]> git.sur5r.net Git - openldap/blob - servers/slapd/daemon.c
Updates for NT4 (MSVC5++).
[openldap] / servers / slapd / daemon.c
1 #include "portable.h"
2
3 #include <stdio.h>
4
5 #include <ac/ctype.h>
6 #include <ac/errno.h>
7 #include <ac/signal.h>
8 #include <ac/socket.h>
9 #include <ac/string.h>
10 #include <ac/time.h>
11 #include <ac/unistd.h>
12
13 #include "ldapconfig.h"
14 #include "slap.h"
15
16 #ifdef HAVE_TCPD
17 #include <tcpd.h>
18
19 int allow_severity = LOG_INFO;
20 int deny_severity = LOG_NOTICE;
21 #endif /* TCP Wrappers */
22
23 /* globals */
24 int dtblsize;
25
26 static ldap_pvt_thread_t        listener_tid;
27 static volatile sig_atomic_t slapd_shutdown = 0;
28
29 struct slap_daemon {
30         ldap_pvt_thread_mutex_t sd_mutex;
31
32         int sd_nactives;
33
34 #ifndef HAVE_WINSOCK
35         /* In winsock, accept() returns values higher than dtblsize
36                 so don't bother with this optimization */
37         int sd_nfds;
38 #endif
39
40         fd_set sd_actives;
41         fd_set sd_readers;
42         fd_set sd_writers;
43 } slap_daemon; 
44
45 /*
46  * Add a descriptor to daemon control
47  */
48 static void slapd_add(int s) {
49         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
50
51         assert( !FD_ISSET( s, &slap_daemon.sd_actives ));
52         assert( !FD_ISSET( s, &slap_daemon.sd_readers ));
53         assert( !FD_ISSET( s, &slap_daemon.sd_writers ));
54
55 #ifndef HAVE_WINSOCK
56         if (s >= slap_daemon.sd_nfds) {
57                 slap_daemon.sd_nfds = s + 1;
58         }
59 #endif
60
61         FD_SET( s, &slap_daemon.sd_actives );
62         FD_SET( s, &slap_daemon.sd_readers );
63
64         Debug( LDAP_DEBUG_CONNS, "daemon: added %d%s%s\n", s,
65             FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
66                 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
67
68         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
69 }
70
71 /*
72  * Remove the descriptor from daemon control
73  */
74 void slapd_remove(int s) {
75         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
76
77         assert( FD_ISSET( s, &slap_daemon.sd_actives ));
78
79         Debug( LDAP_DEBUG_CONNS, "daemon: removing %d%s%s\n", s,
80             FD_ISSET(s, &slap_daemon.sd_readers) ? "r" : "",
81                 FD_ISSET(s, &slap_daemon.sd_writers) ? "w" : "" );
82
83         FD_CLR( s, &slap_daemon.sd_actives );
84         FD_CLR( s, &slap_daemon.sd_readers );
85         FD_CLR( s, &slap_daemon.sd_writers );
86
87         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
88 }
89
90 void slapd_clr_write(int s, int wake) {
91         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
92
93         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
94         FD_CLR( s, &slap_daemon.sd_writers );
95
96         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
97
98         if( wake ) {
99                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
100         }
101 }
102
103 void slapd_set_write(int s, int wake) {
104         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
105
106         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
107         FD_SET( s, &slap_daemon.sd_writers );
108
109         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
110
111         if( wake ) {
112                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
113         }
114 }
115
116 void slapd_clr_read(int s, int wake) {
117         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
118
119         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
120         FD_CLR( s, &slap_daemon.sd_readers );
121
122         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
123
124         if( wake ) {
125                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
126         }
127 }
128
129 void slapd_set_read(int s, int wake) {
130         ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
131
132         assert( FD_ISSET( s, &slap_daemon.sd_actives) );
