Rename C++ header files to .hpp
[lttng-tools.git] / src / common / runas.cpp
CommitLineData
60b6c79c 1/*
21cf9b6b 2 * Copyright (C) 2011 EfficiOS Inc.
ab5be9fa
MJ
3 * Copyright (C) 2011 Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 * Copyright (C) 2019 Jérémie Galarneau <jeremie.galarneau@efficios.com>
60b6c79c 5 *
c922647d 6 * SPDX-License-Identifier: LGPL-2.1-only
60b6c79c 7 *
60b6c79c
MD
8 */
9
6c1c0768 10#define _LGPL_SOURCE
37ccf8ec
FD
11#include <fcntl.h>
12#include <grp.h>
60b6c79c 13#include <limits.h>
37ccf8ec
FD
14#include <pwd.h>
15#include <sched.h>
16#include <signal.h>
60b6c79c
MD
17#include <stdio.h>
18#include <stdlib.h>
19#include <string.h>
60b6c79c 20#include <sys/stat.h>
37ccf8ec
FD
21#include <sys/types.h>
22#include <sys/wait.h>
60b6c79c 23#include <unistd.h>
60b6c79c 24
c9e313bc
SM
25#include <common/bytecode/bytecode.hpp>
26#include <common/lttng-kernel.hpp>
27#include <common/common.hpp>
28#include <common/utils.hpp>
29#include <common/compat/errno.hpp>
30#include <common/compat/getenv.hpp>
31#include <common/compat/string.hpp>
32#include <common/unix.hpp>
33#include <common/defaults.hpp>
34#include <common/lttng-elf.hpp>
35#include <common/thread.hpp>
241e0a5a
FD
36
37#include <lttng/constant.h>
60b6c79c 38
c9e313bc
SM
39#include <common/sessiond-comm/sessiond-comm.hpp>
40#include <common/filter/filter-ast.hpp>
c73f064a 41
c9e313bc 42#include "runas.hpp"
0857097f 43
37ccf8ec
FD
44#define GETPW_BUFFER_FALLBACK_SIZE 4096
45
7567352f 46struct run_as_data;
fe9f7760
FD
47struct run_as_ret;
48typedef int (*run_as_fct)(struct run_as_data *data, struct run_as_ret *ret_value);
c2b75c49 49
93bed9fe
JG
50enum run_as_cmd {
51 RUN_AS_MKDIR,
52 RUN_AS_MKDIRAT,
53 RUN_AS_MKDIR_RECURSIVE,
54 RUN_AS_MKDIRAT_RECURSIVE,
55 RUN_AS_OPEN,
56 RUN_AS_OPENAT,
57 RUN_AS_UNLINK,
58 RUN_AS_UNLINKAT,
59 RUN_AS_RMDIR,
60 RUN_AS_RMDIRAT,
61 RUN_AS_RMDIR_RECURSIVE,
62 RUN_AS_RMDIRAT_RECURSIVE,
63 RUN_AS_RENAME,
64 RUN_AS_RENAMEAT,
65 RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET,
66 RUN_AS_EXTRACT_SDT_PROBE_OFFSETS,
c73f064a 67 RUN_AS_GENERATE_FILTER_BYTECODE,
60b6c79c
MD
68};
69
93bed9fe
JG
70struct run_as_mkdir_data {
71 int dirfd;
72 char path[LTTNG_PATH_MAX];
73 mode_t mode;
74} LTTNG_PACKED;
75
e11d277b 76struct run_as_open_data {
93bed9fe
JG
77 int dirfd;
78 char path[LTTNG_PATH_MAX];
60b6c79c
MD
79 int flags;
80 mode_t mode;
93bed9fe 81} LTTNG_PACKED;
60b6c79c 82
4628484a 83struct run_as_unlink_data {
93bed9fe
JG
84 int dirfd;
85 char path[LTTNG_PATH_MAX];
86} LTTNG_PACKED;
4628484a 87
93bed9fe
JG
88struct run_as_rmdir_data {
89 int dirfd;
90 char path[LTTNG_PATH_MAX];
c73f064a 91 int flags; /* enum lttng_directory_handle_rmdir_recursive_flags. */
93bed9fe 92} LTTNG_PACKED;
7567352f 93
241e0a5a 94struct run_as_extract_elf_symbol_offset_data {
93bed9fe 95 int fd;
241e0a5a 96 char function[LTTNG_SYMBOL_NAME_LEN];
93bed9fe 97} LTTNG_PACKED;
241e0a5a 98
0ef03255 99struct run_as_extract_sdt_probe_offsets_data {
93bed9fe 100 int fd;
0ef03255
FD
101 char probe_name[LTTNG_SYMBOL_NAME_LEN];
102 char provider_name[LTTNG_SYMBOL_NAME_LEN];
93bed9fe 103} LTTNG_PACKED;
0ef03255 104
c73f064a
JR
105struct run_as_generate_filter_bytecode_data {
106 char filter_expression[LTTNG_FILTER_MAX_LEN];
107} LTTNG_PACKED;
108
93bed9fe
JG
109struct run_as_rename_data {
110 /*
111 * [0] = old_dirfd
112 * [1] = new_dirfd
113 */
114 int dirfds[2];
115 char old_path[LTTNG_PATH_MAX];
116 char new_path[LTTNG_PATH_MAX];
117} LTTNG_PACKED;
fe9f7760
FD
118
119struct run_as_open_ret {
93bed9fe
JG
120 int fd;
121} LTTNG_PACKED;
fe9f7760 122
241e0a5a
FD
123struct run_as_extract_elf_symbol_offset_ret {
124 uint64_t offset;
93bed9fe 125} LTTNG_PACKED;
241e0a5a 126
0ef03255
FD
127struct run_as_extract_sdt_probe_offsets_ret {
128 uint32_t num_offset;
b8e2fb80 129 uint64_t offsets[LTTNG_KERNEL_ABI_MAX_UPROBE_NUM];
93bed9fe 130} LTTNG_PACKED;
7567352f 131
c73f064a
JR
132struct run_as_generate_filter_bytecode_ret {
133 /* A lttng_bytecode_filter struct with 'dynamic' payload. */
134 char bytecode[LTTNG_FILTER_MAX_LEN];
135} LTTNG_PACKED;
136
7567352f
MD
137struct run_as_data {
138 enum run_as_cmd cmd;
139 union {
93bed9fe 140 struct run_as_mkdir_data mkdir;
7567352f
MD
141 struct run_as_open_data open;
142 struct run_as_unlink_data unlink;
93bed9fe
JG
143 struct run_as_rmdir_data rmdir;
144 struct run_as_rename_data rename;
241e0a5a 145 struct run_as_extract_elf_symbol_offset_data extract_elf_symbol_offset;
0ef03255 146 struct run_as_extract_sdt_probe_offsets_data extract_sdt_probe_offsets;
c73f064a 147 struct run_as_generate_filter_bytecode_data generate_filter_bytecode;
7567352f
MD
148 } u;
149 uid_t uid;
150 gid_t gid;
93bed9fe 151} LTTNG_PACKED;
4628484a 152
fe9f7760
FD
153/*
154 * The run_as_ret structure holds the returned value and status of the command.
155 *
156 * The `u` union field holds the return value of the command; in most cases it
157 * represents the success or the failure of the command. In more complex
158 * commands, it holds a computed value.
159 *
160 * The _errno field is the errno recorded after the execution of the command.
161 *
162 * The _error fields is used the signify that return status of the command. For
163 * simple commands returning `int` the _error field will be the same as the
164 * ret_int field. In complex commands, it signify the success or failure of the
165 * command.
