xref: /PHP-8.1/main/fastcgi.c (revision 82eea0ef)
1 /*
2    +----------------------------------------------------------------------+
3    | Copyright (c) The PHP Group                                          |
4    +----------------------------------------------------------------------+
5    | This source file is subject to version 3.01 of the PHP license,      |
6    | that is bundled with this package in the file LICENSE, and is        |
7    | available through the world-wide-web at the following url:           |
8    | https://www.php.net/license/3_01.txt                                 |
9    | If you did not receive a copy of the PHP license and are unable to   |
10    | obtain it through the world-wide-web, please send a note to          |
11    | license@php.net so we can mail you a copy immediately.               |
12    +----------------------------------------------------------------------+
13    | Authors: Dmitry Stogov <dmitry@php.net>                              |
14    +----------------------------------------------------------------------+
15 */
16 
17 #include "php.h"
18 #include "php_network.h"
19 
20 #include <string.h>
21 #include <stdlib.h>
22 #include <stdio.h>
23 #include <stdarg.h>
24 #include <errno.h>
25 
26 #ifndef MAXFQDNLEN
27 #define MAXFQDNLEN 255
28 #endif
29 
30 #ifdef _WIN32
31 
32 #include <windows.h>
33 
34 typedef unsigned int in_addr_t;
35 
36 struct sockaddr_un {
37 	short   sun_family;
38 	char    sun_path[MAXPATHLEN];
39 };
40 
41 static HANDLE fcgi_accept_mutex = INVALID_HANDLE_VALUE;
42 static int is_impersonate = 0;
43 
44 #define FCGI_LOCK(fd) \
45 	if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
46 		DWORD ret; \
47 		while ((ret = WaitForSingleObject(fcgi_accept_mutex, 1000)) == WAIT_TIMEOUT) { \
48 			if (in_shutdown) return -1; \
49 		} \
50 		if (ret == WAIT_FAILED) { \
51 			fprintf(stderr, "WaitForSingleObject() failed\n"); \
52 			return -1; \
53 		} \
54 	}
55 
56 #define FCGI_UNLOCK(fd) \
57 	if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
58 		ReleaseMutex(fcgi_accept_mutex); \
59 	}
60 
61 #else
62 
63 # include <sys/types.h>
64 # include <sys/stat.h>
65 # include <unistd.h>
66 # include <fcntl.h>
67 # include <sys/socket.h>
68 # include <sys/un.h>
69 # include <netinet/in.h>
70 # include <netinet/tcp.h>
71 # include <arpa/inet.h>
72 # include <netdb.h>
73 # include <signal.h>
74 
75 # if defined(HAVE_POLL_H) && defined(HAVE_POLL)
76 #  include <poll.h>
77 # elif defined(HAVE_SYS_POLL_H) && defined(HAVE_POLL)
78 #  include <sys/poll.h>
79 # endif
80 # if defined(HAVE_SYS_SELECT_H)
81 #  include <sys/select.h>
82 # endif
83 
84 #ifndef INADDR_NONE
85 #define INADDR_NONE ((unsigned long) -1)
86 #endif
87 
88 # ifndef HAVE_SOCKLEN_T
89 	typedef unsigned int socklen_t;
90 # endif
91 
92 # ifdef USE_LOCKING
93 #  define FCGI_LOCK(fd)								\
94 	do {											\
95 		struct flock lock;							\
96 		lock.l_type = F_WRLCK;						\
97 		lock.l_start = 0;							\
98 		lock.l_whence = SEEK_SET;					\
99 		lock.l_len = 0;								\
100 		if (fcntl(fd, F_SETLKW, &lock) != -1) {		\
101 			break;									\
102 		} else if (errno != EINTR || in_shutdown) {	\
103 			return -1;								\
104 		}											\
105 	} while (1)
106 
107 #  define FCGI_UNLOCK(fd)							\
108 	do {											\
109 		int orig_errno = errno;						\
110 		while (1) {									\
111 			struct flock lock;						\
112 			lock.l_type = F_UNLCK;					\
113 			lock.l_start = 0;						\
114 			lock.l_whence = SEEK_SET;				\
115 			lock.l_len = 0;							\
116 			if (fcntl(fd, F_SETLK, &lock) != -1) {	\
117 				break;								\
118 			} else if (errno != EINTR) {			\
119 				return -1;							\
120 			}										\
121 		}											\
122 		errno = orig_errno;							\
123 	} while (0)
124 # else
125 #  define FCGI_LOCK(fd)
126 #  define FCGI_UNLOCK(fd)
127 # endif
128 
129 #endif
130 
131 #include "fastcgi.h"
132 
133 typedef struct _fcgi_header {
134 	unsigned char version;
135 	unsigned char type;
136 	unsigned char requestIdB1;
137 	unsigned char requestIdB0;
138 	unsigned char contentLengthB1;
139 	unsigned char contentLengthB0;
140 	unsigned char paddingLength;
141 	unsigned char reserved;
142 } fcgi_header;
143 
144 typedef struct _fcgi_begin_request {
145 	unsigned char roleB1;
146 	unsigned char roleB0;
147 	unsigned char flags;
148 	unsigned char reserved[5];
149 } fcgi_begin_request;
150 
151 typedef struct _fcgi_begin_request_rec {
152 	fcgi_header hdr;
153 	fcgi_begin_request body;
154 } fcgi_begin_request_rec;
155 
156 typedef struct _fcgi_end_request {
157 	unsigned char appStatusB3;
158 	unsigned char appStatusB2;
159 	unsigned char appStatusB1;
160 	unsigned char appStatusB0;
161 	unsigned char protocolStatus;
162 	unsigned char reserved[3];
163 } fcgi_end_request;
164 
165 typedef struct _fcgi_end_request_rec {
166 	fcgi_header hdr;
167 	fcgi_end_request body;
168 } fcgi_end_request_rec;
169 
170 typedef struct _fcgi_hash_bucket {
171 	unsigned int              hash_value;
172 	unsigned int              var_len;
173 	char                     *var;
174 	unsigned int              val_len;
175 	char                     *val;
176 	struct _fcgi_hash_bucket *next;
177 	struct _fcgi_hash_bucket *list_next;
178 } fcgi_hash_bucket;
179 
180 typedef struct _fcgi_hash_buckets {
181 	unsigned int	           idx;
182 	struct _fcgi_hash_buckets *next;
183 	struct _fcgi_hash_bucket   data[FCGI_HASH_TABLE_SIZE];
184 } fcgi_hash_buckets;
185 
186 typedef struct _fcgi_data_seg {
187 	char                  *pos;
188 	char                  *end;
189 	struct _fcgi_data_seg *next;
190 	char                   data[1];
191 } fcgi_data_seg;
192 
193 typedef struct _fcgi_hash {
194 	fcgi_hash_bucket  *hash_table[FCGI_HASH_TABLE_SIZE];
195 	fcgi_hash_bucket  *list;
196 	fcgi_hash_buckets *buckets;
197 	fcgi_data_seg     *data;
198 } fcgi_hash;
199 
200 typedef struct _fcgi_req_hook 	fcgi_req_hook;
201 
202 struct _fcgi_req_hook {
203 	void(*on_accept)(void);
204 	void(*on_read)(void);
205 	void(*on_close)(void);
206 };
207 
208 struct _fcgi_request {
209 	int            listen_socket;
210 	int            tcp;
211 	int            fd;
212 	int            id;
213 	int            keep;
214 #ifdef TCP_NODELAY
