remove pointless strdup_malloc
[ust.git] / libustcomm / ustcomm.c
CommitLineData
c39c72ee
PMF
1/* Copyright (C) 2009 Pierre-Marc Fournier
2 *
3 * This library is free software; you can redistribute it and/or
4 * modify it under the terms of the GNU Lesser General Public
5 * License as published by the Free Software Foundation; either
6 * version 2.1 of the License, or (at your option) any later version.
7 *
8 * This library is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * Lesser General Public License for more details.
12 *
13 * You should have received a copy of the GNU Lesser General Public
14 * License along with this library; if not, write to the Free Software
15 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
16 */
17
d0b5f2b9 18#define _GNU_SOURCE
f9e5ce61
PMF
19#include <sys/types.h>
20#include <signal.h>
21#include <errno.h>
22#include <sys/socket.h>
23#include <sys/un.h>
d0b5f2b9 24#include <unistd.h>
aca1ad90 25#include <poll.h>
803a4f58 26#include <sys/stat.h>
f9e5ce61
PMF
27
28#include <stdio.h>
29#include <stdlib.h>
d0b5f2b9 30#include <string.h>
b0540e11 31#include <execinfo.h>
d0b5f2b9
PMF
32
33#include "ustcomm.h"
6af64c43 34#include "usterr.h"
2dae156b 35#include "share.h"
0e4b45ac 36#include "multipoll.h"
f9e5ce61
PMF
37
38#define UNIX_PATH_MAX 108
f9e5ce61 39
d6d27063
PMF
40static int mkdir_p(const char *path, mode_t mode)
41{
c555b133 42 const char *path_p;
d6d27063
PMF
43 char *tmp;
44
45 int retval = 0;
46 int result;
47
48 tmp = malloc(strlen(path) + 1);
49 if (tmp == NULL)
50 return -1;
51
52 /* skip first / */
53 path_p = path+1;
54
55 for(;;) {
56 while (*path_p != '/') {
57 if(*path_p == 0)
58 break;
59 ++path_p;
60 }
61 if (*path_p == '/') {
62 strncpy(tmp, path, path_p - path);
63 tmp[path_p-path] = '\0';
64 if (tmp[path_p - path - 1] != '/') {
65 result = mkdir(tmp, mode);
66 if(result == -1) {
67 if (!(errno == EEXIST || errno == EACCES || errno == EROFS)) {
68 /* Then this is a real error */
69 retval = -1;
70 break;
71 }
72 }
73 }
74 /* pass / */
75 path_p++;
76 } else {
77 /* last component */
78 result = mkdir(path, mode);
79 if (result == -1)
80 retval = -1;
81 break;
82 }
83 }
84
85 free(tmp);
86 return retval;
87}
88
52c51a47 89static int signal_process(pid_t pid)
f9e5ce61 90{
52c51a47 91 return 0;
f9e5ce61
PMF
92}
93
5932431b
PMF
94void ustcomm_init_connection(struct ustcomm_connection *conn)
95{
96 conn->recv_buf = NULL;
97 conn->recv_buf_size = 0;
98 conn->recv_buf_alloc = 0;
99}
100
ab33e65c 101int pid_is_online(pid_t pid) {
2944a629 102 return 1;
ab33e65c
PP
103}
104
2dae156b
PMF
105/* Send a message
106 *
107 * @fd: file descriptor to send to
108 * @msg: a null-terminated string containing the message to send
109 *
110 * Return value:
111 * -1: error
112 * 0: connection closed
113 * 1: success
114 */
115
4e2a8808 116static int send_message_fd(int fd, const char *msg)
811e4b93
PMF
117{
118 int result;
119
2dae156b
PMF
120 /* Send including the final \0 */
