2 * shadow_copy2: a shadow copy module (second implementation)
4 * Copyright (C) Andrew Tridgell 2007 (portions taken from shadow_copy2)
5 * Copyright (C) Ed Plese 2009
6 * Copyright (C) Volker Lendecke 2011
7 * Copyright (C) Christian Ambach 2011
8 * Copyright (C) Michael Adam 2013
9 * Copyright (C) Rajesh Joseph 2016
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 * This is a second implemetation of a shadow copy module for exposing
28 * file system snapshots to windows clients as shadow copies.
30 * See the manual page for documentation.
34 #include "smbd/smbd.h"
35 #include "system/filesys.h"
36 #include "include/ntioctl.h"
38 #include "lib/util_path.h"
40 struct shadow_copy2_config
{
46 bool snapdirseverywhere
;
47 bool crossmountpoints
;
50 bool snapdir_absolute
;
52 char *rel_connectpath
; /* share root, relative to a snapshot root */
53 char *snapshot_basepath
; /* the absolute version of snapdir */
56 /* Data-structure to hold the list of snap entries */
57 struct shadow_copy2_snapentry
{
60 struct shadow_copy2_snapentry
*next
;
61 struct shadow_copy2_snapentry
*prev
;
64 struct shadow_copy2_snaplist_info
{
65 struct shadow_copy2_snapentry
*snaplist
; /* snapshot list */
66 regex_t
*regex
; /* Regex to filter snaps */
67 time_t fetch_time
; /* snaplist update time */
72 * shadow_copy2 private structure. This structure will be
73 * used to keep module specific information
75 struct shadow_copy2_private
{
76 struct shadow_copy2_config
*config
;
77 struct shadow_copy2_snaplist_info
*snaps
;
78 char *shadow_cwd
; /* Absolute $cwd path. */
79 /* Absolute connectpath - can vary depending on $cwd. */
80 char *shadow_connectpath
;
81 /* malloc'ed realpath return. */
82 char *shadow_realpath
;
85 static int shadow_copy2_get_shadow_copy_data(
86 vfs_handle_struct
*handle
, files_struct
*fsp
,
87 struct shadow_copy_data
*shadow_copy2_data
,
91 *This function will create a new snapshot list entry and
92 * return to the caller. This entry will also be added to
93 * the global snapshot list.
95 * @param[in] priv shadow_copy2 specific data structure
96 * @return Newly created snapshot entry or NULL on failure
98 static struct shadow_copy2_snapentry
*shadow_copy2_create_snapentry(
99 struct shadow_copy2_private
*priv
)
101 struct shadow_copy2_snapentry
*tmpentry
= NULL
;
103 tmpentry
= talloc_zero(priv
->snaps
, struct shadow_copy2_snapentry
);
104 if (tmpentry
== NULL
) {
105 DBG_ERR("talloc_zero() failed\n");
110 DLIST_ADD(priv
->snaps
->snaplist
, tmpentry
);
116 *This function will delete the entire snaplist and reset
117 * priv->snaps->snaplist to NULL.
119 * @param[in] priv shadow_copye specific data structure
121 static void shadow_copy2_delete_snaplist(struct shadow_copy2_private
*priv
)
123 struct shadow_copy2_snapentry
*tmp
= NULL
;
125 while ((tmp
= priv
->snaps
->snaplist
) != NULL
) {
126 DLIST_REMOVE(priv
->snaps
->snaplist
, tmp
);
132 * Given a timestamp this function searches the global snapshot list
133 * and returns the complete snapshot directory name saved in the entry.
135 * @param[in] priv shadow_copy2 specific structure
136 * @param[in] timestamp timestamp corresponding to one of the snapshot
137 * @param[out] snap_str buffer to copy the actual snapshot name
138 * @param[in] len length of snap_str buffer
140 * @return Length of actual snapshot name, and -1 on failure
142 static ssize_t
shadow_copy2_saved_snapname(struct shadow_copy2_private
*priv
,
143 struct tm
*timestamp
,
144 char *snap_str
, size_t len
)
146 ssize_t snaptime_len
= -1;
147 struct shadow_copy2_snapentry
*entry
= NULL
;
149 snaptime_len
= strftime(snap_str
, len
, GMT_FORMAT
, timestamp
);
150 if (snaptime_len
== 0) {
151 DBG_ERR("strftime failed\n");
157 for (entry
= priv
->snaps
->snaplist
; entry
; entry
= entry
->next
) {
158 if (strcmp(entry
->time_fmt
, snap_str
) == 0) {
159 snaptime_len
= snprintf(snap_str
, len
, "%s",
171 * This function will check if snaplist is updated or not. If snaplist
172 * is empty then it will create a new list. Each time snaplist is updated
173 * the time is recorded. If the snapshot time is greater than the snaplist
174 * update time then chances are we are working on an older list. Then discard
175 * the old list and fetch a new snaplist.
177 * @param[in] handle VFS handle struct
178 * @param[in] snap_time time of snapshot
180 * @return true if the list is updated else false
182 static bool shadow_copy2_update_snaplist(struct vfs_handle_struct
*handle
,
186 bool snaplist_updated
= false;
187 struct files_struct fsp
= {0};
188 struct smb_filename smb_fname
= {0};
189 double seconds
= 0.0;
190 struct shadow_copy2_private
*priv
= NULL
;
192 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
195 seconds
= difftime(snap_time
, priv
->snaps
->fetch_time
);
198 * Fetch the snapshot list if either the snaplist is empty or the
199 * required snapshot time is greater than the last fetched snaplist
202 if (seconds
> 0 || (priv
->snaps
->snaplist
== NULL
)) {
203 smb_fname
.base_name
= discard_const_p(char, ".");
204 fsp
.fsp_name
= &smb_fname
;
206 ret
= shadow_copy2_get_shadow_copy_data(handle
, &fsp
,
209 snaplist_updated
= true;
211 DBG_ERR("Failed to get shadow copy data\n");
216 return snaplist_updated
;
219 static bool shadow_copy2_find_slashes(TALLOC_CTX
*mem_ctx
, const char *str
,
221 unsigned *pnum_offsets
)
223 unsigned num_offsets
;
230 while ((p
= strchr(p
, '/')) != NULL
) {
235 offsets
= talloc_array(mem_ctx
, size_t, num_offsets
);
236 if (offsets
== NULL
) {
242 while ((p
= strchr(p
, '/')) != NULL
) {
243 offsets
[num_offsets
] = p
-str
;
249 *pnum_offsets
= num_offsets
;
254 * Given a timestamp, build the posix level GMT-tag string
255 * based on the configurable format.
257 static ssize_t
shadow_copy2_posix_gmt_string(struct vfs_handle_struct
*handle
,
259 char *snaptime_string
,
263 ssize_t snaptime_len
;
264 struct shadow_copy2_config
*config
;
265 struct shadow_copy2_private
*priv
;
267 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
270 config
= priv
->config
;
272 if (config
->use_sscanf
) {
273 snaptime_len
= snprintf(snaptime_string
,
276 (unsigned long)snapshot
);
277 if (snaptime_len
<= 0) {
278 DEBUG(10, ("snprintf failed\n"));
282 if (config
->use_localtime
) {
283 if (localtime_r(&snapshot
, &snap_tm
) == 0) {
284 DEBUG(10, ("gmtime_r failed\n"));
288 if (gmtime_r(&snapshot
, &snap_tm
) == 0) {
289 DEBUG(10, ("gmtime_r failed\n"));
294 if (priv
->snaps
->regex
!= NULL
) {
295 snaptime_len
= shadow_copy2_saved_snapname(priv
,
296 &snap_tm
, snaptime_string
, len
);
297 if (snaptime_len
>= 0)
301 * If we fail to find the snapshot name, chances are
302 * that we have not updated our snaplist. Make sure the
303 * snaplist is updated.
305 if (!shadow_copy2_update_snaplist(handle
, snapshot
)) {
306 DBG_DEBUG("shadow_copy2_update_snaplist "
311 return shadow_copy2_saved_snapname(priv
,
312 &snap_tm
, snaptime_string
, len
);
315 snaptime_len
= strftime(snaptime_string
,
319 if (snaptime_len
== 0) {
320 DEBUG(10, ("strftime failed\n"));
329 * Given a timestamp, build the string to insert into a path
330 * as a path component for creating the local path to the
331 * snapshot at the given timestamp of the input path.
333 * In the case of a parallel snapdir (specified with an
334 * absolute path), this is the inital portion of the
335 * local path of any snapshot file. The complete path is
336 * obtained by appending the portion of the file's path
337 * below the share root's mountpoint.
339 static char *shadow_copy2_insert_string(TALLOC_CTX
*mem_ctx
,
340 struct vfs_handle_struct
*handle
,
343 fstring snaptime_string
;
344 ssize_t snaptime_len
= 0;
346 struct shadow_copy2_config
*config
;
347 struct shadow_copy2_private
*priv
;
349 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
352 config
= priv
->config
;
354 snaptime_len
= shadow_copy2_posix_gmt_string(handle
,
357 sizeof(snaptime_string
));
358 if (snaptime_len
<= 0) {
362 if (config
->snapdir_absolute
) {
363 result
= talloc_asprintf(mem_ctx
, "%s/%s",
364 config
->snapdir
, snaptime_string
);
366 result
= talloc_asprintf(mem_ctx
, "/%s/%s",
367 config
->snapdir
, snaptime_string
);
369 if (result
== NULL
) {
370 DEBUG(1, (__location__
" talloc_asprintf failed\n"));
377 * Build the posix snapshot path for the connection
378 * at the given timestamp, i.e. the absolute posix path
379 * that contains the snapshot for this file system.
381 * This only applies to classical case, i.e. not
382 * to the "snapdirseverywhere" mode.
