2010-01-23 03:52:57 +03:00
/*-*- Mode: C; c-basic-offset: 8 -*-*/
2010-02-03 15:03:47 +03:00
/***
This file is part of systemd .
Copyright 2010 Lennart Poettering
systemd is free software ; you can redistribute it and / or modify it
under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
systemd is distributed in the hope that it will be useful , but
WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
General Public License for more details .
You should have received a copy of the GNU General Public License
along with systemd ; If not , see < http : //www.gnu.org/licenses/>.
* * */
2010-01-23 03:52:57 +03:00
# include <assert.h>
2010-01-26 06:18:44 +03:00
# include <dirent.h>
# include <errno.h>
# include <fcntl.h>
# include <unistd.h>
2010-01-26 09:02:51 +03:00
# include <string.h>
2010-01-27 08:17:51 +03:00
# include <signal.h>
2010-01-28 04:06:20 +03:00
# include <sys/socket.h>
# include <sys/un.h>
2010-01-30 03:55:42 +03:00
# include <sys/prctl.h>
2010-02-02 15:56:37 +03:00
# include <linux/sched.h>
2010-02-12 04:00:18 +03:00
# include <sys/types.h>
# include <sys/stat.h>
2010-02-15 00:43:08 +03:00
# include <grp.h>
# include <pwd.h>
2010-01-23 03:52:57 +03:00
# include "execute.h"
# include "strv.h"
# include "macro.h"
# include "util.h"
2010-01-27 06:31:52 +03:00
# include "log.h"
2010-01-29 22:46:22 +03:00
# include "ioprio.h"
2010-01-30 03:55:42 +03:00
# include "securebits.h"
2010-03-31 18:29:55 +04:00
# include "cgroup.h"
2010-01-23 03:52:57 +03:00
2010-01-26 06:18:44 +03:00
static int shift_fds ( int fds [ ] , unsigned n_fds ) {
int start , restart_from ;
if ( n_fds < = 0 )
return 0 ;
2010-04-07 01:35:59 +04:00
/* Modifies the fds array! (sorts it) */
2010-01-26 06:18:44 +03:00
assert ( fds ) ;
start = 0 ;
for ( ; ; ) {
int i ;
restart_from = - 1 ;
for ( i = start ; i < ( int ) n_fds ; i + + ) {
int nfd ;
/* Already at right index? */
if ( fds [ i ] = = i + 3 )
continue ;
if ( ( nfd = fcntl ( fds [ i ] , F_DUPFD , i + 3 ) ) < 0 )
return - errno ;
2010-01-27 07:30:58 +03:00
assert_se ( close_nointr ( fds [ i ] ) = = 0 ) ;
2010-01-26 06:18:44 +03:00
fds [ i ] = nfd ;
/* Hmm, the fd we wanted isn't free? Then
* let ' s remember that and try again from here */
if ( nfd ! = i + 3 & & restart_from < 0 )
restart_from = i ;
}
if ( restart_from < 0 )
break ;
start = restart_from ;
}
return 0 ;
}
2010-02-12 04:00:18 +03:00
static int flags_fds ( int fds [ ] , unsigned n_fds , bool nonblock ) {
2010-01-27 08:18:45 +03:00
unsigned i ;
2010-04-06 23:53:39 +04:00
int r ;
2010-01-27 08:18:45 +03:00
if ( n_fds < = 0 )
return 0 ;
assert ( fds ) ;
2010-02-12 04:00:18 +03:00
/* Drops/Sets O_NONBLOCK and FD_CLOEXEC from the file flags */
2010-01-27 08:18:45 +03:00
for ( i = 0 ; i < n_fds ; i + + ) {
2010-04-06 23:53:39 +04:00
if ( ( r = fd_nonblock ( fds [ i ] , nonblock ) ) < 0 )
return r ;
2010-01-27 08:18:45 +03:00
2010-02-12 04:00:18 +03:00
/* We unconditionally drop FD_CLOEXEC from the fds,
* since after all we want to pass these fds to our
* children */
2010-01-27 08:18:45 +03:00
2010-04-06 23:53:39 +04:00
if ( ( r = fd_cloexec ( fds [ i ] , false ) ) < 0 )
return r ;
2010-01-27 08:18:45 +03:00
}
return 0 ;
}
2010-01-28 04:06:20 +03:00
static int replace_null_fd ( int fd , int flags ) {
int nfd ;
assert ( fd > = 0 ) ;
close_nointr ( fd ) ;
if ( ( nfd = open ( " /dev/null " , flags | O_NOCTTY ) ) < 0 )
return - errno ;
