fastcgi.c 35 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 5 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Dmitry Stogov <dmitry@zend.com> |
  16. +----------------------------------------------------------------------+
  17. */
  18. /* $Id$ */
  19. #include "php.h"
  20. #include "fastcgi.h"
  21. #include <string.h>
  22. #include <stdlib.h>
  23. #include <stdio.h>
  24. #include <stdarg.h>
  25. #include <errno.h>
  26. #ifndef MAXFQDNLEN
  27. #define MAXFQDNLEN 255
  28. #endif
  29. #ifdef _WIN32
  30. #include <windows.h>
  31. typedef unsigned int in_addr_t;
  32. struct sockaddr_un {
  33. short sun_family;
  34. char sun_path[MAXPATHLEN];
  35. };
  36. static HANDLE fcgi_accept_mutex = INVALID_HANDLE_VALUE;
  37. static int is_impersonate = 0;
  38. #define FCGI_LOCK(fd) \
  39. if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
  40. DWORD ret; \
  41. while ((ret = WaitForSingleObject(fcgi_accept_mutex, 1000)) == WAIT_TIMEOUT) { \
  42. if (in_shutdown) return -1; \
  43. } \
  44. if (ret == WAIT_FAILED) { \
  45. fprintf(stderr, "WaitForSingleObject() failed\n"); \
  46. return -1; \
  47. } \
  48. }
  49. #define FCGI_UNLOCK(fd) \
  50. if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
  51. ReleaseMutex(fcgi_accept_mutex); \
  52. }
  53. #else
  54. # include <sys/types.h>
  55. # include <sys/stat.h>
  56. # include <unistd.h>
  57. # include <fcntl.h>
  58. # include <sys/socket.h>
  59. # include <sys/un.h>
  60. # include <netinet/in.h>
  61. # include <netinet/tcp.h>
  62. # include <arpa/inet.h>
  63. # include <netdb.h>
  64. # include <signal.h>
  65. # define closesocket(s) close(s)
  66. # if defined(HAVE_SYS_POLL_H) && defined(HAVE_POLL)
  67. # include <sys/poll.h>
  68. # endif
  69. # if defined(HAVE_SYS_SELECT_H)
  70. # include <sys/select.h>
  71. # endif
  72. #ifndef INADDR_NONE
  73. #define INADDR_NONE ((unsigned long) -1)
  74. #endif
  75. # ifndef HAVE_SOCKLEN_T
  76. typedef unsigned int socklen_t;
  77. # endif
  78. # ifdef USE_LOCKING
  79. # define FCGI_LOCK(fd) \
  80. do { \
  81. struct flock lock; \
  82. lock.l_type = F_WRLCK; \
  83. lock.l_start = 0; \
  84. lock.l_whence = SEEK_SET; \
  85. lock.l_len = 0; \
  86. if (fcntl(fd, F_SETLKW, &lock) != -1) { \
  87. break; \
  88. } else if (errno != EINTR || in_shutdown) { \
  89. return -1; \
  90. } \
  91. } while (1)
  92. # define FCGI_UNLOCK(fd) \
  93. do { \
  94. int orig_errno = errno; \
  95. while (1) { \
  96. struct flock lock; \
  97. lock.l_type = F_UNLCK; \
  98. lock.l_start = 0; \
  99. lock.l_whence = SEEK_SET; \
  100. lock.l_len = 0; \
  101. if (fcntl(fd, F_SETLK, &lock) != -1) { \
  102. break; \
  103. } else if (errno != EINTR) { \
  104. return -1; \
  105. } \
  106. } \
  107. errno = orig_errno; \
  108. } while (0)
  109. # else
  110. # define FCGI_LOCK(fd)
  111. # define FCGI_UNLOCK(fd)
  112. # endif
  113. #endif
  114. typedef union _sa_t {
  115. struct sockaddr sa;
  116. struct sockaddr_un sa_unix;
  117. struct sockaddr_in sa_inet;
  118. } sa_t;
  119. static HashTable fcgi_mgmt_vars;
  120. static int is_initialized = 0;
  121. static int is_fastcgi = 0;
  122. static int in_shutdown = 0;
  123. static in_addr_t *allowed_clients = NULL;
  124. /* hash table */
  125. #define FCGI_HASH_TABLE_SIZE 128
  126. #define FCGI_HASH_TABLE_MASK (FCGI_HASH_TABLE_SIZE - 1)
  127. #define FCGI_HASH_SEG_SIZE 4096
  128. typedef struct _fcgi_hash_bucket {
  129. unsigned int hash_value;
  130. unsigned int var_len;
  131. char *var;
  132. unsigned int val_len;
  133. char *val;
  134. struct _fcgi_hash_bucket *next;
  135. struct _fcgi_hash_bucket *list_next;
  136. } fcgi_hash_bucket;
  137. typedef struct _fcgi_hash_buckets {
  138. unsigned int idx;
  139. struct _fcgi_hash_buckets *next;
  140. struct _fcgi_hash_bucket data[FCGI_HASH_TABLE_SIZE];
  141. } fcgi_hash_buckets;
  142. typedef struct _fcgi_data_seg {
  143. char *pos;
  144. char *end;
  145. struct _fcgi_data_seg *next;
  146. char data[1];
  147. } fcgi_data_seg;
  148. typedef struct _fcgi_hash {
  149. fcgi_hash_bucket *hash_table[FCGI_HASH_TABLE_SIZE];
  150. fcgi_hash_bucket *list;
  151. fcgi_hash_buckets *buckets;
  152. fcgi_data_seg *data;
  153. } fcgi_hash;
  154. static void fcgi_hash_init(fcgi_hash *h)
  155. {
  156. memset(h->hash_table, 0, sizeof(h->hash_table));
  157. h->list = NULL;
  158. h->buckets = (fcgi_hash_buckets*)malloc(sizeof(fcgi_hash_buckets));
  159. h->buckets->idx = 0;
  160. h->buckets->next = NULL;
  161. h->data = (fcgi_data_seg*)malloc(sizeof(fcgi_data_seg) - 1 + FCGI_HASH_SEG_SIZE);
  162. h->data->pos = h->data->data;
  163. h->data->end = h->data->pos + FCGI_HASH_SEG_SIZE;
  164. h->data->next = NULL;
  165. }
  166. static void fcgi_hash_destroy(fcgi_hash *h)
  167. {
  168. fcgi_hash_buckets *b;
  169. fcgi_data_seg *p;
  170. b = h->buckets;
  171. while (b) {
  172. fcgi_hash_buckets *q = b;
  173. b = b->next;
  174. free(q);
  175. }
  176. p = h->data;
  177. while (p) {
  178. fcgi_data_seg *q = p;
  179. p = p->next;
  180. free(q);
  181. }
  182. }
  183. static void fcgi_hash_clean(fcgi_hash *h)
