5 * Copyright (c) 1995 Open Market, Inc.
8 * This file contains proprietary and confidential information and
9 * remains the unpublished property of Open Market, Inc. Use,
10 * disclosure, or reproduction is prohibited except as permitted by
11 * express written license agreement with Open Market, Inc.
14 * snapper@openmarket.com
16 * (Special thanks to Karen and Bill. They made my job much easier and
17 * significantly more enjoyable.)
20 static const char rcsid[] = "$Id: os_win32.c,v 1.24 2001/09/14 19:43:27 robs Exp $";
23 #define WIN32_LEAN_AND_MEAN
29 #include <sys/timeb.h>
31 #define DLLAPI __declspec(dllexport)
36 #define WIN32_OPEN_MAX 128 /* XXX: Small hack */
39 * millisecs to wait for a client connection before checking the
40 * shutdown flag (then go back to waiting for a connection, etc).
42 #define ACCEPT_TIMEOUT 1000
44 #define MUTEX_VARNAME "_FCGI_MUTEX_"
45 #define SHUTDOWN_EVENT_NAME "_FCGI_SHUTDOWN_EVENT_"
46 #define LOCALHOST "localhost"
48 static HANDLE hIoCompPort = INVALID_HANDLE_VALUE;
49 static HANDLE hStdinCompPort = INVALID_HANDLE_VALUE;
50 static HANDLE hStdinThread = INVALID_HANDLE_VALUE;
52 static HANDLE stdioHandles[3] = {INVALID_HANDLE_VALUE, INVALID_HANDLE_VALUE,
53 INVALID_HANDLE_VALUE};
55 static HANDLE acceptMutex = INVALID_HANDLE_VALUE;
57 static BOOLEAN shutdownPending = FALSE;
58 static BOOLEAN shutdownNow = FALSE;
61 * An enumeration of the file types
62 * supported by the FD_TABLE structure.
64 * XXX: Not all currently supported. This allows for future
84 * Structure used to map file handle and socket handle
85 * values into values that can be used to create unix-like
86 * select bitmaps, read/write for both sockets/files.
93 unsigned long instance;
95 int offset; /* only valid for async file writes */
96 LPDWORD offsetHighPtr; /* pointers to offset high and low words */
97 LPDWORD offsetLowPtr; /* only valid for async file writes (logs) */
98 HANDLE hMapMutex; /* mutex handle for multi-proc offset update */
99 LPVOID ovList; /* List of associated OVERLAPPED_REQUESTs */
103 * XXX Note there is no dyanmic sizing of this table, so if the
104 * number of open file descriptors exceeds WIN32_OPEN_MAX the
107 static struct FD_TABLE fdTable[WIN32_OPEN_MAX];
109 static CRITICAL_SECTION fdTableCritical;
111 struct OVERLAPPED_REQUEST {
112 OVERLAPPED overlapped;
113 unsigned long instance; /* file instance (won't match after a close) */
114 OS_AsyncProc procPtr; /* callback routine */
115 ClientData clientData; /* callback argument */
116 ClientData clientData1; /* additional clientData */
118 typedef struct OVERLAPPED_REQUEST *POVERLAPPED_REQUEST;
120 static const char *bindPathPrefix = "\\\\.\\pipe\\FastCGI\\";
122 static FILE_TYPE listenType = FD_UNUSED;
124 // XXX This should be a DESCRIPTOR
125 static HANDLE hListen = INVALID_HANDLE_VALUE;
127 static OVERLAPPED listenOverlapped;
128 static BOOLEAN libInitialized = FALSE;
131 *--------------------------------------------------------------
133 * Win32NewDescriptor --
135 * Set up for I/O descriptor masquerading.
138 * Returns "fake id" which masquerades as a UNIX-style "small
139 * non-negative integer" file/socket descriptor.
140 * Win32_* routine below will "do the right thing" based on the
141 * descriptor's actual type. -1 indicates failure.
144 * Entry in fdTable is reserved to represent the socket/file.
146 *--------------------------------------------------------------
148 static int Win32NewDescriptor(FILE_TYPE type, int fd, int desiredFd)
152 EnterCriticalSection(&fdTableCritical);
155 * If desiredFd is set, try to get this entry (this is used for
156 * mapping stdio handles). Otherwise try to get the fd entry.
157 * If this is not available, find a the first empty slot. .
159 if (desiredFd >= 0 && desiredFd < WIN32_OPEN_MAX)
161 if (fdTable[desiredFd].type == FD_UNUSED)
168 if (fd < WIN32_OPEN_MAX && fdTable[fd].type == FD_UNUSED)
176 for (i = 1; i < WIN32_OPEN_MAX; ++i)
178 if (fdTable[i].type == FD_UNUSED)
189 fdTable[index].fid.value = fd;
190 fdTable[index].type = type;
191 fdTable[index].path = NULL;
192 fdTable[index].Errno = NO_ERROR;
193 fdTable[index].status = 0;
194 fdTable[index].offset = -1;
195 fdTable[index].offsetHighPtr = fdTable[index].offsetLowPtr = NULL;
196 fdTable[index].hMapMutex = NULL;
197 fdTable[index].ovList = NULL;
200 LeaveCriticalSection(&fdTableCritical);
205 *--------------------------------------------------------------
209 * This thread performs I/O on stadard input. It is needed
210 * because you can't guarantee that all applications will
211 * create standard input with sufficient access to perform
212 * asynchronous I/O. Since we don't want to block the app
213 * reading from stdin we make it look like it's using I/O
214 * completion ports to perform async I/O.
