]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/journal/journald-context.c
Merge pull request #11252 from evverx/use-asan-wrapper-on-travis-ci
[thirdparty/systemd.git] / src / journal / journald-context.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #if HAVE_SELINUX
4 #include <selinux/selinux.h>
5 #endif
6
7 #include "alloc-util.h"
8 #include "audit-util.h"
9 #include "cgroup-util.h"
10 #include "fd-util.h"
11 #include "fileio.h"
12 #include "fs-util.h"
13 #include "io-util.h"
14 #include "journal-util.h"
15 #include "journald-context.h"
16 #include "parse-util.h"
17 #include "path-util.h"
18 #include "process-util.h"
19 #include "string-util.h"
20 #include "syslog-util.h"
21 #include "unaligned.h"
22 #include "user-util.h"
23
24 /* This implements a metadata cache for clients, which are identified by their PID. Requesting metadata through /proc
25 * is expensive, hence let's cache the data if we can. Note that this means the metadata might be out-of-date when we
26 * store it, but it might already be anyway, as we request the data asynchronously from /proc at a different time the
27 * log entry was originally created. We hence just increase the "window of inaccuracy" a bit.
28 *
29 * The cache is indexed by the PID. Entries may be "pinned" in the cache, in which case the entries are not removed
30 * until they are unpinned. Unpinned entries are kept around until cache pressure is seen. Cache entries older than 5s
31 * are never used (a sad attempt to deal with the UNIX weakness of PIDs reuse), cache entries older than 1s are
32 * refreshed in an incremental way (meaning: data is reread from /proc, but any old data we can't refresh is not
33 * flushed out). Data newer than 1s is used immediately without refresh.
34 *
35 * Log stream clients (i.e. all clients using the AF_UNIX/SOCK_STREAM stdout/stderr transport) will pin a cache entry
36 * as long as their socket is connected. Note that cache entries are shared between different transports. That means a
37 * cache entry pinned for the stream connection logic may be reused for the syslog or native protocols.
38 *
39 * Caching metadata like this has two major benefits:
40 *
41 * 1. Reading metadata is expensive, and we can thus substantially speed up log processing under flood.
42 *
43 * 2. Because metadata caching is shared between stream and datagram transports and stream connections pin a cache
44 * entry there's a good chance we can properly map a substantial set of datagram log messages to their originating
45 * service, as all services (unless explicitly configured otherwise) will have their stdout/stderr connected to a
46 * stream connection. This should improve cases where a service process logs immediately before exiting and we
47 * previously had trouble associating the log message with the service.
48 *
49 * NB: With and without the metadata cache: the implicitly added entry metadata in the journal (with the exception of
50 * UID/PID/GID and SELinux label) must be understood as possibly slightly out of sync (i.e. sometimes slighly older
51 * and sometimes slightly newer than what was current at the log event).
52 */
53
54 /* We refresh every 1s */
55 #define REFRESH_USEC (1*USEC_PER_SEC)
56
57 /* Data older than 5s we flush out */
58 #define MAX_USEC (5*USEC_PER_SEC)
59
60 /* Keep at most 16K entries in the cache. (Note though that this limit may be violated if enough streams pin entries in
