Deleted Added
full compact
daemon.c (244986) daemon.c (255521)
1/*-
2 * Copyright (c) 1999 Berkeley Software Design, Inc. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 * 3. Berkeley Software Design Inc's name may not be used to endorse or
13 * promote products derived from this software without specific prior
14 * written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN INC ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN INC BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 *
28 * From BSDI: daemon.c,v 1.2 1996/08/15 01:11:09 jch Exp
29 */
30
31#include <sys/cdefs.h>
1/*-
2 * Copyright (c) 1999 Berkeley Software Design, Inc. All rights reserved.
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions
6 * are met:
7 * 1. Redistributions of source code must retain the above copyright
8 * notice, this list of conditions and the following disclaimer.
9 * 2. Redistributions in binary form must reproduce the above copyright
10 * notice, this list of conditions and the following disclaimer in the
11 * documentation and/or other materials provided with the distribution.
12 * 3. Berkeley Software Design Inc's name may not be used to endorse or
13 * promote products derived from this software without specific prior
14 * written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN INC ``AS IS'' AND
17 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN INC BE LIABLE
20 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 *
28 * From BSDI: daemon.c,v 1.2 1996/08/15 01:11:09 jch Exp
29 */
30
31#include <sys/cdefs.h>
32__FBSDID("$FreeBSD: head/usr.sbin/daemon/daemon.c 244986 2013-01-03 00:49:11Z marius $");
32__FBSDID("$FreeBSD: head/usr.sbin/daemon/daemon.c 255521 2013-09-13 16:57:28Z jmg $");
33
34#include <sys/param.h>
35#include <sys/mman.h>
36#include <sys/wait.h>
37
38#include <err.h>
39#include <errno.h>
40#include <libutil.h>
41#include <login_cap.h>
42#include <pwd.h>
43#include <signal.h>
44#include <stdio.h>
45#include <stdlib.h>
46#include <unistd.h>
47
48static void dummy_sighandler(int);
49static void restrict_process(const char *);
50static int wait_child(pid_t pid, sigset_t *mask);
51static void usage(void);
52
53int
54main(int argc, char *argv[])
55{
33
34#include <sys/param.h>
35#include <sys/mman.h>
36#include <sys/wait.h>
37
38#include <err.h>
39#include <errno.h>
40#include <libutil.h>
41#include <login_cap.h>
42#include <pwd.h>
43#include <signal.h>
44#include <stdio.h>
45#include <stdlib.h>
46#include <unistd.h>
47
48static void dummy_sighandler(int);
49static void restrict_process(const char *);
50static int wait_child(pid_t pid, sigset_t *mask);
51static void usage(void);
52
53int
54main(int argc, char *argv[])
55{
56 struct pidfh *pfh = NULL;
56 struct pidfh *ppfh, *pfh;
57 sigset_t mask, oldmask;
58 int ch, nochdir, noclose, restart;
57 sigset_t mask, oldmask;
58 int ch, nochdir, noclose, restart;
59 const char *pidfile, *user;
59 const char *pidfile, *ppidfile, *user;
60 pid_t otherpid, pid;
61
62 nochdir = noclose = 1;
63 restart = 0;
60 pid_t otherpid, pid;
61
62 nochdir = noclose = 1;
63 restart = 0;
64 pidfile = user = NULL;
65 while ((ch = getopt(argc, argv, "cfp:ru:")) != -1) {
64 ppfh = pfh = NULL;
65 ppidfile = pidfile = user = NULL;
66 while ((ch = getopt(argc, argv, "cfp:P:ru:")) != -1) {
66 switch (ch) {
67 case 'c':
68 nochdir = 0;
69 break;
70 case 'f':
71 noclose = 0;
72 break;
73 case 'p':
74 pidfile = optarg;
75 break;
67 switch (ch) {
68 case 'c':
69 nochdir = 0;
70 break;
71 case 'f':
72 noclose = 0;
73 break;
74 case 'p':
75 pidfile = optarg;
76 break;
77 case 'P':
78 ppidfile = optarg;
79 break;
76 case 'r':
77 restart = 1;
78 break;
79 case 'u':
80 user = optarg;
81 break;
82 default:
83 usage();
84 }
85 }
86 argc -= optind;
87 argv += optind;
88
89 if (argc == 0)
90 usage();
91
80 case 'r':
81 restart = 1;
82 break;
83 case 'u':
84 user = optarg;
85 break;
86 default:
87 usage();
88 }
89 }
90 argc -= optind;
91 argv += optind;
92
93 if (argc == 0)
94 usage();
95
92 pfh = NULL;
96 ppfh = pfh = NULL;
93 /*
94 * Try to open the pidfile before calling daemon(3),
95 * to be able to report the error intelligently
96 */
97 if (pidfile != NULL) {
