/* open a socket to a tcp remote host with the specified port
based on code from Warren
proxy support by Stephen Rothwell */
-int open_socket_out(char *host, int port)
+int open_socket_out(char *host, int port, struct in_addr *address)
{
int type = SOCK_STREAM;
struct sockaddr_in sock_out;
+ struct sockaddr_in sock;
int res;
struct hostent *hp;
char *h;
sock_out.sin_port = htons(p);
sock_out.sin_family = PF_INET;
+ if (address) {
+ sock.sin_addr = *address;
+ sock.sin_port = 0;
+ sock.sin_family = hp->h_addrtype;
+ bind(res, (struct sockaddr * ) &sock,sizeof(sock));
+ }
+
if (connect(res,(struct sockaddr *)&sock_out,sizeof(sock_out))) {
rprintf(FERROR,"failed to connect to %s - %s\n", h, strerror(errno));
close(res);
return -1;
}
- set_nonblocking(res);
-
return res;
}
struct sockaddr addr;
int in_addrlen = sizeof(addr);
+ /* close log file before the potentially very long select so
+ file can be trimmed by another process instead of growing
+ forever */
+ log_close();
+
FD_ZERO(&fds);
FD_SET(s, &fds);
if (fork()==0) {
close(s);
- set_nonblocking(fd);
+ /* open log file in child before possibly giving
+ up privileges */
+ log_open();
_exit(fn(fd));
}