r22637: Install tdbbackup and tdbdump again.
[Samba.git] / source / smbd / server.c
blob24ac3ed28cd4920bfdb0153d4f180701bcef60ca
1 /*
2 Unix SMB/CIFS implementation.
4 Main SMB server routines
6 Copyright (C) Andrew Tridgell 1992-2005
7 Copyright (C) Martin Pool 2002
8 Copyright (C) Jelmer Vernooij 2002
9 Copyright (C) James J Myers 2003 <myersjj@samba.org>
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 2 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program; if not, write to the Free Software
23 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
26 #include "includes.h"
27 #include "lib/events/events.h"
28 #include "version.h"
29 #include "lib/cmdline/popt_common.h"
30 #include "system/dir.h"
31 #include "system/filesys.h"
32 #include "build.h"
33 #include "ldb/include/ldb.h"
34 #include "registry/registry.h"
35 #include "ntvfs/ntvfs.h"
36 #include "ntptr/ntptr.h"
37 #include "auth/gensec/gensec.h"
38 #include "smbd/process_model.h"
39 #include "smbd/service.h"
40 #include "param/secrets.h"
41 #include "smbd/pidfile.h"
42 #include "cluster/ctdb/ctdb_cluster.h"
45 recursively delete a directory tree
47 static void recursive_delete(const char *path)
49 DIR *dir;
50 struct dirent *de;
52 dir = opendir(path);
53 if (!dir) {
54 return;
57 for (de=readdir(dir);de;de=readdir(dir)) {
58 char *fname;
59 struct stat st;
61 if (ISDOT(de->d_name) || ISDOTDOT(de->d_name)) {
62 continue;
65 fname = talloc_asprintf(path, "%s/%s", path, de->d_name);
66 if (stat(fname, &st) != 0) {
67 continue;
69 if (S_ISDIR(st.st_mode)) {
70 recursive_delete(fname);
71 talloc_free(fname);
72 continue;
74 if (unlink(fname) != 0) {
75 DEBUG(0,("Unabled to delete '%s' - %s\n",
76 fname, strerror(errno)));
77 smb_panic("unable to cleanup tmp files");
79 talloc_free(fname);
81 closedir(dir);
85 cleanup temporary files. This is the new alternative to
86 TDB_CLEAR_IF_FIRST. Unfortunately TDB_CLEAR_IF_FIRST is not
87 efficient on unix systems due to the lack of scaling of the byte
88 range locking system. So instead of putting the burden on tdb to
89 cleanup tmp files, this function deletes them.
91 static void cleanup_tmp_files(void)
93 char *path;
94 TALLOC_CTX *mem_ctx = talloc_new(NULL);
96 path = smbd_tmp_path(mem_ctx, NULL);
98 recursive_delete(path);
99 talloc_free(mem_ctx);
102 static void sig_hup(int sig)
104 debug_schedule_reopen_logs();
107 static void sig_term(int sig)
109 #if HAVE_GETPGRP
110 static int done_sigterm;
111 if (done_sigterm == 0 && getpgrp() == getpid()) {
112 DEBUG(0,("SIGTERM: killing children\n"));
113 done_sigterm = 1;
114 kill(-getpgrp(), SIGTERM);
116 #endif
117 exit(0);
121 setup signal masks
123 static void setup_signals(void)
125 /* we are never interested in SIGPIPE */
126 BlockSignals(True,SIGPIPE);
128 #if defined(SIGFPE)
129 /* we are never interested in SIGFPE */
130 BlockSignals(True,SIGFPE);
131 #endif
133 /* We are no longer interested in USR1 */
134 BlockSignals(True, SIGUSR1);
136 #if defined(SIGUSR2)
137 /* We are no longer interested in USR2 */
138 BlockSignals(True,SIGUSR2);
139 #endif
141 /* POSIX demands that signals are inherited. If the invoking process has
142 * these signals masked, we will have problems, as we won't recieve them. */
143 BlockSignals(False, SIGHUP);
144 BlockSignals(False, SIGTERM);
146 CatchSignal(SIGHUP, sig_hup);
147 CatchSignal(SIGTERM, sig_term);
151 handle io on stdin
153 static void server_stdin_handler(struct event_context *event_ctx, struct fd_event *fde,
154 uint16_t flags, void *private)
156 const char *binary_name = private;
157 uint8_t c;
158 if (read(0, &c, 1) == 0) {
159 DEBUG(0,("%s: EOF on stdin - terminating\n", binary_name));
160 #if HAVE_GETPGRP
161 if (getpgrp() == getpid()) {
162 kill(-getpgrp(), SIGTERM);
164 #endif
165 exit(0);
170 die if the user selected maximum runtime is exceeded
172 static void max_runtime_handler(struct event_context *ev, struct timed_event *te,
173 struct timeval t, void *private)
175 const char *binary_name = private;
176 DEBUG(0,("%s: maximum runtime exceeded - terminating\n", binary_name));
177 exit(0);
181 main server.
