⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 vfs_smb2.c

📁 samba最新软件
💻 C
📖 第 1 页 / 共 2 页
字号:
/*    Unix SMB/CIFS implementation.   CIFS-to-SMB2 NTVFS filesystem backend   Copyright (C) Andrew Tridgell 2008   largely based on vfs_cifs.c which was       Copyright (C) Andrew Tridgell 2003      Copyright (C) James J Myers 2003 <myersjj@samba.org>   This program is free software; you can redistribute it and/or modify   it under the terms of the GNU General Public License as published by   the Free Software Foundation; either version 3 of the License, or   (at your option) any later version.      This program is distributed in the hope that it will be useful,   but WITHOUT ANY WARRANTY; without even the implied warranty of   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the   GNU General Public License for more details.      You should have received a copy of the GNU General Public License   along with this program.  If not, see <http://www.gnu.org/licenses/>.*//*  this implements a CIFS->CIFS NTVFS filesystem backend.   */#include "includes.h"#include "libcli/raw/libcliraw.h"#include "libcli/raw/raw_proto.h"#include "libcli/composite/composite.h"#include "libcli/smb_composite/smb_composite.h"#include "auth/auth.h"#include "auth/credentials/credentials.h"#include "ntvfs/ntvfs.h"#include "lib/util/dlinklist.h"#include "param/param.h"#include "libcli/resolve/resolve.h"#include "libcli/smb2/smb2.h"#include "libcli/smb2/smb2_calls.h"struct cvfs_file {	struct cvfs_file *prev, *next;	uint16_t fnum;	struct ntvfs_handle *h;};/* this is stored in ntvfs_private */struct cvfs_private {	struct smb2_tree *tree;	struct smb2_transport *transport;	struct ntvfs_module_context *ntvfs;	struct async_info *pending;	struct cvfs_file *files;	/* a handle on the root of the share */	/* TODO: leaving this handle open could prevent other users	   from opening the share with exclusive access. We probably	   need to open it on demand */	struct smb2_handle roothandle;};/* a structure used to pass information to an async handler */struct async_info {	struct async_info *next, *prev;	struct cvfs_private *cvfs;	struct ntvfs_request *req;	void *c_req;	struct composite_context *c_comp;	struct cvfs_file *f;	void *parms;};#define SETUP_FILE_HERE(f) do { \	f = ntvfs_handle_get_backend_data(io->generic.in.file.ntvfs, ntvfs); \	if (!f) return NT_STATUS_INVALID_HANDLE; \	io->generic.in.file.fnum = f->fnum; \} while (0)#define SETUP_FILE do { \	struct cvfs_file *f; \	SETUP_FILE_HERE(f); \} while (0)#define SMB2_SERVER		"smb2:server"#define SMB2_USER		"smb2:user"#define SMB2_PASSWORD		"smb2:password"#define SMB2_DOMAIN		"smb2:domain"#define SMB2_SHARE		"smb2:share"#define SMB2_USE_MACHINE_ACCT	"smb2:use-machine-account"#define SMB2_USE_MACHINE_ACCT_DEFAULT	false/*  a handler for oplock break events from the server - these need to be passed  along to the client */static bool oplock_handler(struct smbcli_transport *transport, uint16_t tid, uint16_t fnum, uint8_t level, void *p_private){	struct cvfs_private *private = p_private;	NTSTATUS status;	struct ntvfs_handle *h = NULL;	struct cvfs_file *f;	for (f=private->files; f; f=f->next) {		if (f->fnum != fnum) continue;		h = f->h;		break;	}	if (!h) {		DEBUG(5,("vfs_smb2: ignoring oplock break level %d for fnum %d\n", level, fnum));		return true;	}	DEBUG(5,("vfs_smb2: sending oplock break level %d for fnum %d\n", level, fnum));	status = ntvfs_send_oplock_break(private->ntvfs, h, level);	if (!NT_STATUS_IS_OK(status)) return false;	return true;}/*  return a handle to the root of the share*/static NTSTATUS smb2_get_roothandle(struct smb2_tree *tree, struct smb2_handle *handle){	struct smb2_create io;	NTSTATUS status;	ZERO_STRUCT(io);	io.in.oplock_level = 0;	io.in.desired_access = SEC_STD_SYNCHRONIZE | SEC_DIR_READ_ATTRIBUTE | SEC_DIR_LIST;	io.in.file_attributes   = 0;	io.in.create_disposition = NTCREATEX_DISP_OPEN;	io.in.share_access = 		NTCREATEX_SHARE_ACCESS_READ |		NTCREATEX_SHARE_ACCESS_WRITE|		NTCREATEX_SHARE_ACCESS_DELETE;	io.in.create_options = 0;	io.in.fname = NULL;	status = smb2_create(tree, tree, &io);	NT_STATUS_NOT_OK_RETURN(status);	*handle = io.out.file.handle;	return NT_STATUS_OK;}/*  connect to a share - used when a tree_connect operation comes in.