You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

worker_util.c 25KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "config.h"
  17. #include "rspamd.h"
  18. #include "lua/lua_common.h"
  19. #include "worker_util.h"
  20. #include "unix-std.h"
  21. #include "utlist.h"
  22. #include "ottery.h"
  23. #include "rspamd_control.h"
  24. #include "libutil/map.h"
  25. #include "libutil/map_private.h"
  26. #include "libutil/http_private.h"
  27. #ifdef WITH_GPERF_TOOLS
  28. #include <gperftools/profiler.h>
  29. #endif
  30. /* sys/resource.h */
  31. #ifdef HAVE_SYS_RESOURCE_H
  32. #include <sys/resource.h>
  33. #endif
  34. /* pwd and grp */
  35. #ifdef HAVE_PWD_H
  36. #include <pwd.h>
  37. #endif
  38. #ifdef HAVE_GRP_H
  39. #include <grp.h>
  40. #endif
  41. #ifdef HAVE_LIBUTIL_H
  42. #include <libutil.h>
  43. #endif
  44. #include "zlib.h"
  45. #ifdef WITH_LIBUNWIND
  46. #define UNW_LOCAL_ONLY 1
  47. #include <libunwind.h>
  48. #define UNWIND_BACKTRACE_DEPTH 256
  49. #endif
  50. #ifdef HAVE_UCONTEXT_H
  51. #include <ucontext.h>
  52. #endif
  53. static void rspamd_worker_ignore_signal (int signo);
  54. /**
  55. * Return worker's control structure by its type
  56. * @param type
  57. * @return worker's control structure or NULL
  58. */
  59. worker_t *
  60. rspamd_get_worker_by_type (struct rspamd_config *cfg, GQuark type)
  61. {
  62. worker_t **pwrk;
  63. pwrk = cfg->compiled_workers;
  64. while (pwrk && *pwrk) {
  65. if (rspamd_check_worker (cfg, *pwrk)) {
  66. if (g_quark_from_string ((*pwrk)->name) == type) {
  67. return *pwrk;
  68. }
  69. }
  70. pwrk++;
  71. }
  72. return NULL;
  73. }
  74. static gboolean
  75. rspamd_worker_terminate_handlers (struct rspamd_worker *w)
  76. {
  77. guint i;
  78. gboolean (*cb)(struct rspamd_worker *);
  79. gboolean ret = FALSE;
  80. for (i = 0; i < w->finish_actions->len; i ++) {
  81. cb = g_ptr_array_index (w->finish_actions, i);
  82. if (cb (w)) {
  83. ret = TRUE;
  84. }
  85. }
  86. return ret;
  87. }
  88. /*
  89. * Config reload is designed by sending sigusr2 to active workers and pending shutdown of them
  90. */
  91. static gboolean
  92. rspamd_worker_usr2_handler (struct rspamd_worker_signal_handler *sigh, void *arg)
  93. {
  94. /* Do not accept new connections, preparing to end worker's process */
  95. struct timeval tv;
  96. if (!sigh->worker->wanna_die) {
  97. rspamd_worker_ignore_signal (SIGUSR2);
  98. tv.tv_sec = SOFT_SHUTDOWN_TIME;
  99. tv.tv_usec = 0;
  100. sigh->worker->wanna_die = TRUE;
  101. rspamd_worker_terminate_handlers (sigh->worker);
  102. rspamd_default_log_function (G_LOG_LEVEL_INFO,
  103. sigh->worker->srv->server_pool->tag.tagname,
  104. sigh->worker->srv->server_pool->tag.uid,
  105. G_STRFUNC,
  106. "worker's shutdown is pending in %d sec",
  107. SOFT_SHUTDOWN_TIME);
  108. event_base_loopexit (sigh->base, &tv);
  109. rspamd_worker_stop_accept (sigh->worker);
  110. }
  111. /* No more signals */
  112. return FALSE;
  113. }
  114. /*
  115. * Reopen log is designed by sending sigusr1 to active workers and pending shutdown of them
  116. */
  117. static gboolean
  118. rspamd_worker_usr1_handler (struct rspamd_worker_signal_handler *sigh, void *arg)
  119. {
  120. rspamd_log_reopen (sigh->worker->srv->logger);
  121. /* Get more signals */
  122. return TRUE;
  123. }
  124. static gboolean
  125. rspamd_worker_term_handler (struct rspamd_worker_signal_handler *sigh, void *arg)
  126. {
  127. struct timeval tv;
  128. if (!sigh->worker->wanna_die) {
  129. rspamd_default_log_function (G_LOG_LEVEL_INFO,
  130. sigh->worker->srv->server_pool->tag.tagname,
  131. sigh->worker->srv->server_pool->tag.uid,
