120 lines
2.5 KiB
C
120 lines
2.5 KiB
C
/* blackhole.c - eats incoming messages, does nothing, just for testing
|
|
* @BAKE cc -O2 -std=gnu89 -Wall -Wextra -Wpedantic $@ -o $*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <errno.h>
|
|
#include <string.h>
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netdb.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/wait.h>
|
|
#include <signal.h>
|
|
|
|
#define PORT "91991"
|
|
#define BACKLOG 1
|
|
|
|
void sigchld_handler(int s) {
|
|
int saved_errno = errno;
|
|
(void)s;
|
|
while(waitpid(-1, NULL, WNOHANG) > 0);
|
|
errno = saved_errno;
|
|
}
|
|
|
|
void *get_in_addr(struct sockaddr *sa) {
|
|
if (sa->sa_family == AF_INET) {
|
|
return &(((struct sockaddr_in*)sa)->sin_addr);
|
|
}
|
|
|
|
return &(((struct sockaddr_in6*)sa)->sin6_addr);
|
|
}
|
|
|
|
int main (void) {
|
|
int sockfd, connfd, rv, yes = 1;
|
|
struct addrinfo hints, *servinfo, *p;
|
|
struct sockaddr_storage their_addr;
|
|
char s[INET6_ADDRSTRLEN];
|
|
socklen_t sin_size;
|
|
struct sigaction sa;
|
|
|
|
memset(&hints, 0, sizeof hints);
|
|
hints.ai_family = AF_UNSPEC;
|
|
hints.ai_socktype = SOCK_STREAM;
|
|
hints.ai_flags = AI_PASSIVE;
|
|
|
|
if ((rv = getaddrinfo(NULL, PORT, &hints, &servinfo)) != 0) {
|
|
fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(rv));
|
|
return 1;
|
|
}
|
|
|
|
for(p = servinfo; p != NULL; p = p->ai_next) {
|
|
if ((sockfd = socket(p->ai_family, p->ai_socktype,
|
|
p->ai_protocol)) == -1) {
|
|
perror("server: socket");
|
|
continue;
|
|
}
|
|
if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &yes,
|
|
sizeof(int)) == -1) {
|
|
perror("setsockopt");
|
|
exit(1);
|
|
}
|
|
if (bind(sockfd, p->ai_addr, p->ai_addrlen) == -1) {
|
|
close(sockfd);
|
|
perror("server: bind");
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
|
|
freeaddrinfo(servinfo);
|
|
|
|
if (p == NULL) {
|
|
fprintf(stderr, "server: failed to bind\n");
|
|
exit(1);
|
|
}
|
|
|
|
if (listen(sockfd, BACKLOG) == -1) {
|
|
perror("listen");
|
|
exit(1);
|
|
}
|
|
|
|
sa.sa_handler = sigchld_handler;
|
|
sigemptyset(&sa.sa_mask);
|
|
sa.sa_flags = SA_RESTART;
|
|
if (sigaction(SIGCHLD, &sa, NULL) == -1) {
|
|
perror("sigaction");
|
|
exit(1);
|
|
}
|
|
|
|
printf("server: waiting for connections...\n");
|
|
|
|
while (1) {
|
|
sin_size = sizeof their_addr;
|
|
connfd = accept(sockfd, (struct sockaddr *)&their_addr, &sin_size);
|
|
|
|
if (connfd == -1) {
|
|
perror("accept");
|
|
continue;
|
|
}
|
|
|
|
inet_ntop(their_addr.ss_family, get_in_addr((struct sockaddr *)&their_addr), s, sizeof s);
|
|
|
|
printf("server: got connection from %s\n", s);
|
|
|
|
if (!fork()) {
|
|
close(sockfd);
|
|
while (1) { sleep(5); }
|
|
close(connfd);
|
|
exit(0);
|
|
}
|
|
close(connfd);
|
|
}
|
|
close(sockfd);
|
|
sockfd = -1;
|
|
return 0;
|
|
}
|