2 Unix SMB/Netbios implementation.
4 Copyright (C) Stefan Metzmacher 2009
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
21 #include "smbd/globals.h"
24 struct aio_extra *aio_list_head = NULL;
25 int aio_pending_size = 0;
26 sig_atomic_t aio_signals_received = 0;
27 int outstanding_aio_calls = 0;
28 uint16 *aio_pending_array = NULL;
31 /* dlink list we store pending lock records on. */
32 struct blocking_lock_record *blocking_lock_queue = NULL;
34 /* dlink list we move cancelled lock records onto. */
35 struct blocking_lock_record *blocking_lock_cancelled_queue = NULL;
37 /* The event that makes us process our blocking lock queue */
38 struct timed_event *brl_timeout = NULL;
40 bool blocking_lock_unlock_state = false;
41 bool blocking_lock_cancel_state = false;
44 struct smbd_dmapi_context *dmapi_ctx = NULL;
47 connection_struct *Connections = NULL;
48 /* number of open connections */
49 struct bitmap *bmap = 0;
53 bool dfree_broken = false;
55 struct bitmap *dptr_bmap = NULL;
56 struct dptr_struct *dirptrs = NULL;
57 int dirhandles_open = 0;
59 /* how many write cache buffers have been allocated */
60 unsigned int allocated_write_caches = 0;
62 int real_max_open_files = 0;
63 struct bitmap *file_bmap = NULL;
64 files_struct *Files = NULL;
66 struct fsp_singleton_cache fsp_fi_cache = {
73 unsigned long file_gen_counter = 0;
76 const struct mangle_fns *mangle_fns = NULL;
78 unsigned char *chartest = NULL;
79 TDB_CONTEXT *tdb_mangled_cache = NULL;
81 /* these tables are used to provide fast tests for characters */
82 unsigned char char_flags[256];
84 this determines how many characters are used from the original filename
85 in the 8.3 mangled name. A larger value leads to a weaker hash and more collisions.
86 The largest possible value is 6.
88 unsigned mangle_prefix = 0;
89 unsigned char base_reverse[256];
91 char *last_from = NULL;
94 struct msg_state *smbd_msg_state = NULL;
96 bool global_encrypted_passwords_negotiated = false;
97 bool global_spnego_negotiated = false;
98 struct auth_context *negprot_global_auth_context = NULL;
99 bool done_negprot = false;
101 bool logged_ioctl_message = false;
103 /* users from session setup */
104 char *session_userlist = NULL;
105 /* workgroup from session setup. */
106 char *session_workgroup = NULL;
107 /* this holds info on user ids that are already validated for this VC */
108 user_struct *validated_users = NULL;
109 uint16_t next_vuid = VUID_OFFSET;
110 int num_validated_vuids = 0;
112 char *my_yp_domain = NULL;
115 bool already_got_session = false;
118 * Size of data we can send to client. Set
119 * by the client for all protocols above CORE.
120 * Set by us for CORE protocol.
122 int max_send = BUFFER_SIZE;
124 * Size of the data we can receive. Set by us.
125 * Can be modified by the max xmit parameter.
127 int max_recv = BUFFER_SIZE;
128 uint16 last_session_tag = UID_FIELD_INVALID;
130 char *orig_inbuf = NULL;
132 time_t last_smb_conf_reload_time = 0;
133 time_t last_printer_reload_time = 0;
134 /****************************************************************************
135 structure to hold a linked list of queued messages.
137 ****************************************************************************/
138 struct pending_message_list *deferred_open_queue = NULL;
139 uint32_t common_flags2 = FLAGS2_LONG_PATH_COMPONENTS|FLAGS2_32_BIT_ERROR_CODES;
141 struct smb_srv_trans_enc_ctx *partial_srv_trans_enc_ctx = NULL;
142 struct smb_srv_trans_enc_ctx *srv_trans_enc_ctx = NULL;
144 /* A stack of security contexts. We include the current context as being
145 the first one, so there is room for another MAX_SEC_CTX_DEPTH more. */
146 struct sec_ctx sec_ctx_stack[MAX_SEC_CTX_DEPTH + 1];
147 int sec_ctx_stack_ndx = 0;
148 bool become_uid_done = false;
149 bool become_gid_done = false;
151 connection_struct *last_conn = NULL;
152 uint16_t last_flags = 0;
154 struct db_context *session_db_ctx_ptr = NULL;
156 uint32_t global_client_caps = 0;
157 bool done_sesssetup = false;
158 /****************************************************************************
159 List to store partial SPNEGO auth fragments.
160 ****************************************************************************/
161 struct pending_auth_data *pd_list = NULL;
163 uint16_t fnf_handle = 257;
165 /* A stack of current_user connection contexts. */
166 struct conn_ctx conn_ctx_stack[MAX_SEC_CTX_DEPTH];
167 int conn_ctx_stack_ndx = 0;
169 struct vfs_init_function_entry *backends = NULL;
170 char *sparse_buf = NULL;
171 char *LastDir = NULL;
173 #if HAVE_KERNEL_OPLOCKS_LINUX
174 SIG_ATOMIC_T oplock_signals_received = 0;
175 SIG_ATOMIC_T fd_pending_array[FD_PENDING_SIZE];
178 /* Current number of oplocks we have outstanding. */
179 int32_t exclusive_oplocks_open = 0;
180 int32_t level_II_oplocks_open = 0;
181 bool global_client_failed_oplock_break = false;
182 struct kernel_oplocks *koplocks = NULL;
184 struct notify_mid_map *notify_changes_by_mid = NULL;
188 struct event_context *smbd_event_ctx = NULL;
189 struct messaging_context *smbd_msg_ctx = NULL;
190 struct memcache *smbd_memcache_ctx = NULL;
191 bool exit_firsttime = true;
192 struct child_pid *children = 0;
193 int num_children = 0;
195 struct smbd_server_connection *smbd_server_conn = NULL;
197 void smbd_init_globals(void)
199 ZERO_STRUCT(char_flags);
200 ZERO_STRUCT(base_reverse);
202 ZERO_STRUCT(conn_ctx_stack);
204 ZERO_STRUCT(sec_ctx_stack);
206 #if HAVE_KERNEL_OPLOCKS_LINUX
207 ZERO_STRUCT(fd_pending_array);