1 | /*
|
---|
2 | * implementation of an Shadow Copy module - version 2
|
---|
3 | *
|
---|
4 | * Copyright (C) Andrew Tridgell 2007
|
---|
5 | * Copyright (C) Ed Plese 2009
|
---|
6 | *
|
---|
7 | * This program is free software; you can redistribute it and/or modify
|
---|
8 | * it under the terms of the GNU General Public License as published by
|
---|
9 | * the Free Software Foundation; either version 2 of the License, or
|
---|
10 | * (at your option) any later version.
|
---|
11 | *
|
---|
12 | * This program is distributed in the hope that it will be useful,
|
---|
13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
15 | * GNU General Public License for more details.
|
---|
16 | *
|
---|
17 | * You should have received a copy of the GNU General Public License
|
---|
18 | * along with this program; if not, write to the Free Software
|
---|
19 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
---|
20 | */
|
---|
21 |
|
---|
22 | #include "includes.h"
|
---|
23 | #include "smbd/smbd.h"
|
---|
24 | #include "smbd/globals.h"
|
---|
25 | #include "../libcli/security/security.h"
|
---|
26 | #include "system/filesys.h"
|
---|
27 | #include "ntioctl.h"
|
---|
28 |
|
---|
29 | /*
|
---|
30 |
|
---|
31 | This is a 2nd implemetation of a shadow copy module for exposing
|
---|
32 | snapshots to windows clients as shadow copies. This version has the
|
---|
33 | following features:
|
---|
34 |
|
---|
35 | 1) you don't need to populate your shares with symlinks to the
|
---|
36 | snapshots. This can be very important when you have thousands of
|
---|
37 | shares, or use [homes]
|
---|
38 |
|
---|
39 | 2) the inode number of the files is altered so it is different
|
---|
40 | from the original. This allows the 'restore' button to work
|
---|
41 | without a sharing violation
|
---|
42 |
|
---|
43 | 3) shadow copy results can be sorted before being sent to the
|
---|
44 | client. This is beneficial for filesystems that don't read
|
---|
45 | directories alphabetically (the default unix).
|
---|
46 |
|
---|
47 | 4) vanity naming for snapshots. Snapshots can be named in any
|
---|
48 | format compatible with str[fp]time conversions.
|
---|
49 |
|
---|
50 | 5) time stamps in snapshot names can be represented in localtime
|
---|
51 | rather than UTC.
|
---|
52 |
|
---|
53 | Module options:
|
---|
54 |
|
---|
55 | shadow:snapdir = <directory where snapshots are kept>
|
---|
56 |
|
---|
57 | This is the directory containing the @GMT-* snapshot directories. If it is an absolute
|
---|
58 | path it is used as-is. If it is a relative path, then it is taken relative to the mount
|
---|
59 | point of the filesystem that the root of this share is on
|
---|
60 |
|
---|
61 | shadow:basedir = <base directory that snapshots are from>
|
---|
62 |
|
---|
63 | This is an optional parameter that specifies the directory that
|
---|
64 | the snapshots are relative to. It defaults to the filesystem
|
---|
65 | mount point
|
---|
66 |
|
---|
67 | shadow:fixinodes = yes/no
|
---|
68 |
|
---|
69 | If you enable shadow:fixinodes then this module will modify the
|
---|
70 | apparent inode number of files in the snapshot directories using
|
---|
71 | a hash of the files path. This is needed for snapshot systems
|
---|
72 | where the snapshots have the same device:inode number as the
|
---|
73 | original files (such as happens with GPFS snapshots). If you
|
---|
74 | don't set this option then the 'restore' button in the shadow
|
---|
75 | copy UI will fail with a sharing violation.
|
---|
76 |
|
---|
77 | shadow:sort = asc/desc, or not specified for unsorted (default)
|
---|
78 |
|
---|
79 | This is an optional parameter that specifies that the shadow
|
---|
80 | copy directories should be sorted before sending them to the
|
---|
81 | client. This can be beneficial as unix filesystems are usually
|
---|
82 | not listed alphabetically sorted. If enabled, you typically
|
---|
83 | want to specify descending order.
|
---|
84 |
|
---|
85 | shadow:format = <format specification for snapshot names>
|
---|
86 |
|
---|
87 | This is an optional parameter that specifies the format
|
---|
88 | specification for the naming of snapshots. The format must
|
---|
89 | be compatible with the conversion specifications recognized
|
---|
90 | by str[fp]time. The default value is "@GMT-%Y.%m.%d-%H.%M.%S".
|
---|
91 |
|
---|
92 | shadow:localtime = yes/no (default is no)
|
---|
93 |
|
---|
94 | This is an optional parameter that indicates whether the
|
---|
95 | snapshot names are in UTC/GMT or the local time.
|
---|
96 |
|
---|
97 |
|
---|
98 | The following command would generate a correctly formatted directory name
|
---|
99 | for use with the default parameters:
|
---|
100 | date -u +@GMT-%Y.%m.%d-%H.%M.%S
|
---|
101 |
|
---|
102 | */
|
---|
103 |
|
---|
104 | static int vfs_shadow_copy2_debug_level = DBGC_VFS;
|
---|
105 |
|
---|
106 | #undef DBGC_CLASS
|
---|
107 | #define DBGC_CLASS vfs_shadow_copy2_debug_level
|
---|
108 |
|
---|
109 | #define GMT_NAME_LEN 24 /* length of a @GMT- name */
|
---|
110 | #define SHADOW_COPY2_GMT_FORMAT "@GMT-%Y.%m.%d-%H.%M.%S"
