11 #include <ac/unistd.h>
13 #include "ldap_defaults.h"
19 int allow_severity = LOG_INFO;
20 int deny_severity = LOG_NOTICE;
21 #endif /* TCP Wrappers */
24 ber_socket_t dtblsize;
25 static ber_socket_t tcps;
29 extern ldap_pvt_thread_cond_t started_event;
31 /* forward reference */
34 char *WSAGetLastErrorString();
35 static ldap_pvt_thread_t hit_tid;
37 #define WAKE_LISTENER(w) \
40 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
45 #define WAKE_LISTENER(w) \
48 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
56 volatile sig_atomic_t slapd_shutdown = 0;
58 static int daemon_initialized = 0;
59 static ldap_pvt_thread_t listener_tid;
60 static volatile sig_atomic_t slapd_listener = 0;
64 ldap_pvt_thread_mutex_t sd_mutex;
69 /* In winsock, accept() returns values higher than dtblsize
70 so don't bother with this optimization */
80 * Add a descriptor to daemon control
82 static void slapd_add(ber_socket_t s) {
83 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
85 assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
86 assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
87 assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
90 if (s >= slap_daemon.sd_nfds) {
91 slap_daemon.sd_nfds = s + 1;
95 FD_SET( s, &slap_daemon.sd_actives );
96 FD_SET( s, &slap_daemon.sd_readers );
98 Debug( LDAP_DEBUG_CONNS, "daemon: added %ld%s%s\n",
100 FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
101 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
103 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
107 * Remove the descriptor from daemon control
109 void slapd_remove(ber_socket_t s, int wake) {
110 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
113 Debug( LDAP_DEBUG_CONNS, "daemon: removing %ld%s%s\n",
115 FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
116 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
118 FD_CLR( s, &slap_daemon.sd_actives );
119 FD_CLR( s, &slap_daemon.sd_readers );
120 FD_CLR( s, &slap_daemon.sd_writers );
122 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
125 void slapd_clr_write(ber_socket_t s, int wake) {
126 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
129 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
130 FD_CLR( s, &slap_daemon.sd_writers );
132 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
135 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
139 void slapd_set_write(ber_socket_t s, int wake) {
140 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
143 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
144 FD_SET( (unsigned) s, &slap_daemon.sd_writers );
146 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
149 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
153 void slapd_clr_read(ber_socket_t s, int wake) {
154 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
157 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
158 FD_CLR( s, &slap_daemon.sd_readers );
160 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
163 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
167 void slapd_set_read(ber_socket_t s, int wake) {
168 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
171 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
172 FD_SET( s, &slap_daemon.sd_readers );
174 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
177 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
181 static void slapd_close(ber_socket_t s) {
182 Debug( LDAP_DEBUG_CONNS, "daemon: closing %ld\n",
190 set_socket( struct sockaddr_in *addr )
192 ber_socket_t tcps = AC_SOCKET_INVALID;
194 if ( !daemon_initialized ) sockinit();
197 dtblsize = sysconf( _SC_OPEN_MAX );
198 #elif HAVE_GETDTABLESIZE
199 dtblsize = getdtablesize();
201 dtblsize = FD_SETSIZE;
205 if(dtblsize > FD_SETSIZE) {
206 dtblsize = FD_SETSIZE;
208 #endif /* !FD_SETSIZE */
213 if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == AC_SOCKET_INVALID ) {
216 Debug( LDAP_DEBUG_ANY,
217 "daemon: socket() failed errno %d (%s)\n", err,
