Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1509 lines
55 KiB

  1. =head1 NAME
  2. perlipc - Perl interprocess communication (signals, fifos, pipes, safe subprocesses, sockets, and semaphores)
  3. =head1 DESCRIPTION
  4. The basic IPC facilities of Perl are built out of the good old Unix
  5. signals, named pipes, pipe opens, the Berkeley socket routines, and SysV
  6. IPC calls. Each is used in slightly different situations.
  7. =head1 Signals
  8. Perl uses a simple signal handling model: the %SIG hash contains names or
  9. references of user-installed signal handlers. These handlers will be called
  10. with an argument which is the name of the signal that triggered it. A
  11. signal may be generated intentionally from a particular keyboard sequence like
  12. control-C or control-Z, sent to you from another process, or
  13. triggered automatically by the kernel when special events transpire, like
  14. a child process exiting, your process running out of stack space, or
  15. hitting file size limit.
  16. For example, to trap an interrupt signal, set up a handler like this.
  17. Do as little as you possibly can in your handler; notice how all we do is
  18. set a global variable and then raise an exception. That's because on most
  19. systems, libraries are not re-entrant; particularly, memory allocation and
  20. I/O routines are not. That means that doing nearly I<anything> in your
  21. handler could in theory trigger a memory fault and subsequent core dump.
  22. sub catch_zap {
  23. my $signame = shift;
  24. $shucks++;
  25. die "Somebody sent me a SIG$signame";
  26. }
  27. $SIG{INT} = 'catch_zap'; # could fail in modules
  28. $SIG{INT} = \&catch_zap; # best strategy
  29. The names of the signals are the ones listed out by C<kill -l> on your
  30. system, or you can retrieve them from the Config module. Set up an
  31. @signame list indexed by number to get the name and a %signo table
  32. indexed by name to get the number:
  33. use Config;
  34. defined $Config{sig_name} || die "No sigs?";
  35. foreach $name (split(' ', $Config{sig_name})) {
  36. $signo{$name} = $i;
  37. $signame[$i] = $name;
  38. $i++;
  39. }
  40. So to check whether signal 17 and SIGALRM were the same, do just this:
  41. print "signal #17 = $signame[17]\n";
  42. if ($signo{ALRM}) {
  43. print "SIGALRM is $signo{ALRM}\n";
  44. }
  45. You may also choose to assign the strings C<'IGNORE'> or C<'DEFAULT'> as
  46. the handler, in which case Perl will try to discard the signal or do the
  47. default thing.
  48. On most Unix platforms, the C<CHLD> (sometimes also known as C<CLD>) signal
  49. has special behavior with respect to a value of C<'IGNORE'>.
  50. Setting C<$SIG{CHLD}> to C<'IGNORE'> on such a platform has the effect of
  51. not creating zombie processes when the parent process fails to C<wait()>
  52. on its child processes (i.e. child processes are automatically reaped).
  53. Calling C<wait()> with C<$SIG{CHLD}> set to C<'IGNORE'> usually returns
  54. C<-1> on such platforms.
  55. Some signals can be neither trapped nor ignored, such as
  56. the KILL and STOP (but not the TSTP) signals. One strategy for
  57. temporarily ignoring signals is to use a local() statement, which will be
  58. automatically restored once your block is exited. (Remember that local()
  59. values are "inherited" by functions called from within that block.)
  60. sub precious {
  61. local $SIG{INT} = 'IGNORE';
  62. &more_functions;
  63. }
  64. sub more_functions {
  65. # interrupts still ignored, for now...
  66. }
  67. Sending a signal to a negative process ID means that you send the signal
  68. to the entire Unix process-group. This code sends a hang-up signal to all
  69. processes in the current process group (and sets $SIG{HUP} to IGNORE so
  70. it doesn't kill itself):
  71. {
  72. local $SIG{HUP} = 'IGNORE';
  73. kill HUP => -$$;
  74. # snazzy writing of: kill('HUP', -$$)
  75. }
  76. Another interesting signal to send is signal number zero. This doesn't
  77. actually affect another process, but instead checks whether it's alive
  78. or has changed its UID.
  79. unless (kill 0 => $kid_pid) {
  80. warn "something wicked happened to $kid_pid";
  81. }
  82. You might also want to employ anonymous functions for simple signal
  83. handlers:
  84. $SIG{INT} = sub { die "\nOutta here!\n" };
  85. But that will be problematic for the more complicated handlers that need
  86. to reinstall themselves. Because Perl's signal mechanism is currently
  87. based on the signal(3) function from the C library, you may sometimes be so
  88. misfortunate as to run on systems where that function is "broken", that
  89. is, it behaves in the old unreliable SysV way rather than the newer, more
  90. reasonable BSD and POSIX fashion. So you'll see defensive people writing
  91. signal handlers like this:
  92. sub REAPER {
  93. $waitedpid = wait;
  94. # loathe sysV: it makes us not only reinstate
  95. # the handler, but place it after the wait
  96. $SIG{CHLD} = \&REAPER;
  97. }
  98. $SIG{CHLD} = \&REAPER;
  99. # now do something that forks...
  100. or even the more elaborate:
  101. use POSIX ":sys_wait_h";
  102. sub REAPER {
  103. my $child;
  104. while (($child = waitpid(-1,WNOHANG)) > 0) {
  105. $Kid_Status{$child} = $?;
  106. }
  107. $SIG{CHLD} = \&REAPER; # still loathe sysV
  108. }
  109. $SIG{CHLD} = \&REAPER;
  110. # do something that forks...
  111. Signal handling is also used for timeouts in Unix, While safely
  112. protected within an C<eval{}> block, you set a signal handler to trap
  113. alarm signals and then schedule to have one delivered to you in some
  114. number of seconds. Then try your blocking operation, clearing the alarm
  115. when it's done but not before you've exited your C<eval{}> block. If it
  116. goes off, you'll use die() to jump out of the block, much as you might
  117. using longjmp() or throw() in other languages.
  118. Here's an example:
  119. eval {
  120. local $SIG{ALRM} = sub { die "alarm clock restart" };
  121. alarm 10;
  122. flock(FH, 2); # blocking write lock
  123. alarm 0;
  124. };
  125. if ($@ and $@ !~ /alarm clock restart/) { die }
  126. If the operation being timed out is system() or qx(), this technique
  127. is liable to generate zombies. If this matters to you, you'll
  128. need to do your own fork() and exec(), and kill the errant child process.
  129. For more complex signal handling, you might see the standard POSIX
  130. module. Lamentably, this is almost entirely undocumented, but
  131. the F<t/lib/posix.t> file from the Perl source distribution has some
  132. examples in it.
  133. =head1 Named Pipes
  134. A named pipe (often referred to as a FIFO) is an old Unix IPC
  135. mechanism for processes communicating on the same machine. It works
  136. just like a regular, connected anonymous pipes, except that the
  137. processes rendezvous using a filename and don't have to be related.
  138. To create a named pipe, use the Unix command mknod(1) or on some
  139. systems, mkfifo(1). These may not be in your normal path.
  140. # system return val is backwards, so && not ||
  141. #
  142. $ENV{PATH} .= ":/etc:/usr/etc";
  143. if ( system('mknod', $path, 'p')
  144. && system('mkfifo', $path) )
  145. {
  146. die "mk{nod,fifo} $path failed";
  147. }
  148. A fifo is convenient when you want to connect a process to an unrelated
  149. one. When you open a fifo, the program will block until there's something
  150. on the other end.
