]> git.sur5r.net Git - openldap/blob - servers/slapd/daemon.c
enable max_incoming checks
[openldap] / servers / slapd / daemon.c
1
2 /* Revision history
3  *
4  * 5-Jun-96     hodges
5  *      Added locking of new_conn_mutex when traversing the c[] array.
6  */
7
8 #include "portable.h"
9
10 #include <stdio.h>
11
12 #include <ac/ctype.h>
13 #include <ac/errno.h>
14 #include <ac/signal.h>
15 #include <ac/socket.h>
16 #include <ac/string.h>
17 #include <ac/time.h>
18 #include <ac/unistd.h>
19
20 #include "ldapconfig.h"
21 #include "slap.h"
22
23 #ifdef HAVE_SYS_FILIO_H
24 #include <sys/filio.h>
25 #elif HAVE_SYS_IOCTL_H
26 #include <sys/ioctl.h>
27 #endif
28
29 #ifdef HAVE_TCPD
30 #include <tcpd.h>
31
32 int allow_severity = LOG_INFO;
33 int deny_severity = LOG_NOTICE;
34 #endif /* TCP Wrappers */
35
36 int             dtblsize;
37 Connection      *c;
38
39 static int slapd_shutdown = 0;
40
41 /* a link to the slapd.conf configuration parameters */
42 extern char *slapd_pid_file;
43 extern char *slapd_args_file;
44
45 void *
46 slapd_daemon(
47     void *port
48 )
49 {
50         Operation               *o;
51         BerElement              ber;
52         unsigned long           len, tag, msgid;
53         int                     i;
54         int                     tcps, ns;
55         struct sockaddr_in      addr;
56         fd_set                  readfds;
57         fd_set                  writefds;
58         FILE                    *fp;
59         int                     on = 1;
60
61 #ifdef HAVE_SYSCONF
62         dtblsize = sysconf( _SC_OPEN_MAX );
63 #elif HAVE_GETDTABLESIZE
64         dtblsize = getdtablesize();
65 #else
66         dtblsize = FD_SETSIZE
67 #endif
68
69 #ifdef FD_SETSIZE
70         if(dtblsize > FD_SETSIZE) {
71                 dtblsize = FD_SETSIZE;
72         }
73 #endif  /* !FD_SETSIZE */
74
75         c = (Connection *) ch_calloc( 1, dtblsize * sizeof(Connection) );
76
77         for ( i = 0; i < dtblsize; i++ ) {
78                 c[i].c_dn = NULL;
79                 c[i].c_cdn = NULL;
80                 c[i].c_addr = NULL;
81                 c[i].c_domain = NULL;
82                 c[i].c_ops = NULL;
83                 c[i].c_sb.sb_sd = -1;
84                 c[i].c_sb.sb_options = LBER_NO_READ_AHEAD | LBER_MAX_INCOMING_SIZE;
85                 c[i].c_sb.sb_naddr = 0;
86                 c[i].c_sb.sb_ber.ber_buf = NULL;
87                 c[i].c_sb.sb_ber.ber_ptr = NULL;
88                 c[i].c_sb.sb_ber.ber_end = NULL;
89                 c[i].c_sb.sb_max_incoming = 1 << 18;
90                 c[i].c_writewaiter = 0;
91                 c[i].c_connid = 0;
92                 ldap_pvt_thread_mutex_init( &c[i].c_dnmutex );
93                 ldap_pvt_thread_mutex_init( &c[i].c_opsmutex );
94                 ldap_pvt_thread_mutex_init( &c[i].c_pdumutex );
95                 ldap_pvt_thread_cond_init( &c[i].c_wcv );
96         }
97
98         if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == -1 ) {
99                 int err = errno;
100                 Debug( LDAP_DEBUG_ANY, "socket() failed errno %d (%s)", err,
101                     err > -1 && err < sys_nerr ? sys_errlist[err] :
102                     "unknown", 0 );
103                 exit( 1 );
104         }
105
106         i = 1;
107         if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR, (char *) &i,
108             sizeof(i) ) == -1 ) {
109                 int err = errno;
110                 Debug( LDAP_DEBUG_ANY, "setsockopt(reuse) failed errno %d (%s)",
111                     err, err > -1 && err < sys_nerr ? sys_errlist[err] :
112                     "unknown", 0 );
113         }
114
115 #ifdef SO_KEEPALIVE
116         i = 1;
117         if ( setsockopt( tcps, SOL_SOCKET, SO_KEEPALIVE, (char *) &i,
118             sizeof(i) ) == -1 ) {
119                 int err = errno;
120                 Debug( LDAP_DEBUG_ANY, "setsockopt(keepalive) failed errno %d (%s)",
121                     err, err > -1 && err < sys_nerr ? sys_errlist[err] :
122                     "unknown", 0 );
123         }
124 #endif
125
126 #ifdef TCP_NODELAY
127         i = 1;
128         if ( setsockopt( tcps, IPPROTO_TCP, TCP_NODELAY, (char *) &i,
