]> git.ipfire.org Git - thirdparty/squid.git/blame - src/ipc_win32.cc
SourceFormat Enforcement
[thirdparty/squid.git] / src / ipc_win32.cc
CommitLineData
b5d712b5 1/*
bde978a6 2 * Copyright (C) 1996-2015 The Squid Software Foundation and contributors
b5d712b5 3 *
bbc27441
AJ
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
b5d712b5 7 */
8
bbc27441
AJ
9/* DEBUG: section 54 Windows Interprocess Communication */
10
582c2af2 11#include "squid.h"
8a01b99e 12#include "cache_cf.h"
b5d712b5 13#include "comm.h"
e802a427 14#include "comm/Connection.h"
c4ad1349 15#include "fd.h"
b5d712b5 16#include "fde.h"
e802a427 17#include "globals.h"
a13c93d1
C
18#include "ip/Address.h"
19#include "rfc1738.h"
4d5904f7 20#include "SquidConfig.h"
96097880 21#include "SquidIpc.h"
b5d712b5 22#include "SquidTime.h"
a8e49d54 23#include "tools.h"
b5d712b5 24
1a30fdf5 25#include <cerrno>
e802a427 26#if HAVE_MSWSOCK_H
b5d712b5 27#include <mswsock.h>
28#endif
29#include <process.h>
30
26ac0430 31struct ipc_params {
b5d712b5 32 int type;
33 int crfd;
34 int cwfd;
b7ac5457 35 Ip::Address local_addr;
cc192b50 36 struct addrinfo PS;
b5d712b5 37 const char *prog;
38 char **args;
39};
40
26ac0430 41struct thread_params {
b5d712b5 42 int type;
43 int rfd;
44 int send_fd;
45 const char *prog;
46 pid_t pid;
47};
48
49static unsigned int __stdcall ipc_thread_1(void *params);
50static unsigned int __stdcall ipc_thread_2(void *params);
51
52static const char *ok_string = "OK\n";
53static const char *err_string = "ERR\n";
54static const char *shutdown_string = "$shutdown\n";
55
56static const char *hello_string = "hi there\n";
57#define HELLO_BUF_SZ 32
58static char hello_buf[HELLO_BUF_SZ];
59
60static int
61ipcCloseAllFD(int prfd, int pwfd, int crfd, int cwfd)
62{
63 if (prfd >= 0)
64 comm_close(prfd);
65
66 if (prfd != pwfd)
67 if (pwfd >= 0)
68 comm_close(pwfd);
69
70 if (crfd >= 0)
71 comm_close(crfd);
72
73 if (crfd != cwfd)
74 if (cwfd >= 0)
75 comm_close(cwfd);
76
77 return -1;
78}
79
80static void
81PutEnvironment()
82{
83#if HAVE_PUTENV
84 char *env_str;
85 int tmp_s;
62493678
AJ
86 env_str = (char *)xcalloc((tmp_s = strlen(Debug::debugOptions) + 32), 1);
87 snprintf(env_str, tmp_s, "SQUID_DEBUG=%s", Debug::debugOptions);
b5d712b5 88 putenv(env_str);
89#endif
90}
91
92pid_t
b7ac5457 93ipcCreate(int type, const char *prog, const char *const args[], const char *name, Ip::Address &local_addr, int *rfd, int *wfd, void **hIpc)
b5d712b5 94{
95 unsigned long thread;
96
97 struct ipc_params params;
98 int opt;
99 int optlen = sizeof(opt);
100 DWORD ecode = 0;
101 pid_t pid;
102
b7ac5457 103 Ip::Address tmp_addr;
cc192b50 104 struct addrinfo *aiCS = NULL;
105 struct addrinfo *aiPS = NULL;
b5d712b5 106
b5d712b5 107 int crfd = -1;
108 int prfd = -1;
109 int cwfd = -1;
110 int pwfd = -1;
b5d712b5 111 int x;
112
113 requirePathnameExists(name, prog);
114
115 if (rfd)
116 *rfd = -1;
117
118 if (wfd)
119 *wfd = -1;
120
121 if (hIpc)
122 *hIpc = NULL;
123
124 if (WIN32_OS_version != _WIN_OS_WINNT) {
125 getsockopt(INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE, (char *) &opt, &optlen);
126 opt = opt & ~(SO_SYNCHRONOUS_NONALERT | SO_SYNCHRONOUS_ALERT);
127 setsockopt(INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE, (char *) &opt, sizeof(opt));
128 }
129
