]> git.sur5r.net Git - openldap/blob - servers/slapd/daemon.c
Close inactive streams instead of asserting condition.
[openldap] / servers / slapd / daemon.c
1 #include "portable.h"
2
3 #include <stdio.h>
4
5 #include <ac/ctype.h>
6 #include <ac/errno.h>
7 #include <ac/signal.h>
8 #include <ac/socket.h>
9 #include <ac/string.h>
10 #include <ac/time.h>
11 #include <ac/unistd.h>
12
13 #include "ldapconfig.h"
14 #include "slap.h"
15
16 #ifdef HAVE_TCPD
17 #include <tcpd.h>
18
19 int allow_severity = LOG_INFO;
20 int deny_severity = LOG_NOTICE;
21 #endif /* TCP Wrappers */
22
23 /* globals */
24 int dtblsize;
25
26 #ifdef HAVE_WINSOCK2
27 /* forward reference */
28 void hit_socket();
29 /* In wsa_err.c */
30 char *WSAGetLastErrorString();
31
32 #define WAKE_LISTENER \
33 do {\
34     if( wake ) {\
35         ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
36         hit_socket();\
37     }\
38 } while(0)
39 #else
40 #define WAKE_LISTENER \
41 do {\
42     if( wake ) {\
43         ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );\
44     }\
45 } while(0)
46 #endif
47
48 static int daemon_initialized = 0;
49 static ldap_pvt_thread_t        listener_tid;
50 static volatile sig_atomic_t slapd_shutdown = 0;
51 static volatile sig_atomic_t slapd_listener = 0;
52 void sockinit();
53
54 struct slap_daemon {
55         ldap_pvt_thread_mutex_t sd_mutex;
56
57         int sd_nactives;
58
59 #ifndef HAVE_WINSOCK
60         /* In winsock, accept() returns values higher than dtblsize
61                 so don't bother with this optimization */
62         int sd_nfds;
63 #endif
64
65         fd_set sd_actives;
66         fd_set sd_readers;
67         fd_set sd_writers;
68 } slap_daemon; 
69
70 /*
71  * Add a descriptor to daemon control
72  */
73 static void slapd_add(int s) {
74         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
75
76         assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
77         assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
78         assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
79
80 #ifndef HAVE_WINSOCK
81         if (s >= slap_daemon.sd_nfds) {
82                 slap_daemon.sd_nfds = s + 1;
83         }
84 #endif
85
86         FD_SET( (unsigned) s, &slap_daemon.sd_actives );
87         FD_SET( (unsigned) s, &slap_daemon.sd_readers );
88
89         Debug( LDAP_DEBUG_CONNS, "daemon: added %d%s%s\n", s,
90             FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
91                 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
92
93         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
94 }
95
96 /*
97  * Remove the descriptor from daemon control
98  */
99 void slapd_remove(int s) {
100         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
101
102         assert( FD_ISSET( s, &slap_daemon.sd_actives ));
103
104         Debug( LDAP_DEBUG_CONNS, "daemon: removing %d%s%s\n", s,
105             FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
106                 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
107
108         FD_CLR( (unsigned) s, &slap_daemon.sd_actives );
109         FD_CLR( (unsigned) s, &slap_daemon.sd_readers );
110         FD_CLR( (unsigned) s, &slap_daemon.sd_writers );
111
112         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
113 }
114
115 void slapd_clr_write(int s, int wake) {
116         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
117         WAKE_LISTENER;
118
119         assert( FD_ISSET( (unsigned) s, &slap_daemon.sd_actives) );
120         FD_CLR( (unsigned) s, &slap_daemon.sd_writers );
121
122         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
123 }
124
125 void slapd_set_write(int s, int wake) {
126         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
127     WAKE_LISTENER;
128
129
130         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
131         FD_SET( (unsigned) s, &slap_daemon.sd_writers );
132
133         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
134 }
135
136 void slapd_clr_read(int s, int wake) {
137         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
138     WAKE_LISTENER;
139
140         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
141         FD_CLR( (unsigned) s, &slap_daemon.sd_readers );
142
143         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
144
145 }
146
147 void slapd_set_read(int s, int wake) {
148         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
149     WAKE_LISTENER;
150
151         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
152         FD_SET( (unsigned) s, &slap_daemon.sd_readers );
153
154         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
155 }
156
157 static void slapd_close(int s) {
