2 * shadow_copy2: a shadow copy module (second implementation)
4 * Copyright (C) Andrew Tridgell 2007 (portions taken from shadow_copy2)
5 * Copyright (C) Ed Plese 2009
6 * Copyright (C) Volker Lendecke 2011
7 * Copyright (C) Christian Ambach 2011
8 * Copyright (C) Michael Adam 2013
9 * Copyright (C) Rajesh Joseph 2016
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 * This is a second implemetation of a shadow copy module for exposing
28 * file system snapshots to windows clients as shadow copies.
30 * See the manual page for documentation.
34 #include "smbd/smbd.h"
35 #include "system/filesys.h"
36 #include "include/ntioctl.h"
38 #include "lib/util_path.h"
39 #include "libcli/security/security.h"
40 #include "lib/util/tevent_unix.h"
42 struct shadow_copy2_config {
48 bool snapdirseverywhere;
49 bool crossmountpoints;
52 bool snapdir_absolute;
54 char *rel_connectpath; /* share root, relative to a snapshot root */
55 char *snapshot_basepath; /* the absolute version of snapdir */
58 /* Data-structure to hold the list of snap entries */
59 struct shadow_copy2_snapentry {
62 struct shadow_copy2_snapentry *next;
63 struct shadow_copy2_snapentry *prev;
66 struct shadow_copy2_snaplist_info {
67 struct shadow_copy2_snapentry *snaplist; /* snapshot list */
68 regex_t *regex; /* Regex to filter snaps */
69 time_t fetch_time; /* snaplist update time */
74 * shadow_copy2 private structure. This structure will be
75 * used to keep module specific information
77 struct shadow_copy2_private {
78 struct shadow_copy2_config *config;
79 struct shadow_copy2_snaplist_info *snaps;
80 char *shadow_cwd; /* Absolute $cwd path. */
81 /* Absolute connectpath - can vary depending on $cwd. */
82 char *shadow_connectpath;
83 /* talloc'ed realpath return. */
84 struct smb_filename *shadow_realpath;
87 static int shadow_copy2_get_shadow_copy_data(
88 vfs_handle_struct *handle, files_struct *fsp,
89 struct shadow_copy_data *shadow_copy2_data,
93 *This function will create a new snapshot list entry and
94 * return to the caller. This entry will also be added to
95 * the global snapshot list.
97 * @param[in] priv shadow_copy2 specific data structure
98 * @return Newly created snapshot entry or NULL on failure
100 static struct shadow_copy2_snapentry *shadow_copy2_create_snapentry(
101 struct shadow_copy2_private *priv)
103 struct shadow_copy2_snapentry *tmpentry = NULL;
105 tmpentry = talloc_zero(priv->snaps, struct shadow_copy2_snapentry);
106 if (tmpentry == NULL) {
107 DBG_ERR("talloc_zero() failed\n");
112 DLIST_ADD(priv->snaps->snaplist, tmpentry);
118 *This function will delete the entire snaplist and reset
119 * priv->snaps->snaplist to NULL.
121 * @param[in] priv shadow_copye specific data structure
123 static void shadow_copy2_delete_snaplist(struct shadow_copy2_private *priv)
125 struct shadow_copy2_snapentry *tmp = NULL;
127 while ((tmp = priv->snaps->snaplist) != NULL) {
128 DLIST_REMOVE(priv->snaps->snaplist, tmp);
134 * Given a timestamp this function searches the global snapshot list
135 * and returns the complete snapshot directory name saved in the entry.
137 * @param[in] priv shadow_copy2 specific structure
138 * @param[in] timestamp timestamp corresponding to one of the snapshot
139 * @param[out] snap_str buffer to copy the actual snapshot name
140 * @param[in] len length of snap_str buffer
142 * @return Length of actual snapshot name, and -1 on failure
144 static ssize_t shadow_copy2_saved_snapname(struct shadow_copy2_private *priv,
145 struct tm *timestamp,
146 char *snap_str, size_t len)
148 ssize_t snaptime_len = -1;
149 struct shadow_copy2_snapentry *entry = NULL;
151 snaptime_len = strftime(snap_str, len, GMT_FORMAT, timestamp);
152 if (snaptime_len == 0) {
153 DBG_ERR("strftime failed\n");
159 for (entry = priv->snaps->snaplist; entry; entry = entry->next) {
160 if (strcmp(entry->time_fmt, snap_str) == 0) {
161 snaptime_len = snprintf(snap_str, len, "%s",
173 * This function will check if snaplist is updated or not. If snaplist
174 * is empty then it will create a new list. Each time snaplist is updated
175 * the time is recorded. If the snapshot time is greater than the snaplist
176 * update time then chances are we are working on an older list. Then discard
177 * the old list and fetch a new snaplist.
179 * @param[in] handle VFS handle struct
180 * @param[in] snap_time time of snapshot
182 * @return true if the list is updated else false
184 static bool shadow_copy2_update_snaplist(struct vfs_handle_struct *handle,
188 bool snaplist_updated = false;
189 struct files_struct fsp = {0};
190 struct smb_filename smb_fname = {0};
191 double seconds = 0.0;
192 struct shadow_copy2_private *priv = NULL;
194 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
197 seconds = difftime(snap_time, priv->snaps->fetch_time);
200 * Fetch the snapshot list if either the snaplist is empty or the
201 * required snapshot time is greater than the last fetched snaplist
204 if (seconds > 0 || (priv->snaps->snaplist == NULL)) {
205 smb_fname.base_name = discard_const_p(char, ".");
206 fsp.fsp_name = &smb_fname;
208 ret = shadow_copy2_get_shadow_copy_data(handle, &fsp,
211 snaplist_updated = true;
213 DBG_ERR("Failed to get shadow copy data\n");
218 return snaplist_updated;
221 static bool shadow_copy2_find_slashes(TALLOC_CTX *mem_ctx, const char *str,
223 unsigned *pnum_offsets)
225 unsigned num_offsets;
232 while ((p = strchr(p, '/')) != NULL) {
237 offsets = talloc_array(mem_ctx, size_t, num_offsets);
238 if (offsets == NULL) {
244 while ((p = strchr(p, '/')) != NULL) {
245 offsets[num_offsets] = p-str;
251 *pnum_offsets = num_offsets;
256 * Given a timestamp, build the posix level GMT-tag string
257 * based on the configurable format.
259 static ssize_t shadow_copy2_posix_gmt_string(struct vfs_handle_struct *handle,
261 char *snaptime_string,
265 ssize_t snaptime_len;
266 struct shadow_copy2_config *config;
267 struct shadow_copy2_private *priv;
269 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
272 config = priv->config;
274 if (config->use_sscanf) {
275 snaptime_len = snprintf(snaptime_string,
278 (unsigned long)snapshot);
279 if (snaptime_len <= 0) {
280 DEBUG(10, ("snprintf failed\n"));
284 if (config->use_localtime) {
285 if (localtime_r(&snapshot, &snap_tm) == 0) {
286 DEBUG(10, ("gmtime_r failed\n"));
290 if (gmtime_r(&snapshot, &snap_tm) == 0) {
291 DEBUG(10, ("gmtime_r failed\n"));
296 if (priv->snaps->regex != NULL) {
297 snaptime_len = shadow_copy2_saved_snapname(priv,
298 &snap_tm, snaptime_string, len);
299 if (snaptime_len >= 0)
303 * If we fail to find the snapshot name, chances are
304 * that we have not updated our snaplist. Make sure the
305 * snaplist is updated.
307 if (!shadow_copy2_update_snaplist(handle, snapshot)) {
308 DBG_DEBUG("shadow_copy2_update_snaplist "
313 return shadow_copy2_saved_snapname(priv,
314 &snap_tm, snaptime_string, len);
317 snaptime_len = strftime(snaptime_string,
321 if (snaptime_len == 0) {
322 DEBUG(10, ("strftime failed\n"));
331 * Given a timestamp, build the string to insert into a path
332 * as a path component for creating the local path to the
333 * snapshot at the given timestamp of the input path.
335 * In the case of a parallel snapdir (specified with an
336 * absolute path), this is the initial portion of the
337 * local path of any snapshot file. The complete path is
338 * obtained by appending the portion of the file's path
339 * below the share root's mountpoint.
341 static char *shadow_copy2_insert_string(TALLOC_CTX *mem_ctx,
342 struct vfs_handle_struct *handle,
345 fstring snaptime_string;
346 ssize_t snaptime_len = 0;
348 struct shadow_copy2_config *config;
349 struct shadow_copy2_private *priv;
351 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
354 config = priv->config;
356 snaptime_len = shadow_copy2_posix_gmt_string(handle,
359 sizeof(snaptime_string));
360 if (snaptime_len <= 0) {
364 if (config->snapdir_absolute) {
365 result = talloc_asprintf(mem_ctx, "%s/%s",
366 config->snapdir, snaptime_string);
368 result = talloc_asprintf(mem_ctx, "/%s/%s",
369 config->snapdir, snaptime_string);
371 if (result == NULL) {
372 DEBUG(1, (__location__ " talloc_asprintf failed\n"));
379 * Build the posix snapshot path for the connection
380 * at the given timestamp, i.e. the absolute posix path
381 * that contains the snapshot for this file system.
383 * This only applies to classical case, i.e. not
384 * to the "snapdirseverywhere" mode.
