| /* source: xio-listen.c */ |
| /* Copyright Gerhard Rieger and contributors (see file CHANGES) */ |
| /* Published under the GNU General Public License V.2, see file COPYING */ |
| |
| /* this file contains the source for listen socket options */ |
| |
| #include "xiosysincludes.h" |
| |
| #if WITH_LISTEN |
| |
| #include "xioopen.h" |
| #include "xio-named.h" |
| #include "xio-socket.h" |
| #include "xio-ip.h" |
| #include "xio-ip4.h" |
| #include "xio-listen.h" |
| #include "xio-tcpwrap.h" |
| |
| /***** LISTEN options *****/ |
| const struct optdesc opt_backlog = { "backlog", NULL, OPT_BACKLOG, GROUP_LISTEN, PH_LISTEN, TYPE_INT, OFUNC_SPEC }; |
| const struct optdesc opt_fork = { "fork", NULL, OPT_FORK, GROUP_CHILD, PH_PASTACCEPT, TYPE_BOOL, OFUNC_SPEC }; |
| const struct optdesc opt_max_children = { "max-children", NULL, OPT_MAX_CHILDREN, GROUP_CHILD, PH_PASTACCEPT, TYPE_INT, OFUNC_SPEC }; |
| const struct optdesc opt_children_shutup = { "children-shutup", "child-shutup", OPT_CHILDREN_SHUTUP, GROUP_CHILD, PH_PASTACCEPT, TYPE_INT, OFUNC_OFFSET, XIO_OFFSETOF(shutup) }; |
| /**/ |
| #if (WITH_UDP || WITH_TCP) |
| const struct optdesc opt_range = { "range", NULL, OPT_RANGE, GROUP_RANGE, PH_ACCEPT, TYPE_STRING, OFUNC_SPEC }; |
| #endif |
| const struct optdesc opt_accept_timeout = { "accept-timeout", "listen-timeout", OPT_ACCEPT_TIMEOUT, GROUP_LISTEN, PH_LISTEN, TYPE_TIMEVAL, OFUNC_OFFSET, XIO_OFFSETOF(para.socket.accept_timeout) }; |
| |
| /* |
| applies and consumes the following option: |
| PH_INIT, PH_PASTSOCKET, PH_PREBIND, PH_BIND, PH_PASTBIND, PH_EARLY, |
| PH_PREOPEN, PH_FD, PH_CONNECTED, PH_LATE, PH_LATE2 |
| OPT_FORK, OPT_SO_TYPE, OPT_SO_PROTOTYPE, OPT_BACKLOG, OPT_RANGE, tcpwrap, |
| OPT_SOURCEPORT, OPT_LOWPORT, cloexec |
| */ |
| int |
| xioopen_listen(struct single *sfd, int xioflags, |
| struct sockaddr *us, socklen_t uslen, |
| struct opt *opts, struct opt *opts0, |
| int pf, int socktype, int proto) { |
| int level; |
| int result; |
| |
| #if WITH_RETRY |
| if (sfd->forever || sfd->retry) { |
| level = E_INFO; |
| } else |
| #endif /* WITH_RETRY */ |
| level = E_ERROR; |
| |
| while (true) { /* loop over failed attempts */ |
| |
| /* tcp listen; this can fork() for us; it only returns on error or on |
| successful establishment of tcp connection */ |
| result = _xioopen_listen(sfd, xioflags, |
| (struct sockaddr *)us, uslen, |
| opts, pf, socktype, proto, level); |
| /*! not sure if we should try again on retry/forever */ |
| switch (result) { |
| case STAT_OK: break; |
| #if WITH_RETRY |
| case STAT_RETRYLATER: |
| case STAT_RETRYNOW: |
| if (sfd->forever || sfd->retry) { |
| dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL); |
| if (result == STAT_RETRYLATER) { |
| Nanosleep(&sfd->intervall, NULL); |
| } |