158         slapd_remove(s);
159
160         Debug( LDAP_DEBUG_CONNS, "daemon: closing %d\n", s, 0, 0 );
161         tcp_close(s);
162 }
163
164 int
165 set_socket( struct sockaddr_in *addr )
166 {
167         int     tcps = -1;
168     if ( !daemon_initialized ) sockinit();
169
170 #ifdef HAVE_SYSCONF
171         dtblsize = sysconf( _SC_OPEN_MAX );
172 #elif HAVE_GETDTABLESIZE
173         dtblsize = getdtablesize();
174 #else
175         dtblsize = FD_SETSIZE;
176 #endif
177
178 #ifdef FD_SETSIZE
179         if(dtblsize > FD_SETSIZE) {
180                 dtblsize = FD_SETSIZE;
181         }
182 #endif  /* !FD_SETSIZE */
183
184         if( addr != NULL ) {
185                 int     tmp;
186
187                 if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == -1 ) {
188 #ifndef HAVE_WINSOCK
189                         int err = errno;
190                         Debug( LDAP_DEBUG_ANY,
191                                 "daemon: socket() failed errno %d (%s)\n", err,
192                         err > -1 && err < sys_nerr ? sys_errlist[err] :
193                         "unknown", 0 );
194 #else
195                         Debug( LDAP_DEBUG_ANY, 
196                                 "daemon: socket() failed errno %d (%s)\n",
197                                 WSAGetLastError(),
198                         WSAGetLastErrorString(), 0 );
199 #endif
200                         exit( 1 );
201                 }
202
203 #ifndef HAVE_WINSOCK
204                 if ( tcps >= dtblsize ) {
205                         Debug( LDAP_DEBUG_ANY,
206                                 "daemon: listener descriptor %d is too great\n",
207                                 tcps, dtblsize, 0 );
208                         exit( 1 );
209                 }
210 #endif
211
212 #ifdef SO_REUSEADDR
213                 tmp = 1;
214                 if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR,
215                         (char *) &tmp, sizeof(tmp) ) == -1 )
216                 {
217                         int err = errno;
218                         Debug( LDAP_DEBUG_ANY,
219                                "slapd(%d): setsockopt() failed errno %d (%s)\n",
220                         tcps, err,
221                                 err > -1 && err < sys_nerr
222                                         ? sys_errlist[err] : "unknown" );
223                 }
224 #endif
225 #ifdef SO_KEEPALIVE
226                 tmp = 1;
227                 if ( setsockopt( tcps, SOL_SOCKET, SO_KEEPALIVE,
228                         (char *) &tmp, sizeof(tmp) ) == -1 )
229                 {
230                         int err = errno;
231                         Debug( LDAP_DEBUG_ANY,
232                                 "slapd(%d): setsockopt(KEEPALIVE) failed errno %d (%s)\n",
233                         tcps, err,
234                                 err > -1 && err < sys_nerr
235                                         ? sys_errlist[err] : "unknown" );
236                 }
237 #endif
238
239
240                 if ( bind( tcps, (struct sockaddr *) addr, sizeof(*addr) ) == -1 ) {
241                         int err = errno;
242                         Debug( LDAP_DEBUG_ANY, "daemon: bind(%d) failed errno %d (%s)\n",
243                         tcps, err,
244                                 err > -1 && err < sys_nerr
245                                         ? sys_errlist[err] : "unknown" );
246                         exit( 1 );
247                 }
248         }
249
250         return tcps;
251 }
252
253 static void *
254 slapd_daemon_task(
255         void *ptr
256 )
257 {
258         int inetd = ((int *)ptr) [0];
259         int tcps  = ((int *)ptr) [1];
260         free( ptr );
261
262     if ( !daemon_initialized ) sockinit();
263
264         slapd_listener=1;
265
266         ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
267         FD_ZERO( &slap_daemon.sd_readers );
268         FD_ZERO( &slap_daemon.sd_writers );
269
270         if( !inetd ) {
271                 if ( listen( tcps, 5 ) == -1 ) {
272                         int err = errno;
273                         Debug( LDAP_DEBUG_ANY,
274                                 "daemon: listen(%d, 5) failed errno %d (%s)\n",
275                             tcps, err,
276                                 err > -1 && err < sys_nerr
277                                         ? sys_errlist[err] : "unknown" );
278                         exit( 1 );
279                 }
280
281                 slapd_add( tcps );
282
283         } else {
284                 if( connection_init( 0, NULL, NULL ) ) {
285                         Debug( LDAP_DEBUG_ANY,
286                                 "connection_init(%d) failed.\n",
287                                 0, 0, 0 );
