11 #include "http_chunk.h"
13 #include "connections.h"
14 #include "stat_cache.h"
17 #include "network_backends.h"
20 #include <sys/types.h>
40 #ifdef HAVE_VALGRIND_VALGRIND_H
41 # include <valgrind/valgrind.h>
44 #ifdef HAVE_SYS_WAIT_H
45 # include <sys/wait.h>
53 #ifdef HAVE_SYS_RESOURCE_H
54 # include <sys/resource.h>
57 #ifdef HAVE_SYS_PRCTL_H
58 # include <sys/prctl.h>
62 # include <openssl/err.h>
66 /* IRIX doesn't like the alarm based time() optimization */
67 /* #define USE_ALARM */
71 # ifndef HAVE_ISSETUGID
73 static int l_issetugid(void) {
74 return (geteuid() != getuid() || getegid() != getgid());
77 # define issetugid l_issetugid
81 static int oneshot_fd
= 0;
82 static volatile sig_atomic_t srv_shutdown
= 0;
83 static volatile sig_atomic_t graceful_shutdown
= 0;
84 static volatile sig_atomic_t handle_sig_alarm
= 1;
85 static volatile sig_atomic_t handle_sig_hup
= 0;
86 static volatile sig_atomic_t forwarded_sig_hup
= 0;
88 #if defined(HAVE_SIGACTION) && defined(SA_SIGINFO)
89 static volatile siginfo_t last_sigterm_info
;
90 static volatile siginfo_t last_sighup_info
;
92 static void sigaction_handler(int sig
, siginfo_t
*si
, void *context
) {
93 static siginfo_t empty_siginfo
;
96 if (!si
) si
= &empty_siginfo
;
101 last_sigterm_info
= *si
;
104 if (graceful_shutdown
) {
107 graceful_shutdown
= 1;
109 last_sigterm_info
= *si
;
113 handle_sig_alarm
= 1;
117 * we send the SIGHUP to all procs in the process-group
118 * this includes ourself
120 * make sure we only send it once and don't create a
123 if (!forwarded_sig_hup
) {
125 last_sighup_info
= *si
;
127 forwarded_sig_hup
= 0;
134 #elif defined(HAVE_SIGNAL) || defined(HAVE_SIGACTION)
135 static void signal_handler(int sig
) {
137 case SIGTERM
: srv_shutdown
= 1; break;
139 if (graceful_shutdown
) srv_shutdown
= 1;
140 else graceful_shutdown
= 1;
143 case SIGALRM
: handle_sig_alarm
= 1; break;
144 case SIGHUP
: handle_sig_hup
= 1; break;
151 static int daemonize(void) {
155 signal(SIGTTOU
, SIG_IGN
);
158 signal(SIGTTIN
, SIG_IGN
);
161 signal(SIGTSTP
, SIG_IGN
);
164 if (pipe(pipefd
) < 0) exit(-1);
166 if (0 > (pid
= fork())) exit(-1);
173 /* parent waits for grandchild to be ready */
175 bytes
= read(pipefd
[0], &buf
, sizeof(buf
));
176 } while (bytes
< 0 && EINTR
== errno
);
180 /* closed fd (without writing) == failure in grandchild */
181 fputs("daemonized server failed to start; check error log for details\n", stderr
);
190 if (-1 == setsid()) exit(0);
192 signal(SIGHUP
, SIG_IGN
);
194 if (0 != fork()) exit(0);
196 if (0 != chdir("/")) exit(0);
198 fd_close_on_exec(pipefd
[1]);
203 static server
*server_init(void) {
205 FILE *frandom
= NULL
;
207 server
*srv
= calloc(1, sizeof(*srv
));
210 srv->x = buffer_init();
212 CLEAN(response_header
);
213 CLEAN(parse_full_path
);
217 CLEAN(response_range
);
219 srv
->empty_string
= buffer_init_string("");
220 CLEAN(cond_check_buf
);
222 CLEAN(srvconf
.errorlog_file
);
223 CLEAN(srvconf
.breakagelog_file
);
224 CLEAN(srvconf
.groupname
);
225 CLEAN(srvconf
.username
);
226 CLEAN(srvconf
.changeroot
);
227 CLEAN(srvconf
.bindhost
);
228 CLEAN(srvconf
.event_handler
);
229 CLEAN(srvconf
.pid_file
);
231 CLEAN(tmp_chunk_len
);
235 srv->x = array_init();
237 CLEAN(config_context
);
238 CLEAN(config_touched
);
242 for (i
= 0; i
< FILE_CACHE_MAX
; i
++) {
243 srv
->mtime_cache
[i
].mtime
= (time_t)-1;
244 srv
->mtime_cache
[i
].str
= buffer_init();
247 if ((NULL
!= (frandom
= fopen("/dev/urandom", "rb")) || NULL
!= (frandom
= fopen("/dev/random", "rb")))
248 && 1 == fread(srv
->entropy
, sizeof(srv
->entropy
), 1, frandom
)) {
250 memcpy(&e
, srv
->entropy
, sizeof(e
) < sizeof(srv
->entropy
) ? sizeof(e
) : sizeof(srv
->entropy
));
252 srv
->is_real_entropy
= 1;
255 srand(time(NULL
) ^ getpid());
256 srv
->is_real_entropy
= 0;
257 for (j
= 0; j
< sizeof(srv
->entropy
); j
++)
258 srv
->entropy
[j
] = rand();
260 if (frandom
) fclose(frandom
);
262 srv
->cur_ts
= time(NULL
);
263 srv
->startup_ts
= srv
->cur_ts
;
265 srv
->conns
= calloc(1, sizeof(*srv
->conns
));
266 force_assert(srv
->conns
);
268 srv
->joblist
= calloc(1, sizeof(*srv
->joblist
));
269 force_assert(srv
->joblist
);
271 srv
->fdwaitqueue
= calloc(1, sizeof(*srv
->fdwaitqueue
));
272 force_assert(srv
->fdwaitqueue
);
274 srv
->srvconf
.modules
= array_init();
275 srv
->srvconf
.modules_dir
= buffer_init_string(LIBRARY_DIR
);
276 srv
->srvconf
.network_backend
= buffer_init();
277 srv
->srvconf
.upload_tempdirs
= array_init();
278 srv
->srvconf
.reject_expect_100_with_417
= 1;
279 srv
->srvconf
.xattr_name
= buffer_init_string("Content-Type");
280 srv
->srvconf
.http_header_strict
= 1;
281 srv
