Fix: Remove dependency on glibc 2.12 caused by pthread_setname_np
[lttng-tools.git] / src / common / runas.c
CommitLineData
60b6c79c
MD
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 *
d14d33bf
AM
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
60b6c79c
MD
8 *
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
d14d33bf 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
60b6c79c
MD
12 * more details.
13 *
d14d33bf
AM
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
60b6c79c
MD
17 */
18
19#define _GNU_SOURCE
6c1c0768 20#define _LGPL_SOURCE
60b6c79c
MD
21#include <errno.h>
22#include <limits.h>
23#include <stdio.h>
24#include <stdlib.h>
25#include <string.h>
26#include <sys/wait.h>
27#include <sys/types.h>
28#include <sys/stat.h>
29#include <unistd.h>
30#include <fcntl.h>
c2b75c49 31#include <sched.h>
730389d9 32#include <sys/signal.h>
749b7a0c 33#include <assert.h>
b8090274 34#include <sys/prctl.h>
60b6c79c 35
90e535ef 36#include <common/common.h>
3fd15a74 37#include <common/utils.h>
e8fa9fb0 38#include <common/compat/getenv.h>
7567352f 39#include <common/sessiond-comm/unix.h>
60b6c79c 40
0857097f
DG
41#include "runas.h"
42
7567352f
MD
43struct run_as_data;
44typedef int (*run_as_fct)(struct run_as_data *data);
c2b75c49 45
e11d277b 46struct run_as_mkdir_data {
7567352f 47 char path[PATH_MAX];
60b6c79c
MD
48 mode_t mode;
49};
50
e11d277b 51struct run_as_open_data {
7567352f 52 char path[PATH_MAX];
60b6c79c
MD
53 int flags;
54 mode_t mode;
55};
56
4628484a 57struct run_as_unlink_data {
7567352f 58 char path[PATH_MAX];
4628484a
MD
59};
60
7567352f
MD
61struct run_as_rmdir_recursive_data {
62 char path[PATH_MAX];
63};
64
65enum run_as_cmd {
66 RUN_AS_MKDIR,
67 RUN_AS_OPEN,
68 RUN_AS_UNLINK,
69 RUN_AS_RMDIR_RECURSIVE,
70 RUN_AS_MKDIR_RECURSIVE,
71};
72
73struct run_as_data {
74 enum run_as_cmd cmd;
75 union {
76 struct run_as_mkdir_data mkdir;
77 struct run_as_open_data open;
78 struct run_as_unlink_data unlink;
79 struct run_as_rmdir_recursive_data rmdir_recursive;
80 } u;
81 uid_t uid;
82 gid_t gid;
4628484a
MD
83};
84
df5b86c8
MD
85struct run_as_ret {
86 int ret;
87 int _errno;
88};
89
7567352f
MD
90struct run_as_worker {
91 pid_t pid; /* Worker PID. */
92 int sockpair[2];
93 char *procname;
94};
95
96/* Single global worker per process (for now). */
97static struct run_as_worker *global_worker;
98/* Lock protecting the worker. */
99static pthread_mutex_t worker_lock = PTHREAD_MUTEX_INITIALIZER;
100
8f0044bf
MD
101#ifdef VALGRIND
102static
103int use_clone(void)
104{
105 return 0;
106}
107#else
108static
109int use_clone(void)
110{
e8fa9fb0 111 return !lttng_secure_getenv("LTTNG_DEBUG_NOCLONE");
8f0044bf
MD
112}
113#endif
114
d77dded2
JG
115LTTNG_HIDDEN
116int _utils_mkdir_recursive_unsafe(const char *path, mode_t mode);
117
60b6c79c
MD
118/*
119 * Create recursively directory using the FULL path.
