2 * shadow_copy2: a shadow copy module (second implementation)
4 * Copyright (C) Andrew Tridgell 2007 (portions taken from shadow_copy2)
5 * Copyright (C) Ed Plese 2009
6 * Copyright (C) Volker Lendecke 2011
7 * Copyright (C) Christian Ambach 2011
8 * Copyright (C) Michael Adam 2013
9 * Copyright (C) Rajesh Joseph 2016
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 * This is a second implemetation of a shadow copy module for exposing
28 * file system snapshots to windows clients as shadow copies.
30 * See the manual page for documentation.
34 #include "smbd/smbd.h"
35 #include "system/filesys.h"
36 #include "include/ntioctl.h"
38 #include "lib/util_path.h"
39 #include "libcli/security/security.h"
40 #include "lib/util/tevent_unix.h"
42 struct shadow_copy2_config {
48 bool snapdirseverywhere;
49 bool crossmountpoints;
52 bool snapdir_absolute;
54 char *rel_connectpath; /* share root, relative to a snapshot root */
55 char *snapshot_basepath; /* the absolute version of snapdir */
58 /* Data-structure to hold the list of snap entries */
59 struct shadow_copy2_snapentry {
62 struct shadow_copy2_snapentry *next;
63 struct shadow_copy2_snapentry *prev;
66 struct shadow_copy2_snaplist_info {
67 struct shadow_copy2_snapentry *snaplist; /* snapshot list */
68 regex_t *regex; /* Regex to filter snaps */
69 time_t fetch_time; /* snaplist update time */
74 * shadow_copy2 private structure. This structure will be
75 * used to keep module specific information
77 struct shadow_copy2_private {
78 struct shadow_copy2_config *config;
79 struct shadow_copy2_snaplist_info *snaps;
80 char *shadow_cwd; /* Absolute $cwd path. */
81 /* Absolute connectpath - can vary depending on $cwd. */
82 char *shadow_connectpath;
83 /* talloc'ed realpath return. */
84 struct smb_filename *shadow_realpath;
87 static int shadow_copy2_get_shadow_copy_data(
88 vfs_handle_struct *handle, files_struct *fsp,
89 struct shadow_copy_data *shadow_copy2_data,
93 *This function will create a new snapshot list entry and
94 * return to the caller. This entry will also be added to
95 * the global snapshot list.
97 * @param[in] priv shadow_copy2 specific data structure
98 * @return Newly created snapshot entry or NULL on failure
100 static struct shadow_copy2_snapentry *shadow_copy2_create_snapentry(
101 struct shadow_copy2_private *priv)
103 struct shadow_copy2_snapentry *tmpentry = NULL;
105 tmpentry = talloc_zero(priv->snaps, struct shadow_copy2_snapentry);
106 if (tmpentry == NULL) {
107 DBG_ERR("talloc_zero() failed\n");
112 DLIST_ADD(priv->snaps->snaplist, tmpentry);
118 *This function will delete the entire snaplist and reset
119 * priv->snaps->snaplist to NULL.
121 * @param[in] priv shadow_copye specific data structure
123 static void shadow_copy2_delete_snaplist(struct shadow_copy2_private *priv)
125 struct shadow_copy2_snapentry *tmp = NULL;
127 while ((tmp = priv->snaps->snaplist) != NULL) {
128 DLIST_REMOVE(priv->snaps->snaplist, tmp);
134 * Given a timestamp this function searches the global snapshot list
135 * and returns the complete snapshot directory name saved in the entry.
137 * @param[in] priv shadow_copy2 specific structure
138 * @param[in] timestamp timestamp corresponding to one of the snapshot
139 * @param[out] snap_str buffer to copy the actual snapshot name
140 * @param[in] len length of snap_str buffer
142 * @return Length of actual snapshot name, and -1 on failure
144 static ssize_t shadow_copy2_saved_snapname(struct shadow_copy2_private *priv,
145 struct tm *timestamp,
146 char *snap_str, size_t len)
148 ssize_t snaptime_len = -1;
149 struct shadow_copy2_snapentry *entry = NULL;
151 snaptime_len = strftime(snap_str, len, GMT_FORMAT, timestamp);
152 if (snaptime_len == 0) {
153 DBG_ERR("strftime failed\n");
159 for (entry = priv->snaps->snaplist; entry; entry = entry->next) {
160 if (strcmp(entry->time_fmt, snap_str) == 0) {
161 snaptime_len = snprintf(snap_str, len, "%s",
173 * This function will check if snaplist is updated or not. If snaplist
174 * is empty then it will create a new list. Each time snaplist is updated
175 * the time is recorded. If the snapshot time is greater than the snaplist
176 * update time then chances are we are working on an older list. Then discard
177 * the old list and fetch a new snaplist.
179 * @param[in] handle VFS handle struct
180 * @param[in] snap_time time of snapshot
182 * @return true if the list is updated else false
184 static bool shadow_copy2_update_snaplist(struct vfs_handle_struct *handle,
188 bool snaplist_updated = false;
189 struct files_struct fsp = {0};
190 struct smb_filename smb_fname = {0};
191 double seconds = 0.0;
192 struct shadow_copy2_private *priv = NULL;
194 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
197 seconds = difftime(snap_time, priv->snaps->fetch_time);
200 * Fetch the snapshot list if either the snaplist is empty or the
201 * required snapshot time is greater than the last fetched snaplist
204 if (seconds > 0 || (priv->snaps->snaplist == NULL)) {
205 smb_fname.base_name = discard_const_p(char, ".");
206 fsp.fsp_name = &smb_fname;
208 ret = shadow_copy2_get_shadow_copy_data(handle, &fsp,
211 snaplist_updated = true;
213 DBG_ERR("Failed to get shadow copy data\n");
218 return snaplist_updated;
221 static bool shadow_copy2_find_slashes(TALLOC_CTX *mem_ctx, const char *str,
223 unsigned *pnum_offsets)
225 unsigned num_offsets;
232 while ((p = strchr(p, '/')) != NULL) {
237 offsets = talloc_array(mem_ctx, size_t, num_offsets);
238 if (offsets == NULL) {
244 while ((p = strchr(p, '/')) != NULL) {
245 offsets[num_offsets] = p-str;
251 *pnum_offsets = num_offsets;
256 * Given a timestamp, build the posix level GMT-tag string
257 * based on the configurable format.
259 static ssize_t shadow_copy2_posix_gmt_string(struct vfs_handle_struct *handle,
261 char *snaptime_string,
265 ssize_t snaptime_len;
266 struct shadow_copy2_config *config;
267 struct shadow_copy2_private *priv;
269 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
272 config = priv->config;
274 if (config->use_sscanf) {
275 snaptime_len = snprintf(snaptime_string,
278 (unsigned long)snapshot);
279 if (snaptime_len <= 0) {
280 DEBUG(10, ("snprintf failed\n"));
284 if (config->use_localtime) {
285 if (localtime_r(&snapshot, &snap_tm) == 0) {
286 DEBUG(10, ("gmtime_r failed\n"));
290 if (gmtime_r(&snapshot, &snap_tm) == 0) {
291 DEBUG(10, ("gmtime_r failed\n"));
296 if (priv->snaps->regex != NULL) {
297 snaptime_len = shadow_copy2_saved_snapname(priv,
298 &snap_tm, snaptime_string, len);
299 if (snaptime_len >= 0)
303 * If we fail to find the snapshot name, chances are
304 * that we have not updated our snaplist. Make sure the
305 * snaplist is updated.
307 if (!shadow_copy2_update_snaplist(handle, snapshot)) {
308 DBG_DEBUG("shadow_copy2_update_snaplist "
313 return shadow_copy2_saved_snapname(priv,
314 &snap_tm, snaptime_string, len);
317 snaptime_len = strftime(snaptime_string,
321 if (snaptime_len == 0) {
322 DEBUG(10, ("strftime failed\n"));
331 * Given a timestamp, build the string to insert into a path
332 * as a path component for creating the local path to the
333 * snapshot at the given timestamp of the input path.
335 * In the case of a parallel snapdir (specified with an
336 * absolute path), this is the initial portion of the
337 * local path of any snapshot file. The complete path is
338 * obtained by appending the portion of the file's path
339 * below the share root's mountpoint.
341 static char *shadow_copy2_insert_string(TALLOC_CTX *mem_ctx,
342 struct vfs_handle_struct *handle,
345 fstring snaptime_string;
346 ssize_t snaptime_len = 0;
348 struct shadow_copy2_config *config;
349 struct shadow_copy2_private *priv;
351 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
354 config = priv->config;
356 snaptime_len = shadow_copy2_posix_gmt_string(handle,
359 sizeof(snaptime_string));
360 if (snaptime_len <= 0) {
364 if (config->snapdir_absolute) {
365 result = talloc_asprintf(mem_ctx, "%s/%s",
366 config->snapdir, snaptime_string);
368 result = talloc_asprintf(mem_ctx, "/%s/%s",
369 config->snapdir, snaptime_string);
371 if (result == NULL) {
372 DEBUG(1, (__location__ " talloc_asprintf failed\n"));
379 * Build the posix snapshot path for the connection
380 * at the given timestamp, i.e. the absolute posix path
381 * that contains the snapshot for this file system.
383 * This only applies to classical case, i.e. not
384 * to the "snapdirseverywhere" mode.