384 static char *shadow_copy2_snapshot_path(TALLOC_CTX
*mem_ctx
,
385 struct vfs_handle_struct
*handle
,
388 fstring snaptime_string
;
389 ssize_t snaptime_len
= 0;
391 struct shadow_copy2_private
*priv
;
393 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
396 snaptime_len
= shadow_copy2_posix_gmt_string(handle
,
399 sizeof(snaptime_string
));
400 if (snaptime_len
<= 0) {
404 result
= talloc_asprintf(mem_ctx
, "%s/%s",
405 priv
->config
->snapshot_basepath
, snaptime_string
);
406 if (result
== NULL
) {
407 DEBUG(1, (__location__
" talloc_asprintf failed\n"));
413 static char *make_path_absolute(TALLOC_CTX
*mem_ctx
,
414 struct shadow_copy2_private
*priv
,
417 char *newpath
= NULL
;
418 char *abs_path
= NULL
;
420 if (name
[0] != '/') {
421 newpath
= talloc_asprintf(mem_ctx
,
425 if (newpath
== NULL
) {
430 abs_path
= canonicalize_absolute_path(mem_ctx
, name
);
431 TALLOC_FREE(newpath
);
435 /* Return a $cwd-relative path. */
436 static bool make_relative_path(const char *cwd
, char *abs_path
)
438 size_t cwd_len
= strlen(cwd
);
439 size_t abs_len
= strlen(abs_path
);
441 if (abs_len
< cwd_len
) {
444 if (memcmp(abs_path
, cwd
, cwd_len
) != 0) {
447 /* The cwd_len != 1 case is for $cwd == '/' */
449 abs_path
[cwd_len
] != '/' &&
450 abs_path
[cwd_len
] != '\0')
454 if (abs_path
[cwd_len
] == '/') {
457 memmove(abs_path
, &abs_path
[cwd_len
], abs_len
+ 1 - cwd_len
);
461 static bool shadow_copy2_snapshot_to_gmt(vfs_handle_struct
*handle
,
463 char *gmt
, size_t gmt_len
);
466 * Check if an incoming filename is already a snapshot converted pathname.
468 * If so, it returns the pathname truncated at the snapshot point which
469 * will be used as the connectpath.
472 static int check_for_converted_path(TALLOC_CTX
*mem_ctx
,
473 struct vfs_handle_struct
*handle
,
474 struct shadow_copy2_private
*priv
,
476 bool *ppath_already_converted
,
479 size_t snapdirlen
= 0;
480 char *p
= strstr_m(abs_path
, priv
->config
->snapdir
);
482 char *connect_path
= NULL
;
483 char snapshot
[GMT_NAME_LEN
+1];
485 *ppath_already_converted
= false;
488 /* Must at least contain shadow:snapdir. */
492 if (priv
->config
->snapdir
[0] == '/' &&
494 /* Absolute shadow:snapdir must be at the start. */
498 snapdirlen
= strlen(priv
->config
->snapdir
);
499 if (p
[snapdirlen
] != '/') {
500 /* shadow:snapdir must end as a separate component. */
504 if (p
> abs_path
&& p
[-1] != '/') {
505 /* shadow:snapdir must start as a separate component. */
510 p
++; /* Move past the / */
513 * Need to return up to the next path
514 * component after the time.
515 * This will be used as the connectpath.
520 * No next path component.
523 connect_path
= talloc_strdup(mem_ctx
,
526 connect_path
= talloc_strndup(mem_ctx
,
530 if (connect_path
== NULL
) {
535 * Point p at the same offset in connect_path as
539 p
= &connect_path
[p
- abs_path
];
542 * Now ensure there is a time string at p.
543 * The SMB-format @GMT-token string is returned
547 if (!shadow_copy2_snapshot_to_gmt(handle
,
551 TALLOC_FREE(connect_path
);
555 if (pconnectpath
!= NULL
) {
556 *pconnectpath
= connect_path
;
559 *ppath_already_converted
= true;
561 DBG_DEBUG("path |%s| is already converted. "
562 "connect path = |%s|\n",
570 * This function does two things.
572 * 1). Checks if an incoming filename is already a
573 * snapshot converted pathname.
574 * If so, it returns the pathname truncated
575 * at the snapshot point which will be used
576 * as the connectpath, and then does an early return.
578 * 2). Checks if an incoming filename contains an
579 * SMB-layer @GMT- style timestamp.
580 * If so, it strips the timestamp, and returns
581 * both the timestamp and the stripped path
582 * (making it cwd-relative).
585 static bool shadow_copy2_strip_snapshot_internal(TALLOC_CTX
*mem_ctx
,
586 struct vfs_handle_struct
*handle
,
587 const char *orig_name
,
593 time_t timestamp
= 0;
596 char *stripped
= NULL
;
597 size_t rest_len
, dst_len
;
598 struct shadow_copy2_private
*priv
;
599 ptrdiff_t len_before_gmt
;
600 const char *name
= orig_name
;
601 char *abs_path
= NULL
;
603 bool already_converted
= false;
606 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
609 DEBUG(10, (__location__
": enter path '%s'\n", name
));
611 abs_path
= make_path_absolute(mem_ctx
, priv
, name
);
612 if (abs_path
== NULL
) {
618 DEBUG(10, (__location__
": abs path '%s'\n", name
));
620 err
= check_for_converted_path(mem_ctx
,
627 /* error in conversion. */
632 if (already_converted
) {
637 * From here we're only looking to strip an
638 * SMB-layer @GMT- token.
641 p
= strstr_m(name
, "@GMT-");
643 DEBUG(11, ("@GMT not found\n"));
646 if ((p
> name
) && (p
[-1] != '/')) {
647 /* the GMT-token does not start a path-component */
648 DEBUG(10, ("not at start, p=%p, name=%p, p[-1]=%d\n",
649 p
, name
, (int)p
[-1]));
653 len_before_gmt
= p
- name
;
655 q
= strptime(p
, GMT_FORMAT
, &tm
);
657 DEBUG(10, ("strptime failed\n"));
661 timestamp
= timegm(&tm
);
662 if (timestamp
== (time_t)-1) {
663 DEBUG(10, ("timestamp==-1\n"));
668 * The name consists of only the GMT token or the GMT
669 * token is at the end of the path. XP seems to send
670 * @GMT- at the end under certain circumstances even
671 * with a path prefix.
673 if (pstripped
!= NULL
) {
674 if (len_before_gmt
> 1) {
676 * There is a path (and not only a slash)
677 * before the @GMT-. Remove the trailing
682 stripped
= talloc_strndup(mem_ctx
, name
,
684 if (stripped
== NULL
) {
688 if (orig_name
[0] != '/') {
689 if (make_relative_path(priv
->shadow_cwd
,
690 stripped
) == false) {
691 DEBUG(10, (__location__
": path '%s' "
692 "doesn't start with cwd '%s'\n",
693 stripped
, priv
->shadow_cwd
));
699 *pstripped
= stripped
;
701 *ptimestamp
= timestamp
;
706 * It is not a complete path component, i.e. the path
707 * component continues after the gmt-token.
709 DEBUG(10, ("q[0] = %d\n", (int)q
[0]));
714 rest_len
= strlen(q
);
715 dst_len
= len_before_gmt
+ rest_len
;
717 if (pstripped
!= NULL
) {
718 stripped
= talloc_array(mem_ctx
, char, dst_len
+1);
719 if (stripped
== NULL
) {
724 memcpy(stripped
, name
, len_before_gmt
);
727 memcpy(stripped
+ len_before_gmt
, q
, rest_len
);
729 stripped
[dst_len
] = '\0';
730 if (orig_name
[0] != '/') {
731 if (make_relative_path(priv
->shadow_cwd
,
732 stripped
) == false) {
733 DEBUG(10, (__location__
": path '%s' "
734 "doesn't start with cwd '%s'\n",
735 stripped
, priv
->shadow_cwd
));
741 *pstripped
= stripped
;
743 *ptimestamp
= timestamp
;
747 TALLOC_FREE(abs_path
);
751 static bool shadow_copy2_strip_snapshot(TALLOC_CTX
*mem_ctx
,
752 struct vfs_handle_struct
*handle
,
753 const char *orig_name
,
757 return shadow_copy2_strip_snapshot_internal(mem_ctx
,
765 static char *shadow_copy2_find_mount_point(TALLOC_CTX
*mem_ctx
,
766 vfs_handle_struct
*handle
)
768 char *path
= talloc_strdup(mem_ctx
, handle
->conn
->connectpath
);
773 if (stat(path
, &st
) != 0) {
780 while ((p
= strrchr(path
, '/')) && p
> path
) {
782 if (stat(path
, &st
) != 0) {
786 if (st
.st_dev
!= dev
) {
796 * Convert from a name as handed in via the SMB layer
797 * and a timestamp into the local path of the snapshot
798 * of the provided file at the provided time.
799 * Also return the path in the snapshot corresponding
800 * to the file's share root.
802 static char *shadow_copy2_do_convert(TALLOC_CTX
*mem_ctx
,
803 struct vfs_handle_struct
*handle
,
804 const char *name
, time_t timestamp
,
805 size_t *snaproot_len
)
807 struct smb_filename converted_fname
;
809 size_t *slashes
= NULL
;
810 unsigned num_slashes
;
814 char *converted
= NULL
;
815 size_t insertlen
, connectlen
= 0;
819 struct shadow_copy2_config
*config
;
820 struct shadow_copy2_private
*priv
;
821 size_t in_share_offset
= 0;
823 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
826 config
= priv
->config
;
828 DEBUG(10, ("converting '%s'\n", name
));
830 if (!config
->snapdirseverywhere
) {
834 snapshot_path
= shadow_copy2_snapshot_path(talloc_tos(),
837 if (snapshot_path
== NULL
) {
841 if (config
->rel_connectpath
== NULL
) {
842 converted
= talloc_asprintf(mem_ctx
, "%s/%s",
843 snapshot_path
, name
);
845 converted
= talloc_asprintf(mem_ctx
, "%s/%s/%s",
847 config
->rel_connectpath
,
850 if (converted
== NULL
) {
854 ZERO_STRUCT(converted_fname
);
855 converted_fname
.base_name
= converted
;
857 ret
= SMB_VFS_NEXT_LSTAT(handle
, &converted_fname
);
858 DEBUG(10, ("Trying[not snapdirseverywhere] %s: %d (%s)\n",
860 ret
, ret
== 0 ? "ok" : strerror(errno
)));
862 DEBUG(10, ("Found %s\n", converted
));
865 if (snaproot_len
!= NULL
) {
866 *snaproot_len
= strlen(snapshot_path
);
867 if (config
->rel_connectpath
!= NULL
) {
869 strlen(config
->rel_connectpath
) + 1;
877 /* never reached ... */
880 connectlen
= strlen(handle
->conn
->connectpath
);
882 path
= talloc_strdup(mem_ctx
, handle
->conn
->connectpath
);
884 path
= talloc_asprintf(
885 mem_ctx
, "%s/%s", handle
->conn
->connectpath
, name
);
891 pathlen
= talloc_get_size(path
)-1;
893 if (!shadow_copy2_find_slashes(talloc_tos(), path
,
894 &slashes
, &num_slashes
)) {
898 insert
= shadow_copy2_insert_string(talloc_tos(), handle
, timestamp
);
899 if (insert
== NULL
) {
902 insertlen
= talloc_get_size(insert
)-1;
905 * Note: We deliberatly don't expensively initialize the
906 * array with talloc_zero here: Putting zero into
907 * converted[pathlen+insertlen] below is sufficient, because
908 * in the following for loop, the insert string is inserted
909 * at various slash places. So the memory up to position
910 * pathlen+insertlen will always be initialized when the
911 * converted string is used.
