2003-08-13 05:53:07 +04:00
/*
Unix SMB / CIFS implementation .
2005-01-30 03:54:57 +03:00
2003-08-13 05:53:07 +04:00
process model : standard ( 1 process per client connection )
2005-01-30 03:54:57 +03:00
Copyright ( C ) Andrew Tridgell 1992 - 2005
2003-08-13 05:53:07 +04:00
Copyright ( C ) James J Myers 2003 < myersjj @ samba . org >
2004-07-14 01:04:56 +04:00
Copyright ( C ) Stefan ( metze ) Metzmacher 2004
2003-08-13 05:53:07 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 06:07:03 +04:00
the Free Software Foundation ; either version 3 of the License , or
2003-08-13 05:53:07 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 06:07:03 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2003-08-13 05:53:07 +04:00
*/
# include "includes.h"
2005-02-03 14:56:03 +03:00
# include "lib/events/events.h"
2020-11-20 17:27:17 +03:00
# include "samba/process_model.h"
2006-11-07 15:03:01 +03:00
# include "system/filesys.h"
2007-01-10 13:52:09 +03:00
# include "cluster/cluster.h"
2007-12-07 00:34:56 +03:00
# include "param/param.h"
2010-06-16 15:43:38 +04:00
# include "ldb_wrap.h"
2017-03-29 21:11:37 +03:00
# include "lib/messaging/messaging.h"
2017-04-08 01:31:57 +03:00
# include "lib/util/debug.h"
2019-06-28 16:05:43 +03:00
# include "lib/messaging/messages_dgm.h"
2020-02-21 23:07:19 +03:00
# include "lib/util/util_process.h"
2006-11-07 15:03:01 +03:00
2018-09-06 22:04:48 +03:00
static unsigned connections_active = 0 ;
static unsigned smbd_max_processes = 0 ;
2015-02-19 02:45:31 +03:00
struct standard_child_state {
const char * name ;
pid_t pid ;
int to_parent_fd ;
int from_child_fd ;
struct tevent_fd * from_child_fde ;
} ;
2017-04-20 22:24:43 +03:00
NTSTATUS process_model_standard_init ( TALLOC_CTX * ) ;
2017-09-18 03:56:09 +03:00
struct process_context {
char * name ;
int from_parent_fd ;
bool inhibit_fork_on_accept ;
bool forked_on_accept ;
} ;
2009-08-07 11:21:54 +04:00
2003-08-13 05:53:07 +04:00
/*
called when the process model is selected
*/
2010-10-30 04:24:15 +04:00
static void standard_model_init ( void )
2003-08-13 05:53:07 +04:00
{
2005-01-14 04:32:56 +03:00
}
2017-04-08 01:31:57 +03:00
static void sighup_signal_handler ( struct tevent_context * ev ,
struct tevent_signal * se ,
int signum , int count , void * siginfo ,
void * private_data )
{
debug_schedule_reopen_logs ( ) ;
}
2017-04-08 01:45:41 +03:00
static void sigterm_signal_handler ( struct tevent_context * ev ,
struct tevent_signal * se ,
int signum , int count , void * siginfo ,
void * private_data )
{
2018-11-21 13:37:26 +03:00
# ifdef HAVE_GETPGRP
2017-04-08 01:45:41 +03:00
if ( getpgrp ( ) = = getpid ( ) ) {
/*
* We ' re the process group leader , send
* SIGTERM to our process group .
