openldap/servers/slapd/connection.c

2255 lines
54 KiB
C
Raw Normal View History

/* $OpenLDAP$ */
2003-11-27 09:17:14 +08:00
/* This work is part of OpenLDAP Software <http://www.openldap.org/>.
*
2006-01-04 07:11:52 +08:00
* Copyright 1998-2006 The OpenLDAP Foundation.
2003-11-27 09:17:14 +08:00
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted only as authorized by the OpenLDAP
* Public License.
*
* A copy of this license is available in the file LICENSE in the
* top-level directory of the distribution or, alternatively, at
* <http://www.OpenLDAP.org/license.html>.
*/
/* Portions Copyright (c) 1995 Regents of the University of Michigan.
* All rights reserved.
*
* Redistribution and use in source and binary forms are permitted
* provided that this notice is preserved and that due credit is given
* to the University of Michigan at Ann Arbor. The name of the University
* may not be used to endorse or promote products derived from this
* software without specific prior written permission. This software
* is provided ``as is'' without express or implied warranty.
1999-08-07 07:07:46 +08:00
*/
1998-08-09 08:43:13 +08:00
#include "portable.h"
1998-10-25 09:41:42 +08:00
#include <stdio.h>
2005-04-11 03:32:14 +08:00
#ifdef HAVE_LIMITS_H
2000-06-02 06:01:00 +08:00
#include <limits.h>
2005-04-11 03:32:14 +08:00
#endif
1998-10-25 09:41:42 +08:00
#include <ac/socket.h>
1998-10-25 09:41:42 +08:00
#include <ac/errno.h>
#include <ac/string.h>
#include <ac/time.h>
2001-11-18 00:18:07 +08:00
#include <ac/unistd.h>
1998-10-25 09:41:42 +08:00
2000-09-22 09:40:57 +08:00
#include "lutil.h"
1998-08-09 08:43:13 +08:00
#include "slap.h"
#ifdef LDAP_SLAPI
#include "slapi/slapi.h"
#endif
#ifdef SLAP_MULTI_CONN_ARRAY
/* for Multiple Connection Arrary (MCA) Support */
static ldap_pvt_thread_mutex_t* connections_mutex;
static Connection **connections = NULL;
/* set to the number of processors (round up to a power of 2) */
2005-10-13 10:08:14 +08:00
# define NUM_CONNECTION_ARRAY 4
/* partition the array in a modulo manner */
2005-10-13 10:08:14 +08:00
# define MCA_conn_array_id(fd) ((int)(fd)%NUM_CONNECTION_ARRAY)
# define MCA_conn_array_element_id(fd) ((int)(fd)/NUM_CONNECTION_ARRAY)
# define MCA_ARRAY_SIZE ((int)(MCA_conn_array_element_id(dtblsize) + (MCA_conn_array_id(dtblsize) ? 1 : 0)))
# define MCA_conn_check(fd) (dtblsize > 0 && (fd) >= 0 && (fd) < (MCA_ARRAY_SIZE*NUM_CONNECTION_ARRAY))
# define MCA_GET_CONNECTION(fd) (&(connections[MCA_conn_array_id(fd)]) \
2005-10-13 10:08:14 +08:00
[MCA_conn_array_element_id(fd)])
# define MCA_GET_CONN_MUTEX(fd) (&connections_mutex[MCA_conn_array_id(fd)])
#else
/* protected by connections_mutex */
static ldap_pvt_thread_mutex_t connections_mutex;
static Connection *connections = NULL;
2005-10-13 10:08:14 +08:00
# define MCA_conn_check(fd) (dtblsize > 0 && (fd) < dtblsize)
2005-10-13 10:08:14 +08:00
# define MCA_GET_CONNECTION(fd) (&connections[s])
# define MCA_GET_CONN_MUTEX(fd) (&connections_mutex)
#endif
static ldap_pvt_thread_mutex_t conn_nextid_mutex;
static unsigned long conn_nextid = 0;
static const char conn_lost_str[] = "connection lost";
/* structure state (protected by connections_mutex) */
#define SLAP_C_UNINITIALIZED 0x00 /* MUST BE ZERO (0) */
#define SLAP_C_UNUSED 0x01
#define SLAP_C_USED 0x02
/* connection state (protected by c_mutex ) */
#define SLAP_C_INVALID 0x00 /* MUST BE ZERO (0) */
#define SLAP_C_INACTIVE 0x01 /* zero threads */
#define SLAP_C_ACTIVE 0x02 /* one or more threads */
#define SLAP_C_BINDING 0x03 /* binding */
#define SLAP_C_CLOSING 0x04 /* closing */
#define SLAP_C_CLIENT 0x05 /* outbound client conn */
1999-09-05 05:15:49 +08:00
const char *
connection_state2str( int state )
{
switch( state ) {
case SLAP_C_INVALID: return "!";
case SLAP_C_INACTIVE: return "|";
case SLAP_C_ACTIVE: return "";
case SLAP_C_BINDING: return "B";
case SLAP_C_CLOSING: return "C";
case SLAP_C_CLIENT: return "L";
}
return "?";
}
static Connection* connection_get( ber_socket_t s );
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
typedef struct conn_readinfo {
Operation *op;
ldap_pvt_thread_start_t *func;
void *arg;
int nullop;
} conn_readinfo;
static int connection_input( Connection *c, conn_readinfo *cri );
#else
static int connection_input( Connection *c );
#endif
static void connection_close( Connection *c );
2003-03-26 02:44:00 +08:00
static int connection_op_activate( Operation *op );
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
static void connection_op_queue( Operation *op );
#endif
static int connection_resched( Connection *conn );
static void connection_abandon( Connection *conn );
static void connection_destroy( Connection *c );
static ldap_pvt_thread_start_t connection_operation;
/*
* Initialize connection management infrastructure.
*/
int connections_init(void)
#ifdef SLAP_MULTI_CONN_ARRAY
{
int i, j;
Connection* conn;
assert( connections == NULL );
if( connections != NULL) {
Debug( LDAP_DEBUG_ANY, "connections_init: already initialized.\n",
0, 0, 0 );
return -1;
}
connections_mutex = (ldap_pvt_thread_mutex_t*) ch_calloc(
NUM_CONNECTION_ARRAY, sizeof(ldap_pvt_thread_mutex_t) );
if( connections_mutex == NULL ) {
Debug( LDAP_DEBUG_ANY, "connections_init: "
2005-11-07 07:37:52 +08:00
"allocation of connection mutexes failed\n", 0, 0, 0 );
return -1;
}
connections = (Connection**) ch_calloc(
NUM_CONNECTION_ARRAY, sizeof(Connection*));
if( connections == NULL ) {
Debug( LDAP_DEBUG_ANY, "connections_init: "
"allocation of connection[%d] failed\n", 0, 0, 0 );
return -1;
}
for ( i = 0; i < NUM_CONNECTION_ARRAY; i++ ) {
ldap_pvt_thread_mutex_init( connections_mutex+i );
connections[i] = (Connection*) ch_calloc(
MCA_ARRAY_SIZE, sizeof(Connection) );
if( connections[i] == NULL ) {
Debug( LDAP_DEBUG_ANY, "connections_init: "
"allocation (%d*%ld) of connection array[%d] failed\n",
dtblsize, (long) sizeof(Connection), i );
return -1;
}
}
/* should check return of every call */
ldap_pvt_thread_mutex_init( &conn_nextid_mutex );
assert( connections[0]->c_struct_state == SLAP_C_UNINITIALIZED );
assert( connections[NUM_CONNECTION_ARRAY-1]->c_struct_state ==
SLAP_C_UNINITIALIZED );
for ( i = 0; i < NUM_CONNECTION_ARRAY; i++ ) {
conn = connections[i];
for ( j = 0; j < MCA_ARRAY_SIZE; j++ ) {
conn[j].c_conn_idx = j;
}
}
/*
* per entry initialization of the Connection array initialization
* will be done by connection_init()
*/
return 0;
}
#else
{
int i;
assert( connections == NULL );
if( connections != NULL) {
Debug( LDAP_DEBUG_ANY, "connections_init: already initialized.\n",
0, 0, 0 );
return -1;
}
/* should check return of every call */
ldap_pvt_thread_mutex_init( &connections_mutex );
ldap_pvt_thread_mutex_init( &conn_nextid_mutex );
connections = (Connection *) ch_calloc( dtblsize, sizeof(Connection) );
if( connections == NULL ) {
Debug( LDAP_DEBUG_ANY, "connections_init: "
"allocation (%d*%ld) of connection array failed\n",
dtblsize, (long) sizeof(Connection), 0 );
return -1;
}
2003-11-19 06:11:11 +08:00
assert( connections[0].c_struct_state == SLAP_C_UNINITIALIZED );
assert( connections[dtblsize-1].c_struct_state == SLAP_C_UNINITIALIZED );
for (i=0; i<dtblsize; i++) connections[i].c_conn_idx = i;
/*
* per entry initialization of the Connection array initialization
* will be done by connection_init()
*/
return 0;
}
#endif
/*
* Destroy connection management infrastructure.