  184. {
  185. memset(h->hash_table, 0, sizeof(h->hash_table));
  186. h->list = NULL;
  187. /* delete all bucket blocks except the first one */
  188. while (h->buckets->next) {
  189. fcgi_hash_buckets *q = h->buckets;
  190. h->buckets = h->buckets->next;
  191. free(q);
  192. }
  193. h->buckets->idx = 0;
  194. /* delete all data segments except the first one */
  195. while (h->data->next) {
  196. fcgi_data_seg *q = h->data;
  197. h->data = h->data->next;
  198. free(q);
  199. }
  200. h->data->pos = h->data->data;
  201. }
  202. static inline char* fcgi_hash_strndup(fcgi_hash *h, char *str, unsigned int str_len)
  203. {
  204. char *ret;
  205. if (UNEXPECTED(h->data->pos + str_len + 1 >= h->data->end)) {
  206. unsigned int seg_size = (str_len + 1 > FCGI_HASH_SEG_SIZE) ? str_len + 1 : FCGI_HASH_SEG_SIZE;
  207. fcgi_data_seg *p = (fcgi_data_seg*)malloc(sizeof(fcgi_data_seg) - 1 + seg_size);
  208. p->pos = p->data;
  209. p->end = p->pos + seg_size;
  210. p->next = h->data;
  211. h->data = p;
  212. }
  213. ret = h->data->pos;
  214. memcpy(ret, str, str_len);
  215. ret[str_len] = 0;
  216. h->data->pos += str_len + 1;
  217. return ret;
  218. }
  219. static char* fcgi_hash_set(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len, char *val, unsigned int val_len)
  220. {
  221. unsigned int idx = hash_value & FCGI_HASH_TABLE_MASK;
  222. fcgi_hash_bucket *p = h->hash_table[idx];
  223. while (UNEXPECTED(p != NULL)) {
  224. if (UNEXPECTED(p->hash_value == hash_value) &&
  225. p->var_len == var_len &&
  226. memcmp(p->var, var, var_len) == 0) {
  227. p->val_len = val_len;
  228. p->val = fcgi_hash_strndup(h, val, val_len);
  229. return p->val;
  230. }
  231. p = p->next;
  232. }
  233. if (UNEXPECTED(h->buckets->idx >= FCGI_HASH_TABLE_SIZE)) {
  234. fcgi_hash_buckets *b = (fcgi_hash_buckets*)malloc(sizeof(fcgi_hash_buckets));
  235. b->idx = 0;
  236. b->next = h->buckets;
  237. h->buckets = b;
  238. }
  239. p = h->buckets->data + h->buckets->idx;
  240. h->buckets->idx++;
  241. p->next = h->hash_table[idx];
  242. h->hash_table[idx] = p;
  243. p->list_next = h->list;
  244. h->list = p;
  245. p->hash_value = hash_value;
  246. p->var_len = var_len;
  247. p->var = fcgi_hash_strndup(h, var, var_len);
  248. p->val_len = val_len;
  249. p->val = fcgi_hash_strndup(h, val, val_len);
  250. return p->val;
  251. }
  252. static void fcgi_hash_del(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len)
  253. {
  254. unsigned int idx = hash_value & FCGI_HASH_TABLE_MASK;
  255. fcgi_hash_bucket **p = &h->hash_table[idx];
  256. while (*p != NULL) {
  257. if ((*p)->hash_value == hash_value &&
  258. (*p)->var_len == var_len &&
  259. memcmp((*p)->var, var, var_len) == 0) {
  260. (*p)->val = NULL; /* NULL value means deleted */
  261. (*p)->val_len = 0;
  262. *p = (*p)->next;
  263. return;
  264. }
  265. p = &(*p)->next;
  266. }
  267. }
  268. static char *fcgi_hash_get(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len, unsigned int *val_len)
  269. {
  270. unsigned int idx = hash_value & FCGI_HASH_TABLE_MASK;
  271. fcgi_hash_bucket *p = h->hash_table[idx];
  272. while (p != NULL) {
  273. if (p->hash_value == hash_value &&
  274. p->var_len == var_len &&
  275. memcmp(p->var, var, var_len) == 0) {
  276. *val_len = p->val_len;
  277. return p->val;
  278. }
  279. p = p->next;
  280. }
  281. return NULL;
  282. }
  283. static void fcgi_hash_apply(fcgi_hash *h, fcgi_apply_func func, void *arg TSRMLS_DC)
  284. {
  285. fcgi_hash_bucket *p = h->list;
  286. while (p) {
  287. if (EXPECTED(p->val != NULL)) {
  288. func(p->var, p->var_len, p->val, p->val_len, arg TSRMLS_CC);
  289. }
  290. p = p->list_next;
  291. }
  292. }
  293. struct _fcgi_request {
  294. int listen_socket;
  295. int tcp;
  296. int fd;
  297. int id;
  298. int keep;
  299. #ifdef TCP_NODELAY
  300. int nodelay;
  301. #endif
  302. int closed;
  303. int in_len;
  304. int in_pad;
  305. fcgi_header *out_hdr;
  306. unsigned char *out_pos;
  307. unsigned char out_buf[1024*8];
  308. unsigned char reserved[sizeof(fcgi_end_request_rec)];
  309. int has_env;
  310. fcgi_hash env;
  311. };
  312. #ifdef _WIN32
  313. static DWORD WINAPI fcgi_shutdown_thread(LPVOID arg)
  314. {
  315. HANDLE shutdown_event = (HANDLE) arg;
  316. WaitForSingleObject(shutdown_event, INFINITE);
  317. in_shutdown = 1;
  318. return 0;
  319. }
  320. #else
  321. static void fcgi_signal_handler(int signo)
  322. {
  323. if (signo == SIGUSR1 || signo == SIGTERM) {
  324. in_shutdown = 1;
  325. }
  326. }
  327. static void fcgi_setup_signals(void)
  328. {
  329. struct sigaction new_sa, old_sa;
  330. sigemptyset(&new_sa.sa_mask);
  331. new_sa.sa_flags = 0;
  332. new_sa.sa_handler = fcgi_signal_handler;
  333. sigaction(SIGUSR1, &new_sa, NULL);
  334. sigaction(SIGTERM, &new_sa, NULL);
  335. sigaction(SIGPIPE, NULL, &old_sa);
  336. if (old_sa.sa_handler == SIG_DFL) {
  337. sigaction(SIGPIPE, &new_sa, NULL);
  338. }
  339. }
  340. #endif
  341. int fcgi_in_shutdown(void)
  342. {
  343. return in_shutdown;
  344. }