129             sizeof(i) ) == -1 ) {
130                 int err = errno;
131                 Debug( LDAP_DEBUG_ANY, "setsockopt(TCP_NODELAY) failed errno %d (%s)",
132                     err, err > -1 && err < sys_nerr ? sys_errlist[err] :
133                     "unknown", 0 );
134         }
135 #endif
136
137         (void) memset( (void *) &addr, '\0', sizeof(addr) );
138         addr.sin_family = AF_INET;
139         addr.sin_addr.s_addr = INADDR_ANY;
140         addr.sin_port = htons( (int)port );
141         if ( bind( tcps, (struct sockaddr *) &addr, sizeof(addr) ) == -1 ) {
142                 int err = errno;
143                 Debug( LDAP_DEBUG_ANY, "bind() failed errno %d (%s)\n",
144                     err, err > -1 && err < sys_nerr ? sys_errlist[err] :
145                     "unknown", 0 );
146                 exit( 1 );
147         }
148
149         if ( listen( tcps, 5 ) == -1 ) {
150                 int err = errno;
151                 Debug( LDAP_DEBUG_ANY, "listen() failed errno %d (%s)",
152                     err, err > -1 && err < sys_nerr ? sys_errlist[err] :
153                     "unknown", 0 );
154                 exit( 1 );
155         }
156
157         Debug( LDAP_DEBUG_ANY, "slapd starting\n", 0, 0, 0 );
158
159         if (( slapd_pid_file != NULL ) &&
160                         (( fp = fopen( slapd_pid_file, "w" )) != NULL )) {
161                 fprintf( fp, "%d\n", (int) getpid() );
162                 fclose( fp );
163         }
164
165         if (( slapd_args_file != NULL ) &&
166                         (( fp = fopen( slapd_args_file, "w" )) != NULL )) {
167                 for ( i = 0; i < g_argc; i++ ) {
168                         fprintf( fp, "%s ", g_argv[i] );
169                 }
170                 fprintf( fp, "\n" );
171                 fclose( fp );
172         }
173
174         while ( !slapd_shutdown ) {
175                 struct sockaddr_in      from;
176                 struct hostent          *hp;
177                 struct timeval          zero;
178                 struct timeval          *tvp;
179                 int                     len, pid;
180
181                 char    *client_name;
182                 char    *client_addr;
183
184                 FD_ZERO( &writefds );
185                 FD_ZERO( &readfds );
186                 FD_SET( tcps, &readfds );
187
188                 zero.tv_sec = 0;
189                 zero.tv_usec = 0;
190
191                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
192                 Debug( LDAP_DEBUG_CONNS,
193                     "listening for connections on %d, activity on:",
194                     tcps, 0, 0 );
195
196                 ldap_pvt_thread_mutex_lock( &new_conn_mutex );
197                 for ( i = 0; i < dtblsize; i++ ) {
198                         if ( c[i].c_sb.sb_sd != -1 ) {
199                                 FD_SET( c[i].c_sb.sb_sd, &readfds );
200
201                                 if ( c[i].c_writewaiter ) {
202                                         FD_SET( c[i].c_sb.sb_sd, &writefds );
203                                 }
204                                 Debug( LDAP_DEBUG_CONNS, " %dr%s", i,
205                                     c[i].c_writewaiter ? "w" : "", 0 );
206                         }
207                 }
208                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
209                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
210
211                 Debug( LDAP_DEBUG_CONNS, "before select active_threads %d\n",
212                     active_threads, 0, 0 );
213 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
214                 tvp = NULL;
215 #else
216                 tvp = active_threads ? &zero : NULL;
217 #endif
218                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
219
220                 switch ( i = select( dtblsize, &readfds, &writefds, 0, tvp ) ) {
221                 case -1:        { /* failure - try again */
222                         int err = errno;
223                         Debug( LDAP_DEBUG_CONNS,
224                             "select failed errno %d (%s)\n",
225                             err, err > -1 && err < sys_nerr ?
