Cleanups!
[kai/samba.git] / source3 / smbd / server.c
index e4dd661ea56d37dc307eff8bd7b86ec8013bc358..5f8f7044a6a999fe6a7dc82a17e7517748250e12 100644 (file)
@@ -1,9 +1,8 @@
-#define OLD_NTDOMAIN 1
 /* 
-   Unix SMB/Netbios implementation.
-   Version 1.9.
+   Unix SMB/CIFS implementation.
    Main SMB server routines
-   Copyright (C) Andrew Tridgell 1992-1998
+   Copyright (C) Andrew Tridgell               1992-1998
+   Copyright (C) Martin Pool                   2002
    
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
@@ -22,8 +21,6 @@
 
 #include "includes.h"
 
-pstring servicesf = CONFIGFILE;
-extern pstring debugf;
 extern fstring global_myworkgroup;
 extern pstring global_myname;
 
@@ -35,8 +32,6 @@ int last_message = -1;
 /* a useful macro to debug the last message processed */
 #define LAST_MESSAGE() smb_fn_name(last_message)
 
-extern int DEBUGLEVEL;
-
 extern pstring user_socket_options;
 
 #ifdef WITH_DFS
@@ -58,33 +53,78 @@ int smbd_server_fd(void)
        return server_fd;
 }
 
-void smbd_set_server_fd(int fd)
+static void smbd_set_server_fd(int fd)
 {
        server_fd = fd;
        client_setfd(fd);
 }
 
 /****************************************************************************
-  when exiting, take the whole family
+ Terminate signal.
 ****************************************************************************/
-static void *dflt_sig(void)
+
+VOLATILE sig_atomic_t got_sig_term = 0;
+
+static void sig_term(void)
 {
-       exit_server("caught signal");
-       return NULL;
+       got_sig_term = 1;
+       sys_select_signal();
+}
+
+/****************************************************************************
+ Catch a sighup.
+****************************************************************************/
+
+VOLATILE sig_atomic_t reload_after_sighup = 0;
+
+static void sig_hup(int sig)
+{
+       reload_after_sighup = 1;
+       sys_select_signal();
 }
 
 /****************************************************************************
   Send a SIGTERM to our process group.
 *****************************************************************************/
+
 static void  killkids(void)
 {
        if(am_parent) kill(0,SIGTERM);
 }
 
+/****************************************************************************
+ Process a sam sync message - not sure whether to do this here or
+ somewhere else.
+****************************************************************************/
+
+static void msg_sam_sync(int UNUSED(msg_type), pid_t UNUSED(pid),
+                        void *UNUSED(buf), size_t UNUSED(len))
+{
+        DEBUG(10, ("** sam sync message received, ignoring\n"));
+}
+
+/****************************************************************************
+ Process a sam sync replicate message - not sure whether to do this here or
+ somewhere else.
+****************************************************************************/
+
+static void msg_sam_repl(int msg_type, pid_t pid, void *buf, size_t len)
+{
+        uint32 low_serial;
+
+        if (len != sizeof(uint32))
+                return;
+
+        low_serial = *((uint32 *)buf);
+
+        DEBUG(3, ("received sam replication message, serial = 0x%04x\n",
+                  low_serial));
+}
 
 /****************************************************************************
-  open the socket communication
+ Open the socket communication - inetd.
 ****************************************************************************/
+
 static BOOL open_sockets_inetd(void)
 {
        /* Started from inetd. fd 0 is the socket. */
@@ -96,15 +136,21 @@ static BOOL open_sockets_inetd(void)
        close_low_fds();
        
        set_socket_options(smbd_server_fd(),"SO_KEEPALIVE");
-       set_socket_options(smbd_server_fd(),user_socket_options);
+       set_socket_options(smbd_server_fd(), user_socket_options);
 
        return True;
 }
 
+static void msg_exit_server(int msg_type, pid_t src, void *buf, size_t len)
+{
+       exit_server("Got a SHUTDOWN message");
+}
+
 
