blob: b7ea23dc8e7c744f9d90b1359a5118cb0863c52f [file] [log] [blame]
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -07001/* util.h
2 * Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
3 * Use of this source code is governed by a BSD-style license that can be
4 * found in the LICENSE file.
5 *
6 * Logging and other utility functions.
7 */
8
9#ifndef _UTIL_H_
10#define _UTIL_H_
11
Luis Hector Chavezeb42bb72018-10-15 09:46:29 -070012#include <stdbool.h>
Luis Hector Chavez114a9302017-09-05 20:36:58 -070013#include <stdio.h>
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -070014#include <stdlib.h>
Jorge Lucangeli Obesf205fff2016-08-06 09:06:21 -040015#include <sys/types.h>
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -070016#include <syslog.h>
Jorge Lucangeli Obesf205fff2016-08-06 09:06:21 -040017#include <unistd.h>
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -070018
Nicole Anderson-Au461d8fb2020-11-09 22:53:40 +000019#include "libsyscalls.h"
20
Jorge Lucangeli Obesa67bd6a2016-08-19 15:33:48 -040021#ifdef __cplusplus
22extern "C" {
23#endif
24
Mike Frysingerd9ef07c2018-05-30 16:51:36 -040025/*
26 * Silence compiler warnings for unused variables/functions.
27 *
28 * If the definition is actually used, the attribute should be removed, but if
29 * it's forgotten or left in place, it doesn't cause a problem.
30 *
31 * If the definition is actually unused, the compiler is free to remove it from
32 * the output so as to save size. If you want to make sure the definition is
33 * kept (e.g. for ABI compatibility), look at the "used" attribute instead.
34 */
35#define attribute_unused __attribute__((__unused__))
36
37/*
38 * Mark the symbol as "weak" in the ELF output. This provides a fallback symbol
39 * that may be overriden at link time. See this page for more details:
40 * https://en.wikipedia.org/wiki/Weak_symbol
41 */
42#define attribute_weak __attribute__((__weak__))
43
44/*
45 * Mark the function as a printf-style function.
46 * @format_idx The index in the function argument list where the format string
47 * is passed (where the first argument is "1").
48 * @check_idx The index in the function argument list where the first argument
49 * used in the format string is passed.
50 * Some examples:
51 * foo([1] const char *format, [2] ...): format=1 check=2
52 * foo([1] int, [2] const char *format, [3] ...): format=2 check=3
53 * foo([1] const char *format, [2] const char *, [3] ...): format=1 check=3
54 */
55#define attribute_printf(format_idx, check_idx) \
56 __attribute__((__format__(__printf__, format_idx, check_idx)))
57
Mike Frysingerc150d6d2021-07-16 02:47:06 -040058#ifndef __cplusplus
59/* If writing C++, use std::unique_ptr with a destructor instead. */
60
Mike Frysingerdebdf5d2021-06-21 09:52:06 -040061/*
62 * Mark a local variable for automatic cleanup when exiting its scope.
63 * See attribute_cleanup_fp as an example below.
64 * Make sure any variable using this is always initialized to something.
65 * @func The function to call on (a pointer to) the variable.
66 */
67#define attribute_cleanup(func) \
68 __attribute__((__cleanup__(func)))
69
70/*
71 * Automatically close a FILE* when exiting its scope.
72 * Make sure the pointer is always initialized.
73 * Some examples:
74 * attribute_cleanup_fp FILE *fp = fopen(...);
75 * attribute_cleanup_fp FILE *fp = NULL;
76 * ...
