1
0
mirror of https://github.com/apache/httpd.git synced 2025-08-08 15:02:10 +03:00

Replace AcceptMutex, LockFile, RewriteLock, SSLMutex, SSLStaplingMutex,

and WatchdogMutexPath with a single Mutex directive.  Add APIs to
simplify setup and user customization of APR proc and global mutexes.  
(See util_mutex.h.)  Build-time setting DEFAULT_LOCKFILE is no longer
respected; set DEFAULT_REL_RUNTIMEDIR instead.

Some existing modules, such as mod_ldap and mod_auth_digest gain 
configurability for their mutexes.


git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@883540 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
Jeff Trawick
2009-11-23 23:17:51 +00:00
parent b5a24b1d4f
commit 2e9668a33d
31 changed files with 628 additions and 564 deletions

View File

@@ -10,6 +10,12 @@ Changes with Apache 2.3.3
mod_proxy_ftp: NULL pointer dereference on error paths. mod_proxy_ftp: NULL pointer dereference on error paths.
[Stefan Fritsch <sf fritsch.de>, Joe Orton] [Stefan Fritsch <sf fritsch.de>, Joe Orton]
*) Replace AcceptMutex, LockFile, RewriteLock, SSLMutex, SSLStaplingMutex,
and WatchdogMutexPath with a single Mutex directive. Add APIs to
simplify setup and user customization of APR proc and global mutexes.
(See util_mutex.h.) Build-time setting DEFAULT_LOCKFILE is no longer
respected; set DEFAULT_REL_RUNTIMEDIR instead. [Jeff Trawick]
*) http_core: KeepAlive no longer accepts other than On|Off. *) http_core: KeepAlive no longer accepts other than On|Off.
[Takashi Sato] [Takashi Sato]

View File

@@ -100,8 +100,8 @@ match ($0,/^SSLSessionCache +"shmcb:/) {
sub(/^SSLSessionCache/, "#SSLSessionCache") sub(/^SSLSessionCache/, "#SSLSessionCache")
} }
match ($0,/^SSLMutex +"file:@exp_runtimedir@\/ssl_mutex"/) { match ($0,/^Mutex +"file:@rel_runtimedir@"/) {
sub(/"file:@exp_runtimedir@\/ssl_mutex"/, "default") sub(/"file:@rel_runtimedir@"/, "default")
} }
match ($0,/@@.*@@/) { match ($0,/@@.*@@/) {

View File

@@ -12,20 +12,6 @@
PidFile "@rel_runtimedir@/httpd.pid" PidFile "@rel_runtimedir@/httpd.pid"
</IfModule> </IfModule>
#
# The accept serialization lock file MUST BE STORED ON A LOCAL DISK.
#
<IfModule !mpm_simple_module>
<IfModule !mpm_winnt_module>
<IfModule !mpm_netware_module>
<IfModule !mpm_mpmt_os2_module>
LockFile "@rel_logfiledir@/accept.lock"
</IfModule>
</IfModule>
</IfModule>
</IfModule>
# #
# Only one of the below sections will be relevant on your # Only one of the below sections will be relevant on your
# installed httpd. Use "apachectl -l" to find out the # installed httpd. Use "apachectl -l" to find out the

View File

@@ -56,11 +56,6 @@ SSLPassPhraseDialog builtin
SSLSessionCache "shmcb:@exp_runtimedir@/ssl_scache(512000)" SSLSessionCache "shmcb:@exp_runtimedir@/ssl_scache(512000)"
SSLSessionCacheTimeout 300 SSLSessionCacheTimeout 300
# Semaphore:
# Configure the path to the mutual exclusion semaphore the
# SSL engine uses internally for inter-process synchronization.
SSLMutex "file:@exp_runtimedir@/ssl_mutex"
## ##
## SSL Virtual Host Context ## SSL Virtual Host Context
## ##

View File

@@ -22,12 +22,22 @@
# configuration, error, and log files are kept. # configuration, error, and log files are kept.
# #
# Do not add a slash at the end of the directory path. If you point # Do not add a slash at the end of the directory path. If you point
# ServerRoot at a non-local disk, be sure to point the LockFile directive # ServerRoot at a non-local disk, be sure to specify a local disk on the
# at a local disk. If you wish to share the same ServerRoot for multiple # Mutex directive, if file-based mutexes are used. If you wish to share the
# httpd daemons, you will need to change at least LockFile and PidFile. # same ServerRoot for multiple httpd daemons, you will need to change at
# least PidFile.
# #
ServerRoot "@@ServerRoot@@" ServerRoot "@@ServerRoot@@"
#
# Mutex: Allows you to set the mutex mechanism and mutex file directory
# for individual mutexes, or change the global defaults
#
# Uncomment only if mutexes are file-based and the default mutex file
# directory is not appropriate.
#
# Mutex default file:@rel_runtimedir@
# #
# Listen: Allows you to bind Apache to specific IP addresses and/or # Listen: Allows you to bind Apache to specific IP addresses and/or
# ports, instead of the default. See also the <VirtualHost> # ports, instead of the default. See also the <VirtualHost>

View File

@@ -205,6 +205,7 @@
* 20091011.1 (2.3.3-dev) add debug_level to util_ldap_state_t * 20091011.1 (2.3.3-dev) add debug_level to util_ldap_state_t
* 20091031.0 (2.3.3-dev) remove public LDAP referral-related macros * 20091031.0 (2.3.3-dev) remove public LDAP referral-related macros
* 20091119.0 (2.3.4-dev) dav_error interface uses apr_status_t parm, not errno * 20091119.0 (2.3.4-dev) dav_error interface uses apr_status_t parm, not errno
* 20091119.1 (2.3.4-dev) ap_mutex_register(), ap_{proc,global}_mutex_create()
* *
*/ */
@@ -213,7 +214,7 @@
#ifndef MODULE_MAGIC_NUMBER_MAJOR #ifndef MODULE_MAGIC_NUMBER_MAJOR
#define MODULE_MAGIC_NUMBER_MAJOR 20091119 #define MODULE_MAGIC_NUMBER_MAJOR 20091119
#endif #endif
#define MODULE_MAGIC_NUMBER_MINOR 0 /* 0...n */ #define MODULE_MAGIC_NUMBER_MINOR 1 /* 0...n */
/** /**
* Determine if the server's current MODULE_MAGIC_NUMBER is at least a * Determine if the server's current MODULE_MAGIC_NUMBER is at least a

View File

@@ -40,10 +40,6 @@
#include "apr_global_mutex.h" #include "apr_global_mutex.h"
#include "apr_file_io.h" #include "apr_file_io.h"
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
#if APR_HAVE_UNISTD_H #if APR_HAVE_UNISTD_H
#include <unistd.h> /* for getpid() */ #include <unistd.h> /* for getpid() */
#endif #endif

View File

@@ -264,20 +264,6 @@ extern const char *ap_pid_fname;
const char *ap_mpm_set_pidfile(cmd_parms *cmd, void *dummy, const char *ap_mpm_set_pidfile(cmd_parms *cmd, void *dummy,
const char *arg); const char *arg);
/**
* The name of lockfile used when Apache needs to lock the accept() call.
*/
extern const char *ap_lock_fname;
const char *ap_mpm_set_lockfile(cmd_parms *cmd, void *dummy,
const char *arg);
/**
* The system mutex implementation to use for the accept mutex.
*/
extern apr_lockmech_e ap_accept_lock_mech;
const char *ap_mpm_set_accept_lock_mech(cmd_parms *cmd, void *dummy,
const char *arg);
/* /*
* Set the scorboard file. * Set the scorboard file.
*/ */
@@ -347,6 +333,11 @@ AP_DECLARE_HOOK(apr_status_t, mpm_register_timed_callback,
/* get MPM name (e.g., "prefork" or "event") */ /* get MPM name (e.g., "prefork" or "event") */
AP_DECLARE_HOOK(const char *,mpm_get_name,(void)) AP_DECLARE_HOOK(const char *,mpm_get_name,(void))
/* mutex type string for accept mutex, if any; MPMs should use the
* same mutex type for ease of configuration
*/
#define ap_accept_mutex_type "mpm-accept"
#ifdef __cplusplus #ifdef __cplusplus
} }
#endif #endif

View File

@@ -156,7 +156,6 @@ typedef struct util_ldap_state_t {
/* cache ald */ /* cache ald */
void *util_ldap_cache; void *util_ldap_cache;
char *lock_file; /* filename for shm lock mutex */
long connectionTimeout; long connectionTimeout;
int verify_svr_cert; int verify_svr_cert;
int debug_level; /* SDK debug level */ int debug_level; /* SDK debug level */

View File

@@ -98,6 +98,110 @@ AP_DECLARE(apr_status_t) ap_parse_mutex(const char *arg, apr_pool_t *pool,
apr_lockmech_e *mutexmech, apr_lockmech_e *mutexmech,
const char **mutexfile); const char **mutexfile);
/* private function to process the Mutex directive */
AP_DECLARE(const char *) ap_set_mutex(cmd_parms *cmd, void *dummy,
const char *typelist,
const char *mechfile);
/**
* option flags for ap_mutex_register(), ap_global_mutex_create(), and
* ap_proc_mutex_create()
*/
#define AP_MUTEX_ALLOW_NONE 1 /* allow "none" as mutex implementation;
* respected only on ap_mutex_register()
*/
#define AP_MUTEX_DEFAULT_NONE 2 /* default to "none" for this mutex;
* respected only on ap_mutex_register()
*/
/**
* Register a module's mutex type with core to allow configuration
* with the Mutex directive. This must be called in the pre_config
* hook; otherwise, configuration directives referencing this mutex
* type will be rejected.
*
* The default_dir and default_mech parameters allow a module to set
* defaults for the lock file directory and mechanism. These could
* be based on compile-time settings. These aren't required except
* in special circumstances.
*
* The order of precedence for the choice of mechanism and lock file
* directory is:
*
* 1. Mutex directive specifically for this mutex
* e.g., Mutex mpm-default flock:/tmp/mpmlocks
* 2. Mutex directive for global default
* e.g., Mutex default flock:/tmp/httpdlocks
* 3. Defaults for this mutex provided on the ap_mutex_register()
* 4. Built-in defaults for all mutexes, which are
* APR_LOCK_DEFAULT and DEFAULT_REL_RUNTIMEDIR.
*
* @param pconf The pconf pool
* @param type The type name of the mutex, used as the basename of the
* file associated with the mutex, if any. This must be unique among
* all mutex types (mutex creation accommodates multi-instance mutex
* types); mod_foo might have mutex types "foo-pipe" and "foo-shm"
* @param default_dir Default dir for any lock file required for this
* lock, to override built-in defaults; should be NULL for most
* modules, to respect built-in defaults
* @param default_mech Default mechanism for this lock, to override
* built-in defaults; should be APR_LOCK_DEFAULT for most modules, to
* respect built-in defaults
* or NULL if there are no defaults for this mutex.
* @param options combination of AP_MUTEX_* constants, or 0 for defaults
*/
AP_DECLARE(apr_status_t) ap_mutex_register(apr_pool_t *pconf,
const char *type,
const char *default_dir,
apr_lockmech_e default_mech,
apr_int32_t options);
/**
* Create an APR global mutex that has been registered previously with
* ap_mutex_register(). Mutex files, permissions, and error logging will
* be handled internally.
* @param mutex The memory address where the newly created mutex will be
* stored. If this mutex is disabled, mutex will be set to NULL on
* output. (That is allowed only if the AP_MUTEX_ALLOW_NONE flag is
* passed to ap_mutex_register().)
* @param type The type name of the mutex, matching the type name passed
* to ap_mutex_register().
* @param instance_id A unique string to be used in the lock filename IFF
* this mutex type is multi-instance, NULL otherwise.
* @param s server_rec of main server
* @param pconf pool
* @param options combination of AP_MUTEX_* constants, or 0 for defaults
* (currently none are defined for this function)
*/
AP_DECLARE(apr_status_t) ap_global_mutex_create(apr_global_mutex_t **mutex,
const char *type,
const char *instance_id,
server_rec *s,
apr_pool_t *pconf,
apr_int32_t options);
/**
* Create an APR proc mutex that has been registered previously with
* ap_mutex_register(). Mutex files, permissions, and error logging will
* be handled internally.
* @param mutex The memory address where the newly created mutex will be
* stored. If this mutex is disabled, mutex will be set to NULL on
* output. (That is allowed only if the AP_MUTEX_ALLOW_NONE flag is
* passed to ap_mutex_register().)
* @param type The type name of the mutex, matching the type name passed
* to ap_mutex_register().
* @param instance_id A unique string to be used in the lock filename IFF
* this mutex type is multi-instance, NULL otherwise.
* @param s server_rec of main server
* @param pconf pool
* @param options combination of AP_MUTEX_* constants, or 0 for defaults
* (currently none are defined for this function)
*/
AP_DECLARE(apr_status_t) ap_proc_mutex_create(apr_proc_mutex_t **mutex,
const char *type,
const char *instance_id,
server_rec *s, apr_pool_t *p,
apr_int32_t options);
#ifdef __cplusplus #ifdef __cplusplus
} }

