1
0
mirror of https://github.com/samba-team/samba.git synced 2025-08-03 04:22:09 +03:00

fault: get fault.c ready for use by s4

this moves the s3 specific dumpcore code into source3/lib/dumpcore.c,
and uses a function pointer to setup which smb_panic call to use
This commit is contained in:
Andrew Tridgell
2011-03-22 16:17:39 +11:00
parent 058c3bb923
commit 580997ede0
11 changed files with 417 additions and 311 deletions

View File

@ -19,6 +19,8 @@
*/
#include "includes.h"
#include "system/filesys.h"
#include "version.h"
#ifdef HAVE_SYS_SYSCTL_H
#include <sys/sysctl.h>
@ -29,7 +31,32 @@
#include <sys/prctl.h>
#endif
static char *corepath;
static struct {
bool disabled;
smb_panic_handler_t panic_handler;
} fault_state;
/*******************************************************************
setup variables used for fault handling
********************************************************************/
void fault_configure(smb_panic_handler_t panic_handler)
{
fault_state.panic_handler = panic_handler;
}
/**
disable setting up fault handlers
This is used for the bind9 dlz module, as we
don't want a Samba module in bind9 to override the bind
fault handling
**/
_PUBLIC_ void fault_setup_disable(void)
{
fault_state.disabled = true;
}
/*******************************************************************
report a fault
@ -43,9 +70,8 @@ static void fault_report(int sig)
counter++;
DEBUGSEP(0);
DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)sys_getpid(),samba_version_string()));
DEBUG(0,("\nPlease read the Trouble-Shooting section of the Samba3-HOWTO\n"));
DEBUG(0,("\nFrom: http://www.samba.org/samba/docs/Samba3-HOWTO.pdf\n"));
DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)sys_getpid(),SAMBA_VERSION_STRING));
DEBUG(0,("\nPlease read the Trouble-Shooting section of the Samba HOWTO\n"));
DEBUGSEP(0);
smb_panic("internal error");
@ -67,6 +93,9 @@ setup our fault handlers
********************************************************************/
void fault_setup(void)
{
if (fault_state.disabled) {
return;
}
#ifdef SIGSEGV
CatchSignal(SIGSEGV, sig_fault);
#endif
@ -78,303 +107,48 @@ void fault_setup(void)
#endif
}
/**
* Build up the default corepath as "<logbase>/cores/<progname>"
*/
static char *get_default_corepath(const char *logbase, const char *progname)
_PUBLIC_ const char *panic_action = NULL;
/*
default smb_panic() implementation
*/
static void smb_panic_default(const char *why)
{
char *tmp_corepath;
int result;
/* Setup core dir in logbase. */
tmp_corepath = talloc_asprintf(NULL, "%s/cores", logbase);
if (!tmp_corepath)
return NULL;
if (panic_action && *panic_action) {
char pidstr[20];
char cmdstring[200];
safe_strcpy(cmdstring, panic_action, sizeof(cmdstring)-1);
snprintf(pidstr, sizeof(pidstr), "%d", (int) getpid());
all_string_sub(cmdstring, "%PID%", pidstr, sizeof(cmdstring));
DEBUG(0, ("smb_panic(): calling panic action [%s]\n", cmdstring));
result = system(cmdstring);
if ((mkdir(tmp_corepath, 0700) == -1) && errno != EEXIST)
goto err_out;
if (chmod(tmp_corepath, 0700) == -1)
goto err_out;
talloc_free(tmp_corepath);
/* Setup progname-specific core subdir */
tmp_corepath = talloc_asprintf(NULL, "%s/cores/%s", logbase, progname);
if (!tmp_corepath)
return NULL;
if (mkdir(tmp_corepath, 0700) == -1 && errno != EEXIST)
goto err_out;
if (chown(tmp_corepath, getuid(), getgid()) == -1)
goto err_out;
if (chmod(tmp_corepath, 0700) == -1)
goto err_out;
return tmp_corepath;
err_out:
talloc_free(tmp_corepath);
return NULL;
}
/**
* Get the FreeBSD corepath.
*
* On FreeBSD the current working directory is ignored when creating a core
* file. Instead the core directory is controlled via sysctl. This consults
* the value of "kern.corefile" so the correct corepath can be printed out
* before dump_core() calls abort.
*/
#if (defined(FREEBSD) && defined(HAVE_SYSCTLBYNAME))
static char *get_freebsd_corepath(void)
{
char *tmp_corepath = NULL;
char *end = NULL;
size_t len = 128;
int ret;
/* Loop with increasing sizes so we don't allocate too much. */
do {
if (len > 1024) {
goto err_out;
}
tmp_corepath = (char *)talloc_realloc(NULL, tmp_corepath,
char, len);
if (!tmp_corepath) {
return NULL;
}
ret = sysctlbyname("kern.corefile", tmp_corepath, &len, NULL,
0);
if (ret == -1) {
if (errno != ENOMEM) {
DEBUG(0, ("sysctlbyname failed getting "
"kern.corefile %s\n",
strerror(errno)));
goto err_out;
}
/* Not a large enough array, try a bigger one. */
len = len << 1;
}
} while (ret == -1);
/* Strip off the common filename expansion */
if ((end = strrchr_m(tmp_corepath, '/'))) {
*end = '\0';
if (result == -1)
DEBUG(0, ("smb_panic(): fork failed in panic action: %s\n",
strerror(errno)));
else
DEBUG(0, ("smb_panic(): action returned status %d\n",
WEXITSTATUS(result)));
}
DEBUG(0,("PANIC: %s\n", why));
return tmp_corepath;
err_out:
if (tmp_corepath) {
talloc_free(tmp_corepath);
}
return NULL;
}
#endif
#if defined(HAVE_SYS_KERNEL_PROC_CORE_PATTERN)
/**
* Get the Linux corepath.
*
* On Linux the contents of /proc/sys/kernel/core_pattern indicates the
* location of the core path.
*/
static char *get_linux_corepath(void)
{
char *end;
int fd;
char *result;
fd = open("/proc/sys/kernel/core_pattern", O_RDONLY, 0);
if (fd == -1) {
return NULL;
}
result = afdgets(fd, NULL, 0);
close(fd);
if (result == NULL) {
return NULL;
}
if (result[0] != '/') {
/*
* No absolute path, use the default (cwd)
*/
TALLOC_FREE(result);
return NULL;
}
/* Strip off the common filename expansion */
end = strrchr_m(result, '/');
if ((end != result) /* this would be the only / */
&& (end != NULL)) {
*end = '\0';
}
return result;
}
#endif
/**
* Try getting system-specific corepath if one exists.
*
* If the system doesn't define a corepath, then the default is used.
*/
static char *get_corepath(const char *logbase, const char *progname)
{
#if (defined(FREEBSD) && defined(HAVE_SYSCTLBYNAME))
char *tmp_corepath = NULL;
tmp_corepath = get_freebsd_corepath();
/* If this has been set correctly, we're done. */
if (tmp_corepath) {
return tmp_corepath;
}
#endif
#if defined(HAVE_SYS_KERNEL_PROC_CORE_PATTERN)
char *tmp_corepath = NULL;
tmp_corepath = get_linux_corepath();
/* If this has been set correctly, we're done. */
if (tmp_corepath) {
return tmp_corepath;
}
#endif
/* Fall back to the default. */
return get_default_corepath(logbase, progname);
}
/*******************************************************************
make all the preparations to safely dump a core file
********************************************************************/
void dump_core_setup(const char *progname)
{
char *logbase = NULL;
char *end = NULL;
if (lp_logfile() && *lp_logfile()) {
if (asprintf(&logbase, "%s", lp_logfile()) < 0) {
return;
}
if ((end = strrchr_m(logbase, '/'))) {
*end = '\0';
}
} else {
/* We will end up here if the log file is given on the command
* line by the -l option but the "log file" option is not set
* in smb.conf.
*/
if (asprintf(&logbase, "%s", get_dyn_LOGFILEBASE()) < 0) {
return;
}
}
SMB_ASSERT(progname != NULL);
corepath = get_corepath(logbase, progname);
if (!corepath) {
DEBUG(0, ("Unable to setup corepath for %s: %s\n", progname,
strerror(errno)));
goto out;
}
#ifdef HAVE_GETRLIMIT
#ifdef RLIMIT_CORE
{
struct rlimit rlp;
getrlimit(RLIMIT_CORE, &rlp);
rlp.rlim_cur = MAX(16*1024*1024,rlp.rlim_cur);
setrlimit(RLIMIT_CORE, &rlp);
getrlimit(RLIMIT_CORE, &rlp);
DEBUG(3,("Maximum core file size limits now %d(soft) %d(hard)\n",
(int)rlp.rlim_cur,(int)rlp.rlim_max));
}
#endif
#endif
/* FIXME: if we have a core-plus-pid facility, configurably set
* this up here.
*/
out:
SAFE_FREE(logbase);
}
void dump_core(void)
{
static bool called;
if (called) {
DEBUG(0, ("dump_core() called recursive\n"));
exit(1);
}
called = true;
/* Note that even if core dumping has been disabled, we still set up
* the core path. This is to handle the case where core dumping is
* turned on in smb.conf and the relevant daemon is not restarted.
*/
if (!lp_enable_core_files()) {
DEBUG(0, ("Exiting on internal error (core file administratively disabled)\n"));
exit(1);
}
#if DUMP_CORE
/* If we're running as non root we might not be able to dump the core
* file to the corepath. There must not be an unbecome_root() before
* we call abort(). */
if (geteuid() != sec_initial_uid()) {
become_root();
}
if (corepath == NULL) {
DEBUG(0, ("Can not dump core: corepath not set up\n"));
exit(1);
}
if (*corepath != '\0') {
/* The chdir might fail if we dump core before we finish
* processing the config file.
*/
if (chdir(corepath) != 0) {
DEBUG(0, ("unable to change to %s\n", corepath));
DEBUGADD(0, ("refusing to dump core\n"));
exit(1);
}
DEBUG(0,("dumping core in %s\n", corepath));
}
umask(~(0700));
dbgflush();
#if defined(HAVE_PRCTL) && defined(PR_SET_DUMPABLE)
/* On Linux we lose the ability to dump core when we change our user
* ID. We know how to dump core safely, so let's make sure we have our
* dumpable flag set.
*/
prctl(PR_SET_DUMPABLE, 1);
#endif
/* Ensure we don't have a signal handler for abort. */
#ifdef SIGABRT
CatchSignal(SIGABRT, SIG_DFL);
#endif
abort();
#else /* DUMP_CORE */
exit(1);
#endif /* DUMP_CORE */
}
/**
Something really nasty happened - panic !
**/
_PUBLIC_ void smb_panic(const char *why)
{
if (fault_state.panic_handler) {
fault_state.panic_handler(why);
_exit(1);
}
smb_panic_default(why);
}