Fix: overlap bash escaping for wildcard event name
[lttng-tools.git] / src / common / sessiond-comm / unix.c
CommitLineData
0d37f2bc
DG
1/*
2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
12 * more details.
13 *
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
17 */
18
19#define _GNU_SOURCE
20#include <assert.h>
21#include <limits.h>
22#include <stdio.h>
23#include <stdlib.h>
24#include <string.h>
25#include <sys/stat.h>
26#include <sys/types.h>
27#include <unistd.h>
28#include <errno.h>
29
30#include <common/defaults.h>
31#include <common/error.h>
32
33#include "unix.h"
34
35/*
36 * Connect to unix socket using the path name.
37 */
32dd26fb 38__attribute__((visibility("hidden")))
0d37f2bc
DG
39int lttcomm_connect_unix_sock(const char *pathname)
40{
41 struct sockaddr_un sun;
42 int fd, ret, closeret;
43
44 fd = socket(PF_UNIX, SOCK_STREAM, 0);
45 if (fd < 0) {
46 PERROR("socket");
47 ret = fd;
48 goto error;
49 }
50
51 memset(&sun, 0, sizeof(sun));
52 sun.sun_family = AF_UNIX;
53 strncpy(sun.sun_path, pathname, sizeof(sun.sun_path));
54 sun.sun_path[sizeof(sun.sun_path) - 1] = '\0';
55
56 ret = connect(fd, (struct sockaddr *) &sun, sizeof(sun));
57 if (ret < 0) {
58 /*
59 * Don't print message on connect error, because connect is used in
60 * normal execution to detect if sessiond is alive.
61 */
62 goto error_connect;
63 }
64
65 return fd;
66
67error_connect:
68 closeret = close(fd);
69 if (closeret) {
70 PERROR("close");
71 }
72error:
73 return ret;
74}
75
76/*
77 * Do an accept(2) on the sock and return the new file descriptor. The socket
78 * MUST be bind(2) before.
79 */
32dd26fb 80__attribute__((visibility("hidden")))
0d37f2bc
DG
81int lttcomm_accept_unix_sock(int sock)
82{
83 int new_fd;
84 struct sockaddr_un sun;
85 socklen_t len = 0;
86
87 /* Blocking call */
88 new_fd = accept(sock, (struct sockaddr *) &sun, &len);
89 if (new_fd < 0) {
90 PERROR("accept");
91 }
92
93 return new_fd;
94}
95
96/*
97 * Creates a AF_UNIX local socket using pathname bind the socket upon creation
98 * and return the fd.
99 */
32dd26fb 100__attribute__((visibility("hidden")))
0d37f2bc
DG
101int lttcomm_create_unix_sock(const char *pathname)
102{
103 struct sockaddr_un sun;
104 int fd;
105 int ret = -1;
106
107 /* Create server socket */
108 if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0) {
109 PERROR("socket");
110 goto error;
111 }
112
113 memset(&sun, 0, sizeof(sun));
114 sun.sun_family = AF_UNIX;
115 strncpy(sun.sun_path, pathname, sizeof(sun.sun_path));
116 sun.sun_path[sizeof(sun.sun_path) - 1] = '\0';
117
118 /* Unlink the old file if present */
119 (void) unlink(pathname);
120 ret = bind(fd, (struct sockaddr *) &sun, sizeof(sun));
121 if (ret < 0) {
122 PERROR("bind");
123 goto error;
124 }
125
126 return fd;
127
128error:
129 return ret;
130}
131
132/*
133 * Make the socket listen using LTTNG_SESSIOND_COMM_MAX_LISTEN.
134 */
32dd26fb 135__attribute__((visibility("hidden")))
0d37f2bc
DG
136int lttcomm_listen_unix_sock(int sock)
137{
138 int ret;
139
140 ret = listen(sock, LTTNG_SESSIOND_COMM_MAX_LISTEN);
141 if (ret < 0) {
142 PERROR("listen");
143 }
144
145 return ret;
146}
147
148/*
149 * Receive data of size len in put that data into the buf param. Using recvmsg
150 * API.
151 *
152 * Return the size of received data.
153 */
32dd26fb 154__attribute__((visibility("hidden")))
0d37f2bc
DG
155ssize_t lttcomm_recv_unix_sock(int sock, void *buf, size_t len)
156{
157 struct msghdr msg;
158 struct iovec iov[1];
159 ssize_t ret = -1;
160
161 memset(&msg, 0, sizeof(msg));
162
163 iov[0].iov_base = buf;
164 iov[0].iov_len = len;
165 msg.msg_iov = iov;
166 msg.msg_iovlen = 1;
167
168 do {
169 ret = recvmsg(sock, &msg, MSG_WAITALL);
170 } while (ret < 0 && errno == EINTR);
171 if (ret < 0) {
172 PERROR("recvmsg");
173 }
174
175 return ret;
176}
177
178/*
179 * Send buf data of size len. Using sendmsg API.
