12 #include <sys/types.h>
20 #include "appconfig.h"
22 #include "web_client.h"
23 #include "plugins_d.h"
29 #define BACKTRACE_SIZE 4096
31 void print_backtrace()
33 void *buffer[BACKTRACE_SIZE];
36 nptrs = backtrace(buffer, BACKTRACE_SIZE);
37 fprintf(stderr, "\n\nSTACK TRACE (%d addresses):\n\n", nptrs);
38 backtrace_symbols_fd(buffer, nptrs, STDERR_FILENO);
39 fprintf(stderr, "\n\n");
42 void sig_handler(int signo)
54 info("Death signaled exit (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
56 signal(signo, SIG_DFL);
66 info("Signaled exit (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
68 signal(SIGPIPE, SIG_IGN);
69 signal(SIGTERM, SIG_IGN);
70 signal(SIGQUIT, SIG_IGN);
71 signal(SIGHUP, SIG_IGN);
72 signal(SIGINT, SIG_IGN);
73 signal(SIGCHLD, SIG_IGN);
76 //unlink("/var/run/netdata.pid");
77 info("NetData exiting. Bye bye...");
82 info("Signaled PIPE (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
83 // this is received when web clients send a reset
85 // info("Ignoring signal %d. Errno: %d (%s)", signo, errno, strerror(errno));
89 info("Signal %d received. Falling back to default action for it.", signo);
90 signal(signo, SIG_DFL);
95 char rundir[FILENAME_MAX + 1] = "/var/run/netdata";
96 char pidfile[FILENAME_MAX + 1] = "";
97 void prepare_rundir() {
99 mkdir("/run/user", 0775);
100 snprintf(rundir, FILENAME_MAX, "/run/user/%d", getuid());
102 snprintf(rundir, FILENAME_MAX, "/run/user/%d/netdata", getuid());
105 snprintf(pidfile, FILENAME_MAX, "%s/netdata.pid", rundir);
107 if(mkdir(rundir, 0775) != 0) {
108 if(errno != EEXIST) fprintf(stderr, "Cannot create directory '%s' (%s).", rundir, strerror(errno));
112 int become_user(const char *username)
114 struct passwd *pw = getpwnam(username);
116 fprintf(stderr, "User %s is not present. Error: %s\n", username, strerror(errno));
120 if(chown(rundir, pw->pw_uid, pw->pw_gid) != 0) {
121 fprintf(stderr, "Cannot chown directory '%s' to user %s. Error: %s\n", rundir, username, strerror(errno));
125 if(setgid(pw->pw_gid) != 0) {
126 fprintf(stderr, "Cannot switch to user's %s group (gid: %d). Error: %s\n", username, pw->pw_gid, strerror(errno));
129 if(setegid(pw->pw_gid) != 0) {
130 fprintf(stderr, "Cannot effectively switch to user's %s group (gid: %d). Error: %s\n", username, pw->pw_gid, strerror(errno));
133 if(setuid(pw->pw_uid) != 0) {
134 fprintf(stderr, "Cannot switch to user %s (uid: %d). Error: %s\n", username, pw->pw_uid, strerror(errno));
137 if(seteuid(pw->pw_uid) != 0) {
138 fprintf(stderr, "Cannot effectively switch to user %s (uid: %d). Error: %s\n", username, pw->pw_uid, strerror(errno));
145 int become_daemon(int dont_fork, int close_all_files, const char *input, const char *output, const char *error, const char *access, int *access_fd, FILE **access_fp)
149 // open the files before forking
150 int input_fd = -1, output_fd = -1, error_fd = -1, dev_null = -1;
152 if(input && *input) {
153 if((input_fd = open(input, O_RDONLY, 0666)) == -1) {
154 fprintf(stderr, "Cannot open input file '%s' (%s).", input, strerror(errno));
159 if(output && *output) {
160 if((output_fd = open(output, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
161 fprintf(stderr, "Cannot open output log file '%s' (%s).", output, strerror(errno));
162 if(input_fd != -1) close(input_fd);
167 if(error && *error) {
168 if((error_fd = open(error, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
169 fprintf(stderr, "Cannot open error log file '%s' (%s).", error, strerror(errno));
170 if(input_fd != -1) close(input_fd);
171 if(output_fd != -1) close(output_fd);
176 if(access && *access && access_fd) {
177 if((*access_fd = open(access, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
178 fprintf(stderr, "Cannot open access log file '%s' (%s).", access, strerror(errno));
179 if(input_fd != -1) close(input_fd);
180 if(output_fd != -1) close(output_fd);
181 if(error_fd != -1) close(error_fd);
186 *access_fp = fdopen(*access_fd, "w");
188 fprintf(stderr, "Cannot migrate file's '%s' fd %d (%s).\n", access, *access_fd, strerror(errno));
189 if(input_fd != -1) close(input_fd);
190 if(output_fd != -1) close(output_fd);
191 if(error_fd != -1) close(error_fd);
199 if((dev_null = open("/dev/null", O_RDWR, 0666)) == -1) {
200 perror("Cannot open /dev/null");
201 if(input_fd != -1) close(input_fd);
202 if(output_fd != -1) close(output_fd);
203 if(error_fd != -1) close(error_fd);
204 if(access && access_fd && *access_fd != -1) {
221 perror("cannot fork");
225 exit(0); // the parent
228 // become session leader
230 perror("Cannot become session leader.");
235 signal(SIGCHLD, SIG_IGN);
236 signal(SIGHUP, SIG_IGN);
237 signal(SIGWINCH, SIG_IGN);
243 perror("cannot fork");
247 exit(0); // the parent
251 // Set new file permissions
255 if(close_all_files) {
257 for(i = sysconf(_SC_OPEN_MAX); i > 0; i--)
259 ((access_fd && i != *access_fd) || !access_fd)
269 close(STDOUT_FILENO);
270 close(STDERR_FILENO);
273 // put the opened files
274 // to our standard file descriptors
276 if(input_fd != STDIN_FILENO) {
277 dup2(input_fd, STDIN_FILENO);
282 else dup2(dev_null, STDIN_FILENO);
284 if(output_fd != -1) {
285 if(output_fd != STDOUT_FILENO) {
286 dup2(output_fd, STDOUT_FILENO);
291 else dup2(dev_null, STDOUT_FILENO);
294 if(error_fd != STDERR_FILENO) {
295 dup2(error_fd, STDERR_FILENO);
300 else dup2(dev_null, STDERR_FILENO);
303 if(dev_null != STDIN_FILENO && dev_null != STDOUT_FILENO && dev_null != STDERR_FILENO)
306 // generate our pid file
309 int fd = open(pidfile, O_RDWR | O_CREAT, 0666);
312 sprintf(b, "%d\n", getpid());
313 int i = write(fd, b, strlen(b));
314 if(i <= 0) perror("Cannot write pid to file.");