  345. void fcgi_terminate(void)
  346. {
  347. in_shutdown = 1;
  348. }
  349. int fcgi_init(void)
  350. {
  351. if (!is_initialized) {
  352. #ifndef _WIN32
  353. sa_t sa;
  354. socklen_t len = sizeof(sa);
  355. #endif
  356. zend_hash_init(&fcgi_mgmt_vars, 0, NULL, fcgi_free_mgmt_var_cb, 1);
  357. fcgi_set_mgmt_var("FCGI_MPXS_CONNS", sizeof("FCGI_MPXS_CONNS")-1, "0", sizeof("0")-1);
  358. is_initialized = 1;
  359. #ifdef _WIN32
  360. # if 0
  361. /* TODO: Support for TCP sockets */
  362. WSADATA wsaData;
  363. if (WSAStartup(MAKEWORD(2,0), &wsaData)) {
  364. fprintf(stderr, "Error starting Windows Sockets. Error: %d", WSAGetLastError());
  365. return 0;
  366. }
  367. # endif
  368. if ((GetStdHandle(STD_OUTPUT_HANDLE) == INVALID_HANDLE_VALUE) &&
  369. (GetStdHandle(STD_ERROR_HANDLE) == INVALID_HANDLE_VALUE) &&
  370. (GetStdHandle(STD_INPUT_HANDLE) != INVALID_HANDLE_VALUE)) {
  371. char *str;
  372. DWORD pipe_mode = PIPE_READMODE_BYTE | PIPE_WAIT;
  373. HANDLE pipe = GetStdHandle(STD_INPUT_HANDLE);
  374. SetNamedPipeHandleState(pipe, &pipe_mode, NULL, NULL);
  375. str = getenv("_FCGI_SHUTDOWN_EVENT_");
  376. if (str != NULL) {
  377. HANDLE shutdown_event = (HANDLE) atoi(str);
  378. if (!CreateThread(NULL, 0, fcgi_shutdown_thread,
  379. shutdown_event, 0, NULL)) {
  380. return -1;
  381. }
  382. }
  383. str = getenv("_FCGI_MUTEX_");
  384. if (str != NULL) {
  385. fcgi_accept_mutex = (HANDLE) atoi(str);
  386. }
  387. return is_fastcgi = 1;
  388. } else {
  389. return is_fastcgi = 0;
  390. }
  391. #else
  392. errno = 0;
  393. if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) {
  394. fcgi_setup_signals();
  395. return is_fastcgi = 1;
  396. } else {
  397. return is_fastcgi = 0;
  398. }
  399. #endif
  400. }
  401. return is_fastcgi;
  402. }
  403. int fcgi_is_fastcgi(void)
  404. {
  405. if (!is_initialized) {
  406. return fcgi_init();
  407. } else {
  408. return is_fastcgi;
  409. }
  410. }
  411. void fcgi_shutdown(void)
  412. {
  413. if (is_initialized) {
  414. zend_hash_destroy(&fcgi_mgmt_vars);
  415. }
  416. is_fastcgi = 0;
  417. if (allowed_clients) {
  418. free(allowed_clients);
  419. }
  420. }
  421. #ifdef _WIN32
  422. /* Do some black magic with the NT security API.
  423. * We prepare a DACL (Discretionary Access Control List) so that
  424. * we, the creator, are allowed all access, while "Everyone Else"
  425. * is only allowed to read and write to the pipe.
  426. * This avoids security issues on shared hosts where a luser messes
  427. * with the lower-level pipe settings and screws up the FastCGI service.
  428. */
  429. static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa)
  430. {
  431. DWORD req_acl_size;
  432. char everyone_buf[32], owner_buf[32];
  433. PSID sid_everyone, sid_owner;
  434. SID_IDENTIFIER_AUTHORITY
  435. siaWorld = SECURITY_WORLD_SID_AUTHORITY,
  436. siaCreator = SECURITY_CREATOR_SID_AUTHORITY;
  437. PACL acl;
  438. sid_everyone = (PSID)&everyone_buf;
  439. sid_owner = (PSID)&owner_buf;
  440. req_acl_size = sizeof(ACL) +
  441. (2 * ((sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD)) + GetSidLengthRequired(1)));
  442. acl = malloc(req_acl_size);
  443. if (acl == NULL) {
  444. return NULL;
  445. }
  446. if (!InitializeSid(sid_everyone, &siaWorld, 1)) {
  447. goto out_fail;
  448. }
  449. *GetSidSubAuthority(sid_everyone, 0) = SECURITY_WORLD_RID;
  450. if (!InitializeSid(sid_owner, &siaCreator, 1)) {
  451. goto out_fail;
  452. }
  453. *GetSidSubAuthority(sid_owner, 0) = SECURITY_CREATOR_OWNER_RID;
  454. if (!InitializeAcl(acl, req_acl_size, ACL_REVISION)) {
  455. goto out_fail;
  456. }
  457. if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_GENERIC_READ | FILE_GENERIC_WRITE, sid_everyone)) {
  458. goto out_fail;
  459. }
  460. if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_ALL_ACCESS, sid_owner)) {
  461. goto out_fail;
  462. }
  463. if (!InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION)) {
  464. goto out_fail;
  465. }
  466. if (!SetSecurityDescriptorDacl(sd, TRUE, acl, FALSE)) {
  467. goto out_fail;
  468. }
  469. sa->lpSecurityDescriptor = sd;
  470. return acl;
  471. out_fail:
  472. free(acl);
  473. return NULL;
  474. }
  475. #endif
  476. static int is_port_number(const char *bindpath)
  477. {
  478. while (*bindpath) {
  479. if (*bindpath < '0' || *bindpath > '9') {
  480. return 0;
  481. }
  482. bindpath++;
  483. }
  484. return 1;
  485. }
  486. int fcgi_listen(const char *path, int backlog)
  487. {
  488. char *s;
  489. int tcp = 0;
  490. char host[MAXPATHLEN];
  491. short port = 0;
  492. int listen_socket;
  493. sa_t sa;
  494. socklen_t sock_len;
  495. #ifdef SO_REUSEADDR
  496. # ifdef _WIN32
  497. BOOL reuse = 1;
  498. # else
  499. int reuse = 1;
  500. # endif
  501. #endif
  502. if ((s = strchr(path, ':'))) {
  503. port = atoi(s+1);
  504. if (port != 0 && (s-path) < MAXPATHLEN) {
  505. strncpy(host, path, s-path);
  506. host[s-path] = '\0';
  507. tcp = 1;
  508. }
  509. } else if (is_port_number(path)) {
  510. port = atoi(path);
  511. if (port != 0) {
