mod_mm.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 5 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Author: Sascha Schumann <sascha@schumann.cx> |
  16. +----------------------------------------------------------------------+
  17. */
  18. /* $Id$ */
  19. #include "php.h"
  20. #ifdef HAVE_LIBMM
  21. #include <unistd.h>
  22. #include <mm.h>
  23. #include <time.h>
  24. #include <sys/stat.h>
  25. #include <sys/types.h>
  26. #include <fcntl.h>
  27. #include "php_session.h"
  28. #include "mod_mm.h"
  29. #include "SAPI.h"
  30. #ifdef ZTS
  31. # error mm is not thread-safe
  32. #endif
  33. #define PS_MM_FILE "session_mm_"
  34. /* For php_uint32 */
  35. #include "ext/standard/basic_functions.h"
  36. /* This list holds all data associated with one session. */
  37. typedef struct ps_sd {
  38. struct ps_sd *next;
  39. php_uint32 hv; /* hash value of key */
  40. time_t ctime; /* time of last change */
  41. void *data;
  42. size_t datalen; /* amount of valid data */
  43. size_t alloclen; /* amount of allocated memory for data */
  44. char key[1]; /* inline key */
  45. } ps_sd;
  46. typedef struct {
  47. MM *mm;
  48. ps_sd **hash;
  49. php_uint32 hash_max;
  50. php_uint32 hash_cnt;
  51. pid_t owner;
  52. } ps_mm;
  53. static ps_mm *ps_mm_instance = NULL;
  54. #if 0
  55. # define ps_mm_debug(a) printf a
  56. #else
  57. # define ps_mm_debug(a)
  58. #endif
  59. static inline php_uint32 ps_sd_hash(const char *data, int len)
  60. {
  61. php_uint32 h;
  62. const char *e = data + len;
  63. for (h = 2166136261U; data < e; ) {
  64. h *= 16777619;
  65. h ^= *data++;
  66. }
  67. return h;
  68. }
  69. static void hash_split(ps_mm *data)
  70. {
  71. php_uint32 nmax;
  72. ps_sd **nhash;
  73. ps_sd **ohash, **ehash;
  74. ps_sd *ps, *next;
  75. nmax = ((data->hash_max + 1) << 1) - 1;
  76. nhash = mm_calloc(data->mm, nmax + 1, sizeof(*data->hash));
  77. if (!nhash) {
  78. /* no further memory to expand hash table */
  79. return;
  80. }
  81. ehash = data->hash + data->hash_max + 1;
  82. for (ohash = data->hash; ohash < ehash; ohash++) {
  83. for (ps = *ohash; ps; ps = next) {
  84. next = ps->next;
  85. ps->next = nhash[ps->hv & nmax];
  86. nhash[ps->hv & nmax] = ps;
  87. }
  88. }
  89. mm_free(data->mm, data->hash);
  90. data->hash = nhash;
  91. data->hash_max = nmax;
  92. }
  93. static ps_sd *ps_sd_new(ps_mm *data, const char *key)
  94. {
  95. php_uint32 hv, slot;
  96. ps_sd *sd;
  97. int keylen;
  98. keylen = strlen(key);
  99. sd = mm_malloc(data->mm, sizeof(ps_sd) + keylen);
  100. if (!sd) {
  101. TSRMLS_FETCH();
  102. php_error_docref(NULL TSRMLS_CC, E_WARNING, "mm_malloc failed, avail %ld, err %s", mm_available(data->mm), mm_error());
  103. return NULL;
  104. }
  105. hv = ps_sd_hash(key, keylen);
  106. slot = hv & data->hash_max;
  107. sd->ctime = 0;
