service-process.c revision f5e1d3d6b34ec152aa1ff15c7bd3d3552e9227ea
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen/* Copyright (c) 2005-2009 Dovecot authors, see the included COPYING file */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen/* Timeout chdir() completely after this many seconds */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen/* Give a warning about chdir() taking a while if it took longer than this
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen many seconds to finish. */
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainenservice_dup_fds(struct service *service, int auth_fd, int std_fd,
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen unsigned int i, count, n = 0, socket_listener_count, ssl_socket_count;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* stdin/stdout is already redirected to /dev/null. Other master fds
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen should have been opened with fd_close_on_exec() so we don't have to
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen worry about them.
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen because the destination fd might be another one's source fd we have
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen to be careful not to overwrite anything. dup() the fd when needed */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen listeners = array_get(&service->listeners, &count);
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen services_log_dup2(&dups, service->list, MASTER_LISTEN_FD_FIRST,
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen /* nonblocking anvil fd must be the first one. anvil treats it
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen as the master's fd */
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen dup2_append(&dups, service->list->nonblocking_anvil_fd[0],
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen dup2_append(&dups, service->list->blocking_anvil_fd[0],
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen /* first add non-ssl listeners */
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen for (i = 0; i < count; i++) {
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainen (listeners[i]->type != SERVICE_LISTENER_INET ||
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen /* then ssl-listeners */
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen for (i = 0; i < count; i++) {
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainen listeners[i]->type == SERVICE_LISTENER_INET &&
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen dup2_append(&dups, service->list->blocking_anvil_fd[1],
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen dup2_append(&dups, service->status_fd[1], MASTER_STATUS_FD);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf("MASTER_AUTH_FD=%d", MASTER_AUTH_FD));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* set log file to stderr. dup2() here immediately so that
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen we can set up logging to it without causing any log messages
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen to be lost. */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (dup2(service->log_fd[1], STDERR_FILENO) < 0)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* make sure we don't leak syslog fd. try to do it as late as possible,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen but also before dup2()s in case syslog fd is one of them. */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf("SOCKET_COUNT=%d", socket_listener_count));
7487ff578435377bbeefffdbfb78ca09ed1292dfTimo Sirainen env_put(t_strdup_printf("SSL_SOCKET_COUNT=%d", ssl_socket_count));
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen const struct service_process_auth_request *request)
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen request == NULL ? NULL : &request->process->process;
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen i_fatal("User %s not allowed to log in using UNIX UID 0 "
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen if (request != NULL && request_process->service->uid == uid &&
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen i_fatal("User %s not allowed to log in using %s's "
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen "UNIX UID %s%s (see http://wiki.dovecot.org/UserIds)",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen (set->last_valid_uid != 0 && uid > (uid_t)set->last_valid_uid)) {
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen i_fatal("User %s not allowed to log in using too %s "
0ef40aa9ca6084393fe0a56feac2cf801e8b52f0Timo Sirainen "UNIX UID %s%s (see %s in config file)",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen (set->last_valid_gid != 0 && gid > (gid_t)set->last_valid_gid)) {
d74c7c6d900f7b38017403a0da9106b8a6c647b2Timo Sirainen i_fatal("User %s not allowed to log in using too %s primary "
0ef40aa9ca6084393fe0a56feac2cf801e8b52f0Timo Sirainen "UNIX group ID %s%s (see %s in config file)",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void auth_args_apply(const char *const *args,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char **home)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset->uid = (uid_t)strtoul(*args + 4, NULL, 10);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset->gid = (gid_t)strtoul(*args + 4, NULL, 10);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("HOME=", *args + 5, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen else if (strncmp(*args, "system_groups_user=", 19) == 0)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen else if (strncmp(*args, "mail_access_groups=", 19) == 0) {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* unknown, set as environment */
e3ae2ac7a93b418cf46e829c94973b6e962a7830Timo Sirainen /* boolean */
e3ae2ac7a93b418cf46e829c94973b6e962a7830Timo Sirainen /* FIXME: kind of ugly to have it
e3ae2ac7a93b418cf46e829c94973b6e962a7830Timo Sirainen env_put(t_strconcat(t_str_ucase(key), value, NULL));
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainenstatic void auth_success_write(void)
617e13833c798435e2be425b99c27ecaad1b8393Timo Sirainen i_error("creat(%s) failed: %m", AUTH_SUCCESS_PATH);
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainenstatic void chdir_to_home(const struct restrict_access_settings *rset,
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen unsigned int left;
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("user %s: Relative home directory paths not supported: "
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* if home directory is NFS-mounted, we might not have access to it as
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen root. Change the effective UID and GID temporarily to make it
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("setegid(%s) failed: %m", dec2str(rset->gid));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("seteuid(%s) failed: %m", dec2str(rset->uid));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen if ((left = alarm(0)) < CHDIR_TIMEOUT - CHDIR_WARN_SECS) {
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_warning("user %s: chdir(%s) blocked for %u secs",
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* chdir succeeded */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen } else if ((errno == ENOENT || errno == ENOTDIR || errno == EINTR) &&
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* Not chrooted, fallback to using /tmp.