*/
int connections_destroy(void)
#ifdef SLAP_MULTI_CONN_ARRAY
{
int i;
ber_socket_t j;
if( connections == NULL) {
Debug( LDAP_DEBUG_ANY, "connections_destroy: nothing to destroy.\n",
0, 0, 0 );
return -1;
}
for ( i = 0; i < NUM_CONNECTION_ARRAY; i++ ) {
Connection* conn = connections[i];
for ( j = 0; j < MCA_ARRAY_SIZE; j++ ) {
if( conn[j].c_struct_state != SLAP_C_UNINITIALIZED ) {
ber_sockbuf_free( conn[j].c_sb );
ldap_pvt_thread_mutex_destroy( &conn[j].c_mutex );
ldap_pvt_thread_mutex_destroy( &conn[j].c_write_mutex );
ldap_pvt_thread_cond_destroy( &conn[j].c_write_cv );
#ifdef LDAP_SLAPI
/* FIX ME!! */
if ( slapi_plugins_used ) {
slapi_int_free_object_extensions( SLAPI_X_EXT_CONNECTION,
&connections[i] );
}
#endif
}
}
}
for ( i = 0; i < NUM_CONNECTION_ARRAY; i++ ) {
free( connections[i] );
connections[i] = NULL;
ldap_pvt_thread_mutex_destroy( &connections_mutex[i] );
}
2005-11-02 02:12:14 +08:00
free( connections );
free( connections_mutex );
ldap_pvt_thread_mutex_destroy( &conn_nextid_mutex );
return 0;
}
#else
{
ber_socket_t i;
/* should check return of every call */
if( connections == NULL) {
Debug( LDAP_DEBUG_ANY, "connections_destroy: nothing to destroy.\n",
0, 0, 0 );
return -1;
}
for ( i = 0; i < dtblsize; i++ ) {
if( connections[i].c_struct_state != SLAP_C_UNINITIALIZED ) {
ber_sockbuf_free( connections[i].c_sb );
ldap_pvt_thread_mutex_destroy( &connections[i].c_mutex );
ldap_pvt_thread_mutex_destroy( &connections[i].c_write_mutex );
ldap_pvt_thread_cond_destroy( &connections[i].c_write_cv );
#ifdef LDAP_SLAPI
if ( slapi_plugins_used ) {
slapi_int_free_object_extensions( SLAPI_X_EXT_CONNECTION,
&connections[i] );
2003-10-24 14:01:55 +08:00
}
#endif
}
}
free( connections );
connections = NULL;
ldap_pvt_thread_mutex_destroy( &connections_mutex );
ldap_pvt_thread_mutex_destroy( &conn_nextid_mutex );
return 0;
}
#endif
/*
* shutdown all connections
*/
int connections_shutdown(void)
#ifdef SLAP_MULTI_CONN_ARRAY
{
int i;
ber_socket_t j;
for ( i = 0; i < NUM_CONNECTION_ARRAY; i++ ) {
Connection* conn = connections[i];
ldap_pvt_thread_mutex_lock( &connections_mutex[i] );
for ( j = 0; j < MCA_ARRAY_SIZE; j++ ) {
if( conn[j].c_struct_state != SLAP_C_USED ) {
continue;
}
/* give persistent clients a chance to cleanup */
if( conn[j].c_conn_state == SLAP_C_CLIENT ) {
ldap_pvt_thread_pool_submit( &connection_pool,
conn[j].c_clientfunc, conn[j].c_clientarg );
continue;
}
ldap_pvt_thread_mutex_lock( &conn[j].c_mutex );
/* connections_mutex and c_mutex are locked */
connection_closing( &conn[j], "connection shutdown" );
connection_close( &conn[j] );
ldap_pvt_thread_mutex_unlock( &conn[j].c_mutex );
}
ldap_pvt_thread_mutex_unlock( &connections_mutex[i] );
}
return 0;
}
#else
{
ber_socket_t i;
ldap_pvt_thread_mutex_lock( &connections_mutex );
for ( i = 0; i < dtblsize; i++ ) {
if( connections[i].c_struct_state != SLAP_C_USED ) {
continue;
}
/* give persistent clients a chance to cleanup */
if( connections[i].c_conn_state == SLAP_C_CLIENT ) {
ldap_pvt_thread_pool_submit( &connection_pool,
connections[i].c_clientfunc, connections[i].c_clientarg );
continue;
}
ldap_pvt_thread_mutex_lock( &connections[i].c_mutex );
/* connections_mutex and c_mutex are locked */
connection_closing( &connections[i], "slapd shutdown" );
connection_close( &connections[i] );
ldap_pvt_thread_mutex_unlock( &connections[i].c_mutex );
}
ldap_pvt_thread_mutex_unlock( &connections_mutex );
Vienna Bulk Commit This commit includes many changes. All changes compile under NT but have not been tested under UNIX. A Summary of changes (likely incomplete): NT changes: Removed lint. Clean up configuration support for "Debug", "Release", "SDebug", and "SRelease" configurations. Share output directories for clients, libraries, and slapd. (maybe they should be combined further and moved to build/{,S}{Debug,Release}). Enable threading when _MT is defined. Enable debuging when _DEBUG is defined. Disable setting of NDEBUG under Release/SRelease. Asserts are disabled in <ac/assert.h> when LDAP_DEBUG is not defined. Added 'build/main.dsp' Master project. Removed non-slapd projects from slapd.dsp (see main.dsp). Removed replaced many uses of _WIN32 macro with feature based macros. ldap_cdefs.h changes #define LDAP_CONST const (see below) #define LDAP_F(type) LDAP_F_PRE type LDAP_F_POST To allow specifiers to be added before and after the type declaration. (For DLL handling) LBER/LDAP changes Namespace changes: s/lber_/ber_/ for here and there. s/NAME_ERROR/LDAP_NAME_ERROR/g Deleted NULLMSG and other NULL* macros for namespace reasons. "const" libraries. Installed headers (ie: lber.h, ldap.h) use LDAP_CONST macro. Normally set to 'const' when __STDC__. Can be set externally to enable/disable 'constification' of external interface. Internal interface always uses 'const'. Did not fix warnings in -lldif (in lieu of new LDIF parser). Added _ext API implementations (excepting search and bind). Need to implement ldap_int_get_controls() for reponses with controls. Added numberous assert() checks. LDAP_R _MT defines HAVE_NT_THREADS Added numberous assert() checks. Changed ldap_pthread_t back to unsigned long. Used cast to HANDLE in _join(). LDBM Replaced _WIN32 with HAVE_SYSLOG ud Added version string if MKVERSION is not defined. (MKVERSION needs to be set under UNIX). slapd Made connection sockbuf field a pointer to a sockbuf. This removed slap.h dependency on lber-int.h. lber-int.h now only included by those files needing to mess with the sockbuf. Used ber_* functions/macros to access sockbuf internals whenever possible. Added version string if MKVERSION is not defined. (MKVERSION needs to be set under UNIX). Removed FD_SET unsigned lint slapd/tools Used EXEEXT to added ".exe" to routines. Need to define EXEEXT under UNIX. ldappasswd Added ldappasswd.dsp. Ported to NT. Used getpid() to seed rand(). nt_debug Minor cleanup. Added "portable.h" include and used <ac/*.h> where appropriate. Added const to char* format argument.
1999-05-19 09:12:33 +08:00
return 0;
}
#endif
/*
* Timeout idle connections.
*/
int connections_timeout_idle(time_t now)
{
int i = 0;
int connindex;
Connection* c;
2001-01-18 00:35:53 +08:00
for( c = connection_first( &connindex );
c != NULL;
c = connection_next( c, &connindex ) )
{
/* Don't timeout a slow-running request or a persistent
* outbound connection */
if( c->c_n_ops_executing || c->c_conn_state == SLAP_C_CLIENT ) {
continue;
}
2003-09-27 13:36:20 +08:00
if( difftime( c->c_activitytime+global_idletimeout, now) < 0 ) {
/* close it */
connection_closing( c, "idletimeout" );
connection_close( c );
i++;
}
}
connection_done( c );
return i;
}
static Connection* connection_get( ber_socket_t s )
{
/* connections_mutex should be locked by caller */
Connection *c;
Debug( LDAP_DEBUG_ARGS,
"connection_get(%ld)\n",
(long) s, 0, 0 );
assert( connections != NULL );
if(s == AC_SOCKET_INVALID) return NULL;
#ifndef HAVE_WINSOCK
assert( MCA_conn_check( s ) );
c = MCA_GET_CONNECTION(s);
assert( c->c_struct_state != SLAP_C_UNINITIALIZED );
#else
c = NULL;
{
ber_socket_t i, sd;
for(i=0; i<dtblsize; i++) {
1999-04-02 00:32:11 +08:00
if( connections[i].c_struct_state == SLAP_C_UNINITIALIZED ) {
assert( connections[i].c_conn_state == SLAP_C_INVALID );
Vienna Bulk Commit This commit includes many changes. All changes compile under NT but have not been tested under UNIX. A Summary of changes (likely incomplete): NT changes: Removed lint. Clean up configuration support for "Debug", "Release", "SDebug", and "SRelease" configurations. Share output directories for clients, libraries, and slapd. (maybe they should be combined further and moved to build/{,S}{Debug,Release}). Enable threading when _MT is defined. Enable debuging when _DEBUG is defined. Disable setting of NDEBUG under Release/SRelease. Asserts are disabled in <ac/assert.h> when LDAP_DEBUG is not defined. Added 'build/main.dsp' Master project. Removed non-slapd projects from slapd.dsp (see main.dsp). Removed replaced many uses of _WIN32 macro with feature based macros. ldap_cdefs.h changes #define LDAP_CONST const (see below) #define LDAP_F(type) LDAP_F_PRE type LDAP_F_POST To allow specifiers to be added before and after the type declaration. (For DLL handling) LBER/LDAP changes Namespace changes: s/lber_/ber_/ for here and there. s/NAME_ERROR/LDAP_NAME_ERROR/g Deleted NULLMSG and other NULL* macros for namespace reasons. "const" libraries. Installed headers (ie: lber.h, ldap.h) use LDAP_CONST macro. Normally set to 'const' when __STDC__. Can be set externally to enable/disable 'constification' of external interface. Internal interface always uses 'const'. Did not fix warnings in -lldif (in lieu of new LDIF parser). Added _ext API implementations (excepting search and bind). Need to implement ldap_int_get_controls() for reponses with controls. Added numberous assert() checks. LDAP_R _MT defines HAVE_NT_THREADS Added numberous assert() checks. Changed ldap_pthread_t back to unsigned long. Used cast to HANDLE in _join(). LDBM Replaced _WIN32 with HAVE_SYSLOG ud Added version string if MKVERSION is not defined. (MKVERSION needs to be set under UNIX). slapd Made connection sockbuf field a pointer to a sockbuf. This removed slap.h dependency on lber-int.h. lber-int.h now only included by those files needing to mess with the sockbuf. Used ber_* functions/macros to access sockbuf internals whenever possible. Added version string if MKVERSION is not defined. (MKVERSION needs to be set under UNIX). Removed FD_SET unsigned lint slapd/tools Used EXEEXT to added ".exe" to routines. Need to define EXEEXT under UNIX. ldappasswd Added ldappasswd.dsp. Ported to NT. Used getpid() to seed rand(). nt_debug Minor cleanup. Added "portable.h" include and used <ac/*.h> where appropriate. Added const to char* format argument.
1999-05-19 09:12:33 +08:00
assert( connections[i].c_sb == 0 );
break;
}
ber_sockbuf_ctrl( connections[i].c_sb,
LBER_SB_OPT_GET_FD, &sd );
1999-04-02 00:32:11 +08:00
if( connections[i].c_struct_state == SLAP_C_UNUSED ) {
assert( connections[i].c_conn_state == SLAP_C_INVALID );
assert( sd == AC_SOCKET_INVALID );
continue;
}
/* state can actually change from used -> unused by resched,
* so don't assert details here.