*/
2017-09-11 02:39:39 +03:00
DBG_ERR ( " SIGTERM: killing children \n " ) ;
2017-04-08 01:45:41 +03:00
kill ( - getpgrp ( ) , SIGTERM ) ;
}
# endif
2017-09-11 02:39:39 +03:00
DBG_ERR ( " Exiting pid %u on SIGTERM \n " , ( unsigned int ) getpid ( ) ) ;
2017-04-08 01:45:41 +03:00
talloc_free ( ev ) ;
exit ( 127 ) ;
}
2009-08-07 11:21:54 +04:00
/*
2015-02-19 02:45:31 +03:00
handle EOF on the parent - to - all - children pipe in the child
2009-08-07 11:21:54 +04:00
*/
static void standard_pipe_handler ( struct tevent_context * event_ctx , struct tevent_fd * fde ,
uint16_t flags , void * private_data )
{
2017-09-11 02:39:39 +03:00
DBG_DEBUG ( " Child %d exiting \n " , ( int ) getpid ( ) ) ;
2017-04-08 01:10:09 +03:00
talloc_free ( event_ctx ) ;
2009-08-07 11:21:54 +04:00
exit ( 0 ) ;
}
2015-02-19 02:45:31 +03:00
/*
handle EOF on the child pipe in the parent , so we know when a
process terminates without using SIGCHLD or waiting on all possible pids .
We need to ensure we do not ignore SIGCHLD because we need it to
work to get a valid error code from samba_runcmd_ * ( ) .
*/
static void standard_child_pipe_handler ( struct tevent_context * ev ,
struct tevent_fd * fde ,
uint16_t flags ,
void * private_data )
{
struct standard_child_state * state
= talloc_get_type_abort ( private_data , struct standard_child_state ) ;
int status = 0 ;
pid_t pid ;
2017-03-28 11:04:23 +03:00
messaging_dgm_cleanup ( state - > pid ) ;
2015-02-19 02:45:31 +03:00
/* the child has closed the pipe, assume its dead */
errno = 0 ;
pid = waitpid ( state - > pid , & status , 0 ) ;
if ( pid ! = state - > pid ) {
if ( errno = = ECHILD ) {
/*
* this happens when the
* parent has set SIGCHLD to
* SIG_IGN . In that case we
* can only get error
* information for the child
* via its logging . We should
* stop using SIG_IGN on
* SIGCHLD in the standard
* process model .
*/
2017-09-11 02:39:39 +03:00
DBG_ERR ( " Error in waitpid() unexpectedly got ECHILD "
" for child %d (%s) - %s, someone has set SIGCHLD "
" to SIG_IGN! \n " ,
( int ) state - > pid , state - > name ,
strerror ( errno ) ) ;
2015-02-19 02:45:31 +03:00
TALLOC_FREE ( state ) ;
return ;
}
2017-09-11 02:39:39 +03:00
DBG_ERR ( " Error in waitpid() for child %d (%s) - %s \n " ,
( int ) state - > pid , state - > name , strerror ( errno ) ) ;
2015-02-19 02:45:31 +03:00
if ( errno = = 0 ) {
errno = ECHILD ;
}
2018-09-06 22:04:48 +03:00
goto done ;
2015-02-19 02:45:31 +03:00
}
if ( WIFEXITED ( status ) ) {
status = WEXITSTATUS ( status ) ;
2017-09-18 04:02:13 +03:00
if ( status ! = 0 ) {
DBG_ERR ( " Child %d (%s) exited with status %d \n " ,
( int ) state - > pid , state - > name , status ) ;
}
2015-02-19 02:45:31 +03:00
} else if ( WIFSIGNALED ( status ) ) {
status = WTERMSIG ( status ) ;
2017-09-11 02:39:39 +03:00
DBG_ERR ( " Child %d (%s) terminated with signal %d \n " ,
( int ) state - > pid , state - > name , status ) ;
2015-02-19 02:45:31 +03:00
}
2018-09-06 22:04:48 +03:00
done :
2015-02-19 02:45:31 +03:00
TALLOC_FREE ( state ) ;
2018-09-06 22:04:48 +03:00
if ( smbd_max_processes > 0 ) {
if ( connections_active < 1 ) {
DBG_ERR ( " Number of active connections "
" less than 1 (%d) \n " ,
connections_active ) ;
connections_active = 1 ;
}
connections_active - - ;
}
2015-02-19 02:45:31 +03:00
return ;
}
static struct standard_child_state * setup_standard_child_pipe ( struct tevent_context * ev ,
const char * name )
{
struct standard_child_state * state ;
int parent_child_pipe [ 2 ] ;
int ret ;
/*
* Prepare a pipe to allow us to know when the child exits ,
* because it will trigger a read event on this private
* pipe .
