Вы не можете выбрать более 25 тем Темы должны начинаться с буквы или цифры, могут содержать дефисы(-) и должны содержать не более 35 символов.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "rspamd.h"
  18. #include "lua/lua_common.h"
  19. #include "worker_util.h"
  20. #include "unix-std.h"
  21. #include "utlist.h"
  22. #include "ottery.h"
  23. #include "rspamd_control.h"
  24. #include "libutil/map.h"
  25. #include "libutil/map_private.h"
  26. #include "libutil/http_private.h"
  27. #ifdef WITH_GPERF_TOOLS
  28. #include <gperftools/profiler.h>
  29. #endif
  30. /* sys/resource.h */
  31. #ifdef HAVE_SYS_RESOURCE_H
  32. #include <sys/resource.h>
  33. #endif
  34. /* pwd and grp */
  35. #ifdef HAVE_PWD_H
  36. #include <pwd.h>
  37. #endif
  38. #ifdef HAVE_GRP_H
  39. #include <grp.h>
  40. #endif
  41. #ifdef HAVE_LIBUTIL_H
  42. #include <libutil.h>
  43. #endif
  44. #include "zlib.h"
  45. #ifdef WITH_LIBUNWIND
  46. #define UNW_LOCAL_ONLY 1
  47. #include <libunwind.h>
  48. #define UNWIND_BACKTRACE_DEPTH 256
  49. #endif
  50. #ifdef HAVE_UCONTEXT_H
  51. #include <ucontext.h>
  52. #elif defined(HAVE_SYS_UCONTEXT_H)
  53. #include <sys/ucontext.h>
  54. #endif
  55. static void rspamd_worker_ignore_signal (int signo);
  56. /**
  57. * Return worker's control structure by its type
  58. * @param type
  59. * @return worker's control structure or NULL
  60. */
  61. worker_t *
  62. rspamd_get_worker_by_type (struct rspamd_config *cfg, GQuark type)
  63. {
  64. worker_t **pwrk;
  65. pwrk = cfg->compiled_workers;
  66. while (pwrk && *pwrk) {
  67. if (rspamd_check_worker (cfg, *pwrk)) {
  68. if (g_quark_from_string ((*pwrk)->name) == type) {
  69. return *pwrk;
  70. }
  71. }
  72. pwrk++;
  73. }
  74. return NULL;
  75. }
  76. static gboolean
  77. rspamd_worker_terminate_handlers (struct rspamd_worker *w)
  78. {
  79. guint i;
  80. gboolean (*cb)(struct rspamd_worker *);
  81. gboolean ret = FALSE;
  82. for (i = 0; i < w->finish_actions->len; i ++) {
  83. cb = g_ptr_array_index (w->finish_actions, i);
  84. if (cb (w)) {
  85. ret = TRUE;
  86. }
  87. }
  88. return ret;
  89. }
  90. /*
  91. * Config reload is designed by sending sigusr2 to active workers and pending shutdown of them
  92. */
  93. static gboolean
  94. rspamd_worker_usr2_handler (struct rspamd_worker_signal_handler *sigh, void *arg)
  95. {
  96. /* Do not accept new connections, preparing to end worker's process */
  97. struct timeval tv;
  98. if (!sigh->worker->wanna_die) {
  99. rspamd_worker_ignore_signal (SIGUSR2);
  100. tv.tv_sec = SOFT_SHUTDOWN_TIME;
  101. tv.tv_usec = 0;
  102. sigh->worker->wanna_die = TRUE;
  103. rspamd_worker_terminate_handlers (sigh->worker);
  104. rspamd_default_log_function (G_LOG_LEVEL_INFO,
  105. sigh->worker->srv->server_pool->tag.tagname,
  106. sigh->worker->srv->server_pool->tag.uid,
  107. G_STRFUNC,
  108. "worker's shutdown is pending in %d sec",
  109. SOFT_SHUTDOWN_TIME);
  110. event_base_loopexit (sigh->base, &tv);
  111. rspamd_worker_stop_accept (sigh->worker);
  112. }
  113. /* No more signals */
  114. return FALSE;
  115. }
  116. /*
  117. * Reopen log is designed by sending sigusr1 to active workers and pending shutdown of them
  118. */
  119. static gboolean
  120. rspamd_worker_usr1_handler (struct rspamd_worker_signal_handler *sigh, void *arg)
  121. {
  122. rspamd_log_reopen (sigh->worker->srv->logger);
  123. /* Get more signals */
  124. return TRUE;
  125. }
  126. static gboolean
  127. rspamd_worker_term_handler (struct rspamd_worker_signal_handler *sigh, void *arg)
  128. {
  129. struct timeval tv;
  130. if (!sigh->worker->wanna_die) {
  131. rspamd_default_log_function (G_LOG_LEVEL_INFO,
  132. sigh->worker->srv->server_pool->tag.tagname,