215 	int            nodelay;
216 #endif
217 	int            ended;
218 	int            in_len;
219 	int            in_pad;
220 
221 	fcgi_header   *out_hdr;
222 
223 	unsigned char *out_pos;
224 	unsigned char  out_buf[1024*8];
225 	unsigned char  reserved[sizeof(fcgi_end_request_rec)];
226 
227 	fcgi_req_hook  hook;
228 
229 	int            has_env;
230 	fcgi_hash      env;
231 };
232 
233 /* maybe it's better to use weak name instead */
234 #ifndef HAVE_ATTRIBUTE_WEAK
235 static fcgi_logger fcgi_log;
236 #endif
237 
238 typedef union _sa_t {
239 	struct sockaddr     sa;
240 	struct sockaddr_un  sa_unix;
241 	struct sockaddr_in  sa_inet;
242 	struct sockaddr_in6 sa_inet6;
243 } sa_t;
244 
245 static HashTable fcgi_mgmt_vars;
246 
247 static int is_initialized = 0;
248 static int is_fastcgi = 0;
249 static int in_shutdown = 0;
250 static sa_t *allowed_clients = NULL;
251 static sa_t client_sa;
252 
253 /* hash table */
fcgi_hash_init(fcgi_hash * h)254 static void fcgi_hash_init(fcgi_hash *h)
255 {
256 	memset(h->hash_table, 0, sizeof(h->hash_table));
257 	h->list = NULL;
258 	h->buckets = (fcgi_hash_buckets*)malloc(sizeof(fcgi_hash_buckets));
259 	h->buckets->idx = 0;
260 	h->buckets->next = NULL;
261 	h->data = (fcgi_data_seg*)malloc(sizeof(fcgi_data_seg) - 1 + FCGI_HASH_SEG_SIZE);
262 	h->data->pos = h->data->data;
263 	h->data->end = h->data->pos + FCGI_HASH_SEG_SIZE;
264 	h->data->next = NULL;
265 }
266 
fcgi_hash_destroy(fcgi_hash * h)267 static void fcgi_hash_destroy(fcgi_hash *h)
268 {
269 	fcgi_hash_buckets *b;
270 	fcgi_data_seg *p;
271 
272 	b = h->buckets;
273 	while (b) {
274 		fcgi_hash_buckets *q = b;
275 		b = b->next;
276 		free(q);
277 	}
278 	p = h->data;
279 	while (p) {
280 		fcgi_data_seg *q = p;
281 		p = p->next;
282 		free(q);
283 	}
284 }
285 
fcgi_hash_clean(fcgi_hash * h)286 static void fcgi_hash_clean(fcgi_hash *h)
287 {
288 	memset(h->hash_table, 0, sizeof(h->hash_table));
289 	h->list = NULL;
290 	/* delete all bucket blocks except the first one */
291 	while (h->buckets->next) {
292 		fcgi_hash_buckets *q = h->buckets;
293 
294 		h->buckets = h->buckets->next;
295 		free(q);
296 	}
297 	h->buckets->idx = 0;
298 	/* delete all data segments except the first one */
299 	while (h->data->next) {
300 		fcgi_data_seg *q = h->data;
301 
302 		h->data = h->data->next;
303 		free(q);
304 	}
305 	h->data->pos = h->data->data;
306 }
307 
fcgi_hash_strndup(fcgi_hash * h,char * str,unsigned int str_len)308 static inline char* fcgi_hash_strndup(fcgi_hash *h, char *str, unsigned int str_len)
309 {
310 	char *ret;
311 
312 	if (UNEXPECTED(h->data->pos + str_len + 1 >= h->data->end)) {
313 		unsigned int seg_size = (str_len + 1 > FCGI_HASH_SEG_SIZE) ? str_len + 1 : FCGI_HASH_SEG_SIZE;
314 		fcgi_data_seg *p = (fcgi_data_seg*)malloc(sizeof(fcgi_data_seg) - 1 + seg_size);
315 
316 		p->pos = p->data;
317 		p->end = p->pos + seg_size;
318 		p->next = h->data;
319 		h->data = p;
320 	}
321 	ret = h->data->pos;
322 	memcpy(ret, str, str_len);
323 	ret[str_len] = 0;
324 	h->data->pos += str_len + 1;
325 	return ret;
326 }
327 
fcgi_hash_set(fcgi_hash * h,unsigned int hash_value,char * var,unsigned int var_len,char * val,unsigned int val_len)328 static char* fcgi_hash_set(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len, char *val, unsigned int val_len)
329 {
330 	unsigned int      idx = hash_value & FCGI_HASH_TABLE_MASK;
331 	fcgi_hash_bucket *p = h->hash_table[idx];
332 
333 	while (UNEXPECTED(p != NULL)) {
334 		if (UNEXPECTED(p->hash_value == hash_value) &&
335 		    p->var_len == var_len &&
336 		    memcmp(p->var, var, var_len) == 0) {
337 
338 			p->val_len = val_len;
339 			p->val = fcgi_hash_strndup(h, val, val_len);
340 			return p->val;
341 		}
342 		p = p->next;
343 	}
344 
345 	if (UNEXPECTED(h->buckets->idx >= FCGI_HASH_TABLE_SIZE)) {
346 		fcgi_hash_buckets *b = (fcgi_hash_buckets*)malloc(sizeof(fcgi_hash_buckets));
347 		b->idx = 0;
348 		b->next = h->buckets;
349 		h->buckets = b;
350 	}
351 	p = h->buckets->data + h->buckets->idx;
352 	h->buckets->idx++;
353 	p->next = h->hash_table[idx];
354 	h->hash_table[idx] = p;
355 	p->list_next = h->list;
356 	h->list = p;
357 	p->hash_value = hash_value;
358 	p->var_len = var_len;
359 	p->var = fcgi_hash_strndup(h, var, var_len);
360 	p->val_len = val_len;
361 	p->val = fcgi_hash_strndup(h, val, val_len);
362 	return p->val;
363 }
364 
fcgi_hash_del(fcgi_hash * h,unsigned int hash_value,char * var,unsigned int var_len)365 static void fcgi_hash_del(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len)
366 {
367 	unsigned int      idx = hash_value & FCGI_HASH_TABLE_MASK;
368 	fcgi_hash_bucket **p = &h->hash_table[idx];
369 
370 	while (*p != NULL) {
371 		if ((*p)->hash_value == hash_value &&
372 		    (*p)->var_len == var_len &&
373 		    memcmp((*p)->var, var, var_len) == 0) {
374 
375 		    (*p)->val = NULL; /* NULL value means deleted */
376 		    (*p)->val_len = 0;
377 			*p = (*p)->next;
378 		    return;
379 		}
380 		p = &(*p)->next;
381 	}
382 }
383 
fcgi_hash_get(fcgi_hash * h,unsigned int hash_value,char * var,unsigned int var_len,unsigned int * val_len)384 static char *fcgi_hash_get(fcgi_hash *h, unsigned int hash_value, char *var, unsigned int var_len, unsigned int *val_len)
385 {
386 	unsigned int      idx = hash_value & FCGI_HASH_TABLE_MASK;
387 	fcgi_hash_bucket *p = h->hash_table[idx];
388 
389 	while (p != NULL) {
390 		if (p->hash_value == hash_value &&
391 		    p->var_len == var_len &&
392 		    memcmp(p->var, var, var_len) == 0) {
393 		    *val_len = p->val_len;
394 		    return p->val;
395 		}
396 		p = p->next;
397 	}
398 	return NULL;
399 }
400 
fcgi_hash_apply(fcgi_hash * h,fcgi_apply_func func,void * arg)401 static void fcgi_hash_apply(fcgi_hash *h, fcgi_apply_func func, void *arg)
402 {
403 	fcgi_hash_bucket *p	= h->list;
404 
405 	while (p) {
406 		if (EXPECTED(p->val != NULL)) {
407 			func(p->var, p->var_len, p->val, p->val_len, arg);
408 		}
409 		p = p->list_next;
410 	}
411 }
412 
413 #ifdef _WIN32
414 
fcgi_shutdown_thread(LPVOID arg)415 static DWORD WINAPI fcgi_shutdown_thread(LPVOID arg)
416 {
417 	HANDLE shutdown_event = (HANDLE) arg;
418 	WaitForSingleObject(shutdown_event, INFINITE);
419 	in_shutdown = 1;
