1 /* 2 * uuidd.c --- UUID-generation daemon 3 * 4 * Copyright (C) 2007 Theodore Ts'o 5 * 6 * %Begin-Header% 7 * This file may be redistributed under the terms of the GNU Public 8 * License. 9 * %End-Header% 10 */ 11 12 #define _GNU_SOURCE /* for setres[ug]id() */ 13 14 #include "config.h" 15 #include <stdio.h> 16 #ifdef HAVE_STDLIB_H 17 #include <stdlib.h> 18 #endif 19 #include <unistd.h> 20 #include <inttypes.h> 21 #include <errno.h> 22 #include <sys/types.h> 23 #include <sys/stat.h> 24 #include <sys/socket.h> 25 #include <sys/un.h> 26 #include <fcntl.h> 27 #include <signal.h> 28 #include <string.h> 29 #ifdef HAVE_GETOPT_H 30 #include <getopt.h> 31 #else 32 extern int getopt(int argc, char * const argv[], const char *optstring); 33 extern char *optarg; 34 extern int optind; 35 #endif 36 #include "uuid/uuid.h" 37 #include "uuid/uuidd.h" 38 #include "support/nls-enable.h" 39 #include "ext2fs/ext2fs.h" 40 41 #ifdef __GNUC__ 42 #define CODE_ATTR(x) __attribute__(x) 43 #else 44 #define CODE_ATTR(x) 45 #endif 46 47 static void usage(const char *progname) 48 { 49 fprintf(stderr, _("Usage: %s [-d] [-p pidfile] [-s socketpath] " 50 "[-T timeout]\n"), progname); 51 fprintf(stderr, _(" %s [-r|t] [-n num] [-s socketpath]\n"), 52 progname); 53 fprintf(stderr, _(" %s -k\n"), progname); 54 exit(1); 55 } 56 57 static void die(const char *msg) 58 { 59 perror(msg); 60 exit(1); 61 } 62 63 static void create_daemon(void) 64 { 65 pid_t pid; 66 uid_t euid; 67 68 pid = fork(); 69 if (pid == -1) { 70 perror("fork"); 71 exit(1); 72 } else if (pid != 0) { 73 exit(0); 74 } 75 76 close(0); 77 close(1); 78 close(2); 79 open("/dev/null", O_RDWR); 80 open("/dev/null", O_RDWR); 81 open("/dev/null", O_RDWR); 82 83 if (chdir("/")) {} /* Silence warn_unused_result warning */ 84 (void) setsid(); 85 euid = geteuid(); 86 if (setreuid(euid, euid) < 0) 87 die("setreuid"); 88 } 89 90 static ssize_t read_all(int fd, char *buf, size_t count) 91 { 92 ssize_t ret; 93 ssize_t c = 0; 94 int tries = 0; 95 96 memset(buf, 0, count); 97 while (count > 0) { 98 ret = read(fd, buf, count); 99 if (ret <= 0) { 100 if ((errno == EAGAIN || errno == EINTR || ret == 0) && 101 (tries++ < 5)) 102 continue; 103 return c ? c : -1; 104 } 105 if (ret > 0) 106 tries = 0; 107 count -= ret; 108 buf += ret; 109 c += ret; 110 } 111 return c; 112 } 113 114 static int write_all(int fd, char *buf, size_t count) 115 { 116 ssize_t ret; 117 int c = 0; 118 119 while (count > 0) { 120 ret = write(fd, buf, count); 121 if (ret < 0) { 122 if ((errno == EAGAIN) || (errno == EINTR)) 123 continue; 124 return -1; 125 } 126 count -= ret; 127 buf += ret; 128 c += ret; 129 } 130 return c; 131 } 132 133 static const char *cleanup_pidfile, *cleanup_socket; 134 135 static void terminate_intr(int signo CODE_ATTR((unused))) 136 { 137 (void) unlink(cleanup_pidfile); 138 if (cleanup_socket) 139 (void) unlink(cleanup_socket); 140 exit(0); 141 } 142 143 static int call_daemon(const char *socket_path, int op, char *buf, 144 int buflen, int *num, const char **err_context) 145 { 146 char op_buf[8]; 147 int op_len; 148 int s; 149 ssize_t ret; 150 int32_t reply_len = 0; 151 struct sockaddr_un srv_addr; 152 153 if (((op == 4) || (op == 5)) && !num) { 154 if (err_context) 155 *err_context = _("bad arguments"); 156 errno = EINVAL; 157 return -1; 158 } 159 160 if ((s = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) { 161 if (err_context) 162 *err_context = _("socket"); 163 return -1; 164 } 165 166 srv_addr.sun_family = AF_UNIX; 167 strncpy(srv_addr.sun_path, socket_path, sizeof(srv_addr.sun_path)); 168 srv_addr.sun_path[sizeof(srv_addr.sun_path)-1] = '\0'; 169 170 if (connect(s, (const struct sockaddr *) &srv_addr, 171 sizeof(struct sockaddr_un)) < 0) { 172 if (err_context) 173 *err_context = _("connect"); 174 close(s); 175 return -1; 176 } 177 178 if (op == 5) { 179 if ((*num)*16 > buflen-4) 180 *num = (buflen-4) / 16; 181 } 182 op_buf[0] = op; 183 op_len = 1; 184 if ((op == 4) || (op == 5)) { 185 memcpy(op_buf+1, num, sizeof(int)); 186 op_len += sizeof(int); 187 } 188 189 ret = write_all(s, op_buf, op_len); 190 if (ret < op_len) { 191 if (err_context) 192 *err_context = _("write"); 193 close(s); 194 return -1; 195 } 196 197 ret = read_all(s, (char *) &reply_len, sizeof(reply_len)); 198 if (ret < 0) { 199 if (err_context) 200 *err_context = _("read count"); 201 close(s); 202 return -1; 203 } 204 if (reply_len < 0 || reply_len > buflen) { 205 if (err_context) 206 *err_context = _("bad response length"); 207 close(s); 208 return -1; 209 } 210 ret = read_all(s, (char *) buf, reply_len); 211 212 if ((ret > 0) && (op == 4)) { 213 if (reply_len >= (int) (16+sizeof(int))) 214 memcpy(buf+16, num, sizeof(int)); 215 else 216 *num = -1; 217 } 218 if ((ret > 0) && (op == 5)) { 219 if (*num >= (int) sizeof(int)) 220 memcpy(buf, num, sizeof(int)); 221 else 222 *num = -1; 223 } 224 225 close(s); 226 227 return ret; 228 } 229 230 static void server_loop(const char *socket_path, const char *pidfile_path, 231 int debug, int timeout, int quiet) 232 { 233 struct sockaddr_un my_addr, from_addr; 234 struct flock fl; 235 socklen_t fromlen; 236 int32_t reply_len = 0; 237 uuid_t uu; 238 mode_t save_umask; 239 char reply_buf[1024], *cp; 240 char op, str[UUID_STR_SIZE]; 241 int i, s, ns, len, num; 242 int fd_pidfile, ret; 243 244 fd_pidfile = open(pidfile_path, O_CREAT | O_RDWR, 0664); 245 if (fd_pidfile < 0) { 246 if (!quiet) 247 fprintf(stderr, "Failed to open/create %s: %s\n", 248 pidfile_path, strerror(errno)); 249 exit(1); 250 } 251 cleanup_pidfile = pidfile_path; 252 cleanup_socket = 0; 253 signal(SIGALRM, terminate_intr); 254 alarm(30); 255 fl.l_type = F_WRLCK; 256 fl.l_whence = SEEK_SET; 257 fl.l_start = 0; 258 