comparison lib-src/gnuserv.c @ 428:3ecd8885ac67 r21-2-22

Import from CVS: tag r21-2-22
author cvs
date Mon, 13 Aug 2007 11:28:15 +0200
parents
children 8de8e3f6228a
comparison
equal deleted inserted replaced
427:0a0253eac470 428:3ecd8885ac67
1 /* -*-C-*-
2 Server code for handling requests from clients and forwarding them
3 on to the GNU Emacs process.
4
5 This file is part of GNU Emacs.
6
7 Copying is permitted under those conditions described by the GNU
8 General Public License.
9
10 Copyright (C) 1989 Free Software Foundation, Inc.
11
12 Author: Andy Norman (ange@hplb.hpl.hp.com), based on 'etc/server.c'
13 from the 18.52 GNU Emacs distribution.
14
15 Please mail bugs and suggestions to the author at the above address.
16 */
17
18 /* HISTORY
19 * 11-Nov-1990 bristor@simba
20 * Added EOT stuff.
21 */
22
23 /*
24 * This file incorporates new features added by Bob Weiner <weiner@mot.com>,
25 * Darrell Kindred <dkindred@cmu.edu> and Arup Mukherjee <arup@cmu.edu>.
26 * Please see the note at the end of the README file for details.
27 *
28 * (If gnuserv came bundled with your emacs, the README file is probably
29 * ../etc/gnuserv.README relative to the directory containing this file)
30 */
31
32 #if 0
33 static char rcsid [] = "!Header: gnuserv.c,v 2.1 95/02/16 11:58:27 arup alpha !";
34 #endif
35
36 #include "gnuserv.h"
37
38 #ifdef USE_LITOUT
39 #ifdef linux
40 #include <bsd/sgtty.h>
41 #else
42 #include <sgtty.h>
43 #endif
44 #endif
45
46 #ifdef AIX
47 #include <sys/select.h>
48 #endif
49
50 #include <stdlib.h>
51 #include <stdio.h>
52 #include <sys/types.h>
53 #include <sys/stat.h>
54
55 #ifdef HAVE_UNISTD_H
56 #include <unistd.h>
57 #endif /* HAVE_UNISTD_H */
58
59 #ifdef HAVE_STRING_H
60 #include <string.h>
61 #endif /* HAVE_STRING_H */
62
63 #if !defined(SYSV_IPC) && !defined(UNIX_DOMAIN_SOCKETS) && \
64 !defined(INTERNET_DOMAIN_SOCKETS)
65 main ()
66 {
67 fprintf (stderr,"Sorry, the Emacs server is only supported on systems that have\n");
68 fprintf (stderr,"Unix Domain sockets, Internet Domain sockets or System V IPC\n");
69 exit (1);
70 } /* main */
71 #else /* SYSV_IPC || UNIX_DOMAIN_SOCKETS || INTERNET_DOMAIN_SOCKETS */
72
73 #ifdef SYSV_IPC
74
75 int ipc_qid = 0; /* ipc message queue id */
76 pid_t ipc_wpid = 0; /* watchdog task pid */
77
78
79 /*
80 ipc_exit -- clean up the queue id and queue, then kill the watchdog task
81 if it exists. exit with the given status.
82 */
83 void
84 ipc_exit (int stat)
85 {
86 msgctl (ipc_qid,IPC_RMID,0);
87
88 if (ipc_wpid != 0)
89 kill (ipc_wpid, SIGKILL);
90
91 exit (stat);
92 } /* ipc_exit */
93
94
95 /*
96 ipc_handle_signal -- catch the signal given and clean up.
97 */
98 void
99 ipc_handle_signal(int sig)
100 {
101 ipc_exit (0);
102 } /* ipc_handle_signal */
103
104
105 /*
106 ipc_spawn_watchdog -- spawn a watchdog task to clean up the message queue should the
107 server process die.