  133. sigh->worker->srv->server_pool->tag.uid,
  134. G_STRFUNC,
  135. "terminating after receiving signal %s",
  136. g_strsignal (sigh->signo));
  137. tv.tv_usec = 0;
  138. if (rspamd_worker_terminate_handlers (sigh->worker)) {
  139. tv.tv_sec = SOFT_SHUTDOWN_TIME;
  140. }
  141. else {
  142. tv.tv_sec = 0;
  143. }
  144. sigh->worker->wanna_die = 1;
  145. event_base_loopexit (sigh->base, &tv);
  146. #ifdef WITH_GPERF_TOOLS
  147. ProfilerStop ();
  148. #endif
  149. rspamd_worker_stop_accept (sigh->worker);
  150. }
  151. /* Stop reacting on signals */
  152. return FALSE;
  153. }
  154. static void
  155. rspamd_worker_signal_handle (int fd, short what, void *arg)
  156. {
  157. struct rspamd_worker_signal_handler *sigh =
  158. (struct rspamd_worker_signal_handler *) arg;
  159. struct rspamd_worker_signal_cb *cb, *cbtmp;
  160. /* Call all signal handlers registered */
  161. DL_FOREACH_SAFE (sigh->cb, cb, cbtmp) {
  162. if (!cb->handler (sigh, cb->handler_data)) {
  163. DL_DELETE (sigh->cb, cb);
  164. }
  165. }
  166. }
  167. static void
  168. rspamd_worker_ignore_signal (int signo)
  169. {
  170. struct sigaction sig;
  171. sigemptyset (&sig.sa_mask);
  172. sigaddset (&sig.sa_mask, signo);
  173. sig.sa_handler = SIG_IGN;
  174. sig.sa_flags = 0;
  175. sigaction (signo, &sig, NULL);
  176. }
  177. static void
  178. rspamd_worker_default_signal (int signo)
  179. {
  180. struct sigaction sig;
  181. sigemptyset (&sig.sa_mask);
  182. sigaddset (&sig.sa_mask, signo);
  183. sig.sa_handler = SIG_DFL;
  184. sig.sa_flags = 0;
  185. sigaction (signo, &sig, NULL);
  186. }
  187. static void
  188. rspamd_sigh_free (void *p)
  189. {
  190. struct rspamd_worker_signal_handler *sigh = p;
  191. struct rspamd_worker_signal_cb *cb, *tmp;
  192. DL_FOREACH_SAFE (sigh->cb, cb, tmp) {
  193. DL_DELETE (sigh->cb, cb);
  194. g_free (cb);
  195. }
  196. event_del (&sigh->ev);
  197. rspamd_worker_default_signal (sigh->signo);
  198. g_free (sigh);
  199. }
  200. void
  201. rspamd_worker_set_signal_handler (int signo, struct rspamd_worker *worker,
  202. struct event_base *base,
  203. rspamd_worker_signal_handler handler,
  204. void *handler_data)
  205. {
  206. struct rspamd_worker_signal_handler *sigh;
  207. struct rspamd_worker_signal_cb *cb;
  208. sigh = g_hash_table_lookup (worker->signal_events, GINT_TO_POINTER (signo));
  209. if (sigh == NULL) {
  210. sigh = g_malloc0 (sizeof (*sigh));
  211. sigh->signo = signo;
  212. sigh->worker = worker;
  213. sigh->base = base;
  214. sigh->enabled = TRUE;
  215. signal_set (&sigh->ev, signo, rspamd_worker_signal_handle, sigh);
  216. event_base_set (base, &sigh->ev);
  217. signal_add (&sigh->ev, NULL);
  218. g_hash_table_insert (worker->signal_events,
  219. GINT_TO_POINTER (signo),
  220. sigh);
  221. }
  222. cb = g_malloc0 (sizeof (*cb));
  223. cb->handler = handler;
  224. cb->handler_data = handler_data;
  225. DL_APPEND (sigh->cb, cb);
  226. }
  227. void
  228. rspamd_worker_init_signals (struct rspamd_worker *worker, struct event_base *base)
  229. {
  230. struct sigaction signals;
  231. /* We ignore these signals in the worker */
  232. rspamd_worker_ignore_signal (SIGPIPE);
  233. rspamd_worker_ignore_signal (SIGALRM);
  234. rspamd_worker_ignore_signal (SIGCHLD);
  235. /* A set of terminating signals */
  236. rspamd_worker_set_signal_handler (SIGTERM, worker, base,
  237. rspamd_worker_term_handler, NULL);
  238. rspamd_worker_set_signal_handler (SIGINT, worker, base,
  239. rspamd_worker_term_handler, NULL);
  240. rspamd_worker_set_signal_handler (SIGHUP, worker, base,
  241. rspamd_worker_term_handler, NULL);
  242. /* Special purpose signals */
  243. rspamd_worker_set_signal_handler (SIGUSR1, worker, base,
