1 /******************************************************************************/
2 /* pfixtools: a collection of postfix related tools */
4 /* ________________________________________________________________________ */
6 /* Redistribution and use in source and binary forms, with or without */
7 /* modification, are permitted provided that the following conditions */
10 /* 1. Redistributions of source code must retain the above copyright */
11 /* notice, this list of conditions and the following disclaimer. */
12 /* 2. Redistributions in binary form must reproduce the above copyright */
13 /* notice, this list of conditions and the following disclaimer in the */
14 /* documentation and/or other materials provided with the distribution. */
15 /* 3. The names of its contributors may not be used to endorse or promote */
16 /* products derived from this software without specific prior written */
19 /* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND */
20 /* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE */
21 /* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR */
22 /* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS */
23 /* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR */
24 /* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF */
25 /* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS */
26 /* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN */
27 /* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) */
28 /* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF */
29 /* THE POSSIBILITY OF SUCH DAMAGE. */
30 /******************************************************************************/
33 * Copyright © 2007 Pierre Habouzit
34 * Copyright © 2008 Florent Bruneau
44 sig_atomic_t sigint = false;
45 sig_atomic_t sighup = false;
47 bool daemon_process = true;
49 static FILE *pidfile = NULL;
51 void common_sighandler(int sig)
63 syslog(LOG_ERR, "Killed (got signal %d)...", sig);
68 static int setnonblock(int sock)
70 int res = fcntl(sock, F_GETFL);
77 if (fcntl(sock, F_SETFL, res | O_NONBLOCK) < 0) {
85 int tcp_bind(const struct sockaddr *addr, socklen_t len)
89 switch (addr->sa_family) {
91 unlink(((struct sockaddr_un *)addr)->sun_path);
92 sock = socket(PF_UNIX, SOCK_STREAM, 0);
95 sock = socket(PF_INET, SOCK_STREAM, 0);
98 sock = socket(PF_INET6, SOCK_STREAM, 0);
110 if (addr->sa_family != AF_UNIX) {
112 if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, &v, sizeof(v)) < 0) {
113 UNIXERR("setsockopt(SO_REUSEADDR)");
119 if (bind(sock, addr, len) < 0) {
128 int tcp_listen(const struct sockaddr *addr, socklen_t len)
130 int sock = tcp_bind(addr, len);
131 if (listen(sock, 0) < 0) {
139 int tcp_listen_nonblock(const struct sockaddr *addr, socklen_t len)
141 int sock = tcp_bind(addr, len);
142 if (setnonblock(sock)) {
146 if (listen(sock, 0) < 0) {
154 int accept_nonblock(int fd)
156 int sock = accept(fd, NULL, 0);
163 if (setnonblock(sock)) {
171 int xwrite(int fd, const char *s, size_t l)
174 int nb = write(fd, s, l);
176 if (errno == EINTR || errno == EAGAIN)
185 int daemon_detach(void)
190 close(STDOUT_FILENO);
191 close(STDERR_FILENO);
193 open("/dev/null", O_RDWR);
194 open("/dev/null", O_RDWR);
195 open("/dev/null", O_RDWR);
202 daemon_process = false;
210 int drop_privileges(const char *user, const char *group)
217 gr = getgrnam(group);
235 int pidfile_open(const char *name)
239 lock.l_type = F_WRLCK;
241 pidfile = fopen(name, "w");
244 if (fcntl(fileno(pidfile), F_SETLK, &lock) == -1) {
245 syslog(LOG_ERR, "program already started");
250 fprintf(pidfile, "%d\n", getpid());
251 return fflush(pidfile);
256 int pidfile_refresh(void)
260 ftruncate(fileno(pidfile), 0);
261 fprintf(pidfile, "%d\n", getpid());
262 return fflush(pidfile);
267 static void pidfile_close(void)
271 lock.l_type = F_UNLCK;
274 ftruncate(fileno(pidfile), 0);
275 fcntl(fileno(pidfile), F_SETLK, &lock);
281 int common_setup(const char* pidfilename, bool unsafe, const char* runas_user,
282 const char* runas_group, bool daemonize)
284 if (!unsafe && drop_privileges(runas_user, runas_group) < 0) {
285 syslog(LOG_CRIT, "unable to drop privileges");
289 if (daemonize && daemon_detach() < 0) {
290 syslog(LOG_CRIT, "unable to fork");
294 if (pidfile_open(pidfilename) < 0) {
295 syslog(LOG_CRIT, "unable to write pidfile %s", pidfilename);
303 extern initcall_t __madinit[];
304 extern exitcall_t __madexit[];
306 static void common_shutdown(void)
308 if (daemon_process) {
309 syslog(LOG_INFO, "Stopping...");
312 for (int i = -1; __madexit[i]; i--) {
317 static void __attribute__((__constructor__,__used__))
318 common_initialize(void)
320 if (atexit(common_shutdown)) {
321 fputs("Cannot hook my atexit function, quitting !\n", stderr);
325 for (int i = 0; __madinit[i]; i++) {
326 if ((*__madinit[i])()) {