2 Unix SMB/Netbios implementation.
4 Copyright (C) Stefan Metzmacher 2009
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "smbd/smbd.h"
22 #include "smbd/globals.h"
23 #include "lib/smbd_shim.h"
26 #include "tdb_compat.h"
29 struct aio_extra
*aio_list_head
= NULL
;
30 struct tevent_signal
*aio_signal_event
= NULL
;
31 int aio_pending_size
= 0;
32 int outstanding_aio_calls
= 0;
36 struct smbd_dmapi_context
*dmapi_ctx
= NULL
;
40 bool dfree_broken
= false;
42 /* how many write cache buffers have been allocated */
43 unsigned int allocated_write_caches
= 0;
45 const struct mangle_fns
*mangle_fns
= NULL
;
47 unsigned char *chartest
= NULL
;
48 TDB_CONTEXT
*tdb_mangled_cache
= NULL
;
51 this determines how many characters are used from the original filename
52 in the 8.3 mangled name. A larger value leads to a weaker hash and more collisions.
53 The largest possible value is 6.
55 unsigned mangle_prefix
= 0;
57 struct msg_state
*smbd_msg_state
= NULL
;
59 bool logged_ioctl_message
= false;
61 time_t last_smb_conf_reload_time
= 0;
62 time_t last_printer_reload_time
= 0;
63 /****************************************************************************
64 structure to hold a linked list of queued messages.
66 ****************************************************************************/
67 struct pending_message_list
*deferred_open_queue
= NULL
;
68 uint32_t common_flags2
= FLAGS2_LONG_PATH_COMPONENTS
|FLAGS2_32_BIT_ERROR_CODES
|FLAGS2_EXTENDED_ATTRIBUTES
;
70 struct smb_srv_trans_enc_ctx
*partial_srv_trans_enc_ctx
= NULL
;
71 struct smb_srv_trans_enc_ctx
*srv_trans_enc_ctx
= NULL
;
73 /* A stack of security contexts. We include the current context as being
74 the first one, so there is room for another MAX_SEC_CTX_DEPTH more. */
75 struct sec_ctx sec_ctx_stack
[MAX_SEC_CTX_DEPTH
+ 1];
76 int sec_ctx_stack_ndx
= 0;
77 bool become_uid_done
= false;
78 bool become_gid_done
= false;
80 connection_struct
*last_conn
= NULL
;
81 uint16_t last_flags
= 0;
83 uint32_t global_client_caps
= 0;
85 uint16_t fnf_handle
= 257;
87 /* A stack of current_user connection contexts. */
88 struct conn_ctx conn_ctx_stack
[MAX_SEC_CTX_DEPTH
];
89 int conn_ctx_stack_ndx
= 0;
91 struct vfs_init_function_entry
*backends
= NULL
;
92 char *sparse_buf
= NULL
;
95 /* Current number of oplocks we have outstanding. */
96 int32_t exclusive_oplocks_open
= 0;
97 int32_t level_II_oplocks_open
= 0;
98 struct kernel_oplocks
*koplocks
= NULL
;
101 struct memcache
*smbd_memcache_ctx
= NULL
;
102 bool exit_firsttime
= true;
103 struct child_pid
*children
= 0;
104 int num_children
= 0;
106 struct smbd_server_connection
*smbd_server_conn
= NULL
;
108 struct smbd_server_connection
*msg_ctx_to_sconn(struct messaging_context
*msg_ctx
)
110 struct server_id my_id
, msg_id
;
112 my_id
= messaging_server_id(smbd_server_conn
->msg_ctx
);
113 msg_id
= messaging_server_id(msg_ctx
);
115 if (!procid_equal(&my_id
, &msg_id
)) {
118 return smbd_server_conn
;
121 struct messaging_context
*smbd_messaging_context(void)
123 struct messaging_context
*msg_ctx
= server_messaging_context();
124 if (likely(msg_ctx
!= NULL
)) {
127 smb_panic("Could not init smbd's messaging context.\n");
131 struct memcache
*smbd_memcache(void)
133 if (!smbd_memcache_ctx
) {
135 * Note we MUST use the NULL context here, not the
136 * autofree context, to avoid side effects in forked
139 smbd_memcache_ctx
= memcache_init(NULL
,
140 lp_max_stat_cache_size()*1024);
142 if (!smbd_memcache_ctx
) {
143 smb_panic("Could not init smbd memcache");
146 return smbd_memcache_ctx
;
149 static const struct smbd_shim smbd_shim_fns
=
151 .cancel_pending_lock_requests_by_fid
= smbd_cancel_pending_lock_requests_by_fid
,
152 .send_stat_cache_delete_message
= smbd_send_stat_cache_delete_message
,
153 .can_delete_directory
= smbd_can_delete_directory
,
154 .change_to_root_user
= smbd_change_to_root_user
,
156 .contend_level2_oplocks_begin
= smbd_contend_level2_oplocks_begin
,
157 .contend_level2_oplocks_end
= smbd_contend_level2_oplocks_end
,
159 .become_root
= smbd_become_root
,
160 .unbecome_root
= smbd_unbecome_root
163 void smbd_init_globals(void)
165 set_smbd_shim(&smbd_shim_fns
);
167 ZERO_STRUCT(conn_ctx_stack
);
169 ZERO_STRUCT(sec_ctx_stack
);
171 smbd_server_conn
= talloc_zero(server_event_context(), struct smbd_server_connection
);
172 if (!smbd_server_conn
) {
173 exit_server("failed to create smbd_server_connection");
176 smbd_server_conn
->smb1
.echo_handler
.trusted_fd
= -1;
177 smbd_server_conn
->smb1
.echo_handler
.socket_lock_fd
= -1;