217 * Data is read from stdin and posted to the io completion
223 *--------------------------------------------------------------
225 static void StdinThread(LPDWORD startup){
229 unsigned long bytesRead;
230 POVERLAPPED_REQUEST pOv;
232 // Touch the arg to prevent warning
237 * Block until a request to read from stdin comes in or a
238 * request to terminate the thread arrives (fd = -1).
240 if (!GetQueuedCompletionStatus(hStdinCompPort, &bytesRead, &fd,
241 (LPOVERLAPPED *)&pOv, (DWORD)-1) && !pOv) {
246 ASSERT((fd == STDIN_FILENO) || (fd == -1));
251 ASSERT(pOv->clientData1 != NULL);
253 if(ReadFile(stdioHandles[STDIN_FILENO], pOv->clientData1, bytesRead,
255 PostQueuedCompletionStatus(hIoCompPort, bytesRead,
256 STDIN_FILENO, (LPOVERLAPPED)pOv);
266 void OS_ShutdownPending(void)
268 shutdownPending = TRUE;
271 /* XXX Need a shutdown now event */
272 static DWORD WINAPI ShutdownRequestThread(LPVOID arg)
274 HANDLE shutdownEvent = (HANDLE) arg;
276 if (WaitForSingleObject(shutdownEvent, INFINITE) == WAIT_FAILED)
278 // Assuming it will happen again, all we can do is exit the thread
283 // "Simple reads and writes to properly-aligned 32-bit variables are atomic"
284 shutdownPending = TRUE;
286 // Before an accept() is entered the shutdownPending flag is checked.
287 // If set, OS_Accept() will return -1. If not, it waits
288 // on a connection request for one second, checks the flag, & repeats.
289 // Only one process/thread is allowed to do this at time by
290 // wrapping the accept() with mutex.
296 *--------------------------------------------------------------
300 * Set up the OS library for use.
303 * Returns 0 if success, -1 if not.
306 * Sockets initialized, pseudo file descriptors setup, etc.
308 *--------------------------------------------------------------
310 int OS_LibInit(int stdioFds[3])
317 char *cLenPtr = NULL;
323 InitializeCriticalSection(&fdTableCritical);
326 * Initialize windows sockets library.
328 wVersion = MAKEWORD(2,0);
329 err = WSAStartup( wVersion, &wsaData );
331 fprintf(stderr, "Error starting Windows Sockets. Error: %d",
337 * Create the I/O completion port to be used for our I/O queue.
339 if (hIoCompPort == INVALID_HANDLE_VALUE) {
340 hIoCompPort = CreateIoCompletionPort (INVALID_HANDLE_VALUE, NULL,
342 if(hIoCompPort == INVALID_HANDLE_VALUE) {
343 printf("<H2>OS_LibInit Failed CreateIoCompletionPort! ERROR: %d</H2>\r\n\r\n",
350 * If a shutdown event is in the env, save it (I don't see any to
351 * remove it from the environment out from under the application).
352 * Spawn a thread to wait on the shutdown request.
354 val = getenv(SHUTDOWN_EVENT_NAME);
357 HANDLE shutdownEvent = (HANDLE) atoi(val);
359 if (! CreateThread(NULL, 0, ShutdownRequestThread,
360 shutdownEvent, 0, NULL))
367 * If an accept mutex is in the env, save it and remove it.
369 val = getenv(MUTEX_VARNAME);
372 acceptMutex = (HANDLE) atoi(val);
377 * Determine if this library is being used to listen for FastCGI
378 * connections. This is communicated by STDIN containing a
379 * valid handle to a listener object. In this case, both the
380 * "stdout" and "stderr" handles will be INVALID (ie. closed) by
381 * the starting process.
383 * The trick is determining if this is a pipe or a socket...
385 * XXX: Add the async accept test to determine socket or handle to a
388 if((GetStdHandle(STD_OUTPUT_HANDLE) == INVALID_HANDLE_VALUE) &&
389 (GetStdHandle(STD_ERROR_HANDLE) == INVALID_HANDLE_VALUE) &&
390 (GetStdHandle(STD_INPUT_HANDLE) != INVALID_HANDLE_VALUE) )
392 DWORD pipeMode = PIPE_READMODE_BYTE | PIPE_WAIT;
393 HANDLE oldStdIn = GetStdHandle(STD_INPUT_HANDLE);
395 // Move the handle to a "low" number
396 if (! DuplicateHandle(GetCurrentProcess(), oldStdIn,
397 GetCurrentProcess(), &hListen,
398 0, TRUE, DUPLICATE_SAME_ACCESS))
403 if (! SetStdHandle(STD_INPUT_HANDLE, hListen))
408 CloseHandle(oldStdIn);
411 * Set the pipe handle state so that it operates in wait mode.
413 * NOTE: The listenFd is not mapped to a pseudo file descriptor
414 * as all work done on it is contained to the OS library.
416 * XXX: Initial assumption is that SetNamedPipeHandleState will
417 * fail if this is an IP socket...
419 if (SetNamedPipeHandleState(hListen, &pipeMode, NULL, NULL))
421 listenType = FD_PIPE_SYNC;
422 listenOverlapped.hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
426 listenType = FD_SOCKET_SYNC;
431 * If there are no stdioFds passed in, we're done.
