/* Copyright 2010-2015 Codership Oy This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; version 2 of the License. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ //! @file some utility functions and classes not directly related to replication #ifndef _GNU_SOURCE #define _GNU_SOURCE // POSIX_SPAWN_USEVFORK flag #endif #include "wsrep_utils.h" #include "wsrep_mysqld.h" #include #include // posix_spawn() #include // pipe() #include // errno #include // strerror() #include // waitpid() #include #include #include // getaddrinfo() #ifdef HAVE_GETIFADDRS #include #include #endif /* HAVE_GETIFADDRS */ extern char** environ; // environment variables static wsp::string wsrep_PATH; void wsrep_prepend_PATH (const char* path) { int count = 0; while (environ[count]) { if (strncmp (environ[count], "PATH=", 5)) { count++; continue; } char* const old_path (environ[count]); if (strstr (old_path, path)) return; // path already there size_t const new_path_len(strlen(old_path) + strlen(":") + strlen(path) + 1); char* const new_path (static_cast(malloc(new_path_len))); if (new_path) { snprintf (new_path, new_path_len, "PATH=%s:%s", path, old_path + strlen("PATH=")); wsrep_PATH.set (new_path); environ[count] = new_path; } else { WSREP_ERROR ("Failed to allocate 'PATH' environment variable " "buffer of size %zu.", new_path_len); } return; } WSREP_ERROR ("Failed to find 'PATH' environment variable. " "State snapshot transfer may not be working."); } namespace wsp { bool env::ctor_common(char** e) { env_ = static_cast(malloc((len_ + 1) * sizeof(char*))); if (env_) { for (size_t i(0); i < len_; ++i) { assert(e[i]); // caller should make sure about len_ env_[i] = strdup(e[i]); if (!env_[i]) { errno_ = errno; WSREP_ERROR("Failed to allocate env. var: %s", e[i]); return true; } } env_[len_] = NULL; return false; } else { errno_ = errno; WSREP_ERROR("Failed to allocate env. var vector of length: %zu", len_); return true; } } void env::dtor() { if (env_) { /* don't need to go beyond the first NULL */ for (size_t i(0); env_[i] != NULL; ++i) { free(env_[i]); } free(env_); env_ = NULL; } len_ = 0; } env::env(char** e) : len_(0), env_(NULL), errno_(0) { if (!e) { e = environ; } /* count the size of the vector */ while (e[len_]) { ++len_; } if (ctor_common(e)) dtor(); } env::env(const env& e) : len_(e.len_), env_(0), errno_(0) { if (ctor_common(e.env_)) dtor(); } env::~env() { dtor(); } int env::append(const char* val) { char** tmp = static_cast(realloc(env_, (len_ + 2)*sizeof(char*))); if (tmp) { env_ = tmp; env_[len_] = strdup(val); if (env_[len_]) { ++len_; env_[len_] = NULL; } else errno_ = errno; } else errno_ = errno; return errno_; } #define PIPE_READ 0 #define PIPE_WRITE 1 #define STDIN_FD 0 #define STDOUT_FD 1 #ifndef POSIX_SPAWN_USEVFORK # define POSIX_SPAWN_USEVFORK 0 #endif process::process (const char* cmd, const char* type, char** env) : str_(cmd ? strdup(cmd) : strdup("")), io_(NULL), err_(EINVAL), pid_(0) { if (0 == str_) { WSREP_ERROR ("Can't allocate command line of size: %zu", strlen(cmd)); err_ = ENOMEM; return; } if (0 == strlen(str_)) { WSREP_ERROR ("Can't start a process: null or empty command line."); return; } if (NULL == type || (strcmp (type, "w") && strcmp(type, "r"))) { WSREP_ERROR ("type argument should be either \"r\" or \"w\"."); return; } if (NULL == env) { env = environ; } // default to global environment int pipe_fds[2] = { -1, }; if (::pipe(pipe_fds)) { err_ = errno; WSREP_ERROR ("pipe() failed: %d (%s)", err_, strerror(err_)); return; } // which end of pipe will be returned to parent int const parent_end (strcmp(type,"w") ? PIPE_READ : PIPE_WRITE); int const child_end (parent_end == PIPE_READ ? PIPE_WRITE : PIPE_READ); int const close_fd (parent_end == PIPE_READ ? STDOUT_FD : STDIN_FD); char* const pargv[4] = { strdup("sh"), strdup("-c"), strdup(str_), NULL }; if (!