180 *
181 * Return the size of sent data.
182 */
32dd26fb 183__attribute__((visibility("hidden")))
0d37f2bc
DG
184ssize_t lttcomm_send_unix_sock(int sock, void *buf, size_t len)
185{
186 struct msghdr msg;
187 struct iovec iov[1];
188 ssize_t ret = -1;
189
190 memset(&msg, 0, sizeof(msg));
191
192 iov[0].iov_base = buf;
193 iov[0].iov_len = len;
194 msg.msg_iov = iov;
195 msg.msg_iovlen = 1;
196
197 ret = sendmsg(sock, &msg, 0);
198 if (ret < 0) {
199 /*
200 * Only warn about EPIPE when quiet mode is deactivated.
201 * We consider EPIPE as expected.
202 */
203 if (errno != EPIPE || !lttng_opt_quiet) {
204 PERROR("sendmsg");
205 }
206 }
207
208 return ret;
209}
210
211/*
212 * Shutdown cleanly a unix socket.
213 */
32dd26fb 214__attribute__((visibility("hidden")))
0d37f2bc
DG
215int lttcomm_close_unix_sock(int sock)
216{
217 int ret, closeret;
218
219 /* Shutdown receptions and transmissions */
220 ret = shutdown(sock, SHUT_RDWR);
221 if (ret < 0) {
222 PERROR("shutdown");
223 }
224
225 closeret = close(sock);
226 if (closeret) {
227 PERROR("close");
228 }
229
230 return ret;
231}
232
233/*
234 * Send a message accompanied by fd(s) over a unix socket.
235 *
236 * Returns the size of data sent, or negative error value.
237 */
32dd26fb 238__attribute__((visibility("hidden")))
0d37f2bc
DG
239ssize_t lttcomm_send_fds_unix_sock(int sock, int *fds, size_t nb_fd)
240{
241 struct msghdr msg;
242 struct cmsghdr *cmptr;
243 struct iovec iov[1];
244 ssize_t ret = -1;
245 unsigned int sizeof_fds = nb_fd * sizeof(int);
246 char tmp[CMSG_SPACE(sizeof_fds)];
247 char dummy = 0;
248
249 memset(&msg, 0, sizeof(msg));
250
251 if (nb_fd > LTTCOMM_MAX_SEND_FDS)
252 return -EINVAL;
253
254 msg.msg_control = (caddr_t)tmp;
255 msg.msg_controllen = CMSG_LEN(sizeof_fds);
256
257 cmptr = CMSG_FIRSTHDR(&msg);
258 cmptr->cmsg_level = SOL_SOCKET;
259 cmptr->cmsg_type = SCM_RIGHTS;
260 cmptr->cmsg_len = CMSG_LEN(sizeof_fds);
261 memcpy(CMSG_DATA(cmptr), fds, sizeof_fds);
262 /* Sum of the length of all control messages in the buffer: */
263 msg.msg_controllen = cmptr->cmsg_len;
264
265 iov[0].iov_base = &dummy;
266 iov[0].iov_len = 1;
267 msg.msg_iov = iov;
268 msg.msg_iovlen = 1;
269
270 do {
271 ret = sendmsg(sock, &msg, 0);
272 } while (ret < 0 && errno == EINTR);
273 if (ret < 0) {
274 /*
275 * Only warn about EPIPE when quiet mode is deactivated.
276 * We consider EPIPE as expected.
277 */
278 if (errno != EPIPE || !lttng_opt_quiet) {
279 PERROR("sendmsg");
280 }
281 }
282 return ret;
283}
284
285/*
286 * Recv a message accompanied by fd(s) from a unix socket.
287 *
288 * Returns the size of received data, or negative error value.
289 *
290 * Expect at most "nb_fd" file descriptors. Returns the number of fd
291 * actually received in nb_fd.
