blob: 87f7752a5f498d9e9587aba461013e389cb4fe1a [file] [log] [blame]
Scott James Remnant50748842006-05-16 21:02:31 +01001/* upstart
2 *
Scott James Remnante7138052010-02-04 00:41:25 -08003 * Copyright © 2010 Canonical Ltd.
Scott James Remnant7d5b2ea2009-05-22 15:20:12 +02004 * Author: Scott James Remnant <scott@netsplit.com>.
Scott James Remnant50748842006-05-16 21:02:31 +01005 *
Scott James Remnant0c0c5a52009-06-23 10:29:35 +01006 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2, as
Scott James Remnant75123022009-05-22 13:27:56 +02008 * published by the Free Software Foundation.
Scott James Remnant50748842006-05-16 21:02:31 +01009 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
Scott James Remnant0c0c5a52009-06-23 10:29:35 +010015 * You should have received a copy of the GNU General Public License along
16 * with this program; if not, write to the Free Software Foundation, Inc.,
17 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
Scott James Remnant50748842006-05-16 21:02:31 +010018 */
19
20#ifdef HAVE_CONFIG_H
21# include <config.h>
22#endif /* HAVE_CONFIG_H */
23
24
Scott James Remnantf43bdf32006-08-27 18:20:29 +010025#include <sys/types.h>
Scott James Remnantea806b72006-10-18 15:01:00 +010026#include <sys/time.h>
Scott James Remnantf43bdf32006-08-27 18:20:29 +010027#include <sys/wait.h>
28#include <sys/ioctl.h>
29#include <sys/reboot.h>
30#include <sys/resource.h>
Dmitry Torokhov164e5352016-06-08 16:16:35 -070031#include <sys/mount.h>
Scott James Remnantf43bdf32006-08-27 18:20:29 +010032
Luigi Semenzato94964962016-01-29 13:59:20 -080033#include <sys/stat.h>
34#include <fcntl.h>
35
Scott James Remnant3401ab72006-09-01 02:14:47 +010036#include <errno.h>
37#include <stdio.h>
Scott James Remnant91da63a2011-08-11 13:47:00 -070038#include <limits.h>
Scott James Remnantf43bdf32006-08-27 18:20:29 +010039#include <signal.h>
Scott James Remnant94d00982006-08-25 15:38:22 +020040#include <stdlib.h>
Scott James Remnant3401ab72006-09-01 02:14:47 +010041#include <string.h>
Scott James Remnant12a330f2006-08-24 02:19:09 +020042#include <syslog.h>
Scott James Remnant027dd7b2006-08-21 09:01:25 +020043#include <unistd.h>
44
Gwendal Grignou8c5b5292016-03-07 11:51:37 -080045#ifdef ADD_DIRCRYPTO_RING
Gwendal Grignou8c5b5292016-03-07 11:51:37 -080046#include <keyutils.h>
47#endif
48
Luigi Semenzato94964962016-01-29 13:59:20 -080049#ifdef HAVE_SELINUX
50#include <selinux/selinux.h>
Qijiang Fand677a9c2018-07-17 17:52:38 +090051#include <selinux/restorecon.h>
Luigi Semenzato94964962016-01-29 13:59:20 -080052#endif
53
Scott James Remnant097b2a92006-09-01 19:30:37 +010054#include <linux/kd.h>
55
Scott James Remnant77e8db32006-08-21 08:47:50 +020056#include <nih/macros.h>
57#include <nih/alloc.h>
58#include <nih/list.h>
59#include <nih/timer.h>
60#include <nih/signal.h>
61#include <nih/child.h>
Scott James Remnant3401ab72006-09-01 02:14:47 +010062#include <nih/option.h>
Scott James Remnant77e8db32006-08-21 08:47:50 +020063#include <nih/main.h>
Scott James Remnant28fcc922006-09-01 04:15:57 +010064#include <nih/error.h>
Scott James Remnant77e8db32006-08-21 08:47:50 +020065#include <nih/logging.h>
66
Scott James Remnantf2f69d02008-04-29 23:38:23 +010067#include "paths.h"
Dmitry Torokhov164e5352016-06-08 16:16:35 -070068#include "errors.h"
Scott James Remnant5d82d902008-04-30 00:03:29 +010069#include "events.h"
Scott James Remnantf2f69d02008-04-29 23:38:23 +010070#include "system.h"
Scott James Remnant91da63a2011-08-11 13:47:00 -070071#include "job_class.h"
Scott James Remnant63fd5c72008-04-30 21:34:31 +010072#include "job_process.h"
Scott James Remnant77e8db32006-08-21 08:47:50 +020073#include "event.h"
Scott James Remnant54b2a952007-06-10 22:15:24 +010074#include "conf.h"
Scott James Remnantf8491442008-04-18 13:19:24 +010075#include "control.h"
Scott James Remnant50748842006-05-16 21:02:31 +010076
77
Scott James Remnantf43bdf32006-08-27 18:20:29 +010078/* Prototypes for static functions */
Scott James Remnant9f62a8e2008-01-15 19:22:36 +000079#ifndef DEBUG
Scott James Remnant02977f82011-02-17 15:33:04 -080080static int logger_kmsg (NihLogLevel priority, const char *message);
Scott James Remnant16a286f2007-01-10 15:38:33 +000081static void crash_handler (int signum);
Scott James Remnant3401ab72006-09-01 02:14:47 +010082static void cad_handler (void *data, NihSignal *signal);
83static void kbd_handler (void *data, NihSignal *signal);
Scott James Remnant2c950692007-02-25 09:13:38 +000084static void pwr_handler (void *data, NihSignal *signal);
Scott James Remnant7ba2cf62007-06-10 22:20:38 +010085static void hup_handler (void *data, NihSignal *signal);
Scott James Remnante7138052010-02-04 00:41:25 -080086static void usr1_handler (void *data, NihSignal *signal);
Scott James Remnantf3ef5112008-06-05 01:26:10 +010087#endif /* DEBUG */
Scott James Remnant3401ab72006-09-01 02:14:47 +010088
Ricky Zhoubedce602016-02-16 23:45:19 -080089#ifdef HAVE_SELINUX
Dmitry Torokhov164e5352016-06-08 16:16:35 -070090static int initialize_selinux (void);
Ricky Zhoubedce602016-02-16 23:45:19 -080091#endif
92
Scott James Remnant3401ab72006-09-01 02:14:47 +010093/**
Scott James Remnant06abbec2007-03-09 13:02:38 +000094 * argv0:
95 *
96 * Path to program executed, used for re-executing the init binary from the
97 * same location we were executed from.
