fastcgi.c 40 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 7 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 1997-2018 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Dmitry Stogov <dmitry@php.net> |
  16. +----------------------------------------------------------------------+
  17. */
  18. #include "php.h"
  19. #include "php_network.h"
  20. #include <string.h>
  21. #include <stdlib.h>
  22. #include <stdio.h>
  23. #include <stdarg.h>
  24. #include <errno.h>
  25. #ifndef MAXFQDNLEN
  26. #define MAXFQDNLEN 255
  27. #endif
  28. #ifdef _WIN32
  29. #include <windows.h>
  30. typedef unsigned int in_addr_t;
  31. struct sockaddr_un {
  32. short sun_family;
  33. char sun_path[MAXPATHLEN];
  34. };
  35. static HANDLE fcgi_accept_mutex = INVALID_HANDLE_VALUE;
  36. static int is_impersonate = 0;
  37. #define FCGI_LOCK(fd) \
  38. if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
  39. DWORD ret; \
  40. while ((ret = WaitForSingleObject(fcgi_accept_mutex, 1000)) == WAIT_TIMEOUT) { \
  41. if (in_shutdown) return -1; \
  42. } \
  43. if (ret == WAIT_FAILED) { \
  44. fprintf(stderr, "WaitForSingleObject() failed\n"); \
  45. return -1; \
  46. } \
  47. }
  48. #define FCGI_UNLOCK(fd) \
  49. if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
  50. ReleaseMutex(fcgi_accept_mutex); \
  51. }
  52. #else
  53. # include <sys/types.h>
  54. # include <sys/stat.h>
  55. # include <unistd.h>
  56. # include <fcntl.h>
  57. # include <sys/socket.h>
  58. # include <sys/un.h>
  59. # include <netinet/in.h>
  60. # include <netinet/tcp.h>
  61. # include <arpa/inet.h>
  62. # include <netdb.h>
  63. # include <signal.h>
  64. # if defined(HAVE_POLL_H) && defined(HAVE_POLL)
  65. # include <poll.h>
  66. # elif defined(HAVE_SYS_POLL_H) && defined(HAVE_POLL)
  67. # include <sys/poll.h>
  68. # endif
  69. # if defined(HAVE_SYS_SELECT_H)
  70. # include <sys/select.h>
  71. # endif
  72. #ifndef INADDR_NONE
  73. #define INADDR_NONE ((unsigned long) -1)
  74. #endif
  75. # ifndef HAVE_SOCKLEN_T
  76. typedef unsigned int socklen_t;
  77. # endif
  78. # ifdef USE_LOCKING
  79. # define FCGI_LOCK(fd) \
  80. do { \
  81. struct flock lock; \
  82. lock.l_type = F_WRLCK; \
  83. lock.l_start = 0; \
  84. lock.l_whence = SEEK_SET; \
  85. lock.l_len = 0; \
  86. if (fcntl(fd, F_SETLKW, &lock) != -1) { \
  87. break; \
  88. } else if (errno != EINTR || in_shutdown) { \
  89. return -1; \
  90. } \
  91. } while (1)
  92. # define FCGI_UNLOCK(fd) \
  93. do { \
  94. int orig_errno = errno; \
  95. while (1) { \
  96. struct flock lock; \
  97. lock.l_type = F_UNLCK; \
  98. lock.l_start = 0; \
  99. lock.l_whence = SEEK_SET; \
  100. lock.l_len = 0; \
  101. if (fcntl(fd, F_SETLK, &lock) != -1) { \
  102. break; \
  103. } else if (errno != EINTR) { \
  104. return -1; \
  105. } \
  106. } \
  107. errno = orig_errno; \
  108. } while (0)
  109. # else
  110. # define FCGI_LOCK(fd)
  111. # define FCGI_UNLOCK(fd)
  112. # endif
  113. #endif
  114. #include "fastcgi.h"
  115. typedef struct _fcgi_header {
  116. unsigned char version;
  117. unsigned char type;
  118. unsigned char requestIdB1;
  119. unsigned char requestIdB0;
  120. unsigned char contentLengthB1;
  121. unsigned char contentLengthB0;
  122. unsigned char paddingLength;
  123. unsigned char reserved;
  124. } fcgi_header;
  125. typedef struct _fcgi_begin_request {
  126. unsigned char roleB1;
  127. unsigned char roleB0;
  128. unsigned char flags;
  129. unsigned char reserved[5];
  130. } fcgi_begin_request;
  131. typedef struct _fcgi_begin_request_rec {
  132. fcgi_header hdr;
  133. fcgi_begin_request body;
  134. } fcgi_begin_request_rec;
  135. typedef struct _fcgi_end_request {
  136. unsigned char appStatusB3;
  137. unsigned char appStatusB2;
  138. unsigned char appStatusB1;
  139. unsigned char appStatusB0;
  140. unsigned char protocolStatus;
  141. unsigned char reserved[3];
  142. } fcgi_end_request;
  143. typedef struct _fcgi_end_request_rec {
  144. fcgi_header hdr;
  145. fcgi_end_request body;
  146. } fcgi_end_request_rec;
  147. typedef struct _fcgi_hash_bucket {
  148. unsigned int hash_value;
  149. unsigned int var_len;
  150. char *var;
  151. unsigned int val_len;
  152. char *val;
  153. struct _fcgi_hash_bucket *next;
  154. struct _fcgi_hash_bucket *list_next;
  155. } fcgi_hash_bucket;
  156. typedef struct _fcgi_hash_buckets {
  157. unsigned int idx;
  158. struct _fcgi_hash_buckets *next;
  159. struct _fcgi_hash_bucket data[FCGI_HASH_TABLE_SIZE];
  160. } fcgi_hash_buckets;
  161. typedef struct _fcgi_data_seg {
  162. char *pos;
  163. char *end;
  164. struct _fcgi_data_seg *next;
  165. char data[1];
  166. } fcgi_data_seg;
  167. typedef struct _fcgi_hash {
  168. fcgi_hash_bucket *hash_table[FCGI_HASH_TABLE_SIZE];
  169. fcgi_hash_bucket *list;
  170. fcgi_hash_buckets *buckets;
  171. fcgi_data_seg *data;
  172. } fcgi_hash;
  173. typedef struct _fcgi_req_hook fcgi_req_hook;
  174. struct _fcgi_req_hook {
  175. void(*on_accept)();
  176. void(*on_read)();
  177. void(*on_close)();
  178. };
  179. struct _fcgi_request {
  180. int listen_socket;
  181. int tcp;
  182. int fd;
  183. int id;
  184. int keep;
  185. #ifdef TCP_NODELAY
  186. int nodelay;
  187. #endif
  188. int ended;
  189. int in_len;
  190. int in_pad;
  191. fcgi_header *out_hdr;
  192. unsigned char *out_pos;
  193. unsigned char out_buf[1024*8];
  194. unsigned char reserved[sizeof(fcgi_end_request_rec)];
  195. fcgi_req_hook hook;
  196. int has_env;
  197. fcgi_hash env;
  198. };
  199. /* maybe it's better to use weak name instead */
  200. #ifndef HAVE_ATTRIBUTE_WEAK
  201. static fcgi_logger fcgi_log;
  202. #endif
  203. typedef union _sa_t {
  204. struct sockaddr sa;
  205. struct sockaddr_un sa_unix;
  206. struct sockaddr_in sa_inet;
  207. struct sockaddr_in6 sa_inet6;
  208. } sa_t;
  209. static HashTable fcgi_mgmt_vars;
  210. static int is_initialized = 0;