166 *
167 */
df5b86c8 168struct run_as_ret {
fe9f7760 169 union {
93bed9fe 170 int ret;
fe9f7760 171 struct run_as_open_ret open;
241e0a5a 172 struct run_as_extract_elf_symbol_offset_ret extract_elf_symbol_offset;
0ef03255 173 struct run_as_extract_sdt_probe_offsets_ret extract_sdt_probe_offsets;
c73f064a 174 struct run_as_generate_filter_bytecode_ret generate_filter_bytecode;
fe9f7760 175 } u;
df5b86c8 176 int _errno;
fe9f7760 177 bool _error;
93bed9fe
JG
178} LTTNG_PACKED;
179
180#define COMMAND_IN_FDS(data_ptr) ({ \
181 int *fds = NULL; \
182 if (command_properties[data_ptr->cmd].in_fds_offset != -1) { \
183 fds = (int *) ((char *) data_ptr + command_properties[data_ptr->cmd].in_fds_offset); \
184 } \
185 fds; \
186})
187
188#define COMMAND_OUT_FDS(cmd, ret_ptr) ({ \
189 int *fds = NULL; \
190 if (command_properties[cmd].out_fds_offset != -1) { \
191 fds = (int *) ((char *) ret_ptr + command_properties[cmd].out_fds_offset); \
192 } \
193 fds; \
194})
195
196#define COMMAND_IN_FD_COUNT(data_ptr) ({ \
197 command_properties[data_ptr->cmd].in_fd_count; \
198})
199
200#define COMMAND_OUT_FD_COUNT(cmd) ({ \
201 command_properties[cmd].out_fd_count; \
202})
203
204#define COMMAND_USE_CWD_FD(data_ptr) command_properties[data_ptr->cmd].use_cwd_fd
205
206struct run_as_command_properties {
207 /* Set to -1 when not applicable. */
208 ptrdiff_t in_fds_offset, out_fds_offset;
209 unsigned int in_fd_count, out_fd_count;
210 bool use_cwd_fd;
211};
212
213static const struct run_as_command_properties command_properties[] = {
a6bc4ca9 214 {
93bed9fe 215 .in_fds_offset = offsetof(struct run_as_data, u.mkdir.dirfd),
93bed9fe 216 .out_fds_offset = -1,
a6bc4ca9 217 .in_fd_count = 1,
93bed9fe
JG
218 .out_fd_count = 0,
219 .use_cwd_fd = true,
220 },
a6bc4ca9 221 {
93bed9fe 222 .in_fds_offset = offsetof(struct run_as_data, u.mkdir.dirfd),
93bed9fe 223 .out_fds_offset = -1,
a6bc4ca9 224 .in_fd_count = 1,
93bed9fe
JG
225 .out_fd_count = 0,
226 .use_cwd_fd = false,
227 },
a6bc4ca9 228 {
93bed9fe 229 .in_fds_offset = offsetof(struct run_as_data, u.mkdir.dirfd),
93bed9fe 230 .out_fds_offset = -1,
a6bc4ca9 231 .in_fd_count = 1,
93bed9fe
JG
232 .out_fd_count = 0,
233 .use_cwd_fd = true,
234 },
a6bc4ca9 235 {
93bed9fe 236 .in_fds_offset = offsetof(struct run_as_data, u.mkdir.dirfd),
93bed9fe 237 .out_fds_offset = -1,
a6bc4ca9 238 .in_fd_count = 1,
93bed9fe
JG
239 .out_fd_count = 0,
240 .use_cwd_fd = false,
241 },
a6bc4ca9 242 {
93bed9fe 243 .in_fds_offset = offsetof(struct run_as_data, u.open.dirfd),
93bed9fe 244 .out_fds_offset = offsetof(struct run_as_ret, u.open.fd),
a6bc4ca9 245 .in_fd_count = 1,
93bed9fe
JG
246 .out_fd_count = 1,
247 .use_cwd_fd = true,
248 },
a6bc4ca9 249 {
93bed9fe 250 .in_fds_offset = offsetof(struct run_as_data, u.open.dirfd),
93bed9fe 251 .out_fds_offset = offsetof(struct run_as_ret, u.open.fd),
a6bc4ca9 252 .in_fd_count = 1,
93bed9fe
JG
253 .out_fd_count = 1,
254 .use_cwd_fd = false,
255 },
a6bc4ca9 256 {
93bed9fe 257 .in_fds_offset = offsetof(struct run_as_data, u.unlink.dirfd),
93bed9fe 258 .out_fds_offset = -1,
a6bc4ca9 259 .in_fd_count = 1,
93bed9fe
JG
260 .out_fd_count = 0,
261 .use_cwd_fd = true,
262 },
a6bc4ca9 263 {
93bed9fe 264 .in_fds_offset = offsetof(struct run_as_data, u.unlink.dirfd),
93bed9fe 265 .out_fds_offset = -1,
a6bc4ca9 266 .in_fd_count = 1,
93bed9fe
JG
267 .out_fd_count = 0,
268 .use_cwd_fd = false,
269 },
a6bc4ca9 270 {
93bed9fe 271 .in_fds_offset = offsetof(struct run_as_data, u.rmdir.dirfd),
93bed9fe 272 .out_fds_offset = -1,
a6bc4ca9 273 .in_fd_count = 1,
93bed9fe
JG
274 .out_fd_count = 0,
275 .use_cwd_fd = true,
276 },
a6bc4ca9 277 {
93bed9fe 278 .in_fds_offset = offsetof(struct run_as_data, u.rmdir.dirfd),
93bed9fe 279 .out_fds_offset = -1,
a6bc4ca9 280 .in_fd_count = 1,
93bed9fe
JG
281 .out_fd_count = 0,
282 .use_cwd_fd = false,
283 },
a6bc4ca9 284 {
93bed9fe 285 .in_fds_offset = offsetof(struct run_as_data, u.rmdir.dirfd),
93bed9fe 286 .out_fds_offset = -1,
a6bc4ca9 287 .in_fd_count = 1,
93bed9fe
JG
288 .out_fd_count = 0,
289 .use_cwd_fd = true,
290 },
a6bc4ca9 291 {
93bed9fe 292 .in_fds_offset = offsetof(struct run_as_data, u.rmdir.dirfd),
93bed9fe 293 .out_fds_offset = -1,
a6bc4ca9 294 .in_fd_count = 1,
93bed9fe
JG
295 .out_fd_count = 0,
296 .use_cwd_fd = false,
297 },
a6bc4ca9 298 {
93bed9fe 299 .in_fds_offset = offsetof(struct run_as_data, u.rename.dirfds),
93bed9fe 300 .out_fds_offset = -1,
a6bc4ca9 301 .in_fd_count = 2,
93bed9fe
JG
302 .out_fd_count = 0,
303 .use_cwd_fd = true,
304 },
a6bc4ca9 305 {
93bed9fe 306 .in_fds_offset = offsetof(struct run_as_data, u.rename.dirfds),
93bed9fe 307 .out_fds_offset = -1,
a6bc4ca9 308 .in_fd_count = 2,
93bed9fe
JG
309 .out_fd_count = 0,
310 .use_cwd_fd = false,
311 },
a6bc4ca9 312 {
93bed9fe
JG
313 .in_fds_offset = offsetof(struct run_as_data,
314 u.extract_elf_symbol_offset.fd),
93bed9fe 315 .out_fds_offset = -1,
a6bc4ca9 316 .in_fd_count = 1,
93bed9fe
JG
317 .out_fd_count = 0,
318 .use_cwd_fd = false,
319 },
a6bc4ca9 320 {
93bed9fe
JG
321 .in_fds_offset = offsetof(struct run_as_data,
322 u.extract_sdt_probe_offsets.fd),
93bed9fe 323 .out_fds_offset = -1,
a6bc4ca9 324 .in_fd_count = 1,
93bed9fe
JG
325 .out_fd_count = 0,
326 .use_cwd_fd = false,
327 },
a6bc4ca9 328 {
c73f064a 329 .in_fds_offset = -1,
c73f064a 330 .out_fds_offset = -1,
a6bc4ca9 331 .in_fd_count = 0,
c73f064a
JR
332 .out_fd_count = 0,
333 .use_cwd_fd = false,
334 },
df5b86c8
MD
335};
336
a6bc4ca9 337struct run_as_worker_data {
7567352f
MD
338 pid_t pid; /* Worker PID. */
339 int sockpair[2];
340 char *procname;
341};
342
343/* Single global worker per process (for now). */
a6bc4ca9 344static run_as_worker_data *global_worker;
7567352f
MD
345/* Lock protecting the worker. */
346static pthread_mutex_t worker_lock = PTHREAD_MUTEX_INITIALIZER;
347
8f0044bf
MD
348#ifdef VALGRIND
349static
350int use_clone(void)
351{
352 return 0;
353}
354#else
355static
356int use_clone(void)
357{
e8fa9fb0 358 return !lttng_secure_getenv("LTTNG_DEBUG_NOCLONE");
8f0044bf
MD
359}
360#endif
361
60b6c79c
MD
362/*
363 * Create recursively directory using the FULL path.
364 */
365static
18710679 366int _mkdirat_recursive(struct run_as_data *data, struct run_as_ret *ret_value)
60b6c79c 367{
60b6c79c 368 const char *path;
60b6c79c 369 mode_t mode;
cbf53d23 370 struct lttng_directory_handle *handle;
60b6c79c 371
93bed9fe
JG
372 path = data->u.mkdir.path;
373 mode = data->u.mkdir.mode;
60b6c79c 374
cbf53d23
JG
375 handle = lttng_directory_handle_create_from_dirfd(data->u.mkdir.dirfd);
376 if (!handle) {
377 ret_value->_errno = errno;
378 ret_value->_error = true;
379 ret_value->u.ret = -1;
380 goto end;
381 }
87bbb856 382 /* Ownership of dirfd is transferred to the handle. */
93bed9fe 383 data->u.mkdir.dirfd = -1;
d77dded2 384 /* Safe to call as we have transitioned to the requested uid/gid. */
cbf53d23
JG
385 ret_value->u.ret = lttng_directory_handle_create_subdirectory_recursive(
386 handle, path, mode);
fe9f7760 387 ret_value->_errno = errno;
93bed9fe 388 ret_value->_error = (ret_value->u.ret) ? true : false;
cbf53d23
JG
389 lttng_directory_handle_put(handle);
390end:
93bed9fe 391 return ret_value->u.ret;
60b6c79c
MD
392}
393
394static
18710679 395int _mkdirat(struct run_as_data *data, struct run_as_ret *ret_value)
60b6c79c 396{
18710679
JG
397 const char *path;
398 mode_t mode;
cbf53d23 399 struct lttng_directory_handle *handle;
18710679 400
93bed9fe
JG
401 path = data->u.mkdir.path;
402 mode = data->u.mkdir.mode;
18710679 403
cbf53d23
JG
404 handle = lttng_directory_handle_create_from_dirfd(data->u.mkdir.dirfd);
405 if (!handle) {
406 ret_value->u.ret = -1;
407 ret_value->_errno = errno;
408 ret_value->_error = true;
409 goto end;
410 }
87bbb856 411 /* Ownership of dirfd is transferred to the handle. */
93bed9fe 412 data->u.mkdir.dirfd = -1;
18710679 413 /* Safe to call as we have transitioned to the requested uid/gid. */
cbf53d23
JG
414 ret_value->u.ret = lttng_directory_handle_create_subdirectory(
415 handle, path, mode);
fe9f7760 416 ret_value->_errno = errno;
93bed9fe 417 ret_value->_error = (ret_value->u.ret) ? true : false;
cbf53d23
JG
418 lttng_directory_handle_put(handle);
419end:
93bed9fe 420 return ret_value->u.ret;
7567352f 421}
7ce36756 422
7567352f 423static
fe9f7760 424int _open(struct run_as_data *data, struct run_as_ret *ret_value)
7567352f 425{
93bed9fe 426 int fd;
cbf53d23 427 struct lttng_directory_handle *handle;