130 if (type == IPC_TCP_SOCKET) {
131 crfd = cwfd = comm_open(SOCK_STREAM,
132 IPPROTO_TCP,
133 local_addr,
b5d712b5 134 COMM_NOCLOEXEC,
135 name);
136 prfd = pwfd = comm_open(SOCK_STREAM,
f53969cc 137 IPPROTO_TCP, /* protocol */
b5d712b5 138 local_addr,
f53969cc 139 0, /* blocking */
b5d712b5 140 name);
141 } else if (type == IPC_UDP_SOCKET) {
142 crfd = cwfd = comm_open(SOCK_DGRAM,
143 IPPROTO_UDP,
144 local_addr,
b5d712b5 145 COMM_NOCLOEXEC,
146 name);
147 prfd = pwfd = comm_open(SOCK_DGRAM,
148 IPPROTO_UDP,
149 local_addr,
150 0,
b5d712b5 151 name);
152 } else if (type == IPC_FIFO) {
fa84c01d 153 debugs(54, DBG_CRITICAL, "ipcCreate: " << prog << ": use IPC_TCP_SOCKET instead of IP_FIFO on Windows");
b5d712b5 154 assert(0);
155 } else {
156 assert(IPC_NONE);
157 }
158
bf8fe701 159 debugs(54, 3, "ipcCreate: prfd FD " << prfd);
160 debugs(54, 3, "ipcCreate: pwfd FD " << pwfd);
161 debugs(54, 3, "ipcCreate: crfd FD " << crfd);
162 debugs(54, 3, "ipcCreate: cwfd FD " << cwfd);
b5d712b5 163
164 if (WIN32_OS_version != _WIN_OS_WINNT) {
165 getsockopt(INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE, (char *) &opt, &optlen);
166 opt = opt | SO_SYNCHRONOUS_NONALERT;
167 setsockopt(INVALID_SOCKET, SOL_SOCKET, SO_OPENTYPE, (char *) &opt, optlen);
168 }
169
170 if (crfd < 0) {
fa84c01d 171 debugs(54, DBG_CRITICAL, "ipcCreate: Failed to create child FD.");
b5d712b5 172 return ipcCloseAllFD(prfd, pwfd, crfd, cwfd);
173 }
174
175 if (pwfd < 0) {
fa84c01d 176 debugs(54, DBG_CRITICAL, "ipcCreate: Failed to create server FD.");
b5d712b5 177 return ipcCloseAllFD(prfd, pwfd, crfd, cwfd);
178 }
179
cc192b50 180// AYJ: these flags should be neutral, but if not IPv6 version needs adding
b5d712b5 181 if (type == IPC_TCP_SOCKET || type == IPC_UDP_SOCKET) {
b5d712b5 182
851614a8 183 Ip::Address::InitAddr(aiPS);
cc192b50 184
185 if (getsockname(pwfd, aiPS->ai_addr, &(aiPS->ai_addrlen) ) < 0) {
fa84c01d 186 debugs(54, DBG_CRITICAL, "ipcCreate: getsockname: " << xstrerror());
851614a8 187 Ip::Address::FreeAddr(aiPS);
b5d712b5 188 return ipcCloseAllFD(prfd, pwfd, crfd, cwfd);
189 }
190
cc192b50 191 tmp_addr = *aiPS;
851614a8 192 Ip::Address::FreeAddr(aiPS);
cc192b50 193
194 debugs(54, 3, "ipcCreate: FD " << pwfd << " sockaddr " << tmp_addr );
b5d712b5 195
851614a8 196 Ip::Address::InitAddr(aiCS);
cc192b50 197
198 if (getsockname(crfd, aiCS->ai_addr, &(aiCS->ai_addrlen) ) < 0) {
fa84c01d 199 debugs(54, DBG_CRITICAL, "ipcCreate: getsockname: " << xstrerror());
851614a8 200 Ip::Address::FreeAddr(aiCS);
b5d712b5 201 return ipcCloseAllFD(prfd, pwfd, crfd, cwfd);
202 }
203
4dd643d5 204 tmp_addr.setEmpty();
cc192b50 205 tmp_addr = *aiCS;
851614a8 206 Ip::Address::FreeAddr(aiCS);
cc192b50 207
208 debugs(54, 3, "ipcCreate: FD " << crfd << " sockaddr " << tmp_addr );
b5d712b5 209 }
210
211 if (type == IPC_TCP_SOCKET) {
212 if (listen(crfd, 1) < 0) {
e0236918 213 debugs(54, DBG_IMPORTANT, "ipcCreate: listen FD " << crfd << ": " << xstrerror());
b5d712b5 214 return ipcCloseAllFD(prfd, pwfd, crfd, cwfd);
215 }
216
bf8fe701 217 debugs(54, 3, "ipcCreate: FD " << crfd << " listening...");
b5d712b5 218 }
219
220 /* flush or else we get dup data if unbuffered_logs is set */
221 logsFlush();
222
223 params.type = type;
224
225 params.crfd = crfd;
226
227 params.cwfd = cwfd;