  244. rspamd_worker_usr1_handler, NULL);
  245. rspamd_worker_set_signal_handler (SIGUSR2, worker, base,
  246. rspamd_worker_usr2_handler, NULL);
  247. /* Unblock all signals processed */
  248. sigemptyset (&signals.sa_mask);
  249. sigaddset (&signals.sa_mask, SIGTERM);
  250. sigaddset (&signals.sa_mask, SIGINT);
  251. sigaddset (&signals.sa_mask, SIGHUP);
  252. sigaddset (&signals.sa_mask, SIGCHLD);
  253. sigaddset (&signals.sa_mask, SIGUSR1);
  254. sigaddset (&signals.sa_mask, SIGUSR2);
  255. sigaddset (&signals.sa_mask, SIGALRM);
  256. sigaddset (&signals.sa_mask, SIGPIPE);
  257. sigprocmask (SIG_UNBLOCK, &signals.sa_mask, NULL);
  258. }
  259. struct event_base *
  260. rspamd_prepare_worker (struct rspamd_worker *worker, const char *name,
  261. void (*accept_handler)(int, short, void *))
  262. {
  263. struct event_base *ev_base;
  264. struct event *accept_events;
  265. GList *cur;
  266. struct rspamd_worker_listen_socket *ls;
  267. #ifdef WITH_PROFILER
  268. extern void _start (void), etext (void);
  269. monstartup ((u_long) & _start, (u_long) & etext);
  270. #endif
  271. gperf_profiler_init (worker->srv->cfg, name);
  272. worker->signal_events = g_hash_table_new_full (g_direct_hash, g_direct_equal,
  273. NULL, rspamd_sigh_free);
  274. ev_base = event_init ();
  275. rspamd_worker_init_signals (worker, ev_base);
  276. rspamd_control_worker_add_default_handler (worker, ev_base);
  277. #ifdef WITH_HIREDIS
  278. rspamd_redis_pool_config (worker->srv->cfg->redis_pool,
  279. worker->srv->cfg, ev_base);
  280. #endif
  281. /* Accept all sockets */
  282. if (accept_handler) {
  283. cur = worker->cf->listen_socks;
  284. while (cur) {
  285. ls = cur->data;
  286. if (ls->fd != -1) {
  287. accept_events = g_malloc0 (sizeof (struct event) * 2);
  288. event_set (&accept_events[0], ls->fd, EV_READ | EV_PERSIST,
  289. accept_handler, worker);
  290. event_base_set (ev_base, &accept_events[0]);
  291. event_add (&accept_events[0], NULL);
  292. worker->accept_events = g_list_prepend (worker->accept_events,
  293. accept_events);
  294. }
  295. cur = g_list_next (cur);
  296. }
  297. }
  298. return ev_base;
  299. }
  300. void
  301. rspamd_worker_stop_accept (struct rspamd_worker *worker)
  302. {
  303. GList *cur;
  304. struct event *events;
  305. /* Remove all events */
  306. cur = worker->accept_events;
  307. while (cur) {
  308. events = cur->data;
  309. if (rspamd_event_pending (&events[0], EV_TIMEOUT|EV_READ|EV_WRITE)) {
  310. event_del (&events[0]);
  311. }
  312. if (rspamd_event_pending (&events[1], EV_TIMEOUT|EV_READ|EV_WRITE)) {
  313. event_del (&events[1]);
  314. }
  315. cur = g_list_next (cur);
  316. g_free (events);
  317. }
  318. if (worker->accept_events != NULL) {
  319. g_list_free (worker->accept_events);
  320. }
  321. /* XXX: we need to do it much later */
  322. #if 0
  323. g_hash_table_iter_init (&it, worker->signal_events);
  324. while (g_hash_table_iter_next (&it, &k, &v)) {
  325. sigh = (struct rspamd_worker_signal_handler *)v;
  326. g_hash_table_iter_steal (&it);
  327. if (sigh->enabled) {
  328. event_del (&sigh->ev);
  329. }
  330. g_free (sigh);
  331. }
  332. g_hash_table_unref (worker->signal_events);
  333. #endif
  334. }
  335. static rspamd_fstring_t *
  336. rspamd_controller_maybe_compress (struct rspamd_http_connection_entry *entry,
  337. rspamd_fstring_t *buf, struct rspamd_http_message *msg)
  338. {
  339. if (entry->support_gzip) {
  340. if (rspamd_fstring_gzip (&buf)) {
  341. rspamd_http_message_add_header (msg, "Content-Encoding", "gzip");
  342. }
  343. }
  344. return buf;
  345. }
  346. void
  347. rspamd_controller_send_error (struct rspamd_http_connection_entry *entry,
  348. gint code, const gchar *error_msg, ...)