|
---|
111 |
|
---|
112 | #define SHADOW_COPY2_DEFAULT_SORT NULL
|
---|
113 | #define SHADOW_COPY2_DEFAULT_FORMAT "@GMT-%Y.%m.%d-%H.%M.%S"
|
---|
114 | #define SHADOW_COPY2_DEFAULT_LOCALTIME false
|
---|
115 |
|
---|
116 | /*
|
---|
117 | make very sure it is one of our special names
|
---|
118 | */
|
---|
119 | static inline bool shadow_copy2_match_name(const char *name, const char **gmt_start)
|
---|
120 | {
|
---|
121 | unsigned year, month, day, hr, min, sec;
|
---|
122 | const char *p;
|
---|
123 | if (gmt_start) {
|
---|
124 | (*gmt_start) = NULL;
|
---|
125 | }
|
---|
126 | p = strstr_m(name, "@GMT-");
|
---|
127 | if (p == NULL) return false;
|
---|
128 | if (p > name && p[-1] != '/') return False;
|
---|
129 | if (sscanf(p, "@GMT-%04u.%02u.%02u-%02u.%02u.%02u", &year, &month,
|
---|
130 | &day, &hr, &min, &sec) != 6) {
|
---|
131 | return False;
|
---|
132 | }
|
---|
133 | if (p[24] != 0 && p[24] != '/') {
|
---|
134 | return False;
|
---|
135 | }
|
---|
136 | if (gmt_start) {
|
---|
137 | (*gmt_start) = p;
|
---|
138 | }
|
---|
139 | return True;
|
---|
140 | }
|
---|
141 |
|
---|
142 | static char *shadow_copy2_snapshot_to_gmt(TALLOC_CTX *mem_ctx,
|
---|
143 | vfs_handle_struct *handle, const char *name)
|
---|
144 | {
|
---|
145 | struct tm timestamp;
|
---|
146 | time_t timestamp_t;
|
---|
147 | char gmt[GMT_NAME_LEN + 1];
|
---|
148 | const char *fmt;
|
---|
149 |
|
---|
150 | fmt = lp_parm_const_string(SNUM(handle->conn), "shadow",
|
---|
151 | "format", SHADOW_COPY2_DEFAULT_FORMAT);
|
---|
152 |
|
---|
153 | ZERO_STRUCT(timestamp);
|
---|
154 | if (strptime(name, fmt, ×tamp) == NULL) {
|
---|
155 | DEBUG(10, ("shadow_copy2_snapshot_to_gmt: no match %s: %s\n",
|
---|
156 | fmt, name));
|
---|
157 | return NULL;
|
---|
158 | }
|
---|
159 |
|
---|
160 | DEBUG(10, ("shadow_copy2_snapshot_to_gmt: match %s: %s\n", fmt, name));
|
---|
161 | if (lp_parm_bool(SNUM(handle->conn), "shadow", "localtime",
|
---|
162 | SHADOW_COPY2_DEFAULT_LOCALTIME))
|
---|
163 | {
|
---|
164 | timestamp.tm_isdst = -1;
|
---|
165 | timestamp_t = mktime(×tamp);
|
---|
166 | gmtime_r(×tamp_t, ×tamp);
|
---|
167 | }
|
---|
168 | strftime(gmt, sizeof(gmt), SHADOW_COPY2_GMT_FORMAT, ×tamp);
|
---|
169 |
|
---|
170 | return talloc_strdup(mem_ctx, gmt);
|
---|
171 | }
|
---|
172 |
|
---|
173 | /*
|
---|
174 | shadow copy paths can also come into the server in this form:
|
---|
175 |
|
---|
176 | /foo/bar/@GMT-XXXXX/some/file
|
---|
177 |
|
---|
178 | This function normalises the filename to be of the form:
|
---|
179 |
|
---|
180 | @GMT-XXXX/foo/bar/some/file
|
---|
181 | */
|
---|
182 | static const char *shadow_copy2_normalise_path(TALLOC_CTX *mem_ctx, const char *path, const char *gmt_start)
|
---|
183 | {
|
---|
184 | char *pcopy;
|
---|
185 | char buf[GMT_NAME_LEN];
|
---|
186 | size_t prefix_len;
|
---|
187 |
|
---|
188 | if (path == gmt_start) {
|
---|
189 | return path;
|
---|
190 | }
|
---|
191 |
|
---|
192 | prefix_len = gmt_start - path - 1;
|
---|
193 |
|
---|
194 | DEBUG(10, ("path=%s, gmt_start=%s, prefix_len=%d\n", path, gmt_start,
|
---|
195 | (int)prefix_len));
|
---|
196 |
|
---|
197 | /*
|
---|
198 | * We've got a/b/c/@GMT-YYYY.MM.DD-HH.MM.SS/d/e. convert to
|
---|
199 | * @GMT-YYYY.MM.DD-HH.MM.SS/a/b/c/d/e before further
|
---|
200 | * processing. As many VFS calls provide a const char *,
|
---|
201 | * unfortunately we have to make a copy.
|
---|
202 | */
|
---|
203 |
|
---|
204 | pcopy = talloc_strdup(talloc_tos(), path);
|
---|
205 | if (pcopy == NULL) {
|
---|
206 | return NULL;
|
---|
207 | }
|
---|
208 |
|
---|
209 | gmt_start = pcopy + prefix_len;
|
---|
210 |
|
---|
211 | /*
|
---|
212 | * Copy away "@GMT-YYYY.MM.DD-HH.MM.SS"
|
---|
213 | */
|
---|
214 | memcpy(buf, gmt_start+1, GMT_NAME_LEN);
|
---|
215 |
|
---|
216 | /*
|
---|
217 | * Make space for it including a trailing /
|
---|
218 | */
|
---|
219 | memmove(pcopy + GMT_NAME_LEN + 1, pcopy, prefix_len);
|
---|
220 |
|
---|
221 | /*
|
---|
222 | * Move in "@GMT-YYYY.MM.DD-HH.MM.SS/" at the beginning again
|
---|
223 | */
|
---|
224 | memcpy(pcopy, buf, GMT_NAME_LEN);
|
---|
225 | pcopy[GMT_NAME_LEN] = '/';
|
---|
226 |
|
---|
227 | DEBUG(10, ("shadow_copy2_normalise_path: %s -> %s\n", path, pcopy));
|
---|
228 |
|
---|
229 | return pcopy;
|
---|
230 | }
|
---|
231 |
|
---|
232 | /*
|
---|
233 | convert a name to the shadow directory
|
---|
234 | */
|
---|
235 |
|
---|
236 | #define _SHADOW2_NEXT(op, args, rtype, eret, extra) do { \
|
---|
237 | const char *name = fname; \
|
---|
238 | const char *gmt_start; \
|
---|
239 | if (shadow_copy2_match_name(fname, &gmt_start)) { \
|
---|
240 | char *name2; \
|
---|
241 | rtype ret; \
|
---|
242 | name2 = convert_shadow2_name(handle, fname, gmt_start); \
|
---|
243 | if (name2 == NULL) { \
|
---|
244 | errno = EINVAL; \
|
---|
245 | return eret; \
|
---|
246 | } \
|
---|
247 | name = name2; \
|
---|
248 | ret = SMB_VFS_NEXT_ ## op args; \
|
---|
249 | talloc_free(name2); \
|
---|
250 | if (ret != eret) extra; \
|
---|
251 | return ret; \
|
---|
252 | } else { \
|
---|
253 | return SMB_VFS_NEXT_ ## op args; \