*
* We do all this before the accept and fork ( ) , so we can
* clean up if it fails .
*/
state = talloc_zero ( ev , struct standard_child_state ) ;
if ( state = = NULL ) {
return NULL ;
}
if ( name = = NULL ) {
name = " " ;
}
state - > name = talloc_strdup ( state , name ) ;
if ( state - > name = = NULL ) {
TALLOC_FREE ( state ) ;
return NULL ;
}
ret = pipe ( parent_child_pipe ) ;
if ( ret = = - 1 ) {
2017-09-11 02:39:39 +03:00
DBG_ERR ( " Failed to create parent-child pipe to handle "
" SIGCHLD to track new process for socket \n " ) ;
2015-02-19 02:45:31 +03:00
TALLOC_FREE ( state ) ;
return NULL ;
}
smb_set_close_on_exec ( parent_child_pipe [ 0 ] ) ;
smb_set_close_on_exec ( parent_child_pipe [ 1 ] ) ;
state - > from_child_fd = parent_child_pipe [ 0 ] ;
state - > to_parent_fd = parent_child_pipe [ 1 ] ;
/*
* The basic purpose of calling this handler is to ensure we
* call waitpid ( ) and so avoid zombies ( now that we no longer
* user SIGIGN on for SIGCHLD ) , but it also allows us to clean
* up other resources in the future .
*/
state - > from_child_fde = tevent_add_fd ( ev , state ,
state - > from_child_fd ,
TEVENT_FD_READ ,
standard_child_pipe_handler ,
state ) ;
if ( state - > from_child_fde = = NULL ) {
TALLOC_FREE ( state ) ;
return NULL ;
}
tevent_fd_set_auto_close ( state - > from_child_fde ) ;
return state ;
}
2003-08-13 05:53:07 +04:00
/*
2005-01-30 03:54:57 +03:00
called when a listening socket becomes readable .
2003-08-13 05:53:07 +04:00
*/
2017-09-14 22:09:23 +03:00
static void standard_accept_connection (
struct tevent_context * ev ,
struct loadparm_context * lp_ctx ,
struct socket_context * sock ,
void ( * new_conn ) ( struct tevent_context * ,
struct loadparm_context * ,
struct socket_context * ,
struct server_id ,
void * ,
void * ) ,
void * private_data ,
void * process_context )
2003-08-13 05:53:07 +04:00
{
2004-09-20 16:31:07 +04:00
NTSTATUS status ;
2005-01-30 03:54:57 +03:00
struct socket_context * sock2 ;
2004-09-20 16:31:07 +04:00
pid_t pid ;
2006-03-09 20:48:41 +03:00
struct socket_address * c , * s ;
2015-02-19 02:45:31 +03:00
struct standard_child_state * state ;
2017-04-08 01:12:51 +03:00
struct tevent_fd * fde = NULL ;
2017-04-08 01:31:57 +03:00
struct tevent_signal * se = NULL ;
2017-09-18 03:56:09 +03:00
struct process_context * proc_ctx = NULL ;
2015-02-19 02:45:31 +03:00
2004-07-14 01:04:56 +04:00
/* accept an incoming connection. */
2005-01-30 03:54:57 +03:00
status = socket_accept ( sock , & sock2 ) ;
2004-09-20 16:31:07 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2017-09-11 02:39:39 +03:00
DBG_DEBUG ( " standard_accept_connection: accept: %s \n " ,
nt_errstr ( status ) ) ;
2017-09-15 00:15:35 +03:00
/* this looks strange, but is correct. We need to throttle
* things until the system clears enough resources to handle
* this new socket
*/
2005-10-12 15:04:01 +04:00
sleep ( 1 ) ;
2003-08-13 05:53:07 +04:00
return ;
}
2017-09-18 03:56:09 +03:00
proc_ctx = talloc_get_type_abort ( process_context ,
struct process_context ) ;
2017-10-19 05:15:33 +03:00
if ( proc_ctx - > inhibit_fork_on_accept ) {
pid = getpid ( ) ;
/*
* Service does not support forking a new process on a
* new connection , either it ' s maintaining shared
* state or the overhead of forking a new process is a
* significant fraction of the response time .
