Message ID | b443e11ac32fd3082a59ada42ada8c8973fa0b8a.1613598529.git.gitgitgadget@gmail.com (mailing list archive) |
---|---|
State | Accepted |
Commit | 9406d12e14fa6d2b82f6cfeab4b5081b8e2816b1 |
Headers | show |
Series | Simple IPC Mechanism | expand |
On Wed, Feb 17, 2021 at 09:48:46PM +0000, Jeff Hostetler via GitGitGadget wrote: > From: Jeff Hostetler <jeffhost@microsoft.com> > > Create a version of `unix_stream_listen()` that uses a ".lock" lockfile > to create the unix domain socket in a race-free manner. The "unix_stream_server__listen_with_lock" name is quite a mouthful. My first question was: don't we have an "options" struct that we can use to tell it we're interested in using the locking strategy? But I do find it a little weird for the feature to be at this layer at all. I'd have thought it would make more sense in the simple-ipc layer that implements the unix-socket backend, where app-level logic like "it's OK to just connect to this socket and hang up in order to ping it" might be more appropriate. We might even want to have a more robust check (e.g., an actual "ping" that expects the server to say "yes, I'm here"). (But also see below where I am less certain about this...) > Unix domain sockets have a fundamental problem on Unix systems because > they persist in the filesystem until they are deleted. This is > independent of whether a server is actually listening for connections. > Well-behaved servers are expected to delete the socket when they > shutdown. A new server cannot easily tell if a found socket is > attached to an active server or is leftover cruft from a dead server. > The traditional solution used by `unix_stream_listen()` is to force > delete the socket pathname and then create a new socket. This solves > the latter (cruft) problem, but in the case of the former, it orphans > the existing server (by stealing the pathname associated with the > socket it is listening on). Nicely explained. > We cannot directly use a .lock lockfile to create the socket because > the socket is created by `bind(2)` rather than the `open(2)` mechanism > used by `tempfile.c`. > > As an alternative, we hold a plain lockfile ("<path>.lock") as a > mutual exclusion device. Under the lock, we test if an existing > socket ("<path>") is has an active server. If not, create a new > socket and begin listening. Then we rollback the lockfile in all > cases. Make sense. > +static int is_another_server_alive(const char *path, > + const struct unix_stream_listen_opts *opts) > +{ > + struct stat st; > + int fd; > + > + if (!lstat(path, &st) && S_ISSOCK(st.st_mode)) { > + /* > + * A socket-inode exists on disk at `path`, but we > + * don't know whether it belongs to an active server > + * or whether the last server died without cleaning > + * up. > + * > + * Poke it with a trivial connection to try to find > + * out. > + */ > + fd = unix_stream_connect(path, opts->disallow_chdir); > + if (fd >= 0) { > + close(fd); > + return 1; > + } > + } The lstat() seems redundant here. unix_stream_connect() will tell us whether there is something to connect to or not. (It's also racy with respect to the actual connect, but since you're doing this under lock, I don't think that matters). > +struct unix_stream_server_socket *unix_stream_server__listen_with_lock( > + const char *path, > + const struct unix_stream_listen_opts *opts) > +{ > + struct lock_file lock = LOCK_INIT; > + int fd_socket; > + struct unix_stream_server_socket *server_socket; > + > + /* > + * Create a lock at "<path>.lock" if we can. > + */ > + if (hold_lock_file_for_update_timeout(&lock, path, 0, > + opts->timeout_ms) < 0) { > + error_errno(_("could not lock listener socket '%s'"), path); > + return NULL; > + } Would you want to ping to see if it's alive before creating the lock? That would be the fast-path if we assume that a server will usually be there once started. Or is that supposed to happen in the caller (in which case I'd again wonder if this really should be happening in the simple-ipc code). > + /* > + * If another server is listening on "<path>" give up. We do not > + * want to create a socket and steal future connections from them. > + */ > + if (is_another_server_alive(path, opts)) { > + errno = EADDRINUSE; > + error_errno(_("listener socket already in use '%s'"), path); > + rollback_lock_file(&lock); > + return NULL; > + } Wouldn't this be a "success" case for a caller? They did not open the server themselves, but they are presumably happy that there is one there now to talk to. So do we actually want to print an error to stderr? Likewise, how do they tell the difference between this NULL and the NULL we returned above because we couldn't take the lock? Or the NULL we return below because there is some error creating a listening socket? I'd think in those three cases you'd want: - if lock contention, pause a moment and wait for the winner to spin up and serve requests - if another server is live while we hold the lock, then we raced them and they won. Release the lock and start using them. - if we really tried to call unix_stream_listen() and that failed, give up now. There is some system error that is not likely to be fixed by trying anything more (e.g., ENAMETOOLONG). > + server_socket = xcalloc(1, sizeof(*server_socket)); > + server_socket->path_socket = strdup(path); > + server_socket->fd_socket = fd_socket; What do we need this server_socket for? The caller already knows the path; they fed it to us. We do need to return the descriptor, but we could do that directly. > + lstat(path, &server_socket->st_socket); This lstat I guess is part of your "periodically check to see if we're still the one holding the socket" strategy. We _shouldn't_ need that anymore, with the dotlocking, but I'm OK with it as a belt-and-suspenders check. But why are we filling in the lstat here? This seems like something that the unix-socket code doesn't really need to know about (though you do at least provide the complementary "was_stolen" function here, so that part makes sense). Again, I guess I'd find it less weird if it were happening at a layer above. Maybe I'm really just complaining that this is in unix-socket.c. I guess it is a separate unix_stream_server data type. Arguably that should go in a separate file, but I guess the whole conditional compilation of unix-socket.c makes that awkward. So maybe this is the least-bad thing. > + /* > + * Always rollback (just delete) "<path>.lock" because we already created > + * "<path>" as a socket and do not want to commit_lock to do the atomic > + * rename trick. > + */ > + rollback_lock_file(&lock); > + > + return server_socket; > +} OK, this part makes sense to me. > +void unix_stream_server__free( > + struct unix_stream_server_socket *server_socket) > +{ > + if (!server_socket) > + return; > + > + if (server_socket->fd_socket >= 0) { > + if (!unix_stream_server__was_stolen(server_socket)) > + unlink(server_socket->path_socket); > + close(server_socket->fd_socket); > + } > + > + free(server_socket->path_socket); > + free(server_socket); > +} OK, this makes sense. We only remove it if we're still the ones holding it. That's not done under lock, though, so it's possibly racy (somebody steals from us while _they_ hold the lock; we check and see "not stolen" right before they steal it, and then we unlink their stolen copy). > +int unix_stream_server__was_stolen( > + struct unix_stream_server_socket *server_socket) > +{ > + struct stat st_now; > + > + if (!server_socket) > + return 0; > + > + if (lstat(server_socket->path_socket, &st_now) == -1) > + return 1; > + > + if (st_now.st_ino != server_socket->st_socket.st_ino) > + return 1; > + > + /* We might also consider the ctime on some platforms. */ > + > + return 0; > +} You probably should confirm that st.dev matches, too, since that is the namespace for st.ino. Maybe also double check that it's still a socket with S_ISSOCK(st_mode)? -Peff
On 2/26/21 2:56 AM, Jeff King wrote: > On Wed, Feb 17, 2021 at 09:48:46PM +0000, Jeff Hostetler via GitGitGadget wrote: > >> From: Jeff Hostetler <jeffhost@microsoft.com> >> >> Create a version of `unix_stream_listen()` that uses a ".lock" lockfile >> to create the unix domain socket in a race-free manner. > > The "unix_stream_server__listen_with_lock" name is quite a mouthful. My > first question was: don't we have an "options" struct that we can use to > tell it we're interested in using the locking strategy? > > But I do find it a little weird for the feature to be at this layer at > all. I'd have thought it would make more sense in the simple-ipc layer > that implements the unix-socket backend, where app-level logic like > "it's OK to just connect to this socket and hang up in order to ping it" > might be more appropriate. We might even want to have a more robust > check (e.g., an actual "ping" that expects the server to say "yes, I'm > here"). I think when I started this, the "safe listen" was much closer to the original `unix_stream_listen()` and it made sense to keep it nearby, but as it evolved (and we added lockfiles and etc.) it grew to be more like its own level between the original socket code and the simple-ipc layer. Pulling it out into its own source file is probably a good idea for clarity. I was thinking that the "ping" is just to see if a server is listening or not. (And I viewed that as kind of a hack, but it works.) If we start sending data back and forth, we get into protocols and blocking and stuff that this layer (even if we move it up a level) doesn't know about. I'll pull this out into a new file. > > (But also see below where I am less certain about this...) > >> Unix domain sockets have a fundamental problem on Unix systems because >> they persist in the filesystem until they are deleted. This is >> independent of whether a server is actually listening for connections. >> Well-behaved servers are expected to delete the socket when they >> shutdown. A new server cannot easily tell if a found socket is >> attached to an active server or is leftover cruft from a dead server. >> The traditional solution used by `unix_stream_listen()` is to force >> delete the socket pathname and then create a new socket. This solves >> the latter (cruft) problem, but in the case of the former, it orphans >> the existing server (by stealing the pathname associated with the >> socket it is listening on). > > Nicely explained. > >> We cannot directly use a .lock lockfile to create the socket because >> the socket is created by `bind(2)` rather than the `open(2)` mechanism >> used by `tempfile.c`. >> >> As an alternative, we hold a plain lockfile ("<path>.lock") as a >> mutual exclusion device. Under the lock, we test if an existing >> socket ("<path>") is has an active server. If not, create a new >> socket and begin listening. Then we rollback the lockfile in all >> cases. > > Make sense. > >> +static int is_another_server_alive(const char *path, >> + const struct unix_stream_listen_opts *opts) >> +{ >> + struct stat st; >> + int fd; >> + >> + if (!lstat(path, &st) && S_ISSOCK(st.st_mode)) { >> + /* >> + * A socket-inode exists on disk at `path`, but we >> + * don't know whether it belongs to an active server >> + * or whether the last server died without cleaning >> + * up. >> + * >> + * Poke it with a trivial connection to try to find >> + * out. >> + */ >> + fd = unix_stream_connect(path, opts->disallow_chdir); >> + if (fd >= 0) { >> + close(fd); >> + return 1; >> + } >> + } > > The lstat() seems redundant here. unix_stream_connect() will tell us > whether there is something to connect to or not. (It's also racy with > respect to the actual connect, but since you're doing this under lock, I > don't think that matters). I agree. I'll get rid of the lstat(). > >> +struct unix_stream_server_socket *unix_stream_server__listen_with_lock( >> + const char *path, >> + const struct unix_stream_listen_opts *opts) >> +{ >> + struct lock_file lock = LOCK_INIT; >> + int fd_socket; >> + struct unix_stream_server_socket *server_socket; >> + >> + /* >> + * Create a lock at "<path>.lock" if we can. >> + */ >> + if (hold_lock_file_for_update_timeout(&lock, path, 0, >> + opts->timeout_ms) < 0) { >> + error_errno(_("could not lock listener socket '%s'"), path); >> + return NULL; >> + } > > Would you want to ping to see if it's alive before creating the lock? > That would be the fast-path if we assume that a server will usually be > there once started. Or is that supposed to happen in the caller (in > which case I'd again wonder if this really should be happening in the > simple-ipc code). Starting a server should not happen that often, so I'm not sure it matters. And yes, a server once started should run for a long time. Pinging without the lock puts us back in another race, so we might as well lock first. > >> + /* >> + * If another server is listening on "<path>" give up. We do not >> + * want to create a socket and steal future connections from them. >> + */ >> + if (is_another_server_alive(path, opts)) { >> + errno = EADDRINUSE; >> + error_errno(_("listener socket already in use '%s'"), path); >> + rollback_lock_file(&lock); >> + return NULL; >> + } > > Wouldn't this be a "success" case for a caller? They did not open the > server themselves, but they are presumably happy that there is one there > now to talk to. So do we actually want to print an error to stderr? > Likewise, how do they tell the difference between this NULL and the NULL > we returned above because we couldn't take the lock? Or the NULL we > return below because there is some error creating a listening socket? > > I'd think in those three cases you'd want: > > - if lock contention, pause a moment and wait for the winner to spin > up and serve requests > > - if another server is live while we hold the lock, then we raced them > and they won. Release the lock and start using them. > > - if we really tried to call unix_stream_listen() and that failed, > give up now. There is some system error that is not likely to be > fixed by trying anything more (e.g., ENAMETOOLONG). Yes, I want to move the error messages out of these library layers. And yes, if another server is running, our server instance should shutdown gracefully. Other client processes can just talk to them rather than us. > >> + server_socket = xcalloc(1, sizeof(*server_socket)); >> + server_socket->path_socket = strdup(path); >> + server_socket->fd_socket = fd_socket; > > What do we need this server_socket for? The caller already knows the > path; they fed it to us. We do need to return the descriptor, but we > could do that directly. I wanted a wrapper struct to persist a copy of the pathname near the fd. Later when we get ready to shutdown, we can close and unlink without worrying whether our caller kept their copy of the path buffer. This also lets me have the pathname to poll and check for theft during the accept thread's event loop. > >> + lstat(path, &server_socket->st_socket); > > This lstat I guess is part of your "periodically check to see if we're > still the one holding the socket" strategy. We _shouldn't_ need that > anymore, with the dotlocking, but I'm OK with it as a > belt-and-suspenders check. But why are we filling in the lstat here? > This seems like something that the unix-socket code doesn't really need > to know about (though you do at least provide the complementary > "was_stolen" function here, so that part makes sense). The dotlock is only on disk for the duration of the socket setup. We do the rollback (to delete the lockfile) once we have the socket open and ready for business. The lstat gives me the inode of the socket on disk and we can watch it with future lstat's in the event loop and see if it changes and detect theft and auto-shutdown. > > Again, I guess I'd find it less weird if it were happening at a layer > above. Maybe I'm really just complaining that this is in unix-socket.c. > I guess it is a separate unix_stream_server data type. Arguably that > should go in a separate file, but I guess the whole conditional > compilation of unix-socket.c makes that awkward. So maybe this is the > least-bad thing. Yeah, I'll move it out. And yes, the whole conditional compilation thing was something I was hesitating on, but it really isn't that bad. (But I should not brag here until all of the build servers have had their say....) > >> + /* >> + * Always rollback (just delete) "<path>.lock" because we already created >> + * "<path>" as a socket and do not want to commit_lock to do the atomic >> + * rename trick. >> + */ >> + rollback_lock_file(&lock); >> + >> + return server_socket; >> +} > > OK, this part makes sense to me. > >> +void unix_stream_server__free( >> + struct unix_stream_server_socket *server_socket) >> +{ >> + if (!server_socket) >> + return; >> + >> + if (server_socket->fd_socket >= 0) { >> + if (!unix_stream_server__was_stolen(server_socket)) >> + unlink(server_socket->path_socket); >> + close(server_socket->fd_socket); >> + } >> + >> + free(server_socket->path_socket); >> + free(server_socket); >> +} > > OK, this