View File

@@ -74,6 +74,7 @@
#include "http_protocol.h" #include "http_protocol.h"
#include "apr_uri.h" #include "apr_uri.h"
#include "util_md5.h" #include "util_md5.h"
#include "util_mutex.h"
#include "apr_shm.h" #include "apr_shm.h"
#include "apr_rmm.h" #include "apr_rmm.h"
#include "ap_provider.h" #include "ap_provider.h"
@@ -179,8 +180,8 @@ static unsigned long *opaque_cntr;
static apr_time_t *otn_counter; /* one-time-nonce counter */ static apr_time_t *otn_counter; /* one-time-nonce counter */
static apr_global_mutex_t *client_lock = NULL; static apr_global_mutex_t *client_lock = NULL;
static apr_global_mutex_t *opaque_lock = NULL; static apr_global_mutex_t *opaque_lock = NULL;
static const char *client_lock_name; static const char *client_lock_type = "authdigest-client";
static const char *opaque_lock_name; static const char *opaque_lock_type = "authdigest-opaque";
static const char *client_shm_filename; static const char *client_shm_filename;
#define DEF_SHMEM_SIZE 1000L /* ~ 12 entries */ #define DEF_SHMEM_SIZE 1000L /* ~ 12 entries */
@@ -321,12 +322,7 @@ static int initialize_tables(server_rec *s, apr_pool_t *ctx)
client_list->tbl_len = num_buckets; client_list->tbl_len = num_buckets;
client_list->num_entries = 0; client_list->num_entries = 0;
client_lock_name = apr_psprintf(ctx, "%s/authdigest_lock.%"APR_PID_T_FMT, tempdir, sts = ap_global_mutex_create(&client_lock, client_lock_type, NULL, s, ctx, 0);
getpid());
/* FIXME: get the client_lock_name from a directive so we're portable
* to non-process-inheriting operating systems, like Win32. */
sts = apr_global_mutex_create(&client_lock, client_lock_name,
APR_LOCK_DEFAULT, ctx);
if (sts != APR_SUCCESS) { if (sts != APR_SUCCESS) {
log_error_and_cleanup("failed to create lock (client_lock)", sts, s); log_error_and_cleanup("failed to create lock (client_lock)", sts, s);
return !OK; return !OK;
@@ -342,11 +338,7 @@ static int initialize_tables(server_rec *s, apr_pool_t *ctx)
} }
*opaque_cntr = 1UL; *opaque_cntr = 1UL;
opaque_lock_name = apr_psprintf(ctx, "%s/authdigest_opaque_lock.%"APR_PID_T_FMT, sts = ap_global_mutex_create(&opaque_lock, opaque_lock_type, NULL, s, ctx, 0);
tempdir,
getpid());
sts = apr_global_mutex_create(&opaque_lock, opaque_lock_name,
APR_LOCK_DEFAULT, ctx);
if (sts != APR_SUCCESS) { if (sts != APR_SUCCESS) {
log_error_and_cleanup("failed to create lock (opaque_lock)", sts, s); log_error_and_cleanup("failed to create lock (opaque_lock)", sts, s);
return !OK; return !OK;
@@ -370,6 +362,21 @@ static int initialize_tables(server_rec *s, apr_pool_t *ctx)
#endif /* APR_HAS_SHARED_MEMORY */ #endif /* APR_HAS_SHARED_MEMORY */
static int pre_init(apr_pool_t *pconf, apr_pool_t *plog, apr_pool_t *ptemp)
{
apr_status_t rv;
rv = ap_mutex_register(pconf, client_lock_type, NULL, APR_LOCK_DEFAULT, 0);
if (rv == APR_SUCCESS) {
rv = ap_mutex_register(pconf, opaque_lock_type, NULL, APR_LOCK_DEFAULT,
0);
}
if (rv != APR_SUCCESS) {
return rv;
}
return OK;
}
static int initialize_module(apr_pool_t *p, apr_pool_t *plog, static int initialize_module(apr_pool_t *p, apr_pool_t *plog,
apr_pool_t *ptemp, server_rec *s) apr_pool_t *ptemp, server_rec *s)
@@ -428,12 +435,16 @@ static void initialize_child(apr_pool_t *p, server_rec *s)
return; return;
} }
sts = apr_global_mutex_child_init(&client_lock, client_lock_name, p); sts = apr_global_mutex_child_init(&client_lock,
apr_global_mutex_lockfile(client_lock),
p);
if (sts != APR_SUCCESS) { if (sts != APR_SUCCESS) {
log_error_and_cleanup("failed to create lock (client_lock)", sts, s); log_error_and_cleanup("failed to create lock (client_lock)", sts, s);
return; return;
} }
sts = apr_global_mutex_child_init(&opaque_lock, opaque_lock_name, p); sts = apr_global_mutex_child_init(&opaque_lock,
apr_global_mutex_lockfile(opaque_lock),
p);
if (sts != APR_SUCCESS) { if (sts != APR_SUCCESS) {
log_error_and_cleanup("failed to create lock (opaque_lock)", sts, s); log_error_and_cleanup("failed to create lock (opaque_lock)", sts, s);
return; return;
@@ -2033,6 +2044,7 @@ static void register_hooks(apr_pool_t *p)
static const char * const cfgPost[]={ "http_core.c", NULL }; static const char * const cfgPost[]={ "http_core.c", NULL };
static const char * const parsePre[]={ "mod_proxy.c", NULL }; static const char * const parsePre[]={ "mod_proxy.c", NULL };
ap_hook_pre_config(pre_init, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_post_config(initialize_module, NULL, cfgPost, APR_HOOK_MIDDLE); ap_hook_post_config(initialize_module, NULL, cfgPost, APR_HOOK_MIDDLE);
ap_hook_child_init(initialize_child, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_child_init(initialize_child, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_post_read_request(parse_hdr_and_update_nc, parsePre, NULL, APR_HOOK_MIDDLE); ap_hook_post_read_request(parse_hdr_and_update_nc, parsePre, NULL, APR_HOOK_MIDDLE);

View File

@@ -20,10 +20,7 @@
#include "mod_watchdog.h" #include "mod_watchdog.h"
#include "ap_provider.h" #include "ap_provider.h"
#include "ap_mpm.h" #include "ap_mpm.h"
#include "util_mutex.h"
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
#define AP_WATCHODG_PGROUP "watchdog" #define AP_WATCHODG_PGROUP "watchdog"
#define AP_WATCHODG_PVERSION "parent" #define AP_WATCHODG_PVERSION "parent"
@@ -46,7 +43,6 @@ struct ap_watchdog_t
{ {
apr_thread_mutex_t *startup; apr_thread_mutex_t *startup;
apr_proc_mutex_t *mutex; apr_proc_mutex_t *mutex;
const char *mutex_path;
const char *name; const char *name;
watchdog_list_t *callbacks; watchdog_list_t *callbacks;
int is_running; int is_running;
@@ -66,11 +62,11 @@ struct wd_server_conf_t
server_rec *s; server_rec *s;
}; };
static char *wd_mutex_path = NULL;
static wd_server_conf_t *wd_server_conf = NULL; static wd_server_conf_t *wd_server_conf = NULL;
static apr_interval_time_t wd_interval = AP_WD_TM_INTERVAL; static apr_interval_time_t wd_interval = AP_WD_TM_INTERVAL;
static int wd_interval_set = 0; static int wd_interval_set = 0;
static int mpm_is_forked = AP_MPMQ_NOT_SUPPORTED; static int mpm_is_forked = AP_MPMQ_NOT_SUPPORTED;
static const char *wd_proc_mutex_type = "wd-proc";
static apr_status_t wd_worker_cleanup(void *data) static apr_status_t wd_worker_cleanup(void *data)
{ {
@@ -276,7 +272,8 @@ static apr_status_t wd_startup(ap_watchdog_t *w, apr_pool_t *p)
if (w->singleton) { if (w->singleton) {
/* Initialize singleton mutex in child */ /* Initialize singleton mutex in child */
rc = apr_proc_mutex_child_init(&w->mutex, w->mutex_path, p); rc = apr_proc_mutex_child_init(&w->mutex,
apr_proc_mutex_lockfile(w->mutex), p);
if (rc != APR_SUCCESS) if (rc != APR_SUCCESS)
return rc; return rc;
} }
@@ -387,38 +384,6 @@ static apr_status_t ap_watchdog_register_callback(ap_watchdog_t *w,
return APR_SUCCESS; return APR_SUCCESS;
} }
static apr_status_t wd_create_mutex(ap_watchdog_t *w, apr_pool_t *p)
{
apr_status_t rv;
apr_lockmech_e mech = APR_LOCK_DEFAULT;
const char *mb_path = wd_mutex_path ? wd_mutex_path : "logs";
w->mutex_path = ap_server_root_relative(p,
apr_pstrcat(p, mb_path,
"/.wdc-", w->name, ".mutex", NULL));
/* TODO: Check the mutex mechanisms */
#if APR_HAS_FCNTL_SERIALIZE
mech = APR_LOCK_FCNTL;
#else
#if APR_HAS_FLOCK_SERIALIZE
mech = APR_LOCK_FLOCK;
#endif
#endif
rv = apr_proc_mutex_create(&w->mutex, w->mutex_path, mech, p);
#ifdef AP_NEED_SET_MUTEX_PERMS
if (rv == APR_SUCCESS) {
rv = ap_unixd_set_proc_mutex_perms(w->mutex);
if (rv != APR_SUCCESS) {
/* Destroy the mutex early */
apr_proc_mutex_destroy(w->mutex);
w->mutex = NULL;
}
}
#endif
return rv;
}
/*--------------------------------------------------------------------------*/ /*--------------------------------------------------------------------------*/
/* */ /* */
/* Pre config hook. */ /* Pre config hook. */
@@ -451,6 +416,12 @@ static int wd_pre_config_hook(apr_pool_t *pconf, apr_pool_t *plog,
return rv; return rv;
} }
} }
if ((rv = ap_mutex_register(pconf, wd_proc_mutex_type, NULL,
APR_LOCK_DEFAULT, 0)) != APR_SUCCESS) {
return rv;
}
return OK; return OK;
} }
@@ -557,10 +528,10 @@ static int wd_post_config_hook(apr_pool_t *pconf, apr_pool_t *plog,
* Create mutexes for singleton watchdogs * Create mutexes for singleton watchdogs
*/ */
if (w->singleton) { if (w->singleton) {
rv = wd_create_mutex(w, wd_server_conf->pool); rv = ap_proc_mutex_create(&w->mutex, wd_proc_mutex_type,
w->name, s,
wd_server_conf->pool, 0);
if (rv != APR_SUCCESS) { if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
"Watchdog: Failed to create mutex.");
return rv; return rv;
} }
} }
@@ -612,30 +583,6 @@ static void wd_child_init_hook(apr_pool_t *p, server_rec *s)
} }
} }
/*--------------------------------------------------------------------------*/
/* */
/* WatchdogMutexPath directive */
/* */
/*--------------------------------------------------------------------------*/
static const char *wd_cmd_mutex_path(cmd_parms *cmd, void *dummy,
const char *arg)
{
const char *errs = ap_check_cmd_context(cmd, GLOBAL_ONLY);
if (errs != NULL)
return errs;
if (wd_mutex_path != NULL)
return "Duplicate WatchdogMutexPath directives are not allowed";
wd_mutex_path = apr_pstrdup(cmd->pool, arg);
if (wd_mutex_path == NULL)
return "Invalid WatchdogMutexPath name";
if (wd_mutex_path[strlen(wd_mutex_path) - 1] == '/')
wd_mutex_path[strlen(wd_mutex_path) - 1] = '\0';
return NULL;
}
/*--------------------------------------------------------------------------*/ /*--------------------------------------------------------------------------*/
/* */ /* */
/* WatchdogInterval directive */ /* WatchdogInterval directive */
@@ -666,13 +613,6 @@ static const char *wd_cmd_watchdog_int(cmd_parms *cmd, void *dummy,
/*--------------------------------------------------------------------------*/ /*--------------------------------------------------------------------------*/
static const command_rec wd_directives[] = static const command_rec wd_directives[] =
{ {
AP_INIT_TAKE1(
"WatchdogMutexPath", /* directive name */
wd_cmd_mutex_path, /* config action routine */
NULL, /* argument to include in call */
RSRC_CONF, /* where available */
"Path where the Watchdog mutexes will be created"
),
AP_INIT_TAKE1( AP_INIT_TAKE1(
"WatchdogInterval", /* directive name */ "WatchdogInterval", /* directive name */
wd_cmd_watchdog_int, /* config action routine */ wd_cmd_watchdog_int, /* config action routine */