292 */
32dd26fb 293__attribute__((visibility("hidden")))
0d37f2bc
DG
294ssize_t lttcomm_recv_fds_unix_sock(int sock, int *fds, size_t nb_fd)
295{
296 struct iovec iov[1];
297 ssize_t ret = 0;
298 struct cmsghdr *cmsg;
299 size_t sizeof_fds = nb_fd * sizeof(int);
300 char recv_fd[CMSG_SPACE(sizeof_fds)];
301 struct msghdr msg;
302 char dummy;
303
304 memset(&msg, 0, sizeof(msg));
305
306 /* Prepare to receive the structures */
307 iov[0].iov_base = &dummy;
308 iov[0].iov_len = 1;
309 msg.msg_iov = iov;
310 msg.msg_iovlen = 1;
311 msg.msg_control = recv_fd;
312 msg.msg_controllen = sizeof(recv_fd);
313
314 do {
315 ret = recvmsg(sock, &msg, 0);
316 } while (ret < 0 && errno == EINTR);
317 if (ret < 0) {
318 PERROR("recvmsg fds");
319 goto end;
320 }
321 if (ret != 1) {
322 fprintf(stderr, "Error: Received %zd bytes, expected %d\n",
323 ret, 1);
324 goto end;
325 }
326 if (msg.msg_flags & MSG_CTRUNC) {
327 fprintf(stderr, "Error: Control message truncated.\n");
328 ret = -1;
329 goto end;
330 }
331 cmsg = CMSG_FIRSTHDR(&msg);
332 if (!cmsg) {
333 fprintf(stderr, "Error: Invalid control message header\n");
334 ret = -1;
335 goto end;
336 }
337 if (cmsg->cmsg_level != SOL_SOCKET || cmsg->cmsg_type != SCM_RIGHTS) {
338 fprintf(stderr, "Didn't received any fd\n");
339 ret = -1;
340 goto end;
341 }
342 if (cmsg->cmsg_len != CMSG_LEN(sizeof_fds)) {
343 fprintf(stderr, "Error: Received %zu bytes of ancillary data, expected %zu\n",
344 (size_t) cmsg->cmsg_len, (size_t) CMSG_LEN(sizeof_fds));
345 ret = -1;
346 goto end;
347 }
348 memcpy(fds, CMSG_DATA(cmsg), sizeof_fds);
349 ret = sizeof_fds;
350end:
351 return ret;
352}
353
354/*
355 * Send a message with credentials over a unix socket.
356 *
357 * Returns the size of data sent, or negative error value.
358 */
32dd26fb 359__attribute__((visibility("hidden")))
0d37f2bc
DG
360ssize_t lttcomm_send_creds_unix_sock(int sock, void *buf, size_t len)
361{
362 struct msghdr msg;
363 struct iovec iov[1];
364 ssize_t ret = -1;
365#ifdef __linux__
366 struct cmsghdr *cmptr;
367 size_t sizeof_cred = sizeof(lttng_sock_cred);
368 char anc_buf[CMSG_SPACE(sizeof_cred)];
369 lttng_sock_cred *creds;
370#endif /* __linux__ */
371
372 memset(&msg, 0, sizeof(msg));
373
374 iov[0].iov_base = buf;
375 iov[0].iov_len = len;
376 msg.msg_iov = iov;
377 msg.msg_iovlen = 1;
378
379#ifdef __linux__
380 msg.msg_control = (caddr_t) anc_buf;
381 msg.msg_controllen = CMSG_LEN(sizeof_cred);
382
383 cmptr = CMSG_FIRSTHDR(&msg);
384 cmptr->cmsg_level = SOL_SOCKET;
385 cmptr->cmsg_type = LTTNG_SOCK_CREDS;
386 cmptr->cmsg_len = CMSG_LEN(sizeof_cred);
387
388 creds = (lttng_sock_cred*) CMSG_DATA(cmptr);
389
390 LTTNG_SOCK_SET_UID_CRED(creds, geteuid());
391 LTTNG_SOCK_SET_GID_CRED(creds, getegid());
392 LTTNG_SOCK_SET_PID_CRED(creds, getpid());
393#endif /* __linux__ */
394
395 do {
396 ret = sendmsg(sock, &msg, 0);
397 } while (ret < 0 && errno == EINTR);
398 if (ret < 0) {
399 /*
400 * Only warn about EPIPE when quiet mode is deactivated.
401 * We consider EPIPE as expected.
402 */
403 if (errno != EPIPE || !lttng_opt_quiet) {
404 PERROR("sendmsg");
405 }
406 }
407 return ret;
408}
409
410/*
411 * Recv a message accompanied with credentials from a unix socket.
412 *
413 * Returns the size of received data, or negative error value.