108 */
109 void
110 ipc_spawn_watchdog (void)
111 {
112 if ((ipc_wpid = fork ()) == 0)
113 { /* child process */
114 pid_t ppid = getppid (); /* parent's process id */
115
116 setpgrp(); /* gnu kills process group on exit */
117
118 while (1)
119 {
120 if (kill (ppid, 0) < 0) /* ppid is no longer valid, parent
121 may have died */
122 {
123 ipc_exit (0);
124 } /* if */
125
126 sleep(10); /* have another go later */
127 } /* while */
128 } /* if */
129
130 } /* ipc_spawn_watchdog */
131
132
133 /*
134 ipc_init -- initialize server, setting the global msqid that can be listened on.
135 */
136 void
137 ipc_init (struct msgbuf **msgpp)
138 {
139 key_t key; /* messge key */
140 char buf[GSERV_BUFSZ]; /* pathname for key */
141
142 sprintf (buf,"%s/gsrv%d",tmpdir,(int)geteuid ());
143 creat (buf,0600);
144 key = ftok (buf,1);
145
146 if ((ipc_qid = msgget (key,0600|IPC_CREAT)) == -1)
147 {
148 perror (progname);
149 fprintf (stderr, "%s: unable to create msg queue\n", progname);
150 ipc_exit (1);
151 } /* if */
152
153 ipc_spawn_watchdog ();
154
155 signal (SIGTERM,ipc_handle_signal);
156 signal (SIGINT,ipc_handle_signal);
157
158 if ((*msgpp = (struct msgbuf *)
159 malloc (sizeof **msgpp + GSERV_BUFSZ)) == NULL)
160 {
161 fprintf (stderr,
162 "%s: unable to allocate space for message buffer\n", progname);
163 ipc_exit(1);
164 } /* if */
165 } /* ipc_init */
166
167
168 /*
169 handle_ipc_request -- accept a request from a client, pass the request on
170 to the GNU Emacs process, then wait for its reply and
171 pass that on to the client.
172 */
173 void
174 handle_ipc_request (struct msgbuf *msgp)
175 {
176 struct msqid_ds msg_st; /* message status */
177 char buf[GSERV_BUFSZ];
178 int len; /* length of message / read */
179 int s, result_len; /* tag fields on the response from emacs */
180 int offset = 0;
181 int total = 1; /* # bytes that will actually be sent off */
182
183 if ((len = msgrcv (ipc_qid, msgp, GSERV_BUFSZ - 1, 1, 0)) < 0)
184 {
185 perror (progname);
186 fprintf (stderr, "%s: unable to receive\n", progname);
187 ipc_exit (1);
188 } /* if */
189
190 msgctl (ipc_qid, IPC_STAT, &msg_st);
191 strncpy (buf, msgp->mtext, len);
192 buf[len] = '\0'; /* terminate */
193
194 printf ("%d %s", ipc_qid, buf);
195 fflush (stdout);
196
197 /* now for the response from gnu */
198 msgp->mtext[0] = '\0';
199
200 #if 0
201 if ((len = read(0,buf,GSERV_BUFSZ-1)) < 0)
202 {
203 perror (progname);
204 fprintf (stderr, "%s: unable to read\n", progname);
205 ipc_exit (1);
206 } /* if */
207
208 sscanf (buf, "%d:%[^\n]\n", &junk, msgp->mtext);
209 #else
210
211 /* read in "n/m:" (n=client fd, m=message length) */
212
213 while (offset < (GSERV_BUFSZ-1) &&
214 ((len = read (0, buf + offset, 1)) > 0) &&
215 buf[offset] != ':')
216 {
217 offset += len;
218 }
219
220 if (len < 0)
221 {
222 perror (progname);
223 fprintf (stderr, "%s: unable to read\n", progname);
224 exit(1);
225 }
226
227 /* parse the response from emacs, getting client fd & result length */
228 buf[offset] = '\0';
229 sscanf (buf, "%d/%d", &s, &result_len);
230
231 while (result_len > 0)
232 {
233 if ((len = read(0, buf, min2 (result_len, GSERV_BUFSZ - 1))) < 0)
234 {
235 perror (progname);
236 fprintf (stderr, "%s: unable to read\n", progname);
237 exit (1);
238 }
239
240 /* Send this string off, but only if we have enough space */
241
242 if (GSERV_BUFSZ > total)
243 {
244 if (total + len <= GSERV_BUFSZ)
245 buf[len] = 0;
246 else
247 buf[GSERV_BUFSZ - total] = 0;
248
249 send_string(s,buf);
250 total += strlen(buf);
251 }
252
253 result_len -= len;
254 }
255
256 /* eat the newline */
257 while ((len = read (0,buf,1)) == 0)
258 ;
259 if (len < 0)
260 {
261 perror(progname);
262 fprintf (stderr,"%s: unable to read\n", progname);
263 exit (1);
264 }
265 if (buf[0] != '\n')
266 {
267 fprintf (stderr,"%s: garbage after result [%c]\n", progname, buf[0]);
268 exit (1);
269 }
270 #endif
271
272 /* Send a response back to the client. */
273
274 msgp->mtype = msg_st.msg_lspid;
275 if (msgsnd (ipc_qid,msgp,strlen(msgp->mtext)+1,0) < 0)
276 perror ("msgsend(gnuserv)");
277
278 } /* handle_ipc_request */
279 #endif /* SYSV_IPC */
280
281
282 #if defined(INTERNET_DOMAIN_SOCKETS) || defined(UNIX_DOMAIN_SOCKETS)
283 /*
284 echo_request -- read request from a given socket descriptor, and send the information
285 to stdout (the gnu process).
