11 #include <ac/unistd.h>
13 #include "ldap_defaults.h"
19 int allow_severity = LOG_INFO;
20 int deny_severity = LOG_NOTICE;
21 #endif /* TCP Wrappers */
24 ber_socket_t dtblsize;
25 static ber_socket_t tcps;
29 extern ldap_pvt_thread_cond_t started_event;
31 /* forward reference */
34 char *WSAGetLastErrorString();
35 static ldap_pvt_thread_t hit_tid;
37 #define WAKE_LISTENER(w) \
40 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
45 #define WAKE_LISTENER(w) \
48 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
56 volatile sig_atomic_t slapd_shutdown = 0;
58 static int daemon_initialized = 0;
59 static ldap_pvt_thread_t listener_tid;
60 static volatile sig_atomic_t slapd_listener = 0;
64 ldap_pvt_thread_mutex_t sd_mutex;
69 /* In winsock, accept() returns values higher than dtblsize
70 so don't bother with this optimization */
80 * Add a descriptor to daemon control
82 static void slapd_add(ber_socket_t s) {
83 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
85 assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
86 assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
87 assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
90 if (s >= slap_daemon.sd_nfds) {
91 slap_daemon.sd_nfds = s + 1;
95 FD_SET( s, &slap_daemon.sd_actives );
96 FD_SET( s, &slap_daemon.sd_readers );
98 Debug( LDAP_DEBUG_CONNS, "daemon: added %ld%s%s\n",
100 FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
101 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
103 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
107 * Remove the descriptor from daemon control
109 void slapd_remove(ber_socket_t s, int wake) {
110 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
113 Debug( LDAP_DEBUG_CONNS, "daemon: removing %ld%s%s\n",
115 FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
116 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
118 FD_CLR( s, &slap_daemon.sd_actives );
119 FD_CLR( s, &slap_daemon.sd_readers );
120 FD_CLR( s, &slap_daemon.sd_writers );
122 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
125 void slapd_clr_write(ber_socket_t s, int wake) {
126 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
129 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
130 FD_CLR( s, &slap_daemon.sd_writers );
132 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
135 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
139 void slapd_set_write(ber_socket_t s, int wake) {
140 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
143 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
144 FD_SET( (unsigned) s, &slap_daemon.sd_writers );
146 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
149 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
153 void slapd_clr_read(ber_socket_t s, int wake) {
154 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
157 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
158 FD_CLR( s, &slap_daemon.sd_readers );
160 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
163 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
167 void slapd_set_read(ber_socket_t s, int wake) {
168 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
171 assert( FD_ISSET( s, &slap_daemon.sd_actives) );
172 FD_SET( s, &slap_daemon.sd_readers );
174 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
177 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
181 static void slapd_close(ber_socket_t s) {
182 Debug( LDAP_DEBUG_CONNS, "daemon: closing %ld\n",
190 set_socket( struct sockaddr_in *addr )
192 ber_socket_t tcps = AC_SOCKET_INVALID;
194 if ( !daemon_initialized ) sockinit();
197 dtblsize = sysconf( _SC_OPEN_MAX );
198 #elif HAVE_GETDTABLESIZE
199 dtblsize = getdtablesize();
201 dtblsize = FD_SETSIZE;
205 if(dtblsize > FD_SETSIZE) {
206 dtblsize = FD_SETSIZE;
208 #endif /* !FD_SETSIZE */