  349. {
  350. struct rspamd_http_message *msg;
  351. va_list args;
  352. rspamd_fstring_t *reply;
  353. msg = rspamd_http_new_message (HTTP_RESPONSE);
  354. va_start (args, error_msg);
  355. msg->status = rspamd_fstring_new ();
  356. rspamd_vprintf_fstring (&msg->status, error_msg, args);
  357. va_end (args);
  358. msg->date = time (NULL);
  359. msg->code = code;
  360. reply = rspamd_fstring_sized_new (msg->status->len + 16);
  361. rspamd_printf_fstring (&reply, "{\"error\":\"%V\"}", msg->status);
  362. rspamd_http_message_set_body_from_fstring_steal (msg,
  363. rspamd_controller_maybe_compress (entry, reply, msg));
  364. rspamd_http_connection_reset (entry->conn);
  365. rspamd_http_router_insert_headers (entry->rt, msg);
  366. rspamd_http_connection_write_message (entry->conn,
  367. msg,
  368. NULL,
  369. "application/json",
  370. entry,
  371. entry->conn->fd,
  372. entry->rt->ptv,
  373. entry->rt->ev_base);
  374. entry->is_reply = TRUE;
  375. }
  376. void
  377. rspamd_controller_send_string (struct rspamd_http_connection_entry *entry,
  378. const gchar *str)
  379. {
  380. struct rspamd_http_message *msg;
  381. rspamd_fstring_t *reply;
  382. msg = rspamd_http_new_message (HTTP_RESPONSE);
  383. msg->date = time (NULL);
  384. msg->code = 200;
  385. msg->status = rspamd_fstring_new_init ("OK", 2);
  386. if (str) {
  387. reply = rspamd_fstring_new_init (str, strlen (str));
  388. }
  389. else {
  390. reply = rspamd_fstring_new_init ("null", 4);
  391. }
  392. rspamd_http_message_set_body_from_fstring_steal (msg,
  393. rspamd_controller_maybe_compress (entry, reply, msg));
  394. rspamd_http_connection_reset (entry->conn);
  395. rspamd_http_router_insert_headers (entry->rt, msg);
  396. rspamd_http_connection_write_message (entry->conn,
  397. msg,
  398. NULL,
  399. "application/json",
  400. entry,
  401. entry->conn->fd,
  402. entry->rt->ptv,
  403. entry->rt->ev_base);
  404. entry->is_reply = TRUE;
  405. }
  406. void
  407. rspamd_controller_send_ucl (struct rspamd_http_connection_entry *entry,
  408. ucl_object_t *obj)
  409. {
  410. struct rspamd_http_message *msg;
  411. rspamd_fstring_t *reply;
  412. msg = rspamd_http_new_message (HTTP_RESPONSE);
  413. msg->date = time (NULL);
  414. msg->code = 200;
  415. msg->status = rspamd_fstring_new_init ("OK", 2);
  416. reply = rspamd_fstring_sized_new (BUFSIZ);
  417. rspamd_ucl_emit_fstring (obj, UCL_EMIT_JSON_COMPACT, &reply);
  418. rspamd_http_message_set_body_from_fstring_steal (msg,
  419. rspamd_controller_maybe_compress (entry, reply, msg));
  420. rspamd_http_connection_reset (entry->conn);
  421. rspamd_http_router_insert_headers (entry->rt, msg);
  422. rspamd_http_connection_write_message (entry->conn,
  423. msg,
  424. NULL,
  425. "application/json",
  426. entry,
  427. entry->conn->fd,
  428. entry->rt->ptv,
  429. entry->rt->ev_base);
  430. entry->is_reply = TRUE;
  431. }
  432. static void
  433. rspamd_worker_drop_priv (struct rspamd_main *rspamd_main)
  434. {
  435. if (rspamd_main->is_privilleged) {
  436. if (setgid (rspamd_main->workers_gid) == -1) {
  437. msg_err_main ("cannot setgid to %d (%s), aborting",
  438. (gint) rspamd_main->workers_gid,
  439. strerror (errno));
  440. exit (-errno);
  441. }
  442. if (rspamd_main->cfg->rspamd_user &&
  443. initgroups (rspamd_main->cfg->rspamd_user, rspamd_main->workers_gid) ==
  444. -1) {
  445. msg_err_main ("initgroups failed (%s), aborting", strerror (errno));
  446. exit (-errno);
  447. }
  448. if (setuid (rspamd_main->workers_uid) == -1) {
  449. msg_err_main ("cannot setuid to %d (%s), aborting",
  450. (gint) rspamd_main->workers_uid,
  451. strerror (errno));
  452. exit (-errno);
  453. }
  454. }
  455. }
  456. static void
  457. rspamd_worker_set_limits (struct rspamd_main *rspamd_main,