->srvconf
.http_host_strict
= 1; /*(implies http_host_normalize)*/
282 srv
->srvconf
.http_host_normalize
= 0;
285 srv
->errorlog_fd
= STDERR_FILENO
;
286 srv
->errorlog_mode
= ERRORLOG_FD
;
288 srv
->split_vals
= array_init();
293 static void server_free(server
*srv
) {
296 for (i
= 0; i
< FILE_CACHE_MAX
; i
++) {
297 buffer_free(srv
->mtime_cache
[i
].str
);
300 if (oneshot_fd
> 0) {
307 CLEAN(response_header
);
308 CLEAN(parse_full_path
);
312 CLEAN(response_range
);
315 CLEAN(cond_check_buf
);
317 CLEAN(srvconf
.errorlog_file
);
318 CLEAN(srvconf
.breakagelog_file
);
319 CLEAN(srvconf
.groupname
);
320 CLEAN(srvconf
.username
);
321 CLEAN(srvconf
.changeroot
);
322 CLEAN(srvconf
.bindhost
);
323 CLEAN(srvconf
.event_handler
);
324 CLEAN(srvconf
.pid_file
);
325 CLEAN(srvconf
.modules_dir
);
326 CLEAN(srvconf
.network_backend
);
327 CLEAN(srvconf
.xattr_name
);
329 CLEAN(tmp_chunk_len
);
333 fdevent_unregister(srv
->ev
, srv
->fd
);
335 fdevent_free(srv
->ev
);
339 if (srv
->config_storage
) {
340 for (i
= 0; i
< srv
->config_context
->used
; i
++) {
341 specific_config
*s
= srv
->config_storage
[i
];
345 buffer_free(s
->document_root
);
346 buffer_free(s
->server_name
);
347 buffer_free(s
->server_tag
);
348 buffer_free(s
->ssl_pemfile
);
349 buffer_free(s
->ssl_ca_file
);
350 buffer_free(s
->ssl_cipher_list
);
351 buffer_free(s
->ssl_dh_file
);
352 buffer_free(s
->ssl_ec_curve
);
353 buffer_free(s
->error_handler
);
354 buffer_free(s
->error_handler_404
);
355 buffer_free(s
->errorfile_prefix
);
356 array_free(s
->mimetypes
);
357 buffer_free(s
->ssl_verifyclient_username
);
359 SSL_CTX_free(s
->ssl_ctx
);
360 EVP_PKEY_free(s
->ssl_pemfile_pkey
);
361 X509_free(s
->ssl_pemfile_x509
);
362 if (NULL
!= s
->ssl_ca_file_cert_names
) sk_X509_NAME_pop_free(s
->ssl_ca_file_cert_names
, X509_NAME_free
);
366 free(srv
->config_storage
);
367 srv
->config_storage
= NULL
;
373 CLEAN(config_context
);
374 CLEAN(config_touched
);
376 CLEAN(srvconf
.upload_tempdirs
);
379 joblist_free(srv
, srv
->joblist
);
380 fdwaitqueue_free(srv
, srv
->fdwaitqueue
);
382 if (srv
->stat_cache
) {
383 stat_cache_free(srv
->stat_cache
);
386 array_free(srv
->srvconf
.modules
);
387 array_free(srv
->split_vals
);
390 if (srv
->ssl_is_init
) {
391 CRYPTO_cleanup_all_ex_data();
393 #if OPENSSL_VERSION_NUMBER >= 0x10100000L \
394 && !defined(LIBRESSL_VERSION_NUMBER)
395 /*(OpenSSL libraries handle thread init and deinit)
396 * https://github.com/openssl/openssl/pull/1048 */
397 #elif OPENSSL_VERSION_NUMBER >= 0x10000000L
398 ERR_remove_thread_state(NULL
);
409 static void remove_pid_file(server
*srv
, int *pid_fd
) {
410 if (!buffer_string_is_empty(srv
->srvconf
.pid_file
) && 0 <= *pid_fd
) {
411 if (0 != ftruncate(*pid_fd
, 0)) {
412 log_error_write(srv
, __FILE__
, __LINE__
, "sbds",
413 "ftruncate failed for:",
414 srv
->srvconf
.pid_file
,
423 if (!buffer_string_is_empty(srv
->srvconf
.pid_file
) &&
424 buffer_string_is_empty(srv
->srvconf
.changeroot
)) {
425 if (0 != unlink(srv
->srvconf
.pid_file
->ptr
)) {
426 if (errno
!= EACCES
&& errno
!= EPERM
) {
427 log_error_write(srv
, __FILE__
, __LINE__
, "sbds",
428 "unlink failed for:",
429 srv
->srvconf
.pid_file
,
438 static server_socket
* server_oneshot_getsock(server
*srv
, sock_addr
*cnt_addr
) {
439 server_socket
*srv_socket
, *srv_socket_wild
= NULL
;
441 for (i
= 0; i
< srv
->srv_sockets
.used
; ++i
) {
442 srv_socket
= srv
->srv_sockets
.ptr
[i
];
443 if (cnt_addr
->plain
.sa_family
!= srv_socket
->addr
.plain
.sa_family
) continue;
444 switch (cnt_addr
->plain
.sa_family
) {
446 if (srv_socket
->addr
.ipv4
.sin_port
!= cnt_addr
->ipv4
.sin_port
) continue;
447 if (srv_socket
->addr
.ipv4
.sin_addr
.s_addr
== cnt_addr
->ipv4
.sin_addr
.s_addr
) {
450 if (srv_socket
->addr
.ipv4
.sin_addr
.s_addr
== htonl(INADDR_ANY
)) {
451 srv_socket_wild
= srv_socket
;
456 if (srv_socket
->addr
.ipv6
.sin6_port
!= cnt_addr
->ipv6
.sin6_port
) continue;
457 if (0 == memcmp(&srv_socket
->addr
.ipv6
.sin6_addr
, &cnt_addr
->ipv6
.sin6_addr
, sizeof(struct in6_addr
))) {
460 if (0 == memcmp(&srv_socket
->addr
.ipv6
.sin6_addr
, &in6addr_any
, sizeof(struct in6_addr
))) {
461 srv_socket_wild
= srv_socket
;
467 if (0 == strcmp(srv_socket
->addr
.un
.sun_path
, cnt_addr
->un
.sun_path
)) {
476 if (NULL
!= srv_socket_wild
) {
477 return srv_socket_wild
;
478 } else if (srv
->srv_sockets
.used
) {
479 return srv
->srv_sockets
.ptr
[0];
481 log_error_write(srv
, __FILE__
, __LINE__
, "s", "no sockets configured");
487 static int server_oneshot_init(server
*srv
, int fd
) {
488 /* Note: does not work with netcat due to requirement that fd be socket.