 /****************************************************************************
-  open the socket communication
+ Open the socket communication.
 ****************************************************************************/
+
 static BOOL open_sockets(BOOL is_daemon,int port)
 {
        int num_interfaces = iface_count();
@@ -159,7 +205,11 @@ max can be %d\n",
                        s = fd_listenset[i] = open_socket_in(SOCK_STREAM, port, 0, ifip->s_addr, True);
                        if(s == -1)
                                return False;
-                               /* ready to listen */
+
+                       /* ready to listen */
+                       set_socket_options(s,"SO_KEEPALIVE"); 
+                       set_socket_options(s,user_socket_options);
+      
                        if (listen(s, 5) == -1) {
                                DEBUG(0,("listen: %s\n",strerror(errno)));
                                close(s);
@@ -179,6 +229,9 @@ max can be %d\n",
                        return(False);
                
                /* ready to listen */
+               set_socket_options(s,"SO_KEEPALIVE"); 
+               set_socket_options(s,user_socket_options);
+
                if (listen(s, 5) == -1) {
                        DEBUG(0,("open_sockets: listen: %s\n",
                                 strerror(errno)));
@@ -190,6 +243,12 @@ max can be %d\n",
                FD_SET(s,&listen_set);
        } 
 
+        /* Listen to messages */
+
+        message_register(MSG_SMB_SAM_SYNC, msg_sam_sync);
+        message_register(MSG_SMB_SAM_REPL, msg_sam_repl);
+        message_register(MSG_SHUTDOWN, msg_exit_server);
+
        /* now accept incoming connections - forking a new process
           for each incoming connection */
        DEBUG(2,("waiting for a connection\n"));
@@ -197,20 +256,28 @@ max can be %d\n",
                fd_set lfds;
                int num;
                
+               /* Free up temporary memory from the main smbd. */
+               lp_talloc_free();
+
+               /* Ensure we respond to PING and DEBUG messages from the main smbd. */
+               message_dispatch();
+
                memcpy((char *)&lfds, (char *)&listen_set, 
                       sizeof(listen_set));
                
-               num = sys_select(FD_SETSIZE,&lfds,NULL);
+               num = sys_select(FD_SETSIZE,&lfds,NULL,NULL,NULL);
                
                if (num == -1 && errno == EINTR) {
-                       extern VOLATILE SIG_ATOMIC_T reload_after_sighup;
+                       if (got_sig_term) {
+                               exit_server("Caught TERM signal");
+                       }
 
                        /* check for sighup processing */
                        if (reload_after_sighup) {
-                               unbecome_user();
+                               change_to_root_user();
                                DEBUG(1,("Reloading services after SIGHUP\n"));
                                reload_services(False);
-                               reload_after_sighup = False;
+                               reload_after_sighup = 0;
                        }
 
                        continue;
@@ -223,7 +290,7 @@ max can be %d\n",
                   accept on these. */
                for( ; num > 0; num--) {
                        struct sockaddr addr;
-                       int in_addrlen = sizeof(addr);
+                       socklen_t in_addrlen = sizeof(addr);
                        
                        s = -1;
                        for(i = 0; i < num_interfaces; i++) {
@@ -267,11 +334,24 @@ max can be %d\n",
                                   done correctly in the process.  */
                                reset_globals_after_fork();
 
+                               /* tdb needs special fork handling */
+                               tdb_reopen_all();
+
                                return True; 
                        }
                        /* The parent doesn't need this socket */
                        close(smbd_server_fd()); 
 
+                       /* Sun May 6 18:56:14 2001 ackley@cs.unm.edu:
+                               Clear the closed fd info out of server_fd --
+                               and more importantly, out of client_fd in
+                               util_sock.c, to avoid a possible
+                               getpeername failure if we reopen the logs
+                               and use %I in the filename.
+                       */
+
+                       smbd_set_server_fd(-1);
+
                        /* Force parent to check log size after
                         * spawning child.  Fix from
                         * klausr@ITAP.Physik.Uni-Stuttgart.De.  The
@@ -295,8 +375,9 @@ max can be %d\n",
 }
 
