You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
tdebase/ksysguard/ksysguardd/ksysguardd.c

634 lines
15 KiB

/*
KSysGuard, the KDE System Guard
Copyright (c) 1999 - 2003 Chris Schlaeger <cs@kde.org>
Tobias Koenig <tokoe@kde.org>
Solaris support by Torsten Kasch <tk@Genetik.Uni-Bielefeld.DE>
This program is free software; you can redistribute it and/or
modify it under the terms of version 2 of the GNU General Public
License as published by the Free Software Foundation.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
*/
#include <config.h>
#include <ctype.h>
#include <fcntl.h>
#include <netdb.h>
#include <netinet/in.h>
#include <pwd.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/file.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <unistd.h>
#include <errno.h>
#include <../version.h>
#ifdef HAVE_DNSSD
#include <dns_sd.h>
#endif
#include "modules.h"
#include "ksysguardd.h"
#define CMDBUFSIZE 128
#define MAX_CLIENTS 100
typedef struct {
int socket;
FILE* out;
} ClientInfo;
static int ServerSocket;
static ClientInfo ClientList[ MAX_CLIENTS ];
static int SocketPort = -1;
static unsigned char BindToAllInterfaces = 0;
static int CurrentSocket;
static const char *LockFile = "/var/run/ksysguardd.pid";
static const char *ConfigFile = KSYSGUARDDRCFILE;
#ifdef HAVE_DNSSD
static int ServiceSocket = -1;
static DNSServiceRef Ref;
#endif
void signalHandler( int sig );
void makeDaemon( void );
void resetClientList( void );
int addClient( int client );
int delClient( int client );
int createServerSocket( void );
#ifdef HAVE_DNSSD
void publish_callback (DNSServiceRef, DNSServiceFlags, DNSServiceErrorType errorCode, const char *name,
const char*, const char*, void *context);
#endif
/**
This variable is set to 1 if a module requests that the daemon should
be terminated.
*/
int QuitApp = 0;
/**
This variable indicates whether we are running as daemon or (1) or if
we were have a controlling shell.
*/
int RunAsDaemon = 0;
/**
This pointer is used by all modules. It contains the file pointer of
the currently served client. This is stdout for non-daemon mode.
*/
FILE* CurrentClient = 0;
static int processArguments( int argc, char* argv[] )
{
int option;
opterr = 0;
while ( ( option = getopt( argc, argv, "-p:f:dih" ) ) != EOF ) {
switch ( tolower( option ) ) {
case 'p':
SocketPort = atoi( optarg );
break;
case 'f':
ConfigFile = strdup( optarg );
break;
case 'd':
RunAsDaemon = 1;
break;
case 'i':
BindToAllInterfaces = 1;
break;
case '?':
case 'h':
default:
fprintf(stderr, "Usage: %s [-d] [-i] [-p port]\n", argv[ 0 ] );
return -1;
break;
}
}
return 0;
}
static void printWelcome( FILE* out )
{
fprintf( out, "ksysguardd %s\n"
"(c) 1999, 2000, 2001, 2002 Chris Schlaeger <cs@kde.org> and\n"
"(c) 2001 Tobias Koenig <tokoe@kde.org>\n"
"This program is part of the KDE Project and licensed under\n"
"the GNU GPL version 2. See http://www.kde.org for details.\n",
KSYSGUARD_VERSION );
fflush( out );
}
static int createLockFile()
{
FILE *file;
if ( ( file = fopen( LockFile, "w+" ) ) != NULL ) {
struct flock lock;
lock.l_type = F_WRLCK;
lock.l_whence = 0;
lock.l_start = 0;
lock.l_len = 0;
lock.l_pid = -1;
if ( fcntl( fileno( file ), F_SETLK, &lock ) < 0 ) {
if ( ( errno == EACCES ) || ( errno == EAGAIN ) ) {
log_error( "ksysguardd is running already" );
fprintf( stderr, "ksysguardd is running already\n" );
fclose( file );
return -1;
}
}
fseek( file, 0, SEEK_SET );
fprintf( file, "%d\n", getpid() );
fflush( file );
ftruncate( fileno( file ), ftell( file ) );
} else {
log_error( "Cannot create lockfile '%s'", LockFile );
fprintf( stderr, "Cannot create lockfile '%s'\n", LockFile );
return -2;
}
/**
We abandon 'file' here on purpose. It's needed nowhere else, but we
have to keep the file open and locked. The kernel will remove the
lock when the process terminates and the runlevel scripts has to
remove the pid file.
