2013-04-17 22:34:27 +02:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2013 Joris Vink <joris@coders.se>
|
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/queue.h>
|
|
|
|
#include <sys/epoll.h>
|
2013-06-04 16:58:13 +02:00
|
|
|
#include <sys/prctl.h>
|
2013-06-04 11:55:38 +02:00
|
|
|
#include <sys/wait.h>
|
2013-04-17 22:34:27 +02:00
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
2013-04-21 20:21:46 +02:00
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
|
2013-05-04 22:18:27 +02:00
|
|
|
#include <pwd.h>
|
2013-04-17 22:34:27 +02:00
|
|
|
#include <errno.h>
|
2013-05-04 22:18:27 +02:00
|
|
|
#include <grp.h>
|
2013-04-17 22:34:27 +02:00
|
|
|
#include <fcntl.h>
|
2013-05-03 00:04:06 +02:00
|
|
|
#include <signal.h>
|
2013-04-17 22:34:27 +02:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2013-06-04 13:54:16 +02:00
|
|
|
#include <sched.h>
|
2013-06-04 23:24:47 +02:00
|
|
|
#include <syslog.h>
|
2013-04-17 22:34:27 +02:00
|
|
|
#include <unistd.h>
|
2013-05-01 20:10:45 +02:00
|
|
|
#include <time.h>
|
2013-05-29 14:29:46 +02:00
|
|
|
#include <regex.h>
|
2013-05-01 12:23:21 +02:00
|
|
|
#include <zlib.h>
|
2013-05-04 22:18:27 +02:00
|
|
|
#include <unistd.h>
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-04-28 19:11:44 +02:00
|
|
|
#include "spdy.h"
|
2013-04-17 22:34:27 +02:00
|
|
|
#include "kore.h"
|
2013-05-01 08:09:04 +02:00
|
|
|
#include "http.h"
|
2013-04-17 22:34:27 +02:00
|
|
|
|
|
|
|
#define EPOLL_EVENTS 500
|
|
|
|
|
|
|
|
static int efd = -1;
|
2013-04-21 20:21:46 +02:00
|
|
|
static SSL_CTX *ssl_ctx = NULL;
|
2013-05-02 09:10:35 +02:00
|
|
|
|
2013-05-03 00:04:06 +02:00
|
|
|
volatile sig_atomic_t sig_recv;
|
2013-06-04 11:55:38 +02:00
|
|
|
static struct listener server;
|
2013-05-02 09:10:35 +02:00
|
|
|
static TAILQ_HEAD(, connection) disconnected;
|
2013-06-04 11:55:38 +02:00
|
|
|
static TAILQ_HEAD(, connection) worker_clients;
|
2013-05-30 19:36:42 +02:00
|
|
|
static TAILQ_HEAD(, kore_worker) kore_workers;
|
2013-06-04 11:55:38 +02:00
|
|
|
static struct passwd *pw = NULL;
|
|
|
|
static u_int16_t workerid = 0;
|
2013-06-04 13:43:11 +02:00
|
|
|
static u_int16_t cpu_count = 1;
|
2013-05-02 09:10:35 +02:00
|
|
|
|
2013-06-04 16:53:30 +02:00
|
|
|
pid_t mypid = -1;
|
2013-06-05 08:55:07 +02:00
|
|
|
int kore_debug = 0;
|
2013-05-30 19:36:42 +02:00
|
|
|
int server_port = 0;
|
2013-06-04 16:53:30 +02:00
|
|
|
u_int8_t worker_count = 0;
|
2013-05-30 19:36:42 +02:00
|
|
|
char *server_ip = NULL;
|
|
|
|
char *chroot_path = NULL;
|
|
|
|
char *runas_user = NULL;
|
2013-06-04 16:53:30 +02:00
|
|
|
char *kore_pidfile = KORE_PIDFILE_DEFAULT;
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-06-05 08:55:07 +02:00
|
|
|
static void usage(void);
|
2013-05-03 00:04:06 +02:00
|
|
|
static void kore_signal(int);
|
2013-06-04 11:55:38 +02:00
|
|
|
static void kore_worker_wait(int);
|
2013-05-30 19:36:42 +02:00
|
|
|
static void kore_worker_init(void);
|
2013-06-04 16:53:30 +02:00
|
|
|
static void kore_write_mypid(void);
|
2013-04-21 20:35:47 +02:00
|
|
|
static int kore_socket_nonblock(int);
|
2013-04-21 20:21:46 +02:00
|
|
|
static int kore_server_sslstart(void);
|
2013-04-21 20:35:47 +02:00
|
|
|
static void kore_event(int, int, void *);
|
2013-06-04 13:54:16 +02:00
|
|
|
static void kore_worker_spawn(u_int16_t);
|
2013-04-17 22:34:27 +02:00
|
|
|
static int kore_server_accept(struct listener *);
|
2013-06-04 11:55:38 +02:00
|
|
|
static void kore_worker_entry(struct kore_worker *);
|
2013-06-04 13:54:16 +02:00
|
|
|
static void kore_worker_setcpu(struct kore_worker *);
|
2013-04-17 22:34:27 +02:00
|
|
|
static int kore_connection_handle(struct connection *, int);
|
2013-05-02 09:10:35 +02:00
|
|
|
static void kore_server_final_disconnect(struct connection *);
