| xf.li | bdd93d5 | 2023-05-12 07:10:14 -0700 | [diff] [blame] | 1 | /* Inner loops of cache daemon. | 
|  | 2 | Copyright (C) 1998-2016 Free Software Foundation, Inc. | 
|  | 3 | This file is part of the GNU C Library. | 
|  | 4 | Contributed by Ulrich Drepper <drepper@cygnus.com>, 1998. | 
|  | 5 |  | 
|  | 6 | This program is free software; you can redistribute it and/or modify | 
|  | 7 | it under the terms of the GNU General Public License as published | 
|  | 8 | by the Free Software Foundation; version 2 of the License, or | 
|  | 9 | (at your option) any later version. | 
|  | 10 |  | 
|  | 11 | This program is distributed in the hope that it will be useful, | 
|  | 12 | but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | 13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|  | 14 | GNU General Public License for more details. | 
|  | 15 |  | 
|  | 16 | You should have received a copy of the GNU General Public License | 
|  | 17 | along with this program; if not, see <http://www.gnu.org/licenses/>.  */ | 
|  | 18 |  | 
|  | 19 | #include <alloca.h> | 
|  | 20 | #include <assert.h> | 
|  | 21 | #include <atomic.h> | 
|  | 22 | #include <error.h> | 
|  | 23 | #include <errno.h> | 
|  | 24 | #include <fcntl.h> | 
|  | 25 | #include <grp.h> | 
|  | 26 | #include <ifaddrs.h> | 
|  | 27 | #include <libintl.h> | 
|  | 28 | #include <pthread.h> | 
|  | 29 | #include <pwd.h> | 
|  | 30 | #include <resolv.h> | 
|  | 31 | #include <stdio.h> | 
|  | 32 | #include <stdlib.h> | 
|  | 33 | #include <unistd.h> | 
|  | 34 | #include <stdint.h> | 
|  | 35 | #include <arpa/inet.h> | 
|  | 36 | #ifdef HAVE_NETLINK | 
|  | 37 | # include <linux/netlink.h> | 
|  | 38 | # include <linux/rtnetlink.h> | 
|  | 39 | #endif | 
|  | 40 | #ifdef HAVE_EPOLL | 
|  | 41 | # include <sys/epoll.h> | 
|  | 42 | #endif | 
|  | 43 | #ifdef HAVE_INOTIFY | 
|  | 44 | # include <sys/inotify.h> | 
|  | 45 | #endif | 
|  | 46 | #include <sys/mman.h> | 
|  | 47 | #include <sys/param.h> | 
|  | 48 | #include <sys/poll.h> | 
|  | 49 | #ifdef HAVE_SENDFILE | 
|  | 50 | # include <sys/sendfile.h> | 
|  | 51 | #endif | 
|  | 52 | #include <sys/socket.h> | 
|  | 53 | #include <sys/stat.h> | 
|  | 54 | #include <sys/un.h> | 
|  | 55 |  | 
|  | 56 | #include "nscd.h" | 
|  | 57 | #include "dbg_log.h" | 
|  | 58 | #include "selinux.h" | 
|  | 59 | #include <resolv/resolv.h> | 
|  | 60 |  | 
|  | 61 | #include <kernel-features.h> | 
|  | 62 | #include <libc-internal.h> | 
|  | 63 |  | 
|  | 64 |  | 
|  | 65 | /* Support to run nscd as an unprivileged user */ | 
|  | 66 | const char *server_user; | 
|  | 67 | static uid_t server_uid; | 
|  | 68 | static gid_t server_gid; | 
|  | 69 | const char *stat_user; | 
|  | 70 | uid_t stat_uid; | 
|  | 71 | static gid_t *server_groups; | 
|  | 72 | #ifndef NGROUPS | 
|  | 73 | # define NGROUPS 32 | 
|  | 74 | #endif | 
|  | 75 | static int server_ngroups; | 
|  | 76 |  | 
|  | 77 | static pthread_attr_t attr; | 
|  | 78 |  | 
|  | 79 | static void begin_drop_privileges (void); | 
|  | 80 | static void finish_drop_privileges (void); | 
|  | 81 |  | 
|  | 82 | /* Map request type to a string.  */ | 
|  | 83 | const char *const serv2str[LASTREQ] = | 
|  | 84 | { | 
|  | 85 | [GETPWBYNAME] = "GETPWBYNAME", | 
|  | 86 | [GETPWBYUID] = "GETPWBYUID", | 
|  | 87 | [GETGRBYNAME] = "GETGRBYNAME", | 
|  | 88 | [GETGRBYGID] = "GETGRBYGID", | 
|  | 89 | [GETHOSTBYNAME] = "GETHOSTBYNAME", | 
|  | 90 | [GETHOSTBYNAMEv6] = "GETHOSTBYNAMEv6", | 
|  | 91 | [GETHOSTBYADDR] = "GETHOSTBYADDR", | 
|  | 92 | [GETHOSTBYADDRv6] = "GETHOSTBYADDRv6", | 
|  | 93 | [SHUTDOWN] = "SHUTDOWN", | 
|  | 94 | [GETSTAT] = "GETSTAT", | 
|  | 95 | [INVALIDATE] = "INVALIDATE", | 
|  | 96 | [GETFDPW] = "GETFDPW", | 
|  | 97 | [GETFDGR] = "GETFDGR", | 
|  | 98 | [GETFDHST] = "GETFDHST", | 
|  | 99 | [GETAI] = "GETAI", | 
|  | 100 | [INITGROUPS] = "INITGROUPS", | 
|  | 101 | [GETSERVBYNAME] = "GETSERVBYNAME", | 
|  | 102 | [GETSERVBYPORT] = "GETSERVBYPORT", | 
|  | 103 | [GETFDSERV] = "GETFDSERV", | 
|  | 104 | [GETNETGRENT] = "GETNETGRENT", | 
|  | 105 | [INNETGR] = "INNETGR", | 
|  | 106 | [GETFDNETGR] = "GETFDNETGR" | 
|  | 107 | }; | 
|  | 108 |  | 
|  | 109 | /* The control data structures for the services.  */ | 
|  | 110 | struct database_dyn dbs[lastdb] = | 
|  | 111 | { | 
|  | 112 | [pwddb] = { | 
|  | 113 | .lock = PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP, | 
|  | 114 | .prune_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 115 | .prune_run_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 116 | .enabled = 0, | 
|  | 117 | .check_file = 1, | 
|  | 118 | .persistent = 0, | 
|  | 119 | .propagate = 1, | 
|  | 120 | .shared = 0, | 
|  | 121 | .max_db_size = DEFAULT_MAX_DB_SIZE, | 
|  | 122 | .suggested_module = DEFAULT_SUGGESTED_MODULE, | 
|  | 123 | .db_filename = _PATH_NSCD_PASSWD_DB, | 
|  | 124 | .disabled_iov = &pwd_iov_disabled, | 
|  | 125 | .postimeout = 3600, | 
|  | 126 | .negtimeout = 20, | 
|  | 127 | .wr_fd = -1, | 
|  | 128 | .ro_fd = -1, | 
|  | 129 | .mmap_used = false | 
|  | 130 | }, | 
|  | 131 | [grpdb] = { | 
|  | 132 | .lock = PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP, | 
|  | 133 | .prune_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 134 | .prune_run_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 135 | .enabled = 0, | 
|  | 136 | .check_file = 1, | 
|  | 137 | .persistent = 0, | 
|  | 138 | .propagate = 1, | 
|  | 139 | .shared = 0, | 
|  | 140 | .max_db_size = DEFAULT_MAX_DB_SIZE, | 
|  | 141 | .suggested_module = DEFAULT_SUGGESTED_MODULE, | 
|  | 142 | .db_filename = _PATH_NSCD_GROUP_DB, | 
|  | 143 | .disabled_iov = &grp_iov_disabled, | 
|  | 144 | .postimeout = 3600, | 
|  | 145 | .negtimeout = 60, | 
|  | 146 | .wr_fd = -1, | 
|  | 147 | .ro_fd = -1, | 
|  | 148 | .mmap_used = false | 
|  | 149 | }, | 
|  | 150 | [hstdb] = { | 
|  | 151 | .lock = PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP, | 
|  | 152 | .prune_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 153 | .prune_run_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 154 | .enabled = 0, | 
|  | 155 | .check_file = 1, | 
|  | 156 | .persistent = 0, | 
|  | 157 | .propagate = 0,		/* Not used.  */ | 
|  | 158 | .shared = 0, | 
|  | 159 | .max_db_size = DEFAULT_MAX_DB_SIZE, | 
|  | 160 | .suggested_module = DEFAULT_SUGGESTED_MODULE, | 
|  | 161 | .db_filename = _PATH_NSCD_HOSTS_DB, | 
|  | 162 | .disabled_iov = &hst_iov_disabled, | 
|  | 163 | .postimeout = 3600, | 
|  | 164 | .negtimeout = 20, | 
|  | 165 | .wr_fd = -1, | 
|  | 166 | .ro_fd = -1, | 
|  | 167 | .mmap_used = false | 
|  | 168 | }, | 
|  | 169 | [servdb] = { | 
|  | 170 | .lock = PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP, | 
|  | 171 | .prune_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 172 | .prune_run_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 173 | .enabled = 0, | 
|  | 174 | .check_file = 1, | 
|  | 175 | .persistent = 0, | 
|  | 176 | .propagate = 0,		/* Not used.  */ | 
|  | 177 | .shared = 0, | 
|  | 178 | .max_db_size = DEFAULT_MAX_DB_SIZE, | 
|  | 179 | .suggested_module = DEFAULT_SUGGESTED_MODULE, | 
|  | 180 | .db_filename = _PATH_NSCD_SERVICES_DB, | 
|  | 181 | .disabled_iov = &serv_iov_disabled, | 
|  | 182 | .postimeout = 28800, | 
|  | 183 | .negtimeout = 20, | 
|  | 184 | .wr_fd = -1, | 
|  | 185 | .ro_fd = -1, | 
|  | 186 | .mmap_used = false | 
|  | 187 | }, | 
|  | 188 | [netgrdb] = { | 
|  | 189 | .lock = PTHREAD_RWLOCK_WRITER_NONRECURSIVE_INITIALIZER_NP, | 
|  | 190 | .prune_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 191 | .prune_run_lock = PTHREAD_MUTEX_INITIALIZER, | 
|  | 192 | .enabled = 0, | 
|  | 193 | .check_file = 1, | 
|  | 194 | .persistent = 0, | 
|  | 195 | .propagate = 0,		/* Not used.  */ | 
|  | 196 | .shared = 0, | 
|  | 197 | .max_db_size = DEFAULT_MAX_DB_SIZE, | 
|  | 198 | .suggested_module = DEFAULT_SUGGESTED_MODULE, | 
|  | 199 | .db_filename = _PATH_NSCD_NETGROUP_DB, | 
|  | 200 | .disabled_iov = &netgroup_iov_disabled, | 
|  | 201 | .postimeout = 28800, | 
|  | 202 | .negtimeout = 20, | 
|  | 203 | .wr_fd = -1, | 
|  | 204 | .ro_fd = -1, | 
|  | 205 | .mmap_used = false | 
|  | 206 | } | 
|  | 207 | }; | 
|  | 208 |  | 
|  | 209 |  | 
|  | 210 | /* Mapping of request type to database.  */ | 
|  | 211 | static struct | 
|  | 212 | { | 
|  | 213 | bool data_request; | 
|  | 214 | struct database_dyn *db; | 
|  | 215 | } const reqinfo[LASTREQ] = | 
|  | 216 | { | 
|  | 217 | [GETPWBYNAME] = { true, &dbs[pwddb] }, | 
|  | 218 | [GETPWBYUID] = { true, &dbs[pwddb] }, | 
|  | 219 | [GETGRBYNAME] = { true, &dbs[grpdb] }, | 
|  | 220 | [GETGRBYGID] = { true, &dbs[grpdb] }, | 
|  | 221 | [GETHOSTBYNAME] = { true, &dbs[hstdb] }, | 
|  | 222 | [GETHOSTBYNAMEv6] = { true, &dbs[hstdb] }, | 
|  | 223 | [GETHOSTBYADDR] = { true, &dbs[hstdb] }, | 
|  | 224 | [GETHOSTBYADDRv6] = { true, &dbs[hstdb] }, | 
|  | 225 | [SHUTDOWN] = { false, NULL }, | 
|  | 226 | [GETSTAT] = { false, NULL }, | 
|  | 227 | [SHUTDOWN] = { false, NULL }, | 
|  | 228 | [GETFDPW] = { false, &dbs[pwddb] }, | 
|  | 229 | [GETFDGR] = { false, &dbs[grpdb] }, | 
|  | 230 | [GETFDHST] = { false, &dbs[hstdb] }, | 
|  | 231 | [GETAI] = { true, &dbs[hstdb] }, | 
|  | 232 | [INITGROUPS] = { true, &dbs[grpdb] }, | 
|  | 233 | [GETSERVBYNAME] = { true, &dbs[servdb] }, | 
|  | 234 | [GETSERVBYPORT] = { true, &dbs[servdb] }, | 
|  | 235 | [GETFDSERV] = { false, &dbs[servdb] }, | 
|  | 236 | [GETNETGRENT] = { true, &dbs[netgrdb] }, | 
|  | 237 | [INNETGR] = { true, &dbs[netgrdb] }, | 
|  | 238 | [GETFDNETGR] = { false, &dbs[netgrdb] } | 
|  | 239 | }; | 
|  | 240 |  | 
|  | 241 |  | 
|  | 242 | /* Initial number of threads to use.  */ | 
|  | 243 | int nthreads = -1; | 
|  | 244 | /* Maximum number of threads to use.  */ | 
|  | 245 | int max_nthreads = 32; | 
|  | 246 |  | 
|  | 247 | /* Socket for incoming connections.  */ | 
|  | 248 | static int sock; | 
|  | 249 |  | 
|  | 250 | #ifdef HAVE_INOTIFY | 
|  | 251 | /* Inotify descriptor.  */ | 
|  | 252 | int inotify_fd = -1; | 
|  | 253 | #endif | 
|  | 254 |  | 
|  | 255 | #ifdef HAVE_NETLINK | 
|  | 256 | /* Descriptor for netlink status updates.  */ | 
|  | 257 | static int nl_status_fd = -1; | 
|  | 258 | #endif | 
|  | 259 |  | 
|  | 260 | #ifndef __ASSUME_ACCEPT4 | 
|  | 261 | static int have_accept4; | 
|  | 262 | #endif | 
|  | 263 |  | 
|  | 264 | /* Number of times clients had to wait.  */ | 
|  | 265 | unsigned long int client_queued; | 
|  | 266 |  | 
|  | 267 |  | 
|  | 268 | ssize_t | 
|  | 269 | writeall (int fd, const void *buf, size_t len) | 
|  | 270 | { | 
|  | 271 | size_t n = len; | 
|  | 272 | ssize_t ret; | 
|  | 273 | do | 
|  | 274 | { | 
|  | 275 | ret = TEMP_FAILURE_RETRY (send (fd, buf, n, MSG_NOSIGNAL)); | 
|  | 276 | if (ret <= 0) | 
|  | 277 | break; | 
|  | 278 | buf = (const char *) buf + ret; | 
|  | 279 | n -= ret; | 
|  | 280 | } | 
|  | 281 | while (n > 0); | 
|  | 282 | return ret < 0 ? ret : len - n; | 
|  | 283 | } | 
|  | 284 |  | 
|  | 285 |  | 
|  | 286 | #ifdef HAVE_SENDFILE | 
|  | 287 | ssize_t | 
|  | 288 | sendfileall (int tofd, int fromfd, off_t off, size_t len) | 
|  | 289 | { | 
|  | 290 | ssize_t n = len; | 
|  | 291 | ssize_t ret; | 
|  | 292 |  | 
|  | 293 | do | 
|  | 294 | { | 
|  | 295 | ret = TEMP_FAILURE_RETRY (sendfile (tofd, fromfd, &off, n)); | 
|  | 296 | if (ret <= 0) | 
|  | 297 | break; | 
|  | 298 | n -= ret; | 
|  | 299 | } | 
|  | 300 | while (n > 0); | 
|  | 301 | return ret < 0 ? ret : len - n; | 
|  | 302 | } | 
|  | 303 | #endif | 
|  | 304 |  | 
|  | 305 |  | 
|  | 306 | enum usekey | 
|  | 307 | { | 
|  | 308 | use_not = 0, | 
|  | 309 | /* The following three are not really used, they are symbolic constants.  */ | 
|  | 310 | use_first = 16, | 
|  | 311 | use_begin = 32, | 
|  | 312 | use_end = 64, | 
|  | 313 |  | 
|  | 314 | use_he = 1, | 
|  | 315 | use_he_begin = use_he | use_begin, | 
|  | 316 | use_he_end = use_he | use_end, | 
|  | 317 | use_data = 3, | 
|  | 318 | use_data_begin = use_data | use_begin, | 
|  | 319 | use_data_end = use_data | use_end, | 
|  | 320 | use_data_first = use_data_begin | use_first | 
|  | 321 | }; | 
|  | 322 |  | 
|  | 323 |  | 
|  | 324 | static int | 
|  | 325 | check_use (const char *data, nscd_ssize_t first_free, uint8_t *usemap, | 
|  | 326 | enum usekey use, ref_t start, size_t len) | 
|  | 327 | { | 
|  | 328 | assert (len >= 2); | 
|  | 329 |  | 
|  | 330 | if (start > first_free || start + len > first_free | 
|  | 331 | || (start & BLOCK_ALIGN_M1)) | 
|  | 332 | return 0; | 
|  | 333 |  | 
|  | 334 | if (usemap[start] == use_not) | 
|  | 335 | { | 
|  | 336 | /* Add the start marker.  */ | 
|  | 337 | usemap[start] = use | use_begin; | 