386 static char *shadow_copy2_snapshot_path(TALLOC_CTX *mem_ctx,
387 struct vfs_handle_struct *handle,
390 fstring snaptime_string;
391 ssize_t snaptime_len = 0;
393 struct shadow_copy2_private *priv;
395 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
398 snaptime_len = shadow_copy2_posix_gmt_string(handle,
401 sizeof(snaptime_string));
402 if (snaptime_len <= 0) {
406 result = talloc_asprintf(mem_ctx, "%s/%s",
407 priv->config->snapshot_basepath, snaptime_string);
408 if (result == NULL) {
409 DEBUG(1, (__location__ " talloc_asprintf failed\n"));
415 static char *make_path_absolute(TALLOC_CTX *mem_ctx,
416 struct shadow_copy2_private *priv,
419 char *newpath = NULL;
420 char *abs_path = NULL;
422 if (name[0] != '/') {
423 newpath = talloc_asprintf(mem_ctx,
427 if (newpath == NULL) {
432 abs_path = canonicalize_absolute_path(mem_ctx, name);
433 TALLOC_FREE(newpath);
437 /* Return a $cwd-relative path. */
438 static bool make_relative_path(const char *cwd, char *abs_path)
440 size_t cwd_len = strlen(cwd);
441 size_t abs_len = strlen(abs_path);
443 if (abs_len < cwd_len) {
446 if (memcmp(abs_path, cwd, cwd_len) != 0) {
449 /* The cwd_len != 1 case is for $cwd == '/' */
451 abs_path[cwd_len] != '/' &&
452 abs_path[cwd_len] != '\0')
456 if (abs_path[cwd_len] == '/') {
459 memmove(abs_path, &abs_path[cwd_len], abs_len + 1 - cwd_len);
463 static bool shadow_copy2_snapshot_to_gmt(vfs_handle_struct *handle,
465 char *gmt, size_t gmt_len);
468 * Check if an incoming filename is already a snapshot converted pathname.
470 * If so, it returns the pathname truncated at the snapshot point which
471 * will be used as the connectpath.
474 static int check_for_converted_path(TALLOC_CTX *mem_ctx,
475 struct vfs_handle_struct *handle,
476 struct shadow_copy2_private *priv,
478 bool *ppath_already_converted,
481 size_t snapdirlen = 0;
482 char *p = strstr_m(abs_path, priv->config->snapdir);
484 char *connect_path = NULL;
485 char snapshot[GMT_NAME_LEN+1];
487 *ppath_already_converted = false;
490 /* Must at least contain shadow:snapdir. */
494 if (priv->config->snapdir[0] == '/' &&
496 /* Absolute shadow:snapdir must be at the start. */
500 snapdirlen = strlen(priv->config->snapdir);
501 if (p[snapdirlen] != '/') {
502 /* shadow:snapdir must end as a separate component. */
506 if (p > abs_path && p[-1] != '/') {
507 /* shadow:snapdir must start as a separate component. */
512 p++; /* Move past the / */
515 * Need to return up to the next path
516 * component after the time.
517 * This will be used as the connectpath.
522 * No next path component.
525 connect_path = talloc_strdup(mem_ctx,
528 connect_path = talloc_strndup(mem_ctx,
532 if (connect_path == NULL) {
537 * Point p at the same offset in connect_path as
541 p = &connect_path[p - abs_path];
544 * Now ensure there is a time string at p.
545 * The SMB-format @GMT-token string is returned
549 if (!shadow_copy2_snapshot_to_gmt(handle,
553 TALLOC_FREE(connect_path);
557 if (pconnectpath != NULL) {
558 *pconnectpath = connect_path;
561 *ppath_already_converted = true;
563 DBG_DEBUG("path |%s| is already converted. "
564 "connect path = |%s|\n",
572 * This function does two things.
574 * 1). Checks if an incoming filename is already a
575 * snapshot converted pathname.
576 * If so, it returns the pathname truncated
577 * at the snapshot point which will be used
578 * as the connectpath, and then does an early return.
580 * 2). Checks if an incoming filename contains an
581 * SMB-layer @GMT- style timestamp.
582 * If so, it strips the timestamp, and returns
583 * both the timestamp and the stripped path
584 * (making it cwd-relative).
587 static bool shadow_copy2_strip_snapshot_internal(TALLOC_CTX *mem_ctx,
588 struct vfs_handle_struct *handle,
589 const char *orig_name,
593 bool *_already_converted)
596 time_t timestamp = 0;
599 char *stripped = NULL;
600 size_t rest_len, dst_len;
601 struct shadow_copy2_private *priv;
602 ptrdiff_t len_before_gmt;
603 const char *name = orig_name;
604 char *abs_path = NULL;
606 bool already_converted = false;
609 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
612 DEBUG(10, (__location__ ": enter path '%s'\n", name));
614 if (_already_converted != NULL) {
615 *_already_converted = false;
618 abs_path = make_path_absolute(mem_ctx, priv, name);
619 if (abs_path == NULL) {
625 DEBUG(10, (__location__ ": abs path '%s'\n", name));
627 err = check_for_converted_path(mem_ctx,
634 /* error in conversion. */
639 if (already_converted) {
640 if (_already_converted != NULL) {
641 *_already_converted = true;
647 * From here we're only looking to strip an
648 * SMB-layer @GMT- token.
651 p = strstr_m(name, "@GMT-");
653 DEBUG(11, ("@GMT not found\n"));
656 if ((p > name) && (p[-1] != '/')) {
657 /* the GMT-token does not start a path-component */
658 DEBUG(10, ("not at start, p=%p, name=%p, p[-1]=%d\n",
659 p, name, (int)p[-1]));
663 len_before_gmt = p - name;
665 q = strptime(p, GMT_FORMAT, &tm);
667 DEBUG(10, ("strptime failed\n"));
671 timestamp = timegm(&tm);
672 if (timestamp == (time_t)-1) {
673 DEBUG(10, ("timestamp==-1\n"));
678 * The name consists of only the GMT token or the GMT
679 * token is at the end of the path. XP seems to send
680 * @GMT- at the end under certain circumstances even
681 * with a path prefix.
683 if (pstripped != NULL) {
684 if (len_before_gmt > 1) {
686 * There is a path (and not only a slash)
687 * before the @GMT-. Remove the trailing
692 stripped = talloc_strndup(mem_ctx, name,
694 if (stripped == NULL) {
698 if (orig_name[0] != '/') {
699 if (make_relative_path(priv->shadow_cwd,
700 stripped) == false) {
701 DEBUG(10, (__location__ ": path '%s' "
702 "doesn't start with cwd '%s'\n",
703 stripped, priv->shadow_cwd));
709 *pstripped = stripped;
711 *ptimestamp = timestamp;
716 * It is not a complete path component, i.e. the path
717 * component continues after the gmt-token.
719 DEBUG(10, ("q[0] = %d\n", (int)q[0]));
724 rest_len = strlen(q);
725 dst_len = len_before_gmt + rest_len;
727 if (pstripped != NULL) {
728 stripped = talloc_array(mem_ctx, char, dst_len+1);
729 if (stripped == NULL) {
734 memcpy(stripped, name, len_before_gmt);
737 memcpy(stripped + len_before_gmt, q, rest_len);
739 stripped[dst_len] = '\0';
740 if (orig_name[0] != '/') {
741 if (make_relative_path(priv->shadow_cwd,
742 stripped) == false) {
743 DEBUG(10, (__location__ ": path '%s' "
744 "doesn't start with cwd '%s'\n",
745 stripped, priv->shadow_cwd));
751 *pstripped = stripped;
753 *ptimestamp = timestamp;
757 TALLOC_FREE(abs_path);
761 static bool shadow_copy2_strip_snapshot(TALLOC_CTX *mem_ctx,
762 struct vfs_handle_struct *handle,
763 const char *orig_name,
767 return shadow_copy2_strip_snapshot_internal(mem_ctx,
776 static bool shadow_copy2_strip_snapshot_converted(TALLOC_CTX *mem_ctx,
777 struct vfs_handle_struct *handle,
778 const char *orig_name,
783 return shadow_copy2_strip_snapshot_internal(mem_ctx,
792 static char *shadow_copy2_find_mount_point(TALLOC_CTX *mem_ctx,
793 vfs_handle_struct *handle)
795 char *path = talloc_strdup(mem_ctx, handle->conn->connectpath);
800 if (stat(path, &st) != 0) {
807 while ((p = strrchr(path, '/')) && p > path) {
809 if (stat(path, &st) != 0) {
813 if (st.st_dev != dev) {
823 * Convert from a name as handed in via the SMB layer
824 * and a timestamp into the local path of the snapshot
825 * of the provided file at the provided time.
826 * Also return the path in the snapshot corresponding
827 * to the file's share root.
829 static char *shadow_copy2_do_convert(TALLOC_CTX *mem_ctx,
830 struct vfs_handle_struct *handle,
831 const char *name, time_t timestamp,
832 size_t *snaproot_len)
834 struct smb_filename converted_fname;
836 size_t *slashes = NULL;
837 unsigned num_slashes;
841 char *converted = NULL;
842 size_t insertlen, connectlen = 0;
846 struct shadow_copy2_config *config;
847 struct shadow_copy2_private *priv;
848 size_t in_share_offset = 0;
850 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
853 config = priv->config;
855 DEBUG(10, ("converting '%s'\n", name));
857 if (!config->snapdirseverywhere) {
861 snapshot_path = shadow_copy2_snapshot_path(talloc_tos(),
864 if (snapshot_path == NULL) {
868 if (config->rel_connectpath == NULL) {
869 converted = talloc_asprintf(mem_ctx, "%s/%s",
870 snapshot_path, name);
872 converted = talloc_asprintf(mem_ctx, "%s/%s/%s",
874 config->rel_connectpath,
877 if (converted == NULL) {
881 ZERO_STRUCT(converted_fname);
882 converted_fname.base_name = converted;
884 ret = SMB_VFS_NEXT_LSTAT(handle, &converted_fname);
885 DEBUG(10, ("Trying[not snapdirseverywhere] %s: %d (%s)\n",
887 ret, ret == 0 ? "ok" : strerror(errno)));
889 DEBUG(10, ("Found %s\n", converted));
892 if (snaproot_len != NULL) {
893 *snaproot_len = strlen(snapshot_path);
894 if (config->rel_connectpath != NULL) {
896 strlen(config->rel_connectpath) + 1;
904 /* never reached ... */
907 connectlen = strlen(handle->conn->connectpath);
909 path = talloc_strdup(mem_ctx, handle->conn->connectpath);
911 path = talloc_asprintf(
912 mem_ctx, "%s/%s", handle->conn->connectpath, name);
918 pathlen = talloc_get_size(path)-1;
920 if (!shadow_copy2_find_slashes(talloc_tos(), path,
921 &slashes, &num_slashes)) {
925 insert = shadow_copy2_insert_string(talloc_tos(), handle, timestamp);
926 if (insert == NULL) {
929 insertlen = talloc_get_size(insert)-1;
932 * Note: We deliberatly don't expensively initialize the
933 * array with talloc_zero here: Putting zero into
934 * converted[pathlen+insertlen] below is sufficient, because
935 * in the following for loop, the insert string is inserted
936 * at various slash places. So the memory up to position
937 * pathlen+insertlen will always be initialized when the
938 * converted string is used.