61 * the cache, in which case we *do* permit this limit to be breached. That's safe however, as the number of stream
62 * clients itself is limited.) */
63 #define CACHE_MAX (16*1024)
64
65 static int client_context_compare(const void *a, const void *b) {
66 const ClientContext *x = a, *y = b;
67 int r;
68
69 r = CMP(x->timestamp, y->timestamp);
70 if (r != 0)
71 return r;
72
73 return CMP(x->pid, y->pid);
74 }
75
76 static int client_context_new(Server *s, pid_t pid, ClientContext **ret) {
77 ClientContext *c;
78 int r;
79
80 assert(s);
81 assert(pid_is_valid(pid));
82 assert(ret);
83
84 r = hashmap_ensure_allocated(&s->client_contexts, NULL);
85 if (r < 0)
86 return r;
87
88 r = prioq_ensure_allocated(&s->client_contexts_lru, client_context_compare);
89 if (r < 0)
90 return r;
91
92 c = new0(ClientContext, 1);
93 if (!c)
94 return -ENOMEM;
95
96 c->pid = pid;
97
98 c->uid = UID_INVALID;
99 c->gid = GID_INVALID;
100 c->auditid = AUDIT_SESSION_INVALID;
101 c->loginuid = UID_INVALID;
102 c->owner_uid = UID_INVALID;
103 c->lru_index = PRIOQ_IDX_NULL;
104 c->timestamp = USEC_INFINITY;
105 c->extra_fields_mtime = NSEC_INFINITY;
106 c->log_level_max = -1;
107 c->log_rate_limit_interval = s->rate_limit_interval;
108 c->log_rate_limit_burst = s->rate_limit_burst;
109
110 r = hashmap_put(s->client_contexts, PID_TO_PTR(pid), c);
111 if (r < 0) {
112 free(c);
113 return r;
114 }
115
116 *ret = c;
117 return 0;
118 }
119
120 static void client_context_reset(Server *s, ClientContext *c) {
121 assert(s);
122 assert(c);
123
124 c->timestamp = USEC_INFINITY;
125
126 c->uid = UID_INVALID;
127 c->gid = GID_INVALID;
128
129 c->comm = mfree(c->comm);
130 c->exe = mfree(c->exe);
131 c->cmdline = mfree(c->cmdline);
132 c->capeff = mfree(c->capeff);
133
134 c->auditid = AUDIT_SESSION_INVALID;
135 c->loginuid = UID_INVALID;
136
137 c->cgroup = mfree(c->cgroup);
138 c->session = mfree(c->session);
139 c->owner_uid = UID_INVALID;
140 c->unit = mfree(c->unit);
141 c->user_unit = mfree(c->user_unit);
142 c->slice = mfree(c->slice);
143 c->user_slice = mfree(c->user_slice);
144
145 c->invocation_id = SD_ID128_NULL;
146
147 c->label = mfree(c->label);
148 c->label_size = 0;
149
150 c->extra_fields_iovec = mfree(c->extra_fields_iovec);
151 c->extra_fields_n_iovec = 0;
152 c->extra_fields_data = mfree(c->extra_fields_data);
153 c->extra_fields_mtime = NSEC_INFINITY;
154
155 c->log_level_max = -1;
156
157 c->log_rate_limit_interval = s->rate_limit_interval;
158 c->log_rate_limit_burst = s->rate_limit_burst;
159 }
160
161 static ClientContext* client_context_free(Server *s, ClientContext *c) {
162 assert(s);
163
164 if (!c)
165 return NULL;
166
167 assert_se(hashmap_remove(s->client_contexts, PID_TO_PTR(c->pid)) == c);
168
169 if (c->in_lru)
170 assert_se(prioq_remove(s->client_contexts_lru, c, &c->lru_index) >= 0);
171
172 client_context_reset(s, c);
173
174 return mfree(c);
175 }
176
177 static void client_context_read_uid_gid(ClientContext *c, const struct ucred *ucred) {
178 assert(c);
179 assert(pid_is_valid(c->pid));
180
181 /* The ucred data passed in is always the most current and accurate, if we have any. Use it. */
182 if (ucred && uid_is_valid(ucred->uid))
183 c->uid = ucred->uid;
184 else
185 (void) get_process_uid(c->pid, &c->uid);
186
187 if (ucred && gid_is_valid(ucred->gid))
188 c->gid = ucred->gid;
189 else
190 (void) get_process_gid(c->pid, &c->gid);