| dropopts(opts, PH_ALL); opts = copyopts(opts0, GROUP_ALL); |
| --sfd->retry; |
| continue; |
| } |
| return STAT_NORETRY; |
| #endif /* WITH_RETRY */ |
| default: |
| return result; |
| } |
| |
| break; |
| } /* drop out on success */ |
| |
| return result; |
| } |
| |
| |
| /* creates the listening socket, bind, applies options; waits for incoming |
| connection, checks its source address and port. Depending on fork option, it |
| may fork a subprocess. |
| pf specifies the syntax expected for range option. In the case of generic |
| socket it is 0 (expecting raw binary data), and the real pf can be obtained |
| from us->af_family; for other socket types pf == us->af_family |
| Returns 0 if a connection was accepted; with fork option, this is always in |
| a subprocess! |
| Other return values indicate a problem; this can happen in the master |
| process or in a subprocess. |
| This function does not retry. If you need retries, handle this in a |
| loop in the calling function (and always provide the options...) |
| After fork, we set the forever/retry of the child process to 0 |
| applies and consumes the following option: |
| PH_INIT, PH_PASTSOCKET, PH_PREBIND, PH_BIND, PH_PASTBIND, PH_EARLY, |
| PH_PREOPEN, PH_FD, PH_CONNECTED, PH_LATE, PH_LATE2 |
| OPT_FORK, OPT_SO_TYPE, OPT_SO_PROTOTYPE, OPT_BACKLOG, OPT_RANGE, tcpwrap, |
| OPT_SOURCEPORT, OPT_LOWPORT, cloexec |
| */ |
| int _xioopen_listen(struct single *sfd, int xioflags, struct sockaddr *us, socklen_t uslen, |
| struct opt *opts, int pf, int socktype, int proto, int level) { |
| int backlog = 5; /* why? 1 seems to cause problems under some load */ |
| char infobuff[256]; |
| |
| if (applyopts_single(sfd, opts, PH_INIT) < 0) return -1; |
| |
| if ((sfd->fd = xiosocket(opts, pf?pf:us->sa_family, socktype, proto, level)) < 0) { |
| return STAT_RETRYLATER; |
| } |
| applyopts(sfd, -1, opts, PH_PASTSOCKET); |
| |
| applyopts_offset(sfd, opts); |
| applyopts_cloexec(sfd->fd, opts); |
| |
| /* Phase prebind */ |
| xiosock_reuseaddr(sfd->fd, proto, opts); |
| applyopts(sfd, -1, opts, PH_PREBIND); |
| |
| applyopts(sfd, -1, opts, PH_BIND); |
| if (Bind(sfd->fd, (struct sockaddr *)us, uslen) < 0) { |
| Msg4(level, "bind(%d, {%s}, "F_socklen"): %s", sfd->fd, |
| sockaddr_info(us, uslen, infobuff, sizeof(infobuff)), uslen, |
| strerror(errno)); |
| Close(sfd->fd); |
| return STAT_RETRYLATER; |
| } |
| |
| #if WITH_UNIX |
| if (us->sa_family == AF_UNIX) { |
| if (((union sockaddr_union *)us)->un.sun_path[0] != '\0') { |
| applyopts_named(((struct sockaddr_un *)us)->sun_path, opts, PH_FD); |
| } else { |
| applyopts(sfd, -1, opts, PH_FD); |
| } |
| } |
| #endif |
| |
| applyopts(sfd, -1, opts, PH_PASTBIND); |
| #if WITH_UNIX |
| if (us->sa_family == AF_UNIX) { |
| if (((union sockaddr_union *)us)->un.sun_path[0] != '\0') { |