120 */
121static
7567352f 122int _mkdir_recursive(struct run_as_data *data)
60b6c79c 123{
60b6c79c 124 const char *path;
60b6c79c 125 mode_t mode;
60b6c79c 126
7567352f
MD
127 path = data->u.mkdir.path;
128 mode = data->u.mkdir.mode;
60b6c79c 129
d77dded2
JG
130 /* Safe to call as we have transitioned to the requested uid/gid. */
131 return _utils_mkdir_recursive_unsafe(path, mode);
60b6c79c
MD
132}
133
134static
7567352f 135int _mkdir(struct run_as_data *data)
60b6c79c 136{
7567352f
MD
137 return mkdir(data->u.mkdir.path, data->u.mkdir.mode);
138}
7ce36756 139
7567352f
MD
140static
141int _open(struct run_as_data *data)
142{
143 return open(data->u.open.path, data->u.open.flags, data->u.open.mode);
144}
145
146static
147int _unlink(struct run_as_data *data)
148{
149 return unlink(data->u.unlink.path);
60b6c79c
MD
150}
151
152static
7567352f 153int _rmdir_recursive(struct run_as_data *data)
60b6c79c 154{
7567352f
MD
155 return utils_recursive_rmdir(data->u.rmdir_recursive.path);
156}
df5b86c8 157
7567352f
MD
158static
159run_as_fct run_as_enum_to_fct(enum run_as_cmd cmd)
160{
161 switch (cmd) {
162 case RUN_AS_MKDIR:
163 return _mkdir;
164 case RUN_AS_OPEN:
165 return _open;
166 case RUN_AS_UNLINK:
167 return _unlink;
168 case RUN_AS_RMDIR_RECURSIVE:
169 return _rmdir_recursive;
170 case RUN_AS_MKDIR_RECURSIVE:
171 return _mkdir_recursive;
172 default:
173 ERR("Unknown command %d", (int) cmd)
174 return NULL;
175 }
60b6c79c
MD
176}
177
4628484a 178static
7567352f
MD
179int do_send_fd(struct run_as_worker *worker,
180 enum run_as_cmd cmd, int fd)
4628484a 181{
7567352f 182 ssize_t len;
4628484a 183
7567352f
MD
184 switch (cmd) {
185 case RUN_AS_OPEN:
186 break;
187 default:
188 return 0;
189 }
190 if (fd < 0) {
191 return 0;
192 }
193 len = lttcomm_send_fds_unix_sock(worker->sockpair[1], &fd, 1);
194 if (len < 0) {
195 PERROR("lttcomm_send_fds_unix_sock");
196 return -1;
197 }
198 if (close(fd) < 0) {
199 PERROR("close");
200 return -1;
201 }
202 return 0;
4628484a
MD
203}
204
205static
7567352f
MD
206int do_recv_fd(struct run_as_worker *worker,
207 enum run_as_cmd cmd, int *fd)
4628484a 208{
7567352f 209 ssize_t len;
4628484a 210
7567352f
MD
211 switch (cmd) {
212 case RUN_AS_OPEN:
213 break;
214 default:
215 return 0;
216 }
217 if (*fd < 0) {
218 return 0;
219 }
220 len = lttcomm_recv_fds_unix_sock(worker->sockpair[0], fd, 1);
da9ee832
JG
221 if (!len) {
222 return -1;
223 } else if (len < 0) {
7567352f
MD
224 PERROR("lttcomm_recv_fds_unix_sock");
225 return -1;
226 }
227 return 0;
4628484a
MD
228}
229
7567352f
MD
230/*
231 * Return < 0 on error, 0 if OK, 1 on hangup.
232 */
c2b75c49 233static
7567352f 234int handle_one_cmd(struct run_as_worker *worker)
c2b75c49 235{
7567352f
MD
236 int ret = 0;
237 struct run_as_data data;
238 ssize_t readlen, writelen;
df5b86c8 239 struct run_as_ret sendret;
7567352f
MD
240 run_as_fct cmd;
241 uid_t prev_euid;
242
243 /* Read data */
244 readlen = lttcomm_recv_unix_sock(worker->sockpair[1], &data,
245 sizeof(data));
246 if (readlen == 0) {
247 /* hang up */
248 ret = 1;
249 goto end;
250 }
251 if (readlen < sizeof(data)) {
252 PERROR("lttcomm_recv_unix_sock error");
253 ret = -1;
254 goto end;
255 }
c2b75c49 256
7567352f
MD
257 cmd = run_as_enum_to_fct(data.cmd);
258 if (!cmd) {
259 ret = -1;
260 goto end;
261 }
262
263 prev_euid = getuid();
264 if (data.gid != getegid()) {
265 ret = setegid(data.gid);
1576d582 266 if (ret < 0) {
4c462e79 267 PERROR("setegid");
6d73c4ef 268 goto write_return;
1576d582 269 }
c2b75c49 270 }
7567352f
MD
271 if (data.uid != prev_euid) {
272 ret = seteuid(data.uid);
1576d582 273 if (ret < 0) {
4c462e79 274 PERROR("seteuid");
6d73c4ef 275 goto write_return;
1576d582 276 }
c2b75c49
MD
277 }
278 /*
279 * Also set umask to 0 for mkdir executable bit.