286 */
287 static void
288 echo_request (int s)
289 {
290 char buf[GSERV_BUFSZ];
291 int len;
292
293 printf("%d ",s);
294
295 /* read until we get a newline or no characters */
296 while ((len = recv(s,buf,GSERV_BUFSZ-1,0)) > 0) {
297 buf[len] = '\0';
298 printf("%s",buf);
299
300 if (buf[len-1] == EOT_CHR) {
301 fflush(stdout);
302 break; /* end of message */
303 }
304
305 } /* while */
306
307 if (len < 0) {
308 perror(progname);
309 fprintf(stderr,"%s: unable to recv\n",progname);
310 exit(1);
311 } /* if */
312
313 } /* echo_request */
314
315
316 /*
317 handle_response -- accept a response from stdin (the gnu process) and pass the
318 information on to the relevant client.
319 */
320 static void
321 handle_response (void)
322 {
323 char buf[GSERV_BUFSZ+1];
324 int offset=0;
325 int s;
326 int len = 0;
327 int result_len;
328
329 /* read in "n/m:" (n=client fd, m=message length) */
330 while (offset < GSERV_BUFSZ &&
331 ((len = read(0,buf+offset,1)) > 0) &&
332 buf[offset] != ':') {
333 offset += len;
334 }
335
336 if (len < 0) {
337 perror(progname);
338 fprintf(stderr,"%s: unable to read\n",progname);
339 exit(1);
340 }
341
342 /* parse the response from emacs, getting client fd & result length */
343 buf[offset] = '\0';
344 sscanf(buf,"%d/%d", &s, &result_len);
345
346 while (result_len > 0) {
347 if ((len = read(0,buf,min2(result_len,GSERV_BUFSZ))) < 0) {
348 perror(progname);
349 fprintf(stderr,"%s: unable to read\n",progname);
350 exit(1);
351 }
352 buf[len] = '\0';
353 send_string(s,buf);
354 result_len -= len;
355 }
356
357 /* eat the newline */
358 while ((len = read(0,buf,1)) == 0)
359 ;
360 if (len < 0)
361 {
362 perror(progname);
363 fprintf(stderr,"%s: unable to read\n",progname);
364 exit(1);
365 }
366 if (buf[0] != '\n')
367 {
368 fprintf(stderr,"%s: garbage after result\n",progname);
369 exit(1);
370 }
371 /* send the newline */
372 buf[1] = '\0';
373 send_string(s,buf);
374 close(s);
375
376 } /* handle_response */
377 #endif /* INTERNET_DOMAIN_SOCKETS || UNIX_DOMAIN_SOCKETS */
378
379
380 #ifdef INTERNET_DOMAIN_SOCKETS
381 struct entry {
382 u_long host_addr;
383 struct entry *next;
384 };
385
386 struct entry *permitted_hosts[TABLE_SIZE];
387
388 #ifdef AUTH_MAGIC_COOKIE
389 # include <X11/X.h>
390 # include <X11/Xauth.h>
391
392 static Xauth *server_xauth = NULL;
393 #endif
394
395 static int
396 timed_read (int fd, char *buf, int max, int timeout, int one_line)
397 {
398 fd_set rmask;
399 struct timeval tv; /* = {timeout, 0}; */
400 char c = 0;
401 int nbytes = 0;
402 int r;
403
404 tv.tv_sec = timeout;
405 tv.tv_usec = 0;
406
407 FD_ZERO(&rmask);
408 FD_SET(fd, &rmask);
409
410 do
411 {
412 r = select(fd + 1, &rmask, NULL, NULL, &tv);