View File

@@ -44,10 +44,6 @@
#include "apr_global_mutex.h" #include "apr_global_mutex.h"
#include "apr_thread_mutex.h" #include "apr_thread_mutex.h"
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
#if APR_HAVE_UNISTD_H #if APR_HAVE_UNISTD_H
#include <unistd.h> /* for getpid() */ #include <unistd.h> /* for getpid() */
#endif #endif

View File

@@ -52,13 +52,9 @@
#include "http_config.h" #include "http_config.h"
#include "http_log.h" #include "http_log.h"
#include "http_protocol.h" #include "http_protocol.h"
#include "util_mutex.h"
#include "ap_config.h" #include "ap_config.h"
#if !defined(OS2) && !defined(WIN32) && !defined(NETWARE)
#include "unixd.h"
#define MOD_EXIPC_SET_MUTEX_PERMS /* XXX Apache should define something */
#endif
#if APR_HAVE_SYS_TYPES_H #if APR_HAVE_SYS_TYPES_H
#include <sys/types.h> #include <sys/types.h>
#endif #endif
@@ -80,7 +76,7 @@
apr_shm_t *exipc_shm; /* Pointer to shared memory block */ apr_shm_t *exipc_shm; /* Pointer to shared memory block */
char *shmfilename; /* Shared memory file name, used on some systems */ char *shmfilename; /* Shared memory file name, used on some systems */
apr_global_mutex_t *exipc_mutex; /* Lock around shared memory segment access */ apr_global_mutex_t *exipc_mutex; /* Lock around shared memory segment access */
char *mutexfilename; /* Lock file name, used on some systems */ static const char *exipc_mutex_type = "example-ipc-shm";
/* Data structure for shared memory block */ /* Data structure for shared memory block */
typedef struct exipc_data { typedef struct exipc_data {
@@ -100,6 +96,18 @@ static apr_status_t shm_cleanup_wrapper(void *unused) {
return OK; return OK;
} }
/*
* This routine is called in the parent; we must register our
* mutex type before the config is processed so that users can
* adjust the mutex settings using the Mutex directive.
*/
static int exipc_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
apr_pool_t *ptemp)
{
ap_mutex_register(pconf, exipc_mutex_type, NULL, APR_LOCK_DEFAULT, 0);
return OK;
}
/* /*
* This routine is called in the parent, so we'll set up the shared * This routine is called in the parent, so we'll set up the shared
@@ -140,8 +148,8 @@ static int exipc_post_config(apr_pool_t *pconf, apr_pool_t *plog,
} /* Kilroy was here */ } /* Kilroy was here */
/* /*
* Both the shared memory and mutex allocation routines take a * The shared memory allocation routines take a file name.
* file name. Depending on system-specific implementation of these * Depending on system-specific implementation of these
* routines, that file may or may not actually be created. We'd * routines, that file may or may not actually be created. We'd
* like to store those files in the operating system's designated * like to store those files in the operating system's designated
* temporary directory, which APR can point us to. * temporary directory, which APR can point us to.
@@ -178,40 +186,12 @@ static int exipc_post_config(apr_pool_t *pconf, apr_pool_t *plog,
/* Create global mutex */ /* Create global mutex */
/* rs = ap_global_mutex_create(&exipc_mutex, exipc_mutex_type, NULL, s, pconf,
* Create another unique filename to lock upon. Note that 0);
* depending on OS and locking mechanism of choice, the file
* may or may not be actually created.
*/
mutexfilename = apr_psprintf(pconf, "%s/httpd_mutex.%ld", tempdir,
(long int) getpid());
rs = apr_global_mutex_create(&exipc_mutex, (const char *) mutexfilename,
APR_LOCK_DEFAULT, pconf);
if (APR_SUCCESS != rs) { if (APR_SUCCESS != rs) {
ap_log_error(APLOG_MARK, APLOG_ERR, rs, s,
"Failed to create mutex on file %s",
mutexfilename);
return HTTP_INTERNAL_SERVER_ERROR; return HTTP_INTERNAL_SERVER_ERROR;
} }
/*
* After the mutex is created, its permissions need to be adjusted
* on unix platforms so that the child processe can acquire
* it. This call takes care of that. The preprocessor define was
* set up early in this source file since Apache doesn't provide
* it.
*/
#ifdef MOD_EXIPC_SET_MUTEX_PERMS
rs = ap_unixd_set_global_mutex_perms(exipc_mutex);
if (APR_SUCCESS != rs) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s,
"Parent could not set permissions on Example IPC "
"mutex: check User and Group directives");
return HTTP_INTERNAL_SERVER_ERROR;
}
#endif /* MOD_EXIPC_SET_MUTEX_PERMS */
/* /*
* Destroy the shm segment when the configuration pool gets destroyed. This * Destroy the shm segment when the configuration pool gets destroyed. This
* happens on server restarts. The parent will then (above) allocate a new * happens on server restarts. The parent will then (above) allocate a new
@@ -236,12 +216,12 @@ static void exipc_child_init(apr_pool_t *p, server_rec *s)
* the mutex pointer global here. * the mutex pointer global here.
*/ */
rs = apr_global_mutex_child_init(&exipc_mutex, rs = apr_global_mutex_child_init(&exipc_mutex,
(const char *) mutexfilename, apr_global_mutex_lockfile(exipc_mutex),
p); p);
if (APR_SUCCESS != rs) { if (APR_SUCCESS != rs) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s, ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s,
"Failed to reopen mutex on file %s", "Failed to reopen mutex %s in child",
shmfilename); exipc_mutex_type);
/* There's really nothing else we can do here, since This /* There's really nothing else we can do here, since This
* routine doesn't return a status. If this ever goes wrong, * routine doesn't return a status. If this ever goes wrong,
* it will turn Apache into a fork bomb. Let's hope it never * it will turn Apache into a fork bomb. Let's hope it never
@@ -367,6 +347,7 @@ static int exipc_handler(request_rec *r)
static void exipc_register_hooks(apr_pool_t *p) static void exipc_register_hooks(apr_pool_t *p)
{ {
ap_hook_pre_config(exipc_pre_config, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_post_config(exipc_post_config, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_post_config(exipc_post_config, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_child_init(exipc_child_init, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_child_init(exipc_child_init, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_handler(exipc_handler, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_handler(exipc_handler, NULL, NULL, APR_HOOK_MIDDLE);

View File

@@ -528,10 +528,6 @@ static int show_server_settings(request_rec * r)
ap_rputs(" -D DEFAULT_SCOREBOARD=\"" DEFAULT_SCOREBOARD "\"\n", r); ap_rputs(" -D DEFAULT_SCOREBOARD=\"" DEFAULT_SCOREBOARD "\"\n", r);
#endif #endif
#ifdef DEFAULT_LOCKFILE
ap_rputs(" -D DEFAULT_LOCKFILE=\"" DEFAULT_LOCKFILE "\"\n", r);
#endif
#ifdef DEFAULT_ERRORLOG #ifdef DEFAULT_ERRORLOG
ap_rputs(" -D DEFAULT_ERRORLOG=\"" DEFAULT_ERRORLOG "\"\n", r); ap_rputs(" -D DEFAULT_ERRORLOG=\"" DEFAULT_ERRORLOG "\"\n", r);
#endif #endif

View File

@@ -28,6 +28,7 @@
#include "http_log.h" #include "http_log.h"
#include "http_protocol.h" #include "http_protocol.h"
#include "http_request.h" #include "http_request.h"
#include "util_mutex.h"
#include "util_ldap.h" #include "util_ldap.h"
#include "util_ldap_cache.h" #include "util_ldap_cache.h"
@@ -41,10 +42,6 @@
#error mod_ldap requires APR-util to have LDAP support built in #error mod_ldap requires APR-util to have LDAP support built in
#endif #endif
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
/* Default define for ldap functions that need a SIZELIMIT but /* Default define for ldap functions that need a SIZELIMIT but
* do not have the define * do not have the define
* XXX This should be removed once a supporting #define is * XXX This should be removed once a supporting #define is
@@ -67,6 +64,7 @@
#define AP_LDAP_CHASEREFERRALS_ON 1 #define AP_LDAP_CHASEREFERRALS_ON 1
module AP_MODULE_DECLARE_DATA ldap_module; module AP_MODULE_DECLARE_DATA ldap_module;
static const char *ldap_cache_lock_type = "ldap-cache";
#define LDAP_CACHE_LOCK() do { \ #define LDAP_CACHE_LOCK() do { \
if (st->util_ldap_cache_lock) \ if (st->util_ldap_cache_lock) \
@@ -2518,6 +2516,20 @@ static apr_status_t util_ldap_cleanup_module(void *data)
} }
static int util_ldap_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
apr_pool_t *ptemp)
{
apr_status_t result;
result = ap_mutex_register(pconf, ldap_cache_lock_type, NULL,
APR_LOCK_DEFAULT, 0);
if (result != APR_SUCCESS) {
return result;
}
return OK;
}
static int util_ldap_post_config(apr_pool_t *p, apr_pool_t *plog, static int util_ldap_post_config(apr_pool_t *p, apr_pool_t *plog,
apr_pool_t *ptemp, server_rec *s) apr_pool_t *ptemp, server_rec *s)
{ {
@@ -2567,30 +2579,12 @@ static int util_ldap_post_config(apr_pool_t *p, apr_pool_t *plog,
return DONE; return DONE;
} }
result = ap_global_mutex_create(&st->util_ldap_cache_lock,
#if APR_HAS_SHARED_MEMORY ldap_cache_lock_type, NULL, s, p, 0);
if (st->cache_file) {
st->lock_file = apr_pstrcat(st->pool, st->cache_file, ".lck",
NULL);
}
#endif
result = apr_global_mutex_create(&st->util_ldap_cache_lock,
st->lock_file, APR_LOCK_DEFAULT,
st->pool);
if (result != APR_SUCCESS) { if (result != APR_SUCCESS) {
return result; return result;
} }
#ifdef AP_NEED_SET_MUTEX_PERMS
result = ap_unixd_set_global_mutex_perms(st->util_ldap_cache_lock);
if (result != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, result, s,
"LDAP cache: failed to set mutex permissions");
return result;
}
#endif
/* merge config in all vhost */ /* merge config in all vhost */
s_vhost = s->next; s_vhost = s->next;
while (s_vhost) { while (s_vhost) {
@@ -2607,7 +2601,6 @@ static int util_ldap_post_config(apr_pool_t *p, apr_pool_t *plog,
"for VHOST: %s", st->cache_shm, st->cache_rmm, "for VHOST: %s", st->cache_shm, st->cache_rmm,
s_vhost->server_hostname); s_vhost->server_hostname);
#endif #endif
st_vhost->lock_file = st->lock_file;
s_vhost = s_vhost->next; s_vhost = s_vhost->next;
} }
#if APR_HAS_SHARED_MEMORY #if APR_HAS_SHARED_MEMORY
@@ -2684,12 +2677,12 @@ static void util_ldap_child_init(apr_pool_t *p, server_rec *s)
if (!st->util_ldap_cache_lock) return; if (!st->util_ldap_cache_lock) return;
sts = apr_global_mutex_child_init(&st->util_ldap_cache_lock, sts = apr_global_mutex_child_init(&st->util_ldap_cache_lock,
st->lock_file, p); apr_global_mutex_lockfile(st->util_ldap_cache_lock), p);
if (sts != APR_SUCCESS) { if (sts != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, sts, s, ap_log_error(APLOG_MARK, APLOG_CRIT, sts, s,
"Failed to initialise global mutex %s in child process %" "Failed to initialise global mutex %s in child process %"
APR_PID_T_FMT ".", APR_PID_T_FMT ".",
st->lock_file, getpid()); ldap_cache_lock_type, getpid());
} }
} }
@@ -2795,6 +2788,7 @@ static void util_ldap_register_hooks(apr_pool_t *p)
APR_REGISTER_OPTIONAL_FN(uldap_ssl_supported); APR_REGISTER_OPTIONAL_FN(uldap_ssl_supported);
APR_REGISTER_OPTIONAL_FN(uldap_cache_check_subgroups); APR_REGISTER_OPTIONAL_FN(uldap_cache_check_subgroups);
ap_hook_pre_config(util_ldap_pre_config, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_post_config(util_ldap_post_config,NULL,NULL,APR_HOOK_MIDDLE); ap_hook_post_config(util_ldap_post_config,NULL,NULL,APR_HOOK_MIDDLE);
ap_hook_handler(util_ldap_handler, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_handler(util_ldap_handler, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_child_init(util_ldap_child_init, NULL, NULL, APR_HOOK_MIDDLE); ap_hook_child_init(util_ldap_child_init, NULL, NULL, APR_HOOK_MIDDLE);

