Fix: uninitialized fd value used in runas
[lttng-tools.git] / src / common / runas.c
CommitLineData
60b6c79c
MD
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 *
d14d33bf
AM
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
60b6c79c
MD
8 *
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
d14d33bf 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
60b6c79c
MD
12 * more details.
13 *
d14d33bf
AM
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
60b6c79c
MD
17 */
18
6c1c0768 19#define _LGPL_SOURCE
60b6c79c
MD
20#include <errno.h>
21#include <limits.h>
22#include <stdio.h>
23#include <stdlib.h>
24#include <string.h>
25#include <sys/wait.h>
26#include <sys/types.h>
27#include <sys/stat.h>
28#include <unistd.h>
29#include <fcntl.h>
c2b75c49 30#include <sched.h>
0452bf08 31#include <signal.h>
749b7a0c 32#include <assert.h>
e1055edb 33#include <signal.h>
60b6c79c 34
0ef03255 35#include <common/lttng-kernel.h>
90e535ef 36#include <common/common.h>
3fd15a74 37#include <common/utils.h>
e8fa9fb0 38#include <common/compat/getenv.h>
e1055edb 39#include <common/compat/prctl.h>
2038dd6c
JG
40#include <common/unix.h>
41#include <common/defaults.h>
241e0a5a
FD
42#include <common/lttng-elf.h>
43
44#include <lttng/constant.h>
60b6c79c 45
0857097f
DG
46#include "runas.h"
47
7567352f 48struct run_as_data;
fe9f7760
FD
49struct run_as_ret;
50typedef int (*run_as_fct)(struct run_as_data *data, struct run_as_ret *ret_value);
c2b75c49 51
e11d277b 52struct run_as_mkdir_data {
7567352f 53 char path[PATH_MAX];
60b6c79c
MD
54 mode_t mode;
55};
56
e11d277b 57struct run_as_open_data {
7567352f 58 char path[PATH_MAX];
60b6c79c
MD
59 int flags;
60 mode_t mode;
61};
62
4628484a 63struct run_as_unlink_data {
7567352f 64 char path[PATH_MAX];
4628484a
MD
65};
66
7567352f
MD
67struct run_as_rmdir_recursive_data {
68 char path[PATH_MAX];
69};
70
241e0a5a
FD
71struct run_as_extract_elf_symbol_offset_data {
72 char function[LTTNG_SYMBOL_NAME_LEN];
73};
74
0ef03255
FD
75struct run_as_extract_sdt_probe_offsets_data {
76 char probe_name[LTTNG_SYMBOL_NAME_LEN];
77 char provider_name[LTTNG_SYMBOL_NAME_LEN];
78};
79
fe9f7760
FD
80struct run_as_mkdir_ret {
81 int ret;
82};
83
84struct run_as_open_ret {
85 int ret;
86};
87
88struct run_as_unlink_ret {
89 int ret;
90};
91
92struct run_as_rmdir_recursive_ret {
93 int ret;
94};
95
241e0a5a
FD
96struct run_as_extract_elf_symbol_offset_ret {
97 uint64_t offset;
98};
99
0ef03255
FD
100struct run_as_extract_sdt_probe_offsets_ret {
101 uint32_t num_offset;
102 uint64_t offsets[LTTNG_KERNEL_MAX_UPROBE_NUM];
103};
104
7567352f
MD
105enum run_as_cmd {
106 RUN_AS_MKDIR,
107 RUN_AS_OPEN,
108 RUN_AS_UNLINK,
109 RUN_AS_RMDIR_RECURSIVE,
110 RUN_AS_MKDIR_RECURSIVE,
241e0a5a 111 RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET,
0ef03255 112 RUN_AS_EXTRACT_SDT_PROBE_OFFSETS,
7567352f
MD
113};
114
115struct run_as_data {
116 enum run_as_cmd cmd;
fe9f7760 117 int fd;
7567352f
MD
118 union {
119 struct run_as_mkdir_data mkdir;
120 struct run_as_open_data open;
121 struct run_as_unlink_data unlink;
122 struct run_as_rmdir_recursive_data rmdir_recursive;
241e0a5a 123 struct run_as_extract_elf_symbol_offset_data extract_elf_symbol_offset;
0ef03255 124 struct run_as_extract_sdt_probe_offsets_data extract_sdt_probe_offsets;
7567352f
MD
125 } u;
126 uid_t uid;
127 gid_t gid;
4628484a
MD
128};
129
fe9f7760
FD
130/*
131 * The run_as_ret structure holds the returned value and status of the command.
132 *
133 * The `u` union field holds the return value of the command; in most cases it
134 * represents the success or the failure of the command. In more complex
135 * commands, it holds a computed value.
136 *
137 * The _errno field is the errno recorded after the execution of the command.
138 *
139 * The _error fields is used the signify that return status of the command. For
140 * simple commands returning `int` the _error field will be the same as the
141 * ret_int field. In complex commands, it signify the success or failure of the
142 * command.
