s3/s4: merge msleep and smb_msleep
[Samba.git] / source3 / smbd / server.c
blob83d91682a8e8467ab499c61ebcb8f359dbd30dee
1 /*
2 Unix SMB/CIFS implementation.
3 Main SMB server routines
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Martin Pool 2002
6 Copyright (C) Jelmer Vernooij 2002-2003
7 Copyright (C) Volker Lendecke 1993-2007
8 Copyright (C) Jeremy Allison 1993-2007
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "popt_common.h"
26 #include "smbd/globals.h"
27 #include "librpc/gen_ndr/messaging.h"
28 #include "registry.h"
29 #include "libcli/auth/schannel.h"
30 #include "secrets.h"
31 #include "memcache.h"
33 static_decl_rpc;
35 #ifdef WITH_DFS
36 extern int dcelogin_atmost_once;
37 #endif /* WITH_DFS */
39 int smbd_server_fd(void)
41 return server_fd;
44 static void smbd_set_server_fd(int fd)
46 server_fd = fd;
49 int get_client_fd(void)
51 return server_fd;
54 struct event_context *smbd_event_context(void)
56 return server_event_context();
59 /*******************************************************************
60 What to do when smb.conf is updated.
61 ********************************************************************/
63 static void smb_conf_updated(struct messaging_context *msg,
64 void *private_data,
65 uint32_t msg_type,
66 struct server_id server_id,
67 DATA_BLOB *data)
69 DEBUG(10,("smb_conf_updated: Got message saying smb.conf was "
70 "updated. Reloading.\n"));
71 change_to_root_user();
72 reload_services(False);
76 /*******************************************************************
77 Delete a statcache entry.
78 ********************************************************************/
80 static void smb_stat_cache_delete(struct messaging_context *msg,
81 void *private_data,
82 uint32_t msg_tnype,
83 struct server_id server_id,
84 DATA_BLOB *data)
86 const char *name = (const char *)data->data;
87 DEBUG(10,("smb_stat_cache_delete: delete name %s\n", name));
88 stat_cache_delete(name);
91 /****************************************************************************
92 Send a SIGTERM to our process group.
93 *****************************************************************************/
95 static void killkids(void)
97 if(am_parent) kill(0,SIGTERM);
100 /****************************************************************************
101 Process a sam sync message - not sure whether to do this here or
102 somewhere else.
103 ****************************************************************************/
105 static void msg_sam_sync(struct messaging_context *msg,
106 void *private_data,
107 uint32_t msg_type,
108 struct server_id server_id,
109 DATA_BLOB *data)
111 DEBUG(10, ("** sam sync message received, ignoring\n"));
114 static void msg_exit_server(struct messaging_context *msg,
115 void *private_data,
116 uint32_t msg_type,
117 struct server_id server_id,
118 DATA_BLOB *data)
120 DEBUG(3, ("got a SHUTDOWN message\n"));
121 exit_server_cleanly(NULL);
124 #ifdef DEVELOPER
125 static void msg_inject_fault(struct messaging_context *msg,
126 void *private_data,
127 uint32_t msg_type,
128 struct server_id src,
129 DATA_BLOB *data)
131 int sig;
133 if (data->length != sizeof(sig)) {
134 DEBUG(0, ("Process %s sent bogus signal injection request\n",
135 procid_str_static(&src)));
136 return;
139 sig = *(int *)data->data;
140 if (sig == -1) {
141 exit_server("internal error injected");
142 return;
145 #if HAVE_STRSIGNAL
146 DEBUG(0, ("Process %s requested injection of signal %d (%s)\n",
147 procid_str_static(&src), sig, strsignal(sig)));
148 #else
149 DEBUG(0, ("Process %s requested injection of signal %d\n",
150 procid_str_static(&src), sig));
151 #endif
153 kill(sys_getpid(), sig);
155 #endif /* DEVELOPER */
158 * Parent smbd process sets its own debug level first and then
159 * sends a message to all the smbd children to adjust their debug
160 * level to that of the parent.