  108. sd->hv = hv;
  109. sd->data = NULL;
  110. sd->alloclen = sd->datalen = 0;
  111. memcpy(sd->key, key, keylen + 1);
  112. sd->next = data->hash[slot];
  113. data->hash[slot] = sd;
  114. data->hash_cnt++;
  115. if (!sd->next) {
  116. if (data->hash_cnt >= data->hash_max) {
  117. hash_split(data);
  118. }
  119. }
  120. ps_mm_debug(("inserting %s(%p) into slot %d\n", key, sd, slot));
  121. return sd;
  122. }
  123. static void ps_sd_destroy(ps_mm *data, ps_sd *sd)
  124. {
  125. php_uint32 slot;
  126. slot = ps_sd_hash(sd->key, strlen(sd->key)) & data->hash_max;
  127. if (data->hash[slot] == sd) {
  128. data->hash[slot] = sd->next;
  129. } else {
  130. ps_sd *prev;
  131. /* There must be some entry before the one we want to delete */
  132. for (prev = data->hash[slot]; prev->next != sd; prev = prev->next);
  133. prev->next = sd->next;
  134. }
  135. data->hash_cnt--;
  136. if (sd->data) {
  137. mm_free(data->mm, sd->data);
  138. }
  139. mm_free(data->mm, sd);
  140. }
  141. static ps_sd *ps_sd_lookup(ps_mm *data, const char *key, int rw)
  142. {
  143. php_uint32 hv, slot;
  144. ps_sd *ret, *prev;
  145. hv = ps_sd_hash(key, strlen(key));
  146. slot = hv & data->hash_max;
  147. for (prev = NULL, ret = data->hash[slot]; ret; prev = ret, ret = ret->next) {
  148. if (ret->hv == hv && !strcmp(ret->key, key)) {
  149. break;
  150. }
  151. }
  152. if (ret && rw && ret != data->hash[slot]) {
  153. /* Move the entry to the top of the linked list */
  154. if (prev) {
  155. prev->next = ret->next;
  156. }
  157. ret->next = data->hash[slot];
  158. data->hash[slot] = ret;
  159. }
  160. ps_mm_debug(("lookup(%s): ret=%p,hv=%u,slot=%d\n", key, ret, hv, slot));
  161. return ret;
  162. }
  163. static int ps_mm_key_exists(ps_mm *data, const char *key TSRMLS_DC)
  164. {
  165. ps_sd *sd;
  166. if (!key) {
  167. return FAILURE;
  168. }
  169. sd = ps_sd_lookup(data, key, 0);
  170. if (sd) {
  171. return SUCCESS;
  172. }
  173. return FAILURE;
  174. }
  175. ps_module ps_mod_mm = {
  176. PS_MOD_SID(mm)
  177. };
  178. #define PS_MM_DATA ps_mm *data = PS_GET_MOD_DATA()
  179. static int ps_mm_initialize(ps_mm *data, const char *path)
  180. {
  181. data->owner = getpid();
  182. data->mm = mm_create(0, path);
  183. if (!data->mm) {
  184. return FAILURE;
  185. }
  186. data->hash_cnt = 0;
  187. data->hash_max = 511;
  188. data->hash = mm_calloc(data->mm, data->hash_max + 1, sizeof(ps_sd *));
  189. if (!data->hash) {
  190. mm_destroy(data->mm);
  191. return FAILURE;
  192. }
  193. return SUCCESS;
  194. }
  195. static void ps_mm_destroy(ps_mm *data)
  196. {
  197. int h;
  198. ps_sd *sd, *next;
  199. /* This function is called during each module shutdown,
  200. but we must not release the shared memory pool, when
  201. an Apache child dies! */
  202. if (data->owner != getpid()) {