|
---|
254 | } \
|
---|
255 | } while (0)
|
---|
256 |
|
---|
257 | #define _SHADOW2_NEXT_SMB_FNAME(op, args, rtype, eret, extra) do { \
|
---|
258 | const char *gmt_start; \
|
---|
259 | if (shadow_copy2_match_name(smb_fname->base_name, &gmt_start)) { \
|
---|
260 | char *name2; \
|
---|
261 | char *smb_base_name_tmp = NULL; \
|
---|
262 | rtype ret; \
|
---|
263 | name2 = convert_shadow2_name(handle, smb_fname->base_name, gmt_start); \
|
---|
264 | if (name2 == NULL) { \
|
---|
265 | errno = EINVAL; \
|
---|
266 | return eret; \
|
---|
267 | } \
|
---|
268 | smb_base_name_tmp = smb_fname->base_name; \
|
---|
269 | smb_fname->base_name = name2; \
|
---|
270 | ret = SMB_VFS_NEXT_ ## op args; \
|
---|
271 | smb_fname->base_name = smb_base_name_tmp; \
|
---|
272 | talloc_free(name2); \
|
---|
273 | if (ret != eret) extra; \
|
---|
274 | return ret; \
|
---|
275 | } else { \
|
---|
276 | return SMB_VFS_NEXT_ ## op args; \
|
---|
277 | } \
|
---|
278 | } while (0)
|
---|
279 |
|
---|
280 | /*
|
---|
281 | convert a name to the shadow directory: NTSTATUS-specific handling
|
---|
282 | */
|
---|
283 |
|
---|
284 | #define _SHADOW2_NTSTATUS_NEXT(op, args, eret, extra) do { \
|
---|
285 | const char *name = fname; \
|
---|
286 | const char *gmt_start; \
|
---|
287 | if (shadow_copy2_match_name(fname, &gmt_start)) { \
|
---|
288 | char *name2; \
|
---|
289 | NTSTATUS ret; \
|
---|
290 | name2 = convert_shadow2_name(handle, fname, gmt_start); \
|
---|
291 | if (name2 == NULL) { \
|
---|
292 | errno = EINVAL; \
|
---|
293 | return eret; \
|
---|
294 | } \
|
---|
295 | name = name2; \
|
---|
296 | ret = SMB_VFS_NEXT_ ## op args; \
|
---|
297 | talloc_free(name2); \
|
---|
298 | if (!NT_STATUS_EQUAL(ret, eret)) extra; \
|
---|
299 | return ret; \
|
---|
300 | } else { \
|
---|
301 | return SMB_VFS_NEXT_ ## op args; \
|
---|
302 | } \
|
---|
303 | } while (0)
|
---|
304 |
|
---|
305 | #define SHADOW2_NTSTATUS_NEXT(op, args, eret) _SHADOW2_NTSTATUS_NEXT(op, args, eret, )
|
---|
306 |
|
---|
307 | #define SHADOW2_NEXT(op, args, rtype, eret) _SHADOW2_NEXT(op, args, rtype, eret, )
|
---|
308 |
|
---|
309 | #define SHADOW2_NEXT_SMB_FNAME(op, args, rtype, eret) _SHADOW2_NEXT_SMB_FNAME(op, args, rtype, eret, )
|
---|
310 |
|
---|
311 | #define SHADOW2_NEXT2(op, args) do { \
|
---|
312 | const char *gmt_start1, *gmt_start2; \
|
---|
313 | if (shadow_copy2_match_name(oldname, &gmt_start1) || \
|
---|
314 | shadow_copy2_match_name(newname, &gmt_start2)) { \
|
---|
315 | errno = EROFS; \
|
---|
316 | return -1; \
|
---|
317 | } else { \
|
---|
318 | return SMB_VFS_NEXT_ ## op args; \
|
---|
319 | } \
|
---|
320 | } while (0)
|
---|
321 |
|
---|
322 | #define SHADOW2_NEXT2_SMB_FNAME(op, args) do { \
|
---|
323 | const char *gmt_start1, *gmt_start2; \
|
---|
324 | if (shadow_copy2_match_name(smb_fname_src->base_name, &gmt_start1) || \
|
---|
325 | shadow_copy2_match_name(smb_fname_dst->base_name, &gmt_start2)) { \
|
---|
326 | errno = EROFS; \
|
---|
327 | return -1; \
|
---|
328 | } else { \
|
---|
329 | return SMB_VFS_NEXT_ ## op args; \
|
---|
330 | } \
|
---|
331 | } while (0)
|
---|
332 |
|
---|
333 |
|
---|
334 | /*
|
---|
335 | find the mount point of a filesystem
|
---|
336 | */
|
---|
337 | static char *find_mount_point(TALLOC_CTX *mem_ctx, vfs_handle_struct *handle)
|
---|
338 | {
|
---|
339 | char *path = talloc_strdup(mem_ctx, handle->conn->connectpath);
|
---|
340 | dev_t dev;
|
---|
341 | struct stat st;
|
---|
342 | char *p;
|
---|
343 |
|
---|
344 | if (stat(path, &st) != 0) {
|
---|
345 | talloc_free(path);
|
---|
346 | return NULL;
|
---|
347 | }
|
---|
348 |
|
---|
349 | dev = st.st_dev;
|
---|
350 |
|
---|
351 | while ((p = strrchr(path, '/')) && p > path) {
|
---|
352 | *p = 0;
|
---|
353 | if (stat(path, &st) != 0) {
|
---|
354 | talloc_free(path);
|
---|
355 | return NULL;
|
---|
356 | }
|
---|
357 | if (st.st_dev != dev) {
|
---|
358 | *p = '/';
|
---|
359 | break;
|
---|
360 | }
|
---|
361 | }
|
---|
362 |
|
---|
363 | return path;
|
---|
364 | }
|
---|
365 |
|
---|
366 | /*
|
---|
367 | work out the location of the snapshot for this share
|
---|
368 | */
|
---|
369 | static const char *shadow_copy2_find_snapdir(TALLOC_CTX *mem_ctx, vfs_handle_struct *handle)
|
---|
370 | {
|
---|
371 | const char *snapdir;
|
---|
372 | char *mount_point;
|
---|
373 | const char *ret;
|
---|
374 |
|
---|
375 | snapdir = lp_parm_const_string(SNUM(handle->conn), "shadow", "snapdir", NULL);
|
---|
376 | if (snapdir == NULL) {
|
---|
377 | return NULL;
|
---|
378 | }
|
---|
379 | /* if its an absolute path, we're done */
|
---|
380 | if (*snapdir == '/') {
|
---|
381 | return snapdir;
|
---|
382 | }
|
---|
383 |
|
---|
384 | /* other its relative to the filesystem mount point */
|
---|
385 | mount_point = find_mount_point(mem_ctx, handle);
|
---|
386 | if (mount_point == NULL) {
|
---|
387 | return NULL;
|
---|
388 | }
|
---|
389 |
|
---|
390 | ret = talloc_asprintf(mem_ctx, "%s/%s", mount_point, snapdir);
|
---|
391 | talloc_free(mount_point);
|
---|
392 | return ret;
|
---|
393 | }
|
---|
394 |
|
---|
395 | /*