77 * fp = fopen(...);
78 */
79#define attribute_cleanup_fp attribute_cleanup(_cleanup_fp)
80static inline void _cleanup_fp(FILE **fp)
81{
82 if (*fp)
83 fclose(*fp);
84}
85
Mike Frysingerc150d6d2021-07-16 02:47:06 -040086#endif /* __cplusplus */
87
Jorge Lucangeli Obes0b208772017-04-19 14:15:46 -040088/* clang-format off */
Luis Hector Chavezcc559e82018-07-09 13:26:31 -070089#define die(_msg, ...) \
90 do_fatal_log(LOG_ERR, "libminijail[%d]: " _msg, getpid(), ## __VA_ARGS__)
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -070091
92#define pdie(_msg, ...) \
Mike Frysingerb5d7b9f2015-01-09 03:50:15 -050093 die(_msg ": %m", ## __VA_ARGS__)
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -070094
95#define warn(_msg, ...) \
Luis Hector Chavez114a9302017-09-05 20:36:58 -070096 do_log(LOG_WARNING, "libminijail[%d]: " _msg, getpid(), ## __VA_ARGS__)
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -070097
Jorge Lucangeli Obesa2053902016-08-02 12:08:15 -040098#define pwarn(_msg, ...) \
99 warn(_msg ": %m", ## __VA_ARGS__)
100
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -0700101#define info(_msg, ...) \
Luis Hector Chavez114a9302017-09-05 20:36:58 -0700102 do_log(LOG_INFO, "libminijail[%d]: " _msg, getpid(), ## __VA_ARGS__)
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -0700103
Mike Frysinger404d2bb2017-01-17 19:29:00 -0500104#define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
Jorge Lucangeli Obes0b208772017-04-19 14:15:46 -0400105/* clang-format on */
Mike Frysinger404d2bb2017-01-17 19:29:00 -0500106
Jorge Lucangeli Obesbda833c2012-07-31 16:25:56 -0700107extern const char *log_syscalls[];
108extern const size_t log_syscalls_len;
109
Luis Hector Chavez114a9302017-09-05 20:36:58 -0700110enum logging_system_t {
111 /* Log to syslog. This is the default. */
112 LOG_TO_SYSLOG = 0,
113
114 /* Log to a file descriptor. */
115 LOG_TO_FD,
116};
117
Luis Hector Chavezcc559e82018-07-09 13:26:31 -0700118/*
119 * Even though this function internally calls abort(2)/exit(2), it is
120 * intentionally not marked with the noreturn attribute. When marked as
121 * noreturn, clang coalesces several of the do_fatal_log() calls in methods that
122 * have a large number of such calls (like minijail_enter()), making it
123 * impossible for breakpad to correctly identify the line where it was called,
124 * making the backtrace somewhat useless.
125 */
126extern void do_fatal_log(int priority, const char *format, ...)
127 attribute_printf(2, 3);
128
Luis Hector Chavez114a9302017-09-05 20:36:58 -0700129extern void do_log(int priority, const char *format, ...)
Mike Frysingerd9ef07c2018-05-30 16:51:36 -0400130 attribute_printf(2, 3);
Luis Hector Chavez114a9302017-09-05 20:36:58 -0700131
Mike Frysinger8c013272017-09-06 19:26:46 -0400132static inline int is_android(void)
Jorge Lucangeli Obes0b208772017-04-19 14:15:46 -0400133{
Jorge Lucangeli Obes4b276a62016-01-07 14:31:33 -0800134#if defined(__ANDROID__)
135 return 1;
136#else
137 return 0;
138#endif
139}
140
Luis Hector Chavezfc814552019-04-22 09:44:18 -0700141static inline bool compiled_with_asan(void)
Jorge Lucangeli Obes0b208772017-04-19 14:15:46 -0400142{
Luis Hector Chavezeb42bb72018-10-15 09:46:29 -0700143#if defined(__SANITIZE_ADDRESS__)
144 /* For gcc. */
145 return true;
146#elif defined(__has_feature)
147 /* For clang. */
Luis Hector Chavezfc814552019-04-22 09:44:18 -0700148 return __has_feature(address_sanitizer) ||
149 __has_feature(hwaddress_sanitizer);
Luis Hector Chavezeb42bb72018-10-15 09:46:29 -0700150#else
151 return false;
152#endif
Jorge Lucangeli Obes2413f372016-04-06 18:43:10 -0700153}
154
Luis Hector Chavezfc814552019-04-22 09:44:18 -0700155void __asan_init(void) attribute_weak;
156void __hwasan_init(void) attribute_weak;
157
158static inline bool running_with_asan(void)
159{
160 /*
161 * There are some configurations under which ASan needs a dynamic (as
162 * opposed to compile-time) test. Some Android processes that start
163 * before /data is mounted run with non-instrumented libminijail.so, so
164 * the symbol-sniffing code must be present to make the right decision.
