1 /* Licensed to the Apache Software Foundation (ASF) under one or more
2 * contributor license agreements. See the NOTICE file distributed with
3 * this work for additional information regarding copyright ownership.
4 * The ASF licenses this file to You under the Apache License, Version 2.0
5 * (the "License"); you may not use this file except in compliance with
6 * the License. You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include "apr_arch_networkio.h"
18 #include "apr_network_io.h"
19 #include "apr_strings.h"
20 #include "apr_support.h"
21 #include "apr_portable.h"
22 #include "apr_arch_inherit.h"
26 #define close closesocket
29 static char generic_inaddr_any[16] = {0}; /* big enough for IPv4 or IPv6 */
31 static apr_status_t socket_cleanup(void *sock)
33 apr_socket_t *thesocket = sock;
34 int sd = thesocket->socketdes;
36 /* Set socket descriptor to -1 before close(), so that there is no
37 * chance of returning an already closed FD from apr_os_sock_get().
39 thesocket->socketdes = -1;
45 /* Restore, close() was not successful. */
46 thesocket->socketdes = sd;
52 static void set_socket_vars(apr_socket_t *sock, int family, int type, int protocol)
55 sock->protocol = protocol;
56 apr_sockaddr_vars_set(sock->local_addr, family, 0);
57 apr_sockaddr_vars_set(sock->remote_addr, family, 0);
59 #if defined(BEOS) && !defined(BEOS_BONE)
60 /* BeOS pre-BONE has TCP_NODELAY on by default and it can't be
63 sock->options |= APR_TCP_NODELAY;
67 static void alloc_socket(apr_socket_t **new, apr_pool_t *p)
69 *new = (apr_socket_t *)apr_pcalloc(p, sizeof(apr_socket_t));
71 (*new)->local_addr = (apr_sockaddr_t *)apr_pcalloc((*new)->pool,
72 sizeof(apr_sockaddr_t));
73 (*new)->local_addr->pool = p;
74 (*new)->remote_addr = (apr_sockaddr_t *)apr_pcalloc((*new)->pool,
75 sizeof(apr_sockaddr_t));
76 (*new)->remote_addr->pool = p;
77 (*new)->remote_addr_unknown = 1;
78 #ifndef WAITIO_USES_POLL
79 /* Create a pollset with room for one descriptor. */
80 /* ### check return codes */
81 (void) apr_pollset_create(&(*new)->pollset, 1, p, 0);
85 apr_status_t apr_socket_protocol_get(apr_socket_t *sock, int *protocol)
87 *protocol = sock->protocol;
91 apr_status_t apr_socket_create(apr_socket_t **new, int ofamily, int type,
92 int protocol, apr_pool_t *cont)
94 int family = ofamily, flags = 0;
96 #ifdef HAVE_SOCK_CLOEXEC
97 flags |= SOCK_CLOEXEC;
100 if (family == APR_UNSPEC) {
108 alloc_socket(new, cont);
111 (*new)->socketdes = socket(family, type|flags, protocol);
113 /* For some reason BeOS R5 has an unconventional protocol numbering,
114 * so we need to translate here. */
117 (*new)->socketdes = socket(family, type|flags, 0);
120 (*new)->socketdes = socket(family, type|flags, IPPROTO_TCP);
123 (*new)->socketdes = socket(family, type|flags, IPPROTO_UDP);
127 errno = EPROTONOSUPPORT;
128 (*new)->socketdes = -1;
134 if ((*new)->socketdes < 0 && ofamily == APR_UNSPEC) {
136 (*new)->socketdes = socket(family, type|flags, protocol);
140 if ((*new)->socketdes < 0) {
143 set_socket_vars(*new, family, type, protocol);
145 #ifndef HAVE_SOCK_CLOEXEC
150 if ((flags = fcntl((*new)->socketdes, F_GETFD)) == -1) {
152 close((*new)->socketdes);
153 (*new)->socketdes = -1;
158 if (fcntl((*new)->socketdes, F_SETFD, flags) == -1) {
160 close((*new)->socketdes);
161 (*new)->socketdes = -1;
167 (*new)->timeout = -1;
169 apr_pool_cleanup_register((*new)->pool, (void *)(*new), socket_cleanup,
175 apr_status_t apr_socket_shutdown(apr_socket_t *thesocket,
176 apr_shutdown_how_e how)
178 return (shutdown(thesocket->socketdes, how) == -1) ? errno : APR_SUCCESS;
181 apr_status_t apr_socket_close(apr_socket_t *thesocket)
183 return apr_pool_cleanup_run(thesocket->pool, thesocket, socket_cleanup);
186 apr_status_t apr_socket_bind(apr_socket_t *sock, apr_sockaddr_t *sa)
188 if (bind(sock->socketdes,
189 (struct sockaddr *)&sa->sa, sa->salen) == -1) {
193 sock->local_addr = sa;
194 /* XXX IPv6 - this assumes sin_port and sin6_port at same offset */
195 if (sock->local_addr->sa.sin.sin_port == 0) { /* no need for ntohs() when comparing w/ 0 */
196 sock->local_port_unknown = 1; /* kernel got us an ephemeral port */
202 apr_status_t apr_socket_listen(apr_socket_t *sock, apr_int32_t backlog)
204 if (listen(sock->socketdes, backlog) == -1)
210 apr_status_t apr_socket_accept(apr_socket_t **new, apr_socket_t *sock,
211 apr_pool_t *connection_context)
216 sa.salen = sizeof(sa.sa);
220 int flags = SOCK_CLOEXEC;
222 #if defined(SOCK_NONBLOCK) && APR_O_NONBLOCK_INHERITED
223 /* With FreeBSD accept4() (avail in 10+), O_NONBLOCK is not inherited
224 * (unlike Linux). Mimic the accept() behavior here in a way that
225 * may help other platforms.