228
cc192b50 229 params.PS = *aiPS;
26ac0430 230
cc192b50 231 params.local_addr = local_addr;
b5d712b5 232
233 params.prog = prog;
234
235 params.args = (char **) args;
236
237 thread = _beginthreadex(NULL, 0, ipc_thread_1, &params, 0, NULL);
238
239 if (thread == 0) {
e0236918 240 debugs(54, DBG_IMPORTANT, "ipcCreate: _beginthread: " << xstrerror());
b5d712b5 241 return ipcCloseAllFD(prfd, pwfd, crfd, cwfd);
242 }
243
b7ac5457 244 /* NP: tmp_addr was left with eiether empty or aiCS in Ip::Address format */
4ee57cbe 245 if (comm_connect_addr(pwfd, tmp_addr) == Comm::COMM_ERROR) {
b5d712b5 246 CloseHandle((HANDLE) thread);
247 return ipcCloseAllFD(prfd, pwfd, -1, -1);
248 }
249
250 memset(hello_buf, '\0', HELLO_BUF_SZ);
251 x = recv(prfd, (void *)hello_buf, HELLO_BUF_SZ - 1, 0);
252
253 if (x < 0) {
fa84c01d
FC
254 debugs(54, DBG_CRITICAL, "ipcCreate: PARENT: hello read test failed");
255 debugs(54, DBG_CRITICAL, "--> read: " << xstrerror());
b5d712b5 256 CloseHandle((HANDLE) thread);
257 return ipcCloseAllFD(prfd, pwfd, -1, -1);
258 } else if (strcmp(hello_buf, hello_string)) {
fa84c01d
FC
259 debugs(54, DBG_CRITICAL, "ipcCreate: PARENT: hello read test failed");
260 debugs(54, DBG_CRITICAL, "--> read returned " << x);
261 debugs(54, DBG_CRITICAL, "--> got '" << rfc1738_escape(hello_buf) << "'");
b5d712b5 262 CloseHandle((HANDLE) thread);
263 return ipcCloseAllFD(prfd, pwfd, -1, -1);
264 }
265
266 x = send(pwfd, (const void *)ok_string, strlen(ok_string), 0);
267
268 if (x < 0) {
fa84c01d
FC
269 debugs(54, DBG_CRITICAL, "ipcCreate: PARENT: OK write test failed");
270 debugs(54, DBG_CRITICAL, "--> read: " << xstrerror());
b5d712b5 271 CloseHandle((HANDLE) thread);
272 return ipcCloseAllFD(prfd, pwfd, -1, -1);
273 }
274
275 memset(hello_buf, '\0', HELLO_BUF_SZ);
276 x = recv(prfd, (void *)hello_buf, HELLO_BUF_SZ - 1, 0);
277
278 if (x < 0) {
fa84c01d
FC
279 debugs(54, DBG_CRITICAL, "ipcCreate: PARENT: OK read test failed");
280 debugs(54, DBG_CRITICAL, "--> read: " << xstrerror());
b5d712b5 281 CloseHandle((HANDLE) thread);
282 return ipcCloseAllFD(prfd, pwfd, -1, -1);
283 } else if (!strcmp(hello_buf, err_string)) {
fa84c01d
FC
284 debugs(54, DBG_CRITICAL, "ipcCreate: PARENT: OK read test failed");
285 debugs(54, DBG_CRITICAL, "--> read returned " << x);
286 debugs(54, DBG_CRITICAL, "--> got '" << rfc1738_escape(hello_buf) << "'");
b5d712b5 287 CloseHandle((HANDLE) thread);
288 return ipcCloseAllFD(prfd, pwfd, -1, -1);
289 }
290
291 hello_buf[x] = '\0';
292 pid = atol(hello_buf);
933dd095 293 commUnsetFdTimeout(prfd);
b5d712b5 294 commSetNonBlocking(prfd);
295 commSetNonBlocking(pwfd);
296 commSetCloseOnExec(prfd);
297 commSetCloseOnExec(pwfd);
298
299 if (rfd)
300 *rfd = prfd;
301
302 if (wfd)
303 *wfd = pwfd;
304
be4d35dc
FC
305 fd_table[prfd].flags.ipc = true;
306 fd_table[pwfd].flags.ipc = true;
307 fd_table[crfd].flags.ipc = true;
308 fd_table[cwfd].flags.ipc = true;
b5d712b5 309
310 if (Config.sleep_after_fork) {
311 /* XXX emulation of usleep() */
312 DWORD sl;
313 sl = Config.sleep_after_fork / 1000;
314
315 if (sl == 0)
316 sl = 1;
317
318 Sleep(sl);
319 }
320
321 if (GetExitCodeThread((HANDLE) thread, &ecode) && ecode == STILL_ACTIVE) {
322 if (hIpc)
323 *hIpc = (HANDLE) thread;
324
325 return pid;
326 } else {