386 static char *shadow_copy2_snapshot_path(TALLOC_CTX *mem_ctx,
387 struct vfs_handle_struct *handle,
390 fstring snaptime_string;
391 ssize_t snaptime_len = 0;
393 struct shadow_copy2_private *priv;
395 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
398 snaptime_len = shadow_copy2_posix_gmt_string(handle,
401 sizeof(snaptime_string));
402 if (snaptime_len <= 0) {
406 result = talloc_asprintf(mem_ctx, "%s/%s",
407 priv->config->snapshot_basepath, snaptime_string);
408 if (result == NULL) {
409 DEBUG(1, (__location__ " talloc_asprintf failed\n"));
415 static char *make_path_absolute(TALLOC_CTX *mem_ctx,
416 struct shadow_copy2_private *priv,
419 char *newpath = NULL;
420 char *abs_path = NULL;
422 if (name[0] != '/') {
423 newpath = talloc_asprintf(mem_ctx,
427 if (newpath == NULL) {
432 abs_path = canonicalize_absolute_path(mem_ctx, name);
433 TALLOC_FREE(newpath);
437 /* Return a $cwd-relative path. */
438 static bool make_relative_path(const char *cwd, char *abs_path)
440 size_t cwd_len = strlen(cwd);
441 size_t abs_len = strlen(abs_path);
443 if (abs_len < cwd_len) {
446 if (memcmp(abs_path, cwd, cwd_len) != 0) {
449 /* The cwd_len != 1 case is for $cwd == '/' */
451 abs_path[cwd_len] != '/' &&
452 abs_path[cwd_len] != '\0')
456 if (abs_path[cwd_len] == '/') {
459 memmove(abs_path, &abs_path[cwd_len], abs_len + 1 - cwd_len);
463 static bool shadow_copy2_snapshot_to_gmt(vfs_handle_struct *handle,
465 char *gmt, size_t gmt_len);
468 * Check if an incoming filename is already a snapshot converted pathname.
470 * If so, it returns the pathname truncated at the snapshot point which
471 * will be used as the connectpath.
474 static int check_for_converted_path(TALLOC_CTX *mem_ctx,
475 struct vfs_handle_struct *handle,
476 struct shadow_copy2_private *priv,
478 bool *ppath_already_converted,
481 size_t snapdirlen = 0;
482 char *p = strstr_m(abs_path, priv->config->snapdir);
484 char *connect_path = NULL;
485 char snapshot[GMT_NAME_LEN+1];
487 *ppath_already_converted = false;
490 /* Must at least contain shadow:snapdir. */
494 if (priv->config->snapdir[0] == '/' &&
496 /* Absolute shadow:snapdir must be at the start. */
500 snapdirlen = strlen(priv->config->snapdir);
501 if (p[snapdirlen] != '/') {
502 /* shadow:snapdir must end as a separate component. */
506 if (p > abs_path && p[-1] != '/') {
507 /* shadow:snapdir must start as a separate component. */
512 p++; /* Move past the / */
515 * Need to return up to the next path
516 * component after the time.
517 * This will be used as the connectpath.
522 * No next path component.
525 connect_path = talloc_strdup(mem_ctx,
528 connect_path = talloc_strndup(mem_ctx,
532 if (connect_path == NULL) {
537 * Point p at the same offset in connect_path as
541 p = &connect_path[p - abs_path];
544 * Now ensure there is a time string at p.
545 * The SMB-format @GMT-token string is returned
549 if (!shadow_copy2_snapshot_to_gmt(handle,
553 TALLOC_FREE(connect_path);
557 if (pconnectpath != NULL) {
558 *pconnectpath = connect_path;
561 *ppath_already_converted = true;
563 DBG_DEBUG("path |%s| is already converted. "
564 "connect path = |%s|\n",
572 * This function does two things.
574 * 1). Checks if an incoming filename is already a
575 * snapshot converted pathname.
576 * If so, it returns the pathname truncated
577 * at the snapshot point which will be used
578 * as the connectpath, and then does an early return.
580 * 2). Checks if an incoming filename contains an
581 * SMB-layer @GMT- style timestamp.
582 * If so, it strips the timestamp, and returns
583 * both the timestamp and the stripped path
584 * (making it cwd-relative).
587 static bool _shadow_copy2_strip_snapshot_internal(TALLOC_CTX *mem_ctx,
588 struct vfs_handle_struct *handle,
589 const struct smb_filename *smb_fname,
593 bool *_already_converted,
594 const char *function)
596 char *stripped = NULL;
597 struct shadow_copy2_private *priv;
598 char *abs_path = NULL;
600 bool already_converted = false;
603 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
606 DBG_DEBUG("[from %s()] Path '%s'\n",
607 function, smb_fname_str_dbg(smb_fname));
609 if (_already_converted != NULL) {
610 *_already_converted = false;
613 abs_path = make_path_absolute(mem_ctx, priv, smb_fname->base_name);
614 if (abs_path == NULL) {
619 DBG_DEBUG("abs path '%s'\n", abs_path);
621 err = check_for_converted_path(mem_ctx,
628 /* error in conversion. */
633 if (already_converted) {
634 if (_already_converted != NULL) {
635 *_already_converted = true;
640 if (smb_fname->twrp == 0) {
644 if (ptimestamp != NULL) {
645 *ptimestamp = nt_time_to_unix(smb_fname->twrp);
648 if (pstripped != NULL) {
649 stripped = talloc_strdup(mem_ctx, abs_path);
650 if (stripped == NULL) {
655 if (smb_fname->base_name[0] != '/') {
656 ret = make_relative_path(priv->shadow_cwd, stripped);
658 DBG_DEBUG("Path '%s' "
659 "doesn't start with cwd '%s'\n",
660 stripped, priv->shadow_cwd);
666 *pstripped = stripped;
672 TALLOC_FREE(abs_path);
676 #define shadow_copy2_strip_snapshot_internal(mem_ctx, handle, orig_name, \
677 ptimestamp, pstripped, psnappath, _already_converted) \
678 _shadow_copy2_strip_snapshot_internal((mem_ctx), (handle), (orig_name), \
679 (ptimestamp), (pstripped), (psnappath), (_already_converted), \
682 static bool _shadow_copy2_strip_snapshot(TALLOC_CTX *mem_ctx,
683 struct vfs_handle_struct *handle,
684 const struct smb_filename *orig_name,
687 const char *function)
689 return _shadow_copy2_strip_snapshot_internal(mem_ctx,
699 #define shadow_copy2_strip_snapshot(mem_ctx, handle, orig_name, \
700 ptimestamp, pstripped) \
701 _shadow_copy2_strip_snapshot((mem_ctx), (handle), (orig_name), \
702 (ptimestamp), (pstripped), __FUNCTION__)
704 static bool _shadow_copy2_strip_snapshot_converted(TALLOC_CTX *mem_ctx,
705 struct vfs_handle_struct *handle,
706 const struct smb_filename *orig_name,
710 const char *function)
712 return _shadow_copy2_strip_snapshot_internal(mem_ctx,
722 #define shadow_copy2_strip_snapshot_converted(mem_ctx, handle, orig_name, \
723 ptimestamp, pstripped, is_converted) \
724 _shadow_copy2_strip_snapshot_converted((mem_ctx), (handle), (orig_name), \
725 (ptimestamp), (pstripped), (is_converted), __FUNCTION__)
727 static char *shadow_copy2_find_mount_point(TALLOC_CTX *mem_ctx,
728 vfs_handle_struct *handle)
730 char *path = talloc_strdup(mem_ctx, handle->conn->connectpath);
735 if (stat(path, &st) != 0) {
742 while ((p = strrchr(path, '/')) && p > path) {
744 if (stat(path, &st) != 0) {
748 if (st.st_dev != dev) {
758 * Convert from a name as handed in via the SMB layer
759 * and a timestamp into the local path of the snapshot
760 * of the provided file at the provided time.
761 * Also return the path in the snapshot corresponding
762 * to the file's share root.
764 static char *shadow_copy2_do_convert(TALLOC_CTX *mem_ctx,
765 struct vfs_handle_struct *handle,
766 const char *name, time_t timestamp,
767 size_t *snaproot_len)
769 struct smb_filename converted_fname;
771 size_t *slashes = NULL;
772 unsigned num_slashes;
776 char *converted = NULL;
777 size_t insertlen, connectlen = 0;
781 struct shadow_copy2_config *config;
782 struct shadow_copy2_private *priv;
783 size_t in_share_offset = 0;
785 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
788 config = priv->config;
790 DEBUG(10, ("converting '%s'\n", name));
792 if (!config->snapdirseverywhere) {
796 snapshot_path = shadow_copy2_snapshot_path(talloc_tos(),
799 if (snapshot_path == NULL) {
803 if (config->rel_connectpath == NULL) {
804 converted = talloc_asprintf(mem_ctx, "%s/%s",
805 snapshot_path, name);
807 converted = talloc_asprintf(mem_ctx, "%s/%s/%s",
809 config->rel_connectpath,
812 if (converted == NULL) {
816 ZERO_STRUCT(converted_fname);
817 converted_fname.base_name = converted;
819 ret = SMB_VFS_NEXT_LSTAT(handle, &converted_fname);
820 DEBUG(10, ("Trying[not snapdirseverywhere] %s: %d (%s)\n",
822 ret, ret == 0 ? "ok" : strerror(errno)));
824 DEBUG(10, ("Found %s\n", converted));
827 if (snaproot_len != NULL) {
828 *snaproot_len = strlen(snapshot_path);
829 if (config->rel_connectpath != NULL) {
831 strlen(config->rel_connectpath) + 1;
839 /* never reached ... */
842 connectlen = strlen(handle->conn->connectpath);
844 path = talloc_strdup(mem_ctx, handle->conn->connectpath);
846 path = talloc_asprintf(
847 mem_ctx, "%s/%s", handle->conn->connectpath, name);
853 pathlen = talloc_get_size(path)-1;
855 if (!shadow_copy2_find_slashes(talloc_tos(), path,
856 &slashes, &num_slashes)) {
860 insert = shadow_copy2_insert_string(talloc_tos(), handle, timestamp);
861 if (insert == NULL) {
864 insertlen = talloc_get_size(insert)-1;
867 * Note: We deliberatly don't expensively initialize the
868 * array with talloc_zero here: Putting zero into
869 * converted[pathlen+insertlen] below is sufficient, because
870 * in the following for loop, the insert string is inserted
871 * at various slash places. So the memory up to position
872 * pathlen+insertlen will always be initialized when the
873 * converted string is used.