913 converted
= talloc_array(mem_ctx
, char, pathlen
+ insertlen
+ 1);
914 if (converted
== NULL
) {
918 if (path
[pathlen
-1] != '/') {
920 * Append a fake slash to find the snapshot root
923 tmp
= talloc_realloc(talloc_tos(), slashes
,
924 size_t, num_slashes
+1);
929 slashes
[num_slashes
] = pathlen
;
935 if (!config
->crossmountpoints
) {
936 min_offset
= strlen(config
->mount_point
);
939 memcpy(converted
, path
, pathlen
+1);
940 converted
[pathlen
+insertlen
] = '\0';
942 ZERO_STRUCT(converted_fname
);
943 converted_fname
.base_name
= converted
;
945 for (i
= num_slashes
-1; i
>=0; i
--) {
951 if (offset
< min_offset
) {
956 if (offset
>= connectlen
) {
957 in_share_offset
= offset
;
960 memcpy(converted
+offset
, insert
, insertlen
);
963 memcpy(converted
+offset
, path
+ slashes
[i
],
964 pathlen
- slashes
[i
]);
966 ret
= SMB_VFS_NEXT_LSTAT(handle
, &converted_fname
);
968 DEBUG(10, ("Trying[snapdirseverywhere] %s: %d (%s)\n",
970 ret
, ret
== 0 ? "ok" : strerror(errno
)));
973 if (snaproot_len
!= NULL
) {
974 *snaproot_len
= in_share_offset
+ insertlen
;
978 if (errno
== ENOTDIR
) {
980 * This is a valid condition: We appended the
981 * .snaphots/@GMT.. to a file name. Just try
982 * with the upper levels.
986 if (errno
!= ENOENT
) {
987 /* Other problem than "not found" */
996 DEBUG(10, ("Found %s\n", converted
));
1003 if (result
== NULL
) {
1004 saved_errno
= errno
;
1006 TALLOC_FREE(converted
);
1007 TALLOC_FREE(insert
);
1008 TALLOC_FREE(slashes
);
1010 if (saved_errno
!= 0) {
1011 errno
= saved_errno
;
1017 * Convert from a name as handed in via the SMB layer
1018 * and a timestamp into the local path of the snapshot
1019 * of the provided file at the provided time.
1021 static char *shadow_copy2_convert(TALLOC_CTX
*mem_ctx
,
1022 struct vfs_handle_struct
*handle
,
1023 const char *name
, time_t timestamp
)
1025 return shadow_copy2_do_convert(mem_ctx
, handle
, name
, timestamp
, NULL
);
1029 modify a sbuf return to ensure that inodes in the shadow directory
1030 are different from those in the main directory
1032 static void convert_sbuf(vfs_handle_struct
*handle
, const char *fname
,
1033 SMB_STRUCT_STAT
*sbuf
)
1035 struct shadow_copy2_private
*priv
;
1037 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
1040 if (priv
->config
->fixinodes
) {
1041 /* some snapshot systems, like GPFS, return the name
1042 device:inode for the snapshot files as the current
1043 files. That breaks the 'restore' button in the shadow copy
1044 GUI, as the client gets a sharing violation.
1046 This is a crude way of allowing both files to be
1047 open at once. It has a slight chance of inode
1048 number collision, but I can't see a better approach
1049 without significant VFS changes
1051 TDB_DATA key
= { .dptr
= discard_const_p(uint8_t, fname
),
1052 .dsize
= strlen(fname
) };
1055 shash
= tdb_jenkins_hash(&key
) & 0xFF000000;
1059 sbuf
->st_ex_ino
^= shash
;
1063 static DIR *shadow_copy2_opendir(vfs_handle_struct
*handle
,
1064 const struct smb_filename
*smb_fname
,
1068 time_t timestamp
= 0;
1069 char *stripped
= NULL
;
1071 int saved_errno
= 0;
1073 struct smb_filename
*conv_smb_fname
= NULL
;
1075 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1077 smb_fname
->base_name
,
1082 if (timestamp
== 0) {
1083 return SMB_VFS_NEXT_OPENDIR(handle
, smb_fname
, mask
, attr
);
1085 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
1086 TALLOC_FREE(stripped
);
1090 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
1095 if (conv_smb_fname
== NULL
) {
1099 ret
= SMB_VFS_NEXT_OPENDIR(handle
, conv_smb_fname
, mask
, attr
);
1101 saved_errno
= errno
;
1104 TALLOC_FREE(conv_smb_fname
);
1105 if (saved_errno
!= 0) {
1106 errno
= saved_errno
;
1111 static int shadow_copy2_rename(vfs_handle_struct
*handle
,
1112 const struct smb_filename
*smb_fname_src
,
1113 const struct smb_filename
*smb_fname_dst
)
1115 time_t timestamp_src
= 0;
1116 time_t timestamp_dst
= 0;
1117 char *snappath_src
= NULL
;
1118 char *snappath_dst
= NULL
;
1120 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
,
1121 smb_fname_src
->base_name
,
1122 ×tamp_src
, NULL
, &snappath_src
)) {
1125 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
,
1126 smb_fname_dst
->base_name
,
1127 ×tamp_dst
, NULL
, &snappath_dst
)) {
1130 if (timestamp_src
!= 0) {
1134 if (timestamp_dst
!= 0) {
1139 * Don't allow rename on already converted paths.
1141 if (snappath_src
!= NULL
) {
1145 if (snappath_dst
!= NULL
) {
1149 return SMB_VFS_NEXT_RENAME(handle
, smb_fname_src
, smb_fname_dst
);
1152 static int shadow_copy2_symlink(vfs_handle_struct
*handle
,
1153 const char *oldname
, const char *newname
)
1155 time_t timestamp_old
= 0;
1156 time_t timestamp_new
= 0;
1157 char *snappath_old
= NULL
;
1158 char *snappath_new
= NULL
;
1160 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
, oldname
,
1161 ×tamp_old
, NULL
, &snappath_old
)) {
1164 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
, newname
,
1165 ×tamp_new
, NULL
, &snappath_new
)) {
1168 if ((timestamp_old
!= 0) || (timestamp_new
!= 0)) {
1173 * Don't allow symlinks on already converted paths.
1175 if ((snappath_old
!= NULL
) || (snappath_new
!= NULL
)) {
1179 return SMB_VFS_NEXT_SYMLINK(handle
, oldname
, newname
);
1182 static int shadow_copy2_link(vfs_handle_struct
*handle
,
1183 const char *oldname
, const char *newname
)
1185 time_t timestamp_old
= 0;
1186 time_t timestamp_new
= 0;
1187 char *snappath_old
= NULL
;
1188 char *snappath_new
= NULL
;
1190 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
, oldname
,
1191 ×tamp_old
, NULL
, &snappath_old
)) {
1194 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
, newname
,
1195 ×tamp_new
, NULL
, &snappath_new
)) {
1198 if ((timestamp_old
!= 0) || (timestamp_new
!= 0)) {
1203 * Don't allow links on already converted paths.
