wireshark/sharkd_daemon.c

259 lines
4.6 KiB
C
Raw Normal View History

/* sharkd_daemon.c
*
* Copyright (C) 2016 Jakub Zawadzki
*
* Wireshark - Network traffic analyzer
* By Gerald Combs <gerald@wireshark.org>
* Copyright 1998 Gerald Combs
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include <config.h>
#include <glib.h>
#include <stdio.h>
#include <errno.h>
#include <stddef.h>
#include <stdlib.h>
#include <signal.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#ifdef HAVE_SYS_SOCKET_H
#include <sys/socket.h>
#endif
#ifdef HAVE_NETINET_IN_H
#include <netinet/in.h>
#endif
#ifndef _WIN32
#include <sys/un.h>
#include <netinet/tcp.h>
#endif
/*
#if defined(_WIN32)
#ifdef HAVE_WINDOWS_H
#include <windows.h>
#endif
#include <ws2tcpip.h>
#ifdef HAVE_WINSOCK2_H
#include <winsock2.h>
#endif
#endif
*/
#ifdef HAVE_ARPA_INET_H
#include <arpa/inet.h>
#endif
#include <wsutil/strtoi.h>
#include "sharkd.h"
static int _server_fd = -1;
static int
socket_init(char *path)
{
int fd = -1;
#ifndef _WIN32
if (!strncmp(path, "unix:", 5))
{
struct sockaddr_un s_un;
size_t s_un_len;
path += 5;
if (strlen(path) + 1 > sizeof(s_un.sun_path))
return -1;
fd = socket(AF_UNIX, SOCK_STREAM, 0);
if (fd == -1)
return -1;
memset(&s_un, 0, sizeof(s_un));
s_un.sun_family = AF_UNIX;
g_strlcpy(s_un.sun_path, path, sizeof(s_un.sun_path));
s_un_len = offsetof(struct sockaddr_un, sun_path) + strlen(s_un.sun_path);
if (s_un.sun_path[0] == '@')
s_un.sun_path[0] = '\0';
if (bind(fd, (struct sockaddr *) &s_un, s_un_len))
{
close(fd);
return -1;
}
}
#endif
#ifdef SHARKD_TCP_SUPPORT
if (!strncmp(path, "tcp:", 4))
{
struct sockaddr_in s_in;
int one = 1;
char *port_sep;
guint16 port;
path += 4;
port_sep = strchr(path, ':');
if (!port_sep)
return -1;
*port_sep = '\0';
if (ws_strtou16(port_sep + 1, NULL, &port) == FALSE)
return -1;
fd = socket(AF_INET, SOCK_STREAM, 0);
if (fd == -1)
return -1;
s_in.sin_family = AF_INET;
s_in.sin_addr.s_addr = inet_addr(path);
s_in.sin_port = g_htons(port);
*port_sep = ':';
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &one, sizeof(one));
if (bind(fd, (struct sockaddr *) &s_in, sizeof(struct sockaddr_in)))
{
close(fd);
return -1;
}
}
else
{
#endif
return -1;
#ifdef SHARKD_TCP_SUPPORT
}
#endif
#ifndef _WIN32
if (listen(fd, SOMAXCONN))
{
close(fd);
return -1;
}
#endif
return fd;
}
int
sharkd_init(int argc, char **argv)
{
#ifndef _WIN32
int fd;
pid_t pid;
if (argc != 2)
{
fprintf(stderr, "Usage: %s <socket>\n", argv[0]);
fprintf(stderr, "\n");
fprintf(stderr, "<socket> examples:\n");
fprintf(stderr, " - unix:/tmp/sharkd.sock - listen on unix file /tmp/sharkd.sock\n");
#ifdef SHARKD_TCP_SUPPORT
fprintf(stderr, " - tcp:127.0.0.1:4446 - listen on TCP port 4446\n");
#endif
fprintf(stderr, "\n");
return -1;
}
signal(SIGCHLD, SIG_IGN);
fd = socket_init(argv[1]);
if (fd == -1)
return -1;
/* all good - try to daemonize */
pid = fork();
if (pid == -1)
fprintf(stderr, "cannot go to background fork() failed: %s\n", g_strerror(errno));
if (pid != 0)
{
/* parent */
exit(0);
}
_server_fd = fd;
#endif
return 0;
}
int
sharkd_loop(void)
{
#ifndef _WIN32
while (1)
{
int fd;
pid_t pid;
fd = accept(_server_fd, NULL, NULL);
if (fd == -1)
{
fprintf(stderr, "cannot accept(): %s\n", g_strerror(errno));
continue;
}
/* wireshark is not ready for handling multiple capture files in single process, so fork(), and handle it in seperate process */
pid = fork();
if (pid == 0)
{
/* redirect stdin, stdout to socket */
dup2(fd, 0);
dup2(fd, 1);
close(fd);
exit(sharkd_session_main());
}
if (pid == -1)
{
fprintf(stderr, "cannot fork(): %s\n", g_strerror(errno));
}
close(fd);
}
#endif
return 0;
}
/*
* Editor modelines - http://www.wireshark.org/tools/modelines.html
*
* Local variables:
* c-basic-offset: 8
* tab-width: 8
* indent-tabs-mode: t
* End:
*
* vi: set shiftwidth=8 tabstop=8 noexpandtab:
* :indentSize=8:tabSize=8:noTabs=false:
*/