2009-07-02 13:40:07 +04:00
/*
Unix SMB / CIFS implementation .
Core SMB2 server
Copyright ( C ) Stefan Metzmacher 2009
2010-04-29 01:56:12 +04:00
Copyright ( C ) Jeremy Allison 2010
2009-07-02 13:40:07 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
2011-03-22 18:57:01 +03:00
# include "smbd/smbd.h"
2009-07-02 13:40:07 +04:00
# include "smbd/globals.h"
2009-08-12 19:52:55 +04:00
# include "../libcli/smb/smb_common.h"
2011-02-25 02:03:01 +03:00
# include "trans2.h"
2011-04-28 19:38:09 +04:00
# include "../lib/util/tevent_ntstatus.h"
2014-12-05 08:19:32 +03:00
# include "../librpc/gen_ndr/open_files.h"
# include "source3/lib/dbwrap/dbwrap_watch.h"
# include "messages.h"
2017-05-26 18:02:33 +03:00
# include "librpc/gen_ndr/ndr_quota.h"
2009-07-02 13:40:07 +04:00
2018-03-21 22:01:05 +03:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_SMB2
2009-07-02 13:40:07 +04:00
static struct tevent_req * smbd_smb2_setinfo_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 12:54:46 +04:00
struct files_struct * in_fsp ,
2009-07-02 13:40:07 +04:00
uint8_t in_info_type ,
uint8_t in_file_info_class ,
DATA_BLOB in_input_buffer ,
2012-06-08 12:54:46 +04:00
uint32_t in_additional_information ) ;
2009-07-02 13:40:07 +04:00
static NTSTATUS smbd_smb2_setinfo_recv ( struct tevent_req * req ) ;
static void smbd_smb2_request_setinfo_done ( struct tevent_req * subreq ) ;
NTSTATUS smbd_smb2_request_process_setinfo ( struct smbd_smb2_request * req )
{
2014-06-12 10:38:48 +04:00
struct smbXsrv_connection * xconn = req - > xconn ;
2011-09-06 16:01:43 +04:00
NTSTATUS status ;
2009-07-02 13:40:07 +04:00
const uint8_t * inbody ;
uint8_t in_info_type ;
uint8_t in_file_info_class ;
uint16_t in_input_buffer_offset ;
uint32_t in_input_buffer_length ;
DATA_BLOB in_input_buffer ;
uint32_t in_additional_information ;
uint64_t in_file_id_persistent ;
uint64_t in_file_id_volatile ;
2012-06-08 12:54:46 +04:00
struct files_struct * in_fsp ;
2009-07-02 13:40:07 +04:00
struct tevent_req * subreq ;
2011-09-06 16:01:43 +04:00
status = smbd_smb2_request_verify_sizes ( req , 0x21 ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
2009-07-02 13:40:07 +04:00
}
2012-08-05 17:00:23 +04:00
inbody = SMBD_SMB2_IN_BODY_PTR ( req ) ;
2009-07-02 13:40:07 +04:00
in_info_type = CVAL ( inbody , 0x02 ) ;
in_file_info_class = CVAL ( inbody , 0x03 ) ;
in_input_buffer_length = IVAL ( inbody , 0x04 ) ;
in_input_buffer_offset = SVAL ( inbody , 0x08 ) ;
/* 0x0A 2 bytes reserved */
in_additional_information = IVAL ( inbody , 0x0C ) ;
in_file_id_persistent = BVAL ( inbody , 0x10 ) ;
in_file_id_volatile = BVAL ( inbody , 0x18 ) ;
if ( in_input_buffer_offset = = 0 & & in_input_buffer_length = = 0 ) {
/* This is ok */
} else if ( in_input_buffer_offset ! =
2012-08-05 17:00:23 +04:00
( SMB2_HDR_BODY + SMBD_SMB2_IN_BODY_LEN ( req ) ) ) {
2009-07-02 13:40:07 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
2012-08-05 17:00:23 +04:00
if ( in_input_buffer_length > SMBD_SMB2_IN_DYN_LEN ( req ) ) {
2009-07-02 13:40:07 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
2012-08-05 17:00:23 +04:00
in_input_buffer . data = SMBD_SMB2_IN_DYN_PTR ( req ) ;
2009-07-02 13:40:07 +04:00
in_input_buffer . length = in_input_buffer_length ;
2014-05-23 12:22:34 +04:00
if ( in_input_buffer . length > xconn - > smb2 . server . max_trans ) {
