| /*****************************************************************************\ |
| * daemonize.c - daemonization routine |
| ***************************************************************************** |
| * Copyright (C) 2002 The Regents of the University of California. |
| * Produced at Lawrence Livermore National Laboratory (cf, DISCLAIMER). |
| * Written by Mark A. Grondona <mgrondona@llnl.gov>. |
| * CODE-OCEC-09-009. All rights reserved. |
| * |
| * This file is part of Slurm, a resource management program. |
| * For details, see <https://slurm.schedmd.com/>. |
| * Please also read the included file: DISCLAIMER. |
| * |
| * Slurm is free software; you can redistribute it and/or modify it under |
| * the terms of the GNU General Public License as published by the Free |
| * Software Foundation; either version 2 of the License, or (at your option) |
| * any later version. |
| * |
| * In addition, as a special exception, the copyright holders give permission |
| * to link the code of portions of this program with the OpenSSL library under |
| * certain conditions as described in each individual source file, and |
| * distribute linked combinations including the two. You must obey the GNU |
| * General Public License in all respects for all of the code used other than |
| * OpenSSL. If you modify file(s) with this exception, you may extend this |
| * exception to your version of the file(s), but you are not obligated to do |
| * so. If you do not wish to do so, delete this exception statement from your |
| * version. If you delete this exception statement from all source files in |
| * the program, then also delete it here. |
| * |
| * Slurm is distributed in the hope that it will be useful, but WITHOUT ANY |
| * WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
| * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more |
| * details. |
| * |
| * You should have received a copy of the GNU General Public License along |
| * with Slurm; if not, write to the Free Software Foundation, Inc., |
| * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
| \*****************************************************************************/ |
| |
| #include <config.h> |
| |
| #define _GNU_SOURCE |
| |
| #include <fcntl.h> |
| #include <grp.h> |
| #include <sys/resource.h> |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| |
| #include "src/common/daemonize.h" |
| #include "src/common/fd.h" |
| #include "src/common/log.h" |
| #include "src/common/macros.h" |
| #include "src/common/uid.h" |
| #include "src/common/xassert.h" |
| #include "src/common/read_config.h" |
| |
| /* |
| * Double-fork and go into background. |
| * Caller is responsible for umasks |
| */ |
| int xdaemon(void) |
| { |
| int devnull; |
| |
| switch (fork()) { |
| case 0 : break; /* child */ |
| case -1 : return -1; |
| default : _exit(0); /* exit parent */ |
| } |
| |
| if (setsid() < 0) |
| return -1; |
| |
| switch (fork()) { |
| case 0 : break; /* child */ |
| case -1: return -1; |
| default: _exit(0); /* exit parent */ |
| } |
| |
| /* |
| * dup stdin, stdout, and stderr onto /dev/null |
| */ |
| devnull = open("/dev/null", O_RDWR); |
| if (devnull < 0) |
| error("Unable to open /dev/null: %m"); |
| if (dup2(devnull, STDIN_FILENO) < 0) |
| error("Unable to dup /dev/null onto stdin: %m"); |
| if (dup2(devnull, STDOUT_FILENO) < 0) |
| error("Unable to dup /dev/null onto stdout: %m"); |
| if (dup2(devnull, STDERR_FILENO) < 0) |
| error("Unable to dup /dev/null onto stderr: %m"); |
| if (close(devnull) < 0) |
| error("Unable to close /dev/null: %m"); |
| |
| return 0; |
| } |
| |
| /* |
| * Read and return pid stored in pidfile. |
| * Returns 0 if file doesn't exist or pid cannot be read. |
| * If pidfd != NULL, the file will be kept open and the fd |
| * returned. |
| */ |
| pid_t |
| read_pidfile(const char *pidfile, int *pidfd) |
| { |
| int fd; |
| FILE *fp = NULL; |
| unsigned long pid; |
| pid_t lpid; |
| |
| if ((fd = open(pidfile, O_RDONLY)) < 0) |
| return ((pid_t) 0); |
| |
| if (!(fp = fdopen(fd, "r"))) { |
| error ("Unable to access old pidfile at `%s': %m", pidfile); |
| (void) close(fd); |
| return ((pid_t) 0); |
| } |
| |
| if (fscanf(fp, "%lu", &pid) < 1) { |
| error ("Possible corrupt pidfile `%s'", pidfile); |