420 	return 0;
421 }
422 
423 #else
424 
fcgi_signal_handler(int signo)425 static void fcgi_signal_handler(int signo)
426 {
427 	if (signo == SIGUSR1 || signo == SIGTERM) {
428 		in_shutdown = 1;
429 	}
430 }
431 
fcgi_setup_signals(void)432 static void fcgi_setup_signals(void)
433 {
434 	struct sigaction new_sa, old_sa;
435 
436 	sigemptyset(&new_sa.sa_mask);
437 	new_sa.sa_flags = 0;
438 	new_sa.sa_handler = fcgi_signal_handler;
439 	sigaction(SIGUSR1, &new_sa, NULL);
440 	sigaction(SIGTERM, &new_sa, NULL);
441 	sigaction(SIGPIPE, NULL, &old_sa);
442 	if (old_sa.sa_handler == SIG_DFL) {
443 		sigaction(SIGPIPE, &new_sa, NULL);
444 	}
445 }
446 #endif
447 
fcgi_set_in_shutdown(int new_value)448 void fcgi_set_in_shutdown(int new_value)
449 {
450 	in_shutdown = new_value;
451 }
452 
fcgi_in_shutdown(void)453 int fcgi_in_shutdown(void)
454 {
455 	return in_shutdown;
456 }
457 
fcgi_terminate(void)458 void fcgi_terminate(void)
459 {
460 	in_shutdown = 1;
461 }
462 
fcgi_request_set_keep(fcgi_request * req,int new_value)463 void fcgi_request_set_keep(fcgi_request *req, int new_value)
464 {
465 	req->keep = new_value;
466 }
467 
468 #ifndef HAVE_ATTRIBUTE_WEAK
fcgi_set_logger(fcgi_logger lg)469 void fcgi_set_logger(fcgi_logger lg) {
470 	fcgi_log = lg;
471 }
472 #else
fcgi_log(int type,const char * format,...)473 void __attribute__((weak)) fcgi_log(int type, const char *format, ...) {
474 	va_list ap;
475 
476 	va_start(ap, format);
477 	vfprintf(stderr, format, ap);
478 	va_end(ap);
479 }
480 #endif
481 
fcgi_init(void)482 int fcgi_init(void)
483 {
484 	if (!is_initialized) {
485 #ifndef _WIN32
486 		sa_t sa;
487 		socklen_t len = sizeof(sa);
488 #endif
489 		zend_hash_init(&fcgi_mgmt_vars, 8, NULL, fcgi_free_mgmt_var_cb, 1);
490 		fcgi_set_mgmt_var("FCGI_MPXS_CONNS", sizeof("FCGI_MPXS_CONNS")-1, "0", sizeof("0")-1);
491 
492 		is_initialized = 1;
493 #ifdef _WIN32
494 # if 0
495 		/* TODO: Support for TCP sockets */
496 		WSADATA wsaData;
497 
498 		if (WSAStartup(MAKEWORD(2,0), &wsaData)) {
499 			fprintf(stderr, "Error starting Windows Sockets.  Error: %d", WSAGetLastError());
500 			return 0;
501 		}
502 # endif
503 		if ((GetStdHandle(STD_OUTPUT_HANDLE) == INVALID_HANDLE_VALUE) &&
504 		    (GetStdHandle(STD_ERROR_HANDLE)  == INVALID_HANDLE_VALUE) &&
505 		    (GetStdHandle(STD_INPUT_HANDLE)  != INVALID_HANDLE_VALUE)) {
506 			char *str;
507 			DWORD pipe_mode = PIPE_READMODE_BYTE | PIPE_WAIT;
508 			HANDLE pipe = GetStdHandle(STD_INPUT_HANDLE);
509 
510 			SetNamedPipeHandleState(pipe, &pipe_mode, NULL, NULL);
511 
512 			str = getenv("_FCGI_SHUTDOWN_EVENT_");
513 			if (str != NULL) {
514 				zend_long ev = ZEND_ATOL(str);
515 				HANDLE shutdown_event = (HANDLE) ev;
516 				if (!CreateThread(NULL, 0, fcgi_shutdown_thread,
517 				                  shutdown_event, 0, NULL)) {
518 					return -1;
519 				}
520 			}
521 			str = getenv("_FCGI_MUTEX_");
522 			if (str != NULL) {
523 				fcgi_accept_mutex = (HANDLE) ZEND_ATOL(str);
524 			}
525 			return is_fastcgi = 1;
526 		} else {
527 			return is_fastcgi = 0;
528 		}
529 #else
530 		errno = 0;
531 		if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) {
532 			fcgi_setup_signals();
533 			return is_fastcgi = 1;
534 		} else {
535 			return is_fastcgi = 0;
536 		}
537 #endif
538 	}
539 	return is_fastcgi;
540 }
541 
542 
fcgi_is_fastcgi(void)543 int fcgi_is_fastcgi(void)
544 {
545 	if (!is_initialized) {
546 		return fcgi_init();
547 	} else {
548 		return is_fastcgi;
549 	}
550 }
551 
fcgi_shutdown(void)552 void fcgi_shutdown(void)
553 {
554 	if (is_initialized) {
555 		zend_hash_destroy(&fcgi_mgmt_vars);
556 	}
557 	is_fastcgi = 0;
558 	if (allowed_clients) {
559 		free(allowed_clients);
560 	}
561 }
562 
563 #ifdef _WIN32
564 /* Do some black magic with the NT security API.
565  * We prepare a DACL (Discretionary Access Control List) so that
566  * we, the creator, are allowed all access, while "Everyone Else"
567  * is only allowed to read and write to the pipe.
568  * This avoids security issues on shared hosts where a luser messes
569  * with the lower-level pipe settings and screws up the FastCGI service.
570  */
prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd,LPSECURITY_ATTRIBUTES sa)571 static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa)
572 {
573 	DWORD req_acl_size;
574 	char everyone_buf[32], owner_buf[32];
575 	PSID sid_everyone, sid_owner;
576 	SID_IDENTIFIER_AUTHORITY
577 		siaWorld = SECURITY_WORLD_SID_AUTHORITY,
578 		siaCreator = SECURITY_CREATOR_SID_AUTHORITY;
579 	PACL acl;
580 
581 	sid_everyone = (PSID)&everyone_buf;
582 	sid_owner = (PSID)&owner_buf;
583 
584 	req_acl_size = sizeof(ACL) +
585 		(2 * ((sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD)) + GetSidLengthRequired(1)));
586 
587 	acl = malloc(req_acl_size);
588 
589 	if (acl == NULL) {
590 		return NULL;
591 	}
592 
593 	if (!InitializeSid(sid_everyone, &siaWorld, 1)) {
594 		goto out_fail;
595 	}
596 	*GetSidSubAuthority(sid_everyone, 0) = SECURITY_WORLD_RID;
597 
598 	if (!InitializeSid(sid_owner, &siaCreator, 1)) {
599 		goto out_fail;
600 	}
601 	*GetSidSubAuthority(sid_owner, 0) = SECURITY_CREATOR_OWNER_RID;
602 
603 	if (!InitializeAcl(acl, req_acl_size, ACL_REVISION)) {
604 		goto out_fail;
605 	}
606 
607 	if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_GENERIC_READ | FILE_GENERIC_WRITE, sid_everyone)) {
608 		goto out_fail;
609 	}
610 
611 	if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_ALL_ACCESS, sid_owner)) {
612 		goto out_fail;
613 	}
614 
615 	if (!InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION)) {
616 		goto out_fail;
617 	}
618 
619 	if (!SetSecurityDescriptorDacl(sd, TRUE, acl, FALSE)) {
620 		goto out_fail;
621 	}
622 
623 	sa->lpSecurityDescriptor = sd;
624 
625 	return acl;
626 
627 out_fail:
628 	free(acl);
629 	return NULL;
630 }
631 #endif
632 
is_port_number(const char * bindpath)633 static int is_port_number(const char *bindpath)
634 {
635 	while (*bindpath) {
636 		if (*bindpath < '0' || *bindpath > '9') {
637 			return 0;
638 		}
639 		bindpath++;
640 	}
641 	return 1;
642 }
643 
fcgi_listen(const char * path,int backlog)644 int fcgi_listen(const char *path, int backlog)
645 {
