tinc/src/net.c

528 lines
13 KiB
C
Raw Normal View History

2019-08-26 11:44:36 +00:00
/*
net.c -- most of the network code
2019-08-26 11:44:37 +00:00
Copyright (C) 1998-2005 Ivo Timmermans,
2019-08-26 11:44:52 +00:00
2000-2017 Guus Sliepen <guus@tinc-vpn.org>
2019-08-26 11:44:38 +00:00
2006 Scott Lamb <slamb@slamb.org>
2019-08-26 11:44:49 +00:00
2011 Loïc Grenié <loic.grenie@gmail.com>
2019-08-26 11:44:36 +00:00
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
2019-08-26 11:44:38 +00:00
You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
2019-08-26 11:44:36 +00:00
*/
2019-08-26 11:44:36 +00:00
#include "system.h"
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:52 +00:00
#include "autoconnect.h"
2019-08-26 11:44:36 +00:00
#include "conf.h"
#include "connection.h"
2019-08-26 11:44:36 +00:00
#include "device.h"
#include "graph.h"
#include "logger.h"
2019-08-26 11:44:36 +00:00
#include "meta.h"
2019-08-26 11:44:50 +00:00
#include "names.h"
2019-08-26 11:44:36 +00:00
#include "net.h"
#include "netutl.h"
#include "protocol.h"
2019-08-26 11:44:36 +00:00
#include "subnet.h"
2019-08-26 11:44:52 +00:00
#include "utils.h"
2019-08-26 11:44:36 +00:00
#include "xalloc.h"
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:40 +00:00
int contradicting_add_edge = 0;
int contradicting_del_edge = 0;
2019-08-26 11:44:41 +00:00
static int sleeptime = 10;
2019-08-26 11:44:49 +00:00
time_t last_config_check = 0;
2019-08-26 11:44:51 +00:00
static timeout_t pingtimer;
static timeout_t periodictimer;
static struct timeval last_periodic_run_time;
2019-08-26 11:44:36 +00:00
/* Purge edges and subnets of unreachable nodes. Use carefully. */
2019-08-26 11:44:49 +00:00
void purge(void) {
2019-08-26 11:44:49 +00:00
logger(DEBUG_PROTOCOL, LOG_DEBUG, "Purging unreachable nodes");
2019-08-26 11:44:36 +00:00
/* Remove all edges and subnets owned by unreachable nodes. */
2019-08-26 11:44:49 +00:00
for splay_each(node_t, n, node_tree) {
2019-08-26 11:44:36 +00:00
if(!n->status.reachable) {
2019-08-26 11:44:49 +00:00
logger(DEBUG_SCARY_THINGS, LOG_DEBUG, "Purging node %s (%s)", n->name, n->hostname);
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
for splay_each(subnet_t, s, n->subnet_tree) {
send_del_subnet(everyone, s);
2019-08-26 11:44:53 +00:00
if(!strictsubnets) {
2019-08-26 11:44:40 +00:00
subnet_del(n, s);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:49 +00:00
for splay_each(edge_t, e, n->edge_tree) {
2019-08-26 11:44:53 +00:00
if(!tunnelserver) {
2019-08-26 11:44:49 +00:00
send_del_edge(everyone, e);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
edge_del(e);
}
}
}
/* Check if anyone else claims to have an edge to an unreachable node. If not, delete node. */
2019-08-26 11:44:49 +00:00
for splay_each(node_t, n, node_tree) {
2019-08-26 11:44:36 +00:00
if(!n->status.reachable) {
2019-08-26 11:44:49 +00:00
for splay_each(edge_t, e, edge_weight_tree)
2019-08-26 11:44:53 +00:00
if(e->to == n) {
2019-08-26 11:44:49 +00:00
return;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:50 +00:00
if(!autoconnect && (!strictsubnets || !n->subnet_tree->head))
2019-08-26 11:44:40 +00:00
/* in strictsubnets mode do not delete nodes with subnets */
2019-08-26 11:44:53 +00:00
{
2019-08-26 11:44:36 +00:00
node_del(n);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:48 +00:00
}
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:53 +00:00
/* Put a misbehaving connection in the tarpit */
void tarpit(int fd) {
static int pits[10] = {-1, -1, -1, -1, -1, -1, -1, -1, -1, -1};