 /****************************************************************************
-  reload the services file
-  **************************************************************************/
+ Reload the services file.
+**************************************************************************/
+
 BOOL reload_services(BOOL test)
 {
        BOOL ret;
@@ -304,8 +385,9 @@ BOOL reload_services(BOOL test)
        if (lp_loaded()) {
                pstring fname;
                pstrcpy(fname,lp_configfile());
-               if (file_exist(fname,NULL) && !strcsequal(fname,servicesf)) {
-                       pstrcpy(servicesf,fname);
+               if (file_exist(fname, NULL) &&
+                   !strcsequal(fname, dyn_CONFIGFILE)) {
+                       pstrcpy(dyn_CONFIGFILE, fname);
                        test = False;
                }
        }
@@ -317,7 +399,7 @@ BOOL reload_services(BOOL test)
 
        lp_killunused(conn_snum_used);
        
-       ret = lp_load(servicesf,False,False,True);
+       ret = lp_load(dyn_CONFIGFILE, False, False, True);
 
        load_printers();
 
@@ -332,39 +414,19 @@ BOOL reload_services(BOOL test)
        {
                if (smbd_server_fd() != -1) {      
                        set_socket_options(smbd_server_fd(),"SO_KEEPALIVE");
-                       set_socket_options(smbd_server_fd(),user_socket_options);
+                       set_socket_options(smbd_server_fd(), user_socket_options);
                }
        }
 
-       reset_mangled_cache();
+       mangle_reset_cache();
        reset_stat_cache();
 
        /* this forces service parameters to be flushed */
-       become_service(NULL,True);
+       set_current_service(NULL,True);
 
        return(ret);
 }
 
-
-
-/****************************************************************************
- Catch a sighup.
-****************************************************************************/
-
-VOLATILE SIG_ATOMIC_T reload_after_sighup = False;
-
-static void sig_hup(int sig)
-{
-       BlockSignals(True,SIGHUP);
-       DEBUG(0,("Got SIGHUP\n"));
-
-       sys_select_signal();
-       reload_after_sighup = True;
-       BlockSignals(False,SIGHUP);
-}
-
-
-
 #if DUMP_CORE
 /*******************************************************************
 prepare to dump a core file - carefully!
@@ -373,8 +435,9 @@ static BOOL dump_core(void)
 {
        char *p;
        pstring dname;
-       pstrcpy(dname,debugf);
-       if ((p=strrchr(dname,'/'))) *p=0;
+       
+       pstrcpy(dname,lp_logfile());
+       if ((p=strrchr_m(dname,'/'))) *p=0;
        pstrcat(dname,"/corefiles");
        mkdir(dname,0700);
        sys_chown(dname,getuid(),getgid());
@@ -397,30 +460,56 @@ static BOOL dump_core(void)
 #endif
 
 
-       DEBUG(0,("Dumping core in %s\n",dname));
+       DEBUG(0,("Dumping core in %s\n", dname));
        abort();
        return(True);
 }
 #endif
 
 /****************************************************************************
-exit the server
+update the current smbd process count
+****************************************************************************/
+
+static void decrement_smbd_process_count(void)
+{
+       int32 total_smbds;
+
+       if (lp_max_smbd_processes()) {
+               total_smbds = 0;
+               tdb_change_int32_atomic(conn_tdb_ctx(), "INFO/total_smbds", &total_smbds, -1);
+       }
+}
+
+/****************************************************************************
+ Exit the server.
 ****************************************************************************/
+
 void exit_server(char *reason)
 {
        static int firsttime=1;
        extern char *last_inbuf;
+       extern struct auth_context *negprot_global_auth_context;
 
-
-       if (!firsttime) exit(0);
+       if (!firsttime)
+               exit(0);
        firsttime = 0;
 
-       unbecome_user();
+       change_to_root_user();
        DEBUG(2,("Closing connections\n"));
 
+       if (negprot_global_auth_context) {
+               (negprot_global_auth_context->free)(&negprot_global_auth_context);
+       }
+
        conn_close_all();
 
-    respond_to_all_remaining_local_messages();
+       invalidate_all_vuids();
+
+       /* delete our entry in the connections database. */
+       yield_connection(NULL,"");
+
+       respond_to_all_remaining_local_messages();
+       decrement_smbd_process_count();
 
 #ifdef WITH_DFS
        if (dcelogin_atmost_once) {
@@ -448,8 +537,9 @@ void exit_server(char *reason)
 }
 
 /****************************************************************************
-  initialise connect, service and file structs
+ Initialise connect, service and file structs.
 ****************************************************************************/
+
 static void init_structs(void )
 {
        /*
@@ -459,13 +549,13 @@ static void init_structs(void )
 
        if (!*global_myname) {
                char *p;
-               fstrcpy( global_myname, myhostname() );
-               p = strchrglobal_myname, '.' );
+               pstrcpy( global_myname, myhostname() );
+               p = strchr_m(global_myname, '.' );
                if (p) 
                        *p = 0;
        }
 
-       strupper( global_myname );
+       strupper(global_myname);
 
        conn_init();
 
@@ -474,53 +564,54 @@ static void init_structs(void )
        /* for RPC pipes */
        init_rpc_pipe_hnd();
 
-       /* for LSA handles */
-       init_lsa_policy_hnd();
-
-       /* for SPOOLSS handles */
-       init_printer_hnd();
-       
        init_dptrs();
 
        secrets_init();
+
 }
 
 /****************************************************************************
-usage on the program
+ Usage on the program.
 ****************************************************************************/
+
 static void usage(char *pname)
 {
 
-       printf("Usage: %s [-DaoPh?V] [-d debuglevel] [-l log basename] [-p port]\n", pname);
-       printf("       [-O socket options] [-s services file]\n");
-       printf("\t-D                    Become a daemon\n");
-       printf("\t-a                    Append to log file (default)\n");
-       printf("\t-o                    Overwrite log file, don't append\n");
-       printf("\t-h                    Print usage\n");
-       printf("\t-?                    Print usage\n");
-       printf("\t-V                    Print version\n");
-       printf("\t-d debuglevel         Set the debuglevel\n");
-       printf("\t-l log basename.      Basename for log/debug files\n");
-       printf("\t-p port               Listen on the specified port\n");
-       printf("\t-O socket options     Socket options\n");
-       printf("\t-s services file.     Filename of services file\n");
-       printf("\n");
+       d_printf("Usage: %s [-DaioPh?Vb] [-d debuglevel] [-l log basename] [-p port]\n", pname);
+       d_printf("       [-O socket options] [-s services file]\n");
+       d_printf("\t-D                    Become a daemon (default)\n");
+       d_printf("\t-a                    Append to log file (default)\n");
+       d_printf("\t-i                    Run interactive (not a daemon)\n" );
+       d_printf("\t-o                    Overwrite log file, don't append\n");
+       d_printf("\t-h                    Print usage\n");
+       d_printf("\t-?                    Print usage\n");
+       d_printf("\t-V                    Print version\n");
+       d_printf("\t-b                    Print build options\n");
+       d_printf("\t-d debuglevel         Set the debuglevel\n");
+       d_printf("\t-l log basename.      Basename for log/debug files\n");
+       d_printf("\t-p port               Listen on the specified port\n");
+       d_printf("\t-O socket options     Socket options\n");
+       d_printf("\t-s services file.     Filename of services file\n");
+       d_printf("\n");
 }
 
-
 /****************************************************************************
-  main program
+ main program.
 ****************************************************************************/
+
  int main(int argc,char *argv[])
 {
        extern BOOL append_log;
+       extern BOOL AllowDebugChange;
+       extern char *optarg;
        /* shall I run as a daemon */
        BOOL is_daemon = False;
+       BOOL interactive = False;
        BOOL specified_logfile = False;
        int port = SMB_PORT;
        int opt;
-       extern char *optarg;
-       
+       pstring logfile;
+
 #ifdef HAVE_SET_AUTH_PARAMETERS
        set_auth_parameters(argc,argv);
 #endif
@@ -531,25 +622,30 @@ static void usage(char *pname)
                argc--;
        }
 
-       while ( EOF != (opt = getopt(argc, argv, "O:l:s:d:Dp:h?Vaof:")) )
+       while ( EOF != (opt = getopt(argc, argv, "O:l:s:d:Dp:h?bVaiof:")) )
                switch (opt)  {
                case 'O':
                        pstrcpy(user_socket_options,optarg);
                        break;
 
                case 's':
-                       pstrcpy(servicesf,optarg);
+                       pstrcpy(dyn_CONFIGFILE,optarg);
                        break;
 
                case 'l':
                        specified_logfile = True;
-                       pstrcpy(debugf,optarg);
+                       pstr_sprintf(logfile, "%s/log.smbd", optarg);
+                       lp_set_logfile(logfile);
                        break;
 
                case 'a':
                        append_log = True;
                        break;
 
