selftest: Remove binary mappings from the build system.
[Samba.git] / source3 / smbd / server.c
blob20aed163ba278f39e1283b0cd5bda5e43005fe7d
1 /*
2 Unix SMB/CIFS implementation.
3 Main SMB server routines
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Martin Pool 2002
6 Copyright (C) Jelmer Vernooij 2002-2003
7 Copyright (C) Volker Lendecke 1993-2007
8 Copyright (C) Jeremy Allison 1993-2007
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "system/filesys.h"
26 #include "popt_common.h"
27 #include "smbd/smbd.h"
28 #include "smbd/globals.h"
29 #include "registry/reg_init_full.h"
30 #include "libcli/auth/schannel.h"
31 #include "secrets.h"
32 #include "../lib/util/memcache.h"
33 #include "ctdbd_conn.h"
34 #include "util_cluster.h"
35 #include "printing/queue_process.h"
36 #include "rpc_server/rpc_service_setup.h"
37 #include "rpc_server/rpc_config.h"
38 #include "serverid.h"
39 #include "passdb.h"
40 #include "auth.h"
41 #include "messages.h"
42 #include "smbprofile.h"
43 #include "lib/id_cache.h"
44 #include "lib/param/param.h"
45 #include "lib/background.h"
46 #include "lib/conn_tdb.h"
47 #include "../lib/util/pidfile.h"
48 #include "lib/smbd_shim.h"
49 #include "scavenger.h"
50 #include "locking/leases_db.h"
51 #include "../../ctdb/include/ctdb_protocol.h"
53 struct smbd_open_socket;
54 struct smbd_child_pid;
56 struct smbd_parent_context {
57 bool interactive;
59 struct tevent_context *ev_ctx;
60 struct messaging_context *msg_ctx;
62 /* the list of listening sockets */
63 struct smbd_open_socket *sockets;
65 /* the list of current child processes */
66 struct smbd_child_pid *children;
67 size_t num_children;
69 struct tevent_timer *cleanup_te;
72 struct smbd_open_socket {
73 struct smbd_open_socket *prev, *next;
74 struct smbd_parent_context *parent;
75 int fd;
76 struct tevent_fd *fde;
79 struct smbd_child_pid {
80 struct smbd_child_pid *prev, *next;
81 pid_t pid;
84 extern void start_epmd(struct tevent_context *ev_ctx,
85 struct messaging_context *msg_ctx);
87 extern void start_lsasd(struct tevent_context *ev_ctx,
88 struct messaging_context *msg_ctx);
90 extern void start_fssd(struct tevent_context *ev_ctx,
91 struct messaging_context *msg_ctx);
93 #ifdef WITH_DFS
94 extern int dcelogin_atmost_once;
95 #endif /* WITH_DFS */
97 /*******************************************************************
98 What to do when smb.conf is updated.
99 ********************************************************************/
101 static void smbd_parent_conf_updated(struct messaging_context *msg,
102 void *private_data,
103 uint32_t msg_type,
104 struct server_id server_id,
105 DATA_BLOB *data)
107 struct tevent_context *ev_ctx =
108 talloc_get_type_abort(private_data, struct tevent_context);
110 DEBUG(10,("smbd_parent_conf_updated: Got message saying smb.conf was "
111 "updated. Reloading.\n"));
112 change_to_root_user();
113 reload_services(NULL, NULL, false);
114 printing_subsystem_update(ev_ctx, msg, false);
117 /*******************************************************************
118 Delete a statcache entry.
119 ********************************************************************/
121 static void smb_stat_cache_delete(struct messaging_context *msg,
122 void *private_data,
123 uint32_t msg_tnype,
124 struct server_id server_id,
125 DATA_BLOB *data)
127 const char *name = (const char *)data->data;
128 DEBUG(10,("smb_stat_cache_delete: delete name %s\n", name));
129 stat_cache_delete(name);
132 /****************************************************************************
133 Send a SIGTERM to our process group.
134 *****************************************************************************/
136 static void killkids(void)
138 if(am_parent) kill(0,SIGTERM);
141 static void msg_exit_server(struct messaging_context *msg,
142 void *private_data,
143 uint32_t msg_type,
144 struct server_id server_id,
145 DATA_BLOB *data)
147 DEBUG(3, ("got a SHUTDOWN message\n"));
148 exit_server_cleanly(NULL);
151 #ifdef DEVELOPER
152 static void msg_inject_fault(struct messaging_context *msg,
153 void *private_data,
154 uint32_t msg_type,
155 struct server_id src,
156 DATA_BLOB *data)
158 int sig;
159 struct server_id_buf tmp;
161 if (data->length != sizeof(sig)) {
162 DEBUG(0, ("Process %s sent bogus signal injection request\n",
163 server_id_str_buf(src, &tmp)));
164 return;
167 sig = *(int *)data->data;
168 if (sig == -1) {
169 exit_server("internal error injected");
170 return;
173 #if HAVE_STRSIGNAL
174 DEBUG(0, ("Process %s requested injection of signal %d (%s)\n",
175 server_id_str_buf(src, &tmp), sig, strsignal(sig)));
176 #else
177 DEBUG(0, ("Process %s requested injection of signal %d\n",
178 server_id_str_buf(src, &tmp), sig));
179 #endif
181 kill(getpid(), sig);
183 #endif /* DEVELOPER */
185 static NTSTATUS messaging_send_to_children(struct messaging_context *msg_ctx,
186 uint32_t msg_type, DATA_BLOB* data)
188 NTSTATUS status;
189 struct smbd_parent_context *parent = am_parent;
190 struct smbd_child_pid *child;
192 if (parent == NULL) {
193 return NT_STATUS_INTERNAL_ERROR;
196 for (child = parent->children; child != NULL; child = child->next) {
197 status = messaging_send(parent->msg_ctx,
198 pid_to_procid(child->pid),
199 msg_type, data);
200 if (!NT_STATUS_IS_OK(status)) {
201 return status;
204 return NT_STATUS_OK;
207 static void smb_parent_send_to_children(struct messaging_context *ctx,
208 void* data,
209 uint32_t msg_type,
210 struct server_id srv_id,
211 DATA_BLOB* msg_data)
213 messaging_send_to_children(ctx, msg_type, msg_data);
217 * Parent smbd process sets its own debug level first and then
218 * sends a message to all the smbd children to adjust their debug
219 * level to that of the parent.
