]> git.sur5r.net Git - openldap/blob - servers/slapd/daemon.c
Made add_values(), delete_values(), and replace_values() so they can be
[openldap] / servers / slapd / daemon.c
1
2 /* Revision history
3  *
4  * 5-Jun-96     hodges
5  *      Added locking of new_conn_mutex when traversing the c[] array.
6  */
7
8 #include "portable.h"
9
10 #include <stdio.h>
11
12 #include <ac/ctype.h>
13 #include <ac/errno.h>
14 #include <ac/signal.h>
15 #include <ac/socket.h>
16 #include <ac/string.h>
17 #include <ac/time.h>
18 #include <ac/unistd.h>
19
20 #include "ldapconfig.h"
21 #include "slap.h"
22
23 #ifdef HAVE_SYS_FILIO_H
24 #include <sys/filio.h>
25 #elif HAVE_SYS_IOCTL_H
26 #include <sys/ioctl.h>
27 #endif
28
29 #ifdef LDAP_DEBUG
30 #include <assert.h>
31 #else
32 #define assert( cond )
33 #endif
34
35 #ifdef HAVE_TCPD
36 #include <tcpd.h>
37
38 int allow_severity = LOG_INFO;
39 int deny_severity = LOG_NOTICE;
40 #endif /* TCP Wrappers */
41
42 int             dtblsize;
43 Connection      *c;
44
45 static volatile sig_atomic_t slapd_shutdown = 0;
46
47 /* a link to the slapd.conf configuration parameters */
48 extern char *slapd_pid_file;
49 extern char *slapd_args_file;
50
51 void *
52 slapd_daemon(
53     void *port
54 )
55 {
56         Operation               *o;
57         BerElement              ber;
58         unsigned long           len, tag, msgid;
59         int                     i;
60         int                     tcps, ns;
61         struct sockaddr_in      addr;
62         fd_set                  readfds;
63         fd_set                  writefds;
64         FILE                    *fp;
65         int                     on = 1;
66
67 #ifdef HAVE_SYSCONF
68         dtblsize = sysconf( _SC_OPEN_MAX );
69 #elif HAVE_GETDTABLESIZE
70         dtblsize = getdtablesize();
71 #else
72         dtblsize = FD_SETSIZE
73 #endif
74
75 #ifdef FD_SETSIZE
76         if(dtblsize > FD_SETSIZE) {
77                 dtblsize = FD_SETSIZE;
78         }
79 #endif  /* !FD_SETSIZE */
80
81         c = (Connection *) ch_calloc( 1, dtblsize * sizeof(Connection) );
82
83         for ( i = 0; i < dtblsize; i++ ) {
84                 c[i].c_dn = NULL;
85                 c[i].c_cdn = NULL;
86                 c[i].c_addr = NULL;
87                 c[i].c_domain = NULL;
88                 c[i].c_ops = NULL;
89                 lber_pvt_sb_init( &c[i].c_sb );
90                 c[i].c_writewaiter = 0;
91                 c[i].c_connid = 0;
92                 ldap_pvt_thread_mutex_init( &c[i].c_dnmutex );
93                 ldap_pvt_thread_mutex_init( &c[i].c_opsmutex );
94                 ldap_pvt_thread_mutex_init( &c[i].c_pdumutex );
95                 ldap_pvt_thread_cond_init( &c[i].c_wcv );
96         }
97
98         if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == -1 ) {
99                 Debug( LDAP_DEBUG_ANY, "socket() failed errno %d (%s)", errno,
100                     errno > -1 && errno < sys_nerr ? sys_errlist[errno] :
101                     "unknown", 0 );
102                 exit( 1 );
103         }
104
105         i = 1;
106         if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR, (char *) &i,
107             sizeof(i) ) == -1 ) {
108                 Debug( LDAP_DEBUG_ANY, "setsockopt() failed errno %d (%s)",
109                     errno, errno > -1 && errno < sys_nerr ? sys_errlist[errno] :
110                     "unknown", 0 );
111         }
112
113         (void) memset( (void *) &addr, '\0', sizeof(addr) );
114         addr.sin_family = AF_INET;
115         addr.sin_addr.s_addr = INADDR_ANY;
116         addr.sin_port = htons( (int)port );
117         if ( bind( tcps, (struct sockaddr *) &addr, sizeof(addr) ) == -1 ) {
118                 Debug( LDAP_DEBUG_ANY, "bind() failed errno %d (%s)\n",
119                     errno, errno > -1 && errno < sys_nerr ? sys_errlist[errno] :