*/
talloc_steal ( private_data , sock2 ) ;
new_conn ( ev , lp_ctx , sock2 ,
cluster_id ( pid , socket_get_fd ( sock2 ) ) , private_data ,
process_context ) ;
return ;
}
2018-09-06 22:04:48 +03:00
if ( smbd_max_processes > 0 ) {
if ( connections_active > = smbd_max_processes ) {
DBG_ERR ( " (%d) connections already active, "
" maximum is (%d). Dropping request \n " ,
connections_active ,
smbd_max_processes ) ;
/*
* Drop the connection as we ' re overloaded at the moment
*/
talloc_free ( sock2 ) ;
return ;
}
connections_active + + ;
}
2017-10-19 05:14:16 +03:00
state = setup_standard_child_pipe ( ev , NULL ) ;
if ( state = = NULL ) {
return ;
}
2003-08-13 05:53:07 +04:00
pid = fork ( ) ;
if ( pid ! = 0 ) {
2015-02-19 02:45:31 +03:00
close ( state - > to_parent_fd ) ;
state - > to_parent_fd = - 1 ;
if ( pid > 0 ) {
state - > pid = pid ;
} else {
TALLOC_FREE ( state ) ;
}
2003-08-13 05:53:07 +04:00
/* parent or error code ... */
2005-01-30 03:54:57 +03:00
talloc_free ( sock2 ) ;
2003-08-13 05:53:07 +04:00
/* go back to the event loop */
return ;
}
2015-02-19 02:45:31 +03:00
/* this leaves state->to_parent_fd open */
TALLOC_FREE ( state ) ;
2017-09-18 03:56:09 +03:00
/* Now in the child code so indicate that we forked
* so the terminate code knows what to do
*/
proc_ctx - > forked_on_accept = true ;
2006-03-09 20:48:41 +03:00
pid = getpid ( ) ;
2022-12-02 17:39:25 +03:00
process_set_title ( " %s[work] " , " task[%s] standard worker " , proc_ctx - > name ) ;
2020-02-21 23:07:19 +03:00
2005-01-30 03:54:57 +03:00
/* This is now the child code. We need a completely new event_context to work with */
2003-08-13 05:53:07 +04:00
2010-05-14 15:51:48 +04:00
if ( tevent_re_initialise ( ev ) ! = 0 ) {
smb_panic ( " Failed to re-initialise tevent after fork " ) ;
}
2005-01-30 03:54:57 +03:00
/* this will free all the listening sockets and all state that
is not associated with this new connection */
talloc_free ( sock ) ;
2004-10-29 11:00:14 +04:00
/* we don't care if the dup fails, as its only a select()
speed optimisation */
2005-01-30 03:54:57 +03:00
socket_dup ( sock2 ) ;
2003-08-13 05:53:07 +04:00
/* tdb needs special fork handling */
2009-10-23 07:31:07 +04:00
ldb_wrap_fork_hook ( ) ;
2003-08-13 05:53:07 +04:00
2017-03-29 21:11:37 +03:00
/* Must be done after a fork() to reset messaging contexts. */
status = imessaging_reinit_all ( ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
smb_panic ( " Failed to re-initialise imessaging after fork " ) ;
}
2017-09-18 03:56:09 +03:00
fde = tevent_add_fd ( ev , ev , proc_ctx - > from_parent_fd , TEVENT_FD_READ ,
2009-08-07 11:21:54 +04:00
standard_pipe_handler , NULL ) ;
2017-04-08 01:12:51 +03:00
if ( fde = = NULL ) {
smb_panic ( " Failed to add fd handler after fork " ) ;
}
2017-04-08 01:31:57 +03:00