*/static NTSTATUS cvfs_connect(struct ntvfs_module_context *ntvfs, 			     struct ntvfs_request *req, const char *sharename){	NTSTATUS status;	struct cvfs_private *private;	const char *host, *user, *pass, *domain, *remote_share;	struct composite_context *creq;	struct share_config *scfg = ntvfs->ctx->config;	struct smb2_tree *tree;	struct cli_credentials *credentials;	bool machine_account;	struct smbcli_options options;	/* Here we need to determine which server to connect to.	 * For now we use parametric options, type cifs.	 * Later we will use security=server and auth_server.c.	 */	host = share_string_option(scfg, SMB2_SERVER, NULL);	user = share_string_option(scfg, SMB2_USER, NULL);	pass = share_string_option(scfg, SMB2_PASSWORD, NULL);	domain = share_string_option(scfg, SMB2_DOMAIN, NULL);	remote_share = share_string_option(scfg, SMB2_SHARE, NULL);	if (!remote_share) {		remote_share = sharename;	}	machine_account = share_bool_option(scfg, SMB2_USE_MACHINE_ACCT, SMB2_USE_MACHINE_ACCT_DEFAULT);	private = talloc_zero(ntvfs, struct cvfs_private);	if (!private) {		return NT_STATUS_NO_MEMORY;	}	ntvfs->private_data = private;	if (!host) {		DEBUG(1,("CIFS backend: You must supply server\n"));		return NT_STATUS_INVALID_PARAMETER;	} 		if (user && pass) {		DEBUG(5, ("CIFS backend: Using specified password\n"));		credentials = cli_credentials_init(private);		if (!credentials) {			return NT_STATUS_NO_MEMORY;		}		cli_credentials_set_conf(credentials, ntvfs->ctx->lp_ctx);		cli_credentials_set_username(credentials, user, CRED_SPECIFIED);		if (domain) {			cli_credentials_set_domain(credentials, domain, CRED_SPECIFIED);		}		cli_credentials_set_password(credentials, pass, CRED_SPECIFIED);	} else if (machine_account) {		DEBUG(5, ("CIFS backend: Using machine account\n"));		credentials = cli_credentials_init(private);		cli_credentials_set_conf(credentials, ntvfs->ctx->lp_ctx);		if (domain) {			cli_credentials_set_domain(credentials, domain, CRED_SPECIFIED);		}		status = cli_credentials_set_machine_account(credentials, ntvfs->ctx->lp_ctx);		if (!NT_STATUS_IS_OK(status)) {			return status;		}	} else if (req->session_info->credentials) {		DEBUG(5, ("CIFS backend: Using delegated credentials\n"));		credentials = req->session_info->credentials;	} else {		DEBUG(1,("CIFS backend: NO delegated credentials found: You must supply server, user and password or the client must supply delegated credentials\n"));		return NT_STATUS_INVALID_PARAMETER;	}	lp_smbcli_options(ntvfs->ctx->lp_ctx, &options);	creq = smb2_connect_send(private, host, remote_share, 				 lp_resolve_context(ntvfs->ctx->lp_ctx),				 credentials,				 ntvfs->ctx->event_ctx, &options);	status = smb2_connect_recv(creq, private, &tree);	NT_STATUS_NOT_OK_RETURN(status);	status = smb2_get_roothandle(tree, &private->roothandle);	NT_STATUS_NOT_OK_RETURN(status);	private->tree = tree;	private->transport = private->tree->session->transport;	private->ntvfs = ntvfs;	ntvfs->ctx->fs_type = talloc_strdup(ntvfs->ctx, "NTFS");	NT_STATUS_HAVE_NO_MEMORY(ntvfs->ctx->fs_type);	ntvfs->ctx->dev_type = talloc_strdup(ntvfs->ctx, "A:");	NT_STATUS_HAVE_NO_MEMORY(ntvfs->ctx->dev_type);	/* we need to receive oplock break requests from the server */	/* TODO: enable oplocks 	smbcli_oplock_handler(private->transport, oplock_handler, private);	*/	return NT_STATUS_OK;}/*  disconnect from a share*/static NTSTATUS cvfs_disconnect(struct ntvfs_module_context *ntvfs){	struct cvfs_private *private = ntvfs->private_data;	struct async_info *a, *an;	/* first cleanup pending requests */	for (a=private->pending; a; a = an) {		an = a->next;		talloc_free(a->c_req);		talloc_free(a);	}	talloc_free(private);	ntvfs->private_data = NULL;	return NT_STATUS_OK;}/*  destroy an async info structure*/static int async_info_destructor(struct