121 result = patient_send(fd, msg, strlen(msg)+1, MSG_NOSIGNAL);
811e4b93 122 if(result == -1) {
2dae156b
PMF
123 if(errno != EPIPE)
124 PERROR("send");
811e4b93
PMF
125 return -1;
126 }
688760ef
PMF
127 else if(result == 0) {
128 return 0;
129 }
811e4b93 130
2dae156b 131 DBG("sent message \"%s\"", msg);
688760ef 132 return 1;
811e4b93
PMF
133}
134
b0540e11
PMF
135/* Called by an app to ask the consumer daemon to connect to it. */
136
137int ustcomm_request_consumer(pid_t pid, const char *channel)
138{
139 char path[UNIX_PATH_MAX];
140 int result;
08230db7
PMF
141 char *msg=NULL;
142 int retval = 0;
143 struct ustcomm_connection conn;
c97d4437
PMF
144 char *explicit_daemon_socket_path;
145
146 explicit_daemon_socket_path = getenv("UST_DAEMON_SOCKET");
147 if(explicit_daemon_socket_path) {
148 /* user specified explicitly a socket path */
149 result = snprintf(path, UNIX_PATH_MAX, "%s", explicit_daemon_socket_path);
150 }
151 else {
152 /* just use the default path */
153 result = snprintf(path, UNIX_PATH_MAX, "%s/ustd", SOCK_DIR);
154 }
b0540e11 155
b0540e11 156 if(result >= UNIX_PATH_MAX) {
08230db7 157 ERR("string overflow allocating socket name");
b0540e11
PMF
158 return -1;
159 }
160
161 asprintf(&msg, "collect %d %s", pid, channel);
162
08230db7
PMF
163 /* don't signal it because it's the daemon */
164 result = ustcomm_connect_path(path, &conn, -1);
165 if(result == -1) {
166 WARN("ustcomm_connect_path failed");
167 retval = -1;
168 goto del_string;
169 }
170
171 result = ustcomm_send_request(&conn, msg, NULL);
172 if(result == -1) {
173 WARN("ustcomm_send_request failed");
174 retval = -1;
175 goto disconnect;
176 }
177
178 disconnect:
179 ustcomm_disconnect(&conn);
180 del_string:
b0540e11
PMF
181 free(msg);
182
08230db7 183 return retval;
b0540e11
PMF
184}
185
688760ef 186/* returns 1 to indicate a message was received
da000ba4 187 * returns 0 to indicate no message was received (end of stream)
688760ef
PMF
188 * returns -1 to indicate an error
189 */
811e4b93 190
5932431b 191#define RECV_INCREMENT 1000
da000ba4 192#define RECV_INITIAL_BUF_SIZE 10
2dae156b 193
5932431b 194static int recv_message_fd(int fd, char **recv_buf, int *recv_buf_size, int *recv_buf_alloc, char **msg)
d0b5f2b9 195{
d0b5f2b9 196 int result;
d0b5f2b9 197
5932431b
PMF
198 /* 1. Check if there is a message in the buf */
199 /* 2. If not, do:
200 2.1 receive chunk and put it in buffer
201 2.2 process full message if there is one
202 -- while no message arrived
203 */
b02e31e5 204
2dae156b 205 for(;;) {
5932431b
PMF
206 int i;
207 int nulfound = 0;
208
209 /* Search for full message in buffer */
210 for(i=0; i<*recv_buf_size; i++) {
211 if((*recv_buf)[i] == '\0') {
212 nulfound = 1;
213 break;
da000ba4 214 }
2dae156b 215 }
b0540e11 216
5932431b
PMF
217 /* Process found message */
218 if(nulfound == 1) {
219 char *newbuf;
220
221 if(i == 0) {
222 /* problem */
2a79ceeb 223 WARN("received empty message");
5932431b
PMF
224 }
225 *msg = strndup(*recv_buf, i);
226