646 	char     *s;
647 	int       tcp = 0;
648 	char      host[MAXPATHLEN];
649 	short     port = 0;
650 	int       listen_socket;
651 	sa_t      sa;
652 	socklen_t sock_len;
653 #ifdef SO_REUSEADDR
654 # ifdef _WIN32
655 	BOOL reuse = 1;
656 # else
657 	int reuse = 1;
658 # endif
659 #endif
660 
661 	if ((s = strchr(path, ':'))) {
662 		port = atoi(s+1);
663 		if (port != 0 && (s-path) < MAXPATHLEN) {
664 			strncpy(host, path, s-path);
665 			host[s-path] = '\0';
666 			tcp = 1;
667 		}
668 	} else if (is_port_number(path)) {
669 		port = atoi(path);
670 		if (port != 0) {
671 			host[0] = '\0';
672 			tcp = 1;
673 		}
674 	}
675 
676 	/* Prepare socket address */
677 	if (tcp) {
678 		memset(&sa.sa_inet, 0, sizeof(sa.sa_inet));
679 		sa.sa_inet.sin_family = AF_INET;
680 		sa.sa_inet.sin_port = htons(port);
681 		sock_len = sizeof(sa.sa_inet);
682 
683 		if (!*host || !strncmp(host, "*", sizeof("*")-1)) {
684 			sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY);
685 		} else {
686 #ifdef HAVE_INET_PTON
687 			if (!inet_pton(AF_INET, host, &sa.sa_inet.sin_addr)) {
688 #else
689 			sa.sa_inet.sin_addr.s_addr = inet_addr(host);
690 			if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) {
691 #endif
692 				struct hostent *hep;
693 
694 				if(strlen(host) > MAXFQDNLEN) {
695 					hep = NULL;
696 				} else {
697 					hep = php_network_gethostbyname(host);
698 				}
699 				if (!hep || hep->h_addrtype != AF_INET || !hep->h_addr_list[0]) {
700 					fcgi_log(FCGI_ERROR, "Cannot resolve host name '%s'!\n", host);
701 					return -1;
702 				} else if (hep->h_addr_list[1]) {
703 					fcgi_log(FCGI_ERROR, "Host '%s' has multiple addresses. You must choose one explicitly!\n", host);
704 					return -1;
705 				}
706 				sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr;
707 			}
708 		}
709 	} else {
710 #ifdef _WIN32
711 		SECURITY_DESCRIPTOR  sd;
712 		SECURITY_ATTRIBUTES  saw;
713 		PACL                 acl;
714 		HANDLE namedPipe;
715 
716 		memset(&sa, 0, sizeof(saw));
717 		saw.nLength = sizeof(saw);
718 		saw.bInheritHandle = FALSE;
719 		acl = prepare_named_pipe_acl(&sd, &saw);
720 
721 		namedPipe = CreateNamedPipe(path,
722 			PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED,
723 			PIPE_TYPE_BYTE | PIPE_WAIT | PIPE_READMODE_BYTE,
724 			PIPE_UNLIMITED_INSTANCES,
725 			8192, 8192, 0, &saw);
726 		if (namedPipe == INVALID_HANDLE_VALUE) {
727 			return -1;
728 		}
729 		listen_socket = _open_osfhandle((intptr_t)namedPipe, 0);
730 		if (!is_initialized) {
731 			fcgi_init();
732 		}
733 		is_fastcgi = 1;
734 		return listen_socket;
735 
736 #else
737 		size_t path_len = strlen(path);
738 
739 		if (path_len >= sizeof(sa.sa_unix.sun_path)) {
740 			fcgi_log(FCGI_ERROR, "Listening socket's path name is too long.\n");
741 			return -1;
742 		}
743 
744 		memset(&sa.sa_unix, 0, sizeof(sa.sa_unix));
745 		sa.sa_unix.sun_family = AF_UNIX;
746 		memcpy(sa.sa_unix.sun_path, path, path_len + 1);
747 		sock_len = (size_t)(((struct sockaddr_un *)0)->sun_path)	+ path_len;
748 #ifdef HAVE_SOCKADDR_UN_SUN_LEN
749 		sa.sa_unix.sun_len = sock_len;
750 #endif
751 		unlink(path);
752 #endif
753 	}
754 
755 	/* Create, bind socket and start listen on it */
756 	if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 ||
757 #ifdef SO_REUSEADDR
758 	    setsockopt(listen_socket, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, sizeof(reuse)) < 0 ||
759 #endif
760 	    bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 ||
761 	    listen(listen_socket, backlog) < 0) {
762 		close(listen_socket);
763 		fcgi_log(FCGI_ERROR, "Cannot bind/listen socket - [%d] %s.\n",errno, strerror(errno));
764 		return -1;
765 	}
766 
767 	if (!tcp) {
768 		chmod(path, 0777);
769 	} else {
770 		char *ip = getenv("FCGI_WEB_SERVER_ADDRS");
771 		char *cur, *end;
772 		int n;
773 
774 		if (ip) {
775 			ip = strdup(ip);
776 			cur = ip;
777 			n = 0;
778 			while (*cur) {
779 				if (*cur == ',') n++;
780 				cur++;
781 			}
782 			allowed_clients = malloc(sizeof(sa_t) * (n+2));
783 			n = 0;
784 			cur = ip;
785 			while (cur) {
786 				end = strchr(cur, ',');
787 				if (end) {
788 					*end = 0;
789 					end++;
790 				}
791 				if (inet_pton(AF_INET, cur, &allowed_clients[n].sa_inet.sin_addr)>0) {
792 					allowed_clients[n].sa.sa_family = AF_INET;
793 					n++;
794 #ifdef HAVE_IPV6
795 				} else if (inet_pton(AF_INET6, cur, &allowed_clients[n].sa_inet6.sin6_addr)>0) {
796 					allowed_clients[n].sa.sa_family = AF_INET6;
797 					n++;
798 #endif
799 				} else {
800 					fcgi_log(FCGI_ERROR, "Wrong IP address '%s' in listen.allowed_clients", cur);
801 				}
802 				cur = end;
803 			}
804 			allowed_clients[n].sa.sa_family = 0;
805 			free(ip);
806 			if (!n) {
807 				fcgi_log(FCGI_ERROR, "There are no allowed addresses");
808 				/* don't clear allowed_clients as it will create an "open for all" security issue */
809 			}
810 		}
811 	}
812 
813 	if (!is_initialized) {
814 		fcgi_init();
815 	}
816 	is_fastcgi = 1;
817 
818 #ifdef _WIN32
819 	if (tcp) {
820 		listen_socket = _open_osfhandle((intptr_t)listen_socket, 0);
821 	}
822 #else
823 	fcgi_setup_signals();
824 #endif
825 	return listen_socket;
826 }
827 
828 void fcgi_set_allowed_clients(char *ip)
829 {
830 	char *cur, *end;
831 	int n;
832 
833 	if (ip) {
834 		ip = strdup(ip);
835 		cur = ip;
836 		n = 0;
837 		while (*cur) {
838 			if (*cur == ',') n++;
839 			cur++;
840 		}
841 		if (allowed_clients) free(allowed_clients);
842 		allowed_clients = malloc(sizeof(sa_t) * (n+2));
843 		n = 0;
844 		cur = ip;
845 		while (cur) {
846 			end = strchr(cur, ',');
847 			if (end) {
848 				*end = 0;
849 				end++;
850 			}
851 			if (inet_pton(AF_INET, cur, &allowed_clients[n].sa_inet.sin_addr)>0) {
852 				allowed_clients[n].sa.sa_family = AF_INET;
853 				n++;
854 #ifdef HAVE_IPV6
855 			} else if (inet_pton(AF_INET6, cur, &allowed_clients[n].sa_inet6.sin6_addr)>0) {
856 				allowed_clients[n].sa.sa_family = AF_INET6;
857 				n++;
858 #endif
859 			} else {
860 				fcgi_log(FCGI_ERROR, "Wrong IP address '%s' in listen.allowed_clients", cur);
861 			}
862 			cur = end;
863 		}
864 		allowed_clients[n].sa.sa_family = 0;
865 		free(ip);
866 		if (!n) {