288
289                         exit( 1 );
290                 }
291
292                 slapd_add( 0 );
293         }
294
295         while ( !slapd_shutdown ) {
296                 unsigned int i;
297                 int ns, nfds;
298                 int ebadf = 0;
299 #define SLAPD_EBADF_LIMIT 10
300
301                 fd_set                  readfds;
302                 fd_set                  writefds;
303
304                 struct sockaddr_in      from;
305 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
306         struct hostent          *hp;
307 #endif
308         struct timeval          zero;
309                 struct timeval          *tvp;
310
311                 char    *client_name;
312                 char    *client_addr;
313
314                 FD_ZERO( &writefds );
315                 FD_ZERO( &readfds );
316
317                 zero.tv_sec = 0;
318                 zero.tv_usec = 0;
319
320                 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
321
322 #ifdef FD_SET_MANUAL_COPY
323                 for( s = 0; s < nfds; s++ ) {
324                         if(FD_ISSET( &slap_sd_writers, s )) {
325                                 FD_SET( &writefds, s );
326                         }
327                         if(FD_ISSET( &slap_sd_writers, s )) {
328                                 FD_SET( &writefds, s );
329                         }
330                 }
331 #else
332                 memcpy( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
333                 memcpy( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
334 #endif
335
336                 FD_SET( (unsigned) tcps, &readfds );
337
338 #ifndef HAVE_WINSOCK
339                 nfds = slap_daemon.sd_nfds;
340 #else
341                 nfds = dtblsize;
342 #endif
343
344                 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
345
346                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
347 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
348                 tvp = NULL;
349 #else
350                 tvp = active_threads ? &zero : NULL;
351 #endif
352
353                 Debug( LDAP_DEBUG_CONNS,
354                         "daemon: select: tcps=%d active_threads=%d tvp=%s\n",
355                     tcps, active_threads,
356                         tvp == NULL ? "NULL" : "zero" );
357            
358
359                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
360
361                 switch(ns = select( nfds, &readfds, &writefds, 0, tvp )) {
362                 case -1: {      /* failure - try again */
363                                 int err = errno;
364
365                                 if( err == EBADF && ++ebadf < SLAPD_EBADF_LIMIT) {
366                                         continue;
367                                 }
368
369                                 if( err != EINTR ) {
370                                         Debug( LDAP_DEBUG_CONNS,
371                                                 "daemon: select failed (%d): %s\n",
372                                                 err,
373                                                 err >= 0 && err < sys_nerr
374                                                         ? sys_errlist[err] : "unknown",
375                                                 0 );
376
377                                         slapd_shutdown = -1;
378                                 }
379                         }
380                         continue;
381
382                 case 0:         /* timeout - let threads run */
383                         ebadf = 0;
384                         Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
385                             0, 0, 0 );
386                 ldap_pvt_thread_yield();
387                         continue;
388
389                 default:        /* something happened - deal with it */
390                         ebadf = 0;
391                         Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
392                                 ns, 0, 0 );
393                         /* FALL THRU */
394                 }
395
396                 if ( FD_ISSET( tcps, &readfds ) ) {
397                         int s;
398                         int len = sizeof(from);
399                         long id;
400
401                         if ( (s = accept( tcps,
402                                 (struct sockaddr *) &from, &len )) == -1 )
403                         {
404                                 int err = errno;
405                                 Debug( LDAP_DEBUG_ANY,
406                                     "daemon: accept(%d) failed errno %d (%s)\n", err,
407                                     tcps, err >= 0 && err < sys_nerr ?