1205 if ((snappath_old
!= NULL
) || (snappath_new
!= NULL
)) {
1209 return SMB_VFS_NEXT_LINK(handle
, oldname
, newname
);
1212 static int shadow_copy2_stat(vfs_handle_struct
*handle
,
1213 struct smb_filename
*smb_fname
)
1215 time_t timestamp
= 0;
1216 char *stripped
= NULL
;
1218 int saved_errno
= 0;
1221 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
1222 smb_fname
->base_name
,
1223 ×tamp
, &stripped
)) {
1226 if (timestamp
== 0) {
1227 return SMB_VFS_NEXT_STAT(handle
, smb_fname
);
1230 tmp
= smb_fname
->base_name
;
1231 smb_fname
->base_name
= shadow_copy2_convert(
1232 talloc_tos(), handle
, stripped
, timestamp
);
1233 TALLOC_FREE(stripped
);
1235 if (smb_fname
->base_name
== NULL
) {
1236 smb_fname
->base_name
= tmp
;
1240 ret
= SMB_VFS_NEXT_STAT(handle
, smb_fname
);
1242 saved_errno
= errno
;
1245 TALLOC_FREE(smb_fname
->base_name
);
1246 smb_fname
->base_name
= tmp
;
1249 convert_sbuf(handle
, smb_fname
->base_name
, &smb_fname
->st
);
1251 if (saved_errno
!= 0) {
1252 errno
= saved_errno
;
1257 static int shadow_copy2_lstat(vfs_handle_struct
*handle
,
1258 struct smb_filename
*smb_fname
)
1260 time_t timestamp
= 0;
1261 char *stripped
= NULL
;
1263 int saved_errno
= 0;
1266 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
1267 smb_fname
->base_name
,
1268 ×tamp
, &stripped
)) {
1271 if (timestamp
== 0) {
1272 return SMB_VFS_NEXT_LSTAT(handle
, smb_fname
);
1275 tmp
= smb_fname
->base_name
;
1276 smb_fname
->base_name
= shadow_copy2_convert(
1277 talloc_tos(), handle
, stripped
, timestamp
);
1278 TALLOC_FREE(stripped
);
1280 if (smb_fname
->base_name
== NULL
) {
1281 smb_fname
->base_name
= tmp
;
1285 ret
= SMB_VFS_NEXT_LSTAT(handle
, smb_fname
);
1287 saved_errno
= errno
;
1290 TALLOC_FREE(smb_fname
->base_name
);
1291 smb_fname
->base_name
= tmp
;
1294 convert_sbuf(handle
, smb_fname
->base_name
, &smb_fname
->st
);
1296 if (saved_errno
!= 0) {
1297 errno
= saved_errno
;
1302 static int shadow_copy2_fstat(vfs_handle_struct
*handle
, files_struct
*fsp
,
1303 SMB_STRUCT_STAT
*sbuf
)
1305 time_t timestamp
= 0;
1308 ret
= SMB_VFS_NEXT_FSTAT(handle
, fsp
, sbuf
);
1312 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
1313 fsp
->fsp_name
->base_name
,
1314 ×tamp
, NULL
)) {
1317 if (timestamp
!= 0) {
1318 convert_sbuf(handle
, fsp
->fsp_name
->base_name
, sbuf
);
1323 static int shadow_copy2_open(vfs_handle_struct
*handle
,
1324 struct smb_filename
*smb_fname
, files_struct
*fsp
,
1325 int flags
, mode_t mode
)
1327 time_t timestamp
= 0;
1328 char *stripped
= NULL
;
1330 int saved_errno
= 0;
1333 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
1334 smb_fname
->base_name
,
1335 ×tamp
, &stripped
)) {
1338 if (timestamp
== 0) {
1339 return SMB_VFS_NEXT_OPEN(handle
, smb_fname
, fsp
, flags
, mode
);
1342 tmp
= smb_fname
->base_name
;
1343 smb_fname
->base_name
= shadow_copy2_convert(
1344 talloc_tos(), handle
, stripped
, timestamp
);
1345 TALLOC_FREE(stripped
);
1347 if (smb_fname
->base_name
== NULL
) {
1348 smb_fname
->base_name
= tmp
;
1352 ret
= SMB_VFS_NEXT_OPEN(handle
, smb_fname
, fsp
, flags
, mode
);
1354 saved_errno
= errno
;
1357 TALLOC_FREE(smb_fname
->base_name
);
1358 smb_fname
->base_name
= tmp
;
1360 if (saved_errno
!= 0) {
1361 errno
= saved_errno
;
1366 static int shadow_copy2_unlink(vfs_handle_struct
*handle
,
1367 const struct smb_filename
*smb_fname
)
1369 time_t timestamp
= 0;
1370 char *stripped
= NULL
;
1371 int saved_errno
= 0;
1373 struct smb_filename
*conv
;
1375 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
1376 smb_fname
->base_name
,
1377 ×tamp
, &stripped
)) {
1380 if (timestamp
== 0) {
1381 return SMB_VFS_NEXT_UNLINK(handle
, smb_fname
);
1383 conv
= cp_smb_filename(talloc_tos(), smb_fname
);
1388 conv
->base_name
= shadow_copy2_convert(
1389 conv
, handle
, stripped
, timestamp
);
1390 TALLOC_FREE(stripped
);
1391 if (conv
->base_name
== NULL
) {
1394 ret
= SMB_VFS_NEXT_UNLINK(handle
, conv
);
1396 saved_errno
= errno
;
1399 if (saved_errno
!= 0) {
1400 errno
= saved_errno
;
1405 static int shadow_copy2_chmod(vfs_handle_struct
*handle
,
1406 const struct smb_filename
*smb_fname
,
1409 time_t timestamp
= 0;
1410 char *stripped
= NULL
;
1411 int saved_errno
= 0;
1414 struct smb_filename
*conv_smb_fname
;
1416 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1418 smb_fname
->base_name
,
1423 if (timestamp
== 0) {
1424 TALLOC_FREE(stripped
);
1425 return SMB_VFS_NEXT_CHMOD(handle
, smb_fname
, mode
);
1427 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
1428 TALLOC_FREE(stripped
);
1432 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
1437 if (conv_smb_fname
== NULL
) {
1443 ret
= SMB_VFS_NEXT_CHMOD(handle
, conv_smb_fname
, mode
);
1445 saved_errno
= errno
;
1448 TALLOC_FREE(conv_smb_fname
);
1449 if (saved_errno
!= 0) {
1450 errno
= saved_errno
;
1455 static int shadow_copy2_chown(vfs_handle_struct
*handle
,
1456 const struct smb_filename
*smb_fname
,
1460 time_t timestamp
= 0;
1461 char *stripped
= NULL
;
1462 int saved_errno
= 0;
1465 struct smb_filename
*conv_smb_fname
= NULL
;
1467 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1469 smb_fname
->base_name
,
1474 if (timestamp
== 0) {
1475 return SMB_VFS_NEXT_CHOWN(handle
, smb_fname
, uid
, gid
);
1477 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
1478 TALLOC_FREE(stripped
);
1482 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
1487 if (conv_smb_fname
== NULL
) {
1492 ret
= SMB_VFS_NEXT_CHOWN(handle
, conv_smb_fname
, uid
, gid
);
1494 saved_errno
= errno
;
1497 TALLOC_FREE(conv_smb_fname
);
1498 if (saved_errno
!= 0) {
1499 errno
= saved_errno
;
1504 static void store_cwd_data(vfs_handle_struct
*handle
,
1505 const char *connectpath
)
1507 struct shadow_copy2_private
*priv
= NULL
;
1510 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
1513 TALLOC_FREE(priv
->shadow_cwd
);
1514 cwd
= SMB_VFS_NEXT_GETWD(handle
);
1516 smb_panic("getwd failed\n");
1518 DBG_DEBUG("shadow cwd = %s\n", cwd
);
1519 priv
->shadow_cwd
= talloc_strdup(priv
, cwd
);
1521 if (priv
->shadow_cwd
== NULL
) {
1522 smb_panic("talloc failed\n");
1524 TALLOC_FREE(priv
->shadow_connectpath
);
1526 DBG_DEBUG("shadow conectpath = %s\n", connectpath
);
1527 priv
->shadow_connectpath
= talloc_strdup(priv
, connectpath
);
1528 if (priv
->shadow_connectpath
== NULL
) {
1529 smb_panic("talloc failed\n");
1534 static int shadow_copy2_chdir(vfs_handle_struct
*handle
,
1537 time_t timestamp
= 0;
1538 char *stripped
= NULL
;
1539 char *snappath
= NULL
;
1541 int saved_errno
= 0;
1543 size_t rootpath_len
= 0;
1545 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle
, fname
,
1546 ×tamp
, &stripped
, &snappath
)) {
1549 if (stripped
!= NULL
) {
1550 conv
= shadow_copy2_do_convert(talloc_tos(),
1555 TALLOC_FREE(stripped
);
1562 ret
= SMB_VFS_NEXT_CHDIR(handle
, fname
);
1564 saved_errno
= errno
;
1568 if (conv
!= NULL
&& rootpath_len
!= 0) {
1569 conv
[rootpath_len
] = '\0';
1570 } else if (snappath
!= 0) {
1574 store_cwd_data(handle
, conv
);
1577 TALLOC_FREE(stripped
);
1580 if (saved_errno
!= 0) {
1581 errno
= saved_errno
;
1586 static int shadow_copy2_ntimes(vfs_handle_struct
*handle
,
1587 const struct smb_filename
*smb_fname
,
1588 struct smb_file_time
*ft
)
1590 time_t timestamp
= 0;
1591 char *stripped
= NULL
;
1592 int saved_errno
= 0;
1594 struct smb_filename
*conv
;
1596 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
1597 smb_fname
->base_name
,
1598 ×tamp
, &stripped
)) {
1601 if (timestamp
== 0) {
1602 return SMB_VFS_NEXT_NTIMES(handle
, smb_fname
, ft
);
1604 conv
= cp_smb_filename(talloc_tos(), smb_fname
);
1609 conv
->base_name
= shadow_copy2_convert(
1610 conv
, handle
, stripped
, timestamp
);
1611 TALLOC_FREE(stripped
);
1612 if (conv
->base_name
== NULL
) {
1615 ret
= SMB_VFS_NEXT_NTIMES(handle
, conv
, ft
);
1617 saved_errno
= errno
;
1620 if (saved_errno
!= 0) {
1621 errno
= saved_errno
;
1626 static int shadow_copy2_readlink(vfs_handle_struct
*handle
,
1627 const char *fname
, char *buf
, size_t bufsiz
)
1629 time_t timestamp
= 0;
1630 char *stripped
= NULL
;
1631 int saved_errno
= 0;
1635 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
1636 ×tamp
, &stripped
)) {
1639 if (timestamp
== 0) {
1640 return SMB_VFS_NEXT_READLINK(handle
, fname
, buf
, bufsiz
);
1642 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
1643 TALLOC_FREE(stripped
);
1647 ret
= SMB_VFS_NEXT_READLINK(handle
, conv
, buf
, bufsiz
);
1649 saved_errno
= errno
;
1652 if (saved_errno
!= 0) {
1653 errno
= saved_errno
;
1658 static int shadow_copy2_mknod(vfs_handle_struct
*handle
,
1659 const char *fname
, mode_t mode
, SMB_DEV_T dev
)
1661 time_t timestamp
= 0;
1662 char *stripped
= NULL
;
1663 int saved_errno
= 0;
1667 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
1668 ×tamp
, &stripped
)) {
1671 if (timestamp
== 0) {
1672 return SMB_VFS_NEXT_MKNOD(handle
, fname
, mode
, dev
);
1674 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
1675 TALLOC_FREE(stripped
);
1679 ret
= SMB_VFS_NEXT_MKNOD(handle
, conv
, mode
, dev
);
1681 saved_errno
= errno
;
1684 if (saved_errno
!= 0) {
1685 errno
= saved_errno
;
1690 static char *shadow_copy2_realpath(vfs_handle_struct
*handle
,
1693 time_t timestamp
= 0;
1694 char *stripped
= NULL
;
1696 char *result
= NULL
;
1697 int saved_errno
= 0;
1699 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
1700 ×tamp
, &stripped
)) {
1703 if (timestamp
== 0) {
1704 return SMB_VFS_NEXT_REALPATH(handle
, fname
);
1707 tmp
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
1712 result
= SMB_VFS_NEXT_REALPATH(handle
, tmp
);
1715 if (result
== NULL
) {
1716 saved_errno
= errno
;
1719 TALLOC_FREE(stripped
);
1720 if (saved_errno
!= 0) {
1721 errno
= saved_errno
;
1727 * Check whether a given directory contains a
1728 * snapshot directory as direct subdirectory.