*/
return 0;
}
void signalHandler( int sig )
{
switch ( sig ) {
case SIGQUIT:
case SIGTERM:
#ifdef HAVE_DNSSD
if ( ServiceSocket != -1 ) DNSServiceRefDeallocate(Ref);
#endif
exit( 0 );
break;
}
}
static void installSignalHandler( void )
{
struct sigaction Action;
Action.sa_handler = signalHandler;
sigemptyset( &Action.sa_mask );
/* make sure that interrupted system calls are restarted. */
Action.sa_flags = SA_RESTART;
sigaction( SIGTERM, &Action, 0 );
sigaction( SIGQUIT, &Action, 0 );
}
static void dropPrivileges( void )
{
struct passwd *pwd;
if ( ( pwd = getpwnam( "nobody" ) ) != NULL ) {
if ( !setgid(pwd->pw_gid) )
setuid(pwd->pw_uid);
if (!geteuid() && getuid() != pwd->pw_uid)
_exit(1);
}
else {
log_error( "User 'nobody' does not exist." );
/**
We exit here to avoid becoming vulnerable just because
user nobody does not exist.
*/
_exit(1);
}
}
void makeDaemon( void )
{
int fd = -1;
switch ( fork() ) {
case -1:
log_error( "fork() failed" );
break;
case 0:
setsid();
chdir( "/" );
umask( 0 );
if ( createLockFile() < 0 )
_exit( 1 );
dropPrivileges();
installSignalHandler();
fd = open("/dev/null", O_RDWR, 0);
if (fd != -1) {
dup2(fd, STDIN_FILENO);
dup2(fd, STDOUT_FILENO);
dup2(fd, STDERR_FILENO);
close (fd);
}
break;
default:
exit( 0 );
}
}
static int readCommand( int fd, char* cmdBuf, size_t len )
{
unsigned int i;
char c;
for ( i = 0; i < len; ++i )
{
int result = read( fd, &c, 1 );
if (result < 0)
return -1; /* Error */
if (result == 0) {
if (i == 0)
return -1; /* Connection lost */
break; /* End of data */
}
if (c == '\n')
break; /* End of line */
cmdBuf[ i ] = c;
}
cmdBuf[i] = '\0';
return i;
}
void resetClientList( void )
{
int i;
for ( i = 0; i < MAX_CLIENTS; i++ ) {
ClientList[ i ].socket = -1;
ClientList[ i ].out = 0;
}
}
/**
addClient adds a new client to the ClientList.
*/
int addClient( int client )
{
int i;
FILE* out;
for ( i = 0; i < MAX_CLIENTS; i++ ) {
if ( ClientList[ i ].socket == -1 ) {
ClientList[ i ].socket = client;
if ( ( out = fdopen( client, "w+" ) ) == NULL ) {
log_error( "fdopen()" );
return -1;
}
/* We use unbuffered IO */
fcntl( fileno( out ), F_SETFL, O_NDELAY );
ClientList[ i ].out = out;
printWelcome( out );
fprintf( out, "ksysguardd> " );
fflush( out );
return 0;
}
}
return -1;
}
/**
delClient removes a client from the ClientList.
*/
int delClient( int client )
{
int i;
for ( i = 0; i < MAX_CLIENTS; i++ ) {
if ( ClientList[i].socket == client ) {
fclose( ClientList[ i ].out );
ClientList[ i ].out = 0;
close( ClientList[ i ].socket );
ClientList[ i ].socket = -1;
return 0;
}
}
return -1;
}
#ifdef HAVE_DNSSD
void publish_callback (DNSServiceRef ref, DNSServiceFlags f, DNSServiceErrorType errorCode, const char *name,
const char* type, const char* domain, void *context)
{
if (errorCode != kDNSServiceErr_NoError) log_error("Publishing DNS-SD service failed with error %i",errorCode);
}
#endif
int createServerSocket()
{
int i = 1;
int newSocket;
struct sockaddr_in s_in;
struct servent *service;
if ( ( newSocket = socket( PF_INET, SOCK_STREAM, 0 ) ) < 0 ) {
log_error( "socket()" );
return -1;
}
setsockopt( newSocket, SOL_SOCKET, SO_REUSEADDR, &i, sizeof( i ) );
/**
The -p command line option always overrides the default or the
service entry.
