2008-01-28 21:37:16 +00:00
|
|
|
/* source: xioinitialize.c */
|
2016-07-22 06:54:31 +00:00
|
|
|
/* Copyright Gerhard Rieger and contributors (see file CHANGES) */
|
2008-01-27 12:00:08 +00:00
|
|
|
/* Published under the GNU General Public License V.2, see file COPYING */
|
|
|
|
|
|
|
|
/* this file contains the source for the initialize function */
|
|
|
|
|
|
|
|
#include "xiosysincludes.h"
|
|
|
|
|
|
|
|
#include "xioopen.h"
|
|
|
|
#include "xiolockfile.h"
|
|
|
|
|
|
|
|
#include "xio-openssl.h" /* xio_reset_fips_mode() */
|
|
|
|
|
|
|
|
static int xioinitialized;
|
|
|
|
xiofile_t *sock[XIO_MAXSOCK];
|
|
|
|
int (*xiohook_newchild)(void); /* xio calls this function from a new child
|
|
|
|
process */
|
2011-11-26 13:24:09 +00:00
|
|
|
int num_child = 0;
|
2008-01-27 12:00:08 +00:00
|
|
|
|
|
|
|
/* returns 0 on success or != if an error occurred */
|
|
|
|
int xioinitialize(void) {
|
|
|
|
if (xioinitialized) return 0;
|
|
|
|
|
|
|
|
/* configure and .h's cannot guarantee this */
|
|
|
|
assert(sizeof(uint8_t)==1);
|
|
|
|
assert(sizeof(uint16_t)==2);
|
|
|
|
assert(sizeof(uint32_t)==4);
|
|
|
|
|
|
|
|
/* assertions regarding O_ flags - important for XIO_READABLE() etc. */
|
|
|
|
assert(O_RDONLY==0);
|
|
|
|
assert(O_WRONLY==1);
|
|
|
|
assert(O_RDWR==2);
|
|
|
|
|
|
|
|
assert(SHUT_RD==0);
|
|
|
|
assert(SHUT_WR==1);
|
|
|
|
assert(SHUT_RDWR==2);
|
|
|
|
|
|
|
|
/* some assertions about termios */
|
|
|
|
#if WITH_TERMIOS
|
2008-09-26 11:19:49 +00:00
|
|
|
#if defined(CRDLY) && CRDLY_SHIFT >= 0
|
2008-01-27 12:00:08 +00:00
|
|
|
assert(3 << opt_crdly.arg3 == CRDLY);
|
|
|
|
#endif
|
2008-09-26 11:19:49 +00:00
|
|
|
#if defined(TABDLY) && TABDLY_SHIFT >= 0
|
2008-01-27 12:00:08 +00:00
|
|
|
assert(3 << opt_tabdly.arg3 == TABDLY);
|
|
|
|
#endif
|
2008-09-26 11:19:49 +00:00
|
|
|
#if CSIZE_SHIFT >= 0
|
2008-01-27 12:00:08 +00:00
|
|
|
assert(3 << opt_csize.arg3 == CSIZE);
|
2008-09-26 11:19:49 +00:00
|
|
|
#endif
|
2008-01-27 12:00:08 +00:00
|
|
|
{
|
|
|
|
union {
|
|
|
|
struct termios termarg;
|
|
|
|
tcflag_t flags[4];
|
|
|
|
#if HAVE_TERMIOS_ISPEED
|
|
|
|
speed_t speeds[sizeof(struct termios)/sizeof(speed_t)];
|
|
|
|
#endif
|
|
|
|
} tdata;
|
|
|
|
tdata.termarg.c_iflag = 0x12345678;
|
|
|
|
tdata.termarg.c_oflag = 0x23456789;
|
|
|
|
tdata.termarg.c_cflag = 0x3456789a;
|
|
|
|
tdata.termarg.c_lflag = 0x456789ab;
|
|
|
|
assert(tdata.termarg.c_iflag == tdata.flags[0]);
|
|
|
|
assert(tdata.termarg.c_oflag == tdata.flags[1]);
|
|
|
|
assert(tdata.termarg.c_cflag == tdata.flags[2]);
|
|
|
|
assert(tdata.termarg.c_lflag == tdata.flags[3]);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* these dependencies required in applyopts() for OFUNC_FCNTL */
|
|
|
|
assert(F_GETFD == F_SETFD-1);
|
|
|
|
assert(F_GETFL == F_SETFL-1);
|
|
|
|
|
|
|
|
{
|
|
|
|
const char *default_ip;
|
2023-10-26 20:16:21 +00:00
|
|
|
|
|
|
|
// xioparms.default_ip = WITH_DEFAULT_IPV;
|
2008-01-27 12:00:08 +00:00
|
|
|
default_ip = getenv("SOCAT_DEFAULT_LISTEN_IP");
|
|
|
|
if (default_ip != NULL) {
|
|
|
|
switch (default_ip[0]) {
|
|
|
|
case '4':
|
|
|
|
case '6':
|
2023-10-26 20:16:21 +00:00
|
|
|
xioparms.default_ip = default_ip[0];
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
xioparms.default_ip = '0';
|
|
|
|
break;
|