875 converted = talloc_array(mem_ctx, char, pathlen + insertlen + 1);
876 if (converted == NULL) {
880 if (path[pathlen-1] != '/') {
882 * Append a fake slash to find the snapshot root
885 tmp = talloc_realloc(talloc_tos(), slashes,
886 size_t, num_slashes+1);
891 slashes[num_slashes] = pathlen;
897 if (!config->crossmountpoints) {
898 min_offset = strlen(config->mount_point);
901 memcpy(converted, path, pathlen+1);
902 converted[pathlen+insertlen] = '\0';
904 ZERO_STRUCT(converted_fname);
905 converted_fname.base_name = converted;
907 for (i = num_slashes-1; i>=0; i--) {
913 if (offset < min_offset) {
918 if (offset >= connectlen) {
919 in_share_offset = offset;
922 memcpy(converted+offset, insert, insertlen);
925 memcpy(converted+offset, path + slashes[i],
926 pathlen - slashes[i]);
928 ret = SMB_VFS_NEXT_LSTAT(handle, &converted_fname);
930 DEBUG(10, ("Trying[snapdirseverywhere] %s: %d (%s)\n",
932 ret, ret == 0 ? "ok" : strerror(errno)));
935 if (snaproot_len != NULL) {
936 *snaproot_len = in_share_offset + insertlen;
940 if (errno == ENOTDIR) {
942 * This is a valid condition: We appended the
943 * .snapshots/@GMT.. to a file name. Just try
944 * with the upper levels.
948 if (errno != ENOENT) {
949 /* Other problem than "not found" */
958 DEBUG(10, ("Found %s\n", converted));
965 if (result == NULL) {
968 TALLOC_FREE(converted);
970 TALLOC_FREE(slashes);
972 if (saved_errno != 0) {
979 * Convert from a name as handed in via the SMB layer
980 * and a timestamp into the local path of the snapshot
981 * of the provided file at the provided time.
983 static char *shadow_copy2_convert(TALLOC_CTX *mem_ctx,
984 struct vfs_handle_struct *handle,
985 const char *name, time_t timestamp)
987 return shadow_copy2_do_convert(mem_ctx, handle, name, timestamp, NULL);
991 modify a sbuf return to ensure that inodes in the shadow directory
992 are different from those in the main directory
994 static void convert_sbuf(vfs_handle_struct *handle, const char *fname,
995 SMB_STRUCT_STAT *sbuf)
997 struct shadow_copy2_private *priv;
999 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1002 if (priv->config->fixinodes) {
1003 /* some snapshot systems, like GPFS, return the name
1004 device:inode for the snapshot files as the current
1005 files. That breaks the 'restore' button in the shadow copy
1006 GUI, as the client gets a sharing violation.
1008 This is a crude way of allowing both files to be
1009 open at once. It has a slight chance of inode
1010 number collision, but I can't see a better approach
1011 without significant VFS changes
1013 TDB_DATA key = { .dptr = discard_const_p(uint8_t, fname),
1014 .dsize = strlen(fname) };
1017 shash = tdb_jenkins_hash(&key) & 0xFF000000;
1021 sbuf->st_ex_ino ^= shash;
1025 static int shadow_copy2_renameat(vfs_handle_struct *handle,
1026 files_struct *srcfsp,
1027 const struct smb_filename *smb_fname_src,
1028 files_struct *dstfsp,
1029 const struct smb_filename *smb_fname_dst)
1031 time_t timestamp_src = 0;
1032 time_t timestamp_dst = 0;
1033 char *snappath_src = NULL;
1034 char *snappath_dst = NULL;
1036 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle,
1038 ×tamp_src, NULL, &snappath_src,
1042 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(), handle,
1044 ×tamp_dst, NULL, &snappath_dst,
1048 if (timestamp_src != 0) {
1052 if (timestamp_dst != 0) {
1057 * Don't allow rename on already converted paths.
1059 if (snappath_src != NULL) {
1063 if (snappath_dst != NULL) {
1067 return SMB_VFS_NEXT_RENAMEAT(handle,
1074 static int shadow_copy2_symlinkat(vfs_handle_struct *handle,
1075 const struct smb_filename *link_contents,
1076 struct files_struct *dirfsp,
1077 const struct smb_filename *new_smb_fname)
1079 time_t timestamp_old = 0;
1080 time_t timestamp_new = 0;
1081 char *snappath_old = NULL;
1082 char *snappath_new = NULL;
1084 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1093 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1102 if ((timestamp_old != 0) || (timestamp_new != 0)) {
1107 * Don't allow symlinks on already converted paths.
1109 if ((snappath_old != NULL) || (snappath_new != NULL)) {
1113 return SMB_VFS_NEXT_SYMLINKAT(handle,
1119 static int shadow_copy2_linkat(vfs_handle_struct *handle,
1120 files_struct *srcfsp,
1121 const struct smb_filename *old_smb_fname,
1122 files_struct *dstfsp,
1123 const struct smb_filename *new_smb_fname,
1126 time_t timestamp_old = 0;
1127 time_t timestamp_new = 0;
1128 char *snappath_old = NULL;
1129 char *snappath_new = NULL;
1131 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1140 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1149 if ((timestamp_old != 0) || (timestamp_new != 0)) {
1154 * Don't allow links on already converted paths.
1156 if ((snappath_old != NULL) || (snappath_new != NULL)) {
1160 return SMB_VFS_NEXT_LINKAT(handle,
1168 static int shadow_copy2_stat(vfs_handle_struct *handle,
1169 struct smb_filename *smb_fname)
1171 time_t timestamp = 0;
1172 char *stripped = NULL;
1174 int saved_errno = 0;
1177 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1179 ×tamp, &stripped)) {
1182 if (timestamp == 0) {
1183 return SMB_VFS_NEXT_STAT(handle, smb_fname);
1186 tmp = smb_fname->base_name;
1187 smb_fname->base_name = shadow_copy2_convert(
1188 talloc_tos(), handle, stripped, timestamp);
1189 TALLOC_FREE(stripped);
1191 if (smb_fname->base_name == NULL) {
1192 smb_fname->base_name = tmp;
1196 ret = SMB_VFS_NEXT_STAT(handle, smb_fname);
1198 saved_errno = errno;
1201 TALLOC_FREE(smb_fname->base_name);
1202 smb_fname->base_name = tmp;
1205 convert_sbuf(handle, smb_fname->base_name, &smb_fname->st);
1207 if (saved_errno != 0) {
1208 errno = saved_errno;
1213 static int shadow_copy2_lstat(vfs_handle_struct *handle,
1214 struct smb_filename *smb_fname)
1216 time_t timestamp = 0;
1217 char *stripped = NULL;
1219 int saved_errno = 0;
1222 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1224 ×tamp, &stripped)) {
1227 if (timestamp == 0) {
1228 return SMB_VFS_NEXT_LSTAT(handle, smb_fname);
1231 tmp = smb_fname->base_name;
1232 smb_fname->base_name = shadow_copy2_convert(
1233 talloc_tos(), handle, stripped, timestamp);
1234 TALLOC_FREE(stripped);
1236 if (smb_fname->base_name == NULL) {
1237 smb_fname->base_name = tmp;
1241 ret = SMB_VFS_NEXT_LSTAT(handle, smb_fname);
1243 saved_errno = errno;
1246 TALLOC_FREE(smb_fname->base_name);
1247 smb_fname->base_name = tmp;
1250 convert_sbuf(handle, smb_fname->base_name, &smb_fname->st);
1252 if (saved_errno != 0) {
1253 errno = saved_errno;
1258 static int shadow_copy2_fstat(vfs_handle_struct *handle, files_struct *fsp,
1259 SMB_STRUCT_STAT *sbuf)
1261 time_t timestamp = 0;
1262 struct smb_filename *orig_smb_fname = NULL;
1263 struct smb_filename vss_smb_fname;
1264 struct smb_filename *orig_base_smb_fname = NULL;
1265 struct smb_filename vss_base_smb_fname;
1266 char *stripped = NULL;
1267 int saved_errno = 0;
1271 ok = shadow_copy2_strip_snapshot(talloc_tos(), handle,
1273 ×tamp, &stripped);
1278 if (timestamp == 0) {
1279 TALLOC_FREE(stripped);
1280 return SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
1283 vss_smb_fname = *fsp->fsp_name;
1284 vss_smb_fname.base_name = shadow_copy2_convert(talloc_tos(),
1288 TALLOC_FREE(stripped);
1289 if (vss_smb_fname.base_name == NULL) {
1293 orig_smb_fname = fsp->fsp_name;
1294 fsp->fsp_name = &vss_smb_fname;
1296 if (fsp->base_fsp != NULL) {
1297 vss_base_smb_fname = *fsp->base_fsp->fsp_name;
1298 vss_base_smb_fname.base_name = vss_smb_fname.base_name;
1299 orig_base_smb_fname = fsp->base_fsp->fsp_name;
1300 fsp->base_fsp->fsp_name = &vss_base_smb_fname;
1303 ret = SMB_VFS_NEXT_FSTAT(handle, fsp, sbuf);
1304 fsp->fsp_name = orig_smb_fname;
1305 if (fsp->base_fsp != NULL) {
1306 fsp->base_fsp->fsp_name = orig_base_smb_fname;
1309 saved_errno = errno;
1313 convert_sbuf(handle, fsp->fsp_name->base_name, sbuf);
1315 if (saved_errno != 0) {
1316 errno = saved_errno;
1321 static int shadow_copy2_openat(vfs_handle_struct *handle,
1322 const struct files_struct *dirfsp,
1323 const struct smb_filename *smb_fname_in,
1324 struct files_struct *fsp,
1328 struct smb_filename *smb_fname = NULL;
1329 time_t timestamp = 0;
1330 char *stripped = NULL;
1331 bool is_converted = false;
1332 int saved_errno = 0;
1336 ok = shadow_copy2_strip_snapshot_converted(talloc_tos(),
1345 if (timestamp == 0) {
1348 * Just pave over the user requested mode and use
1349 * O_RDONLY. Later attempts by the client to write on
1350 * the handle will fail in the pwrite() syscall with
1351 * EINVAL which we carefully map to EROFS. In sum, this
1352 * matches Windows behaviour.