143 *
144 */
df5b86c8 145struct run_as_ret {
fe9f7760
FD
146 int fd;
147 union {
148 struct run_as_mkdir_ret mkdir;
149 struct run_as_open_ret open;
150 struct run_as_unlink_ret unlink;
151 struct run_as_rmdir_recursive_ret rmdir_recursive;
241e0a5a 152 struct run_as_extract_elf_symbol_offset_ret extract_elf_symbol_offset;
0ef03255 153 struct run_as_extract_sdt_probe_offsets_ret extract_sdt_probe_offsets;
fe9f7760 154 } u;
df5b86c8 155 int _errno;
fe9f7760 156 bool _error;
df5b86c8
MD
157};
158
7567352f
MD
159struct run_as_worker {
160 pid_t pid; /* Worker PID. */
161 int sockpair[2];
162 char *procname;
163};
164
165/* Single global worker per process (for now). */
166static struct run_as_worker *global_worker;
167/* Lock protecting the worker. */
168static pthread_mutex_t worker_lock = PTHREAD_MUTEX_INITIALIZER;
169
8f0044bf
MD
170#ifdef VALGRIND
171static
172int use_clone(void)
173{
174 return 0;
175}
176#else
177static
178int use_clone(void)
179{
e8fa9fb0 180 return !lttng_secure_getenv("LTTNG_DEBUG_NOCLONE");
8f0044bf
MD
181}
182#endif
183
d77dded2
JG
184LTTNG_HIDDEN
185int _utils_mkdir_recursive_unsafe(const char *path, mode_t mode);
186
60b6c79c
MD
187/*
188 * Create recursively directory using the FULL path.
189 */
190static
fe9f7760 191int _mkdir_recursive(struct run_as_data *data, struct run_as_ret *ret_value)
60b6c79c 192{
60b6c79c 193 const char *path;
60b6c79c 194 mode_t mode;
60b6c79c 195
7567352f
MD
196 path = data->u.mkdir.path;
197 mode = data->u.mkdir.mode;
60b6c79c 198
d77dded2 199 /* Safe to call as we have transitioned to the requested uid/gid. */
fe9f7760
FD
200 ret_value->u.mkdir.ret = _utils_mkdir_recursive_unsafe(path, mode);
201 ret_value->_errno = errno;
202 ret_value->_error = (ret_value->u.mkdir.ret) ? true : false;
203 return ret_value->u.mkdir.ret;
60b6c79c
MD
204}
205
206static
fe9f7760 207int _mkdir(struct run_as_data *data, struct run_as_ret *ret_value)
60b6c79c 208{
fe9f7760
FD
209 ret_value->u.mkdir.ret = mkdir(data->u.mkdir.path, data->u.mkdir.mode);
210 ret_value->_errno = errno;
211 ret_value->_error = (ret_value->u.mkdir.ret) ? true : false;
212 return ret_value->u.mkdir.ret;
7567352f 213}
7ce36756 214
7567352f 215static
fe9f7760 216int _open(struct run_as_data *data, struct run_as_ret *ret_value)
7567352f 217{
fe9f7760
FD
218 ret_value->u.open.ret = open(data->u.open.path, data->u.open.flags, data->u.open.mode);
219 ret_value->fd = ret_value->u.open.ret;
220 ret_value->_errno = errno;
221 ret_value->_error = (ret_value->u.open.ret) ? true : false;
222 return ret_value->u.open.ret;
7567352f
MD
223}
224
225static
fe9f7760 226int _unlink(struct run_as_data *data, struct run_as_ret *ret_value)
7567352f 227{
fe9f7760
FD
228 ret_value->u.unlink.ret = unlink(data->u.unlink.path);
229 ret_value->_errno = errno;
230 ret_value->_error = (ret_value->u.unlink.ret) ? true : false;
231 return ret_value->u.unlink.ret;
60b6c79c
MD
232}
233
234static
fe9f7760 235int _rmdir_recursive(struct run_as_data *data, struct run_as_ret *ret_value)
60b6c79c 236{
fe9f7760
FD
237 ret_value->u.rmdir_recursive.ret = utils_recursive_rmdir(data->u.rmdir_recursive.path);
238 ret_value->_errno = errno;
239 ret_value->_error = (ret_value->u.rmdir_recursive.ret) ? true : false;
240 return ret_value->u.rmdir_recursive.ret;
7567352f 241}
df5b86c8 242
241e0a5a
FD
243static
244int _extract_elf_symbol_offset(struct run_as_data *data,
245 struct run_as_ret *ret_value)
246{
247 int ret = 0;
248 ret_value->_error = false;
249
250 ret = lttng_elf_get_symbol_offset(data->fd,
251 data->u.extract_elf_symbol_offset.function,
252 &ret_value->u.extract_elf_symbol_offset.offset);
253 if (ret) {
254 DBG("Failed to extract ELF function offset");
255 ret_value->_error = true;
256 }
257
258 return ret;
259}
260
0ef03255
FD
261static
262int _extract_sdt_probe_offsets(struct run_as_data *data,
263 struct run_as_ret *ret_value)
264{
265 int ret = 0;
266 uint64_t *offsets = NULL;
267 uint32_t num_offset;
268
269 ret_value->_error = false;
270
271 /* On success, this call allocates the offsets paramater. */
272 ret = lttng_elf_get_sdt_probe_offsets(data->fd,
273 data->u.extract_sdt_probe_offsets.provider_name,
274 data->u.extract_sdt_probe_offsets.probe_name,
275 &offsets, &num_offset);
276
277 if (ret) {
278 DBG("Failed to extract SDT probe offsets");
279 ret_value->_error = true;
280 goto end;
281 }
282