  132. G_STRFUNC,
  133. "terminating after receiving signal %s",
  134. g_strsignal (sigh->signo));
  135. tv.tv_usec = 0;
  136. if (rspamd_worker_terminate_handlers (sigh->worker)) {
  137. tv.tv_sec = SOFT_SHUTDOWN_TIME;
  138. }
  139. else {
  140. tv.tv_sec = 0;
  141. }
  142. sigh->worker->wanna_die = 1;
  143. event_base_loopexit (sigh->base, &tv);
  144. #ifdef WITH_GPERF_TOOLS
  145. ProfilerStop ();
  146. #endif
  147. rspamd_worker_stop_accept (sigh->worker);
  148. }
  149. /* Stop reacting on signals */
  150. return FALSE;
  151. }
  152. static void
  153. rspamd_worker_signal_handle (int fd, short what, void *arg)
  154. {
  155. struct rspamd_worker_signal_handler *sigh =
  156. (struct rspamd_worker_signal_handler *) arg;
  157. struct rspamd_worker_signal_cb *cb, *cbtmp;
  158. /* Call all signal handlers registered */
  159. DL_FOREACH_SAFE (sigh->cb, cb, cbtmp) {
  160. if (!cb->handler (sigh, cb->handler_data)) {
  161. DL_DELETE (sigh->cb, cb);
  162. }
  163. }
  164. }
  165. static void
  166. rspamd_worker_ignore_signal (int signo)
  167. {
  168. struct sigaction sig;
  169. sigemptyset (&sig.sa_mask);
  170. sigaddset (&sig.sa_mask, signo);
  171. sig.sa_handler = SIG_IGN;
  172. sig.sa_flags = 0;
  173. sigaction (signo, &sig, NULL);
  174. }
  175. static void
  176. rspamd_worker_default_signal (int signo)
  177. {
  178. struct sigaction sig;
  179. sigemptyset (&sig.sa_mask);
  180. sigaddset (&sig.sa_mask, signo);
  181. sig.sa_handler = SIG_DFL;
  182. sig.sa_flags = 0;
  183. sigaction (signo, &sig, NULL);
  184. }
  185. static void
  186. rspamd_sigh_free (void *p)
  187. {
  188. struct rspamd_worker_signal_handler *sigh = p;
  189. struct rspamd_worker_signal_cb *cb, *tmp;
  190. DL_FOREACH_SAFE (sigh->cb, cb, tmp) {
  191. DL_DELETE (sigh->cb, cb);
  192. g_free (cb);
  193. }
  194. event_del (&sigh->ev);
  195. rspamd_worker_default_signal (sigh->signo);
  196. g_free (sigh);
  197. }
  198. void
  199. rspamd_worker_set_signal_handler (int signo, struct rspamd_worker *worker,
  200. struct event_base *base,
  201. rspamd_worker_signal_handler handler,
  202. void *handler_data)
  203. {
  204. struct rspamd_worker_signal_handler *sigh;
  205. struct rspamd_worker_signal_cb *cb;
  206. sigh = g_hash_table_lookup (worker->signal_events, GINT_TO_POINTER (signo));
  207. if (sigh == NULL) {
  208. sigh = g_malloc0 (sizeof (*sigh));
  209. sigh->signo = signo;
  210. sigh->worker = worker;
  211. sigh->base = base;
  212. sigh->enabled = TRUE;
  213. signal_set (&sigh->ev, signo, rspamd_worker_signal_handle, sigh);
  214. event_base_set (base, &sigh->ev);
  215. signal_add (&sigh->ev, NULL);
  216. g_hash_table_insert (worker->signal_events,
  217. GINT_TO_POINTER (signo),
  218. sigh);
  219. }
  220. cb = g_malloc0 (sizeof (*cb));
  221. cb->handler = handler;
  222. cb->handler_data = handler_data;
  223. DL_APPEND (sigh->cb, cb);
  224. }
  225. void
  226. rspamd_worker_init_signals (struct rspamd_worker *worker, struct event_base *base)
  227. {
  228. struct sigaction signals;
  229. /* We ignore these signals in the worker */
  230. rspamd_worker_ignore_signal (SIGPIPE);
  231. rspamd_worker_ignore_signal (SIGALRM);
  232. rspamd_worker_ignore_signal (SIGCHLD);
  233. /* A set of terminating signals */
  234. rspamd_worker_set_signal_handler (SIGTERM, worker, base,
  235. rspamd_worker_term_handler, NULL);
  236. rspamd_worker_set_signal_handler (SIGINT, worker, base,
  237. rspamd_worker_term_handler, NULL);
  238. rspamd_worker_set_signal_handler (SIGHUP, worker, base,
  239. rspamd_worker_term_handler, NULL);
  240. /* Special purpose signals */
  241. rspamd_worker_set_signal_handler (SIGUSR1, worker, base,