227 /* Remove processed message from buffer */
228 newbuf = (char *) malloc(*recv_buf_size - (i+1));
229 memcpy(newbuf, *recv_buf + (i+1), *recv_buf_size - (i+1));
230 free(*recv_buf);
231 *recv_buf = newbuf;
232 *recv_buf_size -= (i+1);
233 *recv_buf_alloc -= (i+1);
234
235 return 1;
236 }
237
238 /* Receive a chunk from the fd */
239 if(*recv_buf_alloc - *recv_buf_size < RECV_INCREMENT) {
240 *recv_buf_alloc += RECV_INCREMENT - (*recv_buf_alloc - *recv_buf_size);
241 *recv_buf = (char *) realloc(*recv_buf, *recv_buf_alloc);
242 }
243
244 result = recv(fd, *recv_buf+*recv_buf_size, RECV_INCREMENT, 0);
2dae156b 245 if(result == -1) {
5932431b
PMF
246 if(errno == ECONNRESET) {
247 *recv_buf_size = 0;
248 return 0;
249 }
250 /* real error */
251 PERROR("recv");
2dae156b
PMF
252 return -1;
253 }
254 if(result == 0) {
5932431b 255 return 0;
2dae156b 256 }
5932431b 257 *recv_buf_size += result;
2dae156b 258
5932431b 259 /* Go back to the beginning to check if there is a full message in the buffer */
2dae156b 260 }
b0540e11 261
5932431b 262 DBG("received message \"%s\"", *recv_buf);
811e4b93 263
688760ef 264 return 1;
2dae156b 265
d0b5f2b9
PMF
266}
267
5932431b
PMF
268static int recv_message_conn(struct ustcomm_connection *conn, char **msg)
269{
270 return recv_message_fd(conn->fd, &conn->recv_buf, &conn->recv_buf_size, &conn->recv_buf_alloc, msg);
271}
272
811e4b93
PMF
273int ustcomm_send_reply(struct ustcomm_server *server, char *msg, struct ustcomm_source *src)
274{
275 int result;
276
4e2a8808 277 result = send_message_fd(src->fd, msg);
3a7b90de 278 if(result < 0) {
811e4b93
PMF
279 ERR("error in send_message_fd");
280 return -1;
281 }
282
283 return 0;
284}
285
99b72dc0
PMF
286/* Called after a fork. */
287
288int ustcomm_close_all_connections(struct ustcomm_server *server)
289{
290 struct ustcomm_connection *conn;
291 struct ustcomm_connection *deletable_conn = NULL;
292
293 list_for_each_entry(conn, &server->connections, list) {
294 free(deletable_conn);
295 deletable_conn = conn;
2a79ceeb 296 ustcomm_close_app(conn);
99b72dc0
PMF
297 list_del(&conn->list);
298 }
299
300 return 0;
301}
302
688760ef
PMF
303/* @timeout: max blocking time in milliseconds, -1 means infinity
304 *
305 * returns 1 to indicate a message was received
306 * returns 0 to indicate no message was received
307 * returns -1 to indicate an error
308 */
309
310int ustcomm_recv_message(struct ustcomm_server *server, char **msg, struct ustcomm_source *src, int timeout)
b0540e11 311{
aca1ad90 312 struct pollfd *fds;
5932431b 313 struct ustcomm_connection **conn_table;
aca1ad90
PMF
314 struct ustcomm_connection *conn;
315 int result;
316 int retval;
317
318 for(;;) {
319 int idx = 0;
320 int n_fds = 1;
321
811e4b93 322 list_for_each_entry(conn, &server->connections, list) {
aca1ad90
PMF
323 n_fds++;
324 }
325
326 fds = (struct pollfd *) malloc(n_fds * sizeof(struct pollfd));
327 if(fds == NULL) {
328 ERR("malloc returned NULL");
329 return -1;
330 }
331
5932431b