if ( nfd ! = fd ) {
close_nointr_nofail ( nfd ) ;
return - EIO ;
}
return 0 ;
}
static int setup_output ( const ExecContext * context , const char * ident ) {
int r ;
assert ( context ) ;
switch ( context - > output ) {
2010-01-30 03:55:42 +03:00
case EXEC_OUTPUT_CONSOLE :
2010-01-28 04:06:20 +03:00
return 0 ;
2010-01-30 03:55:42 +03:00
case EXEC_OUTPUT_NULL :
2010-01-28 04:06:20 +03:00
2010-01-30 03:55:42 +03:00
if ( ( r = replace_null_fd ( STDOUT_FILENO , O_WRONLY ) ) < 0 | |
2010-01-28 04:06:20 +03:00
( r = replace_null_fd ( STDERR_FILENO , O_WRONLY ) ) < 0 )
return r ;
return 0 ;
2010-01-30 03:55:42 +03:00
case EXEC_OUTPUT_KERNEL :
case EXEC_OUTPUT_SYSLOG : {
2010-01-28 04:06:20 +03:00
int fd ;
union {
struct sockaddr sa ;
struct sockaddr_un un ;
} sa ;
close_nointr ( STDOUT_FILENO ) ;
close_nointr ( STDERR_FILENO ) ;
if ( ( fd = socket ( AF_UNIX , SOCK_STREAM , 0 ) ) < 0 )
return - errno ;
if ( fd ! = STDOUT_FILENO ) {
close_nointr_nofail ( fd ) ;
return - EIO ;
}
zero ( sa ) ;
sa . sa . sa_family = AF_UNIX ;
strncpy ( sa . un . sun_path + 1 , LOGGER_SOCKET , sizeof ( sa . un . sun_path ) - 1 ) ;
if ( connect ( fd , & sa . sa , sizeof ( sa ) ) < 0 ) {
close_nointr_nofail ( fd ) ;
return - errno ;
}
if ( shutdown ( fd , SHUT_RD ) < 0 ) {
close_nointr_nofail ( fd ) ;
return - errno ;
}
if ( ( fd = dup ( fd ) ) < 0 ) {
close_nointr_nofail ( fd ) ;
return - errno ;
}
if ( fd ! = STDERR_FILENO ) {
close_nointr_nofail ( fd ) ;
return - EIO ;
}
/* We speak a very simple protocol between log server
* and client : one line for the log destination ( kmsg
* or syslog ) , followed by the priority field ,
* followed by the process name . Since we replaced
* stdin / stderr we simple use stdio to write to
* it . Note that we use stderr , to minimize buffer
* flushing issues . */
fprintf ( stderr ,
" %s \n "
" %i \n "
" %s \n " ,
2010-01-30 03:55:42 +03:00
context - > output = = EXEC_OUTPUT_KERNEL ? " kmsg " : " syslog " ,
2010-01-28 04:06:20 +03:00
context - > syslog_priority ,
context - > syslog_identifier ? context - > syslog_identifier : ident ) ;
return 0 ;
}
2010-01-30 03:55:42 +03:00
default :
assert_not_reached ( " Unknown output type " ) ;
2010-01-28 04:06:20 +03:00
}
2010-01-30 03:55:42 +03:00
}
2010-02-03 16:21:48 +03:00
static int setup_input ( const ExecContext * context ) {
2010-01-30 03:55:42 +03:00
int r ;
assert ( context ) ;
2010-01-28 04:06:20 +03:00
2010-01-30 03:55:42 +03:00
switch ( context - > input ) {
case EXEC_INPUT_CONSOLE :
return 0 ;
case EXEC_INPUT_NULL :
if ( ( r = replace_null_fd ( STDIN_FILENO , O_RDONLY ) ) < 0 )
return r ;
return 0 ;
default :
assert_not_reached ( " Unknown input type " ) ;
}
2010-01-28 04:06:20 +03:00
}
2010-02-15 00:43:08 +03:00
static int get_group_creds ( const char * groupname , gid_t * gid ) {
struct group * g ;
unsigned long lu ;
assert ( groupname ) ;
assert ( gid ) ;
/* We enforce some special rules for gid=0: in order to avoid
* NSS lookups for root we hardcode its data . */
if ( streq ( groupname , " root " ) | | streq ( groupname , " 0 " ) ) {
* gid = 0 ;
return 0 ;
}
if ( safe_atolu ( groupname , & lu ) > = 0 ) {
errno = 0 ;
g = getgrgid ( ( gid_t ) lu ) ;
} else {
errno = 0 ;
g = getgrnam ( groupname ) ;
}
if ( ! g )
return errno ! = 0 ? - errno : - ESRCH ;
* gid = g - > gr_gid ;
return 0 ;
}
static int get_user_creds ( const char * * username , uid_t * uid , gid_t * gid , const char * * home ) {