1729 * If yes, return the path of the snapshot-subdir,
1730 * otherwise return NULL.
1732 static char *have_snapdir(struct vfs_handle_struct
*handle
,
1735 struct smb_filename smb_fname
;
1737 struct shadow_copy2_private
*priv
;
1739 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
1742 ZERO_STRUCT(smb_fname
);
1743 smb_fname
.base_name
= talloc_asprintf(talloc_tos(), "%s/%s",
1744 path
, priv
->config
->snapdir
);
1745 if (smb_fname
.base_name
== NULL
) {
1749 ret
= SMB_VFS_NEXT_STAT(handle
, &smb_fname
);
1750 if ((ret
== 0) && (S_ISDIR(smb_fname
.st
.st_ex_mode
))) {
1751 return smb_fname
.base_name
;
1753 TALLOC_FREE(smb_fname
.base_name
);
1757 static bool check_access_snapdir(struct vfs_handle_struct
*handle
,
1760 struct smb_filename smb_fname
;
1764 ZERO_STRUCT(smb_fname
);
1765 smb_fname
.base_name
= talloc_asprintf(talloc_tos(),
1768 if (smb_fname
.base_name
== NULL
) {
1772 ret
= SMB_VFS_NEXT_STAT(handle
, &smb_fname
);
1773 if (ret
!= 0 || !S_ISDIR(smb_fname
.st
.st_ex_mode
)) {
1774 TALLOC_FREE(smb_fname
.base_name
);
1778 status
= smbd_check_access_rights(handle
->conn
,
1782 if (!NT_STATUS_IS_OK(status
)) {
1783 DEBUG(0,("user does not have list permission "
1785 smb_fname
.base_name
));
1786 TALLOC_FREE(smb_fname
.base_name
);
1789 TALLOC_FREE(smb_fname
.base_name
);
1794 * Find the snapshot directory (if any) for the given
1795 * filename (which is relative to the share).
1797 static const char *shadow_copy2_find_snapdir(TALLOC_CTX
*mem_ctx
,
1798 struct vfs_handle_struct
*handle
,
1799 struct smb_filename
*smb_fname
)
1802 const char *snapdir
;
1803 struct shadow_copy2_config
*config
;
1804 struct shadow_copy2_private
*priv
;
1806 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
1809 config
= priv
->config
;
1812 * If the non-snapdisrseverywhere mode, we should not search!
1814 if (!config
->snapdirseverywhere
) {
1815 return config
->snapshot_basepath
;
1818 path
= talloc_asprintf(mem_ctx
, "%s/%s",
1819 handle
->conn
->connectpath
,
1820 smb_fname
->base_name
);
1825 snapdir
= have_snapdir(handle
, path
);
1826 if (snapdir
!= NULL
) {
1831 while ((p
= strrchr(path
, '/')) && (p
> path
)) {
1835 snapdir
= have_snapdir(handle
, path
);
1836 if (snapdir
!= NULL
) {
1845 static bool shadow_copy2_snapshot_to_gmt(vfs_handle_struct
*handle
,
1847 char *gmt
, size_t gmt_len
)
1849 struct tm timestamp
;
1851 unsigned long int timestamp_long
;
1853 struct shadow_copy2_config
*config
;
1854 struct shadow_copy2_private
*priv
;
1855 char *tmpstr
= NULL
;
1857 bool converted
= false;
1860 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
1863 config
= priv
->config
;
1865 fmt
= config
->gmt_format
;
1868 * If regex is provided, then we will have to parse the
1869 * filename which will contain both the prefix and the time format.
1870 * e.g. <prefix><delimiter><time_format>
1872 if (priv
->snaps
->regex
!= NULL
) {
1873 tmpstr
= talloc_strdup(talloc_tos(), name
);
1874 /* point "name" to the time format */
1875 name
= strstr(name
, priv
->config
->delimiter
);
1879 /* Extract the prefix */
1880 tmp
= strstr(tmpstr
, priv
->config
->delimiter
);
1887 ret
= regexec(priv
->snaps
->regex
, tmpstr
, 0, NULL
, 0);
1889 DBG_DEBUG("shadow_copy2_snapshot_to_gmt: "
1890 "no regex match for %s\n", tmpstr
);
1895 ZERO_STRUCT(timestamp
);
1896 if (config
->use_sscanf
) {
1897 if (sscanf(name
, fmt
, ×tamp_long
) != 1) {
1898 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: "
1899 "no sscanf match %s: %s\n",
1903 timestamp_t
= timestamp_long
;
1904 gmtime_r(×tamp_t
, ×tamp
);
1906 if (strptime(name
, fmt
, ×tamp
) == NULL
) {
1907 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: "
1908 "no match %s: %s\n",
1912 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: match %s: %s\n",
1915 if (config
->use_localtime
) {
1916 timestamp
.tm_isdst
= -1;
1917 timestamp_t
= mktime(×tamp
);
1918 gmtime_r(×tamp_t
, ×tamp
);
1922 strftime(gmt
, gmt_len
, GMT_FORMAT
, ×tamp
);
1926 TALLOC_FREE(tmpstr
);
1930 static int shadow_copy2_label_cmp_asc(const void *x
, const void *y
)
1932 return strncmp((const char *)x
, (const char *)y
, sizeof(SHADOW_COPY_LABEL
));
1935 static int shadow_copy2_label_cmp_desc(const void *x
, const void *y
)
1937 return -strncmp((const char *)x
, (const char *)y
, sizeof(SHADOW_COPY_LABEL
));
1941 sort the shadow copy data in ascending or descending order
1943 static void shadow_copy2_sort_data(vfs_handle_struct
*handle
,
1944 struct shadow_copy_data
*shadow_copy2_data
)
1946 int (*cmpfunc
)(const void *, const void *);
1948 struct shadow_copy2_private
*priv
;
1950 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
1953 sort
= priv
->config
->sort_order
;
1958 if (strcmp(sort
, "asc") == 0) {
1959 cmpfunc
= shadow_copy2_label_cmp_asc
;
1960 } else if (strcmp(sort
, "desc") == 0) {
1961 cmpfunc
= shadow_copy2_label_cmp_desc
;
1966 if (shadow_copy2_data
&& shadow_copy2_data
->num_volumes
> 0 &&
1967 shadow_copy2_data
->labels
)
1969 TYPESAFE_QSORT(shadow_copy2_data
->labels
,
1970 shadow_copy2_data
->num_volumes
,
1975 static int shadow_copy2_get_shadow_copy_data(
1976 vfs_handle_struct
*handle
, files_struct
*fsp
,
1977 struct shadow_copy_data
*shadow_copy2_data
,
1981 const char *snapdir
;
1982 struct smb_filename
*snapdir_smb_fname
= NULL
;
1984 TALLOC_CTX
*tmp_ctx
= talloc_stackframe();
1985 struct shadow_copy2_private
*priv
= NULL
;
1986 struct shadow_copy2_snapentry
*tmpentry
= NULL
;
1987 bool get_snaplist
= false;
1988 bool access_granted
= false;
1991 snapdir
= shadow_copy2_find_snapdir(tmp_ctx
, handle
, fsp
->fsp_name
);
1992 if (snapdir
== NULL
) {
1993 DEBUG(0,("shadow:snapdir not found for %s in get_shadow_copy_data\n",
1994 handle
->conn
->connectpath
));
1999 access_granted
= check_access_snapdir(handle
, snapdir
);
2000 if (!access_granted
) {
2001 DEBUG(0,("access denied on listing snapdir %s\n", snapdir
));
2006 snapdir_smb_fname
= synthetic_smb_fname(talloc_tos(),
2010 fsp
->fsp_name
->flags
);
2011 if (snapdir_smb_fname
== NULL
) {
2016 p
= SMB_VFS_NEXT_OPENDIR(handle
, snapdir_smb_fname
, NULL
, 0);
2019 DEBUG(2,("shadow_copy2: SMB_VFS_NEXT_OPENDIR() failed for '%s'"
2020 " - %s\n", snapdir
, strerror(errno
)));
2025 if (shadow_copy2_data
!= NULL
) {
2026 shadow_copy2_data
->num_volumes
= 0;
2027 shadow_copy2_data
->labels
= NULL
;
2030 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
2034 * Normally this function is called twice once with labels = false and
2035 * then with labels = true. When labels is false it will return the
2036 * number of volumes so that the caller can allocate memory for that
2037 * many labels. Therefore to eliminate snaplist both the times it is
2038 * good to check if labels is set or not.
2040 * shadow_copy2_data is NULL when we only want to update the list and
2041 * don't want any labels.