se = tevent_add_signal ( ev ,
ev ,
SIGHUP ,
0 ,
sighup_signal_handler ,
NULL ) ;
if ( se = = NULL ) {
smb_panic ( " Failed to add SIGHUP handler after fork " ) ;
}
2017-04-08 01:45:41 +03:00
se = tevent_add_signal ( ev ,
ev ,
SIGTERM ,
0 ,
sigterm_signal_handler ,
NULL ) ;
if ( se = = NULL ) {
smb_panic ( " Failed to add SIGTERM handler after fork " ) ;
}
2006-03-09 20:48:41 +03:00
/* setup the process title */
2010-05-14 15:51:48 +04:00
c = socket_get_peer_addr ( sock2 , ev ) ;
s = socket_get_my_addr ( sock2 , ev ) ;
2006-03-09 20:48:41 +03:00
if ( s & & c ) {
2006-04-26 16:15:01 +04:00
setproctitle ( " conn c[%s:%u] s[%s:%u] server_id[%d] " ,
2010-12-12 14:33:08 +03:00
c - > addr , c - > port , s - > addr , s - > port , ( int ) pid ) ;
2006-03-09 20:48:41 +03:00
}
talloc_free ( c ) ;
talloc_free ( s ) ;
2020-11-26 17:24:26 +03:00
force_check_log_size ( ) ;
2012-06-12 02:32:19 +04:00
/* setup this new connection. Cluster ID is PID based for this process model */
2017-09-14 22:09:23 +03:00
new_conn ( ev , lp_ctx , sock2 , cluster_id ( pid , 0 ) , private_data ,
2017-09-18 03:56:09 +03:00
process_context ) ;
2004-07-14 01:04:56 +04:00
2005-01-30 03:54:57 +03:00
/* we can't return to the top level here, as that event context is gone,
so we now process events in the new event context until there are no
more to process */
2010-05-25 23:28:10 +04:00
tevent_loop_wait ( ev ) ;
2004-09-26 07:05:04 +04:00
2010-05-14 15:51:48 +04:00
talloc_free ( ev ) ;
2005-01-30 03:54:57 +03:00
exit ( 0 ) ;
2003-08-13 05:53:07 +04:00
}
2005-01-30 05:55:30 +03:00
/*
called to create a new server task
*/
2017-08-21 22:58:14 +03:00
static void standard_new_task ( struct tevent_context * ev ,
2008-01-06 04:03:43 +03:00
struct loadparm_context * lp_ctx ,
2008-02-04 09:59:16 +03:00
const char * service_name ,
2018-08-23 00:35:52 +03:00
struct task_server * ( * new_task ) ( struct tevent_context * , struct loadparm_context * lp_ctx , struct server_id , void * , void * ) ,
2017-08-21 22:58:14 +03:00
void * private_data ,
2017-09-14 22:09:23 +03:00
const struct service_details * service_details ,
2017-09-18 03:56:09 +03:00
int from_parent_fd )
2005-01-30 05:55:30 +03:00
{
pid_t pid ;
2017-03-29 21:11:37 +03:00
NTSTATUS status ;
2015-02-19 02:45:31 +03:00
struct standard_child_state * state ;
2017-04-08 01:12:51 +03:00
struct tevent_fd * fde = NULL ;
2017-04-08 01:31:57 +03:00
struct tevent_signal * se = NULL ;
2017-09-18 03:56:09 +03:00
struct process_context * proc_ctx = NULL ;
2018-08-23 00:35:52 +03:00
struct task_server * task = NULL ;
2015-02-19 02:45:31 +03:00
state = setup_standard_child_pipe ( ev , service_name ) ;
if ( state = = NULL ) {
return ;
}
2005-01-30 05:55:30 +03:00
pid = fork ( ) ;
if ( pid ! = 0 ) {
2015-02-19 02:45:31 +03:00
close ( state - > to_parent_fd ) ;