191 }
192
193 static void client_context_read_basic(ClientContext *c) {
194 char *t;
195
196 assert(c);
197 assert(pid_is_valid(c->pid));
198
199 if (get_process_comm(c->pid, &t) >= 0)
200 free_and_replace(c->comm, t);
201
202 if (get_process_exe(c->pid, &t) >= 0)
203 free_and_replace(c->exe, t);
204
205 if (get_process_cmdline(c->pid, 0, false, &t) >= 0)
206 free_and_replace(c->cmdline, t);
207
208 if (get_process_capeff(c->pid, &t) >= 0)
209 free_and_replace(c->capeff, t);
210 }
211
212 static int client_context_read_label(
213 ClientContext *c,
214 const char *label, size_t label_size) {
215
216 assert(c);
217 assert(pid_is_valid(c->pid));
218 assert(label_size == 0 || label);
219
220 if (label_size > 0) {
221 char *l;
222
223 /* If we got an SELinux label passed in it counts. */
224
225 l = newdup_suffix0(char, label, label_size);
226 if (!l)
227 return -ENOMEM;
228
229 free_and_replace(c->label, l);
230 c->label_size = label_size;
231 }
232 #if HAVE_SELINUX
233 else {
234 char *con;
235
236 /* If we got no SELinux label passed in, let's try to acquire one */
237
238 if (getpidcon(c->pid, &con) >= 0) {
239 free_and_replace(c->label, con);
240 c->label_size = strlen(c->label);
241 }
242 }
243 #endif
244
245 return 0;
246 }
247
248 static int client_context_read_cgroup(Server *s, ClientContext *c, const char *unit_id) {
249 _cleanup_free_ char *t = NULL;
250 int r;
251
252 assert(c);
253
254 /* Try to acquire the current cgroup path */
255 r = cg_pid_get_path_shifted(c->pid, s->cgroup_root, &t);
256 if (r < 0 || empty_or_root(t)) {
257 /* We use the unit ID passed in as fallback if we have nothing cached yet and cg_pid_get_path_shifted()
258 * failed or process is running in a root cgroup. Zombie processes are automatically migrated to root cgroup
259 * on cgroup v1 and we want to be able to map log messages from them too. */
260 if (unit_id && !c->unit) {
261 c->unit = strdup(unit_id);
262 if (c->unit)
263 return 0;
264 }
265
266 return r;
267 }
268
269 /* Let's shortcut this if the cgroup path didn't change */
270 if (streq_ptr(c->cgroup, t))
271 return 0;
272
273 free_and_replace(c->cgroup, t);
274
275 (void) cg_path_get_session(c->cgroup, &t);
276 free_and_replace(c->session, t);
277
278 if (cg_path_get_owner_uid(c->cgroup, &c->owner_uid) < 0)
279 c->owner_uid = UID_INVALID;
280
281 (void) cg_path_get_unit(c->cgroup, &t);
282 free_and_replace(c->unit, t);
283
284 (void) cg_path_get_user_unit(c->cgroup, &t);
285 free_and_replace(c->user_unit, t);
286
287 (void) cg_path_get_slice(c->cgroup, &t);
288 free_and_replace(c->slice, t);
289
290 (void) cg_path_get_user_slice(c->cgroup, &t);
291 free_and_replace(c->user_slice, t);
292
293 return 0;
294 }
295
296 static int client_context_read_invocation_id(
297 Server *s,
298 ClientContext *c) {
299
300 _cleanup_free_ char *value = NULL;
301 const char *p;
302 int r;
303
304 assert(s);
305 assert(c);
306
307 /* Read the invocation ID of a unit off a unit. PID 1 stores it in a per-unit symlink in /run/systemd/units/ */
308
309 if (!c->unit)
310 return 0;
311
312 p = strjoina("/run/systemd/units/invocation:", c->unit);
313 r = readlink_malloc(p, &value);
314 if (r < 0)
315 return r;
316
317 return sd_id128_from_string(value, &c->invocation_id);
318 }
319
320 static int client_context_read_log_level_max(
321 Server *s,
322 ClientContext *c) {
323
324 _cleanup_free_ char *value = NULL;
325 const char *p;