| applyopts_named(((struct sockaddr_un *)us)->sun_path, opts, PH_EARLY); |
| applyopts_named(((struct sockaddr_un *)us)->sun_path, opts, PH_PREOPEN); |
| } else { |
| applyopts(sfd, -1, opts, PH_EARLY); |
| applyopts(sfd, -1, opts, PH_PREOPEN); |
| } |
| } |
| #endif /* WITH_UNIX */ |
| |
| applyopts(sfd, -1, opts, PH_PRELISTEN); |
| retropt_int(opts, OPT_BACKLOG, &backlog); |
| applyopts(sfd, -1, opts, PH_LISTEN); |
| if (Listen(sfd->fd, backlog) < 0) { |
| Error3("listen(%d, %d): %s", sfd->fd, backlog, strerror(errno)); |
| return STAT_RETRYLATER; |
| } |
| return _xioopen_accept_fd(sfd, xioflags, us, uslen, opts, pf, proto,level); |
| } |
| |
| int _xioopen_accept_fd( |
| struct single *sfd, |
| int xioflags, |
| struct sockaddr *us, |
| socklen_t uslen, |
| struct opt *opts, |
| int pf, |
| int proto, |
| int level) |
| { |
| struct sockaddr sa; |
| socklen_t salen; |
| char *rangename; |
| bool dofork = false; |
| int maxchildren = 0; |
| char infobuff[256]; |
| char lisname[256]; |
| union sockaddr_union _peername; |
| union sockaddr_union _sockname; |
| union sockaddr_union *pa = &_peername; /* peer address */ |
| union sockaddr_union *la = &_sockname; /* local address */ |
| socklen_t pas = sizeof(_peername); /* peer address size */ |
| socklen_t las = sizeof(_sockname); /* local address size */ |
| int result; |
| |
| retropt_bool(opts, OPT_FORK, &dofork); |
| |
| if (dofork) { |
| if (!(xioflags & XIO_MAYFORK)) { |
| Error("option fork not allowed here"); |
| return STAT_NORETRY; |
| } |
| sfd->flags |= XIO_DOESFORK; |
| } |
| |
| retropt_int(opts, OPT_MAX_CHILDREN, &maxchildren); |
| |
| if (! dofork && maxchildren) { |
| Error("option max-children not allowed without option fork"); |
| return STAT_NORETRY; |
| } |
| |
| if (dofork) { |
| xiosetchilddied(); /* set SIGCHLD handler */ |
| } |
| |
| /* Under some circumstances (e.g., TCP listen on port 0) bind() fills empty |
| fields that we want to know. */ |
| salen = sizeof(sa); |
| if (Getsockname(sfd->fd, us, &uslen) < 0) { |
| Warn4("getsockname(%d, %p, {%d}): %s", |
| sfd->fd, &us, uslen, strerror(errno)); |
| } |
| |
| #if WITH_IP4 /*|| WITH_IP6*/ |
| if (retropt_string(opts, OPT_RANGE, &rangename) >= 0) { |
| if (xioparserange(rangename, pf, &sfd->para.socket.range, |
| sfd->para.socket.ip.ai_flags) |
| < 0) { |
| free(rangename); |
| return STAT_NORETRY; |
| } |
| free(rangename); |
| sfd->para.socket.dorange = true; |
| } |
| #endif |
| |
| #if (WITH_TCP || WITH_UDP) && WITH_LIBWRAP |
| xio_retropt_tcpwrap(sfd, opts); |
| #endif /* && (WITH_TCP || WITH_UDP) && WITH_LIBWRAP */ |
| |
| #if WITH_TCP || WITH_UDP |
| if (retropt_ushort(opts, OPT_SOURCEPORT, &sfd->para.socket.ip.sourceport) >= 0) { |
| sfd->para.socket.ip.dosourceport = true; |
| } |
| retropt_bool(opts, OPT_LOWPORT, &sfd->para.socket.ip.lowport); |