98 **/
99static const char *argv0 = NULL;
100
101/**
Scott James Remnant1db88042006-09-01 03:14:19 +0100102 * restart:
Scott James Remnant3401ab72006-09-01 02:14:47 +0100103 *
Scott James Remnant8b227402006-10-11 17:55:27 +0100104 * This is set to TRUE if we're being re-exec'd by an existing init
Scott James Remnant1db88042006-09-01 03:14:19 +0100105 * process.
Scott James Remnant3401ab72006-09-01 02:14:47 +0100106 **/
Scott James Remnant1db88042006-09-01 03:14:19 +0100107static int restart = FALSE;
Scott James Remnant3401ab72006-09-01 02:14:47 +0100108
109
110/**
111 * options:
112 *
113 * Command-line options we accept.
114 **/
115static NihOption options[] = {
Scott James Remnant1db88042006-09-01 03:14:19 +0100116 { 0, "restart", NULL, NULL, NULL, &restart, NULL },
Scott James Remnant3401ab72006-09-01 02:14:47 +0100117
118 /* Ignore invalid options */
119 { '-', "--", NULL, NULL, NULL, NULL, NULL },
120
121 NIH_OPTION_LAST
122};
Scott James Remnantff0d26a2006-08-31 20:49:43 +0100123
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100124
Scott James Remnant50748842006-05-16 21:02:31 +0100125int
126main (int argc,
127 char *argv[])
128{
Scott James Remnant3401ab72006-09-01 02:14:47 +0100129 char **args;
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700130 char *arg_end = NULL;
Scott James Remnant2e204b72007-02-03 23:15:28 +0000131 int ret;
Scott James Remnant50748842006-05-16 21:02:31 +0100132
Scott James Remnant06abbec2007-03-09 13:02:38 +0000133 argv0 = argv[0];
134 nih_main_init (argv0);
Scott James Remnant77e8db32006-08-21 08:47:50 +0200135
Scott James Remnant930e25a2006-10-13 12:28:05 +0100136 nih_option_set_synopsis (_("Process management daemon."));
Scott James Remnant462734c2006-10-13 13:36:00 +0100137 nih_option_set_help (
138 _("This daemon is normally executed by the kernel and given "
139 "process id 1 to denote its special status. When executed "
140 "by a user process, it will actually run /sbin/telinit."));
Scott James Remnanta6ed7eb2006-10-13 12:14:45 +0100141
Scott James Remnant3401ab72006-09-01 02:14:47 +0100142 args = nih_option_parser (NULL, argc, argv, options, FALSE);
143 if (! args)
144 exit (1);
Scott James Remnant12a330f2006-08-24 02:19:09 +0200145
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000146#ifndef DEBUG
Scott James Remnanta17917d2006-09-07 00:18:28 +0100147 /* Check we're root */
148 if (getuid ()) {
Scott James Remnant31421b72007-03-08 23:53:05 +0000149 nih_fatal (_("Need to be root"));
Scott James Remnanta17917d2006-09-07 00:18:28 +0100150 exit (1);
151 }
152
153 /* Check we're process #1 */
154 if (getpid () > 1) {
Scott James Remnante0d0dd12006-09-14 10:51:05 +0100155 execv (TELINIT, argv);
Scott James Remnanta17917d2006-09-07 00:18:28 +0100156 /* Ignore failure, probably just that telinit doesn't exist */
157
Scott James Remnant31421b72007-03-08 23:53:05 +0000158 nih_fatal (_("Not being executed as init"));
Scott James Remnanta17917d2006-09-07 00:18:28 +0100159 exit (1);
160 }
161
Scott James Remnant78626fb2007-01-10 16:48:10 +0000162 /* Clear our arguments from the command-line, so that we show up in
163 * ps or top output as /sbin/init, with no extra flags.