  211. static int is_fastcgi = 0;
  212. static int in_shutdown = 0;
  213. static sa_t *allowed_clients = NULL;
  214. static sa_t client_sa;
  215. /* hash table */
  216. static void fcgi_hash_init(fcgi_hash *h)
  217. {
  218. memset(h->hash_table, 0, sizeof(h->hash_table));
  219. h->list = NULL;
  220. h->buckets = (fcgi_hash_buckets*)malloc(sizeof(fcgi_hash_buckets));
  221. h->buckets->idx = 0;
  222. h->buckets->next = NULL;
  223. h->data = (fcgi_data_seg*)malloc(sizeof(fcgi_data_seg) - 1 + FCGI_HASH_SEG_SIZE);
  224. h->data->pos = h->data->data;
  225. h->data->end = h->data->pos + FCGI_HASH_SEG_SIZE;
  226. h->data->next = NULL;
  227. }
  228. static void fcgi_hash_destroy(fcgi_hash *h)
  229. {
  230. fcgi_hash_buckets *b;
  231. fcgi_data_seg *p;
  232. b = h->buckets;
  233. while (b) {
  234. fcgi_hash_buckets *q = b;
  235. b = b->next;
  236. free(q);
  237. }
  238. p = h->data;
  239. while (p) {
  240. fcgi_data_seg *q = p;
  241. p = p->next;
  242. free(q);
  243. }
  244. }
  245. static void fcgi_hash_clean(fcgi_hash *h)
  246. {
  247. memset(h->hash_table, 0, sizeof(h->hash_table));
  248. h->list = NULL;
  249. /* delete all bucket blocks except the first one */
  250. while (h->buckets->next) {
  251. fcgi_hash_buckets *q = h->buckets;
  252. h->buckets = h->buckets->next;
  253. free(q);
  254. }
  255. h->buckets->idx = 0;
  256. /* delete all data segments except the first one */
  257. while (h->data->next) {
  258. fcgi_data_seg *q = h->data;
  259. h->data = h->data->next;
  260. free(q);
  261. }
  262. h->data->pos = h->data->data;
  263. }
  264. static inline char* fcgi_hash_strndup(fcgi_hash *h, char *str, unsigned int str_len)
  265. {
  266. char *ret;
  267. if (UNEXPECTED(h->data->pos + str_len + 1 >= h->data->end)) {
  268. unsigned int seg_size = (str_len + 1 > FCGI_HASH_SEG_SIZE) ? str_len + 1 : FCGI_HASH_SEG_SIZE;
  269. fcgi_data_seg *p = (fcgi_data_seg*)malloc(sizeof(fcgi_data_seg) - 1 + seg_size);
  270. p->pos = p->data;
  271. p->end = p->pos + seg_size;
  272. p->next = h->data;
  273. h->data = p;
  274. }
  275. ret = h->data->pos;
  276. memcpy(ret, str, str_len);
  277. ret[str_len] = 0;
  278. h->data->pos += str_len + 1;
  279. return ret;
  280. }
  281. static char* fcgi_hash_set(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len, char *val, unsigned int val_len)
  282. {
  283. unsigned int idx = hash_value & FCGI_HASH_TABLE_MASK;
  284. fcgi_hash_bucket *p = h->hash_table[idx];
  285. while (UNEXPECTED(p != NULL)) {
  286. if (UNEXPECTED(p->hash_value == hash_value) &&
  287. p->var_len == var_len &&
  288. memcmp(p->var, var, var_len) == 0) {
  289. p->val_len = val_len;
  290. p->val = fcgi_hash_strndup(h, val, val_len);
  291. return p->val;
  292. }
  293. p = p->next;
  294. }
  295. if (UNEXPECTED(h->buckets->idx >= FCGI_HASH_TABLE_SIZE)) {
  296. fcgi_hash_buckets *b = (fcgi_hash_buckets*)malloc(sizeof(fcgi_hash_buckets));
  297. b->idx = 0;
  298. b->next = h->buckets;
  299. h->buckets = b;
  300. }
  301. p = h->buckets->data + h->buckets->idx;
  302. h->buckets->idx++;
  303. p->next = h->hash_table[idx];
  304. h->hash_table[idx] = p;
  305. p->list_next = h->list;
  306. h->list = p;
  307. p->hash_value = hash_value;
  308. p->var_len = var_len;
  309. p->var = fcgi_hash_strndup(h, var, var_len);
  310. p->val_len = val_len;
  311. p->val = fcgi_hash_strndup(h, val, val_len);
  312. return p->val;
  313. }
  314. static void fcgi_hash_del(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len)
  315. {
  316. unsigned int idx = hash_value & FCGI_HASH_TABLE_MASK;
  317. fcgi_hash_bucket **p = &h->hash_table[idx];
  318. while (*p != NULL) {
  319. if ((*p)->hash_value == hash_value &&
  320. (*p)->var_len == var_len &&
  321. memcmp((*p)->var, var, var_len) == 0) {
  322. (*p)->val = NULL; /* NULL value means deleted */
  323. (*p)->val_len = 0;
  324. *p = (*p)->next;
  325. return;
  326. }
  327. p = &(*p)->next;
  328. }
  329. }
  330. static char *fcgi_hash_get(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len, unsigned int *val_len)
  331. {
  332. unsigned int idx = hash_value & FCGI_HASH_TABLE_MASK;
  333. fcgi_hash_bucket *p = h->hash_table[idx];
  334. while (p != NULL) {
  335. if (p->hash_value == hash_value &&
  336. p->var_len == var_len &&
  337. memcmp(p->var, var, var_len) == 0) {
  338. *val_len = p->val_len;
  339. return p->val;
  340. }
  341. p = p->next;
  342. }
  343. return NULL;
  344. }
  345. static void fcgi_hash_apply(fcgi_hash *h, fcgi_apply_func func, void *arg)
  346. {
  347. fcgi_hash_bucket *p = h->list;
  348. while (p) {
  349. if (EXPECTED(p->val != NULL)) {
  350. func(p->var, p->var_len, p->val, p->val_len, arg);
  351. }
  352. p = p->list_next;
  353. }
  354. }
  355. #ifdef _WIN32
  356. static DWORD WINAPI fcgi_shutdown_thread(LPVOID arg)
  357. {
  358. HANDLE shutdown_event = (HANDLE) arg;
  359. WaitForSingleObject(shutdown_event, INFINITE);
  360. in_shutdown = 1;
  361. return 0;
  362. }
  363. #else
  364. static void fcgi_signal_handler(int signo)
  365. {
  366. if (signo == SIGUSR1 || signo == SIGTERM) {
  367. in_shutdown = 1;
  368. }
  369. }
  370. static void fcgi_setup_signals(void)
  371. {
  372. struct sigaction new_sa, old_sa;
  373. sigemptyset(&new_sa.sa_mask);
  374. new_sa.sa_flags = 0;
  375. new_sa.sa_handler = fcgi_signal_handler;
  376. sigaction(SIGUSR1, &new_sa, NULL);
  377. sigaction(SIGTERM, &new_sa, NULL);
  378. sigaction(SIGPIPE, NULL, &old_sa);
  379. if (old_sa.sa_handler == SIG_DFL) {
  380. sigaction(SIGPIPE, &new_sa, NULL);
  381. }
  382. }
  383. #endif
  384. void fcgi_set_in_shutdown(int new_value)
  385. {
  386. in_shutdown = new_value;
  387. }
  388. int fcgi_in_shutdown(void)
  389. {
  390. return in_shutdown;
  391. }
  392. void fcgi_terminate(void)
  393. {
  394. in_shutdown = 1;
  395. }
  396. void fcgi_request_set_keep(fcgi_request *req, int new_value)
  397. {
  398. req->keep = new_value;
