summaryrefslogtreecommitdiffhomepage
path: root/src/nxt_process.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/nxt_process.c')
-rw-r--r--src/nxt_process.c436
1 files changed, 436 insertions, 0 deletions
diff --git a/src/nxt_process.c b/src/nxt_process.c
new file mode 100644
index 00000000..b79e4388
--- /dev/null
+++ b/src/nxt_process.c
@@ -0,0 +1,436 @@
+
+/*
+ * Copyright (C) Igor Sysoev
+ * Copyright (C) NGINX, Inc.
+ */
+
+#include <nxt_main.h>
+
+
+static nxt_int_t nxt_user_groups_get(nxt_user_cred_t *uc);
+
+
+/* A cached process pid. */
+nxt_pid_t nxt_pid;
+
+/* An original parent process pid. */
+nxt_pid_t nxt_ppid;
+
+
+nxt_pid_t
+nxt_process_create(nxt_process_start_t start, void *data, const char *name)
+{
+ nxt_pid_t pid;
+ nxt_thread_t *thr;
+
+ thr = nxt_thread();
+
+ pid = fork();
+
+ switch (pid) {
+
+ case -1:
+ nxt_log_alert(thr->log, "fork() failed while creating \"%s\" %E",
+ name, nxt_errno);
+ break;
+
+ case 0:
+ /* A child. */
+ nxt_pid = getpid();
+
+ /* Clean inherited cached thread tid. */
+ thr->tid = 0;
+
+ start(data);
+ break;
+
+ default:
+ /* A parent. */
+ nxt_log_debug(thr->log, "fork(): %PI", pid);
+ break;
+ }
+
+ return pid;
+}
+
+
+#if (NXT_HAVE_POSIX_SPAWN)
+
+/*
+ * Linux glibc 2.2 posix_spawn() is implemented via fork()/execve().
+ * Linux glibc 2.4 posix_spawn() without file actions and spawn
+ * attributes uses vfork()/execve().
+ *
+ * On FreeBSD 8.0 posix_spawn() is implemented via vfork()/execve().
+ *
+ * Solaris 10:
+ * In the Solaris 10 OS, posix_spawn() is currently implemented using
+ * private-to-libc vfork(), execve(), and exit() functions. They are
+ * identical to regular vfork(), execve(), and exit() in functionality,
+ * but they are not exported from libc and therefore don't cause the
+ * deadlock-in-the-dynamic-linker problem that any multithreaded code
+ * outside of libc that calls vfork() can cause.
+ *
+ * On MacOSX 10.5 (Leoprad) and NetBSD 6.0 posix_spawn() is implemented
+ * as syscall.
+ */
+
+nxt_pid_t
+nxt_process_execute(char *name, char **argv, char **envp)
+{
+ nxt_pid_t pid;
+
+ nxt_thread_log_debug("posix_spawn(\"%s\")", name);
+
+ if (posix_spawn(&pid, name, NULL, NULL, argv, envp) != 0) {
+ nxt_thread_log_alert("posix_spawn(\"%s\") failed %E", name, nxt_errno);
+ return -1;
+ }
+
+ return pid;
+}
+
+#else
+
+nxt_pid_t
+nxt_process_execute(char *name, char **argv, char **envp)
+{
+ nxt_pid_t pid;
+
+ /*
+ * vfork() is better than fork() because:
+ * it is faster several times;
+ * its execution time does not depend on private memory mapping size;
+ * it has lesser chances to fail due to the ENOMEM error.
+ */
+
+ pid = vfork();
+
+ switch (pid) {
+
+ case -1:
+ nxt_thread_log_alert("vfork() failed while executing \"%s\" %E",
+ name, nxt_errno);
+ break;
+
+ case 0:
+ /* A child. */
+ nxt_thread_log_debug("execve(\"%s\")", name);
+
+ (void) execve(name, argv, envp);
+
+ nxt_thread_log_alert("execve(\"%s\") failed %E", name, nxt_errno);
+
+ exit(1);
+ break;
+
+ default:
+ /* A parent. */
+ nxt_thread_log_debug("vfork(): %PI", pid);
+ break;
+ }
+
+ return pid;
+}
+
+#endif
+
+
+nxt_int_t
+nxt_process_daemon(void)
+{
+ nxt_fd_t fd;
+ nxt_pid_t pid;
+ const char *msg;
+ nxt_thread_t *thr;
+
+ thr = nxt_thread();
+
+ /*
+ * fork() followed by a parent process's exit() detaches a child process
+ * from an init script or terminal shell process which has started the
+ * parent process and allows the child process to run in background.