98 pfh = pidfile_open(pidfile, 0600, &otherpid);
99 if (pfh == NULL) {
100 if (errno == EEXIST) {
101 errx(3, "process already running, pid: %d",
102 otherpid);
103 }
104 err(2, "pidfile ``%s''", pidfile);
105 }
106 }
97 /*
98 * Try to open the pidfile before calling daemon(3),
99 * to be able to report the error intelligently
100 */
101 if (pidfile != NULL) {
102 pfh = pidfile_open(pidfile, 0600, &otherpid);
103 if (pfh == NULL) {
104 if (errno == EEXIST) {
105 errx(3, "process already running, pid: %d",
106 otherpid);
107 }
108 err(2, "pidfile ``%s''", pidfile);
109 }
110 }
111
112 /* do same for actual daemon process */
113 if (ppidfile != NULL) {
114 ppfh = pidfile_open(ppidfile, 0600, &otherpid);
115 if (ppfh == NULL) {
116 if (errno == EEXIST) {
117 errx(3, "process already running, pid: %d",
118 otherpid);
119 }
120 err(2, "ppidfile ``%s''", ppidfile);
121 }
122 }
107
108 if (daemon(nochdir, noclose) == -1)
109 err(1, NULL);
110
111 /*
112 * If the pidfile or restart option is specified the daemon
113 * executes the command in a forked process and wait on child
114 * exit to remove the pidfile or restart the command. Normally
115 * we don't want the monitoring daemon to be terminated
116 * leaving the running process and the stale pidfile, so we
117 * catch SIGTERM and forward it to the children expecting to
118 * get SIGCHLD eventually.
119 */
120 pid = -1;
121 if (pidfile != NULL || restart) {
122 /*
123 * Restore default action for SIGTERM in case the
124 * parent process decided to ignore it.
125 */
126 if (signal(SIGTERM, SIG_DFL) == SIG_ERR)
127 err(1, "signal");
128 /*
129 * Because SIGCHLD is ignored by default, setup dummy handler
130 * for it, so we can mask it.
131 */
132 if (signal(SIGCHLD, dummy_sighandler) == SIG_ERR)
133 err(1, "signal");
134 /*
135 * Block interesting signals.
136 */
137 sigemptyset(&mask);
138 sigaddset(&mask, SIGTERM);
139 sigaddset(&mask, SIGCHLD);
140 if (sigprocmask(SIG_SETMASK, &mask, &oldmask) == -1)
141 err(1, "sigprocmask");
142 /*
143 * Try to protect against pageout kill. Ignore the
144 * error, madvise(2) will fail only if a process does
145 * not have superuser privileges.
146 */
147 (void)madvise(NULL, 0, MADV_PROTECT);
148restart:
149 /*
150 * Spawn a child to exec the command, so in the parent
151 * we could wait for it to exit and remove pidfile.
152 */
153 pid = fork();
154 if (pid == -1) {
155 pidfile_remove(pfh);
156 err(1, "fork");
157 }
158 }
159 if (pid <= 0) {
160 if (pid == 0) {
161 /* Restore old sigmask in the child. */
162 if (sigprocmask(SIG_SETMASK, &oldmask, NULL) == -1)
163 err(1, "sigprocmask");
164 }
165 /* Now that we are the child, write out the pid. */
166 pidfile_write(pfh);
167
168 if (user != NULL)
169 restrict_process(user);
170
171 execvp(argv[0], argv);
172
173 /*
174 * execvp() failed -- report the error. The child is
175 * now running, so the exit status doesn't matter.
176 */
177 err(1, "%s", argv[0]);
178 }
123
124 if (daemon(nochdir, noclose) == -1)
125 err(1, NULL);
126
127 /*
128 * If the pidfile or restart option is specified the daemon
129 * executes the command in a forked process and wait on child
130 * exit to remove the pidfile or restart the command. Normally
131 * we don't want the monitoring daemon to be terminated
132 * leaving the running process and the stale pidfile, so we
133 * catch SIGTERM and forward it to the children expecting to
134 * get SIGCHLD eventually.
135 */
136 pid = -1;
137 if (pidfile != NULL || restart) {
138 /*
139 * Restore default action for SIGTERM in case the
140 * parent process decided to ignore it.
141 */
142 if (signal(SIGTERM, SIG_DFL) == SIG_ERR)
143 err(1, "signal");
144 /*
145 * Because SIGCHLD is ignored by default, setup dummy handler
146 * for it, so we can mask it.
147 */
148 if (signal(SIGCHLD, dummy_sighandler) == SIG_ERR)
149 err(1, "signal");
150 /*
151 * Block interesting signals.
152 */
153 sigemptyset(&mask);
154 sigaddset(&mask, SIGTERM);
155 sigaddset(&mask, SIGCHLD);
156 if (sigprocmask(SIG_SETMASK, &mask, &oldmask) == -1)
157 err(1, "sigprocmask");
158 /*
159 * Try to protect against pageout kill. Ignore the
160 * error, madvise(2) will fail only if a process does
161 * not have superuser privileges.