413
414 if (r > 0)
415 {
416 if (read (fd, &c, 1) == 1 )
417 {
418 *buf++ = c;
419 ++nbytes;
420 }
421 else
422 {
423 printf ("read error on socket\004\n");
424 return -1;
425 }
426 }
427 else if (r == 0)
428 {
429 printf ("read timed out\004\n");
430 return -1;
431 }
432 else
433 {
434 printf ("error in select\004\n");
435 return -1;
436 }
437 } while ((nbytes < max) && !(one_line && (c == '\n')));
438
439 --buf;
440 if (one_line && *buf == '\n')
441 {
442 *buf = 0;
443 }
444
445 return nbytes;
446 }
447
448
449
450 /*
451 permitted -- return whether a given host is allowed to connect to the server.
452 */
453 static int
454 permitted (u_long host_addr, int fd)
455 {
456 int key;
457 struct entry *entry;
458
459 char auth_protocol[128];
460 char buf[1024];
461 int auth_data_len;
462
463 if (fd > 0)
464 {
465 /* we are checking permission on a real connection */
466
467 /* Read auth protocol name */
468
469 if (timed_read(fd, auth_protocol, AUTH_NAMESZ, AUTH_TIMEOUT, 1) <= 0)
470 return FALSE;
471
472 if (strcmp (auth_protocol, DEFAUTH_NAME) &&
473 strcmp (auth_protocol, MCOOKIE_NAME))
474 {
475 printf ("authentication protocol (%s) from client is invalid...\n",
476 auth_protocol);
477 printf ("... Was the client an old version of gnuclient/gnudoit?\004\n");
478
479 return FALSE;
480 }
481
482 if (!strcmp(auth_protocol, MCOOKIE_NAME))
483 {
484
485 /*
486 * doing magic cookie auth
487 */
488
489 if (timed_read(fd, buf, 10, AUTH_TIMEOUT, 1) <= 0)
490 return FALSE;
491
492 auth_data_len = atoi(buf);
493
494 if (timed_read(fd, buf, auth_data_len, AUTH_TIMEOUT, 0) != auth_data_len)
495 return FALSE;
496
497 #ifdef AUTH_MAGIC_COOKIE
498 if (server_xauth && server_xauth->data &&
499 !memcmp(buf, server_xauth->data, auth_data_len))
500 {
501 return TRUE;
502 }
503 #else
504 printf ("client tried Xauth, but server is not compiled with Xauth\n");
505 #endif
506
507 /*
508 * auth failed, but allow this to fall through to the GNU_SECURE
509 * protocol....
510 */
511
512 printf ("Xauth authentication failed, trying GNU_SECURE auth...\004\n");
513
514 }
515
516 /* Other auth protocols go here, and should execute only if the
517 * auth_protocol name matches.
518 */
519
520 }
521
522
523 /* Now, try the old GNU_SECURE stuff... */
524
525 /* First find the hash key */
526 key = HASH(host_addr) % TABLE_SIZE;
527
528 /* Now check the chain for that hash key */
529 for(entry=permitted_hosts[key]; entry != NULL; entry=entry->next)
530 if (host_addr == entry->host_addr)
531 return(TRUE);
532
533 return(FALSE);
534
535 } /* permitted */
536
537
538 /*
539 add_host -- add the given host to the list of permitted hosts, provided it isn't
540 already there.
