]> git.sur5r.net Git - openldap/blob - servers/slapd/daemon.c
Fix typo in write select. Fix errors in WINSOCK handling.
[openldap] / servers / slapd / daemon.c
1 #include "portable.h"
2
3 #include <stdio.h>
4
5 #include <ac/ctype.h>
6 #include <ac/errno.h>
7 #include <ac/signal.h>
8 #include <ac/socket.h>
9 #include <ac/string.h>
10 #include <ac/time.h>
11 #include <ac/unistd.h>
12
13 #include "ldapconfig.h"
14 #include "slap.h"
15
16 #ifdef HAVE_TCPD
17 #include <tcpd.h>
18
19 int allow_severity = LOG_INFO;
20 int deny_severity = LOG_NOTICE;
21 #endif /* TCP Wrappers */
22
23 /* globals */
24 int dtblsize;
25
26 static ldap_pvt_thread_t        listener_tid;
27 static volatile sig_atomic_t slapd_shutdown = 0;
28
29 struct slap_daemon {
30         ldap_pvt_thread_mutex_t sd_mutex;
31
32         int sd_nactives;
33
34 #ifndef HAVE_WINSOCK
35         /* In winsock, accept() returns values higher than dtblsize
36                 so don't bother with this optimization */
37         int sd_nfds;
38 #endif
39
40         fd_set sd_actives;
41         fd_set sd_readers;
42         fd_set sd_writers;
43 } slap_daemon; 
44
45 /*
46  * Add a descriptor to daemon control
47  */
48 static void slapd_add(int s) {
49         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
50
51         assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
52         assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
53         assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
54
55 #ifndef HAVE_WINSOCK
56         if (s >= slap_daemon.sd_nfds) {
57                 slap_daemon.sd_nfds = s + 1;
58         }
59 #endif
60
61         FD_SET( s, &slap_daemon.sd_actives );
62         FD_SET( s, &slap_daemon.sd_readers );
63
64         Debug( LDAP_DEBUG_CONNS, "daemon: added %d%s%s\n", s,
65             FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
66                 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
67
68         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
69 }
70
71 /*
72  * Remove the descriptor from daemon control
73  */
74 void slapd_remove(int s) {
75         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
76
77         assert( FD_ISSET( s, &slap_daemon.sd_actives ));
78
79         Debug( LDAP_DEBUG_CONNS, "daemon: removing %d%s%s\n", s,
80             FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
81                 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
82
83         FD_CLR( s, &slap_daemon.sd_actives );
84         FD_CLR( s, &slap_daemon.sd_readers );
85         FD_CLR( s, &slap_daemon.sd_writers );
86
87         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
88 }
89
90 void slapd_clr_write(int s, int wake) {
91         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
92
93         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
94         FD_CLR( s, &slap_daemon.sd_writers );
95
96         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
97
98         if( wake ) {
99                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
100         }
101 }
102
103 void slapd_set_write(int s, int wake) {
104         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
105
106         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
107         FD_SET( s, &slap_daemon.sd_writers );
108
109         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
110
111         if( wake ) {
112                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
113         }
114 }
115
116 void slapd_clr_read(int s, int wake) {
117         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
118
119         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
120         FD_CLR( s, &slap_daemon.sd_readers );
121
122         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
123
124         if( wake ) {
125                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
126         }
127 }
128
129 void slapd_set_read(int s, int wake) {
130         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
131
132         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
133         FD_SET( s, &slap_daemon.sd_readers );
134
135         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
136
137         if( wake ) {
138                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
139         }
140 }
141
142 static void slapd_close(int s) {
143         slapd_remove(s);
144
145         Debug( LDAP_DEBUG_CONNS, "daemon: closing %d\n", s, 0, 0 );
146         tcp_close(s);
147 }
148
149 int
150 set_socket( struct sockaddr_in *addr )
151 {
152         int     tcps = -1;
153
154 #ifdef HAVE_SYSCONF
155         dtblsize = sysconf( _SC_OPEN_MAX );
156 #elif HAVE_GETDTABLESIZE
157         dtblsize = getdtablesize();
158 #else
159         dtblsize = FD_SETSIZE;
160 #endif
161