222 static void smbd_msg_debug(struct messaging_context *msg_ctx,
223 void *private_data,
224 uint32_t msg_type,
225 struct server_id server_id,
226 DATA_BLOB *data)
228 debug_message(msg_ctx, private_data, MSG_DEBUG, server_id, data);
230 messaging_send_to_children(msg_ctx, MSG_DEBUG, data);
233 static void smbd_parent_id_cache_kill(struct messaging_context *msg_ctx,
234 void *private_data,
235 uint32_t msg_type,
236 struct server_id server_id,
237 DATA_BLOB* data)
239 const char *msg = (data && data->data)
240 ? (const char *)data->data : "<NULL>";
241 struct id_cache_ref id;
243 if (!id_cache_ref_parse(msg, &id)) {
244 DEBUG(0, ("Invalid ?ID: %s\n", msg));
245 return;
248 id_cache_delete_from_cache(&id);
250 messaging_send_to_children(msg_ctx, msg_type, data);
253 static void smbd_parent_id_cache_delete(struct messaging_context *ctx,
254 void* data,
255 uint32_t msg_type,
256 struct server_id srv_id,
257 DATA_BLOB* msg_data)
259 id_cache_delete_message(ctx, data, msg_type, srv_id, msg_data);
261 messaging_send_to_children(ctx, msg_type, msg_data);
264 static void smbd_parent_ctdb_reconfigured(
265 uint32_t src_vnn, uint32_t dst_vnn, uint64_t dst_srvid,
266 const uint8_t *msg, size_t msglen, void *private_data)
268 struct messaging_context *msg_ctx = talloc_get_type_abort(
269 private_data, struct messaging_context);
271 DEBUG(10, ("Got %s message\n", (dst_srvid == CTDB_SRVID_RECONFIGURE)
272 ? "cluster reconfigure" : "SAMBA_NOTIFY"));
275 * Someone from the family died, validate our locks
278 messaging_send_buf(msg_ctx, messaging_server_id(msg_ctx),
279 MSG_SMB_BRL_VALIDATE, NULL, 0);
282 struct smbd_parent_notify_state {
283 struct tevent_context *ev;
284 struct messaging_context *msg;
285 uint32_t msgtype;
286 struct notify_context *notify;
289 static int smbd_parent_notify_cleanup(void *private_data);
290 static void smbd_parent_notify_cleanup_done(struct tevent_req *req);
291 static void smbd_parent_notify_proxy_done(struct tevent_req *req);
293 static bool smbd_parent_notify_init(TALLOC_CTX *mem_ctx,
294 struct messaging_context *msg,
295 struct tevent_context *ev)
297 struct smbd_parent_notify_state *state;
298 struct tevent_req *req;
300 state = talloc(mem_ctx, struct smbd_parent_notify_state);
301 if (state == NULL) {
302 return false;
304 state->msg = msg;
305 state->ev = ev;
306 state->msgtype = MSG_SMB_NOTIFY_CLEANUP;
308 state->notify = notify_init(state, msg, ev);
309 if (state->notify == NULL) {
310 goto fail;
312 req = background_job_send(
313 state, state->ev, state->msg, &state->msgtype, 1,
314 lp_parm_int(-1, "smbd", "notify cleanup interval", 60),
315 smbd_parent_notify_cleanup, state->notify);
316 if (req == NULL) {
317 goto fail;
319 tevent_req_set_callback(req, smbd_parent_notify_cleanup_done, state);
321 if (!lp_clustering()) {
322 return true;
325 req = notify_cluster_proxy_send(state, ev, state->notify);
326 if (req == NULL) {
327 goto fail;
329 tevent_req_set_callback(req, smbd_parent_notify_proxy_done, state);
331 return true;
332 fail:
333 TALLOC_FREE(state);
334 return false;
337 static int smbd_parent_notify_cleanup(void *private_data)
339 struct notify_context *notify = talloc_get_type_abort(
340 private_data, struct notify_context);
341 notify_cleanup(notify);
342 return lp_parm_int(-1, "smbd", "notify cleanup interval", 60);
345 static void smbd_parent_notify_cleanup_done(struct tevent_req *req)
347 struct smbd_parent_notify_state *state = tevent_req_callback_data(
348 req, struct smbd_parent_notify_state);
349 NTSTATUS status;
351 status = background_job_recv(req);
352 TALLOC_FREE(req);
353 DEBUG(1, ("notify cleanup job ended with %s\n", nt_errstr(status)));
356 * Provide self-healing: Whatever the error condition was, it
357 * will have printed it into log.smbd. Just retrying and
358 * spamming log.smbd once a minute should be fine.
360 req = background_job_send(
361 state, state->ev, state->msg, &state->msgtype, 1, 60,
362 smbd_parent_notify_cleanup, state->notify);
363 if (req == NULL) {
364 DEBUG(1, ("background_job_send failed\n"));
365 return;
367 tevent_req_set_callback(req, smbd_parent_notify_cleanup_done, state);
370 static void smbd_parent_notify_proxy_done(struct tevent_req *req)
372 int ret;
374 ret = notify_cluster_proxy_recv(req);
375 TALLOC_FREE(req);
376 DEBUG(1, ("notify proxy job ended with %s\n", strerror(ret)));
379 static void add_child_pid(struct smbd_parent_context *parent,
380 pid_t pid)
382 struct smbd_child_pid *child;
384 child = talloc_zero(parent, struct smbd_child_pid);
385 if (child == NULL) {
386 DEBUG(0, ("Could not add child struct -- malloc failed\n"));
387 return;
389 child->pid = pid;
390 DLIST_ADD(parent->children, child);
391 parent->num_children += 1;
394 static void smb_tell_num_children(struct messaging_context *ctx, void *data,
395 uint32_t msg_type, struct server_id srv_id,
396 DATA_BLOB *msg_data)
398 uint8_t buf[sizeof(uint32_t)];
400 if (am_parent) {
401 SIVAL(buf, 0, am_parent->num_children);
402 messaging_send_buf(ctx, srv_id, MSG_SMB_NUM_CHILDREN,
403 buf, sizeof(buf));
409 at most every smbd:cleanuptime seconds (default 20), we scan the BRL
410 and locking database for entries to cleanup. As a side effect this
411 also cleans up dead entries in the connections database (due to the
412 traversal in message_send_all()
414 Using a timer for this prevents a flood of traversals when a large
415 number of clients disconnect at the same time (perhaps due to a
416 network outage).