164 *
165 * This is a very Linux-specific trick; by deleting the NULL
166 * terminator at the end of the last argument, we fool the kernel
167 * into believing we used a setproctitle()-a-like to extend the
168 * argument space into the environment space, and thus make it use
169 * strlen() instead of its own assumed length. In fact, we've done
170 * the exact opposite, and shrunk the command line length to just that
171 * of whatever is in argv[0].
172 *
173 * If we don't do this, and just write \0 over the rest of argv, for
174 * example; the command-line length still includes those \0s, and ps
175 * will show whitespace in their place.
176 */
177 if (argc > 1) {
Scott James Remnant505f9282007-01-10 18:44:38 +0000178 arg_end = argv[argc-1] + strlen (argv[argc-1]);
179 *arg_end = ' ';
Scott James Remnant78626fb2007-01-10 16:48:10 +0000180 }
Scott James Remnant7f4db422007-01-09 20:51:08 +0000181
Scott James Remnantfa733382008-01-15 15:33:27 +0000182
183 /* Become the leader of a new session and process group, shedding
184 * any controlling tty (which we shouldn't have had anyway - but
185 * you never know what initramfs did).
Scott James Remnant2e204b72007-02-03 23:15:28 +0000186 */
187 setsid ();
Scott James Remnanta17917d2006-09-07 00:18:28 +0100188
Scott James Remnantfa733382008-01-15 15:33:27 +0000189 /* Set the standard file descriptors to the ordinary console device,
190 * resetting it to sane defaults unless we're inheriting from another
191 * init process which we know left it in a sane state.
Scott James Remnant77e8db32006-08-21 08:47:50 +0200192 */
Scott James Remnant93216182011-08-11 13:30:15 -0700193 if (system_setup_console (CONSOLE_OUTPUT, (! restart)) < 0) {
194 NihError *err;
195
196 err = nih_error_get ();
197 nih_warn ("%s: %s", _("Unable to initialize console, will try /dev/null"),
198 err->message);
199 nih_free (err);
200
201 if (system_setup_console (CONSOLE_NONE, FALSE) < 0) {
202 err = nih_error_get ();
203 nih_fatal ("%s: %s", _("Unable to initialize console as /dev/null"),
204 err->message);
205 nih_free (err);
206
207 exit (1);
208 }
209 }
Scott James Remnant77e8db32006-08-21 08:47:50 +0200210
Scott James Remnant2e204b72007-02-03 23:15:28 +0000211 /* Set the PATH environment variable */
212 setenv ("PATH", PATH, TRUE);
213
Scott James Remnantfa733382008-01-15 15:33:27 +0000214 /* Switch to the root directory in case we were started from some
215 * strange place, or worse, some directory in the initramfs that's
216 * going to go away soon.
217 */
Scott James Remnant5635e072008-05-06 23:22:58 +0100218 if (chdir ("/"))
219 nih_warn ("%s: %s", _("Unable to set root directory"),
220 strerror (errno));
Scott James Remnantd69c1da2010-02-26 15:29:07 +0000221
222 /* Mount the /proc and /sys filesystems, which are pretty much
223 * essential for any Linux system; not to mention used by
224 * ourselves.
225 */
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700226 if (system_mount ("proc", "/proc",
Mike Frysinger7506b642020-11-17 18:58:12 -0500227 MS_NODEV | MS_NOEXEC | MS_NOSUID, NULL) < 0) {
Scott James Remnantd69c1da2010-02-26 15:29:07 +0000228 NihError *err;
229
230 err = nih_error_get ();
231 nih_warn ("%s: %s", _("Unable to mount /proc filesystem"),
232 err->message);
233 nih_free (err);
234 }
235
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700236 if (system_mount ("sysfs", "/sys",
Mike Frysinger7506b642020-11-17 18:58:12 -0500237 MS_NODEV | MS_NOEXEC | MS_NOSUID, NULL) < 0) {
Scott James Remnantd69c1da2010-02-26 15:29:07 +0000238 NihError *err;
239
240 err = nih_error_get ();
241 nih_warn ("%s: %s", _("Unable to mount /sys filesystem"),
242 err->message);
243 nih_free (err);
244 }
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700245
Mike Frysinger7506b642020-11-17 18:58:12 -0500246 if (system_mount ("tmpfs", "/tmp", MS_NOSUID | MS_NODEV | MS_NOEXEC,
247 NULL) < 0) {
248 NihError *err;
249
250 err = nih_error_get ();
251 nih_warn ("%s: %s", _("Unable to mount /tmp filesystem"),
252 err->message);
253 nih_free (err);
254 }
255
Mike Frysingera6949cb2020-11-18 00:52:36 -0500256 if (system_mount ("tmpfs", "/run", MS_NOSUID | MS_NODEV | MS_NOEXEC,
257 "mode=0755") < 0) {
258 NihError *err;
259
260 err = nih_error_get ();
261 nih_warn ("%s: %s", _("Unable to mount /run filesystem"),
262 err->message);
263 nih_free (err);
264 }
265
Mike Frysinger0dda6d82020-11-24 23:09:06 -0500266 if ((mkdir ("/run/lock", 01777) < 0 && errno != EEXIST) ||
267 chmod ("/run/lock", 01777) < 0) {
Mike Frysingera6949cb2020-11-18 00:52:36 -0500268 NihError *err;
269
270 err = nih_error_get ();
271 nih_warn ("%s: %s", _("Unable to mkdir /run/lock"),
272 err->message);
273 nih_free (err);
274 }
275
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700276#ifdef HAVE_SELINUX
277 if (!getenv ("SELINUX_INIT")) {
278 /*
279 * We mount selinuxfs ourselves instead of letting
280 * libselinux do it so that our standard mount options
281 * (nosuid and noexec) will be applied. Note that
282 * we leave devices on since there is null device in
283 * selinuxfs.