2012-05-11 21:02:21 +04:00
DEBUG ( 2 , ( " smbd_smb2_request_process_setinfo: "
" client ignored max trans: %s: 0x%08X: 0x%08X \n " ,
2012-05-30 11:08:49 +04:00
__location__ , ( unsigned ) in_input_buffer . length ,
2014-05-23 12:22:34 +04:00
( unsigned ) xconn - > smb2 . server . max_trans ) ) ;
2011-10-12 19:46:50 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_INVALID_PARAMETER ) ;
}
2012-02-28 05:51:40 +04:00
status = smbd_smb2_request_verify_creditcharge ( req ,
in_input_buffer . length ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return smbd_smb2_request_error ( req , status ) ;
}
2012-06-08 12:54:46 +04:00
in_fsp = file_fsp_smb2 ( req , in_file_id_persistent , in_file_id_volatile ) ;
if ( in_fsp = = NULL ) {
2009-07-02 13:40:07 +04:00
return smbd_smb2_request_error ( req , NT_STATUS_FILE_CLOSED ) ;
}
2018-12-27 17:18:55 +03:00
subreq = smbd_smb2_setinfo_send ( req , req - > sconn - > ev_ctx ,
2012-06-08 12:54:46 +04:00
req , in_fsp ,
2009-07-02 13:40:07 +04:00
in_info_type ,
in_file_info_class ,
in_input_buffer ,
2012-06-08 12:54:46 +04:00
in_additional_information ) ;
2009-07-02 13:40:07 +04:00
if ( subreq = = NULL ) {
return smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
}
tevent_req_set_callback ( subreq , smbd_smb2_request_setinfo_done , req ) ;
2011-11-14 18:42:55 +04:00
return smbd_smb2_request_pending_queue ( req , subreq , 500 ) ;
2009-07-02 13:40:07 +04:00
}
static void smbd_smb2_request_setinfo_done ( struct tevent_req * subreq )
{
struct smbd_smb2_request * req = tevent_req_callback_data ( subreq ,
struct smbd_smb2_request ) ;
DATA_BLOB outbody ;
NTSTATUS status ;
NTSTATUS error ; /* transport error */
status = smbd_smb2_setinfo_recv ( subreq ) ;
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
error = smbd_smb2_request_error ( req , status ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-07-02 13:40:07 +04:00
nt_errstr ( error ) ) ;
return ;
}
return ;
}
2013-12-04 17:59:07 +04:00
outbody = smbd_smb2_generate_outbody ( req , 0x02 ) ;
2009-07-02 13:40:07 +04:00
if ( outbody . data = = NULL ) {
error = smbd_smb2_request_error ( req , NT_STATUS_NO_MEMORY ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-07-02 13:40:07 +04:00
nt_errstr ( error ) ) ;
return ;
}
return ;
}
SSVAL ( outbody . data , 0x00 , 0x02 ) ; /* struct size */
error = smbd_smb2_request_done ( req , outbody , NULL ) ;
if ( ! NT_STATUS_IS_OK ( error ) ) {
2014-06-11 14:15:48 +04:00
smbd_server_connection_terminate ( req - > xconn ,
2009-07-02 13:40:07 +04:00
nt_errstr ( error ) ) ;
return ;
}
}
2014-12-05 08:19:32 +03:00
struct defer_rename_state {
struct tevent_req * req ;
struct smbd_smb2_request * smb2req ;
struct tevent_context * ev ;
struct files_struct * fsp ;
char * data ;
int data_size ;
} ;
2015-06-15 09:34:12 +03:00
static int defer_rename_state_destructor ( struct defer_rename_state * rename_state )
{
SAFE_FREE ( rename_state - > data ) ;
return 0 ;
}
2014-12-05 08:19:32 +03:00
static void defer_rename_done ( struct tevent_req * subreq ) ;
2019-09-12 12:35:34 +03:00
struct delay_rename_lease_break_state {
struct files_struct * fsp ;
bool delay ;
} ;
static bool delay_rename_lease_break_fn (
struct share_mode_entry * e ,
void * private_data )
{
struct delay_rename_lease_break_state * state = private_data ;
struct files_struct * fsp = state - > fsp ;