View File

@@ -94,15 +94,12 @@
#include "http_log.h" #include "http_log.h"
#include "http_protocol.h" #include "http_protocol.h"
#include "http_vhost.h" #include "http_vhost.h"
#include "util_mutex.h"
#include "mod_ssl.h" #include "mod_ssl.h"
#include "mod_rewrite.h" #include "mod_rewrite.h"
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
static ap_dbd_t *(*dbd_acquire)(request_rec*) = NULL; static ap_dbd_t *(*dbd_acquire)(request_rec*) = NULL;
static void (*dbd_prepare)(server_rec*, const char*, const char*) = NULL; static void (*dbd_prepare)(server_rec*, const char*, const char*) = NULL;
@@ -382,8 +379,8 @@ static int proxy_available;
static int rewrite_rand_init_done = 0; static int rewrite_rand_init_done = 0;
/* Locks/Mutexes */ /* Locks/Mutexes */
static const char *lockname;
static apr_global_mutex_t *rewrite_mapr_lock_acquire = NULL; static apr_global_mutex_t *rewrite_mapr_lock_acquire = NULL;
const char *rewritemap_mutex_type = "rewrite-map";
/* Optional functions imported from mod_ssl when loaded: */ /* Optional functions imported from mod_ssl when loaded: */
static APR_OPTIONAL_FN_TYPE(ssl_var_lookup) *rewrite_ssl_lookup = NULL; static APR_OPTIONAL_FN_TYPE(ssl_var_lookup) *rewrite_ssl_lookup = NULL;
@@ -1232,7 +1229,6 @@ static apr_status_t run_rewritemap_programs(server_rec *s, apr_pool_t *p)
rewrite_server_conf *conf; rewrite_server_conf *conf;
apr_hash_index_t *hi; apr_hash_index_t *hi;
apr_status_t rc; apr_status_t rc;
int lock_warning_issued = 0;
conf = ap_get_module_config(s->module_config, &rewrite_module); conf = ap_get_module_config(s->module_config, &rewrite_module);
@@ -1259,13 +1255,6 @@ static apr_status_t run_rewritemap_programs(server_rec *s, apr_pool_t *p)
continue; continue;
} }
if (!lock_warning_issued && (!lockname || !*lockname)) {
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, s,
"mod_rewrite: Running external rewrite maps "
"without defining a RewriteLock is DANGEROUS!");
++lock_warning_issued;
}
rc = rewritemap_program_child(p, map->argv[0], map->argv, rc = rewritemap_program_child(p, map->argv[0], map->argv,
&fpout, &fpin); &fpout, &fpin);
if (rc != APR_SUCCESS || fpin == NULL || fpout == NULL) { if (rc != APR_SUCCESS || fpin == NULL || fpout == NULL) {
@@ -2646,45 +2635,26 @@ static apr_status_t rewritelock_create(server_rec *s, apr_pool_t *p)
{ {
apr_status_t rc; apr_status_t rc;
/* only operate if a lockfile is used */
if (lockname == NULL || *(lockname) == '\0') {
return APR_SUCCESS;
}
/* create the lockfile */ /* create the lockfile */
rc = apr_global_mutex_create(&rewrite_mapr_lock_acquire, lockname, /* XXX See if there are any rewrite map programs before creating
APR_LOCK_DEFAULT, p); * the mutex.
*/
rc = ap_global_mutex_create(&rewrite_mapr_lock_acquire,
rewritemap_mutex_type, NULL, s, p, 0);
if (rc != APR_SUCCESS) { if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rc, s,
"mod_rewrite: Parent could not create RewriteLock "
"file %s", lockname);
return rc; return rc;
} }
#ifdef AP_NEED_SET_MUTEX_PERMS
rc = ap_unixd_set_global_mutex_perms(rewrite_mapr_lock_acquire);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rc, s,
"mod_rewrite: Parent could not set permissions "
"on RewriteLock; check User and Group directives");
return rc;
}
#endif
return APR_SUCCESS; return APR_SUCCESS;
} }
static apr_status_t rewritelock_remove(void *data) static apr_status_t rewritelock_remove(void *data)
{ {
/* only operate if a lockfile is used */
if (lockname == NULL || *(lockname) == '\0') {
return APR_SUCCESS;
}
/* destroy the rewritelock */ /* destroy the rewritelock */
if (rewrite_mapr_lock_acquire) {
apr_global_mutex_destroy(rewrite_mapr_lock_acquire); apr_global_mutex_destroy(rewrite_mapr_lock_acquire);
rewrite_mapr_lock_acquire = NULL; rewrite_mapr_lock_acquire = NULL;
lockname = NULL; }
return(0); return(0);
} }
@@ -3158,23 +3128,6 @@ static const char *cmd_rewritemap(cmd_parms *cmd, void *dconf, const char *a1,
return NULL; return NULL;
} }
static const char *cmd_rewritelock(cmd_parms *cmd, void *dconf, const char *a1)
{
const char *error;
if ((error = ap_check_cmd_context(cmd, GLOBAL_ONLY)) != NULL)
return error;
/* fixup the path, especially for rewritelock_remove() */
lockname = ap_server_root_relative(cmd->pool, a1);
if (!lockname) {
return apr_pstrcat(cmd->pool, "Invalid RewriteLock path ", a1, NULL);
}
return NULL;
}
static const char *cmd_rewritebase(cmd_parms *cmd, void *in_dconf, static const char *cmd_rewritebase(cmd_parms *cmd, void *in_dconf,
const char *a1) const char *a1)
{ {
@@ -4279,6 +4232,8 @@ static int pre_config(apr_pool_t *pconf,
{ {
APR_OPTIONAL_FN_TYPE(ap_register_rewrite_mapfunc) *map_pfn_register; APR_OPTIONAL_FN_TYPE(ap_register_rewrite_mapfunc) *map_pfn_register;
ap_mutex_register(pconf, rewritemap_mutex_type, NULL, APR_LOCK_DEFAULT, 0);
/* register int: rewritemap handlers */ /* register int: rewritemap handlers */
map_pfn_register = APR_RETRIEVE_OPTIONAL_FN(ap_register_rewrite_mapfunc); map_pfn_register = APR_RETRIEVE_OPTIONAL_FN(ap_register_rewrite_mapfunc);
if (map_pfn_register) { if (map_pfn_register) {
@@ -4348,9 +4303,9 @@ static void init_child(apr_pool_t *p, server_rec *s)
{ {
apr_status_t rv = 0; /* get a rid of gcc warning (REWRITELOG_DISABLED) */ apr_status_t rv = 0; /* get a rid of gcc warning (REWRITELOG_DISABLED) */
if (lockname != NULL && *(lockname) != '\0') { if (rewrite_mapr_lock_acquire) {
rv = apr_global_mutex_child_init(&rewrite_mapr_lock_acquire, rv = apr_global_mutex_child_init(&rewrite_mapr_lock_acquire,
lockname, p); apr_global_mutex_lockfile(rewrite_mapr_lock_acquire), p);
if (rv != APR_SUCCESS) { if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s, ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
"mod_rewrite: could not init rewrite_mapr_lock_acquire" "mod_rewrite: could not init rewrite_mapr_lock_acquire"
@@ -5023,9 +4978,6 @@ static const command_rec command_table[] = {
"an URL-applied regexp-pattern and a substitution URL"), "an URL-applied regexp-pattern and a substitution URL"),
AP_INIT_TAKE2( "RewriteMap", cmd_rewritemap, NULL, RSRC_CONF, AP_INIT_TAKE2( "RewriteMap", cmd_rewritemap, NULL, RSRC_CONF,
"a mapname and a filename"), "a mapname and a filename"),
AP_INIT_TAKE1( "RewriteLock", cmd_rewritelock, NULL, RSRC_CONF,
"the filename of a lockfile used for inter-process "
"synchronization"),
#ifndef REWRITELOG_DISABLED #ifndef REWRITELOG_DISABLED
AP_INIT_TAKE1( "RewriteLog", cmd_rewritelog, NULL, RSRC_CONF, AP_INIT_TAKE1( "RewriteLog", cmd_rewritelog, NULL, RSRC_CONF,
"the filename of the rewriting logfile"), "the filename of the rewriting logfile"),

View File

@@ -54,7 +54,6 @@ static const command_rec ssl_config_cmds[] = {
/* /*
* Global (main-server) context configuration directives * Global (main-server) context configuration directives
*/ */
SSL_CMD_SRV(Mutex, TAKE1, AP_ALL_AVAILABLE_MUTEXES_STRING)
SSL_CMD_SRV(PassPhraseDialog, TAKE1, SSL_CMD_SRV(PassPhraseDialog, TAKE1,
"SSL dialog mechanism for the pass phrase query " "SSL dialog mechanism for the pass phrase query "
"('builtin', '|/path/to/pipe_program', " "('builtin', '|/path/to/pipe_program', "
@@ -201,7 +200,6 @@ static const command_rec ssl_config_cmds[] = {
/* /*
* OCSP Stapling options * OCSP Stapling options
*/ */
SSL_CMD_SRV(StaplingMutex, TAKE1, AP_ALL_AVAILABLE_MUTEXES_STRING)
SSL_CMD_SRV(StaplingCache, TAKE1, SSL_CMD_SRV(StaplingCache, TAKE1,
"SSL Stapling Response Cache storage " "SSL Stapling Response Cache storage "
"(`dbm:/path/to/file')") "(`dbm:/path/to/file')")
@@ -313,6 +311,12 @@ static int ssl_hook_pre_config(apr_pool_t *pconf,
/* Register to handle mod_status status page generation */ /* Register to handle mod_status status page generation */
ssl_scache_status_register(pconf); ssl_scache_status_register(pconf);
/* Register mutex type names so they can be configured with Mutex */
ap_mutex_register(pconf, ssl_cache_mutex_type, NULL, APR_LOCK_DEFAULT, 0);
#ifdef HAVE_OCSP_STAPLING
ap_mutex_register(pconf, ssl_stapling_mutex_type, NULL, APR_LOCK_DEFAULT, 0);
#endif
return OK; return OK;
} }