1356 return SMB_VFS_NEXT_OPENAT(handle,
1364 smb_fname = cp_smb_filename(talloc_tos(), smb_fname_in);
1365 if (smb_fname == NULL) {
1366 TALLOC_FREE(stripped);
1371 smb_fname->base_name = shadow_copy2_convert(smb_fname,
1375 TALLOC_FREE(stripped);
1376 if (smb_fname->base_name == NULL) {
1377 TALLOC_FREE(smb_fname);
1383 * Just pave over the user requested mode and use O_RDONLY. Later
1384 * attempts by the client to write on the handle will fail in the
1385 * pwrite() syscall with EINVAL which we carefully map to EROFS. In sum,
1386 * this matches Windows behaviour.
1390 ret = SMB_VFS_NEXT_OPENAT(handle,
1397 saved_errno = errno;
1400 TALLOC_FREE(smb_fname);
1402 if (saved_errno != 0) {
1403 errno = saved_errno;
1408 static int shadow_copy2_unlinkat(vfs_handle_struct *handle,
1409 struct files_struct *dirfsp,
1410 const struct smb_filename *smb_fname,
1413 time_t timestamp = 0;
1415 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1417 ×tamp, NULL)) {
1420 if (timestamp != 0) {
1424 return SMB_VFS_NEXT_UNLINKAT(handle,
1430 static int shadow_copy2_chmod(vfs_handle_struct *handle,
1431 const struct smb_filename *smb_fname,
1434 time_t timestamp = 0;
1436 if (!shadow_copy2_strip_snapshot(talloc_tos(),
1443 if (timestamp != 0) {
1447 return SMB_VFS_NEXT_CHMOD(handle, smb_fname, mode);
1450 static void store_cwd_data(vfs_handle_struct *handle,
1451 const char *connectpath)
1453 struct shadow_copy2_private *priv = NULL;
1454 struct smb_filename *cwd_fname = NULL;
1456 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1459 TALLOC_FREE(priv->shadow_cwd);
1460 cwd_fname = SMB_VFS_NEXT_GETWD(handle, talloc_tos());
1461 if (cwd_fname == NULL) {
1462 smb_panic("getwd failed\n");
1464 DBG_DEBUG("shadow cwd = %s\n", cwd_fname->base_name);
1465 priv->shadow_cwd = talloc_strdup(priv, cwd_fname->base_name);
1466 TALLOC_FREE(cwd_fname);
1467 if (priv->shadow_cwd == NULL) {
1468 smb_panic("talloc failed\n");
1470 TALLOC_FREE(priv->shadow_connectpath);
1472 DBG_DEBUG("shadow connectpath = %s\n", connectpath);
1473 priv->shadow_connectpath = talloc_strdup(priv, connectpath);
1474 if (priv->shadow_connectpath == NULL) {
1475 smb_panic("talloc failed\n");
1480 static int shadow_copy2_chdir(vfs_handle_struct *handle,
1481 const struct smb_filename *smb_fname)
1483 time_t timestamp = 0;
1484 char *stripped = NULL;
1485 char *snappath = NULL;
1487 int saved_errno = 0;
1489 size_t rootpath_len = 0;
1490 struct smb_filename *conv_smb_fname = NULL;
1492 if (!shadow_copy2_strip_snapshot_internal(talloc_tos(),
1501 if (stripped != NULL) {
1502 conv = shadow_copy2_do_convert(talloc_tos(),
1507 TALLOC_FREE(stripped);
1511 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
1518 conv_smb_fname = cp_smb_filename(talloc_tos(), smb_fname);
1521 if (conv_smb_fname == NULL) {
1527 ret = SMB_VFS_NEXT_CHDIR(handle, conv_smb_fname);
1529 saved_errno = errno;
1533 if (conv != NULL && rootpath_len != 0) {
1534 conv[rootpath_len] = '\0';
1535 } else if (snappath != 0) {
1539 store_cwd_data(handle, conv);
1542 TALLOC_FREE(stripped);
1544 TALLOC_FREE(conv_smb_fname);
1546 if (saved_errno != 0) {
1547 errno = saved_errno;
1552 static int shadow_copy2_ntimes(vfs_handle_struct *handle,
1553 const struct smb_filename *smb_fname,
1554 struct smb_file_time *ft)
1556 time_t timestamp = 0;
1558 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1560 ×tamp, NULL)) {
1563 if (timestamp != 0) {
1567 return SMB_VFS_NEXT_NTIMES(handle, smb_fname, ft);
1570 static int shadow_copy2_readlinkat(vfs_handle_struct *handle,
1571 files_struct *dirfsp,
1572 const struct smb_filename *smb_fname,
1576 time_t timestamp = 0;
1577 char *stripped = NULL;
1578 int saved_errno = 0;
1580 struct smb_filename *conv = NULL;
1582 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1584 ×tamp, &stripped)) {
1587 if (timestamp == 0) {
1588 return SMB_VFS_NEXT_READLINKAT(handle,
1594 conv = cp_smb_filename(talloc_tos(), smb_fname);
1596 TALLOC_FREE(stripped);
1600 conv->base_name = shadow_copy2_convert(
1601 conv, handle, stripped, timestamp);
1602 TALLOC_FREE(stripped);
1603 if (conv->base_name == NULL) {
1606 ret = SMB_VFS_NEXT_READLINKAT(handle,
1612 saved_errno = errno;
1615 if (saved_errno != 0) {
1616 errno = saved_errno;
1621 static int shadow_copy2_mknodat(vfs_handle_struct *handle,
1622 files_struct *dirfsp,
1623 const struct smb_filename *smb_fname,
1627 time_t timestamp = 0;
1629 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1631 ×tamp, NULL)) {
1634 if (timestamp != 0) {
1638 return SMB_VFS_NEXT_MKNODAT(handle,
1645 static struct smb_filename *shadow_copy2_realpath(vfs_handle_struct *handle,
1647 const struct smb_filename *smb_fname)
1649 time_t timestamp = 0;
1650 char *stripped = NULL;
1651 struct smb_filename *result_fname = NULL;
1652 struct smb_filename *conv_fname = NULL;
1653 int saved_errno = 0;
1655 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle,
1657 ×tamp, &stripped)) {
1660 if (timestamp == 0) {
1661 return SMB_VFS_NEXT_REALPATH(handle, ctx, smb_fname);
1664 conv_fname = cp_smb_filename(talloc_tos(), smb_fname);
1665 if (conv_fname == NULL) {
1668 conv_fname->base_name = shadow_copy2_convert(
1669 conv_fname, handle, stripped, timestamp);
1670 if (conv_fname->base_name == NULL) {
1674 result_fname = SMB_VFS_NEXT_REALPATH(handle, ctx, conv_fname);
1677 if (result_fname == NULL) {
1678 saved_errno = errno;
1680 TALLOC_FREE(conv_fname);
1681 TALLOC_FREE(stripped);
1682 if (saved_errno != 0) {
1683 errno = saved_errno;
1685 return result_fname;
1689 * Check whether a given directory contains a
1690 * snapshot directory as direct subdirectory.
1691 * If yes, return the path of the snapshot-subdir,
1692 * otherwise return NULL.
1694 static char *have_snapdir(struct vfs_handle_struct *handle,
1697 struct smb_filename smb_fname;
1699 struct shadow_copy2_private *priv;
1701 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1704 ZERO_STRUCT(smb_fname);
1705 smb_fname.base_name = talloc_asprintf(talloc_tos(), "%s/%s",
1706 path, priv->config->snapdir);
1707 if (smb_fname.base_name == NULL) {
1711 ret = SMB_VFS_NEXT_STAT(handle, &smb_fname);
1712 if ((ret == 0) && (S_ISDIR(smb_fname.st.st_ex_mode))) {
1713 return smb_fname.base_name;
1715 TALLOC_FREE(smb_fname.base_name);
1719 static bool check_access_snapdir(struct vfs_handle_struct *handle,
1722 struct smb_filename smb_fname;
1726 ZERO_STRUCT(smb_fname);
1727 smb_fname.base_name = talloc_asprintf(talloc_tos(),
1730 if (smb_fname.base_name == NULL) {
1734 ret = SMB_VFS_NEXT_STAT(handle, &smb_fname);
1735 if (ret != 0 || !S_ISDIR(smb_fname.st.st_ex_mode)) {
1736 TALLOC_FREE(smb_fname.base_name);
1740 status = smbd_check_access_rights(handle->conn,
1741 handle->conn->cwd_fsp,
1745 if (!NT_STATUS_IS_OK(status)) {
1746 DEBUG(0,("user does not have list permission "
1748 smb_fname.base_name));
1749 TALLOC_FREE(smb_fname.base_name);
1752 TALLOC_FREE(smb_fname.base_name);
1757 * Find the snapshot directory (if any) for the given
1758 * filename (which is relative to the share).