  399. }
  400. #ifndef HAVE_ATTRIBUTE_WEAK
  401. void fcgi_set_logger(fcgi_logger lg) {
  402. fcgi_log = lg;
  403. }
  404. #else
  405. void __attribute__((weak)) fcgi_log(int type, const char *format, ...) {
  406. va_list ap;
  407. va_start(ap, format);
  408. vfprintf(stderr, format, ap);
  409. va_end(ap);
  410. }
  411. #endif
  412. int fcgi_init(void)
  413. {
  414. if (!is_initialized) {
  415. #ifndef _WIN32
  416. sa_t sa;
  417. socklen_t len = sizeof(sa);
  418. #endif
  419. zend_hash_init(&fcgi_mgmt_vars, 8, NULL, fcgi_free_mgmt_var_cb, 1);
  420. fcgi_set_mgmt_var("FCGI_MPXS_CONNS", sizeof("FCGI_MPXS_CONNS")-1, "0", sizeof("0")-1);
  421. is_initialized = 1;
  422. #ifdef _WIN32
  423. # if 0
  424. /* TODO: Support for TCP sockets */
  425. WSADATA wsaData;
  426. if (WSAStartup(MAKEWORD(2,0), &wsaData)) {
  427. fprintf(stderr, "Error starting Windows Sockets. Error: %d", WSAGetLastError());
  428. return 0;
  429. }
  430. # endif
  431. if ((GetStdHandle(STD_OUTPUT_HANDLE) == INVALID_HANDLE_VALUE) &&
  432. (GetStdHandle(STD_ERROR_HANDLE) == INVALID_HANDLE_VALUE) &&
  433. (GetStdHandle(STD_INPUT_HANDLE) != INVALID_HANDLE_VALUE)) {
  434. char *str;
  435. DWORD pipe_mode = PIPE_READMODE_BYTE | PIPE_WAIT;
  436. HANDLE pipe = GetStdHandle(STD_INPUT_HANDLE);
  437. SetNamedPipeHandleState(pipe, &pipe_mode, NULL, NULL);
  438. str = getenv("_FCGI_SHUTDOWN_EVENT_");
  439. if (str != NULL) {
  440. zend_long ev;
  441. HANDLE shutdown_event;
  442. ZEND_ATOL(ev, str);
  443. shutdown_event = (HANDLE) ev;
  444. if (!CreateThread(NULL, 0, fcgi_shutdown_thread,
  445. shutdown_event, 0, NULL)) {
  446. return -1;
  447. }
  448. }
  449. str = getenv("_FCGI_MUTEX_");
  450. if (str != NULL) {
  451. zend_long mt;
  452. ZEND_ATOL(mt, str);
  453. fcgi_accept_mutex = (HANDLE) mt;
  454. }
  455. return is_fastcgi = 1;
  456. } else {
  457. return is_fastcgi = 0;
  458. }
  459. #else
  460. errno = 0;
  461. if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) {
  462. fcgi_setup_signals();
  463. return is_fastcgi = 1;
  464. } else {
  465. return is_fastcgi = 0;
  466. }
  467. #endif
  468. }
  469. return is_fastcgi;
  470. }
  471. int fcgi_is_fastcgi(void)
  472. {
  473. if (!is_initialized) {
  474. return fcgi_init();
  475. } else {
  476. return is_fastcgi;
  477. }
  478. }
  479. void fcgi_shutdown(void)
  480. {
  481. if (is_initialized) {
  482. zend_hash_destroy(&fcgi_mgmt_vars);
  483. }
  484. is_fastcgi = 0;
  485. if (allowed_clients) {
  486. free(allowed_clients);
  487. }
  488. }
  489. #ifdef _WIN32
  490. /* Do some black magic with the NT security API.
  491. * We prepare a DACL (Discretionary Access Control List) so that
  492. * we, the creator, are allowed all access, while "Everyone Else"
  493. * is only allowed to read and write to the pipe.
  494. * This avoids security issues on shared hosts where a luser messes
  495. * with the lower-level pipe settings and screws up the FastCGI service.
  496. */
  497. static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa)
  498. {
  499. DWORD req_acl_size;
  500. char everyone_buf[32], owner_buf[32];
  501. PSID sid_everyone, sid_owner;
  502. SID_IDENTIFIER_AUTHORITY
  503. siaWorld = SECURITY_WORLD_SID_AUTHORITY,
  504. siaCreator = SECURITY_CREATOR_SID_AUTHORITY;
  505. PACL acl;
  506. sid_everyone = (PSID)&everyone_buf;
  507. sid_owner = (PSID)&owner_buf;
  508. req_acl_size = sizeof(ACL) +
  509. (2 * ((sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD)) + GetSidLengthRequired(1)));
  510. acl = malloc(req_acl_size);
  511. if (acl == NULL) {
  512. return NULL;
  513. }
  514. if (!InitializeSid(sid_everyone, &siaWorld, 1)) {
  515. goto out_fail;
  516. }
  517. *GetSidSubAuthority(sid_everyone, 0) = SECURITY_WORLD_RID;
  518. if (!InitializeSid(sid_owner, &siaCreator, 1)) {
  519. goto out_fail;
  520. }
  521. *GetSidSubAuthority(sid_owner, 0) = SECURITY_CREATOR_OWNER_RID;
  522. if (!InitializeAcl(acl, req_acl_size, ACL_REVISION)) {
  523. goto out_fail;
  524. }
  525. if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_GENERIC_READ | FILE_GENERIC_WRITE, sid_everyone)) {
  526. goto out_fail;
  527. }
  528. if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_ALL_ACCESS, sid_owner)) {
  529. goto out_fail;
  530. }
  531. if (!InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION)) {
  532. goto out_fail;
  533. }
  534. if (!SetSecurityDescriptorDacl(sd, TRUE, acl, FALSE)) {
  535. goto out_fail;
  536. }
  537. sa->lpSecurityDescriptor = sd;
  538. return acl;
  539. out_fail:
  540. free(acl);
  541. return NULL;
  542. }
  543. #endif
  544. static int is_port_number(const char *bindpath)
  545. {
  546. while (*bindpath) {
  547. if (*bindpath < '0' || *bindpath > '9') {
  548. return 0;
  549. }
  550. bindpath++;
  551. }
  552. return 1;
  553. }
  554. int fcgi_listen(const char *path, int backlog)
  555. {
  556. char *s;
  557. int tcp = 0;
  558. char host[MAXPATHLEN];
  559. short port = 0;
  560. int listen_socket;
  561. sa_t sa;
  562. socklen_t sock_len;
  563. #ifdef SO_REUSEADDR
  564. # ifdef _WIN32
  565. BOOL reuse = 1;
  566. # else
  567. int reuse = 1;
  568. # endif
  569. #endif
  570. if ((s = strchr(path, ':'))) {
  571. port = atoi(s+1);
  572. if (port != 0 && (s-path) < MAXPATHLEN) {
  573. strncpy(host, path, s-path);
  574. host[s-path] = '\0';
  575. tcp = 1;
  576. }
  577. } else if (is_port_number(path)) {
  578. port = atoi(path);
  579. if (port != 0) {
  580. host[0] = '\0';
  581. tcp = 1;
  582. }
  583. }
  584. /* Prepare socket address */
  585. if (tcp) {
  586. memset(&sa.sa_inet, 0, sizeof(sa.sa_inet));
  587. sa.sa_inet.sin_family = AF_INET;
  588. sa.sa_inet.sin_port = htons(port);
  589. sock_len = sizeof(sa.sa_inet);
  590. if (!*host || !strncmp(host, "*", sizeof("*")-1)) {
  591. sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY);
  592. } else {