326 int r, ll;
327
328 if (!c->unit)
329 return 0;
330
331 p = strjoina("/run/systemd/units/log-level-max:", c->unit);
332 r = readlink_malloc(p, &value);
333 if (r < 0)
334 return r;
335
336 ll = log_level_from_string(value);
337 if (ll < 0)
338 return -EINVAL;
339
340 c->log_level_max = ll;
341 return 0;
342 }
343
344 static int client_context_read_extra_fields(
345 Server *s,
346 ClientContext *c) {
347
348 size_t size = 0, n_iovec = 0, n_allocated = 0, left;
349 _cleanup_free_ struct iovec *iovec = NULL;
350 _cleanup_free_ void *data = NULL;
351 _cleanup_fclose_ FILE *f = NULL;
352 struct stat st;
353 const char *p;
354 uint8_t *q;
355 int r;
356
357 if (!c->unit)
358 return 0;
359
360 p = strjoina("/run/systemd/units/log-extra-fields:", c->unit);
361
362 if (c->extra_fields_mtime != NSEC_INFINITY) {
363 if (stat(p, &st) < 0) {
364 if (errno == ENOENT)
365 return 0;
366
367 return -errno;
368 }
369
370 if (timespec_load_nsec(&st.st_mtim) == c->extra_fields_mtime)
371 return 0;
372 }
373
374 f = fopen(p, "re");
375 if (!f) {
376 if (errno == ENOENT)
377 return 0;
378
379 return -errno;
380 }
381
382 if (fstat(fileno(f), &st) < 0) /* The file might have been replaced since the stat() above, let's get a new
383 * one, that matches the stuff we are reading */
384 return -errno;
385
386 r = read_full_stream(f, (char**) &data, &size);
387 if (r < 0)
388 return r;
389
390 q = data, left = size;
391 while (left > 0) {
392 uint8_t *field, *eq;
393 uint64_t v, n;
394
395 if (left < sizeof(uint64_t))
396 return -EBADMSG;
397
398 v = unaligned_read_le64(q);
399 if (v < 2)
400 return -EBADMSG;
401
402 n = sizeof(uint64_t) + v;
403 if (left < n)
404 return -EBADMSG;
405
406 field = q + sizeof(uint64_t);
407
408 eq = memchr(field, '=', v);
409 if (!eq)
410 return -EBADMSG;
411
412 if (!journal_field_valid((const char *) field, eq - field, false))
413 return -EBADMSG;
414
415 if (!GREEDY_REALLOC(iovec, n_allocated, n_iovec+1))
416 return -ENOMEM;
417
418 iovec[n_iovec++] = IOVEC_MAKE(field, v);
419
420 left -= n, q += n;
421 }
422
423 free(c->extra_fields_iovec);
424 free(c->extra_fields_data);
425
426 c->extra_fields_iovec = TAKE_PTR(iovec);
427 c->extra_fields_n_iovec = n_iovec;
428 c->extra_fields_data = TAKE_PTR(data);
429 c->extra_fields_mtime = timespec_load_nsec(&st.st_mtim);
430
431 return 0;
432 }
433
434 static int client_context_read_log_rate_limit_interval(ClientContext *c) {
435 _cleanup_free_ char *value = NULL;
436 const char *p;
437 int r;
438
439 assert(c);
440
441 if (!c->unit)
442 return 0;
443
444 p = strjoina("/run/systemd/units/log-rate-limit-interval:", c->unit);
445 r = readlink_malloc(p, &value);
446 if (r < 0)
447 return r;
448
449 return safe_atou64(value, &c->log_rate_limit_interval);
450 }
451
452 static int client_context_read_log_rate_limit_burst(ClientContext *c) {
453 _cleanup_free_ char *value = NULL;
454 const char *p;
455 int r;
456
457 assert(c);
458
459 if (!c->unit)
460 return 0;
461
462 p = strjoina("/run/systemd/units/log-rate-limit-burst:", c->unit);
463 r = readlink_malloc(p, &value);
464 if (r < 0)
465 return r;
466
467 return safe_atou(value, &c->log_rate_limit_burst);
468 }
469
470 static void client_context_really_refresh(
471 Server *s,
472 ClientContext *c,
473 const struct ucred *ucred,
474 const char *label, size_t label_size,
475 const char *unit_id,
476 usec_t timestamp) {
477
478 assert(s);
479 assert(c);