| (void) close(fd); |
| return ((pid_t) 0); |
| } |
| |
| if ((lpid = fd_is_read_lock_blocked(fd)) == (pid_t) 0) { |
| verbose ("pidfile not locked, assuming no running daemon"); |
| (void) close(fd); |
| return ((pid_t) 0); |
| } |
| |
| if (lpid != (pid_t) pid) |
| fatal ("pidfile locked by %lu but contains pid=%lu", |
| (unsigned long) lpid, (unsigned long) pid); |
| |
| if (pidfd != NULL) |
| *pidfd = fd; |
| else |
| (void) close(fd); |
| |
| /* fclose(fp); NOTE: DO NOT CLOSE, "fd" CONTAINS FILE DESCRIPTOR */ |
| return (lpid); |
| } |
| |
| |
| |
| int |
| create_pidfile(const char *pidfile, uid_t uid) |
| { |
| FILE *fp; |
| int fd; |
| |
| xassert(pidfile != NULL); |
| xassert(pidfile[0] == '/'); |
| |
| fd = open(pidfile, O_CREAT | O_WRONLY | O_TRUNC | O_CLOEXEC, |
| S_IRUSR | S_IWUSR | S_IRGRP | S_IROTH); |
| if (fd < 0) { |
| error("Unable to open pidfile `%s': %m", pidfile); |
| return -1; |
| } |
| |
| if (!(fp = fdopen(fd, "w"))) { |
| error("Unable to access pidfile at `%s': %m", pidfile); |
| (void) close(fd); |
| return -1; |
| } |
| |
| if (fd_get_write_lock(fd) < 0) { |
| error ("Unable to lock pidfile `%s': %m", pidfile); |
| goto error; |
| } |
| |
| if (fprintf(fp, "%lu\n", (unsigned long) getpid()) == EOF) { |
| error("Unable to write to pidfile `%s': %m", pidfile); |
| goto error; |
| } |
| |
| fflush(fp); |
| |
| if (uid && (fchown(fd, uid, -1) < 0)) |
| error ("Unable to reset owner of pidfile: %m"); |
| |
| /* fclose(fp); NOTE: DO NOT CLOSE, "fd" CONTAINS FILE DESCRIPTOR */ |
| return fd; |
| |
| error: |
| (void)fclose(fp); /* Ignore errors */ |
| |
| if (unlink(pidfile) < 0) |
| error("Unable to remove pidfile `%s': %m", pidfile); |
| return -1; |
| } |
| |
| static void _wait_for_pidfile_lock(int fd) |
| { |
| int rc; |
| bool retried = false; |
| |
| /* Need to wait for parent process to exit */ |
| while (((rc = fd_get_write_lock(fd)) < 0) && |
| ((errno == EAGAIN) || (errno == EACCES))) { |
| if (!retried) { |
| debug("%s: failed to lock slurmctld's pidfile, retrying", |
| __func__); |
| retried = true; |
| } |
| usleep(10000); |
| } |
| if (rc) |
| error ("Unable to lock pidfile: %m"); |
| } |
| |
| extern int update_pidfile(int fd) |
| { |
| FILE *fp; |
| |
| _wait_for_pidfile_lock(fd); |
| |
| if (!(fp = fdopen(fd, "w"))) { |
| error("Unable to access pidfd=%d: %m", fd); |
| return -1; |
| } |
| |
| rewind(fp); |
| |
| if (fprintf(fp, "%lu\n", (unsigned long) getpid()) == EOF) { |
| error("Unable to write to pidfd=%d: %m", fd); |
| return -1; |
| } |
| |
| fflush(fp); |
| |
| /* WARNING: Do not close fp, it would close fd as well. */ |
| return fd; |
| } |
| |
| void |
| test_core_limit(void) |
| { |
| #ifdef RLIMIT_CORE |
| struct rlimit rlim[1]; |
| if (getrlimit(RLIMIT_CORE, rlim) < 0) |
| error("Unable to get core limit"); |
| else if (rlim->rlim_cur != RLIM_INFINITY) { |
| rlim->rlim_cur /= 1024; /* bytes to KB */ |
| if (rlim->rlim_cur < 2048) { |
| warning("Core limit is only %ld KB", |
| (long int) rlim->rlim_cur); |
| } |
| } |
| #endif |
| return; |
| } |
| |
| extern void become_slurm_user(void) |
| { |
| gid_t slurm_user_gid; |
| |
| /* Determine SlurmUser gid */ |
| slurm_user_gid = gid_from_uid(slurm_conf.slurm_user_id); |
| if (slurm_user_gid == (gid_t) -1) { |
| fatal("Failed to determine gid of SlurmUser(%u)", |
| slurm_conf.slurm_user_id); |
| } |
| |
| /* Initialize supplementary groups ID list for SlurmUser */ |
| if (getuid() == 0) { |
| /* root does not need supplementary groups */ |
| if ((slurm_conf.slurm_user_id == 0) && |
| (setgroups(0, NULL) != 0)) { |
| fatal("Failed to drop supplementary groups, " |
| "setgroups: %m"); |
| } else if ((slurm_conf.slurm_user_id != 0) && |
| initgroups(slurm_conf.slurm_user_name, |
| slurm_user_gid)) { |
| fatal("Failed to set supplementary groups, " |
| "initgroups: %m"); |
| } |
| } |
| |
| /* Set GID to GID of SlurmUser */ |
| if ((slurm_user_gid != getegid()) && |
| (setgid(slurm_user_gid))) { |
| fatal("Failed to set GID to %u", slurm_user_gid); |
| } |
| |
| /* Set UID to UID of SlurmUser */ |
| if ((slurm_conf.slurm_user_id != getuid()) && |
| (setuid(slurm_conf.slurm_user_id))) { |
| fatal("Can not set uid to SlurmUser(%u): %m", |
| slurm_conf.slurm_user_id); |
| } |
| } |