*/
if( sd == s ) {
1999-04-02 00:32:11 +08:00
c = &connections[i];
break;
}
}
}
#endif
if( c != NULL ) {
ber_socket_t sd;
ldap_pvt_thread_mutex_lock( &c->c_mutex );
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
if( c->c_struct_state != SLAP_C_USED ) {
/* connection must have been closed due to resched */
assert( c->c_conn_state == SLAP_C_INVALID );
assert( sd == AC_SOCKET_INVALID );
Debug( LDAP_DEBUG_TRACE,
1999-08-19 08:40:18 +08:00
"connection_get(%d): connection not used\n",
s, 0, 0 );
ldap_pvt_thread_mutex_unlock( &c->c_mutex );
return NULL;
}
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_get(%d): got connid=%lu\n",
s, c->c_connid, 0 );
c->c_n_get++;
assert( c->c_struct_state == SLAP_C_USED );
assert( c->c_conn_state != SLAP_C_INVALID );
assert( sd != AC_SOCKET_INVALID );
#ifndef SLAPD_MONITOR
if ( global_idletimeout > 0 )
#endif /* ! SLAPD_MONITOR */
{
c->c_activitytime = slap_get_time();
}
}
return c;
}
static void connection_return( Connection *c )
{
ldap_pvt_thread_mutex_unlock( &c->c_mutex );
}
long connection_init(
ber_socket_t s,
Listener *listener,
const char* dnsname,
const char* peername,
int flags,
2000-08-26 09:14:05 +08:00
slap_ssf_t ssf,
struct berval *authid )
{
unsigned long id;
Connection *c;
assert( connections != NULL );
assert( listener != NULL );
assert( dnsname != NULL );
assert( peername != NULL );
#ifndef HAVE_TLS
assert( flags != CONN_IS_TLS );
#endif
if( s == AC_SOCKET_INVALID ) {
2001-01-18 00:35:53 +08:00
Debug( LDAP_DEBUG_ANY,
2003-11-19 06:11:11 +08:00
"connection_init: init of socket %ld invalid.\n", (long)s, 0, 0 );
return -1;
}
assert( s >= 0 );
#ifndef HAVE_WINSOCK
assert( s < dtblsize );
#endif
ldap_pvt_thread_mutex_lock( MCA_GET_CONN_MUTEX(s) );
#ifndef HAVE_WINSOCK
assert( MCA_conn_check( s ) );
c = MCA_GET_CONNECTION(s);
#else
{
2003-11-19 06:11:11 +08:00
ber_socket_t i;
c = NULL;
for( i=0; i < dtblsize; i++) {
2003-11-19 06:11:11 +08:00
ber_socket_t sd;
2003-11-19 06:11:11 +08:00
if( connections[i].c_struct_state == SLAP_C_UNINITIALIZED ) {
assert( connections[i].c_sb == 0 );
c = &connections[i];
break;
}
1999-04-02 00:32:11 +08:00
sd = AC_SOCKET_INVALID;
2003-11-19 06:11:11 +08:00
if (connections[i].c_sb != NULL) {
ber_sockbuf_ctrl( connections[i].c_sb,
LBER_SB_OPT_GET_FD, &sd );
}
2001-01-18 00:35:53 +08:00
2003-11-19 06:11:11 +08:00
if( connections[i].c_struct_state == SLAP_C_UNUSED ) {
assert( sd == AC_SOCKET_INVALID );
c = &connections[i];
break;
}
2001-01-18 00:35:53 +08:00
if( connections[i].c_conn_state == SLAP_C_CLIENT ) continue;
2003-11-19 06:11:11 +08:00
assert( connections[i].c_struct_state == SLAP_C_USED );
assert( connections[i].c_conn_state != SLAP_C_INVALID );
assert( sd != AC_SOCKET_INVALID );
}
if( c == NULL ) {
Debug( LDAP_DEBUG_ANY,
"connection_init(%d): connection table full "
"(%d/%d)\n", s, i, dtblsize);
2003-11-19 06:11:11 +08:00
ldap_pvt_thread_mutex_unlock( &connections_mutex );
return -1;
}
2001-01-18 00:35:53 +08:00
}
#endif
assert( c != NULL );
if( c->c_struct_state == SLAP_C_UNINITIALIZED ) {
c->c_send_ldap_result = slap_send_ldap_result;
c->c_send_search_entry = slap_send_search_entry;
c->c_send_search_reference = slap_send_search_reference;
c->c_send_ldap_extended = slap_send_ldap_extended;
c->c_send_ldap_intermediate = slap_send_ldap_intermediate;
BER_BVZERO( &c->c_authmech );
BER_BVZERO( &c->c_dn );
BER_BVZERO( &c->c_ndn );
c->c_listener = NULL;
BER_BVZERO( &c->c_peer_domain );
BER_BVZERO( &c->c_peer_name );
LDAP_STAILQ_INIT(&c->c_ops);
LDAP_STAILQ_INIT(&c->c_pending_ops);
BER_BVZERO( &c->c_sasl_bind_mech );
c->c_sasl_done = 0;
c->c_sasl_authctx = NULL;
c->c_sasl_sockctx = NULL;
c->c_sasl_extra = NULL;
c->c_sasl_bindop = NULL;
c->c_sb = ber_sockbuf_alloc( );
{
ber_len_t max = sockbuf_max_incoming;
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
}
c->c_currentber = NULL;
/* should check status of thread calls */
ldap_pvt_thread_mutex_init( &c->c_mutex );
ldap_pvt_thread_mutex_init( &c->c_write_mutex );
ldap_pvt_thread_cond_init( &c->c_write_cv );
#ifdef LDAP_SLAPI
if ( slapi_plugins_used ) {
slapi_int_create_object_extensions( SLAPI_X_EXT_CONNECTION, c );
}
#endif
c->c_struct_state = SLAP_C_UNUSED;
}
2003-11-19 06:11:11 +08:00
ldap_pvt_thread_mutex_lock( &c->c_mutex );
2003-11-19 06:11:11 +08:00
assert( c->c_struct_state == SLAP_C_UNUSED );
assert( BER_BVISNULL( &c->c_authmech ) );
assert( BER_BVISNULL( &c->c_dn ) );
assert( BER_BVISNULL( &c->c_ndn ) );
2003-11-19 06:11:11 +08:00
assert( c->c_listener == NULL );
assert( BER_BVISNULL( &c->c_peer_domain ) );
assert( BER_BVISNULL( &c->c_peer_name ) );
2003-11-19 06:11:11 +08:00
assert( LDAP_STAILQ_EMPTY(&c->c_ops) );
assert( LDAP_STAILQ_EMPTY(&c->c_pending_ops) );
assert( BER_BVISNULL( &c->c_sasl_bind_mech ) );
assert( c->c_sasl_done == 0 );
assert( c->c_sasl_authctx == NULL );
assert( c->c_sasl_sockctx == NULL );
assert( c->c_sasl_extra == NULL );
assert( c->c_sasl_bindop == NULL );
assert( c->c_currentber == NULL );
assert( c->c_writewaiter == 0);
c->c_listener = listener;
if ( flags == CONN_IS_CLIENT ) {
c->c_conn_state = SLAP_C_CLIENT;
c->c_struct_state = SLAP_C_USED;
c->c_close_reason = "?"; /* should never be needed */
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_FD, &s );
ldap_pvt_thread_mutex_unlock( &c->c_mutex );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
ber_str2bv( dnsname, 0, 1, &c->c_peer_domain );
ber_str2bv( peername, 0, 1, &c->c_peer_name );
2003-11-19 06:11:11 +08:00
c->c_n_ops_received = 0;
c->c_n_ops_executing = 0;
c->c_n_ops_pending = 0;
c->c_n_ops_completed = 0;
c->c_n_get = 0;
c->c_n_read = 0;
c->c_n_write = 0;
/* set to zero until bind, implies LDAP_VERSION3 */
c->c_protocol = 0;
1999-08-13 14:09:48 +08:00
#ifndef SLAPD_MONITOR
if ( global_idletimeout > 0 )
#endif /* ! SLAPD_MONITOR */
{
c->c_activitytime = c->c_starttime = slap_get_time();
}
#ifdef LDAP_CONNECTIONLESS
c->c_is_udp = 0;
if( flags == CONN_IS_UDP ) {
c->c_is_udp = 1;
#ifdef LDAP_DEBUG
2002-09-17 05:50:55 +08:00
ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_debug,
LBER_SBIOD_LEVEL_PROVIDER, (void*)"udp_" );
#endif
2002-09-17 05:50:55 +08:00
ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_udp,
LBER_SBIOD_LEVEL_PROVIDER, (void *)&s );
ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_readahead,
LBER_SBIOD_LEVEL_PROVIDER, NULL );
} else
#endif
{
#ifdef LDAP_DEBUG
2002-09-17 05:50:55 +08:00
ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_debug,
LBER_SBIOD_LEVEL_PROVIDER, (void*)"tcp_" );
2000-10-14 08:12:39 +08:00
#endif
2002-09-17 05:50:55 +08:00
ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_tcp,
LBER_SBIOD_LEVEL_PROVIDER, (void *)&s );
}
2000-10-14 08:12:39 +08:00
#ifdef LDAP_DEBUG
ber_sockbuf_add_io( c->c_sb, &ber_sockbuf_io_debug,
INT_MAX, (void*)"ldap_" );
#endif
2000-10-14 08:12:39 +08:00
if( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_NONBLOCK,
c /* non-NULL */ ) < 0 )
{
Debug( LDAP_DEBUG_ANY,
"connection_init(%d, %s): set nonblocking failed\n",
2002-03-24 00:06:22 +08:00
s, c->c_peer_name.bv_val, 0 );
2000-10-14 08:12:39 +08:00
}
ldap_pvt_thread_mutex_lock( &conn_nextid_mutex );
2003-11-19 06:11:11 +08:00
id = c->c_connid = conn_nextid++;
ldap_pvt_thread_mutex_unlock( &conn_nextid_mutex );
2003-11-19 06:11:11 +08:00
c->c_conn_state = SLAP_C_INACTIVE;
c->c_struct_state = SLAP_C_USED;
c->c_close_reason = "?"; /* should never be needed */
c->c_ssf = c->c_transport_ssf = ssf;
c->c_tls_ssf = 0;
#ifdef HAVE_TLS
2003-11-19 06:11:11 +08:00
if ( flags == CONN_IS_TLS ) {
c->c_is_tls = 1;
c->c_needs_tls_accept = 1;
} else {
c->c_is_tls = 0;
c->c_needs_tls_accept = 0;
}
#endif
slap_sasl_open( c, 0 );
slap_sasl_external( c, ssf, authid );
slapd_add_internal( s, 1 );
2003-11-19 06:11:11 +08:00
ldap_pvt_thread_mutex_unlock( &c->c_mutex );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
2003-11-19 06:11:11 +08:00
backend_connection_init(c);
2003-11-19 06:11:11 +08:00
return id;
}
void connection2anonymous( Connection *c )
{
assert( connections != NULL );
assert( c != NULL );
{
ber_len_t max = sockbuf_max_incoming;
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
}
2005-07-22 03:14:09 +08:00
if ( !BER_BVISNULL( &c->c_authmech ) ) {
ch_free(c->c_authmech.bv_val);
}