284 */
285 if (system_mount ("selinuxfs", "/sys/fs/selinux",
Mike Frysinger7506b642020-11-17 18:58:12 -0500286 MS_NOEXEC | MS_NOSUID, NULL) < 0) {
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700287 NihError *err;
288
289 err = nih_error_get ();
290 nih_fatal ("%s: %s",
291 _("Unable to mount /sys/fs/selinux filesystem"),
292 err->message);
293 nih_free (err);
294
295 exit (1);
296 }
297
298 if (initialize_selinux () < 0) {
299 NihError *err;
300
301 err = nih_error_get ();
302 nih_fatal ("%s: %s",
303 _("Failed to initialize SELinux"),
304 err->message);
305 nih_free (err);
306
307 exit (1);
308 }
309
Qijiang Fand677a9c2018-07-17 17:52:38 +0900310 const char *restore_paths[] = RESTORE_PATHS;
311 for (size_t i = 0;
312 i < sizeof(restore_paths) / sizeof(const char *);
313 i++) {
314 const int restorecon_args = SELINUX_RESTORECON_RECURSE |
315 SELINUX_RESTORECON_REALPATH;
316 if (selinux_restorecon(restore_paths[i],
317 restorecon_args) != 0) {
318 nih_warn ("%s: %d",
319 _("Failed to restorecon"), errno);
320 // ignore error for now until policy are combined. exit(1);
321 }
322 }
323
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700324 putenv ("SELINUX_INIT=YES");
325 nih_info (_("SELinux policy loaded, doing self-exec"));
326
327 /* Unmangle argv and re-execute */
328 if (arg_end)
329 *arg_end = '\0';
330 execv (argv0, argv);
331
332 nih_fatal ("%s: %s",
333 _("Failed to re-exec init"),
334 strerror (errno));
335 exit (1);
336 }
337#endif
338
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000339#else /* DEBUG */
340 nih_log_set_priority (NIH_LOG_DEBUG);
James Hunt39f1c4f2010-12-13 18:15:24 +0000341 nih_debug ("Running as PID %d (PPID %d)",
342 (int)getpid (), (int)getppid ());
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000343#endif /* DEBUG */
Scott James Remnantfa733382008-01-15 15:33:27 +0000344
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800345#ifdef ADD_DIRCRYPTO_RING
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800346 /*
347 * Set a keyring for the session to hold ext4 crypto keys.
348 * The session is at the root of all processes, so any users who wish
349 * to access a directory protected by ext4 crypto can access the key.
350 *
Guenter Roecke4b59422019-11-01 09:51:30 -0700351 * Only set a session keyring if the kernel supports ext4 encryption.
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800352 */
Guenter Roecke4b59422019-11-01 09:51:30 -0700353 if (!access("/sys/fs/ext4/features/encryption", F_OK)) {
354 key_serial_t keyring_id;
355
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800356 keyring_id = add_key ("keyring", "dircrypt", 0, 0,
357 KEY_SPEC_SESSION_KEYRING);
Gwendal Grignoue44d1832017-02-03 13:07:36 -0800358 if (keyring_id == -1) {
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800359 nih_warn ("%s: %s",
360 _("Unable to create dircrypt keyring: %s"),
361 strerror (errno));
Gwendal Grignoue44d1832017-02-03 13:07:36 -0800362 } else {
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800363 keyctl_setperm(keyring_id,
364 KEY_POS_VIEW | KEY_POS_SEARCH |
365 KEY_POS_LINK | KEY_POS_READ |
366 KEY_USR_ALL);
Gwendal Grignoue44d1832017-02-03 13:07:36 -0800367 keyctl_setperm(KEY_SPEC_SESSION_KEYRING,
368 KEY_POS_VIEW | KEY_POS_SEARCH |
369 KEY_POS_LINK | KEY_POS_READ |
370 KEY_USR_ALL);
371 }
Gwendal Grignou8c5b5292016-03-07 11:51:37 -0800372 }
373#endif
Scott James Remnant2e204b72007-02-03 23:15:28 +0000374
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100375 /* Reset the signal state and install the signal handler for those
376 * signals we actually want to catch; this also sets those that
377 * can be sent to us, because we're special
378 */
Scott James Remnant4b56d6f2008-04-12 12:23:15 +0100379 if (! restart)
Scott James Remnant2e204b72007-02-03 23:15:28 +0000380 nih_signal_reset ();
381
Scott James Remnant2c0bd592008-04-12 12:31:49 +0100382#ifndef DEBUG
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000383 /* Catch fatal errors immediately rather than waiting for a new
Scott James Remnantfa733382008-01-15 15:33:27 +0000384 * iteration through the main loop.
