2018-10-25 01:46:10 +02:00
|
|
|
#include <assert.h>
|
2018-03-29 04:06:45 +02:00
|
|
|
#include <backtrace-supported.h>
|
|
|
|
#include <backtrace.h>
|
|
|
|
#include <ccan/err/err.h>
|
|
|
|
#include <ccan/io/io.h>
|
|
|
|
#include <ccan/str/str.h>
|
|
|
|
#include <common/daemon.h>
|
2018-11-21 22:45:37 +01:00
|
|
|
#include <common/memleak.h>
|
2018-03-29 04:06:45 +02:00
|
|
|
#include <common/status.h>
|
|
|
|
#include <common/utils.h>
|
|
|
|
#include <common/version.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <wally_core.h>
|
|
|
|
|
2018-08-24 06:06:37 +02:00
|
|
|
struct backtrace_state *backtrace_state;
|
|
|
|
|
2018-03-29 04:06:45 +02:00
|
|
|
#if BACKTRACE_SUPPORTED
|
|
|
|
static void (*bt_print)(const char *fmt, ...) PRINTF_FMT(1,2);
|
|
|
|
static void (*bt_exit)(void);
|
|
|
|
|
|
|
|
static int backtrace_status(void *unused UNUSED, uintptr_t pc,
|
|
|
|
const char *filename, int lineno,
|
|
|
|
const char *function)
|
|
|
|
{
|
|
|
|
bt_print("backtrace: %s:%d (%s) %p",
|
|
|
|
filename, lineno, function, (void *)pc);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void crashdump(int sig)
|
|
|
|
{
|
|
|
|
/* We do stderr first, since it's most reliable. */
|
2018-06-12 22:48:00 +02:00
|
|
|
warnx("Fatal signal %d (version %s)", sig, version());
|
2018-04-03 09:28:18 +02:00
|
|
|
if (backtrace_state)
|
|
|
|
backtrace_print(backtrace_state, 0, stderr);
|
2018-03-29 04:06:45 +02:00
|
|
|
|
|
|
|
/* Now send to parent. */
|
2018-06-12 22:48:00 +02:00
|
|
|
bt_print("FATAL SIGNAL %d (version %s)", sig, version());
|
2018-04-03 09:28:18 +02:00
|
|
|
if (backtrace_state)
|
|
|
|
backtrace_full(backtrace_state, 0, backtrace_status, NULL, NULL);
|
2018-03-29 04:06:45 +02:00
|
|
|
|
|
|
|
/* Probably shouldn't return. */
|
|
|
|
bt_exit();
|
|
|
|
|
|
|
|
/* This time it will kill us instantly. */
|
|
|
|
kill(getpid(), sig);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void crashlog_activate(void)
|
|
|
|
{
|
|
|
|
struct sigaction sa;
|
|
|
|
|
|
|
|
sa.sa_handler = crashdump;
|
|
|
|
sigemptyset(&sa.sa_mask);
|
|
|
|
|
|
|
|
/* We want to fall through to default handler */
|
|
|
|
sa.sa_flags = SA_RESETHAND;
|
|
|
|
sigaction(SIGILL, &sa, NULL);
|
|
|
|
sigaction(SIGABRT, &sa, NULL);
|
|
|
|
sigaction(SIGFPE, &sa, NULL);
|
|
|
|
sigaction(SIGSEGV, &sa, NULL);
|
|
|
|
sigaction(SIGBUS, &sa, NULL);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-09-03 05:40:00 +02:00
|
|
|
int daemon_poll(struct pollfd *fds, nfds_t nfds, int timeout)
|
2018-03-29 04:06:45 +02:00
|
|
|
{
|
|
|
|
const char *t;
|
|
|
|
|
|
|
|
t = taken_any();
|
|
|
|
if (t)
|
|
|
|
errx(1, "Outstanding taken pointers: %s", t);
|
|
|
|
|
|
|