940 converted = talloc_array(mem_ctx, char, pathlen + insertlen + 1);
941 if (converted == NULL) {
945 if (path[pathlen-1] != '/') {
947 * Append a fake slash to find the snapshot root
950 tmp = talloc_realloc(talloc_tos(), slashes,
951 size_t, num_slashes+1);
956 slashes[num_slashes] = pathlen;
962 if (!config->crossmountpoints) {
963 min_offset = strlen(config->mount_point);
966 memcpy(converted, path, pathlen+1);
967 converted[pathlen+insertlen] = '\0';
969 ZERO_STRUCT(converted_fname);
970 converted_fname.base_name = converted;
972 for (i = num_slashes-1; i>=0; i--) {
978 if (offset < min_offset) {
983 if (offset >= connectlen) {
984 in_share_offset = offset;
987 memcpy(converted+offset, insert, insertlen);
990 memcpy(converted+offset, path + slashes[i],
991 pathlen - slashes[i]);
993 ret = SMB_VFS_NEXT_LSTAT(handle, &converted_fname);
995 DEBUG(10, ("Trying[snapdirseverywhere] %s: %d (%s)\n",
997 ret, ret == 0 ? "ok" : strerror(errno)));
1000 if (snaproot_len != NULL) {
1001 *snaproot_len = in_share_offset + insertlen;
1005 if (errno == ENOTDIR) {
1007 * This is a valid condition: We appended the
1008 * .snaphots/@GMT.. to a file name. Just try
1009 * with the upper levels.
1013 if (errno != ENOENT) {
1014 /* Other problem than "not found" */
1023 DEBUG(10, ("Found %s\n", converted));
1030 if (result == NULL) {
1031 saved_errno = errno;
1033 TALLOC_FREE(converted);
1034 TALLOC_FREE(insert);
1035 TALLOC_FREE(slashes);
1037 if (saved_errno != 0) {
1038 errno = saved_errno;
1044 * Convert from a name as handed in via the SMB layer
1045 * and a timestamp into the local path of the snapshot
1046 * of the provided file at the provided time.
1048 static char *shadow_copy2_convert(TALLOC_CTX *mem_ctx,
1049 struct vfs_handle_struct *handle,
1050 const char *name, time_t timestamp)
1052 return shadow_copy2_do_convert(mem_ctx, handle, name, timestamp, NULL);
1056 modify a sbuf return to ensure that inodes in the shadow directory
1057 are different from those in the main directory
1059 static void convert_sbuf(vfs_handle_struct *handle, const char *fname,
1060 SMB_STRUCT_STAT *sbuf)
1062 struct shadow_copy2_private *priv;
1064 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1067 if (priv->config->fixinodes) {
1068 /* some snapshot systems, like GPFS, return the name
1069 device:inode for the snapshot files as the current
1070 files. That breaks the 'restore' button in the shadow copy
1071 GUI, as the client gets a sharing violation.
1073 This is a crude way of allowing both files to be
1074 open at once. It has a slight chance of inode
1075 number collision, but I can't see a better approach
1076 without significant VFS changes
1078 TDB_DATA key = { .dptr = discard_const_p(uint8_t, fname),
1079 .dsize = strlen(fname) };
1082 shash = tdb_jenkins_hash(&key) & 0xFF000000;
1086 sbuf->st_ex_ino ^= shash;
1090 static DIR *shadow_copy2_opendir(vfs_handle_struct *handle,
1091 const struct smb_filename *smb_fname,
1095 time_t timestamp = 0;
1096 char *stripped = NULL;
1098 int saved_errno = 0;
1100 struct smb_filename *conv_smb_fname = NULL;
1102 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1104 smb_fname->base_name,
1109 if (timestamp == 0) {
1110 return SMB_VFS_NEXT_OPENDIR(handle, smb_fname, mask, attr);
1112 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
1113 TALLOC_FREE(stripped);
1117 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
1122 if (conv_smb_fname == NULL) {
1126 ret = SMB_VFS_NEXT_OPENDIR(handle, conv_smb_fname, mask, attr);
1128 saved_errno = errno;
1131 TALLOC_FREE(conv_smb_fname);
1132 if (saved_errno != 0) {
1133 errno = saved_errno;
1138 static int shadow_copy2_renameat(vfs_handle_struct *handle,
1139 files_struct *srcfsp,
1140 const struct smb_filename *smb_fname_src,
1141 files_struct *dstfsp,
1142 const struct smb_filename *smb_fname_dst)
1144 time_t timestamp_src = 0;
1145 time_t timestamp_dst = 0;
1146 char *snappath_src = NULL;
1147 char *snappath_dst = NULL;
1149 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle,
1150 smb_fname_src->base_name,
1151 ×tamp_src, NULL, &snappath_src,
1155 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle,
1156 smb_fname_dst->base_name,
1157 ×tamp_dst, NULL, &snappath_dst,
1161 if (timestamp_src != 0) {
1165 if (timestamp_dst != 0) {
1170 * Don't allow rename on already converted paths.
1172 if (snappath_src != NULL) {
1176 if (snappath_dst != NULL) {
1180 return SMB_VFS_NEXT_RENAMEAT(handle,
1188 static int shadow_copy2_symlink(vfs_handle_struct *handle,
1189 const char *link_contents,
1190 const struct smb_filename *new_smb_fname)
1192 time_t timestamp_old = 0;
1193 time_t timestamp_new = 0;
1194 char *snappath_old = NULL;
1195 char *snappath_new = NULL;
1197 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1206 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1208 new_smb_fname->base_name,
1215 if ((timestamp_old != 0) || (timestamp_new != 0)) {
1220 * Don't allow symlinks on already converted paths.
1222 if ((snappath_old != NULL) || (snappath_new != NULL)) {
1226 return SMB_VFS_NEXT_SYMLINK(handle, link_contents, new_smb_fname);
1229 static int shadow_copy2_symlinkat(vfs_handle_struct *handle,
1230 const char *link_contents,
1231 struct files_struct *dirfsp,
1232 const struct smb_filename *new_smb_fname)
1234 time_t timestamp_old = 0;
1235 time_t timestamp_new = 0;
1236 char *snappath_old = NULL;
1237 char *snappath_new = NULL;
1239 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1248 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1250 new_smb_fname->base_name,
1257 if ((timestamp_old != 0) || (timestamp_new != 0)) {
1262 * Don't allow symlinks on already converted paths.
1264 if ((snappath_old != NULL) || (snappath_new != NULL)) {
1268 return SMB_VFS_NEXT_SYMLINKAT(handle,
1274 static int shadow_copy2_linkat(vfs_handle_struct *handle,
1275 files_struct *srcfsp,
1276 const struct smb_filename *old_smb_fname,
1277 files_struct *dstfsp,
1278 const struct smb_filename *new_smb_fname,
1281 time_t timestamp_old = 0;
1282 time_t timestamp_new = 0;
1283 char *snappath_old = NULL;
1284 char *snappath_new = NULL;
1286 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1288 old_smb_fname->base_name,
1295 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1297 new_smb_fname->base_name,
1304 if ((timestamp_old != 0) || (timestamp_new != 0)) {
1309 * Don't allow links on already converted paths.