163 static void smbd_msg_debug(struct messaging_context *msg_ctx,
164 void *private_data,
165 uint32_t msg_type,
166 struct server_id server_id,
167 DATA_BLOB *data)
169 struct child_pid *child;
171 debug_message(msg_ctx, private_data, MSG_DEBUG, server_id, data);
173 for (child = children; child != NULL; child = child->next) {
174 messaging_send_buf(msg_ctx, pid_to_procid(child->pid),
175 MSG_DEBUG,
176 data->data,
177 strlen((char *) data->data) + 1);
181 static void add_child_pid(pid_t pid)
183 struct child_pid *child;
185 child = SMB_MALLOC_P(struct child_pid);
186 if (child == NULL) {
187 DEBUG(0, ("Could not add child struct -- malloc failed\n"));
188 return;
190 child->pid = pid;
191 DLIST_ADD(children, child);
192 num_children += 1;
196 at most every smbd:cleanuptime seconds (default 20), we scan the BRL
197 and locking database for entries to cleanup. As a side effect this
198 also cleans up dead entries in the connections database (due to the
199 traversal in message_send_all()
201 Using a timer for this prevents a flood of traversals when a large
202 number of clients disconnect at the same time (perhaps due to a
203 network outage).
206 static void cleanup_timeout_fn(struct event_context *event_ctx,
207 struct timed_event *te,
208 struct timeval now,
209 void *private_data)
211 struct timed_event **cleanup_te = (struct timed_event **)private_data;
213 DEBUG(1,("Cleaning up brl and lock database after unclean shutdown\n"));
214 message_send_all(smbd_messaging_context(), MSG_SMB_UNLOCK, NULL, 0, NULL);
215 messaging_send_buf(smbd_messaging_context(), procid_self(),
216 MSG_SMB_BRL_VALIDATE, NULL, 0);
217 /* mark the cleanup as having been done */
218 (*cleanup_te) = NULL;
221 static void remove_child_pid(pid_t pid, bool unclean_shutdown)
223 struct child_pid *child;
224 static struct timed_event *cleanup_te;
225 struct server_id child_id;
227 if (unclean_shutdown) {
228 /* a child terminated uncleanly so tickle all
229 processes to see if they can grab any of the
230 pending locks
232 DEBUG(3,(__location__ " Unclean shutdown of pid %u\n",
233 (unsigned int)pid));
234 if (!cleanup_te) {
235 /* call the cleanup timer, but not too often */
236 int cleanup_time = lp_parm_int(-1, "smbd", "cleanuptime", 20);
237 cleanup_te = event_add_timed(smbd_event_context(), NULL,
238 timeval_current_ofs(cleanup_time, 0),
239 cleanup_timeout_fn,
240 &cleanup_te);
241 DEBUG(1,("Scheduled cleanup of brl and lock database after unclean shutdown\n"));
245 child_id = procid_self(); /* Just initialize pid and potentially vnn */
246 child_id.pid = pid;
248 if (!serverid_deregister(child_id)) {
249 DEBUG(1, ("Could not remove pid %d from serverid.tdb\n",
250 (int)pid));
253 for (child = children; child != NULL; child = child->next) {
254 if (child->pid == pid) {
255 struct child_pid *tmp = child;
256 DLIST_REMOVE(children, child);
257 SAFE_FREE(tmp);
258 num_children -= 1;
259 return;
263 DEBUG(0, ("Could not find child %d -- ignoring\n", (int)pid));
266 /****************************************************************************
267 Have we reached the process limit ?
268 ****************************************************************************/
270 static bool allowable_number_of_smbd_processes(void)
272 int max_processes = lp_max_smbd_processes();
274 if (!max_processes)
275 return True;
277 return num_children < max_processes;
280 static void smbd_sig_chld_handler(struct tevent_context *ev,
281 struct tevent_signal *se,
282 int signum,
283 int count,
284 void *siginfo,
285 void *private_data)
287 pid_t pid;
288 int status;
290 while ((pid = sys_waitpid(-1, &status, WNOHANG)) > 0) {
291 bool unclean_shutdown = False;
293 /* If the child terminated normally, assume
294 it was an unclean shutdown unless the
295 status is 0
297 if (WIFEXITED(status)) {
298 unclean_shutdown = WEXITSTATUS(status);
300 /* If the child terminated due to a signal
301 we always assume it was unclean.
