/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2015 Nexenta Systems, Inc. All rights reserved.
*/
#include <stdio.h>
#include <string.h>
#include <strings.h>
#include <stdlib.h>
#include <unistd.h>
#include <stdarg.h>
#include <fcntl.h>
#include <wait.h>
#include <signal.h>
#include <atomic.h>
#include <libscf.h>
#include <limits.h>
#include <priv_utils.h>
#include <door.h>
#include <errno.h>
#include <pthread.h>
#include <time.h>
#include <libscf.h>
#include <zone.h>
#include <libgen.h>
#include <pwd.h>
#include <grp.h>
#include <smbsrv/smb_door.h>
#include <smbsrv/smb_ioctl.h>
#include <smbsrv/libsmbns.h>
#include <smbsrv/libmlsvc.h>
#include "smbd.h"
static int smbd_daemonize_init(void);
static void smbd_daemonize_fini(int, int);
static int smbd_kernel_bind(void);
static void smbd_kernel_unbind(void);
static int smbd_already_running(void);
static int smbd_service_init(void);
static void smbd_service_fini(void);
static int32_t smbd_gmtoff(void);
static void smbd_localtime_init(void);
static void *smbd_localtime_monitor(void *arg);
static void smbd_dyndns_init(void);
static void smbd_load_shares(void);
static void *smbd_share_loader(void *);
static void smbd_refresh_handler(void);
static int smbd_kernel_start(void);
/*
* Use SMF error codes only on return or exit.
*/
int
{
int sigval;
int orig_limit;
#ifdef FKSMBD
fksmbd_init();
#endif
return (SMF_EXIT_ERR_FATAL);
#ifdef FKSMBD
/* Can't manipulate privileges in daemonize. */
}
#else /* FKSMBD */
return (SMF_EXIT_ERR_FATAL);
#endif /* FKSMBD */
}
if (is_system_labeled()) {
smbd_report("Trusted Extensions not supported");
return (SMF_EXIT_ERR_FATAL);
}
if (smbd_already_running())
return (SMF_EXIT_OK);
/*
* Raise the file descriptor limit to accommodate simultaneous user
* authentications/file access.
*/
smbd_report("Failed to raise file descriptor limit"
}
/*
* Block async signals in all threads.
*/
(void) sigemptyset(&set);
if (smbd_service_init() != 0) {
smbd_report("service initialization failed");
}
} else {
/*
* "pfd" is a pipe descriptor -- any fatal errors
* during subsequent initialization of the child
* process should be written to this pipe and the
* parent will report this error as the exit status.
*/
pfd = smbd_daemonize_init();
if (smbd_service_init() != 0) {
smbd_report("daemon initialization failed");
}
}
while (!smbd.s_shutting_down) {
switch (sigval) {
case -1:
break;
case SIGPIPE:
break;
case SIGHUP:
break;
case SIGUSR1:
break;
default:
/*
* Typically SIGINT or SIGTERM.
*/
break;
}
}
/*
* Allow termination signals while shutting down.
*/
(void) sigemptyset(&set);
}
}
/*
* This function will fork off a child process,
* from which only the child will return.
*
* Use SMF error codes only on exit.
*/
static int
smbd_daemonize_init(void)
{
int rc;
/*
* Reset privileges to the minimum set required. We continue
* to run as root to create and access files in /var.
*/
if (rc != 0) {
smbd_report("insufficient privileges");
}
/*
* Block all signals prior to the fork and leave them blocked in the
* parent so we don't get in a situation where the parent gets SIGINT
* and returns non-zero exit status and the child is actually running.
* In the child, restore the signal mask once we've done our setsid().
*/
(void) sigfillset(&set);
smbd_report("unable to create pipe");
}
closelog();
smbd_report("unable to fork");
closelog();
}
/*
* If we're the parent process, wait for either the child to send us
* the appropriate exit status over the pipe or for the read to fail
* (presumably with 0 for EOF if our child terminated abnormally).
* If the read fails, exit with either the child's exit status if it
* exited or with SMF_EXIT_ERR_FATAL if it died from a fatal signal.
*/
if (pid != 0) {
}
(void) setsid();
(void) chdir("/");
(void) umask(022);
return (pfds[1]);
}
/*
* This function is based on __init_daemon_priv() and replaces
* __init_daemon_priv() since we want smbd to have all privileges so that it
* connection/disconnection. Unused privileges are disabled until command
* execution. The permitted and the limit set contains all privileges. The
* inheritable set contains no privileges.
