NetBSD/libexec/httpd/daemon-bozo.c

266 lines
6.6 KiB
C
Raw Normal View History

2010-05-10 07:37:45 +04:00
/* $NetBSD: daemon-bozo.c,v 1.8 2010/05/10 03:37:45 mrg Exp $ */
2007-10-17 22:47:59 +04:00
2010-05-10 07:37:45 +04:00
/* $eterna: daemon-bozo.c,v 1.19 2010/05/10 02:51:28 mrg Exp $ */
/*
2010-05-10 07:37:45 +04:00
* Copyright (c) 1997-2010 Matthew R. Green
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer and
* dedication in the documentation and/or other materials provided
* with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
*/
/* this code implements daemon mode for bozohttpd */
#ifndef NO_DAEMON_MODE
#include <sys/param.h>
#include <sys/socket.h>
#include <sys/wait.h>
#include <netinet/in.h>
#include <errno.h>
#include <netdb.h>
#include <poll.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include "bozohttpd.h"
static void sigchild(int); /* SIGCHLD handler */
2009-05-23 06:26:03 +04:00
#ifndef POLLRDNORM
#define POLLRDNORM 0
#endif
#ifndef POLLRDBAND
#define POLLRDBAND 0
#endif
#ifndef INFTIM
#define INFTIM -1
#endif
/* ARGSUSED */
static void
2010-05-10 07:37:45 +04:00
sigchild(int signo)
{
2010-05-10 07:37:45 +04:00
while (waitpid(-1, NULL, WNOHANG) > 0) {
}
}
void
2010-05-10 07:37:45 +04:00
bozo_daemon_init(bozohttpd_t *httpd)
{
struct addrinfo h, *r, *r0;
2010-05-10 07:37:45 +04:00
const char *portnum;
int e, i, on = 1;
2010-05-10 07:37:45 +04:00
if (!httpd->background)
return;
2010-05-10 07:37:45 +04:00
if (httpd->foreground == 0)
daemon(1, 0);
2010-05-10 07:37:45 +04:00
portnum = (httpd->bindport) ? httpd->bindport : "http";
bozo_warn(httpd, "started in daemon mode as `%s' port `%s' root `%s'",
httpd->virthostname, portnum, httpd->slashdir);
2010-05-10 07:37:45 +04:00
memset(&h, 0, sizeof(h));
h.ai_family = PF_UNSPEC;
h.ai_socktype = SOCK_STREAM;
h.ai_flags = AI_PASSIVE;
2010-05-10 07:37:45 +04:00
e = getaddrinfo(httpd->bindaddress, portnum, &h, &r0);
if (e)
2010-05-10 07:37:45 +04:00
bozo_err(httpd, 1, "getaddrinfo([%s]:%s): %s",
httpd->bindaddress ? httpd->bindaddress : "*",
portnum, gai_strerror(e));
for (r = r0; r != NULL; r = r->ai_next)
2010-05-10 07:37:45 +04:00
httpd->nsock++;
httpd->sock = bozomalloc(httpd, httpd->nsock * sizeof(*httpd->sock));
httpd->fds = bozomalloc(httpd, httpd->nsock * sizeof(*httpd->fds));
for (i = 0, r = r0; r != NULL; r = r->ai_next) {
2010-05-10 07:37:45 +04:00
httpd->sock[i] = socket(r->ai_family, SOCK_STREAM, 0);
if (httpd->sock[i] == -1)
continue;
2010-05-10 07:37:45 +04:00
if (setsockopt(httpd->sock[i], SOL_SOCKET, SO_REUSEADDR, &on,
sizeof(on)) == -1)
2010-05-10 07:37:45 +04:00
bozo_warn(httpd, "setsockopt SO_REUSEADDR: %s",
strerror(errno));
2010-05-10 07:37:45 +04:00
if (bind(httpd->sock[i], r->ai_addr, r->ai_addrlen) == -1)
continue;
2010-05-10 07:37:45 +04:00
if (listen(httpd->sock[i], SOMAXCONN) == -1)
continue;
2010-05-10 07:37:45 +04:00
httpd->fds[i].events = POLLIN | POLLPRI | POLLRDNORM |
2009-05-23 06:26:03 +04:00
POLLRDBAND | POLLERR;
2010-05-10 07:37:45 +04:00
httpd->fds[i].fd = httpd->sock[i];
i++;
}
if (i == 0)
2010-05-10 07:37:45 +04:00
bozo_err(httpd, 1, "could not find any addresses to bind");
httpd->nsock = i;
freeaddrinfo(r0);
signal(SIGCHLD, sigchild);
}
2009-05-23 06:26:03 +04:00
void
2010-05-10 07:37:45 +04:00
bozo_daemon_closefds(bozohttpd_t *httpd)
2009-05-23 06:26:03 +04:00
{
int i;
2010-05-10 07:37:45 +04:00
for (i = 0; i < httpd->nsock; i++)
close(httpd->sock[i]);
2009-05-23 06:26:03 +04:00
}
static void
2010-05-10 07:37:45 +04:00
daemon_runchild(bozohttpd_t *httpd, int fd)
2009-05-23 06:26:03 +04:00
{
2010-05-10 07:37:45 +04:00
httpd->request_times++;
2009-05-23 06:26:03 +04:00
/* setup stdin/stdout/stderr */
dup2(fd, 0);
dup2(fd, 1);
/*dup2(fd, 2);*/
close(fd);
}
/*
* the parent never returns from this function, only children that
2009-04-18 11:28:24 +04:00
* are ready to run... XXXMRG - still true in fork-lesser bozo?