  512. host[0] = '\0';
  513. tcp = 1;
  514. }
  515. }
  516. /* Prepare socket address */
  517. if (tcp) {
  518. memset(&sa.sa_inet, 0, sizeof(sa.sa_inet));
  519. sa.sa_inet.sin_family = AF_INET;
  520. sa.sa_inet.sin_port = htons(port);
  521. sock_len = sizeof(sa.sa_inet);
  522. if (!*host || !strncmp(host, "*", sizeof("*")-1)) {
  523. sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY);
  524. } else {
  525. sa.sa_inet.sin_addr.s_addr = inet_addr(host);
  526. if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) {
  527. struct hostent *hep;
  528. if(strlen(host) > MAXFQDNLEN) {
  529. hep = NULL;
  530. } else {
  531. hep = gethostbyname(host);
  532. }
  533. if (!hep || hep->h_addrtype != AF_INET || !hep->h_addr_list[0]) {
  534. fprintf(stderr, "Cannot resolve host name '%s'!\n", host);
  535. return -1;
  536. } else if (hep->h_addr_list[1]) {
  537. fprintf(stderr, "Host '%s' has multiple addresses. You must choose one explicitly!\n", host);
  538. return -1;
  539. }
  540. sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr;
  541. }
  542. }
  543. } else {
  544. #ifdef _WIN32
  545. SECURITY_DESCRIPTOR sd;
  546. SECURITY_ATTRIBUTES saw;
  547. PACL acl;
  548. HANDLE namedPipe;
  549. memset(&sa, 0, sizeof(saw));
  550. saw.nLength = sizeof(saw);
  551. saw.bInheritHandle = FALSE;
  552. acl = prepare_named_pipe_acl(&sd, &saw);
  553. namedPipe = CreateNamedPipe(path,
  554. PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED,
  555. PIPE_TYPE_BYTE | PIPE_WAIT | PIPE_READMODE_BYTE,
  556. PIPE_UNLIMITED_INSTANCES,
  557. 8192, 8192, 0, &saw);
  558. if (namedPipe == INVALID_HANDLE_VALUE) {
  559. return -1;
  560. }
  561. listen_socket = _open_osfhandle((long)namedPipe, 0);
  562. if (!is_initialized) {
  563. fcgi_init();
  564. }
  565. is_fastcgi = 1;
  566. return listen_socket;
  567. #else
  568. int path_len = strlen(path);
  569. if (path_len >= sizeof(sa.sa_unix.sun_path)) {
  570. fprintf(stderr, "Listening socket's path name is too long.\n");
  571. return -1;
  572. }
  573. memset(&sa.sa_unix, 0, sizeof(sa.sa_unix));
  574. sa.sa_unix.sun_family = AF_UNIX;
  575. memcpy(sa.sa_unix.sun_path, path, path_len + 1);
  576. sock_len = (size_t)(((struct sockaddr_un *)0)->sun_path) + path_len;
  577. #ifdef HAVE_SOCKADDR_UN_SUN_LEN
  578. sa.sa_unix.sun_len = sock_len;
  579. #endif
  580. unlink(path);
  581. #endif
  582. }
  583. /* Create, bind socket and start listen on it */
  584. if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 ||
  585. #ifdef SO_REUSEADDR
  586. setsockopt(listen_socket, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, sizeof(reuse)) < 0 ||
  587. #endif
  588. bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 ||
  589. listen(listen_socket, backlog) < 0) {
  590. fprintf(stderr, "Cannot bind/listen socket - [%d] %s.\n",errno, strerror(errno));
  591. return -1;
  592. }
  593. if (!tcp) {
  594. chmod(path, 0777);
  595. } else {
  596. char *ip = getenv("FCGI_WEB_SERVER_ADDRS");
  597. char *cur, *end;
  598. int n;
  599. if (ip) {
  600. ip = strdup(ip);
  601. cur = ip;
  602. n = 0;
  603. while (*cur) {
  604. if (*cur == ',') n++;
  605. cur++;
  606. }
  607. allowed_clients = malloc(sizeof(in_addr_t) * (n+2));
  608. n = 0;
  609. cur = ip;
  610. while (cur) {
  611. end = strchr(cur, ',');
  612. if (end) {
  613. *end = 0;
  614. end++;
  615. }
  616. allowed_clients[n] = inet_addr(cur);
  617. if (allowed_clients[n] == INADDR_NONE) {
  618. fprintf(stderr, "Wrong IP address '%s' in FCGI_WEB_SERVER_ADDRS\n", cur);
  619. }
  620. n++;
  621. cur = end;
  622. }
  623. allowed_clients[n] = INADDR_NONE;
  624. free(ip);
  625. }
  626. }
  627. if (!is_initialized) {
  628. fcgi_init();
  629. }
  630. is_fastcgi = 1;
  631. #ifdef _WIN32
  632. if (tcp) {
  633. listen_socket = _open_osfhandle((long)listen_socket, 0);
  634. }
  635. #else
  636. fcgi_setup_signals();
  637. #endif
  638. return listen_socket;
  639. }
  640. fcgi_request *fcgi_init_request(int listen_socket)
  641. {
  642. fcgi_request *req = (fcgi_request*)calloc(1, sizeof(fcgi_request));
  643. req->listen_socket = listen_socket;
  644. req->fd = -1;
  645. req->id = -1;
  646. req->in_len = 0;
  647. req->in_pad = 0;
  648. req->out_hdr = NULL;
  649. req->out_pos = req->out_buf;
  650. #ifdef _WIN32
  651. req->tcp = !GetNamedPipeInfo((HANDLE)_get_osfhandle(req->listen_socket), NULL, NULL, NULL, NULL);
  652. #endif
  653. #ifdef TCP_NODELAY
  654. req->nodelay = 0;
  655. #endif
  656. fcgi_hash_init(&req->env);
  657. return req;
  658. }
  659. void fcgi_destroy_request(fcgi_request *req)
  660. {
  661. fcgi_hash_destroy(&req->env);
  662. free(req);
  663. }
  664. static inline ssize_t safe_write(fcgi_request *req, const void *buf, size_t count)
  665. {
  666. int ret;
  667. size_t n = 0;
  668. do {
  669. errno = 0;
  670. #ifdef _WIN32
  671. if (!req->tcp) {
  672. ret = write(req->fd, ((char*)buf)+n, count-n);
  673. } else {
  674. ret = send(req->fd, ((char*)buf)+n, count-n, 0);
  675. if (ret <= 0) {
  676. errno = WSAGetLastError();
  677. }
  678. }