433 if(stdioFds == NULL) {
439 * Setup standard input asynchronous I/O. There is actually a separate
440 * thread spawned for this purpose. The reason for this is that some
441 * web servers use anonymous pipes for the connection between itself
442 * and a CGI application. Anonymous pipes can't perform asynchronous
443 * I/O or use I/O completion ports. Therefore in order to present a
444 * consistent I/O dispatch model to an application we emulate I/O
445 * completion port behavior by having the standard input thread posting
446 * messages to the hIoCompPort which look like a complete overlapped
447 * I/O structure. This keeps the event dispatching simple from the
448 * application perspective.
450 stdioHandles[STDIN_FILENO] = GetStdHandle(STD_INPUT_HANDLE);
452 if(!SetHandleInformation(stdioHandles[STDIN_FILENO],
453 HANDLE_FLAG_INHERIT, 0)) {
455 * XXX: Causes error when run from command line. Check KB
456 err = GetLastError();
462 if ((fakeFd = Win32NewDescriptor(FD_PIPE_SYNC,
463 (int)stdioHandles[STDIN_FILENO],
464 STDIN_FILENO)) == -1) {
468 * Set stdin equal to our pseudo FD and create the I/O completion
469 * port to be used for async I/O.
471 stdioFds[STDIN_FILENO] = fakeFd;
475 * Create the I/O completion port to be used for communicating with
476 * the thread doing I/O on standard in. This port will carry read
477 * and possibly thread termination requests to the StdinThread.
479 if (hStdinCompPort == INVALID_HANDLE_VALUE) {
480 hStdinCompPort = CreateIoCompletionPort (INVALID_HANDLE_VALUE, NULL,
482 if(hStdinCompPort == INVALID_HANDLE_VALUE) {
483 printf("<H2>OS_LibInit Failed CreateIoCompletionPort: STDIN! ERROR: %d</H2>\r\n\r\n",
490 * Create the thread that will read stdin if the CONTENT_LENGTH
493 if((cLenPtr = getenv("CONTENT_LENGTH")) != NULL &&
495 hStdinThread = CreateThread(NULL, 8192,
496 (LPTHREAD_START_ROUTINE)&StdinThread,
498 if (hStdinThread == NULL) {
499 printf("<H2>OS_LibInit Failed to create STDIN thread! ERROR: %d</H2>\r\n\r\n",
506 * STDOUT will be used synchronously.
508 * XXX: May want to convert this so that it could be used for OVERLAPPED
509 * I/O later. If so, model it after the Stdin I/O as stdout is
510 * also incapable of async I/O on some servers.
512 stdioHandles[STDOUT_FILENO] = GetStdHandle(STD_OUTPUT_HANDLE);
513 if(!SetHandleInformation(stdioHandles[STDOUT_FILENO],
514 HANDLE_FLAG_INHERIT, FALSE)) {
519 if ((fakeFd = Win32NewDescriptor(FD_PIPE_SYNC,
520 (int)stdioHandles[STDOUT_FILENO],
521 STDOUT_FILENO)) == -1) {
525 * Set stdout equal to our pseudo FD
527 stdioFds[STDOUT_FILENO] = fakeFd;
530 stdioHandles[STDERR_FILENO] = GetStdHandle(STD_ERROR_HANDLE);
531 if(!SetHandleInformation(stdioHandles[STDERR_FILENO],
532 HANDLE_FLAG_INHERIT, FALSE)) {
536 if ((fakeFd = Win32NewDescriptor(FD_PIPE_SYNC,
537 (int)stdioHandles[STDERR_FILENO],
538 STDERR_FILENO)) == -1) {
542 * Set stderr equal to our pseudo FD
544 stdioFds[STDERR_FILENO] = fakeFd;
551 *--------------------------------------------------------------
555 * Shutdown the OS library.
561 * Memory freed, handles closed.
563 *--------------------------------------------------------------
565 void OS_LibShutdown()
568 if (hIoCompPort != INVALID_HANDLE_VALUE)
570 CloseHandle(hIoCompPort);
571 hIoCompPort = INVALID_HANDLE_VALUE;
574 if (hStdinCompPort != INVALID_HANDLE_VALUE)
576 CloseHandle(hStdinCompPort);
577 hStdinCompPort = INVALID_HANDLE_VALUE;
580 if (acceptMutex != INVALID_HANDLE_VALUE)
582 ReleaseMutex(acceptMutex);
585 DisconnectNamedPipe(hListen);
594 *--------------------------------------------------------------
596 * Win32FreeDescriptor --
598 * Free I/O descriptor entry in fdTable.
601 * Frees I/O descriptor entry in fdTable.
606 *--------------------------------------------------------------
608 static void Win32FreeDescriptor(int fd)
610 /* Catch it if fd is a bogus value */
611 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
613 EnterCriticalSection(&fdTableCritical);
615 if (fdTable[fd].type != FD_UNUSED)
617 switch (fdTable[fd].type)
622 /* Free file path string */
623 ASSERT(fdTable[fd].path != NULL);
624 free(fdTable[fd].path);
625 fdTable[fd].path = NULL;
632 ASSERT(fdTable[fd].path == NULL);
634 fdTable[fd].type = FD_UNUSED;
635 fdTable[fd].path = NULL;
636 fdTable[fd].Errno = NO_ERROR;
637 fdTable[fd].offsetHighPtr = fdTable[fd].offsetLowPtr = NULL;
639 if (fdTable[fd].hMapMutex != NULL)
641 CloseHandle(fdTable[fd].hMapMutex);
642 fdTable[fd].hMapMutex = NULL;
646 LeaveCriticalSection(&fdTableCritical);
651 static short getPort(const char * bindPath)
654 char * p = strchr(bindPath, ':');
663 port = (short) atoi(buf);
670 * OS_CreateLocalIpcFd --
672 * This procedure is responsible for creating the listener pipe
673 * on Windows NT for local process communication. It will create a
674 * named pipe and return a file descriptor to it to the caller.
