11 #include <ac/unistd.h>
13 #include "ldap_defaults.h"
19 int allow_severity = LOG_INFO;
20 int deny_severity = LOG_NOTICE;
21 #endif /* TCP Wrappers */
24 ber_socket_t dtblsize;
25 static ber_socket_t tcps;
29 extern ldap_pvt_thread_cond_t started_event;
31 /* forward reference */
34 char *WSAGetLastErrorString();
35 static ldap_pvt_thread_t hit_tid;
37 #define WAKE_LISTENER(w) \
40 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
45 #define WAKE_LISTENER(w) \
48 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
56 volatile sig_atomic_t slapd_shutdown = 0;
58 static int daemon_initialized = 0;
59 static ldap_pvt_thread_t listener_tid;
60 static volatile sig_atomic_t slapd_listener = 0;
64 ldap_pvt_thread_mutex_t sd_mutex;
69 /* In winsock, accept() returns values higher than dtblsize
70 so don't bother with this optimization */
80 * Add a descriptor to daemon control
82 static void slapd_add(ber_socket_t s) {
83 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
85 assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
86 assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
87 assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
90 if (s >= slap_daemon.sd_nfds) {
91 slap_daemon.sd_nfds = s + 1;
95 FD_SET( s, &slap_daemon.sd_actives );
96 FD_SET( s, &slap_daemon.sd_readers );
98 Debug( LDAP_DEBUG_CONNS, "daemon: added %ld%s%s\n",
100 FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
101 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
103 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
107 * Remove the descriptor from daemon control
109 void slapd_remove(ber_socket_t s, int wake) {
110 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
113 Debug( LDAP_DEBUG_CONNS, "daemon: removing %ld%s%s\n",
115 FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
116 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
118 FD_CLR( s, &slap_daemon.sd_actives );
119 FD_CLR( s, &slap_daemon.sd_readers );
120 FD_CLR( s, &slap_daemon.sd_writers );
122 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
125 void slapd_clr_write(ber_socket_t s, int wake) {
126 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
129 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
130 FD_CLR( s, &slap_daemon.sd_writers );
132 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
135 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
139 void slapd_set_write(ber_socket_t s, int wake) {
140 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
143 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
144 FD_SET( (unsigned) s, &slap_daemon.sd_writers );
146 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
149 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
153 void slapd_clr_read(ber_socket_t s, int wake) {
154 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
157 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
158 FD_CLR( s, &slap_daemon.sd_readers );
160 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
163 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
167 void slapd_set_read(ber_socket_t s, int wake) {
168 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
171 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
172 FD_SET( s, &slap_daemon.sd_readers );
174 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
177 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
181 static void slapd_close(ber_socket_t s) {
182 Debug( LDAP_DEBUG_CONNS, "daemon: closing %ld\n",
190 set_socket( struct sockaddr_in *addr )
192 ber_socket_t tcps = AC_SOCKET_INVALID;
194 if ( !daemon_initialized ) sockinit();
197 dtblsize = sysconf( _SC_OPEN_MAX );
198 #elif HAVE_GETDTABLESIZE
199 dtblsize = getdtablesize();
201 dtblsize = FD_SETSIZE;
205 if(dtblsize > FD_SETSIZE) {
206 dtblsize = FD_SETSIZE;
208 #endif /* !FD_SETSIZE */
213 if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == AC_SOCKET_INVALID ) {
216 Debug( LDAP_DEBUG_ANY,
217 "daemon: socket() failed errno %d (%s)\n", err,