  679. #else
  680. ret = write(req->fd, ((char*)buf)+n, count-n);
  681. #endif
  682. if (ret > 0) {
  683. n += ret;
  684. } else if (ret <= 0 && errno != 0 && errno != EINTR) {
  685. return ret;
  686. }
  687. } while (n != count);
  688. return n;
  689. }
  690. static inline ssize_t safe_read(fcgi_request *req, const void *buf, size_t count)
  691. {
  692. int ret;
  693. size_t n = 0;
  694. do {
  695. errno = 0;
  696. #ifdef _WIN32
  697. if (!req->tcp) {
  698. ret = read(req->fd, ((char*)buf)+n, count-n);
  699. } else {
  700. ret = recv(req->fd, ((char*)buf)+n, count-n, 0);
  701. if (ret <= 0) {
  702. errno = WSAGetLastError();
  703. }
  704. }
  705. #else
  706. ret = read(req->fd, ((char*)buf)+n, count-n);
  707. #endif
  708. if (ret > 0) {
  709. n += ret;
  710. } else if (ret == 0 && errno == 0) {
  711. return n;
  712. } else if (ret <= 0 && errno != 0 && errno != EINTR) {
  713. return ret;
  714. }
  715. } while (n != count);
  716. return n;
  717. }
  718. static inline int fcgi_make_header(fcgi_header *hdr, fcgi_request_type type, int req_id, int len)
  719. {
  720. int pad = ((len + 7) & ~7) - len;
  721. hdr->contentLengthB0 = (unsigned char)(len & 0xff);
  722. hdr->contentLengthB1 = (unsigned char)((len >> 8) & 0xff);
  723. hdr->paddingLength = (unsigned char)pad;
  724. hdr->requestIdB0 = (unsigned char)(req_id & 0xff);
  725. hdr->requestIdB1 = (unsigned char)((req_id >> 8) & 0xff);
  726. hdr->reserved = 0;
  727. hdr->type = type;
  728. hdr->version = FCGI_VERSION_1;
  729. if (pad) {
  730. memset(((unsigned char*)hdr) + sizeof(fcgi_header) + len, 0, pad);
  731. }
  732. return pad;
  733. }
  734. static int fcgi_get_params(fcgi_request *req, unsigned char *p, unsigned char *end)
  735. {
  736. unsigned int name_len, val_len;
  737. while (p < end) {
  738. name_len = *p++;
  739. if (UNEXPECTED(name_len >= 128)) {
  740. if (UNEXPECTED(p + 3 >= end)) return 0;
  741. name_len = ((name_len & 0x7f) << 24);
  742. name_len |= (*p++ << 16);
  743. name_len |= (*p++ << 8);
  744. name_len |= *p++;
  745. }
  746. if (UNEXPECTED(p >= end)) return 0;
  747. val_len = *p++;
  748. if (UNEXPECTED(val_len >= 128)) {
  749. if (UNEXPECTED(p + 3 >= end)) return 0;
  750. val_len = ((val_len & 0x7f) << 24);
  751. val_len |= (*p++ << 16);
  752. val_len |= (*p++ << 8);
  753. val_len |= *p++;
  754. }
  755. if (UNEXPECTED(name_len + val_len > (unsigned int) (end - p))) {
  756. /* Malformated request */
  757. return 0;
  758. }
  759. fcgi_hash_set(&req->env, FCGI_HASH_FUNC(p, name_len), (char*)p, name_len, (char*)p + name_len, val_len);
  760. p += name_len + val_len;
  761. }
  762. return 1;
  763. }
  764. static int fcgi_read_request(fcgi_request *req)
  765. {
  766. fcgi_header hdr;
  767. int len, padding;
  768. unsigned char buf[FCGI_MAX_LENGTH+8];
  769. req->keep = 0;
  770. req->closed = 0;
  771. req->in_len = 0;
  772. req->out_hdr = NULL;
  773. req->out_pos = req->out_buf;
  774. req->has_env = 1;
  775. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  776. hdr.version < FCGI_VERSION_1) {
  777. return 0;
  778. }
  779. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  780. padding = hdr.paddingLength;
  781. while (hdr.type == FCGI_STDIN && len == 0) {
  782. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  783. hdr.version < FCGI_VERSION_1) {
  784. return 0;
  785. }
  786. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  787. padding = hdr.paddingLength;
  788. }
  789. if (len + padding > FCGI_MAX_LENGTH) {
  790. return 0;
  791. }
  792. req->id = (hdr.requestIdB1 << 8) + hdr.requestIdB0;
  793. if (hdr.type == FCGI_BEGIN_REQUEST && len == sizeof(fcgi_begin_request)) {
  794. if (safe_read(req, buf, len+padding) != len+padding) {
  795. return 0;
  796. }
  797. req->keep = (((fcgi_begin_request*)buf)->flags & FCGI_KEEP_CONN);
  798. #ifdef TCP_NODELAY
  799. if (req->keep && req->tcp && !req->nodelay) {
  800. # ifdef _WIN32
  801. BOOL on = 1;
  802. # else
  803. int on = 1;
  804. # endif
  805. setsockopt(req->fd, IPPROTO_TCP, TCP_NODELAY, (char*)&on, sizeof(on));
  806. req->nodelay = 1;
  807. }
  808. #endif
  809. switch ((((fcgi_begin_request*)buf)->roleB1 << 8) + ((fcgi_begin_request*)buf)->roleB0) {
  810. case FCGI_RESPONDER:
  811. fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "RESPONDER", sizeof("RESPONDER")-1);
  812. break;
  813. case FCGI_AUTHORIZER:
  814. fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "AUTHORIZER", sizeof("AUTHORIZER")-1);
  815. break;
  816. case FCGI_FILTER:
  817. fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "FILTER", sizeof("FILTER")-1);
  818. break;
  819. default:
  820. return 0;
  821. }
  822. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  823. hdr.version < FCGI_VERSION_1) {
  824. return 0;
  825. }
  826. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  827. padding = hdr.paddingLength;
  828. while (hdr.type == FCGI_PARAMS && len > 0) {
  829. if (len + padding > FCGI_MAX_LENGTH) {
  830. return 0;
  831. }
  832. if (safe_read(req, buf, len+padding) != len+padding) {
  833. req->keep = 0;