*/
static int
{
/*
* This is not a significant failure: it allows us to start programs
* with sufficient privileges and with the proper uid. We don't
* care enough about the extra groups in that case.
*/
if (flags & PU_RESETGROUPS)
goto end;
perm = priv_allocset();
goto end;
/* E = P */
/* Now reset suid and euid */
goto end;
/* I = 0 */
end:
getpid());
} else {
(void) core_set_process_path(daemon_cp,
}
}
(void) setpflags(__PROC_PROTECT, 0);
return (ret);
}
/*
* Most privileges, except the ones that are required for smbd, are turn off
* in the effective set. They will be turn on when needed for command
* execution during share connection/disconnection.
*/
static void
{
/*
* Now that we're running, if a pipe fd was specified, write an exit
* status to it to indicate that our parent process can safely detach.
* Then proceed to loading the remaining non-built-in modules.
*/
if (fd >= 0)
pset = priv_allocset();
return;
/* list of privileges for smbd */
/* turn off unneeded privileges */
/* reenable core dumps */
}
/*
* smbd_service_init
*/
static int
smbd_service_init(void)
{
static struct dir {
char *name;
int perm;
} dir[] = {
{ SMB_DBDIR, 0700 },
{ SMB_CVOL, 0755 },
{ SMB_SYSROOT, 0755 },
{ SMB_SYSTEM32, 0755 },
{ SMB_VSS, 0755 },
{ SMB_PIPE_DIR, 0755 },
};
int rc, i;
/*
* Stop for a debugger attach here, which is after the
* fork() etc. in smb_daemonize_init()
*/
if (smbd.s_dbg_stop) {
}
return (-1);
}
}
/*
* This environment variable tells mech_krb5 to give us
* MS-compatible behavior.
*/
(void) putenv("MS_INTEROP=1");
if (rc == -1)
else
smbd_report("unable to set KRB5CCNAME");
return (-1);
}
#ifndef FKSMBD
/* Upgrade SMF settings, if necessary. */
#endif
rc = smbd_cups_init();
if (smbd_nicmon_start(SMBD_DEFAULT_INSTANCE_FMRI) != 0)
smbd_report("NIC monitor failed to start");
smb_ipc_init();
if (smb_config_getbool(SMB_CI_NETBIOS_ENABLE) == 0)
smbd_report("NetBIOS services disabled");
else if (smb_netbios_start() != 0)
smbd_report("NetBIOS services failed to start");
else
smbd_report("NetBIOS services started");
if (rc == SMB_DOMAIN_NOMACHINE_SID) {
"no machine SID: check idmap configuration");
return (-1);
}
}
if (smbd_dc_monitor_init() != 0)
smbd_report("DC monitor initialization failed %s",
if (smbd_pipesvc_start() != 0) {
smbd_report("pipesvc initialization failed");
return (-1);
}
if (smbd_authsvc_start() != 0) {
smbd_report("authsvc initialization failed");
return (-1);
}
if (smbd.s_door_srv < 0) {
return (-1);
}
(void) smb_lgrp_start();
if (smb_shr_start() != 0) {
return (-1);
}
if (smbd.s_door_lmshr < 0)
smbd_report("share initialization failed");
/* Open the driver, load the kernel config. */
if (smbd_kernel_bind() != 0) {
return (-1);
}
smbd_report("service initialized");
return (0);
}
/*
* Shutdown smbd and smbsrv kernel services.
*
* Called only by the main thread.
*/
static void
smbd_service_fini(void)
{
smbd_report("service shutting down");
smb_shr_stop();
dyndns_stop();
smb_pwd_fini();
mlsvc_fini();
smbd_report("service terminated");
closelog();
}
/*
* Called when SMF sends us a SIGHUP. Update the smbd configuration
* from SMF and check for changes that require service reconfiguration.
*/
static void
{
int new_debug;
if (smbd.s_shutting_down)
return;
smbd.s_refreshes++;
/*
* Clear the DNS zones for the existing interfaces
* before updating the NIC interface list.