408                                     sys_errlist[err] : "unknown");
409                                 continue;
410                         }
411
412 #ifdef LDAP_DEBUG
413                         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
414
415                         /* newly accepted stream should not be in any of the FD SETS */
416
417                         assert( !FD_ISSET( s, &slap_daemon.sd_actives) );
418                         assert( !FD_ISSET( s, &slap_daemon.sd_readers) );
419                         assert( !FD_ISSET( s, &slap_daemon.sd_writers) );
420
421                         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
422 #endif
423
424 #ifndef HAVE_WINSOCK
425                         /* make sure descriptor number isn't too great */
426                         if ( s >= dtblsize ) {
427                                 Debug( LDAP_DEBUG_ANY,
428                                         "daemon: %d beyond descriptor table size %d\n",
429                                         s, dtblsize, 0 );
430                                 tcp_close(s);
431                                 continue;
432                         }
433 #endif
434                    
435                         Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %d\n",
436                                 s, 0, 0 );
437
438                         len = sizeof(from);
439                         if ( getpeername( s, (struct sockaddr *) &from, &len ) == 0 ) {
440                                 client_addr = inet_ntoa( from.sin_addr );
441
442 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
443                                 hp = gethostbyaddr( (char *)
444                                     &(from.sin_addr.s_addr),
445                                     sizeof(from.sin_addr.s_addr), AF_INET );
446
447                                 if(hp) {
448                                         char *p;
449                                         client_name = hp->h_name;
450
451                                         /* normalize the domain */
452                                         for ( p = client_name; *p; p++ ) {
453                                                 *p = TOLOWER( (unsigned char) *p );
454                                         }
455
456                                 } else {
457                                         client_name = NULL;
458                                 }
459 #else
460                                 client_name = NULL;
461 #endif
462
463                         } else {
464                                 client_name = NULL;;
465                                 client_addr = NULL;
466                         }
467
468 #ifdef HAVE_TCPD
469                         if(!hosts_ctl("slapd",
470                                 client_name != NULL ? client_name : STRING_UNKNOWN,
471                                 client_addr != NULL ? client_addr : STRING_UNKNOWN,
472                                 STRING_UNKNOWN))
473                         {
474                                 /* DENY ACCESS */
475                                 Statslog( LDAP_DEBUG_ANY,
476                                  "fd=%d connection from %s (%s) denied.\n",
477                                         s,
478                                         client_name == NULL ? "unknown" : client_name,
479                                         client_addr == NULL ? "unknown" : client_addr,
480                                   0, 0 );
481
482                                 tcp_close(s);
483                                 continue;
484                         }
485 #endif /* HAVE_TCPD */
486
487
488                         if( (id = connection_init(s, client_name, client_addr)) < 0 ) {
489                                 Debug( LDAP_DEBUG_ANY,
490                                         "daemon: connection_init(%d, %s, %s) failed.\n",
491                                         s,
492                                         client_name == NULL ? "unknown" : client_name,
493                                         client_addr == NULL ? "unknown" : client_addr);
494                                 tcp_close(s);
495                                 continue;
496                         }
497
498                         Statslog( LDAP_DEBUG_STATS,
499                                 "daemon: conn=%d fd=%d connection from %s (%s) accepted.\n",
500                                 id, s,
501                                 client_name == NULL ? "unknown" : client_name,
502                                 client_addr == NULL ? "unknown" : client_addr,
503                                 0 );
504
505                         slapd_add( s );
506                         continue;
507                 }
508
509 #ifdef LDAP_DEBUG
510                 Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
511 #ifdef HAVE_WINSOCK
512                 for ( i = 0; i < readfds.fd_count; i++ ) {