  458. struct rspamd_worker_conf *cf)
  459. {
  460. struct rlimit rlmt;
  461. if (cf->rlimit_nofile != 0) {
  462. rlmt.rlim_cur = (rlim_t) cf->rlimit_nofile;
  463. rlmt.rlim_max = (rlim_t) cf->rlimit_nofile;
  464. if (setrlimit (RLIMIT_NOFILE, &rlmt) == -1) {
  465. msg_warn_main ("cannot set files rlimit: %d, %s",
  466. cf->rlimit_nofile,
  467. strerror (errno));
  468. }
  469. }
  470. if (rspamd_main->cores_throttling) {
  471. msg_info_main ("disable core files for the new worker, as limits are reached");
  472. rlmt.rlim_cur = 0;
  473. rlmt.rlim_max = 0;
  474. if (setrlimit (RLIMIT_CORE, &rlmt) == -1) {
  475. msg_warn_main ("cannot disable core: %s",
  476. strerror (errno));
  477. }
  478. }
  479. else {
  480. if (cf->rlimit_maxcore != 0) {
  481. rlmt.rlim_cur = (rlim_t) cf->rlimit_maxcore;
  482. rlmt.rlim_max = (rlim_t) cf->rlimit_maxcore;
  483. if (setrlimit (RLIMIT_CORE, &rlmt) == -1) {
  484. msg_warn_main ("cannot set max core rlimit: %d, %s",
  485. cf->rlimit_maxcore,
  486. strerror (errno));
  487. }
  488. }
  489. }
  490. }
  491. struct rspamd_worker *
  492. rspamd_fork_worker (struct rspamd_main *rspamd_main,
  493. struct rspamd_worker_conf *cf,
  494. guint index,
  495. struct event_base *ev_base)
  496. {
  497. struct rspamd_worker *wrk;
  498. gint rc;
  499. struct rlimit rlim;
  500. /* Starting worker process */
  501. wrk = (struct rspamd_worker *) g_malloc0 (sizeof (struct rspamd_worker));
  502. if (!rspamd_socketpair (wrk->control_pipe, 0)) {
  503. msg_err ("socketpair failure: %s", strerror (errno));
  504. rspamd_hard_terminate (rspamd_main);
  505. }
  506. if (!rspamd_socketpair (wrk->srv_pipe, 0)) {
  507. msg_err ("socketpair failure: %s", strerror (errno));
  508. rspamd_hard_terminate (rspamd_main);
  509. }
  510. wrk->srv = rspamd_main;
  511. wrk->type = cf->type;
  512. wrk->cf = cf;
  513. wrk->flags = cf->worker->flags;
  514. REF_RETAIN (cf);
  515. wrk->index = index;
  516. wrk->ctx = cf->ctx;
  517. wrk->finish_actions = g_ptr_array_new ();
  518. wrk->ppid = getpid ();
  519. wrk->pid = fork ();
  520. wrk->cores_throttled = rspamd_main->cores_throttling;
  521. switch (wrk->pid) {
  522. case 0:
  523. /* Update pid for logging */
  524. rspamd_log_update_pid (cf->type, rspamd_main->logger);
  525. wrk->pid = getpid ();
  526. /* Init PRNG after fork */
  527. rc = ottery_init (rspamd_main->cfg->libs_ctx->ottery_cfg);
  528. if (rc != OTTERY_ERR_NONE) {
  529. msg_err_main ("cannot initialize PRNG: %d", rc);
  530. abort ();
  531. }
  532. rspamd_random_seed_fast ();
  533. #ifdef HAVE_EVUTIL_RNG_INIT
  534. evutil_secure_rng_init ();
  535. #endif
  536. /* Remove the inherited event base */
  537. event_reinit (rspamd_main->ev_base);
  538. event_base_free (rspamd_main->ev_base);
  539. /* Drop privileges */
  540. rspamd_worker_drop_priv (rspamd_main);
  541. /* Set limits */
  542. rspamd_worker_set_limits (rspamd_main, cf);
  543. /* Re-set stack limit */
  544. getrlimit (RLIMIT_STACK, &rlim);
  545. rlim.rlim_cur = 100 * 1024 * 1024;
  546. rlim.rlim_max = rlim.rlim_cur;
  547. setrlimit (RLIMIT_STACK, &rlim);
  548. if (cf->bind_conf) {
  549. setproctitle ("%s process (%s)", cf->worker->name,
  550. cf->bind_conf->bind_line);
  551. }
  552. else {
  553. setproctitle ("%s process", cf->worker->name);
  554. }
  555. if (rspamd_main->pfh) {
  556. rspamd_pidfile_close (rspamd_main->pfh);
  557. }
  558. /* Do silent log reopen to avoid collisions */
  559. rspamd_log_close (rspamd_main->logger, FALSE);
  560. if (rspamd_main->cfg->log_silent_workers) {
  561. rspamd_main->cfg->log_level = G_LOG_LEVEL_MESSAGE;
  562. rspamd_set_logger (rspamd_main->cfg, cf->type,
  563. &rspamd_main->logger, rspamd_main->server_pool);
  564. }