BER_BVZERO( &c->c_authmech );
2005-07-22 03:14:09 +08:00
if ( !BER_BVISNULL( &c->c_dn ) ) {
ch_free(c->c_dn.bv_val);
}
BER_BVZERO( &c->c_dn );
2005-07-22 03:14:09 +08:00
if ( !BER_BVISNULL( &c->c_ndn ) ) {
ch_free(c->c_ndn.bv_val);
}
BER_BVZERO( &c->c_ndn );
2005-07-22 03:14:09 +08:00
if ( !BER_BVISNULL( &c->c_sasl_authz_dn ) ) {
ber_memfree_x( c->c_sasl_authz_dn.bv_val, NULL );
}
BER_BVZERO( &c->c_sasl_authz_dn );
c->c_authz_backend = NULL;
}
static void
connection_destroy( Connection *c )
{
/* note: connections_mutex should be locked by caller */
2003-11-19 06:11:11 +08:00
ber_socket_t sd;
unsigned long connid;
const char *close_reason;
2003-11-19 06:11:11 +08:00
assert( connections != NULL );
assert( c != NULL );
assert( c->c_struct_state != SLAP_C_UNUSED );
assert( c->c_conn_state != SLAP_C_INVALID );
assert( LDAP_STAILQ_EMPTY(&c->c_ops) );
assert( c->c_writewaiter == 0);
2003-11-19 06:11:11 +08:00
/* only for stats (print -1 as "%lu" may give unexpected results ;) */
connid = c->c_connid;
close_reason = c->c_close_reason;
2002-03-30 16:45:21 +08:00
2003-11-19 06:11:11 +08:00
backend_connection_destroy(c);
2003-11-19 06:11:11 +08:00
c->c_protocol = 0;
c->c_connid = -1;
2003-11-19 06:11:11 +08:00
c->c_activitytime = c->c_starttime = 0;
connection2anonymous( c );
c->c_listener = NULL;
if(c->c_peer_domain.bv_val != NULL) {
free(c->c_peer_domain.bv_val);
}
BER_BVZERO( &c->c_peer_domain );
if(c->c_peer_name.bv_val != NULL) {
free(c->c_peer_name.bv_val);
}
BER_BVZERO( &c->c_peer_name );
c->c_sasl_bind_in_progress = 0;
if(c->c_sasl_bind_mech.bv_val != NULL) {
free(c->c_sasl_bind_mech.bv_val);
}
BER_BVZERO( &c->c_sasl_bind_mech );
slap_sasl_close( c );
if ( c->c_currentber != NULL ) {
ber_free( c->c_currentber, 1 );
c->c_currentber = NULL;
}
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
slapd_sd_lock();
ber_sockbuf_free( c->c_sb );
if ( sd != AC_SOCKET_INVALID ) {
slapd_remove( sd, 1, 0, 1 );
Statslog( LDAP_DEBUG_STATS, (close_reason
? "conn=%lu fd=%ld closed (%s)\n"
: "conn=%lu fd=%ld closed\n"),
connid, (long) sd, close_reason, 0, 0 );
} else {
slapd_sd_unlock();
}
c->c_sb = ber_sockbuf_alloc( );
{
ber_len_t max = sockbuf_max_incoming;
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
}
2003-11-19 06:11:11 +08:00
c->c_conn_state = SLAP_C_INVALID;
c->c_struct_state = SLAP_C_UNUSED;
c->c_close_reason = "?"; /* should never be needed */
#ifdef LDAP_SLAPI
/* call destructors, then constructors; avoids unnecessary allocation */
if ( slapi_plugins_used ) {
slapi_int_clear_object_extensions( SLAPI_X_EXT_CONNECTION, c );
}
#endif
}
int connection_state_closing( Connection *c )
{
/* c_mutex must be locked by caller */
int state;
assert( c != NULL );
assert( c->c_struct_state == SLAP_C_USED );
state = c->c_conn_state;
assert( state != SLAP_C_INVALID );
return state == SLAP_C_CLOSING;
}
static void connection_abandon( Connection *c )
{
/* c_mutex must be locked by caller */
Operation *o, *next, op = {0};
2004-12-10 05:49:24 +08:00
Opheader ohdr = {0};
SlapReply rs = {0};
2004-12-10 05:49:24 +08:00
op.o_hdr = &ohdr;
op.o_conn = c;
op.o_connid = c->c_connid;
op.o_tag = LDAP_REQ_ABANDON;
for ( o = LDAP_STAILQ_FIRST( &c->c_ops ); o; o=next ) {
next = LDAP_STAILQ_NEXT( o, o_next );
op.orn_msgid = o->o_msgid;
o->o_abandon = 1;
2004-12-11 23:41:50 +08:00
op.o_bd = frontendDB;
frontendDB->be_abandon( &op, &rs );
}
/* remove pending operations */
while ( (o = LDAP_STAILQ_FIRST( &c->c_pending_ops )) != NULL) {
LDAP_STAILQ_REMOVE_HEAD( &c->c_pending_ops, o_next );
LDAP_STAILQ_NEXT(o, o_next) = NULL;
slap_op_free( o );
}
}
void connection_closing( Connection *c, const char *why )
{
assert( connections != NULL );
assert( c != NULL );
assert( c->c_struct_state == SLAP_C_USED );
assert( c->c_conn_state != SLAP_C_INVALID );
/* c_mutex must be locked by caller */
if( c->c_conn_state != SLAP_C_CLOSING ) {
ber_socket_t sd;
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_closing: readying conn=%lu sd=%d for close\n",
c->c_connid, sd, 0 );
1999-04-24 04:34:09 +08:00
/* update state to closing */
c->c_conn_state = SLAP_C_CLOSING;
c->c_close_reason = why;
1999-04-24 04:34:09 +08:00
/* don't listen on this port anymore */
slapd_clr_read( sd, 1 );
/* abandon active operations */
connection_abandon( c );
/* wake write blocked operations */
slapd_clr_write( sd, 1 );
if ( c->c_writewaiter ) {
ldap_pvt_thread_cond_signal( &c->c_write_cv );
ldap_pvt_thread_mutex_unlock( &c->c_mutex );
ldap_pvt_thread_yield();
ldap_pvt_thread_mutex_lock( &c->c_mutex );
}
} else if( why == NULL && c->c_close_reason == conn_lost_str ) {
/* Client closed connection after doing Unbind. */
c->c_close_reason = NULL;
}
}
static void connection_close( Connection *c )
{
ber_socket_t sd;
assert( connections != NULL );
assert( c != NULL );
assert( c->c_struct_state == SLAP_C_USED );
assert( c->c_conn_state == SLAP_C_CLOSING );
/* note: connections_mutex and c_mutex should be locked by caller */
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_GET_FD, &sd );
if( !LDAP_STAILQ_EMPTY(&c->c_ops) ) {
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_close: deferring conn=%lu sd=%d\n",
c->c_connid, sd, 0 );
return;
}
2002-03-24 00:53:44 +08:00
Debug( LDAP_DEBUG_TRACE, "connection_close: conn=%lu sd=%d\n",
c->c_connid, sd, 0 );
connection_destroy( c );
}
unsigned long connections_nextid(void)
{
unsigned long id;
assert( connections != NULL );
ldap_pvt_thread_mutex_lock( &conn_nextid_mutex );
id = conn_nextid;
ldap_pvt_thread_mutex_unlock( &conn_nextid_mutex );
return id;
}
Connection* connection_first( ber_socket_t *index )
{
#ifdef SLAP_MULTI_CONN_ARRAY
int conn_array_id;
#endif
assert( connections != NULL );
assert( index != NULL );
#ifdef SLAP_MULTI_CONN_ARRAY
for ( conn_array_id = 0;
conn_array_id < NUM_CONNECTION_ARRAY;
conn_array_id++ )
{
ldap_pvt_thread_mutex_lock( &connections_mutex[ conn_array_id ] );
}
#else
ldap_pvt_thread_mutex_lock( &connections_mutex );
#endif
*index = 0;
return connection_next(NULL, index);
}
Connection* connection_next( Connection *c, ber_socket_t *index )
#ifdef SLAP_MULTI_CONN_ARRAY
{
Connection* conn;
assert( connections != NULL );
assert( index != NULL );
assert( *index >= 0 && *index < MCA_ARRAY_SIZE );
if( c != NULL ) ldap_pvt_thread_mutex_unlock( &c->c_mutex );
c = NULL;
for(; *index < dtblsize; (*index)++) {
assert( MCA_conn_check( *index ) );
conn = MCA_GET_CONNECTION(*index);
if( conn->c_struct_state == SLAP_C_UNINITIALIZED ) {
assert( conn->c_conn_state == SLAP_C_INVALID );
#ifndef HAVE_WINSOCK
continue;
#else
break;
#endif
}
if( conn->c_struct_state == SLAP_C_USED ) {
assert( conn->c_conn_state != SLAP_C_INVALID );
c = conn;
(*index)++;
break;
}
assert( conn->c_struct_state == SLAP_C_UNUSED );
assert( conn->c_conn_state == SLAP_C_INVALID );
}
if( c != NULL ) ldap_pvt_thread_mutex_lock( &c->c_mutex );
return c;
}
#else
{
assert( connections != NULL );
assert( index != NULL );
assert( *index <= dtblsize );
if( c != NULL ) ldap_pvt_thread_mutex_unlock( &c->c_mutex );
c = NULL;
for(; *index < dtblsize; (*index)++) {
if( connections[*index].c_struct_state == SLAP_C_UNINITIALIZED ) {
assert( connections[*index].c_conn_state == SLAP_C_INVALID );
#ifndef HAVE_WINSOCK
continue;
#else
break;
#endif
}
if( connections[*index].c_struct_state == SLAP_C_USED ) {
assert( connections[*index].c_conn_state != SLAP_C_INVALID );
c = &connections[(*index)++];
break;
}
assert( connections[*index].c_struct_state == SLAP_C_UNUSED );
assert( connections[*index].c_conn_state == SLAP_C_INVALID );
}
if( c != NULL ) ldap_pvt_thread_mutex_lock( &c->c_mutex );
return c;
}
#endif
void connection_done( Connection *c )
{
#ifdef SLAP_MULTI_CONN_ARRAY
int conn_array_id;
#endif
assert( connections != NULL );
if( c != NULL ) ldap_pvt_thread_mutex_unlock( &c->c_mutex );
#ifdef SLAP_MULTI_CONN_ARRAY
for ( conn_array_id = 0;
conn_array_id < NUM_CONNECTION_ARRAY;
conn_array_id++ )
{
ldap_pvt_thread_mutex_unlock( &connections_mutex[ conn_array_id ] );
}
#else
ldap_pvt_thread_mutex_unlock( &connections_mutex );
#endif
}
1998-08-09 08:43:13 +08:00
/*
* connection_activity - handle the request operation op on connection
* conn. This routine figures out what kind of operation it is and
* calls the appropriate stub to handle it.