183 static int binary_smbd_main(const char *binary_name, int argc, const char *argv[])
185 BOOL interactive = False;
186 int opt;
187 poptContext pc;
188 init_module_fn static_init[] = STATIC_service_MODULES;
189 init_module_fn *shared_init;
190 struct event_context *event_ctx;
191 NTSTATUS status;
192 const char *model = "standard";
193 int max_runtime = 0;
194 enum {
195 OPT_INTERACTIVE = 1000,
196 OPT_PROCESS_MODEL
198 struct poptOption long_options[] = {
199 POPT_AUTOHELP
200 {"interactive", 'i', POPT_ARG_NONE, NULL, OPT_INTERACTIVE,
201 "Run interactive (not a daemon)", NULL},
202 {"model", 'M', POPT_ARG_STRING, NULL, OPT_PROCESS_MODEL,
203 "Select process model", "MODEL"},
204 {"maximum-runtime",0, POPT_ARG_INT, &max_runtime, 0,
205 "set maximum runtime of the server process, till autotermination", "seconds"},
206 POPT_COMMON_SAMBA
207 POPT_COMMON_VERSION
208 { NULL }
211 pc = poptGetContext(binary_name, argc, argv, long_options, 0);
213 while((opt = poptGetNextOpt(pc)) != -1) {
214 switch(opt) {
215 case OPT_INTERACTIVE:
216 interactive = True;
217 break;
218 case OPT_PROCESS_MODEL:
219 model = poptGetOptArg(pc);
220 break;
223 poptFreeContext(pc);
225 setup_logging(binary_name, interactive?DEBUG_STDOUT:DEBUG_FILE);
226 setup_signals();
228 /* we want total control over the permissions on created files,
229 so set our umask to 0 */
230 umask(0);
232 DEBUG(0,("%s version %s started.\n", binary_name, SAMBA_VERSION_STRING));
233 DEBUGADD(0,("Copyright Andrew Tridgell and the Samba Team 1992-2007\n"));
235 if (sizeof(uint16_t) < 2 || sizeof(uint32_t) < 4 || sizeof(uint64_t) < 8) {
236 DEBUG(0,("ERROR: Samba is not configured correctly for the word size on your machine\n"));
237 exit(1);
240 if (!interactive) {
241 DEBUG(3,("Becoming a daemon.\n"));
242 become_daemon(True);
245 cleanup_tmp_files();
247 if (!directory_exist(lp_lockdir())) {
248 mkdir(lp_lockdir(), 0755);
251 pidfile_create(binary_name);
253 /* Do *not* remove this, until you have removed
254 * passdb/secrets.c, and proved that Samba still builds... */
255 /* Setup the SECRETS subsystem */
256 if (!secrets_init()) {
257 exit(1);
260 ldb_global_init(); /* FIXME: */
262 share_init();
264 gensec_init(); /* FIXME: */
266 registry_init(); /* FIXME: maybe run this in the initialization function
267 of the winreg RPC server instead? */
269 ntptr_init(); /* FIXME: maybe run this in the initialization function
270 of the spoolss RPC server instead? */
272 ntvfs_init(); /* FIXME: maybe run this in the initialization functions
273 of the SMB[,2] server instead? */
275 process_model_init();
277 shared_init = load_samba_modules(NULL, "service");
279 run_init_functions(static_init);
280 run_init_functions(shared_init);
282 talloc_free(shared_init);
284 /* the event context is the top level structure in smbd. Everything else
285 should hang off that */
286 event_ctx = event_context_init(NULL);
288 /* initialise clustering if needed */
289 cluster_ctdb_init(event_ctx, model);
291 if (interactive) {
292 /* catch EOF on stdin */
293 #ifdef SIGTTIN
294 signal(SIGTTIN, SIG_IGN);
295 #endif
296 event_add_fd(event_ctx, event_ctx, 0, EVENT_FD_READ,
297 server_stdin_handler,
298 discard_const(binary_name));
302 if (max_runtime) {
303 event_add_timed(event_ctx, event_ctx,
304 timeval_current_ofs(max_runtime, 0),
305 max_runtime_handler,
306 discard_const(binary_name));
309 DEBUG(0,("%s: using '%s' process model\n", binary_name, model));
310 status = server_service_startup(event_ctx, model, lp_server_services());
311 if (!NT_STATUS_IS_OK(status)) {
312 DEBUG(0,("Starting Services failed - %s\n", nt_errstr(status)));
313 return 1;
316 /* wait for events - this is where smbd sits for most of its
317 life */
318 event_loop_wait(event_ctx);
320 /* as everything hangs off this event context, freeing it
321 should initiate a clean shutdown of all services */
322 talloc_free(event_ctx);
324 return 0;
327 int main(int argc, const char *argv[])
329 return binary_smbd_main("smbd", argc, argv);