327 CloseHandle((HANDLE) thread);
328 return ipcCloseAllFD(prfd, pwfd, -1, -1);
329 }
330}
331
332static int
333ipcSend(int cwfd, const char *buf, int len)
334{
335 int x;
336
337 x = send(cwfd, (const void *)buf, len, 0);
338
339 if (x < 0) {
fa84c01d
FC
340 debugs(54, DBG_CRITICAL, "sendto FD " << cwfd << ": " << xstrerror());
341 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: hello write test failed");
b5d712b5 342 }
343
344 return x;
345}
346
347static unsigned int __stdcall
348ipc_thread_1(void *in_params)
349{
350 int t1, t2, t3, retval = -1;
26ac0430
AJ
351 int p2c[2] = {-1, -1};
352 int c2p[2] = {-1, -1};
b5d712b5 353 HANDLE hProcess = NULL, thread = NULL;
354 pid_t pid = -1;
355
356 struct thread_params thread_params;
357 ssize_t x;
cc192b50 358 int fd = -1;
b5d712b5 359 char *str;
360 STARTUPINFO si;
361 PROCESS_INFORMATION pi;
362 long F;
363 int prfd_ipc = -1, pwfd_ipc = -1, crfd_ipc = -1, cwfd_ipc = -1;
364 char *prog = NULL, *buf1 = NULL;
365
b7ac5457
AJ
366 Ip::Address PS_ipc;
367 Ip::Address CS_ipc;
cc192b50 368 struct addrinfo *aiPS_ipc = NULL;
369 struct addrinfo *aiCS_ipc = NULL;
b5d712b5 370
371 struct ipc_params *params = (struct ipc_params *) in_params;
372 int type = params->type;
373 int crfd = params->crfd;
374 int cwfd = params->cwfd;
375 char **args = params->args;
376
b7ac5457
AJ
377 Ip::Address PS = params->PS;
378 Ip::Address local_addr = params->local_addr;
26ac0430 379
e802a427
AJ
380 const size_t bufSz = 8192;
381 buf1 = (char *)xcalloc(1, bufSz);
b5d712b5 382 strcpy(buf1, params->prog);
383 prog = strtok(buf1, w_space);
384
385 if ((str = strrchr(prog, '/')))
386 prog = ++str;
387
388 if ((str = strrchr(prog, '\\')))
389 prog = ++str;
390
391 prog = xstrdup(prog);
392
393 if (type == IPC_TCP_SOCKET) {
bf8fe701 394 debugs(54, 3, "ipcCreate: calling accept on FD " << crfd);
b5d712b5 395
396 if ((fd = accept(crfd, NULL, NULL)) < 0) {
fa84c01d 397 debugs(54, DBG_CRITICAL, "ipcCreate: FD " << crfd << " accept: " << xstrerror());
b5d712b5 398 goto cleanup;
399 }
400
bf8fe701 401 debugs(54, 3, "ipcCreate: CHILD accepted new FD " << fd);
b5d712b5 402 comm_close(crfd);
e802a427 403 snprintf(buf1, bufSz-1, "%s CHILD socket", prog);
b5d712b5 404 fd_open(fd, FD_SOCKET, buf1);
405 fd_table[fd].flags.ipc = 1;
406 cwfd = crfd = fd;
407 } else if (type == IPC_UDP_SOCKET) {
4ee57cbe 408 if (comm_connect_addr(crfd, params->PS) == Comm::COMM_ERROR)
b5d712b5 409 goto cleanup;
410 }
411
412 x = send(cwfd, (const void *)hello_string, strlen(hello_string) + 1, 0);
413
414 if (x < 0) {
fa84c01d
FC
415 debugs(54, DBG_CRITICAL, "sendto FD " << cwfd << ": " << xstrerror());
416 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: hello write test failed");
b5d712b5 417 goto cleanup;
418 }
419
420 PutEnvironment();
e802a427
AJ
421 memset(buf1, '\0', bufSz);
422 x = recv(crfd, (void *)buf1, bufSz-1, 0);
b5d712b5 423
424 if (x < 0) {
fa84c01d
FC
425 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: OK read test failed");
426 debugs(54, DBG_CRITICAL, "--> read: " << xstrerror());
b5d712b5 427 goto cleanup;
428 } else if (strcmp(buf1, ok_string)) {
fa84c01d
FC
429 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: OK read test failed");
430 debugs(54, DBG_CRITICAL, "--> read returned " << x);