  242. rspamd_worker_usr1_handler, NULL);
  243. rspamd_worker_set_signal_handler (SIGUSR2, worker, base,
  244. rspamd_worker_usr2_handler, NULL);
  245. /* Unblock all signals processed */
  246. sigemptyset (&signals.sa_mask);
  247. sigaddset (&signals.sa_mask, SIGTERM);
  248. sigaddset (&signals.sa_mask, SIGINT);
  249. sigaddset (&signals.sa_mask, SIGHUP);
  250. sigaddset (&signals.sa_mask, SIGCHLD);
  251. sigaddset (&signals.sa_mask, SIGUSR1);
  252. sigaddset (&signals.sa_mask, SIGUSR2);
  253. sigaddset (&signals.sa_mask, SIGALRM);
  254. sigaddset (&signals.sa_mask, SIGPIPE);
  255. sigprocmask (SIG_UNBLOCK, &signals.sa_mask, NULL);
  256. }
  257. struct event_base *
  258. rspamd_prepare_worker (struct rspamd_worker *worker, const char *name,
  259. void (*accept_handler)(int, short, void *))
  260. {
  261. struct event_base *ev_base;
  262. struct event *accept_events;
  263. GList *cur;
  264. struct rspamd_worker_listen_socket *ls;
  265. #ifdef WITH_PROFILER
  266. extern void _start (void), etext (void);
  267. monstartup ((u_long) & _start, (u_long) & etext);
  268. #endif
  269. gperf_profiler_init (worker->srv->cfg, name);
  270. worker->signal_events = g_hash_table_new_full (g_direct_hash, g_direct_equal,
  271. NULL, rspamd_sigh_free);
  272. ev_base = event_init ();
  273. rspamd_worker_init_signals (worker, ev_base);
  274. rspamd_control_worker_add_default_handler (worker, ev_base);
  275. #ifdef WITH_HIREDIS
  276. rspamd_redis_pool_config (worker->srv->cfg->redis_pool,
  277. worker->srv->cfg, ev_base);
  278. #endif
  279. /* Accept all sockets */
  280. if (accept_handler) {
  281. cur = worker->cf->listen_socks;
  282. while (cur) {
  283. ls = cur->data;
  284. if (ls->fd != -1) {
  285. accept_events = g_malloc0 (sizeof (struct event) * 2);
  286. event_set (&accept_events[0], ls->fd, EV_READ | EV_PERSIST,
  287. accept_handler, worker);
  288. event_base_set (ev_base, &accept_events[0]);
  289. event_add (&accept_events[0], NULL);
  290. worker->accept_events = g_list_prepend (worker->accept_events,
  291. accept_events);
  292. }
  293. cur = g_list_next (cur);
  294. }
  295. }
  296. return ev_base;
  297. }
  298. void
  299. rspamd_worker_stop_accept (struct rspamd_worker *worker)
  300. {
  301. GList *cur;
  302. struct event *events;
  303. /* Remove all events */
  304. cur = worker->accept_events;
  305. while (cur) {
  306. events = cur->data;
  307. if (event_get_base (&events[0])) {
  308. event_del (&events[0]);
  309. }
  310. if (event_get_base (&events[1])) {
  311. event_del (&events[1]);
  312. }
  313. cur = g_list_next (cur);
  314. g_free (events);
  315. }
  316. if (worker->accept_events != NULL) {
  317. g_list_free (worker->accept_events);
  318. }
  319. /* XXX: we need to do it much later */
  320. #if 0
  321. g_hash_table_iter_init (&it, worker->signal_events);
  322. while (g_hash_table_iter_next (&it, &k, &v)) {
  323. sigh = (struct rspamd_worker_signal_handler *)v;
  324. g_hash_table_iter_steal (&it);
  325. if (sigh->enabled) {
  326. event_del (&sigh->ev);
  327. }
  328. g_free (sigh);
  329. }
  330. g_hash_table_unref (worker->signal_events);
  331. #endif
  332. }
  333. static rspamd_fstring_t *
  334. rspamd_controller_maybe_compress (struct rspamd_http_connection_entry *entry,
  335. rspamd_fstring_t *buf, struct rspamd_http_message *msg)
  336. {
  337. if (entry->support_gzip) {
  338. if (rspamd_fstring_gzip (&buf)) {
  339. rspamd_http_message_add_header (msg, "Content-Encoding", "gzip");
  340. }
  341. }
  342. return buf;
  343. }
  344. void
  345. rspamd_controller_send_error (struct rspamd_http_connection_entry *entry,
  346. gint code, const gchar *error_msg, ...)
  347. {
  348. struct rspamd_http_message *msg;
  349. va_list args;
  350. rspamd_fstring_t *reply;
  351. msg = rspamd_http_new_message (HTTP_RESPONSE);
  352. va_start (args, error_msg);
  353. msg->status = rspamd_fstring_new ();
  354. rspamd_vprintf_fstring (&msg->status, error_msg, args);
  355. va_end (args);
  356. msg->date = time (NULL);
  357. msg->code = code;
  358. reply = rspamd_fstring_sized_new (msg->status->len + 16);
  359. rspamd_printf_fstring (&reply, "{\"error\":\"%V\"}", msg->status);
  360. rspamd_http_message_set_body_from_fstring_steal (msg,
  361. rspamd_controller_maybe_compress (entry, reply, msg));
  362. rspamd_http_connection_reset (entry->conn);
  363. rspamd_http_router_insert_headers (entry->rt, msg);
  364. rspamd_http_connection_write_message (entry->conn,
  365. msg,
  366. NULL,
  367. "application/json",
  368. entry,
  369. entry->conn->fd,
  370. entry->rt->ptv,
  371. entry->rt->ev_base);
  372. entry->is_reply = TRUE;
  373. }
  374. void
  375. rspamd_controller_send_string (struct rspamd_http_connection_entry *entry,
  376. const gchar *str)
  377. {
  378. struct rspamd_http_message *msg;
  379. rspamd_fstring_t *reply;
  380. msg = rspamd_http_new_message (HTTP_RESPONSE);
  381. msg->date = time (NULL);
  382. msg->code = 200;
  383. msg->status = rspamd_fstring_new_init ("OK", 2);
  384. reply = rspamd_fstring_new_init (str, strlen (str));
  385. rspamd_http_message_set_body_from_fstring_steal (msg,
  386. rspamd_controller_maybe_compress (entry, reply, msg));
  387. rspamd_http_connection_reset (entry->conn);
  388. rspamd_http_router_insert_headers (entry->rt, msg);
  389. rspamd_http_connection_write_message (entry->conn,
  390. msg,
  391. NULL,
  392. "application/json",
  393. entry,
  394. entry->conn->fd,
  395. entry->rt->ptv,
  396. entry->rt->ev_base);
  397. entry->is_reply = TRUE;
  398. }
  399. void
  400. rspamd_controller_send_ucl (struct rspamd_http_connection_entry *entry,
  401. ucl_object_t *obj)
  402. {
  403. struct rspamd_http_message *msg;
  404. rspamd_fstring_t *reply;
  405. msg = rspamd_http_new_message (HTTP_RESPONSE);
  406. msg->date = time (NULL);
  407. msg->code = 200;
  408. msg->status = rspamd_fstring_new_init ("OK", 2);
  409. reply = rspamd_fstring_sized_new (BUFSIZ);
  410. rspamd_ucl_emit_fstring (obj, UCL_EMIT_JSON_COMPACT, &reply);
  411. rspamd_http_message_set_body_from_fstring_steal (msg,
  412. rspamd_controller_maybe_compress (entry, reply, msg));
  413. rspamd_http_connection_reset (entry->conn);
  414. rspamd_http_router_insert_headers (entry->rt, msg);
  415. rspamd_http_connection_write_message (entry->conn,
  416. msg,
  417. NULL,
  418. "application/json",
  419. entry,
  420. entry->conn->fd,
  421. entry->rt->ptv,
  422. entry->rt->ev_base);
  423. entry->is_reply = TRUE;
  424. }
  425. static void
  426. rspamd_worker_drop_priv (struct rspamd_main *rspamd_main)
  427. {
  428. if (rspamd_main->is_privilleged) {
  429. if (setgid (rspamd_main->workers_gid) == -1) {
  430. msg_err_main ("cannot setgid to %d (%s), aborting",
  431. (gint) rspamd_main->workers_gid,
  432. strerror (errno));
  433. exit (-errno);
  434. }
  435. if (rspamd_main->cfg->rspamd_user &&
  436. initgroups (rspamd_main->cfg->rspamd_user, rspamd_main->workers_gid) ==
  437. -1) {
  438. msg_err_main ("initgroups failed (%s), aborting", strerror (errno));
  439. exit (-errno);
  440. }
  441. if (setuid (rspamd_main->workers_uid) == -1) {
  442. msg_err_main ("cannot setuid to %d (%s), aborting",
  443. (gint) rspamd_main->workers_uid,
  444. strerror (errno));
  445. exit (-errno);
  446. }
  447. }
  448. }
  449. static void
  450. rspamd_worker_set_limits (struct rspamd_main *rspamd_main,
  451. struct rspamd_worker_conf *cf)