133         FD_SET( s, &slap_daemon.sd_readers );
134
135         ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
136
137         if( wake ) {
138                 ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
139         }
140 }
141
142 static void slapd_close(int s) {
143         slapd_remove(s);
144
145         Debug( LDAP_DEBUG_CONNS, "daemon: closing %d\n", s, 0, 0 );
146         tcp_close(s);
147 }
148
149 static void *
150 slapd_daemon_task(
151         void *ptr
152 )
153 {
154         struct sockaddr_in *addr = ptr;
155         int     tcps = -1;
156
157 #ifdef HAVE_SYSCONF
158         dtblsize = sysconf( _SC_OPEN_MAX );
159 #elif HAVE_GETDTABLESIZE
160         dtblsize = getdtablesize();
161 #else
162         dtblsize = FD_SETSIZE;
163 #endif
164
165 #ifdef FD_SETSIZE
166         if(dtblsize > FD_SETSIZE) {
167                 dtblsize = FD_SETSIZE;
168         }
169 #endif  /* !FD_SETSIZE */
170
171 #ifdef HAVE_WINSOCK
172         {
173                 WORD    vers = MAKEWORD( 2, 0);
174                 int     err;
175                 WSADATA wsaData;
176                 err = WSAStartup( vers, &wsaData );
177         }
178 #endif
179
180         connections_init();
181
182         ldap_pvt_thread_mutex_init( &slap_daemon.sd_mutex );
183         FD_ZERO( &slap_daemon.sd_readers );
184         FD_ZERO( &slap_daemon.sd_writers );
185
186         if( addr != NULL ) {
187                 int     tmp;
188
189                 if ( (tcps = socket( AF_INET, SOCK_STREAM, 0 )) == -1 ) {
190                         Debug( LDAP_DEBUG_ANY,
191                                 "daemon: socket() failed errno %d (%s)", errno,
192                         errno > -1 && errno < sys_nerr ? sys_errlist[errno] :
193                         "unknown", 0 );
194                         exit( 1 );
195                 }
196
197 #ifndef HAVE_WINSOCK
198                 if ( tcps >= dtblsize ) {
199                         Debug( LDAP_DEBUG_ANY,
200                                 "daemon: listener descriptor %d is too great",
201                                 tcps, dtblsize, 0 );
202                         exit( 1 );
203                 }
204 #endif
205
206                 tmp = 1;
207                 if ( setsockopt( tcps, SOL_SOCKET, SO_REUSEADDR,
208                         (char *) &tmp, sizeof(tmp) ) == -1 )
209                 {
210                         Debug( LDAP_DEBUG_ANY,
211                                 "slapd(%d): setsockopt() failed errno %d (%s)",
212                         tcps, errno,
213                                 errno > -1 && errno < sys_nerr
214                                         ? sys_errlist[errno] : "unknown" );
215
216                         errno = 0;
217                 }
218
219                 if ( bind( tcps, (struct sockaddr *) addr, sizeof(*addr) ) == -1 ) {
220                         Debug( LDAP_DEBUG_ANY, "daemon: bind(%d) failed errno %d (%s)\n",
221                         tcps, errno,
222                                 errno > -1 && errno < sys_nerr
223                                         ? sys_errlist[errno] : "unknown" );
224                         exit( 1 );
225                 }
226
227                 if ( listen( tcps, 5 ) == -1 ) {
228                         Debug( LDAP_DEBUG_ANY,
229                                 "daemon: listen(%d, 5) failed errno %d (%s)\n",
230                             tcps, errno,
231                                 errno > -1 && errno < sys_nerr
232                                         ? sys_errlist[errno] : "unknown" );
233                         exit( 1 );
234                 }
235
236                 slapd_add( tcps );
237
238         } else {
239                 if( connection_init( 0, NULL, NULL ) ) {
240                         Debug( LDAP_DEBUG_ANY,
241                                 "connection_init(%d) failed.\n",
242                                 0, 0, 0 );
243
244                         exit( 1 );
245                 }
246
247                 slapd_add( 0 );
248         }
249
250         while ( !slapd_shutdown ) {