|
---|
396 | work out the location of the base directory for snapshots of this share
|
---|
397 | */
|
---|
398 | static const char *shadow_copy2_find_basedir(TALLOC_CTX *mem_ctx, vfs_handle_struct *handle)
|
---|
399 | {
|
---|
400 | const char *basedir = lp_parm_const_string(SNUM(handle->conn), "shadow", "basedir", NULL);
|
---|
401 |
|
---|
402 | /* other its the filesystem mount point */
|
---|
403 | if (basedir == NULL) {
|
---|
404 | basedir = find_mount_point(mem_ctx, handle);
|
---|
405 | }
|
---|
406 |
|
---|
407 | return basedir;
|
---|
408 | }
|
---|
409 |
|
---|
410 | /*
|
---|
411 | convert a filename from a share relative path, to a path in the
|
---|
412 | snapshot directory
|
---|
413 | */
|
---|
414 | static char *convert_shadow2_name(vfs_handle_struct *handle, const char *fname, const char *gmt_path)
|
---|
415 | {
|
---|
416 | TALLOC_CTX *tmp_ctx = talloc_new(handle->data);
|
---|
417 | const char *snapdir, *relpath, *baseoffset, *basedir;
|
---|
418 | size_t baselen;
|
---|
419 | char *ret, *prefix;
|
---|
420 |
|
---|
421 | struct tm timestamp;
|
---|
422 | time_t timestamp_t;
|
---|
423 | char snapshot[MAXPATHLEN];
|
---|
424 | const char *fmt;
|
---|
425 |
|
---|
426 | fmt = lp_parm_const_string(SNUM(handle->conn), "shadow",
|
---|
427 | "format", SHADOW_COPY2_DEFAULT_FORMAT);
|
---|
428 |
|
---|
429 | snapdir = shadow_copy2_find_snapdir(tmp_ctx, handle);
|
---|
430 | if (snapdir == NULL) {
|
---|
431 | DEBUG(2,("no snapdir found for share at %s\n", handle->conn->connectpath));
|
---|
432 | talloc_free(tmp_ctx);
|
---|
433 | return NULL;
|
---|
434 | }
|
---|
435 |
|
---|
436 | basedir = shadow_copy2_find_basedir(tmp_ctx, handle);
|
---|
437 | if (basedir == NULL) {
|
---|
438 | DEBUG(2,("no basedir found for share at %s\n", handle->conn->connectpath));
|
---|
439 | talloc_free(tmp_ctx);
|
---|
440 | return NULL;
|
---|
441 | }
|
---|
442 |
|
---|
443 | prefix = talloc_asprintf(tmp_ctx, "%s/@GMT-", snapdir);
|
---|
444 | if (strncmp(fname, prefix, (talloc_get_size(prefix)-1)) == 0) {
|
---|
445 | /* this looks like as we have already normalized it, leave it untouched*/
|
---|
446 | talloc_free(tmp_ctx);
|
---|
447 | return talloc_strdup(handle->data, fname);
|
---|
448 | }
|
---|
449 |
|
---|
450 | if (strncmp(fname, "@GMT-", 5) != 0) {
|
---|
451 | fname = shadow_copy2_normalise_path(tmp_ctx, fname, gmt_path);
|
---|
452 | if (fname == NULL) {
|
---|
453 | talloc_free(tmp_ctx);
|
---|
454 | return NULL;
|
---|
455 | }
|
---|
456 | }
|
---|
457 |
|
---|
458 | ZERO_STRUCT(timestamp);
|
---|
459 | relpath = strptime(fname, SHADOW_COPY2_GMT_FORMAT, ×tamp);
|
---|
460 | if (relpath == NULL) {
|
---|
461 | talloc_free(tmp_ctx);
|
---|
462 | return NULL;
|
---|
463 | }
|
---|
464 |
|
---|
465 | /* relpath is the remaining portion of the path after the @GMT-xxx */
|
---|
466 |
|
---|
467 | if (lp_parm_bool(SNUM(handle->conn), "shadow", "localtime",
|
---|
468 | SHADOW_COPY2_DEFAULT_LOCALTIME))
|
---|
469 | {
|
---|
470 | timestamp_t = timegm(×tamp);
|
---|
471 | localtime_r(×tamp_t, ×tamp);
|
---|
472 | }
|
---|
473 |
|
---|
474 | strftime(snapshot, MAXPATHLEN, fmt, ×tamp);
|
---|
475 |
|
---|
476 | baselen = strlen(basedir);
|
---|
477 | baseoffset = handle->conn->connectpath + baselen;
|
---|
478 |
|
---|
479 | /* some sanity checks */
|
---|
480 | if (strncmp(basedir, handle->conn->connectpath, baselen) != 0 ||
|
---|
481 | (handle->conn->connectpath[baselen] != 0 && handle->conn->connectpath[baselen] != '/')) {
|
---|
482 | DEBUG(0,("convert_shadow2_name: basedir %s is not a parent of %s\n",
|
---|
483 | basedir, handle->conn->connectpath));
|
---|
484 | talloc_free(tmp_ctx);
|
---|
485 | return NULL;
|
---|
486 | }
|
---|
487 |
|
---|
488 | if (*relpath == '/') relpath++;
|
---|
489 | if (*baseoffset == '/') baseoffset++;
|
---|
490 |
|
---|
491 | ret = talloc_asprintf(handle->data, "%s/%s/%s/%s",
|
---|
492 | snapdir,
|
---|
493 | snapshot,
|
---|
494 | baseoffset,
|
---|
495 | relpath);
|
---|
496 | DEBUG(6,("convert_shadow2_name: '%s' -> '%s'\n", fname, ret));
|
---|
497 | talloc_free(tmp_ctx);
|
---|
498 | return ret;
|
---|
499 | }
|
---|
500 |
|
---|
501 |
|
---|
502 | /*
|
---|
503 | simple string hash
|
---|
504 | */
|
---|
505 | static uint32 string_hash(const char *s)
|
---|
506 | {
|
---|
507 | uint32 n = 0;
|
---|
508 | while (*s) {
|
---|
509 | n = ((n << 5) + n) ^ (uint32)(*s++);
|
---|
510 | }
|
---|
511 | return n;
|
---|
512 | }
|
---|
513 |
|
---|
514 | /*
|
---|
515 | modify a sbuf return to ensure that inodes in the shadow directory
|
---|
516 | are different from those in the main directory
|
---|
517 | */
|
---|
518 | static void convert_sbuf(vfs_handle_struct *handle, const char *fname, SMB_STRUCT_STAT *sbuf)
|
---|
519 | {
|
---|
520 | if (lp_parm_bool(SNUM(handle->conn), "shadow", "fixinodes", False)) {
|
---|
521 | /* some snapshot systems, like GPFS, return the name
|
---|
522 | device:inode for the snapshot files as the current
|
---|
523 | files. That breaks the 'restore' button in the shadow copy
|
---|
524 | GUI, as the client gets a sharing violation.
