2 * Signal handlers for Bacula daemons
4 * Kern Sibbald, April 2000
8 * Note, we probably should do a core dump for the serious
9 * signals such as SIGBUS, SIGPFE, ...
10 * Also, for SIGHUP and SIGUSR1, we should re-read the
11 * configuration file. However, since this is a "general"
12 * routine, we leave it to the individual daemons to
13 * tweek their signals after calling this routine.
18 Copyright (C) 2000-2004 Kern Sibbald and John Walker
20 This program is free software; you can redistribute it and/or
21 modify it under the terms of the GNU General Public License as
22 published by the Free Software Foundation; either version 2 of
23 the License, or (at your option) any later version.
25 This program is distributed in the hope that it will be useful,
26 but WITHOUT ANY WARRANTY; without even the implied warranty of
27 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
28 General Public License for more details.
30 You should have received a copy of the GNU General Public
31 License along with this program; if not, write to the Free
32 Software Foundation, Inc., 59 Temple Place - Suite 330, Boston,
46 extern char my_name[];
50 static const char *sig_names[BA_NSIG+1];
52 typedef void (SIG_HANDLER)(int sig);
53 static SIG_HANDLER *exit_handler;
56 static pid_t main_pid = 0;
62 static void signal_handler(int sig);
65 static void signal_handler(int sig)
67 static int already_dead = 0;
69 /* If we come back more than once, get out fast! */
70 if (already_dead > 1) {
73 /* If we come back once, take normal exit */
77 Dmsg2(200, "sig=%d %s\n", sig, sig_names[sig]);
78 /* Ignore certain signals */
79 if (sig == SIGCHLD || sig == SIGUSR2) {
84 // Emsg1(M_TERM, -1, "Shutting down Bacula service: %s ...\n", my_name);
86 Emsg2(M_FATAL, -1, "Bacula interrupted by signal %d: %s\n", sig, sig_names[sig]);
91 struct sigaction sigdefault;
93 static char pid_buf[20];
94 static char btpath[400];
96 int exelen = strlen(exepath);
98 fprintf(stderr, "Kaboom! %s, %s got signal %d. Attempting traceback.\n",
99 exename, my_name, sig);
101 if (exelen + 12 > (int)sizeof(btpath)) {
102 bstrncpy(btpath, "btraceback", sizeof(btpath));
104 bstrncpy(btpath, exepath, sizeof(btpath));
105 if (btpath[exelen-1] == '/') {
106 btpath[exelen-1] = 0;
108 bstrncat(btpath, "/btraceback", sizeof(btpath));
110 if (exepath[exelen-1] != '/') {
111 strcat(exepath, "/");
113 strcat(exepath, exename);
114 if (chdir(working_directory) !=0) { /* dump in working directory */
115 Pmsg2(000, "chdir to %s failed. ERR=%s\n", working_directory, strerror(errno));
117 unlink("./core"); /* get rid of any old core file */
118 sprintf(pid_buf, "%d", (int)main_pid);
119 Dmsg1(300, "Working=%s\n", working_directory);
120 Dmsg1(300, "btpath=%s\n", btpath);
121 Dmsg1(300, "exepath=%s\n", exepath);
122 switch (pid = fork()) {
124 fprintf(stderr, "Fork error: ERR=%s\n", strerror(errno));
127 argv[0] = btpath; /* path to btraceback */
128 argv[1] = exepath; /* path to exe */
130 argv[3] = (char *)NULL;
131 fprintf(stderr, "Calling: %s %s %s\n", btpath, exepath, pid_buf);
132 if (execv(btpath, argv) != 0) {
133 printf("execv: %s failed: ERR=%s\n", btpath, strerror(errno));
136 default: /* parent */
139 /* Parent continue here, waiting for child */
140 sigdefault.sa_flags = 0;
141 sigdefault.sa_handler = SIG_DFL;
142 sigfillset(&sigdefault.sa_mask);
144 sigaction(sig, &sigdefault, NULL);
146 Dmsg0(500, "Doing waitpid\n");
147 waitpid(pid, NULL, 0); /* wait for child to produce dump */
148 fprintf(stderr, "Traceback complete, attempting cleanup ...\n");
149 Dmsg0(500, "Done waitpid\n");
150 exit_handler(sig); /* clean up if possible */
151 Dmsg0(500, "Done exit_handler\n");
153 Dmsg0(500, "Doing sleep\n");
156 fprintf(stderr, "It looks like the traceback worked ...\n");
164 * Init stack dump by saving main process id --
165 * needed by debugger to attach to this program.
