2 * Copyright (C) 2011 - David Goulet <david.goulet@polymtl.ca>
3 * Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License, version 2 only,
7 * as published by the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * You should have received a copy of the GNU General Public License along
15 * with this program; if not, write to the Free Software Foundation, Inc.,
16 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
26 #include <sys/types.h>
35 #include <common/common.h>
36 #include <common/utils.h>
37 #include <common/compat/getenv.h>
38 #include <common/compat/prctl.h>
39 #include <common/unix.h>
40 #include <common/defaults.h>
45 typedef int (*run_as_fct
)(struct run_as_data
*data
);
47 struct run_as_mkdir_data
{
52 struct run_as_open_data
{
58 struct run_as_unlink_data
{
62 struct run_as_rmdir_recursive_data
{
70 RUN_AS_RMDIR_RECURSIVE
,
71 RUN_AS_MKDIR_RECURSIVE
,
77 struct run_as_mkdir_data mkdir
;
78 struct run_as_open_data open
;
79 struct run_as_unlink_data unlink
;
80 struct run_as_rmdir_recursive_data rmdir_recursive
;
91 struct run_as_worker
{
92 pid_t pid
; /* Worker PID. */
97 /* Single global worker per process (for now). */
98 static struct run_as_worker
*global_worker
;
99 /* Lock protecting the worker. */
100 static pthread_mutex_t worker_lock
= PTHREAD_MUTEX_INITIALIZER
;
112 return !lttng_secure_getenv("LTTNG_DEBUG_NOCLONE");
117 int _utils_mkdir_recursive_unsafe(const char *path
, mode_t mode
);
120 * Create recursively directory using the FULL path.
123 int _mkdir_recursive(struct run_as_data
*data
)
128 path
= data
->u
.mkdir
.path
;
129 mode
= data
->u
.mkdir
.mode
;
131 /* Safe to call as we have transitioned to the requested uid/gid. */
132 return _utils_mkdir_recursive_unsafe(path
, mode
);
136 int _mkdir(struct run_as_data
*data
)
138 return mkdir(data
->u
.mkdir
.path
, data
->u
.mkdir
.mode
);
142 int _open(struct run_as_data
*data
)
144 return open(data
->u
.open
.path
, data
->u
.open
.flags
, data
->u
.open
.mode
);
148 int _unlink(struct run_as_data
*data
)
150 return unlink(data
->u
.unlink
.path
);
154 int _rmdir_recursive(struct run_as_data
*data
)
156 return utils_recursive_rmdir(data
->u
.rmdir_recursive
.path
);
160 run_as_fct
run_as_enum_to_fct(enum run_as_cmd cmd
)
169 case RUN_AS_RMDIR_RECURSIVE
:
170 return _rmdir_recursive
;
171 case RUN_AS_MKDIR_RECURSIVE
:
172 return _mkdir_recursive
;
174 ERR("Unknown command %d", (int) cmd
);
180 int do_send_fd(struct run_as_worker
*worker
,
181 enum run_as_cmd cmd
, int fd
)
194 len
= lttcomm_send_fds_unix_sock(worker
->sockpair
[1], &fd
, 1);
196 PERROR("lttcomm_send_fds_unix_sock");
207 int do_recv_fd(struct run_as_worker
*worker
,
208 enum run_as_cmd cmd
, int *fd
)
221 len
= lttcomm_recv_fds_unix_sock(worker
->sockpair
[0], fd
, 1);
224 } else if (len
< 0) {
225 PERROR("lttcomm_recv_fds_unix_sock");
232 * Return < 0 on error, 0 if OK, 1 on hangup.
235 int handle_one_cmd(struct run_as_worker
*worker
)
238 struct run_as_data data
;
239 ssize_t readlen
, writelen
;
240 struct run_as_ret sendret
;
245 readlen
= lttcomm_recv_unix_sock(worker
->sockpair
[1], &data
,
252 if (readlen
< sizeof(data
)) {
253 PERROR("lttcomm_recv_unix_sock error");
258 cmd
= run_as_enum_to_fct(data
.cmd
);
264 prev_euid
= getuid();
265 if (data
.gid
!= getegid()) {
266 ret
= setegid(data
.gid
);
272 if (data
.uid
!= prev_euid
) {
273 ret
= seteuid(data
.uid
);
280 * Also set umask to 0 for mkdir executable bit.
287 sendret
._errno
= errno
;
288 /* send back return value */
289 writelen
= lttcomm_send_unix_sock(worker
->sockpair
[1], &sendret
,
291 if (writelen
< sizeof(sendret
)) {
292 PERROR("lttcomm_send_unix_sock error");
296 ret
= do_send_fd(worker
, data
.cmd
, ret
);
298 PERROR("do_send_fd error");
302 if (seteuid(prev_euid
) < 0) {
313 int run_as_worker(struct run_as_worker
*worker
)
317 struct run_as_ret sendret
;
318 size_t proc_orig_len
;
321 * Initialize worker. Set a different process cmdline.
323 proc_orig_len
= strlen(worker
->procname
);
324 memset(worker
->procname
, 0, proc_orig_len
);
325 strncpy(worker
->procname
, DEFAULT_RUN_AS_WORKER_NAME
, proc_orig_len
);
327 ret
= lttng_prctl(PR_SET_NAME
,
328 (unsigned long) DEFAULT_RUN_AS_WORKER_NAME
, 0, 0, 0);
329 if (ret
&& ret
!= -ENOSYS
) {
330 /* Don't fail as this is not essential. */
331 PERROR("prctl PR_SET_NAME");
336 writelen
= lttcomm_send_unix_sock(worker
->sockpair
[1], &sendret
,
338 if (writelen
< sizeof(sendret
)) {
339 PERROR("lttcomm_send_unix_sock error");
345 ret
= handle_one_cmd(worker
);
349 } else if (ret
> 0) {
352 continue; /* Next command. */
361 int run_as_cmd(struct run_as_worker
*worker
,
363 struct run_as_data
*data
,
364 uid_t uid
, gid_t gid
)
366 ssize_t readlen
, writelen
;
367 struct run_as_ret recvret
;
370 * If we are non-root, we can only deal with our own uid.
372 if (geteuid() != 0) {
373 if (uid
!= geteuid()) {
375 recvret
._errno
= EPERM
;
376 ERR("Client (%d)/Server (%d) UID mismatch (and sessiond is not root)",
377 (int) uid
, (int) geteuid());
386 writelen
= lttcomm_send_unix_sock(worker
->sockpair
[0], data
,
388 if (writelen
< sizeof(*data
)) {
389 PERROR("Error writing message to run_as");
391 recvret
._errno
= errno
;
395 /* receive return value */
396 readlen
= lttcomm_recv_unix_sock(worker
->sockpair
[0], &recvret
,
399 ERR("Run-as worker has hung-up during run_as_cmd");
401 recvret
._errno
= EIO
;
403 } else if (readlen
< sizeof(recvret
)) {
404 PERROR("Error reading response from run_as");
406 recvret
._errno
= errno
;
408 if (do_recv_fd(worker
, cmd
, &recvret
.ret
)) {
410 recvret
._errno
= EIO
;
414 errno
= recvret
._errno
;
419 * This is for debugging ONLY and should not be considered secure.