|  | 338 | use &= ~use_first; | 
|  | 339 |  | 
|  | 340 | while (--len > 0) | 
|  | 341 | if (usemap[++start] != use_not) | 
|  | 342 | return 0; | 
|  | 343 | else | 
|  | 344 | usemap[start] = use; | 
|  | 345 |  | 
|  | 346 | /* Add the end marker.  */ | 
|  | 347 | usemap[start] = use | use_end; | 
|  | 348 | } | 
|  | 349 | else if ((usemap[start] & ~use_first) == ((use | use_begin) & ~use_first)) | 
|  | 350 | { | 
|  | 351 | /* Hash entries can't be shared.  */ | 
|  | 352 | if (use == use_he) | 
|  | 353 | return 0; | 
|  | 354 |  | 
|  | 355 | usemap[start] |= (use & use_first); | 
|  | 356 | use &= ~use_first; | 
|  | 357 |  | 
|  | 358 | while (--len > 1) | 
|  | 359 | if (usemap[++start] != use) | 
|  | 360 | return 0; | 
|  | 361 |  | 
|  | 362 | if (usemap[++start] != (use | use_end)) | 
|  | 363 | return 0; | 
|  | 364 | } | 
|  | 365 | else | 
|  | 366 | /* Points to a wrong object or somewhere in the middle.  */ | 
|  | 367 | return 0; | 
|  | 368 |  | 
|  | 369 | return 1; | 
|  | 370 | } | 
|  | 371 |  | 
|  | 372 |  | 
|  | 373 | /* Verify data in persistent database.  */ | 
|  | 374 | static int | 
|  | 375 | verify_persistent_db (void *mem, struct database_pers_head *readhead, int dbnr) | 
|  | 376 | { | 
|  | 377 | assert (dbnr == pwddb || dbnr == grpdb || dbnr == hstdb || dbnr == servdb | 
|  | 378 | || dbnr == netgrdb); | 
|  | 379 |  | 
|  | 380 | time_t now = time (NULL); | 
|  | 381 |  | 
|  | 382 | struct database_pers_head *head = mem; | 
|  | 383 | struct database_pers_head head_copy = *head; | 
|  | 384 |  | 
|  | 385 | /* Check that the header that was read matches the head in the database.  */ | 
|  | 386 | if (memcmp (head, readhead, sizeof (*head)) != 0) | 
|  | 387 | return 0; | 
|  | 388 |  | 
|  | 389 | /* First some easy tests: make sure the database header is sane.  */ | 
|  | 390 | if (head->version != DB_VERSION | 
|  | 391 | || head->header_size != sizeof (*head) | 
|  | 392 | /* We allow a timestamp to be one hour ahead of the current time. | 
|  | 393 | This should cover daylight saving time changes.  */ | 
|  | 394 | || head->timestamp > now + 60 * 60 + 60 | 
|  | 395 | || (head->gc_cycle & 1) | 
|  | 396 | || head->module == 0 | 
|  | 397 | || (size_t) head->module > INT32_MAX / sizeof (ref_t) | 
|  | 398 | || (size_t) head->data_size > INT32_MAX - head->module * sizeof (ref_t) | 
|  | 399 | || head->first_free < 0 | 
|  | 400 | || head->first_free > head->data_size | 
|  | 401 | || (head->first_free & BLOCK_ALIGN_M1) != 0 | 
|  | 402 | || head->maxnentries < 0 | 
|  | 403 | || head->maxnsearched < 0) | 
|  | 404 | return 0; | 
|  | 405 |  | 
|  | 406 | uint8_t *usemap = calloc (head->first_free, 1); | 
|  | 407 | if (usemap == NULL) | 
|  | 408 | return 0; | 
|  | 409 |  | 
|  | 410 | const char *data = (char *) &head->array[roundup (head->module, | 
|  | 411 | ALIGN / sizeof (ref_t))]; | 
|  | 412 |  | 
|  | 413 | nscd_ssize_t he_cnt = 0; | 
|  | 414 | for (nscd_ssize_t cnt = 0; cnt < head->module; ++cnt) | 
|  | 415 | { | 
|  | 416 | ref_t trail = head->array[cnt]; | 
|  | 417 | ref_t work = trail; | 
|  | 418 | int tick = 0; | 
|  | 419 |  | 
|  | 420 | while (work != ENDREF) | 
|  | 421 | { | 
|  | 422 | if (! check_use (data, head->first_free, usemap, use_he, work, | 
|  | 423 | sizeof (struct hashentry))) | 
|  | 424 | goto fail; | 
|  | 425 |  | 
|  | 426 | /* Now we know we can dereference the record.  */ | 
|  | 427 | struct hashentry *here = (struct hashentry *) (data + work); | 
|  | 428 |  | 
|  | 429 | ++he_cnt; | 
|  | 430 |  | 
|  | 431 | /* Make sure the record is for this type of service.  */ | 
|  | 432 | if (here->type >= LASTREQ | 
|  | 433 | || reqinfo[here->type].db != &dbs[dbnr]) | 
|  | 434 | goto fail; | 
|  | 435 |  | 
|  | 436 | /* Validate boolean field value.  */ | 
|  | 437 | if (here->first != false && here->first != true) | 
|  | 438 | goto fail; | 
|  | 439 |  | 
|  | 440 | if (here->len < 0) | 
|  | 441 | goto fail; | 
|  | 442 |  | 
|  | 443 | /* Now the data.  */ | 
|  | 444 | if (here->packet < 0 | 
|  | 445 | || here->packet > head->first_free | 
|  | 446 | || here->packet + sizeof (struct datahead) > head->first_free) | 
|  | 447 | goto fail; | 
|  | 448 |  | 
|  | 449 | struct datahead *dh = (struct datahead *) (data + here->packet); | 
|  | 450 |  | 
|  | 451 | if (! check_use (data, head->first_free, usemap, | 
|  | 452 | use_data | (here->first ? use_first : 0), | 
|  | 453 | here->packet, dh->allocsize)) | 
|  | 454 | goto fail; | 
|  | 455 |  | 
|  | 456 | if (dh->allocsize < sizeof (struct datahead) | 
|  | 457 | || dh->recsize > dh->allocsize | 
|  | 458 | || (dh->notfound != false && dh->notfound != true) | 
|  | 459 | || (dh->usable != false && dh->usable != true)) | 
|  | 460 | goto fail; | 
|  | 461 |  | 
|  | 462 | if (here->key < here->packet + sizeof (struct datahead) | 
|  | 463 | || here->key > here->packet + dh->allocsize | 
|  | 464 | || here->key + here->len > here->packet + dh->allocsize) | 
|  | 465 | goto fail; | 
|  | 466 |  | 
|  | 467 | work = here->next; | 
|  | 468 |  | 
|  | 469 | if (work == trail) | 
|  | 470 | /* A circular list, this must not happen.  */ | 
|  | 471 | goto fail; | 
|  | 472 | if (tick) | 
|  | 473 | trail = ((struct hashentry *) (data + trail))->next; | 
|  | 474 | tick = 1 - tick; | 
|  | 475 | } | 
|  | 476 | } | 
|  | 477 |  | 
|  | 478 | if (he_cnt != head->nentries) | 
|  | 479 | goto fail; | 
|  | 480 |  | 
|  | 481 | /* See if all data and keys had at least one reference from | 
|  | 482 | he->first == true hashentry.  */ | 
|  | 483 | for (ref_t idx = 0; idx < head->first_free; ++idx) | 
|  | 484 | { | 
|  | 485 | if (usemap[idx] == use_data_begin) | 
|  | 486 | goto fail; | 
|  | 487 | } | 
|  | 488 |  | 
|  | 489 | /* Finally, make sure the database hasn't changed since the first test.  */ | 
|  | 490 | if (memcmp (mem, &head_copy, sizeof (*head)) != 0) | 
|  | 491 | goto fail; | 
|  | 492 |  | 
|  | 493 | free (usemap); | 
|  | 494 | return 1; | 
|  | 495 |  | 
|  | 496 | fail: | 
|  | 497 | free (usemap); | 
|  | 498 | return 0; | 
|  | 499 | } | 
|  | 500 |  | 
|  | 501 |  | 
|  | 502 | #ifdef O_CLOEXEC | 
|  | 503 | # define EXTRA_O_FLAGS O_CLOEXEC | 
|  | 504 | #else | 
|  | 505 | # define EXTRA_O_FLAGS 0 | 
|  | 506 | #endif | 
|  | 507 |  | 
|  | 508 |  | 
|  | 509 | /* Initialize database information structures.  */ | 
|  | 510 | void | 
|  | 511 | nscd_init (void) | 
|  | 512 | { | 
|  | 513 | /* Look up unprivileged uid/gid/groups before we start listening on the | 
|  | 514 | socket  */ | 
|  | 515 | if (server_user != NULL) | 
|  | 516 | begin_drop_privileges (); | 
|  | 517 |  | 
|  | 518 | if (nthreads == -1) | 
|  | 519 | /* No configuration for this value, assume a default.  */ | 
|  | 520 | nthreads = 4; | 
|  | 521 |  | 
|  | 522 | for (size_t cnt = 0; cnt < lastdb; ++cnt) | 
|  | 523 | if (dbs[cnt].enabled) | 
|  | 524 | { | 
|  | 525 | pthread_rwlock_init (&dbs[cnt].lock, NULL); | 
|  | 526 | pthread_mutex_init (&dbs[cnt].memlock, NULL); | 
|  | 527 |  | 
|  | 528 | if (dbs[cnt].persistent) | 
|  | 529 | { | 
|  | 530 | /* Try to open the appropriate file on disk.  */ | 
|  | 531 | int fd = open (dbs[cnt].db_filename, O_RDWR | EXTRA_O_FLAGS); | 
|  | 532 | if (fd != -1) | 
|  | 533 | { | 
|  | 534 | char *msg = NULL; | 
|  | 535 | struct stat64 st; | 
|  | 536 | void *mem; | 
|  | 537 | size_t total; | 
|  | 538 | struct database_pers_head head; | 
|  | 539 | ssize_t n = TEMP_FAILURE_RETRY (read (fd, &head, | 
|  | 540 | sizeof (head))); | 
|  | 541 | if (n != sizeof (head) || fstat64 (fd, &st) != 0) | 
|  | 542 | { | 
|  | 543 | fail_db_errno: | 
|  | 544 | /* The code is single-threaded at this point so | 
|  | 545 | using strerror is just fine.  */ | 
|  | 546 | msg = strerror (errno); | 
|  | 547 | fail_db: | 
|  | 548 | dbg_log (_("invalid persistent database file \"%s\": %s"), | 
|  | 549 | dbs[cnt].db_filename, msg); | 
|  | 550 | unlink (dbs[cnt].db_filename); | 
|  | 551 | } | 
|  | 552 | else if (head.module == 0 && head.data_size == 0) | 
|  | 553 | { | 
|  | 554 | /* The file has been created, but the head has not | 
|  | 555 | been initialized yet.  */ | 
|  | 556 | msg = _("uninitialized header"); | 
|  | 557 | goto fail_db; | 
|  | 558 | } | 
|  | 559 | else if (head.header_size != (int) sizeof (head)) | 
|  | 560 | { | 
|  | 561 | msg = _("header size does not match"); | 
|  | 562 | goto fail_db; | 
|  | 563 | } | 
|  | 564 | else if ((total = (sizeof (head) | 
|  | 565 | + roundup (head.module * sizeof (ref_t), | 
|  | 566 | ALIGN) | 
|  | 567 | + head.data_size)) | 
|  | 568 | > st.st_size | 
|  | 569 | || total < sizeof (head)) | 
|  | 570 | { | 
|  | 571 | msg = _("file size does not match"); | 
|  | 572 | goto fail_db; | 
|  | 573 | } | 
|  | 574 | /* Note we map with the maximum size allowed for the | 
|  | 575 | database.  This is likely much larger than the | 
|  | 576 | actual file size.  This is OK on most OSes since | 
|  | 577 | extensions of the underlying file will | 
|  | 578 | automatically translate more pages available for | 
|  | 579 | memory access.  */ | 
|  | 580 | else if ((mem = mmap (NULL, dbs[cnt].max_db_size, | 
|  | 581 | PROT_READ | PROT_WRITE, | 
|  | 582 | MAP_SHARED, fd, 0)) | 
|  | 583 | == MAP_FAILED) | 
|  | 584 | goto fail_db_errno; | 
|  | 585 | else if (!verify_persistent_db (mem, &head, cnt)) | 
|  | 586 | { | 
|  | 587 | munmap (mem, total); | 
|  | 588 | msg = _("verification failed"); | 
|  | 589 | goto fail_db; | 
|  | 590 | } | 
|  | 591 | else | 
|  | 592 | { | 
|  | 593 | /* Success.  We have the database.  */ | 
|  | 594 | dbs[cnt].head = mem; | 
|  | 595 | dbs[cnt].memsize = total; | 
|  | 596 | dbs[cnt].data = (char *) | 
|  | 597 | &dbs[cnt].head->array[roundup (dbs[cnt].head->module, | 
|  | 598 | ALIGN / sizeof (ref_t))]; | 
|  | 599 | dbs[cnt].mmap_used = true; | 
|  | 600 |  | 
|  | 601 | if (dbs[cnt].suggested_module > head.module) | 
|  | 602 | dbg_log (_("suggested size of table for database %s larger than the persistent database's table"), | 
|  | 603 | dbnames[cnt]); | 
|  | 604 |  | 
|  | 605 | dbs[cnt].wr_fd = fd; | 
|  | 606 | fd = -1; | 
|  | 607 | /* We also need a read-only descriptor.  */ | 
|  | 608 | if (dbs[cnt].shared) | 
|  | 609 | { | 
|  | 610 | dbs[cnt].ro_fd = open (dbs[cnt].db_filename, | 
|  | 611 | O_RDONLY | EXTRA_O_FLAGS); | 
|  | 612 | if (dbs[cnt].ro_fd == -1) | 
|  | 613 | dbg_log (_("\ | 
|  | 614 | cannot create read-only descriptor for \"%s\"; no mmap"), | 
|  | 615 | dbs[cnt].db_filename); | 
|  | 616 | } | 
|  | 617 |  | 
|  | 618 | // XXX Shall we test whether the descriptors actually | 
|  | 619 | // XXX point to the same file? | 
|  | 620 | } | 
|  | 621 |  | 
|  | 622 | /* Close the file descriptors in case something went | 
|  | 623 | wrong in which case the variable have not been | 
|  | 624 | assigned -1.  */ | 
|  | 625 | if (fd != -1) | 
|  | 626 | close (fd); | 
|  | 627 | } | 
|  | 628 | else if (errno == EACCES) | 
|  | 629 | do_exit (EXIT_FAILURE, 0, _("cannot access '%s'"), | 
|  | 630 | dbs[cnt].db_filename); | 
|  | 631 | } | 
|  | 632 |  | 
|  | 633 | if (dbs[cnt].head == NULL) | 
|  | 634 | { | 
|  | 635 | /* No database loaded.  Allocate the data structure, | 
|  | 636 | possibly on disk.  */ | 
|  | 637 | struct database_pers_head head; | 
|  | 638 | size_t total = (sizeof (head) | 
|  | 639 | + roundup (dbs[cnt].suggested_module | 
|  | 640 | * sizeof (ref_t), ALIGN) | 
|  | 641 | + (dbs[cnt].suggested_module | 
|  | 642 | * DEFAULT_DATASIZE_PER_BUCKET)); | 
|  | 643 |  | 
|  | 644 | /* Try to create the database.  If we do not need a | 
|  | 645 | persistent database create a temporary file.  */ | 
|  | 646 | int fd; | 
|  | 647 | int ro_fd = -1; | 
|  | 648 | if (dbs[cnt].persistent) | 
|  | 649 | { | 
|  | 650 | fd = open (dbs[cnt].db_filename, | 
|  | 651 | O_RDWR | O_CREAT | O_EXCL | O_TRUNC | EXTRA_O_FLAGS, | 
|  | 652 | S_IRUSR | S_IWUSR); | 
|  | 653 | if (fd != -1 && dbs[cnt].shared) | 
|  | 654 | ro_fd = open (dbs[cnt].db_filename, | 
|  | 655 | O_RDONLY | EXTRA_O_FLAGS); | 
|  | 656 | } | 
|  | 657 | else | 
|  | 658 | { | 
|  | 659 | char fname[] = _PATH_NSCD_XYZ_DB_TMP; | 
|  | 660 | fd = mkostemp (fname, EXTRA_O_FLAGS); | 
|  | 661 |  | 
|  | 662 | /* We do not need the file name anymore after we | 
|  | 663 | opened another file descriptor in read-only mode.  */ | 
|  | 664 | if (fd != -1) | 
|  | 665 | { | 
|  | 666 | if (dbs[cnt].shared) | 
|  | 667 | ro_fd = open (fname, O_RDONLY | EXTRA_O_FLAGS); | 
|  | 668 |  | 
|  | 669 | unlink (fname); | 
|  | 670 | } | 
|  | 671 | } | 
|  | 672 |  | 
|  | 673 | if (fd == -1) | 
|  | 674 | { | 
|  | 675 | if (errno == EEXIST) | 