513                         Debug( LDAP_DEBUG_CONNS, " %d%s", readfds.fd_array[i], "r" );
514                 }
515                 for ( i = 0; i < writefds.fd_count; i++ ) {
516                         Debug( LDAP_DEBUG_CONNS, " %d%s", writefds.fd_array[i], "w" );
517                 }
518 #else
519                 for ( i = 0; i < nfds; i++ ) {
520                         int     a, r, w;
521
522                         r = FD_ISSET( i, &readfds );
523                         w = FD_ISSET( i, &writefds );
524                         if ( i != tcps && (r || w) ) {
525                                 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
526                                     r ? "r" : "", w ? "w" : "" );
527                         }
528                 }
529 #endif
530                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
531 #endif
532
533                 /* loop through the writers */
534 #ifdef HAVE_WINSOCK
535                 for ( i = 0; i < writefds.fd_count; i++ )
536 #else
537                 for ( i = 0; i < nfds; i++ )
538 #endif
539                 {
540                         int wd, active;
541
542 #ifdef HAVE_WINSOCK
543                         wd = writefds.fd_array[i];
544 #else
545                         if( ! FD_ISSET( i, &writefds ) ) {
546                                 continue;
547                         }
548                         wd = i;
549 #endif
550
551                         if ( wd == tcps ) {
552                                 continue;
553                         }
554
555                         Debug( LDAP_DEBUG_CONNS,
556                                 "daemon: write active on %d\n",
557                                 wd, 0, 0 );
558
559                         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
560                         active = FD_ISSET( wd, &slap_daemon.sd_actives );
561                         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
562
563                         if( ! active ) {
564                                 /* descriptor no longer in FD set, should be closed */
565                                 Debug( LDAP_DEBUG_CONNS,
566                                         "daemon: write %d inactive, closing.\n", wd, 0, 0 );
567                                 tcp_close( wd );
568                                 continue;
569                         }
570
571                         slapd_clr_write( wd, 0 );
572                         if ( connection_write( wd ) < 0 ) {
573                                 FD_CLR( (unsigned) wd, &readfds );
574                                 slapd_close( wd );
575                         }
576                 }
577
578 #ifdef HAVE_WINSOCK
579                 for ( i = 0; i < readfds.fd_count; i++ )
580 #else
581                 for ( i = 0; i < nfds; i++ )
582 #endif
583                 {
584                         int rd, active;
585
586 #ifdef HAVE_WINSOCK
587                         rd = readfds.fd_array[i];
588 #else
589                         if( ! FD_ISSET( i, &readfds ) ) {
590                                 continue;
591                         }
592                         rd = i;
593 #endif
594
595                         if ( rd == tcps ) {
596                                 continue;
597                         }
598
599                         Debug ( LDAP_DEBUG_CONNS,
600                                 "daemon: read activity on %d\n", rd, 0, 0 );
601
602                         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
603                         active = FD_ISSET( rd, &slap_daemon.sd_actives );
604                         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
605
606                         if( ! active ) {
607                                 /* descriptor no longer in FD set, should be closed */
608                                 Debug( LDAP_DEBUG_CONNS,
609                                         "daemon: read %d inactive, closing.\n", rd, 0, 0 );
610                                 tcp_close( rd );
611                                 continue;
612                         }
613
614                         if ( connection_read( rd ) < 0 ) {
615                                 slapd_close( rd );
616                         }
617                 }
618                 ldap_pvt_thread_yield();
619         }
620
621         if( slapd_shutdown > 0 ) {
622                 Debug( LDAP_DEBUG_TRACE,
623                         "daemon: shutdown requested (%d) and initiated.\n",
624                         (int) slapd_shutdown, 0, 0 );
625
626         } else if ( slapd_shutdown < 0 ) {
627                 Debug( LDAP_DEBUG_TRACE,
628                         "daemon: abnormal condition (%d), shutdown initiated.\n",
629                         (int) slapd_shutdown, 0, 0 );
630         } else {
631                 Debug( LDAP_DEBUG_TRACE,
632                         "daemon: no active streams, shutdown initiated.\n",
633                         0, 0, 0 );
634         }
635