422 int run_as_noworker(enum run_as_cmd cmd
,
423 struct run_as_data
*data
, uid_t uid
, gid_t gid
)
425 int ret
, saved_errno
;
429 fct
= run_as_enum_to_fct(cmd
);
445 int run_as(enum run_as_cmd cmd
, struct run_as_data
*data
, uid_t uid
, gid_t gid
)
450 DBG("Using run_as worker");
451 pthread_mutex_lock(&worker_lock
);
452 assert(global_worker
);
453 ret
= run_as_cmd(global_worker
, cmd
, data
, uid
, gid
);
454 pthread_mutex_unlock(&worker_lock
);
457 DBG("Using run_as without worker");
458 ret
= run_as_noworker(cmd
, data
, uid
, gid
);
464 int run_as_mkdir_recursive(const char *path
, mode_t mode
, uid_t uid
, gid_t gid
)
466 struct run_as_data data
;
468 memset(&data
, 0, sizeof(data
));
469 DBG3("mkdir() recursive %s with mode %d for uid %d and gid %d",
470 path
, (int) mode
, (int) uid
, (int) gid
);
471 strncpy(data
.u
.mkdir
.path
, path
, PATH_MAX
- 1);
472 data
.u
.mkdir
.path
[PATH_MAX
- 1] = '\0';
473 data
.u
.mkdir
.mode
= mode
;
474 return run_as(RUN_AS_MKDIR_RECURSIVE
, &data
, uid
, gid
);
478 int run_as_mkdir(const char *path
, mode_t mode
, uid_t uid
, gid_t gid
)
480 struct run_as_data data
;
482 memset(&data
, 0, sizeof(data
));
483 DBG3("mkdir() %s with mode %d for uid %d and gid %d",
484 path
, (int) mode
, (int) uid
, (int) gid
);
485 strncpy(data
.u
.mkdir
.path
, path
, PATH_MAX
- 1);
486 data
.u
.mkdir
.path
[PATH_MAX
- 1] = '\0';
487 data
.u
.mkdir
.mode
= mode
;
488 return run_as(RUN_AS_MKDIR
, &data
, uid
, gid
);
492 int run_as_open(const char *path
, int flags
, mode_t mode
, uid_t uid
, gid_t gid
)
494 struct run_as_data data
;
496 memset(&data
, 0, sizeof(data
));
497 DBG3("open() %s with flags %X mode %d for uid %d and gid %d",
498 path
, flags
, (int) mode
, (int) uid
, (int) gid
);
499 strncpy(data
.u
.open
.path
, path
, PATH_MAX
- 1);
500 data
.u
.open
.path
[PATH_MAX
- 1] = '\0';
501 data
.u
.open
.flags
= flags
;
502 data
.u
.open
.mode
= mode
;
503 return run_as(RUN_AS_OPEN
, &data
, uid
, gid
);
507 int run_as_unlink(const char *path
, uid_t uid
, gid_t gid
)
509 struct run_as_data data
;
511 memset(&data
, 0, sizeof(data
));
512 DBG3("unlink() %s with for uid %d and gid %d",
513 path
, (int) uid
, (int) gid
);
514 strncpy(data
.u
.unlink
.path
, path
, PATH_MAX
- 1);
515 data
.u
.unlink
.path
[PATH_MAX
- 1] = '\0';
516 return run_as(RUN_AS_UNLINK
, &data
, uid
, gid
);
520 int run_as_rmdir_recursive(const char *path
, uid_t uid
, gid_t gid
)
522 struct run_as_data data
;
524 DBG3("rmdir_recursive() %s with for uid %d and gid %d",
525 path
, (int) uid
, (int) gid
);
526 strncpy(data
.u
.rmdir_recursive
.path
, path
, PATH_MAX
- 1);
527 data
.u
.rmdir_recursive
.path
[PATH_MAX
- 1] = '\0';
528 return run_as(RUN_AS_RMDIR_RECURSIVE
, &data
, uid
, gid
);
532 int reset_sighandler(void)
536 DBG("Resetting run_as worker signal handlers to default");
537 for (sig
= 1; sig
<= 31; sig
++) {
538 (void) signal(sig
, SIG_DFL
);
544 void worker_sighandler(int sig
)
549 * The worker will inherit its parent's signals since they are part of
550 * the same process group. However, in the case of SIGINT and SIGTERM,
551 * we want to give the worker a chance to teardown gracefully when its
552 * parent closes the command socket.