|
2013-04-21 20:35:47 +02:00
|
|
|
static int kore_server_bind(struct listener *, const char *, int);
|
|
|
|
static int kore_ssl_npn_cb(SSL *, const u_char **, unsigned int *, void *);
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-06-05 08:55:07 +02:00
|
|
|
static void
|
|
|
|
usage(void)
|
|
|
|
{
|
|
|
|
fprintf(stderr, "Usage: kore [-c config] [-d]\n");
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
int
|
|
|
|
main(int argc, char *argv[])
|
|
|
|
{
|
2013-06-05 08:55:07 +02:00
|
|
|
int ch;
|
2013-06-04 11:55:38 +02:00
|
|
|
struct kore_worker *kw, *next;
|
2013-06-05 08:55:07 +02:00
|
|
|
char *config_file;
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-06-04 23:24:47 +02:00
|
|
|
kore_log_init();
|
2013-06-04 11:55:38 +02:00
|
|
|
mypid = getpid();
|
2013-06-04 16:53:30 +02:00
|
|
|
|
|
|
|
if (getuid() != 0)
|
|
|
|
fatal("kore must be started as root");
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-06-05 08:55:07 +02:00
|
|
|
kore_debug = 0;
|
|
|
|
config_file = NULL;
|
|
|
|
while ((ch = getopt(argc, argv, "c:d")) != -1) {
|
|
|
|
switch (ch) {
|
|
|
|
case 'c':
|
|
|
|
config_file = optarg;
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
kore_debug = 1;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
usage();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
argc -= optind;
|
|
|
|
argv += optind;
|
|
|
|
|
|
|
|
if (config_file == NULL)
|
|
|
|
fatal("please specify a configuration file to use (-c)");
|
|
|
|
|
|
|
|
kore_parse_config(config_file);
|
2013-05-01 16:03:48 +02:00
|
|
|
if (!kore_module_loaded())
|
|
|
|
fatal("no site module was loaded");
|
|
|
|
|
|
|
|
if (server_ip == NULL || server_port == 0)
|
|
|
|
fatal("missing a correct bind directive in configuration");
|
2013-05-04 22:18:27 +02:00
|
|
|
if (chroot_path == NULL)
|
|
|
|
fatal("missing a chroot path");
|
|
|
|
if (runas_user == NULL)
|
|
|
|
fatal("missing a username to run as");
|
|
|
|
if ((pw = getpwnam(runas_user)) == NULL)
|
2013-06-05 08:55:07 +02:00
|
|
|
fatal("user '%s' does not exist", runas_user);
|
2013-06-04 13:43:11 +02:00
|
|
|
if ((cpu_count = sysconf(_SC_NPROCESSORS_ONLN)) == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("could not get number of cpu's falling back to 1");
|
2013-06-04 13:43:11 +02:00
|
|
|
cpu_count = 1;
|
|
|
|
}
|
2013-05-04 22:18:27 +02:00
|
|
|
|
2013-06-05 09:32:53 +02:00
|
|
|
if (!kore_server_sslstart())
|
|
|
|
fatal("cannot initiate SSL");
|
2013-05-01 16:03:48 +02:00
|
|
|
if (!kore_server_bind(&server, server_ip, server_port))
|
|
|
|
fatal("cannot bind to %s:%d", server_ip, server_port);
|
2013-06-04 11:55:38 +02:00
|
|
|
if (daemon(1, 1) == -1)
|
|
|
|
fatal("cannot daemon(): %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
mypid = getpid();
|
2013-06-04 16:53:30 +02:00
|
|
|
kore_write_mypid();
|
2013-05-04 22:18:27 +02:00
|
|
|
|
2013-06-04 23:24:47 +02:00
|
|
|
kore_log(LOG_NOTICE, "kore is starting up");
|
2013-05-30 19:36:42 +02:00
|
|
|
kore_worker_init();
|
2013-06-04 23:24:47 +02:00
|
|
|
|
2013-06-04 17:04:28 +02:00
|
|
|
if (prctl(PR_SET_NAME, "kore [main]"))
|
2013-06-04 17:01:06 +02:00
|
|
|
kore_debug("cannot set process title");
|
2013-05-01 08:09:04 +02:00
|
|
|
|
2013-05-03 00:04:06 +02:00
|
|
|
sig_recv = 0;
|
2013-06-04 13:43:11 +02:00
|
|
|
signal(SIGQUIT, kore_signal);
|
2013-05-03 00:04:06 +02:00
|
|
|
signal(SIGHUP, kore_signal);
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
for (;;) {
|
2013-06-04 11:55:38 +02:00
|
|
|
if (sig_recv != 0) {
|
|
|
|
if (sig_recv == SIGHUP) {
|
|
|
|
TAILQ_FOREACH(kw, &kore_workers, list) {
|
|
|
|
if (kill(kw->pid, SIGHUP) == -1) {
|
2013-06-04 16:33:35 +02:00
|
|
|
kore_debug("kill(%d, HUP): %s",
|