  834. return 0;
  835. }
  836. if (!fcgi_get_params(req, buf, buf+len)) {
  837. req->keep = 0;
  838. return 0;
  839. }
  840. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  841. hdr.version < FCGI_VERSION_1) {
  842. req->keep = 0;
  843. return 0;
  844. }
  845. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  846. padding = hdr.paddingLength;
  847. }
  848. } else if (hdr.type == FCGI_GET_VALUES) {
  849. unsigned char *p = buf + sizeof(fcgi_header);
  850. zval ** value;
  851. unsigned int zlen;
  852. fcgi_hash_bucket *q;
  853. if (safe_read(req, buf, len+padding) != len+padding) {
  854. req->keep = 0;
  855. return 0;
  856. }
  857. if (!fcgi_get_params(req, buf, buf+len)) {
  858. req->keep = 0;
  859. return 0;
  860. }
  861. q = req->env.list;
  862. while (q != NULL) {
  863. if (zend_hash_find(&fcgi_mgmt_vars, q->var, q->var_len, (void**) &value) != SUCCESS) {
  864. q = q->list_next;
  865. continue;
  866. }
  867. zlen = Z_STRLEN_PP(value);
  868. if ((p + 4 + 4 + q->var_len + zlen) >= (buf + sizeof(buf))) {
  869. break;
  870. }
  871. if (q->var_len < 0x80) {
  872. *p++ = q->var_len;
  873. } else {
  874. *p++ = ((q->var_len >> 24) & 0xff) | 0x80;
  875. *p++ = (q->var_len >> 16) & 0xff;
  876. *p++ = (q->var_len >> 8) & 0xff;
  877. *p++ = q->var_len & 0xff;
  878. }
  879. if (zlen < 0x80) {
  880. *p++ = zlen;
  881. } else {
  882. *p++ = ((zlen >> 24) & 0xff) | 0x80;
  883. *p++ = (zlen >> 16) & 0xff;
  884. *p++ = (zlen >> 8) & 0xff;
  885. *p++ = zlen & 0xff;
  886. }
  887. memcpy(p, q->var, q->var_len);
  888. p += q->var_len;
  889. memcpy(p, Z_STRVAL_PP(value), zlen);
  890. p += zlen;
  891. q = q->list_next;
  892. }
  893. len = p - buf - sizeof(fcgi_header);
  894. len += fcgi_make_header((fcgi_header*)buf, FCGI_GET_VALUES_RESULT, 0, len);
  895. if (safe_write(req, buf, sizeof(fcgi_header)+len) != (int)sizeof(fcgi_header)+len) {
  896. req->keep = 0;
  897. return 0;
  898. }
  899. return 0;
  900. } else {
  901. return 0;
  902. }
  903. return 1;
  904. }
  905. int fcgi_read(fcgi_request *req, char *str, int len)
  906. {
  907. int ret, n, rest;
  908. fcgi_header hdr;
  909. unsigned char buf[255];
  910. n = 0;
  911. rest = len;
  912. while (rest > 0) {
  913. if (req->in_len == 0) {
  914. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  915. hdr.version < FCGI_VERSION_1 ||
  916. hdr.type != FCGI_STDIN) {
  917. req->keep = 0;
  918. return 0;
  919. }
  920. req->in_len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  921. req->in_pad = hdr.paddingLength;
  922. if (req->in_len == 0) {
  923. return n;
  924. }
  925. }
  926. if (req->in_len >= rest) {
  927. ret = safe_read(req, str, rest);
  928. } else {
  929. ret = safe_read(req, str, req->in_len);
  930. }
  931. if (ret < 0) {
  932. req->keep = 0;
  933. return ret;
  934. } else if (ret > 0) {
  935. req->in_len -= ret;
  936. rest -= ret;
  937. n += ret;
  938. str += ret;
  939. if (req->in_len == 0) {
  940. if (req->in_pad) {
  941. if (safe_read(req, buf, req->in_pad) != req->in_pad) {
  942. req->keep = 0;
  943. return ret;
  944. }
  945. }
  946. } else {
  947. return n;
  948. }
  949. } else {
  950. return n;
  951. }
  952. }
  953. return n;
  954. }
  955. static inline void fcgi_close(fcgi_request *req, int force, int destroy)
  956. {
  957. if (destroy && req->has_env) {
  958. fcgi_hash_clean(&req->env);
  959. req->has_env = 0;
  960. }
  961. #ifdef _WIN32
  962. if (is_impersonate && !req->tcp) {
  963. RevertToSelf();
  964. }
  965. #endif
  966. if ((force || !req->keep) && req->fd >= 0) {
  967. #ifdef _WIN32
  968. if (!req->tcp) {
  969. HANDLE pipe = (HANDLE)_get_osfhandle(req->fd);
  970. if (!force) {
  971. FlushFileBuffers(pipe);
  972. }
  973. DisconnectNamedPipe(pipe);
  974. } else {
  975. if (!force) {
  976. fcgi_header buf;
  977. shutdown(req->fd, 1);
  978. /* read the last FCGI_STDIN header (it may be omitted) */
  979. recv(req->fd, (char *)(&buf), sizeof(buf), 0);
  980. }
  981. closesocket(req->fd);
  982. }
  983. #else
  984. if (!force) {
  985. fcgi_header buf;
  986. shutdown(req->fd, 1);
  987. /* read the last FCGI_STDIN header (it may be omitted) */
  988. recv(req->fd, (char *)(&buf), sizeof(buf), 0);
  989. }
  990. close(req->fd);
  991. #endif
  992. #ifdef TCP_NODELAY
  993. req->nodelay = 0;
  994. #endif
  995. req->fd = -1;
  996. }
  997. }
  998. int fcgi_accept_request(fcgi_request *req)
  999. {
  1000. #ifdef _WIN32
  1001. HANDLE pipe;
  1002. OVERLAPPED ov;
  1003. #endif
  1004. while (1) {
  1005. if (req->fd < 0) {
  1006. while (1) {
  1007. if (in_shutdown) {
  1008. return -1;
  1009. }
  1010. #ifdef _WIN32
  1011. if (!req->tcp) {
  1012. pipe = (HANDLE)_get_osfhandle(req->listen_socket);
  1013. FCGI_LOCK(req->listen_socket);
  1014. ov.hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
  1015. if (!ConnectNamedPipe(pipe, &ov)) {
  1016. errno = GetLastError();
  1017. if (errno == ERROR_IO_PENDING) {
  1018. while (WaitForSingleObject(ov.hEvent, 1000) == WAIT_TIMEOUT) {
  1019. if (in_shutdown) {
  1020. CloseHandle(ov.hEvent);