View File

@@ -61,9 +61,6 @@ SSLModConfigRec *ssl_config_global_create(server_rec *s)
*/ */
mc->sesscache_mode = SSL_SESS_CACHE_OFF; mc->sesscache_mode = SSL_SESS_CACHE_OFF;
mc->sesscache = NULL; mc->sesscache = NULL;
mc->nMutexMode = SSL_MUTEXMODE_UNSET;
mc->nMutexMech = APR_LOCK_DEFAULT;
mc->szMutexFile = NULL;
mc->pMutex = NULL; mc->pMutex = NULL;
mc->aRandSeed = apr_array_make(pool, 4, mc->aRandSeed = apr_array_make(pool, 4,
sizeof(ssl_randseed_t)); sizeof(ssl_randseed_t));
@@ -75,9 +72,6 @@ SSLModConfigRec *ssl_config_global_create(server_rec *s)
#endif #endif
#ifdef HAVE_OCSP_STAPLING #ifdef HAVE_OCSP_STAPLING
mc->stapling_cache = NULL; mc->stapling_cache = NULL;
mc->stapling_mutex_mode = SSL_MUTEXMODE_UNSET;
mc->stapling_mutex_mech = APR_LOCK_DEFAULT;
mc->stapling_mutex_file = NULL;
mc->stapling_mutex = NULL; mc->stapling_mutex = NULL;
#endif #endif
@@ -383,41 +377,6 @@ void *ssl_config_perdir_merge(apr_pool_t *p, void *basev, void *addv)
* Configuration functions for particular directives * Configuration functions for particular directives
*/ */
const char *ssl_cmd_SSLMutex(cmd_parms *cmd,
void *dcfg,
const char *arg_)
{
apr_status_t rv;
const char *err;
SSLModConfigRec *mc = myModConfig(cmd->server);
if ((err = ap_check_cmd_context(cmd, GLOBAL_ONLY))) {
return err;
}
if (ssl_config_global_isfixed(mc)) {
return NULL;
}
rv = ap_parse_mutex(arg_, cmd->server->process->pool,
&mc->nMutexMech, &mc->szMutexFile);
if (rv == APR_ENOLOCK) {
mc->nMutexMode = SSL_MUTEXMODE_NONE;
return NULL;
} else if (rv == APR_ENOTIMPL) {
return apr_pstrcat(cmd->pool, "Invalid SSLMutex argument ", arg_,
" (" AP_ALL_AVAILABLE_MUTEXES_STRING ")", NULL);
} else if (rv == APR_BADARG) {
return apr_pstrcat(cmd->pool, "Invalid SSLMutex filepath ",
arg_, NULL);
}
mc->nMutexMode = SSL_MUTEXMODE_USED;
return NULL;
}
const char *ssl_cmd_SSLPassPhraseDialog(cmd_parms *cmd, const char *ssl_cmd_SSLPassPhraseDialog(cmd_parms *cmd,
void *dcfg, void *dcfg,
const char *arg) const char *arg)
@@ -1546,44 +1505,6 @@ const char *ssl_cmd_SSLStaplingCache(cmd_parms *cmd,
return NULL; return NULL;
} }
const char *ssl_cmd_SSLStaplingMutex(cmd_parms *cmd,
void *dcfg,
const char *arg_)
{
apr_status_t rv;
const char *err;
SSLModConfigRec *mc = myModConfig(cmd->server);
if ((err = ap_check_cmd_context(cmd, GLOBAL_ONLY))) {
return err;
}
if (ssl_config_global_isfixed(mc)) {
return NULL;
}
rv = ap_parse_mutex(arg_, cmd->server->process->pool,
&mc->stapling_mutex_mech, &mc->stapling_mutex_file);
if (rv == APR_ENOLOCK) {
mc->stapling_mutex_mode = SSL_MUTEXMODE_NONE;
return NULL;
}
else if (rv == APR_ENOTIMPL) {
return apr_pstrcat(cmd->pool, "Invalid SSLStaplingMutex argument ",
arg_,
" (" AP_ALL_AVAILABLE_MUTEXES_STRING ")", NULL);
}
else if (rv == APR_BADARG) {
return apr_pstrcat(cmd->pool, "Invalid SSLStaplingMutex filepath ",
arg_, NULL);
}
mc->stapling_mutex_mode = SSL_MUTEXMODE_USED;
return NULL;
}
const char *ssl_cmd_SSLUseStapling(cmd_parms *cmd, void *dcfg, int flag) const char *ssl_cmd_SSLUseStapling(cmd_parms *cmd, void *dcfg, int flag)
{ {
SSLSrvConfigRec *sc = mySrvConfig(cmd->server); SSLSrvConfigRec *sc = mySrvConfig(cmd->server);

View File

@@ -30,10 +30,6 @@
#include "ssl_private.h" #include "ssl_private.h"
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
int ssl_mutex_init(server_rec *s, apr_pool_t *p) int ssl_mutex_init(server_rec *s, apr_pool_t *p)
{ {
SSLModConfigRec *mc = myModConfig(s); SSLModConfigRec *mc = myModConfig(s);
@@ -50,35 +46,13 @@ int ssl_mutex_init(server_rec *s, apr_pool_t *p)
if (mc->pMutex) { if (mc->pMutex) {
return TRUE; return TRUE;
} }
else if (mc->nMutexMode == SSL_MUTEXMODE_NONE) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, s,
"An SSLMutex is required for the '%s' session cache",
mc->sesscache->name);
return FALSE;
}
if ((rv = apr_global_mutex_create(&mc->pMutex, mc->szMutexFile, if ((rv = ap_global_mutex_create(&mc->pMutex, ssl_cache_mutex_type, NULL,
mc->nMutexMech, s->process->pool)) s, s->process->pool, 0))
!= APR_SUCCESS) { != APR_SUCCESS) {
if (mc->szMutexFile)
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Cannot create SSLMutex with file `%s'",
mc->szMutexFile);
else
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Cannot create SSLMutex");
return FALSE; return FALSE;
} }
#ifdef AP_NEED_SET_MUTEX_PERMS
rv = ap_unixd_set_global_mutex_perms(mc->pMutex);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Could not set permissions on ssl_mutex; check User "
"and Group directives");
return FALSE;
}
#endif
return TRUE; return TRUE;
} }
@@ -86,21 +60,24 @@ int ssl_mutex_reinit(server_rec *s, apr_pool_t *p)
{ {
SSLModConfigRec *mc = myModConfig(s); SSLModConfigRec *mc = myModConfig(s);
apr_status_t rv; apr_status_t rv;
const char *lockfile;
if (mc->nMutexMode == SSL_MUTEXMODE_NONE || !mc->sesscache if (mc->pMutex == NULL || !mc->sesscache
|| (mc->sesscache->flags & AP_SOCACHE_FLAG_NOTMPSAFE) == 0) { || (mc->sesscache->flags & AP_SOCACHE_FLAG_NOTMPSAFE) == 0) {
return TRUE; return TRUE;
} }
lockfile = apr_global_mutex_lockfile(mc->pMutex);
if ((rv = apr_global_mutex_child_init(&mc->pMutex, if ((rv = apr_global_mutex_child_init(&mc->pMutex,
mc->szMutexFile, p)) != APR_SUCCESS) { lockfile,
if (mc->szMutexFile) p)) != APR_SUCCESS) {
if (lockfile)
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s, ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Cannot reinit SSLMutex with file `%s'", "Cannot reinit %s mutex with file `%s'",
mc->szMutexFile); ssl_cache_mutex_type, lockfile);
else else
ap_log_error(APLOG_MARK, APLOG_WARNING, rv, s, ap_log_error(APLOG_MARK, APLOG_WARNING, rv, s,
"Cannot reinit SSLMutex"); "Cannot reinit %s mutex", ssl_cache_mutex_type);
return FALSE; return FALSE;
} }
return TRUE; return TRUE;

View File

@@ -39,6 +39,7 @@
#include "util_script.h" #include "util_script.h"
#include "util_filter.h" #include "util_filter.h"
#include "util_ebcdic.h" #include "util_ebcdic.h"
#include "util_mutex.h"
#include "apr.h" #include "apr.h"
#include "apr_strings.h" #include "apr_strings.h"
#define APR_WANT_STRFUNC #define APR_WANT_STRFUNC
@@ -266,15 +267,6 @@ typedef enum {
#define SSL_PCM_ISNONZERO 8 #define SSL_PCM_ISNONZERO 8
typedef unsigned int ssl_pathcheck_t; typedef unsigned int ssl_pathcheck_t;
/**
* Define the SSL mutex modes
*/
typedef enum {
SSL_MUTEXMODE_UNSET = UNSET,
SSL_MUTEXMODE_NONE = 0,
SSL_MUTEXMODE_USED = 1
} ssl_mutexmode_t;
/** /**
* Define the SSL enabled state * Define the SSL enabled state
*/ */
@@ -403,9 +395,6 @@ typedef struct {
const ap_socache_provider_t *sesscache; const ap_socache_provider_t *sesscache;
ap_socache_instance_t *sesscache_context; ap_socache_instance_t *sesscache_context;
ssl_mutexmode_t nMutexMode;
apr_lockmech_e nMutexMech;
const char *szMutexFile;
apr_global_mutex_t *pMutex; apr_global_mutex_t *pMutex;
apr_array_header_t *aRandSeed; apr_array_header_t *aRandSeed;
apr_hash_t *tVHostKeys; apr_hash_t *tVHostKeys;
@@ -419,9 +408,6 @@ typedef struct {
#ifdef HAVE_OCSP_STAPLING #ifdef HAVE_OCSP_STAPLING
const ap_socache_provider_t *stapling_cache; const ap_socache_provider_t *stapling_cache;
ap_socache_instance_t *stapling_cache_context; ap_socache_instance_t *stapling_cache_context;
ssl_mutexmode_t stapling_mutex_mode;
apr_lockmech_e stapling_mutex_mech;
const char *stapling_mutex_file;
apr_global_mutex_t *stapling_mutex; apr_global_mutex_t *stapling_mutex;
#endif #endif
@@ -566,7 +552,6 @@ void *ssl_config_server_create(apr_pool_t *, server_rec *);
void *ssl_config_server_merge(apr_pool_t *, void *, void *); void *ssl_config_server_merge(apr_pool_t *, void *, void *);
void *ssl_config_perdir_create(apr_pool_t *, char *); void *ssl_config_perdir_create(apr_pool_t *, char *);
void *ssl_config_perdir_merge(apr_pool_t *, void *, void *); void *ssl_config_perdir_merge(apr_pool_t *, void *, void *);
const char *ssl_cmd_SSLMutex(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLPassPhraseDialog(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLPassPhraseDialog(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLCryptoDevice(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLCryptoDevice(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLRandomSeed(cmd_parms *, void *, const char *, const char *, const char *); const char *ssl_cmd_SSLRandomSeed(cmd_parms *, void *, const char *, const char *, const char *);
@@ -666,7 +651,6 @@ int ssl_engine_disable(conn_rec *c);
/** OCSP Stapling Support */ /** OCSP Stapling Support */
#ifdef HAVE_OCSP_STAPLING #ifdef HAVE_OCSP_STAPLING
const char *ssl_cmd_SSLStaplingMutex(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLStaplingCache(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLStaplingCache(cmd_parms *, void *, const char *);
const char *ssl_cmd_SSLUseStapling(cmd_parms *, void *, int); const char *ssl_cmd_SSLUseStapling(cmd_parms *, void *, int);
const char *ssl_cmd_SSLStaplingResponseTimeSkew(cmd_parms *, void *, const char *); const char *ssl_cmd_SSLStaplingResponseTimeSkew(cmd_parms *, void *, const char *);
@@ -741,6 +725,10 @@ int ssl_mutex_off(server_rec *);
int ssl_stapling_mutex_init(server_rec *, apr_pool_t *); int ssl_stapling_mutex_init(server_rec *, apr_pool_t *);
int ssl_stapling_mutex_reinit(server_rec *, apr_pool_t *); int ssl_stapling_mutex_reinit(server_rec *, apr_pool_t *);
/* mutex type names for Mutex directive */
#define ssl_cache_mutex_type "ssl-cache"
#define ssl_stapling_mutex_type "ssl-stapling"
/** Logfile Support */ /** Logfile Support */
void ssl_die(void); void ssl_die(void);
void ssl_log_ssl_error(const char *, int, int, server_rec *); void ssl_log_ssl_error(const char *, int, int, server_rec *);