385 */
386 nih_signal_set_handler (SIGSEGV, crash_handler);
387 nih_signal_set_handler (SIGABRT, crash_handler);
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000388#endif /* DEBUG */
Scott James Remnantfa733382008-01-15 15:33:27 +0000389
Scott James Remnant5c408432007-11-07 21:42:25 -0500390 /* Don't ignore SIGCHLD or SIGALRM, but don't respond to them
391 * directly; it's enough that they interrupt the main loop and
392 * get dealt with during it.
393 */
394 nih_signal_set_handler (SIGCHLD, nih_signal_handler);
395 nih_signal_set_handler (SIGALRM, nih_signal_handler);
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100396
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000397#ifndef DEBUG
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100398 /* Ask the kernel to send us SIGINT when control-alt-delete is
399 * pressed; generate an event with the same name.
400 */
401 reboot (RB_DISABLE_CAD);
Scott James Remnant5c408432007-11-07 21:42:25 -0500402 nih_signal_set_handler (SIGINT, nih_signal_handler);
Scott James Remnant5d702952007-01-05 17:21:34 +0000403 NIH_MUST (nih_signal_add_handler (NULL, SIGINT, cad_handler, NULL));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100404
405 /* Ask the kernel to send us SIGWINCH when alt-uparrow is pressed;
Scott James Remnant2c0bd592008-04-12 12:31:49 +0100406 * generate a keyboard-request event.
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100407 */
Scott James Remnant5c408432007-11-07 21:42:25 -0500408 if (ioctl (0, KDSIGACCEPT, SIGWINCH) == 0) {
409 nih_signal_set_handler (SIGWINCH, nih_signal_handler);
Scott James Remnant5d702952007-01-05 17:21:34 +0000410 NIH_MUST (nih_signal_add_handler (NULL, SIGWINCH,
411 kbd_handler, NULL));
Scott James Remnant5c408432007-11-07 21:42:25 -0500412 }
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100413
Scott James Remnant2c950692007-02-25 09:13:38 +0000414 /* powstatd sends us SIGPWR when it changes /etc/powerstatus */
Scott James Remnant5c408432007-11-07 21:42:25 -0500415 nih_signal_set_handler (SIGPWR, nih_signal_handler);
Scott James Remnant2c950692007-02-25 09:13:38 +0000416 NIH_MUST (nih_signal_add_handler (NULL, SIGPWR, pwr_handler, NULL));
417
Scott James Remnant7ba2cf62007-06-10 22:20:38 +0100418 /* SIGHUP instructs us to re-load our configuration */
Scott James Remnant5c408432007-11-07 21:42:25 -0500419 nih_signal_set_handler (SIGHUP, nih_signal_handler);
Scott James Remnant7ba2cf62007-06-10 22:20:38 +0100420 NIH_MUST (nih_signal_add_handler (NULL, SIGHUP, hup_handler, NULL));
Scott James Remnante7138052010-02-04 00:41:25 -0800421
422 /* SIGUSR1 instructs us to reconnect to D-Bus */
423 nih_signal_set_handler (SIGUSR1, nih_signal_handler);
424 NIH_MUST (nih_signal_add_handler (NULL, SIGUSR1, usr1_handler, NULL));
Scott James Remnantf3ef5112008-06-05 01:26:10 +0100425#endif /* DEBUG */
Scott James Remnant1db88042006-09-01 03:14:19 +0100426
Scott James Remnantfa733382008-01-15 15:33:27 +0000427
Scott James Remnant0eade492007-11-15 05:48:07 +0000428 /* Watch children for events */
Scott James Remnant5ebc6c62007-12-06 16:01:13 +0000429 NIH_MUST (nih_child_add_watch (NULL, -1, NIH_CHILD_ALL,
Scott James Remnant63fd5c72008-04-30 21:34:31 +0100430 job_process_handler, NULL));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100431
Scott James Remnant5c408432007-11-07 21:42:25 -0500432 /* Process the event queue each time through the main loop */
Scott James Remnanta39da0f2007-02-07 13:52:42 +0000433 NIH_MUST (nih_main_loop_add_func (NULL, (NihMainLoopCb)event_poll,
Scott James Remnant5d702952007-01-05 17:21:34 +0000434 NULL));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100435
Scott James Remnant94d00982006-08-25 15:38:22 +0200436
Scott James Remnant91da63a2011-08-11 13:47:00 -0700437 /* Adjust our OOM priority to the default, which will be inherited
438 * by all jobs.
