2 Unix SMB/Netbios implementation.
4 Copyright (C) Stefan Metzmacher 2009
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "smbd/globals.h"
25 struct aio_extra *aio_list_head = NULL;
26 struct tevent_signal *aio_signal_event = NULL;
27 int aio_pending_size = 0;
28 int outstanding_aio_calls = 0;
32 struct smbd_dmapi_context *dmapi_ctx = NULL;
36 bool dfree_broken = false;
38 /* how many write cache buffers have been allocated */
39 unsigned int allocated_write_caches = 0;
41 int real_max_open_files = 0;
42 struct bitmap *file_bmap = NULL;
44 struct fsp_singleton_cache fsp_fi_cache = {
52 unsigned long file_gen_counter = 0;
55 const struct mangle_fns *mangle_fns = NULL;
57 unsigned char *chartest = NULL;
58 TDB_CONTEXT *tdb_mangled_cache = NULL;
61 this determines how many characters are used from the original filename
62 in the 8.3 mangled name. A larger value leads to a weaker hash and more collisions.
63 The largest possible value is 6.
65 unsigned mangle_prefix = 0;
67 struct msg_state *smbd_msg_state = NULL;
69 bool logged_ioctl_message = false;
72 time_t last_smb_conf_reload_time = 0;
73 time_t last_printer_reload_time = 0;
74 /****************************************************************************
75 structure to hold a linked list of queued messages.
77 ****************************************************************************/
78 struct pending_message_list *deferred_open_queue = NULL;
79 uint32_t common_flags2 = FLAGS2_LONG_PATH_COMPONENTS|FLAGS2_32_BIT_ERROR_CODES|FLAGS2_EXTENDED_ATTRIBUTES;
81 struct smb_srv_trans_enc_ctx *partial_srv_trans_enc_ctx = NULL;
82 struct smb_srv_trans_enc_ctx *srv_trans_enc_ctx = NULL;
84 /* A stack of security contexts. We include the current context as being
85 the first one, so there is room for another MAX_SEC_CTX_DEPTH more. */
86 struct sec_ctx sec_ctx_stack[MAX_SEC_CTX_DEPTH + 1];
87 int sec_ctx_stack_ndx = 0;
88 bool become_uid_done = false;
89 bool become_gid_done = false;
91 connection_struct *last_conn = NULL;
92 uint16_t last_flags = 0;
94 uint32_t global_client_caps = 0;
96 uint16_t fnf_handle = 257;
98 /* A stack of current_user connection contexts. */
99 struct conn_ctx conn_ctx_stack[MAX_SEC_CTX_DEPTH];
100 int conn_ctx_stack_ndx = 0;
102 struct vfs_init_function_entry *backends = NULL;
103 char *sparse_buf = NULL;
104 char *LastDir = NULL;
106 /* Current number of oplocks we have outstanding. */
107 int32_t exclusive_oplocks_open = 0;
108 int32_t level_II_oplocks_open = 0;
109 struct kernel_oplocks *koplocks = NULL;
112 struct memcache *smbd_memcache_ctx = NULL;
113 bool exit_firsttime = true;
114 struct child_pid *children = 0;
115 int num_children = 0;
117 struct smbd_server_connection *smbd_server_conn = NULL;
119 struct messaging_context *smbd_messaging_context(void)
121 return server_messaging_context();
124 struct memcache *smbd_memcache(void)
126 if (!smbd_memcache_ctx) {
128 * Note we MUST use the NULL context here, not the
129 * autofree context, to avoid side effects in forked
132 smbd_memcache_ctx = memcache_init(NULL,
133 lp_max_stat_cache_size()*1024);
135 if (!smbd_memcache_ctx) {
136 smb_panic("Could not init smbd memcache");
139 return smbd_memcache_ctx;
143 void smbd_init_globals(void)
145 ZERO_STRUCT(conn_ctx_stack);
147 ZERO_STRUCT(sec_ctx_stack);
149 smbd_server_conn = talloc_zero(smbd_event_context(), struct smbd_server_connection);
150 if (!smbd_server_conn) {
151 exit_server("failed to create smbd_server_connection");
154 smbd_server_conn->smb1.echo_handler.trusted_fd = -1;
155 smbd_server_conn->smb1.echo_handler.socket_lock_fd = -1;