213 if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == AC_SOCKET_INVALID ) {
216 Debug( LDAP_DEBUG_ANY,
217 "daemon: socket() failed errno %d (%s)\n", err,
218 err > -1 && err < sys_nerr ? sys_errlist[err] :
221 Debug( LDAP_DEBUG_ANY,
222 "daemon: socket() failed errno %d (%s)\n",
224 WSAGetLastErrorString(), 0 );
230 if ( tcps >= dtblsize ) {
231 Debug( LDAP_DEBUG_ANY,
232 "daemon: listener descriptor %ld is too great %ld\n",
233 (long) tcps, (long) dtblsize, 0 );
240 if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR,
241 (char *) &tmp, sizeof(tmp) ) == -1 )
244 Debug( LDAP_DEBUG_ANY,
245 "slapd(%ld): setsockopt() failed errno %d (%s)\n",
247 err > -1 && err < sys_nerr
248 ? sys_errlist[err] : "unknown" );
253 if ( setsockopt( tcps, SOL_SOCKET, SO_KEEPALIVE,
254 (char *) &tmp, sizeof(tmp) ) == -1 )
257 Debug( LDAP_DEBUG_ANY,
258 "slapd(%ld): setsockopt(KEEPALIVE) failed errno %d (%s)\n",
260 err > -1 && err < sys_nerr
261 ? sys_errlist[err] : "unknown" );
266 if ( bind( tcps, (struct sockaddr *) addr, sizeof(*addr) ) == -1 ) {
268 Debug( LDAP_DEBUG_ANY, "daemon: bind(%ld) failed errno %d (%s)\n",
270 err > -1 && err < sys_nerr
271 ? sys_errlist[err] : "unknown" );
285 struct slapd_args *args = (struct slapd_args *) ptr;
286 struct sockaddr_in *slapd_addr = args->addr;
290 inetd = ( slapd_addr == NULL);
291 if ( !daemon_initialized ) sockinit();
295 ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
296 FD_ZERO( &slap_daemon.sd_readers );
297 FD_ZERO( &slap_daemon.sd_writers );
300 if ( listen( tcps, 5 ) == -1 ) {
302 Debug( LDAP_DEBUG_ANY,
303 "daemon: listen(%ld, 5) failed errno %d (%s)\n",
305 err > -1 && err < sys_nerr
306 ? sys_errlist[err] : "unknown" );
313 if( connection_init( (ber_socket_t) 0, NULL, NULL ) ) {
314 Debug( LDAP_DEBUG_ANY,
315 "connection_init(%d) failed.\n",
324 if ( started_event != NULL )
325 ldap_pvt_thread_cond_signal( &started_event );
327 /* initialization complete. Here comes the loop. */
329 while ( !slapd_shutdown ) {
334 #define SLAPD_EBADF_LIMIT 10
339 struct sockaddr_in from;
340 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
349 FD_ZERO( &writefds );
355 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
357 #ifdef FD_SET_MANUAL_COPY
358 for( s = 0; s < nfds; s++ ) {
359 if(FD_ISSET( &slap_sd_writers, s )) {
360 FD_SET( &writefds, s );
362 if(FD_ISSET( &slap_sd_writers, s )) {
363 FD_SET( &writefds, s );
367 memcpy( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
368 memcpy( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
371 FD_SET( (unsigned) tcps, &readfds );
374 nfds = slap_daemon.sd_nfds;
379 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
381 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
382 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
385 tvp = active_threads ? &zero : NULL;
388 Debug( LDAP_DEBUG_CONNS,
389 "daemon: select: tcps=%d active_threads=%d tvp=%s\n",
390 tcps, active_threads,
391 tvp == NULL ? "NULL" : "zero" );
394 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
396 switch(ns = select( nfds, &readfds, &writefds, 0, tvp )) {
397 case -1: { /* failure - try again */
399 int err = WSAGetLastError();
404 if( err == EBADF && ++ebadf < SLAPD_EBADF_LIMIT) {
409 Debug( LDAP_DEBUG_CONNS,
410 "daemon: select failed (%d): %s\n",
412 err >= 0 && err < sys_nerr
413 ? sys_errlist[err] : "unknown",
422 case 0: /* timeout - let threads run */
424 Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
426 ldap_pvt_thread_yield();
429 default: /* something happened - deal with it */
431 Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
436 if ( FD_ISSET( tcps, &readfds ) ) {
438 int len = sizeof(from);
441 if ( (s = accept( tcps,
442 (struct sockaddr *) &from, &len )) == AC_SOCKET_INVALID )
445 Debug( LDAP_DEBUG_ANY,
446 "daemon: accept(%ld) failed errno %d (%s)\n", err,
447 (long) tcps, err >= 0 && err < sys_nerr ?