|  | 676 | { | 
|  | 677 | dbg_log (_("database for %s corrupted or simultaneously used; remove %s manually if necessary and restart"), | 
|  | 678 | dbnames[cnt], dbs[cnt].db_filename); | 
|  | 679 | do_exit (1, 0, NULL); | 
|  | 680 | } | 
|  | 681 |  | 
|  | 682 | if  (dbs[cnt].persistent) | 
|  | 683 | dbg_log (_("cannot create %s; no persistent database used"), | 
|  | 684 | dbs[cnt].db_filename); | 
|  | 685 | else | 
|  | 686 | dbg_log (_("cannot create %s; no sharing possible"), | 
|  | 687 | dbs[cnt].db_filename); | 
|  | 688 |  | 
|  | 689 | dbs[cnt].persistent = 0; | 
|  | 690 | // XXX remember: no mmap | 
|  | 691 | } | 
|  | 692 | else | 
|  | 693 | { | 
|  | 694 | /* Tell the user if we could not create the read-only | 
|  | 695 | descriptor.  */ | 
|  | 696 | if (ro_fd == -1 && dbs[cnt].shared) | 
|  | 697 | dbg_log (_("\ | 
|  | 698 | cannot create read-only descriptor for \"%s\"; no mmap"), | 
|  | 699 | dbs[cnt].db_filename); | 
|  | 700 |  | 
|  | 701 | /* Before we create the header, initialize the hash | 
|  | 702 | table.  That way if we get interrupted while writing | 
|  | 703 | the header we can recognize a partially initialized | 
|  | 704 | database.  */ | 
|  | 705 | size_t ps = sysconf (_SC_PAGESIZE); | 
|  | 706 | char tmpbuf[ps]; | 
|  | 707 | assert (~ENDREF == 0); | 
|  | 708 | memset (tmpbuf, '\xff', ps); | 
|  | 709 |  | 
|  | 710 | size_t remaining = dbs[cnt].suggested_module * sizeof (ref_t); | 
|  | 711 | off_t offset = sizeof (head); | 
|  | 712 |  | 
|  | 713 | size_t towrite; | 
|  | 714 | if (offset % ps != 0) | 
|  | 715 | { | 
|  | 716 | towrite = MIN (remaining, ps - (offset % ps)); | 
|  | 717 | if (pwrite (fd, tmpbuf, towrite, offset) != towrite) | 
|  | 718 | goto write_fail; | 
|  | 719 | offset += towrite; | 
|  | 720 | remaining -= towrite; | 
|  | 721 | } | 
|  | 722 |  | 
|  | 723 | while (remaining > ps) | 
|  | 724 | { | 
|  | 725 | if (pwrite (fd, tmpbuf, ps, offset) == -1) | 
|  | 726 | goto write_fail; | 
|  | 727 | offset += ps; | 
|  | 728 | remaining -= ps; | 
|  | 729 | } | 
|  | 730 |  | 
|  | 731 | if (remaining > 0 | 
|  | 732 | && pwrite (fd, tmpbuf, remaining, offset) != remaining) | 
|  | 733 | goto write_fail; | 
|  | 734 |  | 
|  | 735 | /* Create the header of the file.  */ | 
|  | 736 | struct database_pers_head head = | 
|  | 737 | { | 
|  | 738 | .version = DB_VERSION, | 
|  | 739 | .header_size = sizeof (head), | 
|  | 740 | .module = dbs[cnt].suggested_module, | 
|  | 741 | .data_size = (dbs[cnt].suggested_module | 
|  | 742 | * DEFAULT_DATASIZE_PER_BUCKET), | 
|  | 743 | .first_free = 0 | 
|  | 744 | }; | 
|  | 745 | void *mem; | 
|  | 746 |  | 
|  | 747 | if ((TEMP_FAILURE_RETRY (write (fd, &head, sizeof (head))) | 
|  | 748 | != sizeof (head)) | 
|  | 749 | || (TEMP_FAILURE_RETRY_VAL (posix_fallocate (fd, 0, total)) | 
|  | 750 | != 0) | 
|  | 751 | || (mem = mmap (NULL, dbs[cnt].max_db_size, | 
|  | 752 | PROT_READ | PROT_WRITE, | 
|  | 753 | MAP_SHARED, fd, 0)) == MAP_FAILED) | 
|  | 754 | { | 
|  | 755 | write_fail: | 
|  | 756 | unlink (dbs[cnt].db_filename); | 
|  | 757 | dbg_log (_("cannot write to database file %s: %s"), | 
|  | 758 | dbs[cnt].db_filename, strerror (errno)); | 
|  | 759 | dbs[cnt].persistent = 0; | 
|  | 760 | } | 
|  | 761 | else | 
|  | 762 | { | 
|  | 763 | /* Success.  */ | 
|  | 764 | dbs[cnt].head = mem; | 
|  | 765 | dbs[cnt].data = (char *) | 
|  | 766 | &dbs[cnt].head->array[roundup (dbs[cnt].head->module, | 
|  | 767 | ALIGN / sizeof (ref_t))]; | 
|  | 768 | dbs[cnt].memsize = total; | 
|  | 769 | dbs[cnt].mmap_used = true; | 
|  | 770 |  | 
|  | 771 | /* Remember the descriptors.  */ | 
|  | 772 | dbs[cnt].wr_fd = fd; | 
|  | 773 | dbs[cnt].ro_fd = ro_fd; | 
|  | 774 | fd = -1; | 
|  | 775 | ro_fd = -1; | 
|  | 776 | } | 
|  | 777 |  | 
|  | 778 | if (fd != -1) | 
|  | 779 | close (fd); | 
|  | 780 | if (ro_fd != -1) | 
|  | 781 | close (ro_fd); | 
|  | 782 | } | 
|  | 783 | } | 
|  | 784 |  | 
|  | 785 | #if !defined O_CLOEXEC || !defined __ASSUME_O_CLOEXEC | 
|  | 786 | /* We do not check here whether the O_CLOEXEC provided to the | 
|  | 787 | open call was successful or not.  The two fcntl calls are | 
|  | 788 | only performed once each per process start-up and therefore | 
|  | 789 | is not noticeable at all.  */ | 
|  | 790 | if (paranoia | 
|  | 791 | && ((dbs[cnt].wr_fd != -1 | 
|  | 792 | && fcntl (dbs[cnt].wr_fd, F_SETFD, FD_CLOEXEC) == -1) | 
|  | 793 | || (dbs[cnt].ro_fd != -1 | 
|  | 794 | && fcntl (dbs[cnt].ro_fd, F_SETFD, FD_CLOEXEC) == -1))) | 
|  | 795 | { | 
|  | 796 | dbg_log (_("\ | 
|  | 797 | cannot set socket to close on exec: %s; disabling paranoia mode"), | 
|  | 798 | strerror (errno)); | 
|  | 799 | paranoia = 0; | 
|  | 800 | } | 
|  | 801 | #endif | 
|  | 802 |  | 
|  | 803 | if (dbs[cnt].head == NULL) | 
|  | 804 | { | 
|  | 805 | /* We do not use the persistent database.  Just | 
|  | 806 | create an in-memory data structure.  */ | 
|  | 807 | assert (! dbs[cnt].persistent); | 
|  | 808 |  | 
|  | 809 | dbs[cnt].head = xmalloc (sizeof (struct database_pers_head) | 
|  | 810 | + (dbs[cnt].suggested_module | 
|  | 811 | * sizeof (ref_t))); | 
|  | 812 | memset (dbs[cnt].head, '\0', sizeof (struct database_pers_head)); | 
|  | 813 | assert (~ENDREF == 0); | 
|  | 814 | memset (dbs[cnt].head->array, '\xff', | 
|  | 815 | dbs[cnt].suggested_module * sizeof (ref_t)); | 
|  | 816 | dbs[cnt].head->module = dbs[cnt].suggested_module; | 
|  | 817 | dbs[cnt].head->data_size = (DEFAULT_DATASIZE_PER_BUCKET | 
|  | 818 | * dbs[cnt].head->module); | 
|  | 819 | dbs[cnt].data = xmalloc (dbs[cnt].head->data_size); | 
|  | 820 | dbs[cnt].head->first_free = 0; | 
|  | 821 |  | 
|  | 822 | dbs[cnt].shared = 0; | 
|  | 823 | assert (dbs[cnt].ro_fd == -1); | 
|  | 824 | } | 
|  | 825 | } | 
|  | 826 |  | 
|  | 827 | /* Create the socket.  */ | 
|  | 828 | sock = socket (AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC | SOCK_NONBLOCK, 0); | 
|  | 829 | if (sock < 0) | 
|  | 830 | { | 
|  | 831 | dbg_log (_("cannot open socket: %s"), strerror (errno)); | 
|  | 832 | do_exit (errno == EACCES ? 4 : 1, 0, NULL); | 
|  | 833 | } | 
|  | 834 | /* Bind a name to the socket.  */ | 
|  | 835 | struct sockaddr_un sock_addr; | 
|  | 836 | sock_addr.sun_family = AF_UNIX; | 
|  | 837 | strcpy (sock_addr.sun_path, _PATH_NSCDSOCKET); | 
|  | 838 | if (bind (sock, (struct sockaddr *) &sock_addr, sizeof (sock_addr)) < 0) | 
|  | 839 | { | 
|  | 840 | dbg_log ("%s: %s", _PATH_NSCDSOCKET, strerror (errno)); | 
|  | 841 | do_exit (errno == EACCES ? 4 : 1, 0, NULL); | 
|  | 842 | } | 
|  | 843 |  | 
|  | 844 | /* Set permissions for the socket.  */ | 
|  | 845 | chmod (_PATH_NSCDSOCKET, DEFFILEMODE); | 
|  | 846 |  | 
|  | 847 | /* Set the socket up to accept connections.  */ | 
|  | 848 | if (listen (sock, SOMAXCONN) < 0) | 
|  | 849 | { | 
|  | 850 | dbg_log (_("cannot enable socket to accept connections: %s"), | 
|  | 851 | strerror (errno)); | 
|  | 852 | do_exit (1, 0, NULL); | 
|  | 853 | } | 
|  | 854 |  | 
|  | 855 | #ifdef HAVE_NETLINK | 
|  | 856 | if (dbs[hstdb].enabled) | 
|  | 857 | { | 
|  | 858 | /* Try to open netlink socket to monitor network setting changes.  */ | 
|  | 859 | nl_status_fd = socket (AF_NETLINK, | 
|  | 860 | SOCK_RAW | SOCK_CLOEXEC | SOCK_NONBLOCK, | 
|  | 861 | NETLINK_ROUTE); | 
|  | 862 | if (nl_status_fd != -1) | 
|  | 863 | { | 
|  | 864 | struct sockaddr_nl snl; | 
|  | 865 | memset (&snl, '\0', sizeof (snl)); | 
|  | 866 | snl.nl_family = AF_NETLINK; | 
|  | 867 | /* XXX Is this the best set to use?  */ | 
|  | 868 | snl.nl_groups = (RTMGRP_IPV4_IFADDR | RTMGRP_TC | RTMGRP_IPV4_MROUTE | 
|  | 869 | | RTMGRP_IPV4_ROUTE | RTMGRP_IPV4_RULE | 
|  | 870 | | RTMGRP_IPV6_IFADDR | RTMGRP_IPV6_MROUTE | 
|  | 871 | | RTMGRP_IPV6_ROUTE | RTMGRP_IPV6_IFINFO | 
|  | 872 | | RTMGRP_IPV6_PREFIX); | 
|  | 873 |  | 
|  | 874 | if (bind (nl_status_fd, (struct sockaddr *) &snl, sizeof (snl)) != 0) | 
|  | 875 | { | 
|  | 876 | close (nl_status_fd); | 
|  | 877 | nl_status_fd = -1; | 
|  | 878 | } | 
|  | 879 | else | 
|  | 880 | { | 
|  | 881 | /* Start the timestamp process.  */ | 
|  | 882 | dbs[hstdb].head->extra_data[NSCD_HST_IDX_CONF_TIMESTAMP] | 
|  | 883 | = __bump_nl_timestamp (); | 
|  | 884 | } | 
|  | 885 | } | 
|  | 886 | } | 
|  | 887 | #endif | 
|  | 888 |  | 
|  | 889 | /* Change to unprivileged uid/gid/groups if specified in config file */ | 
|  | 890 | if (server_user != NULL) | 
|  | 891 | finish_drop_privileges (); | 
|  | 892 | } | 
|  | 893 |  | 
|  | 894 | #ifdef HAVE_INOTIFY | 
|  | 895 | #define TRACED_FILE_MASK (IN_DELETE_SELF | IN_CLOSE_WRITE | IN_MOVE_SELF) | 
|  | 896 | #define TRACED_DIR_MASK (IN_DELETE_SELF | IN_CREATE | IN_MOVED_TO | IN_MOVE_SELF) | 
|  | 897 | void | 
|  | 898 | install_watches (struct traced_file *finfo) | 
|  | 899 | { | 
|  | 900 | /* Use inotify support if we have it.  */ | 
|  | 901 | if (finfo->inotify_descr[TRACED_FILE] < 0) | 
|  | 902 | finfo->inotify_descr[TRACED_FILE] = inotify_add_watch (inotify_fd, | 
|  | 903 | finfo->fname, | 
|  | 904 | TRACED_FILE_MASK); | 
|  | 905 | if (finfo->inotify_descr[TRACED_FILE] < 0) | 
|  | 906 | { | 
|  | 907 | dbg_log (_("disabled inotify-based monitoring for file `%s': %s"), | 
|  | 908 | finfo->fname, strerror (errno)); | 
|  | 909 | return; | 
|  | 910 | } | 
|  | 911 | dbg_log (_("monitoring file `%s` (%d)"), | 
|  | 912 | finfo->fname, finfo->inotify_descr[TRACED_FILE]); | 
|  | 913 | /* Additionally listen for events in the file's parent directory. | 
|  | 914 | We do this because the file to be watched might be | 
|  | 915 | deleted and then added back again.  When it is added back again | 
|  | 916 | we must re-add the watch.  We must also cover IN_MOVED_TO to | 
|  | 917 | detect a file being moved into the directory.  */ | 
|  | 918 | if (finfo->inotify_descr[TRACED_DIR] < 0) | 
|  | 919 | finfo->inotify_descr[TRACED_DIR] = inotify_add_watch (inotify_fd, | 
|  | 920 | finfo->dname, | 
|  | 921 | TRACED_DIR_MASK); | 
|  | 922 | if (finfo->inotify_descr[TRACED_DIR] < 0) | 
|  | 923 | { | 
|  | 924 | dbg_log (_("disabled inotify-based monitoring for directory `%s': %s"), | 
|  | 925 | finfo->fname, strerror (errno)); | 
|  | 926 | return; | 
|  | 927 | } | 
|  | 928 | dbg_log (_("monitoring directory `%s` (%d)"), | 
|  | 929 | finfo->dname, finfo->inotify_descr[TRACED_DIR]); | 
|  | 930 | } | 
|  | 931 | #endif | 
|  | 932 |  | 
|  | 933 | /* Register the file in FINFO as a traced file for the database DBS[DBIX]. | 
|  | 934 |  | 
|  | 935 | We support registering multiple files per database. Each call to | 
|  | 936 | register_traced_file adds to the list of registered files. | 
|  | 937 |  | 
|  | 938 | When we prune the database, either through timeout or a request to | 
|  | 939 | invalidate, we will check to see if any of the registered files has changed. | 
|  | 940 | When we accept new connections to handle a cache request we will also | 
|  | 941 | check to see if any of the registered files has changed. | 
|  | 942 |  | 
|  | 943 | If we have inotify support then we install an inotify fd to notify us of | 
|  | 944 | file deletion or modification, both of which will require we invalidate | 
|  | 945 | the cache for the database.  Without inotify support we stat the file and | 
|  | 946 | store st_mtime to determine if the file has been modified.  */ | 
|  | 947 | void | 
|  | 948 | register_traced_file (size_t dbidx, struct traced_file *finfo) | 
|  | 949 | { | 
|  | 950 | /* If the database is disabled or file checking is disabled | 
|  | 951 | then ignore the registration.  */ | 
|  | 952 | if (! dbs[dbidx].enabled || ! dbs[dbidx].check_file) | 
|  | 953 | return; | 
|  | 954 |  | 
|  | 955 | if (__glibc_unlikely (debug_level > 0)) | 
|  | 956 | dbg_log (_("monitoring file %s for database %s"), | 
|  | 957 | finfo->fname, dbnames[dbidx]); | 
|  | 958 |  | 
|  | 959 | #ifdef HAVE_INOTIFY | 
|  | 960 | install_watches (finfo); | 
|  | 961 | #endif | 
|  | 962 | struct stat64 st; | 
|  | 963 | if (stat64 (finfo->fname, &st) < 0) | 
|  | 964 | { | 
|  | 965 | /* We cannot stat() the file. Set mtime to zero and try again later.  */ | 
|  | 966 | dbg_log (_("stat failed for file `%s'; will try again later: %s"), | 
|  | 967 | finfo->fname, strerror (errno)); | 
|  | 968 | finfo->mtime = 0; | 
|  | 969 | } | 
|  | 970 | else | 
|  | 971 | finfo->mtime = st.st_mtime; | 
|  | 972 |  | 
|  | 973 | /* Queue up the file name.  */ | 
|  | 974 | finfo->next = dbs[dbidx].traced_files; | 
|  | 975 | dbs[dbidx].traced_files = finfo; | 
|  | 976 | } | 
|  | 977 |  | 
|  | 978 |  | 
|  | 979 | /* Close the connections.  */ | 
|  | 980 | void | 
|  | 981 | close_sockets (void) | 
|  | 982 | { | 