251                 unsigned int i;
252                 int ns, nfds;
253
254                 fd_set                  readfds;
255                 fd_set                  writefds;
256
257                 struct sockaddr_in      from;
258                 struct hostent          *hp;
259                 struct timeval          zero;
260                 struct timeval          *tvp;
261
262                 char    *client_name;
263                 char    *client_addr;
264
265                 FD_ZERO( &writefds );
266                 FD_ZERO( &readfds );
267
268                 zero.tv_sec = 0;
269                 zero.tv_usec = 0;
270
271                 ldap_pvt_thread_mutex_lock( &slap_daemon.sd_mutex );
272
273 #ifdef FD_SET_MANUAL_COPY
274                 for( s = 0; s < nfds; s++ ) {
275                         if(FD_ISSET( &slap_sd_writers, s )) {
276                                 FD_SET( &writefds, s );
277                         }
278                         if(FD_ISSET( &slap_sd_writers, s )) {
279                                 FD_SET( &writefds, s );
280                         }
281                 }
282 #else
283                 memcpy( &readfds, &slap_daemon.sd_readers, sizeof(fd_set) );
284                 memcpy( &writefds, &slap_daemon.sd_writers, sizeof(fd_set) );
285 #endif
286
287                 FD_SET( tcps, &readfds );
288
289 #ifndef HAVE_WINSOCK
290                 nfds = slap_daemon.sd_nfds;
291 #else
292                 nfds = dtblsize;
293 #endif
294
295                 ldap_pvt_thread_mutex_unlock( &slap_daemon.sd_mutex );
296
297                 ldap_pvt_thread_mutex_lock( &active_threads_mutex );
298 #if defined( HAVE_YIELDING_SELECT ) || defined( NO_THREADS )
299                 tvp = NULL;
300 #else
301                 tvp = active_threads ? &zero : NULL;
302 #endif
303
304                 Debug( LDAP_DEBUG_CONNS,
305                         "daemon: select: tcps=%d active_threads=%d tvp=%s\n",
306                     tcps, active_threads,
307                         tvp == NULL ? "NULL" : "zero" );
308            
309
310                 ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
311
312                 switch(ns = select( nfds, &readfds, &writefds, 0, tvp )) {
313                 case -1:        /* failure - try again */
314                         if( errno != EINTR ) {
315                                 Debug( LDAP_DEBUG_CONNS,
316                                         "daemon: select failed (%d): %s\n",
317                                         errno,
318                                         errno >= 0 && errno < sys_nerr
319                                                 ? sys_errlist[errno] : "unknown",
320                                         0 );
321
322                                 slapd_shutdown = -1;
323                         }
324                         errno = 0;
325                         continue;
326
327                 case 0:         /* timeout - let threads run */
328                         Debug( LDAP_DEBUG_CONNS, "daemon: select timeout - yielding\n",
329                             0, 0, 0 );
330                 ldap_pvt_thread_yield();
331                         continue;
332
333                 default:        /* something happened - deal with it */
334                         Debug( LDAP_DEBUG_CONNS, "daemon: activity on %d descriptors\n",
335                                 ns, 0, 0 );
336                         /* FALL THRU */
337                 }
338
339                 if ( FD_ISSET( tcps, &readfds ) ) {
340                         int s;
341                         int len = sizeof(from);
342                         long id;
343
344                         if ( (s = accept( tcps,
345                                 (struct sockaddr *) &from, &len )) == -1 )
346                         {
347                                 Debug( LDAP_DEBUG_ANY,
348                                     "daemon: accept(%d) failed errno %d (%s)", errno,
349                                     tcps, errno >= 0 && errno < sys_nerr ?