  593. sa.sa_inet.sin_addr.s_addr = inet_addr(host);
  594. if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) {
  595. struct hostent *hep;
  596. if(strlen(host) > MAXFQDNLEN) {
  597. hep = NULL;
  598. } else {
  599. hep = php_network_gethostbyname(host);
  600. }
  601. if (!hep || hep->h_addrtype != AF_INET || !hep->h_addr_list[0]) {
  602. fcgi_log(FCGI_ERROR, "Cannot resolve host name '%s'!\n", host);
  603. return -1;
  604. } else if (hep->h_addr_list[1]) {
  605. fcgi_log(FCGI_ERROR, "Host '%s' has multiple addresses. You must choose one explicitly!\n", host);
  606. return -1;
  607. }
  608. sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr;
  609. }
  610. }
  611. } else {
  612. #ifdef _WIN32
  613. SECURITY_DESCRIPTOR sd;
  614. SECURITY_ATTRIBUTES saw;
  615. PACL acl;
  616. HANDLE namedPipe;
  617. memset(&sa, 0, sizeof(saw));
  618. saw.nLength = sizeof(saw);
  619. saw.bInheritHandle = FALSE;
  620. acl = prepare_named_pipe_acl(&sd, &saw);
  621. namedPipe = CreateNamedPipe(path,
  622. PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED,
  623. PIPE_TYPE_BYTE | PIPE_WAIT | PIPE_READMODE_BYTE,
  624. PIPE_UNLIMITED_INSTANCES,
  625. 8192, 8192, 0, &saw);
  626. if (namedPipe == INVALID_HANDLE_VALUE) {
  627. return -1;
  628. }
  629. listen_socket = _open_osfhandle((intptr_t)namedPipe, 0);
  630. if (!is_initialized) {
  631. fcgi_init();
  632. }
  633. is_fastcgi = 1;
  634. return listen_socket;
  635. #else
  636. size_t path_len = strlen(path);
  637. if (path_len >= sizeof(sa.sa_unix.sun_path)) {
  638. fcgi_log(FCGI_ERROR, "Listening socket's path name is too long.\n");
  639. return -1;
  640. }
  641. memset(&sa.sa_unix, 0, sizeof(sa.sa_unix));
  642. sa.sa_unix.sun_family = AF_UNIX;
  643. memcpy(sa.sa_unix.sun_path, path, path_len + 1);
  644. sock_len = (size_t)(((struct sockaddr_un *)0)->sun_path) + path_len;
  645. #ifdef HAVE_SOCKADDR_UN_SUN_LEN
  646. sa.sa_unix.sun_len = sock_len;
  647. #endif
  648. unlink(path);
  649. #endif
  650. }
  651. /* Create, bind socket and start listen on it */
  652. if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 ||
  653. #ifdef SO_REUSEADDR
  654. setsockopt(listen_socket, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, sizeof(reuse)) < 0 ||
  655. #endif
  656. bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 ||
  657. listen(listen_socket, backlog) < 0) {
  658. close(listen_socket);
  659. fcgi_log(FCGI_ERROR, "Cannot bind/listen socket - [%d] %s.\n",errno, strerror(errno));
  660. return -1;
  661. }
  662. if (!tcp) {
  663. chmod(path, 0777);
  664. } else {
  665. char *ip = getenv("FCGI_WEB_SERVER_ADDRS");
  666. char *cur, *end;
  667. int n;
  668. if (ip) {
  669. ip = strdup(ip);
  670. cur = ip;
  671. n = 0;
  672. while (*cur) {
  673. if (*cur == ',') n++;
  674. cur++;
  675. }
  676. allowed_clients = malloc(sizeof(sa_t) * (n+2));
  677. n = 0;
  678. cur = ip;
  679. while (cur) {
  680. end = strchr(cur, ',');
  681. if (end) {
  682. *end = 0;
  683. end++;
  684. }
  685. if (inet_pton(AF_INET, cur, &allowed_clients[n].sa_inet.sin_addr)>0) {
  686. allowed_clients[n].sa.sa_family = AF_INET;
  687. n++;
  688. #ifdef HAVE_IPV6
  689. } else if (inet_pton(AF_INET6, cur, &allowed_clients[n].sa_inet6.sin6_addr)>0) {
  690. allowed_clients[n].sa.sa_family = AF_INET6;
  691. n++;
  692. #endif
  693. } else {
  694. fcgi_log(FCGI_ERROR, "Wrong IP address '%s' in listen.allowed_clients", cur);
  695. }
  696. cur = end;
  697. }
  698. allowed_clients[n].sa.sa_family = 0;
  699. free(ip);
  700. if (!n) {
  701. fcgi_log(FCGI_ERROR, "There are no allowed addresses");
  702. /* don't clear allowed_clients as it will create an "open for all" security issue */
  703. }
  704. }
  705. }
  706. if (!is_initialized) {
  707. fcgi_init();
  708. }
  709. is_fastcgi = 1;
  710. #ifdef _WIN32
  711. if (tcp) {
  712. listen_socket = _open_osfhandle((intptr_t)listen_socket, 0);
  713. }
  714. #else
  715. fcgi_setup_signals();
  716. #endif
  717. return listen_socket;
  718. }
  719. void fcgi_set_allowed_clients(char *ip)
  720. {
  721. char *cur, *end;
  722. int n;
  723. if (ip) {
  724. ip = strdup(ip);
  725. cur = ip;
  726. n = 0;
  727. while (*cur) {
  728. if (*cur == ',') n++;
  729. cur++;
  730. }
  731. if (allowed_clients) free(allowed_clients);
  732. allowed_clients = malloc(sizeof(sa_t) * (n+2));
  733. n = 0;
  734. cur = ip;
  735. while (cur) {
  736. end = strchr(cur, ',');
  737. if (end) {
  738. *end = 0;
  739. end++;
  740. }
  741. if (inet_pton(AF_INET, cur, &allowed_clients[n].sa_inet.sin_addr)>0) {
  742. allowed_clients[n].sa.sa_family = AF_INET;
  743. n++;
  744. #ifdef HAVE_IPV6
  745. } else if (inet_pton(AF_INET6, cur, &allowed_clients[n].sa_inet6.sin6_addr)>0) {
  746. allowed_clients[n].sa.sa_family = AF_INET6;
  747. n++;
  748. #endif
  749. } else {
  750. fcgi_log(FCGI_ERROR, "Wrong IP address '%s' in listen.allowed_clients", cur);
  751. }
  752. cur = end;
  753. }
  754. allowed_clients[n].sa.sa_family = 0;
  755. free(ip);
  756. if (!n) {
  757. fcgi_log(FCGI_ERROR, "There are no allowed addresses");
  758. /* don't clear allowed_clients as it will create an "open for all" security issue */
  759. }
  760. }
  761. }
  762. static void fcgi_hook_dummy() {
  763. return;
  764. }
  765. fcgi_request *fcgi_init_request(int listen_socket, void(*on_accept)(), void(*on_read)(), void(*on_close)())
  766. {
  767. fcgi_request *req = calloc(1, sizeof(fcgi_request));
  768. req->listen_socket = listen_socket;
  769. req->fd = -1;
  770. req->id = -1;
  771. /*
  772. req->in_len = 0;
  773. req->in_pad = 0;
  774. req->out_hdr = NULL;
  775. #ifdef TCP_NODELAY
  776. req->nodelay = 0;
  777. #endif
  778. req->env = NULL;
  779. req->has_env = 0;
  780. */
  781. req->out_pos = req->out_buf;
  782. req->hook.on_accept = on_accept ? on_accept : fcgi_hook_dummy;
  783. req->hook.on_read = on_read ? on_read : fcgi_hook_dummy;