makes sense. We only remove it if we're still the ones holding > it. That's not done under lock, though, so it's possibly racy (somebody > steals from us while _they_ hold the lock; we check and see "not stolen" > right before they steal it, and then we unlink their stolen copy). Right, I didn't bother with the lock here. I don't think we need it. We technically still have the socket open and are listening on it when we lstat and unlink it. The other process should create the lock and try to connect. That should hang in the kernel because of the accept() grace period. Then we close the socket and the client's connection request errors because we didn't accept it. They will see the error as no one is listening and then create their own socket. > >> +int unix_stream_server__was_stolen( >> + struct unix_stream_server_socket *server_socket) >> +{ >> + struct stat st_now; >> + >> + if (!server_socket) >> + return 0; >> + >> + if (lstat(server_socket->path_socket, &st_now) == -1) >> + return 1; >> + >> + if (st_now.st_ino != server_socket->st_socket.st_ino) >> + return 1; >> + >> + /* We might also consider the ctime on some platforms. */ >> + >> + return 0; >> +} > > You probably should confirm that st.dev matches, too, since that is the > namespace for st.ino. Maybe also double check that it's still a socket > with S_ISSOCK(st_mode)? Good point. > > -Peff > Thanks for all the careful study. I'll push up a new series to address them shortly. Jeff
On Tue, Mar 02, 2021 at 06:50:51PM -0500, Jeff Hostetler wrote: > I was thinking that the "ping" is just to see if a server is listening > or not. (And I viewed that as kind of a hack, but it works.) If we > start sending data back and forth, we get into protocols and blocking > and stuff that this layer (even if we move it up a level) doesn't know > about. Right. Definitely the higher up the stack the ping happens, the more value it has. But I also see the appeal of keeping this as its own layer. > > > + if (hold_lock_file_for_update_timeout(&lock, path, 0, > > > + opts->timeout_ms) < 0) { > > > + error_errno(_("could not lock listener socket '%s'"), path); > > > + return NULL; > > > + } > > > > Would you want to ping to see if it's alive before creating the lock? > > That would be the fast-path if we assume that a server will usually be > > there once started. Or is that supposed to happen in the caller (in > > which case I'd again wonder if this really should be happening in the > > simple-ipc code). > > Starting a server should not happen that often, so I'm not sure it > matters. And yes, a server once started should run for a long time. > Pinging without the lock puts us back in another race, so we might as > well lock first. Definitely you need to ping under lock to avoid races. But I was thinking of an additional optimistic ping before we take the lock. I agree that starting the server should be rare, which is why I think there's value in seeing "is it up" before taking any lock. But I suspect your thinking is that this ping happens in the caller anyway, before we hit any of this unix_socket_listen() code at all. And that makes sense to me. In fact, I guess it has to happen that way, because "try to connect" and "try to spin up a server" are likely happening in two separate processes entirely (we only spawn the second one if the first one failed its ping). > > I'd think in those three cases you'd want: > > > > - if lock contention, pause a moment and wait for the winner to spin > > up and serve requests > > > > - if another server is live while we hold the lock, then we raced them > > and they won. Release the lock and start using them. > > > > - if we really tried to call unix_stream_listen() and that failed, > > give up now. There is some system error that is not likely to be > > fixed by trying anything more (e.g., ENAMETOOLONG). > > Yes, I want to move the error messages out of these library layers. > > And yes, if another server is running, our server instance should > shutdown gracefully. Other client processes can just talk to them > rather than us. Right, that makes sense. Again, I was thinking earlier of the whole "try to connect, but spin up a server otherwise" thing happening in a single process. But by the time we get to the listen code, we have probably already spawned a server process, and have redirected its stderr somewhere. And likewise the caller doesn't even care that much if the server reports an error because it somebody else won the race. It only cares that after a few connect attempts it manages to talk to _somebody_. > > > + lstat(path, &server_socket->st_socket); > > > > This lstat I guess is part of your "periodically check to see if we're > > still the one holding the socket" strategy. We _shouldn't_ need that > > anymore, with the dotlocking, but I'm OK with it as a > > belt-and-suspenders check. But why are we filling in the lstat here? > > This seems like something that the unix-socket code doesn't really need > > to know about (though you do at least provide the complementary > > "was_stolen" function here, so that part makes sense). > > The dotlock is only on disk for the duration of the socket setup. > We do the rollback (to delete the lockfile) once we have the socket > open and ready for business. > > The lstat gives me the inode of the socket on disk and we can watch > it with future lstat's in the event loop and see if it changes and > detect theft and auto-shutdown. Right, I gradually came to the understanding of what your extra layer was trying to accomplish while reading (sometimes I'll go back and edit earlier comments in my review before sending out the mail, but in this case it seemed less confusing to leave my train of thought in place. That might not have been correct, though. ;) ). I think if everybody is abiding by the lock system to create the socket, we probably don't strictly _need_ the theft detection. But it might not hurt as a belt-and-suspenders, or for cases where somebody thinks the socket is stale but it isn't (perhaps due to listen backlog or something while trying to do the connect() ping). > > > +void unix_stream_server__free( > > > + struct unix_stream_server_socket *server_socket) > > > +{ > > > + if (!server_socket) > > > + return; > > > + > > > + if (server_socket->fd_socket >= 0) { > > > + if (!unix_stream_server__was_stolen(server_socket)) > > > + unlink(server_socket->path_socket); > > > + close(server_socket->fd_socket); > > > + } > > > + > > > + free(server_socket->path_socket); > > > + free(server_socket); > > > +} > > > > OK, this makes sense. We only remove it if we're still the ones holding > > it. That's not done under lock, though, so it's possibly racy (somebody > > steals from us while _they_ hold the lock; we check and see "not stolen" > > right before they steal it, and then we unlink their stolen copy). > > Right, I didn't bother with the lock here. I don't think we need it. > > We technically still have the socket open and are listening on it when > we lstat and unlink it. The other process should create the lock and > try to connect. That should hang in the kernel because of the accept() > grace period. Then we close the socket and the client's connection > request errors because we didn't accept it. They will see the error > as no one is listening and then create their own socket. I think there are still some races (at least if we believe that anything can be stolen in the first place). Something like: - process A holds the socket but plans to exit - process B takes the lock - process B tries to ping us, but it doesn't work for some reason (this part is vague, but it's also the thing that makes stealing possible at all) - process A calls was_stolen(), which says "no" - process B decides nobody is there, so it unlinks the socket and creates its own - process A calls unlink(), removing B's socket A is OK with this; it was exiting anyway. But it just stranded B, who _thinks_ it owns the socket, but doesn't. Again, there's a vagueness to "B somehow doesn't see A as listening" in the middle step. But without that step, I don't see how you'd really have stealing in the first place. -Peff