489 * STDOUT_FILENO was not saved earlier in startup, and that is to where
490 * netcat expects output to be sent. Since lighttpd expects connections
491 * to be sockets, con->fd is where output is sent; separate fds are not
492 * stored for input and output, but netcat has different fds for stdin
493 * and * stdout. To support netcat, would additionally need to avoid
494 * S_ISSOCK(), getsockname(), and getpeername() below, reconstructing
495 * addresses from environment variables:
496 * NCAT_LOCAL_ADDR NCAT_LOCAL_PORT
497 * NCAT_REMOTE_ADDR NCAT_REMOTE_PORT
501 server_socket
*srv_socket
;
506 if (0 != fstat(fd
, &st
)) {
507 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "fstat:", strerror(errno
));
511 if (!S_ISSOCK(st
.st_mode
)) {
512 /* require that fd is a socket
513 * (modules might expect STDIN_FILENO and STDOUT_FILENO opened to /dev/null) */
514 log_error_write(srv
, __FILE__
, __LINE__
, "s", "lighttpd -1 stdin is not a socket");
518 cnt_len
= sizeof(cnt_addr
);
519 if (0 != getsockname(fd
, (struct sockaddr
*)&cnt_addr
, &cnt_len
)) {
520 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "getsockname:", strerror(errno
));
524 srv_socket
= server_oneshot_getsock(srv
, &cnt_addr
);
525 if (NULL
== srv_socket
) return 0;
527 cnt_len
= sizeof(cnt_addr
);
528 if (0 != getpeername(fd
, (struct sockaddr
*)&cnt_addr
, &cnt_len
)) {
529 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "getpeername:", strerror(errno
));
533 if (cnt_addr
.plain
.sa_family
!= AF_UNIX
) {
534 network_accept_tcp_nagle_disable(fd
);
537 con
= connection_accepted(srv
, srv_socket
, &cnt_addr
, fd
);
538 if (NULL
== con
) return 0;
540 connection_state_machine(srv
, con
);
545 static void show_version (void) {
547 # define TEXT_SSL " (ssl)"
551 char *b
= PACKAGE_DESC TEXT_SSL \
552 " - a light and fast webserver\n" \
553 "Build-Date: " __DATE__
" " __TIME__
"\n";
556 write_all(STDOUT_FILENO
, b
, strlen(b
));
559 static void show_features (void) {
560 const char features
[] = ""
562 "\t+ select (generic)\n"
564 "\t- select (generic)\n"
571 #ifdef USE_LINUX_SIGIO
572 "\t+ rt-signals (Linux 2.4+)\n"
574 "\t- rt-signals (Linux 2.4+)\n"
576 #ifdef USE_LINUX_EPOLL
577 "\t+ epoll (Linux 2.6)\n"
579 "\t- epoll (Linux 2.6)\n"
581 #ifdef USE_SOLARIS_DEVPOLL
582 "\t+ /dev/poll (Solaris)\n"
584 "\t- /dev/poll (Solaris)\n"
586 #ifdef USE_SOLARIS_PORT
587 "\t+ eventports (Solaris)\n"
589 "\t- eventports (Solaris)\n"
591 #ifdef USE_FREEBSD_KQUEUE
592 "\t+ kqueue (FreeBSD)\n"
594 "\t- kqueue (FreeBSD)\n"
597 "\t+ libev (generic)\n"
599 "\t- libev (generic)\n"
601 "\nNetwork handler:\n\n"
602 #if defined USE_LINUX_SENDFILE
603 "\t+ linux-sendfile\n"
605 "\t- linux-sendfile\n"
607 #if defined USE_FREEBSD_SENDFILE
608 "\t+ freebsd-sendfile\n"
610 "\t- freebsd-sendfile\n"
612 #if defined USE_DARWIN_SENDFILE
613 "\t+ darwin-sendfile\n"
615 "\t- darwin-sendfile\n"
617 #if defined USE_SOLARIS_SENDFILEV
618 "\t+ solaris-sendfilev\n"
620 "\t- solaris-sendfilev\n"
622 #if defined USE_WRITEV
639 #if defined HAVE_ZLIB_H && defined HAVE_LIBZ
644 #if defined HAVE_BZLIB_H && defined HAVE_LIBBZ2
645 "\t+ bzip2 support\n"
647 "\t- bzip2 support\n"
649 #if defined(HAVE_CRYPT) || defined(HAVE_CRYPT_R) || defined(HAVE_LIBCRYPT)
650 "\t+ crypt support\n"
652 "\t- crypt support\n"
665 "\t+ mySQL support\n"
667 "\t- mySQL support\n"
669 #if defined(HAVE_LDAP_H) && defined(HAVE_LBER_H) && defined(HAVE_LIBLDAP) && defined(HAVE_LIBLBER)
675 "\t+ memcached support\n"
677 "\t- memcached support\n"
694 #ifdef HAVE_SQLITE3_H
695 "\t+ SQLite support\n"
697 "\t- SQLite support\n"
706 printf("\nEvent Handlers:\n\n%s", features
);
709 static void show_help (void) {
711 # define TEXT_SSL " (ssl)"
715 char *b
= PACKAGE_DESC TEXT_SSL
" ("__DATE__
" " __TIME__
")" \
716 " - a light and fast webserver\n" \
718 " -f <name> filename of the config-file\n" \
719 " -m <name> module directory (default: "LIBRARY_DIR
")\n" \
720 " -i <secs> graceful shutdown after <secs> of inactivity\n" \
721 " -1 process single (one) request on stdin socket, then exit\n" \
722 " -p print the parsed config-file in internal form, and exit\n" \
723 " -t test the config-file, and exit\n" \
724 " -D don't go to background (default: go to background)\n" \
725 " -v show version\n" \
726 " -V show compile-time features\n" \
727 " -h show this help\n" \
732 write_all(STDOUT_FILENO
, b
, strlen(b
));
735 int main (int argc
, char **argv
) {
737 int print_config
= 0;
744 time_t idle_limit
= 0, last_active_ts
= time(NULL
);
745 #ifdef HAVE_SIGACTION
746 struct sigaction act
;
748 #ifdef HAVE_GETRLIMIT
753 int parent_pipe_fd
= -1;
757 struct itimerval interval
;
759 interval
.it_interval
.tv_sec
= 1;
760 interval
.it_interval
.tv_usec
= 0;
761 interval
.it_value
.tv_sec
= 1;
762 interval
.it_value
.tv_usec