fl.l_len = 0; 259 fl.l_pid = 0; 260 while (fcntl(fd_pidfile, F_SETLKW, &fl) < 0) { 261 if ((errno == EAGAIN) || (errno == EINTR)) 262 continue; 263 if (!quiet) 264 fprintf(stderr, "Failed to lock %s: %s\n", 265 pidfile_path, strerror(errno)); 266 exit(1); 267 } 268 ret = call_daemon(socket_path, 0, reply_buf, sizeof(reply_buf), 0, 0); 269 if (ret > 0) { 270 if (!quiet) 271 printf(_("uuidd daemon already running at pid %s\n"), 272 reply_buf); 273 exit(1); 274 } 275 alarm(0); 276 277 if ((s = socket(AF_UNIX, SOCK_STREAM, 0)) < 0) { 278 if (!quiet) 279 fprintf(stderr, _("Couldn't create unix stream " 280 "socket: %s"), strerror(errno)); 281 exit(1); 282 } 283 284 /* 285 * Make sure the socket isn't using fd numbers 0-2 to avoid it 286 * getting closed by create_daemon() 287 */ 288 while (!debug && s <= 2) { 289 s = dup(s); 290 if (s < 0) { 291 perror("dup"); 292 exit(1); 293 } 294 } 295 296 /* 297 * Create the address we will be binding to. 298 */ 299 my_addr.sun_family = AF_UNIX; 300 strncpy(my_addr.sun_path, socket_path, sizeof(my_addr.sun_path)); 301 my_addr.sun_path[sizeof(my_addr.sun_path)-1] = '\0'; 302 (void) unlink(socket_path); 303 save_umask = umask(0); 304 if (bind(s, (const struct sockaddr *) &my_addr, 305 sizeof(struct sockaddr_un)) < 0) { 306 if (!quiet) 307 fprintf(stderr, 308 _("Couldn't bind unix socket %s: %s\n"), 309 socket_path, strerror(errno)); 310 exit(1); 311 } 312 (void) umask(save_umask); 313 314 if (listen(s, 5) < 0) { 315 if (!quiet) 316 fprintf(stderr, _("Couldn't listen on unix " 317 "socket %s: %s\n"), socket_path, 318 strerror(errno)); 319 exit(1); 320 } 321 322 cleanup_socket = socket_path; 323 if (!debug) 324 create_daemon(); 325 signal(SIGHUP, terminate_intr); 326 signal(SIGINT, terminate_intr); 327 signal(SIGTERM, terminate_intr); 328 signal(SIGALRM, terminate_intr); 329 signal(SIGPIPE, SIG_IGN); 330 331 sprintf(reply_buf, "%8d\n", getpid()); 332 if (ftruncate(fd_pidfile, 0)) {} /* Silence warn_unused_result */ 333 write_all(fd_pidfile, reply_buf, strlen(reply_buf)); 334 if (fd_pidfile > 1) 335 close(fd_pidfile); /* Unlock the pid file */ 336 337 while (1) { 338 fromlen = sizeof(from_addr); 339 if (timeout > 0) 340 alarm(timeout); 341 ns = accept(s, (struct sockaddr *) &from_addr, &fromlen); 342 alarm(0); 343 if (ns < 0) { 344 if ((errno == EAGAIN) || (errno == EINTR)) 345 continue; 346 perror("accept"); 347 exit(1); 348 } 349 len = read(ns, &op, 1); 350 if (len != 1) { 351 if (len < 0) 352 perror("read"); 353 else 354 printf(_("Error reading from client, " 355 "len = %d\n"), len); 356 goto shutdown_socket; 357 } 358 if ((op == 4) || (op == 5)) { 359 if (read_all(ns, (char *) &num, sizeof(num)) != 4) 360 goto shutdown_socket; 361 if (debug) 362 printf(_("operation %d, incoming num = %d\n"), 363 op, num); 364 } else if (debug) 365 printf("operation %d\n", op); 366 367 