218 err > -1 && err < sys_nerr ? sys_errlist[err] :
221 Debug( LDAP_DEBUG_ANY,
222 "daemon: socket() failed errno %d (%s)\n",
224 WSAGetLastErrorString(), 0 );
230 if ( tcps >= dtblsize ) {
231 Debug( LDAP_DEBUG_ANY,
232 "daemon: listener descriptor %ld is too great %ld\n",
233 (long) tcps, (long) dtblsize, 0 );
240 if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR,
241 (char *) &tmp, sizeof(tmp) ) == -1 )
244 Debug( LDAP_DEBUG_ANY,
245 "slapd(%ld): setsockopt() failed errno %d (%s)\n",
247 err > -1 && err < sys_nerr
248 ? sys_errlist[err] : "unknown" );
253 if ( setsockopt( tcps, SOL_SOCKET, SO_KEEPALIVE,
254 (char *) &tmp, sizeof(tmp) ) == -1 )
257 Debug( LDAP_DEBUG_ANY,
258 "slapd(%ld): setsockopt(KEEPALIVE) failed errno %d (%s)\n",
260 err > -1 && err < sys_nerr
261 ? sys_errlist[err] : "unknown" );
266 if ( bind( tcps, (struct sockaddr *) addr, sizeof(*addr) ) == -1 ) {
268 Debug( LDAP_DEBUG_ANY, "daemon: bind(%ld) failed errno %d (%s)\n",
270 err > -1 && err < sys_nerr
271 ? sys_errlist[err] : "unknown" );
285 struct slapd_args *args = (struct slapd_args *) ptr;
286 struct sockaddr_in *slapd_addr = args->addr;
290 inetd = ( slapd_addr == NULL);
291 if ( !daemon_initialized ) sockinit();
295 ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
296 FD_ZERO( &slap_daemon.sd_readers );
297 FD_ZERO( &slap_daemon.sd_writers );
300 if ( listen( tcps, 5 ) == -1 ) {
302 Debug( LDAP_DEBUG_ANY,
303 "daemon: listen(%ld, 5) failed errno %d (%s)\n",
305 err > -1 && err < sys_nerr
306 ? sys_errlist[err] : "unknown" );
313 if( connection_init( (ber_socket_t) 0, NULL, NULL ) ) {
314 Debug( LDAP_DEBUG_ANY,
315 "connection_init(%d) failed.\n",
324 if ( started_event != NULL )
325 ldap_pvt_thread_cond_signal( &started_event );
327 /* initialization complete. Here comes the loop. */
329 while ( !slapd_shutdown ) {
333 #define SLAPD_EBADF_LIMIT 10
336 #define SLAPD_IDLE_CHECK_LIMIT 4
337 time_t last_idle_check = slap_get_time();
344 struct sockaddr_in from;
345 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
354 if( global_idletimeout > 0 && difftime(
355 last_idle_check+global_idletimeout/SLAPD_IDLE_CHECK_LIMIT,
358 connections_timeout_idle(now);
361 FD_ZERO( &writefds );
367 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
369 #ifdef FD_SET_MANUAL_COPY
370 for( s = 0; s < nfds; s++ ) {
371 if(FD_ISSET( &slap_sd_writers, s )) {
372 FD_SET( &writefds, s );
374 if(FD_ISSET( &slap_sd_writers, s )) {
375 FD_SET( &writefds, s );
379 memcpy( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
380 memcpy( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
383 FD_SET( (unsigned) tcps, &readfds );
386 nfds = slap_daemon.sd_nfds;
391 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
393 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
394 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
397 tvp = active_threads ? &zero : NULL;
400 Debug( LDAP_DEBUG_CONNS,
401 "daemon: select: tcps=%d active_threads=%d tvp=%s\n",
402 tcps, active_threads,
403 tvp == NULL ? "NULL" : "zero" );
406 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
408 switch(ns = select( nfds, &readfds, &writefds, 0, tvp )) {
409 case -1: { /* failure - try again */
411 int err = WSAGetLastError();
416 if( err == EBADF && ++ebadf < SLAPD_EBADF_LIMIT) {
421 Debug( LDAP_DEBUG_CONNS,
422 "daemon: select failed (%d): %s\n",
424 err >= 0 && err < sys_nerr
425 ? sys_errlist[err] : "unknown",
434 case 0: /* timeout - let threads run */
436 Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
438 ldap_pvt_thread_yield();
441 default: /* something happened - deal with it */
443 Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
448 if ( FD_ISSET( tcps, &readfds ) ) {
450 int len = sizeof(from);
453 if ( (s = accept( tcps,
454 (struct sockaddr *) &from, &len )) == AC_SOCKET_INVALID )
457 Debug( LDAP_DEBUG_ANY,
458 "daemon: accept(%ld) failed errno %d (%s)\n", err,
459 (long) tcps, err >= 0 && err < sys_nerr ?