303 if (WIFSIGNALED(status)) {
304 unclean_shutdown = True;
306 remove_child_pid(pid, unclean_shutdown);
310 static void smbd_setup_sig_chld_handler(void)
312 struct tevent_signal *se;
314 se = tevent_add_signal(smbd_event_context(),
315 smbd_event_context(),
316 SIGCHLD, 0,
317 smbd_sig_chld_handler,
318 NULL);
319 if (!se) {
320 exit_server("failed to setup SIGCHLD handler");
324 struct smbd_open_socket;
326 struct smbd_parent_context {
327 bool interactive;
329 /* the list of listening sockets */
330 struct smbd_open_socket *sockets;
333 struct smbd_open_socket {
334 struct smbd_open_socket *prev, *next;
335 struct smbd_parent_context *parent;
336 int fd;
337 struct tevent_fd *fde;
340 static void smbd_open_socket_close_fn(struct tevent_context *ev,
341 struct tevent_fd *fde,
342 int fd,
343 void *private_data)
345 /* this might be the socket_wrapper swrap_close() */
346 close(fd);
349 static void smbd_accept_connection(struct tevent_context *ev,
350 struct tevent_fd *fde,
351 uint16_t flags,
352 void *private_data)
354 struct smbd_open_socket *s = talloc_get_type_abort(private_data,
355 struct smbd_open_socket);
356 struct sockaddr_storage addr;
357 socklen_t in_addrlen = sizeof(addr);
358 pid_t pid = 0;
359 uint64_t unique_id;
361 smbd_set_server_fd(accept(s->fd, (struct sockaddr *)(void *)&addr,&in_addrlen));
363 if (smbd_server_fd() == -1 && errno == EINTR)
364 return;
366 if (smbd_server_fd() == -1) {
367 DEBUG(0,("open_sockets_smbd: accept: %s\n",
368 strerror(errno)));
369 return;
372 if (s->parent->interactive) {
373 smbd_process();
374 exit_server_cleanly("end of interactive mode");
375 return;
378 if (!allowable_number_of_smbd_processes()) {
379 close(smbd_server_fd());
380 smbd_set_server_fd(-1);
381 return;
385 * Generate a unique id in the parent process so that we use
386 * the global random state in the parent.
388 generate_random_buffer((uint8_t *)&unique_id, sizeof(unique_id));
390 pid = sys_fork();
391 if (pid == 0) {
392 NTSTATUS status = NT_STATUS_OK;
394 /* Child code ... */
395 am_parent = 0;
397 set_my_unique_id(unique_id);
399 /* Stop zombies, the parent explicitly handles
400 * them, counting worker smbds. */
401 CatchChild();
403 /* close our standard file
404 descriptors */
405 close_low_fds(False);
408 * Can't use TALLOC_FREE here. Nulling out the argument to it
409 * would overwrite memory we've just freed.
411 talloc_free(s->parent);
412 s = NULL;
414 status = reinit_after_fork(smbd_messaging_context(),
415 smbd_event_context(), procid_self(),
416 true);
417 if (!NT_STATUS_IS_OK(status)) {
418 if (NT_STATUS_EQUAL(status,
419 NT_STATUS_TOO_MANY_OPENED_FILES)) {
420 DEBUG(0,("child process cannot initialize "
421 "because too many files are open\n"));
422 goto exit;
424 DEBUG(0,("reinit_after_fork() failed\n"));
425 smb_panic("reinit_after_fork() failed");
428 smbd_setup_sig_term_handler();
429 smbd_setup_sig_hup_handler();
431 if (!serverid_register(procid_self(),
432 FLAG_MSG_GENERAL|FLAG_MSG_SMBD
433 |FLAG_MSG_DBWRAP
434 |FLAG_MSG_PRINT_GENERAL)) {
435 exit_server_cleanly("Could not register myself in "
436 "serverid.tdb");
439 smbd_process();
440 exit:
441 exit_server_cleanly("end of child");
442 return;
443 } else if (pid < 0) {
444 DEBUG(0,("smbd_accept_connection: sys_fork() failed: %s\n",
445 strerror(errno)));
448 /* The parent doesn't need this socket */
449 close(smbd_server_fd());
451 /* Sun May 6 18:56:14 2001 ackley@cs.unm.edu:
452 Clear the closed fd info out of server_fd --
453 and more importantly, out of client_fd in
454 util_sock.c, to avoid a possible
455 getpeername failure if we reopen the logs
456 and use %I in the filename.
