Merge remote branch 'sjmurdoch/cloexec'

This commit is contained in:
Nick Mathewson 2010-12-01 11:42:34 -05:00
commit 9908404f01
9 changed files with 87 additions and 19 deletions

View File

@ -250,6 +250,7 @@ dnl Check for functions before libevent, since libevent-1.2 apparently
dnl exports strlcpy without defining it in a header. dnl exports strlcpy without defining it in a header.
AC_CHECK_FUNCS( AC_CHECK_FUNCS(
accept4 \
flock \ flock \
ftime \ ftime \
getaddrinfo \ getaddrinfo \

View File

@ -101,6 +101,35 @@
#include "strlcat.c" #include "strlcat.c"
#endif #endif
/** As open(path, flags, mode), but return an fd with the close-on-exec mode
* set. */
int
tor_open_cloexec(const char *path, int flags, unsigned mode)
{
#ifdef O_CLOEXEC
return open(path, flags|O_CLOEXEC, mode);
#else
int fd = open(path, flags, mode);
#ifdef FD_CLOEXEC
if (fd >= 0)
fcntl(fd, F_SETFD, FD_CLOEXEC);
#endif
return fd;
#endif
}
/** DOCDOC */
FILE *
tor_fopen_cloexec(const char *path, const char *mode)
{
FILE *result = fopen(path, mode);
#ifdef FD_CLOEXEC
if (result != NULL)
fcntl(fileno(result), F_SETFD, FD_CLOEXEC);
#endif
return result;
}
#ifdef HAVE_SYS_MMAN_H #ifdef HAVE_SYS_MMAN_H
/** Try to create a memory mapping for <b>filename</b> and return it. On /** Try to create a memory mapping for <b>filename</b> and return it. On
* failure, return NULL. Sets errno properly, using ERANGE to mean * failure, return NULL. Sets errno properly, using ERANGE to mean
@ -116,7 +145,7 @@ tor_mmap_file(const char *filename)
tor_assert(filename); tor_assert(filename);
fd = open(filename, O_RDONLY, 0); fd = tor_open_cloexec(filename, O_RDONLY, 0);
if (fd<0) { if (fd<0) {
int save_errno = errno; int save_errno = errno;
int severity = (errno == ENOENT) ? LOG_INFO : LOG_WARN; int severity = (errno == ENOENT) ? LOG_INFO : LOG_WARN;
@ -685,7 +714,7 @@ tor_lockfile_lock(const char *filename, int blocking, int *locked_out)
*locked_out = 0; *locked_out = 0;
log_info(LD_FS, "Locking \"%s\"", filename); log_info(LD_FS, "Locking \"%s\"", filename);
fd = open(filename, O_RDWR|O_CREAT|O_TRUNC, 0600); fd = tor_open_cloexec(filename, O_RDWR|O_CREAT|O_TRUNC, 0600);
if (fd < 0) { if (fd < 0) {
log_warn(LD_FS,"Couldn't open \"%s\" for locking: %s", filename, log_warn(LD_FS,"Couldn't open \"%s\" for locking: %s", filename,
strerror(errno)); strerror(errno));
@ -904,8 +933,16 @@ mark_socket_open(int s)
int int
tor_open_socket(int domain, int type, int protocol) tor_open_socket(int domain, int type, int protocol)
{ {
int s = socket(domain, type, protocol); int s;
#ifdef SOCK_CLOEXEC
#define LINUX_CLOEXEC_OPEN_SOCKET
type |= SOCK_CLOEXEC;
#endif
s = socket(domain, type, protocol);
if (s >= 0) { if (s >= 0) {
#if !defined(LINUX_CLOEXEC_OPEN_SOCKET) && defined(FD_CLOEXEC)
fcntl(s, F_SETFD, FD_CLOEXEC);
#endif
socket_accounting_lock(); socket_accounting_lock();
++n_sockets_open; ++n_sockets_open;
mark_socket_open(s); mark_socket_open(s);
@ -918,8 +955,17 @@ tor_open_socket(int domain, int type, int protocol)
int int
tor_accept_socket(int sockfd, struct sockaddr *addr, socklen_t *len) tor_accept_socket(int sockfd, struct sockaddr *addr, socklen_t *len)
{ {
int s = accept(sockfd, addr, len); int s;
#if defined(HAVE_ACCEPT4) && defined(SOCK_CLOEXEC)
#define LINUX_CLOEXEC_ACCEPT
s = accept4(sockfd, addr, len, SOCK_CLOEXEC);
#else
s = accept(sockfd, addr, len);
#endif
if (s >= 0) { if (s >= 0) {
#if !defined(LINUX_CLOEXEC_ACCEPT) && defined(FD_CLOEXEC)
fcntl(s, F_SETFD, FD_CLOEXEC);
#endif
socket_accounting_lock(); socket_accounting_lock();
++n_sockets_open; ++n_sockets_open;
mark_socket_open(s); mark_socket_open(s);
@ -975,8 +1021,17 @@ tor_socketpair(int family, int type, int protocol, int fd[2])
//don't use win32 socketpairs (they are always bad) //don't use win32 socketpairs (they are always bad)
#if defined(HAVE_SOCKETPAIR) && !defined(MS_WINDOWS) #if defined(HAVE_SOCKETPAIR) && !defined(MS_WINDOWS)
int r; int r;
#ifdef SOCK_CLOEXEC
type |= SOCK_CLOEXEC;
#endif
r = socketpair(family, type, protocol, fd); r = socketpair(family, type, protocol, fd);
if (r == 0) { if (r == 0) {
#if !defined(SOCK_CLOEXEC) && defined(FD_CLOEXEC)
if (fd[0] >= 0)
fcntl(fd[0], F_SETFD, FD_CLOEXEC);
if (fd[1] >= 0)
fcntl(fd[1], F_SETFD, FD_CLOEXEC);
#endif
socket_accounting_lock(); socket_accounting_lock();
if (fd[0] >= 0) { if (fd[0] >= 0) {
++n_sockets_open; ++n_sockets_open;