2013-06-04 11:55:38 +02:00
|
|
|
kw->pid, errno_s);
|
|
|
|
}
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
2013-06-04 13:43:11 +02:00
|
|
|
} else if (sig_recv == SIGQUIT) {
|
2013-06-04 11:55:38 +02:00
|
|
|
break;
|
2013-05-30 20:38:25 +02:00
|
|
|
}
|
2013-06-04 11:55:38 +02:00
|
|
|
sig_recv = 0;
|
2013-05-30 20:38:25 +02:00
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
kore_worker_wait(0);
|
|
|
|
sleep(1);
|
|
|
|
}
|
2013-05-02 09:10:35 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
for (kw = TAILQ_FIRST(&kore_workers); kw != NULL; kw = next) {
|
|
|
|
next = TAILQ_NEXT(kw, list);
|
|
|
|
if (kill(kw->pid, SIGINT) == -1)
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kill(%d, SIGINT): %s", kw->pid, errno_s);
|
2013-06-04 11:55:38 +02:00
|
|
|
}
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 23:24:47 +02:00
|
|
|
kore_log(LOG_NOTICE, "waiting for workers to drain and finish");
|
2013-06-04 16:17:42 +02:00
|
|
|
while (!TAILQ_EMPTY(&kore_workers))
|
2013-06-04 11:55:38 +02:00
|
|
|
kore_worker_wait(1);
|
2013-04-17 22:34:27 +02:00
|
|
|
|
2013-06-04 23:24:47 +02:00
|
|
|
kore_log(LOG_NOTICE, "server shutting down");
|
2013-06-04 16:53:30 +02:00
|
|
|
unlink(kore_pidfile);
|
2013-04-17 22:34:27 +02:00
|
|
|
close(server.fd);
|
2013-06-04 11:55:38 +02:00
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2013-05-02 09:10:35 +02:00
|
|
|
void
|
|
|
|
kore_server_disconnect(struct connection *c)
|
|
|
|
{
|
|
|
|
if (c->state != CONN_STATE_DISCONNECTING) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("preparing %p for disconnection", c);
|
2013-05-02 09:10:35 +02:00
|
|
|
c->state = CONN_STATE_DISCONNECTING;
|
2013-06-04 11:55:38 +02:00
|
|
|
TAILQ_REMOVE(&worker_clients, c, list);
|
2013-05-02 09:10:35 +02:00
|
|
|
TAILQ_INSERT_TAIL(&disconnected, c, list);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-04-21 20:21:46 +02:00
|
|
|
static int
|
|
|
|
kore_server_sslstart(void)
|
|
|
|
{
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_server_sslstart()");
|
2013-04-28 19:11:44 +02:00
|
|
|
|
2013-04-21 20:21:46 +02:00
|
|
|
SSL_library_init();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
ssl_ctx = SSL_CTX_new(SSLv23_server_method());
|
|
|
|
if (ssl_ctx == NULL) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("SSL_ctx_new(): %s", ssl_errno_s);
|
2013-04-21 20:21:46 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
2013-05-29 12:27:30 +02:00
|
|
|
if (!SSL_CTX_use_certificate_chain_file(ssl_ctx, "cert/server.crt")) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("SSL_CTX_use_certificate_file(): %s", ssl_errno_s);
|
2013-04-21 20:21:46 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!SSL_CTX_use_PrivateKey_file(ssl_ctx, "cert/server.key",
|
|
|
|
SSL_FILETYPE_PEM)) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("SSL_CTX_use_PrivateKey_file(): %s", ssl_errno_s);
|
2013-04-21 20:21:46 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_CTX_set_mode(ssl_ctx, SSL_MODE_AUTO_RETRY);
|
|
|
|
SSL_CTX_set_mode(ssl_ctx, SSL_MODE_ENABLE_PARTIAL_WRITE);
|
|
|
|
SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_SSLv2);
|
|
|
|
SSL_CTX_set_next_protos_advertised_cb(ssl_ctx, kore_ssl_npn_cb, NULL);
|
|
|
|
|
|
|
|
return (KORE_RESULT_OK);
|
|
|
|
}
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
static int
|
|
|
|
kore_server_bind(struct listener *l, const char *ip, int port)
|
|
|
|
{
|
2013-06-04 11:55:38 +02:00
|
|
|
int on;
|
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_server_bind(%p, %s, %d)", l, ip, port);
|
2013-04-28 19:11:44 +02:00
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
if ((l->fd = socket(AF_INET, SOCK_STREAM, 0)) == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("socket(): %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!kore_socket_nonblock(l->fd)) {