*/
if ( SocketPort == -1 ) {
if ( ( service = getservbyname( "ksysguardd", "tcp" ) ) == NULL ) {
/**
No entry in service directory and no command line request,
so we take the build-in default (the offical IANA port).
*/
SocketPort = PORT_NUMBER;
} else
SocketPort = htons( service->s_port );
}
memset( &s_in, 0, sizeof( struct sockaddr_in ) );
s_in.sin_family = AF_INET;
if ( BindToAllInterfaces )
s_in.sin_addr.s_addr = htonl( INADDR_ANY );
else
s_in.sin_addr.s_addr = htonl( INADDR_LOOPBACK );
s_in.sin_port = htons( SocketPort );
if ( bind( newSocket, (struct sockaddr*)&s_in, sizeof( s_in ) ) < 0 ) {
log_error( "Cannot bind to port %d", SocketPort );
return -1;
}
if ( listen( newSocket, 5 ) < 0 ) {
log_error( "listen()" );
return -1;
}
#ifdef HAVE_DNSSD
if ( BindToAllInterfaces )
if (DNSServiceRegister(&Ref, 0, 0, 0, "_ksysguard._tcp", RegisterDomain ?
RegisterDomain : "local.",NULL, htons(SocketPort), 0, 0, publish_callback, 0) == kDNSServiceErr_NoError)
ServiceSocket = DNSServiceRefSockFD(Ref);
#endif
return newSocket;
}
static int setupSelect( fd_set* fds )
{
int highestFD = ServerSocket;
FD_ZERO( fds );
/**
Fill the filedescriptor array with all relevant descriptors. If we
not in daemon mode we only need to watch stdin.
*/
if ( RunAsDaemon ) {
int i;
FD_SET( ServerSocket, fds );
#ifdef HAVE_DNSSD
if ( ServiceSocket != -1 ) {
FD_SET( ServiceSocket, fds );
if ( highestFD < ServiceSocket) highestFD = ServiceSocket;
}
#endif
for ( i = 0; i < MAX_CLIENTS; i++ ) {
if ( ClientList[ i ].socket != -1 ) {
FD_SET( ClientList[ i ].socket, fds );
if ( highestFD < ClientList[ i ].socket )
highestFD = ClientList[ i ].socket;
}
}
} else {
FD_SET( STDIN_FILENO, fds );
if ( highestFD < STDIN_FILENO )
highestFD = STDIN_FILENO;
}
return highestFD;
}
static void checkModules()
{
struct SensorModul *entry;
for ( entry = SensorModulList; entry->configName != NULL; entry++ )
if ( entry->checkCommand != NULL && entry->available )
entry->checkCommand();
}
static void handleTimerEvent( struct timeval* tv, struct timeval* last )
{
struct timeval now;
gettimeofday( &now, NULL );
/* Check if the last event was really TIMERINTERVAL seconds ago */
if ( now.tv_sec - last->tv_sec >= TIMERINTERVAL ) {
/* If so, update all sensors and save current time to last. */
checkModules();
*last = now;
}
/**
Set tv so that the next timer event will be generated in
TIMERINTERVAL seconds.
