/* Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License.
*/
if (!execuser || !execgroup) { return APR_ENOMEM;
}
i = 0; while (args[i])
i++; /* allocate space for 4 new args, the input args, and a null terminator */
newargs = apr_palloc(p, sizeof(char *) * (i + 4));
newprogname = SUEXEC_BIN;
newargs[0] = SUEXEC_BIN;
newargs[1] = execuser;
newargs[2] = execgroup;
newargs[3] = apr_pstrdup(p, argv0);
/* ** using a shell to execute suexec makes no sense thus ** we force everything to be APR_PROGRAM, and never ** APR_SHELLCMD
*/ if (apr_procattr_cmdtype_set(attr, APR_PROGRAM) != APR_SUCCESS) { return APR_EGENERAL;
}
i = 1; do {
newargs[i + 3] = args[i];
} while (args[i++]);
*accepted = NULL;
status = apr_socket_accept(&csd, lr->sd, ptrans); if (status == APR_SUCCESS) {
*accepted = csd; #ifdef _OSD_POSIX
apr_os_sock_get(&sockdes, csd); if (sockdes >= FD_SETSIZE) {
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, ap_server_conf, APLOGNO(02176) "new file descriptor %d is too large; you probably need " "to rebuild Apache with a larger FD_SETSIZE " "(currently %d)",
sockdes, FD_SETSIZE);
apr_socket_close(csd); return APR_EINTR;
} #endif return APR_SUCCESS;
}
if (APR_STATUS_IS_EINTR(status)) { return status;
} /* Our old behaviour here was to continue after accept() * errors. But this leads us into lots of troubles * because most of the errors are quite fatal. For * example, EMFILE can be caused by slow descriptor * leaks (say in a 3rd party module, or libc). It's * foolish for us to continue after an EMFILE. We also * seem to tickle kernel bugs on some platforms which * lead to never-ending loops here. So it seems best * to just exit in most cases.
*/ switch (status) { #ifdefined(HPUX11) && defined(ENOBUFS) /* On HPUX 11.x, the 'ENOBUFS, No buffer space available' * error occurs because the accept() cannot complete. * You will not see ENOBUFS with 10.20 because the kernel * hides any occurrence from being returned to user space. * ENOBUFS with 11.x's TCP/IP stack is possible, and could * occur intermittently. As a work-around, we are going to * ignore ENOBUFS.
*/ case ENOBUFS: #endif
#ifdef EPROTO /* EPROTO on certain older kernels really means * ECONNABORTED, so we need to ignore it for them. * See discussion in new-httpd archives nh.9701 * search for EPROTO. * * Also see nh.9603, search for EPROTO: * There is potentially a bug in Solaris 2.x x<6, * and other boxes that implement tcp sockets in * userland (i.e. on top of STREAMS). On these * systems, EPROTO can actually result in a fatal * loop. See PR#981 for example. It's hard to * handle both uses of EPROTO.
*/ case EPROTO: #endif #ifdef ECONNABORTED case ECONNABORTED: #endif /* Linux generates the rest of these, other tcp * stacks (i.e. bsd) tend to hide them behind * getsockopt() interfaces. They occur when * the net goes sour or the client disconnects * after the three-way handshake has been done * in the kernel but before userland has picked * up the socket.
*/ #ifdef ECONNRESET case ECONNRESET: #endif #ifdef ETIMEDOUT case ETIMEDOUT: #endif #ifdef EHOSTUNREACH case EHOSTUNREACH: #endif #ifdef ENETUNREACH case ENETUNREACH: #endif /* EAGAIN/EWOULDBLOCK can be returned on BSD-derived * TCP stacks when the connection is aborted before * we call connect, but only because our listener * sockets are non-blocking (AP_NONBLOCK_WHEN_MULTI_LISTEN)
*/ #ifdef EAGAIN case EAGAIN: #endif #ifdef EWOULDBLOCK #if !defined(EAGAIN) || EAGAIN != EWOULDBLOCK case EWOULDBLOCK: #endif #endif break; #ifdef ENETDOWN case ENETDOWN: /* * When the network layer has been shut down, there * is not much use in simply exiting: the parent * would simply re-create us (and we'd fail again). * Use the CHILDFATAL code to tear the server down. * @@@ Martin's idea for possible improvement: * A different approach would be to define * a new APEXIT_NETDOWN exit code, the reception * of which would make the parent shutdown all * children, then idle-loop until it detected that * the network is up again, and restart the children. * Ben Hyde noted that temporary ENETDOWN situations * occur in mobile IP.