431 debugs(54, DBG_CRITICAL, "--> got '" << rfc1738_escape(hello_buf) << "'");
b5d712b5 432 goto cleanup;
433 }
434
435 /* assign file descriptors to child process */
436 if (_pipe(p2c, 1024, _O_BINARY | _O_NOINHERIT) < 0) {
fa84c01d 437 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: pipe: " << xstrerror());
b5d712b5 438 ipcSend(cwfd, err_string, strlen(err_string));
439 goto cleanup;
440 }
441
442 if (_pipe(c2p, 1024, _O_BINARY | _O_NOINHERIT) < 0) {
fa84c01d 443 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: pipe: " << xstrerror());
b5d712b5 444 ipcSend(cwfd, err_string, strlen(err_string));
445 goto cleanup;
446 }
447
448 if (type == IPC_UDP_SOCKET) {
e802a427 449 snprintf(buf1, bufSz, "%s(%ld) <-> ipc CHILD socket", prog, -1L);
cc192b50 450 crfd_ipc = cwfd_ipc = comm_open(SOCK_DGRAM, IPPROTO_UDP, local_addr, 0, buf1);
b5d712b5 451
452 if (crfd_ipc < 0) {
fa84c01d 453 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: Failed to create child FD for " << prog << ".");
b5d712b5 454 ipcSend(cwfd, err_string, strlen(err_string));
455 goto cleanup;
456 }
457
e802a427 458 snprintf(buf1, bufSz, "%s(%ld) <-> ipc PARENT socket", prog, -1L);
cc192b50 459 prfd_ipc = pwfd_ipc = comm_open(SOCK_DGRAM, IPPROTO_UDP, local_addr, 0, buf1);
b5d712b5 460
461 if (pwfd_ipc < 0) {
fa84c01d 462 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: Failed to create server FD for " << prog << ".");
b5d712b5 463 ipcSend(cwfd, err_string, strlen(err_string));
464 goto cleanup;
465 }
466
851614a8 467 Ip::Address::InitAddr(aiPS_ipc);
b5d712b5 468
cc192b50 469 if (getsockname(pwfd_ipc, aiPS_ipc->ai_addr, &(aiPS_ipc->ai_addrlen)) < 0) {
fa84c01d 470 debugs(54, DBG_CRITICAL, "ipcCreate: getsockname: " << xstrerror());
b5d712b5 471 ipcSend(cwfd, err_string, strlen(err_string));
851614a8 472 Ip::Address::FreeAddr(aiPS_ipc);
b5d712b5 473 goto cleanup;
474 }
475
cc192b50 476 PS_ipc = *aiPS_ipc;
851614a8 477 Ip::Address::FreeAddr(aiPS_ipc);
cc192b50 478
479 debugs(54, 3, "ipcCreate: FD " << pwfd_ipc << " sockaddr " << PS_ipc);
bf8fe701 480
851614a8 481 Ip::Address::InitAddr(aiCS_ipc);
b5d712b5 482
cc192b50 483 if (getsockname(crfd_ipc, aiCS_ipc->ai_addr, &(aiCS_ipc->ai_addrlen)) < 0) {
fa84c01d 484 debugs(54, DBG_CRITICAL, "ipcCreate: getsockname: " << xstrerror());
b5d712b5 485 ipcSend(cwfd, err_string, strlen(err_string));
851614a8 486 Ip::Address::FreeAddr(aiCS_ipc);
b5d712b5 487 goto cleanup;
488 }
489
cc192b50 490 CS_ipc = *aiCS_ipc;
851614a8 491 Ip::Address::FreeAddr(aiCS_ipc);
cc192b50 492
493 debugs(54, 3, "ipcCreate: FD " << crfd_ipc << " sockaddr " << CS_ipc);
b5d712b5 494
4ee57cbe 495 if (comm_connect_addr(pwfd_ipc, CS_ipc) == Comm::COMM_ERROR) {
b5d712b5 496 ipcSend(cwfd, err_string, strlen(err_string));
497 goto cleanup;
498 }
499
500 fd = crfd;
501
4ee57cbe 502 if (comm_connect_addr(crfd_ipc, PS_ipc) == Comm::COMM_ERROR) {
b5d712b5 503 ipcSend(cwfd, err_string, strlen(err_string));
504 goto cleanup;
505 }
f53969cc 506 } /* IPC_UDP_SOCKET */
b5d712b5 507
508 t1 = dup(0);
509
510 t2 = dup(1);
511
512 t3 = dup(2);
513
514 dup2(c2p[0], 0);
515
516 dup2(p2c[1], 1);
517
518 dup2(fileno(debug_log), 2);
519
520 close(c2p[0]);
521
522 close(p2c[1]);
523
524 commUnsetNonBlocking(fd);
525
526 memset(&si, 0, sizeof(STARTUPINFO));
527
528 si.cb = sizeof(STARTUPINFO);