|  | 983 | close (sock); | 
|  | 984 | } | 
|  | 985 |  | 
|  | 986 |  | 
|  | 987 | static void | 
|  | 988 | invalidate_cache (char *key, int fd) | 
|  | 989 | { | 
|  | 990 | dbtype number; | 
|  | 991 | int32_t resp; | 
|  | 992 |  | 
|  | 993 | for (number = pwddb; number < lastdb; ++number) | 
|  | 994 | if (strcmp (key, dbnames[number]) == 0) | 
|  | 995 | { | 
|  | 996 | struct traced_file *runp = dbs[number].traced_files; | 
|  | 997 | while (runp != NULL) | 
|  | 998 | { | 
|  | 999 | /* Make sure we reload from file when checking mtime.  */ | 
|  | 1000 | runp->mtime = 0; | 
|  | 1001 | #ifdef HAVE_INOTIFY | 
|  | 1002 | /* During an invalidation we try to reload the traced | 
|  | 1003 | file watches.  This allows the user to re-sync if | 
|  | 1004 | inotify events were lost.  Similar to what we do during | 
|  | 1005 | pruning.  */ | 
|  | 1006 | install_watches (runp); | 
|  | 1007 | #endif | 
|  | 1008 | if (runp->call_res_init) | 
|  | 1009 | { | 
|  | 1010 | res_init (); | 
|  | 1011 | break; | 
|  | 1012 | } | 
|  | 1013 | runp = runp->next; | 
|  | 1014 | } | 
|  | 1015 | break; | 
|  | 1016 | } | 
|  | 1017 |  | 
|  | 1018 | if (number == lastdb) | 
|  | 1019 | { | 
|  | 1020 | resp = EINVAL; | 
|  | 1021 | writeall (fd, &resp, sizeof (resp)); | 
|  | 1022 | return; | 
|  | 1023 | } | 
|  | 1024 |  | 
|  | 1025 | if (dbs[number].enabled) | 
|  | 1026 | { | 
|  | 1027 | pthread_mutex_lock (&dbs[number].prune_run_lock); | 
|  | 1028 | prune_cache (&dbs[number], LONG_MAX, fd); | 
|  | 1029 | pthread_mutex_unlock (&dbs[number].prune_run_lock); | 
|  | 1030 | } | 
|  | 1031 | else | 
|  | 1032 | { | 
|  | 1033 | resp = 0; | 
|  | 1034 | writeall (fd, &resp, sizeof (resp)); | 
|  | 1035 | } | 
|  | 1036 | } | 
|  | 1037 |  | 
|  | 1038 |  | 
|  | 1039 | #ifdef SCM_RIGHTS | 
|  | 1040 | static void | 
|  | 1041 | send_ro_fd (struct database_dyn *db, char *key, int fd) | 
|  | 1042 | { | 
|  | 1043 | /* If we do not have an read-only file descriptor do nothing.  */ | 
|  | 1044 | if (db->ro_fd == -1) | 
|  | 1045 | return; | 
|  | 1046 |  | 
|  | 1047 | /* We need to send some data along with the descriptor.  */ | 
|  | 1048 | uint64_t mapsize = (db->head->data_size | 
|  | 1049 | + roundup (db->head->module * sizeof (ref_t), ALIGN) | 
|  | 1050 | + sizeof (struct database_pers_head)); | 
|  | 1051 | struct iovec iov[2]; | 
|  | 1052 | iov[0].iov_base = key; | 
|  | 1053 | iov[0].iov_len = strlen (key) + 1; | 
|  | 1054 | iov[1].iov_base = &mapsize; | 
|  | 1055 | iov[1].iov_len = sizeof (mapsize); | 
|  | 1056 |  | 
|  | 1057 | /* Prepare the control message to transfer the descriptor.  */ | 
|  | 1058 | union | 
|  | 1059 | { | 
|  | 1060 | struct cmsghdr hdr; | 
|  | 1061 | char bytes[CMSG_SPACE (sizeof (int))]; | 
|  | 1062 | } buf; | 
|  | 1063 | struct msghdr msg = { .msg_iov = iov, .msg_iovlen = 2, | 
|  | 1064 | .msg_control = buf.bytes, | 
|  | 1065 | .msg_controllen = sizeof (buf) }; | 
|  | 1066 | struct cmsghdr *cmsg = CMSG_FIRSTHDR (&msg); | 
|  | 1067 |  | 
|  | 1068 | cmsg->cmsg_level = SOL_SOCKET; | 
|  | 1069 | cmsg->cmsg_type = SCM_RIGHTS; | 
|  | 1070 | cmsg->cmsg_len = CMSG_LEN (sizeof (int)); | 
|  | 1071 |  | 
|  | 1072 | int *ip = (int *) CMSG_DATA (cmsg); | 
|  | 1073 | *ip = db->ro_fd; | 
|  | 1074 |  | 
|  | 1075 | msg.msg_controllen = cmsg->cmsg_len; | 
|  | 1076 |  | 
|  | 1077 | /* Send the control message.  We repeat when we are interrupted but | 
|  | 1078 | everything else is ignored.  */ | 
|  | 1079 | #ifndef MSG_NOSIGNAL | 
|  | 1080 | # define MSG_NOSIGNAL 0 | 
|  | 1081 | #endif | 
|  | 1082 | (void) TEMP_FAILURE_RETRY (sendmsg (fd, &msg, MSG_NOSIGNAL)); | 
|  | 1083 |  | 
|  | 1084 | if (__glibc_unlikely (debug_level > 0)) | 
|  | 1085 | dbg_log (_("provide access to FD %d, for %s"), db->ro_fd, key); | 
|  | 1086 | } | 
|  | 1087 | #endif	/* SCM_RIGHTS */ | 
|  | 1088 |  | 
|  | 1089 |  | 
|  | 1090 | /* Handle new request.  */ | 
|  | 1091 | static void | 
|  | 1092 | handle_request (int fd, request_header *req, void *key, uid_t uid, pid_t pid) | 
|  | 1093 | { | 
|  | 1094 | if (__builtin_expect (req->version, NSCD_VERSION) != NSCD_VERSION) | 
|  | 1095 | { | 
|  | 1096 | if (debug_level > 0) | 
|  | 1097 | dbg_log (_("\ | 
|  | 1098 | cannot handle old request version %d; current version is %d"), | 
|  | 1099 | req->version, NSCD_VERSION); | 
|  | 1100 | return; | 
|  | 1101 | } | 
|  | 1102 |  | 
|  | 1103 | /* Perform the SELinux check before we go on to the standard checks.  */ | 
|  | 1104 | if (selinux_enabled && nscd_request_avc_has_perm (fd, req->type) != 0) | 
|  | 1105 | { | 
|  | 1106 | if (debug_level > 0) | 
|  | 1107 | { | 
|  | 1108 | #ifdef SO_PEERCRED | 
|  | 1109 | # ifdef PATH_MAX | 
|  | 1110 | char buf[PATH_MAX]; | 
|  | 1111 | # else | 
|  | 1112 | char buf[4096]; | 
|  | 1113 | # endif | 
|  | 1114 |  | 
|  | 1115 | snprintf (buf, sizeof (buf), "/proc/%ld/exe", (long int) pid); | 
|  | 1116 | ssize_t n = readlink (buf, buf, sizeof (buf) - 1); | 
|  | 1117 |  | 
|  | 1118 | if (n <= 0) | 
|  | 1119 | dbg_log (_("\ | 
|  | 1120 | request from %ld not handled due to missing permission"), (long int) pid); | 
|  | 1121 | else | 
|  | 1122 | { | 
|  | 1123 | buf[n] = '\0'; | 
|  | 1124 | dbg_log (_("\ | 
|  | 1125 | request from '%s' [%ld] not handled due to missing permission"), | 
|  | 1126 | buf, (long int) pid); | 
|  | 1127 | } | 
|  | 1128 | #else | 
|  | 1129 | dbg_log (_("request not handled due to missing permission")); | 
|  | 1130 | #endif | 
|  | 1131 | } | 
|  | 1132 | return; | 
|  | 1133 | } | 
|  | 1134 |  | 
|  | 1135 | struct database_dyn *db = reqinfo[req->type].db; | 
|  | 1136 |  | 
|  | 1137 | /* See whether we can service the request from the cache.  */ | 
|  | 1138 | if (__builtin_expect (reqinfo[req->type].data_request, true)) | 
|  | 1139 | { | 
|  | 1140 | if (__builtin_expect (debug_level, 0) > 0) | 
|  | 1141 | { | 
|  | 1142 | if (req->type == GETHOSTBYADDR || req->type == GETHOSTBYADDRv6) | 
|  | 1143 | { | 
|  | 1144 | char buf[INET6_ADDRSTRLEN]; | 
|  | 1145 |  | 
|  | 1146 | dbg_log ("\t%s (%s)", serv2str[req->type], | 
|  | 1147 | inet_ntop (req->type == GETHOSTBYADDR | 
|  | 1148 | ? AF_INET : AF_INET6, | 
|  | 1149 | key, buf, sizeof (buf))); | 
|  | 1150 | } | 
|  | 1151 | else | 
|  | 1152 | dbg_log ("\t%s (%s)", serv2str[req->type], (char *) key); | 
|  | 1153 | } | 
|  | 1154 |  | 
|  | 1155 | /* Is this service enabled?  */ | 
|  | 1156 | if (__glibc_unlikely (!db->enabled)) | 
|  | 1157 | { | 
|  | 1158 | /* No, sent the prepared record.  */ | 
|  | 1159 | if (TEMP_FAILURE_RETRY (send (fd, db->disabled_iov->iov_base, | 
|  | 1160 | db->disabled_iov->iov_len, | 
|  | 1161 | MSG_NOSIGNAL)) | 
|  | 1162 | != (ssize_t) db->disabled_iov->iov_len | 
|  | 1163 | && __builtin_expect (debug_level, 0) > 0) | 
|  | 1164 | { | 
|  | 1165 | /* We have problems sending the result.  */ | 
|  | 1166 | char buf[256]; | 
|  | 1167 | dbg_log (_("cannot write result: %s"), | 
|  | 1168 | strerror_r (errno, buf, sizeof (buf))); | 
|  | 1169 | } | 
|  | 1170 |  | 
|  | 1171 | return; | 
|  | 1172 | } | 
|  | 1173 |  | 
|  | 1174 | /* Be sure we can read the data.  */ | 
|  | 1175 | if (__glibc_unlikely (pthread_rwlock_tryrdlock (&db->lock) != 0)) | 
|  | 1176 | { | 
|  | 1177 | ++db->head->rdlockdelayed; | 
|  | 1178 | pthread_rwlock_rdlock (&db->lock); | 
|  | 1179 | } | 
|  | 1180 |  | 
|  | 1181 | /* See whether we can handle it from the cache.  */ | 
|  | 1182 | struct datahead *cached; | 
|  | 1183 | cached = (struct datahead *) cache_search (req->type, key, req->key_len, | 
|  | 1184 | db, uid); | 
|  | 1185 | if (cached != NULL) | 
|  | 1186 | { | 
|  | 1187 | /* Hurray it's in the cache.  */ | 
|  | 1188 | ssize_t nwritten; | 
|  | 1189 |  | 
|  | 1190 | #ifdef HAVE_SENDFILE | 
|  | 1191 | if (__glibc_likely (db->mmap_used)) | 
|  | 1192 | { | 
|  | 1193 | assert (db->wr_fd != -1); | 
|  | 1194 | assert ((char *) cached->data > (char *) db->data); | 
|  | 1195 | assert ((char *) cached->data - (char *) db->head | 
|  | 1196 | + cached->recsize | 
|  | 1197 | <= (sizeof (struct database_pers_head) | 
|  | 1198 | + db->head->module * sizeof (ref_t) | 
|  | 1199 | + db->head->data_size)); | 
|  | 1200 | nwritten = sendfileall (fd, db->wr_fd, | 
|  | 1201 | (char *) cached->data | 
|  | 1202 | - (char *) db->head, cached->recsize); | 
|  | 1203 | # ifndef __ASSUME_SENDFILE | 
|  | 1204 | if (nwritten == -1 && errno == ENOSYS) | 
|  | 1205 | goto use_write; | 
|  | 1206 | # endif | 
|  | 1207 | } | 
|  | 1208 | else | 
|  | 1209 | # ifndef __ASSUME_SENDFILE | 
|  | 1210 | use_write: | 
|  | 1211 | # endif | 
|  | 1212 | #endif | 
|  | 1213 | nwritten = writeall (fd, cached->data, cached->recsize); | 
|  | 1214 |  | 
|  | 1215 | if (nwritten != cached->recsize | 
|  | 1216 | && __builtin_expect (debug_level, 0) > 0) | 
|  | 1217 | { | 
|  | 1218 | /* We have problems sending the result.  */ | 
|  | 1219 | char buf[256]; | 
|  | 1220 | dbg_log (_("cannot write result: %s"), | 
|  | 1221 | strerror_r (errno, buf, sizeof (buf))); | 
|  | 1222 | } | 
|  | 1223 |  | 
|  | 1224 | pthread_rwlock_unlock (&db->lock); | 
|  | 1225 |  | 
|  | 1226 | return; | 
|  | 1227 | } | 
|  | 1228 |  | 
|  | 1229 | pthread_rwlock_unlock (&db->lock); | 
|  | 1230 | } | 
|  | 1231 | else if (__builtin_expect (debug_level, 0) > 0) | 
|  | 1232 | { | 
|  | 1233 | if (req->type == INVALIDATE) | 
|  | 1234 | dbg_log ("\t%s (%s)", serv2str[req->type], (char *) key); | 
|  | 1235 | else | 
|  | 1236 | dbg_log ("\t%s", serv2str[req->type]); | 
|  | 1237 | } | 
|  | 1238 |  | 
|  | 1239 | /* Handle the request.  */ | 
|  | 1240 | switch (req->type) | 
|  | 1241 | { | 
|  | 1242 | case GETPWBYNAME: | 
|  | 1243 | addpwbyname (db, fd, req, key, uid); | 
|  | 1244 | break; | 
|  | 1245 |  | 
|  | 1246 | case GETPWBYUID: | 
|  | 1247 | addpwbyuid (db, fd, req, key, uid); | 
|  | 1248 | break; | 
|  | 1249 |  | 
|  | 1250 | case GETGRBYNAME: | 
|  | 1251 | addgrbyname (db, fd, req, key, uid); | 
|  | 1252 | break; | 
|  | 1253 |  | 
|  | 1254 | case GETGRBYGID: | 
|  | 1255 | addgrbygid (db, fd, req, key, uid); | 
|  | 1256 | break; | 
|  | 1257 |  | 
|  | 1258 | case GETHOSTBYNAME: | 
|  | 1259 | addhstbyname (db, fd, req, key, uid); | 
|  | 1260 | break; | 
|  | 1261 |  | 
|  | 1262 | case GETHOSTBYNAMEv6: | 
|  | 1263 | addhstbynamev6 (db, fd, req, key, uid); | 
|  | 1264 | break; | 
|  | 1265 |  | 
|  | 1266 | case GETHOSTBYADDR: | 
|  | 1267 | addhstbyaddr (db, fd, req, key, uid); | 
|  | 1268 | break; | 
|  | 1269 |  | 
|  | 1270 | case GETHOSTBYADDRv6: | 
|  | 1271 | addhstbyaddrv6 (db, fd, req, key, uid); | 
|  | 1272 | break; | 
|  | 1273 |  | 
|  | 1274 | case GETAI: | 
|  | 1275 | addhstai (db, fd, req, key, uid); | 
|  | 1276 | break; | 
|  | 1277 |  | 
|  | 1278 | case INITGROUPS: | 
|  | 1279 | addinitgroups (db, fd, req, key, uid); | 
|  | 1280 | break; | 
|  | 1281 |  | 
|  | 1282 | case GETSERVBYNAME: | 
|  | 1283 | addservbyname (db, fd, req, key, uid); | 
|  | 1284 | break; | 
|  | 1285 |  | 
|  | 1286 | case GETSERVBYPORT: | 
|  | 1287 | addservbyport (db, fd, req, key, uid); | 
|  | 1288 | break; | 
|  | 1289 |  | 
|  | 1290 | case GETNETGRENT: | 
|  | 1291 | addgetnetgrent (db, fd, req, key, uid); | 
|  | 1292 | break; | 
|  | 1293 |  | 
|  | 1294 | case INNETGR: | 
|  | 1295 | addinnetgr (db, fd, req, key, uid); | 
|  | 1296 | break; | 
|  | 1297 |  | 
|  | 1298 | case GETSTAT: | 
|  | 1299 | case SHUTDOWN: | 
|  | 1300 | case INVALIDATE: | 
|  | 1301 | { | 
|  | 1302 | /* Get the callers credentials.  */ | 
|  | 1303 | #ifdef SO_PEERCRED | 
|  | 1304 | struct ucred caller; | 
|  | 1305 | socklen_t optlen = sizeof (caller); | 
|  | 1306 |  | 
|  | 1307 | if (getsockopt (fd, SOL_SOCKET, SO_PEERCRED, &caller, &optlen) < 0) | 
|  | 1308 | { | 
|  | 1309 | char buf[256]; | 
|  | 1310 |  | 
|  | 1311 | dbg_log (_("error getting caller's id: %s"), | 
|  | 1312 | strerror_r (errno, buf, sizeof (buf))); | 
|  | 1313 | break; | 
|  | 1314 | } | 
|  | 1315 |  | 
|  | 1316 | uid = caller.uid; | 
|  | 1317 | #else | 
|  | 1318 | /* Some systems have no SO_PEERCRED implementation.  They don't | 
|  | 1319 | care about security so we don't as well.  */ | 
|  | 1320 | uid = 0; | 
|  | 1321 | #endif | 
|  | 1322 | } | 
|  | 1323 |  | 
|  | 1324 | /* Accept shutdown, getstat and invalidate only from root.  For | 
|  | 1325 | the stat call also allow the user specified in the config file.  */ | 
|  | 1326 | if (req->type == GETSTAT) | 
|  | 1327 | { | 
|  | 1328 | if (uid == 0 || uid == stat_uid) | 
|  | 1329 | send_stats (fd, dbs); | 
|  | 1330 | } | 
|  | 1331 | else if (uid == 0) | 
|  | 1332 | { | 
|  | 1333 | if (req->type == INVALIDATE) | 