+               case 'i':
+                       interactive = True;
+                       break;
+
                case 'o':
                        append_log = False;
                        break;
@@ -563,6 +659,7 @@ static void usage(char *pname)
                                DEBUGLEVEL = 10000;
                        else
                                DEBUGLEVEL = atoi(optarg);
+                       AllowDebugChange = False;
                        break;
 
                case 'p':
@@ -576,7 +673,11 @@ static void usage(char *pname)
                        break;
 
                case 'V':
-                       printf("Version %s\n",VERSION);
+                       d_printf("Version %s\n",VERSION);
+                       exit(0);
+                       break;
+               case 'b':
+                       build_options(True); /* Display output to screen as well as debug */ 
                        exit(0);
                        break;
                default:
@@ -590,29 +691,20 @@ static void usage(char *pname)
        setluid(0);
 #endif
 
-       /*
-        * gain_root_privilege uses an assert than will cause a core
-        * dump if euid != 0. Ensure this is the case.
-        */
+       sec_init();
 
-       if(geteuid() != (uid_t)0) {
-               fprintf(stderr, "%s: Version %s : Must have effective user id of zero to run.\n", argv[0], VERSION);
-               exit(1);
-       }
+       load_case_tables();
 
        append_log = True;
 
-       TimeInit();
-
        if(!specified_logfile) {
-               slprintf(debugf, sizeof(debugf), "%s/log.smbd", LOGFILEBASE);
+               pstr_sprintf(logfile, "%s/log.smbd", dyn_LOGFILEBASE);
+               lp_set_logfile(logfile);
        }
 
-       pstrcpy(remote_machine, "smb");
+       fstrcpy(remote_machine, "smbd");
 
-       setup_logging(argv[0],False);
-
-       charset_initialise();
+       setup_logging(argv[0],interactive);
 
        /* we want to re-seed early to prevent time delays causing
            client problems at a later date. (tridge) */
@@ -625,8 +717,9 @@ static void usage(char *pname)
        gain_root_group_privilege();
 
        fault_setup((void (*)(void *))exit_server);
-       CatchSignal(SIGTERM , SIGNAL_CAST dflt_sig);
-
+       CatchSignal(SIGTERM , SIGNAL_CAST sig_term);
+       CatchSignal(SIGHUP,SIGNAL_CAST sig_hup);
+       
        /* we are never interested in SIGPIPE */
        BlockSignals(True,SIGPIPE);
 
@@ -640,6 +733,12 @@ static void usage(char *pname)
        BlockSignals(True,SIGUSR2);
 #endif
 
+       /* POSIX demands that signals are inherited. If the invoking process has
+        * these signals masked, we will have problems, as we won't recieve them. */
+       BlockSignals(False, SIGHUP);
+       BlockSignals(False, SIGUSR1);
+       BlockSignals(False, SIGTERM);
+
        /* we want total control over the permissions on created files,
           so set our umask to 0 */
        umask(0);
@@ -648,12 +747,15 @@ static void usage(char *pname)
 
        reopen_logs();
 
-       DEBUG(1,( "smbd version %s started.\n", VERSION));
-       DEBUGADD(1,( "Copyright Andrew Tridgell 1992-1998\n"));
+       DEBUG(0,( "smbd version %s started.\n", VERSION));
+       DEBUGADD(0,( "Copyright Andrew Tridgell and the Samba Team 1992-2002\n"));
 
        DEBUG(2,("uid=%d gid=%d euid=%d egid=%d\n",
                 (int)getuid(),(int)getgid(),(int)geteuid(),(int)getegid()));
 