529
530 si.hStdInput = (HANDLE) _get_osfhandle(0);
531
532 si.hStdOutput = (HANDLE) _get_osfhandle(1);
533
534 si.hStdError = (HANDLE) _get_osfhandle(2);
535
536 si.dwFlags = STARTF_USESTDHANDLES;
537
538 /* Make sure all other valid handles are not inerithable */
95dc7ff4 539 for (x = 3; x < Squid_MaxFD; ++x) {
b5d712b5 540 if ((F = _get_osfhandle(x)) == -1)
541 continue;
542
543 SetHandleInformation((HANDLE) F, HANDLE_FLAG_INHERIT, 0);
544 }
545
546 *buf1 = '\0';
547 strcpy(buf1 + 4096, params->prog);
548 str = strtok(buf1 + 4096, w_space);
549
550 do {
551 strcat(buf1, str);
552 strcat(buf1, " ");
553 } while ((str = strtok(NULL, w_space)));
554
555 x = 1;
556
557 while (args[x]) {
f412b2d6
FC
558 strcat(buf1, args[x]);
559 ++x;
b5d712b5 560 strcat(buf1, " ");
561 }
562
563 if (CreateProcess(buf1 + 4096, buf1, NULL, NULL, TRUE, CREATE_NO_WINDOW,
564 NULL, NULL, &si, &pi)) {
565 pid = pi.dwProcessId;
566 hProcess = pi.hProcess;
567 } else {
568 pid = -1;
979f3ae6 569 x = GetLastError();
b5d712b5 570 }
571
572 dup2(t1, 0);
573 dup2(t2, 1);
574 dup2(t3, 2);
575 close(t1);
576 close(t2);
577 close(t3);
578
579 if (pid == -1) {
580 errno = x;
fa84c01d 581 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << params->prog << ": " << xstrerror());
bf8fe701 582
b5d712b5 583 ipcSend(cwfd, err_string, strlen(err_string));
584 goto cleanup;
585 }
586
587 if (type == IPC_UDP_SOCKET) {
588 WSAPROTOCOL_INFO wpi;
589
590 memset(&wpi, 0, sizeof(wpi));
591
592 if (SOCKET_ERROR == WSADuplicateSocket(crfd_ipc, pid, &wpi)) {
fa84c01d 593 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: WSADuplicateSocket: " << xstrerror());
bf8fe701 594
b5d712b5 595 ipcSend(cwfd, err_string, strlen(err_string));
596 goto cleanup;
597 }
598
599 x = write(c2p[1], (const char *) &wpi, sizeof(wpi));
600
601 if (x < (ssize_t)sizeof(wpi)) {
fa84c01d
FC
602 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: write FD " << c2p[1] << ": " << xstrerror());
603 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << prog << ": socket exchange failed");
bf8fe701 604
b5d712b5 605 ipcSend(cwfd, err_string, strlen(err_string));
606 goto cleanup;
607 }
608
e802a427 609 x = read(p2c[0], buf1, bufSz-1);
b5d712b5 610
611 if (x < 0) {
fa84c01d
FC
612 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: read FD " << p2c[0] << ": " << xstrerror());
613 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << prog << ": socket exchange failed");
bf8fe701 614
b5d712b5 615 ipcSend(cwfd, err_string, strlen(err_string));
616 goto cleanup;
617 } else if (strncmp(buf1, ok_string, strlen(ok_string))) {
fa84c01d
FC
618 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << prog << ": socket exchange failed");
619 debugs(54, DBG_CRITICAL, "--> read returned " << x);
b5d712b5 620 buf1[x] = '\0';
fa84c01d 621 debugs(54, DBG_CRITICAL, "--> got '" << rfc1738_escape(buf1) << "'");
b5d712b5 622 ipcSend(cwfd, err_string, strlen(err_string));
623 goto cleanup;
624 }
625
626 x = write(c2p[1], (const char *) &PS_ipc, sizeof(PS_ipc));
627
628 if (x < (ssize_t)sizeof(PS_ipc)) {
fa84c01d
FC
629 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: write FD " << c2p[1] << ": " << xstrerror());
630 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << prog << ": socket exchange failed");