PMF
332 conn_table = (struct ustcomm_connection **) malloc(n_fds * sizeof(struct ustcomm_connection *));
333 if(conn_table == NULL) {
334 ERR("malloc returned NULL");
2a79ceeb
PMF
335 retval = -1;
336 goto free_fds_return;
5932431b
PMF
337 }
338
aca1ad90 339 /* special idx 0 is for listening socket */
811e4b93 340 fds[idx].fd = server->listen_fd;
aca1ad90
PMF
341 fds[idx].events = POLLIN;
342 idx++;
343
811e4b93 344 list_for_each_entry(conn, &server->connections, list) {
aca1ad90
PMF
345 fds[idx].fd = conn->fd;
346 fds[idx].events = POLLIN;
5932431b 347 conn_table[idx] = conn;
aca1ad90
PMF
348 idx++;
349 }
350
69ba0156
PMF
351 while((result = poll(fds, n_fds, timeout)) == -1 && errno == EINTR)
352 /* nothing */;
aca1ad90
PMF
353 if(result == -1) {
354 PERROR("poll");
2a79ceeb
PMF
355 retval = -1;
356 goto free_conn_table_return;
aca1ad90
PMF
357 }
358
2a79ceeb
PMF
359 if(result == 0) {
360 retval = 0;
361 goto free_conn_table_return;
362 }
688760ef 363
aca1ad90
PMF
364 if(fds[0].revents) {
365 struct ustcomm_connection *newconn;
366 int newfd;
367
811e4b93 368 result = newfd = accept(server->listen_fd, NULL, NULL);
aca1ad90
PMF
369 if(result == -1) {
370 PERROR("accept");
2a79ceeb
PMF
371 retval = -1;
372 goto free_conn_table_return;
aca1ad90
PMF
373 }
374
375 newconn = (struct ustcomm_connection *) malloc(sizeof(struct ustcomm_connection));
376 if(newconn == NULL) {
377 ERR("malloc returned NULL");
378 return -1;
379 }
380
5932431b 381 ustcomm_init_connection(newconn);
aca1ad90
PMF
382 newconn->fd = newfd;
383
811e4b93 384 list_add(&newconn->list, &server->connections);
aca1ad90
PMF
385 }
386
387 for(idx=1; idx<n_fds; idx++) {
388 if(fds[idx].revents) {
5932431b 389 retval = recv_message_conn(conn_table[idx], msg);
2dae156b
PMF
390 if(src)
391 src->fd = fds[idx].fd;
392
e2b815a9 393 if(retval == 0) {
aca1ad90 394 /* connection finished */
811e4b93 395 list_for_each_entry(conn, &server->connections, list) {
aca1ad90 396 if(conn->fd == fds[idx].fd) {
750f9da4 397 ustcomm_close_app(conn);
aca1ad90 398 list_del(&conn->list);
750f9da4 399 free(conn);
aca1ad90
PMF
400 break;
401 }
402 }
403 }
404 else {
2a79ceeb 405 goto free_conn_table_return;
aca1ad90
PMF
406 }
407 }
408 }
409
410 free(fds);
2a79ceeb 411 free(conn_table);
aca1ad90
PMF
412 }
413
2a79ceeb
PMF
414free_conn_table_return:
415 free(conn_table);
aca1ad90
PMF
416free_fds_return:
417 free(fds);
418 return retval;
b0540e11
PMF
419}
420
688760ef 421int ustcomm_ustd_recv_message(struct ustcomm_ustd *ustd, char **msg, struct ustcomm_source *src, int timeout)
811e4b93 422{
688760ef 423 return ustcomm_recv_message(&ustd->server, msg, src, timeout);
811e4b93
PMF
424}
425
688760ef 426int ustcomm_app_recv_message(struct ustcomm_app *app, char **msg, struct ustcomm_source *src, int timeout)
b0540e11 427{
688760ef 428 return ustcomm_recv_message(&app->server, msg, src, timeout);
b0540e11
PMF
429}
430
46ef48cd
PMF
431/* This removes src from the list of active connections of app.
