diff options
author | Igor Pashev <pashev.igor@gmail.com> | 2019-11-26 14:00:30 +0300 |
---|---|---|
committer | Igor Pashev <pashev.igor@gmail.com> | 2019-11-26 14:00:30 +0300 |
commit | 414ea1706306e061fc44a8b5ce3042d4f0728489 (patch) | |
tree | ef0b2c4eac79e479ed686a5d88d7b3b954717824 /utils | |
parent | ed2b463626bd721942143baa6207f2ccac67a616 (diff) | |
parent | 89afa9af7cd589eb8384ed96b6d86dd59d56bdf5 (diff) | |
download | dpkg-414ea1706306e061fc44a8b5ce3042d4f0728489.tar.gz |
Merge https://salsa.debian.org/dpkg-team/dpkg
Diffstat (limited to 'utils')
-rw-r--r-- | utils/start-stop-daemon.c | 525 | ||||
-rw-r--r-- | utils/t/update_alternatives.t | 60 | ||||
-rw-r--r-- | utils/update-alternatives.c | 172 |
3 files changed, 599 insertions, 158 deletions
diff --git a/utils/start-stop-daemon.c b/utils/start-stop-daemon.c index 06a5687f0..886fb8872 100644 --- a/utils/start-stop-daemon.c +++ b/utils/start-stop-daemon.c @@ -84,8 +84,9 @@ #include <sys/wait.h> #include <sys/select.h> #include <sys/ioctl.h> +#include <sys/socket.h> +#include <sys/un.h> -#include <assert.h> #include <errno.h> #include <limits.h> #include <time.h> @@ -189,6 +190,16 @@ enum action_code { ACTION_STATUS, }; +enum match_code { + MATCH_NONE = 0, + MATCH_PID = 1 << 0, + MATCH_PPID = 1 << 1, + MATCH_PIDFILE = 1 << 2, + MATCH_EXEC = 1 << 3, + MATCH_NAME = 1 << 4, + MATCH_USER = 1 << 5, +}; + /* Time conversion constants. */ enum { NANOSEC_IN_SEC = 1000000000L, @@ -197,14 +208,19 @@ enum { }; /* The minimum polling interval, 20ms. */ -static const long MIN_POLL_INTERVAL = 20 * NANOSEC_IN_MILLISEC; +static const long MIN_POLL_INTERVAL = 20L * NANOSEC_IN_MILLISEC; static enum action_code action; +static enum match_code match_mode; static bool testmode = false; static int quietmode = 0; static int exitnodo = 1; static bool background = false; static bool close_io = true; +static bool notify_await = false; +static int notify_timeout = 60; +static char *notify_sockdir; +static char *notify_socket; static bool mpidfile = false; static bool rpidfile = false; static int signal_nr = SIGTERM; @@ -276,26 +292,51 @@ static struct schedule_item *schedule = NULL; static void DPKG_ATTR_PRINTF(1) -warning(const char *format, ...) +debug(const char *format, ...) { va_list arglist; - fprintf(stderr, "%s: warning: ", progname); + if (quietmode >= 0) + return; + va_start(arglist, format); - vfprintf(stderr, format, arglist); + vprintf(format, arglist); va_end(arglist); } -static void DPKG_ATTR_NORET DPKG_ATTR_PRINTF(1) -fatal(const char *format, ...) +static void DPKG_ATTR_PRINTF(1) +info(const char *format, ...) { va_list arglist; - int errno_fatal = errno; - fprintf(stderr, "%s: ", progname); + if (quietmode > 0) + return; + + va_start(arglist, format); + vprintf(format, arglist); + va_end(arglist); +} + +static void DPKG_ATTR_PRINTF(1) +warning(const char *format, ...) +{ + va_list arglist; + + fprintf(stderr, "%s: warning: ", progname); va_start(arglist, format); vfprintf(stderr, format, arglist); va_end(arglist); +} + +static void DPKG_ATTR_NORET DPKG_ATTR_VPRINTF(2) +fatalv(int errno_fatal, const char *format, va_list args) +{ + va_list args_copy; + + fprintf(stderr, "%s: ", progname); + va_copy(args_copy, args); + vfprintf(stderr, format, args_copy); + va_end(args_copy); if (errno_fatal) fprintf(stderr, " (%s)\n", strerror(errno_fatal)); else @@ -307,6 +348,43 @@ fatal(const char *format, ...) exit(2); } +static void DPKG_ATTR_NORET DPKG_ATTR_PRINTF(1) +fatal(const char *format, ...) +{ + va_list args; + + va_start(args, format); + fatalv(0, format, args); +} + +static void DPKG_ATTR_NORET DPKG_ATTR_PRINTF(1) +fatale(const char *format, ...) +{ + va_list args; + + va_start(args, format); + fatalv(errno, format, args); +} + +#define BUG(...) bug(__FILE__, __LINE__, __func__, __VA_ARGS__) + +static void DPKG_ATTR_NORET DPKG_ATTR_PRINTF(4) +bug(const char *file, int line, const char *func, const char *format, ...) +{ + va_list arglist; + + fprintf(stderr, "%s:%s:%d:%s: internal error: ", + progname, file, line, func); + va_start(arglist, format); + vfprintf(stderr, format, arglist); + va_end(arglist); + + if (action == ACTION_STATUS) + exit(STATUS_UNKNOWN); + else + exit(3); +} + static void * xmalloc(int size) { @@ -315,7 +393,7 @@ xmalloc(int size) ptr = malloc(size); if (ptr) return ptr; - fatal("malloc(%d) failed", size); + fatale("malloc(%d) failed", size); } static char * @@ -326,7 +404,7 @@ xstrndup(const char *str, size_t n) new_str = strndup(str, n); if (new_str) return new_str; - fatal("strndup(%s, %zu) failed", str, n); + fatale("strndup(%s, %zu) failed", str, n); } static void @@ -335,12 +413,12 @@ timespec_gettime(struct timespec *ts) #if defined(_POSIX_TIMERS) && _POSIX_TIMERS > 0 && \ defined(_POSIX_MONOTONIC_CLOCK) && _POSIX_MONOTONIC_CLOCK > 0 if (clock_gettime(CLOCK_MONOTONIC, ts) < 0) - fatal("clock_gettime failed"); + fatale("clock_gettime failed"); #else struct timeval tv; if (gettimeofday(&tv, NULL) != 0) - fatal("gettimeofday