async_info *async){	DLIST_REMOVE(async->cvfs->pending, async);	return 0;}/*  a handler for simple async SMB2 replies  this handler can only be used for functions that don't return any  parameters (those that just return a status code) */static void async_simple_smb2(struct smb2_request *c_req){	struct async_info *async = c_req->async.private_data;	struct ntvfs_request *req = async->req;	smb2_request_receive(c_req);	req->async_states->status = smb2_request_destroy(c_req);	talloc_free(async);	req->async_states->send_fn(req);}/*  a handler for simple async composite replies  this handler can only be used for functions that don't return any  parameters (those that just return a status code) */static void async_simple_composite(struct composite_context *c_req){	struct async_info *async = c_req->async.private_data;	struct ntvfs_request *req = async->req;	req->async_states->status = composite_wait_free(c_req);	talloc_free(async);	req->async_states->send_fn(req);}/* save some typing for the simple functions */#define ASYNC_RECV_TAIL_F(io, async_fn, file) do { \	if (!c_req) return NT_STATUS_UNSUCCESSFUL; \	{ \		struct async_info *async; \		async = talloc(req, struct async_info); \		if (!async) return NT_STATUS_NO_MEMORY; \		async->parms = io; \		async->req = req; \		async->f = file; \		async->cvfs = private; \		async->c_req = c_req; \		DLIST_ADD(private->pending, async); \		c_req->async.private_data = async; \		talloc_set_destructor(async, async_info_destructor); \	} \	c_req->async.fn = async_fn; \	req->async_states->state |= NTVFS_ASYNC_STATE_ASYNC; \	return NT_STATUS_OK; \} while (0)#define ASYNC_RECV_TAIL(io, async_fn) ASYNC_RECV_TAIL_F(io, async_fn, NULL)#define SIMPLE_ASYNC_TAIL ASYNC_RECV_TAIL(NULL, async_simple_smb2)#define SIMPLE_COMPOSITE_TAIL ASYNC_RECV_TAIL(NULL, async_simple_composite)#define CHECK_ASYNC(req) do { \	if (!(req->async_states->state & NTVFS_ASYNC_STATE_MAY_ASYNC)) { \		DEBUG(0,("SMB2 proxy backend does not support sync operation at %s\n", \			 __location__)); \		return NT_STATUS_NOT_IMPLEMENTED; \	}} while (0)/*  delete a file - the dirtype specifies the file types to include in the search.   The name can contain CIFS wildcards, but rarely does (except with OS/2 clients)  BUGS:     - doesn't handle wildcards     - doesn't obey attrib restrictions*/static NTSTATUS cvfs_unlink(struct ntvfs_module_context *ntvfs, 			    struct ntvfs_request *req, union smb_unlink *unl){	struct cvfs_private *private = ntvfs->private_data;	struct composite_context *c_req;	CHECK_ASYNC(req);	c_req = smb2_composite_unlink_send(private->tree, unl);	SIMPLE_COMPOSITE_TAIL;}/*  ioctl interface*/static NTSTATUS cvfs_ioctl(struct ntvfs_module_context *ntvfs, 			   struct ntvfs_request *req, union smb_ioctl *io){	return NT_STATUS_NOT_IMPLEMENTED;}/*  check if a directory exists*/static NTSTATUS cvfs_chkpath(struct ntvfs_module_context *ntvfs, 			     struct ntvfs_request *req, union smb_chkpath *cp){	struct cvfs_private *private = ntvfs->private_data;	struct smb2_request *c_req;	struct smb2_find f;	CHECK_ASYNC(req);		/* SMB2 doesn't have a chkpath operation, and also doesn't	 have a query path info call, so the best seems to be to do a	 find call, using the roothandle we established at connect	 time */	ZERO_STRUCT(f);	f.in.file.handle	= private->roothandle;	f.in.level              = SMB2_FIND_DIRECTORY_INFO;	f.in.pattern		= cp->chkpath.in.path;	/* SMB2 find doesn't accept \ or the empty string - this is the best	   approximation */	if (strcmp(f.in.pattern, "\\") == 0 || 	    strcmp(f.in.pattern, "") == 0) {		f.in.pattern		= "?";	}	f.in.continue_flags	= SMB2_CONTINUE_FLAG_SINGLE | SMB2_CONTINUE_FLAG_RESTART;	f.in.max_response_size	= 0x1000;		c_req = smb2_find_send(private->tree, &f);	SIMPLE_ASYNC_TAIL;}/*  return info on a pathname*/static NTSTATUS cvfs_qpathinfo(struct ntvfs_module_context *ntvfs, 			       struct ntvfs_request *req, union smb_fileinfo *info){	return NT_STATUS_NOT_IMPLEMENTED;}/*

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -