1 /* Licensed to the Apache Software Foundation (ASF) under one or more
2 * contributor license agreements. See the NOTICE file distributed with
3 * this work for additional information regarding copyright ownership.
4 * The ASF licenses this file to You under the Apache License, Version 2.0
5 * (the "License"); you may not use this file except in compliance with
6 * the License. You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include "apr_arch_networkio.h"
18 #include "apr_network_io.h"
19 #include "apr_strings.h"
20 #include "apr_support.h"
21 #include "apr_portable.h"
22 #include "apr_arch_inherit.h"
26 #define close closesocket
29 static char generic_inaddr_any[16] = {0}; /* big enough for IPv4 or IPv6 */
31 static apr_status_t socket_cleanup(void *sock)
33 apr_socket_t *thesocket = sock;
34 int sd = thesocket->socketdes;
36 /* Set socket descriptor to -1 before close(), so that there is no
37 * chance of returning an already closed FD from apr_os_sock_get().
39 thesocket->socketdes = -1;
45 /* Restore, close() was not successful. */
46 thesocket->socketdes = sd;
52 static void set_socket_vars(apr_socket_t *sock, int family, int type, int protocol)
55 sock->protocol = protocol;
56 apr_sockaddr_vars_set(sock->local_addr, family, 0);
57 apr_sockaddr_vars_set(sock->remote_addr, family, 0);
59 #if defined(BEOS) && !defined(BEOS_BONE)
60 /* BeOS pre-BONE has TCP_NODELAY on by default and it can't be
63 sock->options |= APR_TCP_NODELAY;
67 static void alloc_socket(apr_socket_t **new, apr_pool_t *p)
69 *new = (apr_socket_t *)apr_pcalloc(p, sizeof(apr_socket_t));
71 (*new)->local_addr = (apr_sockaddr_t *)apr_pcalloc((*new)->pool,
72 sizeof(apr_sockaddr_t));
73 (*new)->local_addr->pool = p;
74 (*new)->remote_addr = (apr_sockaddr_t *)apr_pcalloc((*new)->pool,
75 sizeof(apr_sockaddr_t));
76 (*new)->remote_addr->pool = p;
77 (*new)->remote_addr_unknown = 1;
78 #ifndef WAITIO_USES_POLL
79 /* Create a pollset with room for one descriptor. */
80 /* ### check return codes */
81 (void) apr_pollset_create(&(*new)->pollset, 1, p, 0);
85 apr_status_t apr_socket_protocol_get(apr_socket_t *sock, int *protocol)
87 *protocol = sock->protocol;
91 apr_status_t apr_socket_create(apr_socket_t **new, int ofamily, int type,
92 int protocol, apr_pool_t *cont)
94 int family = ofamily, flags = 0;
96 #ifdef HAVE_SOCK_CLOEXEC
97 flags |= SOCK_CLOEXEC;
100 if (family == APR_UNSPEC) {
108 alloc_socket(new, cont);
111 (*new)->socketdes = socket(family, type|flags, protocol);
113 /* For some reason BeOS R5 has an unconventional protocol numbering,
114 * so we need to translate here. */
117 (*new)->socketdes = socket(family, type|flags, 0);
120 (*new)->socketdes = socket(family, type|flags, IPPROTO_TCP);
123 (*new)->socketdes = socket(family, type|flags, IPPROTO_UDP);
127 errno = EPROTONOSUPPORT;
128 (*new)->socketdes = -1;
134 if ((*new)->socketdes < 0 && ofamily == APR_UNSPEC) {
136 (*new)->socketdes = socket(family, type|flags, protocol);
140 if ((*new)->socketdes < 0) {
143 set_socket_vars(*new, family, type, protocol);
145 #ifndef HAVE_SOCK_CLOEXEC
149 if ((flags = fcntl((*new)->socketdes, F_GETFD)) == -1)
153 if (fcntl((*new)->socketdes, F_SETFD, flags) == -1)
158 (*new)->timeout = -1;
160 apr_pool_cleanup_register((*new)->pool, (void *)(*new), socket_cleanup,
166 apr_status_t apr_socket_shutdown(apr_socket_t *thesocket,
167 apr_shutdown_how_e how)
169 return (shutdown(thesocket->socketdes, how) == -1) ? errno : APR_SUCCESS;
172 apr_status_t apr_socket_close(apr_socket_t *thesocket)
174 return apr_pool_cleanup_run(thesocket->pool, thesocket, socket_cleanup);
177 apr_status_t apr_socket_bind(apr_socket_t *sock, apr_sockaddr_t *sa)
179 if (bind(sock->socketdes,
180 (struct sockaddr *)&sa->sa, sa->salen) == -1) {
184 sock->local_addr = sa;
185 /* XXX IPv6 - this assumes sin_port and sin6_port at same offset */
186 if (sock->local_addr->sa.sin.sin_port == 0) { /* no need for ntohs() when comparing w/ 0 */
187 sock->local_port_unknown = 1; /* kernel got us an ephemeral port */
193 apr_status_t apr_socket_listen(apr_socket_t *sock, apr_int32_t backlog)
195 if (listen(sock->socketdes, backlog) == -1)
201 apr_status_t apr_socket_accept(apr_socket_t **new, apr_socket_t *sock,
202 apr_pool_t *connection_context)
207 sa.salen = sizeof(sa.sa);
211 int flags = SOCK_CLOEXEC;
213 #if defined(SOCK_NONBLOCK) && APR_O_NONBLOCK_INHERITED
214 /* With FreeBSD accept4() (avail in 10+), O_NONBLOCK is not inherited
215 * (unlike Linux). Mimic the accept() behavior here in a way that
216 * may help other platforms.