1311 if ((snappath_old != NULL) || (snappath_new != NULL)) {
1315 return SMB_VFS_NEXT_LINKAT(handle,
1323 static int shadow_copy2_stat(vfs_handle_struct *handle,
1324 struct smb_filename *smb_fname)
1326 time_t timestamp = 0;
1327 char *stripped = NULL;
1329 int saved_errno = 0;
1332 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1333 smb_fname->base_name,
1334 ×tamp, &stripped)) {
1337 if (timestamp == 0) {
1338 return SMB_VFS_NEXT_STAT(handle, smb_fname);
1341 tmp = smb_fname->base_name;
1342 smb_fname->base_name = shadow_copy2_convert(
1343 talloc_tos(), handle, stripped, timestamp);
1344 TALLOC_FREE(stripped);
1346 if (smb_fname->base_name == NULL) {
1347 smb_fname->base_name = tmp;
1351 ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
1353 saved_errno = errno;
1356 TALLOC_FREE(smb_fname->base_name);
1357 smb_fname->base_name = tmp;
1360 convert_sbuf(handle, smb_fname->base_name, &smb_fname->st);
1362 if (saved_errno != 0) {
1363 errno = saved_errno;
1368 static int shadow_copy2_lstat(vfs_handle_struct *handle,
1369 struct smb_filename *smb_fname)
1371 time_t timestamp = 0;
1372 char *stripped = NULL;
1374 int saved_errno = 0;
1377 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1378 smb_fname->base_name,
1379 ×tamp, &stripped)) {
1382 if (timestamp == 0) {
1383 return SMB_VFS_NEXT_LSTAT(handle, smb_fname);
1386 tmp = smb_fname->base_name;
1387 smb_fname->base_name = shadow_copy2_convert(
1388 talloc_tos(), handle, stripped, timestamp);
1389 TALLOC_FREE(stripped);
1391 if (smb_fname->base_name == NULL) {
1392 smb_fname->base_name = tmp;
1396 ret = SMB_VFS_NEXT_LSTAT(handle, smb_fname);
1398 saved_errno = errno;
1401 TALLOC_FREE(smb_fname->base_name);
1402 smb_fname->base_name = tmp;
1405 convert_sbuf(handle, smb_fname->base_name, &smb_fname->st);
1407 if (saved_errno != 0) {
1408 errno = saved_errno;
1413 static int shadow_copy2_fstat(vfs_handle_struct *handle, files_struct *fsp,
1414 SMB_STRUCT_STAT *sbuf)
1416 time_t timestamp = 0;
1417 struct smb_filename *orig_smb_fname = NULL;
1418 struct smb_filename vss_smb_fname;
1419 struct smb_filename *orig_base_smb_fname = NULL;
1420 struct smb_filename vss_base_smb_fname;
1421 char *stripped = NULL;
1422 int saved_errno = 0;
1426 ok = shadow_copy2_strip_snapshot(talloc_tos(), handle,
1427 fsp->fsp_name->base_name,
1428 ×tamp, &stripped);
1433 if (timestamp == 0) {
1434 TALLOC_FREE(stripped);
1435 return SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
1438 vss_smb_fname = *fsp->fsp_name;
1439 vss_smb_fname.base_name = shadow_copy2_convert(talloc_tos(),
1443 TALLOC_FREE(stripped);
1444 if (vss_smb_fname.base_name == NULL) {
1448 orig_smb_fname = fsp->fsp_name;
1449 fsp->fsp_name = &vss_smb_fname;
1451 if (fsp->base_fsp != NULL) {
1452 vss_base_smb_fname = *fsp->base_fsp->fsp_name;
1453 vss_base_smb_fname.base_name = vss_smb_fname.base_name;
1454 orig_base_smb_fname = fsp->base_fsp->fsp_name;
1455 fsp->base_fsp->fsp_name = &vss_base_smb_fname;
1458 ret = SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
1459 fsp->fsp_name = orig_smb_fname;
1460 if (fsp->base_fsp != NULL) {
1461 fsp->base_fsp->fsp_name = orig_base_smb_fname;
1464 saved_errno = errno;
1468 convert_sbuf(handle, fsp->fsp_name->base_name, sbuf);
1470 if (saved_errno != 0) {
1471 errno = saved_errno;
1476 static int shadow_copy2_open(vfs_handle_struct *handle,
1477 struct smb_filename *smb_fname, files_struct *fsp,
1478 int flags, mode_t mode)
1480 time_t timestamp = 0;
1481 char *stripped = NULL;
1483 bool is_converted = false;
1484 int saved_errno = 0;
1487 if (!shadow_copy2_strip_snapshot_converted(talloc_tos(), handle,
1488 smb_fname->base_name,
1489 ×tamp, &stripped,
1493 if (timestamp == 0) {
1496 * Just pave over the user requested mode and use
1497 * O_RDONLY. Later attempts by the client to write on
1498 * the handle will fail in the pwrite() syscall with
1499 * EINVAL which we carefully map to EROFS. In sum, this
1500 * matches Windows behaviour.
1504 return SMB_VFS_NEXT_OPEN(handle, smb_fname, fsp, flags, mode);
1507 tmp = smb_fname->base_name;
1508 smb_fname->base_name = shadow_copy2_convert(
1509 talloc_tos(), handle, stripped, timestamp);
1510 TALLOC_FREE(stripped);
1512 if (smb_fname->base_name == NULL) {
1513 smb_fname->base_name = tmp;
1518 * Just pave over the user requested mode and use O_RDONLY. Later
1519 * attempts by the client to write on the handle will fail in the
1520 * pwrite() syscall with EINVAL which we carefully map to EROFS. In sum,
1521 * this matches Windows behaviour.
1525 ret = SMB_VFS_NEXT_OPEN(handle, smb_fname, fsp, flags, mode);
1527 saved_errno = errno;
1530 TALLOC_FREE(smb_fname->base_name);
1531 smb_fname->base_name = tmp;
1533 if (saved_errno != 0) {
1534 errno = saved_errno;
1539 static int shadow_copy2_unlink(vfs_handle_struct *handle,
1540 const struct smb_filename *smb_fname)
1542 time_t timestamp = 0;
1544 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1545 smb_fname->base_name,
1546 ×tamp, NULL)) {
1549 if (timestamp != 0) {
1553 return SMB_VFS_NEXT_UNLINK(handle, smb_fname);
1556 static int shadow_copy2_chmod(vfs_handle_struct *handle,
1557 const struct smb_filename *smb_fname,
1560 time_t timestamp = 0;
1562 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1564 smb_fname->base_name,
1569 if (timestamp != 0) {
1573 return SMB_VFS_NEXT_CHMOD(handle, smb_fname, mode);
1576 static int shadow_copy2_chown(vfs_handle_struct *handle,
1577 const struct smb_filename *smb_fname,
1581 time_t timestamp = 0;
1583 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1585 smb_fname->base_name,
1590 if (timestamp != 0) {
1594 return SMB_VFS_NEXT_CHOWN(handle, smb_fname, uid, gid);
1597 static void store_cwd_data(vfs_handle_struct *handle,
1598 const char *connectpath)
1600 struct shadow_copy2_private *priv = NULL;
1601 struct smb_filename *cwd_fname = NULL;
1603 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1606 TALLOC_FREE(priv->shadow_cwd);
1607 cwd_fname = SMB_VFS_NEXT_GETWD(handle, talloc_tos());
1608 if (cwd_fname == NULL) {
1609 smb_panic("getwd failed\n");
1611 DBG_DEBUG("shadow cwd = %s\n", cwd_fname->base_name);
1612 priv->shadow_cwd = talloc_strdup(priv, cwd_fname->base_name);
1613 TALLOC_FREE(cwd_fname);
1614 if (priv->shadow_cwd == NULL) {
1615 smb_panic("talloc failed\n");
1617 TALLOC_FREE(priv->shadow_connectpath);
1619 DBG_DEBUG("shadow conectpath = %s\n", connectpath);
1620 priv->shadow_connectpath = talloc_strdup(priv, connectpath);
1621 if (priv->shadow_connectpath == NULL) {
1622 smb_panic("talloc failed\n");
1627 static int shadow_copy2_chdir(vfs_handle_struct *handle,
1628 const struct smb_filename *smb_fname)
1630 time_t timestamp = 0;
1631 char *stripped = NULL;
1632 char *snappath = NULL;
1634 int saved_errno = 0;
1636 size_t rootpath_len = 0;
1637 struct smb_filename *conv_smb_fname = NULL;
1639 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1641 smb_fname->base_name,
1648 if (stripped != NULL) {
1649 conv = shadow_copy2_do_convert(talloc_tos(),
1654 TALLOC_FREE(stripped);
1658 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
1664 conv_smb_fname = cp_smb_filename(talloc_tos(), smb_fname);
1667 if (conv_smb_fname == NULL) {
1673 ret = SMB_VFS_NEXT_CHDIR(handle, conv_smb_fname);
1675 saved_errno = errno;
1679 if (conv != NULL && rootpath_len != 0) {
1680 conv[rootpath_len] = '\0';
1681 } else if (snappath != 0) {
1685 store_cwd_data(handle, conv);
1688 TALLOC_FREE(stripped);
1690 TALLOC_FREE(conv_smb_fname);
1692 if (saved_errno != 0) {
1693 errno = saved_errno;
1698 static int shadow_copy2_ntimes(vfs_handle_struct *handle,
1699 const struct smb_filename *smb_fname,
1700 struct smb_file_time *ft)
1702 time_t timestamp = 0;
1704 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1705 smb_fname->base_name,
1706 ×tamp, NULL)) {
1709 if (timestamp != 0) {
1713 return SMB_VFS_NEXT_NTIMES(handle, smb_fname, ft);
1716 static int shadow_copy2_readlinkat(vfs_handle_struct *handle,
1717 files_struct *dirfsp,
1718 const struct smb_filename *smb_fname,
1722 time_t timestamp = 0;
1723 char *stripped = NULL;
1724 int saved_errno = 0;
1726 struct smb_filename *conv = NULL;
1728 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1729 smb_fname->base_name,
1730 ×tamp, &stripped)) {
1733 if (timestamp == 0) {
1734 return SMB_VFS_NEXT_READLINKAT(handle,
1740 conv = cp_smb_filename(talloc_tos(), smb_fname);
1742 TALLOC_FREE(stripped);
1746 conv->base_name = shadow_copy2_convert(
1747 conv, handle, stripped, timestamp);
1748 TALLOC_FREE(stripped);
1749 if (conv->base_name == NULL) {
1752 ret = SMB_VFS_NEXT_READLINKAT(handle,
1758 saved_errno = errno;
1761 if (saved_errno != 0) {
1762 errno = saved_errno;
1767 static int shadow_copy2_mknodat(vfs_handle_struct *handle,
1768 files_struct *dirfsp,
1769 const struct smb_filename *smb_fname,
1773 time_t timestamp = 0;
1775 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1776 smb_fname->base_name,
1777 ×tamp, NULL)) {
1780 if (timestamp != 0) {
1784 return SMB_VFS_NEXT_MKNODAT(handle,
1791 static struct smb_filename *shadow_copy2_realpath(vfs_handle_struct *handle,
1793 const struct smb_filename *smb_fname)
1795 time_t timestamp = 0;
1796 char *stripped = NULL;
1797 struct smb_filename *result_fname = NULL;
1798 struct smb_filename *conv_fname = NULL;
1799 int saved_errno = 0;
1801 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1802 smb_fname->base_name,
1803 ×tamp, &stripped)) {
1806 if (timestamp == 0) {
1807 return SMB_VFS_NEXT_REALPATH(handle, ctx, smb_fname);
1810 conv_fname = cp_smb_filename(talloc_tos(), smb_fname);
1811 if (conv_fname == NULL) {
1814 conv_fname->base_name = shadow_copy2_convert(
1815 conv_fname, handle, stripped, timestamp);
1816 if (conv_fname->base_name == NULL) {
1820 result_fname = SMB_VFS_NEXT_REALPATH(handle, ctx, conv_fname);
1823 if (result_fname == NULL) {
1824 saved_errno = errno;
1826 TALLOC_FREE(conv_fname);
1827 TALLOC_FREE(stripped);
1828 if (saved_errno != 0) {
1829 errno = saved_errno;
1831 return result_fname;
1835 * Check whether a given directory contains a
1836 * snapshot directory as direct subdirectory.
