daemon.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523
  1. // SPDX-License-Identifier: GPL-3.0-or-later
  2. #include "common.h"
  3. #include <sched.h>
  4. char pidfile[FILENAME_MAX + 1] = "";
  5. char claiming_directory[FILENAME_MAX + 1];
  6. char netdata_exe_path[FILENAME_MAX + 1];
  7. char netdata_exe_file[FILENAME_MAX + 1];
  8. void get_netdata_execution_path(void) {
  9. int ret;
  10. size_t exepath_size = 0;
  11. struct passwd *passwd = NULL;
  12. char *user = NULL;
  13. passwd = getpwuid(getuid());
  14. user = (passwd && passwd->pw_name) ? passwd->pw_name : "";
  15. exepath_size = sizeof(netdata_exe_file) - 1;
  16. ret = uv_exepath(netdata_exe_file, &exepath_size);
  17. if (0 != ret) {
  18. netdata_log_error("uv_exepath(\"%s\", %u) (user: %s) failed (%s).", netdata_exe_file, (unsigned)exepath_size, user,
  19. uv_strerror(ret));
  20. fatal("Cannot start netdata without getting execution path.");
  21. }
  22. netdata_exe_file[exepath_size] = '\0';
  23. // macOS's dirname(3) does not modify passed string
  24. char *tmpdir = strdupz(netdata_exe_file);
  25. strcpy(netdata_exe_path, dirname(tmpdir));
  26. freez(tmpdir);
  27. }
  28. static void fix_directory_file_permissions(const char *dirname, uid_t uid, gid_t gid, bool recursive)
  29. {
  30. char filename[FILENAME_MAX + 1];
  31. DIR *dir = opendir(dirname);
  32. if (!dir)
  33. return;
  34. struct dirent *de = NULL;
  35. while ((de = readdir(dir))) {
  36. if (de->d_type == DT_DIR && (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")))
  37. continue;
  38. (void) snprintfz(filename, FILENAME_MAX, "%s/%s", dirname, de->d_name);
  39. if (de->d_type == DT_REG || recursive) {
  40. if (chown(filename, uid, gid) == -1)
  41. netdata_log_error("Cannot chown %s '%s' to %u:%u", de->d_type == DT_DIR ? "directory" : "file", filename, (unsigned int)uid, (unsigned int)gid);
  42. }
  43. if (de->d_type == DT_DIR && recursive)
  44. fix_directory_file_permissions(filename, uid, gid, recursive);
  45. }
  46. closedir(dir);
  47. }
  48. void change_dir_ownership(const char *dir, uid_t uid, gid_t gid, bool recursive)
  49. {
  50. if (chown(dir, uid, gid) == -1)
  51. netdata_log_error("Cannot chown directory '%s' to %u:%u", dir, (unsigned int)uid, (unsigned int)gid);
  52. fix_directory_file_permissions(dir, uid, gid, recursive);
  53. }
  54. void clean_directory(char *dirname)
  55. {
  56. DIR *dir = opendir(dirname);
  57. if(!dir) return;
  58. int dir_fd = dirfd(dir);
  59. struct dirent *de = NULL;
  60. while((de = readdir(dir)))
  61. if(de->d_type == DT_REG)
  62. if (unlinkat(dir_fd, de->d_name, 0))
  63. netdata_log_error("Cannot delete %s/%s", dirname, de->d_name);
  64. closedir(dir);
  65. }
  66. void prepare_required_directories(uid_t uid, gid_t gid) {
  67. change_dir_ownership(netdata_configured_cache_dir, uid, gid, true);
  68. change_dir_ownership(netdata_configured_varlib_dir, uid, gid, false);
  69. change_dir_ownership(netdata_configured_lock_dir, uid, gid, false);
  70. change_dir_ownership(netdata_configured_log_dir, uid, gid, false);
  71. change_dir_ownership(claiming_directory, uid, gid, false);
  72. char filename[FILENAME_MAX + 1];
  73. snprintfz(filename, FILENAME_MAX, "%s/registry", netdata_configured_varlib_dir);
  74. change_dir_ownership(filename, uid, gid, false);
  75. clean_directory(netdata_configured_lock_dir);
  76. }
  77. int become_user(const char *username, int pid_fd) {