  1021. FCGI_UNLOCK(req->listen_socket);
  1022. return -1;
  1023. }
  1024. }
  1025. } else if (errno != ERROR_PIPE_CONNECTED) {
  1026. }
  1027. }
  1028. CloseHandle(ov.hEvent);
  1029. req->fd = req->listen_socket;
  1030. FCGI_UNLOCK(req->listen_socket);
  1031. } else {
  1032. SOCKET listen_socket = (SOCKET)_get_osfhandle(req->listen_socket);
  1033. #else
  1034. {
  1035. int listen_socket = req->listen_socket;
  1036. #endif
  1037. sa_t sa;
  1038. socklen_t len = sizeof(sa);
  1039. FCGI_LOCK(req->listen_socket);
  1040. req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
  1041. FCGI_UNLOCK(req->listen_socket);
  1042. if (req->fd >= 0) {
  1043. if (((struct sockaddr *)&sa)->sa_family == AF_INET) {
  1044. #ifndef _WIN32
  1045. req->tcp = 1;
  1046. #endif
  1047. if (allowed_clients) {
  1048. int n = 0;
  1049. int allowed = 0;
  1050. while (allowed_clients[n] != INADDR_NONE) {
  1051. if (allowed_clients[n] == sa.sa_inet.sin_addr.s_addr) {
  1052. allowed = 1;
  1053. break;
  1054. }
  1055. n++;
  1056. }
  1057. if (!allowed) {
  1058. fprintf(stderr, "Connection from disallowed IP address '%s' is dropped.\n", inet_ntoa(sa.sa_inet.sin_addr));
  1059. closesocket(req->fd);
  1060. req->fd = -1;
  1061. continue;
  1062. }
  1063. }
  1064. #ifndef _WIN32
  1065. } else {
  1066. req->tcp = 0;
  1067. #endif
  1068. }
  1069. }
  1070. }
  1071. #ifdef _WIN32
  1072. if (req->fd < 0 && (in_shutdown || errno != EINTR)) {
  1073. #else
  1074. if (req->fd < 0 && (in_shutdown || (errno != EINTR && errno != ECONNABORTED))) {
  1075. #endif
  1076. return -1;
  1077. }
  1078. #ifdef _WIN32
  1079. break;
  1080. #else
  1081. if (req->fd >= 0) {
  1082. #if defined(HAVE_SYS_POLL_H) && defined(HAVE_POLL)
  1083. struct pollfd fds;
  1084. int ret;
  1085. fds.fd = req->fd;
  1086. fds.events = POLLIN;
  1087. fds.revents = 0;
  1088. do {
  1089. errno = 0;
  1090. ret = poll(&fds, 1, 5000);
  1091. } while (ret < 0 && errno == EINTR);
  1092. if (ret > 0 && (fds.revents & POLLIN)) {
  1093. break;
  1094. }
  1095. fcgi_close(req, 1, 0);
  1096. #else
  1097. if (req->fd < FD_SETSIZE) {
  1098. struct timeval tv = {5,0};
  1099. fd_set set;
  1100. int ret;
  1101. FD_ZERO(&set);
  1102. FD_SET(req->fd, &set);
  1103. do {
  1104. errno = 0;
  1105. ret = select(req->fd + 1, &set, NULL, NULL, &tv) >= 0;
  1106. } while (ret < 0 && errno == EINTR);
  1107. if (ret > 0 && FD_ISSET(req->fd, &set)) {
  1108. break;
  1109. }
  1110. fcgi_close(req, 1, 0);
  1111. } else {
  1112. fprintf(stderr, "Too many open file descriptors. FD_SETSIZE limit exceeded.");
  1113. fcgi_close(req, 1, 0);
  1114. }
  1115. #endif
  1116. }
  1117. #endif
  1118. }
  1119. } else if (in_shutdown) {
  1120. return -1;
  1121. }
  1122. if (fcgi_read_request(req)) {
  1123. #ifdef _WIN32
  1124. if (is_impersonate && !req->tcp) {
  1125. pipe = (HANDLE)_get_osfhandle(req->fd);
  1126. if (!ImpersonateNamedPipeClient(pipe)) {
  1127. fcgi_close(req, 1, 1);
  1128. continue;
  1129. }
  1130. }
  1131. #endif
  1132. return req->fd;
  1133. } else {
  1134. fcgi_close(req, 1, 1);
  1135. }
  1136. }
  1137. }
  1138. static inline fcgi_header* open_packet(fcgi_request *req, fcgi_request_type type)
  1139. {
  1140. req->out_hdr = (fcgi_header*) req->out_pos;
  1141. req->out_hdr->type = type;
  1142. req->out_pos += sizeof(fcgi_header);
  1143. return req->out_hdr;
  1144. }
  1145. static inline void close_packet(fcgi_request *req)
  1146. {
  1147. if (req->out_hdr) {
  1148. int len = req->out_pos - ((unsigned char*)req->out_hdr + sizeof(fcgi_header));
  1149. req->out_pos += fcgi_make_header(req->out_hdr, (fcgi_request_type)req->out_hdr->type, req->id, len);
  1150. req->out_hdr = NULL;
  1151. }
  1152. }
  1153. int fcgi_flush(fcgi_request *req, int close)
  1154. {
  1155. int len;
  1156. close_packet(req);
  1157. len = req->out_pos - req->out_buf;
  1158. if (close) {
  1159. fcgi_end_request_rec *rec = (fcgi_end_request_rec*)(req->out_pos);
  1160. fcgi_make_header(&rec->hdr, FCGI_END_REQUEST, req->id, sizeof(fcgi_end_request));
  1161. rec->body.appStatusB3 = 0;
  1162. rec->body.appStatusB2 = 0;
  1163. rec->body.appStatusB1 = 0;
  1164. rec->body.appStatusB0 = 0;
  1165. rec->body.protocolStatus = FCGI_REQUEST_COMPLETE;
  1166. len += sizeof(fcgi_end_request_rec);
  1167. }
  1168. if (safe_write(req, req->out_buf, len) != len) {
  1169. req->keep = 0;
  1170. req->out_pos = req->out_buf;
  1171. return 0;
  1172. }
  1173. req->out_pos = req->out_buf;
  1174. return 1;
  1175. }
  1176. int fcgi_write(fcgi_request *req, fcgi_request_type type, const char *str, int len)
  1177. {
  1178. int limit, rest;
  1179. if (len <= 0) {
  1180. return 0;
  1181. }
  1182. if (req->out_hdr && req->out_hdr->type != type) {
  1183. close_packet(req);
  1184. }
  1185. #if 0
  1186. /* Unoptimized, but clear version */
  1187. rest = len;
  1188. while (rest > 0) {
  1189. limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
  1190. if (!req->out_hdr) {
  1191. if (limit < sizeof(fcgi_header)) {
  1192. if (!fcgi_flush(req, 0)) {
  1193. return -1;
