| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224 |
- /**
- * @file BUnixSignal.c
- * @author Ambroz Bizjak <ambrop7@gmail.com>
- *
- * @section LICENSE
- *
- * This file is part of BadVPN.
- *
- * BadVPN is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2
- * as published by the Free Software Foundation.
- *
- * BadVPN is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along
- * with this program; if not, write to the Free Software Foundation, Inc.,
- * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
- */
- #include <inttypes.h>
- #include <stdlib.h>
- #include <limits.h>
- #include <errno.h>
- #include <fcntl.h>
- #ifdef BADVPN_USE_SIGNALFD
- #include <sys/signalfd.h>
- #endif
- #include <misc/balloc.h>
- #include <system/BLog.h>
- #include <system/BUnixSignal.h>
- #include <generated/blog_channel_BUnixSignal.h>
- #define BUNIXSIGNAL_MAX_SIGNALS 64
- #ifdef BADVPN_USE_SIGNALFD
- static void signalfd_handler (BUnixSignal *o, int events)
- {
- DebugObject_Access(&o->d_obj);
-
- // read a signal
- struct signalfd_siginfo siginfo;
- int bytes = read(o->signalfd_fd, &siginfo, sizeof(siginfo));
- if (bytes < 0) {
- int error = errno;
- if (error == EAGAIN || error == EWOULDBLOCK) {
- return;
- }
- BLog(BLOG_ERROR, "read failed (%d)", error);
- return;
- }
- ASSERT_FORCE(bytes == sizeof(siginfo))
-
- // check signal
- if (siginfo.ssi_signo > INT_MAX) {
- BLog(BLOG_ERROR, "read returned out of int range signo (%"PRIu32")", siginfo.ssi_signo);
- return;
- }
- int signo = siginfo.ssi_signo;
- if (sigismember(&o->signals, signo) <= 0) {
- BLog(BLOG_ERROR, "read returned wrong signo (%d)", signo);
- return;
- }
-
- BLog(BLOG_DEBUG, "dispatching signal %d", signo);
-
- // call handler
- o->handler(o->user, signo);
- return;
- }
- #endif
- #ifdef BADVPN_USE_KEVENT
- static void kevent_handler (struct BUnixSignal_kevent_entry *entry, u_int fflags, intptr_t data)
- {
- BUnixSignal *o = entry->parent;
- DebugObject_Access(&o->d_obj);
-
- // call signal
- o->handler(o->user, entry->signo);
- return;
- }
- #endif
- int BUnixSignal_Init (BUnixSignal *o, BReactor *reactor, sigset_t signals, BUnixSignal_handler handler, void *user)
- {
- // init arguments
- o->reactor = reactor;
- o->signals = signals;
- o->handler = handler;
- o->user = user;
-
- #ifdef BADVPN_USE_SIGNALFD
-
- // init signalfd fd
- if ((o->signalfd_fd = signalfd(-1, &o->signals, 0)) < 0) {
- BLog(BLOG_ERROR, "signalfd failed");
- goto fail0;
- }
-
- // set non-blocking
- if (fcntl(o->signalfd_fd, F_SETFL, O_NONBLOCK) < 0) {
- DEBUG("cannot set non-blocking");
- goto fail1;
- }
-
- // init signalfd BFileDescriptor
- BFileDescriptor_Init(&o->signalfd_bfd, o->signalfd_fd, (BFileDescriptor_handler)signalfd_handler, o);
- if (!BReactor_AddFileDescriptor(o->reactor, &o->signalfd_bfd)) {
- BLog(BLOG_ERROR, "BReactor_AddFileDescriptor failed");
- goto fail1;
- }
- BReactor_SetFileDescriptorEvents(o->reactor, &o->signalfd_bfd, BREACTOR_READ);
-
- #endif
-
- #ifdef BADVPN_USE_KEVENT
-
- // count signals
- int num_signals = 0;
- for (int i = 0; i < BUNIXSIGNAL_MAX_SIGNALS; i++) {
- if (!sigismember(&o->signals, i)) {
- continue;
- }
- num_signals++;
- }
-
- // allocate array
- if (!(o->entries = BAllocArray(num_signals, sizeof(o->entries[0])))) {
- BLog(BLOG_ERROR, "BAllocArray failed");
- goto fail0;
- }
-
- // init kevents
- o->num_entries = 0;
- for (int i = 0; i < BUNIXSIGNAL_MAX_SIGNALS; i++) {
- if (!sigismember(&o->signals, i)) {
- continue;
- }
- struct BUnixSignal_kevent_entry *entry = &o->entries[o->num_entries];
- entry->parent = o;
- entry->signo = i;
- if (!BReactorKEvent_Init(&entry->kevent, o->reactor, (BReactorKEvent_handler)kevent_handler, entry, entry->signo, EVFILT_SIGNAL, 0, 0)) {
- BLog(BLOG_ERROR, "BReactorKEvent_Init failed");
- goto fail2;
- }
- o->num_entries++;
- }
-
- #endif
-
- // block signals
- if (sigprocmask(SIG_BLOCK, &o->signals, 0) < 0) {
- BLog(BLOG_ERROR, "sigprocmask block failed");
- goto fail2;
- }
-
- DebugObject_Init(&o->d_obj);
-
- return 1;
-
- #ifdef BADVPN_USE_SIGNALFD
- fail2:
- BReactor_RemoveFileDescriptor(o->reactor, &o->signalfd_bfd);
- fail1:
- ASSERT_FORCE(close(o->signalfd_fd) == 0)
- #endif
-
- #ifdef BADVPN_USE_KEVENT
- fail2:
- while (o->num_entries > 0) {
- BReactorKEvent_Free(&o->entries[o->num_entries - 1].kevent);
- o->num_entries--;
- }
- BFree(o->entries);
- #endif
-
- fail0:
- return 0;
- }
- void BUnixSignal_Free (BUnixSignal *o, int unblock)
- {
- ASSERT(unblock == 0 || unblock == 1)
- DebugObject_Free(&o->d_obj);
-
- if (unblock) {
- // unblock signals
- ASSERT_FORCE(sigprocmask(SIG_UNBLOCK, &o->signals, 0) == 0)
- }
-
- #ifdef BADVPN_USE_SIGNALFD
-
- // free signalfd BFileDescriptor
- BReactor_RemoveFileDescriptor(o->reactor, &o->signalfd_bfd);
-
- // free signalfd fd
- ASSERT_FORCE(close(o->signalfd_fd) == 0)
-
- #endif
-
- #ifdef BADVPN_USE_KEVENT
-
- // free kevents
- while (o->num_entries > 0) {
- BReactorKEvent_Free(&o->entries[o->num_entries - 1].kevent);
- o->num_entries--;
- }
-
- // free array
- BFree(o->entries);
-
- #endif
- }
|