static unsigned int next_pit = 0;
if(pits[next_pit] != -1) {
closesocket(pits[next_pit]);
}
pits[next_pit++] = fd;
if(next_pit >= sizeof pits / sizeof pits[0]) {
next_pit = 0;
}
}
2019-08-26 11:44:36 +00:00
/*
Terminate a connection:
2019-08-26 11:44:49 +00:00
- Mark it as inactive
- Remove the edge representing this connection
- Kill it with fire
2019-08-26 11:44:36 +00:00
- Check if we need to retry making an outgoing connection
*/
2019-08-26 11:44:38 +00:00
void terminate_connection(connection_t *c, bool report) {
2019-08-26 11:44:49 +00:00
logger(DEBUG_CONNECTIONS, LOG_NOTICE, "Closing connection with %s (%s)", c->name, c->hostname);
2019-08-26 11:44:36 +00:00
if(c->node) {
2019-08-26 11:44:53 +00:00
if(c->node->connection == c) {
c->node->connection = NULL;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
if(c->edge) {
2019-08-26 11:44:53 +00:00
if(report && !tunnelserver) {
send_del_edge(everyone, c->edge);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
edge_del(c->edge);
c->edge = NULL;
2019-08-26 11:44:36 +00:00
/* Run MST and SSSP algorithms */
2019-08-26 11:44:36 +00:00
graph();
2019-08-26 11:44:36 +00:00
/* If the node is not reachable anymore but we remember it had an edge to us, clean it up */
2019-08-26 11:44:36 +00:00
if(report && !c->node->status.reachable) {
edge_t *e;
e = lookup_edge(c->node, myself);
2019-08-26 11:44:53 +00:00
if(e) {
2019-08-26 11:44:53 +00:00
if(!tunnelserver) {
send_del_edge(everyone, e);
2019-08-26 11:44:53 +00:00
}
edge_del(e);
}
2019-08-26 11:44:36 +00:00
}
}
}
2019-08-26 11:44:49 +00:00
outgoing_t *outgoing = c->outgoing;
connection_del(c);
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
/* Check if this was our outgoing connection */
2019-08-26 11:44:44 +00:00
2019-08-26 11:44:53 +00:00
if(outgoing) {
2019-08-26 11:44:49 +00:00
do_outgoing_connection(outgoing);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:51 +00:00
#ifndef HAVE_MINGW
/* Clean up dead proxy processes */
while(waitpid(-1, NULL, WNOHANG) > 0);
2019-08-26 11:44:53 +00:00
2019-08-26 11:44:51 +00:00
#endif
2019-08-26 11:44:36 +00:00
}
/*
Check if the other end is active.
If we have sent packets, but didn't receive any,
then possibly the other end is dead. We send a
PING request over the meta connection. If the other
end does not reply in time, we consider them dead
and close the connection.
*/
2019-08-26 11:44:50 +00:00
static void timeout_handler(void *data) {
bool close_all_connections = false;
/*
2019-08-26 11:44:53 +00:00
timeout_handler will start after 30 seconds from start of tincd
hold information about the elapsed time since last time the handler
has been run
*/
long sleep_time = now.tv_sec - last_periodic_run_time.tv_sec;
2019-08-26 11:44:53 +00:00
/*
2019-08-26 11:44:53 +00:00
It seems that finding sane default value is harder than expected
Since we send every second a UDP packet to make holepunching work
And default UDP state expire on firewalls is between 15-30 seconds
we drop all connections after 60 Seconds - UDPDiscoveryTimeout=30
by default
*/
2019-08-26 11:44:53 +00:00
if(sleep_time > 2 * udp_discovery_timeout) {
logger(DEBUG_ALWAYS, LOG_ERR, "Awaking from dead after %ld seconds of sleep", sleep_time);
/*
2019-08-26 11:44:53 +00:00
Do not send any packets to tinc after we wake up.
The other node probably closed our connection but we still
are holding context information to them. This may happen on
laptops or any other hardware which can be suspended for some time.