uint32_t e_lease_type , break_to ;
bool ours , stale ;
ours = smb2_lease_equal ( fsp_client_guid ( fsp ) ,
& fsp - > lease - > lease . lease_key ,
& e - > client_guid ,
& e - > lease_key ) ;
if ( ours ) {
return false ;
}
e_lease_type = get_lease_type ( e , fsp - > file_id ) ;
if ( ( e_lease_type & SMB2_LEASE_HANDLE ) = = 0 ) {
return false ;
}
stale = share_entry_stale_pid ( e ) ;
if ( stale ) {
return false ;
}
break_to = ( e_lease_type & ~ SMB2_LEASE_HANDLE ) ;
send_break_message (
fsp - > conn - > sconn - > msg_ctx , & fsp - > file_id , e , break_to ) ;
return false ;
}
2014-12-05 08:19:32 +03:00
static struct tevent_req * delay_rename_for_lease_break ( struct tevent_req * req ,
struct smbd_smb2_request * smb2req ,
struct tevent_context * ev ,
struct files_struct * fsp ,
struct share_mode_lock * lck ,
char * data ,
int data_size )
{
struct tevent_req * subreq ;
struct defer_rename_state * rename_state ;
2019-09-12 12:35:34 +03:00
struct delay_rename_lease_break_state state = { . fsp = fsp } ;
2014-12-05 08:19:32 +03:00
struct timeval timeout ;
2019-09-12 12:35:34 +03:00
bool ok ;
2014-12-05 08:19:32 +03:00
if ( fsp - > oplock_type ! = LEASE_OPLOCK ) {
return NULL ;
}
2019-09-12 12:35:34 +03:00
ok = share_mode_forall_leases (
lck , delay_rename_lease_break_fn , & state ) ;
if ( ! ok ) {
return NULL ;
2014-12-05 08:19:32 +03:00
}
2019-09-12 12:35:34 +03:00
if ( ! state . delay ) {
2014-12-05 08:19:32 +03:00
return NULL ;
}
/* Setup a watch on this record. */
rename_state = talloc_zero ( req , struct defer_rename_state ) ;
if ( rename_state = = NULL ) {
return NULL ;
}
rename_state - > req = req ;
rename_state - > smb2req = smb2req ;
rename_state - > ev = ev ;
rename_state - > fsp = fsp ;
rename_state - > data = data ;
rename_state - > data_size = data_size ;
2015-06-15 09:34:12 +03:00
talloc_set_destructor ( rename_state , defer_rename_state_destructor ) ;
2019-11-04 15:06:20 +03:00
subreq = share_mode_watch_send (
2014-12-05 08:19:32 +03:00
rename_state ,
ev ,
2019-11-04 15:06:20 +03:00
lck - > data - > id ,
2016-03-10 16:37:12 +03:00
( struct server_id ) { 0 } ) ;
2014-12-05 08:19:32 +03:00
if ( subreq = = NULL ) {
exit_server ( " Could not watch share mode record for rename \n " ) ;
}
tevent_req_set_callback ( subreq , defer_rename_done , rename_state ) ;
timeout = timeval_set ( OPLOCK_BREAK_TIMEOUT * 2 , 0 ) ;
if ( ! tevent_req_set_endtime ( subreq ,
ev ,
timeval_sum ( & smb2req - > request_time , & timeout ) ) ) {
exit_server ( " Could not set rename timeout \n " ) ;
}
return subreq ;
}
static void defer_rename_done ( struct tevent_req * subreq )
{
struct defer_rename_state * state = tevent_req_callback_data (
subreq , struct defer_rename_state ) ;
NTSTATUS status ;
struct share_mode_lock * lck ;
int ret_size = 0 ;
2018-12-27 13:37:16 +03:00
bool ok ;
2014-12-05 08:19:32 +03:00
2019-11-04 15:06:20 +03:00
status = share_mode_watch_recv ( subreq , NULL , NULL ) ;
2014-12-05 08:19:32 +03:00
TALLOC_FREE ( subreq ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 5 , ( " dbwrap_record_watch_recv returned %s \n " ,
nt_errstr ( status ) ) ) ;
tevent_req_nterror ( state - > req , status ) ;
return ;
}
2018-12-27 13:37:16 +03:00
/*
* Make sure we run as the user again
*/
2019-12-29 16:33:00 +03:00
ok = change_to_user_and_service (
state - > smb2req - > tcon - > compat ,