120                     "unknown", 0 );
121                 exit( 1 );
122         }
123
124         if ( listen( tcps, 5 ) == -1 ) {
125                 Debug( LDAP_DEBUG_ANY, "listen() failed errno %d (%s)",
126                     errno, errno > -1 && errno < sys_nerr ? sys_errlist[errno] :
127                     "unknown", 0 );
128                 exit( 1 );
129         }
130
131         Debug( LDAP_DEBUG_ANY, "slapd starting\n", 0, 0, 0 );
132
133         if (( slapd_pid_file != NULL ) &&
134                         (( fp = fopen( slapd_pid_file, "w" )) != NULL )) {
135                 fprintf( fp, "%d\n", (int) getpid() );
136                 fclose( fp );
137         }
138
139         if (( slapd_args_file != NULL ) &&
140                         (( fp = fopen( slapd_args_file, "w" )) != NULL )) {
141                 for ( i = 0; i < g_argc; i++ ) {
142                         fprintf( fp, "%s ", g_argv[i] );
143                 }
144                 fprintf( fp, "\n" );
145                 fclose( fp );
146         }
147
148         while ( !slapd_shutdown ) {
149                 struct sockaddr_in      from;
150                 struct hostent          *hp;
151                 struct timeval          zero;
152                 struct timeval          *tvp;
153                 int                     len, pid;
154                 int                     data_ready;
155
156                 char    *client_name;
157                 char    *client_addr;
158
159                 FD_ZERO( &writefds );
160                 FD_ZERO( &readfds );
161                 FD_SET( tcps, &readfds );
162
163                 zero.tv_sec = 0;
164                 zero.tv_usec = 0;
165
166                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
167                 Debug( LDAP_DEBUG_CONNS,
168                     "listening for connections on %d, activity on:",
169                     tcps, 0, 0 );
170            
171                 data_ready = 0;
172
173                 ldap_pvt_thread_mutex_lock( &new_conn_mutex );
174                 for ( i = 0; i < dtblsize; i++ ) {
175                         if ( lber_pvt_sb_in_use( &c[i].c_sb )) {
176                                 FD_SET( lber_pvt_sb_get_desc(&c[i].c_sb),
177                                         &readfds );
178                                 if (lber_pvt_sb_data_ready(&c[i].c_sb))
179                                         data_ready = 1;
180                                 if ( c[i].c_writewaiter ) {
181                                         FD_SET( lber_pvt_sb_get_desc(&c[i].c_sb),
182                                                 &writefds );
183                                 }
184                                 Debug( LDAP_DEBUG_CONNS, " %dr%s", i,
185                                     c[i].c_writewaiter ? "w" : "", 0 );
186                         }
187                 }
188                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
189                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
190
191                 Debug( LDAP_DEBUG_CONNS, "before select active_threads %d\n",
192                     active_threads, 0, 0 );
193 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
194                 tvp = (data_ready) ? &zero : NULL;
195 #else
196                 tvp = (active_threads || data_ready) ? &zero : NULL;
197 #endif
198                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
199
200                 switch ( i = select( dtblsize, &readfds, &writefds, 0, tvp ) ) {
201                 case -1:        /* failure - try again */
202                         Debug( LDAP_DEBUG_CONNS,
203                             "select failed errno %d (%s)\n",
204                             errno, errno > -1 && errno < sys_nerr ?