867 			fcgi_log(FCGI_ERROR, "There are no allowed addresses");
868 			/* don't clear allowed_clients as it will create an "open for all" security issue */
869 		}
870 	}
871 }
872 
873 static void fcgi_hook_dummy(void) {
874 	return;
875 }
876 
877 fcgi_request *fcgi_init_request(int listen_socket, void(*on_accept)(void), void(*on_read)(void), void(*on_close)(void))
878 {
879 	fcgi_request *req = calloc(1, sizeof(fcgi_request));
880 	req->listen_socket = listen_socket;
881 	req->fd = -1;
882 	req->id = -1;
883 
884 	/*
885 	req->in_len = 0;
886 	req->in_pad = 0;
887 
888 	req->out_hdr = NULL;
889 
890 #ifdef TCP_NODELAY
891 	req->nodelay = 0;
892 #endif
893 
894 	req->env = NULL;
895 	req->has_env = 0;
896 
897 	*/
898 	req->out_pos = req->out_buf;
899 	req->hook.on_accept = on_accept ? on_accept : fcgi_hook_dummy;
900 	req->hook.on_read = on_read ? on_read : fcgi_hook_dummy;
901 	req->hook.on_close = on_close ? on_close : fcgi_hook_dummy;
902 
903 #ifdef _WIN32
904 	req->tcp = !GetNamedPipeInfo((HANDLE)_get_osfhandle(req->listen_socket), NULL, NULL, NULL, NULL);
905 #endif
906 
907 	fcgi_hash_init(&req->env);
908 
909 	return req;
910 }
911 
912 void fcgi_destroy_request(fcgi_request *req) {
913 	fcgi_hash_destroy(&req->env);
914 	free(req);
915 }
916 
917 static inline ssize_t safe_write(fcgi_request *req, const void *buf, size_t count)
918 {
919 	int    ret;
920 	size_t n = 0;
921 
922 	do {
923 #ifdef _WIN32
924 		size_t tmp;
925 #endif
926 		errno = 0;
927 #ifdef _WIN32
928 		tmp = count - n;
929 
930 		if (!req->tcp) {
931 			unsigned int out_len = tmp > UINT_MAX ? UINT_MAX : (unsigned int)tmp;
932 
933 			ret = write(req->fd, ((char*)buf)+n, out_len);
934 		} else {
935 			int out_len = tmp > INT_MAX ? INT_MAX : (int)tmp;
936 
937 			ret = send(req->fd, ((char*)buf)+n, out_len, 0);
938 			if (ret <= 0) {
939 				errno = WSAGetLastError();
940 			}
941 		}
942 #else
943 		ret = write(req->fd, ((char*)buf)+n, count-n);
944 #endif
945 		if (ret > 0) {
946 			n += ret;
947 		} else if (ret <= 0 && errno != 0 && errno != EINTR) {
948 			return ret;
949 		}
950 	} while (n != count);
951 	return n;
952 }
953 
954 static inline ssize_t safe_read(fcgi_request *req, const void *buf, size_t count)
955 {
956 	int    ret;
957 	size_t n = 0;
958 
959 	do {
960 #ifdef _WIN32
961 		size_t tmp;
962 #endif
963 		errno = 0;
964 #ifdef _WIN32
965 		tmp = count - n;
966 
967 		if (!req->tcp) {
968 			unsigned int in_len = tmp > UINT_MAX ? UINT_MAX : (unsigned int)tmp;
969 
970 			ret = read(req->fd, ((char*)buf)+n, in_len);
971 		} else {
972 			int in_len = tmp > INT_MAX ? INT_MAX : (int)tmp;
973 
974 			ret = recv(req->fd, ((char*)buf)+n, in_len, 0);
975 			if (ret <= 0) {
976 				errno = WSAGetLastError();
977 			}
978 		}
979 #else
980 		ret = read(req->fd, ((char*)buf)+n, count-n);
981 #endif
982 		if (ret > 0) {
983 			n += ret;
984 		} else if (ret == 0 && errno == 0) {
985 			return n;
986 		} else if (ret <= 0 && errno != 0 && errno != EINTR) {
987 			return ret;
988 		}
989 	} while (n != count);
990 	return n;
991 }
992 
993 static inline int fcgi_make_header(fcgi_header *hdr, fcgi_request_type type, int req_id, int len)
994 {
995 	int pad = ((len + 7) & ~7) - len;
996 
997 	hdr->contentLengthB0 = (unsigned char)(len & 0xff);
998 	hdr->contentLengthB1 = (unsigned char)((len >> 8) & 0xff);
999 	hdr->paddingLength = (unsigned char)pad;
1000 	hdr->requestIdB0 = (unsigned char)(req_id & 0xff);
1001 	hdr->requestIdB1 = (unsigned char)((req_id >> 8) & 0xff);
1002 	hdr->reserved = 0;
1003 	hdr->type = type;
1004 	hdr->version = FCGI_VERSION_1;
1005 	if (pad) {
1006 		memset(((unsigned char*)hdr) + sizeof(fcgi_header) + len, 0, pad);
1007 	}
1008 	return pad;
1009 }
1010 
1011 static int fcgi_get_params(fcgi_request *req, unsigned char *p, unsigned char *end)
1012 {
1013 	unsigned int name_len, val_len;
1014 
1015 	while (p < end) {
1016 		name_len = *p++;
1017 		if (UNEXPECTED(name_len >= 128)) {
1018 			if (UNEXPECTED(p + 3 >= end)) return 0;
1019 			name_len = ((name_len & 0x7f) << 24);
1020 			name_len |= (*p++ << 16);
1021 			name_len |= (*p++ << 8);
1022 			name_len |= *p++;
1023 		}
1024 		if (UNEXPECTED(p >= end)) return 0;
1025 		val_len = *p++;
1026 		if (UNEXPECTED(val_len >= 128)) {
1027 			if (UNEXPECTED(p + 3 >= end)) return 0;
1028 			val_len = ((val_len & 0x7f) << 24);
1029 			val_len |= (*p++ << 16);
1030 			val_len |= (*p++ << 8);
1031 			val_len |= *p++;
1032 		}
1033 		if (UNEXPECTED(name_len + val_len > (unsigned int) (end - p))) {
1034 			/* Malformed request */
1035 			return 0;
1036 		}
1037 		fcgi_hash_set(&req->env, FCGI_HASH_FUNC(p, name_len), (char*)p, name_len, (char*)p + name_len, val_len);
1038 		p += name_len + val_len;
1039 	}
1040 	return 1;
1041 }
1042 
1043 static int fcgi_read_request(fcgi_request *req)
1044 {
1045 	fcgi_header hdr;
1046 	int len, padding;
1047 	unsigned char buf[FCGI_MAX_LENGTH+8];
1048 
1049 	req->keep = 0;
1050 	req->ended = 0;
1051 	req->in_len = 0;
1052 	req->out_hdr = NULL;
1053 	req->out_pos = req->out_buf;
1054 
1055 	if (req->has_env) {
1056 		fcgi_hash_clean(&req->env);
1057 	} else {
1058 		req->has_env = 1;
1059 	}
1060 
1061 	if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
1062 	    hdr.version < FCGI_VERSION_1) {
1063 		return 0;
1064 	}
1065 
1066 	len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
1067 	padding = hdr.paddingLength;
1068 
1069 	while (hdr.type == FCGI_STDIN && len == 0) {
1070 		if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
1071 		    hdr.version < FCGI_VERSION_1) {
1072 			return 0;
1073 		}
1074 
1075 		len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
1076 		padding = hdr.paddingLength;
1077 	}
1078 
1079 	if (len + padding > FCGI_MAX_LENGTH) {
1080 		return 0;
1081 	}
1082 
1083 	req->id = (hdr.requestIdB1 << 8) + hdr.requestIdB0;
1084 
1085 	if (hdr.type == FCGI_BEGIN_REQUEST && len == sizeof(fcgi_begin_request)) {
1086 		fcgi_begin_request *b;
1087 
1088 		if (safe_read(req, buf, len+padding) != len+padding) {
1089 			return 0;
1090 		}
1091 
1092 		b = (fcgi_begin_request*)buf;
1093 		req->keep = (b->flags & FCGI_KEEP_CONN);
1094 #ifdef TCP_NODELAY
1095 		if (req->keep && req->tcp && !req->nodelay) {
1096 # ifdef _WIN32