  452. {
  453. struct rlimit rlmt;
  454. if (cf->rlimit_nofile != 0) {
  455. rlmt.rlim_cur = (rlim_t) cf->rlimit_nofile;
  456. rlmt.rlim_max = (rlim_t) cf->rlimit_nofile;
  457. if (setrlimit (RLIMIT_NOFILE, &rlmt) == -1) {
  458. msg_warn_main ("cannot set files rlimit: %d, %s",
  459. cf->rlimit_nofile,
  460. strerror (errno));
  461. }
  462. }
  463. if (rspamd_main->cores_throttling) {
  464. msg_info_main ("disable core files for the new worker, as limits are reached");
  465. rlmt.rlim_cur = 0;
  466. rlmt.rlim_max = 0;
  467. if (setrlimit (RLIMIT_CORE, &rlmt) == -1) {
  468. msg_warn_main ("cannot disable core: %s",
  469. strerror (errno));
  470. }
  471. }
  472. else {
  473. if (cf->rlimit_maxcore != 0) {
  474. rlmt.rlim_cur = (rlim_t) cf->rlimit_maxcore;
  475. rlmt.rlim_max = (rlim_t) cf->rlimit_maxcore;
  476. if (setrlimit (RLIMIT_CORE, &rlmt) == -1) {
  477. msg_warn_main ("cannot set max core rlimit: %d, %s",
  478. cf->rlimit_maxcore,
  479. strerror (errno));
  480. }
  481. }
  482. }
  483. }
  484. struct rspamd_worker *
  485. rspamd_fork_worker (struct rspamd_main *rspamd_main,
  486. struct rspamd_worker_conf *cf,
  487. guint index,
  488. struct event_base *ev_base)
  489. {
  490. struct rspamd_worker *wrk;
  491. gint rc;
  492. struct rlimit rlim;
  493. /* Starting worker process */
  494. wrk = (struct rspamd_worker *) g_malloc0 (sizeof (struct rspamd_worker));
  495. if (!rspamd_socketpair (wrk->control_pipe, 0)) {
  496. msg_err ("socketpair failure: %s", strerror (errno));
  497. rspamd_hard_terminate (rspamd_main);
  498. }
  499. if (!rspamd_socketpair (wrk->srv_pipe, 0)) {
  500. msg_err ("socketpair failure: %s", strerror (errno));
  501. rspamd_hard_terminate (rspamd_main);
  502. }
  503. wrk->srv = rspamd_main;
  504. wrk->type = cf->type;
  505. wrk->cf = cf;
  506. wrk->flags = cf->worker->flags;
  507. REF_RETAIN (cf);
  508. wrk->index = index;
  509. wrk->ctx = cf->ctx;
  510. wrk->finish_actions = g_ptr_array_new ();
  511. wrk->ppid = getpid ();
  512. wrk->pid = fork ();
  513. switch (wrk->pid) {
  514. case 0:
  515. /* Update pid for logging */
  516. rspamd_log_update_pid (cf->type, rspamd_main->logger);
  517. wrk->pid = getpid ();
  518. /* Init PRNG after fork */
  519. rc = ottery_init (rspamd_main->cfg->libs_ctx->ottery_cfg);
  520. if (rc != OTTERY_ERR_NONE) {
  521. msg_err_main ("cannot initialize PRNG: %d", rc);
  522. abort ();
  523. }
  524. rspamd_random_seed_fast ();
  525. #ifdef HAVE_EVUTIL_RNG_INIT
  526. evutil_secure_rng_init ();
  527. #endif
  528. /* Remove the inherited event base */
  529. event_reinit (rspamd_main->ev_base);
  530. event_base_free (rspamd_main->ev_base);
  531. /* Drop privileges */
  532. rspamd_worker_drop_priv (rspamd_main);
  533. /* Set limits */
  534. rspamd_worker_set_limits (rspamd_main, cf);
  535. /* Re-set stack limit */
  536. getrlimit (RLIMIT_STACK, &rlim);
  537. rlim.rlim_cur = 100 * 1024 * 1024;
  538. rlim.rlim_max = rlim.rlim_cur;
  539. setrlimit (RLIMIT_STACK, &rlim);
  540. if (cf->bind_conf) {
  541. setproctitle ("%s process (%s)", cf->worker->name,
  542. cf->bind_conf->bind_line);
  543. }
  544. else {
  545. setproctitle ("%s process", cf->worker->name);
  546. }
  547. if (rspamd_main->pfh) {
  548. rspamd_pidfile_close (rspamd_main->pfh);
  549. }
  550. /* Do silent log reopen to avoid collisions */
  551. rspamd_log_close (rspamd_main->logger);
  552. if (rspamd_main->cfg->log_silent_workers) {
  553. rspamd_main->cfg->log_level = G_LOG_LEVEL_MESSAGE;
  554. rspamd_set_logger (rspamd_main->cfg, cf->type,
  555. &rspamd_main->logger, rspamd_main->server_pool);
  556. }
  557. rspamd_log_open (rspamd_main->logger);
  558. wrk->start_time = rspamd_get_calendar_ticks ();