  784. req->hook.on_close = on_close ? on_close : fcgi_hook_dummy;
  785. #ifdef _WIN32
  786. req->tcp = !GetNamedPipeInfo((HANDLE)_get_osfhandle(req->listen_socket), NULL, NULL, NULL, NULL);
  787. #endif
  788. fcgi_hash_init(&req->env);
  789. return req;
  790. }
  791. void fcgi_destroy_request(fcgi_request *req) {
  792. fcgi_hash_destroy(&req->env);
  793. free(req);
  794. }
  795. static inline ssize_t safe_write(fcgi_request *req, const void *buf, size_t count)
  796. {
  797. int ret;
  798. size_t n = 0;
  799. do {
  800. #ifdef _WIN32
  801. size_t tmp;
  802. #endif
  803. errno = 0;
  804. #ifdef _WIN32
  805. tmp = count - n;
  806. if (!req->tcp) {
  807. unsigned int out_len = tmp > UINT_MAX ? UINT_MAX : (unsigned int)tmp;
  808. ret = write(req->fd, ((char*)buf)+n, out_len);
  809. } else {
  810. int out_len = tmp > INT_MAX ? INT_MAX : (int)tmp;
  811. ret = send(req->fd, ((char*)buf)+n, out_len, 0);
  812. if (ret <= 0) {
  813. errno = WSAGetLastError();
  814. }
  815. }
  816. #else
  817. ret = write(req->fd, ((char*)buf)+n, count-n);
  818. #endif
  819. if (ret > 0) {
  820. n += ret;
  821. } else if (ret <= 0 && errno != 0 && errno != EINTR) {
  822. return ret;
  823. }
  824. } while (n != count);
  825. return n;
  826. }
  827. static inline ssize_t safe_read(fcgi_request *req, const void *buf, size_t count)
  828. {
  829. int ret;
  830. size_t n = 0;
  831. do {
  832. #ifdef _WIN32
  833. size_t tmp;
  834. #endif
  835. errno = 0;
  836. #ifdef _WIN32
  837. tmp = count - n;
  838. if (!req->tcp) {
  839. unsigned int in_len = tmp > UINT_MAX ? UINT_MAX : (unsigned int)tmp;
  840. ret = read(req->fd, ((char*)buf)+n, in_len);
  841. } else {
  842. int in_len = tmp > INT_MAX ? INT_MAX : (int)tmp;
  843. ret = recv(req->fd, ((char*)buf)+n, in_len, 0);
  844. if (ret <= 0) {
  845. errno = WSAGetLastError();
  846. }
  847. }
  848. #else
  849. ret = read(req->fd, ((char*)buf)+n, count-n);
  850. #endif
  851. if (ret > 0) {
  852. n += ret;
  853. } else if (ret == 0 && errno == 0) {
  854. return n;
  855. } else if (ret <= 0 && errno != 0 && errno != EINTR) {
  856. return ret;
  857. }
  858. } while (n != count);
  859. return n;
  860. }
  861. static inline int fcgi_make_header(fcgi_header *hdr, fcgi_request_type type, int req_id, int len)
  862. {
  863. int pad = ((len + 7) & ~7) - len;
  864. hdr->contentLengthB0 = (unsigned char)(len & 0xff);
  865. hdr->contentLengthB1 = (unsigned char)((len >> 8) & 0xff);
  866. hdr->paddingLength = (unsigned char)pad;
  867. hdr->requestIdB0 = (unsigned char)(req_id & 0xff);
  868. hdr->requestIdB1 = (unsigned char)((req_id >> 8) & 0xff);
  869. hdr->reserved = 0;
  870. hdr->type = type;
  871. hdr->version = FCGI_VERSION_1;
  872. if (pad) {
  873. memset(((unsigned char*)hdr) + sizeof(fcgi_header) + len, 0, pad);
  874. }
  875. return pad;
  876. }
  877. static int fcgi_get_params(fcgi_request *req, unsigned char *p, unsigned char *end)
  878. {
  879. unsigned int name_len, val_len;
  880. while (p < end) {
  881. name_len = *p++;
  882. if (UNEXPECTED(name_len >= 128)) {
  883. if (UNEXPECTED(p + 3 >= end)) return 0;
  884. name_len = ((name_len & 0x7f) << 24);
  885. name_len |= (*p++ << 16);
  886. name_len |= (*p++ << 8);
  887. name_len |= *p++;
  888. }
  889. if (UNEXPECTED(p >= end)) return 0;
  890. val_len = *p++;
  891. if (UNEXPECTED(val_len >= 128)) {
  892. if (UNEXPECTED(p + 3 >= end)) return 0;
  893. val_len = ((val_len & 0x7f) << 24);
  894. val_len |= (*p++ << 16);
  895. val_len |= (*p++ << 8);
  896. val_len |= *p++;
  897. }
  898. if (UNEXPECTED(name_len + val_len > (unsigned int) (end - p))) {
  899. /* Malformated request */
  900. return 0;
  901. }
  902. fcgi_hash_set(&req->env, FCGI_HASH_FUNC(p, name_len), (char*)p, name_len, (char*)p + name_len, val_len);
  903. p += name_len + val_len;
  904. }
  905. return 1;
  906. }
  907. static int fcgi_read_request(fcgi_request *req)
  908. {
  909. fcgi_header hdr;
  910. int len, padding;
  911. unsigned char buf[FCGI_MAX_LENGTH+8];
  912. req->keep = 0;
  913. req->ended = 0;
  914. req->in_len = 0;
  915. req->out_hdr = NULL;
  916. req->out_pos = req->out_buf;
  917. if (req->has_env) {
  918. fcgi_hash_clean(&req->env);
  919. } else {
  920. req->has_env = 1;
  921. }
  922. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  923. hdr.version < FCGI_VERSION_1) {
  924. return 0;
  925. }
  926. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  927. padding = hdr.paddingLength;
  928. while (hdr.type == FCGI_STDIN && len == 0) {
  929. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  930. hdr.version < FCGI_VERSION_1) {
  931. return 0;
  932. }
  933. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  934. padding = hdr.paddingLength;
  935. }
  936. if (len + padding > FCGI_MAX_LENGTH) {
  937. return 0;
  938. }
  939. req->id = (hdr.requestIdB1 << 8) + hdr.requestIdB0;
  940. if (hdr.type == FCGI_BEGIN_REQUEST && len == sizeof(fcgi_begin_request)) {
  941. fcgi_begin_request *b;
  942. if (safe_read(req, buf, len+padding) != len+padding) {
  943. return 0;
  944. }
  945. b = (fcgi_begin_request*)buf;
  946. req->keep = (b->flags & FCGI_KEEP_CONN);
  947. #ifdef TCP_NODELAY
  948. if (req->keep && req->tcp && !req->nodelay) {
  949. # ifdef _WIN32
  950. BOOL on = 1;
  951. # else
  952. int on = 1;
  953. # endif
  954. setsockopt(req->fd, IPPROTO_TCP, TCP_NODELAY, (char*)&on, sizeof(on));
  955. req->nodelay = 1;
  956. }
  957. #endif
  958. switch ((b->roleB1 << 8) + b->roleB0) {
  959. case FCGI_RESPONDER:
  960. fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "RESPONDER", sizeof("RESPONDER")-1);
  961. break;
  962. case FCGI_AUTHORIZER:
  963. fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "AUTHORIZER", sizeof("AUTHORIZER")-1);
  964. break;
  965. case FCGI_FILTER:
  966. fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "FILTER", sizeof("FILTER")-1);
  967. break;
  968. default:
  969. return 0;
  970. }
  971. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  972. hdr.version < FCGI_VERSION_1) {
  973. return 0;
  974. }
  975. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  976. padding = hdr.paddingLength;
  977. while (hdr.type == FCGI_PARAMS && len > 0) {
  978. if (len + padding > FCGI_MAX_LENGTH) {
  979. return 0;
  980. }
  981. if (safe_read(req, buf, len+padding) != len+padding) {
  982. req->keep = 0;
  983. return 0;
  984. }
  985. if (!fcgi_get_params(req, buf, buf+len)) {
  986. req->keep = 0;
  987. return 0;
  988. }
  989. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  990. hdr.version < FCGI_VERSION_1) {
  991. req->keep = 0;
  992. return 0;
  993. }
  994. len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  995. padding = hdr.paddingLength;
  996. }
  997. } else if (hdr.type == FCGI_GET_VALUES) {
  998. unsigned char *p = buf + sizeof(fcgi_header);
  999. zval *value;
  1000. unsigned int zlen;
  1001. fcgi_hash_bucket *q;
  1002. if (safe_read(req, buf, len+padding) != len+padding) {
  1003. req->keep = 0;
  1004. return 0;
  1005. }
  1006. if (!fcgi_get_params(req, buf, buf+len)) {
  1007. req->keep = 0;
  1008. return 0;
  1009. }
  1010. q = req->env.list;
  1011. while (q != NULL) {
  1012. if ((value = zend_hash_str_find(&fcgi_mgmt_vars, q->var, q->var_len)) == NULL) {
  1013. q = q->list_next;
  1014. continue;
  1015. }
  1016. zlen = (unsigned int)Z_STRLEN_P(value);
  1017. if ((p + 4 + 4 + q->var_len + zlen) >= (buf + sizeof(buf))) {
  1018. break;
  1019. }
  1020. if (q->var_len < 0x80) {
  1021. *p++ = q->var_len;
  1022. } else {
  1023. *p++ = ((q->var_len >> 24) & 0xff) | 0x80;
  1024. *p++ = (q->var_len >> 16) & 0xff;
  1025. *p++ = (q->var_len >> 8) & 0xff;
  1026. *p++ = q->var_len & 0xff;
  1027. }
  1028. if (zlen < 0x80) {
  1029. *p++ = zlen;
  1030. } else {
  1031. *p++ = ((zlen >> 24) & 0xff) | 0x80;
  1032. *p++ = (zlen >> 16) & 0xff;
  1033. *p++ = (zlen >> 8) & 0xff;
  1034. *p++ = zlen & 0xff;
  1035. }
  1036. memcpy(p, q->var, q->var_len);
  1037. p += q->var_len;
  1038. memcpy(p, Z_STRVAL_P(value), zlen);
  1039. p += zlen;
  1040. q = q->list_next;
  1041. }
  1042. len = (int)(p - buf - sizeof(fcgi_header));
  1043. len += fcgi_make_header((fcgi_header*)buf, FCGI_GET_VALUES_RESULT, 0, len);
  1044. if (safe_write(req, buf, sizeof(fcgi_header) + len) != (ssize_t)sizeof(fcgi_header)+len) {
  1045. req->keep = 0;
  1046. return 0;
  1047. }
  1048. return 0;
  1049. } else {
  1050. return 0;
  1051. }
  1052. return 1;
  1053. }
  1054. int fcgi_read(fcgi_request *req, char *str, int len)
  1055. {
  1056. int ret, n, rest;
  1057. fcgi_header hdr;
  1058. unsigned char buf[255];
  1059. n = 0;
  1060. rest = len;
  1061. while (rest > 0) {
  1062. if (req->in_len == 0) {
  1063. if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
  1064. hdr.version < FCGI_VERSION_1 ||
  1065. hdr.type != FCGI_STDIN) {
  1066. req->keep = 0;
  1067. return 0;
  1068. }
  1069. req->in_len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
  1070. req->in_pad = hdr.paddingLength;
  1071. if (req->in_len == 0) {
  1072. return n;
  1073. }
  1074. }
  1075. if (req->in_len >= rest) {
  1076. ret = (int)safe_read(req, str, rest);
  1077. } else {
  1078. ret = (int)safe_read(req, str, req->in_len);
  1079. }
  1080. if (ret < 0) {
  1081. req->keep = 0;
  1082. return ret;
  1083. } else if (ret > 0) {
  1084. req->in_len -= ret;
  1085. rest -= ret;
  1086. n += ret;
  1087. str += ret;
  1088. if (req->in_len == 0) {
  1089. if (req->in_pad) {
  1090. if (safe_read(req, buf, req->in_pad) != req->in_pad) {
  1091. req->keep = 0;
  1092. return ret;
  1093. }
  1094. }
  1095. } else {
  1096. return n;
  1097. }
  1098. } else {
  1099. return n;
  1100. }
  1101. }
  1102. return n;
  1103. }
  1104. void fcgi_close(fcgi_request *req, int force, int destroy)
  1105. {
  1106. if (destroy && req->has_env) {
  1107. fcgi_hash_clean(&req->env);
  1108. req->has_env = 0;
  1109. }
  1110. #ifdef _WIN32
  1111. if (is_impersonate && !req->tcp) {
  1112. RevertToSelf();
  1113. }
  1114. #endif
  1115. if ((force || !req->keep) && req->fd >= 0) {
  1116. #ifdef _WIN32
  1117. if (!req->tcp) {
  1118. HANDLE pipe = (HANDLE)_get_osfhandle(req->fd);
  1119. if (!force) {
  1120. FlushFileBuffers(pipe);
  1121. }
  1122. DisconnectNamedPipe(pipe);
  1123. } else {
  1124. if (!force) {
  1125. char buf[8];
  1126. shutdown(req->fd, 1);
  1127. /* read any remaining data, it may be omitted */
  1128. while (recv(req->fd, buf, sizeof(buf), 0) > 0) {}
  1129. }
  1130. closesocket(req->fd);
  1131. }
  1132. #else
  1133. if (!force) {
  1134. char buf[8];
  1135. shutdown(req->fd, 1);
  1136. /* read any remaining data, it may be omitted */
  1137. while (recv(req->fd, buf, sizeof(buf), 0) > 0) {}
  1138. }
  1139. close(req->fd);
  1140. #endif
  1141. #ifdef TCP_NODELAY
  1142. req->nodelay = 0;
  1143. #endif
  1144. req->fd = -1;
  1145. req->hook.on_close();
  1146. }
  1147. }
  1148. int fcgi_is_closed(fcgi_request *req)
  1149. {
  1150. return (req->fd < 0);
  1151. }
  1152. static int fcgi_is_allowed() {
  1153. int i;
  1154. if (client_sa.sa.sa_family == AF_UNIX) {
  1155. return 1;
  1156. }
  1157. if (!allowed_clients) {
  1158. return 1;
  1159. }
  1160. if (client_sa.sa.sa_family == AF_INET) {
  1161. for (i = 0; allowed_clients[i].sa.sa_family ; i++) {
  1162. if (allowed_clients[i].sa.sa_family == AF_INET
  1163. && !memcmp(&client_sa.sa_inet.sin_addr, &allowed_clients[i].sa_inet.sin_addr, 4)) {
  1164. return 1;
  1165. }
  1166. }
  1167. }
  1168. #ifdef HAVE_IPV6
  1169. if (client_sa.sa.sa_family == AF_INET6) {
  1170. for (i = 0; allowed_clients[i].sa.sa_family ; i++) {
  1171. if (allowed_clients[i].sa.sa_family == AF_INET6
  1172. && !memcmp(&client_sa.sa_inet6.sin6_addr, &allowed_clients[i].sa_inet6.sin6_addr, 12)) {
  1173. return 1;
  1174. }
  1175. #ifdef IN6_IS_ADDR_V4MAPPED