|
clean_tmpctx();
|
|
|
|
|
|
|
|
return poll(fds, nfds, timeout);
|
|
|
|
}
|
|
|
|
|
2018-11-26 14:28:51 +01:00
|
|
|
#if DEVELOPER && BACKTRACE_SUPPORTED
|
2018-10-25 01:46:10 +02:00
|
|
|
static void steal_notify(tal_t *child, enum tal_notify_type n, tal_t *newparent)
|
|
|
|
{
|
|
|
|
tal_t *p = newparent;
|
|
|
|
|
|
|
|
assert(tal_parent(child) == newparent);
|
|
|
|
while ((p = tal_parent(p)) != NULL)
|
|
|
|
assert(p != child);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void add_steal_notifier(tal_t *parent UNUSED,
|
|
|
|
enum tal_notify_type type UNNEEDED,
|
|
|
|
void *child)
|
|
|
|
{
|
|
|
|
tal_add_notifier(child, TAL_NOTIFY_ADD_CHILD, add_steal_notifier);
|
|
|
|
tal_add_notifier(child, TAL_NOTIFY_STEAL, steal_notify);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void add_steal_notifiers(const tal_t *root)
|
|
|
|
{
|
|
|
|
tal_add_notifier(root, TAL_NOTIFY_ADD_CHILD, add_steal_notifier);
|
|
|
|
|
|
|
|
for (const tal_t *i = tal_first(root); i; i = tal_next(i))
|
|
|
|
add_steal_notifiers(i);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2018-03-29 04:06:45 +02:00
|
|
|
void daemon_setup(const char *argv0,
|
|
|
|
void (*backtrace_print)(const char *fmt, ...),
|
|
|
|
void (*backtrace_exit)(void))
|
|
|
|
{
|
|
|
|
err_set_progname(argv0);
|
|
|
|
|
2018-04-05 01:19:31 +02:00
|
|
|
#if BACKTRACE_SUPPORTED
|
2018-03-29 04:06:45 +02:00
|
|
|
bt_print = backtrace_print;
|
|
|
|
bt_exit = backtrace_exit;
|
|
|
|
#if DEVELOPER
|
|
|
|
/* Suppresses backtrace (breaks valgrind) */
|
|
|
|
if (!getenv("LIGHTNINGD_DEV_NO_BACKTRACE"))
|
|
|
|
backtrace_state = backtrace_create_state(argv0, 0, NULL, NULL);
|
2018-10-25 01:46:10 +02:00
|
|
|
add_steal_notifiers(NULL);
|
2018-03-29 04:06:45 +02:00
|
|
|
#else
|
|
|
|
backtrace_state = backtrace_create_state(argv0, 0, NULL, NULL);
|
|
|
|
#endif
|
|
|
|
crashlog_activate();
|
|
|
|
#endif
|
|
|
|
|
2018-11-21 22:45:37 +01:00
|
|
|
#if DEVELOPER
|
|
|
|
/* This has significant overhead, so we only enable it if told */
|
|
|
|
if (getenv("LIGHTNINGD_DEV_MEMLEAK"))
|
|
|
|
memleak_init();
|
|
|
|
#endif
|
|
|
|
|
2018-03-29 04:06:45 +02:00
|
|
|
/* We handle write returning errors! */
|
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2018-10-16 10:48:13 +02:00
|
|
|
wally_init(0);
|
2018-03-29 04:06:45 +02:00
|
|
|
secp256k1_ctx = wally_get_secp_context();
|
|
|
|
|
|
|
|
setup_tmpctx();
|
|
|
|
io_poll_override(daemon_poll);
|
|
|
|
}
|
|
|
|
|
|
|
|
void daemon_shutdown(void)
|
|
|
|
{
|
2018-11-21 22:45:37 +01:00
|
|
|
#if DEVELOPER
|
|
|
|
memleak_cleanup();
|
|
|
|
#endif
|
2018-03-29 04:06:45 +02:00
|
|
|
tal_free(tmpctx);
|
|
|
|
wally_cleanup(0);
|
|
|
|
}
|