state - > smb2req - > session - > global - > session_wire_id ) ;
2018-12-27 13:37:16 +03:00
if ( ! ok ) {
tevent_req_nterror ( state - > req , NT_STATUS_ACCESS_DENIED ) ;
return ;
}
2014-12-05 08:19:32 +03:00
/* Do we still need to wait ? */
lck = get_existing_share_mode_lock ( state - > req , state - > fsp - > file_id ) ;
if ( lck = = NULL ) {
tevent_req_nterror ( state - > req , NT_STATUS_UNSUCCESSFUL ) ;
return ;
}
subreq = delay_rename_for_lease_break ( state - > req ,
state - > smb2req ,
state - > ev ,
state - > fsp ,
lck ,
state - > data ,
state - > data_size ) ;
if ( subreq ) {
/* Yep - keep waiting. */
2015-06-15 09:34:12 +03:00
state - > data = NULL ;
2014-12-05 08:19:32 +03:00
TALLOC_FREE ( state ) ;
TALLOC_FREE ( lck ) ;
return ;
}
/* Do the rename under the lock. */
status = smbd_do_setfilepathinfo ( state - > fsp - > conn ,
state - > smb2req - > smb1req ,
state ,
SMB2_FILE_RENAME_INFORMATION_INTERNAL ,
state - > fsp ,
state - > fsp - > fsp_name ,
& state - > data ,
state - > data_size ,
& ret_size ) ;
TALLOC_FREE ( lck ) ;
SAFE_FREE ( state - > data ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( state - > req , status ) ;
return ;
}
tevent_req_done ( state - > req ) ;
}
2009-07-02 13:40:07 +04:00
struct smbd_smb2_setinfo_state {
struct smbd_smb2_request * smb2req ;
} ;
static struct tevent_req * smbd_smb2_setinfo_send ( TALLOC_CTX * mem_ctx ,
struct tevent_context * ev ,
struct smbd_smb2_request * smb2req ,
2012-06-08 12:54:46 +04:00
struct files_struct * fsp ,
2009-07-02 13:40:07 +04:00
uint8_t in_info_type ,
uint8_t in_file_info_class ,
DATA_BLOB in_input_buffer ,
2012-06-08 12:54:46 +04:00
uint32_t in_additional_information )
2009-07-02 13:40:07 +04:00
{
2010-04-29 01:13:22 +04:00
struct tevent_req * req = NULL ;
struct smbd_smb2_setinfo_state * state = NULL ;
struct smb_request * smbreq = NULL ;
2012-03-27 13:09:05 +04:00
connection_struct * conn = smb2req - > tcon - > compat ;
2014-12-05 08:19:32 +03:00
struct share_mode_lock * lck = NULL ;
2010-04-29 01:13:22 +04:00
NTSTATUS status ;
2009-07-02 13:40:07 +04:00
req = tevent_req_create ( mem_ctx , & state ,
struct smbd_smb2_setinfo_state ) ;
if ( req = = NULL ) {
return NULL ;
}
state - > smb2req = smb2req ;
2012-06-14 15:26:39 +04:00
DEBUG ( 10 , ( " smbd_smb2_setinfo_send: %s - %s \n " ,
fsp_str_dbg ( fsp ) , fsp_fnum_dbg ( fsp ) ) ) ;
2009-07-02 13:40:07 +04:00
smbreq = smbd_smb2_fake_smb_request ( smb2req ) ;
if ( tevent_req_nomem ( smbreq , req ) ) {
return tevent_req_post ( req , ev ) ;
}
2009-07-13 11:23:57 +04:00
if ( IS_IPC ( conn ) ) {
tevent_req_nterror ( req , NT_STATUS_NOT_SUPPORTED ) ;
return tevent_req_post ( req , ev ) ;
}
switch ( in_info_type ) {
2019-03-29 13:08:12 +03:00
case SMB2_0_INFO_FILE :
2009-07-13 11:23:57 +04:00
{
uint16_t file_info_level ;
char * data ;
int data_size ;
int ret_size = 0 ;
file_info_level = in_file_info_class + 1000 ;
if ( file_info_level = = SMB_FILE_RENAME_INFORMATION ) {
2010-02-25 22:15:16 +03:00
/* SMB2_FILE_RENAME_INFORMATION_INTERNAL == 0xFF00 + in_file_info_class */
file_info_level = SMB2_FILE_RENAME_INFORMATION_INTERNAL ;
2009-07-13 11:23:57 +04:00
}
2011-02-08 07:46:36 +03:00
if ( fsp - > fh - > fd = = - 1 ) {
2009-07-13 11:23:57 +04:00
/*
* This is actually a SETFILEINFO on a directory
* handle ( returned from an NT SMB ) . NT5 .0 seems
* to do this call . JRA .