677 * Listener pipe created. This call returns either a valid
678 * pseudo file descriptor or -1 on error.
681 * Listener pipe and IPC address are stored in the FCGI info
683 * 'errno' will set on errors (-1 is returned).
685 *----------------------------------------------------------------------
687 int OS_CreateLocalIpcFd(const char *bindPath, int backlog)
690 short port = getPort(bindPath);
691 HANDLE mutex = CreateMutex(NULL, FALSE, NULL);
692 char * mutexEnvString;
699 if (! SetHandleInformation(mutex, HANDLE_FLAG_INHERIT, TRUE))
704 // This is a nail for listening to more than one port..
705 // This should really be handled by the caller.
707 mutexEnvString = malloc(strlen(MUTEX_VARNAME) + 7);
708 sprintf(mutexEnvString, MUTEX_VARNAME "=%d", (int) mutex);
709 putenv(mutexEnvString);
711 // There's nothing to be gained (at the moment) by a shutdown Event
713 if (port && *bindPath != ':' && strncmp(bindPath, LOCALHOST, strlen(LOCALHOST)))
715 fprintf(stderr, "To start a service on a TCP port can not "
716 "specify a host name.\n"
717 "You should either use \"localhost:<port>\" or "
718 " just use \":<port>.\"\n");
722 listenType = (port) ? FD_SOCKET_SYNC : FD_PIPE_ASYNC;
727 struct sockaddr_in sockAddr;
728 int sockLen = sizeof(sockAddr);
730 memset(&sockAddr, 0, sizeof(sockAddr));
731 sockAddr.sin_family = AF_INET;
732 sockAddr.sin_addr.s_addr = htonl(INADDR_ANY);
733 sockAddr.sin_port = htons(port);
735 listenSock = socket(AF_INET, SOCK_STREAM, 0);
736 if (listenSock == INVALID_SOCKET)
741 if (bind(listenSock, (struct sockaddr *) &sockAddr, sockLen) )
746 if (listen(listenSock, backlog))
751 pseudoFd = Win32NewDescriptor(listenType, listenSock, -1);
755 closesocket(listenSock);
759 hListen = (HANDLE) listenSock;
763 HANDLE hListenPipe = INVALID_HANDLE_VALUE;
764 char *pipePath = malloc(strlen(bindPathPrefix) + strlen(bindPath) + 1);
771 strcpy(pipePath, bindPathPrefix);
772 strcat(pipePath, bindPath);
774 hListenPipe = CreateNamedPipe(pipePath,
775 PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED,
776 PIPE_TYPE_BYTE | PIPE_WAIT | PIPE_READMODE_BYTE,
777 PIPE_UNLIMITED_INSTANCES,
778 4096, 4096, 0, NULL);
782 if (hListenPipe == INVALID_HANDLE_VALUE)
787 if (! SetHandleInformation(hListenPipe, HANDLE_FLAG_INHERIT, TRUE))
792 pseudoFd = Win32NewDescriptor(listenType, (int) hListenPipe, -1);
796 CloseHandle(hListenPipe);
800 hListen = (HANDLE) hListenPipe;
807 *----------------------------------------------------------------------
811 * Create the pipe pathname connect to the remote application if
815 * -1 if fail or a valid handle if connection succeeds.
818 * Remote connection established.
820 *----------------------------------------------------------------------
822 int OS_FcgiConnect(char *bindPath)
824 short port = getPort(bindPath);
831 struct sockaddr_in sockAddr;
832 int sockLen = sizeof(sockAddr);
835 if (*bindPath != ':')
837 char * p = strchr(bindPath, ':');
838 int len = p - bindPath + 1;
841 strncpy(host, bindPath, len);
845 hp = gethostbyname(host ? host : LOCALHOST);
854 fprintf(stderr, "Unknown host: %s\n", bindPath);
858 memset(&sockAddr, 0, sizeof(sockAddr));
859 sockAddr.sin_family = AF_INET;
860 memcpy(&sockAddr.sin_addr, hp->h_addr, hp->h_length);
861 sockAddr.sin_port = htons(port);
863 sock = socket(AF_INET, SOCK_STREAM, 0);
864 if (sock == INVALID_SOCKET)
869 if (! connect(sock, (struct sockaddr *) &sockAddr, sockLen))
875 pseudoFd = Win32NewDescriptor(FD_SOCKET_SYNC, sock, -1);
884 char *pipePath = malloc(strlen(bindPathPrefix) + strlen(bindPath) + 1);
892 strcpy(pipePath, bindPathPrefix);
893 strcat(pipePath, bindPath);
895 hPipe = CreateFile(pipePath,
896 GENERIC_WRITE | GENERIC_READ,
897 FILE_SHARE_READ | FILE_SHARE_WRITE,
900 FILE_FLAG_OVERLAPPED,
905 if( hPipe == INVALID_HANDLE_VALUE)
910 pseudoFd = Win32NewDescriptor(FD_PIPE_ASYNC, (int) hPipe, -1);
919 * Set stdin equal to our pseudo FD and create the I/O completion
920 * port to be used for async I/O.
922 if (! CreateIoCompletionPort(hPipe, hIoCompPort, pseudoFd, 1))
924 Win32FreeDescriptor(pseudoFd);
934 *--------------------------------------------------------------
938 * Pass through to the appropriate NT read function.
941 * Returns number of byes read. Mimics unix read:.