|
|
|
|
close(l->fd);
|
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
on = 1;
|
|
|
|
if (setsockopt(l->fd, SOL_SOCKET, SO_REUSEADDR, (const char *)&on,
|
|
|
|
sizeof(on)) == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("setsockopt(): %s", errno_s);
|
2013-06-04 11:55:38 +02:00
|
|
|
close(l->fd);
|
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
memset(&(l->sin), 0, sizeof(l->sin));
|
|
|
|
l->sin.sin_family = AF_INET;
|
|
|
|
l->sin.sin_port = htons(port);
|
|
|
|
l->sin.sin_addr.s_addr = inet_addr(ip);
|
|
|
|
|
|
|
|
if (bind(l->fd, (struct sockaddr *)&(l->sin), sizeof(l->sin)) == -1) {
|
|
|
|
close(l->fd);
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("bind(): %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (listen(l->fd, 50) == -1) {
|
|
|
|
close(l->fd);
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("listen(): %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (KORE_RESULT_OK);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
kore_server_accept(struct listener *l)
|
|
|
|
{
|
|
|
|
socklen_t len;
|
|
|
|
struct connection *c;
|
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_server_accept(%p)", l);
|
2013-04-28 19:11:44 +02:00
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
len = sizeof(struct sockaddr_in);
|
|
|
|
c = (struct connection *)kore_malloc(sizeof(*c));
|
|
|
|
if ((c->fd = accept(l->fd, (struct sockaddr *)&(c->sin), &len)) == -1) {
|
|
|
|
free(c);
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("accept(): %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!kore_socket_nonblock(c->fd)) {
|
|
|
|
close(c->fd);
|
|
|
|
free(c);
|
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
c->owner = l;
|
2013-04-21 20:21:46 +02:00
|
|
|
c->ssl = NULL;
|
2013-05-01 13:43:47 +02:00
|
|
|
c->flags = 0;
|
|
|
|
c->inflate_started = 0;
|
|
|
|
c->deflate_started = 0;
|
|
|
|
c->client_stream_id = 0;
|
2013-04-21 20:35:47 +02:00
|
|
|
c->proto = CONN_PROTO_UNKNOWN;
|
2013-04-21 20:21:46 +02:00
|
|
|
c->state = CONN_STATE_SSL_SHAKE;
|
2013-04-21 20:35:47 +02:00
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
TAILQ_INIT(&(c->send_queue));
|
|
|
|
TAILQ_INIT(&(c->recv_queue));
|
2013-04-29 23:35:36 +02:00
|
|
|
TAILQ_INIT(&(c->spdy_streams));;
|
2013-06-04 11:55:38 +02:00
|
|
|
TAILQ_INSERT_TAIL(&worker_clients, c, list);
|
|
|
|
|
2013-05-01 13:43:47 +02:00
|
|
|
kore_event(c->fd, EPOLLIN | EPOLLOUT | EPOLLET, c);
|
2013-04-17 22:34:27 +02:00
|
|
|
|
|
|
|
return (KORE_RESULT_OK);
|
|
|
|
}
|
|
|
|
|
2013-05-02 09:10:35 +02:00
|
|
|
static void
|
|
|
|
kore_server_final_disconnect(struct connection *c)
|
2013-04-28 19:11:44 +02:00
|
|
|
{
|
|
|
|
struct netbuf *nb, *next;
|
2013-05-01 13:43:47 +02:00
|
|
|
struct spdy_stream *s, *snext;
|
2013-04-28 19:11:44 +02:00
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_server_final_disconnect(%p)", c);
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-05-30 21:57:14 +02:00
|
|
|
if (c->ssl != NULL)
|
2013-04-28 19:11:44 +02:00
|
|
|
SSL_free(c->ssl);
|
|
|
|
|
2013-05-30 20:07:06 +02:00
|
|
|
TAILQ_REMOVE(&disconnected, c, list);
|
2013-05-30 19:36:42 +02:00
|
|
|
close(c->fd);
|
2013-05-04 20:44:16 +02:00
|
|
|
if (c->inflate_started)
|
|
|
|
inflateEnd(&(c->z_inflate));
|
|
|
|
if (c->deflate_started)
|
|
|
|
deflateEnd(&(c->z_deflate));
|
|
|
|
|
2013-04-28 19:11:44 +02:00
|
|
|
for (nb = TAILQ_FIRST(&(c->send_queue)); nb != NULL; nb = next) {
|
|
|
|
next = TAILQ_NEXT(nb, list);
|
|
|
|
TAILQ_REMOVE(&(c->send_queue), nb, list);
|
|
|
|
free(nb->buf);
|
|
|
|
free(nb);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (nb = TAILQ_FIRST(&(c->recv_queue)); nb != NULL; nb = next) {