350                                     sys_errlist[errno] : "unknown");
351                                 continue;
352                         }
353
354                         assert( !FD_ISSET( 0, &slap_daemon.sd_actives) );
355                         assert( !FD_ISSET( 0, &slap_daemon.sd_readers) );
356                         assert( !FD_ISSET( 0, &slap_daemon.sd_writers) );
357
358 #ifndef HAVE_WINSOCK
359                         /* make sure descriptor number isn't too great */
360                         if ( s >= dtblsize ) {
361                                 Debug( LDAP_DEBUG_ANY,
362                                         "daemon: %d beyond descriptor table size %d\n",
363                                         s, dtblsize, 0 );
364                                 tcp_close(s);
365                                 continue;
366                         }
367 #endif
368                    
369                         Debug( LDAP_DEBUG_CONNS, "daemon: new connection on %d\n",
370                                 s, 0, 0 );
371
372                         len = sizeof(from);
373                         if ( getpeername( s, (struct sockaddr *) &from, &len ) == 0 ) {
374                                 client_addr = inet_ntoa( from.sin_addr );
375
376 #if defined(SLAPD_RLOOKUPS) || defined(HAVE_TCPD)
377                                 hp = gethostbyaddr( (char *)
378                                     &(from.sin_addr.s_addr),
379                                     sizeof(from.sin_addr.s_addr), AF_INET );
380
381                                 if(hp) {
382                                         char *p;
383                                         client_name = hp->h_name;
384
385                                         /* normalize the domain */
386                                         for ( p = client_name; *p; p++ ) {
387                                                 *p = TOLOWER( (unsigned char) *p );
388                                         }
389
390                                 } else {
391                                         client_name = NULL;
392                                 }
393 #else
394                                 client_name = NULL;
395 #endif
396
397                         } else {
398                                 client_name = NULL;;
399                                 client_addr = NULL;
400                         }
401
402 #ifdef HAVE_TCPD
403                         if(!hosts_ctl("slapd",
404                                 client_name != NULL ? client_name : STRING_UNKNOWN,
405                                 client_addr != NULL ? client_addr : STRING_UNKNOWN,
406                                 STRING_UNKNOWN))
407                         {
408                                 /* DENY ACCESS */
409                                 Statslog( LDAP_DEBUG_ANY,
410                                  "fd=%d connection from %s (%s) denied.\n",
411                                         s,
412                                         client_name == NULL ? "unknown" : client_name,
413                                         client_addr == NULL ? "unknown" : client_addr,
414                                   0, 0 );
415
416                                 tcp_close(s);
417                                 continue;
418                         }
419 #endif /* HAVE_TCPD */
420
421                         if( (id = connection_init(s, client_name, client_addr)) < 0 ) {
422                                 Debug( LDAP_DEBUG_ANY,
423                                         "daemon: connection_init(%d, %s, %s) failed.\n",
424                                         s,
425                                         client_name == NULL ? "unknown" : client_name,
426                                         client_addr == NULL ? "unknown" : client_addr);
427                                 tcp_close(s);
428                                 continue;
429                         }
430
431                         Statslog( LDAP_DEBUG_STATS,
432                                 "daemon: conn=%d fd=%d connection from %s (%s) accepted.\n",
433                                 id, s,
434                                 client_name == NULL ? "unknown" : client_name,
435                                 client_addr == NULL ? "unknown" : client_addr,
436                                 0 );
437
438                         slapd_add( s );
439                         continue;
440                 }
441
442 #ifdef LDAP_DEBUG
443                 Debug( LDAP_DEBUG_CONNS, "daemon: activity on:", 0, 0, 0 );
444 #ifdef HAVE_WINSOCK
445                 for ( i = 0; i < readfds.fd_count; i++ )
446                 {
447                         Debug( LDAP_DEBUG_CONNS, " %d%s", readfds.fd_array[i], "r" );
448                 }
449                 for ( i = 0; i < writefds.fd_count; i++ )
450                 {
451                         Debug( LDAP_DEBUG_CONNS, " %d%s", writefds.fd_array[i], "w" );
452                 }
453 #else
454                 for ( i = 0; i < nfds; i++ ) {
455                         int     a, r, w;
456
457                         r = FD_ISSET( i, &readfds );
458                         w = FD_ISSET( i, &writefds );
459                         if ( i != tcps && (r || w) ) {
460                                 Debug( LDAP_DEBUG_CONNS, " %d%s%s", i,
461                                     r ? "r" : "", w ? "w" : "" );
462                         }
463                 }
464 #endif