state - > to_parent_fd = - 1 ;
if ( pid > 0 ) {
state - > pid = pid ;
} else {
TALLOC_FREE ( state ) ;
}
2005-01-30 05:55:30 +03:00
/* parent or error code ... go back to the event loop */
return ;
}
2015-02-19 02:45:31 +03:00
/* this leaves state->to_parent_fd open */
TALLOC_FREE ( state ) ;
2006-03-09 20:48:41 +03:00
pid = getpid ( ) ;
2005-01-30 05:55:30 +03:00
/* this will free all the listening sockets and all state that
is not associated with this new connection */
2010-03-26 13:13:55 +03:00
if ( tevent_re_initialise ( ev ) ! = 0 ) {
smb_panic ( " Failed to re-initialise tevent after fork " ) ;
}
2005-01-30 05:55:30 +03:00
2009-10-23 07:50:56 +04:00
/* ldb/tdb need special fork handling */
2009-10-23 07:31:07 +04:00
ldb_wrap_fork_hook ( ) ;
2005-01-30 05:55:30 +03:00
2017-03-29 21:11:37 +03:00
/* Must be done after a fork() to reset messaging contexts. */
status = imessaging_reinit_all ( ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
smb_panic ( " Failed to re-initialise imessaging after fork " ) ;
}
2017-08-21 22:58:14 +03:00
fde = tevent_add_fd ( ev , ev , from_parent_fd , TEVENT_FD_READ ,
2009-08-07 11:21:54 +04:00
standard_pipe_handler , NULL ) ;
2017-04-08 01:12:51 +03:00
if ( fde = = NULL ) {
smb_panic ( " Failed to add fd handler after fork " ) ;
}
2009-08-07 11:21:54 +04:00
2017-04-08 01:31:57 +03:00
se = tevent_add_signal ( ev ,
ev ,
SIGHUP ,
0 ,
sighup_signal_handler ,
NULL ) ;
if ( se = = NULL ) {
smb_panic ( " Failed to add SIGHUP handler after fork " ) ;
}
2017-04-08 01:45:41 +03:00
se = tevent_add_signal ( ev ,
ev ,
SIGTERM ,
0 ,
sigterm_signal_handler ,
NULL ) ;
if ( se = = NULL ) {
smb_panic ( " Failed to add SIGTERM handler after fork " ) ;
}
2022-12-02 17:39:25 +03:00
process_set_title ( " %s[task] " , " task[%s] " , service_name ) ;
2017-09-18 03:56:09 +03:00
2020-11-26 17:24:44 +03:00
force_check_log_size ( ) ;
2017-09-18 03:56:09 +03:00
/*
* Set up the process context to be passed through to the terminate
* and accept_connection functions
*/
proc_ctx = talloc ( ev , struct process_context ) ;
proc_ctx - > name = talloc_strdup ( ev , service_name ) ;
proc_ctx - > from_parent_fd = from_parent_fd ;
proc_ctx - > inhibit_fork_on_accept =
service_details - > inhibit_fork_on_accept ;
proc_ctx - > forked_on_accept = false ;
2006-03-09 20:48:41 +03:00
2018-09-06 22:04:48 +03:00
smbd_max_processes = lpcfg_max_smbd_processes ( lp_ctx ) ;
2012-06-12 02:32:19 +04:00
/* setup this new task. Cluster ID is PID based for this process model */
2018-08-23 00:35:52 +03:00
task = new_task ( ev , lp_ctx , cluster_id ( pid , 0 ) , private_data , proc_ctx ) ;
/*
* Currently we don ' t support the post_fork functionality in the
* standard model , i . e . it is only called here not after a new process
* is forked in standard_accept_connection .