failed"); + fatale("gettimeofday failed"); ts->tv_sec = tv.tv_sec; ts->tv_nsec = tv.tv_usec * NANOSEC_IN_MICROSEC; @@ -386,6 +464,26 @@ newpath(const char *dirname, const char *filename) return path; } +static int +parse_unsigned(const char *string, int base, int *value_r) +{ + long value; + char *endptr; + + errno = 0; + if (!string[0]) + return -1; + + value = strtol(string, &endptr, base); + if (string == endptr || *endptr != '\0' || errno != 0) + return -1; + if (value < 0 || value > INT_MAX) + return -1; + + *value_r = value; + return 0; +} + static long get_open_fd_max(void) { @@ -410,7 +508,7 @@ detach_controlling_tty(void) return; if (ioctl(tty_fd, TIOCNOTTY, 0) != 0) - fatal("unable to detach controlling tty"); + fatale("unable to detach controlling tty"); close(tty_fd); #endif @@ -456,6 +554,196 @@ wait_for_child(pid_t pid) } static void +cleanup_socket_dir(void) +{ + unlink(notify_socket); + rmdir(notify_sockdir); +} + +static char * +setup_socket_name(const char *suffix) +{ + const char *basedir; + + if (getuid() == 0 && access("/run", F_OK) == 0) { + basedir = "/run"; + } else { + basedir = getenv("TMPDIR"); + if (basedir == NULL) + basedir = P_tmpdir; + } + + if (asprintf(¬ify_sockdir, "%s/%s.XXXXXX", basedir, suffix) < 0) + fatale("cannot allocate socket directory name"); + + if (mkdtemp(notify_sockdir) == NULL) + fatale("cannot create socket directory %s", notify_sockdir); + + atexit(cleanup_socket_dir); + + if (chown(notify_sockdir, runas_uid, runas_gid)) + fatale("cannot change socket directory ownership"); + + if (asprintf(¬ify_socket, "%s/notify", notify_sockdir) < 0) + fatale("cannot allocate socket name"); + + setenv("NOTIFY_SOCKET", notify_socket, 1); + + return notify_socket; +} + +static void +set_socket_passcred(int fd) +{ +#ifdef SO_PASSCRED + static const int enable = 1; + + setsockopt(fd, SOL_SOCKET, SO_PASSCRED, &enable, sizeof(enable)); +#endif +} + +static int +create_notify_socket(void) +{ + const char *sockname; + struct sockaddr_un su; + int fd, rc, flags; + + /* Create notification socket. */ + fd = socket(AF_UNIX, SOCK_DGRAM | SOCK_NONBLOCK, 0); + if (fd < 0) + fatale("cannot create notification socket"); + + /* We could set SOCK_CLOEXEC instead, but then we would need to + * check whether the socket call failed, try and then do this anyway, + * when we have no threading problems to worry about. */ + flags = fcntl(fd, F_GETFD); + if (flags < 0) + fatale("cannot read fd flags for notification socket"); + if (fcntl(fd, F_SETFD, flags | FD_CLOEXEC) < 0) + fatale("cannot set close-on-exec flag for notification socket"); + + sockname = setup_socket_name(".s-s-d-notify"); + + /* Bind to a socket in a temporary directory, selected based on + * the platform. */ + memset(&su, 0, sizeof(su)); + su.sun_family = AF_UNIX; + strncpy(su.sun_path, sockname, sizeof(su.sun_path) - 1); + + rc = bind(fd, &su, sizeof(su)); + if (rc < 0) + fatale("cannot bind to notification socket"); + + rc = chmod(su.sun_path, 0660); + if (rc < 0) + fatale("cannot change notification socket permissions"); + + rc = chown(su.sun_path, runas_uid, runas_gid); + if (rc < 0) + fatale("cannot change notification socket ownership"); + + /* XXX: Verify we are talking to an expected child? Although it is not + * clear whether this is feasible given the knowledge we have got. */ + set_socket_passcred(fd); + + return fd; +} + +static void +wait_for_notify(int fd) +{ + struct timespec startat, now, elapsed, timeout, timeout_orig; + fd_set fdrs; + int rc; + + timeout.tv_sec = notify_timeout; + timeout.tv_nsec = 0; + timeout_orig = timeout; + + timespec_gettime(&startat); + + while (timeout.tv_sec >= 0 && timeout.tv_nsec >= 0) { + FD_ZERO(&fdrs); + FD_SET(fd, &fdrs); + + /* Wait for input. */ + debug("Waiting for notifications... (timeout %lusec %lunsec)\n", + timeout.tv_sec, timeout.tv_nsec); + rc = pselect(fd + 1, &fdrs, NULL, NULL, &timeout, NULL); + + /* Catch non-restartable errors, that is, not signals nor + * kernel out of resources. */ + if (rc < 0 && (errno != EINTR && errno != EAGAIN)) + fatale("cannot monitor notification socket for activity"); + + /* Timed-out. */ + if (rc == 0) + fatal("timed out waiting for a notification"); + + /* Update the timeout, as should not rely on pselect() having + * done that for us, which is an unportable assumption. */ + timespec_gettime(&now); + timespec_sub(&now, &startat, &elapsed); + timespec_sub(&timeout_orig, &elapsed, &timeout); + + /* Restartable error, a signal or kernel out of resources. */ + if (rc < 0) + continue; + + /* Parse it and check for a supported notification message, + * once we get a READY=1, we exit. */ + for (;;) { + ssize_t nrecv; + char buf[4096]; + char *line, *line_next; + + nrecv = recv(fd, buf, sizeof(buf), 0); + if (nrecv < 0 && (errno != EINTR && errno != EAGAIN)) + fatale("cannot receive notification packet"); + if (nrecv < 0) + break; + + buf[nrecv] = '\0'; + + for (line = buf; *line; line = line_next) { + line_next = strchrnul(line, '\n'); + if (*line_next == '\n') + *line_next++ = '\0'; + + debug("Child sent some notification...