480 assert(pid_is_valid(c->pid));
481
482 if (timestamp == USEC_INFINITY)
483 timestamp = now(CLOCK_MONOTONIC);
484
485 client_context_read_uid_gid(c, ucred);
486 client_context_read_basic(c);
487 (void) client_context_read_label(c, label, label_size);
488
489 (void) audit_session_from_pid(c->pid, &c->auditid);
490 (void) audit_loginuid_from_pid(c->pid, &c->loginuid);
491
492 (void) client_context_read_cgroup(s, c, unit_id);
493 (void) client_context_read_invocation_id(s, c);
494 (void) client_context_read_log_level_max(s, c);
495 (void) client_context_read_extra_fields(s, c);
496 (void) client_context_read_log_rate_limit_interval(c);
497 (void) client_context_read_log_rate_limit_burst(c);
498
499 c->timestamp = timestamp;
500
501 if (c->in_lru) {
502 assert(c->n_ref == 0);
503 assert_se(prioq_reshuffle(s->client_contexts_lru, c, &c->lru_index) >= 0);
504 }
505 }
506
507 void client_context_maybe_refresh(
508 Server *s,
509 ClientContext *c,
510 const struct ucred *ucred,
511 const char *label, size_t label_size,
512 const char *unit_id,
513 usec_t timestamp) {
514
515 assert(s);
516 assert(c);
517
518 if (timestamp == USEC_INFINITY)
519 timestamp = now(CLOCK_MONOTONIC);
520
521 /* No cached data so far? Let's fill it up */
522 if (c->timestamp == USEC_INFINITY)
523 goto refresh;
524
525 /* If the data isn't pinned and if the cashed data is older than the upper limit, we flush it out
526 * entirely. This follows the logic that as long as an entry is pinned the PID reuse is unlikely. */
527 if (c->n_ref == 0 && c->timestamp + MAX_USEC < timestamp) {
528 client_context_reset(s, c);
529 goto refresh;
530 }
531
532 /* If the data is older than the lower limit, we refresh, but keep the old data for all we can't update */
533 if (c->timestamp + REFRESH_USEC < timestamp)
534 goto refresh;
535
536 /* If the data passed along doesn't match the cached data we also do a refresh */
537 if (ucred && uid_is_valid(ucred->uid) && c->uid != ucred->uid)
538 goto refresh;
539
540 if (ucred && gid_is_valid(ucred->gid) && c->gid != ucred->gid)
541 goto refresh;
542
543 if (label_size > 0 && (label_size != c->label_size || memcmp(label, c->label, label_size) != 0))
544 goto refresh;
545
546 return;
547
548 refresh:
549 client_context_really_refresh(s, c, ucred, label, label_size, unit_id, timestamp);
550 }
551
552 static void client_context_try_shrink_to(Server *s, size_t limit) {
553 assert(s);
554
555 /* Bring the number of cache entries below the indicated limit, so that we can create a new entry without
556 * breaching the limit. Note that we only flush out entries that aren't pinned here. This means the number of
557 * cache entries may very well grow beyond the limit, if all entries stored remain pinned. */
558
559 while (hashmap_size(s->client_contexts) > limit) {
560 ClientContext *c;
561
562 c = prioq_pop(s->client_contexts_lru);
563 if (!c)
564 break; /* All remaining entries are pinned, give up */
565
566 assert(c->in_lru);
567 assert(c->n_ref == 0);
568
569 c->in_lru = false;
570
571 client_context_free(s, c);
572 }
573 }
574
575 void client_context_flush_all(Server *s) {
576 assert(s);
577
578 /* Flush out all remaining entries. This assumes all references are already dropped. */
579
580 s->my_context = client_context_release(s, s->my_context);
581 s->pid1_context = client_context_release(s, s->pid1_context);
582
583 client_context_try_shrink_to(s, 0);
584