419 static void cleanup_timeout_fn(struct tevent_context *event_ctx,
420 struct tevent_timer *te,
421 struct timeval now,
422 void *private_data)
424 struct smbd_parent_context *parent =
425 talloc_get_type_abort(private_data,
426 struct smbd_parent_context);
428 parent->cleanup_te = NULL;
430 DEBUG(1,("Cleaning up brl and lock database after unclean shutdown\n"));
431 message_send_all(parent->msg_ctx, MSG_SMB_UNLOCK, NULL, 0, NULL);
432 messaging_send_buf(parent->msg_ctx,
433 messaging_server_id(parent->msg_ctx),
434 MSG_SMB_BRL_VALIDATE, NULL, 0);
437 static void remove_child_pid(struct smbd_parent_context *parent,
438 pid_t pid,
439 bool unclean_shutdown)
441 struct smbd_child_pid *child;
442 struct server_id child_id;
443 int ret;
445 child_id = pid_to_procid(pid);
447 ret = messaging_cleanup(parent->msg_ctx, pid);
449 if ((ret != 0) && (ret != ENOENT)) {
450 DEBUG(10, ("%s: messaging_cleanup returned %s\n",
451 __func__, strerror(ret)));
454 smbprofile_cleanup(pid);
456 for (child = parent->children; child != NULL; child = child->next) {
457 if (child->pid == pid) {
458 struct smbd_child_pid *tmp = child;
459 DLIST_REMOVE(parent->children, child);
460 TALLOC_FREE(tmp);
461 parent->num_children -= 1;
462 break;
466 if (child == NULL) {
467 /* not all forked child processes are added to the children list */
468 DEBUG(2, ("Could not find child %d -- ignoring\n", (int)pid));
469 return;
472 if (unclean_shutdown) {
473 /* a child terminated uncleanly so tickle all
474 processes to see if they can grab any of the
475 pending locks
477 DEBUG(3,(__location__ " Unclean shutdown of pid %u\n",
478 (unsigned int)pid));
479 if (parent->cleanup_te == NULL) {
480 /* call the cleanup timer, but not too often */
481 int cleanup_time = lp_parm_int(-1, "smbd", "cleanuptime", 20);
482 parent->cleanup_te = tevent_add_timer(parent->ev_ctx,
483 parent,
484 timeval_current_ofs(cleanup_time, 0),
485 cleanup_timeout_fn,
486 parent);
487 DEBUG(1,("Scheduled cleanup of brl and lock database after unclean shutdown\n"));
491 if (!serverid_deregister(child_id)) {
492 DEBUG(1, ("Could not remove pid %d from serverid.tdb\n",
493 (int)pid));
497 /****************************************************************************
498 Have we reached the process limit ?
499 ****************************************************************************/
501 static bool allowable_number_of_smbd_processes(struct smbd_parent_context *parent)
503 int max_processes = lp_max_smbd_processes();
505 if (!max_processes)
506 return True;
508 return parent->num_children < max_processes;
511 static void smbd_sig_chld_handler(struct tevent_context *ev,
512 struct tevent_signal *se,
513 int signum,
514 int count,
515 void *siginfo,
516 void *private_data)
518 pid_t pid;
519 int status;
520 struct smbd_parent_context *parent =
521 talloc_get_type_abort(private_data,
522 struct smbd_parent_context);
524 while ((pid = sys_waitpid(-1, &status, WNOHANG)) > 0) {
525 bool unclean_shutdown = False;
527 /* If the child terminated normally, assume
528 it was an unclean shutdown unless the
529 status is 0
531 if (WIFEXITED(status)) {
532 unclean_shutdown = WEXITSTATUS(status);
534 /* If the child terminated due to a signal
535 we always assume it was unclean.
537 if (WIFSIGNALED(status)) {
538 unclean_shutdown = True;
540 remove_child_pid(parent, pid, unclean_shutdown);
544 static void smbd_setup_sig_chld_handler(struct smbd_parent_context *parent)
546 struct tevent_signal *se;
548 se = tevent_add_signal(parent->ev_ctx,
549 parent, /* mem_ctx */
550 SIGCHLD, 0,
551 smbd_sig_chld_handler,
552 parent);
553 if (!se) {
554 exit_server("failed to setup SIGCHLD handler");
558 static void smbd_open_socket_close_fn(struct tevent_context *ev,
559 struct tevent_fd *fde,
560 int fd,
561 void *private_data)
563 /* this might be the socket_wrapper swrap_close() */
564 close(fd);
567 static void smbd_accept_connection(struct tevent_context *ev,
568 struct tevent_fd *fde,
569 uint16_t flags,
570 void *private_data)
572 struct smbd_open_socket *s = talloc_get_type_abort(private_data,
573 struct smbd_open_socket);
574 struct messaging_context *msg_ctx = s->parent->msg_ctx;
575 struct sockaddr_storage addr;
576 socklen_t in_addrlen = sizeof(addr);
577 int fd;
578 pid_t pid = 0;
579 uint64_t unique_id;
581 fd = accept(s->fd, (struct sockaddr *)(void *)&addr,&in_addrlen);
582 if (fd == -1 && errno == EINTR)
583 return;
585 if (fd == -1) {
586 DEBUG(0,("accept: %s\n",
587 strerror(errno)));
588 return;
591 if (s->parent->interactive) {
592 reinit_after_fork(msg_ctx, ev, true);
593 smbd_process(ev, msg_ctx, fd, true);
594 exit_server_cleanly("end of interactive mode");
595 return;
598 if (!allowable_number_of_smbd_processes(s->parent)) {
599 close(fd);
600 return;
604 * Generate a unique id in the parent process so that we use
605 * the global random state in the parent.
607 unique_id = serverid_get_random_unique_id();
609 pid = fork();
610 if (pid == 0) {
611 NTSTATUS status = NT_STATUS_OK;
614 * Can't use TALLOC_FREE here. Nulling out the argument to it
615 * would overwrite memory we've just freed.
617 talloc_free(s->parent);
618 s = NULL;
620 set_my_unique_id(unique_id);
622 /* Stop zombies, the parent explicitly handles
623 * them, counting worker smbds. */
624 CatchChild();
626 status = smbd_reinit_after_fork(msg_ctx, ev, true);
627 if (!NT_STATUS_IS_OK(status)) {
628 if (NT_STATUS_EQUAL(status,
629 NT_STATUS_TOO_MANY_OPENED_FILES)) {
630 DEBUG(0,("child process cannot initialize "
631 "because too many files are open\n"));
632 goto exit;
634 if (lp_clustering() &&
635 NT_STATUS_EQUAL(status,
636 NT_STATUS_INTERNAL_DB_ERROR)) {
637 DEBUG(1,("child process cannot initialize "
638 "because connection to CTDB "
639 "has failed\n"));
640 goto exit;
643 DEBUG(0,("reinit_after_fork() failed\n"));
644 smb_panic("reinit_after_fork() failed");
647 smbd_process(ev, msg_ctx, fd, false);
648 exit:
649 exit_server_cleanly("end of child");
650 return;
653 if (pid < 0) {
654 DEBUG(0,("smbd_accept_connection: fork() failed: %s\n",
655 strerror(errno)));
658 /* The parent doesn't need this socket */
659 close(fd);
661 /* Sun May 6 18:56:14 2001 ackley@cs.unm.edu:
662 Clear the closed fd info out of server_fd --
663 and more importantly, out of client_fd in
664 util_sock.c, to avoid a possible
665 getpeername failure if we reopen the logs
666 and use %I in the filename.