struct passwd * p ;
unsigned long lu ;
assert ( username ) ;
assert ( * username ) ;
assert ( uid ) ;
assert ( gid ) ;
assert ( home ) ;
/* We enforce some special rules for uid=0: in order to avoid
* NSS lookups for root we hardcode its data . */
if ( streq ( * username , " root " ) | | streq ( * username , " 0 " ) ) {
* username = " root " ;
* uid = 0 ;
* gid = 0 ;
* home = " /root " ;
return 0 ;
}
if ( safe_atolu ( * username , & lu ) > = 0 ) {
errno = 0 ;
p = getpwuid ( ( uid_t ) lu ) ;
/* If there are multiple users with the same id, make
* sure to leave $ USER to the configured value instead
* of the first occurence in the database . However if
* the uid was configured by a numeric uid , then let ' s
* pick the real username from / etc / passwd . */
if ( * username & & p )
* username = p - > pw_name ;
} else {
errno = 0 ;
p = getpwnam ( * username ) ;
}
if ( ! p )
return errno ! = 0 ? - errno : - ESRCH ;
* uid = p - > pw_uid ;
* gid = p - > pw_gid ;
* home = p - > pw_dir ;
return 0 ;
}
static int enforce_groups ( const ExecContext * context , const char * username , gid_t gid ) {
bool keep_groups = false ;
int r ;
assert ( context ) ;
/* Lookup and ser GID and supplementary group list. Here too
* we avoid NSS lookups for gid = 0. */
if ( context - > group | | username ) {
if ( context - > group )
if ( ( r = get_group_creds ( context - > group , & gid ) ) < 0 )
return r ;
/* First step, initialize groups from /etc/groups */
if ( username & & gid ! = 0 ) {
if ( initgroups ( username , gid ) < 0 )
return - errno ;
keep_groups = true ;
}
/* Second step, set our gids */
if ( setresgid ( gid , gid , gid ) < 0 )
return - errno ;
}
if ( context - > supplementary_groups ) {
int ngroups_max , k ;
gid_t * gids ;
char * * i ;
/* Final step, initialize any manually set supplementary groups */
ngroups_max = ( int ) sysconf ( _SC_NGROUPS_MAX ) ;
if ( ! ( gids = new ( gid_t , ngroups_max ) ) )
return - ENOMEM ;
if ( keep_groups ) {
if ( ( k = getgroups ( ngroups_max , gids ) ) < 0 ) {
free ( gids ) ;
return - errno ;
}
} else
k = 0 ;
STRV_FOREACH ( i , context - > supplementary_groups ) {
if ( k > = ngroups_max ) {
free ( gids ) ;
return - E2BIG ;
}
if ( ( r = get_group_creds ( * i , gids + k ) ) < 0 ) {
free ( gids ) ;
return r ;
}
k + + ;
}
if ( setgroups ( k , gids ) < 0 ) {
free ( gids ) ;
return - errno ;
}
free ( gids ) ;
}
return 0 ;
}
static int enforce_user ( const ExecContext * context , uid_t uid ) {
int r ;
assert ( context ) ;
/* Sets (but doesn't lookup) the uid and make sure we keep the
* capabilities while doing so . */
if ( context - > capabilities ) {
cap_t d ;
static const cap_value_t bits [ ] = {
CAP_SETUID , /* Necessary so that we can run setresuid() below */
CAP_SETPCAP /* Necessary so that we can set PR_SET_SECUREBITS later on */
} ;
/* First step: If we need to keep capabilities but
* drop privileges we need to make sure we keep our
* caps , whiel we drop priviliges . */
2010-03-31 18:25:33 +04:00
if ( uid ! = 0 ) {
int sb = context - > secure_bits | SECURE_KEEP_CAPS ;
if ( prctl ( PR_GET_SECUREBITS ) ! = sb )
if ( prctl ( PR_SET_SECUREBITS , sb ) < 0 )
return - errno ;
}
2010-02-15 00:43:08 +03:00
/* Second step: set the capabilites. This will reduce
* the capabilities to the minimum we need . */
if ( ! ( d = cap_dup ( context - > capabilities ) ) )
return - errno ;