(pargv[0] && pargv[1] && pargv[2])) { err_ = ENOMEM; WSREP_ERROR ("Failed to allocate pargv[] array."); goto cleanup_pipe; } posix_spawnattr_t attr; err_ = posix_spawnattr_init (&attr); if (err_) { WSREP_ERROR ("posix_spawnattr_init() failed: %d (%s)", err_, strerror(err_)); goto cleanup_pipe; } /* make sure that no signlas are masked in child process */ sigset_t sigmask_empty; sigemptyset(&sigmask_empty); err_ = posix_spawnattr_setsigmask(&attr, &sigmask_empty); if (err_) { WSREP_ERROR ("posix_spawnattr_setsigmask() failed: %d (%s)", err_, strerror(err_)); goto cleanup_attr; } /* make sure the following signals are not ignored in child process */ sigset_t default_signals; sigemptyset(&default_signals); sigaddset(&default_signals, SIGHUP); sigaddset(&default_signals, SIGINT); sigaddset(&default_signals, SIGQUIT); sigaddset(&default_signals, SIGPIPE); sigaddset(&default_signals, SIGTERM); sigaddset(&default_signals, SIGCHLD); err_ = posix_spawnattr_setsigdefault(&attr, &default_signals); if (err_) { WSREP_ERROR ("posix_spawnattr_setsigdefault() failed: %d (%s)", err_, strerror(err_)); goto cleanup_attr; } err_ = posix_spawnattr_setflags (&attr, POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK | /* start a new process group */ POSIX_SPAWN_SETPGROUP | POSIX_SPAWN_USEVFORK); if (err_) { WSREP_ERROR ("posix_spawnattr_setflags() failed: %d (%s)", err_, strerror(err_)); goto cleanup_attr; } posix_spawn_file_actions_t fact; err_ = posix_spawn_file_actions_init (&fact); if (err_) { WSREP_ERROR ("posix_spawn_file_actions_init() failed: %d (%s)", err_, strerror(err_)); goto cleanup_attr; } // close child's stdout|stdin depending on what we returning err_ = posix_spawn_file_actions_addclose (&fact, close_fd); if (err_) { WSREP_ERROR ("posix_spawn_file_actions_addclose() failed: %d (%s)", err_, strerror(err_)); goto cleanup_fact; } // substitute our pipe descriptor in place of the closed one err_ = posix_spawn_file_actions_adddup2 (&fact, pipe_fds[child_end], close_fd); if (err_) { WSREP_ERROR ("posix_spawn_file_actions_addup2() failed: %d (%s)", err_, strerror(err_)); goto cleanup_fact; } err_ = posix_spawnp (&pid_, pargv[0], &fact, &attr, pargv, env); if (err_) { WSREP_ERROR ("posix_spawnp(%s) failed: %d (%s)", pargv[2], err_, strerror(err_)); pid_ = 0; // just to make sure it was not messed up in the call goto cleanup_fact; } io_ = fdopen (pipe_fds[parent_end], type); if (io_) { pipe_fds[parent_end] = -1; // skip close on cleanup } else { err_ = errno; WSREP_ERROR ("fdopen() failed: %d (%s)", err_, strerror(err_)); } cleanup_fact: int err; // to preserve err_ code err = posix_spawn_file_actions_destroy (&fact); if (err) { WSREP_ERROR ("posix_spawn_file_actions_destroy() failed: %d (%s)\n", err, strerror(err)); } cleanup_attr: err = posix_spawnattr_destroy (&attr); if (err) { WSREP_ERROR ("posix_spawnattr_destroy() failed: %d (%s)", err, strerror(err)); } cleanup_pipe: if (pipe_fds[0] >= 0) close (pipe_fds[0]); if (pipe_fds[1] >= 0) close (pipe_fds[1]); free (pargv[0]); free (pargv[1]); free (pargv[2]); } process::~process () { if (io_) { assert (pid_); assert (str_); WSREP_WARN("Closing pipe to child process: %s, PID(%ld) " "which might still be running.", str_, (long)pid_); if (fclose (io_) == -1) { err_ = errno; WSREP_ERROR("fclose() failed: %d (%s)", err_, strerror(err_)); } } if (str_) free (const_cast(str_)); } int process::wait () { if (pid_) { int status; if (-1 == waitpid(pid_, &status, 0)) { err_ = errno; assert (err_); WSREP_ERROR("Waiting for process failed: %s, PID(%ld): %d (%s)", str_, (long)pid_, err_, strerror (err_)); } else { // command completed, check exit status if (WIFEXITED (status)) { err_ = WEXITSTATUS (status); } else { // command didn't complete with exit() WSREP_ERROR("Process was aborted."); err_ = errno ? errno : ECHILD; } if (err_) { switch (err_) /* Translate error