280 */
281 umask(0);
7567352f 282 ret = (*cmd)(&data);
6d73c4ef
MD
283
284write_return:
df5b86c8
MD
285 sendret.ret = ret;
286 sendret._errno = errno;
c2b75c49 287 /* send back return value */
7567352f
MD
288 writelen = lttcomm_send_unix_sock(worker->sockpair[1], &sendret,
289 sizeof(sendret));
6cd525e8 290 if (writelen < sizeof(sendret)) {
7567352f
MD
291 PERROR("lttcomm_send_unix_sock error");
292 ret = -1;
293 goto end;
294 }
295 ret = do_send_fd(worker, data.cmd, ret);
296 if (ret) {
297 PERROR("do_send_fd error");
298 ret = -1;
299 goto end;
300 }
301 if (seteuid(prev_euid) < 0) {
302 PERROR("seteuid");
303 ret = -1;
304 goto end;
305 }
306 ret = 0;
307end:
308 return ret;
309}
310
311static
312int run_as_worker(struct run_as_worker *worker)
313{
314 int ret;
315 ssize_t writelen;
316 struct run_as_ret sendret;
317 size_t proc_orig_len;
318
319 /*
320 * Initialize worker. Set a different process cmdline.
321 */
322 proc_orig_len = strlen(worker->procname);
323 memset(worker->procname, 0, proc_orig_len);
324 strncpy(worker->procname, DEFAULT_RUN_AS_WORKER_NAME, proc_orig_len);
325
b8090274 326 ret = prctl(PR_SET_NAME, DEFAULT_RUN_AS_WORKER_NAME, 0, 0, 0);
7567352f 327 if (ret) {
b8090274
JG
328 /* Don't fail as this is not essential. */
329 PERROR("prctl PR_SET_NAME");
330 ret = 0;
6cd525e8 331 }
7567352f
MD
332
333 sendret.ret = 0;
334 sendret._errno = 0;
335 writelen = lttcomm_send_unix_sock(worker->sockpair[1], &sendret,
336 sizeof(sendret));
337 if (writelen < sizeof(sendret)) {
338 PERROR("lttcomm_send_unix_sock error");
339 ret = EXIT_FAILURE;
340 goto end;
341 }
342
343 for (;;) {
344 ret = handle_one_cmd(worker);
345 if (ret < 0) {
346 ret = EXIT_FAILURE;
347 goto end;
348 } else if (ret > 0) {
349 break;
350 } else {
351 continue; /* Next command. */
352 }
353 }
354 ret = EXIT_SUCCESS;
355end:
356 return ret;
c2b75c49
MD
357}
358
60b6c79c 359static
7567352f
MD
360int run_as_cmd(struct run_as_worker *worker,
361 enum run_as_cmd cmd,
362 struct run_as_data *data,
363 uid_t uid, gid_t gid)
60b6c79c 364{
7567352f 365 ssize_t readlen, writelen;
df5b86c8 366 struct run_as_ret recvret;
60b6c79c
MD
367
368 /*
369 * If we are non-root, we can only deal with our own uid.
370 */
371 if (geteuid() != 0) {
372 if (uid != geteuid()) {
df5b86c8
MD
373 recvret.ret = -1;
374 recvret._errno = EPERM;
60b6c79c
MD
375 ERR("Client (%d)/Server (%d) UID mismatch (and sessiond is not root)",
376 uid, geteuid());
df5b86c8 377 goto end;
60b6c79c 378 }
60b6c79c
MD
379 }
380
7567352f
MD
381 data->cmd = cmd;
382 data->uid = uid;
383 data->gid = gid;
384
385 writelen = lttcomm_send_unix_sock(worker->sockpair[0], data,
386 sizeof(*data));
387 if (writelen < sizeof(*data)) {
388 PERROR("Error writing message to run_as");
df5b86c8
MD
389 recvret.ret = -1;
390 recvret._errno = errno;
60b6c79c 391 goto end;
c2b75c49 392 }
7567352f 393
c2b75c49 394 /* receive return value */
7567352f
MD
395 readlen = lttcomm_recv_unix_sock(worker->sockpair[0], &recvret,
396 sizeof(recvret));
da9ee832
JG
397 if (!readlen) {
398 ERR("Run-as worker has hung-up during run_as_cmd");
399 recvret.ret = -1;
400 recvret._errno = EIO;
401 goto end;
402 } else if (readlen < sizeof(recvret)) {
7567352f 403 PERROR("Error reading response from run_as");
df5b86c8
MD
404 recvret.ret = -1;
405 recvret._errno = errno;
6cd525e8 406 }
7567352f 407 if (do_recv_fd(worker, cmd, &recvret.ret)) {
df5b86c8 408 recvret.ret = -1;
da9ee832 409 recvret._errno = EIO;
4c462e79 410 }
7567352f 411
60b6c79c 412end:
df5b86c8
MD
413 errno = recvret._errno;
414 return recvret.ret;
60b6c79c
MD
415}
416
2d85a600 417/*
7567352f 418 * This is for debugging ONLY and should not be considered secure.