1760 static const char *shadow_copy2_find_snapdir(TALLOC_CTX *mem_ctx,
1761 struct vfs_handle_struct *handle,
1762 struct smb_filename *smb_fname)
1765 const char *snapdir;
1766 struct shadow_copy2_config *config;
1767 struct shadow_copy2_private *priv;
1769 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1772 config = priv->config;
1775 * If the non-snapdisrseverywhere mode, we should not search!
1777 if (!config->snapdirseverywhere) {
1778 return config->snapshot_basepath;
1781 path = talloc_asprintf(mem_ctx, "%s/%s",
1782 handle->conn->connectpath,
1783 smb_fname->base_name);
1788 snapdir = have_snapdir(handle, path);
1789 if (snapdir != NULL) {
1794 while ((p = strrchr(path, '/')) && (p > path)) {
1798 snapdir = have_snapdir(handle, path);
1799 if (snapdir != NULL) {
1808 static bool shadow_copy2_snapshot_to_gmt(vfs_handle_struct *handle,
1810 char *gmt, size_t gmt_len)
1812 struct tm timestamp;
1814 unsigned long int timestamp_long;
1816 struct shadow_copy2_config *config;
1817 struct shadow_copy2_private *priv;
1818 char *tmpstr = NULL;
1820 bool converted = false;
1823 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1826 config = priv->config;
1828 fmt = config->gmt_format;
1831 * If regex is provided, then we will have to parse the
1832 * filename which will contain both the prefix and the time format.
1833 * e.g. <prefix><delimiter><time_format>
1835 if (priv->snaps->regex != NULL) {
1836 tmpstr = talloc_strdup(talloc_tos(), name);
1837 /* point "name" to the time format */
1838 name = strstr(name, priv->config->delimiter);
1842 /* Extract the prefix */
1843 tmp = strstr(tmpstr, priv->config->delimiter);
1850 ret = regexec(priv->snaps->regex, tmpstr, 0, NULL, 0);
1852 DBG_DEBUG("shadow_copy2_snapshot_to_gmt: "
1853 "no regex match for %s\n", tmpstr);
1858 ZERO_STRUCT(timestamp);
1859 if (config->use_sscanf) {
1860 if (sscanf(name, fmt, ×tamp_long) != 1) {
1861 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: "
1862 "no sscanf match %s: %s\n",
1866 timestamp_t = timestamp_long;
1867 gmtime_r(×tamp_t, ×tamp);
1869 if (strptime(name, fmt, ×tamp) == NULL) {
1870 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: "
1871 "no match %s: %s\n",
1875 DEBUG(10, ("shadow_copy2_snapshot_to_gmt: match %s: %s\n",
1878 if (config->use_localtime) {
1879 timestamp.tm_isdst = -1;
1880 timestamp_t = mktime(×tamp);
1881 gmtime_r(×tamp_t, ×tamp);
1885 strftime(gmt, gmt_len, GMT_FORMAT, ×tamp);
1889 TALLOC_FREE(tmpstr);
1893 static int shadow_copy2_label_cmp_asc(const void *x, const void *y)
1895 return strncmp((const char *)x, (const char *)y, sizeof(SHADOW_COPY_LABEL));
1898 static int shadow_copy2_label_cmp_desc(const void *x, const void *y)
1900 return -strncmp((const char *)x, (const char *)y, sizeof(SHADOW_COPY_LABEL));
1904 sort the shadow copy data in ascending or descending order
1906 static void shadow_copy2_sort_data(vfs_handle_struct *handle,
1907 struct shadow_copy_data *shadow_copy2_data)
1909 int (*cmpfunc)(const void *, const void *);
1911 struct shadow_copy2_private *priv;
1913 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
1916 sort = priv->config->sort_order;
1921 if (strcmp(sort, "asc") == 0) {
1922 cmpfunc = shadow_copy2_label_cmp_asc;
1923 } else if (strcmp(sort, "desc") == 0) {
1924 cmpfunc = shadow_copy2_label_cmp_desc;
1929 if (shadow_copy2_data && shadow_copy2_data->num_volumes > 0 &&
1930 shadow_copy2_data->labels)
1932 TYPESAFE_QSORT(shadow_copy2_data->labels,
1933 shadow_copy2_data->num_volumes,
1938 static int shadow_copy2_get_shadow_copy_data(
1939 vfs_handle_struct *handle, files_struct *fsp,
1940 struct shadow_copy_data *shadow_copy2_data,
1944 const char *snapdir;
1945 struct smb_filename *snapdir_smb_fname = NULL;
1946 struct files_struct *dirfsp = NULL;
1947 struct files_struct *fspcwd = NULL;
1949 TALLOC_CTX *tmp_ctx = talloc_stackframe();
1950 struct shadow_copy2_private *priv = NULL;
1951 struct shadow_copy2_snapentry *tmpentry = NULL;
1952 bool get_snaplist = false;
1953 bool access_granted = false;
1954 int open_flags = O_RDONLY;
1958 snapdir = shadow_copy2_find_snapdir(tmp_ctx, handle, fsp->fsp_name);
1959 if (snapdir == NULL) {
1960 DEBUG(0,("shadow:snapdir not found for %s in get_shadow_copy_data\n",
1961 handle->conn->connectpath));
1966 access_granted = check_access_snapdir(handle, snapdir);
1967 if (!access_granted) {
1968 DEBUG(0,("access denied on listing snapdir %s\n", snapdir));
1973 snapdir_smb_fname = synthetic_smb_fname(talloc_tos(),
1978 fsp->fsp_name->flags);
1979 if (snapdir_smb_fname == NULL) {
1984 status = create_internal_dirfsp(handle->conn,
1987 if (!NT_STATUS_IS_OK(status)) {
1988 DBG_WARNING("create_internal_dir_fsp() failed for '%s'"
1989 " - %s\n", snapdir, nt_errstr(status));
1994 status = vfs_at_fspcwd(talloc_tos(), handle->conn, &fspcwd);
1995 if (!NT_STATUS_IS_OK(status)) {
2001 open_flags |= O_DIRECTORY;
2004 dirfsp->fh->fd = SMB_VFS_NEXT_OPENAT(handle,
2010 if (dirfsp->fh->fd == -1) {
2011 DBG_WARNING("SMB_VFS_NEXT_OPEN failed for '%s'"
2012 " - %s\n", snapdir, strerror(errno));
2017 p = SMB_VFS_NEXT_FDOPENDIR(handle, dirfsp, NULL, 0);
2019 DBG_NOTICE("shadow_copy2: SMB_VFS_NEXT_FDOPENDIR() failed for '%s'"
2020 " - %s\n", snapdir, strerror(errno));
2025 if (shadow_copy2_data != NULL) {
2026 shadow_copy2_data->num_volumes = 0;
2027 shadow_copy2_data->labels = NULL;
2030 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
2034 * Normally this function is called twice once with labels = false and
2035 * then with labels = true. When labels is false it will return the
2036 * number of volumes so that the caller can allocate memory for that
2037 * many labels. Therefore to eliminate snaplist both the times it is
2038 * good to check if labels is set or not.
2040 * shadow_copy2_data is NULL when we only want to update the list and
2041 * don't want any labels.