*/
tv->tv_usec = last->tv_usec - now.tv_usec;
if ( tv->tv_usec < 0 ) {
tv->tv_usec += 1000000;
tv->tv_sec = last->tv_sec + TIMERINTERVAL - 1 - now.tv_sec;
} else
tv->tv_sec = last->tv_sec + TIMERINTERVAL - now.tv_sec;
}
static void handleSocketTraffic( int socketNo, const fd_set* fds )
{
char cmdBuf[ CMDBUFSIZE ];
if ( RunAsDaemon ) {
int i;
if ( FD_ISSET( socketNo, fds ) ) {
int clientsocket;
struct sockaddr addr;
kde_socklen_t addr_len = sizeof( struct sockaddr );
/* a new connection */
if ( ( clientsocket = accept( socketNo, &addr, &addr_len ) ) < 0 ) {
log_error( "accept()" );
exit( 1 );
} else
addClient( clientsocket );
}
#ifdef HAVE_DNSSD
if ( ServiceSocket != -1 && FD_ISSET( ServiceSocket, fds )) DNSServiceProcessResult(Ref);
#endif
for ( i = 0; i < MAX_CLIENTS; i++ ) {
if ( ClientList[ i ].socket != -1 ) {
CurrentSocket = ClientList[ i ].socket;
if ( FD_ISSET( ClientList[ i ].socket, fds ) ) {
ssize_t cnt;
if ( ( cnt = readCommand( CurrentSocket, cmdBuf, sizeof( cmdBuf ) - 1 ) ) <= 0 )
delClient( CurrentSocket );
else {
cmdBuf[ cnt ] = '\0';
if ( strncmp( cmdBuf, "quit", 4 ) == 0 )
delClient( CurrentSocket );
else {
CurrentClient = ClientList[ i ].out;
fflush( stdout );
executeCommand( cmdBuf );
fprintf( CurrentClient, "ksysguardd> " );
fflush( CurrentClient );
}
}
}
}
}
} else if ( FD_ISSET( STDIN_FILENO, fds ) ) {
if (readCommand( STDIN_FILENO, cmdBuf, sizeof( cmdBuf ) ) < 0) {
exit(0);
}
executeCommand( cmdBuf );
printf( "ksysguardd> " );
fflush( stdout );
}
}
static void initModules()
{
struct SensorModul *entry;
/* initialize all sensors */
initCommand();
for ( entry = SensorModulList; entry->configName != NULL; entry++ ) {
if ( entry->initCommand != NULL && sensorAvailable( entry->configName ) ) {
entry->available = 1;
entry->initCommand( entry );
}
}
ReconfigureFlag = 0;
}
static void exitModules()
{
struct SensorModul *entry;
for ( entry = SensorModulList; entry->configName != NULL; entry++ ) {
if ( entry->exitCommand != NULL && entry->available )
entry->exitCommand();
}
exitCommand();
}
/*
================================ public part =================================
*/
int main( int argc, char* argv[] )
{
fd_set fds;
struct timeval tv;
struct timeval last;
#ifdef OSTYPE_FreeBSD
/**
If we are not root or the executable does not belong to the
kmem group, ksysguardd will crash because of permission problems
for opening /dev/kmem
*/
struct group* grentry = NULL;
if ( geteuid() != 0 ) {
grentry = getgrnam( "kmem" );
if ( grentry == NULL ) {
fprintf( stderr, "the group kmem is missing on your system\n" );
return -1;
}
if ( getegid() != grentry->gr_gid ) {
fprintf( stderr, "ksysguardd can't be started because of permission conflicts!\n"
"Start the program as user 'root' or change its group to 'kmem' and set the sgid-bit\n" );
return -1;
}
endgrent();
}
#endif
printWelcome( stdout );
if ( processArguments( argc, argv ) < 0 )
return -1;
parseConfigFile( ConfigFile );
initModules();
if ( RunAsDaemon ) {
makeDaemon();
if ( ( ServerSocket = createServerSocket() ) < 0 )
return -1;
resetClientList();
} else {
fprintf( stdout, "ksysguardd> " );
fflush( stdout );
CurrentClient = stdout;
ServerSocket = 0;
}
tv.tv_sec = TIMERINTERVAL;
tv.tv_usec = 0;
gettimeofday( &last, NULL );
while ( !QuitApp ) {
int highestFD = setupSelect( &fds );
/* wait for communication or timeouts */
if ( select( highestFD + 1, &fds, NULL, NULL, &tv ) >= 0 ) {
handleTimerEvent( &tv, &last );
handleSocketTraffic( ServerSocket, &fds );
}
}
exitModules();
freeConfigFile();
return 0;
}