162 #ifdef FD_SETSIZE
163         if(dtblsize > FD_SETSIZE) {
164                 dtblsize = FD_SETSIZE;
165         }
166 #endif  /* !FD_SETSIZE */
167
168 #ifdef HAVE_WINSOCK
169         {
170                 WORD    vers = MAKEWORD( 2, 0);
171                 int     err;
172                 WSADATA wsaData;
173                 err = WSAStartup( vers, &wsaData );
174         }
175 #endif
176
177         if( addr != NULL ) {
178                 int     tmp;
179
180                 if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == -1 ) {
181                         int err = errno;
182                         Debug( LDAP_DEBUG_ANY,
183                                 "daemon: socket() failed errno %d (%s)\n", err,
184                         err > -1 && err < sys_nerr ? sys_errlist[err] :
185                         "unknown", 0 );
186                         exit( 1 );
187                 }
188
189 #ifndef HAVE_WINSOCK
190                 if ( tcps >= dtblsize ) {
191                         Debug( LDAP_DEBUG_ANY,
192                                 "daemon: listener descriptor %d is too great\n",
193                                 tcps, dtblsize, 0 );
194                         exit( 1 );
195                 }
196 #endif
197
198                 tmp = 1;
199                 if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR,
200                         (char *) &tmp, sizeof(tmp) ) == -1 )
201                 {
202                         int err = errno;
203                         Debug( LDAP_DEBUG_ANY,
204                                "slapd(%d): setsockopt() failed errno %d (%s)\n",
205                         tcps, err,
206                                 err > -1 && err < sys_nerr
207                                         ? sys_errlist[err] : "unknown" );
208                 }
209
210                 if ( bind( tcps, (struct sockaddr *) addr, sizeof(*addr) ) == -1 ) {
211                         int err = errno;
212                         Debug( LDAP_DEBUG_ANY, "daemon: bind(%d) failed errno %d (%s)\n",
213                         tcps, err,
214                                 err > -1 && err < sys_nerr
215                                         ? sys_errlist[err] : "unknown" );
216                         exit( 1 );
217                 }
218         }
219
220         return tcps;
221 }
222
223 static void *
224 slapd_daemon_task(
225         void *ptr
226 )
227 {
228         int inetd = ((int *)ptr) [0];
229         int tcps  = ((int *)ptr) [1];
230         free( ptr );
231
232         connections_init();
233
234         ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
235         FD_ZERO( &slap_daemon.sd_readers );
236         FD_ZERO( &slap_daemon.sd_writers );
237
238         if( !inetd ) {
239                 if ( listen( tcps, 5 ) == -1 ) {
240                         int err = errno;
241                         Debug( LDAP_DEBUG_ANY,
242                                 "daemon: listen(%d, 5) failed errno %d (%s)\n",
243                             tcps, err,
244                                 err > -1 && err < sys_nerr
245                                         ? sys_errlist[err] : "unknown" );
246                         exit( 1 );
247                 }
248
249                 slapd_add( tcps );
250
251         } else {
252                 if( connection_init( 0, NULL, NULL ) ) {
253                         Debug( LDAP_DEBUG_ANY,
254                                 "connection_init(%d) failed.\n",
255                                 0, 0, 0 );
256
257                         exit( 1 );
258                 }
259
260                 slapd_add( 0 );
261         }
262
263         while ( !slapd_shutdown ) {
264                 unsigned int i;
265                 int ns, nfds;
266
267                 fd_set                  readfds;
268                 fd_set                  writefds;
269
270                 struct sockaddr_in      from;
271 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
272         struct hostent          *hp;
273 #endif
274         struct timeval          zero;
275                 struct timeval          *tvp;
276
277                 char    *client_name;
278                 char    *client_addr;
279
280                 FD_ZERO( &writefds );
281                 FD_ZERO( &readfds );
282
283                 zero.tv_sec = 0;
284                 zero.tv_usec = 0;
285
286                 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
287
288 #ifdef FD_SET_MANUAL_COPY
289                 for( s = 0; s < nfds; s++ ) {
290                         if(FD_ISSET( &slap_sd_writers, s )) {
291                                 FD_SET( &writefds, s );
292                         }
293                         if(FD_ISSET( &slap_sd_writers, s )) {
294                                 FD_SET( &writefds, s );