2043 if ((priv->snaps->regex != NULL) && (labels || shadow_copy2_data == NULL)) {
2044 get_snaplist = true;
2045 /* Reset the global snaplist */
2046 shadow_copy2_delete_snaplist(priv);
2048 /* Set the current time as snaplist update time */
2049 time(&(priv->snaps->fetch_time));
2052 while ((d = SMB_VFS_NEXT_READDIR(handle, p, NULL))) {
2053 char snapshot[GMT_NAME_LEN+1];
2054 SHADOW_COPY_LABEL *tlabels;
2057 * ignore names not of the right form in the snapshot
2060 if (!shadow_copy2_snapshot_to_gmt(
2062 snapshot, sizeof(snapshot))) {
2064 DEBUG(6, ("shadow_copy2_get_shadow_copy_data: "
2065 "ignoring %s\n", d->d_name));
2068 DEBUG(6,("shadow_copy2_get_shadow_copy_data: %s -> %s\n",
2069 d->d_name, snapshot));
2073 * Create a snap entry for each successful
2076 tmpentry = shadow_copy2_create_snapentry(priv);
2077 if (tmpentry == NULL) {
2078 DBG_ERR("talloc_zero() failed\n");
2081 tmpentry->snapname = talloc_strdup(tmpentry, d->d_name);
2082 tmpentry->time_fmt = talloc_strdup(tmpentry, snapshot);
2085 if (shadow_copy2_data == NULL) {
2090 /* the caller doesn't want the labels */
2091 shadow_copy2_data->num_volumes++;
2095 tlabels = talloc_realloc(shadow_copy2_data,
2096 shadow_copy2_data->labels,
2098 shadow_copy2_data->num_volumes+1);
2099 if (tlabels == NULL) {
2100 DEBUG(0,("shadow_copy2: out of memory\n"));
2104 strlcpy(tlabels[shadow_copy2_data->num_volumes], snapshot,
2107 shadow_copy2_data->num_volumes++;
2108 shadow_copy2_data->labels = tlabels;
2111 shadow_copy2_sort_data(handle, shadow_copy2_data);
2115 TALLOC_FREE(fspcwd );
2117 SMB_VFS_NEXT_CLOSEDIR(handle, p);
2120 if (dirfsp != NULL) {
2122 file_free(NULL, dirfsp);
2124 TALLOC_FREE(tmp_ctx);
2128 static NTSTATUS shadow_copy2_get_nt_acl_at(vfs_handle_struct *handle,
2129 struct files_struct *dirfsp,
2130 const struct smb_filename *smb_fname,
2131 uint32_t security_info,
2132 TALLOC_CTX *mem_ctx,
2133 struct security_descriptor **ppdesc)
2135 time_t timestamp = 0;
2136 char *stripped = NULL;
2139 struct smb_filename *conv_smb_fname = NULL;
2141 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2146 return map_nt_error_from_unix(errno);
2148 if (timestamp == 0) {
2149 return SMB_VFS_NEXT_GET_NT_ACL_AT(handle,
2156 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2157 TALLOC_FREE(stripped);
2159 return map_nt_error_from_unix(errno);
2161 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2167 if (conv_smb_fname == NULL) {
2169 return NT_STATUS_NO_MEMORY;
2171 status = SMB_VFS_NEXT_GET_NT_ACL_AT(handle,
2178 TALLOC_FREE(conv_smb_fname);
2182 static int shadow_copy2_mkdirat(vfs_handle_struct *handle,
2183 struct files_struct *dirfsp,
2184 const struct smb_filename *smb_fname,
2187 time_t timestamp = 0;
2189 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2196 if (timestamp != 0) {
2200 return SMB_VFS_NEXT_MKDIRAT(handle,
2206 static int shadow_copy2_chflags(vfs_handle_struct *handle,
2207 const struct smb_filename *smb_fname,
2210 time_t timestamp = 0;
2212 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2219 if (timestamp != 0) {
2223 return SMB_VFS_NEXT_CHFLAGS(handle, smb_fname, flags);
2226 static ssize_t shadow_copy2_getxattr(vfs_handle_struct *handle,
2227 const struct smb_filename *smb_fname,
2232 time_t timestamp = 0;
2233 char *stripped = NULL;
2235 int saved_errno = 0;
2237 struct smb_filename *conv_smb_fname = NULL;
2239 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2246 if (timestamp == 0) {
2247 return SMB_VFS_NEXT_GETXATTR(handle, smb_fname, aname, value,
2250 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2251 TALLOC_FREE(stripped);
2256 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2262 if (conv_smb_fname == NULL) {
2267 ret = SMB_VFS_NEXT_GETXATTR(handle, conv_smb_fname, aname, value, size);
2269 saved_errno = errno;
2271 TALLOC_FREE(conv_smb_fname);
2273 if (saved_errno != 0) {
2274 errno = saved_errno;
2279 static ssize_t shadow_copy2_listxattr(struct vfs_handle_struct *handle,
2280 const struct smb_filename *smb_fname,
2281 char *list, size_t size)
2283 time_t timestamp = 0;
2284 char *stripped = NULL;
2286 int saved_errno = 0;
2288 struct smb_filename *conv_smb_fname = NULL;
2290 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2297 if (timestamp == 0) {
2298 return SMB_VFS_NEXT_LISTXATTR(handle, smb_fname, list, size);
2300 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2301 TALLOC_FREE(stripped);
2305 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2311 if (conv_smb_fname == NULL) {
2315 ret = SMB_VFS_NEXT_LISTXATTR(handle, conv_smb_fname, list, size);
2317 saved_errno = errno;
2319 TALLOC_FREE(conv_smb_fname);
2321 if (saved_errno != 0) {
2322 errno = saved_errno;
2327 static int shadow_copy2_removexattr(vfs_handle_struct *handle,
2328 const struct smb_filename *smb_fname,
2331 time_t timestamp = 0;
2333 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2340 if (timestamp != 0) {
2344 return SMB_VFS_NEXT_REMOVEXATTR(handle, smb_fname, aname);
2347 static int shadow_copy2_setxattr(struct vfs_handle_struct *handle,
2348 const struct smb_filename *smb_fname,
2349 const char *aname, const void *value,
2350 size_t size, int flags)
2352 time_t timestamp = 0;
2354 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2361 if (timestamp != 0) {
2365 return SMB_VFS_NEXT_SETXATTR(handle, smb_fname,
2366 aname, value, size, flags);
2369 static NTSTATUS shadow_copy2_create_dfs_pathat(struct vfs_handle_struct *handle,
2370 struct files_struct *dirfsp,
2371 const struct smb_filename *smb_fname,
2372 const struct referral *reflist,
2373 size_t referral_count)
2375 time_t timestamp = 0;
2377 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2382 return NT_STATUS_NO_MEMORY;
2384 if (timestamp != 0) {
2385 return NT_STATUS_MEDIA_WRITE_PROTECTED;
2387 return SMB_VFS_NEXT_CREATE_DFS_PATHAT(handle,
2394 static NTSTATUS shadow_copy2_read_dfs_pathat(struct vfs_handle_struct *handle,
2395 TALLOC_CTX *mem_ctx,
2396 struct files_struct *dirfsp,
2397 struct smb_filename *smb_fname,
2398 struct referral **ppreflist,
2399 size_t *preferral_count)
2401 time_t timestamp = 0;
2402 char *stripped = NULL;
2403 struct smb_filename *conv = NULL;
2406 if (!shadow_copy2_strip_snapshot(mem_ctx,
2411 return NT_STATUS_NO_MEMORY;
2413 if (timestamp == 0) {
2414 return SMB_VFS_NEXT_READ_DFS_PATHAT(handle,
2422 conv = cp_smb_filename(mem_ctx, smb_fname);
2424 TALLOC_FREE(stripped);
2425 return NT_STATUS_NO_MEMORY;
2427 conv->base_name = shadow_copy2_convert(conv,
2431 TALLOC_FREE(stripped);
2432 if (conv->base_name == NULL) {
2434 return NT_STATUS_NO_MEMORY;
2437 status = SMB_VFS_NEXT_READ_DFS_PATHAT(handle,
2444 if (NT_STATUS_IS_OK(status)) {
2445 /* Return any stat(2) info. */
2446 smb_fname->st = conv->st;
2453 static int shadow_copy2_get_real_filename(struct vfs_handle_struct *handle,
2454 const struct smb_filename *fname,
2456 TALLOC_CTX *mem_ctx,
2459 struct shadow_copy2_private *priv = NULL;
2460 struct shadow_copy2_config *config = NULL;
2461 time_t timestamp = 0;
2462 char *stripped = NULL;
2464 int saved_errno = 0;
2466 struct smb_filename conv_fname;
2468 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
2470 config = priv->config;
2472 DBG_DEBUG("Path=[%s] name=[%s]\n", smb_fname_str_dbg(fname), name);
2474 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle, fname,
2475 ×tamp, &stripped)) {
2476 DEBUG(10, ("shadow_copy2_strip_snapshot failed\n"));
2479 if (timestamp == 0) {
2480 DEBUG(10, ("timestamp == 0\n"));
2481 return SMB_VFS_NEXT_GET_REAL_FILENAME(handle, fname, name,
2482 mem_ctx, found_name);
2486 * Note that stripped may be an empty string "" if path was ".". As
2487 * shadow_copy2_convert() combines "" with the shadow-copy tree connect
2488 * root fullpath and get_real_filename_full_scan() has an explicit check
2489 * for "" this works.
2491 DBG_DEBUG("stripped [%s]\n", stripped);
2493 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2495 if (!config->snapdirseverywhere) {
2496 DBG_DEBUG("shadow_copy2_convert [%s] failed\n", stripped);
2501 * We're called in the path traversal loop in unix_convert()
2502 * walking down the directory hierarchy. shadow_copy2_convert()
2503 * will fail if the snapshot directory is futher down in the
2504 * hierachy. Set conv to the original stripped path and try to
2505 * look it up in the filesystem with
2506 * SMB_VFS_NEXT_GET_REAL_FILENAME() or
2507 * get_real_filename_full_scan().
2509 DBG_DEBUG("Use stripped [%s] as conv\n", stripped);
2510 conv = talloc_strdup(talloc_tos(), stripped);
2512 TALLOC_FREE(stripped);
2517 conv_fname = (struct smb_filename) {
2521 DEBUG(10, ("Calling NEXT_GET_REAL_FILE_NAME for conv=[%s], "
2522 "name=[%s]\n", conv, name));
2523 ret = SMB_VFS_NEXT_GET_REAL_FILENAME(handle, &conv_fname, name,
2524 mem_ctx, found_name);
2525 DEBUG(10, ("NEXT_REAL_FILE_NAME returned %d\n", (int)ret));
2529 if (errno != EOPNOTSUPP) {
2535 ret = get_real_filename_full_scan(handle->conn,
2542 saved_errno = errno;
2543 DBG_DEBUG("Scan [%s] for [%s] failed\n",
2545 errno = saved_errno;
2549 DBG_DEBUG("Scan [%s] for [%s] returned [%s]\n",
2550 conv, name, *found_name);
2556 static const char *shadow_copy2_connectpath(struct vfs_handle_struct *handle,
2557 const struct smb_filename *smb_fname_in)
2559 time_t timestamp = 0;
2560 char *stripped = NULL;
2562 const char *fname = smb_fname_in->base_name;
2563 struct smb_filename smb_fname = {0};
2564 struct smb_filename *result_fname = NULL;
2565 char *result = NULL;
2566 char *parent_dir = NULL;
2567 int saved_errno = 0;
2568 size_t rootpath_len = 0;
2569 struct shadow_copy2_private *priv = NULL;
2571 SMB_VFS_HANDLE_GET_DATA(handle, priv, struct shadow_copy2_private,
2574 DBG_DEBUG("Calc connect path for [%s]\n", fname);
2576 if (priv->shadow_connectpath != NULL) {
2577 DBG_DEBUG("cached connect path is [%s]\n",
2578 priv->shadow_connectpath);
2579 return priv->shadow_connectpath;
2582 if (!shadow_copy2_strip_snapshot(talloc_tos(), handle, smb_fname_in,
2583 ×tamp, &stripped)) {
2586 if (timestamp == 0) {
2587 return SMB_VFS_NEXT_CONNECTPATH(handle, smb_fname_in);
2590 tmp = shadow_copy2_do_convert(talloc_tos(), handle, stripped, timestamp,
2593 if (errno != ENOENT) {
2598 * If the converted path does not exist, and converting
2599 * the parent yields something that does exist, then
2600 * this path refers to something that has not been
2601 * created yet, relative to the parent path.