1097 			BOOL on = 1;
1098 # else
1099 			int on = 1;
1100 # endif
1101 
1102 			setsockopt(req->fd, IPPROTO_TCP, TCP_NODELAY, (char*)&on, sizeof(on));
1103 			req->nodelay = 1;
1104 		}
1105 #endif
1106 		switch ((b->roleB1 << 8) + b->roleB0) {
1107 			case FCGI_RESPONDER:
1108 				fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "RESPONDER", sizeof("RESPONDER")-1);
1109 				break;
1110 			case FCGI_AUTHORIZER:
1111 				fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "AUTHORIZER", sizeof("AUTHORIZER")-1);
1112 				break;
1113 			case FCGI_FILTER:
1114 				fcgi_hash_set(&req->env, FCGI_HASH_FUNC("FCGI_ROLE", sizeof("FCGI_ROLE")-1), "FCGI_ROLE", sizeof("FCGI_ROLE")-1, "FILTER", sizeof("FILTER")-1);
1115 				break;
1116 			default:
1117 				return 0;
1118 		}
1119 
1120 		if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
1121 		    hdr.version < FCGI_VERSION_1) {
1122 			return 0;
1123 		}
1124 
1125 		len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
1126 		padding = hdr.paddingLength;
1127 
1128 		while (hdr.type == FCGI_PARAMS && len > 0) {
1129 			if (len + padding > FCGI_MAX_LENGTH) {
1130 				return 0;
1131 			}
1132 
1133 			if (safe_read(req, buf, len+padding) != len+padding) {
1134 				req->keep = 0;
1135 				return 0;
1136 			}
1137 
1138 			if (!fcgi_get_params(req, buf, buf+len)) {
1139 				req->keep = 0;
1140 				return 0;
1141 			}
1142 
1143 			if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
1144 			    hdr.version < FCGI_VERSION_1) {
1145 				req->keep = 0;
1146 				return 0;
1147 			}
1148 			len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
1149 			padding = hdr.paddingLength;
1150 		}
1151 	} else if (hdr.type == FCGI_GET_VALUES) {
1152 		unsigned char *p = buf + sizeof(fcgi_header);
1153 		zval *value;
1154 		unsigned int zlen;
1155 		fcgi_hash_bucket *q;
1156 
1157 		if (safe_read(req, buf, len+padding) != len+padding) {
1158 			req->keep = 0;
1159 			return 0;
1160 		}
1161 
1162 		if (!fcgi_get_params(req, buf, buf+len)) {
1163 			req->keep = 0;
1164 			return 0;
1165 		}
1166 
1167 		q = req->env.list;
1168 		while (q != NULL) {
1169 			if ((value = zend_hash_str_find(&fcgi_mgmt_vars, q->var, q->var_len)) == NULL) {
1170 				q = q->list_next;
1171 				continue;
1172 			}
1173 			zlen = (unsigned int)Z_STRLEN_P(value);
1174 			if ((p + 4 + 4 + q->var_len + zlen) >= (buf + sizeof(buf))) {
1175 				break;
1176 			}
1177 			if (q->var_len < 0x80) {
1178 				*p++ = q->var_len;
1179 			} else {
1180 				*p++ = ((q->var_len >> 24) & 0xff) | 0x80;
1181 				*p++ = (q->var_len >> 16) & 0xff;
1182 				*p++ = (q->var_len >> 8) & 0xff;
1183 				*p++ = q->var_len & 0xff;
1184 			}
1185 			if (zlen < 0x80) {
1186 				*p++ = zlen;
1187 			} else {
1188 				*p++ = ((zlen >> 24) & 0xff) | 0x80;
1189 				*p++ = (zlen >> 16) & 0xff;
1190 				*p++ = (zlen >> 8) & 0xff;
1191 				*p++ = zlen & 0xff;
1192 			}
1193 			memcpy(p, q->var, q->var_len);
1194 			p += q->var_len;
1195 			memcpy(p, Z_STRVAL_P(value), zlen);
1196 			p += zlen;
1197 			q = q->list_next;
1198 		}
1199 		len = (int)(p - buf - sizeof(fcgi_header));
1200 		len += fcgi_make_header((fcgi_header*)buf, FCGI_GET_VALUES_RESULT, 0, len);
1201 		if (safe_write(req, buf, sizeof(fcgi_header) + len) != (ssize_t)sizeof(fcgi_header)+len) {
1202 			req->keep = 0;
1203 			return 0;
1204 		}
1205 		return 0;
1206 	} else {
1207 		return 0;
1208 	}
1209 
1210 	return 1;
1211 }
1212 
1213 int fcgi_read(fcgi_request *req, char *str, int len)
1214 {
1215 	int ret, n, rest;
1216 	fcgi_header hdr;
1217 	unsigned char buf[255];
1218 
1219 	n = 0;
1220 	rest = len;
1221 	while (rest > 0) {
1222 		if (req->in_len == 0) {
1223 			if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
1224 			    hdr.version < FCGI_VERSION_1 ||
1225 			    hdr.type != FCGI_STDIN) {
1226 				req->keep = 0;
1227 				return 0;
1228 			}
1229 			req->in_len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
1230 			req->in_pad = hdr.paddingLength;
1231 			if (req->in_len == 0) {
1232 				return n;
1233 			}
1234 		}
1235 
1236 		if (req->in_len >= rest) {
1237 			ret = (int)safe_read(req, str, rest);
1238 		} else {
1239 			ret = (int)safe_read(req, str, req->in_len);
1240 		}
1241 		if (ret < 0) {
1242 			req->keep = 0;
1243 			return ret;
1244 		} else if (ret > 0) {
1245 			req->in_len -= ret;
1246 			rest -= ret;
1247 			n += ret;
1248 			str += ret;
1249 			if (req->in_len == 0) {
1250 				if (req->in_pad) {
1251 					if (safe_read(req, buf, req->in_pad) != req->in_pad) {
1252 						req->keep = 0;
1253 						return ret;
1254 					}
1255 				}
1256 			} else {
1257 				return n;
1258 			}
1259 		} else {
1260 			return n;
1261 		}
1262 	}
1263 	return n;
1264 }
1265 
1266 void fcgi_close(fcgi_request *req, int force, int destroy)
1267 {
1268 	if (destroy && req->has_env) {
1269 		fcgi_hash_clean(&req->env);
1270 		req->has_env = 0;
1271 	}
1272 
1273 #ifdef _WIN32
1274 	if (is_impersonate && !req->tcp) {
1275 		RevertToSelf();
1276 	}
1277 #endif
1278 
1279 	if ((force || !req->keep) && req->fd >= 0) {
1280 #ifdef _WIN32
1281 		if (!req->tcp) {
1282 			HANDLE pipe = (HANDLE)_get_osfhandle(req->fd);
1283 
1284 			if (!force) {
1285 				FlushFileBuffers(pipe);
1286 			}
1287 			DisconnectNamedPipe(pipe);
1288 		} else {
1289 			if (!force) {
1290 				char buf[8];
1291 
1292 				shutdown(req->fd, 1);
1293 				/* read any remaining data, it may be omitted */
1294 				while (recv(req->fd, buf, sizeof(buf), 0) > 0) {}
1295 			}
1296 			closesocket(req->fd);
1297 		}
1298 #else
1299 		if (!force) {
1300 			char buf[8];
1301 
1302 			shutdown(req->fd, 1);
1303 			/* read any remaining data, it may be omitted */
1304 			while (recv(req->fd, buf, sizeof(buf), 0) > 0) {}
1305 		}
1306 		close(req->fd);
1307 #endif
1308 #ifdef TCP_NODELAY
1309 		req->nodelay = 0;
1310 #endif
1311 		req->fd = -1;
1312 
1313 		req->hook.on_close();
1314 	}
1315 }
1316 
1317 int fcgi_is_closed(fcgi_request *req)
1318 {
1319 	return (req->fd < 0);
1320 }
1321 
1322 static int fcgi_is_allowed(void) {
1323 	int i;
1324 
1325 	if (client_sa.sa.sa_family == AF_UNIX) {
1326 		return 1;
1327 	}
1328 	if (!allowed_clients) {
1329 		return 1;
1330 	}
1331 	if (client_sa.sa.sa_family == AF_INET) {