93bed9fe 428
cbf53d23
JG
429 handle = lttng_directory_handle_create_from_dirfd(data->u.open.dirfd);
430 if (!handle) {
431 ret_value->_errno = errno;
432 ret_value->_error = true;
433 ret_value->u.ret = -1;
434 goto end;
435 }
93bed9fe
JG
436 /* Ownership of dirfd is transferred to the handle. */
437 data->u.open.dirfd = -1;
438
cbf53d23 439 fd = lttng_directory_handle_open_file(handle,
93bed9fe
JG
440 data->u.open.path, data->u.open.flags,
441 data->u.open.mode);
442 if (fd < 0) {
443 ret_value->u.ret = -1;
444 ret_value->u.open.fd = -1;
445 } else {
446 ret_value->u.ret = 0;
447 ret_value->u.open.fd = fd;
448 }
449
fe9f7760 450 ret_value->_errno = errno;
93bed9fe 451 ret_value->_error = fd < 0;
cbf53d23
JG
452 lttng_directory_handle_put(handle);
453end:
93bed9fe 454 return ret_value->u.ret;
7567352f
MD
455}
456
457static
fe9f7760 458int _unlink(struct run_as_data *data, struct run_as_ret *ret_value)
7567352f 459{
cbf53d23 460 struct lttng_directory_handle *handle;
93bed9fe 461
cbf53d23
JG
462 handle = lttng_directory_handle_create_from_dirfd(data->u.unlink.dirfd);
463 if (!handle) {
464 ret_value->u.ret = -1;
465 ret_value->_errno = errno;
466 ret_value->_error = true;
467 goto end;
468 }
93bed9fe
JG
469
470 /* Ownership of dirfd is transferred to the handle. */
471 data->u.unlink.dirfd = -1;
472
cbf53d23 473 ret_value->u.ret = lttng_directory_handle_unlink_file(handle,
93bed9fe
JG
474 data->u.unlink.path);
475 ret_value->_errno = errno;
476 ret_value->_error = (ret_value->u.ret) ? true : false;
cbf53d23
JG
477 lttng_directory_handle_put(handle);
478end:
93bed9fe
JG
479 return ret_value->u.ret;
480}
481
482static
483int _rmdir(struct run_as_data *data, struct run_as_ret *ret_value)
484{
cbf53d23 485 struct lttng_directory_handle *handle;
93bed9fe 486
cbf53d23
JG
487 handle = lttng_directory_handle_create_from_dirfd(data->u.rmdir.dirfd);
488 if (!handle) {
489 ret_value->u.ret = -1;
490 ret_value->_errno = errno;
491 ret_value->_error = true;
492 goto end;
493 }
93bed9fe
JG
494
495 /* Ownership of dirfd is transferred to the handle. */
496 data->u.rmdir.dirfd = -1;
497
498 ret_value->u.ret = lttng_directory_handle_remove_subdirectory(
cbf53d23 499 handle, data->u.rmdir.path);
fe9f7760 500 ret_value->_errno = errno;
93bed9fe 501 ret_value->_error = (ret_value->u.ret) ? true : false;
cbf53d23
JG
502 lttng_directory_handle_put(handle);
503end:
93bed9fe 504 return ret_value->u.ret;
60b6c79c
MD
505}
506
507static
fe9f7760 508int _rmdir_recursive(struct run_as_data *data, struct run_as_ret *ret_value)
60b6c79c 509{
cbf53d23 510 struct lttng_directory_handle *handle;
93bed9fe 511
cbf53d23
JG
512 handle = lttng_directory_handle_create_from_dirfd(data->u.rmdir.dirfd);
513 if (!handle) {
514 ret_value->u.ret = -1;
515 ret_value->_errno = errno;
516 ret_value->_error = true;
517 goto end;
518 }
93bed9fe
JG
519
520 /* Ownership of dirfd is transferred to the handle. */
521 data->u.rmdir.dirfd = -1;
522
523 ret_value->u.ret = lttng_directory_handle_remove_subdirectory_recursive(
cbf53d23 524 handle, data->u.rmdir.path, data->u.rmdir.flags);
fe9f7760 525 ret_value->_errno = errno;
93bed9fe 526 ret_value->_error = (ret_value->u.ret) ? true : false;
cbf53d23
JG
527 lttng_directory_handle_put(handle);
528end:
93bed9fe
JG
529 return ret_value->u.ret;
530}
531
532static
533int _rename(struct run_as_data *data, struct run_as_ret *ret_value)
534{
535 const char *old_path, *new_path;
cbf53d23 536 struct lttng_directory_handle *old_handle = NULL, *new_handle = NULL;
93bed9fe
JG
537
538 old_path = data->u.rename.old_path;
539 new_path = data->u.rename.new_path;
540
cbf53d23 541 old_handle = lttng_directory_handle_create_from_dirfd(
93bed9fe 542 data->u.rename.dirfds[0]);
cbf53d23
JG
543 if (!old_handle) {
544 ret_value->u.ret = -1;
545 goto end;
546 }
547 new_handle = lttng_directory_handle_create_from_dirfd(
93bed9fe 548 data->u.rename.dirfds[1]);
cbf53d23
JG
549 if (!new_handle) {
550 ret_value->u.ret = -1;
551 goto end;
552 }
93bed9fe
JG
553
554 /* Ownership of dirfds are transferred to the handles. */
555 data->u.rename.dirfds[0] = data->u.rename.dirfds[1] = -1;
556
557 /* Safe to call as we have transitioned to the requested uid/gid. */
558 ret_value->u.ret = lttng_directory_handle_rename(
cbf53d23
JG
559 old_handle, old_path, new_handle, new_path);
560end:
561 lttng_directory_handle_put(old_handle);
562 lttng_directory_handle_put(new_handle);
93bed9fe
JG
563 ret_value->_errno = errno;
564 ret_value->_error = (ret_value->u.ret) ? true : false;
93bed9fe 565 return ret_value->u.ret;
7567352f 566}
df5b86c8 567
b1b34226 568#ifdef HAVE_ELF_H
241e0a5a
FD
569static
570int _extract_elf_symbol_offset(struct run_as_data *data,
571 struct run_as_ret *ret_value)
572{
573 int ret = 0;
65eefd4c 574 uint64_t offset;
241e0a5a 575
93bed9fe
JG
576 ret_value->_error = false;
577 ret = lttng_elf_get_symbol_offset(data->u.extract_elf_symbol_offset.fd,
241e0a5a 578 data->u.extract_elf_symbol_offset.function,
65eefd4c 579 &offset);
241e0a5a
FD
580 if (ret) {
581 DBG("Failed to extract ELF function offset");
582 ret_value->_error = true;
583 }
65eefd4c 584 ret_value->u.extract_elf_symbol_offset.offset = offset;
241e0a5a
FD
585
586 return ret;
587}
588
0ef03255
FD
589static
590int _extract_sdt_probe_offsets(struct run_as_data *data,
591 struct run_as_ret *ret_value)
592{
593 int ret = 0;
594 uint64_t *offsets = NULL;
595 uint32_t num_offset;
596
597 ret_value->_error = false;
598
599 /* On success, this call allocates the offsets paramater. */
93bed9fe
JG
600 ret = lttng_elf_get_sdt_probe_offsets(
601 data->u.extract_sdt_probe_offsets.fd,
0ef03255
FD
602 data->u.extract_sdt_probe_offsets.provider_name,
603 data->u.extract_sdt_probe_offsets.probe_name,
604 &offsets, &num_offset);
605
606 if (ret) {
607 DBG("Failed to extract SDT probe offsets");
608 ret_value->_error = true;
609 goto end;
610 }
611
b8e2fb80 612 if (num_offset <= 0 || num_offset > LTTNG_KERNEL_ABI_MAX_UPROBE_NUM) {
0ef03255
FD
613 DBG("Wrong number of probes.");
614 ret = -1;
615 ret_value->_error = true;
616 goto free_offset;
617 }
618
619 /* Copy the content of the offsets array to the ret struct. */
620 memcpy(ret_value->u.extract_sdt_probe_offsets.offsets,
621 offsets, num_offset * sizeof(uint64_t));
622
623 ret_value->u.extract_sdt_probe_offsets.num_offset = num_offset;
624
625free_offset:
626 free(offsets);
627end:
628 return ret;
629}
b1b34226
MJ
630#else
631static
4eac90eb
MJ
632int _extract_elf_symbol_offset(
633 struct run_as_data *data __attribute__((unused)),
634 struct run_as_ret *ret_value __attribute__((unused)))
b1b34226
MJ
635{
636 ERR("Unimplemented runas command RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET");
637 return -1;
638}
639
640static
4eac90eb
MJ
641int _extract_sdt_probe_offsets(
642 struct run_as_data *data __attribute__((unused)),
643 struct run_as_ret *ret_value __attribute__((unused)))
b1b34226
MJ
644{
645 ERR("Unimplemented runas command RUN_AS_EXTRACT_SDT_PROBE_OFFSETS");
646 return -1;
647}
648#endif
241e0a5a 649
c73f064a
JR
650static
651int _generate_filter_bytecode(struct run_as_data *data,
652 struct run_as_ret *ret_value) {
653 int ret = 0;
654 const char *filter_expression = NULL;
655 struct filter_parser_ctx *ctx = NULL;
656
657 ret_value->_error = false;
658
659 filter_expression = data->u.generate_filter_bytecode.filter_expression;
660
661 if (lttng_strnlen(filter_expression, LTTNG_FILTER_MAX_LEN - 1) == LTTNG_FILTER_MAX_LEN - 1) {
662 ret_value->_error = true;
663 ret = -1;
664 goto end;
665 }
666
667 ret = filter_parser_ctx_create_from_filter_expression(filter_expression, &ctx);
668 if (ret < 0) {
669 ret_value->_error = true;
670 ret = -1;
671 goto end;
672 }
673
674 DBG("Size of bytecode generated: %u bytes.",
675 bytecode_get_len(&ctx->bytecode->b));
676
677 /* Copy the lttng_bytecode_filter object to the return structure. */
678 memcpy(ret_value->u.generate_filter_bytecode.bytecode,
679 &ctx->bytecode->b,
680 sizeof(ctx->bytecode->b) +
681 bytecode_get_len(&ctx->bytecode->b));
682
683end:
684 if (ctx) {
685 filter_bytecode_free(ctx);
686 filter_ir_free(ctx);
687 filter_parser_ctx_free(ctx);
688 }
689
690 return ret;
691}
7567352f
MD
692static
693run_as_fct run_as_enum_to_fct(enum run_as_cmd cmd)
694{
695 switch (cmd) {
696 case RUN_AS_MKDIR:
18710679
JG
697 case RUN_AS_MKDIRAT:
698 return _mkdirat;
699 case RUN_AS_MKDIR_RECURSIVE:
700 case RUN_AS_MKDIRAT_RECURSIVE:
701 return _mkdirat_recursive;
7567352f 702 case RUN_AS_OPEN:
2912cead 703 case RUN_AS_OPENAT:
7567352f
MD
704 return _open;
705 case RUN_AS_UNLINK:
2912cead 706 case RUN_AS_UNLINKAT:
7567352f 707 return _unlink;
93bed9fe
JG
708 case RUN_AS_RMDIR:
709 case RUN_AS_RMDIRAT:
710 return _rmdir;
7567352f 711 case RUN_AS_RMDIR_RECURSIVE:
93bed9fe 712 case RUN_AS_RMDIRAT_RECURSIVE:
7567352f 713 return _rmdir_recursive;
93bed9fe
JG
714 case RUN_AS_RENAME:
715 case RUN_AS_RENAMEAT:
716 return _rename;
241e0a5a
FD
717 case RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET:
718 return _extract_elf_symbol_offset;
0ef03255
FD
719 case RUN_AS_EXTRACT_SDT_PROBE_OFFSETS:
720 return _extract_sdt_probe_offsets;
c73f064a
JR
721 case RUN_AS_GENERATE_FILTER_BYTECODE:
722 return _generate_filter_bytecode;
7567352f 723 default:
62a7b8ed 724 ERR("Unknown command %d", (int) cmd);
7567352f
MD
725 return NULL;
726 }
60b6c79c
MD
727}
728
4628484a 729static
93bed9fe 730int do_send_fds(int sock, const int *fds, unsigned int fd_count)
4628484a 731{
7567352f 732 ssize_t len;
93bed9fe
JG
733 unsigned int i;
734
735 for (i = 0; i < fd_count; i++) {
736 if (fds[i] < 0) {
a4c64187 737 DBG("Attempt to send invalid file descriptor (fd = %i)",
93bed9fe
JG
738 fds[i]);
739 /* Return 0 as this is not a fatal error. */
740 return 0;
741 }
4a76dfd3 742 }
4628484a 743
4a76dfd3 744 len = lttcomm_send_fds_unix_sock(sock, fds, fd_count);
93bed9fe 745 return len < 0 ? -1 : 0;
4628484a
MD
746}
747
748static
93bed9fe 749int do_recv_fds(int sock, int *fds, unsigned int fd_count)
4628484a 750{
93bed9fe
JG
751 int ret = 0;
752 unsigned int i;
7567352f 753 ssize_t len;
4628484a 754
93bed9fe
JG
755 len = lttcomm_recv_fds_unix_sock(sock, fds, fd_count);
756 if (len == 0) {
757 ret = -1;
758 goto end;
da9ee832 759 } else if (len < 0) {
93bed9fe
JG
760 PERROR("Failed to receive file descriptors from socket");
761 ret = -1;
762 goto end;
ca9eb994
JG
763 }
764
93bed9fe
JG
765 for (i = 0; i < fd_count; i++) {
766 if (fds[i] < 0) {
767 ERR("Invalid file descriptor received from worker (fd = %i)", fds[i]);
768 /* Return 0 as this is not a fatal error. */
769 }
55cb0d6f 770 }
93bed9fe 771end:
55cb0d6f 772 return ret;
4628484a
MD
773}
774
fe9f7760 775static
a6bc4ca9 776int send_fds_to_worker(const run_as_worker_data *worker,
93bed9fe 777 const struct run_as_data *data)
fe9f7760
FD
778{
779 int ret = 0;
93bed9fe 780 unsigned int i;
fe9f7760 781
93bed9fe
JG
782 if (COMMAND_USE_CWD_FD(data) || COMMAND_IN_FD_COUNT(data) == 0) {
783 goto end;
fe9f7760
FD
784 }
785
93bed9fe
JG
786 for (i = 0; i < COMMAND_IN_FD_COUNT(data); i++) {
787 if (COMMAND_IN_FDS(data)[i] < 0) {
788 ERR("Refusing to send invalid fd to worker (fd = %i)",
789 COMMAND_IN_FDS(data)[i]);
790 ret = -1;
791 goto end;
792 }
55cb0d6f 793 }
ca9eb994 794
55cb0d6f 795 ret = do_send_fds(worker->sockpair[0], COMMAND_IN_FDS(data),
93bed9fe 796 COMMAND_IN_FD_COUNT(data));
fe9f7760 797 if (ret < 0) {
93bed9fe 798 PERROR("Failed to send file descriptor to run-as worker");
fe9f7760 799 ret = -1;
93bed9fe 800 goto end;
fe9f7760 801 }
93bed9fe 802end:
fe9f7760
FD
803 return ret;
804}
805
806static
a6bc4ca9 807int send_fds_to_master(run_as_worker_data *worker, enum run_as_cmd cmd,
93bed9fe 808 struct run_as_ret *run_as_ret)
fe9f7760 809{
93bed9fe
JG
810 int ret = 0;
811 unsigned int i;
fe9f7760 812
93bed9fe
JG
813 if (COMMAND_OUT_FD_COUNT(cmd) == 0) {
814 goto end;
fe9f7760
FD
815 }
816
93bed9fe
JG
817 ret = do_send_fds(worker->sockpair[1], COMMAND_OUT_FDS(cmd, run_as_ret),
818 COMMAND_OUT_FD_COUNT(cmd));
fe9f7760 819 if (ret < 0) {
93bed9fe
JG
820 PERROR("Failed to send file descriptor to master process");
821 goto end;
fe9f7760
FD
822 }
823
93bed9fe 824 for (i = 0; i < COMMAND_OUT_FD_COUNT(cmd); i++) {
a4c64187
FD
825 int fd = COMMAND_OUT_FDS(cmd, run_as_ret)[i];
826 if (fd >= 0) {
827 int ret_close = close(fd);
828
829 if (ret_close < 0) {
830 PERROR("Failed to close result file descriptor (fd = %i)",
831 fd);
832 }
93bed9fe
JG
833 }
834 }
835end:
fe9f7760
FD
836 return ret;
837}
838
839static
a6bc4ca9 840int recv_fds_from_worker(const run_as_worker_data *worker, enum run_as_cmd cmd,
93bed9fe 841 struct run_as_ret *run_as_ret)
fe9f7760
FD
842{
843 int ret = 0;
844
93bed9fe
JG
845 if (COMMAND_OUT_FD_COUNT(cmd) == 0) {
846 goto end;
fe9f7760
FD
847 }
848
93bed9fe
JG
849 ret = do_recv_fds(worker->sockpair[0], COMMAND_OUT_FDS(cmd, run_as_ret),
850 COMMAND_OUT_FD_COUNT(cmd));
fe9f7760 851 if (ret < 0) {
93bed9fe 852 PERROR("Failed to receive file descriptor from run-as worker");
fe9f7760
FD
853 ret = -1;
854 }
93bed9fe 855end:
fe9f7760
FD
856 return ret;
857}
858
859static
a6bc4ca9 860int recv_fds_from_master(run_as_worker_data *worker, struct run_as_data *data)
fe9f7760
FD
861{
862 int ret = 0;
863
93bed9fe
JG
864 if (COMMAND_USE_CWD_FD(data)) {
865 unsigned int i;
866
867 for (i = 0; i < COMMAND_IN_FD_COUNT(data); i++) {
868 COMMAND_IN_FDS(data)[i] = AT_FDCWD;
869 }
870 goto end;
fe9f7760
FD
871 }
872
c73f064a
JR
873 if (COMMAND_IN_FD_COUNT(data) == 0) {
874 goto end;
875 }
876
93bed9fe
JG
877 ret = do_recv_fds(worker->sockpair[1], COMMAND_IN_FDS(data),
878 COMMAND_IN_FD_COUNT(data));
fe9f7760 879 if (ret < 0) {
93bed9fe 880 PERROR("Failed to receive file descriptors from master process");
fe9f7760
FD
881 ret = -1;
882 }
93bed9fe 883end:
fe9f7760
FD
884 return ret;
885}
886
887static
93bed9fe 888int cleanup_received_fds(struct run_as_data *data)
fe9f7760 889{
93bed9fe 890 int ret = 0, i;
fe9f7760 891
93bed9fe
JG
892 for (i = 0; i < COMMAND_IN_FD_COUNT(data); i++) {
893 if (COMMAND_IN_FDS(data)[i] == -1) {
894 continue;
895 }
896 ret = close(COMMAND_IN_FDS(data)[i]);
897 if (ret) {
898 PERROR("Failed to close file descriptor received fd in run-as worker");
899 goto end;
900 }
fe9f7760 901 }
93bed9fe 902end:
fe9f7760
FD
903 return ret;
904}
0ef03255 905
37ccf8ec
FD
906static int get_user_infos_from_uid(
907 uid_t uid, char **username, gid_t *primary_gid)
908{
909 int ret;
910 char *buf = NULL;
222b6734
FD
911 long raw_get_pw_buf_size;
912 size_t get_pw_buf_size;
37ccf8ec
FD
913 struct passwd pwd;
914 struct passwd *result = NULL;
915
916 /* Fetch the max size for the temporary buffer. */
917 errno = 0;
222b6734
FD
918 raw_get_pw_buf_size = sysconf(_SC_GETPW_R_SIZE_MAX);
919 if (raw_get_pw_buf_size < 0) {
37ccf8ec
FD
920 if (errno != 0) {
921 PERROR("Failed to query _SC_GETPW_R_SIZE_MAX");
922 goto error;
923 }
924
925 /* Limit is indeterminate. */
926 WARN("Failed to query _SC_GETPW_R_SIZE_MAX as it is "
927 "indeterminate; falling back to default buffer size");
222b6734 928 raw_get_pw_buf_size = GETPW_BUFFER_FALLBACK_SIZE;
37ccf8ec
FD
929 }
930
222b6734
FD
931 get_pw_buf_size = (size_t) raw_get_pw_buf_size;
932
a6bc4ca9 933 buf = (char *) zmalloc(get_pw_buf_size);
37ccf8ec
FD
934 if (buf == NULL) {
935 PERROR("Failed to allocate buffer to get password file entries");
936 goto error;
937 }
938
222b6734 939 ret = getpwuid_r(uid, &pwd, buf, get_pw_buf_size, &result);
37ccf8ec
FD
940 if (ret < 0) {
941 PERROR("Failed to get user information for user: uid = %d",
942 (int) uid);
943 goto error;
944 }
945
946 if (result == NULL) {
947 ERR("Failed to find user information in password entries: uid = %d",
948 (int) uid);
949 ret = -1;
950 goto error;
951 }
952
953 *username = strdup(result->pw_name);
954 if (*username == NULL) {
955 PERROR("Failed to copy user name");
956 goto error;
957 }
958
959 *primary_gid = result->pw_gid;
960
961end:
962 free(buf);
963 return ret;
964error:
965 *username = NULL;
966 *primary_gid = -1;
967 ret = -1;
968 goto end;
969}
970
971static int demote_creds(
972 uid_t prev_uid, gid_t prev_gid, uid_t new_uid, gid_t new_gid)
973{
974 int ret = 0;
975 gid_t primary_gid;
976 char *username = NULL;
977
978 /* Change the group id. */
979 if (prev_gid != new_gid) {
980 ret = setegid(new_gid);
981 if (ret < 0) {
982 PERROR("Failed to set effective group id: new_gid = %d",
983 (int) new_gid);
984 goto end;
985 }
986 }
987
988 /* Change the user id. */
989 if (prev_uid != new_uid) {
990 ret = get_user_infos_from_uid(new_uid, &username, &primary_gid);
991 if (ret < 0) {
992 goto end;
993 }
994
995 /*
996 * Initialize the supplementary group access list.
997 *
998 * This is needed to handle cases where the supplementary groups
999 * of the user the process is demoting-to would give it access
1000 * to a given file/folder, but not it's primary group.