218 if (apr_is_option_set(sock, APR_SO_NONBLOCK) == 1) {
219 flags |= SOCK_NONBLOCK;
222 s = accept4(sock->socketdes, (struct sockaddr *)&sa.sa, &sa.salen, flags);
225 s = accept(sock->socketdes, (struct sockaddr *)&sa.sa, &sa.salen);
233 /* 0 is an invalid socket for TPF */
237 alloc_socket(new, connection_context);
239 /* Set up socket variables -- note that it may be possible for
240 * *new to be an AF_INET socket when sock is AF_INET6 in some
241 * dual-stack configurations, so ensure that the remote_/local_addr
242 * structures are adjusted for the family of the accepted
244 set_socket_vars(*new, sa.sa.sin.sin_family, SOCK_STREAM, sock->protocol);
247 (*new)->connected = 1;
249 (*new)->timeout = -1;
251 (*new)->remote_addr_unknown = 0;
253 (*new)->socketdes = s;
255 /* Copy in peer's address. */
256 (*new)->remote_addr->sa = sa.sa;
257 (*new)->remote_addr->salen = sa.salen;
259 *(*new)->local_addr = *sock->local_addr;
261 /* The above assignment just overwrote the pool entry. Setting the local_addr
262 pool for the accepted socket back to what it should be. Otherwise all
263 allocations for this socket will come from a server pool that is not
264 freed until the process goes down.*/
265 (*new)->local_addr->pool = connection_context;
267 /* fix up any pointers which are no longer valid */
268 if (sock->local_addr->sa.sin.sin_family == AF_INET) {
269 (*new)->local_addr->ipaddr_ptr = &(*new)->local_addr->sa.sin.sin_addr;
272 else if (sock->local_addr->sa.sin.sin_family == AF_INET6) {
273 (*new)->local_addr->ipaddr_ptr = &(*new)->local_addr->sa.sin6.sin6_addr;
276 (*new)->remote_addr->port = ntohs((*new)->remote_addr->sa.sin.sin_port);
277 if (sock->local_port_unknown) {
278 /* not likely for a listening socket, but theoretically possible :) */
279 (*new)->local_port_unknown = 1;
282 #if APR_TCP_NODELAY_INHERITED
283 if (apr_is_option_set(sock, APR_TCP_NODELAY) == 1) {
284 apr_set_option(*new, APR_TCP_NODELAY, 1);
286 #endif /* TCP_NODELAY_INHERITED */
287 #if APR_O_NONBLOCK_INHERITED
288 if (apr_is_option_set(sock, APR_SO_NONBLOCK) == 1) {
289 apr_set_option(*new, APR_SO_NONBLOCK, 1);
291 #endif /* APR_O_NONBLOCK_INHERITED */
293 if (sock->local_interface_unknown ||
294 !memcmp(sock->local_addr->ipaddr_ptr,
296 sock->local_addr->ipaddr_len)) {
297 /* If the interface address inside the listening socket's local_addr wasn't
298 * up-to-date, we don't know local interface of the connected socket either.
300 * If the listening socket was not bound to a specific interface, we
301 * don't know the local_addr of the connected socket.