460 sys_errlist[err] : "unknown");
465 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
467 /* newly accepted stream should not be in any of the FD SETS */
469 assert( !FD_ISSET( s, &slap_daemon.sd_actives) );
470 assert( !FD_ISSET( s, &slap_daemon.sd_readers) );
471 assert( !FD_ISSET( s, &slap_daemon.sd_writers) );
473 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
477 /* make sure descriptor number isn't too great */
478 if ( s >= dtblsize ) {
479 Debug( LDAP_DEBUG_ANY,
480 "daemon: %ld beyond descriptor table size %ld\n",
481 (long) s, (long) dtblsize, 0 );
487 Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %ld\n",
491 if ( getpeername( s, (struct sockaddr *) &from, &len ) == 0 ) {
492 client_addr = inet_ntoa( from.sin_addr );
494 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
495 hp = gethostbyaddr( (char *)
496 &(from.sin_addr.s_addr),
497 sizeof(from.sin_addr.s_addr), AF_INET );
501 client_name = hp->h_name;
503 /* normalize the domain */
504 for ( p = client_name; *p; p++ ) {
505 *p = TOLOWER( (unsigned char) *p );
521 if(!hosts_ctl("slapd",
522 client_name != NULL ? client_name : STRING_UNKNOWN,
523 client_addr != NULL ? client_addr : STRING_UNKNOWN,
527 Statslog( LDAP_DEBUG_ANY,
528 "fd=%ld connection from %s (%s) denied.\n",
530 client_name == NULL ? "unknown" : client_name,
531 client_addr == NULL ? "unknown" : client_addr,
537 #endif /* HAVE_TCPD */
539 if( (id = connection_init(s, client_name, client_addr)) < 0 ) {
540 Debug( LDAP_DEBUG_ANY,
541 "daemon: connection_init(%ld, %s, %s) failed.\n",
543 client_name == NULL ? "unknown" : client_name,
544 client_addr == NULL ? "unknown" : client_addr);
549 Statslog( LDAP_DEBUG_STATS,
550 "daemon: conn=%d fd=%ld connection from %s (%s) accepted.\n",
552 client_name == NULL ? "unknown" : client_name,
553 client_addr == NULL ? "unknown" : client_addr,
561 Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
563 for ( i = 0; i < readfds.fd_count; i++ ) {
564 Debug( LDAP_DEBUG_CONNS, " %d%s", readfds.fd_array[i], "r" );
566 for ( i = 0; i < writefds.fd_count; i++ ) {
567 Debug( LDAP_DEBUG_CONNS, " %d%s", writefds.fd_array[i], "w" );
570 for ( i = 0; i < nfds; i++ ) {
573 r = FD_ISSET( i, &readfds );
574 w = FD_ISSET( i, &writefds );
575 if ( i != tcps && (r || w) ) {
576 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
577 r ? "r" : "", w ? "w" : "" );
581 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
584 /* loop through the writers */
586 for ( i = 0; i < writefds.fd_count; i++ )
588 for ( i = 0; i < nfds; i++ )
594 wd = writefds.fd_array[i];
596 if( ! FD_ISSET( i, &writefds ) ) {
605 Debug( LDAP_DEBUG_CONNS,
606 "daemon: write active on %d\n",
610 * NOTE: it is possible that the connection was closed
611 * and that the stream is now inactive.
612 * connection_write() must valid the stream is still
616 if ( connection_write( wd ) < 0 ) {
617 FD_CLR( (unsigned) wd, &readfds );
623 for ( i = 0; i < readfds.fd_count; i++ )
625 for ( i = 0; i < nfds; i++ )
631 rd = readfds.fd_array[i];
633 if( ! FD_ISSET( i, &readfds ) ) {
643 Debug ( LDAP_DEBUG_CONNS,
644 "daemon: read activity on %d\n", rd, 0, 0 );
647 * NOTE: it is possible that the connection was closed
648 * and that the stream is now inactive.