942 * n bytes read, 0 or -1 failure: errno contains actual error
947 *--------------------------------------------------------------
949 int OS_Read(int fd, char * buf, size_t len)
954 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
956 if (shutdownNow) return -1;
958 switch (fdTable[fd].type)
965 if (ReadFile(fdTable[fd].fid.fileHandle, buf, len, &bytesRead, NULL))
971 fdTable[fd].Errno = GetLastError();
977 case FD_SOCKET_ASYNC:
979 ret = recv(fdTable[fd].fid.sock, buf, len, 0);
980 if (ret == SOCKET_ERROR)
982 fdTable[fd].Errno = WSAGetLastError();
997 *--------------------------------------------------------------
1001 * Perform a synchronous OS write.
1004 * Returns number of bytes written. Mimics unix write:
1005 * n bytes written, 0 or -1 failure (??? couldn't find man page).
1010 *--------------------------------------------------------------
1012 int OS_Write(int fd, char * buf, size_t len)
1017 ASSERT(fd >= 0 && fd < WIN32_OPEN_MAX);
1019 if (shutdownNow) return -1;
1021 switch (fdTable[fd].type)
1028 if (WriteFile(fdTable[fd].fid.fileHandle, buf, len, &bytesWritten, NULL))
1034 fdTable[fd].Errno = GetLastError();
1039 case FD_SOCKET_SYNC:
1040 case FD_SOCKET_ASYNC:
1042 ret = send(fdTable[fd].fid.sock, buf, len, 0);
1043 if (ret == SOCKET_ERROR)
1045 fdTable[fd].Errno = WSAGetLastError();
1060 *----------------------------------------------------------------------
1064 * Spawns a new server listener process, and stores the information
1065 * relating to the child in the supplied record. A wait handler is
1066 * registered on the child's completion. This involves creating
1067 * a process on NT and preparing a command line with the required
1068 * state (currently a -childproc flag and the server socket to use
1069 * for accepting connections).
1072 * 0 if success, -1 if error.
1075 * Child process spawned.
1077 *----------------------------------------------------------------------
1079 int OS_SpawnChild(char *execPath, int listenFd)
1081 STARTUPINFO StartupInfo;
1082 PROCESS_INFORMATION pInfo;
1085 memset((void *)&StartupInfo, 0, sizeof(STARTUPINFO));
1086 StartupInfo.cb = sizeof (STARTUPINFO);
1087 StartupInfo.lpReserved = NULL;
1088 StartupInfo.lpReserved2 = NULL;
1089 StartupInfo.cbReserved2 = 0;
1090 StartupInfo.lpDesktop = NULL;
1093 * FastCGI on NT will set the listener pipe HANDLE in the stdin of
1094 * the new process. The fact that there is a stdin and NULL handles
1095 * for stdout and stderr tells the FastCGI process that this is a
1096 * FastCGI process and not a CGI process.
1098 StartupInfo.dwFlags = STARTF_USESTDHANDLES;
1100 * XXX: Do I have to dup the handle before spawning the process or is
1101 * it sufficient to use the handle as it's reference counted
1104 StartupInfo.hStdInput = fdTable[listenFd].fid.fileHandle;
1105 StartupInfo.hStdOutput = INVALID_HANDLE_VALUE;
1106 StartupInfo.hStdError = INVALID_HANDLE_VALUE;
1109 * Make the listener socket inheritable.
1111 success = SetHandleInformation(StartupInfo.hStdInput, HANDLE_FLAG_INHERIT,
1118 * XXX: Might want to apply some specific security attributes to the
1121 success = CreateProcess(execPath, /* LPCSTR address of module name */
1122 NULL, /* LPCSTR address of command line */
1123 NULL, /* Process security attributes */
1124 NULL, /* Thread security attributes */
1125 TRUE, /* Inheritable Handes inherited. */
1126 0, /* DWORD creation flags */
1127 NULL, /* Use parent environment block */
1128 NULL, /* Address of current directory name */
1129 &StartupInfo, /* Address of STARTUPINFO */
1130 &pInfo); /* Address of PROCESS_INFORMATION */
1139 *--------------------------------------------------------------
1141 * OS_AsyncReadStdin --
1143 * This initiates an asynchronous read on the standard
1144 * input handle. This handle is not guaranteed to be
1145 * capable of performing asynchronous I/O so we send a
1146 * message to the StdinThread to do the synchronous read.
1149 * -1 if error, 0 otherwise.
1152 * Asynchronous message is queued to the StdinThread and an
1153 * overlapped structure is allocated/initialized.
1155 *--------------------------------------------------------------
1157 int OS_AsyncReadStdin(void *buf, int len, OS_AsyncProc procPtr,
1158 ClientData clientData)
1160 POVERLAPPED_REQUEST pOv;
1162 ASSERT(fdTable[STDIN_FILENO].type != FD_UNUSED);
1164 pOv = (POVERLAPPED_REQUEST)malloc(sizeof(struct OVERLAPPED_REQUEST));
1166 memset((void *)pOv, 0, sizeof(struct OVERLAPPED_REQUEST));
1167 pOv->clientData1 = (ClientData)buf;
1168 pOv->instance = fdTable[STDIN_FILENO].instance;
1169 pOv->procPtr = procPtr;
1170 pOv->clientData = clientData;
1172 PostQueuedCompletionStatus(hStdinCompPort, len, STDIN_FILENO,
1178 *--------------------------------------------------------------
1182 * This initiates an asynchronous read on the file
1183 * handle which may be a socket or named pipe.
