1 /******************************************************************************/
2 /* pfixtools: a collection of postfix related tools */
4 /* ________________________________________________________________________ */
6 /* Redistribution and use in source and binary forms, with or without */
7 /* modification, are permitted provided that the following conditions */
10 /* 1. Redistributions of source code must retain the above copyright */
11 /* notice, this list of conditions and the following disclaimer. */
12 /* 2. Redistributions in binary form must reproduce the above copyright */
13 /* notice, this list of conditions and the following disclaimer in the */
14 /* documentation and/or other materials provided with the distribution. */
15 /* 3. The names of its contributors may not be used to endorse or promote */
16 /* products derived from this software without specific prior written */
19 /* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND */
20 /* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE */
21 /* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR */
22 /* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS */
23 /* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR */
24 /* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF */
25 /* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS */
26 /* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN */
27 /* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) */
28 /* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF */
29 /* THE POSSIBILITY OF SUCH DAMAGE. */
30 /******************************************************************************/
33 * Copyright © 2007 Pierre Habouzit
34 * Copyright © 2008 Florent Bruneau
44 sig_atomic_t sigint = false;
45 sig_atomic_t sighup = false;
47 static FILE *pidfile = NULL;
49 void common_sighandler(int sig)
61 syslog(LOG_ERR, "Killed (got signal %d)...", sig);
66 static int setnonblock(int sock)
68 int res = fcntl(sock, F_GETFL);
75 if (fcntl(sock, F_SETFL, res | O_NONBLOCK) < 0) {
83 int tcp_bind(const struct sockaddr *addr, socklen_t len)
87 switch (addr->sa_family) {
89 unlink(((struct sockaddr_un *)addr)->sun_path);
90 sock = socket(PF_UNIX, SOCK_STREAM, 0);
93 sock = socket(PF_INET, SOCK_STREAM, 0);
96 sock = socket(PF_INET6, SOCK_STREAM, 0);
108 if (addr->sa_family != AF_UNIX) {
110 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &v, sizeof(v)) < 0) {
111 UNIXERR("setsockopt(SO_REUSEADDR)");
117 if (bind(sock, addr, len) < 0) {
126 int tcp_listen(const struct sockaddr *addr, socklen_t len)
128 int sock = tcp_bind(addr, len);
129 if (listen(sock, 0) < 0) {
137 int tcp_listen_nonblock(const struct sockaddr *addr, socklen_t len)
139 int sock = tcp_bind(addr, len);
140 if (setnonblock(sock)) {
144 if (listen(sock, 0) < 0) {
152 int accept_nonblock(int fd)
154 int sock = accept(fd, NULL, 0);
161 if (setnonblock(sock)) {
169 int xwrite(int fd, const char *s, size_t l)
172 int nb = write(fd, s, l);
174 if (errno == EINTR || errno == EAGAIN)
183 int daemon_detach(void)
188 close(STDOUT_FILENO);
189 close(STDERR_FILENO);
191 open("/dev/null", O_RDWR);
192 open("/dev/null", O_RDWR);
193 open("/dev/null", O_RDWR);
205 int drop_privileges(const char *user, const char *group)
212 gr = getgrnam(group);
230 int pidfile_open(const char *name)
233 pidfile = fopen(name, "w");
236 fprintf(pidfile, "%d\n", getpid());
237 return fflush(pidfile);
242 int pidfile_refresh(void)
246 ftruncate(fileno(pidfile), 0);
247 fprintf(pidfile, "%d\n", getpid());
248 return fflush(pidfile);
253 static void pidfile_close(void)
257 ftruncate(fileno(pidfile), 0);
263 int common_setup(const char* pidfilename, bool unsafe, const char* runas_user,
264 const char* runas_group, bool daemonize)
266 if (pidfile_open(pidfilename) < 0) {
267 syslog(LOG_CRIT, "unable to write pidfile %s", pidfilename);
271 if (!unsafe && drop_privileges(runas_user, runas_group) < 0) {
272 syslog(LOG_CRIT, "unable to drop privileges");
276 if (daemonize && daemon_detach() < 0) {
277 syslog(LOG_CRIT, "unable to fork");
285 extern initcall_t __madinit[];
286 extern exitcall_t __madexit[];
288 static void common_shutdown(void)
290 syslog(LOG_INFO, "Stopping...");
293 for (int i = -1; __madexit[i]; i--) {
298 static void __attribute__((__constructor__,__used__))
299 common_initialize(void)
301 if (atexit(common_shutdown)) {
302 fputs("Cannot hook my atexit function, quitting !\n", stderr);
306 for (int i = 0; __madinit[i]; i++) {
307 if ((*__madinit[i])()) {