1001 *
1002 * e.g
1003 * username: User1
1004 * Primary Group: User1
1005 * Secondary group: Disk, Network
1006 *
1007 * mkdir inside the following directory must work since User1
1008 * is part of the Network group.
1009 *
1010 * drwxrwx--- 2 root Network 4096 Jul 23 17:17 /tmp/my_folder/
1011 *
1012 *
1013 * The order of the following initgroups and seteuid calls is
1014 * important here;
1015 * Only a root process or one with CAP_SETGID capability can
1016 * call the the initgroups() function. We must initialize the
1017 * supplementary groups before we change the effective
1018 * UID to a less-privileged user.
1019 */
1020 ret = initgroups(username, primary_gid);
1021 if (ret < 0) {
1022 PERROR("Failed to init the supplementary group access list: "
1023 "username = `%s`, primary gid = %d", username,
1024 (int) primary_gid);
1025 goto end;
1026 }
1027
1028 ret = seteuid(new_uid);
1029 if (ret < 0) {
1030 PERROR("Failed to set effective user id: new_uid = %d",
1031 (int) new_uid);
1032 goto end;
1033 }
1034 }
1035end:
1036 free(username);
1037 return ret;
1038}
1039
1040static int promote_creds(
1041 uid_t prev_uid, gid_t prev_gid, uid_t new_uid, gid_t new_gid)
1042{
1043 int ret = 0;
1044 gid_t primary_gid;
1045 char *username = NULL;
1046
1047 /* Change the group id. */
1048 if (prev_gid != new_gid) {
1049 ret = setegid(new_gid);
1050 if (ret < 0) {
1051 PERROR("Failed to set effective group id: new_gid = %d",
1052 (int) new_gid);
1053 goto end;
1054 }
1055 }
1056
1057 /* Change the user id. */
1058 if (prev_uid != new_uid) {
1059 ret = get_user_infos_from_uid(new_uid, &username, &primary_gid);
1060 if (ret < 0) {
1061 goto end;
1062 }
1063
1064 /*
1065 * seteuid call must be done before the initgroups call because
1066 * we need to be privileged (CAP_SETGID) to call initgroups().
1067 */
1068 ret = seteuid(new_uid);
1069 if (ret < 0) {
1070 PERROR("Failed to set effective user id: new_uid = %d",
1071 (int) new_uid);
1072 goto end;
1073 }
1074
1075 /*
1076 * Initialize the supplementary group access list.
1077 *
1078 * There is a possibility the groups we set in the following
1079 * initgroups() call are not exactly the same as the ones we
1080 * had when we originally demoted. This can happen if the
1081 * /etc/group file is modified after the runas process is
1082 * forked. This is very unlikely.
1083 */
1084 ret = initgroups(username, primary_gid);
1085 if (ret < 0) {
1086 PERROR("Failed to init the supplementary group access "
1087 "list: username = `%s`, primary gid = %d",
1088 username, (int) primary_gid)
1089 goto end;
1090 }
1091 }
1092end:
1093 free(username);
1094 return ret;
1095}
1096
7567352f
MD
1097/*
1098 * Return < 0 on error, 0 if OK, 1 on hangup.
1099 */
c2b75c49 1100static
a6bc4ca9 1101int handle_one_cmd(run_as_worker_data *worker)
c2b75c49 1102{
37ccf8ec 1103 int ret = 0, promote_ret;
55cb0d6f
JG
1104 struct run_as_data data = {};
1105 ssize_t readlen, writelen;
1106 struct run_as_ret sendret = {};
1107 run_as_fct cmd;
45d6ecaa
JG
1108 const uid_t prev_ruid = getuid();
1109 const gid_t prev_rgid = getgid();
7567352f 1110
fe9f7760
FD
1111 /*
1112 * Stage 1: Receive run_as_data struct from the master.
1113 * The structure contains the command type and all the parameters needed for
1114 * its execution
1115 */
7567352f
MD
1116 readlen = lttcomm_recv_unix_sock(worker->sockpair[1], &data,
1117 sizeof(data));
1118 if (readlen == 0) {
1119 /* hang up */
1120 ret = 1;
1121 goto end;
1122 }
1123 if (readlen < sizeof(data)) {
1124 PERROR("lttcomm_recv_unix_sock error");
1125 ret = -1;
1126 goto end;
1127 }
c2b75c49 1128
7567352f
MD
1129 cmd = run_as_enum_to_fct(data.cmd);
1130 if (!cmd) {
1131 ret = -1;
1132 goto end;
1133 }
1134
fe9f7760
FD
1135 /*
1136 * Stage 2: Receive file descriptor from master.
1137 * Some commands need a file descriptor as input so if it's needed we
1138 * receive the fd using the Unix socket.
1139 */
93bed9fe 1140 ret = recv_fds_from_master(worker, &data);
fe9f7760
FD
1141 if (ret < 0) {
1142 PERROR("recv_fd_from_master error");
1143 ret = -1;
1144 goto end;
1145 }
1146
37ccf8ec
FD
1147 ret = demote_creds(prev_ruid, prev_rgid, data.uid, data.gid);
1148 if (ret < 0) {
1149 goto write_return;
c2b75c49 1150 }
fe9f7760 1151
c2b75c49
MD
1152 /*
1153 * Also set umask to 0 for mkdir executable bit.
1154 */
1155 umask(0);
fe9f7760
FD
1156
1157 /*
1158 * Stage 3: Execute the command
1159 */
1160 ret = (*cmd)(&data, &sendret);
1161 if (ret < 0) {
1162 DBG("Execution of command returned an error");
1163 }
6d73c4ef
MD
1164
1165write_return:
93bed9fe 1166 ret = cleanup_received_fds(&data);
fe9f7760
FD
1167 if (ret < 0) {
1168 ERR("Error cleaning up FD");
37ccf8ec 1169 goto promote_back;
fe9f7760
FD
1170 }
1171
1172 /*
1173 * Stage 4: Send run_as_ret structure to the master.
1174 * This structure contain the return value of the command and the errno.
1175 */
7567352f
MD
1176 writelen = lttcomm_send_unix_sock(worker->sockpair[1], &sendret,
1177 sizeof(sendret));
6cd525e8 1178 if (writelen < sizeof(sendret)) {
7567352f
MD
1179 PERROR("lttcomm_send_unix_sock error");
1180 ret = -1;
37ccf8ec 1181 goto promote_back;
7567352f 1182 }
fe9f7760
FD
1183
1184 /*
93bed9fe 1185 * Stage 5: Send resulting file descriptors to the master.
fe9f7760 1186 */
93bed9fe 1187 ret = send_fds_to_master(worker, data.cmd, &sendret);
fe9f7760
FD
1188 if (ret < 0) {
1189 DBG("Sending FD to master returned an error");
7567352f 1190 }
fe9f7760 1191
7567352f 1192 ret = 0;
37ccf8ec
FD
1193
1194promote_back:
1195 /* Return to previous uid/gid. */
1196 promote_ret = promote_creds(data.uid, data.gid, prev_ruid, prev_rgid);
1197 if (promote_ret < 0) {
1198 ERR("Failed to promote back to the initial credentials");
1199 }
1200
7567352f
MD
1201end:
1202 return ret;
1203}
1204
1205static
a6bc4ca9 1206int run_as_worker(run_as_worker_data *worker)
7567352f
MD
1207{
1208 int ret;
1209 ssize_t writelen;
1210 struct run_as_ret sendret;
1211 size_t proc_orig_len;
1212
1213 /*
1214 * Initialize worker. Set a different process cmdline.
1215 */
1216 proc_orig_len = strlen(worker->procname);
1217 memset(worker->procname, 0, proc_orig_len);
1218 strncpy(worker->procname, DEFAULT_RUN_AS_WORKER_NAME, proc_orig_len);
1219
cb8d0d24 1220 ret = lttng_thread_setname(DEFAULT_RUN_AS_WORKER_NAME);
e1055edb 1221 if (ret && ret != -ENOSYS) {
b8090274 1222 /* Don't fail as this is not essential. */
cb8d0d24 1223 DBG("Failed to set pthread name attribute");
6cd525e8 1224 }
7567352f 1225
fe9f7760
FD
1226 memset(&sendret, 0, sizeof(sendret));
1227
7567352f
MD
1228 writelen = lttcomm_send_unix_sock(worker->sockpair[1], &sendret,
1229 sizeof(sendret));
1230 if (writelen < sizeof(sendret)) {
1231 PERROR("lttcomm_send_unix_sock error");
1232 ret = EXIT_FAILURE;
1233 goto end;
1234 }
1235
1236 for (;;) {
1237 ret = handle_one_cmd(worker);
1238 if (ret < 0) {
1239 ret = EXIT_FAILURE;
1240 goto end;
1241 } else if (ret > 0) {
1242 break;
1243 } else {
1244 continue; /* Next command. */
1245 }
1246 }
1247 ret = EXIT_SUCCESS;
1248end:
1249 return ret;
c2b75c49
MD
1250}
1251
60b6c79c 1252static
a6bc4ca9 1253int run_as_cmd(run_as_worker_data *worker,
7567352f
MD
1254 enum run_as_cmd cmd,
1255 struct run_as_data *data,
fe9f7760 1256 struct run_as_ret *ret_value,
7567352f 1257 uid_t uid, gid_t gid)
60b6c79c 1258{
fe9f7760 1259 int ret = 0;
7567352f 1260 ssize_t readlen, writelen;
60b6c79c
MD
1261
1262 /*
1263 * If we are non-root, we can only deal with our own uid.