2043 if ((priv
->snaps
->regex
!= NULL
) && (labels
|| shadow_copy2_data
== NULL
)) {
2044 get_snaplist
= true;
2045 /* Reset the global snaplist */
2046 shadow_copy2_delete_snaplist(priv
);
2048 /* Set the current time as snaplist update time */
2049 time(&(priv
->snaps
->fetch_time
));
2052 while ((d
= SMB_VFS_NEXT_READDIR(handle
, p
, NULL
))) {
2053 char snapshot
[GMT_NAME_LEN
+1];
2054 SHADOW_COPY_LABEL
*tlabels
;
2057 * ignore names not of the right form in the snapshot
2060 if (!shadow_copy2_snapshot_to_gmt(
2062 snapshot
, sizeof(snapshot
))) {
2064 DEBUG(6, ("shadow_copy2_get_shadow_copy_data: "
2065 "ignoring %s\n", d
->d_name
));
2068 DEBUG(6,("shadow_copy2_get_shadow_copy_data: %s -> %s\n",
2069 d
->d_name
, snapshot
));
2073 * Create a snap entry for each successful
2076 tmpentry
= shadow_copy2_create_snapentry(priv
);
2077 if (tmpentry
== NULL
) {
2078 DBG_ERR("talloc_zero() failed\n");
2081 tmpentry
->snapname
= talloc_strdup(tmpentry
, d
->d_name
);
2082 tmpentry
->time_fmt
= talloc_strdup(tmpentry
, snapshot
);
2085 if (shadow_copy2_data
== NULL
) {
2090 /* the caller doesn't want the labels */
2091 shadow_copy2_data
->num_volumes
++;
2095 tlabels
= talloc_realloc(shadow_copy2_data
,
2096 shadow_copy2_data
->labels
,
2098 shadow_copy2_data
->num_volumes
+1);
2099 if (tlabels
== NULL
) {
2100 DEBUG(0,("shadow_copy2: out of memory\n"));
2101 SMB_VFS_NEXT_CLOSEDIR(handle
, p
);
2105 strlcpy(tlabels
[shadow_copy2_data
->num_volumes
], snapshot
,
2108 shadow_copy2_data
->num_volumes
++;
2109 shadow_copy2_data
->labels
= tlabels
;
2112 SMB_VFS_NEXT_CLOSEDIR(handle
,p
);
2114 shadow_copy2_sort_data(handle
, shadow_copy2_data
);
2118 TALLOC_FREE(tmp_ctx
);
2122 static NTSTATUS
shadow_copy2_fget_nt_acl(vfs_handle_struct
*handle
,
2123 struct files_struct
*fsp
,
2124 uint32_t security_info
,
2125 TALLOC_CTX
*mem_ctx
,
2126 struct security_descriptor
**ppdesc
)
2128 time_t timestamp
= 0;
2129 char *stripped
= NULL
;
2132 struct smb_filename
*smb_fname
= NULL
;
2134 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
,
2135 fsp
->fsp_name
->base_name
,
2136 ×tamp
, &stripped
)) {
2137 return map_nt_error_from_unix(errno
);
2139 if (timestamp
== 0) {
2140 return SMB_VFS_NEXT_FGET_NT_ACL(handle
, fsp
, security_info
,
2144 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2145 TALLOC_FREE(stripped
);
2147 return map_nt_error_from_unix(errno
);
2149 smb_fname
= synthetic_smb_fname(talloc_tos(),
2153 fsp
->fsp_name
->flags
);
2154 if (smb_fname
== NULL
) {
2156 return NT_STATUS_NO_MEMORY
;
2159 status
= SMB_VFS_NEXT_GET_NT_ACL(handle
, smb_fname
, security_info
,
2162 TALLOC_FREE(smb_fname
);
2166 static NTSTATUS
shadow_copy2_get_nt_acl(vfs_handle_struct
*handle
,
2167 const struct smb_filename
*smb_fname
,
2168 uint32_t security_info
,
2169 TALLOC_CTX
*mem_ctx
,
2170 struct security_descriptor
**ppdesc
)
2172 time_t timestamp
= 0;
2173 char *stripped
= NULL
;
2176 struct smb_filename
*conv_smb_fname
= NULL
;
2178 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2180 smb_fname
->base_name
,
2183 return map_nt_error_from_unix(errno
);
2185 if (timestamp
== 0) {
2186 return SMB_VFS_NEXT_GET_NT_ACL(handle
, smb_fname
, security_info
,
2189 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2190 TALLOC_FREE(stripped
);
2192 return map_nt_error_from_unix(errno
);
2194 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
2199 if (conv_smb_fname
== NULL
) {
2201 return NT_STATUS_NO_MEMORY
;
2203 status
= SMB_VFS_NEXT_GET_NT_ACL(handle
, conv_smb_fname
, security_info
,
2206 TALLOC_FREE(conv_smb_fname
);
2210 static int shadow_copy2_mkdir(vfs_handle_struct
*handle
,
2211 const struct smb_filename
*smb_fname
,
2214 time_t timestamp
= 0;
2215 char *stripped
= NULL
;
2216 int saved_errno
= 0;
2219 struct smb_filename
*conv_smb_fname
= NULL
;
2221 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2223 smb_fname
->base_name
,
2228 if (timestamp
== 0) {
2229 return SMB_VFS_NEXT_MKDIR(handle
, smb_fname
, mode
);
2231 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2232 TALLOC_FREE(stripped
);
2236 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
2241 if (conv_smb_fname
== NULL
) {
2245 ret
= SMB_VFS_NEXT_MKDIR(handle
, conv_smb_fname
, mode
);
2247 saved_errno
= errno
;
2250 TALLOC_FREE(conv_smb_fname
);
2251 if (saved_errno
!= 0) {
2252 errno
= saved_errno
;
2257 static int shadow_copy2_rmdir(vfs_handle_struct
*handle
,
2258 const struct smb_filename
*smb_fname
)
2260 time_t timestamp
= 0;
2261 char *stripped
= NULL
;
2262 int saved_errno
= 0;
2265 struct smb_filename
*conv_smb_fname
= NULL
;
2267 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2269 smb_fname
->base_name
,
2274 if (timestamp
== 0) {
2275 return SMB_VFS_NEXT_RMDIR(handle
, smb_fname
);
2277 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2278 TALLOC_FREE(stripped
);
2282 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
2287 if (conv_smb_fname
== NULL
) {
2291 ret
= SMB_VFS_NEXT_RMDIR(handle
, conv_smb_fname
);
2293 saved_errno
= errno
;
2295 TALLOC_FREE(conv_smb_fname
);
2297 if (saved_errno
!= 0) {
2298 errno
= saved_errno
;
2303 static int shadow_copy2_chflags(vfs_handle_struct
*handle
, const char *fname
,
2306 time_t timestamp
= 0;
2307 char *stripped
= NULL
;
2308 int saved_errno
= 0;
2312 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
2313 ×tamp
, &stripped
)) {
2316 if (timestamp
== 0) {
2317 return SMB_VFS_NEXT_CHFLAGS(handle
, fname
, flags
);
2319 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2320 TALLOC_FREE(stripped
);
2324 ret
= SMB_VFS_NEXT_CHFLAGS(handle
, conv
, flags
);
2326 saved_errno
= errno
;
2329 if (saved_errno
!= 0) {
2330 errno
= saved_errno
;
2335 static ssize_t
shadow_copy2_getxattr(vfs_handle_struct
*handle
,
2336 const char *fname
, const char *aname
,
2337 void *value
, size_t size
)
2339 time_t timestamp
= 0;
2340 char *stripped
= NULL
;
2342 int saved_errno
= 0;
2345 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
2346 ×tamp
, &stripped
)) {
2349 if (timestamp
== 0) {
2350 return SMB_VFS_NEXT_GETXATTR(handle
, fname
, aname
, value
,
2353 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2354 TALLOC_FREE(stripped
);
2358 ret
= SMB_VFS_NEXT_GETXATTR(handle
, conv
, aname
, value
, size
);
2360 saved_errno
= errno
;
2363 if (saved_errno
!= 0) {
2364 errno
= saved_errno
;
2369 static ssize_t
shadow_copy2_listxattr(struct vfs_handle_struct
*handle
,
2370 const struct smb_filename
*smb_fname
,
2371 char *list
, size_t size
)
2373 time_t timestamp
= 0;
2374 char *stripped
= NULL
;
2376 int saved_errno
= 0;
2378 struct smb_filename
*conv_smb_fname
= NULL
;
2380 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2382 smb_fname
->base_name
,
2387 if (timestamp
== 0) {
2388 return SMB_VFS_NEXT_LISTXATTR(handle
, smb_fname
, list
, size
);
2390 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2391 TALLOC_FREE(stripped
);
2395 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
2400 if (conv_smb_fname
== NULL
) {
2404 ret
= SMB_VFS_NEXT_LISTXATTR(handle
, conv_smb_fname
, list
, size
);
2406 saved_errno
= errno
;
2408 TALLOC_FREE(conv_smb_fname
);
2410 if (saved_errno
!= 0) {
2411 errno
= saved_errno
;
2416 static int shadow_copy2_removexattr(vfs_handle_struct
*handle
,
2417 const struct smb_filename
*smb_fname
,
2420 time_t timestamp
= 0;
2421 char *stripped
= NULL
;
2422 int saved_errno
= 0;
2425 struct smb_filename
*conv_smb_fname
= NULL
;
2427 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2429 smb_fname
->base_name
,
2434 if (timestamp
== 0) {
2435 return SMB_VFS_NEXT_REMOVEXATTR(handle
, smb_fname
, aname
);
2437 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2438 TALLOC_FREE(stripped
);
2442 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
2447 if (conv_smb_fname
== NULL
) {
2451 ret
= SMB_VFS_NEXT_REMOVEXATTR(handle
, conv_smb_fname
, aname
);
2453 saved_errno
= errno
;
2455 TALLOC_FREE(conv_smb_fname
);
2457 if (saved_errno
!= 0) {
2458 errno
= saved_errno
;
2463 static int shadow_copy2_setxattr(struct vfs_handle_struct
*handle
,
2465 const char *aname