226                             sys_errlist[err] : "unknown", 0 );
227                         } continue;
228
229                 case 0:         /* timeout - let threads run */
230                         Debug( LDAP_DEBUG_CONNS, "select timeout - yielding\n",
231                             0, 0, 0 );
232                         ldap_pvt_thread_yield();
233                         continue;
234
235                 default:        /* something happened - deal with it */
236                         Debug( LDAP_DEBUG_CONNS, "select activity on %d descriptors\n", i, 0, 0 );
237                         ;       /* FALL */
238                 }
239                 ldap_pvt_thread_mutex_lock( &currenttime_mutex );
240                 time( &currenttime );
241                 ldap_pvt_thread_mutex_unlock( &currenttime_mutex );
242
243                 /* new connection */
244                 ldap_pvt_thread_mutex_lock( &new_conn_mutex );
245                 if ( FD_ISSET( tcps, &readfds ) ) {
246                         len = sizeof(from);
247                         if ( (ns = accept( tcps, (struct sockaddr *) &from,
248                             &len )) == -1 )
249                         {
250                                 int err = errno;
251                                 Debug( LDAP_DEBUG_ANY,
252                                     "accept() failed errno %d (%s)", err,
253                                     err > -1 && err < sys_nerr ?
254                                     sys_errlist[err] : "unknown", 0 );
255                                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
256                                 continue;
257                         }
258                         if ( ioctl( ns, FIONBIO, (caddr_t) &on ) == -1 ) {
259                                 Debug( LDAP_DEBUG_ANY,
260                                     "FIONBIO ioctl on %d failed\n", ns, 0, 0 );
261                         }
262
263                         Debug( LDAP_DEBUG_CONNS, "new connection on %d\n", ns,
264                             0, 0 );
265
266                         len = sizeof(from);
267
268                         if ( getpeername( ns, (struct sockaddr *) &from, &len )
269                             == 0 ) {
270                                 char *s;
271                                 client_addr = inet_ntoa( from.sin_addr );
272
273 #ifdef SLAPD_RLOOKUPS
274                                 hp = gethostbyaddr( (char *)
275                                     &(from.sin_addr),
276                                     sizeof(from.sin_addr), AF_INET );
277
278                                 if(hp) {
279                                         client_name = hp->h_name;
280
281                                         /* normalize the domain */
282                                         for ( s = client_name; *s; s++ ) {
283                                                 *s = TOLOWER( (unsigned char) *s );
284                                         }
285
286                                 } else {
287                                         client_name = NULL;
288                                 }
289 #else
290                                 client_name = NULL;
291 #endif
292
293                         } else {
294                                 client_name = NULL;;
295                                 client_addr = NULL;
296                         }
297
298 #ifdef HAVE_TCPD
299                         if(!hosts_ctl("slapd",
300                                 client_name != NULL ? client_name : STRING_UNKNOWN,
301                                 client_addr != NULL ? client_addr : STRING_UNKNOWN,
302                                 STRING_UNKNOWN))
303                         {
304                                 /* DENY ACCESS */
305                                 Statslog( LDAP_DEBUG_ANY,
306                                  "fd=%d connection from %s (%s) denied.\n",
307                                         ns,
308                                                 client_name == NULL ? "unknown" : client_name,
309                                                 client_addr == NULL ? "unknown" : client_addr,
310                                   0, 0 );
311
312                                 close(ns);
313                                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
314                                 continue;
315                         }
316 #endif /* HAVE_TCPD */
317
318                         c[ns].c_sb.sb_sd = ns;
319                         ldap_pvt_thread_mutex_lock( &ops_mutex );
320                         c[ns].c_connid = num_conns++;
321                         ldap_pvt_thread_mutex_unlock( &ops_mutex );
322
323                         Statslog( LDAP_DEBUG_STATS,