2602 * The snapshot finding is relative to the parent.
2603 * (usually snapshots are read/only but this is not
2604 * necessarily true).
2605 * This code also covers getting a wildcard in the
2606 * last component, because this function is called
2607 * prior to sanitizing the path, and in SMB1 we may
2608 * get wildcards in path names.
2610 if (!parent_dirname(talloc_tos(), stripped, &parent_dir,
2616 tmp = shadow_copy2_do_convert(talloc_tos(), handle, parent_dir,
2617 timestamp, &rootpath_len);
2623 DBG_DEBUG("converted path is [%s] root path is [%.*s]\n", tmp,
2624 (int)rootpath_len, tmp);
2626 tmp[rootpath_len] = '\0';
2627 smb_fname = (struct smb_filename) { .base_name = tmp };
2629 result_fname = SMB_VFS_NEXT_REALPATH(handle, priv, &smb_fname);
2630 if (result_fname == NULL) {
2635 * SMB_VFS_NEXT_REALPATH returns a talloc'ed string.
2636 * Don't leak memory.
2638 TALLOC_FREE(priv->shadow_realpath);
2639 priv->shadow_realpath = result_fname;
2640 result = priv->shadow_realpath->base_name;
2642 DBG_DEBUG("connect path is [%s]\n", result);
2645 if (result == NULL) {
2646 saved_errno = errno;
2649 TALLOC_FREE(stripped);
2650 TALLOC_FREE(parent_dir);
2651 if (saved_errno != 0) {
2652 errno = saved_errno;
2657 static uint64_t shadow_copy2_disk_free(vfs_handle_struct *handle,
2658 const struct smb_filename *smb_fname,
2663 time_t timestamp = 0;
2664 char *stripped = NULL;
2665 int saved_errno = 0;
2667 struct smb_filename *conv_smb_fname = NULL;
2668 uint64_t ret = (uint64_t)-1;
2670 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2675 return (uint64_t)-1;
2677 if (timestamp == 0) {
2678 return SMB_VFS_NEXT_DISK_FREE(handle, smb_fname,
2679 bsize, dfree, dsize);
2681 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2682 TALLOC_FREE(stripped);
2684 return (uint64_t)-1;
2686 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2692 if (conv_smb_fname == NULL) {
2694 return (uint64_t)-1;
2696 ret = SMB_VFS_NEXT_DISK_FREE(handle, conv_smb_fname,
2697 bsize, dfree, dsize);
2698 if (ret == (uint64_t)-1) {
2699 saved_errno = errno;
2702 TALLOC_FREE(conv_smb_fname);
2703 if (saved_errno != 0) {
2704 errno = saved_errno;
2709 static int shadow_copy2_get_quota(vfs_handle_struct *handle,
2710 const struct smb_filename *smb_fname,
2711 enum SMB_QUOTA_TYPE qtype,
2715 time_t timestamp = 0;
2716 char *stripped = NULL;
2718 int saved_errno = 0;
2720 struct smb_filename *conv_smb_fname = NULL;
2722 if (!shadow_copy2_strip_snapshot(talloc_tos(),
2729 if (timestamp == 0) {
2730 return SMB_VFS_NEXT_GET_QUOTA(handle, smb_fname, qtype, id, dq);
2733 conv = shadow_copy2_convert(talloc_tos(), handle, stripped, timestamp);
2734 TALLOC_FREE(stripped);
2738 conv_smb_fname = synthetic_smb_fname(talloc_tos(),
2744 if (conv_smb_fname == NULL) {
2748 ret = SMB_VFS_NEXT_GET_QUOTA(handle, conv_smb_fname, qtype, id, dq);
2751 saved_errno = errno;
2754 TALLOC_FREE(conv_smb_fname);
2755 if (saved_errno != 0) {
2756 errno = saved_errno;
2762 static ssize_t shadow_copy2_pwrite(vfs_handle_struct *handle,
2770 nwritten = SMB_VFS_NEXT_PWRITE(handle, fsp, data, n, offset);
2771 if (nwritten == -1) {
2772 if (errno == EBADF && fsp->fsp_flags.can_write) {
2780 struct shadow_copy2_pwrite_state {
2781 vfs_handle_struct *handle;
2784 struct vfs_aio_state vfs_aio_state;
2787 static void shadow_copy2_pwrite_done(struct tevent_req *subreq);
2789 static struct tevent_req *shadow_copy2_pwrite_send(
2790 struct vfs_handle_struct *handle, TALLOC_CTX *mem_ctx,
2791 struct tevent_context *ev, struct files_struct *fsp,
2792 const void *data, size_t n, off_t offset)
2794 struct tevent_req *req = NULL, *subreq = NULL;
2795 struct shadow_copy2_pwrite_state *state = NULL;
2797 req = tevent_req_create(mem_ctx, &state,
2798 struct shadow_copy2_pwrite_state);
2802 state->handle = handle;
2805 subreq = SMB_VFS_NEXT_PWRITE_SEND(state,
2812 if (tevent_req_nomem(subreq, req)) {
2813 return tevent_req_post(req, ev);
2815 tevent_req_set_callback(subreq, shadow_copy2_pwrite_done, req);
2820 static void shadow_copy2_pwrite_done(struct tevent_req *subreq)
2822 struct tevent_req *req = tevent_req_callback_data(
2823 subreq, struct tevent_req);
2824 struct shadow_copy2_pwrite_state *state = tevent_req_data(
2825 req, struct shadow_copy2_pwrite_state);
2827 state->ret = SMB_VFS_PWRITE_RECV(subreq, &state->vfs_aio_state);
2828 TALLOC_FREE(subreq);
2829 if (state->ret == -1) {
2830 tevent_req_error(req, state->vfs_aio_state.error);
2834 tevent_req_done(req);
2837 static ssize_t shadow_copy2_pwrite_recv(struct tevent_req *req,
2838 struct vfs_aio_state *vfs_aio_state)
2840 struct shadow_copy2_pwrite_state *state = tevent_req_data(
2841 req, struct shadow_copy2_pwrite_state);
2843 if (tevent_req_is_unix_error(req, &vfs_aio_state->error)) {
2844 if ((vfs_aio_state->error == EBADF) &&
2845 state->fsp->fsp_flags.can_write)
2847 vfs_aio_state->error = EROFS;
2853 *vfs_aio_state = state->vfs_aio_state;
2857 static int shadow_copy2_connect(struct vfs_handle_struct *handle,
2858 const char *service, const char *user)
2860 struct shadow_copy2_config *config;
2861 struct shadow_copy2_private *priv;
2863 const char *snapdir;
2864 const char *snapprefix = NULL;
2865 const char *delimiter;
2866 const char *gmt_format;
2867 const char *sort_order;
2868 const char *basedir = NULL;
2869 const char *snapsharepath = NULL;
2870 const char *mount_point;
2872 DEBUG(10, (__location__ ": cnum[%u], connectpath[%s]\n",
2873 (unsigned)handle->conn->cnum,
2874 handle->conn->connectpath));
2876 ret = SMB_VFS_NEXT_CONNECT(handle, service, user);
2881 priv = talloc_zero(handle->conn, struct shadow_copy2_private);
2883 DBG_ERR("talloc_zero() failed\n");
2888 priv->snaps = talloc_zero(priv, struct shadow_copy2_snaplist_info);
2889 if (priv->snaps == NULL) {
2890 DBG_ERR("talloc_zero() failed\n");
2895 config = talloc_zero(priv, struct shadow_copy2_config);
2896 if (config == NULL) {
2897 DEBUG(0, ("talloc_zero() failed\n"));
2902 priv->config = config;
2904 gmt_format = lp_parm_const_string(SNUM(handle->conn),
2907 config->gmt_format = talloc_strdup(config, gmt_format);
2908 if (config->gmt_format == NULL) {
2909 DEBUG(0, ("talloc_strdup() failed\n"));
2914 /* config->gmt_format must not contain a path separator. */
2915 if (strchr(config->gmt_format, '/') != NULL) {
2916 DEBUG(0, ("shadow:format %s must not contain a /"
2917 "character. Unable to initialize module.\n",
2918 config->gmt_format));
2923 config->use_sscanf = lp_parm_bool(SNUM(handle->conn),
2924 "shadow", "sscanf", false);
2926 config->use_localtime = lp_parm_bool(SNUM(handle->conn),
2927 "shadow", "localtime",
2930 snapdir = lp_parm_const_string(SNUM(handle->conn),
2931 "shadow", "snapdir",
2933 config->snapdir = talloc_strdup(config, snapdir);
2934 if (config->snapdir == NULL) {
2935 DEBUG(0, ("talloc_strdup() failed\n"));
2940 snapprefix = lp_parm_const_string(SNUM(handle->conn),
2941 "shadow", "snapprefix",
2943 if (snapprefix != NULL) {
2944 priv->snaps->regex = talloc_zero(priv->snaps, regex_t);
2945 if (priv->snaps->regex == NULL) {
2946 DBG_ERR("talloc_zero() failed\n");
2951 /* pre-compute regex rule for matching pattern later */
2952 ret = regcomp(priv->snaps->regex, snapprefix, 0);
2954 DBG_ERR("Failed to create regex object\n");
2959 delimiter = lp_parm_const_string(SNUM(handle->conn),
2960 "shadow", "delimiter",
2962 if (delimiter != NULL) {