439 */
440 if (JOB_DEFAULT_OOM_SCORE_ADJ) {
441 char filename[PATH_MAX];
442 int oom_value;
443 FILE *fd;
444
445 snprintf (filename, sizeof (filename),
446 "/proc/%d/oom_score_adj", getpid ());
447 oom_value = JOB_DEFAULT_OOM_SCORE_ADJ;
448 fd = fopen (filename, "w");
Scott James Remnant4c0fa532011-08-11 13:52:28 -0700449 if ((! fd) && (errno == ENOENT)) {
Scott James Remnant91da63a2011-08-11 13:47:00 -0700450 snprintf (filename, sizeof (filename),
451 "/proc/%d/oom_adj", getpid ());
452 oom_value = (JOB_DEFAULT_OOM_SCORE_ADJ
453 * ((JOB_DEFAULT_OOM_SCORE_ADJ < 0) ? 17 : 15)) / 1000;
454 fd = fopen (filename, "w");
455 }
456 if (! fd) {
457 nih_warn ("%s: %s", _("Unable to set default oom score"),
458 strerror (errno));
459 } else {
460 fprintf (fd, "%d\n", oom_value);
461
462 if (fclose (fd))
463 nih_warn ("%s: %s", _("Unable to set default oom score"),
464 strerror (errno));
465 }
466 }
467
468
Scott James Remnant54b2a952007-06-10 22:15:24 +0100469 /* Read configuration */
Scott James Remnant854fda22009-06-23 01:21:55 +0100470 NIH_MUST (conf_source_new (NULL, CONFFILE, CONF_FILE));
471 NIH_MUST (conf_source_new (NULL, CONFDIR, CONF_JOB_DIR));
Scott James Remnant54b2a952007-06-10 22:15:24 +0100472
473 conf_reload ();
Scott James Remnantd03c53c2007-03-13 19:13:19 +0000474
Scott James Remnant1ba7f7a2008-05-07 23:52:11 +0100475 /* Create a listening server for private connections. */
476 while (control_server_open () < 0) {
477 NihError *err;
478
479 err = nih_error_get ();
480 if (err->number != ENOMEM) {
481 nih_warn ("%s: %s", _("Unable to listen for private connections"),
482 err->message);
483 nih_free (err);
484 break;
485 }
486 nih_free (err);
487 }
488
Scott James Remnantf8491442008-04-18 13:19:24 +0100489 /* Open connection to the system bus; we normally expect this to
490 * fail and will try again later - don't let ENOMEM stop us though.
491 */
492 while (control_bus_open () < 0) {
493 NihError *err;
494 int number;
495
496 err = nih_error_get ();
497 number = err->number;
498 nih_free (err);
499
500 if (number != ENOMEM)
501 break;
502 }
503
Scott James Remnant2c0bd592008-04-12 12:31:49 +0100504#ifndef DEBUG
Scott James Remnantfa733382008-01-15 15:33:27 +0000505 /* Now that the startup is complete, send all further logging output
Scott James Remnant02977f82011-02-17 15:33:04 -0800506 * to kmsg instead of to the console.
Scott James Remnantfa733382008-01-15 15:33:27 +0000507 */
Scott James Remnant93216182011-08-11 13:30:15 -0700508 if (system_setup_console (CONSOLE_NONE, FALSE) < 0) {
509 NihError *err;
510
511 err = nih_error_get ();
512 nih_fatal ("%s: %s", _("Unable to setup standard file descriptors"),
513 err->message);
514 nih_free (err);
515
516 exit (1);
517 }
Scott James Remnant540dcfd2011-03-16 15:54:56 -0700518
Scott James Remnant02977f82011-02-17 15:33:04 -0800519 nih_log_set_logger (logger_kmsg);
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000520#endif /* DEBUG */
Scott James Remnantfa733382008-01-15 15:33:27 +0000521
522
Scott James Remnant3401ab72006-09-01 02:14:47 +0100523 /* Generate and run the startup event or read the state from the
524 * init daemon that exec'd us
525 */
Scott James Remnant4b56d6f2008-04-12 12:23:15 +0100526 if (! restart) {
Scott James Remnantd0258e02008-06-06 02:09:38 +0100527 NIH_MUST (event_new (NULL, STARTUP_EVENT, NULL));
Scott James Remnant3401ab72006-09-01 02:14:47 +0100528 } else {
Scott James Remnant1db88042006-09-01 03:14:19 +0100529 sigset_t mask;
530
Scott James Remnant1db88042006-09-01 03:14:19 +0100531 /* We're ok to receive signals again */
532 sigemptyset (&mask);
533 sigprocmask (SIG_SETMASK, &mask, NULL);
Scott James Remnant3401ab72006-09-01 02:14:47 +0100534 }
535
Scott James Remnantfa733382008-01-15 15:33:27 +0000536 /* Run through the loop at least once to deal with signals that were
537 * delivered to the previous process while the mask was set or to
538 * process the startup event we emitted.
539 */
Scott James Remnanta39da0f2007-02-07 13:52:42 +0000540 nih_main_loop_interrupt ();
Scott James Remnant77e8db32006-08-21 08:47:50 +0200541 ret = nih_main_loop ();
542
543 return ret;
Scott James Remnant50748842006-05-16 21:02:31 +0100544}
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100545
546
Scott James Remnant9f62a8e2008-01-15 19:22:36 +0000547#ifndef DEBUG
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100548/**
Scott James Remnant02977f82011-02-17 15:33:04 -0800549 * logger_kmsg:
550 * @priority: priority of message being logged,
551 * @message: message to log.
552 *
553 * Outputs the @message to the kernel log message socket prefixed with an
554 * appropriate tag based on @priority, the program name and terminated with
555 * a new line.
556 *
557 * Returns: zero on success, negative value on error.
558 **/
559static int
560logger_kmsg (NihLogLevel priority,
561 const char *message)
562{
563 int tag;
564 FILE *kmsg;
565
566 nih_assert (message != NULL);
567
568 switch (priority) {
569 case NIH_LOG_DEBUG:
570 tag = '7';
571 break;
572 case NIH_LOG_INFO:
573 tag = '6';
574 break;
575 case NIH_LOG_MESSAGE:
576 tag = '5';
577 break;
578 case NIH_LOG_WARN:
579 tag = '4';
580 break;
581 case NIH_LOG_ERROR:
582 tag = '3';
583 break;
584 case NIH_LOG_FATAL:
585 tag = '2';
586 break;
587 default:
588 tag = 'd';
589 }
590
591 kmsg = fopen ("/dev/kmsg", "w");
592 if (! kmsg)
593 return -1;
594
595 if (fprintf (kmsg, "<%c>%s: %s\n", tag, program_name, message) < 0) {
596 int saved_errno = errno;
597 fclose (kmsg);
598 errno = saved_errno;
599 return -1;
600 }
601
602 if (fclose (kmsg) < 0)
603 return -1;
604
605 return 0;
606}
607
608
609/**
Scott James Remnant16a286f2007-01-10 15:38:33 +0000610 * crash_handler:
Scott James Remnant8b227402006-10-11 17:55:27 +0100611 * @signum: signal number received.
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100612 *
Scott James Remnant16a286f2007-01-10 15:38:33 +0000613 * Handle receiving the SEGV or ABRT signal, usually caused by one of
614 * our own mistakes. We deal with it by dumping core in a child process
Scott James Remnant4b56d6f2008-04-12 12:23:15 +0100615 * and then killing the parent.
Scott James Remnant16a286f2007-01-10 15:38:33 +0000616 *
Scott James Remnant4b56d6f2008-04-12 12:23:15 +0100617 * Sadly there's no real alternative to the ensuing kernel panic. Our
618 * state is likely in tatters, so we can't sigjmp() anywhere "safe" or
619 * re-exec since the system will be suddenly lobotomised. We definitely
620 * don't want to start a root shell or anything like that. Best thing is
621 * to just stop the whole thing and hope that bug report comes quickly.
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100622 **/
623static void
Scott James Remnant16a286f2007-01-10 15:38:33 +0000624crash_handler (int signum)
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100625{
Scott James Remnant4b56d6f2008-04-12 12:23:15 +0100626 pid_t pid;
Scott James Remnant06abbec2007-03-09 13:02:38 +0000627
628 nih_assert (argv0 != NULL);
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100629
630 pid = fork ();
631 if (pid == 0) {
632 struct sigaction act;
633 struct rlimit limit;
634 sigset_t mask;
635
636 /* Mask out all signals */
637 sigfillset (&mask);
638 sigprocmask (SIG_SETMASK, &mask, NULL);
639
Scott James Remnant16a286f2007-01-10 15:38:33 +0000640 /* Set the handler to the default so core is dumped */
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100641 act.sa_handler = SIG_DFL;
642 act.sa_flags = 0;
643 sigemptyset (&act.sa_mask);
Scott James Remnant16a286f2007-01-10 15:38:33 +0000644 sigaction (signum, &act, NULL);
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100645
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100646 /* Don't limit the core dump size */
647 limit.rlim_cur = RLIM_INFINITY;
648 limit.rlim_max = RLIM_INFINITY;
649 setrlimit (RLIMIT_CORE, &limit);
650
Scott James Remnantfa733382008-01-15 15:33:27 +0000651 /* Dump in the root directory */
Scott James Remnant9d736bb2009-07-21 18:15:20 +0100652 if (chdir ("/"))
653 nih_warn ("%s: %s", _("Unable to set root directory"),
654 strerror (errno));
Scott James Remnantfa733382008-01-15 15:33:27 +0000655
Scott James Remnant16a286f2007-01-10 15:38:33 +0000656 /* Raise the signal again */
657 raise (signum);
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100658
659 /* Unmask so that we receive it */
Scott James Remnant16a286f2007-01-10 15:38:33 +0000660 sigdelset (&mask, signum);
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100661 sigprocmask (SIG_SETMASK, &mask, NULL);
662
663 /* Wait for death */
664 pause ();
665 exit (0);
666 } else if (pid > 0) {
667 /* Wait for the core to be generated */
668 waitpid (pid, NULL, 0);
669
Scott James Remnant31421b72007-03-08 23:53:05 +0000670 nih_fatal (_("Caught %s, core dumped"),
Scott James Remnantde443012007-01-10 18:45:40 +0000671 (signum == SIGSEGV
672 ? "segmentation fault" : "abort"));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100673 } else {
Scott James Remnant31421b72007-03-08 23:53:05 +0000674 nih_fatal (_("Caught %s, unable to dump core"),
Scott James Remnantde443012007-01-10 18:45:40 +0000675 (signum == SIGSEGV
676 ? "segmentation fault" : "abort"));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100677 }
Scott James Remnant502ea702007-03-05 20:47:18 +0000678
Scott James Remnant4b56d6f2008-04-12 12:23:15 +0100679 /* Goodbye, cruel world. */
680 exit (signum);
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100681}
682
683/**
684 * cad_handler:
685 * @data: unused,
686 * @signal: signal that called this handler.
687 *
688 * Handle having recieved the SIGINT signal, sent to us when somebody
689 * presses Ctrl-Alt-Delete on the console. We just generate a
Scott James Remnantbb3cc3f2006-09-08 17:17:47 +0100690 * ctrlaltdel event.
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100691 **/
692static void
693cad_handler (void *data,
694 NihSignal *signal)
695{
Scott James Remnantd0258e02008-06-06 02:09:38 +0100696 NIH_MUST (event_new (NULL, CTRLALTDEL_EVENT, NULL));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100697}
698
699/**
700 * kbd_handler:
701 * @data: unused,
702 * @signal: signal that called this handler.