295                         }
296                 }
297 #else
298                 memcpy( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
299                 memcpy( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
300 #endif
301
302                 FD_SET( tcps, &readfds );
303
304 #ifndef HAVE_WINSOCK
305                 nfds = slap_daemon.sd_nfds;
306 #else
307                 nfds = dtblsize;
308 #endif
309
310                 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
311
312                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
313 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
314                 tvp = NULL;
315 #else
316                 tvp = active_threads ? &zero : NULL;
317 #endif
318
319                 Debug( LDAP_DEBUG_CONNS,
320                         "daemon: select: tcps=%d active_threads=%d tvp=%s\n",
321                     tcps, active_threads,
322                         tvp == NULL ? "NULL" : "zero" );
323            
324
325                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
326
327                 switch(ns = select( nfds, &readfds, &writefds, 0, tvp )) {
328                 case -1: {      /* failure - try again */
329                                 int err = errno;
330                                 if( err != EINTR ) {
331                                         Debug( LDAP_DEBUG_CONNS,
332                                                 "daemon: select failed (%d): %s\n",
333                                                 err,
334                                                 err >= 0 && err < sys_nerr
335                                                         ? sys_errlist[err] : "unknown",
336                                                 0 );
337
338                                         slapd_shutdown = -1;
339                                 }
340                         }
341                         continue;
342
343                 case 0:         /* timeout - let threads run */
344                         Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
345                             0, 0, 0 );
346                 ldap_pvt_thread_yield();
347                         continue;
348
349                 default:        /* something happened - deal with it */
350                         Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
351                                 ns, 0, 0 );
352                         /* FALL THRU */
353                 }
354
355                 if ( FD_ISSET( tcps, &readfds ) ) {
356                         int s;
357                         int len = sizeof(from);
358                         long id;
359
360                         if ( (s = accept( tcps,
361                                 (struct sockaddr *) &from, &len )) == -1 )
362                         {
363                                 int err = errno;
364                                 Debug( LDAP_DEBUG_ANY,
365                                     "daemon: accept(%d) failed errno %d (%s)\n", err,
366                                     tcps, err >= 0 && err < sys_nerr ?
367                                     sys_errlist[err] : "unknown");
368                                 continue;
369                         }
370
371                         assert( !FD_ISSET( 0, &slap_daemon.sd_actives) );
372                         assert( !FD_ISSET( 0, &slap_daemon.sd_readers) );
373                         assert( !FD_ISSET( 0, &slap_daemon.sd_writers) );
374
375 #ifndef HAVE_WINSOCK
376                         /* make sure descriptor number isn't too great */
377                         if ( s >= dtblsize ) {
378                                 Debug( LDAP_DEBUG_ANY,
379                                         "daemon: %d beyond descriptor table size %d\n",
380                                         s, dtblsize, 0 );
381                                 tcp_close(s);
382                                 continue;
383                         }
384 #endif
385                    
386                         Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %d\n",
387                                 s, 0, 0 );
388
389                         len = sizeof(from);
390                         if ( getpeername( s, (struct sockaddr *) &from, &len ) == 0 ) {
391                                 client_addr = inet_ntoa( from.sin_addr );
392
393 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
394                                 hp = gethostbyaddr( (char *)
395                                     &(from.sin_addr.s_addr),
396                                     sizeof(from.sin_addr.s_addr), AF_INET );
397
398                                 if(hp) {
399                                         char *p;
400                                         client_name = hp->h_name;