*/
ap_log_error(APLOG_MARK, APLOG_EMERG, status, ap_server_conf, APLOGNO(02177) "apr_socket_accept: giving up."); return APR_EGENERAL; #endif/*ENETDOWN*/
default: /* If the socket has been closed in ap_close_listeners() * by the restart/stop action, we may get EBADF. * Do not print an error in this case.
*/ if (!lr->active) {
ap_log_error(APLOG_MARK, APLOG_DEBUG, status, ap_server_conf, APLOGNO(02178) "apr_socket_accept failed for inactive listener"); return status;
}
ap_log_error(APLOG_MARK, APLOG_ERR, status, ap_server_conf, APLOGNO(02179) "apr_socket_accept: (client socket)"); return APR_EGENERAL;
} return status;
}
if (!one_process) {
ap_fatal_signal_setup(ap_server_conf, pconf);
} elseif (!ap_retained_data_get("ap_unixd_mpm_one_process_cleanup")) { /* In one process mode (debug), httpd will exit immediately when asked * to (SIGTERM/SIGINT) and never restart. We still want the cleanups to * run though (such that e.g. temporary files/IPCs don't leak on the * system), so the first time around we use atexit() to cleanup after * ourselves.
*/
ap_retained_data_create("ap_unixd_mpm_one_process_cleanup", 1);
atexit(ap_terminate);
}
/* Signals' handlers depend on retained data */
(void)ap_unixd_mpm_get_retained_data();
typedefenum
{
bs2_unknown, /* not initialized yet. */
bs2_noFORK, /* no fork() because -X flag was specified */
bs2_FORK, /* only fork() because uid != 0 */
bs2_UFORK /* Normally, ufork() is used to switch identities. */
} bs2_ForkType;
static bs2_ForkType forktype = bs2_unknown;
/* Determine the method for forking off a child in such a way as to * set both the POSIX and BS2000 user id's to the unprivileged user.
*/ static bs2_ForkType os_forktype(int one_process)
{ /* have we checked the OS version before? If yes return the previous * result - the OS release isn't going to change suddenly!
*/ if (forktype == bs2_unknown) { /* not initialized yet */
/* No fork if the one_process option was set */ if (one_process) {
forktype = bs2_noFORK;
} /* If the user is unprivileged, use the normal fork() only. */ elseif (getuid() != 0) {
forktype = bs2_FORK;
} else
forktype = bs2_UFORK;
} return forktype;
}
/* This routine complements the setuid() call: it causes the BS2000 job * environment to be switched to the target user's user id. * That is important if CGI scripts try to execute native BS2000 commands.
*/ int os_init_job_environment(server_rec *server, constchar *user_name, int one_process)
{
bs2_ForkType type = os_forktype(one_process);
/* We can be sure that no change to uid==0 is possible because of * the checks in http_core.c:set_user()
*/
if (one_process) {
type = forktype = bs2_noFORK;
ap_log_error(APLOG_MARK, APLOG_ERR, 0, server, APLOGNO(02180) "The debug mode of Apache should only " "be started by an unprivileged user!"); return 0;
}
return 0;
}
/* BS2000 requires a "special" version of fork() before a setuid() call */
pid_t os_fork(constchar *user)
{
pid_t pid; char username[USER_LEN+1];
switch (os_forktype(0)) {
case bs2_FORK:
pid = fork(); break;
case bs2_UFORK:
apr_cpystrn(username, user, sizeof username);
/* Make user name all upper case - for some versions of ufork() */
ap_str_toupper(username);
pid = ufork(username); if (pid == -1 && errno == EPERM) {
ap_log_error(APLOG_MARK, APLOG_EMERG, errno, ap_server_conf,
APLOGNO(02181) "ufork: Possible mis-configuration " "for user %s - Aborting.", user); exit(1);
} break;
default:
pid = 0; break;
}
return pid;
}
#endif/* _OSD_POSIX */
Messung V0.5
¤ Dauer der Verarbeitung: 0.15 Sekunden
(vorverarbeitet)
¤
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.