  203. return;
  204. }
  205. for (h = 0; h < data->hash_max + 1; h++) {
  206. for (sd = data->hash[h]; sd; sd = next) {
  207. next = sd->next;
  208. ps_sd_destroy(data, sd);
  209. }
  210. }
  211. mm_free(data->mm, data->hash);
  212. mm_destroy(data->mm);
  213. free(data);
  214. }
  215. PHP_MINIT_FUNCTION(ps_mm)
  216. {
  217. int save_path_len = strlen(PS(save_path));
  218. int mod_name_len = strlen(sapi_module.name);
  219. int euid_len;
  220. char *ps_mm_path, euid[30];
  221. int ret;
  222. ps_mm_instance = calloc(sizeof(*ps_mm_instance), 1);
  223. if (!ps_mm_instance) {
  224. return FAILURE;
  225. }
  226. if (!(euid_len = slprintf(euid, sizeof(euid), "%d", geteuid()))) {
  227. free(ps_mm_instance);
  228. ps_mm_instance = NULL;
  229. return FAILURE;
  230. }
  231. /* Directory + '/' + File + Module Name + Effective UID + \0 */
  232. ps_mm_path = emalloc(save_path_len + 1 + (sizeof(PS_MM_FILE) - 1) + mod_name_len + euid_len + 1);
  233. memcpy(ps_mm_path, PS(save_path), save_path_len);
  234. if (save_path_len && PS(save_path)[save_path_len - 1] != DEFAULT_SLASH) {
  235. ps_mm_path[save_path_len] = DEFAULT_SLASH;
  236. save_path_len++;
  237. }
  238. memcpy(ps_mm_path + save_path_len, PS_MM_FILE, sizeof(PS_MM_FILE) - 1);
  239. save_path_len += sizeof(PS_MM_FILE) - 1;
  240. memcpy(ps_mm_path + save_path_len, sapi_module.name, mod_name_len);
  241. save_path_len += mod_name_len;
  242. memcpy(ps_mm_path + save_path_len, euid, euid_len);
  243. ps_mm_path[save_path_len + euid_len] = '\0';
  244. ret = ps_mm_initialize(ps_mm_instance, ps_mm_path);
  245. efree(ps_mm_path);
  246. if (ret != SUCCESS) {
  247. free(ps_mm_instance);
  248. ps_mm_instance = NULL;
  249. return FAILURE;
  250. }
  251. php_session_register_module(&ps_mod_mm);
  252. return SUCCESS;
  253. }
  254. PHP_MSHUTDOWN_FUNCTION(ps_mm)
  255. {
  256. if (ps_mm_instance) {
  257. ps_mm_destroy(ps_mm_instance);
  258. return SUCCESS;
  259. }
  260. return FAILURE;
  261. }
  262. PS_OPEN_FUNC(mm)
  263. {
  264. ps_mm_debug(("open: ps_mm_instance=%p\n", ps_mm_instance));
  265. if (!ps_mm_instance) {
  266. return FAILURE;
  267. }
  268. PS_SET_MOD_DATA(ps_mm_instance);
  269. return SUCCESS;
  270. }
  271. PS_CLOSE_FUNC(mm)
  272. {
  273. PS_SET_MOD_DATA(NULL);
  274. return SUCCESS;
  275. }
  276. PS_READ_FUNC(mm)
  277. {
  278. PS_MM_DATA;
  279. ps_sd *sd;
  280. int ret = FAILURE;
  281. mm_lock(data->mm, MM_LOCK_RD);
  282. /* If there is an ID and strict mode, verify existence */
  283. if (PS(use_strict_mode)
  284. && ps_mm_key_exists(data, key TSRMLS_CC) == FAILURE) {
  285. /* key points to PS(id), but cannot change here. */
  286. if (key) {
  287. efree(PS(id));
  288. PS(id) = NULL;
  289. }
  290. PS(id) = PS(mod)->s_create_sid((void **)&data, NULL TSRMLS_CC);
  291. if (!PS(id)) {
  292. return FAILURE;