218 err > -1 && err < sys_nerr ? sys_errlist[err] :
221 Debug( LDAP_DEBUG_ANY,
222 "daemon: socket() failed errno %d (%s)\n",
224 WSAGetLastErrorString(), 0 );
230 if ( tcps >= dtblsize ) {
231 Debug( LDAP_DEBUG_ANY,
232 "daemon: listener descriptor %ld is too great %ld\n",
233 (long) tcps, (long) dtblsize, 0 );
240 if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR,
241 (char *) &tmp, sizeof(tmp) ) == -1 )
244 Debug( LDAP_DEBUG_ANY,
245 "slapd(%ld): setsockopt() failed errno %d (%s)\n",
247 err > -1 && err < sys_nerr
248 ? sys_errlist[err] : "unknown" );
253 if ( setsockopt( tcps, SOL_SOCKET, SO_KEEPALIVE,
254 (char *) &tmp, sizeof(tmp) ) == -1 )
257 Debug( LDAP_DEBUG_ANY,
258 "slapd(%ld): setsockopt(KEEPALIVE) failed errno %d (%s)\n",
260 err > -1 && err < sys_nerr
261 ? sys_errlist[err] : "unknown" );
266 if ( bind( tcps, (struct sockaddr *) addr, sizeof(*addr) ) == -1 ) {
268 Debug( LDAP_DEBUG_ANY, "daemon: bind(%ld) failed errno %d (%s)\n",
270 err > -1 && err < sys_nerr
271 ? sys_errlist[err] : "unknown" );
285 struct slapd_args *args = (struct slapd_args *) ptr;
286 struct sockaddr_in *slapd_addr = args->addr;
290 inetd = ( slapd_addr == NULL);
291 if ( !daemon_initialized ) sockinit();
295 ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
296 FD_ZERO( &slap_daemon.sd_readers );
297 FD_ZERO( &slap_daemon.sd_writers );
300 if ( listen( tcps, 5 ) == -1 ) {
302 Debug( LDAP_DEBUG_ANY,
303 "daemon: listen(%ld, 5) failed errno %d (%s)\n",
305 err > -1 && err < sys_nerr
306 ? sys_errlist[err] : "unknown" );
313 if( connection_init( (ber_socket_t) 0, NULL, NULL ) ) {
314 Debug( LDAP_DEBUG_ANY,
315 "connection_init(%d) failed.\n",
324 if ( started_event != NULL )
325 ldap_pvt_thread_cond_signal( &started_event );
327 /* initialization complete. Here comes the loop. */
329 while ( !slapd_shutdown ) {
333 #define SLAPD_EBADF_LIMIT 10
336 #define SLAPD_IDLE_CHECK_LIMIT 4
337 time_t last_idle_check = slap_get_time();
344 struct sockaddr_in from;
345 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
354 if( global_idletimeout > 0 &&
355 difftime( last_idle_check+global_idletimeout, now ) < 0 )
357 connections_timeout_idle(now);
360 FD_ZERO( &writefds );
366 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
368 #ifdef FD_SET_MANUAL_COPY
369 for( s = 0; s < nfds; s++ ) {
370 if(FD_ISSET( &slap_sd_writers, s )) {
371 FD_SET( &writefds, s );
373 if(FD_ISSET( &slap_sd_writers, s )) {
374 FD_SET( &writefds, s );
378 memcpy( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
379 memcpy( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
382 FD_SET( (unsigned) tcps, &readfds );
385 nfds = slap_daemon.sd_nfds;
390 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
392 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
393 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
396 tvp = active_threads ? &zero : NULL;
399 Debug( LDAP_DEBUG_CONNS,
400 "daemon: select: tcps=%d active_threads=%d tvp=%s\n",
401 tcps, active_threads,
402 tvp == NULL ? "NULL" : "zero" );
405 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
407 switch(ns = select( nfds, &readfds, &writefds, 0, tvp )) {
408 case -1: { /* failure - try again */
410 int err = WSAGetLastError();
415 if( err == EBADF && ++ebadf < SLAPD_EBADF_LIMIT) {
420 Debug( LDAP_DEBUG_CONNS,
421 "daemon: select failed (%d): %s\n",
423 err >= 0 && err < sys_nerr
424 ? sys_errlist[err] : "unknown",
433 case 0: /* timeout - let threads run */
435 Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
437 ldap_pvt_thread_yield();
440 default: /* something happened - deal with it */
442 Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
447 if ( FD_ISSET( tcps, &readfds ) ) {
449 int len = sizeof(from);
452 if ( (s = accept( tcps,
453 (struct sockaddr *) &from, &len )) == AC_SOCKET_INVALID )
456 Debug( LDAP_DEBUG_ANY,
457 "daemon: accept(%ld) failed errno %d (%s)\n", err,
458 (long) tcps, err >= 0 && err < sys_nerr ?