167 void init_stack_dump(void)
169 main_pid = getpid(); /* save main thread's pid */
175 void init_signals(void terminate(int sig))
177 struct sigaction sighandle;
178 struct sigaction sigignore;
179 struct sigaction sigdefault;
183 exit_handler = terminate;
184 if (BA_NSIG < _sys_nsig)
185 Emsg2(M_ABORT, 0, "BA_NSIG too small (%d) should be (%d)\n", BA_NSIG, _sys_nsig);
187 for (i=0; i<_sys_nsig; i++)
188 sig_names[i] = _sys_siglist[i];
190 exit_handler = terminate;
191 sig_names[0] = "UNKNOWN SIGNAL";
192 sig_names[SIGHUP] = "Hangup";
193 sig_names[SIGINT] = "Interrupt";
194 sig_names[SIGQUIT] = "Quit";
195 sig_names[SIGILL] = "Illegal instruction";;
196 sig_names[SIGTRAP] = "Trace/Breakpoint trap";
197 sig_names[SIGABRT] = "Abort";
199 sig_names[SIGEMT] = "EMT instruction (Emulation Trap)";
202 sig_names[SIGIOT] = "IOT trap";
204 sig_names[SIGBUS] = "BUS error";
205 sig_names[SIGFPE] = "Floating-point exception";
206 sig_names[SIGKILL] = "Kill, unblockable";
207 sig_names[SIGUSR1] = "User-defined signal 1";
208 sig_names[SIGSEGV] = "Segmentation violation";
209 sig_names[SIGUSR2] = "User-defined signal 2";
210 sig_names[SIGPIPE] = "Broken pipe";
211 sig_names[SIGALRM] = "Alarm clock";
212 sig_names[SIGTERM] = "Termination";
214 sig_names[SIGSTKFLT] = "Stack fault";
216 sig_names[SIGCHLD] = "Child status has changed";
217 sig_names[SIGCONT] = "Continue";
218 sig_names[SIGSTOP] = "Stop, unblockable";
219 sig_names[SIGTSTP] = "Keyboard stop";
220 sig_names[SIGTTIN] = "Background read from tty";
221 sig_names[SIGTTOU] = "Background write to tty";
222 sig_names[SIGURG] = "Urgent condition on socket";
223 sig_names[SIGXCPU] = "CPU limit exceeded";
224 sig_names[SIGXFSZ] = "File size limit exceeded";
225 sig_names[SIGVTALRM] = "Virtual alarm clock";
226 sig_names[SIGPROF] = "Profiling alarm clock";
227 sig_names[SIGWINCH] = "Window size change";
228 sig_names[SIGIO] = "I/O now possible";
230 sig_names[SIGPWR] = "Power failure restart";
233 sig_names[SIGWAITING] = "No runnable lwp";
236 sig_name[SIGLWP] = "SIGLWP special signal used by thread library";
239 sig_names[SIGFREEZE] = "Checkpoint Freeze";
242 sig_names[SIGTHAW] = "Checkpoint Thaw";
245 sig_names[SIGCANCEL] = "Thread Cancellation";
248 sig_names[SIGLOST] = "Resource Lost (e.g. record-lock lost)";
253 /* Now setup signal handlers */
254 sighandle.sa_flags = 0;
255 sighandle.sa_handler = signal_handler;
256 sigfillset(&sighandle.sa_mask);
257 sigignore.sa_flags = 0;
258 sigignore.sa_handler = SIG_IGN;
259 sigfillset(&sigignore.sa_mask);
260 sigdefault.sa_flags = 0;
261 sigdefault.sa_handler = SIG_DFL;
262 sigfillset(&sigdefault.sa_mask);
265 sigaction(SIGPIPE, &sigignore, NULL);
266 sigaction(SIGCHLD, &sighandle, NULL);
267 sigaction(SIGCONT, &sigignore, NULL);
268 sigaction(SIGPROF, &sigignore, NULL);
269 sigaction(SIGWINCH, &sigignore, NULL);
270 sigaction(SIGIO, &sighandle, NULL);
272 sigaction(SIGINT, &sigdefault, NULL);
273 sigaction(SIGXCPU, &sigdefault, NULL);
274 sigaction(SIGXFSZ, &sigdefault, NULL);
276 sigaction(SIGHUP, &sigignore, NULL);
277 sigaction(SIGQUIT, &sighandle, NULL);
278 sigaction(SIGILL, &sighandle, NULL);
279 sigaction(SIGTRAP, &sighandle, NULL);
280 /* sigaction(SIGABRT, &sighandle, NULL); */
282 sigaction(SIGEMT, &sighandle, NULL);
285 /* sigaction(SIGIOT, &sighandle, NULL); used by debugger */
287 sigaction(SIGBUS, &sighandle, NULL);
288 sigaction(SIGFPE, &sighandle, NULL);
289 sigaction(SIGKILL, &sighandle, NULL);
290 sigaction(SIGUSR1, &sighandle, NULL);
291 sigaction(SIGSEGV, &sighandle, NULL);
292 sigaction(SIGUSR2, &sighandle, NULL);
293 sigaction(SIGALRM, &sighandle, NULL);
294 sigaction(SIGTERM, &sighandle, NULL);
296 sigaction(SIGSTKFLT, &sighandle, NULL);
298 sigaction(SIGSTOP, &sighandle, NULL);
299 sigaction(SIGTSTP, &sighandle, NULL);
300 sigaction(SIGTTIN, &sighandle, NULL);
301 sigaction(SIGTTOU, &sighandle, NULL);
302 sigaction(SIGURG, &sighandle, NULL);
303 sigaction(SIGVTALRM, &sighandle, NULL);
305 sigaction(SIGPWR, &sighandle, NULL);
308 sigaction(SIGWAITING,&sighandle, NULL);
311 sigaction(SIGLWP, &sighandle, NULL);
314 sigaction(SIGFREEZE, &sighandle, NULL);
317 sigaction(SIGTHAW, &sighandle, NULL);
320 sigaction(SIGCANCEL, &sighandle, NULL);
323 sigaction(SIGLOST, &sighandle, NULL);