1837 * If yes, return the path of the snapshot-subdir,
1838 * otherwise return NULL.
1840 static char *have_snapdir(struct vfs_handle_struct *handle,
1843 struct smb_filename smb_fname;
1845 struct shadow_copy2_private *priv;
1847 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1850 ZERO_STRUCT(smb_fname);
1851 smb_fname.base_name = talloc_asprintf(talloc_tos(), "%s/%s",
1852 path, priv->config->snapdir);
1853 if (smb_fname.base_name == NULL) {
1857 ret = SMB_VFS_NEXT_STAT(handle, &smb_fname);
1858 if ((ret == 0) && (S_ISDIR(smb_fname.st.st_ex_mode))) {
1859 return smb_fname.base_name;
1861 TALLOC_FREE(smb_fname.base_name);
1865 static bool check_access_snapdir(struct vfs_handle_struct *handle,
1868 struct smb_filename smb_fname;
1872 ZERO_STRUCT(smb_fname);
1873 smb_fname.base_name = talloc_asprintf(talloc_tos(),
1876 if (smb_fname.base_name == NULL) {
1880 ret = SMB_VFS_NEXT_STAT(handle, &smb_fname);
1881 if (ret != 0 || !S_ISDIR(smb_fname.st.st_ex_mode)) {
1882 TALLOC_FREE(smb_fname.base_name);
1886 status = smbd_check_access_rights(handle->conn,
1890 if (!NT_STATUS_IS_OK(status)) {
1891 DEBUG(0,("user does not have list permission "
1893 smb_fname.base_name));
1894 TALLOC_FREE(smb_fname.base_name);
1897 TALLOC_FREE(smb_fname.base_name);
1902 * Find the snapshot directory (if any) for the given
1903 * filename (which is relative to the share).
1905 static const char *shadow_copy2_find_snapdir(TALLOC_CTX *mem_ctx,
1906 struct vfs_handle_struct *handle,
1907 struct smb_filename *smb_fname)
1910 const char *snapdir;
1911 struct shadow_copy2_config *config;
1912 struct shadow_copy2_private *priv;
1914 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1917 config = priv->config;
1920 * If the non-snapdisrseverywhere mode, we should not search!
1922 if (!config->snapdirseverywhere) {
1923 return config->snapshot_basepath;
1926 path = talloc_asprintf(mem_ctx, "%s/%s",
1927 handle->conn->connectpath,
1928 smb_fname->base_name);
1933 snapdir = have_snapdir(handle, path);
1934 if (snapdir != NULL) {
1939 while ((p = strrchr(path, '/')) && (p > path)) {
1943 snapdir = have_snapdir(handle, path);
1944 if (snapdir != NULL) {
1953 static bool shadow_copy2_snapshot_to_gmt(vfs_handle_struct *handle,
1955 char *gmt, size_t gmt_len)
1957 struct tm timestamp;
1959 unsigned long int timestamp_long;
1961 struct shadow_copy2_config *config;
1962 struct shadow_copy2_private *priv;
1963 char *tmpstr = NULL;
1965 bool converted = false;
1968 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1971 config = priv->config;
1973 fmt = config->gmt_format;
1976 * If regex is provided, then we will have to parse the
1977 * filename which will contain both the prefix and the time format.
1978 * e.g. <prefix><delimiter><time_format>
1980 if (priv->snaps->regex != NULL) {
1981 tmpstr = talloc_strdup(talloc_tos(), name);
1982 /* point "name" to the time format */
1983 name = strstr(name, priv->config->delimiter);
1987 /* Extract the prefix */
1988 tmp = strstr(tmpstr, priv->config->delimiter);
1995 ret = regexec(priv->snaps->regex, tmpstr, 0, NULL, 0);
1997 DBG_DEBUG("shadow_copy2_snapshot_to_gmt: "
1998 "no regex match for %s\n", tmpstr);
2003 ZERO_STRUCT(timestamp);
2004 if (config->use_sscanf) {
2005 if (sscanf(name, fmt, ×tamp_long) != 1) {
2006 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: "
2007 "no sscanf match %s: %s\n",
2011 timestamp_t = timestamp_long;
2012 gmtime_r(×tamp_t, ×tamp);
2014 if (strptime(name, fmt, ×tamp) == NULL) {
2015 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: "
2016 "no match %s: %s\n",
2020 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: match %s: %s\n",
2023 if (config->use_localtime) {
2024 timestamp.tm_isdst = -1;
2025 timestamp_t = mktime(×tamp);
2026 gmtime_r(×tamp_t, ×tamp);
2030 strftime(gmt, gmt_len, GMT_FORMAT, ×tamp);
2034 TALLOC_FREE(tmpstr);
2038 static int shadow_copy2_label_cmp_asc(const void *x, const void *y)
2040 return strncmp((const char *)x, (const char *)y, sizeof(SHADOW_COPY_LABEL));
2043 static int shadow_copy2_label_cmp_desc(const void *x, const void *y)
2045 return -strncmp((const char *)x, (const char *)y, sizeof(SHADOW_COPY_LABEL));
2049 sort the shadow copy data in ascending or descending order
2051 static void shadow_copy2_sort_data(vfs_handle_struct *handle,
2052 struct shadow_copy_data *shadow_copy2_data)
2054 int (*cmpfunc)(const void *, const void *);
2056 struct shadow_copy2_private *priv;
2058 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
2061 sort = priv->config->sort_order;
2066 if (strcmp(sort, "asc") == 0) {
2067 cmpfunc = shadow_copy2_label_cmp_asc;
2068 } else if (strcmp(sort, "desc") == 0) {
2069 cmpfunc = shadow_copy2_label_cmp_desc;
2074 if (shadow_copy2_data && shadow_copy2_data->num_volumes > 0 &&
2075 shadow_copy2_data->labels)
2077 TYPESAFE_QSORT(shadow_copy2_data->labels,
2078 shadow_copy2_data->num_volumes,
2083 static int shadow_copy2_get_shadow_copy_data(
2084 vfs_handle_struct *handle, files_struct *fsp,
2085 struct shadow_copy_data *shadow_copy2_data,
2089 const char *snapdir;
2090 struct smb_filename *snapdir_smb_fname = NULL;
2092 TALLOC_CTX *tmp_ctx = talloc_stackframe();
2093 struct shadow_copy2_private *priv = NULL;
2094 struct shadow_copy2_snapentry *tmpentry = NULL;
2095 bool get_snaplist = false;
2096 bool access_granted = false;
2099 snapdir = shadow_copy2_find_snapdir(tmp_ctx, handle, fsp->fsp_name);
2100 if (snapdir == NULL) {
2101 DEBUG(0,("shadow:snapdir not found for %s in get_shadow_copy_data\n",
2102 handle->conn->connectpath));
2107 access_granted = check_access_snapdir(handle, snapdir);
2108 if (!access_granted) {
2109 DEBUG(0,("access denied on listing snapdir %s\n", snapdir));
2114 snapdir_smb_fname = synthetic_smb_fname(talloc_tos(),
2118 fsp->fsp_name->flags);
2119 if (snapdir_smb_fname == NULL) {
2124 p = SMB_VFS_NEXT_OPENDIR(handle, snapdir_smb_fname, NULL, 0);
2127 DEBUG(2,("shadow_copy2: SMB_VFS_NEXT_OPENDIR() failed for '%s'"
2128 " - %s\n", snapdir, strerror(errno)));
2133 if (shadow_copy2_data != NULL) {
2134 shadow_copy2_data->num_volumes = 0;
2135 shadow_copy2_data->labels = NULL;
2138 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
2142 * Normally this function is called twice once with labels = false and
2143 * then with labels = true. When labels is false it will return the
2144 * number of volumes so that the caller can allocate memory for that
2145 * many labels. Therefore to eliminate snaplist both the times it is
2146 * good to check if labels is set or not.
2148 * shadow_copy2_data is NULL when we only want to update the list and
2149 * don't want any labels.