switch(op) { 368 case UUIDD_OP_GETPID: 369 sprintf(reply_buf, "%d", getpid()); 370 reply_len = strlen(reply_buf)+1; 371 break; 372 case UUIDD_OP_GET_MAXOP: 373 sprintf(reply_buf, "%d", UUIDD_MAX_OP); 374 reply_len = strlen(reply_buf)+1; 375 break; 376 case UUIDD_OP_TIME_UUID: 377 num = 1; 378 uuid__generate_time(uu, &num); 379 if (debug) { 380 uuid_unparse(uu, str); 381 printf(_("Generated time UUID: %s\n"), str); 382 } 383 memcpy(reply_buf, uu, sizeof(uu)); 384 reply_len = sizeof(uu); 385 break; 386 case UUIDD_OP_RANDOM_UUID: 387 num = 1; 388 uuid__generate_random(uu, &num); 389 if (debug) { 390 uuid_unparse(uu, str); 391 printf(_("Generated random UUID: %s\n"), str); 392 } 393 memcpy(reply_buf, uu, sizeof(uu)); 394 reply_len = sizeof(uu); 395 break; 396 case UUIDD_OP_BULK_TIME_UUID: 397 uuid__generate_time(uu, &num); 398 if (debug) { 399 uuid_unparse(uu, str); 400 printf(P_("Generated time UUID %s and " 401 "subsequent UUID\n", 402 "Generated time UUID %s and %d " 403 "subsequent UUIDs\n", num), 404 str, num); 405 } 406 memcpy(reply_buf, uu, sizeof(uu)); 407 reply_len = sizeof(uu); 408 memcpy(reply_buf+reply_len, &num, sizeof(num)); 409 reply_len += sizeof(num); 410 break; 411 case UUIDD_OP_BULK_RANDOM_UUID: 412 if (num < 0) 413 num = 1; 414 if (num > 1000) 415 num = 1000; 416 if (num*16 > (int) (sizeof(reply_buf)-sizeof(num))) 417 num = (sizeof(reply_buf)-sizeof(num)) / 16; 418 uuid__generate_random((unsigned char *) reply_buf + 419 sizeof(num), &num); 420 if (debug) { 421 printf(_("Generated %d UUID's:\n"), num); 422 for (i=0, cp=reply_buf+sizeof(num); 423 i < num; i++, cp+=16) { 424 uuid_unparse((unsigned char *)cp, str); 425 printf("\t%s\n", str); 426 } 427 } 428 reply_len = (num*16) + sizeof(num); 429 memcpy(reply_buf, &num, sizeof(num)); 430 break; 431 default: 432 if (debug) 433 printf(_("Invalid operation %d\n"), op); 434 goto shutdown_socket; 435 } 436 write_all(ns, (char *) &reply_len, sizeof(reply_len)); 437 write_all(ns, reply_buf, reply_len); 438 shutdown_socket: 439 close(ns); 440 } 441 } 442 443 int main(int argc, char **argv) 444 { 445 const char *socket_path = UUIDD_SOCKET_PATH; 446 const char *pidfile_path = UUIDD_PIDFILE_PATH; 447 const char *err_context; 448 char buf[1024], *cp; 449 char str[37], *tmp; 450 uuid_t uu; 451 uid_t uid; 452 gid_t gid; 453 int i, c, ret; 454 int debug = 0, do_type = 0, do_kill = 0, num = 0; 455 int timeout = 0, quiet = 0, drop_privs = 0; 456 457 #ifdef ENABLE_NLS 458 setlocale(LC_MESSAGES, ""); 459 setlocale(LC_CTYPE, ""); 460 bindtextdomain(NLS_CAT_NAME, LOCALEDIR); 461 textdomain(NLS_CAT_NAME); 462 #endif 463 464 while ((c = getopt (argc, argv, "dkn:qp:s:tT:r")) != EOF) { 465 switch (c) { 466 case 'd': 467 debug++; 468 drop_privs = 1; 469 break; 470 case 'k': 471 do_kill++; 472 drop_privs = 1; 473 break; 474 case 'n': 475 num = strtol(optarg, &tmp, 0); 476 