|  | 1334 | invalidate_cache (key, fd); | 
|  | 1335 | else | 
|  | 1336 | termination_handler (0); | 
|  | 1337 | } | 
|  | 1338 | break; | 
|  | 1339 |  | 
|  | 1340 | case GETFDPW: | 
|  | 1341 | case GETFDGR: | 
|  | 1342 | case GETFDHST: | 
|  | 1343 | case GETFDSERV: | 
|  | 1344 | case GETFDNETGR: | 
|  | 1345 | #ifdef SCM_RIGHTS | 
|  | 1346 | send_ro_fd (reqinfo[req->type].db, key, fd); | 
|  | 1347 | #endif | 
|  | 1348 | break; | 
|  | 1349 |  | 
|  | 1350 | default: | 
|  | 1351 | /* Ignore the command, it's nothing we know.  */ | 
|  | 1352 | break; | 
|  | 1353 | } | 
|  | 1354 | } | 
|  | 1355 |  | 
|  | 1356 |  | 
|  | 1357 | /* Restart the process.  */ | 
|  | 1358 | static void | 
|  | 1359 | restart (void) | 
|  | 1360 | { | 
|  | 1361 | /* First determine the parameters.  We do not use the parameters | 
|  | 1362 | passed to main() since in case nscd is started by running the | 
|  | 1363 | dynamic linker this will not work.  Yes, this is not the usual | 
|  | 1364 | case but nscd is part of glibc and we occasionally do this.  */ | 
|  | 1365 | size_t buflen = 1024; | 
|  | 1366 | char *buf = alloca (buflen); | 
|  | 1367 | size_t readlen = 0; | 
|  | 1368 | int fd = open ("/proc/self/cmdline", O_RDONLY); | 
|  | 1369 | if (fd == -1) | 
|  | 1370 | { | 
|  | 1371 | dbg_log (_("\ | 
|  | 1372 | cannot open /proc/self/cmdline: %s; disabling paranoia mode"), | 
|  | 1373 | strerror (errno)); | 
|  | 1374 |  | 
|  | 1375 | paranoia = 0; | 
|  | 1376 | return; | 
|  | 1377 | } | 
|  | 1378 |  | 
|  | 1379 | while (1) | 
|  | 1380 | { | 
|  | 1381 | ssize_t n = TEMP_FAILURE_RETRY (read (fd, buf + readlen, | 
|  | 1382 | buflen - readlen)); | 
|  | 1383 | if (n == -1) | 
|  | 1384 | { | 
|  | 1385 | dbg_log (_("\ | 
|  | 1386 | cannot read /proc/self/cmdline: %s; disabling paranoia mode"), | 
|  | 1387 | strerror (errno)); | 
|  | 1388 |  | 
|  | 1389 | close (fd); | 
|  | 1390 | paranoia = 0; | 
|  | 1391 | return; | 
|  | 1392 | } | 
|  | 1393 |  | 
|  | 1394 | readlen += n; | 
|  | 1395 |  | 
|  | 1396 | if (readlen < buflen) | 
|  | 1397 | break; | 
|  | 1398 |  | 
|  | 1399 | /* We might have to extend the buffer.  */ | 
|  | 1400 | size_t old_buflen = buflen; | 
|  | 1401 | char *newp = extend_alloca (buf, buflen, 2 * buflen); | 
|  | 1402 | buf = memmove (newp, buf, old_buflen); | 
|  | 1403 | } | 
|  | 1404 |  | 
|  | 1405 | close (fd); | 
|  | 1406 |  | 
|  | 1407 | /* Parse the command line.  Worst case scenario: every two | 
|  | 1408 | characters form one parameter (one character plus NUL).  */ | 
|  | 1409 | char **argv = alloca ((readlen / 2 + 1) * sizeof (argv[0])); | 
|  | 1410 | int argc = 0; | 
|  | 1411 |  | 
|  | 1412 | char *cp = buf; | 
|  | 1413 | while (cp < buf + readlen) | 
|  | 1414 | { | 
|  | 1415 | argv[argc++] = cp; | 
|  | 1416 | cp = (char *) rawmemchr (cp, '\0') + 1; | 
|  | 1417 | } | 
|  | 1418 | argv[argc] = NULL; | 
|  | 1419 |  | 
|  | 1420 | /* Second, change back to the old user if we changed it.  */ | 
|  | 1421 | if (server_user != NULL) | 
|  | 1422 | { | 
|  | 1423 | if (setresuid (old_uid, old_uid, old_uid) != 0) | 
|  | 1424 | { | 
|  | 1425 | dbg_log (_("\ | 
|  | 1426 | cannot change to old UID: %s; disabling paranoia mode"), | 
|  | 1427 | strerror (errno)); | 
|  | 1428 |  | 
|  | 1429 | paranoia = 0; | 
|  | 1430 | return; | 
|  | 1431 | } | 
|  | 1432 |  | 
|  | 1433 | if (setresgid (old_gid, old_gid, old_gid) != 0) | 
|  | 1434 | { | 
|  | 1435 | dbg_log (_("\ | 
|  | 1436 | cannot change to old GID: %s; disabling paranoia mode"), | 
|  | 1437 | strerror (errno)); | 
|  | 1438 |  | 
|  | 1439 | ignore_value (setuid (server_uid)); | 
|  | 1440 | paranoia = 0; | 
|  | 1441 | return; | 
|  | 1442 | } | 
|  | 1443 | } | 
|  | 1444 |  | 
|  | 1445 | /* Next change back to the old working directory.  */ | 
|  | 1446 | if (chdir (oldcwd) == -1) | 
|  | 1447 | { | 
|  | 1448 | dbg_log (_("\ | 
|  | 1449 | cannot change to old working directory: %s; disabling paranoia mode"), | 
|  | 1450 | strerror (errno)); | 
|  | 1451 |  | 
|  | 1452 | if (server_user != NULL) | 
|  | 1453 | { | 
|  | 1454 | ignore_value (setuid (server_uid)); | 
|  | 1455 | ignore_value (setgid (server_gid)); | 
|  | 1456 | } | 
|  | 1457 | paranoia = 0; | 
|  | 1458 | return; | 
|  | 1459 | } | 
|  | 1460 |  | 
|  | 1461 | /* Synchronize memory.  */ | 
|  | 1462 | int32_t certainly[lastdb]; | 
|  | 1463 | for (int cnt = 0; cnt < lastdb; ++cnt) | 
|  | 1464 | if (dbs[cnt].enabled) | 
|  | 1465 | { | 
|  | 1466 | /* Make sure nobody keeps using the database.  */ | 
|  | 1467 | dbs[cnt].head->timestamp = 0; | 
|  | 1468 | certainly[cnt] = dbs[cnt].head->nscd_certainly_running; | 
|  | 1469 | dbs[cnt].head->nscd_certainly_running = 0; | 
|  | 1470 |  | 
|  | 1471 | if (dbs[cnt].persistent) | 
|  | 1472 | // XXX async OK? | 
|  | 1473 | msync (dbs[cnt].head, dbs[cnt].memsize, MS_ASYNC); | 
|  | 1474 | } | 
|  | 1475 |  | 
|  | 1476 | /* The preparations are done.  */ | 
|  | 1477 | #ifdef PATH_MAX | 
|  | 1478 | char pathbuf[PATH_MAX]; | 
|  | 1479 | #else | 
|  | 1480 | char pathbuf[256]; | 
|  | 1481 | #endif | 
|  | 1482 | /* Try to exec the real nscd program so the process name (as reported | 
|  | 1483 | in /proc/PID/status) will be 'nscd', but fall back to /proc/self/exe | 
|  | 1484 | if readlink or the exec with the result of the readlink call fails.  */ | 
|  | 1485 | ssize_t n = readlink ("/proc/self/exe", pathbuf, sizeof (pathbuf) - 1); | 
|  | 1486 | if (n != -1) | 
|  | 1487 | { | 
|  | 1488 | pathbuf[n] = '\0'; | 
|  | 1489 | execv (pathbuf, argv); | 
|  | 1490 | } | 
|  | 1491 | execv ("/proc/self/exe", argv); | 
|  | 1492 |  | 
|  | 1493 | /* If we come here, we will never be able to re-exec.  */ | 
|  | 1494 | dbg_log (_("re-exec failed: %s; disabling paranoia mode"), | 
|  | 1495 | strerror (errno)); | 
|  | 1496 |  | 
|  | 1497 | if (server_user != NULL) | 
|  | 1498 | { | 
|  | 1499 | ignore_value (setuid (server_uid)); | 
|  | 1500 | ignore_value (setgid (server_gid)); | 
|  | 1501 | } | 
|  | 1502 | if (chdir ("/") != 0) | 
|  | 1503 | dbg_log (_("cannot change current working directory to \"/\": %s"), | 
|  | 1504 | strerror (errno)); | 
|  | 1505 | paranoia = 0; | 
|  | 1506 |  | 
|  | 1507 | /* Reenable the databases.  */ | 
|  | 1508 | time_t now = time (NULL); | 
|  | 1509 | for (int cnt = 0; cnt < lastdb; ++cnt) | 
|  | 1510 | if (dbs[cnt].enabled) | 
|  | 1511 | { | 
|  | 1512 | dbs[cnt].head->timestamp = now; | 
|  | 1513 | dbs[cnt].head->nscd_certainly_running = certainly[cnt]; | 
|  | 1514 | } | 
|  | 1515 | } | 
|  | 1516 |  | 
|  | 1517 |  | 
|  | 1518 | /* List of file descriptors.  */ | 
|  | 1519 | struct fdlist | 
|  | 1520 | { | 
|  | 1521 | int fd; | 
|  | 1522 | struct fdlist *next; | 
|  | 1523 | }; | 
|  | 1524 | /* Memory allocated for the list.  */ | 
|  | 1525 | static struct fdlist *fdlist; | 
|  | 1526 | /* List of currently ready-to-read file descriptors.  */ | 
|  | 1527 | static struct fdlist *readylist; | 
|  | 1528 |  | 
|  | 1529 | /* Conditional variable and mutex to signal availability of entries in | 
|  | 1530 | READYLIST.  The condvar is initialized dynamically since we might | 
|  | 1531 | use a different clock depending on availability.  */ | 
|  | 1532 | static pthread_cond_t readylist_cond = PTHREAD_COND_INITIALIZER; | 
|  | 1533 | static pthread_mutex_t readylist_lock = PTHREAD_MUTEX_INITIALIZER; | 
|  | 1534 |  | 
|  | 1535 | /* The clock to use with the condvar.  */ | 
|  | 1536 | static clockid_t timeout_clock = CLOCK_REALTIME; | 
|  | 1537 |  | 
|  | 1538 | /* Number of threads ready to handle the READYLIST.  */ | 
|  | 1539 | static unsigned long int nready; | 
|  | 1540 |  | 
|  | 1541 |  | 
|  | 1542 | /* Function for the clean-up threads.  */ | 
|  | 1543 | static void * | 
|  | 1544 | __attribute__ ((__noreturn__)) | 
|  | 1545 | nscd_run_prune (void *p) | 
|  | 1546 | { | 
|  | 1547 | const long int my_number = (long int) p; | 
|  | 1548 | assert (dbs[my_number].enabled); | 
|  | 1549 |  | 
|  | 1550 | int dont_need_update = setup_thread (&dbs[my_number]); | 
|  | 1551 |  | 
|  | 1552 | time_t now = time (NULL); | 
|  | 1553 |  | 
|  | 1554 | /* We are running.  */ | 
|  | 1555 | dbs[my_number].head->timestamp = now; | 
|  | 1556 |  | 
|  | 1557 | struct timespec prune_ts; | 
|  | 1558 | if (__glibc_unlikely (clock_gettime (timeout_clock, &prune_ts) == -1)) | 
|  | 1559 | /* Should never happen.  */ | 
|  | 1560 | abort (); | 
|  | 1561 |  | 
|  | 1562 | /* Compute the initial timeout time.  Prevent all the timers to go | 
|  | 1563 | off at the same time by adding a db-based value.  */ | 
|  | 1564 | prune_ts.tv_sec += CACHE_PRUNE_INTERVAL + my_number; | 
|  | 1565 | dbs[my_number].wakeup_time = now + CACHE_PRUNE_INTERVAL + my_number; | 
|  | 1566 |  | 
|  | 1567 | pthread_mutex_t *prune_lock = &dbs[my_number].prune_lock; | 
|  | 1568 | pthread_mutex_t *prune_run_lock = &dbs[my_number].prune_run_lock; | 
|  | 1569 | pthread_cond_t *prune_cond = &dbs[my_number].prune_cond; | 
|  | 1570 |  | 
|  | 1571 | pthread_mutex_lock (prune_lock); | 
|  | 1572 | while (1) | 
|  | 1573 | { | 
|  | 1574 | /* Wait, but not forever.  */ | 
|  | 1575 | int e = 0; | 
|  | 1576 | if (! dbs[my_number].clear_cache) | 
|  | 1577 | e = pthread_cond_timedwait (prune_cond, prune_lock, &prune_ts); | 
|  | 1578 | assert (__builtin_expect (e == 0 || e == ETIMEDOUT, 1)); | 
|  | 1579 |  | 
|  | 1580 | time_t next_wait; | 
|  | 1581 | now = time (NULL); | 
|  | 1582 | if (e == ETIMEDOUT || now >= dbs[my_number].wakeup_time | 
|  | 1583 | || dbs[my_number].clear_cache) | 
|  | 1584 | { | 
|  | 1585 | /* We will determine the new timout values based on the | 
|  | 1586 | cache content.  Should there be concurrent additions to | 
|  | 1587 | the cache which are not accounted for in the cache | 
|  | 1588 | pruning we want to know about it.  Therefore set the | 
|  | 1589 | timeout to the maximum.  It will be descreased when adding | 
|  | 1590 | new entries to the cache, if necessary.  */ | 
|  | 1591 | dbs[my_number].wakeup_time = MAX_TIMEOUT_VALUE; | 
|  | 1592 |  | 
|  | 1593 | /* Unconditionally reset the flag.  */ | 
|  | 1594 | time_t prune_now = dbs[my_number].clear_cache ? LONG_MAX : now; | 
|  | 1595 | dbs[my_number].clear_cache = 0; | 
|  | 1596 |  | 
|  | 1597 | pthread_mutex_unlock (prune_lock); | 
|  | 1598 |  | 
|  | 1599 | /* We use a separate lock for running the prune function (instead | 
|  | 1600 | of keeping prune_lock locked) because this enables concurrent | 
|  | 1601 | invocations of cache_add which might modify the timeout value.  */ | 
|  | 1602 | pthread_mutex_lock (prune_run_lock); | 
|  | 1603 | next_wait = prune_cache (&dbs[my_number], prune_now, -1); | 
|  | 1604 | pthread_mutex_unlock (prune_run_lock); | 
|  | 1605 |  | 
|  | 1606 | next_wait = MAX (next_wait, CACHE_PRUNE_INTERVAL); | 
|  | 1607 | /* If clients cannot determine for sure whether nscd is running | 
|  | 1608 | we need to wake up occasionally to update the timestamp. | 
|  | 1609 | Wait 90% of the update period.  */ | 
|  | 1610 | #define UPDATE_MAPPING_TIMEOUT (MAPPING_TIMEOUT * 9 / 10) | 
|  | 1611 | if (__glibc_unlikely (! dont_need_update)) | 
|  | 1612 | { | 
|  | 1613 | next_wait = MIN (UPDATE_MAPPING_TIMEOUT, next_wait); | 
|  | 1614 | dbs[my_number].head->timestamp = now; | 
|  | 1615 | } | 
|  | 1616 |  | 
|  | 1617 | pthread_mutex_lock (prune_lock); | 
|  | 1618 |  | 
|  | 1619 | /* Make it known when we will wake up again.  */ | 
|  | 1620 | if (now + next_wait < dbs[my_number].wakeup_time) | 
|  | 1621 | dbs[my_number].wakeup_time = now + next_wait; | 
|  | 1622 | else | 
|  | 1623 | next_wait = dbs[my_number].wakeup_time - now; | 
|  | 1624 | } | 
|  | 1625 | else | 
|  | 1626 | /* The cache was just pruned.  Do not do it again now.  Just | 
|  | 1627 | use the new timeout value.  */ | 
|  | 1628 | next_wait = dbs[my_number].wakeup_time - now; | 
|  | 1629 |  | 
|  | 1630 | if (clock_gettime (timeout_clock, &prune_ts) == -1) | 
|  | 1631 | /* Should never happen.  */ | 
|  | 1632 | abort (); | 
|  | 1633 |  | 
|  | 1634 | /* Compute next timeout time.  */ | 
|  | 1635 | prune_ts.tv_sec += next_wait; | 
|  | 1636 | } | 
|  | 1637 | } | 
|  | 1638 |  | 
|  | 1639 |  | 
|  | 1640 | /* This is the main loop.  It is replicated in different threads but | 
|  | 1641 | the use of the ready list makes sure only one thread handles an | 
|  | 1642 | incoming connection.  */ | 
|  | 1643 | static void * | 
|  | 1644 | __attribute__ ((__noreturn__)) | 
|  | 1645 | nscd_run_worker (void *p) | 
|  | 1646 | { | 
|  | 1647 | char buf[256]; | 
|  | 1648 |  | 
|  | 1649 | /* Initial locking.  */ | 
|  | 1650 | pthread_mutex_lock (&readylist_lock); | 