2151 if ((priv->snaps->regex != NULL) && (labels || shadow_copy2_data == NULL)) {
2152 get_snaplist = true;
2153 /* Reset the global snaplist */
2154 shadow_copy2_delete_snaplist(priv);
2156 /* Set the current time as snaplist update time */
2157 time(&(priv->snaps->fetch_time));
2160 while ((d = SMB_VFS_NEXT_READDIR(handle, p, NULL))) {
2161 char snapshot[GMT_NAME_LEN+1];
2162 SHADOW_COPY_LABEL *tlabels;
2165 * ignore names not of the right form in the snapshot
2168 if (!shadow_copy2_snapshot_to_gmt(
2170 snapshot, sizeof(snapshot))) {
2172 DEBUG(6, ("shadow_copy2_get_shadow_copy_data: "
2173 "ignoring %s\n", d->d_name));
2176 DEBUG(6,("shadow_copy2_get_shadow_copy_data: %s -> %s\n",
2177 d->d_name, snapshot));
2181 * Create a snap entry for each successful
2184 tmpentry = shadow_copy2_create_snapentry(priv);
2185 if (tmpentry == NULL) {
2186 DBG_ERR("talloc_zero() failed\n");
2189 tmpentry->snapname = talloc_strdup(tmpentry, d->d_name);
2190 tmpentry->time_fmt = talloc_strdup(tmpentry, snapshot);
2193 if (shadow_copy2_data == NULL) {
2198 /* the caller doesn't want the labels */
2199 shadow_copy2_data->num_volumes++;
2203 tlabels = talloc_realloc(shadow_copy2_data,
2204 shadow_copy2_data->labels,
2206 shadow_copy2_data->num_volumes+1);
2207 if (tlabels == NULL) {
2208 DEBUG(0,("shadow_copy2: out of memory\n"));
2209 SMB_VFS_NEXT_CLOSEDIR(handle, p);
2213 strlcpy(tlabels[shadow_copy2_data->num_volumes], snapshot,
2216 shadow_copy2_data->num_volumes++;
2217 shadow_copy2_data->labels = tlabels;
2220 SMB_VFS_NEXT_CLOSEDIR(handle,p);
2222 shadow_copy2_sort_data(handle, shadow_copy2_data);
2226 TALLOC_FREE(tmp_ctx);
2230 static NTSTATUS shadow_copy2_fget_nt_acl(vfs_handle_struct *handle,
2231 struct files_struct *fsp,
2232 uint32_t security_info,
2233 TALLOC_CTX *mem_ctx,
2234 struct security_descriptor **ppdesc)
2236 time_t timestamp = 0;
2237 char *stripped = NULL;
2240 struct smb_filename *smb_fname = NULL;
2242 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
2243 fsp->fsp_name->base_name,
2244 ×tamp, &stripped)) {
2245 return map_nt_error_from_unix(errno);
2247 if (timestamp == 0) {
2248 return SMB_VFS_NEXT_FGET_NT_ACL(handle, fsp, security_info,
2252 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2253 TALLOC_FREE(stripped);
2255 return map_nt_error_from_unix(errno);
2257 smb_fname = synthetic_smb_fname(talloc_tos(),
2261 fsp->fsp_name->flags);
2262 if (smb_fname == NULL) {
2264 return NT_STATUS_NO_MEMORY;
2267 status = SMB_VFS_NEXT_GET_NT_ACL(handle, smb_fname, security_info,
2270 TALLOC_FREE(smb_fname);
2274 static NTSTATUS shadow_copy2_get_nt_acl(vfs_handle_struct *handle,
2275 const struct smb_filename *smb_fname,
2276 uint32_t security_info,
2277 TALLOC_CTX *mem_ctx,
2278 struct security_descriptor **ppdesc)
2280 time_t timestamp = 0;
2281 char *stripped = NULL;
2284 struct smb_filename *conv_smb_fname = NULL;
2286 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2288 smb_fname->base_name,
2291 return map_nt_error_from_unix(errno);
2293 if (timestamp == 0) {
2294 return SMB_VFS_NEXT_GET_NT_ACL(handle, smb_fname, security_info,
2297 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2298 TALLOC_FREE(stripped);
2300 return map_nt_error_from_unix(errno);
2302 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2307 if (conv_smb_fname == NULL) {
2309 return NT_STATUS_NO_MEMORY;
2311 status = SMB_VFS_NEXT_GET_NT_ACL(handle, conv_smb_fname, security_info,
2314 TALLOC_FREE(conv_smb_fname);
2318 static int shadow_copy2_mkdir(vfs_handle_struct *handle,
2319 const struct smb_filename *smb_fname,
2322 time_t timestamp = 0;
2324 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2326 smb_fname->base_name,
2331 if (timestamp != 0) {
2335 return SMB_VFS_NEXT_MKDIR(handle, smb_fname, mode);
2338 static int shadow_copy2_rmdir(vfs_handle_struct *handle,
2339 const struct smb_filename *smb_fname)
2341 time_t timestamp = 0;
2343 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2345 smb_fname->base_name,
2350 if (timestamp != 0) {
2354 return SMB_VFS_NEXT_RMDIR(handle, smb_fname);
2357 static int shadow_copy2_chflags(vfs_handle_struct *handle,
2358 const struct smb_filename *smb_fname,
2361 time_t timestamp = 0;
2363 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2365 smb_fname->base_name,
2370 if (timestamp != 0) {
2374 return SMB_VFS_NEXT_CHFLAGS(handle, smb_fname, flags);
2377 static ssize_t shadow_copy2_getxattr(vfs_handle_struct *handle,
2378 const struct smb_filename *smb_fname,
2383 time_t timestamp = 0;
2384 char *stripped = NULL;
2386 int saved_errno = 0;
2388 struct smb_filename *conv_smb_fname = NULL;
2390 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2392 smb_fname->base_name,
2397 if (timestamp == 0) {
2398 return SMB_VFS_NEXT_GETXATTR(handle, smb_fname, aname, value,
2401 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2402 TALLOC_FREE(stripped);
2407 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2412 if (conv_smb_fname == NULL) {
2417 ret = SMB_VFS_NEXT_GETXATTR(handle, conv_smb_fname, aname, value, size);
2419 saved_errno = errno;
2421 TALLOC_FREE(conv_smb_fname);
2423 if (saved_errno != 0) {
2424 errno = saved_errno;
2429 static ssize_t shadow_copy2_listxattr(struct vfs_handle_struct *handle,
2430 const struct smb_filename *smb_fname,
2431 char *list, size_t size)
2433 time_t timestamp = 0;
2434 char *stripped = NULL;
2436 int saved_errno = 0;
2438 struct smb_filename *conv_smb_fname = NULL;
2440 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2442 smb_fname->base_name,
2447 if (timestamp == 0) {
2448 return SMB_VFS_NEXT_LISTXATTR(handle, smb_fname, list, size);
2450 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2451 TALLOC_FREE(stripped);
2455 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2460 if (conv_smb_fname == NULL) {
2464 ret = SMB_VFS_NEXT_LISTXATTR(handle, conv_smb_fname, list, size);
2466 saved_errno = errno;
2468 TALLOC_FREE(conv_smb_fname);
2470 if (saved_errno != 0) {
2471 errno = saved_errno;
2476 static int shadow_copy2_removexattr(vfs_handle_struct *handle,
2477 const struct smb_filename *smb_fname,
2480 time_t timestamp = 0;
2482 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2484 smb_fname->base_name,
2489 if (timestamp != 0) {
2493 return SMB_VFS_NEXT_REMOVEXATTR(handle, smb_fname, aname);
2496 static int shadow_copy2_setxattr(struct vfs_handle_struct *handle,
2497 const struct smb_filename *smb_fname,
2498 const char *aname, const void *value,
2499 size_t size, int flags)
2501 time_t timestamp = 0;
2503 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2505 smb_fname->base_name,
2510 if (timestamp != 0) {
2514 return SMB_VFS_NEXT_SETXATTR(handle, smb_fname,
2515 aname, value, size, flags);
2518 static int shadow_copy2_get_real_filename(struct vfs_handle_struct *handle,
2521 TALLOC_CTX *mem_ctx,
2524 time_t timestamp = 0;
2525 char *stripped = NULL;
2527 int saved_errno = 0;
2530 DEBUG(10, ("shadow_copy2_get_real_filename called for path=[%s], "
2531 "name=[%s]\n", path, name));
2533 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle, path,
2534 ×tamp, &stripped)) {
2535 DEBUG(10, ("shadow_copy2_strip_snapshot failed\n"));
2538 if (timestamp == 0) {
2539 DEBUG(10, ("timestamp == 0\n"));
2540 return SMB_VFS_NEXT_GET_REAL_FILENAME(handle, path, name,
2541 mem_ctx, found_name);
2543 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2544 TALLOC_FREE(stripped);
2546 DEBUG(10, ("shadow_copy2_convert failed\n"));
2549 DEBUG(10, ("Calling NEXT_GET_REAL_FILE_NAME for conv=[%s], "
2550 "name=[%s]\n", conv, name));
2551 ret = SMB_VFS_NEXT_GET_REAL_FILENAME(handle, conv, name,
2552 mem_ctx, found_name);
2553 DEBUG(10, ("NEXT_REAL_FILE_NAME returned %d\n", (int)ret));
2555 saved_errno = errno;
2558 if (saved_errno != 0) {
2559 errno = saved_errno;
2564 static const char *shadow_copy2_connectpath(struct vfs_handle_struct *handle,
2565 const struct smb_filename *smb_fname_in)
2567 time_t timestamp = 0;
2568 char *stripped = NULL;
2570 const char *fname = smb_fname_in->base_name;
2571 struct smb_filename smb_fname = {0};
2572 struct smb_filename *result_fname = NULL;
2573 char *result = NULL;
2574 char *parent_dir = NULL;
2575 int saved_errno = 0;
2576 size_t rootpath_len = 0;
2577 struct shadow_copy2_private *priv = NULL;
2579 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
2582 DBG_DEBUG("Calc connect path for [%s]\n", fname);
2584 if (priv->shadow_connectpath != NULL) {
2585 DBG_DEBUG("cached connect path is [%s]\n",
2586 priv->shadow_connectpath);
2587 return priv->shadow_connectpath;
2590 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle, fname,
2591 ×tamp, &stripped)) {
2594 if (timestamp == 0) {
2595 return SMB_VFS_NEXT_CONNECTPATH(handle, smb_fname_in);
2598 tmp = shadow_copy2_do_convert(talloc_tos(), handle, stripped, timestamp,
2601 if (errno != ENOENT) {
2606 * If the converted path does not exist, and converting
2607 * the parent yields something that does exist, then
2608 * this path refers to something that has not been
2609 * created yet, relative to the parent path.