if ( cap_set_flag ( d , CAP_EFFECTIVE , ELEMENTSOF ( bits ) , bits , CAP_SET ) < 0 | |
cap_set_flag ( d , CAP_PERMITTED , ELEMENTSOF ( bits ) , bits , CAP_SET ) < 0 ) {
r = - errno ;
cap_free ( d ) ;
return r ;
}
if ( cap_set_proc ( d ) < 0 ) {
r = - errno ;
cap_free ( d ) ;
return r ;
}
cap_free ( d ) ;
}
/* Third step: actually set the uids */
if ( setresuid ( uid , uid , uid ) < 0 )
return - errno ;
/* At this point we should have all necessary capabilities but
are otherwise a normal user . However , the caps might got
corrupted due to the setresuid ( ) so we need clean them up
later . This is done outside of this call . */
return 0 ;
}
int exec_spawn ( const ExecCommand * command ,
const ExecContext * context ,
int * fds , unsigned n_fds ,
bool apply_permissions ,
bool apply_chroot ,
2010-03-31 18:29:55 +04:00
CGroupBonding * cgroup_bondings ,
2010-02-15 00:43:08 +03:00
pid_t * ret ) {
2010-01-26 06:18:44 +03:00
pid_t pid ;
2010-03-31 18:29:55 +04:00
int r ;
2010-01-26 06:18:44 +03:00
2010-01-23 03:52:57 +03:00
assert ( command ) ;
assert ( context ) ;
assert ( ret ) ;
2010-01-26 06:18:44 +03:00
assert ( fds | | n_fds < = 0 ) ;
2010-02-15 00:43:08 +03:00
log_debug ( " About to execute %s " , command - > path ) ;
2010-01-27 06:31:52 +03:00
2010-03-31 18:29:55 +04:00
if ( cgroup_bondings )
if ( ( r = cgroup_bonding_realize_list ( cgroup_bondings ) ) )
return r ;
2010-01-26 06:18:44 +03:00
if ( ( pid = fork ( ) ) < 0 )
return - errno ;
if ( pid = = 0 ) {
2010-03-31 18:29:55 +04:00
int i ;
2010-01-27 08:17:51 +03:00
sigset_t ss ;
2010-02-15 00:43:08 +03:00
const char * username = NULL , * home = NULL ;
uid_t uid = ( uid_t ) - 1 ;
gid_t gid = ( gid_t ) - 1 ;
char * * our_env = NULL , * * final_env = NULL ;
unsigned n_env = 0 ;
2010-01-27 08:17:51 +03:00
2010-01-26 06:18:44 +03:00
/* child */
2010-01-23 03:52:57 +03:00
2010-01-27 08:17:51 +03:00
if ( sigemptyset ( & ss ) < 0 | |
sigprocmask ( SIG_SETMASK , & ss , NULL ) < 0 ) {
r = EXIT_SIGNAL_MASK ;
goto fail ;
}
2010-01-29 22:46:22 +03:00
if ( setpgid ( 0 , 0 ) < 0 ) {
r = EXIT_PGID ;
2010-01-26 06:18:44 +03:00
goto fail ;
}
2010-01-29 22:46:22 +03:00
umask ( context - > umask ) ;
2010-01-30 03:55:42 +03:00
if ( setup_input ( context ) < 0 ) {
r = EXIT_INPUT ;
goto fail ;
}
2010-01-28 04:06:20 +03:00
if ( setup_output ( context , file_name_from_path ( command - > path ) ) < 0 ) {
r = EXIT_OUTPUT ;
goto fail ;
}
2010-03-31 18:29:55 +04:00
if ( cgroup_bondings )
if ( ( r = cgroup_bonding_install_list ( cgroup_bondings , 0 ) ) < 0 ) {
r = EXIT_CGROUP ;
goto fail ;
}
2010-01-28 04:53:56 +03:00
if ( context - > oom_adjust_set ) {
char t [ 16 ] ;
2010-01-26 06:18:44 +03:00
2010-01-28 04:53:56 +03:00
snprintf ( t , sizeof ( t ) , " %i " , context - > oom_adjust ) ;
char_array_0 ( t ) ;
2010-01-26 06:18:44 +03:00
2010-01-28 04:53:56 +03:00
if ( write_one_line_file ( " /proc/self/oom_adj " , t ) < 0 ) {
r = EXIT_OOM_ADJUST ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
}
2010-01-28 04:53:56 +03:00
if ( context - > nice_set )
if ( setpriority ( PRIO_PROCESS , 0 , context - > nice ) < 0 ) {
r = EXIT_NICE ;
goto fail ;
}
2010-01-30 03:55:42 +03:00
if ( context - > cpu_sched_set ) {
struct sched_param param ;
zero ( param ) ;
param . sched_priority = context - > cpu_sched_priority ;
2010-02-02 14:50:04 +03:00
if ( sched_setscheduler ( 0 , context - > cpu_sched_policy |