= 0;
765 /* for nice %b handling in strfime() */
766 setlocale(LC_TIME
, "C");
768 if (NULL
== (srv
= server_init())) {
769 fprintf(stderr
, "did this really happen?\n");
773 /* init structs done */
775 srv
->srvconf
.port
= 0;
777 i_am_root
= (getuid() == 0);
781 srv
->srvconf
.dont_daemonize
= 0;
782 srv
->srvconf
.preflight_check
= 0;
784 while(-1 != (o
= getopt(argc
, argv
, "f:m:i:hvVD1pt"))) {
787 if (srv
->config_storage
) {
788 log_error_write(srv
, __FILE__
, __LINE__
, "s",
789 "Can only read one config file. Use the include command to use multiple config files.");
794 if (config_read(srv
, optarg
)) {
800 buffer_copy_string(srv
->srvconf
.modules_dir
, optarg
);
804 long timeout
= strtol(optarg
, &endptr
, 0);
805 if (!*optarg
|| *endptr
|| timeout
< 0) {
806 log_error_write(srv
, __FILE__
, __LINE__
, "ss",
807 "Invalid idle timeout value:", optarg
);
811 idle_limit
= (time_t)timeout
;
814 case 'p': print_config
= 1; break;
815 case 't': ++test_config
; break;
816 case '1': oneshot_fd
= dup(STDIN_FILENO
); break;
817 case 'D': srv
->srvconf
.dont_daemonize
= 1; break;
818 case 'v': show_version(); server_free(srv
); return 0;
819 case 'V': show_features(); server_free(srv
); return 0;
820 case 'h': show_help(); server_free(srv
); return 0;
828 if (!srv
->config_storage
) {
829 log_error_write(srv
, __FILE__
, __LINE__
, "s",
830 "No configuration available. Try using -f option.");
837 data_unset
*dc
= srv
->config_context
->data
[0];
840 fprintf(stdout
, "\n");
842 /* shouldn't happend */
843 fprintf(stderr
, "global config not found\n");
848 if (1 == test_config
) {
849 printf("Syntax OK\n");
850 } else { /*(test_config > 1)*/
852 srv
->srvconf
.preflight_check
= 1;
853 srv
->srvconf
.dont_daemonize
= 1;
854 buffer_reset(srv
->srvconf
.pid_file
);
858 if (test_config
|| print_config
) {
864 if (oneshot_fd
<= STDERR_FILENO
) {
865 log_error_write(srv
, __FILE__
, __LINE__
, "s",
866 "Invalid fds at startup with lighttpd -1");
870 graceful_shutdown
= 1;
871 srv
->sockets_disabled
= 1;
872 srv
->srvconf
.dont_daemonize
= 1;
873 buffer_reset(srv
->srvconf
.pid_file
);
874 if (srv
->srvconf
.max_worker
) {
875 srv
->srvconf
.max_worker
= 0;
876 log_error_write(srv
, __FILE__
, __LINE__
, "s",
877 "server one-shot command line option disables server.max-worker config file option.");
881 /* close stdin and stdout, as they are not needed */
882 openDevNull(STDIN_FILENO
);
883 openDevNull(STDOUT_FILENO
);
885 if (0 != config_set_defaults(srv
)) {
886 log_error_write(srv
, __FILE__
, __LINE__
, "s",
887 "setting default values failed");
894 if (!i_am_root
&& issetugid()) {
895 /* we are setuid-root */
897 log_error_write(srv
, __FILE__
, __LINE__
, "s",
898 "Are you nuts ? Don't apply a SUID bit to this binary");
905 /* check document-root */
906 if (buffer_string_is_empty(srv
->config_storage
[0]->document_root
)) {
907 log_error_write(srv
, __FILE__
, __LINE__
, "s",
908 "document-root is not set\n");
915 if (plugins_load(srv
)) {
916 log_error_write(srv
, __FILE__
, __LINE__
, "s",
917 "loading plugins finally failed");
925 /* open pid file BEFORE chroot */
926 if (!buffer_string_is_empty(srv
->srvconf
.pid_file
)) {
927 if (-1 == (pid_fd
= open(srv
->srvconf
.pid_file
->ptr
, O_WRONLY
| O_CREAT
| O_EXCL
| O_TRUNC
, S_IRUSR
| S_IWUSR
| S_IRGRP
| S_IROTH
))) {
929 if (errno
!= EEXIST
) {
930 log_error_write(srv
, __FILE__
, __LINE__
, "sbs",
931 "opening pid-file failed:", srv
->srvconf
.pid_file
, strerror(errno
));
935 if (0 != stat(srv
->srvconf
.pid_file
->ptr
, &st
)) {
936 log_error_write(srv
, __FILE__
, __LINE__
, "sbs",
937 "stating existing pid-file failed:", srv
->srvconf
.pid_file
, strerror(errno
));
940 if (!S_ISREG(st
.st_mode
)) {
941 log_error_write(srv
, __FILE__
, __LINE__
, "sb",
942 "pid-file exists and isn't regular file:", srv
->srvconf
.pid_file
);
946 if (-1 == (pid_fd
= open(srv
->srvconf
.pid_file
->ptr
, O_WRONLY
| O_CREAT
| O_TRUNC
, S_IRUSR
| S_IWUSR
| S_IRGRP
| S_IROTH
))) {
947 log_error_write(srv
, __FILE__
, __LINE__
, "sbs",
948 "opening pid-file failed:", srv
->srvconf
.pid_file
, strerror(errno
));
952 fd_close_on_exec(pid_fd
);
955 if (srv
->event_handler
== FDEVENT_HANDLER_SELECT
) {
956 /* select limits itself
958 * as it is a hard limit and will lead to a segfault we add some safety
960 srv
->max_fds
= FD_SETSIZE
- 200;
966 struct group
*grp
= NULL
;
967 struct passwd
*pwd
= NULL
;
970 #ifdef HAVE_VALGRIND_VALGRIND_H
971 if (RUNNING_ON_VALGRIND
) use_rlimit
= 0;
974 #ifdef HAVE_GETRLIMIT
975 if (0 != getrlimit(RLIMIT_NOFILE
, &rlim
)) {
976 log_error_write(srv
, __FILE__
, __LINE__
,
977 "ss", "couldn't get 'max filedescriptors'",
982 if (use_rlimit
&& srv
->srvconf
.max_fds
) {
985 rlim
.rlim_cur
= srv
->srvconf
.max_fds
;
986 rlim
.rlim_max
= srv
->srvconf