*/
#ifdef SLAPD_MONITOR
/* FIXME: returns 0 in case of failure */
#define INCR_OP_INITIATED(index) \
do { \
ldap_pvt_thread_mutex_lock( &slap_counters.sc_ops_mutex ); \
ldap_pvt_mp_add_ulong(slap_counters.sc_ops_initiated_[(index)], 1); \
ldap_pvt_thread_mutex_unlock( &slap_counters.sc_ops_mutex ); \
} while (0)
#define INCR_OP_COMPLETED(index) \
do { \
ldap_pvt_thread_mutex_lock( &slap_counters.sc_ops_mutex ); \
ldap_pvt_mp_add_ulong(slap_counters.sc_ops_completed, 1); \
ldap_pvt_mp_add_ulong(slap_counters.sc_ops_completed_[(index)], 1); \
ldap_pvt_thread_mutex_unlock( &slap_counters.sc_ops_mutex ); \
} while (0)
#else /* !SLAPD_MONITOR */
#define INCR_OP_INITIATED(index) do { } while (0)
#define INCR_OP_COMPLETED(index) \
do { \
ldap_pvt_thread_mutex_lock( &slap_counters.sc_ops_mutex ); \
ldap_pvt_mp_add_ulong(slap_counters.sc_ops_completed, 1); \
ldap_pvt_thread_mutex_unlock( &slap_counters.sc_ops_mutex ); \
} while (0)
#endif /* !SLAPD_MONITOR */
/*
* NOTE: keep in sync with enum in slapd.h
*/
static int (*opfun[])( Operation *op, SlapReply *rs ) = {
do_bind,
do_unbind,
do_add,
do_delete,
do_modrdn,
do_modify,
do_compare,
do_search,
do_abandon,
do_extended,
NULL
};
static void *
connection_operation( void *ctx, void *arg_v )
1998-08-09 08:43:13 +08:00
{
int rc = LDAP_OTHER;
2003-03-26 02:44:00 +08:00
Operation *op = arg_v;
SlapReply rs = {REP_RESULT};
2003-03-26 02:44:00 +08:00
ber_tag_t tag = op->o_tag;
int opidx = -1;
2003-03-26 02:44:00 +08:00
Connection *conn = op->o_conn;
void *memctx = NULL;
void *memctx_null = NULL;
2003-04-10 14:21:53 +08:00
ber_len_t memsiz;
1998-08-09 08:43:13 +08:00
ldap_pvt_thread_mutex_lock( &slap_counters.sc_ops_mutex );
/* FIXME: returns 0 in case of failure */
ldap_pvt_mp_add_ulong(slap_counters.sc_ops_initiated, 1);
ldap_pvt_thread_mutex_unlock( &slap_counters.sc_ops_mutex );
1998-08-09 08:43:13 +08:00
2003-03-26 02:44:00 +08:00
op->o_threadctx = ctx;
switch ( tag ) {
case LDAP_REQ_BIND:
case LDAP_REQ_UNBIND:
case LDAP_REQ_ADD:
case LDAP_REQ_DELETE:
case LDAP_REQ_MODDN:
case LDAP_REQ_MODIFY:
case LDAP_REQ_COMPARE:
case LDAP_REQ_SEARCH:
case LDAP_REQ_ABANDON:
case LDAP_REQ_EXTENDED:
break;
default:
Debug( LDAP_DEBUG_ANY, "connection_operation: "
"conn %lu unknown LDAP request 0x%lx\n",
conn->c_connid, tag, 0 );
op->o_tag = LBER_ERROR;
rs.sr_err = LDAP_PROTOCOL_ERROR;
rs.sr_text = "unknown LDAP request";
send_ldap_disconnect( op, &rs );
rc = SLAPD_DISCONNECT;
goto operations_error;
}
if( conn->c_sasl_bind_in_progress && tag != LDAP_REQ_BIND ) {
Debug( LDAP_DEBUG_ANY, "connection_operation: "
"error: SASL bind in progress (tag=%ld).\n",
(long) tag, 0, 0 );
send_ldap_error( op, &rs, LDAP_OPERATIONS_ERROR,
"SASL bind in progress" );
rc = LDAP_OPERATIONS_ERROR;
goto operations_error;
}
2003-04-12 18:47:11 +08:00
/* We can use Thread-Local storage for most mallocs. We can
* also use TL for ber parsing, but not on Add or Modify.
*/
2003-04-12 18:47:11 +08:00
#if 0
memsiz = ber_len( op->o_ber ) * 64;
if ( SLAP_SLAB_SIZE > memsiz ) memsiz = SLAP_SLAB_SIZE;
2003-04-12 18:47:11 +08:00
#endif
memsiz = SLAP_SLAB_SIZE;
2003-04-10 14:21:53 +08:00
memctx = slap_sl_mem_create( memsiz, SLAP_SLAB_STACK, ctx );
2003-04-12 18:47:11 +08:00
op->o_tmpmemctx = memctx;
op->o_tmpmfuncs = &slap_sl_mfuncs;
2003-04-12 18:47:11 +08:00
if ( tag != LDAP_REQ_ADD && tag != LDAP_REQ_MODIFY ) {
/* Note - the ber and its buffer are already allocated from
* regular memory; this only affects subsequent mallocs that
* ber_scanf may invoke.
*/
2003-05-29 06:17:08 +08:00
ber_set_option( op->o_ber, LBER_OPT_BER_MEMCTX, &memctx );
}
switch ( tag ) {
1998-08-09 08:43:13 +08:00
case LDAP_REQ_BIND:
opidx = SLAP_OP_BIND;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_UNBIND:
opidx = SLAP_OP_UNBIND;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_ADD:
opidx = SLAP_OP_ADD;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_DELETE:
opidx = SLAP_OP_DELETE;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_MODRDN:
opidx = SLAP_OP_MODRDN;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_MODIFY:
opidx = SLAP_OP_MODIFY;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_COMPARE:
opidx = SLAP_OP_COMPARE;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_SEARCH:
opidx = SLAP_OP_SEARCH;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_ABANDON:
opidx = SLAP_OP_ABANDON;
1998-08-09 08:43:13 +08:00
break;
case LDAP_REQ_EXTENDED:
opidx = SLAP_OP_EXTENDED;
break;
1998-08-09 08:43:13 +08:00
default:
/* not reachable */
assert( 0 );
1998-08-09 08:43:13 +08:00
}
assert( opidx > -1 );
INCR_OP_INITIATED( opidx );
rc = (*(opfun[opidx]))( op, &rs );
operations_error:
if ( rc == SLAPD_DISCONNECT ) {
tag = LBER_ERROR;
} else if ( opidx > -1 ) {
/* increment completed operations count
* only if operation was initiated
* and rc != SLAPD_DISCONNECT */
INCR_OP_COMPLETED( opidx );
}
2003-03-26 02:44:00 +08:00
if ( op->o_cancel == SLAP_CANCEL_REQ ) {
if ( rc == SLAPD_ABANDON ) {
op->o_cancel = SLAP_CANCEL_ACK;
} else {
op->o_cancel = LDAP_TOO_LATE;
}
}
2003-03-26 02:44:00 +08:00
while ( op->o_cancel != SLAP_CANCEL_NONE &&
op->o_cancel != SLAP_CANCEL_DONE )
{
ldap_pvt_thread_yield();
2003-01-25 08:36:50 +08:00
}
ldap_pvt_thread_mutex_lock( &conn->c_mutex );
ber_set_option( op->o_ber, LBER_OPT_BER_MEMCTX, &memctx_null );
2005-01-14 13:19:51 +08:00
LDAP_STAILQ_REMOVE( &conn->c_ops, op, slap_op, o_next);
LDAP_STAILQ_NEXT(op, o_next) = NULL;
slap_op_free( op );
conn->c_n_ops_executing--;
conn->c_n_ops_completed++;
switch( tag ) {
case LBER_ERROR:
case LDAP_REQ_UNBIND:
/* c_mutex is locked */
connection_closing( conn,
tag == LDAP_REQ_UNBIND ? NULL : "operations error" );
break;
}
connection_resched( conn );
ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
return NULL;
1998-08-09 08:43:13 +08:00
}
2004-08-12 18:33:49 +08:00
static const Listener dummy_list = { BER_BVC(""), BER_BVC("") };
2004-03-18 03:33:13 +08:00
int connection_client_setup(
ber_socket_t s,
ldap_pvt_thread_start_t *func,
void *arg )
{
int rc;
Connection *c;
rc = connection_init( s, (Listener *)&dummy_list, "", "",
CONN_IS_CLIENT, 0, NULL );
if ( rc < 0 ) return -1;
c = connection_get( s );
c->c_clientfunc = func;
c->c_clientarg = arg;
slapd_add_internal( s, 0 );
slapd_set_read( s, 1 );
connection_return( c );
return 0;
}
void connection_client_enable(
ber_socket_t s )
{
slapd_set_read( s, 1 );
}
void connection_client_stop(
ber_socket_t s )
{
Connection *c;
/* get (locked) connection */
c = connection_get( s );
assert( c->c_conn_state == SLAP_C_CLIENT );
c->c_listener = NULL;
c->c_conn_state = SLAP_C_INVALID;
c->c_struct_state = SLAP_C_UNUSED;
c->c_close_reason = "?"; /* should never be needed */
slapd_sd_lock();
ber_sockbuf_free( c->c_sb );
slapd_remove( s, 0, 1, 1 );
c->c_sb = ber_sockbuf_alloc( );
{
ber_len_t max = sockbuf_max_incoming;
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_SET_MAX_INCOMING, &max );
}
connection_return( c );
}
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
static int connection_read( ber_socket_t s, conn_readinfo *cri );
2005-10-15 05:37:14 +08:00
static void* connection_read_thread( void* ctx, void* argv )
{
int rc ;
conn_readinfo cri = { NULL, NULL, NULL, 0 };
2005-10-29 10:06:32 +08:00
ber_socket_t s = (long)argv;
/*
* read incoming LDAP requests. If there is more than one,
* the first one is returned with new_op
*/
if( ( rc = connection_read( s, &cri ) ) < 0 ) {
Debug( LDAP_DEBUG_CONNS, "connection_read(%d) error\n", s, 0, 0 );
2005-10-29 10:06:32 +08:00
return (void*)(long)rc;
}
2005-11-02 07:53:01 +08:00
/* execute a single queued request in the same thread */
if( cri.op && !cri.nullop ) {
rc = (long)connection_operation( ctx, cri.op );
} else if ( cri.func ) {
rc = (long)cri.func( ctx, cri.arg );
}
2005-10-29 10:06:32 +08:00
return (void*)(long)rc;
}
2005-10-15 05:37:14 +08:00
int connection_read_activate( ber_socket_t s )
{
int rc;
/*
* suspend reading on this file descriptor until a connection processing
* thread reads data on it. Otherwise the listener thread will repeatedly
* submit the same event on it to the pool.