|
---|
525 |
|
---|
526 | This is a crude way of allowing both files to be
|
---|
527 | open at once. It has a slight chance of inode
|
---|
528 | number collision, but I can't see a better approach
|
---|
529 | without significant VFS changes
|
---|
530 | */
|
---|
531 | uint32_t shash = string_hash(fname) & 0xFF000000;
|
---|
532 | if (shash == 0) {
|
---|
533 | shash = 1;
|
---|
534 | }
|
---|
535 | sbuf->st_ex_ino ^= shash;
|
---|
536 | }
|
---|
537 | }
|
---|
538 |
|
---|
539 | static int shadow_copy2_rename(vfs_handle_struct *handle,
|
---|
540 | const struct smb_filename *smb_fname_src,
|
---|
541 | const struct smb_filename *smb_fname_dst)
|
---|
542 | {
|
---|
543 | if (shadow_copy2_match_name(smb_fname_src->base_name, NULL)) {
|
---|
544 | errno = EXDEV;
|
---|
545 | return -1;
|
---|
546 | }
|
---|
547 | SHADOW2_NEXT2_SMB_FNAME(RENAME,
|
---|
548 | (handle, smb_fname_src, smb_fname_dst));
|
---|
549 | }
|
---|
550 |
|
---|
551 | static int shadow_copy2_symlink(vfs_handle_struct *handle,
|
---|
552 | const char *oldname, const char *newname)
|
---|
553 | {
|
---|
554 | SHADOW2_NEXT2(SYMLINK, (handle, oldname, newname));
|
---|
555 | }
|
---|
556 |
|
---|
557 | static int shadow_copy2_link(vfs_handle_struct *handle,
|
---|
558 | const char *oldname, const char *newname)
|
---|
559 | {
|
---|
560 | SHADOW2_NEXT2(LINK, (handle, oldname, newname));
|
---|
561 | }
|
---|
562 |
|
---|
563 | static int shadow_copy2_open(vfs_handle_struct *handle,
|
---|
564 | struct smb_filename *smb_fname, files_struct *fsp,
|
---|
565 | int flags, mode_t mode)
|
---|
566 | {
|
---|
567 | SHADOW2_NEXT_SMB_FNAME(OPEN,
|
---|
568 | (handle, smb_fname, fsp, flags, mode),
|
---|
569 | int, -1);
|
---|
570 | }
|
---|
571 |
|
---|
572 | static SMB_STRUCT_DIR *shadow_copy2_opendir(vfs_handle_struct *handle,
|
---|
573 | const char *fname, const char *mask, uint32 attr)
|
---|
574 | {
|
---|
575 | SHADOW2_NEXT(OPENDIR, (handle, name, mask, attr), SMB_STRUCT_DIR *, NULL);
|
---|
576 | }
|
---|
577 |
|
---|
578 | static int shadow_copy2_stat(vfs_handle_struct *handle,
|
---|
579 | struct smb_filename *smb_fname)
|
---|
580 | {
|
---|
581 | _SHADOW2_NEXT_SMB_FNAME(STAT, (handle, smb_fname), int, -1,
|
---|
582 | convert_sbuf(handle, smb_fname->base_name,
|
---|
583 | &smb_fname->st));
|
---|
584 | }
|
---|
585 |
|
---|
586 | static int shadow_copy2_lstat(vfs_handle_struct *handle,
|
---|
587 | struct smb_filename *smb_fname)
|
---|
588 | {
|
---|
589 | _SHADOW2_NEXT_SMB_FNAME(LSTAT, (handle, smb_fname), int, -1,
|
---|
590 | convert_sbuf(handle, smb_fname->base_name,
|
---|
591 | &smb_fname->st));
|
---|
592 | }
|
---|
593 |
|
---|
594 | static int shadow_copy2_fstat(vfs_handle_struct *handle, files_struct *fsp, SMB_STRUCT_STAT *sbuf)
|
---|
595 | {
|
---|
596 | int ret = SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
|
---|
597 | if (ret == 0 && shadow_copy2_match_name(fsp->fsp_name->base_name, NULL)) {
|
---|
598 | convert_sbuf(handle, fsp->fsp_name->base_name, sbuf);
|
---|
599 | }
|
---|
600 | return ret;
|
---|
601 | }
|
---|
602 |
|
---|
603 | static int shadow_copy2_unlink(vfs_handle_struct *handle,
|
---|
604 | const struct smb_filename *smb_fname_in)
|
---|
605 | {
|
---|
606 | struct smb_filename *smb_fname = NULL;
|
---|
607 | NTSTATUS status;
|
---|
608 |
|
---|
609 | status = copy_smb_filename(talloc_tos(), smb_fname_in, &smb_fname);
|
---|
610 | if (!NT_STATUS_IS_OK(status)) {
|
---|
611 | errno = map_errno_from_nt_status(status);
|
---|
612 | return -1;
|
---|
613 | }
|
---|
614 |
|
---|
615 | SHADOW2_NEXT_SMB_FNAME(UNLINK, (handle, smb_fname), int, -1);
|
---|
616 | }
|
---|
617 |
|
---|
618 | static int shadow_copy2_chmod(vfs_handle_struct *handle,
|
---|
619 | const char *fname, mode_t mode)
|
---|
620 | {
|
---|
621 | SHADOW2_NEXT(CHMOD, (handle, name, mode), int, -1);
|
---|
622 | }
|
---|
623 |
|
---|
624 | static int shadow_copy2_chown(vfs_handle_struct *handle,
|
---|
625 | const char *fname, uid_t uid, gid_t gid)
|
---|
626 | {
|
---|
627 | SHADOW2_NEXT(CHOWN, (handle, name, uid, gid), int, -1);
|
---|
628 | }
|
---|
629 |
|
---|
630 | static int shadow_copy2_chdir(vfs_handle_struct *handle,
|
---|
631 | const char *fname)
|
---|
632 | {
|
---|
633 | SHADOW2_NEXT(CHDIR, (handle, name), int, -1);
|
---|
634 | }
|
---|
635 |
|
---|
636 | static int shadow_copy2_ntimes(vfs_handle_struct *handle,
|
---|
637 | const struct smb_filename *smb_fname_in,
|
---|
638 | struct smb_file_time *ft)
|
---|
639 | {
|
---|
640 | struct smb_filename *smb_fname = NULL;
|
---|
641 | NTSTATUS status;
|
---|
642 |
|
---|
643 | status = copy_smb_filename(talloc_tos(), smb_fname_in, &smb_fname);
|
---|
644 | if (!NT_STATUS_IS_OK(status)) {
|
---|
645 | errno = map_errno_from_nt_status(status);
|
---|
646 | return -1;
|
---|
647 | }
|
---|
648 |
|
---|
649 | SHADOW2_NEXT_SMB_FNAME(NTIMES, (handle, smb_fname, ft), int, -1);
|
---|
650 | }
|
---|
651 |
|
---|
652 | static int shadow_copy2_readlink(vfs_handle_struct *handle,
|
---|
653 | const char *fname, char *buf, size_t bufsiz)
|
---|
654 | {
|
---|
655 | SHADOW2_NEXT(READLINK, (handle, name, buf, bufsiz), int, -1);
|
---|
656 | }
|
---|
657 |
|
---|
658 | static int shadow_copy2_mknod(vfs_handle_struct *handle,
|
---|
659 | const char *fname, mode_t mode, SMB_DEV_T dev)
|
---|
660 | {
|
---|
661 | SHADOW2_NEXT(MKNOD, (handle, name, mode, dev), int, -1);
|
---|
662 | }
|
---|
663 |
|
---|
664 | static char *shadow_copy2_realpath(vfs_handle_struct *handle,
|
---|
665 | const char *fname)
|
---|
666 | {
|
---|
667 | const char *gmt;
|
---|
668 |
|
---|
669 | if (shadow_copy2_match_name(fname, &gmt)
|
---|
670 | && (gmt[GMT_NAME_LEN] == '\0')) {
|
---|
671 | char *copy;
|
---|
672 |
|
---|
673 | copy = talloc_strdup(talloc_tos(), fname);
|
---|
674 | if (copy == NULL) {
|
---|
675 | errno = ENOMEM;
|
---|
676 | return NULL;
|
---|
677 | }
|
---|
678 |
|
---|
679 | copy[gmt - fname] = '.';
|
---|
680 | copy[gmt - fname + 1] = '\0';
|
---|
681 |
|
---|
682 | DEBUG(10, ("calling NEXT_REALPATH with %s\n", copy));
|
---|
683 | SHADOW2_NEXT(REALPATH, (handle, name), char *,
|
---|
684 | NULL);
|
---|
685 | }
|
---|
686 | SHADOW2_NEXT(REALPATH, (handle, name), char *, NULL);
|
---|
687 | }
|
---|
688 |
|
---|
689 | static const char *shadow_copy2_connectpath(struct vfs_handle_struct *handle,
|
---|
690 | const char *fname)
|
---|
691 | {
|
---|
692 | TALLOC_CTX *tmp_ctx;
|
---|
693 | const char *snapdir, *baseoffset, *basedir, *gmt_start;
|
---|
694 | size_t baselen;
|
---|
695 | char *ret;
|
---|
696 |
|
---|
697 | DEBUG(10, ("shadow_copy2_connectpath called with %s\n", fname));
|
---|
698 |
|
---|
699 | if (!shadow_copy2_match_name(fname, &gmt_start)) {
|
---|
700 | return handle->conn->connectpath;
|
---|
701 | }
|
---|
702 |
|
---|
703 | /*
|
---|
704 | * We have to create a real temporary context because we have
|
---|
705 | * to put our result on talloc_tos(). Thus we can't use a
|
---|
706 | * talloc_stackframe() here.
