1 #include "private-libwebsockets.h"
7 * included from libwebsockets.c for unix builds
10 unsigned long long time_in_microseconds(void)
13 gettimeofday(&tv, NULL);
14 return ((unsigned long long)tv.tv_sec * 1000000LL) + tv.tv_usec;
18 lws_get_random(struct lws_context *context, void *buf, int len)
20 return read(context->fd_random, (char *)buf, len);
24 lws_send_pipe_choked(struct lws *wsi)
26 struct lws_pollfd fds;
28 /* treat the fact we got a truncated send pending as if we're choked */
36 if (poll(&fds, 1, 0) != 1)
39 if ((fds.revents & POLLOUT) == 0)
42 /* okay to send another packet without blocking */
48 lws_poll_listen_fd(struct lws_pollfd *fd)
50 return poll(fd, 1, 0);
54 * This is just used to interrupt poll waiting
55 * we don't have to do anything with it.
57 static void lws_sigusr2(int sig)
62 * lws_cancel_service() - Cancel servicing of pending websocket activity
63 * @context: Websocket context
65 * This function let a call to lws_service() waiting for a timeout
69 lws_cancel_service(struct lws_context *context)
73 if (write(context->dummy_pipe_fds[1], &buf, sizeof(buf)) != 1)
74 lwsl_err("Cannot write to dummy pipe");
77 LWS_VISIBLE void lwsl_emit_syslog(int level, const char *line)
79 int syslog_level = LOG_DEBUG;
83 syslog_level = LOG_ERR;
86 syslog_level = LOG_WARNING;
89 syslog_level = LOG_NOTICE;
92 syslog_level = LOG_INFO;
95 syslog(syslog_level, "%s", line);
99 lws_plat_service(struct lws_context *context, int timeout_ms)
104 #ifdef LWS_OPENSSL_SUPPORT
105 struct lws *wsi, *wsi_next;
108 /* stay dead once we are dead */
113 lws_libev_run(context);
115 context->service_tid = context->protocols[0].callback(NULL,
116 LWS_CALLBACK_GET_THREAD_ID, NULL, NULL, 0);
118 #ifdef LWS_OPENSSL_SUPPORT
119 /* if we know we have non-network pending data, do not wait in poll */
120 if (lws_ssl_anybody_has_buffered_read(context))
123 n = poll(context->fds, context->fds_count, timeout_ms);
124 context->service_tid = 0;
126 #ifdef LWS_OPENSSL_SUPPORT
127 if (!lws_ssl_anybody_has_buffered_read(context) && n == 0) {
129 if (n == 0) /* poll timeout */ {
131 lws_service_fd(context, NULL);
136 if (LWS_ERRNO != LWS_EINTR)
141 #ifdef LWS_OPENSSL_SUPPORT
143 * For all guys with buffered SSL read data already saved up, if they
144 * are not flowcontrolled, fake their POLLIN status so they'll get
145 * service to use up the buffered incoming data, even though their
146 * network socket may have nothing
149 wsi = context->pending_read_list;
151 wsi_next = wsi->pending_read_list_next;
152 context->fds[wsi->position_in_fds_table].revents |=
153 context->fds[wsi->position_in_fds_table].events & POLLIN;
154 if (context->fds[wsi->position_in_fds_table].revents & POLLIN)
156 * he's going to get serviced now, take him off the
157 * list of guys with buffered SSL. If he still has some
158 * at the end of the service, he'll get put back on the
161 lws_ssl_remove_wsi_from_buffered_list(wsi);
167 /* any socket with events to service? */
169 for (n = 0; n < context->fds_count; n++) {
170 if (!context->fds[n].revents)
173 if (context->fds[n].fd == context->dummy_pipe_fds[0]) {
174 if (read(context->fds[n].fd, &buf, 1) != 1)