( context - > cpu_sched_reset_on_fork ? SCHED_RESET_ON_FORK : 0 ) , & param ) < 0 ) {
2010-01-30 03:55:42 +03:00
r = EXIT_SETSCHEDULER ;
goto fail ;
}
}
if ( context - > cpu_affinity_set )
if ( sched_setaffinity ( 0 , sizeof ( context - > cpu_affinity ) , & context - > cpu_affinity ) < 0 ) {
r = EXIT_CPUAFFINITY ;
goto fail ;
}
2010-01-29 22:46:22 +03:00
if ( context - > ioprio_set )
if ( ioprio_set ( IOPRIO_WHO_PROCESS , 0 , context - > ioprio ) < 0 ) {
r = EXIT_IOPRIO ;
goto fail ;
}
2010-01-30 03:55:42 +03:00
if ( context - > timer_slack_ns_set )
if ( prctl ( PR_SET_TIMERSLACK , context - > timer_slack_ns_set ) < 0 ) {
r = EXIT_TIMERSLACK ;
goto fail ;
}
2010-02-15 00:43:08 +03:00
if ( context - > user ) {
username = context - > user ;
if ( get_user_creds ( & username , & uid , & gid , & home ) < 0 ) {
r = EXIT_USER ;
goto fail ;
}
}
if ( apply_permissions )
if ( enforce_groups ( context , username , uid ) < 0 ) {
r = EXIT_GROUP ;
goto fail ;
}
if ( apply_chroot ) {
if ( context - > root_directory )
if ( chroot ( context - > root_directory ) < 0 ) {
r = EXIT_CHROOT ;
goto fail ;
}
if ( chdir ( context - > working_directory ? context - > working_directory : " / " ) < 0 ) {
r = EXIT_CHDIR ;
goto fail ;
}
} else {
char * d ;
if ( asprintf ( & d , " %s/%s " ,
context - > root_directory ? context - > root_directory : " " ,
context - > working_directory ? context - > working_directory : " " ) < 0 ) {
r = EXIT_MEMORY ;
goto fail ;
}
if ( chdir ( d ) < 0 ) {
free ( d ) ;
r = EXIT_CHDIR ;
goto fail ;
}
free ( d ) ;
}
2010-04-07 01:35:59 +04:00
if ( close_all_fds ( fds , n_fds ) < 0 | |
2010-01-27 08:18:45 +03:00
shift_fds ( fds , n_fds ) < 0 | |
2010-02-12 04:00:18 +03:00
flags_fds ( fds , n_fds , context - > non_blocking ) < 0 ) {
2010-01-26 06:18:44 +03:00
r = EXIT_FDS ;
goto fail ;
}
2010-02-15 00:43:08 +03:00
if ( apply_permissions ) {
2010-01-26 06:18:44 +03:00
2010-02-15 00:43:08 +03:00
for ( i = 0 ; i < RLIMIT_NLIMITS ; i + + ) {
if ( ! context - > rlimit [ i ] )
continue ;
if ( setrlimit ( i , context - > rlimit [ i ] ) < 0 ) {
r = EXIT_LIMITS ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
}
2010-02-15 00:43:08 +03:00
if ( context - > user )
if ( enforce_user ( context , uid ) < 0 ) {
r = EXIT_USER ;
goto fail ;
}
2010-03-31 18:25:33 +04:00
/* PR_GET_SECUREBITS is not priviliged, while
* PR_SET_SECUREBITS is . So to suppress
* potential EPERMs we ' ll try not to call
* PR_SET_SECUREBITS unless necessary . */
if ( prctl ( PR_GET_SECUREBITS ) ! = context - > secure_bits )
if ( prctl ( PR_SET_SECUREBITS , context - > secure_bits ) < 0 ) {
r = EXIT_SECUREBITS ;
goto fail ;
}
2010-02-15 00:43:08 +03:00
if ( context - > capabilities )
if ( cap_set_proc ( context - > capabilities ) < 0 ) {
r = EXIT_CAPABILITIES ;
goto fail ;
}
2010-01-30 03:55:42 +03:00
}
2010-02-15 00:43:08 +03:00
if ( ! ( our_env = new0 ( char * , 6 ) ) ) {
r = EXIT_MEMORY ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
2010-02-15 00:43:08 +03:00
if ( n_fds > 0 )
if ( asprintf ( our_env + n_env + + , " LISTEN_PID=%llu " , ( unsigned long long ) getpid ( ) ) < 0 | |
asprintf ( our_env + n_env + + , " LISTEN_FDS=%u " , n_fds ) < 0 ) {
r = EXIT_MEMORY ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
2010-02-15 00:43:08 +03:00
if ( home )
if ( asprintf ( our_env + n_env + + , " HOME=%s " , home ) < 0 ) {
r = EXIT_MEMORY ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
2010-02-15 00:43:08 +03:00