283 if (num_offset <= 0 || num_offset > LTTNG_KERNEL_MAX_UPROBE_NUM) {
284 DBG("Wrong number of probes.");
285 ret = -1;
286 ret_value->_error = true;
287 goto free_offset;
288 }
289
290 /* Copy the content of the offsets array to the ret struct. */
291 memcpy(ret_value->u.extract_sdt_probe_offsets.offsets,
292 offsets, num_offset * sizeof(uint64_t));
293
294 ret_value->u.extract_sdt_probe_offsets.num_offset = num_offset;
295
296free_offset:
297 free(offsets);
298end:
299 return ret;
300}
241e0a5a 301
7567352f
MD
302static
303run_as_fct run_as_enum_to_fct(enum run_as_cmd cmd)
304{
305 switch (cmd) {
306 case RUN_AS_MKDIR:
307 return _mkdir;
308 case RUN_AS_OPEN:
309 return _open;
310 case RUN_AS_UNLINK:
311 return _unlink;
312 case RUN_AS_RMDIR_RECURSIVE:
313 return _rmdir_recursive;
314 case RUN_AS_MKDIR_RECURSIVE:
315 return _mkdir_recursive;
241e0a5a
FD
316 case RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET:
317 return _extract_elf_symbol_offset;
0ef03255
FD
318 case RUN_AS_EXTRACT_SDT_PROBE_OFFSETS:
319 return _extract_sdt_probe_offsets;
7567352f 320 default:
62a7b8ed 321 ERR("Unknown command %d", (int) cmd);
7567352f
MD
322 return NULL;
323 }
60b6c79c
MD
324}
325
4628484a 326static
fe9f7760 327int do_send_fd(int sock, int fd)
4628484a 328{
7567352f 329 ssize_t len;
4628484a 330
7567352f 331 if (fd < 0) {
fe9f7760 332 ERR("Invalid file description");
7567352f
MD
333 return 0;
334 }
fe9f7760
FD
335
336 len = lttcomm_send_fds_unix_sock(sock, &fd, 1);
7567352f
MD
337 if (len < 0) {
338 PERROR("lttcomm_send_fds_unix_sock");
339 return -1;
340 }
7567352f 341 return 0;
4628484a
MD
342}
343
344static
fe9f7760 345int do_recv_fd(int sock, int *fd)
4628484a 346{
7567352f 347 ssize_t len;
4628484a 348
7567352f 349 if (*fd < 0) {
fe9f7760 350 ERR("Invalid file description");
7567352f
MD
351 return 0;
352 }
fe9f7760
FD
353
354 len = lttcomm_recv_fds_unix_sock(sock, fd, 1);
355
da9ee832
JG
356 if (!len) {
357 return -1;
358 } else if (len < 0) {
7567352f
MD
359 PERROR("lttcomm_recv_fds_unix_sock");
360 return -1;
361 }
362 return 0;
4628484a
MD
363}
364
fe9f7760
FD
365static
366int send_fd_to_worker(struct run_as_worker *worker, enum run_as_cmd cmd, int fd)
367{
368 int ret = 0;
369
370 switch (cmd) {
241e0a5a 371 case RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET:
0ef03255 372 case RUN_AS_EXTRACT_SDT_PROBE_OFFSETS:
241e0a5a 373 break;
fe9f7760
FD
374 default:
375 return 0;
376 }
377
378 ret = do_send_fd(worker->sockpair[0], fd);
379 if (ret < 0) {
380 PERROR("do_send_fd");
381 ret = -1;
382 }
383
384 return ret;
385}
386
387static
388int send_fd_to_master(struct run_as_worker *worker, enum run_as_cmd cmd, int fd)
389{
390 int ret = 0, ret_close = 0;
391
392 switch (cmd) {
393 case RUN_AS_OPEN:
394 break;
395 default:
396 return 0;
397 }
398
399 ret = do_send_fd(worker->sockpair[1], fd);
400 if (ret < 0) {
401 PERROR("do_send_fd error");
402 ret = -1;
403 }
404
405 ret_close = close(fd);
406 if (ret_close < 0) {
407 PERROR("close");
408 }
409
410 return ret;
411}
412
413static
414int recv_fd_from_worker(struct run_as_worker *worker, enum run_as_cmd cmd, int *fd)
415{
416 int ret = 0;
417
418 switch (cmd) {
419 case RUN_AS_OPEN:
420 break;
421 default:
422 return 0;
423 }
424
425 ret = do_recv_fd(worker->sockpair[0], fd);
426 if (ret < 0) {
427 PERROR("do_recv_fd error");
428 ret = -1;
429 }
430
431 return ret;
432}
433
434static
435int recv_fd_from_master(struct run_as_worker *worker, enum run_as_cmd cmd, int *fd)
436{
437 int ret = 0;
438
439 switch (cmd) {
241e0a5a 440 case RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET:
0ef03255 441 case RUN_AS_EXTRACT_SDT_PROBE_OFFSETS:
241e0a5a 442 break;
fe9f7760
FD
443 default:
444 return 0;
445 }
446
447 ret = do_recv_fd(worker->sockpair[1], fd);
448 if (ret < 0) {
449 PERROR("do_recv_fd error");
450 ret = -1;
451 }
452
453 return ret;
454}
455
456static
457int cleanup_received_fd(enum run_as_cmd cmd, int fd)
458{
459 int ret = 0;
460
461 switch (cmd) {
241e0a5a 462 case RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET:
0ef03255 463 case RUN_AS_EXTRACT_SDT_PROBE_OFFSETS:
241e0a5a 464 break;
fe9f7760
FD
465 default:
466 return 0;
467 }
468
469 ret = close(fd);
470 if (ret < 0) {
471 PERROR("close error");
472 ret = -1;
473 }
474
475 return ret;
476}
0ef03255 477
7567352f
MD
478/*
479 * Return < 0 on error, 0 if OK, 1 on hangup.