414 */
32dd26fb 415__attribute__((visibility("hidden")))
0d37f2bc
DG
416ssize_t lttcomm_recv_creds_unix_sock(int sock, void *buf, size_t len,
417 lttng_sock_cred *creds)
418{
419 struct msghdr msg;
420 struct iovec iov[1];
421 ssize_t ret;
422#ifdef __linux__
423 struct cmsghdr *cmptr;
424 size_t sizeof_cred = sizeof(lttng_sock_cred);
425 char anc_buf[CMSG_SPACE(sizeof_cred)];
426#endif /* __linux__ */
427
428 memset(&msg, 0, sizeof(msg));
429
430 /* Not allowed */
431 if (creds == NULL) {
432 ret = -1;
433 goto end;
434 }
435
436 /* Prepare to receive the structures */
437 iov[0].iov_base = buf;
438 iov[0].iov_len = len;
439 msg.msg_iov = iov;
440 msg.msg_iovlen = 1;
441
442#ifdef __linux__
443 msg.msg_control = anc_buf;
444 msg.msg_controllen = sizeof(anc_buf);
445#endif /* __linux__ */
446
447 do {
448 ret = recvmsg(sock, &msg, 0);
449 } while (ret < 0 && errno == EINTR);
450 if (ret < 0) {
451 PERROR("recvmsg fds");
452 goto end;
453 }
454
455#ifdef __linux__
456 if (msg.msg_flags & MSG_CTRUNC) {
457 fprintf(stderr, "Error: Control message truncated.\n");
458 ret = -1;
459 goto end;
460 }
461
462 cmptr = CMSG_FIRSTHDR(&msg);
463 if (cmptr == NULL) {
464 fprintf(stderr, "Error: Invalid control message header\n");
465 ret = -1;
466 goto end;
467 }
468
469 if (cmptr->cmsg_level != SOL_SOCKET ||
470 cmptr->cmsg_type != LTTNG_SOCK_CREDS) {
471 fprintf(stderr, "Didn't received any credentials\n");
472 ret = -1;
473 goto end;
474 }
475
476 if (cmptr->cmsg_len != CMSG_LEN(sizeof_cred)) {
477 fprintf(stderr, "Error: Received %zu bytes of ancillary data, expected %zu\n",
478 (size_t) cmptr->cmsg_len, (size_t) CMSG_LEN(sizeof_cred));
479 ret = -1;
480 goto end;
481 }
482
483 memcpy(creds, CMSG_DATA(cmptr), sizeof_cred);
484#elif (defined(__FreeBSD__) || defined(__CYGWIN__))
485 {
486 int peer_ret;
487
488 peer_ret = getpeereid(sock, &creds->uid, &creds->gid);
489 if (peer_ret != 0) {
490 return peer_ret;
491 }
492 }
493#else
494#error "Please implement credential support for your OS."
495#endif /* __linux__ */
496
497end:
498 return ret;
499}
500
501/*
502 * Set socket option to use credentials passing.
503 */
504#ifdef __linux__
32dd26fb 505__attribute__((visibility("hidden")))
0d37f2bc
DG
506int lttcomm_setsockopt_creds_unix_sock(int sock)
507{
508 int ret, on = 1;
509
510 /* Set socket for credentials retrieval */
511 ret = setsockopt(sock, SOL_SOCKET, SO_PASSCRED, &on, sizeof(on));
512 if (ret < 0) {
513 PERROR("setsockopt creds unix sock");
514 }
515 return ret;
516}
517#elif (defined(__FreeBSD__) || defined(__CYGWIN__))
32dd26fb 518__attribute__((visibility("hidden")))
0d37f2bc
DG
519int lttcomm_setsockopt_creds_unix_sock(int sock)
520{
521 return 0;
522}
523#else
524#error "Please implement credential support for your OS."
525#endif /* __linux__ */
ae9e45b3
DG
526
527/*
528 * Set socket reciving timeout.
529 */
530__attribute__((visibility("hidden")))
531int lttcomm_setsockopt_rcv_timeout(int sock, unsigned int sec)
532{
533 int ret;
534 struct timeval tv;
535
536 tv.tv_sec = sec;
537 tv.tv_usec = 0;
538
539 ret = setsockopt(sock, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
540 if (ret < 0) {
541 PERROR("setsockopt SO_RCVTIMEO");
542 ret = -errno;
543 }
544
545 return ret;
546}
547
548/*
549 * Set socket sending timeout.
550 */
551__attribute__((visibility("hidden")))
552int lttcomm_setsockopt_snd_timeout(int sock, unsigned int sec)
553{
554 int ret;
555 struct timeval tv;
556
557 tv.tv_sec = sec;
558 tv.tv_usec = 0;
559
560 ret = setsockopt(sock, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
561 if (ret < 0) {
562 PERROR("setsockopt SO_SNDTIMEO");
563 ret = -errno;
564 }
565
566 return ret;
567}
This page took 0.043797 seconds and 4 git commands to generate.