324                             "conn=%d fd=%d connection from %s (%s) accepted.\n",
325                                 c[ns].c_connid, ns,
326                                         client_name == NULL ? "unknown" : client_name,
327                                         client_addr == NULL ? "unknown" : client_addr,
328                              0 );
329
330                         if ( c[ns].c_addr != NULL ) {
331                                 free( c[ns].c_addr );
332                         }
333
334                         c[ns].c_addr = ch_strdup( client_addr == NULL
335                                 ? "" : client_addr );
336
337                         if ( c[ns].c_domain != NULL ) {
338                                 free( c[ns].c_domain );
339                         }
340
341                         c[ns].c_domain = ch_strdup( client_name == NULL
342                                 ? "" : client_name );
343
344                         ldap_pvt_thread_mutex_lock( &c[ns].c_dnmutex );
345                         if ( c[ns].c_dn != NULL ) {
346                                 free( c[ns].c_dn );
347                                 c[ns].c_dn = NULL;
348                         }
349                         if ( c[ns].c_cdn != NULL ) {
350                                 free( c[ns].c_cdn );
351                                 c[ns].c_cdn = NULL;
352                         }
353                         ldap_pvt_thread_mutex_unlock( &c[ns].c_dnmutex );
354                         c[ns].c_starttime = currenttime;
355                         c[ns].c_opsinitiated = 0;
356                         c[ns].c_opscompleted = 0;
357                 }
358                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
359
360                 Debug( LDAP_DEBUG_CONNS, "activity on:", 0, 0, 0 );
361                 for ( i = 0; i < dtblsize; i++ ) {
362                         int     r, w;
363
364                         r = FD_ISSET( i, &readfds );
365                         w = FD_ISSET( i, &writefds );
366                         if ( i != tcps && (r || w) ) {
367                                 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
368                                     r ? "r" : "", w ? "w" : "" );
369                         }
370                 }
371                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
372
373                 for ( i = 0; i < dtblsize; i++ ) {
374                         if ( i == tcps || (! FD_ISSET( i, &readfds ) &&
375                             ! FD_ISSET( i, &writefds )) ) {
376                                 continue;
377                         }
378
379                         if ( FD_ISSET( i, &writefds ) ) {
380                                 Debug( LDAP_DEBUG_CONNS,
381                                     "signaling write waiter on %d\n", i, 0, 0 );
382
383                                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
384                                 active_threads++;
385                                 c[i].c_writewaiter = 0;
386                                 ldap_pvt_thread_cond_signal( &c[i].c_wcv );
387                                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
388                         }
389
390                         if ( FD_ISSET( i, &readfds ) ) {
391                                 Debug( LDAP_DEBUG_CONNS,
392                                     "read activity on %d\n", i, 0, 0 );
393
394                                 connection_activity( &c[i] );
395                         }
396                 }
397
398                 ldap_pvt_thread_yield();
399         }
400
401         close( tcps );
402
403         ldap_pvt_thread_mutex_lock( &active_threads_mutex );
404         Debug( LDAP_DEBUG_ANY,
405             "slapd shutting down - waiting for %d threads to terminate\n",
406             active_threads, 0, 0 );
407         while ( active_threads > 0 ) {
408                 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
409         }
410         ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
411
412         /* let backends do whatever cleanup they need to do */
413         Debug( LDAP_DEBUG_TRACE,
414             "slapd shutting down - waiting for backends to close down\n", 0, 0,
415             0 );
416         be_close();
417         Debug( LDAP_DEBUG_ANY, "slapd stopping\n", 0, 0, 0 );
418
419         return NULL;
420 }
421
422 void
423 slap_set_shutdown( int sig )
424 {
425         slapd_shutdown = 1;
426         ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
427
428         /* reinstall self */
429         (void) SIGNAL( sig, slap_set_shutdown );
430 }
431
432 void
433 slap_do_nothing( int sig )
434 {
435         /* reinstall self */
436         (void) SIGNAL( sig, slap_do_nothing );
437 }