459 smbd_set_server_fd(-1);
461 if (pid != 0) {
462 add_child_pid(pid);
465 /* Force parent to check log size after
466 * spawning child. Fix from
467 * klausr@ITAP.Physik.Uni-Stuttgart.De. The
468 * parent smbd will log to logserver.smb. It
469 * writes only two messages for each child
470 * started/finished. But each child writes,
471 * say, 50 messages also in logserver.smb,
472 * begining with the debug_count of the
473 * parent, before the child opens its own log
474 * file logserver.client. In a worst case
475 * scenario the size of logserver.smb would be
476 * checked after about 50*50=2500 messages
477 * (ca. 100kb).
478 * */
479 force_check_log_size();
482 static bool smbd_open_one_socket(struct smbd_parent_context *parent,
483 const struct sockaddr_storage *ifss,
484 uint16_t port)
486 struct smbd_open_socket *s;
488 s = talloc(parent, struct smbd_open_socket);
489 if (!s) {
490 return false;
493 s->parent = parent;
494 s->fd = open_socket_in(SOCK_STREAM,
495 port,
496 parent->sockets == NULL ? 0 : 2,
497 ifss,
498 true);
499 if (s->fd == -1) {
500 DEBUG(0,("smbd_open_once_socket: open_socket_in: "
501 "%s\n", strerror(errno)));
502 TALLOC_FREE(s);
504 * We ignore an error here, as we've done before
506 return true;
509 /* ready to listen */
510 set_socket_options(s->fd, "SO_KEEPALIVE");
511 set_socket_options(s->fd, lp_socket_options());
513 /* Set server socket to
514 * non-blocking for the accept. */
515 set_blocking(s->fd, False);
517 if (listen(s->fd, SMBD_LISTEN_BACKLOG) == -1) {
518 DEBUG(0,("open_sockets_smbd: listen: "
519 "%s\n", strerror(errno)));
520 close(s->fd);
521 TALLOC_FREE(s);
522 return false;
525 s->fde = tevent_add_fd(smbd_event_context(),
527 s->fd, TEVENT_FD_READ,
528 smbd_accept_connection,
530 if (!s->fde) {
531 DEBUG(0,("open_sockets_smbd: "
532 "tevent_add_fd: %s\n",
533 strerror(errno)));
534 close(s->fd);
535 TALLOC_FREE(s);
536 return false;
538 tevent_fd_set_close_fn(s->fde, smbd_open_socket_close_fn);
540 DLIST_ADD_END(parent->sockets, s, struct smbd_open_socket *);
542 return true;
545 /****************************************************************************
546 Open the socket communication.
547 ****************************************************************************/
549 static bool open_sockets_smbd(struct smbd_parent_context *parent,
550 const char *smb_ports)
552 int num_interfaces = iface_count();
553 int i;
554 char *ports;
555 unsigned dns_port = 0;
557 #ifdef HAVE_ATEXIT
558 atexit(killkids);
559 #endif
561 /* Stop zombies */
562 smbd_setup_sig_chld_handler();
564 /* use a reasonable default set of ports - listing on 445 and 139 */
565 if (!smb_ports) {
566 ports = lp_smb_ports();
567 if (!ports || !*ports) {
568 ports = talloc_strdup(talloc_tos(), SMB_PORTS);
569 } else {
570 ports = talloc_strdup(talloc_tos(), ports);
572 } else {
573 ports = talloc_strdup(talloc_tos(), smb_ports);
576 if (lp_interfaces() && lp_bind_interfaces_only()) {
577 /* We have been given an interfaces line, and been
578 told to only bind to those interfaces. Create a
579 socket per interface and bind to only these.