View File

@@ -32,10 +32,6 @@
#include "ap_mpm.h" #include "ap_mpm.h"
#include "apr_thread_mutex.h" #include "apr_thread_mutex.h"
#ifdef AP_NEED_SET_MUTEX_PERMS
#include "unixd.h"
#endif
#ifdef HAVE_OCSP_STAPLING #ifdef HAVE_OCSP_STAPLING
/** /**
@@ -480,36 +476,13 @@ int ssl_stapling_mutex_init(server_rec *s, apr_pool_t *p)
if (mc->stapling_mutex || sc->server->stapling_enabled != TRUE) { if (mc->stapling_mutex || sc->server->stapling_enabled != TRUE) {
return TRUE; return TRUE;
} }
if (mc->stapling_mutex_mode == SSL_MUTEXMODE_NONE
|| mc->stapling_mutex_mode == SSL_MUTEXMODE_UNSET) { if ((rv = ap_global_mutex_create(&mc->stapling_mutex,
ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, ssl_stapling_mutex_type, NULL, s,
"An SSLStaplingMutex is required for OCSP Stapling"); s->process->pool, 0)) != APR_SUCCESS) {
return FALSE; return FALSE;
} }
if ((rv = apr_global_mutex_create(&mc->stapling_mutex,
mc->stapling_mutex_file,
mc->stapling_mutex_mech, s->process->pool))
!= APR_SUCCESS) {
if (mc->stapling_mutex_file)
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Cannot create SSLStaplingMutex with file `%s'",
mc->stapling_mutex_file);
else
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Cannot create SSLStaplingMutex");
return FALSE;
}
#ifdef AP_NEED_SET_MUTEX_PERMS
rv = ap_unixd_set_global_mutex_perms(mc->stapling_mutex);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Could not set permissions on ssl_mutex; check User "
"and Group directives");
return FALSE;
}
#endif
return TRUE; return TRUE;
} }
@@ -517,21 +490,23 @@ int ssl_stapling_mutex_reinit(server_rec *s, apr_pool_t *p)
{ {
SSLModConfigRec *mc = myModConfig(s); SSLModConfigRec *mc = myModConfig(s);
apr_status_t rv; apr_status_t rv;
const char *lockfile;
if (mc->stapling_mutex == NULL) { if (mc->stapling_mutex == NULL) {
return TRUE; return TRUE;
} }
lockfile = apr_global_mutex_lockfile(mc->stapling_mutex);
if ((rv = apr_global_mutex_child_init(&mc->stapling_mutex, if ((rv = apr_global_mutex_child_init(&mc->stapling_mutex,
mc->stapling_mutex_file, p)) != APR_SUCCESS) { lockfile, p)) != APR_SUCCESS) {
if (mc->stapling_mutex_file) { if (lockfile) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s, ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
"Cannot reinit SSLMutex with file `%s'", "Cannot reinit %s mutex with file `%s'",
mc->szMutexFile); ssl_stapling_mutex_type, lockfile);
} }
else { else {
ap_log_error(APLOG_MARK, APLOG_WARNING, rv, s, ap_log_error(APLOG_MARK, APLOG_WARNING, rv, s,
"Cannot reinit SSLMutex"); "Cannot reinit %s mutex", ssl_stapling_mutex_type);
} }
return FALSE; return FALSE;
} }

View File

@@ -3319,6 +3319,8 @@ AP_INIT_TAKE1("LimitRequestBody", set_limit_req_body,
AP_INIT_TAKE1("LimitXMLRequestBody", set_limit_xml_req_body, NULL, OR_ALL, AP_INIT_TAKE1("LimitXMLRequestBody", set_limit_xml_req_body, NULL, OR_ALL,
"Limit (in bytes) on maximum size of an XML-based request " "Limit (in bytes) on maximum size of an XML-based request "
"body"), "body"),
AP_INIT_TAKE2("Mutex", ap_set_mutex, NULL, RSRC_CONF,
"mutex (or \"default\") and mechanism"),
/* System Resource Controls */ /* System Resource Controls */
#ifdef RLIMIT_CPU #ifdef RLIMIT_CPU
@@ -3378,14 +3380,10 @@ AP_INIT_TAKE1("PidFile", ap_mpm_set_pidfile, NULL, RSRC_CONF,
"A file for logging the server process ID"), "A file for logging the server process ID"),
AP_INIT_TAKE1("ScoreBoardFile", ap_mpm_set_scoreboard, NULL, RSRC_CONF, AP_INIT_TAKE1("ScoreBoardFile", ap_mpm_set_scoreboard, NULL, RSRC_CONF,
"A file for Apache to maintain runtime process management information"), "A file for Apache to maintain runtime process management information"),
AP_INIT_TAKE1("LockFile", ap_mpm_set_lockfile, NULL, RSRC_CONF,
"The lockfile used when Apache needs to lock the accept() call (deprecated)"),
AP_INIT_TAKE1("MaxRequestsPerChild", ap_mpm_set_max_requests, NULL, RSRC_CONF, AP_INIT_TAKE1("MaxRequestsPerChild", ap_mpm_set_max_requests, NULL, RSRC_CONF,
"Maximum number of requests a particular child serves before dying."), "Maximum number of requests a particular child serves before dying."),
AP_INIT_TAKE1("CoreDumpDirectory", ap_mpm_set_coredumpdir, NULL, RSRC_CONF, AP_INIT_TAKE1("CoreDumpDirectory", ap_mpm_set_coredumpdir, NULL, RSRC_CONF,
"The location of the directory Apache changes to before dumping core"), "The location of the directory Apache changes to before dumping core"),
AP_INIT_TAKE1("AcceptMutex", ap_mpm_set_accept_lock_mech, NULL, RSRC_CONF,
AP_AVAILABLE_MUTEXES_STRING),
AP_INIT_TAKE1("MaxMemFree", ap_mpm_set_max_mem_free, NULL, RSRC_CONF, AP_INIT_TAKE1("MaxMemFree", ap_mpm_set_max_mem_free, NULL, RSRC_CONF,
"Maximum number of 1k blocks a particular childs allocator may hold."), "Maximum number of 1k blocks a particular childs allocator may hold."),
AP_INIT_TAKE1("ThreadStackSize", ap_mpm_set_thread_stacksize, NULL, RSRC_CONF, AP_INIT_TAKE1("ThreadStackSize", ap_mpm_set_thread_stacksize, NULL, RSRC_CONF,

View File

@@ -237,10 +237,6 @@ static void show_compile_settings(void)
printf(" -D DEFAULT_SCOREBOARD=\"" DEFAULT_SCOREBOARD "\"\n"); printf(" -D DEFAULT_SCOREBOARD=\"" DEFAULT_SCOREBOARD "\"\n");
#endif #endif
#ifdef DEFAULT_LOCKFILE
printf(" -D DEFAULT_LOCKFILE=\"" DEFAULT_LOCKFILE "\"\n");
#endif
#ifdef DEFAULT_ERRORLOG #ifdef DEFAULT_ERRORLOG
printf(" -D DEFAULT_ERRORLOG=\"" DEFAULT_ERRORLOG "\"\n"); printf(" -D DEFAULT_ERRORLOG=\"" DEFAULT_ERRORLOG "\"\n");
#endif #endif

View File

@@ -46,11 +46,6 @@
#define DEFAULT_MIN_FREE_DAEMON 5 #define DEFAULT_MIN_FREE_DAEMON 5
#endif #endif
/* File used for accept locking, when we use a file */
#ifndef DEFAULT_LOCKFILE
#define DEFAULT_LOCKFILE DEFAULT_REL_RUNTIMEDIR "/accept.lock"
#endif
/* Where the main/parent process's pid is logged */ /* Where the main/parent process's pid is logged */
#ifndef DEFAULT_PIDLOG #ifndef DEFAULT_PIDLOG
#define DEFAULT_PIDLOG DEFAULT_REL_RUNTIMEDIR "/httpd.pid" #define DEFAULT_PIDLOG DEFAULT_REL_RUNTIMEDIR "/httpd.pid"