401
402                                         /* normalize the domain */
403                                         for ( p = client_name; *p; p++ ) {
404                                                 *p = TOLOWER( (unsigned char) *p );
405                                         }
406
407                                 } else {
408                                         client_name = NULL;
409                                 }
410 #else
411                                 client_name = NULL;
412 #endif
413
414                         } else {
415                                 client_name = NULL;;
416                                 client_addr = NULL;
417                         }
418
419 #ifdef HAVE_TCPD
420                         if(!hosts_ctl("slapd",
421                                 client_name != NULL ? client_name : STRING_UNKNOWN,
422                                 client_addr != NULL ? client_addr : STRING_UNKNOWN,
423                                 STRING_UNKNOWN))
424                         {
425                                 /* DENY ACCESS */
426                                 Statslog( LDAP_DEBUG_ANY,
427                                  "fd=%d connection from %s (%s) denied.\n",
428                                         s,
429                                         client_name == NULL ? "unknown" : client_name,
430                                         client_addr == NULL ? "unknown" : client_addr,
431                                   0, 0 );
432
433                                 tcp_close(s);
434                                 continue;
435                         }
436 #endif /* HAVE_TCPD */
437
438                         if( (id = connection_init(s, client_name, client_addr)) < 0 ) {
439                                 Debug( LDAP_DEBUG_ANY,
440                                         "daemon: connection_init(%d, %s, %s) failed.\n",
441                                         s,
442                                         client_name == NULL ? "unknown" : client_name,
443                                         client_addr == NULL ? "unknown" : client_addr);
444                                 tcp_close(s);
445                                 continue;
446                         }
447
448                         Statslog( LDAP_DEBUG_STATS,
449                                 "daemon: conn=%d fd=%d connection from %s (%s) accepted.\n",
450                                 id, s,
451                                 client_name == NULL ? "unknown" : client_name,
452                                 client_addr == NULL ? "unknown" : client_addr,
453                                 0 );
454
455                         slapd_add( s );
456                         continue;
457                 }
458
459 #ifdef LDAP_DEBUG
460                 Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
461 #ifdef HAVE_WINSOCK
462                 for ( i = 0; i < readfds.fd_count; i++ )
463                 {
464                         Debug( LDAP_DEBUG_CONNS, " %d%s", readfds.fd_array[i], "r" );
465                 }
466                 for ( i = 0; i < writefds.fd_count; i++ )
467                 {
468                         Debug( LDAP_DEBUG_CONNS, " %d%s", writefds.fd_array[i], "w" );
469                 }
470 #else
471                 for ( i = 0; i < nfds; i++ ) {
472                         int     a, r, w;
473
474                         r = FD_ISSET( i, &readfds );
475                         w = FD_ISSET( i, &writefds );
476                         if ( i != tcps && (r || w) ) {
477                                 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
478                                     r ? "r" : "", w ? "w" : "" );
479                         }
480                 }
481 #endif
482                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
483 #endif
484
485                 /* loop through the writers */
486 #ifdef HAVE_WINSOCK
487                 for ( i = 0; i < writefds.fd_count; i++ ) {
488                         int wd = writefds.fd_array[i];
489
490                         if ( wd == tcps ) {
491                                 continue;
492                         }
493
494                         Debug( LDAP_DEBUG_CONNS,
495                                 "daemon: signalling write waiter on %d\n",
496                                 wd, 0, 0 );
497
498                         assert( FD_ISSET( wd, &slap_daemon.sd_actives) );
499
500                         slapd_clr_write( wd, 0 );
501                         if ( connection_write( wd ) < 0 ) {
502                                 FD_CLR( wd, &readfds );
503                                 slapd_close( wd );
504                         }
505                 }
506 #else
507                 for ( i = 0; i < nfds; i++ ) {