if ( username )
if ( asprintf ( our_env + n_env + + , " LOGNAME=%s " , username ) < 0 | |
asprintf ( our_env + n_env + + , " USER=%s " , username ) < 0 ) {
r = EXIT_MEMORY ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
2010-02-15 00:43:08 +03:00
if ( ! ( final_env = strv_env_merge ( environ , our_env , context - > environment , NULL ) ) ) {
r = EXIT_MEMORY ;
goto fail ;
}
2010-01-26 06:18:44 +03:00
2010-02-15 00:43:08 +03:00
execve ( command - > path , command - > argv , final_env ) ;
2010-01-26 06:18:44 +03:00
r = EXIT_EXEC ;
fail :
2010-02-15 00:43:08 +03:00
strv_free ( our_env ) ;
strv_free ( final_env ) ;
2010-01-26 06:18:44 +03:00
_exit ( r ) ;
}
2010-01-27 07:30:58 +03:00
2010-02-15 00:43:08 +03:00
log_debug ( " Forked %s as %llu " , command - > path , ( unsigned long long ) pid ) ;
2010-01-27 07:30:58 +03:00
2010-01-26 06:18:44 +03:00
* ret = pid ;
2010-01-23 03:52:57 +03:00
return 0 ;
}
2010-01-26 06:18:44 +03:00
void exec_context_init ( ExecContext * c ) {
assert ( c ) ;
c - > umask = 0002 ;
c - > oom_adjust = 0 ;
2010-01-29 22:46:22 +03:00
c - > oom_adjust_set = false ;
2010-01-26 06:18:44 +03:00
c - > nice = 0 ;
2010-01-29 22:46:22 +03:00
c - > nice_set = false ;
c - > ioprio = IOPRIO_PRIO_VALUE ( IOPRIO_CLASS_BE , 0 ) ;
c - > ioprio_set = false ;
2010-01-30 03:55:42 +03:00
c - > cpu_sched_policy = SCHED_OTHER ;
c - > cpu_sched_priority = 0 ;
c - > cpu_sched_set = false ;
CPU_ZERO ( & c - > cpu_affinity ) ;
c - > cpu_affinity_set = false ;
2010-01-28 04:06:20 +03:00
2010-01-30 03:55:42 +03:00
c - > input = 0 ;
2010-01-28 04:06:20 +03:00
c - > output = 0 ;
c - > syslog_priority = LOG_DAEMON | LOG_INFO ;
2010-01-30 03:55:42 +03:00
c - > secure_bits = 0 ;
c - > capability_bounding_set_drop = 0 ;
2010-01-26 06:18:44 +03:00
}
void exec_context_done ( ExecContext * c ) {
2010-01-23 03:52:57 +03:00
unsigned l ;
assert ( c ) ;
strv_free ( c - > environment ) ;
2010-01-26 06:18:44 +03:00
c - > environment = NULL ;
2010-01-23 03:52:57 +03:00
2010-01-26 06:18:44 +03:00
for ( l = 0 ; l < ELEMENTSOF ( c - > rlimit ) ; l + + ) {
2010-01-23 03:52:57 +03:00
free ( c - > rlimit [ l ] ) ;
2010-01-26 06:18:44 +03:00
c - > rlimit [ l ] = NULL ;
}
2010-01-29 22:46:22 +03:00
free ( c - > working_directory ) ;
c - > working_directory = NULL ;
free ( c - > root_directory ) ;
c - > root_directory = NULL ;
2010-01-23 03:52:57 +03:00
2010-01-28 04:06:20 +03:00
free ( c - > syslog_identifier ) ;
c - > syslog_identifier = NULL ;
2010-01-23 03:52:57 +03:00
free ( c - > user ) ;
2010-01-26 06:18:44 +03:00
c - > user = NULL ;
2010-01-23 03:52:57 +03:00
free ( c - > group ) ;
2010-01-26 06:18:44 +03:00
c - > group = NULL ;
strv_free ( c - > supplementary_groups ) ;
c - > supplementary_groups = NULL ;
2010-01-30 03:55:42 +03:00
if ( c - > capabilities ) {
cap_free ( c - > capabilities ) ;
c - > capabilities = NULL ;
}
2010-01-23 03:52:57 +03:00
}
void exec_command_free_list ( ExecCommand * c ) {
ExecCommand * i ;
while ( ( i = c ) ) {
2010-01-26 06:18:44 +03:00
LIST_REMOVE ( ExecCommand , command , c , i ) ;
2010-01-23 03:52:57 +03:00
free ( i - > path ) ;
2010-01-26 09:02:51 +03:00
strv_free ( i - > argv ) ;
2010-01-23 03:52:57 +03:00
free ( i ) ;
}
}
2010-01-26 06:18:44 +03:00
void exec_command_free_array ( ExecCommand * * c , unsigned n ) {
unsigned i ;
for ( i = 0 ; i < n ; i + + ) {
exec_command_free_list ( c [ i ] ) ;
c [ i ] = NULL ;
