1 /* Copyright (C) 2009-2014, Martin Johansson <martin@fatbob.nu>
2 Copyright (C) 2005-2014, Thorvald Natvig <thorvald@natvig.com>
6 Redistribution and use in source and binary forms, with or without
7 modification, are permitted provided that the following conditions
10 - Redistributions of source code must retain the above copyright notice,
11 this list of conditions and the following disclaimer.
12 - Redistributions in binary form must reproduce the above copyright notice,
13 this list of conditions and the following disclaimer in the documentation
14 and/or other materials provided with the distribution.
15 - Neither the name of the Developers nor the names of its contributors may
16 be used to endorse or promote products derived from this software without
17 specific prior written permission.
19 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20 ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22 A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR
23 CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
24 EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
25 PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
26 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
27 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
28 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
29 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
34 #include <sys/types.h>
36 #include <sys/utsname.h>
44 #ifdef _POSIX_PRIORITY_SCHEDULING
45 #if (_POSIX_PRIORITY_SCHEDULING > 0)
46 #define POSIX_PRIORITY_SCHEDULING
59 char system_string[64], version_string[64];
65 void lockfile(const char *pidfile)
70 /* Don't use O_TRUNC here -- we want to leave the PID file
71 * unmodified if we cannot lock it.
73 lfp = open(pidfile, O_WRONLY|O_CREAT, 0640);
76 Log_fatal("Cannot open PID-file %s for writing", pidfile);
78 /* Try to lock the file. */
79 if (lockf(lfp, F_TLOCK, 0) < 0) {
82 if (errno == EACCES || errno == EAGAIN)
83 Log_fatal("PID file is locked -- uMurmur already running?");
85 Log_fatal("Cannot lock PID file: %s", strerror(errno));
88 /* Now that we locked the file, erase its contents. */
89 if (ftruncate(lfp, 0) < 0) {
91 Log_fatal("Cannot truncate PID file: %s", strerror(errno));
94 snprintf(str,16,"%d\n", getpid());
95 (void)write(lfp, str, strlen(str)); /* record pid to lockfile */
96 Log_info("PID-file: %s", pidfile);
98 /* If uMurmur ever starts to fork()+exec(), we don't want it to
99 * leak the fd to the forked process though. Set the close-on-exec
100 * flag to prevent leakage.
102 flags = fcntl(lfp, F_GETFD, 0);
104 fcntl(lfp, F_SETFD, (long) flags);
106 /* Don't close(lfp) here!
107 * We want the fd to remain opened so the lock is held until the
113 /* Drops privileges (if configured to do so). */
114 static void switch_user(void)
117 struct group *grp = NULL;
118 const char *username, *groupname;
121 username = getStrConf(USERNAME);
122 groupname = getStrConf(GROUPNAME);
125 /* It's an error to specify groupname
126 * but leave username empty.
129 Log_fatal("username missing");
135 pwd = getpwnam(username);
137 Log_fatal("Unknown user '%s'", username);
142 grp = getgrnam(groupname);
145 Log_fatal("Unknown group '%s'", groupname);
150 if (initgroups(pwd->pw_name, gid))
151 Log_fatal("initgroups() failed: %s", strerror(errno));
154 Log_fatal("setgid() failed: %s", strerror(errno));
156 if (setuid(pwd->pw_uid))
157 Log_fatal("setuid() failed: %s", strerror(errno));
162 Log_fatal("getgrgid() failed: %s", strerror(errno));
164 Log_info("Switch to user '%s' group '%s'", pwd->pw_name, grp->gr_name);
167 void signal_handler(int sig)
171 Log_info("HUP signal received.");
175 Log_info("TERM signal. Shutting down.");
186 return; /* already a daemon */
189 fprintf(stderr, "Fork error. Exiting\n");
190 exit(1); /* fork error */
193 exit(0); /* parent exits */
195 /* child (daemon) continues */
196 setsid(); /* obtain a new process group */
197 for (i = getdtablesize(); i >= 0; --i)
198 close(i); /* close all descriptors */
200 i = open("/dev/null",O_RDWR);
204 umask(027); /* set newly created file permissions */
209 #ifdef POSIX_PRIORITY_SCHEDULING
213 struct sched_param sp;
215 sp.sched_priority = sched_get_priority_min(SCHED_RR); /* Should suffice */
216 Log_info("Setting SCHED_RR prio %d", sp.sched_priority);
217 rc = sched_setscheduler(0, SCHED_RR, &sp);
219 Log_warn("Failed to set scheduler: %s", strerror(errno));
225 printf("uMurmur version %s ('%s'). Mumble protocol %d.%d.%d\n", UMURMUR_VERSION,
226 UMURMUR_CODENAME, PROTVER_MAJOR, PROTVER_MINOR, PROTVER_PATCH);
227 printf("Usage: umurmurd [-d] [-r] [-h] [-p <pidfile>] [-t] [-c <conf file>] [-a <addr>] [-b <port>]\n");
228 printf(" -d - Do not daemonize - run in foreground.\n");
229 #ifdef POSIX_PRIORITY_SCHEDULING
230 printf(" -r - Run with realtime priority\n");
232 printf(" -p <pidfile> - Write PID to this file\n");
233 printf(" -c <conf file> - Specify configuration file (default %s)\n", DEFAULT_CONFIG);
234 printf(" -t - Test config. Error message to stderr + non-zero exit code on error\n");
235 printf(" -a <address> - Bind to IP address\n");
236 printf(" -A <address> - Bind to IPv6 address\n");
237 printf(" -b <port> - Bind to port\n");
238 printf(" -B <port> - Bind to port (IPv6)\n");
239 printf(" -h - Print this help\n");
243 int main(int argc, char **argv)
245 bool_t nodaemon = false;
246 #ifdef POSIX_PRIORITY_SCHEDULING
247 bool_t realtime = false;
249 bool_t testconfig = false;
250 char *conffile = NULL, *pidfile = NULL;
252 struct utsname utsbuf;
255 #ifdef POSIX_PRIORITY_SCHEDULING
256 while ((c = getopt(argc, argv, "drp:c:a:A:b:B:ht")) != EOF) {
258 while ((c = getopt(argc, argv, "dp:c:a:A:b:B:ht")) != EOF) {
274 bindport = atoi(optarg);
277 bindport6 = atoi(optarg);
288 #ifdef POSIX_PRIORITY_SCHEDULING
294 fprintf(stderr, "Unrecognized option\n");
301 if (!Conf_ok(conffile))
307 /* Initialize the config subsystem early;
308 * switch_user() will need to read some config variables as well as logging.
312 /* Logging to terminal if not daemonizing, otherwise to syslog or log file.
322 /* Reopen log file. If user switch results in access denied, we catch
329 signal(SIGCHLD, SIG_IGN); /* ignore child */
330 signal(SIGTSTP, SIG_IGN); /* ignore tty signals */
331 signal(SIGTTOU, SIG_IGN);
332 signal(SIGTTIN, SIG_IGN);
333 signal(SIGPIPE, SIG_IGN);
334 signal(SIGHUP, signal_handler); /* catch hangup signal */
335 signal(SIGTERM, signal_handler); /* catch kill signal */
337 /* Build system string */
338 if (uname(&utsbuf) == 0) {
339 snprintf(system_string, 64, "%s %s", utsbuf.sysname, utsbuf.machine);
340 snprintf(version_string, 64, "%s", utsbuf.release);
343 snprintf(system_string, 64, "unknown unknown");
344 snprintf(version_string, 64, "unknown");
353 #ifdef POSIX_PRIORITY_SCHEDULING