636         if( tcps >= 0 ) {
637                 tcp_close( tcps );
638         }
639
640         /* we only implement "quick" shutdown */
641         connections_shutdown();
642
643         ldap_pvt_thread_mutex_lock( &active_threads_mutex );
644         Debug( LDAP_DEBUG_ANY,
645             "slapd shutdown: waiting for %d threads to terminate\n",
646             active_threads, 0, 0 );
647         while ( active_threads > 0 ) {
648                 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
649         }
650         ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
651
652         slapd_listener = 0;
653         return NULL;
654 }
655
656 int slapd_daemon( int inetd, int tcps )
657 {
658         int rc;
659         int *args = ch_malloc( sizeof( int[2] ) );
660         args[0] = inetd;
661         args[1] = tcps;
662
663     if ( !daemon_initialized ) sockinit();
664
665         connections_init();
666
667 #define SLAPD_LISTENER_THREAD 1
668 #if defined( SLAPD_LISTENER_THREAD ) || !defined(HAVE_PTHREADS)
669
670         /* listener as a separate THREAD */
671         rc = ldap_pvt_thread_create( &listener_tid,
672                 0, slapd_daemon_task, args );
673
674         if ( rc != 0 ) {
675                 Debug( LDAP_DEBUG_ANY,
676                     "listener ldap_pvt_thread_create failed (%d)\n", rc, 0, 0 );
677                 goto destory;
678         }
679
680         /* wait for the listener thread to complete */
681         ldap_pvt_thread_join( listener_tid, (void *) NULL );
682 #else
683         /* expermimental code */
684         listener_tid = pthread_self();
685         slapd_daemon_task( args );
686 #endif
687
688         rc = 0;
689
690 destory:
691         connections_destroy();
692
693 #ifdef HAVE_WINSOCK
694     WSACleanup( );
695 #endif
696
697         return rc;
698 }
699
700 #ifdef HAVE_WINSOCK2
701 void sockinit()
702 {
703     WORD wVersionRequested;
704         WSADATA wsaData;
705         int err;
706  
707         wVersionRequested = MAKEWORD( 2, 0 );
708  
709         err = WSAStartup( wVersionRequested, &wsaData );
710         if ( err != 0 ) {
711                 /* Tell the user that we couldn't find a usable */
712                 /* WinSock DLL.                                  */
713                 return;
714         }
715  
716         /* Confirm that the WinSock DLL supports 2.0.*/
717         /* Note that if the DLL supports versions greater    */
718         /* than 2.0 in addition to 2.0, it will still return */
719         /* 2.0 in wVersion since that is the version we      */
720         /* requested.                                        */
721  
722         if ( LOBYTE( wsaData.wVersion ) != 2 ||
723                 HIBYTE( wsaData.wVersion ) != 0 )
724         {
725             /* Tell the user that we couldn't find a usable */
726             /* WinSock DLL.                                  */
727             WSACleanup( );
728             return; 
729         }
730     daemon_initialized = 1;
731 }       /* The WinSock DLL is acceptable. Proceed. */
732
733 void hit_socket( void )
734 {
735         int s, on = 1;
736         extern struct sockaddr_in       bind_addr;
737
738         /* throw something at the socket to terminate the select() in the daemon thread. */
739         if (( s = socket( AF_INET, SOCK_STREAM, 0 )) == INVALID_SOCKET )
740                 Debug( LDAP_DEBUG_TRACE,
741                         "slap_set_shutdown: socket failed\n\tWSAGetLastError=%d (%s)\n",
742                         WSAGetLastError(), WSAGetLastErrorString(), 0 );
743
744         if ( ioctlsocket( s, FIONBIO, &on ) == -1 ) 
745                 Debug( LDAP_DEBUG_TRACE,
746                         "slap_set_shutdown:FIONBIO ioctl on %d faled\n\tWSAGetLastError=%d (%s)\n",
747                         s, WSAGetLastError(), WSAGetLastError() );
748
749         bind_addr.sin_addr.s_addr = htonl( INADDR_LOOPBACK );
750
751         if ( connect( s, (struct sockaddr *)&bind_addr, sizeof( struct sockaddr_in )) == SOCKET_ERROR ) {
752                 /* we can probably expect some error to occur here, mostly WSAEWOULDBLOCK */
753         }
754
755         tcp_close(s);
756 }
757
758 #elif HAVE_WINSOCK
759 void sockinit()
760 {       WSADATA wsaData;
761         if ( WSAStartup( 0x0101, &wsaData ) != 0 ) {
762             return( NULL );
763         }
764     daemon_initialized = 1;
765 }
766 #else
767 void sockinit()
768 {
769     daemon_initialized = 1;
770     return;
771 }
772 #endif
773
774 void
775 slap_set_shutdown( int sig )
776 {
777         slapd_shutdown = sig;
778 #ifndef HAVE_WINSOCK
779         if(slapd_listener) {
780                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
781         }
782 #else
783         hit_socket();
784 #endif
785         /* reinstall self */
786         (void) SIGNAL( sig, slap_set_shutdown );
787 }
788
789 void
790 slap_do_nothing( int sig )
791 {
792         /* reinstall self */
793         (void) SIGNAL( sig, slap_do_nothing );
794 }