diff --git a/unix-socket.c b/unix-socket.c index 1eaa8cf759c0..647bbde37f97 100644 --- a/unix-socket.c +++ b/unix-socket.c @@ -1,4 +1,5 @@ #include "cache.h" +#include "lockfile.h" #include "unix-socket.h" static int chdir_len(const char *orig, int len) @@ -132,3 +133,117 @@ int unix_stream_listen(const char *path, errno = saved_errno; return -1; } + +static int is_another_server_alive(const char *path, + const struct unix_stream_listen_opts *opts) +{ + struct stat st; + int fd; + + if (!lstat(path, &st) && S_ISSOCK(st.st_mode)) { + /* + * A socket-inode exists on disk at `path`, but we + * don't know whether it belongs to an active server + * or whether the last server died without cleaning + * up. + * + * Poke it with a trivial connection to try to find + * out. + */ + fd = unix_stream_connect(path, opts->disallow_chdir); + if (fd >= 0) { + close(fd); + return 1; + } + } + + return 0; +} + +struct unix_stream_server_socket *unix_stream_server__listen_with_lock( + const char *path, + const struct unix_stream_listen_opts *opts) +{ + struct lock_file lock = LOCK_INIT; + int fd_socket; + struct unix_stream_server_socket *server_socket; + + /* + * Create a lock at "<path>.lock" if we can. + */ + if (hold_lock_file_for_update_timeout(&lock, path, 0, + opts->timeout_ms) < 0) { + error_errno(_("could not lock listener socket '%s'"), path); + return NULL; + } + + /* + * If another server is listening on "<path>" give up. We do not + * want to create a socket and steal future connections from them. + */ + if (is_another_server_alive(path, opts)) { + errno = EADDRINUSE; + error_errno(_("listener socket already in use '%s'"), path); + rollback_lock_file(&lock); + return NULL; + } + + /* + * Create and bind to a Unix domain socket at "<path>". + */ + fd_socket = unix_stream_listen(path, opts); + if (fd_socket < 0) { + error_errno(_("could not create listener socket '%s'"), path); + rollback_lock_file(&lock); + return NULL; + } + + server_socket = xcalloc(1, sizeof(*server_socket)); + server_socket->path_socket = strdup(path); + server_socket->fd_socket = fd_socket; + lstat(path, &server_socket->st_socket); + + /* + * Always rollback (just delete) "<path>.lock" because we already created + * "<path>" as a socket and do not want to commit_lock to do the atomic + * rename trick. + */ + rollback_lock_file(&lock); + + return server_socket; +} + +void unix_stream_server__free( + struct unix_stream_server_socket *server_socket) +{ + if (!server_socket) + return; + + if (server_socket->fd_socket >= 0) { + if (!unix_stream_server__was_stolen(server_socket)) + unlink(server_socket->path_socket); + close(server_socket->fd_socket); + } + + free(server_socket->path_socket); + free(server_socket); +} + +int unix_stream_server__was_stolen( + struct unix_stream_server_socket *server_socket) +{ + struct stat st_now; + + if (!server_socket) + return 0; + + if (lstat(server_socket->path_socket, &st_now) == -1) + return 1; + + if (st_now.st_ino != server_socket->st_socket.st_ino) + return 1; + + /* We might also consider the ctime on some platforms. */ + + return 0; +} diff --git a/unix-socket.h b/unix-socket.h index 2c0b2e79d7b3..8faf5b692f90 100644 --- a/unix-socket.h +++ b/unix-socket.h @@ -2,14 +2,17 @@ #define UNIX_SOCKET_H struct unix_stream_listen_opts { + long timeout_ms; int listen_backlog_size; unsigned int disallow_chdir:1; }; +#define DEFAULT_UNIX_STREAM_LISTEN_TIMEOUT (100) #define DEFAULT_UNIX_STREAM_LISTEN_BACKLOG (5) #define UNIX_STREAM_LISTEN_OPTS_INIT \ { \ + .timeout_ms = DEFAULT_UNIX_STREAM_LISTEN_TIMEOUT, \ .listen_backlog_size = DEFAULT_UNIX_STREAM_LISTEN_BACKLOG, \ .disallow_chdir = 0, \ } @@ -18,4 +21,30 @@ int unix_stream_connect(const char *path, int disallow_chdir); int unix_stream_listen(const char *path, const struct unix_stream_listen_opts *opts); +struct unix_stream_server_socket { + char *path_socket; + struct stat st_socket; + int fd_socket; +}; + +/* + * Create a Unix Domain Socket at the given path under the protection + * of a '.lock' lockfile. + */ +struct unix_stream_server_socket *unix_stream_server__listen_with_lock( + const char *path, + const struct unix_stream_listen_opts *opts); + +/* + * Close and delete the socket. + */ +void unix_stream_server__free( + struct unix_stream_server_socket *server_socket); + +/* + * Return 1 if the inode of the pathname to our socket changes. + */ +int unix_stream_server__was_stolen( + struct unix_stream_server_socket *server_socket); + #endif /* UNIX_SOCKET_H */