1264 */
1265 if (geteuid() != 0) {
1266 if (uid != geteuid()) {
fe9f7760
FD
1267 ret = -1;
1268 ret_value->_errno = EPERM;
60b6c79c 1269 ERR("Client (%d)/Server (%d) UID mismatch (and sessiond is not root)",
08797918 1270 (int) uid, (int) geteuid());
df5b86c8 1271 goto end;
60b6c79c 1272 }
60b6c79c
MD
1273 }
1274
7567352f
MD
1275 data->cmd = cmd;
1276 data->uid = uid;
1277 data->gid = gid;
1278
fe9f7760
FD
1279 /*
1280 * Stage 1: Send the run_as_data struct to the worker process
1281 */
7567352f
MD
1282 writelen = lttcomm_send_unix_sock(worker->sockpair[0], data,
1283 sizeof(*data));
1284 if (writelen < sizeof(*data)) {
1285 PERROR("Error writing message to run_as");
fe9f7760
FD
1286 ret = -1;
1287 ret_value->_errno = EIO;
60b6c79c 1288 goto end;
c2b75c49 1289 }
7567352f 1290
fe9f7760
FD
1291 /*
1292 * Stage 2: Send file descriptor to the worker process if needed
1293 */
93bed9fe 1294 ret = send_fds_to_worker(worker, data);
fe9f7760
FD
1295 if (ret) {
1296 PERROR("do_send_fd error");
1297 ret = -1;
1298 ret_value->_errno = EIO;
1299 goto end;
1300 }
1301
1302 /*
1303 * Stage 3: Wait for the execution of the command
1304 */
1305
1306 /*
1307 * Stage 4: Receive the run_as_ret struct containing the return value and
1308 * errno
1309 */
1310 readlen = lttcomm_recv_unix_sock(worker->sockpair[0], ret_value,
1311 sizeof(*ret_value));
da9ee832
JG
1312 if (!readlen) {
1313 ERR("Run-as worker has hung-up during run_as_cmd");
fe9f7760
FD
1314 ret = -1;
1315 ret_value->_errno = EIO;
da9ee832 1316 goto end;
fe9f7760 1317 } else if (readlen < sizeof(*ret_value)) {
7567352f 1318 PERROR("Error reading response from run_as");
fe9f7760
FD
1319 ret = -1;
1320 ret_value->_errno = errno;
033b58a7 1321 goto end;
6cd525e8 1322 }
fe9f7760 1323
ca9eb994
JG
1324 if (ret_value->_error) {
1325 /* Skip stage 5 on error as there will be no fd to receive. */
1326 goto end;
1327 }
1328
fe9f7760
FD
1329 /*
1330 * Stage 5: Receive file descriptor if needed
1331 */
93bed9fe 1332 ret = recv_fds_from_worker(worker, cmd, ret_value);
fe9f7760
FD
1333 if (ret < 0) {
1334 ERR("Error receiving fd");
1335 ret = -1;
1336 ret_value->_errno = EIO;
4c462e79 1337 }
7567352f 1338
60b6c79c 1339end:
fe9f7760 1340 return ret;
60b6c79c
MD
1341}
1342
2d85a600 1343/*
7567352f 1344 * This is for debugging ONLY and should not be considered secure.
2d85a600
MD
1345 */
1346static
fe9f7760
FD
1347int run_as_noworker(enum run_as_cmd cmd,
1348 struct run_as_data *data, struct run_as_ret *ret_value,
f46376a1 1349 uid_t uid __attribute__((unused)), gid_t gid __attribute__((unused)))
2d85a600 1350{
df5b86c8 1351 int ret, saved_errno;
5b73926f 1352 mode_t old_mask;
7567352f 1353 run_as_fct fct;
5b73926f 1354
7567352f
MD
1355 fct = run_as_enum_to_fct(cmd);
1356 if (!fct) {
1357 errno = -ENOSYS;
1358 ret = -1;
1359 goto end;
1360 }
5b73926f 1361 old_mask = umask(0);
fe9f7760
FD
1362 ret = fct(data, ret_value);
1363 saved_errno = ret_value->_errno;
5b73926f 1364 umask(old_mask);
df5b86c8 1365 errno = saved_errno;
7567352f 1366end:
5b73926f 1367 return ret;
2d85a600
MD
1368}
1369
8fec83ea
JG
1370static
1371int reset_sighandler(void)
1372{
1373 int sig;
1374
1375 DBG("Resetting run_as worker signal handlers to default");
1376 for (sig = 1; sig <= 31; sig++) {
1377 (void) signal(sig, SIG_DFL);
1378 }
1379 return 0;
1380}
1381
1382static
1383void worker_sighandler(int sig)
1384{
1385 const char *signame;
1386
1387 /*
1388 * The worker will inherit its parent's signals since they are part of
1389 * the same process group. However, in the case of SIGINT and SIGTERM,
1390 * we want to give the worker a chance to teardown gracefully when its
1391 * parent closes the command socket.
1392 */
1393 switch (sig) {
1394 case SIGINT:
1395 signame = "SIGINT";
1396 break;
1397 case SIGTERM:
1398 signame = "SIGTERM";
1399 break;
1400 default:
1401 signame = NULL;
1402 }
1403
1404 if (signame) {
1405 DBG("run_as worker received signal %s", signame);
1406 } else {
1407 DBG("run_as_worker received signal %d", sig);
1408 }
1409}
1410
1411static
1412int set_worker_sighandlers(void)
1413{
1414 int ret = 0;
1415 sigset_t sigset;
1416 struct sigaction sa;
1417
1418 if ((ret = sigemptyset(&sigset)) < 0) {
1419 PERROR("sigemptyset");
1420 goto end;
1421 }
1422
1423 sa.sa_handler = worker_sighandler;
1424 sa.sa_mask = sigset;
1425 sa.sa_flags = 0;
1426 if ((ret = sigaction(SIGINT, &sa, NULL)) < 0) {
1427 PERROR("sigaction SIGINT");
1428 goto end;
1429 }
1430
1431 if ((ret = sigaction(SIGTERM, &sa, NULL)) < 0) {
1432 PERROR("sigaction SIGTERM");
1433 goto end;
1434 }
1435
1436 DBG("run_as signal handler set for SIGTERM and SIGINT");
1437end:
1438 return ret;
1439}
1440
1441static
929f71ec
JG
1442int run_as_create_worker_no_lock(const char *procname,
1443 post_fork_cleanup_cb clean_up_func,
1444 void *clean_up_user_data)
8fec83ea
JG
1445{
1446 pid_t pid;
1447 int i, ret = 0;
1448 ssize_t readlen;
1449 struct run_as_ret recvret;
a6bc4ca9 1450 run_as_worker_data *worker;
8fec83ea 1451
a0377dfe 1452 LTTNG_ASSERT(!global_worker);
8fec83ea
JG
1453 if (!use_clone()) {
1454 /*
1455 * Don't initialize a worker, all run_as tasks will be performed
1456 * in the current process.
1457 */
1458 ret = 0;
1459 goto end;
1460 }
a6bc4ca9 1461 worker = (run_as_worker_data *) zmalloc(sizeof(*worker));
8fec83ea
JG
1462 if (!worker) {
1463 ret = -ENOMEM;
1464 goto end;
1465 }
1466 worker->procname = strdup(procname);
1467 if (!worker->procname) {
1468 ret = -ENOMEM;
8c96eded 1469 goto error_procname_alloc;
8fec83ea
JG
1470 }
1471 /* Create unix socket. */
1472 if (lttcomm_create_anon_unix_socketpair(worker->sockpair) < 0) {
1473 ret = -1;
1474 goto error_sock;
1475 }
1476
1477 /* Fork worker. */
1478 pid = fork();
1479 if (pid < 0) {
1480 PERROR("fork");
1481 ret = -1;
1482 goto error_fork;
1483 } else if (pid == 0) {
1484 /* Child */
1485
1486 reset_sighandler();
1487
1488 set_worker_sighandlers();
c989e0d4
FD
1489
1490 logger_set_thread_name("Run-as worker", true);
1491
929f71ec
JG
1492 if (clean_up_func) {
1493 if (clean_up_func(clean_up_user_data) < 0) {
1494 ERR("Run-as post-fork clean-up failed, exiting.");
1495 exit(EXIT_FAILURE);
1496 }
1497 }
8fec83ea
JG
1498
1499 /* Just close, no shutdown. */
1500 if (close(worker->sockpair[0])) {
1501 PERROR("close");
1502 exit(EXIT_FAILURE);
1503 }
1504
1505 /*
1506 * Close all FDs aside from STDIN, STDOUT, STDERR and sockpair[1]
1507 * Sockpair[1] is used as a control channel with the master
1508 */
1509 for (i = 3; i < sysconf(_SC_OPEN_MAX); i++) {
1510 if (i != worker->sockpair[1]) {
1511 (void) close(i);
1512 }
1513 }
1514
1515 worker->sockpair[0] = -1;
1516 ret = run_as_worker(worker);
1517 if (lttcomm_close_unix_sock(worker->sockpair[1])) {
1518 PERROR("close");
1519 ret = -1;
1520 }
1521 worker->sockpair[1] = -1;
55cb0d6f 1522 free(worker->procname);
340cf672 1523 free(worker);
8fec83ea
JG
1524 LOG(ret ? PRINT_ERR : PRINT_DBG, "run_as worker exiting (ret = %d)", ret);
1525 exit(ret ? EXIT_FAILURE : EXIT_SUCCESS);
1526 } else {
1527 /* Parent */
1528
1529 /* Just close, no shutdown. */
1530 if (close(worker->sockpair[1])) {
1531 PERROR("close");
1532 ret = -1;
1533 goto error_fork;
1534 }
1535 worker->sockpair[1] = -1;
1536 worker->pid = pid;
1537 /* Wait for worker to become ready. */
1538 readlen = lttcomm_recv_unix_sock(worker->sockpair[0],
1539 &recvret, sizeof(recvret));
1540 if (readlen < sizeof(recvret)) {
1541 ERR("readlen: %zd", readlen);
1542 PERROR("Error reading response from run_as at creation");
1543 ret = -1;
1544 goto error_fork;
1545 }
1546 global_worker = worker;
1547 }
1548end:
1549 return ret;
1550
1551 /* Error handling. */
1552error_fork:
1553 for (i = 0; i < 2; i++) {
1554 if (worker->sockpair[i] < 0) {
1555 continue;
1556 }
1557 if (lttcomm_close_unix_sock(worker->sockpair[i])) {
1558 PERROR("close");
1559 }
1560 worker->sockpair[i] = -1;
1561 }
1562error_sock:
8c96eded
FD
1563 free(worker->procname);
1564error_procname_alloc:
8fec83ea
JG
1565 free(worker);
1566 return ret;
1567}
1568
a01c682b
JR
1569static
1570void run_as_destroy_worker_no_lock(void)
1571{
a6bc4ca9 1572 run_as_worker_data *worker = global_worker;
a01c682b
JR
1573
1574 DBG("Destroying run_as worker");
1575 if (!worker) {
1576 return;
1577 }
1578 /* Close unix socket */
1579 DBG("Closing run_as worker socket");
1580 if (lttcomm_close_unix_sock(worker->sockpair[0])) {
1581 PERROR("close");
1582 }
1583 worker->sockpair[0] = -1;
1584 /* Wait for worker. */
1585 for (;;) {
1586 int status;
1587 pid_t wait_ret;
1588
1589 wait_ret = waitpid(worker->pid, &status, 0);
1590 if (wait_ret < 0) {
1591 if (errno == EINTR) {
1592 continue;
1593 }
1594 PERROR("waitpid");
1595 break;
1596 }
1597
1598 if (WIFEXITED(status)) {
1599 LOG(WEXITSTATUS(status) == 0 ? PRINT_DBG : PRINT_ERR,
1600 DEFAULT_RUN_AS_WORKER_NAME " terminated with status code %d",
55cb0d6f 1601 WEXITSTATUS(status));
a01c682b
JR
1602 break;
1603 } else if (WIFSIGNALED(status)) {
1604 ERR(DEFAULT_RUN_AS_WORKER_NAME " was killed by signal %d",
1605 WTERMSIG(status));
1606 break;
1607 }
1608 }
1609 free(worker->procname);
1610 free(worker);
1611 global_worker = NULL;
1612}
1613
2d85a600 1614static
a6bc4ca9 1615int run_as_restart_worker(run_as_worker_data *worker)
2d85a600 1616{
fe9f7760
FD
1617 int ret = 0;
1618 char *procname = NULL;
1619
1620 procname = worker->procname;
1621
1622 /* Close socket to run_as worker process and clean up the zombie process */
a01c682b 1623 run_as_destroy_worker_no_lock();
fe9f7760
FD
1624
1625 /* Create a new run_as worker process*/
929f71ec 1626 ret = run_as_create_worker_no_lock(procname, NULL, NULL);
fe9f7760
FD
1627 if (ret < 0 ) {
1628 ERR("Restarting the worker process failed");
1629 ret = -1;
1630 goto err;
1631 }
1632err:
1633 return ret;
1634}
1635
1636static
1637int run_as(enum run_as_cmd cmd, struct run_as_data *data,
1638 struct run_as_ret *ret_value, uid_t uid, gid_t gid)
1639{
1640 int ret, saved_errno;
7567352f 1641
8fec83ea 1642 pthread_mutex_lock(&worker_lock);
749b7a0c 1643 if (use_clone()) {
7567352f 1644 DBG("Using run_as worker");
8fec83ea 1645
a0377dfe 1646 LTTNG_ASSERT(global_worker);
749b7a0c 1647
fe9f7760
FD
1648 ret = run_as_cmd(global_worker, cmd, data, ret_value, uid, gid);
1649 saved_errno = ret_value->_errno;
1650
fe9f7760
FD
1651 /*
1652 * If the worker thread crashed the errno is set to EIO. we log
1653 * the error and start a new worker process.