  151. For example, let's say you'd like to have your F<.signature> file be a
  152. named pipe that has a Perl program on the other end. Now every time any
  153. program (like a mailer, news reader, finger program, etc.) tries to read
  154. from that file, the reading program will block and your program will
  155. supply the new signature. We'll use the pipe-checking file test B<-p>
  156. to find out whether anyone (or anything) has accidentally removed our fifo.
  157. chdir; # go home
  158. $FIFO = '.signature';
  159. $ENV{PATH} .= ":/etc:/usr/games";
  160. while (1) {
  161. unless (-p $FIFO) {
  162. unlink $FIFO;
  163. system('mknod', $FIFO, 'p')
  164. && die "can't mknod $FIFO: $!";
  165. }
  166. # next line blocks until there's a reader
  167. open (FIFO, "> $FIFO") || die "can't write $FIFO: $!";
  168. print FIFO "John Smith (smith\@host.org)\n", `fortune -s`;
  169. close FIFO;
  170. sleep 2; # to avoid dup signals
  171. }
  172. =head2 WARNING
  173. By installing Perl code to deal with signals, you're exposing yourself
  174. to danger from two things. First, few system library functions are
  175. re-entrant. If the signal interrupts while Perl is executing one function
  176. (like malloc(3) or printf(3)), and your signal handler then calls the
  177. same function again, you could get unpredictable behavior--often, a
  178. core dump. Second, Perl isn't itself re-entrant at the lowest levels.
  179. If the signal interrupts Perl while Perl is changing its own internal
  180. data structures, similarly unpredictable behaviour may result.
  181. There are two things you can do, knowing this: be paranoid or be
  182. pragmatic. The paranoid approach is to do as little as possible in your
  183. signal handler. Set an existing integer variable that already has a
  184. value, and return. This doesn't help you if you're in a slow system call,
  185. which will just restart. That means you have to C<die> to longjump(3) out
  186. of the handler. Even this is a little cavalier for the true paranoiac,
  187. who avoids C<die> in a handler because the system I<is> out to get you.
  188. The pragmatic approach is to say ``I know the risks, but prefer the
  189. convenience'', and to do anything you want in your signal handler,
  190. prepared to clean up core dumps now and again.
  191. To forbid signal handlers altogether would bars you from
  192. many interesting programs, including virtually everything in this manpage,
  193. since you could no longer even write SIGCHLD handlers.
  194. =head1 Using open() for IPC
  195. Perl's basic open() statement can also be used for unidirectional interprocess
  196. communication by either appending or prepending a pipe symbol to the second
  197. argument to open(). Here's how to start something up in a child process you
  198. intend to write to:
  199. open(SPOOLER, "| cat -v | lpr -h 2>/dev/null")
  200. || die "can't fork: $!";
  201. local $SIG{PIPE} = sub { die "spooler pipe broke" };
  202. print SPOOLER "stuff\n";
  203. close SPOOLER || die "bad spool: $! $?";
  204. And here's how to start up a child process you intend to read from:
  205. open(STATUS, "netstat -an 2>&1 |")
  206. || die "can't fork: $!";
  207. while (<STATUS>) {
  208. next if /^(tcp|udp)/;
  209. print;
  210. }
  211. close STATUS || die "bad netstat: $! $?";
  212. If one can be sure that a particular program is a Perl script that is
  213. expecting filenames in @ARGV, the clever programmer can write something
  214. like this:
  215. % program f1 "cmd1|" - f2 "cmd2|" f3 < tmpfile
  216. and irrespective of which shell it's called from, the Perl program will
  217. read from the file F<f1>, the process F<cmd1>, standard input (F<tmpfile>
  218. in this case), the F<f2> file, the F<cmd2> command, and finally the F<f3>
  219. file. Pretty nifty, eh?
  220. You might notice that you could use backticks for much the
  221. same effect as opening a pipe for reading:
  222. print grep { !/^(tcp|udp)/ } `netstat -an 2>&1`;
  223. die "bad netstat" if $?;
  224. While this is true on the surface, it's much more efficient to process the
  225. file one line or record at a time because then you don't have to read the
  226. whole thing into memory at once. It also gives you finer control of the
  227. whole process, letting you to kill off the child process early if you'd
  228. like.
  229. Be careful to check both the open() and the close() return values. If
  230. you're I<writing> to a pipe, you should also trap SIGPIPE. Otherwise,
  231. think of what happens when you start up a pipe to a command that doesn't
  232. exist: the open() will in all likelihood succeed (it only reflects the
  233. fork()'s success), but then your output will fail--spectacularly. Perl
  234. can't know whether the command worked because your command is actually
  235. running in a separate process whose exec() might have failed. Therefore,
  236. while readers of bogus commands return just a quick end of file, writers
  237. to bogus command will trigger a signal they'd better be prepared to
  238. handle. Consider:
  239. open(FH, "|bogus") or die "can't fork: $!";
  240. print FH "bang\n" or die "can't write: $!";
  241. close FH or die "can't close: $!";
  242. That won't blow up until the close, and it will blow up with a SIGPIPE.
  243. To catch it, you could use this:
  244. $SIG{PIPE} = 'IGNORE';
  245. open(FH, "|bogus") or die "can't fork: $!";
  246. print FH "bang\n" or die "can't write: $!";
  247. close FH or die "can't close: status=$?";
  248. =head2 Filehandles
  249. Both the main process and any child processes it forks share the same
  250. STDIN, STDOUT, and STDERR filehandles. If both processes try to access
  251. them at once, strange things can happen. You may also want to close
  252. or reopen the filehandles for the child. You can get around this by
  253. opening your pipe with open(), but on some systems this means that the
  254. child process cannot outlive the parent.
  255. =head2 Background Processes
  256. You can run a command in the background with:
  257. system("cmd &");
  258. The command's STDOUT and STDERR (and possibly STDIN, depending on your
  259. shell) will be the same as the parent's. You won't need to catch
  260. SIGCHLD because of the double-fork taking place (see below for more
  261. details).
  262. =head2 Complete Dissociation of Child from Parent
  263. In some cases (starting server processes, for instance) you'll want to
  264. completely dissociate the child process from the parent. This is
  265. often called daemonization. A well behaved daemon will also chdir()
  266. to the root directory (so it doesn't prevent unmounting the filesystem
  267. containing the directory from which it was launched) and redirect its
  268. standard file descriptors from and to F</dev/null> (so that random
  269. output doesn't wind up on the user's terminal).
  270. use POSIX 'setsid';
  271. sub daemonize {
  272. chdir '/' or die "Can't chdir to /: $!";
  273. open STDIN, '/dev/null' or die "Can't read /dev/null: $!";
  274. open STDOUT, '>/dev/null'
  275. or die "Can't write to /dev/null: $!";
  276. defined(my $pid = fork) or die "Can't fork: $!";
  277. exit if $pid;
  278. setsid or die "Can't start a new session: $!";
  279. open STDERR, '>&STDOUT' or die "Can't dup stdout: $!";
  280. }
  281. The fork() has to come before the setsid() to ensure that you aren't a
  282. process group leader (the setsid() will fail if you are). If your
  283. system doesn't have the setsid() function, open F</dev/tty> and use the
  284. C<TIOCNOTTY> ioctl() on it instead. See L<tty(4)> for details.
  285. Non-Unix users should check their Your_OS::Process module for other
  286. solutions.
  287. =head2 Safe Pipe Opens
  288. Another interesting approach to IPC is making your single program go
  289. multiprocess and communicate between (or even amongst) yourselves. The
  290. open() function will accept a file argument of either C<"-|"> or C<"|-">
  291. to do a very interesting thing: it forks a child connected to the
  292. filehandle you've opened. The child is running the same program as the
  293. parent. This is useful for safely opening a file when running under an
  294. assumed UID or GID, for example. If you open a pipe I<to> minus, you can
  295. write to the filehandle you opened and your kid will find it in his
  296. STDIN. If you open a pipe I<from> minus, you can read from the filehandle
  297. you opened whatever your kid writes to his STDOUT.