541 */
542 static void
543 add_host (u_long host_addr)
544 {
545 int key;
546 struct entry *new_entry;
547
548 if (!permitted(host_addr, -1))
549 {
550 if ((new_entry = (struct entry *) malloc(sizeof(struct entry))) == NULL) {
551 fprintf(stderr,"%s: unable to malloc space for permitted host entry\n",
552 progname);
553 exit(1);
554 } /* if */
555
556 new_entry->host_addr = host_addr;
557 key = HASH(host_addr) % TABLE_SIZE;
558 new_entry->next = permitted_hosts[key];
559 permitted_hosts[key] = new_entry;
560 } /* if */
561
562 } /* add_host */
563
564
565 /*
566 setup_table -- initialize the table of hosts allowed to contact the server,
567 by reading from the file specified by the GNU_SECURE
568 environment variable
569 Put in the local machine, and, if a security file is specifed,
570 add each host that is named in the file.
571 Return the number of hosts added.
572 */
573 static int
574 setup_table (void)
575 {
576 FILE *host_file;
577 char *file_name;
578 char hostname[HOSTNAMSZ];
579 u_int host_addr;
580 int i, hosts=0;
581
582 /* Make sure every entry is null */
583 for (i=0; i<TABLE_SIZE; i++)
584 permitted_hosts[i] = NULL;
585
586 gethostname(hostname,HOSTNAMSZ);
587
588 if ((host_addr = internet_addr(hostname)) == -1)
589 {
590 fprintf(stderr,"%s: unable to find %s in /etc/hosts or from YP",
591 progname,hostname);
592 exit(1);
593 } /* if */
594
595 #ifdef AUTH_MAGIC_COOKIE
596
597 server_xauth = XauGetAuthByAddr (FamilyInternet,
598 sizeof(host_addr), (char *)&host_addr,
599 strlen(MCOOKIE_SCREEN), MCOOKIE_SCREEN,
600 strlen(MCOOKIE_X_NAME), MCOOKIE_X_NAME);
601 hosts++;
602
603 #endif /* AUTH_MAGIC_COOKIE */
604
605
606 #if 0 /* Don't even want to allow access from the local host by default */
607 add_host(host_addr); /* add local host */
608 #endif
609
610 if (((file_name = getenv("GNU_SECURE")) != NULL && /* security file */
611 (host_file = fopen(file_name,"r")) != NULL)) /* opened ok */
612 {
613 while ((fscanf(host_file,"%s",hostname) != EOF)) /* find a host */
614 if ((host_addr = internet_addr(hostname)) != -1)/* get its addr */
615 {
616 add_host(host_addr); /* add the addr */
617 hosts++;
618 }
619 fclose(host_file);
620 } /* if */
621
622 return hosts;
623 } /* setup_table */
624
625
626 /*
627 internet_init -- initialize server, returning an internet socket that can
628 be listened on.
629 */
630 static int
631 internet_init (void)
632 {
633 int ls; /* socket descriptor */
634 struct servent *sp; /* pointer to service information */
635 struct sockaddr_in server; /* for local socket address */
636 char *ptr; /* ptr to return from getenv */
637
638 if (setup_table() == 0)
639 return -1;
640
641 /* clear out address structure */
642 memset((char *)&server,0,sizeof(struct sockaddr_in));
643
644 /* Set up address structure for the listen socket. */
645 server.sin_family = AF_INET;
646 server.sin_addr.s_addr = INADDR_ANY;
647
648 /* Find the information for the gnu server
649 * in order to get the needed port number.
650 */
651 if ((ptr=getenv("GNU_PORT")) != NULL)
652 server.sin_port = htons(atoi(ptr));
653 else if ((sp = getservbyname ("gnuserv", "tcp")) == NULL)
654 server.sin_port = htons(DEFAULT_PORT+getuid());
655 else
656 server.sin_port = sp->s_port;
657
658 /* Create the listen socket. */
659 if ((ls = socket (AF_INET,SOCK_STREAM, 0)) == -1)
660 {
661 perror(progname);
662 fprintf(stderr,"%s: unable to create socket\n",progname);
663 exit(1);
664 } /* if */
665
666 /* Bind the listen address to the socket. */
667 if (bind(ls,(struct sockaddr *) &server,sizeof(struct sockaddr_in)) == -1)
668 {
669 perror(progname);
670 fprintf(stderr,"%s: unable to bind socket\n",progname);
671 exit(1);
672 } /* if */
673
674 /* Initiate the listen on the socket so remote users
675 * can connect.