+ */
+
+ pid = fork();
+
+ switch (pid) {
+
+ case -1:
+ msg = "fork() failed %E";
+ goto fail;
+
+ case 0:
+ /* A child. */
+ break;
+
+ default:
+ /* A parent. */
+ nxt_log_debug(thr->log, "fork(): %PI", pid);
+ exit(0);
+ nxt_unreachable();
+ }
+
+ nxt_pid = getpid();
+
+ /* Clean inherited cached thread tid. */
+ thr->tid = 0;
+
+ nxt_log_debug(thr->log, "daemon");
+
+ /* Detach from controlling terminal. */
+
+ if (setsid() == -1) {
+ nxt_log_emerg(thr->log, "setsid() failed %E", nxt_errno);
+ return NXT_ERROR;
+ }
+
+ /*
+ * Reset file mode creation mask: any access
+ * rights can be set on file creation.
+ */
+ umask(0);
+
+ /* Redirect STDIN and STDOUT to the "/dev/null". */
+
+ fd = open("/dev/null", O_RDWR);
+ if (fd == -1) {
+ msg = "open(\"/dev/null\") failed %E";
+ goto fail;
+ }
+
+ if (dup2(fd, STDIN_FILENO) == -1) {
+ msg = "dup2(\"/dev/null\", STDIN) failed %E";
+ goto fail;
+ }
+
+ if (dup2(fd, STDOUT_FILENO) == -1) {
+ msg = "dup2(\"/dev/null\", STDOUT) failed %E";
+ goto fail;
+ }
+
+ if (fd > STDERR_FILENO) {
+ nxt_fd_close(fd);
+ }
+
+ return NXT_OK;
+
+fail:
+
+ nxt_log_emerg(thr->log, msg, nxt_errno);
+
+ return NXT_ERROR;
+}
+
+
+void
+nxt_nanosleep(nxt_nsec_t ns)
+{
+ struct timespec ts;
+
+ ts.tv_sec = ns / 1000000000;
+ ts.tv_nsec = ns % 1000000000;
+
+ (void) nanosleep(&ts, NULL);
+}
+
+
+nxt_int_t
+nxt_user_cred_get(nxt_user_cred_t *uc, const char *group)
+{
+ struct group *grp;
+ struct passwd *pwd;
+
+ pwd = getpwnam(uc->user);
+
+ if (nxt_slow_path(pwd == NULL)) {
+ nxt_thread_log_emerg("getpwnam(%s) failed %E", uc->user, nxt_errno);
+ return NXT_ERROR;
+ }
+
+ uc->uid = pwd->pw_uid;
+ uc->base_gid = pwd->pw_gid;
+
+ if (group != NULL) {
+ grp = getgrnam(group);
+
+ if (nxt_slow_path(grp == NULL)) {
+ nxt_thread_log_emerg("getgrnam(%s) failed %E", group, nxt_errno);
+ return NXT_ERROR;
+ }
+
+ uc->base_gid = grp->gr_gid;
+ }
+
+ if (getuid() == 0) {
+ return nxt_user_groups_get(uc);
+ }
+
+ return NXT_OK;
+}
+
+
+/*
+ * nxt_user_groups_get() stores an array of groups IDs which should be
+ * set by the initgroups() function for a given user. The initgroups()
+ * may block a just forked worker process for some time if LDAP or NDIS+
+ * is used, so nxt_user_groups_get() allows to get worker user groups in
+ * master process. In a nutshell the initgroups() calls getgrouplist()
+ * followed by setgroups(). However Solaris lacks the getgrouplist().
+ * Besides getgrouplist() does not allow to query the exact number of
+ * groups while NGROUPS_MAX can be quite large (e.g. 65536 on Linux).
+ * So nxt_user_groups_get() emulates getgrouplist(): at first the function
+ * saves the super-user groups IDs, then calls initgroups() and saves the
+ * specified user groups IDs, and then restores the super-user groups IDs.
+ * This works at least on Linux, FreeBSD, and Solaris, but does not work
+ * on MacOSX, getgroups(2):
+ *
+ * To provide compatibility with applications that use getgroups() in
+ * environments where users may be in more than {NGROUPS_MAX} groups,
+ * a variant of getgroups(), obtained when compiling with either the
+ * macros _DARWIN_UNLIMITED_GETGROUPS or _DARWIN_C_SOURCE defined, can
+ * be used that is not limited to {NGROUPS_MAX} groups. However, this
+ * variant only returns the user's default group access list and not
+ * the group list modified by a call to setgroups(2).
+ *
+ * For such cases initgroups() is used in worker process as fallback.