1185 * We also must save the ProcPtr and ClientData, so later
1186 * when the io completes, we know who to call.
1188 * We don't look at any results here (the ReadFile may
1189 * return data if it is cached) but do all completion
1190 * processing in OS_Select when we get the io completion
1191 * port done notifications. Then we call the callback.
1194 * -1 if error, 0 otherwise.
1197 * Asynchronous I/O operation is queued for completion.
1199 *--------------------------------------------------------------
1201 int OS_AsyncRead(int fd, int offset, void *buf, int len,
1202 OS_AsyncProc procPtr, ClientData clientData)
1205 POVERLAPPED_REQUEST pOv;
1208 * Catch any bogus fd values
1210 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
1212 * Confirm that this is an async fd
1214 ASSERT(fdTable[fd].type != FD_UNUSED);
1215 ASSERT(fdTable[fd].type != FD_FILE_SYNC);
1216 ASSERT(fdTable[fd].type != FD_PIPE_SYNC);
1217 ASSERT(fdTable[fd].type != FD_SOCKET_SYNC);
1219 pOv = (POVERLAPPED_REQUEST)malloc(sizeof(struct OVERLAPPED_REQUEST));
1221 memset((void *)pOv, 0, sizeof(struct OVERLAPPED_REQUEST));
1223 * Only file offsets should be non-zero, but make sure.
1225 if (fdTable[fd].type == FD_FILE_ASYNC)
1226 if (fdTable[fd].offset >= 0)
1227 pOv->overlapped.Offset = fdTable[fd].offset;
1229 pOv->overlapped.Offset = offset;
1230 pOv->instance = fdTable[fd].instance;
1231 pOv->procPtr = procPtr;
1232 pOv->clientData = clientData;
1235 * ReadFile returns: TRUE success, FALSE failure
1237 if (!ReadFile(fdTable[fd].fid.fileHandle, buf, len, &bytesRead,
1238 (LPOVERLAPPED)pOv)) {
1239 fdTable[fd].Errno = GetLastError();
1240 if(fdTable[fd].Errno == ERROR_NO_DATA ||
1241 fdTable[fd].Errno == ERROR_PIPE_NOT_CONNECTED) {
1242 PostQueuedCompletionStatus(hIoCompPort, 0, fd, (LPOVERLAPPED)pOv);
1245 if(fdTable[fd].Errno != ERROR_IO_PENDING) {
1246 PostQueuedCompletionStatus(hIoCompPort, 0, fd, (LPOVERLAPPED)pOv);
1249 fdTable[fd].Errno = 0;
1255 *--------------------------------------------------------------
1259 * This initiates an asynchronous write on the "fake" file
1260 * descriptor (which may be a file, socket, or named pipe).
1261 * We also must save the ProcPtr and ClientData, so later
1262 * when the io completes, we know who to call.
1264 * We don't look at any results here (the WriteFile generally
1265 * completes immediately) but do all completion processing
1266 * in OS_DoIo when we get the io completion port done
1267 * notifications. Then we call the callback.
1270 * -1 if error, 0 otherwise.
1273 * Asynchronous I/O operation is queued for completion.
1275 *--------------------------------------------------------------
1277 int OS_AsyncWrite(int fd, int offset, void *buf, int len,
1278 OS_AsyncProc procPtr, ClientData clientData)
1281 POVERLAPPED_REQUEST pOv;
1284 * Catch any bogus fd values
1286 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
1288 * Confirm that this is an async fd
1290 ASSERT(fdTable[fd].type != FD_UNUSED);
1291 ASSERT(fdTable[fd].type != FD_FILE_SYNC);
1292 ASSERT(fdTable[fd].type != FD_PIPE_SYNC);
1293 ASSERT(fdTable[fd].type != FD_SOCKET_SYNC);
1295 pOv = (POVERLAPPED_REQUEST)malloc(sizeof(struct OVERLAPPED_REQUEST));
1297 memset((void *)pOv, 0, sizeof(struct OVERLAPPED_REQUEST));
1299 * Only file offsets should be non-zero, but make sure.
1301 if (fdTable[fd].type == FD_FILE_ASYNC)
1303 * Only file opened via OS_AsyncWrite with
1304 * O_APPEND will have an offset != -1.
1306 if (fdTable[fd].offset >= 0)
1308 * If the descriptor has a memory mapped file
1309 * handle, take the offsets from there.
1311 if (fdTable[fd].hMapMutex != NULL) {
1313 * Wait infinitely; this *should* not cause problems.
1315 WaitForSingleObject(fdTable[fd].hMapMutex, INFINITE);
1318 * Retrieve the shared offset values.
1320 pOv->overlapped.OffsetHigh = *(fdTable[fd].offsetHighPtr);
1321 pOv->overlapped.Offset = *(fdTable[fd].offsetLowPtr);
1324 * Update the shared offset values for the next write
1326 *(fdTable[fd].offsetHighPtr) += 0; /* XXX How do I handle overflow */
1327 *(fdTable[fd].offsetLowPtr) += len;
1329 ReleaseMutex(fdTable[fd].hMapMutex);
1331 pOv->overlapped.Offset = fdTable[fd].offset;
1333 pOv->overlapped.Offset = offset;
1334 pOv->instance = fdTable[fd].instance;
1335 pOv->procPtr = procPtr;
1336 pOv->clientData = clientData;
1339 * WriteFile returns: TRUE success, FALSE failure
1341 if (!WriteFile(fdTable[fd].fid.fileHandle, buf, len, &bytesWritten,
1342 (LPOVERLAPPED)pOv)) {
1343 fdTable[fd].Errno = GetLastError();
1344 if(fdTable[fd].Errno != ERROR_IO_PENDING) {
1345 PostQueuedCompletionStatus(hIoCompPort, 0, fd, (LPOVERLAPPED)pOv);
1348 fdTable[fd].Errno = 0;
1350 if (fdTable[fd].offset >= 0)
1351 fdTable[fd].offset += len;
1356 *--------------------------------------------------------------
1360 * Closes the descriptor with routine appropriate for
1361 * descriptor's type.
1364 * Socket or file is closed. Return values mimic Unix close:
1365 * 0 success, -1 failure
1368 * Entry in fdTable is marked as free.
1370 *--------------------------------------------------------------
1372 int OS_Close(int fd)
1377 * Catch it if fd is a bogus value
1379 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
1380 ASSERT(fdTable[fd].type != FD_UNUSED);
1382 switch (fdTable[fd].type) {
1389 case FD_SOCKET_SYNC:
1390 case FD_SOCKET_ASYNC:
1392 * Closing a socket that has an async read outstanding causes a
1393 * tcp reset and possible data loss. The shutdown call seems to
1396 shutdown(fdTable[fd].fid.sock, 2);
1398 * closesocket returns: 0 success, SOCKET_ERROR failure
1400 if (closesocket(fdTable[fd].fid.sock) == SOCKET_ERROR)
1404 return -1; /* fake failure */
1407 Win32FreeDescriptor(fd);
1412 *--------------------------------------------------------------
1416 * Cancel outstanding asynchronous reads and prevent subsequent
1417 * reads from completing.
1420 * Socket or file is shutdown. Return values mimic Unix shutdown:
1421 * 0 success, -1 failure
1423 *--------------------------------------------------------------
1425 int OS_CloseRead(int fd)
1430 * Catch it if fd is a bogus value
1432 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
1433 ASSERT(fdTable[fd].type == FD_SOCKET_ASYNC
1434 || fdTable[fd].type == FD_SOCKET_SYNC);
1436 if (shutdown(fdTable[fd].fid.sock,0) == SOCKET_ERROR)
1442 *--------------------------------------------------------------
1446 * This function was formerly OS_Select. It's purpose is
1447 * to pull I/O completion events off the queue and dispatch
1448 * them to the appropriate place.
1454 * Handlers are called.
1456 *--------------------------------------------------------------
1458 int OS_DoIo(struct timeval *tmo)
1461 unsigned long bytes;
1462 POVERLAPPED_REQUEST pOv;
1469 * We can loop in here, but not too long, as wait handlers
1471 * For cgi stdin, apparently select returns when io completion
1472 * ports don't, so don't wait the full timeout.
1475 ms = (tmo->tv_sec*1000 + tmo->tv_usec/1000) / 2;
1479 ms_last = tb.time*1000 + tb.millitm;
1481 if(tmo && (ms = tmo->tv_sec*1000 + tmo->tv_usec/1000)> 100)
1483 if (!GetQueuedCompletionStatus(hIoCompPort, &bytes, &fd,
1484 (LPOVERLAPPED *)&pOv, ms) && !pOv) {
1485 err = WSAGetLastError();
1486 return 0; /* timeout */
1489 ASSERT((fd >= 0) && (fd < WIN32_OPEN_MAX));
1490 /* call callback if descriptor still valid */
1492 if(pOv->instance == fdTable[fd].instance)
1493 (*pOv->procPtr)(pOv->clientData, bytes);
1497 ms -= (tb.time*1000 + tb.millitm - ms_last);
1498 ms_last = tb.time*1000 + tb.millitm;
1503 static int isAddrOK(struct sockaddr_in * inet_sockaddr, const char * okAddrs)
1505 static const char *token = " ,;:\t";
1509 if (okAddrs == NULL) return TRUE;
1511 ipaddr = inet_ntoa(inet_sockaddr->sin_addr);
1512 p = strstr(okAddrs, ipaddr);
1514 if (p == NULL) return FALSE;
1518 p += strlen(ipaddr);
1519 return (strchr(token, *p) != NULL);
1522 if (strchr(token, *--p) != NULL)
1524 p += strlen(ipaddr) + 1;
1525 return (strchr(token, *p) != NULL);
1532 static int CALLBACK isAddrOKCallback(LPWSABUF lpCallerId,
1541 struct sockaddr_in *sockaddr = (struct sockaddr_in *) lpCallerId->buf;
1543 // Touch the args to avoid warnings
1544 dc0 = NULL; dc1 = NULL; dc2 = NULL; dc3 = NULL; dc4 = NULL; dc5 = NULL;
1546 if ((void *) data == NULL) return CF_ACCEPT;
1548 if (sockaddr->sin_family != AF_INET) return CF_ACCEPT;
1550 return isAddrOK(sockaddr, (const char *) data) ? CF_ACCEPT : CF_REJECT;
1554 static printLastError(const char * text)
1559 FORMAT_MESSAGE_ALLOCATE_BUFFER |
1560 FORMAT_MESSAGE_FROM_SYSTEM |
1561 FORMAT_MESSAGE_IGNORE_INSERTS,
1570 fprintf(stderr, "%s: %s\n", text, (LPCTSTR) buf);
1574 static int acceptNamedPipe()
1578 if (! ConnectNamedPipe(hListen, &listenOverlapped))
1580 switch (GetLastError())
1582 case ERROR_PIPE_CONNECTED:
1584 // A client connected after CreateNamedPipe but
1585 // before ConnectNamedPipe. Its a good connection.
1589 case ERROR_IO_PENDING:
1591 // Wait for a connection to complete.
1593 while (WaitForSingleObject(listenOverlapped.hEvent,
1594 ACCEPT_TIMEOUT) == WAIT_TIMEOUT)
1596 if (shutdownPending)
1605 case ERROR_PIPE_LISTENING:
1607 // The pipe handle is in nonblocking mode.
1611 // The previous client closed its handle (and we failed
1612 // to call DisconnectNamedPipe)
1616 printLastError("unexpected ConnectNamedPipe() error");
1620 ipcFd = Win32NewDescriptor(FD_PIPE_SYNC, (int) hListen, -1);
1623 DisconnectNamedPipe(hListen);
1629 static int acceptSocket(const char *webServerAddrs)
1636 struct sockaddr sockaddr;
1637 int sockaddrLen = sizeof(sockaddr);
1641 const struct timeval timeout = {1, 0};
1645 FD_SET((unsigned int) hListen, &readfds);
1647 if (select(0, &readfds, NULL, NULL, &timeout) == 0)
1649 if (shutdownPending)
1662 hSock = accept((SOCKET) hListen, &sockaddr, &sockaddrLen);
1664 if (hSock == INVALID_SOCKET)
1669 if (isAddrOK((struct sockaddr_in *) &sockaddr, webServerAddrs))
1676 hSock = WSAAccept((unsigned int) hListen,
1680 (DWORD) webServerAddrs);
1682 if (hSock != INVALID_SOCKET)
1687 if (WSAGetLastError() != WSAECONNREFUSED)
1694 if (hSock == INVALID_SOCKET)
1696 /* Use FormatMessage() */
1697 fprintf(stderr, "accept()/WSAAccept() failed: %d", WSAGetLastError());
1701 ipcFd = Win32NewDescriptor(FD_SOCKET_SYNC, hSock, -1);
1711 *----------------------------------------------------------------------
1715 * Accepts a new FastCGI connection. This routine knows whether
1716 * we're dealing with TCP based sockets or NT Named Pipes for IPC.
1718 * fail_on_intr is ignored in the Win lib.
1721 * -1 if the operation fails, otherwise this is a valid IPC fd.
1723 *----------------------------------------------------------------------
1725 int OS_Accept(int listen_sock, int fail_on_intr, const char *webServerAddrs)
1729 // Touch args to prevent warnings
1730 listen_sock = 0; fail_on_intr = 0;
1732 // @todo Muliple listen sockets and sockets other than 0 are not
1733 // supported due to the use of globals.
1735 if (shutdownPending)
1741 // The mutex is to keep other processes (and threads, when supported)
1742 // from going into the accept cycle. The accept cycle needs to
1743 // periodically break out to check the state of the shutdown flag
1744 // and there's no point to having more than one thread do that.
1746 if (acceptMutex != INVALID_HANDLE_VALUE)
1748 if (WaitForSingleObject(acceptMutex, INFINITE) == WAIT_FAILED)
1750 printLastError("WaitForSingleObject() failed");
1755 if (shutdownPending)
1759 else if (listenType == FD_PIPE_SYNC)
1761 ipcFd = acceptNamedPipe();
1763 else if (listenType == FD_SOCKET_SYNC)
1765 ipcFd = acceptSocket(webServerAddrs);
1769 fprintf(stderr, "unknown listenType (%d)\n", listenType);
1772 if (acceptMutex != INVALID_HANDLE_VALUE)
1774 ReleaseMutex(acceptMutex);
1781 *----------------------------------------------------------------------
1785 * OS IPC routine to close an IPC connection.
1791 * IPC connection is closed.
1793 *----------------------------------------------------------------------
1795 int OS_IpcClose(int ipcFd)
1801 * Catch it if fd is a bogus value
1803 ASSERT((ipcFd >= 0) && (ipcFd < WIN32_OPEN_MAX));
1804 ASSERT(fdTable[ipcFd].type != FD_UNUSED);
1806 switch(listenType) {
1810 * Make sure that the client (ie. a Web Server in this case) has
1811 * read all data from the pipe before we disconnect.
1813 if(!FlushFileBuffers(fdTable[ipcFd].fid.fileHandle))
1815 if(DisconnectNamedPipe(fdTable[ipcFd].fid.fileHandle)) {
1823 case FD_SOCKET_SYNC:
1836 *----------------------------------------------------------------------
1840 * Determines whether this process is a FastCGI process or not.
1843 * Returns 1 if FastCGI, 0 if not.
1848 *----------------------------------------------------------------------
1850 int OS_IsFcgi(int sock)
1852 // Touch args to prevent warnings
1855 /* XXX This is broken for sock */
1857 return (listenType != FD_UNUSED);
1861 *----------------------------------------------------------------------
1865 * Sets selected flag bits in an open file descriptor. Currently
1866 * this is only to put a SOCKET into non-blocking mode.
1868 *----------------------------------------------------------------------
1870 void OS_SetFlags(int fd, int flags)
1872 unsigned long pLong = 1L;
1875 if (fdTable[fd].type == FD_SOCKET_SYNC && flags == O_NONBLOCK) {
1876 if (ioctlsocket(fdTable[fd].fid.sock, FIONBIO, &pLong) ==
1878 exit(WSAGetLastError());
1880 if (!CreateIoCompletionPort((HANDLE)fdTable[fd].fid.sock,
1881 hIoCompPort, fd, 1)) {
1882 err = GetLastError();
1886 fdTable[fd].type = FD_SOCKET_ASYNC;