175 lwsl_err("Cannot read from dummy pipe.");
179 m = lws_service_fd(context, &context->fds[n]);
182 /* if something closed, retry this slot */
191 lws_plat_set_socket_options(struct lws_context *context, int fd)
194 socklen_t optlen = sizeof(optval);
196 #if defined(__APPLE__) || defined(__FreeBSD__) || defined(__NetBSD__) || \
198 struct protoent *tcp_proto;
201 if (context->ka_time) {
202 /* enable keepalive on this socket */
204 if (setsockopt(fd, SOL_SOCKET, SO_KEEPALIVE,
205 (const void *)&optval, optlen) < 0)
208 #if defined(__APPLE__) || defined(__FreeBSD__) || defined(__NetBSD__) || \
209 defined(__CYGWIN__) || defined(__OpenBSD__)
212 * didn't find a way to set these per-socket, need to
213 * tune kernel systemwide values
216 /* set the keepalive conditions we want on it too */
217 optval = context->ka_time;
218 if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPIDLE,
219 (const void *)&optval, optlen) < 0)
222 optval = context->ka_interval;
223 if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPINTVL,
224 (const void *)&optval, optlen) < 0)
227 optval = context->ka_probes;
228 if (setsockopt(fd, IPPROTO_TCP, TCP_KEEPCNT,
229 (const void *)&optval, optlen) < 0)
236 #if !defined(__APPLE__) && !defined(__FreeBSD__) && !defined(__NetBSD__) && \
237 !defined(__OpenBSD__)
238 if (setsockopt(fd, SOL_TCP, TCP_NODELAY, (const void *)&optval, optlen) < 0)
241 tcp_proto = getprotobyname("TCP");
242 if (setsockopt(fd, tcp_proto->p_proto, TCP_NODELAY, &optval, optlen) < 0)
246 /* We are nonblocking... */
247 if (fcntl(fd, F_SETFL, O_NONBLOCK) < 0)
254 lws_plat_drop_app_privileges(struct lws_context_creation_info *info)
256 if (info->uid != -1) {
257 struct passwd *p = getpwuid(info->uid);
260 initgroups(p->pw_name, info->gid);
261 if (setuid(info->uid))
262 lwsl_warn("setuid: %s\n", strerror(LWS_ERRNO));
264 lwsl_notice(" Set privs to user '%s'\n", p->pw_name);
266 lwsl_warn("getpwuid: unable to find uid %d", info->uid);
269 if (setgid(info->gid))
270 lwsl_warn("setgid: %s\n", strerror(LWS_ERRNO));
274 static void sigpipe_handler(int x)
279 lws_plat_context_early_init(void)
283 signal(SIGUSR2, lws_sigusr2);
285 sigaddset(&mask, SIGUSR2);
287 sigprocmask(SIG_BLOCK, &mask, NULL);
289 signal(SIGPIPE, sigpipe_handler);
295 lws_plat_context_early_destroy(struct lws_context *context)
300 lws_plat_context_late_destroy(struct lws_context *context)
302 if (context->lws_lookup)
303 lws_free(context->lws_lookup);
305 close(context->dummy_pipe_fds[0]);
306 close(context->dummy_pipe_fds[1]);
307 close(context->fd_random);
310 /* cast a struct sockaddr_in6 * into addr for ipv6 */
313 interface_to_sa(struct lws_context *context,
314 const char *ifname, struct sockaddr_in *addr, size_t addrlen)
321 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)addr;
325 for (ifc = ifr; ifc != NULL && rc; ifc = ifc->ifa_next) {
329 lwsl_info(" interface %s vs %s\n", ifc->ifa_name, ifname);
331 if (strcmp(ifc->ifa_name, ifname))
334 switch (ifc->ifa_addr->sa_family) {
337 if (LWS_IPV6_ENABLED(context)) {
338 /* map IPv4 to IPv6 */
339 bzero((char *)&addr6->sin6_addr,
340 sizeof(struct in6_addr));
341 addr6->sin6_addr.s6_addr[10] = 0xff;