bf8fe701 631
b5d712b5 632 ipcSend(cwfd, err_string, strlen(err_string));
633 goto cleanup;
634 }
635
e802a427 636 x = read(p2c[0], buf1, bufSz-1);
b5d712b5 637
638 if (x < 0) {
fa84c01d
FC
639 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: read FD " << p2c[0] << ": " << xstrerror());
640 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << prog << ": socket exchange failed");
bf8fe701 641
b5d712b5 642 ipcSend(cwfd, err_string, strlen(err_string));
643 goto cleanup;
644 } else if (strncmp(buf1, ok_string, strlen(ok_string))) {
fa84c01d
FC
645 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: " << prog << ": socket exchange failed");
646 debugs(54, DBG_CRITICAL, "--> read returned " << x);
b5d712b5 647 buf1[x] = '\0';
fa84c01d 648 debugs(54, DBG_CRITICAL, "--> got '" << rfc1738_escape(buf1) << "'");
b5d712b5 649 ipcSend(cwfd, err_string, strlen(err_string));
650 goto cleanup;
651 }
652
653 x = send(pwfd_ipc, (const void *)ok_string, strlen(ok_string), 0);
e802a427 654 x = recv(prfd_ipc, (void *)(buf1 + 200), bufSz -1 - 200, 0);
b5d712b5 655 assert((size_t) x == strlen(ok_string)
656 && !strncmp(ok_string, buf1 + 200, strlen(ok_string)));
f53969cc 657 } /* IPC_UDP_SOCKET */
b5d712b5 658
e802a427 659 snprintf(buf1, bufSz-1, "%s(%ld) CHILD socket", prog, (long int) pid);
b5d712b5 660
661 fd_note(fd, buf1);
662
663 if (prfd_ipc != -1) {
e802a427 664 snprintf(buf1, bufSz-1, "%s(%ld) <-> ipc CHILD socket", prog, (long int) pid);
b5d712b5 665 fd_note(crfd_ipc, buf1);
e802a427 666 snprintf(buf1, bufSz-1, "%s(%ld) <-> ipc PARENT socket", prog, (long int) pid);
b5d712b5 667 fd_note(prfd_ipc, buf1);
668 }
669
670 /* else { IPC_TCP_SOCKET */
671 /* commSetNoLinger(fd); */
672 /* } */
673 thread_params.prog = prog;
674
675 thread_params.send_fd = cwfd;
676
677 thread_params.pid = pid;
678
679 if ((thread_params.type = type) == IPC_TCP_SOCKET)
680 thread_params.rfd = p2c[0];
681 else
682 thread_params.rfd = prfd_ipc;
683
6ca34f6f 684 thread = (HANDLE)_beginthreadex(NULL, 0, ipc_thread_2, &thread_params, 0, NULL);
b5d712b5 685
686 if (!thread) {
fa84c01d 687 debugs(54, DBG_CRITICAL, "ipcCreate: CHILD: _beginthreadex: " << xstrerror());
b5d712b5 688 ipcSend(cwfd, err_string, strlen(err_string));
689 goto cleanup;
690 }
691
e802a427 692 snprintf(buf1, bufSz-1, "%ld\n", (long int) pid);
b5d712b5 693
694 if (-1 == ipcSend(cwfd, buf1, strlen(buf1)))
695 goto cleanup;
696
26ac0430 697 debugs(54, 2, "ipc(" << prog << "," << pid << "): started successfully");
b5d712b5 698
699 /* cycle */
700 for (;;) {
e802a427 701 x = recv(crfd, (void *)buf1, bufSz-1, 0);
b5d712b5 702
703 if (x <= 0) {
bf8fe701 704 debugs(54, 3, "ipc(" << prog << "," << pid << "): " << x << " bytes received from parent. Exiting...");
b5d712b5 705 break;
706 }
707
708 buf1[x] = '\0';
709
710 if (type == IPC_UDP_SOCKET && !strcmp(buf1, shutdown_string)) {
bf8fe701 711 debugs(54, 3, "ipc(" << prog << "," << pid << "): request for shutdown received from parent. Exiting...");
712
b5d712b5 713 TerminateProcess(hProcess, 0);
714 break;
715 }
716
bf8fe701 717 debugs(54, 5, "ipc(" << prog << "," << pid << "): received from parent: " << rfc1738_escape_unescaped(buf1));
b5d712b5 718
719 if (type == IPC_TCP_SOCKET)
720 x = write(c2p[1], buf1, x);
721 else
722 x = send(pwfd_ipc, (const void *)buf1, x, 0);