2d85a600
MD
419 */
420static
7567352f
MD
421int run_as_noworker(enum run_as_cmd cmd,
422 struct run_as_data *data, uid_t uid, gid_t gid)
2d85a600 423{
df5b86c8 424 int ret, saved_errno;
5b73926f 425 mode_t old_mask;
7567352f 426 run_as_fct fct;
5b73926f 427
7567352f
MD
428 fct = run_as_enum_to_fct(cmd);
429 if (!fct) {
430 errno = -ENOSYS;
431 ret = -1;
432 goto end;
433 }
5b73926f 434 old_mask = umask(0);
7567352f 435 ret = fct(data);
df5b86c8 436 saved_errno = errno;
5b73926f 437 umask(old_mask);
df5b86c8 438 errno = saved_errno;
7567352f 439end:
5b73926f 440 return ret;
2d85a600
MD
441}
442
443static
749b7a0c 444int run_as(enum run_as_cmd cmd, struct run_as_data *data, uid_t uid, gid_t gid)
2d85a600 445{
7567352f
MD
446 int ret;
447
749b7a0c 448 if (use_clone()) {
7567352f 449 DBG("Using run_as worker");
749b7a0c
JG
450 pthread_mutex_lock(&worker_lock);
451 assert(global_worker);
452 ret = run_as_cmd(global_worker, cmd, data, uid, gid);
453 pthread_mutex_unlock(&worker_lock);
454
2d85a600 455 } else {
7567352f
MD
456 DBG("Using run_as without worker");
457 ret = run_as_noworker(cmd, data, uid, gid);
2d85a600 458 }
7567352f 459 return ret;
2d85a600
MD
460}
461
90e535ef 462LTTNG_HIDDEN
e11d277b 463int run_as_mkdir_recursive(const char *path, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 464{
7567352f 465 struct run_as_data data;
60b6c79c
MD
466
467 DBG3("mkdir() recursive %s with mode %d for uid %d and gid %d",
468 path, mode, uid, gid);
7567352f
MD
469 strncpy(data.u.mkdir.path, path, PATH_MAX - 1);
470 data.u.mkdir.path[PATH_MAX - 1] = '\0';
471 data.u.mkdir.mode = mode;
749b7a0c 472 return run_as(RUN_AS_MKDIR_RECURSIVE, &data, uid, gid);
60b6c79c
MD
473}
474
90e535ef 475LTTNG_HIDDEN
e11d277b 476int run_as_mkdir(const char *path, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 477{
7567352f 478 struct run_as_data data;
60b6c79c
MD
479
480 DBG3("mkdir() %s with mode %d for uid %d and gid %d",
481 path, mode, uid, gid);
7567352f
MD
482 strncpy(data.u.mkdir.path, path, PATH_MAX - 1);
483 data.u.mkdir.path[PATH_MAX - 1] = '\0';
484 data.u.mkdir.mode = mode;
749b7a0c 485 return run_as(RUN_AS_MKDIR, &data, uid, gid);
60b6c79c
MD
486}
487
488/*
489 * Note: open_run_as is currently not working. We'd need to pass the fd
490 * opened in the child to the parent.