205                             sys_errlist[errno] : "unknown", 0 );
206                         continue;
207
208                 case 0:         /* timeout - let threads run */
209                         Debug( LDAP_DEBUG_CONNS, "select timeout - yielding\n",
210                             0, 0, 0 );
211                         if (!data_ready)
212                                 ldap_pvt_thread_yield();
213                         continue;
214
215                 default:        /* something happened - deal with it */
216                         Debug( LDAP_DEBUG_CONNS, "select activity on %d descriptors\n", i, 0, 0 );
217                         ;       /* FALL */
218                 }
219                 ldap_pvt_thread_mutex_lock( &currenttime_mutex );
220                 time( &currenttime );
221                 ldap_pvt_thread_mutex_unlock( &currenttime_mutex );
222
223                 /* new connection */
224                 ldap_pvt_thread_mutex_lock( &new_conn_mutex );
225                 if ( FD_ISSET( tcps, &readfds ) ) {
226                         len = sizeof(from);
227                         if ( (ns = accept( tcps, (struct sockaddr *) &from,
228                             &len )) == -1 ) {
229                                 Debug( LDAP_DEBUG_ANY,
230                                     "accept() failed errno %d (%s)", errno,
231                                     errno > -1 && errno < sys_nerr ?
232                                     sys_errlist[errno] : "unknown", 0 );
233                                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
234                                 continue;
235                         }
236
237                         /* make sure descriptor number isn't too great */
238                         if ( ns >= dtblsize ) {
239                                 Debug( LDAP_DEBUG_ANY,
240                                         "new connection on %d beyond descriptor table size %d\n",
241                                         ns, dtblsize, 0 );
242                                 close(ns);
243                                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
244                                 continue;
245                         }
246                    
247                         lber_pvt_sb_set_desc( &c[ns].c_sb, ns );
248                         lber_pvt_sb_set_io( &c[ns].c_sb, &lber_pvt_sb_io_tcp, NULL );
249                    
250                         if (lber_pvt_sb_set_nonblock( &c[ns].c_sb, 1)<0) {                         
251                                 Debug( LDAP_DEBUG_ANY,
252                                     "FIONBIO ioctl on %d failed\n", ns, 0, 0 );
253                         }
254
255                         Debug( LDAP_DEBUG_CONNS, "new connection on %d\n", ns,
256                             0, 0 );
257
258                         len = sizeof(from);
259
260                         if ( getpeername( ns, (struct sockaddr *) &from, &len )
261                             == 0 ) {
262                                 char *s;
263                                 client_addr = inet_ntoa( from.sin_addr );
264
265 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
266                                 hp = gethostbyaddr( (char *)
267                                     &(from.sin_addr.s_addr),
268                                     sizeof(from.sin_addr.s_addr), AF_INET );
269
270                                 if(hp) {
271                                         client_name = hp->h_name;
272
273                                         /* normalize the domain */
274                                         for ( s = client_name; *s; s++ ) {
275                                                 *s = TOLOWER( (unsigned char) *s );
276                                         }
277
278                                 } else {
279                                         client_name = NULL;
280                                 }
281 #else
282                                 client_name = NULL;
283 #endif
284
285                         } else {
286                                 client_name = NULL;;
287                                 client_addr = NULL;
288                         }
289
290 #ifdef HAVE_TCPD
291                         if(!hosts_ctl("slapd",
292                                 client_name != NULL ? client_name : STRING_UNKNOWN,
293                                 client_addr != NULL ? client_addr : STRING_UNKNOWN,
294                                 STRING_UNKNOWN))
295                         {
296                                 /* DENY ACCESS */
297                                 Statslog( LDAP_DEBUG_ANY,
298                                  "fd=%d connection from %s (%s) denied.\n",
299                                         ns,
300                                                 client_name == NULL ? "unknown" : client_name,
301                                                 client_addr == NULL ? "unknown" : client_addr,
302                                   0, 0 );
303
304                                 lber_pvt_sb_close( &c[ns].c_sb );
305                                 lber_pvt_sb_destroy( &c[ns].c_sb );