  78. int am_i_root = (getuid() == 0)?1:0;
  79. struct passwd *pw = getpwnam(username);
  80. if(!pw) {
  81. netdata_log_error("User %s is not present.", username);
  82. return -1;
  83. }
  84. uid_t uid = pw->pw_uid;
  85. gid_t gid = pw->pw_gid;
  86. prepare_required_directories(uid, gid);
  87. if(pidfile[0]) {
  88. if(chown(pidfile, uid, gid) == -1)
  89. netdata_log_error("Cannot chown '%s' to %u:%u", pidfile, (unsigned int)uid, (unsigned int)gid);
  90. }
  91. int ngroups = (int)sysconf(_SC_NGROUPS_MAX);
  92. gid_t *supplementary_groups = NULL;
  93. if(ngroups > 0) {
  94. supplementary_groups = mallocz(sizeof(gid_t) * ngroups);
  95. #ifdef __APPLE__
  96. if(getgrouplist(username, gid, (int *)supplementary_groups, &ngroups) == -1) {
  97. #else
  98. if(getgrouplist(username, gid, supplementary_groups, &ngroups) == -1) {
  99. #endif /* __APPLE__ */
  100. if(am_i_root)
  101. netdata_log_error("Cannot get supplementary groups of user '%s'.", username);
  102. ngroups = 0;
  103. }
  104. }
  105. nd_log_chown_log_files(uid, gid);
  106. chown_open_file(STDOUT_FILENO, uid, gid);
  107. chown_open_file(STDERR_FILENO, uid, gid);
  108. chown_open_file(pid_fd, uid, gid);
  109. if(supplementary_groups && ngroups > 0) {
  110. if(setgroups((size_t)ngroups, supplementary_groups) == -1) {
  111. if(am_i_root)
  112. netdata_log_error("Cannot set supplementary groups for user '%s'", username);
  113. }
  114. ngroups = 0;
  115. }
  116. if(supplementary_groups)
  117. freez(supplementary_groups);
  118. #ifdef __APPLE__
  119. if(setregid(gid, gid) != 0) {
  120. #else
  121. if(setresgid(gid, gid, gid) != 0) {
  122. #endif /* __APPLE__ */
  123. netdata_log_error("Cannot switch to user's %s group (gid: %u).", username, gid);
  124. return -1;
  125. }
  126. #ifdef __APPLE__
  127. if(setreuid(uid, uid) != 0) {
  128. #else
  129. if(setresuid(uid, uid, uid) != 0) {
  130. #endif /* __APPLE__ */
  131. netdata_log_error("Cannot switch to user %s (uid: %u).", username, uid);
  132. return -1;
  133. }
  134. if(setgid(gid) != 0) {
  135. netdata_log_error("Cannot switch to user's %s group (gid: %u).", username, gid);
  136. return -1;
  137. }
  138. if(setegid(gid) != 0) {
  139. netdata_log_error("Cannot effectively switch to user's %s group (gid: %u).", username, gid);
  140. return -1;
  141. }
  142. if(setuid(uid) != 0) {
  143. netdata_log_error("Cannot switch to user %s (uid: %u).", username, uid);
  144. return -1;
  145. }
  146. if(seteuid(uid) != 0) {
  147. netdata_log_error("Cannot effectively switch to user %s (uid: %u).", username, uid);
  148. return -1;
  149. }
  150. return(0);
  151. }
  152. #ifndef OOM_SCORE_ADJ_MAX
  153. #define OOM_SCORE_ADJ_MAX (1000)
  154. #endif
  155. #ifndef OOM_SCORE_ADJ_MIN
  156. #define OOM_SCORE_ADJ_MIN (-1000)
  157. #endif
  158. static void oom_score_adj(void) {
  159. char buf[30 + 1];
  160. long long int old_score, wanted_score = 0, final_score = 0;
  161. // read the existing score
  162. if(read_single_signed_number_file("/proc/self/oom_score_adj", &old_score)) {
  163. netdata_log_error("Out-Of-Memory (OOM) score setting is not supported on this system.");
  164. return;
  165. }
  166. if (old_score != 0) {
  167. wanted_score = old_score;
  168. analytics_report_oom_score(old_score);
  169. }
  170. // check the environment
  171. char *s = getenv("OOMScoreAdjust");
  172. if(!s || !*s) {
  173. snprintfz(buf, sizeof(buf) - 1, "%d", (int)wanted_score);