|
|
|
|
next = TAILQ_NEXT(nb, list);
|
|
|
|
TAILQ_REMOVE(&(c->recv_queue), nb, list);
|
|
|
|
free(nb->buf);
|
|
|
|
free(nb);
|
|
|
|
}
|
|
|
|
|
2013-05-01 13:43:47 +02:00
|
|
|
for (s = TAILQ_FIRST(&(c->spdy_streams)); s != NULL; s = snext) {
|
|
|
|
snext = TAILQ_NEXT(s, list);
|
|
|
|
TAILQ_REMOVE(&(c->spdy_streams), s, list);
|
|
|
|
|
|
|
|
if (s->hblock != NULL) {
|
|
|
|
if (s->hblock->header_block != NULL)
|
|
|
|
free(s->hblock->header_block);
|
|
|
|
free(s->hblock);
|
|
|
|
}
|
|
|
|
|
|
|
|
free(s);
|
|
|
|
}
|
|
|
|
|
2013-04-28 19:11:44 +02:00
|
|
|
free(c);
|
|
|
|
}
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
static int
|
|
|
|
kore_connection_handle(struct connection *c, int flags)
|
|
|
|
{
|
2013-04-21 20:35:47 +02:00
|
|
|
int r;
|
|
|
|
u_int32_t len;
|
|
|
|
const u_char *data;
|
2013-04-21 20:21:46 +02:00
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_connection_handle(%p, %d)", c, flags);
|
2013-04-28 19:11:44 +02:00
|
|
|
|
2013-05-01 13:43:47 +02:00
|
|
|
if (flags & EPOLLIN)
|
|
|
|
c->flags |= CONN_READ_POSSIBLE;
|
|
|
|
if (flags & EPOLLOUT)
|
|
|
|
c->flags |= CONN_WRITE_POSSIBLE;
|
|
|
|
|
2013-04-21 20:21:46 +02:00
|
|
|
switch (c->state) {
|
|
|
|
case CONN_STATE_SSL_SHAKE:
|
|
|
|
if (c->ssl == NULL) {
|
|
|
|
c->ssl = SSL_new(ssl_ctx);
|
|
|
|
if (c->ssl == NULL) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("SSL_new(): %s", ssl_errno_s);
|
2013-04-21 20:21:46 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_set_fd(c->ssl, c->fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = SSL_accept(c->ssl);
|
|
|
|
if (r <= 0) {
|
|
|
|
r = SSL_get_error(c->ssl, r);
|
|
|
|
switch (r) {
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
return (KORE_RESULT_OK);
|
|
|
|
default:
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("SSL_accept(): %s", ssl_errno_s);
|
2013-04-21 20:21:46 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
r = SSL_get_verify_result(c->ssl);
|
|
|
|
if (r != X509_V_OK) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("SSL_get_verify_result(): %s", ssl_errno_s);
|
2013-04-21 20:21:46 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
2013-04-21 20:35:47 +02:00
|
|
|
SSL_get0_next_proto_negotiated(c->ssl, &data, &len);
|
|
|
|
if (data) {
|
|
|
|
if (!memcmp(data, "spdy/3", 6))
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("using SPDY/3");
|
2013-04-21 20:35:47 +02:00
|
|
|
c->proto = CONN_PROTO_SPDY;
|
2013-05-02 14:47:02 +02:00
|
|
|
net_recv_queue(c, SPDY_FRAME_SIZE, 0,
|
|
|
|
NULL, spdy_frame_recv);
|
2013-04-21 20:35:47 +02:00
|
|
|
} else {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("using HTTP/1.1");
|
2013-04-21 20:35:47 +02:00
|
|
|
c->proto = CONN_PROTO_HTTP;
|
2013-05-02 14:47:02 +02:00
|
|
|
net_recv_queue(c, HTTP_HEADER_MAX_LEN,
|
2013-05-02 03:51:04 +02:00
|
|
|
NETBUF_CALL_CB_ALWAYS, NULL,
|
2013-05-02 14:47:02 +02:00
|
|
|
http_header_recv);
|
2013-04-21 20:35:47 +02:00
|
|
|
}
|
|
|
|
|
2013-04-21 20:21:46 +02:00
|
|
|
c->state = CONN_STATE_ESTABLISHED;
|
2013-05-01 13:43:47 +02:00
|
|
|
/* FALLTHROUGH */
|
2013-04-21 20:21:46 +02:00
|
|
|
case CONN_STATE_ESTABLISHED:
|
2013-05-01 13:43:47 +02:00
|
|
|
if (c->flags & CONN_READ_POSSIBLE) {
|
|
|
|
if (!net_recv_flush(c))
|
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (c->flags & CONN_WRITE_POSSIBLE) {
|
|
|
|
if (!net_send_flush(c))
|
2013-04-28 19:11:44 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
2013-04-21 20:21:46 +02:00
|
|
|
break;
|
2013-05-30 19:36:42 +02:00
|
|
|
case CONN_STATE_DISCONNECTING:
|
|
|
|
break;
|
2013-04-21 20:21:46 +02:00
|
|
|
default:
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("unknown state on %d (%d)", c->fd, c->state);