codes to more meaningful */ { case 126: err_ = EACCES; break; /* Permission denied */ case 127: err_ = ENOENT; break; /* No such file or directory */ case 143: err_ = EINTR; break; /* Subprocess killed */ } WSREP_ERROR("Process completed with error: %s: %d (%s)", str_, err_, strerror(err_)); } pid_ = 0; if (io_) fclose (io_); io_ = NULL; } } else { assert (NULL == io_); WSREP_ERROR("Command did not run: %s", str_); } return err_; } thd::thd (my_bool won) : init(), ptr(new THD) { if (ptr) { ptr->thread_stack= (char*) &ptr; ptr->store_globals(); ptr->variables.option_bits&= ~OPTION_BIN_LOG; // disable binlog ptr->variables.wsrep_on = won; ptr->security_ctx->master_access= ~(ulong)0; lex_start(ptr); } } thd::~thd () { if (ptr) { delete ptr; my_pthread_setspecific_ptr (THR_THD, 0); } } } // namespace wsp /* Returns INADDR_NONE, INADDR_ANY, INADDR_LOOPBACK or something else */ unsigned int wsrep_check_ip (const char* const addr, bool *is_ipv6) { unsigned int ret = INADDR_NONE; struct addrinfo *res, hints; memset (&hints, 0, sizeof(hints)); hints.ai_flags= AI_PASSIVE/*|AI_ADDRCONFIG*/; hints.ai_socktype= SOCK_STREAM; hints.ai_family= AF_UNSPEC; *is_ipv6= false; int gai_ret = getaddrinfo(addr, NULL, &hints, &res); if (0 == gai_ret) { if (AF_INET == res->ai_family) /* IPv4 */ { struct sockaddr_in* a= (struct sockaddr_in*)res->ai_addr; ret= htonl(a->sin_addr.s_addr); } else /* IPv6 */ { struct sockaddr_in6* a= (struct sockaddr_in6*)res->ai_addr; if (IN6_IS_ADDR_UNSPECIFIED(&a->sin6_addr)) ret= INADDR_ANY; else if (IN6_IS_ADDR_LOOPBACK(&a->sin6_addr)) ret= INADDR_LOOPBACK; else ret= 0xdeadbeef; *is_ipv6= true; } freeaddrinfo (res); } else { WSREP_ERROR ("getaddrinfo() failed on '%s': %d (%s)", addr, gai_ret, gai_strerror(gai_ret)); } return ret; } extern char* my_bind_addr_str; size_t wsrep_guess_ip (char* buf, size_t buf_len) { size_t ret= 0; // Attempt 1: Try to get the IP from bind-address. if (my_bind_addr_str && my_bind_addr_str[0] != '\0') { bool unused; unsigned int const ip_type= wsrep_check_ip(my_bind_addr_str, &unused); if (INADDR_NONE == ip_type) { WSREP_ERROR("Networking not configured, cannot receive state " "transfer."); ret= 0; goto done; } else if (INADDR_ANY != ip_type) { strncpy (buf, my_bind_addr_str, buf_len); ret= strlen(buf); goto done; } } // Attempt 2: mysqld binds to all interfaces, try IP from wsrep_node_address. if (wsrep_node_address && wsrep_node_address[0] != '\0') { wsp::Address addr(wsrep_node_address); if (!addr.is_valid()) { WSREP_WARN("Could not parse wsrep_node_address : %s", wsrep_node_address); ret= 0; goto done; } /* Safety check: Buffer length should be sufficiently large. */ DBUG_ASSERT(buf_len >= addr.get_address_len()); memcpy(buf, addr.get_address(), addr.get_address_len()); ret= addr.get_address_len(); goto done; } /* Attempt 3: Try to get the IP from the list of available interfaces. getifaddrs() is avaiable at least on Linux since glib 2.3, FreeBSD, MAC OSX, OpenSolaris, Solaris. On platforms which do not support getifaddrs() this function returns a failure and user is prompted to do manual configuration. */ #if HAVE_GETIFADDRS struct ifaddrs *ifaddr, *ifa; int family; if (getifaddrs(&ifaddr) == 0) { for (ifa= ifaddr; ifa != NULL; ifa = ifa->ifa_next) { if (!ifa->ifa_addr) continue; family= ifa->ifa_addr->sa_family; if ((family != AF_INET) && (family != AF_INET6)) continue; // Skip loopback interfaces (like lo:127.0.0.1) if (ifa->ifa_flags & IFF_LOOPBACK) continue; /* Get IP address from the socket address. The resulting address may have zone ID appended for IPv6 addresses (
%). */ if (vio_getnameinfo(ifa->ifa_addr, buf, buf_len, NULL, 0, NI_NUMERICHOST)) continue; freeifaddrs(ifaddr); ret= strlen(buf); goto done; } freeifaddrs(ifaddr); } #endif /* HAVE_GETIFADDRS */ done: WSREP_DEBUG("wsrep_guess_ip() : %s", (ret > 0) ? buf : "????"); return ret; }