*/
if ( task ! = NULL & & service_details - > post_fork ! = NULL ) {
2018-08-29 04:16:08 +03:00
struct process_details pd = initial_process_details ;
service_details - > post_fork ( task , & pd ) ;
2018-08-23 00:35:52 +03:00
}
2005-01-30 05:55:30 +03:00
/* we can't return to the top level here, as that event context is gone,
so we now process events in the new event context until there are no
2017-09-14 22:09:23 +03:00
more to process */
2010-05-25 23:28:10 +04:00
tevent_loop_wait ( ev ) ;
2005-01-30 05:55:30 +03:00
2010-05-14 15:51:48 +04:00
talloc_free ( ev ) ;
2005-01-30 05:55:30 +03:00
exit ( 0 ) ;
}
2004-07-14 01:04:56 +04:00
2005-01-30 05:55:30 +03:00
/* called when a task goes down */
2018-09-04 03:12:49 +03:00
static void standard_terminate_task ( struct tevent_context * ev ,
struct loadparm_context * lp_ctx ,
const char * reason ,
bool fatal ,
void * process_context )
{
if ( fatal = = true ) {
exit ( 127 ) ;
}
exit ( 0 ) ;
}
/* called when a connection terminates*/
static void standard_terminate_connection ( struct tevent_context * ev ,
struct loadparm_context * lp_ctx ,
const char * reason ,
void * process_context )
2003-12-14 02:25:15 +03:00
{
2017-09-18 03:56:09 +03:00
struct process_context * proc_ctx = NULL ;
2018-09-04 03:12:49 +03:00
DBG_DEBUG ( " connection terminating reason[%s] \n " , reason ) ;
2017-09-18 03:56:09 +03:00
if ( process_context = = NULL ) {
smb_panic ( " Panicking process_context is NULL " ) ;
}
proc_ctx = talloc_get_type ( process_context , struct process_context ) ;
if ( proc_ctx - > forked_on_accept = = false ) {
/*
* The current task was not forked on accept , so it needs to
* keep running and process requests from other connections
*/
return ;
}
/*
* The current process was forked on accept to handle a single
* connection / request . That request has now finished and the process
* should terminate
*/
2004-07-15 13:43:32 +04:00
2007-12-04 03:51:44 +03:00
/* this reload_charcnv() has the effect of freeing the iconv context memory,
2004-09-26 10:44:08 +04:00
which makes leak checking easier */
2008-09-30 05:20:46 +04:00
reload_charcnv ( lp_ctx ) ;
2004-09-26 10:44:08 +04:00
2017-04-08 01:08:13 +03:00
/* Always free event context last before exit. */
talloc_free ( ev ) ;
2005-01-14 04:32:56 +03:00
/* terminate this process */
exit ( 0 ) ;
2004-02-02 16:43:03 +03:00
}
2006-03-09 20:48:41 +03:00
/* called to set a title of a task or connection */
2008-12-29 22:24:57 +03:00
static void standard_set_title ( struct tevent_context * ev , const char * title )
2006-03-09 20:48:41 +03:00
{
if ( title ) {
2006-04-26 16:15:01 +04:00
setproctitle ( " %s " , title ) ;
2006-03-09 20:48:41 +03:00
} else {
2006-04-26 16:15:01 +04:00
setproctitle ( NULL ) ;
2006-03-09 20:48:41 +03:00
}
}
2005-01-30 03:54:57 +03:00
2005-01-14 04:32:56 +03:00
static const struct model_ops standard_ops = {
. name = " standard " ,
. model_init = standard_model_init ,
. accept_connection = standard_accept_connection ,
2018-09-04 03:12:49 +03:00
. new_task = standard_new_task ,
. terminate_task = standard_terminate_task ,
. terminate_connection = standard_terminate_connection ,
. set_title = standard_set_title ,
2005-01-14 04:32:56 +03:00
} ;
2003-08-13 05:53:07 +04:00
/*
2004-02-02 16:43:03 +03:00
initialise the standard process model , registering ourselves with the process model subsystem
2003-08-13 05:53:07 +04:00
*/
2017-04-20 22:24:43 +03:00
NTSTATUS process_model_standard_init ( TALLOC_CTX * ctx )
2003-08-13 05:53:07 +04:00
{
2005-01-30 03:54:57 +03:00
return register_process_model ( & standard_ops ) ;
2003-08-13 05:53:07 +04:00
}