669 if (pid != 0) {
670 add_child_pid(s->parent, pid);
673 /* Force parent to check log size after
674 * spawning child. Fix from
675 * klausr@ITAP.Physik.Uni-Stuttgart.De. The
676 * parent smbd will log to logserver.smb. It
677 * writes only two messages for each child
678 * started/finished. But each child writes,
679 * say, 50 messages also in logserver.smb,
680 * begining with the debug_count of the
681 * parent, before the child opens its own log
682 * file logserver.client. In a worst case
683 * scenario the size of logserver.smb would be
684 * checked after about 50*50=2500 messages
685 * (ca. 100kb).
686 * */
687 force_check_log_size();
690 static bool smbd_open_one_socket(struct smbd_parent_context *parent,
691 struct tevent_context *ev_ctx,
692 const struct sockaddr_storage *ifss,
693 uint16_t port)
695 struct smbd_open_socket *s;
697 s = talloc(parent, struct smbd_open_socket);
698 if (!s) {
699 return false;
702 s->parent = parent;
703 s->fd = open_socket_in(SOCK_STREAM,
704 port,
705 parent->sockets == NULL ? 0 : 2,
706 ifss,
707 true);
708 if (s->fd == -1) {
709 DEBUG(0,("smbd_open_once_socket: open_socket_in: "
710 "%s\n", strerror(errno)));
711 TALLOC_FREE(s);
713 * We ignore an error here, as we've done before
715 return true;
718 /* ready to listen */
719 set_socket_options(s->fd, "SO_KEEPALIVE");
720 set_socket_options(s->fd, lp_socket_options());
722 /* Set server socket to
723 * non-blocking for the accept. */
724 set_blocking(s->fd, False);
726 if (listen(s->fd, SMBD_LISTEN_BACKLOG) == -1) {
727 DEBUG(0,("open_sockets_smbd: listen: "
728 "%s\n", strerror(errno)));
729 close(s->fd);
730 TALLOC_FREE(s);
731 return false;
734 s->fde = tevent_add_fd(ev_ctx,
736 s->fd, TEVENT_FD_READ,
737 smbd_accept_connection,
739 if (!s->fde) {
740 DEBUG(0,("open_sockets_smbd: "
741 "tevent_add_fd: %s\n",
742 strerror(errno)));
743 close(s->fd);
744 TALLOC_FREE(s);
745 return false;
747 tevent_fd_set_close_fn(s->fde, smbd_open_socket_close_fn);
749 DLIST_ADD_END(parent->sockets, s, struct smbd_open_socket *);
751 return true;
754 /****************************************************************************
755 Open the socket communication.
756 ****************************************************************************/
758 static bool open_sockets_smbd(struct smbd_parent_context *parent,
759 struct tevent_context *ev_ctx,
760 struct messaging_context *msg_ctx,
761 const char *smb_ports)
763 int num_interfaces = iface_count();
764 int i,j;
765 const char **ports;
766 unsigned dns_port = 0;
768 #ifdef HAVE_ATEXIT
769 atexit(killkids);
770 #endif
772 /* Stop zombies */
773 smbd_setup_sig_chld_handler(parent);
775 ports = lp_smb_ports();
777 /* use a reasonable default set of ports - listing on 445 and 139 */
778 if (smb_ports) {
779 char **l;
780 l = str_list_make_v3(talloc_tos(), smb_ports, NULL);
781 ports = discard_const_p(const char *, l);
784 for (j = 0; ports && ports[j]; j++) {
785 unsigned port = atoi(ports[j]);
787 if (port == 0 || port > 0xffff) {
788 exit_server_cleanly("Invalid port in the config or on "
789 "the commandline specified!");
793 if (lp_interfaces() && lp_bind_interfaces_only()) {
794 /* We have been given an interfaces line, and been
795 told to only bind to those interfaces. Create a
796 socket per interface and bind to only these.
799 /* Now open a listen socket for each of the
800 interfaces. */
801 for(i = 0; i < num_interfaces; i++) {
802 const struct sockaddr_storage *ifss =
803 iface_n_sockaddr_storage(i);
804 if (ifss == NULL) {
805 DEBUG(0,("open_sockets_smbd: "
806 "interface %d has NULL IP address !\n",
807 i));
808 continue;
811 for (j = 0; ports && ports[j]; j++) {
812 unsigned port = atoi(ports[j]);
814 /* Keep the first port for mDNS service
815 * registration.
817 if (dns_port == 0) {
818 dns_port = port;
821 if (!smbd_open_one_socket(parent,
822 ev_ctx,
823 ifss,
824 port)) {
825 return false;
829 } else {
830 /* Just bind to 0.0.0.0 - accept connections
831 from anywhere. */
833 const char *sock_addr;
834 char *sock_tok;
835 const char *sock_ptr;
837 #if HAVE_IPV6
838 sock_addr = "::,0.0.0.0";
839 #else
840 sock_addr = "0.0.0.0";
841 #endif
843 for (sock_ptr=sock_addr;
844 next_token_talloc(talloc_tos(), &sock_ptr, &sock_tok, " \t,"); ) {
845 for (j = 0; ports && ports[j]; j++) {
846 struct sockaddr_storage ss;
847 unsigned port = atoi(ports[j]);
849 /* Keep the first port for mDNS service
850 * registration.
852 if (dns_port == 0) {
853 dns_port = port;
856 /* open an incoming socket */
857 if (!interpret_string_addr(&ss, sock_tok,
858 AI_NUMERICHOST|AI_PASSIVE)) {
859 continue;
863 * If we fail to open any sockets
864 * in this loop the parent-sockets == NULL
865 * case below will prevent us from starting.