.max_fds
;
988 if (0 != setrlimit(RLIMIT_NOFILE
, &rlim
)) {
989 log_error_write(srv
, __FILE__
, __LINE__
,
990 "ss", "couldn't set 'max filedescriptors'",
996 if (srv
->event_handler
== FDEVENT_HANDLER_SELECT
) {
997 srv
->max_fds
= rlim
.rlim_cur
< (rlim_t
)FD_SETSIZE
- 200 ? (int)rlim
.rlim_cur
: (int)FD_SETSIZE
- 200;
999 srv
->max_fds
= rlim
.rlim_cur
;
1002 /* set core file rlimit, if enable_cores is set */
1003 if (use_rlimit
&& srv
->srvconf
.enable_cores
&& getrlimit(RLIMIT_CORE
, &rlim
) == 0) {
1004 rlim
.rlim_cur
= rlim
.rlim_max
;
1005 setrlimit(RLIMIT_CORE
, &rlim
);
1008 if (srv
->event_handler
== FDEVENT_HANDLER_SELECT
) {
1009 /* don't raise the limit above FD_SET_SIZE */
1010 if (srv
->max_fds
> ((int)FD_SETSIZE
) - 200) {
1011 log_error_write(srv
, __FILE__
, __LINE__
, "sd",
1012 "can't raise max filedescriptors above", FD_SETSIZE
- 200,
1013 "if event-handler is 'select'. Use 'poll' or something else or reduce server.max-fds.");
1020 /* set user and group */
1021 if (!buffer_string_is_empty(srv
->srvconf
.username
)) {
1022 if (NULL
== (pwd
= getpwnam(srv
->srvconf
.username
->ptr
))) {
1023 log_error_write(srv
, __FILE__
, __LINE__
, "sb",
1024 "can't find username", srv
->srvconf
.username
);
1028 if (pwd
->pw_uid
== 0) {
1029 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1030 "I will not set uid to 0\n");
1035 if (!buffer_string_is_empty(srv
->srvconf
.groupname
)) {
1036 if (NULL
== (grp
= getgrnam(srv
->srvconf
.groupname
->ptr
))) {
1037 log_error_write(srv
, __FILE__
, __LINE__
, "sb",
1038 "can't find groupname", srv
->srvconf
.groupname
);
1041 if (grp
->gr_gid
== 0) {
1042 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1043 "I will not set gid to 0\n");
1048 /* we need root-perms for port < 1024 */
1049 if (0 != network_init(srv
)) {
1057 * Change group before chroot, when we have access
1061 if (-1 == setgid(grp
->gr_gid
)) {
1062 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "setgid failed: ", strerror(errno
));
1065 if (-1 == setgroups(0, NULL
)) {
1066 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "setgroups failed: ", strerror(errno
));
1069 if (!buffer_string_is_empty(srv
->srvconf
.username
)) {
1070 initgroups(srv
->srvconf
.username
->ptr
, grp
->gr_gid
);
1075 if (!buffer_string_is_empty(srv
->srvconf
.changeroot
)) {
1078 if (-1 == chroot(srv
->srvconf
.changeroot
->ptr
)) {
1079 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "chroot failed: ", strerror(errno
));
1082 if (-1 == chdir("/")) {
1083 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "chdir failed: ", strerror(errno
));
1089 /* drop root privs */
1091 if (-1 == setuid(pwd
->pw_uid
)) {
1092 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "setuid failed: ", strerror(errno
));
1097 #if defined(HAVE_SYS_PRCTL_H) && defined(PR_SET_DUMPABLE)
1099 * on IRIX 6.5.30 they have prctl() but no DUMPABLE
1101 if (srv
->srvconf
.enable_cores
) {
1102 prctl(PR_SET_DUMPABLE
, 1, 0, 0, 0);
1107 #ifdef HAVE_GETRLIMIT
1108 if (0 != getrlimit(RLIMIT_NOFILE
, &rlim
)) {
1109 log_error_write(srv
, __FILE__
, __LINE__
,
1110 "ss", "couldn't get 'max filedescriptors'",
1116 * we are not root can can't increase the fd-limit above rlim_max, but we can reduce it
1118 if (srv
->srvconf
.max_fds
&& srv
->srvconf
.max_fds
<= rlim
.rlim_max
) {
1121 rlim
.rlim_cur
= srv
->srvconf
.max_fds
;
1123 if (0 != setrlimit(RLIMIT_NOFILE
, &rlim
)) {
1124 log_error_write(srv
, __FILE__
, __LINE__
,
1125 "ss", "couldn't set 'max filedescriptors'",
1131 if (srv
->event_handler
== FDEVENT_HANDLER_SELECT
) {
1132 srv
->max_fds
= rlim
.rlim_cur
< (rlim_t
)FD_SETSIZE
- 200 ? (int)rlim
.rlim_cur
: (int)FD_SETSIZE
- 200;
1134 srv
->max_fds
= rlim
.rlim_cur
;
1137 /* set core file rlimit, if enable_cores is set */
1138 if (srv
->srvconf
.enable_cores
&& getrlimit(RLIMIT_CORE
, &rlim
) == 0) {
1139 rlim
.rlim_cur
= rlim
.rlim_max
;
1140 setrlimit(RLIMIT_CORE
, &rlim
);
1144 if (srv
->event_handler
== FDEVENT_HANDLER_SELECT
) {
1145 /* don't raise the limit above FD_SET_SIZE */
1146 if (srv
->max_fds
> ((int)FD_SETSIZE
) - 200) {
1147 log_error_write(srv
, __FILE__
, __LINE__
, "sd",
1148 "can't raise max filedescriptors above", FD_SETSIZE
- 200,
1149 "if event-handler is 'select'. Use 'poll' or something else or reduce server.max-fds.");
1154 if (0 != network_init(srv
)) {
1163 if (srv
->srvconf
.max_conns
> srv
->max_fds
/2) {
1164 /* we can't have more connections than max-fds/2 */
1165 log_error_write(srv
, __FILE__
, __LINE__
, "sdd", "can't have more connections than fds/2: ", srv
->srvconf
.max_conns
, srv
->max_fds
);
1166 srv
->max_conns
= srv
->max_fds
/2;
1167 } else if (srv
->srvconf
.max_conns
) {
1168 /* otherwise respect the wishes of the user */
1169 srv
->max_conns
= srv
->srvconf
.max_conns
;