480 */
c2b75c49 481static
7567352f 482int handle_one_cmd(struct run_as_worker *worker)
c2b75c49 483{
7567352f
MD
484 int ret = 0;
485 struct run_as_data data;
486 ssize_t readlen, writelen;
df5b86c8 487 struct run_as_ret sendret;
7567352f
MD
488 run_as_fct cmd;
489 uid_t prev_euid;
490
ee5fcf1d
JG
491 memset(&sendret, 0, sizeof(sendret));
492 sendret.fd = -1;
493
fe9f7760
FD
494 /*
495 * Stage 1: Receive run_as_data struct from the master.
496 * The structure contains the command type and all the parameters needed for
497 * its execution
498 */
7567352f
MD
499 readlen = lttcomm_recv_unix_sock(worker->sockpair[1], &data,
500 sizeof(data));
501 if (readlen == 0) {
502 /* hang up */
503 ret = 1;
504 goto end;
505 }
506 if (readlen < sizeof(data)) {
507 PERROR("lttcomm_recv_unix_sock error");
508 ret = -1;
509 goto end;
510 }
c2b75c49 511
7567352f
MD
512 cmd = run_as_enum_to_fct(data.cmd);
513 if (!cmd) {
514 ret = -1;
515 goto end;
516 }
517
fe9f7760
FD
518 /*
519 * Stage 2: Receive file descriptor from master.
520 * Some commands need a file descriptor as input so if it's needed we
521 * receive the fd using the Unix socket.
522 */
523 ret = recv_fd_from_master(worker, data.cmd, &data.fd);
524 if (ret < 0) {
525 PERROR("recv_fd_from_master error");
526 ret = -1;
527 goto end;
528 }
529
7567352f
MD
530 prev_euid = getuid();
531 if (data.gid != getegid()) {
532 ret = setegid(data.gid);
1576d582 533 if (ret < 0) {
561f5f2c
JG
534 sendret._error = true;
535 sendret._errno = errno;
4c462e79 536 PERROR("setegid");
6d73c4ef 537 goto write_return;
1576d582 538 }
c2b75c49 539 }
7567352f
MD
540 if (data.uid != prev_euid) {
541 ret = seteuid(data.uid);
1576d582 542 if (ret < 0) {
561f5f2c
JG
543 sendret._error = true;
544 sendret._errno = errno;
4c462e79 545 PERROR("seteuid");
6d73c4ef 546 goto write_return;
1576d582 547 }
c2b75c49 548 }
fe9f7760 549
c2b75c49
MD
550 /*
551 * Also set umask to 0 for mkdir executable bit.
552 */
553 umask(0);
fe9f7760
FD
554
555 /*
556 * Stage 3: Execute the command
557 */
558 ret = (*cmd)(&data, &sendret);
559 if (ret < 0) {
560 DBG("Execution of command returned an error");
561 }
6d73c4ef
MD
562
563write_return:
fe9f7760
FD
564 ret = cleanup_received_fd(data.cmd, data.fd);
565 if (ret < 0) {
566 ERR("Error cleaning up FD");
567 goto end;
568 }
569
570 /*
571 * Stage 4: Send run_as_ret structure to the master.
572 * This structure contain the return value of the command and the errno.
573 */
7567352f
MD
574 writelen = lttcomm_send_unix_sock(worker->sockpair[1], &sendret,
575 sizeof(sendret));
6cd525e8 576 if (writelen < sizeof(sendret)) {
7567352f
MD
577 PERROR("lttcomm_send_unix_sock error");
578 ret = -1;
579 goto end;
580 }
fe9f7760
FD
581
582 /*
583 * Stage 5: Send file descriptor to the master
584 * Some commands return a file descriptor so if it's needed we pass it back
585 * to the master using the Unix socket.
586 */
587 ret = send_fd_to_master(worker, data.cmd, sendret.fd);
588 if (ret < 0) {
589 DBG("Sending FD to master returned an error");
7567352f
MD
590 goto end;
591 }
fe9f7760 592
7567352f
MD
593 if (seteuid(prev_euid) < 0) {
594 PERROR("seteuid");
595 ret = -1;
596 goto end;
597 }
598 ret = 0;
599end:
600 return ret;
601}
602
603static
604int run_as_worker(struct run_as_worker *worker)
605{
606 int ret;
607 ssize_t writelen;
608 struct run_as_ret sendret;
609 size_t proc_orig_len;
610
611 /*
612 * Initialize worker. Set a different process cmdline.
613 */
614 proc_orig_len = strlen(worker->procname);
615 memset(worker->procname, 0, proc_orig_len);
616 strncpy(worker->procname, DEFAULT_RUN_AS_WORKER_NAME, proc_orig_len);
617
e1055edb
JG
618 ret = lttng_prctl(PR_SET_NAME,
619 (unsigned long) DEFAULT_RUN_AS_WORKER_NAME, 0, 0, 0);
620 if (ret && ret != -ENOSYS) {
b8090274
JG
621 /* Don't fail as this is not essential. */
622 PERROR("prctl PR_SET_NAME");
6cd525e8 623 }
7567352f 624
fe9f7760
FD
625 memset(&sendret, 0, sizeof(sendret));
626
7567352f
MD
627 writelen = lttcomm_send_unix_sock(worker->sockpair[1], &sendret,
628 sizeof(sendret));
629 if (writelen < sizeof(sendret)) {
630 PERROR("lttcomm_send_unix_sock error");
631 ret = EXIT_FAILURE;
632 goto end;
633 }
634
635 for (;;) {
636 ret = handle_one_cmd(worker);
637 if (ret < 0) {
638 ret = EXIT_FAILURE;
639 goto end;
640 } else if (ret > 0) {
641 break;
642 } else {
643 continue; /* Next command. */
644 }
645 }
646 ret = EXIT_SUCCESS;
647end:
648 return ret;
c2b75c49
MD
649}
650
60b6c79c 651static
7567352f
MD
652int run_as_cmd(struct run_as_worker *worker,
653 enum run_as_cmd cmd,
654 struct run_as_data *data,
fe9f7760 655 struct run_as_ret *ret_value,
7567352f 656 uid_t uid, gid_t gid)
60b6c79c 657{
fe9f7760 658 int ret = 0;
7567352f 659 ssize_t readlen, writelen;
60b6c79c
MD
660
661 /*
662 * If we are non-root, we can only deal with our own uid.