162 */
163 (void)madvise(NULL, 0, MADV_PROTECT);
164restart:
165 /*
166 * Spawn a child to exec the command, so in the parent
167 * we could wait for it to exit and remove pidfile.
168 */
169 pid = fork();
170 if (pid == -1) {
171 pidfile_remove(pfh);
172 err(1, "fork");
173 }
174 }
175 if (pid <= 0) {
176 if (pid == 0) {
177 /* Restore old sigmask in the child. */
178 if (sigprocmask(SIG_SETMASK, &oldmask, NULL) == -1)
179 err(1, "sigprocmask");
180 }
181 /* Now that we are the child, write out the pid. */
182 pidfile_write(pfh);
183
184 if (user != NULL)
185 restrict_process(user);
186
187 execvp(argv[0], argv);
188
189 /*
190 * execvp() failed -- report the error. The child is
191 * now running, so the exit status doesn't matter.
192 */
193 err(1, "%s", argv[0]);
194 }
195 /* write out parent pidfile if needed */
196 if (ppidfile != NULL)
197 pidfile_write(ppfh);
198
179 setproctitle("%s[%d]", argv[0], pid);
180 if (wait_child(pid, &mask) == 0 && restart) {
181 sleep(1);
182 goto restart;
183 }
184 pidfile_remove(pfh);
199 setproctitle("%s[%d]", argv[0], pid);
200 if (wait_child(pid, &mask) == 0 && restart) {
201 sleep(1);
202 goto restart;
203 }
204 pidfile_remove(pfh);
205 pidfile_remove(ppfh);
185 exit(0); /* Exit status does not matter. */
186}
187
188static void
189dummy_sighandler(int sig __unused)
190{
191 /* Nothing to do. */
192}
193
194static void
195restrict_process(const char *user)
196{
197 struct passwd *pw = NULL;
198
199 pw = getpwnam(user);
200 if (pw == NULL)
201 errx(1, "unknown user: %s", user);
202
203 if (setusercontext(NULL, pw, pw->pw_uid, LOGIN_SETALL) != 0)
204 errx(1, "failed to set user environment");
205}
206
207static int
208wait_child(pid_t pid, sigset_t *mask)
209{
210 int terminate, signo;
211
212 terminate = 0;
213 for (;;) {
214 if (sigwait(mask, &signo) == -1) {
215 warn("sigwaitinfo");
216 return (-1);
217 }
218 switch (signo) {
219 case SIGCHLD:
220 if (waitpid(pid, NULL, WNOHANG) == -1) {
221 warn("waitpid");
222 return (-1);
223 }
224 return (terminate);
225 case SIGTERM:
226 terminate = 1;
227 if (kill(pid, signo) == -1) {
228 warn("kill");
229 return (-1);
230 }
231 continue;
232 default:
233 warnx("sigwaitinfo: invalid signal: %d", signo);
234 return (-1);
235 }
236 }
237}
238
239static void
240usage(void)
241{
242 (void)fprintf(stderr,
206 exit(0); /* Exit status does not matter. */
207}
208
209static void
210dummy_sighandler(int sig __unused)
211{
212 /* Nothing to do. */
213}
214
215static void
216restrict_process(const char *user)
217{
218 struct passwd *pw = NULL;
219
220 pw = getpwnam(user);
221 if (pw == NULL)
222 errx(1, "unknown user: %s", user);
223
224 if (setusercontext(NULL, pw, pw->pw_uid, LOGIN_SETALL) != 0)
225 errx(1, "failed to set user environment");
226}
227
228static int
229wait_child(pid_t pid, sigset_t *mask)
230{
231 int terminate, signo;
232
233 terminate = 0;
234 for (;;) {
235 if (sigwait(mask, &signo) == -1) {
236 warn("sigwaitinfo");
237 return (-1);
238 }
239 switch (signo) {
240 case SIGCHLD:
241 if (waitpid(pid, NULL, WNOHANG) == -1) {
242 warn("waitpid");
243 return (-1);
244 }
245 return (terminate);
246 case SIGTERM:
247 terminate = 1;
248 if (kill(pid, signo) == -1) {
249 warn("kill");
250 return (-1);
251 }
252 continue;
253 default:
254 warnx("sigwaitinfo: invalid signal: %d", signo);
255 return (-1);
256 }
257 }
258}
259
260static void
261usage(void)
262{
263 (void)fprintf(stderr,
243 "usage: daemon [-cfr] [-p pidfile] [-u user] command "
244 "arguments ...\n");
264 "usage: daemon [-cfr] [-p child_pidfile] [-P supervisor_pidfile] "
265 "[-u user]\n command arguments ...\n");
245 exit(1);
246}
266 exit(1);
267}