View File

@@ -41,6 +41,7 @@
#include "http_connection.h" #include "http_connection.h"
#include "scoreboard.h" #include "scoreboard.h"
#include "ap_mpm.h" #include "ap_mpm.h"
#include "util_mutex.h"
#include "unixd.h" #include "unixd.h"
#include "mpm_common.h" #include "mpm_common.h"
#include "ap_listen.h" #include "ap_listen.h"
@@ -457,6 +458,7 @@ static void child_main(int child_num_arg)
ap_sb_handle_t *sbh; ap_sb_handle_t *sbh;
apr_bucket_alloc_t *bucket_alloc; apr_bucket_alloc_t *bucket_alloc;
int last_poll_idx = 0; int last_poll_idx = 0;
const char *lockfile;
mpm_state = AP_MPMQ_STARTING; /* for benefit of any hooks that run as this mpm_state = AP_MPMQ_STARTING; /* for benefit of any hooks that run as this
* child initializes * child initializes
@@ -487,11 +489,16 @@ static void child_main(int child_num_arg)
/* needs to be done before we switch UIDs so we have permissions */ /* needs to be done before we switch UIDs so we have permissions */
ap_reopen_scoreboard(pchild, NULL, 0); ap_reopen_scoreboard(pchild, NULL, 0);
status = apr_proc_mutex_child_init(&accept_mutex, ap_lock_fname, pchild); lockfile = apr_proc_mutex_lockfile(accept_mutex);
status = apr_proc_mutex_child_init(&accept_mutex,
lockfile,
pchild);
if (status != APR_SUCCESS) { if (status != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_EMERG, status, ap_server_conf, ap_log_error(APLOG_MARK, APLOG_EMERG, status, ap_server_conf,
"Couldn't initialize cross-process lock in child " "Couldn't initialize cross-process lock in child "
"(%s) (%d)", ap_lock_fname, ap_accept_lock_mech); "(%s) (%s)",
lockfile ? lockfile : "none",
apr_proc_mutex_name(accept_mutex));
clean_child_exit(APEXIT_CHILDFATAL); clean_child_exit(APEXIT_CHILDFATAL);
} }
@@ -908,36 +915,13 @@ static int prefork_run(apr_pool_t *_pconf, apr_pool_t *plog, server_rec *s)
ap_log_pid(pconf, ap_pid_fname); ap_log_pid(pconf, ap_pid_fname);
/* Initialize cross-process accept lock */ /* Initialize cross-process accept lock */
ap_lock_fname = apr_psprintf(_pconf, "%s.%" APR_PID_T_FMT, rv = ap_proc_mutex_create(&accept_mutex, ap_accept_mutex_type, NULL, s,
ap_server_root_relative(_pconf, ap_lock_fname), _pconf, 0);
ap_my_pid);
rv = apr_proc_mutex_create(&accept_mutex, ap_lock_fname,
ap_accept_lock_mech, _pconf);
if (rv != APR_SUCCESS) { if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, s,
"Couldn't create accept lock (%s) (%d)",
ap_lock_fname, ap_accept_lock_mech);
mpm_state = AP_MPMQ_STOPPING; mpm_state = AP_MPMQ_STOPPING;
return DONE; return DONE;
} }
#if APR_USE_SYSVSEM_SERIALIZE
if (ap_accept_lock_mech == APR_LOCK_DEFAULT ||
ap_accept_lock_mech == APR_LOCK_SYSVSEM) {
#else
if (ap_accept_lock_mech == APR_LOCK_SYSVSEM) {
#endif
rv = ap_unixd_set_proc_mutex_perms(accept_mutex);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, s,
"Couldn't set permissions on cross-process lock; "
"check User and Group directives");
mpm_state = AP_MPMQ_STOPPING;
return DONE;
}
}
if (!is_graceful) { if (!is_graceful) {
if (ap_run_pre_mpm(s->process->pool, SB_SHARED) != OK) { if (ap_run_pre_mpm(s->process->pool, SB_SHARED) != OK) {
mpm_state = AP_MPMQ_STOPPING; mpm_state = AP_MPMQ_STOPPING;
@@ -988,7 +972,7 @@ static int prefork_run(apr_pool_t *_pconf, apr_pool_t *plog, server_rec *s)
ap_log_error(APLOG_MARK, APLOG_INFO, 0, ap_server_conf, ap_log_error(APLOG_MARK, APLOG_INFO, 0, ap_server_conf,
"Server built: %s", ap_get_server_built()); "Server built: %s", ap_get_server_built());
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ap_server_conf, ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ap_server_conf,
"AcceptMutex: %s (default: %s)", "Accept mutex: %s (default: %s)",
apr_proc_mutex_name(accept_mutex), apr_proc_mutex_name(accept_mutex),
apr_proc_mutex_defname()); apr_proc_mutex_defname());
restart_pending = shutdown_pending = 0; restart_pending = shutdown_pending = 0;
@@ -1284,6 +1268,8 @@ static int prefork_pre_config(apr_pool_t *p, apr_pool_t *plog, apr_pool_t *ptemp
foreground = ap_exists_config_define("FOREGROUND"); foreground = ap_exists_config_define("FOREGROUND");
} }
ap_mutex_register(p, ap_accept_mutex_type, NULL, APR_LOCK_DEFAULT, 0);
/* sigh, want this only the second time around */ /* sigh, want this only the second time around */
retained = ap_retained_data_get(userdata_key); retained = ap_retained_data_get(userdata_key);
if (!retained) { if (!retained) {
@@ -1313,7 +1299,6 @@ static int prefork_pre_config(apr_pool_t *p, apr_pool_t *plog, apr_pool_t *ptemp
server_limit = DEFAULT_SERVER_LIMIT; server_limit = DEFAULT_SERVER_LIMIT;
ap_daemons_limit = server_limit; ap_daemons_limit = server_limit;
ap_pid_fname = DEFAULT_PIDLOG; ap_pid_fname = DEFAULT_PIDLOG;
ap_lock_fname = DEFAULT_LOCKFILE;
ap_max_requests_per_child = DEFAULT_MAX_REQUESTS_PER_CHILD; ap_max_requests_per_child = DEFAULT_MAX_REQUESTS_PER_CHILD;
ap_extended_status = 0; ap_extended_status = 0;
ap_max_mem_free = APR_ALLOCATOR_MAX_FREE_UNLIMITED; ap_max_mem_free = APR_ALLOCATOR_MAX_FREE_UNLIMITED;

View File

@@ -50,11 +50,6 @@
#define DEFAULT_THREADS_PER_CHILD 25 #define DEFAULT_THREADS_PER_CHILD 25
#endif #endif
/* File used for accept locking, when we use a file */
#ifndef DEFAULT_LOCKFILE
#define DEFAULT_LOCKFILE DEFAULT_REL_RUNTIMEDIR "/accept.lock"
#endif
/* Where the main/parent process's pid is logged */ /* Where the main/parent process's pid is logged */
#ifndef DEFAULT_PIDLOG #ifndef DEFAULT_PIDLOG
#define DEFAULT_PIDLOG DEFAULT_REL_RUNTIMEDIR "/httpd.pid" #define DEFAULT_PIDLOG DEFAULT_REL_RUNTIMEDIR "/httpd.pid"

View File

@@ -64,6 +64,7 @@
#include "scoreboard.h" #include "scoreboard.h"
#include "fdqueue.h" #include "fdqueue.h"
#include "mpm_default.h" #include "mpm_default.h"
#include "util_mutex.h"
#include "unixd.h" #include "unixd.h"
#include <signal.h> #include <signal.h>
@@ -1172,7 +1173,8 @@ static void child_main(int child_num_arg)
/*stuff to do before we switch id's, so we have permissions.*/ /*stuff to do before we switch id's, so we have permissions.*/
ap_reopen_scoreboard(pchild, NULL, 0); ap_reopen_scoreboard(pchild, NULL, 0);
rv = SAFE_ACCEPT(apr_proc_mutex_child_init(&accept_mutex, ap_lock_fname, rv = SAFE_ACCEPT(apr_proc_mutex_child_init(&accept_mutex,
apr_proc_mutex_lockfile(accept_mutex),
pchild)); pchild));
if (rv != APR_SUCCESS) { if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, ap_server_conf, ap_log_error(APLOG_MARK, APLOG_EMERG, rv, ap_server_conf,
@@ -1692,35 +1694,13 @@ static int worker_run(apr_pool_t *_pconf, apr_pool_t *plog, server_rec *s)
ap_log_pid(pconf, ap_pid_fname); ap_log_pid(pconf, ap_pid_fname);
/* Initialize cross-process accept lock */ /* Initialize cross-process accept lock */
ap_lock_fname = apr_psprintf(_pconf, "%s.%" APR_PID_T_FMT, rv = ap_proc_mutex_create(&accept_mutex, ap_accept_mutex_type, NULL, s,
ap_server_root_relative(_pconf, ap_lock_fname), _pconf, 0);
ap_my_pid);
rv = apr_proc_mutex_create(&accept_mutex, ap_lock_fname,
ap_accept_lock_mech, _pconf);
if (rv != APR_SUCCESS) { if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, s,
"Couldn't create accept lock");
mpm_state = AP_MPMQ_STOPPING; mpm_state = AP_MPMQ_STOPPING;
return DONE; return DONE;
} }
#if APR_USE_SYSVSEM_SERIALIZE
if (ap_accept_lock_mech == APR_LOCK_DEFAULT ||
ap_accept_lock_mech == APR_LOCK_SYSVSEM) {
#else
if (ap_accept_lock_mech == APR_LOCK_SYSVSEM) {
#endif
rv = ap_unixd_set_proc_mutex_perms(accept_mutex);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, s,
"Couldn't set permissions on cross-process lock; "
"check User and Group directives");
mpm_state = AP_MPMQ_STOPPING;
return DONE;
}
}
if (!is_graceful) { if (!is_graceful) {
if (ap_run_pre_mpm(s->process->pool, SB_SHARED) != OK) { if (ap_run_pre_mpm(s->process->pool, SB_SHARED) != OK) {
mpm_state = AP_MPMQ_STOPPING; mpm_state = AP_MPMQ_STOPPING;
@@ -1766,7 +1746,7 @@ static int worker_run(apr_pool_t *_pconf, apr_pool_t *plog, server_rec *s)
ap_log_error(APLOG_MARK, APLOG_INFO, 0, ap_server_conf, ap_log_error(APLOG_MARK, APLOG_INFO, 0, ap_server_conf,
"Server built: %s", ap_get_server_built()); "Server built: %s", ap_get_server_built());
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ap_server_conf, ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ap_server_conf,
"AcceptMutex: %s (default: %s)", "Accept mutex: %s (default: %s)",
apr_proc_mutex_name(accept_mutex), apr_proc_mutex_name(accept_mutex),
apr_proc_mutex_defname()); apr_proc_mutex_defname());
restart_pending = shutdown_pending = 0; restart_pending = shutdown_pending = 0;
@@ -1957,6 +1937,8 @@ static int worker_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
foreground = ap_exists_config_define("FOREGROUND"); foreground = ap_exists_config_define("FOREGROUND");
} }
ap_mutex_register(pconf, ap_accept_mutex_type, NULL, APR_LOCK_DEFAULT, 0);
/* sigh, want this only the second time around */ /* sigh, want this only the second time around */
retained = ap_retained_data_get(userdata_key); retained = ap_retained_data_get(userdata_key);
if (!retained) { if (!retained) {
@@ -1988,7 +1970,6 @@ static int worker_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
threads_per_child = DEFAULT_THREADS_PER_CHILD; threads_per_child = DEFAULT_THREADS_PER_CHILD;
max_clients = ap_daemons_limit * threads_per_child; max_clients = ap_daemons_limit * threads_per_child;
ap_pid_fname = DEFAULT_PIDLOG; ap_pid_fname = DEFAULT_PIDLOG;
ap_lock_fname = DEFAULT_LOCKFILE;
ap_max_requests_per_child = DEFAULT_MAX_REQUESTS_PER_CHILD; ap_max_requests_per_child = DEFAULT_MAX_REQUESTS_PER_CHILD;
ap_extended_status = 0; ap_extended_status = 0;
ap_max_mem_free = APR_ALLOCATOR_MAX_FREE_UNLIMITED; ap_max_mem_free = APR_ALLOCATOR_MAX_FREE_UNLIMITED;

View File

@@ -253,20 +253,6 @@ const char * ap_mpm_set_scoreboard(cmd_parms *cmd, void *dummy,
return NULL; return NULL;
} }
const char *ap_lock_fname = NULL;
const char *ap_mpm_set_lockfile(cmd_parms *cmd, void *dummy,
const char *arg)
{
const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
if (err != NULL) {
return err;
}
ap_lock_fname = arg;
return NULL;
}
int ap_max_requests_per_child = 0; int ap_max_requests_per_child = 0;
const char *ap_mpm_set_max_requests(cmd_parms *cmd, void *dummy, const char *ap_mpm_set_max_requests(cmd_parms *cmd, void *dummy,
@@ -327,35 +313,6 @@ const char * ap_mpm_set_graceful_shutdown(cmd_parms *cmd, void *dummy,
return NULL; return NULL;
} }
apr_lockmech_e ap_accept_lock_mech = APR_LOCK_DEFAULT;
const char *ap_mpm_set_accept_lock_mech(cmd_parms *cmd,
void *dummy,
const char *arg)
{
apr_status_t rv;
const char *lockfile;
const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
if (err != NULL) {
return err;
}
rv = ap_parse_mutex(arg, cmd->server->process->pool,
&ap_accept_lock_mech, &lockfile);
if ((rv == APR_ENOTIMPL) || (rv == APR_ENOLOCK)) {
return apr_pstrcat(cmd->pool, "Invalid AcceptMutex argument ", arg,
" (" AP_AVAILABLE_MUTEXES_STRING ")", NULL);
} else if (rv == APR_BADARG) {
return apr_pstrcat(cmd->pool, "Invalid AcceptMutex filepath ",
arg, NULL);
}
if (lockfile && !ap_lock_fname)
ap_lock_fname = lockfile;
return NULL;
}
apr_uint32_t ap_max_mem_free = APR_ALLOCATOR_MAX_FREE_UNLIMITED; apr_uint32_t ap_max_mem_free = APR_ALLOCATOR_MAX_FREE_UNLIMITED;
const char *ap_mpm_set_max_mem_free(cmd_parms *cmd, void *dummy, const char *ap_mpm_set_max_mem_free(cmd_parms *cmd, void *dummy,