|
---|
707 | */
|
---|
708 | tmp_ctx = talloc_new(talloc_tos());
|
---|
709 |
|
---|
710 | fname = shadow_copy2_normalise_path(tmp_ctx, fname, gmt_start);
|
---|
711 | if (fname == NULL) {
|
---|
712 | TALLOC_FREE(tmp_ctx);
|
---|
713 | return NULL;
|
---|
714 | }
|
---|
715 |
|
---|
716 | snapdir = shadow_copy2_find_snapdir(tmp_ctx, handle);
|
---|
717 | if (snapdir == NULL) {
|
---|
718 | DEBUG(2,("no snapdir found for share at %s\n",
|
---|
719 | handle->conn->connectpath));
|
---|
720 | TALLOC_FREE(tmp_ctx);
|
---|
721 | return NULL;
|
---|
722 | }
|
---|
723 |
|
---|
724 | basedir = shadow_copy2_find_basedir(tmp_ctx, handle);
|
---|
725 | if (basedir == NULL) {
|
---|
726 | DEBUG(2,("no basedir found for share at %s\n",
|
---|
727 | handle->conn->connectpath));
|
---|
728 | TALLOC_FREE(tmp_ctx);
|
---|
729 | return NULL;
|
---|
730 | }
|
---|
731 |
|
---|
732 | baselen = strlen(basedir);
|
---|
733 | baseoffset = handle->conn->connectpath + baselen;
|
---|
734 |
|
---|
735 | /* some sanity checks */
|
---|
736 | if (strncmp(basedir, handle->conn->connectpath, baselen) != 0 ||
|
---|
737 | (handle->conn->connectpath[baselen] != 0
|
---|
738 | && handle->conn->connectpath[baselen] != '/')) {
|
---|
739 | DEBUG(0,("shadow_copy2_connectpath: basedir %s is not a "
|
---|
740 | "parent of %s\n", basedir,
|
---|
741 | handle->conn->connectpath));
|
---|
742 | TALLOC_FREE(tmp_ctx);
|
---|
743 | return NULL;
|
---|
744 | }
|
---|
745 |
|
---|
746 | if (*baseoffset == '/') baseoffset++;
|
---|
747 |
|
---|
748 | ret = talloc_asprintf(talloc_tos(), "%s/%.*s/%s",
|
---|
749 | snapdir,
|
---|
750 | GMT_NAME_LEN, fname,
|
---|
751 | baseoffset);
|
---|
752 | DEBUG(6,("shadow_copy2_connectpath: '%s' -> '%s'\n", fname, ret));
|
---|
753 | TALLOC_FREE(tmp_ctx);
|
---|
754 | return ret;
|
---|
755 | }
|
---|
756 |
|
---|
757 | static NTSTATUS shadow_copy2_get_nt_acl(vfs_handle_struct *handle,
|
---|
758 | const char *fname, uint32 security_info,
|
---|
759 | struct security_descriptor **ppdesc)
|
---|
760 | {
|
---|
761 | SHADOW2_NTSTATUS_NEXT(GET_NT_ACL, (handle, name, security_info, ppdesc), NT_STATUS_ACCESS_DENIED);
|
---|
762 | }
|
---|
763 |
|
---|
764 | static int shadow_copy2_mkdir(vfs_handle_struct *handle, const char *fname, mode_t mode)
|
---|
765 | {
|
---|
766 | SHADOW2_NEXT(MKDIR, (handle, name, mode), int, -1);
|
---|
767 | }
|
---|
768 |
|
---|
769 | static bool check_access_snapdir(struct vfs_handle_struct *handle,
|
---|
770 | const char *path)
|
---|
771 | {
|
---|
772 | struct smb_filename smb_fname;
|
---|
773 | int ret;
|
---|
774 | NTSTATUS status;
|
---|
775 | uint32_t access_granted = 0;
|
---|
776 |
|
---|
777 | ZERO_STRUCT(smb_fname);
|
---|
778 | smb_fname.base_name = talloc_asprintf(talloc_tos(),
|
---|
779 | "%s",
|
---|
780 | path);
|
---|
781 | if (smb_fname.base_name == NULL) {
|
---|
782 | return false;
|
---|
783 | }
|
---|
784 |
|
---|
785 | ret = SMB_VFS_NEXT_STAT(handle, &smb_fname);
|
---|
786 | if (ret != 0 || !S_ISDIR(smb_fname.st.st_ex_mode)) {
|
---|
787 | TALLOC_FREE(smb_fname.base_name);
|
---|
788 | return false;
|
---|
789 | }
|
---|
790 |
|
---|
791 | status = smbd_check_open_rights(handle->conn,
|
---|
792 | &smb_fname,
|
---|
793 | SEC_DIR_LIST,
|
---|
794 | &access_granted);
|
---|
795 | if (!NT_STATUS_IS_OK(status)) {
|
---|
796 | DEBUG(0,("user does not have list permission "
|
---|
797 | "on snapdir %s\n",
|
---|
798 | smb_fname.base_name));
|
---|
799 | TALLOC_FREE(smb_fname.base_name);
|
---|
800 | return false;
|
---|
801 | }
|
---|
802 | TALLOC_FREE(smb_fname.base_name);
|
---|
803 | return true;
|
---|
804 | }
|
---|
805 |
|
---|
806 | static int shadow_copy2_rmdir(vfs_handle_struct *handle, const char *fname)
|
---|
807 | {
|
---|
808 | SHADOW2_NEXT(RMDIR, (handle, name), int, -1);
|
---|
809 | }
|
---|
810 |
|
---|
811 | static int shadow_copy2_chflags(vfs_handle_struct *handle, const char *fname,
|
---|
812 | unsigned int flags)
|
---|
813 | {
|
---|
814 | SHADOW2_NEXT(CHFLAGS, (handle, name, flags), int, -1);
|
---|
815 | }
|
---|
816 |
|
---|
817 | static ssize_t shadow_copy2_getxattr(vfs_handle_struct *handle,
|
---|
818 | const char *fname, const char *aname, void *value, size_t size)
|
---|
819 | {
|
---|
820 | SHADOW2_NEXT(GETXATTR, (handle, name, aname, value, size), ssize_t, -1);
|
---|
821 | }
|
---|
822 |
|
---|
823 | static ssize_t shadow_copy2_lgetxattr(vfs_handle_struct *handle,
|
---|