*/
2019-03-19 00:52:26 +03:00
if ( fsp - > fsp_name - > flags & SMB_FILENAME_POSIX_PATH ) {
2009-07-13 11:23:57 +04:00
/* Always do lstat for UNIX calls. */
2009-07-11 01:50:37 +04:00
if ( SMB_VFS_LSTAT ( conn , fsp - > fsp_name ) ) {
2009-07-13 11:23:57 +04:00
DEBUG ( 3 , ( " smbd_smb2_setinfo_send: "
" SMB_VFS_LSTAT of %s failed "
2009-07-11 01:50:37 +04:00
" (%s) \n " , fsp_str_dbg ( fsp ) ,
2009-07-13 11:23:57 +04:00
strerror ( errno ) ) ) ;
status = map_nt_error_from_unix ( errno ) ;
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
} else {
2009-07-11 01:50:37 +04:00
if ( SMB_VFS_STAT ( conn , fsp - > fsp_name ) ! = 0 ) {
2009-07-13 11:23:57 +04:00
DEBUG ( 3 , ( " smbd_smb2_setinfo_send: "
" fileinfo of %s failed (%s) \n " ,
2009-07-11 01:50:37 +04:00
fsp_str_dbg ( fsp ) ,
2009-07-13 11:23:57 +04:00
strerror ( errno ) ) ) ;
status = map_nt_error_from_unix ( errno ) ;
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
}
} else if ( fsp - > print_file ) {
/*
* Doing a DELETE_ON_CLOSE should cancel a print job .
*/
if ( ( file_info_level = = SMB_SET_FILE_DISPOSITION_INFO )
& & in_input_buffer . length > = 1
& & CVAL ( in_input_buffer . data , 0 ) ) {
2010-03-06 02:10:30 +03:00
fsp - > fh - > private_options | = NTCREATEX_OPTIONS_PRIVATE_DELETE_ON_CLOSE ;
2009-07-13 11:23:57 +04:00
DEBUG ( 3 , ( " smbd_smb2_setinfo_send: "
" Cancelling print job (%s) \n " ,
2009-07-11 01:50:37 +04:00
fsp_str_dbg ( fsp ) ) ) ;
2009-07-13 11:23:57 +04:00
tevent_req_done ( req ) ;
return tevent_req_post ( req , ev ) ;
}
2019-07-03 14:44:59 +03:00
tevent_req_nterror ( req , NT_STATUS_OBJECT_PATH_INVALID ) ;
return tevent_req_post ( req , ev ) ;
2009-07-13 11:23:57 +04:00
} else {
/*
* Original code - this is an open file .
*/
2009-07-11 01:50:37 +04:00
if ( SMB_VFS_FSTAT ( fsp , & fsp - > fsp_name - > st ) ! = 0 ) {
2009-07-13 11:23:57 +04:00
DEBUG ( 3 , ( " smbd_smb2_setinfo_send: fstat "
2012-06-14 15:26:39 +04:00
" of %s failed (%s) \n " ,
fsp_fnum_dbg ( fsp ) ,
2009-07-13 11:23:57 +04:00
strerror ( errno ) ) ) ;
status = map_nt_error_from_unix ( errno ) ;
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
}
data = NULL ;
data_size = in_input_buffer . length ;
if ( data_size > 0 ) {
data = ( char * ) SMB_MALLOC_ARRAY ( char , data_size ) ;
if ( tevent_req_nomem ( data , req ) ) {
2010-04-29 01:13:22 +04:00
return tevent_req_post ( req , ev ) ;
2009-07-13 11:23:57 +04:00
}
memcpy ( data , in_input_buffer . data , data_size ) ;
}
2014-12-05 08:19:32 +03:00
if ( file_info_level = = SMB2_FILE_RENAME_INFORMATION_INTERNAL ) {
struct tevent_req * subreq ;
lck = get_existing_share_mode_lock ( mem_ctx ,
fsp - > file_id ) ;
if ( lck = = NULL ) {
2015-03-03 17:53:34 +03:00
SAFE_FREE ( data ) ;
2014-12-05 08:19:32 +03:00
tevent_req_nterror ( req ,
NT_STATUS_UNSUCCESSFUL ) ;
return tevent_req_post ( req , ev ) ;
}
subreq = delay_rename_for_lease_break ( req ,
smb2req ,
ev ,
fsp ,
lck ,
data ,
data_size ) ;
if ( subreq ) {
/* Wait for lease break response. */
/* Ensure we can't be closed in flight. */
if ( ! aio_add_req_to_fsp ( fsp , req ) ) {
TALLOC_FREE ( lck ) ;
tevent_req_nterror ( req , NT_STATUS_NO_MEMORY ) ;
return tevent_req_post ( req , ev ) ;
}
TALLOC_FREE ( lck ) ;
return req ;
}
}
2009-07-13 11:23:57 +04:00