  293. }
  294. if (PS(use_cookies)) {
  295. PS(send_cookie) = 1;
  296. }
  297. php_session_reset_id(TSRMLS_C);
  298. PS(session_status) = php_session_active;
  299. }
  300. sd = ps_sd_lookup(data, PS(id), 0);
  301. if (sd) {
  302. *vallen = sd->datalen;
  303. *val = emalloc(sd->datalen + 1);
  304. memcpy(*val, sd->data, sd->datalen);
  305. (*val)[sd->datalen] = '\0';
  306. ret = SUCCESS;
  307. }
  308. mm_unlock(data->mm);
  309. return ret;
  310. }
  311. PS_WRITE_FUNC(mm)
  312. {
  313. PS_MM_DATA;
  314. ps_sd *sd;
  315. mm_lock(data->mm, MM_LOCK_RW);
  316. sd = ps_sd_lookup(data, key, 1);
  317. if (!sd) {
  318. sd = ps_sd_new(data, key);
  319. ps_mm_debug(("new entry for %s\n", key));
  320. }
  321. if (sd) {
  322. if (vallen >= sd->alloclen) {
  323. if (data->mm) {
  324. mm_free(data->mm, sd->data);
  325. }
  326. sd->alloclen = vallen + 1;
  327. sd->data = mm_malloc(data->mm, sd->alloclen);
  328. if (!sd->data) {
  329. ps_sd_destroy(data, sd);
  330. php_error_docref(NULL TSRMLS_CC, E_WARNING, "cannot allocate new data segment");
  331. sd = NULL;
  332. }
  333. }
  334. if (sd) {
  335. sd->datalen = vallen;
  336. memcpy(sd->data, val, vallen);
  337. time(&sd->ctime);
  338. }
  339. }
  340. mm_unlock(data->mm);
  341. return sd ? SUCCESS : FAILURE;
  342. }
  343. PS_DESTROY_FUNC(mm)
  344. {
  345. PS_MM_DATA;
  346. ps_sd *sd;
  347. mm_lock(data->mm, MM_LOCK_RW);
  348. sd = ps_sd_lookup(data, key, 0);
  349. if (sd) {
  350. ps_sd_destroy(data, sd);
  351. }
  352. mm_unlock(data->mm);
  353. return SUCCESS;
  354. }
  355. PS_GC_FUNC(mm)
  356. {
  357. PS_MM_DATA;
  358. time_t limit;
  359. ps_sd **ohash, **ehash;
  360. ps_sd *sd, *next;
  361. *nrdels = 0;
  362. ps_mm_debug(("gc\n"));
  363. time(&limit);
  364. limit -= maxlifetime;
  365. mm_lock(data->mm, MM_LOCK_RW);
  366. ehash = data->hash + data->hash_max + 1;
  367. for (ohash = data->hash; ohash < ehash; ohash++) {
  368. for (sd = *ohash; sd; sd = next) {
  369. next = sd->next;
  370. if (sd->ctime < limit) {
  371. ps_mm_debug(("purging %s\n", sd->key));
  372. ps_sd_destroy(data, sd);
  373. (*nrdels)++;
  374. }
  375. }
  376. }
  377. mm_unlock(data->mm);
  378. return SUCCESS;
  379. }
  380. PS_CREATE_SID_FUNC(mm)
  381. {
  382. char *sid;
  383. int maxfail = 3;
  384. PS_MM_DATA;
  385. do {
  386. sid = php_session_create_id((void **)&data, newlen TSRMLS_CC);
  387. /* Check collision */
  388. if (ps_mm_key_exists(data, sid TSRMLS_CC) == SUCCESS) {
  389. if (sid) {
  390. efree(sid);
  391. sid = NULL;
  392. }
  393. if (!(maxfail--)) {
  394. return NULL;
  395. }
  396. }
  397. } while(!sid);
  398. return sid;
  399. }
  400. #endif
  401. /*
  402. * Local variables:
  403. * tab-width: 4
  404. * c-basic-offset: 4
  405. * End:
  406. * vim600: sw=4 ts=4 fdm=marker
  407. * vim<600: sw=4 ts=4
  408. */