465                 Debug( LDAP_DEBUG_CONNS, "\n", 0, 0, 0 );
466 #endif
467
468                 /* loop through the writers */
469 #ifdef HAVE_WINSOCK
470                 for ( i = 0; i < writefds.fd_count; i++ ) {
471                         if ( writefds.fd_array[i] == tcps ) {
472                                 continue;
473                         }
474                         Debug( LDAP_DEBUG_CONNS,
475                                 "daemon: signalling write waiter on %d\n",
476                                 writefds.fd_array[i], 0, 0 );
477                         assert( FD_ISSET( 0, &slap_daemon.sd_actives) );
478
479                         slapd_clr_write( writefds.fd_array[i], 0 );
480                         if ( connection_write( writefds.fd_array[i] ) < 0 ) {
481                                 FD_CLR( writefds.fd_array[i], &readfds );
482                                 slapd_close( writefds.fd_array[i] );
483                         }
484 #else
485                 for ( i = 0; i < nfds; i++ ) {
486                         if ( i == tcps ) {
487                                 continue;
488                         }
489                         if ( FD_ISSET( i, &writefds ) ) {
490                                 Debug( LDAP_DEBUG_CONNS,
491                                     "daemon: signaling write waiter on %d\n", i, 0, 0 );
492
493                                 assert( FD_ISSET( 0, &slap_daemon.sd_actives) );
494
495                                 /* clear the write flag */
496                                 slapd_clr_write( i, 0 );
497                                 
498                                 if( connection_write( i ) < 0 ) { 
499                                         FD_CLR( i, &readfds );
500                                         slapd_close( i );
501                                 }
502                         }
503 #endif
504
505                 }
506 #ifdef HAVE_WINSOCK
507                 for ( i = 0; i < readfds.fd_count; i++ ) {
508                         if ( readfds.fd_array[i] == tcps ) {
509                                 continue;
510                         }
511                         Debug ( LDAP_DEBUG_CONNS,
512                                 "daemon: read activity on %d\n", readfds.fd_array[i], 0, 0 );
513                         assert( FD_ISSET( readfds.fd_array[i], &slap_daemon.sd_actives) );
514
515                         if ( connection_read( readfds.fd_array[i] ) < 0 ) {
516                                 slapd_close( i );
517                         }
518                 }
519 #else
520                 for ( i = 0; i < nfds; i++ ) {
521                         if ( i == tcps ) {
522                                 continue;
523                         }
524
525                         if ( FD_ISSET( i, &readfds ) ) {
526                                 Debug( LDAP_DEBUG_CONNS,
527                                     "daemon: read activity on %d\n", i, 0, 0 );
528
529                                 assert( FD_ISSET( i, &slap_daemon.sd_actives) );
530
531                                 if( connection_read( i ) < 0) {
532                                         slapd_close( i );
533                                 }
534                         }
535                 }
536 #endif
537                 ldap_pvt_thread_yield();
538         }
539
540         if( slapd_shutdown > 0 ) {
541                 Debug( LDAP_DEBUG_TRACE,
542                         "daemon: shutdown requested and initiated.\n",
543                         0, 0, 0 );
544
545         } else if ( slapd_shutdown < 0 ) {
546                 Debug( LDAP_DEBUG_TRACE,
547                         "daemon: abnormal condition, shutdown initiated.\n",
548                         0, 0, 0 );
549         } else {
550                 Debug( LDAP_DEBUG_TRACE,
551                         "daemon: no active streams, shutdown initiated.\n",
552                         0, 0, 0 );
553         }
554
555         if( tcps >= 0 ) {
556                 tcp_close( tcps );
557         }
558
559         ldap_pvt_thread_mutex_lock( &active_threads_mutex );
560         Debug( LDAP_DEBUG_ANY,
561             "slapd shutdown: waiting for %d threads to terminate\n",
562             active_threads, 0, 0 );
563         while ( active_threads > 0 ) {
564                 ldap_pvt_thread_cond_wait(&active_threads_cond, &active_threads_mutex);
565         }
566         ldap_pvt_thread_mutex_unlock( &active_threads_mutex );
567
568         return NULL;
569 }
570
571 int slapd_daemon( struct sockaddr_in *addr )
572 {
573         int status;
574
575         status = ldap_pvt_thread_create( &listener_tid, 0,
576                  slapd_daemon_task, addr );
577
578         if ( status != 0 ) {
579                 Debug( LDAP_DEBUG_ANY,
580                     "listener ldap_pvt_thread_create failed (%d)\n", status, 0, 0 );
581                 return -1;
582         } else {
583                 /* wait for the listener thread to complete */
584                 ldap_pvt_thread_join( listener_tid, (void *) NULL );
585         }
586
587         return 0;
588 }
589
590 void
591 slap_set_shutdown( int sig )
592 {
593         slapd_shutdown = 1;
594         ldap_pvt_thread_kill( listener_tid, LDAP_SIGUSR1 );
595
596         /* reinstall self */
597         (void) SIGNAL( sig, slap_set_shutdown );
598 }
599
600 void
601 slap_do_nothing( int sig )
602 {
603         /* reinstall self */
604         (void) SIGNAL( sig, slap_do_nothing );
605 }