663 */
664 if (geteuid() != 0) {
665 if (uid != geteuid()) {
fe9f7760
FD
666 ret = -1;
667 ret_value->_errno = EPERM;
60b6c79c 668 ERR("Client (%d)/Server (%d) UID mismatch (and sessiond is not root)",
08797918 669 (int) uid, (int) geteuid());
df5b86c8 670 goto end;
60b6c79c 671 }
60b6c79c
MD
672 }
673
7567352f
MD
674 data->cmd = cmd;
675 data->uid = uid;
676 data->gid = gid;
677
fe9f7760
FD
678 /*
679 * Stage 1: Send the run_as_data struct to the worker process
680 */
7567352f
MD
681 writelen = lttcomm_send_unix_sock(worker->sockpair[0], data,
682 sizeof(*data));
683 if (writelen < sizeof(*data)) {
684 PERROR("Error writing message to run_as");
fe9f7760
FD
685 ret = -1;
686 ret_value->_errno = EIO;
60b6c79c 687 goto end;
c2b75c49 688 }
7567352f 689
fe9f7760
FD
690 /*
691 * Stage 2: Send file descriptor to the worker process if needed
692 */
693 ret = send_fd_to_worker(worker, data->cmd, data->fd);
694 if (ret) {
695 PERROR("do_send_fd error");
696 ret = -1;
697 ret_value->_errno = EIO;
698 goto end;
699 }
700
701 /*
702 * Stage 3: Wait for the execution of the command
703 */
704
705 /*
706 * Stage 4: Receive the run_as_ret struct containing the return value and
707 * errno
708 */
709 readlen = lttcomm_recv_unix_sock(worker->sockpair[0], ret_value,
710 sizeof(*ret_value));
da9ee832
JG
711 if (!readlen) {
712 ERR("Run-as worker has hung-up during run_as_cmd");
fe9f7760
FD
713 ret = -1;
714 ret_value->_errno = EIO;
da9ee832 715 goto end;
fe9f7760 716 } else if (readlen < sizeof(*ret_value)) {
7567352f 717 PERROR("Error reading response from run_as");
fe9f7760
FD
718 ret = -1;
719 ret_value->_errno = errno;
033b58a7 720 goto end;
6cd525e8 721 }
fe9f7760
FD
722
723 /*
724 * Stage 5: Receive file descriptor if needed
725 */
726 ret = recv_fd_from_worker(worker, data->cmd, &ret_value->fd);
727 if (ret < 0) {
728 ERR("Error receiving fd");
729 ret = -1;
730 ret_value->_errno = EIO;
4c462e79 731 }
7567352f 732
60b6c79c 733end:
fe9f7760 734 return ret;
60b6c79c
MD
735}
736
2d85a600 737/*
7567352f 738 * This is for debugging ONLY and should not be considered secure.
2d85a600
MD
739 */
740static
fe9f7760
FD
741int run_as_noworker(enum run_as_cmd cmd,
742 struct run_as_data *data, struct run_as_ret *ret_value,
743 uid_t uid, gid_t gid)
2d85a600 744{
df5b86c8 745 int ret, saved_errno;
5b73926f 746 mode_t old_mask;
7567352f 747 run_as_fct fct;
5b73926f 748
7567352f
MD
749 fct = run_as_enum_to_fct(cmd);
750 if (!fct) {
751 errno = -ENOSYS;
752 ret = -1;
753 goto end;
754 }
5b73926f 755 old_mask = umask(0);
fe9f7760
FD
756 ret = fct(data, ret_value);
757 saved_errno = ret_value->_errno;
5b73926f 758 umask(old_mask);
df5b86c8 759 errno = saved_errno;
7567352f 760end:
5b73926f 761 return ret;
2d85a600
MD
762}
763
764static
fe9f7760 765int run_as_restart_worker(struct run_as_worker *worker)
2d85a600 766{
fe9f7760
FD
767 int ret = 0;
768 char *procname = NULL;
769
770 procname = worker->procname;
771
772 /* Close socket to run_as worker process and clean up the zombie process */
773 run_as_destroy_worker();
774
775 /* Create a new run_as worker process*/
776 ret = run_as_create_worker(procname);
777 if (ret < 0 ) {
778 ERR("Restarting the worker process failed");
779 ret = -1;
780 goto err;
781 }
782err:
783 return ret;
784}
785
786static
787int run_as(enum run_as_cmd cmd, struct run_as_data *data,
788 struct run_as_ret *ret_value, uid_t uid, gid_t gid)
789{
790 int ret, saved_errno;
7567352f 791
749b7a0c 792 if (use_clone()) {
7567352f 793 DBG("Using run_as worker");
749b7a0c
JG
794 pthread_mutex_lock(&worker_lock);
795 assert(global_worker);
749b7a0c 796
fe9f7760
FD
797 ret = run_as_cmd(global_worker, cmd, data, ret_value, uid, gid);
798 saved_errno = ret_value->_errno;
799
800 pthread_mutex_unlock(&worker_lock);
801 /*
802 * If the worker thread crashed the errno is set to EIO. we log
803 * the error and start a new worker process.