  174. s = buf;
  175. }
  176. // check netdata.conf configuration
  177. s = config_get(CONFIG_SECTION_GLOBAL, "OOM score", s);
  178. if(s && *s && (isdigit(*s) || *s == '-' || *s == '+'))
  179. wanted_score = atoll(s);
  180. else if(s && !strcmp(s, "keep")) {
  181. netdata_log_info("Out-Of-Memory (OOM) kept as-is (running with %d)", (int) old_score);
  182. return;
  183. }
  184. else {
  185. netdata_log_info("Out-Of-Memory (OOM) score not changed due to non-numeric setting: '%s' (running with %d)", s, (int)old_score);
  186. return;
  187. }
  188. if(wanted_score < OOM_SCORE_ADJ_MIN) {
  189. netdata_log_error("Wanted Out-Of-Memory (OOM) score %d is too small. Using %d", (int)wanted_score, (int)OOM_SCORE_ADJ_MIN);
  190. wanted_score = OOM_SCORE_ADJ_MIN;
  191. }
  192. if(wanted_score > OOM_SCORE_ADJ_MAX) {
  193. netdata_log_error("Wanted Out-Of-Memory (OOM) score %d is too big. Using %d", (int)wanted_score, (int)OOM_SCORE_ADJ_MAX);
  194. wanted_score = OOM_SCORE_ADJ_MAX;
  195. }
  196. if(old_score == wanted_score) {
  197. netdata_log_info("Out-Of-Memory (OOM) score is already set to the wanted value %d", (int)old_score);
  198. return;
  199. }
  200. int written = 0;
  201. int fd = open("/proc/self/oom_score_adj", O_WRONLY);
  202. if(fd != -1) {
  203. snprintfz(buf, sizeof(buf) - 1, "%d", (int)wanted_score);
  204. ssize_t len = strlen(buf);
  205. if(len > 0 && write(fd, buf, (size_t)len) == len) written = 1;
  206. close(fd);
  207. if(written) {
  208. if(read_single_signed_number_file("/proc/self/oom_score_adj", &final_score))
  209. netdata_log_error("Adjusted my Out-Of-Memory (OOM) score to %d, but cannot verify it.", (int)wanted_score);
  210. else if(final_score == wanted_score)
  211. netdata_log_info("Adjusted my Out-Of-Memory (OOM) score from %d to %d.", (int)old_score, (int)final_score);
  212. else
  213. netdata_log_error("Adjusted my Out-Of-Memory (OOM) score from %d to %d, but it has been set to %d.", (int)old_score, (int)wanted_score, (int)final_score);
  214. analytics_report_oom_score(final_score);
  215. }
  216. else
  217. netdata_log_error("Failed to adjust my Out-Of-Memory (OOM) score to %d. Running with %d. (systemd systems may change it via netdata.service)", (int)wanted_score, (int)old_score);
  218. }
  219. else
  220. netdata_log_error("Failed to adjust my Out-Of-Memory (OOM) score. Cannot open /proc/self/oom_score_adj for writing.");
  221. }
  222. static void process_nice_level(void) {
  223. #ifdef HAVE_NICE
  224. int nice_level = (int)config_get_number(CONFIG_SECTION_GLOBAL, "process nice level", 19);
  225. if(nice(nice_level) == -1)
  226. netdata_log_error("Cannot set netdata CPU nice level to %d.", nice_level);
  227. else
  228. netdata_log_debug(D_SYSTEM, "Set netdata nice level to %d.", nice_level);
  229. #endif // HAVE_NICE
  230. }
  231. #define SCHED_FLAG_NONE 0x00
  232. #define SCHED_FLAG_PRIORITY_CONFIGURABLE 0x01 // the priority is user configurable
  233. #define SCHED_FLAG_KEEP_AS_IS 0x04 // do not attempt to set policy, priority or nice()
  234. #define SCHED_FLAG_USE_NICE 0x08 // use nice() after setting this policy
  235. struct sched_def {
  236. char *name;
  237. int policy;
  238. int priority;
  239. uint8_t flags;
  240. } scheduler_defaults[] = {
  241. // the order of array members is important!
  242. // the first defined is the default used by netdata
  243. // the available members are important too!