227 if (apr_is_option_set(sock, APR_SO_NONBLOCK) == 1) {
228 flags |= SOCK_NONBLOCK;
231 s = accept4(sock->socketdes, (struct sockaddr *)&sa.sa, &sa.salen, flags);
234 s = accept(sock->socketdes, (struct sockaddr *)&sa.sa, &sa.salen);
242 /* 0 is an invalid socket for TPF */
246 alloc_socket(new, connection_context);
248 /* Set up socket variables -- note that it may be possible for
249 * *new to be an AF_INET socket when sock is AF_INET6 in some
250 * dual-stack configurations, so ensure that the remote_/local_addr
251 * structures are adjusted for the family of the accepted
253 set_socket_vars(*new, sa.sa.sin.sin_family, SOCK_STREAM, sock->protocol);
256 (*new)->connected = 1;
258 (*new)->timeout = -1;
260 (*new)->remote_addr_unknown = 0;
262 (*new)->socketdes = s;
264 /* Copy in peer's address. */
265 (*new)->remote_addr->sa = sa.sa;
266 (*new)->remote_addr->salen = sa.salen;
268 *(*new)->local_addr = *sock->local_addr;
270 /* The above assignment just overwrote the pool entry. Setting the local_addr
271 pool for the accepted socket back to what it should be. Otherwise all
272 allocations for this socket will come from a server pool that is not
273 freed until the process goes down.*/
274 (*new)->local_addr->pool = connection_context;
276 /* fix up any pointers which are no longer valid */
277 if (sock->local_addr->sa.sin.sin_family == AF_INET) {
278 (*new)->local_addr->ipaddr_ptr = &(*new)->local_addr->sa.sin.sin_addr;
281 else if (sock->local_addr->sa.sin.sin_family == AF_INET6) {
282 (*new)->local_addr->ipaddr_ptr = &(*new)->local_addr->sa.sin6.sin6_addr;
285 (*new)->remote_addr->port = ntohs((*new)->remote_addr->sa.sin.sin_port);
286 if (sock->local_port_unknown) {
287 /* not likely for a listening socket, but theoretically possible :) */
288 (*new)->local_port_unknown = 1;
291 #if APR_TCP_NODELAY_INHERITED
292 if (apr_is_option_set(sock, APR_TCP_NODELAY) == 1) {
293 apr_set_option(*new, APR_TCP_NODELAY, 1);
295 #endif /* TCP_NODELAY_INHERITED */
296 #if APR_O_NONBLOCK_INHERITED
297 if (apr_is_option_set(sock, APR_SO_NONBLOCK) == 1) {
298 apr_set_option(*new, APR_SO_NONBLOCK, 1);
300 #endif /* APR_O_NONBLOCK_INHERITED */
302 if (sock->local_interface_unknown ||
303 !memcmp(sock->local_addr->ipaddr_ptr,
305 sock->local_addr->ipaddr_len)) {
306 /* If the interface address inside the listening socket's local_addr wasn't
307 * up-to-date, we don't know local interface of the connected socket either.
309 * If the listening socket was not bound to a specific interface, we
310 * don't know the local_addr of the connected socket.