|
2013-04-21 20:21:46 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_OK);
|
|
|
|
}
|
|
|
|
|
2013-05-30 19:36:42 +02:00
|
|
|
static void
|
|
|
|
kore_worker_init(void)
|
|
|
|
{
|
2013-06-04 13:54:16 +02:00
|
|
|
u_int16_t i, cpu;
|
2013-06-04 11:55:38 +02:00
|
|
|
|
|
|
|
if (worker_count == 0)
|
|
|
|
fatal("no workers specified");
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_worker_init(): system has %d cpu's", cpu_count);
|
|
|
|
kore_debug("kore_worker_init(): starting %d workers", worker_count);
|
2013-06-04 13:43:11 +02:00
|
|
|
if (worker_count > cpu_count)
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_worker_init(): more workers then cpu's");
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 13:54:16 +02:00
|
|
|
cpu = 0;
|
2013-05-30 19:36:42 +02:00
|
|
|
TAILQ_INIT(&kore_workers);
|
2013-06-04 13:54:16 +02:00
|
|
|
for (i = 0; i < worker_count; i++) {
|
|
|
|
kore_worker_spawn(cpu++);
|
|
|
|
if (cpu == cpu_count)
|
|
|
|
cpu = 0;
|
|
|
|
}
|
2013-06-04 11:55:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2013-06-04 13:54:16 +02:00
|
|
|
kore_worker_spawn(u_int16_t cpu)
|
2013-06-04 11:55:38 +02:00
|
|
|
{
|
|
|
|
struct kore_worker *kw;
|
|
|
|
|
|
|
|
kw = (struct kore_worker *)kore_malloc(sizeof(*kw));
|
|
|
|
kw->id = workerid++;
|
2013-06-04 13:54:16 +02:00
|
|
|
kw->cpu = cpu;
|
2013-06-04 11:55:38 +02:00
|
|
|
kw->pid = fork();
|
|
|
|
if (kw->pid == -1)
|
|
|
|
fatal("could not spawn worker child: %s", errno_s);
|
|
|
|
|
|
|
|
if (kw->pid == 0) {
|
|
|
|
kw->pid = getpid();
|
|
|
|
kore_worker_entry(kw);
|
|
|
|
/* NOTREACHED */
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
TAILQ_INSERT_TAIL(&kore_workers, kw, list);
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
static void
|
|
|
|
kore_worker_wait(int final)
|
2013-05-30 19:36:42 +02:00
|
|
|
{
|
2013-06-04 11:55:38 +02:00
|
|
|
int r;
|
|
|
|
siginfo_t info;
|
2013-06-05 08:45:51 +02:00
|
|
|
struct kore_worker k, *kw, *next;
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
memset(&info, 0, sizeof(info));
|
2013-06-04 13:43:11 +02:00
|
|
|
if (final)
|
|
|
|
r = waitid(P_ALL, 0, &info, WEXITED);
|
|
|
|
else
|
|
|
|
r = waitid(P_ALL, 0, &info, WEXITED | WNOHANG);
|
2013-06-04 11:55:38 +02:00
|
|
|
if (r == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("waitid(): %s", errno_s);
|
2013-06-04 11:55:38 +02:00
|
|
|
return;
|
|
|
|
}
|
2013-05-31 14:24:00 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
if (info.si_pid == 0)
|
|
|
|
return;
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
for (kw = TAILQ_FIRST(&kore_workers); kw != NULL; kw = next) {
|
|
|
|
next = TAILQ_NEXT(kw, list);
|
|
|
|
if (kw->pid != info.si_pid)
|
|
|
|
continue;
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-05 08:45:51 +02:00
|
|
|
k = *kw;
|
2013-06-04 11:55:38 +02:00
|
|
|
TAILQ_REMOVE(&kore_workers, kw, list);
|
2013-06-05 08:45:51 +02:00
|
|
|
kore_log(LOG_NOTICE, "worker %d (%d)-> status %d (%d)",
|
2013-06-04 11:55:38 +02:00
|
|
|
kw->id, info.si_pid, info.si_status, info.si_code);
|
|
|
|
free(kw);
|
|
|
|
|
|
|
|
if (final)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (info.si_code == CLD_EXITED ||
|
|
|
|
info.si_code == CLD_KILLED ||
|
|
|
|
info.si_code == CLD_DUMPED) {
|
2013-06-05 08:45:51 +02:00
|
|
|
kore_log(LOG_NOTICE,
|
|
|
|
"worker %d (pid: %d) gone, respawning new one",
|
|
|
|
k.id, k.pid);
|
|
|
|
kore_worker_spawn(k.cpu);
|
2013-06-04 11:55:38 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-04 13:54:16 +02:00
|
|
|
static void
|
|
|
|
kore_worker_setcpu(struct kore_worker *kw)
|
|
|
|
{
|
|
|
|
cpu_set_t cpuset;
|
|
|
|
|
|
|
|
CPU_ZERO(&cpuset);
|
|
|
|
CPU_SET(kw->cpu, &cpuset);
|
|
|
|
