mirror of
https://gitlab.freedesktop.org/wayland/wayland.git
synced 2025-10-31 22:25:25 -04:00
The way we're wrapping libc functions via dlsym() is pretty fragile and breaks on FreeBSD. The failures happen in our CI and are pretty random, see e.g. [1]. Use a more manual way to wrap via a function pointer. [1]: https://gitlab.freedesktop.org/wayland/wayland/-/jobs/44204010 Signed-off-by: Simon Ser <contact@emersion.fr>
258 lines
5.9 KiB
C
258 lines
5.9 KiB
C
/*
|
|
* Copyright © 2012 Collabora, Ltd.
|
|
*
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
* a copy of this software and associated documentation files (the
|
|
* "Software"), to deal in the Software without restriction, including
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
* the following conditions:
|
|
*
|
|
* The above copyright notice and this permission notice (including the
|
|
* next paragraph) shall be included in all copies or substantial
|
|
* portions of the Software.
|
|
*
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
|
|
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
|
|
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
* SOFTWARE.
|
|
*/
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#include "../config.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <sys/epoll.h>
|
|
#include <sys/mman.h>
|
|
#include <sys/un.h>
|
|
#ifdef HAVE_SYS_UCRED_H
|
|
#include <sys/ucred.h>
|
|
#endif
|
|
|
|
#include "wayland-os.h"
|
|
|
|
/* used by tests */
|
|
int (*wl_fcntl)(int fildes, int cmd, ...) = fcntl;
|
|
int (*wl_socket)(int domain, int type, int protocol) = socket;
|
|
ssize_t (*wl_recvmsg)(int socket, struct msghdr *message, int flags) = recvmsg;
|
|
int (*wl_epoll_create1)(int flags) = epoll_create1;
|
|
|
|
static int
|
|
set_cloexec_or_close(int fd)
|
|
{
|
|
long flags;
|
|
|
|
if (fd == -1)
|
|
return -1;
|
|
|
|
flags = wl_fcntl(fd, F_GETFD);
|
|
if (flags == -1)
|
|
goto err;
|
|
|
|
if (wl_fcntl(fd, F_SETFD, flags | FD_CLOEXEC) == -1)
|
|
goto err;
|
|
|
|
return fd;
|
|
|
|
err:
|
|
close(fd);
|
|
return -1;
|
|
}
|
|
|
|
int
|
|
wl_os_socket_cloexec(int domain, int type, int protocol)
|
|
{
|
|
int fd;
|
|
|
|
fd = wl_socket(domain, type | SOCK_CLOEXEC, protocol);
|
|
if (fd >= 0)
|
|
return fd;
|
|
if (errno != EINVAL)
|
|
return -1;
|
|
|
|
fd = wl_socket(domain, type, protocol);
|
|
return set_cloexec_or_close(fd);
|
|
}
|
|
|
|
#if defined(__FreeBSD__)
|
|
int
|
|
wl_os_socket_peercred(int sockfd, uid_t *uid, gid_t *gid, pid_t *pid)
|
|
{
|
|
socklen_t len;
|
|
struct xucred ucred;
|
|
|
|
len = sizeof(ucred);
|
|
if (getsockopt(sockfd, SOL_LOCAL, LOCAL_PEERCRED, &ucred, &len) < 0 ||
|
|
ucred.cr_version != XUCRED_VERSION)
|
|
return -1;
|
|
*uid = ucred.cr_uid;
|
|
*gid = ucred.cr_gid;
|
|
#if HAVE_XUCRED_CR_PID
|
|
/* Since https://cgit.freebsd.org/src/commit/?id=c5afec6e895a */
|
|
*pid = ucred.cr_pid;
|
|
#else
|
|
*pid = 0;
|
|
#endif
|
|
return 0;
|
|
}
|
|
#elif defined(SO_PEERCRED)
|
|
int
|
|
wl_os_socket_peercred(int sockfd, uid_t *uid, gid_t *gid, pid_t *pid)
|
|
{
|
|
socklen_t len;
|
|
struct ucred ucred;
|
|
|
|
len = sizeof(ucred);
|
|
if (getsockopt(sockfd, SOL_SOCKET, SO_PEERCRED, &ucred, &len) < 0)
|
|
return -1;
|
|
*uid = ucred.uid;
|
|
*gid = ucred.gid;
|
|
*pid = ucred.pid;
|
|
return 0;
|
|
}
|
|
#else
|
|
#error "Don't know how to read ucred on this platform"