|  | 1651 |  | 
|  | 1652 | /* One more thread available.  */ | 
|  | 1653 | ++nready; | 
|  | 1654 |  | 
|  | 1655 | while (1) | 
|  | 1656 | { | 
|  | 1657 | while (readylist == NULL) | 
|  | 1658 | pthread_cond_wait (&readylist_cond, &readylist_lock); | 
|  | 1659 |  | 
|  | 1660 | struct fdlist *it = readylist->next; | 
|  | 1661 | if (readylist->next == readylist) | 
|  | 1662 | /* Just one entry on the list.  */ | 
|  | 1663 | readylist = NULL; | 
|  | 1664 | else | 
|  | 1665 | readylist->next = it->next; | 
|  | 1666 |  | 
|  | 1667 | /* Extract the information and mark the record ready to be used | 
|  | 1668 | again.  */ | 
|  | 1669 | int fd = it->fd; | 
|  | 1670 | it->next = NULL; | 
|  | 1671 |  | 
|  | 1672 | /* One more thread available.  */ | 
|  | 1673 | --nready; | 
|  | 1674 |  | 
|  | 1675 | /* We are done with the list.  */ | 
|  | 1676 | pthread_mutex_unlock (&readylist_lock); | 
|  | 1677 |  | 
|  | 1678 | #ifndef __ASSUME_ACCEPT4 | 
|  | 1679 | if (have_accept4 < 0) | 
|  | 1680 | { | 
|  | 1681 | /* We do not want to block on a short read or so.  */ | 
|  | 1682 | int fl = fcntl (fd, F_GETFL); | 
|  | 1683 | if (fl == -1 || fcntl (fd, F_SETFL, fl | O_NONBLOCK) == -1) | 
|  | 1684 | goto close_and_out; | 
|  | 1685 | } | 
|  | 1686 | #endif | 
|  | 1687 |  | 
|  | 1688 | /* Now read the request.  */ | 
|  | 1689 | request_header req; | 
|  | 1690 | if (__builtin_expect (TEMP_FAILURE_RETRY (read (fd, &req, sizeof (req))) | 
|  | 1691 | != sizeof (req), 0)) | 
|  | 1692 | { | 
|  | 1693 | /* We failed to read data.  Note that this also might mean we | 
|  | 1694 | failed because we would have blocked.  */ | 
|  | 1695 | if (debug_level > 0) | 
|  | 1696 | dbg_log (_("short read while reading request: %s"), | 
|  | 1697 | strerror_r (errno, buf, sizeof (buf))); | 
|  | 1698 | goto close_and_out; | 
|  | 1699 | } | 
|  | 1700 |  | 
|  | 1701 | /* Check whether this is a valid request type.  */ | 
|  | 1702 | if (req.type < GETPWBYNAME || req.type >= LASTREQ) | 
|  | 1703 | goto close_and_out; | 
|  | 1704 |  | 
|  | 1705 | /* Some systems have no SO_PEERCRED implementation.  They don't | 
|  | 1706 | care about security so we don't as well.  */ | 
|  | 1707 | uid_t uid = -1; | 
|  | 1708 | #ifdef SO_PEERCRED | 
|  | 1709 | pid_t pid = 0; | 
|  | 1710 |  | 
|  | 1711 | if (__glibc_unlikely (debug_level > 0)) | 
|  | 1712 | { | 
|  | 1713 | struct ucred caller; | 
|  | 1714 | socklen_t optlen = sizeof (caller); | 
|  | 1715 |  | 
|  | 1716 | if (getsockopt (fd, SOL_SOCKET, SO_PEERCRED, &caller, &optlen) == 0) | 
|  | 1717 | pid = caller.pid; | 
|  | 1718 | } | 
|  | 1719 | #else | 
|  | 1720 | const pid_t pid = 0; | 
|  | 1721 | #endif | 
|  | 1722 |  | 
|  | 1723 | /* It should not be possible to crash the nscd with a silly | 
|  | 1724 | request (i.e., a terribly large key).  We limit the size to 1kb.  */ | 
|  | 1725 | if (__builtin_expect (req.key_len, 1) < 0 | 
|  | 1726 | || __builtin_expect (req.key_len, 1) > MAXKEYLEN) | 
|  | 1727 | { | 
|  | 1728 | if (debug_level > 0) | 
|  | 1729 | dbg_log (_("key length in request too long: %d"), req.key_len); | 
|  | 1730 | } | 
|  | 1731 | else | 
|  | 1732 | { | 
|  | 1733 | /* Get the key.  */ | 
|  | 1734 | char keybuf[MAXKEYLEN + 1]; | 
|  | 1735 |  | 
|  | 1736 | if (__builtin_expect (TEMP_FAILURE_RETRY (read (fd, keybuf, | 
|  | 1737 | req.key_len)) | 
|  | 1738 | != req.key_len, 0)) | 
|  | 1739 | { | 
|  | 1740 | /* Again, this can also mean we would have blocked.  */ | 
|  | 1741 | if (debug_level > 0) | 
|  | 1742 | dbg_log (_("short read while reading request key: %s"), | 
|  | 1743 | strerror_r (errno, buf, sizeof (buf))); | 
|  | 1744 | goto close_and_out; | 
|  | 1745 | } | 
|  | 1746 | keybuf[req.key_len] = '\0'; | 
|  | 1747 |  | 
|  | 1748 | if (__builtin_expect (debug_level, 0) > 0) | 
|  | 1749 | { | 
|  | 1750 | #ifdef SO_PEERCRED | 
|  | 1751 | if (pid != 0) | 
|  | 1752 | dbg_log (_("\ | 
|  | 1753 | handle_request: request received (Version = %d) from PID %ld"), | 
|  | 1754 | req.version, (long int) pid); | 
|  | 1755 | else | 
|  | 1756 | #endif | 
|  | 1757 | dbg_log (_("\ | 
|  | 1758 | handle_request: request received (Version = %d)"), req.version); | 
|  | 1759 | } | 
|  | 1760 |  | 
|  | 1761 | /* Phew, we got all the data, now process it.  */ | 
|  | 1762 | handle_request (fd, &req, keybuf, uid, pid); | 
|  | 1763 | } | 
|  | 1764 |  | 
|  | 1765 | close_and_out: | 
|  | 1766 | /* We are done.  */ | 
|  | 1767 | close (fd); | 
|  | 1768 |  | 
|  | 1769 | /* Re-locking.  */ | 
|  | 1770 | pthread_mutex_lock (&readylist_lock); | 
|  | 1771 |  | 
|  | 1772 | /* One more thread available.  */ | 
|  | 1773 | ++nready; | 
|  | 1774 | } | 
|  | 1775 | /* NOTREACHED */ | 
|  | 1776 | } | 
|  | 1777 |  | 
|  | 1778 |  | 
|  | 1779 | static unsigned int nconns; | 
|  | 1780 |  | 
|  | 1781 | static void | 
|  | 1782 | fd_ready (int fd) | 
|  | 1783 | { | 
|  | 1784 | pthread_mutex_lock (&readylist_lock); | 
|  | 1785 |  | 
|  | 1786 | /* Find an empty entry in FDLIST.  */ | 
|  | 1787 | size_t inner; | 
|  | 1788 | for (inner = 0; inner < nconns; ++inner) | 
|  | 1789 | if (fdlist[inner].next == NULL) | 
|  | 1790 | break; | 
|  | 1791 | assert (inner < nconns); | 
|  | 1792 |  | 
|  | 1793 | fdlist[inner].fd = fd; | 
|  | 1794 |  | 
|  | 1795 | if (readylist == NULL) | 
|  | 1796 | readylist = fdlist[inner].next = &fdlist[inner]; | 
|  | 1797 | else | 
|  | 1798 | { | 
|  | 1799 | fdlist[inner].next = readylist->next; | 
|  | 1800 | readylist = readylist->next = &fdlist[inner]; | 
|  | 1801 | } | 
|  | 1802 |  | 
|  | 1803 | bool do_signal = true; | 
|  | 1804 | if (__glibc_unlikely (nready == 0)) | 
|  | 1805 | { | 
|  | 1806 | ++client_queued; | 
|  | 1807 | do_signal = false; | 
|  | 1808 |  | 
|  | 1809 | /* Try to start another thread to help out.  */ | 
|  | 1810 | pthread_t th; | 
|  | 1811 | if (nthreads < max_nthreads | 
|  | 1812 | && pthread_create (&th, &attr, nscd_run_worker, | 
|  | 1813 | (void *) (long int) nthreads) == 0) | 
|  | 1814 | { | 
|  | 1815 | /* We got another thread.  */ | 
|  | 1816 | ++nthreads; | 
|  | 1817 | /* The new thread might need a kick.  */ | 
|  | 1818 | do_signal = true; | 
|  | 1819 | } | 
|  | 1820 |  | 
|  | 1821 | } | 
|  | 1822 |  | 
|  | 1823 | pthread_mutex_unlock (&readylist_lock); | 
|  | 1824 |  | 
|  | 1825 | /* Tell one of the worker threads there is work to do.  */ | 
|  | 1826 | if (do_signal) | 
|  | 1827 | pthread_cond_signal (&readylist_cond); | 
|  | 1828 | } | 
|  | 1829 |  | 
|  | 1830 |  | 
|  | 1831 | /* Check whether restarting should happen.  */ | 
|  | 1832 | static bool | 
|  | 1833 | restart_p (time_t now) | 
|  | 1834 | { | 
|  | 1835 | return (paranoia && readylist == NULL && nready == nthreads | 
|  | 1836 | && now >= restart_time); | 
|  | 1837 | } | 
|  | 1838 |  | 
|  | 1839 |  | 
|  | 1840 | /* Array for times a connection was accepted.  */ | 
|  | 1841 | static time_t *starttime; | 
|  | 1842 |  | 
|  | 1843 | #ifdef HAVE_INOTIFY | 
|  | 1844 | /* Inotify event for changed file.  */ | 
|  | 1845 | union __inev | 
|  | 1846 | { | 
|  | 1847 | struct inotify_event i; | 
|  | 1848 | # ifndef PATH_MAX | 
|  | 1849 | #  define PATH_MAX 1024 | 
|  | 1850 | # endif | 
|  | 1851 | char buf[sizeof (struct inotify_event) + PATH_MAX]; | 
|  | 1852 | }; | 
|  | 1853 |  | 
|  | 1854 | /* Returns 0 if the file is there otherwise -1.  */ | 
|  | 1855 | int | 
|  | 1856 | check_file (struct traced_file *finfo) | 
|  | 1857 | { | 
|  | 1858 | struct stat64 st; | 
|  | 1859 | /* We could check mtime and if different re-add | 
|  | 1860 | the watches, and invalidate the database, but we | 
|  | 1861 | don't because we are called from inotify_check_files | 
|  | 1862 | which should be doing that work.  If sufficient inotify | 
|  | 1863 | events were lost then the next pruning or invalidation | 
|  | 1864 | will do the stat and mtime check.  We don't do it here to | 
|  | 1865 | keep the logic simple.  */ | 
|  | 1866 | if (stat64 (finfo->fname, &st) < 0) | 
|  | 1867 | return -1; | 
|  | 1868 | return 0; | 
|  | 1869 | } | 
|  | 1870 |  | 
|  | 1871 | /* Process the inotify event in INEV. If the event matches any of the files | 
|  | 1872 | registered with a database then mark that database as requiring its cache | 
|  | 1873 | to be cleared. We indicate the cache needs clearing by setting | 
|  | 1874 | TO_CLEAR[DBCNT] to true for the matching database.  */ | 
|  | 1875 | static void | 
|  | 1876 | inotify_check_files (bool *to_clear, union __inev *inev) | 
|  | 1877 | { | 
|  | 1878 | /* Check which of the files changed.  */ | 
|  | 1879 | for (size_t dbcnt = 0; dbcnt < lastdb; ++dbcnt) | 
|  | 1880 | { | 
|  | 1881 | struct traced_file *finfo = dbs[dbcnt].traced_files; | 
|  | 1882 |  | 
|  | 1883 | while (finfo != NULL) | 
|  | 1884 | { | 
|  | 1885 | /* The configuration file was moved or deleted. | 
|  | 1886 | We stop watching it at that point, and reinitialize.  */ | 
|  | 1887 | if (finfo->inotify_descr[TRACED_FILE] == inev->i.wd | 
|  | 1888 | && ((inev->i.mask & IN_MOVE_SELF) | 
|  | 1889 | || (inev->i.mask & IN_DELETE_SELF) | 
|  | 1890 | || (inev->i.mask & IN_IGNORED))) | 
|  | 1891 | { | 
|  | 1892 | int ret; | 
|  | 1893 | bool moved = (inev->i.mask & IN_MOVE_SELF) != 0; | 
|  | 1894 |  | 
|  | 1895 | if (check_file (finfo) == 0) | 
|  | 1896 | { | 
|  | 1897 | dbg_log (_("ignored inotify event for `%s` (file exists)"), | 
|  | 1898 | finfo->fname); | 
|  | 1899 | return; | 
|  | 1900 | } | 
|  | 1901 |  | 
|  | 1902 | dbg_log (_("monitored file `%s` was %s, removing watch"), | 
|  | 1903 | finfo->fname, moved ? "moved" : "deleted"); | 
|  | 1904 | /* File was moved out, remove the watch.  Watches are | 
|  | 1905 | automatically removed when the file is deleted.  */ | 
|  | 1906 | if (moved) | 
|  | 1907 | { | 
|  | 1908 | ret = inotify_rm_watch (inotify_fd, inev->i.wd); | 
|  | 1909 | if (ret < 0) | 
|  | 1910 | dbg_log (_("failed to remove file watch `%s`: %s"), | 
|  | 1911 | finfo->fname, strerror (errno)); | 
|  | 1912 | } | 
|  | 1913 | finfo->inotify_descr[TRACED_FILE] = -1; | 
|  | 1914 | to_clear[dbcnt] = true; | 
|  | 1915 | if (finfo->call_res_init) | 
|  | 1916 | res_init (); | 
|  | 1917 | return; | 
|  | 1918 | } | 
|  | 1919 | /* The configuration file was open for writing and has just closed. | 
|  | 1920 | We reset the cache and reinitialize.  */ | 
|  | 1921 | if (finfo->inotify_descr[TRACED_FILE] == inev->i.wd | 
|  | 1922 | && inev->i.mask & IN_CLOSE_WRITE) | 
|  | 1923 | { | 
|  | 1924 | /* Mark cache as needing to be cleared and reinitialize.  */ | 
|  | 1925 | dbg_log (_("monitored file `%s` was written to"), finfo->fname); | 
|  | 1926 | to_clear[dbcnt] = true; | 
|  | 1927 | if (finfo->call_res_init) | 
|  | 1928 | res_init (); | 
|  | 1929 | return; | 
|  | 1930 | } | 
|  | 1931 | /* The parent directory was moved or deleted.  We trigger one last | 
|  | 1932 | invalidation.  At the next pruning or invalidation we may add | 
|  | 1933 | this watch back if the file is present again.  */ | 
|  | 1934 | if (finfo->inotify_descr[TRACED_DIR] == inev->i.wd | 
|  | 1935 | && ((inev->i.mask & IN_DELETE_SELF) | 
|  | 1936 | || (inev->i.mask & IN_MOVE_SELF) | 
|  | 1937 | || (inev->i.mask & IN_IGNORED))) | 
|  | 1938 | { | 
|  | 1939 | bool moved = (inev->i.mask & IN_MOVE_SELF) != 0; | 
|  | 1940 | /* The directory watch may have already been removed | 
|  | 1941 | but we don't know so we just remove it again and | 
|  | 1942 | ignore the error.  Then we remove the file watch. | 
|  | 1943 | Note: watches are automatically removed for deleted | 
|  | 1944 | files.  */ | 
|  | 1945 | if (moved) | 
|  | 1946 | inotify_rm_watch (inotify_fd, inev->i.wd); | 
|  | 1947 | if (finfo->inotify_descr[TRACED_FILE] != -1) | 
|  | 1948 | { | 
|  | 1949 | dbg_log (_("monitored parent directory `%s` was %s, removing watch on `%s`"), | 
|  | 1950 | finfo->dname, moved ? "moved" : "deleted", finfo->fname); | 
|  | 1951 | if (inotify_rm_watch (inotify_fd, finfo->inotify_descr[TRACED_FILE]) < 0) | 
|  | 1952 | dbg_log (_("failed to remove file watch `%s`: %s"), | 
|  | 1953 | finfo->dname, strerror (errno)); | 
|  | 1954 | } | 
|  | 1955 | finfo->inotify_descr[TRACED_FILE] = -1; | 
|  | 1956 | finfo->inotify_descr[TRACED_DIR] = -1; | 
|  | 1957 | to_clear[dbcnt] = true; | 
|  | 1958 | if (finfo->call_res_init) | 
|  | 1959 | res_init (); | 
|  | 1960 | /* Continue to the next entry since this might be the | 
|  | 1961 | parent directory for multiple registered files and | 
|  | 1962 | we want to remove watches for all registered files.  */ | 
|  | 1963 | continue; | 
|  | 1964 | } | 
|  | 1965 | /* The parent directory had a create or moved to event.  */ | 