1654 */
1655 if (ret == -1 && saved_errno == EIO) {
1656 DBG("Socket closed unexpectedly... "
1657 "Restarting the worker process");
1658 ret = run_as_restart_worker(global_worker);
fe9f7760
FD
1659 if (ret == -1) {
1660 ERR("Failed to restart worker process.");
1661 goto err;
1662 }
1663 }
2d85a600 1664 } else {
7567352f 1665 DBG("Using run_as without worker");
fe9f7760 1666 ret = run_as_noworker(cmd, data, ret_value, uid, gid);
2d85a600 1667 }
fe9f7760 1668err:
8fec83ea 1669 pthread_mutex_unlock(&worker_lock);
7567352f 1670 return ret;
2d85a600
MD
1671}
1672
e11d277b 1673int run_as_mkdir_recursive(const char *path, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 1674{
18710679
JG
1675 return run_as_mkdirat_recursive(AT_FDCWD, path, mode, uid, gid);
1676}
1677
18710679
JG
1678int run_as_mkdirat_recursive(int dirfd, const char *path, mode_t mode,
1679 uid_t uid, gid_t gid)
1680{
1681 int ret;
93bed9fe
JG
1682 struct run_as_data data = {};
1683 struct run_as_ret run_as_ret = {};
60b6c79c 1684
18710679
JG
1685 DBG3("mkdirat() recursive fd = %d%s, path = %s, mode = %d, uid = %d, gid = %d",
1686 dirfd, dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
08797918 1687 path, (int) mode, (int) uid, (int) gid);
93bed9fe
JG
1688 ret = lttng_strncpy(data.u.mkdir.path, path,
1689 sizeof(data.u.mkdir.path));
18710679
JG
1690 if (ret) {
1691 ERR("Failed to copy path argument of mkdirat recursive command");
1692 goto error;
1693 }
93bed9fe
JG
1694 data.u.mkdir.path[sizeof(data.u.mkdir.path) - 1] = '\0';
1695 data.u.mkdir.mode = mode;
1696 data.u.mkdir.dirfd = dirfd;
18710679
JG
1697 run_as(dirfd == AT_FDCWD ? RUN_AS_MKDIR_RECURSIVE : RUN_AS_MKDIRAT_RECURSIVE,
1698 &data, &run_as_ret, uid, gid);
1699 errno = run_as_ret._errno;
93bed9fe 1700 ret = run_as_ret.u.ret;
18710679
JG
1701error:
1702 return ret;
60b6c79c
MD
1703}
1704
e11d277b 1705int run_as_mkdir(const char *path, mode_t mode, uid_t uid, gid_t gid)
60b6c79c 1706{
18710679
JG
1707 return run_as_mkdirat(AT_FDCWD, path, mode, uid, gid);
1708}
1709
18710679
JG
1710int run_as_mkdirat(int dirfd, const char *path, mode_t mode,
1711 uid_t uid, gid_t gid)
1712{
1713 int ret;
93bed9fe
JG
1714 struct run_as_data data = {};
1715 struct run_as_ret run_as_ret = {};
fe9f7760 1716
18710679
JG
1717 DBG3("mkdirat() recursive fd = %d%s, path = %s, mode = %d, uid = %d, gid = %d",
1718 dirfd, dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
08797918 1719 path, (int) mode, (int) uid, (int) gid);
93bed9fe
JG
1720 ret = lttng_strncpy(data.u.mkdir.path, path,
1721 sizeof(data.u.mkdir.path));
18710679
JG
1722 if (ret) {
1723 ERR("Failed to copy path argument of mkdirat command");
1724 goto error;
1725 }
93bed9fe
JG
1726 data.u.mkdir.path[sizeof(data.u.mkdir.path) - 1] = '\0';
1727 data.u.mkdir.mode = mode;
1728 data.u.mkdir.dirfd = dirfd;
18710679
JG
1729 run_as(dirfd == AT_FDCWD ? RUN_AS_MKDIR : RUN_AS_MKDIRAT,
1730 &data, &run_as_ret, uid, gid);
1731 errno = run_as_ret._errno;
93bed9fe 1732 ret = run_as_ret.u.ret;
18710679
JG
1733error:
1734 return ret;
60b6c79c
MD
1735}
1736
2912cead 1737int run_as_open(const char *path, int flags, mode_t mode, uid_t uid,
55cb0d6f 1738 gid_t gid)
2912cead
JG
1739{
1740 return run_as_openat(AT_FDCWD, path, flags, mode, uid, gid);
1741}
1742
2912cead
JG
1743int run_as_openat(int dirfd, const char *path, int flags, mode_t mode,
1744 uid_t uid, gid_t gid)
60b6c79c 1745{
93bed9fe 1746 int ret;
55cb0d6f
JG
1747 struct run_as_data data = {};
1748 struct run_as_ret run_as_ret = {};
fe9f7760 1749
2912cead
JG
1750 DBG3("openat() fd = %d%s, path = %s, flags = %X, mode = %d, uid %d, gid %d",
1751 dirfd, dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
08797918 1752 path, flags, (int) mode, (int) uid, (int) gid);
93bed9fe
JG
1753 ret = lttng_strncpy(data.u.open.path, path, sizeof(data.u.open.path));
1754 if (ret) {
1755 ERR("Failed to copy path argument of open command");
1756 goto error;
1757 }
7567352f
MD
1758 data.u.open.flags = flags;
1759 data.u.open.mode = mode;
93bed9fe 1760 data.u.open.dirfd = dirfd;
2912cead 1761 run_as(dirfd == AT_FDCWD ? RUN_AS_OPEN : RUN_AS_OPENAT,
93bed9fe
JG
1762 &data, &run_as_ret, uid, gid);
1763 errno = run_as_ret._errno;
1764 ret = run_as_ret.u.ret < 0 ? run_as_ret.u.ret :
1765 run_as_ret.u.open.fd;
1766error:
1767 return ret;
60b6c79c 1768}
4628484a 1769
4628484a 1770int run_as_unlink(const char *path, uid_t uid, gid_t gid)
2912cead
JG
1771{
1772 return run_as_unlinkat(AT_FDCWD, path, uid, gid);
1773}
1774
2912cead 1775int run_as_unlinkat(int dirfd, const char *path, uid_t uid, gid_t gid)
4628484a 1776{
93bed9fe
JG
1777 int ret;
1778 struct run_as_data data = {};
1779 struct run_as_ret run_as_ret = {};
fe9f7760 1780
2912cead
JG
1781 DBG3("unlinkat() fd = %d%s, path = %s, uid = %d, gid = %d",
1782 dirfd, dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
08797918 1783 path, (int) uid, (int) gid);
93bed9fe
JG
1784 ret = lttng_strncpy(data.u.unlink.path, path,
1785 sizeof(data.u.unlink.path));
1786 if (ret) {
1787 goto error;
1788 }
1789 data.u.unlink.dirfd = dirfd;
1790 run_as(dirfd == AT_FDCWD ? RUN_AS_UNLINK : RUN_AS_UNLINKAT, &data,
1791 &run_as_ret, uid, gid);
1792 errno = run_as_ret._errno;
1793 ret = run_as_ret.u.ret;
1794error:
1795 return ret;
1796}
1797
93bed9fe
JG
1798int run_as_rmdir(const char *path, uid_t uid, gid_t gid)
1799{
1800 return run_as_rmdirat(AT_FDCWD, path, uid, gid);
1801}
1802
93bed9fe
JG
1803int run_as_rmdirat(int dirfd, const char *path, uid_t uid, gid_t gid)
1804{
1805 int ret;
1806 struct run_as_data data = {};
1807 struct run_as_ret run_as_ret = {};
1808
1809 DBG3("rmdirat() fd = %d%s, path = %s, uid = %d, gid = %d",
1810 dirfd, dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
1811 path, (int) uid, (int) gid);
1812 ret = lttng_strncpy(data.u.rmdir.path, path,
1813 sizeof(data.u.rmdir.path));
1814 if (ret) {
1815 goto error;
1816 }
1817 data.u.rmdir.dirfd = dirfd;
1818 run_as(dirfd == AT_FDCWD ? RUN_AS_RMDIR : RUN_AS_RMDIRAT, &data,
1819 &run_as_ret, uid, gid);
1820 errno = run_as_ret._errno;
1821 ret = run_as_ret.u.ret;
1822error:
1823 return ret;
4628484a
MD
1824}
1825
f75c5439 1826int run_as_rmdir_recursive(const char *path, uid_t uid, gid_t gid, int flags)
4628484a 1827{
f75c5439 1828 return run_as_rmdirat_recursive(AT_FDCWD, path, uid, gid, flags);
93bed9fe 1829}
fe9f7760 1830
f75c5439 1831int run_as_rmdirat_recursive(int dirfd, const char *path, uid_t uid, gid_t gid, int flags)
93bed9fe
JG
1832{
1833 int ret;
1834 struct run_as_data data = {};
1835 struct run_as_ret run_as_ret = {};
4628484a 1836
93bed9fe
JG
1837 DBG3("rmdirat() recursive fd = %d%s, path = %s, uid = %d, gid = %d",
1838 dirfd, dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
08797918 1839 path, (int) uid, (int) gid);
93bed9fe
JG
1840 ret = lttng_strncpy(data.u.rmdir.path, path,
1841 sizeof(data.u.rmdir.path));
1842 if (ret) {