868 (void)smbd_open_one_socket(parent,
869 ev_ctx,
870 &ss,
871 port);
876 if (parent->sockets == NULL) {
877 DEBUG(0,("open_sockets_smbd: No "
878 "sockets available to bind to.\n"));
879 return false;
882 /* Setup the main smbd so that we can get messages. Note that
883 do this after starting listening. This is needed as when in
884 clustered mode, ctdb won't allow us to start doing database
885 operations until it has gone thru a full startup, which
886 includes checking to see that smbd is listening. */
888 if (!serverid_register(messaging_server_id(msg_ctx),
889 FLAG_MSG_GENERAL|FLAG_MSG_SMBD
890 |FLAG_MSG_PRINT_GENERAL
891 |FLAG_MSG_DBWRAP)) {
892 DEBUG(0, ("open_sockets_smbd: Failed to register "
893 "myself in serverid.tdb\n"));
894 return false;
897 /* Listen to messages */
899 messaging_register(msg_ctx, NULL, MSG_SHUTDOWN, msg_exit_server);
900 messaging_register(msg_ctx, ev_ctx, MSG_SMB_CONF_UPDATED,
901 smbd_parent_conf_updated);
902 messaging_register(msg_ctx, NULL, MSG_SMB_STAT_CACHE_DELETE,
903 smb_stat_cache_delete);
904 messaging_register(msg_ctx, NULL, MSG_DEBUG, smbd_msg_debug);
905 messaging_register(msg_ctx, NULL, MSG_SMB_BRL_VALIDATE,
906 brl_revalidate);
907 messaging_register(msg_ctx, NULL, MSG_SMB_FORCE_TDIS,
908 smb_parent_send_to_children);
909 messaging_register(msg_ctx, NULL, MSG_SMB_KILL_CLIENT_IP,
910 smb_parent_send_to_children);
911 messaging_register(msg_ctx, NULL, MSG_SMB_TELL_NUM_CHILDREN,
912 smb_tell_num_children);
914 messaging_register(msg_ctx, NULL,
915 ID_CACHE_DELETE, smbd_parent_id_cache_delete);
916 messaging_register(msg_ctx, NULL,
917 ID_CACHE_KILL, smbd_parent_id_cache_kill);
919 if (lp_clustering()) {
920 struct ctdbd_connection *conn = messaging_ctdbd_connection();
922 register_with_ctdbd(conn, CTDB_SRVID_RECONFIGURE,
923 smbd_parent_ctdb_reconfigured, msg_ctx);
924 register_with_ctdbd(conn, CTDB_SRVID_SAMBA_NOTIFY,
925 smbd_parent_ctdb_reconfigured, msg_ctx);
928 #ifdef DEVELOPER
929 messaging_register(msg_ctx, NULL, MSG_SMB_INJECT_FAULT,
930 msg_inject_fault);
931 #endif
933 if (lp_multicast_dns_register() && (dns_port != 0)) {
934 #ifdef WITH_DNSSD_SUPPORT
935 smbd_setup_mdns_registration(ev_ctx,
936 parent, dns_port);
937 #endif
938 #ifdef WITH_AVAHI_SUPPORT
939 void *avahi_conn;
941 avahi_conn = avahi_start_register(ev_ctx,
942 ev_ctx,
943 dns_port);
944 if (avahi_conn == NULL) {
945 DEBUG(10, ("avahi_start_register failed\n"));
947 #endif
950 return true;
955 handle stdin becoming readable when we are in --foreground mode
957 static void smbd_stdin_handler(struct tevent_context *ev,
958 struct tevent_fd *fde,
959 uint16_t flags,
960 void *private_data)
962 char c;
963 if (read(0, &c, 1) != 1) {
964 /* we have reached EOF on stdin, which means the
965 parent has exited. Shutdown the server */
966 exit_server_cleanly("EOF on stdin");
970 struct smbd_parent_tevent_trace_state {
971 TALLOC_CTX *frame;
974 static void smbd_parent_tevent_trace_callback(enum tevent_trace_point point,
975 void *private_data)
977 struct smbd_parent_tevent_trace_state *state =
978 (struct smbd_parent_tevent_trace_state *)private_data;
980 switch (point) {
981 case TEVENT_TRACE_BEFORE_WAIT:
982 break;
983 case TEVENT_TRACE_AFTER_WAIT:
984 break;
985 case TEVENT_TRACE_BEFORE_LOOP_ONCE:
986 TALLOC_FREE(state->frame);
987 state->frame = talloc_stackframe();
988 break;
989 case TEVENT_TRACE_AFTER_LOOP_ONCE:
990 TALLOC_FREE(state->frame);
991 break;
994 errno = 0;
997 static void smbd_parent_loop(struct tevent_context *ev_ctx,
998 struct smbd_parent_context *parent)
1000 struct smbd_parent_tevent_trace_state trace_state = {
1001 .frame = NULL,
1003 int ret = 0;
1005 tevent_set_trace_callback(ev_ctx, smbd_parent_tevent_trace_callback,
1006 &trace_state);
1008 /* now accept incoming connections - forking a new process
1009 for each incoming connection */
1010 DEBUG(2,("waiting for connections\n"));
1012 ret = tevent_loop_wait(ev_ctx);
1013 if (ret != 0) {
1014 DEBUG(0, ("tevent_loop_wait failed: %d, %s, exiting\n",
1015 ret, strerror(errno)));
1018 TALLOC_FREE(trace_state.frame);
1020 /* NOTREACHED return True; */
1024 /****************************************************************************
1025 Initialise connect, service and file structs.
1026 ****************************************************************************/
1028 static bool init_structs(void )
1031 * Set the machine NETBIOS name if not already
1032 * set from the config file.
1035 if (!init_names())
1036 return False;
1038 if (!secrets_init())
1039 return False;
1041 return True;
1044 static void smbd_parent_sig_term_handler(struct tevent_context *ev,
1045 struct tevent_signal *se,
1046 int signum,
1047 int count,
1048 void *siginfo,
1049 void *private_data)
1051 exit_server_cleanly("termination signal");
1054 static void smbd_parent_sig_hup_handler(struct tevent_context *ev,
1055 struct tevent_signal *se,
1056 int signum,
1057 int count,
1058 void *siginfo,
1059 void *private_data)
1061 struct smbd_parent_context *parent =
1062 talloc_get_type_abort(private_data,
1063 struct smbd_parent_context);
1065 change_to_root_user();
1066 DEBUG(1,("parent: Reloading services after SIGHUP\n"));
1067 reload_services(NULL, NULL, false);
1069 printing_subsystem_update(parent->ev_ctx, parent->msg_ctx, true);
1072 /****************************************************************************
1073 main program.