676 */
677 if (listen(ls,20) == -1)
678 {
679 perror(progname);
680 fprintf(stderr,"%s: unable to listen\n",progname);
681 exit(1);
682 } /* if */
683
684 return(ls);
685
686 } /* internet_init */
687
688
689 /*
690 handle_internet_request -- accept a request from a client and send the information
691 to stdout (the gnu process).
692 */
693 static void
694 handle_internet_request (int ls)
695 {
696 int s;
697 size_t addrlen = sizeof(struct sockaddr_in);
698 struct sockaddr_in peer; /* for peer socket address */
699
700 memset((char *)&peer,0,sizeof(struct sockaddr_in));
701
702 if ((s = accept(ls,(struct sockaddr *)&peer, (void *) &addrlen)) == -1)
703 {
704 perror(progname);
705 fprintf(stderr,"%s: unable to accept\n",progname);
706 exit(1);
707 } /* if */
708
709 /* Check that access is allowed - if not return crud to the client */
710 if (!permitted(peer.sin_addr.s_addr, s))
711 {
712 send_string(s,"gnudoit: Connection refused\ngnudoit: unable to connect to remote");
713 close(s);
714
715 printf("Refused connection from %s\004\n", inet_ntoa(peer.sin_addr));
716 return;
717 } /* if */
718
719 echo_request(s);
720
721 } /* handle_internet_request */
722 #endif /* INTERNET_DOMAIN_SOCKETS */
723
724
725 #ifdef UNIX_DOMAIN_SOCKETS
726 /*
727 unix_init -- initialize server, returning an unix-domain socket that can
728 be listened on.
729 */
730 static int
731 unix_init (void)
732 {
733 int ls; /* socket descriptor */
734 struct sockaddr_un server; /* unix socket address */
735 int bindlen;
736
737 if ((ls = socket(AF_UNIX,SOCK_STREAM, 0)) < 0)
738 {
739 perror(progname);
740 fprintf(stderr,"%s: unable to create socket\n",progname);
741 exit(1);
742 } /* if */
743
744 /* Set up address structure for the listen socket. */
745 #ifdef HIDE_UNIX_SOCKET
746 sprintf(server.sun_path,"%s/gsrvdir%d",tmpdir,(int)geteuid());
747 if (mkdir(server.sun_path, 0700) < 0)
748 {
749 /* assume it already exists, and try to set perms */
750 if (chmod(server.sun_path, 0700) < 0)
751 {
752 perror(progname);
753 fprintf(stderr,"%s: can't set permissions on %s\n",
754 progname, server.sun_path);
755 exit(1);
756 }
757 }
758 strcat(server.sun_path,"/gsrv");
759 unlink(server.sun_path); /* remove old file if it exists */
760 #else /* HIDE_UNIX_SOCKET */
761 sprintf(server.sun_path,"%s/gsrv%d",tmpdir,(int)geteuid());
762 unlink(server.sun_path); /* remove old file if it exists */
763 #endif /* HIDE_UNIX_SOCKET */
764
765 server.sun_family = AF_UNIX;
766 #ifdef HAVE_SOCKADDR_SUN_LEN
767 /* See W. R. Stevens "Advanced Programming in the Unix Environment"
768 p. 502 */
769 bindlen = (sizeof (server.sun_len) + sizeof (server.sun_family)
770 + strlen (server.sun_path) + 1);
771 server.sun_len = bindlen;
772 #else
773 bindlen = strlen (server.sun_path) + sizeof (server.sun_family);
774 #endif
775
776 if (bind(ls,(struct sockaddr *)&server,bindlen) < 0)
777 {
778 perror(progname);
779 fprintf(stderr,"%s: unable to bind socket\n",progname);
780 exit(1);
781 } /* if */
782
783 chmod(server.sun_path,0700); /* only this user can send commands */
784
785 if (listen(ls,20) < 0) {
786 perror(progname);
787 fprintf(stderr,"%s: unable to listen\n",progname);
788 exit(1);
789 } /* if */
790
791 /* #### there are also better ways of dealing with this when
792 sigvec() is present. */
793 #if defined (HAVE_SIGPROCMASK)
794 {
795 sigset_t _mask;
796 sigemptyset (&_mask);
797 sigaddset (&_mask, SIGPIPE);
798 sigprocmask (SIG_BLOCK, &_mask, NULL);
799 }
800 #else
801 signal(SIGPIPE,SIG_IGN); /* in case user kills client */
802 #endif
803
804 return(ls);
805
806 } /* unix_init */
807
808
809 /*
810 handle_unix_request -- accept a request from a client and send the information
811 to stdout (the gnu process).