if (sched_setaffinity(0, sizeof(cpu_set_t), &cpuset) == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_worker_setcpu(): %s", errno_s);
|
2013-06-04 13:54:16 +02:00
|
|
|
} else {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_worker_setcpu(): worker %d on cpu %d",
|
2013-06-04 13:54:16 +02:00
|
|
|
kw->id, kw->cpu);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
static void
|
|
|
|
kore_worker_entry(struct kore_worker *kw)
|
|
|
|
{
|
2013-06-04 16:58:13 +02:00
|
|
|
char buf[16];
|
2013-06-04 11:55:38 +02:00
|
|
|
struct epoll_event *events;
|
|
|
|
struct connection *c, *cnext;
|
|
|
|
struct kore_worker *k, *next;
|
2013-06-04 13:43:11 +02:00
|
|
|
int n, i, *fd, quit;
|
|
|
|
|
2013-06-04 17:04:28 +02:00
|
|
|
snprintf(buf, sizeof(buf), "kore [wrk %d]", kw->id);
|
2013-06-04 17:01:06 +02:00
|
|
|
if (prctl(PR_SET_NAME, buf) == -1)
|
|
|
|
kore_debug("cannot set process title");
|
2013-06-04 16:58:13 +02:00
|
|
|
|
2013-06-05 08:45:51 +02:00
|
|
|
if (chroot(chroot_path) == -1)
|
|
|
|
fatal("cannot chroot(): %s", errno_s);
|
|
|
|
if (chdir("/") == -1)
|
|
|
|
fatal("cannot chdir(): %s", errno_s);
|
2013-06-04 13:43:11 +02:00
|
|
|
if (setgroups(1, &pw->pw_gid) || setresgid(pw->pw_gid, pw->pw_gid,
|
|
|
|
pw->pw_gid) || setresuid(pw->pw_uid, pw->pw_uid, pw->pw_uid))
|
|
|
|
fatal("unable to drop privileges");
|
2013-06-04 11:55:38 +02:00
|
|
|
|
2013-06-04 13:54:16 +02:00
|
|
|
kore_worker_setcpu(kw);
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
for (k = TAILQ_FIRST(&kore_workers); k != NULL; k = next) {
|
|
|
|
next = TAILQ_NEXT(k, list);
|
|
|
|
TAILQ_REMOVE(&kore_workers, k, list);
|
|
|
|
free(k);
|
|
|
|
}
|
|
|
|
|
|
|
|
mypid = kw->pid;
|
|
|
|
if ((efd = epoll_create(1000)) == -1)
|
|
|
|
fatal("epoll_create(): %s", errno_s);
|
|
|
|
|
|
|
|
sig_recv = 0;
|
|
|
|
signal(SIGHUP, kore_signal);
|
2013-06-04 13:43:11 +02:00
|
|
|
signal(SIGQUIT, kore_signal);
|
2013-06-04 11:55:38 +02:00
|
|
|
|
|
|
|
http_init();
|
|
|
|
TAILQ_INIT(&disconnected);
|
|
|
|
TAILQ_INIT(&worker_clients);
|
|
|
|
|
2013-06-04 13:43:11 +02:00
|
|
|
quit = 0;
|
2013-06-04 11:55:38 +02:00
|
|
|
kore_event(server.fd, EPOLLIN, &server);
|
|
|
|
events = kore_calloc(EPOLL_EVENTS, sizeof(struct epoll_event));
|
2013-06-04 23:24:47 +02:00
|
|
|
|
|
|
|
kore_log(LOG_NOTICE, "worker %d going to work (CPU: %d)",
|
|
|
|
kw->id, kw->cpu);
|
2013-06-04 11:55:38 +02:00
|
|
|
for (;;) {
|
|
|
|
if (sig_recv != 0) {
|
|
|
|
if (sig_recv == SIGHUP)
|
|
|
|
kore_module_reload();
|
2013-06-04 13:43:11 +02:00
|
|
|
else if (sig_recv == SIGQUIT)
|
|
|
|
quit = 1;
|
2013-06-04 11:55:38 +02:00
|
|
|
sig_recv = 0;
|
|
|
|
}
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
n = epoll_wait(efd, events, EPOLL_EVENTS, 100);
|
|
|
|
if (n == -1) {
|
|
|
|
if (errno == EINTR)
|
2013-05-30 19:36:42 +02:00
|
|
|
continue;
|
2013-06-04 11:55:38 +02:00
|
|
|
fatal("epoll_wait(): %s", errno_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n > 0)
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("main(): %d sockets available", n);
|
2013-06-04 11:55:38 +02:00
|
|
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
fd = (int *)events[i].data.ptr;
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
if (events[i].events & EPOLLERR ||
|
|
|
|
events[i].events & EPOLLHUP) {
|
|
|
|
if (*fd == server.fd)
|
|
|
|
fatal("error on server socket");
|
|
|
|
|
|
|
|
c = (struct connection *)events[i].data.ptr;
|
|
|
|
kore_server_disconnect(c);
|
2013-05-31 00:06:54 +02:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
if (*fd == server.fd) {
|
2013-06-04 13:43:11 +02:00
|
|
|
if (!quit)
|
|
|
|
kore_server_accept(&server);
|
2013-06-04 11:55:38 +02:00
|
|
|
} else {
|
|
|
|
c = (struct connection *)events[i].data.ptr;
|
|
|
|