Sending any data to node that wasn't expecting it will produce
annoying and misleading errors on the other side about failed signature
verification and or about missing sptps context
*/
close_all_connections = true;
}
2019-08-26 11:44:53 +00:00
last_periodic_run_time = now;
2019-08-26 11:44:49 +00:00
for list_each(connection_t, c, connection_list) {
// control connections (eg. tinc ctl) do not have any timeout
2019-08-26 11:44:53 +00:00
if(c->status.control) {
2019-08-26 11:44:49 +00:00
continue;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
if(close_all_connections) {
logger(DEBUG_ALWAYS, LOG_ERR, "Forcing connection close after sleep time %s (%s)", c->name, c->hostname);
2019-08-26 11:44:51 +00:00
terminate_connection(c, c->edge);
continue;
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:52 +00:00
// Bail out early if we haven't reached the ping timeout for this node yet
2019-08-26 11:44:53 +00:00
if(c->last_ping_time + pingtimeout > now.tv_sec) {
continue;
2019-08-26 11:44:53 +00:00
}
// timeout during connection establishing
if(!c->edge) {
2019-08-26 11:44:53 +00:00
if(c->status.connecting) {
logger(DEBUG_CONNECTIONS, LOG_WARNING, "Timeout while connecting to %s (%s)", c->name, c->hostname);
2019-08-26 11:44:53 +00:00
} else {
logger(DEBUG_CONNECTIONS, LOG_WARNING, "Timeout from %s (%s) during authentication", c->name, c->hostname);
2019-08-26 11:44:53 +00:00
c->status.tarpit = true;
}
terminate_connection(c, c->edge);
continue;
}
// helps in UDP holepunching
try_tx(c->node, false);
// timeout during ping
if(c->status.pinged) {
2019-08-26 11:44:52 +00:00
logger(DEBUG_CONNECTIONS, LOG_INFO, "%s (%s) didn't respond to PING in %ld seconds", c->name, c->hostname, (long)(now.tv_sec - c->last_ping_time));
terminate_connection(c, c->edge);
continue;
}
// check whether we need to send a new ping
2019-08-26 11:44:53 +00:00
if(c->last_ping_time + pinginterval <= now.tv_sec) {
send_ping(c);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:53 +00:00
timeout_set(data, &(struct timeval) {
1, rand() % 100000
});
2019-08-26 11:44:50 +00:00
}
static void periodic_handler(void *data) {
/* Check if there are too many contradicting ADD_EDGE and DEL_EDGE messages.
This usually only happens when another node has the same Name as this node.
If so, sleep for a short while to prevent a storm of contradicting messages.
*/
2019-08-26 11:44:49 +00:00
if(contradicting_del_edge > 100 && contradicting_add_edge > 100) {
2019-08-26 11:44:49 +00:00
logger(DEBUG_ALWAYS, LOG_WARNING, "Possible node with same Name as us! Sleeping %d seconds.", sleeptime);
2019-08-26 11:44:53 +00:00
nanosleep(&(struct timespec) {
sleeptime, 0
}, NULL);
2019-08-26 11:44:49 +00:00
sleeptime *= 2;
2019-08-26 11:44:53 +00:00
if(sleeptime < 0) {
2019-08-26 11:44:49 +00:00
sleeptime = 3600;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
} else {
sleeptime /= 2;
2019-08-26 11:44:53 +00:00
if(sleeptime < 10) {
2019-08-26 11:44:49 +00:00
sleeptime = 10;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:49 +00:00
contradicting_add_edge = 0;
contradicting_del_edge = 0;
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:50 +00:00
/* If AutoConnect is set, check if we need to make or break connections. */
2019-08-26 11:44:53 +00:00
if(autoconnect && node_tree->count > 1) {
2019-08-26 11:44:52 +00:00
do_autoconnect();
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:50 +00:00
2019-08-26 11:44:53 +00:00
timeout_set(data, &(struct timeval) {
5, rand() % 100000
});
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:50 +00:00
void handle_meta_connection_data(connection_t *c) {
2019-08-26 11:44:53 +00:00
if(!receive_meta(c)) {
if(!c->status.control) {
c->status.tarpit = true;
}
2019-08-26 11:44:51 +00:00
terminate_connection(c, c->edge);
2019-08-26 11:44:49 +00:00
return;
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:50 +00:00
#ifndef HAVE_MINGW
2019-08-26 11:44:50 +00:00
static void sigterm_handler(void *data) {
logger(DEBUG_ALWAYS, LOG_NOTICE, "Got %s signal", strsignal(((signal_t *)data)->signum));