1171 /* or use the default: we really don't want to hit max-fds */
1172 srv
->max_conns
= srv
->max_fds
/3;
1175 if (HANDLER_GO_ON
!= plugins_call_init(srv
)) {
1176 log_error_write(srv
, __FILE__
, __LINE__
, "s", "Initialization of plugins failed. Going down.");
1186 /* network is up, let's deamonize ourself */
1187 if (srv
->srvconf
.dont_daemonize
== 0) {
1188 parent_pipe_fd
= daemonize();
1193 #ifdef HAVE_SIGACTION
1194 memset(&act
, 0, sizeof(act
));
1195 act
.sa_handler
= SIG_IGN
;
1196 sigaction(SIGPIPE
, &act
, NULL
);
1197 sigaction(SIGUSR1
, &act
, NULL
);
1198 # if defined(SA_SIGINFO)
1199 act
.sa_sigaction
= sigaction_handler
;
1200 sigemptyset(&act
.sa_mask
);
1201 act
.sa_flags
= SA_SIGINFO
;
1203 act
.sa_handler
= signal_handler
;
1204 sigemptyset(&act
.sa_mask
);
1207 sigaction(SIGINT
, &act
, NULL
);
1208 sigaction(SIGTERM
, &act
, NULL
);
1209 sigaction(SIGHUP
, &act
, NULL
);
1210 sigaction(SIGALRM
, &act
, NULL
);
1212 /* it should be safe to restart syscalls after SIGCHLD */
1213 act
.sa_flags
|= SA_RESTART
| SA_NOCLDSTOP
;
1214 sigaction(SIGCHLD
, &act
, NULL
);
1216 #elif defined(HAVE_SIGNAL)
1217 /* ignore the SIGPIPE from sendfile() */
1218 signal(SIGPIPE
, SIG_IGN
);
1219 signal(SIGUSR1
, SIG_IGN
);
1220 signal(SIGALRM
, signal_handler
);
1221 signal(SIGTERM
, signal_handler
);
1222 signal(SIGHUP
, signal_handler
);
1223 signal(SIGCHLD
, signal_handler
);
1224 signal(SIGINT
, signal_handler
);
1228 signal(SIGALRM
, signal_handler
);
1230 /* setup periodic timer (1 second) */
1231 if (setitimer(ITIMER_REAL
, &interval
, NULL
)) {
1232 log_error_write(srv
, __FILE__
, __LINE__
, "s", "setting timer failed");
1236 getitimer(ITIMER_REAL
, &interval
);
1240 srv
->gid
= getgid();
1241 srv
->uid
= getuid();
1243 /* write pid file */
1245 buffer_copy_int(srv
->tmp_buf
, getpid());
1246 buffer_append_string_len(srv
->tmp_buf
, CONST_STR_LEN("\n"));
1247 if (-1 == write_all(pid_fd
, CONST_BUF_LEN(srv
->tmp_buf
))) {
1248 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "Couldn't write pid file:", strerror(errno
));
1254 /* Close stderr ASAP in the child process to make sure that nothing
1255 * is being written to that fd which may not be valid anymore. */
1256 if (!srv
->srvconf
.preflight_check
&& -1 == log_error_open(srv
)) {
1257 log_error_write(srv
, __FILE__
, __LINE__
, "s", "Opening errorlog failed. Going down.");
1265 if (HANDLER_GO_ON
!= plugins_call_set_defaults(srv
)) {
1266 log_error_write(srv
, __FILE__
, __LINE__
, "s", "Configuration of plugins failed. Going down.");
1275 /* dump unused config-keys */
1276 for (i
= 0; i
< srv
->config_context
->used
; i
++) {
1277 array
*config
= ((data_config
*)srv
->config_context
->data
[i
])->value
;
1280 for (j
= 0; config
&& j
< config
->used
; j
++) {
1281 data_unset
*du
= config
->data
[j
];
1283 /* all var.* is known as user defined variable */
1284 if (strncmp(du
->key
->ptr
, "var.", sizeof("var.") - 1) == 0) {
1288 if (NULL
== array_get_element(srv
->config_touched
, du
->key
->ptr
)) {
1289 log_error_write(srv
, __FILE__
, __LINE__
, "sbs",
1290 "WARNING: unknown config-key:",
1297 if (srv
->config_unsupported
) {
1298 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1299 "Configuration contains unsupported keys. Going down.");
1302 if (srv
->config_deprecated
) {
1303 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1304 "Configuration contains deprecated keys. Going down.");
1307 if (srv
->config_unsupported
|| srv
->config_deprecated
) {
1315 if (srv
->srvconf
.preflight_check
) {
1316 /*printf("Preflight OK");*//*(stdout reopened to /dev/null)*/
1327 * notify daemonize-grandparent of successful startup
1328 * do this before any further forking is done (workers)
1330 if (srv
->srvconf
.dont_daemonize
== 0) {
1331 if (0 > write(parent_pipe_fd
, "", 1)) return -1;
1332 close(parent_pipe_fd
);
1335 if (idle_limit
&& srv
->srvconf
.max_worker
) {
1336 srv
->srvconf
.max_worker
= 0;
1337 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1338 "server idle time limit command line option disables server.max-worker config file option.");
1341 /* start watcher and workers */
1342 num_childs
= srv
->srvconf
.max_worker
;
1343 if (num_childs
> 0) {
1345 while (!child
&& !srv_shutdown
&& !graceful_shutdown
) {
1346 if (num_childs
> 0) {
1360 if (-1 != wait(&status
)) {
1362 * one of our workers went away
1369 * if we receive a SIGHUP we have to close our logs ourself as we don't
1370 * have the mainloop who can help us here
1372 if (handle_sig_hup
) {
1375 log_error_cycle(srv
);
1378 * forward to all procs in the process-group
1380 * we also send it ourself
1382 if (!forwarded_sig_hup
&& 0 != srv
->srvconf
.max_worker
) {
1383 forwarded_sig_hup
= 1;
1396 * for the parent this is the exit-point
1400 * kill all children too