566 DBG("run_as worker received signal %s", signame
);
568 DBG("run_as_worker received signal %d", sig
);
573 int set_worker_sighandlers(void)
579 if ((ret
= sigemptyset(&sigset
)) < 0) {
580 PERROR("sigemptyset");
584 sa
.sa_handler
= worker_sighandler
;
587 if ((ret
= sigaction(SIGINT
, &sa
, NULL
)) < 0) {
588 PERROR("sigaction SIGINT");
592 if ((ret
= sigaction(SIGTERM
, &sa
, NULL
)) < 0) {
593 PERROR("sigaction SIGTERM");
597 DBG("run_as signal handler set for SIGTERM and SIGINT");
603 int run_as_create_worker(char *procname
)
608 struct run_as_ret recvret
;
609 struct run_as_worker
*worker
;
611 pthread_mutex_lock(&worker_lock
);
612 assert(!global_worker
);
615 * Don't initialize a worker, all run_as tasks will be performed
616 * in the current process.
621 worker
= zmalloc(sizeof(*worker
));
626 worker
->procname
= procname
;
627 /* Create unix socket. */
628 if (lttcomm_create_anon_unix_socketpair(worker
->sockpair
) < 0) {
638 } else if (pid
== 0) {
643 set_worker_sighandlers();
645 /* The child has no use for this lock. */
646 pthread_mutex_unlock(&worker_lock
);
647 /* Just close, no shutdown. */
648 if (close(worker
->sockpair
[0])) {
652 worker
->sockpair
[0] = -1;
653 ret
= run_as_worker(worker
);
654 if (lttcomm_close_unix_sock(worker
->sockpair
[1])) {
658 worker
->sockpair
[1] = -1;
659 LOG(ret
? PRINT_ERR
: PRINT_DBG
, "run_as worker exiting (ret = %d)", ret
);
660 exit(ret
? EXIT_FAILURE
: EXIT_SUCCESS
);
664 /* Just close, no shutdown. */
665 if (close(worker
->sockpair
[1])) {
670 worker
->sockpair
[1] = -1;
672 /* Wait for worker to become ready. */
673 readlen
= lttcomm_recv_unix_sock(worker
->sockpair
[0],
674 &recvret
, sizeof(recvret
));
675 if (readlen
< sizeof(recvret
)) {
676 ERR("readlen: %zd", readlen
);
677 PERROR("Error reading response from run_as at creation");
681 global_worker
= worker
;
684 pthread_mutex_unlock(&worker_lock
);
687 /* Error handling. */
689 for (i
= 0; i
< 2; i
++) {
690 if (worker
->sockpair
[i
] < 0) {
693 if (lttcomm_close_unix_sock(worker
->sockpair
[i
])) {
696 worker
->sockpair
[i
] = -1;
700 pthread_mutex_unlock(&worker_lock
);
705 void run_as_destroy_worker(void)
707 struct run_as_worker
*worker
= global_worker
;
709 DBG("Destroying run_as worker");
710 pthread_mutex_lock(&worker_lock
);
714 /* Close unix socket */
715 DBG("Closing run_as worker socket");
716 if (lttcomm_close_unix_sock(worker
->sockpair
[0])) {
719 worker
->sockpair
[0] = -1;
720 /* Wait for worker. */
725 wait_ret
= waitpid(worker
->pid
, &status
, 0);
727 if (errno
== EINTR
) {
734 if (WIFEXITED(status
)) {
735 LOG(WEXITSTATUS(status
) == 0 ? PRINT_DBG
: PRINT_ERR
,
736 DEFAULT_RUN_AS_WORKER_NAME
" terminated with status code %d",
737 WEXITSTATUS(status
));
739 } else if (WIFSIGNALED(status
)) {
740 ERR(DEFAULT_RUN_AS_WORKER_NAME
" was killed by signal %d",
746 global_worker
= NULL
;
748 pthread_mutex_unlock(&worker_lock
);