  298. use English;
  299. my $sleep_count = 0;
  300. do {
  301. $pid = open(KID_TO_WRITE, "|-");
  302. unless (defined $pid) {
  303. warn "cannot fork: $!";
  304. die "bailing out" if $sleep_count++ > 6;
  305. sleep 10;
  306. }
  307. } until defined $pid;
  308. if ($pid) { # parent
  309. print KID_TO_WRITE @some_data;
  310. close(KID_TO_WRITE) || warn "kid exited $?";
  311. } else { # child
  312. ($EUID, $EGID) = ($UID, $GID); # suid progs only
  313. open (FILE, "> /safe/file")
  314. || die "can't open /safe/file: $!";
  315. while (<STDIN>) {
  316. print FILE; # child's STDIN is parent's KID
  317. }
  318. exit; # don't forget this
  319. }
  320. Another common use for this construct is when you need to execute
  321. something without the shell's interference. With system(), it's
  322. straightforward, but you can't use a pipe open or backticks safely.
  323. That's because there's no way to stop the shell from getting its hands on
  324. your arguments. Instead, use lower-level control to call exec() directly.
  325. Here's a safe backtick or pipe open for read:
  326. # add error processing as above
  327. $pid = open(KID_TO_READ, "-|");
  328. if ($pid) { # parent
  329. while (<KID_TO_READ>) {
  330. # do something interesting
  331. }
  332. close(KID_TO_READ) || warn "kid exited $?";
  333. } else { # child
  334. ($EUID, $EGID) = ($UID, $GID); # suid only
  335. exec($program, @options, @args)
  336. || die "can't exec program: $!";
  337. # NOTREACHED
  338. }
  339. And here's a safe pipe open for writing:
  340. # add error processing as above
  341. $pid = open(KID_TO_WRITE, "|-");
  342. $SIG{ALRM} = sub { die "whoops, $program pipe broke" };
  343. if ($pid) { # parent
  344. for (@data) {
  345. print KID_TO_WRITE;
  346. }
  347. close(KID_TO_WRITE) || warn "kid exited $?";
  348. } else { # child
  349. ($EUID, $EGID) = ($UID, $GID);
  350. exec($program, @options, @args)
  351. || die "can't exec program: $!";
  352. # NOTREACHED
  353. }
  354. Note that these operations are full Unix forks, which means they may not be
  355. correctly implemented on alien systems. Additionally, these are not true
  356. multithreading. If you'd like to learn more about threading, see the
  357. F<modules> file mentioned below in the SEE ALSO section.
  358. =head2 Bidirectional Communication with Another Process
  359. While this works reasonably well for unidirectional communication, what
  360. about bidirectional communication? The obvious thing you'd like to do
  361. doesn't actually work:
  362. open(PROG_FOR_READING_AND_WRITING, "| some program |")
  363. and if you forget to use the C<use warnings> pragma or the B<-w> flag,
  364. then you'll miss out entirely on the diagnostic message:
  365. Can't do bidirectional pipe at -e line 1.
  366. If you really want to, you can use the standard open2() library function
  367. to catch both ends. There's also an open3() for tridirectional I/O so you
  368. can also catch your child's STDERR, but doing so would then require an
  369. awkward select() loop and wouldn't allow you to use normal Perl input
  370. operations.
  371. If you look at its source, you'll see that open2() uses low-level
  372. primitives like Unix pipe() and exec() calls to create all the connections.
  373. While it might have been slightly more efficient by using socketpair(), it
  374. would have then been even less portable than it already is. The open2()
  375. and open3() functions are unlikely to work anywhere except on a Unix
  376. system or some other one purporting to be POSIX compliant.
  377. Here's an example of using open2():
  378. use FileHandle;
  379. use IPC::Open2;
  380. $pid = open2(*Reader, *Writer, "cat -u -n" );
  381. print Writer "stuff\n";
  382. $got = <Reader>;
  383. The problem with this is that Unix buffering is really going to
  384. ruin your day. Even though your C<Writer> filehandle is auto-flushed,
  385. and the process on the other end will get your data in a timely manner,
  386. you can't usually do anything to force it to give it back to you
  387. in a similarly quick fashion. In this case, we could, because we
  388. gave I<cat> a B<-u> flag to make it unbuffered. But very few Unix
  389. commands are designed to operate over pipes, so this seldom works
  390. unless you yourself wrote the program on the other end of the
  391. double-ended pipe.
  392. A solution to this is the nonstandard F<Comm.pl> library. It uses
  393. pseudo-ttys to make your program behave more reasonably:
  394. require 'Comm.pl';
  395. $ph = open_proc('cat -n');
  396. for (1..10) {
  397. print $ph "a line\n";
  398. print "got back ", scalar <$ph>;
  399. }
  400. This way you don't have to have control over the source code of the
  401. program you're using. The F<Comm> library also has expect()
  402. and interact() functions. Find the library (and we hope its
  403. successor F<IPC::Chat>) at your nearest CPAN archive as detailed
  404. in the SEE ALSO section below.
  405. The newer Expect.pm module from CPAN also addresses this kind of thing.
  406. This module requires two other modules from CPAN: IO::Pty and IO::Stty.
  407. It sets up a pseudo-terminal to interact with programs that insist on
  408. using talking to the terminal device driver. If your system is
  409. amongst those supported, this may be your best bet.
  410. =head2 Bidirectional Communication with Yourself
  411. If you want, you may make low-level pipe() and fork()
  412. to stitch this together by hand. This example only
  413. talks to itself, but you could reopen the appropriate
  414. handles to STDIN and STDOUT and call other processes.
  415. #!/usr/bin/perl -w
  416. # pipe1 - bidirectional communication using two pipe pairs
  417. # designed for the socketpair-challenged
  418. use IO::Handle; # thousands of lines just for autoflush :-(
  419. pipe(PARENT_RDR, CHILD_WTR); # XXX: failure?
  420. pipe(CHILD_RDR, PARENT_WTR); # XXX: failure?
  421. CHILD_WTR->autoflush(1);
  422. PARENT_WTR->autoflush(1);
  423. if ($pid = fork) {
  424. close PARENT_RDR; close PARENT_WTR;
  425. print CHILD_WTR "Parent Pid $$ is sending this\n";
  426. chomp($line = <CHILD_RDR>);
  427. print "Parent Pid $$ just read this: `$line'\n";
  428. close CHILD_RDR; close CHILD_WTR;
  429. waitpid($pid,0);
  430. } else {
  431. die "cannot fork: $!" unless defined $pid;
  432. close CHILD_RDR; close CHILD_WTR;
  433. chomp($line = <PARENT_RDR>);
  434. print "Child Pid $$ just read this: `$line'\n";
  435. print PARENT_WTR "Child Pid $$ is sending this\n";
  436. close PARENT_RDR; close PARENT_WTR;
  437. exit;
  438. }
  439. But you don't actually have to make two pipe calls. If you
  440. have the socketpair() system call, it will do this all for you.
  441. #!/usr/bin/perl -w
  442. # pipe2 - bidirectional communication using socketpair
  443. # "the best ones always go both ways"
  444. use Socket;
  445. use IO::Handle; # thousands of lines just for autoflush :-(
  446. # We say AF_UNIX because although *_LOCAL is the
  447. # POSIX 1003.1g form of the constant, many machines
  448. # still don't have it.