1402 if (graceful_shutdown
) {
1404 } else if (srv_shutdown
) {
1408 remove_pid_file(srv
, &pid_fd
);
1409 log_error_close(srv
);
1411 connections_free(srv
);
1418 * make sure workers do not muck with pid-file
1424 buffer_reset(srv
->srvconf
.pid_file
);
1428 if (NULL
== (srv
->ev
= fdevent_init(srv
, srv
->max_fds
+ 1, srv
->event_handler
))) {
1429 log_error_write(srv
, __FILE__
, __LINE__
,
1430 "s", "fdevent_init failed");
1434 /* libev backend overwrites our SIGCHLD handler and calls waitpid on SIGCHLD; we want our own SIGCHLD handling. */
1435 #ifdef HAVE_SIGACTION
1436 sigaction(SIGCHLD
, &act
, NULL
);
1437 #elif defined(HAVE_SIGNAL)
1438 signal(SIGCHLD
, signal_handler
);
1442 * kqueue() is called here, select resets its internals,
1443 * all server sockets get their handlers
1446 if (0 != network_register_fdevents(srv
)) {
1454 /* might fail if user is using fam (not gamin) and famd isn't running */
1455 if (NULL
== (srv
->stat_cache
= stat_cache_init())) {
1456 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1457 "stat-cache could not be setup, dieing.");
1463 if (srv
->srvconf
.stat_cache_engine
== STAT_CACHE_ENGINE_FAM
) {
1464 if (0 != FAMOpen2(&srv
->stat_cache
->fam
, "lighttpd")) {
1465 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1466 "could not open a fam connection, dieing.");
1469 #ifdef HAVE_FAMNOEXISTS
1470 FAMNoExists(&srv
->stat_cache
->fam
);
1473 fdevent_register(srv
->ev
, FAMCONNECTION_GETFD(&srv
->stat_cache
->fam
), stat_cache_handle_fdevent
, NULL
);
1474 fdevent_event_set(srv
->ev
, &(srv
->stat_cache
->fam_fcce_ndx
), FAMCONNECTION_GETFD(&srv
->stat_cache
->fam
), FDEVENT_IN
);
1479 /* get the current number of FDs */
1480 srv
->cur_fds
= open("/dev/null", O_RDONLY
);
1481 close(srv
->cur_fds
);
1483 for (i
= 0; i
< srv
->srv_sockets
.used
; i
++) {
1484 server_socket
*srv_socket
= srv
->srv_sockets
.ptr
[i
];
1485 if (srv
->sockets_disabled
) continue; /* lighttpd -1 (one-shot mode) */
1486 if (-1 == fdevent_fcntl_set(srv
->ev
, srv_socket
->fd
)) {
1487 log_error_write(srv
, __FILE__
, __LINE__
, "ss", "fcntl failed:", strerror(errno
));
1492 if (oneshot_fd
&& server_oneshot_init(srv
, oneshot_fd
)) {
1497 while (!srv_shutdown
) {
1502 if (handle_sig_hup
) {
1505 /* reset notification */
1509 /* cycle logfiles */
1511 switch(r
= plugins_call_handle_sighup(srv
)) {
1515 log_error_write(srv
, __FILE__
, __LINE__
, "sd", "sighup-handler return with an error", r
);
1519 if (-1 == log_error_cycle(srv
)) {
1520 log_error_write(srv
, __FILE__
, __LINE__
, "s", "cycling errorlog failed, dying");
1524 #ifdef HAVE_SIGACTION
1525 log_error_write(srv
, __FILE__
, __LINE__
, "sdsd",
1526 "logfiles cycled UID =",
1527 last_sighup_info
.si_uid
,
1529 last_sighup_info
.si_pid
);
1531 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1537 if (handle_sig_alarm
) {
1541 /* reset notification */
1542 handle_sig_alarm
= 0;
1545 /* get current time */
1546 min_ts
= time(NULL
);
1548 if (min_ts
!= srv
->cur_ts
) {
1549 #ifdef DEBUG_CONNECTION_STATES
1552 connections
*conns
= srv
->conns
;
1555 switch(r
= plugins_call_handle_trigger(srv
)) {
1559 log_error_write(srv
, __FILE__
, __LINE__
, "s", "one of the triggers failed");
1562 log_error_write(srv
, __FILE__
, __LINE__
, "d", r
);
1566 /* trigger waitpid */
1567 srv
->cur_ts
= min_ts
;
1569 /* check idle time limit, if enabled */
1570 if (idle_limit
&& idle_limit
< min_ts
- last_active_ts
&& !graceful_shutdown
) {
1571 log_error_write(srv
, __FILE__
, __LINE__
, "sDs", "[note] idle timeout", (int)idle_limit
,
1572 "s exceeded, initiating graceful shutdown");
1573 graceful_shutdown
= 2; /* value 2 indicates idle timeout */
1576 /* cleanup stat-cache */
1577 stat_cache_trigger_cleanup(srv
);
1579 * check all connections for timeouts
1582 for (ndx
= 0; ndx
< conns
->used
; ndx
++) {
1583 connection
* const con
= conns
->ptr
[ndx
];
1584 const int waitevents
= fdevent_event_get_interest(srv
->ev
, con
->fd
);
1588 if (waitevents
& FDEVENT_IN
) {
1589 if (con
->request_count
== 1 || con
->state
!= CON_STATE_READ
) { /* e.g. CON_STATE_READ_POST || CON_STATE_WRITE */
1590 if (srv
->cur_ts
- con
->read_idle_ts
> con
->conf
.max_read_idle
) {
1592 if (con
->conf
.log_request_handling
) {
1593 log_error_write(srv
, __FILE__
, __LINE__
, "sd",
1594 "connection closed - read timeout:", con
->fd
);
1597 connection_set_state(srv
, con
, CON_STATE_ERROR
);
1601 if (srv
->cur_ts
- con
->read_idle_ts
> con
->keep_alive_idle
) {
1603 if (con
->conf
.log_request_handling
) {
1604 log_error_write(srv
, __FILE__
, __LINE__
, "sd",
1605 "connection closed - keep-alive timeout:", con
->fd
);
1608 connection_set_state(srv
, con
, CON_STATE_ERROR
);
1614 /* max_write_idle timeout currently functions as backend timeout,
1615 * too, after response has been started.