432 */
433
434int ustcomm_app_detach_client(struct ustcomm_app *app, struct ustcomm_source *src)
435{
436 struct ustcomm_server *server = (struct ustcomm_server *)app;
437 struct ustcomm_connection *conn;
438
439 list_for_each_entry(conn, &server->connections, list) {
440 if(conn->fd == src->fd) {
441 list_del(&conn->list);
442 goto found;
443 }
444 }
445
446 return -1;
447found:
448 return src->fd;
449}
450
08230db7 451static int init_named_socket(const char *name, char **path_out)
d0b5f2b9
PMF
452{
453 int result;
454 int fd;
455
456 struct sockaddr_un addr;
457
aca1ad90 458 result = fd = socket(PF_UNIX, SOCK_STREAM, 0);
d0b5f2b9
PMF
459 if(result == -1) {
460 PERROR("socket");
461 return -1;
462 }
463
464 addr.sun_family = AF_UNIX;
465
466 strncpy(addr.sun_path, name, UNIX_PATH_MAX);
467 addr.sun_path[UNIX_PATH_MAX-1] = '\0';
468
aca1ad90
PMF
469 result = access(name, F_OK);
470 if(result == 0) {
471 /* file exists */
472 result = unlink(name);
473 if(result == -1) {
474 PERROR("unlink of socket file");
475 goto close_sock;
476 }
69c37f74 477 DBG("socket already exists; overwriting");
aca1ad90
PMF
478 }
479
d0b5f2b9
PMF
480 result = bind(fd, (struct sockaddr *)&addr, sizeof(addr));
481 if(result == -1) {
482 PERROR("bind");
483 goto close_sock;
484 }
485
aca1ad90
PMF
486 result = listen(fd, 1);
487 if(result == -1) {
488 PERROR("listen");
489 goto close_sock;
490 }
491
b0540e11 492 if(path_out) {
803a4f58 493 *path_out = strdup(addr.sun_path);
b0540e11 494 }
d0b5f2b9
PMF
495
496 return fd;
497
498 close_sock:
499 close(fd);
500
501 return -1;
502}
503
34b460e6
PMF
504/*
505 * Return value:
506 * 0: Success, but no reply because recv() returned 0
507 * 1: Success
508 * -1: Error
509 *
510 * On error, the error message is printed, except on
511 * ECONNRESET, which is normal when the application dies.
512 */
513
772030fe 514int ustcomm_send_request(struct ustcomm_connection *conn, const char *req, char **reply)
4e2a8808
PMF
515{
516 int result;
517
2dae156b
PMF
518 /* Send including the final \0 */
519 result = send_message_fd(conn->fd, req);
520 if(result != 1)
521 return result;
4e2a8808
PMF
522
523 if(!reply)
524 return 1;
525
5932431b 526 result = recv_message_conn(conn, reply);
4e2a8808 527 if(result == -1) {
4e2a8808
PMF
528 return -1;
529 }
530 else if(result == 0) {
531 return 0;
532 }
533
4e2a8808
PMF
534 return 1;
535}
536
2a79ceeb
PMF
537/* Return value:
538 * 0: success
539 * -1: error
540 */
541
08230db7 542int ustcomm_connect_path(const char *path, struct ustcomm_connection *conn, pid_t signalpid)
4e2a8808
PMF
543{
544 int fd;
545 int result;
546 struct sockaddr_un addr;
547
5932431b
PMF
548 ustcomm_init_connection(conn);
549
4e2a8808
PMF
550 result = fd = socket(PF_UNIX, SOCK_STREAM, 0);
551 if(result == -1) {
552 PERROR("socket");
553 return -1;
554 }
555
556 addr.sun_family = AF_UNIX;
557
558 result = snprintf(addr.sun_path, UNIX_PATH_MAX, "%s", path);
559 if(result >= UNIX_PATH_MAX) {
560 ERR("string overflow allocating socket name");
561 return -1;
562 }
563
52c51a47
PMF
564 if(signalpid >= 0) {
565 result = signal_process(signalpid);
566 if(result == -1) {
567 ERR("could not signal process");
568 return -1;
569 }
570 }
4e2a8808
PMF
571
572 result = connect(fd, (struct sockaddr *)&addr, sizeof(addr));
573 if(result == -1) {
2dae156b 574 PERROR("connect (path=%s)", path);
4e2a8808
PMF
575 return -1;
576 }
577
578 conn->fd = fd;
579
580 return 0;
581}
582
583int ustcomm_disconnect(struct ustcomm_connection *conn)
584{
585 return close(conn->fd);
586}
587
2a79ceeb
PMF
588/* Open a connection to a traceable app.