*/
rc = slapd_clr_read( s, 0 );
if ( rc )
return rc;
rc = ldap_pvt_thread_pool_submit( &connection_pool,
2005-10-29 10:06:32 +08:00
connection_read_thread, (void *)(long)s );
if( rc != 0 ) {
Debug( LDAP_DEBUG_ANY,
"connection_read_activate(%d): submit failed (%d)\n",
s, rc, 0 );
}
return rc;
}
#endif
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
static int
connection_read( ber_socket_t s, conn_readinfo *cri )
#else
int connection_read(ber_socket_t s)
#endif
{
int rc = 0;
Connection *c;
assert( connections != NULL );
ldap_pvt_thread_mutex_lock( MCA_GET_CONN_MUTEX(s) );
/* get (locked) connection */
c = connection_get( s );
if( c == NULL ) {
Debug( LDAP_DEBUG_ANY,
"connection_read(%ld): no connection!\n",
(long) s, 0, 0 );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return -1;
}
c->c_n_read++;
if( c->c_conn_state == SLAP_C_CLOSING ) {
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_read(%d): closing, ignoring input for id=%lu\n",
s, c->c_connid, 0 );
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
slapd_set_read( s, 1 );
#endif
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
if ( c->c_conn_state == SLAP_C_CLIENT ) {
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
cri->func = c->c_clientfunc;
cri->arg = c->c_clientarg;
/* read should already be cleared */
#else
slapd_clr_read( s, 0 );
ldap_pvt_thread_pool_submit( &connection_pool,
c->c_clientfunc, c->c_clientarg );
#endif
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_read(%d): checking for input on id=%lu\n",
s, c->c_connid, 0 );
#ifdef HAVE_TLS
if ( c->c_is_tls && c->c_needs_tls_accept ) {
rc = ldap_pvt_tls_accept( c->c_sb, slap_tls_ctx );
if ( rc < 0 ) {
Debug( LDAP_DEBUG_TRACE,
"connection_read(%d): TLS accept failure "
2002-03-24 00:53:44 +08:00
"error=%d id=%lu, closing\n",
2000-07-28 08:04:07 +08:00
s, rc, c->c_connid );
c->c_needs_tls_accept = 0;
/* connections_mutex and c_mutex are locked */
connection_closing( c, "TLS negotiation failure" );
#if 0
{
struct timeval tv;
fd_set rfd;
/* Drain input before close, to allow SSL error codes
* to propagate to client. */
FD_ZERO(&rfd);
FD_SET(s, &rfd);
for (rc=1; rc>0;) {
tv.tv_sec = 1;
tv.tv_usec = 0;
rc = select(s+1, &rfd, NULL, NULL, &tv);
if (rc == 1) {
ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_DRAIN, NULL);
}
2002-07-11 06:03:32 +08:00
}
}
#endif
connection_close( c );
2005-10-17 04:38:48 +08:00
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
} else if ( rc == 0 ) {
void *ssl;
2004-04-07 12:11:43 +08:00
struct berval authid = BER_BVNULL;
c->c_needs_tls_accept = 0;
/* we need to let SASL know */
2002-04-05 14:48:03 +08:00
ssl = ldap_pvt_tls_sb_ctx( c->c_sb );
c->c_tls_ssf = (slap_ssf_t) ldap_pvt_tls_get_strength( ssl );
if( c->c_tls_ssf > c->c_ssf ) {
c->c_ssf = c->c_tls_ssf;
}
rc = dnX509peerNormalize( ssl, &authid );
if ( rc != LDAP_SUCCESS ) {
2004-06-23 03:49:00 +08:00
Debug( LDAP_DEBUG_TRACE, "connection_read(%d): "
"unable to get TLS client DN, error=%d id=%lu\n",
s, rc, c->c_connid );
}
Statslog( LDAP_DEBUG_STATS,
"conn=%lu fd=%d TLS established tls_ssf=%u ssf=%u\n",
c->c_connid, (int) s, c->c_tls_ssf, c->c_ssf, 0 );
slap_sasl_external( c, c->c_tls_ssf, &authid );
if ( authid.bv_val ) free( authid.bv_val );
}
2002-07-11 06:03:32 +08:00
/* if success and data is ready, fall thru to data input loop */
if( rc != 0 ||
!ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_DATA_READY, NULL ) )
{
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
2005-10-17 04:38:48 +08:00
slapd_set_read( s, 1 );
#endif
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
2002-07-11 06:03:32 +08:00
return 0;
}
}
#endif
2000-07-28 08:04:07 +08:00
#ifdef HAVE_CYRUS_SASL
if ( c->c_sasl_layers ) {
/* If previous layer is not removed yet, give up for now */
if ( !c->c_sasl_sockctx ) {
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
slapd_set_read( s, 1 );
#endif
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
2000-07-28 08:04:07 +08:00
c->c_sasl_layers = 0;
2003-11-19 06:11:11 +08:00
rc = ldap_pvt_sasl_install( c->c_sb, c->c_sasl_sockctx );
2000-07-28 08:04:07 +08:00
if( rc != LDAP_SUCCESS ) {
Debug( LDAP_DEBUG_TRACE,
"connection_read(%d): SASL install error "
2002-03-24 00:53:44 +08:00
"error=%d id=%lu, closing\n",
2000-07-28 08:04:07 +08:00
s, rc, c->c_connid );
2005-10-13 12:33:01 +08:00
2000-07-28 08:04:07 +08:00
/* connections_mutex and c_mutex are locked */
connection_closing( c, "SASL layer install failure" );
2000-07-28 08:04:07 +08:00
connection_close( c );
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
2000-07-28 08:04:07 +08:00
return 0;
}
}
#endif
#define CONNECTION_INPUT_LOOP 1
/* #define DATA_READY_LOOP 1 */
2003-12-14 02:57:00 +08:00
do {
/* How do we do this without getting into a busy loop ? */
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
rc = connection_input( c, cri );
#else
rc = connection_input( c );
#endif
}
#ifdef DATA_READY_LOOP
2003-12-14 02:57:00 +08:00
while( !rc && ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_DATA_READY, NULL ));
#elif CONNECTION_INPUT_LOOP
while(!rc);
#else
while(0);
#endif
if( rc < 0 ) {
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_read(%d): input error=%d id=%lu, closing.\n",
s, rc, c->c_connid );
/* connections_mutex and c_mutex are locked */
connection_closing( c, conn_lost_str );
connection_close( c );
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
if ( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_NEEDS_WRITE, NULL ) ) {
slapd_set_write( s, 0 );
}
slapd_set_read( s, 1 );
#else
if ( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_NEEDS_READ, NULL ) ) {
slapd_set_read( s, 1 );
}
if ( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_NEEDS_WRITE, NULL ) ) {
slapd_set_write( s, 1 );
}
#endif
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
static int
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
connection_input( Connection *conn , conn_readinfo *cri )
#else
connection_input( Connection *conn )
#endif
1998-08-09 08:43:13 +08:00
{
Operation *op;
ber_tag_t tag;
ber_len_t len;
ber_int_t msgid;
1998-08-09 08:43:13 +08:00
BerElement *ber;
int rc;
#ifdef LDAP_CONNECTIONLESS
Sockaddr peeraddr;
char *cdn = NULL;
#endif
char *defer = NULL;
1998-08-09 08:43:13 +08:00
2002-09-17 05:50:55 +08:00
if ( conn->c_currentber == NULL &&
( conn->c_currentber = ber_alloc()) == NULL )
{
Debug( LDAP_DEBUG_ANY, "ber_alloc failed\n", 0, 0, 0 );
return -1;