491 */
90e535ef 492LTTNG_HIDDEN
e11d277b 493int run_as_open(const char *path, int flags, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 494{
7567352f 495 struct run_as_data data;
c2b75c49 496
47fb7563
MD
497 DBG3("open() %s with flags %X mode %d for uid %d and gid %d",
498 path, flags, mode, uid, gid);
7567352f
MD
499 strncpy(data.u.open.path, path, PATH_MAX - 1);
500 data.u.open.path[PATH_MAX - 1] = '\0';
501 data.u.open.flags = flags;
502 data.u.open.mode = mode;
749b7a0c 503 return run_as(RUN_AS_OPEN, &data, uid, gid);
60b6c79c 504}
4628484a
MD
505
506LTTNG_HIDDEN
507int run_as_unlink(const char *path, uid_t uid, gid_t gid)
508{
7567352f 509 struct run_as_data data;
4628484a
MD
510
511 DBG3("unlink() %s with for uid %d and gid %d",
512 path, uid, gid);
7567352f
MD
513 strncpy(data.u.unlink.path, path, PATH_MAX - 1);
514 data.u.unlink.path[PATH_MAX - 1] = '\0';
749b7a0c 515 return run_as(RUN_AS_UNLINK, &data, uid, gid);
4628484a
MD
516}
517
518LTTNG_HIDDEN
7567352f 519int run_as_rmdir_recursive(const char *path, uid_t uid, gid_t gid)
4628484a 520{
7567352f 521 struct run_as_data data;
4628484a 522
7567352f 523 DBG3("rmdir_recursive() %s with for uid %d and gid %d",
4628484a 524 path, uid, gid);
7567352f
MD
525 strncpy(data.u.rmdir_recursive.path, path, PATH_MAX - 1);
526 data.u.rmdir_recursive.path[PATH_MAX - 1] = '\0';
749b7a0c 527 return run_as(RUN_AS_RMDIR_RECURSIVE, &data, uid, gid);
7567352f
MD
528}
529
f8f66d38 530static
a80ed305 531int reset_sighandler(void)
f8f66d38 532{
a80ed305 533 int sig, ret = 0;
f8f66d38 534
978d5d79 535 DBG("Resetting run_as worker signal handlers to default");
f8f66d38
JG
536 for (sig = SIGHUP; sig <= SIGUNUSED; sig++) {
537 /* Skip unblockable signals. */
538 if (sig == SIGKILL || sig == SIGSTOP) {
539 continue;
540 }
541 if (signal(sig, SIG_DFL) == SIG_ERR) {
542 PERROR("reset signal %d", sig);
a80ed305
JG
543 ret = -1;
544 goto end;
f8f66d38
JG
545 }
546 }
a80ed305
JG
547end:
548 return ret;
549}
550
551static
552void worker_sighandler(int sig)
553{
554 const char *signame;
555
556 /*
557 * The worker will its parent's signals since they are part of the same
558 * process group. However, in the case of SIGINT and SIGTERM, we want
559 * to give the worker a chance to teardown gracefully when its parent
560 * closes the command socket.
561 */
562 switch (sig) {
563 case SIGINT:
564 signame = "SIGINT";
565 break;
566 case SIGTERM:
567 signame = "SIGTERM";
568 break;
569 default:
570 signame = "Unknown";
571 }
572
573 DBG("run_as worker received signal %s", signame);
574}
575
576static
577int set_worker_sighandlers(void)
578{
579 int ret = 0;
580 sigset_t sigset;
581 struct sigaction sa;
582
583 if ((ret = sigemptyset(&sigset)) < 0) {
584 PERROR("sigemptyset");
585 goto end;
586 }
587
588 sa.sa_handler = worker_sighandler;
589 sa.sa_mask = sigset;
590 sa.sa_flags = 0;
591 if ((ret = sigaction(SIGINT, &sa, NULL)) < 0) {
592 PERROR("sigaction SIGINT");
593 goto end;
594 }
595
596 if ((ret = sigaction(SIGTERM, &sa, NULL)) < 0) {
597 PERROR("sigaction SIGTERM");
598 goto end;
599 }
600
601 DBG("run_as signal handler set for SIGTERM and SIGINT");
602end:
603 return ret;
f8f66d38
JG
604}
605
7567352f
MD
606LTTNG_HIDDEN
607int run_as_create_worker(char *procname)
608{
609 pid_t pid;
610 int i, ret = 0;
611 ssize_t readlen;
612 struct run_as_ret recvret;
613 struct run_as_worker *worker;
614
749b7a0c
JG
615 pthread_mutex_lock(&worker_lock);
616 assert(!global_worker);
7567352f 617 if (!use_clone()) {
749b7a0c
JG
618 /*
619 * Don't initialize a worker, all run_as tasks will be performed
620 * in the current process.