804 */
805 if (ret == -1 && saved_errno == EIO) {
806 DBG("Socket closed unexpectedly... "
807 "Restarting the worker process");
808 ret = run_as_restart_worker(global_worker);
809
810 if (ret == -1) {
811 ERR("Failed to restart worker process.");
812 goto err;
813 }
814 }
2d85a600 815 } else {
7567352f 816 DBG("Using run_as without worker");
fe9f7760 817 ret = run_as_noworker(cmd, data, ret_value, uid, gid);
2d85a600 818 }
fe9f7760 819err:
7567352f 820 return ret;
2d85a600
MD
821}
822
90e535ef 823LTTNG_HIDDEN
e11d277b 824int run_as_mkdir_recursive(const char *path, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 825{
7567352f 826 struct run_as_data data;
fe9f7760 827 struct run_as_ret ret;
60b6c79c 828
8446e5eb 829 memset(&data, 0, sizeof(data));
fe9f7760 830 memset(&ret, 0, sizeof(ret));
60b6c79c 831 DBG3("mkdir() recursive %s with mode %d for uid %d and gid %d",
08797918 832 path, (int) mode, (int) uid, (int) gid);
7567352f
MD
833 strncpy(data.u.mkdir.path, path, PATH_MAX - 1);
834 data.u.mkdir.path[PATH_MAX - 1] = '\0';
835 data.u.mkdir.mode = mode;
fe9f7760
FD
836
837 run_as(RUN_AS_MKDIR_RECURSIVE, &data, &ret, uid, gid);
838 errno = ret._errno;
839 return ret.u.mkdir.ret;
60b6c79c
MD
840}
841
90e535ef 842LTTNG_HIDDEN
e11d277b 843int run_as_mkdir(const char *path, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 844{
7567352f 845 struct run_as_data data;
fe9f7760 846 struct run_as_ret ret;
60b6c79c 847
8446e5eb 848 memset(&data, 0, sizeof(data));
fe9f7760
FD
849 memset(&ret, 0, sizeof(ret));
850
60b6c79c 851 DBG3("mkdir() %s with mode %d for uid %d and gid %d",
08797918 852 path, (int) mode, (int) uid, (int) gid);
7567352f
MD
853 strncpy(data.u.mkdir.path, path, PATH_MAX - 1);
854 data.u.mkdir.path[PATH_MAX - 1] = '\0';
855 data.u.mkdir.mode = mode;
fe9f7760
FD
856 run_as(RUN_AS_MKDIR, &data, &ret, uid, gid);
857 errno = ret._errno;
858 return ret.u.mkdir.ret;
60b6c79c
MD
859}
860
90e535ef 861LTTNG_HIDDEN
e11d277b 862int run_as_open(const char *path, int flags, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 863{
7567352f 864 struct run_as_data data;
fe9f7760 865 struct run_as_ret ret;
c2b75c49 866
8446e5eb 867 memset(&data, 0, sizeof(data));
fe9f7760
FD
868 memset(&ret, 0, sizeof(ret));
869
47fb7563 870 DBG3("open() %s with flags %X mode %d for uid %d and gid %d",
08797918 871 path, flags, (int) mode, (int) uid, (int) gid);
7567352f
MD
872 strncpy(data.u.open.path, path, PATH_MAX - 1);
873 data.u.open.path[PATH_MAX - 1] = '\0';
874 data.u.open.flags = flags;
875 data.u.open.mode = mode;
fe9f7760
FD
876 run_as(RUN_AS_OPEN, &data, &ret, uid, gid);
877 errno = ret._errno;
878 ret.u.open.ret = ret.fd;
879 return ret.u.open.ret;
60b6c79c 880}
4628484a
MD
881
882LTTNG_HIDDEN
883int run_as_unlink(const char *path, uid_t uid, gid_t gid)
884{
7567352f 885 struct run_as_data data;
fe9f7760 886 struct run_as_ret ret;
4628484a 887
8446e5eb 888 memset(&data, 0, sizeof(data));
fe9f7760
FD
889 memset(&ret, 0, sizeof(ret));
890
4628484a 891 DBG3("unlink() %s with for uid %d and gid %d",
08797918 892 path, (int) uid, (int) gid);
7567352f
MD
893 strncpy(data.u.unlink.path, path, PATH_MAX - 1);
894 data.u.unlink.path[PATH_MAX - 1] = '\0';
fe9f7760
FD
895 run_as(RUN_AS_UNLINK, &data, &ret, uid, gid);
896 errno = ret._errno;
897 return ret.u.unlink.ret;
4628484a
MD
898}
899
900LTTNG_HIDDEN
7567352f 901int run_as_rmdir_recursive(const char *path, uid_t uid, gid_t gid)
4628484a 902{
7567352f 903 struct run_as_data data;
fe9f7760
FD
904 struct run_as_ret ret;
905
906 memset(&data, 0, sizeof(data));
907 memset(&ret, 0, sizeof(ret));
4628484a 908
7567352f 909 DBG3("rmdir_recursive() %s with for uid %d and gid %d",
08797918 910 path, (int) uid, (int) gid);
7567352f
MD
911 strncpy(data.u.rmdir_recursive.path, path, PATH_MAX - 1);
912 data.u.rmdir_recursive.path[PATH_MAX - 1] = '\0';
fe9f7760
FD
913 run_as(RUN_AS_RMDIR_RECURSIVE, &data, &ret, uid, gid);
914 errno = ret._errno;
915 return ret.u.rmdir_recursive.ret;
7567352f
MD
916}
917
241e0a5a
FD
918LTTNG_HIDDEN
919int run_as_extract_elf_symbol_offset(int fd, const char* function,
920 uid_t uid, gid_t gid, uint64_t *offset)
921{
922 struct run_as_data data;