312 (*new)->local_interface_unknown = 1;
320 if ((flags = fcntl((*new)->socketdes, F_GETFD)) == -1) {
322 close((*new)->socketdes);
323 (*new)->socketdes = -1;
328 if (fcntl((*new)->socketdes, F_SETFD, flags) == -1) {
330 close((*new)->socketdes);
331 (*new)->socketdes = -1;
338 apr_pool_cleanup_register((*new)->pool, (void *)(*new), socket_cleanup,
343 apr_status_t apr_socket_connect(apr_socket_t *sock, apr_sockaddr_t *sa)
348 rc = connect(sock->socketdes,
349 (const struct sockaddr *)&sa->sa.sin,
351 } while (rc == -1 && errno == EINTR);
353 /* we can see EINPROGRESS the first time connect is called on a non-blocking
354 * socket; if called again, we can see EALREADY
356 if ((rc == -1) && (errno == EINPROGRESS || errno == EALREADY)
357 && (sock->timeout > 0)) {
358 rc = apr_wait_for_io_or_timeout(NULL, sock, 0);
359 if (rc != APR_SUCCESS) {
366 apr_socklen_t len = sizeof(error);
367 if ((rc = getsockopt(sock->socketdes, SOL_SOCKET, SO_ERROR,
368 (char *)&error, &len)) < 0) {
375 #endif /* SO_ERROR */
379 if (memcmp(sa->ipaddr_ptr, generic_inaddr_any, sa->ipaddr_len)) {
380 /* A real remote address was passed in. If the unspecified
381 * address was used, the actual remote addr will have to be
382 * determined using getpeername() if required. */
383 sock->remote_addr_unknown = 0;
385 /* Copy the address structure details in. */
386 sock->remote_addr->sa = sa->sa;
387 sock->remote_addr->salen = sa->salen;
388 /* Adjust ipaddr_ptr et al. */
389 apr_sockaddr_vars_set(sock->remote_addr, sa->family, sa->port);
392 if (sock->local_addr->port == 0) {
393 /* connect() got us an ephemeral port */
394 sock->local_port_unknown = 1;
396 if (!memcmp(sock->local_addr->ipaddr_ptr,
398 sock->local_addr->ipaddr_len)) {
399 /* not bound to specific local interface; connect() had to assign
402 sock->local_interface_unknown = 1;
405 if (rc == -1 && errno != EISCONN) {
415 apr_status_t apr_socket_type_get(apr_socket_t *sock, int *type)
421 apr_status_t apr_socket_data_get(void **data, const char *key, apr_socket_t *sock)
423 sock_userdata_t *cur = sock->userdata;
428 if (!strcmp(cur->key, key)) {
438 apr_status_t apr_socket_data_set(apr_socket_t *sock, void *data, const char *key,
439 apr_status_t (*cleanup) (void *))
441 sock_userdata_t *new = apr_palloc(sock->pool, sizeof(sock_userdata_t));
443 new->key = apr_pstrdup(sock->pool, key);
445 new->next = sock->userdata;
446 sock->userdata = new;
449 apr_pool_cleanup_register(sock->pool, data, cleanup, cleanup);
455 apr_status_t apr_os_sock_get(apr_os_sock_t *thesock, apr_socket_t *sock)
457 *thesock = sock->socketdes;
461 apr_status_t apr_os_sock_make(apr_socket_t **apr_sock,
462 apr_os_sock_info_t *os_sock_info,
465 alloc_socket(apr_sock, cont);
466 set_socket_vars(*apr_sock, os_sock_info->family, os_sock_info->type, os_sock_info->protocol);
467 (*apr_sock)->timeout = -1;
468 (*apr_sock)->socketdes = *os_sock_info->os_sock;
469 if (os_sock_info->local) {
470 memcpy(&(*apr_sock)->local_addr->sa.sin,
472 (*apr_sock)->local_addr->salen);
473 /* XXX IPv6 - this assumes sin_port and sin6_port at same offset */
474 (*apr_sock)->local_addr->port = ntohs((*apr_sock)->local_addr->sa.sin.sin_port);
477 (*apr_sock)->local_port_unknown = (*apr_sock)->local_interface_unknown = 1;
479 if (os_sock_info->remote) {
481 (*apr_sock)->connected = 1;
483 memcpy(&(*apr_sock)->remote_addr->sa.sin,
484 os_sock_info->remote,
485 (*apr_sock)->remote_addr->salen);
486 /* XXX IPv6 - this assumes sin_port and sin6_port at same offset */
487 (*apr_sock)->remote_addr->port = ntohs((*apr_sock)->remote_addr->sa.sin.sin_port);
490 (*apr_sock)->remote_addr_unknown = 1;
493 (*apr_sock)->inherit = 0;
494 apr_pool_cleanup_register((*apr_sock)->pool, (void *)(*apr_sock),
495 socket_cleanup, socket_cleanup);
499 apr_status_t apr_os_sock_put(apr_socket_t **sock, apr_os_sock_t *thesock,
502 /* XXX Bogus assumption that *sock points at anything legit */
503 if ((*sock) == NULL) {
504 alloc_socket(sock, cont);
505 /* XXX IPv6 figure out the family here! */
506 /* XXX figure out the actual socket type here */
507 /* *or* just decide that apr_os_sock_put() has to be told the family and type */
508 set_socket_vars(*sock, APR_INET, SOCK_STREAM, 0);
509 (*sock)->timeout = -1;
511 (*sock)->local_port_unknown = (*sock)->local_interface_unknown = 1;
512 (*sock)->remote_addr_unknown = 1;
513 (*sock)->socketdes = *thesock;
517 APR_POOL_IMPLEMENT_ACCESSOR(socket)
519 APR_IMPLEMENT_INHERIT_SET(socket, inherit, pool, socket_cleanup)
521 APR_IMPLEMENT_INHERIT_UNSET(socket, inherit, pool, socket_cleanup)