\n"); + if (strncmp(line, "EXTEND_TIMEOUT_USEC=", 20) == 0) { + int extend_usec = 0; + + if (parse_unsigned(line + 20, 10, &extend_usec) != 0) + fatale("cannot parse extended timeout notification %s", line); + + /* Reset the current timeout. */ + timeout.tv_sec = extend_usec / 1000L; + timeout.tv_nsec = (extend_usec % 1000L) * + NANOSEC_IN_MILLISEC; + timeout_orig = timeout; + + timespec_gettime(&startat); + } else if (strncmp(line, "ERRNO=", 6) == 0) { + int suberrno = 0; + + if (parse_unsigned(line + 6, 10, &suberrno) != 0) + fatale("cannot parse errno notification %s", line); + errno = suberrno; + fatale("program failed to initialize"); + } else if (strcmp(line, "READY=1") == 0) { + debug("-> Notification => ready for service.\n"); + return; + } else { + debug("-> Notification line '%s' received\n", line); + } + } + } + } +} + +static void write_pidfile(const char *filename, pid_t pid) { FILE *fp; @@ -468,61 +756,73 @@ write_pidfile(const char *filename, pid_t pid) fp = fdopen(fd, "w"); if (fp == NULL) - fatal("unable to open pidfile '%s' for writing", filename); + fatale("unable to open pidfile '%s' for writing", filename); fprintf(fp, "%d\n", (int)pid); if (fclose(fp)) - fatal("unable to close pidfile '%s'", filename); + fatale("unable to close pidfile '%s'", filename); } static void remove_pidfile(const char *filename) { if (unlink(filename) < 0 && errno != ENOENT) - fatal("cannot remove pidfile '%s'", filename); + fatale("cannot remove pidfile '%s'", filename); } static void daemonize(void) { + int notify_fd = -1; pid_t pid; sigset_t mask; sigset_t oldmask; - if (quietmode < 0) - printf("Detaching to start %s...", startas); + debug("Detaching to start %s...\n", startas); /* Block SIGCHLD to allow waiting for the child process while it is * performing actions, such as creating a pidfile. */ sigemptyset(&mask); sigaddset(&mask, SIGCHLD); if (sigprocmask(SIG_BLOCK, &mask, &oldmask) == -1) - fatal("cannot block SIGCHLD"); + fatale("cannot block SIGCHLD"); + + if (notify_await) + notify_fd = create_notify_socket(); pid = fork(); if (pid < 0) - fatal("unable to do first fork"); + fatale("unable to do first fork"); else if (pid) { /* First Parent. */ /* Wait for the second parent to exit, so that if we need to * perform any actions there, like creating a pidfile, we do * not suffer from race conditions on return. */ wait_for_child(pid); + if (notify_await) { + /* Wait for a readiness notification from the second + * child, so that we can safely exit when the service + * is up. */ + wait_for_notify(notify_fd); + close(notify_fd); + cleanup_socket_dir(); + } + _exit(0); } /* Create a new session. */ if (setsid() < 0) - fatal("cannot set session ID"); + fatale("cannot set session ID"); pid = fork(); if (pid < 0) - fatal("unable to do second fork"); + fatale("unable to do second fork"); else if (pid) { /* Second parent. */ /* Set a default umask for dumb programs, which might get * overridden by the --umask option later on, so that we get - * a defined umask when creating the pidfille. */ + * a defined umask when creating the pidfile. */ umask(022); if (mpidfile && pidfile != NULL) @@ -533,10 +833,9 @@ daemonize(void) } if (sigprocmask(SIG_SETMASK, &oldmask, NULL) == -1) - fatal("cannot restore signal mask"); + fatale("cannot restore signal mask"); - if (quietmode < 0) - printf("done.\n"); + debug("Detaching complete...\n"); } static void @@ -607,6 +906,8 @@ usage(void) " scheduler (default prio is 4)\n" " -k, --umask <mask> change the umask to <mask> before starting\n" " -b, --background force the process to detach\n" +" --notify-await wait for a readiness notification\n" +" --notify-timeout <int> timeout after <int> seconds of notify wait\n" " -C, --no-close do not close any file descriptor\n" " -m, --make-pidfile create the pidfile before starting\n" " --remove-pidfile delete the pidfile after stopping\n" @@ -697,26 +998,6 @@ static const struct sigpair siglist[] = { }; static int -parse_unsigned(const char *string, int base, int *value_r) -{ - long value; - char *endptr; - - if (!string[0]) - return -1; - - errno = 0; - value = strtol(string, &endptr, base); - if (string == endptr || *endptr != '\0' || errno != 0) - return -1; - if (value < 0 || value > INT_MAX) - return -1; - - *value_r = value; - return 0; -} - -static int parse_pid(const char *pid_str, int *pid_num) { if (parse_unsigned(pid_str, 10, pid_num) != 0) @@ -778,7 +1059,7 @@ parse_proc_schedule(const char *string) if (string[policy_len] == ':' && parse_unsigned(string + policy_len + 1, 10, &prio) != 0) - fatal("invalid process scheduler priority"); + fatale("invalid process scheduler priority"); proc_sched = xmalloc(sizeof(*proc_sched)); proc_sched->policy_name = policy_str; @@ -810,7 +1091,7 @@ parse_io_schedule(const char *string) if (string[class_len] == ':' && parse_unsigned(string + class_len + 1, 10, &prio) != 0) - fatal("invalid IO scheduler priority"); + fatale("invalid