  559. #if ((GLIB_MAJOR_VERSION == 2) && (GLIB_MINOR_VERSION <= 30))
  560. # if (GLIB_MINOR_VERSION > 20)
  561. /* Ugly hack for old glib */
  562. if (!g_thread_get_initialized ()) {
  563. g_thread_init (NULL);
  564. }
  565. # else
  566. g_thread_init (NULL);
  567. # endif
  568. #endif
  569. if (cf->bind_conf) {
  570. msg_info_main ("starting %s process %P (%d); listen on: %s",
  571. cf->worker->name,
  572. getpid (), index, cf->bind_conf->bind_line);
  573. }
  574. else {
  575. msg_info_main ("starting %s process %P (%d)", cf->worker->name,
  576. getpid (), index);
  577. }
  578. /* Close parent part of socketpair */
  579. close (wrk->control_pipe[0]);
  580. close (wrk->srv_pipe[0]);
  581. rspamd_socket_nonblocking (wrk->control_pipe[1]);
  582. rspamd_socket_nonblocking (wrk->srv_pipe[1]);
  583. /* Execute worker */
  584. cf->worker->worker_start_func (wrk);
  585. exit (EXIT_FAILURE);
  586. break;
  587. case -1:
  588. msg_err_main ("cannot fork main process. %s", strerror (errno));
  589. if (rspamd_main->pfh) {
  590. rspamd_pidfile_remove (rspamd_main->pfh);
  591. }
  592. rspamd_hard_terminate (rspamd_main);
  593. break;
  594. default:
  595. /* Close worker part of socketpair */
  596. close (wrk->control_pipe[1]);
  597. close (wrk->srv_pipe[1]);
  598. rspamd_socket_nonblocking (wrk->control_pipe[0]);
  599. rspamd_socket_nonblocking (wrk->srv_pipe[0]);
  600. rspamd_srv_start_watching (rspamd_main, wrk, ev_base);
  601. /* Insert worker into worker's table, pid is index */
  602. g_hash_table_insert (rspamd_main->workers, GSIZE_TO_POINTER (
  603. wrk->pid), wrk);
  604. break;
  605. }
  606. return wrk;
  607. }
  608. void
  609. rspamd_worker_block_signals (void)
  610. {
  611. sigset_t set;
  612. sigemptyset (&set);
  613. sigaddset (&set, SIGTERM);
  614. sigaddset (&set, SIGINT);
  615. sigaddset (&set, SIGHUP);
  616. sigaddset (&set, SIGUSR1);
  617. sigaddset (&set, SIGUSR2);
  618. sigprocmask (SIG_BLOCK, &set, NULL);
  619. }
  620. void
  621. rspamd_worker_unblock_signals (void)
  622. {
  623. sigset_t set;
  624. sigemptyset (&set);
  625. sigaddset (&set, SIGTERM);
  626. sigaddset (&set, SIGINT);
  627. sigaddset (&set, SIGHUP);
  628. sigaddset (&set, SIGUSR1);
  629. sigaddset (&set, SIGUSR2);
  630. sigprocmask (SIG_UNBLOCK, &set, NULL);
  631. }
  632. void
  633. rspamd_hard_terminate (struct rspamd_main *rspamd_main)
  634. {
  635. GHashTableIter it;
  636. gpointer k, v;
  637. struct rspamd_worker *w;
  638. sigset_t set;
  639. /* Block all signals */
  640. sigemptyset (&set);
  641. sigaddset (&set, SIGTERM);
  642. sigaddset (&set, SIGINT);
  643. sigaddset (&set, SIGHUP);
  644. sigaddset (&set, SIGUSR1);
  645. sigaddset (&set, SIGUSR2);
  646. sigaddset (&set, SIGCHLD);
  647. sigprocmask (SIG_BLOCK, &set, NULL);
  648. /* We need to terminate all workers that might be already spawned */
  649. rspamd_worker_block_signals ();
  650. g_hash_table_iter_init (&it, rspamd_main->workers);
  651. while (g_hash_table_iter_next (&it, &k, &v)) {
  652. w = v;
  653. msg_err_main ("kill worker %P as Rspamd is terminating due to "
  654. "an unrecoverable error", w->pid);
  655. kill (w->pid, SIGKILL);
  656. }
  657. msg_err_main ("shutting down Rspamd due to fatal error");
  658. rspamd_log_close (rspamd_main->logger);
  659. exit (EXIT_FAILURE);
  660. }
  661. gboolean
  662. rspamd_worker_is_scanner (struct rspamd_worker *w)
  663. {
  664. if (w) {
  665. return !!(w->flags & RSPAMD_WORKER_SCANNER);
  666. }
  667. return FALSE;
  668. }
  669. gboolean
  670. rspamd_worker_is_primary_controller (struct rspamd_worker *w)
  671. {
  672. if (w) {
  673. return !!(w->flags & RSPAMD_WORKER_CONTROLLER) && w->index == 0;
  674. }