1074 ****************************************************************************/
1076 /* Declare prototype for build_options() to avoid having to run it through
1077 mkproto.h. Mixing $(builddir) and $(srcdir) source files in the current
1078 prototype generation system is too complicated. */
1080 extern void build_options(bool screen);
1082 int main(int argc,const char *argv[])
1084 /* shall I run as a daemon */
1085 bool is_daemon = false;
1086 bool interactive = false;
1087 bool Fork = true;
1088 bool no_process_group = false;
1089 bool log_stdout = false;
1090 char *ports = NULL;
1091 char *profile_level = NULL;
1092 int opt;
1093 poptContext pc;
1094 bool print_build_options = False;
1095 enum {
1096 OPT_DAEMON = 1000,
1097 OPT_INTERACTIVE,
1098 OPT_FORK,
1099 OPT_NO_PROCESS_GROUP,
1100 OPT_LOG_STDOUT
1102 struct poptOption long_options[] = {
1103 POPT_AUTOHELP
1104 {"daemon", 'D', POPT_ARG_NONE, NULL, OPT_DAEMON, "Become a daemon (default)" },
1105 {"interactive", 'i', POPT_ARG_NONE, NULL, OPT_INTERACTIVE, "Run interactive (not a daemon)"},
1106 {"foreground", 'F', POPT_ARG_NONE, NULL, OPT_FORK, "Run daemon in foreground (for daemontools, etc.)" },
1107 {"no-process-group", '\0', POPT_ARG_NONE, NULL, OPT_NO_PROCESS_GROUP, "Don't create a new process group" },
1108 {"log-stdout", 'S', POPT_ARG_NONE, NULL, OPT_LOG_STDOUT, "Log to stdout" },
1109 {"build-options", 'b', POPT_ARG_NONE, NULL, 'b', "Print build options" },
1110 {"port", 'p', POPT_ARG_STRING, &ports, 0, "Listen on the specified ports"},
1111 {"profiling-level", 'P', POPT_ARG_STRING, &profile_level, 0, "Set profiling level","PROFILE_LEVEL"},
1112 POPT_COMMON_SAMBA
1113 POPT_TABLEEND
1115 struct smbd_parent_context *parent = NULL;
1116 TALLOC_CTX *frame;
1117 NTSTATUS status;
1118 struct tevent_context *ev_ctx;
1119 struct messaging_context *msg_ctx;
1120 struct server_id server_id;
1121 struct tevent_signal *se;
1122 int profiling_level;
1123 char *np_dir = NULL;
1124 static const struct smbd_shim smbd_shim_fns =
1126 .cancel_pending_lock_requests_by_fid = smbd_cancel_pending_lock_requests_by_fid,
1127 .send_stat_cache_delete_message = smbd_send_stat_cache_delete_message,
1128 .change_to_root_user = smbd_change_to_root_user,
1129 .become_authenticated_pipe_user = smbd_become_authenticated_pipe_user,
1130 .unbecome_authenticated_pipe_user = smbd_unbecome_authenticated_pipe_user,
1132 .contend_level2_oplocks_begin = smbd_contend_level2_oplocks_begin,
1133 .contend_level2_oplocks_end = smbd_contend_level2_oplocks_end,
1135 .become_root = smbd_become_root,
1136 .unbecome_root = smbd_unbecome_root,
1138 .exit_server = smbd_exit_server,
1139 .exit_server_cleanly = smbd_exit_server_cleanly,
1143 * Do this before any other talloc operation
1145 talloc_enable_null_tracking();
1146 frame = talloc_stackframe();
1148 setup_logging(argv[0], DEBUG_DEFAULT_STDOUT);
1150 smb_init_locale();
1152 set_smbd_shim(&smbd_shim_fns);
1154 smbd_init_globals();
1156 TimeInit();
1158 #ifdef HAVE_SET_AUTH_PARAMETERS
1159 set_auth_parameters(argc,argv);
1160 #endif
1162 pc = poptGetContext("smbd", argc, argv, long_options, 0);
1163 while((opt = poptGetNextOpt(pc)) != -1) {
1164 switch (opt) {
1165 case OPT_DAEMON:
1166 is_daemon = true;
1167 break;
1168 case OPT_INTERACTIVE:
1169 interactive = true;
1170 break;
1171 case OPT_FORK:
1172 Fork = false;
1173 break;
1174 case OPT_NO_PROCESS_GROUP:
1175 no_process_group = true;
1176 break;
1177 case OPT_LOG_STDOUT:
1178 log_stdout = true;
1179 break;
1180 case 'b':
1181 print_build_options = True;
1182 break;
1183 default:
1184 d_fprintf(stderr, "\nInvalid option %s: %s\n\n",
1185 poptBadOption(pc, 0), poptStrerror(opt));
1186 poptPrintUsage(pc, stderr, 0);
1187 exit(1);
1190 poptFreeContext(pc);
1192 if (interactive) {
1193 Fork = False;
1194 log_stdout = True;
1197 if (log_stdout) {
1198 setup_logging(argv[0], DEBUG_STDOUT);
1199 } else {
1200 setup_logging(argv[0], DEBUG_FILE);
1203 if (print_build_options) {
1204 build_options(True); /* Display output to screen as well as debug */
1205 exit(0);
1208 #ifdef HAVE_SETLUID
1209 /* needed for SecureWare on SCO */
1210 setluid(0);
1211 #endif
1213 set_remote_machine_name("smbd", False);
1215 if (interactive && (DEBUGLEVEL >= 9)) {
1216 talloc_enable_leak_report();
1219 if (log_stdout && Fork) {
1220 DEBUG(0,("ERROR: Can't log to stdout (-S) unless daemon is in foreground (-F) or interactive (-i)\n"));
1221 exit(1);
1224 /* we want to re-seed early to prevent time delays causing
1225 client problems at a later date. (tridge) */
1226 generate_random_buffer(NULL, 0);
1228 /* get initial effective uid and gid */
1229 sec_init();
1231 /* make absolutely sure we run as root - to handle cases where people
1232 are crazy enough to have it setuid */
1233 gain_root_privilege();
1234 gain_root_group_privilege();
1236 fault_setup();
1237 dump_core_setup("smbd", lp_logfile(talloc_tos()));
1239 /* we are never interested in SIGPIPE */
1240 BlockSignals(True,SIGPIPE);
1242 #if defined(SIGFPE)
1243 /* we are never interested in SIGFPE */
1244 BlockSignals(True,SIGFPE);
1245 #endif
1247 #if defined(SIGUSR2)
1248 /* We are no longer interested in USR2 */
1249 BlockSignals(True,SIGUSR2);
1250 #endif
1252 /* POSIX demands that signals are inherited. If the invoking process has
1253 * these signals masked, we will have problems, as we won't recieve them. */
1254 BlockSignals(False, SIGHUP);
1255 BlockSignals(False, SIGUSR1);
1256 BlockSignals(False, SIGTERM);
1258 /* Ensure we leave no zombies until we
1259 * correctly set up child handling below. */
1261 CatchChild();
1263 /* we want total control over the permissions on created files,
1264 so set our umask to 0 */
1265 umask(0);
1267 reopen_logs();
1269 DEBUG(0,("smbd version %s started.\n", samba_version_string()));
1270 DEBUGADD(0,("%s\n", COPYRIGHT_STARTUP_MESSAGE));
1272 DEBUG(2,("uid=%d gid=%d euid=%d egid=%d\n",
1273 (int)getuid(),(int)getgid(),(int)geteuid(),(int)getegid()));
1275 /* Output the build options to the debug log */
1276 build_options(False);
1278 if (sizeof(uint16_t) < 2 || sizeof(uint32_t) < 4) {
1279 DEBUG(0,("ERROR: Samba is not configured correctly for the word size on your machine\n"));
1280 exit(1);
1283 if (!lp_load_initial_only(get_dyn_CONFIGFILE())) {
1284 DEBUG(0, ("error opening config file '%s'\n", get_dyn_CONFIGFILE()));
1285 exit(1);
1288 if (!cluster_probe_ok()) {
1289 exit(1);
1292 /* Init the security context and global current_user */
1293 init_sec_ctx();
1296 * Initialize the event context. The event context needs to be
1297 * initialized before the messaging context, cause the messaging
1298 * context holds an event context.