448 sys_errlist[err] : "unknown");
453 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
455 /* newly accepted stream should not be in any of the FD SETS */
457 assert( !FD_ISSET( s, &slap_daemon.sd_actives) );
458 assert( !FD_ISSET( s, &slap_daemon.sd_readers) );
459 assert( !FD_ISSET( s, &slap_daemon.sd_writers) );
461 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
465 /* make sure descriptor number isn't too great */
466 if ( s >= dtblsize ) {
467 Debug( LDAP_DEBUG_ANY,
468 "daemon: %ld beyond descriptor table size %ld\n",
469 (long) s, (long) dtblsize, 0 );
475 Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %ld\n",
479 if ( getpeername( s, (struct sockaddr *) &from, &len ) == 0 ) {
480 client_addr = inet_ntoa( from.sin_addr );
482 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
483 hp = gethostbyaddr( (char *)
484 &(from.sin_addr.s_addr),
485 sizeof(from.sin_addr.s_addr), AF_INET );
489 client_name = hp->h_name;
491 /* normalize the domain */
492 for ( p = client_name; *p; p++ ) {
493 *p = TOLOWER( (unsigned char) *p );
509 if(!hosts_ctl("slapd",
510 client_name != NULL ? client_name : STRING_UNKNOWN,
511 client_addr != NULL ? client_addr : STRING_UNKNOWN,
515 Statslog( LDAP_DEBUG_ANY,
516 "fd=%ld connection from %s (%s) denied.\n",
518 client_name == NULL ? "unknown" : client_name,
519 client_addr == NULL ? "unknown" : client_addr,
525 #endif /* HAVE_TCPD */
527 if( (id = connection_init(s, client_name, client_addr)) < 0 ) {
528 Debug( LDAP_DEBUG_ANY,
529 "daemon: connection_init(%ld, %s, %s) failed.\n",
531 client_name == NULL ? "unknown" : client_name,
532 client_addr == NULL ? "unknown" : client_addr);
537 Statslog( LDAP_DEBUG_STATS,
538 "daemon: conn=%d fd=%ld connection from %s (%s) accepted.\n",
540 client_name == NULL ? "unknown" : client_name,
541 client_addr == NULL ? "unknown" : client_addr,
549 Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
551 for ( i = 0; i < readfds.fd_count; i++ ) {
552 Debug( LDAP_DEBUG_CONNS, " %d%s", readfds.fd_array[i], "r" );
554 for ( i = 0; i < writefds.fd_count; i++ ) {
555 Debug( LDAP_DEBUG_CONNS, " %d%s", writefds.fd_array[i], "w" );
558 for ( i = 0; i < nfds; i++ ) {
561 r = FD_ISSET( i, &readfds );
562 w = FD_ISSET( i, &writefds );
563 if ( i != tcps && (r || w) ) {
564 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
565 r ? "r" : "", w ? "w" : "" );
569 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
572 /* loop through the writers */
574 for ( i = 0; i < writefds.fd_count; i++ )
576 for ( i = 0; i < nfds; i++ )
582 wd = writefds.fd_array[i];
584 if( ! FD_ISSET( i, &writefds ) ) {
593 Debug( LDAP_DEBUG_CONNS,
594 "daemon: write active on %d\n",
598 * NOTE: it is possible that the connection was closed
599 * and that the stream is now inactive.
600 * connection_write() must valid the stream is still
604 if ( connection_write( wd ) < 0 ) {
605 FD_CLR( (unsigned) wd, &readfds );
611 for ( i = 0; i < readfds.fd_count; i++ )
613 for ( i = 0; i < nfds; i++ )
619 rd = readfds.fd_array[i];
621 if( ! FD_ISSET( i, &readfds ) ) {
631 Debug ( LDAP_DEBUG_CONNS,
632 "daemon: read activity on %d\n", rd, 0, 0 );
635 * NOTE: it is possible that the connection was closed
636 * and that the stream is now inactive.
