1 /* ====================================================================
2 * The Apache Software License, Version 1.1
4 * Copyright (c) 2000 The Apache Software Foundation. All rights
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
19 * 3. The end-user documentation included with the redistribution,
20 * if any, must include the following acknowledgment:
21 * "This product includes software developed by the
22 * Apache Software Foundation (http://www.apache.org/)."
23 * Alternately, this acknowledgment may appear in the software itself,
24 * if and wherever such third-party acknowledgments normally appear.
26 * 4. The names "Apache" and "Apache Software Foundation" must
27 * not be used to endorse or promote products derived from this
28 * software without prior written permission. For written
29 * permission, please contact apache@apache.org.
31 * 5. Products derived from this software may not be called "Apache",
32 * nor may "Apache" appear in their name, without prior written
33 * permission of the Apache Software Foundation.
35 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
36 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
37 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
38 * DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
39 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
40 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
41 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
42 * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
43 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
44 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
45 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
47 * ====================================================================
49 * This software consists of voluntary contributions made by many
50 * individuals on behalf of the Apache Software Foundation. For more
51 * information on the Apache Software Foundation, please see
52 * <http://www.apache.org/>.
54 * Portions of this software are based upon public domain software
55 * originally written at the National Center for Supercomputing Applications,
56 * University of Illinois, Urbana-Champaign.
60 #include "ap_config.h"
62 #include "http_connection.h"
63 #include "http_request.h"
64 #include "http_protocol.h"
66 #include "mpm_status.h"
67 #include "http_config.h"
68 #include "http_vhost.h"
71 HOOK_LINK(pre_connection)
72 HOOK_LINK(process_connection)
75 IMPLEMENT_HOOK_VOID(pre_connection,(conn_rec *c),(c))
76 IMPLEMENT_HOOK_RUN_FIRST(int,process_connection,(conn_rec *c),(c),DECLINED)
79 * More machine-dependent networking gooo... on some systems,
80 * you've got to be *really* sure that all the packets are acknowledged
81 * before closing the connection, since the client will not be able
82 * to see the last response if their TCP buffer is flushed by a RST
83 * packet from us, which is what the server's TCP stack will send
84 * if it receives any request data after closing the connection.
86 * In an ideal world, this function would be accomplished by simply
87 * setting the socket option SO_LINGER and handling it within the
88 * server's TCP stack while the process continues on to the next request.
89 * Unfortunately, it seems that most (if not all) operating systems
90 * block the server process on close() when SO_LINGER is used.
91 * For those that don't, see USE_SO_LINGER below. For the rest,
92 * we have created a home-brew lingering_close.
94 * Many operating systems tend to block, puke, or otherwise mishandle
95 * calls to shutdown only half of the connection. You should define
96 * NO_LINGCLOSE in ap_config.h if such is the case for your system.
98 #ifndef MAX_SECS_TO_LINGER
99 #define MAX_SECS_TO_LINGER 30
103 #define NO_LINGCLOSE /* The two lingering options are exclusive */
105 static void sock_enable_linger(int s)
110 li.l_linger = MAX_SECS_TO_LINGER;
112 if (setsockopt(s, SOL_SOCKET, SO_LINGER,
113 (char *) &li, sizeof(struct linger)) < 0) {
114 ap_log_error(APLOG_MARK, APLOG_WARNING, server_conf,
115 "setsockopt: (SO_LINGER)");
116 /* not a fatal error */
121 #define sock_enable_linger(s) /* NOOP */
122 #endif /* USE_SO_LINGER */
126 /* we now proceed to read from the client until we get EOF, or until
127 * MAX_SECS_TO_LINGER has passed. the reasons for doing this are
128 * documented in a draft:
130 * http://www.ics.uci.edu/pub/ietf/http/draft-ietf-http-connection-00.txt
132 * in a nutshell -- if we don't make this effort we risk causing
133 * TCP RST packets to be sent which can tear down a connection before
134 * all the response data has been sent to the client.