582 /* Now open a listen socket for each of the
583 interfaces. */
584 for(i = 0; i < num_interfaces; i++) {
585 const struct sockaddr_storage *ifss =
586 iface_n_sockaddr_storage(i);
587 char *tok;
588 const char *ptr;
590 if (ifss == NULL) {
591 DEBUG(0,("open_sockets_smbd: "
592 "interface %d has NULL IP address !\n",
593 i));
594 continue;
597 for (ptr=ports;
598 next_token_talloc(talloc_tos(),&ptr, &tok, " \t,");) {
599 unsigned port = atoi(tok);
600 if (port == 0 || port > 0xffff) {
601 continue;
604 if (!smbd_open_one_socket(parent, ifss, port)) {
605 return false;
609 } else {
610 /* Just bind to 0.0.0.0 - accept connections
611 from anywhere. */
613 char *tok;
614 const char *ptr;
615 const char *sock_addr = lp_socket_address();
616 char *sock_tok;
617 const char *sock_ptr;
619 if (strequal(sock_addr, "0.0.0.0") ||
620 strequal(sock_addr, "::")) {
621 #if HAVE_IPV6
622 sock_addr = "::,0.0.0.0";
623 #else
624 sock_addr = "0.0.0.0";
625 #endif
628 for (sock_ptr=sock_addr;
629 next_token_talloc(talloc_tos(), &sock_ptr, &sock_tok, " \t,"); ) {
630 for (ptr=ports; next_token_talloc(talloc_tos(), &ptr, &tok, " \t,"); ) {
631 struct sockaddr_storage ss;
633 unsigned port = atoi(tok);
634 if (port == 0 || port > 0xffff) {
635 continue;
638 /* Keep the first port for mDNS service
639 * registration.
641 if (dns_port == 0) {
642 dns_port = port;
645 /* open an incoming socket */
646 if (!interpret_string_addr(&ss, sock_tok,
647 AI_NUMERICHOST|AI_PASSIVE)) {
648 continue;
651 if (!smbd_open_one_socket(parent, &ss, port)) {
652 return false;
658 if (parent->sockets == NULL) {
659 DEBUG(0,("open_sockets_smbd: No "
660 "sockets available to bind to.\n"));
661 return false;
664 /* Setup the main smbd so that we can get messages. Note that
665 do this after starting listening. This is needed as when in
666 clustered mode, ctdb won't allow us to start doing database
667 operations until it has gone thru a full startup, which
668 includes checking to see that smbd is listening. */
670 if (!serverid_register(procid_self(),
671 FLAG_MSG_GENERAL|FLAG_MSG_SMBD
672 |FLAG_MSG_DBWRAP)) {
673 DEBUG(0, ("open_sockets_smbd: Failed to register "
674 "myself in serverid.tdb\n"));
675 return false;
678 /* Listen to messages */
680 messaging_register(smbd_messaging_context(), NULL,
681 MSG_SMB_SAM_SYNC, msg_sam_sync);
682 messaging_register(smbd_messaging_context(), NULL,
683 MSG_SHUTDOWN, msg_exit_server);
684 messaging_register(smbd_messaging_context(), NULL,
685 MSG_SMB_FILE_RENAME, msg_file_was_renamed);
686 messaging_register(smbd_messaging_context(), NULL,
687 MSG_SMB_CONF_UPDATED, smb_conf_updated);
688 messaging_register(smbd_messaging_context(), NULL,
689 MSG_SMB_STAT_CACHE_DELETE, smb_stat_cache_delete);
690 messaging_register(smbd_messaging_context(), NULL,
691 MSG_DEBUG, smbd_msg_debug);
692 brl_register_msgs(smbd_messaging_context());
694 #ifdef CLUSTER_SUPPORT
695 if (lp_clustering()) {
696 ctdbd_register_reconfigure(messaging_ctdbd_connection());
698 #endif
700 #ifdef DEVELOPER
701 messaging_register(smbd_messaging_context(), NULL,
702 MSG_SMB_INJECT_FAULT, msg_inject_fault);
703 #endif
705 if (dns_port != 0) {
706 #ifdef WITH_DNSSD_SUPPORT
707 smbd_setup_mdns_registration(smbd_event_context(),
708 parent, dns_port);
709 #endif
710 #ifdef WITH_AVAHI_SUPPORT
711 void *avahi_conn;
713 avahi_conn = avahi_start_register(
714 smbd_event_context(), smbd_event_context(), dns_port);
715 if (avahi_conn == NULL) {
716 DEBUG(10, ("avahi_start_register failed\n"));
718 #endif
721 return true;
724 static void smbd_parent_loop(struct smbd_parent_context *parent)
726 /* now accept incoming connections - forking a new process
727 for each incoming connection */
728 DEBUG(2,("waiting for connections\n"));
729 while (1) {
730 int ret;
731 TALLOC_CTX *frame = talloc_stackframe();
733 ret = tevent_loop_once(smbd_event_context());
734 if (ret != 0) {
735 exit_server_cleanly("tevent_loop_once() error");
738 TALLOC_FREE(frame);
739 } /* end while 1 */
741 /* NOTREACHED return True; */
745 /****************************************************************************
746 Initialise connect, service and file structs.
747 ****************************************************************************/
749 static bool init_structs(void )
752 * Set the machine NETBIOS name if not already
753 * set from the config file.
756 if (!init_names())
757 return False;
759 file_init();
761 if (!secrets_init())
762 return False;
764 return True;
767 /****************************************************************************
768 main program.
769 ****************************************************************************/
771 /* Declare prototype for build_options() to avoid having to run it through
772 mkproto.h. Mixing $(builddir) and $(srcdir) source files in the current
773 prototype generation system is too complicated. */
775 extern void build_options(bool screen);
777 int main(int argc,const char *argv[])
779 /* shall I run as a daemon */
780 bool is_daemon = false;
781 bool interactive = false;
782 bool Fork = true;
783 bool no_process_group = false;
784 bool log_stdout = false;
785 char *ports = NULL;
786 char *profile_level = NULL;
787 int opt;
788 poptContext pc;
789 bool print_build_options = False;
790 enum {
791 OPT_DAEMON = 1000,
792 OPT_INTERACTIVE,
793 OPT_FORK,
794 OPT_NO_PROCESS_GROUP,
795 OPT_LOG_STDOUT
797 struct poptOption long_options[] = {
798 POPT_AUTOHELP
799 {"daemon", 'D', POPT_ARG_NONE, NULL, OPT_DAEMON, "Become a daemon (default)" },
800 {"interactive", 'i', POPT_ARG_NONE, NULL, OPT_INTERACTIVE, "Run interactive (not a daemon)"},
801 {"foreground", 'F', POPT_ARG_NONE, NULL, OPT_FORK, "Run daemon in foreground (for daemontools, etc.)" },
802 {"no-process-group", '\0', POPT_ARG_NONE, NULL, OPT_NO_PROCESS_GROUP, "Don't create a new process group" },
803 {"log-stdout", 'S', POPT_ARG_NONE, NULL, OPT_LOG_STDOUT, "Log to stdout" },
804 {"build-options", 'b', POPT_ARG_NONE, NULL, 'b', "Print build options" },
805 {"port", 'p', POPT_ARG_STRING, &ports, 0, "Listen on the specified ports"},
806 {"profiling-level", 'P', POPT_ARG_STRING, &profile_level, 0, "Set profiling level","PROFILE_LEVEL"},
807 POPT_COMMON_SAMBA
808 POPT_COMMON_DYNCONFIG
809 POPT_TABLEEND
811 struct smbd_parent_context *parent = NULL;
812 TALLOC_CTX *frame = talloc_stackframe(); /* Setup tos. */
813 NTSTATUS status;
814 uint64_t unique_id;
816 smbd_init_globals();
818 TimeInit();
820 #ifdef HAVE_SET_AUTH_PARAMETERS
821 set_auth_parameters(argc,argv);
822 #endif
824 pc = poptGetContext("smbd", argc, argv, long_options, 0);
825 while((opt = poptGetNextOpt(pc)) != -1) {
826 switch (opt) {
827 case OPT_DAEMON:
828 is_daemon = true;
829 break;
830 case OPT_INTERACTIVE:
831 interactive = true;
832 break;
833 case OPT_FORK:
834 Fork = false;
835 break;
836 case OPT_NO_PROCESS_GROUP:
837 no_process_group = true;
838 break;
839 case OPT_LOG_STDOUT:
840 log_stdout = true;
841 break;
842 case 'b':
843 print_build_options = True;
844 break;
845 default:
846 d_fprintf(stderr, "\nInvalid option %s: %s\n\n",
847 poptBadOption(pc, 0), poptStrerror(opt));
848 poptPrintUsage(pc, stderr, 0);
849 exit(1);
852 poptFreeContext(pc);
854 if (interactive) {
855 Fork = False;
856 log_stdout = True;
859 setup_logging(argv[0],log_stdout);
861 if (print_build_options) {
862 build_options(True); /* Display output to screen as well as debug */
863 exit(0);
866 load_case_tables();
868 #ifdef HAVE_SETLUID
869 /* needed for SecureWare on SCO */
870 setluid(0);
871 #endif
873 sec_init();
875 set_remote_machine_name("smbd", False);
877 if (interactive && (DEBUGLEVEL >= 9)) {
878 talloc_enable_leak_report();
881 if (log_stdout && Fork) {
882 DEBUG(0,("ERROR: Can't log to stdout (-S) unless daemon is in foreground (-F) or interactive (-i)\n"));
883 exit(1);
886 /* we want to re-seed early to prevent time delays causing
887 client problems at a later date. (tridge) */
888 generate_random_buffer(NULL, 0);
890 /* make absolutely sure we run as root - to handle cases where people
891 are crazy enough to have it setuid */
893 gain_root_privilege();
894 gain_root_group_privilege();
896 fault_setup((void (*)(void *))exit_server_fault);
897 dump_core_setup("smbd");
899 /* we are never interested in SIGPIPE */
900 BlockSignals(True,SIGPIPE);
902 #if defined(SIGFPE)
903 /* we are never interested in SIGFPE */
904 BlockSignals(True,SIGFPE);
905 #endif
907 #if defined(SIGUSR2)
908 /* We are no longer interested in USR2 */
909 BlockSignals(True,SIGUSR2);
910 #endif
912 /* POSIX demands that signals are inherited. If the invoking process has
913 * these signals masked, we will have problems, as we won't recieve them. */
914 BlockSignals(False, SIGHUP);
915 BlockSignals(False, SIGUSR1);
916 BlockSignals(False, SIGTERM);
918 /* Ensure we leave no zombies until we
919 * correctly set up child handling below. */
921 CatchChild();
923 /* we want total control over the permissions on created files,
924 so set our umask to 0 */
925 umask(0);
927 init_sec_ctx();
929 reopen_logs();
931 DEBUG(0,("smbd version %s started.\n", samba_version_string()));
932 DEBUGADD(0,("%s\n", COPYRIGHT_STARTUP_MESSAGE));
934 DEBUG(2,("uid=%d gid=%d euid=%d egid=%d\n",
935 (int)getuid(),(int)getgid(),(int)geteuid(),(int)getegid()));
937 /* Output the build options to the debug log */
938 build_options(False);
940 if (sizeof(uint16) < 2 || sizeof(uint32) < 4) {
941 DEBUG(0,("ERROR: Samba is not configured correctly for the word size on your machine\n"));
942 exit(1);
945 if (!lp_load_initial_only(get_dyn_CONFIGFILE())) {
946 DEBUG(0, ("error opening config file\n"));
947 exit(1);
950 if (smbd_messaging_context() == NULL)
951 exit(1);
953 if (!reload_services(False))
954 return(-1);
956 init_structs();
958 #ifdef WITH_PROFILE
959 if (!profile_setup(smbd_messaging_context(), False)) {
960 DEBUG(0,("ERROR: failed to setup profiling\n"));
961 return -1;
963 if (profile_level != NULL) {
964 int pl = atoi(profile_level);
965 struct server_id src;
967 DEBUG(1, ("setting profiling level: %s\n",profile_level));
968 src.pid = getpid();
969 set_profile_level(pl, src);
971 #endif
973 DEBUG(3,( "loaded services\n"));
975 if (!is_daemon && !is_a_socket(0)) {
976 if (!interactive)
977 DEBUG(0,("standard input is not a socket, assuming -D option\n"));
980 * Setting is_daemon here prevents us from eventually calling
981 * the open_sockets_inetd()
984 is_daemon = True;
987 if (is_daemon && !interactive) {
988 DEBUG( 3, ( "Becoming a daemon.\n" ) );
989 become_daemon(Fork, no_process_group, log_stdout);
992 generate_random_buffer((uint8_t *)&unique_id, sizeof(unique_id));
993 set_my_unique_id(unique_id);
995 #if HAVE_SETPGID
997 * If we're interactive we want to set our own process group for
998 * signal management.