if ((num < 0) || *tmp) { 477 fprintf(stderr, _("Bad number: %s\n"), optarg); 478 exit(1); 479 } 480 break; 481 case 'p': 482 pidfile_path = optarg; 483 drop_privs = 1; 484 break; 485 case 'q': 486 quiet++; 487 break; 488 case 's': 489 socket_path = optarg; 490 drop_privs = 1; 491 break; 492 case 't': 493 do_type = UUIDD_OP_TIME_UUID; 494 drop_privs = 1; 495 break; 496 case 'T': 497 timeout = strtol(optarg, &tmp, 0); 498 if ((timeout < 0) || *tmp) { 499 fprintf(stderr, _("Bad number: %s\n"), optarg); 500 exit(1); 501 } 502 break; 503 case 'r': 504 do_type = UUIDD_OP_RANDOM_UUID; 505 drop_privs = 1; 506 break; 507 default: 508 usage(argv[0]); 509 } 510 } 511 uid = getuid(); 512 if (uid && drop_privs) { 513 gid = getgid(); 514 #ifdef HAVE_SETRESGID 515 if (setresgid(gid, gid, gid) < 0) 516 die("setresgid"); 517 #else 518 if (setregid(gid, gid) < 0) 519 die("setregid"); 520 #endif 521 522 #ifdef HAVE_SETRESUID 523 if (setresuid(uid, uid, uid) < 0) 524 die("setresuid"); 525 #else 526 if (setreuid(uid, uid) < 0) 527 die("setreuid"); 528 #endif 529 } 530 if (num && do_type) { 531 ret = call_daemon(socket_path, do_type+2, buf, 532 sizeof(buf), &num, &err_context); 533 if (ret < 0) { 534 printf(_("Error calling uuidd daemon (%s): %s\n"), 535 err_context, strerror(errno)); 536 exit(1); 537 } 538 if (do_type == UUIDD_OP_TIME_UUID) { 539 if (ret != sizeof(uu) + sizeof(num)) 540 goto unexpected_size; 541 542 uuid_unparse((unsigned char *) buf, str); 543 544 printf(P_("%s and subsequent UUID\n", 545 "%s and subsequent %d UUIDs\n", num), 546 str, num); 547 } else { 548 printf("%s", _("List of UUID's:\n")); 549 cp = buf + 4; 550 if (ret != (int) (sizeof(num) + num*sizeof(uu))) 551 goto unexpected_size; 552 for (i=0; i < num; i++, cp+=16) { 553 uuid_unparse((unsigned char *) cp, str); 554 printf("\t%s\n", str); 555 } 556 } 557 exit(0); 558 } 559 if (do_type) { 560 ret = call_daemon(socket_path, do_type, (char *) &uu, 561 sizeof(uu), 0, &err_context); 562 if (ret < 0) { 563 printf(_("Error calling uuidd daemon (%s): %s\n"), 564 err_context, strerror(errno)); 565 exit(1); 566 } 567 if (ret != sizeof(uu)) { 568 unexpected_size: 569 printf(_("Unexpected reply length from server %d\n"), 570 ret); 571 exit(1); 572 } 573 uuid_unparse(uu, str); 574 575 printf("%s\n", str); 576 exit(0); 577 } 578 579 if (do_kill) { 580 ret = call_daemon(socket_path, 0, buf, sizeof(buf), 0, 0); 581 if ((ret > 0) && ((do_kill = atoi((char *) buf)) > 0)) { 582 ret = kill(do_kill, SIGTERM); 583 if (ret < 0) { 584 if (!quiet) 585 fprintf(stderr, 586 _("Couldn't kill uuidd running " 587 "at pid %d: %s\n"), do_kill, 588 strerror(errno)); 589 exit(1); 590 } 591 if (!quiet) 592 printf(_("Killed uuidd running at pid %d\n"), 593 do_kill); 594 } 595 exit(0); 596 } 597 598 server_loop(socket_path, pidfile_path, debug, timeout, quiet); 599 return 0; 600 } 601