| #endif /* WITH_TCP || WITH_UDP */ |
| |
| if (xioparms.logopt == 'm') { |
| Info("starting accept loop, switching to syslog"); |
| diag_set('y', xioparms.syslogfac); xioparms.logopt = 'y'; |
| } else { |
| Info("starting accept loop"); |
| } |
| while (true) { /* but we only loop if fork option is set */ |
| char peername[256]; |
| char sockname[256]; |
| int ps; /* peer socket */ |
| |
| pa = &_peername; |
| la = &_sockname; |
| salen = sizeof(struct sockaddr); |
| do { |
| /*? int level = E_ERROR;*/ |
| Notice1("listening on %s", sockaddr_info(us, uslen, lisname, sizeof(lisname))); |
| if (sfd->para.socket.accept_timeout.tv_sec > 0 || |
| sfd->para.socket.accept_timeout.tv_usec > 0) { |
| fd_set rfd; |
| struct timeval tmo; |
| FD_ZERO(&rfd); |
| FD_SET(sfd->fd, &rfd); |
| tmo.tv_sec = sfd->para.socket.accept_timeout.tv_sec; |
| tmo.tv_usec = sfd->para.socket.accept_timeout.tv_usec; |
| while (1) { |
| if (Select(sfd->fd+1, &rfd, NULL, NULL, &tmo) < 0) { |
| if (errno != EINTR) { |
| Error5("Select(%d, &0x%lx, NULL, NULL, {%ld.%06ld}): %s", sfd->fd+1, 1L<<(sfd->fd+1), |
| sfd->para.socket.accept_timeout.tv_sec, sfd->para.socket.accept_timeout.tv_usec, |
| strerror(errno)); |
| } |
| } else { |
| break; |
| } |
| } |
| if (!FD_ISSET(sfd->fd, &rfd)) { |
| struct sigaction act; |
| |
| Warn1("accept: %s", strerror(ETIMEDOUT)); |
| Close(sfd->fd); |
| Notice("Waiting for child processes to terminate"); |
| memset(&act, 0, sizeof(struct sigaction)); |
| act.sa_flags = SA_NOCLDSTOP/*|SA_RESTART*/ |
| #ifdef SA_SIGINFO /* not on Linux 2.0(.33) */ |
| |SA_SIGINFO |
| #endif |
| #ifdef SA_NOMASK |
| |SA_NOMASK |
| #endif |
| ; |
| #if HAVE_STRUCT_SIGACTION_SA_SIGACTION && defined(SA_SIGINFO) |
| act.sa_sigaction = 0; |
| #else /* Linux 2.0(.33) does not have sigaction.sa_sigaction */ |
| act.sa_handler = 0; |
| #endif |
| sigemptyset(&act.sa_mask); |
| Sigaction(SIGCHLD, &act, NULL); |
| wait(NULL); |
| Exit(0); |
| } |
| } |
| ps = Accept(sfd->fd, (struct sockaddr *)&sa, &salen); |
| if (ps >= 0) { |
| /*0 Info4("accept(%d, %p, {"F_Zu"}) -> %d", sfd->fd, &sa, salen, ps);*/ |
| break; /* success, break out of loop */ |
| } |
| if (errno == EINTR) { |
| continue; |
| } |
| if (errno == ECONNABORTED) { |
| Notice4("accept(%d, %p, {"F_socklen"}): %s", |
| sfd->fd, &sa, salen, strerror(errno)); |
| continue; |
| } |
| Msg4(level, "accept(%d, %p, {"F_socklen"}): %s", |
| sfd->fd, &sa, salen, strerror(errno)); |
| Close(sfd->fd); |
| return STAT_RETRYLATER; |
| } while (true); |
| applyopts_cloexec(ps, opts); |
| if (Getpeername(ps, &pa->soa, &pas) < 0) { |
| Notice4("getpeername(%d, %p, {"F_socklen"}): %s", |
| ps, pa, pas, strerror(errno)); |
| pa = NULL; |
| } |
| if (Getsockname(ps, &la->soa, &las) < 0) { |
| Warn4("getsockname(%d, %p, {"F_socklen"}): %s", |