342 addr6->sin6_addr.s6_addr[11] = 0xff;
343 memcpy(&addr6->sin6_addr.s6_addr[12],
344 &((struct sockaddr_in *)ifc->ifa_addr)->sin_addr,
345 sizeof(struct in_addr));
349 (struct sockaddr_in *)ifc->ifa_addr,
350 sizeof(struct sockaddr_in));
354 memcpy(&addr6->sin6_addr,
355 &((struct sockaddr_in6 *)ifc->ifa_addr)->sin6_addr,
356 sizeof(struct in6_addr));
368 /* check if bind to IP adddress */
370 if (inet_pton(AF_INET6, ifname, &addr6->sin6_addr) == 1)
374 if (inet_pton(AF_INET, ifname, &addr->sin_addr) == 1)
382 lws_plat_insert_socket_into_fds(struct lws_context *context,
385 lws_libev_io(wsi, LWS_EV_START | LWS_EV_READ);
386 context->fds[context->fds_count++].revents = 0;
390 lws_plat_delete_socket_from_fds(struct lws_context *context,
391 struct lws *wsi, int m)
396 lws_plat_service_periodic(struct lws_context *context)
398 /* if our parent went down, don't linger around */
399 if (context->started_with_parent &&
400 kill(context->started_with_parent, 0) < 0)
401 kill(getpid(), SIGTERM);
405 lws_plat_change_pollfd(struct lws_context *context,
406 struct lws *wsi, struct lws_pollfd *pfd)
411 LWS_VISIBLE const char *
412 lws_plat_inet_ntop(int af, const void *src, char *dst, int cnt)
414 return inet_ntop(af, src, dst, cnt);
417 static lws_filefd_type
418 _lws_plat_file_open(struct lws *wsi, const char *filename,
419 unsigned long *filelen, int flags)
421 struct stat stat_buf;
422 int ret = open(filename, flags, 0664);
425 return LWS_INVALID_FILE;
427 if (fstat(ret, &stat_buf) < 0) {
429 return LWS_INVALID_FILE;
431 *filelen = stat_buf.st_size;
436 _lws_plat_file_close(struct lws *wsi, lws_filefd_type fd)
442 _lws_plat_file_seek_cur(struct lws *wsi, lws_filefd_type fd, long offset)
444 return lseek(fd, offset, SEEK_CUR);
448 _lws_plat_file_read(struct lws *wsi, lws_filefd_type fd, unsigned long *amount,
449 unsigned char *buf, unsigned long len)
453 n = read((int)fd, buf, len);
465 _lws_plat_file_write(struct lws *wsi, lws_filefd_type fd, unsigned long *amount,
466 unsigned char *buf, unsigned long len)
470 n = write((int)fd, buf, len);
482 lws_plat_init(struct lws_context *context,
483 struct lws_context_creation_info *info)
485 context->lws_lookup = lws_zalloc(sizeof(struct lws *) * context->max_fds);
486 if (context->lws_lookup == NULL) {
488 "Unable to allocate lws_lookup array for %d connections\n",
493 context->fd_random = open(SYSTEM_RANDOM_FILEPATH, O_RDONLY);
494 if (context->fd_random < 0) {
495 lwsl_err("Unable to open random device %s %d\n",
496 SYSTEM_RANDOM_FILEPATH, context->fd_random);
500 if (!lws_libev_init_fd_table(context)) {
501 /* otherwise libev handled it instead */
503 if (pipe(context->dummy_pipe_fds)) {
504 lwsl_err("Unable to create pipe\n");
509 /* use the read end of pipe as first item */
510 context->fds[0].fd = context->dummy_pipe_fds[0];
511 context->fds[0].events = LWS_POLLIN;
512 context->fds[0].revents = 0;
513 context->fds_count = 1;
515 context->fops.open = _lws_plat_file_open;
516 context->fops.close = _lws_plat_file_close;
517 context->fops.seek_cur = _lws_plat_file_seek_cur;
518 context->fops.read = _lws_plat_file_read;
519 context->fops.write = _lws_plat_file_write;