View File

@@ -21,6 +21,7 @@
#include "apr.h" #include "apr.h"
#include "apr_hash.h"
#include "apr_strings.h" #include "apr_strings.h"
#include "apr_lib.h" #include "apr_lib.h"
@@ -31,7 +32,12 @@
#include "httpd.h" #include "httpd.h"
#include "http_main.h" #include "http_main.h"
#include "http_config.h" #include "http_config.h"
#include "http_log.h"
#include "util_mutex.h" #include "util_mutex.h"
#include "unixd.h"
#ifdef HAVE_UNISTD_H
#include <unistd.h> /* getpid() */
#endif
AP_DECLARE(apr_status_t) ap_parse_mutex(const char *arg, apr_pool_t *pool, AP_DECLARE(apr_status_t) ap_parse_mutex(const char *arg, apr_pool_t *pool,
apr_lockmech_e *mutexmech, apr_lockmech_e *mutexmech,
@@ -47,16 +53,16 @@ AP_DECLARE(apr_status_t) ap_parse_mutex(const char *arg, apr_pool_t *pool,
} }
} }
if (!strcasecmp(meth, "none") || !strcasecmp(meth, "no")) {
return APR_ENOLOCK;
}
/* APR determines temporary filename unless overridden below, /* APR determines temporary filename unless overridden below,
* we presume file indicates an mutexfile is a file path * we presume file indicates an mutexfile is a file path
* unless the method sets mutexfile=file and NULLs file * unless the method sets mutexfile=file and NULLs file
*/ */
*mutexfile = NULL; *mutexfile = NULL;
if (!strcasecmp(meth, "none") || !strcasecmp(meth, "no")) {
return APR_ENOLOCK;
}
/* NOTE: previously, 'yes' implied 'sem' */ /* NOTE: previously, 'yes' implied 'sem' */
if (!strcasecmp(meth, "default") || !strcasecmp(meth, "yes")) { if (!strcasecmp(meth, "default") || !strcasecmp(meth, "yes")) {
*mutexmech = APR_LOCK_DEFAULT; *mutexmech = APR_LOCK_DEFAULT;
@@ -112,3 +118,330 @@ AP_DECLARE(apr_status_t) ap_parse_mutex(const char *arg, apr_pool_t *pool,
return APR_SUCCESS; return APR_SUCCESS;
} }
typedef struct {
apr_int32_t options;
int set;
int none;
apr_lockmech_e mech;
const char *dir;
} mutex_cfg_t;
/* hash is created the first time a module calls ap_mutex_register(),
* rather than attempting to be the REALLY_REALLY_FIRST pre-config
* hook; it is cleaned up when the associated pool goes away; assume
* pconf is the pool passed to ap_mutex_register()
*/
static apr_hash_t *mxcfg_by_type;
static apr_status_t cleanup_mx_hash(void *dummy)
{
mxcfg_by_type = NULL;
return APR_SUCCESS;
}
static void mx_hash_init(apr_pool_t *p)
{
mutex_cfg_t *def;
if (mxcfg_by_type) {
return;
}
mxcfg_by_type = apr_hash_make(p);
apr_pool_cleanup_register(p, NULL, cleanup_mx_hash, apr_pool_cleanup_null);
/* initialize default mutex configuration */
def = apr_pcalloc(p, sizeof *def);
def->mech = APR_LOCK_DEFAULT;
def->dir = DEFAULT_REL_RUNTIMEDIR;
apr_hash_set(mxcfg_by_type, "default", APR_HASH_KEY_STRING, def);
}
AP_DECLARE(const char *) ap_set_mutex(cmd_parms *cmd, void *dummy,
const char *type, const char *mechdir)
{
apr_pool_t *p = cmd->pool;
apr_lockmech_e mech;
apr_status_t rv;
const char *mutexdir;
mutex_cfg_t *mxcfg = apr_hash_get(mxcfg_by_type, type,
APR_HASH_KEY_STRING);
const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
if (err != NULL) {
return err;
}
if (!mxcfg) {
return apr_psprintf(p, "Mutex type %s is not valid", type);
}
mxcfg->none = 0; /* in case that was the default */
rv = ap_parse_mutex(mechdir, p, &mech, &mutexdir);
if (rv == APR_ENOTIMPL) {
return apr_pstrcat(p, "Invalid Mutex argument ", mechdir,
" (" AP_ALL_AVAILABLE_MUTEXES_STRING ")", NULL);
}
else if (rv == APR_BADARG
|| (mutexdir && !ap_is_directory(p, mutexdir))) {
return apr_pstrcat(p, "Invalid Mutex directory in argument ",
mechdir, NULL);
}
mxcfg->set = 1;
if (rv == APR_ENOLOCK) { /* "none" */
if (!(mxcfg->options & AP_MUTEX_ALLOW_NONE)) {
return apr_psprintf(p,
"None is not allowed for mutex type %s",
type);
}
mxcfg->none = 1;
}
else {
mxcfg->mech = mech;
if (mutexdir) { /* retain mutex default if not configured */
mxcfg->dir = mutexdir;
}
}
return NULL;
}
AP_DECLARE(apr_status_t) ap_mutex_register(apr_pool_t *pconf,
const char *type,
const char *default_dir,
apr_lockmech_e default_mech,
apr_int32_t options)
{
mutex_cfg_t *mxcfg = apr_pcalloc(pconf, sizeof *mxcfg);
if ((options & ~(AP_MUTEX_ALLOW_NONE | AP_MUTEX_DEFAULT_NONE))) {
return APR_EINVAL;
}
mx_hash_init(pconf);
mxcfg->options = options;
if (options & AP_MUTEX_DEFAULT_NONE) {
mxcfg->none = 1;
}
mxcfg->dir = default_dir; /* usually NULL */
mxcfg->mech = default_mech; /* usually APR_LOCK_DEFAULT */
apr_hash_set(mxcfg_by_type, type, APR_HASH_KEY_STRING, mxcfg);
return APR_SUCCESS;
}
static int mutex_needs_file(apr_lockmech_e mech)
{
if (mech != APR_LOCK_FLOCK
&& mech != APR_LOCK_FCNTL
#if APR_USE_FLOCK_SERIALIZE || APR_USE_FCNTL_SERIALIZE
&& mech != APR_LOCK_DEFAULT
#endif
) {
return 0;
}
return 1;
}
static const char *get_mutex_filename(apr_pool_t *p, mutex_cfg_t *mxcfg,
const char *type,
const char *instance_id)
{
const char *pid_suffix = "";
if (!mutex_needs_file(mxcfg->mech)) {
return NULL;
}
#if HAVE_UNISTD_H
pid_suffix = apr_psprintf(p, ".%" APR_PID_T_FMT, getpid());
#endif
return ap_server_root_relative(p,
apr_pstrcat(p,
mxcfg->dir,
"/",
type,
instance_id ? "-" : "",
instance_id ? instance_id : "",
pid_suffix,
NULL));
}
static mutex_cfg_t *mxcfg_lookup(apr_pool_t *p, const char *type)
{
mutex_cfg_t *defcfg, *mxcfg, *newcfg;
defcfg = apr_hash_get(mxcfg_by_type, "default", APR_HASH_KEY_STRING);
/* MUST exist in table, or wasn't registered */
mxcfg = apr_hash_get(mxcfg_by_type, type, APR_HASH_KEY_STRING);
if (!mxcfg) {
return NULL;
}
/* order of precedence:
* 1. Mutex directive for this mutex
* 2. Mutex directive for "default"
* 3. Defaults for this mutex from ap_mutex_register()
* 4. Global defaults
*/
if (mxcfg->set) {
newcfg = mxcfg;
}
else if (defcfg->set) {
newcfg = defcfg;
}
else if (mxcfg->none || mxcfg->mech != APR_LOCK_DEFAULT) {
newcfg = mxcfg;
}
else {
newcfg = defcfg;
}
if (!newcfg->none && mutex_needs_file(newcfg->mech) && !newcfg->dir) {
/* a file-based mutex mechanism was configured, but
* without a mutex file directory; go back through
* the chain to find the directory, store in new
* mutex cfg structure
*/
newcfg = apr_pmemdup(p, newcfg, sizeof *newcfg);
/* !true if dir not already set: mxcfg->set && defcfg->dir */
if (defcfg->set && defcfg->dir) {
newcfg->dir = defcfg->dir;
}
else if (mxcfg->dir) {
newcfg->dir = mxcfg->dir;
}
else {
newcfg->dir = defcfg->dir;
}
}
return newcfg;
}
static void log_bad_create_options(server_rec *s, const char *type)
{
ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s,
"Invalid options were specified when creating the %s mutex",
type);
}
static void log_unknown_type(server_rec *s, const char *type)
{
ap_log_error(APLOG_MARK, APLOG_EMERG, 0, s,
"Can't create mutex of unknown type %s", type);
}
static void log_create_failure(apr_status_t rv, server_rec *s, const char *type,
const char *fname)
{
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, s,
"Couldn't create the %s mutex %s%s%s", type,
fname ? "(file " : "",
fname ? fname : "",
fname ? ")" : "");
}
static void log_perms_failure(apr_status_t rv, server_rec *s, const char *type)
{
ap_log_error(APLOG_MARK, APLOG_EMERG, rv, s,
"Couldn't set permissions on the %s mutex; "
"check User and Group directives",
type);
}
AP_DECLARE(apr_status_t) ap_global_mutex_create(apr_global_mutex_t **mutex,
const char *type,
const char *instance_id,
server_rec *s, apr_pool_t *p,
apr_int32_t options)
{
apr_status_t rv;
const char *fname;
mutex_cfg_t *mxcfg = mxcfg_lookup(p, type);
if (options) {
log_bad_create_options(s, type);
return APR_EINVAL;
}
if (!mxcfg) {
log_unknown_type(s, type);
return APR_EINVAL;
}
if (mxcfg->none) {
*mutex = NULL;
return APR_SUCCESS;
}
fname = get_mutex_filename(p, mxcfg, type, instance_id);
rv = apr_global_mutex_create(mutex, fname, mxcfg->mech, p);
if (rv != APR_SUCCESS) {
log_create_failure(rv, s, type, fname);
return rv;
}
#ifdef AP_NEED_SET_MUTEX_PERMS
rv = ap_unixd_set_global_mutex_perms(*mutex);
if (rv != APR_SUCCESS) {
log_perms_failure(rv, s, type);
return rv;
}
#endif
return APR_SUCCESS;
}
AP_DECLARE(apr_status_t) ap_proc_mutex_create(apr_proc_mutex_t **mutex,
const char *type,
const char *instance_id,
server_rec *s, apr_pool_t *p,
apr_int32_t options)
{
apr_status_t rv;
const char *fname;
mutex_cfg_t *mxcfg = mxcfg_lookup(p, type);
if (options) {
log_bad_create_options(s, type);
return APR_EINVAL;
}
if (!mxcfg) {
log_unknown_type(s, type);
return APR_EINVAL;
}
if (mxcfg->none) {
*mutex = NULL;
return APR_SUCCESS;
}
fname = get_mutex_filename(p, mxcfg, type, instance_id);
rv = apr_proc_mutex_create(mutex, fname, mxcfg->mech, p);
if (rv != APR_SUCCESS) {
log_create_failure(rv, s, type, fname);
return rv;
}
#ifdef AP_NEED_SET_MUTEX_PERMS
rv = ap_unixd_set_proc_mutex_perms(*mutex);
if (rv != APR_SUCCESS) {
log_perms_failure(rv, s, type);
return rv;
}
#endif
return APR_SUCCESS;
}

View File

@@ -209,8 +209,8 @@ SSLSessionCache none
# Note that this SSL configuration is far # Note that this SSL configuration is far
# from complete - you propably will want # from complete - you propably will want
# to configure SSLMutex-es and SSLSession # to configure SSLSession Caches at the
# Caches at the very least. # very least.
<Directory /> <Directory />
Options None Options None