621 */
7567352f
MD
622 ret = 0;
623 goto end;
624 }
625 worker = zmalloc(sizeof(*worker));
626 if (!worker) {
627 ret = -ENOMEM;
628 goto end;
629 }
630 worker->procname = procname;
631 /* Create unix socket. */
632 if (lttcomm_create_anon_unix_socketpair(worker->sockpair) < 0) {
633 ret = -1;
634 goto error_sock;
635 }
636 /* Fork worker. */
637 pid = fork();
638 if (pid < 0) {
639 PERROR("fork");
640 ret = -1;
641 goto error_fork;
642 } else if (pid == 0) {
643 /* Child */
644
f8f66d38
JG
645 reset_sighandler();
646
a80ed305
JG
647 set_worker_sighandlers();
648
749b7a0c
JG
649 /* The child has no use for this lock. */
650 pthread_mutex_unlock(&worker_lock);
7567352f
MD
651 /* Just close, no shutdown. */
652 if (close(worker->sockpair[0])) {
653 PERROR("close");
654 exit(EXIT_FAILURE);
655 }
656 worker->sockpair[0] = -1;
657 ret = run_as_worker(worker);
658 if (lttcomm_close_unix_sock(worker->sockpair[1])) {
659 PERROR("close");
660 ret = -1;
661 }
662 worker->sockpair[1] = -1;
978d5d79 663 LOG(ret ? PRINT_ERR : PRINT_DBG, "run_as worker exiting (ret = %d)", ret);
7567352f
MD
664 exit(ret ? EXIT_FAILURE : EXIT_SUCCESS);
665 } else {
666 /* Parent */
667
668 /* Just close, no shutdown. */
669 if (close(worker->sockpair[1])) {
670 PERROR("close");
671 ret = -1;
672 goto error_fork;
673 }
674 worker->sockpair[1] = -1;
675 worker->pid = pid;
676 /* Wait for worker to become ready. */
677 readlen = lttcomm_recv_unix_sock(worker->sockpair[0],
678 &recvret, sizeof(recvret));
679 if (readlen < sizeof(recvret)) {
680 ERR("readlen: %zd", readlen);
681 PERROR("Error reading response from run_as at creation");
682 ret = -1;
683 goto error_fork;
684 }
685 global_worker = worker;
686 }
687end:
749b7a0c 688 pthread_mutex_unlock(&worker_lock);
7567352f
MD
689 return ret;
690
691 /* Error handling. */
692error_fork:
693 for (i = 0; i < 2; i++) {
694 if (worker->sockpair[i] < 0) {
695 continue;
696 }
697 if (lttcomm_close_unix_sock(worker->sockpair[i])) {
698 PERROR("close");
699 }
700 worker->sockpair[i] = -1;
701 }
702error_sock:
703 free(worker);
749b7a0c 704 pthread_mutex_unlock(&worker_lock);
7567352f
MD
705 return ret;
706}
707
708LTTNG_HIDDEN
709void run_as_destroy_worker(void)
710{
711 struct run_as_worker *worker = global_worker;
7567352f 712
978d5d79 713 DBG("Destroying run_as worker");
749b7a0c 714 pthread_mutex_lock(&worker_lock);
7567352f 715 if (!worker) {
749b7a0c 716 goto end;
7567352f
MD
717 }
718 /* Close unix socket */
978d5d79 719 DBG("Closing run_as worker socket");
7567352f
MD
720 if (lttcomm_close_unix_sock(worker->sockpair[0])) {
721 PERROR("close");
722 }
723 worker->sockpair[0] = -1;
724 /* Wait for worker. */
f8f66d38
JG
725 for (;;) {
726 int status;
727 pid_t wait_ret;
728
729 wait_ret = waitpid(worker->pid, &status, 0);
730 if (wait_ret < 0) {
731 if (errno == EINTR) {
732 continue;
733 }
734 PERROR("waitpid");
735 break;
736 }
737
738 if (WIFEXITED(status)) {
739 LOG(WEXITSTATUS(status) == 0 ? PRINT_DBG : PRINT_ERR,
740 DEFAULT_RUN_AS_WORKER_NAME " terminated with status code %d",
741 WEXITSTATUS(status));
742 break;
743 } else if (WIFSIGNALED(status)) {
744 ERR(DEFAULT_RUN_AS_WORKER_NAME " was killed by signal %d",
745 WTERMSIG(status));
746 break;
747 }
7567352f
MD
748 }
749 free(worker);
750 global_worker = NULL;
749b7a0c
JG
751end:
752 pthread_mutex_unlock(&worker_lock);
4628484a 753}
This page took 0.071073 seconds and 4 git commands to generate.