}
}
2010-01-23 03:52:57 +03:00
void exec_context_dump ( ExecContext * c , FILE * f , const char * prefix ) {
2010-01-30 03:55:42 +03:00
char * * e ;
unsigned i ;
2010-01-29 22:46:22 +03:00
2010-01-23 03:52:57 +03:00
assert ( c ) ;
assert ( f ) ;
if ( ! prefix )
prefix = " " ;
fprintf ( f ,
2010-01-30 03:55:42 +03:00
" %sUMask: %04o \n "
" %sWorkingDirectory: %s \n "
2010-02-12 04:00:18 +03:00
" %sRootDirectory: %s \n "
" %sNonBlocking: %s \n " ,
2010-01-23 03:52:57 +03:00
prefix , c - > umask ,
2010-01-29 22:46:22 +03:00
prefix , c - > working_directory ? c - > working_directory : " / " ,
2010-02-12 04:00:18 +03:00
prefix , c - > root_directory ? c - > root_directory : " / " ,
prefix , yes_no ( c - > non_blocking ) ) ;
2010-01-28 04:53:56 +03:00
2010-01-30 03:55:42 +03:00
if ( c - > environment )
for ( e = c - > environment ; * e ; e + + )
fprintf ( f , " %sEnvironment: %s \n " , prefix , * e ) ;
2010-01-28 04:53:56 +03:00
if ( c - > nice_set )
fprintf ( f ,
" %sNice: %i \n " ,
prefix , c - > nice ) ;
if ( c - > oom_adjust_set )
fprintf ( f ,
" %sOOMAdjust: %i \n " ,
prefix , c - > oom_adjust ) ;
2010-01-29 22:46:22 +03:00
2010-01-30 03:55:42 +03:00
for ( i = 0 ; i < RLIM_NLIMITS ; i + + )
if ( c - > rlimit [ i ] )
2010-02-01 05:33:24 +03:00
fprintf ( f , " %s%s: %llu \n " , prefix , rlimit_to_string ( i ) , ( unsigned long long ) c - > rlimit [ i ] - > rlim_max ) ;
2010-01-30 03:55:42 +03:00
2010-01-29 22:46:22 +03:00
if ( c - > ioprio_set )
fprintf ( f ,
" %sIOSchedulingClass: %s \n "
" %sIOPriority: %i \n " ,
2010-01-30 03:55:42 +03:00
prefix , ioprio_class_to_string ( IOPRIO_PRIO_CLASS ( c - > ioprio ) ) ,
2010-01-29 22:46:22 +03:00
prefix , ( int ) IOPRIO_PRIO_DATA ( c - > ioprio ) ) ;
2010-01-30 03:55:42 +03:00
if ( c - > cpu_sched_set )
fprintf ( f ,
" %sCPUSchedulingPolicy: %s \n "
2010-02-02 14:50:04 +03:00
" %sCPUSchedulingPriority: %i \n "
" %sCPUSchedulingResetOnFork: %s \n " ,
2010-01-30 03:55:42 +03:00
prefix , sched_policy_to_string ( c - > cpu_sched_policy ) ,
2010-02-02 14:50:04 +03:00
prefix , c - > cpu_sched_priority ,
prefix , yes_no ( c - > cpu_sched_reset_on_fork ) ) ;
2010-01-30 03:55:42 +03:00
if ( c - > cpu_affinity_set ) {
fprintf ( f , " %sCPUAffinity: " , prefix ) ;
for ( i = 0 ; i < CPU_SETSIZE ; i + + )
if ( CPU_ISSET ( i , & c - > cpu_affinity ) )
fprintf ( f , " %i " , i ) ;
fputs ( " \n " , f ) ;
}
if ( c - > timer_slack_ns_set )
fprintf ( f , " %sTimerSlackNS: %lu \n " , prefix , c - > timer_slack_ns ) ;
fprintf ( f ,
" %sInput: %s \n "
" %sOutput: %s \n " ,
prefix , exec_input_to_string ( c - > input ) ,
prefix , exec_output_to_string ( c - > output ) ) ;
if ( c - > output = = EXEC_OUTPUT_SYSLOG | | c - > output = = EXEC_OUTPUT_KERNEL )
fprintf ( f ,
" %sSyslogFacility: %s \n "
" %sSyslogLevel: %s \n " ,
prefix , log_facility_to_string ( LOG_FAC ( c - > syslog_priority ) ) ,
prefix , log_level_to_string ( LOG_PRI ( c - > syslog_priority ) ) ) ;
if ( c - > capabilities ) {
char * t ;
if ( ( t = cap_to_text ( c - > capabilities , NULL ) ) ) {
fprintf ( f , " %sCapabilities: %s \n " ,
prefix , t ) ;
cap_free ( t ) ;
}
}
if ( c - > secure_bits )
fprintf ( f , " %sSecure Bits:%s%s%s%s%s%s \n " ,
prefix ,
( c - > secure_bits & SECURE_KEEP_CAPS ) ? " keep-caps " : " " ,
( c - > secure_bits & SECURE_KEEP_CAPS_LOCKED ) ? " keep-caps-locked " : " " ,
( c - > secure_bits & SECURE_NO_SETUID_FIXUP ) ? " no-setuid-fixup " : " " ,