137 static void lingering_close(conn_rec *c)
145 /* Send any leftover data to the client, but never try to again */
147 if (ap_bflush(c->client) != APR_SUCCESS) {
148 ap_bclose(c->client);
152 /* Shut down the socket for write, which will send a FIN
156 if (ap_bshutdown(c->client, 1) != APR_SUCCESS
157 || ap_is_aborted(c)) {
158 ap_bclose(c->client);
162 /* Read all data from the peer until we reach "end-of-file" (FIN
163 * from peer) or we've exceeded our overall timeout.
167 timeout = MAX_SECS_TO_LINGER;
169 ap_bsetopt(c->client, BO_TIMEOUT, &timeout);
170 rc = ap_bread(c->client, dummybuf, sizeof(dummybuf),
172 if (rc != APR_SUCCESS || nbytes == 0) break;
174 /* how much time has elapsed? */
175 timeout = (int)((ap_now() - start) / AP_USEC_PER_SEC);
176 if (timeout >= MAX_SECS_TO_LINGER) break;
178 /* figure out the new timeout */
179 timeout = MAX_SECS_TO_LINGER - timeout;
182 ap_bclose(c->client);
185 #endif /* ndef NO_LINGCLOSE */
187 CORE_EXPORT(void) ap_process_connection(conn_rec *c)
189 ap_update_vhost_given_ip(c);
191 ap_run_pre_connection(c);
193 ap_run_process_connection(c);
196 * Close the connection, being careful to send out whatever is still
197 * in our buffers. If possible, try to avoid a hard close until the
198 * client has ACKed our FIN and/or has stopped sending us data.
202 ap_bclose(c->client); /* just close it */
206 /* && (c->client->fd >= 0) */ ) {
211 ap_bsetflag(c->client, B_EOUT, 1);
212 ap_bclose(c->client);
217 int ap_process_http_connection(conn_rec *c)
222 * Read and process each request found on our connection
223 * until no requests are left or we decide to close.
226 ap_update_connection_status(c->id, "Status", "Reading");
227 while ((r = ap_read_request(c)) != NULL) {
229 /* process the request if it was read without error */
231 ap_update_connection_status(c->id, "Status", "Writing");
232 if (r->status == HTTP_OK)
233 ap_process_request(r);
235 if (!c->keepalive || c->aborted)
238 ap_update_connection_status(c->id, "Status", "Keepalive");
239 ap_destroy_pool(r->pool);
241 if (ap_graceful_stop_signalled()) {
242 /* XXX: hey wait, this should do a lingering_close! */
243 ap_bclose(c->client);
248 ap_reset_connection_status(c->id);
252 /* Clearly some of this stuff doesn't belong in a generalised connection
253 structure, but for now...
256 conn_rec *ap_new_connection(ap_context_t *p, server_rec *server, BUFF *inout,
257 const struct sockaddr_in *remaddr,
258 const struct sockaddr_in *saddr, long id)
260 conn_rec *conn = (conn_rec *) ap_pcalloc(p, sizeof(conn_rec));
262 /* Got a connection structure, so initialize what fields we can
263 * (the rest are zeroed out by pcalloc).
266 conn->conn_config=ap_create_conn_config(p);
269 conn->local_addr = *saddr;
270 conn->local_ip = ap_pstrdup(conn->pool,
271 inet_ntoa(conn->local_addr.sin_addr));
272 conn->base_server = server;
273 conn->client = inout;
275 conn->remote_addr = *remaddr;
276 conn->remote_ip = ap_pstrdup(conn->pool,
277 inet_ntoa(conn->remote_addr.sin_addr));
286 conn_rec *ap_new_apr_connection(ap_context_t *p, server_rec *server, BUFF *inout,
287 const ap_socket_t *conn_socket, long id)
289 struct sockaddr_in *sa_local, *sa_remote;
291 ap_get_local_name(&sa_local, conn_socket);
292 ap_get_remote_name(&sa_remote, conn_socket);
293 return ap_new_connection(p, server, inout, sa_remote, sa_local, id);