  1176. if (allowed_clients[i].sa.sa_family == AF_INET
  1177. && IN6_IS_ADDR_V4MAPPED(&client_sa.sa_inet6.sin6_addr)
  1178. && !memcmp(((char *)&client_sa.sa_inet6.sin6_addr)+12, &allowed_clients[i].sa_inet.sin_addr, 4)) {
  1179. return 1;
  1180. }
  1181. #endif
  1182. }
  1183. }
  1184. #endif
  1185. return 0;
  1186. }
  1187. int fcgi_accept_request(fcgi_request *req)
  1188. {
  1189. #ifdef _WIN32
  1190. HANDLE pipe;
  1191. OVERLAPPED ov;
  1192. #endif
  1193. while (1) {
  1194. if (req->fd < 0) {
  1195. while (1) {
  1196. if (in_shutdown) {
  1197. return -1;
  1198. }
  1199. req->hook.on_accept();
  1200. #ifdef _WIN32
  1201. if (!req->tcp) {
  1202. pipe = (HANDLE)_get_osfhandle(req->listen_socket);
  1203. FCGI_LOCK(req->listen_socket);
  1204. ov.hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
  1205. if (!ConnectNamedPipe(pipe, &ov)) {
  1206. errno = GetLastError();
  1207. if (errno == ERROR_IO_PENDING) {
  1208. while (WaitForSingleObject(ov.hEvent, 1000) == WAIT_TIMEOUT) {
  1209. if (in_shutdown) {
  1210. CloseHandle(ov.hEvent);
  1211. FCGI_UNLOCK(req->listen_socket);
  1212. return -1;
  1213. }
  1214. }
  1215. } else if (errno != ERROR_PIPE_CONNECTED) {
  1216. }
  1217. }
  1218. CloseHandle(ov.hEvent);
  1219. req->fd = req->listen_socket;
  1220. FCGI_UNLOCK(req->listen_socket);
  1221. } else {
  1222. SOCKET listen_socket = (SOCKET)_get_osfhandle(req->listen_socket);
  1223. #else
  1224. {
  1225. int listen_socket = req->listen_socket;
  1226. #endif
  1227. sa_t sa;
  1228. socklen_t len = sizeof(sa);
  1229. FCGI_LOCK(req->listen_socket);
  1230. req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
  1231. FCGI_UNLOCK(req->listen_socket);
  1232. client_sa = sa;
  1233. if (req->fd >= 0 && !fcgi_is_allowed()) {
  1234. fcgi_log(FCGI_ERROR, "Connection disallowed: IP address '%s' has been dropped.", fcgi_get_last_client_ip());
  1235. closesocket(req->fd);
  1236. req->fd = -1;
  1237. continue;
  1238. }
  1239. }
  1240. #ifdef _WIN32
  1241. if (req->fd < 0 && (in_shutdown || errno != EINTR)) {
  1242. #else
  1243. if (req->fd < 0 && (in_shutdown || (errno != EINTR && errno != ECONNABORTED))) {
  1244. #endif
  1245. return -1;
  1246. }
  1247. #ifdef _WIN32
  1248. break;
  1249. #else
  1250. if (req->fd >= 0) {
  1251. #if defined(HAVE_POLL)
  1252. struct pollfd fds;
  1253. int ret;
  1254. fds.fd = req->fd;
  1255. fds.events = POLLIN;
  1256. fds.revents = 0;
  1257. do {
  1258. errno = 0;
  1259. ret = poll(&fds, 1, 5000);
  1260. } while (ret < 0 && errno == EINTR);
  1261. if (ret > 0 && (fds.revents & POLLIN)) {
  1262. break;
  1263. }
  1264. fcgi_close(req, 1, 0);
  1265. #else
  1266. if (req->fd < FD_SETSIZE) {
  1267. struct timeval tv = {5,0};
  1268. fd_set set;
  1269. int ret;
  1270. FD_ZERO(&set);
  1271. FD_SET(req->fd, &set);
  1272. do {
  1273. errno = 0;
  1274. ret = select(req->fd + 1, &set, NULL, NULL, &tv) >= 0;
  1275. } while (ret < 0 && errno == EINTR);
  1276. if (ret > 0 && FD_ISSET(req->fd, &set)) {
  1277. break;
  1278. }
  1279. fcgi_close(req, 1, 0);
  1280. } else {
  1281. fcgi_log(FCGI_ERROR, "Too many open file descriptors. FD_SETSIZE limit exceeded.");
  1282. fcgi_close(req, 1, 0);
  1283. }
  1284. #endif
  1285. }
  1286. #endif
  1287. }
  1288. } else if (in_shutdown) {
  1289. return -1;
  1290. }
  1291. req->hook.on_read();
  1292. if (fcgi_read_request(req)) {
  1293. #ifdef _WIN32
  1294. if (is_impersonate && !req->tcp) {
  1295. pipe = (HANDLE)_get_osfhandle(req->fd);
  1296. if (!ImpersonateNamedPipeClient(pipe)) {
  1297. fcgi_close(req, 1, 1);
  1298. continue;
  1299. }
  1300. }
  1301. #endif
  1302. return req->fd;
  1303. } else {
  1304. fcgi_close(req, 1, 1);
  1305. }
  1306. }
  1307. }
  1308. static inline fcgi_header* open_packet(fcgi_request *req, fcgi_request_type type)
  1309. {
  1310. req->out_hdr = (fcgi_header*) req->out_pos;
  1311. req->out_hdr->type = type;
  1312. req->out_pos += sizeof(fcgi_header);
  1313. return req->out_hdr;
  1314. }
  1315. static inline void close_packet(fcgi_request *req)
  1316. {
  1317. if (req->out_hdr) {
  1318. int len = (int)(req->out_pos - ((unsigned char*)req->out_hdr + sizeof(fcgi_header)));
  1319. req->out_pos += fcgi_make_header(req->out_hdr, (fcgi_request_type)req->out_hdr->type, req->id, len);
  1320. req->out_hdr = NULL;
  1321. }
  1322. }
  1323. int fcgi_flush(fcgi_request *req, int end)
  1324. {
  1325. int len;
  1326. close_packet(req);
  1327. len = (int)(req->out_pos - req->out_buf);
  1328. if (end) {
  1329. fcgi_end_request_rec *rec = (fcgi_end_request_rec*)(req->out_pos);
  1330. fcgi_make_header(&rec->hdr, FCGI_END_REQUEST, req->id, sizeof(fcgi_end_request));
  1331. rec->body.appStatusB3 = 0;
  1332. rec->body.appStatusB2 = 0;
  1333. rec->body.appStatusB1 = 0;
  1334. rec->body.appStatusB0 = 0;
  1335. rec->body.protocolStatus = FCGI_REQUEST_COMPLETE;
  1336. len += sizeof(fcgi_end_request_rec);
  1337. }
  1338. if (safe_write(req, req->out_buf, len) != len) {
  1339. req->keep = 0;
  1340. req->out_pos = req->out_buf;
  1341. return 0;
  1342. }
  1343. req->out_pos = req->out_buf;
  1344. return 1;
  1345. }
  1346. int fcgi_write(fcgi_request *req, fcgi_request_type type, const char *str, int len)
  1347. {
  1348. int limit, rest;
  1349. if (len <= 0) {
  1350. return 0;
  1351. }
  1352. if (req->out_hdr && req->out_hdr->type != type) {
  1353. close_packet(req);
  1354. }
  1355. #if 0
  1356. /* Unoptimized, but clear version */
  1357. rest = len;
  1358. while (rest > 0) {
  1359. limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
  1360. if (!req->out_hdr) {
  1361. if (limit < sizeof(fcgi_header)) {
  1362. if (!fcgi_flush(req, 0)) {
  1363. return -1;
  1364. }
  1365. }
  1366. open_packet(req, type);
  1367. }
  1368. limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
  1369. if (rest < limit) {
  1370. memcpy(req->out_pos, str, rest);