( c - > secure_bits & SECURE_NO_SETUID_FIXUP_LOCKED ) ? " no-setuid-fixup-locked " : " " ,
( c - > secure_bits & SECURE_NOROOT ) ? " noroot " : " " ,
( c - > secure_bits & SECURE_NOROOT_LOCKED ) ? " noroot-locked " : " " ) ;
if ( c - > capability_bounding_set_drop ) {
fprintf ( f , " %sCapabilityBoundingSetDrop: " , prefix ) ;
for ( i = 0 ; i < = CAP_LAST_CAP ; i + + )
if ( c - > capability_bounding_set_drop & ( 1 < < i ) ) {
char * t ;
if ( ( t = cap_to_name ( i ) ) ) {
fprintf ( f , " %s " , t ) ;
free ( t ) ;
}
}
fputs ( " \n " , f ) ;
}
if ( c - > user )
fprintf ( f , " %sUser: %s " , prefix , c - > user ) ;
if ( c - > group )
fprintf ( f , " %sGroup: %s " , prefix , c - > group ) ;
if ( c - > supplementary_groups ) {
char * * g ;
fprintf ( f , " %sSupplementaryGroups: " , prefix ) ;
STRV_FOREACH ( g , c - > supplementary_groups )
fprintf ( f , " %s " , * g ) ;
fputs ( " \n " , f ) ;
}
2010-01-23 03:52:57 +03:00
}
2010-01-26 06:18:44 +03:00
void exec_status_fill ( ExecStatus * s , pid_t pid , int code , int status ) {
assert ( s ) ;
2010-01-23 03:52:57 +03:00
2010-01-26 06:18:44 +03:00
s - > pid = pid ;
s - > code = code ;
s - > status = status ;
s - > timestamp = now ( CLOCK_REALTIME ) ;
2010-01-23 03:52:57 +03:00
}
2010-01-26 09:02:51 +03:00
char * exec_command_line ( ExecCommand * c ) {
size_t k ;
char * n , * p , * * a ;
bool first = true ;
assert ( c ) ;
assert ( c - > argv ) ;
2010-01-27 04:15:54 +03:00
k = 1 ;
2010-01-26 09:02:51 +03:00
STRV_FOREACH ( a , c - > argv )
k + = strlen ( * a ) + 3 ;
if ( ! ( n = new ( char , k ) ) )
return NULL ;
p = n ;
STRV_FOREACH ( a , c - > argv ) {
if ( ! first )
* ( p + + ) = ' ' ;
else
first = false ;
if ( strpbrk ( * a , WHITESPACE ) ) {
* ( p + + ) = ' \' ' ;
p = stpcpy ( p , * a ) ;
* ( p + + ) = ' \' ' ;
} else
p = stpcpy ( p , * a ) ;
}
2010-01-27 04:15:54 +03:00
* p = 0 ;
2010-01-26 09:02:51 +03:00
/* FIXME: this doesn't really handle arguments that have
* spaces and ticks in them */
return n ;
}
void exec_command_dump ( ExecCommand * c , FILE * f , const char * prefix ) {
char * cmd ;
assert ( c ) ;
assert ( f ) ;
if ( ! prefix )
prefix = " " ;
cmd = exec_command_line ( c ) ;
fprintf ( f ,
" %sCommand Line: %s \n " ,
prefix , cmd ? cmd : strerror ( ENOMEM ) ) ;
free ( cmd ) ;
}
void exec_command_dump_list ( ExecCommand * c , FILE * f , const char * prefix ) {
assert ( f ) ;
if ( ! prefix )
prefix = " " ;
LIST_FOREACH ( command , c , c )
exec_command_dump ( c , f , prefix ) ;
}
2010-01-30 03:55:42 +03:00
2010-02-14 03:05:55 +03:00
void exec_command_append_list ( ExecCommand * * l , ExecCommand * e ) {
ExecCommand * end ;
assert ( l ) ;
assert ( e ) ;
if ( * l ) {
/* It's kinda important that we keep the order here */
LIST_FIND_TAIL ( ExecCommand , command , * l , end ) ;
LIST_INSERT_AFTER ( ExecCommand , command , * l , end , e ) ;
} else
* l = e ;
}
2010-01-30 03:55:42 +03:00
static const char * const exec_output_table [ _EXEC_OUTPUT_MAX ] = {
[ EXEC_OUTPUT_CONSOLE ] = " console " ,
[ EXEC_OUTPUT_NULL ] = " null " ,
[ EXEC_OUTPUT_SYSLOG ] = " syslog " ,
[ EXEC_OUTPUT_KERNEL ] = " kernel "
} ;
DEFINE_STRING_TABLE_LOOKUP ( exec_output , ExecOutput ) ;
static const char * const exec_input_table [ _EXEC_INPUT_MAX ] = {
[ EXEC_INPUT_NULL ] = " null " ,
[ EXEC_INPUT_CONSOLE ] = " console "
} ;
DEFINE_STRING_TABLE_LOOKUP ( exec_input , ExecInput ) ;