*/
void
2010-05-10 07:37:45 +04:00
bozo_daemon_fork(bozohttpd_t *httpd)
{
2009-05-23 06:26:03 +04:00
int i;
2010-05-10 07:37:45 +04:00
debug((httpd, DEBUG_FAT, "%s: pid %u request_times %d",
__func__, getpid(),
httpd->request_times));
2009-05-23 06:26:03 +04:00
/* if we've handled 5 files, exit and let someone else work */
2010-05-10 07:37:45 +04:00
if (httpd->request_times > 5 ||
(httpd->background == 2 && httpd->request_times > 0))
2009-05-23 06:26:03 +04:00
exit(0);
2010-05-10 07:37:45 +04:00
while (httpd->background) {
struct sockaddr_storage ss;
socklen_t slen;
int fd;
2010-05-10 07:37:45 +04:00
if (httpd->nsock == 0)
exit(0);
/*
* wait for a connection, then fork() and return NULL in
* the parent, who will come back here waiting for another
* connection. read the request in in the child, and return
* it, for processing.
*/
again:
2010-05-10 07:37:45 +04:00
if (poll(httpd->fds, (unsigned)httpd->nsock, INFTIM) == -1) {
/* fail on programmer errors */
if (errno == EFAULT ||
errno == EINVAL)
2010-05-10 07:37:45 +04:00
bozo_err(httpd, 1, "poll: %s",
strerror(errno));
/* sleep on some temporary kernel failures */
if (errno == ENOMEM ||
errno == EAGAIN)
sleep(1);
goto again;
}
2010-05-10 07:37:45 +04:00
for (i = 0; i < httpd->nsock; i++) {
if (httpd->fds[i].revents & (POLLNVAL|POLLERR|POLLHUP)) {
bozo_warn(httpd,
"poll on fd %d pid %d revents %d: %s",
httpd->fds[i].fd, getpid(),
httpd->fds[i].revents,
strerror(errno));
bozo_warn(httpd, "nsock = %d", httpd->nsock);
close(httpd->sock[i]);
httpd->nsock--;
bozo_warn(httpd, "nsock now = %d", httpd->nsock);
/* no sockets left */
2010-05-10 07:37:45 +04:00
if (httpd->nsock == 0)
exit(0);
/* last socket; easy case */
2010-05-10 07:37:45 +04:00
if (httpd->nsock == i)
break;
2010-05-10 07:37:45 +04:00
memmove(&httpd->fds[i], &httpd->fds[i+i],
(httpd->nsock - i) *
sizeof(*httpd->fds));
memmove(&httpd->sock[i], &httpd->sock[i+i],
(httpd->nsock - i) *
sizeof(*httpd->sock));
break;
}
2010-05-10 07:37:45 +04:00
if (httpd->fds[i].revents == 0)
continue;
slen = sizeof(ss);
2010-05-10 07:37:45 +04:00
fd = accept(httpd->fds[i].fd,
(struct sockaddr *)(void *)&ss, &slen);
if (fd == -1) {
if (errno == EFAULT ||
errno == EINVAL)
2010-05-10 07:37:45 +04:00
bozo_err(httpd, 1, "accept: %s",
strerror(errno));
if (errno == ENOMEM ||
errno == EAGAIN)
sleep(1);
continue;
}
2009-05-23 06:26:03 +04:00
2010-05-10 07:37:45 +04:00
if (httpd->request_times > 0) {
daemon_runchild(httpd, fd);
2009-05-23 06:26:03 +04:00
return;
}
switch (fork()) {
case -1: /* eep, failure */
2010-05-10 07:37:45 +04:00
bozo_warn(httpd, "fork() failed, sleeping for "
2009-05-23 06:26:03 +04:00
"10 seconds: %s", strerror(errno));
close(fd);
sleep(10);
2009-05-23 06:26:03 +04:00
break;
case 0: /* child */
2010-05-10 07:37:45 +04:00
daemon_runchild(httpd, fd);
return;
default: /* parent */
close(fd);
2009-05-23 06:26:03 +04:00
break;
}
}
}
}
#endif /* NO_DAEMON_MODE */