1616 * future: have separate backend timeout, and then change this
1617 * to check for write interest before checking for timeout */
1618 /*if (waitevents & FDEVENT_OUT)*/
1619 if ((con
->state
== CON_STATE_WRITE
) &&
1620 (con
->write_request_ts
!= 0)) {
1622 if (srv
->cur_ts
- con
->write_request_ts
> 60) {
1623 log_error_write(srv
, __FILE__
, __LINE__
, "sdd",
1624 "connection closed - pre-write-request-timeout:", con
->fd
, srv
->cur_ts
- con
->write_request_ts
);
1628 if (srv
->cur_ts
- con
->write_request_ts
> con
->conf
.max_write_idle
) {
1630 if (con
->conf
.log_timeouts
) {
1631 log_error_write(srv
, __FILE__
, __LINE__
, "sbsbsosds",
1632 "NOTE: a request from",
1636 "timed out after writing",
1639 (int)con
->conf
.max_write_idle
,
1640 "seconds. If this a problem increase server.max-write-idle");
1642 connection_set_state(srv
, con
, CON_STATE_ERROR
);
1647 if (con
->state
== CON_STATE_CLOSE
&& (srv
->cur_ts
- con
->close_timeout_ts
> HTTP_LINGER_TIMEOUT
)) {
1651 /* we don't like div by zero */
1652 if (0 == (t_diff
= srv
->cur_ts
- con
->connection_start
)) t_diff
= 1;
1654 if (con
->traffic_limit_reached
&&
1655 (con
->conf
.kbytes_per_second
== 0 ||
1656 ((con
->bytes_written
/ t_diff
) < con
->conf
.kbytes_per_second
* 1024))) {
1657 /* enable connection again */
1658 con
->traffic_limit_reached
= 0;
1664 connection_state_machine(srv
, con
);
1666 con
->bytes_written_cur_second
= 0;
1667 *(con
->conf
.global_bytes_per_second_cnt_ptr
) = 0;
1669 #if DEBUG_CONNECTION_STATES
1671 fprintf(stderr
, "connection-state: ");
1675 fprintf(stderr
, "c[%d,%d]: %s ",
1678 connection_get_state(con
->state
));
1682 #ifdef DEBUG_CONNECTION_STATES
1683 if (cs
== 1) fprintf(stderr
, "\n");
1688 if (srv
->sockets_disabled
) {
1689 /* our server sockets are disabled, why ? */
1691 if ((srv
->cur_fds
+ srv
->want_fds
< srv
->max_fds
* 8 / 10) && /* we have enough unused fds */
1692 (srv
->conns
->used
<= srv
->max_conns
* 9 / 10) &&
1693 (0 == graceful_shutdown
)) {
1694 for (i
= 0; i
< srv
->srv_sockets
.used
; i
++) {
1695 server_socket
*srv_socket
= srv
->srv_sockets
.ptr
[i
];
1696 fdevent_event_set(srv
->ev
, &(srv_socket
->fde_ndx
), srv_socket
->fd
, FDEVENT_IN
);
1699 log_error_write(srv
, __FILE__
, __LINE__
, "s", "[note] sockets enabled again");
1701 srv
->sockets_disabled
= 0;
1704 if ((srv
->cur_fds
+ srv
->want_fds
> srv
->max_fds
* 9 / 10) || /* out of fds */
1705 (srv
->conns
->used
>= srv
->max_conns
) || /* out of connections */
1706 (graceful_shutdown
)) { /* graceful_shutdown */
1708 /* disable server-fds */
1710 for (i
= 0; i
< srv
->srv_sockets
.used
; i
++) {
1711 server_socket
*srv_socket
= srv
->srv_sockets
.ptr
[i
];
1713 if (graceful_shutdown
) {
1714 /* we don't want this socket anymore,
1716 * closing it right away will make it possible for
1717 * the next lighttpd to take over (graceful restart)
1720 fdevent_event_del(srv
->ev
, &(srv_socket
->fde_ndx
), srv_socket
->fd
);
1721 fdevent_unregister(srv
->ev
, srv_socket
->fd
);
1722 close(srv_socket
->fd
);
1723 srv_socket
->fd
= -1;
1725 /* network_close() will cleanup after us */
1727 fdevent_event_set(srv
->ev
, &(srv_socket
->fde_ndx
), srv_socket
->fd
, 0);
1731 if (graceful_shutdown
) {
1732 remove_pid_file(srv
, &pid_fd
);
1733 log_error_write(srv
, __FILE__
, __LINE__
, "s", "[note] graceful shutdown started");
1734 } else if (srv
->conns
->used
>= srv
->max_conns
) {
1735 log_error_write(srv
, __FILE__
, __LINE__
, "s", "[note] sockets disabled, connection limit reached");
1737 log_error_write(srv
, __FILE__
, __LINE__
, "s", "[note] sockets disabled, out-of-fds");
1740 srv
->sockets_disabled
= 1;
1744 if (graceful_shutdown
&& srv
->conns
->used
== 0) {
1745 /* we are in graceful shutdown phase and all connections are closed
1746 * we are ready to terminate without harming anyone */
1751 /* we still have some fds to share */
1752 if (srv
->want_fds
) {
1753 /* check the fdwaitqueue for waiting fds */
1754 int free_fds
= srv
->max_fds
- srv
->cur_fds
- 16;
1757 for (; free_fds
> 0 && NULL
!= (con
= fdwaitqueue_unshift(srv
, srv
->fdwaitqueue
)); free_fds
--) {
1758 connection_state_machine(srv
, con
);
1764 if ((n
= fdevent_poll(srv
->ev
, 1000)) > 0) {
1765 /* n is the number of events */
1770 log_error_write(srv
, __FILE__
, __LINE__
, "sd",
1774 last_active_ts
= srv
->cur_ts
;
1777 fdevent_handler handler
;
1781 fd_ndx
= fdevent_event_next_fdndx (srv
->ev
, fd_ndx
);
1782 if (-1 == fd_ndx
) break; /* not all fdevent handlers know how many fds got an event */
1784 revents
= fdevent_event_get_revent (srv
->ev
, fd_ndx
);
1785 fd
= fdevent_event_get_fd (srv
->ev
, fd_ndx
);
1786 handler
= fdevent_get_handler(srv
->ev
, fd
);
1787 context
= fdevent_get_context(srv
->ev
, fd
);
1790 log_error_write(srv
, __FILE__
, __LINE__
, "sdd",
1791 "event for", fd
, revents
);
1793 switch (r
= (*handler
)(srv
, context
, revents
)) {
1794 case HANDLER_FINISHED
:
1796 case HANDLER_WAIT_FOR_EVENT
:
1797 case HANDLER_WAIT_FOR_FD
:
1800 /* should never happen */
1804 log_error_write(srv
, __FILE__
, __LINE__
, "d", r
);
1808 } else if (n
< 0 && errno
!= EINTR
) {
1809 log_error_write(srv
, __FILE__
, __LINE__
, "ss",
1810 "fdevent_poll failed:",
1814 for (ndx
= 0; ndx
< srv
->joblist
->used
; ndx
++) {
1815 connection
*con
= srv
->joblist
->ptr
[ndx
];
1816 connection_state_machine(srv
, con
);
1817 con
->in_joblist
= 0;
1820 srv
->joblist
->used
= 0;
1823 if (0 == graceful_shutdown
) {
1824 remove_pid_file(srv
, &pid_fd
);
1827 if (2 == graceful_shutdown
) { /* value 2 indicates idle timeout */
1828 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1829 "server stopped after idle timeout");
1831 #ifdef HAVE_SIGACTION
1832 log_error_write(srv
, __FILE__
, __LINE__
, "sdsd",
1833 "server stopped by UID =",
1834 last_sigterm_info
.si_uid
,
1836 last_sigterm_info
.si_pid
);
1838 log_error_write(srv
, __FILE__
, __LINE__
, "s",
1844 log_error_close(srv
);
1846 connections_free(srv
);