  565. rspamd_log_open (rspamd_main->logger);
  566. wrk->start_time = rspamd_get_calendar_ticks ();
  567. #if ((GLIB_MAJOR_VERSION == 2) && (GLIB_MINOR_VERSION <= 30))
  568. # if (GLIB_MINOR_VERSION > 20)
  569. /* Ugly hack for old glib */
  570. if (!g_thread_get_initialized ()) {
  571. g_thread_init (NULL);
  572. }
  573. # else
  574. g_thread_init (NULL);
  575. # endif
  576. #endif
  577. if (cf->bind_conf) {
  578. msg_info_main ("starting %s process %P (%d); listen on: %s",
  579. cf->worker->name,
  580. getpid (), index, cf->bind_conf->bind_line);
  581. }
  582. else {
  583. msg_info_main ("starting %s process %P (%d)", cf->worker->name,
  584. getpid (), index);
  585. }
  586. /* Close parent part of socketpair */
  587. close (wrk->control_pipe[0]);
  588. close (wrk->srv_pipe[0]);
  589. rspamd_socket_nonblocking (wrk->control_pipe[1]);
  590. rspamd_socket_nonblocking (wrk->srv_pipe[1]);
  591. /* Execute worker */
  592. cf->worker->worker_start_func (wrk);
  593. exit (EXIT_FAILURE);
  594. break;
  595. case -1:
  596. msg_err_main ("cannot fork main process. %s", strerror (errno));
  597. if (rspamd_main->pfh) {
  598. rspamd_pidfile_remove (rspamd_main->pfh);
  599. }
  600. rspamd_hard_terminate (rspamd_main);
  601. break;
  602. default:
  603. /* Close worker part of socketpair */
  604. close (wrk->control_pipe[1]);
  605. close (wrk->srv_pipe[1]);
  606. rspamd_socket_nonblocking (wrk->control_pipe[0]);
  607. rspamd_socket_nonblocking (wrk->srv_pipe[0]);
  608. rspamd_srv_start_watching (rspamd_main, wrk, ev_base);
  609. /* Insert worker into worker's table, pid is index */
  610. g_hash_table_insert (rspamd_main->workers, GSIZE_TO_POINTER (
  611. wrk->pid), wrk);
  612. break;
  613. }
  614. return wrk;
  615. }
  616. void
  617. rspamd_worker_block_signals (void)
  618. {
  619. sigset_t set;
  620. sigemptyset (&set);
  621. sigaddset (&set, SIGTERM);
  622. sigaddset (&set, SIGINT);
  623. sigaddset (&set, SIGHUP);
  624. sigaddset (&set, SIGUSR1);
  625. sigaddset (&set, SIGUSR2);
  626. sigprocmask (SIG_BLOCK, &set, NULL);
  627. }
  628. void
  629. rspamd_worker_unblock_signals (void)
  630. {
  631. sigset_t set;
  632. sigemptyset (&set);
  633. sigaddset (&set, SIGTERM);
  634. sigaddset (&set, SIGINT);
  635. sigaddset (&set, SIGHUP);
  636. sigaddset (&set, SIGUSR1);
  637. sigaddset (&set, SIGUSR2);
  638. sigprocmask (SIG_UNBLOCK, &set, NULL);
  639. }
  640. void
  641. rspamd_hard_terminate (struct rspamd_main *rspamd_main)
  642. {
  643. GHashTableIter it;
  644. gpointer k, v;
  645. struct rspamd_worker *w;
  646. sigset_t set;
  647. /* Block all signals */
  648. sigemptyset (&set);
  649. sigaddset (&set, SIGTERM);
  650. sigaddset (&set, SIGINT);
  651. sigaddset (&set, SIGHUP);
  652. sigaddset (&set, SIGUSR1);
  653. sigaddset (&set, SIGUSR2);
  654. sigaddset (&set, SIGCHLD);
  655. sigprocmask (SIG_BLOCK, &set, NULL);
  656. /* We need to terminate all workers that might be already spawned */
  657. rspamd_worker_block_signals ();
  658. g_hash_table_iter_init (&it, rspamd_main->workers);
  659. while (g_hash_table_iter_next (&it, &k, &v)) {
  660. w = v;
  661. msg_err_main ("kill worker %P as Rspamd is terminating due to "
  662. "an unrecoverable error", w->pid);
  663. kill (w->pid, SIGKILL);
  664. }
  665. msg_err_main ("shutting down Rspamd due to fatal error");
  666. rspamd_log_close (rspamd_main->logger, TRUE);
  667. exit (EXIT_FAILURE);
  668. }
  669. gboolean
  670. rspamd_worker_is_scanner (struct rspamd_worker *w)
  671. {
  672. if (w) {
  673. return !!(w->flags & RSPAMD_WORKER_SCANNER);
  674. }
  675. return FALSE;
  676. }
  677. gboolean
  678. rspamd_worker_is_primary_controller (struct rspamd_worker *w)
  679. {
  680. if (w) {
  681. return !!(w->flags & RSPAMD_WORKER_CONTROLLER) && w->index == 0;