|
|
#endif
|
|
|
|
int
|
|
wl_os_dupfd_cloexec(int fd, int minfd)
|
|
{
|
|
int newfd;
|
|
|
|
newfd = wl_fcntl(fd, F_DUPFD_CLOEXEC, minfd);
|
|
if (newfd >= 0)
|
|
return newfd;
|
|
if (errno != EINVAL)
|
|
return -1;
|
|
|
|
newfd = wl_fcntl(fd, F_DUPFD, minfd);
|
|
return set_cloexec_or_close(newfd);
|
|
}
|
|
|
|
static ssize_t
|
|
recvmsg_cloexec_fallback(int sockfd, struct msghdr *msg, int flags)
|
|
{
|
|
ssize_t len;
|
|
struct cmsghdr *cmsg;
|
|
unsigned char *data;
|
|
int *fd;
|
|
int *end;
|
|
|
|
len = wl_recvmsg(sockfd, msg, flags);
|
|
if (len == -1)
|
|
return -1;
|
|
|
|
if (!msg->msg_control || msg->msg_controllen == 0)
|
|
return len;
|
|
|
|
cmsg = CMSG_FIRSTHDR(msg);
|
|
for (; cmsg != NULL; cmsg = CMSG_NXTHDR(msg, cmsg)) {
|
|
if (cmsg->cmsg_level != SOL_SOCKET ||
|
|
cmsg->cmsg_type != SCM_RIGHTS)
|
|
continue;
|
|
|
|
data = CMSG_DATA(cmsg);
|
|
end = (int *)(data + cmsg->cmsg_len - CMSG_LEN(0));
|
|
for (fd = (int *)data; fd < end; ++fd)
|
|
*fd = set_cloexec_or_close(*fd);
|
|
}
|
|
|
|
return len;
|
|
}
|
|
|
|
ssize_t
|
|
wl_os_recvmsg_cloexec(int sockfd, struct msghdr *msg, int flags)
|
|
{
|
|
#if HAVE_BROKEN_MSG_CMSG_CLOEXEC
|
|
/*
|
|
* FreeBSD had a broken implementation of MSG_CMSG_CLOEXEC between 2015
|
|
* and 2021, so we have to use the non-MSG_CMSG_CLOEXEC fallback
|
|
* directly when compiling against a version that does not include the
|
|
* fix (https://cgit.freebsd.org/src/commit/?id=6ceacebdf52211).
|
|
*/
|
|
#pragma message("Using fallback directly since MSG_CMSG_CLOEXEC is broken.")
|
|
#else
|
|
ssize_t len;
|
|
|
|
len = wl_recvmsg(sockfd, msg, flags | MSG_CMSG_CLOEXEC);
|
|
if (len >= 0)
|
|
return len;
|
|
if (errno != EINVAL)
|
|
return -1;
|
|
#endif
|
|
return recvmsg_cloexec_fallback(sockfd, msg, flags);
|
|
}
|
|
|
|
int
|
|
wl_os_epoll_create_cloexec(void)
|
|
{
|
|
int fd;
|
|
|
|
#ifdef EPOLL_CLOEXEC
|
|
fd = wl_epoll_create1(EPOLL_CLOEXEC);
|
|
if (fd >= 0)
|
|
return fd;
|
|
if (errno != EINVAL)
|
|
return -1;
|
|
#endif
|
|
|
|
fd = epoll_create(1);
|
|
return set_cloexec_or_close(fd);
|
|
}
|
|
|
|
int
|
|
wl_os_accept_cloexec(int sockfd, struct sockaddr *addr, socklen_t *addrlen)
|
|
{
|
|
int fd;
|
|
|
|
#ifdef HAVE_ACCEPT4
|
|
fd = accept4(sockfd, addr, addrlen, SOCK_CLOEXEC);
|
|
if (fd >= 0)
|
|
return fd;
|
|
if (errno != ENOSYS)
|
|
return -1;
|
|
#endif
|
|
|
|
fd = accept(sockfd, addr, addrlen);
|
|
return set_cloexec_or_close(fd);
|
|
}
|
|
|
|
/*
|
|
* Fallback function for operating systems that don't implement
|
|
* mremap(MREMAP_MAYMOVE).
|
|
*/
|
|
void *
|
|
wl_os_mremap_maymove(int fd, void *old_data, ssize_t *old_size,
|
|
ssize_t new_size, int prot, int flags)
|
|
{
|
|
void *result;
|
|
|
|
/* Make sure any pending write is flushed. */
|
|
if (msync(old_data, *old_size, MS_SYNC) != 0)
|
|
return MAP_FAILED;
|
|
|
|
/* We could try mapping a new block immediately after the current one
|
|
* with MAP_FIXED, however that is not guaranteed to work and breaks
|
|
* on CHERI-enabled architectures since the data pointer will still
|
|
* have the bounds of the previous allocation.
|
|
*/
|
|
result = mmap(NULL, new_size, prot, flags, fd, 0);
|
|
if (result == MAP_FAILED)
|
|
return MAP_FAILED;
|
|
|
|
if (munmap(old_data, *old_size) == 0)
|
|
*old_size = 0;
|
|
|
|
return result;
|
|
}
|