1332 		for (i = 0; allowed_clients[i].sa.sa_family ; i++) {
1333 			if (allowed_clients[i].sa.sa_family == AF_INET
1334 				&& !memcmp(&client_sa.sa_inet.sin_addr, &allowed_clients[i].sa_inet.sin_addr, 4)) {
1335 				return 1;
1336 			}
1337 		}
1338 	}
1339 #ifdef HAVE_IPV6
1340 	if (client_sa.sa.sa_family == AF_INET6) {
1341 		for (i = 0; allowed_clients[i].sa.sa_family ; i++) {
1342 			if (allowed_clients[i].sa.sa_family == AF_INET6
1343 				&& !memcmp(&client_sa.sa_inet6.sin6_addr, &allowed_clients[i].sa_inet6.sin6_addr, 12)) {
1344 				return 1;
1345 			}
1346 #ifdef IN6_IS_ADDR_V4MAPPED
1347 			if (allowed_clients[i].sa.sa_family == AF_INET
1348 			    && IN6_IS_ADDR_V4MAPPED(&client_sa.sa_inet6.sin6_addr)
1349 				&& !memcmp(((char *)&client_sa.sa_inet6.sin6_addr)+12, &allowed_clients[i].sa_inet.sin_addr, 4)) {
1350 				return 1;
1351 			}
1352 #endif
1353 		}
1354 	}
1355 #endif
1356 
1357 	return 0;
1358 }
1359 
1360 int fcgi_accept_request(fcgi_request *req)
1361 {
1362 #ifdef _WIN32
1363 	HANDLE pipe;
1364 	OVERLAPPED ov;
1365 #endif
1366 
1367 	while (1) {
1368 		if (req->fd < 0) {
1369 			while (1) {
1370 				if (in_shutdown) {
1371 					return -1;
1372 				}
1373 
1374 				req->hook.on_accept();
1375 #ifdef _WIN32
1376 				if (!req->tcp) {
1377 					pipe = (HANDLE)_get_osfhandle(req->listen_socket);
1378 					FCGI_LOCK(req->listen_socket);
1379 					ov.hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
1380 					if (!ConnectNamedPipe(pipe, &ov)) {
1381 						errno = GetLastError();
1382 						if (errno == ERROR_IO_PENDING) {
1383 							while (WaitForSingleObject(ov.hEvent, 1000) == WAIT_TIMEOUT) {
1384 								if (in_shutdown) {
1385 									CloseHandle(ov.hEvent);
1386 									FCGI_UNLOCK(req->listen_socket);
1387 									return -1;
1388 								}
1389 							}
1390 						} else if (errno != ERROR_PIPE_CONNECTED) {
1391 						}
1392 					}
1393 					CloseHandle(ov.hEvent);
1394 					req->fd = req->listen_socket;
1395 					FCGI_UNLOCK(req->listen_socket);
1396 				} else {
1397 					SOCKET listen_socket = (SOCKET)_get_osfhandle(req->listen_socket);
1398 #else
1399 				{
1400 					int listen_socket = req->listen_socket;
1401 #endif
1402 					sa_t sa;
1403 					socklen_t len = sizeof(sa);
1404 
1405 					FCGI_LOCK(req->listen_socket);
1406 					req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
1407 					FCGI_UNLOCK(req->listen_socket);
1408 
1409 					client_sa = sa;
1410 					if (req->fd >= 0 && !fcgi_is_allowed()) {
1411 						fcgi_log(FCGI_ERROR, "Connection disallowed: IP address '%s' has been dropped.", fcgi_get_last_client_ip());
1412 						closesocket(req->fd);
1413 						req->fd = -1;
1414 						continue;
1415 					}
1416 				}
1417 
1418 #ifdef _WIN32
1419 				if (req->fd < 0 && (in_shutdown || errno != EINTR)) {
1420 #else
1421 				if (req->fd < 0 && (in_shutdown || (errno != EINTR && errno != ECONNABORTED))) {
1422 #endif
1423 					return -1;
1424 				}
1425 
1426 #ifdef _WIN32
1427 				break;
1428 #else
1429 				if (req->fd >= 0) {
1430 #if defined(HAVE_POLL)
1431 					struct pollfd fds;
1432 					int ret;
1433 
1434 					fds.fd = req->fd;
1435 					fds.events = POLLIN;
1436 					fds.revents = 0;
1437 					do {
1438 						errno = 0;
1439 						ret = poll(&fds, 1, 5000);
1440 					} while (ret < 0 && errno == EINTR);
1441 					if (ret > 0 && (fds.revents & POLLIN)) {
1442 						break;
1443 					}
1444 					fcgi_close(req, 1, 0);
1445 #else
1446 					if (req->fd < FD_SETSIZE) {
1447 						struct timeval tv = {5,0};
1448 						fd_set set;
1449 						int ret;
1450 
1451 						FD_ZERO(&set);
1452 						FD_SET(req->fd, &set);
1453 						do {
1454 							errno = 0;
1455 							ret = select(req->fd + 1, &set, NULL, NULL, &tv) >= 0;
1456 						} while (ret < 0 && errno == EINTR);
1457 						if (ret > 0 && FD_ISSET(req->fd, &set)) {
1458 							break;
1459 						}
1460 						fcgi_close(req, 1, 0);
1461 					} else {
1462 						fcgi_log(FCGI_ERROR, "Too many open file descriptors. FD_SETSIZE limit exceeded.");
1463 						fcgi_close(req, 1, 0);
1464 					}
1465 #endif
1466 				}
1467 #endif
1468 			}
1469 		} else if (in_shutdown) {
1470 			return -1;
1471 		}
1472 		req->hook.on_read();
1473 		if (fcgi_read_request(req)) {
1474 #ifdef _WIN32
1475 			if (is_impersonate && !req->tcp) {
1476 				pipe = (HANDLE)_get_osfhandle(req->fd);
1477 				if (!ImpersonateNamedPipeClient(pipe)) {
1478 					fcgi_close(req, 1, 1);
1479 					continue;
1480 				}
1481 			}
1482 #endif
1483 			return req->fd;
1484 		} else {
1485 			fcgi_close(req, 1, 1);
1486 		}
1487 	}
1488 }
1489 
1490 static inline fcgi_header* open_packet(fcgi_request *req, fcgi_request_type type)
1491 {
1492 	req->out_hdr = (fcgi_header*) req->out_pos;
1493 	req->out_hdr->type = type;
1494 	req->out_pos += sizeof(fcgi_header);
1495 	return req->out_hdr;
1496 }
1497 
1498 static inline void close_packet(fcgi_request *req)
1499 {
1500 	if (req->out_hdr) {
1501 		int len = (int)(req->out_pos - ((unsigned char*)req->out_hdr + sizeof(fcgi_header)));
1502 
1503 		req->out_pos += fcgi_make_header(req->out_hdr, (fcgi_request_type)req->out_hdr->type, req->id, len);
1504 		req->out_hdr = NULL;
1505 	}
1506 }
1507 
1508 int fcgi_flush(fcgi_request *req, int end)
1509 {
1510 	int len;
1511 
1512 	close_packet(req);
1513 
1514 	len = (int)(req->out_pos - req->out_buf);
1515 
1516 	if (end) {
1517 		fcgi_end_request_rec *rec = (fcgi_end_request_rec*)(req->out_pos);
1518 
1519 		fcgi_make_header(&rec->hdr, FCGI_END_REQUEST, req->id, sizeof(fcgi_end_request));
1520 		rec->body.appStatusB3 = 0;
1521 		rec->body.appStatusB2 = 0;
1522 		rec->body.appStatusB1 = 0;
1523 		rec->body.appStatusB0 = 0;
1524 		rec->body.protocolStatus = FCGI_REQUEST_COMPLETE;
1525 		len += sizeof(fcgi_end_request_rec);
1526 	}
1527 
1528 	if (safe_write(req, req->out_buf, len) != len) {
1529 		req->keep = 0;
1530 		req->out_pos = req->out_buf;
1531 		return 0;
1532 	}
1533 
1534 	req->out_pos = req->out_buf;
1535 	return 1;
1536 }
1537 
1538 int fcgi_write(fcgi_request *req, fcgi_request_type type, const char *str, int len)
1539 {
1540 	int limit, rest;
1541 
1542 	if (len <= 0) {
1543 		return 0;
1544 	}
1545 
1546 	if (req->out_hdr && req->out_hdr->type != type) {