824 | const char *fname, const char *aname, void *value, size_t size)
|
---|
825 | {
|
---|
826 | SHADOW2_NEXT(LGETXATTR, (handle, name, aname, value, size), ssize_t, -1);
|
---|
827 | }
|
---|
828 |
|
---|
829 | static ssize_t shadow_copy2_listxattr(struct vfs_handle_struct *handle, const char *fname,
|
---|
830 | char *list, size_t size)
|
---|
831 | {
|
---|
832 | SHADOW2_NEXT(LISTXATTR, (handle, name, list, size), ssize_t, -1);
|
---|
833 | }
|
---|
834 |
|
---|
835 | static int shadow_copy2_removexattr(struct vfs_handle_struct *handle, const char *fname,
|
---|
836 | const char *aname)
|
---|
837 | {
|
---|
838 | SHADOW2_NEXT(REMOVEXATTR, (handle, name, aname), int, -1);
|
---|
839 | }
|
---|
840 |
|
---|
841 | static int shadow_copy2_lremovexattr(struct vfs_handle_struct *handle, const char *fname,
|
---|
842 | const char *aname)
|
---|
843 | {
|
---|
844 | SHADOW2_NEXT(LREMOVEXATTR, (handle, name, aname), int, -1);
|
---|
845 | }
|
---|
846 |
|
---|
847 | static int shadow_copy2_setxattr(struct vfs_handle_struct *handle, const char *fname,
|
---|
848 | const char *aname, const void *value, size_t size, int flags)
|
---|
849 | {
|
---|
850 | SHADOW2_NEXT(SETXATTR, (handle, name, aname, value, size, flags), int, -1);
|
---|
851 | }
|
---|
852 |
|
---|
853 | static int shadow_copy2_lsetxattr(struct vfs_handle_struct *handle, const char *fname,
|
---|
854 | const char *aname, const void *value, size_t size, int flags)
|
---|
855 | {
|
---|
856 | SHADOW2_NEXT(LSETXATTR, (handle, name, aname, value, size, flags), int, -1);
|
---|
857 | }
|
---|
858 |
|
---|
859 | static int shadow_copy2_chmod_acl(vfs_handle_struct *handle,
|
---|
860 | const char *fname, mode_t mode)
|
---|
861 | {
|
---|
862 | SHADOW2_NEXT(CHMOD_ACL, (handle, name, mode), int, -1);
|
---|
863 | }
|
---|
864 |
|
---|
865 | static int shadow_copy2_label_cmp_asc(const void *x, const void *y)
|
---|
866 | {
|
---|
867 | return strncmp((char *)x, (char *)y, sizeof(SHADOW_COPY_LABEL));
|
---|
868 | }
|
---|
869 |
|
---|
870 | static int shadow_copy2_label_cmp_desc(const void *x, const void *y)
|
---|
871 | {
|
---|
872 | return -strncmp((char *)x, (char *)y, sizeof(SHADOW_COPY_LABEL));
|
---|
873 | }
|
---|
874 |
|
---|
875 | /*
|
---|
876 | sort the shadow copy data in ascending or descending order
|
---|
877 | */
|
---|
878 | static void shadow_copy2_sort_data(vfs_handle_struct *handle,
|
---|
879 | struct shadow_copy_data *shadow_copy2_data)
|
---|
880 | {
|
---|
881 | int (*cmpfunc)(const void *, const void *);
|
---|
882 | const char *sort;
|
---|
883 |
|
---|
884 | sort = lp_parm_const_string(SNUM(handle->conn), "shadow",
|
---|
885 | "sort", SHADOW_COPY2_DEFAULT_SORT);
|
---|
886 | if (sort == NULL) {
|
---|
887 | return;
|
---|
888 | }
|
---|
889 |
|
---|
890 | if (strcmp(sort, "asc") == 0) {
|
---|
891 | cmpfunc = shadow_copy2_label_cmp_asc;
|
---|
892 | } else if (strcmp(sort, "desc") == 0) {
|
---|
893 | cmpfunc = shadow_copy2_label_cmp_desc;
|
---|
894 | } else {
|
---|
895 | return;
|
---|
896 | }
|
---|
897 |
|
---|
898 | if (shadow_copy2_data && shadow_copy2_data->num_volumes > 0 &&
|
---|
899 | shadow_copy2_data->labels)
|
---|
900 | {
|
---|
901 | TYPESAFE_QSORT(shadow_copy2_data->labels,
|
---|
902 | shadow_copy2_data->num_volumes,
|
---|
903 | cmpfunc);
|
---|
904 | }
|
---|
905 |
|
---|
906 | return;
|
---|
907 | }
|
---|
908 |
|
---|
909 | static int shadow_copy2_get_shadow_copy2_data(vfs_handle_struct *handle,
|
---|
910 | files_struct *fsp,
|
---|
911 | struct shadow_copy_data *shadow_copy2_data,
|
---|
912 | bool labels)
|
---|
913 | {
|
---|
914 | SMB_STRUCT_DIR *p;
|
---|
915 | const char *snapdir;
|
---|
916 | SMB_STRUCT_DIRENT *d;
|
---|
917 | TALLOC_CTX *tmp_ctx = talloc_new(handle->data);
|
---|
918 | char *snapshot;
|
---|
919 | bool ret;
|
---|
920 |
|
---|
921 | snapdir = shadow_copy2_find_snapdir(tmp_ctx, handle);
|
---|
922 | if (snapdir == NULL) {
|
---|
923 | DEBUG(0,("shadow:snapdir not found for %s in get_shadow_copy_data\n",
|
---|
924 | handle->conn->connectpath));
|
---|
925 | errno = EINVAL;
|
---|
926 | talloc_free(tmp_ctx);
|
---|
927 | return -1;
|
---|
928 | }
|
---|
929 | ret = check_access_snapdir(handle, snapdir);
|
---|
930 | if (!ret) {
|
---|
931 | DEBUG(0,("access denied on listing snapdir %s\n", snapdir));
|
---|
932 | errno = EACCES;
|
---|
933 | talloc_free(tmp_ctx);
|
---|
934 | return -1;
|
---|
935 | }
|
---|
936 |
|
---|
937 | p = SMB_VFS_NEXT_OPENDIR(handle, snapdir, NULL, 0);