812 */
813 static void
814 handle_unix_request (int ls)
815 {
816 int s;
817 size_t len = sizeof(struct sockaddr_un);
818 struct sockaddr_un server; /* for unix socket address */
819
820 server.sun_family = AF_UNIX;
821
822 if ((s = accept(ls,(struct sockaddr *)&server, (void *)&len)) < 0)
823 {
824 perror(progname);
825 fprintf(stderr,"%s: unable to accept\n",progname);
826 } /* if */
827
828 echo_request(s);
829
830 } /* handle_unix_request */
831 #endif /* UNIX_DOMAIN_SOCKETS */
832
833
834 int
835 main (int argc, char *argv[])
836 {
837 int chan; /* temporary channel number */
838 #ifdef SYSV_IPC
839 struct msgbuf *msgp; /* message buffer */
840 #else
841 int ils = -1; /* internet domain listen socket */
842 int uls = -1; /* unix domain listen socket */
843 #endif /* SYSV_IPC */
844
845 progname = argv[0];
846
847 for(chan=3; chan < _NFILE; close(chan++)) /* close unwanted channels */
848 ;
849
850 #ifdef USE_TMPDIR
851 tmpdir = getenv("TMPDIR");
852 #endif
853 if (!tmpdir)
854 tmpdir = "/tmp";
855 #ifdef USE_LITOUT
856 {
857 /* this is to allow ^D to pass to emacs */
858 int d = LLITOUT;
859 (void) ioctl(fileno(stdout), TIOCLBIS, &d);
860 }
861 #endif
862
863 #ifdef SYSV_IPC
864 ipc_init(&msgp); /* get a msqid to listen on, and a message buffer */
865 #endif /* SYSV_IPC */
866
867 #ifdef INTERNET_DOMAIN_SOCKETS
868 ils = internet_init(); /* get an internet domain socket to listen on */
869 #endif /* INTERNET_DOMAIN_SOCKETS */
870
871 #ifdef UNIX_DOMAIN_SOCKETS
872 uls = unix_init(); /* get a unix domain socket to listen on */
873 #endif /* UNIX_DOMAIN_SOCKETS */
874
875 while (1) {
876 #ifdef SYSV_IPC
877 handle_ipc_request(msgp);
878 #else /* NOT SYSV_IPC */
879 fd_set rmask;
880 FD_ZERO(&rmask);
881 FD_SET(fileno(stdin), &rmask);
882 if (uls >= 0)
883 FD_SET(uls, &rmask);
884 if (ils >= 0)
885 FD_SET(ils, &rmask);
886
887 if (select(max2(fileno(stdin),max2(uls,ils)) + 1, &rmask,
888 (fd_set *)NULL, (fd_set *)NULL, (struct timeval *)NULL) < 0)
889 {
890 perror(progname);
891 fprintf(stderr,"%s: unable to select\n",progname);
892 exit(1);
893 } /* if */
894
895 #ifdef UNIX_DOMAIN_SOCKETS
896 if (uls > 0 && FD_ISSET(uls, &rmask))
897 handle_unix_request(uls);
898 #endif
899
900 #ifdef INTERNET_DOMAIN_SOCKETS
901 if (ils > 0 && FD_ISSET(ils, &rmask))
902 handle_internet_request(ils);
903 #endif /* INTERNET_DOMAIN_SOCKETS */
904
905 if (FD_ISSET(fileno(stdin), &rmask)) /* from stdin (gnu process) */
906 handle_response();
907 #endif /* NOT SYSV_IPC */
908 } /* while */
909
910 return 0;
911 } /* main */
912
913 #endif /* SYSV_IPC || UNIX_DOMAIN_SOCKETS || INTERNET_DOMAIN_SOCKETS */