event_exit();
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:50 +00:00
static void sighup_handler(void *data) {
logger(DEBUG_ALWAYS, LOG_NOTICE, "Got %s signal", strsignal(((signal_t *)data)->signum));
2019-08-26 11:44:49 +00:00
reopenlogger();
2019-08-26 11:44:53 +00:00
if(reload_configuration()) {
2019-08-26 11:44:51 +00:00
exit(1);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:50 +00:00
static void sigalrm_handler(void *data) {
logger(DEBUG_ALWAYS, LOG_NOTICE, "Got %s signal", strsignal(((signal_t *)data)->signum));
2019-08-26 11:44:49 +00:00
retry();
}
2019-08-26 11:44:50 +00:00
#endif
2019-08-26 11:44:41 +00:00
2019-08-26 11:44:49 +00:00
int reload_configuration(void) {
2019-08-26 11:44:52 +00:00
char fname[PATH_MAX];
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
/* Reread our own configuration file */
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:49 +00:00
exit_configuration(&config_tree);
init_configuration(&config_tree);
2019-08-26 11:44:41 +00:00
2019-08-26 11:44:49 +00:00
if(!read_server_config()) {
2019-08-26 11:44:51 +00:00
logger(DEBUG_ALWAYS, LOG_ERR, "Unable to reread configuration file.");
2019-08-26 11:44:49 +00:00
return EINVAL;
}
2019-08-26 11:44:41 +00:00
2019-08-26 11:44:49 +00:00
read_config_options(config_tree, NULL);
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:53 +00:00
snprintf(fname, sizeof(fname), "%s" SLASH "hosts" SLASH "%s", confbase, myself->name);
read_config_file(config_tree, fname, true);
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
/* Parse some options that are allowed to be changed while tinc is running */
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
setup_myself_reloadable();
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
/* If StrictSubnet is set, expire deleted Subnets and read new ones in */
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
if(strictsubnets) {
for splay_each(subnet_t, subnet, subnet_tree)
2019-08-26 11:44:53 +00:00
if(subnet->owner) {
2019-08-26 11:44:51 +00:00
subnet->expires = 1;
2019-08-26 11:44:53 +00:00
}
}
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:53 +00:00
for splay_each(node_t, n, node_tree) {
n->status.has_address = false;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
load_all_nodes();
if(strictsubnets) {
2019-08-26 11:44:49 +00:00
for splay_each(subnet_t, subnet, subnet_tree) {
2019-08-26 11:44:53 +00:00
if(!subnet->owner) {
2019-08-26 11:44:51 +00:00
continue;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
if(subnet->expires == 1) {
2019-08-26 11:44:49 +00:00
send_del_subnet(everyone, subnet);
2019-08-26 11:44:53 +00:00
if(subnet->owner->status.reachable) {
2019-08-26 11:44:49 +00:00
subnet_update(subnet->owner, subnet, false);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
subnet_del(subnet->owner, subnet);
} else if(subnet->expires == -1) {
subnet->expires = 0;
2019-08-26 11:44:41 +00:00
} else {
2019-08-26 11:44:49 +00:00
send_add_subnet(everyone, subnet);
2019-08-26 11:44:53 +00:00
if(subnet->owner->status.reachable) {
2019-08-26 11:44:49 +00:00
subnet_update(subnet->owner, subnet, true);
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:40 +00:00
}
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:49 +00:00
} else { /* Only read our own subnets back in */
for splay_each(subnet_t, subnet, myself->subnet_tree)
2019-08-26 11:44:53 +00:00
if(!subnet->expires) {
2019-08-26 11:44:49 +00:00
subnet->expires = 1;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
config_t *cfg = lookup_config(config_tree, "Subnet");
while(cfg) {
subnet_t *subnet, *s2;
2019-08-26 11:44:53 +00:00
if(!get_config_subnet(cfg, &subnet)) {
2019-08-26 11:44:49 +00:00
continue;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
if((s2 = lookup_subnet(myself, subnet))) {
2019-08-26 11:44:53 +00:00
if(s2->expires == 1) {
2019-08-26 11:44:49 +00:00
s2->expires = 0;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
free_subnet(subnet);
} else {
subnet_add(myself, subnet);