  675. return FALSE;
  676. }
  677. struct rspamd_worker_session_elt {
  678. void *ptr;
  679. guint *pref;
  680. const gchar *tag;
  681. time_t when;
  682. };
  683. struct rspamd_worker_session_cache {
  684. struct event_base *ev_base;
  685. GHashTable *cache;
  686. struct rspamd_config *cfg;
  687. struct timeval tv;
  688. struct event periodic;
  689. };
  690. static gint
  691. rspamd_session_cache_sort_cmp (gconstpointer pa, gconstpointer pb)
  692. {
  693. const struct rspamd_worker_session_elt
  694. *e1 = *(const struct rspamd_worker_session_elt **)pa,
  695. *e2 = *(const struct rspamd_worker_session_elt **)pb;
  696. return e2->when < e1->when;
  697. }
  698. static void
  699. rspamd_sessions_cache_periodic (gint fd, short what, gpointer p)
  700. {
  701. struct rspamd_worker_session_cache *c = p;
  702. GHashTableIter it;
  703. gchar timebuf[32];
  704. gpointer k, v;
  705. struct rspamd_worker_session_elt *elt;
  706. struct tm tms;
  707. GPtrArray *res;
  708. guint i;
  709. if (g_hash_table_size (c->cache) > c->cfg->max_sessions_cache) {
  710. res = g_ptr_array_sized_new (g_hash_table_size (c->cache));
  711. g_hash_table_iter_init (&it, c->cache);
  712. while (g_hash_table_iter_next (&it, &k, &v)) {
  713. g_ptr_array_add (res, v);
  714. }
  715. msg_err ("sessions cache is overflowed %d elements where %d is limit",
  716. (gint)res->len, (gint)c->cfg->max_sessions_cache);
  717. g_ptr_array_sort (res, rspamd_session_cache_sort_cmp);
  718. PTR_ARRAY_FOREACH (res, i, elt) {
  719. rspamd_localtime (elt->when, &tms);
  720. strftime (timebuf, sizeof (timebuf), "%F %H:%M:%S", &tms);
  721. msg_warn ("redundant session; ptr: %p, "
  722. "tag: %s, refcount: %d, time: %s",
  723. elt->ptr, elt->tag ? elt->tag : "unknown",
  724. elt->pref ? *elt->pref : 0,
  725. timebuf);
  726. }
  727. }
  728. }
  729. void *
  730. rspamd_worker_session_cache_new (struct rspamd_worker *w,
  731. struct event_base *ev_base)
  732. {
  733. struct rspamd_worker_session_cache *c;
  734. static const gdouble periodic_interval = 60.0;
  735. c = g_malloc0 (sizeof (*c));
  736. c->ev_base = ev_base;
  737. c->cache = g_hash_table_new_full (g_direct_hash, g_direct_equal,
  738. NULL, g_free);
  739. c->cfg = w->srv->cfg;
  740. double_to_tv (periodic_interval, &c->tv);
  741. event_set (&c->periodic, -1, EV_TIMEOUT|EV_PERSIST,
  742. rspamd_sessions_cache_periodic, c);
  743. event_base_set (ev_base, &c->periodic);
  744. event_add (&c->periodic, &c->tv);
  745. return c;
  746. }
  747. void
  748. rspamd_worker_session_cache_add (void *cache, const gchar *tag,
  749. guint *pref, void *ptr)
  750. {
  751. struct rspamd_worker_session_cache *c = cache;
  752. struct rspamd_worker_session_elt *elt;
  753. elt = g_malloc0 (sizeof (*elt));
  754. elt->pref = pref;
  755. elt->ptr = ptr;
  756. elt->tag = tag;
  757. elt->when = time (NULL);
  758. g_hash_table_insert (c->cache, elt->ptr, elt);
  759. }
  760. void
  761. rspamd_worker_session_cache_remove (void *cache, void *ptr)
  762. {
  763. struct rspamd_worker_session_cache *c = cache;
  764. g_hash_table_remove (c->cache, ptr);
  765. }
  766. static void
  767. rspamd_worker_monitored_on_change (struct rspamd_monitored_ctx *ctx,
  768. struct rspamd_monitored *m, gboolean alive,
  769. void *ud)
  770. {
  771. struct rspamd_worker *worker = ud;
  772. struct rspamd_config *cfg = worker->srv->cfg;
  773. struct event_base *ev_base;
  774. guchar tag[RSPAMD_MONITORED_TAG_LEN];
  775. static struct rspamd_srv_command srv_cmd;
  776. rspamd_monitored_get_tag (m, tag);
  777. ev_base = rspamd_monitored_ctx_get_ev_base (ctx);
  778. memset (&srv_cmd, 0, sizeof (srv_cmd));
  779. srv_cmd.type = RSPAMD_SRV_MONITORED_CHANGE;