723
724 if (x <= 0) {
bf8fe701 725 debugs(54, 3, "ipc(" << prog << "," << pid << "): " << x << " bytes written to " << prog << ". Exiting...");
726
b5d712b5 727 break;
728 }
729 }
730
731 retval = 0;
732
733cleanup:
734
735 if (c2p[1] != -1)
736 close(c2p[1]);
737
738 if (fd_table[crfd].flags.open)
739 ipcCloseAllFD(-1, -1, crfd, cwfd);
740
741 if (prfd_ipc != -1) {
742 send(crfd_ipc, (const void *)shutdown_string, strlen(shutdown_string), 0);
743 shutdown(crfd_ipc, SD_BOTH);
744 shutdown(prfd_ipc, SD_BOTH);
745 }
746
747 ipcCloseAllFD(prfd_ipc, pwfd_ipc, crfd_ipc, cwfd_ipc);
748
749 if (hProcess && WAIT_OBJECT_0 !=
750 WaitForSingleObject(hProcess, type == IPC_UDP_SOCKET ? 12000 : 5000)) {
751
752 getCurrentTime();
fa84c01d 753 debugs(54, DBG_CRITICAL, "ipc(" << prog << "," << pid << "): WARNING: " << prog <<
bf8fe701 754 " didn't exit in " << (type == IPC_UDP_SOCKET ? 12 : 5) << " seconds.");
755
b5d712b5 756 }
757
758 if (thread && WAIT_OBJECT_0 != WaitForSingleObject(thread, 3000)) {
759 getCurrentTime();
fa84c01d 760 debugs(54, DBG_CRITICAL, "ipc(" << prog << "," << pid << "): WARNING: ipc_thread_2 didn't exit in 3 seconds.");
bf8fe701 761
b5d712b5 762 }
763
764 getCurrentTime();
765
766 if (!retval)
bf8fe701 767 debugs(54, 2, "ipc(" << prog << "," << pid << "): normal exit");
b5d712b5 768
e802a427
AJ
769 xfree(buf1);
770 xfree(prog);
b5d712b5 771
772 if (thread)
773 CloseHandle(thread);
774
775 if (hProcess)
776 CloseHandle(hProcess);
777
778 if (p2c[0] != -1)
779 close(p2c[0]);
780
781 return retval;
782}
783
784static unsigned int __stdcall
785ipc_thread_2(void *in_params)
786{
787 int x;
788
789 struct thread_params *params = (struct thread_params *) in_params;
790 int type = params->type;
791 int rfd = params->rfd;
792 int send_fd = params->send_fd;
793 char *prog = xstrdup(params->prog);
794 pid_t pid = params->pid;
e802a427
AJ
795 const size_t bufSz = 8192;
796 char *buf2 = (char *)xcalloc(1, bufSz);
b5d712b5 797
798 for (;;) {
799 if (type == IPC_TCP_SOCKET)
e802a427 800 x = read(rfd, buf2, bufSz-1);
b5d712b5 801 else
e802a427 802 x = recv(rfd, (void *)buf2, bufSz-1, 0);
b5d712b5 803
804 if ((x <= 0 && type == IPC_TCP_SOCKET) ||
805 (x < 0 && type == IPC_UDP_SOCKET)) {
bf8fe701 806 debugs(54, 3, "ipc(" << prog << "," << pid << "): " << x << " bytes read from " << prog << ". Exiting...");
807
b5d712b5 808 break;
809 }
810
811 buf2[x] = '\0';
812
813 if (type == IPC_UDP_SOCKET && !strcmp(buf2, shutdown_string)) {
bf8fe701 814 debugs(54, 3, "ipc(" << prog << "," << pid << "): request for shutdown received. Exiting...");
b5d712b5 815 break;
816 }
817
818 if (x >= 2) {
819 if ((buf2[x - 1] == '\n') && (buf2[x - 2] == '\r')) {
820 buf2[x - 2] = '\n';
821 buf2[x - 1] = '\0';
5e263176 822 --x;
b5d712b5 823 }
824 }
825
bf8fe701 826 debugs(54, 5, "ipc(" << prog << "," << pid << "): received from child : " << rfc1738_escape_unescaped(buf2));
827
b5d712b5 828 x = send(send_fd, (const void *)buf2, x, 0);
829
830 if ((x <= 0 && type == IPC_TCP_SOCKET) ||
831 (x < 0 && type == IPC_UDP_SOCKET)) {
bf8fe701 832 debugs(54, 3, "ipc(" << prog << "," << pid << "): " << x << " bytes sent to parent. Exiting...");
833
b5d712b5 834 break;
835 }
836 }
837
838 xfree(prog);
839 xfree(buf2);
840 return 0;
841}
f53969cc 842