589 *
590 * Return value:
591 * 0: success
592 * -1: error
593 */
594
4e2a8808
PMF
595int ustcomm_connect_app(pid_t pid, struct ustcomm_connection *conn)
596{
597 int result;
598 char path[UNIX_PATH_MAX];
599
600
601 result = snprintf(path, UNIX_PATH_MAX, "%s/%d", SOCK_DIR, pid);
602 if(result >= UNIX_PATH_MAX) {
08230db7 603 ERR("string overflow allocating socket name");
4e2a8808
PMF
604 return -1;
605 }
606
607 return ustcomm_connect_path(path, conn, pid);
608}
609
750f9da4
PMF
610/* Close a connection to a traceable app. It frees the
611 * resources. It however does not free the
612 * ustcomm_connection itself.
613 */
2a79ceeb
PMF
614
615int ustcomm_close_app(struct ustcomm_connection *conn)
616{
617 close(conn->fd);
618 free(conn->recv_buf);
619
620 return 0;
621}
622
dce0b474
PMF
623static int ensure_dir_exists(const char *dir)
624{
625 struct stat st;
626 int result;
627
628 if(!strcmp(dir, ""))
629 return -1;
630
631 result = stat(dir, &st);
632 if(result == -1 && errno != ENOENT) {
633 return -1;
634 }
635 else if(result == -1) {
636 /* ENOENT */
dce0b474
PMF
637 int result;
638
d6d27063 639 result = mkdir_p(dir, 0777);
dce0b474 640 if(result != 0) {
d6d27063 641 ERR("executing in recursive creation of directory %s", dir);
dce0b474
PMF
642 return -1;
643 }
644 }
645
646 return 0;
647}
648
08230db7
PMF
649/* Called by an application to initialize its server so daemons can
650 * connect to it.
651 */
4e2a8808 652
d0b5f2b9
PMF
653int ustcomm_init_app(pid_t pid, struct ustcomm_app *handle)
654{
655 int result;
656 char *name;
657
658 result = asprintf(&name, "%s/%d", SOCK_DIR, (int)pid);
659 if(result >= UNIX_PATH_MAX) {
660 ERR("string overflow allocating socket name");
661 return -1;
662 }
663
dce0b474
PMF
664 result = ensure_dir_exists(SOCK_DIR);
665 if(result == -1) {
666 ERR("Unable to create socket directory %s", SOCK_DIR);
667 return -1;
668 }
669
811e4b93
PMF
670 handle->server.listen_fd = init_named_socket(name, &(handle->server.socketpath));
671 if(handle->server.listen_fd < 0) {
68ab7a5d 672 ERR("Error initializing named socket (%s). Check that directory exists and that it is writable.", name);
d0b5f2b9
PMF
673 goto free_name;
674 }
675 free(name);
676
811e4b93 677 INIT_LIST_HEAD(&handle->server.connections);
aca1ad90 678
d0b5f2b9
PMF
679 return 0;
680
681free_name:
682 free(name);
683 return -1;
684}
685
08230db7
PMF
686/* Used by the daemon to initialize its server so applications
687 * can connect to it.