165 */
166 return compiled_with_asan() || &__asan_init != 0 || &__hwasan_init != 0;
167}
168
Jorge Lucangeli Obes32201f82019-06-12 14:45:06 -0400169static inline bool debug_logging_allowed(void) {
170#if defined(ALLOW_DEBUG_LOGGING)
171 return true;
172#else
173 return false;
174#endif
175}
176
Adrian Ratiu8ef61252021-06-08 03:46:24 +0300177static inline bool seccomp_default_ret_log(void) {
178#if defined(SECCOMP_DEFAULT_RET_LOG)
179 return true;
180#else
181 return false;
182#endif
183}
184
Nicole Anderson-Au461d8fb2020-11-09 22:53:40 +0000185static inline size_t get_num_syscalls(void)
186{
187 return syscall_table_size;
188}
189
Nicole Anderson-Aubcc8cfd2020-11-10 20:33:27 +0000190int lookup_syscall(const char *name, size_t *ind);
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -0700191const char *lookup_syscall_name(int nr);
Jorge Lucangeli Obes7b2e29c2016-08-04 12:21:03 -0400192
Mike Frysingere34d7fe2018-05-23 04:18:30 -0400193long int parse_single_constant(char *constant_str, char **endptr);
Luis Hector Chavez40b25742013-09-22 19:44:06 -0700194long int parse_constant(char *constant_str, char **endptr);
Martin Pelikánab9eb442017-01-25 11:53:58 +1100195int parse_size(size_t *size, const char *sizespec);
Jorge Lucangeli Obes7b2e29c2016-08-04 12:21:03 -0400196
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -0700197char *strip(char *s);
Mike Frysingerb4c7e772018-01-17 17:40:15 -0500198
199/*
200 * tokenize: locate the next token in @stringp using the @delim
201 * @stringp A pointer to the string to scan for tokens
202 * @delim The delimiter to split by
203 *
204 * Note that, unlike strtok, @delim is not a set of characters, but the full
205 * delimiter. e.g. "a,;b,;c" with a delim of ",;" will yield ["a","b","c"].
206 *
207 * Note that, unlike strtok, this may return an empty token. e.g. "a,,b" with
208 * strtok will yield ["a","b"], but this will yield ["a","","b"].
209 */
Jorge Lucangeli Obes66cfc142012-11-30 15:42:52 -0800210char *tokenize(char **stringp, const char *delim);
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -0700211
Jorge Lucangeli Obes7b2e29c2016-08-04 12:21:03 -0400212char *path_join(const char *external_path, const char *internal_path);
213
214/*
215 * consumebytes: consumes @length bytes from a buffer @buf of length @buflength
216 * @length Number of bytes to consume
217 * @buf Buffer to consume from
218 * @buflength Size of @buf
219 *
220 * Returns a pointer to the base of the bytes, or NULL for errors.
221 */
222void *consumebytes(size_t length, char **buf, size_t *buflength);
223
224/*
225 * consumestr: consumes a C string from a buffer @buf of length @length
226 * @buf Buffer to consume
227 * @length Length of buffer
228 *
229 * Returns a pointer to the base of the string, or NULL for errors.
230 */
231char *consumestr(char **buf, size_t *buflength);
232
Luis Hector Chavez114a9302017-09-05 20:36:58 -0700233/*
234 * init_logging: initializes the module-wide logging.
235 * @logger The logging system to use.
236 * @fd The file descriptor to log into. Ignored unless
237 * @logger = LOG_TO_FD.
238 * @min_priority The minimum priority to display. Corresponds to syslog's
239 priority parameter. Ignored unless @logger = LOG_TO_FD.
240 */
241void init_logging(enum logging_system_t logger, int fd, int min_priority);
242
Mattias Nisslerb35f2c12020-02-07 13:37:36 +0100243/*
244 * minjail_free_env: Frees an environment array plus the environment strings it
245 * points to. The environment and its constituent strings must have been
246 * allocated (as opposed to pointing to static data), e.g. by using
247 * minijail_copy_env() and minijail_setenv().
248 *
249 * @env The environment to free.
250 */
251void minijail_free_env(char **env);
252
253/*
254 * minjail_copy_env: Copy an environment array (such as passed to execve),
255 * duplicating the environment strings and the array pointing at them.
256 *
257 * @env The environment to copy.
258 *
259 * Returns a pointer to the copied environment or NULL on memory allocation
260 * failure.
261 */
262char **minijail_copy_env(char *const *env);
263
264/*
265 * minjail_setenv: Set an environment variable in @env. Semantics match the
266 * standard setenv() function, but this operates on @env, not the global
267 * environment. @env must be dynamically allocated (as opposed to pointing to
268 * static data), e.g. via minijail_copy_env(). @name and @value get copied into
269 * newly-allocated memory.
270 *
271 * @env Address of the environment to modify. Might be re-allocated to
272 * make room for the new entry.
273 * @name Name of the key to set.
274 * @value The value to set.
275 * @overwrite Whether to replace the existing value for @name. If non-zero and
276 * the entry is already present, no changes will be made.
277 *
278 * Returns 0 and modifies *@env on success, returns an error code otherwise.
279 */
280int minijail_setenv(char ***env, const char *name, const char *value,
281 int overwrite);
282
Jorge Lucangeli Obesa67bd6a2016-08-19 15:33:48 -0400283#ifdef __cplusplus
284}; /* extern "C" */
285#endif
286
Jorge Lucangeli Obesa6b034d2012-08-07 15:29:20 -0700287#endif /* _UTIL_H_ */