1998-08-09 08:43:13 +08:00
}
errno = 0;
2000-06-15 05:11:56 +08:00
#ifdef LDAP_CONNECTIONLESS
2002-09-17 05:50:55 +08:00
if ( conn->c_is_udp ) {
2005-10-13 12:33:01 +08:00
char peername[sizeof("IP=255.255.255.255:65336")];
2005-10-13 12:33:01 +08:00
len = ber_int_sb_read(conn->c_sb, &peeraddr, sizeof(struct sockaddr));
if (len != sizeof(struct sockaddr)) return 1;
sprintf( peername, "IP=%s:%d",
inet_ntoa( peeraddr.sa_in_addr.sin_addr ),
(unsigned) ntohs( peeraddr.sa_in_addr.sin_port ) );
Statslog( LDAP_DEBUG_STATS,
2002-03-24 00:53:44 +08:00
"conn=%lu UDP request from %s (%s) accepted.\n",
2002-03-07 04:58:20 +08:00
conn->c_connid, peername, conn->c_sock_name.bv_val, 0, 0 );
}
#endif
2000-06-15 05:11:56 +08:00
tag = ber_get_next( conn->c_sb, &len, conn->c_currentber );
if ( tag != LDAP_TAG_MESSAGE ) {
int err = errno;
ber_socket_t sd;
ber_sockbuf_ctrl( conn->c_sb, LBER_SB_OPT_GET_FD, &sd );
1998-08-09 08:43:13 +08:00
Debug( LDAP_DEBUG_TRACE,
1999-08-19 08:40:18 +08:00
"ber_get_next on fd %d failed errno=%d (%s)\n",
sd, err, sock_errstr(err) );
if ( err != EWOULDBLOCK && err != EAGAIN ) {
1998-08-09 08:43:13 +08:00
/* log, close and send error */
ber_free( conn->c_currentber, 1 );
conn->c_currentber = NULL;
return -2;
1998-08-09 08:43:13 +08:00
}
return 1;
1998-08-09 08:43:13 +08:00
}
1998-08-09 08:43:13 +08:00
ber = conn->c_currentber;
conn->c_currentber = NULL;
if ( (tag = ber_get_int( ber, &msgid )) != LDAP_TAG_MSGID ) {
/* log, close and send error */
2005-10-13 12:33:01 +08:00
Debug( LDAP_DEBUG_ANY, "ber_get_int returns 0x%lx\n", tag, 0, 0 );
1998-08-09 08:43:13 +08:00
ber_free( ber, 1 );
return -1;
1998-08-09 08:43:13 +08:00
}
if ( (tag = ber_peek_tag( ber, &len )) == LBER_ERROR ) {
/* log, close and send error */
2005-10-13 12:33:01 +08:00
Debug( LDAP_DEBUG_ANY, "ber_peek_tag returns 0x%lx\n", tag, 0, 0 );
1998-08-09 08:43:13 +08:00
ber_free( ber, 1 );
return -1;
1998-08-09 08:43:13 +08:00
}
#ifdef LDAP_CONNECTIONLESS
2002-09-17 05:50:55 +08:00
if( conn->c_is_udp ) {
if( tag == LBER_OCTETSTRING ) {
ber_get_stringa( ber, &cdn );
tag = ber_peek_tag(ber, &len);
}
2002-09-17 05:50:55 +08:00
if( tag != LDAP_REQ_ABANDON && tag != LDAP_REQ_SEARCH ) {
2003-11-19 06:11:11 +08:00
Debug( LDAP_DEBUG_ANY, "invalid req for UDP 0x%lx\n", tag, 0, 0 );
ber_free( ber, 1 );
return 0;
}
}
#endif
if(tag == LDAP_REQ_BIND) {
2005-01-02 00:14:11 +08:00
/* immediately abandon all existing operations upon BIND */
connection_abandon( conn );
}
op = slap_op_alloc( ber, msgid, tag, conn->c_n_ops_received++ );
op->o_conn = conn;
/* clear state if the connection is being reused from inactive */
if ( conn->c_conn_state == SLAP_C_INACTIVE ) {
2005-10-13 12:33:01 +08:00
memset( &conn->c_pagedresults_state, 0,
sizeof( conn->c_pagedresults_state ) );
}
op->o_res_ber = NULL;
#ifdef LDAP_CONNECTIONLESS
if (conn->c_is_udp) {
if ( cdn ) {
2003-11-19 06:11:11 +08:00
ber_str2bv( cdn, 0, 1, &op->o_dn );
op->o_protocol = LDAP_VERSION2;
}
op->o_res_ber = ber_alloc_t( LBER_USE_DER );
if (op->o_res_ber == NULL) return 1;
rc = ber_write( op->o_res_ber, (char *)&peeraddr,
sizeof(struct sockaddr), 0 );
if (rc != sizeof(struct sockaddr)) {
Debug( LDAP_DEBUG_ANY, "ber_write failed\n", 0, 0, 0 );
return 1;
}
if (op->o_protocol == LDAP_VERSION2) {
rc = ber_printf(op->o_res_ber, "{is{" /*}}*/, op->o_msgid, "");
if (rc == -1) {
Debug( LDAP_DEBUG_ANY, "ber_write failed\n", 0, 0, 0 );
return rc;
}
}
}
#endif /* LDAP_CONNECTIONLESS */
rc = 0;
/* Don't process requests when the conn is in the middle of a
* Bind, or if it's closing. Also, don't let any single conn
* use up all the available threads, and don't execute if we're
* currently blocked on output. And don't execute if there are
* already pending ops, let them go first. Abandon operations
* get exceptions to some, but not all, cases.
*/
2005-06-18 17:06:12 +08:00
switch( tag ){
default:
/* Abandon and Unbind are exempt from these checks */
if (conn->c_conn_state == SLAP_C_CLOSING) {
defer = "closing";
break;
} else if (conn->c_writewaiter) {
defer = "awaiting write";
break;
} else if (conn->c_n_ops_pending) {
defer = "pending operations";
break;
}
/* FALLTHRU */
case LDAP_REQ_ABANDON:
/* Unbind is exempt from these checks */
if (conn->c_n_ops_executing >= connection_pool_max/2) {
defer = "too many executing";
break;
} else if (conn->c_conn_state == SLAP_C_BINDING) {
defer = "binding";
break;
}
/* FALLTHRU */
case LDAP_REQ_UNBIND:
break;
}
if( defer ) {
2003-11-06 11:42:46 +08:00
int max = conn->c_dn.bv_len
? slap_conn_max_pending_auth
: slap_conn_max_pending;
2003-11-06 11:42:46 +08:00
Debug( LDAP_DEBUG_ANY,
"connection_input: conn=%lu deferring operation: %s\n",
conn->c_connid, defer, 0 );
conn->c_n_ops_pending++;
LDAP_STAILQ_INSERT_TAIL( &conn->c_pending_ops, op, o_next );
2005-10-13 12:33:01 +08:00
rc = ( conn->c_n_ops_pending > max ) ? -1 : 0;
} else {
conn->c_n_ops_executing++;
2005-10-13 12:33:01 +08:00
2005-11-02 07:53:01 +08:00
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
/*
* The first op will be processed in the same thread context,
2005-11-02 07:53:01 +08:00
* as long as there is only one op total.
* Subsequent ops will be submitted to the pool by
* calling connection_op_activate()
*/
if ( cri->op == NULL ) {
/* the first incoming request */
connection_op_queue( op );
cri->op = op;
2005-11-02 07:53:01 +08:00
} else {
2005-11-03 20:45:57 +08:00
if ( !cri->nullop ) {
cri->nullop = 1;
rc = ldap_pvt_thread_pool_submit( &connection_pool,
connection_operation, (void *) cri->op );
}
connection_op_activate( op );
}
2005-11-02 07:53:01 +08:00
#else
connection_op_activate( op );
#endif
}
#ifdef NO_THREADS
if ( conn->c_struct_state != SLAP_C_USED ) {
/* connection must have got closed underneath us */
return 1;
}
#endif
2005-10-13 12:33:01 +08:00
assert( conn->c_struct_state == SLAP_C_USED );
return rc;
}
static int
connection_resched( Connection *conn )
{
Operation *op;
if( conn->c_conn_state == SLAP_C_CLOSING ) {
int rc;
ber_socket_t sd;
ber_sockbuf_ctrl( conn->c_sb, LBER_SB_OPT_GET_FD, &sd );
2000-09-02 08:19:06 +08:00
/* use trylock to avoid possible deadlock */
rc = ldap_pvt_thread_mutex_trylock( MCA_GET_CONN_MUTEX( sd ) );
if( rc ) {
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_resched: reaquiring locks conn=%lu sd=%d\n",
conn->c_connid, sd, 0 );
/*
* reaquire locks in the right order...
* this may allow another thread to close this connection,
* so recheck state below.