  682. }
  683. return FALSE;
  684. }
  685. struct rspamd_worker_session_elt {
  686. void *ptr;
  687. guint *pref;
  688. const gchar *tag;
  689. time_t when;
  690. };
  691. struct rspamd_worker_session_cache {
  692. struct event_base *ev_base;
  693. GHashTable *cache;
  694. struct rspamd_config *cfg;
  695. struct timeval tv;
  696. struct event periodic;
  697. };
  698. static gint
  699. rspamd_session_cache_sort_cmp (gconstpointer pa, gconstpointer pb)
  700. {
  701. const struct rspamd_worker_session_elt
  702. *e1 = *(const struct rspamd_worker_session_elt **)pa,
  703. *e2 = *(const struct rspamd_worker_session_elt **)pb;
  704. return e2->when < e1->when;
  705. }
  706. static void
  707. rspamd_sessions_cache_periodic (gint fd, short what, gpointer p)
  708. {
  709. struct rspamd_worker_session_cache *c = p;
  710. GHashTableIter it;
  711. gchar timebuf[32];
  712. gpointer k, v;
  713. struct rspamd_worker_session_elt *elt;
  714. struct tm tms;
  715. GPtrArray *res;
  716. guint i;
  717. if (g_hash_table_size (c->cache) > c->cfg->max_sessions_cache) {
  718. res = g_ptr_array_sized_new (g_hash_table_size (c->cache));
  719. g_hash_table_iter_init (&it, c->cache);
  720. while (g_hash_table_iter_next (&it, &k, &v)) {
  721. g_ptr_array_add (res, v);
  722. }
  723. msg_err ("sessions cache is overflowed %d elements where %d is limit",
  724. (gint)res->len, (gint)c->cfg->max_sessions_cache);
  725. g_ptr_array_sort (res, rspamd_session_cache_sort_cmp);
  726. PTR_ARRAY_FOREACH (res, i, elt) {
  727. rspamd_localtime (elt->when, &tms);
  728. strftime (timebuf, sizeof (timebuf), "%F %H:%M:%S", &tms);
  729. msg_warn ("redundant session; ptr: %p, "
  730. "tag: %s, refcount: %d, time: %s",
  731. elt->ptr, elt->tag ? elt->tag : "unknown",
  732. elt->pref ? *elt->pref : 0,
  733. timebuf);
  734. }
  735. }
  736. }
  737. void *
  738. rspamd_worker_session_cache_new (struct rspamd_worker *w,
  739. struct event_base *ev_base)
  740. {
  741. struct rspamd_worker_session_cache *c;
  742. static const gdouble periodic_interval = 60.0;
  743. c = g_malloc0 (sizeof (*c));
  744. c->ev_base = ev_base;
  745. c->cache = g_hash_table_new_full (g_direct_hash, g_direct_equal,
  746. NULL, g_free);
  747. c->cfg = w->srv->cfg;
  748. double_to_tv (periodic_interval, &c->tv);
  749. event_set (&c->periodic, -1, EV_TIMEOUT|EV_PERSIST,
  750. rspamd_sessions_cache_periodic, c);
  751. event_base_set (ev_base, &c->periodic);
  752. event_add (&c->periodic, &c->tv);
  753. return c;
  754. }
  755. void
  756. rspamd_worker_session_cache_add (void *cache, const gchar *tag,
  757. guint *pref, void *ptr)
  758. {
  759. struct rspamd_worker_session_cache *c = cache;
  760. struct rspamd_worker_session_elt *elt;
  761. elt = g_malloc0 (sizeof (*elt));
  762. elt->pref = pref;
  763. elt->ptr = ptr;
  764. elt->tag = tag;
  765. elt->when = time (NULL);
  766. g_hash_table_insert (c->cache, elt->ptr, elt);
  767. }
  768. void
  769. rspamd_worker_session_cache_remove (void *cache, void *ptr)
  770. {
  771. struct rspamd_worker_session_cache *c = cache;
  772. g_hash_table_remove (c->cache, ptr);
  773. }
  774. static void
  775. rspamd_worker_monitored_on_change (struct rspamd_monitored_ctx *ctx,
  776. struct rspamd_monitored *m, gboolean alive,
  777. void *ud)
  778. {
  779. struct rspamd_worker *worker = ud;
  780. struct rspamd_config *cfg = worker->srv->cfg;
  781. struct event_base *ev_base;
  782. guchar tag[RSPAMD_MONITORED_TAG_LEN];
  783. static struct rspamd_srv_command srv_cmd;
  784. rspamd_monitored_get_tag (m, tag);
  785. ev_base = rspamd_monitored_ctx_get_ev_base (ctx);
  786. memset (&srv_cmd, 0, sizeof (srv_cmd));
  787. srv_cmd.type = RSPAMD_SRV_MONITORED_CHANGE;