688 */
689
c97d4437 690int ustcomm_init_ustd(struct ustcomm_ustd *handle, const char *sock_path)
d0b5f2b9 691{
3847c3ba 692 char *name;
c97d4437 693 int retval = 0;
3847c3ba 694
c97d4437
PMF
695 if(sock_path) {
696 asprintf(&name, "%s", sock_path);
697 }
698 else {
dce0b474
PMF
699 int result;
700
701 /* Only check if socket dir exists if we are using the default directory */
702 result = ensure_dir_exists(SOCK_DIR);
703 if(result == -1) {
704 ERR("Unable to create socket directory %s", SOCK_DIR);
705 return -1;
706 }
707
c97d4437 708 asprintf(&name, "%s/%s", SOCK_DIR, "ustd");
3847c3ba
PMF
709 }
710
811e4b93
PMF
711 handle->server.listen_fd = init_named_socket(name, &handle->server.socketpath);
712 if(handle->server.listen_fd < 0) {
6cb88bc0 713 ERR("error initializing named socket at %s", name);
c97d4437 714 retval = -1;
aca1ad90
PMF
715 goto free_name;
716 }
d0b5f2b9 717
811e4b93 718 INIT_LIST_HEAD(&handle->server.connections);
aca1ad90 719
aca1ad90
PMF
720free_name:
721 free(name);
c97d4437
PMF
722
723 return retval;
d0b5f2b9 724}
b02e31e5 725
2a79ceeb 726static void ustcomm_fini_server(struct ustcomm_server *server, int keep_socket_file)
803a4f58
PMF
727{
728 int result;
729 struct stat st;
730
2a79ceeb
PMF
731 if(!keep_socket_file) {
732 /* Destroy socket */
733 result = stat(server->socketpath, &st);
734 if(result == -1) {
735 PERROR("stat (%s)", server->socketpath);
736 return;
737 }
803a4f58 738
2a79ceeb
PMF
739 /* Paranoid check before deleting. */
740 result = S_ISSOCK(st.st_mode);
741 if(!result) {
742 ERR("The socket we are about to delete is not a socket.");
743 return;
744 }
745
746 result = unlink(server->socketpath);
747 if(result == -1) {
748 PERROR("unlink");
749 }
803a4f58
PMF
750 }
751
2a79ceeb
PMF
752 free(server->socketpath);
753
754 result = close(server->listen_fd);
803a4f58 755 if(result == -1) {
2a79ceeb
PMF
756 PERROR("close");
757 return;
803a4f58
PMF
758 }
759}
760
750f9da4
PMF
761/* Free a traceable application server */
762
2a79ceeb
PMF
763void ustcomm_fini_app(struct ustcomm_app *handle, int keep_socket_file)
764{
765 ustcomm_fini_server(&handle->server, keep_socket_file);
766}
767
750f9da4
PMF
768/* Free a ustd server */
769
2a79ceeb
PMF
770void ustcomm_fini_ustd(struct ustcomm_ustd *handle)
771{
772 ustcomm_fini_server(&handle->server, 0);
773}
774
7e92827d 775static const char *find_tok(const char *str)
b02e31e5
PMF
776{
777 while(*str == ' ') {
778 str++;
779
780 if(*str == 0)
781 return NULL;
782 }
783
784 return str;
785}
786
7e92827d 787static const char *find_sep(const char *str)
b02e31e5
PMF
788{
789 while(*str != ' ') {
790 str++;
791
792 if(*str == 0)
793 break;
794 }
795
796 return str;
797}
798
7e92827d 799int nth_token_is(const char *str, const char *token, int tok_no)
b02e31e5
PMF
800{
801 int i;
7e92827d
PMF
802 const char *start;
803 const char *end;
b02e31e5
PMF
804
805 for(i=0; i<=tok_no; i++) {
806 str = find_tok(str);
807 if(str == NULL)
808 return -1;
809
810 start = str;
811
812 str = find_sep(str);
813 if(str == NULL)
814 return -1;
815
816 end = str;
817 }
818
819 if(end-start != strlen(token))
820 return 0;
821
822 if(strncmp(start, token, end-start))
823 return 0;
824
825 return 1;
826}
827
7e92827d 828char *nth_token(const char *str, int tok_no)
b02e31e5
PMF
829{
830 static char *retval = NULL;
831 int i;
7e92827d
PMF
832 const char *start;
833 const char *end;
b02e31e5
PMF
834
835 for(i=0; i<=tok_no; i++) {
836 str = find_tok(str);
837 if(str == NULL)
838 return NULL;
839
840 start = str;
841
842 str = find_sep(str);
843 if(str == NULL)
844 return NULL;
845
846 end = str;
847 }
848
849 if(retval) {
850 free(retval);
851 retval = NULL;
852 }
853
aca1ad90 854 asprintf(&retval, "%.*s", (int)(end-start), start);
b02e31e5
PMF
855
856 return retval;
857}
858
0e4b45ac
PMF
859/* Callback from multipoll.