923 struct run_as_ret ret;
924
925 DBG3("extract_elf_symbol_offset() on fd=%d and function=%s "
926 "with for uid %d and gid %d", fd, function, (int) uid, (int) gid);
927
928 data.fd = fd;
929
930 strncpy(data.u.extract_elf_symbol_offset.function, function, LTTNG_SYMBOL_NAME_LEN - 1);
931
932 data.u.extract_elf_symbol_offset.function[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
933
934 run_as(RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET, &data, &ret, uid, gid);
935
936 errno = ret._errno;
937
938 if (ret._error) {
939 return -1;
940 }
941
942 *offset = ret.u.extract_elf_symbol_offset.offset;
943 return 0;
944}
945
0ef03255
FD
946LTTNG_HIDDEN
947int run_as_extract_sdt_probe_offsets(int fd, const char* provider_name,
948 const char* probe_name, uid_t uid, gid_t gid,
949 uint64_t **offsets, uint32_t *num_offset)
950{
951 struct run_as_data data;
952 struct run_as_ret ret;
953
954 DBG3("extract_sdt_probe_offsets() on fd=%d, probe_name=%s and "
955 "provider_name=%s with for uid %d and gid %d", fd, probe_name,
956 provider_name, (int) uid, (int) gid);
957
958 data.fd = fd;
959
960 strncpy(data.u.extract_sdt_probe_offsets.probe_name, probe_name, LTTNG_SYMBOL_NAME_LEN - 1);
961 strncpy(data.u.extract_sdt_probe_offsets.provider_name, provider_name, LTTNG_SYMBOL_NAME_LEN - 1);
962
963 data.u.extract_sdt_probe_offsets.probe_name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
964 data.u.extract_sdt_probe_offsets.provider_name[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
965
966 run_as(RUN_AS_EXTRACT_SDT_PROBE_OFFSETS, &data, &ret, uid, gid);
967
968 errno = ret._errno;
969
970 if (ret._error) {
971 return -1;
972 }
973
974 *num_offset = ret.u.extract_sdt_probe_offsets.num_offset;
975
976 *offsets = zmalloc(*num_offset * sizeof(uint64_t));
977 if (!*offsets) {
978 return -ENOMEM;
979 }
980
981 memcpy(*offsets, ret.u.extract_sdt_probe_offsets.offsets, *num_offset * sizeof(uint64_t));
982 return 0;
983}
984
f8f66d38 985static
a80ed305 986int reset_sighandler(void)
f8f66d38 987{
5b5bb8c8 988 int sig;
f8f66d38 989
978d5d79 990 DBG("Resetting run_as worker signal handlers to default");
5b5bb8c8
JG
991 for (sig = 1; sig <= 31; sig++) {
992 (void) signal(sig, SIG_DFL);
f8f66d38 993 }
5b5bb8c8 994 return 0;
a80ed305
JG
995}
996
997static
998void worker_sighandler(int sig)
999{
1000 const char *signame;
1001
1002 /*
cd89f030
JG
1003 * The worker will inherit its parent's signals since they are part of
1004 * the same process group. However, in the case of SIGINT and SIGTERM,
1005 * we want to give the worker a chance to teardown gracefully when its
1006 * parent closes the command socket.
a80ed305
JG
1007 */
1008 switch (sig) {
1009 case SIGINT:
1010 signame = "SIGINT";
1011 break;
1012 case SIGTERM:
1013 signame = "SIGTERM";
1014 break;
1015 default:
22d5e48e 1016 signame = NULL;
a80ed305
JG
1017 }
1018
22d5e48e
JG
1019 if (signame) {
1020 DBG("run_as worker received signal %s", signame);
1021 } else {
1022 DBG("run_as_worker received signal %d", sig);
1023 }
a80ed305
JG
1024}
1025
1026static
1027int set_worker_sighandlers(void)
1028{
1029 int ret = 0;
1030 sigset_t sigset;
1031 struct sigaction sa;
1032
1033 if ((ret = sigemptyset(&sigset)) < 0) {
1034 PERROR("sigemptyset");
1035 goto end;
1036 }
1037
1038 sa.sa_handler = worker_sighandler;
1039 sa.sa_mask = sigset;
1040 sa.sa_flags = 0;
1041 if ((ret = sigaction(SIGINT, &sa, NULL)) < 0) {
1042 PERROR("sigaction SIGINT");
1043 goto end;
1044 }
1045
1046 if ((ret = sigaction(SIGTERM, &sa, NULL)) < 0) {
1047 PERROR("sigaction SIGTERM");
1048 goto end;
1049 }
1050
1051 DBG("run_as signal handler set for SIGTERM and SIGINT");
1052end:
1053 return ret;
f8f66d38
JG
1054}
1055
7567352f
MD
1056LTTNG_HIDDEN
1057int run_as_create_worker(char *procname)
1058{
1059 pid_t pid;
1060 int i, ret = 0;
1061 ssize_t readlen;
1062 struct run_as_ret recvret;
1063 struct run_as_worker *worker;
1064
749b7a0c
JG
1065 pthread_mutex_lock(&worker_lock);
1066 assert(!global_worker);
7567352f 1067 if (!use_clone()) {
749b7a0c
JG
1068 /*
1069 * Don't initialize a worker, all run_as tasks will be performed
1070 * in the current process.