*/
if (smbd_nicmon_refresh() != 0)
smbd_report("NIC monitor refresh failed");
/* This reloads the in-kernel config. */
(void) smbd_kernel_bind();
}
void
{
switch (secmode) {
case SMB_SECMODE_WORKGRP:
case SMB_SECMODE_DOMAIN:
(void) smb_config_set_secmode(secmode);
break;
default:
(void) smb_smf_maintenance_mode();
}
}
/*
* The service is online if initialization is complete and shutdown
* has not begun.
*/
smbd_online(void)
{
}
/*
* Wait until the service is online. Provided for threads that
* should wait until the service has been fully initialized before
* they start performing operations.
*/
void
{
while (!smbd_online())
(void) sleep(SMBD_ONLINE_WAIT_INTERVAL);
}
}
/*
* If the door has already been opened by another process (non-zero pid
* in target), we assume that another smbd is already running. If there
* is a race here, it will be caught later when smbsrv is opened because
* only one process is allowed to open the device at a time.
*/
static int
smbd_already_running(void)
{
char *door_name;
int door;
return (0);
return (0);
return (1);
}
return (0);
}
/*
* smbd_kernel_bind
*
* If smbsrv is already bound, reload the configuration and update smbsrv.
* Otherwise, open the smbsrv device and start the kernel service.
*/
static int
smbd_kernel_bind(void)
{
int rc;
if (rc < 0)
smbd_report("kernel configuration update failed: %s",
return (rc);
}
if (smb_kmod_isbound())
if ((rc = smb_kmod_bind()) == 0) {
rc = smbd_kernel_start();
if (rc != 0)
else
} else {
}
return (rc);
}
static int
smbd_kernel_start(void)
{
int rc;
if (rc != 0) {
return (rc);
}
if (rc != 0) {
return (rc);
}
if (rc != 0) {
return (rc);
}
return (0);
}
/*
* smbd_kernel_unbind
*/
static void
smbd_kernel_unbind(void)
{
}
/*
* Create the Dynamic DNS publisher thread.
*/
static void
smbd_dyndns_init(void)
{
int rc;
dyndns_start();
(void) pthread_attr_init(&attr);
(void) pthread_attr_destroy(&attr);
if (rc != 0)
smbd_report("unable to start dyndns publisher: %s",
}
/*
* Launches a thread to populate the share cache by share information
* stored in sharemgr
*/
static void
smbd_load_shares(void)
{
int rc;
(void) pthread_attr_init(&attr);
(void) pthread_attr_destroy(&attr);
if (rc != 0)
}
static void *
{
(void) smb_shr_load(args);
return (NULL);
}
/*
* Initialization of the localtime thread.
* Returns 0 on success, an error number if thread creation fails.
*/
static void
smbd_localtime_init(void)
{
int rc;
(void) pthread_attr_init(&attr);
(void) pthread_attr_destroy(&attr);
if (rc != 0)
}
/*
* Send local gmtoff to the kernel module one time at startup and each
* time it changes (up to twice a year).
* Local gmtoff is checked once every 15 minutes since some timezones
* are aligned on half and quarter hour boundaries.
*/
/*ARGSUSED*/
static void *
{
int timeout;
int error;
smbd_online_wait("smbd_localtime_monitor");
for (;;) {
gmtoff = smbd_gmtoff();
if (error != 0)
smbd_report("localtime set failed: %s",
}
/*
* Align the next iteration on a fifteen minute boundary.
*/
}
/*NOTREACHED*/
return (NULL);
}
/*
* smbd_gmtoff
*
* Determine offset from GMT. If daylight saving time use altzone,
* otherwise use timezone.
*/
static int32_t
smbd_gmtoff(void)
{
return (gmtoff);
}
/*
* Set up configuration options and parse the command line.
* This function will determine if we will run as a daemon
* or in the foreground.
*
* Failure to find a uid or gid results in using the default (0).
*/
static int
{
int c;
switch (c) {
case 'd':
break;
case 'f':
break;
case 's':
break;
case ':':
case '?':
default:
return (-1);
}
}
return (0);
}
static void
{
static char *help[] = {
"-d enable debug messages"
"-f run program in foreground"
};
int i;
}
void
{
return;
}
/*
* Enable libumem debugging by default on DEBUG builds.
*/
#ifdef DEBUG
const char *
_umem_debug_init(void)
{
return ("default,verbose"); /* $UMEM_DEBUG setting */
}
const char *
_umem_logging_init(void)
{
return ("fail,contents"); /* $UMEM_LOGGING setting */
}
#endif