|  | 1966 | if (finfo->inotify_descr[TRACED_DIR] == inev->i.wd | 
|  | 1967 | && ((inev->i.mask & IN_MOVED_TO) | 
|  | 1968 | || (inev->i.mask & IN_CREATE)) | 
|  | 1969 | && strcmp (inev->i.name, finfo->sfname) == 0) | 
|  | 1970 | { | 
|  | 1971 | /* We detected a directory change.  We look for the creation | 
|  | 1972 | of the file we are tracking or the move of the same file | 
|  | 1973 | into the directory.  */ | 
|  | 1974 | int ret; | 
|  | 1975 | dbg_log (_("monitored file `%s` was %s, adding watch"), | 
|  | 1976 | finfo->fname, | 
|  | 1977 | inev->i.mask & IN_CREATE ? "created" : "moved into place"); | 
|  | 1978 | /* File was moved in or created.  Regenerate the watch.  */ | 
|  | 1979 | if (finfo->inotify_descr[TRACED_FILE] != -1) | 
|  | 1980 | inotify_rm_watch (inotify_fd, | 
|  | 1981 | finfo->inotify_descr[TRACED_FILE]); | 
|  | 1982 |  | 
|  | 1983 | ret = inotify_add_watch (inotify_fd, | 
|  | 1984 | finfo->fname, | 
|  | 1985 | TRACED_FILE_MASK); | 
|  | 1986 | if (ret < 0) | 
|  | 1987 | dbg_log (_("failed to add file watch `%s`: %s"), | 
|  | 1988 | finfo->fname, strerror (errno)); | 
|  | 1989 |  | 
|  | 1990 | finfo->inotify_descr[TRACED_FILE] = ret; | 
|  | 1991 |  | 
|  | 1992 | /* The file is new or moved so mark cache as needing to | 
|  | 1993 | be cleared and reinitialize.  */ | 
|  | 1994 | to_clear[dbcnt] = true; | 
|  | 1995 | if (finfo->call_res_init) | 
|  | 1996 | res_init (); | 
|  | 1997 |  | 
|  | 1998 | /* Done re-adding the watch.  Don't return, we may still | 
|  | 1999 | have other files in this same directory, same watch | 
|  | 2000 | descriptor, and need to process them.  */ | 
|  | 2001 | } | 
|  | 2002 | /* Other events are ignored, and we move on to the next file.  */ | 
|  | 2003 | finfo = finfo->next; | 
|  | 2004 | } | 
|  | 2005 | } | 
|  | 2006 | } | 
|  | 2007 |  | 
|  | 2008 | /* If an entry in the array of booleans TO_CLEAR is TRUE then clear the cache | 
|  | 2009 | for the associated database, otherwise do nothing. The TO_CLEAR array must | 
|  | 2010 | have LASTDB entries.  */ | 
|  | 2011 | static inline void | 
|  | 2012 | clear_db_cache (bool *to_clear) | 
|  | 2013 | { | 
|  | 2014 | for (size_t dbcnt = 0; dbcnt < lastdb; ++dbcnt) | 
|  | 2015 | if (to_clear[dbcnt]) | 
|  | 2016 | { | 
|  | 2017 | pthread_mutex_lock (&dbs[dbcnt].prune_lock); | 
|  | 2018 | dbs[dbcnt].clear_cache = 1; | 
|  | 2019 | pthread_mutex_unlock (&dbs[dbcnt].prune_lock); | 
|  | 2020 | pthread_cond_signal (&dbs[dbcnt].prune_cond); | 
|  | 2021 | } | 
|  | 2022 | } | 
|  | 2023 |  | 
|  | 2024 | int | 
|  | 2025 | handle_inotify_events (void) | 
|  | 2026 | { | 
|  | 2027 | bool to_clear[lastdb] = { false, }; | 
|  | 2028 | union __inev inev; | 
|  | 2029 |  | 
|  | 2030 | /* Read all inotify events for files registered via | 
|  | 2031 | register_traced_file().  */ | 
|  | 2032 | while (1) | 
|  | 2033 | { | 
|  | 2034 | /* Potentially read multiple events into buf.  */ | 
|  | 2035 | ssize_t nb = TEMP_FAILURE_RETRY (read (inotify_fd, | 
|  | 2036 | &inev.buf, | 
|  | 2037 | sizeof (inev))); | 
|  | 2038 | if (nb < (ssize_t) sizeof (struct inotify_event)) | 
|  | 2039 | { | 
|  | 2040 | /* Not even 1 event.  */ | 
|  | 2041 | if (__glibc_unlikely (nb == -1 && errno != EAGAIN)) | 
|  | 2042 | return -1; | 
|  | 2043 | /* Done reading events that are ready.  */ | 
|  | 2044 | break; | 
|  | 2045 | } | 
|  | 2046 | /* Process all events.  The normal inotify interface delivers | 
|  | 2047 | complete events on a read and never a partial event.  */ | 
|  | 2048 | char *eptr = &inev.buf[0]; | 
|  | 2049 | ssize_t count; | 
|  | 2050 | while (1) | 
|  | 2051 | { | 
|  | 2052 | /* Check which of the files changed.  */ | 
|  | 2053 | inotify_check_files (to_clear, &inev); | 
|  | 2054 | count = sizeof (struct inotify_event) + inev.i.len; | 
|  | 2055 | eptr += count; | 
|  | 2056 | nb -= count; | 
|  | 2057 | if (nb >= (ssize_t) sizeof (struct inotify_event)) | 
|  | 2058 | memcpy (&inev, eptr, nb); | 
|  | 2059 | else | 
|  | 2060 | break; | 
|  | 2061 | } | 
|  | 2062 | continue; | 
|  | 2063 | } | 
|  | 2064 | /* Actually perform the cache clearing.  */ | 
|  | 2065 | clear_db_cache (to_clear); | 
|  | 2066 | return 0; | 
|  | 2067 | } | 
|  | 2068 |  | 
|  | 2069 | #endif | 
|  | 2070 |  | 
|  | 2071 | static void | 
|  | 2072 | __attribute__ ((__noreturn__)) | 
|  | 2073 | main_loop_poll (void) | 
|  | 2074 | { | 
|  | 2075 | struct pollfd *conns = (struct pollfd *) xmalloc (nconns | 
|  | 2076 | * sizeof (conns[0])); | 
|  | 2077 |  | 
|  | 2078 | conns[0].fd = sock; | 
|  | 2079 | conns[0].events = POLLRDNORM; | 
|  | 2080 | size_t nused = 1; | 
|  | 2081 | size_t firstfree = 1; | 
|  | 2082 |  | 
|  | 2083 | #ifdef HAVE_INOTIFY | 
|  | 2084 | if (inotify_fd != -1) | 
|  | 2085 | { | 
|  | 2086 | conns[1].fd = inotify_fd; | 
|  | 2087 | conns[1].events = POLLRDNORM; | 
|  | 2088 | nused = 2; | 
|  | 2089 | firstfree = 2; | 
|  | 2090 | } | 
|  | 2091 | #endif | 
|  | 2092 |  | 
|  | 2093 | #ifdef HAVE_NETLINK | 
|  | 2094 | size_t idx_nl_status_fd = 0; | 
|  | 2095 | if (nl_status_fd != -1) | 
|  | 2096 | { | 
|  | 2097 | idx_nl_status_fd = nused; | 
|  | 2098 | conns[nused].fd = nl_status_fd; | 
|  | 2099 | conns[nused].events = POLLRDNORM; | 
|  | 2100 | ++nused; | 
|  | 2101 | firstfree = nused; | 
|  | 2102 | } | 
|  | 2103 | #endif | 
|  | 2104 |  | 
|  | 2105 | while (1) | 
|  | 2106 | { | 
|  | 2107 | /* Wait for any event.  We wait at most a couple of seconds so | 
|  | 2108 | that we can check whether we should close any of the accepted | 
|  | 2109 | connections since we have not received a request.  */ | 
|  | 2110 | #define MAX_ACCEPT_TIMEOUT 30 | 
|  | 2111 | #define MIN_ACCEPT_TIMEOUT 5 | 
|  | 2112 | #define MAIN_THREAD_TIMEOUT \ | 
|  | 2113 | (MAX_ACCEPT_TIMEOUT * 1000						      \ | 
|  | 2114 | - ((MAX_ACCEPT_TIMEOUT - MIN_ACCEPT_TIMEOUT) * 1000 * nused) / (2 * nconns)) | 
|  | 2115 |  | 
|  | 2116 | int n = poll (conns, nused, MAIN_THREAD_TIMEOUT); | 
|  | 2117 |  | 
|  | 2118 | time_t now = time (NULL); | 
|  | 2119 |  | 
|  | 2120 | /* If there is a descriptor ready for reading or there is a new | 
|  | 2121 | connection, process this now.  */ | 
|  | 2122 | if (n > 0) | 
|  | 2123 | { | 
|  | 2124 | if (conns[0].revents != 0) | 
|  | 2125 | { | 
|  | 2126 | /* We have a new incoming connection.  Accept the connection.  */ | 
|  | 2127 | int fd; | 
|  | 2128 |  | 
|  | 2129 | #ifndef __ASSUME_ACCEPT4 | 
|  | 2130 | fd = -1; | 
|  | 2131 | if (have_accept4 >= 0) | 
|  | 2132 | #endif | 
|  | 2133 | { | 
|  | 2134 | fd = TEMP_FAILURE_RETRY (accept4 (sock, NULL, NULL, | 
|  | 2135 | SOCK_NONBLOCK)); | 
|  | 2136 | #ifndef __ASSUME_ACCEPT4 | 
|  | 2137 | if (have_accept4 == 0) | 
|  | 2138 | have_accept4 = fd != -1 || errno != ENOSYS ? 1 : -1; | 
|  | 2139 | #endif | 
|  | 2140 | } | 
|  | 2141 | #ifndef __ASSUME_ACCEPT4 | 
|  | 2142 | if (have_accept4 < 0) | 
|  | 2143 | fd = TEMP_FAILURE_RETRY (accept (sock, NULL, NULL)); | 
|  | 2144 | #endif | 
|  | 2145 |  | 
|  | 2146 | /* Use the descriptor if we have not reached the limit.  */ | 
|  | 2147 | if (fd >= 0) | 
|  | 2148 | { | 
|  | 2149 | if (firstfree < nconns) | 
|  | 2150 | { | 
|  | 2151 | conns[firstfree].fd = fd; | 
|  | 2152 | conns[firstfree].events = POLLRDNORM; | 
|  | 2153 | starttime[firstfree] = now; | 
|  | 2154 | if (firstfree >= nused) | 
|  | 2155 | nused = firstfree + 1; | 
|  | 2156 |  | 
|  | 2157 | do | 
|  | 2158 | ++firstfree; | 
|  | 2159 | while (firstfree < nused && conns[firstfree].fd != -1); | 
|  | 2160 | } | 
|  | 2161 | else | 
|  | 2162 | /* We cannot use the connection so close it.  */ | 
|  | 2163 | close (fd); | 
|  | 2164 | } | 
|  | 2165 |  | 
|  | 2166 | --n; | 
|  | 2167 | } | 
|  | 2168 |  | 
|  | 2169 | size_t first = 1; | 
|  | 2170 | #ifdef HAVE_INOTIFY | 
|  | 2171 | if (inotify_fd != -1 && conns[1].fd == inotify_fd) | 
|  | 2172 | { | 
|  | 2173 | if (conns[1].revents != 0) | 
|  | 2174 | { | 
|  | 2175 | int ret; | 
|  | 2176 | ret = handle_inotify_events (); | 
|  | 2177 | if (ret == -1) | 
|  | 2178 | { | 
|  | 2179 | /* Something went wrong when reading the inotify | 
|  | 2180 | data.  Better disable inotify.  */ | 
|  | 2181 | dbg_log (_("disabled inotify-based monitoring after read error %d"), errno); | 
|  | 2182 | conns[1].fd = -1; | 
|  | 2183 | firstfree = 1; | 
|  | 2184 | if (nused == 2) | 
|  | 2185 | nused = 1; | 
|  | 2186 | close (inotify_fd); | 
|  | 2187 | inotify_fd = -1; | 
|  | 2188 | } | 
|  | 2189 | --n; | 
|  | 2190 | } | 
|  | 2191 |  | 
|  | 2192 | first = 2; | 
|  | 2193 | } | 
|  | 2194 | #endif | 
|  | 2195 |  | 
|  | 2196 | #ifdef HAVE_NETLINK | 
|  | 2197 | if (idx_nl_status_fd != 0 && conns[idx_nl_status_fd].revents != 0) | 
|  | 2198 | { | 
|  | 2199 | char buf[4096]; | 
|  | 2200 | /* Read all the data.  We do not interpret it here.  */ | 
|  | 2201 | while (TEMP_FAILURE_RETRY (read (nl_status_fd, buf, | 
|  | 2202 | sizeof (buf))) != -1) | 
|  | 2203 | ; | 
|  | 2204 |  | 
|  | 2205 | dbs[hstdb].head->extra_data[NSCD_HST_IDX_CONF_TIMESTAMP] | 
|  | 2206 | = __bump_nl_timestamp (); | 
|  | 2207 | } | 
|  | 2208 | #endif | 
|  | 2209 |  | 
|  | 2210 | for (size_t cnt = first; cnt < nused && n > 0; ++cnt) | 
|  | 2211 | if (conns[cnt].revents != 0) | 
|  | 2212 | { | 
|  | 2213 | fd_ready (conns[cnt].fd); | 
|  | 2214 |  | 
|  | 2215 | /* Clean up the CONNS array.  */ | 
|  | 2216 | conns[cnt].fd = -1; | 
|  | 2217 | if (cnt < firstfree) | 
|  | 2218 | firstfree = cnt; | 
|  | 2219 | if (cnt == nused - 1) | 
|  | 2220 | do | 
|  | 2221 | --nused; | 
|  | 2222 | while (conns[nused - 1].fd == -1); | 
|  | 2223 |  | 
|  | 2224 | --n; | 
|  | 2225 | } | 
|  | 2226 | } | 
|  | 2227 |  | 
|  | 2228 | /* Now find entries which have timed out.  */ | 
|  | 2229 | assert (nused > 0); | 
|  | 2230 |  | 
|  | 2231 | /* We make the timeout length depend on the number of file | 
|  | 2232 | descriptors currently used.  */ | 
|  | 2233 | #define ACCEPT_TIMEOUT \ | 
|  | 2234 | (MAX_ACCEPT_TIMEOUT							      \ | 
|  | 2235 | - ((MAX_ACCEPT_TIMEOUT - MIN_ACCEPT_TIMEOUT) * nused) / nconns) | 
|  | 2236 | time_t laststart = now - ACCEPT_TIMEOUT; | 
|  | 2237 |  | 
|  | 2238 | for (size_t cnt = nused - 1; cnt > 0; --cnt) | 
|  | 2239 | { | 
|  | 2240 | if (conns[cnt].fd != -1 && starttime[cnt] < laststart) | 
|  | 2241 | { | 
|  | 2242 | /* Remove the entry, it timed out.  */ | 
|  | 2243 | (void) close (conns[cnt].fd); | 
|  | 2244 | conns[cnt].fd = -1; | 
|  | 2245 |  | 
|  | 2246 | if (cnt < firstfree) | 
|  | 2247 | firstfree = cnt; | 
|  | 2248 | if (cnt == nused - 1) | 
|  | 2249 | do | 
|  | 2250 | --nused; | 
|  | 2251 | while (conns[nused - 1].fd == -1); | 
|  | 2252 | } | 
|  | 2253 | } | 
|  | 2254 |  | 
|  | 2255 | if (restart_p (now)) | 
|  | 2256 | restart (); | 
|  | 2257 | } | 
|  | 2258 | } | 
|  | 2259 |  | 
|  | 2260 |  | 
|  | 2261 | #ifdef HAVE_EPOLL | 
|  | 2262 | static void | 
|  | 2263 | main_loop_epoll (int efd) | 
|  | 2264 | { | 
|  | 2265 | struct epoll_event ev = { 0, }; | 
|  | 2266 | int nused = 1; | 
|  | 2267 | size_t highest = 0; | 
|  | 2268 |  | 
|  | 2269 | /* Add the socket.  */ | 
|  | 2270 | ev.events = EPOLLRDNORM; | 
|  | 2271 | ev.data.fd = sock; | 
|  | 2272 | if (epoll_ctl (efd, EPOLL_CTL_ADD, sock, &ev) == -1) | 
|  | 2273 | /* We cannot use epoll.  */ | 
|  | 2274 | return; | 
|  | 2275 |  | 
|  | 2276 | # ifdef HAVE_INOTIFY | 
|  | 2277 | if (inotify_fd != -1) | 
|  | 2278 | { | 
|  | 2279 | ev.events = EPOLLRDNORM; | 
|  | 2280 | ev.data.fd = inotify_fd; | 
|  | 2281 | if (epoll_ctl (efd, EPOLL_CTL_ADD, inotify_fd, &ev) == -1) | 
|  | 2282 | /* We cannot use epoll.  */ | 
|  | 2283 | return; | 
|  | 2284 | nused = 2; | 
|  | 2285 | } | 
|  | 2286 | # endif | 
|  | 2287 |  | 
|  | 2288 | # ifdef HAVE_NETLINK | 
|  | 2289 | if (nl_status_fd != -1) | 
|  | 2290 | { | 
|  | 2291 | ev.events = EPOLLRDNORM; | 
|  | 2292 | ev.data.fd = nl_status_fd; | 
|  | 2293 | if (epoll_ctl (efd, EPOLL_CTL_ADD, nl_status_fd, &ev) == -1) | 
|  | 2294 | /* We cannot use epoll.  */ | 
|  | 2295 | return; | 
|  | 2296 | } | 
|  | 2297 | # endif | 
|  | 2298 |  | 
|  | 2299 | while (1) | 
|  | 2300 | { | 
|  | 2301 | struct epoll_event revs[100]; | 
|  | 2302 | # define nrevs (sizeof (revs) / sizeof (revs[0])) | 
|  | 2303 |  | 
|  | 2304 | int n = epoll_wait (efd, revs, nrevs, MAIN_THREAD_TIMEOUT); | 
|  | 2305 |  | 
|  | 2306 | time_t now = time (NULL); | 
|  | 2307 |  | 
|  | 2308 | for (int cnt = 0; cnt < n; ++cnt) | 
|  | 2309 | if (revs[cnt].data.fd == sock) | 
|  | 2310 | { | 
|  | 2311 | /* A new connection.  */ | 
|  | 2312 | int fd; | 
|  | 2313 |  | 
|  | 2314 | # ifndef __ASSUME_ACCEPT4 | 