459 sys_errlist[err] : "unknown");
464 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
466 /* newly accepted stream should not be in any of the FD SETS */
468 assert( !FD_ISSET( s, &slap_daemon.sd_actives) );
469 assert( !FD_ISSET( s, &slap_daemon.sd_readers) );
470 assert( !FD_ISSET( s, &slap_daemon.sd_writers) );
472 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
476 /* make sure descriptor number isn't too great */
477 if ( s >= dtblsize ) {
478 Debug( LDAP_DEBUG_ANY,
479 "daemon: %ld beyond descriptor table size %ld\n",
480 (long) s, (long) dtblsize, 0 );
486 Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %ld\n",
490 if ( getpeername( s, (struct sockaddr *) &from, &len ) == 0 ) {
491 client_addr = inet_ntoa( from.sin_addr );
493 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
494 hp = gethostbyaddr( (char *)
495 &(from.sin_addr.s_addr),
496 sizeof(from.sin_addr.s_addr), AF_INET );
500 client_name = hp->h_name;
502 /* normalize the domain */
503 for ( p = client_name; *p; p++ ) {
504 *p = TOLOWER( (unsigned char) *p );
520 if(!hosts_ctl("slapd",
521 client_name != NULL ? client_name : STRING_UNKNOWN,
522 client_addr != NULL ? client_addr : STRING_UNKNOWN,
526 Statslog( LDAP_DEBUG_ANY,
527 "fd=%ld connection from %s (%s) denied.\n",
529 client_name == NULL ? "unknown" : client_name,
530 client_addr == NULL ? "unknown" : client_addr,
536 #endif /* HAVE_TCPD */
538 if( (id = connection_init(s, client_name, client_addr)) < 0 ) {
539 Debug( LDAP_DEBUG_ANY,
540 "daemon: connection_init(%ld, %s, %s) failed.\n",
542 client_name == NULL ? "unknown" : client_name,
543 client_addr == NULL ? "unknown" : client_addr);
548 Statslog( LDAP_DEBUG_STATS,
549 "daemon: conn=%d fd=%ld connection from %s (%s) accepted.\n",
551 client_name == NULL ? "unknown" : client_name,
552 client_addr == NULL ? "unknown" : client_addr,
560 Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
562 for ( i = 0; i < readfds.fd_count; i++ ) {
563 Debug( LDAP_DEBUG_CONNS, " %d%s", readfds.fd_array[i], "r" );
565 for ( i = 0; i < writefds.fd_count; i++ ) {
566 Debug( LDAP_DEBUG_CONNS, " %d%s", writefds.fd_array[i], "w" );
569 for ( i = 0; i < nfds; i++ ) {
572 r = FD_ISSET( i, &readfds );
573 w = FD_ISSET( i, &writefds );
574 if ( i != tcps && (r || w) ) {
575 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
576 r ? "r" : "", w ? "w" : "" );
580 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
583 /* loop through the writers */
585 for ( i = 0; i < writefds.fd_count; i++ )
587 for ( i = 0; i < nfds; i++ )
593 wd = writefds.fd_array[i];
595 if( ! FD_ISSET( i, &writefds ) ) {
604 Debug( LDAP_DEBUG_CONNS,
605 "daemon: write active on %d\n",
609 * NOTE: it is possible that the connection was closed
610 * and that the stream is now inactive.
611 * connection_write() must valid the stream is still
615 if ( connection_write( wd ) < 0 ) {
616 FD_CLR( (unsigned) wd, &readfds );
622 for ( i = 0; i < readfds.fd_count; i++ )
624 for ( i = 0; i < nfds; i++ )
630 rd = readfds.fd_array[i];
632 if( ! FD_ISSET( i, &readfds ) ) {
642 Debug ( LDAP_DEBUG_CONNS,
643 "daemon: read activity on %d\n", rd, 0, 0 );
646 * NOTE: it is possible that the connection was closed
647 * and that the stream is now inactive.