2008-01-27 12:00:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
{
|
|
|
|
const char *preferred_ip;
|
2023-10-26 20:16:21 +00:00
|
|
|
|
|
|
|
// xioparms.preferred_ip = WITH_DEFAULT_IPV;
|
2008-01-27 12:00:08 +00:00
|
|
|
preferred_ip = getenv("SOCAT_PREFERRED_RESOLVE_IP");
|
|
|
|
if (preferred_ip != NULL) {
|
|
|
|
switch (preferred_ip[0]) {
|
|
|
|
case '4':
|
|
|
|
case '6':
|
2023-11-05 12:59:14 +00:00
|
|
|
xioparms.preferred_ip = preferred_ip[0];
|
|
|
|
break;
|
2008-01-27 12:00:08 +00:00
|
|
|
default:
|
2023-11-05 12:59:14 +00:00
|
|
|
xioparms.preferred_ip = '0';
|
|
|
|
break;
|
2008-01-27 12:00:08 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (Atexit(xioexit) < 0) {
|
|
|
|
Error("atexit(xioexit) failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
xioinitialized = 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-09-22 20:17:55 +00:00
|
|
|
/* call this function when option -lp (reset program name) has been applied */
|
|
|
|
int xioinitialize2(void) {
|
|
|
|
pid_t pid = Getpid();
|
|
|
|
xiosetenvulong("PID", pid, 1);
|
|
|
|
xiosetenvulong("PPID", pid, 1);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-01-27 12:00:08 +00:00
|
|
|
|
|
|
|
/* well, this function is not for initialization, but I could not find a better
|
|
|
|
place for it
|
|
|
|
it is called in the child process after fork
|
|
|
|
it drops the locks of the xiofile's so only the parent owns them
|
|
|
|
*/
|
|
|
|
void xiodroplocks(void) {
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < XIO_MAXSOCK; ++i) {
|
2023-10-26 16:42:41 +00:00
|
|
|
if (sock[i] != NULL && sock[i]->tag != XIO_TAG_INVALID &&
|
|
|
|
!(sock[i]->tag & XIO_TAG_CLOSED)) {
|
2008-01-27 12:00:08 +00:00
|
|
|
xiofiledroplock(sock[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-10-26 16:42:41 +00:00
|
|
|
/* Consider an invocation like this:
|
|
|
|
socat -u EXEC:'some program that accepts data' TCP-L:...,fork
|
|
|
|
we do not want the program to be killed by the first TCP-L sub process, it's
|
2008-01-29 06:59:12 +00:00
|
|
|
better if it survives all sub processes. Thus, it must not be killed when
|
|
|
|
the sub process delivers EOF. Also, a socket that is reused in sub processes
|
2008-01-27 12:00:08 +00:00
|
|
|
should not be shut down (affects the connection), but closed (affects only
|
|
|
|
sub processes copy of file descriptor) */
|
|
|
|
static int xio_nokill(xiofile_t *sock) {
|
|
|
|
int result = 0;
|
2023-10-26 16:42:41 +00:00
|
|
|
|
|
|
|
if (sock->tag & XIO_TAG_CLOSED) {
|
|
|
|
return -1;
|
|
|
|
}
|
2008-01-27 12:00:08 +00:00
|
|
|
switch (sock->tag) {
|
|
|
|
case XIO_TAG_INVALID:
|
|
|
|
default:
|
|
|
|
return -1;
|
|
|
|
case XIO_TAG_DUAL:
|
|
|
|
if ((result = xio_nokill((xiofile_t *)sock->dual.stream[0])) != 0)
|
|
|
|
return result;
|
|
|
|
result = xio_nokill((xiofile_t *)sock->dual.stream[1]);
|
|
|
|
break;
|
|
|
|
case XIO_TAG_RDONLY:
|
|
|
|
case XIO_TAG_WRONLY:
|
|
|
|
case XIO_TAG_RDWR:
|
|
|
|
/* here is the core of this function */
|
|
|
|
switch (sock->stream.howtoend) {
|
|
|
|
case END_SHUTDOWN_KILL: sock->stream.howtoend = END_CLOSE; break;
|
|
|
|
case END_CLOSE_KILL: sock->stream.howtoend = END_CLOSE; break;
|
|
|
|
case END_SHUTDOWN: sock->stream.howtoend = END_CLOSE; break;
|
|
|
|
default: break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* call this function immediately after fork() in child process */