585 assert(prioq_size(s->client_contexts_lru) == 0);
586 assert(hashmap_size(s->client_contexts) == 0);
587
588 s->client_contexts_lru = prioq_free(s->client_contexts_lru);
589 s->client_contexts = hashmap_free(s->client_contexts);
590 }
591
592 static int client_context_get_internal(
593 Server *s,
594 pid_t pid,
595 const struct ucred *ucred,
596 const char *label, size_t label_len,
597 const char *unit_id,
598 bool add_ref,
599 ClientContext **ret) {
600
601 ClientContext *c;
602 int r;
603
604 assert(s);
605 assert(ret);
606
607 if (!pid_is_valid(pid))
608 return -EINVAL;
609
610 c = hashmap_get(s->client_contexts, PID_TO_PTR(pid));
611 if (c) {
612
613 if (add_ref) {
614 if (c->in_lru) {
615 /* The entry wasn't pinned so far, let's remove it from the LRU list then */
616 assert(c->n_ref == 0);
617 assert_se(prioq_remove(s->client_contexts_lru, c, &c->lru_index) >= 0);
618 c->in_lru = false;
619 }
620
621 c->n_ref++;
622 }
623
624 client_context_maybe_refresh(s, c, ucred, label, label_len, unit_id, USEC_INFINITY);
625
626 *ret = c;
627 return 0;
628 }
629
630 client_context_try_shrink_to(s, CACHE_MAX-1);
631
632 r = client_context_new(s, pid, &c);
633 if (r < 0)
634 return r;
635
636 if (add_ref)
637 c->n_ref++;
638 else {
639 r = prioq_put(s->client_contexts_lru, c, &c->lru_index);
640 if (r < 0) {
641 client_context_free(s, c);
642 return r;
643 }
644
645 c->in_lru = true;
646 }
647
648 client_context_really_refresh(s, c, ucred, label, label_len, unit_id, USEC_INFINITY);
649
650 *ret = c;
651 return 0;
652 }
653
654 int client_context_get(
655 Server *s,
656 pid_t pid,
657 const struct ucred *ucred,
658 const char *label, size_t label_len,
659 const char *unit_id,
660 ClientContext **ret) {
661
662 return client_context_get_internal(s, pid, ucred, label, label_len, unit_id, false, ret);
663 }
664
665 int client_context_acquire(
666 Server *s,
667 pid_t pid,
668 const struct ucred *ucred,
669 const char *label, size_t label_len,
670 const char *unit_id,
671 ClientContext **ret) {
672
673 return client_context_get_internal(s, pid, ucred, label, label_len, unit_id, true, ret);
674 };
675
676 ClientContext *client_context_release(Server *s, ClientContext *c) {
677 assert(s);
678
679 if (!c)
680 return NULL;
681
682 assert(c->n_ref > 0);
683 assert(!c->in_lru);
684
685 c->n_ref--;
686 if (c->n_ref > 0)
687 return NULL;
688
689 /* The entry is not pinned anymore, let's add it to the LRU prioq if we can. If we can't we'll drop it
690 * right-away */
691
692 if (prioq_put(s->client_contexts_lru, c, &c->lru_index) < 0)
693 client_context_free(s, c);
694 else
695 c->in_lru = true;
696
697 return NULL;
698 }
699
700 void client_context_acquire_default(Server *s) {
701 int r;
702
703 assert(s);
704
705 /* Ensure that our own and PID1's contexts are always pinned. Our own context is particularly useful to
706 * generate driver messages. */
707
708 if (!s->my_context) {
709 struct ucred ucred = {
710 .pid = getpid_cached(),
711 .uid = getuid(),
712 .gid = getgid(),
713 };
714
715 r = client_context_acquire(s, ucred.pid, &ucred, NULL, 0, NULL, &s->my_context);
716 if (r < 0)
717 log_warning_errno(r, "Failed to acquire our own context, ignoring: %m");
718 }
719
720 if (!s->pid1_context) {
721
722 r = client_context_acquire(s, 1, NULL, NULL, 0, NULL, &s->pid1_context);
723 if (r < 0)
724 log_warning_errno(r, "Failed to acquire PID1's context, ignoring: %m");
725
726 }
727 }