  780. rspamd_strlcpy (srv_cmd.cmd.monitored_change.tag, tag,
  781. sizeof (srv_cmd.cmd.monitored_change.tag));
  782. srv_cmd.cmd.monitored_change.alive = alive;
  783. srv_cmd.cmd.monitored_change.sender = getpid ();
  784. msg_info_config ("broadcast monitored update for %s: %s",
  785. srv_cmd.cmd.monitored_change.tag, alive ? "alive" : "dead");
  786. rspamd_srv_send_command (worker, ev_base, &srv_cmd, -1, NULL, NULL);
  787. }
  788. void
  789. rspamd_worker_init_monitored (struct rspamd_worker *worker,
  790. struct event_base *ev_base,
  791. struct rspamd_dns_resolver *resolver)
  792. {
  793. rspamd_monitored_ctx_config (worker->srv->cfg->monitored_ctx,
  794. worker->srv->cfg, ev_base, resolver->r,
  795. rspamd_worker_monitored_on_change, worker);
  796. }
  797. #ifdef HAVE_SA_SIGINFO
  798. #ifdef WITH_LIBUNWIND
  799. static void
  800. rspamd_print_crash (ucontext_t *uap)
  801. {
  802. unw_cursor_t cursor;
  803. unw_word_t ip, off;
  804. guint level;
  805. gint ret;
  806. if ((ret = unw_init_local (&cursor, uap)) != 0) {
  807. msg_err ("unw_init_local: %d", ret);
  808. return;
  809. }
  810. level = 0;
  811. ret = 0;
  812. for (;;) {
  813. char name[128];
  814. if (level >= UNWIND_BACKTRACE_DEPTH) {
  815. break;
  816. }
  817. unw_get_reg (&cursor, UNW_REG_IP, &ip);
  818. ret = unw_get_proc_name(&cursor, name, sizeof (name), &off);
  819. if (ret == 0) {
  820. msg_err ("%d: %p: %s()+0x%xl",
  821. level, ip, name, (uintptr_t)off);
  822. } else {
  823. msg_err ("%d: %p: <unknown>", level, ip);
  824. }
  825. level++;
  826. ret = unw_step (&cursor);
  827. if (ret <= 0) {
  828. break;
  829. }
  830. }
  831. if (ret < 0) {
  832. msg_err ("unw_step_ptr: %d", ret);
  833. }
  834. }
  835. #endif
  836. static struct rspamd_main *saved_main = NULL;
  837. static gboolean
  838. rspamd_crash_propagate (gpointer key, gpointer value, gpointer unused)
  839. {
  840. struct rspamd_worker *w = value;
  841. /* Kill children softly */
  842. kill (w->pid, SIGTERM);
  843. return TRUE;
  844. }
  845. static void
  846. rspamd_crash_sig_handler (int sig, siginfo_t *info, void *ctx)
  847. {
  848. struct sigaction sa;
  849. ucontext_t *uap = ctx;
  850. pid_t pid;
  851. pid = getpid ();
  852. msg_err ("caught fatal signal %d(%s), "
  853. "pid: %P, trace: ",
  854. sig, strsignal (sig), pid);
  855. (void)uap;
  856. #ifdef WITH_LIBUNWIND
  857. rspamd_print_crash (uap);
  858. #endif
  859. if (saved_main) {
  860. if (pid == saved_main->pid) {
  861. /*
  862. * Main process has crashed, propagate crash further to trigger
  863. * monitoring alerts and mass panic
  864. */
  865. g_hash_table_foreach_remove (saved_main->workers,
  866. rspamd_crash_propagate, NULL);
  867. }
  868. }
  869. /*
  870. * Invoke signal with the default handler
  871. */
  872. sigemptyset (&sa.sa_mask);
  873. sa.sa_handler = SIG_DFL;
  874. sa.sa_flags = 0;
  875. sigaction (sig, &sa, NULL);
  876. kill (pid, sig);
  877. }
  878. #endif
  879. void
  880. rspamd_set_crash_handler (struct rspamd_main *rspamd_main)
  881. {
  882. #ifdef HAVE_SA_SIGINFO
  883. struct sigaction sa;
  884. #ifdef HAVE_SIGALTSTACK
  885. stack_t ss;
  886. /* Allocate special stack, NOT freed at the end so far */
  887. ss.ss_size = MAX (SIGSTKSZ, 8192 * 4);
  888. ss.ss_sp = g_malloc0 (ss.ss_size);
  889. sigaltstack (&ss, NULL);
  890. #endif
  891. saved_main = rspamd_main;
  892. sigemptyset (&sa.sa_mask);
  893. sa.sa_sigaction = &rspamd_crash_sig_handler;
  894. sa.sa_flags = SA_RESTART | SA_SIGINFO | SA_ONSTACK;
  895. sigaction (SIGSEGV, &sa, NULL);
  896. sigaction (SIGBUS, &sa, NULL);
  897. sigaction (SIGABRT, &sa, NULL);
  898. sigaction (SIGFPE, &sa, NULL);
  899. sigaction (SIGSYS, &sa, NULL);
  900. #endif
  901. }