  1371. req->out_pos += rest;
  1372. return len;
  1373. } else {
  1374. memcpy(req->out_pos, str, limit);
  1375. req->out_pos += limit;
  1376. rest -= limit;
  1377. str += limit;
  1378. if (!fcgi_flush(req, 0)) {
  1379. return -1;
  1380. }
  1381. }
  1382. }
  1383. #else
  1384. /* Optimized version */
  1385. limit = (int)(sizeof(req->out_buf) - (req->out_pos - req->out_buf));
  1386. if (!req->out_hdr) {
  1387. limit -= sizeof(fcgi_header);
  1388. if (limit < 0) limit = 0;
  1389. }
  1390. if (len < limit) {
  1391. if (!req->out_hdr) {
  1392. open_packet(req, type);
  1393. }
  1394. memcpy(req->out_pos, str, len);
  1395. req->out_pos += len;
  1396. } else if (len - limit < (int)(sizeof(req->out_buf) - sizeof(fcgi_header))) {
  1397. if (!req->out_hdr) {
  1398. open_packet(req, type);
  1399. }
  1400. if (limit > 0) {
  1401. memcpy(req->out_pos, str, limit);
  1402. req->out_pos += limit;
  1403. }
  1404. if (!fcgi_flush(req, 0)) {
  1405. return -1;
  1406. }
  1407. if (len > limit) {
  1408. open_packet(req, type);
  1409. memcpy(req->out_pos, str + limit, len - limit);
  1410. req->out_pos += len - limit;
  1411. }
  1412. } else {
  1413. int pos = 0;
  1414. int pad;
  1415. close_packet(req);
  1416. while ((len - pos) > 0xffff) {
  1417. open_packet(req, type);
  1418. fcgi_make_header(req->out_hdr, type, req->id, 0xfff8);
  1419. req->out_hdr = NULL;
  1420. if (!fcgi_flush(req, 0)) {
  1421. return -1;
  1422. }
  1423. if (safe_write(req, str + pos, 0xfff8) != 0xfff8) {
  1424. req->keep = 0;
  1425. return -1;
  1426. }
  1427. pos += 0xfff8;
  1428. }
  1429. pad = (((len - pos) + 7) & ~7) - (len - pos);
  1430. rest = pad ? 8 - pad : 0;
  1431. open_packet(req, type);
  1432. fcgi_make_header(req->out_hdr, type, req->id, (len - pos) - rest);
  1433. req->out_hdr = NULL;
  1434. if (!fcgi_flush(req, 0)) {
  1435. return -1;
  1436. }
  1437. if (safe_write(req, str + pos, (len - pos) - rest) != (len - pos) - rest) {
  1438. req->keep = 0;
  1439. return -1;
  1440. }
  1441. if (pad) {
  1442. open_packet(req, type);
  1443. memcpy(req->out_pos, str + len - rest, rest);
  1444. req->out_pos += rest;
  1445. }
  1446. }
  1447. #endif
  1448. return len;
  1449. }
  1450. int fcgi_end(fcgi_request *req) {
  1451. int ret = 1;
  1452. if (!req->ended) {
  1453. ret = fcgi_flush(req, 1);
  1454. req->ended = 1;
  1455. }
  1456. return ret;
  1457. }
  1458. int fcgi_finish_request(fcgi_request *req, int force_close)
  1459. {
  1460. int ret = 1;
  1461. if (req->fd >= 0) {
  1462. ret = fcgi_end(req);
  1463. fcgi_close(req, force_close, 1);
  1464. }
  1465. return ret;
  1466. }
  1467. int fcgi_has_env(fcgi_request *req)
  1468. {
  1469. return req && req->has_env;
  1470. }
  1471. char* fcgi_getenv(fcgi_request *req, const char* var, int var_len)
  1472. {
  1473. unsigned int val_len;
  1474. if (!req) return NULL;
  1475. return fcgi_hash_get(&req->env, FCGI_HASH_FUNC(var, var_len), (char*)var, var_len, &val_len);
  1476. }
  1477. char* fcgi_quick_getenv(fcgi_request *req, const char* var, int var_len, unsigned int hash_value)
  1478. {
  1479. unsigned int val_len;
  1480. return fcgi_hash_get(&req->env, hash_value, (char*)var, var_len, &val_len);
  1481. }
  1482. char* fcgi_putenv(fcgi_request *req, char* var, int var_len, char* val)
  1483. {
  1484. if (!req) return NULL;
  1485. if (val == NULL) {
  1486. fcgi_hash_del(&req->env, FCGI_HASH_FUNC(var, var_len), var, var_len);
  1487. return NULL;
  1488. } else {
  1489. return fcgi_hash_set(&req->env, FCGI_HASH_FUNC(var, var_len), var, var_len, val, (unsigned int)strlen(val));
  1490. }
  1491. }
  1492. char* fcgi_quick_putenv(fcgi_request *req, char* var, int var_len, unsigned int hash_value, char* val)
  1493. {
  1494. if (val == NULL) {
  1495. fcgi_hash_del(&req->env, hash_value, var, var_len);
  1496. return NULL;
  1497. } else {
  1498. return fcgi_hash_set(&req->env, hash_value, var, var_len, val, (unsigned int)strlen(val));
  1499. }
  1500. }
  1501. void fcgi_loadenv(fcgi_request *req, fcgi_apply_func func, zval *array)
  1502. {
  1503. fcgi_hash_apply(&req->env, func, array);
  1504. }
  1505. #ifdef _WIN32
  1506. void fcgi_impersonate(void)
  1507. {
  1508. char *os_name;
  1509. os_name = getenv("OS");
  1510. if (os_name && stricmp(os_name, "Windows_NT") == 0) {
  1511. is_impersonate = 1;
  1512. }
  1513. }
  1514. #endif
  1515. void fcgi_set_mgmt_var(const char * name, size_t name_len, const char * value, size_t value_len)
  1516. {
  1517. zval zvalue;
  1518. zend_string *key = zend_string_init(name, name_len, 1);
  1519. ZVAL_NEW_STR(&zvalue, zend_string_init(value, value_len, 1));
  1520. GC_MAKE_PERSISTENT_LOCAL(key);
  1521. GC_MAKE_PERSISTENT_LOCAL(Z_STR(zvalue));
  1522. zend_hash_add(&fcgi_mgmt_vars, key, &zvalue);
  1523. zend_string_release_ex(key, 1);
  1524. }
  1525. void fcgi_free_mgmt_var_cb(zval *zv)
  1526. {
  1527. pefree(Z_STR_P(zv), 1);
  1528. }
  1529. const char *fcgi_get_last_client_ip()
  1530. {
  1531. static char str[INET6_ADDRSTRLEN];
  1532. /* Ipv4 */
  1533. if (client_sa.sa.sa_family == AF_INET) {
  1534. return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);
  1535. }
  1536. #ifdef HAVE_IPV6
  1537. #ifdef IN6_IS_ADDR_V4MAPPED
  1538. /* Ipv4-Mapped-Ipv6 */
  1539. if (client_sa.sa.sa_family == AF_INET6
  1540. && IN6_IS_ADDR_V4MAPPED(&client_sa.sa_inet6.sin6_addr)) {
  1541. return inet_ntop(AF_INET, ((char *)&client_sa.sa_inet6.sin6_addr)+12, str, INET6_ADDRSTRLEN);
  1542. }
  1543. #endif
  1544. /* Ipv6 */
  1545. if (client_sa.sa.sa_family == AF_INET6) {
  1546. return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet6.sin6_addr, str, INET6_ADDRSTRLEN);
  1547. }
  1548. #endif
  1549. /* Unix socket */
  1550. return NULL;
  1551. }
  1552. /*
  1553. * Local variables:
  1554. * tab-width: 4
  1555. * c-basic-offset: 4
  1556. * End:
  1557. * vim600: sw=4 ts=4 fdm=marker
  1558. * vim<600: sw=4 ts=4
  1559. */