637 * connection_read() must valid the stream is still
641 if ( connection_read( rd ) < 0 ) {
645 ldap_pvt_thread_yield();
648 if( slapd_shutdown > 0 ) {
649 Debug( LDAP_DEBUG_TRACE,
650 "daemon: shutdown requested and initiated.\n",
653 } else if ( slapd_shutdown < 0 ) {
654 Debug( LDAP_DEBUG_TRACE,
655 "daemon: abnormal condition, shutdown initiated.\n",
658 Debug( LDAP_DEBUG_TRACE,
659 "daemon: no active streams, shutdown initiated.\n",
667 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
668 Debug( LDAP_DEBUG_ANY,
669 "slapd shutdown: waiting for %d threads to terminate\n",
670 active_threads, 0, 0 );
671 while ( active_threads > 0 ) {
672 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
674 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
680 int slapd_daemon( struct slapd_args *args )
684 if ( !daemon_initialized ) sockinit();
688 #define SLAPD_LISTENER_THREAD 1
689 #if defined( SLAPD_LISTENER_THREAD ) || !defined(HAVE_PTHREADS)
691 /* listener as a separate THREAD */
692 rc = ldap_pvt_thread_create( &listener_tid,
693 0, slapd_daemon_task, args );
696 Debug( LDAP_DEBUG_ANY,
697 "listener ldap_pvt_thread_create failed (%d)\n", rc, 0, 0 );
701 /* wait for the listener thread to complete */
702 ldap_pvt_thread_join( listener_tid, (void *) NULL );
704 /* expermimental code */
705 listener_tid = pthread_self();
706 slapd_daemon_task( args );
712 connections_destroy();
724 WORD wVersionRequested;
728 wVersionRequested = MAKEWORD( 2, 0 );
730 err = WSAStartup( wVersionRequested, &wsaData );
732 /* Tell the user that we couldn't find a usable */
737 /* Confirm that the WinSock DLL supports 2.0.*/
738 /* Note that if the DLL supports versions greater */
739 /* than 2.0 in addition to 2.0, it will still return */
740 /* 2.0 in wVersion since that is the version we */
743 if ( LOBYTE( wsaData.wVersion ) != 2 ||
744 HIBYTE( wsaData.wVersion ) != 0 )
746 /* Tell the user that we couldn't find a usable */
751 daemon_initialized = 1;
752 } /* The WinSock DLL is acceptable. Proceed. */
758 extern struct sockaddr_in bind_addr;
760 /* throw something at the socket to terminate the select() in the daemon thread. */
761 if (( s = socket( AF_INET, SOCK_STREAM, 0 )) == AC_SOCKET_INVALID )
762 Debug( LDAP_DEBUG_ANY,
763 "slap_set_shutdown: socket failed\n\tWSAGetLastError=%d (%s)\n",
764 WSAGetLastError(), WSAGetLastErrorString(), 0 );
766 if ( ioctlsocket( s, FIONBIO, &on ) == -1 )
767 Debug( LDAP_DEBUG_ANY,
768 "slap_set_shutdown:FIONBIO ioctl on %d faled\n\tWSAGetLastError=%d (%s)\n",
769 s, WSAGetLastError(), WSAGetLastError() );
771 bind_addr.sin_addr.s_addr = htonl( INADDR_LOOPBACK );
773 if ( connect( s, (struct sockaddr *)&bind_addr, sizeof( struct sockaddr_in )) == SOCKET_ERROR ) {
774 Debug( LDAP_DEBUG_ANY,
775 "hit_socket: error on connect: %d\n", WSAGetLastError(), 0 );
776 /* we can probably expect some error to occur here, mostly WSAEWOULDBLOCK */
785 if ( WSAStartup( 0x0101, &wsaData ) != 0 ) {
788 daemon_initialized = 1;
793 daemon_initialized = 1;
798 slap_set_shutdown( int sig )
800 slapd_shutdown = sig;
803 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
806 Debug( LDAP_DEBUG_TRACE, "Shutdown %d ordered", sig, 0 );
807 /* trying to "hit" the socket seems to always get a */
808 /* EWOULDBLOCK error, so just close the listen socket to */
809 /* break out of the select since we're shutting down anyway */
813 (void) SIGNAL( sig, slap_set_shutdown );
817 slap_do_nothing( int sig )
820 (void) SIGNAL( sig, slap_do_nothing );