+ */
+
+static nxt_int_t
+nxt_user_groups_get(nxt_user_cred_t *uc)
+{
+ int nsaved, ngroups;
+ nxt_int_t ret;
+ nxt_gid_t *saved;
+
+ nsaved = getgroups(0, NULL);
+
+ if (nsaved == -1) {
+ nxt_thread_log_emerg("getgroups(0, NULL) failed %E", nxt_errno);
+ return NXT_ERROR;
+ }
+
+ nxt_thread_log_debug("getgroups(0, NULL): %d", nsaved);
+
+ if (nsaved > NGROUPS_MAX) {
+ /* MacOSX case. */
+ return NXT_OK;
+ }
+
+ saved = nxt_malloc(nsaved * sizeof(nxt_gid_t));
+
+ if (saved == NULL) {
+ return NXT_ERROR;
+ }
+
+ ret = NXT_ERROR;
+
+ nsaved = getgroups(nsaved, saved);
+
+ if (nsaved == -1) {
+ nxt_thread_log_emerg("getgroups(%d) failed %E", nsaved, nxt_errno);
+ goto fail;
+ }
+
+ nxt_thread_log_debug("getgroups(): %d", nsaved);
+
+ if (initgroups(uc->user, uc->base_gid) != 0) {
+ nxt_thread_log_emerg("initgroups(%s, %d) failed",
+ uc->user, uc->base_gid);
+ goto restore;
+ }
+
+ ngroups = getgroups(0, NULL);
+
+ if (ngroups == -1) {
+ nxt_thread_log_emerg("getgroups(0, NULL) failed %E", nxt_errno);
+ goto restore;
+ }
+
+ nxt_thread_log_debug("getgroups(0, NULL): %d", ngroups);
+
+ uc->gids = nxt_malloc(ngroups * sizeof(nxt_gid_t));
+
+ if (uc->gids == NULL) {
+ goto restore;
+ }
+
+ ngroups = getgroups(ngroups, uc->gids);
+
+ if (ngroups == -1) {
+ nxt_thread_log_emerg("getgroups(%d) failed %E", ngroups, nxt_errno);
+ goto restore;
+ }
+
+ uc->ngroups = ngroups;
+
+#if (NXT_DEBUG)
+ {
+ u_char *p, *end;
+ nxt_uint_t i;
+ u_char msg[NXT_MAX_ERROR_STR];
+
+ p = msg;
+ end = msg + NXT_MAX_ERROR_STR;
+
+ for (i = 0; i < uc->ngroups; i++) {
+ p = nxt_sprintf(p, end, "%uL:", (uint64_t) uc->gids[i]);
+ }
+
+ nxt_thread_log_debug("user \"%s\" cred: uid:%uL base gid:%uL, gids:%*s",
+ uc->user, (uint64_t) uc->uid,
+ (uint64_t) uc->base_gid, p - msg, msg);
+ }
+#endif
+
+ ret = NXT_OK;
+
+restore:
+
+ if (setgroups(nsaved, saved) != 0) {
+ nxt_thread_log_emerg("setgroups(%d) failed %E", nsaved, nxt_errno);
+ ret = NXT_ERROR;
+ }
+
+fail:
+
+ nxt_free(saved);
+
+ return ret;
+}
+
+
+nxt_int_t
+nxt_user_cred_set(nxt_user_cred_t *uc)
+{
+ nxt_thread_log_debug("user cred set: \"%s\" uid:%uL base gid:%uL",
+ uc->user, (uint64_t) uc->uid, uc->base_gid);
+
+ if (setgid(uc->base_gid) != 0) {
+ nxt_thread_log_emerg("setgid(%d) failed %E", uc->base_gid, nxt_errno);
+ return NXT_ERROR;
+ }
+
+ if (uc->gids != NULL) {
+ if (setgroups(uc->ngroups, uc->gids) != 0) {
+ nxt_thread_log_emerg("setgroups(%i) failed %E",
+ uc->ngroups, nxt_errno);
+ return NXT_ERROR;
+ }
+
+ } else {
+ /* MacOSX fallback. */
+ if (initgroups(uc->user, uc->base_gid) != 0) {
+ nxt_thread_log_emerg("initgroups(%s, %d) failed",
+ uc->user, uc->base_gid);
+ return NXT_ERROR;
+ }
+ }
+
+ if (setuid(uc->uid) != 0) {
+ nxt_thread_log_emerg("setuid(%d) failed %E", uc->uid, nxt_errno);
+ return NXT_ERROR;
+ }
+
+ return NXT_OK;
+}