703 *
704 * Handle having recieved the SIGWINCH signal, sent to us when somebody
705 * presses Alt-UpArrow on the console. We just generate a
706 * kbdrequest event.
707 **/
708static void
709kbd_handler (void *data,
710 NihSignal *signal)
711{
Scott James Remnantd0258e02008-06-06 02:09:38 +0100712 NIH_MUST (event_new (NULL, KBDREQUEST_EVENT, NULL));
Scott James Remnantf43bdf32006-08-27 18:20:29 +0100713}
Scott James Remnanteabb7802006-08-31 15:39:04 +0100714
715/**
Scott James Remnant2c950692007-02-25 09:13:38 +0000716 * pwr_handler:
717 * @data: unused,
718 * @signal: signal that called this handler.
719 *
720 * Handle having recieved the SIGPWR signal, sent to us when powstatd
721 * changes the /etc/powerstatus file. We just generate a
722 * power-status-changed event and jobs read the file.
723 **/
724static void
725pwr_handler (void *data,
726 NihSignal *signal)
727{
Scott James Remnantd0258e02008-06-06 02:09:38 +0100728 NIH_MUST (event_new (NULL, PWRSTATUS_EVENT, NULL));
Scott James Remnant2c950692007-02-25 09:13:38 +0000729}
730
731/**
Scott James Remnant7ba2cf62007-06-10 22:20:38 +0100732 * hup_handler:
733 * @data: unused,
734 * @signal: signal that called this handler.
735 *
736 * Handle having recieved the SIGHUP signal, which we use to instruct us to
737 * reload our configuration.
738 **/
739static void
740hup_handler (void *data,
741 NihSignal *signal)
742{
743 nih_info (_("Reloading configuration"));
744 conf_reload ();
Scott James Remnante7138052010-02-04 00:41:25 -0800745}
Scott James Remnant911cb2e2009-07-08 22:40:50 +0100746
Scott James Remnante7138052010-02-04 00:41:25 -0800747/**
748 * usr1_handler:
749 * @data: unused,
750 * @signal: signal that called this handler.
751 *
752 * Handle having recieved the SIGUSR signal, which we use to instruct us to
753 * reconnect to D-Bus.
754 **/
755static void
756usr1_handler (void *data,
757 NihSignal *signal)
758{
Scott James Remnant911cb2e2009-07-08 22:40:50 +0100759 if (! control_bus) {
760 nih_info (_("Reconnecting to system bus"));
761
762 if (control_bus_open () < 0) {
763 NihError *err;
764
765 err = nih_error_get ();
766 nih_warn ("%s: %s", _("Unable to connect to the system bus"),
767 err->message);
768 nih_free (err);
769 }
770 }
Scott James Remnant7ba2cf62007-06-10 22:20:38 +0100771}
Scott James Remnantf3ef5112008-06-05 01:26:10 +0100772#endif /* DEBUG */
Ricky Zhoubedce602016-02-16 23:45:19 -0800773
774#ifdef HAVE_SELINUX
775/**
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700776 * selinux_set_checkreqprot:
777 *
778 * Forces /sys/fs/selinux/checkreqprot to 0 to ensure that
779 * SELinux will check the protection for mmap and mprotect
780 * calls that will be applied by the kernel and not the
781 * one requested by the application.
782 **/
783static int selinux_set_checkreqprot (void)
784{
785 static const char path[] = "/sys/fs/selinux/checkreqprot";
786 FILE *checkreqprot_file;
787
788 checkreqprot_file = fopen (path, "w");
789 if (!checkreqprot_file)
790 nih_return_system_error (-1);
791
792 if (fputc ('0', checkreqprot_file) == EOF)
793 nih_return_system_error (-1);
794
795 if (fclose (checkreqprot_file) != 0)
796 nih_return_system_error (-1);
797
798 return 0;
799}
800
801/**
Ricky Zhoubedce602016-02-16 23:45:19 -0800802 * initialize_selinux:
803 *
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700804 * Loads an SELinux policy.
Ricky Zhoubedce602016-02-16 23:45:19 -0800805 **/
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700806static int initialize_selinux (void)
Ricky Zhoubedce602016-02-16 23:45:19 -0800807{
808 int enforce = 0;
Ricky Zhoubedce602016-02-16 23:45:19 -0800809
Ricky Zhoubedce602016-02-16 23:45:19 -0800810 if (selinux_init_load_policy (&enforce) != 0) {
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700811 nih_warn (_("SELinux policy failed to load"));
Ricky Zhoubedce602016-02-16 23:45:19 -0800812 if (enforce > 0) {
813 /* Enforcing mode, must quit. */
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700814 nih_return_error (-1, SELINUX_POLICY_LOAD_FAIL,
815 _(SELINUX_POLICY_LOAD_FAIL_STR));
Ricky Zhoubedce602016-02-16 23:45:19 -0800816 }
817 }
818
Dmitry Torokhov164e5352016-06-08 16:16:35 -0700819 return selinux_set_checkreqprot ();
Ricky Zhoubedce602016-02-16 23:45:19 -0800820}
821#endif /* HAVE_SELINUX */