649 * connection_read() must valid the stream is still
653 if ( connection_read( rd ) < 0 ) {
657 ldap_pvt_thread_yield();
660 if( slapd_shutdown > 0 ) {
661 Debug( LDAP_DEBUG_TRACE,
662 "daemon: shutdown requested and initiated.\n",
665 } else if ( slapd_shutdown < 0 ) {
666 Debug( LDAP_DEBUG_TRACE,
667 "daemon: abnormal condition, shutdown initiated.\n",
670 Debug( LDAP_DEBUG_TRACE,
671 "daemon: no active streams, shutdown initiated.\n",
679 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
680 Debug( LDAP_DEBUG_ANY,
681 "slapd shutdown: waiting for %d threads to terminate\n",
682 active_threads, 0, 0 );
683 while ( active_threads > 0 ) {
684 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
686 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
692 int slapd_daemon( struct slapd_args *args )
696 if ( !daemon_initialized ) sockinit();
700 #define SLAPD_LISTENER_THREAD 1
701 #if defined( SLAPD_LISTENER_THREAD ) || !defined(HAVE_PTHREADS)
703 /* listener as a separate THREAD */
704 rc = ldap_pvt_thread_create( &listener_tid,
705 0, slapd_daemon_task, args );
708 Debug( LDAP_DEBUG_ANY,
709 "listener ldap_pvt_thread_create failed (%d)\n", rc, 0, 0 );
713 /* wait for the listener thread to complete */
714 ldap_pvt_thread_join( listener_tid, (void *) NULL );
716 /* expermimental code */
717 listener_tid = pthread_self();
718 slapd_daemon_task( args );
724 connections_destroy();
736 WORD wVersionRequested;
740 wVersionRequested = MAKEWORD( 2, 0 );
742 err = WSAStartup( wVersionRequested, &wsaData );
744 /* Tell the user that we couldn't find a usable */
749 /* Confirm that the WinSock DLL supports 2.0.*/
750 /* Note that if the DLL supports versions greater */
751 /* than 2.0 in addition to 2.0, it will still return */
752 /* 2.0 in wVersion since that is the version we */
755 if ( LOBYTE( wsaData.wVersion ) != 2 ||
756 HIBYTE( wsaData.wVersion ) != 0 )
758 /* Tell the user that we couldn't find a usable */
763 daemon_initialized = 1;
764 } /* The WinSock DLL is acceptable. Proceed. */
770 extern struct sockaddr_in bind_addr;
772 /* throw something at the socket to terminate the select() in the daemon thread. */
773 if (( s = socket( AF_INET, SOCK_STREAM, 0 )) == AC_SOCKET_INVALID )
774 Debug( LDAP_DEBUG_ANY,
775 "slap_set_shutdown: socket failed\n\tWSAGetLastError=%d (%s)\n",
776 WSAGetLastError(), WSAGetLastErrorString(), 0 );
778 if ( ioctlsocket( s, FIONBIO, &on ) == -1 )
779 Debug( LDAP_DEBUG_ANY,
780 "slap_set_shutdown:FIONBIO ioctl on %d faled\n\tWSAGetLastError=%d (%s)\n",
781 s, WSAGetLastError(), WSAGetLastError() );
783 bind_addr.sin_addr.s_addr = htonl( INADDR_LOOPBACK );
785 if ( connect( s, (struct sockaddr *)&bind_addr, sizeof( struct sockaddr_in )) == SOCKET_ERROR ) {
786 Debug( LDAP_DEBUG_ANY,
787 "hit_socket: error on connect: %d\n", WSAGetLastError(), 0 );
788 /* we can probably expect some error to occur here, mostly WSAEWOULDBLOCK */
797 if ( WSAStartup( 0x0101, &wsaData ) != 0 ) {
800 daemon_initialized = 1;
805 daemon_initialized = 1;
810 slap_set_shutdown( int sig )
812 slapd_shutdown = sig;
815 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
818 Debug( LDAP_DEBUG_TRACE, "Shutdown %d ordered", sig, 0 );
819 /* trying to "hit" the socket seems to always get a */
820 /* EWOULDBLOCK error, so just close the listen socket to */
821 /* break out of the select since we're shutting down anyway */
825 (void) SIGNAL( sig, slap_set_shutdown );
829 slap_do_nothing( int sig )
832 (void) SIGNAL( sig, slap_do_nothing );