  244. // these are all the possible scheduling policies supported by netdata
  245. #ifdef SCHED_BATCH
  246. { "batch", SCHED_BATCH, 0, SCHED_FLAG_USE_NICE },
  247. #endif
  248. #ifdef SCHED_OTHER
  249. { "other", SCHED_OTHER, 0, SCHED_FLAG_USE_NICE },
  250. { "nice", SCHED_OTHER, 0, SCHED_FLAG_USE_NICE },
  251. #endif
  252. #ifdef SCHED_IDLE
  253. { "idle", SCHED_IDLE, 0, SCHED_FLAG_NONE },
  254. #endif
  255. #ifdef SCHED_RR
  256. { "rr", SCHED_RR, 0, SCHED_FLAG_PRIORITY_CONFIGURABLE },
  257. #endif
  258. #ifdef SCHED_FIFO
  259. { "fifo", SCHED_FIFO, 0, SCHED_FLAG_PRIORITY_CONFIGURABLE },
  260. #endif
  261. // do not change the scheduling priority
  262. { "keep", 0, 0, SCHED_FLAG_KEEP_AS_IS },
  263. { "none", 0, 0, SCHED_FLAG_KEEP_AS_IS },
  264. // array termination
  265. { NULL, 0, 0, 0 }
  266. };
  267. #ifdef HAVE_SCHED_GETSCHEDULER
  268. static void sched_getscheduler_report(void) {
  269. int sched = sched_getscheduler(0);
  270. if(sched == -1) {
  271. netdata_log_error("Cannot get my current process scheduling policy.");
  272. return;
  273. }
  274. else {
  275. int i;
  276. for(i = 0 ; scheduler_defaults[i].name ; i++) {
  277. if(scheduler_defaults[i].policy == sched) {
  278. if(scheduler_defaults[i].flags & SCHED_FLAG_PRIORITY_CONFIGURABLE) {
  279. struct sched_param param;
  280. if(sched_getparam(0, &param) == -1) {
  281. netdata_log_error("Cannot get the process scheduling priority for my policy '%s'", scheduler_defaults[i].name);
  282. return;
  283. }
  284. else {
  285. netdata_log_info("Running with process scheduling policy '%s', priority %d", scheduler_defaults[i].name, param.sched_priority);
  286. }
  287. }
  288. else if(scheduler_defaults[i].flags & SCHED_FLAG_USE_NICE) {
  289. #ifdef HAVE_GETPRIORITY
  290. int n = getpriority(PRIO_PROCESS, 0);
  291. netdata_log_info("Running with process scheduling policy '%s', nice level %d", scheduler_defaults[i].name, n);
  292. #else // !HAVE_GETPRIORITY
  293. netdata_log_info("Running with process scheduling policy '%s'", scheduler_defaults[i].name);
  294. #endif // !HAVE_GETPRIORITY
  295. }
  296. else {
  297. netdata_log_info("Running with process scheduling policy '%s'", scheduler_defaults[i].name);
  298. }
  299. return;
  300. }
  301. }
  302. }
  303. }
  304. #endif /* HAVE_SCHED_GETSCHEDULER */
  305. #ifdef HAVE_SCHED_SETSCHEDULER
  306. static void sched_setscheduler_set(void) {
  307. if(scheduler_defaults[0].name) {
  308. const char *name = scheduler_defaults[0].name;
  309. int policy = scheduler_defaults[0].policy, priority = scheduler_defaults[0].priority;
  310. uint8_t flags = scheduler_defaults[0].flags;
  311. int found = 0;
  312. // read the configuration
  313. name = config_get(CONFIG_SECTION_GLOBAL, "process scheduling policy", name);
  314. int i;
  315. for(i = 0 ; scheduler_defaults[i].name ; i++) {
  316. if(!strcmp(name, scheduler_defaults[i].name)) {
  317. found = 1;
  318. policy = scheduler_defaults[i].policy;
  319. priority = scheduler_defaults[i].priority;
  320. flags = scheduler_defaults[i].flags;
  321. if(flags & SCHED_FLAG_KEEP_AS_IS)
  322. goto report;
  323. if(flags & SCHED_FLAG_PRIORITY_CONFIGURABLE)
  324. priority = (int)config_get_number(CONFIG_SECTION_GLOBAL, "process scheduling priority", priority);
  325. #ifdef HAVE_SCHED_GET_PRIORITY_MIN
  326. errno = 0;
  327. if(priority < sched_get_priority_min(policy)) {