  449. socketpair(CHILD, PARENT, AF_UNIX, SOCK_STREAM, PF_UNSPEC)
  450. or die "socketpair: $!";
  451. CHILD->autoflush(1);
  452. PARENT->autoflush(1);
  453. if ($pid = fork) {
  454. close PARENT;
  455. print CHILD "Parent Pid $$ is sending this\n";
  456. chomp($line = <CHILD>);
  457. print "Parent Pid $$ just read this: `$line'\n";
  458. close CHILD;
  459. waitpid($pid,0);
  460. } else {
  461. die "cannot fork: $!" unless defined $pid;
  462. close CHILD;
  463. chomp($line = <PARENT>);
  464. print "Child Pid $$ just read this: `$line'\n";
  465. print PARENT "Child Pid $$ is sending this\n";
  466. close PARENT;
  467. exit;
  468. }
  469. =head1 Sockets: Client/Server Communication
  470. While not limited to Unix-derived operating systems (e.g., WinSock on PCs
  471. provides socket support, as do some VMS libraries), you may not have
  472. sockets on your system, in which case this section probably isn't going to do
  473. you much good. With sockets, you can do both virtual circuits (i.e., TCP
  474. streams) and datagrams (i.e., UDP packets). You may be able to do even more
  475. depending on your system.
  476. The Perl function calls for dealing with sockets have the same names as
  477. the corresponding system calls in C, but their arguments tend to differ
  478. for two reasons: first, Perl filehandles work differently than C file
  479. descriptors. Second, Perl already knows the length of its strings, so you
  480. don't need to pass that information.
  481. One of the major problems with old socket code in Perl was that it used
  482. hard-coded values for some of the constants, which severely hurt
  483. portability. If you ever see code that does anything like explicitly
  484. setting C<$AF_INET = 2>, you know you're in for big trouble: An
  485. immeasurably superior approach is to use the C<Socket> module, which more
  486. reliably grants access to various constants and functions you'll need.
  487. If you're not writing a server/client for an existing protocol like
  488. NNTP or SMTP, you should give some thought to how your server will
  489. know when the client has finished talking, and vice-versa. Most
  490. protocols are based on one-line messages and responses (so one party
  491. knows the other has finished when a "\n" is received) or multi-line
  492. messages and responses that end with a period on an empty line
  493. ("\n.\n" terminates a message/response).
  494. =head2 Internet Line Terminators
  495. The Internet line terminator is "\015\012". Under ASCII variants of
  496. Unix, that could usually be written as "\r\n", but under other systems,
  497. "\r\n" might at times be "\015\015\012", "\012\012\015", or something
  498. completely different. The standards specify writing "\015\012" to be
  499. conformant (be strict in what you provide), but they also recommend
  500. accepting a lone "\012" on input (but be lenient in what you require).
  501. We haven't always been very good about that in the code in this manpage,
  502. but unless you're on a Mac, you'll probably be ok.
  503. =head2 Internet TCP Clients and Servers
  504. Use Internet-domain sockets when you want to do client-server
  505. communication that might extend to machines outside of your own system.
  506. Here's a sample TCP client using Internet-domain sockets:
  507. #!/usr/bin/perl -w
  508. use strict;
  509. use Socket;
  510. my ($remote,$port, $iaddr, $paddr, $proto, $line);
  511. $remote = shift || 'localhost';
  512. $port = shift || 2345; # random port
  513. if ($port =~ /\D/) { $port = getservbyname($port, 'tcp') }
  514. die "No port" unless $port;
  515. $iaddr = inet_aton($remote) || die "no host: $remote";
  516. $paddr = sockaddr_in($port, $iaddr);
  517. $proto = getprotobyname('tcp');
  518. socket(SOCK, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
  519. connect(SOCK, $paddr) || die "connect: $!";
  520. while (defined($line = <SOCK>)) {
  521. print $line;
  522. }
  523. close (SOCK) || die "close: $!";
  524. exit;
  525. And here's a corresponding server to go along with it. We'll
  526. leave the address as INADDR_ANY so that the kernel can choose
  527. the appropriate interface on multihomed hosts. If you want sit
  528. on a particular interface (like the external side of a gateway
  529. or firewall machine), you should fill this in with your real address
  530. instead.
  531. #!/usr/bin/perl -Tw
  532. use strict;
  533. BEGIN { $ENV{PATH} = '/usr/ucb:/bin' }
  534. use Socket;
  535. use Carp;
  536. my $EOL = "\015\012";
  537. sub logmsg { print "$0 $$: @_ at ", scalar localtime, "\n" }
  538. my $port = shift || 2345;
  539. my $proto = getprotobyname('tcp');
  540. ($port) = $port =~ /^(\d+)$/ or die "invalid port";
  541. socket(Server, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
  542. setsockopt(Server, SOL_SOCKET, SO_REUSEADDR,
  543. pack("l", 1)) || die "setsockopt: $!";
  544. bind(Server, sockaddr_in($port, INADDR_ANY)) || die "bind: $!";
  545. listen(Server,SOMAXCONN) || die "listen: $!";
  546. logmsg "server started on port $port";
  547. my $paddr;
  548. $SIG{CHLD} = \&REAPER;
  549. for ( ; $paddr = accept(Client,Server); close Client) {
  550. my($port,$iaddr) = sockaddr_in($paddr);
  551. my $name = gethostbyaddr($iaddr,AF_INET);
  552. logmsg "connection from $name [",
  553. inet_ntoa($iaddr), "]
  554. at port $port";
  555. print Client "Hello there, $name, it's now ",
  556. scalar localtime, $EOL;
  557. }
  558. And here's a multithreaded version. It's multithreaded in that
  559. like most typical servers, it spawns (forks) a slave server to
  560. handle the client request so that the master server can quickly
  561. go back to service a new client.
  562. #!/usr/bin/perl -Tw
  563. use strict;
  564. BEGIN { $ENV{PATH} = '/usr/ucb:/bin' }
  565. use Socket;
  566. use Carp;
  567. my $EOL = "\015\012";
  568. sub spawn; # forward declaration
  569. sub logmsg { print "$0 $$: @_ at ", scalar localtime, "\n" }
  570. my $port = shift || 2345;
  571. my $proto = getprotobyname('tcp');
  572. ($port) = $port =~ /^(\d+)$/ or die "invalid port";
  573. socket(Server, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
  574. setsockopt(Server, SOL_SOCKET, SO_REUSEADDR,
  575. pack("l", 1)) || die "setsockopt: $!";
  576. bind(Server, sockaddr_in($port, INADDR_ANY)) || die "bind: $!";
  577. listen(Server,SOMAXCONN) || die "listen: $!";
  578. logmsg "server started on port $port";
  579. my $waitedpid = 0;
  580. my $paddr;
  581. sub REAPER {
  582. $waitedpid = wait;
  583. $SIG{CHLD} = \&REAPER; # loathe sysV
  584. logmsg "reaped $waitedpid" . ($? ? " with exit $?" : '');
  585. }
  586. $SIG{CHLD} = \&REAPER;
  587. for ( $waitedpid = 0;
  588. ($paddr = accept(Client,Server)) || $waitedpid;
  589. $waitedpid = 0, close Client)
  590. {
  591. next if $waitedpid and not $paddr;
  592. my($port,$iaddr) = sockaddr_in($paddr);
  593. my $name = gethostbyaddr($iaddr,AF_INET);
  594. logmsg "connection from $name [",
  595. inet_ntoa($iaddr), "]
  596. at port $port";
  597. spawn sub {
  598. $|=1;
  599. print "Hello there, $name, it's now ", scalar localtime, $EOL;
  600. exec '/usr/games/fortune' # XXX: `wrong' line terminators
  601. or confess "can't exec fortune: $!";
  602. };
  603. }
  604. sub spawn {
  605. my $coderef = shift;
  606. unless (@_ == 0 && $coderef && ref($coderef) eq 'CODE') {
  607. confess "usage: spawn CODEREF";
  608. }
  609. my $pid;
  610. if (!defined($pid = fork)) {
  611. logmsg "cannot fork: $!";
  612. return;
  613. } elsif ($pid) {
  614. logmsg "begat $pid";
  615. return; # I'm the parent
  616. }
  617. # else I'm the child -- go spawn
  618. open(STDIN, "<&Client") || die "can't dup client to stdin";
  619. open(STDOUT, ">&Client") || die "can't dup client to stdout";
  620. ## open(STDERR, ">&STDOUT") || die "can't dup stdout to stderr";
  621. exit &$coderef();
  622. }
  623. This server takes the trouble to clone off a child version via fork() for
  624. each incoming request. That way it can handle many requests at once,
  625. which you might not always want. Even if you don't fork(), the listen()
  626. will allow that many pending connections. Forking servers have to be
  627. particularly careful about cleaning up their dead children (called
  628. "zombies" in Unix parlance), because otherwise you'll quickly fill up your
  629. process table.
  630. We suggest that you use the B<-T> flag to use taint checking (see L<perlsec>)
  631. even if we aren't running setuid or setgid. This is always a good idea
  632. for servers and other programs run on behalf of someone else (like CGI
  633. scripts), because it lessens the chances that people from the outside will
  634. be able to compromise your system.
  635. Let's look at another TCP client. This one connects to the TCP "time"
  636. service on a number of different machines and shows how far their clocks
  637. differ from the system on which it's being run:
  638. #!/usr/bin/perl -w
  639. use strict;
  640. use Socket;
  641. my $SECS_of_70_YEARS = 2208988800;
  642. sub ctime { scalar localtime(shift) }
  643. my $iaddr = gethostbyname('localhost');
  644. my $proto = getprotobyname('tcp');
  645. my $port = getservbyname('time', 'tcp');
  646. my $paddr = sockaddr_in(0, $iaddr);
  647. my($host);
  648. $| = 1;
  649. printf "%-24s %8s %s\n", "localhost", 0, ctime(time());
  650. foreach $host (@ARGV) {
  651. printf "%-24s ", $host;
  652. my $hisiaddr = inet_aton($host) || die "unknown host";
  653. my $hispaddr = sockaddr_in($port, $hisiaddr);
  654. socket(SOCKET, PF_INET, SOCK_STREAM, $proto) || die "socket: $!";
  655. connect(SOCKET, $hispaddr) || die "bind: $!";
  656. my $rtime = ' ';
  657. read(SOCKET, $rtime, 4);
  658. close(SOCKET);
  659. my $histime = unpack("N", $rtime) - $SECS_of_70_YEARS ;
  660. printf "%8d %s\n", $histime - time, ctime($histime);
  661. }
  662. =head2 Unix-Domain TCP Clients and Servers
  663. That's fine for Internet-domain clients and servers, but what about local
  664. communications? While you can use the same setup, sometimes you don't
  665. want to. Unix-domain sockets are local to the current host, and are often
  666. used internally to implement pipes. Unlike Internet domain sockets, Unix
  667. domain sockets can show up in the file system with an ls(1) listing.
  668. % ls -l /dev/log
  669. srw-rw-rw- 1 root 0 Oct 31 07:23 /dev/log
  670. You can test for these with Perl's B<-S> file test:
  671. unless ( -S '/dev/log' ) {
  672. die "something's wicked with the log system";
  673. }
  674. Here's a sample Unix-domain client:
  675. #!/usr/bin/perl -w
  676. use Socket;
  677. use strict;
  678. my ($rendezvous, $line);
  679. $rendezvous = shift || '/tmp/catsock';
  680. socket(SOCK, PF_UNIX, SOCK_STREAM, 0) || die "socket: $!";
  681. connect(SOCK, sockaddr_un($rendezvous)) || die "connect: $!";
  682. while (defined($line = <SOCK>)) {
  683. print $line;
  684. }
  685. exit;
  686. And here's a corresponding server. You don't have to worry about silly
  687. network terminators here because Unix domain sockets are guaranteed
  688. to be on the localhost, and thus everything works right.
  689. #!/usr/bin/perl -Tw
  690. use strict;
  691. use Socket;
  692. use Carp;
  693. BEGIN { $ENV{PATH} = '/usr/ucb:/bin' }
  694. sub spawn; # forward declaration
  695. sub logmsg { print "$0 $$: @_ at ", scalar localtime, "\n" }
  696. my $NAME = '/tmp/catsock';
  697. my $uaddr = sockaddr_un($NAME);
  698. my $proto = getprotobyname('tcp');
  699. socket(Server,PF_UNIX,SOCK_STREAM,0) || die "socket: $!";
  700. unlink($NAME);
  701. bind (Server, $uaddr) || die "bind: $!";
  702. listen(Server,SOMAXCONN) || die "listen: $!";
  703. logmsg "server started on $NAME";
  704. my $waitedpid;
  705. sub REAPER {
  706. $waitedpid = wait;
  707. $SIG{CHLD} = \&REAPER; # loathe sysV
  708. logmsg "reaped $waitedpid" . ($? ? " with exit $?" : '');
  709. }
  710. $SIG{CHLD} = \&REAPER;
  711. for ( $waitedpid = 0;
  712. accept(Client,Server) || $waitedpid;
  713. $waitedpid = 0, close Client)
  714. {
  715. next if $waitedpid;
  716. logmsg "connection on $NAME";
  717. spawn sub {
  718. print "Hello there, it's now ", scalar localtime, "\n";
  719. exec '/usr/games/fortune' or die "can't exec fortune: $!";
  720. };
  721. }
  722. sub spawn {
  723. my $coderef = shift;
  724. unless (@_ == 0 && $coderef && ref($coderef) eq 'CODE') {
  725. confess "usage: spawn CODEREF";
  726. }
  727. my $pid;
  728. if (!defined($pid = fork)) {
  729. logmsg "cannot fork: $!";
  730. return;
  731. } elsif ($pid) {
  732. logmsg "begat $pid";
  733. return; # I'm the parent
  734. }
  735. # else I'm the child -- go spawn
  736. open(STDIN, "<&Client") || die "can't dup client to stdin";
  737. open(STDOUT, ">&Client") || die "can't dup client to stdout";
  738. ## open(STDERR, ">&STDOUT") || die "can't dup stdout to stderr";
  739. exit &$coderef();
  740. }
  741. As you see, it's remarkably similar to the Internet domain TCP server, so
  742. much so, in fact, that we've omitted several duplicate functions--spawn(),
  743. logmsg(), ctime(), and REAPER()--which are exactly the same as in the
  744. other server.
  745. So why would you ever want to use a Unix domain socket instead of a
  746. simpler named pipe? Because a named pipe doesn't give you sessions. You
  747. can't tell one process's data from another's. With socket programming,
  748. you get a separate session for each client: that's why accept() takes two
  749. arguments.
  750. For example, let's say that you have a long running database server daemon
  751. that you want folks from the World Wide Web to be able to access, but only
  752. if they go through a CGI interface. You'd have a small, simple CGI
  753. program that does whatever checks and logging you feel like, and then acts
  754. as a Unix-domain client and connects to your private server.