306                                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
307                                 continue;
308                         }
309 #endif /* HAVE_TCPD */
310
311
312                         ldap_pvt_thread_mutex_lock( &ops_mutex );
313                         c[ns].c_connid = num_conns++;
314                         ldap_pvt_thread_mutex_unlock( &ops_mutex );
315
316                         Statslog( LDAP_DEBUG_STATS,
317                             "conn=%d fd=%d connection from %s (%s) accepted.\n",
318                                 c[ns].c_connid, ns,
319                                         client_name == NULL ? "unknown" : client_name,
320                                         client_addr == NULL ? "unknown" : client_addr,
321                              0 );
322
323                         if ( c[ns].c_addr != NULL ) {
324                                 free( c[ns].c_addr );
325                         }
326                         c[ns].c_addr = ch_strdup( client_addr );
327
328                         if ( c[ns].c_domain != NULL ) {
329                                 free( c[ns].c_domain );
330                         }
331
332                         c[ns].c_domain = ch_strdup( client_name == NULL
333                                 ? "" : client_name );
334
335                         ldap_pvt_thread_mutex_lock( &c[ns].c_dnmutex );
336                         if ( c[ns].c_dn != NULL ) {
337                                 free( c[ns].c_dn );
338                                 c[ns].c_dn = NULL;
339                         }
340                         if ( c[ns].c_cdn != NULL ) {
341                                 free( c[ns].c_cdn );
342                                 c[ns].c_cdn = NULL;
343                         }
344                         ldap_pvt_thread_mutex_unlock( &c[ns].c_dnmutex );
345                         c[ns].c_starttime = currenttime;
346                         c[ns].c_opsinitiated = 0;
347                         c[ns].c_opscompleted = 0;
348                 }
349                 ldap_pvt_thread_mutex_unlock( &new_conn_mutex );
350
351                 Debug( LDAP_DEBUG_CONNS, "activity on:", 0, 0, 0 );
352                 for ( i = 0; i < dtblsize; i++ ) {
353                         int     r, w;
354
355                         r = FD_ISSET( i, &readfds );
356                         w = FD_ISSET( i, &writefds );
357                         if ( i != tcps && (r || w) ) {
358                                 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
359                                     r ? "r" : "", w ? "w" : "" );
360                         }
361                 }
362                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
363
364                 for ( i = 0; i < dtblsize; i++ ) {
365                         if ( i == tcps || (! FD_ISSET( i, &readfds ) &&
366                             ! FD_ISSET( i, &writefds )) ) {
367                                 continue;
368                         }
369
370                         if ( FD_ISSET( i, &writefds ) ) {
371                                 Debug( LDAP_DEBUG_CONNS,
372                                     "signaling write waiter on %d\n", i, 0, 0 );
373
374                                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
375                                 active_threads++;
376                                 c[i].c_writewaiter = 0;
377                                 ldap_pvt_thread_cond_signal( &c[i].c_wcv );
378                                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
379                         }
380
381                         if ( FD_ISSET( i, &readfds ) || 
382                                 lber_pvt_sb_data_ready( &c[i].c_sb ) ) {
383                                 Debug( LDAP_DEBUG_CONNS,
384                                     "read activity on %d\n", i, 0, 0 );
385
386                                 connection_activity( &c[i] );
387                         }
388                 }
389
390                 ldap_pvt_thread_yield();
391         }
392
393         Debug( LDAP_DEBUG_TRACE,
394             "slapd shutdown: shutdown initiated.\n",
395             0, 0, 0 );
396
397         close( tcps );
398
399         ldap_pvt_thread_mutex_lock( &active_threads_mutex );
400         Debug( LDAP_DEBUG_ANY,
401             "slapd shutdown: waiting for %d threads to terminate\n",
402             active_threads, 0, 0 );
403         while ( active_threads > 0 ) {
404                 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
405         }
406         ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
407
408         return NULL;
409 }
410
411 void
412 slap_set_shutdown( int sig )
413 {
414         Debug( LDAP_DEBUG_ANY, "slapd got shutdown signal %d\n", sig, 0, 0 );
415         slapd_shutdown = 1;
416         ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
417
418         /* reinstall self */
419         (void) SIGNAL( sig, slap_set_shutdown );
420 }
421
422 void
423 slap_do_nothing( int sig )
424 {
425         Debug( LDAP_DEBUG_TRACE, "slapd got do_nothing signal %d\n", sig, 0, 0 );
426
427         /* reinstall self */
428         (void) SIGNAL( sig, slap_do_nothing );
429 }