  328. netdata_log_error("scheduler %s (%d) priority %d is below the minimum %d. Using the minimum.", name, policy, priority, sched_get_priority_min(policy));
  329. priority = sched_get_priority_min(policy);
  330. }
  331. #endif
  332. #ifdef HAVE_SCHED_GET_PRIORITY_MAX
  333. errno = 0;
  334. if(priority > sched_get_priority_max(policy)) {
  335. netdata_log_error("scheduler %s (%d) priority %d is above the maximum %d. Using the maximum.", name, policy, priority, sched_get_priority_max(policy));
  336. priority = sched_get_priority_max(policy);
  337. }
  338. #endif
  339. break;
  340. }
  341. }
  342. if(!found) {
  343. netdata_log_error("Unknown scheduling policy '%s' - falling back to nice", name);
  344. goto fallback;
  345. }
  346. const struct sched_param param = {
  347. .sched_priority = priority
  348. };
  349. errno = 0;
  350. i = sched_setscheduler(0, policy, &param);
  351. if(i != 0) {
  352. netdata_log_error("Cannot adjust netdata scheduling policy to %s (%d), with priority %d. Falling back to nice.",
  353. name,
  354. policy,
  355. priority);
  356. }
  357. else {
  358. netdata_log_info("Adjusted netdata scheduling policy to %s (%d), with priority %d.", name, policy, priority);
  359. if(!(flags & SCHED_FLAG_USE_NICE))
  360. goto report;
  361. }
  362. }
  363. fallback:
  364. process_nice_level();
  365. report:
  366. sched_getscheduler_report();
  367. }
  368. #else /* HAVE_SCHED_SETSCHEDULER */
  369. static void sched_setscheduler_set(void) {
  370. process_nice_level();
  371. }
  372. #endif /* HAVE_SCHED_SETSCHEDULER */
  373. int become_daemon(int dont_fork, const char *user)
  374. {
  375. if(!dont_fork) {
  376. int i = fork();
  377. if(i == -1) {
  378. perror("cannot fork");
  379. exit(1);
  380. }
  381. if(i != 0) {
  382. exit(0); // the parent
  383. }
  384. // become session leader
  385. if (setsid() < 0) {
  386. perror("Cannot become session leader.");
  387. exit(2);
  388. }
  389. // fork() again
  390. i = fork();
  391. if(i == -1) {
  392. perror("cannot fork");
  393. exit(1);
  394. }
  395. if(i != 0) {
  396. exit(0); // the parent
  397. }
  398. }
  399. // generate our pid file
  400. int pidfd = -1;
  401. if(pidfile[0]) {
  402. pidfd = open(pidfile, O_WRONLY | O_CREAT, 0644);
  403. if(pidfd >= 0) {
  404. if(ftruncate(pidfd, 0) != 0)
  405. netdata_log_error("Cannot truncate pidfile '%s'.", pidfile);
  406. char b[100];
  407. sprintf(b, "%d\n", getpid());
  408. ssize_t i = write(pidfd, b, strlen(b));
  409. if(i <= 0)
  410. netdata_log_error("Cannot write pidfile '%s'.", pidfile);
  411. }
  412. else
  413. netdata_log_error("Failed to open pidfile '%s'.", pidfile);
  414. }
  415. // Set new file permissions
  416. umask(0007);
  417. // adjust my Out-Of-Memory score
  418. oom_score_adj();
  419. // never become a problem
  420. sched_setscheduler_set();
  421. // Set claiming directory based on user config directory with correct ownership
  422. snprintfz(claiming_directory, FILENAME_MAX, "%s/cloud.d", netdata_configured_varlib_dir);
  423. if(user && *user) {
  424. if(become_user(user, pidfd) != 0) {
  425. netdata_log_error("Cannot become user '%s'. Continuing as we are.", user);
  426. }
  427. else
  428. netdata_log_debug(D_SYSTEM, "Successfully became user '%s'.", user);
  429. }
  430. else {
  431. prepare_required_directories(getuid(), getgid());
  432. }
  433. if(pidfd != -1)
  434. close(pidfd);
  435. return(0);
  436. }