  755. =head1 TCP Clients with IO::Socket
  756. For those preferring a higher-level interface to socket programming, the
  757. IO::Socket module provides an object-oriented approach. IO::Socket is
  758. included as part of the standard Perl distribution as of the 5.004
  759. release. If you're running an earlier version of Perl, just fetch
  760. IO::Socket from CPAN, where you'll also find modules providing easy
  761. interfaces to the following systems: DNS, FTP, Ident (RFC 931), NIS and
  762. NISPlus, NNTP, Ping, POP3, SMTP, SNMP, SSLeay, Telnet, and Time--just
  763. to name a few.
  764. =head2 A Simple Client
  765. Here's a client that creates a TCP connection to the "daytime"
  766. service at port 13 of the host name "localhost" and prints out everything
  767. that the server there cares to provide.
  768. #!/usr/bin/perl -w
  769. use IO::Socket;
  770. $remote = IO::Socket::INET->new(
  771. Proto => "tcp",
  772. PeerAddr => "localhost",
  773. PeerPort => "daytime(13)",
  774. )
  775. or die "cannot connect to daytime port at localhost";
  776. while ( <$remote> ) { print }
  777. When you run this program, you should get something back that
  778. looks like this:
  779. Wed May 14 08:40:46 MDT 1997
  780. Here are what those parameters to the C<new> constructor mean:
  781. =over 4
  782. =item C<Proto>
  783. This is which protocol to use. In this case, the socket handle returned
  784. will be connected to a TCP socket, because we want a stream-oriented
  785. connection, that is, one that acts pretty much like a plain old file.
  786. Not all sockets are this of this type. For example, the UDP protocol
  787. can be used to make a datagram socket, used for message-passing.
  788. =item C<PeerAddr>
  789. This is the name or Internet address of the remote host the server is
  790. running on. We could have specified a longer name like C<"www.perl.com">,
  791. or an address like C<"204.148.40.9">. For demonstration purposes, we've
  792. used the special hostname C<"localhost">, which should always mean the
  793. current machine you're running on. The corresponding Internet address
  794. for localhost is C<"127.1">, if you'd rather use that.
  795. =item C<PeerPort>
  796. This is the service name or port number we'd like to connect to.
  797. We could have gotten away with using just C<"daytime"> on systems with a
  798. well-configured system services file,[FOOTNOTE: The system services file
  799. is in I</etc/services> under Unix] but just in case, we've specified the
  800. port number (13) in parentheses. Using just the number would also have
  801. worked, but constant numbers make careful programmers nervous.
  802. =back
  803. Notice how the return value from the C<new> constructor is used as
  804. a filehandle in the C<while> loop? That's what's called an indirect
  805. filehandle, a scalar variable containing a filehandle. You can use
  806. it the same way you would a normal filehandle. For example, you
  807. can read one line from it this way:
  808. $line = <$handle>;
  809. all remaining lines from is this way:
  810. @lines = <$handle>;
  811. and send a line of data to it this way:
  812. print $handle "some data\n";
  813. =head2 A Webget Client
  814. Here's a simple client that takes a remote host to fetch a document
  815. from, and then a list of documents to get from that host. This is a
  816. more interesting client than the previous one because it first sends
  817. something to the server before fetching the server's response.
  818. #!/usr/bin/perl -w
  819. use IO::Socket;
  820. unless (@ARGV > 1) { die "usage: $0 host document ..." }
  821. $host = shift(@ARGV);
  822. $EOL = "\015\012";
  823. $BLANK = $EOL x 2;
  824. foreach $document ( @ARGV ) {
  825. $remote = IO::Socket::INET->new( Proto => "tcp",
  826. PeerAddr => $host,
  827. PeerPort => "http(80)",
  828. );
  829. unless ($remote) { die "cannot connect to http daemon on $host" }
  830. $remote->autoflush(1);
  831. print $remote "GET $document HTTP/1.0" . $BLANK;
  832. while ( <$remote> ) { print }
  833. close $remote;
  834. }
  835. The web server handing the "http" service, which is assumed to be at
  836. its standard port, number 80. If the web server you're trying to
  837. connect to is at a different port (like 1080 or 8080), you should specify
  838. as the named-parameter pair, C<< PeerPort => 8080 >>. The C<autoflush>
  839. method is used on the socket because otherwise the system would buffer
  840. up the output we sent it. (If you're on a Mac, you'll also need to
  841. change every C<"\n"> in your code that sends data over the network to
  842. be a C<"\015\012"> instead.)
  843. Connecting to the server is only the first part of the process: once you
  844. have the connection, you have to use the server's language. Each server
  845. on the network has its own little command language that it expects as
  846. input. The string that we send to the server starting with "GET" is in
  847. HTTP syntax. In this case, we simply request each specified document.
  848. Yes, we really are making a new connection for each document, even though
  849. it's the same host. That's the way you always used to have to speak HTTP.
  850. Recent versions of web browsers may request that the remote server leave
  851. the connection open a little while, but the server doesn't have to honor
  852. such a request.
  853. Here's an example of running that program, which we'll call I<webget>:
  854. % webget www.perl.com /guanaco.html
  855. HTTP/1.1 404 File Not Found
  856. Date: Thu, 08 May 1997 18:02:32 GMT
  857. Server: Apache/1.2b6
  858. Connection: close
  859. Content-type: text/html
  860. <HEAD><TITLE>404 File Not Found</TITLE></HEAD>
  861. <BODY><H1>File Not Found</H1>
  862. The requested URL /guanaco.html was not found on this server.<P>
  863. </BODY>
  864. Ok, so that's not very interesting, because it didn't find that
  865. particular document. But a long response wouldn't have fit on this page.
  866. For a more fully-featured version of this program, you should look to
  867. the I<lwp-request> program included with the LWP modules from CPAN.
  868. =head2 Interactive Client with IO::Socket
  869. Well, that's all fine if you want to send one command and get one answer,
  870. but what about setting up something fully interactive, somewhat like
  871. the way I<telnet> works? That way you can type a line, get the answer,
  872. type a line, get the answer, etc.
  873. This client is more complicated than the two we've done so far, but if
  874. you're on a system that supports the powerful C<fork> call, the solution
  875. isn't that rough. Once you've made the connection to whatever service
  876. you'd like to chat with, call C<fork> to clone your process. Each of
  877. these two identical process has a very simple job to do: the parent
  878. copies everything from the socket to standard output, while the child
  879. simultaneously copies everything from standard input to the socket.
  880. To accomplish the same thing using just one process would be I<much>
  881. harder, because it's easier to code two processes to do one thing than it
  882. is to code one process to do two things. (This keep-it-simple principle
  883. a cornerstones of the Unix philosophy, and good software engineering as
  884. well, which is probably why it's spread to other systems.)
  885. Here's the code:
  886. #!/usr/bin/perl -w
  887. use strict;
  888. use IO::Socket;
  889. my ($host, $port, $kidpid, $handle, $line);
  890. unless (@ARGV == 2) { die "usage: $0 host port" }
  891. ($host, $port) = @ARGV;
  892. # create a tcp connection to the specified host and port
  893. $handle = IO::Socket::INET->new(Proto => "tcp",
  894. PeerAddr => $host,
  895. PeerPort => $port)
  896. or die "can't connect to port $port on $host: $!";
  897. $handle->autoflush(1); # so output gets there right away
  898. print STDERR "[Connected to $host:$port]\n";
  899. # split the program into two processes, identical twins
  900. die "can't fork: $!" unless defined($kidpid = fork());
  901. # the if{} block runs only in the parent process
  902. if ($kidpid) {
  903. # copy the socket to standard output
  904. while (defined ($line = <$handle>)) {
  905. print STDOUT $line;
  906. }
  907. kill("TERM", $kidpid); # send SIGTERM to child
  908. }
  909. # the else{} block runs only in the child process
  910. else {
  911. # copy standard input to the socket
  912. while (defined ($line = <STDIN>)) {
  913. print $handle $line;
  914. }
  915. }
  916. The C<kill> function in the parent's C<if> block is there to send a
  917. signal to our child process (current running in the C<else> block)
  918. as soon as the remote server has closed its end of the connection.
  919. If the remote server sends data a byte at time, and you need that
  920. data immediately without waiting for a newline (which might not happen),
  921. you may wish to replace the C<while> loop in the parent with the
  922. following:
  923. my $byte;
  924. while (sysread($handle, $byte, 1) == 1) {
  925. print STDOUT $byte;
  926. }
  927. Making a system call for each byte you want to read is not very efficient
  928. (to put it mildly) but is the simplest to explain and works reasonably
  929. well.
  930. =head1 TCP Servers with IO::Socket
  931. As always, setting up a server is little bit more involved than running a client.
  932. The model is that the server creates a special kind of socket that
  933. does nothing but listen on a particular port for incoming connections.
  934. It does this by calling the C<< IO::Socket::INET->new() >> method with
  935. slightly different arguments than the client did.
  936. =over 4
  937. =item Proto
  938. This is which protocol to use. Like our clients, we'll
  939. still specify C<"tcp"> here.
  940. =item LocalPort
  941. We specify a local
  942. port in the C<LocalPort> argument, which we didn't do for the client.
  943. This is service name or port number for which you want to be the
  944. server. (Under Unix, ports under 1024 are restricted to the
  945. superuser.) In our sample, we'll use port 9000, but you can use
  946. any port that's not currently in use on your system. If you try
  947. to use one already in used, you'll get an "Address already in use"
  948. message. Under Unix, the C<netstat -a> command will show
  949. which services current have servers.
  950. =item Listen
  951. The C<Listen> parameter is set to the maximum number of
  952. pending connections we can accept until we turn away incoming clients.
  953. Think of it as a call-waiting queue for your telephone.
  954. The low-level Socket module has a special symbol for the system maximum, which
  955. is SOMAXCONN.
  956. =item Reuse
  957. The C<Reuse> parameter is needed so that we restart our server
  958. manually without waiting a few minutes to allow system buffers to
  959. clear out.
  960. =back
  961. Once the generic server socket has been created using the parameters
  962. listed above, the server then waits for a new client to connect
  963. to it. The server blocks in the C<accept> method, which eventually an
  964. bidirectional connection to the remote client. (Make sure to autoflush
  965. this handle to circumvent buffering.)
  966. To add to user-friendliness, our server prompts the user for commands.
  967. Most servers don't do this. Because of the prompt without a newline,
  968. you'll have to use the C<sysread> variant of the interactive client above.
  969. This server accepts one of five different commands, sending output
  970. back to the client. Note that unlike most network servers, this one
  971. only handles one incoming client at a time. Multithreaded servers are
  972. covered in Chapter 6 of the Camel.
  973. Here's the code. We'll
  974. #!/usr/bin/perl -w
  975. use IO::Socket;
  976. use Net::hostent; # for OO version of gethostbyaddr
  977. $PORT = 9000; # pick something not in use
  978. $server = IO::Socket::INET->new( Proto => 'tcp',
  979. LocalPort => $PORT,
  980. Listen => SOMAXCONN,
  981. Reuse => 1);
  982. die "can't setup server" unless $server;
  983. print "[Server $0 accepting clients]\n";
  984. while ($client = $server->accept()) {
  985. $client->autoflush(1);
  986. print $client "Welcome to $0; type help for command list.\n";
  987. $hostinfo = gethostbyaddr($client->peeraddr);
  988. printf "[Connect from %s]\n", $hostinfo->name || $client->peerhost;
  989. print $client "Command? ";
  990. while ( <$client>) {
  991. next unless /\S/; # blank line
  992. if (/quit|exit/i) { last; }
  993. elsif (/date|time/i) { printf $client "%s\n", scalar localtime; }
  994. elsif (/who/i ) { print $client `who 2>&1`; }
  995. elsif (/cookie/i ) { print $client `/usr/games/fortune 2>&1`; }
  996. elsif (/motd/i ) { print $client `cat /etc/motd 2>&1`; }
  997. else {
  998. print $client "Commands: quit date who cookie motd\n";
  999. }
  1000. } continue {
  1001. print $client "Command? ";
  1002. }
  1003. close $client;
  1004. }
  1005. =head1 UDP: Message Passing
  1006. Another kind of client-server setup is one that uses not connections, but
  1007. messages. UDP communications involve much lower overhead but also provide
  1008. less reliability, as there are no promises that messages will arrive at
  1009. all, let alone in order and unmangled. Still, UDP offers some advantages
  1010. over TCP, including being able to "broadcast" or "multicast" to a whole
  1011. bunch of destination hosts at once (usually on your local subnet). If you
  1012. find yourself overly concerned about reliability and start building checks
  1013. into your message system, then you probably should use just TCP to start
  1014. with.
  1015. Note that UDP datagrams are I<not> a bytestream and should not be treated
  1016. as such. This makes using I/O mechanisms with internal buffering
  1017. like stdio (i.e. print() and friends) especially cumbersome. Use syswrite(),
  1018. or better send(), like in the example below.
  1019. Here's a UDP program similar to the sample Internet TCP client given
  1020. earlier. However, instead of checking one host at a time, the UDP version
  1021. will check many of them asynchronously by simulating a multicast and then
  1022. using select() to do a timed-out wait for I/O. To do something similar
  1023. with TCP, you'd have to use a different socket handle for each host.
  1024. #!/usr/bin/perl -w
  1025. use strict;
  1026. use Socket;
  1027. use Sys::Hostname;
  1028. my ( $count, $hisiaddr, $hispaddr, $histime,
  1029. $host, $iaddr, $paddr, $port, $proto,
  1030. $rin, $rout, $rtime, $SECS_of_70_YEARS);
  1031. $SECS_of_70_YEARS = 2208988800;
  1032. $iaddr = gethostbyname(hostname());
  1033. $proto = getprotobyname('udp');
  1034. $port = getservbyname('time', 'udp');
  1035. $paddr = sockaddr_in(0, $iaddr); # 0 means let kernel pick
  1036. socket(SOCKET, PF_INET, SOCK_DGRAM, $proto) || die "socket: $!";
  1037. bind(SOCKET, $paddr) || die "bind: $!";
  1038. $| = 1;
  1039. printf "%-12s %8s %s\n", "localhost", 0, scalar localtime time;
  1040. $count = 0;
  1041. for $host (@ARGV) {
  1042. $count++;
  1043. $hisiaddr = inet_aton($host) || die "unknown host";
  1044. $hispaddr = sockaddr_in($port, $hisiaddr);
  1045. defined(send(SOCKET, 0, 0, $hispaddr)) || die "send $host: $!";
  1046. }
  1047. $rin = '';
  1048. vec($rin, fileno(SOCKET), 1) = 1;
  1049. # timeout after 10.0 seconds
  1050. while ($count && select($rout = $rin, undef, undef, 10.0)) {
  1051. $rtime = '';
  1052. ($hispaddr = recv(SOCKET, $rtime, 4, 0)) || die "recv: $!";
  1053. ($port, $hisiaddr) = sockaddr_in($hispaddr);
  1054. $host = gethostbyaddr($hisiaddr, AF_INET);
  1055. $histime = unpack("N", $rtime) - $SECS_of_70_YEARS ;
  1056. printf "%-12s ", $host;
  1057. printf "%8d %s\n", $histime - time, scalar localtime($histime);
  1058. $count--;
  1059. }
  1060. Note that this example does not include any retries and may consequently
  1061. fail to contact a reachable host. The most prominent reason for this
  1062. is congestion of the queues on the sending host if the number of
  1063. list of hosts to contact is sufficiently large.
