1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
|
/*
Unix SMB/CIFS implementation.
process model: process (1 process handles all client connections)
Copyright (C) Andrew Tridgell 2003
Copyright (C) James J Myers 2003 <myersjj@samba.org>
Copyright (C) Stefan (metze) Metzmacher 2004
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "includes.h"
#include "smb_server/smb_server.h"
/* For sepecifiying event context to GSSAPI below */
#include "system/kerberos.h"
#include "heimdal/lib/gssapi/gssapi_locl.h"
/*
called when the process model is selected
*/
static void single_model_init(struct event_context *ev)
{
/* Hack to ensure that GSSAPI uses the right event context */
gssapi_krb5_init_ev(ev);
}
/*
called when a listening socket becomes readable.
*/
static void single_accept_connection(struct event_context *ev,
struct socket_context *sock,
void (*new_conn)(struct event_context *, struct socket_context *,
uint32_t , void *),
void *private)
{
NTSTATUS status;
struct socket_context *sock2;
/* accept an incoming connection. */
status = socket_accept(sock, &sock2);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("accept_connection_single: accept: %s\n", nt_errstr(status)));
/* this looks strange, but is correct. We need to
throttle things until the system clears enough
resources to handle this new socket. If we don't
then we will spin filling the log and causing more
problems. We don't panic as this is probably a
temporary resource constraint */
sleep(1);
return;
}
talloc_steal(private, sock);
new_conn(ev, sock2, socket_get_fd(sock2), private);
}
/*
called to startup a new task
*/
static void single_new_task(struct event_context *ev,
void (*new_task)(struct event_context *, uint32_t, void *),
void *private)
{
static uint32_t taskid = 0x10000000;
new_task(ev, taskid++, private);
}
/* called when a task goes down */
static void single_terminate(struct event_context *ev, const char *reason)
{
DEBUG(2,("single_terminate: reason[%s]\n",reason));
}
static const struct model_ops single_ops = {
.name = "single",
.model_init = single_model_init,
.new_task = single_new_task,
.accept_connection = single_accept_connection,
.terminate = single_terminate,
};
/*
initialise the single process model, registering ourselves with the
process model subsystem
*/
NTSTATUS process_model_single_init(void)
{
return register_process_model(&single_ops);
}
|