|
|
|
|
/* it performs some neccessary actions
|
|
|
|
returns 0 on success or != 0 if an error occurred */
|
|
|
|
int xio_forked_inchild(void) {
|
|
|
|
int result = 0;
|
2011-11-18 17:07:39 +00:00
|
|
|
int i;
|
2008-09-22 20:17:55 +00:00
|
|
|
|
2019-03-03 08:32:22 +00:00
|
|
|
diag_fork();
|
2011-11-18 17:07:39 +00:00
|
|
|
for (i=0; i<NUMUNKNOWN; ++i) {
|
|
|
|
diedunknown[i] = 0;
|
|
|
|
}
|
2011-11-26 13:24:09 +00:00
|
|
|
num_child = 0;
|
2008-01-27 12:00:08 +00:00
|
|
|
xiodroplocks();
|
|
|
|
#if WITH_FIPS
|
|
|
|
if (xio_reset_fips_mode() != 0) {
|
|
|
|
result = 1;
|
|
|
|
}
|
|
|
|
#endif /* WITH_FIPS */
|
|
|
|
/* some locks belong to parent process, so "drop" them now */
|
|
|
|
if (xiohook_newchild) {
|
|
|
|
if ((*xiohook_newchild)() != 0) {
|
|
|
|
Exit(1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* change XIO_SHUTDOWN_KILL to XIO_SHUTDOWN */
|
|
|
|
if (sock1 != NULL) {
|
|
|
|
int result2;
|
|
|
|
result2 = xio_nokill(sock1);
|
|
|
|
if (result2 < 0) Exit(1);
|
|
|
|
result |= result2;
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
2008-09-22 20:17:55 +00:00
|
|
|
|
|
|
|
/* subchild != 0 means that the current process is already a child process of
|
|
|
|
the master process and thus the new sub child process should not set the
|
|
|
|
SOCAT_PID variable */
|
2023-10-26 16:50:29 +00:00
|
|
|
pid_t xio_fork(bool subchild,
|
|
|
|
int level, /* log level */
|
|
|
|
int shutup) /* decrease log level in child process */
|
|
|
|
{
|
2008-09-22 20:17:55 +00:00
|
|
|
pid_t pid;
|
|
|
|
const char *forkwaitstring;
|
|
|
|
int forkwaitsecs = 0;
|
|
|
|
|
|
|
|
if ((pid = Fork()) < 0) {
|
|
|
|
Msg1(level, "fork(): %s", strerror(errno));
|
|
|
|
return pid;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pid == 0) { /* child process */
|
|
|
|
pid_t cpid = Getpid();
|
|
|
|
|
2011-11-26 13:49:51 +00:00
|
|
|
Info1("just born: child process "F_pid, cpid);
|
2008-09-22 20:17:55 +00:00
|
|
|
if (!subchild) {
|
|
|
|
/* set SOCAT_PID to new value */
|
|
|
|
xiosetenvulong("PID", pid, 1);
|
2023-06-23 20:48:26 +00:00
|
|
|
} else {
|
|
|
|
/* Make sure the sub process does not hold the trigger pipe open */
|
|
|
|
if (sock1 != NULL) {
|
|
|
|
struct single *sfd;
|
|
|
|
sfd = XIO_RDSTREAM(sock1);
|
|
|
|
if (sfd->triggerfd >= 0) Close(sfd->triggerfd);
|
|
|
|
sfd = XIO_WRSTREAM(sock1);
|
|
|
|
if (sfd->triggerfd >= 0) Close(sfd->triggerfd);
|
|
|
|
}
|
2008-09-22 20:17:55 +00:00
|
|
|
}
|
|
|
|
/* gdb recommends to have env controlled sleep after fork */
|
|
|
|
if (forkwaitstring = getenv("SOCAT_FORK_WAIT")) {
|
|
|
|
forkwaitsecs = atoi(forkwaitstring);
|
|
|
|
Sleep(forkwaitsecs);
|
|
|
|
}
|
|
|
|
if (xio_forked_inchild() != 0) {
|
|
|
|
Exit(1);
|
|
|
|
}
|
2023-10-26 16:50:29 +00:00
|
|
|
diag_set_int('u', shutup);
|
2008-09-22 20:17:55 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2011-11-26 13:24:09 +00:00
|
|
|
num_child++;
|
2008-09-22 20:17:55 +00:00
|
|
|
/* parent process */
|
|
|
|
Notice1("forked off child process "F_pid, pid);
|
|
|
|
/* gdb recommends to have env controlled sleep after fork */
|
|
|
|
if (forkwaitstring = getenv("SOCAT_FORK_WAIT")) {
|
|
|
|
forkwaitsecs = atoi(forkwaitstring);
|
|
|
|
Sleep(forkwaitsecs);
|
|
|
|
}
|
|
|
|
return pid;
|
|
|
|
}
|