 731 732 sa.sin_addr.s_addr = htonl((addrs->address[0] << 24) | 733 (addrs->address[1] << 16) | (addrs->address[2] << 8) | 734 (addrs->address[3] << 0)); 735 sa.sin_port = htons(addrs->address[4]) << 8 | 736 htons(addrs->address[5]) << 0; 737 738 if (connect(addrs->socket, (struct sockaddr *)&sa, sa.sin_len) == -1) { 739 syslog(LOG_ERR, "connect(%s,%u): %m", 740 inet_ntoa(sa.sin_addr), ntohs(sa.sin_port)); 741 (void)close(addrs->socket); 742 return (SNMP_ERR_GENERR); 743 } 744 745 addrs->status = RowStatus_active; 746 747 return (SNMP_ERR_NOERROR); 748 } 749 750 int 751 target_delete_address(struct target_address *addrs) 752 { 753 SLIST_REMOVE(&target_addresslist, addrs, target_address, ta); 754 if (addrs->status == RowStatus_active) 755 close(addrs->socket); 756 free(addrs); 757 758 return (0); 759 } 760 761 struct target_param * 762 target_first_param(void) 763 { 764 return (SLIST_FIRST(&target_paramlist)); 765 } 766 767 struct target_param * 768 target_next_param(struct target_param *param) 769 { 770 if (param == NULL) 771 return (NULL); 772 773 return (SLIST_NEXT(param, tp)); 774 } 775 776 struct target_param * 777 target_new_param(char *pname) 778 { 779 int cmp; 780 struct target_param *param, *temp, *prev; 781 782 SLIST_FOREACH(param, &target_paramlist, tp) 783 if (strcmp(pname, param->name) == 0) 784 return (NULL); 785 786 if ((param = (struct target_param *)malloc(sizeof(*param))) == NULL) 787 return (NULL); 788 789 memset(param, 0, sizeof(*param)); 790 strlcpy(param->name, pname, sizeof(param->name)); 791 792 if ((prev = SLIST_FIRST(&target_paramlist)) == NULL || 793 strcmp(pname, prev->name) < 0) { 794 SLIST_INSERT_HEAD(&target_paramlist, param, tp); 795 return (param); 796 } 797 798 SLIST_FOREACH(temp, &target_paramlist, tp) { 799 if ((cmp = strcmp(pname, temp->name)) <= 0) 800 break; 801 prev = temp; 802 } 803 804 if (temp == NULL || cmp < 0) 805 SLIST_INSERT_AFTER(prev, param, tp); 806 else if (cmp > 0) 807 SLIST_INSERT_AFTER(temp, param, tp); 808 else { 809 syslog(LOG_ERR, "Target parameter %s exists", param->name); 810 free(param); 811 return (NULL); 812 } 813 814 return (param); 815 } 816 817 int 818 target_delete_param(struct target_param *param) 819 { 820 SLIST_REMOVE(&target_paramlist, param, target_param, tp); 821 free(param); 822 823 return (0); 824 } 825 826 struct target_notify * 827 target_first_notify(void) 828 { 829 return (SLIST_FIRST(&target_notifylist)); 830 } 831 832 struct target_notify * 833 target_next_notify(struct target_notify *notify) 834 { 835 if (notify == NULL) 836 return (NULL); 837 838 return (SLIST_NEXT(notify, tn)); 839 } 840 841 struct target_notify * 842 target_new_notify(char *nname) 843 { 844 int cmp; 845 struct target_notify *notify, *temp, *prev; 846 847 SLIST_FOREACH(notify, &target_notifylist, tn) 848 if (strcmp(nname, notify->name) == 0) 849 return (NULL); 850 851 if ((notify = (struct target_notify *)malloc(sizeof(*notify))) == NULL) 852 return (NULL); 853 854 memset(notify, 0, sizeof(*notify)); 855 strlcpy(notify->name, nname, sizeof(notify->name)); 856 857 if ((prev = SLIST_FIRST(&target_notifylist)) == NULL || 858 strcmp(nname, prev->name) < 0) { 859 SLIST_INSERT_HEAD(&target_notifylist, notify, tn); 860 return (notify); 861 } 862 863 SLIST_FOREACH(temp, &target_notifylist, tn) { 864 if ((cmp = strcmp(nname, temp->name)) <= 0) 865 break; 866 prev = temp; 867 } 868 869 if (temp == NULL || cmp < 0) 870 SLIST_INSERT_AFTER(prev, notify, tn); 871 else if (cmp > 0) 872 SLIST_INSERT_AFTER(temp, notify, tn); 873 else { 874 syslog(LOG_ERR, "Notification target %s exists", notify->name); 875 free(notify); 876 return (NULL); 877 } 878 879 return (notify); 880 } 881 882 int 883 target_delete_notify(struct target_notify *notify) 884 { 885 SLIST_REMOVE(&target_notifylist, notify, target_notify, tn); 886 free(notify); 887 888 return (0); 889 } 890 891 void 892 target_flush_all(void) 893 { 894 struct target_address *addrs; 895 struct target_param *param; 896 struct target_notify *notify; 897 898 while ((addrs = SLIST_FIRST(&target_addresslist)) != NULL) { 899 SLIST_REMOVE_HEAD(&target_addresslist, ta); 900 if (addrs->status == RowStatus_active) 901 close(addrs->socket); 902 free(addrs); 903 } 904 SLIST_INIT(&target_addresslist); 905 906 while ((param = SLIST_FIRST(&target_paramlist)) != NULL) { 907 SLIST_REMOVE_HEAD(&target_paramlist, tp); 908 free(param); 909 } 910 SLIST_INIT(&target_paramlist); 911 912 while ((notify = SLIST_FIRST(&target_notifylist)) != NULL) { 913 SLIST_REMOVE_HEAD(&target_notifylist, tn); 914 free(notify); 915 } 916 SLIST_INIT(&target_notifylist); 917 } 918