, const void *value
,
2466 size_t size
, int flags
)
2468 time_t timestamp
= 0;
2469 char *stripped
= NULL
;
2471 int saved_errno
= 0;
2474 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
2475 ×tamp
, &stripped
)) {
2478 if (timestamp
== 0) {
2479 return SMB_VFS_NEXT_SETXATTR(handle
, fname
, aname
, value
, size
,
2482 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2483 TALLOC_FREE(stripped
);
2487 ret
= SMB_VFS_NEXT_SETXATTR(handle
, conv
, aname
, value
, size
, flags
);
2489 saved_errno
= errno
;
2492 if (saved_errno
!= 0) {
2493 errno
= saved_errno
;
2498 static int shadow_copy2_chmod_acl(vfs_handle_struct
*handle
,
2499 const struct smb_filename
*smb_fname
,
2502 time_t timestamp
= 0;
2503 char *stripped
= NULL
;
2505 int saved_errno
= 0;
2507 struct smb_filename
*conv_smb_fname
= NULL
;
2509 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2511 smb_fname
->base_name
,
2516 if (timestamp
== 0) {
2517 return SMB_VFS_NEXT_CHMOD_ACL(handle
, smb_fname
, mode
);
2519 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2520 TALLOC_FREE(stripped
);
2524 conv_smb_fname
= synthetic_smb_fname(talloc_tos(),
2529 if (conv_smb_fname
== NULL
) {
2534 ret
= SMB_VFS_NEXT_CHMOD_ACL(handle
, conv_smb_fname
, mode
);
2536 saved_errno
= errno
;
2539 TALLOC_FREE(conv_smb_fname
);
2540 if (saved_errno
!= 0) {
2541 errno
= saved_errno
;
2546 static int shadow_copy2_get_real_filename(struct vfs_handle_struct
*handle
,
2549 TALLOC_CTX
*mem_ctx
,
2552 time_t timestamp
= 0;
2553 char *stripped
= NULL
;
2555 int saved_errno
= 0;
2558 DEBUG(10, ("shadow_copy2_get_real_filename called for path=[%s], "
2559 "name=[%s]\n", path
, name
));
2561 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, path
,
2562 ×tamp
, &stripped
)) {
2563 DEBUG(10, ("shadow_copy2_strip_snapshot failed\n"));
2566 if (timestamp
== 0) {
2567 DEBUG(10, ("timestamp == 0\n"));
2568 return SMB_VFS_NEXT_GET_REAL_FILENAME(handle
, path
, name
,
2569 mem_ctx
, found_name
);
2571 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2572 TALLOC_FREE(stripped
);
2574 DEBUG(10, ("shadow_copy2_convert failed\n"));
2577 DEBUG(10, ("Calling NEXT_GET_REAL_FILE_NAME for conv=[%s], "
2578 "name=[%s]\n", conv
, name
));
2579 ret
= SMB_VFS_NEXT_GET_REAL_FILENAME(handle
, conv
, name
,
2580 mem_ctx
, found_name
);
2581 DEBUG(10, ("NEXT_REAL_FILE_NAME returned %d\n", (int)ret
));
2583 saved_errno
= errno
;
2586 if (saved_errno
!= 0) {
2587 errno
= saved_errno
;
2592 static const char *shadow_copy2_connectpath(struct vfs_handle_struct
*handle
,
2595 time_t timestamp
= 0;
2596 char *stripped
= NULL
;
2598 char *result
= NULL
;
2599 char *parent_dir
= NULL
;
2600 int saved_errno
= 0;
2601 size_t rootpath_len
= 0;
2602 struct shadow_copy2_private
*priv
= NULL
;
2604 SMB_VFS_HANDLE_GET_DATA(handle
, priv
, struct shadow_copy2_private
,
2607 DBG_DEBUG("Calc connect path for [%s]\n", fname
);
2609 if (priv
->shadow_connectpath
!= NULL
) {
2610 DBG_DEBUG("cached connect path is [%s]\n",
2611 priv
->shadow_connectpath
);
2612 return priv
->shadow_connectpath
;
2615 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, fname
,
2616 ×tamp
, &stripped
)) {
2619 if (timestamp
== 0) {
2620 return SMB_VFS_NEXT_CONNECTPATH(handle
, fname
);
2623 tmp
= shadow_copy2_do_convert(talloc_tos(), handle
, stripped
, timestamp
,
2626 if (errno
!= ENOENT
) {
2631 * If the converted path does not exist, and converting
2632 * the parent yields something that does exist, then
2633 * this path refers to something that has not been
2634 * created yet, relative to the parent path.
2635 * The snapshot finding is relative to the parent.
2636 * (usually snapshots are read/only but this is not
2637 * necessarily true).
2638 * This code also covers getting a wildcard in the
2639 * last component, because this function is called
2640 * prior to sanitizing the path, and in SMB1 we may
2641 * get wildcards in path names.
2643 if (!parent_dirname(talloc_tos(), stripped
, &parent_dir
,
2649 tmp
= shadow_copy2_do_convert(talloc_tos(), handle
, parent_dir
,
2650 timestamp
, &rootpath_len
);
2656 DBG_DEBUG("converted path is [%s] root path is [%.*s]\n", tmp
,
2657 (int)rootpath_len
, tmp
);
2659 tmp
[rootpath_len
] = '\0';
2660 result
= SMB_VFS_NEXT_REALPATH(handle
, tmp
);
2661 if (result
== NULL
) {
2666 * SMB_VFS_NEXT_REALPATH returns a malloc'ed string.
2667 * Don't leak memory.
2669 SAFE_FREE(priv
->shadow_realpath
);
2670 priv
->shadow_realpath
= result
;
2672 DBG_DEBUG("connect path is [%s]\n", result
);
2675 if (result
== NULL
) {
2676 saved_errno
= errno
;
2679 TALLOC_FREE(stripped
);
2680 TALLOC_FREE(parent_dir
);
2681 if (saved_errno
!= 0) {
2682 errno
= saved_errno
;
2687 static uint64_t shadow_copy2_disk_free(vfs_handle_struct
*handle
,
2688 const char *path
, uint64_t *bsize
,
2689 uint64_t *dfree
, uint64_t *dsize
)
2691 time_t timestamp
= 0;
2692 char *stripped
= NULL
;
2694 int saved_errno
= 0;
2697 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, path
,
2698 ×tamp
, &stripped
)) {
2701 if (timestamp
== 0) {
2702 return SMB_VFS_NEXT_DISK_FREE(handle
, path
,
2703 bsize
, dfree
, dsize
);
2706 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2707 TALLOC_FREE(stripped
);
2712 ret
= SMB_VFS_NEXT_DISK_FREE(handle
, conv
, bsize
, dfree
, dsize
);
2715 saved_errno
= errno
;
2718 if (saved_errno
!= 0) {
2719 errno
= saved_errno
;
2725 static int shadow_copy2_get_quota(vfs_handle_struct
*handle
, const char *path
,
2726 enum SMB_QUOTA_TYPE qtype
, unid_t id
,
2729 time_t timestamp
= 0;
2730 char *stripped
= NULL
;
2732 int saved_errno
= 0;
2735 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle
, path
, ×tamp
,
2739 if (timestamp
== 0) {
2740 return SMB_VFS_NEXT_GET_QUOTA(handle
, path
, qtype
, id
, dq
);
2743 conv
= shadow_copy2_convert(talloc_tos(), handle
, stripped
, timestamp
);
2744 TALLOC_FREE(stripped
);
2749 ret
= SMB_VFS_NEXT_GET_QUOTA(handle
, conv
, qtype
, id
, dq
);
2752 saved_errno
= errno
;
2755 if (saved_errno
!= 0) {
2756 errno
= saved_errno
;
2762 static int shadow_copy2_private_destructor(struct shadow_copy2_private
*priv
)
2764 SAFE_FREE(priv
->shadow_realpath
);
2768 static int shadow_copy2_connect(struct vfs_handle_struct
*handle
,
2769 const char *service
, const char *user
)
2771 struct shadow_copy2_config
*config
;
2772 struct shadow_copy2_private
*priv
;
2774 const char *snapdir
;
2775 const char *snapprefix
= NULL
;
2776 const char *delimiter
;
2777 const char *gmt_format
;
2778 const char *sort_order
;
2779 const char *basedir
= NULL
;
2780 const char *snapsharepath
= NULL
;
2781 const char *mount_point
;
2783 DEBUG(10, (__location__
": cnum[%u], connectpath[%s]\n",
2784 (unsigned)handle
->conn
->cnum
,
2785 handle
->conn
->connectpath
));
2787 ret
= SMB_VFS_NEXT_CONNECT(handle
, service
, user
);
2792 priv
= talloc_zero(handle
->conn
, struct shadow_copy2_private
);
2794 DBG_ERR("talloc_zero() failed\n");
2799 talloc_set_destructor(priv
, shadow_copy2_private_destructor
);
2801 priv
->snaps
= talloc_zero(priv
, struct shadow_copy2_snaplist_info
);
2802 if (priv
->snaps
== NULL
) {
2803 DBG_ERR("talloc_zero() failed\n");
2808 config
= talloc_zero(priv
, struct shadow_copy2_config
);
2809 if (config
== NULL
) {
2810 DEBUG(0, ("talloc_zero() failed\n"));
2815 priv
->config
= config
;
2817 gmt_format
= lp_parm_const_string(SNUM(handle
->conn
),
2820 config
->gmt_format
= talloc_strdup(config
, gmt_format
);
2821 if (config
->gmt_format
== NULL
) {
2822 DEBUG(0, ("talloc_strdup() failed\n"));
2827 /* config->gmt_format must not contain a path separator. */
2828 if (strchr(config
->gmt_format
, '/') != NULL
) {
2829 DEBUG(0, ("shadow:format %s must not contain a /"
2830 "character. Unable to initialize module.\n",
2831 config
->gmt_format
));
2836 config
->use_sscanf
= lp_parm_bool(SNUM(handle
->conn
),
2837 "shadow", "sscanf", false);
2839 config
->use_localtime
= lp_parm_bool(SNUM(handle
->conn
),
2840 "shadow", "localtime",
2843 snapdir
= lp_parm_const_string(SNUM(handle
->conn
),
2844 "shadow", "snapdir",
2846 config
->snapdir
= talloc_strdup(config