1843 goto error;
1844 }
1845 data.u.rmdir.dirfd = dirfd;
f75c5439 1846 data.u.rmdir.flags = flags;
93bed9fe
JG
1847 run_as(dirfd == AT_FDCWD ? RUN_AS_RMDIR_RECURSIVE : RUN_AS_RMDIRAT_RECURSIVE,
1848 &data, &run_as_ret, uid, gid);
1849 errno = run_as_ret._errno;
1850 ret = run_as_ret.u.ret;
1851error:
1852 return ret;
1853}
1854
a6bc4ca9 1855int run_as_rename(const char *old_name, const char *new_name, uid_t uid, gid_t gid)
93bed9fe 1856{
a6bc4ca9 1857 return run_as_renameat(AT_FDCWD, old_name, AT_FDCWD, new_name, uid, gid);
93bed9fe
JG
1858}
1859
93bed9fe
JG
1860int run_as_renameat(int old_dirfd, const char *old_name,
1861 int new_dirfd, const char *new_name, uid_t uid, gid_t gid)
1862{
1863 int ret;
1864 struct run_as_data data = {};
1865 struct run_as_ret run_as_ret = {};
1866
1867 DBG3("renameat() old_dirfd = %d%s, old_name = %s, new_dirfd = %d%s, new_name = %s, uid = %d, gid = %d",
1868 old_dirfd, old_dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
1869 old_name,
1870 new_dirfd, new_dirfd == AT_FDCWD ? " (AT_FDCWD)" : "",
1871 new_name, (int) uid, (int) gid);
1872 ret = lttng_strncpy(data.u.rename.old_path, old_name,
1873 sizeof(data.u.rename.old_path));
1874 if (ret) {
1875 goto error;
1876 }
1877 ret = lttng_strncpy(data.u.rename.new_path, new_name,
1878 sizeof(data.u.rename.new_path));
1879 if (ret) {
1880 goto error;
1881 }
1882
1883 data.u.rename.dirfds[0] = old_dirfd;
1884 data.u.rename.dirfds[1] = new_dirfd;
1885 run_as(old_dirfd == AT_FDCWD && new_dirfd == AT_FDCWD ?
1886 RUN_AS_RENAME : RUN_AS_RENAMEAT,
1887 &data, &run_as_ret, uid, gid);
1888 errno = run_as_ret._errno;
1889 ret = run_as_ret.u.ret;
1890error:
1891 return ret;
7567352f
MD
1892}
1893
241e0a5a
FD
1894int run_as_extract_elf_symbol_offset(int fd, const char* function,
1895 uid_t uid, gid_t gid, uint64_t *offset)
1896{
93bed9fe
JG
1897 int ret;
1898 struct run_as_data data = {};
55cb0d6f 1899 struct run_as_ret run_as_ret = {};
f726677b 1900
241e0a5a 1901 DBG3("extract_elf_symbol_offset() on fd=%d and function=%s "
93bed9fe
JG
1902 "with for uid %d and gid %d", fd, function,
1903 (int) uid, (int) gid);
241e0a5a 1904
93bed9fe 1905 data.u.extract_elf_symbol_offset.fd = fd;
241e0a5a
FD
1906
1907 strncpy(data.u.extract_elf_symbol_offset.function, function, LTTNG_SYMBOL_NAME_LEN - 1);
241e0a5a 1908 data.u.extract_elf_symbol_offset.function[LTTNG_SYMBOL_NAME_LEN - 1] = '\0';
93bed9fe
JG
1909 ret = lttng_strncpy(data.u.extract_elf_symbol_offset.function,
1910 function,
1911 sizeof(data.u.extract_elf_symbol_offset.function));
1912 if (ret) {
1913 goto error;
1914 }
241e0a5a 1915
93bed9fe
JG
1916 run_as(RUN_AS_EXTRACT_ELF_SYMBOL_OFFSET, &data, &run_as_ret, uid, gid);
1917 errno = run_as_ret._errno;
1918 if (run_as_ret._error) {
1919 ret = -1;
1920 goto error;
241e0a5a
FD
1921 }
1922
93bed9fe
JG
1923 *offset = run_as_ret.u.extract_elf_symbol_offset.offset;
1924error:
1925 return ret;
241e0a5a
FD
1926}
1927
0ef03255
FD
1928int run_as_extract_sdt_probe_offsets(int fd, const char* provider_name,
1929 const char* probe_name, uid_t uid, gid_t gid,
1930 uint64_t **offsets, uint32_t *num_offset)
1931{
93bed9fe
JG
1932 int ret;
1933 struct run_as_data data = {};
1934 struct run_as_ret run_as_ret = {};
f726677b 1935
0ef03255 1936 DBG3("extract_sdt_probe_offsets() on fd=%d, probe_name=%s and "
93bed9fe
JG
1937 "provider_name=%s with for uid %d and gid %d", fd,
1938 probe_name, provider_name, (int) uid, (int) gid);
0ef03255 1939
93bed9fe 1940 data.u.extract_sdt_probe_offsets.fd = fd;
0ef03255 1941
93bed9fe
JG
1942 ret = lttng_strncpy(data.u.extract_sdt_probe_offsets.probe_name, probe_name,
1943 sizeof(data.u.extract_sdt_probe_offsets.probe_name));
1944 if (ret) {
1945 goto error;
1946 }
1947 ret = lttng_strncpy(data.u.extract_sdt_probe_offsets.provider_name,
1948 provider_name,
1949 sizeof(data.u.extract_sdt_probe_offsets.provider_name));
1950 if (ret) {
1951 goto error;
0ef03255
FD
1952 }
1953
93bed9fe
JG
1954 run_as(RUN_AS_EXTRACT_SDT_PROBE_OFFSETS, &data, &run_as_ret, uid, gid);
1955 errno = run_as_ret._errno;
1956 if (run_as_ret._error) {
1957 ret = -1;
1958 goto error;
1959 }
0ef03255 1960
93bed9fe 1961 *num_offset = run_as_ret.u.extract_sdt_probe_offsets.num_offset;
a6bc4ca9 1962 *offsets = (uint64_t *) zmalloc(*num_offset * sizeof(uint64_t));
0ef03255 1963 if (!*offsets) {
93bed9fe
JG
1964 ret = -ENOMEM;
1965 goto error;
0ef03255
FD
1966 }
1967
93bed9fe
JG
1968 memcpy(*offsets, run_as_ret.u.extract_sdt_probe_offsets.offsets,
1969 *num_offset * sizeof(uint64_t));
1970error:
1971 return ret;
0ef03255
FD
1972}
1973
c73f064a 1974int run_as_generate_filter_bytecode(const char *filter_expression,
58daac01 1975 const struct lttng_credentials *creds,
2b00d462 1976 struct lttng_bytecode **bytecode)
c73f064a
JR
1977{
1978 int ret;
1979 struct run_as_data data = {};
1980 struct run_as_ret run_as_ret = {};
2b00d462
SM
1981 const struct lttng_bytecode *view_bytecode = NULL;
1982 struct lttng_bytecode *local_bytecode = NULL;
58daac01
JR
1983 const uid_t uid = lttng_credentials_get_uid(creds);
1984 const gid_t gid = lttng_credentials_get_gid(creds);
c73f064a
JR
1985
1986 DBG3("generate_filter_bytecode() from expression=\"%s\" for uid %d and gid %d",
1987 filter_expression, (int) uid, (int) gid);
1988
1989 ret = lttng_strncpy(data.u.generate_filter_bytecode.filter_expression, filter_expression,
1990 sizeof(data.u.generate_filter_bytecode.filter_expression));
1991 if (ret) {
1992 goto error;
1993 }
1994
1995 run_as(RUN_AS_GENERATE_FILTER_BYTECODE, &data, &run_as_ret, uid, gid);
1996 errno = run_as_ret._errno;
1997 if (run_as_ret._error) {
1998 ret = -1;
1999 goto error;
2000 }
2001
2b00d462 2002 view_bytecode = (const struct lttng_bytecode *) run_as_ret.u.generate_filter_bytecode.bytecode;
c73f064a 2003
a6bc4ca9 2004 local_bytecode = (lttng_bytecode *) zmalloc(sizeof(*local_bytecode) + view_bytecode->len);
c73f064a
JR
2005 if (!local_bytecode) {
2006 ret = -ENOMEM;
2007 goto error;
2008 }
2009
2010 memcpy(local_bytecode, run_as_ret.u.generate_filter_bytecode.bytecode,
2011 sizeof(*local_bytecode) + view_bytecode->len);
2012 *bytecode = local_bytecode;
2013error:
2014 return ret;
2015}
2016
929f71ec
JG
2017int run_as_create_worker(const char *procname,
2018 post_fork_cleanup_cb clean_up_func,
2019 void *clean_up_user_data)
7567352f 2020{
8fec83ea 2021 int ret;
7567352f 2022
749b7a0c 2023 pthread_mutex_lock(&worker_lock);
929f71ec
JG
2024 ret = run_as_create_worker_no_lock(procname, clean_up_func,
2025 clean_up_user_data);
749b7a0c 2026 pthread_mutex_unlock(&worker_lock);
7567352f
MD
2027 return ret;
2028}
2029
7567352f
MD
2030void run_as_destroy_worker(void)
2031{
749b7a0c 2032 pthread_mutex_lock(&worker_lock);
a01c682b 2033 run_as_destroy_worker_no_lock();
749b7a0c 2034 pthread_mutex_unlock(&worker_lock);
4628484a 2035}
This page took 0.169476 seconds and 4 git commands to generate.