1299 * FIXME: This should be s3_tevent_context_init()
1301 ev_ctx = server_event_context();
1302 if (ev_ctx == NULL) {
1303 exit(1);
1307 * Init the messaging context
1308 * FIXME: This should only call messaging_init()
1310 msg_ctx = server_messaging_context();
1311 if (msg_ctx == NULL) {
1312 exit(1);
1316 * Reloading of the printers will not work here as we don't have a
1317 * server info and rpc services set up. It will be called later.
1319 if (!reload_services(NULL, NULL, false)) {
1320 exit(1);
1323 if (lp_server_role() == ROLE_ACTIVE_DIRECTORY_DC
1324 && !lp_parm_bool(-1, "server role check", "inhibit", false)) {
1325 DEBUG(0, ("server role = 'active directory domain controller' not compatible with running smbd standalone. \n"));
1326 DEBUGADD(0, ("You should start 'samba' instead, and it will control starting smbd if required\n"));
1327 exit(1);
1330 /* ...NOTE... Log files are working from this point! */
1332 DEBUG(3,("loaded services\n"));
1334 init_structs();
1336 if (!profile_setup(msg_ctx, False)) {
1337 DEBUG(0,("ERROR: failed to setup profiling\n"));
1338 return -1;
1341 if (profile_level != NULL) {
1342 profiling_level = atoi(profile_level);
1343 } else {
1344 profiling_level = lp_smbd_profiling_level();
1346 set_profile_level(profiling_level, messaging_server_id(msg_ctx));
1348 if (!is_daemon && !is_a_socket(0)) {
1349 if (!interactive) {
1350 DEBUG(3, ("Standard input is not a socket, "
1351 "assuming -D option\n"));
1355 * Setting is_daemon here prevents us from eventually calling
1356 * the open_sockets_inetd()
1359 is_daemon = True;
1362 if (is_daemon && !interactive) {
1363 DEBUG(3, ("Becoming a daemon.\n"));
1364 become_daemon(Fork, no_process_group, log_stdout);
1367 set_my_unique_id(serverid_get_random_unique_id());
1369 #if HAVE_SETPGID
1371 * If we're interactive we want to set our own process group for
1372 * signal management.
1374 if (interactive && !no_process_group)
1375 setpgid( (pid_t)0, (pid_t)0);
1376 #endif
1378 if (!directory_exist(lp_lock_directory()))
1379 mkdir(lp_lock_directory(), 0755);
1381 if (!directory_exist(lp_pid_directory()))
1382 mkdir(lp_pid_directory(), 0755);
1384 if (is_daemon)
1385 pidfile_create(lp_pid_directory(), "smbd");
1387 status = reinit_after_fork(msg_ctx,
1388 ev_ctx,
1389 false);
1390 if (!NT_STATUS_IS_OK(status)) {
1391 exit_daemon("reinit_after_fork() failed", map_errno_from_nt_status(status));
1394 if (!interactive) {
1396 * Do not initialize the parent-child-pipe before becoming a
1397 * daemon: this is used to detect a died parent in the child
1398 * process.
1400 status = init_before_fork();
1401 if (!NT_STATUS_IS_OK(status)) {
1402 exit_daemon(nt_errstr(status), map_errno_from_nt_status(status));
1406 parent = talloc_zero(ev_ctx, struct smbd_parent_context);
1407 if (!parent) {
1408 exit_server("talloc(struct smbd_parent_context) failed");
1410 parent->interactive = interactive;
1411 parent->ev_ctx = ev_ctx;
1412 parent->msg_ctx = msg_ctx;
1413 am_parent = parent;
1415 se = tevent_add_signal(parent->ev_ctx,
1416 parent,
1417 SIGTERM, 0,
1418 smbd_parent_sig_term_handler,
1419 parent);
1420 if (!se) {
1421 exit_server("failed to setup SIGTERM handler");
1423 se = tevent_add_signal(parent->ev_ctx,
1424 parent,
1425 SIGHUP, 0,
1426 smbd_parent_sig_hup_handler,
1427 parent);
1428 if (!se) {
1429 exit_server("failed to setup SIGHUP handler");
1432 /* Setup all the TDB's - including CLEAR_IF_FIRST tdb's. */
1434 if (smbd_memcache() == NULL) {
1435 exit_daemon("no memcache available", EACCES);
1438 memcache_set_global(smbd_memcache());
1440 /* Initialise the password backed before the global_sam_sid
1441 to ensure that we fetch from ldap before we make a domain sid up */
1443 if(!initialize_password_db(false, ev_ctx))
1444 exit(1);
1446 if (!secrets_init()) {
1447 exit_daemon("smbd can not open secrets.tdb", EACCES);
1450 if (lp_server_role() == ROLE_DOMAIN_BDC || lp_server_role() == ROLE_DOMAIN_PDC) {
1451 struct loadparm_context *lp_ctx = loadparm_init_s3(NULL, loadparm_s3_helpers());
1452 if (!open_schannel_session_store(NULL, lp_ctx)) {
1453 exit_daemon("ERROR: Samba cannot open schannel store for secured NETLOGON operations.", EACCES);
1455 TALLOC_FREE(lp_ctx);
1458 if(!get_global_sam_sid()) {
1459 exit_daemon("Samba cannot create a SAM SID", EACCES);
1462 server_id = messaging_server_id(msg_ctx);
1463 status = smbXsrv_version_global_init(&server_id);
1464 if (!NT_STATUS_IS_OK(status)) {
1465 exit_daemon("Samba cannot init server context", EACCES);
1468 status = smbXsrv_session_global_init();
1469 if (!NT_STATUS_IS_OK(status)) {
1470 exit_daemon("Samba cannot init session context", EACCES);
1473 status = smbXsrv_tcon_global_init();
1474 if (!NT_STATUS_IS_OK(status)) {
1475 exit_daemon("Samba cannot init tcon context", EACCES);
1478 if (!locking_init())
1479 exit_daemon("Samba cannot init locking", EACCES);
1481 if (!leases_db_init(false)) {