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen ENOENT: No home directory yet, but it might be automatically
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen created by the service process, so don't complain.
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen ENOTDIR: This check is mainly for /dev/null home directory.
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen EINTR: chdir() timed out. */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("user %s: %s", user, eacces_error_get("chdir", home));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("user %s: chdir(%s) failed with uid %s: %m",
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* Change UID back. No need to change GID back, it doesn't
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen really matter. */
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen if (rset->uid != master_uid && seteuid(master_uid) < 0)
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen i_fatal("seteuid(%s) failed: %m", dec2str(master_uid));
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen /* We still have to change to some directory where we have
c60178b2610a9b193ff72aa18448398ef72529a1Timo Sirainen rx-access. /tmp should exist everywhere. */
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainendrop_privileges(struct service *service, const char *const *auth_args,
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen const struct service_process_auth_request *request)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen struct master_settings *master_set = service->set->master_set;
e154d8764089896a693cbb83d6831b2398f22ee8Timo Sirainen if (auth_args != NULL && service->set->master_set->mail_debug)
6ec925f52d04ec8700e47cb005bd7ddc65ac5614Timo Sirainen restrict_process_size(service->set->vsz_limit, -1U);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.privileged_gid = service->privileged_gid;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.chroot_dir = *service->set->chroot == '\0' ? NULL :
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* non-authenticating service. don't use *_valid_gid checks */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.first_valid_gid = master_set->first_valid_gid;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen rset.last_valid_gid = master_set->last_valid_gid;
fb7ac3e31c92627efe076318319976ac1c27ae2aTimo Sirainen validate_uid_gid(master_set, rset.uid, rset.gid, user,
72cc352b25ad401b923436c6ed0f1f3adaffa737Timo Sirainen disallow_root = service->type == SERVICE_TYPE_AUTH_SERVER ||
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenservice_process_setup_environment(struct service *service, unsigned int uid)
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen const struct master_service_settings *set = service->list->service_set;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char *const *p;
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* remove all environment, and put back what we need */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen for (p = service->list->child_process_env; *p != NULL; p++)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat(MASTER_CONFIG_FILE_ENV"=",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* give the log's configuration directly, so it won't depend
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen on config process */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("LOG_PATH=", set->log_path, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("INFO_LOG_PATH=", set->info_log_path, NULL));
f5e1d3d6b34ec152aa1ff15c7bd3d3552e9227eaTimo Sirainen env_put(t_strconcat("DEBUG_LOG_PATH=", set->debug_log_path, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("LOG_TIMESTAMP=", set->log_timestamp, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat("SYSLOG_FACILITY=", set->syslog_facility, NULL));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strconcat(MASTER_CONFIG_FILE_ENV"=",
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen services_get_config_socket_path(service->list), NULL));
3a0f9aa9504497e4e47f32df54fbf47fdc7423b6Timo Sirainen env_put(t_strdup_printf(MASTER_CLIENT_LIMIT_ENV"=%u",
788f275469ad9ed530e440d6690d0e4381a323b2Timo Sirainen env_put(t_strdup_printf(MASTER_SERVICE_COUNT_ENV"=%u",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(t_strdup_printf(MASTER_UID_ENV"=%u", uid));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (!service->set->master_set->version_ignore)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen env_put(MASTER_DOVECOT_VERSION_ENV"="PACKAGE_VERSION);
43d7e7ce608f5451e4907b5f5c48c00beb265802Timo Sirainen if (*ssl_manual_key_password != '\0' && service->have_inet_listeners) {
43d7e7ce608f5451e4907b5f5c48c00beb265802Timo Sirainen /* manually given SSL password. give it only to services
43d7e7ce608f5451e4907b5f5c48c00beb265802Timo Sirainen that have inet listeners. */
43d7e7ce608f5451e4907b5f5c48c00beb265802Timo Sirainen env_put(t_strconcat(MASTER_SSL_KEY_PASSWORD_ENV"=",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void service_process_status_timeout(struct service_process *process)
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen "Initial status notification not received in %d "
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen "seconds, killing the process",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (kill(process->pid, SIGKILL) < 0 && errno != ESRCH) {
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen service_error(process->service, "kill(%s, SIGKILL) failed: %m",
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainenhandle_request(const struct service_process_auth_request *request)
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen base64_encode(request->data, request->data_size, str);
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen env_put(t_strconcat("LOCAL_IP=", net_ip2addr(&request->local_ip), NULL));
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen env_put(t_strconcat("IP=", net_ip2addr(&request->remote_ip), NULL));
ce78f5edeb05611677a50034e5e8ddc4c72d446aTimo Sirainenstatic const char **
ce78f5edeb05611677a50034e5e8ddc4c72d446aTimo Sirainen const struct service_process_auth_request *request,
ce78f5edeb05611677a50034e5e8ddc4c72d446aTimo Sirainen const char *const *auth_args)
ce78f5edeb05611677a50034e5e8ddc4c72d446aTimo Sirainen const char **extra;
ce78f5edeb05611677a50034e5e8ddc4c72d446aTimo Sirainen if (!service->set->master_set->verbose_proctitle || request == NULL)