IO scheduler priority"); io_sched = xmalloc(sizeof(*io_sched)); io_sched->policy_name = class_str; @@ -842,7 +1123,7 @@ set_proc_schedule(struct res_schedule *sched) param.sched_priority = sched->priority; if (sched_setscheduler(getpid(), sched->policy, ¶m) == -1) - fatal("unable to set process scheduler"); + fatale("unable to set process scheduler"); #endif } @@ -917,15 +1198,15 @@ parse_schedule(const char *schedule_str) } else { count = 0; repeatat = -1; - while (schedule_str != NULL) { - slash = strchr(schedule_str, '/'); - str_len = slash ? (size_t)(slash - schedule_str) : strlen(schedule_str); + while (*schedule_str) { + slash = strchrnul(schedule_str, '/'); + str_len = (size_t)(slash - schedule_str); if (str_len >= sizeof(item_buf)) badusage("invalid schedule item: far too long" " (you must delimit items with slashes)"); memcpy(item_buf, schedule_str, str_len); item_buf[str_len] = '\0'; - schedule_str = slash ? slash + 1 : NULL; + schedule_str = *slash ? slash + 1 : slash; parse_schedule_item(item_buf, &schedule[count]); if (schedule[count].type == sched_forever) { @@ -945,7 +1226,9 @@ parse_schedule(const char *schedule_str) schedule[count].value = repeatat; count++; } - assert(count == schedule_length); + if (count != schedule_length) + BUG("count=%d != schedule_length=%d", + count, schedule_length); } } @@ -964,6 +1247,8 @@ set_action(enum action_code new_action) #define OPT_PID 500 #define OPT_PPID 501 #define OPT_RM_PIDFILE 502 +#define OPT_NOTIFY_AWAIT 503 +#define OPT_NOTIFY_TIMEOUT 504 static void parse_options(int argc, char * const *argv) @@ -994,6 +1279,8 @@ parse_options(int argc, char * const *argv) { "iosched", 1, NULL, 'I'}, { "umask", 1, NULL, 'k'}, { "background", 0, NULL, 'b'}, + { "notify-await", 0, NULL, OPT_NOTIFY_AWAIT}, + { "notify-timeout", 1, NULL, OPT_NOTIFY_TIMEOUT}, { "no-close", 0, NULL, 'C'}, { "make-pidfile", 0, NULL, 'm'}, { "remove-pidfile", 0, NULL, OPT_RM_PIDFILE}, @@ -1008,6 +1295,7 @@ parse_options(int argc, char * const *argv) const char *schedule_str = NULL; const char *proc_schedule_str = NULL; const char *io_schedule_str = NULL; + const char *notify_timeout_str = NULL; size_t changeuser_len; int c; @@ -1037,18 +1325,22 @@ parse_options(int argc, char * const *argv) startas = optarg; break; case 'n': /* --name <process-name> */ + match_mode |= MATCH_NAME; cmdname = optarg; break; case 'o': /* --oknodo */ exitnodo = 0; break; case OPT_PID: /* --pid <pid> */ + match_mode |= MATCH_PID; pid_str = optarg; break; case OPT_PPID: /* --ppid <ppid> */ + match_mode |= MATCH_PPID; ppid_str = optarg; break; case 'p': /* --pidfile <pid-file> */ + match_mode |= MATCH_PIDFILE; pidfile = optarg; break; case 'q': /* --quiet */ @@ -1061,12 +1353,14 @@ parse_options(int argc, char * const *argv) testmode = true; break; case 'u': /* --user <username>|<uid> */ + match_mode |= MATCH_USER; userspec = optarg; break; case 'v': /* --verbose */ quietmode = -1; break; case 'x': /* --exec <executable> */ + match_mode |= MATCH_EXEC; execname = optarg; break; case 'c': /* --chuid <username>|<uid> */ @@ -1101,6 +1395,12 @@ parse_options(int argc, char * const *argv) case 'b': /* --background */ background = true; break; + case OPT_NOTIFY_AWAIT: + notify_await = true; + break; + case OPT_NOTIFY_TIMEOUT: + notify_timeout_str = optarg; + break; case 'C': /* --no-close */ close_io = false; break; @@ -1153,11 +1453,16 @@ parse_options(int argc, char * const *argv) badusage("umask value must be a positive number"); } + if (notify_timeout_str != NULL) + if (parse_unsigned(notify_timeout_str, 10, ¬ify_timeout) != 0) + badusage("invalid notify timeout value"); + if (action == ACTION_NONE) badusage("need one of --start or --stop or --status"); - if (!execname && !pid_str && !ppid_str && !pidfile && !userspec && - !cmdname) + if (match_mode == MATCH_NONE || + (!execname && !cmdname && !userspec && + !pid_str && !ppid_str && !pidfile)) badusage("need at least one of --exec, --pid, --ppid, --pidfile, --user or --name"); #ifdef PROCESS_NAME_SIZE @@ -1179,7 +1484,7 @@ parse_options(int argc, char * const *argv) badusage("--remove-pidfile requires --pidfile"); if (pid_str && pidfile) - badusage("need either --pid of --pidfile, not both"); + badusage("need either --pid or --pidfile, not both"); if (background && action != ACTION_START) badusage("--background is only relevant with --start"); @@ -1204,7 +1509,7 @@ setup_options(void) fullexecname = execname; if (stat(fullexecname, &exec_stat)) - fatal("unable to stat %s", fullexecname); + fatale("unable to stat %s", fullexecname); if (fullexecname != execname) free(fullexecname); @@ -1215,7 +1520,7 @@ setup_options(void) pw = getpwnam(userspec); if (!pw) - fatal("user '%s' not found", userspec); + fatale("user '%s' not found", userspec); user_id = pw->pw_uid; } @@ -1225,7 +1530,7 @@ setup_options(void) gr = getgrnam(changegroup); if (!gr) - fatal("group '%s' not found", changegroup); + fatale("group '%s' not found", changegroup); changegroup = gr->gr_name; runas_gid = gr->gr_gid; } @@ -1238,7 +1543,7 @@ setup_options(void) else pw = getpwnam(changeuser); if (!pw) - fatal("user '%s' not found", changeuser); + fatale("user '%s' not found", changeuser); changeuser = pw->pw_name; runas_uid = pw->pw_uid; if (changegroup == NULL) { @@ -1294,10 +1599,16 @@ proc_get_psinfo(pid_t pid, struct psinfo *psinfo) fp = fopen(filename, "r"); if (!fp) return false; - if (fread(psinfo, sizeof(*psinfo), 1, fp) == 0) + if (fread(psinfo, sizeof(*psinfo), 1, fp) == 0) { + fclose(fp); return false; - if (ferror(fp)) + } + if (ferror(fp)) { + fclose(fp); return false; + } + + fclose(fp); return true; } @@ -2011,7 +2322,7 @@ pid_is_running(pid_t pid) else if (errno == ESRCH) return false; else - fatal("error checking pid %u status", (unsigned)pid); + fatale("error checking pid %u status", pid); } #endif @@ -2047,6 +2358,32 @@ do_pidfile(const char *name) if (f) { enum status_code pid_status; + /* If we are only matching on the pidfile, and it is owned by + * a non-root user, then this is a security risk, and the + * contents cannot be trusted, because the daemon might have + * been compromised. + * + * If the pidfile is world-writable we refuse to parse it. + * + * If we got /dev/null specified as the pidfile, we ignore the + * checks, as this is being used to run processes no matter + * what. */ + if (strcmp(name, "/dev/null") != 0) { + struct stat st; + int fd = fileno(f); + + if (fstat(fd, &st) < 0) + fatale("cannot stat pidfile %s", name); + + if (match_mode == MATCH_PIDFILE && + ((st.st_uid != getuid() && st.st_uid != 0) || + (st.st_gid != getgid() && st.st_gid != 0))) + fatal("matching only on non-root pidfile %s is insecure", name); + if (st.st_mode & 0002) + fatal("matching on world-writable pidfile %s is insecure", name); + + } + if (fscanf(f, "%d", &pid) == 1) pid_status = pid_check(pid); else @@ -2060,7 +2397,7 @@ do_pidfile(const char *name) } else if (errno == ENOENT) return STATUS_DEAD; else - fatal("unable to open pidfile %s", name); + fatale("unable to open pidfile %s", name); } #if defined(OS_Linux) || defined(OS_sunos) || defined(OS_AIX) @@ -2075,7 +2412,7 @@ do_procinit(void) procdir = opendir("/proc"); if (!procdir) - fatal("unable to opendir /proc"); + fatale("unable to opendir /proc"); foundany = 0; while ((entry = readdir(procdir)) != NULL) { @@ -2090,7 +2427,7 @@ do_procinit(void) prog_status = pid_status; } closedir(procdir); - if (!foundany) + if (foundany == 0) fatal("nothing in /proc - not mounted?"); return prog_status; @@ -2271,8 +2608,7 @@ do_start(int argc, char **argv) do_findprocs(); if (found) { - if (quietmode <= 0) - printf("%s already running.\n", execname ? execname : "process"); + info("%s already running.\n", execname ? execname : "process"); return exitnodo; } if (testmode && quietmode <= 0) { @@ -2300,8 +2636,7 @@ do_start(int argc, char **argv) } if (testmode) return 0; - if (quietmode < 0) - printf("Starting %s...\n", startas); + debug("Starting %s...\n", startas); *--argv = startas; if (background) /* Ok, we need to detach this process. */ @@ -2312,12 +2647,12 @@ do_start(int argc, char **argv) if (background && close_io) { devnull_fd = open("/dev/null", O_RDWR); if (devnull_fd < 0) - fatal("unable to open '%s'", "/dev/null"); + fatale("unable to open '%s'", "/dev/null"); } if (nicelevel) { errno = 0; if ((nice(nicelevel) == -1) && (errno != 0)) - fatal("unable to alter nice level by %i", nicelevel); + fatale("unable to alter nice level by %i", nicelevel); } if (proc_sched) set_proc_schedule(proc_sched); @@ -2327,19 +2662,19 @@ do_start(int argc, char **argv) umask(umask_value); if (changeroot != NULL) { if (chdir(changeroot) < 0) - fatal("unable to chdir() to %s", changeroot); + fatale("unable to chdir() to %s", changeroot); if (chroot(changeroot) < 0) - fatal("unable to chroot() to %s", changeroot); + fatale("unable to chroot() to %s", changeroot); } if (chdir(changedir) < 0) - fatal("unable to chdir() to %s", changedir); + fatale("unable to chdir() to %s", changedir); rgid = getgid(); ruid = getuid(); if (changegroup != NULL) { if (rgid != (gid_t)runas_gid) if (setgid(runas_gid)) - fatal("unable to set gid to %d", runas_gid); + fatale("unable to set gid to %d", runas_gid); } if (changeuser != NULL) { /* We assume that if our real user and group are the same as @@ -2347,12 +2682,12 @@ do_start(int argc, char **argv) * will be already in place. */ if (rgid != (gid_t)runas_gid || ruid != (uid_t)runas_uid) if (initgroups(changeuser, runas_gid)) - fatal("unable to set initgroups() with gid %d", + fatale("unable to set initgroups() with gid %d", runas_gid); if (ruid != (uid_t)runas_uid) if (setuid(runas_uid)) - fatal("unable to set uid to %s", changeuser); + fatale("unable to set uid to %s", changeuser); } if (background && close_io) { @@ -2367,7 +2702,7 @@ do_start(int argc, char **argv) close(i); } execv(startas, argv); - fatal("unable to start %s", startas); + fatale("unable to start %s", startas); } static void @@ -2387,9 +2722,7 @@ do_stop(int sig_num, int *n_killed, int *n_notkilled) for (p = found; p; p = p->next) { if (testmode) { - if (quietmode <= 0) - printf("Would send signal %d to %d.