View File

@ -51,6 +51,8 @@
#include <netinet6/in6.h> #include <netinet6/in6.h>
#endif #endif
#include <stdio.h>
#if defined (WINCE) #if defined (WINCE)
#include <fcntl.h> #include <fcntl.h>
#include <io.h> #include <io.h>
@ -340,6 +342,9 @@ struct tm *tor_gmtime_r(const time_t *timep, struct tm *result);
((tvp)->tv_sec cmp (uvp)->tv_sec)) ((tvp)->tv_sec cmp (uvp)->tv_sec))
/* ===== File compatibility */ /* ===== File compatibility */
int tor_open_cloexec(const char *path, int flags, unsigned mode);
FILE *tor_fopen_cloexec(const char *path, const char *mode);
int replace_file(const char *from, const char *to); int replace_file(const char *from, const char *to);
int touch_file(const char *fname); int touch_file(const char *fname);

View File

@ -686,7 +686,7 @@ add_file_log(const log_severity_list_t *severity, const char *filename)
int fd; int fd;
logfile_t *lf; logfile_t *lf;
fd = open(filename, O_WRONLY|O_CREAT|O_APPEND, 0644); fd = tor_open_cloexec(filename, O_WRONLY|O_CREAT|O_APPEND, 0644);
if (fd<0) if (fd<0)
return -1; return -1;
if (tor_fd_seekend(fd)<0) if (tor_fd_seekend(fd)<0)

View File

@ -1814,7 +1814,7 @@ start_writing_to_file(const char *fname, int open_flags, int mode,
if (open_flags & O_BINARY) if (open_flags & O_BINARY)
new_file->binary = 1; new_file->binary = 1;
new_file->fd = open(open_name, open_flags, mode); new_file->fd = tor_open_cloexec(open_name, open_flags, mode);
if (new_file->fd < 0) { if (new_file->fd < 0) {
log_warn(LD_FS, "Couldn't open \"%s\" (%s) for writing: %s", log_warn(LD_FS, "Couldn't open \"%s\" (%s) for writing: %s",
open_name, fname, strerror(errno)); open_name, fname, strerror(errno));
@ -2035,7 +2035,7 @@ read_file_to_str(const char *filename, int flags, struct stat *stat_out)
tor_assert(filename); tor_assert(filename);
fd = open(filename,O_RDONLY|(bin?O_BINARY:O_TEXT),0); fd = tor_open_cloexec(filename,O_RDONLY|(bin?O_BINARY:O_TEXT),0);
if (fd<0) { if (fd<0) {
int severity = LOG_WARN; int severity = LOG_WARN;
int save_errno = errno; int save_errno = errno;
@ -2735,7 +2735,7 @@ finish_daemon(const char *desired_cwd)
exit(1); exit(1);
} }
nullfd = open("/dev/null", O_RDWR); nullfd = tor_open_cloexec("/dev/null", O_RDWR, 0);
if (nullfd < 0) { if (nullfd < 0) {
log_err(LD_GENERAL,"/dev/null can't be opened. Exiting."); log_err(LD_GENERAL,"/dev/null can't be opened. Exiting.");
exit(1); exit(1);
@ -2986,7 +2986,7 @@ tor_spawn_background(const char *const filename, int *stdout_read,
child_state = CHILD_STATE_REDIRECT; child_state = CHILD_STATE_REDIRECT;
/* Link stdin to /dev/null */ /* Link stdin to /dev/null */
fd = open("/dev/null", O_RDONLY); fd = open("/dev/null", O_RDONLY); /* NOT cloexec, obviously. */
if (fd != -1) if (fd != -1)
dup2(STDIN_FILENO, fd); dup2(STDIN_FILENO, fd);
else else
@ -2994,11 +2994,18 @@ tor_spawn_background(const char *const filename, int *stdout_read,
child_state = CHILD_STATE_CLOSEFD; child_state = CHILD_STATE_CLOSEFD;
close(stderr_pipe[0]);
close(stderr_pipe[1]);
close(stdout_pipe[0]);
close(stdout_pipe[1]);
close(fd);
/* Close all other fds, including the read end of the pipe */ /* Close all other fds, including the read end of the pipe */
/* XXX: use closefrom if available, or better still set FD_CLOEXEC /* XXX: We should now be doing enough FD_CLOEXEC setting to make
on all of Tor's open files */ * this needless. */
for (fd = STDERR_FILENO + 1; fd < max_fd; fd++) for (fd = STDERR_FILENO + 1; fd < max_fd; fd++) {
close(fd); close(fd);
}
child_state = CHILD_STATE_EXEC; child_state = CHILD_STATE_EXEC;