1482 exit_daemon("Samba cannot init leases", EACCES);
1485 if (!smbd_parent_notify_init(NULL, msg_ctx, ev_ctx)) {
1486 exit_daemon("Samba cannot init notification", EACCES);
1489 if (!messaging_parent_dgm_cleanup_init(msg_ctx)) {
1490 exit(1);
1493 if (!smbd_scavenger_init(NULL, msg_ctx, ev_ctx)) {
1494 exit_daemon("Samba cannot init scavenging", EACCES);
1497 if (!serverid_parent_init(ev_ctx)) {
1498 exit_daemon("Samba cannot init server id", EACCES);
1501 if (!W_ERROR_IS_OK(registry_init_full()))
1502 exit_daemon("Samba cannot init registry", EACCES);
1504 /* Open the share_info.tdb here, so we don't have to open
1505 after the fork on every single connection. This is a small
1506 performance improvment and reduces the total number of system
1507 fds used. */
1508 if (!share_info_db_init()) {
1509 exit_daemon("ERROR: failed to load share info db.", EACCES);
1512 status = init_system_session_info();
1513 if (!NT_STATUS_IS_OK(status)) {
1514 DEBUG(1, ("ERROR: failed to setup system user info: %s.\n",
1515 nt_errstr(status)));
1516 return -1;
1519 if (!init_guest_info()) {
1520 DEBUG(0,("ERROR: failed to setup guest info.\n"));
1521 return -1;
1524 if (!file_init_global()) {
1525 DEBUG(0, ("ERROR: file_init_global() failed\n"));
1526 return -1;
1528 status = smbXsrv_open_global_init();
1529 if (!NT_STATUS_IS_OK(status)) {
1530 exit_daemon("Samba cannot init global open", map_errno_from_nt_status(status));
1533 /* This MUST be done before start_epmd() because otherwise
1534 * start_epmd() forks and races against dcesrv_ep_setup() to
1535 * call directory_create_or_exist() */
1536 if (!directory_create_or_exist(lp_ncalrpc_dir(), 0755)) {
1537 DEBUG(0, ("Failed to create pipe directory %s - %s\n",
1538 lp_ncalrpc_dir(), strerror(errno)));
1539 return -1;
1542 np_dir = talloc_asprintf(talloc_tos(), "%s/np", lp_ncalrpc_dir());
1543 if (!np_dir) {
1544 DEBUG(0, ("%s: Out of memory\n", __location__));
1545 return -1;
1548 if (!directory_create_or_exist_strict(np_dir, geteuid(), 0700)) {
1549 DEBUG(0, ("Failed to create pipe directory %s - %s\n",
1550 np_dir, strerror(errno)));
1551 return -1;
1554 if (is_daemon && !interactive) {
1555 if (rpc_epmapper_daemon() == RPC_DAEMON_FORK) {
1556 start_epmd(ev_ctx, msg_ctx);
1560 if (!dcesrv_ep_setup(ev_ctx, msg_ctx)) {
1561 exit_daemon("Samba cannot setup ep pipe", EACCES);
1564 if (is_daemon && !interactive) {
1565 daemon_ready("smbd");
1568 /* only start other daemons if we are running as a daemon
1569 * -- bad things will happen if smbd is launched via inetd
1570 * and we fork a copy of ourselves here */
1571 if (is_daemon && !interactive) {
1573 if (rpc_lsasd_daemon() == RPC_DAEMON_FORK) {
1574 start_lsasd(ev_ctx, msg_ctx);
1577 if (rpc_fss_daemon() == RPC_DAEMON_FORK) {
1578 start_fssd(ev_ctx, msg_ctx);
1581 if (!lp__disable_spoolss() &&
1582 (rpc_spoolss_daemon() != RPC_DAEMON_DISABLED)) {
1583 bool bgq = lp_parm_bool(-1, "smbd", "backgroundqueue", true);
1585 if (!printing_subsystem_init(ev_ctx, msg_ctx, true, bgq)) {
1586 exit_daemon("Samba failed to init printing subsystem", EACCES);
1589 } else if (!lp__disable_spoolss() &&
1590 (rpc_spoolss_daemon() != RPC_DAEMON_DISABLED)) {
1591 if (!printing_subsystem_init(ev_ctx, msg_ctx, false, false)) {
1592 exit(1);
1596 if (!is_daemon) {
1597 int sock;
1599 /* inetd mode */
1600 TALLOC_FREE(frame);
1602 /* Started from inetd. fd 0 is the socket. */
1603 /* We will abort gracefully when the client or remote system
1604 goes away */
1605 sock = dup(0);
1607 /* close stdin, stdout (if not logging to it), but not stderr */
1608 close_low_fds(true, !debug_get_output_is_stdout(), false);
1610 #ifdef HAVE_ATEXIT
1611 atexit(killkids);
1612 #endif
1614 /* Stop zombies */
1615 smbd_setup_sig_chld_handler(parent);
1617 smbd_process(ev_ctx, msg_ctx, sock, true);
1619 exit_server_cleanly(NULL);
1620 return(0);
1623 if (!open_sockets_smbd(parent, ev_ctx, msg_ctx, ports))
1624 exit_server("open_sockets_smbd() failed");
1626 /* do a printer update now that all messaging has been set up,
1627 * before we allow clients to start connecting */
1628 if (!lp__disable_spoolss() &&
1629 (rpc_spoolss_daemon() != RPC_DAEMON_DISABLED)) {
1630 printing_subsystem_update(ev_ctx, msg_ctx, false);
1633 TALLOC_FREE(frame);
1634 /* make sure we always have a valid stackframe */
1635 frame = talloc_stackframe();
1637 if (!Fork) {
1638 /* if we are running in the foreground then look for
1639 EOF on stdin, and exit if it happens. This allows
1640 us to die if the parent process dies
1641 Only do this on a pipe or socket, no other device.
1643 struct stat st;
1644 if (fstat(0, &st) != 0) {
1645 return false;
1647 if (S_ISFIFO(st.st_mode) || S_ISSOCK(st.st_mode)) {
1648 tevent_add_fd(ev_ctx,
1649 parent,
1651 TEVENT_FD_READ,
1652 smbd_stdin_handler,
1653 NULL);
1657 smbd_parent_loop(ev_ctx, parent);
1659 exit_server_cleanly(NULL);
1660 TALLOC_FREE(frame);
1661 return(0);