2610 * The snapshot finding is relative to the parent.
2611 * (usually snapshots are read/only but this is not
2612 * necessarily true).
2613 * This code also covers getting a wildcard in the
2614 * last component, because this function is called
2615 * prior to sanitizing the path, and in SMB1 we may
2616 * get wildcards in path names.
2618 if (!parent_dirname(talloc_tos(), stripped, &parent_dir,
2624 tmp = shadow_copy2_do_convert(talloc_tos(), handle, parent_dir,
2625 timestamp, &rootpath_len);
2631 DBG_DEBUG("converted path is [%s] root path is [%.*s]\n", tmp,
2632 (int)rootpath_len, tmp);
2634 tmp[rootpath_len] = '\0';
2635 smb_fname = (struct smb_filename) { .base_name = tmp };
2637 result_fname = SMB_VFS_NEXT_REALPATH(handle, priv, &smb_fname);
2638 if (result_fname == NULL) {
2643 * SMB_VFS_NEXT_REALPATH returns a talloc'ed string.
2644 * Don't leak memory.
2646 TALLOC_FREE(priv->shadow_realpath);
2647 priv->shadow_realpath = result_fname;
2648 result = priv->shadow_realpath->base_name;
2650 DBG_DEBUG("connect path is [%s]\n", result);
2653 if (result == NULL) {
2654 saved_errno = errno;
2657 TALLOC_FREE(stripped);
2658 TALLOC_FREE(parent_dir);
2659 if (saved_errno != 0) {
2660 errno = saved_errno;
2665 static uint64_t shadow_copy2_disk_free(vfs_handle_struct *handle,
2666 const struct smb_filename *smb_fname,
2671 time_t timestamp = 0;
2672 char *stripped = NULL;
2673 int saved_errno = 0;
2675 struct smb_filename *conv_smb_fname = NULL;
2676 uint64_t ret = (uint64_t)-1;
2678 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2680 smb_fname->base_name,
2683 return (uint64_t)-1;
2685 if (timestamp == 0) {
2686 return SMB_VFS_NEXT_DISK_FREE(handle, smb_fname,
2687 bsize, dfree, dsize);
2689 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2690 TALLOC_FREE(stripped);
2692 return (uint64_t)-1;
2694 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2699 if (conv_smb_fname == NULL) {
2701 return (uint64_t)-1;
2703 ret = SMB_VFS_NEXT_DISK_FREE(handle, conv_smb_fname,
2704 bsize, dfree, dsize);
2705 if (ret == (uint64_t)-1) {
2706 saved_errno = errno;
2709 TALLOC_FREE(conv_smb_fname);
2710 if (saved_errno != 0) {
2711 errno = saved_errno;
2716 static int shadow_copy2_get_quota(vfs_handle_struct *handle,
2717 const struct smb_filename *smb_fname,
2718 enum SMB_QUOTA_TYPE qtype,
2722 time_t timestamp = 0;
2723 char *stripped = NULL;
2725 int saved_errno = 0;
2727 struct smb_filename *conv_smb_fname = NULL;
2729 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2731 smb_fname->base_name,
2736 if (timestamp == 0) {
2737 return SMB_VFS_NEXT_GET_QUOTA(handle, smb_fname, qtype, id, dq);
2740 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2741 TALLOC_FREE(stripped);
2745 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2750 if (conv_smb_fname == NULL) {
2754 ret = SMB_VFS_NEXT_GET_QUOTA(handle, conv_smb_fname, qtype, id, dq);
2757 saved_errno = errno;
2760 TALLOC_FREE(conv_smb_fname);
2761 if (saved_errno != 0) {
2762 errno = saved_errno;
2768 static ssize_t shadow_copy2_pwrite(vfs_handle_struct *handle,
2776 nwritten = SMB_VFS_NEXT_PWRITE(handle, fsp, data, n, offset);
2777 if (nwritten == -1) {
2778 if (errno == EBADF && fsp->can_write) {
2786 struct shadow_copy2_pwrite_state {
2787 vfs_handle_struct *handle;
2790 struct vfs_aio_state vfs_aio_state;
2793 static void shadow_copy2_pwrite_done(struct tevent_req *subreq);
2795 static struct tevent_req *shadow_copy2_pwrite_send(
2796 struct vfs_handle_struct *handle, TALLOC_CTX *mem_ctx,
2797 struct tevent_context *ev, struct files_struct *fsp,
2798 const void *data, size_t n, off_t offset)
2800 struct tevent_req *req = NULL, *subreq = NULL;
2801 struct shadow_copy2_pwrite_state *state = NULL;
2803 req = tevent_req_create(mem_ctx, &state,
2804 struct shadow_copy2_pwrite_state);
2808 state->handle = handle;
2811 subreq = SMB_VFS_NEXT_PWRITE_SEND(state,
2818 if (tevent_req_nomem(subreq, req)) {
2819 return tevent_req_post(req, ev);
2821 tevent_req_set_callback(subreq, shadow_copy2_pwrite_done, req);
2826 static void shadow_copy2_pwrite_done(struct tevent_req *subreq)
2828 struct tevent_req *req = tevent_req_callback_data(
2829 subreq, struct tevent_req);
2830 struct shadow_copy2_pwrite_state *state = tevent_req_data(
2831 req, struct shadow_copy2_pwrite_state);
2833 state->ret = SMB_VFS_PWRITE_RECV(subreq, &state->vfs_aio_state);
2834 TALLOC_FREE(subreq);
2835 if (state->ret == -1) {
2836 tevent_req_error(req, state->vfs_aio_state.error);
2840 tevent_req_done(req);
2843 static ssize_t shadow_copy2_pwrite_recv(struct tevent_req *req,
2844 struct vfs_aio_state *vfs_aio_state)
2846 struct shadow_copy2_pwrite_state *state = tevent_req_data(
2847 req, struct shadow_copy2_pwrite_state);
2849 if (tevent_req_is_unix_error(req, &vfs_aio_state->error)) {
2850 if ((vfs_aio_state->error == EBADF) &&
2851 state->fsp->can_write)
2853 vfs_aio_state->error = EROFS;
2859 *vfs_aio_state = state->vfs_aio_state;
2863 static int shadow_copy2_connect(struct vfs_handle_struct *handle,
2864 const char *service, const char *user)
2866 struct shadow_copy2_config *config;
2867 struct shadow_copy2_private *priv;
2869 const char *snapdir;
2870 const char *snapprefix = NULL;
2871 const char *delimiter;
2872 const char *gmt_format;
2873 const char *sort_order;
2874 const char *basedir = NULL;
2875 const char *snapsharepath = NULL;
2876 const char *mount_point;
2878 DEBUG(10, (__location__ ": cnum[%u], connectpath[%s]\n",
2879 (unsigned)handle->conn->cnum,
2880 handle->conn->connectpath));
2882 ret = SMB_VFS_NEXT_CONNECT(handle, service, user);
2887 priv = talloc_zero(handle->conn, struct shadow_copy2_private);
2889 DBG_ERR("talloc_zero() failed\n");
2894 priv->snaps = talloc_zero(priv, struct shadow_copy2_snaplist_info);
2895 if (priv->snaps == NULL) {
2896 DBG_ERR("talloc_zero() failed\n");
2901 config = talloc_zero(priv, struct shadow_copy2_config);
2902 if (config == NULL) {
2903 DEBUG(0, ("talloc_zero() failed\n"));
2908 priv->config = config;
2910 gmt_format = lp_parm_const_string(SNUM(handle->conn),
2913 config->gmt_format = talloc_strdup(config, gmt_format);
2914 if (config->gmt_format == NULL) {
2915 DEBUG(0, ("talloc_strdup() failed\n"));
2920 /* config->gmt_format must not contain a path separator. */
2921 if (strchr(config->gmt_format, '/') != NULL) {
2922 DEBUG(0, ("shadow:format %s must not contain a /"
2923 "character. Unable to initialize module.\n",
2924 config->gmt_format));
2929 config->use_sscanf = lp_parm_bool(SNUM(handle->conn),
2930 "shadow", "sscanf", false);
2932 config->use_localtime = lp_parm_bool(SNUM(handle->conn),
2933 "shadow", "localtime",
2936 snapdir = lp_parm_const_string(SNUM(handle->conn),
2937 "shadow", "snapdir",
2939 config->snapdir = talloc_strdup(config, snapdir);
2940 if (config->snapdir == NULL) {
2941 DEBUG(0, ("talloc_strdup() failed\n"));
2946 snapprefix = lp_parm_const_string(SNUM(handle->conn),
2947 "shadow", "snapprefix",
2949 if (snapprefix != NULL) {
2950 priv->snaps->regex = talloc_zero(priv->snaps, regex_t);
2951 if (priv->snaps->regex == NULL) {
2952 DBG_ERR("talloc_zero() failed\n");
2957 /* pre-compute regex rule for matching pattern later */
2958 ret = regcomp(priv->snaps->regex, snapprefix, 0);
2960 DBG_ERR("Failed to create regex object\n");
2965 delimiter = lp_parm_const_string(SNUM(handle->conn),
2966 "shadow", "delimiter",
2968 if (delimiter != NULL) {