*/
ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
ldap_pvt_thread_mutex_lock( MCA_GET_CONN_MUTEX ( sd ) );
ldap_pvt_thread_mutex_lock( &conn->c_mutex );
}
2000-09-02 08:19:06 +08:00
if( conn->c_conn_state != SLAP_C_CLOSING ) {
Debug( LDAP_DEBUG_TRACE, "connection_resched: "
2002-03-24 00:53:44 +08:00
"closed by other thread conn=%lu sd=%d\n",
2000-09-02 08:19:06 +08:00
conn->c_connid, sd, 0 );
} else {
Debug( LDAP_DEBUG_TRACE, "connection_resched: "
2002-03-24 00:53:44 +08:00
"attempting closing conn=%lu sd=%d\n",
2000-09-02 08:19:06 +08:00
conn->c_connid, sd, 0 );
connection_close( conn );
}
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX( sd ) );
return 0;
}
if( conn->c_conn_state != SLAP_C_ACTIVE || conn->c_writewaiter ) {
/* other states need different handling */
1999-04-02 00:32:11 +08:00
return 0;
}
while ((op = LDAP_STAILQ_FIRST( &conn->c_pending_ops )) != NULL) {
2005-10-13 12:33:01 +08:00
if ( conn->c_n_ops_executing > connection_pool_max/2 ) break;
LDAP_STAILQ_REMOVE_HEAD( &conn->c_pending_ops, o_next );
LDAP_STAILQ_NEXT(op, o_next) = NULL;
2005-10-13 12:33:01 +08:00
/* pending operations should not be marked for abandonment */
assert(!op->o_abandon);
conn->c_n_ops_pending--;
conn->c_n_ops_executing++;
2003-03-26 02:44:00 +08:00
connection_op_activate( op );
2005-10-13 12:33:01 +08:00
if ( conn->c_conn_state == SLAP_C_BINDING ) break;
}
1999-04-02 00:32:11 +08:00
return 0;
}
2004-09-27 07:00:00 +08:00
static void
connection_init_log_prefix( Operation *op )
{
if ( op->o_connid == (unsigned long)(-1) ) {
snprintf( op->o_log_prefix, sizeof( op->o_log_prefix ),
"conn=-1 op=%lu", op->o_opid );
2004-09-27 07:00:00 +08:00
} else {
snprintf( op->o_log_prefix, sizeof( op->o_log_prefix ),
"conn=%lu op=%lu", op->o_connid, op->o_opid );
2004-09-27 07:00:00 +08:00
}
}
static int connection_bind_cb( Operation *op, SlapReply *rs )
{
slap_callback *cb = op->o_callback;
ldap_pvt_thread_mutex_lock( &op->o_conn->c_mutex );
op->o_conn->c_conn_state = SLAP_C_ACTIVE;
op->o_conn->c_sasl_bind_in_progress =
( rs->sr_err == LDAP_SASL_BIND_IN_PROGRESS );
/* Moved here from bind.c due to ITS#4158 */
2005-11-08 17:53:38 +08:00
op->o_conn->c_sasl_bindop = NULL;
if ( op->orb_method == LDAP_AUTH_SASL ) {
if( rs->sr_err == LDAP_SUCCESS ) {
ber_dupbv(&op->o_conn->c_dn, &op->orb_edn);
if( !BER_BVISEMPTY( &op->orb_edn ) ) {
/* edn is always normalized already */
ber_dupbv( &op->o_conn->c_ndn, &op->o_conn->c_dn );
}
op->o_tmpfree( op->orb_edn.bv_val, op->o_tmpmemctx );
BER_BVZERO( &op->orb_edn );
op->o_conn->c_authmech = op->o_conn->c_sasl_bind_mech;
BER_BVZERO( &op->o_conn->c_sasl_bind_mech );
op->o_conn->c_sasl_ssf = op->orb_ssf;
if( op->orb_ssf > op->o_conn->c_ssf ) {
op->o_conn->c_ssf = op->orb_ssf;
}
if( !BER_BVISEMPTY( &op->o_conn->c_dn ) ) {
ber_len_t max = sockbuf_max_incoming_auth;
ber_sockbuf_ctrl( op->o_conn->c_sb,
LBER_SB_OPT_SET_MAX_INCOMING, &max );
}
/* log authorization identity */
Statslog( LDAP_DEBUG_STATS,
"%s BIND dn=\"%s\" mech=%s ssf=%d\n",
op->o_log_prefix,
BER_BVISNULL( &op->o_conn->c_dn ) ? "<empty>" : op->o_conn->c_dn.bv_val,
op->o_conn->c_authmech.bv_val, op->orb_ssf, 0 );
Debug( LDAP_DEBUG_TRACE,
"do_bind: SASL/%s bind: dn=\"%s\" ssf=%d\n",
op->o_conn->c_authmech.bv_val,
BER_BVISNULL( &op->o_conn->c_dn ) ? "<empty>" : op->o_conn->c_dn.bv_val,
op->orb_ssf );
} else if ( rs->sr_err != LDAP_SASL_BIND_IN_PROGRESS ) {
if ( !BER_BVISNULL( &op->o_conn->c_sasl_bind_mech ) ) {
free( op->o_conn->c_sasl_bind_mech.bv_val );
BER_BVZERO( &op->o_conn->c_sasl_bind_mech );
}
}
}
ldap_pvt_thread_mutex_unlock( &op->o_conn->c_mutex );
2006-01-07 00:24:37 +08:00
ch_free( op->o_callback );
op->o_callback = NULL;
return SLAP_CB_CONTINUE;
}
static void connection_op_queue( Operation *op )
{
ber_tag_t tag = op->o_tag;
1998-08-09 08:43:13 +08:00
2005-10-13 12:33:01 +08:00
if (tag == LDAP_REQ_BIND) {
slap_callback *sc = ch_calloc( 1, sizeof( slap_callback ));
sc->sc_response = connection_bind_cb;
sc->sc_next = op->o_callback;
op->o_callback = sc;
2003-03-26 02:44:00 +08:00
op->o_conn->c_conn_state = SLAP_C_BINDING;
}
2003-03-26 02:44:00 +08:00
if (!op->o_dn.bv_len) {
2003-11-19 06:11:11 +08:00
op->o_authz = op->o_conn->c_authz;
if ( BER_BVISNULL( &op->o_conn->c_sasl_authz_dn )) {
ber_dupbv( &op->o_dn, &op->o_conn->c_dn );
ber_dupbv( &op->o_ndn, &op->o_conn->c_ndn );
} else {
ber_dupbv( &op->o_dn, &op->o_conn->c_sasl_authz_dn );
ber_dupbv( &op->o_ndn, &op->o_conn->c_sasl_authz_dn );
}
}
2003-03-26 02:44:00 +08:00
op->o_authtype = op->o_conn->c_authtype;
ber_dupbv( &op->o_authmech, &op->o_conn->c_authmech );
2003-03-26 02:44:00 +08:00
if (!op->o_protocol) {
2003-11-06 11:42:46 +08:00
op->o_protocol = op->o_conn->c_protocol
? op->o_conn->c_protocol : LDAP_VERSION3;
}
2005-10-13 12:33:01 +08:00
if (op->o_conn->c_conn_state == SLAP_C_INACTIVE &&
op->o_protocol > LDAP_VERSION2)
2003-11-06 11:42:46 +08:00
{
op->o_conn->c_conn_state = SLAP_C_ACTIVE;
}
2003-03-26 02:44:00 +08:00
op->o_connid = op->o_conn->c_connid;
2004-09-27 07:00:00 +08:00
connection_init_log_prefix( op );
2003-03-26 02:44:00 +08:00
LDAP_STAILQ_INSERT_TAIL( &op->o_conn->c_ops, op, o_next );
}
static int connection_op_activate( Operation *op )
{
int rc;
connection_op_queue( op );
rc = ldap_pvt_thread_pool_submit( &connection_pool,
2003-03-26 02:44:00 +08:00
connection_operation, (void *) op );
if ( rc != 0 ) {
Debug( LDAP_DEBUG_ANY,
"connection_op_activate: submit failed (%d) for conn=%lu\n",
rc, op->o_connid, 0 );
/* should move op to pending list */
1998-08-18 07:26:25 +08:00
}
return rc;
}
#ifdef SLAP_LIGHTWEIGHT_DISPATCHER
2005-10-29 10:06:32 +08:00
static int connection_write( ber_socket_t s );
static void *connection_write_thread( void *ctx, void *arg )
{
return (void *)(long)connection_write((long)arg);
}
int connection_write_activate( ber_socket_t s )
{
int rc;
/*
* suspend reading on this file descriptor until a connection processing
* thread write data on it. Otherwise the listener thread will repeatedly
* submit the same event on it to the pool.
*/
slapd_clr_write( s, 0);
rc = ldap_pvt_thread_pool_submit( &connection_pool,
2005-10-29 10:06:32 +08:00
connection_write_thread, (void *)(long)s );
if( rc != 0 ) {
Debug( LDAP_DEBUG_ANY,
2005-10-29 10:06:32 +08:00
"connection_write_activate(%d): submit failed (%d)\n",
(int) s, rc, 0 );
}
return rc;
1998-08-09 08:43:13 +08:00
}
static
#endif
int connection_write(ber_socket_t s)
{
Connection *c;
Operation *op;
assert( connections != NULL );
ldap_pvt_thread_mutex_lock( MCA_GET_CONN_MUTEX( s ) );
c = connection_get( s );
if( c == NULL ) {
Debug( LDAP_DEBUG_ANY,
"connection_write(%ld): no connection!\n",
2003-11-06 11:42:46 +08:00
(long)s, 0, 0 );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX( s ) );
return -1;
}
#ifndef SLAP_LIGHTWEIGHT_DISPATCHER
2005-01-14 10:08:02 +08:00
slapd_clr_write( s, 0);
#endif
2005-10-29 10:06:32 +08:00
c->c_n_write++;
Debug( LDAP_DEBUG_TRACE,
2002-03-24 00:53:44 +08:00
"connection_write(%d): waking output for id=%lu\n",
s, c->c_connid, 0 );
ldap_pvt_thread_cond_signal( &c->c_write_cv );
2003-11-06 11:42:46 +08:00
if ( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_NEEDS_READ, NULL ) ) {
slapd_set_read( s, 1 );
2003-11-06 11:42:46 +08:00
}
if ( ber_sockbuf_ctrl( c->c_sb, LBER_SB_OPT_NEEDS_WRITE, NULL ) ) {
slapd_set_write( s, 1 );
2003-11-06 11:42:46 +08:00
}
/* If there are ops pending because of a writewaiter,
* start one up.
*/
while ((op = LDAP_STAILQ_FIRST( &c->c_pending_ops )) != NULL) {
if ( !c->c_writewaiter ) break;
2005-10-13 12:33:01 +08:00
if ( c->c_n_ops_executing > connection_pool_max/2 ) break;
LDAP_STAILQ_REMOVE_HEAD( &c->c_pending_ops, o_next );
LDAP_STAILQ_NEXT(op, o_next) = NULL;
2005-10-13 12:33:01 +08:00
/* pending operations should not be marked for abandonment */
assert(!op->o_abandon);
c->c_n_ops_pending--;
c->c_n_ops_executing++;
connection_op_activate( op );
break;
}
connection_return( c );
ldap_pvt_thread_mutex_unlock( MCA_GET_CONN_MUTEX(s) );
return 0;
}
2000-09-22 01:32:54 +08:00
2004-03-18 03:33:13 +08:00
void
connection_fake_init(
Connection *conn,
Operation *op,
void *ctx )
{
2004-03-18 06:14:32 +08:00
conn->c_connid = -1;
conn->c_send_ldap_result = slap_send_ldap_result;
conn->c_send_search_entry = slap_send_search_entry;
conn->c_send_search_reference = slap_send_search_reference;
conn->c_listener = (Listener *)&dummy_list;
2004-08-12 18:33:49 +08:00
conn->c_peer_domain = slap_empty_bv;
2004-03-18 06:14:32 +08:00
conn->c_peer_name = slap_empty_bv;
memset(op, 0, OPERATION_BUFFER_SIZE);
op->o_hdr = (Opheader *)(op+1);
op->o_controls = (void **)(op->o_hdr+1);
2004-03-18 06:14:32 +08:00
/* set memory context */
op->o_tmpmemctx = slap_sl_mem_create(SLAP_SLAB_SIZE, SLAP_SLAB_STACK, ctx);
op->o_tmpmfuncs = &slap_sl_mfuncs;
2004-03-18 03:33:13 +08:00
op->o_threadctx = ctx;
2004-03-18 06:14:32 +08:00
op->o_conn = conn;
op->o_connid = op->o_conn->c_connid;
2004-09-27 07:00:00 +08:00
connection_init_log_prefix( op );
2004-03-18 03:33:13 +08:00
#ifdef LDAP_SLAPI
slapi_int_create_object_extensions( SLAPI_X_EXT_CONNECTION, conn );
slapi_int_create_object_extensions( SLAPI_X_EXT_OPERATION, op );
#endif /* LDAP_SLAPI */
2005-10-13 19:58:44 +08:00
slap_op_time( &op->o_time, &op->o_tincr );
2004-03-18 03:33:13 +08:00
}
void
connection_assign_nextid( Connection *conn )
{
ldap_pvt_thread_mutex_lock( &conn_nextid_mutex );
conn->c_connid = conn_nextid++;
ldap_pvt_thread_mutex_unlock( &conn_nextid_mutex );
}