18 #include "web_client.h"
19 #include "plugins_d.h"
25 #define BACKTRACE_SIZE 4096
27 void print_backtrace()
29 void *buffer[BACKTRACE_SIZE];
32 nptrs = backtrace(buffer, BACKTRACE_SIZE);
33 fprintf(stderr, "\n\nSTACK TRACE (%d addresses):\n\n", nptrs);
34 backtrace_symbols_fd(buffer, nptrs, STDERR_FILENO);
35 fprintf(stderr, "\n\n");
38 void sig_handler(int signo)
50 info("Death signaled exit (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
52 signal(signo, SIG_DFL);
62 info("Signaled exit (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
64 signal(SIGPIPE, SIG_IGN);
65 signal(SIGTERM, SIG_IGN);
66 signal(SIGQUIT, SIG_IGN);
67 signal(SIGHUP, SIG_IGN);
68 signal(SIGINT, SIG_IGN);
69 signal(SIGCHLD, SIG_IGN);
72 //unlink("/var/run/netdata.pid");
73 info("NetData exiting. Bye bye...");
78 info("Signaled PIPE (signal %d). Errno: %d (%s)", signo, errno, strerror(errno));
79 // this is received when web clients send a reset
81 // info("Ignoring signal %d. Errno: %d (%s)", signo, errno, strerror(errno));
85 info("Signal %d received. Falling back to default action for it.", signo);
86 signal(signo, SIG_DFL);
91 char rundir[FILENAME_MAX + 1] = "/var/run/netdata";
92 char pidfile[FILENAME_MAX + 1] = "";
93 void prepare_rundir() {
95 mkdir("/run/user", 0775);
96 snprintf(rundir, FILENAME_MAX, "/run/user/%d", getuid());
98 snprintf(rundir, FILENAME_MAX, "/run/user/%d/netdata", getuid());
101 snprintf(pidfile, FILENAME_MAX, "%s/netdata.pid", rundir);
103 if(mkdir(rundir, 0775) != 0) {
104 if(errno != EEXIST) fprintf(stderr, "Cannot create directory '%s' (%s).", rundir, strerror(errno));
108 int become_user(const char *username)
110 struct passwd *pw = getpwnam(username);
112 fprintf(stderr, "User %s is not present. Error: %s\n", username, strerror(errno));
116 if(chown(rundir, pw->pw_uid, pw->pw_gid) != 0) {
117 fprintf(stderr, "Cannot chown directory '%s' to user %s. Error: %s\n", rundir, username, strerror(errno));
121 if(setgid(pw->pw_gid) != 0) {
122 fprintf(stderr, "Cannot switch to user's %s group (gid: %d). Error: %s\n", username, pw->pw_gid, strerror(errno));
125 if(setegid(pw->pw_gid) != 0) {
126 fprintf(stderr, "Cannot effectively switch to user's %s group (gid: %d). Error: %s\n", username, pw->pw_gid, strerror(errno));
129 if(setuid(pw->pw_uid) != 0) {
130 fprintf(stderr, "Cannot switch to user %s (uid: %d). Error: %s\n", username, pw->pw_uid, strerror(errno));
133 if(seteuid(pw->pw_uid) != 0) {
134 fprintf(stderr, "Cannot effectively switch to user %s (uid: %d). Error: %s\n", username, pw->pw_uid, strerror(errno));
141 int become_daemon(int dont_fork, int close_all_files, const char *input, const char *output, const char *error, const char *access, int *access_fd, FILE **access_fp)
145 // open the files before forking
146 int input_fd = -1, output_fd = -1, error_fd = -1, dev_null = -1;
148 if(input && *input) {
149 if((input_fd = open(input, O_RDONLY, 0666)) == -1) {
150 fprintf(stderr, "Cannot open input file '%s' (%s).", input, strerror(errno));
155 if(output && *output) {
156 if((output_fd = open(output, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
157 fprintf(stderr, "Cannot open output log file '%s' (%s).", output, strerror(errno));
158 if(input_fd != -1) close(input_fd);
163 if(error && *error) {
164 if((error_fd = open(error, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
165 fprintf(stderr, "Cannot open error log file '%s' (%s).", error, strerror(errno));
166 if(input_fd != -1) close(input_fd);
167 if(output_fd != -1) close(output_fd);
172 if(access && *access && access_fd) {
173 if((*access_fd = open(access, O_RDWR | O_APPEND | O_CREAT, 0666)) == -1) {
174 fprintf(stderr, "Cannot open access log file '%s' (%s).", access, strerror(errno));
175 if(input_fd != -1) close(input_fd);
176 if(output_fd != -1) close(output_fd);
177 if(error_fd != -1) close(error_fd);
182 *access_fp = fdopen(*access_fd, "w");
184 fprintf(stderr, "Cannot migrate file's '%s' fd %d (%s).\n", access, *access_fd, strerror(errno));
185 if(input_fd != -1) close(input_fd);
186 if(output_fd != -1) close(output_fd);
187 if(error_fd != -1) close(error_fd);
195 if((dev_null = open("/dev/null", O_RDWR, 0666)) == -1) {
196 perror("Cannot open /dev/null");
197 if(input_fd != -1) close(input_fd);
198 if(output_fd != -1) close(output_fd);
199 if(error_fd != -1) close(error_fd);
200 if(access && access_fd && *access_fd != -1) {
217 perror("cannot fork");
221 exit(0); // the parent
224 // become session leader
226 perror("Cannot become session leader.");
231 signal(SIGCHLD, SIG_IGN);
232 signal(SIGHUP, SIG_IGN);
233 signal(SIGWINCH, SIG_IGN);
239 perror("cannot fork");
243 exit(0); // the parent
247 // Set new file permissions
251 if(close_all_files) {
253 for(i = sysconf(_SC_OPEN_MAX); i > 0; i--)
255 ((access_fd && i != *access_fd) || !access_fd)
265 close(STDOUT_FILENO);
266 close(STDERR_FILENO);
269 // put the opened files
270 // to our standard file descriptors
272 if(input_fd != STDIN_FILENO) {
273 dup2(input_fd, STDIN_FILENO);
278 else dup2(dev_null, STDIN_FILENO);
280 if(output_fd != -1) {
281 if(output_fd != STDOUT_FILENO) {
282 dup2(output_fd, STDOUT_FILENO);
287 else dup2(dev_null, STDOUT_FILENO);
290 if(error_fd != STDERR_FILENO) {
291 dup2(error_fd, STDERR_FILENO);
296 else dup2(dev_null, STDERR_FILENO);
299 if(dev_null != STDIN_FILENO && dev_null != STDOUT_FILENO && dev_null != STDERR_FILENO)
302 // generate our pid file
305 int fd = open(pidfile, O_RDWR | O_CREAT, 0666);
308 sprintf(b, "%d\n", getpid());
309 int i = write(fd, b, strlen(b));
310 if(i <= 0) perror("Cannot write pid to file.");