View File

@ -1752,10 +1752,10 @@ get_pf_socket(void)
#ifdef OPENBSD #ifdef OPENBSD
/* only works on OpenBSD */ /* only works on OpenBSD */
pf = open("/dev/pf", O_RDONLY); pf = tor_open_cloexec("/dev/pf", O_RDONLY, 0);
#else #else
/* works on NetBSD and FreeBSD */ /* works on NetBSD and FreeBSD */
pf = open("/dev/pf", O_RDWR); pf = tor_open_cloexec("/dev/pf", O_RDWR, 0);
#endif #endif
if (pf < 0) { if (pf < 0) {

View File

@ -2446,7 +2446,7 @@ dirserv_read_measured_bandwidths(const char *from_file,
smartlist_t *routerstatuses) smartlist_t *routerstatuses)
{ {
char line[256]; char line[256];
FILE *fp = fopen(from_file, "r"); FILE *fp = tor_fopen_cloexec(from_file, "r");
int applied_lines = 0; int applied_lines = 0;
time_t file_time; time_t file_time;
int ok; int ok;

View File

@ -2286,7 +2286,7 @@ _evdns_nameserver_add_impl(const struct sockaddr *address,
evtimer_set(&ns->timeout_event, nameserver_prod_callback, ns); evtimer_set(&ns->timeout_event, nameserver_prod_callback, ns);
ns->socket = socket(PF_INET, SOCK_DGRAM, 0); ns->socket = tor_open_socket(PF_INET, SOCK_DGRAM, 0);
if (ns->socket < 0) { err = 1; goto out1; } if (ns->socket < 0) { err = 1; goto out1; }
#ifdef WIN32 #ifdef WIN32
{ {
@ -3035,7 +3035,7 @@ evdns_resolv_conf_parse(int flags, const char *const filename) {
log(EVDNS_LOG_DEBUG, "Parsing resolv.conf file %s", filename); log(EVDNS_LOG_DEBUG, "Parsing resolv.conf file %s", filename);
fd = open(filename, O_RDONLY); fd = tor_open_cloexec(filename, O_RDONLY, 0);
if (fd < 0) { if (fd < 0) {
evdns_resolv_set_defaults(flags); evdns_resolv_set_defaults(flags);
return 1; return 1;
@ -3455,7 +3455,7 @@ main(int c, char **v) {
if (servertest) { if (servertest) {
int sock; int sock;
struct sockaddr_in my_addr; struct sockaddr_in my_addr;
sock = socket(PF_INET, SOCK_DGRAM, 0); sock = tor_open_socket(PF_INET, SOCK_DGRAM, 0);
fcntl(sock, F_SETFL, O_NONBLOCK); fcntl(sock, F_SETFL, O_NONBLOCK);
my_addr.sin_family = AF_INET; my_addr.sin_family = AF_INET;
my_addr.sin_port = htons(10053); my_addr.sin_port = htons(10053);

View File

@ -206,7 +206,7 @@ geoip_load_file(const char *filename, or_options_t *options)
int severity = options_need_geoip_info(options, &msg) ? LOG_WARN : LOG_INFO; int severity = options_need_geoip_info(options, &msg) ? LOG_WARN : LOG_INFO;
crypto_digest_env_t *geoip_digest_env = NULL; crypto_digest_env_t *geoip_digest_env = NULL;
clear_geoip_db(); clear_geoip_db();
if (!(f = fopen(filename, "r"))) { if (!(f = tor_fopen_cloexec(filename, "r"))) {
log_fn(severity, LD_GENERAL, "Failed to open GEOIP file %s. %s", log_fn(severity, LD_GENERAL, "Failed to open GEOIP file %s. %s",
filename, msg); filename, msg);
return -1; return -1;