\n", - sig_num, (int)p->pid); + info("Would send signal %d to %d.\n", sig_num, p->pid); (*n_killed)++; } else if (kill(p->pid, sig_num) == 0) { pid_list_push(&killed, p->pid); @@ -2431,7 +2764,7 @@ set_what_stop(const char *format, ...) va_end(arglist); if (rc < 0) - fatal("cannot allocate formatted string"); + fatale("cannot allocate formatted string"); } /* @@ -2496,7 +2829,7 @@ do_stop_timeout(int timeout, int *n_killed, int *n_notkilled) rc = pselect(0, NULL, NULL, NULL, &interval, NULL); if (rc < 0 && errno != EINTR) - fatal("select() failed for pause"); + fatale("select() failed for pause"); } } @@ -2509,8 +2842,7 @@ finish_stop_schedule(bool anykilled) if (anykilled) return 0; - if (quietmode <= 0) - printf("No %s found running; none killed.\n", what_stop); + info("No %s found running; none killed.\n", what_stop); return exitnodo; } @@ -2523,8 +2855,7 @@ run_stop_schedule(void) if (testmode) { if (schedule != NULL) { - if (quietmode <= 0) - printf("Ignoring --retry in test mode\n"); + info("Ignoring --retry in test mode\n"); schedule = NULL; } } @@ -2542,7 +2873,7 @@ run_stop_schedule(void) else if (userspec) set_what_stop("process(es) owned by '%s'", userspec); else - fatal("internal error, no match option, please report"); + BUG("no match option, please report"); anykilled = false; retry_nr = 0; @@ -2550,8 +2881,8 @@ run_stop_schedule(void) if (schedule == NULL) { do_stop(signal_nr, &n_killed, &n_notkilled); do_stop_summary(0); - if (n_notkilled > 0 && quietmode <= 0) - printf("%d pids were not killed\n", n_notkilled); + if (n_notkilled > 0) + info("%d pids were not killed\n", n_notkilled); if (n_killed) anykilled = true; return finish_stop_schedule(anykilled); @@ -2580,13 +2911,13 @@ run_stop_schedule(void) else continue; default: - assert(!"schedule[].type value must be valid"); + BUG("schedule[%d].type value %d is not valid", + position, schedule[position].type); } } - if (quietmode <= 0) - printf("Program %s, %d process(es), refused to die.\n", - what_stop, n_killed); + info("Program %s, %d process(es), refused to die.\n", + what_stop, n_killed); return 2; } diff --git a/utils/t/update_alternatives.t b/utils/t/update_alternatives.t index 491fee07d..c80edbad5 100644 --- a/utils/t/update_alternatives.t +++ b/utils/t/update_alternatives.t @@ -21,6 +21,7 @@ use Test::More; use File::Spec; use Dpkg::IPC; +use Dpkg::File qw(file_slurp); use Dpkg::Path qw(find_command); my $srcdir = $ENV{srcdir} || '.'; @@ -93,7 +94,7 @@ my @choices = ( ); my $nb_slaves = 4; plan tests => (4 * ($nb_slaves + 1) + 2) * 26 # number of check_choices - + 106; # rest + + 110; # rest sub cleanup { system("rm -rf $tmpdir && mkdir -p $admindir && mkdir -p $altdir"); @@ -260,11 +261,7 @@ check_choice(0, 'auto', 'initial install 3'); # verify that the administrative file is sorted properly { - local $/ = undef; - open(my $db_fh, '<', "$admindir/generic-test") or die $!; - my $content = <$db_fh>; - close($db_fh); - + my $content = file_slurp("$admindir/generic-test"); my $expected = "auto $bindir/generic-test @@ -518,3 +515,54 @@ ok(-f "$bindir/slave2", 'install + switching keeps real files installed as slave set_choice(1, params => ['--force']); ok(!-e "$bindir/slave2", 'forced switching w/o slave drops real files installed as slave links'); check_choice(1, 'manual', 'set --force replaces files with links'); + +# check disappearence of obsolete slaves (#916799) +cleanup(); +call_ua([ + '--install', "$bindir/test-obsolete", 'test-obsolete', "$paths{date}", '10', + '--slave', "$bindir/test-slave-a", 'test-slave-a', "$bindir/impl-slave-a", + '--slave', "$bindir/test-slave-b", 'test-slave-b', "$bindir/impl-slave-b", + '--slave', "$bindir/test-slave-c", 'test-slave-c', "$bindir/impl-slave-c", +], to_file => '/dev/null', error_to_file => '/dev/null'); + +my $content; +my $expected; + +$content = file_slurp("$admindir/test-obsolete"); +$expected = +"auto +$bindir/test-obsolete +test-slave-a +$bindir/test-slave-a +test-slave-b +$bindir/test-slave-b +test-slave-c +$bindir/test-slave-c + +$paths{date} +10 +$bindir/impl-slave-a +$bindir/impl-slave-b +$bindir/impl-slave-c + +"; +is($content, $expected, 'administrative file for non-obsolete slaves is as expected'); + +call_ua([ + '--install', "$bindir/test-obsolete", 'test-obsolete', "$paths{date}", '20', + '--slave', "$bindir/test-slave-c", 'test-slave-c', "$bindir/impl-slave-c", +], to_file => '/dev/null', error_to_file => '/dev/null'); + +$content = file_slurp("$admindir/test-obsolete"); +$expected = +"auto +$bindir/test-obsolete +test-slave-c +$bindir/test-slave-c + +$paths{date} +20 +$bindir/impl-slave-c + +"; +is($content, $expected, 'administrative file for obsolete slaves is as expected'); diff --git a/utils/update-alternatives.c b/utils/update-alternatives.c index 9a9d10c62..a9180705b 100644 --- a/utils/update-alternatives.c +++ b/utils/update-alternatives.c @@ -3,7 +3,7 @@ * * Copyright © 1995 Ian Jackson <ijackson@chiark.greenend.org.uk> * Copyright © 2000-2002 Wichert Akkerman <wakkerma@debian.org> - * Copyright © 2006-2015 Guillem Jover <guillem@debian.org> + * Copyright © 2006-2017 Guillem Jover <guillem@debian.org> * Copyright © 2008 Pierre Habouzit <madcoder@debian.org> * Copyright © 2009-2010 Raphaël Hertzog <hertzog@debian.org> * @@ -55,12 +55,54 @@ static const char *admdir; static const char *prog_path = "update-alternatives"; +enum action { + ACTION_NONE, + ACTION_INSTALL, + ACTION_SET, + ACTION_SET_SELECTIONS, + ACTION_GET_SELECTIONS, + ACTION_AUTO, + ACTION_CONFIG, + ACTION_CONFIG_ALL, + ACTION_REMOVE, + ACTION_REMOVE_ALL, + ACTION_LIST, + ACTION_QUERY, + ACTION_DISPLAY, +}; + +static struct action_name { + enum action action; + const char *name; +} action_names[] = { + { ACTION_NONE, "" }, + { ACTION_INSTALL, "install" }, + { ACTION_SET, "set" }, + { ACTION_SET_SELECTIONS, "set-selections" }, + { ACTION_GET_SELECTIONS, "get-selections" }, + { ACTION_AUTO, "auto" }, + { ACTION_CONFIG, "config" }, + { ACTION_CONFIG_ALL, "all" }, + { ACTION_REMOVE, "remove" }, + { ACTION_REMOVE_ALL, "remove-all" }, + { ACTION_LIST, "list" }, + { ACTION_QUERY, "query" }, + { ACTION_DISPLAY, "display" }, +}; + +enum output_mode { + OUTPUT_QUIET = -1, + OUTPUT_NORMAL = 0, + OUTPUT_VERBOSE = 1, + OUTPUT_DEBUG = 2, +}; + /* Action to perform */ -static const char *action = NULL; +static enum action action = ACTION_NONE; static const char *log_file = LOGDIR "/alternatives.log"; /* Skip alternatives properly configured in auto mode (for --config) */ static int opt_skip_auto = 0; -static int opt_verbose = 0; +static int opt_verbose = OUTPUT_NORMAL; static int opt_force = 0; /* @@ -123,8 +165,9 @@ usage(void) " --force allow replacing files with alternative links.\n" " --skip-auto skip prompt for alternatives correctly configured\n" " in automatic mode (relevant for --config only)\n" -" --verbose verbose operation, more output.\n" " --quiet quiet operation, minimal output.\n" +" --verbose verbose operation, more output.\n" +" --debug debug output, way more output.\n" " --help show this help message.\n" " --version show the version.\n" )); @@ -177,7 +220,7 @@ warning(char const *fmt, ...) { va_list args; - if (opt_verbose < 0) + if (opt_verbose < OUTPUT_NORMAL) return; fprintf(stderr, "%s: %s: ", PROGNAME, _("warning")); @@ -190,15 +233,16 @@ warning(char const *fmt, ...) static void DPKG_ATTR_PRINTF(1) debug(char const *fmt, ...) { -#if 0 va_list args; + if (opt_verbose < OUTPUT_DEBUG) + return; + fprintf(stderr, "DEBUG: "); va_start(args, fmt); vfprintf(stderr, fmt, args); va_end(args); fprintf(stderr, "\n"); -#endif } static void DPKG_ATTR_PRINTF(1) @@ -206,7 +250,7 @@ verbose(char const *fmt, ...) { va_list args; - if (opt_verbose < 1) + if (opt_verbose < OUTPUT_VERBOSE) return; printf("%s: ", PROGNAME); @@ -221,7 +265,7 @@ info(char const *fmt, ...) { va_list args; - if (opt_verbose < 0) + if (opt_verbose < OUTPUT_NORMAL) return; printf("%s: ", PROGNAME); @@ -354,14 +398,29 @@ pathname_is_missing(const char *pathname) } static void -set_action(const char *new_action) +set_action(enum action new_action) { if (action) badusage(_("two commands specified: --%s and --%s"), - action, new_action); + action_names[action].name, action_names[new_action].name); action = new_action; } +static void +set_action_from_name(const char *new_action) +{ + size_t i; + + for (i = 0; i < array_count(action_names); i++) { + if (strcmp(new_action, action_names[i].name) == 0) { + set_action(action_names[i].action); + return; + } + } + + assert(!"unknown action name"); +} + static const char * admindir_init(void) { @@ -1314,7 +1373,8 @@ alternative_save(struct alternative *a) /* Cleanup unused slaves before writing admin file. */ sl_prev = NULL; - for (sl = a->slaves; sl; sl_prev = sl, sl = sl->next) { + sl = a->slaves; + while (sl) { bool has_slave = false; for (fs = a->choices; fs; fs = fs->next) { @@ -1334,10 +1394,11 @@ alternative_save(struct alternative *a) else a->slaves = sl->next; sl_rm = sl; - sl = sl_prev ? sl_prev : a->slaves; + sl = sl->next; slave_link_free(sl_rm); - if (!sl) - break; /* No other slave left. */ + } else { + sl_prev = sl; + sl = sl->next; } } @@ -2579,15 +2640,17 @@ main(int argc, char **argv) } else if (strcmp("--version", argv[i]) == 0) { version(); exit(0); - } else if (strcmp("--verbose", argv[i]) == 0) { - opt_verbose++; } else if (strcmp("--quiet", argv[i]) == 0) { - opt_verbose--; + opt_verbose = OUTPUT_QUIET; + } else if (strcmp("--verbose", argv[i]) == 0) { + opt_verbose = OUTPUT_VERBOSE; + } else if (strcmp("--debug", argv[i]) == 0) { + opt_verbose = OUTPUT_DEBUG; } else if (strcmp("--install", argv[i]) == 0) { char *prio_str, *prio_end; long prio; - set_action("install"); + set_action(ACTION_INSTALL); if (MISSING_ARGS(4)) badusage(_("--install needs <link> <name> " "<path> <priority>")); @@ -2612,7 +2675,7 @@ main(int argc, char **argv) i += 4; } else if (strcmp("--remove", argv[i]) == 0 || strcmp("--set", argv[i]) == 0) { - set_action(argv[i] + 2); + set_action_from_name(argv[i] + 2); if (MISSING_ARGS(2)) badusage(_("--%s needs <name> <path>"), argv[i] + 2); @@ -2629,7 +2692,7 @@ main(int argc, char **argv) strcmp("--config", argv[i]) == 0 || strcmp("--list", argv[i]) == 0 || strcmp("--remove-all", argv[i]) == 0) { - set_action(argv[i] + 2); + set_action_from_name(argv[i] + 2); if (MISSING_ARGS(1)) badusage(_("--%s needs <name>"), argv[i] + 2); a = alternative_new(argv[i + 1]); @@ -2640,13 +2703,12 @@ main(int argc, char **argv) } else if (strcmp("--all", argv[i]) == 0 || strcmp("--get-selections", argv[i]) == 0 || strcmp("--set-selections", argv[i]) == 0) { - set_action(argv[i] + 2); + set_action_from_name(argv[i] + 2); } else if (strcmp("--slave", argv[i]) == 0) { const char *slink, *sname, *spath; struct slave_link *sl; - if (action == NULL || - (action && strcmp(action, "install") != 0)) + if (action == ACTION_NONE || action != ACTION_INSTALL) badusage(_("--slave only allowed with --install")); if (MISSING_ARGS(3)) badusage(_("--slave needs <link> <name> <path>")); @@ -2703,40 +2765,40 @@ main(int argc, char **argv) } } - if (!action) + if (action == ACTION_NONE) badusage(_("need --display, --query, --list, --get-selections, " "--config, --set, --set-selections, --install, " "--remove, --all, --remove-all or --auto")); /* The following actions might modify the current alternative. */ - if (strcmp(action, "set") == 0 || - strcmp(action, "auto") == 0 || - strcmp(action, "config") == 0 || - strcmp(action, "remove") == 0 || - strcmp(action, "remove-all") == 0 || - strcmp(action, "install") == 0) + if (action == ACTION_SET || + action == ACTION_AUTO || + action == ACTION_CONFIG || + action == ACTION_REMOVE || + action == ACTION_REMOVE_ALL || + action == ACTION_INSTALL) modifies_alt = true; /* The following actions might modify the system somehow. */ if (modifies_alt || - strcmp(action, "all") == 0 || - strcmp(action, "set-selections") == 0) + action == ACTION_CONFIG_ALL || + action == ACTION_SET_SELECTIONS) modifies_sys = true; - if (strcmp(action, "install") == 0) + if (action == ACTION_INSTALL) alternative_check_install_args(inst_alt, fileset); - if (strcmp(action, "display") == 0 || - strcmp(action, "query") == 0 || - strcmp(action, "list") == 0 || - strcmp(action, "set") == 0 || - strcmp(action, "auto") == 0 || - strcmp(action, "config") == 0 || - strcmp(action, "remove-all") == 0) { + if (action == ACTION_DISPLAY || + action == ACTION_QUERY || + action == ACTION_LIST || + action == ACTION_SET || + action == ACTION_AUTO || + action == ACTION_CONFIG || + action == ACTION_REMOVE_ALL) { /* Load the alternative info, stop on failure. */ if (!alternative_load(a, ALTDB_WARN_PARSER)) error(_("no alternatives for %s"), a->master_name); - } else if (strcmp(action, "remove") == 0) { + } else if (action == ACTION_REMOVE) { /* FIXME: Be consistent for now with the case when we * try to remove a non-existing path from an existing * link group file. */ @@ -2744,7 +2806,7 @@ main(int argc, char **argv) verbose(_("no alternatives for %s"), a->master_name); exit(0); } - } else if (strcmp(action, "install") == 0) { + } else if (action == ACTION_INSTALL) { /* Load the alternative info, ignore failures. */ alternative_load(a, ALTDB_WARN_PARSER); } @@ -2758,29 +2820,29 @@ main(int argc, char **argv) } /* Handle actions. */ - if (strcmp(action, "all") == 0) { + if (action == ACTION_CONFIG_ALL) { alternative_config_all(); - } else if (strcmp(action, "get-selections") == 0) { + } else if (action == ACTION_GET_SELECTIONS) { alternative_get_selections(); - } else if (strcmp(action, "set-selections") == 0) { + } else if (action == ACTION_SET_SELECTIONS) { alternative_set_selections(stdin, _("<standard input>")); - } else if (strcmp(action, "display") == 0) { + } else if (action == ACTION_DISPLAY) { alternative_display_user(a); - } else if (strcmp(action, "query") == 0) { + } else if (action == ACTION_QUERY) { alternative_display_query(a); - } else if (strcmp(action, "list") == 0) { + } else if (action == ACTION_LIST) { alternative_display_list(a); - } else if (strcmp(action, "set") == 0) { + } else if (action == ACTION_SET) { new_choice = alternative_set_manual(a, path); - } else if (strcmp(action, "auto") == 0) { + } else if (action == ACTION_AUTO) { new_choice = alternative_set_auto(a); - } else if (strcmp(action, "config") == 0) { + } else if (action == ACTION_CONFIG) { new_choice = alternative_config(a, current_choice); - } else if (strcmp(action, "remove") == 0) { + } else if (action == ACTION_REMOVE) { new_choice = alternative_remove(a, current_choice, path); - } else if (strcmp(action, "remove-all") == 0) { + } else if (action == ACTION_REMOVE_ALL) { alternative_choices_free(a); - } else if (strcmp(action, "install") == 0) { + } else if (action == ACTION_INSTALL) { if (a->master_link) { /* Alternative already exists, check if anything got * updated. */ |