, snapdir
);
2847 if (config
->snapdir
== NULL
) {
2848 DEBUG(0, ("talloc_strdup() failed\n"));
2853 snapprefix
= lp_parm_const_string(SNUM(handle
->conn
),
2854 "shadow", "snapprefix",
2856 if (snapprefix
!= NULL
) {
2857 priv
->snaps
->regex
= talloc_zero(priv
->snaps
, regex_t
);
2858 if (priv
->snaps
->regex
== NULL
) {
2859 DBG_ERR("talloc_zero() failed\n");
2864 /* pre-compute regex rule for matching pattern later */
2865 ret
= regcomp(priv
->snaps
->regex
, snapprefix
, 0);
2867 DBG_ERR("Failed to create regex object\n");
2872 delimiter
= lp_parm_const_string(SNUM(handle
->conn
),
2873 "shadow", "delimiter",
2875 if (delimiter
!= NULL
) {
2876 priv
->config
->delimiter
= talloc_strdup(priv
->config
, delimiter
);
2877 if (priv
->config
->delimiter
== NULL
) {
2878 DBG_ERR("talloc_strdup() failed\n");
2884 config
->snapdirseverywhere
= lp_parm_bool(SNUM(handle
->conn
),
2886 "snapdirseverywhere",
2889 config
->crossmountpoints
= lp_parm_bool(SNUM(handle
->conn
),
2890 "shadow", "crossmountpoints",
2893 if (config
->crossmountpoints
&& !config
->snapdirseverywhere
) {
2894 DBG_WARNING("Warning: 'crossmountpoints' depends on "
2895 "'snapdirseverywhere'. Disabling crossmountpoints.\n");
2898 config
->fixinodes
= lp_parm_bool(SNUM(handle
->conn
),
2899 "shadow", "fixinodes",
2902 sort_order
= lp_parm_const_string(SNUM(handle
->conn
),
2903 "shadow", "sort", "desc");
2904 config
->sort_order
= talloc_strdup(config
, sort_order
);
2905 if (config
->sort_order
== NULL
) {
2906 DEBUG(0, ("talloc_strdup() failed\n"));
2911 mount_point
= lp_parm_const_string(SNUM(handle
->conn
),
2912 "shadow", "mountpoint", NULL
);
2913 if (mount_point
!= NULL
) {
2914 if (mount_point
[0] != '/') {
2915 DEBUG(1, (__location__
" Warning: 'mountpoint' is "
2916 "relative ('%s'), but it has to be an "
2917 "absolute path. Ignoring provided value.\n",
2922 p
= strstr(handle
->conn
->connectpath
, mount_point
);
2923 if (p
!= handle
->conn
->connectpath
) {
2924 DBG_WARNING("Warning: the share root (%s) is "
2925 "not a subdirectory of the "
2926 "specified mountpoint (%s). "
2927 "Ignoring provided value.\n",
2928 handle
->conn
->connectpath
,
2935 if (mount_point
!= NULL
) {
2936 config
->mount_point
= talloc_strdup(config
, mount_point
);
2937 if (config
->mount_point
== NULL
) {
2938 DEBUG(0, (__location__
" talloc_strdup() failed\n"));
2942 config
->mount_point
= shadow_copy2_find_mount_point(config
,
2944 if (config
->mount_point
== NULL
) {
2945 DBG_WARNING("shadow_copy2_find_mount_point "
2946 "of the share root '%s' failed: %s\n",
2947 handle
->conn
->connectpath
, strerror(errno
));
2952 basedir
= lp_parm_const_string(SNUM(handle
->conn
),
2953 "shadow", "basedir", NULL
);
2955 if (basedir
!= NULL
) {
2956 if (basedir
[0] != '/') {
2957 DEBUG(1, (__location__
" Warning: 'basedir' is "
2958 "relative ('%s'), but it has to be an "
2959 "absolute path. Disabling basedir.\n",
2964 p
= strstr(basedir
, config
->mount_point
);
2966 DEBUG(1, ("Warning: basedir (%s) is not a "
2967 "subdirectory of the share root's "
2968 "mount point (%s). "
2969 "Disabling basedir\n",
2970 basedir
, config
->mount_point
));
2976 if (config
->snapdirseverywhere
&& basedir
!= NULL
) {
2977 DEBUG(1, (__location__
" Warning: 'basedir' is incompatible "
2978 "with 'snapdirseverywhere'. Disabling basedir.\n"));
2982 snapsharepath
= lp_parm_const_string(SNUM(handle
->conn
), "shadow",
2983 "snapsharepath", NULL
);
2984 if (snapsharepath
!= NULL
) {
2985 if (snapsharepath
[0] == '/') {
2986 DBG_WARNING("Warning: 'snapsharepath' is "
2987 "absolute ('%s'), but it has to be a "
2988 "relative path. Disabling snapsharepath.\n",
2990 snapsharepath
= NULL
;
2992 if (config
->snapdirseverywhere
&& snapsharepath
!= NULL
) {
2993 DBG_WARNING("Warning: 'snapsharepath' is incompatible "
2994 "with 'snapdirseverywhere'. Disabling "
2995 "snapsharepath.\n");
2996 snapsharepath
= NULL
;
3000 if (basedir
!= NULL
&& snapsharepath
!= NULL
) {
3001 DBG_WARNING("Warning: 'snapsharepath' is incompatible with "
3002 "'basedir'. Disabling snapsharepath\n");
3003 snapsharepath
= NULL
;
3006 if (snapsharepath
!= NULL
) {
3007 config
->rel_connectpath
= talloc_strdup(config
, snapsharepath
);
3008 if (config
->rel_connectpath
== NULL
) {
3009 DBG_ERR("talloc_strdup() failed\n");
3015 if (basedir
== NULL
) {
3016 basedir
= config
->mount_point
;
3019 if (config
->rel_connectpath
== NULL
&&
3020 strlen(basedir
) < strlen(handle
->conn
->connectpath
)) {
3021 config
->rel_connectpath
= talloc_strdup(config
,
3022 handle
->conn
->connectpath
+ strlen(basedir
));
3023 if (config
->rel_connectpath
== NULL
) {
3024 DEBUG(0, ("talloc_strdup() failed\n"));
3030 if (config
->snapdir
[0] == '/') {
3031 config
->snapdir_absolute
= true;
3033 if (config
->snapdirseverywhere
== true) {
3034 DEBUG(1, (__location__
" Warning: An absolute snapdir "
3035 "is incompatible with 'snapdirseverywhere', "
3036 "setting 'snapdirseverywhere' to false.\n"));
3037 config
->snapdirseverywhere
= false;
3040 if (config
->crossmountpoints
== true) {
3041 DEBUG(1, (__location__
" Warning: 'crossmountpoints' "
3042 "is not supported with an absolute snapdir. "
3043 "Disabling it.\n"));
3044 config
->crossmountpoints
= false;
3047 config
->snapshot_basepath
= config
->snapdir
;
3049 config
->snapshot_basepath
= talloc_asprintf(config
, "%s/%s",
3050 config
->mount_point
, config
->snapdir
);
3051 if (config
->snapshot_basepath
== NULL
) {
3052 DEBUG(0, ("talloc_asprintf() failed\n"));
3058 trim_string(config
->mount_point
, NULL
, "/");
3059 trim_string(config
->rel_connectpath
, "/", "/");
3060 trim_string(config
->snapdir
, NULL
, "/");
3061 trim_string(config
->snapshot_basepath
, NULL
, "/");
3063 DEBUG(10, ("shadow_copy2_connect: configuration:\n"
3064 " share root: '%s'\n"
3065 " mountpoint: '%s'\n"
3066 " rel share root: '%s'\n"
3068 " snapprefix: '%s'\n"
3069 " delimiter: '%s'\n"
3070 " snapshot base path: '%s'\n"
3073 " snapdirs everywhere: %s\n"
3074 " cross mountpoints: %s\n"
3078 handle
->conn
->connectpath
,
3079 config
->mount_point
,
3080 config
->rel_connectpath
,
3084 config
->snapshot_basepath
,
3086 config
->use_sscanf
? "yes" : "no",
3087 config
->snapdirseverywhere
? "yes" : "no",
3088 config
->crossmountpoints
? "yes" : "no",
3089 config
->fixinodes
? "yes" : "no",
3094 SMB_VFS_HANDLE_SET_DATA(handle
, priv
,
3095 NULL
, struct shadow_copy2_private
,
3101 static struct vfs_fn_pointers vfs_shadow_copy2_fns
= {
3102 .connect_fn
= shadow_copy2_connect
,
3103 .opendir_fn
= shadow_copy2_opendir
,
3104 .disk_free_fn
= shadow_copy2_disk_free
,
3105 .get_quota_fn
= shadow_copy2_get_quota
,
3106 .rename_fn
= shadow_copy2_rename
,
3107 .link_fn
= shadow_copy2_link
,
3108 .symlink_fn
= shadow_copy2_symlink
,
3109 .stat_fn
= shadow_copy2_stat
,
3110 .lstat_fn
= shadow_copy2_lstat
,
3111 .fstat_fn
= shadow_copy2_fstat
,
3112 .open_fn
= shadow_copy2_open
,
3113 .unlink_fn
= shadow_copy2_unlink
,
3114 .chmod_fn
= shadow_copy2_chmod
,
3115 .chown_fn
= shadow_copy2_chown
,
3116 .chdir_fn
= shadow_copy2_chdir
,
3117 .ntimes_fn
= shadow_copy2_ntimes
,
3118 .readlink_fn
= shadow_copy2_readlink
,
3119 .mknod_fn
= shadow_copy2_mknod
,
3120 .realpath_fn
= shadow_copy2_realpath
,
3121 .get_nt_acl_fn
= shadow_copy2_get_nt_acl
,
3122 .fget_nt_acl_fn
= shadow_copy2_fget_nt_acl
,
3123 .get_shadow_copy_data_fn
= shadow_copy2_get_shadow_copy_data
,
3124 .mkdir_fn
= shadow_copy2_mkdir
,
3125 .rmdir_fn
= shadow_copy2_rmdir
,
3126 .getxattr_fn
= shadow_copy2_getxattr
,
3127 .listxattr_fn
= shadow_copy2_listxattr
,
3128 .removexattr_fn
= shadow_copy2_removexattr
,
3129 .setxattr_fn
= shadow_copy2_setxattr
,
3130 .chmod_acl_fn
= shadow_copy2_chmod_acl
,
3131 .chflags_fn
= shadow_copy2_chflags
,
3132 .get_real_filename_fn
= shadow_copy2_get_real_filename
,
3133 .connectpath_fn
= shadow_copy2_connectpath
,
3136 NTSTATUS
vfs_shadow_copy2_init(TALLOC_CTX
*);
3137 NTSTATUS
vfs_shadow_copy2_init(TALLOC_CTX
*ctx
)
3139 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION
,
3140 "shadow_copy2", &vfs_shadow_copy2_fns
);