303 (*new)->local_interface_unknown = 1;
310 if ((flags = fcntl((*new)->socketdes, F_GETFD)) == -1)
314 if (fcntl((*new)->socketdes, F_SETFD, flags) == -1)
320 apr_pool_cleanup_register((*new)->pool, (void *)(*new), socket_cleanup,
325 apr_status_t apr_socket_connect(apr_socket_t *sock, apr_sockaddr_t *sa)
330 rc = connect(sock->socketdes,
331 (const struct sockaddr *)&sa->sa.sin,
333 } while (rc == -1 && errno == EINTR);
335 /* we can see EINPROGRESS the first time connect is called on a non-blocking
336 * socket; if called again, we can see EALREADY
338 if ((rc == -1) && (errno == EINPROGRESS || errno == EALREADY)
339 && (sock->timeout > 0)) {
340 rc = apr_wait_for_io_or_timeout(NULL, sock, 0);
341 if (rc != APR_SUCCESS) {
348 apr_socklen_t len = sizeof(error);
349 if ((rc = getsockopt(sock->socketdes, SOL_SOCKET, SO_ERROR,
350 (char *)&error, &len)) < 0) {
357 #endif /* SO_ERROR */
361 if (memcmp(sa->ipaddr_ptr, generic_inaddr_any, sa->ipaddr_len)) {
362 /* A real remote address was passed in. If the unspecified
363 * address was used, the actual remote addr will have to be
364 * determined using getpeername() if required. */
365 sock->remote_addr_unknown = 0;
367 /* Copy the address structure details in. */
368 sock->remote_addr->sa = sa->sa;
369 sock->remote_addr->salen = sa->salen;
370 /* Adjust ipaddr_ptr et al. */
371 apr_sockaddr_vars_set(sock->remote_addr, sa->family, sa->port);
374 if (sock->local_addr->port == 0) {
375 /* connect() got us an ephemeral port */
376 sock->local_port_unknown = 1;
378 if (!memcmp(sock->local_addr->ipaddr_ptr,
380 sock->local_addr->ipaddr_len)) {
381 /* not bound to specific local interface; connect() had to assign
384 sock->local_interface_unknown = 1;
387 if (rc == -1 && errno != EISCONN) {
397 apr_status_t apr_socket_type_get(apr_socket_t *sock, int *type)
403 apr_status_t apr_socket_data_get(void **data, const char *key, apr_socket_t *sock)
405 sock_userdata_t *cur = sock->userdata;
410 if (!strcmp(cur->key, key)) {
420 apr_status_t apr_socket_data_set(apr_socket_t *sock, void *data, const char *key,
421 apr_status_t (*cleanup) (void *))
423 sock_userdata_t *new = apr_palloc(sock->pool, sizeof(sock_userdata_t));
425 new->key = apr_pstrdup(sock->pool, key);
427 new->next = sock->userdata;
428 sock->userdata = new;
431 apr_pool_cleanup_register(sock->pool, data, cleanup, cleanup);
437 apr_status_t apr_os_sock_get(apr_os_sock_t *thesock, apr_socket_t *sock)
439 *thesock = sock->socketdes;
443 apr_status_t apr_os_sock_make(apr_socket_t **apr_sock,
444 apr_os_sock_info_t *os_sock_info,
447 alloc_socket(apr_sock, cont);
448 set_socket_vars(*apr_sock, os_sock_info->family, os_sock_info->type, os_sock_info->protocol);
449 (*apr_sock)->timeout = -1;
450 (*apr_sock)->socketdes = *os_sock_info->os_sock;
451 if (os_sock_info->local) {
452 memcpy(&(*apr_sock)->local_addr->sa.sin,
454 (*apr_sock)->local_addr->salen);
455 /* XXX IPv6 - this assumes sin_port and sin6_port at same offset */
456 (*apr_sock)->local_addr->port = ntohs((*apr_sock)->local_addr->sa.sin.sin_port);
459 (*apr_sock)->local_port_unknown = (*apr_sock)->local_interface_unknown = 1;
461 if (os_sock_info->remote) {
463 (*apr_sock)->connected = 1;
465 memcpy(&(*apr_sock)->remote_addr->sa.sin,
466 os_sock_info->remote,
467 (*apr_sock)->remote_addr->salen);
468 /* XXX IPv6 - this assumes sin_port and sin6_port at same offset */
469 (*apr_sock)->remote_addr->port = ntohs((*apr_sock)->remote_addr->sa.sin.sin_port);
472 (*apr_sock)->remote_addr_unknown = 1;
475 (*apr_sock)->inherit = 0;
476 apr_pool_cleanup_register((*apr_sock)->pool, (void *)(*apr_sock),
477 socket_cleanup, socket_cleanup);
481 apr_status_t apr_os_sock_put(apr_socket_t **sock, apr_os_sock_t *thesock,
484 /* XXX Bogus assumption that *sock points at anything legit */
485 if ((*sock) == NULL) {
486 alloc_socket(sock, cont);
487 /* XXX IPv6 figure out the family here! */
488 /* XXX figure out the actual socket type here */
489 /* *or* just decide that apr_os_sock_put() has to be told the family and type */
490 set_socket_vars(*sock, APR_INET, SOCK_STREAM, 0);
491 (*sock)->timeout = -1;
493 (*sock)->local_port_unknown = (*sock)->local_interface_unknown = 1;
494 (*sock)->remote_addr_unknown = 1;
495 (*sock)->socketdes = *thesock;
499 APR_POOL_IMPLEMENT_ACCESSOR(socket)
501 APR_IMPLEMENT_INHERIT_SET(socket, inherit, pool, socket_cleanup)
503 APR_IMPLEMENT_INHERIT_UNSET(socket, inherit, pool, socket_cleanup)