  1064. =head1 SysV IPC
  1065. While System V IPC isn't so widely used as sockets, it still has some
  1066. interesting uses. You can't, however, effectively use SysV IPC or
  1067. Berkeley mmap() to have shared memory so as to share a variable amongst
  1068. several processes. That's because Perl would reallocate your string when
  1069. you weren't wanting it to.
  1070. Here's a small example showing shared memory usage.
  1071. use IPC::SysV qw(IPC_PRIVATE IPC_RMID S_IRWXU);
  1072. $size = 2000;
  1073. $id = shmget(IPC_PRIVATE, $size, S_IRWXU) || die "$!";
  1074. print "shm key $id\n";
  1075. $message = "Message #1";
  1076. shmwrite($id, $message, 0, 60) || die "$!";
  1077. print "wrote: '$message'\n";
  1078. shmread($id, $buff, 0, 60) || die "$!";
  1079. print "read : '$buff'\n";
  1080. # the buffer of shmread is zero-character end-padded.
  1081. substr($buff, index($buff, "\0")) = '';
  1082. print "un" unless $buff eq $message;
  1083. print "swell\n";
  1084. print "deleting shm $id\n";
  1085. shmctl($id, IPC_RMID, 0) || die "$!";
  1086. Here's an example of a semaphore:
  1087. use IPC::SysV qw(IPC_CREAT);
  1088. $IPC_KEY = 1234;
  1089. $id = semget($IPC_KEY, 10, 0666 | IPC_CREAT ) || die "$!";
  1090. print "shm key $id\n";
  1091. Put this code in a separate file to be run in more than one process.
  1092. Call the file F<take>:
  1093. # create a semaphore
  1094. $IPC_KEY = 1234;
  1095. $id = semget($IPC_KEY, 0 , 0 );
  1096. die if !defined($id);
  1097. $semnum = 0;
  1098. $semflag = 0;
  1099. # 'take' semaphore
  1100. # wait for semaphore to be zero
  1101. $semop = 0;
  1102. $opstring1 = pack("s!s!s!", $semnum, $semop, $semflag);
  1103. # Increment the semaphore count
  1104. $semop = 1;
  1105. $opstring2 = pack("s!s!s!", $semnum, $semop, $semflag);
  1106. $opstring = $opstring1 . $opstring2;
  1107. semop($id,$opstring) || die "$!";
  1108. Put this code in a separate file to be run in more than one process.
  1109. Call this file F<give>:
  1110. # 'give' the semaphore
  1111. # run this in the original process and you will see
  1112. # that the second process continues
  1113. $IPC_KEY = 1234;
  1114. $id = semget($IPC_KEY, 0, 0);
  1115. die if !defined($id);
  1116. $semnum = 0;
  1117. $semflag = 0;
  1118. # Decrement the semaphore count
  1119. $semop = -1;
  1120. $opstring = pack("s!s!s!", $semnum, $semop, $semflag);
  1121. semop($id,$opstring) || die "$!";
  1122. The SysV IPC code above was written long ago, and it's definitely
  1123. clunky looking. For a more modern look, see the IPC::SysV module
  1124. which is included with Perl starting from Perl 5.005.
  1125. A small example demonstrating SysV message queues:
  1126. use IPC::SysV qw(IPC_PRIVATE IPC_RMID IPC_CREAT S_IRWXU);
  1127. my $id = msgget(IPC_PRIVATE, IPC_CREAT | S_IRWXU);
  1128. my $sent = "message";
  1129. my $type = 1234;
  1130. my $rcvd;
  1131. my $type_rcvd;
  1132. if (defined $id) {
  1133. if (msgsnd($id, pack("l! a*", $type_sent, $sent), 0)) {
  1134. if (msgrcv($id, $rcvd, 60, 0, 0)) {
  1135. ($type_rcvd, $rcvd) = unpack("l! a*", $rcvd);
  1136. if ($rcvd eq $sent) {
  1137. print "okay\n";
  1138. } else {
  1139. print "not okay\n";
  1140. }
  1141. } else {
  1142. die "# msgrcv failed\n";
  1143. }
  1144. } else {
  1145. die "# msgsnd failed\n";
  1146. }
  1147. msgctl($id, IPC_RMID, 0) || die "# msgctl failed: $!\n";
  1148. } else {
  1149. die "# msgget failed\n";
  1150. }
  1151. =head1 NOTES
  1152. Most of these routines quietly but politely return C<undef> when they
  1153. fail instead of causing your program to die right then and there due to
  1154. an uncaught exception. (Actually, some of the new I<Socket> conversion
  1155. functions croak() on bad arguments.) It is therefore essential to
  1156. check return values from these functions. Always begin your socket
  1157. programs this way for optimal success, and don't forget to add B<-T>
  1158. taint checking flag to the #! line for servers:
  1159. #!/usr/bin/perl -Tw
  1160. use strict;
  1161. use sigtrap;
  1162. use Socket;
  1163. =head1 BUGS
  1164. All these routines create system-specific portability problems. As noted
  1165. elsewhere, Perl is at the mercy of your C libraries for much of its system
  1166. behaviour. It's probably safest to assume broken SysV semantics for
  1167. signals and to stick with simple TCP and UDP socket operations; e.g., don't
  1168. try to pass open file descriptors over a local UDP datagram socket if you
  1169. want your code to stand a chance of being portable.
  1170. As mentioned in the signals section, because few vendors provide C
  1171. libraries that are safely re-entrant, the prudent programmer will do
  1172. little else within a handler beyond setting a numeric variable that
  1173. already exists; or, if locked into a slow (restarting) system call,
  1174. using die() to raise an exception and longjmp(3) out. In fact, even
  1175. these may in some cases cause a core dump. It's probably best to avoid
  1176. signals except where they are absolutely inevitable. This
  1177. will be addressed in a future release of Perl.
  1178. =head1 AUTHOR
  1179. Tom Christiansen, with occasional vestiges of Larry Wall's original
  1180. version and suggestions from the Perl Porters.
  1181. =head1 SEE ALSO
  1182. There's a lot more to networking than this, but this should get you
  1183. started.
  1184. For intrepid programmers, the indispensable textbook is I<Unix Network
  1185. Programming> by W. Richard Stevens (published by Addison-Wesley). Note
  1186. that most books on networking address networking from the perspective of
  1187. a C programmer; translation to Perl is left as an exercise for the reader.
  1188. The IO::Socket(3) manpage describes the object library, and the Socket(3)
  1189. manpage describes the low-level interface to sockets. Besides the obvious
  1190. functions in L<perlfunc>, you should also check out the F<modules> file
  1191. at your nearest CPAN site. (See L<perlmodlib> or best yet, the F<Perl
  1192. FAQ> for a description of what CPAN is and where to get it.)
  1193. Section 5 of the F<modules> file is devoted to "Networking, Device Control
  1194. (modems), and Interprocess Communication", and contains numerous unbundled
  1195. modules numerous networking modules, Chat and Expect operations, CGI
  1196. programming, DCE, FTP, IPC, NNTP, Proxy, Ptty, RPC, SNMP, SMTP, Telnet,
  1197. Threads, and ToolTalk--just to name a few.