  1194. }
  1195. }
  1196. open_packet(req, type);
  1197. }
  1198. limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
  1199. if (rest < limit) {
  1200. memcpy(req->out_pos, str, rest);
  1201. req->out_pos += rest;
  1202. return len;
  1203. } else {
  1204. memcpy(req->out_pos, str, limit);
  1205. req->out_pos += limit;
  1206. rest -= limit;
  1207. str += limit;
  1208. if (!fcgi_flush(req, 0)) {
  1209. return -1;
  1210. }
  1211. }
  1212. }
  1213. #else
  1214. /* Optimized version */
  1215. limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
  1216. if (!req->out_hdr) {
  1217. limit -= sizeof(fcgi_header);
  1218. if (limit < 0) limit = 0;
  1219. }
  1220. if (len < limit) {
  1221. if (!req->out_hdr) {
  1222. open_packet(req, type);
  1223. }
  1224. memcpy(req->out_pos, str, len);
  1225. req->out_pos += len;
  1226. } else if (len - limit < sizeof(req->out_buf) - sizeof(fcgi_header)) {
  1227. if (!req->out_hdr) {
  1228. open_packet(req, type);
  1229. }
  1230. if (limit > 0) {
  1231. memcpy(req->out_pos, str, limit);
  1232. req->out_pos += limit;
  1233. }
  1234. if (!fcgi_flush(req, 0)) {
  1235. return -1;
  1236. }
  1237. if (len > limit) {
  1238. open_packet(req, type);
  1239. memcpy(req->out_pos, str + limit, len - limit);
  1240. req->out_pos += len - limit;
  1241. }
  1242. } else {
  1243. int pos = 0;
  1244. int pad;
  1245. close_packet(req);
  1246. while ((len - pos) > 0xffff) {
  1247. open_packet(req, type);
  1248. fcgi_make_header(req->out_hdr, type, req->id, 0xfff8);
  1249. req->out_hdr = NULL;
  1250. if (!fcgi_flush(req, 0)) {
  1251. return -1;
  1252. }
  1253. if (safe_write(req, str + pos, 0xfff8) != 0xfff8) {
  1254. req->keep = 0;
  1255. return -1;
  1256. }
  1257. pos += 0xfff8;
  1258. }
  1259. pad = (((len - pos) + 7) & ~7) - (len - pos);
  1260. rest = pad ? 8 - pad : 0;
  1261. open_packet(req, type);
  1262. fcgi_make_header(req->out_hdr, type, req->id, (len - pos) - rest);
  1263. req->out_hdr = NULL;
  1264. if (!fcgi_flush(req, 0)) {
  1265. return -1;
  1266. }
  1267. if (safe_write(req, str + pos, (len - pos) - rest) != (len - pos) - rest) {
  1268. req->keep = 0;
  1269. return -1;
  1270. }
  1271. if (pad) {
  1272. open_packet(req, type);
  1273. memcpy(req->out_pos, str + len - rest, rest);
  1274. req->out_pos += rest;
  1275. }
  1276. }
  1277. #endif
  1278. return len;
  1279. }
  1280. int fcgi_finish_request(fcgi_request *req, int force_close)
  1281. {
  1282. int ret = 1;
  1283. if (req->fd >= 0) {
  1284. if (!req->closed) {
  1285. ret = fcgi_flush(req, 1);
  1286. req->closed = 1;
  1287. }
  1288. fcgi_close(req, force_close, 1);
  1289. }
  1290. return ret;
  1291. }
  1292. char* fcgi_getenv(fcgi_request *req, const char* var, int var_len)
  1293. {
  1294. unsigned int val_len;
  1295. if (!req) return NULL;
  1296. return fcgi_hash_get(&req->env, FCGI_HASH_FUNC(var, var_len), (char*)var, var_len, &val_len);
  1297. }
  1298. char* fcgi_quick_getenv(fcgi_request *req, const char* var, int var_len, unsigned int hash_value)
  1299. {
  1300. unsigned int val_len;
  1301. return fcgi_hash_get(&req->env, hash_value, (char*)var, var_len, &val_len);
  1302. }
  1303. char* fcgi_putenv(fcgi_request *req, char* var, int var_len, char* val)
  1304. {
  1305. if (!req) return NULL;
  1306. if (val == NULL) {
  1307. fcgi_hash_del(&req->env, FCGI_HASH_FUNC(var, var_len), var, var_len);
  1308. return NULL;
  1309. } else {
  1310. return fcgi_hash_set(&req->env, FCGI_HASH_FUNC(var, var_len), var, var_len, val, strlen(val));
  1311. }
  1312. }
  1313. char* fcgi_quick_putenv(fcgi_request *req, char* var, int var_len, unsigned int hash_value, char* val)
  1314. {
  1315. if (val == NULL) {
  1316. fcgi_hash_del(&req->env, hash_value, var, var_len);
  1317. return NULL;
  1318. } else {
  1319. return fcgi_hash_set(&req->env, hash_value, var, var_len, val, strlen(val));
  1320. }
  1321. }
  1322. void fcgi_loadenv(fcgi_request *req, fcgi_apply_func func, zval *array TSRMLS_DC)
  1323. {
  1324. fcgi_hash_apply(&req->env, func, array TSRMLS_CC);
  1325. }
  1326. #ifdef _WIN32
  1327. void fcgi_impersonate(void)
  1328. {
  1329. char *os_name;
  1330. os_name = getenv("OS");
  1331. if (os_name && stricmp(os_name, "Windows_NT") == 0) {
  1332. is_impersonate = 1;
  1333. }
  1334. }
  1335. #endif
  1336. void fcgi_set_mgmt_var(const char * name, size_t name_len, const char * value, size_t value_len)
  1337. {
  1338. zval * zvalue;
  1339. zvalue = pemalloc(sizeof(*zvalue), 1);
  1340. Z_TYPE_P(zvalue) = IS_STRING;
  1341. Z_STRVAL_P(zvalue) = pestrndup(value, value_len, 1);
  1342. Z_STRLEN_P(zvalue) = value_len;
  1343. zend_hash_add(&fcgi_mgmt_vars, name, name_len, &zvalue, sizeof(zvalue), NULL);
  1344. }
  1345. void fcgi_free_mgmt_var_cb(void * ptr)
  1346. {
  1347. zval ** var = (zval **)ptr;
  1348. pefree(Z_STRVAL_PP(var), 1);
  1349. pefree(*var, 1);
  1350. }
  1351. /*
  1352. * Local variables:
  1353. * tab-width: 4
  1354. * c-basic-offset: 4
  1355. * End:
  1356. * vim600: sw=4 ts=4 fdm=marker
  1357. * vim<600: sw=4 ts=4
  1358. */