  788. rspamd_strlcpy (srv_cmd.cmd.monitored_change.tag, tag,
  789. sizeof (srv_cmd.cmd.monitored_change.tag));
  790. srv_cmd.cmd.monitored_change.alive = alive;
  791. srv_cmd.cmd.monitored_change.sender = getpid ();
  792. msg_info_config ("broadcast monitored update for %s: %s",
  793. srv_cmd.cmd.monitored_change.tag, alive ? "alive" : "dead");
  794. rspamd_srv_send_command (worker, ev_base, &srv_cmd, -1, NULL, NULL);
  795. }
  796. void
  797. rspamd_worker_init_monitored (struct rspamd_worker *worker,
  798. struct event_base *ev_base,
  799. struct rspamd_dns_resolver *resolver)
  800. {
  801. rspamd_monitored_ctx_config (worker->srv->cfg->monitored_ctx,
  802. worker->srv->cfg, ev_base, resolver->r,
  803. rspamd_worker_monitored_on_change, worker);
  804. }
  805. #ifdef HAVE_SA_SIGINFO
  806. #ifdef WITH_LIBUNWIND
  807. static void
  808. rspamd_print_crash (ucontext_t *uap)
  809. {
  810. unw_cursor_t cursor;
  811. unw_word_t ip, off;
  812. guint level;
  813. gint ret;
  814. if ((ret = unw_init_local (&cursor, uap)) != 0) {
  815. msg_err ("unw_init_local: %d", ret);
  816. return;
  817. }
  818. level = 0;
  819. ret = 0;
  820. for (;;) {
  821. char name[128];
  822. if (level >= UNWIND_BACKTRACE_DEPTH) {
  823. break;
  824. }
  825. unw_get_reg (&cursor, UNW_REG_IP, &ip);
  826. ret = unw_get_proc_name(&cursor, name, sizeof (name), &off);
  827. if (ret == 0) {
  828. msg_err ("%d: %p: %s()+0x%xl",
  829. level, ip, name, (uintptr_t)off);
  830. } else {
  831. msg_err ("%d: %p: <unknown>", level, ip);
  832. }
  833. level++;
  834. ret = unw_step (&cursor);
  835. if (ret <= 0) {
  836. break;
  837. }
  838. }
  839. if (ret < 0) {
  840. msg_err ("unw_step_ptr: %d", ret);
  841. }
  842. }
  843. #endif
  844. static struct rspamd_main *saved_main = NULL;
  845. static gboolean
  846. rspamd_crash_propagate (gpointer key, gpointer value, gpointer unused)
  847. {
  848. struct rspamd_worker *w = value;
  849. /* Kill children softly */
  850. kill (w->pid, SIGTERM);
  851. return TRUE;
  852. }
  853. static void
  854. rspamd_crash_sig_handler (int sig, siginfo_t *info, void *ctx)
  855. {
  856. struct sigaction sa;
  857. ucontext_t *uap = ctx;
  858. pid_t pid;
  859. pid = getpid ();
  860. msg_err ("caught fatal signal %d(%s), "
  861. "pid: %P, trace: ",
  862. sig, strsignal (sig), pid);
  863. (void)uap;
  864. #ifdef WITH_LIBUNWIND
  865. rspamd_print_crash (uap);
  866. #endif
  867. if (saved_main) {
  868. if (pid == saved_main->pid) {
  869. /*
  870. * Main process has crashed, propagate crash further to trigger
  871. * monitoring alerts and mass panic
  872. */
  873. g_hash_table_foreach_remove (saved_main->workers,
  874. rspamd_crash_propagate, NULL);
  875. }
  876. }
  877. /*
  878. * Invoke signal with the default handler
  879. */
  880. sigemptyset (&sa.sa_mask);
  881. sa.sa_handler = SIG_DFL;
  882. sa.sa_flags = 0;
  883. sigaction (sig, &sa, NULL);
  884. kill (pid, sig);
  885. }
  886. #endif
  887. void
  888. rspamd_set_crash_handler (struct rspamd_main *rspamd_main)
  889. {
  890. #ifdef HAVE_SA_SIGINFO
  891. struct sigaction sa;
  892. #ifdef HAVE_SIGALTSTACK
  893. stack_t ss;
  894. memset (&ss, 0, sizeof ss);
  895. /* Allocate special stack, NOT freed at the end so far */
  896. ss.ss_size = MAX (SIGSTKSZ, 8192 * 4);
  897. ss.ss_sp = g_malloc0 (ss.ss_size);
  898. sigaltstack (&ss, NULL);
  899. #endif
  900. saved_main = rspamd_main;
  901. sigemptyset (&sa.sa_mask);
  902. sa.sa_sigaction = &rspamd_crash_sig_handler;
  903. sa.sa_flags = SA_RESTART | SA_SIGINFO | SA_ONSTACK;
  904. sigaction (SIGSEGV, &sa, NULL);
  905. sigaction (SIGBUS, &sa, NULL);
  906. sigaction (SIGABRT, &sa, NULL);
  907. sigaction (SIGFPE, &sa, NULL);
  908. sigaction (SIGSYS, &sa, NULL);
  909. #endif
  910. }