1547 		close_packet(req);
1548 	}
1549 #if 0
1550 	/* Unoptimized, but clear version */
1551 	rest = len;
1552 	while (rest > 0) {
1553 		limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
1554 
1555 		if (!req->out_hdr) {
1556 			if (limit < sizeof(fcgi_header)) {
1557 				if (!fcgi_flush(req, 0)) {
1558 					return -1;
1559 				}
1560 			}
1561 			open_packet(req, type);
1562 		}
1563 		limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
1564 		if (rest < limit) {
1565 			memcpy(req->out_pos, str, rest);
1566 			req->out_pos += rest;
1567 			return len;
1568 		} else {
1569 			memcpy(req->out_pos, str, limit);
1570 			req->out_pos += limit;
1571 			rest -= limit;
1572 			str += limit;
1573 			if (!fcgi_flush(req, 0)) {
1574 				return -1;
1575 			}
1576 		}
1577 	}
1578 #else
1579 	/* Optimized version */
1580 	limit = (int)(sizeof(req->out_buf) - (req->out_pos - req->out_buf));
1581 	if (!req->out_hdr) {
1582 		limit -= sizeof(fcgi_header);
1583 		if (limit < 0) limit = 0;
1584 	}
1585 
1586 	if (len < limit) {
1587 		if (!req->out_hdr) {
1588 			open_packet(req, type);
1589 		}
1590 		memcpy(req->out_pos, str, len);
1591 		req->out_pos += len;
1592 	} else if (len - limit < (int)(sizeof(req->out_buf) - sizeof(fcgi_header))) {
1593 		if (limit > 0) {
1594 			if (!req->out_hdr) {
1595 				open_packet(req, type);
1596 			}
1597 			memcpy(req->out_pos, str, limit);
1598 			req->out_pos += limit;
1599 		}
1600 		if (!fcgi_flush(req, 0)) {
1601 			return -1;
1602 		}
1603 		if (len > limit) {
1604 			open_packet(req, type);
1605 			memcpy(req->out_pos, str + limit, len - limit);
1606 			req->out_pos += len - limit;
1607 		}
1608 	} else {
1609 		int pos = 0;
1610 		int pad;
1611 
1612 		close_packet(req);
1613 		while ((len - pos) > 0xffff) {
1614 			open_packet(req, type);
1615 			fcgi_make_header(req->out_hdr, type, req->id, 0xfff8);
1616 			req->out_hdr = NULL;
1617 			if (!fcgi_flush(req, 0)) {
1618 				return -1;
1619 			}
1620 			if (safe_write(req, str + pos, 0xfff8) != 0xfff8) {
1621 				req->keep = 0;
1622 				return -1;
1623 			}
1624 			pos += 0xfff8;
1625 		}
1626 
1627 		pad = (((len - pos) + 7) & ~7) - (len - pos);
1628 		rest = pad ? 8 - pad : 0;
1629 
1630 		open_packet(req, type);
1631 		fcgi_make_header(req->out_hdr, type, req->id, (len - pos) - rest);
1632 		req->out_hdr = NULL;
1633 		if (!fcgi_flush(req, 0)) {
1634 			return -1;
1635 		}
1636 		if (safe_write(req, str + pos, (len - pos) - rest) != (len - pos) - rest) {
1637 			req->keep = 0;
1638 			return -1;
1639 		}
1640 		if (pad) {
1641 			open_packet(req, type);
1642 			memcpy(req->out_pos, str + len - rest,  rest);
1643 			req->out_pos += rest;
1644 		}
1645 	}
1646 #endif
1647 	return len;
1648 }
1649 
1650 int fcgi_end(fcgi_request *req) {
1651 	int ret = 1;
1652 	if (!req->ended) {
1653 		ret = fcgi_flush(req, 1);
1654 		req->ended = 1;
1655 	}
1656 	return ret;
1657 }
1658 
1659 int fcgi_finish_request(fcgi_request *req, int force_close)
1660 {
1661 	int ret = 1;
1662 
1663 	if (req->fd >= 0) {
1664 		ret = fcgi_end(req);
1665 		fcgi_close(req, force_close, 1);
1666 	}
1667 	return ret;
1668 }
1669 
1670 int fcgi_has_env(fcgi_request *req)
1671 {
1672 	return req && req->has_env;
1673 }
1674 
1675 char* fcgi_getenv(fcgi_request *req, const char* var, int var_len)
1676 {
1677 	unsigned int val_len;
1678 
1679 	if (!req) return NULL;
1680 
1681 	return fcgi_hash_get(&req->env, FCGI_HASH_FUNC(var, var_len), (char*)var, var_len, &val_len);
1682 }
1683 
1684 char* fcgi_quick_getenv(fcgi_request *req, const char* var, int var_len, unsigned int hash_value)
1685 {
1686 	unsigned int val_len;
1687 
1688 	return fcgi_hash_get(&req->env, hash_value, (char*)var, var_len, &val_len);
1689 }
1690 
1691 char* fcgi_putenv(fcgi_request *req, char* var, int var_len, char* val)
1692 {
1693 	if (!req) return NULL;
1694 	if (val == NULL) {
1695 		fcgi_hash_del(&req->env, FCGI_HASH_FUNC(var, var_len), var, var_len);
1696 		return NULL;
1697 	} else {
1698 		return fcgi_hash_set(&req->env, FCGI_HASH_FUNC(var, var_len), var, var_len, val, (unsigned int)strlen(val));
1699 	}
1700 }
1701 
1702 char* fcgi_quick_putenv(fcgi_request *req, char* var, int var_len, unsigned int hash_value, char* val)
1703 {
1704 	if (val == NULL) {
1705 		fcgi_hash_del(&req->env, hash_value, var, var_len);
1706 		return NULL;
1707 	} else {
1708 		return fcgi_hash_set(&req->env, hash_value, var, var_len, val, (unsigned int)strlen(val));
1709 	}
1710 }
1711 
1712 void fcgi_loadenv(fcgi_request *req, fcgi_apply_func func, zval *array)
1713 {
1714 	fcgi_hash_apply(&req->env, func, array);
1715 }
1716 
1717 #ifdef _WIN32
1718 void fcgi_impersonate(void)
1719 {
1720 	char *os_name;
1721 
1722 	os_name = getenv("OS");
1723 	if (os_name && stricmp(os_name, "Windows_NT") == 0) {
1724 		is_impersonate = 1;
1725 	}
1726 }
1727 #endif
1728 
1729 void fcgi_set_mgmt_var(const char * name, size_t name_len, const char * value, size_t value_len)
1730 {
1731 	zval zvalue;
1732 	zend_string *key = zend_string_init(name, name_len, 1);
1733 	ZVAL_NEW_STR(&zvalue, zend_string_init(value, value_len, 1));
1734 	GC_MAKE_PERSISTENT_LOCAL(key);
1735 	GC_MAKE_PERSISTENT_LOCAL(Z_STR(zvalue));
1736 	zend_hash_add(&fcgi_mgmt_vars, key, &zvalue);
1737 	zend_string_release_ex(key, 1);
1738 }
1739 
1740 void fcgi_free_mgmt_var_cb(zval *zv)
1741 {
1742 	pefree(Z_STR_P(zv), 1);
1743 }
1744 
1745 const char *fcgi_get_last_client_ip()
1746 {
1747 	static char str[INET6_ADDRSTRLEN];
1748 
1749 	/* Ipv4 */
1750 	if (client_sa.sa.sa_family == AF_INET) {
1751 		return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet.sin_addr, str, INET6_ADDRSTRLEN);
1752 	}
1753 #ifdef HAVE_IPV6
1754 #ifdef IN6_IS_ADDR_V4MAPPED
1755 	/* Ipv4-Mapped-Ipv6 */
1756 	if (client_sa.sa.sa_family == AF_INET6
1757 		&& IN6_IS_ADDR_V4MAPPED(&client_sa.sa_inet6.sin6_addr)) {
1758 		return inet_ntop(AF_INET, ((char *)&client_sa.sa_inet6.sin6_addr)+12, str, INET6_ADDRSTRLEN);
1759 	}
1760 #endif
1761 	/* Ipv6 */
1762 	if (client_sa.sa.sa_family == AF_INET6) {
1763 		return inet_ntop(client_sa.sa.sa_family, &client_sa.sa_inet6.sin6_addr, str, INET6_ADDRSTRLEN);
1764 	}
1765 #endif
1766 	/* Unix socket */
1767 	return NULL;
1768 }
1769