ce78f5edeb05611677a50034e5e8ddc4c72d446aTimo Sirainen extra[0] = t_strdup_printf("[%s %s]", auth_args[0],
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenservice_process_create(struct service *service, const char *const *auth_args,
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen const struct service_process_auth_request *request)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen static unsigned int uid_counter = 0;
cdc8485491045d82bb98405d4b995f277d12838eTimo Sirainen /* throttling service, don't create new processes */
e20edc0dedcdfbcfa20e9bb4c3dc460f28bfd405Timo Sirainen if (service->process_count >= service->process_limit) {
e4427a13680e8b7db98fb7eb9ef2e5f788e84212Timo Sirainen /* we should get here only with auth dest services */
e20edc0dedcdfbcfa20e9bb4c3dc460f28bfd405Timo Sirainen i_warning("service(%s): process_limit reached, "
6fdfa4d4cf14d1d7764d7faa8258f112e39c8dbeTimo Sirainen "dropping this client connection",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (socketpair(AF_UNIX, SOCK_STREAM, 0, fd) < 0) {
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen service_error(service, "socketpair() failed: %m");
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service_process_setup_environment(service, uid);
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen service_dup_fds(service, fd[1], request == NULL ? -1 :
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen process = i_malloc(sizeof(struct service_process_auth_server));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service_process_auth_server_init(process, fd[0]);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen process = i_malloc(sizeof(struct service_process_auth_source));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen service_process_auth_source_init(process, fd[0]);
cf2e6953d03a1c22f272ec19432fc03c136ac1bbTimo Sirainen /* fall through */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen timeout_add(SERVICE_FIRST_STATUS_TIMEOUT_SECS * 1000,
3a0f9aa9504497e4e47f32df54fbf47fdc7423b6Timo Sirainen process->available_count = service->client_limit;
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen hash_table_insert(service_pids, &process->pid, process);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenvoid service_process_destroy(struct service_process *process)
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen struct service_list *service_list = service->list;
bad5fa318c6c1384ab83bd72d53ce06593274c18Timo Sirainen hash_table_remove(service_pids, &process->pid);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen i_assert(service->process_avail <= service->process_count);
6c2ce1d5bf17b21e804a079eb0f973b7ab83e0d8Timo Sirainen service_process_notify_add(service->list->log_byes, process);
6fdfa4d4cf14d1d7764d7faa8258f112e39c8dbeTimo Sirainen if (service->process_count < service->process_limit &&
6fdfa4d4cf14d1d7764d7faa8258f112e39c8dbeTimo Sirainen service_processes_auth_source_notify(service, FALSE);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenvoid service_process_ref(struct service_process *process)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenint service_process_unref(struct service_process *process)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic const char *
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenget_exit_status_message(struct service *service, enum fatal_exit_status status)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Can't open log file";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Can't write to log file";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Internal logging error";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Out of memory";
a3dcda4b01461c7690c655a013ec12851cdb78d4Timo Sirainen return t_strdup_printf("Out of memory (vsz_limit=%u MB, "
a3dcda4b01461c7690c655a013ec12851cdb78d4Timo Sirainen "you may need to increase it)",
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "exec() failed";
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen return "Fatal failure";
5fc02738b38ac2b0c21db0854d7a5ad452b1177fTimo Sirainenstatic void log_coredump(struct service *service ATTR_UNUSED,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (signum != SIGABRT && signum != SIGSEGV && signum != SIGBUS)
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* let's try to figure out why we didn't get a core dump */
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_append(str, " (core not dumped - set drop_priv_before_exec=yes)");
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (*service->set->privileged_group != '\0') {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_append(str, " (core not dumped - privileged_group prevented it)");
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenservice_process_get_status_error(string_t *str, struct service_process *process,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen const char *msg;
55bc6a7a0940ec48a68558ef70838991c5d301d2Timo Sirainen str_printfa(str, "service(%s): child %s ", service->set->name,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_printfa(str, "killed with signal %d", WTERMSIG(status));
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_printfa(str, "died with status %d", status);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen str_printfa(str, "returned error %d", status);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen msg = get_exit_status_message(service, status);
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenstatic void service_process_log(struct service_process *process,
9c8f854d95d8d895022a75f140a0a500eb200d39Timo Sirainen if (!default_fatal || process->service->log_fd[1] == -1) {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* log it via the log process in charge of handling
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen this process's logging */
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen data = t_strdup_printf("%d %s DEFAULT-FATAL %s\n",
78fa3c578c14ee8a612f86cf73b6181c7f16463fTimo Sirainen if (write(process->service->list->master_log_fd[1],
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainenvoid service_process_log_status_error(struct service_process *process,
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
d176f84ce5ca2073f4dfbafb457b9c74f6bf0d76Timo Sirainen /* fast path */
9c8f854d95d8d895022a75f140a0a500eb200d39Timo Sirainen service_process_get_status_error(str, process, status,