if (!kore_connection_handle(c,
|
|
|
|
events[i].events))
|
|
|
|
kore_server_disconnect(c);
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
2013-06-04 11:55:38 +02:00
|
|
|
}
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
http_process();
|
2013-05-30 19:36:42 +02:00
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
for (c = TAILQ_FIRST(&disconnected); c != NULL; c = cnext) {
|
|
|
|
cnext = TAILQ_NEXT(c, list);
|
|
|
|
kore_server_final_disconnect(c);
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
2013-06-04 13:43:11 +02:00
|
|
|
|
|
|
|
if (quit && http_request_count == 0)
|
|
|
|
break;
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
|
|
|
|
2013-06-04 11:55:38 +02:00
|
|
|
for (c = TAILQ_FIRST(&worker_clients); c != NULL; c = cnext) {
|
|
|
|
cnext = TAILQ_NEXT(c, list);
|
2013-06-04 13:43:11 +02:00
|
|
|
net_send_flush(c);
|
2013-06-04 11:55:38 +02:00
|
|
|
kore_server_final_disconnect(c);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (c = TAILQ_FIRST(&disconnected); c != NULL; c = cnext) {
|
|
|
|
cnext = TAILQ_NEXT(c, list);
|
2013-06-04 13:43:11 +02:00
|
|
|
net_send_flush(c);
|
2013-06-04 11:55:38 +02:00
|
|
|
kore_server_final_disconnect(c);
|
|
|
|
}
|
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("worker %d shutting down", kw->id);
|
2013-06-04 11:55:38 +02:00
|
|
|
exit(0);
|
2013-05-30 19:36:42 +02:00
|
|
|
}
|
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
static int
|
|
|
|
kore_socket_nonblock(int fd)
|
|
|
|
{
|
|
|
|
int flags;
|
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_socket_nonblock(%d)", fd);
|
2013-04-28 19:11:44 +02:00
|
|
|
|
2013-04-17 22:34:27 +02:00
|
|
|
if ((flags = fcntl(fd, F_GETFL, 0)) == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("fcntl(): F_GETFL %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
flags |= O_NONBLOCK;
|
|
|
|
if (fcntl(fd, F_SETFL, flags) == -1) {
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("fcntl(): F_SETFL %s", errno_s);
|
2013-04-17 22:34:27 +02:00
|
|
|
return (KORE_RESULT_ERROR);
|
|
|
|
}
|
|
|
|
|
|
|
|
return (KORE_RESULT_OK);
|
|
|
|
}
|
|
|
|
|
2013-04-21 20:21:46 +02:00
|
|
|
static int
|
2013-04-21 20:35:47 +02:00
|
|
|
kore_ssl_npn_cb(SSL *ssl, const u_char **data, unsigned int *len, void *arg)
|
2013-04-21 20:21:46 +02:00
|
|
|
{
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_ssl_npn_cb(): sending protocols");
|
2013-04-21 20:21:46 +02:00
|
|
|
|
|
|
|
*data = (const unsigned char *)KORE_SSL_PROTO_STRING;
|
|
|
|
*len = strlen(KORE_SSL_PROTO_STRING);
|
|
|
|
|
|
|
|
return (SSL_TLSEXT_ERR_OK);
|
|
|
|
}
|
2013-04-28 19:11:44 +02:00
|
|
|
|
|
|
|
static void
|
|
|
|
kore_event(int fd, int flags, void *udata)
|
|
|
|
{
|
|
|
|
struct epoll_event evt;
|
|
|
|
|
2013-06-04 16:30:53 +02:00
|
|
|
kore_debug("kore_event(%d, %d, %p)", fd, flags, udata);
|
2013-04-28 19:11:44 +02:00
|
|
|
|
|
|
|
evt.events = flags;
|
|
|
|
evt.data.ptr = udata;
|
|
|
|
if (epoll_ctl(efd, EPOLL_CTL_ADD, fd, &evt) == -1) {
|
|
|
|
if (errno == EEXIST) {
|
|
|
|
if (epoll_ctl(efd, EPOLL_CTL_MOD, fd, &evt) == -1)
|
|
|
|
fatal("epoll_ctl() MOD: %s", errno_s);
|
|
|
|
} else {
|
|
|
|
fatal("epoll_ctl() ADD: %s", errno_s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-05-03 00:04:06 +02:00
|
|
|
|
2013-06-04 16:53:30 +02:00
|
|
|
static void
|
|
|
|
kore_write_mypid(void)
|
|
|
|
{
|
|
|
|
FILE *fp;
|
|
|
|
|
|
|
|
if ((fp = fopen(kore_pidfile, "w+")) == NULL) {
|
|
|
|
kore_debug("kore_write_mypid(): fopen() %s", errno_s);
|
|
|
|
} else {
|
|
|
|
fprintf(fp, "%d\n", mypid);
|
|
|
|
fclose(fp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-03 00:04:06 +02:00
|
|
|
static void
|
|
|
|
kore_signal(int sig)
|
|
|
|
{
|
|
|
|
sig_recv = sig;
|
|
|
|
}
|