|  | 2315 | fd = -1; | 
|  | 2316 | if (have_accept4 >= 0) | 
|  | 2317 | # endif | 
|  | 2318 | { | 
|  | 2319 | fd = TEMP_FAILURE_RETRY (accept4 (sock, NULL, NULL, | 
|  | 2320 | SOCK_NONBLOCK)); | 
|  | 2321 | # ifndef __ASSUME_ACCEPT4 | 
|  | 2322 | if (have_accept4 == 0) | 
|  | 2323 | have_accept4 = fd != -1 || errno != ENOSYS ? 1 : -1; | 
|  | 2324 | # endif | 
|  | 2325 | } | 
|  | 2326 | # ifndef __ASSUME_ACCEPT4 | 
|  | 2327 | if (have_accept4 < 0) | 
|  | 2328 | fd = TEMP_FAILURE_RETRY (accept (sock, NULL, NULL)); | 
|  | 2329 | # endif | 
|  | 2330 |  | 
|  | 2331 | /* Use the descriptor if we have not reached the limit.  */ | 
|  | 2332 | if (fd >= 0) | 
|  | 2333 | { | 
|  | 2334 | /* Try to add the  new descriptor.  */ | 
|  | 2335 | ev.data.fd = fd; | 
|  | 2336 | if (fd >= nconns | 
|  | 2337 | || epoll_ctl (efd, EPOLL_CTL_ADD, fd, &ev) == -1) | 
|  | 2338 | /* The descriptor is too large or something went | 
|  | 2339 | wrong.  Close the descriptor.  */ | 
|  | 2340 | close (fd); | 
|  | 2341 | else | 
|  | 2342 | { | 
|  | 2343 | /* Remember when we accepted the connection.  */ | 
|  | 2344 | starttime[fd] = now; | 
|  | 2345 |  | 
|  | 2346 | if (fd > highest) | 
|  | 2347 | highest = fd; | 
|  | 2348 |  | 
|  | 2349 | ++nused; | 
|  | 2350 | } | 
|  | 2351 | } | 
|  | 2352 | } | 
|  | 2353 | # ifdef HAVE_INOTIFY | 
|  | 2354 | else if (revs[cnt].data.fd == inotify_fd) | 
|  | 2355 | { | 
|  | 2356 | int ret; | 
|  | 2357 | ret = handle_inotify_events (); | 
|  | 2358 | if (ret == -1) | 
|  | 2359 | { | 
|  | 2360 | /* Something went wrong when reading the inotify | 
|  | 2361 | data.  Better disable inotify.  */ | 
|  | 2362 | dbg_log (_("disabled inotify-based monitoring after read error %d"), errno); | 
|  | 2363 | (void) epoll_ctl (efd, EPOLL_CTL_DEL, inotify_fd, NULL); | 
|  | 2364 | close (inotify_fd); | 
|  | 2365 | inotify_fd = -1; | 
|  | 2366 | break; | 
|  | 2367 | } | 
|  | 2368 | } | 
|  | 2369 | # endif | 
|  | 2370 | # ifdef HAVE_NETLINK | 
|  | 2371 | else if (revs[cnt].data.fd == nl_status_fd) | 
|  | 2372 | { | 
|  | 2373 | char buf[4096]; | 
|  | 2374 | /* Read all the data.  We do not interpret it here.  */ | 
|  | 2375 | while (TEMP_FAILURE_RETRY (read (nl_status_fd, buf, | 
|  | 2376 | sizeof (buf))) != -1) | 
|  | 2377 | ; | 
|  | 2378 |  | 
|  | 2379 | __bump_nl_timestamp (); | 
|  | 2380 | } | 
|  | 2381 | # endif | 
|  | 2382 | else | 
|  | 2383 | { | 
|  | 2384 | /* Remove the descriptor from the epoll descriptor.  */ | 
|  | 2385 | (void) epoll_ctl (efd, EPOLL_CTL_DEL, revs[cnt].data.fd, NULL); | 
|  | 2386 |  | 
|  | 2387 | /* Get a worker to handle the request.  */ | 
|  | 2388 | fd_ready (revs[cnt].data.fd); | 
|  | 2389 |  | 
|  | 2390 | /* Reset the time.  */ | 
|  | 2391 | starttime[revs[cnt].data.fd] = 0; | 
|  | 2392 | if (revs[cnt].data.fd == highest) | 
|  | 2393 | do | 
|  | 2394 | --highest; | 
|  | 2395 | while (highest > 0 && starttime[highest] == 0); | 
|  | 2396 |  | 
|  | 2397 | --nused; | 
|  | 2398 | } | 
|  | 2399 |  | 
|  | 2400 | /*  Now look for descriptors for accepted connections which have | 
|  | 2401 | no reply in too long of a time.  */ | 
|  | 2402 | time_t laststart = now - ACCEPT_TIMEOUT; | 
|  | 2403 | assert (starttime[sock] == 0); | 
|  | 2404 | # ifdef HAVE_INOTIFY | 
|  | 2405 | assert (inotify_fd == -1 || starttime[inotify_fd] == 0); | 
|  | 2406 | # endif | 
|  | 2407 | assert (nl_status_fd == -1 || starttime[nl_status_fd] == 0); | 
|  | 2408 | for (int cnt = highest; cnt > STDERR_FILENO; --cnt) | 
|  | 2409 | if (starttime[cnt] != 0 && starttime[cnt] < laststart) | 
|  | 2410 | { | 
|  | 2411 | /* We are waiting for this one for too long.  Close it.  */ | 
|  | 2412 | (void) epoll_ctl (efd, EPOLL_CTL_DEL, cnt, NULL); | 
|  | 2413 |  | 
|  | 2414 | (void) close (cnt); | 
|  | 2415 |  | 
|  | 2416 | starttime[cnt] = 0; | 
|  | 2417 | if (cnt == highest) | 
|  | 2418 | --highest; | 
|  | 2419 | } | 
|  | 2420 | else if (cnt != sock && starttime[cnt] == 0 && cnt == highest) | 
|  | 2421 | --highest; | 
|  | 2422 |  | 
|  | 2423 | if (restart_p (now)) | 
|  | 2424 | restart (); | 
|  | 2425 | } | 
|  | 2426 | } | 
|  | 2427 | #endif | 
|  | 2428 |  | 
|  | 2429 |  | 
|  | 2430 | /* Start all the threads we want.  The initial process is thread no. 1.  */ | 
|  | 2431 | void | 
|  | 2432 | start_threads (void) | 
|  | 2433 | { | 
|  | 2434 | /* Initialize the conditional variable we will use.  The only | 
|  | 2435 | non-standard attribute we might use is the clock selection.  */ | 
|  | 2436 | pthread_condattr_t condattr; | 
|  | 2437 | pthread_condattr_init (&condattr); | 
|  | 2438 |  | 
|  | 2439 | #if defined _POSIX_CLOCK_SELECTION && _POSIX_CLOCK_SELECTION >= 0 \ | 
|  | 2440 | && defined _POSIX_MONOTONIC_CLOCK && _POSIX_MONOTONIC_CLOCK >= 0 | 
|  | 2441 | /* Determine whether the monotonous clock is available.  */ | 
|  | 2442 | struct timespec dummy; | 
|  | 2443 | # if _POSIX_MONOTONIC_CLOCK == 0 | 
|  | 2444 | if (sysconf (_SC_MONOTONIC_CLOCK) > 0) | 
|  | 2445 | # endif | 
|  | 2446 | # if _POSIX_CLOCK_SELECTION == 0 | 
|  | 2447 | if (sysconf (_SC_CLOCK_SELECTION) > 0) | 
|  | 2448 | # endif | 
|  | 2449 | if (clock_getres (CLOCK_MONOTONIC, &dummy) == 0 | 
|  | 2450 | && pthread_condattr_setclock (&condattr, CLOCK_MONOTONIC) == 0) | 
|  | 2451 | timeout_clock = CLOCK_MONOTONIC; | 
|  | 2452 | #endif | 
|  | 2453 |  | 
|  | 2454 | /* Create the attribute for the threads.  They are all created | 
|  | 2455 | detached.  */ | 
|  | 2456 | pthread_attr_init (&attr); | 
|  | 2457 | pthread_attr_setdetachstate (&attr, PTHREAD_CREATE_DETACHED); | 
|  | 2458 | /* Use 1MB stacks, twice as much for 64-bit architectures.  */ | 
|  | 2459 | pthread_attr_setstacksize (&attr, NSCD_THREAD_STACKSIZE); | 
|  | 2460 |  | 
|  | 2461 | /* We allow less than LASTDB threads only for debugging.  */ | 
|  | 2462 | if (debug_level == 0) | 
|  | 2463 | nthreads = MAX (nthreads, lastdb); | 
|  | 2464 |  | 
|  | 2465 | /* Create the threads which prune the databases.  */ | 
|  | 2466 | // XXX Ideally this work would be done by some of the worker threads. | 
|  | 2467 | // XXX But this is problematic since we would need to be able to wake | 
|  | 2468 | // XXX them up explicitly as well as part of the group handling the | 
|  | 2469 | // XXX ready-list.  This requires an operation where we can wait on | 
|  | 2470 | // XXX two conditional variables at the same time.  This operation | 
|  | 2471 | // XXX does not exist (yet). | 
|  | 2472 | for (long int i = 0; i < lastdb; ++i) | 
|  | 2473 | { | 
|  | 2474 | /* Initialize the conditional variable.  */ | 
|  | 2475 | if (pthread_cond_init (&dbs[i].prune_cond, &condattr) != 0) | 
|  | 2476 | { | 
|  | 2477 | dbg_log (_("could not initialize conditional variable")); | 
|  | 2478 | do_exit (1, 0, NULL); | 
|  | 2479 | } | 
|  | 2480 |  | 
|  | 2481 | pthread_t th; | 
|  | 2482 | if (dbs[i].enabled | 
|  | 2483 | && pthread_create (&th, &attr, nscd_run_prune, (void *) i) != 0) | 
|  | 2484 | { | 
|  | 2485 | dbg_log (_("could not start clean-up thread; terminating")); | 
|  | 2486 | do_exit (1, 0, NULL); | 
|  | 2487 | } | 
|  | 2488 | } | 
|  | 2489 |  | 
|  | 2490 | pthread_condattr_destroy (&condattr); | 
|  | 2491 |  | 
|  | 2492 | for (long int i = 0; i < nthreads; ++i) | 
|  | 2493 | { | 
|  | 2494 | pthread_t th; | 
|  | 2495 | if (pthread_create (&th, &attr, nscd_run_worker, NULL) != 0) | 
|  | 2496 | { | 
|  | 2497 | if (i == 0) | 
|  | 2498 | { | 
|  | 2499 | dbg_log (_("could not start any worker thread; terminating")); | 
|  | 2500 | do_exit (1, 0, NULL); | 
|  | 2501 | } | 
|  | 2502 |  | 
|  | 2503 | break; | 
|  | 2504 | } | 
|  | 2505 | } | 
|  | 2506 |  | 
|  | 2507 | /* Now it is safe to let the parent know that we're doing fine and it can | 
|  | 2508 | exit.  */ | 
|  | 2509 | notify_parent (0); | 
|  | 2510 |  | 
|  | 2511 | /* Determine how much room for descriptors we should initially | 
|  | 2512 | allocate.  This might need to change later if we cap the number | 
|  | 2513 | with MAXCONN.  */ | 
|  | 2514 | const long int nfds = sysconf (_SC_OPEN_MAX); | 
|  | 2515 | #define MINCONN 32 | 
|  | 2516 | #define MAXCONN 16384 | 
|  | 2517 | if (nfds == -1 || nfds > MAXCONN) | 
|  | 2518 | nconns = MAXCONN; | 
|  | 2519 | else if (nfds < MINCONN) | 
|  | 2520 | nconns = MINCONN; | 
|  | 2521 | else | 
|  | 2522 | nconns = nfds; | 
|  | 2523 |  | 
|  | 2524 | /* We need memory to pass descriptors on to the worker threads.  */ | 
|  | 2525 | fdlist = (struct fdlist *) xcalloc (nconns, sizeof (fdlist[0])); | 
|  | 2526 | /* Array to keep track when connection was accepted.  */ | 
|  | 2527 | starttime = (time_t *) xcalloc (nconns, sizeof (starttime[0])); | 
|  | 2528 |  | 
|  | 2529 | /* In the main thread we execute the loop which handles incoming | 
|  | 2530 | connections.  */ | 
|  | 2531 | #ifdef HAVE_EPOLL | 
|  | 2532 | int efd = epoll_create (100); | 
|  | 2533 | if (efd != -1) | 
|  | 2534 | { | 
|  | 2535 | main_loop_epoll (efd); | 
|  | 2536 | close (efd); | 
|  | 2537 | } | 
|  | 2538 | #endif | 
|  | 2539 |  | 
|  | 2540 | main_loop_poll (); | 
|  | 2541 | } | 
|  | 2542 |  | 
|  | 2543 |  | 
|  | 2544 | /* Look up the uid, gid, and supplementary groups to run nscd as. When | 
|  | 2545 | this function is called, we are not listening on the nscd socket yet so | 
|  | 2546 | we can just use the ordinary lookup functions without causing a lockup  */ | 
|  | 2547 | static void | 
|  | 2548 | begin_drop_privileges (void) | 
|  | 2549 | { | 
|  | 2550 | struct passwd *pwd = getpwnam (server_user); | 
|  | 2551 |  | 
|  | 2552 | if (pwd == NULL) | 
|  | 2553 | { | 
|  | 2554 | dbg_log (_("Failed to run nscd as user '%s'"), server_user); | 
|  | 2555 | do_exit (EXIT_FAILURE, 0, | 
|  | 2556 | _("Failed to run nscd as user '%s'"), server_user); | 
|  | 2557 | } | 
|  | 2558 |  | 
|  | 2559 | server_uid = pwd->pw_uid; | 
|  | 2560 | server_gid = pwd->pw_gid; | 
|  | 2561 |  | 
|  | 2562 | /* Save the old UID/GID if we have to change back.  */ | 
|  | 2563 | if (paranoia) | 
|  | 2564 | { | 
|  | 2565 | old_uid = getuid (); | 
|  | 2566 | old_gid = getgid (); | 
|  | 2567 | } | 
|  | 2568 |  | 
|  | 2569 | if (getgrouplist (server_user, server_gid, NULL, &server_ngroups) == 0) | 
|  | 2570 | { | 
|  | 2571 | /* This really must never happen.  */ | 
|  | 2572 | dbg_log (_("Failed to run nscd as user '%s'"), server_user); | 
|  | 2573 | do_exit (EXIT_FAILURE, errno, | 
|  | 2574 | _("initial getgrouplist failed")); | 
|  | 2575 | } | 
|  | 2576 |  | 
|  | 2577 | server_groups = (gid_t *) xmalloc (server_ngroups * sizeof (gid_t)); | 
|  | 2578 |  | 
|  | 2579 | if (getgrouplist (server_user, server_gid, server_groups, &server_ngroups) | 
|  | 2580 | == -1) | 
|  | 2581 | { | 
|  | 2582 | dbg_log (_("Failed to run nscd as user '%s'"), server_user); | 
|  | 2583 | do_exit (EXIT_FAILURE, errno, _("getgrouplist failed")); | 
|  | 2584 | } | 
|  | 2585 | } | 
|  | 2586 |  | 
|  | 2587 |  | 
|  | 2588 | /* Call setgroups(), setgid(), and setuid() to drop root privileges and | 
|  | 2589 | run nscd as the user specified in the configuration file.  */ | 
|  | 2590 | static void | 
|  | 2591 | finish_drop_privileges (void) | 
|  | 2592 | { | 
|  | 2593 | #if defined HAVE_LIBAUDIT && defined HAVE_LIBCAP | 
|  | 2594 | /* We need to preserve the capabilities to connect to the audit daemon.  */ | 
|  | 2595 | cap_t new_caps = preserve_capabilities (); | 
|  | 2596 | #endif | 
|  | 2597 |  | 
|  | 2598 | if (setgroups (server_ngroups, server_groups) == -1) | 
|  | 2599 | { | 
|  | 2600 | dbg_log (_("Failed to run nscd as user '%s'"), server_user); | 
|  | 2601 | do_exit (EXIT_FAILURE, errno, _("setgroups failed")); | 
|  | 2602 | } | 
|  | 2603 |  | 
|  | 2604 | int res; | 
|  | 2605 | if (paranoia) | 
|  | 2606 | res = setresgid (server_gid, server_gid, old_gid); | 
|  | 2607 | else | 
|  | 2608 | res = setgid (server_gid); | 
|  | 2609 | if (res == -1) | 
|  | 2610 | { | 
|  | 2611 | dbg_log (_("Failed to run nscd as user '%s'"), server_user); | 
|  | 2612 | do_exit (4, errno, "setgid"); | 
|  | 2613 | } | 
|  | 2614 |  | 
|  | 2615 | if (paranoia) | 
|  | 2616 | res = setresuid (server_uid, server_uid, old_uid); | 
|  | 2617 | else | 
|  | 2618 | res = setuid (server_uid); | 
|  | 2619 | if (res == -1) | 
|  | 2620 | { | 
|  | 2621 | dbg_log (_("Failed to run nscd as user '%s'"), server_user); | 
|  | 2622 | do_exit (4, errno, "setuid"); | 
|  | 2623 | } | 
|  | 2624 |  | 
|  | 2625 | #if defined HAVE_LIBAUDIT && defined HAVE_LIBCAP | 
|  | 2626 | /* Remove the temporary capabilities.  */ | 
|  | 2627 | install_real_capabilities (new_caps); | 
|  | 2628 | #endif | 
|  | 2629 | } |