send_add_subnet(everyone, subnet);
subnet_update(myself, subnet, true);
}
cfg = lookup_config_next(config_tree, cfg);
}
for splay_each(subnet_t, subnet, myself->subnet_tree) {
if(subnet->expires == 1) {
send_del_subnet(everyone, subnet);
subnet_update(myself, subnet, false);
subnet_del(myself, subnet);
}
}
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
/* Try to make outgoing connections */
2019-08-26 11:44:49 +00:00
2019-08-26 11:44:49 +00:00
try_outgoing_connections();
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:49 +00:00
/* Close connections to hosts that have a changed or deleted host config file */
for list_each(connection_t, c, connection_list) {
2019-08-26 11:44:53 +00:00
if(c->status.control) {
2019-08-26 11:44:49 +00:00
continue;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
2019-08-26 11:44:53 +00:00
snprintf(fname, sizeof(fname), "%s" SLASH "hosts" SLASH "%s", confbase, c->name);
2019-08-26 11:44:49 +00:00
struct stat s;
2019-08-26 11:44:53 +00:00
2019-08-26 11:44:49 +00:00
if(stat(fname, &s) || s.st_mtime > last_config_check) {
logger(DEBUG_CONNECTIONS, LOG_INFO, "Host config file of %s has been changed", c->name);
2019-08-26 11:44:51 +00:00
terminate_connection(c, c->edge);
2019-08-26 11:44:49 +00:00
}
}
2019-08-26 11:44:50 +00:00
last_config_check = now.tv_sec;
2019-08-26 11:44:49 +00:00
2019-08-26 11:44:49 +00:00
return 0;
}
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:49 +00:00
void retry(void) {
2019-08-26 11:44:51 +00:00
/* Reset the reconnection timers for all outgoing connections */
for list_each(outgoing_t, outgoing, outgoing_list) {
outgoing->timeout = 0;
2019-08-26 11:44:53 +00:00
2019-08-26 11:44:51 +00:00
if(outgoing->ev.cb)
2019-08-26 11:44:53 +00:00
timeout_set(&outgoing->ev, &(struct timeval) {
0, 0
});
2019-08-26 11:44:51 +00:00
}
/* Check for outgoing connections that are in progress, and reset their ping timers */
2019-08-26 11:44:49 +00:00
for list_each(connection_t, c, connection_list) {
2019-08-26 11:44:53 +00:00
if(c->outgoing && !c->node) {
2019-08-26 11:44:51 +00:00
c->last_ping_time = 0;
2019-08-26 11:44:53 +00:00
}
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:51 +00:00
/* Kick the ping timeout handler */
2019-08-26 11:44:53 +00:00
timeout_set(&pingtimer, &(struct timeval) {
0, 0
});
2019-08-26 11:44:49 +00:00
}
2019-08-26 11:44:36 +00:00
2019-08-26 11:44:49 +00:00
/*
this is where it all happens...
*/
int main_loop(void) {
last_periodic_run_time = now;
2019-08-26 11:44:53 +00:00
timeout_add(&pingtimer, timeout_handler, &pingtimer, &(struct timeval) {
pingtimeout, rand() % 100000
});
timeout_add(&periodictimer, periodic_handler, &periodictimer, &(struct timeval) {
0, 0
});
2019-08-26 11:44:48 +00:00
2019-08-26 11:44:49 +00:00
#ifndef HAVE_MINGW
2019-08-26 11:44:50 +00:00
signal_t sighup = {0};
signal_t sigterm = {0};
signal_t sigquit = {0};
2019-08-26 11:44:50 +00:00
signal_t sigint = {0};
2019-08-26 11:44:50 +00:00
signal_t sigalrm = {0};
signal_add(&sighup, sighup_handler, &sighup, SIGHUP);
signal_add(&sigterm, sigterm_handler, &sigterm, SIGTERM);
signal_add(&sigquit, sigterm_handler, &sigquit, SIGQUIT);
2019-08-26 11:44:50 +00:00
signal_add(&sigint, sigterm_handler, &sigint, SIGINT);
2019-08-26 11:44:50 +00:00
signal_add(&sigalrm, sigalrm_handler, &sigalrm, SIGALRM);
2019-08-26 11:44:49 +00:00
#endif
2019-08-26 11:44:37 +00:00
2019-08-26 11:44:50 +00:00
if(!event_loop()) {
2019-08-26 11:44:51 +00:00
logger(DEBUG_ALWAYS, LOG_ERR, "Error while waiting for input: %s", sockstrerror(sockerrno));
2019-08-26 11:44:49 +00:00
return 1;
2019-08-26 11:44:36 +00:00
}
2019-08-26 11:44:49 +00:00
#ifndef HAVE_MINGW
2019-08-26 11:44:50 +00:00
signal_del(&sighup);
signal_del(&sigterm);
2019-08-26 11:44:51 +00:00
signal_del(&sigquit);
signal_del(&sigint);
signal_del(&sigalrm);
2019-08-26 11:44:41 +00:00
#endif
2019-08-26 11:44:50 +00:00
timeout_del(&periodictimer);
timeout_del(&pingtimer);
2019-08-26 11:44:49 +00:00
2019-08-26 11:44:36 +00:00
return 0;
2019-08-26 11:44:36 +00:00
}