1071 */
7567352f
MD
1072 ret = 0;
1073 goto end;
1074 }
1075 worker = zmalloc(sizeof(*worker));
1076 if (!worker) {
1077 ret = -ENOMEM;
1078 goto end;
1079 }
1080 worker->procname = procname;
1081 /* Create unix socket. */
1082 if (lttcomm_create_anon_unix_socketpair(worker->sockpair) < 0) {
1083 ret = -1;
1084 goto error_sock;
1085 }
fe9f7760 1086
7567352f
MD
1087 /* Fork worker. */
1088 pid = fork();
1089 if (pid < 0) {
1090 PERROR("fork");
1091 ret = -1;
1092 goto error_fork;
1093 } else if (pid == 0) {
1094 /* Child */
1095
f8f66d38
JG
1096 reset_sighandler();
1097
a80ed305
JG
1098 set_worker_sighandlers();
1099
749b7a0c
JG
1100 /* The child has no use for this lock. */
1101 pthread_mutex_unlock(&worker_lock);
7567352f
MD
1102 /* Just close, no shutdown. */
1103 if (close(worker->sockpair[0])) {
1104 PERROR("close");
1105 exit(EXIT_FAILURE);
1106 }
fe9f7760
FD
1107
1108 /*
1109 * Close all FDs aside from STDIN, STDOUT, STDERR and sockpair[1]
1110 * Sockpair[1] is used as a control channel with the master
1111 */
1112 for (i = 3; i < sysconf(_SC_OPEN_MAX); i++) {
1113 if (i != worker->sockpair[1]) {
1114 (void) close(i);
1115 }
1116 }
1117
7567352f
MD
1118 worker->sockpair[0] = -1;
1119 ret = run_as_worker(worker);
1120 if (lttcomm_close_unix_sock(worker->sockpair[1])) {
1121 PERROR("close");
1122 ret = -1;
1123 }
1124 worker->sockpair[1] = -1;
978d5d79 1125 LOG(ret ? PRINT_ERR : PRINT_DBG, "run_as worker exiting (ret = %d)", ret);
7567352f
MD
1126 exit(ret ? EXIT_FAILURE : EXIT_SUCCESS);
1127 } else {
1128 /* Parent */
1129
1130 /* Just close, no shutdown. */
1131 if (close(worker->sockpair[1])) {
1132 PERROR("close");
1133 ret = -1;
1134 goto error_fork;
1135 }
1136 worker->sockpair[1] = -1;
1137 worker->pid = pid;
1138 /* Wait for worker to become ready. */
1139 readlen = lttcomm_recv_unix_sock(worker->sockpair[0],
1140 &recvret, sizeof(recvret));
1141 if (readlen < sizeof(recvret)) {
1142 ERR("readlen: %zd", readlen);
1143 PERROR("Error reading response from run_as at creation");
1144 ret = -1;
1145 goto error_fork;
1146 }
1147 global_worker = worker;
1148 }
1149end:
749b7a0c 1150 pthread_mutex_unlock(&worker_lock);
7567352f
MD
1151 return ret;
1152
1153 /* Error handling. */
1154error_fork:
1155 for (i = 0; i < 2; i++) {
1156 if (worker->sockpair[i] < 0) {
1157 continue;
1158 }
1159 if (lttcomm_close_unix_sock(worker->sockpair[i])) {
1160 PERROR("close");
1161 }
1162 worker->sockpair[i] = -1;
1163 }
1164error_sock:
1165 free(worker);
749b7a0c 1166 pthread_mutex_unlock(&worker_lock);
7567352f
MD
1167 return ret;
1168}
1169
1170LTTNG_HIDDEN
1171void run_as_destroy_worker(void)
1172{
1173 struct run_as_worker *worker = global_worker;
7567352f 1174
978d5d79 1175 DBG("Destroying run_as worker");
749b7a0c 1176 pthread_mutex_lock(&worker_lock);
7567352f 1177 if (!worker) {
749b7a0c 1178 goto end;
7567352f
MD
1179 }
1180 /* Close unix socket */
978d5d79 1181 DBG("Closing run_as worker socket");
7567352f
MD
1182 if (lttcomm_close_unix_sock(worker->sockpair[0])) {
1183 PERROR("close");
1184 }
1185 worker->sockpair[0] = -1;
1186 /* Wait for worker. */
f8f66d38
JG
1187 for (;;) {
1188 int status;
1189 pid_t wait_ret;
1190
1191 wait_ret = waitpid(worker->pid, &status, 0);
1192 if (wait_ret < 0) {
1193 if (errno == EINTR) {
1194 continue;
1195 }
1196 PERROR("waitpid");
1197 break;
1198 }
1199
1200 if (WIFEXITED(status)) {
1201 LOG(WEXITSTATUS(status) == 0 ? PRINT_DBG : PRINT_ERR,
1202 DEFAULT_RUN_AS_WORKER_NAME " terminated with status code %d",
1203 WEXITSTATUS(status));
1204 break;
1205 } else if (WIFSIGNALED(status)) {
1206 ERR(DEFAULT_RUN_AS_WORKER_NAME " was killed by signal %d",
1207 WTERMSIG(status));
1208 break;
1209 }
7567352f
MD
1210 }
1211 free(worker);
1212 global_worker = NULL;
749b7a0c
JG
1213end:
1214 pthread_mutex_unlock(&worker_lock);
4628484a 1215}
This page took 0.100736 seconds and 4 git commands to generate.