+       /* Output the build options to the debug log */ 
+       build_options(False);
+
        if (sizeof(uint16) < 2 || sizeof(uint32) < 4) {
                DEBUG(0,("ERROR: Samba is not configured correctly for the word size on your machine\n"));
                exit(1);
@@ -667,6 +769,11 @@ static void usage(char *pname)
                return(-1);     
 
        init_structs();
+
+       /* don't call winbind for our domain if we are the DC */
+       if (lp_domain_logons()) {
+               winbind_exclude_domain(lp_workgroup());
+       }
        
 #ifdef WITH_PROFILE
        if (!profile_setup(False)) {
@@ -675,33 +782,36 @@ static void usage(char *pname)
        }
 #endif
 
-#ifdef WITH_SSL
-       {
-               extern BOOL sslEnabled;
-               sslEnabled = lp_ssl_enabled();
-               if(sslEnabled)
-                       sslutil_init(True);
-       }
-#endif        /* WITH_SSL */
-
-       codepage_initialise(lp_client_code_page());
-
        fstrcpy(global_myworkgroup, lp_workgroup());
 
-       CatchSignal(SIGHUP,SIGNAL_CAST sig_hup);
-       
        DEBUG(3,( "loaded services\n"));
 
        if (!is_daemon && !is_a_socket(0)) {
-               DEBUG(0,("standard input is not a socket, assuming -D option\n"));
+               if (!interactive)
+                       DEBUG(0,("standard input is not a socket, assuming -D option\n"));
+
+               /*
+                * Setting is_daemon here prevents us from eventually calling
+                * the open_sockets_inetd()
+                */
+
                is_daemon = True;
        }
 
-       if (is_daemon) {
+       if (is_daemon && !interactive) {
                DEBUG( 3, ( "Becoming a daemon.\n" ) );
                become_daemon();
        }
 
+#if HAVE_SETPGID
+       /*
+        * If we're interactive we want to set our own process group for
+        * signal management.
+        */
+       if (interactive)
+               setpgid( (pid_t)0, (pid_t)0);
+#endif
+
        if (!directory_exist(lp_lockdir(), NULL)) {
                mkdir(lp_lockdir(), 0755);
        }
@@ -713,6 +823,18 @@ static void usage(char *pname)
        if (!message_init()) {
                exit(1);
        }
+       register_msg_pool_usage();
+       register_dmalloc_msgs();
+
+       /* Setup the main smbd so that we can get messages. */
+       claim_connection(NULL,"",0,True);
+
+       /* 
+          DO NOT ENABLE THIS TILL YOU COPE WITH KILLING THESE TASKS AND INETD
+          THIS *killed* LOTS OF BUILD FARM MACHINES. IT CREATED HUNDREDS OF 
+          smbd PROCESSES THAT NEVER DIE
+          start_background_queue(); 
+       */
 
        if (!open_sockets(is_daemon,port))
                exit(1);
@@ -721,18 +843,20 @@ static void usage(char *pname)
         * everything after this point is run after the fork()
         */ 
 
-       if (!locking_init(0)) {
+       if (!locking_init(0))
                exit(1);
-       }
 
-       if (!print_backend_init()) {
+       if (!print_backend_init())
                exit(1);
-       }
 
-       if(!initialize_password_db()) {
+       if (!share_info_db_init())
+               exit(1);
+
+       if(!initialize_password_db(False))
                exit(1);
-       }
 
+       uni_group_cache_init(); /* Non-critical */
+       
        /* possibly reload the services file. */
        reload_services(True);
 
@@ -741,25 +865,27 @@ static void usage(char *pname)
                exit(1);
        }
 
+       if (!init_account_policy()) {
+               DEBUG(0,("Could not open account policy tdb.\n"));
+               exit(1);
+       }
+
        if (*lp_rootdir()) {
                if (sys_chroot(lp_rootdir()) == 0)
                        DEBUG(2,("Changed root to %s\n", lp_rootdir()));
        }
 
        /* Setup oplocks */
-       if (!init_oplocks()) {
+       if (!init_oplocks())
                exit(1);
-       }
-
+       
        /* Setup change notify */
-       if (!init_change_notify()) {
+       if (!init_change_notify())
                exit(1);
-       }
 
        smbd_process();
        
+       uni_group_cache_shutdown();
        exit_server("normal exit");
        return(0);
 }
-
-#undef OLD_NTDOMAIN