508                         if ( i == tcps ) {
509                                 continue;
510                         }
511                         if ( FD_ISSET( i, &writefds ) ) {
512                                 Debug( LDAP_DEBUG_CONNS,
513                                     "daemon: signaling write waiter on %d\n", i, 0, 0 );
514
515                                 assert( FD_ISSET( i, &slap_daemon.sd_actives) );
516
517                                 /* clear the write flag */
518                                 slapd_clr_write( i, 0 );
519                                 
520                                 if( connection_write( i ) < 0 ) { 
521                                         FD_CLR( i, &readfds );
522                                         slapd_close( i );
523                                 }
524                         }
525                 }
526 #endif
527
528 #ifdef HAVE_WINSOCK
529                 for ( i = 0; i < readfds.fd_count; i++ ) {
530                         int rd = readfds.fd_array[i];
531                         if ( rd == tcps ) {
532                                 continue;
533                         }
534                         Debug ( LDAP_DEBUG_CONNS,
535                                 "daemon: read activity on %d\n", rd, 0, 0 );
536                         assert( FD_ISSET( rd, &slap_daemon.sd_actives) );
537
538                         if ( connection_read( rd ) < 0 ) {
539                                 slapd_close( rd );
540                         }
541                 }
542 #else
543                 for ( i = 0; i < nfds; i++ ) {
544                         if ( i == tcps ) {
545                                 continue;
546                         }
547
548                         if ( FD_ISSET( i, &readfds ) ) {
549                                 Debug( LDAP_DEBUG_CONNS,
550                                     "daemon: read activity on %d\n", i, 0, 0 );
551
552                                 assert( FD_ISSET( i, &slap_daemon.sd_actives) );
553
554                                 if( connection_read( i ) < 0) {
555                                         slapd_close( i );
556                                 }
557                         }
558                 }
559 #endif
560                 ldap_pvt_thread_yield();
561         }
562
563         if( slapd_shutdown > 0 ) {
564                 Debug( LDAP_DEBUG_TRACE,
565                         "daemon: shutdown requested (%d) and initiated.\n",
566                         (int) slapd_shutdown, 0, 0 );
567
568         } else if ( slapd_shutdown < 0 ) {
569                 Debug( LDAP_DEBUG_TRACE,
570                         "daemon: abnormal condition (%d), shutdown initiated.\n",
571                         (int) slapd_shutdown, 0, 0 );
572         } else {
573                 Debug( LDAP_DEBUG_TRACE,
574                         "daemon: no active streams, shutdown initiated.\n",
575                         0, 0, 0 );
576         }
577
578         if( tcps >= 0 ) {
579                 tcp_close( tcps );
580         }
581
582         ldap_pvt_thread_mutex_lock( &active_threads_mutex );
583         Debug( LDAP_DEBUG_ANY,
584             "slapd shutdown: waiting for %d threads to terminate\n",
585             active_threads, 0, 0 );
586         while ( active_threads > 0 ) {
587                 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
588         }
589         ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
590
591         return NULL;
592 }
593
594 int slapd_daemon( int inetd, int tcps )
595 {
596         int status;
597         int *args = ch_malloc( sizeof( int[2] ) );
598         args[0] = inetd;
599         args[1] = tcps;
600
601 #define SLAPD_LISTENER_THREAD 1
602 #if SLAPD_LISTENER_THREAD
603         /* listener as a separate THREAD */
604         status = ldap_pvt_thread_create( &listener_tid,
605                 0, slapd_daemon_task, args );
606
607         if ( status != 0 ) {
608                 Debug( LDAP_DEBUG_ANY,
609                     "listener ldap_pvt_thread_create failed (%d)\n", status, 0, 0 );
610                 return -1;
611         }
612
613         /* wait for the listener thread to complete */
614         ldap_pvt_thread_join( listener_tid, (void *) NULL );
615 #else
616         /* expermimental code */
617         listener_tid = pthread_self();
618         slapd_daemon_task( args );
619 #endif
620
621         return 0;
622 }
623
624 void
625 slap_set_shutdown( int sig )
626 {
627         slapd_shutdown = sig;
628         ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
629
630         /* reinstall self */
631         (void) SIGNAL( sig, slap_set_shutdown );
632 }
633
634 void
635 slap_do_nothing( int sig )
636 {
637         /* reinstall self */
638         (void) SIGNAL( sig, slap_do_nothing );
639 }