status = smbd_do_setfilepathinfo ( conn , smbreq , state ,
file_info_level ,
fsp ,
2009-07-11 01:50:37 +04:00
fsp - > fsp_name ,
2009-07-13 11:23:57 +04:00
& data ,
data_size ,
& ret_size ) ;
2014-12-05 08:19:32 +03:00
TALLOC_FREE ( lck ) ;
2009-07-13 11:23:57 +04:00
SAFE_FREE ( data ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2016-04-14 15:39:05 +03:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_INVALID_LEVEL ) ) {
status = NT_STATUS_INVALID_INFO_CLASS ;
}
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
break ;
}
2019-03-29 13:08:12 +03:00
case SMB2_0_INFO_FILESYSTEM :
2016-04-14 15:39:05 +03:00
{
uint16_t file_info_level = in_file_info_class + 1000 ;
status = smbd_do_setfsinfo ( conn , smbreq , state ,
file_info_level ,
fsp ,
& in_input_buffer ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2009-07-13 11:23:57 +04:00
if ( NT_STATUS_EQUAL ( status , NT_STATUS_INVALID_LEVEL ) ) {
status = NT_STATUS_INVALID_INFO_CLASS ;
}
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
break ;
}
2019-03-29 13:08:12 +03:00
case SMB2_0_INFO_SECURITY :
2010-04-29 01:13:22 +04:00
{
2010-09-09 07:54:38 +04:00
if ( ! CAN_WRITE ( conn ) ) {
tevent_req_nterror ( req , NT_STATUS_ACCESS_DENIED ) ;
return tevent_req_post ( req , ev ) ;
}
2012-08-30 00:23:06 +04:00
status = set_sd_blob ( fsp ,
2010-04-29 01:13:22 +04:00
in_input_buffer . data ,
in_input_buffer . length ,
2014-08-20 15:58:38 +04:00
in_additional_information &
SMB_SUPPORTED_SECINFO_FLAGS ) ;
2010-04-29 01:13:22 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
break ;
}
2019-03-29 13:08:12 +03:00
case SMB2_0_INFO_QUOTA :
2017-05-26 18:02:33 +03:00
{
2018-08-07 13:06:34 +03:00
# ifdef HAVE_SYS_QUOTAS
2017-05-26 18:02:33 +03:00
struct file_quota_information info = { 0 } ;
SMB_NTQUOTA_STRUCT qt = { 0 } ;
enum ndr_err_code err ;
int ret ;
if ( ! fsp - > fake_file_handle ) {
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER ) ;
return tevent_req_post ( req , ev ) ;
}
err = ndr_pull_struct_blob (
& in_input_buffer , state , & info ,
( ndr_pull_flags_fn_t ) ndr_pull_file_quota_information ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( err ) ) {
tevent_req_nterror ( req , NT_STATUS_UNSUCCESSFUL ) ;
return tevent_req_post ( req , ev ) ;
}
qt . usedspace = info . quota_used ;
qt . softlim = info . quota_threshold ;
qt . hardlim = info . quota_limit ;
qt . sid = info . sid ;
ret = vfs_set_ntquota ( fsp , SMB_USER_QUOTA_TYPE , & qt . sid , & qt ) ;
if ( ret ! = 0 ) {
status = map_nt_error_from_unix ( errno ) ;
tevent_req_nterror ( req , status ) ;
return tevent_req_post ( req , ev ) ;
}
status = NT_STATUS_OK ;
break ;
2018-08-07 13:06:34 +03:00
# else
tevent_req_nterror ( req , NT_STATUS_NOT_SUPPORTED ) ;
return tevent_req_post ( req , ev ) ;
# endif
2017-05-26 18:02:33 +03:00
}
2009-07-13 11:23:57 +04:00
default :
tevent_req_nterror ( req , NT_STATUS_INVALID_PARAMETER ) ;
return tevent_req_post ( req , ev ) ;
}
tevent_req_done ( req ) ;
2009-07-02 13:40:07 +04:00
return tevent_req_post ( req , ev ) ;
}
static NTSTATUS smbd_smb2_setinfo_recv ( struct tevent_req * req )
{
NTSTATUS status ;
if ( tevent_req_is_nterror ( req , & status ) ) {
tevent_req_received ( req ) ;
return status ;
}
tevent_req_received ( req ) ;
return NT_STATUS_OK ;
}