2963 priv->config->delimiter = talloc_strdup(priv->config, delimiter);
2964 if (priv->config->delimiter == NULL) {
2965 DBG_ERR("talloc_strdup() failed\n");
2971 config->snapdirseverywhere = lp_parm_bool(SNUM(handle->conn),
2973 "snapdirseverywhere",
2976 config->crossmountpoints = lp_parm_bool(SNUM(handle->conn),
2977 "shadow", "crossmountpoints",
2980 if (config->crossmountpoints && !config->snapdirseverywhere) {
2981 DBG_WARNING("Warning: 'crossmountpoints' depends on "
2982 "'snapdirseverywhere'. Disabling crossmountpoints.\n");
2985 config->fixinodes = lp_parm_bool(SNUM(handle->conn),
2986 "shadow", "fixinodes",
2989 sort_order = lp_parm_const_string(SNUM(handle->conn),
2990 "shadow", "sort", "desc");
2991 config->sort_order = talloc_strdup(config, sort_order);
2992 if (config->sort_order == NULL) {
2993 DEBUG(0, ("talloc_strdup() failed\n"));
2998 mount_point = lp_parm_const_string(SNUM(handle->conn),
2999 "shadow", "mountpoint", NULL);
3000 if (mount_point != NULL) {
3001 if (mount_point[0] != '/') {
3002 DEBUG(1, (__location__ " Warning: 'mountpoint' is "
3003 "relative ('%s'), but it has to be an "
3004 "absolute path. Ignoring provided value.\n",
3009 p = strstr(handle->conn->connectpath, mount_point);
3010 if (p != handle->conn->connectpath) {
3011 DBG_WARNING("Warning: the share root (%s) is "
3012 "not a subdirectory of the "
3013 "specified mountpoint (%s). "
3014 "Ignoring provided value.\n",
3015 handle->conn->connectpath,
3022 if (mount_point != NULL) {
3023 config->mount_point = talloc_strdup(config, mount_point);
3024 if (config->mount_point == NULL) {
3025 DEBUG(0, (__location__ " talloc_strdup() failed\n"));
3029 config->mount_point = shadow_copy2_find_mount_point(config,
3031 if (config->mount_point == NULL) {
3032 DBG_WARNING("shadow_copy2_find_mount_point "
3033 "of the share root '%s' failed: %s\n",
3034 handle->conn->connectpath, strerror(errno));
3039 basedir = lp_parm_const_string(SNUM(handle->conn),
3040 "shadow", "basedir", NULL);
3042 if (basedir != NULL) {
3043 if (basedir[0] != '/') {
3044 DEBUG(1, (__location__ " Warning: 'basedir' is "
3045 "relative ('%s'), but it has to be an "
3046 "absolute path. Disabling basedir.\n",
3051 p = strstr(basedir, config->mount_point);
3053 DEBUG(1, ("Warning: basedir (%s) is not a "
3054 "subdirectory of the share root's "
3055 "mount point (%s). "
3056 "Disabling basedir\n",
3057 basedir, config->mount_point));
3063 if (config->snapdirseverywhere && basedir != NULL) {
3064 DEBUG(1, (__location__ " Warning: 'basedir' is incompatible "
3065 "with 'snapdirseverywhere'. Disabling basedir.\n"));
3069 snapsharepath = lp_parm_const_string(SNUM(handle->conn), "shadow",
3070 "snapsharepath", NULL);
3071 if (snapsharepath != NULL) {
3072 if (snapsharepath[0] == '/') {
3073 DBG_WARNING("Warning: 'snapsharepath' is "
3074 "absolute ('%s'), but it has to be a "
3075 "relative path. Disabling snapsharepath.\n",
3077 snapsharepath = NULL;
3079 if (config->snapdirseverywhere && snapsharepath != NULL) {
3080 DBG_WARNING("Warning: 'snapsharepath' is incompatible "
3081 "with 'snapdirseverywhere'. Disabling "
3082 "snapsharepath.\n");
3083 snapsharepath = NULL;
3087 if (basedir != NULL && snapsharepath != NULL) {
3088 DBG_WARNING("Warning: 'snapsharepath' is incompatible with "
3089 "'basedir'. Disabling snapsharepath\n");
3090 snapsharepath = NULL;
3093 if (snapsharepath != NULL) {
3094 config->rel_connectpath = talloc_strdup(config, snapsharepath);
3095 if (config->rel_connectpath == NULL) {
3096 DBG_ERR("talloc_strdup() failed\n");
3102 if (basedir == NULL) {
3103 basedir = config->mount_point;
3106 if (config->rel_connectpath == NULL &&
3107 strlen(basedir) < strlen(handle->conn->connectpath)) {
3108 config->rel_connectpath = talloc_strdup(config,
3109 handle->conn->connectpath + strlen(basedir));
3110 if (config->rel_connectpath == NULL) {
3111 DEBUG(0, ("talloc_strdup() failed\n"));
3117 if (config->snapdir[0] == '/') {
3118 config->snapdir_absolute = true;
3120 if (config->snapdirseverywhere == true) {
3121 DEBUG(1, (__location__ " Warning: An absolute snapdir "
3122 "is incompatible with 'snapdirseverywhere', "
3123 "setting 'snapdirseverywhere' to false.\n"));
3124 config->snapdirseverywhere = false;
3127 if (config->crossmountpoints == true) {
3128 DEBUG(1, (__location__ " Warning: 'crossmountpoints' "
3129 "is not supported with an absolute snapdir. "
3130 "Disabling it.\n"));
3131 config->crossmountpoints = false;
3134 config->snapshot_basepath = config->snapdir;
3136 config->snapshot_basepath = talloc_asprintf(config, "%s/%s",
3137 config->mount_point, config->snapdir);
3138 if (config->snapshot_basepath == NULL) {
3139 DEBUG(0, ("talloc_asprintf() failed\n"));
3145 trim_string(config->mount_point, NULL, "/");
3146 trim_string(config->rel_connectpath, "/", "/");
3147 trim_string(config->snapdir, NULL, "/");
3148 trim_string(config->snapshot_basepath, NULL, "/");
3150 DEBUG(10, ("shadow_copy2_connect: configuration:\n"
3151 " share root: '%s'\n"
3152 " mountpoint: '%s'\n"
3153 " rel share root: '%s'\n"
3155 " snapprefix: '%s'\n"
3156 " delimiter: '%s'\n"
3157 " snapshot base path: '%s'\n"
3160 " snapdirs everywhere: %s\n"
3161 " cross mountpoints: %s\n"
3165 handle->conn->connectpath,
3166 config->mount_point,
3167 config->rel_connectpath,
3171 config->snapshot_basepath,
3173 config->use_sscanf ? "yes" : "no",
3174 config->snapdirseverywhere ? "yes" : "no",
3175 config->crossmountpoints ? "yes" : "no",
3176 config->fixinodes ? "yes" : "no",
3181 SMB_VFS_HANDLE_SET_DATA(handle, priv,
3182 NULL, struct shadow_copy2_private,
3188 static struct vfs_fn_pointers vfs_shadow_copy2_fns = {
3189 .connect_fn = shadow_copy2_connect,
3190 .disk_free_fn = shadow_copy2_disk_free,
3191 .get_quota_fn = shadow_copy2_get_quota,
3192 .create_dfs_pathat_fn = shadow_copy2_create_dfs_pathat,
3193 .read_dfs_pathat_fn = shadow_copy2_read_dfs_pathat,
3194 .renameat_fn = shadow_copy2_renameat,
3195 .linkat_fn = shadow_copy2_linkat,
3196 .symlinkat_fn = shadow_copy2_symlinkat,
3197 .stat_fn = shadow_copy2_stat,
3198 .lstat_fn = shadow_copy2_lstat,
3199 .fstat_fn = shadow_copy2_fstat,
3200 .openat_fn = shadow_copy2_openat,
3201 .unlinkat_fn = shadow_copy2_unlinkat,
3202 .chmod_fn = shadow_copy2_chmod,
3203 .chdir_fn = shadow_copy2_chdir,
3204 .ntimes_fn = shadow_copy2_ntimes,
3205 .readlinkat_fn = shadow_copy2_readlinkat,
3206 .mknodat_fn = shadow_copy2_mknodat,
3207 .realpath_fn = shadow_copy2_realpath,
3208 .get_nt_acl_at_fn = shadow_copy2_get_nt_acl_at,
3209 .get_shadow_copy_data_fn = shadow_copy2_get_shadow_copy_data,
3210 .mkdirat_fn = shadow_copy2_mkdirat,
3211 .getxattr_fn = shadow_copy2_getxattr,
3212 .getxattrat_send_fn = vfs_not_implemented_getxattrat_send,
3213 .getxattrat_recv_fn = vfs_not_implemented_getxattrat_recv,
3214 .listxattr_fn = shadow_copy2_listxattr,
3215 .removexattr_fn = shadow_copy2_removexattr,
3216 .setxattr_fn = shadow_copy2_setxattr,
3217 .chflags_fn = shadow_copy2_chflags,
3218 .get_real_filename_fn = shadow_copy2_get_real_filename,
3219 .pwrite_fn = shadow_copy2_pwrite,
3220 .pwrite_send_fn = shadow_copy2_pwrite_send,
3221 .pwrite_recv_fn = shadow_copy2_pwrite_recv,
3222 .connectpath_fn = shadow_copy2_connectpath,
3226 NTSTATUS vfs_shadow_copy2_init(TALLOC_CTX *ctx)
3228 return smb_register_vfs(SMB_VFS_INTERFACE_VERSION,
3229 "shadow_copy2", &vfs_shadow_copy2_fns);