2969 priv->config->delimiter = talloc_strdup(priv->config, delimiter);
2970 if (priv->config->delimiter == NULL) {
2971 DBG_ERR("talloc_strdup() failed\n");
2977 config->snapdirseverywhere = lp_parm_bool(SNUM(handle->conn),
2979 "snapdirseverywhere",
2982 config->crossmountpoints = lp_parm_bool(SNUM(handle->conn),
2983 "shadow", "crossmountpoints",
2986 if (config->crossmountpoints && !config->snapdirseverywhere) {
2987 DBG_WARNING("Warning: 'crossmountpoints' depends on "
2988 "'snapdirseverywhere'. Disabling crossmountpoints.\n");
2991 config->fixinodes = lp_parm_bool(SNUM(handle->conn),
2992 "shadow", "fixinodes",
2995 sort_order = lp_parm_const_string(SNUM(handle->conn),
2996 "shadow", "sort", "desc");
2997 config->sort_order = talloc_strdup(config, sort_order);
2998 if (config->sort_order == NULL) {
2999 DEBUG(0, ("talloc_strdup() failed\n"));
3004 mount_point = lp_parm_const_string(SNUM(handle->conn),
3005 "shadow", "mountpoint", NULL);
3006 if (mount_point != NULL) {
3007 if (mount_point[0] != '/') {
3008 DEBUG(1, (__location__ " Warning: 'mountpoint' is "
3009 "relative ('%s'), but it has to be an "
3010 "absolute path. Ignoring provided value.\n",
3015 p = strstr(handle->conn->connectpath, mount_point);
3016 if (p != handle->conn->connectpath) {
3017 DBG_WARNING("Warning: the share root (%s) is "
3018 "not a subdirectory of the "
3019 "specified mountpoint (%s). "
3020 "Ignoring provided value.\n",
3021 handle->conn->connectpath,
3028 if (mount_point != NULL) {
3029 config->mount_point = talloc_strdup(config, mount_point);
3030 if (config->mount_point == NULL) {
3031 DEBUG(0, (__location__ " talloc_strdup() failed\n"));
3035 config->mount_point = shadow_copy2_find_mount_point(config,
3037 if (config->mount_point == NULL) {
3038 DBG_WARNING("shadow_copy2_find_mount_point "
3039 "of the share root '%s' failed: %s\n",
3040 handle->conn->connectpath, strerror(errno));
3045 basedir = lp_parm_const_string(SNUM(handle->conn),
3046 "shadow", "basedir", NULL);
3048 if (basedir != NULL) {
3049 if (basedir[0] != '/') {
3050 DEBUG(1, (__location__ " Warning: 'basedir' is "
3051 "relative ('%s'), but it has to be an "
3052 "absolute path. Disabling basedir.\n",
3057 p = strstr(basedir, config->mount_point);
3059 DEBUG(1, ("Warning: basedir (%s) is not a "
3060 "subdirectory of the share root's "
3061 "mount point (%s). "
3062 "Disabling basedir\n",
3063 basedir, config->mount_point));
3069 if (config->snapdirseverywhere && basedir != NULL) {
3070 DEBUG(1, (__location__ " Warning: 'basedir' is incompatible "
3071 "with 'snapdirseverywhere'. Disabling basedir.\n"));
3075 snapsharepath = lp_parm_const_string(SNUM(handle->conn), "shadow",
3076 "snapsharepath", NULL);
3077 if (snapsharepath != NULL) {
3078 if (snapsharepath[0] == '/') {
3079 DBG_WARNING("Warning: 'snapsharepath' is "
3080 "absolute ('%s'), but it has to be a "
3081 "relative path. Disabling snapsharepath.\n",
3083 snapsharepath = NULL;
3085 if (config->snapdirseverywhere && snapsharepath != NULL) {
3086 DBG_WARNING("Warning: 'snapsharepath' is incompatible "
3087 "with 'snapdirseverywhere'. Disabling "
3088 "snapsharepath.\n");
3089 snapsharepath = NULL;
3093 if (basedir != NULL && snapsharepath != NULL) {
3094 DBG_WARNING("Warning: 'snapsharepath' is incompatible with "
3095 "'basedir'. Disabling snapsharepath\n");
3096 snapsharepath = NULL;
3099 if (snapsharepath != NULL) {
3100 config->rel_connectpath = talloc_strdup(config, snapsharepath);
3101 if (config->rel_connectpath == NULL) {
3102 DBG_ERR("talloc_strdup() failed\n");
3108 if (basedir == NULL) {
3109 basedir = config->mount_point;
3112 if (config->rel_connectpath == NULL &&
3113 strlen(basedir) < strlen(handle->conn->connectpath)) {
3114 config->rel_connectpath = talloc_strdup(config,
3115 handle->conn->connectpath + strlen(basedir));
3116 if (config->rel_connectpath == NULL) {
3117 DEBUG(0, ("talloc_strdup() failed\n"));
3123 if (config->snapdir[0] == '/') {
3124 config->snapdir_absolute = true;
3126 if (config->snapdirseverywhere == true) {
3127 DEBUG(1, (__location__ " Warning: An absolute snapdir "
3128 "is incompatible with 'snapdirseverywhere', "
3129 "setting 'snapdirseverywhere' to false.\n"));
3130 config->snapdirseverywhere = false;
3133 if (config->crossmountpoints == true) {
3134 DEBUG(1, (__location__ " Warning: 'crossmountpoints' "
3135 "is not supported with an absolute snapdir. "
3136 "Disabling it.\n"));
3137 config->crossmountpoints = false;
3140 config->snapshot_basepath = config->snapdir;
3142 config->snapshot_basepath = talloc_asprintf(config, "%s/%s",
3143 config->mount_point, config->snapdir);
3144 if (config->snapshot_basepath == NULL) {
3145 DEBUG(0, ("talloc_asprintf() failed\n"));
3151 trim_string(config->mount_point, NULL, "/");
3152 trim_string(config->rel_connectpath, "/", "/");
3153 trim_string(config->snapdir, NULL, "/");
3154 trim_string(config->snapshot_basepath, NULL, "/");
3156 DEBUG(10, ("shadow_copy2_connect: configuration:\n"
3157 " share root: '%s'\n"
3158 " mountpoint: '%s'\n"
3159 " rel share root: '%s'\n"
3161 " snapprefix: '%s'\n"
3162 " delimiter: '%s'\n"
3163 " snapshot base path: '%s'\n"
3166 " snapdirs everywhere: %s\n"
3167 " cross mountpoints: %s\n"
3171 handle->conn->connectpath,
3172 config->mount_point,
3173 config->rel_connectpath,
3177 config->snapshot_basepath,
3179 config->use_sscanf ? "yes" : "no",
3180 config->snapdirseverywhere ? "yes" : "no",
3181 config->crossmountpoints ? "yes" : "no",
3182 config->fixinodes ? "yes" : "no",
3187 SMB_VFS_HANDLE_SET_DATA(handle, priv,
3188 NULL, struct shadow_copy2_private,
3194 static struct vfs_fn_pointers vfs_shadow_copy2_fns = {
3195 .connect_fn = shadow_copy2_connect,
3196 .opendir_fn = shadow_copy2_opendir,
3197 .disk_free_fn = shadow_copy2_disk_free,
3198 .get_quota_fn = shadow_copy2_get_quota,
3199 .renameat_fn = shadow_copy2_renameat,
3200 .linkat_fn = shadow_copy2_linkat,
3201 .symlink_fn = shadow_copy2_symlink,
3202 .symlinkat_fn = shadow_copy2_symlinkat,
3203 .stat_fn = shadow_copy2_stat,
3204 .lstat_fn = shadow_copy2_lstat,
3205 .fstat_fn = shadow_copy2_fstat,
3206 .open_fn = shadow_copy2_open,
3207 .unlink_fn = shadow_copy2_unlink,
3208 .chmod_fn = shadow_copy2_chmod,
3209 .chown_fn = shadow_copy2_chown,
3210 .chdir_fn = shadow_copy2_chdir,
3211 .ntimes_fn = shadow_copy2_ntimes,
3212 .readlinkat_fn = shadow_copy2_readlinkat,
3213 .mknodat_fn = shadow_copy2_mknodat,
3214 .realpath_fn = shadow_copy2_realpath,
3215 .get_nt_acl_fn = shadow_copy2_get_nt_acl,
3216 .fget_nt_acl_fn = shadow_copy2_fget_nt_acl,
3217 .get_shadow_copy_data_fn = shadow_copy2_get_shadow_copy_data,
3218 .mkdir_fn = shadow_copy2_mkdir,
3219 .rmdir_fn = shadow_copy2_rmdir,
3220 .getxattr_fn = shadow_copy2_getxattr,
3221 .getxattrat_send_fn = vfs_not_implemented_getxattrat_send,
3222 .getxattrat_recv_fn = vfs_not_implemented_getxattrat_recv,
3223 .listxattr_fn = shadow_copy2_listxattr,
3224 .removexattr_fn = shadow_copy2_removexattr,
3225 .setxattr_fn = shadow_copy2_setxattr,
3226 .chflags_fn = shadow_copy2_chflags,
3227 .get_real_filename_fn = shadow_copy2_get_real_filename,
3228 .pwrite_fn = shadow_copy2_pwrite,
3229 .pwrite_send_fn = shadow_copy2_pwrite_send,
3230 .pwrite_recv_fn = shadow_copy2_pwrite_recv,
3231 .connectpath_fn = shadow_copy2_connectpath,
3235 NTSTATUS vfs_shadow_copy2_init(TALLOC_CTX *ctx)
3237 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION,
3238 "shadow_copy2", &vfs_shadow_copy2_fns);