1000 if (interactive && !no_process_group)
1001 setpgid( (pid_t)0, (pid_t)0);
1002 #endif
1004 if (!directory_exist(lp_lockdir()))
1005 mkdir(lp_lockdir(), 0755);
1007 if (is_daemon)
1008 pidfile_create("smbd");
1010 status = reinit_after_fork(smbd_messaging_context(),
1011 smbd_event_context(),
1012 procid_self(), false);
1013 if (!NT_STATUS_IS_OK(status)) {
1014 DEBUG(0,("reinit_after_fork() failed\n"));
1015 exit(1);
1018 smbd_server_conn->msg_ctx = smbd_messaging_context();
1020 smbd_setup_sig_term_handler();
1021 smbd_setup_sig_hup_handler();
1023 /* Setup all the TDB's - including CLEAR_IF_FIRST tdb's. */
1025 if (smbd_memcache() == NULL) {
1026 exit(1);
1029 memcache_set_global(smbd_memcache());
1031 /* Initialise the password backed before the global_sam_sid
1032 to ensure that we fetch from ldap before we make a domain sid up */
1034 if(!initialize_password_db(False, smbd_event_context()))
1035 exit(1);
1037 if (!secrets_init()) {
1038 DEBUG(0, ("ERROR: smbd can not open secrets.tdb\n"));
1039 exit(1);
1042 if (lp_server_role() == ROLE_DOMAIN_BDC || lp_server_role() == ROLE_DOMAIN_PDC) {
1043 if (!open_schannel_session_store(NULL, lp_private_dir())) {
1044 DEBUG(0,("ERROR: Samba cannot open schannel store for secured NETLOGON operations.\n"));
1045 exit(1);
1049 if(!get_global_sam_sid()) {
1050 DEBUG(0,("ERROR: Samba cannot create a SAM SID.\n"));
1051 exit(1);
1054 if (!sessionid_init()) {
1055 exit(1);
1058 if (!connections_init(True))
1059 exit(1);
1061 if (!locking_init())
1062 exit(1);
1064 if (!messaging_tdb_parent_init()) {
1065 exit(1);
1068 if (!notify_internal_parent_init()) {
1069 exit(1);
1072 if (!serverid_parent_init()) {
1073 exit(1);
1076 if (!W_ERROR_IS_OK(registry_init_full()))
1077 exit(1);
1079 #if 0
1080 if (!init_svcctl_db())
1081 exit(1);
1082 #endif
1084 if (!init_system_info()) {
1085 DEBUG(0,("ERROR: failed to setup system user info.\n"));
1086 return -1;
1089 if (!print_backend_init(smbd_messaging_context()))
1090 exit(1);
1092 if (!init_guest_info()) {
1093 DEBUG(0,("ERROR: failed to setup guest info.\n"));
1094 return -1;
1097 /* Open the share_info.tdb here, so we don't have to open
1098 after the fork on every single connection. This is a small
1099 performance improvment and reduces the total number of system
1100 fds used. */
1101 if (!share_info_db_init()) {
1102 DEBUG(0,("ERROR: failed to load share info db.\n"));
1103 exit(1);
1106 /* only start the background queue daemon if we are
1107 running as a daemon -- bad things will happen if
1108 smbd is launched via inetd and we fork a copy of
1109 ourselves here */
1111 if (is_daemon && !interactive
1112 && lp_parm_bool(-1, "smbd", "backgroundqueue", true)) {
1113 start_background_queue();
1116 if (!is_daemon) {
1117 /* inetd mode */
1118 TALLOC_FREE(frame);
1120 /* Started from inetd. fd 0 is the socket. */
1121 /* We will abort gracefully when the client or remote system
1122 goes away */
1123 smbd_set_server_fd(dup(0));
1125 /* close our standard file descriptors */
1126 close_low_fds(False); /* Don't close stderr */
1128 #ifdef HAVE_ATEXIT
1129 atexit(killkids);
1130 #endif
1132 /* Stop zombies */
1133 smbd_setup_sig_chld_handler();
1135 smbd_process();
1137 exit_server_cleanly(NULL);
1138 return(0);
1141 parent = talloc_zero(smbd_event_context(), struct smbd_parent_context);
1142 if (!parent) {
1143 exit_server("talloc(struct smbd_parent_context) failed");
1145 parent->interactive = interactive;
1147 if (!open_sockets_smbd(parent, ports))
1148 exit_server("open_sockets_smbd() failed");
1150 TALLOC_FREE(frame);
1151 /* make sure we always have a valid stackframe */
1152 frame = talloc_stackframe();
1154 smbd_parent_loop(parent);
1156 exit_server_cleanly(NULL);
1157 TALLOC_FREE(frame);
1158 return(0);