| ps, la, las, strerror(errno)); |
| la = NULL; |
| } |
| Notice2("accepting connection from %s on %s", |
| pa? |
| sockaddr_info(&pa->soa, pas, peername, sizeof(peername)):"NULL", |
| la? |
| sockaddr_info(&la->soa, las, sockname, sizeof(sockname)):"NULL"); |
| |
| if (pa != NULL && la != NULL && xiocheckpeer(sfd, pa, la) < 0) { |
| if (Shutdown(ps, 2) < 0) { |
| Info2("shutdown(%d, 2): %s", ps, strerror(errno)); |
| } |
| Close(ps); |
| continue; |
| } |
| |
| if (pa != NULL) |
| Info1("permitting connection from %s", |
| sockaddr_info((struct sockaddr *)pa, pas, |
| infobuff, sizeof(infobuff))); |
| |
| if (dofork) { |
| pid_t pid; /* mostly int; only used with fork */ |
| sigset_t mask_sigchld; |
| |
| /* Block SIGCHLD until parent is ready to react */ |
| sigemptyset(&mask_sigchld); |
| sigaddset(&mask_sigchld, SIGCHLD); |
| Sigprocmask(SIG_BLOCK, &mask_sigchld, NULL); |
| |
| if ((pid = |
| xio_fork(false, level==E_ERROR?level:E_WARN, |
| sfd->shutup)) |
| < 0) { |
| Close(sfd->fd); |
| Sigprocmask(SIG_UNBLOCK, &mask_sigchld, NULL); |
| return STAT_RETRYLATER; |
| } |
| if (pid == 0) { /* child */ |
| pid_t cpid = Getpid(); |
| Sigprocmask(SIG_UNBLOCK, &mask_sigchld, NULL); |
| |
| Info1("just born: child process "F_pid, cpid); |
| xiosetenvulong("PID", cpid, 1); |
| |
| if (Close(sfd->fd) < 0) { |
| Info2("close(%d): %s", sfd->fd, strerror(errno)); |
| } |
| sfd->fd = ps; |
| |
| #if WITH_RETRY |
| /* !? */ |
| sfd->forever = false; sfd->retry = 0; |
| level = E_ERROR; |
| #endif /* WITH_RETRY */ |
| |
| break; |
| } |
| |
| /* server: continue loop with listen */ |
| /* shutdown() closes the socket even for the child process, but |
| close() does what we want */ |
| if (Close(ps) < 0) { |
| Info2("close(%d): %s", ps, strerror(errno)); |
| } |
| |
| /* now we are ready to handle signals */ |
| Sigprocmask(SIG_UNBLOCK, &mask_sigchld, NULL); |
| |
| |
| while (maxchildren) { |
| if (num_child < maxchildren) break; |
| Notice("maxchildren are active, waiting"); |
| /* UINT_MAX would even be nicer, but Openindiana works only |
| with 31 bits */ |
| while (!Sleep(INT_MAX)) ; /* any signal lets us continue */ |
| } |
| Info("still listening"); |
| } else { |
| if (Close(sfd->fd) < 0) { |
| Info2("close(%d): %s", sfd->fd, strerror(errno)); |
| } |
| sfd->fd = ps; |
| break; |
| } |
| } |
| |
| applyopts(sfd, -1, opts, PH_FD); |
| applyopts(sfd, -1, opts, PH_PASTSOCKET); |
| applyopts(sfd, -1, opts, PH_CONNECTED); |
| if ((result = _xio_openlate(sfd, opts)) < 0) |
| return result; |
| |
| /* set the env vars describing the local and remote sockets */ |
| if (la != NULL) xiosetsockaddrenv("SOCK", la, las, proto); |
| if (pa != NULL) xiosetsockaddrenv("PEER", pa, pas, proto); |
| |
| return 0; |
| } |
| |
| #endif /* WITH_LISTEN */ |