648 * connection_read() must valid the stream is still
652 if ( connection_read( rd ) < 0 ) {
656 ldap_pvt_thread_yield();
659 if( slapd_shutdown > 0 ) {
660 Debug( LDAP_DEBUG_TRACE,
661 "daemon: shutdown requested and initiated.\n",
664 } else if ( slapd_shutdown < 0 ) {
665 Debug( LDAP_DEBUG_TRACE,
666 "daemon: abnormal condition, shutdown initiated.\n",
669 Debug( LDAP_DEBUG_TRACE,
670 "daemon: no active streams, shutdown initiated.\n",
678 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
679 Debug( LDAP_DEBUG_ANY,
680 "slapd shutdown: waiting for %d threads to terminate\n",
681 active_threads, 0, 0 );
682 while ( active_threads > 0 ) {
683 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
685 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
691 int slapd_daemon( struct slapd_args *args )
695 if ( !daemon_initialized ) sockinit();
699 #define SLAPD_LISTENER_THREAD 1
700 #if defined( SLAPD_LISTENER_THREAD ) || !defined(HAVE_PTHREADS)
702 /* listener as a separate THREAD */
703 rc = ldap_pvt_thread_create( &listener_tid,
704 0, slapd_daemon_task, args );
707 Debug( LDAP_DEBUG_ANY,
708 "listener ldap_pvt_thread_create failed (%d)\n", rc, 0, 0 );
712 /* wait for the listener thread to complete */
713 ldap_pvt_thread_join( listener_tid, (void *) NULL );
715 /* expermimental code */
716 listener_tid = pthread_self();
717 slapd_daemon_task( args );
723 connections_destroy();
735 WORD wVersionRequested;
739 wVersionRequested = MAKEWORD( 2, 0 );
741 err = WSAStartup( wVersionRequested, &wsaData );
743 /* Tell the user that we couldn't find a usable */
748 /* Confirm that the WinSock DLL supports 2.0.*/
749 /* Note that if the DLL supports versions greater */
750 /* than 2.0 in addition to 2.0, it will still return */
751 /* 2.0 in wVersion since that is the version we */
754 if ( LOBYTE( wsaData.wVersion ) != 2 ||
755 HIBYTE( wsaData.wVersion ) != 0 )
757 /* Tell the user that we couldn't find a usable */
762 daemon_initialized = 1;
763 } /* The WinSock DLL is acceptable. Proceed. */
769 extern struct sockaddr_in bind_addr;
771 /* throw something at the socket to terminate the select() in the daemon thread. */
772 if (( s = socket( AF_INET, SOCK_STREAM, 0 )) == AC_SOCKET_INVALID )
773 Debug( LDAP_DEBUG_ANY,
774 "slap_set_shutdown: socket failed\n\tWSAGetLastError=%d (%s)\n",
775 WSAGetLastError(), WSAGetLastErrorString(), 0 );
777 if ( ioctlsocket( s, FIONBIO, &on ) == -1 )
778 Debug( LDAP_DEBUG_ANY,
779 "slap_set_shutdown:FIONBIO ioctl on %d faled\n\tWSAGetLastError=%d (%s)\n",
780 s, WSAGetLastError(), WSAGetLastError() );
782 bind_addr.sin_addr.s_addr = htonl( INADDR_LOOPBACK );
784 if ( connect( s, (struct sockaddr *)&bind_addr, sizeof( struct sockaddr_in )) == SOCKET_ERROR ) {
785 Debug( LDAP_DEBUG_ANY,
786 "hit_socket: error on connect: %d\n", WSAGetLastError(), 0 );
787 /* we can probably expect some error to occur here, mostly WSAEWOULDBLOCK */
796 if ( WSAStartup( 0x0101, &wsaData ) != 0 ) {
799 daemon_initialized = 1;
804 daemon_initialized = 1;
809 slap_set_shutdown( int sig )
811 slapd_shutdown = sig;
814 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
817 Debug( LDAP_DEBUG_TRACE, "Shutdown %d ordered", sig, 0 );
818 /* trying to "hit" the socket seems to always get a */
819 /* EWOULDBLOCK error, so just close the listen socket to */
820 /* break out of the select since we're shutting down anyway */
824 (void) SIGNAL( sig, slap_set_shutdown );
828 slap_do_nothing( int sig )
831 (void) SIGNAL( sig, slap_do_nothing );