860 * Receive a new connection on the listening socket.
861 */
862
863static int process_mp_incoming_conn(void *priv, int fd, short events)
864{
865 struct ustcomm_connection *newconn;
866 struct ustcomm_server *server = (struct ustcomm_server *) priv;
867 int newfd;
868 int result;
869
870 result = newfd = accept(server->listen_fd, NULL, NULL);
871 if(result == -1) {
872 PERROR("accept");
873 return -1;
874 }
875
876 newconn = (struct ustcomm_connection *) malloc(sizeof(struct ustcomm_connection));
877 if(newconn == NULL) {
878 ERR("malloc returned NULL");
879 return -1;
880 }
881
882 ustcomm_init_connection(newconn);
883 newconn->fd = newfd;
884
885 list_add(&newconn->list, &server->connections);
886
887 return 0;
888}
889
890/* Callback from multipoll.
891 * Receive a message on an existing connection.
892 */
893
894static int process_mp_conn_msg(void *priv, int fd, short revents)
895{
896 struct ustcomm_multipoll_conn_info *mpinfo = (struct ustcomm_multipoll_conn_info *) priv;
897 int result;
898 char *msg;
899 struct ustcomm_source src;
900
901 if(revents) {
902 src.fd = fd;
903
904 result = recv_message_conn(mpinfo->conn, &msg);
905 if(result == -1) {
906 ERR("error in recv_message_conn");
907 }
908
909 else if(result == 0) {
910 /* connection finished */
911 ustcomm_close_app(mpinfo->conn);
912 list_del(&mpinfo->conn->list);
913 free(mpinfo->conn);
914 }
915 else {
916 mpinfo->cb(msg, &src);
917 free(msg);
918 }
919 }
920
921 return 0;
922}
923
924int free_ustcomm_client_poll(void *data)
925{
926 free(data);
927 return 0;
928}
929
930void ustcomm_mp_add_app_clients(struct mpentries *ent, struct ustcomm_app *app, int (*cb)(struct ustcomm_connection *conn, char *msg))
931{
932 struct ustcomm_connection *conn;
933
934 /* add listener socket */
935 multipoll_add(ent, app->server.listen_fd, POLLIN, process_mp_incoming_conn, &app->server, NULL);
936
937 list_for_each_entry(conn, &app->server.connections, list) {
938 struct ustcomm_multipoll_conn_info *mpinfo = (struct ustcomm_multipoll_conn_info *) malloc(sizeof(struct ustcomm_multipoll_conn_info));
939 mpinfo->conn = conn;
940 mpinfo->cb = cb;
941 multipoll_add(ent, conn->fd, POLLIN, process_mp_conn_msg, mpinfo, free_ustcomm_client_poll);
942 }
943}
This page took 0.071032 seconds and 4 git commands to generate.