|
---|
938 |
|
---|
939 | if (!p) {
|
---|
940 | DEBUG(2,("shadow_copy2: SMB_VFS_NEXT_OPENDIR() failed for '%s'"
|
---|
941 | " - %s\n", snapdir, strerror(errno)));
|
---|
942 | talloc_free(tmp_ctx);
|
---|
943 | errno = ENOSYS;
|
---|
944 | return -1;
|
---|
945 | }
|
---|
946 |
|
---|
947 | shadow_copy2_data->num_volumes = 0;
|
---|
948 | shadow_copy2_data->labels = NULL;
|
---|
949 |
|
---|
950 | while ((d = SMB_VFS_NEXT_READDIR(handle, p, NULL))) {
|
---|
951 | SHADOW_COPY_LABEL *tlabels;
|
---|
952 |
|
---|
953 | /* ignore names not of the right form in the snapshot directory */
|
---|
954 | snapshot = shadow_copy2_snapshot_to_gmt(tmp_ctx, handle,
|
---|
955 | d->d_name);
|
---|
956 | DEBUG(6,("shadow_copy2_get_shadow_copy2_data: %s -> %s\n",
|
---|
957 | d->d_name, snapshot));
|
---|
958 | if (!snapshot) {
|
---|
959 | continue;
|
---|
960 | }
|
---|
961 |
|
---|
962 | if (!labels) {
|
---|
963 | /* the caller doesn't want the labels */
|
---|
964 | shadow_copy2_data->num_volumes++;
|
---|
965 | continue;
|
---|
966 | }
|
---|
967 |
|
---|
968 | tlabels = talloc_realloc(shadow_copy2_data,
|
---|
969 | shadow_copy2_data->labels,
|
---|
970 | SHADOW_COPY_LABEL, shadow_copy2_data->num_volumes+1);
|
---|
971 | if (tlabels == NULL) {
|
---|
972 | DEBUG(0,("shadow_copy2: out of memory\n"));
|
---|
973 | SMB_VFS_NEXT_CLOSEDIR(handle, p);
|
---|
974 | talloc_free(tmp_ctx);
|
---|
975 | return -1;
|
---|
976 | }
|
---|
977 |
|
---|
978 | strlcpy(tlabels[shadow_copy2_data->num_volumes], snapshot,
|
---|
979 | sizeof(*tlabels));
|
---|
980 | talloc_free(snapshot);
|
---|
981 |
|
---|
982 | shadow_copy2_data->num_volumes++;
|
---|
983 | shadow_copy2_data->labels = tlabels;
|
---|
984 | }
|
---|
985 |
|
---|
986 | SMB_VFS_NEXT_CLOSEDIR(handle,p);
|
---|
987 |
|
---|
988 | shadow_copy2_sort_data(handle, shadow_copy2_data);
|
---|
989 |
|
---|
990 | talloc_free(tmp_ctx);
|
---|
991 | return 0;
|
---|
992 | }
|
---|
993 |
|
---|
994 | static struct vfs_fn_pointers vfs_shadow_copy2_fns = {
|
---|
995 | .opendir = shadow_copy2_opendir,
|
---|
996 | .mkdir = shadow_copy2_mkdir,
|
---|
997 | .rmdir = shadow_copy2_rmdir,
|
---|
998 | .chflags = shadow_copy2_chflags,
|
---|
999 | .getxattr = shadow_copy2_getxattr,
|
---|
1000 | .lgetxattr = shadow_copy2_lgetxattr,
|
---|
1001 | .listxattr = shadow_copy2_listxattr,
|
---|
1002 | .removexattr = shadow_copy2_removexattr,
|
---|
1003 | .lremovexattr = shadow_copy2_lremovexattr,
|
---|
1004 | .setxattr = shadow_copy2_setxattr,
|
---|
1005 | .lsetxattr = shadow_copy2_lsetxattr,
|
---|
1006 | .open_fn = shadow_copy2_open,
|
---|
1007 | .rename = shadow_copy2_rename,
|
---|
1008 | .stat = shadow_copy2_stat,
|
---|
1009 | .lstat = shadow_copy2_lstat,
|
---|
1010 | .fstat = shadow_copy2_fstat,
|
---|
1011 | .unlink = shadow_copy2_unlink,
|
---|
1012 | .chmod = shadow_copy2_chmod,
|
---|
1013 | .chown = shadow_copy2_chown,
|
---|
1014 | .chdir = shadow_copy2_chdir,
|
---|
1015 | .ntimes = shadow_copy2_ntimes,
|
---|
1016 | .symlink = shadow_copy2_symlink,
|
---|
1017 | .vfs_readlink = shadow_copy2_readlink,
|
---|
1018 | .link = shadow_copy2_link,
|
---|
1019 | .mknod = shadow_copy2_mknod,
|
---|
1020 | .realpath = shadow_copy2_realpath,
|
---|
1021 | .connectpath = shadow_copy2_connectpath,
|
---|
1022 | .get_nt_acl = shadow_copy2_get_nt_acl,
|
---|
1023 | .chmod_acl = shadow_copy2_chmod_acl,
|
---|
1024 | .get_shadow_copy_data = shadow_copy2_get_shadow_copy2_data,
|
---|
1025 | };
|
---|
1026 |
|
---|
1027 | NTSTATUS vfs_shadow_copy2_init(void);
|
---|
1028 | NTSTATUS vfs_shadow_copy2_init(void)
|
---|
1029 | {
|
---|
1030 | NTSTATUS ret;
|
---|
1031 |
|
---|
1032 | ret = smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "shadow_copy2",
|
---|
1033 | &vfs_shadow_copy2_fns);
|
---|
1034 |
|
---|
1035 | if (!NT_STATUS_IS_OK(ret))
|
---|
1036 | return ret;
|
---|
1037 |
|
---|
1038 | vfs_shadow_copy2_debug_level = debug_add_class("shadow_copy2");
|
---|
1039 | if (vfs_shadow_copy2_debug_level == -1) {
|
---|
1040 | vfs_shadow_copy2_debug_level = DBGC_VFS;
|
---|
1041 | DEBUG(0, ("%s: Couldn't register custom debugging class!\n",
|
---|
1042 | "vfs_shadow_copy2_init"));
|
---|
1043 | } else {
|
---|
1044 | DEBUG(10, ("%s: Debug class number of '%s': %d\n",
|
---|
1045 | "vfs_shadow_copy2_init","shadow_copy2",vfs_shadow_copy2_debug_level));
|
---|
1046 | }
|
---|
1047 |
|
---|
1048 | return ret;
|
---|
1049 | }
|
---|